From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automatic threshold optimization in nonlinear energy operator based spike detection., , и . EMBC, стр. 774-777. IEEE, (2016)A secure two-party password-authenticated key exchange protocol., , , , , и . IRI, стр. 466-474. IEEE Computer Society, (2014)Is Really NACK Protocol Secure to Be Employed in MANETs?, , , , , и . CSE, стр. 1644-1647. IEEE Computer Society, (2014)Low SNR neural spike detection using scaled energy operators for implantable brain circuits., , , и . EMBC, стр. 1074-1077. IEEE, (2017)Accurate Reconstruction of ECG Signals using Chebyshev Polynomials., , и . ICECS 2022, стр. 1-2. IEEE, (2022)Event-Driven ECG Classification using Functional Approximation and Chebyshev Polynomials., , , , , и . BioCAS, стр. 595-599. IEEE, (2022)Sustainable material selection with crisp and ambiguous data using single-valued neutrosophic-MEREC-MARCOS framework., , , , , , и . Appl. Soft Comput., (2022)Active contour image segmentation model with de-hazing constraints., , , и . IET Image Process., 14 (5): 921-928 (2020)Security analysis and improvement of Smart Card-Based Authenticated Key Exchange protocol with CAPTCHAs for wireless mobile network., и . ISCC, стр. 652-657. IEEE Computer Society, (2011)APPMA - an Anti-phishing protocol with mutual Authentication., и . ISCC, стр. 308-313. IEEE Computer Society, (2010)