Author of the publication

Extraction Method of Alarm Transaction Based on Morphology Similarity Clustering.

, , , , and . ICCA, page 917-921. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Integrative System for Deep Packet Inspection and Network Anomaly Detection amp; Defense, , , , and . Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on, page 1-4. (2011)Semi-supervised nonlinear dimensionality reduction., , , and . ICML, volume 148 of ACM International Conference Proceeding Series, page 1065-1072. ACM, (2006)The research of forest fire monitoring application., , , and . Geoinformatics, page 1-5. IEEE, (2010)The interpretation of experimental observation date for the development of mechanisms based creep damage constitutive equations for high chromium steel., , and . ICAC, page 1-6. IEEE, (2015)An improvement of IP address lookup based on rule filter analysis., , and . ICC Workshops, page 688-693. IEEE, (2014)Impulse noise suppression with an augmentation of ordered difference noise detector and an adaptive variational method., , and . Pattern Recognit. Lett., 30 (4): 460-467 (2009)Prior Based Cardiac Valve Segmentation in Echocardiographic Sequences: Geodesic Active Contour Guided by Region and Shape Prior., , , , and . IbPRIA (2), volume 3523 of Lecture Notes in Computer Science, page 447-454. Springer, (2005)cTrust: Trust Aggregation in Cyclic Mobile Ad Hoc Networks., , and . Euro-Par (2), volume 6272 of Lecture Notes in Computer Science, page 454-465. Springer, (2010)Robust Matching Area Selection for Terrain Matching Using Level Set Method., , and . ICIAR, volume 3656 of Lecture Notes in Computer Science, page 423-430. Springer, (2005)Face Recognition Using Improved-LDA., and . ICIAR (2), volume 3212 of Lecture Notes in Computer Science, page 692-699. Springer, (2004)