Author of the publication

Face Recognition System with GUI Using Digital Image Processing

, , , and . International Journal of Inventive Engineering and Sciences (IJIES), 3 (1): 7-13 (December 2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Passive Path Imbalance Measurement in Fiber Optic Interferometer using Homodyne PGC Scheme., and . PHOTOPTICS, page 73-78. SciTePress, (2019)Phase sensitive amplifier using frequency-shift free optical phase conjugation for phase-regeneration of DPSK signals., , and . ICTON, page 1-4. IEEE, (2017)DSMANET: Defensive Strategy of Routing Using Game Theory Approach for Mobile Adhoc Network., and . CSOC (3), volume 765 of Advances in Intelligent Systems and Computing, page 311-320. Springer, (2018)Phase Noise Estimation and Compensation in 100G 4-QAM CO-OFDM system using Radial Basis Function Network., and . WOCN, page 1-4. IEEE, (2018)RF pulse shaping for higher-order optical modulation., and . NCC, page 1-4. IEEE, (2014)Nonlinearity mitigation of DQPSK signal by frequency-shift free spectral inversion using counter-propagating dual pump four-wave mixing in a semiconductor optical amplifier., , , , and . ICTON, page 1-5. IEEE, (2018)CIANI: Cognitive Intelligence for Assessing Network Intrusion in Mobile Adhoc Network., and . Wireless Personal Communications, 109 (4): 2451-2469 (2019)Improving the prediction rate of unusual behaviors of animal in a poultry using deep learning technique., , , , and . Soft Comput., 24 (19): 14491-14502 (2020)Binary bat algorithm based feature selection with deep reinforcement learning technique for intrusion detection system., and . Soft Comput., 27 (15): 10777-10788 (August 2023)Intrusion detection system based on GA-fuzzy classifier for detecting malicious attacks., , , and . Concurr. Comput. Pract. Exp., (2021)