From post

Adaptive Classification by Hybrid EKF with Truncated Filtering: Brain Computer Interfacing.

, , , и . IDEAL, том 5326 из Lecture Notes in Computer Science, стр. 370-377. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A new approach to training more interpretable model with additional segmentation., , и . Pattern Recognit. Lett., (2021)PD-FDS: Purchase Density based Online Credit Card Fraud Detection System., и . ADF@KDD, том 71 из Proceedings of Machine Learning Research, стр. 76-84. PMLR, (2017)Robust Measurement Validation in Target Tracking Using Geometric Structure., и . IEEE Signal Process. Lett., 17 (5): 493-496 (2010)A new collision-free pseudonym scheme in mobile ad hoc networks., и . WiOpt, стр. 1-5. IEEE, (2009)ResMax: Detecting Voice Spoofing Attacks with Residual Network and Max Feature Map., , , , , , , и . ICPR, стр. 4837-4844. IEEE, (2020)Comparison of various interpolation techniques to infer localization of audio files using ENF signals., , , и . ICSSA, стр. 46-51. IEEE, (2020)Improved Mean Shift Algorithm with Heterogeneous Node Weights., и . ICPR, стр. 4222-4225. IEEE Computer Society, (2010)A Practical Approach to Constructing Triple-Blind Review Process with Maximal Anonymity and Fairness., , и . WISA, том 10144 из Lecture Notes in Computer Science, стр. 198-209. (2016)A Bitwise Logistic Regression Using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme., , , и . ISPEC, том 11879 из Lecture Notes in Computer Science, стр. 20-40. Springer, (2019)Static Malware Analysis in Encrypted Domain., и . ICTC, стр. 47-52. IEEE, (2019)