default search action
Journal of Information and Telecommunication, Volume 4
Volume 4, Number 1, 2020
- Hoang Lien Minh Vo, Quang Hoang:
Transformation of UML class diagram into OWL Ontology. 1-16 - Minh-Thu Tran-Nguyen, Le-Diem Bui, Thanh-Nghi Do:
Decision trees using local support vector regression models for large datasets. 17-35 - Antonio Maria Fiscarelli, Matthias R. Brust, Grégoire Danoy, Pascal Bouvry:
A vertex-similarity clustering algorithm for community detection. 36-50 - Péter Vörös, Daniel Csubak, Péter Hudoba, Attila Kiss:
Securing personal data in public cloud. 51-66 - Nobuyuki Kobayashi, Hiroshi Tani, Xiufeng Wang, Rei Sonobe:
Crop classification using spectral indices derived from Sentinel-2A imagery. 67-90 - Kuo-Sui Lin:
A case-based reasoning system for interior design using a new cosine similarity retrieval algorithm. 91-104 - Sridhar Iyer:
On routing, modulation format, space and spectrum allocation with protection in space division multiplexing-based elastic optical networks. 105-117
Volume 4, Number 2, 2020
- Vo Thi Ngoc Chau, Phung Hua Nguyen:
A kernel-induced weighted object-cluster association-based ensemble method for educational data clustering. 119-139 - Quoc Bao Truong, Tan Kiet Nguyen Thanh, Quoc Dinh Truong, Hiep Xuan Huynh:
Plant species identification from leaf patterns using histogram of oriented gradients feature space and convolution neural networks. 140-150 - Iffat Ali, Mahmoud Danaee, Amira Firdaus:
Social networking sites usage & needs scale (SNSUN): a new instrument for measuring social networking sites' usage patterns and needs. 151-174 - Nahian Ahmed, Adnan Firoze, Rashedur M. Rahman:
Machine learning for predicting landslide risk of Rohingya refugee camp infrastructure. 175-198 - Taiga Kawaguchi, Takuya Yoshino, Kouichi Hirata:
Path histogram distance and complete subtree histogram distance for rooted labelled caterpillars. 199-212 - Nimat Ullah, Zhenyu Gao, Rui Liu, Jan Treur:
A second-order adaptive temporal-causal network model for age and gender differences in evolving choice of emotion regulation strategies. 213-228 - Fakhra Jabeen, Nizar A. Hirzalla, Thomas M. Maaiveld, Charlotte Gerritsen, Jan Treur:
Victim no more: a temporal-causal analysis of how a mediator can help out a bullying victim. 229-250
Volume 4, Number 3, 2020
- Khoa Truong Dinh, Slawomir Kuklinski, Tomasz Osinski, Jacek Wytrebowicz:
Heuristic traffic engineering for SDN. 251-266 - Duong Huu Ai, Ha Duyen Trung, Do Trong Tuan:
On the ASER performance of amplify-and-forward relaying MIMO/FSO systems using SC-QAM signals over log-normal and gamma-gamma atmospheric turbulence channels and pointing error impairments. 267-281 - Keiichi Endo, Takuya Fujihashi, Shinya Kobayashi:
Tablet-assisted education incorporating group activities in a university. 282-294 - A. S. Kang, Sanjeev Bhatia, Navneet Kaur, Kuldeepak Singh:
Performance evaluation of various hybrid modulation techniques transmitted by EDFA in radio-over-fibre communication. 295-313 - Mohamed Bakry El-Mashade:
M-Sweeps multi-target analysis of new category of adaptive schemes for detecting χ2-fluctuating targets. 314-345 - Merton Lansley, Francois Mouton, Stelios Kapetanakis, Nikolaos Polatidis:
SEADer++: social engineering attack detection in online environments using machine learning. 346-362 - Siyuan Liu, Jianda Han, Jianlei Zhang:
Evolutionary dynamics of individual strategies and game environments in the framework of feedback control. 363-382 - Sihem Sahnoun, Samir Elloumi, Sadok Ben Yahia:
Event detection based on open information extraction and ontology. 383-403
Volume 4, Number 4, 2020
- Wafi Bedewi, Roger M. Whitaker, Gualtiero B. Colombo, Stuart M. Allen, Yarrow Dunham:
The implications of shared identity on indirect reciprocity. 405-424 - Andrzej W. Przybyszewski, Albert Sledzianowski:
Parkinson's disease development prediction by c-granule computing compared to different AI methods. 425-439 - Inga Rüb, Barbara Dunin-Keplicz:
BASTA: BDI-based architecture of simulated traffic agents. 440-460 - Maha Fraj, Mohamed Aymen Ben HajKacem, Nadia Essoussi:
On the use of ensemble method for multi view textual data. 461-481 - Naeem Firdous Syed, Zubair A. Baig, Ahmed Ibrahim, Craig Valli:
Denial of service attack detection through machine learning for the IoT. 482-503 - Enas E. Alraddadi, Stuart M. Allen, Gualtiero B. Colombo, Roger M. Whitaker:
The role of homophily in opinion formation among mobile agents. 504-523 - Kulsawasd Jitkajornwanich, Neelabh Pant, Mohammadhani Fouladgar, Ramez Elmasri:
A survey on spatial, temporal, and spatio-temporal database research and an original example of relevant applications using SQL ecosystem and deep learning. 524-559
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.