Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Power efficient Memetic Optimized and Adjacent Exponentially Distributed Routing in Mobile Ad Hoc Networks., and . Comput. Commun., (2020)A systematic review on early prediction of Mild cognitive impairment to alzheimers using machine learning algorithms., and . Int. J. Intell. Networks, (2023)Pixastic: Steganography based Anti-Phihsing Browser Plug-in, , and . CoRR, (2012)Dynamic Pattern Based Image Steganography, , and . CoRR, (2012)The Current State of Prescriptions and Potential Enhancements Using Blockchain., and . ICCCNT, page 1-6. IEEE, (2021)Broadening of horizons: a review of blockchains' influence on EHRs development trend., and . Int. J. Electron. Heal., 13 (2): 134-157 (2023)Stego-Image Generator (SIG) - Building Steganography Image Database, , and . CoRR, (2012)Stepping Up Internet Banking Security Using Dynamic Pattern Based Image Steganography., , and . ACC (4), volume 193 of Communications in Computer and Information Science, page 98-112. Springer, (2011)Improving Alzheimer's classification using a modified Borda count voting method on dynamic ensemble classifiers., and . Knowl. Inf. Syst., 66 (8): 4755-4787 (August 2024)Feature selection using efficient fusion of Fisher Score and greedy searching for Alzheimer's classification., and . J. King Saud Univ. Comput. Inf. Sci., 34 (8 Part A): 4993-5006 (2022)