Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An investigation into the properties of the dark endmember in spectral feature space., and . IGARSS, page 3575-3578. IEEE, (2005)ID-Based Authenticated Group Key Agreement Secure against Insider Attacks., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (7): 1828-1830 (2008)Shrink-Wrapped Isosurface from Cross Sectional Images., and . IEICE Trans. Inf. Syst., 90-D (12): 2070-2076 (2007)Genetic programming based blind image deconvolution for surveillancesystems., , , and . Eng. Appl. Artif. Intell., 26 (3): 1115-1123 (2013)An algorithm for optimal isomorphism between two random graphs., , , and . Pattern Recognit. Lett., 15 (4): 321-327 (1994)FPGA Acceleration of Probabilistic Sentential Decision Diagrams with High-level Synthesis., , , , and . ACM Trans. Reconfigurable Technol. Syst., 16 (2): 18:1-18:22 (June 2023)Optical Harmonic Modulation-Demodulation Techniques for High-Speed Light wave Transmission.. J. Inform. and Commun. Convergence Engineering, 6 (2): 192-197 (2008)Super-High Speed Photo detection through Frequency Conversion for Microwave on Optical Network., and . J. Inform. and Commun. Convergence Engineering, 6 (4): 439-443 (2008)A new provably secure certificateless short signature scheme., , and . Comput. Math. Appl., 61 (7): 1760-1768 (2011)Single image defocus blur segmentation using Local Ternary Pattern., , and . ICT Express, 6 (2): 113-116 (2020)