K3M: A universal algorithm for image skeletonization and a review of thinning techniques K Saeed, M Tabędzki, M Rybnik, M Adamski Zielona Góra: Uniwersytet Zielonogórski, 2010 | 237 | 2010 |
Moving object detection using background subtraction SH Shaikh, K Saeed, N Chaki, SH Shaikh, K Saeed, N Chaki Moving object detection using background subtraction, 15-23, 2014 | 171 | 2014 |
A comprehensive survey on image binarization techniques N Chaki, SH Shaikh, K Saeed, N Chaki, SH Shaikh, K Saeed Exploring Image Binarization Techniques, 5-15, 2014 | 164 | 2014 |
A speech-and-speaker identification system: Feature extraction, description, and classification of speech-signal image K Saeed, MK Nammous IEEE transactions on industrial electronics 54 (2), 887-897, 2007 | 87 | 2007 |
A keystroke dynamics based system for user identification M Rybnik, M Tabedzki, K Saeed 2008 7th computer information systems and industrial management applications …, 2008 | 84 | 2008 |
Application of recurrent neural networks for user verification based on keystroke dynamics P Kobojek, K Saeed Journal of telecommunications and information technology, 2016 | 63 | 2016 |
Region growing based segmentation algorithm for typewritten and handwritten text recognition K Saeed, M Albakoor Applied Soft Computing 9 (2), 608-617, 2009 | 55 | 2009 |
Biometrics and Kansei engineering K Saeed, T Nagashima Springer Science & Business Media, 2012 | 50 | 2012 |
User authentication with keystroke dynamics using fixed text M Rybnik, P Panasiuk, K Saeed 2009 International Conference on Biometrics and Kansei Engineering, 70-75, 2009 | 46 | 2009 |
Moving object detection approaches, challenges and object tracking SH Shaikh, K Saeed, N Chaki, SH Shaikh, K Saeed, N Chaki Moving object detection using background subtraction, 5-14, 2014 | 43 | 2014 |
A mobile device system for early warning of ECG anomalies A Szczepański, K Saeed Sensors 14 (6), 11031-11044, 2014 | 42 | 2014 |
A survey of security and privacy issues for biometrics based remote authentication in cloud T Bhattasali, K Saeed, N Chaki, R Chaki Computer Information Systems and Industrial Management: 13th IFIP TC8 …, 2014 | 41 | 2014 |
User authentication for mobile devices M Rogowski, K Saeed, M Rybnik, M Tabedzki, M Adamski Computer Information Systems and Industrial Management: 12th IFIP TC8 …, 2013 | 36 | 2013 |
Implementation and advanced results on the non-interrupted skeletonization algorithm K Saeed, M Rybnik, M Tabedzki Computer Analysis of Images and Patterns: 9th International Conference, CAIP …, 2001 | 36 | 2001 |
New directions in behavioral biometrics K Saeed CRC Press, 2016 | 33 | 2016 |
Natural language processing: Speaker, language, and gender identification with LSTM MK Nammous, K Saeed Advanced Computing and Systems for Security: Volume Eight, 143-156, 2019 | 32 | 2019 |
A novelty approach to retina diagnosing using biometric techniques with SVM and clustering algorithms M Szymkowski, E Saeed, M Omieljanowicz, A Omieljanowicz, K Saeed, ... IEEE Access 8, 125849-125862, 2020 | 30 | 2020 |
Online signature classification and its verification system M Adamski, K Saeed 2008 7th Computer Information Systems and Industrial Management Applications …, 2008 | 27 | 2008 |
An adaptation of context and trust aware workflow oriented access control for remote healthcare T Bhattasali, R Chaki, N Chaki, K Saeed International Journal of Software Engineering and Knowledge Engineering 28 …, 2018 | 26 | 2018 |
Heuristic method of Arabic speech recognition K Saeed, M Nammous Proc. IEEE 7th Int. Conf. DSPA, 528-530, 2005 | 26 | 2005 |