Author of the publication

Analyzing the Effectiveness of Several Machine Learning Methods for Heart Attack Prediction.

, , and . TCCE, page 225-236. (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sierpinski triangle based data center architecture in cloud computing., , , , and . J. Supercomput., 69 (2): 887-907 (2014)A Review of Emerging Technologies for IoT-Based Smart Cities., , , , , , , and . Sensors, 22 (23): 9271 (2022)Credit Based Task Scheduling Process Management in Fog Computing., , , , and . PACIS, page 232. (2020)Analyzing the Effectiveness of Several Machine Learning Methods for Heart Attack Prediction., , and . TCCE, page 225-236. (2022)AUASF: An Anonymous Users Authentication Scheme for Fog-IoT Environment., , , and . ICCCNT, page 1-7. IEEE, (2020)COVID-Hero: Machine Learning Based COVID-19 Awareness Enhancement Mobile Game for Children., , , , , , and . AII, page 321-335. (2021)A RESTful E-Governance Application Framework for People Identity Verification in Cloud., , , and . CLOUD, volume 10967 of Lecture Notes in Computer Science, page 281-294. Springer, (2018)DeepChestGNN: A Comprehensive Framework for Enhanced Lung Disease Identification through Advanced Graphical Deep Features., , , , , , , , , and . Sensors, 24 (9): 2830 (May 2024)A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing., , , , , and . J. Netw. Comput. Appl., (2014)An Identity-Based Encryption Scheme for Data Security in Fog Computing., , , and . IJCCI, page 215-226. Springer, (2018)