Keijo Haataja

According to our database1, Keijo Haataja authored at least 36 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Efficiency Meets Accuracy: Benchmarking Object Detection Models for Pathology Detection in Wireless Capsule Endoscopy.
IEEE Access, 2024

2023
Convolutional neural networks for real-time wood plank detection and defect segmentation.
F1000Research, 2023

A novel deep learning method for recognizing texts printed with multiple different printing methods.
F1000Research, 2023

2022
Recent advancements in machine vision methods for product code recognition: A systematic review.
F1000Research, 2022

Real-time defect detection and classification on wood surfaces using deep learning.
Proceedings of the Image Processing: Algorithms and Systems XX, 2022

2021
Proposal of a novel Artificial Intelligence Distribution Service platform for healthcare.
F1000Research, 2021

AI in healthcare: A narrative review.
F1000Research, 2021

An Overview of IoT-Based Architecture Model for Smart Home Systems.
Proceedings of the Intelligent Systems Design and Applications, 2021

Investigating Drug Peddling in Nigeria Using a Machine Learning Approach.
Proceedings of the Intelligent Systems Design and Applications, 2021

Text Recognition of Cardboard Pharmaceutical Packages by Utilizing Machine Vision.
Proceedings of the Image Processing: Algorithms and Systems XIX, 2021

State-of-the-Art Techniques in Artificial Intelligence for Continual Learning: A Review.
Proceedings of the Position and Communication Papers of the 16th Conference on Computer Science and Intelligence Systems, 2021

2020
Survey to healthcare professionals on the practicality of AI services for healthcare.
F1000Research, 2020

2017
Three main paradigms of simultaneous localization and mapping (SLAM) problem.
Proceedings of the Tenth International Conference on Machine Vision, 2017

2016
Nuclei Malignancy Analysis Based on an Adaptive Bottom-Hat Filter.
Proceedings of the Intelligent Systems Design and Applications, 2016

2015
Systematic Literature Review on Empirical Results and Practical Implementations of Healthcare Recommender Systems: Lessons Learned and a Novel Proposal.
Int. J. Heal. Inf. Syst. Informatics, 2015

Current analysis approaches and performance needs for whole slide image processing in breast cancer diagnostics.
Proceedings of the 2015 International Conference on Embedded Computer Systems: Architectures, 2015

Morphological extraction of cancerous nucleus in the diagnostics of breast cancer.
Proceedings of the 15th International Conference on Intelligent Systems Design and Applications, 2015

Optimized curve design for image analysis using localized geodesic distance transformations.
Proceedings of the Image Processing: Algorithms and Systems XIII, 2015

Adaptive Methods for Managing Heterogeneity in Smart Spaces.
Proceedings of the Internet of Things. IoT Infrastructures, 2015

2014
Mobile Health Applications: A Comparative Analysis and a Novel Mobile Health Platform.
Proceedings of the Sensor Systems and Software - 5th International Conference, 2014

Design of a Novel Adaptive Indoor Air Quality Control for Co-learning Smart House.
Proceedings of the Sensor Systems and Software - 5th International Conference, 2014

Computer-aided breast cancer histopathological diagnosis: Comparative analysis of three DTOCS-based features: SW-DTOCS, SW-WDTOCS and SW-3-4-DTOCS.
Proceedings of the 4th International Conference on Image Processing Theory, 2014

Three practical attacks against ZigBee security: Attack scenario definitions, practical experiments, countermeasures, and lessons learned.
Proceedings of the 14th International Conference on Hybrid Intelligent Systems, 2014

Computer-assisted image analysis of histopathological breast cancer images using step-DTOCS.
Proceedings of the 14th International Conference on Hybrid Intelligent Systems, 2014

2013
Bluetooth Security Attacks - Comparative Analysis, Attacks, and Countermeasures.
Springer Briefs in Computer Science, Springer, ISBN: 978-3-642-40646-1, 2013

Wireless indoor tracking of livestock for behavioral analysis.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Towards more accurate and intelligent recommendation systems.
Proceedings of the 13th International Conference on Intellient Systems Design and Applications, 2013

3D imaging of human brain in the diagnostics of insomnia and depression: A comparative analysis, a novel insomnia/depression diagnostics approach, and lessons learned.
Proceedings of the 13th International Conference on Intellient Systems Design and Applications, 2013

A novel recommendation system approach utilizing social network profiles.
Proceedings of the 13th International Conference on Hybrid Intelligent Systems, 2013

Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2010
Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures.
IEEE Trans. Wirel. Commun., 2010

New Efficient RF Fingerprint-Based Security Solution for Bluetooth Secure Simple Pairing.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
Designing and Implementing an Embedded Linux for Limited Resource Devices.
Proceedings of the Eighth International Conference on Networks, 2009

2008
New efficient intrusion detection and prevention system for Bluetooth networks.
Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, 2008

Further Classification of Bluetooth-Enabled Ad-Hoc Networks Depending on a Risk Analysis within Each Classified Group.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

2006
An Open, PKI-Based Mobile Payment System.
Proceedings of the Emerging Trends in Information and Communication Security, 2006


  Loading...