Author of the publication

Breast tissue segmentation on MR images using KFCM with spatial constraints.

, , , , , , and . GrC, page 254-258. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identification of Multiple First-Order Continuous-Time Dynamic Models From Special Segments in Historical Data., , , and . IEEE Access, (2020)A blind approach to closed-loop identification of Hammerstein systems., , , , and . Int. J. Control, 80 (2): 302-313 (2007)A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system., , , , and . Des. Codes Cryptogr., 86 (11): 2587-2603 (2018)Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search., , , and . Theor. Comput. Sci., (2012)Interactive conditional proxy re-encryption with fine grain policy., , , and . J. Syst. Softw., 84 (12): 2293-2302 (2011)一种基于中介真值程度度量的模糊综合评价方法 (Fuzzy Comprehensive Evaluation Method Based on Measure of Medium Truth Degree)., , , and . 计算机科学, 43 (2): 204-209 (2016)Current Attitude Prediction Model Based on Game Theory., , , and . WISE (2), volume 8181 of Lecture Notes in Computer Science, page 469-478. Springer, (2013)An FAR-SW based approach for webpage information extraction., , , and . Inf. Syst. Frontiers, 16 (5): 771-785 (2014)Performance Assessment and Design for Univariate Alarm Systems Based on FAR, MAR, and AAD., , , and . IEEE Trans Autom. Sci. Eng., 9 (2): 296-307 (2012)An Overview of Industrial Alarm Systems: Main Causes for Alarm Overloading, Research Status, and Open Problems., , , and . IEEE Trans Autom. Sci. Eng., 13 (2): 1045-1061 (2016)