From post

Parameter adaptive pulse coupled neural network-based saliency map fusion strategy for salient object detection.

, , и . Neural Comput. Appl., 35 (21): 15743-15757 (июля 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Internet-of-Battlefield-Things (IoBT)-Based Enemy Localization Using Soldiers Location and Gunshot Direction., , , и . IEEE Internet Things J., 7 (12): 11725-11734 (2020)Mammogram Segmentation Using Rough k-Means and Mass Lesion Classification with Artificial Neural Network., , и . AMLTA, том 322 из Communications in Computer and Information Science, стр. 60-69. Springer, (2012)Copy move forgery detection using DWT and SIFT features., , и . ISDA, стр. 188-193. IEEE, (2013)Platform independent Real Time copyright protection embedding and extraction algorithms on Android and Embedded framework., , и . ISSPIT, стр. 189-194. IEEE Computer Society, (2014)IRIS Position-Based Wheelchair Maneuver Using Semantic Segmentation., , , и . FICTA (2), том 267 из Smart Innovation, Systems and Technologies, стр. 501-509. Springer, (2021)Rough Set Approach for Feature Reduction in Pattern Recognition through Unsupervised Artificial Neural Network., , , , и . ICETET, стр. 1196-1199. IEEE Computer Society, (2008)Intersection Collision Detection and Warning Protocol: Design Approach., , , и . ICETET, стр. 869-872. IEEE Computer Society, (2008)Design of Dynamic Synapse Circuits with VLSI Design Approach., , , и . ICETET, стр. 707-711. IEEE Computer Society, (2010)Micro-Controlled Based Vehicle Safety System Using Dedicated Short Range Communications (DSRC)., , , и . ICETET, стр. 570-575. IEEE Computer Society, (2009)A Copy Move Forgery Detection to Overcome Sustained Attacks Using Dyadic Wavelet Transform and SIFT Methods., , и . ACIIDS (1), том 8397 из Lecture Notes in Computer Science, стр. 530-542. Springer, (2014)