Author of the publication

Biometric Access Control with High Dimensional Facial Features.

, , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 437-445. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real time mobile application of in-air signature with Fast Dynamic Time Warping (FastDTW)., , , and . ICSIPA, page 315-320. IEEE, (2015)Face recognition via semi-supervised discriminant local analysis., , , and . ICSIPA, page 292-297. IEEE, (2015)Biometric Access Control with High Dimensional Facial Features., , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 437-445. Springer, (2016)A Pilot Study of Learning Programming with ScratchJr., , , , , and . FICC (1), volume 651 of Lecture Notes in Networks and Systems, page 785-793. Springer, (2023)Modified TPACK Framework for Teachers' Efficiency, Students' Performance and Students' Engagement., , and . ICICT (1), volume 235 of Lecture Notes in Networks and Systems, page 827-835. Springer, (2021)Anomaly Based Intrusion Detection through Temporal Classification., , and . ICONIP (3), volume 8836 of Lecture Notes in Computer Science, page 612-619. Springer, (2014)An IKEv2-based Approach for Remote Access VPN on MikroTik Router., , and . J. Inf. Sci. Eng., 40 (5): 1093-1114 (September 2024)Video and voice transmission over LTE networks., , , and . ICCSCE, page 259-263. IEEE, (2013)A Secure Touch-less based Fingerprint Verification System., , , and . Journal of WSCG, 18 (1-3): 1-8 (2010)Application of Bayesian belief networks and fuzzy cognitive maps in intrusion analysis., , , , and . J. Intell. Fuzzy Syst., 35 (1): 111-122 (2018)