Author of the publication

Recurrent Neural Networks in Medical Data Analysis and Classifications

, , and . Applied Computing in Medicine and Health, chapter 7, Elsevier and Morgan Kaufmann, Amsterdam, (2016)
DOI: 10.1016/B978-0-12-803468-2.00007-2

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving the barrier of communication between healthcare professionals and their patients using a Prescription Tracking System., , , and . IWSSIP, page 282-286. IEEE, (2015)Deep COLA: A Deep COmpetitive Learning Algorithm for Future Home Energy Management Systems., , , , and . IEEE Trans. Emerg. Top. Comput. Intell., 5 (6): 860-870 (2021)Virtual reality forensics: Forensic analysis of Meta Quest 2., , and . Forensic Sci. Int. Digit. Investig., (December 2023)CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things., , , , , and . IEEE Internet Things J., 6 (3): 5432-5445 (2019)Drone Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models., , , , , , and . Int. J. Digit. Crime Forensics, 13 (1): 1-25 (2021)Privacy Preserving Issues in the Dynamic Internet of Things (IoT)., , , , and . ISNCC, page 1-6. IEEE, (2020)Methods and techniques to support the development of fraud detection system., , , , and . IWSSIP, page 224-227. IEEE, (2015)Evaluating the effects of cascading failures in a network of critical infrastructures., and . Int. J. Syst. Syst. Eng., 6 (3): 221-236 (2015)A secure fog-based platform for SCADA-based IoT critical infrastructure., , , , , , , and . Softw. Pract. Exp., 50 (5): 503-518 (2020)Detecting Intrusions in Federated Cloud Environments Using Security as a Service., , and . DeSE, page 91-96. IEEE, (2015)