Author of the publication

A histogram equalization method based on frequency division of mean filtering.

, , , and . ICIMCS, page 256-259. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A histogram equalization method based on frequency division of mean filtering., , , and . ICIMCS, page 256-259. ACM, (2013)Vocational Education Development Model Based on Intelligent Management System., , , , , , and . ICEIT, page 76-79. IEEE, (2022)Classification of IoT Malware based on Convolutional Neural Network., , , and . ICSS, page 51-57. IEEE, (2020)A Semi-supervised Learning Approach for High Dimensional Android Malware Classification., , , and . CSS, volume 12653 of Lecture Notes in Computer Science, page 20-31. Springer, (2020)Vision based trajectory tracking of space debris in close proximity via integrated estimation and control., , , and . ACC, page 1033-1038. IEEE, (2011)A dynamic priority reservation queue scheme for handover in mobile cellular systems supporting multi-rate traffics., , and . PIMRC, page 1461-1465. IEEE, (2003)Modular Robot Path Planning Using Genetic Algorithm Based on Gene Pool., , , , and . ISICA (1), volume 6382 of Lecture Notes in Computer Science, page 380-389. Springer, (2010)Research and Realization of Collaborative M&S Services in Simulation Grid., , , and . CCGRID, page 69. IEEE Computer Society, (2006)Improved CFDP Algorithms Based on Shared Nearest Neighbors and Transitive Closure., , , and . PAKDD (Workshops), volume 10526 of Lecture Notes in Computer Science, page 79-93. Springer, (2017)Kth min Threshold Encryption for Privacy-preserving Data Evaluation., , , , and . Comput. J., 67 (5): 1941-1950 (2024)