Table of Contents
|
Computer Information Systems and Industrial Management Khalid Saeed, Václav Snášel (Eds.)
|
Front Matter |
Keynote Papers
|
Processing Collective Knowledge – Conflict Resolution and Integration Aspects Ngoc Nguyen |
1-4 |
How to Store and Process Big Data: Are Today’s Databases Sufficient? Jaroslav Pokorný |
5-10 |
Algorithms
|
A New Contention Management Technique for Obstruction Free Transactional Memory Ammlan Ghosh, Anubhab Sahin, Anirban Silsarma, Rituparna Chaki |
11-22 |
Evolutionary Algorithm for Decision Tree Induction Dariusz Jankowski, Konrad Jackowski |
23-32 |
A New Method for Mining High Average Utility Itemsets Tien Lu, Bay Vo, Hien Nguyen, Tzung-Pei Hong |
33-42 |
Spectral Clustering Based on Analysis of Eigenvector Properties Małgorzata Lucińska, Sławomir Wierzchoń |
43-54 |
Applying Recurrent Fuzzy Neural Network to Predict the Runoff of Srepok River Hieu Ngoc Duong, Quyen Nguyen, Long Ta Bui, Hien Nguyen, Václav Snášel |
55-66 |
Comparison of Chaos Driven PSO and Differential Evolution on the Selected PID Tuning Problem Roman Senkerik, Michal Pluhacek, Ivan Zelinka, Donald Davendra, Zuzana Kominkova Oplatkova |
67-76 |
Improving Rule Selection from Robot Soccer Strategy with Substrategies Václav Svatoň, Jan Martinovič, Kateřina Slaninová, Václav Snášel |
77-88 |
Novel Ranking Methods Applied to Complex Membership Determination Problems Loc Tran, Linh Tran, Hoang Trang |
89-99 |
Combination of Self Organizing Maps and Growing Neural Gas Lukáš Vojáček, Pavla Dráždilová, Jiří Dvorský |
100-111 |
Biometrics and Biometrics Applications
|
A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud Tapalina Bhattasali, Khalid Saeed, Nabendu Chaki, Rituparna Chaki |
112-121 |
On the Comparison of the Keystroke Dynamics Databases Piotr Panasiuk, Marcin Dąbrowski, Khalid Saeed, Katarzyna Bocheńska-Włostowska |
122-129 |
Influence of Eye Diseases on the Retina Pattern Recognition Emil Saeed, Anna Bartocha, Piotr Wachulec, Khalid Saeed |
130-140 |
Pupil and Iris Detection Algorithm for Near-Infrared Capture Devices Adam Szczepański, Krzysztof Misztal, Khalid Saeed |
141-150 |
Data Analysis and Information Retrieval
|
Query Selectivity Estimation Based on Improved V-optimal Histogram by Introducing Information about Distribution of Boundaries of Range Query Conditions Dariusz Augustyn |
151-164 |
Dynamic Centrality for Directed Co-author Network with Context Alisa Babskova, Jan Martinovič, Pavla Dráždilová, Kateřina Slaninová |
165-174 |
Towards a Conceptual Search for Vietnamese Legal Text Thinh Bui, Son Nguyen, Quoc Ho |
175-185 |
A Vietnamese Question Answering System in Vietnam’s Legal Documents Huu-Thanh Duong, Bao-Quoc Ho |
186-197 |
An Inner-Enterprise Wiki System (IWkS) Integrated with an Expert Finding Mechanism for Lesson-Learned Knowledge Accumulation in Product Design Ywen Huang, Zhua Jiang, Xde Xiang, Cneng He, Jfeng Liu, Ying Huang |
198-208 |
Movie Recommendation Using OLAP and Multidimensional Data Model Worapot Jakkhupan, Supasit Kajkamhaeng |
209-218 |
Decision Trees and Their Families in Imbalanced Pattern Recognition: Recognition with and without Rejection Wladyslaw Homenda, Wojciech Lesinski |
219-230 |
An Approach for Integrating Multidimensional Database into Context-Aware Recommender System Mai Nhat Vinh, Nguyen Nhat Duy, Ho Thi Hoang Vy, Le Nguyen Hoai Nam |
231-242 |
Vietnamese Sentence Similarity Based on Concepts Hien Nguyen, Phuc Duong, Vinh Vo |
243-253 |
Materialized View Construction Based on Clustering Technique Santanu Roy, Ranak Ghosh, Soumya Sen |
254-265 |
Big Data Spectra Analysis Using Analytical Programming and Random Decision Forests Petr Šaloun, Peter Drábik, Ivan Zelinka, Jaroslav Bucko |
266-277 |
Man-Machine Interaction Improvement by Means of Automatic Human Personality Identification Ryszard Tadeusiewicz, Adrian Horzyk |
278-289 |
Industrial Management and Other Applications
|
viaRODOS: Monitoring and Visualisation of Current Traffic Situation on Highways Dušan Fedorčák, Tomáš Kocyan, Martin Hájek, Daniela Szturcová, Jan Martinovič |
290-300 |
Computation of Swing-up Signal for Inverted Pendulum Using Dynamic Optimization Stepan Ozana, Martin Pies, Radovan Hajovsky |
301-314 |
System and Application Scenarios for Disaster Management Processes, the Rainfall-Runoff Model Case Study Antoni Portero, Štěpán Kuchař, Radim Vavřík, Martin Golasowski, Vít Vondrá |
315-326 |
An Approach to Continuous Pervasive Care of Remote Patients Based on Priority Based Assignment of Nurse Paramita Sarkar, Ditipriya Sinha |
327-338 |
Abbreviation Method for Some Jointed Relations in Displaying Genealogy Seiji Sugiyama, Daisuke Yokozawa, Atsushi Ikuta, Satoshi Hiratsuka, Susumu Saito, Miyuki Shibata, Tohru Matsuura |
339-350 |
Proposing a Novel Architecture of Script Component to Incorporate the Scripting Language Support in SCADA Systems Muhammad Anwar, Farooque Azam |
351-362 |
Modelling and Optimization
|
Agent-Based Context Management for Service-Oriented Environments Adrija Bhattacharya, Avirup Das, Sankhayan Choudhury, Nabendu Chaki |
363-374 |
Event Based Approaches for Solving Multi-mode Resource Constraints Project Scheduling Problem Ripon Chakrabortty, Ruhul Sarker, Daryl Essam |
375-386 |
Non-cooperative Games Involving Type-2 Fuzzy Uncertainty: An Approach Juan Figueroa-García, Emanuel Medina-Pinzón, Jannan Rubio-Espinosa |
387-396 |
Joining Concept’s Based Fuzzy Cognitive Map Model with Moving Window Technique for Time Series Modeling Wladyslaw Homenda, Agnieszka Jastrzebska, Witold Pedrycz |
397-408 |
Time Series Modeling with Fuzzy Cognitive Maps: Simplification Strategies Wladyslaw Homenda, Agnieszka Jastrzebska, Witold Pedrycz |
409-420 |
An Effective Initialization for ASM-Based Methods Hong-Quan Hua, T. Le, Bac Le |
421-432 |
A Multiple Refinement Approach in Abstraction Model Checking Phan Nguyen, Thang Bui |
433-444 |
Chaos Driven Particle Swarm Optimization with Basic Particle Performance Evaluation – An Initial Study Michal Pluhacek, Roman Senkerik, Ivan Zelinka |
445-454 |
Chaos Powered Grammatical Evolution Ivan Zelinka, Petr Šaloun, Roman Senkerik |
455-464 |
Networking
|
Network Anomaly Detection Using Parameterized Entropy Przemysław Bereziński, Marcin Szpyrka, Bartosz Jasiul, Michał Mazur |
465-478 |
Universal Central Control of Home Appliances as an Expanding Element of the Smart Home Concepts — Case Study on Low Cost Smart Solution Jan Dvorak, Ondrej Berger, Ondrej Krejcar |
479-488 |
An Off-the-Shelf Platform for Automatic and Interactive Text Messaging Using Short Message Service Daniel Oliveira, Diana Oliveira, Nuno Garcia, Graça Esgalhado |
489-500 |
Application of PIL Approach for Automated Transportation Center Stepan Ozana, Martin Pies, Radovan Hajovsky, Jiri Koziorek, Ondrej Horacek |
501-513 |
A Model of a System for Stream Data Storage and Analysis Dedicated to Sensor Networks of Embankment Monitoring Anna Pięta, Michał Lupa, Monika Chuchro, Adam Piórkowski, Andrzej Leśniak |
514-525 |
Analysis of Social Influence and Information Dissemination in Social Media: The Case of Twitter Chien-Wen Shen, Chin-Jin Kuo |
526-534 |
Multi–criteria Route Planning in Bus Network Vo Khoa, Tran Pham, Huynh Nguyen, Tran Hoai |
535-546 |
Pattern Recognition and Image Processing
|
Enhanced LBP-Based Face Recognition System Using a Heuristic Approach for Searching Weight Set Nhat-Quan Nguyen, Thai Le |
547-558 |
A Local Gaussian Filter and Adaptive Morphology as Tools for Completing Partially Discontinuous Curves Przemysław Spurek, Alena Chaikouskaya, Jacek Tabor, Elzbieta Zając |
559-570 |
Subspaces Clustering Approach to Lossy Image Compression Przemysław Spurek, Marek Śmieja, Krzysztof Misztal |
571-579 |
An Impact of the User and Time Parameters to Sequence Alignment Methods for Process Mining Jakub Štolfa, Svatopluk Štolfa, Kateřina Slaninová, Jan Martinovič, Václav Snášel |
580-591 |
An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature Puchong Subpratatsavee, Pramote Kuacharoen |
592-601 |
Grasping Action for Impaired Vision Action Using HC2D Barcode Technology Puchong Subpratatsavee, Suchai Tanaiadehawoot |
602-614 |
Various Aspects of Computer Security
|
Hardware Approach for Generating b-detectors by Immune-Based Algorithms Maciej Brzozowski, Andrzej Chmielewski |
615-623 |
Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges Feng Xie, Yong Peng, Wei Zhao, Yang Gao, Xuefeng Han |
624-635 |
Protection Profile for Secure Sensitive Information System on Mobile Devices Imed Fray, Tomasz Hyla, Włodzimierz Chocianowicz |
636-650 |
Implicit and Explicit Certificates-Based Encryption Scheme Tomasz Hyla, Witold Maćków, Jerzy Pejaś |
651-666 |
Malware Behavior Modeling with Colored Petri Nets Bartosz Jasiul, Marcin Szpyrka, Joanna Śliwa |
667-679 |
A Proposal of Algorithm for Web Applications Cyber Attack Detection Rafał Kozik, Michał Choraś, Rafał Renk, Witold Hołubowicz |
680-687 |
Semantic Set Analysis for Malware Detection Nguyen Nhuong, Vo Nhi, Nguyen Cam, Mai Phu, Cao Tan |
688-700 |