TIME | ID | TITLE | AUTHORS |
---|---|---|---|
1.15 | 17 | Software Bug Categorization Technique Based on Fuzzy Similarity | Rama Ranjan Panda and Naresh Kumar Nagwani |
1.27 | 40 | Software bug count prediction via AdaBoost.R-ET | Meetesh Nevendra and Pradeep Singh |
1.39 | 52 | Solving Clustering and Classification Problems Using Gravitational Search Algorithm | Sajad Ahmad Rather, Mohammad Shahid and P Shanthi Bala |
1.51 | 70 | Performance Evaluation of Feature Extraction and Dimensionality Reduction Techniques on Various machine learning classifiers | Md. Golam Sarowar, Arthy Anjum Jamal, Anik Saha, Abir Saha and Naziat Shahrin Rafi |
2.03 | 93 | Multi Platform Honeypot for Generation of Cyber Threat Intelligence | Sanjeev Kumar and Janet B |
2.15 | 13 | Image Encryption And Decryption Using Chaotic System | Swathika Elango, Karthika Natarajan and Janet Barnabas |
2.27 | 111 | Estimation of rooftop solar potential using satellite image segmentation | Adithya Sampath, Pranav Bijapur, Akshath Karanam, V Umadevi and Meena Parathodiyil |