Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Erratum to: Tomographic reconstruction of asymmetric soot structure from multi-angular scanning., , and . J. Vis., 7 (3): 263 (2004)An Efficient Adaptive Feedback Cancellation for Hearing Aids., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (9): 2446-2450 (2005)Neurofeedback Training with Virtual Reality for Inattention and Impulsiveness., , , , , , and . Cyberpsy., Behavior, and Soc. Networking, 7 (5): 519-526 (2004)Collision Avoiding Navigation of Marine Vehicles Using Fuzzy Logic., , and . Int. J. Fuzzy Log. Intell. Syst., 2 (2): 100-108 (2002)pp-wave / Yang-Mills correspondence: An explicit check, , , and . Nucl. Phys., (2002)Hybrid Airway Segmentation Using Multi-Scale Tubular Structure Filters and Texture Analysis on 3D Chest CT Scans., , , , and . J. Digit. Imaging, 32 (5): 779-792 (2019)Lung Segmentation on HRCT and Volumetric CT for Diffuse Interstitial Lung Disease Using Deep Convolutional Neural Networks., , , , and . J. Digit. Imaging, 32 (6): 1019-1026 (2019)Swarm Processor System: hardware process scheduler based energy efficient multi-core system., , , and . IEICE Electron. Express, 11 (14): 20140424 (2014)Optimal number of strong labels for curriculum learning with convolutional neural network to classify pulmonary abnormalities in chest radiographs., , , , , and . Comput. Biol. Medicine, (2021)Quantitative intrusion intensity assessment for intrusion detection systems., , , and . Secur. Commun. Networks, 5 (10): 1199-1208 (2012)