Satria Mandala

Orcid: 0000-0001-6997-5875

According to our database1, Satria Mandala authored at least 16 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Real-Time End-to-End Framework with a Stacked Model Using Ultrasound Video for Cardiac Septal Defect Decision-Making.
J. Imaging, 2024

2023
Automatic echocardiographic anomalies interpretation using a stacked residual-dense network model.
BMC Bioinform., December, 2023

Enhanced Myocardial Infarction Identification in Phonocardiogram Signals Using Segmented Feature Extraction and Transfer Learning-Based Classification.
IEEE Access, 2023

2022
Advances in computer-human interaction for detecting facial expression using dual tree multi band wavelet transform and Gaussian mixture model.
Neural Comput. Appl., 2022

2021
Accurate computing of facial expression recognition using a hybrid feature extraction technique.
J. Supercomput., 2021

2018
Carbon Nanotube-Coated Thread as Sensor for Wearable Mechanomyography of Leg Muscles.
Proceedings of the 2018 IEEE SENSORS, New Delhi, India, October 28-31, 2018, 2018

2017
BRAIN-F: Beacon Rate Adaption Based on Fuzzy Logic in Vehicular Ad Hoc Network.
Int. J. Fuzzy Syst., 2017

An UHD video handling system using a scalable server over an IP network.
Int. J. Adv. Media Commun., 2017

2016
Towards next-generation routing protocols for pocket switched networks.
J. Netw. Comput. Appl., 2016

2015
Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks.
Int. J. Embed. Syst., 2015

QoS-aware ant-based route, wavelength and timeslot assignment algorithm for optical burst switched networks.
Trans. Emerg. Telecommun. Technol., 2015

Trust management in vehicular ad hoc network: a systematic review.
EURASIP J. Wirel. Commun. Netw., 2015

2014
Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks.
Proceedings of the Security in Computing and Communications, 2014

Performance Comparison of Popular Routing Algorithms in Pocket Switched Networks.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2014

Pre-processing image database for efficient Content Based Image Retrieval.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

2010
A Variant of Merkle Signature Scheme to Protect AODV Routing Protocol.
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2010


  Loading...