Genetic variations analysis for complex brain disease diagnosis using machine learning techniques: opportunities and hurdles

H Ahmed, L Alarabi, S El-Sappagh, H Soliman… - PeerJ Computer …, 2021 - peerj.com
Methods We used a methodology for literature surveys to obtain data from academic
databases. Criteria were defined for inclusion and exclusion. The selection of articles was …

An optimized approach for secure data transmission using spread spectrum audio steganography, chaos theory, and social impact theory optimizer

R Tanwar, K Singh, M Zamani… - Journal of computer …, 2019 - Wiley Online Library
Being easy to understand and simple to implement, substitution technique of performing
steganography has gain wide popularity among users as well as attackers. Steganography …

An analysis of 3D steganography techniques

R Tanwar, U Pilania, M Zamani, AA Manaf - Electronics, 2021 - mdpi.com
Steganography has become a preferred technique these days to successfully hide secret
messages. Various research has been done in the past to justify and analyze suitable types …

Comparison of Data Hiding Techniques for Video Watermarking Applications

F Arab, M Zamani, S Karamizadeh… - … on Computer and …, 2022 - ieeexplore.ieee.org
The basic idea for video watermarking technique is concealing information in the video host.
There are three popular techniques that can be used for data hiding those are …

A framework to evaluate the performance of video watermarking techniques

F Arab, M Zamani, S Poger… - 2019 IEEE 2nd …, 2019 - ieeexplore.ieee.org
This paper focuses on the current challenging problems of video watermarking techniques,
especially the robustness of spatial domain. This paper starts with background of the …

Genetic variants detection based on weighted sparse group lasso

K Che, X Chen, M Guo, C Wang, X Liu - Frontiers in genetics, 2020 - frontiersin.org
Identification of genetic variants associated with complex traits is a critical step for improving
plant resistance and breeding. Although the majority of existing methods for variants …

Video watermarking schemes resistance against tampering attacks

F Arab, M Zamani - 2021 International Conference on Electrical …, 2021 - ieeexplore.ieee.org
This paper reviews the video watermarking schemes resistance against tampering attacks.
There are several transform methods which are used for Video Watermarking including …

[PDF][PDF] An Analysis of 3D Steganography Techniques. Electronics 2021, 10, 2357

R Tanwar, U Pilania, M Zamani, AA Manaf - 2021 - academia.edu
Steganography has become a preferred technique these days to successfully hide secret
messages. Various research has been done in the past to justify and analyze suitable types …

[PDF][PDF] A Proposed Hybrid Intelligent Model for Analyzing Genetic Deviations

LH Jwear, SAM Ramadhan - Journal of Education and Scientific Studies, 2022 - iasj.net
The rapid growth and massive volume of human genomic data, especially Single Nucleotide
Polymorphisms (SNPs), presents challenges for biomedical researchers as well as …

[PDF][PDF] Research Article An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact …

R Tanwar, K Singh, M Zamani, A Verma, P Kumar - 2019 - academia.edu
Being easy to understand and simple to implement, substitution technique of performing
steganography has gain wide popularity among users as well as attackers. Steganography …