Current IssueVolume 18 - Issue 2✔︎ CompletedOpen Call ArticlesNaming the Identified Feature Implementation Blocks from Software Source CodeRa'Fat Al-Msie'Deen, Hamzeh Eyal Salman, Anas H. Blasi, Mohammed A. AlsuwaiketPages: 101-110| PDF (1.06 MiB) | 2022-04-01 |0 views| 0 CrossRef citations0Views0CrossRef citationsIntelligent Pricing Model for Task Offloading in Unmanned Aerial Vehicle Mounted Mobile Edge Computing for Vehicular NetworkAsrar Ahmed Baktayan, Ibrahim Ahmed Al-Baltah, Abdul Azim Abd GhaniPages: 111-123| PDF (1.44 MiB) | 2022-04-06 |0 views| 0 CrossRef citations0Views0CrossRef citationsA Blockchain Application Prototype for the Internet of ThingsMansour Mededjel, Ghalem Belalem, Fatima Zohra Nesrine Benadda, Samah KadakellouchaPages: 124-136| PDF (1.31 MiB) | 2022-04-19 |0 views| 0 CrossRef citations0Views0CrossRef citationsAssigning Test Priority to Modules Using Code-Content and Bug HistoryErmira Daka, Egzon MustafaPages: 137-143| PDF (3.05 MiB) | 2022-04-19 |0 views| 0 CrossRef citations0Views0CrossRef citationsSecurity Incident Response Automation for xPON NetworksVaclav Oujezsky, Tomas Horvath, Martin HolikPages: 144-152| PDF (1.75 MiB) | 2022-04-25 |0 views| 0 CrossRef citations0Views0CrossRef citationsA Comparative Analysis of Agile Teamwork Quality Measurement ModelsManuel Silva, Mirko Perkusich, Arthur Freire, Danyllo Albuquerque, Kyller Costa Gorgonio, Hyggo Almeida, Angelo Perkusich, Everton GuimaraesPages: 153-164| PDF (4.17 MiB) | 2022-05-10 |0 views| 0 CrossRef citations0Views0CrossRef citationsA Study of Vulnerability Identifiers in Code Comments: Source, Purpose, and SeverityYusuf Sulistyo Nugroho, Dedi Gunawan, Devi Afriyantari Puspa Putri, Syful Islam, Abdulaziz AlhefdhiPages: 165-174| PDF (1.47 MiB) | 2022-05-24 |0 views| 0 CrossRef citations0Views0CrossRef citationsCalculation of Complex Power Generated by a Transmitting Thin Wire Antenna Radiating above a Lossy Half-spaceDragan Poljak, Vicko DoricPages: 175-181| PDF (888 KiB) | 2022-05-23 |0 views| 0 CrossRef citations0Views0CrossRef citationsSpecial Issue on Smart EnvironmentsA Microservices Architecture based on a Deep-learning Approach for an Innovative Fruition of Art and Cultural HeritageIlaria Sergi, Marco Leo, Pierluigi Carcagnì, Marco La Franca, Cosimo Distante, Luigi PatronoPages: 182-192| PDF (1.39 MiB) | 2022-04-30 |0 views| 0 CrossRef citations0Views0CrossRef citationsLeveraging Natural Language Processing to Analyse the Temporal Behavior of Extremists on Social MediaMay El Barachi, Sujith Samuel Mathew, Farhad Oroumchian, Imene Ajala, Saad Lutfi, Rand YasinPages: 193-205| PDF (1.86 MiB) | 2022-05-16 |0 views| 0 CrossRef citations0Views0CrossRef citations
Naming the Identified Feature Implementation Blocks from Software Source CodeRa'Fat Al-Msie'Deen, Hamzeh Eyal Salman, Anas H. Blasi, Mohammed A. AlsuwaiketPages: 101-110| PDF (1.06 MiB) | 2022-04-01 |0 views| 0 CrossRef citations0Views0CrossRef citations
Intelligent Pricing Model for Task Offloading in Unmanned Aerial Vehicle Mounted Mobile Edge Computing for Vehicular NetworkAsrar Ahmed Baktayan, Ibrahim Ahmed Al-Baltah, Abdul Azim Abd GhaniPages: 111-123| PDF (1.44 MiB) | 2022-04-06 |0 views| 0 CrossRef citations0Views0CrossRef citations
A Blockchain Application Prototype for the Internet of ThingsMansour Mededjel, Ghalem Belalem, Fatima Zohra Nesrine Benadda, Samah KadakellouchaPages: 124-136| PDF (1.31 MiB) | 2022-04-19 |0 views| 0 CrossRef citations0Views0CrossRef citations
Assigning Test Priority to Modules Using Code-Content and Bug HistoryErmira Daka, Egzon MustafaPages: 137-143| PDF (3.05 MiB) | 2022-04-19 |0 views| 0 CrossRef citations0Views0CrossRef citations
Security Incident Response Automation for xPON NetworksVaclav Oujezsky, Tomas Horvath, Martin HolikPages: 144-152| PDF (1.75 MiB) | 2022-04-25 |0 views| 0 CrossRef citations0Views0CrossRef citations
A Comparative Analysis of Agile Teamwork Quality Measurement ModelsManuel Silva, Mirko Perkusich, Arthur Freire, Danyllo Albuquerque, Kyller Costa Gorgonio, Hyggo Almeida, Angelo Perkusich, Everton GuimaraesPages: 153-164| PDF (4.17 MiB) | 2022-05-10 |0 views| 0 CrossRef citations0Views0CrossRef citations
A Study of Vulnerability Identifiers in Code Comments: Source, Purpose, and SeverityYusuf Sulistyo Nugroho, Dedi Gunawan, Devi Afriyantari Puspa Putri, Syful Islam, Abdulaziz AlhefdhiPages: 165-174| PDF (1.47 MiB) | 2022-05-24 |0 views| 0 CrossRef citations0Views0CrossRef citations
Calculation of Complex Power Generated by a Transmitting Thin Wire Antenna Radiating above a Lossy Half-spaceDragan Poljak, Vicko DoricPages: 175-181| PDF (888 KiB) | 2022-05-23 |0 views| 0 CrossRef citations0Views0CrossRef citations
A Microservices Architecture based on a Deep-learning Approach for an Innovative Fruition of Art and Cultural HeritageIlaria Sergi, Marco Leo, Pierluigi Carcagnì, Marco La Franca, Cosimo Distante, Luigi PatronoPages: 182-192| PDF (1.39 MiB) | 2022-04-30 |0 views| 0 CrossRef citations0Views0CrossRef citations
Leveraging Natural Language Processing to Analyse the Temporal Behavior of Extremists on Social MediaMay El Barachi, Sujith Samuel Mathew, Farhad Oroumchian, Imene Ajala, Saad Lutfi, Rand YasinPages: 193-205| PDF (1.86 MiB) | 2022-05-16 |0 views| 0 CrossRef citations0Views0CrossRef citations