From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Intuitionistic fuzzy local binary pattern for features extraction., и . Int. J. Inf. Commun. Technol., 13 (1): 83-98 (2018)NSCT domain-based secure multiple-watermarking technique through lightweight encryption for medical images., , и . Concurr. Comput. Pract. Exp., (2021)Load and Fault Aware Honey Bee Scheduling Algorithm for Cloud Infrastructure., и . FICTA (2), том 328 из Advances in Intelligent Systems and Computing, стр. 135-143. Springer, (2014)A novel approach for security issues in VoIP networks in Virtualization with IVR, , и . CoRR, (2012)Chaotic based secure watermarking approach for medical images., , , и . Multimedia Tools Appl., 79 (7-8): 4263-4276 (2020)Fault tolerant big bang-big crunch for task allocation in cloud infrastructure., и . Int. J. Adv. Intell. Paradigms, 10 (4): 329-343 (2018)Robust and Secure Multiple Watermarking for Medical Images., , и . Wireless Personal Communications, 92 (4): 1611-1624 (2017)DNA compression using referential compression algorithm., и . IC3, стр. 64-69. IEEE Computer Society, (2015)Texture Feature Extraction Using Intuitionistic Fuzzy Local Binary Pattern., , и . J. Intell. Syst., 29 (1): 19-34 (2020)Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications., , , и . Multim. Tools Appl., 78 (3): 3457-3470 (2019)