Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A study on the effective protection of digital content based on real-time fingerprint recognition mechanism in the digital library., , , and . CSCWD (1), page 296-301. IEEE Computer Society, (2005)3-D Facial Expression Recognition-Synthesis on PDA Incorporating Emotional Timing., , , , and . PCM (2), volume 3332 of Lecture Notes in Computer Science, page 569-576. Springer, (2004)Design and Implementation of Multimedia-based DRM System using Real-Time FRM., , and . SIP, page 161-166. IASTED/ACTA Press, (2003)Korean Documents Copy Detection Based on Ferret., , , and . ICIC (1), volume 6838 of Lecture Notes in Computer Science, page 440-447. Springer, (2011)Automatic Event Extraction method for Analyzing Text Narrative Structure., and . IMCOM, page 1-4. IEEE, (2021)FedUV: Uniformity and Variance for Heterogeneous Federated Learning., , , , and . CVPR, page 5863-5872. IEEE, (2024)ID3 algorithm based object discrimination for multi object tracking., , and . ISCIT, page 535-539. IEEE, (2014)MLP based Pedestrian Counting., , , , and . IMCOM, page 78:1-78:6. ACM, (2016)Machine Learning for Trajectory Generation of Multiple-pedestrians., , and . CSA/CUTE, volume 421 of Lecture Notes in Electrical Engineering, page 401-406. Springer, (2016)An application of DICOM architecture for detecting plagiarism in natural language., , , and . CSCWD (2), page 816-819. IEEE Computer Society, (2005)1-84600-002-5.