default search action
11th EIDWT 2023: Semarang, Indonesia
- Leonard Barolli:
Advances in Internet, Data & Web Technologies - The 11th International Conference on Emerging Internet, Data & Web Technologies, EIDWT 2023, Semarang, Indonesia, 23-25 February 2023. Lecture Notes on Data Engineering and Communications Technologies 161, Springer 2023, ISBN 978-3-031-26280-7 - Kittayaporn Chantaranimi, Juggapong Natwichai, Pawat Pajsaranuwat, Anawat Wisetborisut, Surapong Phosu:
Data Integration in Practice: Academic Finance Analytics Case Study. 1-11 - Fumitaka Matsubara, Tomoyuki Ishida:
Proposal of an Aquarium Design Support Virtual Reality System. 12-21 - Patcharaprapa Khamkhiaw, Chartchai Doungsa-ard, Passakorn Phannachitta:
The Source Code Maintenance Time Classifications from Code Smell. 22-32 - Ruiyi Cui, Deng Na, Zheng Cheng:
Evolution Analysis of R&D Jobs Based on Patents' Technology Efficacy Labeling. 33-43 - Edy Suprianto, Dedi Rusdi, Ahmad Salim:
The Models of Improving the Quality of Government Financial Reporting. 44-51 - Chunming Zhang:
Fuzzy Mean Clustering Analysis Based on Glutamic Acid Fermentation Failure. 52-63 - Zainal Alim Adiwijaya, Edy Suprianto, Dedi Rusdi:
Mustahik Micro Business Incubation in Poverty Alleviation. 64-75 - Yiyue Sun:
T - ψ Schemes for a Transient Eddy-Current Problem on an Unbounded Area. 76-84 - Bedjo Santoso, Provita Wijayanti, Fenita Austriani:
Zakat Management Model Based on ICT. 85-97 - Yanyan Zhao, Qiong Li, Xuhui Fan, Lili Su, Jingtao Li, Xiaokang Liu:
Teaching Method of Advanced Mathematics Combining PAD Classroom with ADDIE Model. 98-107 - Xiaokang Liu, Jiangtao Li, Yanyan Zhao, Yiyue Sun, Haibo Zhang:
A Kind of Online Game Addictive Treatment Model About Young Person. 108-117 - Jing Zhang, Juan Li:
Research on E-commerce Customer Value Segmentation Model Based on Network Behavior. 118-128 - Elis Kulla, Leonard Barolli, Keita Matsuo, Makoto Ikeda:
Blockchain Applications for Mobility-as-a-Service Ecosystem: A Survey. 129-140 - Dong Chen, Tanping Zhou, Wenchao Liu, Zichen Zhou, Yujie Ding, Xiaoyuan Yang:
Construction of a Fully Homomorphic Encryption Scheme with Shorter Ciphertext and Its Implementation on the CUDA Platform. 141-151 - Pengju Liu, Baojiang Cui, Can Cui:
Traffic-Oriented Shellcode Detection Based on VSM. 152-162 - Lisa Kartikasari, Muhammad Ali Ridho:
Supply Chain Finance Mediates the Effect of Trust and Commitment on Supply Chain Effectiveness. 163-170 - Mutamimah Mutamimah, Indri Kartika:
Blockchain Technology and Financing Risk in Profit Loss Sharing Financing of Indonesian Islamic Bank. 171-179 - TieSen Zhao, LiPing Shi:
Privacy-Preserving Scheme for Nearest Life Services Search Based on Dummy Locations and Homomorphic Encryption Algorithm. 180-189 - Cheng Zheng, Na Deng, Ruiyi Cui, Hanhui Lin:
Terminology Extraction of New Energy Vehicle Patent Texts Based on BERT-BILSTM-CRF. 190-202 - Luluk Muhimatul Ifada, Naila Najihah, Farikha Amilahaq, Azizah Azmi Khatamy:
Conceptual Paper of Environmental Disclosure and Financial Performance: The Role of Environmental Performance. 203-214 - Qiong Zhang, Xu Chen:
Applying BERT on the Classification of Chinese Legal Documents. 215-222 - Ruiyi Cui, Na Deng, Cheng Zheng:
Technology and Efficacy Extraction of Mechanical Patents Based on BiLSTM-CRF. 223-234 - Olivia Fachrunnisa, Nurhidayati, Ardian Adhiatma:
Talent Incubator System: A Conceptual Framework of Employee Recruitment Strategy in Digital Era. 235-242 - Nontakan Nuntachit, Karn Patanukhom, Prompong Sugunnasil:
Thai Word Disambiguation: An Experiment on Thai Language Dataset with Various Deep Learning Models. 243-247 - Tomoya Enokido, Dilawaer Duolikun, Makoto Takizawa:
Energy-Efficient Locking Protocol in Virtual Machine Environments. 248-255 - Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
A Flexible Fog Computing (FTBFC) Model to Reduce Energy Consumption of the IoT. 256-267 - Rongrong Zhang, Zhiqiang Gao, Di Zhou:
Research on Federated Learning for Tactical Edge Intelligence. 268-274 - Shigenari Nakamura, Tomoya Enokido, Makoto Takizawa:
Load Balancing Algorithm for Information Flow Control in Fog Computing Model. 275-283 - Xuanzhu Sheng, Zhiqiang Gao, Xiaolong Cui, Chao Yu:
Federated Reinforcement Learning Technology and Application in Edge Intelligence Scene. 284-291 - Xu An Wang, Mingyu Zhou, Wenyong Yuan:
Cryptanalysis of a Public Cloud Auditing Scheme. 292-296 - Phudit Ampririt, Makoto Ikeda, Keita Matsuo, Leonard Barolli:
A Fuzzy-Based Approach for Selection of Radio Access Technologies in 5G Wireless Networks. 297-307 - Shinji Sakamoto, Admir Barolli, Yi Liu, Elis Kulla, Leonard Barolli, Makoto Takizawa:
A Comparison Study of FC-RDVM and LDVM Router Placement Methods for WMNs Considering Uniform Distribution of Mesh Clients and Different Instances. 308-316 - Keita Matsuo, Elis Kulla, Leonard Barolli:
Performance Evaluation of FBRD Protocol Considering Transporter Autonomous Underwater Vehicles for Underwater Optical Wireless Communication in Delay Tolerant Networking. 317-323 - Yoshitaka Shibata, Yasushi Bansho:
A Road State Decision Method Based on Roughness by Crowd Sensing Technology. 324-330 - Yuki Nagai, Aoto Hirata, Chihiro Yukawa, Kyohei Toyoshima, Tetsuya Oda, Leonard Barolli:
Experimental Results of a Wireless Sensor Network Testbed for Monitoring a Water Reservoir Tank Considering Multi-flows. 331-340 - Kyohei Toyoshima, Chihiro Yukawa, Yuki Nagai, Nobuki Saito, Tetsuya Oda, Leonard Barolli:
A Depth Camera Based Soldering Motion Analysis System for Attention Posture Detection Considering Body Orientation. 341-349 - Chihiro Yukawa, Nobuki Saito, Aoto Hirata, Kyohei Toyoshima, Yuki Nagai, Tetsuya Oda, Leonard Barolli:
Effect of Lighting of Metal Surface by Different Colors for an Intelligent Robotic Vision System. 350-356 - Zimin Li, Feng Pan:
A Design and Implementation of Dynamic Display Boards in a Virtual Pavilion Based on Unity3D. 357-364 - Rui Deng, Yanli Fu, Shuyao Li:
A Comparative Study of Several Spatial Domain Image Denoising Algorithm. 365-374 - Rui Shan, Wei Shi, Zhu Teng, Yoshihiro Okada:
A Pedestrian Avoidance System for Visual Impaired People Based on Object Tracking Algorithm. 375-385 - Yuta Miyahara, Kosuke Kaneko, Toshioh Fujibuchi, Yoshihiro Okada:
Web-Based Collaborative VR System Supporting VR Goggles for Radiation Therapy Setup Training. 386-400 - Yoshihiro Okada, Kosuke Kaneko, Wei Shi:
Development Framework Using 360VR Cameras and Lidar Scanners for Web-Based XR Educational Materials Supporting VR Goggles. 401-412 - Admir Barolli, Kevin Bylykbashi, Leonard Barolli, Ermioni Qafzezi, Shinji Sakamoto, Makoto Takizawa:
A Comparison Study of LDVM and RDVM Router Replacement Methods by WMN-PSODGA Hybrid Simulation System Considering Two Islands Distribution of Mesh Clients. 413-422 - Mitsuki Tsuneyoshi, Makoto Ikeda, Leonard Barolli:
FBCF: A Fuzzy-Based Brake-Assisting Control Function for Rail Vehicles Using Type-1 and Type-2 Fuzzy Inference Models. 423-431 - Rui Peng, Xinyun Wu, Caiquan Xiong:
A Memetic Approach for Classic Minimum Dominating Set Problem. 432-440 - Vivatchai Kaveeta, Prompong Sugunnasil, Juggapong Natwichai:
Exploration of Neural Network Imputation Methods for Medical Datasets. 441-450 - Qiong Zhang, Xu Chen:
Applying BBLT Incorporating Specific Domain Topic Summary Generation Algorithm to the Classification of Chinese Legal Cases. 451-459 - Ermioni Qafzezi, Kevin Bylykbashi, Elis Kulla, Makoto Ikeda, Keita Matsuo, Leonard Barolli:
Implementation of a Fuzzy-Based Testbed for Coordination and Management of Cloud-Fog-Edge Resources in SDN-VANETs. 460-470 - Weijie Chen, Caiquan Xiong, Xinyun Wu:
A Consistency Maintenance Method Integrating OT and CRDT in Collaborative Graphic Editing. 471-482 - Noppon Wongta, Juggapong Natwichai:
Data Pipeline of Efficient Stream Data Ingestion for Game Analytics. 483-490 - Zhuorao Yang, Baojiang Cui, Can Cui:
IPT-CFI: Control Flow Integrity Vulnerability Detection Based on Intel Processor Trace. 491-499 - Agustina Fitrianingrum, Maya Indriastuti, Andi Riansyah, Abdul Basir, Dedi Rusdi:
Business Intelligence: Alternative Decision-Making Solutions on SMEs in Indonesia. 500-507
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.