Juan Arturo Nolazco-Flores

Orcid: 0000-0002-4187-9352

According to our database1, Juan Arturo Nolazco-Flores authored at least 67 papers between 1993 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Utilization of 5G Technologies in IoT Applications: Current Limitations by Interference and Network Optimization Difficulties - A Review.
Sensors, 2023

Non-Invasive Monitoring of Vital Signs for the Elderly Using Low-Cost Wireless Sensor Networks: Exploring the Impact on Sleep and Home Security.
Future Internet, 2023

Genre Classification of Books on Spanish.
IEEE Access, 2023

2022
Mood State Detection in Handwritten Tasks Using PCA-mFCBF and Automated Machine Learning.
Sensors, 2022

2021
A Low-Cost Jamming Detection Approach Using Performance Metrics in Cluster-Based Wireless Sensor Networks.
Sensors, 2021

A Hybrid Teaching Model for Engineering Courses Suitable for Pandemic Conditions.
Rev. Iberoam. de Tecnol. del Aprendiz., 2021

Exploiting Spectral and Cepstral Handwriting Features on Diagnosing Parkinson's Disease.
IEEE Access, 2021

Emotional State Recognition Performance Improvement on a Handwriting and Drawing Task.
IEEE Access, 2021

Engineering School Women Faculty Evaluation in Tec21 competence educational model.
Proceedings of the IEEE Global Engineering Education Conference, 2021

2020
SAMAF: Sequence-to-sequence Autoencoder Model for Audio Fingerprinting.
ACM Trans. Multim. Comput. Commun. Appl., 2020

Successful Strategies for the attraction of more women into Engineering in Southern Mexico.
Proceedings of the 2020 IEEE Global Engineering Education Conference, 2020

Integration of circular economy principles for developing sustainable development competences in higher education: an analysis of bachelor construction management courses.
Proceedings of the 2020 IEEE Global Engineering Education Conference, 2020

A hybrid flipped-learning model and a new learning-space to improve the performance of students in Structural Mechanics courses.
Proceedings of the 2020 IEEE Global Engineering Education Conference, 2020

2019
New Detection Paradigms to Improve Wireless Sensor Network Performance under Jamming Attacks.
Sensors, 2019

A monitoring-based approach for WSN security using IEEE-802.15.4/6LowPAN and DTLS communication.
Int. J. Auton. Adapt. Commun. Syst., 2019

2017
Models for wireless H.264 video-on-demand services using self-similarity and heavy-tails.
Wirel. Networks, 2017

PlaIMoS: A Remote Mobile Healthcare Platform to Monitor Cardiovascular and Respiratory Variables.
Sensors, 2017

MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks.
Sensors, 2017

Characterisation, design and simulation of an efficient peer-to-peer content distribution system for enterprise networks.
Peer-to-Peer Netw. Appl., 2017

Adaptive Resource Allocation with Job Runtime Uncertainty.
J. Grid Comput., 2017

2016
Cloud based Video-on-Demand service model ensuring quality of service and scalability.
J. Netw. Comput. Appl., 2016

A Tutorial on Deep Neural Networks for Intelligent Systems.
CoRR, 2016

Piloting Computer Science Education Week in Mexico.
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 2016

Age Classification from Facial Images: Is Frontalization Necessary?
Proceedings of the Advances in Visual Computing - 12th International Symposium, 2016

An Analysis of Secure M2M Communication in WSNs Using DTLS.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems Workshops, 2016

2015
On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks.
Sensors, 2015

Addressing the illumination challenge in two-dimensional face recognition: a survey.
IET Comput. Vis., 2015

A Survey on Wireless Sensors Networks Security Based on a Layered Approach.
Proceedings of the Wired/Wireless Internet Communications - 13th International Conference, 2015

2014
Bidimensional empirical mode decomposition-based unlighting for face recognition.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

2013
Quality Function Deployment (QFD) House of Quality for Strategic Planning of Computer Security of SMEs.
Int. J. Comb. Optim. Probl. Informatics, 2013

Merging the Camellia, SMS4 and AES S-Boxes in a Single S-Box with Composite Bases.
Proceedings of the Information Security, 16th International Conference, 2013

Ensemble approach in speaker verification.
Proceedings of the INTERSPEECH 2013, 2013

Optimization of the DET curve in speaker verification under noisy conditions.
Proceedings of the IEEE International Conference on Acoustics, 2013

2012
Optimization of the DET curve in speaker verification.
Proceedings of the 2012 IEEE Spoken Language Technology Workshop (SLT), 2012

Some Representations of the S-Box of Camellia in <i>GF</i>(((2<sup>2</sup>)<sup>2</sup>)<sup>2</sup>).
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

2011
Editorial.
Computación y Sistemas, 2011

Speaker Verification in Different Database Scenarios.
Computación y Sistemas, 2011

2010
Speech Magnitude-Spectrum Information-Entropy (MSIE) for Automatic Speech Recognition in Noisy Environments.
Proceedings of the 20th International Conference on Pattern Recognition, 2010


2008
Enhancing acoustic models for robust speaker verification.
Proceedings of the IEEE International Conference on Acoustics, 2008

2007
Acoustic Model Enhancement: An Adaptation Technique for Speaker Verification Under Noisy Environments.
Proceedings of the IEEE International Conference on Acoustics, 2007

Robust Automatic Speech Recognition Using PD-MEEMLIN.
Proceedings of the Pattern Recognition and Image Analysis, Third Iberian Conference, 2007

FLF4DoS. Dynamic DDoS Mitigation based on TTL field using fuzzy logic.
Proceedings of the 17th International Conference on Electronics, 2007

2006
Hybrid Method for Detecting Masqueraders Using Session Folding and Hidden Markov Models.
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006

Using PCA to Improve the Generation of Speech Keys.
Proceedings of the MICAI 2006: Advances in Artificial Intelligence, 2006

Time-dependent cross-probability model for multi-environment model based LInear normalization.
Proceedings of the INTERSPEECH 2006, 2006

Biometric-Iris Random Key Generator Using Generalized Regression Neural Networks.
Proceedings of the Advances in Applied Artificial Intelligence, 2006

Cryptographic Keys Generation Using FingerCodes.
Proceedings of the Advances in Artificial Intelligence, 2006

2005
An FPGA-based coprocessor for the SPHINX speech recognition system: early experiences.
Proceedings of the 2005 International Conference on Reconfigurable Computing and FPGAs, 2005

Parameter Optimization in a Text-Dependent Cryptographic-Speech-Key Generation Task.
Proceedings of the Nonlinear Analyses and Algorithms for Speech Processing, 2005

ASR Based on the Analasys of the Short-MelFrequencyCepstra Time Transform.
Proceedings of the MICAI 2005: Advances in Artificial Intelligence, 2005

Robustness of Bit-stream Based Features for Speaker Verification.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

Speaker Dependent ASRs for Huastec and Western-Huastec Náhuatl Languages.
Proceedings of the Pattern Recognition and Image Analysis, Second Iberian Conference, 2005

Cryptographic-Speech-Key Generation Architecture Improvements.
Proceedings of the Pattern Recognition and Image Analysis, Second Iberian Conference, 2005

Tool-Wear Monitoring Based on Continuous Hidden Markov Models.
Proceedings of the Progress in Pattern Recognition, 2005

Phoneme Spotting for Speech-Based Crypto-key Generation.
Proceedings of the Progress in Pattern Recognition, 2005

Spoken information retrieval for multimedia databases.
Proceedings of the 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), 2005

An ontology-based multiagent approach to outbound intrusion detection.
Proceedings of the 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), 2005

Multi-speaker voice cryptographic key generation.
Proceedings of the 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), 2005

2004
Cryptographic-Speech-Key Generation Using the SVM Technique over the lp-Cepstral Speech Space.
Proceedings of the Nonlinear Speech Modeling and Applications, 2004

N-Best List Rescoring Using Syntactic Trigrams.
Proceedings of the MICAI 2004: Advances in Artificial Intelligence, 2004

On the Use of Automatic Speech Recognition for Spoken Information Retrieval from Video Databases.
Proceedings of the Progress in Pattern Recognition, 2004

Speaker Verification Using Coded Speech.
Proceedings of the Progress in Pattern Recognition, 2004

SVM Applied to the Generation of Biometric Speech Key.
Proceedings of the Progress in Pattern Recognition, 2004

2003
Creating a Mexican Spanish Version of the CMU Sphinx-III Speech Recognition System.
Proceedings of the Progress in Pattern Recognition, 2003

1994
Continuous speech recognition in noise using spectral subtraction and HMM adaptation.
Proceedings of ICASSP '94: IEEE International Conference on Acoustics, 1994

1993
Adapting a HMM-based recogniser for noisy speech enhanced by spectral subtraction.
Proceedings of the Third European Conference on Speech Communication and Technology, 1993


  Loading...