Author of the publication

Enhanced Image Segmentation Using Quality Threshold Clustering for Surface Defect Categorisation in High Precision Automotive Castings.

, , , , , and . SOCO-CISIS-ICEUTE, volume 239 of Advances in Intelligent Systems and Computing, page 191-200. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Behaviour-based Analysis and Classification System for Malware Detection., , , , and . ICEIS (2), page 395-399. SciTePress, (2010)SME Maturity, Requirement for Interoperability., and . IESA, page 29-40. Springer, (2008)Sentiment analysis using convolutional neural network with fastText embeddings., , and . LA-CCI, page 1-5. IEEE, (2017)Anomaly-based Spam Filtering., , , , and . SECRYPT, page 5-14. SciTePress, (2011)Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies., , and . USENIX Security Symposium, page 679-694. USENIX Association, (2017)Opcode-Sequence-Based Semi-supervised Unknown Malware Detection., , , , and . CISIS, volume 6694 of Lecture Notes in Computer Science, page 50-57. Springer, (2011)Combination of Machine-Learning Algorithms for Fault Prediction in High-Precision Foundries., , and . DEXA (2), volume 7447 of Lecture Notes in Computer Science, page 56-70. Springer, (2012)Tutorial 4: Adopting SOA., , and . ICCBSS, page 12. IEEE Computer Society, (2008)Negobot: A Conversational Agent Based on Game Theory for the Detection of Paedophile Behaviour., , , , , and . CISIS/ICEUTE/SOCO Special Sessions, volume 189 of Advances in Intelligent Systems and Computing, page 261-270. Springer, (2012)Anomaly Detection Using String Analysis for Android Malware Detection., , , , , and . SOCO-CISIS-ICEUTE, volume 239 of Advances in Intelligent Systems and Computing, page 469-478. Springer, (2013)