Author of the publication

Detection and analysis of table of contents based on content association.

, and . Int. J. Document Anal. Recognit., 8 (2-3): 132-143 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research on User Authentication Scheme against the Man-in-the-Middle Attack., , and . ICICA (2), volume 308 of Communications in Computer and Information Science, page 1-8. Springer, (2012)A novel cuckoo search algorithm with multiple update rules., , , and . Appl. Intell., 48 (11): 4192-4211 (2018)MoBility-Assisted Detection Of The Replication attacks in mobile wireless sensor networks., , and . WiMob, page 225-232. IEEE Computer Society, (2010)Drift-detection Based Incremental Ensemble for Reacting to Different Kinds of Concept Drift., , and . BigCom, page 107-114. IEEE, (2019)Dynamic mean-CVaR portfolio optimization in continuous-time., and . ICCA, page 1550-1555. IEEE, (2013)The Design of an Experimental Computer LAN Interconnection in University Environment.. Comput. Networks, (1988)The unique solution of projective invariants of six points from four uncalibrated images., , , and . Pattern Recognit., 30 (3): 513-517 (1997)Parameter Control Based Cuckoo Search Algorithm for Numerical Optimization., and . Neural Process. Lett., 54 (4): 3173-3200 (2022)The influences of product similarity on consumer preferences: a study based on eye-tracking analysis., , , , and . Cogn. Technol. Work., 22 (3): 603-613 (2020)Potential Pathogenic Genes Prioritization Based on Protein Domain Interaction Network Analysis., , , , , , , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 18 (3): 1026-1034 (2021)