default search action
The Journal of Universal Computer Science, Volume 30
Volume 30, Number 1, January 2024
- Christian Gütl
:
Editorial. 1-2 - Bashar Alshouha
, Jesús Serrano-Guerrero
, David A. Elizondo
, Francisco P. Romero
, José Angel Olivas
:
What is the Consumer Attitude toward Healthcare Services? A Transfer Learning Approach for Detecting Emotions from Consumer Feedback. 3-24 - Ana Díaz-Muñoz
, Moisés Rodríguez
, Mario Piattini Velthuis
:
Towards a set of metrics for hybrid (quantum/classical) systems maintainability. 25-48 - Ngo Le Huy Hien
, Ah-Lian Kor
, Mei Choo Ang
, Eric Rondeau
, Jean-Philippe Georges
:
Image Filtering Techniques for Object Recognition in Autonomous Vehicles. 49-84 - Francisco Iniesto
, Covadonga Rodrigo
:
The use of WCAG and automatic tools by computer science students: a case study evaluating MOOC accessibility. 85-105 - Yilena Pérez-Almaguer
, Edianny Carballo-Cruz
, Yailé Caballero Mota
, Raciel Yera
:
Exploring content-based group recommendation for suggesting restaurants in Havana City. 106-129 - Raimundo Osvaldo Vieira
, Helyane Bronoski Borges
:
Dimensionality Reduction for Hierarchical Multi-Label Classification: A Systematic Mapping Study. 130-150
Volume 30, Number 2, February 2024
- Christian Gütl
:
Editorial. 151-152 - Petra Grd
, Igor Tomicic
, Ena Barcic
:
Transfer Learning with EfficientNetV2S for Automatic Face Shape Classification. 153-178 - Lizbeth Alejandra Hernández-González
, Ulises Juárez-Martínez
, Jezreel Mejía
, Alberto Alfonso Aguilar-Lasserre
:
A Proposal of Naturalistic Software Development Method. 179-203 - Shanshan Jia, Gaukhar Kamalova
, Dmytro Mykhalevskiy:
Mobile Handoff with 6LoWPAN Neighbour Discovery Auxiliary Communication. 204-220 - Ajay Kumar
:
Recommendation of Machine Learning Techniques for Software Effort Estimation using Multi-Criteria Decision Making. 221-241 - Anne Perera
, Amitha Caldera
:
Sentiment Analysis of Code-Mixed Text: A Comprehensive Review. 242-261 - Tien Quang Dam
, Nghia Thinh Nguyen
, Viet Trung Le
, Duc Tran Le
, Sylvestre Uwizeyemungu
, Thang Le Dinh
:
Visualizing Portable Executable Headers for Ransomware Detection: A Deep Learning-Based Approach. 262-286
Volume 30, Number 3, 2024
- Christian Gütl
:
Editorial. 287-288 - Jan A. Bergstra
, John V. Tucker
:
Synthetic Fracterm Calculus. 289-307 - Yasir Yakup Demircan
, Serhat Ozekes:
A Novel LSB Steganography Technique Using Image Segmentation. 308-332 - Alberto Jiménez-Macías
, Pedro J. Muñoz-Merino
, Margarita Ortiz-Rojas
, Mario Muñoz Organero
, Carlos Delgado Kloos
:
Content Modeling in Smart Learning Environments: A systematic literature review. 333-362 - Melih Kuncan
, Kaplan Kaplan
, Yilmaz Kaya
, Mehmet Recep Minaz
, H. Metin Ertunç
:
Classification of CNC Vibration Speeds by Heralick Features. 363-382 - Lifang Ren
, Jing Li
, Wenjian Wang
:
An SVR-based and Location-aware Method for Mobile QoS Prediction. 383-401 - Emre Sadikoglu
, Irfan Kösesoy
, Murat Gök
:
A Novel Data-Driven Attack Method on Machine Learning Models. 402-417
Volume 30, Number 4, 2024
- Christian Gütl
:
Editorial. 418-419 - Sivaramasamy Elayaraja
, Sunil Yeruva
, Vlastimil Stejskal
, Satish Nandipati
:
Multi-Class Microscopic Image Analysis of Protozoan Parasites Using Convolutional Neural Network. 420-432 - André Fernandes
, João Cruz, Miguel Mira da Silva
, Rúben Pereira
:
Mapping and Integrating Security and Risk Standards: a Systematic Literature Review. 433-448 - Sahar Idwan
, Junaid Ahmed Zubairi
, Syed Ali Haider
, Wael Etaiwi
:
Reactive Traffic Congestion Control by Using a Hierarchical Graph. 449-461 - Shahrzad Riahi
, Ramtin Khosravi
, Fatemeh Ghassemi
:
Knowledge-Related Policy Analysis in an Inference-Enabled Actor Model. 462-501 - Josival Silva
, Nelson S. Rosa
, Fernando Aires
:
UP-Home: A Self-Adaptive Solution for Smart Home Security. 502-530 - Sait Can Yücebas
, Sukran Yalpir
, Levent Genc
, Melike Dogan
:
Price Prediction and Determination of the Affecting Variables of the Real Estate by Using X-Means Clustering and CART Decision Trees. 531-560
Volume 30, Number 5, 2024
- Christian Gütl
:
Editorial. 561-562 - Florian Skopik
, Arndt Bonitz, Daniel Slamanig
, Markus Kirschner
, Wolfgang Hacker:
Towards a single device for multiple security domains. 563-589 - Yunus Emre Avci
, Adem Tuncer
:
Detection of Driver Styles in Lane Changes using Wavelet Transform. 590-602 - Alaor Cervati Neto
, Alexandre L. M. Levada
:
Probabilistic Nearest Neighbors Based Locality Preserving Projections for Unsupervised Metric Learning. 603-616 - Ayoub Charef
, Zahi Jarir
, Mohamed Quafafou:
Assessing the driving behaviour of motorcyclists to improve road safety. 617-644 - Razieh Dehghani
, Raman Ramsin
:
Software Process Improvement by Managing Situational Method Engineering Knowledge. 645-673 - Saima Farhan
, Rubiya Shoukat
, Aqsa Aslam
:
Automatic Sarcasm Detection on Cross-Platform Social Media Datasets: A GLoVe and Bi-LSTM Based Approach. 674-693 - Binnu Paul
, Dwijen Rudrapal
, Kunal Chakma
, Anupam Jamatia
:
Multimodal Machine Translation Approaches for Indian Languages: A Comprehensive Survey. 694-717
Volume 30, Number 6, 2024
- Christian Gütl
:
Editorial. 718-719 - George Marsicano
, Edna Dias Canedo
, Glauco Vitor Pedrosa
, Cristiane Soares Ramos
, Rejane M. da C. Figueiredo
:
Digital Transformation of Public Services in a Startup-Based Environment: Job Perceptions, Relationships, Potentialities and Restrictions. 720-757 - Mauricio Solar
, Pablo Aguirre:
Deep learning techniques to process 3D chest CT. 758-778 - Rakia Saidi
, Fethi Jarray
, Didier Schwab
:
A BERT-GRU Model for Measuring the Similarity of Arabic Text. 779-790 - Nozha Jlidi
, Sameh Kouni
, Olfa Jemai
, Tahani Bouchrika
:
MediaPipe with GNN for Human Activity Recognition. 791-813 - G. V. Vidya Lakshmi
, S. Gopikrishnan
:
IMD-MP: Imputation of Missing Data in IoT Based on Matrix Profile and Spatio-temporal Correlations. 814-846 - F. Didem Alay
, Nagehan Ilhan
, Mehmet Tahir Gulluoglu:
A Comparative Study of Data Mining Methods for Solar Radiation and Temperature Forecasting Models. 847-877
Volume 30, Number 7, 2024
- Christian Gütl
:
Editorial. 878-879 - Vinicius Bischoff
, Kleinner Farias
:
An Empirical Study on the Correctness and Effort to Integrate Feature Models. 880-908 - Abdulkadir Buldu
, Kaplan Kaplan
, Melih Kuncan
:
A Hybrid Study for Epileptic Seizure Detection Based on Deep Learning using EEG Data. 909-934 - Darwin Alulema
, Maximiliano Paredes-Velasco
, Ricardo de Arriba Lasso:
LESCA: Scaffolding and its impact on the higher cognitive levels and emotions of the student. 935-956 - Anwar Mira
, Olaf Hellwich
:
An Embedded Neural Network Approach for Reinforcing Deep Learning: Advancing Hand Gesture Recognition. 957-977 - Rasim Çekik
, Mahmut Kaya
:
A New Performance Metric to Evaluate Filter Feature Selection Methods in Text Classification. 978-1005
Volume 30, Number 8, 2024
- Christian Gütl
:
Editorial. 1006-1007 - Rewayda Razaq Abo-Alsabeh
, Meryem Cheraitia
, Abdellah Salhi
:
A Plant Propagation Algorithm for the Bin Packing Problem. 1008-1022 - Ildevana Poltronieri
, Avelino Francisco Zorzo, Maicon Bernardino, Edson OliveiraJr
:
Usa-DSL: a Process for Usability Evaluation of Domain-Specific Languages. 1023-1047 - Carina Heßeling
, Sebastian Litzinger
, Jörg Keller
:
Archive-based Covert Channel in Sensor Streaming Data. 1048-1067 - Anwar Ahmed Khan
, Shama Siddiqui
, Indrakshi Dey
:
Enhancing Health Risk Prediction in Internet of Medical Things: Leveraging Association Rule Mining. 1068-1088 - Furkan Berk Seyrek
, Halil Yigit
:
Diagnosis of Lung Cancer from Computed Tomography Scans with Deep Learning Methods. 1089-1111 - Yu Zhong
, Bo Shen
, Tao Wang
, Jinglin Zhang
, Yun Liu
:
Interaction and Fusion of Rich Textual Information Network for Document-level Relation Extraction. 1112-1136
Volume 30, Number 9, 2024
- Steffen Wendzel
, Aleksandra Mileva
, Virginia N. L. Franqueira
, Martin Gilje Jaatun
:
Editorial: Fighting Cybersecurity Risks from a Multidisciplinary Perspective. 1137-1139 - Yashovardhan Sharma
, Simon Birnbach
, Ivan Martinovic:
Exploiting TTPs to Design an Extensible and Explainable Malware Detection System. 1140-1162 - Orçun Çetin, Emre Ekmekcioglu
, Budi Arief
, Julio C. Hernandez-Castro
:
An Empirical Evaluation of Large Language Models in Static Code Analysis for PHP Vulnerability Detection. 1163-1183 - Javier Muñoz-Calle, Rafael M. Estepa-Alonso
, Antonio Estepa Alonso
, Jesús Esteban Díaz Verdejo, Elvira Castillo-Fernández
, Germán Madinabeitia:
A Flexible Multilevel System for Mitre ATT&CK Model-driven Alerts and Events Correlation in Cyberattacks Detection. 1184-1204 - Dagmar Gesmann-Nuissl
, Ines Maria Tacke
, Stefanie Meyer
:
"Stop it, Fridge!" - Legally Secure and Interest-Based Data Sharing in the Age of Modern (Cyber) Technology. 1205-1223 - Lasse Nitz
, Avikarsha Mandal
:
Bloom Encodings in DGA Detection: Improving Machine Learning Privacy by Building on Privacy-Preserving Record Linkage. 1224-1243 - Robin Duraz
, David Espes
, Julien Francq
, Sandrine Vaton
:
Using CVSS scores can make more informed and more adapted Intrusion Detection Systems. 1244-1264 - Alex Crgol, Simon Vrhovec
:
Recognition of genuine and phishing emails may not be associated with response to phishing attacks. 1265-1283
Volume 30, Number 10, 2024
- Christian Gütl
:
Editorial. 1284-1285 - Panji Bintoro
, Zulkifli Zulkifli
, Yaya Heryadi
, Fitriana Fitriana
, Nopi Anggista Putri
, Dwi Yana Ayu Andini
:
Automatic Detection of Systemic Diseases to Recognize Mpox Virus using GPLNet Based on Skin Lesions. 1286-1315 - Farhad Lotfi
, Branka Rodic
, Aleksandra Labus
, Zorica Bogdanovic
:
Smart healthcare: developing a pattern to predict the stress and anxiety among university students using machine learning technology. 1316-1341 - Michele dos Santos Soares
, Cassio Andrade Furukawa
, Maria Istela Cagnin
, Débora Maria Barroso Paiva
:
Accessibility Barriers for Blind Students in Teaching-learning Systems. 1342-1370 - Houda Tadjer
, Zohra Mehenaoui
, Yacine Lafifi
, Amira Chemmakh
:
Improving temporal behavior based on students' traces in online-based learning environments. 1371-1388 - Ujwala Thakur
, Ankit Vidyarthi
, Amarjeet Prajapati
:
Recognition of Real-Time Video Activities Using Stacked Bi-GRU with Fusion-based Deep Architecture. 1423-1452
Volume 30, Number 11, 2024
- Christian Gütl
:
Editorial. 1453-1454 - Álex dos Santos Moura
, Fábio Gomes Rocha, Michel S. Soares
:
Microservices Patterns Recommendation based on Information Retrieval. 1455-1483 - Gonzalo P. Espinel-Mena
, José Luis Carrillo-Medina, Eddie E. Galarza
, Mario Matias Urbieta
:
A Systematic Mapping of Configuration Management Activities in Software Product Line. 1484-1510 - Edward Kai Fung Dang
, Robert Wing Pong Luk
, Qing Li
:
A Study of Word Bigrams for Pseudo-relevance Feedback in Information Retrieval. 1511-1528 - Prateek Thakral
, Yugal Kumar
:
Multi-Search Strategy-based Improved Water Flow Optimizer Algorithm for Cluster Analysis. 1529-1568 - Samit Bhanja
, Banani Ghose
, Abhishek Das
:
Multi-Step-Ahead Time Series Forecasting using Deep Learning and Fuzzy Time Series-based Error Correction Method. 1569-1594 - Abdullilah A. Alotaibi
, Salman AlQahtani
:
An Intelligent Distributed Channel Selection Framework with Hybrid Mode Selection for Interference Mitigation in D2D based 5G Networks. 1595-1623
Volume 30, Number 12, 2024
- Christian Gütl
:
Editorial. 1624-1625 - Geová Junio da Silva Tavares, Nelson Souto Rosa
:
A Survey on Human in the Loop for Self-Adaptive Systems. 1626-1644 - Aluizio Haendchen Filho
, Adson Marques da Silva Esteves
, Hércules Antônio do Prado, Edilson Ferneda
, André Luís Alice Raabe:
Using Adaptive Content Recommendations to Improve Logic and Programming Teaching and Learning. 1645-1661 - Rupesh Kumar Verma, A. J. Khan
, Sunil Kumar Kashyap
, Manoj Kumar Chande
:
Certificateless Aggregate Signatures: A Comprehensive Survey and Comparative Analysis. 1662-1690 - Besma Hezili
, Hichem Talbi
:
A Collaborative Auto-Diversified Optimization Scheme. 1691-1723 - Maroua Chemlal
, Amina Zedadra
, Ouarda Zedadra
, Antonio Guerrieri
, Mohamed Nadjib Kouahla
:
A Multi-Criteria Food and Restaurant Recommendation System. 1724-1754 - Ashish Ranjan Mishra
, Rakesh Kumar
, Rajkumar Saini
:
Performance Enhancement of EEG Signatures for Person Authentication Using CNN BiLSTM Method. 1755-1779
Volume 30, Number 13, 2024
- Christian Gütl:
Editorial. 1780-1781 - Marija Kustelega, Renata Mekovec, Ahmed Shareef:
Privacy and security challenges of the digital twin: systematic literature review. 1782-1806 - Mehtap Ülker, Ahmet Bedri Özer:
The Bart-based Model for Scientific Articles Summarization. 1807-1828 - Alessander Osorio, Paulo Roberto Ferreira Jr., Gerson Geraldo H. Cavalheiro:
Guided Reading: A Case Study in Evaluating Scientific Reports on Quantitative Research. 1829-1848 - Ruan Visser, Trieko Grobler, Marcel Dunaiski:
Insights into Low-Resource Language Modelling: Improving Model Performances for South African Languages. 1849-1871 - Seyedeh Aridis Ahadi, Kian Jazayeri, Sahand Tebyani:
Detecting Suicidality from Reddit Posts Using a Hybrid CNN - LSTM Model. 1872-1904
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.