Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Approach to Identify Big Rocks with Applications to the Mining Industry., , and . Real Time Imaging, 8 (1): 1-9 (2002)Deep Learning-Based Gender Classification by Training With Fake Data., , , , , and . IEEE Access, (2023)Wireless In-Vehicle Compliant Black Box: For Accident Analysis., , , and . IEEE Veh. Technol. Mag., 7 (3): 80-89 (2012)Combination and Selection of Traffic Safety Expert Judgments for the Prevention of Driving Risks., , , , and . Sensors, 12 (11): 14711-14729 (2012)Face Recognition in Uncontrolled Environments, Experiments in an Airport., , and . ICETE (Selected Papers), volume 314 of Communications in Computer and Information Science, page 20-32. Springer, (2011)PCA vs low resolution images in face verification., , and . ICIAP, page 63-67. IEEE Computer Society, (2003)Accident reproduction system for the identification of human factors involved on traffic accidents., , , and . Intelligent Vehicles Symposium, page 987-992. IEEE, (2012)Optimal experts' knowledge selection for intelligent driving risk detection systems., , , and . Intelligent Vehicles Symposium, page 896-901. IEEE, (2012)Automatic 3D Face Feature Points Extraction with Spin Images., , and . ICIAR (2), volume 4142 of Lecture Notes in Computer Science, page 317-328. Springer, (2006)Comparison of Novel Dimension Reduction Methods in Face Verification., , and . ICIAR (2), volume 4142 of Lecture Notes in Computer Science, page 305-316. Springer, (2006)