Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Quantification of Epidermis Curvature in H&E Stained Microscopic Skin Image of Mice., , and . MIUA, volume 723 of Communications in Computer and Information Science, page 935-945. Springer, (2017)Exploiting Relative Entropy and Quality Analysis in Cumulative Partial Biometric Fusion., , , and . Trans. Data Hiding Multim. Secur., (2012)SLDPC: Towards Second Order Learning for Detecting Persistent Clusters in Data Streams., , and . CEEC, page 248-253. IEEE, (2018)TPICDS: A Two-Phase Parallel Approach for Incremental Clustering of Data Streams., , and . Euro-Par Workshops, volume 11339 of Lecture Notes in Computer Science, page 5-16. Springer, (2018)Guest Editorial Introduction to the Special Issue on Pattern Recognition Technologies for Anti-Terrorism Applications., , , , , and . IEEE Trans. Syst. Man Cybern. Part C, 41 (5): 561-564 (2011)A MATLAB tool for pathway enrichment using a topology-based pathway regulation score., , , and . BMC Bioinform., (2014)Security evaluation of biometric keys., and . Comput. Secur., 31 (2): 151-163 (2012)Singular value decomposition based matrix surgery., and . CoRR, (2023)Controlling Sensitivity of Gaussian Bayes Predictions based on Eigenvalue Thresholding., , and . EAI Endorsed Trans. Ind. Networks Intell. Syst., 5 (16): e1 (2018)Rational Identification of Prognostic Markers of Breast Cancer., , , , , and . BIOINFORMATICS, page 265-270. SciTePress, (2014)