Blockchain Secured "Smart Buildings" as Cyber Physical Systems
|
2020 |
Tiwari, Anupam |
Accessible and Ethical Data Annotation with the Application of Gamification
|
2020 |
Gurav, Vedant |
Exploring the Possibility of Sybil Attack in Position Based Routing Protocols in VANETSs: A Case Study of Greedy Perimeter Coordinator Routing (GPCR)
|
2020 |
Nishtha |
Iris Based Secured Newfangled System Procuring Miniaturized Prorogation
|
2020 |
Afzal, Ayesha Hena |
CBCT: CryptoCurrency Based Blockchain Technology
|
2020 |
Johari, Rahul |
Identification of Salient Attributes in Social Network: A Data Mining Approach
|
2020 |
Mittal, Ruchi |
Big Data Cluster Service Discovery: A System Application for Big Data Cluster Security Analysis
|
2020 |
Paul, Swagata |
Importance of Web Analytics for the Success of a Startup Business
|
2020 |
Chitkara, Bhavook |
Experimental Analysis of Convolutional Neural Networks and Capsule Networks for Image Classification
|
2020 |
Bali, Shweta |
Identification of Safety and Security Vulnerabilities in Cyber Physical Systems
|
2020 |
Vyas, Abhilasha |
Sentiment Analysis for Predicting the Popularity of Web Series
|
2020 |
Garg, Parag Kumar |
Spam Detection in Social Network Using Machine Learning Approach
|
2020 |
Chaudhry, Simran |
Exploiting the Most Similar Cases Using Decision Tree to Render Recommendation
|
2020 |
Kolankar, Piyush |
A Decision Tree Based Supervised Program Interpretation Technique for Gurmukhi Language
|
2020 |
Walia, Himdweep |
Gravitational K-Means Algorithm
|
2020 |
Ansari, Mohd. Yousuf |
Authentication of User in Connected Governance Model
|
2020 |
Ghosh, Ayanabha |
Future of Data Hiding: A Walk Through Conventional to Network Steganography
|
2020 |
Tanwar, Rohit |
Fast Information Retrieval over Encrypted Outsourced Cloud Data
|
2020 |
Arora, Vasudha |
Energy Efficient Content Based Image Retrieval Recommender System in Mobile Cloud
|
2020 |
Krishnamurthi, Rajalakshmi |
Semantic Web-Based Information Retrieval Models: A Systematic Survey
|
2020 |
Sharma, Anil |