Author of the publication

Using Genetic Algorithms for Fingerprint Core Point Detection.

, , , and . FSKD (4), page 20-24. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Improved Consensus Mechanism for the Blockchain Based on Credit Rewards and Punishments., , , and . ICBCT, page 105-109. ACM, (2020)Convolutional Sparse Coded Dynamic Brain Functional Connectivity., and . Neural Process. Lett., 52 (3): 1881-1892 (2020)A Novel Multi-reference Points Fingerprint Matching Method., , , and . MMM, volume 5371 of Lecture Notes in Computer Science, page 356-366. Springer, (2009)Being Corrupt Requires Being Clever, But Detecting Corruption Doesn't., , and . ITCS, volume 124 of LIPIcs, page 45:1-45:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)A High-Efficiency Automatic $U$ -Distribution Segmentation Algorithm for PolSAR Images., , , , and . IEEE Geosci. Remote. Sens. Lett., 16 (5): 831-835 (2019)Rimless Wheel with Radially Expanding Spokes: Dynamics, Impact, and Stable Gait., and . ICRA, page 3240-3244. IEEE, (2004)Theorizing a Two-Sided Adoption Model for Mobile Marketing Platforms., , , and . ICIS, page 128. Association for Information Systems, (2010)Making Sense Sensibly in Crisis Communication: How Publics' Crisis Appraisals Influence Their Negative Emotions, Coping Strategy Preferences, and Crisis Response Acceptance.. Communication Research, 37 (4): 522-552 (2010)Pseudo-Coloring Occlusion Culling., and . AsiaSim (3), volume 325 of Communications in Computer and Information Science, page 323-331. Springer, (2012)A low input power charge pump for passive UHF RFID applications., , , , and . ASICON, page 335-338. IEEE, (2017)