Abstract is missing.
- Application of advanced Petri net in personalized learningJunyi Dai, Guiping Su, Yuan Sun, Shiwei Ye, Pan Liao, Yi Sun. 1-6 [doi]
- Micro-lecture construction under the environment of "internet plus" higher education: A case study on spatial analysis course of GIS specialtyYan Yu, Jianhua He, Yanbin Yuan, Jiejun Huang, Xiaopan Zhang. 7-10 [doi]
- Internet-based collaborative strategic reading in college English teachingJianping Cai. 11-14 [doi]
- e-learning situations and cultivation strategies: an example from ChinaBinghui Wu, Tingting Duan. 15-19 [doi]
- Adoption and use of mobile learning in higher education: the UTAUT modelMosunmola Akinbode, Agboola Mayowa, Senanu R. Okuboyejo, Chinenrim Adeniji. 20-25 [doi]
- Research on gender differences in the digital learning performance of university studentsYu-Chen Hsiao, Yi-Tzone Shiao. 26-30 [doi]
- Impact of using online questionnaires in collecting student feedback in development activitiesJoseph C. H. So, Victor C. W. Chan. 31-34 [doi]
- Distribute digital contents within digital images on the mobileMinsu Kim, Kunwoo Lee, Katsuhiko Gondow. 35-39 [doi]
- Assessing the influence of consumer perceived value, trust and attitude on purchase intention of online shoppingMosunmola Akinbode, Adegbuyi Omotayo, Agboola Mayowa. 40-47 [doi]
- Assessing the influence of social media functionalities on consumer brand equityMosunmola Akinbode, Oladele Kehinde, Agboola Mayowa. 48-54 [doi]
- Software development for student behavior tracking systemSoontorn Auksorncherdchoo, Anon Sukstrienwong. 55-59 [doi]
- Analysis of hotspot methods in JVM for best-effort run-time parallelizationQurrat ul Ain, Saqib Ahmed, Abdullah Zafar, Muhammad Amir Mehmood, Abdul Waheed. 60-65 [doi]
- Learning graph matching with GNCCPShaofeng Zeng, Yujian Li, Zhaoying Liu, Edna Chebet Too. 66-70 [doi]
- Analysis for the performance degradation of fsync() in F2FSGyeongyeol Choi, Youjip Won. 71-75 [doi]
- Read-ahead-of-write system call on KVM/QEMU virtualizationYeong-Seok Lee, Sang-Won Lee. 76-79 [doi]
- Attempt to mitigate congestion by providing latent information with walk-rally applicationYuya Ieiri, Yuu Nakajima, Reiko Hishiyama. 80-84 [doi]
- Fear of cybercrime and the compliance with information security policies: a theoretical studyJaffar Ahmad Alalwan. 85-87 [doi]
- Evaluating information technology graduates employability using decision tree algorithmBelen M. Tapado, Gemma G. Acedo, Thelma D. Palaoag. 88-93 [doi]
- IPLization of postgreSQL on NVDIMMJoobo Shim, Sang-Won Lee. 94-98 [doi]
- Sentiment analysis on educational posts from social mediaFloradel S. Relucio, Thelma D. Palaoag. 99-102 [doi]
- Robustness of factors influencing social media usage/adoption amongst SMEs in developing countries: a case of PakistanNaveeda Sangi, Shuguang Liu, Abdur Rashid Sangi. 103-109 [doi]
- Employees' self-efficacy measuring in Chinese workplace: evidence of "investment limited company "A" (Beijing) and electronics limited company "B" (Shenzhen)Rodrigue Againglo, Karani N. Nyachiro, Junshan Gao. 110-113 [doi]
- Flexibility of employees in Chinese enterprises: evidence of electronics limited company "Y1" (Shenzhen)" & investments company limited "Y2" (Beijing)Rodrigue Againglo, Frederic Nzanywayingoma, Junshan Gao. 114-118 [doi]
- Maturity level of knowledge management in Thailand: the practicalNithinant Thammakoranonta. 119-122 [doi]