Author of the publication

Similar pair identification using locality-sensitive hashing technique.

, and . SCIS&ISIS, page 2117-2119. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pathway Retrieval for Transcriptome Analysis using Fuzzy Filtering Technique andWeb Service., and . Int. J. Fuzzy Log. Intell. Syst., 12 (2): 167-172 (2012)Dynamic correlations between heart and brain rhythm during Autogenic meditation, , , , and . Frontiers in Human Neuroscience, (2013)A preference scoring technique for personalized advertisements on Internet storefronts., , , , , and . Math. Comput. Model., 44 (1-2): 3-15 (2006)Object Modeling of RDF Schema for Converting UML Class Diagram., , , and . ICCSA (2), volume 3481 of Lecture Notes in Computer Science, page 31-41. Springer, (2005)Machine-part grouping for cellular manufacturing systems: a neural network approach., , and . KES (2), page 575-580. IEEE, (1997)0-7803-3755-7.A genetic algorithm for general machine scheduling problems., , and . KES (2), page 60-66. IEEE, (1998)Remote data integrity check for remotely acquired and stored stream data., , and . J. Supercomput., 74 (3): 1182-1201 (2018)Similar pair identification using locality-sensitive hashing technique., and . SCIS&ISIS, page 2117-2119. IEEE, (2012)Supervised Learning-Based Feature Selection for Mondrian Paintings Style Authentication., , , , , and . J. Adv. Comput. Intell. Intell. Informatics, 16 (7): 894-899 (2012)Verification of Frequently Used Korean Handwritten Characters Through Artificial Intelligence., , , and . IHCI (1), volume 12615 of Lecture Notes in Computer Science, page 223-228. Springer, (2020)