Author of the publication

In silico prediction of deleterious single amino acid polymorphisms from amino acid sequence.

, , , , , , , , and . J. Comput. Chem., 32 (7): 1211-1216 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improved biometrics based authentication scheme using extended chaotic maps for multimedia medicine information systems., , and . Multimedia Tools Appl., 76 (22): 24315-24341 (2017)Reinforcement learning based tasks offloading in vehicular edge computing networks., , , , , , and . Comput. Networks, (October 2023)Plasmodium vivax readiness to transmit: implication for malaria eradication., , , , , and . BMC Syst. Biol., 13 (1): 5:1-5:12 (2019)Comparison and Experimental Verification of Different Approaches to Suppress Torque Ripple and Vibrations of Interior Permanent Magnet Synchronous Motor for EV., , , and . IEEE Trans. Ind. Electron., 70 (3): 2209-2220 (2023)Interior Permanent Magnet Synchronous Machines With Composed T-Shaped Notching Rotor., , , , , and . IEEE Trans. Ind. Electron., 71 (6): 5519-5529 (June 2024)An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism., , and . KSII Trans. Internet Inf. Syst., 11 (3): 1785-1801 (2017)Different Rotor Segmented Approaches for Electromagnetic Vibration and Acoustic Noise Mitigation in Permanent Magnet Drive Motor: A Comparative Study., , , , , and . IEEE Trans. Ind. Electron., 71 (2): 1223-1233 (February 2024)A sequence-based computational model for the prediction of the solvent accessible surface area for α-helix and β-barrel transmembrane residues., , , , and . J. Comput. Chem., 33 (1): 11-17 (2012)Computational Identification of Active Enhancers in Model Organisms., , and . Genom. Proteom. Bioinform., 11 (3): 142-150 (2013)An efficient image encryption algorithm based on a novel chaotic map., , and . Multim. Tools Appl., 76 (22): 24251-24280 (2017)