Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Obstacle Detection Algorithm for Railroad-Road Crossings Based on Video Stream Analysis., and . KES, volume 225 of Procedia Computer Science, page 1552-1561. Elsevier, (2023)Uncertainty in the Conjunctive Approach to Fuzzy Inference.. Int. J. Appl. Math. Comput. Sci., 31 (3): 431-444 (2021)A Linear-complexity Multi-biometric Forensic Document Analysis System, by Fusing the Stylome and Signature Modalities., , , , , , , , , and . CoRR, (2019)Computer User Verification Based on Mouse Activity Analysis., , and . New Trends in Intelligent Information and Database Systems, volume 598 of Studies in Computational Intelligence, Springer, (2015)A new approach to signature recognition using the fuzzy method., and . Pattern Anal. Appl., 17 (3): 451-463 (2014)Fuzzy System for Lip Print Identification., and . CORES/IP&C/ACS, volume 255 of Lecture Notes in Networks and Systems, page 97-106. Springer, (2021)Practical aspects of equivalence of Baldwin's and Zadeh's fuzzy inference., and . J. Intell. Fuzzy Syst., 40 (3): 4617-4636 (2021)Online signature verification modeled by stability oriented reference signatures., , and . Inf. Sci., (2018)Fuzzy approach for intrusion detection based on user's commands., , and . Soft Comput., 20 (7): 2705-2719 (2016)