Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs, , , , and . CoRR, (2012)Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest., , and . Secur. Commun. Networks, (2018)Multi-scale CNN based on region proposals for efficient breast abnormality recognition., and . Multimedia Tools Appl., 78 (10): 12939-12960 (2019)BG-3DM2F: Bidirectional gated 3D multi-scale feature fusion for Alzheimer's disease diagnosis., , , and . Multim. Tools Appl., 81 (8): 10743-10776 (2022)A Fragile Watermarking Scheme for Image Authentication Using Wavelet Transform., and . ICISP, volume 9680 of Lecture Notes in Computer Science, page 337-345. Springer, (2016)Towards a new approach of measure of skills applied to an adaptive assessments system used in e-learning and e-recruitment., and . AICCSA, page 1-4. IEEE Computer Society, (2013)Enhancing road signs detection rate using Multi-Scale Retinex., , , and . ICMCS, page 338-341. IEEE, (2012)Secure and Image Retrieval based on Multipurpose Watermarking for Mammography Images Database., , and . CoRR, (2014)Semi-supervised machine learning approach for DDoS detection., , and . Appl. Intell., 48 (10): 3193-3208 (2018)Containers Placement and Migration on Cloud System., and . CoRR, (2020)