default search action
4th ICCCS 2019: Singapore
- IEEE 4th International Conference on Computer and Communication Systems, ICCCS 2019, Singapore, February 23-25, 2019. IEEE 2019, ISBN 978-1-7281-1322-7
- Ryo Watanabe, Toshifusa Sekizawa:
Counter Example Analysis of Robot Action Design for Self-localization Based on Model Checking Using Probability Removed Model. 1-4 - Masumi Iwasaki, Rentaro Yoshioka:
Data Augmentation Based on 3D Model Data for Machine Learning. 1-4 - Can Jozef Saul, Ayse Zeynep Kamis, Egemen Sahin:
Carbon Nanotube Coordinate Prediction with Deep Learning. 1-6 - Yixiang Jiang, Yuangen Xu, Qi Xu, Limei Fang, Cong Lin:
Tobacco Industry Data Security Protection System. 1-5 - Siddharth Singh, Raaghavv Devgon:
Analysis of Encryption and Lossless Compression Techniques for Secure Data Transmission. 1-5 - Xiangxi Meng, Haoming Guo, Jianghua Lv, Shilong Ma:
Research on Data Cache Optimization Based on Time Series State Prediction. 1-5 - Yutaro Ueno, Masaomi Kimura:
Transaction Item Embedding by Maximizing A Joint Probability. 5-8 - Anunaya Inani, Chakradhar Verma, Suvrat Jain:
A Machine Learning Algorithm TsF K-NN Based on Automated Data Classification for Securing Mobile Cloud Computing Model. 9-13 - Eran Ozsarfati, Egemen Sahin, Can Jozef Saul, Alper Yilmaz:
Book Genre Classification Based on Titles with Comparative Machine Learning Algorithms. 14-20 - Rai B. Shamantha, Sweekriti M. Shetty, Prakhyath Rai:
Sentiment Analysis Using Machine Learning Classifiers: Evaluation of Performance. 21-25 - Moloud Abdar, Elham Nasarian, Xujuan Zhou, Ghazal Bargshady, Vivi Nur Wijayaningrum, Sadiq Hussain:
Performance Improvement of Decision Trees for Diagnosis of Coronary Artery Disease Using Multi Filtering Approach. 26-30 - Wen-Chung Kuo, Tsung-Ping Liu, Chun-Cheng Wang:
Study on Android Hybrid Malware Detection Based on Machine Learning. 31-35 - Amit Kumar Das, Aziza Ashrafi, Muktadir Ahmmad:
Joint Cognition of Both Human and Machine for Predicting Criminal Punishment in Judicial System. 36-40 - Bikang Peng, Anilkumar Kothalil Gopalakrishnan:
A Face Detection Framework Based on Deep Cascaded Full Convolutional Neural Networks. 47-51 - Ghazal Bargshady, Jeffrey Soar, Xujuan Zhou, Ravinesh C. Deo, Frank Whittaker, Hua Wang:
A Joint Deep Neural Network Model for Pain Recognition from Face. 52-56 - Tayaba Abbasi, King Hann Lann, I. Ismail:
Optimal Input Selection for Recurrent Neural Network in Predictive Maintenance. 57-61 - James Arnold Nogra, Cherry Lyn Cando Sta. Romana, Elmer A. Maravillas:
LSTM Neural Networks for Baybáyin Handwriting Recognition. 62-66 - Sheryl May D. Lainez, Dennis B. Gonzales:
Automated Fingerlings Counting Using Convolutional Neural Network. 67-72 - Jahirul Islam, Masiath Mubassira, Md. Rakibul Islam, Amit Kumar Das:
A Speech Recognition System for Bengali Language using Recurrent Neural Network. 73-76 - Hamed Karbasi, Mehran Jahed:
Introducing a Novel sEMG ANN-Based Regression Approach for Elbow Motion Interpolation. 77-80 - Win Win Myo, Wiphada Wettayaprasit, Pattara Aiyarak:
Designing Classifier For Human Activity Recognition Using Artificial Neural Network. 81-85 - Phan Duy Hung, Le Dinh Huynh:
E-Commerce Recommendation System Using Mahout. 86-90 - Stavros Karmaniolos, Geoff Skinner:
A Literature Review on Sentiment Analysis and its Foundational Technologies. 91-95 - A.-nanya Promkot, Somjit Arch-int, Ngamnij Arch-int:
The Personalized Traditional Medicine Recommendation System Using Ontology and Rule Inference Approach. 96-104 - Chuleepohn Yongkiatpanich, Duangdao Wichadakul:
Extractive Text Summarization Using Ontology and Graph-Based Method. 105-110 - Darwin T. Galleta, Jennifer T. Carpio:
Predicting Regional Development Competitiveness Index Using Naive Bayes: Basis for Recommender System. 115-119 - Myat Cho Mon Oo, Thandar Thein:
Hyperparameters Optimization in Scalable Random Forest for Big Data Analytics. 125-129 - Neha Chauhan, Tsuyoshi Isshiki, Dongju Li:
Speaker Recognition Using LPC, MFCC, ZCR Features with ANN and SVM Classifier for Large Input Database. 130-133 - Elenita T. Capariño, Ariel M. Sison, Ruji P. Medina:
Application of the Modified Imputation Method to Missing Data to Increase Classification Performance. 134-139 - Jianhai Du, Jianghua Lv, Shiwei Gao, Ling Zhan, Qianqian Li, Qinyong Li, Shilong Ma:
Distributed File System for Spacecraft Integrated Test System. 140-144 - Xuedong Xue, Xude Cheng, Wei Peng, Fei Lu, Pin Wang:
Design and Implementation of Software Data Management on Acquiring Training System. 145-148 - Jona P. Tibay, Shaneth C. Ambat, Ace C. Lagman:
School-Based Management Performance Efficiency Modeling and Profiling using Data Envelopment Analysis and K-Means Clustering Algorithm. 149-153 - Pei Wang, Huayu Gao, Zheqi Zhou, Meibo Lv:
A Novel Hybrid Firefly Algorithm for Global Optimization. 164-168 - Tiantian Tan, Baosheng Wang, Yong Tang, Xu Zhou:
An Improved K-means Algorithm for Test Case Optimization. 169-172 - Daranat Tansui, Arit Thammano:
An Improved Invasive Weed Algorithm with RBFNN for Optimizing Classification Problems. 173-177 - Supailin Pichai, Khamron Sunat:
Feature Selection Using GSA-BBO Hybridization Algorithm with Chaos. 178-183 - Worapoj Kreesuradej, Wannasiri Thurachon:
Discovery of Incremental Association Rules Based on a New FP-Growth Algorithm. 184-188 - Froilan E. De Guzman, Bobby D. Gerardo, Ruji P. Medina:
Implementation of Enhanced Secure Hash Algorithm Towards a Secured Web Portal. 189-192 - Jeffrey A. Clarin, Cherry Lyn Cando Sta. Romana, Larmie S. Feliscuzo:
Academic Analytics: Applying C4.5 Decision Tree Algorithm in Predicting Success in the Licensure Examination of Graduates. 193-197 - Ramil G. Lumauag, Ariel M. Sison, Ruji P. Medina:
An Enhanced Recommendation Algorithm Based on Modified User-Based Collaborative Filtering. 198-202 - Meng Sun, Lu Wang, Yiran He:
An Optimization Algorithm for Multiple Measurement Points Placement in SDN. 203-207 - Junji Qiu, Xianglin Lu, Jiayi Lin:
Optimal Selection of Cryptographic Algorithms in Blockchain Based on Fuzzy Analytic Hierarchy Process. 208-212 - Thet Thet Aung, Thi Thi Soe Nyunt, Pyae Pyae Win Cho:
Community Detection in Social Graph Using Nature-Inspired Based Artificial Bee Colony Algorithm with Crossover and Mutation. 213-217 - Alvin Jason A. Virata, Enrique D. Festijo:
Understanding the Acceptance of a Face Recognition-Based Identity Verification System: An Input to its Design and Development in the Philippines. 218-222 - Shinnosuke Kaida, Kousuke Matsushima:
Study on Behavior Prediction Using Multi-object Recognition and Map Information in Road Environment. 223-228 - Dahuang Fan, Lei Ding, Jiehang Deng:
Automatic Detection and Localization of Surface Defects for Whole Piece of Ultrahigh-definition Leather Images. 229-232 - Jihui Zhang, Yan Ding, Hong Xu, Yating Yuan:
An Optical Flow based Moving Objects Detection Algorithm for the UAV. 233-238 - Kyung-Min Kim, Jung-In Choi:
Passengers' Gesture Recognition Model in Self-driving Vehicles : Gesture Recognition Model of the Passengers' Obstruction of the Vision of the Driver. 239-242 - Md Kafiul Islam, Amir Rastegarnia:
Probability Mapping Based Artifact Detection and Wavelet Denoising based Artifact Removal from Scalp EEG for BCI Applications. 243-247 - Rj C. Go, Ryan Rey M. Daga, Maria Elisa B. Gerona:
Image Analysis Protocol for Pollen Viability Identification on Selected Genotypes of Rice (Oryza sativa L.). 248-252 - Chung-Cheng Chiu, Shou-Cih Chen:
Edge Detection Algorithm Based on Texture Blocks. 253-256 - Takeshi Takeda, Kenji Hashimoto, Hiroyuki Seki:
Graph Compression by Tree Grammars and Direct Evaluation of Regular Path Query. 257-262 - Leah G. Rodriguez, Enrico P. Chavez:
Feature Selection for Job Matching Application using Profile Matching Model. 263-266 - Suwannee Jearasuwan, Somkiat Wangsiripitak:
Sketch Image Classification Using Component Based k-NN. 267-271 - Un-Sook Choi, Sung Jin Cho, Jin-Gyoung Kim, Sung Won Kang, Han-Doo Kim, Seok-Tae Kim:
Color Image Encryption Based on PC-MLCA and 3-D Chaotic Cat Map. 272-277 - Anupama D. Dondekar, Balwant A. Sonkamble:
Analysis of Flickr Images Using Feature Extraction Techniques. 278-282 - Sovan Tep, Isara Anantavrasilp:
Robust Image Encryption Method With Cipher Stream Chaining Process. 283-288 - Dennis M. Barrios II, Ramil G. Lumauag, Jolitte A. Villaruz:
Machine Vision-Based Dried Danggit Sorter. 289-293 - Watcharin Maungmai, Chaiwat Nuthong:
Vehicle Classification with Deep Learning. 294-298 - Monirul Islam Pavel, Syed Mohammad Kamruzzaman, Sadman Sakib Hasan, Saifur Rahman Sabuj:
An IoT Based Plant Health Monitoring System Implementing Image Processing. 299-303 - Vannat Rin, Chaiwat Nuthong:
Front Moving Vehicle Detection and Tracking with Kalman Filter. 304-310 - Abdallah Tubaishat:
Security in Cloud Computing: State-of-the-Art, Key Features, Challenges, and Opportunities. 311-315 - Hamed Hamzeh, Sofia Meacham, Botond Virginas, Kashaf Khan, Keith Phalp:
MLF-DRS: A Multi-level Fair Resource Allocation Algorithm in Heterogeneous Cloud Computing Systems. 316-321 - Michael Pendo John Mahenge, Chunlin Li, Camilius A. Sanga:
Collaborative Mobile Edge and Cloud Computing: Tasks Unloading for Improving Users' Quality of Experience in Resource-Intensive Mobile Applications. 322-326 - Cheng-Ta Huang, Cheng-Yu Yang, Chi-Yao Weng, Yen-Wen Chen, Shiuh-Jeng Wang:
Secure Protocol for Identity-based Provable Data Possession in Cloud Storage. 327-331 - Jiakuo Zuo:
Joint Power Allocation and Beamforming in Heterogeneous Cloud Radio Access Networks. 332-336 - Hera Arif, Hassan Hajjdiab, Fatima Al Harbi, Mohammed Ghazal:
A Comparison between Google Cloud Service and iCloud. 337-340 - Junaid Hussain Abro, Chunlin Li, Hammad Ur-Rehman Qaiser:
Adaptive Threshold Detection Based on Current Demand for Efficient Utilization of Cloud Resources. 341-346 - Tiantian Tan, Baosheng Wang, Yong Tang, Xu Zhou:
An Improved Sequence Alignment Method for Fuzzing. 347-350 - Kebing Wang, Bianny Bian, Yan Hao:
Innovative Unit-Vector-Block Storage Format of Sparse Matrix and Vector. 351-354 - Tiantian Tan, Baosheng Wang, Yong Tang, Xu Zhou:
Crash Analysis Mechanisms in Vulnerability Mining Research. 355-359 - Rashedul Amin Tuhin, Bechitra Kumar Paul, Faria Nawrine, Mahbuba Akter, Amit Kumar Das:
An Automated System of Sentiment Analysis from Bangla Text using Supervised Learning Techniques. 360-364 - Syeda Israt Ferdaus, Muhammad Abdullah Adnan:
Privacy in Multi-party Computation in MapReduce. 365-369 - Hasigaowa, Siriguleng Wang:
Research on Unknown Words Processing of Mongolian-Chinese Neural Machine Translation Based on Semantic Similarity. 370-374 - Zijie Wang, Huiyou Chang:
3D Mesh Deformation Using Graph Convolution Network. 375-378 - Kleddao Satcharoen:
The Effect of Icon Entropy, Icon Concreteness and Time on Human Selection Accuracy. 379-382 - Nadeem Iqbal, Osman Hasan, Umair Siddique, Falah Awwad:
Formalization of Asymptotic Notations in HOL4. 383-387 - Iman Saeed, Sarah Baras, Hassan Hajjdiab:
Security and Privacy of AWS S3 and Azure Blob Storage Services. 388-394 - Masafumi Kosugi, Keisuke Utsu, Makoto Tomita, Sachi Tajima, Yoshitaka Kajita, Yoshiro Yamamoto, Osamu Uchida:
A Twitter-Based Disaster Information Sharing System. 395-399 - Rubab Hafeez, Zohaib Amjad Khan, Osman Hasan:
A Generic Virtual Reality Training Simulator for Intracytoplasmic Sperm Injection. 400-403 - Geoff Skinner, Toby Walmsley:
Artificial Intelligence and Deep Learning in Video Games A Brief Review. 404-408 - Abid Jamil, Zeshan Murtza, Muhammad Kashif Nazir, Muhammad Waseem, Zikra Ghulam, Rao Umer Farooq:
A Generic Formal Specification of an Infinite Runner Games for Handheld Devices Using Z-Notation. 409-413 - Mary Ann F. Quioc, Shaneth C. Ambat, Ace C. Lagman:
Medical Cases Forecasting for the Development of Resource Allocation Recommender System. 414-418 - Yasheni Nair Indran Nair, Feninferina Azman, Fiza Abdul Rahim, Lim Kok Cheng:
Endure: Augmented Reality Fitness Mobile Application. 419-424 - Chen peng, Yan Jin Li:
Visualization of Virtual Scene Based on HTC Vive Interactive System. 425-429 - Youki Shiraishi, Akiko Manada, Yuzo Taenaka, Youki Kadobayashi:
A Method for Designing Proximity-Aware Regular Graph-Based Structured Overlay Networks. 430-435 - Baohua Zhao, Ningyu An, Xiao Liang, Chunhui Ren, Zhihao Wang:
Multi-level Anti-buffering Mechanism Based on Embedded Safety Equipment in Power Grid Industry. 436-439 - Szu-Chin Hsu, Cheng-Ta Huang, Chi-Yao Weng, Shiuh-Jeng Wang:
A Logging-in Scheme in Virtual Keyboard Protection from Shoulder Surfing and Screenshot Capturing. 440-444 - Yusuke Nozaki, Masaya Yoshikawa:
Secret Sharing Schemes Based Secure Authentication for Physical Unclonable Function. 445-449 - Xiujuan Wang, Chenxi Zhang, Kangfeng Zheng, Haoyang Tang, Yuanrui Tao:
Detecting Spear-phishing Emails Based on Authentication. 450-456 - Meelis Kitsing:
The Road Not Taken: From Digital Networks to Networked Governance. 457-462 - Grace G. Boqueo, Liriel Iris O. Daya, Mark Erdan II S. Eugenio, Akissa G. Lumagas, Froilan E. De Guzman:
Extensive Assessment of Various Network Interruption Tools. 463-467 - Sumeth Sirijaroensombat, Phaderm Nangsue, Chaodit Aswakul:
Development of Software-Defined Mesh Network Emulator Testbed for DDoS Defence Study. 468-472 - Vishal Gupta, Amrit Kochar, Shail Saharan, Rakhee Kulshrestha:
DNS Amplification Based DDoS Attacks in SDN Environment: Detection and Mitigation. 473-478 - Jayvee Christopher N. Vibar, Ruji P. Medina, Ariel M. Sison:
ERC5a - An Enhanced RC5 Algorithm on Bit Propagation in the Encryption Function. 479-482 - Jiyan Huang, Ying Zhang, Shan Luo:
Analysis of Pilot-Aided Channel Estimation in OFDM System under Phase Noise. 483-487 - Bijaya Paudel, Sina Vafi:
An Unequal Error Protection of Quasi-Cyclic Low Density Parity Check (QC-LDPC) Codes Based on Combinatorial Designs. 488-492 - Kensuke Noda, Yoshihiro Ito:
Proposal of Multi-path TCP Packet Scheduler to Adjust Trade-off between QoS Fluctuation and throughput for WebQoE Improvement. 493-496 - Mohammad Abu Hanif, Sina Vafi:
An Efficient Serially Concatenated Polar Code with Unequal Error Protection Property. 497-501 - Natsu Shoji, Takeshi Sugawara, Mitsugu Iwamoto, Kazuo Sakiyama:
An Abstraction Model for 1-bit Probing Attack on Block Ciphers. 502-506 - Ryochi Kataoka, Akira Yamaguchi, Hiroyuki Shinbo:
Sidelink Grouping Method for Multicasting D2D Signaling Messages with Considerations of Sidelink Transmission Power. 507-511 - Jeerasuda Koseeyaporn, Sakkarin Sinchai, Paramote Wardkein:
Performance of Frequency Translation in Separating a Photoplethysmographic Signal from an Additive Motion Artifact. 512-516 - Wei Wang, Ming Zhang, Bobin Yao, Qinye Yin:
A Fast Peak Searching Method for DOA Estimation Based on CTA. 517-521 - Mridula Korde:
Power Allocation in MIMO Systems Using Game Theory. 522-526 - Gunasekaran Raja, Aishwarya Ganapathisubramaniyan, Gayatri Iyer Sethuraman, Sajjad Hussain Chauhdary, Ali Hassan:
Secured LTE-Wi-Fi Offloading Using RTT Based Evading Malicious Access Point (EMAP) Algorithm. 527-532 - Wei Wei, Junghwan Kim:
Performance Analysis of Circle-Constellation-Based M-DCSK Modulation for Broadcasting Application with Enhanced Reliability by LDPC. 533-537 - Pavan Kumar Mishra, Ashish Kumar Mishra, Sarsij Tripathi:
Relay Selection Scheme for Dynamic Network Scenario in Multi-hop D2D Communication. 538-542 - Bruno Dzogovic, Bernardo Santos, Josef Noll, Van Thuan Do, Boning Feng, Thanh Van Do:
Enabling Smart Home with 5G Network Slicing. 543-548 - Jie Yang, Li Feng, Hong Liang, Tong Jin, Fangxin Xu:
A Novel SDN Design to Support SIC for WiFi Networks. 549-553 - Mengyang Liu, Hongjuan Wang, Yeli Li, Yuning Bian:
Synchronization Simulation and Analysis of OFDM Wireless Communication Technology. 554-558 - Fuxiao Gao, Yi Zhou, Xiaoyong Ma, Tingting Yang, Nan Cheng, Ning Lu:
Coverage-maximization and Energy-efficient Drone Small Cell Deployment in Aerial-Ground Collaborative Vehicular Networks. 559-564 - Moirangthem Marjit Singh, Jyotsna Kumar Mandal:
Gray Hole Attack Analysis in AODV Based Mobile Adhoc Network with Reliability Metric. 565-569 - Tengfei Lian, Yi Zhou, Xianwei Wang, Nan Cheng, Ning Lu:
Predictive Task Migration Modeling in Software Defined Vehicular Networks. 570-574 - Xiaotao Xu, Fan Wu, Yonghong Gao, Yichen Song:
Research on Information Transmission Mechanism of Visible Optical Communication System Based on CLORP. 575-579 - Yeongrok Lee, Sung Sik Nam, Young-Chai Ko:
Implementation of Multiple Signal Classification and Triangulation for Localization of Signal Using Universal Software Radio Peripheral. 580-584 - Omar A. Saraereh:
Microstrip Wearable Dual-Band Antenna Design for ON Body Wireless Communications. 585-589 - Syeda Iffat Naqvi, Muhammad Awais Azam, Yasar Amin, Farzana Arshad, Jonathan Loo, Hannu Tenhunen:
Tri-Band Antenna Array with Defected Ground Structure for mm-Wave 5G Applications. 590-593 - Zain Ul Islam, Zeeshan Ahmed, Iram Nadeem, Faiz K. Lodhi, Ferdows B. Zarrabi, Muhammad Azam:
Spiral Antenna with CPW Feed based on Composite Right/Left-Handed for Ultra Wide Band & Low Frequency Operation. 594-598 - Pingping Tang, Yuning Dong, Shiwen Mao:
Soft Aggregation of Multimedia Flows Based on QoS Classes. 599-603 - Yunus Natanael Pelawi, Irwansyah, Monika Pretty Aprilia:
Implementation of Marketing Communication Strategy in Attention, Interest, Search, Action, and Share (AISAS) Model through Vlog. 604-607 - Eun-bin Ahn, A.-Young Kim, Kwang-deok Seo:
Hybird Media Synchronization Method for Hybrid Media Delivery Service Using MMT Protocol. 608-611 - Muhammad Mukhsin Sultoni, Irwansyah, Ayu Rahma Haninda, Monika Pretty Aprilia:
Digital Content by Online Media and Its Effects on Brand Trust, Brand Credibility, Brand Commitment, and Brand Advocacy (Case on Instagram Account Tirto.id). 612-617 - Sundar Anand, Annie Johnson, Priyanka Mathikshara, Karthik R:
Low Power Real Time GPS Tracking Enabled with RTOS and Serverless Architecture. 618-623 - Mais A. Khalil, David R. Siddle:
A Performance Analysis of the Data Gathering Model for Unslotted CSMA/CA in Home Automation Environment. 624-629 - Navinesshani Permal, Thiviya Barathi Raja Segaran, Renuga Verayiah, Farrukh Hafiz Nagi, Agileswari K. Ramasamy, Sanuri Ishak:
Hardware Implementation of Beam Formed Ultrasonic Bird Deterrent System. 630-633 - Pallavi Yarde, Sumit Srivastava, Kumkum Garg:
A Delay Abridged Judicious Cross-Layer Routing Protocol for Wireless Sensor Network. 634-638 - Pramod Kumar Srivastava, Satya Prakash Pandey, Nishu Gupta, Santar Pal Singh, Rudra Pratap Ojha:
Modeling and Analysis of Antimalware Effect on Wireless Sensor Network. 639-643 - Yi-Wun Lee, Feng-Tsun Chien:
Vehicles Clustering for Low-Latency Message Dissemination in VANET. 644-649 - Weiwei Zhou, Ziyuan Tong, Zhao Yang Dong, Yu Wang:
LoRa-Hybrid: A LoRaWAN Based Multihop Solution for Regional Microgrid. 650-654 - Kuo-Shu Huang:
An Enhanced TR-069 Firmware Upgrade Method of Wi-Fi Mesh System. 655-659 - Zar Zar Oo, Sabai Phyu:
Microclimate Prediction Using Cloud Centric Model Based on IoT Technology for Sustainable Agriculture. 660-663 - Phan Duy Hung, Bui Trong Vinh:
Vulnerabilities in IoT Devices with Software-Defined Radio. 664-668 - Monira Mukta, Samia Islam, Surajit Das Barman, Ahmed Wasif Reza, M. Saddam Hossain Khan:
Iot based Smart Water Quality Monitoring System. 669-673 - Hsiao-Tzu Hsu, Gwo-Jia Jong, Jhih-Hao Chen, Ciou-Guo Jhe:
Improve Iot Security System Of Smart-Home By Using Support Vector Machine. 674-677 - Ekkachan Rattanalerdnusorn, Phithak Thaenkaew, Chalee Vorakulpipat:
Security Implementation For Authentication In Iot Environments. 678-681 - Thanh Nha Dang, Huan Minh Vo:
Advanced AES Algorithm Using Dynamic Key in the Internet of Things System. 682-686 - Ahammad Karim, Muhammad Abdullah Adnan:
An OpenID Based Authentication Service Mechanisms for Internet of Things. 687-692 - Yixiang Jiang, Liujing Wang, Xun Zhang:
Tobacco System Industrial Control System Security. 693-696 - Prayushi Faldu, Nishant Doshi, Reema Patel:
Real Time Adaptive Traffic Control System : A Hybrid Approach. 697-701 - Noli Mark A. Paala, Nikko Marc M. Garcia, Rojimar A. Supetran, Ma. Erica Lyn B. Fontamillas:
Android Controlled Lawn Mower Using Bluetooth and WIFI Connection. 702-706 - Xijiang Wang, Daming Zhou, Ke Zhang:
Application of Active Disturbance Rejection Control Technology in Missile with Thrust Vector Control. 707-711 - Kaori Iwata, Yoshihiro Ito:
Study on Depending on the OpenFlow Controller Placement of Multi-pathization Method. 712-715 - Xiaoyan Zhang, Qiuqiu Wang, Kai Kang:
Research on Access Control Model in Mobile Environment. 716-720 - Pallavi Ram Umare, Shraddha Ganeshlal Jayswal, Shraddha Rajendra Tambakhe, Prathamesh Dnyaneshwar Upadhye, Nilesh Dnyaneshwar Gulhane:
Smart Solution for Traffic Control. 721-724 - Arjun Pardasani, Prithviraj N. Indi, Sashwata Banerjee, Aditya Kamal, Vaibhav Garg:
Smart Assistive Navigation Devices for Visually Impaired People. 725-729 - Hasventhran Baskaran, Rachel Lum Mei Leng, Fiza Abdul Rahim, Mohd Ezanee Rusli:
Smart Vision: Assistive Device for the Visually Impaired Community U sing Online Computer Vision Service. 730-734 - Khan Mohammad Habibullah, Ahashan Alam, Swapnil Saha, Al-Amin, Amit Kumar Das:
A Driver-Centric Carpooling: Optimal Route-Finding Model Using Heuristic Multi-Objective Search. 735-739 - Lin Cui, Bao-Zhu Li:
Method of Road Condition Information Based on Time Decay Adaptive Fitting. 740-745 - Dawn Iris Calibo, Melvin A. Ballera:
Variable Selection for Credit Risk Scoring on Loan Performance Using Regression Analysis. 746-750 - Feni Wahyuni, Irwansyah, Monika Pretty Aprilia:
The Process of Innovation Adoption by the Use of E-Commerce Marketing Application : Case Study on Indonesia Small Medium Enterprise Community. 751-756 - Thaloengpattarakoon Sanboon, Kamol Keatruangkamala, Saichon Jaiyen:
A Deep Learning Model for Predicting Buy and Sell Recommendations in Stock Exchange of Thailand using Long Short-Term Memory. 757-760 - Dawn Iris Calibo, Jonathan M. Caballero, Alvin Jason A. Virata:
M-Commerce Model: An Applied Business Transformation Framework for Tourism Industry. 761-765
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.