Author of the publication

Image Analysis-Based Automatic Detection of Transmission Towers using Aerial Imagery.

, , , and . IbPRIA, volume 9117 of Lecture Notes in Computer Science, page 641-651. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Expander-like Codes based on Finite Projective Geometry, , , and . CoRR, (2012)Development of design guidelines using probabilistic framework for the development of smart thickening fluid based ultra resistant adaptive kinematic soft human armor (SURAKSHA)., , , , and . Reliab. Eng. Syst. Saf., (August 2023)Probabilistic demand models and reliability based code calibration for reinforced concrete column and beam subjected to blast loading., , and . Reliab. Eng. Syst. Saf., (December 2023)Probabilistic demand models and performance-based fragility estimates for concrete protective structures subjected to missile impact., , , and . Reliab. Eng. Syst. Saf., (2022)A Chronological Survey of Theoretical Advancements in Generative Adversarial Networks for Computer Vision.. CoRR, (2023)A Novel Cognitive Cycle for Fault Diagnosis in Infrastructural Systems., , and . KES, volume 112 of Procedia Computer Science, page 604-613. Elsevier, (2017)A Quantum-Classical Hybrid Method for Image Classification and Segmentation., , , , , , , , , and 1 other author(s). SEC, page 450-455. IEEE, (2022)Power infrastructure monitoring and damage detection using drone captured images., , , and . IJCNN, page 1681-1687. IEEE, (2017)A Design Methodology for Folded, Pipelined Architectures in VLSI Applications using Projective Space Lattices, and . CoRR, (2011)A Real-Time Framework for Detection of Long Linear Infrastructural Objects in Aerial Imagery., , , and . ICIAR, volume 9164 of Lecture Notes in Computer Science, page 71-81. Springer, (2015)