Manoj Diwakar

According to our database1, Manoj Diwakar authored at least 13 papers between 2011 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
CT image denoising using NLM and its method noise thresholding.
Multim. Tools Appl., 2020

Blind noise estimation-based CT image denoising in tetrolet domain.
Int. J. Inf. Comput. Secur., 2020

CT image denoising using multivariate model and its method noise thresholding in non-subsampled shearlet domain.
Biomed. Signal Process. Control., 2020

2019
Wavelet Packet Based CT Image Denoising Using Bilateral Method and Bayes Shrinkage Rule.
Proceedings of the Handbook of Multimedia Information Security: Techniques and Applications., 2019

3-D Shape Reconstruction Based CT Image Enhancement.
Proceedings of the Handbook of Multimedia Information Security: Techniques and Applications., 2019

2018
CT image denoising using NLM and correlation-based wavelet packet thresholding.
IET Image Process., 2018

A review on CT image noise and its denoising.
Biomed. Signal Process. Control., 2018

2016
A Hybrid Method Based CT Image Denoising Using Nonsubsampled Contourlet and Curvelet Transforms.
Proceedings of International Conference on Computer Vision and Image Processing, 2016

2015
CT image denoising based on complex wavelet transform using local adaptive thresholding and Bilateral filtering.
Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015

Edge Preservation Based CT Image Denoising Using Wavelet and Curvelet Transforms.
Proceedings of Fifth International Conference on Soft Computing for Problem Solving, 2015

2013
Image Security Using Cellular Automata Rules.
Proceedings of the Third International Conference on Soft Computing for Problem Solving, 2013

Cellular automata based edge-detection for brain tumor.
Proceedings of the International Conference on Advances in Computing, 2013

2011
Effective Ways of Secure, Private and Trusted Cloud Computing
CoRR, 2011


  Loading...