Author of the publication

Handwriting Recognition Applications for Tablet PCs.

, , and . J. Adv. Comput. Intell. Intell. Informatics, 11 (7): 787-792 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Random Number Generators Basedon EEG Non-linear and ChaoticCharacteristics., , , and . J. Cyber Secur. Mobil., 6 (3): 305-338 (2017)A Novel Machine Learning Approach for Detecting the Brain Abnormalities from MRI Structural Images., , and . PRIB, volume 7632 of Lecture Notes in Computer Science, page 94-105. Springer, (2012)Determinants of Intention to Use Mobile Value Added Services: The Case of Women-Owned Micro Enterprises in Fiji., , , , and . PACIS, page 1. (2015)A Synthetic Method for Wafer Character Recognition., , , and . IMECS, page 1936-1938. Newswood Limited, (2007)A Multiple Agents Based Intrusion Detection System., and . KES (1), volume 3681 of Lecture Notes in Computer Science, page 205-211. Springer, (2005)Dynamic window with fuzzy controller in wireless sensor networks for elliptic curve cryptography., , and . FUZZ-IEEE, page 2342-2349. IEEE, (2011)A Study of the Radial Basis Function Neural Network Classifiers Using Known Data of Varying Accuracy and Complexity., , and . KES, volume 3215 of Lecture Notes in Computer Science, page 210-216. Springer, (2004)A Multi-agent Framework for .NET., and . KES (1), volume 3681 of Lecture Notes in Computer Science, page 219-225. Springer, (2005)Traffic Offloading 3-Tiered SDN Architecture for DenseNets., , , and . IEEE Netw., 31 (3): 56-62 (2017)Real-Valued Constraint Optimization with ICHEA., and . ICONIP (3), volume 7665 of Lecture Notes in Computer Science, page 406-416. Springer, (2012)