Author of the publication

An improved algorithm for fingerprint image enhancement.

, , , , and . SIP, page 543-547. IASTED/ACTA Press, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improved algorithm for fingerprint image enhancement., , , , and . SIP, page 543-547. IASTED/ACTA Press, (2005)A novel nondominated sorting simplified swarm optimization for multi-stage capacitated facility location problems with multiple quantitative and qualitative objectives., , , and . Appl. Soft Comput., (2019)Leveraging Social Norms and Implementation Intentions for Better Health., , , and . ICSH, volume 10347 of Lecture Notes in Computer Science, page 3-14. Springer, (2017)The Dark Side of Positive Social Influence., , and . ICIS, Association for Information Systems, (2016)Comparison between different screening strategies to determine the statistical shape model of the pelvises for implant design., , , , , and . Comput. Methods Programs Biomed., (2019)An Emperical Study of End User Computing Strategy in Promoting the Nursing Informatics in Taiwan., , , and . Nursing Informatics, volume 146 of Studies in Health Technology and Informatics, page 641-645. IOS Press, (2009)Surrsound., , and . ICMC, Michigan Publishing, (2012)Multisensor integrated stair recognition and parameters measurement system for dynamic stair climbing robots., , and . CASE, page 318-323. IEEE, (2013)Centralized IT Decision Making and Cybersecurity Breaches: Evidence from U.S. Higher Education Institutions., , and . J. Manag. Inf. Syst., 37 (3): 758-787 (2020)DIBR with content-adaptive filtering for 3D view., , , , , , and . ICCE-TW, page 245-246. IEEE, (2014)