"Systematic Analysis based on Conflux of Machine Learning and Internet of Things using Bibliometric analysis". Journal of Journal of Intelligent Systems and Internet of Things, vol. 13, no. 1, 2024, pp. 196-224. DOI: https://doi.org/10.54216/JISIoT.130115
"Personalized Liver Cancer Risk Prediction Using Big Data Analytics Techniques with Image Processing Segmentation", Computational Intelligence and Neuroscience, vol. 2022, Article ID 8154523, 11 pages, 2022. https://doi.org/10.1155/2022/8154523
"A Machine Learning-Based Big EEG Data Artifact Detection and Wavelet-Based Removal: An Empirical Approach." Mathematical Problems in Engineering 2021 (2021). Volume 2021 |Article ID 2942808 | https://doi.org/10.1155/2021/2942808
"A Prototype Classification Algorithm for Stock Price Prediction using Optimized Variance of Attributes". Mathematical Statistician and Engineering Applications, 71(4), 1574–1586. Retrieved from https://www.philstat.org/index.php/MSEA/article/view/672
"A decision tree C4.5-based voltage security events classifier for electric power systems" International Journal of Engineering Systems Modelling and SimulationVol. 13, No. 4 September 5, 2022pp 268-276 https://doi.org/10.1504/IJESMS.2022.126302
"A COMPREHENSIVE REVIEW OF THE HEART DISEASE PREDICTION CLASSIFICATION USING MACHINE LEARNING"Journal of Data Acquisition and Processing, 2023, 38 (1): 3910-3919 http://sjcjycl.cn/article/view-2023/3910.php.
"Optimized the Variation of Attribute for Stock Market Prediction Using Machine Learning". Mathematical Statistician and Engineering Applications, 71(4), 423–437. Retrieved from https://www.philstat.org/index.php/MSEA/article/view/521
"Comparison of machine learning methods for OHSUMED-F Data Set: A Cardiovascular Diseases Simulation Study." NeuroQuantology: An Interdisciplinary Journal of Neuroscience and Quantum Physics, vol. 20, no. 15, Nov. 2022, pp. 385+.
"Performance Analysis Of Load Balancing Algorithms Based On Swarm Intelligence In Cloud Computing". Design Engineering, 2515-2529. Retrieved from http://www.thedesignengineering.com/index.php/DE/article/view/5169.
"A Comprehensive Review Of Cloud Computing Security Threats And Mitigation". Design Engineering, 2530-2544. Retrieved from http://www.thedesignengineering.com/index.php/DE/article/view/5170
"DETECTION OF CYBER-ATTACKS IN CLOUD COMPUTING USING OPTIMIZATION OF TRAFFIC CONTENT AND ENSEMBLE CLASSIFIER" Stochastic Modeling & Applications,Vol. 26 No. 3 (January - June, Special Issue 2022 Part - 4) 157 Special Issue on Recent Research on Management, Applied Sciences and Technology UGC CARE APPROVED JOURNAL https://www.mukpublications.com/sma-content.php
"ADAPTIVE APPROACHES FOR IDS: A REVIEW", IJRAR - International Journal of Research and Analytical Reviews (IJRAR), E-ISSN 2348-1269, P- ISSN 2349-5138, Volume.5, Issue 4, Page No pp.361-363, December 2018, Available at : http://www.ijrar.org/IJRAR1944432.pdf
"A novel defense scheme against DDOS attack in VANET," IEEE 2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN), 2013, pp. 1-5, doi: 10.1109/WOCN.2013.6616194.
"Hybrid model for preserving brightness over the digital image processing," IEEE 2013 4th International Conference on Computer and Communication Technology (ICCCT), 2013, pp. 48-53, doi: 10.1109/ICCCT.2013.6749602.
"SMS text Compression and Encryption on Android O.S," IEEE 2014 International Conference on Computer Communication and Informatics, 2014, pp. 1-6, doi: 10.1109/ICCCI.2014.6921767.
"Effective dictionary based data compression and pattern searching in dictionary based compressed data," IEEE 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), 2013, pp. 1-6, doi: 10.1109/ICCCNT.2013.6726570.
"A survey on cost aware task allocation algorithm for cloud environment," IEEE 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC), 2017, pp. 642-646, doi: 10.1109/ISPCC.2017.8269756.
"A efficient key strategy for prolonging network lifetime in wireless network," IEEE 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), 2013, pp. 1-4, doi: 10.1109/ICCCNT.2013.6726614.
"An Efficient Approach to Categorize Data Using Improved Dendritic Cell Algorithm with Dempster Belief Theory". In: Kumar V., Bhatele M. (eds) Proceedings of All India Seminar on Biomedical Engineering 2012 (AISOBE 2012). Lecture Notes in Bioengineering. Springer, India. https://doi.org/10.1007/978-81-322-0970-6_20.
"Hybrid association-classification algorithm for anomaly extraction," IEEE2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), 2013, pp. 1-5, doi: 10.1109/ICCCNT.2013.6726644.
"Restoration of blur & noisy images using hybrid kernel-padding algorithm with transformation technique," IEEE 2013 4th International Conference on Computer and Communication Technology (ICCCT), 2013, pp. 66-71, doi: 10.1109/ICCCT.2013.6749605.
"An Efficient Approach to Categorize Data Using Improved Dendritic Cell Algorithm with Dempster Belief Theory". Proceedings of All India Seminar on Biomedical Engineering 2012 (AISOBE 2012). Lecture Notes in Bioengineering. Springer, India.doi : 10.1007/978-81-322-0970-6_20