
25:06
It will be helpful if each presenter identifies themselves and their paper here in the chat.

26:12
Eman Abdelfattah, No-clear for Nuclear

26:18
Yes

27:37
Hebah Alquran >> Fake news detection over social media networks using data mining techniques

28:56
Sakshi Grover, Cybersecurity Vulnerability Detection Using NLP

01:11:30
DOes anyone have a quick question?

01:11:48
I had a quick one about the time thresholds for the short and long buffer.

01:11:57
How are the buffer contents determined?

01:12:33
Is it based on time thresholds?

01:44:18
Thank you all

01:44:30
Thank You all

01:44:32
Thank You All

01:44:37
Thank you

01:44:45
Thank you everyone :)!