Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Volume 26

Content of Issue 1
Recent Advances in Social Network Analysis, Management and Security Y. Jararweh, M. Al-Smadi, E. Benkhelifa 1
Pompilos, a Model for Augmenting Health Assistant Applications with Social Media Content H.D. Vianna, J.L.V. Barbosa 4
An Intelligent Recommender System Based on Association Rule Analysis for Requirement Engineering M. Muhairat, S. ALZu'bi, B. Hawashin, M. Elbes, M. Al-Ayyoub 33
Detecting Epidemic Diseases Using Sentiment Analysis of Arabic Tweets Q.B. Baker, F. Shatnawi, S. Rawashdeh, M. Al-Smadi, Y. Jararweh 50
Label Clustering for a Novel Problem Transformation in Multi-label Classification S. Sellah, V. Hilaire 71
Scalable Distributed Metadata Server Based on Nonblocking Transactions K. Hiraga, O. Tatebe, H. Kawashima 89
User-Oriented Approach to Data Quality Evaluation A. Nikiforova, J. Bicevskis, Z. Bicevska, I. Oditis 107
A Framework for Online Social Network Volatile Data Analysis: A Case for the Fast Fashion Industry A.B. Hani, F. Al-Obeidat, E. Benkhelifa, O. Adedugbe 127
Authorship Studies and the Dark Side of Social Media Analytics P. Juola 156
Content of Issue 2
Managing Editor's Column C. Gütl 171
Analysing Bias in Political News G.D. de Arruda, N. Trevisan Roman, A.M. Monteiro 173
Co-Creation of e-Learning Content: The Case Study of a MOOC on Health and Cyber-Bullying F. Ferri, A. D'Andrea, A. D'Ulizia, P. Grifoni 200
Improving WalkSAT for Random 3-SAT Problems H. Fu, Y. Xu, S. Chen, J. Liu 220
Convolutional Neural Networks and Transfer Learning Based Classification of Natural Landscape Images D. Krstinić, M. Braović, D. Božić-Štulic 244
Formal Chronicle Analyses and Comparisons: How to Deal with Negative Behaviors Y. Pencolé, A. Subias 268
Ant-Set: A Subset-Oriented Ant Colony Optimization Algorithm for the Set Covering Problem M.F. Lemos Schmitt, M.H. Mulati, A.A. Constantino, F. Hernandes, T.A. Hild 293
Content of Issue 3
Knowledge-based Configuration A. Felfernig, J. Tiihonen 317
Experimental Evaluation of Three Value Recommendation Methods in Interactive Configuration H. Fargier, P.-F. Gimenez, J. Mengin 318
Solver Requirements for Interactive Configuration A. Falkner, A. Haselböck, G. Krames, G. Schenner, H. Schreiner, R. Taupe 343
Guidelines for Structuring Object-Oriented Product Configuration Models in Standard Configuration Software J. Bredahl Rasmussen, L. Hvam, K. Kristjansdottir, N.H. Mortensen 374
Social Choice-based Explanations: An Approach to Enhancing Fairness and Consensus Aspects T.N.T. Tran, M. Atas, M.V. Le, R. Samer, M. Stettinger 402
Content of Issue 4
Practical Applications of Data Analysis, Classification and Anomaly Detections M. Choraś, S. D'Antonio, J. Keller, R. Kozik 432
Speaker/Style-Dependent Neural Network Speech Synthesis Based on Speaker/Style Embedding M. Sečujski, D. Pekar, S. Suzić, A. Smirnov, T. Nosek 434
A Study on Pattern Recognition with the Histograms of Oriented Gradients in Distorted and Noisy Images A. Bukała, M. Koziarski, B. Cyganek, O.N. Koç, A. Kara 454
Application of Multi-Descriptor Binary Shape Analysis for Classification of Electronic Parts K. Maliński, K. Okarma 479
Real-Time Bot Detection from Twitter Using the Twitterbot+ Framework K.E. Daouadi, R.Z. Rebaï, I. Amous 496
Anomaly Detection for Smart Lighting Infrastructure with the Use of Time Series Analysis T. Andrysiak, Ł. Saganowski 508
The Analysis of the Possibility to Construct Optimal Third-degree Reference Graphs S. Bujnowski, T. Marciniak, B. Marciniak, Z. Lutowski 528
Content of Issue 5
Managing Editor's Column C. Gütl 547
An Ontological Approach to Support Dysfunctional Analysis for Railway Systems Design S. Debbech, S. Collart-Dutilleul, P. Bon 549
Enhancing Large Dam Safety Using IoT Technologies: A Case of a Smart Dam R. Martać, N. Milivojević, M. Despotović-Zrakić, Z. Bogdanović, D. Barać 583
Knowledge Geometry in Phenomenon Perception and Artificial Intelligence J.G. Lopes de Oliveira, P.M. Menezes da Costa, F.L. de Mello 604
A New Approach for Information System Audit Teaching R. Pérez-Castillo, I. García-Rodríguez de Guzmán, M. Piattini, M. Rodríguez 624
Content of Issue 6
Progress in Features, Data, Patterns and Similarity Analysis M. Choraś, S. D'Antonio, J. Keller, R. Kozik 647
Case Study of Spatial Pattern Description, Identification and Application Methodology I.E. Germanaitė, K. Zaleckis, R. Butleris, K. Jarmalavičienė 649
Question to Question Similarity Analysis Using Morphological, Syntactic, Semantic, and Lexical Features M.M. Hammad, M. Al-Smadi, Q.B. Baker, M. Al-asa'd, N. Al-khdour, M.B. Younes, E. Khwaileh 671
Undersampling Instance Selection for Hybrid and Incomplete Imbalanced Data O. Camacho-Nieto, C. Yáñez-Marquez, Y. Villuendas-Rey 698
Integration of Decision Trees Using Distance to Centroid and to Decision Boundary J. Biedrzycki, R. Burduk 720
The Modified Principal Component Analysis Feature Extraction Method for the Task of Diagnosing Chronic Lymphocytic Leukemia Type B-CLL M. Topolski 734
IoT Heating Solution for Smart Home with Fuzzy Control L. Apiecionek, J.M. Czerniak, D. Ewald, M. Biedziak 747
Content of Issue 7
Information Security Methodology, Replication Studies and Information Security Education S. Wendzel, L. Caviglione, A. Checco, A. Mileva, J.-F. Lalande, W. Mazurczyk 762
Bibliometric Mapping of Research on User Training for Secure Use of Information Systems D. Fujs, S. Vrhovec, D. Vavpotič 764
(De-)Constructing Attacker Categorisations: A Typology Iteration for the Case of Digital Banking C. Moeckel 783
Utilizing Debugging Information of Applications in Memory Forensics M.I. Al-Saleh, E. Qawasmeh, Z.A. Al-Sharif 805
Evaluating Case Study and Action Research Reports: Real-world Research in Cybersecurity S. Vrhovec, D. Fujs, L. Jelovčan, A. Mihelič 827
Content of Issue 8
Exploring Immersive Technologies in Learning A. Peña-Rios, D. Economou, M. Mentzelopoulos 854
Lessons Learned Using a Virtual World to Support Collaborative Learning in the Classroom L. Nisiotis, S. Kleanthous 858
Assessing the Impact of Game Modalities in Second Language Acquisition: ELLE the EndLess LEarner E.K. Johnson, A. Larner Giroux, D. Merritt, G. Vitanova, S. Sousa 880
Exploring Virtual Reality in the Higher Education Classroom: Using VR to Build Knowledge and Understanding G.W. Young, S. Stehle, B. Yazgi Walsh, E. Tiri 904
Influence of Virtual Reality on High School Students' Conceptions of Cells M. Thompson, A. Wang, C. Uz Bilgin, M. Anteneh, D. Roy, P. Tan, R. Eberhart, E. Klopfer 929
Bite-Sized Virtual Reality Learning Applications: A Pattern-Based Immersive Authoring Environment R. Horst, R. Naraghi-Taghi-Off, L. Rau, R. Dorner 947
Comparing Collaboration Fidelity between VR, MR and Video Conferencing Systems: The Effects of Visual Communication Media Fidelity on Collaboration S. Han, K. Kim, S. Choi, M. Sung 972
Using Serious Games for Learning British Sign Language Combining Video, Enhanced Interactivity, and VR Technology D. Economou, M. Gonzalez Russi, I. Doumanis, M. Mentzelopoulos, V. Bouki, J. Ferguson 996
A Systematic Review of Research about Game-based Learning in Virtual Worlds N. Pellas, S. Mystakidis 1017
Finding the Gaps about Uses of Immersive Learning Environments: A Survey of Surveys D. Beck, L. Morgado, P. O'Shea 1043
Content of Issue 9
Managing Editor's Column C. Gütl 1074
On the Complexity of Some Variations of Sorting by Transpositions A. Oliveira Alexandrino, A. Rodrigues Oliveira, U. Dias, Z. Dias 1076
Recent Progress in Automated Code Generation from GUI Images Using Machine Learning Techniques D. de Souza Baulé, C. Gresse von Wangenheim, A. von Wangenheim, J.C.R. Hauck 1095
Comparative Study of Real Time Machine Learning Models for Stock Prediction through Streaming Data R.K. Behera, S. Das, S.K. Rath, S. Misra, R. Damasevicius 1128
Model Driven Software Engineering Meta-Workbenches: An XTools Approach T. Clark, J. Gulden 1148
Numerical Treatment of a Data Completion Problem in Heat Conduction Modelling A.C. de Castro Barbosa, C.A. de Moura, J.P. de Negreiros, J.M. de Souza Aguiar 1177
A Cooperative Design Method for SMEs to Adopt New Technologies for Knowledge Management: A Multiple Case Study A. Fessl, V. Pammer-Schindler, K. Pata, S. Feyertag, M. Mõttus, J. Janus, T. Ley 1189
The Effects of Using a Fully Integrated Mobile Application to Access Learning Management Systems in Higher Education J.L. Martín, S. Sastre, J.M. Peiró, J.R. Hilera 1213
Using the Scientific Method as a Metaphor to Understand Modeling E. Rodríguez-Priego, F.J. García-Izquierdo, Á.L. Rubio 1230
Reconstruction of Curve Networks from Unorganized Spatial Points S. Wang, Y. Xia, L. You, J. Zhang 1265
Content of Issue 10
Managing Editor's Column C. Gütl 1281
Have Variability Tools Fulfilled the Needs of the Software Industry? A.P. Allian, E. OliveiraJr, R. Capilla, E.Y. Nakagawa 1282
Interval Methods for Fixed and Periodic Points: Development and Visualization J.E. de Almeida Ayres, L.H. de Figueiredo 1312
Graphic Deduction Based on Set X. He, G. Du, L. Hong 1331
A Semantic Web-based Representation of Human-logical Inference for Solving Bongard Problems J. Maniamma, H. Wagatsuma 1343
Content of Issue 11
Research on Heuristic Optimization and Operations in IoT D. Ślęzak, D. Kováč, M. Iacono, J.M. Czerniak 1364
Energy Efficient Composite Metric Based Routing Protocol for Internet of Things S. Natesan, R. Krishnan 1366
From Classical to Fuzzy Databases in a Production Enterprise I. Rojek, D. Mikołajewski, P. Kotlarz, A. Sapietová 1382
IoT Implementation in Remote Measuring Laboratory VMLab Analyses T. Vince, M. Bereš, I. Kováčová, J. Molnár, B. Fecko, J. Dziak, I. Tomčiková, M. Guzan 1402
Detection of Cyberattacks Traces in IoT Data V. Dutta, M. Choraś, M. Pawlicki, R. Kozik 1422
Fuzzy Adaptive Data Packets Control Algorithm for IoT System Protection Ł. Apiecionek, M. Biedziak 1435
Toward a Fuzzy-based Approach for Computational Load Offloading of IoT Devices L. Campanile, M. Iacono, F. Marulli, M. Mastroianni, N. Mazzocca 1455
Ordered Fuzzy Numbers Applied in Bee Swarm Optimization Systems D. Ewald, H. Zarzycki, Ł. Apiecionek, a.M. Czerniak 1475
Weather Station IoT Educational Model Using Cloud Services J. Molnár, S. Kirešová, T. Vince, D. Kováč, P. Jacko, M. Bereš, P. Hrabovský 1495