0 | -- | 0 | Sabuzima Nayak, Ripon Patgiri, Thoudam Doren Singh. Big Computing: Where are we heading? |
0 | -- | 0 | Akshay Aggarwal, Aniruddha Chauhan, Deepika Kumar, Mamta Mittal, Sharad Verma. Classification of Fake News by Fine-tuning Deep Bidirectional Transformers based Language Model |
0 | -- | 0 | Virendra P. Vishwakarma, Sahil Dalal. Neuro-Fuzzy Hybridization using Modified S Membership Function and Kernel Extreme Learning Machine for Robust Face Recognition under Varying Illuminations |
0 | -- | 0 | Farhan Khan, Saqib Saqib, Pireh Soomro, Asif Ali Laghari, Kamran Ali Memon. Social Networks Mining and Analysis of Specific Groups (Political and Regional) by using API |
0 | -- | 0 | Shefali Dhingra, Poonam Bansal. A Novel & Efficient Fusion Based Image Retrieval Model for Speedy Image Recovery |
0 | -- | 0 | G. Birckan, Moisés Lima Dutra, Douglas Dyllon Jeronimo de Macedo, Angel Freddy Godoy Viera. Effects of data protection laws on data brokerage businesses |
0 | -- | 0 | Anshu Kumar Dwivedi, A. K. Sharma. FEECA: Fuzzy based Energy Efficient Clustering Approach in Wireless Sensor Network |
0 | -- | 0 | Muhammad Abbas, Kamran Ali Memon, Noor-Ul-Ain, Ekang Francis Ajebesone, Muhammad Usaid, Zulfiqar Ali Bhutto. An Improved Weighted Base Classification for Optimum Weighted Nearest Neighbor Classifiers |
0 | -- | 0 | Neha Sharma, Usha Batra. Performance analysis of compression algorithms for information security: A Review |
0 | -- | 0 | R. Bala, R. Manoharan. Enhanced Bitcoin Protocol with Effective Block Creation and Verification by Trusted Miners |
0 | -- | 0 | Bhargavi B., K. Swarupa Rani. Finding Frequent Subgraphs and Subpaths through Static and Dynamic Window Filtering Techniques |
0 | -- | 0 | A. Suryan, C. Kumar 0004, M. Mehta, R. Juneja, A. Sinha. Learning Model for Phishing Website Detection |