From post

Robust Centerline Extraction for Tree-like Blood Vessels based on the Region Growing Algorithm and Level-Set Method.

, , , и . FSKD (4), стр. 586-591. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The L-fuzzy vector subspace degrees and its induced convex structure., и . Comput. Appl. Math., 43 (3): 131 (апреля 2024)Dominance Hierarchies Induce a Population's Full Cooperation., , , и . Dyn. Games Appl., 4 (4): 432-447 (2014)Three-Dimensional Encoding Approach for Wearable Tactile Communication Devices., , , , , и . Sensors, 22 (24): 9568 (2022)On potentials of regularized Wasserstein generative adversarial networks for realistic hallucination of tiny faces., , , , , , и . Neurocomputing, (2019)Prediction of forest unit volume based on hybrid feature selection and ensemble learning., , , , и . Evol. Intell., 13 (1): 21-32 (2020)Macro process of knowledge management for continuous innovation., , , и . J. Knowl. Manag., 14 (4): 573-591 (2010)Device-to-device assisted two-stage cooperative multicast with optimal resource utilization., , , и . GLOBECOM Workshops, стр. 839-844. IEEE, (2014)A cloud-user behavior assessment based dynamic access control model., , , , и . Int. J. Syst. Assur. Eng. Manag., 8 (3s): 1966-1975 (2017)Performance modeling and prediction of enterprise JavaBeans with layered queuing network templates., , , и . ACM SIGSOFT Softw. Eng. Notes, (2006)Redundant Sniffer Deployment for Multi-Channel Wireless Network Forensics With Unreliable Conditions., , , , , и . IEEE Trans. Cogn. Commun. Netw., 6 (1): 394-407 (2020)