Author of the publication

Brain Tumor Detection Using MRI Image Analysis.

, and . UCMA (2), volume 151 of Communications in Computer and Information Science, page 307-314. (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Handwritten Signature Image., , , and . FGIT-SecTech, volume 58 of Communications in Computer and Information Science, page 43-50. Springer, (2009)A New Authentication Scheme for Cloud-based Storage Applications., , and . SIN, page 57-60. ACM, (2016)Restrictive Disjoint-Link-Based Bioinspired Routing Protocol for Mobile Ad Hoc Networks., , , and . IJDSN, (2012)Performance Analysis of Adaptive Digital FPU Transmission System in Fading Environment., , and . ICIC (1), volume 4113 of Lecture Notes in Computer Science, page 1062-1071. Springer, (2006)Security Requirements for Ubiquitous Software Development Site.. KES (2), volume 4252 of Lecture Notes in Computer Science, page 836-843. Springer, (2006)A novel adaptive streaming approach for cloud-based mobile video games., , and . IWCMC, page 1072-1077. IEEE, (2017)A novel privacy technique for Augmented Reality cloud gaming based on image authentication., , and . IWCMC, page 252-257. IEEE, (2017)A novel efficient approach for protecting integrity of data aggregation in wireless sensor networks., , and . IWCMC, page 1193-1198. IEEE, (2015)At the cross roads of lattice-based and homomorphic encryption to secure data aggregation in smart grid., , , and . IWCMC, page 1067-1072. IEEE, (2019)A novel Approach for Privacy-Preserving Data Aggregation in Smart Grid., , , and . IWCMC, page 1060-1066. IEEE, (2019)