Table of Contents
Analyzing Adaptive and Non-Adaptive Online Learners on Imbalanced Evolving Streams | |
D Himaja, Dondeti Venkatesulu, Uppalapati Srilakshmi |
AI for Improving Justice Delivery: International Scenario, Potential Applications & Way Forward for India | |
Sunil Kumar Srivastava |
A Neuro-Fuzzy Predictor Trained by an Elitism Artificial Electric Field Algorithm for Estimation of Compressive Strength of Concrete Structures | |
Chaudhury Sanjeev Kumar Dash, Sarat Chandra Nayak, Ajit Kumar Behera, Satchidananda Dehuri |
Integration of EfficientNetB0 and Machine Learning for Fingerprint Classification | |
Jenan A. Alhijaj, Raidah S. Khudeyer |
Prediction of Heart Diseases Using Data Mining Algorithms | |
Karrar Al-Jammali |
Classifying Argument Component using Deep Learning on English Dataset | |
William Gunawan, Derwin Suhartono |
Optimal path planning of logistics distribution of urban and rural agricultural products from the perspective of supply chain | |
Xiumei Wang, Xiaoli Song |
Lifetime Maximization Using Grey Wolf Optimization Routing Protocol with statistical Technique in WSNs | |
Baida'a Abdul Qader Khudor, Dheyaa Mezaal Hussein, Yousif Abdulwahab Kheerallah, Jawad Alkenani, Imad S. Alshawi |
MVI and Forecast Precision Upgrade of Time Series Precipitation Information for Ubiquitous Computing | |
Ashok Kumar Tripathi, P K Gupta, Hemraj Saini, Geetanjali Rathee |
3G, HSPA AND 4G LTE Network Reliability and Achievable Internet Speeds on Airborn Aircraft up to 10.000 FT Above Ground Level | |
Ilija Subotič |
A Review: Investigation of Augmented Reality – BIM Benefits in Design Process in Aec Industry | |
Sadeer Hel AL-Dhaimesh, Nooriati Taib |
User Multi Group Key Distribution Using Secret Sharing with Circulate Matrices Based on Diophantine Equation and Ecdh Key Exchange Protocol | |
Eman Talib Alghareeb, Valeriy Osipyan |
PrivyKG: Security and Privacy Preservation of Knowledge Graphs Using BlockChain Technology | |
Ala Djeddai, Roufaida Khemaissia |
Sentiment Analysis of Financial Textual data Using Machine Learning and Deep Learning Models | |
Hero O. Ahmad, Shahla U. Umar |
An Adaptive Two-Factor Authentication Scheme Based on the Usage of Schnorr Signcryption Algorithm | |
Hussein Albazar, Ahmed Abdel-Wahab, Marwan Alshar'e, Abdallah Abualkishik |