Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-time background subtraction-based video surveillance of people by integrating local texture patterns., , , , and . Signal, Image and Video Processing, 8 (4): 665-676 (2014)Improving QoS Of WiMAX By On_Demand Bandwidth Allocation Based On PMP Mode., , , and . JCP, 6 (10): 2187-2195 (2011)Automatic segmentation of cervical vertebrae in X-ray images., , , , and . IJCNN, page 1-8. IEEE, (2012)Incentive Mechanism Study Based on Game Analysis for New Housing Security System., , and . ICEE, page 2926-2929. IEEE, (2010)Design and Construction of a Prototype Secure Wireless Mesh Network Testbed., , , , , and . AINA Workshops, page 345-350. IEEE Computer Society, (2010)Usability and Security of the Recall-Based Graphical Password Schemes., , , and . HPCC/EUC, page 2237-2244. IEEE, (2013)Local Word Bag Model for Text Categorization., , , , , and . ICDM, page 625-630. IEEE Computer Society, (2007)Task Scheduling and Server Provisioning for Energy-Efficient Cloud-Computing Data Centers., , and . ICDCS Workshops, page 226-231. IEEE Computer Society, (2013)A hybrid no-reference blockiness metric for H.264 standard., , , , , and . ICCA, page 1367-1371. IEEE, (2013)A cooperative method for supervised learning in Spiking neural networks., , , and . CSCWD, page 22-26. IEEE, (2010)