Abstract is missing.
- Key note speech 1: Predicting the overall value of decisions relating to softwareEmilia Mendes. [doi]
- Improved active power sharing strategy for ELC Controlled Synchronous Generators Based Islanded Micro Grid applicationNetra Gyawali, Bikram Paudel, Baburam Subedi. 1-5 [doi]
- A word sense disambiguation method for feature level sentiment analysisUmar Farooq, Tej Prasad Dhamala, Antoine Nongaillard, Yacine Ouzrout, Muhammad Abdul Qadir. 1-8 [doi]
- A cyber-physical model for platoon systemMadeleine El-Zaher, Baudouin Dafflon, Franck Gechter. 1-8 [doi]
- Preserving privacy in social network graph with K-anonymize degree sequence generationMunmun Bhattacharya, Papri Mani. 1-7 [doi]
- A DBMS based inventory model and its timeframe study in automobile spare parts import managementPrem Lal Tamang, Pradip Kumar Paudyal. 1-8 [doi]
- Collaborative crosschecking system of observed loss estimation for disaster relief managementSirinrat Khwanpheng, Khin T. Lwin, Roungsan Chaisricharoen, Punnarumol Temdee. 1-5 [doi]
- On the study of wireless signal noise for designing network infrastructure of knowledge management systemsChunbo Luo, Pablo Casaseca-de-la-Higuera, Xinheng Wang, Keshav P. Dahal, Cheng Jin, Peng Ren 0001. 1-8 [doi]
- Deep learning based large scale handwritten Devanagari character recognitionShailesh Acharya, Ashok Kumar Pant, Prashnna Kumar Gyawali. 1-6 [doi]
- A holistic simulation model for remote patient monitoring systems using Wireless Body Area Sensor Networks (WBASNs)Muhammad Sajjad Akbar, Hongnian Yu, Shuang Cang. 1-5 [doi]
- A systematic mapping study on assitive technologies for people with dementiaIkram Asghar, Shuang Cang, Hongnian Yu. 1-8 [doi]
- EMYNOS: A next generation emergency communication platform for people with disabilitiesFoteini Andriopoulou, Ilias Politis, Asimakis Lykourgiotis, Tasos Dagiuklas, Dionisios Serras, Yacine Rebahi. 1-8 [doi]
- Color image steganography technique using daubechies discrete wavelet transformAjaya Shrestha, Arun Timalsina. 1-7 [doi]
- Control of PMSG based wind turbines for renewables based DC distributionH. P. Rimal, M. Breuna, N. R. Karki, A. K. Verma. 1-7 [doi]
- Communication related issues in GSD: An exploratory studyMohammad Shameem, Chiranjeev Kumar, Bibhas Chandra. 1-5 [doi]
- Visual cryptography using image pixel transparency with cover imageDipesh Shrestha, Sanjeeb Prasad Panday. 1-4 [doi]
- Integrating romanized Nepali spellchecker with SMS based decision support system for Nepalese farmersBidur Devkota, Bikram Adhikar, Deepanjal Shrestha. 1-6 [doi]
- Modelling of tumour-induced angiogenesis with regress by immune factorWei Chen, Li Zhang, Ling Shao 0001, Rosemary Bass, Chenyu Liu, M. Alamgir Hossain. 1-8 [doi]
- Human action invarianceness for human action recognitionNilam Nur Amir Sjarif, Siti Mariyam Shamsuddin. 1-7 [doi]
- Detection of phishing emails using data mining algorithmsSami Smadi, Nauman Aslam, Li Zhang 0013, Rafe Alasem, M. Alamgir Hossain. 1-8 [doi]
- Serious game to motivate the knowledge sharing among knowledge technicians in machinery relocation of foreign direct investmentPiang-or Loahavilai, Nopasit Chakpitak, Pradorn Sureephong, Keshav P. Dahal. 1-7 [doi]
- Hybrid approach to distributed Wi-Fi performance assessment for multi-floor structuresDeepak Bhardwaj, Kotaro Kataoka, V. Amith Vikram, Vishal Hirani. 1-8 [doi]
- A regression analysis into Nepali ICT's energy consumption and its implicationsNischal Regmi, Shailesh B. Pandey. 1-8 [doi]
- Performance analysis of various optimization techniques for elliptic curve cryptosystems on resource-constrained devicesJagdish Bhatta, Lok Prakash Pandey. 1-7 [doi]
- A practical way to integrate simulation based on SCOR modelNapaporn Reeveerakul. 1-5 [doi]
- The effect of the time unit on software development effort estimatesMagne Jørgensen. 1-5 [doi]