Author of the publication

K-means based multiple objects tracking with long-term occlusion handling.

, , , , and . IET Comput. Vis., 11 (1): 68-77 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Product Recommendation Method for Collaborative Filtering., , , , and . IEEE Access, (2020)An efficient forensic technique for exposing region duplication forgery in digital images., , , and . Appl. Intell., 48 (7): 1791-1801 (2018)Single and multiple regions duplication detections in digital images with applications in image forensic., , , , , , , and . J. Intell. Fuzzy Syst., 40 (6): 10351-10371 (2021)A 4-Stage Pipelined Architecture for Point Multiplication of Binary Huff Curves., , , and . J. Circuits Syst. Comput., 29 (11): 2050179:1-2050179:28 (2020)A Machine-Learning-Based Approach for Autonomous IoT Security., , , , , and . IT Prof., 23 (3): 69-75 (2021)K-means based multiple objects tracking with long-term occlusion handling., , , , and . IET Comput. Vis., 11 (1): 68-77 (2017)Saliency Based Object Detection and Enhancements in Static Images., , , , , , and . ICISA, volume 424 of Lecture Notes in Electrical Engineering, page 114-123. Springer, (2017)Steganography-assisted secure localization of smart devices in internet of multimedia things (IoMT)., , , , , , and . Multim. Tools Appl., 80 (11): 17045-17065 (2021)A robust technique for copy-move forgery detection and localization in digital images via stationary wavelet and discrete cosine transform., , , and . J. Vis. Commun. Image Represent., (2018)GCORP: Geographic and Cooperative Opportunistic Routing Protocol for Underwater Sensor Networks., , , , , , and . IEEE Access, (2021)