Abstract is missing.
- Development of Real-Time Hand Gesture for Volume Control Application using Python on Raspberry PiPaniti Netinant, Yannakorn Tuaktao, Meennapa Rukhiran. 1-5 [doi]
- A study of how Virtual Reality and Brain Computer Interface can manipulate the brainMeisam Taheri, Diana Kalnikaite. 6-10 [doi]
- Hazard Analysis Methods for Software Safety Requirements EngineeringVu Nguyen Tran, Long Vu Tran, Viet Nguyen Tran, Dao Ngoc Vu. 11-18 [doi]
- Adapting the Scrum Framework to the Needs of Virtual Teams of Game Developers with Multi-site MembersLevika Herve Nankap, Bruno Bouchard 0001, Gilles Imbeau, Fábio Petrillo, Yannick Francillette. 19-25 [doi]
- Impact of Remote Working During Covid-19 Pandemic on Scrum Team: Experts View on Indonesian E-Commerce Companies CaseKretawiweka Nuraga Sani, Eko Kuswardono Budiardjo, Kodrat Mahatma. 26-32 [doi]
- Speech Recognition for Light Control on Raspberry Pi Using Python ProgrammingPaniti Netinant, Krairat Arpabusayapan, Meennapa Rukhiran. 33-37 [doi]
- An Under-sampling Algorithm Based on Weighted Complexity and Its Application in Software Defect PredictionWei Wei, Feng Jiang, Xu Yu 0001, Junwei Du. 38-44 [doi]
- Design and Development of a Technology-Agnostic NFR Testing Framework: Introducing the framework and discussing the future of load testing in Agile software developmentErik Whiting, Soma Datta. 45-50 [doi]
- The Covid 19 Pandemic and its Effects on Agile Software DevelopmentMichael Neumann, Yevgen Bogdanov, Senol Sager. 51-60 [doi]
- Research and practice of ministry-level software process improvement based on SW - CMM modelXuefei Wang, KongYi Wu. 61-67 [doi]
- Construction of large-scale equipment sharing cloud service platform based on Wechat Mini Program: Construction of large-scale equipment, etcXinhong Yin, Hailong Su, Jidong Bao, Fei Liu. 68-75 [doi]
- Ransomware: To Pay or Not to Pay? The results of what IT professionals recommendStephen Mujeye. 76-81 [doi]
- Analysis and Implementation of Presenter Layer on MVC Architecture iOS Application Development∗Agus Adi Pranata, Nungki Selviandro, Monterico Adrian. 82-86 [doi]
- Multicast Service Oriented Constellation Design Based on Multi-Objective OptimizationWei Zhang, Tao Wu, Hong Ma, Chao Li. 87-94 [doi]
- Data Aggregation and Anomaly Detection System for Isomerism and Heterogeneous DataYunze Li, Yuxuan Wu, Ruisen Tang. 95-99 [doi]
- Towards verification of probabilistic multi-party consensus protocols: Constructing algorithms for verification of multi-party protocols with probabilistic propertiesIvan Fedotov, Anton Khritankov, Artem Barger. 100-105 [doi]
- Law Recommendation Based on Self - Attention Mechanism and Feature FusionLei Liu, Dezhi An. 106-112 [doi]
- Ontology Enrichment with Text Extracted from WikipediaEmiliano Tramontana, Gabriella Verga. 113-117 [doi]
- Overcoming the obfuscation method of the dynamic name resolutionNaruaki Otsuki, Haruaki Tamada. 118-124 [doi]
- A Framework for Facilitating Reproducible News Sentiment Impact AnalysisWeisi Chen, Islam Al Qudah, Fethi Rabhi. 125-131 [doi]
- HSAACE: Design a Cloud Platform Health Status Assessment Application to Support Continuous Evolution of Assessment CapabilitiesYuzhu Hu, Yunxuan Wang. 132-137 [doi]
- Initial Seeds Selection for K-means Clustering Based on Outlier DetectionZhiyong Yang, Feng Jiang, Xu Yu, Junwei Du. 138-143 [doi]
- Deep Neural Network for Diagnosis of Bone MetastasisVincent Peter C. Magboo, Patricia Angela R. Abu. 144-151 [doi]
- Dementia Detection Using Language Models and Transfer LearningMondher Bouazizi, Chuheng Zheng, Tomoaki Ohtsuki. 152-157 [doi]
- CLAD: A Deep Learning Framework for Continually Learning in Anomaly DetectionYulu Cao, Honglu Gan. 158-163 [doi]
- An Evaluation of Large-scale Information Network Embedding based on Latent Space Model Generating LinksShotaro Kawasaki, Ryosuke Motegi, Shogo Matsuno, Yoichi Seki. 164-170 [doi]
- Alert Intruder Detection System Using Passive Infrared Motion Detector based on Internet of ThingsPaniti Netinant, Auttapon Amatyakul, Meennapa Rukhiran. 171-175 [doi]
- A Method for Detecting the Conflict of Wind Tunnel Group Vacuum Power ResourcesChangjun Luo, Yongyi Ma, Xiaofei Wang, Fu He. 176-181 [doi]
- An Empirical Analysis of Rape Sentence Based on SPSSYue Liu, Zhou Xu. 182-187 [doi]
- Predictive Analytics for the Coronavirus Recovery Rate in the PhilippinesAndrei James Agbuya, Risty Acerado, Roselia Morco, Ricaela Glipo, Alliah Clara Santos. 188-192 [doi]
- Evaluations of Effective on 5-CH Line Follower Sensor with IoT Simulating CarPaniti Netinant, Wiphoosana Malawittaya, Meennapa Rukhiran. 193-198 [doi]
- Analysis Factors that Influence the Increasing of Generation Z's Interest in Using Social Media as the Implementation of Online to Offline and Offline to Online Business Model in Pandemic Era at IndonesiaDyadra Audreyta Aliftya Kurniawan, Jihan Baisa, Vania Mashandra Zahra, Yohannes Kurniawan. 199-205 [doi]
- The Consumer Deviation Index: A Method for Identifying Changing Behaviors and Market OpportunitiesJolie M. Martin, Fen Zhao, Jaden Hou. 206-211 [doi]
- Automatic inventory system of librarian books based on a deep learning algorithm with EAST and CRNNShuanle Wang, Chaoyi Dong, Peng Yang, Chen Xiaoyan, Zan Weidong. 212-218 [doi]
- Smart E-Badge (Gamification) for Learning Experience when using Learning Tools for High School StudentYakob Utama Chandra, Yohannes Kurniawan, Shamsul Arrieya Ariffin. 219-224 [doi]
- Research on the Innovation of Commercial Banks' Green Finance Credit Model: Based on the Case of China Construction BankLiu Yang, ShengJie Su, QuanXin Gan. 225-233 [doi]
- Research and Practice on Information Construction of Public Housing in Colleges and UniversitiesXu Luo, Jun Xiao, Bingsong Qian. 234-240 [doi]
- Analyzing the Use of Telemedicine as Health Consultation due to COVID-19 Pandemic in Indonesia ContextYohannes Kurniawan, Andri Tanuwijaya Hilman, Marco Nathanael Barus, Valdo Parlinggoman. 241-247 [doi]