Go home now Header Background Image
Submission Procedure
share: |
Follow us
Volume 26

Content of Issue 1
Recent Advances in Social Network Analysis, Management and Security Y. Jararweh, M. Al-Smadi, E. Benkhelifa 1
Pompilos, a Model for Augmenting Health Assistant Applications with Social Media Content H.D. Vianna, J.L.V. Barbosa 4
An Intelligent Recommender System Based on Association Rule Analysis for Requirement Engineering M. Muhairat, S. ALZu'bi, B. Hawashin, M. Elbes, M. Al-Ayyoub 33
Detecting Epidemic Diseases Using Sentiment Analysis of Arabic Tweets Q.B. Baker, F. Shatnawi, S. Rawashdeh, M. Al-Smadi, Y. Jararweh 50
Label Clustering for a Novel Problem Transformation in Multi-label Classification S. Sellah, V. Hilaire 71
Scalable Distributed Metadata Server Based on Nonblocking Transactions K. Hiraga, O. Tatebe, H. Kawashima 89
User-Oriented Approach to Data Quality Evaluation A. Nikiforova, J. Bicevskis, Z. Bicevska, I. Oditis 107
A Framework for Online Social Network Volatile Data Analysis: A Case for the Fast Fashion Industry A.B. Hani, F. Al-Obeidat, E. Benkhelifa, O. Adedugbe 127
Authorship Studies and the Dark Side of Social Media Analytics P. Juola 156
Content of Issue 2
Managing Editor's Column C. Gütl 171
Analysing Bias in Political News G.D. de Arruda, N. Trevisan Roman, A.M. Monteiro 173
Co-Creation of e-Learning Content: The Case Study of a MOOC on Health and Cyber-Bullying F. Ferri, A. D'Andrea, A. D'Ulizia, P. Grifoni 200
Improving WalkSAT for Random 3-SAT Problems H. Fu, Y. Xu, S. Chen, J. Liu 220
Convolutional Neural Networks and Transfer Learning Based Classification of Natural Landscape Images D. Krstinić, M. Braović, D. Božić-Štulic 244
Formal Chronicle Analyses and Comparisons: How to Deal with Negative Behaviors Y. Pencolé, A. Subias 268
Ant-Set: A Subset-Oriented Ant Colony Optimization Algorithm for the Set Covering Problem M.F. Lemos Schmitt, M.H. Mulati, A.A. Constantino, F. Hernandes, T.A. Hild 293
Content of Issue 3
Knowledge-based Configuration A. Felfernig, J. Tiihonen 317
Experimental Evaluation of Three Value Recommendation Methods in Interactive Configuration H. Fargier, P.-F. Gimenez, J. Mengin 318
Solver Requirements for Interactive Configuration A. Falkner, A. Haselböck, G. Krames, G. Schenner, H. Schreiner, R. Taupe 343
Guidelines for Structuring Object-Oriented Product Configuration Models in Standard Configuration Software J. Bredahl Rasmussen, L. Hvam, K. Kristjansdottir, N.H. Mortensen 374
Social Choice-based Explanations: An Approach to Enhancing Fairness and Consensus Aspects T.N.T. Tran, M. Atas, M.V. Le, R. Samer, M. Stettinger 402
Content of Issue 4
Practical Applications of Data Analysis, Classification and Anomaly Detection M. Choraś, S. D'Antonio, J. Keller, R. Kozik 432
Speaker/Style-Dependent Neural Network Speech Synthesis Based on Speaker/Style Embedding M. Sečujski, D. Pekar, S. Suzić, A. Smirnov, T. Nosek 434
A Study on Pattern Recognition with the Histograms of Oriented Gradients in Distorted and Noisy Images A. Bukała, M. Koziarski, B. Cyganek, O.N. Koç, A. Kara 454
Application of Multi-Descriptor Binary Shape Analysis for Classification of Electronic Parts K. Maliński, K. Okarma 479
Real-Time Bot Detection from Twitter Using the Twitterbot+ Framework K.E. Daouadi, R.Z. Rebaï, I. Amous 496
Anomaly Detection for Smart Lighting Infrastructure with the Use of Time Series Analysis T. Andrysiak, Ł. Saganowski 508
The Analysis of the Possibility to Construct Optimal Third-degree Reference Graphs S. Bujnowski, T. Marciniak, B. Marciniak, Z. Lutowski 528
Content of Issue 5
Managing Editor's Column C. Gütl 547
An Ontological Approach to Support Dysfunctional Analysis for Railway Systems Design S. Debbech, S. Collart-Dutilleul, P. Bon 549
Enhancing Large Dam Safety Using IoT Technologies: A Case of a Smart Dam R. Martać, N. Milivojević, M. Despotović-Zrakić, Z. Bogdanović, D. Barać 583
Knowledge Geometry in Phenomenon Perception and Artificial Intelligence J.G. Lopes de Oliveira, P.M. Menezes da Costa, F.L. de Mello 604
A New Approach for Information System Audit Teaching R. Pérez-Castillo, I. García-Rodríguez de Guzmán, M. Piattini, M. Rodríguez 624
Content of Issue 6
Progress in Features, Data, Patterns and Similarity Analysis M. Choraś, S. D'Antonio, J. Keller, R. Kozik 647
Case Study of Spatial Pattern Description, Identification and Application Methodology I.E. Germanaitė, K. Zaleckis, R. Butleris, K. Jarmalavičienė 649
Question to Question Similarity Analysis Using Morphological, Syntactic, Semantic, and Lexical Features M.M. Hammad, M. Al-Smadi, Q.B. Baker, M. Al-asa'd, N. Al-khdour, M.B. Younes, E. Khwaileh 671
Undersampling Instance Selection for Hybrid and Incomplete Imbalanced Data O. Camacho-Nieto, C. Yáñez-Marquez, Y. Villuendas-Rey 698
Integration of Decision Trees Using Distance to Centroid and to Decision Boundary J. Biedrzycki, R. Burduk 720
The Modified Principal Component Analysis Feature Extraction Method for the Task of Diagnosing Chronic Lymphocytic Leukemia Type B-CLL M. Topolski 734
IoT Heating Solution for Smart Home with Fuzzy Control L. Apiecionek, J.M. Czerniak, D. Ewald, M. Biedziak 747
Content of Issue 7
Information Security Methodology, Replication Studies and Information Security Education S. Wendzel, L. Caviglione, A. Checco, A. Mileva, J.-F. Lalande, W. Mazurczyk 762
Bibliometric Mapping of Research on User Training for Secure Use of Information Systems D. Fujs, S. Vrhovec, D. Vavpotič 764
(De-)Constructing Attacker Categorisations: A Typology Iteration for the Case of Digital Banking C. Moeckel 783
Utilizing Debugging Information of Applications in Memory Forensics M.I. Al-Saleh, E. Qawasmeh, Z.A. Al-Sharif 805
Evaluating Case Study and Action Research Reports: Real-world Research in Cybersecurity S. Vrhovec, D. Fujs, L. Jelovčan, A. Mihelič 827