Author of the publication

Recognition and identification of target images using feature based retrieval in UAV missions.

, and . NCVPRIPG, page 1-4. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recognition and identification of target images using feature based retrieval in UAV missions., and . NCVPRIPG, page 1-4. IEEE, (2013)Phishing Detection from URLs Using Deep Learning Approach., , and . ICCCS, page 1-4. IEEE, (2020)Complex Skill Learning using Modified Transformers with Automatic Chunking and Forgetting., , and . ICRAI, page 17-22. ACM, (2023)Wireless powered communication network optimization using PSO-CS algorithm., , and . Wirel. Networks, 27 (6): 4151-4167 (2021)Detection of emergent behaviors in system of dynamical systems using similitude theory.. WSC, page 4650-4651. IEEE, (2017)Low Cost Object Identification in RFID via Dynamic Markov Chain & Two Time Scale SPSA.. SAINT Workshops, page 64-67. IEEE Computer Society, (2006)A Comparative Study of Internet Protocols in MANET., and . ICACDS, volume 721 of Communications in Computer and Information Science, page 221-231. Springer, (2016)Quick Response Encoding of Human Facial Images for Identity Fraud Detection., , , , and . IFIP Int. Conf. Digital Forensics, volume 569 of IFIP Advances in Information and Communication Technology, page 185-199. Springer, (2019)Specialization, Integration, and Multi-sourcing: A study of Large IT Outsourcing Projects., , , and . ICIS, Association for Information Systems, (2013)Benchmarking Object Detectors with COCO: A New Path Forward., , , , , and . CoRR, (2024)