


default search action
Journal of Information and Telecommunication, Volume 4
Volume 4, Number 1, 2020
- Hoang Lien Minh Vo
, Quang Hoang:
Transformation of UML class diagram into OWL Ontology. 1-16 - Minh-Thu Tran-Nguyen, Le-Diem Bui, Thanh-Nghi Do
:
Decision trees using local support vector regression models for large datasets. 17-35 - Antonio Maria Fiscarelli
, Matthias R. Brust
, Grégoire Danoy, Pascal Bouvry
:
A vertex-similarity clustering algorithm for community detection. 36-50 - Péter Vörös
, Daniel Csubak
, Péter Hudoba
, Attila Kiss
:
Securing personal data in public cloud. 51-66 - Nobuyuki Kobayashi, Hiroshi Tani
, Xiufeng Wang, Rei Sonobe
:
Crop classification using spectral indices derived from Sentinel-2A imagery. 67-90 - Kuo-Sui Lin
:
A case-based reasoning system for interior design using a new cosine similarity retrieval algorithm. 91-104 - Sridhar Iyer
:
On routing, modulation format, space and spectrum allocation with protection in space division multiplexing-based elastic optical networks. 105-117
Volume 4, Number 2, 2020
- Vo Thi Ngoc Chau, Phung Hua Nguyen:
A kernel-induced weighted object-cluster association-based ensemble method for educational data clustering. 119-139 - Quoc Bao Truong
, Tan Kiet Nguyen Thanh, Quoc Dinh Truong, Hiep Xuan Huynh:
Plant species identification from leaf patterns using histogram of oriented gradients feature space and convolution neural networks. 140-150 - Iffat Ali, Mahmoud Danaee
, Amira Firdaus
:
Social networking sites usage & needs scale (SNSUN): a new instrument for measuring social networking sites' usage patterns and needs. 151-174 - Nahian Ahmed
, Adnan Firoze
, Rashedur M. Rahman
:
Machine learning for predicting landslide risk of Rohingya refugee camp infrastructure. 175-198 - Taiga Kawaguchi, Takuya Yoshino, Kouichi Hirata
:
Path histogram distance and complete subtree histogram distance for rooted labelled caterpillars. 199-212 - Nimat Ullah
, Zhenyu Gao
, Rui Liu, Jan Treur
:
A second-order adaptive temporal-causal network model for age and gender differences in evolving choice of emotion regulation strategies. 213-228 - Fakhra Jabeen
, Nizar A. Hirzalla, Thomas M. Maaiveld, Charlotte Gerritsen
, Jan Treur
:
Victim no more: a temporal-causal analysis of how a mediator can help out a bullying victim. 229-250
Volume 4, Number 3, 2020
- Khoa Truong Dinh, Slawomir Kuklinski
, Tomasz Osinski
, Jacek Wytrebowicz
:
Heuristic traffic engineering for SDN. 251-266 - Duong Huu Ai
, Ha Duyen Trung
, Do Trong Tuan
:
On the ASER performance of amplify-and-forward relaying MIMO/FSO systems using SC-QAM signals over log-normal and gamma-gamma atmospheric turbulence channels and pointing error impairments. 267-281 - Keiichi Endo, Takuya Fujihashi
, Shinya Kobayashi:
Tablet-assisted education incorporating group activities in a university. 282-294 - A. S. Kang, Sanjeev Bhatia, Navneet Kaur
, Kuldeepak Singh:
Performance evaluation of various hybrid modulation techniques transmitted by EDFA in radio-over-fibre communication. 295-313 - Mohamed Bakry El-Mashade
:
M-Sweeps multi-target analysis of new category of adaptive schemes for detecting χ2-fluctuating targets. 314-345 - Merton Lansley, Francois Mouton
, Stelios Kapetanakis, Nikolaos Polatidis
:
SEADer++: social engineering attack detection in online environments using machine learning. 346-362 - Siyuan Liu
, Jianda Han, Jianlei Zhang
:
Evolutionary dynamics of individual strategies and game environments in the framework of feedback control. 363-382 - Sihem Sahnoun, Samir Elloumi
, Sadok Ben Yahia
:
Event detection based on open information extraction and ontology. 383-403
Volume 4, Number 4, 2020
- Wafi Bedewi
, Roger M. Whitaker
, Gualtiero B. Colombo
, Stuart M. Allen
, Yarrow Dunham:
The implications of shared identity on indirect reciprocity. 405-424 - Andrzej W. Przybyszewski
, Albert Sledzianowski:
Parkinson's disease development prediction by c-granule computing compared to different AI methods. 425-439 - Inga Rüb, Barbara Dunin-Keplicz
:
BASTA: BDI-based architecture of simulated traffic agents. 440-460 - Maha Fraj
, Mohamed Aymen Ben HajKacem
, Nadia Essoussi:
On the use of ensemble method for multi view textual data. 461-481 - Naeem Firdous Syed
, Zubair A. Baig, Ahmed Ibrahim
, Craig Valli
:
Denial of service attack detection through machine learning for the IoT. 482-503 - Enas E. Alraddadi, Stuart M. Allen
, Gualtiero B. Colombo
, Roger M. Whitaker
:
The role of homophily in opinion formation among mobile agents. 504-523 - Kulsawasd Jitkajornwanich
, Neelabh Pant, Mohammadhani Fouladgar, Ramez Elmasri:
A survey on spatial, temporal, and spatio-temporal database research and an original example of relevant applications using SQL ecosystem and deep learning. 524-559

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.