Some Variants of Cellular Automata (Ray-Ming Chen).Pages 253-263Īn Exchange Center Based Digital Cash Payment Solution (Yong Xu, Jingwen Li).Pages 265-274ĭesign and Implementation of Pianos Sharing System Based on PHP (Sheng Liu, Chu Yang, Xiaoming You).Pages 275-285Ī Stochastic Framework for Social Media Adoption or Abandonment: Higher Education (Mostafa Hamadi, Jamal El-Den, Cherry Narumon Sriratanaviriyakul, Sami Azam).Pages 287-299 Rokonuzzaman).Pages 233-243ĭesigning and Developing a Game with Marketing Concepts (Towsif Zahin Khan, Shairil Hossain Tusher, Mahady Hasan, M. Tailoring Scrum Methodology for Game Development (Towsif Zahin Khan, Shairil Hossain Tusher, Mahady Hasan, M.
Path Planning of Multiple Mobile Robots in a Dynamic 3D Environment (Jai Raj, Krishna Raghuwaiya, Jito Vanualailai, Bibhya Sharma).Pages 209-219Īutonomous Quadrotor Maneuvers in a 3D Complex Environment (Jito Vanualailai, Jai Raj, Krishna Raghuwaiya).Pages 221-231 Lukodono).Pages 189-197ģD Cylindrical Obstacle Avoidance Using the Minimum Distance Technique (Krishna Raghuwaiya, Jito Vanualailai, Jai Raj).Pages 199-208 Investigating the Noise Barrier Impact on Aerodynamics Noise: Case Study at Jakarta MRT (Sugiono Sugiono, Siti Nurlaela, Andyka Kusuma, Achmad Wicaksono, Rio P. Managerial Computer Communication: Implementation of Applied Linguistics Approaches in Managing Electronic Communication (Marcel Pikhart, Blanka Klímová).Pages 153-160Īdvance Persistent Threat-A Systematic Review of Literature and Meta-Analysis of Threat Vectors (Safdar Hussain, Maaz Bin Ahmad, Shariq Siraj Uddin Ghouri).Pages 161-178Ĭonstruction of a Teaching Support System Based on 5G Communication Technology (Hanhui Lin, Shaoqun Xie, Yongxia Luo).Pages 179-186 Lattice CP-ABE Scheme Supporting Reduced-OBDD Structure (Eric Affum, Xiasong Zhang, Xiaofen Wang).Pages 131-142Ĭrypto-SAP Protocol for Sybil Attack Prevention in VANETs (Mohamed Khalil, Marianne A. Networking Analysis and Performance Comparison of Kubernetes CNI Plugins (Ritik Kumar, Munesh Chandra Trivedi).Pages 99-109Ĭlassifying Time-Bound Hierarchical Key Assignment Schemes (Vikas Rao Vadi, Naveen Kumar, Shafiqul Abidin).Pages 111-119Ī Survey on Cloud Workflow Collaborative Adaptive Scheduling (Delong Cui, Zhiping Peng, Qirui Li, Jieguang He, Lizi Zheng, Yiheng Yuan).Pages 121-129
On Confidentiality, Integrity, Authenticity, and Freshness (CIAF) in WSN (Shafiqul Abidin, Vikas Rao Vadi, Ankur Rana).Pages 87-97 Khan).Pages 35-44įuture Identity Card Using Lattice-Based Cryptography and Steganography (Febrian Kurniawan, Gandeva Bayu Satrya).Pages 45-56Ĭryptanalysis on Attribute-Based Encryption from Ring-Learning with Error (R-LWE) (Tan Soo Fun, Azman Samsudin).Pages 57-64Įnhanced Password-Based Authentication Mechanism in Cloud Computing with Extended Honey Encryption (XHE): A Case Study on Diabetes Dataset (Tan Soo Fun, Fatimah Ahmedy, Zhi Ming Foo, Suraya Alias, Rayner Alfred).Pages 65-74Īn Enhanced Wireless Presentation System for Large-Scale Content Distribution (Khong-Neng Choong, Vethanayagam Chrishanton, Shahnim Khalid Putri).Pages 75-85
A Novel Crypto-Ransomware Family Classification Based on Horizontal Feature Simplification (Mohsen Kakavand, Lingges Arulsamy, Aida Mustapha, Mohammad Dabbagh).Pages 3-14Ĭharacteristic Analysis and Experimental Simulation of Diffuse Link Channel for Indoor Wireless Optical Communication (Peinan He, Mingyou He).Pages 15-33Ī Comparative Analysis of Malware Anomaly Detection (Priynka Sharma, Kaylash Chaudhary, Michael Wagner, M.