Author of the publication

Noises removal for images by wavelet-based Bayesian estimator via Levy process analysis.

, , and . ICME, page 327-330. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-national differences in individual knowledge-seeking patterns: a climato-economic contextualization., , , and . EJIS, 24 (3): 314-336 (2015)Fuzzy Theory Based Multi-objectives Evaluation Models and their Applications on Water Resources Allocation., , and . FSKD (4), page 310-315. IEEE Computer Society, (2009)Smart and interactive ubiquitous multimedia services., , , and . Computer Communications, 35 (15): 1769-1771 (2012)Two-Stage General Protocol for Remote Preparation of Multi-Qubit States., , , and . ICONS, page 371-376. International Federation of Automatic Control, (2013)An improved projection pursuit clustering model and its application based on Quantum-behaved PSO., , , and . ICNC, page 2581-2585. IEEE, (2010)Incremental Knowledge Acquisition for WSD: A Rough Set and IL based Method., , , and . EAI Endorsed Trans. Scalable Information Systems, 2 (5): e3 (2015)Clustering PPI data based on Improved functional-flow model through Quantum-behaved PSO., , , and . IJDMB, 6 (1): 42-60 (2012)Parallel Support Vector Data Description., , , and . IWANN (1), volume 7902 of Lecture Notes in Computer Science, page 280-290. Springer, (2013)Security Analyses for the Passive RFID Systems Deployed by HJM Model Tree.. IMECS, page 1311-1315. Newswood Limited, (2007)Human Identification with Electroencephalogram (EEG) for the Future Network Security., , , and . NSS, volume 7873 of Lecture Notes in Computer Science, page 575-581. Springer, (2013)