


default search action
4th ICCCS 2019: Singapore
- IEEE 4th International Conference on Computer and Communication Systems, ICCCS 2019, Singapore, February 23-25, 2019. IEEE 2019, ISBN 978-1-7281-1322-7

- Ryo Watanabe, Toshifusa Sekizawa:

Counter Example Analysis of Robot Action Design for Self-localization Based on Model Checking Using Probability Removed Model. 1-4 - Masumi Iwasaki, Rentaro Yoshioka

:
Data Augmentation Based on 3D Model Data for Machine Learning. 1-4 - Can Jozef Saul, Ayse Zeynep Kamis, Egemen Sahin:

Carbon Nanotube Coordinate Prediction with Deep Learning. 1-6 - Yixiang Jiang, Yuangen Xu, Qi Xu, Limei Fang, Cong Lin:

Tobacco Industry Data Security Protection System. 1-5 - Siddharth Singh, Raaghavv Devgon:

Analysis of Encryption and Lossless Compression Techniques for Secure Data Transmission. 1-5 - Xiangxi Meng, Haoming Guo, Jianghua Lv, Shilong Ma:

Research on Data Cache Optimization Based on Time Series State Prediction. 1-5 - Yutaro Ueno, Masaomi Kimura:

Transaction Item Embedding by Maximizing A Joint Probability. 5-8 - Anunaya Inani, Chakradhar Verma, Suvrat Jain:

A Machine Learning Algorithm TsF K-NN Based on Automated Data Classification for Securing Mobile Cloud Computing Model. 9-13 - Eran Ozsarfati, Egemen Sahin, Can Jozef Saul, Alper Yilmaz:

Book Genre Classification Based on Titles with Comparative Machine Learning Algorithms. 14-20 - Rai B. Shamantha, Sweekriti M. Shetty, Prakhyath Rai:

Sentiment Analysis Using Machine Learning Classifiers: Evaluation of Performance. 21-25 - Moloud Abdar

, Elham Nasarian, Xujuan Zhou
, Ghazal Bargshady
, Vivi Nur Wijayaningrum
, Sadiq Hussain
:
Performance Improvement of Decision Trees for Diagnosis of Coronary Artery Disease Using Multi Filtering Approach. 26-30 - Wen-Chung Kuo, Tsung-Ping Liu, Chun-Cheng Wang:

Study on Android Hybrid Malware Detection Based on Machine Learning. 31-35 - Amit Kumar Das

, Aziza Ashrafi, Muktadir Ahmmad:
Joint Cognition of Both Human and Machine for Predicting Criminal Punishment in Judicial System. 36-40 - Bikang Peng, Anilkumar Kothalil Gopalakrishnan:

A Face Detection Framework Based on Deep Cascaded Full Convolutional Neural Networks. 47-51 - Ghazal Bargshady

, Jeffrey Soar, Xujuan Zhou, Ravinesh C. Deo
, Frank Whittaker, Hua Wang
:
A Joint Deep Neural Network Model for Pain Recognition from Face. 52-56 - Tayaba Abbasi, King Hann Lann, I. Ismail:

Optimal Input Selection for Recurrent Neural Network in Predictive Maintenance. 57-61 - James Arnold Nogra

, Cherry Lyn Cando Sta. Romana, Elmer A. Maravillas:
LSTM Neural Networks for Baybáyin Handwriting Recognition. 62-66 - Sheryl May D. Lainez

, Dennis B. Gonzales:
Automated Fingerlings Counting Using Convolutional Neural Network. 67-72 - Jahirul Islam, Masiath Mubassira, Md. Rakibul Islam, Amit Kumar Das

:
A Speech Recognition System for Bengali Language using Recurrent Neural Network. 73-76 - Hamed Karbasi, Mehran Jahed:

Introducing a Novel sEMG ANN-Based Regression Approach for Elbow Motion Interpolation. 77-80 - Win Win Myo, Wiphada Wettayaprasit

, Pattara Aiyarak:
Designing Classifier For Human Activity Recognition Using Artificial Neural Network. 81-85 - Phan Duy Hung

, Le Dinh Huynh
:
E-Commerce Recommendation System Using Mahout. 86-90 - Stavros Karmaniolos, Geoff Skinner

:
A Literature Review on Sentiment Analysis and its Foundational Technologies. 91-95 - A.-nanya Promkot, Somjit Arch-int, Ngamnij Arch-int:

The Personalized Traditional Medicine Recommendation System Using Ontology and Rule Inference Approach. 96-104 - Chuleepohn Yongkiatpanich, Duangdao Wichadakul

:
Extractive Text Summarization Using Ontology and Graph-Based Method. 105-110 - Darwin T. Galleta

, Jennifer T. Carpio:
Predicting Regional Development Competitiveness Index Using Naive Bayes: Basis for Recommender System. 115-119 - Myat Cho Mon Oo, Thandar Thein:

Hyperparameters Optimization in Scalable Random Forest for Big Data Analytics. 125-129 - Neha Chauhan, Tsuyoshi Isshiki, Dongju Li:

Speaker Recognition Using LPC, MFCC, ZCR Features with ANN and SVM Classifier for Large Input Database. 130-133 - Elenita T. Capariño, Ariel M. Sison, Ruji P. Medina

:
Application of the Modified Imputation Method to Missing Data to Increase Classification Performance. 134-139 - Jianhai Du, Jianghua Lv, Shiwei Gao, Ling Zhan, Qianqian Li, Qinyong Li, Shilong Ma:

Distributed File System for Spacecraft Integrated Test System. 140-144 - Xuedong Xue, Xude Cheng, Wei Peng, Fei Lu, Pin Wang:

Design and Implementation of Software Data Management on Acquiring Training System. 145-148 - Jona P. Tibay, Shaneth C. Ambat, Ace C. Lagman

:
School-Based Management Performance Efficiency Modeling and Profiling using Data Envelopment Analysis and K-Means Clustering Algorithm. 149-153 - Pei Wang, Huayu Gao, Zheqi Zhou, Meibo Lv:

A Novel Hybrid Firefly Algorithm for Global Optimization. 164-168 - Tiantian Tan, Baosheng Wang, Yong Tang, Xu Zhou:

An Improved K-means Algorithm for Test Case Optimization. 169-172 - Daranat Tansui, Arit Thammano:

An Improved Invasive Weed Algorithm with RBFNN for Optimizing Classification Problems. 173-177 - Supailin Pichai, Khamron Sunat:

Feature Selection Using GSA-BBO Hybridization Algorithm with Chaos. 178-183 - Worapoj Kreesuradej, Wannasiri Thurachon:

Discovery of Incremental Association Rules Based on a New FP-Growth Algorithm. 184-188 - Froilan E. De Guzman, Bobby D. Gerardo, Ruji P. Medina:

Implementation of Enhanced Secure Hash Algorithm Towards a Secured Web Portal. 189-192 - Jeffrey A. Clarin

, Cherry Lyn Cando Sta. Romana
, Larmie S. Feliscuzo
:
Academic Analytics: Applying C4.5 Decision Tree Algorithm in Predicting Success in the Licensure Examination of Graduates. 193-197 - Ramil G. Lumauag, Ariel M. Sison, Ruji P. Medina

:
An Enhanced Recommendation Algorithm Based on Modified User-Based Collaborative Filtering. 198-202 - Meng Sun, Lu Wang, Yiran He:

An Optimization Algorithm for Multiple Measurement Points Placement in SDN. 203-207 - Junji Qiu, Xianglin Lu, Jiayi Lin:

Optimal Selection of Cryptographic Algorithms in Blockchain Based on Fuzzy Analytic Hierarchy Process. 208-212 - Thet Thet Aung, Thi Thi Soe Nyunt, Pyae Pyae Win Cho:

Community Detection in Social Graph Using Nature-Inspired Based Artificial Bee Colony Algorithm with Crossover and Mutation. 213-217 - Alvin Jason A. Virata, Enrique D. Festijo:

Understanding the Acceptance of a Face Recognition-Based Identity Verification System: An Input to its Design and Development in the Philippines. 218-222 - Shinnosuke Kaida, Kousuke Matsushima:

Study on Behavior Prediction Using Multi-object Recognition and Map Information in Road Environment. 223-228 - Dahuang Fan, Lei Ding, Jiehang Deng:

Automatic Detection and Localization of Surface Defects for Whole Piece of Ultrahigh-definition Leather Images. 229-232 - Jihui Zhang, Yan Ding, Hong Xu, Yating Yuan:

An Optical Flow based Moving Objects Detection Algorithm for the UAV. 233-238 - Kyung-Min Kim, Jung-In Choi

:
Passengers' Gesture Recognition Model in Self-driving Vehicles : Gesture Recognition Model of the Passengers' Obstruction of the Vision of the Driver. 239-242 - Md Kafiul Islam

, Amir Rastegarnia:
Probability Mapping Based Artifact Detection and Wavelet Denoising based Artifact Removal from Scalp EEG for BCI Applications. 243-247 - Rj C. Go, Ryan Rey M. Daga, Maria Elisa B. Gerona

:
Image Analysis Protocol for Pollen Viability Identification on Selected Genotypes of Rice (Oryza sativa L.). 248-252 - Chung-Cheng Chiu, Shou-Cih Chen:

Edge Detection Algorithm Based on Texture Blocks. 253-256 - Takeshi Takeda, Kenji Hashimoto, Hiroyuki Seki:

Graph Compression by Tree Grammars and Direct Evaluation of Regular Path Query. 257-262 - Leah G. Rodriguez

, Enrico P. Chavez
:
Feature Selection for Job Matching Application using Profile Matching Model. 263-266 - Suwannee Jearasuwan, Somkiat Wangsiripitak:

Sketch Image Classification Using Component Based k-NN. 267-271 - Un-Sook Choi, Sung Jin Cho, Jin-Gyoung Kim, Sung Won Kang, Han-Doo Kim, Seok-Tae Kim:

Color Image Encryption Based on PC-MLCA and 3-D Chaotic Cat Map. 272-277 - Anupama D. Dondekar, Balwant A. Sonkamble:

Analysis of Flickr Images Using Feature Extraction Techniques. 278-282 - Sovan Tep, Isara Anantavrasilp:

Robust Image Encryption Method With Cipher Stream Chaining Process. 283-288 - Dennis M. Barrios II

, Ramil G. Lumauag, Jolitte A. Villaruz
:
Machine Vision-Based Dried Danggit Sorter. 289-293 - Watcharin Maungmai, Chaiwat Nuthong:

Vehicle Classification with Deep Learning. 294-298 - Monirul Islam Pavel, Syed Mohammad Kamruzzaman, Sadman Sakib Hasan, Saifur Rahman Sabuj

:
An IoT Based Plant Health Monitoring System Implementing Image Processing. 299-303 - Vannat Rin, Chaiwat Nuthong:

Front Moving Vehicle Detection and Tracking with Kalman Filter. 304-310 - Abdallah Tubaishat:

Security in Cloud Computing: State-of-the-Art, Key Features, Challenges, and Opportunities. 311-315 - Hamed Hamzeh

, Sofia Meacham, Botond Virginas, Kashaf Khan, Keith Phalp:
MLF-DRS: A Multi-level Fair Resource Allocation Algorithm in Heterogeneous Cloud Computing Systems. 316-321 - Michael Pendo John Mahenge, Chunlin Li, Camilius A. Sanga

:
Collaborative Mobile Edge and Cloud Computing: Tasks Unloading for Improving Users' Quality of Experience in Resource-Intensive Mobile Applications. 322-326 - Cheng-Ta Huang, Cheng-Yu Yang, Chi-Yao Weng, Yen-Wen Chen, Shiuh-Jeng Wang:

Secure Protocol for Identity-based Provable Data Possession in Cloud Storage. 327-331 - Jiakuo Zuo:

Joint Power Allocation and Beamforming in Heterogeneous Cloud Radio Access Networks. 332-336 - Hera Arif, Hassan Hajjdiab, Fatima Al Harbi, Mohammed Ghazal

:
A Comparison between Google Cloud Service and iCloud. 337-340 - Junaid Hussain Abro

, Chunlin Li, Hammad Ur-Rehman Qaiser:
Adaptive Threshold Detection Based on Current Demand for Efficient Utilization of Cloud Resources. 341-346 - Tiantian Tan, Baosheng Wang, Yong Tang, Xu Zhou:

An Improved Sequence Alignment Method for Fuzzing. 347-350 - Kebing Wang, Bianny Bian, Yan Hao:

Innovative Unit-Vector-Block Storage Format of Sparse Matrix and Vector. 351-354 - Tiantian Tan, Baosheng Wang, Yong Tang, Xu Zhou:

Crash Analysis Mechanisms in Vulnerability Mining Research. 355-359 - Rashedul Amin Tuhin, Bechitra Kumar Paul, Faria Nawrine, Mahbuba Akter, Amit Kumar Das

:
An Automated System of Sentiment Analysis from Bangla Text using Supervised Learning Techniques. 360-364 - Syeda Israt Ferdaus, Muhammad Abdullah Adnan

:
Privacy in Multi-party Computation in MapReduce. 365-369 - Hasigaowa, Siriguleng Wang:

Research on Unknown Words Processing of Mongolian-Chinese Neural Machine Translation Based on Semantic Similarity. 370-374 - Zijie Wang, Huiyou Chang:

3D Mesh Deformation Using Graph Convolution Network. 375-378 - Kleddao Satcharoen:

The Effect of Icon Entropy, Icon Concreteness and Time on Human Selection Accuracy. 379-382 - Nadeem Iqbal

, Osman Hasan
, Umair Siddique, Falah Awwad:
Formalization of Asymptotic Notations in HOL4. 383-387 - Iman Saeed, Sarah Baras, Hassan Hajjdiab:

Security and Privacy of AWS S3 and Azure Blob Storage Services. 388-394 - Masafumi Kosugi, Keisuke Utsu, Makoto Tomita

, Sachi Tajima, Yoshitaka Kajita, Yoshiro Yamamoto
, Osamu Uchida:
A Twitter-Based Disaster Information Sharing System. 395-399 - Rubab Hafeez, Zohaib Amjad Khan, Osman Hasan

:
A Generic Virtual Reality Training Simulator for Intracytoplasmic Sperm Injection. 400-403 - Geoff Skinner, Toby Walmsley:

Artificial Intelligence and Deep Learning in Video Games A Brief Review. 404-408 - Abid Jamil, Zeshan Murtza, Muhammad Kashif Nazir, Muhammad Waseem, Zikra Ghulam, Rao Umer Farooq:

A Generic Formal Specification of an Infinite Runner Games for Handheld Devices Using Z-Notation. 409-413 - Mary Ann F. Quioc, Shaneth C. Ambat, Ace C. Lagman

:
Medical Cases Forecasting for the Development of Resource Allocation Recommender System. 414-418 - Yasheni Nair Indran Nair, Feninferina Azman, Fiza Abdul Rahim

, Lim Kok Cheng:
Endure: Augmented Reality Fitness Mobile Application. 419-424 - Chen peng, Yan Jin Li:

Visualization of Virtual Scene Based on HTC Vive Interactive System. 425-429 - Youki Shiraishi, Akiko Manada, Yuzo Taenaka, Youki Kadobayashi:

A Method for Designing Proximity-Aware Regular Graph-Based Structured Overlay Networks. 430-435 - Baohua Zhao, Ningyu An, Xiao Liang, Chunhui Ren, Zhihao Wang:

Multi-level Anti-buffering Mechanism Based on Embedded Safety Equipment in Power Grid Industry. 436-439 - Szu-Chin Hsu, Cheng-Ta Huang, Chi-Yao Weng, Shiuh-Jeng Wang:

A Logging-in Scheme in Virtual Keyboard Protection from Shoulder Surfing and Screenshot Capturing. 440-444 - Yusuke Nozaki, Masaya Yoshikawa:

Secret Sharing Schemes Based Secure Authentication for Physical Unclonable Function. 445-449 - Xiujuan Wang, Chenxi Zhang, Kangfeng Zheng, Haoyang Tang, Yuanrui Tao:

Detecting Spear-phishing Emails Based on Authentication. 450-456 - Meelis Kitsing

:
The Road Not Taken: From Digital Networks to Networked Governance. 457-462 - Grace G. Boqueo, Liriel Iris O. Daya, Mark Erdan II S. Eugenio, Akissa G. Lumagas, Froilan E. De Guzman:

Extensive Assessment of Various Network Interruption Tools. 463-467 - Sumeth Sirijaroensombat, Phaderm Nangsue, Chaodit Aswakul

:
Development of Software-Defined Mesh Network Emulator Testbed for DDoS Defence Study. 468-472 - Vishal Gupta, Amrit Kochar, Shail Saharan, Rakhee Kulshrestha

:
DNS Amplification Based DDoS Attacks in SDN Environment: Detection and Mitigation. 473-478 - Jayvee Christopher N. Vibar, Ruji P. Medina

, Ariel M. Sison:
ERC5a - An Enhanced RC5 Algorithm on Bit Propagation in the Encryption Function. 479-482 - Jiyan Huang, Ying Zhang, Shan Luo:

Analysis of Pilot-Aided Channel Estimation in OFDM System under Phase Noise. 483-487 - Bijaya Paudel, Sina Vafi:

An Unequal Error Protection of Quasi-Cyclic Low Density Parity Check (QC-LDPC) Codes Based on Combinatorial Designs. 488-492 - Kensuke Noda, Yoshihiro Ito:

Proposal of Multi-path TCP Packet Scheduler to Adjust Trade-off between QoS Fluctuation and throughput for WebQoE Improvement. 493-496 - Mohammad Abu Hanif, Sina Vafi

:
An Efficient Serially Concatenated Polar Code with Unequal Error Protection Property. 497-501 - Natsu Shoji, Takeshi Sugawara

, Mitsugu Iwamoto, Kazuo Sakiyama:
An Abstraction Model for 1-bit Probing Attack on Block Ciphers. 502-506 - Ryochi Kataoka, Akira Yamaguchi, Hiroyuki Shinbo:

Sidelink Grouping Method for Multicasting D2D Signaling Messages with Considerations of Sidelink Transmission Power. 507-511 - Jeerasuda Koseeyaporn, Sakkarin Sinchai, Paramote Wardkein:

Performance of Frequency Translation in Separating a Photoplethysmographic Signal from an Additive Motion Artifact. 512-516 - Wei Wang, Ming Zhang, Bobin Yao, Qinye Yin:

A Fast Peak Searching Method for DOA Estimation Based on CTA. 517-521 - Mridula Korde:

Power Allocation in MIMO Systems Using Game Theory. 522-526 - Gunasekaran Raja

, Aishwarya Ganapathisubramaniyan, Gayatri Iyer Sethuraman, Sajjad Hussain Chauhdary
, Ali Hassan
:
Secured LTE-Wi-Fi Offloading Using RTT Based Evading Malicious Access Point (EMAP) Algorithm. 527-532 - Wei Wei, Junghwan Kim:

Performance Analysis of Circle-Constellation-Based M-DCSK Modulation for Broadcasting Application with Enhanced Reliability by LDPC. 533-537 - Pavan Kumar Mishra, Ashish Kumar Mishra, Sarsij Tripathi:

Relay Selection Scheme for Dynamic Network Scenario in Multi-hop D2D Communication. 538-542 - Bruno Dzogovic

, Bernardo Santos
, Josef Noll, Van Thuan Do, Boning Feng, Thanh Van Do:
Enabling Smart Home with 5G Network Slicing. 543-548 - Jie Yang, Li Feng, Hong Liang

, Tong Jin, Fangxin Xu:
A Novel SDN Design to Support SIC for WiFi Networks. 549-553 - Mengyang Liu, Hongjuan Wang, Yeli Li, Yuning Bian:

Synchronization Simulation and Analysis of OFDM Wireless Communication Technology. 554-558 - Fuxiao Gao, Yi Zhou, Xiaoyong Ma, Tingting Yang, Nan Cheng, Ning Lu:

Coverage-maximization and Energy-efficient Drone Small Cell Deployment in Aerial-Ground Collaborative Vehicular Networks. 559-564 - Moirangthem Marjit Singh

, Jyotsna Kumar Mandal
:
Gray Hole Attack Analysis in AODV Based Mobile Adhoc Network with Reliability Metric. 565-569 - Tengfei Lian, Yi Zhou, Xianwei Wang, Nan Cheng, Ning Lu:

Predictive Task Migration Modeling in Software Defined Vehicular Networks. 570-574 - Xiaotao Xu, Fan Wu, Yonghong Gao, Yichen Song:

Research on Information Transmission Mechanism of Visible Optical Communication System Based on CLORP. 575-579 - Yeongrok Lee, Sung Sik Nam, Young-Chai Ko:

Implementation of Multiple Signal Classification and Triangulation for Localization of Signal Using Universal Software Radio Peripheral. 580-584 - Omar A. Saraereh:

Microstrip Wearable Dual-Band Antenna Design for ON Body Wireless Communications. 585-589 - Syeda Iffat Naqvi

, Muhammad Awais Azam, Yasar Amin
, Farzana Arshad, Jonathan Loo
, Hannu Tenhunen:
Tri-Band Antenna Array with Defected Ground Structure for mm-Wave 5G Applications. 590-593 - Zain Ul Islam

, Zeeshan Ahmed, Iram Nadeem, Faiz K. Lodhi, Ferdows B. Zarrabi, Muhammad Azam:
Spiral Antenna with CPW Feed based on Composite Right/Left-Handed for Ultra Wide Band & Low Frequency Operation. 594-598 - Pingping Tang, Yuning Dong, Shiwen Mao:

Soft Aggregation of Multimedia Flows Based on QoS Classes. 599-603 - Yunus Natanael Pelawi, Irwansyah, Monika Pretty Aprilia:

Implementation of Marketing Communication Strategy in Attention, Interest, Search, Action, and Share (AISAS) Model through Vlog. 604-607 - Eun-bin Ahn, A.-Young Kim, Kwang-deok Seo:

Hybird Media Synchronization Method for Hybrid Media Delivery Service Using MMT Protocol. 608-611 - Muhammad Mukhsin Sultoni, Irwansyah, Ayu Rahma Haninda, Monika Pretty Aprilia:

Digital Content by Online Media and Its Effects on Brand Trust, Brand Credibility, Brand Commitment, and Brand Advocacy (Case on Instagram Account Tirto.id). 612-617 - Sundar Anand

, Annie Johnson
, Priyanka Mathikshara, Karthik R
:
Low Power Real Time GPS Tracking Enabled with RTOS and Serverless Architecture. 618-623 - Mais A. Khalil, David R. Siddle

:
A Performance Analysis of the Data Gathering Model for Unslotted CSMA/CA in Home Automation Environment. 624-629 - Navinesshani Permal

, Thiviya Barathi Raja Segaran, Renuga Verayiah
, Farrukh Hafiz Nagi, Agileswari K. Ramasamy, Sanuri Ishak:
Hardware Implementation of Beam Formed Ultrasonic Bird Deterrent System. 630-633 - Pallavi Yarde

, Sumit Srivastava
, Kumkum Garg:
A Delay Abridged Judicious Cross-Layer Routing Protocol for Wireless Sensor Network. 634-638 - Pramod Kumar Srivastava, Satya Prakash Pandey, Nishu Gupta, Santar Pal Singh, Rudra Pratap Ojha

:
Modeling and Analysis of Antimalware Effect on Wireless Sensor Network. 639-643 - Yi-Wun Lee, Feng-Tsun Chien:

Vehicles Clustering for Low-Latency Message Dissemination in VANET. 644-649 - Weiwei Zhou, Ziyuan Tong, Zhao Yang Dong

, Yu Wang
:
LoRa-Hybrid: A LoRaWAN Based Multihop Solution for Regional Microgrid. 650-654 - Kuo-Shu Huang:

An Enhanced TR-069 Firmware Upgrade Method of Wi-Fi Mesh System. 655-659 - Zar Zar Oo, Sabai Phyu:

Microclimate Prediction Using Cloud Centric Model Based on IoT Technology for Sustainable Agriculture. 660-663 - Phan Duy Hung

, Bui Trong Vinh:
Vulnerabilities in IoT Devices with Software-Defined Radio. 664-668 - Monira Mukta, Samia Islam, Surajit Das Barman, Ahmed Wasif Reza

, M. Saddam Hossain Khan:
Iot based Smart Water Quality Monitoring System. 669-673 - Hsiao-Tzu Hsu, Gwo-Jia Jong, Jhih-Hao Chen, Ciou-Guo Jhe:

Improve Iot Security System Of Smart-Home By Using Support Vector Machine. 674-677 - Ekkachan Rattanalerdnusorn, Phithak Thaenkaew, Chalee Vorakulpipat:

Security Implementation For Authentication In Iot Environments. 678-681 - Thanh Nha Dang, Huan Minh Vo:

Advanced AES Algorithm Using Dynamic Key in the Internet of Things System. 682-686 - Ahammad Karim, Muhammad Abdullah Adnan:

An OpenID Based Authentication Service Mechanisms for Internet of Things. 687-692 - Yixiang Jiang, Liujing Wang, Xun Zhang:

Tobacco System Industrial Control System Security. 693-696 - Prayushi Faldu, Nishant Doshi

, Reema Patel
:
Real Time Adaptive Traffic Control System : A Hybrid Approach. 697-701 - Noli Mark A. Paala, Nikko Marc M. Garcia, Rojimar A. Supetran, Ma. Erica Lyn B. Fontamillas:

Android Controlled Lawn Mower Using Bluetooth and WIFI Connection. 702-706 - Xijiang Wang, Daming Zhou

, Ke Zhang:
Application of Active Disturbance Rejection Control Technology in Missile with Thrust Vector Control. 707-711 - Kaori Iwata, Yoshihiro Ito:

Study on Depending on the OpenFlow Controller Placement of Multi-pathization Method. 712-715 - Xiaoyan Zhang, Qiuqiu Wang, Kai Kang:

Research on Access Control Model in Mobile Environment. 716-720 - Pallavi Ram Umare, Shraddha Ganeshlal Jayswal, Shraddha Rajendra Tambakhe, Prathamesh Dnyaneshwar Upadhye, Nilesh Dnyaneshwar Gulhane:

Smart Solution for Traffic Control. 721-724 - Arjun Pardasani, Prithviraj N. Indi, Sashwata Banerjee, Aditya Kamal, Vaibhav Garg:

Smart Assistive Navigation Devices for Visually Impaired People. 725-729 - Hasventhran Baskaran, Rachel Lum Mei Leng, Fiza Abdul Rahim

, Mohd Ezanee Rusli
:
Smart Vision: Assistive Device for the Visually Impaired Community U sing Online Computer Vision Service. 730-734 - Khan Mohammad Habibullah, Ahashan Alam, Swapnil Saha, Al-Amin, Amit Kumar Das

:
A Driver-Centric Carpooling: Optimal Route-Finding Model Using Heuristic Multi-Objective Search. 735-739 - Lin Cui, Bao-Zhu Li:

Method of Road Condition Information Based on Time Decay Adaptive Fitting. 740-745 - Dawn Iris Calibo

, Melvin A. Ballera
:
Variable Selection for Credit Risk Scoring on Loan Performance Using Regression Analysis. 746-750 - Feni Wahyuni, Irwansyah, Monika Pretty Aprilia:

The Process of Innovation Adoption by the Use of E-Commerce Marketing Application : Case Study on Indonesia Small Medium Enterprise Community. 751-756 - Thaloengpattarakoon Sanboon, Kamol Keatruangkamala, Saichon Jaiyen:

A Deep Learning Model for Predicting Buy and Sell Recommendations in Stock Exchange of Thailand using Long Short-Term Memory. 757-760 - Dawn Iris Calibo

, Jonathan M. Caballero
, Alvin Jason A. Virata:
M-Commerce Model: An Applied Business Transformation Framework for Tourism Industry. 761-765

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














