Author of the publication

Detection and Segmentation of Concealed Objects in X-Ray Compton Backscatter Images.

, , and . ICIG, page 175-179. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vocabulary growth of content words of ESP and General English. A contrastive study based on CMTE and BNC.. Glottometrics, (2012)Wartime industrial logistics information integration: Framework and application in optimizing deployment and formation of military logistics platforms., , , , , and . J. Ind. Inf. Integr., (2021)A new Inter-electrode coupling capacitance extraction method for deep-submicron AlGaN/GaN HEMTs., , , , , , and . IEICE Electron. Express, 14 (15): 20170559 (2017)Differential privacy trajectory data protection scheme based on R-tree., , , and . Expert Syst. Appl., (2021)Prospect-theory and geometric distance measure-based Pythagorean cubic fuzzy multicriteria decision-making., and . Int. J. Intell. Syst., 36 (8): 4117-4142 (2021)Case Study on Optimization of Rectangular Object Layout by Genetic Algorithm., , , and . CSCWD (Selected Papers), volume 5236 of Lecture Notes in Computer Science, page 608-619. Springer, (2007)An Alphapose-Based Pedestrian Fall Detection Algorithm., , , and . ICAIS (1), volume 13338 of Lecture Notes in Computer Science, page 650-660. Springer, (2022)On the horizons in constrained linear quadratic regulation., and . CDC, page 1186-1191. IEEE, (2007)Orthonormal rational functions via the Jury table and their applications., and . CDC, page 5265-5270. IEEE, (2003)NetV.js: A web-based library for high-efficiency visualization of large-scale graphs and networks., , , and . Vis. Informatics, 5 (1): 61-66 (2021)