Author of the publication

Contour Extraction and Segmentation of Cerebral Hemorrhage from MRI of Brain by Gamma Transformation Approach.

, , and . FICTA (2), volume 328 of Advances in Intelligent Systems and Computing, page 383-394. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of SEM Images of Stomata of Different Tomato Cultivars Based on Morphological Features., , and . Asia International Conference on Modelling and Simulation, page 890-894. IEEE Computer Society, (2008)Identification of Plant Using Leaf Image Analysis., , , and . FGIT-SIP/MulGraB, volume 123 of Communications in Computer and Information Science, page 291-303. Springer, (2010)An improved brain MR image binarization method as a preprocessing for abnormality detection and features extraction., , , and . Frontiers Comput. Sci., 11 (4): 717-727 (2017)Contour Extraction and Segmentation of Cerebral Hemorrhage from MRI of Brain by Gamma Transformation Approach., , and . FICTA (2), volume 328 of Advances in Intelligent Systems and Computing, page 383-394. Springer, (2014)Discrete Fourier Transformation based Image Authentication technique., , , , , and . IEEE ICCI, page 196-200. IEEE Computer Society, (2009)Handwritten Signature Authentication Scheme using Integrated Statistical Analysis of Bi-Color Images., , and . ICCSA Workshops, page 72-77. IEEE Computer Society, (2007)Handwritten Signature Authentication Using Statistical Estimation., , , and . MUE, page 77-82. IEEE Computer Society, (2008)Handwritten Signature Extraction from Watermarked Images using Genetic Crossover., , and . MUE, page 987-991. IEEE Computer Society, (2007)A Novel Steganographic Technique Based on 3D-DCT Approach., , and . Computer and Information Science, 3 (4): 229-235 (2010)Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions., , , , and . IEEE Access, (2017)