Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Histo-pathological image analysis using OS-FCM and level sets., , , and . AIPR, page 1-8. IEEE Computer Society, (2010)Automatic bank check processing and authentication using signature verification. University of Queensland, Australia, (2006)Off-Line Signature Verification and Forgery Detection System Based on Fuzzy Modeling., , , and . Australian Conference on Artificial Intelligence, volume 2903 of Lecture Notes in Computer Science, page 1003-1013. Springer, (2003)A Context Space Model for Detecting Anomalous Behaviour in Video Surveillance., , , and . ITNG, page 18-24. IEEE Computer Society, (2012)Input Fuzzy Modeling for the Recognition of Handwritten Hindi Numerals., , , and . ITNG, page 208-213. IEEE Computer Society, (2007)An Abandoned Object Detection System Based on Dual Background Segmentation., , , , and . AVSS, page 352-357. IEEE Computer Society, (2009)An in Depth Comparison of Four Texture Segmentation Methods., and . DICTA, page 366-372. IEEE Computer Society, (2007)Cluster-Weighted Modeling as a basis for Fuzzy Modeling., , and . ITCC, page 627-634. IEEE Computer Society, (2003)Mixed Noise Correction in Gray Images using Fuzzy Filters., , , and . ITNG, page 547-553. IEEE Computer Society, (2006)Fusion of Hand Based Biometrics Using Particle Swarm Optimization., , , and . ITNG, page 783-788. IEEE Computer Society, (2008)