Author of the publication

Efficient mobility modeling of autonomous movement planning trajectories using AI algorithms.

, , , and . ISIVC, page 1-6. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Validation of Spatial Temporal Features of Synthetic Mobility Models., , , , and . Comput., 7 (4): 71 (2018)A robust minutia-based approach for securing fingerprint templates., , and . ISIVC, page 286-290. IEEE, (2018)A progression strategy of proximal algorithm applied to the digital images inpainting., , and . ISIVC, page 282-285. IEEE, (2018)Flaws Validation of Maze Mobility Model using Spatial-temporal Synthetic Mobility Metrics., , , , and . PECCS, page 106-112. ScitePress, (2019)Short: Blind Separation of the Multiarray Multisensor Systems Using the CP Decomposition., , , and . NETYS, volume 8593 of Lecture Notes in Computer Science, page 313-318. Springer, (2014)Systematic Crowd Mobility Management to Avoid Catastrophic Disasters of Human Stampedes: The Case of Mina Hajj., , , , and . PECCS, page 66-73. SCITEPRESS, (2020)Analysis of the radar ambiguity function for a new Golay sets shaping., and . ISIVC, page 1-4. IEEE, (2021)Study of security problem in cloud computing with access control based on the blockchain., , , and . ISIVC, page 1-6. IEEE, (2022)Performance index for tensor polyadic decompositions., , , and . EUSIPCO, page 1-5. IEEE, (2013)FTSMAC: A Multi-Channel Hybrid Reader Collision Avoidance Protocol for RFID Network., , , and . J. Sens. Actuator Networks, 10 (3): 46 (2021)