Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel methodology for secured c-governance using Hadamard coding., and . IJCC, 1 (2/3): 145-166 (2012)Online Tracking of Skin Colour Regions Against a Complex Background., , , and . CoRR, (2014)Online interpretation of numeric sign language using 2-d skeletal model., , , and . CoRR, (2014)Comprehensive study into underlying mechanisms of anomalous gate leakage degradation in GaN high electron mobility transistors., , , , and . IRPS, page 4. IEEE, (2018)On averaging operators for Atanassov's intuitionistic fuzzy sets., , , , and . Inf. Sci., 181 (6): 1116-1124 (2011)Intersection graphs of ideals of rings., , , and . Discrete Mathematics, 309 (17): 5381-5392 (2009)A technique for measuring anisotropy in atrial conduction to estimate conduction velocity and atrial fibre direction., , , , , , , , , and 1 other author(s). Comp. in Bio. and Med., (2019)Autonomous Visualization for Mitigating Lack of Peripheral Vision in Remote Safe Teleoperation.. ICSEng, volume 366 of Advances in Intelligent Systems and Computing, page 211-219. Springer, (2014)Trajectory Based Unusual Human Movement Identification for Video Surveillance System., , , and . ICSEng, volume 366 of Advances in Intelligent Systems and Computing, page 789-794. Springer, (2014)A vicinity activation model for intelligent interface in tele-operation.. IHCI, page 1-6. IEEE, (2012)