Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Age replacement model using the parameter estimation of Weibull distribution with censored lifetimes., , and . ICPHM, page 1-6. IEEE, (2018)De-Identification Method for Bilingual EMR Free Texts., , , , , , and . AMIA, AMIA, (2013)Hierarchical CRGK Supporting a Secure Multicast Communication for a Large Number of Users., , , and . IEICE Trans. Commun., 93-B (4): 862-870 (2010)Representation Learning for Background Music Identification in Television Shows., , , and . ICTC, page 1434-1437. IEEE, (2019)Estimation of Cylinders parameters from point clouds using Least Square Best Fit Method., , , , , , , , , and . UR, page 200-205. IEEE, (2022)Experience of De-identification System Development for Clinical Research in Tertiary Hospital., , , , , , and . MedInfo, volume 192 of Studies in Health Technology and Informatics, page 1044. IOS Press, (2013)DRM Content Adaptation Scheme Between Different DRM Systems for Seamless Content Service., , , and . ICME, page 867-870. IEEE Computer Society, (2007)Memory corruption detecting method using static variables and dynamic memory usage., , , and . AST@ICSE, page 46-52. ACM, (2018)Understanding Student Procrastination via Mixture Models., , , , , and . EDM, International Educational Data Mining Society (IEDMS), (2018)Person Re-Identification in Movies/Dramas., , , , and . ICTC, page 1596-1598. IEEE, (2020)