Abstract is missing.
- Geo-spatial-based Emotions: A Mechanism for Event Detection in MicroblogsSamer Muthana Sarsam, Hosam Al-Samarraie, Bahiyah Omar. 1-5 [doi]
- GPU Accelerated Maximum Likelihood Analysis for Phylogenetic InferenceSandun Rajapaksa, Wageesha Rasanjana, Indika Perera, Dulani Meedeniya. 6-10 [doi]
- Reinforcing the Decision-making Process in Chemometrics: Feature Selection and Algorithm OptimizationSamer Muthana Sarsam. 11-16 [doi]
- Temporal Sentiment Tracking and Analysis on Large-scale Social EventsHussein Hazimeh 0002, Mohammad Harissa, Elena Mugellini, Omar Abou Khaled. 17-21 [doi]
- Multi-Attention Network for Aspect Sentiment AnalysisHuiyu Han, Xiaoge Li, Shuting Zhi, Haoyue Wang. 22-26 [doi]
- Enhancing Simplified General Perturbations-4 Model for Orbit Propagation Using Deep Learning: A ReviewNor'asnilawati Salleh, Siti Sophiayati Yuhaniz, Nurulhuda Firdaus Mohd Azmi, Sharizal Fadlie Sabri. 27-32 [doi]
- Performance Analysis of an Fuzzy Logic Based LEACH ProtocolHong-Yi Tan, Wun-She Yap, Bok-Min Goi. 33-37 [doi]
- Personalized Ranking Point of Interest Recommendation Based on Spatial-Temporal Distance Metric in LBSNsChang Su, Hao Li, Xianzhong Xie. 38-43 [doi]
- Cloud-Based IoT Solution for Predictive Modeling of Ship Fuel ConsumptionKeh Kim Kee, Boung-Yew Lau Simon. 44-49 [doi]
- Questionnaire Development Process to Measure the SMEs' Continuous Use behavior towards Cloud Computing ServicesMohammed A. Al-Sharafi, Ruzaini Abdullah Arshah, Emad A. Abu-Shanab. 50-55 [doi]
- Data Mining Using Clustering Algorithm as Tool for Poverty AnalysisJanelyn A. Talingdan. 56-59 [doi]
- Application of Data Science for Controlling Energy Crises: A Case Study of PakistanSaif Ullah, Muhammad Asif 0002, Shahbaz Ahmad, Ulfat Imdad, Osama Sohaib. 60-64 [doi]
- A Survey on Privacy Preserving Data Mining Approaches and TechniquesMaheyzah Md Siraj, Nurul Adibah Rahmat, Mazura Mat Din. 65-69 [doi]
- Dashboard-based Alumni Tracer Study Report Using Normalized Data Store ArchitectureAsroni, Juanita Yusanti, Slamet Riyadi. 70-74 [doi]
- An Improved Over-sampling Algorithm based on iForest and SMOTEYifeng Zheng, Guohe Li, Teng Zhang. 75-80 [doi]
- Towards the Idea of Agricultural Market Understanding for Automatic Event DetectionMallika Kliangkhlao, Somchai Limsiroratana. 81-86 [doi]
- Removing Unclassified Elements in Investigating of Financial Wellbeing Attributes Using Rough-Regression ModelRiswan Efendi, Susnaningsih Mu'at, Nelsy Arisandi, Noor Azah Samsudin. 87-90 [doi]
- (In)Security of the AAβ Cryptosystem for Transmitting Large DataMuhammad Asyraf Asbullah, Muhammad Rezal Kamel Ariffin, Zahari Mahad, Muhamad Azlan Daud. 91-94 [doi]
- Missing Data Problem in Predictive AnalyticsHeru Nugroho, Kridanto Surendro. 95-100 [doi]
- Data Mining the Smartphone Manipulation Skills in a Coffee Farming Community: A Step for Risk AnalysisMelidiossa V. Pagudpud, Thelma D. Palaoag. 101-104 [doi]
- A Novel Efficient Query Strategy on HibernateShuo Kuai, Yupeng Hu, Xinxiao Zhao, Dong Qin, Wentao Li, Xueqing Li. 105-108 [doi]
- Collaborative Filtering Algorithm Based on User Characteristic and Time WeightPanpan Wang, Hong Hou, Xiaoqun Guo. 109-114 [doi]
- An Efficient Algorithm for Recommender System Using Kernel Mapping TechniquesSummia Naz, Muazzam Maqsood, Mehr Yahya Durrani. 115-119 [doi]
- Pressure Vessel Design Simulation: Implementing of Multi-Swarm Particle Swarm OptimizationSinan Q. Salih, AbdulRahman A. Al-Sewari, Zaher Mundher Yaseen. 120-124 [doi]
- DCA-Based Algorithm for Cross-Functional Team SelectionNgo Tung Son, Tran Thi Thuy, Bui Ngoc Anh, Tran Van Dinh. 125-129 [doi]
- Enhancing One-Dimensional Chaotic Map Based on Bitstream Dividing ModelMoatsum Alawida, Azman Samsudin, Wafa' Hamdan Alshoura. 130-134 [doi]
- Solving 0/1 Knapsack Problem using Opposition-based Whale Optimization Algorithm (OWOA)Hammoudeh S. Alamri, Kamal Z. Zamli, Mohd Faizal Ab Razak, Ahmad Firdaus. 135-139 [doi]
- Simplifying the Algorithm Selection Using Reduction of Rankings of Classification AlgorithmsSalisu Mamman Abdulrahman, Pavel Brazdil, Wan Mohd Nazmee Wan Zainon, Alhassan Adamu. 140-148 [doi]
- Algorithms of Classification of Mass Problems of Production Subject DomainsEugene Malakhov, Denys Shchelkonogov, Vitaliy Mezhuyev. 149-153 [doi]
- Research on MOOC System Based on Bipartite Graph Context Collaborative Filtering AlgorithmXiaoyan Zhang, Jie Bai. 154-158 [doi]
- Precise String Analysis for JavaScript Programs Using AutomataNabil Almashfi, Lunjin Lu, Koby Picker, Christian Maldonado. 159-166 [doi]
- Empirical Investigation of UML Models Matching through Different Weight CalibrationAlhassan Adamu, Wan Mohd Nazmee Wan Zainon, Salisu Mamman Abdulrahman. 167-172 [doi]
- Adoption Issues in DevOps from the Perspective of Continuous Delivery PipelineM. Zulfahmi Toh, Shamsul Sahibuddin, Mohd Naz'ri Mahrin. 173-177 [doi]
- Risk Management in Projects Based on Open-Source SoftwareNguyen Duc Linh, Phan Duy Hung, Vu Thu Diep, Ta Duc Tung. 178-183 [doi]
- Visualizing Test-Defect Coverage Information to Support Analytical Reasoning and TestingSharifah Mashita Syed-Mohamad, Mohd Heikal Husin, Wan Mohd Nazmee Wan Zainon. 184-188 [doi]
- ML Polymorphism of Linear Lambda Calculus with First-class ContinuationsShin-ya Nishizaki. 189-193 [doi]
- Managing Quality Assurance Challenges of DevOps through AnalyticsMahmoud Mohammad Ahmad Ibrahim, Sharifah Mashita Syed-Mohamad, Mohd Heikal Husin. 194-198 [doi]
- Acceptance of the Methods of Decision-making: A Case Study from Software Development Companies in Ukraine and MalaysiaVitaliy Mezhuyev, Oleg M. Lytvyn, Iuliia Pershyna, Olesia Nechuiviter, Oleg O. Lytvyn, Vladimir Lavrik, Oksana Kovalska, Yurii Gunchenko. 199-204 [doi]
- Automating Business Process Model Generation from Ontology-based RequirementsAmarilis Putri Yanuarifiani, Fang-Fang Chua, Gaik-Yee Chan. 205-209 [doi]
- Verifying Cloud Application for the Interaction Correctness Using SoaML and SPINChunling Hu, Guoqing Geng, Bixin Li, Chao Tang, Xiaofeng Wang. 210-216 [doi]
- Model-Based Book Recommender Systems using Naïve Bayes enhanced with Optimal Feature SelectionThi Thanh Sang Nguyen. 217-222 [doi]
- Development Support of User Interfaces Adaptive to Use EnvironmentSeika Tanaka, Hajime Iwata, Junko Shirogane, Yoshiaki Fukazawa. 223-228 [doi]
- Proposing a Development of Geolocation Mobile Application for Airport Pickup of International Students PickUpZafeera Rashid, Chit Su Mon, Raenu Kolandaisamy. 229-232 [doi]
- Using a Hypertext Pre-processor Code in Converting .csv File into a Civil Service Commission Daily Time Record Format Applying Agile ModelJoel M. Gumiran, Cherry R. Gumiran. 233-237 [doi]
- SGApps: Designing and Developing Expert System Apps For Diagnosing Sugar Glider DiseasesMimi Rosnida Osman, Munirah Mohd Yusof, Hanayanti Hafit. 238-242 [doi]
- Applying Design Science Research in the Development of Human Resource Record Management System with Predictive Analysis through Pointing SystemCherry R. Gumiran, Joel M. Gumiran. 243-247 [doi]
- Smart City Bus Application with Quick Response (QR) Code PaymentSim Liew Fong, David Chin Wui Yung, Falah Y. H. Ahmed, Arshad Jamal. 248-252 [doi]
- BookCeption: A Proposed Framework for an Artificially Intelligent Recommendation PlatformAniqa Zaida Khanom, Sheikh Mastura Farzana, Tahsinur Rahman, Iftekharul Mobin. 253-257 [doi]
- A Genre-Based Item-Item Collaborative Filtering: Facing the Cold-Start ProblemSurajit Das Barman, Mahamudul Hasan, Falguni Roy. 258-262 [doi]
- A review of Convolutional Neural Networks in Remote Sensing ImageXinni Liu, Fengrong Han, Kamarul Hawari Ghazali, Izzeldin Ibrahim Mohamed, Yue Zhao. 263-267 [doi]
- Segmentation of Microscopic Breast Cancer Images for Cancer DetectionHamit Altiparmak, Fatih Veysel Nurçin. 268-271 [doi]
- Analyzing the Color Image of Taiwan Town by Using Data MiningYu-Wei Su, Tzren-Ru Chou. 272-276 [doi]
- Defects Detection Technique of Use Case Views during Requirements EngineeringPoranat Tianual, Amnart Pohthong. 277-281 [doi]
- 3D Coordinate Calculation and Pose Estimation of Power Meter based on Binocular Stereo VisionQingdan Huang, Wenxiong Mo, Liqiang Pei, Lian Zeng. 282-285 [doi]
- Brain Aneurysm Extraction in MRI ImagesRose Hafsah Ab. Rauf, Najwa Abd Ghafar, Noor Elaiza Abd. Khalid. 286-290 [doi]
- Cooperative Hierarchical Framework for Group Activity Recognition: From Group Detection to Multi-activity RecognitionMohammed Al-Habib, Dongjun Huang, Majjed Al-Qatf, Kamal Al-Sabahi. 291-298 [doi]
- Combination of Facial Recognition and Interaction with Academic Portal in Automatic Attendance SystemNgo Tung Son, Le Phuong Chi, Phan Truong Lam, Tran Van Dinh. 299-305 [doi]
- Reconstruct the Back of 3D Face Model Using 2D Gradient Based InterpolationWenbo Luo. 306-310 [doi]
- Low-Level Human Action Change Detection Using the Motion History ImageYohwan Noh, DoHoon Lee. 311-314 [doi]
- A Model Driven Approach for State Management in Mobile ApplicationsMehreen Khan, Farooque Azam, Muhammad Waseem Anwar, Fatima Samea, Mudassar Adeel Ahmed. 315-319 [doi]
- Modelling of the Prophet Mosque in Virtual RealityMohamad Izani Zainal Abidin, Aishah Abdul Razak. 320-324 [doi]
- Assessing Classcraft as an Effective Gamification App based on Behaviorism Learning TheoryFrancisco C. Eugenio Jr., Ardhee Joy T. Ocampo. 325-329 [doi]
- Towards Smart Healthcare Management Based on Knowledge Graph TechnologyLan Huang, Congcong Yu, Yang Chi, Xiaohui Qi, Hao Xu. 330-337 [doi]
- An Artificial Cell Simulator based on Artificial ChemistryChien-Le Goh, Hong Tat Ewe, Yong Kheng Goh. 338-342 [doi]
- Artificial Intelligence Legal Policy: Limits of Use of Some Kinds of AIDremliuga Roman, Prisekina Natalia. 343-346 [doi]
- Towards Efficient Implementation of Realizability Checking for Reactive System SpecificationsMasaya Shimakawa, Atsushi Ueno, Shohei Mochizuki, Takashi Tomita, Shigeki Hagihara, Naoki Yonezaki. 347-352 [doi]
- Electric Power Meter Classification Based on BOWWenxiong Mo, Liqiang Pei, Qingdan Huang, Weijie Liao. 353-356 [doi]
- Determining the Neural Network Topology: A ReviewCholdun R. Muh. Ibnu, Judhi Santoso, Kridanto Surendro. 357-362 [doi]
- Verification of Verifiability of Voting Protocols by Strand Space AnalysisShigeki Hagihara, Masaya Shimakawa, Naoki Yonezaki. 363-368 [doi]
- Meta-Analysis of Acoustic Feature Extraction for Machine Listening SystemsRicardo A. Catanghal Jr., Thelma D. Palaoag, Carlwin Dayagdag. 369-372 [doi]
- An Ensemble Filter Feature Selection Method and Outlier Detection Method for Multiclass ClassificationDalton Ndirangu, Waweru Mwangi, Lawrence Nderu. 373-379 [doi]
- Applying Formal Logic Validation to Enhance Natural Language UnderstandingWorawan Marurngsith, Pakorn Weawsawangwong. 380-384 [doi]
- Privacy Enhancement for Delivery Route Optimization through Occupancy PredictionShimpei Ohsugi, Kenji Tanaka, Noboru Koshizuka. 385-391 [doi]
- Hybrid Approach for Forecasting Tourist ArrivalsMei-li Shen, Hsiou-Hsiang Liu, Yi-Hsiang Lien, Cheng-Feng Lee, Cheng-Hong Yang. 392-396 [doi]
- Development of Assessment System for Spine Curvature Angle MeasurementChua Shanyu, Lim Chee Chin, Shafriza Nisha Basah, Asrul Fahmi Azizan. 397-402 [doi]
- Reservoir Parameter Prediction Using Optimized Seismic Attributes Based on Gamma TestYing Li, Guohe Li, Yifeng Zheng. 403-407 [doi]
- Proposal of Method for Analyzing International Students' Tourism Behavior Using a Tourism Support SystemTianyang Lan, Hiroki Tomizawa, Hisashi Ichikawa, Akihiro Abe. 408-413 [doi]
- Factors affecting the Social Networks Acceptance: An Empirical Study using PLS-SEM ApproachMuhammad Alshurideh, Said A. Salloum, Barween Al Kurdi, Mostafa Al-Emran. 414-418 [doi]
- The Extraction of Hidden Fault Diagnostic Knowledge in Equipment Technology Manual Based on Semantic AnnotationZhen Wang, Yanling Qian, Long Wang, Shigang Zhang, Xu Luo. 419-424 [doi]
- Research on Domain Ontology Automation Construction Based on Chinese TextsBo Wang, Jun Luo, Shuyuan Zhu. 425-430 [doi]
- A UML Profile for Multi-Cloud Service Configuration (UMLPMSC) in Event-driven Serverless ApplicationsFatima Samea, Farooque Azam, Muhammad Waseem Anwar, Mehreen Khan, Muhammad Rashid. 431-435 [doi]
- Implicit Recommendation with Interest Change and User InfluenceQiaoqiao Tan, Fangai Liu, Shuning Xing. 436-441 [doi]
- An Information Source Identification Algorithm Based on Shortest Arborescence of NetworkZhong Li, Chunhe Xia, Tianbo Wang, Xiaochen Liu. 442-446 [doi]
- CDAS: A Continuous Dynamic Authentication SystemQi Li, Hao Chen. 447-452 [doi]
- A User Attribute Recommendation Algorithm and Peer3D Technology based WebVR P2P Transmission SchemeHuijuan Zhang, Lei Qiao, Dongqing Wang. 453-456 [doi]
- An Enhanced Key Security of Playfair Cipher AlgorithmRichard M. Marzan, Ariel M. Sison. 457-461 [doi]
- Shellfier: A Shellcode Detection Method based on Dynamic Binary Instrumentation and Convolutional Neural NetworkYue Pan, Jing An, Wenqing Fan, Wei Huang. 462-466 [doi]
- Role-Based ABAC Model for Implementing Least PrivilegesMuhammad Umar Aftab, Zhiguang Qin, Syed Falahuddin Quadri, Zakria, Arslan Javed, Xuyun Nie. 467-471 [doi]
- Survey of Hyperledger Blockchain Frameworks: Case Study in FPT University's Cryptocurrency WalletsTran Quy Ban, Bui Ngoc Anh, Ngo Tung Son, Tran Van Dinh. 472-480 [doi]
- Domain Specific Classification of Malay Based Complaints using the Complaint Concept OntologiesShaiful Bakhtiar bin Rodzman, Siti Suhaima binti Suhaili, Normaly Kamal Ismail, Nurazzah Abd Rahman, Syed Ahmad Aljunid, Aslida binti Omar. 481-486 [doi]
- Problematic Use of Live Video Streaming Services: Impact of Personality Traits, Psychological Factors, and MotivationsShuhui Sophy Cheng, Shao-Liang Chang, Chi-Ying Chen. 487-490 [doi]
- Detection of Random Correction from Source Code SnapshotsYu Ohno, Hidetake Uwano, Shinji Uchida. 491-495 [doi]
- Reliable User Profile Analytics and Discovery on Social NetworksHussein Hazimeh 0002, Elena Mugellini, Omar Abou Khaled. 496-500 [doi]
- IPv6 QoS for Multimedia Applications: A Performance AnalysisFarooq Haider, Muhammad Hasanain Chaudary, Muhammad Sajjad Naveed, Muhammad Asif 0002. 501-504 [doi]
- Social Media Application Usage and Women Entrepreneurship Achievement through E-Business Model: Case of Setiu WetlandMasita@Masila Abdul Jalil, Fatihah Mohd, Mustafa Man, Noraida Ali, Suriyani Muhamad. 505-509 [doi]
- A Model Integrating Information of Multiple Social NetworksXiangling Fu, Chenwei Yan, Pengya Zhao. 510-516 [doi]
- Real-Time Carbon Dioxide Monitoring Based on IoT & Cloud TechnologiesFan Xiu Ming, Riyaz Ahamed Ariyaluran Habeeb, Fariza Hanum Binti Md Nasaruddin, Abdullah Bin Gani. 517-521 [doi]
- A 3-Tier Architecture for Network Latency Reduction in Healthcare Internet-of-Things Using Fog Computing and Machine LearningSaurabh Shukla, Mohd. Fadzil Hassan, Low Tang Jung, Azlan Awang, Muhammad Khalid Khan. 522-528 [doi]
- DC programming and DCA for Secure Guarantee with Null Space Beamforming in Two-Way Relay NetworksNguyen The Duy, Tran Thi Thuy, Luong Thuy Chung, Ngo Tung Son, Tran Van Dinh. 529-532 [doi]
- Portable TOR Router with Raspberry PiArshad Jamal, Deperkdharrshan Kumar, Rabab Alayham Abbas Helmi, Sim Liew Fong. 533-537 [doi]
- An Automated Software-Agents System for Detecting Road Speed Limit OffencesMaythem K. Abbas, Low Tang Jung, Raed Abdulla. 538-543 [doi]
- A Survey on Deployment and Coverage Strategies in Three-Dimensional Wireless Sensor NetworksFengrong Han, Xinni Liu, Izzeldin Ibrahim Mohamed, Kamarul Hawari Ghazali, Yue Zhao. 544-549 [doi]
- Internet of Things Attacks Detection and Classification Using Tiered Hidden Markov ModelAhmad Alshammari, Mohamed A. Zohdy. 550-554 [doi]
- Minimizing Flow Rules for Rerouting Multi-Flows in Multi-Failure Recovery over SDNMeng Sun 0005, Kuoyi Shao, Lu Wang. 555-559 [doi]
- Anomaly Event Detection for Sensor Networks on Apriori Algorithms and Subjective LogicJinhui Yuan, Hongwei Zhou, Laishun Zhang. 560-563 [doi]
- DC Programming and DCA for Power Minimization Problem in Multi-User Beamforming NetworksTran Thi Thuy, Nguyen Van Nam, Ngo Tung Son, Tran Van Dinh. 564-568 [doi]
- Privacy Preserving of IP Address through Truncation Method in Network-based Intrusion Detection SystemYee Jian Chew, Shih Yin Ooi, Kok Seng Wong, Ying-Han Pang. 569-573 [doi]
- Research on Ultrasonic Positioning AlgorithmJingxuan He, Jian Zhang, Zeji Hui. 574-578 [doi]
- Smart Transportation System Using RFIDSim Liew Fong, Amir Ariff Azham bin Abu Bakar, Falah Y. H. Ahmed, Arshad Jamal. 579-584 [doi]