{"id":3607,"date":"2024-02-27T14:13:29","date_gmt":"2024-02-27T08:43:29","guid":{"rendered":"https:\/\/journal.ipem.edu.in\/computer_applications\/?page_id=3607"},"modified":"2024-03-13T14:38:29","modified_gmt":"2024-03-13T09:08:29","slug":"2023-vol-8-issue-1","status":"publish","type":"page","link":"https:\/\/journal.ipem.edu.in\/computer_applications\/2023-vol-8-issue-1\/","title":{"rendered":"2023, Vol. 8, Issue 1"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3607\" class=\"elementor elementor-3607\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-6a4d9f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6a4d9f9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-db4e99f\" data-id=\"db4e99f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-be32ea0 elementor-widget elementor-widget-heading\" data-id=\"be32ea0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Research Papers<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59e6be6 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"59e6be6\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-344084d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"344084d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8a2f290\" data-id=\"8a2f290\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ccc40ff elementor-widget elementor-widget-html\" data-id=\"ccc40ff\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"issue-first\">\r\n  <h3>\r\n    <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/a-comprehensive-survey-on-cloud-computing-concepts-challenges-and-future-directions\/\">A Comprehensive Survey on Cloud Computing: Concepts, Challenges and Future Directions<\/a>\r\n  <\/h3>\r\n\r\n  <a class=\"author\" href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/a-comprehensive-survey-on-cloud-computing-concepts-challenges-and-future-directions\/#author\"> <em> Abdulkalamazad G<\/em><\/a>,\r\n   <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/a-comprehensive-survey-on-cloud-computing-concepts-challenges-and-future-directions\/#author\"> <em> Deepa S<\/em><\/a>,\r\n   <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/a-comprehensive-survey-on-cloud-computing-concepts-challenges-and-future-directions\/#author\"> <em> Anitha A<\/em><\/a>,\r\n   <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/a-comprehensive-survey-on-cloud-computing-concepts-challenges-and-future-directions\/#author\"> <em> Gowdhami K<\/em><\/a>,\r\n   <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/a-comprehensive-survey-on-cloud-computing-concepts-challenges-and-future-directions\/#author\"> <em> Saranya k<\/em><\/a>\r\n\r\n\r\n  <p class=\"doi\">DOI: <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/a-comprehensive-survey-on-cloud-computing-concepts-challenges-and-future-directions\/\">10.61691\/IPEM_CA.8.2023.1-8<\/a><\/p>\r\n\r\n  \r\n\r\n  <p class=\"page\">Pages: 1-08<\/p>\r\n  <p class=\"Published\">Published Online: December, 2023<\/p>\r\n\r\n\r\n\r\n<div>\r\n\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/a-comprehensive-survey-on-cloud-computing-concepts-challenges-and-future-directions\/#abstract\" >Abstract<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/a-comprehensive-survey-on-cloud-computing-concepts-challenges-and-future-directions\/#references\">References<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/a-comprehensive-survey-on-cloud-computing-concepts-challenges-and-future-directions\/#citation\">Citation<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-content\/uploads\/2024\/03\/P_1.pdf\" target=\"_blank\">Download Article<\/a>\r\n<\/div>\r\n    <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9ddeb6 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a9ddeb6\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-6a16aaa elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6a16aaa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6678888\" data-id=\"6678888\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b7fd837 elementor-widget elementor-widget-html\" data-id=\"b7fd837\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"issue-first\">\r\n  <h3>\r\n    <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/analyze-the-linux-performance-in-network-management\/\">Analyze The Linux Performance In Network Management<\/a>\r\n  <\/h3>\r\n\r\n  <a class=\"author\" href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/analyze-the-linux-performance-in-network-management\/#author\"> <em> Dr Mohammad Salim Hamidi<\/em><\/a>,\r\n   <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/analyze-the-linux-performance-in-network-management\/#author\"> <em> Sikandar zulqarnin<\/em><\/a>,\r\n   <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/analyze-the-linux-performance-in-network-management\/#author\"> <em> Wahdatullah Sharafa<\/em><\/a>,\r\n   <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/analyze-the-linux-performance-in-network-management\/#author\"> <em>  Mohammad Ilyas<\/em><\/a> \r\n   \r\n   \r\n   <p class=\"doi\">DOI: <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/analyze-the-linux-performance-in-network-management\/\">10.61691\/IPEM_CA.8.2023.9-15<\/a><\/p>\r\n\r\n  <p class=\"page\">Pages: 9-15<\/p>\r\n<p class=\"Published\">Published Online: December, 2023<\/p>\r\n\r\n\r\n\r\n<div>\r\n\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/analyze-the-linux-performance-in-network-management\/#abstract\" >Abstract<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/analyze-the-linux-performance-in-network-management\/#references\">References<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/analyze-the-linux-performance-in-network-management\/#citation\">Citation<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-content\/uploads\/2024\/03\/P_2.pdf\" target=\"_blank\">Download Article<\/a>\r\n<\/div>\r\n    <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-164bf98 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"164bf98\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-48efa4f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"48efa4f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-20b2ae3\" data-id=\"20b2ae3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b7bc4bb elementor-widget elementor-widget-html\" data-id=\"b7bc4bb\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"issue-first\">\r\n  <h3>\r\n    <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/artificial-intelligence-revolution-or-future-threat\/\">Artificial Intelligence: Revolution Or Future Threat<\/a>\r\n  <\/h3>\r\n\r\n  <a class=\"author\" href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/artificial-intelligence-revolution-or-future-threat\/#author\"> <em> Vimal Kirti Vishwajeet<\/em><\/a>\r\n \r\n  \r\n  \r\n  <p class=\"doi\">DOI: <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/artificial-intelligence-revolution-or-future-threat\/\">10.61691\/IPEM_CA.8.2023.16-19<\/a><\/p>\r\n  \r\n  \r\n  <p class=\"page\">Pages: 16-19<\/p>\r\n<p class=\"Published\">Published Online: December, 2023<\/p>\r\n\r\n\r\n\r\n<div>\r\n\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/artificial-intelligence-revolution-or-future-threat\/#abstract\" >Abstract<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/artificial-intelligence-revolution-or-future-threat\/#references\">References<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/artificial-intelligence-revolution-or-future-threat\/#citation\">Citation<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-content\/uploads\/2024\/03\/P_3.pdf\" target=\"_blank\">Download Article<\/a>\r\n<\/div>\r\n    <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-107d2f0 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"107d2f0\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-b93080e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b93080e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0072bd8\" data-id=\"0072bd8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d5dd52d elementor-widget elementor-widget-html\" data-id=\"d5dd52d\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"issue-first\">\r\n  <h3>\r\n    <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/assessing-cyber-security-awareness-and-preparedness-a-survey-study\/\">Assessing Cyber Security Awareness And Preparedness: A Survey Study<\/a>\r\n  <\/h3>\r\n\r\n  <a class=\"author\" href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/assessing-cyber-security-awareness-and-preparedness-a-survey-study\/#author\"> <em> Sivaguru R<\/em><\/a>,\r\n   <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/assessing-cyber-security-awareness-and-preparedness-a-survey-study\/#author\"> <em> Malarvizhi P<\/em><\/a>,\r\n    <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/assessing-cyber-security-awareness-and-preparedness-a-survey-study\/#author\"> <em> Saranya R<\/em><\/a>,\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/assessing-cyber-security-awareness-and-preparedness-a-survey-study\/#author\"> <em> Babu G<\/em><\/a>,\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/assessing-cyber-security-awareness-and-preparedness-a-survey-study\/#author\"> <em> Saranya K <\/em><\/a>\t\r\n  \r\n  <p class=\"doi\">DOI: <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/assessing-cyber-security-awareness-and-preparedness-a-survey-study\/\">10.61691\/IPEM_CA.8.2023.20-26<\/a><\/p>\r\n  \r\n  \r\n  <p class=\"page\">Pages: 20-26<\/p>\r\n  <p class=\"Published\">Published Online: December, 2023<\/p>\r\n\r\n\r\n\r\n<div>\r\n\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/assessing-cyber-security-awareness-and-preparedness-a-survey-study\/#abstract\" >Abstract<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/assessing-cyber-security-awareness-and-preparedness-a-survey-study\/#references\">References<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/assessing-cyber-security-awareness-and-preparedness-a-survey-study\/#citation\">Citation<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-content\/uploads\/2024\/03\/P_4.pdf\" target=\"_blank\">Download Article<\/a>\r\n<\/div>\r\n    <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-591c751 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"591c751\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-052c9c2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"052c9c2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d61ac3f\" data-id=\"d61ac3f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6cf4f57 elementor-widget elementor-widget-html\" data-id=\"6cf4f57\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"issue-first\">\r\n  <h3>\r\n    <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/approach-based-analysis-of-machine-learning-algorithms\/\">Approach Based Analysis Of Machine Learning Algorithms<\/a>\r\n  <\/h3>\r\n\r\n  <a class=\"author\" href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/approach-based-analysis-of-machine-learning-algorithms\/#author\"> <em> Nisha Choudhary <\/em><\/a>\r\n   \r\n  \r\n  <p class=\"doi\">DOI: <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/approach-based-analysis-of-machine-learning-algorithms\/\">10.61691\/IPEM_CA.8.2023.27-33<\/a><\/p>\r\n  \r\n  \r\n  <p class=\"page\">Pages: 27-23<\/p>\r\n  <p class=\"Published\">Published Online: December, 2023<\/p>\r\n\r\n\r\n\r\n<div>\r\n\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/approach-based-analysis-of-machine-learning-algorithms\/#abstract\" >Abstract<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/approach-based-analysis-of-machine-learning-algorithms\/#references\">References<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/approach-based-analysis-of-machine-learning-algorithms\/#citation\">Citation<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-content\/uploads\/2024\/03\/P_5.pdf\" target=\"_blank\">Download Article<\/a>\r\n<\/div>\r\n    <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a68232 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2a68232\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-e9b3acc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e9b3acc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0978c2e\" data-id=\"0978c2e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a0daef elementor-widget elementor-widget-html\" data-id=\"9a0daef\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"issue-first\">\r\n  <h3>\r\n    <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/understanding-crypto-currencies-a-comprehensive-analysis\/\">Understanding Crypto Currencies: A Comprehensive Analysis<\/a>\r\n  <\/h3>\r\n\r\n  <a class=\"author\" href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/understanding-crypto-currencies-a-comprehensive-analysis\/#author\"> <em> Girish Kumar Bansal <\/em><\/a>,\r\n  <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/understanding-crypto-currencies-a-comprehensive-analysis\/#author\"> <em> Bhagvender <\/em><\/a>\r\n   \r\n  \r\n  <p class=\"doi\">DOI: <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/understanding-crypto-currencies-a-comprehensive-analysis\/\">10.61691\/IPEM_CA.8.2023.34-42<\/a><\/p>\r\n  \r\n  \r\n  <p class=\"page\">Pages: 34-42<\/p>\r\n  <p class=\"Published\">Published Online: December, 2023<\/p>\r\n\r\n\r\n\r\n<div>\r\n\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/understanding-crypto-currencies-a-comprehensive-analysis\/#abstract\" >Abstract<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/understanding-crypto-currencies-a-comprehensive-analysis\/#references\">References<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/understanding-crypto-currencies-a-comprehensive-analysis\/#citation\">Citation<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-content\/uploads\/2024\/03\/P_6.pdf\" target=\"_blank\">Download Article<\/a>\r\n<\/div>\r\n    <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-517bc18 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"517bc18\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-976df3c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"976df3c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0ab4af5\" data-id=\"0ab4af5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73fbabd elementor-widget elementor-widget-html\" data-id=\"73fbabd\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"issue-first\">\r\n  <h3>\r\n    <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/enhancing-seizure-detectiona-deep-learning-approach-with-non-linear-bilateral-filtering\/\">Enhancing Seizure Detection: A Deep Learning Approach With Non-Linear Bilateral Filtering<\/a>\r\n  <\/h3>\r\n\r\n  <a class=\"author\" href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/enhancing-seizure-detectiona-deep-learning-approach-with-non-linear-bilateral-filtering\/#author\"> <em> Ashish Sharma <\/em><\/a>,\r\n  <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/enhancing-seizure-detectiona-deep-learning-approach-with-non-linear-bilateral-filtering\/#author\"> <em> Vinai K Singh <\/em><\/a>\r\n   \r\n  \r\n  <p class=\"doi\">DOI: <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/enhancing-seizure-detectiona-deep-learning-approach-with-non-linear-bilateral-filtering\/\">10.61691\/IPEM_CA.8.2023.43-47<\/a><\/p>\r\n  \r\n  \r\n  <p class=\"page\">Pages: 43-47<\/p>\r\n  <p class=\"Published\">Published Online: December, 2023<\/p>\r\n\r\n\r\n\r\n<div>\r\n\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/enhancing-seizure-detectiona-deep-learning-approach-with-non-linear-bilateral-filtering\/#abstract\" >Abstract<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/enhancing-seizure-detectiona-deep-learning-approach-with-non-linear-bilateral-filtering\/#references\">References<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/enhancing-seizure-detectiona-deep-learning-approach-with-non-linear-bilateral-filtering\/#citation\">Citation<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-content\/uploads\/2024\/03\/P_7.pdf\" target=\"_blank\">Download Article<\/a>\r\n<\/div>\r\n    <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-585f244 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"585f244\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-64a141e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"64a141e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-edb669d\" data-id=\"edb669d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-323f857 elementor-widget elementor-widget-html\" data-id=\"323f857\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"issue-first\">\r\n  <h3>\r\n    <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/enhancing-network-evaluation-through-machine-learning-techniques\/\">Enhancing Network Evaluation Through Machine Learning Techniques<\/a>\r\n  <\/h3>\r\n\r\n  <a class=\"author\" href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/enhancing-network-evaluation-through-machine-learning-techniques\/#author\"> <em> Narendra Singh  <\/em><\/a>\r\n  \r\n   \r\n  \r\n  <p class=\"doi\">DOI: <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/enhancing-network-evaluation-through-machine-learning-techniques\/\">10.61691\/IPEM_CA.8.2023.48-51<\/a><\/p>\r\n  \r\n  \r\n  <p class=\"page\">Pages: 48-51<\/p>\r\n  <p class=\"Published\">Published Online: December, 2023<\/p>\r\n\r\n\r\n\r\n<div>\r\n\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/enhancing-network-evaluation-through-machine-learning-techniques\/#abstract\" >Abstract<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/enhancing-network-evaluation-through-machine-learning-techniques\/#references\">References<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/enhancing-network-evaluation-through-machine-learning-techniques\/#citation\">Citation<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-content\/uploads\/2024\/03\/P_8.pdf\" target=\"_blank\">Download Article<\/a>\r\n<\/div>\r\n    <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-578a691 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"578a691\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-97c446d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"97c446d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2024dc7\" data-id=\"2024dc7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-626739a elementor-widget elementor-widget-html\" data-id=\"626739a\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"issue-first\">\r\n  <h3>\r\n    <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/computer-networking-acquiring-global-world\/\">Computer Networking Acquiring Global World<\/a>\r\n  <\/h3>\r\n\r\n  <a class=\"author\" href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/computer-networking-acquiring-global-world\/#author\"> <em> Shweta Chaudhary  <\/em><\/a>,\r\n  <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/computer-networking-acquiring-global-world\/#author\"> <em> Ajay Kumar  <\/em><\/a>,\r\n  <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/computer-networking-acquiring-global-world\/#author\"> <em> Abhinav Tyagi  <\/em><\/a>\r\n  \r\n   \r\n  \r\n  <p class=\"doi\">DOI: <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/computer-networking-acquiring-global-world\/\">10.61691\/IPEM_CA.8.2023.52-55<\/a><\/p>\r\n  \r\n  \r\n  <p class=\"page\">Pages: 52-55<\/p>\r\n  <p class=\"Published\">Published Online: December, 2023<\/p>\r\n\r\n\r\n\r\n<div>\r\n\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/computer-networking-acquiring-global-world\/#abstract\" >Abstract<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/computer-networking-acquiring-global-world\/#references\">References<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/computer-networking-acquiring-global-world\/#citation\">Citation<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-content\/uploads\/2024\/03\/P_9.pdf\" target=\"_blank\">Download Article<\/a>\r\n<\/div>\r\n    <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22b17ac elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"22b17ac\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-39daeb1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"39daeb1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-446d230\" data-id=\"446d230\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a4faaa elementor-widget elementor-widget-html\" data-id=\"2a4faaa\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"issue-first\">\r\n  <h3>\r\n    <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wireless-network-virtualization\/\">Wireless Network Virtualization<\/a>\r\n  <\/h3>\r\n\r\n  <a class=\"author\" href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wireless-network-virtualization\/#author\"> <em> Dr Mohammad Salim Hamidi <\/em><\/a>,\r\n  <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wireless-network-virtualization\/#author\"> <em> Elham Momand  <\/em><\/a>,\r\n  <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wireless-network-virtualization\/#author\"> <em> Allah Bobani Saidi  <\/em><\/a>\r\n  \r\n   \r\n  \r\n  <p class=\"doi\">DOI: <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wireless-network-virtualization\/\">10.61691\/IPEM_CA.8.2023.56-63<\/a><\/p>\r\n  \r\n  \r\n  <p class=\"page\">Pages: 56-63<\/p>\r\n  <p class=\"Published\">Published Online: December, 2023<\/p>\r\n\r\n\r\n\r\n<div>\r\n\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wireless-network-virtualization\/#abstract\" >Abstract<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wireless-network-virtualization\/#references\">References<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wireless-network-virtualization\/#citation\">Citation<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-content\/uploads\/2024\/03\/P_10.pdf\" target=\"_blank\">Download Article<\/a>\r\n<\/div>\r\n    <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8db1238 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8db1238\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc62584 elementor-widget elementor-widget-html\" data-id=\"bc62584\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"issue-first\">\r\n  <h3>\r\n    <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/exploring-the-intersection-of-artificial-intelligence-and-fashion-design-a-comprehensive-review\/\">Exploring The Intersection Of Artificial Intelligence And Fashion Design: A Comprehensive Review<\/a>\r\n  <\/h3>\r\n\r\n  <a class=\"author\" href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/exploring-the-intersection-of-artificial-intelligence-and-fashion-design-a-comprehensive-review\/#author\"> <em> Taruna <\/em><\/a>\r\n \r\n  \r\n   \r\n  \r\n  <p class=\"doi\">DOI: <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/exploring-the-intersection-of-artificial-intelligence-and-fashion-design-a-comprehensive-review\/\">10.61691\/IPEM_CA.8.2023.64-68<\/a><\/p>\r\n  \r\n  \r\n  <p class=\"page\">Pages: 64-68<\/p>\r\n  <p class=\"Published\">Published Online: December, 2023<\/p>\r\n\r\n\r\n\r\n<div>\r\n\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/exploring-the-intersection-of-artificial-intelligence-and-fashion-design-a-comprehensive-review\/#abstract\" >Abstract<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/exploring-the-intersection-of-artificial-intelligence-and-fashion-design-a-comprehensive-review\/#references\">References<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/exploring-the-intersection-of-artificial-intelligence-and-fashion-design-a-comprehensive-review\/#citation\">Citation<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-content\/uploads\/2024\/03\/P_11.pdf\" target=\"_blank\">Download Article<\/a>\r\n<\/div>\r\n    <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0472c5e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"0472c5e\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-66baf8b elementor-widget elementor-widget-html\" data-id=\"66baf8b\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"issue-first\">\r\n  <h3>\r\n    <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/artificial-intelligence-for-the-road-safety\/\">Artificial Intelligence For The Road Safety<\/a>\r\n  <\/h3>\r\n\r\n  <a class=\"author\" href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/artificial-intelligence-for-the-road-safety\/#author\"> <em> Shweta Chaudhary <\/em><\/a>,\r\n  <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/artificial-intelligence-for-the-road-safety\/#author\"> <em> Ajay Kumar <\/em><\/a>,\r\n  <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/artificial-intelligence-for-the-road-safety\/#author\"> <em> Vikash Tiwari, <\/em><\/a>,\r\n  <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/artificial-intelligence-for-the-road-safety\/#author\"> <em> Kanchan Mishra <\/em><\/a>\r\n \r\n  \r\n   \r\n  \r\n  <p class=\"doi\">DOI: <a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/artificial-intelligence-for-the-road-safety\/\">10.61691\/IPEM_CA.8.2023.69-75<\/a><\/p>\r\n  \r\n  \r\n  <p class=\"page\">Pages: 69-75<\/p>\r\n  <p class=\"Published\">Published Online: December, 2023<\/p>\r\n\r\n\r\n\r\n<div>\r\n\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/artificial-intelligence-for-the-road-safety\/#abstract\" >Abstract<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/artificial-intelligence-for-the-road-safety\/#references\">References<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/artificial-intelligence-for-the-road-safety\/#citation\">Citation<\/a> |\r\n<a href=\"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-content\/uploads\/2024\/03\/P_12.pdf\" target=\"_blank\">Download Article<\/a>\r\n<\/div>\r\n    <\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Research Papers A Comprehensive Survey on Cloud Computing: Concepts, Challenges and Future Directions Abdulkalamazad G, Deepa S, Anitha A, Gowdhami [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-3607","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/pages\/3607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/comments?post=3607"}],"version-history":[{"count":103,"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/pages\/3607\/revisions"}],"predecessor-version":[{"id":3846,"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/pages\/3607\/revisions\/3846"}],"wp:attachment":[{"href":"https:\/\/journal.ipem.edu.in\/computer_applications\/wp-json\/wp\/v2\/media?parent=3607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}