Abstract is missing.
- Shaping the Music Perception of an Automatic Music Composition: An Empirical Approach for Modelling Music ExpressivenessMichele Della Ventura. 1-10 [doi]
- Diverse Ranking Approach in MCDM Based on Trapezoidal Intuitionistic Fuzzy NumbersZamali Tarmudi, Norzanah Abd Rahman. 11-21 [doi]
- Decision Tree and MCDA Under Fuzziness to Support E-Customer Satisfaction SurveyHouda Zaim, Mohammed Ramdani, Adil Haddi. 22-32 [doi]
- Search Convenience and Access Convenience: The Difference Between Website Shopping and Mobile ShoppingIbrahim Almarashdeh, Kamal Eldin Eldaw, Mutasem Alsmadi, Usama Badawi, Firas Haddad, Osama Ahmed Abdelkader, Ghaith M. Jaradat, Ayman Alkhaldi, Yousef Qawqzeh. 33-42 [doi]
- Automatic Classification and Segmentation of Low-Grade Gliomas in Magnetic Resonance ImagingMarta Barbosa, Pedro Moreira, Rogério Ribeiro, Luis Coelho. 43-50 [doi]
- Enhancing Ensemble Prediction Accuracy of Breast Cancer Survivability and Diabetes Diagnostic Using Optimized EKF-RBFN Trained PrototypesVincent F. Adegoke, Daqing Chen, Ebad Banissi, Safia Barsikzai. 51-65 [doi]
- Improving Audiovisual Content Annotation Through a Semi-automated Process Based on Deep LearningLuís Vilaça, Paula Viana, Pedro Carvalho, Teresa Andrade. 66-75 [doi]
- Subject Identification Based on Gait Using a RGB-D CameraAna Patrícia Rocha, José Maria Fernandes, Hugo Miguel Pereira Choupina, Maria do Carmo Vilas-Boas, João Paulo Silva Cunha. 76-85 [doi]
- Leakage Detection of a Boiler Tube Using a Genetic Algorithm-like Method and Support Vector MachinesYoung-Hun Kim, Jaeyoung Kim, Jong Myon Kim. 86-93 [doi]
- Sentiment Analysis on Tweets for Trains Using Machine LearningSachin Kumar, Marina I. Nezhurina. 94-104 [doi]
- A Genetic Algorithm for Superior Solution Set Search ProblemRyu Fukushima, Kenichi Tamura, Junichi Tsuchiya, Keiichiro Yasuda. 105-115 [doi]
- An Intelligent Tool for Detection of Phishing MessagesMarcos Pires, Petia Georgieva. 116-125 [doi]
- Discrete Wavelet Transform Application in Variable Displacement Pumps Condition MonitoringMolham Chikhalsouk, Balasubramanian Esakki, Khalid Zhouri, Yassin Nmir. 126-136 [doi]
- Characterizing Parkinson's Disease from Speech Samples Using Deep Structured LearningLígia Sousa, Diogo Braga, Ana Madureira, Luis Coelho, Francesco Renna. 137-146 [doi]
- Combinatorial Optimization Method Considering Distance in Scheduling ProblemYuta Obinata, Kenichi Tamura, Junichi Tsuchiya, Keiichiro Yasuda. 147-157 [doi]
- An Improved Gas Classification Technique Using New Features and Support Vector MachinesSe-Jong Kang, Jae-Young Kim, In-Kyu Jeong, M. M. Manjurul Islam, Kichang Im, Jong Myon Kim. 158-166 [doi]
- Superior Relation Based Firefly Algorithm in Superior Solution Set SearchHongran Wang, Kenichi Tamura, Junichi Tsuchiya, Keiichiro Yasuda. 167-176 [doi]
- Learning in Twitter Streams with 280 Character TweetsJoana Cósta, Catarina Silva 0001, Bernardete Ribeiro. 177-184 [doi]
- Retweet Predictive Model for Predicting the Popularity of TweetsNelson Oliveira, Joana Cósta, Catarina Silva 0001, Bernardete Ribeiro. 185-193 [doi]
- Handcrafted Descriptors-Based Effective Framework for Off-line Text-Independent Writer IdentificationAbderrazak Chahi, Youssef El Merabet, Yassine Ruichek, Raja Touahni. 194-206 [doi]
- Server Load Prediction on Wikipedia Traffic: Influence of Granularity and Time WindowCláudio A. D. Silva, Carlos Grilo, Catarina Silva. 207-216 [doi]
- Evolutionary Genes Algorithm to Path Planning ProblemsPaulo Salgado, Paulo Afonso. 217-225 [doi]
- An Efficient and Secure Forward Error Correcting Scheme for DNA Data StorageAnouar Yatribi, Mostafa Belkasmi, Fouad Ayoub. 226-237 [doi]
- A Blockchain-Based Scheme for Access Control in e-Health ScenariosJoão Pedro Dias, Hugo Sereno Ferreira, Angelo Martins. 238-247 [doi]
- Blockchain-Based PKI for Crowdsourced IoT Sensor InformationGuilherme Vieira Pinto, João Pedro Dias, Hugo Sereno Ferreira. 248-257 [doi]
- The Design of a Cloud Forensics Middleware System Base on Memory AnalysisShumian Yang, Lianhai Wang, Dawei Zhao, Guangqi Liu, Shuhui Zhang. 258-267 [doi]
- Privacy Enhancement of Telecom Processes Interacting with Charging Data RecordsSiham Arfaoui, Abdelhamid Belmekki, Abdellatif Mezrioui. 268-277 [doi]
- Warning of Affected Users About an Identity LeakTimo Malderle, Matthias Wübbeling, Sven Knauer, Michael Meier 0001. 278-287 [doi]
- Network Security Evaluation and Training Based on Real World Scenarios of Vulnerabilities Detected in Portuguese Municipalities' Network DevicesDaniel José Franco, Rui Miguel Silva, Abdullah Muhammed, Omar Khasro Akram, Andreia Graça. 288-297 [doi]
- A Novel Concept of Firewall-Filtering Service Based on Rules Trust-Risk AssessmentFaouzi Jaïdi. 298-307 [doi]
- A Survey of Blockchain Frameworks and ApplicationsBruno Tavares, Filipe Figueiredo Correia, André Restivo, João Pascoal Faria, Ademar Aguiar. 308-317 [doi]
- Filtering Email Addresses, Credit Card Numbers and Searching for Bitcoin Artifacts with the Autopsy Digital Forensics SoftwarePatrício Domingues, Miguel Frade, João Mota Parreira. 318-328 [doi]
- A Survey on the Use of Data Points in IDS ResearchHeini Ahde, Sampsa Rauti, Ville Leppänen. 329-337 [doi]
- Cybersecurity and Digital Forensics - Course Development in a Higher Education InstitutionMário Antunes 0002, Carlos Rabadão. 338-348 [doi]
- Model Driven Architectural Design of Information Security SystemIvan Gaidarski, Zlatogor Minchev, Rumen Andreev. 349-359 [doi]
- An Automated System for Criminal Police Reports AnalysisGonçalo Carnaz, Vítor Beires Nogueira, Mário Antunes 0002, Nuno M. Fonseca Ferreira. 360-369 [doi]
- Detecting Internet-Scale Traffic Redirection Attacks Using Latent Class ModelsAna Subtil, Maria Rosário de Oliveira, Rui Valadas, António Pacheco, Paulo Salvador. 370-380 [doi]
- Passive Video Forgery Detection Considering Spatio-Temporal ConsistencyKazuhiro Kono, Takaaki Yoshida, Shoken Ohshiro, Noboru Babaguchi. 381-391 [doi]