0 | -- | 0 | Sandeep U. Mane, Amol C. Adamuthe, Rajshree R. Omane. Master-Slave TLBO Algorithm for Constrained Global Optimization Problems |
0 | -- | 0 | Muhammad Hassan Ghulam Muhammad, Tahir Alyas, Faraz Ahmad, Fatima Hassan Butt, Wajahat Mahmood Qazi, Shazia Saqib. An analysis of security challenges and their perspective solutions for cloud computing and IoT |
0 | -- | 0 | Franklin Tchakounté, Virgile Simé Nyassi, Duplex Elvis Houpa Danga, Kalum Priyanath Udagepola, Marcellin Atemkeng. A Game Theoretical Model for Anticipating Email Spear-Phishing Strategies |
0 | -- | 0 | Anuj Yadav, Ritika, Madan Lal Garg. SecHMS- A Secure Hybrid Monitoring Scheme for Cloud Data Monitoring |
0 | -- | 0 | Shashank Srivastav, P. K. Singh, Divakar Yadav. An approach for fast compressed text matching and to avoid false matching using WBTC and wavelet tree |
0 | -- | 0 | Muhammad Adnan 0006, Asad Habib, Jawad Ashraf, Shafaq Mussadiq, Arsalan Ali Raza. Scaffolding computer programming languages learning with tailored English vocabulary based on learners' performance states |
0 | -- | 0 | Nancy Kansal, Lipika Goel, Sonam Gupta. Cross-domain sentiment classification initiated with Polarity Detection Task |
0 | -- | 0 | Angela M. Lonzetta, Thaier Hayajneh. Challenges of Complying with Data Protection and Privacy Regulations |