| Graph Algorithm to Find Core Periphery Structures using Mutual K-nearest Neighbors |
| Divya Sardana and Raj Bhatnagar |
| Volume : 12 volume number : 1 pdf |
| An Explanation Framework for Interpretable Credit Scoring |
| Lara Marie Demajo, Vince Vella and Alexiei Dingli |
| Volume : 12 volume number : 1 pdf |
| Towards Predicting Software Defects with Clustering Techniques |
| Waheeda Almayyan |
| Volume : 12 volume number : 1 pdf |
| Analysis of Enterprise Shared Resource Invocation Scheme based on Hadoop and R |
| Hong Xiong |
| Volume : 12 volume number : 1 pdf |
| Understanding Negative Sampling in Knowledge Graph Embedding |
| Jing Qian, Gangmin Li, Katie Atkinson and Yong Yue |
| Volume : 12 volume number : 1 pdf |
| Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern Analysis |
| Divya Sardana, Shruti Marwaha and Raj Bhatnagar |
| Volume : 12 volume number : 1 pdf |
| Software Testing: Issues and Challenges of Artificial Intelligence & Machine Learning |
| Kishore Sugali, Chris Sprunger and Venkata N Inukollu |
| Volume : 12 volume number : 1 pdf |