Author of the publication

A forecasting tool for prediction of epileptic seizures using a machine learning approach.

, , , , , , and . Concurrency and Computation: Practice and Experience, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint rate and cooperative MIMO scheme optimization for uniform energy distribution in Wireless Sensor Networks., , , and . Computer Communications, 32 (6): 1072-1078 (2009)A 90nm power optimization methodology and its' application to the ARM 1136SF-S microprocessor., , , , , , , , , and 9 other author(s). CICC, page 771-774. IEEE, (2005)Minimal Induced Traffic for Cluster Formation in Wireless Sensor Networks: A Quantitative Analysis., , and . COMSWARE, IEEE, (2007)Hybrid frequency-time domain proportional fair resource allocation scheme for LTE downlink., , , , and . ICON, page 286-290. IEEE, (2012)Uniform Energy Consumption through Adaptive Optimal Selection of Cooperative MIMO Schemes in Wireless Sensor Networks., , and . VTC Spring, page 198-202. IEEE, (2008)A Machine Learning Approach to Achieving Energy Efficiency in Relay-Assisted LTE-A Downlink System., , , , , , and . Sensors, 19 (16): 3461 (2019)Control Logic Injection Attacks on Industrial Control Systems., and . SEC, volume 562 of IFIP Advances in Information and Communication Technology, page 33-48. Springer, (2019)Incremental Linearization for Satisfiability and Verification Modulo Nonlinear Arithmetic and Transcendental Functions., , , , and . ACM Trans. Comput. Log., 19 (3): 19:1-19:52 (2018)Evaluation of Peer Instruction for Cybersecurity Education., , and . SIGCSE, page 720-725. ACM, (2019)Robust Fingerprinting for Relocatable Code., , and . CODASPY, page 219-229. ACM, (2015)