Author of the publication

Table structure recognition using black widow based mutual exclusion and RESNET attention model.

, and . J. Intell. Fuzzy Syst., 46 (1): 1101-1114 (January 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CDIS: Circle Density Based Iris Segmentation., , , and . IC3, volume 40 of Communications in Computer and Information Science, page 295-306. Springer, (2009)Text Summarisation Using Laplacian Centrality-Based Minimum Vertex Cover., and . J. Inf. Knowl. Manag., 18 (4): 1950050:1-1950050:20 (2019)Hybrid Cloud Support for Large Scale Analytics and Web Processing., , , , and . WebApps, page 39-50. USENIX Association, (2012)Mining Regular Patterns in Weighted-Directed Networks., , and . ICIT, page 215-220. IEEE, (2014)Malafide Intension Based Detection of Privacy Violation in Information System., , and . ICISS, volume 4332 of Lecture Notes in Computer Science, page 365-368. Springer, (2006)CDIA-DS: A framework for efficient reconstruction of compound document image using data structure., , , and . IC3, page 1-7. IEEE Computer Society, (2016)Preserving Obliviousness Characteristic of Honeypot database., , , , and . COMAD, page 72-79. Tata McGraw-Hill Publishing Company Limited, (2006)Stochastic Simulation Service: Bridging the Gap between the Computational Expert and the Biologist., , , , , , , , , and 7 other author(s). PLoS Comput. Biol., (2016)Evolution of regular directed patterns in dynamic social networks., , and . ICACCI, page 1466-1471. IEEE, (2014)DGW-canny: An improvised version of Canny edge detector., , , and . ISPACS, page 1-6. IEEE, (2011)