Author of the publication

EEG Channel Selection Using Multiobjective Cuckoo Search for Person Identification as Protection System in Healthcare Applications.

, , , , , , , , and . Comput. Intell. Neurosci., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Hybrid Cracked Tiers Detection System Based on Adaptive Correlation Features Selection and Deep Belief Neural Networks., , , , , , , , and . Symmetry, 15 (2): 358 (February 2023)Survey of Parallel Computing with MATLAB.. CoRR, (2014)Malware cyberattacks detection using a novel feature selection method based on a modified whale optimization algorithm., , , , , , , , , and . Wirel. Networks, 30 (8): 7257-7273 (November 2024)Parallelize Bubble Sort Algorithm Using OpenMP., , and . CoRR, (2014)A Review on Role of Image Processing Techniques to Enhancing Security of IoT Applications., , , , , , , , , and 2 other author(s). IEEE Access, (2023)EEG feature fusion for motor imagery: A new robust framework towards stroke patients rehabilitation., , , , , and . Comput. Biol. Medicine, (2021)EEG Channel Selection for Stroke Patient Rehabilitation Using BAT Optimizer., , , , , and . Algorithms, 17 (8): 346 (August 2024)An enhanced mechanism for detection of Domain Name System-based distributed reflection denial of service attacks depending on modified metaheuristic algorithms and adaptive thresholding techniques., , , , , and . IET Networks, 11 (5): 169-181 (2022)EEG Channel Selection Using Multiobjective Cuckoo Search for Person Identification as Protection System in Healthcare Applications., , , , , , , , and . Comput. Intell. Neurosci., (2022)Modified Flower Pollination Algorithm for ICMPv6-Based DDoS Attacks Anomaly Detection., , , , , and . ANT/EDI40, volume 220 of Procedia Computer Science, page 776-781. Elsevier, (2023)