FULL PAPERS | ||
Automatic Controlling Fish Feeding Machine Using Feature Extraction of Nutriment and Ripple Behavior | 1483 |
|
Hilmil Pradana and Keiichi Horio DOI: 10.24507/ijicic.17.05.1483 | Full Text | |
Adaptation Feature Norm Method Based on L2-Normalization and Scaling Parameter | 1501 |
|
Liquan Zhao, Siying Zhou and Yanfei Jia DOI: 10.24507/ijicic.17.05.1501 | Full Text | |
The Development of Face Recognition Model in Indonesia Pandemic Context Based on DCNN and Arcface Loss Function | 1513 |
|
Wirianto and Tuga Mauritsius DOI: 10.24507/ijicic.17.05.1513 | Full Text | |
Efficient Task Offloading Strategy for Low-Energy Base Station Groups in Mobile Edge Computing | 1531 |
|
Li Wang and Zhenqi Yuan DOI: 10.24507/ijicic.17.05.1531 | Full Text | |
Large-Scale Positive System Control: Decentralized Control Approach | 1549 |
|
Jana Paulusova and Vojtech Vesely DOI: 10.24507/ijicic.17.05.1549 | Full Text | |
Exergoeconomic Analysis of Ironmaking Process Considering Environmental Impact Cost | 1559 |
|
Huimin Liu, Qiqiang Li, Rui Wang, Ran Ding and Guanguan Li DOI: 10.24507/ijicic.17.05.1559 | Full Text | |
Novel Approach to Decentralized Controller Design for Large Scale Uncertain Linear Systems | 1571 |
|
Vojtech Vesely DOI: 10.24507/ijicic.17.05.1571 | Full Text | |
Optimal Heterogeneous Cloudlet Placement with Delay Constraints and User Dynamics in WMANs | 1581 |
|
Hengzhou Ye, Fengyi Huang and Wei Hao DOI: 10.24507/ijicic.17.05.1581 | Full Text | |
Bidirectional Encoder Representations from Transformers for Cyberbullying Text Detection in Indonesian Social Media | 1599 |
|
Aswin Candra, Wella and Arya Wicaksana DOI: 10.24507/ijicic.17.05.1599 | Full Text | |
Cost-Effective Router/Switch Control System Based on Software-Defined Networking over World Wide Web | 1617 |
|
Akihiro Imae, Osanori Koyama, Keigo Mino, Ippei Tomo, Minoru Yamaguchi, Kento Oyama, Kanami Ikeda and Makoto Yamada DOI: 10.24507/ijicic.17.05.1617 | Full Text | |
Study on Subsidy Strategy of E-Commerce Consumers Choosing Green Packaging from the Perspective of Social Network | 1629 |
|
Huipo Wang and Chen He DOI: 10.24507/ijicic.17.05.1629 | Full Text | |
Automatization News Grouping Using Latent Dirichlet Allocation for Improving Efficiency | 1643 |
|
Tirza Madah Pratidina and Djoko Budiyanto Setyohadi DOI: 10.24507/ijicic.17.05.1643 | Full Text | |
Modeling a Three-Stage Network Data Envelopment Analysis Model - A Case of Efficiency Analysis for Exchange Traded Funds | 1653 |
|
Chen-Yu Kao, Manh-Trung Phung, Cheng-Ping Cheng and Wen-Hung Chung DOI: 10.24507/ijicic.17.05.1653 | Full Text | |
Minimum Variance Estimate with Equality Constraints Based on Matrix-Convex-Combination | 1667 |
|
Yuanlong Yue, Bo Shao and Xin Zuo DOI: 10.24507/ijicic.17.05.1667 | Full Text | |
Cubic Non-Polynomial Spline Approach to the Solution of Lane-Emden Equations | 1681 |
|
Nabaa Najdi Hasan DOI: 10.24507/ijicic.17.05.1681 | Full Text | |
Multimodal Biometric Fusion Online Handwritten Signature Verification Using Neural Network and Support Vector Machine | 1691 |
|
Orieb AbuAlghanam, Layla Albdour and Omar Adwan DOI: 10.24507/ijicic.17.05.1691 | Full Text | |
Unconstrained Continuous Control Set Model Predictive Control Based on Kalman Filter for Active Power Filter | 1705 |
|
Jianfeng Yang, Yang Liu and Zheng Li DOI: 10.24507/ijicic.17.05.1705 | Full Text | |
Network Attack Path Prediction Based on Vulnerability Data and Knowledge Graph | 1717 |
|
Yifan Wang, Zhi Sun and Ye Han DOI: 10.24507/ijicic.17.05.1717 | Full Text | |
Adaptive H-Infinity Vibration Control of Flexible Structure Using Fuzzy Approximator | 1731 |
|
William Fei and Tongyue Hu DOI: 10.24507/ijicic.17.05.1731 | Full Text | |
Calculation Method for the Response Patterns of a Cascade Model Using Its Recursive Property | 1745 |
|
Kohichi Ogata DOI: 10.24507/ijicic.17.05.1745 | Full Text | |
A Road Surface Damage Detection Method Using YOLOv4 with PID Optimizer | 1763 |
|
Li Guo, Runze Li and Bin Jiang DOI: 10.24507/ijicic.17.05.1763 | Full Text | |
The Impact of Flow Experience on Perceived Value and User Stickiness: Taking Competitive Games as an Example | 1775 |
|
Xiaonan Chu and Tao Wen DOI: 10.24507/ijicic.17.05.1775 | Full Text | |
SHORT PAPERS | ||
A Study of Effects of Driver's Sleepiness on Driver's Subsidiary Behaviors | 1791 |
|
Kan Tsubowa, Takuma Akiduki, Zhong Zhang, Hirotaka Takahashi and Yuto Omae DOI: 10.24507/ijicic.17.05.1791 | Full Text | |
Design and Experimental Evaluation of a Stacked Dickson Multiplier for Shockwave Non-Thermal Food Processing | 1801 |
|
Kei Eguchi, Daigo Nakashima, Takaaki Ishibashi and Ichirou Oota DOI: 10.24507/ijicic.17.05.1801 | Full Text |