Author of the publication

A new method of detecting micro-calcification clusters in mammograms using contourlet transform and non-linking simplified PCNN.

, , , , , , , and . Computer Methods and Programs in Biomedicine, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Membership based on combining cluster center with affinity in FSVR and its application in soft sensor modeling., , and . ICMLC, page 571-575. IEEE, (2010)A cut-and-solve based algorithm for the single-source capacitated facility location problem., , and . European Journal of Operational Research, 221 (3): 521-532 (2012)A Voting Optimized Strategy Based on ELM for Improving Classification of Motor Imagery BCI Data., , , , , and . Cognitive Computation, 6 (3): 477-483 (2014)Thin Film Formation On Non-Planar Surface With Use Of Spray Coating Fabrication., , , , and . International Journal of Computational Engineering Science, 4 (3): 707-710 (2003)A Relaying Incentive Scheme for Multihop Cellular Networks Based on Coalition Game with Externalities., , , and . Wireless Personal Communications, 58 (4): 785-805 (2011)A combined model for scan path in pedestrian searching., , , , , and . IJCNN, page 2156-2161. IEEE, (2014)IoT Information Service Composition Driven by User Requirement., and . CSE, page 1509-1513. IEEE Computer Society, (2014)A Real-time Secure Voice Communication System Based on Speech Recognition., , and . ICSNC, page 22. IEEE Computer Society, (2006)Modeling Agent-Based Task Handling in a Peer-to-Peer Grid., , and . IAT, page 288-294. IEEE Computer Society, (2004)Study and Implementation of Trust Evaluation Access Control Mechanism Based on XEN., , and . HPCC-ICESS, page 1276-1281. IEEE Computer Society, (2012)