Author of the publication

First Level Text Prediction using Data Mining and Letter Matching in IEEE 802.11 Mobile Devices.

. SCSS (1), page 319-324. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks.. CoRR, (2014)Are machine learning based intrusion detection system always secure? An insight into tampered learning., , and . J. Intell. Fuzzy Syst., 35 (3): 3635-3651 (2018)Intrusion Detection and Response System Inspired by the Defense Mechanism of Plants., , and . IEEE Access, (2019)The mobile devices and its mobile learning usage analysis., and . CoRR, (2014)Analysis of Intelligent Classifiers and Enhancing the Detection Accuracy for Intrusion Detection System., and . Int. J. Comput. Intell. Syst., 8 (5): 841-853 (2015)Multi-Population Differential Evolution for Retinal Blood Vessel Segmentation., , , , and . ICARCV, page 424-429. IEEE, (2018)A Semi-Supervised Learning Approach for Tackling Twitter Spam Drift., , and . Int. J. Comput. Intell. Appl., 18 (2): 1950010:1-1950010:17 (2019)Performance comparison of intrusion detection systems and application of machine learning to Snort system., and . Future Gener. Comput. Syst., (2018)A Local Differential Privacy based Hybrid Recommendation Model with BERT and Matrix Factorization., , , , and . SECRYPT, page 325-332. SCITEPRESS, (2022)Ok-NB: An Enhanced OPTICS and k-Naive Bayes Classifier for Imbalance Classification With Overlapping., , and . IEEE Access, (2024)