Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A face authentication system using the trace transform., , , and . Pattern Anal. Appl., 8 (1-2): 50-61 (2005)A hybrid method for facial recognition systems., , and . CIMSIVP, page 53-60. IEEE, (2009)Comparing nonlinear inertia weights and constriction factors in particle swarm optimization., and . KES Journal, 15 (2): 65-70 (2011)Face Authentication using the Trace Transform., , , and . CVPR (1), page 305-312. IEEE Computer Society, (2003)An Efficient Algorithm for Face Detection in Color Images., and . JCIS, page 688-691. JCIS / Association for Intelligent Machinery, Inc., (2002)Facial Recognition using Hausdorff- Shape- Radon Transform., and . JDCTA, 3 (2): 67-74 (2009)New robust Hausdorff distance-based face detection., and . ICIP (1), page 1022-1025. IEEE, (2001)An analysis of software process improvement for sustainable development in Thailand., and . CIT, page 724-729. IEEE Computer Society, (2008)Cluster-based KNN missing value imputation for DNA microarray data., , and . SMC, page 445-450. IEEE, (2012)An Improved Golden Ball Algorithm for the Capacitated Vehicle Routing Problem., , and . BIC-TA, volume 472 of Communications in Computer and Information Science, page 341-356. Springer, (2014)