Author of the publication

A drug review on potency of Azhingil Vithai Thailam, Siddha Polyherbo formulation in the management of Ceganavatham

, , , and . World Journal of Biology Pharmacy and Health Sciences, 17 (3): 180–185 (May 2024)
DOI: 10.30574/wjbphs.2024.17.3.0121

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A drug review on potency of Azhingil Vithai Thailam, Siddha Polyherbo formulation in the management of Ceganavatham, , , and . World Journal of Biology Pharmacy and Health Sciences, 17 (3): 180–185 (May 2024)Deep learning models for digital image processing: a review., and . Artif. Intell. Rev., 57 (1): 11 (January 2024)Multilevel scheduling mechanism for a stochastic fog computing environment using the HIRO model and RNN., and . Sustain. Comput. Informatics Syst., (September 2023)Design of CMOS Based Biosensor for Implantable Medical Devices., , , and . VDAT, volume 892 of Communications in Computer and Information Science, page 695-704. Springer, (2018)Corrigendum to: "Multilevel scheduling mechanism for a stochastic fog computing environment using the HIRO model and RNN" Sustainable Computing: Informatics and Systems Volume 39, September (2023)100887., and . Sustain. Comput. Informatics Syst., (2024)Design and Development of the Graphology-based Career Analysis and Prediction System (G-CAPS) for Engineering Students., , and . EDUCON, page 1-5. IEEE, (2023)Analysis of COVID-19 Detection Algorithms Based on Convolutional Neural Network Models Using Chest X-ray Images., and . ICACDS (2), volume 1614 of Communications in Computer and Information Science, page 52-63. Springer, (2022)Long-term Effects of Disasters on Seniors With Diabetes: Evidence From Hurricanes Katrina and Rita, and . (2019)Protecting Big Data Sets from Unauthorized Users on Cloud., , , and . RTIP2R (1), volume 1380 of Communications in Computer and Information Science, page 334-349. Springer, (2020)Research Challenges in Big Data Security with Hadoop Platform., , , and . RTIP2R (3), volume 1037 of Communications in Computer and Information Science, page 550-560. Springer, (2018)