Journal: J. Information Telecommunication

Volume 4, Issue 4

405 -- 424Wafi Bedewi, Roger M. Whitaker, Gualtiero B. Colombo, Stuart M. Allen, Yarrow Dunham. The implications of shared identity on indirect reciprocity
425 -- 439Andrzej W. Przybyszewski, Albert Sledzianowski. Parkinson's disease development prediction by c-granule computing compared to different AI methods
440 -- 460Inga Rüb, Barbara Dunin-Keplicz. BASTA: BDI-based architecture of simulated traffic agents
461 -- 481Maha Fraj, Mohamed Aymen Ben HajKacem, Nadia Essoussi. On the use of ensemble method for multi view textual data
482 -- 503Naeem Firdous Syed, Zubair A. Baig, Ahmed Ibrahim 0002, Craig Valli. Denial of service attack detection through machine learning for the IoT
504 -- 523Enas E. Alraddadi, Stuart M. Allen, Gualtiero B. Colombo, Roger M. Whitaker. The role of homophily in opinion formation among mobile agents
524 -- 559Kulsawasd Jitkajornwanich, Neelabh Pant, Mohammadhani Fouladgar, Ramez Elmasri. A survey on spatial, temporal, and spatio-temporal database research and an original example of relevant applications using SQL ecosystem and deep learning

Volume 4, Issue 3

251 -- 266Khoa Truong Dinh, Slawomir Kuklinski, Tomasz Osinski, Jacek Wytrebowicz. Heuristic traffic engineering for SDN
267 -- 281Duong Huu Ai, Ha Duyen Trung, Do Trong Tuan. On the ASER performance of amplify-and-forward relaying MIMO/FSO systems using SC-QAM signals over log-normal and gamma-gamma atmospheric turbulence channels and pointing error impairments
282 -- 294Keiichi Endo, Takuya Fujihashi, Shinya Kobayashi. Tablet-assisted education incorporating group activities in a university
295 -- 313A. S. Kang, Sanjeev Bhatia, Navneet Kaur, Kuldeepak Singh. Performance evaluation of various hybrid modulation techniques transmitted by EDFA in radio-over-fibre communication
314 -- 345Mohamed Bakry El-Mashade. M-Sweeps multi-target analysis of new category of adaptive schemes for detecting χ2-fluctuating targets
346 -- 362Merton Lansley, Francois Mouton, Stelios Kapetanakis, Nikolaos Polatidis. SEADer++: social engineering attack detection in online environments using machine learning
363 -- 382Siyuan Liu, Jianda Han, Jianlei Zhang. Evolutionary dynamics of individual strategies and game environments in the framework of feedback control
383 -- 403Sihem Sahnoun, Samir Elloumi, Sadok Ben Yahia. Event detection based on open information extraction and ontology

Volume 4, Issue 2

119 -- 139Vo Thi Ngoc Chau, Phung Hua Nguyen. A kernel-induced weighted object-cluster association-based ensemble method for educational data clustering
140 -- 150Quoc Bao Truong, Tan Kiet Nguyen Thanh, Quoc Dinh Truong, Hiep Xuan Huynh. Plant species identification from leaf patterns using histogram of oriented gradients feature space and convolution neural networks
151 -- 174Iffat Ali, Mahmoud Danaee, Amira Firdaus. Social networking sites usage & needs scale (SNSUN): a new instrument for measuring social networking sites' usage patterns and needs
175 -- 198Nahian Ahmed, Adnan Firoze, Rashedur M. Rahman. Machine learning for predicting landslide risk of Rohingya refugee camp infrastructure
199 -- 212Taiga Kawaguchi, Takuya Yoshino, Kouichi Hirata. Path histogram distance and complete subtree histogram distance for rooted labelled caterpillars
213 -- 228Nimat Ullah, Zhenyu Gao, Rui Liu, Jan Treur. A second-order adaptive temporal-causal network model for age and gender differences in evolving choice of emotion regulation strategies
229 -- 250Fakhra Jabeen, Nizar A. Hirzalla, Thomas M. Maaiveld, Charlotte Gerritsen, Jan Treur. Victim no more: a temporal-causal analysis of how a mediator can help out a bullying victim

Volume 4, Issue 1

1 -- 16Hoang Lien Minh Vo, Quang Hoang. Transformation of UML class diagram into OWL Ontology
17 -- 35Minh Thu Tran Nguyen, Le-Diem Bui, Thanh-Nghi Do. Decision trees using local support vector regression models for large datasets
36 -- 50Antonio Maria Fiscarelli, Matthias R. Brust, Grégoire Danoy, Pascal Bouvry. A vertex-similarity clustering algorithm for community detection
51 -- 66Péter Vörös, Daniel Csubak, Péter Hudoba, Attila Kiss 0001. Securing personal data in public cloud
67 -- 90Nobuyuki Kobayashi, Hiroshi Tani, Xiufeng Wang, Rei Sonobe. Crop classification using spectral indices derived from Sentinel-2A imagery
91 -- 104Kuo-Sui Lin. A case-based reasoning system for interior design using a new cosine similarity retrieval algorithm
105 -- 117Sridhar Iyer. On routing, modulation format, space and spectrum allocation with protection in space division multiplexing-based elastic optical networks