Author of the publication

Blind Image Restoration by Combining Wavelet Transform and RBF Neural Network.

, , and . Int. J. Wavelets Multiresolution Inf. Process., 5 (1): 15-26 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A novel scheme for hybrid digital video watermarking: approach, evaluation and experimentation., , and . IEEE Trans. Circuits Syst. Video Techn., 15 (12): 1638-1649 (2005)High-Resolution Deep Convolutional Generative Adversarial Networks, , , , and . (2017)cite arxiv:1711.06491.QoS Prediction in Cloud and Service Computing - Approaches and Applications, and . Springer Briefs in Computer Science Springer, (2017)Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones., , and . SOUPS, page 187-198. USENIX Association, (2014)A wireless handheld multi-modal digital video library client system., , , and . Multimedia Information Retrieval, page 231-238. ACM, (2003)Time-dependent semantic similarity measure of queries using historical click-through data., , , , , and . WWW, page 543-552. ACM, (2006)Nonlinear Blind Source Separation Using Hybrid Neural Networks., , , and . ISNN (1), volume 3971 of Lecture Notes in Computer Science, page 1165-1170. Springer, (2006)A New Learning Algorithm for Function Approximation Incorporating A Priori Information into Extreme Learning Machine., , and . ISNN (1), volume 3971 of Lecture Notes in Computer Science, page 631-636. Springer, (2006)A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code., and . ICICS, volume 2836 of Lecture Notes in Computer Science, page 202-213. Springer, (2003)Maximal-Robustness-Minimal-Fragility Controller: A Compromise between Robustness and Fragility of Biochemical Networks., , and . ICIC (2), volume 5227 of Lecture Notes in Computer Science, page 1012-1021. Springer, (2008)