Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A VHDL Based Controller Design for Non-contact Temperature and Breathing Sensors Suitable for Crib., , and . BIBE, page 126-133. IEEE Computer Society, (2014)New background modeling for speaker verification.. INTERSPEECH, ISCA, (2004)Ownership protection of outsourced biomedical time series data based on optimal watermarking scheme in data mining., , and . Australasian J. of Inf. Systems, (2017)A study on the stability of EEG signals for user authentication., , , , and . NER, page 122-125. IEEE, (2015)Testing Voice Mimicry with the YOHO Speaker Verification Corpus., , and . KES (4), volume 3684 of Lecture Notes in Computer Science, page 15-21. Springer, (2005)Fuzzy C-Means Clustering-Based Speaker Verification., and . AFSS, volume 2275 of Lecture Notes in Computer Science, page 318-324. Springer, (2002)Password Entropy and Password Quality., , , and . NSS, page 583-587. IEEE Computer Society, (2010)Novel Convex Active Contour Model Using Local and Global Information., , , , and . DICTA, page 346-351. IEEE Computer Society, (2011)A Novel Sphere-Based Maximum Margin Classification Method., , , and . ICPR, page 620-624. IEEE Computer Society, (2014)Fuzzy entropy semi-supervised support vector data description., , , , and . IJCNN, page 1-5. IEEE, (2013)