Identification of Safety and Security Vulnerabilities in Cyber Physical Systems
|
2020 |
Vyas, Abhilasha |
Sentiment Analysis for Predicting the Popularity of Web Series
|
2020 |
Garg, Parag Kumar |
Spam Detection in Social Network Using Machine Learning Approach
|
2020 |
Chaudhry, Simran |
Exploiting the Most Similar Cases Using Decision Tree to Render Recommendation
|
2020 |
Kolankar, Piyush |
A Decision Tree Based Supervised Program Interpretation Technique for Gurmukhi Language
|
2020 |
Walia, Himdweep |
Gravitational K-Means Algorithm
|
2020 |
Ansari, Mohd. Yousuf |
Authentication of User in Connected Governance Model
|
2020 |
Ghosh, Ayanabha |
Future of Data Hiding: A Walk Through Conventional to Network Steganography
|
2020 |
Tanwar, Rohit |
Fast Information Retrieval over Encrypted Outsourced Cloud Data
|
2020 |
Arora, Vasudha |
Energy Efficient Content Based Image Retrieval Recommender System in Mobile Cloud
|
2020 |
Krishnamurthi, Rajalakshmi |
Semantic Web-Based Information Retrieval Models: A Systematic Survey
|
2020 |
Sharma, Anil |
Forecasting Movie Rating Through Data Analytics
|
2020 |
Kharb, Latika |
Using Statistical Belief Model to Analyze Outcome Using Bayesian Networks
|
2020 |
Sanga, Niharika |
Mining Frequent Itemsets over Vertical Probabilistic Dataset Using FuzzyUeclat Algorithm
|
2020 |
Rehalia, Amit |
Classification of IRIS Recognition Based on Deep Learning Techniques
|
2020 |
Goyal, Mukta |
Automated Mucous Glands Detection and Segmentation in Colon Histology Images Using Semantic Segmentation
|
2020 |
Dabass, Manju |
Hierarchical Bayesian Compressed Sensing of Sparse Signals
|
2020 |
Sharma, Shruti |
Data Acquisition for Effective E-Governance: Nigeria, a Case Study
|
2020 |
Edikan, Ekong |
Blockchain Secured "Smart Buildings" as Cyber Physical Systems
|
2020 |
Tiwari, Anupam |
Accessible and Ethical Data Annotation with the Application of Gamification
|
2020 |
Gurav, Vedant |