From post

Similarity Checking of Handwritten Signature Using Binary Dotplot Analysis.

, и . UCMA (2), том 151 из Communications in Computer and Information Science, стр. 299-306. (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analysis of Handwritten Signature Image., , , и . FGIT-SecTech, том 58 из Communications in Computer and Information Science, стр. 43-50. Springer, (2009)Feature Extraction and Analysis of Breast Cancer Specimen., , , и . ACN, том 77 из Communications in Computer and Information Science, стр. 30-41. (2010)Multi-hop in Clustering with Mobility Protocol to Save the Energy Utilization in Wireless Sensor Networks., , , и . Wirel. Pers. Commun., 117 (4): 3381-3395 (2021)Image Data Hiding Technique Using Discrete Fourier Transformation., и . UCMA (2), том 151 из Communications in Computer and Information Science, стр. 315-323. (2011)Supervised chromosome clustering and image classification., , и . Future Gener. Comput. Syst., 27 (4): 372-376 (2011)Extraction of Features from Signature Image and Signature Verification Using Clustering Techniques., , , и . SUComS, том 78 из Communications in Computer and Information Science, стр. 493-503. Springer, (2010)A Secure Scheme for Image Transformation., , , , и . SNPD, стр. 490-493. IEEE Computer Society, (2008)Context Based Speech Analysis of Bengali Language as a Part of TTS Conversion., , , и . FGIT-SIP, том 260 из Communications in Computer and Information Science, стр. 204-214. Springer, (2011)Discrete Cosine Transformation Based Image Authentication and Secret Message Transmission Scheme., , , , и . CICSyN, стр. 374-379. IEEE Computer Society, (2009)Refine Crude Corpus for Opinion Mining., , , , , , и . CICSyN, стр. 17-22. IEEE Computer Society, (2009)