default search action
Dzulkifli Bin Mohamad
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j10]Amin Mohamed Ahsan, Dzulkifli Bin Mohamad:
Machine learning technique for object detection based on SURF feature. Int. J. Comput. Vis. Robotics 7(1/2): 6-19 (2017) - [j9]Qais Al-Nuzaili, Siti Zaiton Mohd Hashim, Faisal Saeed, Mohammed Sayim Khalil, Dzulkifli Bin Mohamad:
Pixel distribution-based features for offline Arabic handwritten word recognition. Int. J. Comput. Vis. Robotics 7(1/2): 99-122 (2017) - [j8]Mohammed Almuashi, Siti Zaiton Mohd Hashim, Dzulkifli Bin Mohamad, Mohammed Hazim Alkawaz, Aida Ali:
Automated kinship verification and identification through human facial images: a survey. Multim. Tools Appl. 76(1): 265-307 (2017) - 2016
- [j7]Qais Al-Nuzaili, Siti Zaiton Mohd Hashim, Faisal Saeed, Mohammed Sayim Khalil, Dzulkifli Bin Mohamad:
Enhanced structural perceptual feature extraction model for Arabic literal amount recognition. Int. J. Intell. Syst. Technol. Appl. 15(3): 240-254 (2016) - 2013
- [j6]Khitikun Meethongjan, Dzulkifli Bin Mohamad, Amjad Rehman, Ayman Altameem, Tanzila Saba:
An Intelligent Fused Approach for Face Recognition. J. Intell. Syst. 22(2): 197-212 (2013) - 2010
- [j5]Mohammed S. Khalil, Dzulkifli Bin Mohamad, Muhammad Khurram Khan, Qais Al-Nuzaili:
Fingerprint verification using statistical descriptors. Digit. Signal Process. 20(4): 1264-1273 (2010) - [j4]Muhammad Faisal Zafar, Dzulkifli Bin Mohamad, Razib M. Othman:
Performance analysis of a proposed smoothing algorithm for isolated handwritten characters. Int. J. Artif. Intell. Soft Comput. 2(3): 186-198 (2010) - [c8]Amjad Rehman, Tanzila Saba, Dzulkifli Bin Mohamad, Ghazali Sulong:
Evaluation of new character segmentation approach for offline cursive handwriting recognition in the state of art. CompIMAGE Special Track 2010: 61-72 - [c7]Suriati Bte Sadimon, Mohd Shahrizal Sunar, Dzulkifli Bin Mohamad, Habibollah Haron:
Computer Generated Caricature: A Survey. CW 2010: 383-390
2000 – 2009
- 2009
- [j3]Fajri Kurniawan, Amjad Rehman, Dzulkifli Bin Mohamad:
Contour vs Non-Contour based Word Segmentation from Handwritten Text Lines- an Experimental Analysis. J. Digit. Content Technol. its Appl. 3(2): 127-131 (2009) - [c6]Amjad Rehman, Dzulkifli Bin Mohamad, Fajri Kurniawan, Mohammad Ilays:
Performance Analysis of Segmentation Approach for Cursive Handwriting on Benchmark Database. AICCSA 2009: 265-270 - [c5]Fajri Kurniawan, Amjad Rehman, Dzulkifli Bin Mohamad, Siti Mariyam Hj. Shamsuddin:
Self Organizing Features Map with Improved Segmentation to Identify Touching of Adjacent Characters in Handwritten Words. HIS (1) 2009: 475-480 - [c4]Fadzilah Ahmad, Dzulkifli Bin Mohamad:
Fingerprint Classification Based on Analysis of Singularities and Image Quality. IVIC 2009: 551-560 - [c3]Fajri Kurniawan, Dzulkifli Bin Mohamad:
Performance Comparison between Contour-Based and Enhanced Heuristic-Based for Character Segmentation. SITIS 2009: 112-117 - [c2]Mohammad Masroor Ahmed, Dzulkifli Bin Mohamad, Mohammed S. Khalil:
A Hybrid Approach for Segmenting and Validating T1-Weighted Normal Brain MR Images by Employing ACM and ANN. SoCPaR 2009: 239-244 - 2005
- [j2]Habibollah Haron, Siti Mariyam Hj. Shamsuddin, Dzulkifli Bin Mohamad:
A new corner detection algorithm for chain code representation. Int. J. Comput. Math. 82(8): 941-950 (2005) - 2002
- [j1]Puteh Saad, Siti Mariyam Hj. Shamsuddin, Safaai Deris, Dzulkifli Bin Mohamad:
Rough Set on Trademark Images for Neural Network Classifier. Int. J. Comput. Math. 79(7): 789-796 (2002) - 2001
- [c1]Muhammad Faisal Zafar, Dzulkifli Bin Mohamad:
Counterpropagation neural networks for trademark recognition. ISSPA 2001: 751-752
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint