1 |
Analysis of the Effectiveness of Several Intrusion Detection Methods that Use Supervised Machine Learning
Author(s): Manjula C. Belavagi DOI : https://ijesr.org.2020.v10.i03.pp01-07 |
1-7 |
|
2 |
Understanding Health Management Information Systems with a 3D Role-Playing Game for Undergraduate Computer Science Students
Author(s): Paul A. Walcott, Nadia R. Corbin DOI : https://ijesr.org.2020.v10.i03.pp08-13 |
8-13 |
|
3 |
“IMAGE SUPER-RESOLUTION USING SUPERRESOLUTION CONVOLUTIONAL NEURAL NETWORKS
Author(s): Kadari Neeraja ,Bommai Meenakshi DOI : https://ijesr.org.2023.v10.i03.pp01-14 |
1-14 |
|
4 |
Improving Modeling for Autonomous Machine Learning with a Task Ontology
Author(s): Mrs.K Vandana , Mrs. Tasleem Sultana , Mrs. Matheen Sultana DOI : https://ijesr.org.2023.v10.i03.pp01-8 |
1-8 |
|