Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Bibek Ranjan Ghosh"'
Autor:
BIBEK RANJAN GHOSH
Publikováno v:
BIBEK RANJAN GHOSH
Publikováno v:
Journal of Mathematical Sciences & Computational Mathematics. 3:279-285
A brain tumor is an abnormal tissue growth in the brain in which cells grow and multiply uncontrollably. The main aim of our task is to identify brain tumor from a particular MRI image and to extract the tumor region. The proposed method uses various
Publikováno v:
International Journal of Computer Sciences and Engineering. 10:22-26
Publikováno v:
Iraqi Journal of Science. :3690-3696
Machine learning-based techniques are used widely for the classification of images into various categories. The advancement of Convolutional Neural Network (CNN) affects the field of computer vision on a large scale. It has been applied to classify a
Publikováno v:
2022 International Conference on Inventive Computation Technologies (ICICT).
Publikováno v:
Smart Computing and Informatics ISBN: 9789811055430
Determination of the WBC count of the body necessitates the detection of white blood cells (leukocytes). During an annual physical checkup, generally doctors prescribe for a complete blood count report. WBC count is required to determine the existenc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fc465f796b1a79706b195f838d7f9411
https://doi.org/10.1007/978-981-10-5544-7_2
https://doi.org/10.1007/978-981-10-5544-7_2
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783319120119
FICTA (2)
FICTA (2)
Steganography and steganalysis are important topics in information hiding. Steganography refers to the technology of hiding data into digital media without making any visual distortion on the media. On the other hand steganalysis is the art of detect
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8b859b18913c720b996329ff3d9a8ce2
https://doi.org/10.1007/978-3-319-12012-6_20
https://doi.org/10.1007/978-3-319-12012-6_20
Publikováno v:
2014 2nd International Conference on Business and Information Management (ICBIM).
Handwritten signature is being used in various applications on daily basis. The problem arises when someone decides to imitate our signature and steal our identity. In different area these signature are verified by human being. But the outcomes depen