Author of the publication

Robust and effective image preprocessing conglomerate method for denoising of both grayscale and color images.

, , and . J. Electronic Imaging, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing pairing-based cryptography on smartcards.. Int. J. Inf. Comput. Secur., 5 (1): 68-76 (2012)An efficient algorithm for data security in Cloud storage., , , , and . ISDA, page 421-427. IEEE, (2015)Dew-Cloud-Based Hierarchical Federated Learning for Intrusion Detection in IoMT., , , , and . IEEE J. Biomed. Health Informatics, 27 (2): 722-731 (February 2023)Machine Learning Analytic-Based Two-Staged Data Management Framework for Internet of Things., , , , and . Sensors, 23 (5): 2427 (March 2023)Decentralized SGX-Based Cloud Key Management., , , and . NSS, volume 13983 of Lecture Notes in Computer Science, page 327-341. Springer, (2023)An Uncertainty Trust Assessment Scheme for Trustworthy Partner Selection in Online Games., , and . IEEE Access, (2022)A secure and lightweight container migration technique in cloud computing., , , and . J. King Saud Univ. Comput. Inf. Sci., 36 (1): 101887 (January 2024)A Survey on Soybean Seed Varieties and Defects Identification Using Neural Network., , , and . ACI@ISIC, volume 3283 of CEUR Workshop Proceedings, page 61-69. CEUR-WS.org, (2022)Efficient and Secure Implementation of BLS Multisignature Scheme on TPM., and . ISI, page 1-6. IEEE, (2020)Many-to-one matching game towards secure virtual machines migration in cloud computing., , , , and . ACOSIS, page 1-7. IEEE, (2016)