Author of the publication

Embedded feature-selection support vector machine for driving pattern recognition.

, , , and . J. Frankl. Inst., 352 (2): 669-685 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient HS based Reversible Data Hiding Using Multi-feature Complexity Measure and Optimized Histogram., , and . IH&MMSec, page 29-38. ACM, (2016)A novel multi-finger layout strategy for GGnMOS ESD protection device., , , and . ASICON, page 275-278. IEEE, (2011)A reference-less all-digital burst-mode CDR with embedded TDC., , , , , and . ASICON, page 1-4. IEEE, (2015)Delay-locked loop based frequency quadrupler with wide operating range and fast locking characteristics., , , , and . ISCAS, page 1-4. IEEE, (2016)Multi-agent Deep Reinforcement Learning Based Adaptive User Association in Heterogeneous Networks., , , and . ChinaCom, volume 262 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 57-67. Springer, (2018)Spatial-Temporal Distribution of Mobile Traffic and Base Station Clustering Based on Urban Function in Cellular Networks., , and . WICON, volume 230 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 300-312. Springer, (2017)Neighbor-List Based Pairwise Key Management Scheme in Wireless Sensor Networks., , and . AMT, volume 5820 of Lecture Notes in Computer Science, page 522-528. Springer, (2009)Object Tracking Based on Kernelized Correlation Filter with HOG and Illumination Invariant Features., , and . BDIOT, page 123-127. ACM, (2018)Closed-Form Symbol Error Rate of Multiantenna Selection System with Multiuser Diversity., and . PIMRC, page 1-5. IEEE, (2007)Trust Extended Dynamic Security Model and Its Application in Network., , , , and . MSN, volume 4325 of Lecture Notes in Computer Science, page 404-415. Springer, (2006)