Author of the publication

CNN training for age group prediction in an illumination condition.

, , and . ICT Express, 6 (3): 195-199 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CNN training for age group prediction in an illumination condition., , and . ICT Express, 6 (3): 195-199 (2020)Design and Implementation on the Access Control Scheme Against V2N Connected Car Attacks., , , and . MUE/FutureTech, volume 518 of Lecture Notes in Electrical Engineering, page 705-710. Springer, (2018)Performance Prediction in Peer-to-Peer MultiAgent Networks., , , , and . AP2PC, volume 5319 of Lecture Notes in Computer Science, page 27-40. Springer, (2007)Preliminary Study of Novel Bio-Crypto Key Generation Using Clustering-Based Binarization of ECG Features., , , , , and . Sensors, 24 (5): 1556 (March 2024)A Protocol Switching Scheme for Developing Network Management Applications., , and . ICOIN, volume 3961 of Lecture Notes in Computer Science, page 862-872. Springer, (2006)Detection of Rogue Devices in WLAN by Analyzing RF Features and Indoor Location of the Device., , , , and . WISA, volume 9503 of Lecture Notes in Computer Science, page 54-61. Springer, (2015)Public Key Management Framework for Two-tier Super Peer Architecture., , , and . ICDCS Workshops, page 72. IEEE Computer Society, (2007)Protecting IPTV Service Network against Malicious Rendezvous Point., , , and . WISA, volume 5932 of Lecture Notes in Computer Science, page 1-9. Springer, (2009)An Automatic Security Evaluation System for IPv6 Network., , , , and . WISA, volume 2908 of Lecture Notes in Computer Science, page 150-161. Springer, (2003)Design and Implementation of Security Threat Detection and Access Control System for Connected Car., , , , and . CSII (selected papers), volume 787 of Studies in Computational Intelligence, page 177-183. Springer, (2018)