Author of the publication

Role-based access control through on-demand classification of electronic health record.

, and . Int. J. Electron. Heal., 8 (1): 9-24 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Generation of Chest X-Ray Medical Imaging Reports using LSTM-CNN., , , , , , and . DSMLAI, page 80-85. ACM, (2021)Physiological Value Based Privacy Preservation of Patient's Data Using Elliptic Curve Cryptography, and . Health Informatics - An International Journal (HIIJ, 02 (01): 01-14 (February 2013)Role-based access control through on-demand classification of electronic health record., and . Int. J. Electron. Heal., 8 (1): 9-24 (2015)An Intelligent Multi-Objective Framework of Pervasive Information Computing., and . Int. J. Heal. Inf. Syst. Informatics, 13 (4): 15-27 (2018)Improving Accuracy for Intrusion Detection through Layered Approach Using Support Vector Machine with Feature Reduction., , and . WIR, page 26-31. ACM, (2016)Biosensor-Assisted Method for Abdominal Syndrome Classification Using Machine Learning Algorithm., , , , , , and . Comput. Intell. Neurosci., (2022)An Intrusion Prevention System embedded AODV to protect Mobile Adhoc Network against Sybil Attack., , , and . DSMLAI, page 57-64. ACM, (2021)A Multi-scale Retinex with Color Restoration (MSR-CR) Technique for Skin Cancer Detection., , , and . SocProS (2), volume 817 of Advances in Intelligent Systems and Computing, page 465-473. Springer, (2017)