{"id":8354,"date":"2022-12-01T03:27:40","date_gmt":"2022-12-01T03:27:40","guid":{"rendered":"https:\/\/bvcoend.ac.in\/?page_id=8354"},"modified":"2023-03-22T08:59:53","modified_gmt":"2023-03-22T08:59:53","slug":"research-publication-a-y-2022-23","status":"publish","type":"page","link":"https:\/\/bvcoend.ac.in\/index.php\/research-publication-a-y-2022-23\/","title":{"rendered":"RESEARCH PUBLICATION A.Y 2022-23"},"content":{"rendered":"[vc_row][vc_column width=&#8221;1\/4&#8243;][vc_wp_custommenu title=&#8221;Imp Links&#8221; nav_menu=&#8221;67&#8243;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text]\n<table border=\"1\">\n<tbody>\n<tr>\n<td><span style=\"color: #000000;\"><b>S. No.<\/b><\/span><\/td>\n<td><span style=\"color: #000000;\"><b>Faculty name<\/b><\/span><\/td>\n<td><span style=\"color: #000000;\"><b>Paper Title<\/b><\/span><\/td>\n<td><span style=\"color: #000000;\"><b>Doi<\/b><\/span><\/td>\n<td><span style=\"color: #000000;\"><b>Indexing<\/b><\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400; color: #000000;\">1<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Preeti Nagrath<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">First Inning score prediction of an IPL match using Machine learning<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.1063\/5.0108928\"><span style=\"font-weight: 400;\">https:\/\/doi.org\/10.1063\/5.0108928<\/span><\/a><\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400; color: #000000;\">2<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Preeti Nagrath<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Stock prediction and recommendation system using KNN and linear regression<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.1063\/5.0108799\"><span style=\"font-weight: 400;\">https:\/\/doi.org\/10.1063\/5.0108799<\/span><\/a><\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400; color: #000000;\">3<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Preeti Nagrath<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Sign Language detection and conversion to text using CNN and Open CV<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.1063\/5.0108711\"><span style=\"font-weight: 400;\">https:\/\/doi.org\/10.1063\/5.0108711<\/span><\/a><\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400; color: #000000;\">4<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Preeti Nagrath<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Sentiment Analysis of Reviews Using Bi-LSTM Using a Fine-Grained Approach<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.1007\/978-981-19-3148-2_71\">https:\/\/doi.org\/10.1007\/978-981-19-3148-2_71<\/a><\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400; color: #000000;\">5<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Preeti Nagrath<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Hate and Aggression Analysis in NLP with Explainable AI<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.1142\/S0218001422590364\"><span style=\"font-weight: 400;\">https:\/\/doi.org\/10.1142\/S0218001422590364<\/span><\/a><\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">SCIE<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400; color: #000000;\">6<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Deepika Kumar<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">A median based quadrilateral local quantized ternary pattern technique for the classification of dermatoscopic images of skin cancer<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108259\"><span style=\"font-weight: 400;\">https:\/\/doi.org\/10.1016\/j.compeleceng.2022.108259<\/span><\/a><\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">SCIE<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400; color: #000000;\">7<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Vishal Sharma<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">A Social Network Approach for Automated Generation of YouTube Playlists<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"http:\/\/10.1109\/ICDSIS55133.2022.9916006\"><span style=\"font-weight: 400;\">10.1109\/ICDSIS55133.2022.9916006<\/span><\/a><\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400; color: #000000;\">8<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">LCIPA: Lightweight clustering protocol for industry 4.0 enabled precision agriculture<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"http:\/\/10.1016\/j.micpro.2022.104633\"><span style=\"font-weight: 400;\">10.1016\/j.micpro.2022.104633<\/span><\/a><\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">SCIE<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400; color: #000000;\">9<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Detection of Malicious Cloud Bandwidth Consumption in Cloud Computing Using Machine Learning Techniques<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.1155\/2022\/4003403\"><span style=\"font-weight: 400;\">https:\/\/doi.org\/10.1155\/2022\/4003403<\/span><\/a><\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">SCIE<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400; color: #000000;\">10<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">An Efficient Data Fusion Method Based on Extreme Learning Machine Optimized by PSO Algorithm\u00a0<\/span><\/td>\n<td><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">SCIE<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400; color: #000000;\">11<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">A Novel Control Security Method in Computer Physical Systems<\/span><\/td>\n<td><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">SCIE<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400; color: #000000;\">12<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Arrangement and Accomplishment of Interconnected Networks with the Virtual Reality Twinning with the Inner Light of Cybernetics<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"http:\/\/10.1109\/ICSES55317.2022.9914300\"><span style=\"font-weight: 400;\">10.1109\/ICSES55317.2022.9914300<\/span><\/a><\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400; color: #000000;\">13<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Impact Of Blockchain Technology On Financial Services<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"http:\/\/dx.doi.org\/10.14704\/nq.2022.20.13.NQ88224\"><span style=\"font-weight: 400;\">http:\/\/dx.doi.org\/10.14704\/nq.2022.20.13.NQ88224<\/span><\/a><\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400; color: #000000;\">14<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Srishti Vashishtha<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Comparative Analysis of U-Net based Architectures for Medical Image Segmentation<\/span><\/td>\n<td><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Google Scholar<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400; color: #000000;\">15<\/span><\/td>\n<td><span style=\"font-weight: 400; color: #000000;\">Vishal Sharma<\/span><\/td>\n<td><span style=\"color: #000000;\">Systematic literature review on predictive maintenance of vehicles and diagnosis of vehicle&#8217;s health using machine learning techniques.<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.1111\/coin.12553\">https:\/\/doi.org\/10.1111\/coin.12553<\/a><\/span><\/td>\n<td><span style=\"color: #000000;\">SCIE, Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400; color: #000000;\">16<\/span><\/td>\n<td><span style=\"color: #000000;\">Deepika Kumar<\/span><\/td>\n<td><span style=\"color: #000000;\">CodeFed: Federated Speech Recognition for low-Resource Code Switching detection<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.1145\/3571732\">https:\/\/doi.org\/10.1145\/3571732<\/a><\/span><\/td>\n<td><span style=\"color: #000000;\">SCIE, Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400; color: #000000;\">17<\/span><\/td>\n<td><span style=\"color: #000000;\">Deepika Kumar<\/span><\/td>\n<td><span style=\"color: #000000;\">Extractive Article Summarization Using Integrated TextRank and BM25+ Algorithm<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.3390\/electronics12020372\">https:\/\/doi.org\/10.3390\/electronics12020372<\/a><\/span><\/td>\n<td><span style=\"color: #000000;\">SCIE, Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\">18<\/span><\/td>\n<td><span style=\"color: #000000;\">Vijay Kumar, Rachna Narula, Amrita Ticku<\/span><\/td>\n<td><span style=\"color: #000000;\">Hand sign(ISL) recognition model for alphabets using CNN model<\/span><\/td>\n<td><\/td>\n<td><span style=\"color: #000000;\">Google Scholar<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\">19<\/span><\/td>\n<td><span style=\"color: #000000;\">Vijay Kumar, Rachna Narula, Amrita Ticku<\/span><\/td>\n<td><span style=\"color: #000000;\">Kidney Failure prediction at an early stage using machine learning: A comparative study<\/span><\/td>\n<td><\/td>\n<td><span style=\"color: #000000;\">Google Scholar<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\">20<\/span><\/td>\n<td><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td><span style=\"color: #000000;\">Detailed Investigation On The Role Of Machine Learning (Ml) Approaches In The Management For Contemporary Organisations<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.5281\/zenodo.7595681\">https:\/\/doi.org\/10.5281\/zenodo.7595681<\/a><\/span><\/td>\n<td><span style=\"color: #000000;\">ABDC<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\">21<\/span><\/td>\n<td><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td><span style=\"color: #000000;\">Critical Determinants Of Artificial Intelligence (Ai) In Optimising Training Approach And Identifying Talents To Implement Change Management<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.5281\/zenodo.7595704\">https:\/\/doi.org\/10.5281\/zenodo.7595704<\/a><\/span><\/td>\n<td><span style=\"color: #000000;\">ABDC<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\">22<\/span><\/td>\n<td><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td><span style=\"color: #000000;\">Flexural Qualities Of New Nanocomposites For Restoration Based On Digital Image Processing And Polymerization By Light Treatment<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.5281\/zenodo.7679826\">https:\/\/doi.org\/10.5281\/zenodo.7679826<\/a><\/span><\/td>\n<td><span style=\"color: #000000;\">Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\">23<\/span><\/td>\n<td><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td><span style=\"color: #000000;\">A Comparative Approach On Enhancing Lifetime Of Wireless Sensor Networks<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.5281\/zenodo.7595681\">https:\/\/doi.org\/10.5281\/zenodo.7595681<\/a><\/span><\/td>\n<td><span style=\"color: #000000;\">ESCI, Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\">24<\/span><\/td>\n<td><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td><span style=\"color: #000000;\">An Effectual Communication and Link Firmness Enhancement in Wireless Sensor Mobile Ad Hoc Networks<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.5281\/zenodo.7679830\">https:\/\/doi.org\/10.5281\/zenodo.7679830<\/a><\/span><\/td>\n<td><span style=\"color: #000000;\">ESCI, Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\">25<\/span><\/td>\n<td><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td><span style=\"color: #000000;\">Detailed Investigation About Cyber Security In Recent Times On Artificial Intelligence<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.5281\/zenodo.7623581\">https:\/\/doi.org\/10.5281\/zenodo.7623581<\/a><\/span><\/td>\n<td><span style=\"color: #000000;\">Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\">26<\/span><\/td>\n<td><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td><span style=\"color: #000000;\">Addressing The Distinct Security Vulnerabilities Typically Emerge On The Mobile Ad-Hoc Network Layer<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.5281\/zenodo.7679838\">https:\/\/doi.org\/10.5281\/zenodo.7679838<\/a><\/span><\/td>\n<td><span style=\"color: #000000;\">Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\">27<\/span><\/td>\n<td><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td><span style=\"color: #000000;\">Eco-Friendly Green Cloud Structure With Internet Of Things For Astute Agriculture<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.47750\/pnr.2023.14.02.350\">https:\/\/doi.org\/10.47750\/pnr.2023.14.02.350<\/a><\/span><\/td>\n<td><span style=\"color: #000000;\">ESCI, Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\">28<\/span><\/td>\n<td><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td><span style=\"color: #000000;\">Internet Of Things Based Pest And Growth Management System Using Natural Pesticides &amp; Fertilizers For Small Scale Organic Farming<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.47750\/pnr.2022.13.S09.1017\">https:\/\/doi.org\/10.47750\/pnr.2022.13.S09.1017<\/a><\/span><\/td>\n<td><span style=\"color: #000000;\">ESCI, Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\">29<\/span><\/td>\n<td><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td><span style=\"color: #000000;\">Detailed Investigation Of Cybersecurity In Governance<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.5281\/zenodo.7623582\">https:\/\/doi.org\/10.5281\/zenodo.7623582<\/a><\/span><\/td>\n<td><span style=\"color: #000000;\">Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\">30<\/span><\/td>\n<td><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td><span style=\"color: #000000;\">Hybrid Particle Swarm Optimization with Deep Learning Driven Sarcasm Detection on Social Media<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"http:\/\/10.1109\/ICACRS55517.2022.10029167\">10.1109\/ICACRS55517.2022.10029167<\/a><\/span><\/td>\n<td><span style=\"color: #000000;\">Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\">31<\/span><\/td>\n<td><span style=\"color: #000000;\">Preeti Nagrath<\/span><\/td>\n<td><span style=\"color: #000000;\">Detecting Hate Comments in Indic languages and Analysing Bias against Content Creators<\/span><\/td>\n<td><\/td>\n<td><span style=\"color: #000000;\">Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\">32<\/span><\/td>\n<td><span style=\"color: #000000;\">Dharmender Saini, Preeti Nagrath<\/span><\/td>\n<td><span style=\"color: #000000;\">A Novel Review on Healthcare Data Encryption Techniques<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"http:\/\/10.1007\/978-981-19-3679-1_40\">10.1007\/978-981-19-3679-1_40<\/a><\/span><\/td>\n<td><span style=\"color: #000000;\">Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\">33<\/span><\/td>\n<td><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td><span style=\"color: #000000;\">The Future Impact of Technological Developments on Digital Marketing Through Artificial Intelligence<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.1007\/978-981-19-0108-9_23\">https:\/\/doi.org\/10.1007\/978-981-19-0108-9_23<\/a><\/span><\/td>\n<td><span style=\"color: #000000;\">Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\">34<\/span><\/td>\n<td><span style=\"color: #000000;\">Mohit Tiwari<\/span><\/td>\n<td><span style=\"color: #000000;\">Arrangement and Accomplishment of Interconnected Networks with the Virtual Reality Twinning with the Inner Light of Cybernetics<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.1109\/ICSES55317.2022.9914300\" target=\"_blank\" rel=\"noopener noreferrer\">10.1109\/ICSES55317.2022.9914300<\/a><\/span><\/td>\n<td><span style=\"color: #000000;\">Scopus<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"color: #000000;\">35<\/span><\/td>\n<td><span style=\"color: #000000;\">Srishti Vashishtha<\/span><\/td>\n<td><span style=\"color: #000000;\">Vehicle Detection System using YOLOv4<\/span><\/td>\n<td><span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/doi.org\/10.1109\/ISPA54004.2022.9786330\" target=\"_blank\" rel=\"noopener noreferrer\">10.1109\/ISPA54004.2022.9786330<\/a><\/span><\/td>\n<td><span style=\"color: #000000;\">Scopus<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/4&#8243;][vc_wp_custommenu title=&#8221;Imp Links&#8221; nav_menu=&#8221;67&#8243;][\/vc_column][vc_column width=&#8221;3\/4&#8243;][vc_column_text] S. No. Faculty name Paper Title Doi Indexing 1 Preeti Nagrath First Inning score prediction of an IPL match using Machine learning https:\/\/doi.org\/10.1063\/5.0108928 Scopus 2 Preeti Nagrath Stock prediction and recommendation system using KNN and linear regression https:\/\/doi.org\/10.1063\/5.0108799 Scopus 3 Preeti Nagrath Sign Language detection and conversion to text&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/pages\/8354"}],"collection":[{"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/comments?post=8354"}],"version-history":[{"count":9,"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/pages\/8354\/revisions"}],"predecessor-version":[{"id":9434,"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/pages\/8354\/revisions\/9434"}],"wp:attachment":[{"href":"https:\/\/bvcoend.ac.in\/index.php\/wp-json\/wp\/v2\/media?parent=8354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}