http://206.189.178.169:3001/?freshness=All&show=1&q=Malware-Detection-Using-Machine-Learning+INR+loc%3Ain Search: Malware Detection Using Machine Learning - Zipri.in

Malware Detection Using Machine Learning

Debug Information

Array
(
    [meilisearch] => Array
        (
            [url] => https://msin.fadunews.in/indexes/zipri/search
            [http_code] => 200
            [response] => {"hits":[],"query":"Malware-Detection-Using-Machine-Learning","processingTimeMs":1,"limit":3,"offset":0,"estimatedTotalHits":0}
            [curl_error] => 
            [parsed] => Array
                (
                    [hits] => Array
                        (
                        )

                    [query] => Malware-Detection-Using-Machine-Learning
                    [processingTimeMs] => 1
                    [limit] => 3
                    [offset] => 0
                    [estimatedTotalHits] => 0
                )

        )

    [image_search] => Array
        (
            [url] => http://206.189.178.169:3001/?freshness=All&show=1&q=Malware-Detection-Using-Machine-Learning+INR+loc%3Ain
            [http_code] => 200
            [response] => {"name":"malware-detection-using-machine-learning inr loc:in","totalEstimatedMatches":157,"nextOffset":120,"currentOffset":0,"value":{"E7E58AB4F4ECD8C040A979275BB9E7F0BED78D66":{"name":"Malware Detection Using Machine Learnin 1 112620 - Malware Detection ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.9ysGxvNc08SLmZAUj9vPTwHaJl?pid=Api","datePublished":"2024-07-19T04:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/7699fb68cf8cdf21b2ec9d998d28afcb/thumb_1200_1553.png","hostPageUrl":"https://www.studocu.com/in/document/dr-apj-abdul-kalam-technical-university/btech/malware-detection-using-machine-learnin-1-112620/96402906","contentSize":"200543 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.f72b06c6f35cd3c48b9990148fdbcf4f?rik=fl6oS0%2fOjQwEmg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"66D87DEB0F7E9BB572979A040C8DCE4F4BA85E7E","accentColor":"21427E"},"3A6BB3898CA78337ABE482EBEC70373C00312D5F":{"name":"Study Of Malware Detection Using Machine Learning - See discussions ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.0RRncOJbOD4ixdkZB1y3eQHaJl?pid=Api","datePublished":"2023-10-08T03:13:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/f8d38426a6c315e71d57e56b1974e268/thumb_1200_1553.png","hostPageUrl":"https://www.studocu.com/in/document/visvesvaraya-technological-university/computer-science-vtu/study-of-malware-detection-using-machine-learning/71361040","contentSize":"86450 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.d1146770e25b383e22c5d919075cb779?rik=o7Y7mMh6OHO6Tg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F5D21300C37307CEBE284EBA73387AC8983BB6A3","accentColor":"156899"},"5C0039107061BB6D1830EF8F2E93808CC1945A76":{"name":"Robust Intelligent Malware Detection Using Deep Learning | S-Logix","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.I0MDQLY9f8sYujHmEOMpJwHaDN?pid=Api","datePublished":"2022-06-16T23:58:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/machine-learning/robust-intelligent-malware-detection-using-deep-learning.jpg","hostPageUrl":"https://slogix.in/machine-learning/robust-intelligent-malware-detection-using-deep-learning/","contentSize":"40012 B","width":830,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.23430340b63d7fcb18ba31e610e32927?rik=xQCTAQcWu9aBAw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"67A5491CC80839E2F8FE0381D6BB1607019300C5","accentColor":"004B95"},"BDCCAE0C26AF77C46160351AA1830598BD198F4F":{"name":"Top 6 Machine Learning Books in Cybersecurity - Tech Hyme","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.tlyGa9DfR7zUp4IxClchOwHaJy?pid=Api","datePublished":"2024-01-06T11:05:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://techhyme.com/wp-content/uploads/2024/01/Malware-Data-Science-Attack-Detection-and-Attribution.jpg","hostPageUrl":"https://techhyme.com/top-6-machine-learning-books-in-cybersecurity/","contentSize":"222963 B","width":1135,"height":1500,"cDNContentUrl":"https://th.bing.com/th/id/R.b65c866bd0df47bcd4a782310a57213b?rik=28zqwGL6d0wWBg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F4F891DB8950381AA15306164C77FA62C0EACCDB","accentColor":"789239"},"8F9A0CEEE9D005F0C7173C0B12A2447EF043D9D5":{"name":"Malware Detection System Project","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.Qxkt11bUWWVhvjh1NAwlkAHaEK?pid=Api","datePublished":"2023-11-05T14:27:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://i.ytimg.com/vi/sytw02floHA/maxresdefault.jpg","hostPageUrl":"https://www.finalproject.in/post/malware-detection-system-project","contentSize":"101684 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.43192dd756d4596561be3875340c2590?rik=%2bKnA7p4NUA98cQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5D9D340FE7442A21B0C3717C0F500D9EEEC0A9F8","accentColor":"C5A506"},"A85E61987AC6266B09335A1B41E6B26545B2C291":{"name":"Malware detection using ML - Malware Discovery utilizing AI ABSTRACT ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.g8F28Had2CKMEJWZl9HDfwHaKe?pid=Api","datePublished":"2024-01-12T02:27:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/0372d7cf7e57131609bc527ffcf2aecc/thumb_1200_1697.png","hostPageUrl":"https://www.studocu.com/in/document/jntua-college-of-engineering-anantapuram/computer-science/malware-detection-using-ml/81074683","contentSize":"258120 B","width":1200,"height":1697,"cDNContentUrl":"https://th.bing.com/th/id/R.83c176f0769dd8228c10959997d1c37f?rik=iuUWiadsYraQMw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"192C2B54562B6E14B1A53390B6626CA78916E58A","accentColor":"3E3E3E"},"9550C50BCAAEC546DF8BF5CB127E0F677D69FD07":{"name":"Android malware detection using deep learning-Python Project | S-Logix","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.CwTFZNca78Dnt3u4kqMeMAHaDN?pid=Api","datePublished":"2022-05-06T05:19:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/machine-learning/maldozer-automatic-framework-for-android-malware-detection-using-deep-learning.jpg","hostPageUrl":"https://slogix.in/machine-learning/maldozer-automatic-framework-for-android-malware-detection-using-deep-learning/","contentSize":"61554 B","width":830,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.0b04c564d71aefc0e7b77bb892a31e30?rik=WQVcsKzqXGT9uA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"70DF96D776F0E721BC5FB8FD645CEAACB05C0559","accentColor":"004A95"},"498614D7127B27B812207EC095BF8F7BDE554677":{"name":"DOC - GOOD DOCUMENT FOR MALWARE - Malware Detection Using Machine ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.sPRrxJIRJfSNN804XM0AMgHaJl?pid=Api","datePublished":"2023-03-25T12:46:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/5f02df289180b7cac2d7156f1f981e13/thumb_1200_1553.png","hostPageUrl":"https://www.studocu.com/in/document/anna-university/computer-science/doc-good-document-for-malware/39352057","contentSize":"157067 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.b0f46bc4921125f48d37cd385ccd0032?rik=lGhBfSG3coshAg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"776455EDB7F8FB590CE702218B72B7217D416894","accentColor":"0A85C1"},"FD14FE0584D06452FCF5E171BDAD72310668801A":{"name":"Phishing Email Detection Model Using Deep Learning","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.NbSx3WIpuc4QWhS2df0UcwHaFJ?pid=Api","datePublished":"2023-10-15T06:30:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/electronics/electronics-12-04261/article_deploy/html/images/electronics-12-04261-g003.png?1697351114","hostPageUrl":"https://www.mdpi.com/2079-9292/12/20/4261","contentSize":"1005314 B","width":3129,"height":2178,"cDNContentUrl":"https://th.bing.com/th/id/R.35b4b1dd6229b9ce105a14b675fd1473?rik=30HvUEgNRiXPXw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A10886601327DADB171E5FCF25460D4850EF41DF","accentColor":"CAC901"},"79AE0CE9FBCC7A8C943A825B7E0A1A11ACE8D32E":{"name":"Android Malware Detection Techniques: A Literature Review | S-Logix","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.4_dmO-uuOhgHwgBwxMbUpgHaDN?pid=Api","datePublished":"2022-08-26T00:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/digital-forensics/android-malware-detection-techniques-a-literature-review.jpg","hostPageUrl":"https://slogix.in/digital-forensics/android-malware-detection-techniques-a-literature-review/","contentSize":"54400 B","width":830,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.e3f7663bebae3a1807c20070c4c6d4a6?rik=l%2brAnr%2fMp8hJow&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E23D8ECA11A1A0E7B528A349C8A7CCBF9EC0EA97","accentColor":"004B95"},"C4E7143EDE7D89B5D4E63FCAFA178998CBD69EFE":{"name":"Machine Learning in Cybersecurity | Kaspersky","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.5Unwxry3Ab0FRU8jZB_OggHaEK?pid=Api","datePublished":"2018-08-07T02:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.kaspersky.com/content/en-global/enterprise-security/wiki-section/img/Machine-Learning-in-Cybersecurity-1.png","hostPageUrl":"https://www.kaspersky.co.in/enterprise-security/wiki-section/products/machine-learning-in-cybersecurity","contentSize":"101254 B","width":1030,"height":580,"cDNContentUrl":"https://th.bing.com/th/id/R.e549f0c6bcb701bd05454f23641fce82?rik=TH5B4%2b3XmFtNbg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EFE96DBC899871AFACF36E4D5B98D7EDE3417E4C","accentColor":"B3181E"},"6955F62B562B2A03E90FE04CC041A4DA22F97416":{"name":"Advanced Threat Analytics and Intelligence","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.2BcXyL_zZbnEbN7Em6SejwHaEK?pid=Api","datePublished":"2018-01-21T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.xenonstack.com/hubfs/xenonstack-advanced-threat-analytics-deep-learning-solutions.png","hostPageUrl":"https://www.xenonstack.com/use-cases/threat-analytics","contentSize":"58867 B","width":640,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.d81717c8bff365b9c46cdec49ba49e8f?rik=llVvsmWyojCe8A&pid=ImgRaw&r=0","isTransparent":false,"imageId":"61479F22AD4A140CC40EF09E30A2B265B26F5596","accentColor":"9E1E16"},"F336E37A48ECB4A5BF9FC136D8D5817F67ECCBFD":{"name":"Anomaly Detection and Monitoring Using Deep Learning","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.BF-Q4n8tGANjodB2XLesPAHaEK?pid=Api","datePublished":"2017-04-25T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.xenonstack.com/hs-fs/hubfs/anomaly-detection-using-machine-learning-and-deep-learning.jpg?width=2560&height=1440&name=anomaly-detection-using-machine-learning-and-deep-learning.jpg","hostPageUrl":"https://www.xenonstack.com/use-cases/anomaly-detection","contentSize":"24510 B","width":640,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.045f90e27f2d180363a1d0765cb7ac3c?rik=P2M%2bp4TOS1r7%2bQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DFBCCE76F7185D8D631CF9FB5A4BCE84A73E633F","accentColor":"034379"},"36BE9457097928A1506DBD99317351C0A0F7C12A":{"name":"Machine Learning Using R: With Time Series and Industry-Based Use Cases ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.wrVQQqiIPftvo-8vXQ7DsQHaKk?pid=Api","datePublished":"2018-12-12T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/61S7E6MPgSL._SL1181_.jpg","hostPageUrl":"https://www.amazon.in/Machine-Learning-Using-Industry-Based-Cases-ebook/dp/B07LCC6PTP","contentSize":"109449 B","width":827,"height":1181,"cDNContentUrl":"https://th.bing.com/th/id/R.c2b55042a8883dfb6fa3ef2f5d0ec3b1?rik=Y%2btJdZCXghoF1g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A21C7F0A0C15371399DBD6051A8297907549EB63","accentColor":"C89C03"},"FDEA99E0AA16885E90F11B4817FBF1CD2AAAB380":{"name":"Buy Malware Analysis Using Artificial Intelligence and Deep Learning ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.7-7WVxeP0PbdN_uHi6bTegAAAA?pid=Api","datePublished":"2025-07-30T04:07:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41A1v2clCUL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Malware-Analysis-Artificial-Intelligence-Learning/dp/3030625842","contentSize":"19310 B","width":294,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.efeed657178fd0f6dd37fb878ba6d37a?rik=366ZDqphiOUJHw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"083BAAA2DC1FBF7184B11F09E58861AA0E99AEDF","accentColor":"1B475E"},"BACE477D8A42E37AF9E784E822F690F90C294763":{"name":"PDF Malware Detection Using Machine Learning[v1] | Preprints.org","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.SU0haClwLbdqxWD0FwYmGQAAAA?pid=Api","datePublished":"2023-01-30T11:58:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.preprints.org/img/user_image/522853/mouhammd_alkasassbeh.jpg","hostPageUrl":"https://www.preprints.org/manuscript/202301.0557/v1","contentSize":"50839 B","width":200,"height":200,"cDNContentUrl":"https://th.bing.com/th/id/R.494d216829702db76ac560f417062619?rik=q%2bx016gkPqeffg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"367492C09F096F228E487E9FA73E24A8D774ECAB","accentColor":"4A5A81"},"8910005DF5840FA9987BB01E04958494C12EDB65":{"name":"Ransomware Detection using Machine Learning | Virtual Expo | Corpus","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.Cp8o0d9drWWTyBnVPFI9lwHaGI?pid=Api","datePublished":"2025-04-07T13:59:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://ieee.nitk.ac.in/media/ckeditor_uploads/saksham.sks11%40gmail.com/2025/04/07/image.png","hostPageUrl":"https://ieee.nitk.ac.in/virtual_expo/report/66","contentSize":"13565 B","width":513,"height":425,"cDNContentUrl":"https://th.bing.com/th/id/R.0a9f28d1df5dad6593c819d53c523d97?rik=mAEA1V9I8JqJtw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"56BDE21C49485940E10BB7899AF0485FD5000198","accentColor":"C8B503"},"7C975DE12BD55408AB901059D2C31DFEB4A7679F":{"name":"Anomaly-Based Network Intrusion Detection - PHD Thesis | S-Logix","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.6fWpppVD2rY3og856Wao8wHaDN?pid=Api","datePublished":"2022-04-22T11:34:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/machine-learning/anomaly-based-network-intrusion-detection-using-machine-learning.jpg","hostPageUrl":"https://slogix.in/machine-learning/anomaly-based-network-intrusion-detection-using-machine-learning/","contentSize":"74711 B","width":830,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.e9f5a9a69543dab637a20f39e966a8f3?rik=x3nVHrJdRYC6CQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"F9767A4BEFD13C2D950109BA80455DB21ED579C7","accentColor":"004B95"},"6851B92D36C50BCBAA36A4547EBABEE9320D80EE":{"name":"Applied Machine Learning Using mlr3 in R : Bischl, Bernd, Sonabend ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.YtshqgHCCXe7M6dSNKbt3gHaKm?pid=Api","datePublished":"2023-11-05T20:21:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/71pd9RAeaNL._SL1500_.jpg","hostPageUrl":"https://www.amazon.in/Applied-Machine-Learning-Using-mlr3/dp/1032515678","contentSize":"141217 B","width":1048,"height":1500,"cDNContentUrl":"https://th.bing.com/th/id/R.62db21aa01c20977bb33a75234a6edde?rik=hhWb0mNcsLyqYw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EE08D0239EEBABE7454A63AABCB05C63D29B1586","accentColor":"BC4B0F"},"693280508652F9DCECDF05E3FF4C362C908E1108":{"name":"IoT Ddos Attack Detection Using Machine Learning | S-Logix","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.XuSZlxt97uFd0xxytUFD9gHaDN?pid=Api","datePublished":"2022-06-11T23:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/internet-of-things/iot-ddos-attack-detection-using-machine-learning.jpg","hostPageUrl":"https://slogix.in/internet-of-things/iot-ddos-attack-detection-using-machine-learning/","contentSize":"71879 B","width":830,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.5ee499971b7deee15dd31c72b54143f6?rik=liMIBWgln83O%2fQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8011E809C263C4FF3E50FDCECD9F256805082396","accentColor":"004A95"},"5C187037912C33B92B6E457ACF965ACB0994494B":{"name":"Phishing Website Detection Using Machine Learning Algorithms : Musa ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.syTJqDdDMlaW_4hus1SBqAAAAA?pid=Api","datePublished":"2025-07-27T09:30:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41blJA+xchL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Phishing-Website-Detection-Learning-Algorithms/dp/6200326169","contentSize":"20414 B","width":299,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.b324c9a83743325696ff886eb35481a8?rik=xYEHcxnCM5uy5g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B4944990BCA569FCA754E6B29B33C219730781C5","accentColor":"B53516"},"1B54E3D9017BDF31B3BEEDBB9BB052E38B5CC216":{"name":"UPI Fraud Detection Using Machine Learning","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.Z9-vjGlmE4KUXwAhNwozNQHaEK?pid=Api","datePublished":"2024-10-25T19:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://i.ytimg.com/vi/uzVdxlG1gIY/maxresdefault.jpg","hostPageUrl":"https://www.finalproject.in/post/upi-fraud-detection-using-machine-learning","contentSize":"120538 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.67dfaf8c69661382945f0021370a3335?rik=sUU%2bnRC3%2fRM76w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"612CC5B83E250BB9BBDEEB3B13FDB7109D3E45B1","accentColor":"C00B34"},"22F3B78293E00B2CCBD6A32F19EC6A297AC87123":{"name":"Waste Management System Fraud Detection Using Machine Learning ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.DLrAZBKzr2Q1A8F32rM2nAHaI9?pid=Api","datePublished":"2021-10-04T08:25:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/recycling/recycling-06-00065/article_deploy/html/images/recycling-06-00065-g002.png?1635995254","hostPageUrl":"https://www.mdpi.com/2313-4321/6/4/65","contentSize":"115805 B","width":785,"height":950,"cDNContentUrl":"https://th.bing.com/th/id/R.0cbac06412b3af643503c177dab3369c?rik=Ij97KDkOsMK8bQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"32178CA792A6CE91F23A6DBCC2B00E39287B3F22","accentColor":"559932"},"F95BA2693450B57148C2B01E04958494C12EDB65":{"name":"Ransomware Detection using Machine Learning | Virtual Expo | Corpus","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.WRNgJ3KDdaTiayq6yePQfwHaGd?pid=Api","datePublished":"2025-04-07T13:59:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://ieee.nitk.ac.in/media/ckeditor_uploads/saksham.sks11%40gmail.com/2025/04/07/image_B2C2uQg.png","hostPageUrl":"https://ieee.nitk.ac.in/virtual_expo/report/66","contentSize":"62936 B","width":663,"height":578,"cDNContentUrl":"https://th.bing.com/th/id/R.59136027728375a4e26b2abac9e3d07f?rik=n7UqlkMFWxeELA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"56BDE21C49485940E10B2C84175B0543962AB59F","accentColor":"C8B503"},"26AFE6368C382F72896F4C9577A6C165AF616026":{"name":"Android Spyware Detection Using Machine Learning: A Novel Dataset","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP._jdBCEl-O4HB4iy8V1-TcgHaDx?pid=Api","datePublished":"2022-08-02T13:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/sensors/sensors-22-05765/article_deploy/html/images/sensors-22-05765-g011.png?1659445338","hostPageUrl":"https://www.mdpi.com/1424-8220/22/15/5765","contentSize":"273413 B","width":2880,"height":1467,"cDNContentUrl":"https://th.bing.com/th/id/R.fe374108497e3b81c1e22cbc575f9372?rik=YvpuY8iD8ieY9g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"620616FA561C6A7759C4F69827F283C8636EFA62","accentColor":"C59806"},"E286063F4E94AD416B2EAD207019751AED2C9CA2":{"name":"Aislyntech Engineering Projects","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.Usq1ajLUnb3RwyPXxT0iIgHaEK?pid=Api","datePublished":"2020-12-17T07:31:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.aislyn.in/admin/product_images/1726056813_Untitled.png","hostPageUrl":"https://aislyn.in/","contentSize":"1215388 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.52cab56a32d49dbdd1c323d7c53d2222?rik=Lmhg8%2bRJ2hS24g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2AC9C2DEA157910702DAE2B614DA49E4F360682E","accentColor":"003ACB"},"0F6DE57176406295C1FA8F9764E75E7AE8E2A364":{"name":"Financial Fraud Detection Using Machine Learning | AI-Powered Fraud ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.36yAFCUwAJdGUuZq13qT8QHaFj?pid=Api","datePublished":"2025-06-16T07:13:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://img.youtube.com/vi/aFgRCafftGc/0.jpg","hostPageUrl":"https://aislyn.in/engineering-projects/financial-fraud-detection-with-machine-learning-advanced-ai-for-risk-prevention-bca","contentSize":"21652 B","width":480,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.dfac8014253000974652e66ad77a93f1?rik=8NZeF2cEJlkcrw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"463A2E8EA7E57E4679F8AF1C59260467175ED6F0","accentColor":"1EA8AD"},"5C13AE4AF07F77A8DC9A5A7EDB9AF117217035B7":{"name":"Forgery Image Detection Using Machine Learning Algorithms : Ahmed ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.XtPM-xzF1wXp1s_uYqCfbgAAAA?pid=Api","datePublished":"2025-04-12T20:28:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41Sklduyf1L._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Forgery-Detection-Machine-Learning-Algorithms/dp/6206783235","contentSize":"16546 B","width":303,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.5ed3ccfb1cc5d705e9d6cfee62a09f6e?rik=xTHqpA%2f3d4rNqQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7B530712711FA9BDE7A5A9CD8A77F70FA4EA31C5","accentColor":"932E2C"},"0657E7A226DA6FDB02510B038FA6A7BBCB8F15F0":{"name":"Buy Elements of Data Science, Machine Learning, and Artificial ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.kkuWNVaT0U8ODUA0BNF44wHaLg?pid=Api","datePublished":"2023-01-07T18:28:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/61RbUizMeRL._SL1285_.jpg","hostPageUrl":"https://www.amazon.in/Elements-Science-Learning-Artificial-Intelligence/dp/3031133382","contentSize":"74020 B","width":827,"height":1285,"cDNContentUrl":"https://th.bing.com/th/id/R.924b96355693d14f0e0d403404d178e3?rik=YHV%2bKmKt9r0gFQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0F51F8BCBB7A6AF830B01520BDF6AD622A7E7560","accentColor":"059CC6"},"63CE0D1FA1CE601FCCD81810EA0E4B8C73C89EE5":{"name":"ANALYSIS OF CHRONIC LIVER DISEASE DETECTION BY USING MACHINE LEARNING ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.eH6RIDxc9xpaD0RtFvKlNAHaFj?pid=Api","datePublished":"2025-02-19T15:13:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.finalyearprojects.in/wp-content/uploads/2023/12/Plant-leaf-disease-detection-using-ML_white.jpg","hostPageUrl":"https://www.finalyearprojects.in/project/analysis-of-chronic-liver-disease-detection-by-using-machine-learning-techniques/","contentSize":"66232 B","width":1024,"height":768,"cDNContentUrl":"https://th.bing.com/th/id/R.787e91203c5cf71a5a0f446d16f2a534?rik=NuzQ8RrsBvHMjQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5EE98C37C8B4E0AE01818DCCF106EC1AF1D0EC36","accentColor":"03A14D"},"A7F5066A3FE3F87FE776EDBB9BB052E38B5CC216":{"name":"UPI Fraud Detection Using Machine Learning","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.FLkC5ngMZULG3Qmg98_TjAAAAA?pid=Api","datePublished":"2024-10-25T19:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://static.wixstatic.com/media/271739_2b8ac9bc2ea6422e85b86b85213cbb55~mv2.jpeg/v1/fill/w_114,h_115,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/B4D7F4A7-29A6-4668-8B0B-2453DC715CFE_4_5005_c.jpeg","hostPageUrl":"https://www.finalproject.in/post/upi-fraud-detection-using-machine-learning","contentSize":"4251 B","width":114,"height":115,"cDNContentUrl":"https://th.bing.com/th/id/R.14b902e6780c6542c6dd09a0f7cfd38c?rik=el9gpvM%2bj%2fd%2bZw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"612CC5B83E250BB9BBDE677EF78F3EF3A6605F7A","accentColor":"C7BF04"},"9C29E6B93F5D4C8E8BB1474D63C66A5F7DFB894A":{"name":"DIAGONOSIS OF HEART-ABNORMALITIES DETECTION USING MACHINE LEARNING ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.xj01_yCdKfEzOyYvM75mZwAAAA?pid=Api","datePublished":"2023-12-01T17:46:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41g2KSOK+eL._SX342_SY445_.jpg","hostPageUrl":"https://www.amazon.in/DIAGONOSIS-HEART-ABNORMALITIES-DETECTION-MACHINE-LEARNING/dp/620472763X","contentSize":"14204 B","width":342,"height":251,"cDNContentUrl":"https://th.bing.com/th/id/R.c63d35ff209d29f1333b262f33be6667?rik=yZJum%2fPVxOi4Gw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"A498BFD7F5A66C36D4741BB8E8C4D5F39B6E92C9","accentColor":"B01B23"},"63C74BE50171C20475E5F4B33F54494F2BF3FFBB":{"name":"BCS602 Machine Learning Model Question Paper (2022) - Solved Exam Guide ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.rXLWL_5exKaXZwvklYwwxAHaKd?pid=Api","datePublished":"2025-06-11T11:17:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://website-assets.studocu.com/img/document_thumbnails/e0151a12185e02d89e472506c1a8d486/thumb_1200_1696.webp","hostPageUrl":"https://www.studocu.com/in/document/visvesvaraya-technological-university/computer-science-vtu/bcs602-machine-learning-model-question-paper-2022-solved-exam-guide/130181112","contentSize":"147626 B","width":1200,"height":1696,"cDNContentUrl":"https://th.bing.com/th/id/R.ad72d62ffe5ec4a697670be4958c30c4?rik=Nny0XhAXLEBXXg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"BBFF3FB2F49445F33B4F5E57402C17105EB47C36","accentColor":"666566"},"BCAAEE7786D7CC2DEF437C893B8196F3A967359C":{"name":"Stress Detection using Machine Learning Project | Talent Battle","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.ulNTZfPn2YPQeR2jbA5zCwHaD7?pid=Api","datePublished":"2022-11-22T05:53:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://media.talentbattle.in/Files/C4U_Images/C4U_PACKAGES_IMAGES/1155/stressdetection.jpg","hostPageUrl":"https://talentbattle.in/prepare/stress-detection-using-machine-learning","contentSize":"36716 B","width":1280,"height":680,"cDNContentUrl":"https://th.bing.com/th/id/R.ba535365f3e7d983d0791da36c0e730b?rik=y6rud2h9zNL%2bNA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C953769A3F6918B398C734FED2CC7D6877EEAACB","accentColor":"000051"},"AE26A2E498D3E2B75CDB412AFDD9CABDECF3D5D6":{"name":"Intelligent Hybrid Deep Learning Model for Breast Cancer Detection","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.jU2L3q2Y-u04UKBaHUZ7CQHaEy?pid=Api","datePublished":"2022-09-02T12:05:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/electronics/electronics-11-02767/article_deploy/html/images/electronics-11-02767-g008.png","hostPageUrl":"https://www.mdpi.com/2079-9292/11/17/2767","contentSize":"464777 B","width":3165,"height":2045,"cDNContentUrl":"https://th.bing.com/th/id/R.8d4d8bdead98faed3850a05a1d467b09?rik=6mIqTok9LnvFvQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6D5D3FCEDBAC9DDFA214BDC57B2E3D894E2A62EA","accentColor":"2F6D9C"},"E106316209DCFCC90020F217BC814AA8D1ED21E5":{"name":"MACHINE LEARNING (BCS602) VTU MODEL QUESTION PAPER 1 & 2 - Studocu","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.Tx_rAe1WY8RT0McVd2UPXgHaKJ?pid=Api","datePublished":"2025-05-10T06:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://website-assets.studocu.com/img/document_thumbnails/eba4c84f7a542ecc27cf16ac6efaca9f/thumb_1200_1645.webp","hostPageUrl":"https://www.studocu.com/in/document/visvesvaraya-technological-university/computer-science-vtu/machine-learning-bcs602-vtu-model-question-paper-1-2/126489899","contentSize":"144238 B","width":1200,"height":1645,"cDNContentUrl":"https://th.bing.com/th/id/R.4f1feb01ed5663c453d0c71577650f5e?rik=HmATJpDNz5wAAg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5E12DE1D8AA418CB712F02009CCFCD902613601E","accentColor":"8A8B41"},"922E7B1B22F7CCBBD8B08278419123F125B91566":{"name":"crime detection using machine learning final year project - BMS COLLEGE ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.h6s_CAaMehphGvwJyo3XwgAAAA?pid=Api","datePublished":"2022-04-12T14:54:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/e49eafc0d2021ac6a743cb9b6d7a546c/thumb_300_425.png","hostPageUrl":"https://www.studocu.com/in/document/bms-college-of-engineering/mobile-computing/crime-detection-using-machine-learning-final-year-project/22542430","contentSize":"43660 B","width":300,"height":425,"cDNContentUrl":"https://th.bing.com/th/id/R.87ab3f08068c7a1a611afc09ca8dd7c2?rik=KeK3sSJ%2fzLuNCw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"66519B521F32191487280B8DBBCC7F22B1B7E229","accentColor":"383838"},"78C3CA100C22DEE0D782F217BC814AA8D1ED21E5":{"name":"MACHINE LEARNING (BCS602) VTU MODEL QUESTION PAPER 1 & 2 - Studocu","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.W75eOIOe8JCxkU0wGGeWaQHaJl?pid=Api","datePublished":"2025-05-10T06:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://website-assets.studocu.com/img/document_thumbnails/6d8fe57316aaa4908979bbcb224e4297/thumb_1200_1553.webp","hostPageUrl":"https://www.studocu.com/in/document/visvesvaraya-technological-university/computer-science-vtu/machine-learning-bcs602-vtu-model-question-paper-1-2/126489899","contentSize":"168906 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.5bbe5e38839ef090b1914d3018679669?rik=hzysAcAi7Q59KA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5E12DE1D8AA418CB712F287D0EED22C001AC3C87","accentColor":"5F5F6C"},"CE79DAFA6DADEBDDBA06F217BC814AA8D1ED21E5":{"name":"MACHINE LEARNING (BCS602) VTU MODEL QUESTION PAPER 1 & 2 - Studocu","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.rMLWsx5cw6L0mwmcA54mVQHaJl?pid=Api","datePublished":"2025-05-10T06:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://website-assets.studocu.com/img/document_thumbnails/4cfb7fe16b4d2720b525a1ac1d3c6d93/thumb_1200_1553.webp","hostPageUrl":"https://www.studocu.com/in/document/visvesvaraya-technological-university/computer-science-vtu/machine-learning-bcs602-vtu-model-question-paper-1-2/126489899","contentSize":"77752 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.acc2d6b31e5cc3a2f49b099c039e2655?rik=7Jetr9bavt2rYA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5E12DE1D8AA418CB712F60ABDDBEDAD6AFAD97EC","accentColor":"AE911D"},"807199F9C7BFACF6AA6A59EB2A053D1F828A25B7":{"name":"Malware Forensics Guide - Static and Dynamic Approach - Yeah Hub","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP._a9PcwTqYroM7Yw0u2HDDQHaDi?pid=Api","datePublished":"2017-02-03T18:16:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.yeahhub.com/wp-content/uploads/2017/01/malware.png","hostPageUrl":"https://www.yeahhub.com/malware-forensics-guide-static-dynamic-approach/","contentSize":"451756 B","width":1600,"height":764,"cDNContentUrl":"https://th.bing.com/th/id/R.fdaf4f7304ea62ba0ced8c34bb61c30d?rik=CBeZn3z7ym%2bqpg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7B52A828F1D350A2BE95A6AA6FCAFB7C9F991708","accentColor":"CB7600"},"49DE02779169873151663F20486E8BE1C6E4DCCE":{"name":"Credit Card Fraud Detection Using Machine Learning","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.A5kUQJzNtQWfmRN0vyjNrwHaEK?pid=Api","datePublished":"2022-08-24T23:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.xenonstack.com/hubfs/xenonstack-credit-card-fraud-detection.png","hostPageUrl":"http://www.xenonstack.com/use-cases/credit-fraud-detection","contentSize":"32074 B","width":640,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.039914409ccdb5059f991374bf28cdaf?rik=lO0gdxmWeBMVZg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"ECCD4E6C1EB8E68402F36615137896197720ED94","accentColor":"0A61C1"},"3E5A2B7F7DE27E1C9B1EF217BC814AA8D1ED21E5":{"name":"MACHINE LEARNING (BCS602) VTU MODEL QUESTION PAPER 1 & 2 - Studocu","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.DYE6LsmSBUtY5EvL7379hQHaKe?pid=Api","datePublished":"2025-05-10T06:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://website-assets.studocu.com/img/document_thumbnails/f19261a9fdf5d32863497d2fff629579/thumb_1200_1697.webp","hostPageUrl":"https://www.studocu.com/in/document/visvesvaraya-technological-university/computer-science-vtu/machine-learning-bcs602-vtu-model-question-paper-1-2/126489899","contentSize":"207200 B","width":1200,"height":1697,"cDNContentUrl":"https://th.bing.com/th/id/R.0d813a2ec992054b58e44bcbef7efd85?rik=46Wy99cu58G54Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5E12DE1D8AA418CB712FE1B9C1E72ED7F7B2A5E3","accentColor":"566175"},"A3AEAA5BCAD339270990D0192153058020DF62AE":{"name":"Imperative Role of Machine Learning Algorithm for Detection of ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.N5CBLxSF2JuSpwf6A-NOyQHaFK?pid=Api","datePublished":"2003-12-08T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/diagnostics/diagnostics-12-02003/article_deploy/html/images/diagnostics-12-02003-g005.png?1660900046","hostPageUrl":"https://www.mdpi.com/2075-4418/12/8/2003","contentSize":"203948 B","width":2959,"height":2064,"cDNContentUrl":"https://th.bing.com/th/id/R.3790812f1485d89b92a707fa03e34ec9?rik=Ouqqtaw9k3KQCQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EA26FD0208503512910D099072933DACB5AAEA3A","accentColor":"99CC00"},"3A0DFAEF573CE9B7A85CDD24E54FE826FB523BA8":{"name":"PHISHING DETECTION USING MACHINE LEARNING - PHISHING DETECTION USING ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.1qmxVjnsvRlAAY45g07ERwAAAA?pid=Api","datePublished":"2023-04-30T08:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/8ee497e0bedae8d427f6d5c16017476b/thumb_300_388.png","hostPageUrl":"https://www.studocu.com/in/document/vellore-institute-of-technology/information-security-management/phishing-detection-using-machine-learning/55267979","contentSize":"36610 B","width":300,"height":388,"cDNContentUrl":"https://th.bing.com/th/id/R.d6a9b15639ecbd1940018e39834ec447?rik=o9Cv%2fnXDnnuKxQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8AB325BF628EF45E42DDC58A7B9EC375FEAFD0A3","accentColor":"3A6A91"},"32B3EECA22CB96419FF9DFA6E18FAED35C5CDEED":{"name":"Phishing URL Detection using Machine Learning","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.kJxJutsJ14uYUnz0pB9bEQAAAA?pid=Api","datePublished":"2022-06-11T11:26:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ijraset.com/downloads/paper_profile/70511mypic3%20(2).png","hostPageUrl":"https://www.ijraset.com/research-paper/phishing-url-detection-using-ml","contentSize":"239144 B","width":388,"height":389,"cDNContentUrl":"https://th.bing.com/th/id/R.909c49badb09d78b98527cf4a41f5b11?rik=IzvurCK8aRT5nw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"DEEDC5C53DEAF81E6AFD9FF91469BC22ACEE3B23","accentColor":"8B6D40"},"4003B802082C15131A2AF217BC814AA8D1ED21E5":{"name":"MACHINE LEARNING (BCS602) VTU MODEL QUESTION PAPER 1 & 2 - Studocu","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.tUpT4g2ZfishsWUMcX3BOAHaJl?pid=Api","datePublished":"2025-05-10T06:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://website-assets.studocu.com/img/document_thumbnails/cd16102768d9d68985ea23a5cf9a4bbb/thumb_1200_1553.webp","hostPageUrl":"https://www.studocu.com/in/document/visvesvaraya-technological-university/computer-science-vtu/machine-learning-bcs602-vtu-model-question-paper-1-2/126489899","contentSize":"60102 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.b54a53e20d997e2b21b1650c717dc138?rik=BDCLIIDCUTGhog&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5E12DE1D8AA418CB712FA2A13151C280208B3004","accentColor":"15959F"},"5252B7DD0221B851915FE7FA156ABE39893FA1E5":{"name":"Practical Machine Learning in R eBook : Nwanganga, Fred, Chapple, Mike ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.pQ8BKuwv0EwdtvaOUTWJCQAAAA?pid=Api","datePublished":"2020-12-12T16:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/514lzKVhlfL._SX342_SY445_.jpg","hostPageUrl":"https://www.amazon.in/Practical-Machine-Learning-Fred-Nwanganga-ebook/dp/B086Q6ZQSY","contentSize":"26450 B","width":342,"height":429,"cDNContentUrl":"https://th.bing.com/th/id/R.a50f012aec2fd04c1db6f68e51358909?rik=JSV73SASixUZ9Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5E1AF39893EBA651AF7EF519158B1220DD7B2525","accentColor":"B56B16"},"4D7B56D7C145A2E9C3BA250BF0D6B48D07A06500":{"name":"Review of Epileptic Seizure Detection using Machine Learning | S-Logix","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.fQi8GxanTPFEHTjixtOwBwHaDN?pid=Api","datePublished":"2022-09-13T09:20:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/machine-learning/a-review-of-epileptic-seizure-detection-using-machine-learning-classifiers.jpg","hostPageUrl":"https://slogix.in/machine-learning/a-review-of-epileptic-seizure-detection-using-machine-learning-classifiers/","contentSize":"56708 B","width":830,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.7d08bc1b16a74cf1441d38e2c6d3b007?rik=1LdlfRxUKp48qw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"00560A70D84B6D0FB052AB3C9E2A541C7D65B7D4","accentColor":"004C95"},"9EF9D18D63410D9C1671B57DC9E164EC13D47CFE":{"name":"Arrhythmia Detection Using machine Learning Techniques : Kiran B ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.Y76TWEGQVmecxWnnjl4ORQAAAA?pid=Api","datePublished":"2023-09-21T07:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41qT8YK7ZGL._SX342_SY445_.jpg","hostPageUrl":"https://www.amazon.in/Arrhythmia-Detection-machine-Learning-Techniques/dp/3659525758","contentSize":"13304 B","width":342,"height":249,"cDNContentUrl":"https://th.bing.com/th/id/R.63be9358419056679cc569e78e5e0e45?rik=6Z8d2DYU0MlhFw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"EFC74D31CE461E9CD75B1761C9D01436D81D9FE9","accentColor":"AB2024"},"41AA3A99D082BE34A614333C572F62B9D9304458":{"name":"Research Paper on Breast Cancer Prediction Using Machine Learning","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.1XibqcLAkuR53Xgwp44-dAAAAA?pid=Api","datePublished":"2022-07-31T18:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ijraset.com/images/text_version_uploads/imag%201_14432.png","hostPageUrl":"https://www.ijraset.com/research-paper/paper-on-breast-cancer-prediction-using-machine-learning","contentSize":"48089 B","width":466,"height":368,"cDNContentUrl":"https://th.bing.com/th/id/R.d5789ba9c2c092e479dd7830a78e3e74?rik=FKqjmQ0o60NqQQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8544039D9B26F275C333416A43EB280D99A3AA14","accentColor":"141414"},"463C58B9E2B776D22BCFC67361F3EDA5DD4652D0":{"name":"Buy AN IN-DEPTH GUIDE TO PLANT LEAF DISEASE DETECTION USING MACHINE ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.yAQ_sWm_Ma_wfJLiAzYUsgHaKh?pid=Api","datePublished":"2024-02-16T22:31:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/81lIl+MDgRL._SL1500_.jpg","hostPageUrl":"https://www.amazon.in/DISEASE-DETECTION-LEARNING-INTRUSION-SECURITY/dp/9391462898","contentSize":"204351 B","width":1055,"height":1500,"cDNContentUrl":"https://th.bing.com/th/id/R.c8043fb169bf31aff07c92e2033614b2?rik=ZMOFmy57Zy2y%2fA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0D2564DD5ADE3F16376CFCB22D677B2E9B85C364","accentColor":"C70404"},"93407441F511B4D079740E5F7A9BDCA8F6791219":{"name":"Credit Card Fraud Detection Using Machine Learning","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.jqZs8TpWO571YiliiQ-k-gHaEK?pid=Api","datePublished":"2018-06-22T21:24:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.xenonstack.com/hubfs/xenonstack-Illegal-parking-detection.png","hostPageUrl":"https://www.xenonstack.com/use-cases/credit-fraud-detection","contentSize":"165785 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.8ea66cf13a563b9ef5622962890fa4fa?rik=OQRHFF8RSw2XRw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9121976F8ACDB9A7F5E047970D4B115F14470439","accentColor":"CA8401"},"CEBE900AE728C198AAA4D0B3B7E57349CFA0CC36":{"name":"Buy Machine Learning Using R Book Online at Low Prices in India ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.I-kJJRET6d9zXgqE8wKbGwAAAA?pid=Api","datePublished":"2021-11-26T22:02:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/414B0p9GFUL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Machine-Learning-Using-Kumar-Rahul/dp/9354246117","contentSize":"20442 B","width":339,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.23e909251113e9df735e0a84f3029b1b?rik=7OsJoH6CHImqSg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"63CC0AFC94375E7B3B0D4AAA891C827EA009EBEC","accentColor":"B1731A"},"74665046E741293F28EEDBBF7DE52782C8FD2834":{"name":"Buy Network Intrusion Detection System using Machine Learning ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.MUvMSb700PFouE9oel036AAAAA?pid=Api","datePublished":"2013-06-28T12:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41jgVtyIkmS._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Network-Intrusion-Detection-Learning-Techniques/dp/3659410357","contentSize":"20402 B","width":296,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.314bcc49bef4d0f168b84f687a5d37e8?rik=R2YFZH4UkvOC7g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"4382DF8C28725ED7FBBDEE82F392147E64056647","accentColor":"B01B21"},"77D7D50630AA7E4C55335A4FFDDFE9A5D9D14658":{"name":"SDN-based Network IDS Using Machine Learning Research Topics | S-Logix","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.3xvx9sv4Mxqisd4lYZ7BAwHaDN?pid=Api","datePublished":"2023-04-01T14:17:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/software-defined-networks/research-topics-in-sdn-based-network-intrusion-detection-systems-using-machine-learning.jpg","hostPageUrl":"https://slogix.in/software-defined-networks/research-topics-in-sdn-based-network-intrusion-detection-systems-using-machine-learning/","contentSize":"60860 B","width":830,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.df1bf1f6cbf8331aa2b1de25619ec103?rik=d31dYAOq58RVMw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"85641D9D5A9EFDDFF4A53355C4E7AA03605D7D77","accentColor":"034A92"},"83994A165D41C1BB60A5B9054403473D3F70C476":{"name":"Recent Advancement in Cancer Detection using Machine Learning | S-Logix","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.Rj82662izM2BWjwezsMsbQHaDN?pid=Api","datePublished":"2022-07-29T02:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/machine-learning/recent-advancement-in-cancer-detection-using-machine-learning-systematic-survey-of-decades-comparisons-and-challenges.jpg","hostPageUrl":"https://slogix.in/machine-learning/recent-advancement-in-cancer-detection-using-machine-learning-systematic-survey-of-decades-comparisons-and-challenges/","contentSize":"75005 B","width":830,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.463f36ebada2cccd815a3c1ecec32c6d?rik=OJmkYdUUHLsGWg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"674C07F3D3743044509B5A06BB1C14D561A49938","accentColor":"004A95"},"02CDAC6ADFF5839D6859BF1609380FAFB2E6BE38":{"name":"How to check a site for viruses: tools overview","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.rENH8iopjHmScJv_91niHQHaEc?pid=Api","datePublished":"2020-06-24T13:25:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://serpstat.com/img/blog/how-to-check-a-website-for-viruses/1571328512image2.png","hostPageUrl":"https://serpstat.com/blog/how-to-check-a-website-for-viruses/","contentSize":"175093 B","width":1069,"height":641,"cDNContentUrl":"https://th.bing.com/th/id/R.ac4347f22a298c7992709bfff759e21d?rik=INzKpv1fONmGlQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"83EB6E2BFAF0839061FB9586D9385FFDA6CADC20","accentColor":"C76804"},"5D52C12DE7C79095B6603CFF8479F3C7E77560B7":{"name":"Plant Disease Detection and Classification by Deep Learning","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.0i0X1U2HKFcuFvVBKQ0B2gHaC8?pid=Api","datePublished":"2019-10-31T16:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/plants/plants-08-00468/article_deploy/html/images/plants-08-00468-g008.png?1574872620","hostPageUrl":"https://www.mdpi.com/2223-7747/8/11/468","contentSize":"1065828 B","width":3089,"height":1227,"cDNContentUrl":"https://th.bing.com/th/id/R.d22d17d54d8728572e16f541290d01da?rik=1SUc0n58CVlrBg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7B06577E7C3F9748FFC3066B59097C7ED21C25D5","accentColor":"8A2A2A"},"D0B6D49DE7188A443752779F2921A57306F59FC2":{"name":"Hybrid Intrusion Detection System Based on the Stacking Ensemble of C5 ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.G9MrYiklEkfWlmuGVtfUXwHaFN?pid=Api","datePublished":"2020-01-18T04:17:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/electronics/electronics-09-00173/article_deploy/html/images/electronics-09-00173-g001.png","hostPageUrl":"https://www.mdpi.com/2079-9292/9/1/173","contentSize":"372963 B","width":3877,"height":2731,"cDNContentUrl":"https://th.bing.com/th/id/R.1bd32b6229251247d6966b8656d7d45f?rik=DWtN2X6BqERzJQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2CF95F60375A1292F977257344A8817ED94D6B0D","accentColor":"B01B21"},"5475C6A26AB30B75461DEFAA79643DC73BC54236":{"name":"Predicting Employee Attrition Using Machine Learning Approaches","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.Ll1DToOyBAXe8maJvncS9wHaEE?pid=Api","datePublished":"2022-06-24T10:13:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/applsci/applsci-12-06424/article_deploy/html/images/applsci-12-06424-g001.png","hostPageUrl":"https://www.mdpi.com/2076-3417/12/13/6424","contentSize":"1782527 B","width":3195,"height":1758,"cDNContentUrl":"https://th.bing.com/th/id/R.2e5d434e83b20405def26689be7712f7?rik=RVdsKqY7sFdk0Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"63245CB37CD34697AAFED16457B03BA62A6C5745","accentColor":"C29809"},"B4F35AE7B0E8CDB97F9DF217BC814AA8D1ED21E5":{"name":"MACHINE LEARNING (BCS602) VTU MODEL QUESTION PAPER 1 & 2 - Studocu","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.8UgugfA8VdnaXbOeQxv5TgHaJl?pid=Api","datePublished":"2025-05-10T06:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://website-assets.studocu.com/img/document_thumbnails/86b0ca05078ea2691345f013e4deeb8f/thumb_1200_1553.webp","hostPageUrl":"https://www.studocu.com/in/document/visvesvaraya-technological-university/computer-science-vtu/machine-learning-bcs602-vtu-model-question-paper-1-2/126489899","contentSize":"11782 B","width":1200,"height":1553,"cDNContentUrl":"https://th.bing.com/th/id/R.f1482e81f03c55d9da5db39e431bf94e?rik=Sz%2blfguO3Jv32Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5E12DE1D8AA418CB712FD9F79BDC8E0B7EA53F4B","accentColor":"252525"},"4C1D67CCC9371E9B3728F3699BD220509E87CFD9":{"name":"NATIONAL LEVEL FACULTY DEVELOPMENT PROGRAMME on APPLICATIONS OF MACHINE ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.nibtFMaZNXQ1fkCrSKzWhAHaE8?pid=Api","datePublished":"2025-01-03T06:23:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://mgit.ac.in/wp-content/uploads/2025/01/FDP-Banner.jpg","hostPageUrl":"https://mgit.ac.in/events/national-level-faculty-development-programme-on-applications-of-machine-learning-in-r-and-d/","contentSize":"288262 B","width":1380,"height":922,"cDNContentUrl":"https://th.bing.com/th/id/R.9e26ed14c6993574357e40ab48acd684?rik=xNF2zJxz4blzgg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9DFC78E905022DB9963F8273B9E1739CCC76D1C4","accentColor":"B4AB17"},"E21DE116825A5E568BA1B81A63557AD109274F59":{"name":"Lab Members | ME IIT Kanpur","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.C3aMh4KkKrAoIF3dJc530gHaNK?pid=Api","datePublished":"2021-10-23T03:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://home.iitk.ac.in/~mlaw/images/arjun.jpg","hostPageUrl":"https://home.iitk.ac.in/~mlaw/lab-members.php","contentSize":"1964662 B","width":2304,"height":4096,"cDNContentUrl":"https://th.bing.com/th/id/R.0b768c8782a42ab028205ddd25ce77d2?rik=LtEeYSil5WW4Gg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"95F472901DA75536A18B1AB865E5A528611ED12E","accentColor":"447333"},"2E077B4960F0E9D3C58FE2DF6FA0CD70FF047584":{"name":"Document Image Forgery Detection Based on Deep Learning Models | S-Logix","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.K9LiwAgi59Dp3Vaz3kypsAHaDN?pid=Api","datePublished":"2023-02-07T21:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/machine-learning/document-image-forgery-detection-based-on-deep-learning-models.jpg","hostPageUrl":"https://slogix.in/machine-learning/document-image-forgery-detection-based-on-deep-learning-models/","contentSize":"63326 B","width":830,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.2bd2e2c00822e7d0e9dd56b3de4ca9b0?rik=4nC3lAYPnj1c%2bA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"485740FF07DC0AF6FD2EF85C3D9E0F0694B770E2","accentColor":"004B96"},"A32C31B1E18FC3E19B35A2C6B49905449C87B33D":{"name":"SPSS, E-views, Python, R programming | Freelancer","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.JUnzEYgyEm9nCaUsZPgTTgAAAA?pid=Api","datePublished":"2022-09-25T16:09:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn3.f-cdn.com/files/download/132472872/SPSS.png?width=780&height=314&fit=crop","hostPageUrl":"https://www.freelancer.in/u/citijayamala/portfolio/spss-eviews-python-r-programming-8592322","contentSize":"206671 B","width":474,"height":190,"cDNContentUrl":"https://th.bing.com/th/id/R.2549f3118832126f6709a52c64f8134e?rik=OsITGx74PB65Uw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"D33B78C94450994B6C2A53B91E3CF81E1B13C23A","accentColor":"2C4E7B"},"4A62BC8BADEE145048C23CFF8479F3C7E77560B7":{"name":"Plant Disease Detection and Classification by Deep Learning","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.YyntqchhkBMnXyToT73e5wHaGi?pid=Api","datePublished":"2019-10-31T16:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.mdpi.com/plants/plants-08-00468/article_deploy/html/images/plants-08-00468-g002-550.jpg","hostPageUrl":"https://www.mdpi.com/2223-7747/8/11/468","contentSize":"35902 B","width":550,"height":486,"cDNContentUrl":"https://th.bing.com/th/id/R.6329eda9c8619013275f24e84fbddee7?rik=pCbLuNruQQWELA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7B06577E7C3F9748FFC32C840541EEDAB8CB26A4","accentColor":"1ABD0E"},"AD37C633E0D98A94193AF936360699C59CBC0446":{"name":"Species Distribution Models with GIS & Machine Learning in R: Mapping ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.YGAFw3DE2TeEYYPVSv8-pQAAAA?pid=Api","datePublished":"2023-09-27T06:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/71sX0sNEIpL._SY466_.jpg","hostPageUrl":"https://www.amazon.in/Species-Distribution-Models-Machine-Learning-ebook/dp/B0CJM9M5VK","contentSize":"25431 B","width":329,"height":466,"cDNContentUrl":"https://th.bing.com/th/id/R.606005c370c4d937846183d54aff3ea5?rik=2nNsMw6dqEmRow&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6440CBC95C996063639FA39149A89D0E336C73DA","accentColor":"C78C04"},"A5AF52D5610DB52FA1279E7C0764DEC1E6F2FDD7":{"name":"Tuning Machine Learning Models Using a Group Search Firefly Algorithm ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.A5PK9Yn2cY1-RmLCAITEIQHaIf?pid=Api","datePublished":"2022-06-29T08:51:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/mathematics/mathematics-10-02272/article_deploy/html/images/mathematics-10-02272-g003.png?1656492451","hostPageUrl":"https://www.mdpi.com/2227-7390/10/13/2272","contentSize":"429318 B","width":2808,"height":3219,"cDNContentUrl":"https://th.bing.com/th/id/R.0393caf589f6718d7e4662c20084c421?rik=WvolXRbQW%2fIacg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7DDF2F6E1CED4670C7E9721AF25BD0165D25FA5A","accentColor":"CA9801"},"D50B8F51BF23CC06027721EBB535FCF7BA9A3A06":{"name":"Detection of Kidney Disease Using Machine Learning","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.51adfbBGH4Ukkzsdrf3BGAAAAA?pid=Api","datePublished":"2023-04-27T04:52:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ijraset.com/downloads/user_photos/2023/April/ijraset50321.jpg","hostPageUrl":"https://www.ijraset.com/research-paper/detection-of-kidney-disease-using-machine-learning","contentSize":"5659 B","width":100,"height":120,"cDNContentUrl":"https://th.bing.com/th/id/R.e7569d7db0461f8524933b1dadfdc118?rik=XbD4FfsyzGAgdw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"60A3A9AB7FCF535BBE12772060CC32FB15F8B05D","accentColor":"295CA2"},"A1B3C4C97E98A77170064D29B544BECC4E20EFD9":{"name":"Detection of Parkinson’s Disease Using XGBOOST Algorithm","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.yvvHJKsHyPaYaJNYtaMUYgHaFY?pid=Api","datePublished":"2022-12-24T15:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ijraset.com/images/text_version_uploads/imag%201_25040.png","hostPageUrl":"https://www.ijraset.com/research-paper/detection-of-parkinsons-disease-using-xgboost-algorithm","contentSize":"102197 B","width":574,"height":417,"cDNContentUrl":"https://th.bing.com/th/id/R.cafbc724ab07c8f698689358b5a31462?rik=GjtMnOeJehcHYA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9DFE02E4CCEB445B92D46007177A89E79C4C3B1A","accentColor":"1888B4"},"1224465CC6C5C2B0058AB7C4AB1A029EA61D3468":{"name":"From Regression to Reinforcement: The Complete ML Algorithm Map(Short ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.IQ9EnoD7rvhpaN82p3W-4QHaEv?pid=Api","datePublished":"2025-04-29T09:40:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.makinarocks.ai/wp-content/uploads/2022/04/19405b6372f32b2eb80b94cf3715fe34.png","hostPageUrl":"https://www.ujjwalit.co.in/blogs/6807b94cd86221d3a7ad6f1a","contentSize":"67557 B","width":1191,"height":762,"cDNContentUrl":"https://th.bing.com/th/id/R.210f449e80fbaef86968df36a775bee1?rik=IUJkxWxcLAtQqA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8643D16AE920A1BA4C7BA8500B2C5C6CC5644221","accentColor":"BD0E14"},"1F3D1E652B47E67E3114DD24E54FE826FB523BA8":{"name":"PHISHING DETECTION USING MACHINE LEARNING - PHISHING DETECTION USING ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.6HDAzDyTI2wyOhH1h0PH7AAAAA?pid=Api","datePublished":"2023-04-30T08:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/7d30bd91ffb45e6376b052605d784550/thumb_300_425.png","hostPageUrl":"https://www.studocu.com/in/document/vellore-institute-of-technology/information-security-management/phishing-detection-using-machine-learning/55267979","contentSize":"13708 B","width":300,"height":425,"cDNContentUrl":"https://th.bing.com/th/id/R.e870c0cc3c93236c323a11f58743c7ec?rik=8dPhVrJ0bucTQQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8AB325BF628EF45E42DD4113E76E74B256E1D3F1","accentColor":"A22929"},"13B5BDF00ACC61685EAB77E555AE5B6033EBA4D6":{"name":"Lungs Segmentation And Nodule Detection Using Machine Learning Medical ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.11wvRbkme0KAd-oE-1x8cwHaLG?pid=Api","datePublished":"2025-06-01T07:55:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/61CUdjsdRnS.jpg","hostPageUrl":"https://www.desertcart.in/products/474068236-lungs-segmentation-and-nodule-detection-using-machine-learning-medical-image","contentSize":"72997 B","width":907,"height":1360,"cDNContentUrl":"https://th.bing.com/th/id/R.d75c2f45b9267b428077ea04fb5c7c73?rik=MVvbD6DMFoblug&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6D4ABE3306B5EA555E77BAE58616CCA00FDB5B31","accentColor":"B02A1B"},"82E9CB29BCA94A2D8AF4279694287F02CFE257D1":{"name":"20+ Machine Learning Projects for Final Year Students","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.lqZJZYn6mbPiXlzHAakV8gAAAA?pid=Api","datePublished":"2025-04-18T11:06:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://static.wixstatic.com/media/271739_dcf5bfaf2e6a400d9215c8adb7ee0dbc~mv2.png/v1/fill/w_81,h_81,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/B4D7F4A7-29A6-4668-8B0B-2453DC715CFE_4_5.png","hostPageUrl":"https://www.finalproject.in/post/20-machine-learning-projects-for-final-year-students","contentSize":"9581 B","width":81,"height":81,"cDNContentUrl":"https://th.bing.com/th/id/R.96a6496589fa99b3e25e5cc701a915f2?rik=KJ68ksuapNKoTw&pid=ImgRaw&r=0","isTransparent":true,"imageId":"1D752EFC20F7824969724FA8D2A49ACB92BC9E28","accentColor":"C8BE03"},"D5DB1E7AAB6E66F63351B81A63557AD109274F59":{"name":"Lab Members | ME IIT Kanpur","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.wz0AgZtxtUujH5nFcxdBOgHaNK?pid=Api","datePublished":"2021-10-23T03:00:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://home.iitk.ac.in/~mlaw/images/mtech/namras.jpg","hostPageUrl":"https://home.iitk.ac.in/~mlaw/lab-members.php","contentSize":"2021417 B","width":4032,"height":2268,"cDNContentUrl":"https://th.bing.com/th/id/R.c33d00819b71b54ba31f99c57317413a?rik=Xb3hp7rmZm8zFQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"95F472901DA75536A18B15336F66E6BAA7E1BD5D","accentColor":"586C73"},"A2C54D2A03CC517670827F2F65CCBB9D7CCA6D33":{"name":"Feature Extraction and Classification of EEG Signals | S-Logix","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.R73Yvo-A-M8ZR92txHCCqAHaDN?pid=Api","datePublished":"2022-11-04T22:47:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/machine-learning/feature-extraction-and-classification-of-eeg-signals-for-seizure-detection.jpg","hostPageUrl":"https://slogix.in/machine-learning/feature-extraction-and-classification-of-eeg-signals-for-seizure-detection/","contentSize":"89816 B","width":830,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.47bdd8be8f80f8cf1947ddadc47082a8?rik=KlzUojDMFWcHKA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"33D6ACC7D9BBCC56F2F728076715CC30A2D45C2A","accentColor":"004A95"},"B3FF776F80A5404A4C5887866044E331A2CCE622":{"name":"Buy Fraud detection in credit cards using Machine Learning Book Online ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.k8FimJ0qzboisqA0Bew2FwAAAA?pid=Api","datePublished":"2023-06-07T18:23:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/415qUdUBc-L._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Fraud-detection-credit-Machine-Learning/dp/4187223711","contentSize":"12496 B","width":296,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.93c162989d2acdba22b2a03405ec3617?rik=O%2f939ghaBKTEhQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"226ECC2A133E4406687885C4A4045A08F677FF3B","accentColor":"1C3F6A"},"D9832380E0B810087009503E70FFC1B0218C03C1":{"name":"Credit Card Fraud Detection Using Machine Learning and Blockchain","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.EYhvRogiHz5pluImFhV0GgAAAA?pid=Api","datePublished":"2023-05-17T22:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ijraset.com/downloads/user_photos/2023/May/IJRASET52214.jpg","hostPageUrl":"https://www.ijraset.com/research-paper/credit-card-fraud-detection-using-machine-learning-and-blockchain","contentSize":"21949 B","width":50,"height":60,"cDNContentUrl":"https://th.bing.com/th/id/R.11886f4688221f3e6996e2261615741a?rik=nTgyCA6LAYAHkA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1C30C8120B1CFF07E305900780018B0E0832389D","accentColor":"2A4468"},"DEA1BD1FD85F7BFA4B93371C071B0C5023CCDCB2":{"name":"PhD Proposal on Heart Disease Diagnosis in Machine Learning | S-Logix","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.rxwSMdH93hGqoHCErMsdnAHaDI?pid=Api","datePublished":"2022-06-14T05:51:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/machine-learning/research-proposal-on-machine-learning-in-heart-disease-diagnosis.jpg","hostPageUrl":"https://slogix.in/machine-learning/research-proposal-on-machine-learning-in-heart-disease-diagnosis/","contentSize":"68286 B","width":850,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.af1c1231d1fdde11aaa07084accb1d9c?rik=7Rrb8Y31t6%2b0OQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2BCDCC3205C0B170C17339B4AFB7F58DF1DB1AED","accentColor":"004B94"},"E7730B69E373D4A3EE552D621160E604DD3795E1":{"name":"Transform Handwritten Words: Machine Learning Handwriting Detection","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.4brBKfY7LBOpTwRFsTxygwHaDA?pid=Api","datePublished":"2024-04-18T18:21:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://res.cloudinary.com/dwenudxjh/image/upload/v1713088057/ProjectMart_Store/xjmr7j5jcq0ronrztong.png","hostPageUrl":"https://store.projectmart.in/p/handwriting-detection-project","contentSize":"142623 B","width":1686,"height":686,"cDNContentUrl":"https://th.bing.com/th/id/R.e1bac129f63b2c13a94f0445b13c7283?rik=fjewlj43TTruVQ&riu=http%3a%2f%2fres.cloudinary.com%2fdwenudxjh%2fimage%2fupload%2fv1713088057%2fProjectMart_Store%2fxjmr7j5jcq0ronrztong.png&ehk=C3e5LKp2UW9veG5mCSHzsY%2bKwmIaVglNb4pcaUAC23E%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1E5973DD406E061126D255EE3A4D373E96B0377E","accentColor":"385B83"},"56B3A9FC3453A846077ED63DD59FDBA8E18774E2":{"name":"Automatic detection of oral cancer in smartphone-based images | S-Logix","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.jgzLydO8PywDg_Uuo3SabgHaDN?pid=Api","datePublished":"2022-10-12T17:57:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/machine-learning/automatic-detection-of-oral-cancer-in-smartphone-based-images-using-deep-learning-for-early-diagnosis.jpg","hostPageUrl":"https://slogix.in/machine-learning/automatic-detection-of-oral-cancer-in-smartphone-based-images-using-deep-learning-for-early-diagnosis/","contentSize":"81600 B","width":830,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.8e0ccbc9d3bc3f2c0383f52ea3749a6e?rik=ZTuaz0M1imRw5w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2E47781E8ABDF95DD36DE770648A3543CF9A3B65","accentColor":"004B96"},"7E40C44D8A0DF563B2CC7C893B8196F3A967359C":{"name":"Stress Detection using Machine Learning Project | Talent Battle","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.2aReCfUeVvWSLE0ffAK_XQHaCG?pid=Api","datePublished":"2022-11-22T05:53:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://talentbattle.in/Files/C4U_Images/C4U_CKEDITOR_IMAGES/IMG11209_2%20trainers%20(1).png","hostPageUrl":"https://talentbattle.in/prepare/stress-detection-using-machine-learning","contentSize":"64585 B","width":625,"height":177,"cDNContentUrl":"https://th.bing.com/th/id/R.d9a45e09f51e56f5922c4d1f7c02bf5d?rik=5wRM1KjQXzYrzA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"C953769A3F6918B398C7CC2B365FD0A8D44C04E7","accentColor":"080768"},"C5AB35E938F1A31040AE4960181F55C75D3F7046":{"name":"Edge AI Anomaly Detection Part 2 - Feature Extraction and Model Training","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.c_rhx1CTKHFc0seuN6Z8fQHaEK?pid=Api","datePublished":"2021-03-27T22:38:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.digikey.in/maker-media/c5e00a9d-2d59-4b0f-ae6c-cbf8a0cde756","hostPageUrl":"https://www.digikey.in/en/maker/projects/edge-ai-anomaly-detection-part-2-feature-extraction-and-model-training/70927a6e439b49bea7305953a3c9bfff","contentSize":"96892 B","width":1920,"height":1080,"cDNContentUrl":"https://th.bing.com/th/id/R.73fae1c7509328715cd2c7ae37a67c7d?rik=XLpTnoMfOgEE6g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6407F3D57C55F1810694EA04013A1F839E53BA5C","accentColor":"C79404"},"0FD4D78B1EC94C2786D54D29B544BECC4E20EFD9":{"name":"Detection of Parkinson’s Disease Using XGBOOST Algorithm","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.d8-bGnIfq01b7ynfauifbgHaEE?pid=Api","datePublished":"2022-12-24T15:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ijraset.com/images/text_version_uploads/imag%201_25039.png","hostPageUrl":"https://www.ijraset.com/research-paper/detection-of-parkinsons-disease-using-xgboost-algorithm","contentSize":"32090 B","width":534,"height":293,"cDNContentUrl":"https://th.bing.com/th/id/R.77cf9b1a721fab4d5bef29df6ae89f6e?rik=8E19uOGcxHJoXQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9DFE02E4CCEB445B92D45D6872C49CE1B87D4DF0","accentColor":"373737"},"16E22F94659C51A8FDED976AF3314D5522F0F66B":{"name":"BASICS OF ARTIFICIAL INTELLIGENCE","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.3qqmuFJd95iVvtnO7ZTahwHaGW?pid=Api","datePublished":"2021-05-26T22:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.iasgyan.in/ig-uploads/images/applications-of-machine-learning.png","hostPageUrl":"https://www.iasgyan.in/blogs/basics-of-artificial-intelligence","contentSize":"40927 B","width":624,"height":535,"cDNContentUrl":"https://th.bing.com/th/id/R.deaaa6b8525df79895bed9ceed94da87?rik=YS7ySVbJFYrf3g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B66F0F2255D4133FA679DEDF8A15C95649F22E61","accentColor":"99B70D"},"3E66A846102637822A5CCF246E76D73BE32A06D7":{"name":"Computer Science Project Ideas: Breaking Barriers in Tech","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.LvOq_KHLs_CkOU58bwx_4wHaEL?pid=Api","datePublished":"2024-04-20T13:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://cdn.hashnode.com/res/hashnode/image/upload/v1713593925213/10fe3264-33c0-4d4e-a564-2b534c95dbb4.png?w=400&h=210&fit=crop&crop=entropy&auto=compress","hostPageUrl":"https://blog.projectmart.in/computer-science-project-ideas-breaking-barriers-in-tech","contentSize":"366964 B","width":1640,"height":924,"cDNContentUrl":"https://th.bing.com/th/id/R.2ef3aafca1cbb3f0a4394e7c6f0c7fe3?rik=42aKZAFicyiixQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7D60A23EB37D67E642FCC5A228736201648A66E3","accentColor":"666666"},"C5633F304BEA7BFC8A1DA01FD7F9216B1DBFAD23":{"name":"plant diseage detectioin using machine learning - + Plant Disease ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.ENwt_WDwG4l0knrv7eoGVQAAAA?pid=Api","datePublished":"2023-12-24T14:18:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/41489fb92f5180ad64cc2d1b0ba71ee7/thumb_300_388.png","hostPageUrl":"https://www.studocu.com/in/document/rajkiya-engineering-college/machine-learning/plant-diseage-detectioin-using-machine-learning/79861261","contentSize":"41768 B","width":300,"height":388,"cDNContentUrl":"https://th.bing.com/th/id/R.10dc2dfd60f01b8974927aefedea0655?rik=XDbzA7Sut8%2bo0Q&pid=ImgRaw&r=0","isTransparent":false,"imageId":"32DAFBD1B6129F7DF10AD1A8CFB7AEB403F3365C","accentColor":"4C4C4C"},"F9F78E9273480A8DCF4128DC246456B5E52889C5":{"name":"Credit Card Fraud Detection using Machine Learning and Data Science","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.QzxiQBk3fVaVAwKH1z3fRQAAAA?pid=Api","datePublished":"2022-12-27T13:17:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ijraset.com/downloads/user_photos/2022/December/ijraset48293.jpeg","hostPageUrl":"https://www.ijraset.com/research-paper/credit-card-fraud-detection-using-ml-and-data-science","contentSize":"19466 B","width":100,"height":120,"cDNContentUrl":"https://th.bing.com/th/id/R.433c624019377d5695030287d73ddf45?rik=n3%2foKTeEoNj8FA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"5C98825E5B654642CD8214FCD8A0843729E87F9F","accentColor":"BE0D15"},"F5729C9859D0A33BE44E2D621160E604DD3795E1":{"name":"Transform Handwritten Words: Machine Learning Handwriting Detection","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.NVgm3QPLLetVm9Q0ix7gBAHaDX?pid=Api","datePublished":"2024-04-18T18:21:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://res.cloudinary.com/dwenudxjh/image/upload/v1713088041/ProjectMart_Store/hzgcbawqp5hrirqkrgkr.png","hostPageUrl":"https://store.projectmart.in/p/handwriting-detection-project","contentSize":"102550 B","width":1510,"height":686,"cDNContentUrl":"https://th.bing.com/th/id/R.355826dd03cb2deb559bd4348b1ee004?rik=XyfJiZUNOrNO5A&riu=http%3a%2f%2fres.cloudinary.com%2fdwenudxjh%2fimage%2fupload%2fv1713088041%2fProjectMart_Store%2fhzgcbawqp5hrirqkrgkr.png&ehk=yt3zBHwLPHkIFs%2bXpAPgZpxFRttfNVbpOUaqOFSm8UI%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"1E5973DD406E061126D2E44EB33A0D9589C9275F","accentColor":"7E7034"},"3D78073DB49318E8809CC48C7DAD428A6DB8326E":{"name":"Epileptic seizure detection on EEG signals using machine | S-Logix","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.cVL3sok8652EkQkM15k71AHaDN?pid=Api","datePublished":"2022-08-15T03:03:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/machine-learning/epileptic-seizure-detection-on-eeg-signals-using-machine-learning-techniques-and-advanced-preprocessing-methods.jpg","hostPageUrl":"https://slogix.in/machine-learning/epileptic-seizure-detection-on-eeg-signals-using-machine-learning-techniques-and-advanced-preprocessing-methods/","contentSize":"80053 B","width":830,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.7152f7b2893ceb9d8491090cd7993bd4?rik=04dw00s5gY4IyQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"E6238BD6A824DAD7C84CC9088E81394BD37087D3","accentColor":"004A95"},"C5381F754B6AA7875AC3B9DE24F47A319057E623":{"name":"machine learning with r training in amritsar | CACMS","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.M-n8IvansCaEdaqKRdLaZQHaHa?pid=Api","datePublished":"2020-09-07T10:21:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://cacms.in/admin/admin%20image/machinelearn-%20r%20leve1.jpg","hostPageUrl":"http://cacms.in/machine-learning-with-r-level-1/","contentSize":"42209 B","width":500,"height":500,"cDNContentUrl":"https://th.bing.com/th/id/R.33e9fc22f6a7b0268475aa8a45d2da65?rik=XIPxV7SmenilPA&riu=http%3a%2f%2fcacms.in%2fadmin%2fadmin+image%2fmachinelearn-+r+leve1.jpg&ehk=k%2fcBsTJLvUC0QcjduBTURNHKj8L2qmfzjok13B8j%2b%2bA%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"326E750913A74F42ED9B3CA5787AA6B457F1835C","accentColor":"00233E"},"C2CCBD2085B8E4CF2476C7F366A1E98199E2C5FC":{"name":"Twitch to use ‘Machine learning’ to detect banned user | Business Outreach","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.Gs0qZKPqjBN_a_CSAJ10AwAAAA?pid=Api","datePublished":"2023-08-21T13:26:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://businessoutreach.in/wp-content/uploads/2021/12/Twitch-to-use-%E2%80%98Machine-learning-to-detect-banned-user.jpg","hostPageUrl":"https://www.businessoutreach.in/twitch-to-use-machine-learning-to-detect-banned-user/","contentSize":"80973 B","width":400,"height":400,"cDNContentUrl":"https://th.bing.com/th/id/R.1acd2a64a3ea8c137f6bf092009d7403?rik=LMzbAliLTvxCZw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"CF5C2E99189E1A663F7C6742FC4E8B5802DBCC2C","accentColor":"5111BA"},"CE272D91E6B24E4FF4F33CFF8479F3C7E77560B7":{"name":"Plant Disease Detection and Classification by Deep Learning","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.q6YOEyoInsXAtEVWR0L-8wHaFp?pid=Api","datePublished":"2019-10-31T16:39:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://pub.mdpi-res.com/plants/plants-08-00468/article_deploy/html/images/plants-08-00468-g001.png?1574872621","hostPageUrl":"https://www.mdpi.com/2223-7747/8/11/468","contentSize":"789763 B","width":2812,"height":2143,"cDNContentUrl":"https://th.bing.com/th/id/R.aba60e132a089ec5c0b445564742fef3?rik=7HLSGW4r5PRPPw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"7B06577E7C3F9748FFC33F4FF4E42B6E19D272EC","accentColor":"C49807"},"267E6DF545B7C2C856B66FB4FAC38E60ABFA2260":{"name":"Cyber Protect: A Robust Cybersecurity System for Fraudulent Scam and ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.RF2fNXO5W_W4q0_6M5fpWwAAAA?pid=Api","datePublished":"2023-12-03T06:27:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ijraset.com/downloads/user_photos/2023/November/IJRASET57066.jpg","hostPageUrl":"https://www.ijraset.com/research-paper/cyber-protect-a-robust-cybersecurity-system","contentSize":"11790 B","width":100,"height":120,"cDNContentUrl":"https://th.bing.com/th/id/R.445d9f3573b95bf5b8ab4ffa3397e95b?rik=YufWX1R7LIxlaw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"0622AFBA06E83CAF4BF66B658C2C7B545FD6E762","accentColor":"525860"},"A04AF1F2C2F41A3D915444ACDB704692BF003B0B":{"name":"BRAIN TUMOR: Analysis, Classification, and Detection Using Machine ...","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.GUPoXUL4f66yYgvOs31AkAAAAA?pid=Api","datePublished":"2024-07-11T15:35:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41qXrDFZZFL._SX342_SY445_.jpg","hostPageUrl":"https://www.amazon.in/BRAIN-TUMOR-Analysis-Classification-Detection/dp/B09CK1BX95","contentSize":"21215 B","width":342,"height":443,"cDNContentUrl":"https://th.bing.com/th/id/R.1943e85d42f87faeb2620bceb37d4090?rik=CqQfLyxPodMZRQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B0B300FB296407BDCA444519D3A14F2C2F1FA40A","accentColor":"A73D24"},"5598020647FA57B9AE277C893B8196F3A967359C":{"name":"Stress Detection using Machine Learning Project | Talent Battle","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.0PMTXCbGY_5vvzVqkK0kiQAAAA?pid=Api","datePublished":"2022-11-22T05:53:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://talentbattle.in/Files/C4U_Images/C4U_CKEDITOR_IMAGES/IMG11158_feature3.png","hostPageUrl":"https://talentbattle.in/prepare/stress-detection-using-machine-learning","contentSize":"7773 B","width":250,"height":250,"cDNContentUrl":"https://th.bing.com/th/id/R.d0f3135c26c663fe6fbf356a90ad2489?rik=VYkgYHSvdZvqcg&pid=ImgRaw&r=0","isTransparent":true,"imageId":"C953769A3F6918B398C772EA9B75AF7460208955","accentColor":"060467"},"12700850AEA12E38C3CC786FCA57C132B12EEEC3":{"name":"Data science and Machine learning video Lectures | VLR training","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.bNOaMA4ahGFpxSuj-7hCiwHaEQ?pid=Api","datePublished":"2019-03-20T13:42:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://www.vlrtraining.in/wp-content/uploads/2018/04/Machine-learning-workflow.png","hostPageUrl":"https://www.vlrtraining.in/data-science-machine-learning-telugu/","contentSize":"31859 B","width":711,"height":409,"cDNContentUrl":"https://th.bing.com/th/id/R.6cd39a300e1a846169c52ba3fbb8428b?rik=IQeABeoa4oM8zA&riu=http%3a%2f%2fwww.vlrtraining.in%2fwp-content%2fuploads%2f2018%2f04%2fMachine-learning-workflow.png&ehk=lsuDev3oOyN%2fyhlB8J0u0BsVi%2f1ZplVeh7czo6bQT6Q%3d&risl=&pid=ImgRaw&r=0","isTransparent":true,"imageId":"3CEEE21B231C75ACF687CC3C83E21AEA05800721","accentColor":"069EC5"},"7D89784160CD9BEE4AC6C4215F647F0F45CB36C2":{"name":"My book ‘Practical Machine Learning in R and Python: Third edition’ on ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.GSNO02ylBO8dScVX-NZo3QHaCJ?pid=Api","datePublished":"2019-01-25T21:32:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://gigadom.in/wp-content/uploads/2019/01/Untitled-1.png?w=1024","hostPageUrl":"https://gigadom.in/2019/01/02/my-book-practical-machine-learning-in-r-and-python-third-edition-on-amazon/","contentSize":"126816 B","width":1024,"height":298,"cDNContentUrl":"https://th.bing.com/th/id/R.19234ed36ca504ef1d49c557f8d668dd?rik=15iHFAbcue6kbA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"2C63BC54F0F746F5124C6CA4EEB9DC06148798D7","accentColor":"134A63"},"F13F808D6BCD9E7C082553446D3EAE75E68F0FEC":{"name":"Machine Learning Projects","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.ac136o4BEiBNr-rnMfR81AHaHa?pid=Api","datePublished":"2023-03-14T09:57:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://finalyearcollegeproject.in/telegram.png","hostPageUrl":"http://finalyearcollegeproject.in/","contentSize":"23088 B","width":512,"height":512,"cDNContentUrl":"https://th.bing.com/th/id/R.69cd77ea8e0112204dafeae731f47cd4?rik=H%2fMI2Lbc6ceAUg&riu=http%3a%2f%2ffinalyearcollegeproject.in%2ftelegram.png&ehk=FzlIW%2fBmz3AlrzyGUApZLEfzrEih5HmI5ulHwrBsI4g%3d&risl=&pid=ImgRaw&r=0","isTransparent":true,"imageId":"CEF0F86E57EAE3D644355280C7E9DCB6D808F31F","accentColor":"0091C8"},"32E3567E9FA264B8F8C54D440A2D328BE3044B69":{"name":"Raman Lab","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.sRcClRa9Yv007wj1Hh82dQHaHa?pid=Api","datePublished":"2025-04-09T08:56:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://ramanlab.co.in/img/scholer/smitha.png","hostPageUrl":"https://ramanlab.co.in/reasearchteam.html","contentSize":"439414 B","width":563,"height":563,"cDNContentUrl":"https://th.bing.com/th/id/R.b117029516bd62fd34ef08f51e1f3675?rik=Iz5l5%2fkqRouPXA&pid=ImgRaw&r=0","isTransparent":true,"imageId":"96B4403EB823D2A044D45C8F8B462AF9E7653E23","accentColor":"321E1C"},"F9BCB950067BB6B94B697C893B8196F3A967359C":{"name":"Stress Detection using Machine Learning Project | Talent Battle","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.cAU3dZu7tTG7QduT_VN11AAAAA?pid=Api","datePublished":"2022-11-22T05:53:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://talentbattle.in/Files/C4U_Images/C4U_CKEDITOR_IMAGES/IMG11159_feature4.png","hostPageUrl":"https://talentbattle.in/prepare/stress-detection-using-machine-learning","contentSize":"8726 B","width":250,"height":250,"cDNContentUrl":"https://th.bing.com/th/id/R.700537759bbbb531bb41db93fd5375d4?rik=n8ubBWC3a5u0lg&pid=ImgRaw&r=0","isTransparent":true,"imageId":"C953769A3F6918B398C796B49B6BB760059BCB9F","accentColor":"040366"},"D9D1F6A96D4579D462CA1B36DB9A79052CCBCC15":{"name":"Buy Machine and Deep Learning Algorithms, Applications Cancer Detection ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.YkC5PM8ifEHCiAdMay6pzgAAAA?pid=Api","datePublished":"2024-06-13T05:29:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41sVAXuzVlL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Machine-Learning-Algorithms-Applications-Detection/dp/6207487907","contentSize":"21527 B","width":296,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.6240b93ccf227c41c288074c6b2ea9ce?rik=nR1vmtZUl00mrA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"51CCBCC25097A9BD63B1AC264D9754D69A6F1D9D","accentColor":"B01B21"},"BDC0D19B30A8850DADAE26060CBEF374C04B84A9":{"name":"Social Media based Hate Speech Detection using Machine Learning","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.bm0ObhIQiZ6ouhXQpHj1pwAAAA?pid=Api","datePublished":"2023-05-17T22:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ijraset.com/downloads/user_photos/2023/May/IJRASET52206.jpg","hostPageUrl":"https://www.ijraset.com/research-paper/social-media-based-hate-speech-detection","contentSize":"8174 B","width":100,"height":120,"cDNContentUrl":"https://th.bing.com/th/id/R.6e6d0e6e1210899ea8ba15d0a478f5a7?rik=2wwduQOKWNDa6g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9A48B40C473FEBC06062EADAD0588A03B91D0CDB","accentColor":"214267"},"7F8E5139F2DB12B80AD7E74DB1EE602244BDFC30":{"name":"Machine learning in R: Buy Machine learning in R by Mr. Susheel Aakulu ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.X_SRjOFCqJztA0Ov_XroWAAAAA?pid=Api","datePublished":"2023-06-20T21:46:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://rukmini1.flixcart.com/image/300/300/xif0q/book/h/p/b/machine-learning-in-r-original-imagzkqfazrjz6ez.jpeg","hostPageUrl":"https://www.flipkart.com/machine-learning-r/p/itmc5b61a903e655","contentSize":"26409 B","width":205,"height":300,"cDNContentUrl":"https://th.bing.com/th/id/R.5ff4918ce142a89ced0343affd7ae858?rik=9%2bgVky%2b9IYugfQ&riu=http%3a%2f%2frukmini1.flixcart.com%2fimage%2f300%2f300%2fxif0q%2fbook%2fh%2fp%2fb%2fmachine-learning-in-r-original-imagzkqfazrjz6ez.jpeg&ehk=sTfIjzACMXFAUHZKcC3cKe5ub9ZI7y9rVBLr61qulGk%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"03CFDB442206EE1BD47E7DA08B21BD2F9315E8F7","accentColor":"741124"},"DA23A4A948388495882343A98D9E8A788A456688":{"name":"Clarification on 2021 Industry Internship (21INT82) Scheme at VTU - Studocu","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.zhKlQkkttCYgt_TvF078cwHaKd?pid=Api","datePublished":"2025-03-05T02:15:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://website-assets.studocu.com/img/document_thumbnails/98f76994ca5add8876f2b20fea47c583/thumb_1200_1694.png","hostPageUrl":"https://www.studocu.com/in/document/visvesvaraya-technological-university/computer-science-vtu/circular-1966-21int82-industry-or-research-internship-2021-scheme-clarification/119846898","contentSize":"665912 B","width":1200,"height":1694,"cDNContentUrl":"https://th.bing.com/th/id/R.ce12a542492db42620b7f4ef174efc73?rik=rTJKmoSDSFmIMg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"886654A887A8E9D89A343288594883849A4A32AD","accentColor":"2817B4"},"4DCB32405BFEA56EBC0C30F0AA8E5C107A361CC6":{"name":"Design of Intelligent Applications using Machine Learning and Deep ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.mH4e1OoclUiR-Aylo6GafQAAAA?pid=Api","datePublished":"2025-02-06T17:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41ditk4FiYL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Intelligent-Applications-Machine-Learning-Techniques/dp/0367679892","contentSize":"22194 B","width":307,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.987e1ed4ea1c954891f80ca5a3a19a7d?rik=1LwjBLXvWubLwA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"6CC163A701C5E8AA0F03C0CBE65AEFB50423BCD4","accentColor":"345597"},"DCCEF4581EFAAC552152D5B3FB2C78B74B1EDD7B":{"name":"Buy Sensors Data Processing Using Machine Learning Book Online at Low ...","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.v5WXEtGf4jnbZ_4-yXNiMAAAAA?pid=Api","datePublished":"2025-07-28T06:44:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/31UmPUj4y0L._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/Sensors-Processing-Using-Machine-Learning/dp/3725811717","contentSize":"10089 B","width":294,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.bf959712d19fe239db67fe3ec9736230?rik=zexPheGvylUSJQ&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B7DDE1B47B87C2BF3B5D251255CAAFE1854FECCD","accentColor":"1B8589"},"884F5850064B0D1F1CA0FE756F94F867A3E322DE":{"name":"Depression Detection from Social Network Using Deep Learning | S-Logix","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.gCsgXjnCWoh5XTtXzuFCEQHaDN?pid=Api","datePublished":"2022-11-26T15:49:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/machine-learning/early-depression-detection-from-social-network-using-deep-learning-techniques.jpg","hostPageUrl":"https://slogix.in/machine-learning/early-depression-detection-from-social-network-using-deep-learning-techniques/","contentSize":"66918 B","width":830,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.802b205e39c25a88795d3b57cee14211?rik=iPSFBWC00PHBCg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"ED223E3A768F49F657EF0AC1F1D0B4600585F488","accentColor":"004A95"},"C4792C03B3CDF1A28A1DDFE33EBBCD0D15793415":{"name":"Advanced Transfer Learning Implementation for Anomaly Detection using ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.j9Q1VnTY09SZ-SyZA0dUSgHaHa?pid=Api","datePublished":"2025-11-12T18:05:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://johal.in/content/images/2025/08/logo-1.png","hostPageUrl":"https://www.johal.in/advanced-transfer-learning-implementation-for-anomaly-detection-using-pytorch-for-oracles-in-2026/","contentSize":"1411915 B","width":1024,"height":1024,"cDNContentUrl":"https://th.bing.com/th/id/R.8fd4355674d8d3d499f92c990347544a?rik=TJfCMDvcHyqo0Q&pid=ImgRaw&r=0","isTransparent":true,"imageId":"51439751D0DCBBE33EFDD1A82A1FDC3B30C2974C","accentColor":"0054AC"},"732E45A71CEE0B30DF8125466C7CFAABF34A81E1":{"name":"College Projects Expert - From Experts to Students: High-Quality ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.zmxs3Sl9ZzBjwB3816C7LAAAAA?pid=Api","datePublished":"2025-06-15T16:28:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://collegeprojectexpert.in/static/uploads/languages/5.png","hostPageUrl":"https://collegeprojectexpert.in/","contentSize":"6132 B","width":128,"height":128,"cDNContentUrl":"https://th.bing.com/th/id/R.ce6c6cdd297d673063c01dfcd7a0bb2c?rik=N%2bJUesHusAP9GA&pid=ImgRaw&r=0","isTransparent":true,"imageId":"1E18A43FBAAFC7C6645218FD03B0EEC17A54E237","accentColor":"CB9700"},"0D2F3F0637A2CE72D4708B3604D543A31E316825":{"name":"IIIT Vadodara-DIU | Faculty","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.uBPQnFzjOgHlQ3lBiejmOAHaIs?pid=Api","datePublished":"2020-09-23T12:33:00.0000000Z","isFamilyFriendly":true,"contentUrl":"http://diu.iiitvadodara.ac.in/img/AP.jpg","hostPageUrl":"http://diu.iiitvadodara.ac.in/faculty.php","contentSize":"199495 B","width":684,"height":803,"cDNContentUrl":"https://th.bing.com/th/id/R.b813d09c5ce33a01e543794189e8e638?rik=0PLzYHMq7CdNBw&riu=http%3a%2f%2fdiu.iiitvadodara.ac.in%2fimg%2fAP.jpg&ehk=CJa4Zv8rN41cFE3lzM6ZutuBdRldyafRdnqW1y4Rr00%3d&risl=&pid=ImgRaw&r=0","isTransparent":false,"imageId":"528613E13A345D4063B8074D27EC2A7360F3F2D0","accentColor":"3D3D3D"},"C95F3E2100176057E4344D29B544BECC4E20EFD9":{"name":"Detection of Parkinson’s Disease Using XGBOOST Algorithm","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.Ct4mmwgM9izriqIG4qY_HAAAAA?pid=Api","datePublished":"2022-12-24T15:10:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ijraset.com/images/text_version_uploads/imag%201_25043.png","hostPageUrl":"https://www.ijraset.com/research-paper/detection-of-parkinsons-disease-using-xgboost-algorithm","contentSize":"48200 B","width":255,"height":346,"cDNContentUrl":"https://th.bing.com/th/id/R.0ade269b080cf62ceb8aa206e2a63f1c?rik=nPXjEgBxBnVOQw&pid=ImgRaw&r=0","isTransparent":false,"imageId":"9DFE02E4CCEB445B92D4434E7506710012E3F59C","accentColor":"1386B8"},"D4EF5A9CA8521BA793FD333C572F62B9D9304458":{"name":"Research Paper on Breast Cancer Prediction Using Machine Learning","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.aaC5SXbZuF1ajaOLSPUhzgHaEg?pid=Api","datePublished":"2022-07-31T18:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ijraset.com/images/text_version_uploads/imag%201_14433.png","hostPageUrl":"https://www.ijraset.com/research-paper/paper-on-breast-cancer-prediction-using-machine-learning","contentSize":"40410 B","width":534,"height":325,"cDNContentUrl":"https://th.bing.com/th/id/R.69a0b94976d9b85d5a8da38b48f521ce?rik=Tf6lyYolsXo53w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8544039D9B26F275C333DF397AB1258AC9A5FE4D","accentColor":"181818"},"EDFE64BBEE4A9243C4E88C29750FFABBDE108435":{"name":"My book ‘Practical Machine Learning with R and Python’ on Amazon – Giga ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.QmmWQfnvwaeVVtr4EjahVQHaDE?pid=Api","datePublished":"2018-12-12T12:48:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://gigadom.in/wp-content/uploads/2017/12/untitled4.png","hostPageUrl":"https://gigadom.in/2017/12/05/my-book-practical-machine-learning-with-r-and-python-on-amazon/","contentSize":"196629 B","width":1269,"height":527,"cDNContentUrl":"https://th.bing.com/th/id/R.42699641f9efc1a79556daf81236a155?rik=3u9Gu%2b6kKTRMjg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"534801EDBBAFF05792C88E4C3429A4EEBB46EFDE","accentColor":"AB7520"},"2436F272E431B18FB4AD414AA0FD4FF8E5D6ABDA":{"name":"Buy The business of Machine Learning:How to use Machine Learning to ...","thumbnailUrl":"https://tse2.mm.bing.net/th/id/OIP.ZTtdO9RvjdETVlgJk7mU4gAAAA?pid=Api","datePublished":"2023-09-27T07:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41SrS8j2znL._SY445_SX342_.jpg","hostPageUrl":"https://www.amazon.in/business-Machine-Learning-drive-revenue/dp/B0CHK8G3KC","contentSize":"19274 B","width":296,"height":445,"cDNContentUrl":"https://th.bing.com/th/id/R.653b5d3bd46f8dd11356580993b994e2?rik=QmMvJ04TG%2fhL2g&pid=ImgRaw&r=0","isTransparent":false,"imageId":"ADBA6D5E8FF4DF0AA414DA4BF81B134E272F6342","accentColor":"22426C"},"0C38615B658BE572693E002E2450345D5F562B82":{"name":"Effective Face Detection using Machine Intelligence : P. Patel, P ...","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.IVJ3tRYTZlcPQ5pi0OQ-rgAAAA?pid=Api","datePublished":"2021-03-26T01:45:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://m.media-amazon.com/images/I/41SO-LSc3KL._SX342_SY445_.jpg","hostPageUrl":"https://www.amazon.in/Effective-Detection-using-Machine-Intelligence/dp/3330059230","contentSize":"14234 B","width":342,"height":251,"cDNContentUrl":"https://th.bing.com/th/id/R.215277b5161366570f439a62d0e43eae?rik=wIMWtVa4XieW4w&pid=ImgRaw&r=0","isTransparent":false,"imageId":"28B265F5D5430542E200E396275EB856B51683C0","accentColor":"9A111D"},"7CDA55A52AC243CD2EAB333C572F62B9D9304458":{"name":"Research Paper on Breast Cancer Prediction Using Machine Learning","thumbnailUrl":"https://tse1.mm.bing.net/th/id/OIP.EZYEY5KouD3tI0HkeGSFkgAAAA?pid=Api","datePublished":"2022-07-31T18:43:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://www.ijraset.com/images/text_version_uploads/imag%201_14436.png","hostPageUrl":"https://www.ijraset.com/research-paper/paper-on-breast-cancer-prediction-using-machine-learning","contentSize":"29486 B","width":260,"height":249,"cDNContentUrl":"https://th.bing.com/th/id/R.1196046392a8b83ded2341e478648592?rik=x61VWqIsNNziug&pid=ImgRaw&r=0","isTransparent":false,"imageId":"8544039D9B26F275C333BAE2DC342CA25A55ADC7","accentColor":"666666"},"233D51610B9BCB21B4653806226CAB7985DF412B":{"name":"Diabetes Prediction Using Machine Learning","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.yWJcRS3GjqIhckHho_wNVAHaEK?pid=Api","datePublished":"2023-01-03T20:50:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://i.ytimg.com/vi/39PUAvOknxw/maxresdefault.jpg","hostPageUrl":"https://www.finalproject.in/post/diabetes-prediction-using-machine-learning","contentSize":"112170 B","width":1280,"height":720,"cDNContentUrl":"https://th.bing.com/th/id/R.c9625c452dc68ea2217241e1a3fc0d54?rik=MtMVFrC5vBJLVg&pid=ImgRaw&r=0","isTransparent":false,"imageId":"B214FD5897BAC6226083564B12BCB9B01615D332","accentColor":"521CAF"},"8633A18CAFBBC9A680A6F1BE8088C702946EBA31":{"name":"Epileptic seizure detection and prediction using stacked | S-Logix","thumbnailUrl":"https://tse4.mm.bing.net/th/id/OIP.dMz0u0qKVaJtQLt1RNh9SAHaDN?pid=Api","datePublished":"2022-10-11T09:04:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://slogix.in/images/machine-learning/epileptic-seizure-detection-and-prediction-using-stacked-bidirectional-long-short-term-memory.jpg","hostPageUrl":"https://slogix.in/machine-learning/epileptic-seizure-detection-and-prediction-using-stacked-bidirectional-long-short-term-memory/","contentSize":"72058 B","width":830,"height":360,"cDNContentUrl":"https://th.bing.com/th/id/R.74ccf4bb4a8a55a26d40bb7544d87d48?rik=aDMayPq7nGoIag&pid=ImgRaw&r=0","isTransparent":false,"imageId":"13ABE649207C8808EB1F6A086A9CBBFAC81A3368","accentColor":"004A95"},"3312C0BA2AE214BA5F43C52D50E1C843F05D3F00":{"name":"Bennett University Ph.D. scholar","thumbnailUrl":"https://tse3.mm.bing.net/th/id/OIP.Med55oDgTUav4AOzXGXOCQAAAA?pid=Api","datePublished":"2021-03-04T06:49:00.0000000Z","isFamilyFriendly":true,"contentUrl":"https://research.bennett.edu.in/rdsadmin/uploads/%20173424E18SOE822%20Arvind%20Kumar.jpg","hostPageUrl":"https://research.bennett.edu.in/research-scholar.php","contentSize":"29905 B","width":382,"height":372,"cDNContentUrl":"https://th.bing.com/th/id/R.31e779e680e04d46afe003b35c65ce09?rik=MyEMq6IuQav1NA&pid=ImgRaw&r=0","isTransparent":false,"imageId":"00F3D50F348C1E05D25C34F5AB412EA2AB0C2133","accentColor":"5E3596"}},"relatedSearches":[{"text":"Machine Learning in Malware Detection","displayText":"Machine Learning in Malware Detection","webSearchUrl":"https://www.bing.com/images/search?q=Machine+Learning+in+Malware+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5817.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Machine+Learning+in+Malware+Detection","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Machine+Learning+in+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection Using Machine Learning in Activity Diagram","displayText":"Malware Detection Using Machine Learning in Activity Diagram","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+Using+Machine+Learning+in+Activity+Diagram&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5819.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+Using+Machine+Learning+in+Activity+Diagram","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malware+Detection+Using+Machine+Learning+in+Activity+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection System Diagram Using Machine Learning","displayText":"Malware Detection System Diagram Using Machine Learning","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+System+Diagram+Using+Machine+Learning&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5821.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+System+Diagram+Using+Machine+Learning","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Malware+Detection+System+Diagram+Using+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection Using Machine Learning Data Flow Diagram","displayText":"Malware Detection Using Machine Learning Data Flow Diagram","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+Using+Machine+Learning+Data+Flow+Diagram&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5823.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+Using+Machine+Learning+Data+Flow+Diagram","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malware+Detection+Using+Machine+Learning+Data+Flow+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Deep Learning for Malware Detection","displayText":"Deep Learning for Malware Detection","webSearchUrl":"https://www.bing.com/images/search?q=Deep+Learning+for+Malware+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5825.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Deep+Learning+for+Malware+Detection","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Deep+Learning+for+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Advanced Machine Learning for Malware Detection","displayText":"Advanced Machine Learning for Malware Detection","webSearchUrl":"https://www.bing.com/images/search?q=Advanced+Machine+Learning+for+Malware+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5827.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Advanced+Machine+Learning+for+Malware+Detection","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Advanced+Machine+Learning+for+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection Using Ensemble Learning","displayText":"Malware Detection Using Ensemble Learning","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+Using+Ensemble+Learning&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5829.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+Using+Ensemble+Learning","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malware+Detection+Using+Ensemble+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Class Diagram for Malware Detection Using Machine Learning","displayText":"Class Diagram for Malware Detection Using Machine Learning","webSearchUrl":"https://www.bing.com/images/search?q=Class+Diagram+for+Malware+Detection+Using+Machine+Learning&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5831.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Class+Diagram+for+Malware+Detection+Using+Machine+Learning","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Class+Diagram+for+Malware+Detection+Using+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Deep Learning Model in Malware Detection","displayText":"Deep Learning Model in Malware Detection","webSearchUrl":"https://www.bing.com/images/search?q=Deep+Learning+Model+in+Malware+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5833.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Deep+Learning+Model+in+Malware+Detection","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Deep+Learning+Model+in+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"PDF Malware Detection toward Machine Learning Project Diagram","displayText":"PDF Malware Detection toward Machine Learning Project Diagram","webSearchUrl":"https://www.bing.com/images/search?q=PDF+Malware+Detection+toward+Machine+Learning+Project+Diagram&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5835.1","searchLink":"https://www.bing.com/api/v7/images/search?q=PDF+Malware+Detection+toward+Machine+Learning+Project+Diagram","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=PDF+Malware+Detection+toward+Machine+Learning+Project+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Android Malware Detection Using Ml","displayText":"Android Malware Detection Using Ml","webSearchUrl":"https://www.bing.com/images/search?q=Android+Malware+Detection+Using+Ml&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5837.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Android+Malware+Detection+Using+Ml","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Android+Malware+Detection+Using+Ml&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection Using Machine Learning Cover Image","displayText":"Malware Detection Using Machine Learning Cover Image","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+Using+Machine+Learning+Cover+Image&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5839.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+Using+Machine+Learning+Cover+Image","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Malware+Detection+Using+Machine+Learning+Cover+Image&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Rare Malware Graph Machine Learning","displayText":"Rare Malware Graph Machine Learning","webSearchUrl":"https://www.bing.com/images/search?q=Rare+Malware+Graph+Machine+Learning&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5841.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Rare+Malware+Graph+Machine+Learning","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Rare+Malware+Graph+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Why Machine Larning for Malware Detection Systems","displayText":"Why Machine Larning for Malware Detection Systems","webSearchUrl":"https://www.bing.com/images/search?q=Why+Machine+Larning+for+Malware+Detection+Systems&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5843.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Why+Machine+Larning+for+Malware+Detection+Systems","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Why+Machine+Larning+for+Malware+Detection+Systems&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Road Map of Malware Detection Using Machine Learning","displayText":"Road Map of Malware Detection Using Machine Learning","webSearchUrl":"https://www.bing.com/images/search?q=Road+Map+of+Malware+Detection+Using+Machine+Learning&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5845.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Road+Map+of+Malware+Detection+Using+Machine+Learning","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Road+Map+of+Malware+Detection+Using+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Methodology for Machine Learning for Malware Detection","displayText":"Methodology for Machine Learning for Malware Detection","webSearchUrl":"https://www.bing.com/images/search?q=Methodology+for+Machine+Learning+for+Malware+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5847.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Methodology+for+Machine+Learning+for+Malware+Detection","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Methodology+for+Machine+Learning+for+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Database Design for Malware Detection Using Machine Learning","displayText":"Database Design for Malware Detection Using Machine Learning","webSearchUrl":"https://www.bing.com/images/search?q=Database+Design+for+Malware+Detection+Using+Machine+Learning&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5849.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Database+Design+for+Malware+Detection+Using+Machine+Learning","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Database+Design+for+Malware+Detection+Using+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection Using Machine Learning in Data Structure Diagram","displayText":"Malware Detection Using Machine Learning in Data Structure Diagram","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+Using+Machine+Learning+in+Data+Structure+Diagram&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5851.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+Using+Machine+Learning+in+Data+Structure+Diagram","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malware+Detection+Using+Machine+Learning+in+Data+Structure+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Windows Malware Detection Using Malware Visualisation","displayText":"Windows Malware Detection Using Malware Visualisation","webSearchUrl":"https://www.bing.com/images/search?q=Windows+Malware+Detection+Using+Malware+Visualisation&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5853.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Windows+Malware+Detection+Using+Malware+Visualisation","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Windows+Malware+Detection+Using+Malware+Visualisation&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"System Architecture of Malware Detection through Machine Learning","displayText":"System Architecture of Malware Detection through Machine Learning","webSearchUrl":"https://www.bing.com/images/search?q=System+Architecture+of+Malware+Detection+through+Machine+Learning&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5855.1","searchLink":"https://www.bing.com/api/v7/images/search?q=System+Architecture+of+Malware+Detection+through+Machine+Learning","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=System+Architecture+of+Malware+Detection+through+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection Software","displayText":"Malware Detection Software","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+Software&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5857.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+Software","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malware+Detection+Software&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Automated Malware Detection","displayText":"Automated Malware Detection","webSearchUrl":"https://www.bing.com/images/search?q=Automated+Malware+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5859.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Automated+Malware+Detection","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Automated+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"LLM of Malware Detection Using Machine Learning","displayText":"LLM of Malware Detection Using Machine Learning","webSearchUrl":"https://www.bing.com/images/search?q=LLM+of+Malware+Detection+Using+Machine+Learning&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5861.1","searchLink":"https://www.bing.com/api/v7/images/search?q=LLM+of+Malware+Detection+Using+Machine+Learning","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=LLM+of+Malware+Detection+Using+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection in Local Network","displayText":"Malware Detection in Local Network","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+in+Local+Network&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5863.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+in+Local+Network","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Malware+Detection+in+Local+Network&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection Using Lgbm and Xgboost GitHub","displayText":"Malware Detection Using Lgbm and Xgboost GitHub","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+Using+Lgbm+and+Xgboost+GitHub&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5865.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+Using+Lgbm+and+Xgboost+GitHub","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malware+Detection+Using+Lgbm+and+Xgboost+GitHub&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection Using Machine Learning Presentation","displayText":"Malware Detection Using Machine Learning Presentation","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+Using+Machine+Learning+Presentation&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5867.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+Using+Machine+Learning+Presentation","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malware+Detection+Using+Machine+Learning+Presentation&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"How Deep Learning Is Used to Detect Malware","displayText":"How Deep Learning Is Used to Detect Malware","webSearchUrl":"https://www.bing.com/images/search?q=How+Deep+Learning+Is+Used+to+Detect+Malware&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5869.1","searchLink":"https://www.bing.com/api/v7/images/search?q=How+Deep+Learning+Is+Used+to+Detect+Malware","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=How+Deep+Learning+Is+Used+to+Detect+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Image-Based Malware Detection","displayText":"Image-Based Malware Detection","webSearchUrl":"https://www.bing.com/images/search?q=Image-Based+Malware+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5871.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Image-Based+Malware+Detection","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Image-Based+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Crime Detection Using Deep Learning and Machine Learning","displayText":"Crime Detection Using Deep Learning and Machine Learning","webSearchUrl":"https://www.bing.com/images/search?q=Crime+Detection+Using+Deep+Learning+and+Machine+Learning&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5873.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Crime+Detection+Using+Deep+Learning+and+Machine+Learning","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Crime+Detection+Using+Deep+Learning+and+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Prims Framework for M Machine Learning Malware Detection","displayText":"Prims Framework for M Machine Learning Malware Detection","webSearchUrl":"https://www.bing.com/images/search?q=Prims+Framework+for+M+Machine+Learning+Malware+Detection&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5875.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Prims+Framework+for+M+Machine+Learning+Malware+Detection","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Prims+Framework+for+M+Machine+Learning+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection Techniques","displayText":"Malware Detection Techniques","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+Techniques&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5877.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+Techniques","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malware+Detection+Techniques&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Android Malware Detection Using Ml Title Picture","displayText":"Android Malware Detection Using Ml Title Picture","webSearchUrl":"https://www.bing.com/images/search?q=Android+Malware+Detection+Using+Ml+Title+Picture&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5879.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Android+Malware+Detection+Using+Ml+Title+Picture","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Android+Malware+Detection+Using+Ml+Title+Picture&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Road Map of Malware Detection Using Machine Learning in PPT","displayText":"Road Map of Malware Detection Using Machine Learning in PPT","webSearchUrl":"https://www.bing.com/images/search?q=Road+Map+of+Malware+Detection+Using+Machine+Learning+in+PPT&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5881.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Road+Map+of+Malware+Detection+Using+Machine+Learning+in+PPT","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Road+Map+of+Malware+Detection+Using+Machine+Learning+in+PPT&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Intelligient Malware Detection Application Methodology","displayText":"Intelligient Malware Detection Application Methodology","webSearchUrl":"https://www.bing.com/images/search?q=Intelligient+Malware+Detection+Application+Methodology&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5883.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Intelligient+Malware+Detection+Application+Methodology","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Intelligient+Malware+Detection+Application+Methodology&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Machine Learning Taxonomy","displayText":"Machine Learning Taxonomy","webSearchUrl":"https://www.bing.com/images/search?q=Machine+Learning+Taxonomy&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5885.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Machine+Learning+Taxonomy","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Machine+Learning+Taxonomy&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Classification Using Deep Learning","displayText":"Malware Classification Using Deep Learning","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Classification+Using+Deep+Learning&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5887.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Classification+Using+Deep+Learning","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Malware+Classification+Using+Deep+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Machine Learning Pipe Line for Malware Detection in PDF","displayText":"Machine Learning Pipe Line for Malware Detection in PDF","webSearchUrl":"https://www.bing.com/images/search?q=Machine+Learning+Pipe+Line+for+Malware+Detection+in+PDF&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5889.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Machine+Learning+Pipe+Line+for+Malware+Detection+in+PDF","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Machine+Learning+Pipe+Line+for+Malware+Detection+in+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection Using FPGA","displayText":"Malware Detection Using FPGA","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+Using+FPGA&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5891.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+Using+FPGA","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Malware+Detection+Using+FPGA&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Python Machine Learning Malware Projects","displayText":"Python Machine Learning Malware Projects","webSearchUrl":"https://www.bing.com/images/search?q=Python+Machine+Learning+Malware+Projects&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5893.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Python+Machine+Learning+Malware+Projects","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Python+Machine+Learning+Malware+Projects&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Deep Learning Model in Malware Detection and Xai","displayText":"Deep Learning Model in Malware Detection and Xai","webSearchUrl":"https://www.bing.com/images/search?q=Deep+Learning+Model+in+Malware+Detection+and+Xai&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5895.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Deep+Learning+Model+in+Malware+Detection+and+Xai","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Deep+Learning+Model+in+Malware+Detection+and+Xai&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Resilent Smart Malware Detection Using Deep Learning","displayText":"Resilent Smart Malware Detection Using Deep Learning","webSearchUrl":"https://www.bing.com/images/search?q=Resilent+Smart+Malware+Detection+Using+Deep+Learning&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5897.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Resilent+Smart+Malware+Detection+Using+Deep+Learning","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Resilent+Smart+Malware+Detection+Using+Deep+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Email Spam and Malware Detection Using Machine Learning","displayText":"Email Spam and Malware Detection Using Machine Learning","webSearchUrl":"https://www.bing.com/images/search?q=Email+Spam+and+Malware+Detection+Using+Machine+Learning&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5899.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Email+Spam+and+Malware+Detection+Using+Machine+Learning","thumbnail":{"thumbnailUrl":"https://tse4.mm.bing.net/th?q=Email+Spam+and+Malware+Detection+Using+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Identification Using Visualization Images and Deep Learning","displayText":"Malware Identification Using Visualization Images and Deep Learning","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Identification+Using+Visualization+Images+and+Deep+Learning&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5901.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Identification+Using+Visualization+Images+and+Deep+Learning","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Malware+Identification+Using+Visualization+Images+and+Deep+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Algorythem for Sensor Detection Using Machine Learning","displayText":"Algorythem for Sensor Detection Using Machine Learning","webSearchUrl":"https://www.bing.com/images/search?q=Algorythem+for+Sensor+Detection+Using+Machine+Learning&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5903.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Algorythem+for+Sensor+Detection+Using+Machine+Learning","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Algorythem+for+Sensor+Detection+Using+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Flowchart for Malware Detection Using Machine Learning Methodology","displayText":"Flowchart for Malware Detection Using Machine Learning Methodology","webSearchUrl":"https://www.bing.com/images/search?q=Flowchart+for+Malware+Detection+Using+Machine+Learning+Methodology&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5905.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Flowchart+for+Malware+Detection+Using+Machine+Learning+Methodology","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Flowchart+for+Malware+Detection+Using+Machine+Learning+Methodology&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection Using Ml Research Paper","displayText":"Malware Detection Using Ml Research Paper","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+Using+Ml+Research+Paper&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5907.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+Using+Ml+Research+Paper","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Malware+Detection+Using+Ml+Research+Paper&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Malware Detection Files and URLs Using Machine Learning Activity Diagram","displayText":"Malware Detection Files and URLs Using Machine Learning Activity Diagram","webSearchUrl":"https://www.bing.com/images/search?q=Malware+Detection+Files+and+URLs+Using+Machine+Learning+Activity+Diagram&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5909.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Malware+Detection+Files+and+URLs+Using+Machine+Learning+Activity+Diagram","thumbnail":{"thumbnailUrl":"https://tse2.mm.bing.net/th?q=Malware+Detection+Files+and+URLs+Using+Machine+Learning+Activity+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Activity Chart Malware Detection System Using Deep Learning","displayText":"Activity Chart Malware Detection System Using Deep Learning","webSearchUrl":"https://www.bing.com/images/search?q=Activity+Chart+Malware+Detection+System+Using+Deep+Learning&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5911.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Activity+Chart+Malware+Detection+System+Using+Deep+Learning","thumbnail":{"thumbnailUrl":"https://tse1.mm.bing.net/th?q=Activity+Chart+Malware+Detection+System+Using+Deep+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"State Diagram for Malware Detection Using Machine Learning","displayText":"State Diagram for Malware Detection Using Machine Learning","webSearchUrl":"https://www.bing.com/images/search?q=State+Diagram+for+Malware+Detection+Using+Machine+Learning&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5913.1","searchLink":"https://www.bing.com/api/v7/images/search?q=State+Diagram+for+Malware+Detection+Using+Machine+Learning","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=State+Diagram+for+Malware+Detection+Using+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}},{"text":"Common Machine Learning Algorithms","displayText":"Common Machine Learning Algorithms","webSearchUrl":"https://www.bing.com/images/search?q=Common+Machine+Learning+Algorithms&FORM=IRPATC","webSearchUrlPingSuffix":"images.LB.1,5915.1","searchLink":"https://www.bing.com/api/v7/images/search?q=Common+Machine+Learning+Algorithms","thumbnail":{"thumbnailUrl":"https://tse3.mm.bing.net/th?q=Common+Machine+Learning+Algorithms&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1"}}],"createdate":1769807604843}
            [curl_error] => 
            [product_name_used] => Malware-Detection-Using-Machine-Learning
            [parsed] => Array
                (
                    [name] => malware-detection-using-machine-learning inr loc:in
                    [totalEstimatedMatches] => 157
                    [nextOffset] => 120
                    [currentOffset] => 0
                    [value] => Array
                        (
                            [E7E58AB4F4ECD8C040A979275BB9E7F0BED78D66] => Array
                                (
                                    [name] => Malware Detection Using Machine Learnin 1 112620 - Malware Detection ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.9ysGxvNc08SLmZAUj9vPTwHaJl?pid=Api
                                    [datePublished] => 2024-07-19T04:09:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/7699fb68cf8cdf21b2ec9d998d28afcb/thumb_1200_1553.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/dr-apj-abdul-kalam-technical-university/btech/malware-detection-using-machine-learnin-1-112620/96402906
                                    [contentSize] => 200543 B
                                    [width] => 1200
                                    [height] => 1553
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f72b06c6f35cd3c48b9990148fdbcf4f?rik=fl6oS0%2fOjQwEmg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 66D87DEB0F7E9BB572979A040C8DCE4F4BA85E7E
                                    [accentColor] => 21427E
                                )

                            [3A6BB3898CA78337ABE482EBEC70373C00312D5F] => Array
                                (
                                    [name] => Study Of Malware Detection Using Machine Learning - See discussions ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.0RRncOJbOD4ixdkZB1y3eQHaJl?pid=Api
                                    [datePublished] => 2023-10-08T03:13:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/f8d38426a6c315e71d57e56b1974e268/thumb_1200_1553.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/visvesvaraya-technological-university/computer-science-vtu/study-of-malware-detection-using-machine-learning/71361040
                                    [contentSize] => 86450 B
                                    [width] => 1200
                                    [height] => 1553
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d1146770e25b383e22c5d919075cb779?rik=o7Y7mMh6OHO6Tg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F5D21300C37307CEBE284EBA73387AC8983BB6A3
                                    [accentColor] => 156899
                                )

                            [5C0039107061BB6D1830EF8F2E93808CC1945A76] => Array
                                (
                                    [name] => Robust Intelligent Malware Detection Using Deep Learning | S-Logix
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.I0MDQLY9f8sYujHmEOMpJwHaDN?pid=Api
                                    [datePublished] => 2022-06-16T23:58:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/machine-learning/robust-intelligent-malware-detection-using-deep-learning.jpg
                                    [hostPageUrl] => https://slogix.in/machine-learning/robust-intelligent-malware-detection-using-deep-learning/
                                    [contentSize] => 40012 B
                                    [width] => 830
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.23430340b63d7fcb18ba31e610e32927?rik=xQCTAQcWu9aBAw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 67A5491CC80839E2F8FE0381D6BB1607019300C5
                                    [accentColor] => 004B95
                                )

                            [BDCCAE0C26AF77C46160351AA1830598BD198F4F] => Array
                                (
                                    [name] => Top 6 Machine Learning Books in Cybersecurity - Tech Hyme
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.tlyGa9DfR7zUp4IxClchOwHaJy?pid=Api
                                    [datePublished] => 2024-01-06T11:05:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://techhyme.com/wp-content/uploads/2024/01/Malware-Data-Science-Attack-Detection-and-Attribution.jpg
                                    [hostPageUrl] => https://techhyme.com/top-6-machine-learning-books-in-cybersecurity/
                                    [contentSize] => 222963 B
                                    [width] => 1135
                                    [height] => 1500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b65c866bd0df47bcd4a782310a57213b?rik=28zqwGL6d0wWBg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F4F891DB8950381AA15306164C77FA62C0EACCDB
                                    [accentColor] => 789239
                                )

                            [8F9A0CEEE9D005F0C7173C0B12A2447EF043D9D5] => Array
                                (
                                    [name] => Malware Detection System Project
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.Qxkt11bUWWVhvjh1NAwlkAHaEK?pid=Api
                                    [datePublished] => 2023-11-05T14:27:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://i.ytimg.com/vi/sytw02floHA/maxresdefault.jpg
                                    [hostPageUrl] => https://www.finalproject.in/post/malware-detection-system-project
                                    [contentSize] => 101684 B
                                    [width] => 1280
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.43192dd756d4596561be3875340c2590?rik=%2bKnA7p4NUA98cQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5D9D340FE7442A21B0C3717C0F500D9EEEC0A9F8
                                    [accentColor] => C5A506
                                )

                            [A85E61987AC6266B09335A1B41E6B26545B2C291] => Array
                                (
                                    [name] => Malware detection using ML - Malware Discovery utilizing AI ABSTRACT ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.g8F28Had2CKMEJWZl9HDfwHaKe?pid=Api
                                    [datePublished] => 2024-01-12T02:27:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/0372d7cf7e57131609bc527ffcf2aecc/thumb_1200_1697.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/jntua-college-of-engineering-anantapuram/computer-science/malware-detection-using-ml/81074683
                                    [contentSize] => 258120 B
                                    [width] => 1200
                                    [height] => 1697
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.83c176f0769dd8228c10959997d1c37f?rik=iuUWiadsYraQMw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 192C2B54562B6E14B1A53390B6626CA78916E58A
                                    [accentColor] => 3E3E3E
                                )

                            [9550C50BCAAEC546DF8BF5CB127E0F677D69FD07] => Array
                                (
                                    [name] => Android malware detection using deep learning-Python Project | S-Logix
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.CwTFZNca78Dnt3u4kqMeMAHaDN?pid=Api
                                    [datePublished] => 2022-05-06T05:19:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/machine-learning/maldozer-automatic-framework-for-android-malware-detection-using-deep-learning.jpg
                                    [hostPageUrl] => https://slogix.in/machine-learning/maldozer-automatic-framework-for-android-malware-detection-using-deep-learning/
                                    [contentSize] => 61554 B
                                    [width] => 830
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0b04c564d71aefc0e7b77bb892a31e30?rik=WQVcsKzqXGT9uA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 70DF96D776F0E721BC5FB8FD645CEAACB05C0559
                                    [accentColor] => 004A95
                                )

                            [498614D7127B27B812207EC095BF8F7BDE554677] => Array
                                (
                                    [name] => DOC - GOOD DOCUMENT FOR MALWARE - Malware Detection Using Machine ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.sPRrxJIRJfSNN804XM0AMgHaJl?pid=Api
                                    [datePublished] => 2023-03-25T12:46:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/5f02df289180b7cac2d7156f1f981e13/thumb_1200_1553.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/anna-university/computer-science/doc-good-document-for-malware/39352057
                                    [contentSize] => 157067 B
                                    [width] => 1200
                                    [height] => 1553
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b0f46bc4921125f48d37cd385ccd0032?rik=lGhBfSG3coshAg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 776455EDB7F8FB590CE702218B72B7217D416894
                                    [accentColor] => 0A85C1
                                )

                            [FD14FE0584D06452FCF5E171BDAD72310668801A] => Array
                                (
                                    [name] => Phishing Email Detection Model Using Deep Learning
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.NbSx3WIpuc4QWhS2df0UcwHaFJ?pid=Api
                                    [datePublished] => 2023-10-15T06:30:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/electronics/electronics-12-04261/article_deploy/html/images/electronics-12-04261-g003.png?1697351114
                                    [hostPageUrl] => https://www.mdpi.com/2079-9292/12/20/4261
                                    [contentSize] => 1005314 B
                                    [width] => 3129
                                    [height] => 2178
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.35b4b1dd6229b9ce105a14b675fd1473?rik=30HvUEgNRiXPXw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A10886601327DADB171E5FCF25460D4850EF41DF
                                    [accentColor] => CAC901
                                )

                            [79AE0CE9FBCC7A8C943A825B7E0A1A11ACE8D32E] => Array
                                (
                                    [name] => Android Malware Detection Techniques: A Literature Review | S-Logix
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.4_dmO-uuOhgHwgBwxMbUpgHaDN?pid=Api
                                    [datePublished] => 2022-08-26T00:06:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/digital-forensics/android-malware-detection-techniques-a-literature-review.jpg
                                    [hostPageUrl] => https://slogix.in/digital-forensics/android-malware-detection-techniques-a-literature-review/
                                    [contentSize] => 54400 B
                                    [width] => 830
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e3f7663bebae3a1807c20070c4c6d4a6?rik=l%2brAnr%2fMp8hJow&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E23D8ECA11A1A0E7B528A349C8A7CCBF9EC0EA97
                                    [accentColor] => 004B95
                                )

                            [C4E7143EDE7D89B5D4E63FCAFA178998CBD69EFE] => Array
                                (
                                    [name] => Machine Learning in Cybersecurity | Kaspersky
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.5Unwxry3Ab0FRU8jZB_OggHaEK?pid=Api
                                    [datePublished] => 2018-08-07T02:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.kaspersky.com/content/en-global/enterprise-security/wiki-section/img/Machine-Learning-in-Cybersecurity-1.png
                                    [hostPageUrl] => https://www.kaspersky.co.in/enterprise-security/wiki-section/products/machine-learning-in-cybersecurity
                                    [contentSize] => 101254 B
                                    [width] => 1030
                                    [height] => 580
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e549f0c6bcb701bd05454f23641fce82?rik=TH5B4%2b3XmFtNbg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EFE96DBC899871AFACF36E4D5B98D7EDE3417E4C
                                    [accentColor] => B3181E
                                )

                            [6955F62B562B2A03E90FE04CC041A4DA22F97416] => Array
                                (
                                    [name] => Advanced Threat Analytics and Intelligence
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.2BcXyL_zZbnEbN7Em6SejwHaEK?pid=Api
                                    [datePublished] => 2018-01-21T12:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.xenonstack.com/hubfs/xenonstack-advanced-threat-analytics-deep-learning-solutions.png
                                    [hostPageUrl] => https://www.xenonstack.com/use-cases/threat-analytics
                                    [contentSize] => 58867 B
                                    [width] => 640
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d81717c8bff365b9c46cdec49ba49e8f?rik=llVvsmWyojCe8A&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 61479F22AD4A140CC40EF09E30A2B265B26F5596
                                    [accentColor] => 9E1E16
                                )

                            [F336E37A48ECB4A5BF9FC136D8D5817F67ECCBFD] => Array
                                (
                                    [name] => Anomaly Detection and Monitoring Using Deep Learning
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.BF-Q4n8tGANjodB2XLesPAHaEK?pid=Api
                                    [datePublished] => 2017-04-25T12:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.xenonstack.com/hs-fs/hubfs/anomaly-detection-using-machine-learning-and-deep-learning.jpg?width=2560&height=1440&name=anomaly-detection-using-machine-learning-and-deep-learning.jpg
                                    [hostPageUrl] => https://www.xenonstack.com/use-cases/anomaly-detection
                                    [contentSize] => 24510 B
                                    [width] => 640
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.045f90e27f2d180363a1d0765cb7ac3c?rik=P2M%2bp4TOS1r7%2bQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => DFBCCE76F7185D8D631CF9FB5A4BCE84A73E633F
                                    [accentColor] => 034379
                                )

                            [36BE9457097928A1506DBD99317351C0A0F7C12A] => Array
                                (
                                    [name] => Machine Learning Using R: With Time Series and Industry-Based Use Cases ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.wrVQQqiIPftvo-8vXQ7DsQHaKk?pid=Api
                                    [datePublished] => 2018-12-12T12:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/61S7E6MPgSL._SL1181_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Machine-Learning-Using-Industry-Based-Cases-ebook/dp/B07LCC6PTP
                                    [contentSize] => 109449 B
                                    [width] => 827
                                    [height] => 1181
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c2b55042a8883dfb6fa3ef2f5d0ec3b1?rik=Y%2btJdZCXghoF1g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A21C7F0A0C15371399DBD6051A8297907549EB63
                                    [accentColor] => C89C03
                                )

                            [FDEA99E0AA16885E90F11B4817FBF1CD2AAAB380] => Array
                                (
                                    [name] => Buy Malware Analysis Using Artificial Intelligence and Deep Learning ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.7-7WVxeP0PbdN_uHi6bTegAAAA?pid=Api
                                    [datePublished] => 2025-07-30T04:07:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41A1v2clCUL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Malware-Analysis-Artificial-Intelligence-Learning/dp/3030625842
                                    [contentSize] => 19310 B
                                    [width] => 294
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.efeed657178fd0f6dd37fb878ba6d37a?rik=366ZDqphiOUJHw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 083BAAA2DC1FBF7184B11F09E58861AA0E99AEDF
                                    [accentColor] => 1B475E
                                )

                            [BACE477D8A42E37AF9E784E822F690F90C294763] => Array
                                (
                                    [name] => PDF Malware Detection Using Machine Learning[v1] | Preprints.org
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.SU0haClwLbdqxWD0FwYmGQAAAA?pid=Api
                                    [datePublished] => 2023-01-30T11:58:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.preprints.org/img/user_image/522853/mouhammd_alkasassbeh.jpg
                                    [hostPageUrl] => https://www.preprints.org/manuscript/202301.0557/v1
                                    [contentSize] => 50839 B
                                    [width] => 200
                                    [height] => 200
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.494d216829702db76ac560f417062619?rik=q%2bx016gkPqeffg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 367492C09F096F228E487E9FA73E24A8D774ECAB
                                    [accentColor] => 4A5A81
                                )

                            [8910005DF5840FA9987BB01E04958494C12EDB65] => Array
                                (
                                    [name] => Ransomware Detection using Machine Learning | Virtual Expo | Corpus
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.Cp8o0d9drWWTyBnVPFI9lwHaGI?pid=Api
                                    [datePublished] => 2025-04-07T13:59:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://ieee.nitk.ac.in/media/ckeditor_uploads/saksham.sks11%40gmail.com/2025/04/07/image.png
                                    [hostPageUrl] => https://ieee.nitk.ac.in/virtual_expo/report/66
                                    [contentSize] => 13565 B
                                    [width] => 513
                                    [height] => 425
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0a9f28d1df5dad6593c819d53c523d97?rik=mAEA1V9I8JqJtw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 56BDE21C49485940E10BB7899AF0485FD5000198
                                    [accentColor] => C8B503
                                )

                            [7C975DE12BD55408AB901059D2C31DFEB4A7679F] => Array
                                (
                                    [name] => Anomaly-Based Network Intrusion Detection - PHD Thesis | S-Logix
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.6fWpppVD2rY3og856Wao8wHaDN?pid=Api
                                    [datePublished] => 2022-04-22T11:34:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/machine-learning/anomaly-based-network-intrusion-detection-using-machine-learning.jpg
                                    [hostPageUrl] => https://slogix.in/machine-learning/anomaly-based-network-intrusion-detection-using-machine-learning/
                                    [contentSize] => 74711 B
                                    [width] => 830
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e9f5a9a69543dab637a20f39e966a8f3?rik=x3nVHrJdRYC6CQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => F9767A4BEFD13C2D950109BA80455DB21ED579C7
                                    [accentColor] => 004B95
                                )

                            [6851B92D36C50BCBAA36A4547EBABEE9320D80EE] => Array
                                (
                                    [name] => Applied Machine Learning Using mlr3 in R : Bischl, Bernd, Sonabend ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.YtshqgHCCXe7M6dSNKbt3gHaKm?pid=Api
                                    [datePublished] => 2023-11-05T20:21:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/71pd9RAeaNL._SL1500_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Applied-Machine-Learning-Using-mlr3/dp/1032515678
                                    [contentSize] => 141217 B
                                    [width] => 1048
                                    [height] => 1500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.62db21aa01c20977bb33a75234a6edde?rik=hhWb0mNcsLyqYw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EE08D0239EEBABE7454A63AABCB05C63D29B1586
                                    [accentColor] => BC4B0F
                                )

                            [693280508652F9DCECDF05E3FF4C362C908E1108] => Array
                                (
                                    [name] => IoT Ddos Attack Detection Using Machine Learning | S-Logix
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.XuSZlxt97uFd0xxytUFD9gHaDN?pid=Api
                                    [datePublished] => 2022-06-11T23:32:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/internet-of-things/iot-ddos-attack-detection-using-machine-learning.jpg
                                    [hostPageUrl] => https://slogix.in/internet-of-things/iot-ddos-attack-detection-using-machine-learning/
                                    [contentSize] => 71879 B
                                    [width] => 830
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5ee499971b7deee15dd31c72b54143f6?rik=liMIBWgln83O%2fQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8011E809C263C4FF3E50FDCECD9F256805082396
                                    [accentColor] => 004A95
                                )

                            [5C187037912C33B92B6E457ACF965ACB0994494B] => Array
                                (
                                    [name] => Phishing Website Detection Using Machine Learning Algorithms : Musa ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.syTJqDdDMlaW_4hus1SBqAAAAA?pid=Api
                                    [datePublished] => 2025-07-27T09:30:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41blJA+xchL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Phishing-Website-Detection-Learning-Algorithms/dp/6200326169
                                    [contentSize] => 20414 B
                                    [width] => 299
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b324c9a83743325696ff886eb35481a8?rik=xYEHcxnCM5uy5g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B4944990BCA569FCA754E6B29B33C219730781C5
                                    [accentColor] => B53516
                                )

                            [1B54E3D9017BDF31B3BEEDBB9BB052E38B5CC216] => Array
                                (
                                    [name] => UPI Fraud Detection Using Machine Learning
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.Z9-vjGlmE4KUXwAhNwozNQHaEK?pid=Api
                                    [datePublished] => 2024-10-25T19:18:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://i.ytimg.com/vi/uzVdxlG1gIY/maxresdefault.jpg
                                    [hostPageUrl] => https://www.finalproject.in/post/upi-fraud-detection-using-machine-learning
                                    [contentSize] => 120538 B
                                    [width] => 1280
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.67dfaf8c69661382945f0021370a3335?rik=sUU%2bnRC3%2fRM76w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 612CC5B83E250BB9BBDEEB3B13FDB7109D3E45B1
                                    [accentColor] => C00B34
                                )

                            [22F3B78293E00B2CCBD6A32F19EC6A297AC87123] => Array
                                (
                                    [name] => Waste Management System Fraud Detection Using Machine Learning ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.DLrAZBKzr2Q1A8F32rM2nAHaI9?pid=Api
                                    [datePublished] => 2021-10-04T08:25:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/recycling/recycling-06-00065/article_deploy/html/images/recycling-06-00065-g002.png?1635995254
                                    [hostPageUrl] => https://www.mdpi.com/2313-4321/6/4/65
                                    [contentSize] => 115805 B
                                    [width] => 785
                                    [height] => 950
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0cbac06412b3af643503c177dab3369c?rik=Ij97KDkOsMK8bQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 32178CA792A6CE91F23A6DBCC2B00E39287B3F22
                                    [accentColor] => 559932
                                )

                            [F95BA2693450B57148C2B01E04958494C12EDB65] => Array
                                (
                                    [name] => Ransomware Detection using Machine Learning | Virtual Expo | Corpus
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.WRNgJ3KDdaTiayq6yePQfwHaGd?pid=Api
                                    [datePublished] => 2025-04-07T13:59:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://ieee.nitk.ac.in/media/ckeditor_uploads/saksham.sks11%40gmail.com/2025/04/07/image_B2C2uQg.png
                                    [hostPageUrl] => https://ieee.nitk.ac.in/virtual_expo/report/66
                                    [contentSize] => 62936 B
                                    [width] => 663
                                    [height] => 578
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.59136027728375a4e26b2abac9e3d07f?rik=n7UqlkMFWxeELA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 56BDE21C49485940E10B2C84175B0543962AB59F
                                    [accentColor] => C8B503
                                )

                            [26AFE6368C382F72896F4C9577A6C165AF616026] => Array
                                (
                                    [name] => Android Spyware Detection Using Machine Learning: A Novel Dataset
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP._jdBCEl-O4HB4iy8V1-TcgHaDx?pid=Api
                                    [datePublished] => 2022-08-02T13:06:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/sensors/sensors-22-05765/article_deploy/html/images/sensors-22-05765-g011.png?1659445338
                                    [hostPageUrl] => https://www.mdpi.com/1424-8220/22/15/5765
                                    [contentSize] => 273413 B
                                    [width] => 2880
                                    [height] => 1467
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.fe374108497e3b81c1e22cbc575f9372?rik=YvpuY8iD8ieY9g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 620616FA561C6A7759C4F69827F283C8636EFA62
                                    [accentColor] => C59806
                                )

                            [E286063F4E94AD416B2EAD207019751AED2C9CA2] => Array
                                (
                                    [name] => Aislyntech Engineering Projects
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.Usq1ajLUnb3RwyPXxT0iIgHaEK?pid=Api
                                    [datePublished] => 2020-12-17T07:31:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.aislyn.in/admin/product_images/1726056813_Untitled.png
                                    [hostPageUrl] => https://aislyn.in/
                                    [contentSize] => 1215388 B
                                    [width] => 1280
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.52cab56a32d49dbdd1c323d7c53d2222?rik=Lmhg8%2bRJ2hS24g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2AC9C2DEA157910702DAE2B614DA49E4F360682E
                                    [accentColor] => 003ACB
                                )

                            [0F6DE57176406295C1FA8F9764E75E7AE8E2A364] => Array
                                (
                                    [name] => Financial Fraud Detection Using Machine Learning | AI-Powered Fraud ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.36yAFCUwAJdGUuZq13qT8QHaFj?pid=Api
                                    [datePublished] => 2025-06-16T07:13:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://img.youtube.com/vi/aFgRCafftGc/0.jpg
                                    [hostPageUrl] => https://aislyn.in/engineering-projects/financial-fraud-detection-with-machine-learning-advanced-ai-for-risk-prevention-bca
                                    [contentSize] => 21652 B
                                    [width] => 480
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.dfac8014253000974652e66ad77a93f1?rik=8NZeF2cEJlkcrw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 463A2E8EA7E57E4679F8AF1C59260467175ED6F0
                                    [accentColor] => 1EA8AD
                                )

                            [5C13AE4AF07F77A8DC9A5A7EDB9AF117217035B7] => Array
                                (
                                    [name] => Forgery Image Detection Using Machine Learning Algorithms : Ahmed ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.XtPM-xzF1wXp1s_uYqCfbgAAAA?pid=Api
                                    [datePublished] => 2025-04-12T20:28:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41Sklduyf1L._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Forgery-Detection-Machine-Learning-Algorithms/dp/6206783235
                                    [contentSize] => 16546 B
                                    [width] => 303
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5ed3ccfb1cc5d705e9d6cfee62a09f6e?rik=xTHqpA%2f3d4rNqQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7B530712711FA9BDE7A5A9CD8A77F70FA4EA31C5
                                    [accentColor] => 932E2C
                                )

                            [0657E7A226DA6FDB02510B038FA6A7BBCB8F15F0] => Array
                                (
                                    [name] => Buy Elements of Data Science, Machine Learning, and Artificial ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.kkuWNVaT0U8ODUA0BNF44wHaLg?pid=Api
                                    [datePublished] => 2023-01-07T18:28:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/61RbUizMeRL._SL1285_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Elements-Science-Learning-Artificial-Intelligence/dp/3031133382
                                    [contentSize] => 74020 B
                                    [width] => 827
                                    [height] => 1285
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.924b96355693d14f0e0d403404d178e3?rik=YHV%2bKmKt9r0gFQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0F51F8BCBB7A6AF830B01520BDF6AD622A7E7560
                                    [accentColor] => 059CC6
                                )

                            [63CE0D1FA1CE601FCCD81810EA0E4B8C73C89EE5] => Array
                                (
                                    [name] => ANALYSIS OF CHRONIC LIVER DISEASE DETECTION BY USING MACHINE LEARNING ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.eH6RIDxc9xpaD0RtFvKlNAHaFj?pid=Api
                                    [datePublished] => 2025-02-19T15:13:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.finalyearprojects.in/wp-content/uploads/2023/12/Plant-leaf-disease-detection-using-ML_white.jpg
                                    [hostPageUrl] => https://www.finalyearprojects.in/project/analysis-of-chronic-liver-disease-detection-by-using-machine-learning-techniques/
                                    [contentSize] => 66232 B
                                    [width] => 1024
                                    [height] => 768
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.787e91203c5cf71a5a0f446d16f2a534?rik=NuzQ8RrsBvHMjQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5EE98C37C8B4E0AE01818DCCF106EC1AF1D0EC36
                                    [accentColor] => 03A14D
                                )

                            [A7F5066A3FE3F87FE776EDBB9BB052E38B5CC216] => Array
                                (
                                    [name] => UPI Fraud Detection Using Machine Learning
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.FLkC5ngMZULG3Qmg98_TjAAAAA?pid=Api
                                    [datePublished] => 2024-10-25T19:18:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://static.wixstatic.com/media/271739_2b8ac9bc2ea6422e85b86b85213cbb55~mv2.jpeg/v1/fill/w_114,h_115,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/B4D7F4A7-29A6-4668-8B0B-2453DC715CFE_4_5005_c.jpeg
                                    [hostPageUrl] => https://www.finalproject.in/post/upi-fraud-detection-using-machine-learning
                                    [contentSize] => 4251 B
                                    [width] => 114
                                    [height] => 115
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.14b902e6780c6542c6dd09a0f7cfd38c?rik=el9gpvM%2bj%2fd%2bZw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 612CC5B83E250BB9BBDE677EF78F3EF3A6605F7A
                                    [accentColor] => C7BF04
                                )

                            [9C29E6B93F5D4C8E8BB1474D63C66A5F7DFB894A] => Array
                                (
                                    [name] => DIAGONOSIS OF HEART-ABNORMALITIES DETECTION USING MACHINE LEARNING ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.xj01_yCdKfEzOyYvM75mZwAAAA?pid=Api
                                    [datePublished] => 2023-12-01T17:46:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41g2KSOK+eL._SX342_SY445_.jpg
                                    [hostPageUrl] => https://www.amazon.in/DIAGONOSIS-HEART-ABNORMALITIES-DETECTION-MACHINE-LEARNING/dp/620472763X
                                    [contentSize] => 14204 B
                                    [width] => 342
                                    [height] => 251
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c63d35ff209d29f1333b262f33be6667?rik=yZJum%2fPVxOi4Gw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => A498BFD7F5A66C36D4741BB8E8C4D5F39B6E92C9
                                    [accentColor] => B01B23
                                )

                            [63C74BE50171C20475E5F4B33F54494F2BF3FFBB] => Array
                                (
                                    [name] => BCS602 Machine Learning Model Question Paper (2022) - Solved Exam Guide ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.rXLWL_5exKaXZwvklYwwxAHaKd?pid=Api
                                    [datePublished] => 2025-06-11T11:17:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://website-assets.studocu.com/img/document_thumbnails/e0151a12185e02d89e472506c1a8d486/thumb_1200_1696.webp
                                    [hostPageUrl] => https://www.studocu.com/in/document/visvesvaraya-technological-university/computer-science-vtu/bcs602-machine-learning-model-question-paper-2022-solved-exam-guide/130181112
                                    [contentSize] => 147626 B
                                    [width] => 1200
                                    [height] => 1696
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ad72d62ffe5ec4a697670be4958c30c4?rik=Nny0XhAXLEBXXg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => BBFF3FB2F49445F33B4F5E57402C17105EB47C36
                                    [accentColor] => 666566
                                )

                            [BCAAEE7786D7CC2DEF437C893B8196F3A967359C] => Array
                                (
                                    [name] => Stress Detection using Machine Learning Project | Talent Battle
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.ulNTZfPn2YPQeR2jbA5zCwHaD7?pid=Api
                                    [datePublished] => 2022-11-22T05:53:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://media.talentbattle.in/Files/C4U_Images/C4U_PACKAGES_IMAGES/1155/stressdetection.jpg
                                    [hostPageUrl] => https://talentbattle.in/prepare/stress-detection-using-machine-learning
                                    [contentSize] => 36716 B
                                    [width] => 1280
                                    [height] => 680
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ba535365f3e7d983d0791da36c0e730b?rik=y6rud2h9zNL%2bNA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C953769A3F6918B398C734FED2CC7D6877EEAACB
                                    [accentColor] => 000051
                                )

                            [AE26A2E498D3E2B75CDB412AFDD9CABDECF3D5D6] => Array
                                (
                                    [name] => Intelligent Hybrid Deep Learning Model for Breast Cancer Detection
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.jU2L3q2Y-u04UKBaHUZ7CQHaEy?pid=Api
                                    [datePublished] => 2022-09-02T12:05:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/electronics/electronics-11-02767/article_deploy/html/images/electronics-11-02767-g008.png
                                    [hostPageUrl] => https://www.mdpi.com/2079-9292/11/17/2767
                                    [contentSize] => 464777 B
                                    [width] => 3165
                                    [height] => 2045
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8d4d8bdead98faed3850a05a1d467b09?rik=6mIqTok9LnvFvQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6D5D3FCEDBAC9DDFA214BDC57B2E3D894E2A62EA
                                    [accentColor] => 2F6D9C
                                )

                            [E106316209DCFCC90020F217BC814AA8D1ED21E5] => Array
                                (
                                    [name] => MACHINE LEARNING (BCS602) VTU MODEL QUESTION PAPER 1 & 2 - Studocu
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.Tx_rAe1WY8RT0McVd2UPXgHaKJ?pid=Api
                                    [datePublished] => 2025-05-10T06:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://website-assets.studocu.com/img/document_thumbnails/eba4c84f7a542ecc27cf16ac6efaca9f/thumb_1200_1645.webp
                                    [hostPageUrl] => https://www.studocu.com/in/document/visvesvaraya-technological-university/computer-science-vtu/machine-learning-bcs602-vtu-model-question-paper-1-2/126489899
                                    [contentSize] => 144238 B
                                    [width] => 1200
                                    [height] => 1645
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.4f1feb01ed5663c453d0c71577650f5e?rik=HmATJpDNz5wAAg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5E12DE1D8AA418CB712F02009CCFCD902613601E
                                    [accentColor] => 8A8B41
                                )

                            [922E7B1B22F7CCBBD8B08278419123F125B91566] => Array
                                (
                                    [name] => crime detection using machine learning final year project - BMS COLLEGE ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.h6s_CAaMehphGvwJyo3XwgAAAA?pid=Api
                                    [datePublished] => 2022-04-12T14:54:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/e49eafc0d2021ac6a743cb9b6d7a546c/thumb_300_425.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/bms-college-of-engineering/mobile-computing/crime-detection-using-machine-learning-final-year-project/22542430
                                    [contentSize] => 43660 B
                                    [width] => 300
                                    [height] => 425
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.87ab3f08068c7a1a611afc09ca8dd7c2?rik=KeK3sSJ%2fzLuNCw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 66519B521F32191487280B8DBBCC7F22B1B7E229
                                    [accentColor] => 383838
                                )

                            [78C3CA100C22DEE0D782F217BC814AA8D1ED21E5] => Array
                                (
                                    [name] => MACHINE LEARNING (BCS602) VTU MODEL QUESTION PAPER 1 & 2 - Studocu
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.W75eOIOe8JCxkU0wGGeWaQHaJl?pid=Api
                                    [datePublished] => 2025-05-10T06:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://website-assets.studocu.com/img/document_thumbnails/6d8fe57316aaa4908979bbcb224e4297/thumb_1200_1553.webp
                                    [hostPageUrl] => https://www.studocu.com/in/document/visvesvaraya-technological-university/computer-science-vtu/machine-learning-bcs602-vtu-model-question-paper-1-2/126489899
                                    [contentSize] => 168906 B
                                    [width] => 1200
                                    [height] => 1553
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5bbe5e38839ef090b1914d3018679669?rik=hzysAcAi7Q59KA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5E12DE1D8AA418CB712F287D0EED22C001AC3C87
                                    [accentColor] => 5F5F6C
                                )

                            [CE79DAFA6DADEBDDBA06F217BC814AA8D1ED21E5] => Array
                                (
                                    [name] => MACHINE LEARNING (BCS602) VTU MODEL QUESTION PAPER 1 & 2 - Studocu
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.rMLWsx5cw6L0mwmcA54mVQHaJl?pid=Api
                                    [datePublished] => 2025-05-10T06:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://website-assets.studocu.com/img/document_thumbnails/4cfb7fe16b4d2720b525a1ac1d3c6d93/thumb_1200_1553.webp
                                    [hostPageUrl] => https://www.studocu.com/in/document/visvesvaraya-technological-university/computer-science-vtu/machine-learning-bcs602-vtu-model-question-paper-1-2/126489899
                                    [contentSize] => 77752 B
                                    [width] => 1200
                                    [height] => 1553
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.acc2d6b31e5cc3a2f49b099c039e2655?rik=7Jetr9bavt2rYA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5E12DE1D8AA418CB712F60ABDDBEDAD6AFAD97EC
                                    [accentColor] => AE911D
                                )

                            [807199F9C7BFACF6AA6A59EB2A053D1F828A25B7] => Array
                                (
                                    [name] => Malware Forensics Guide - Static and Dynamic Approach - Yeah Hub
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP._a9PcwTqYroM7Yw0u2HDDQHaDi?pid=Api
                                    [datePublished] => 2017-02-03T18:16:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.yeahhub.com/wp-content/uploads/2017/01/malware.png
                                    [hostPageUrl] => https://www.yeahhub.com/malware-forensics-guide-static-dynamic-approach/
                                    [contentSize] => 451756 B
                                    [width] => 1600
                                    [height] => 764
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.fdaf4f7304ea62ba0ced8c34bb61c30d?rik=CBeZn3z7ym%2bqpg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7B52A828F1D350A2BE95A6AA6FCAFB7C9F991708
                                    [accentColor] => CB7600
                                )

                            [49DE02779169873151663F20486E8BE1C6E4DCCE] => Array
                                (
                                    [name] => Credit Card Fraud Detection Using Machine Learning
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.A5kUQJzNtQWfmRN0vyjNrwHaEK?pid=Api
                                    [datePublished] => 2022-08-24T23:45:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.xenonstack.com/hubfs/xenonstack-credit-card-fraud-detection.png
                                    [hostPageUrl] => http://www.xenonstack.com/use-cases/credit-fraud-detection
                                    [contentSize] => 32074 B
                                    [width] => 640
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.039914409ccdb5059f991374bf28cdaf?rik=lO0gdxmWeBMVZg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => ECCD4E6C1EB8E68402F36615137896197720ED94
                                    [accentColor] => 0A61C1
                                )

                            [3E5A2B7F7DE27E1C9B1EF217BC814AA8D1ED21E5] => Array
                                (
                                    [name] => MACHINE LEARNING (BCS602) VTU MODEL QUESTION PAPER 1 & 2 - Studocu
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.DYE6LsmSBUtY5EvL7379hQHaKe?pid=Api
                                    [datePublished] => 2025-05-10T06:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://website-assets.studocu.com/img/document_thumbnails/f19261a9fdf5d32863497d2fff629579/thumb_1200_1697.webp
                                    [hostPageUrl] => https://www.studocu.com/in/document/visvesvaraya-technological-university/computer-science-vtu/machine-learning-bcs602-vtu-model-question-paper-1-2/126489899
                                    [contentSize] => 207200 B
                                    [width] => 1200
                                    [height] => 1697
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0d813a2ec992054b58e44bcbef7efd85?rik=46Wy99cu58G54Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5E12DE1D8AA418CB712FE1B9C1E72ED7F7B2A5E3
                                    [accentColor] => 566175
                                )

                            [A3AEAA5BCAD339270990D0192153058020DF62AE] => Array
                                (
                                    [name] => Imperative Role of Machine Learning Algorithm for Detection of ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.N5CBLxSF2JuSpwf6A-NOyQHaFK?pid=Api
                                    [datePublished] => 2003-12-08T12:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/diagnostics/diagnostics-12-02003/article_deploy/html/images/diagnostics-12-02003-g005.png?1660900046
                                    [hostPageUrl] => https://www.mdpi.com/2075-4418/12/8/2003
                                    [contentSize] => 203948 B
                                    [width] => 2959
                                    [height] => 2064
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.3790812f1485d89b92a707fa03e34ec9?rik=Ouqqtaw9k3KQCQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EA26FD0208503512910D099072933DACB5AAEA3A
                                    [accentColor] => 99CC00
                                )

                            [3A0DFAEF573CE9B7A85CDD24E54FE826FB523BA8] => Array
                                (
                                    [name] => PHISHING DETECTION USING MACHINE LEARNING - PHISHING DETECTION USING ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.1qmxVjnsvRlAAY45g07ERwAAAA?pid=Api
                                    [datePublished] => 2023-04-30T08:32:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/8ee497e0bedae8d427f6d5c16017476b/thumb_300_388.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/vellore-institute-of-technology/information-security-management/phishing-detection-using-machine-learning/55267979
                                    [contentSize] => 36610 B
                                    [width] => 300
                                    [height] => 388
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d6a9b15639ecbd1940018e39834ec447?rik=o9Cv%2fnXDnnuKxQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8AB325BF628EF45E42DDC58A7B9EC375FEAFD0A3
                                    [accentColor] => 3A6A91
                                )

                            [32B3EECA22CB96419FF9DFA6E18FAED35C5CDEED] => Array
                                (
                                    [name] => Phishing URL Detection using Machine Learning
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.kJxJutsJ14uYUnz0pB9bEQAAAA?pid=Api
                                    [datePublished] => 2022-06-11T11:26:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.ijraset.com/downloads/paper_profile/70511mypic3%20(2).png
                                    [hostPageUrl] => https://www.ijraset.com/research-paper/phishing-url-detection-using-ml
                                    [contentSize] => 239144 B
                                    [width] => 388
                                    [height] => 389
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.909c49badb09d78b98527cf4a41f5b11?rik=IzvurCK8aRT5nw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => DEEDC5C53DEAF81E6AFD9FF91469BC22ACEE3B23
                                    [accentColor] => 8B6D40
                                )

                            [4003B802082C15131A2AF217BC814AA8D1ED21E5] => Array
                                (
                                    [name] => MACHINE LEARNING (BCS602) VTU MODEL QUESTION PAPER 1 & 2 - Studocu
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.tUpT4g2ZfishsWUMcX3BOAHaJl?pid=Api
                                    [datePublished] => 2025-05-10T06:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://website-assets.studocu.com/img/document_thumbnails/cd16102768d9d68985ea23a5cf9a4bbb/thumb_1200_1553.webp
                                    [hostPageUrl] => https://www.studocu.com/in/document/visvesvaraya-technological-university/computer-science-vtu/machine-learning-bcs602-vtu-model-question-paper-1-2/126489899
                                    [contentSize] => 60102 B
                                    [width] => 1200
                                    [height] => 1553
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b54a53e20d997e2b21b1650c717dc138?rik=BDCLIIDCUTGhog&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5E12DE1D8AA418CB712FA2A13151C280208B3004
                                    [accentColor] => 15959F
                                )

                            [5252B7DD0221B851915FE7FA156ABE39893FA1E5] => Array
                                (
                                    [name] => Practical Machine Learning in R eBook : Nwanganga, Fred, Chapple, Mike ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.pQ8BKuwv0EwdtvaOUTWJCQAAAA?pid=Api
                                    [datePublished] => 2020-12-12T16:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/514lzKVhlfL._SX342_SY445_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Practical-Machine-Learning-Fred-Nwanganga-ebook/dp/B086Q6ZQSY
                                    [contentSize] => 26450 B
                                    [width] => 342
                                    [height] => 429
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.a50f012aec2fd04c1db6f68e51358909?rik=JSV73SASixUZ9Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5E1AF39893EBA651AF7EF519158B1220DD7B2525
                                    [accentColor] => B56B16
                                )

                            [4D7B56D7C145A2E9C3BA250BF0D6B48D07A06500] => Array
                                (
                                    [name] => Review of Epileptic Seizure Detection using Machine Learning | S-Logix
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.fQi8GxanTPFEHTjixtOwBwHaDN?pid=Api
                                    [datePublished] => 2022-09-13T09:20:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/machine-learning/a-review-of-epileptic-seizure-detection-using-machine-learning-classifiers.jpg
                                    [hostPageUrl] => https://slogix.in/machine-learning/a-review-of-epileptic-seizure-detection-using-machine-learning-classifiers/
                                    [contentSize] => 56708 B
                                    [width] => 830
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7d08bc1b16a74cf1441d38e2c6d3b007?rik=1LdlfRxUKp48qw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 00560A70D84B6D0FB052AB3C9E2A541C7D65B7D4
                                    [accentColor] => 004C95
                                )

                            [9EF9D18D63410D9C1671B57DC9E164EC13D47CFE] => Array
                                (
                                    [name] => Arrhythmia Detection Using machine Learning Techniques : Kiran B ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.Y76TWEGQVmecxWnnjl4ORQAAAA?pid=Api
                                    [datePublished] => 2023-09-21T07:38:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41qT8YK7ZGL._SX342_SY445_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Arrhythmia-Detection-machine-Learning-Techniques/dp/3659525758
                                    [contentSize] => 13304 B
                                    [width] => 342
                                    [height] => 249
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.63be9358419056679cc569e78e5e0e45?rik=6Z8d2DYU0MlhFw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => EFC74D31CE461E9CD75B1761C9D01436D81D9FE9
                                    [accentColor] => AB2024
                                )

                            [41AA3A99D082BE34A614333C572F62B9D9304458] => Array
                                (
                                    [name] => Research Paper on Breast Cancer Prediction Using Machine Learning
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.1XibqcLAkuR53Xgwp44-dAAAAA?pid=Api
                                    [datePublished] => 2022-07-31T18:43:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.ijraset.com/images/text_version_uploads/imag%201_14432.png
                                    [hostPageUrl] => https://www.ijraset.com/research-paper/paper-on-breast-cancer-prediction-using-machine-learning
                                    [contentSize] => 48089 B
                                    [width] => 466
                                    [height] => 368
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d5789ba9c2c092e479dd7830a78e3e74?rik=FKqjmQ0o60NqQQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8544039D9B26F275C333416A43EB280D99A3AA14
                                    [accentColor] => 141414
                                )

                            [463C58B9E2B776D22BCFC67361F3EDA5DD4652D0] => Array
                                (
                                    [name] => Buy AN IN-DEPTH GUIDE TO PLANT LEAF DISEASE DETECTION USING MACHINE ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.yAQ_sWm_Ma_wfJLiAzYUsgHaKh?pid=Api
                                    [datePublished] => 2024-02-16T22:31:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/81lIl+MDgRL._SL1500_.jpg
                                    [hostPageUrl] => https://www.amazon.in/DISEASE-DETECTION-LEARNING-INTRUSION-SECURITY/dp/9391462898
                                    [contentSize] => 204351 B
                                    [width] => 1055
                                    [height] => 1500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c8043fb169bf31aff07c92e2033614b2?rik=ZMOFmy57Zy2y%2fA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0D2564DD5ADE3F16376CFCB22D677B2E9B85C364
                                    [accentColor] => C70404
                                )

                            [93407441F511B4D079740E5F7A9BDCA8F6791219] => Array
                                (
                                    [name] => Credit Card Fraud Detection Using Machine Learning
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.jqZs8TpWO571YiliiQ-k-gHaEK?pid=Api
                                    [datePublished] => 2018-06-22T21:24:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.xenonstack.com/hubfs/xenonstack-Illegal-parking-detection.png
                                    [hostPageUrl] => https://www.xenonstack.com/use-cases/credit-fraud-detection
                                    [contentSize] => 165785 B
                                    [width] => 1280
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8ea66cf13a563b9ef5622962890fa4fa?rik=OQRHFF8RSw2XRw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9121976F8ACDB9A7F5E047970D4B115F14470439
                                    [accentColor] => CA8401
                                )

                            [CEBE900AE728C198AAA4D0B3B7E57349CFA0CC36] => Array
                                (
                                    [name] => Buy Machine Learning Using R Book Online at Low Prices in India ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.I-kJJRET6d9zXgqE8wKbGwAAAA?pid=Api
                                    [datePublished] => 2021-11-26T22:02:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/414B0p9GFUL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Machine-Learning-Using-Kumar-Rahul/dp/9354246117
                                    [contentSize] => 20442 B
                                    [width] => 339
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.23e909251113e9df735e0a84f3029b1b?rik=7OsJoH6CHImqSg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 63CC0AFC94375E7B3B0D4AAA891C827EA009EBEC
                                    [accentColor] => B1731A
                                )

                            [74665046E741293F28EEDBBF7DE52782C8FD2834] => Array
                                (
                                    [name] => Buy Network Intrusion Detection System using Machine Learning ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.MUvMSb700PFouE9oel036AAAAA?pid=Api
                                    [datePublished] => 2013-06-28T12:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41jgVtyIkmS._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Network-Intrusion-Detection-Learning-Techniques/dp/3659410357
                                    [contentSize] => 20402 B
                                    [width] => 296
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.314bcc49bef4d0f168b84f687a5d37e8?rik=R2YFZH4UkvOC7g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 4382DF8C28725ED7FBBDEE82F392147E64056647
                                    [accentColor] => B01B21
                                )

                            [77D7D50630AA7E4C55335A4FFDDFE9A5D9D14658] => Array
                                (
                                    [name] => SDN-based Network IDS Using Machine Learning Research Topics | S-Logix
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.3xvx9sv4Mxqisd4lYZ7BAwHaDN?pid=Api
                                    [datePublished] => 2023-04-01T14:17:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/software-defined-networks/research-topics-in-sdn-based-network-intrusion-detection-systems-using-machine-learning.jpg
                                    [hostPageUrl] => https://slogix.in/software-defined-networks/research-topics-in-sdn-based-network-intrusion-detection-systems-using-machine-learning/
                                    [contentSize] => 60860 B
                                    [width] => 830
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.df1bf1f6cbf8331aa2b1de25619ec103?rik=d31dYAOq58RVMw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 85641D9D5A9EFDDFF4A53355C4E7AA03605D7D77
                                    [accentColor] => 034A92
                                )

                            [83994A165D41C1BB60A5B9054403473D3F70C476] => Array
                                (
                                    [name] => Recent Advancement in Cancer Detection using Machine Learning | S-Logix
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.Rj82662izM2BWjwezsMsbQHaDN?pid=Api
                                    [datePublished] => 2022-07-29T02:42:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/machine-learning/recent-advancement-in-cancer-detection-using-machine-learning-systematic-survey-of-decades-comparisons-and-challenges.jpg
                                    [hostPageUrl] => https://slogix.in/machine-learning/recent-advancement-in-cancer-detection-using-machine-learning-systematic-survey-of-decades-comparisons-and-challenges/
                                    [contentSize] => 75005 B
                                    [width] => 830
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.463f36ebada2cccd815a3c1ecec32c6d?rik=OJmkYdUUHLsGWg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 674C07F3D3743044509B5A06BB1C14D561A49938
                                    [accentColor] => 004A95
                                )

                            [02CDAC6ADFF5839D6859BF1609380FAFB2E6BE38] => Array
                                (
                                    [name] => How to check a site for viruses: tools overview
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.rENH8iopjHmScJv_91niHQHaEc?pid=Api
                                    [datePublished] => 2020-06-24T13:25:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://serpstat.com/img/blog/how-to-check-a-website-for-viruses/1571328512image2.png
                                    [hostPageUrl] => https://serpstat.com/blog/how-to-check-a-website-for-viruses/
                                    [contentSize] => 175093 B
                                    [width] => 1069
                                    [height] => 641
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ac4347f22a298c7992709bfff759e21d?rik=INzKpv1fONmGlQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 83EB6E2BFAF0839061FB9586D9385FFDA6CADC20
                                    [accentColor] => C76804
                                )

                            [5D52C12DE7C79095B6603CFF8479F3C7E77560B7] => Array
                                (
                                    [name] => Plant Disease Detection and Classification by Deep Learning
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.0i0X1U2HKFcuFvVBKQ0B2gHaC8?pid=Api
                                    [datePublished] => 2019-10-31T16:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/plants/plants-08-00468/article_deploy/html/images/plants-08-00468-g008.png?1574872620
                                    [hostPageUrl] => https://www.mdpi.com/2223-7747/8/11/468
                                    [contentSize] => 1065828 B
                                    [width] => 3089
                                    [height] => 1227
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d22d17d54d8728572e16f541290d01da?rik=1SUc0n58CVlrBg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7B06577E7C3F9748FFC3066B59097C7ED21C25D5
                                    [accentColor] => 8A2A2A
                                )

                            [D0B6D49DE7188A443752779F2921A57306F59FC2] => Array
                                (
                                    [name] => Hybrid Intrusion Detection System Based on the Stacking Ensemble of C5 ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.G9MrYiklEkfWlmuGVtfUXwHaFN?pid=Api
                                    [datePublished] => 2020-01-18T04:17:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/electronics/electronics-09-00173/article_deploy/html/images/electronics-09-00173-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/2079-9292/9/1/173
                                    [contentSize] => 372963 B
                                    [width] => 3877
                                    [height] => 2731
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1bd32b6229251247d6966b8656d7d45f?rik=DWtN2X6BqERzJQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2CF95F60375A1292F977257344A8817ED94D6B0D
                                    [accentColor] => B01B21
                                )

                            [5475C6A26AB30B75461DEFAA79643DC73BC54236] => Array
                                (
                                    [name] => Predicting Employee Attrition Using Machine Learning Approaches
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.Ll1DToOyBAXe8maJvncS9wHaEE?pid=Api
                                    [datePublished] => 2022-06-24T10:13:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/applsci/applsci-12-06424/article_deploy/html/images/applsci-12-06424-g001.png
                                    [hostPageUrl] => https://www.mdpi.com/2076-3417/12/13/6424
                                    [contentSize] => 1782527 B
                                    [width] => 3195
                                    [height] => 1758
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2e5d434e83b20405def26689be7712f7?rik=RVdsKqY7sFdk0Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 63245CB37CD34697AAFED16457B03BA62A6C5745
                                    [accentColor] => C29809
                                )

                            [B4F35AE7B0E8CDB97F9DF217BC814AA8D1ED21E5] => Array
                                (
                                    [name] => MACHINE LEARNING (BCS602) VTU MODEL QUESTION PAPER 1 & 2 - Studocu
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.8UgugfA8VdnaXbOeQxv5TgHaJl?pid=Api
                                    [datePublished] => 2025-05-10T06:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://website-assets.studocu.com/img/document_thumbnails/86b0ca05078ea2691345f013e4deeb8f/thumb_1200_1553.webp
                                    [hostPageUrl] => https://www.studocu.com/in/document/visvesvaraya-technological-university/computer-science-vtu/machine-learning-bcs602-vtu-model-question-paper-1-2/126489899
                                    [contentSize] => 11782 B
                                    [width] => 1200
                                    [height] => 1553
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.f1482e81f03c55d9da5db39e431bf94e?rik=Sz%2blfguO3Jv32Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5E12DE1D8AA418CB712FD9F79BDC8E0B7EA53F4B
                                    [accentColor] => 252525
                                )

                            [4C1D67CCC9371E9B3728F3699BD220509E87CFD9] => Array
                                (
                                    [name] => NATIONAL LEVEL FACULTY DEVELOPMENT PROGRAMME on APPLICATIONS OF MACHINE ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.nibtFMaZNXQ1fkCrSKzWhAHaE8?pid=Api
                                    [datePublished] => 2025-01-03T06:23:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://mgit.ac.in/wp-content/uploads/2025/01/FDP-Banner.jpg
                                    [hostPageUrl] => https://mgit.ac.in/events/national-level-faculty-development-programme-on-applications-of-machine-learning-in-r-and-d/
                                    [contentSize] => 288262 B
                                    [width] => 1380
                                    [height] => 922
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.9e26ed14c6993574357e40ab48acd684?rik=xNF2zJxz4blzgg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9DFC78E905022DB9963F8273B9E1739CCC76D1C4
                                    [accentColor] => B4AB17
                                )

                            [E21DE116825A5E568BA1B81A63557AD109274F59] => Array
                                (
                                    [name] => Lab Members | ME IIT Kanpur
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.C3aMh4KkKrAoIF3dJc530gHaNK?pid=Api
                                    [datePublished] => 2021-10-23T03:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://home.iitk.ac.in/~mlaw/images/arjun.jpg
                                    [hostPageUrl] => https://home.iitk.ac.in/~mlaw/lab-members.php
                                    [contentSize] => 1964662 B
                                    [width] => 2304
                                    [height] => 4096
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0b768c8782a42ab028205ddd25ce77d2?rik=LtEeYSil5WW4Gg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 95F472901DA75536A18B1AB865E5A528611ED12E
                                    [accentColor] => 447333
                                )

                            [2E077B4960F0E9D3C58FE2DF6FA0CD70FF047584] => Array
                                (
                                    [name] => Document Image Forgery Detection Based on Deep Learning Models | S-Logix
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.K9LiwAgi59Dp3Vaz3kypsAHaDN?pid=Api
                                    [datePublished] => 2023-02-07T21:45:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/machine-learning/document-image-forgery-detection-based-on-deep-learning-models.jpg
                                    [hostPageUrl] => https://slogix.in/machine-learning/document-image-forgery-detection-based-on-deep-learning-models/
                                    [contentSize] => 63326 B
                                    [width] => 830
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2bd2e2c00822e7d0e9dd56b3de4ca9b0?rik=4nC3lAYPnj1c%2bA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 485740FF07DC0AF6FD2EF85C3D9E0F0694B770E2
                                    [accentColor] => 004B96
                                )

                            [A32C31B1E18FC3E19B35A2C6B49905449C87B33D] => Array
                                (
                                    [name] => SPSS, E-views, Python, R programming | Freelancer
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.JUnzEYgyEm9nCaUsZPgTTgAAAA?pid=Api
                                    [datePublished] => 2022-09-25T16:09:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cdn3.f-cdn.com/files/download/132472872/SPSS.png?width=780&height=314&fit=crop
                                    [hostPageUrl] => https://www.freelancer.in/u/citijayamala/portfolio/spss-eviews-python-r-programming-8592322
                                    [contentSize] => 206671 B
                                    [width] => 474
                                    [height] => 190
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2549f3118832126f6709a52c64f8134e?rik=OsITGx74PB65Uw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => D33B78C94450994B6C2A53B91E3CF81E1B13C23A
                                    [accentColor] => 2C4E7B
                                )

                            [4A62BC8BADEE145048C23CFF8479F3C7E77560B7] => Array
                                (
                                    [name] => Plant Disease Detection and Classification by Deep Learning
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.YyntqchhkBMnXyToT73e5wHaGi?pid=Api
                                    [datePublished] => 2019-10-31T16:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.mdpi.com/plants/plants-08-00468/article_deploy/html/images/plants-08-00468-g002-550.jpg
                                    [hostPageUrl] => https://www.mdpi.com/2223-7747/8/11/468
                                    [contentSize] => 35902 B
                                    [width] => 550
                                    [height] => 486
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6329eda9c8619013275f24e84fbddee7?rik=pCbLuNruQQWELA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7B06577E7C3F9748FFC32C840541EEDAB8CB26A4
                                    [accentColor] => 1ABD0E
                                )

                            [AD37C633E0D98A94193AF936360699C59CBC0446] => Array
                                (
                                    [name] => Species Distribution Models with GIS & Machine Learning in R: Mapping ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.YGAFw3DE2TeEYYPVSv8-pQAAAA?pid=Api
                                    [datePublished] => 2023-09-27T06:32:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/71sX0sNEIpL._SY466_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Species-Distribution-Models-Machine-Learning-ebook/dp/B0CJM9M5VK
                                    [contentSize] => 25431 B
                                    [width] => 329
                                    [height] => 466
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.606005c370c4d937846183d54aff3ea5?rik=2nNsMw6dqEmRow&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6440CBC95C996063639FA39149A89D0E336C73DA
                                    [accentColor] => C78C04
                                )

                            [A5AF52D5610DB52FA1279E7C0764DEC1E6F2FDD7] => Array
                                (
                                    [name] => Tuning Machine Learning Models Using a Group Search Firefly Algorithm ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.A5PK9Yn2cY1-RmLCAITEIQHaIf?pid=Api
                                    [datePublished] => 2022-06-29T08:51:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/mathematics/mathematics-10-02272/article_deploy/html/images/mathematics-10-02272-g003.png?1656492451
                                    [hostPageUrl] => https://www.mdpi.com/2227-7390/10/13/2272
                                    [contentSize] => 429318 B
                                    [width] => 2808
                                    [height] => 3219
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0393caf589f6718d7e4662c20084c421?rik=WvolXRbQW%2fIacg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7DDF2F6E1CED4670C7E9721AF25BD0165D25FA5A
                                    [accentColor] => CA9801
                                )

                            [D50B8F51BF23CC06027721EBB535FCF7BA9A3A06] => Array
                                (
                                    [name] => Detection of Kidney Disease Using Machine Learning
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.51adfbBGH4Ukkzsdrf3BGAAAAA?pid=Api
                                    [datePublished] => 2023-04-27T04:52:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.ijraset.com/downloads/user_photos/2023/April/ijraset50321.jpg
                                    [hostPageUrl] => https://www.ijraset.com/research-paper/detection-of-kidney-disease-using-machine-learning
                                    [contentSize] => 5659 B
                                    [width] => 100
                                    [height] => 120
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e7569d7db0461f8524933b1dadfdc118?rik=XbD4FfsyzGAgdw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 60A3A9AB7FCF535BBE12772060CC32FB15F8B05D
                                    [accentColor] => 295CA2
                                )

                            [A1B3C4C97E98A77170064D29B544BECC4E20EFD9] => Array
                                (
                                    [name] => Detection of Parkinson’s Disease Using XGBOOST Algorithm
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.yvvHJKsHyPaYaJNYtaMUYgHaFY?pid=Api
                                    [datePublished] => 2022-12-24T15:10:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.ijraset.com/images/text_version_uploads/imag%201_25040.png
                                    [hostPageUrl] => https://www.ijraset.com/research-paper/detection-of-parkinsons-disease-using-xgboost-algorithm
                                    [contentSize] => 102197 B
                                    [width] => 574
                                    [height] => 417
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.cafbc724ab07c8f698689358b5a31462?rik=GjtMnOeJehcHYA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9DFE02E4CCEB445B92D46007177A89E79C4C3B1A
                                    [accentColor] => 1888B4
                                )

                            [1224465CC6C5C2B0058AB7C4AB1A029EA61D3468] => Array
                                (
                                    [name] => From Regression to Reinforcement: The Complete ML Algorithm Map(Short ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.IQ9EnoD7rvhpaN82p3W-4QHaEv?pid=Api
                                    [datePublished] => 2025-04-29T09:40:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.makinarocks.ai/wp-content/uploads/2022/04/19405b6372f32b2eb80b94cf3715fe34.png
                                    [hostPageUrl] => https://www.ujjwalit.co.in/blogs/6807b94cd86221d3a7ad6f1a
                                    [contentSize] => 67557 B
                                    [width] => 1191
                                    [height] => 762
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.210f449e80fbaef86968df36a775bee1?rik=IUJkxWxcLAtQqA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8643D16AE920A1BA4C7BA8500B2C5C6CC5644221
                                    [accentColor] => BD0E14
                                )

                            [1F3D1E652B47E67E3114DD24E54FE826FB523BA8] => Array
                                (
                                    [name] => PHISHING DETECTION USING MACHINE LEARNING - PHISHING DETECTION USING ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.6HDAzDyTI2wyOhH1h0PH7AAAAA?pid=Api
                                    [datePublished] => 2023-04-30T08:32:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/7d30bd91ffb45e6376b052605d784550/thumb_300_425.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/vellore-institute-of-technology/information-security-management/phishing-detection-using-machine-learning/55267979
                                    [contentSize] => 13708 B
                                    [width] => 300
                                    [height] => 425
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e870c0cc3c93236c323a11f58743c7ec?rik=8dPhVrJ0bucTQQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8AB325BF628EF45E42DD4113E76E74B256E1D3F1
                                    [accentColor] => A22929
                                )

                            [13B5BDF00ACC61685EAB77E555AE5B6033EBA4D6] => Array
                                (
                                    [name] => Lungs Segmentation And Nodule Detection Using Machine Learning Medical ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.11wvRbkme0KAd-oE-1x8cwHaLG?pid=Api
                                    [datePublished] => 2025-06-01T07:55:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/61CUdjsdRnS.jpg
                                    [hostPageUrl] => https://www.desertcart.in/products/474068236-lungs-segmentation-and-nodule-detection-using-machine-learning-medical-image
                                    [contentSize] => 72997 B
                                    [width] => 907
                                    [height] => 1360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d75c2f45b9267b428077ea04fb5c7c73?rik=MVvbD6DMFoblug&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6D4ABE3306B5EA555E77BAE58616CCA00FDB5B31
                                    [accentColor] => B02A1B
                                )

                            [82E9CB29BCA94A2D8AF4279694287F02CFE257D1] => Array
                                (
                                    [name] => 20+ Machine Learning Projects for Final Year Students
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.lqZJZYn6mbPiXlzHAakV8gAAAA?pid=Api
                                    [datePublished] => 2025-04-18T11:06:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://static.wixstatic.com/media/271739_dcf5bfaf2e6a400d9215c8adb7ee0dbc~mv2.png/v1/fill/w_81,h_81,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/B4D7F4A7-29A6-4668-8B0B-2453DC715CFE_4_5.png
                                    [hostPageUrl] => https://www.finalproject.in/post/20-machine-learning-projects-for-final-year-students
                                    [contentSize] => 9581 B
                                    [width] => 81
                                    [height] => 81
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.96a6496589fa99b3e25e5cc701a915f2?rik=KJ68ksuapNKoTw&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => 1D752EFC20F7824969724FA8D2A49ACB92BC9E28
                                    [accentColor] => C8BE03
                                )

                            [D5DB1E7AAB6E66F63351B81A63557AD109274F59] => Array
                                (
                                    [name] => Lab Members | ME IIT Kanpur
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.wz0AgZtxtUujH5nFcxdBOgHaNK?pid=Api
                                    [datePublished] => 2021-10-23T03:00:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://home.iitk.ac.in/~mlaw/images/mtech/namras.jpg
                                    [hostPageUrl] => https://home.iitk.ac.in/~mlaw/lab-members.php
                                    [contentSize] => 2021417 B
                                    [width] => 4032
                                    [height] => 2268
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c33d00819b71b54ba31f99c57317413a?rik=Xb3hp7rmZm8zFQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 95F472901DA75536A18B15336F66E6BAA7E1BD5D
                                    [accentColor] => 586C73
                                )

                            [A2C54D2A03CC517670827F2F65CCBB9D7CCA6D33] => Array
                                (
                                    [name] => Feature Extraction and Classification of EEG Signals | S-Logix
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.R73Yvo-A-M8ZR92txHCCqAHaDN?pid=Api
                                    [datePublished] => 2022-11-04T22:47:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/machine-learning/feature-extraction-and-classification-of-eeg-signals-for-seizure-detection.jpg
                                    [hostPageUrl] => https://slogix.in/machine-learning/feature-extraction-and-classification-of-eeg-signals-for-seizure-detection/
                                    [contentSize] => 89816 B
                                    [width] => 830
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.47bdd8be8f80f8cf1947ddadc47082a8?rik=KlzUojDMFWcHKA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 33D6ACC7D9BBCC56F2F728076715CC30A2D45C2A
                                    [accentColor] => 004A95
                                )

                            [B3FF776F80A5404A4C5887866044E331A2CCE622] => Array
                                (
                                    [name] => Buy Fraud detection in credit cards using Machine Learning Book Online ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.k8FimJ0qzboisqA0Bew2FwAAAA?pid=Api
                                    [datePublished] => 2023-06-07T18:23:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/415qUdUBc-L._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Fraud-detection-credit-Machine-Learning/dp/4187223711
                                    [contentSize] => 12496 B
                                    [width] => 296
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.93c162989d2acdba22b2a03405ec3617?rik=O%2f939ghaBKTEhQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 226ECC2A133E4406687885C4A4045A08F677FF3B
                                    [accentColor] => 1C3F6A
                                )

                            [D9832380E0B810087009503E70FFC1B0218C03C1] => Array
                                (
                                    [name] => Credit Card Fraud Detection Using Machine Learning and Blockchain
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.EYhvRogiHz5pluImFhV0GgAAAA?pid=Api
                                    [datePublished] => 2023-05-17T22:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.ijraset.com/downloads/user_photos/2023/May/IJRASET52214.jpg
                                    [hostPageUrl] => https://www.ijraset.com/research-paper/credit-card-fraud-detection-using-machine-learning-and-blockchain
                                    [contentSize] => 21949 B
                                    [width] => 50
                                    [height] => 60
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.11886f4688221f3e6996e2261615741a?rik=nTgyCA6LAYAHkA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1C30C8120B1CFF07E305900780018B0E0832389D
                                    [accentColor] => 2A4468
                                )

                            [DEA1BD1FD85F7BFA4B93371C071B0C5023CCDCB2] => Array
                                (
                                    [name] => PhD Proposal on Heart Disease Diagnosis in Machine Learning | S-Logix
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.rxwSMdH93hGqoHCErMsdnAHaDI?pid=Api
                                    [datePublished] => 2022-06-14T05:51:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/machine-learning/research-proposal-on-machine-learning-in-heart-disease-diagnosis.jpg
                                    [hostPageUrl] => https://slogix.in/machine-learning/research-proposal-on-machine-learning-in-heart-disease-diagnosis/
                                    [contentSize] => 68286 B
                                    [width] => 850
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.af1c1231d1fdde11aaa07084accb1d9c?rik=7Rrb8Y31t6%2b0OQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2BCDCC3205C0B170C17339B4AFB7F58DF1DB1AED
                                    [accentColor] => 004B94
                                )

                            [E7730B69E373D4A3EE552D621160E604DD3795E1] => Array
                                (
                                    [name] => Transform Handwritten Words: Machine Learning Handwriting Detection
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.4brBKfY7LBOpTwRFsTxygwHaDA?pid=Api
                                    [datePublished] => 2024-04-18T18:21:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://res.cloudinary.com/dwenudxjh/image/upload/v1713088057/ProjectMart_Store/xjmr7j5jcq0ronrztong.png
                                    [hostPageUrl] => https://store.projectmart.in/p/handwriting-detection-project
                                    [contentSize] => 142623 B
                                    [width] => 1686
                                    [height] => 686
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.e1bac129f63b2c13a94f0445b13c7283?rik=fjewlj43TTruVQ&riu=http%3a%2f%2fres.cloudinary.com%2fdwenudxjh%2fimage%2fupload%2fv1713088057%2fProjectMart_Store%2fxjmr7j5jcq0ronrztong.png&ehk=C3e5LKp2UW9veG5mCSHzsY%2bKwmIaVglNb4pcaUAC23E%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1E5973DD406E061126D255EE3A4D373E96B0377E
                                    [accentColor] => 385B83
                                )

                            [56B3A9FC3453A846077ED63DD59FDBA8E18774E2] => Array
                                (
                                    [name] => Automatic detection of oral cancer in smartphone-based images | S-Logix
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.jgzLydO8PywDg_Uuo3SabgHaDN?pid=Api
                                    [datePublished] => 2022-10-12T17:57:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/machine-learning/automatic-detection-of-oral-cancer-in-smartphone-based-images-using-deep-learning-for-early-diagnosis.jpg
                                    [hostPageUrl] => https://slogix.in/machine-learning/automatic-detection-of-oral-cancer-in-smartphone-based-images-using-deep-learning-for-early-diagnosis/
                                    [contentSize] => 81600 B
                                    [width] => 830
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8e0ccbc9d3bc3f2c0383f52ea3749a6e?rik=ZTuaz0M1imRw5w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2E47781E8ABDF95DD36DE770648A3543CF9A3B65
                                    [accentColor] => 004B96
                                )

                            [7E40C44D8A0DF563B2CC7C893B8196F3A967359C] => Array
                                (
                                    [name] => Stress Detection using Machine Learning Project | Talent Battle
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.2aReCfUeVvWSLE0ffAK_XQHaCG?pid=Api
                                    [datePublished] => 2022-11-22T05:53:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://talentbattle.in/Files/C4U_Images/C4U_CKEDITOR_IMAGES/IMG11209_2%20trainers%20(1).png
                                    [hostPageUrl] => https://talentbattle.in/prepare/stress-detection-using-machine-learning
                                    [contentSize] => 64585 B
                                    [width] => 625
                                    [height] => 177
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d9a45e09f51e56f5922c4d1f7c02bf5d?rik=5wRM1KjQXzYrzA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => C953769A3F6918B398C7CC2B365FD0A8D44C04E7
                                    [accentColor] => 080768
                                )

                            [C5AB35E938F1A31040AE4960181F55C75D3F7046] => Array
                                (
                                    [name] => Edge AI Anomaly Detection Part 2 - Feature Extraction and Model Training
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.c_rhx1CTKHFc0seuN6Z8fQHaEK?pid=Api
                                    [datePublished] => 2021-03-27T22:38:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.digikey.in/maker-media/c5e00a9d-2d59-4b0f-ae6c-cbf8a0cde756
                                    [hostPageUrl] => https://www.digikey.in/en/maker/projects/edge-ai-anomaly-detection-part-2-feature-extraction-and-model-training/70927a6e439b49bea7305953a3c9bfff
                                    [contentSize] => 96892 B
                                    [width] => 1920
                                    [height] => 1080
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.73fae1c7509328715cd2c7ae37a67c7d?rik=XLpTnoMfOgEE6g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6407F3D57C55F1810694EA04013A1F839E53BA5C
                                    [accentColor] => C79404
                                )

                            [0FD4D78B1EC94C2786D54D29B544BECC4E20EFD9] => Array
                                (
                                    [name] => Detection of Parkinson’s Disease Using XGBOOST Algorithm
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.d8-bGnIfq01b7ynfauifbgHaEE?pid=Api
                                    [datePublished] => 2022-12-24T15:10:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.ijraset.com/images/text_version_uploads/imag%201_25039.png
                                    [hostPageUrl] => https://www.ijraset.com/research-paper/detection-of-parkinsons-disease-using-xgboost-algorithm
                                    [contentSize] => 32090 B
                                    [width] => 534
                                    [height] => 293
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.77cf9b1a721fab4d5bef29df6ae89f6e?rik=8E19uOGcxHJoXQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9DFE02E4CCEB445B92D45D6872C49CE1B87D4DF0
                                    [accentColor] => 373737
                                )

                            [16E22F94659C51A8FDED976AF3314D5522F0F66B] => Array
                                (
                                    [name] => BASICS OF ARTIFICIAL INTELLIGENCE
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.3qqmuFJd95iVvtnO7ZTahwHaGW?pid=Api
                                    [datePublished] => 2021-05-26T22:50:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.iasgyan.in/ig-uploads/images/applications-of-machine-learning.png
                                    [hostPageUrl] => https://www.iasgyan.in/blogs/basics-of-artificial-intelligence
                                    [contentSize] => 40927 B
                                    [width] => 624
                                    [height] => 535
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.deaaa6b8525df79895bed9ceed94da87?rik=YS7ySVbJFYrf3g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B66F0F2255D4133FA679DEDF8A15C95649F22E61
                                    [accentColor] => 99B70D
                                )

                            [3E66A846102637822A5CCF246E76D73BE32A06D7] => Array
                                (
                                    [name] => Computer Science Project Ideas: Breaking Barriers in Tech
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.LvOq_KHLs_CkOU58bwx_4wHaEL?pid=Api
                                    [datePublished] => 2024-04-20T13:45:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://cdn.hashnode.com/res/hashnode/image/upload/v1713593925213/10fe3264-33c0-4d4e-a564-2b534c95dbb4.png?w=400&h=210&fit=crop&crop=entropy&auto=compress
                                    [hostPageUrl] => https://blog.projectmart.in/computer-science-project-ideas-breaking-barriers-in-tech
                                    [contentSize] => 366964 B
                                    [width] => 1640
                                    [height] => 924
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.2ef3aafca1cbb3f0a4394e7c6f0c7fe3?rik=42aKZAFicyiixQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7D60A23EB37D67E642FCC5A228736201648A66E3
                                    [accentColor] => 666666
                                )

                            [C5633F304BEA7BFC8A1DA01FD7F9216B1DBFAD23] => Array
                                (
                                    [name] => plant diseage detectioin using machine learning - + Plant Disease ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.ENwt_WDwG4l0knrv7eoGVQAAAA?pid=Api
                                    [datePublished] => 2023-12-24T14:18:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/41489fb92f5180ad64cc2d1b0ba71ee7/thumb_300_388.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/rajkiya-engineering-college/machine-learning/plant-diseage-detectioin-using-machine-learning/79861261
                                    [contentSize] => 41768 B
                                    [width] => 300
                                    [height] => 388
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.10dc2dfd60f01b8974927aefedea0655?rik=XDbzA7Sut8%2bo0Q&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 32DAFBD1B6129F7DF10AD1A8CFB7AEB403F3365C
                                    [accentColor] => 4C4C4C
                                )

                            [F9F78E9273480A8DCF4128DC246456B5E52889C5] => Array
                                (
                                    [name] => Credit Card Fraud Detection using Machine Learning and Data Science
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.QzxiQBk3fVaVAwKH1z3fRQAAAA?pid=Api
                                    [datePublished] => 2022-12-27T13:17:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.ijraset.com/downloads/user_photos/2022/December/ijraset48293.jpeg
                                    [hostPageUrl] => https://www.ijraset.com/research-paper/credit-card-fraud-detection-using-ml-and-data-science
                                    [contentSize] => 19466 B
                                    [width] => 100
                                    [height] => 120
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.433c624019377d5695030287d73ddf45?rik=n3%2foKTeEoNj8FA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 5C98825E5B654642CD8214FCD8A0843729E87F9F
                                    [accentColor] => BE0D15
                                )

                            [F5729C9859D0A33BE44E2D621160E604DD3795E1] => Array
                                (
                                    [name] => Transform Handwritten Words: Machine Learning Handwriting Detection
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.NVgm3QPLLetVm9Q0ix7gBAHaDX?pid=Api
                                    [datePublished] => 2024-04-18T18:21:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://res.cloudinary.com/dwenudxjh/image/upload/v1713088041/ProjectMart_Store/hzgcbawqp5hrirqkrgkr.png
                                    [hostPageUrl] => https://store.projectmart.in/p/handwriting-detection-project
                                    [contentSize] => 102550 B
                                    [width] => 1510
                                    [height] => 686
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.355826dd03cb2deb559bd4348b1ee004?rik=XyfJiZUNOrNO5A&riu=http%3a%2f%2fres.cloudinary.com%2fdwenudxjh%2fimage%2fupload%2fv1713088041%2fProjectMart_Store%2fhzgcbawqp5hrirqkrgkr.png&ehk=yt3zBHwLPHkIFs%2bXpAPgZpxFRttfNVbpOUaqOFSm8UI%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 1E5973DD406E061126D2E44EB33A0D9589C9275F
                                    [accentColor] => 7E7034
                                )

                            [3D78073DB49318E8809CC48C7DAD428A6DB8326E] => Array
                                (
                                    [name] => Epileptic seizure detection on EEG signals using machine | S-Logix
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.cVL3sok8652EkQkM15k71AHaDN?pid=Api
                                    [datePublished] => 2022-08-15T03:03:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/machine-learning/epileptic-seizure-detection-on-eeg-signals-using-machine-learning-techniques-and-advanced-preprocessing-methods.jpg
                                    [hostPageUrl] => https://slogix.in/machine-learning/epileptic-seizure-detection-on-eeg-signals-using-machine-learning-techniques-and-advanced-preprocessing-methods/
                                    [contentSize] => 80053 B
                                    [width] => 830
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.7152f7b2893ceb9d8491090cd7993bd4?rik=04dw00s5gY4IyQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => E6238BD6A824DAD7C84CC9088E81394BD37087D3
                                    [accentColor] => 004A95
                                )

                            [C5381F754B6AA7875AC3B9DE24F47A319057E623] => Array
                                (
                                    [name] => machine learning with r training in amritsar | CACMS
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.M-n8IvansCaEdaqKRdLaZQHaHa?pid=Api
                                    [datePublished] => 2020-09-07T10:21:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://cacms.in/admin/admin%20image/machinelearn-%20r%20leve1.jpg
                                    [hostPageUrl] => http://cacms.in/machine-learning-with-r-level-1/
                                    [contentSize] => 42209 B
                                    [width] => 500
                                    [height] => 500
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.33e9fc22f6a7b0268475aa8a45d2da65?rik=XIPxV7SmenilPA&riu=http%3a%2f%2fcacms.in%2fadmin%2fadmin+image%2fmachinelearn-+r+leve1.jpg&ehk=k%2fcBsTJLvUC0QcjduBTURNHKj8L2qmfzjok13B8j%2b%2bA%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 326E750913A74F42ED9B3CA5787AA6B457F1835C
                                    [accentColor] => 00233E
                                )

                            [C2CCBD2085B8E4CF2476C7F366A1E98199E2C5FC] => Array
                                (
                                    [name] => Twitch to use ‘Machine learning’ to detect banned user | Business Outreach
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.Gs0qZKPqjBN_a_CSAJ10AwAAAA?pid=Api
                                    [datePublished] => 2023-08-21T13:26:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://businessoutreach.in/wp-content/uploads/2021/12/Twitch-to-use-%E2%80%98Machine-learning-to-detect-banned-user.jpg
                                    [hostPageUrl] => https://www.businessoutreach.in/twitch-to-use-machine-learning-to-detect-banned-user/
                                    [contentSize] => 80973 B
                                    [width] => 400
                                    [height] => 400
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1acd2a64a3ea8c137f6bf092009d7403?rik=LMzbAliLTvxCZw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => CF5C2E99189E1A663F7C6742FC4E8B5802DBCC2C
                                    [accentColor] => 5111BA
                                )

                            [CE272D91E6B24E4FF4F33CFF8479F3C7E77560B7] => Array
                                (
                                    [name] => Plant Disease Detection and Classification by Deep Learning
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.q6YOEyoInsXAtEVWR0L-8wHaFp?pid=Api
                                    [datePublished] => 2019-10-31T16:39:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://pub.mdpi-res.com/plants/plants-08-00468/article_deploy/html/images/plants-08-00468-g001.png?1574872621
                                    [hostPageUrl] => https://www.mdpi.com/2223-7747/8/11/468
                                    [contentSize] => 789763 B
                                    [width] => 2812
                                    [height] => 2143
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.aba60e132a089ec5c0b445564742fef3?rik=7HLSGW4r5PRPPw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 7B06577E7C3F9748FFC33F4FF4E42B6E19D272EC
                                    [accentColor] => C49807
                                )

                            [267E6DF545B7C2C856B66FB4FAC38E60ABFA2260] => Array
                                (
                                    [name] => Cyber Protect: A Robust Cybersecurity System for Fraudulent Scam and ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.RF2fNXO5W_W4q0_6M5fpWwAAAA?pid=Api
                                    [datePublished] => 2023-12-03T06:27:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.ijraset.com/downloads/user_photos/2023/November/IJRASET57066.jpg
                                    [hostPageUrl] => https://www.ijraset.com/research-paper/cyber-protect-a-robust-cybersecurity-system
                                    [contentSize] => 11790 B
                                    [width] => 100
                                    [height] => 120
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.445d9f3573b95bf5b8ab4ffa3397e95b?rik=YufWX1R7LIxlaw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 0622AFBA06E83CAF4BF66B658C2C7B545FD6E762
                                    [accentColor] => 525860
                                )

                            [A04AF1F2C2F41A3D915444ACDB704692BF003B0B] => Array
                                (
                                    [name] => BRAIN TUMOR: Analysis, Classification, and Detection Using Machine ...
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.GUPoXUL4f66yYgvOs31AkAAAAA?pid=Api
                                    [datePublished] => 2024-07-11T15:35:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41qXrDFZZFL._SX342_SY445_.jpg
                                    [hostPageUrl] => https://www.amazon.in/BRAIN-TUMOR-Analysis-Classification-Detection/dp/B09CK1BX95
                                    [contentSize] => 21215 B
                                    [width] => 342
                                    [height] => 443
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1943e85d42f87faeb2620bceb37d4090?rik=CqQfLyxPodMZRQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B0B300FB296407BDCA444519D3A14F2C2F1FA40A
                                    [accentColor] => A73D24
                                )

                            [5598020647FA57B9AE277C893B8196F3A967359C] => Array
                                (
                                    [name] => Stress Detection using Machine Learning Project | Talent Battle
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.0PMTXCbGY_5vvzVqkK0kiQAAAA?pid=Api
                                    [datePublished] => 2022-11-22T05:53:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://talentbattle.in/Files/C4U_Images/C4U_CKEDITOR_IMAGES/IMG11158_feature3.png
                                    [hostPageUrl] => https://talentbattle.in/prepare/stress-detection-using-machine-learning
                                    [contentSize] => 7773 B
                                    [width] => 250
                                    [height] => 250
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.d0f3135c26c663fe6fbf356a90ad2489?rik=VYkgYHSvdZvqcg&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => C953769A3F6918B398C772EA9B75AF7460208955
                                    [accentColor] => 060467
                                )

                            [12700850AEA12E38C3CC786FCA57C132B12EEEC3] => Array
                                (
                                    [name] => Data science and Machine learning video Lectures | VLR training
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.bNOaMA4ahGFpxSuj-7hCiwHaEQ?pid=Api
                                    [datePublished] => 2019-03-20T13:42:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://www.vlrtraining.in/wp-content/uploads/2018/04/Machine-learning-workflow.png
                                    [hostPageUrl] => https://www.vlrtraining.in/data-science-machine-learning-telugu/
                                    [contentSize] => 31859 B
                                    [width] => 711
                                    [height] => 409
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6cd39a300e1a846169c52ba3fbb8428b?rik=IQeABeoa4oM8zA&riu=http%3a%2f%2fwww.vlrtraining.in%2fwp-content%2fuploads%2f2018%2f04%2fMachine-learning-workflow.png&ehk=lsuDev3oOyN%2fyhlB8J0u0BsVi%2f1ZplVeh7czo6bQT6Q%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => 3CEEE21B231C75ACF687CC3C83E21AEA05800721
                                    [accentColor] => 069EC5
                                )

                            [7D89784160CD9BEE4AC6C4215F647F0F45CB36C2] => Array
                                (
                                    [name] => My book ‘Practical Machine Learning in R and Python: Third edition’ on ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.GSNO02ylBO8dScVX-NZo3QHaCJ?pid=Api
                                    [datePublished] => 2019-01-25T21:32:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://gigadom.in/wp-content/uploads/2019/01/Untitled-1.png?w=1024
                                    [hostPageUrl] => https://gigadom.in/2019/01/02/my-book-practical-machine-learning-in-r-and-python-third-edition-on-amazon/
                                    [contentSize] => 126816 B
                                    [width] => 1024
                                    [height] => 298
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.19234ed36ca504ef1d49c557f8d668dd?rik=15iHFAbcue6kbA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 2C63BC54F0F746F5124C6CA4EEB9DC06148798D7
                                    [accentColor] => 134A63
                                )

                            [F13F808D6BCD9E7C082553446D3EAE75E68F0FEC] => Array
                                (
                                    [name] => Machine Learning Projects
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.ac136o4BEiBNr-rnMfR81AHaHa?pid=Api
                                    [datePublished] => 2023-03-14T09:57:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://finalyearcollegeproject.in/telegram.png
                                    [hostPageUrl] => http://finalyearcollegeproject.in/
                                    [contentSize] => 23088 B
                                    [width] => 512
                                    [height] => 512
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.69cd77ea8e0112204dafeae731f47cd4?rik=H%2fMI2Lbc6ceAUg&riu=http%3a%2f%2ffinalyearcollegeproject.in%2ftelegram.png&ehk=FzlIW%2fBmz3AlrzyGUApZLEfzrEih5HmI5ulHwrBsI4g%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => CEF0F86E57EAE3D644355280C7E9DCB6D808F31F
                                    [accentColor] => 0091C8
                                )

                            [32E3567E9FA264B8F8C54D440A2D328BE3044B69] => Array
                                (
                                    [name] => Raman Lab
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.sRcClRa9Yv007wj1Hh82dQHaHa?pid=Api
                                    [datePublished] => 2025-04-09T08:56:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://ramanlab.co.in/img/scholer/smitha.png
                                    [hostPageUrl] => https://ramanlab.co.in/reasearchteam.html
                                    [contentSize] => 439414 B
                                    [width] => 563
                                    [height] => 563
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b117029516bd62fd34ef08f51e1f3675?rik=Iz5l5%2fkqRouPXA&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => 96B4403EB823D2A044D45C8F8B462AF9E7653E23
                                    [accentColor] => 321E1C
                                )

                            [F9BCB950067BB6B94B697C893B8196F3A967359C] => Array
                                (
                                    [name] => Stress Detection using Machine Learning Project | Talent Battle
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.cAU3dZu7tTG7QduT_VN11AAAAA?pid=Api
                                    [datePublished] => 2022-11-22T05:53:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://talentbattle.in/Files/C4U_Images/C4U_CKEDITOR_IMAGES/IMG11159_feature4.png
                                    [hostPageUrl] => https://talentbattle.in/prepare/stress-detection-using-machine-learning
                                    [contentSize] => 8726 B
                                    [width] => 250
                                    [height] => 250
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.700537759bbbb531bb41db93fd5375d4?rik=n8ubBWC3a5u0lg&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => C953769A3F6918B398C796B49B6BB760059BCB9F
                                    [accentColor] => 040366
                                )

                            [D9D1F6A96D4579D462CA1B36DB9A79052CCBCC15] => Array
                                (
                                    [name] => Buy Machine and Deep Learning Algorithms, Applications Cancer Detection ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.YkC5PM8ifEHCiAdMay6pzgAAAA?pid=Api
                                    [datePublished] => 2024-06-13T05:29:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41sVAXuzVlL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Machine-Learning-Algorithms-Applications-Detection/dp/6207487907
                                    [contentSize] => 21527 B
                                    [width] => 296
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6240b93ccf227c41c288074c6b2ea9ce?rik=nR1vmtZUl00mrA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 51CCBCC25097A9BD63B1AC264D9754D69A6F1D9D
                                    [accentColor] => B01B21
                                )

                            [BDC0D19B30A8850DADAE26060CBEF374C04B84A9] => Array
                                (
                                    [name] => Social Media based Hate Speech Detection using Machine Learning
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.bm0ObhIQiZ6ouhXQpHj1pwAAAA?pid=Api
                                    [datePublished] => 2023-05-17T22:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.ijraset.com/downloads/user_photos/2023/May/IJRASET52206.jpg
                                    [hostPageUrl] => https://www.ijraset.com/research-paper/social-media-based-hate-speech-detection
                                    [contentSize] => 8174 B
                                    [width] => 100
                                    [height] => 120
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.6e6d0e6e1210899ea8ba15d0a478f5a7?rik=2wwduQOKWNDa6g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9A48B40C473FEBC06062EADAD0588A03B91D0CDB
                                    [accentColor] => 214267
                                )

                            [7F8E5139F2DB12B80AD7E74DB1EE602244BDFC30] => Array
                                (
                                    [name] => Machine learning in R: Buy Machine learning in R by Mr. Susheel Aakulu ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.X_SRjOFCqJztA0Ov_XroWAAAAA?pid=Api
                                    [datePublished] => 2023-06-20T21:46:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://rukmini1.flixcart.com/image/300/300/xif0q/book/h/p/b/machine-learning-in-r-original-imagzkqfazrjz6ez.jpeg
                                    [hostPageUrl] => https://www.flipkart.com/machine-learning-r/p/itmc5b61a903e655
                                    [contentSize] => 26409 B
                                    [width] => 205
                                    [height] => 300
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.5ff4918ce142a89ced0343affd7ae858?rik=9%2bgVky%2b9IYugfQ&riu=http%3a%2f%2frukmini1.flixcart.com%2fimage%2f300%2f300%2fxif0q%2fbook%2fh%2fp%2fb%2fmachine-learning-in-r-original-imagzkqfazrjz6ez.jpeg&ehk=sTfIjzACMXFAUHZKcC3cKe5ub9ZI7y9rVBLr61qulGk%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 03CFDB442206EE1BD47E7DA08B21BD2F9315E8F7
                                    [accentColor] => 741124
                                )

                            [DA23A4A948388495882343A98D9E8A788A456688] => Array
                                (
                                    [name] => Clarification on 2021 Industry Internship (21INT82) Scheme at VTU - Studocu
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.zhKlQkkttCYgt_TvF078cwHaKd?pid=Api
                                    [datePublished] => 2025-03-05T02:15:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://website-assets.studocu.com/img/document_thumbnails/98f76994ca5add8876f2b20fea47c583/thumb_1200_1694.png
                                    [hostPageUrl] => https://www.studocu.com/in/document/visvesvaraya-technological-university/computer-science-vtu/circular-1966-21int82-industry-or-research-internship-2021-scheme-clarification/119846898
                                    [contentSize] => 665912 B
                                    [width] => 1200
                                    [height] => 1694
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ce12a542492db42620b7f4ef174efc73?rik=rTJKmoSDSFmIMg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 886654A887A8E9D89A343288594883849A4A32AD
                                    [accentColor] => 2817B4
                                )

                            [4DCB32405BFEA56EBC0C30F0AA8E5C107A361CC6] => Array
                                (
                                    [name] => Design of Intelligent Applications using Machine Learning and Deep ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.mH4e1OoclUiR-Aylo6GafQAAAA?pid=Api
                                    [datePublished] => 2025-02-06T17:43:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41ditk4FiYL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Intelligent-Applications-Machine-Learning-Techniques/dp/0367679892
                                    [contentSize] => 22194 B
                                    [width] => 307
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.987e1ed4ea1c954891f80ca5a3a19a7d?rik=1LwjBLXvWubLwA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 6CC163A701C5E8AA0F03C0CBE65AEFB50423BCD4
                                    [accentColor] => 345597
                                )

                            [DCCEF4581EFAAC552152D5B3FB2C78B74B1EDD7B] => Array
                                (
                                    [name] => Buy Sensors Data Processing Using Machine Learning Book Online at Low ...
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.v5WXEtGf4jnbZ_4-yXNiMAAAAA?pid=Api
                                    [datePublished] => 2025-07-28T06:44:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/31UmPUj4y0L._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Sensors-Processing-Using-Machine-Learning/dp/3725811717
                                    [contentSize] => 10089 B
                                    [width] => 294
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.bf959712d19fe239db67fe3ec9736230?rik=zexPheGvylUSJQ&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B7DDE1B47B87C2BF3B5D251255CAAFE1854FECCD
                                    [accentColor] => 1B8589
                                )

                            [884F5850064B0D1F1CA0FE756F94F867A3E322DE] => Array
                                (
                                    [name] => Depression Detection from Social Network Using Deep Learning | S-Logix
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.gCsgXjnCWoh5XTtXzuFCEQHaDN?pid=Api
                                    [datePublished] => 2022-11-26T15:49:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/machine-learning/early-depression-detection-from-social-network-using-deep-learning-techniques.jpg
                                    [hostPageUrl] => https://slogix.in/machine-learning/early-depression-detection-from-social-network-using-deep-learning-techniques/
                                    [contentSize] => 66918 B
                                    [width] => 830
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.802b205e39c25a88795d3b57cee14211?rik=iPSFBWC00PHBCg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => ED223E3A768F49F657EF0AC1F1D0B4600585F488
                                    [accentColor] => 004A95
                                )

                            [C4792C03B3CDF1A28A1DDFE33EBBCD0D15793415] => Array
                                (
                                    [name] => Advanced Transfer Learning Implementation for Anomaly Detection using ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.j9Q1VnTY09SZ-SyZA0dUSgHaHa?pid=Api
                                    [datePublished] => 2025-11-12T18:05:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://johal.in/content/images/2025/08/logo-1.png
                                    [hostPageUrl] => https://www.johal.in/advanced-transfer-learning-implementation-for-anomaly-detection-using-pytorch-for-oracles-in-2026/
                                    [contentSize] => 1411915 B
                                    [width] => 1024
                                    [height] => 1024
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.8fd4355674d8d3d499f92c990347544a?rik=TJfCMDvcHyqo0Q&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => 51439751D0DCBBE33EFDD1A82A1FDC3B30C2974C
                                    [accentColor] => 0054AC
                                )

                            [732E45A71CEE0B30DF8125466C7CFAABF34A81E1] => Array
                                (
                                    [name] => College Projects Expert - From Experts to Students: High-Quality ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.zmxs3Sl9ZzBjwB3816C7LAAAAA?pid=Api
                                    [datePublished] => 2025-06-15T16:28:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://collegeprojectexpert.in/static/uploads/languages/5.png
                                    [hostPageUrl] => https://collegeprojectexpert.in/
                                    [contentSize] => 6132 B
                                    [width] => 128
                                    [height] => 128
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.ce6c6cdd297d673063c01dfcd7a0bb2c?rik=N%2bJUesHusAP9GA&pid=ImgRaw&r=0
                                    [isTransparent] => 1
                                    [imageId] => 1E18A43FBAAFC7C6645218FD03B0EEC17A54E237
                                    [accentColor] => CB9700
                                )

                            [0D2F3F0637A2CE72D4708B3604D543A31E316825] => Array
                                (
                                    [name] => IIIT Vadodara-DIU | Faculty
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.uBPQnFzjOgHlQ3lBiejmOAHaIs?pid=Api
                                    [datePublished] => 2020-09-23T12:33:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => http://diu.iiitvadodara.ac.in/img/AP.jpg
                                    [hostPageUrl] => http://diu.iiitvadodara.ac.in/faculty.php
                                    [contentSize] => 199495 B
                                    [width] => 684
                                    [height] => 803
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.b813d09c5ce33a01e543794189e8e638?rik=0PLzYHMq7CdNBw&riu=http%3a%2f%2fdiu.iiitvadodara.ac.in%2fimg%2fAP.jpg&ehk=CJa4Zv8rN41cFE3lzM6ZutuBdRldyafRdnqW1y4Rr00%3d&risl=&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 528613E13A345D4063B8074D27EC2A7360F3F2D0
                                    [accentColor] => 3D3D3D
                                )

                            [C95F3E2100176057E4344D29B544BECC4E20EFD9] => Array
                                (
                                    [name] => Detection of Parkinson’s Disease Using XGBOOST Algorithm
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.Ct4mmwgM9izriqIG4qY_HAAAAA?pid=Api
                                    [datePublished] => 2022-12-24T15:10:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.ijraset.com/images/text_version_uploads/imag%201_25043.png
                                    [hostPageUrl] => https://www.ijraset.com/research-paper/detection-of-parkinsons-disease-using-xgboost-algorithm
                                    [contentSize] => 48200 B
                                    [width] => 255
                                    [height] => 346
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.0ade269b080cf62ceb8aa206e2a63f1c?rik=nPXjEgBxBnVOQw&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 9DFE02E4CCEB445B92D4434E7506710012E3F59C
                                    [accentColor] => 1386B8
                                )

                            [D4EF5A9CA8521BA793FD333C572F62B9D9304458] => Array
                                (
                                    [name] => Research Paper on Breast Cancer Prediction Using Machine Learning
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.aaC5SXbZuF1ajaOLSPUhzgHaEg?pid=Api
                                    [datePublished] => 2022-07-31T18:43:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.ijraset.com/images/text_version_uploads/imag%201_14433.png
                                    [hostPageUrl] => https://www.ijraset.com/research-paper/paper-on-breast-cancer-prediction-using-machine-learning
                                    [contentSize] => 40410 B
                                    [width] => 534
                                    [height] => 325
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.69a0b94976d9b85d5a8da38b48f521ce?rik=Tf6lyYolsXo53w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8544039D9B26F275C333DF397AB1258AC9A5FE4D
                                    [accentColor] => 181818
                                )

                            [EDFE64BBEE4A9243C4E88C29750FFABBDE108435] => Array
                                (
                                    [name] => My book ‘Practical Machine Learning with R and Python’ on Amazon – Giga ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.QmmWQfnvwaeVVtr4EjahVQHaDE?pid=Api
                                    [datePublished] => 2018-12-12T12:48:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://gigadom.in/wp-content/uploads/2017/12/untitled4.png
                                    [hostPageUrl] => https://gigadom.in/2017/12/05/my-book-practical-machine-learning-with-r-and-python-on-amazon/
                                    [contentSize] => 196629 B
                                    [width] => 1269
                                    [height] => 527
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.42699641f9efc1a79556daf81236a155?rik=3u9Gu%2b6kKTRMjg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 534801EDBBAFF05792C88E4C3429A4EEBB46EFDE
                                    [accentColor] => AB7520
                                )

                            [2436F272E431B18FB4AD414AA0FD4FF8E5D6ABDA] => Array
                                (
                                    [name] => Buy The business of Machine Learning:How to use Machine Learning to ...
                                    [thumbnailUrl] => https://tse2.mm.bing.net/th/id/OIP.ZTtdO9RvjdETVlgJk7mU4gAAAA?pid=Api
                                    [datePublished] => 2023-09-27T07:04:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41SrS8j2znL._SY445_SX342_.jpg
                                    [hostPageUrl] => https://www.amazon.in/business-Machine-Learning-drive-revenue/dp/B0CHK8G3KC
                                    [contentSize] => 19274 B
                                    [width] => 296
                                    [height] => 445
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.653b5d3bd46f8dd11356580993b994e2?rik=QmMvJ04TG%2fhL2g&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => ADBA6D5E8FF4DF0AA414DA4BF81B134E272F6342
                                    [accentColor] => 22426C
                                )

                            [0C38615B658BE572693E002E2450345D5F562B82] => Array
                                (
                                    [name] => Effective Face Detection using Machine Intelligence : P. Patel, P ...
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.IVJ3tRYTZlcPQ5pi0OQ-rgAAAA?pid=Api
                                    [datePublished] => 2021-03-26T01:45:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://m.media-amazon.com/images/I/41SO-LSc3KL._SX342_SY445_.jpg
                                    [hostPageUrl] => https://www.amazon.in/Effective-Detection-using-Machine-Intelligence/dp/3330059230
                                    [contentSize] => 14234 B
                                    [width] => 342
                                    [height] => 251
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.215277b5161366570f439a62d0e43eae?rik=wIMWtVa4XieW4w&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 28B265F5D5430542E200E396275EB856B51683C0
                                    [accentColor] => 9A111D
                                )

                            [7CDA55A52AC243CD2EAB333C572F62B9D9304458] => Array
                                (
                                    [name] => Research Paper on Breast Cancer Prediction Using Machine Learning
                                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.EZYEY5KouD3tI0HkeGSFkgAAAA?pid=Api
                                    [datePublished] => 2022-07-31T18:43:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://www.ijraset.com/images/text_version_uploads/imag%201_14436.png
                                    [hostPageUrl] => https://www.ijraset.com/research-paper/paper-on-breast-cancer-prediction-using-machine-learning
                                    [contentSize] => 29486 B
                                    [width] => 260
                                    [height] => 249
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.1196046392a8b83ded2341e478648592?rik=x61VWqIsNNziug&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 8544039D9B26F275C333BAE2DC342CA25A55ADC7
                                    [accentColor] => 666666
                                )

                            [233D51610B9BCB21B4653806226CAB7985DF412B] => Array
                                (
                                    [name] => Diabetes Prediction Using Machine Learning
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.yWJcRS3GjqIhckHho_wNVAHaEK?pid=Api
                                    [datePublished] => 2023-01-03T20:50:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://i.ytimg.com/vi/39PUAvOknxw/maxresdefault.jpg
                                    [hostPageUrl] => https://www.finalproject.in/post/diabetes-prediction-using-machine-learning
                                    [contentSize] => 112170 B
                                    [width] => 1280
                                    [height] => 720
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.c9625c452dc68ea2217241e1a3fc0d54?rik=MtMVFrC5vBJLVg&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => B214FD5897BAC6226083564B12BCB9B01615D332
                                    [accentColor] => 521CAF
                                )

                            [8633A18CAFBBC9A680A6F1BE8088C702946EBA31] => Array
                                (
                                    [name] => Epileptic seizure detection and prediction using stacked | S-Logix
                                    [thumbnailUrl] => https://tse4.mm.bing.net/th/id/OIP.dMz0u0qKVaJtQLt1RNh9SAHaDN?pid=Api
                                    [datePublished] => 2022-10-11T09:04:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://slogix.in/images/machine-learning/epileptic-seizure-detection-and-prediction-using-stacked-bidirectional-long-short-term-memory.jpg
                                    [hostPageUrl] => https://slogix.in/machine-learning/epileptic-seizure-detection-and-prediction-using-stacked-bidirectional-long-short-term-memory/
                                    [contentSize] => 72058 B
                                    [width] => 830
                                    [height] => 360
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.74ccf4bb4a8a55a26d40bb7544d87d48?rik=aDMayPq7nGoIag&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 13ABE649207C8808EB1F6A086A9CBBFAC81A3368
                                    [accentColor] => 004A95
                                )

                            [3312C0BA2AE214BA5F43C52D50E1C843F05D3F00] => Array
                                (
                                    [name] => Bennett University Ph.D. scholar
                                    [thumbnailUrl] => https://tse3.mm.bing.net/th/id/OIP.Med55oDgTUav4AOzXGXOCQAAAA?pid=Api
                                    [datePublished] => 2021-03-04T06:49:00.0000000Z
                                    [isFamilyFriendly] => 1
                                    [contentUrl] => https://research.bennett.edu.in/rdsadmin/uploads/%20173424E18SOE822%20Arvind%20Kumar.jpg
                                    [hostPageUrl] => https://research.bennett.edu.in/research-scholar.php
                                    [contentSize] => 29905 B
                                    [width] => 382
                                    [height] => 372
                                    [cDNContentUrl] => https://th.bing.com/th/id/R.31e779e680e04d46afe003b35c65ce09?rik=MyEMq6IuQav1NA&pid=ImgRaw&r=0
                                    [isTransparent] => 
                                    [imageId] => 00F3D50F348C1E05D25C34F5AB412EA2AB0C2133
                                    [accentColor] => 5E3596
                                )

                        )

                    [relatedSearches] => Array
                        (
                            [0] => Array
                                (
                                    [text] => Machine Learning in Malware Detection
                                    [displayText] => Machine Learning in Malware Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Machine+Learning+in+Malware+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5817.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Machine+Learning+in+Malware+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Machine+Learning+in+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [1] => Array
                                (
                                    [text] => Malware Detection Using Machine Learning in Activity Diagram
                                    [displayText] => Malware Detection Using Machine Learning in Activity Diagram
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+Using+Machine+Learning+in+Activity+Diagram&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5819.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+Using+Machine+Learning+in+Activity+Diagram
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malware+Detection+Using+Machine+Learning+in+Activity+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [2] => Array
                                (
                                    [text] => Malware Detection System Diagram Using Machine Learning
                                    [displayText] => Malware Detection System Diagram Using Machine Learning
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+System+Diagram+Using+Machine+Learning&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5821.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+System+Diagram+Using+Machine+Learning
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Malware+Detection+System+Diagram+Using+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [3] => Array
                                (
                                    [text] => Malware Detection Using Machine Learning Data Flow Diagram
                                    [displayText] => Malware Detection Using Machine Learning Data Flow Diagram
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+Using+Machine+Learning+Data+Flow+Diagram&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5823.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+Using+Machine+Learning+Data+Flow+Diagram
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malware+Detection+Using+Machine+Learning+Data+Flow+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [4] => Array
                                (
                                    [text] => Deep Learning for Malware Detection
                                    [displayText] => Deep Learning for Malware Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Deep+Learning+for+Malware+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5825.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Deep+Learning+for+Malware+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Deep+Learning+for+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [5] => Array
                                (
                                    [text] => Advanced Machine Learning for Malware Detection
                                    [displayText] => Advanced Machine Learning for Malware Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Advanced+Machine+Learning+for+Malware+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5827.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Advanced+Machine+Learning+for+Malware+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Advanced+Machine+Learning+for+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [6] => Array
                                (
                                    [text] => Malware Detection Using Ensemble Learning
                                    [displayText] => Malware Detection Using Ensemble Learning
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+Using+Ensemble+Learning&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5829.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+Using+Ensemble+Learning
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malware+Detection+Using+Ensemble+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [7] => Array
                                (
                                    [text] => Class Diagram for Malware Detection Using Machine Learning
                                    [displayText] => Class Diagram for Malware Detection Using Machine Learning
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Class+Diagram+for+Malware+Detection+Using+Machine+Learning&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5831.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Class+Diagram+for+Malware+Detection+Using+Machine+Learning
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Class+Diagram+for+Malware+Detection+Using+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [8] => Array
                                (
                                    [text] => Deep Learning Model in Malware Detection
                                    [displayText] => Deep Learning Model in Malware Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Deep+Learning+Model+in+Malware+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5833.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Deep+Learning+Model+in+Malware+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Deep+Learning+Model+in+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [9] => Array
                                (
                                    [text] => PDF Malware Detection toward Machine Learning Project Diagram
                                    [displayText] => PDF Malware Detection toward Machine Learning Project Diagram
                                    [webSearchUrl] => https://www.bing.com/images/search?q=PDF+Malware+Detection+toward+Machine+Learning+Project+Diagram&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5835.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=PDF+Malware+Detection+toward+Machine+Learning+Project+Diagram
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=PDF+Malware+Detection+toward+Machine+Learning+Project+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [10] => Array
                                (
                                    [text] => Android Malware Detection Using Ml
                                    [displayText] => Android Malware Detection Using Ml
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Android+Malware+Detection+Using+Ml&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5837.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Android+Malware+Detection+Using+Ml
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Android+Malware+Detection+Using+Ml&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [11] => Array
                                (
                                    [text] => Malware Detection Using Machine Learning Cover Image
                                    [displayText] => Malware Detection Using Machine Learning Cover Image
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+Using+Machine+Learning+Cover+Image&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5839.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+Using+Machine+Learning+Cover+Image
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Malware+Detection+Using+Machine+Learning+Cover+Image&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [12] => Array
                                (
                                    [text] => Rare Malware Graph Machine Learning
                                    [displayText] => Rare Malware Graph Machine Learning
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Rare+Malware+Graph+Machine+Learning&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5841.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Rare+Malware+Graph+Machine+Learning
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Rare+Malware+Graph+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [13] => Array
                                (
                                    [text] => Why Machine Larning for Malware Detection Systems
                                    [displayText] => Why Machine Larning for Malware Detection Systems
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Why+Machine+Larning+for+Malware+Detection+Systems&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5843.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Why+Machine+Larning+for+Malware+Detection+Systems
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Why+Machine+Larning+for+Malware+Detection+Systems&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [14] => Array
                                (
                                    [text] => Road Map of Malware Detection Using Machine Learning
                                    [displayText] => Road Map of Malware Detection Using Machine Learning
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Road+Map+of+Malware+Detection+Using+Machine+Learning&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5845.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Road+Map+of+Malware+Detection+Using+Machine+Learning
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Road+Map+of+Malware+Detection+Using+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [15] => Array
                                (
                                    [text] => Methodology for Machine Learning for Malware Detection
                                    [displayText] => Methodology for Machine Learning for Malware Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Methodology+for+Machine+Learning+for+Malware+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5847.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Methodology+for+Machine+Learning+for+Malware+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Methodology+for+Machine+Learning+for+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [16] => Array
                                (
                                    [text] => Database Design for Malware Detection Using Machine Learning
                                    [displayText] => Database Design for Malware Detection Using Machine Learning
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Database+Design+for+Malware+Detection+Using+Machine+Learning&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5849.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Database+Design+for+Malware+Detection+Using+Machine+Learning
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Database+Design+for+Malware+Detection+Using+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [17] => Array
                                (
                                    [text] => Malware Detection Using Machine Learning in Data Structure Diagram
                                    [displayText] => Malware Detection Using Machine Learning in Data Structure Diagram
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+Using+Machine+Learning+in+Data+Structure+Diagram&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5851.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+Using+Machine+Learning+in+Data+Structure+Diagram
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malware+Detection+Using+Machine+Learning+in+Data+Structure+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [18] => Array
                                (
                                    [text] => Windows Malware Detection Using Malware Visualisation
                                    [displayText] => Windows Malware Detection Using Malware Visualisation
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Windows+Malware+Detection+Using+Malware+Visualisation&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5853.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Windows+Malware+Detection+Using+Malware+Visualisation
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Windows+Malware+Detection+Using+Malware+Visualisation&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [19] => Array
                                (
                                    [text] => System Architecture of Malware Detection through Machine Learning
                                    [displayText] => System Architecture of Malware Detection through Machine Learning
                                    [webSearchUrl] => https://www.bing.com/images/search?q=System+Architecture+of+Malware+Detection+through+Machine+Learning&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5855.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=System+Architecture+of+Malware+Detection+through+Machine+Learning
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=System+Architecture+of+Malware+Detection+through+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [20] => Array
                                (
                                    [text] => Malware Detection Software
                                    [displayText] => Malware Detection Software
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+Software&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5857.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+Software
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malware+Detection+Software&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [21] => Array
                                (
                                    [text] => Automated Malware Detection
                                    [displayText] => Automated Malware Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Automated+Malware+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5859.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Automated+Malware+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Automated+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [22] => Array
                                (
                                    [text] => LLM of Malware Detection Using Machine Learning
                                    [displayText] => LLM of Malware Detection Using Machine Learning
                                    [webSearchUrl] => https://www.bing.com/images/search?q=LLM+of+Malware+Detection+Using+Machine+Learning&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5861.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=LLM+of+Malware+Detection+Using+Machine+Learning
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=LLM+of+Malware+Detection+Using+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [23] => Array
                                (
                                    [text] => Malware Detection in Local Network
                                    [displayText] => Malware Detection in Local Network
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+in+Local+Network&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5863.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+in+Local+Network
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Malware+Detection+in+Local+Network&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [24] => Array
                                (
                                    [text] => Malware Detection Using Lgbm and Xgboost GitHub
                                    [displayText] => Malware Detection Using Lgbm and Xgboost GitHub
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+Using+Lgbm+and+Xgboost+GitHub&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5865.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+Using+Lgbm+and+Xgboost+GitHub
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malware+Detection+Using+Lgbm+and+Xgboost+GitHub&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [25] => Array
                                (
                                    [text] => Malware Detection Using Machine Learning Presentation
                                    [displayText] => Malware Detection Using Machine Learning Presentation
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+Using+Machine+Learning+Presentation&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5867.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+Using+Machine+Learning+Presentation
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malware+Detection+Using+Machine+Learning+Presentation&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [26] => Array
                                (
                                    [text] => How Deep Learning Is Used to Detect Malware
                                    [displayText] => How Deep Learning Is Used to Detect Malware
                                    [webSearchUrl] => https://www.bing.com/images/search?q=How+Deep+Learning+Is+Used+to+Detect+Malware&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5869.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=How+Deep+Learning+Is+Used+to+Detect+Malware
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=How+Deep+Learning+Is+Used+to+Detect+Malware&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [27] => Array
                                (
                                    [text] => Image-Based Malware Detection
                                    [displayText] => Image-Based Malware Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Image-Based+Malware+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5871.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Image-Based+Malware+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Image-Based+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [28] => Array
                                (
                                    [text] => Crime Detection Using Deep Learning and Machine Learning
                                    [displayText] => Crime Detection Using Deep Learning and Machine Learning
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Crime+Detection+Using+Deep+Learning+and+Machine+Learning&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5873.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Crime+Detection+Using+Deep+Learning+and+Machine+Learning
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Crime+Detection+Using+Deep+Learning+and+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [29] => Array
                                (
                                    [text] => Prims Framework for M Machine Learning Malware Detection
                                    [displayText] => Prims Framework for M Machine Learning Malware Detection
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Prims+Framework+for+M+Machine+Learning+Malware+Detection&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5875.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Prims+Framework+for+M+Machine+Learning+Malware+Detection
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Prims+Framework+for+M+Machine+Learning+Malware+Detection&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [30] => Array
                                (
                                    [text] => Malware Detection Techniques
                                    [displayText] => Malware Detection Techniques
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+Techniques&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5877.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+Techniques
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malware+Detection+Techniques&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [31] => Array
                                (
                                    [text] => Android Malware Detection Using Ml Title Picture
                                    [displayText] => Android Malware Detection Using Ml Title Picture
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Android+Malware+Detection+Using+Ml+Title+Picture&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5879.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Android+Malware+Detection+Using+Ml+Title+Picture
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Android+Malware+Detection+Using+Ml+Title+Picture&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [32] => Array
                                (
                                    [text] => Road Map of Malware Detection Using Machine Learning in PPT
                                    [displayText] => Road Map of Malware Detection Using Machine Learning in PPT
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Road+Map+of+Malware+Detection+Using+Machine+Learning+in+PPT&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5881.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Road+Map+of+Malware+Detection+Using+Machine+Learning+in+PPT
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Road+Map+of+Malware+Detection+Using+Machine+Learning+in+PPT&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [33] => Array
                                (
                                    [text] => Intelligient Malware Detection Application Methodology
                                    [displayText] => Intelligient Malware Detection Application Methodology
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Intelligient+Malware+Detection+Application+Methodology&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5883.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Intelligient+Malware+Detection+Application+Methodology
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Intelligient+Malware+Detection+Application+Methodology&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [34] => Array
                                (
                                    [text] => Machine Learning Taxonomy
                                    [displayText] => Machine Learning Taxonomy
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Machine+Learning+Taxonomy&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5885.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Machine+Learning+Taxonomy
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Machine+Learning+Taxonomy&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [35] => Array
                                (
                                    [text] => Malware Classification Using Deep Learning
                                    [displayText] => Malware Classification Using Deep Learning
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Classification+Using+Deep+Learning&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5887.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Classification+Using+Deep+Learning
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Malware+Classification+Using+Deep+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [36] => Array
                                (
                                    [text] => Machine Learning Pipe Line for Malware Detection in PDF
                                    [displayText] => Machine Learning Pipe Line for Malware Detection in PDF
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Machine+Learning+Pipe+Line+for+Malware+Detection+in+PDF&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5889.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Machine+Learning+Pipe+Line+for+Malware+Detection+in+PDF
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Machine+Learning+Pipe+Line+for+Malware+Detection+in+PDF&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [37] => Array
                                (
                                    [text] => Malware Detection Using FPGA
                                    [displayText] => Malware Detection Using FPGA
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+Using+FPGA&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5891.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+Using+FPGA
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Malware+Detection+Using+FPGA&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [38] => Array
                                (
                                    [text] => Python Machine Learning Malware Projects
                                    [displayText] => Python Machine Learning Malware Projects
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Python+Machine+Learning+Malware+Projects&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5893.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Python+Machine+Learning+Malware+Projects
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Python+Machine+Learning+Malware+Projects&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [39] => Array
                                (
                                    [text] => Deep Learning Model in Malware Detection and Xai
                                    [displayText] => Deep Learning Model in Malware Detection and Xai
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Deep+Learning+Model+in+Malware+Detection+and+Xai&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5895.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Deep+Learning+Model+in+Malware+Detection+and+Xai
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Deep+Learning+Model+in+Malware+Detection+and+Xai&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [40] => Array
                                (
                                    [text] => Resilent Smart Malware Detection Using Deep Learning
                                    [displayText] => Resilent Smart Malware Detection Using Deep Learning
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Resilent+Smart+Malware+Detection+Using+Deep+Learning&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5897.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Resilent+Smart+Malware+Detection+Using+Deep+Learning
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Resilent+Smart+Malware+Detection+Using+Deep+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [41] => Array
                                (
                                    [text] => Email Spam and Malware Detection Using Machine Learning
                                    [displayText] => Email Spam and Malware Detection Using Machine Learning
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Email+Spam+and+Malware+Detection+Using+Machine+Learning&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5899.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Email+Spam+and+Malware+Detection+Using+Machine+Learning
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse4.mm.bing.net/th?q=Email+Spam+and+Malware+Detection+Using+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [42] => Array
                                (
                                    [text] => Malware Identification Using Visualization Images and Deep Learning
                                    [displayText] => Malware Identification Using Visualization Images and Deep Learning
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Identification+Using+Visualization+Images+and+Deep+Learning&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5901.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Identification+Using+Visualization+Images+and+Deep+Learning
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Malware+Identification+Using+Visualization+Images+and+Deep+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [43] => Array
                                (
                                    [text] => Algorythem for Sensor Detection Using Machine Learning
                                    [displayText] => Algorythem for Sensor Detection Using Machine Learning
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Algorythem+for+Sensor+Detection+Using+Machine+Learning&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5903.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Algorythem+for+Sensor+Detection+Using+Machine+Learning
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Algorythem+for+Sensor+Detection+Using+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [44] => Array
                                (
                                    [text] => Flowchart for Malware Detection Using Machine Learning Methodology
                                    [displayText] => Flowchart for Malware Detection Using Machine Learning Methodology
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Flowchart+for+Malware+Detection+Using+Machine+Learning+Methodology&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5905.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Flowchart+for+Malware+Detection+Using+Machine+Learning+Methodology
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Flowchart+for+Malware+Detection+Using+Machine+Learning+Methodology&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [45] => Array
                                (
                                    [text] => Malware Detection Using Ml Research Paper
                                    [displayText] => Malware Detection Using Ml Research Paper
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+Using+Ml+Research+Paper&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5907.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+Using+Ml+Research+Paper
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Malware+Detection+Using+Ml+Research+Paper&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [46] => Array
                                (
                                    [text] => Malware Detection Files and URLs Using Machine Learning Activity Diagram
                                    [displayText] => Malware Detection Files and URLs Using Machine Learning Activity Diagram
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Malware+Detection+Files+and+URLs+Using+Machine+Learning+Activity+Diagram&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5909.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Malware+Detection+Files+and+URLs+Using+Machine+Learning+Activity+Diagram
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse2.mm.bing.net/th?q=Malware+Detection+Files+and+URLs+Using+Machine+Learning+Activity+Diagram&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [47] => Array
                                (
                                    [text] => Activity Chart Malware Detection System Using Deep Learning
                                    [displayText] => Activity Chart Malware Detection System Using Deep Learning
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Activity+Chart+Malware+Detection+System+Using+Deep+Learning&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5911.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Activity+Chart+Malware+Detection+System+Using+Deep+Learning
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse1.mm.bing.net/th?q=Activity+Chart+Malware+Detection+System+Using+Deep+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [48] => Array
                                (
                                    [text] => State Diagram for Malware Detection Using Machine Learning
                                    [displayText] => State Diagram for Malware Detection Using Machine Learning
                                    [webSearchUrl] => https://www.bing.com/images/search?q=State+Diagram+for+Malware+Detection+Using+Machine+Learning&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5913.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=State+Diagram+for+Malware+Detection+Using+Machine+Learning
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=State+Diagram+for+Malware+Detection+Using+Machine+Learning&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                            [49] => Array
                                (
                                    [text] => Common Machine Learning Algorithms
                                    [displayText] => Common Machine Learning Algorithms
                                    [webSearchUrl] => https://www.bing.com/images/search?q=Common+Machine+Learning+Algorithms&FORM=IRPATC
                                    [webSearchUrlPingSuffix] => images.LB.1,5915.1
                                    [searchLink] => https://www.bing.com/api/v7/images/search?q=Common+Machine+Learning+Algorithms
                                    [thumbnail] => Array
                                        (
                                            [thumbnailUrl] => https://tse3.mm.bing.net/th?q=Common+Machine+Learning+Algorithms&pid=Api&mkt=en-US&cc=US&setlang=en&adlt=strict&t=1
                                        )

                                )

                        )

                    [createdate] => 1769807604843
                )

            [json_error] => No error
            [products_count] => 120
            [related_searches_count] => 50
            [first_product_sample] => Array
                (
                    [name] => Malware Detection Using Machine Learnin 1 112620 - Malware Detection ...
                    [thumbnailUrl] => https://tse1.mm.bing.net/th/id/OIP.9ysGxvNc08SLmZAUj9vPTwHaJl?pid=Api
                    [datePublished] => 2024-07-19T04:09:00.0000000Z
                    [isFamilyFriendly] => 1
                    [contentUrl] => https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/7699fb68cf8cdf21b2ec9d998d28afcb/thumb_1200_1553.png
                    [hostPageUrl] => https://www.studocu.com/in/document/dr-apj-abdul-kalam-technical-university/btech/malware-detection-using-machine-learnin-1-112620/96402906
                    [contentSize] => 200543 B
                    [width] => 1200
                    [height] => 1553
                    [cDNContentUrl] => https://th.bing.com/th/id/R.f72b06c6f35cd3c48b9990148fdbcf4f?rik=fl6oS0%2fOjQwEmg&pid=ImgRaw&r=0
                    [isTransparent] => 
                    [imageId] => 66D87DEB0F7E9BB572979A040C8DCE4F4BA85E7E
                    [accentColor] => 21427E
                )

        )

    [skipped_products] => Array
        (
        )

)

Related Searches

Machine Learning in Malware Detection Malware Detection Using Machine Learning in Activity Diagram Malware Detection System Diagram Using Machine Learning Malware Detection Using Machine Learning Data Flow Diagram Deep Learning for Malware Detection Advanced Machine Learning for Malware Detection Malware Detection Using Ensemble Learning Class Diagram for Malware Detection Using Machine Learning Deep Learning Model in Malware Detection PDF Malware Detection toward Machine Learning Project Diagram Android Malware Detection Using Ml Malware Detection Using Machine Learning Cover Image Rare Malware Graph Machine Learning Why Machine Larning for Malware Detection Systems Road Map of Malware Detection Using Machine Learning Methodology for Machine Learning for Malware Detection Database Design for Malware Detection Using Machine Learning Malware Detection Using Machine Learning in Data Structure Diagram Windows Malware Detection Using Malware Visualisation System Architecture of Malware Detection through Machine Learning Malware Detection Software Automated Malware Detection LLM of Malware Detection Using Machine Learning Malware Detection in Local Network Malware Detection Using Lgbm and Xgboost GitHub Malware Detection Using Machine Learning Presentation How Deep Learning Is Used to Detect Malware Image-Based Malware Detection Crime Detection Using Deep Learning and Machine Learning Prims Framework for M Machine Learning Malware Detection Malware Detection Techniques Android Malware Detection Using Ml Title Picture Road Map of Malware Detection Using Machine Learning in PPT Intelligient Malware Detection Application Methodology Machine Learning Taxonomy Malware Classification Using Deep Learning Machine Learning Pipe Line for Malware Detection in PDF Malware Detection Using FPGA Python Machine Learning Malware Projects Deep Learning Model in Malware Detection and Xai Resilent Smart Malware Detection Using Deep Learning Email Spam and Malware Detection Using Machine Learning Malware Identification Using Visualization Images and Deep Learning Algorythem for Sensor Detection Using Machine Learning Flowchart for Malware Detection Using Machine Learning Methodology Malware Detection Using Ml Research Paper Malware Detection Files and URLs Using Machine Learning Activity Diagram Activity Chart Malware Detection System Using Deep Learning State Diagram for Malware Detection Using Machine Learning Common Machine Learning Algorithms

Search