Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Integrative System for Deep Packet Inspection and Network Anomaly Detection amp; Defense, , , , and . Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on, page 1-4. (2011)Rotation Invariant Texture Descriptor Using Local Shearlet-Based Energy Histograms., , and . IEEE Signal Process. Lett., 20 (9): 905-908 (2013)Indutivo: Contact-Based, Object-Driven Interactions with Inductive Sensing., , , , and . UIST, page 321-333. ACM, (2018)A Kernel Matching Pursuit Approach to Man-Made Objects Detection in Aerial Images., , and . IbPRIA (2), volume 4478 of Lecture Notes in Computer Science, page 507-514. Springer, (2007)Monitoring Freeze Injury and Evaluating Losing to Sugar-Cane Using RS and GPS., , , , and . CCTA (1), volume 293 of IFIP Advances in Information and Communication Technology, page 307-316. Springer, (2008)Three-Dimensional Numerical Analysis and Optimization of Electromagnetic Suspension System for 200 km/h Maglev Train Considering Eddy Current Effect., , , and . IEEE Access, (2018)Face Recognition Using Direct-Weighted LDA., and . PRICAI, volume 3157 of Lecture Notes in Computer Science, page 760-768. Springer, (2004)Real-time and multimodal brain slice-to-volume registration using CNN., , , , , , and . Expert Syst. Appl., (2019)Constrained quantization algorithm for color images., , and . ICIP (1), page 910-913. IEEE, (2001)Multi-scale block local ternary patterns for fingerprints vitality detection., , , , , , and . ICB, page 1-6. IEEE, (2013)