Abstract is missing.
- A Systematic Literature Review on Combining Ontology with Bayesian Network to Support Logical and Probabilistic ReasoningFoni Agus Setiawan, Eko Kuswardono Budiardjo, T. Basaruddin, Siti Aminah. 1-12 [doi]
- Real-time Analysis and Visualization for Big Data of Energy ConsumptionJiaxue Li, Wei Song, Simon Fong 0001. 13-16 [doi]
- Combining Word Order and CNN-LSTM for Sentence Sentiment ClassificationKai Shuang, Xintao Ren, Jian Chen, Xiaohan Shan, Peng Xu. 17-21 [doi]
- Emotion Classification of Duterte Administration Tweets Using Hybrid ApproachRandell Gimenez, Melvin Gaviola, Mary Jane Sabellano, Ken Gorro. 22-27 [doi]
- A Comparative Study: Different Automatic Approaches of Stars Generation for ReviewsJoshua L. Lee, Patricia B. Awayan, Eduardo Mendoza. 28-32 [doi]
- Tree Structure for Expressive MapReduce FrameworkNathar Shah, Chris H. Messom. 33-37 [doi]
- Mobile Travel Apps' Adoption: Integrating Perceived Characteristics of Innovation and Software QualityJiaming Fang, Juan Li, Ruping Wang. 38-42 [doi]
- A Comprehensive Investigation of Model Driven Architecture (MDA) for Reverse EngineeringUmair Sabir, Farooque Azam, Muhammad Waseem Anwar. 43-48 [doi]
- Aspect-Oriented Approach for Supporting House Bookkeeping Software DesignMeennapa Rukhiran, Paniti Netinant. 49-54 [doi]
- Empirical Study on Software Bug PredictionSyed Rizwan, Tiantian Wang 0001, Xiaohong Su, Salahuddin. 55-59 [doi]
- A Feature-oriented Domain Design Approach to FX Derivatives Trading SystemYao Wang, Na Li, Feifan Zhang. 60-65 [doi]
- The Rise of RansomwareWira Zanoramy A. Zakaria, Mohd Faizal Abdollah, Othman Mohd, Aswami Fadillah Mohd Ariffin. 66-70 [doi]
- Evaluating Usability for Mobile Application: A MAUEM ApproachAshraf Saleh, Roesnita Ismail, Norasikin Fabil. 71-77 [doi]
- The Effect of Sizes of the Feature Sets on Intrusion Detection PerformancesYoekleng Kuy, Isara Anantavrasilp. 78-84 [doi]
- Beyond Cybersecurity Awareness: Antecedents and SatisfactionYazan Alshboul, Kevin Streff. 85-91 [doi]
- Online community support for the marketing of cosmetic medicineJyh-Jeng Wu, Shu-Hua Chien, Yu-Peng Lee, Thoung-Han Lee. 92-96 [doi]
- Research on Potential Damage Estimation of Household Appliances Based on gcForest ModelXia Liu, Shenhao Tu, Run Zhang, Qian Wu, Yuantao Song. 97-101 [doi]
- Usability test method for embedded systems Considering with visually impairedMasayuki Hirayama. 102-106 [doi]
- A Comparison of Teachers' Supportive Behaviour in Middle High School Classroom in Taiwan, Shanghai-China, and Finland: Evidence from PISA 2012Wen-Hua Chen. 107-112 [doi]
- Targeting Algorithm Based on ITSMLi Qiong, Bo Wang, Hong Wu. 113-116 [doi]
- Trust Based Approach in Adjacent Vehicles to Mitigate Sybil Attacks in VANETGuntur Dharma Putra, Selo Sulistyo. 117-122 [doi]
- A Research on Modern Commercial Circulation Development Strategies in the Context of New-type Urbanization: A Case Study of Zhejiang ProvinceYong Wang, Rongbing Hu. 123-127 [doi]
- Bank Lines of Credit Will Be the Supplement to Cash in Corporate Liqudity ManagementWenxuan Zheng. 128-132 [doi]
- A bibliometric analysis of two decades of research on business modelsGaurav Gupta 0004, Indranil Bose. 133-135 [doi]