Author of the publication

Effective Iris Recognition System by Optimized Feature Vectors and Classifier.

, , , and . AIMSA, volume 1904 of Lecture Notes in Computer Science, page 348-357. Springer, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Feasibility of virtual security laboratory for three-tiered distance education., , and . SIGITE Conference, page 53-58. ACM, (2010)Secure Online Internet Reservation of e-Government Service (ORGS) Using Java Card Applications Toolkit (J-CAT)., and . EGOV, volume 2739 of Lecture Notes in Computer Science, page 272-277. Springer, (2003)Quantitative Approach of Remote Accessibility Assessment System (RAAS) in Telerehabilitation., , , , , and . ICOST, volume 6159 of Lecture Notes in Computer Science, page 238-241. Springer, (2010)Inter-space Interaction Issues Impacting Middleware Architecture of Ubiquitous Pervasive Computing., and . Int. J. Fuzzy Log. Intell. Syst., 8 (1): 42-51 (2008)Effective Iris Recognition System by Optimized Feature Vectors and Classifier., , , and . AIMSA, volume 1904 of Lecture Notes in Computer Science, page 348-357. Springer, (2000)An interactive cyber-physical system (CPS) for people with disability and frail elderly people., , , and . ICUIMC, page 113. ACM, (2011)Efficient Iris Recognition System by Optimization of Feature Vectors and Classifier., , , and . PRICAI, volume 1886 of Lecture Notes in Computer Science, page 167-176. Springer, (2000)Managing mechanism for service compatibility and interaction issues in context-aware ubiquitous home., , , and . IEEE Trans. Consumer Electronics, 51 (2): 524-528 (2005)State of the Art of Network Security Perspectives in Cloud Computing., , , , , and . SUComS, volume 78 of Communications in Computer and Information Science, page 629-637. Springer, (2010)Security Implication in Virtualization., , , and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)