Author of the publication

Computer-aided differential diagnosis of pulmonary nodules based on a hybrid classification approach.

, , , , , , , , , and . Medical Imaging: Image Processing, volume 4322 of SPIE Proceedings, SPIE, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Implementation of a Cognitive User-Support System for Skin Progress Analysis Using a Smart Phone., and . Int. J. Softw. Sci. Comput. Intell., 5 (1): 51-62 (2013)Internal Structure Analysis of Pulmonary Nodules in Topological and Histogram Feature Spaces., , , , , , , , , and . ICIP, page 168-171. IEEE, (2000)Automatic extraction of pulmonary fissures from multidetector-row CT images., , , , , , , , , and 1 other author(s). ICIP (3), page 1091-1094. IEEE, (2001)Surrounding Structures Analysis of Pulmonary Nodules Using Differential Geometry Based Vector Fields ., , , , , , , , , and . ICIP, page 424-427. IEEE, (2000)Classification of Pulmonary Nodules in Thin-Section CT Images by Using Multi-Scale Curvature Indexes., , , , , , , , , and . ICIP (2), page 197-201. IEEE, (1999)Three-dimensional CT image retrieval in a database of pulmonary nodules., , , , , , , , , and . ICIP (3), page 149-152. IEEE, (2002)Analysis of evolving processes in pulmonary nodules using a sequence of three-dimensional thoracic images., , , , , , , , , and . Medical Imaging: Image Processing, volume 4322 of SPIE Proceedings, SPIE, (2001)A visual data-mining approach using 3D thoracic CT images for classification between benign and malignant pulmonary nodules., , , , , , , , , and 1 other author(s). Medical Imaging: Image Processing, volume 5032 of SPIE Proceedings, SPIE, (2003)Collaboration Between Robotic Agents at the Smart Office., , , and . Agents, page 362-363. ACM, (1999)Design and Implementation of Security System Based on Immune System., and . ISSS, volume 2609 of Lecture Notes in Computer Science, page 234-248. Springer, (2002)