From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An image encryption approach based on chaotic maps, , и . Chaos, Solitons & Fractals, 24 (3): 759--765 (мая 2005)Depth Perception Using a Monocular Vision System., и . ICONIP (1), том 5506 из Lecture Notes in Computer Science, стр. 779-786. Springer, (2008)窃听攻击下子空间码的安全性 (Security of Subspace Code against Wiretap Attacks)., и . 计算机科学, 44 (Z6): 372-376 (2017)Anlysis and Design of Activity Degree Monitoring Algorithm., , , , , и . CloudCom, стр. 362-366. IEEE, (2019)Copy-move forgery detection based on compact color content descriptor and Delaunay triangle matching., , , , и . Multimedia Tools Appl., 78 (2): 2311-2344 (2019)Estimation of Mobile Robot Ego-Motion and Obstacle Depth Detection by Using Optical Flow., , и . SMC, стр. 1770-1775. IEEE, (2009)Robust Variational Optical Flow Algorithm Based on Rolling Guided Filtering., , , и . CISP-BMEI, стр. 1-6. IEEE, (2018)Analysis on the diffusion of RFID technological innovation from the perspective of disruptive innovation., , и . Technol. Anal. Strateg. Manag., 36 (2): 223-237 (февраля 2024)Weibull statistical modeling for textured image retrieval using nonsubsampled contourlet transform., , , , , и . Soft Comput., 23 (13): 4749-4764 (2019)A New Image Protection and Authentication Technique Based on ICA., , и . ISNN (1), том 3496 из Lecture Notes in Computer Science, стр. 991-996. Springer, (2005)