111 | -- | 117 | Bijayalaxmi Panda, Chhabi Rani Panigrahi, Bibudhendu Pati. Patient reviews analysis using machine learning |
118 | -- | 128 | Rachana Y. Patil, Yogesh H. Patil. A proxy signcryption scheme for secure sharing of industrial IoT data in fog environment |
129 | -- | 142 | Kalyani Nikhilesh Pampattiwar, Pallavi Vijay Chavan. CBSOACH: design of an efficient consortium blockchain-based selective ownership and access control model with vulnerability resistance using hybrid decision engine |
143 | -- | 156 | Onkar Thorat, Ramchandra S. Mangrulkar. Combining DNA sequences and chaotic maps to improve robustness of RGB image encryption |
157 | -- | 170 | Somenath Mukherjee, Bikash Sadhukhan, Arghya Kusum Das, Abhra Chaudhuri. Hurst exponent estimation using neural network |
171 | -- | 181 | Naga Deepti Ponnaganti, Raju Anitha. Enhancement of classification and prediction accuracy for breast cancer detection using fast convolution neural network with ensemble algorithm |
182 | -- | 191 | Tanu Gupta, Ela Kumar. Improved class-specific vector for biomedical question type classification |
192 | -- | 198 | Yinxia Zhuang, Yapeng Sun, Han Deng, Jun Guo. Research on big data access control mechanism |
199 | -- | 209 | Zheng Huo, Teng Wang, Yilin Fan, Ping He. Privacy-preserving global user profile construction through federated learning |
210 | -- | 219 | Yu'e Lin, Zhiyuan Ren, Xingzhu Liang, Shunxiang Zhang. 2,1-norm regularisation for face recognition |
220 | -- | 230 | Hong Zhang, Yuan Chen, Xiyue Yan, Han Deng. Research on credit risk evaluation of B2B platform supply chain financing enterprises based on improved TOPSIS |