Author of the publication

An improved brain MR image binarization method as a preprocessing for abnormality detection and features extraction.

, , , and . Frontiers Comput. Sci., 11 (4): 717-727 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of SEM Images of Stomata of Different Tomato Cultivars Based on Morphological Features., , and . Asia International Conference on Modelling and Simulation, page 890-894. IEEE Computer Society, (2008)Identification of Plant Using Leaf Image Analysis., , , and . FGIT-SIP/MulGraB, volume 123 of Communications in Computer and Information Science, page 291-303. Springer, (2010)Handwritten Signature Authentication Scheme using Integrated Statistical Analysis of Bi-Color Images., , and . ICCSA Workshops, page 72-77. IEEE Computer Society, (2007)Discrete Fourier Transformation based Image Authentication technique., , , , , and . IEEE ICCI, page 196-200. IEEE Computer Society, (2009)Contour Extraction and Segmentation of Cerebral Hemorrhage from MRI of Brain by Gamma Transformation Approach., , and . FICTA (2), volume 328 of Advances in Intelligent Systems and Computing, page 383-394. Springer, (2014)An improved brain MR image binarization method as a preprocessing for abnormality detection and features extraction., , , and . Frontiers Comput. Sci., 11 (4): 717-727 (2017)Image Based Analysis of Tomato Leaves to Determine the Number of Petioles., , , , , and . SoCPaR, page 312-317. IEEE Computer Society, (2009)Vascular Pattern Analysis towards Pervasive Palm Vein Authentication., , , and . J. UCS, 15 (5): 1081-1089 (2009)Handwritten Signature Verification System using Morphological Image Analysis., , and . Computers and Their Applications, page 112-117. ISCA, (2007)Grayscale Image Classification Using Supervised Chromosome Clustering., , , and . FGIT-SecTech, volume 58 of Communications in Computer and Information Science, page 64-71. Springer, (2009)