Content
2024, Volume 2024, Issue 3
- 340-358 Securing RPL-Based Networks Against Version Number and Rank Attacks
by Alaa Eddine Khalfoune & Rachid Beghdad - 359-373 The Fairness Stitch: A Novel Approach for Neural Network Debiasing
by Modar Sulaiman & Kallol Roy - 374-394 Blockchain-Powered Patient-Centric Access Control with MIDC AES-256 Encryption for Enhanced Healthcare Data Security
by Krishna Prasad Narasimha Rao & Selvan Chinnaiyan - 395-417 Evaluation of the I-Voting System for Remote Primary Elections of the Czech Pirate Party
by Tomáš Martínek & Michal Malý - 418-432 Investigating the Causes of Non-realization of Project Prediction and Proposal of a New Prediction Framework
by Radek Doskočil & Branislav Lacko - 433-459 Information Ethics in Light of Bibliometric Analyses: Discovering a Shift to Ethics of Artificial Intelligence
by Jela Steinerová & Miriam Ondrišová - 460-489 Generative Artificial Intelligence in Education: Advancing Adaptive and Personalized Learning
by Manel Guettala & Samir Bourekkache & Okba Kazar & Saad Harous
2024, Volume 2024, Issue 2
- 165-167 Innovations in Deep Learning and Intelligent Systems for Healthcare and Engineering Applications
by Hakim Bendjenna & Lawrence Chung & Abdallah Meraoumia - 168-192 Interoperable IoRT for Healthcare: Securing Intelligent Systems with Decentralized Blockchain
by Abdessamed Echikr & Ali Yachir & Chaker Abdelaziz Kerrache & Abdelkrim Kamel Oudjida & Zakaria Sahraoui - 193-212 Efficient Contactless Palmprint Recognition System Based on Deep Rule-Based Classification
by Yacine Belhocine & Abdallah Meraoumia & Khediri Abderrazak & Mohammed Saigaa - 213-233 Deep Neural Network-Based Model for Breast Cancer Lesion Diagnosis in Mammography Images
by Mohamed Amine Yakoubi & Nada Khiari & Amine Khiari & Ahlem Melouah - 234-250 Beyond Traditional Biometrics: Harnessing Chest X-Ray Features for Robust Person Identification
by Farah Hazem & Bennour Akram & Tahar Mekhaznia & Fahad Ghabban & Abdullah Alsaeedi & Bhawna Goyal - 251-272 Revolutionizing Historical Manuscript Analysis: A Deep Learning Approach with Intelligent Feature Extraction for Script Classification
by Merouane Boudraa & Akram Bennour & Tahar Mekhaznia & Abdulrahman Alqarafi & Rashiq Rafiq Marie & Mohammed Al-Sarem & Ayush Dogra - 273-287 Deep Learning Proactive Approach to Blackout Prevention in Smart Grids: An Early Warning System
by Abderrazak Khediri & Ayoub Yahiaoui & Mohamed Ridda Laouar & Yacine Belhocine - 288-307 Deep Learning Approach for Predicting Psychodiagnosis
by Zouaoui Samia & Khamari Chahinez - 308-326 Advancements in Breast Cancer Diagnosis: A Comprehensive Review of Mammography Datasets, Preprocessing and Classification Techniques
by Hama Soltani & Issam Bendib & Mohamed Yassine Haouam & Mohamed Amroune - 327-339 Examining Adaptive E-Learning Approaches to Enhance Learning and Individual Experiences
by Fateh Benkhalfallah & Mohamed Ridda Laouar & Mohamed Salah Benkhalfallah
2024, Volume 2024, Issue 1
- 1-23 Blockchain-Based Framework for Privacy Preservation and Securing EHR with Patient-Centric Access Control
by Reval Prabhu Puneeth & Govindaswamy Parthasarathy - 24-37 Optimized Ensemble Support Vector Regression Models for Predicting Stock Prices with Multiple Kernels
by Subba Reddy Thumu & Geethanjali Nellore - 38-61 Dynamic Context-Aware Recommender System for Home Automation Through Synergistic Unsupervised and Supervised Learning Algorithms
by Tahar Dilekh & Saber Benharzallah & Ayoub Mokeddem & Saoueb Kerdoudi - 62-84 University Library Information Resources as a Basis for Enhancing Educational and Professional Programmes in Information, Library and Archival Studies
by Nadiia Bachynska & Yurii Horban & Tetiana Novalska & Vladyslav Kasian & Nataliya Gaisynuik - 85-99 Impact of Management Support on Business Intelligence Adoption: Illustrative Case Study Testing Different Managerial Strategies
by Jakub Andar & Petra Kasparova - 100-113 Understanding Consumer Perceptions About Smartwatches: Feature Extraction and Opinion Mining Using Supervised Learning Algorithm
by Dhanya Manayath & Sanju Kaladharan & Nikita Venal Soman & Abith Vijayakumaran - 114-133 Dynamic Pricing in E-commerce: Bibliometric Analysis
by Lukáš Poláček & Miloš Ulman & Petr Cihelka & Edita Šilerová - 134-164 Bibliometric Panorama of Accounting Information System Research Evolution
by Hanna Mysaka & Ivan Derun
2023, Volume 2023, Issue 2
- 200-224 AnnoJOB: Semantic Annotation-Based System for Job Recommendation
by Assia Brek & Zizette Boufaida - 225-242 Emotion-Based Sentiment Analysis Using Conv-BiLSTM with Frog Leap Algorithms
by Sandeep Yelisetti & Nellore Geethanjali - 243-259 Multi-Class Text Classification on Khmer News Using Ensemble Method in Machine Learning Algorithms
by Raksmey Phann & Chitsutha Soomlek & Pusadee Seresangtakul - 260-274 Diagnostic Performance Evaluation of Deep Learning-Based Medical Text Modelling to Predict Pulmonary Diseases from Unstructured Radiology Free-Text Reports
by Shashank Shetty & Ananthanarayana V S & Ajit Mahale - 275-295 Use of Data Mining for Analysis of Czech Real Estate Market
by Ilya Tsakunov & David Chudán - 296-310 Factors Influencing Cloud Computing Adoption by SMEs in the Czech Republic: An Empirical Analysis Using Technology-Organization-Environment Framework
by Jiří Homan & Ladislav Beránek - 311-326 Impact of Women Driving Rights on Adoption and Usage of E-hailing Applications in Saudi Arabia
by Muhammad Ahsan Qureshi & Azra Shamim - 327-341 Digital Archives as Research Infrastructure of the Future
by Michal Lorenz & Michal Konečný - 342-356 Automated Medical Document Verification on Cloud Computing Platform: Blockchain-Based Soulbound Tokens
by Ashish Khanna & Yogesh Sharma & Devansh Singh & Ria Monga & Tarun Kumar - 357-378 Segmenting Customers with Data Analytics Tools: Understanding and Engaging Target Audiences
by Tomáš Pitka & Jozef Bucko - 379-399 ck-means and fck-means: Two Deterministic Initialization Procedures for k-means Algorithm Using a Modified Crowding Distance
by Abdesslem Layeb - 400-418 Safe Haven for Asian Equity Markets During Financial Distress: Bitcoin Versus Gold
by Pham Thi Ngoc Dung & Luong Kim Long & Thuy Trang Le Ngoc & Do Thi Thanh Nhan - 419-438 Visualisation of User Stories in UML Models: A Systematic Literature Review
by Mohammad Nazrul Mornie & Nurfauza Jali & Syahrul Nizam Junaini & Edwin Mit & Cheah Wai Shiang & Suhaila Saee - 439-467 Consumer Behaviour in Gamified Environment: A Bibliometric and Systematic Literature Review in Business and Management Area
by Deeksha Singh & Sambashiva Rao Kunja - 468-489 Consumer Behaviour and Acceptance in Fintech Adoption: A Systematic Literature Review
by Muhardi Saputra & Paulus Insap Santosa & Adhistya Erna Permanasari
2023, Volume 2023, Issue 1
- 1-2 Use of Deep Learning and Blockchain Technologies in Healthcare Industry
by Mazin Abed Mohammed & Seifedine Kadry & Oana Geman - 3-18 Optimized Negative Selection Algorithm for Image Classification in Multimodal Biometric System
by Monsurat Omolara Balogun & Latifat Adeola Odeniyi & Elijah Olusola Omidiora & Stephen Olatunde Olabiyisi & Adeleye Samuel Falohun - 19-31 Deep Residual Learning Image Recognition Model for Skin Cancer Disease Detection and Classification
by Jamal Mustafa Al-Tuwaijari & Naeem Th. Yousir & Nafea Ali Majeed Alhammad & Salama Mostafa - 32-53 Classification of Eye Images by Personal Details With Transfer Learning Algorithms
by Cemal Aktürk & Emrah Aydemir & Yasr Mahdi Hama Rashid - 54-70 Comparative Analysis of Performance Metrics for Machine Learning Classifiers with a Focus on Alzheimer's Disease Data
by Sivakani Rajayyan & Syed Masood Mohamed Mustafa - 71-86 Deep Learning Convolutional Neural Network for SARS-CoV-2 Detection Using Chest X-Ray Images
by Ali Mohammed Saleh Ahmed & Inteasar Yaseen Khudhair & Salam Abdulkhaleq Noaman - 87-103 Deep Learning Techniques for Quantification of Tumour Necrosis in Post-neoadjuvant Chemotherapy Osteosarcoma Resection Specimens for Effective Treatment Planning
by T. S. Saleena & P. Muhamed Ilyas & V. M. Kutty Sajna & A. K. M. Bahalul Haque - 104-122 Longitudinal Investigation of Work Stressors Using Human Voice Features
by Indhumathi Natarajan & Maheswaran Shanmugam & Samiappan Dhanalakshmi & Santhosh Easwaramoorthy & Sethuraja Kuppusamy & Saravanan Balu - 123-140 Blood Pressure Estimation Using Emotion-Based Optimization Clustering Model
by Vaishali Rajput & Preeti Mulay & Sharnil Pandya & Chandrashekhar Mahajan & Rupali Deshpande - 141-159 Multi-Class Skin Cancer Classification Using a Hybrid Dynamic Salp Swarm Algorithm and Weighted Extreme Learning Machines with Transfer Learning
by Ramya Panneerselvam & Sathiyabhama Balasubramaniam - 160-178 Survey on Security and Interoperability of Electronic Health Record Sharing Using Blockchain Technology
by Reval Prabhu Puneeth & Govindaswamy Parthasarathy - 179-199 Survey on Electronic Health Record Management Using Amalgamation of Artificial Intelligence and Blockchain Technologies
by Krishna Prasad Narasimha Rao & Sunilkumar Manvi
2022, Volume 2022, Issue 3
- 290-292 Artificial Intelligence and Blockchain Technology Enabling Sustainable and Smart Infrastructure
by Venkatachalam Kandasamy & Mohamed Abouhawwash & Nebojsa Bacanin - 293-308 A Novel Automatic Relational Database Normalization Method
by Emre Akadal & Mehmet Hakan Satman - 309-323 Data Analytics Approach for Short-term Sales Forecasts Using Limited Information in E-commerce Marketplace
by Christopher Chin Fung Chee & Kang Leng Chiew & Izzatul Nabila bt Sarbini & Eileen Kho Huei Jing - 324-347 Classification of Handwritten Text Signatures by Person and Gender: A Comparative Study of Transfer Learning Methods
by Sidar Agduk & Emrah Aydemir - 348-360 Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
by Saad Ahmed Dheyab & Shaymaa Mohammed Abdulameer & Salama Mostafa - 361-379 Improving Privacy-preserving Healthcare Data Sharing in a Cloud Environment Using Hybrid Encryption
by Insaf Boumezbeur & Karim Zarour - 380-395 Evaluation of Community Detection by Improving Influence Nodes in Complex Networks Using InfoMap with Sigmoid Fish Swarm Optimization Algorithm
by Devi Selvaraj & Rajalakshmi Murugasamy - 396-422 Blockchain Design and Implementation Techniques, Considerations and Challenges in the Banking Sector: A Systematic Literature Review
by Senate Sylvia Mafike & Tendani Mawela - 423-457 Comprehensive Review of Multimodal Medical Data Analysis: Open Issues and Future Research Directions
by Shashank Shetty & Ananthanarayana V S & Ajit Mahale - 458-466 Use of Intelligent Navigation and Crowd Collaboration for Automated Collection of Data on Transport Infrastructure
by Tomáš Tvrzský
2022, Volume 2022, Issue 2
- 149-151 Current Status and Plans for Further Development of Acta Informatica Pragensia
by Zdenek Smutny & Stanislava Mildeova - 152-178 Comments on Copyright Aspects of Use of Copyright Works in Digital Teaching
[Poznámky k autorskoprávním aspektům užití autorských děl při digitální výuce]
by Martin Boháček - 179-204 Incremental Model Transformation with Epsilon in Model-Driven Engineering
by Marzieh Ghorbani & Mohammadreza Sharbaf & Bahman Zamani - 205-217 Gender Recognition Based on Hand Thermal Characteristic
by Katerina Prihodova - 218-240 Exploring Facebook Identity Construction of Vietnamese Netizens
by Hai Chung Pham & Lien Nguyen & Phuong Tran & Thuy Tran - 241-253 Use of FURIA for Improving Task Mining
by Petr Průcha & Jan Skrbek - 254-264 Increasing Efficiency in Inventory Control of Products with Sporadic Demand Using Simulation
by Katerina Huskova & Jakub Dyntar - 265-284 Service Desk Onboarding Training Environment
by Michal Dostál - 285-289 What is the Real Threat of Information Explosion?
by Petr Strossa
2022, Volume 2022, Issue 1
- 1-14 Visual Interface Design Innovation: Citizens' Perception of Financial Administration Applications
by Tereza Zichová - 15-35 Image-based Product Recommendation Method for E-commerce Applications Using Convolutional Neural Networks
by Pegah Malekpour Alamdari & Nima Jafari Navimipour & Mehdi Hosseinzadeh & Ali Asghar Safaei & Aso Darwesh - 36-47 Predicting Mortality in Patients with Stroke Using Data Mining Techniques
by Zahra Hadianfard & Hadi Lotfnezhad Afshar & Surena Nazarbaghi & Bahlol Rahimi & Toomas Timpka - 48-61 Impact of Social Media Application Qualities on Using Them for Daily News
by Davod Farhadi & Ali Maroosi - 62-79 Body Image Esteem and Photo Manipulation Among Social Media Users
by Hai Chung Pham & Lien Nguyen & Tuan Anh Vu & Phuong Tran - 80-104 CA-BPEL: A New Approach to Facilitate the Development and Execution of Context-Aware Service Orchestrations
by Hossein Moradi & Bahman Zamani & Kamran Zamanifar - 105-122 Privacy Preservation and Access Control for Sharing Electronic Health Records Using Blockchain Technology
by Insaf Boumezbeur & Karim Zarour - 123-140 Personal Data as a Market Commodity in the GDPR Era: A Systematic Review of Social and Economic Aspects
by Aleksei Zelianin - 141-144 Call for Special Issue Papers: Deep Learning Blockchain-enabled Technology for Improved Healthcare Industrial Systems
by Mazin Abed Mohammed & Seifedine Kadry & Oana Geman - 145-148 Call for Special Issue Papers: Sustainable Solutions for Internet of Things Using Artificial Intelligence and Blockchain in Future Networks
by Venkatachalam Kandasamy & Mohamed Abouhawwash & Nebojsa Bacanin
2021, Volume 2021, Issue 3
- 207-210 What is Social Informatics from an International Perspective?
by Vasja Vehovar & Zdenek Smutny & Alice R. Robbin - 211-235 Social Informatics Experience: A Case Study on Learning and Teaching Sociological Basics in a Technical Context
by Christa Weßel - 236-256 Czech and Slovak Educators' Online Teaching Experience: A Covid-19 Case Study
by Jozef Hvorecký & Michal Beňo & Soňa Ferenčíková & Renata Janošcová & Jozef Šimúth - 257-274 Hateful and Other Negative Communication in Online Commenting Environments: Content, Structure and Targets
by Vasja Vehovar & Dejan Jontes - 275-288 Discovery of Points of Interest with Different Granularities for Tour Recommendation Using a City Adaptive Clustering Framework
by Junjie Sun & Tomoki Kinoue & Qiang Ma - 289-300 Social Informatics: 30 Years of Development of Russian Scientific School
by Konstantin K. Kolin - 301-332 The Russian Concept of Social Informatics in Light of Information Technology Innovation: A Systematic Review
by Nina I. Melnikova & Olga A. Romanovskaya - 333-348 The Praxeological Research Programme of Socio-Informatics - the Siegen School
by Volker Wulf & Anne Weibert & Konstantin Aal & Sarah Rüller & Markus Rohde - 349-369 Towards Re-Decentralized Future of the Web: Privacy, Security and Technology Development
by Stanislav Vojíř & Jan Kučera - 370-371 Book Review: Sozioinformatik - Von Menschen & Computern … und Bibern
by Frank Wolff
2021, Volume 2021, Issue 2
- 121-122 Inspiring Technologies for Digital Inclusivity
by Kang Leng Chiew - 123-137 Modelling COVID-19 Hotspot Using Bipartite Network Approach
by Boon Hao Hong & Jane Labadin & Wei King Tiong & Terrin Lim & Melvin Hsien Liang Chung - 138-154 A Neural Network-Based Approach in Predicting Consumers' Intentions of Purchasing Insurance Policies
by Wen Teng Chang & Kee Huong Lai - 155-171 Sentiment Analysis for Thai Language in Hotel Domain Using Machine Learning Algorithms
by Nattawat Khamphakdee & Pusadee Seresangtakul - 172-191 Trialability and Purposefulness: Their Role Towards Google Classroom Acceptance Following Educational Policy
by Solomon Oluyinka & Maria Cusipag - 192-206 E-Commerce Readiness Assessment in Sarawak
by Ahmad Termidzi Bin Serojai & Hamimah Binti Ujir & Irwandi Hipni Bin Mohamad Hipiny
2021, Volume 2021, Issue 1
- 1-21 Financial Inclusion of the Elderly: Exploring the Role of Mobile Banking Adoption
by Nkosikhona Theoren Msweli & Tendani Mawela - 22-37 Expected and Achieved Benefits of ERP Systems Implementation over Time
by Libor Měsíček & Pavel Petrus & Adéla Stránská - 38-60 Three Metric-Based Method for Data Compatibility Calculation
by Daniel Vodňanský - 61-74 Bibliometric Analysis of Clinical Decision Support Systems
by Cemal Aktürk - 75-84 Automated Computer Attacks Detection in University Environment
by Lukáš Švarc & Pavel Strnad - 85-107 Proposing Two Hybrid Data Mining Models for Discovering Students' Mental Health Problems
by Shabnam Shadroo & Mohsen Yoosefi Nejad & Samira Tavanaiee Yosefian & Morteza Naserbakht & Mehdi Hosseinzadeh - 108-120 Effective Designing of Order Picking Systems Using Dynamic Simulation
by Petra Kašparová & Jakub Dyntar
2020, Volume 2020, Issue 2
- 74-91 The Digital Media in Lithuania: Combating Disinformation and Fake News
by Aelita Skarzauskiene & Monika Maciuliene & Ornela Ramasauskaite - 92-107 Mild Cognitive Impairment Detection Using Association Rules Mining
by František Babič & Ľudmila Pusztová & Ljiljana Trtica Majnarić - 108-131 Research on User Behaviors and Tolerance of Faulty Web Interactions
by Veli Özcan Budak & Emre Akadal & Sevinç Gülseçen - 132-153 Culturally Sensitive Website Elements and Features: A Cross-National Comparison of Websites from Selected Countries
by Radim Cermak - 154-169 The Role of Twitter During the COVID-19 Crisis: A Systematic Literature Review
by Mahsa Dalili Shoaei & Meisam Dastani - 170-183 The Process of Unit Price Extraction from Public Sector Contracts
by Tomáš Bruckner & Filip Vencovský - 184-199 Perception of Information Sensitivity for Internet Users in Saudi Arabia
by Khaled Almotairi & Bilal Bataineh - 200-209 Route and Travel Time Optimization for Delivery and Utility Services: An Industrial Viewpoint
[Optimalizace trasy a dojezdových časů u zásilkových a obslužných služeb: Pohled praxe]
by Robin Jonák & Zdeněk Smutný & Milan Šimůnek & Michal Doležel - 210-223 The Use and Teaching of Agile Software Development in the Czech Republic
[Použití a výuka agilních přístupů k vývoji softwaru v České republice]
by Alena Buchalcevová - 224-227 Call for Special Issue Papers: Perspectives of Social Informatics
by Vasja Vehovar & Zdenek Smutny & Alice R. Robbin
2020, Volume 2020, Issue 1
- 4-17 Factors Influencing Researcher Cooperation in Virtual Academic Communities Based on Principal Component Analysis
by Jiangang Pang & Jan Capek - 18-29 Greiner's Model and Its Application in Automotive Companies in the Czech Republic
by Lenka Sukova - 30-47 Knowledge Management-Enabling Technologies: A Supplementary Classification
by Monika Dávideková & Michal Greguš & Marek Zanker & Vladimír Bureš - 48-57 Hand-Based Biometric System Using Convolutional Neural Networks
by Katerina Prihodova & Miloslav Hub - 58-69 Academic Conferences During the COVID-19 Pandemic: A Personal Look Back at XP 2020
[Akademické konference v časech pandemie COVID-19 - osobní ohlédnutí za XP 2020]
by Michal Doležel
2019, Volume 2019, Issue 2
- 72-87 Digitally-Powered Human Resource Management: Skills and Roles in the Digital Era
by Anastasiia Mazurchenko & Kateřina Maršíková - 88-111 Analysis of Biometric Data Under the General Data Protection Regulation
[Analýza biometrických údajů v kontextu obecného nařízení o ochraně osobních údajů]
by Ján Matejka & Soňa Matochová & Josef Prokeš - 112-131 A Probe Survey of Bitcoin Transactions Through Analysis of Advertising in an On-Line Discussion Forum
by Zoltan Ban & Jan Lansky & Stanislava Mildeova & Petr Tesar
2019, Volume 2019, Issue 1
- 4-17 A Case Study of RFID Technology Application for Protection of Computing Technology Against Theft and Users' Tendency to Bypass the Protection
[Případová studie využití technologie RFID pro zabezpečení výpočetní techniky proti odcizení a tendence uživatelů obcházet zabezpečení]
by Dušan Brodani - 18-37 Data Mining from the Banking Sector´s Data
[Dolovanie dát z bankového sektora]
by Anna Biceková & Ľudmila Pusztová - 38-65 Automatic Assistance for Blind People in Electrical Engineering and Informatics
[Automatická asistencia pre nevidiacich ľudí pri práci v oblasti elektrotechniky a informatiky]
by Milan Hudec
2018, Volume 2018, Issue 2
- 138-151 A Users' Awareness Study and Influence of Socio-Demography Perception of Anti-Phishing Security Tips
by Abdul Orunsolu & Omorinola Afolabi & Simon Sodiya & Adio Akinwale - 152-165 Review of Latent Dirichlet Allocation Methods Usable in Voice of Customer Analysis
by Lucie Sperkova - 166-167 Cryptocurrency
by Petr Tesař
2018, Volume 2018, Issue 1
- 4-21 Analyzing Social Media Data for Recruiting Purposes
by Lucie Böhmová & David Chudán - 22-39 Problems with IPv6 Implementation
[Problémy zavádění IPv6]
by Vladimír Nulíček - 40-57 Classification and Evaluation of Cloud-Based Testing Tools: The Case Study of Web Applications' Security Testing
by Martin Lněnička & Jan Čapek - 58-73 Data Mining from Open Fiscal Data
[Dolování z otevřených dat o rozpočtech a výdajích]
by David Chudán & Vojtěch Svátek & Jaroslav Kuchař & Stanislav Vojíř - 74-103 An Overview of Approaches Evaluating Intelligence of Artificial Systems
[Přehled přístupů k vyhodnocování inteligence umělých systémů]
by Ondřej Vadinský - 104-111 Paraconsistent Many-Valued Logic in GUHA Framework
by Esko Turunen - 112-123 "Vlček's Seminars" About Systems Approaches - Topics 2016/2017: Technological Gluttony, GIS in Transportation and Current Approaches to Scientific Publishing
["Vlčkovy semináře" o systémových přístupech - témata 2016/2017: technologické obžerství, GIS v dopravě a současné způsoby vědeckého publikování]
by Veronika Vlčková - 124-131 Development of Acta Informatica Pragensia Journal and Acknowledgement to Reviewers
by Stanislava Mildeová & Zdeněk Smutný & Michal Doležel
2017, Volume 2017, Issue 2
- 100-113 Definition of Business Rules Using Business Vocabulary and Semantics
by Roman Hypský & Jitka Kreslíková - 114-123 A Lightweight Anti-Phishing Technique for Mobile Phone
by Abdul Abiodun Orunsolu & Misturah Adunni Alaran & Adeleke Amos Adebayo & Sakiru Oluyemi Kareem & Ayobami Oke - 124-137 HACS: A Hybrid Framework for Continuous Flexible and Controlled Architecting
by Bentlemsan Khadidja & Bennouar Djamel & Tamzalit Dalila & Hidouci Khaled Walid - 138-161 Modelling the Effects of a Predictable Money Supply of Bitcoin
[Modelování efektů předvídatelné měnové zásoby Bitcoinu]
by Jakub Jedlinský & Ingeborg Němcová - 162-173 Influence of Non-Linearity on Selected Cryptographic Criteria of 8x8 S-Boxes
[Vliv nelinearity na vybraná kryptografická kritéria 8x8 S-boxů]
by Petr Tesař - 174-187 Analysis of the Survey Results About University Students' Perception of Benefits of Supporting E-Learning Education
[Analýza výsledkov prieskumu vnímania prínosov podporného e-learningové vzdelávania univerzitných študentov]
by Michal Stričík & Monika Čonková - 188-229 The Emergence and Historical Development of Informatics and Computing Disciplines in Selected European Countries and the USA
[Ustavení a historický vývoj informatiky a počítačových disciplín ve vybraných evropských zemích a v USA]
by Zdeněk Smutný & Michal Doležel - 230-235 The 25th European Conference on Information Systems (ECIS 2017)
[Dvacátá pátá evropská konference o informačních systémech (ECIS 2017)]
by Michal Doležel
2017, Volume 2017, Issue 1
- 4-19 Project as a System and its Management
[Projekt jako systém a jeho řízení]
by Jiří Skalický & Jiří Vacek & Marek Čech & Martin Januška - 20-31 Bitcoin System
by Jan Lánský - 32-59 Methods for Project Tracking in Creative Environment
[Metody sledování projektu v kreativním prostředí]
by Eva Šviráková - 60-69 Systems Approach to Scientific Investigation in Informatics
[Systémový přístup k vědeckému zkoumání v informatice]
by Stanislava Mildeová & Martin Dalihod - 70-73 Founder and Pioneer of Systems Theory Ludwig von Bertalanffy: 45th Anniversary of His Death
[Zakladatel a průkopník teorie systémů Ludwig von Bertalanffy: Na paměť 45. výročí úmrtí]
by Branislav Lacko - 74-85 Transcendental Dimension of the Reality and Systems
[Transcendentální rozměr skutečnosti a systémy]
by Miloš Vítek - 86-93 System Approach in RIPRAN Method
[Systémový a procesní přístup v metodě RIPRAN]
by Branislav Lacko
2016, Volume 2016, Issue 2
- 98-117 PETA: Methodology of Information Systems Security Penetration Testing
by Tomáš Klíma - 118-137 Analysis of Cryptocurrencies Price Development
by Jan Lánský - 138-143 A DSL-based Approach to Product Derivation for Software Product Line
by Nesrine Lahiani & Djamal Bennouar - 144-161 Identification of the QRS Complex in the ECG
[Identifikácia QRS komplexu v EKG zázname]
by Martin Paralič - 162-179 Evaluation of Cloud Computing Hidden Benefits by Using Real Options Analysis
by Pavel Náplava - 180-191 Information Framework of Critical Infrastructure
[Informační rámec kritické infrastruktury]
by Stanislava Mildeová & Antonín Dvořák & Pavel Zahradníček - 192-207 Electronic Payments Profitability Extent Model
by Rudolf Vohnout & Zora Říhová & Iva Dostálková - 208-217 "Vlček Seminars" About the System Approaches at CTU in Prague
["Vlčkovy semináře" o systémových přístupech na ČVUT v Praze]
by Veronika Vlčková
2016, Volume 2016, Issue 1
- 4-17 Intelligent Building with the Assistance for Blind People
[Inteligentné budovy s asistentom pre nevidiacich]
by Milan Hudec - 18-33 Lean Startup and Lean Canvas Using for Innovative Product Development
[Využití metody Lean Startup a nástroje Lean Canvas pro vývoj inovativního produktu]
by Alena Buchalcevová & Tomáš Mysliveček - 34-45 A Solution to the Square-Rectangle Problem Within the Framework of Object Morphology
by Zbyněk Šlajchrt - 46-55 Conceptual Agent-Based Model for Optimal Power Utilization in Wireless Sensor Networks
by Olumide S. Adewale & Ojonukpe S. Egwuche & Samuel A. Oluwadare - 56-71 Cloud Computing Governance Lifecycle
by Soňa Karkošková & George Feuerlicht - 72-81 Business Rules Definition for Decision Support System Using Matrix Grammar
by Eva Zámečníková & Jitka Kreslíková - 82-91 Predatory Journals, Piracy and New Models of Publishing Scientific Articles
[Predátorské časopisy, pirátství a nové modely publikování odborných článků]
by Zdeněk Smutný
2015, Volume 2015, Issue 3
- 206-225 It Leaks More Than You Think: Fingerprinting Users from Web Traffic Analysis
by Xujing Huang - 226-241 Security Measures in Automated Assessment System for Programming Courses
by Jana Šťastná & Ján Juhár & Miroslav Biňas & Martin Tomášek - 242-257 Practice of Digital Forensic Investigation in the Czech Republic and ISO/IEC 27037:2012
[Praxe digitálního forenzního vyšetřování v České republice a norma ISO/IEC 27037:2012]
by Jaromír Veber & Zdeněk Smutný & Ladislav Vyskočil - 258-275 Modification of Steganographic Algorithm Using LSB and a Set of Stegomedia
[Modifikácia steganografického algoritmu využívajúceho LSB použitím množiny stegomédií]
by Branislav Madoš & Mária Feková - 276-287 A Fine-Grained Data Access Control System in Wireless Sensor Network
by Boniface K. Alese & Sylvester O. Olatunji & Oluwatoyin C. Agbonifo & Aderonke F. Thompson - 288-301 Using of Sound-Based Communication in the Process of Malware Distribution without Connectivity to Network Services
[Využitie komunikácie na báze zvuku v distribúcii škodlivého softvéru bez prístupu k sieťovým službám]
by Ján Hurtuk - 302-309 Verifiable Distribution of Material Goods Based on Cryptology
by Radomír Palovský - 310-317 Android Access Control Extension
by Anton Baláž & Branislav Madoš & Michal Ambróz - 318-325 A Few Ideas for Creating Passwords
[Několik myšlenek k tvorbě hesel]
by Petr Strossa & Radomír Palovský - 326-335 Security Management - Systems Approach
[Bezpečnostní management - systémový přístup]
by Milan Kný - 336-348 Selected Trends of the Cybercrime
[Vybrané trendy kybernetické kriminality]
by Josef Požár
2015, Volume 2015, Issue 2
- 108-121 AHP Model for the Big Data Analytics Platform Selection
by Martin Lněnička - 122-139 Proposal of Decision-making Model Using the DeLone and McLean's Information System Success Model Together with the AHP
by Radek Němec & František Zapletal - 140-153 Measures of quality of process models created in BPMN
[Míry kvality procesních modelů vytvořených v notaci BPMN]
by Radek Hronza & Josef Pavlíček & Pavel Náplava - 154-173 Color Mapping on Common Use-Cases in a Web Application
[Mapování barev na typické případy užití ve webové aplikaci]
by Jiří Hradil & Vilém Sklenák - 174-181 Modified Ishikawa Diagram as a Tool for Knowledge-Mapping of Agronomic Practices
[Modifikovaný Ishikawa diagram jako nástroj znalostního mapování agronomických postupů]
by Petr Kedaj & Josef Pavlíček - 182-200 Predatory Open Access Publishers and other Dangers to Today's Scientific Community
[Predátorští vydavatelé s otevřeným přístupem k obsahu a další nebezpečí pro současnou vědeckou komunitu]
by Zdeněk Smutný & Václav Řezníček
2015, Volume 2015, Issue 1
- 4-17 Current State of Agile Methodologies Worldwide and in the Czech Republic
[Současný stav používání agilních metodik ve světě a v ČR]
by Martin Tománek - 18-29 Measures of Quality in Business Process Modelling
[Míry kvality v procesním modelování]
by Radek Hronza & Josef Pavlíček & Richard Mach & Pavel Náplava - 30-43 Generated Report of the ORD BORM Model
by Jakub Tůma & Marek Pícka & Petr Hanzlík - 44-51 Context Sources and their Processing in Company Security
by Libor Měsíček - 52-63 Evaluation of Web GIS Applications and their Development Tools Using AHP
[Hodnocení Web GIS aplikací a nástrojů pro jejich tvorbu pomocí AHP]
by Miroslav Pásler - 64-79 Traffic Accident, System Model and Cluster Analysis in GIS
[Dopravní nehoda, systémový model a shluková analýza v prostředí GIS]
by Veronika Vlčková & Pavel Hrubeš - 80-89 Influence of Organization Management on Systems of Performance Measurement and Management Control
by Zora Říhová - 90-101 Usability of Public Administration Electronic Forms
[Použitelnost elektronických formulářů veřejné správy]
by Miloslav Hub & Michal Chudoba
2014, Volume 2014, Issue 3
- 222-238 When Sentry Goes Stealing: An Information Systems Security Case Study in Behavioural Context
by Syed Irfan Nabi & Zaheeruddin Asif & Abdulrahman A. Mirza - 239-250 Effective Mind Maps in E-learning
by Petr Kedaj & Josef Pavlíček & Petr Hanzlík - 251-258 Communication Audit Conclusions of IT Processes through Instruments of System Thinking
[Komunikace závěrů auditu IT procesu prostřednictvím nástrojů systémového myšlení]
by Martin Dalihod - 259-279 Cloud Computing and Real Options as an Accelerator of IT Startups
[Cloud computing a reálné opce jako akcelerátor začínajících IT technologických firem]
by Pavel Náplava - 280-287 Tools for Automatic Recognition of Persons and their Relationships in Unstructured Data
[Nástroje pro automatické rozpoznávání entit a jejich vztahů v nestrukturovaných textech]
by Jaroslav Ráček & Jan Ministr - 288-294 System Dynamics Model as a Component of Competitive Intelligence
[Systémová dynamika a její modely jako součást Competitive Intelligence]
by Stanislava Mildeová - 295-297 New Media: From the Computerization of Culture to Artificial Realism
[Nová média: Od informatizace kultury k umělému realismu]
by Václav Janoščík
2014, Volume 2014, Issue 2
- 137-153 Demographic Targeting of Internet Advertising
[Demografické cílení internetové reklamy]
by Václav Stříteský & Marek Stříteský