A Modified DSM Based on Social Media for Treating Waste Management Issue |
1001-1010 |
Christopher Michael and Ditdit Nugeraha Utama
|
Full Text |
DOI: 10.24507/icicelb.11.11.1001 |
|
|
|
Sleep Quality Monitoring System Based on Container Orchestration
|
1011-1018 |
Nico Surantha, Vincent Valentine Jansen, Wincent and Sani Muhamad Isa
|
Full Text |
DOI: 10.24507/icicelb.11.11.1011
|
|
|
|
Cyber Security: Between Challenges and Prospects
|
1019-1028 |
Mwaffaq Abu-Alhaija
|
Full Text |
DOI: 10.24507/icicelb.11.11.1019 |
|
|
|
Initial Alignment for Large Azimuth Misalignment Angle with Iterated Extended
Kalman Filter
|
1029-1036 |
Yuanfei Zhang and Songyin Cao
|
Full Text |
DOI: 10.24507/icicelb.11.11.1029 |
|
|
|
Research on New Retail Connotation and Business Logic Based on the Perspective
of Consumer Experience
|
1037-1043 |
Jinjin Zhou, Hui Guan and Xiaochen Sun
|
Full Text |
DOI: 10.24507/icicelb.11.11.1037 |
|
|
|
Multi-Platform Development of Visual Programming Language SUGOPRO Using
Node-RED and Cost Reduction of Programming Education Equipment by Self-Made
Robot
|
1045-1051 |
Kohei Sasaishi, Kohei Azuma, Chihiro Koyama, Takeru Kitagutchi
and Naohiko Shimizu
|
Full Text |
DOI: 10.24507/icicelb.11.11.1045 |
|
|
|
Perceived Value of Car Sharing Service and Chinese Consumer’s Continuous Usage
Intention
|
1053-1059 |
Yuanhao Huang and Taesoo Moon
|
Full Text |
DOI: 10.24507/icicelb.11.11.1053 |
|
|
|
A Multi-Criteria Decision-Making Approach Based on Data Envelopment Analysis
Considering Interval Weights in Defense Sector
|
1061-1068 |
Byoung Sung Ko and Moon Soo Cho
|
Full Text |
DOI: 10.24507/icicelb.11.11.1061 |
|
|
|
A Game-Theoretic Collaboration Model for Expanding Parcel Delivery Service
Market
|
1069-1076 |
Seung Yoon Ko, Muzaffar Makhmudov, Ki Ho Chung and Chang Seong Ko
|
Full Text |
DOI: 10.24507/icicelb.11.11.1069 |
|
|
|
Gemological Analysis of Some Rare Gemstones from Mogok Area, Mandalay Region
|
1077-1086 |
Htin Lynn Aung and Thi Thi Zin
|
Full Text |
DOI: 10.24507/icicelb.11.11.1077 |
|
|
|
Analysis of Security Protocols in Wireless Sensor Networks
|
1087-1093 |
Seongwook Youn
|
Full Text |
DOI: 10.24507/icicelb.11.11.1087
|
|
|
|
Multiple Output of Similarity Data by Recalling Type Associative Memory Using
Neuron CMOS Inverter
|
1095-1104 |
Toyoki Saho, Yujiro Harada, Masaaki Fukuhara and Kuniaki Fujimoto
|
Full Text |
DOI: 10.24507/icicelb.11.11.1095 |
|
|
|