Abstract is missing.
- Data Integration in Practice: Academic Finance Analytics Case StudyKittayaporn Chantaranimi, Juggapong Natwichai, Pawat Pajsaranuwat, Anawat Wisetborisut, Surapong Phosu. 1-11 [doi]
- Proposal of an Aquarium Design Support Virtual Reality SystemFumitaka Matsubara, Tomoyuki Ishida. 12-21 [doi]
- The Source Code Maintenance Time Classifications from Code SmellPatcharaprapa Khamkhiaw, Chartchai Doungsa-ard, Passakorn Phannachitta. 22-32 [doi]
- Evolution Analysis of R&D Jobs Based on Patents' Technology Efficacy LabelingCui Ruiyi, Deng Na, Zheng Cheng. 33-43 [doi]
- The Models of Improving the Quality of Government Financial ReportingEdy Suprianto, Dedi Rusdi, Ahmad Salim. 44-51 [doi]
- Fuzzy Mean Clustering Analysis Based on Glutamic Acid Fermentation FailureChunming Zhang. 52-63 [doi]
- Mustahik Micro Business Incubation in Poverty AlleviationZainal Alim Adiwijaya, Edy Suprianto, Dedi Rusdi. 64-75 [doi]
- T - ψ Schemes for a Transient Eddy-Current Problem on an Unbounded AreaYiyue Sun. 76-84 [doi]
- Zakat Management Model Based on ICTBedjo Santoso, Provita Wijayanti, Fenita Austriani. 85-97 [doi]
- Teaching Method of Advanced Mathematics Combining PAD Classroom with ADDIE ModelYanyan Zhao, Qiong Li, Xuhui Fan, Lili Su, Jingtao Li, Xiaokang Liu. 98-107 [doi]
- A Kind of Online Game Addictive Treatment Model About Young PersonXiaokang Liu, Jiangtao Li, Yanyan Zhao, Yiyue Sun, Haibo Zhang. 108-117 [doi]
- Research on E-commerce Customer Value Segmentation Model Based on Network BehaviorJing Zhang, Juan Li. 118-128 [doi]
- Blockchain Applications for Mobility-as-a-Service Ecosystem: A SurveyElis Kulla, Leonard Barolli, Keita Matsuo, Makoto Ikeda. 129-140 [doi]
- Construction of a Fully Homomorphic Encryption Scheme with Shorter Ciphertext and Its Implementation on the CUDA PlatformDong Chen, Tanping Zhou, Wenchao Liu, Zichen zhou, Yujie Ding, Xiaoyuan Yang. 141-151 [doi]
- Traffic-Oriented Shellcode Detection Based on VSMPengju Liu, Baojiang Cui, Can Cui. 152-162 [doi]
- Supply Chain Finance Mediates the Effect of Trust and Commitment on Supply Chain EffectivenessLisa Kartikasari, Muhammad Ali Ridho. 163-170 [doi]
- Blockchain Technology and Financing Risk in Profit Loss Sharing Financing of Indonesian Islamic BankMutamimah Mutamimah, Indri Kartika. 171-179 [doi]
- Privacy-Preserving Scheme for Nearest Life Services Search Based on Dummy Locations and Homomorphic Encryption AlgorithmTieSen Zhao, Liping Shi. 180-189 [doi]
- Terminology Extraction of New Energy Vehicle Patent Texts Based on BERT-BILSTM-CRFCheng Zheng, Na Deng, Ruiyi Cui, Hanhui Lin. 190-202 [doi]
- Conceptual Paper of Environmental Disclosure and Financial Performance: The Role of Environmental PerformanceLuluk Muhimatul Ifada, Naila Najihah, Farikha Amilahaq, Azizah Azmi Khatamy. 203-214 [doi]
- Applying BERT on the Classification of Chinese Legal DocumentsQiong Zhang, Xu Chen. 215-222 [doi]
- Technology and Efficacy Extraction of Mechanical Patents Based on BiLSTM-CRFRuiyi Cui, Na Deng, Cheng Zheng. 223-234 [doi]
- Talent Incubator System: A Conceptual Framework of Employee Recruitment Strategy in Digital EraOlivia Fachrunnisa, Nurhidayati, Ardian Adhiatma. 235-242 [doi]
- Thai Word Disambiguation: An Experiment on Thai Language Dataset with Various Deep Learning ModelsNontakan Nuntachit, Karn Patanukhom, Prompong Sugunnasil. 243-247 [doi]
- Energy-Efficient Locking Protocol in Virtual Machine EnvironmentsTomoya Enokido, Dilawaer Duolikun, Makoto Takizawa 0001. 248-255 [doi]
- A Flexible Fog Computing (FTBFC) Model to Reduce Energy Consumption of the IoTDilawaer Duolikun, Tomoya Enokido, Makoto Takizawa 0001. 256-267 [doi]
- Research on Federated Learning for Tactical Edge IntelligenceRongrong Zhang, Zhiqiang Gao, Di Zhou. 268-274 [doi]
- Load Balancing Algorithm for Information Flow Control in Fog Computing ModelShigenari Nakamura, Tomoya Enokido, Makoto Takizawa 0001. 275-283 [doi]
- Federated Reinforcement Learning Technology and Application in Edge Intelligence SceneXuanzhu Sheng, Zhiqiang Gao, Xiaolong Cui, Chao Yu. 284-291 [doi]
- Cryptanalysis of a Public Cloud Auditing SchemeXu An Wang 0001, Mingyu Zhou, Wenyong Yuan. 292-296 [doi]
- A Fuzzy-Based Approach for Selection of Radio Access Technologies in 5G Wireless NetworksPhudit Ampririt, Makoto Ikeda, Keita Matsuo, Leonard Barolli. 297-307 [doi]
- A Comparison Study of FC-RDVM and LDVM Router Placement Methods for WMNs Considering Uniform Distribution of Mesh Clients and Different InstancesShinji Sakamoto, Admir Barolli, Yi Liu 0011, Elis Kulla, Leonard Barolli, Makoto Takizawa 0001. 308-316 [doi]
- Performance Evaluation of FBRD Protocol Considering Transporter Autonomous Underwater Vehicles for Underwater Optical Wireless Communication in Delay Tolerant NetworkingKeita Matsuo, Elis Kulla, Leonard Barolli. 317-323 [doi]
- A Road State Decision Method Based on Roughness by Crowd Sensing TechnologyYoshitaka Shibata, Yasushi Bansho. 324-330 [doi]
- Experimental Results of a Wireless Sensor Network Testbed for Monitoring a Water Reservoir Tank Considering Multi-flowsYuki Nagai, Aoto Hirata, Chihiro Yukawa, Kyohei Toyoshima, Tetsuya Oda, Leonard Barolli. 331-340 [doi]
- A Depth Camera Based Soldering Motion Analysis System for Attention Posture Detection Considering Body OrientationKyohei Toyoshima, Chihiro Yukawa, Yuki Nagai, Nobuki Saito, Tetsuya Oda, Leonard Barolli. 341-349 [doi]
- Effect of Lighting of Metal Surface by Different Colors for an Intelligent Robotic Vision SystemChihiro Yukawa, Nobuki Saito, Aoto Hirata, Kyohei Toyoshima, Yuki Nagai, Tetsuya Oda, Leonard Barolli. 350-356 [doi]
- A Design and Implementation of Dynamic Display Boards in a Virtual Pavilion Based on Unity3DZimin Li, Feng Pan. 357-364 [doi]
- A Comparative Study of Several Spatial Domain Image Denoising AlgorithmRui Deng, Yanli Fu, Shuyao Li. 365-374 [doi]
- A Pedestrian Avoidance System for Visual Impaired People Based on Object Tracking AlgorithmRui Shan, Wei Shi 0008, Zhu Teng, Yoshihiro Okada. 375-385 [doi]
- Web-Based Collaborative VR System Supporting VR Goggles for Radiation Therapy Setup TrainingYuta Miyahara, Kosuke Kaneko, Toshioh Fujibuchi, Yoshihiro Okada. 386-400 [doi]
- Development Framework Using 360VR Cameras and Lidar Scanners for Web-Based XR Educational Materials Supporting VR GogglesYoshihiro Okada, Kosuke Kaneko, Wei Shi 0008. 401-412 [doi]
- A Comparison Study of LDVM and RDVM Router Replacement Methods by WMN-PSODGA Hybrid Simulation System Considering Two Islands Distribution of Mesh ClientsAdmir Barolli, Kevin Bylykbashi, Leonard Barolli, Ermioni Qafzezi, Shinji Sakamoto, Makoto Takizawa 0001. 413-422 [doi]
- FBCF: A Fuzzy-Based Brake-Assisting Control Function for Rail Vehicles Using Type-1 and Type-2 Fuzzy Inference ModelsMitsuki Tsuneyoshi, Makoto Ikeda, Leonard Barolli. 423-431 [doi]
- A Memetic Approach for Classic Minimum Dominating Set ProblemRui Peng, Xinyun Wu, Caiquan Xiong. 432-440 [doi]
- Exploration of Neural Network Imputation Methods for Medical DatasetsVivatchai Kaveeta, Prompong Sugunnasil, Juggapong Natwichai. 441-450 [doi]
- Applying BBLT Incorporating Specific Domain Topic Summary Generation Algorithm to the Classification of Chinese Legal CasesQiong Zhang, Xu Chen. 451-459 [doi]
- Implementation of a Fuzzy-Based Testbed for Coordination and Management of Cloud-Fog-Edge Resources in SDN-VANETsErmioni Qafzezi, Kevin Bylykbashi, Elis Kulla, Makoto Ikeda, Keita Matsuo, Leonard Barolli. 460-470 [doi]
- A Consistency Maintenance Method Integrating OT and CRDT in Collaborative Graphic EditingWeijie Chen, Caiquan Xiong, Xinyun Wu. 471-482 [doi]
- Data Pipeline of Efficient Stream Data Ingestion for Game AnalyticsNoppon Wongta, Juggapong Natwichai. 483-490 [doi]
- IPT-CFI: Control Flow Integrity Vulnerability Detection Based on Intel Processor TraceZhuorao Yang, Baojiang Cui, Can Cui. 491-499 [doi]
- Business Intelligence: Alternative Decision-Making Solutions on SMEs in IndonesiaAgustina Fitrianingrum, Maya Indriastuti, Andi Riansyah, Abdul Basir, Dedi Rusdi. 500-507 [doi]