Articles

Rumor Detection in Social Media with User Information Protection

Md Rashed Ibn Nawab, Kazi Md. Shahiduzzaman, Titya Eng, Md. Noor Jamal

DOI https://doi.org/10.24018/ejece.2020.4.4.219
Abstract views: 530 , PDF downloads: 366

DOI https://doi.org/10.24018/ejece.2020.4.4.222
Abstract views: 286 , PDF downloads: 176

DOI https://doi.org/10.24018/ejece.2020.4.4.223
Abstract views: 137 , PDF downloads: 175

DOI https://doi.org/10.24018/ejece.2020.4.4.227
Abstract views: 184 , PDF downloads: 194

DOI https://doi.org/10.24018/ejece.2020.4.4.226
Abstract views: 121 , PDF downloads: 169

DOI https://doi.org/10.24018/ejece.2020.4.4.225
Abstract views: 482 , PDF downloads: 299

Towards the Ensemble: IPCBR Model in Investigating Financial Bubbles

Francis Ekpenyong, Georgios Samakovitis, Stelios Kapetanakis, Miltos Petridis

DOI https://doi.org/10.24018/ejece.2020.4.4.193
Abstract views: 238 , PDF downloads: 176

DOI https://doi.org/10.24018/ejece.2020.4.4.231
Abstract views: 257 , PDF downloads: 300

DOI https://doi.org/10.24018/ejece.2020.4.4.228
Abstract views: 281 , PDF downloads: 201

DOI https://doi.org/10.24018/ejece.2020.4.4.232
Abstract views: 459 , PDF downloads: 273

DOI https://doi.org/10.24018/ejece.2020.4.4.229
Abstract views: 195 , PDF downloads: 220

DOI https://doi.org/10.24018/ejece.2020.4.4.233
Abstract views: 313 , PDF downloads: 346

DOI https://doi.org/10.24018/ejece.2020.4.4.171
Abstract views: 218 , PDF downloads: 195

DOI https://doi.org/10.24018/ejece.2020.4.4.235
Abstract views: 164 , PDF downloads: 177

DOI https://doi.org/10.24018/ejece.2020.4.4.236
Abstract views: 152 , PDF downloads: 172

DOI https://doi.org/10.24018/ejece.2020.4.4.237
Abstract views: 1641 , PDF downloads: 830

The Study of Data Security in Cloud Computing

Abdullahi Abubakar, Alhaji Idi Babate, Abdulhakeem Ishola, Asma’u Muhammad Sani

DOI https://doi.org/10.24018/ejece.2020.4.4.239
Abstract views: 426 , PDF downloads: 84

DOI https://doi.org/10.24018/ejece.2020.4.4.238
Abstract views: 139 , PDF downloads: 156