Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Signature Verification Using Static and Dynamic Features., , , and . ICONIP, volume 3316 of Lecture Notes in Computer Science, page 350-355. Springer, (2004)Evolutionary Modular MLP with Rough Sets and ID3 Algorithm for Staging of Cervical Cancer., , and . Neural Comput. Appl., 10 (1): 67-76 (2001)Personalized Web Search Using Probabilistic Query Expansion., , and . Web Intelligence/IAT Workshops, page 83-86. IEEE Computer Society, (2007)Mining Quantitative Association Rules in Protein Sequences., , , and . Selected Papers from AusDM, volume 3755 of Lecture Notes in Computer Science, Springer, (2006)Digital watermarking based secure multimodal biometric system., , , and . SMC (3), page 2983-2987. IEEE, (2004)YASS: Yet another suffix stripper., , , , , and . ACM Trans. Inf. Syst., 25 (4): 18 (2007)Sentence Ranking for Document Indexing., , and . PReMI, volume 6744 of Lecture Notes in Computer Science, page 274-279. Springer, (2011)An Approach for Preparing Groundtruth Data and Evaluating Visual Saliency Models., , and . PReMI, volume 5909 of Lecture Notes in Computer Science, page 279-284. Springer, (2009)Feature selection techniques for maximum entropy based biomedical named entity recognition., , and . J. Biomed. Informatics, 42 (5): 905-911 (2009)Robust representation and efficient matching of spoken word templates., , and . ICAPR, page 1-6. IEEE, (2017)