Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing the Wireless LANs Against Internal Attacks., and . MSN, volume 4864 of Lecture Notes in Computer Science, page 814-821. Springer, (2007)Security, Trust, and Privacy Management Framework in Cyber-Physical Systems using Blockchain., , , , , and . CCNC, page 1-6. IEEE, (2023)Reliability and latency trade-off in time domain interleaving for OFDM communication systems., , , and . MECO, page 1-4. IEEE, (2018)Mobile Station Location Based on Hybrid of Signal Strength and Time of Arrival., and . ICMB, page 585-591. IEEE Computer Society, (2005)Scaled Conjugate Gradient Neural Network for Optimizing Indoor Positioning System., , , , and . ISNCC, page 1-4. IEEE, (2019)Analysis of Distributed Resource Management in Wireless LANs that Support Fault Tolerance., and . Wireless Information Systems, page 66-75. INSTICC Press, (2006)Enhancing Brain Tumour Aid Diagnosis with Augmented Reality rendering-based 6 DoF Object Pose Estimation., , , , , and . ICSPIS, page 11-16. IEEE, (2023)Autonomous Building Detection Using Region Properties and PCA., , , , , and . ICSPIS, page 1-4. IEEE, (2018)A Study on Seizure Detection Performance in an Automated Process by Extracting Entropy Features., , , , and . ICSPIS, page 86-91. IEEE, (2022)SemiSegPolyp: Semi-Supervised Polyp Segmentation using Graph Signals., , , , and . ICECS 2022, page 1-4. IEEE, (2022)