Abstract is missing.
- A Second-Order Adaptive Decision Model for Proceeding or Terminating a PregnancyLisa Elderhorst, Melissa van den Berge, Jan Treur. 3-15 [doi]
- A Self-adaptive Learning Music Composition Algorithm as Virtual TutorMichele Della Ventura. 16-26 [doi]
- Dynamic Big Data Drift Visualization of CPU and Memory Resource Usage in Cloud ComputingTajwar Mehmood, Seemab Latif. 27-36 [doi]
- On the Interplay of Interpersonal Synchrony, Short-Term Affiliation and Long-Term Bonding: A Second-Order Multi-adaptive Neural Agent ModelSophie C. F. Hendrikse, Jan Treur, Tom F. Wilderjans, Suzanne Dikker, Sander L. Koole. 37-57 [doi]
- When Domain Adaptation Meets Semi-supervised Learning Through Optimal TransportMourad El Hamri, Younès Bennani, Issam Falih. 58-69 [doi]
- A Novel GBT-Based Approach for Cross-Channel Fraud Detection on Real-World Banking TransactionsUgur Dolu, Emre Sefer. 73-84 [doi]
- An Empirical Study on Anomaly Detection Algorithms for Extremely Imbalanced DatasetsGonçalo Fontes, Luís Miguel Matos, Arthur Matta, André Luiz Pilastri, Paulo Cortez 0001. 85-95 [doi]
- Anomaly Detection Using Edge Computing AI on Low Powered DevicesDragos-Vasile Bratu, Rares Stefan Tiberius Ilinoiu, Alexandru Cristea, Maria-Alexandra Zolya, Sorin-Aurel Moraru. 96-107 [doi]
- Enhanced Dependency-Based Feature Selection to Improve Anomaly Network Intrusion DetectionK. Bennaceur, Zakaria Sahraoui, Mohamed Ahmed-Nacer. 108-115 [doi]
- HEDL-IDS: A Hybrid Ensemble Deep Learning Approach for Cyber Intrusion DetectionAnastasios Panagiotis Psathas, Lazaros Iliadis, Antonios Papaleonidas, Dimitris Bountas. 116-131 [doi]
- Random Forest Based on Federated Learning for Intrusion DetectionTijana Markovic, Miguel Leon, David Buffoni, Sasikumar Punnekkat. 132-144 [doi]
- Towards Semantic Modeling and Simulation of Cybersecurity on the Internet of Underwater ThingsStavros Stavrinos, Konstantinos Kotis, Christos Kalloniatis. 145-156 [doi]
- An Efficient Deep Learning Framework for Face Mask Detection in Complex ScenesSultan Daud Khan, Rafi Ullah, Mussadiq Abdul Rahim, Muhammad Rashid, Zulfiqar Ali, Mohib Ullah, Habib Ullah. 159-169 [doi]
- An Efficient Method for Addressing COVID-19 Proximity Related Issues in Autonomous Shuttles Public TransportationDimitris Tsiktsiris, Antonios Lalas, Minas Dasygenis, Konstantinos Votis, Dimitrios Tzovaras. 170-179 [doi]
- Automatic Semi-quantitative Histological Assessment of Tissue Traits Using a Smart Web ApplicationOlympia Giannou, Dimitra E. Zazara, Anastasios D. Giannou, Petra Clara Arck, Georgios Pavlidis. 180-191 [doi]
- MERLIN: Identifying Inaccuracies in Multiple Sequence Alignments Using Object DetectionHiba Khodji, Lucille Herbay, Pierre Collet, Julie Dawn Thompson, Anne Jeannin-Girardon. 192-203 [doi]
- PigPose: A Realtime Framework for Farm Animal Pose Estimation and TrackingMilan Kresovic, Thong Duy Nguyen, Mohib Ullah, Hina Afridi, Faouzi Alaya Cheikh. 204-215 [doi]
- Speech Emotion Recognition from Earnings Conference Calls in Predicting Corporate Financial DistressPetr Hájek 0002. 216-228 [doi]
- The Bonsai Hypothesis: An Efficient Network Pruning TechniqueYasuaki Ito, Koji Nakano, Akihiko Kasagi. 229-241 [doi]
- Deep Recurrent Neural Networks for OYO Hotels RecommendationAnshul Rankawat, Rahul Kumar, Arun Kumar. 245-256 [doi]
- Fine-Grained Double-View Link Prediction Within the Dynamic Interaction NetworkJianye Pang, Wei Ke. 257-269 [doi]
- MTMA-DDPG: A Deep Deterministic Policy Gradient Reinforcement Learning for Multi-task Multi-agent EnvironmentsKarim Hamadeh, Julia El Zini, Joudi Hajar, Mariette Awad. 270-281 [doi]
- Reinforcement Learning Approach for Multi-period Inventory with Stochastic DemandManoj Shakya, Huey Yuen Ng, Darrell Joshua Ong, Bu-Sung Lee. 282-291 [doi]
- The Neocortex-Inspired Locally Recurrent Neural Network (NILRNN) as a Model of the Primary Visual CortexFranz A. Van-Horenbeke, Angelika Peer. 292-303 [doi]
- TraderNet-CR: Cryptocurrency Trading with Deep Reinforcement LearningVasilis Kochliaridis, Eleftherios Kouloumpris, Ioannis P. Vlahavas. 304-315 [doi]
- Transformer-Based Zero-Shot Detection via Contrastive LearningWei Liu, Hui Chen, Yongqiang Ma, Jianji Wang, Nanning Zheng 0001. 316-327 [doi]
- Efficient Large-Scale Machine Learning Techniques for Rapid Motif Discovery in Energy Data StreamsK. K. Lykothanasi, Spyros Sioutas, Kostas Tsichlas. 331-342 [doi]
- Energy Load Forecasting: Investigating Mid-Term Predictions with Ensemble LearnersCharalampos M. Liapis, Aikaterini Karanikola, Sotiris Kotsiantis. 343-355 [doi]
- Machine Learning Techniques for Regression in Energy DisaggregationChristos Konstantopoulos, Spyros Sioutas, Konstantinos Tsichlas. 356-366 [doi]
- Biologically Plausible Complex-Valued Neural Networks and Model OptimizationRyan Yu, Andrew Wood, Sarel Cohen, Moshik Hershcovitch, Daniel G. Waddington, Peter Chin. 369-382 [doi]
- Comparative Study by Using a Greedy Approach and Advanced Bio-Inspired Strategies in the Context of the Traveling Thief ProblemJulia Garbaruk, Doina Logofatu, Florin Leon. 383-393 [doi]
- Exploring the Relationship Between Visual Information and Language Semantic Concept in the Human BrainHaodong Jing, Ming Du, Yongqiang Ma, Nanning Zheng 0001. 394-406 [doi]
- Hierarchical Causality Network: Find the Effective Connectivity in Visual CortexMing Du, Haodong Jing, Yongqiang Ma, Nanning Zheng 0001. 407-419 [doi]
- The Generalization of Selection of an Appropriate Artificial Neural Network to Assess the Effort and Costs of Software ProjectsDragica Rankovic, Nevena Rankovic, Mirjana Ivanovic, Ljubomir Lazic. 420-431 [doi]
- Trade Between Population Size and Mutation Rate for GAAM (Genetic Algorithm with Aggressive Mutation) for Feature SelectionMarc Chevallier, Nistor Grozavu, Faouzi Boufarès, Nicoleta Rogovschi, Charly Clairmont. 432-444 [doi]
- A Novel Human-Centred Evaluation Approach and an Argument-Based Method for Explainable Artificial IntelligenceGiulia Vilone, Luca Longo. 447-460 [doi]
- An Analysis on Graph-Processing Frameworks: Neo4j and Spark GraphXAlabbas Alhaj Ali, Doina Logofatu. 461-470 [doi]
- Application of Graph-Based Technique to Identity ResolutionHassan B. Kazemian, Mohammad Hossein Amirhosseini, Michael Phillips. 471-482 [doi]
- Knowledge Engineering and Ontology for Crime InvestigationWilmuth Müller, Dirk Mühlenberg, Dirk Pallmer, Uwe Zeltmann, Christian Ellmauer, Konstantinos P. Demestichas. 483-494 [doi]
- Quantum Approach for Vertex Separator Problem in Directed GraphsAhmed Zaiou, Younès Bennani, Mohamed Hibti, Basarab Matei. 495-506 [doi]
- Unsupervised Multi-sensor Anomaly Localization with Explainable AIMina Ameli, Viktor Pfanschilling, Anar Amirli, Wolfgang Maaß, Kristian Kersting. 507-519 [doi]