Author of the publication

Generalized Gaussian model-based reconstruction method of computed tomography image from fewer projections.

, and . Signal Image Video Process., 14 (3): 547-555 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

De-Anonymisation Attacks on Tor: A Survey., , , , and . IEEE Commun. Surv. Tutorials, 23 (4): 2324-2350 (2021)Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach., , , , and . CoRR, (2022)Standardization of Personal Health Records in the Portable Health Clinic System., , , , , , , , , and 1 other author(s). MedInfo, volume 290 of Studies in Health Technology and Informatics, page 163-167. IOS Press, (2021)Applying Zero Trust Architecture and Probability-Based Authentication to Preserve Security and Privacy of Data in the Cloud., , , and . Emerging Trends in Cybersecurity Applications, Springer International Publishing, (2023)Real-Time Detection of TOR Attacks from the Dark Web., , , and . ICR, volume 1431 of Advances in Intelligent Systems and Computing, page 346-355. Springer, (2022)An Intelligent Diagnostic System to Analyze Early-Stage Chronic Kidney Disease for Clinical Application., , and . Appl. Comput. Intell. Soft Comput., (2023)Bangla to English Translation Using Sequence to Sequence Learning Model Based Recurrent Neural Networks., , , and . MIET (1), volume 490 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 458-467. Springer, (2022)Restoration approach of 3D ultrasound images using complex wavelet-based Laplacian-TV mixture prior., , , , , , and . Comput. methods Biomech. Biomed. Eng. Imaging Vis., 5 (6): 427-437 (2017)Anonymity with Tor: A Survey on Tor Attacks., , , , and . CoRR, (2020)Enhancing Data Security for Cloud Computing Applications through Distributed Blockchain-based SDN Architecture in IoT Networks., , , , , , , , , and 1 other author(s). CoRR, (2022)