Abstract is missing.
- Data Augmentation Based on 3D Model Data for Machine LearningMasumi Iwasaki, Rentaro Yoshioka. 1-4 [doi]
- Tobacco Industry Data Security Protection SystemYixiang Jiang, Yuangen Xu, Qi Xu, Limei Fang, Cong Lin. 1-5 [doi]
- Analysis of Encryption and Lossless Compression Techniques for Secure Data TransmissionSiddharth Singh, Raaghavv Devgon. 1-5 [doi]
- Research on Data Cache Optimization Based on Time Series State PredictionXiangxi Meng, Haoming Guo, Jianghua Lv, Shilong Ma. 1-5 [doi]
- Counter Example Analysis of Robot Action Design for Self-localization Based on Model Checking Using Probability Removed ModelRyo Watanabe, Toshifusa Sekizawa. 1-4 [doi]
- Carbon Nanotube Coordinate Prediction with Deep LearningCan Jozef Saul, Ayse Zeynep Kamis, Egemen Sahin. 1-6 [doi]
- Transaction Item Embedding by Maximizing A Joint ProbabilityYutaro Ueno, Masaomi Kimura. 5-8 [doi]
- A Machine Learning Algorithm TsF K-NN Based on Automated Data Classification for Securing Mobile Cloud Computing ModelAnunaya Inani, Chakradhar Verma, Suvrat Jain. 9-13 [doi]
- Book Genre Classification Based on Titles with Comparative Machine Learning AlgorithmsEran Ozsarfati, Egemen Sahin, Can Jozef Saul, Alper Yilmaz. 14-20 [doi]
- Sentiment Analysis Using Machine Learning Classifiers: Evaluation of PerformanceRai B. Shamantha, Sweekriti M. Shetty, Prakhyath Rai. 21-25 [doi]
- Performance Improvement of Decision Trees for Diagnosis of Coronary Artery Disease Using Multi Filtering ApproachMoloud Abdar, Elham Nasarian, Xujuan Zhou, Ghazal Bargshady, Vivi Nur Wijayaningrum, Sadiq Hussain. 26-30 [doi]
- Study on Android Hybrid Malware Detection Based on Machine LearningWen-Chung Kuo, Tsung-Ping Liu, Chun-Cheng Wang. 31-35 [doi]
- Joint Cognition of Both Human and Machine for Predicting Criminal Punishment in Judicial SystemAmit Kumar Das, Aziza Ashrafi, Muktadir Ahmmad. 36-40 [doi]
- A Face Detection Framework Based on Deep Cascaded Full Convolutional Neural NetworksBikang Peng, Anilkumar Kothalil Gopalakrishnan. 47-51 [doi]
- A Joint Deep Neural Network Model for Pain Recognition from FaceGhazal Bargshady, Jeffrey Soar, Xujuan Zhou, Ravinesh C. Deo, Frank Whittaker, Hua Wang 0002. 52-56 [doi]
- Optimal Input Selection for Recurrent Neural Network in Predictive MaintenanceTayaba Abbasi, King Hann Lann, I. Ismail. 57-61 [doi]
- LSTM Neural Networks for Baybáyin Handwriting RecognitionJames Arnold Nogra, Cherry Lyn Sta Romana, Elmer A. Maravillas. 62-66 [doi]
- Automated Fingerlings Counting Using Convolutional Neural NetworkSheryl May D. Lainez, Dennis B. Gonzales. 67-72 [doi]
- A Speech Recognition System for Bengali Language using Recurrent Neural NetworkJahirul Islam, Masiath Mubassira, Md. Rakibul Islam, Amit Kumar Das. 73-76 [doi]
- Introducing a Novel sEMG ANN-Based Regression Approach for Elbow Motion InterpolationHamed Karbasi, Mehran Jahed. 77-80 [doi]
- Designing Classifier For Human Activity Recognition Using Artificial Neural NetworkWin Win Myo, Wiphada Wettayaprasit, Pattara Aiyarak. 81-85 [doi]
- E-Commerce Recommendation System Using MahoutPhan Duy Hung, Le Dinh Huynh. 86-90 [doi]
- A Literature Review on Sentiment Analysis and its Foundational TechnologiesStavros Karmaniolos, Geoff Skinner. 91-95 [doi]
- The Personalized Traditional Medicine Recommendation System Using Ontology and Rule Inference ApproachA.-nanya Promkot, Somjit Arch-int, Ngamnij Arch-int. 96-104 [doi]
- Extractive Text Summarization Using Ontology and Graph-Based MethodChuleepohn Yongkiatpanich, Duangdao Wichadakul. 105-110 [doi]
- Predicting Regional Development Competitiveness Index Using Naive Bayes: Basis for Recommender SystemDarwin T. Galleta, Jennifer T. Carpio. 115-119 [doi]
- Hyperparameters Optimization in Scalable Random Forest for Big Data AnalyticsMyat Cho Mon Oo, Thandar Thein. 125-129 [doi]
- Speaker Recognition Using LPC, MFCC, ZCR Features with ANN and SVM Classifier for Large Input DatabaseNeha Chauhan, Tsuyoshi Isshiki, Dongju Li. 130-133 [doi]
- Application of the Modified Imputation Method to Missing Data to Increase Classification PerformanceElenita T. Capariño, Ariel M. Sison, Ruji P. Medina. 134-139 [doi]
- Distributed File System for Spacecraft Integrated Test SystemJianhai Du, Jianghua Lv, Shiwei Gao, Ling Zhan, Qianqian Li, Qinyong Li, Shilong Ma. 140-144 [doi]
- Design and Implementation of Software Data Management on Acquiring Training SystemXuedong Xue, Xude Cheng, Wei Peng, Fei Lu, Pin Wang. 145-148 [doi]
- School-Based Management Performance Efficiency Modeling and Profiling using Data Envelopment Analysis and K-Means Clustering AlgorithmJona P. Tibay, Shaneth C. Ambat, Ace C. Lagman. 149-153 [doi]
- A Novel Hybrid Firefly Algorithm for Global OptimizationPei Wang, Huayu Gao, Zheqi Zhou, Meibo Lv. 164-168 [doi]
- An Improved K-means Algorithm for Test Case OptimizationTiantian Tan, Baosheng Wang, Yong Tang, Xu Zhou. 169-172 [doi]
- An Improved Invasive Weed Algorithm with RBFNN for Optimizing Classification ProblemsDaranat Tansui, Arit Thammano. 173-177 [doi]
- Feature Selection Using GSA-BBO Hybridization Algorithm with ChaosSupailin Pichai, Khamron Sunat. 178-183 [doi]
- Discovery of Incremental Association Rules Based on a New FP-Growth AlgorithmWorapoj Kreesuradej, Wannasiri Thurachon. 184-188 [doi]
- Implementation of Enhanced Secure Hash Algorithm Towards a Secured Web PortalFroilan E. De Guzman, Bobby D. Gerardo, Ruji P. Medina. 189-192 [doi]
- Academic Analytics: Applying C4.5 Decision Tree Algorithm in Predicting Success in the Licensure Examination of GraduatesJeffrey A. Clarin, Cherry Lyn C. Sta. Romana, Larmie S. Feliscuzo. 193-197 [doi]
- An Enhanced Recommendation Algorithm Based on Modified User-Based Collaborative FilteringRamil G. Lumauag, Ariel M. Sison, Ruji P. Medina. 198-202 [doi]
- An Optimization Algorithm for Multiple Measurement Points Placement in SDNMeng Sun 0005, Lu Wang, Yiran He. 203-207 [doi]
- Optimal Selection of Cryptographic Algorithms in Blockchain Based on Fuzzy Analytic Hierarchy ProcessJunji Qiu, Xianglin Lu, Jiayi Lin. 208-212 [doi]
- Community Detection in Social Graph Using Nature-Inspired Based Artificial Bee Colony Algorithm with Crossover and MutationThet Thet Aung, Thi Thi Soe Nyunt, Pyae Pyae Win Cho. 213-217 [doi]
- Understanding the Acceptance of a Face Recognition-Based Identity Verification System: An Input to its Design and Development in the PhilippinesAlvin Jason A. Virata, Enrique D. Festijo. 218-222 [doi]
- Study on Behavior Prediction Using Multi-object Recognition and Map Information in Road EnvironmentShinnosuke Kaida, Kousuke Matsushima. 223-228 [doi]
- Automatic Detection and Localization of Surface Defects for Whole Piece of Ultrahigh-definition Leather ImagesDahuang Fan, Lei Ding, Jiehang Deng. 229-232 [doi]
- An Optical Flow based Moving Objects Detection Algorithm for the UAVJihui Zhang, Yan Ding, Hong Xu, Yating Yuan. 233-238 [doi]
- Passengers' Gesture Recognition Model in Self-driving Vehicles : Gesture Recognition Model of the Passengers' Obstruction of the Vision of the DriverKyung Min Kim, Jung-In Choi. 239-242 [doi]
- Probability Mapping Based Artifact Detection and Wavelet Denoising based Artifact Removal from Scalp EEG for BCI ApplicationsMd Kafiul Islam, Amir Rastegarnia. 243-247 [doi]
- Image Analysis Protocol for Pollen Viability Identification on Selected Genotypes of Rice (Oryza sativa L.)Rj C. Go, Ryan Rey M. Daga, Maria Elisa B. Gerona. 248-252 [doi]
- Edge Detection Algorithm Based on Texture BlocksChung-Cheng Chiu, Shou-Cih Chen. 253-256 [doi]
- Graph Compression by Tree Grammars and Direct Evaluation of Regular Path QueryTakeshi Takeda, Kenji Hashimoto, Hiroyuki Seki. 257-262 [doi]
- Feature Selection for Job Matching Application using Profile Matching ModelLeah G. Rodriguez, Enrico P. Chavez. 263-266 [doi]
- Sketch Image Classification Using Component Based k-NNSuwannee Jearasuwan, Somkiat Wangsiripitak. 267-271 [doi]
- Color Image Encryption Based on PC-MLCA and 3-D Chaotic Cat MapUn-Sook Choi, Sung Jin Cho 0001, Jin-Gyoung Kim, Sung Won Kang, Han-Doo Kim, Seok Tae Kim. 272-277 [doi]
- Analysis of Flickr Images Using Feature Extraction TechniquesAnupama D. Dondekar, Balwant A. Sonkamble. 278-282 [doi]
- Robust Image Encryption Method With Cipher Stream Chaining ProcessSovan Tep, Isara Anantavrasilp. 283-288 [doi]
- Machine Vision-Based Dried Danggit SorterDennis M. Barrios II, Ramil G. Lumauag, Jolitte A. Villaruz. 289-293 [doi]
- Vehicle Classification with Deep LearningWatcharin Maungmai, Chaiwat Nuthong. 294-298 [doi]
- An IoT Based Plant Health Monitoring System Implementing Image ProcessingMonirul Islam Pavel, Syed Mohammad Kamruzzaman, Sadman Sakib Hasan, Saifur Rahman Sabuj. 299-303 [doi]
- Front Moving Vehicle Detection and Tracking with Kalman FilterVannat Rin, Chaiwat Nuthong. 304-310 [doi]
- Security in Cloud Computing: State-of-the-Art, Key Features, Challenges, and OpportunitiesAbdallah Tubaishat. 311-315 [doi]
- MLF-DRS: A Multi-level Fair Resource Allocation Algorithm in Heterogeneous Cloud Computing SystemsHamed Hamzeh, Sofia Meacham, Botond Virginas, Kashaf Khan, Keith Phalp. 316-321 [doi]
- Collaborative Mobile Edge and Cloud Computing: Tasks Unloading for Improving Users' Quality of Experience in Resource-Intensive Mobile ApplicationsMichael P. J. Mahenge, ChunLin Li, Camilius A. Sanga. 322-326 [doi]
- Secure Protocol for Identity-based Provable Data Possession in Cloud StorageCheng-Ta Huang, Cheng-Yu Yang, Chi-Yao Weng, Yen-Wen Chen, Shiuh-Jeng Wang. 327-331 [doi]
- Joint Power Allocation and Beamforming in Heterogeneous Cloud Radio Access NetworksJiakuo Zuo. 332-336 [doi]
- A Comparison between Google Cloud Service and iCloudHera Arif, Hassan Hajjdiab, Fatima Al Harbi, Mohammed Ghazal. 337-340 [doi]
- Adaptive Threshold Detection Based on Current Demand for Efficient Utilization of Cloud ResourcesAbro Junaid hussain, Li Chunlin, Hammad Ur-Rehman Qaiser. 341-346 [doi]
- An Improved Sequence Alignment Method for FuzzingTiantian Tan, Baosheng Wang, Yong Tang, Xu Zhou. 347-350 [doi]
- Innovative Unit-Vector-Block Storage Format of Sparse Matrix and VectorKebing Wang, Bianny Bian, Yan Hao. 351-354 [doi]
- Crash Analysis Mechanisms in Vulnerability Mining ResearchTiantian Tan, Baosheng Wang, Yong Tang, Xu Zhou. 355-359 [doi]
- An Automated System of Sentiment Analysis from Bangla Text using Supervised Learning TechniquesRashedul Amin Tuhin, Bechitra Kumar Paul, Faria Nawrine, Mahbuba Akter, Amit Kumar Das. 360-364 [doi]
- Privacy in Multi-party Computation in MapReduceSyeda Israt Ferdaus, Muhammad Abdullah Adnan. 365-369 [doi]
- Research on Unknown Words Processing of Mongolian-Chinese Neural Machine Translation Based on Semantic SimilarityHasigaowa, Siriguleng Wang. 370-374 [doi]
- 3D Mesh Deformation Using Graph Convolution NetworkZijie Wang, HuiYou Chang. 375-378 [doi]
- The Effect of Icon Entropy, Icon Concreteness and Time on Human Selection AccuracyKleddao Satcharoen. 379-382 [doi]
- Formalization of Asymptotic Notations in HOL4Nadeem Iqbal, Osman Hasan, Umair Siddique, Falah Awwad. 383-387 [doi]
- Security and Privacy of AWS S3 and Azure Blob Storage ServicesIman Saeed, Sarah Baras, Hassan Hajjdiab. 388-394 [doi]
- A Twitter-Based Disaster Information Sharing SystemMasafumi Kosugi, Keisuke Utsu, Makoto Tomita, Sachi Tajima, Yoshitaka Kajita, Yoshiro Yamamoto, Osamu Uchida. 395-399 [doi]
- A Generic Virtual Reality Training Simulator for Intracytoplasmic Sperm InjectionRubab Hafeez, Zohaib Amjad Khan, Osman Hasan. 400-403 [doi]
- Artificial Intelligence and Deep Learning in Video Games A Brief ReviewGeoff Skinner, Toby Walmsley. 404-408 [doi]
- A Generic Formal Specification of an Infinite Runner Games for Handheld Devices Using Z-NotationAbid Jamil, Zeshan Murtza, Muhammad Kashif Nazir, Muhammad Waseem, Zikra Ghulam, Rao Umer Farooq. 409-413 [doi]
- Medical Cases Forecasting for the Development of Resource Allocation Recommender SystemMary Ann F. Quioc, Shaneth C. Ambat, Ace C. Lagman. 414-418 [doi]
- Endure: Augmented Reality Fitness Mobile ApplicationYasheni Nair Indran Nair, Feninferina Azman, Fiza Abdul Rahim, Lim Kok Cheng. 419-424 [doi]
- Visualization of Virtual Scene Based on HTC Vive Interactive SystemChen Peng, Yan Jin Li. 425-429 [doi]
- A Method for Designing Proximity-Aware Regular Graph-Based Structured Overlay NetworksYouki Shiraishi, Akiko Manada, Yuzo Taenaka, Youki Kadobayashi. 430-435 [doi]
- Multi-level Anti-buffering Mechanism Based on Embedded Safety Equipment in Power Grid IndustryBaohua Zhao, Ningyu An, Xiao Liang, Chunhui Ren, ZhiHao Wang. 436-439 [doi]
- A Logging-in Scheme in Virtual Keyboard Protection from Shoulder Surfing and Screenshot CapturingSzu-Chin Hsu, Cheng-Ta Huang, Chi-Yao Weng, Shiuh-Jeng Wang. 440-444 [doi]
- Secret Sharing Schemes Based Secure Authentication for Physical Unclonable FunctionYusuke Nozaki, Masaya Yoshikawa. 445-449 [doi]
- Detecting Spear-phishing Emails Based on AuthenticationXiujuan Wang, Chenxi Zhang, Kangfeng Zheng, Haoyang Tang, Yuanrui Tao. 450-456 [doi]
- The Road Not Taken: From Digital Networks to Networked GovernanceMeelis Kitsing. 457-462 [doi]
- Extensive Assessment of Various Network Interruption ToolsGrace G. Boqueo, Liriel Iris O. Daya, Mark Erdan II S. Eugenio, Akissa G. Lumagas, Froilan E. De Guzman. 463-467 [doi]
- Development of Software-Defined Mesh Network Emulator Testbed for DDoS Defence StudySumeth Sirijaroensombat, Phaderm Nangsue, Chaodit Aswakul. 468-472 [doi]
- DNS Amplification Based DDoS Attacks in SDN Environment: Detection and MitigationVishal Gupta, Amrit Kochar, Shail Saharan, Rakhee Kulshrestha. 473-478 [doi]
- ERC5a - An Enhanced RC5 Algorithm on Bit Propagation in the Encryption FunctionJayvee Christopher N. Vibar, Ruji P. Medina, Ariel M. Sison. 479-482 [doi]
- Analysis of Pilot-Aided Channel Estimation in OFDM System under Phase NoiseJiyan Huang, Ying Zhang 0024, Shan Luo. 483-487 [doi]
- An Unequal Error Protection of Quasi-Cyclic Low Density Parity Check (QC-LDPC) Codes Based on Combinatorial DesignsBijaya Paudel, Sina Vafi. 488-492 [doi]
- Proposal of Multi-path TCP Packet Scheduler to Adjust Trade-off between QoS Fluctuation and throughput for WebQoE ImprovementKensuke Noda, Yoshihiro Ito. 493-496 [doi]
- An Efficient Serially Concatenated Polar Code with Unequal Error Protection PropertyMohammad Abu Hanif, Sina Vafi. 497-501 [doi]
- An Abstraction Model for 1-bit Probing Attack on Block CiphersNatsu Shoji, Takeshi Sugawara, Mitsugu Iwamoto, Kazuo Sakiyama. 502-506 [doi]
- Sidelink Grouping Method for Multicasting D2D Signaling Messages with Considerations of Sidelink Transmission PowerRyochi Kataoka, Akira Yamaguchi, Hiroyuki Shinbo. 507-511 [doi]
- Performance of Frequency Translation in Separating a Photoplethysmographic Signal from an Additive Motion ArtifactJeerasuda Koseeyaporn, Sakkarin Sinchai, Paramote Wardkein. 512-516 [doi]
- A Fast Peak Searching Method for DOA Estimation Based on CTAWei Wang, Ming Zhang, Bobin Yao, Qinye Yin. 517-521 [doi]
- Power Allocation in MIMO Systems Using Game TheoryMridula Korde. 522-526 [doi]
- Secured LTE-Wi-Fi Offloading Using RTT Based Evading Malicious Access Point (EMAP) AlgorithmGunasekaran Raja, Aishwarya Ganapathisubramaniyan, Gayatri Iyer Sethuraman, Sajjad Hussain Chauhdary, Ali Hassan 0004. 527-532 [doi]
- Performance Analysis of Circle-Constellation-Based M-DCSK Modulation for Broadcasting Application with Enhanced Reliability by LDPCWei Wei, Junghwan Kim. 533-537 [doi]
- Relay Selection Scheme for Dynamic Network Scenario in Multi-hop D2D CommunicationPavan Kumar Mishra, Ashish Kumar Mishra, Sarsij Tripathi. 538-542 [doi]
- Enabling Smart Home with 5G Network SlicingBruno Dzogovic, Bernardo Santos 0001, Josef Noll, Van Thuan Do, Boning Feng, Thanh Van Do. 543-548 [doi]
- A Novel SDN Design to Support SIC for WiFi NetworksJie Yang, Li Feng, Hong Liang, Tong Jin, Fangxin Xu. 549-553 [doi]
- Synchronization Simulation and Analysis of OFDM Wireless Communication TechnologyMengyang Liu, Hongjuan Wang, Yeli Li, Yuning Bian. 554-558 [doi]
- Coverage-maximization and Energy-efficient Drone Small Cell Deployment in Aerial-Ground Collaborative Vehicular NetworksFuxiao Gao, Yi Zhou, Xiaoyong Ma, Tingting Yang 0001, Nan Cheng, Ning Lu 0001. 559-564 [doi]
- Gray Hole Attack Analysis in AODV Based Mobile Adhoc Network with Reliability MetricMoirangthem Marjit Singh, Jyotsna Kumar Mandal. 565-569 [doi]
- Predictive Task Migration Modeling in Software Defined Vehicular NetworksTengfei Lian, Yi Zhou, Xianwei Wang, Nan Cheng, Ning Lu 0001. 570-574 [doi]
- Research on Information Transmission Mechanism of Visible Optical Communication System Based on CLORPXiaotao Xu, Fan Wu, Yonghong Gao, Yichen Song. 575-579 [doi]
- Implementation of Multiple Signal Classification and Triangulation for Localization of Signal Using Universal Software Radio PeripheralYeongrok Lee, Sung Sik Nam, Young-Chai Ko. 580-584 [doi]
- Microstrip Wearable Dual-Band Antenna Design for ON Body Wireless CommunicationsOmar A. Saraereh. 585-589 [doi]
- Tri-Band Antenna Array with Defected Ground Structure for mm-Wave 5G ApplicationsSyeda Iffat Naqvi, Muhammad Awais Azam, Yasar Amin, Farzana Arshad, Jonathan Loo, Hannu Tenhunen. 590-593 [doi]
- Spiral Antenna with CPW Feed based on Composite Right/Left-Handed for Ultra Wide Band & Low Frequency OperationZain Ul Islam, Zeeshan Ahmed, Iram Nadeem, Faiz K. Lodhi, Ferdows B. Zarrabi, Muhammad Azam. 594-598 [doi]
- Soft Aggregation of Multimedia Flows Based on QoS ClassesPingping Tang, Yuning Dong, Shiwen Mao. 599-603 [doi]
- Implementation of Marketing Communication Strategy in Attention, Interest, Search, Action, and Share (AISAS) Model through VlogYunus Natanael Pelawi, Irwansyah, Monika Pretty Aprilia. 604-607 [doi]
- Hybird Media Synchronization Method for Hybrid Media Delivery Service Using MMT ProtocolEun-bin Ahn, A.-Young Kim, Kwang-deok Seo. 608-611 [doi]
- Digital Content by Online Media and Its Effects on Brand Trust, Brand Credibility, Brand Commitment, and Brand Advocacy (Case on Instagram Account Tirto.id)Muhammad Mukhsin Sultoni, Irwansyah, Ayu Rahma Haninda, Monika Pretty Aprilia. 612-617 [doi]
- Low Power Real Time GPS Tracking Enabled with RTOS and Serverless ArchitectureSundar Anand, Annie Johnson, Priyanka Mathikshara, Karthik R. 618-623 [doi]
- A Performance Analysis of the Data Gathering Model for Unslotted CSMA/CA in Home Automation EnvironmentMais A. Khalil, David R. Siddle. 624-629 [doi]
- Hardware Implementation of Beam Formed Ultrasonic Bird Deterrent SystemNavinesshani Permal, Thiviya Barathi Raja Segaran, Renuga Verayiah, Farrukh Hafiz Nagi, Agileswari K. Ramasamy, Sanuri Ishak. 630-633 [doi]
- A Delay Abridged Judicious Cross-Layer Routing Protocol for Wireless Sensor NetworkPallavi Yarde, Sumit Srivastava, Kumkum Garg. 634-638 [doi]
- Modeling and Analysis of Antimalware Effect on Wireless Sensor NetworkPramod Kumar Srivastava, Satya Prakash Pandey, Nishu Gupta, Santar Pal Singh, Rudra Pratap Ojha. 639-643 [doi]
- Vehicles Clustering for Low-Latency Message Dissemination in VANETYi-Wun Lee, Feng-Tsun Chien. 644-649 [doi]
- LoRa-Hybrid: A LoRaWAN Based Multihop Solution for Regional MicrogridWeiwei Zhou, Ziyuan Tong, Zhao Yang Dong, Yu Wang. 650-654 [doi]
- An Enhanced TR-069 Firmware Upgrade Method of Wi-Fi Mesh SystemKuo-Shu Huang. 655-659 [doi]
- Microclimate Prediction Using Cloud Centric Model Based on IoT Technology for Sustainable AgricultureZar Zar Oo, Sabai Phyu. 660-663 [doi]
- Vulnerabilities in IoT Devices with Software-Defined RadioPhan Duy Hung, Bui Trong Vinh. 664-668 [doi]
- Iot based Smart Water Quality Monitoring SystemMonira Mukta, Samia Islam, Surajit Das Barman, Ahmed Wasif Reza, M. Saddam Hossain Khan. 669-673 [doi]
- Improve Iot Security System Of Smart-Home By Using Support Vector MachineHsiao-Tzu Hsu, Gwo-Jia Jong, Jhih-Hao Chen, Ciou-Guo Jhe. 674-677 [doi]
- Security Implementation For Authentication In Iot EnvironmentsEkkachan Rattanalerdnusorn, Phithak Thaenkaew, Chalee Vorakulpipat. 678-681 [doi]
- Advanced AES Algorithm Using Dynamic Key in the Internet of Things SystemThanh Nha Dang, Huan Minh Vo. 682-686 [doi]
- An OpenID Based Authentication Service Mechanisms for Internet of ThingsAhammad Karim, Muhammad Abdullah Adnan. 687-692 [doi]
- Tobacco System Industrial Control System SecurityYixiang Jiang, Liujing Wang, Xun Zhang. 693-696 [doi]
- Real Time Adaptive Traffic Control System : A Hybrid ApproachPrayushi Faldu, Nishant Doshi, Reema Patel. 697-701 [doi]
- Android Controlled Lawn Mower Using Bluetooth and WIFI ConnectionNoli Mark A. Paala, Nikko Marc M. Garcia, Rojimar A. Supetran, Ma. Erica Lyn B. Fontamillas. 702-706 [doi]
- Application of Active Disturbance Rejection Control Technology in Missile with Thrust Vector ControlXijiang Wang, Daming Zhou, Ke Zhang. 707-711 [doi]
- Study on Depending on the OpenFlow Controller Placement of Multi-pathization MethodKaori Iwata, Yoshihiro Ito. 712-715 [doi]
- Research on Access Control Model in Mobile EnvironmentXiaoyan Zhang, Qiuqiu Wang, Kai Kang. 716-720 [doi]
- Smart Solution for Traffic ControlPallavi Ram Umare, Shraddha Ganeshlal Jayswal, Shraddha Rajendra Tambakhe, Prathamesh Dnyaneshwar Upadhye, Nilesh Dnyaneshwar Gulhane. 721-724 [doi]
- Smart Assistive Navigation Devices for Visually Impaired PeopleArjun Pardasani, Prithviraj N. Indi, Sashwata Banerjee, Aditya Kamal, Vaibhav Garg. 725-729 [doi]
- Smart Vision: Assistive Device for the Visually Impaired Community U sing Online Computer Vision ServiceHasventhran Baskaran, Rachel Lum Mei Leng, Fiza Abdul Rahim, Mohd Ezanee Rusli. 730-734 [doi]
- A Driver-Centric Carpooling: Optimal Route-Finding Model Using Heuristic Multi-Objective SearchKhan Mohammad Habibullah, Ahashan Alam, Swapnil Saha, Al-Amin, Amit Kumar Das. 735-739 [doi]
- Method of Road Condition Information Based on Time Decay Adaptive FittingLin Cui, Bao-Zhu Li. 740-745 [doi]
- Variable Selection for Credit Risk Scoring on Loan Performance Using Regression AnalysisDawn Iris Calibo, Melvin A. Ballera. 746-750 [doi]
- The Process of Innovation Adoption by the Use of E-Commerce Marketing Application : Case Study on Indonesia Small Medium Enterprise CommunityFeni Wahyuni, Irwansyah, Monika Pretty Aprilia. 751-756 [doi]
- A Deep Learning Model for Predicting Buy and Sell Recommendations in Stock Exchange of Thailand using Long Short-Term MemoryThaloengpattarakoon Sanboon, Kamol Keatruangkamala, Saichon Jaiyen. 757-760 [doi]
- M-Commerce Model: An Applied Business Transformation Framework for Tourism IndustryDawn Iris Calibo, Jonathan M. Caballero, Alvin Jason A. Virata. 761-765 [doi]