Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain analytics and artificial intelligence., , , , , , , , , and 2 other author(s). IBM J. Res. Dev., 63 (2/3): 5:1-5:14 (2019)Intratumoral injection of the seasonal flu shot converts immunologically cold tumors to hot and serves as an immunotherapy for cancer, , , , , , , , , and 38 other author(s). Proc Natl Acad Sci U S A, (December 2019)Online biometric authentication using hand vein patterns., , and . CISDA, page 1-7. IEEE, (2009)Rank Based Hybrid Multimodal Fusion Using PSO., , , and . SEMCCO (1), volume 7076 of Lecture Notes in Computer Science, page 217-224. Springer, (2011)Binary detection in presence of film grain noise and intersymbol interference, , and . Signal Processing, 8 (2): 205--214 (April 1985)Ant colony optimization based fuzzy binary decision tree for bimodal hand knuckle verification system., , and . Expert Syst. Appl., 40 (2): 439-449 (2013)An Authentication System Based on Palmprint., , , and . ITNG, page 399-404. IEEE Computer Society, (2009)Fuzzy binary decision tree for biometric based personal authentication., , and . Neurocomputing, (2013)Hybrid PSO Based Integration of Multiple Representations of Thermal Hand Vein Patterns., , and . SEMCCO, volume 6466 of Lecture Notes in Computer Science, page 246-253. Springer, (2010)Biometric based personal authentication using fuzzy binary decision tree., , , and . ICB, page 396-401. IEEE, (2012)