Abstract is missing.
- Using Intelligent Algorithms to Construct a Wafer Foundry System in Manufacturing IndustryRuey-Shun Chen, Yeh-Cheng Chen, Jyh-haw Yeh, Yu-Xi Hu, Naixue Xiong, C. P. Lee. 1-5 [doi]
- Specular reflection Surface Defects Detection by using Deep LearningZhong Zhang 0005, Borui Zhang, Takuma Akiduki. 6-10 [doi]
- Network Traffic Anomaly Detection Based on Information Gain and Deep LearningXianglin Lu, Pengju Liu, Jiayi Lin. 11-15 [doi]
- Automatic Seismic Salt Interpretation with Deep Convolutional Neural NetworksYu Zeng, Kebei Jiang, Jie Chen. 16-20 [doi]
- Citrus Greening Infection Detection (CiGID) by Computer Vision and Deep LearningCharles T. Soini, Sofiane Fellah, Muhammad Rizwan Abid. 21-26 [doi]
- Hybrid Learning Approach of Combining Cluster-Based Partitioning and Hidden Markov Model for IoT Intrusion DetectionSulaiman Alhaidari, Mohamed Zohdy. 27-31 [doi]
- CUDA Optimized Neural Network Predicts Blood Glucose Control from Quantified Joint Mobility and AnthropometricsSterling Ramroach, Andrew Dhanoo, Brian Cockburn, Ajay Joshi. 32-36 [doi]
- A Multi-Agent Model of Energy Transactions in Microgrid under EquilibriumEduard Plett, Sanjoy Das. 37-46 [doi]
- Identification of the Technology Convergence in the Field of Elderly Smart Home Based on Louvain Community Discovery AlgorithmHong Miao, Xin Guo, Feifei Wu. 47-53 [doi]
- Analysis of competitive Power of Chinese Sports Apparel Brand based on Porter's five Force ModelLu Ge, Chenggang Li. 54-58 [doi]
- Student Performance Prediction using Multi-Layers Artificial Neural Networks: A Case Study on Educational Data MiningSaud Altaf, Waseem Soomro, Mohd Izani Mohamed Rawi. 59-64 [doi]
- A Weight-adjusting Approach on an Ensemble of Classifiers for Time Series ForecastingLin Li, Chun-Kit Ngan. 65-69 [doi]
- Using Robust Data Governance to Mitigate the Impact of CybercrimeGerald Onwujekwe, Manoj A. Thomas, Kweku-Muata Osei-Bryson. 70-79 [doi]
- Estimating poverty: A state-of-the-art of methodsYasmina Vizuete-Salazar, Marco Segura-Morales, Edison Loza Aguirre. 80-86 [doi]
- Mining Frequent Itemsets Using Improved Apriori on SparkFei Gao, Ashutosh Khandelwal, Jiangjiang Liu. 87-91 [doi]
- Network Traffic Anomaly Detection based on Viterbi Algorithm Using SNMP MIB DataSulaiman Alhaidari, Ali Alharbi, Mansour Alshaikhsaleh, Mohamed Zohdy, Debatosh Debnath. 92-97 [doi]
- Evaluating Learning Management System Usage at a Small UniversityMohammed Awad, Khouloud Salameh, Ernst L. Leiss. 98-102 [doi]
- Implementing a BIM Collaborative Workflow In The UK Infrastructure SectorHaddy Jallow, Suresh Renukappa, Subashini Suresh, Ahmed Alneyadi. 103-108 [doi]
- Drivers for Sharing Knowledge in the Kingdom of Saudi Arabia Construction Industry: An Empirical StudyHani Alamil, Suresh Renukappa, Hanouf Alosaimi, Saeed Al Nabt. 109-113 [doi]
- Clustering Analysis of Brain Protein Expression Levels in Trisomic and Control MiceCarly L. Clayman, Scott N. Clayman, Partha Mukherjee. 114-118 [doi]
- Imputation Strategies for Cold-Start Users in NMF-Based Recommendation SystemsFatemah Alghamedy, Jun Zhang 0001. 119-128 [doi]
- An Application of Image Classification to Saltwater Fish Identification in Louisiana FisheriesNibha Manandhar, John W. Burris. 129-132 [doi]
- Authorship Identification using Recurrent Neural NetworksShriya T. P. Gupta, Jajati Keshari Sahoo, Rajendra Kumar Roul. 133-137 [doi]
- Natural Language-Based Knowledge Extraction in Healthcare DomainEdgars Rencis. 138-142 [doi]
- Vinfomize: A Framework for Multiple Voice-based Information CommunicationMuhammad Abu ul Fazal, Sam Ferguson, M. Shuaib Karim, Andrew Johnston. 143-147 [doi]
- Comparative Analysis of Unstructured P2P File Sharing NetworksMehr-UN-Nisa, Fasiha Ashraf, Ateeqa Naseer, Shaukat Iqbal. 148-153 [doi]
- PhAttApp: A Phishing Attack Detection ApplicationThuy Lam, Houssain Kettani. 154-158 [doi]
- Instant Adaptation Enrichment Technique to Improve Web Accessibility for Blind UsersSuliman K. Almasoud, Hassan I. Mathkour. 159-164 [doi]
- A Practical Evaluation of a Secure and Energy-Efficient Smart Parking System Using the MQTT ProtocolAli Alqazzaz, Raed Alharthi, Ibrahim Alrashdi, Esam Aloufi, Mohamed A. Zohdy, Hua Ming. 165-170 [doi]
- Online Misinformation Spread: A Systematic Literature MapMalik Almaliki. 171-178 [doi]
- PUREDroid: Permission Usage and Risk Estimation for Android ApplicationsAli Alshehri, Pawel Marcinek, Abdulrahman Alzahrani, Hani Alshahrani, Huirong Fu. 179-184 [doi]
- LApps: Technological, Legal and Market Potentials of Blockchain Lightning Network ApplicationsMahdi H. Miraz, David C. Donald. 185-189 [doi]
- Development and Application of a Systematic Knowledge Management Process Model for the Tooling IndustryGünther Schuh, Christoph Kelzenberg, Johan de Lange, Julian Boshof. 190-195 [doi]
- The Algorithm of Testing ADC Effective, Number of Bits Based on Hilbert and Wavelet TransformEmad A. Awada. 196-200 [doi]
- Knowledge Transfer, Sharing, and Management System Based on Causality for Requirements Change ManagementYuQing Yan, Zhenhua Zhang. 201-207 [doi]
- Research Trends in Knowledge Management: Past, Present and FutureShabahat Husain, Rumman Gul. 208-217 [doi]
- Study on Polymorphic Equilibrium of Internet EconomyChenggang Li, Lu Ge. 218-222 [doi]
- Knowledge Management System Approach of Police Performance Management in Regional Police of Yogyakarta Special Region, IndonesiaVita Mayastinasari, Benyamin Lufpi, Novi Indah Earlyanti. 223-227 [doi]
- Analysis of Research Status and Development Trend of Hydrogen Storage TechnologyYiwei Li, Feifei Wu, Hong Miao. 228-233 [doi]
- Building Information Modelling in the Framework of Knowledge Management: A Water Industry Case StudySubashini Suresh, Suresh Renukappa, Andrew Kamunda. 234-240 [doi]