Author of the publication

Fingerprint Recognition Based on Minutes Groups Using Directing Attention Algorithms.

, and . ICAISC (2), volume 7268 of Lecture Notes in Computer Science, page 347-354. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Functional hierarchy for tactile processing in the visual cortex of sighted adults., , , , , , , , and . NeuroImage, (2019)Functional reorganization of the reading network in the course of foreign language acquisition., , , , , , , , , and . NeuroImage, (2021)Security of Mobile Banking Applications., and . DPS, volume 635 of Advances in Intelligent Systems and Computing, page 412-419. Springer, (2017)Analysis of Blockchain Selfish Mining Attacks., , , and . ISAT (1), volume 1050 of Advances in Intelligent Systems and Computing, page 231-240. Springer, (2019)Progressive Mobile Web Application Subresource Tampering During Penetration Testing., , , , , and . AINA (1), volume 225 of Lecture Notes in Networks and Systems, page 297-306. Springer, (2021)Fingerprint Recognition Based on Minutes Groups Using Directing Attention Algorithms., and . ICAISC (2), volume 7268 of Lecture Notes in Computer Science, page 347-354. Springer, (2012)Data Management for Fingerprint Recognition Algorithm Based on Characteristic Points' Groups., and . ADBIS Workshops, volume 185 of Advances in Intelligent Systems and Computing, page 425-432. Springer, (2012)Learning about threat from friends and strangers is equally effective: An fMRI study on observational fear conditioning., , , , , , , and . NeuroImage, (2022)State Management and Software Architecture Approaches in Cross-platform Flutter Applications., and . ENASE, page 407-414. SCITEPRESS, (2020)Security Lock System for Mobile Devices Based on Fingerprint Recognition Algorithm., , , and . ISAT (3), volume 431 of Advances in Intelligent Systems and Computing, page 25-35. Springer, (2015)