Vol 47, No 5 (2023)

Online-only issue

Table of Contents

Analyzing Adaptive and Non-Adaptive Online Learners on Imbalanced Evolving Streams PDF
D Himaja, Dondeti Venkatesulu, Uppalapati Srilakshmi
AI for Improving Justice Delivery: International Scenario, Potential Applications & Way Forward for India PDF
Sunil Kumar Srivastava
A Neuro-Fuzzy Predictor Trained by an Elitism Artificial Electric Field Algorithm for Estimation of Compressive Strength of Concrete Structures PDF
Chaudhury Sanjeev Kumar Dash, Sarat Chandra Nayak, Ajit Kumar Behera, Satchidananda Dehuri
Integration of EfficientNetB0 and Machine Learning for Fingerprint Classification PDF
Jenan A. Alhijaj, Raidah S. Khudeyer
Prediction of Heart Diseases Using Data Mining Algorithms PDF
Karrar Al-Jammali
Classifying Argument Component using Deep Learning on English Dataset PDF
William Gunawan, Derwin Suhartono
Optimal path planning of logistics distribution of urban and rural agricultural products from the perspective of supply chain PDF
Xiumei Wang, Xiaoli Song
Lifetime Maximization Using Grey Wolf Optimization Routing Protocol with statistical Technique in WSNs PDF
Baida'a Abdul Qader Khudor, Dheyaa Mezaal Hussein, Yousif Abdulwahab Kheerallah, Jawad Alkenani, Imad S. Alshawi
MVI and Forecast Precision Upgrade of Time Series Precipitation Information for Ubiquitous Computing PDF
Ashok Kumar Tripathi, P K Gupta, Hemraj Saini, Geetanjali Rathee
3G, HSPA AND 4G LTE Network Reliability and Achievable Internet Speeds on Airborn Aircraft up to 10.000 FT Above Ground Level PDF
Ilija Subotič
A Review: Investigation of Augmented Reality – BIM Benefits in Design Process in Aec Industry PDF
Sadeer Hel AL-Dhaimesh, Nooriati Taib
User Multi Group Key Distribution Using Secret Sharing with Circulate Matrices Based on Diophantine Equation and Ecdh Key Exchange Protocol PDF
Eman Talib Alghareeb, Valeriy Osipyan
PrivyKG: Security and Privacy Preservation of Knowledge Graphs Using BlockChain Technology PDF
Ala Djeddai, Roufaida Khemaissia
Sentiment Analysis of Financial Textual data Using Machine Learning and Deep Learning Models PDF
Hero O. Ahmad, Shahla U. Umar
An Adaptive Two-Factor Authentication Scheme Based on the Usage of Schnorr Signcryption Algorithm PDF
Hussein Albazar, Ahmed Abdel-Wahab, Marwan Alshar'e, Abdallah Abualkishik

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.