Abstract is missing.
- Noise Attenuation by Sonic Crystal WindowHsiao Mun Lee, Wensheng Luo, Long Bin Tan, Kian Meng Lim, Jinlong Xie, Heow Pueh Lee. 3-11 [doi]
- Cabin Noise of Metro Systems in Various CitiesHeow Pueh Lee, Kian Meng Lim, Saurabh Garg. 12-22 [doi]
- A High Throughput MAC Protocol for Wireless Body Area Networks in Intensive CareAmir Javadpour, Guojun Wang 0001, Kuan-Ching Li. 23-34 [doi]
- FRFP: A Friend Recommendation Method Based on Fine-Grained PreferenceMingmin Shao, Wenjun Jiang, Lei Zhang. 35-48 [doi]
- Band Segmentation and Detection of DNA by Using Fast Fuzzy C-mean and Neuro Adaptive Fuzzy Inference SystemMuhammad Arif 0006, Guojun Wang 0001, Valentina Emilia Balas, Shuhong Chen. 49-59 [doi]
- A Management Platform for Citizen's Data Protection RegulationAlberto Huertas Celdrán, Manuel Gil Pérez, Izidor Mlakar, Jose M. Alcaraz Calero, Félix J. García Clemente, Gregorio Martínez Pérez. 60-72 [doi]
- Securing Smart Offices Through an Intelligent and Multi-device Continuous Authentication SystemPedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Lorenzo Fernández Maimó, Gregorio Martínez Pérez, Guojun Wang 0001. 73-85 [doi]
- Data Center Job Scheduling Algorithm Based on Temperature PredictionWeiguo Wu, Zhuang Hu, Simin Wang, Yixuan Xu, Yifei Kang. 86-104 [doi]
- Transfer Learning for Facial Attributes Prediction and ClusteringLuca Anzalone, Paola Barra, Silvio Barra, Fabio Narducci, Michele Nappi. 105-117 [doi]
- Identification of Plant Leaf Diseases Based on Inception V3 Transfer Learning and Fine-TuningZhenping Qiang, Libo He, Fei Dai. 118-127 [doi]
- Edge Computing-Enabled Resource Provisioning for Video Surveillance in Internet of VehiclesXiaolong Xu, Qi Wu, Chengxun He, Shaohua Wan, Lianyong Qi, Hao Wang. 128-140 [doi]
- The Optimization of Network Performance Evaluation Method for Virtual Desktop QoE Based on SPICEWeimin Li, Jinfang Sheng, Yikang Yan, Shaobo Zhang, Xingyu Deng, Wenxiu Huang. 141-151 [doi]
- Trustworthy Data Collection for Cyber Systems: A Taxonomy and Future DirectionsHafiz ur Rahman, Guojun Wang 0001, Md. Zakirul Alam Bhuiyan, Jianer Chen. 152-164 [doi]
- Optimization of Score-Level Biometric Data Fusion by Constraint Construction TrainingAndrea F. Abate, Carmen Bisogni, Aniello Castiglione, Riccardo Distasi, Alfredo Petrosino. 167-179 [doi]
- Dynamic Online Course Recommendation Based on Course Network and User NetworkXixi Yang, Wenjun Jiang. 180-196 [doi]
- Context-Aware Personalized POI Sequence RecommendationJing Chen, Wenjun Jiang. 197-210 [doi]
- Effect on the Demand and Stock Returns: Cross-Sectional of Big Data and Time-Series AnalysisAmelec Viloria, Indira Meñaca Guerrero, Hugo Martínez Caraballo, Nelson Orellano Llinas, Lesbia Valero, Hugo Hernández Palma, Edwin Caño Otero, Omar Bonerge Pineda Lezama. 211-220 [doi]
- Optimization of Factors that Influence the "Settlement" of the Concrete in Mixer TransportAlexander Parody, Abel Ávila, Mercedes Gaitán, Marjorie Galofre, María Wilches, Leila Ramírez, Dionicio Neira, Jesús Silva. 221-230 [doi]
- Educational Psychology in Latin America: With Linear Hierarchical ModelsJesús Silva, Darwin Solano, Claudia Fernández, Ligia Romero, Nataly Orellano Llinás, Ana María Negrete Sepúlveda, Luz Estela Leon Coronado, Rosio Barrios González. 233-242 [doi]
- Modeling and Simulating for the Treatment of Subjectivity in the Process of Choosing Personnel Using Fuzzy LogicNoel Varela Izquierdo, Mercedes Gaitán, Omar Bonerge Pineda Lezama, Nelson Alberto Lizardo Zelaya, Jesús Silva, Roberto Rene Moreno Garcia, Rafael Luciano Gómez Dorta. 243-252 [doi]
- A Consortium Blockchain-Based Model for Data Sharing in Internet of VehiclesQifan Wang, Lei Zhou, Zhe Tang, Guojun Wang 0001. 253-267 [doi]
- Semantic Knowledge Based Graph Model in Smart CitiesSaqib Ali, Guojun Wang 0001, Komal Fatima, Pin Liu. 268-278 [doi]
- A Multi-layer Security Model for 5G-Enabled Industrial Internet of ThingsHussain Al-Aqrabi, Anju P. Johnson, Richard Hill, Phil Lane, Lu Liu 0001. 279-292 [doi]
- Securing Smart Healthcare Systems from Vulnerability ExploitationGemini George, Sabu M. Thampi. 295-308 [doi]
- ADS-SA: System for Automatically Detecting Sensitive Path of Android Applications Based on Static AnalysisHong Song, Dandan Lin, Shuang Zhu, Weiping Wang 0003, Shigeng Zhang. 309-322 [doi]
- Early Detection of Parkinson Disease Using Wavelet Transform Along with Fourier TransformSyed Qasim Afser Rizvi, Guojun Wang 0001, Xiaofei Xing. 323-333 [doi]
- Data Sharing and Privacy for Patient IoT Devices Using BlockchainGautam Srivastava, Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo. 334-348 [doi]
- Light Weight Authentication and Key Establishment Protocol for Smart Vehicles Communication in Smart CityVenkatasamy Sureshkumar, S. Anandhi, R. Madhumathi, N. Selvarajan. 349-362 [doi]
- An Adaptive MAC Layer Energy-Saving Algorithm for ZigBee-Enabled IoT NetworksYaxuan Zhang, Kun Yang, Hui Chen. 365-378 [doi]
- Implementing a Lightweight Cloud-Based Process Monitoring Solution for Smart AgricultureDaniel Clarke, Hussain Al-Aqrabi, Richard Hill, Pritesh Mistry, Phil Lane. 379-391 [doi]
- Condition Monitoring of Motorised Devices for Smart Infrastructure CapabilitiesPritesh Mistry, Phil Lane, Paul Allen, Hussain Al-Aqrabi, Richard Hill. 392-403 [doi]
- A Travel Aid for Visually Impaired: R-CaneKanak Manjari, Madhushi Verma, Gaurav Singal. 404-417 [doi]
- "Think Before You Post": A Cognitive Psychological Approach for Limiting Bullying in Social MediaSreeshma Mohan, Indu Valsaladevi, Sabu M. Thampi. 418-434 [doi]
- Hybrid Personalized Music Recommendation Method Based on Feature IncrementGuimei Liu, Wenjun Jiang. 435-446 [doi]
- Real-Time Traffic Monitoring Systems Based on Magnetic Sensor IntegrationMohammed Sarrab, Supriya Pulparambil, Naoufel Kraïem, Mohammed Al-Badawi. 447-460 [doi]
- Identification of Functional Modules in Dynamic Weighted PPI Networks by a Novel Clustering AlgorithmYimin Mao, Xin Yu, Haiwan Zhu. 461-472 [doi]
- Recommending Costume Matching with User Preference and Expert's SuggestionYuanyuan Hu, Wenjun Jiang. 473-485 [doi]
- Software Tamper Resistance Based on White-Box SMS4 ImplementationTingting Lin, Yixin Zhong, Xuejia Lai, Weidong Qiu. 486-495 [doi]
- Competitiveness Indicator in Colombia Through of Multivariable StatisticsElcira Solano Benavides, Nelson Alandete Brochero, Amelec Viloria. 496-505 [doi]
- Network Intrusion Detection Based on Hidden Markov Model and Conditional EntropyLinying Xiao, Huaibin Wang. 509-519 [doi]
- Superior Prosthetic Member Based on Assistive TechnologiesSorin Curea, Oana Geman, Iuliana Chiuchisan, Valentina E. Balas, Guojun Wang 0001, Muhammad Arif 0009. 520-530 [doi]
- Rehabilitation System by Interest Induction with VR and MRXingrun Shen, Kazuyoshi Yoshino, Shanjun Zhang. 531-541 [doi]
- Bone-Conduction Audio Interface to Guide People with Visual ImpairmentsJacobus Cornelius Lock, Iain D. Gilchrist, Grzegorz Cielniak, Nicola Bellotto. 542-553 [doi]
- Mining Weighted Protein Complexes Based on Fuzzy Ant Colony Clustering AlgorithmYimin Mao, Qianhu Deng, Yinping Liu. 557-569 [doi]
- Mixing Property Tester: A General Framework for Evaluating the Mixing Properties of Initialization of Stream CiphersLin Ding 0001, Dawu Gu, Lei Wang. 570-582 [doi]
- Blockchain Based Data Transmission Control for Tactical Data LinkWei Feng, Yafeng Li, Xuetao Yang, Zheng Yan, Liang Chen. 583-595 [doi]
- A Cyberspace Ontology Model Under Non-cooperative ConditionsJinkui Yao, Yulong Zhao. 596-609 [doi]
- Research on Decentralized Music Sharing Model Based on Consortium BlockchainWentao Gao, Guiyun Zhang. 613-624 [doi]
- A Distributed Storage System Based on Blockchain and Pipelined CodeXuewei Li, Yue Chen, Yang Ba, Shuai Li, Huaiyu Zhu. 625-638 [doi]
- Concept Timestamping on Blockchain and Decentralization of PatentsKar-Seng Loke. 639-648 [doi]
- Smart Wallets on Blockchain - Attacks and Their CostsAkshay Pillai, Vishal Saraswat, Arunkumar V. R.. 649-660 [doi]
- Libra Critique Towards Global Decentralized Financial SystemSaqib Ali, Guojun Wang 0001, Bebo White, Komal Fatima. 661-672 [doi]