Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Object Coding for Real Time Image Processing Applications., and . ICAPR (2), volume 3687 of Lecture Notes in Computer Science, page 550-559. Springer, (2005)A Semi-Automated Dynamic Approach to Threat Evaluation and Optimal Defensive Resource Allocation., , , and . ICIC (1), volume 5754 of Lecture Notes in Computer Science, page 8-17. Springer, (2009)Capturing outlines of planar images using Bézier cubics., and . Comput. Graph., 31 (5): 719-729 (2007)Blockchain-Based Public Key Infrastructure: A Transparent Digital Certification Mechanism for Secure Communication., , , and . IEEE Netw., 35 (5): 220-225 (2021)A Novel Corner Detector Approach using Sliding Rectangles., and . AICCSA, page 621-626. IEEE Computer Society, (2006)A novel approach to polygonal approximation of digital curves., and . J. Vis. Commun. Image Represent., 18 (3): 264-274 (2007)An Optimal Dynamic Threat Evaluation and Weapon Scheduling Technique., and . SGAI Conf., page 437-450. Springer, (2009)Fingerprint Enhancement and Reconstruction., and . ICIC (2), volume 5755 of Lecture Notes in Computer Science, page 660-669. Springer, (2009)Role of Corner Detection in Capturing Shape Outlines., and . JCIS, Atlantis Press, (2006)Security, Safety and Trust Management (SSTM '17)., , , , and . WETICE, page 242-243. IEEE Computer Society, (2017)