ISSN ( ONLINE ) : 2278 - 3091
6 issues per year (February , April, June , August, October, December)
Indian Authors : Rs.1500
Foreign Authors : USD 50
The World Academy of Research in Science and Engineering
Article - 1 | Title | Analysis and Design of Web-Based Knowledge Management System for Real Estate Property | 1 - 7 |
Authors | Wandi Aprianto and Wibowo Kosasih |
Article - 2 | Title | Adjustment of the Andragogical Principles to Adults Learning Information and Communication Technologies - Case of the Educational Administration Cycle (Rabat) | 8 – 13 |
Authors | Samir Nassir and Mhammed Borj |
Article - 3 | Title | Automated Collection of Artifacts from a Live Windows System using e-Triage Tool | 14 – 20 |
Authors | Sri Parvathi Kota and Vijaya Sri Kompalli |
Article - 4 | Title | Adoption of Mobile Smartphone Attendance System Based on Case Study of PT XYZ | 21 – 25 |
Authors | Bunga A. Hutagaol, Lufty Abdilah, Scelen Utari Ramona Jaya and Gunawan Wang |
Article - 5 | Title | Fuzzy Sugeno Algorithm for Clustering Document Management | 26 – 30 |
Authors | Layli Chusna Nikmatul Kamila and Indra Ranggadara |
Article - 6 | Title | Technology Acceptance Model for Online Transportation | 31 – 35 |
Authors | Hilmi Aulawi, Asri Mulyani, Dede Kurniadi and Yosep Septiana |
Article - 7 | Title | Corpus-based Data for Determining Specialised Language Features | 36 – 41 |
Authors | Noorli Khamis and Nurul Farahin Musa |
Article - 8 | Title | Factors Influencing the Adoption of Internet Banking System Using UTAUT Combined TTF at Private Bank Indonesia | 42 – 50 |
Authors | Nilo Legowo and Kinzie Vitalli |
Article - 9 | Title | Prioritization of Software Functional Requirements: A Novel Approach using AHP and Spanning Tree | 51 – 56 |
Authors | Muhammad Yaseen, Aida Mustapha, Mohamad Aizi Salamat and Noraini Ibrahim |
Article - 10 | Title | 3D Printing Watermarking Algorithm Based on 2D Slice Mean Distance | 57 – 64 |
Authors | Thang V. Tran, Giao N. Pham, Binh A. Nguyen, Khoa D. Ta and Phong H. Nguyen |
Article - 11 | Title | Similarity Detection for Hadith of Fiqh of Women using Cosine Similarity and Boyer Moore Method | 65 – 73 |
Authors | Badruzzaman M Yunus, Mohamad Irfan, Wildan Budiawan Zulfikar and Wahyudin Darmalaksana |
Article - 12 | Title | V2V Routing with Fuzzy Inference Mechanism in Vehicular Networks | 74 – 79 |
Authors | Yung-Fa Huang, Teguh Indra Bayu, Hui-Yu Huang and Wen Huang |
Article - 13 | Title | Information Technology for Supply Chain Management: Literature Review | 80 - 86 |
Authors | Shahryar Sorooshian and Tan Seng Teck |
Article - 14 | Title | Conducting Empirical Research Study: How to Effectively and Securely Use the Vital Features of the Active Directory Network Server | 87 - 90 |
Authors | Dr. Omar Khattab, Hadeel Alzayed, Anfal Almutairi and Zainab Yousef |
Article - 15 | Title | Growing Self-Organizing Map through a Hybrid Algorithm of Load Prediction | 91 - 97 |
Authors | Nawaf Alharbe and Fawaz Alharbi |
Article - 16 | Title | Recognition and Retrieval of Mathematical Expressions from Arabic Documents | 98 – 109 |
Authors | Emad Al-Shawakfa and Mohammed Tawalbeh |
Article - 17 | Title | Integrating Digital Health for Healthcare Transformation: Conceptual Model of Smart Healthcare for northern Borneo | 110 – 115 |
Authors | Mohammad Saffree Jeffree, Fatimah Ahmedy, Richard Avoi, Mohd Yusof Ibrahim, Syed Sharizman Syed Abdul Rahim, Firdaus Hayati, Loo Jiann Lin and Nooralisa Mohd Tuah |
Article - 18 | Title | Simplified Geometric Model for Generic Projector Application in Digital Fringe Profilometry | 116 – 123 |
Authors | Cong Kai Yee and Kin Sam Yen |
Article - 19 | Title | Hydromechanical device to clean the inside of pipes from paraffin deposits | 124 – 127 |
Authors | Arthur Nailevich Minnivaleev, Iskander Rustemovich Kuzeev, Timur Nailevich Minnivaleev, Albina Nailevna Minnivaleeva and Mansur Farvazovich Gainanshin |
Article - 20 | Title | Restoration of Natural Images using Iterative Global and Local Adaptive Learning Scheme | 128 – 133 |
Authors | Chiluka Ramesh, Dr.D.Venkat Rao and Dr.K.S.N. Murthy |
Article - 21 | Title | Impact Analysis of Legacy System Migration to the Cloud Environment: A Focused Study | 134 – 141 |
Authors | H. SeetharamaTantry, Murulidhar N.N and K. Chandrasekaran |
Article - 22 | Title | Thematic Analysis for Classifying the Main Challenges and Factors Influencing the Successful Implementation of E-learning System Using NVivo | 142 – 152 |
Authors | Mohammed Amin Almaiah and Ahmed Al Mulhem |
Article - 23 | Title | Simulating the Effect of Non-Axial Airflow on the Motion of an Undriven Propeller | 153 – 159 |
Authors | Francis Gregory Ng and Alvin Chua |
Article - 24 | Title | Construct Validation for Academic Application in Higher Education Institution (HEI) with Rasch Model | 160 – 166 |
Authors | Nur Razia Mohd Suradi, Saliyah Kahar, Azlinda Abdul Aziz and Nor Azliana Akmal Jamaludin |
Article - 25 | Title | Understanding User’s Behavior by Social Media Data Clustering | 167 – 170 |
Authors | Mohamed Shenify |
Article - 26 | Title | Handwritten Phoenician Character Recognition and its Use to Improve Recognition of Handwritten Alphabets with Lack of Annotated Data | 171 – 181 |
Authors | Lamyaa Sadouk, Taoufiq Gadi, El Hassan Essoufi and Abelhak Bassir |
Article - 27 | Title | Mobile App Accessibility for Visually Impaired | 182 – 185 |
Authors | Rishi Sayal, Chatti Subbalakhmi and H S Saini |
Article - 28 | Title | Development and Implementation of Web-based Paperless Student Evaluation for Teachers (PSET) | 186 – 193 |
Authors | Irma T. Plata and John M. Facun |
Article - 29 | Title | Long Short-Term Memory Recurrent Neural Network Architectures for Prediction of HIV-1 Protease Cleavage Sites | 194– 200 |
Authors | Anwar RHEMIMET, Said RAGHAY, Omar BENCHAREF and Younes CHIHAB |
Article - 30 | Title | Development of Construction Robots using Crazyflie | 201– 205 |
Authors | John Philip Figueroa, Isiah Lukang, Francis San Gabriel, Cedric Tan, Antonio Villapando and Alvin Chua |
Article - 32 | Title | Training of a deep learning algorithm for quadcopter gesture recognition | 211– 216 |
Authors | Calvin Ng and Alvin Chua |
Article - 33 | Title | Cyber Attacks and Impacts: A Case Study in Saudi Arabia | 217 – 224 |
Authors | Reem K. Alqurashi, Mohammed A. AlZain, Ben Soh, Mehedi Masud andJehad Al-Amri |
Article - 34 | Title | A Survey on Li Fi Technology and Internet of Things (IOT) | 225 – 232 |
Authors | Ahmad K. Al Hwaitat and Mais Haj Qasem |
Article - 35 | Title | System Dynamics Modelling for Increasing of Paddy Production with Land Suitability Level to Support Food Security | 233 – 239 |
Authors | Seftin Fitri Ana W, Erma Suryani and Mala Rosa Aprillya |
Article - 36 | Title | Improving Performance of TCP-Vegas for Mobile IP Handoffs | 241 – 246 |
Authors | Cheng-Yuan Ho and I-Hsuan Chiu |
Article - 37 | Title | Security of Data Access in Fog Computing using Location-based Authentication | 247 – 254 |
Authors | Ahmad K. Al Hwaitat , Mais Haj Qasem and ,Rim A. Fabozzi |
Article - 38 | Title | Development of a 3D Printed Quadcopter Drone through CFD Analysis | 255 – 260 |
Authors | Jefferson Clark Chan, Smilleon Chua, Zigmund Ian Tria, Hans Yubontoy and Alvin Chua |
Article - 39 | Title | An Improved Trusted On-Demand Multicast Routing with QoS for Wireless Networks | 261 – 265 |
Authors | Jagadeesh Gopal, Vellingiri J, Gitanjali J,Arivuselvan K and Sudhakar S |
Article - 40 | Title | Smart Review of the Application of Genetic Algorithm in Construction and Housing | 266 – 273 |
Authors | Hilary I. Okagbue, Nkolika J. Peter, Adedotun O. Akinola, Chukwuemeka O. Iroham and Akunnaya P. Opoko |
Article - 41 | Title | Strategic Planning of Information Systems in a Timber Company | 274 – 278 |
Authors | Sfenrianto, Muhammad Jibril, Kaman Nainggolan and Viany Utami Tjhin |
Article - 42 | Title | A Mobile Phone Controllable Smart Irrigation System | 279 – 284 |
Authors | Olatunji K. A., Oguntimilehin A. and Adeyemo O. A. |
Article - 43 | Title | Cloud Computing Platform Services in the University Libraries for Digital Repository | 285 – 294 |
Authors | Muhammad Akbar Rivai and Gunaawan Wang |
Article - 44 | Title | Algorithm for ensuring message confidentiality using elliptic curves | 295 – 298 |
Authors | Kuryazov D.M |
Article - 45 | Title | Light-Board: Simple Media to Learn Photosynthesis Concepts | 299 – 303 |
Authors | Rizhal Hendi Ristanto, Mieke Miarsyah, Dewi Robiatun Muharomah, Tri Ayu Astuti, Syarifah Aini and Ary Indaryanti Prihatin |
Article - 46 | Title | Information and logical modeling in construction | 304 – 307 |
Authors | Myasnikov Alexey Georgievich |
Article - 47 | Title | Design of Warehouse Management System for Fresh Product in Supply Chain Network | 308 – 314 |
Authors | Ali Khumaidi, Heru Sukoco, Y. Aris Purwanto and Avip Kurniawan |
Article - 48 | Title | Multilayer Neural Network based on MIMO and Channel Estimation for Impulsive Noise Environment in Mobile Wireless Networks | 315 – 321 |
Authors | Mohammed Amin Almaiah and Mohammed Al-Zahrani |
Article - 49 | Title | Disruptive emerging technologies: Change in service operating model | 322 – 336 |
Authors | Subramaniam Radhakrishnan, Dr. Prashobhan Palakkeel and Dr. Raja Sreedharan. V |
Article - 50 | Title | Investigation on Haze Attenuation Impact on Proposed SCM˗SAC˗OCDMA Based on FSO System by Using MD Code | 337 – 343 |
Authors | H. S. Mohammed, A. Ahmad and Samuel Dowse |
Article - 51 | Title | A Comparative Analysis of Ensemble Classifiers for Text Categorization | 344 – 348 |
Authors | M.Govindarajan |
Article - 52 | Title | Research Scenario of Medical Data Mining Using Fuzzy and Graph theory | 349 – 355 |
Authors | C. Narmatha, Dr. M. Thangamani and S. Jafar Ali Ibrahim |
Article - 53 | Title | Examining Students' Satisfaction and Learning Autonomy through Web-Based Courses | 356 – 370 |
Authors | Hassan Abuhassna, Megat Aman Zahiri Megat Zakaria, Noraffandy Yahya and Azlina Bt. Mohd Kosnin Waleed Mugahed Al-Rahmi |
Article - 54 | Title | Probabilistic Approach for Channel Selection in Centralized Cognitive Scheme Utilizing Invasive Weed Optimization | 371 – 376 |
Authors | D. Sumathi and S. S. Manivannan |
Article - 55 | Title | XGBoost Classification based Network Intrusion Detection System for Big Data using PySparkling Water | 377 – 383 |
Authors | Tadepalli Anish Deepak , Burra Vijaya Babu and Burra Meghana |
Article - 56 | Title | Enterprise Information Technology Strategic Plan (EITSP) delivers Indonesian Bank Performance | 383 – 402 |
Authors | Wellianto Halim, Ir. Bahtiar Saleh Abbas, Wibowo Kosasih, Firdaus Alamsjah and Adler Haymans Manurung |
Article - 57 | Title | Reliability consideration costing method for LIFO Inventory model with Chemical Industry Warehouse | 403 – 408 |
Authors | Ajay Singh Yadav, Navyata, Neelam Sharma, Navin Ahlawat and Anupam Swami |
Article - 58 | Title | Controlling of Wind Turbine Generator System based on Genetic Fuzzy-PID Controller | 409 – 425 |
Authors | Amin Alqudah, Ahmad M. Ashour and Shadi A. Alboon |
Article - 59 | Title | A Brief on Snoring Data and Classification Methods | 426 – 432 |
Authors | Tosin A. Adesuyi, Byeong Man Kim and Yoon Sik Shin |
Article - 60 | Title | A Triaxial Model for the Digital Maturity Diagnosis | 433 – 439 |
Authors | Fadwa Zaoui1, Nissrine Souissi2 |
Article - 61 | Title | The Effect of Electronic Educational Assessment Environment (Navigation and Content) on Students' Intention to use MOBILE BASED ASSESSMENT from Motivational Perspective View | 440 – 453 |
Authors | Ali Mamduh Alrfooh and Muhammad Modi Lakulu |
Article - 62 | Title | A Hybrid Genetic Algorithms and Sequential Simulated Annealing for a Constrained Personal Reassignment Problem to Preferred Posts | 454 – 464 |
Authors | Saiid Tkatek. Otman Abdoun. Jaafar Abouchabaka and Najat Rafalia |
Article - 63 | Title | Developing Management of Quran Memorization Institutions through the Web System | 465 – 468 |
Authors | Tedi Priatna, Nurhamzah, Yaya Suryana and Nano Nurdiansah |
Article - 64 | Title | An Efficient Effort Estimation of a Java Program using Cyclomatic Complexity | 469 – 475 |
Authors | P.Veera Sekhar, Vamsidhar Enireddy, K.Bhargav Ram and D.V.SaiSubba Reddy |
Article - 65 | Title | Gamification for Better Patient Experience in Queue at the Hospital | 476 – 479 |
Authors | Gunawan Wang, Hans Kristian and Paul Weniko |
Article - 66 | Title | One-Class Conditional Anomaly Detection Algorithm (OCCADA) for Multiple Linear and Logistic Regression | 480 – 489 |
Authors | Ivy Kim D. Machica, Bobby D. Gerardo and Ruji P. Medina |
Article - 67 | Title | Machine Learning Approach towards Tomato Leaf Disease Classification | 490 – 495 |
Authors | H. D. Gadade and. D.K.Kirange |
Article - 68 | Title | The Geometrical Based Lip-Reading Techniques of Multi-Dimensional Dynamic Time Warping MDTW and Hidden Markov Models HMMs in the Audio Visual Speech Recognition | 496 – 504 |
Authors | Muhammad Ismail Mohmand, Amiya Bhaumik, Poom Kumam, Qayyum Shah and Muhammad Humayun |
Article - 69 | Title | Towards a system for predicting the category of educational and vocational guidance questions using bidirectional encoder representations of transformers (BERT) | 505 – 511 |
Authors | Omar Zahour, El Habib Benlahmar, Ahmed Eddaoui and Oumaima Hourrane |
Article - 70 | Title | Implementation of Lean Manufacturing Principles in a Vertical Farming System to Reduce Dependency on Human Labour | 512 – 520 |
Authors | Tan Gar Heng, Allan, Hassan bin Mohamed and Zubaidi Faisel bin Mohamed Rafaai |
Article - 71 | Title | Synthesis and Characterization of Chitosan based Catalyst for Catalysis Applications | 521 – 527 |
Authors | Hany A. Elazab , Yousab G. Remiz, Mostafa A. Radwan andM. A. Sadek |
Article - 72 | Title | A Computer Based Intelligent System for Managing Typhoid Fever | 528 – 532 |
Authors | Oguntimilehin A, Olatunji K.A and Abiola O.B |
Article - 73 | Title | Enhancing Data Security under Multi-Tenancy within Open Stack | 533 – 544 |
Authors | M Trinath Basu andJKR Sastry |
Article - 74 | Title | Rehabilitation Hand Exercise System with Video Games | 545 – 551 |
Authors | Nurul Atikah Mazlan, Murizah Kassim, Saiful Izwan Suliman and Norsuzila Ya’acob |
Article - 75 | Title | Analysis and Design of a Hybrid Load Management method for the IoT Networks | 552 – 557 |
Authors | Vitalii Savchenko , Volodymir Druzhynin, Mykola Tverdohlib, Yevhen Ivanichenko, Nadiia Dovzhenko, Zoreslava Brzhevska and Valentina Chorna |
Article - 76 | Title | Accessibility Evaluation of Peruvian E-Commerce Websites | 558 – 561 |
Authors | Freddy Paz, Freddy Asrael Paz, Daniela Villanueva, Arturo Moquillaza and Juan Arenas |
Article - 77 | Title | Speaker Feature Modeling Utilizing Constrained Maximum Likelihood Linear Regression and Gaussian Mixture Models | 562 – 566 |
Authors | Elmer R. Magsino |
Article - 78 | Title | An Improved Weighted KNN Algorithm for Indoor Positioning using Beacon Devices | 567 – 573 |
Authors | Chuan-Bi Lin, Jong-Shin Chen, Yong-Yu Peng and Yung-Fa Huang |
Article - 79 | Title | Design of BCD Adder using Quantum Cellular Automata | 574 – 578 |
Authors | J. Lakshmi Prasanna, R.S. Ernest Ravindran, M. Ravi Kumar, K. Sree Pooja, U V S Sumanth, Shaik Ahamed and Chella Santhosh |
Article - 80 | Title | Development of Breast Cancer Self-Examination Three Dimensional Simulation | 579 – 586 |
Authors | Sarni Suhaila Rahim, Nur Aishah Jamal Akhshah and Shahril Parumo |
Article - 81 | Title | Traffic Light Control at Crossroad using Graph theory with Matlab | 587 – 589 |
Authors | Sweta Srivastav and Sangeeta Gupta |
Article - 82 | Title | Image Registration Method for Satellite Image Sensing using Feature based Techniques | 590 – 593 |
Authors | Sreemanth Pisupati and Mohammed Ismail.B |
Article - 83 | Title | Recognition of Baybayin Symbols (Ancient Pre-Colonial Philippine Writing System) using Image Processing | 594 – 598 |
Authors | Mark Jovic A. Daday, Arnel C. Fajardo and Ruji P. Medina |
Article - 84 | Title | The Application of Big Data Analytics in Supply Planning | 599 – 609 |
Authors | Makmur, Maria Theresa Viega and Gunawan Wang |
Article - 85 | Title | Classification of Satellite Image based on Quantum Approach and the Tsallis Entropy | 610 – 617 |
Authors | Saleh EL JOUMANI, Salah Eddine MECHKOURI, Rachid ZENNOUHI and Lhoussaine MASMOUDI |
Article - 86 | Title | Recombined and Hybridized Speaker Recognition System (SRS) | 618 – 623 |
Authors | LAMKADAM ABDELMAJID and KARIM MOHAMED |
Article - 87 | Title | Development of Fast and Soft Landing System for Quadcopter Drone using Fuzzy Logic Technology | 624 – 629 |
Authors | Ashish Kumar and Sugjoon Yoon |
Article - 88 | Title | A Framework to succeed IT Project Management in an era of Digital Transformation | 630– 636 |
Authors | Rachida HASSANI and Younès EL BOUZEKRI EL IDRISSI |
Article - 89 | Title | The Mosaic Sustainable Marker Model for Augmented Reality Systems | 637– 642 |
Authors | Hennadii Khudov, Olexander Makoveychuk, Irina Khizhnyak, Iryna Yuzova, Artem Irkha and Vladyslav Khudov |
Article - 90 | Title | Classification of User Comment Using Word2vec and SVM Classifier | 643– 648 |
Authors | Rafly Indra Kurnia, Yoshua Daniel Tangkuman and Abba Suganda Girsang |
Article - 91 | Title | Approbation of a method for studying the reflection of emotional state in children's speech and pilot psychophysiological experimental data | 649– 656 |
Authors | Elena Lyakso, Nersisson Ruban, Olga Frolova, Viktor Gorodnyi and Yuri Matveev |
Article - 92 | Title | Semantic Web Services Discovery Approach Based on MARDS | 657– 663 |
Authors | Mohamed HALIM, Nouha ADADI, Driss CHENOUNI and Mohammed BERRADA |
Article - 93 | Title | Business Intelligence Infrastructure of Medical Record Data History System to help Doctorin differencing rare and dangerous disease in patient | 664– 672 |
Authors | Dewo Wishnu Setya Kusuma, Muhammad Akbar Rivai and Gunawan Wang |
Article - 94 | Title | Popularity as an External Factor that Affecting the Usage of Mobile Banking BCA by Using Technology Acceptance Model (TAM) | 673– 677 |
Authors | Putri Natasya Fanuel, Rayhana Afita, Taskia Fira Indriasari, Sfenrianto and Gunawan Wang |
Article - 95 | Title | Fruit Grading System using k means clustering and Artificial Neural Network | 678– 681 |
Authors | Shubhangi Neware |
Article - 96 | Title | A Novel Key Scheduling Algorithm for Lightweight Cryptographic Applications | 682 – 684 |
Authors | Asmita Poojari, Nagesh HR, Kiran Kumar V G and Shantharama Rai C |
Article - 97 | Title | Sentiments Analysis On Public Land Transport Infrastructure in Davao Region using Machine Learning Algorithms | 685 – 690 |
Authors | Mark Van M. Buladaco, Jumar S. Buladaco and Laarni M. Cantero |
Article - 98 | Title | Mathematica as an Efficient Tool to Optimize the Kinetic Study of Ethyl Acetate Hydrolysis | 691– 697 |
Authors | M. H. El Dewaik, Mamdouh Gadalla, M. A. Sadek and, Hany A. Elazab |
Article - 99 | Title | Integration of Gem5 And Dramsim2 For DDR4 Simulation | 698 – 703 |
Authors | P. Karunamurthy, S.S.N Alhady, A.A.A Wahab and W.A.F.W Othman |
Article - 100 | Title | Development of Novel adsorbent for Industrial waste water treatment | 704 – 712 |
Authors | Hassaan M. Shehata, Dalia A. Ali, Islam M. Al-Akraa, Hany A. Elazab and Hoda A. Elsawy |
Article - 101 | Title | A Virtual reality serious game for Language learning | 713 – 716 |
Authors | Yassine Tazouti, Siham Boulaknadel and Youssef Fakhri |
Article - 102 | Title | Big Data Management Challenges | 717 – 723 |
Authors | Sabrina Šuman, Patrizia Poščić and Maja Gligora Marković |
Article -103 | Title | Twitter Sentiment Analysis: A Political View | 723 – 729 |
Authors | Joylin Priya Pinto, Vijaya Murari T. and Soumya Kelur |
Article - 104 | Title | Trend Analysis of Hospitals Efficiency Using an Operational Research Technique Approach | 730 – 736 |
Authors | Teg Alam and Ayman Mahgoub |
Article - 105 | Title | Regression Testing: Analysis of its Techniques for Test Effectiveness | 737 – 744 |
Authors | Omdev Dahiya, Kamna Solanki, Sandeep Dalal and Amita Dhankhar |
Article - 106 | Title | Analysis of IT Graduates Employment Alignment Using C4.5 and Naïve Bayes Algorithm | 745 – 752 |
Authors | Pamela Grace . Denila, Allemar Jhone P. Delima and Ramcis N. Vilchez |
Article - 107 | Title | Students Performance in Board Examination Analysis using Naïve Bayes and C4.5 Algorithms | 753 – 758 |
Authors | Edison L. Polinar, Allemar Jhone P. Delima and Ramcis N. Vilchez |
Article - 108 | Title | IT Students Selection and Admission Analysis using Naïve Bayes and C4.5 Algorithm | 759 – 765 |
Authors | Jovanne C. Alejandrino, Allemar Jhone P. Delima and Ramcis N. Vilchez |
Article - 109 | Title | Algorithmic Analytics for Outcomes-based Tertiary Education Performance Assessment | 766 – 773 |
Authors | Glendell R. Jadraque, Allemar Jhone P. Delima and Ramcis N. Vilchez |
Article - 110 | Title | Predicting Students' Dropout Indicators in Public School using Data Mining Approaches | 774 – 778 |
Authors | Jay S. Gil, Allemar Jhone P. Delima and Ramcis N. Vilchez |
Article - 111 | Title | Prediction of Employees’ Lateness Determinants using Machine Learning Algorithms | 779 – 783 |
Authors | John Louis D. Mercara, Allemar Jhone P. Delima and Ramcis N. Vilchez |
Article - 112 | Title | An Efficient Hybrid Conjugate Gradient Coefficient u nder Inexact Line Search | 784 – 788 |
Authors | Talat Alkhouli, Ibrahim Mohammed Sulaiman, Mohd Rivaie and Mustafa Mamat |
Article - 113 | Title | Performance improvement model for Airlines connectivity system using Network Science | 789 – 792 |
Authors | Shanmuk Srinivas Amiripalli, Vishnu Vardhan Reddy Kollu, B.J. Jaidhan, L Srinivasa Chakravarthi and Vachavaya Asish Raju |
Article - 114 | Title | A Web-Based Yorùbá to English Bilingual Lexicon for Building Technicians | 793 – 800 |
Authors | Abiola O.B, Adeyemo O.A, Saka-Balogun O.Y and Okesola F |
Article - 115 | Title | Forecasting of the Air Pollution Based on Meteorological Data and Air Pollutants using Deep Learning: A Novel Review | 801 – 807 |
Authors | Keerthana R and Dr. Varghese S Chooralil |
Article - 116 | Title | An Approach for Translation of Text in Images using Deep Learning Techniques | 808 – 812 |
Authors | Ashwini V. Zadgaonkar and Rupali S. Vairagade |
Article - 117 | Title | A hybrid Feature Selection Approach for Arabic Handwritten Text Based on Genetic Algorithm and Support Vector Machine | 813 – 819 |
Authors | Atallah AL-Shatnawi, Faisal Al-Saqqar and Hamza Al-Smadi |
Article - 118 | Title | Towards a Reference Big Data architecture for sustainable smart cities | 820 – 827 |
Authors | Saida EL MENDILI , Younès EL BOUZEKRI EL IDRISSI and Nabil HMINA |
Article - 119 | Title | Abnormal X-Ray Detection System using Convolution Neural Network | 828 – 832 |
Authors | Shubhangi Tirpude, Naman Vidyabhanu, Hashir Sheikh, Shoeb Pathan, Zeeshan Ali syed and Shivam Singh |
Article - 120 | Title | The Impact of IT Capability and Supply Chain Agility in the Electronic Home Appliance Retail at Indonesia | 833 – 844 |
Authors | Arya Permadi, Tirta Nugraha Mursitama, Mohammad Hamsal and Agustinus Bandur |
Article - 121 | Title | ORBOID: Robotic VR based Application for Remote Regions | 845 – 851 |
Authors | Heena M. Agrawal and Shyamal G. Mundada |
Article - 122 | Title | Design of Sequence Detector using Finite State Machine | 852 – 858 |
Authors | S. G. Mundada and H. M. Agrawal |
Article - 123 | Title | Generic Model of Fuzzy Profile Matching for Determining the Best Marketer | 859 – 869 |
Authors | Sherly Oktafiani and Ditdit Nugeraha Utama |
Article - 124 | Title | C4.5 Algorithm with Average Gain to Predict Human Development Index in Indonesia | 870 – 874 |
Authors | Jajam Haerul Jaman, Alya Farhah Bahira, Tesa Nur Padilah and Munir |
Article - 125 | Title | Resource Management and Simulation Tools in Fog Computing – A comparative Study | 875 – 882 |
Authors | Vadde Usha and Dr Vijaya Sri Kompalli |
Article - 126 | Title | A Review of Shape Variations and Test Angles for Crash Box Application | 893 - 890 |
Authors | Jeffery Jep Brown and Al Emran Ismail |
Article - 127 | Title | Optimal Number of Cluster Heads in Wireless Sensors Networks Based on LEACH | 891 – 895 |
Authors | Ghassan Samara and Munir Al-okour |
Article - 128 | Title | Development of Adobe Flash Media Integrated Into HOTS on Circulation System (AF-HOTS Bicycle Media) | 896 – 903 |
Authors | Mieke Miarsyah, Rizhal Hendi Ristanto, Nurhayati, Siti Nur Mufida, Suparini and Astuti Esti Zharroh |