Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anveshak - A Groundtruth Generation Tool for Foreground Regions of Document Images., , , and . CoRR, (2017)Modeling of Echocardiogram Video Based on Views and States., , , and . ICVGIP, volume 4338 of Lecture Notes in Computer Science, page 397-408. Springer, (2006)A comparative analysis of two distance measures in color image databases., , and . ICIP (1), page 401-404. IEEE, (2002)A Rule-Based and Game-Theoretic Approach to Online Credit Card Fraud Detection., , and . Int. J. Inf. Secur. Priv., 1 (3): 26-46 (2007)An MLP using Hough transform based fuzzy feature extraction for Bengali script recognition., and . Pattern Recognit. Lett., 20 (8): 771-782 (1999)Pose Depth Volume extraction from RGB-D streams for frontal gait recognition., , , and . J. Vis. Commun. Image Represent., 25 (1): 53-63 (2014)Evaluation of segmentation techniques using region area and boundary matching information., , and . J. Vis. Commun. Image Represent., 23 (1): 150-160 (2012)Security analysis of ABAC under an administrative model., , , and . IET Inf. Secur., 13 (2): 96-103 (2019)A column dependency-based approach for static and dynamic recovery of databases from malicious transactions., , and . Int. J. Inf. Sec., 9 (1): 51-67 (2010)Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems., , , , and . IEEE Trans. Emerg. Top. Comput., 9 (4): 1901-1913 (2021)