Author of the publication

Automatic Identification of Coronary Arteries in Coronary Computed Tomographic Angiography.

, , , , , , and . IEEE Access, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving the security of the distributed enterprise data warehouse system., and . ISI, page 227. IEEE, (2011)Fault-Tolerant and Ubiquitous Computing in Sensor Networks., , , and . IJDSN, (2013)A Holistic Model for Making Cloud Migration Decision: A Consideration of Security, Architecture and Business Economics., and . ISPA, page 435-441. IEEE Computer Society, (2012)Performance Measures of Behavior-Based Signatures: An Anti-malware Solution for Platforms with Limited Computing Resource., and . ARES, page 303-309. IEEE Computer Society, (2014)Measuring the Effectiveness of Investment in Security Treatments through a Security ROI Model., and . CSCI, page 722-727. IEEE, (2021)Automatic Identification of Coronary Arteries in Coronary Computed Tomographic Angiography., , , , , , and . IEEE Access, (2020)Restricting the Spurious Growth of Knowledge Graphs by Using Ontology Graphs., and . IEEE Access, (2024)Improving the performance of the enterprise information system via optimal scheduling., , and . IRI, page 337-341. IEEE Systems, Man, and Cybernetics Society, (2011)Research and Practice of Applying Adaptive Learning in Computer Science and IT Degree Programs., , and . FIE, page 1-8. IEEE, (2019)Apply Data Analytics to Schedule Best-suited Classes for Students with Different Academic Histories., and . FIE, page 1-7. IEEE, (2018)