index - Computer Information Systems and Industrial Management
   


Full Text Documents

Chargement de la page

Search

Chargement de la page

Table of Contents
Computer Information Systems and Industrial Management
Khalid Saeed, Václav Snášel (Eds.)
Front Matter

Keynote Papers


Processing Collective Knowledge – Conflict Resolution and Integration Aspects
Ngoc Nguyen
1-4
How to Store and Process Big Data: Are Today’s Databases Sufficient?
Jaroslav Pokorný
5-10

Algorithms


A New Contention Management Technique for Obstruction Free Transactional Memory
Ammlan Ghosh, Anubhab Sahin, Anirban Silsarma, Rituparna Chaki
11-22
Evolutionary Algorithm for Decision Tree Induction
Dariusz Jankowski, Konrad Jackowski
23-32
A New Method for Mining High Average Utility Itemsets
Tien Lu, Bay Vo, Hien Nguyen, Tzung-Pei Hong
33-42
Spectral Clustering Based on Analysis of Eigenvector Properties
Małgorzata Lucińska, Sławomir Wierzchoń
43-54
Applying Recurrent Fuzzy Neural Network to Predict the Runoff of Srepok River
Hieu Ngoc Duong, Quyen Nguyen, Long Ta Bui, Hien Nguyen, Václav Snášel
55-66
Comparison of Chaos Driven PSO and Differential Evolution on the Selected PID Tuning Problem
Roman Senkerik, Michal Pluhacek, Ivan Zelinka, Donald Davendra, Zuzana Kominkova Oplatkova
67-76
Improving Rule Selection from Robot Soccer Strategy with Substrategies
Václav Svatoň, Jan Martinovič, Kateřina Slaninová, Václav Snášel
77-88
Novel Ranking Methods Applied to Complex Membership Determination Problems
Loc Tran, Linh Tran, Hoang Trang
89-99
Combination of Self Organizing Maps and Growing Neural Gas
Lukáš Vojáček, Pavla Dráždilová, Jiří Dvorský
100-111

Biometrics and Biometrics Applications


A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud
Tapalina Bhattasali, Khalid Saeed, Nabendu Chaki, Rituparna Chaki
112-121
On the Comparison of the Keystroke Dynamics Databases
Piotr Panasiuk, Marcin Dąbrowski, Khalid Saeed, Katarzyna Bocheńska-Włostowska
122-129
Influence of Eye Diseases on the Retina Pattern Recognition
Emil Saeed, Anna Bartocha, Piotr Wachulec, Khalid Saeed
130-140
Pupil and Iris Detection Algorithm for Near-Infrared Capture Devices
Adam Szczepański, Krzysztof Misztal, Khalid Saeed
141-150

Data Analysis and Information Retrieval


Query Selectivity Estimation Based on Improved V-optimal Histogram by Introducing Information about Distribution of Boundaries of Range Query Conditions
Dariusz Augustyn
151-164
Dynamic Centrality for Directed Co-author Network with Context
Alisa Babskova, Jan Martinovič, Pavla Dráždilová, Kateřina Slaninová
165-174
Towards a Conceptual Search for Vietnamese Legal Text
Thinh Bui, Son Nguyen, Quoc Ho
175-185
A Vietnamese Question Answering System in Vietnam’s Legal Documents
Huu-Thanh Duong, Bao-Quoc Ho
186-197
An Inner-Enterprise Wiki System (IWkS) Integrated with an Expert Finding Mechanism for Lesson-Learned Knowledge Accumulation in Product Design
Ywen Huang, Zhua Jiang, Xde Xiang, Cneng He, Jfeng Liu, Ying Huang
198-208
Movie Recommendation Using OLAP and Multidimensional Data Model
Worapot Jakkhupan, Supasit Kajkamhaeng
209-218
Decision Trees and Their Families in Imbalanced Pattern Recognition: Recognition with and without Rejection
Wladyslaw Homenda, Wojciech Lesinski
219-230
An Approach for Integrating Multidimensional Database into Context-Aware Recommender System
Mai Nhat Vinh, Nguyen Nhat Duy, Ho Thi Hoang Vy, Le Nguyen Hoai Nam
231-242
Vietnamese Sentence Similarity Based on Concepts
Hien Nguyen, Phuc Duong, Vinh Vo
243-253
Materialized View Construction Based on Clustering Technique
Santanu Roy, Ranak Ghosh, Soumya Sen
254-265
Big Data Spectra Analysis Using Analytical Programming and Random Decision Forests
Petr Šaloun, Peter Drábik, Ivan Zelinka, Jaroslav Bucko
266-277
Man-Machine Interaction Improvement by Means of Automatic Human Personality Identification
Ryszard Tadeusiewicz, Adrian Horzyk
278-289

Industrial Management and Other Applications


viaRODOS: Monitoring and Visualisation of Current Traffic Situation on Highways
Dušan Fedorčák, Tomáš Kocyan, Martin Hájek, Daniela Szturcová, Jan Martinovič
290-300
Computation of Swing-up Signal for Inverted Pendulum Using Dynamic Optimization
Stepan Ozana, Martin Pies, Radovan Hajovsky
301-314
System and Application Scenarios for Disaster Management Processes, the Rainfall-Runoff Model Case Study
Antoni Portero, Štěpán Kuchař, Radim Vavřík, Martin Golasowski, Vít Vondrá
315-326
An Approach to Continuous Pervasive Care of Remote Patients Based on Priority Based Assignment of Nurse
Paramita Sarkar, Ditipriya Sinha
327-338
Abbreviation Method for Some Jointed Relations in Displaying Genealogy
Seiji Sugiyama, Daisuke Yokozawa, Atsushi Ikuta, Satoshi Hiratsuka, Susumu Saito, Miyuki Shibata, Tohru Matsuura
339-350
Proposing a Novel Architecture of Script Component to Incorporate the Scripting Language Support in SCADA Systems
Muhammad Anwar, Farooque Azam
351-362

Modelling and Optimization


Agent-Based Context Management for Service-Oriented Environments
Adrija Bhattacharya, Avirup Das, Sankhayan Choudhury, Nabendu Chaki
363-374
Event Based Approaches for Solving Multi-mode Resource Constraints Project Scheduling Problem
Ripon Chakrabortty, Ruhul Sarker, Daryl Essam
375-386
Non-cooperative Games Involving Type-2 Fuzzy Uncertainty: An Approach
Juan Figueroa-García, Emanuel Medina-Pinzón, Jannan Rubio-Espinosa
387-396
Joining Concept’s Based Fuzzy Cognitive Map Model with Moving Window Technique for Time Series Modeling
Wladyslaw Homenda, Agnieszka Jastrzebska, Witold Pedrycz
397-408
Time Series Modeling with Fuzzy Cognitive Maps: Simplification Strategies
Wladyslaw Homenda, Agnieszka Jastrzebska, Witold Pedrycz
409-420
An Effective Initialization for ASM-Based Methods
Hong-Quan Hua, T. Le, Bac Le
421-432
A Multiple Refinement Approach in Abstraction Model Checking
Phan Nguyen, Thang Bui
433-444
Chaos Driven Particle Swarm Optimization with Basic Particle Performance Evaluation – An Initial Study
Michal Pluhacek, Roman Senkerik, Ivan Zelinka
445-454
Chaos Powered Grammatical Evolution
Ivan Zelinka, Petr Šaloun, Roman Senkerik
455-464

Networking


Network Anomaly Detection Using Parameterized Entropy
Przemysław Bereziński, Marcin Szpyrka, Bartosz Jasiul, Michał Mazur
465-478
Universal Central Control of Home Appliances as an Expanding Element of the Smart Home Concepts — Case Study on Low Cost Smart Solution
Jan Dvorak, Ondrej Berger, Ondrej Krejcar
479-488
An Off-the-Shelf Platform for Automatic and Interactive Text Messaging Using Short Message Service
Daniel Oliveira, Diana Oliveira, Nuno Garcia, Graça Esgalhado
489-500
Application of PIL Approach for Automated Transportation Center
Stepan Ozana, Martin Pies, Radovan Hajovsky, Jiri Koziorek, Ondrej Horacek
501-513
A Model of a System for Stream Data Storage and Analysis Dedicated to Sensor Networks of Embankment Monitoring
Anna Pięta, Michał Lupa, Monika Chuchro, Adam Piórkowski, Andrzej Leśniak
514-525
Analysis of Social Influence and Information Dissemination in Social Media: The Case of Twitter
Chien-Wen Shen, Chin-Jin Kuo
526-534
Multi–criteria Route Planning in Bus Network
Vo Khoa, Tran Pham, Huynh Nguyen, Tran Hoai
535-546

Pattern Recognition and Image Processing


Enhanced LBP-Based Face Recognition System Using a Heuristic Approach for Searching Weight Set
Nhat-Quan Nguyen, Thai Le
547-558
A Local Gaussian Filter and Adaptive Morphology as Tools for Completing Partially Discontinuous Curves
Przemysław Spurek, Alena Chaikouskaya, Jacek Tabor, Elzbieta Zając
559-570
Subspaces Clustering Approach to Lossy Image Compression
Przemysław Spurek, Marek Śmieja, Krzysztof Misztal
571-579
An Impact of the User and Time Parameters to Sequence Alignment Methods for Process Mining
Jakub Štolfa, Svatopluk Štolfa, Kateřina Slaninová, Jan Martinovič, Václav Snášel
580-591
An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature
Puchong Subpratatsavee, Pramote Kuacharoen
592-601
Grasping Action for Impaired Vision Action Using HC2D Barcode Technology
Puchong Subpratatsavee, Suchai Tanaiadehawoot
602-614

Various Aspects of Computer Security


Hardware Approach for Generating b-detectors by Immune-Based Algorithms
Maciej Brzozowski, Andrzej Chmielewski
615-623
Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges
Feng Xie, Yong Peng, Wei Zhao, Yang Gao, Xuefeng Han
624-635
Protection Profile for Secure Sensitive Information System on Mobile Devices
Imed Fray, Tomasz Hyla, Włodzimierz Chocianowicz
636-650
Implicit and Explicit Certificates-Based Encryption Scheme
Tomasz Hyla, Witold Maćków, Jerzy Pejaś
651-666
Malware Behavior Modeling with Colored Petri Nets
Bartosz Jasiul, Marcin Szpyrka, Joanna Śliwa
667-679
A Proposal of Algorithm for Web Applications Cyber Attack Detection
Rafał Kozik, Michał Choraś, Rafał Renk, Witold Hołubowicz
680-687
Semantic Set Analysis for Malware Detection
Nguyen Nhuong, Vo Nhi, Nguyen Cam, Mai Phu, Cao Tan
688-700

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/