Author of the publication

Dynamic Background Subtraction Using Histograms Based on Fuzzy C-Means Clustering and Fuzzy Nearness Degree.

, , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An investigation into iPod Touch generation 2., , and . InfoSecCD, page 94-98. ACM, (2011)Enhance learning through developing network security hands-on lab for online students., and . InfoSecCD, page 11:1. ACM, (2014)Categorizing Visitors Dynamically by Fast and Robust Clustering of Access Logs., and . Web Intelligence, volume 2198 of Lecture Notes in Computer Science, page 498-507. Springer, (2001)Resistance Analysis to Intruders' Evasion of Detecting Intrusion., , and . ISC, volume 4176 of Lecture Notes in Computer Science, page 383-397. Springer, (2006)A context quality management infrastructure for complex ubiquitous environment., , and . Comput. Syst. Sci. Eng., (2009)Iterative class diagram construction in consideration of modeling granularity., and . RCIS, page 101-108. IEEE, (2010)Diabetes Identification and Classification by Means of a Breath Analysis System., , , , and . ICMB, volume 6165 of Lecture Notes in Computer Science, page 52-63. Springer, (2010)RTT-Based Random Walk Approach to Detect Stepping-Stone Intrusion., and . AINA, page 558-563. IEEE Computer Society, (2015)Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion., , , , and . AINA, page 546-551. IEEE Computer Society, (2009)DOA Estimation for Heterogeneous Wideband Sources Based on Adaptive Space-Frequency Joint Processing., , , , and . IEEE Trans. Signal Process., (2022)