Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An inverse halftoning algorithm based on neural networks and UP(x) atomic function., , , , and . TSP, page 523-527. IEEE, (2015)Cross View Gait Recognition Using Joint-Direct Linear Discriminant Analysis., , , , , , , and . Sensors, 17 (1): 6 (2017)Copy-Move Forgery Detection Algorithm using Frequency Transforms, SURF and MSER., , , and . IWBF, page 1-6. IEEE, (2019)Using Twitter Data to Monitor Natural Disaster Social Dynamics: A Recurrent Neural Network Approach with Word Embeddings and Kernel Density Estimation., , , , , , and . Sensors, 19 (7): 1746 (2019)A Growing Cell Neural Network Structure for Off-Line Signature Recognition., , , and . IWANN (2), volume 2085 of Lecture Notes in Computer Science, page 192-199. Springer, (2001)A Graphical User Interface for Fast Evaluation and Testing of Machine Learning Models Performance., , , , and . IWBF, page 1-5. IEEE, (2019)A sub-block-based eigenphases algorithm with optimum sub-block size., , , , and . Knowl.-Based Syst., (2013)Security attack prediction based on user sentiment analysis of Twitter data., , , , , , , and . ICIT, page 610-617. IEEE, (2016)Compact image steganalysis for LSB-matching steganography., , , , , and . IWBF, page 1-6. IEEE, (2017)Shape-based hand recognition approach using the morphological pattern spectrum., , , and . J. Electronic Imaging, 18 (1): 013012 (2009)