Author of the publication

A precision-based diagnostic model ADOBE-accurate detection of breast cancer using logistic regression approach.

, , , , and . J. Intell. Fuzzy Syst., 39 (6): 8419-8426 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and development of reversible data hiding- homomorphic encryption & rhombus pattern prediction approach., and . Multim. Tools Appl., 82 (30): 46269-46292 (December 2023)Reversible data hiding in an encrypted image using the homomorphic property of elliptic curve cryptography., and . J. Intell. Fuzzy Syst., 41 (5): 5583-5594 (2021)Separable reversible data hiding in an encrypted image using the adjacency pixel difference histogram., and . J. Inf. Secur. Appl., (2023)A high payload separable reversible data hiding in cipher image with good decipher image quality., , , and . J. Intell. Fuzzy Syst., 38 (5): 6403-6414 (2020)A precision-based diagnostic model ADOBE-accurate detection of breast cancer using logistic regression approach., , , , and . J. Intell. Fuzzy Syst., 39 (6): 8419-8426 (2020)Uncover the cover to recover the hidden secret - A separable reversible data hiding framework., , , and . Multim. Tools Appl., 80 (13): 19695-19714 (2021)Privacy-Preserving Authentication Scheme Using Reduced-Advanced Encryption Standard for Vehicular Ad Hoc Network., , , and . ATIS, volume 1116 of Communications in Computer and Information Science, page 254-265. Springer, (2019)Reversible data hiding method based on pixel expansion and homomorphic encryption., , , and . J. Intell. Fuzzy Syst., 39 (3): 2977-2990 (2020)Chapter Ten - A smart framework through the Internet of Things and machine learning for precision agriculture., , and . Adv. Comput., (2022)An Image Mathcrypt - A Flawless Security via Flawed Image., , and . ATIS, volume 1116 of Communications in Computer and Information Science, page 16-31. Springer, (2019)