Hossain, Naveed
51  results:
Search for persons X
?
4

Adding Knock Code Technology as a Third Authentication Elem..:

, In: 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT),
 
?
5

Cyber Security and People: Human Nature, Psychology, and Tr..:

, In: 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT),
 
?
6

Classification Accuracy Comparison between Machine Learning..:

, In: 2022 32nd Conference of Open Innovations Association (FRUCT),
 
?
7

Implementing Biometric or Graphical Password Authentication..:

, In: 2022 4th International Conference on Computer Communication and the Internet (ICCCI),
 
?
8

Traffic Flow Forecasting in Intelligent Transportation Syst..:

, In: 2022 International Conference on Futuristic Technologies (INCOFT),
 
?
9

Incident reporting in surgery: a review of the literature:

Hossain, Tanvir ; Hossain, Naveed
https://www.ijsurgery.com/index.php/isj/article/view/514/512.  , 2016
 
?
10

Guidance on writing general surgical operation notes: a rev..:

Hossain, Tanvir ; Hossain, Naveed
https://www.ijsurgery.com/index.php/isj/article/view/606/604.  , 2016
 
?
11

A Comparative Approach of Error Detection and Correction fo..:

, In: Advances in Intelligent Systems and Computing; Proceedings of Third International Conference on Sustainable Computing,
 
1-15