35
Views
1
CrossRef citations to date
0
Altmetric
Research Article

Multi-ROI segmentation for effective texture features of mammogram images

&

References

  • J.K. Wolf, A.M. Viterbi and G.S. Dixson, “Finding the best set of K paths through a trellis with application to multitarget tracking”, IEEE Trans. on Aerospace and Electronic Systems, pp.287-295, vol. AES-25, no.2, 1989.
  • O. Etzioni and D. Weld, “A Softbot-Based Interface to the Internet,” Communications of the ACM, vol 37, pp. 72-79, 1994.
  • L. Alvarez, F. Guichard, P. L. Lions, and J. M. Morel, Axiomes et ‘equations fundamentals du traitement d‘images, C. R. Acad. Sci. Paris 315 (1992), 135–138
  • T. E. de Campos, B. R. Babu, and M. Varma, “Character recognition in natural images,” in Proceedings of the International Conference on Computer Vision Theory and Applications, Lisbon, Portugal, February 2009
  • Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in NIPS, 2012, pp. 1097– 1105.
  • K Rajendra Prasad, C Raghavendra, K Sai Saranya, “A review on classification of breast cancer detection using combination of the feature extraction models”, International Journal of Pure and Applied Mathematics, Vol.116, Issue.21, 2017
  • C Nalini, C Raghavendra, K Rajendra Prasad, “Comparative observation and performance analysis of multiple algorithms on Iris data”, International Journal of Pure and Applied Mathematics, Vol.116, Issue.9, 2017
  • Karali, O. Okman, and T. Aytac, “Adaptive enhancement of infrared images containing sea surface targets,” in Signal Processing and Communications Applications Conference (SIU), 2010 IEEE 18th, pp. 605–608, April 2010.
  • Pankaj Dadheech, Ankit Kumar, Chothmal Choudhary, Mahender Kumar Beniwal, Sanwta Ram Dogiwal & Basant Agarwal (2019), “An Enhanced 4-Way Technique Using Cookies for Robust Authentication Process in Wireless Network”, Journal of Statistics and Management Systems, 22:4, 773-782, DOI: https://doi.org/10.1080/09720510.2019.1609557.
  • Ankit Kumar, Pankaj Dadheech, Vijander Singh, Linesh Raja & Ramesh C. Poonia (2019), “An Enhanced Quantum Key Distribution Protocol for Security Authentication”, Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 499-507, DOI: https://doi.org/10.1080/09720529.2019.1637154.
  • Ankit Kumar, Pankaj Dadheech, Vijander Singh, Ramesh C. Poonia & Linesh Raja (2019), “An Improved Quantum Key Distribution Protocol for Verification”, Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 491-498, DOI: https://doi.org/10.1080/09720529.2019.1637153.
  • Ankit Kumar and Madhavi Sinha (2019), “Design and analysis of an improved AODV protocol for black hole and flooding attack in vehicular ad-hoc network (VANET)”, Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 453-463, DOI: https://doi.org/10.1080/09720529.2019.1637151.
  • Ankit Kumar & Madhavi Sinha (2019) Design and development of new framework for detection and mitigation of wormhole and black hole attacks in VANET, Journal of Statistics and Management Systems, 22:4, 753-761, DOI: https://doi.org/10.1080/09720510.2019.1609555
  • Ankit Kumar, Pankaj Dadheech, Rajani Kumari & Vijander Singh (2019) Anenhanced energy efficient routing protocol for VANET using special cross over in genetic algorithm, Journal of Statistics and Management Systems, 22:7, 1349-1364, DOI: https://doi.org/10.1080/09720510.2019.1618519

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.