Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic security system for recognizing unexpected motions through video surveillance., , , and . ICCST, page 1-5. IEEE, (2014)Adaptive genetic controller for the dynamic optmization of network traffic of integrated security systems., , and . ICCST, page 1-6. IEEE, (2015)Parameter identification of quasi-stationary Rayleigh-faded time-varying digital channels., and . Signal Process., 79 (1): 1-13 (1999)Feasibility and Performance Analysis of Underwater Acoustic LoRa Modulation., , , and . ICC Workshops, page 709-714. IEEE, (2023)Perceived Risk Assessment through Open-Source Intelligent Techniques for Opinion Mining and Sentiment Analysis: The Case Study of the Papal Basilica and Sacred Convent of Saint Francis in Assisi, Italy., , , , , and . ICCST, page 1-5. IEEE, (2018)Short paper: Dynamic network selection in V2I systems., , , , and . VNC, page 190-193. IEEE, (2013)A Combined Vertical Handover Decision Metric for QoS Enhancement in Next Generation Networks., , , and . WiMob, page 233-238. IEEE Computer Society, (2009)Bayesian prior for reconstruction of compressively sampled astronomical images., , , and . EUVIP, page 124-129. IEEE, (2013)Geometric Cross-Layer QoS Parameters Based Seamless Vertical Handover Procedures in Presence of Adaptive Modulation and Coding., , and . VTC Spring, page 1-5. IEEE, (2011)Hierarchical CoSaMP for compressively sampled sparse signals with nested structure., , , , , and . EURASIP J. Adv. Signal Process., (2014)