Author of the publication

Feature Extraction from Tumor Gene Expression Profiles Using DCT and DFT.

, , , and . EPIA Workshops, volume 4874 of Lecture Notes in Computer Science, page 485-496. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unknown Malicious Codes Detection Based on Rough Set Theory and Support Vector Machine., , , , and . IJCNN, page 2583-2587. IEEE, (2006)A Novel Approach to Mobile Positioning Tracking., , and . ICYCS, page 498-503. IEEE Computer Society, (2008)New Malicious Code Detection Based on N-Gram Analysis and Rough Set Theory., , , , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 626-633. Springer, (2006)Molecular Diagnosis of Tumor Based on Independent Component Analysis and Support Vector Machines., , , , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 46-56. Springer, (2006)Minimization of the Redundant Sensor Nodes in Dense Wireless Sensor Networks., , , , and . ICES, volume 4684 of Lecture Notes in Computer Science, page 355-367. Springer, (2007)Network Security Situation Assessment Based on HMM., , , , , and . ICIC (2), volume 6839 of Lecture Notes in Computer Science, page 387-394. Springer, (2011)Feature Extraction from Tumor Gene Expression Profiles Using DCT and DFT., , , and . EPIA Workshops, volume 4874 of Lecture Notes in Computer Science, page 485-496. Springer, (2007)Minimization of the Redundant Coverage for Dense Wireless Sensor Networks., , , and . ICESS, volume 4523 of Lecture Notes in Computer Science, page 415-424. Springer, (2007)Malicious Codes Detection Based on Ensemble Learning., , , , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 468-477. Springer, (2007)