Content of Issue 1
|
Recent Advances in Social Network Analysis, Management and Security |
Y. Jararweh, M. Al-Smadi, E. Benkhelifa |
1 |
Pompilos, a Model for Augmenting Health Assistant Applications with Social Media Content |
H.D. Vianna, J.L.V. Barbosa |
4 |
An Intelligent Recommender System Based on Association Rule Analysis for Requirement Engineering |
M. Muhairat, S. ALZu'bi, B. Hawashin, M. Elbes, M. Al-Ayyoub |
33 |
Detecting Epidemic Diseases Using Sentiment Analysis of Arabic Tweets |
Q.B. Baker, F. Shatnawi, S. Rawashdeh, M. Al-Smadi, Y. Jararweh |
50 |
Label Clustering for a Novel Problem Transformation in Multi-label Classification |
S. Sellah, V. Hilaire |
71 |
Scalable Distributed Metadata Server Based on Nonblocking Transactions |
K. Hiraga, O. Tatebe, H. Kawashima |
89 |
User-Oriented Approach to Data Quality Evaluation |
A. Nikiforova, J. Bicevskis, Z. Bicevska, I. Oditis |
107 |
A Framework for Online Social Network Volatile Data Analysis: A Case for the Fast Fashion Industry |
A.B. Hani, F. Al-Obeidat, E. Benkhelifa, O. Adedugbe |
127 |
Authorship Studies and the Dark Side of Social Media Analytics |
P. Juola |
156 |
Content of Issue 2
|
Managing Editor's Column |
C. Gütl |
171 |
Analysing Bias in Political News |
G.D. de Arruda, N. Trevisan Roman, A.M. Monteiro |
173 |
Co-Creation of e-Learning Content: The Case Study of a MOOC on Health and Cyber-Bullying |
F. Ferri, A. D'Andrea, A. D'Ulizia, P. Grifoni |
200 |
Improving WalkSAT for Random 3-SAT Problems |
H. Fu, Y. Xu, S. Chen, J. Liu |
220 |
Convolutional Neural Networks and Transfer Learning Based Classification of Natural Landscape Images |
D. Krstinić, M. Braović, D. Božić-Štulic |
244 |
Formal Chronicle Analyses and Comparisons: How to Deal with Negative Behaviors |
Y. Pencolé, A. Subias |
268 |
Ant-Set: A Subset-Oriented Ant Colony Optimization Algorithm for the Set Covering Problem |
M.F. Lemos Schmitt, M.H. Mulati, A.A. Constantino, F. Hernandes, T.A. Hild |
293 |
Content of Issue 3
|
Knowledge-based Configuration |
A. Felfernig, J. Tiihonen |
317 |
Experimental Evaluation of Three Value Recommendation Methods in Interactive Configuration |
H. Fargier, P.-F. Gimenez, J. Mengin |
318 |
Solver Requirements for Interactive Configuration |
A. Falkner, A. Haselböck, G. Krames, G. Schenner, H. Schreiner, R. Taupe |
343 |
Guidelines for Structuring Object-Oriented Product Configuration Models in Standard Configuration Software |
J. Bredahl Rasmussen, L. Hvam, K. Kristjansdottir, N.H. Mortensen |
374 |
Social Choice-based Explanations: An Approach to Enhancing Fairness and Consensus Aspects |
T.N.T. Tran, M. Atas, M.V. Le, R. Samer, M. Stettinger |
402 |
Content of Issue 4
|
Practical Applications of Data Analysis, Classification and Anomaly Detections |
M. Choraś, S. D'Antonio, J. Keller, R. Kozik |
432 |
Speaker/Style-Dependent Neural Network Speech Synthesis Based on Speaker/Style Embedding |
M. Sečujski, D. Pekar, S. Suzić, A. Smirnov, T. Nosek |
434 |
A Study on Pattern Recognition with the Histograms of Oriented Gradients in Distorted and Noisy Images |
A. Bukała, M. Koziarski, B. Cyganek, O.N. Koç, A. Kara |
454 |
Application of Multi-Descriptor Binary Shape Analysis for Classification of Electronic Parts |
K. Maliński, K. Okarma |
479 |
Real-Time Bot Detection from Twitter Using the Twitterbot+ Framework |
K.E. Daouadi, R.Z. Rebaï, I. Amous |
496 |
Anomaly Detection for Smart Lighting Infrastructure with the Use of Time Series Analysis |
T. Andrysiak, Ł. Saganowski |
508 |
The Analysis of the Possibility to Construct Optimal Third-degree Reference Graphs |
S. Bujnowski, T. Marciniak, B. Marciniak, Z. Lutowski |
528 |
Content of Issue 5
|
Managing Editor's Column |
C. Gütl |
547 |
An Ontological Approach to Support Dysfunctional Analysis for Railway Systems Design |
S. Debbech, S. Collart-Dutilleul, P. Bon |
549 |
Enhancing Large Dam Safety Using IoT Technologies: A Case of a Smart Dam |
R. Martać, N. Milivojević, M. Despotović-Zrakić, Z. Bogdanović, D. Barać |
583 |
Knowledge Geometry in Phenomenon Perception and Artificial Intelligence |
J.G. Lopes de Oliveira, P.M. Menezes da Costa, F.L. de Mello |
604 |
A New Approach for Information System Audit Teaching |
R. Pérez-Castillo, I. García-Rodríguez de Guzmán, M. Piattini, M. Rodríguez |
624 |
Content of Issue 6
|
Progress in Features, Data, Patterns and Similarity Analysis |
M. Choraś, S. D'Antonio, J. Keller, R. Kozik |
647 |
Case Study of Spatial Pattern Description, Identification and Application Methodology |
I.E. Germanaitė, K. Zaleckis, R. Butleris, K. Jarmalavičienė |
649 |
Question to Question Similarity Analysis Using Morphological, Syntactic, Semantic, and Lexical Features |
M.M. Hammad, M. Al-Smadi, Q.B. Baker, M. Al-asa'd, N. Al-khdour, M.B. Younes, E. Khwaileh |
671 |
Undersampling Instance Selection for Hybrid and Incomplete Imbalanced Data |
O. Camacho-Nieto, C. Yáñez-Marquez, Y. Villuendas-Rey |
698 |
Integration of Decision Trees Using Distance to Centroid and to Decision Boundary |
J. Biedrzycki, R. Burduk |
720 |
The Modified Principal Component Analysis Feature Extraction Method for the Task of Diagnosing Chronic Lymphocytic Leukemia Type B-CLL |
M. Topolski |
734 |
IoT Heating Solution for Smart Home with Fuzzy Control |
L. Apiecionek, J.M. Czerniak, D. Ewald, M. Biedziak |
747 |
Content of Issue 7
|
Information Security Methodology, Replication Studies and Information Security Education |
S. Wendzel, L. Caviglione, A. Checco, A. Mileva, J.-F. Lalande, W. Mazurczyk |
762 |
Bibliometric Mapping of Research on User Training for Secure Use of Information Systems |
D. Fujs, S. Vrhovec, D. Vavpotič |
764 |
(De-)Constructing Attacker Categorisations: A Typology Iteration for the Case of Digital Banking |
C. Moeckel |
783 |
Utilizing Debugging Information of Applications in Memory Forensics |
M.I. Al-Saleh, E. Qawasmeh, Z.A. Al-Sharif |
805 |
Evaluating Case Study and Action Research Reports: Real-world Research in Cybersecurity |
S. Vrhovec, D. Fujs, L. Jelovčan, A. Mihelič |
827 |
Content of Issue 8
|
Exploring Immersive Technologies in Learning |
A. Peña-Rios, D. Economou, M. Mentzelopoulos |
854 |
Lessons Learned Using a Virtual World to Support Collaborative Learning in the Classroom |
L. Nisiotis, S. Kleanthous |
858 |
Assessing the Impact of Game Modalities in Second Language Acquisition: ELLE the EndLess LEarner |
E.K. Johnson, A. Larner Giroux, D. Merritt, G. Vitanova, S. Sousa |
880 |
Exploring Virtual Reality in the Higher Education Classroom: Using VR to Build Knowledge and Understanding |
G.W. Young, S. Stehle, B. Yazgi Walsh, E. Tiri |
904 |
Influence of Virtual Reality on High School Students' Conceptions of Cells |
M. Thompson, A. Wang, C. Uz Bilgin, M. Anteneh, D. Roy, P. Tan, R. Eberhart, E. Klopfer |
929 |
Bite-Sized Virtual Reality Learning Applications: A Pattern-Based Immersive Authoring Environment |
R. Horst, R. Naraghi-Taghi-Off, L. Rau, R. Dorner |
947 |
Comparing Collaboration Fidelity between VR, MR and Video Conferencing Systems: The Effects of Visual Communication Media Fidelity on Collaboration |
S. Han, K. Kim, S. Choi, M. Sung |
972 |
Using Serious Games for Learning British Sign Language Combining Video, Enhanced Interactivity, and VR Technology |
D. Economou, M. Gonzalez Russi, I. Doumanis, M. Mentzelopoulos, V. Bouki, J. Ferguson |
996 |
A Systematic Review of Research about Game-based Learning in Virtual Worlds |
N. Pellas, S. Mystakidis |
1017 |
Finding the Gaps about Uses of Immersive Learning Environments: A Survey of Surveys |
D. Beck, L. Morgado, P. O'Shea |
1043 |
Content of Issue 9
|
Managing Editor's Column |
C. Gütl |
1074 |
On the Complexity of Some Variations of Sorting by Transpositions |
A. Oliveira Alexandrino, A. Rodrigues Oliveira, U. Dias, Z. Dias |
1076 |
Recent Progress in Automated Code Generation from GUI Images Using Machine Learning Techniques |
D. de Souza Baulé, C. Gresse von Wangenheim, A. von Wangenheim, J.C.R. Hauck |
1095 |
Comparative Study of Real Time Machine Learning Models for Stock Prediction through Streaming Data |
R.K. Behera, S. Das, S.K. Rath, S. Misra, R. Damasevicius |
1128 |
Model Driven Software Engineering Meta-Workbenches: An XTools Approach |
T. Clark, J. Gulden |
1148 |
Numerical Treatment of a Data Completion Problem in Heat Conduction Modelling |
A.C. de Castro Barbosa, C.A. de Moura, J.P. de Negreiros, J.M. de Souza Aguiar |
1177 |
A Cooperative Design Method for SMEs to Adopt New Technologies for Knowledge Management: A Multiple Case Study |
A. Fessl, V. Pammer-Schindler, K. Pata, S. Feyertag, M. Mõttus, J. Janus, T. Ley |
1189 |
The Effects of Using a Fully Integrated Mobile Application to Access Learning Management Systems in Higher Education |
J.L. Martín, S. Sastre, J.M. Peiró, J.R. Hilera |
1213 |
Using the Scientific Method as a Metaphor to Understand Modeling |
E. Rodríguez-Priego, F.J. García-Izquierdo, Á.L. Rubio |
1230 |
Reconstruction of Curve Networks from Unorganized Spatial Points |
S. Wang, Y. Xia, L. You, J. Zhang |
1265 |
Content of Issue 11
|
Research on Heuristic Optimization and Operations in IoT |
D. Ślęzak, D. Kováč, M. Iacono, J.M. Czerniak |
1364 |
Energy Efficient Composite Metric Based Routing Protocol for Internet of Things |
S. Natesan, R. Krishnan |
1366 |
From Classical to Fuzzy Databases in a Production Enterprise |
I. Rojek, D. Mikołajewski, P. Kotlarz, A. Sapietová |
1382 |
IoT Implementation in Remote Measuring Laboratory VMLab Analyses |
T. Vince, M. Bereš, I. Kováčová, J. Molnár, B. Fecko, J. Dziak, I. Tomčiková, M. Guzan |
1402 |
Detection of Cyberattacks Traces in IoT Data |
V. Dutta, M. Choraś, M. Pawlicki, R. Kozik |
1422 |
Fuzzy Adaptive Data Packets Control Algorithm for IoT System Protection |
Ł. Apiecionek, M. Biedziak |
1435 |
Toward a Fuzzy-based Approach for Computational Load Offloading of IoT Devices |
L. Campanile, M. Iacono, F. Marulli, M. Mastroianni, N. Mazzocca |
1455 |
Ordered Fuzzy Numbers Applied in Bee Swarm Optimization Systems |
D. Ewald, H. Zarzycki, Ł. Apiecionek, a.M. Czerniak |
1475 |
Weather Station IoT Educational Model Using Cloud Services |
J. Molnár, S. Kirešová, T. Vince, D. Kováč, P. Jacko, M. Bereš, P. Hrabovský |
1495 |
|