Author of the publication

Identification of Plant Using Leaf Image Analysis.

, , , and . FGIT-SIP/MulGraB, volume 123 of Communications in Computer and Information Science, page 291-303. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of SEM Images of Stomata of Different Tomato Cultivars Based on Morphological Features., , and . Asia International Conference on Modelling and Simulation, page 890-894. IEEE Computer Society, (2008)Discrete Fourier Transformation based Image Authentication technique., , , , , and . IEEE ICCI, page 196-200. IEEE Computer Society, (2009)Contour Extraction and Segmentation of Cerebral Hemorrhage from MRI of Brain by Gamma Transformation Approach., , and . FICTA (2), volume 328 of Advances in Intelligent Systems and Computing, page 383-394. Springer, (2014)Identification of Plant Using Leaf Image Analysis., , , and . FGIT-SIP/MulGraB, volume 123 of Communications in Computer and Information Science, page 291-303. Springer, (2010)Handwritten Signature Authentication Scheme using Integrated Statistical Analysis of Bi-Color Images., , and . ICCSA Workshops, page 72-77. IEEE Computer Society, (2007)Extraction of Features from Signature Image and Signature Verification Using Clustering Techniques., , , and . SUComS, volume 78 of Communications in Computer and Information Science, page 493-503. Springer, (2010)Supervised chromosome clustering and image classification., , and . Future Gener. Comput. Syst., 27 (4): 372-376 (2011)A Secure Scheme for Image Transformation., , , , and . SNPD, page 490-493. IEEE Computer Society, (2008)Application of Non Compact Trie Structure in Plant Taxonomy., and . CATA, page 145-150. ISCA, (2007)Discrete Cosine Transformation Based Image Authentication and Secret Message Transmission Scheme., , , , and . CICSyN, page 374-379. IEEE Computer Society, (2009)