Table of Contents
| Analyzing Adaptive and Non-Adaptive Online Learners on Imbalanced Evolving Streams | |
| D Himaja, Dondeti Venkatesulu, Uppalapati Srilakshmi |
| AI for Improving Justice Delivery: International Scenario, Potential Applications & Way Forward for India | |
| Sunil Kumar Srivastava |
| A Neuro-Fuzzy Predictor Trained by an Elitism Artificial Electric Field Algorithm for Estimation of Compressive Strength of Concrete Structures | |
| Chaudhury Sanjeev Kumar Dash, Sarat Chandra Nayak, Ajit Kumar Behera, Satchidananda Dehuri |
| Integration of EfficientNetB0 and Machine Learning for Fingerprint Classification | |
| Jenan A. Alhijaj, Raidah S. Khudeyer |
| Prediction of Heart Diseases Using Data Mining Algorithms | |
| Karrar Al-Jammali |
| Classifying Argument Component using Deep Learning on English Dataset | |
| William Gunawan, Derwin Suhartono |
| Optimal path planning of logistics distribution of urban and rural agricultural products from the perspective of supply chain | |
| Xiumei Wang, Xiaoli Song |
| Lifetime Maximization Using Grey Wolf Optimization Routing Protocol with statistical Technique in WSNs | |
| Baida'a Abdul Qader Khudor, Dheyaa Mezaal Hussein, Yousif Abdulwahab Kheerallah, Jawad Alkenani, Imad S. Alshawi |
| MVI and Forecast Precision Upgrade of Time Series Precipitation Information for Ubiquitous Computing | |
| Ashok Kumar Tripathi, P K Gupta, Hemraj Saini, Geetanjali Rathee |
| 3G, HSPA AND 4G LTE Network Reliability and Achievable Internet Speeds on Airborn Aircraft up to 10.000 FT Above Ground Level | |
| Ilija Subotič |
| A Review: Investigation of Augmented Reality – BIM Benefits in Design Process in Aec Industry | |
| Sadeer Hel AL-Dhaimesh, Nooriati Taib |
| User Multi Group Key Distribution Using Secret Sharing with Circulate Matrices Based on Diophantine Equation and Ecdh Key Exchange Protocol | |
| Eman Talib Alghareeb, Valeriy Osipyan |
| PrivyKG: Security and Privacy Preservation of Knowledge Graphs Using BlockChain Technology | |
| Ala Djeddai, Roufaida Khemaissia |
| Sentiment Analysis of Financial Textual data Using Machine Learning and Deep Learning Models | |
| Hero O. Ahmad, Shahla U. Umar |
| An Adaptive Two-Factor Authentication Scheme Based on the Usage of Schnorr Signcryption Algorithm | |
| Hussein Albazar, Ahmed Abdel-Wahab, Marwan Alshar'e, Abdallah Abualkishik |











