Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Intelligent Energy Routing Protocol in Wireless Sensor Networks., , , , and . IJDSN, (2015)Data Hiding Method Based on DNA Basic Characteristics., , and . DEIS, volume 194 of Communications in Computer and Information Science, page 53-62. Springer, (2011)Coronary Heart Disease Diagnosis Through Self-Organizing Map and Fuzzy Support Vector Machine with Incremental Updates., , , , , , , and . Int. J. Fuzzy Syst., 22 (4): 1376-1388 (2020)Nearest Neighbor For Histogram-based Feature Extraction., , and . ICCS, volume 4 of Procedia Computer Science, page 1296-1305. Elsevier, (2011)Factors influencing medical tourism adoption in Malaysia: A DEMATEL-Fuzzy TOPSIS approach., , , , , , , , and . Comput. Ind. Eng., (2019)A Robust Double Layer Steganography Technique Based on DNA Sequences., , and . ICFNDS, page 38:1-38:5. ACM, (2020)A taxonomy of trust oriented approaches for services computing., , , , and . iiWAS, page 353-358. ACM, (2011)Security Evaluation for Graphical Password., , , and . DICTAP (1), volume 166 of Communications in Computer and Information Science, page 431-444. Springer, (2011)Investigation of Touch-Based User Authentication Features Using Android Smartphone., and . AMLTA, volume 488 of Communications in Computer and Information Science, page 135-144. Springer, (2014)Framework for Video Steganography Using Integer Wavelet Transform and JPEG Compression., , , and . Future Internet, 14 (9): 254 (2022)