Author of the publication

Improved Enhancement Scheme Using a RBFN Detector for Impulse Noise.

, , , and . ICETET, page 86-89. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Indexing Scheme for Iris Biometric Using K-d-b Trees., and . ICIC (2), volume 7996 of Lecture Notes in Computer Science, page 475-484. Springer, (2013)Cryptanalysis and Enhancement of an Anonymous Self-Certified Key Exchange Protocol., , and . Wirel. Pers. Commun., 99 (2): 863-891 (2018)An Efficient Two-Party Identity-Based Key Exchange Protocol based on ECDLP., and . IACR Cryptology ePrint Archive, (2009)Support vector regression based image restoration., and . FUZZ-IEEE, page 1-8. IEEE, (2013)IAMMAC: an interference-aware multichannel MAC protocol for wireless sensor-actor networks., , and . Int. J. Commun. Syst., 29 (4): 801-822 (2016)A Strong Designated Verifiable DL Based Signcryption Scheme., and . J. Inf. Process. Syst., 8 (4): 567-574 (2012)Real-time iris segmentation based on image morphology., , and . ICCCS, page 335-338. ACM, (2011)Improved offline signature verification scheme using feature point extraction method., , , and . IEEE ICCI, page 475-480. IEEE Computer Society, (2008)An ID-based Non-Interactive Deniable Authentication Protocol based on ECC., , and . ICCNS, page 48-52. ACM, (2017)Single image super resolution for texture images through neighbor embedding., , , , and . Multim. Tools Appl., 79 (13-14): 8337-8366 (2020)