default search action
9. CISIM 2010: Krakow, Poland
- 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM, Krakow, Poland, October 8-10, 2010. IEEE 2010, ISBN 978-1-4244-7817-0
- Anna Bartkowiak:
Anomaly, novelty, one-class classification: A short introduction. 1-6 - Rituparna Chaki:
Intrusion detection: Ad-hoc networks to ambient intelligence framework. 7-12 - Wlodzimierz Kasprzak:
Integration of different computational models in a computer vision framework. 13-18 - Václav Matyás Jr., Zdenek Ríha:
Security of biometric authentication systems. 19-28 - Piotr Porwik:
The modern techniques of latent fingerprint imaging. 29-33 - Ryszard Tadeusiewicz:
Computers in psychology and psychology in computer science. 34-38 - Takashi Uozumi, Junichiro Wakatsuki, Kentarou Fukuta, Takahiko Shinmi, Haruyuki Tatsumi:
Construction of monitoring agent systems for an era of ubiquitous medical engineering. 39-41 - Michal Wozniak, Marcin Zmyslony:
Chosen problems of designing effective Multiple Classifier Systems. 42-47 - Petr Gajdos, Pavel Moravec, Václav Snásel:
Preprocessing methods for SVD-based iris recognition. 48-53 - Sumit Kumar Ghanty, Soharab Hossain Shaikh, Nabendu Chaki:
On recognition of spoken Bengali numerals. 54-59 - Yoshifumi Okada, Takahiro Tada, Kentarou Fukuta, Tomomasa Nagashima:
Audio classification based on a closed itemset mining algorithm. 60-65 - Hiroshi Yamada, Hironobu Kamimura, Noriaki Kaneki, Takayuki Koike:
The performance and physical responses during an attention shift task with grapefruit and skatole odor presentation. 66-68 - Hironobu Kamimura, Noriaki Kaneki, Takayuki Koike, Hiroshi Yamada:
The Graphical modeling of the physiological and psychological effects of odors on the human body during a footbath. 69-74 - Hidetsugu Suto:
Media biotope: Media designing analogous with biotope. 75-80 - Takayuki Koike, Hiroshi Yamada, Noriaki Kaneki, Hironobu Kamimura:
The pleasant odor reduces the brain activity and enhances behavioral performance during kanji word-color stroop task: A multi-fiber NIRS study. 81-85 - Masahiro Sawai, Yoshifumi Okada, Tomomasa Nagashima:
An efficient method for relating various human impressions to physical features. 86-89 - Mehdi Faed, Mohammad Mortazavi, Alireza Faed:
Analysis of digital DSP blocks using GDI technology. 90-95 - Alireza Ghahari, Mohsen Mosleh:
Automatic MPEG4 compatible face representation using clustering-based modeling schemes. 96-102 - Janusz Baczynski, Michal Baczynski:
Simple system for determining starting position of cable-driven manipulator. 103-106 - Juan J. Bosch, Fanny Klett:
Safe and flexible human-robot cooperation in industrial applications. 107-110 - Junichiro Wakatsuki, Takaaki Saito, Ali Abrishamian, Makiba Sakamoto, Takashi Uozumi:
Constructing causal networks for facial packs. 111-115 - Jae Hoon Cho, Dong Hwa Kim, Ajith Abraham:
Nature inspired solutions for green energy. 116-119 - Hüseyin Demirkale, Ekrem Duman, Ali Fuat Alkaya:
Exact and metahueristic approaches for optimizing the operations of chip mounter machines. 120-125 - Indrajit De, Jaya Sil:
ANFIS tuned no-reference quality prediction of distorted/decompressed images featuring wavelet entropy. 126-131 - Mahdi Pakdaman Naeini, Hamid Reza Taremian, Homa Baradaran Hashemi:
Stock market value prediction using neural networks. 132-136 - Meshrif Alruily, Aladdin Ayesh, Hussein Zedan:
Automated dictionary construction from Arabic corpus for meaningful crime information extraction and document classification. 137-142 - Luciana Morogan:
Prion neural system: Modeling the binding affinities between neurons of a network. 143-147 - Ivan Zelinka, Donald Davendra, Václav Snásel, Roman Jasek, Roman Senkerik, Zuzana Oplatková:
Preliminary investigation on relations between complex networks and evolutionary algorithms dynamics. 148-153 - Anirban Sarkar, Swapan Bhattacharya, Sankhayan Choudhury, Nabendu Chaki:
Object relational implementation of Graph based conceptual level Multidimensional Data Model. 154-159 - Karin Kandananond:
The detection of shifts in autocorrelated processes with MR and EWMA charts. 160-165 - Kentarou Fukuta, Tomomasa Nagashima, Takashi Uozumi, Yoshifumi Okada:
Gene analysis framework for biomarker mining. 166-170 - M. Jeihoonian, Seyed Farid Ghaderi, Mehdi Piltan:
Modeling and comparing energy consumption in basic metal industries by neural networks and ARIMA. 171-175 - Jan Platos, Petr Gajdos:
Large data real-time classification with Non-negative Matrix Factorization and Self-Organizing Maps on GPU. 176-181 - Karin Kandananond:
Evaluating the statistical process control performance for monitoring stationary observations using Monte Carlo simulation. 182-186 - Mete Eminagaoglu, Saban Eren:
Implementation and comparison of machine learning classifiers for information security risk analysis of a human resources department. 187-192 - Anchana Khemphila, Veera Boonjing:
Comparing performances of logistic regression, decision trees, and neural networks for classifying heart disease patients. 193-198 - Luigi Troiano, Pravesh Kriplani:
Predicting trend in the next-day market by Hierarchical Hidden Markov Model. 199-204 - Hüseyin Kaya, Sule Gündüz Ögüdücü:
A new approach for mutation analysis using data mining techniques. 205-210 - Yue Dai, Tuomo Kakkonen, Erkki Sutinen:
MinEDec: A decision support model that combines text mining with competitive intelligence. 211-216 - Pavel Hruska, Jan Martinovic, Jiri Dvorský, Václav Snásel:
XML compression improvements based on the clustering of elements. 217-221 - Seiji Sugiyama, Atsushi Ikuta, Miyuki Shibata:
A basic concept of displaying electronic text with seamless pages: Wheel Action for Reeling Paragraphs (WaRP) in the MaSSTExt. 222-227 - Ferhat Khenak:
V-Learning. 228-232 - Reshmi Maulik, Nabendu Chaki:
A comprehensive review on wormhole attacks in MANET. 233-238 - Cheng-Chieh Huang, Ching-Cha Hsieh:
Social relevance, then protection: A social-technical approach to CIIP. 239-243 - Jiri Dvorský, Eliska Ochodkova, Václav Snásel:
Quasigroups with good statistical properties. 244-249 - Saif ur Rehman, Saeed Ullah, Sardar Ali:
On enhancing the WEP security against brute-force and compromised keys. 250-254 - Syed Naqvi, Gautier Dallons, Christophe Ponsard:
Protecting corporate ICT infrastructures by using digital forensics. 255-258 - Nabendu Chaki:
LAR2P: A Location Aided Reactive Routing Protocol for near-optimal route discovery in MANET. 259-264 - Yonghoon Chung, Ki-Hyung Kim, Seung-Wha Yoo:
Time slot schedule based minimum delay graph in TDMA supported wireless industrial system. 265-268 - Krzysztof Malarz, Vikas Chandra, Eve Mitleton-Kelly, Krzysztof Kulakowski:
Probabilistic spreading of information in a spatial network. 269-272 - Arijit Ukil:
Context protecting privacy preservation in ubiquitous computing. 273-278 - Adam Brennan, Michael J. O'Grady, Gregory M. P. O'Hare:
Simulating interaction with Wireless Sensor Networks. 279-282 - Jaydip Sen:
An efficient algorithm for detection of selfish packet dropping nodes in Wireless Mesh Networks. 283-288 - Aida Saeed-Baginska, Romuald Mosdorf:
The recurrence plot as a tool in the analysis of network traffic anomaly detection. 289-294 - Dipak Kr. Neog, Reeta Devi:
Band width of rectangular microstrip patch antenna with the use of Clonal selection algorithm. 295-298 - Tomasz M. Gwizdalla, Sebastian Grzebielucha:
The traffic flow through different form of intersections. 299-304 - Juan J. Bosch, Fanny Klett:
Towards a generic framework for the evaluation of knowledge-based infrastructures. 305-308 - Zenon Syroka, Tomasz Zajac, Pawel Dubilowicz:
Generation of linear maximum length sequences. 309-313 - Alireza Faed:
A conceptual model for interactivity, complaint and expectation for CRM. 314-318 - Muhammad Wasim Bhatti, Farah Hayat, Nadeem Ehsan, Sohail Ahmed, Azam Ishaque, Ebtisam Mirza:
A methodology to manage the changing requirements of a software project. 319-322 - Muhammad Wasim Bhatti, Farah Hayat, Nadeem Ehsan, Sohail Ahmed, Azam Ishaque, Sheikh Zahoor Sarwar:
An investigation of changing requirements with respect to development phases of a software project. 323-327 - Svatopluk Stolfa, Jan Kozuszník, Michal Kosinár, Marie Duzí, Martina Cíhalová, Ivo Vondrák:
Building process definition with ontology background. 328-334 - Seiji Sugiyama, Atsushi Ikuta, Miyuki Shibata, Tohru Matsuura:
An event oriented data management method for displaying genealogy: Widespread Hands to InTErconnect BASic Elements (WHIteBasE). 335-340 - Radha Thangaraj, C. Thanga Raj, Pascal Bouvry, Millie Pant, Ajith Abraham:
Optimal design of induction motor for a spinning machine using population based metaheuristics. 341-346 - Seba Maity, Jaya Sil:
CMYK model color image segmentation using type 2 fuzzy sets. 347-352 - Rupesh Kumar:
Recovery in multithreaded applications using execution monitoring and recovery engine (EMRE). 353-358 - Abhijit Sanyal, Soumya Sankar Basu, Sankhayan Choudhury:
A requirement framework for enablement of automatic generation of domain model. 359-364 - Vivek Kumar Singh, Debanjan Mahata, Rakesh Adhikari:
Mining the Blogosphere from a socio-political perspective. 365-370 - Aakash Ahmad, Claus Pahl:
Pattern-based customisable transformations for style-based service architecture evolution. 371-376 - Brian McIntyre, Mansi Alsmarah, Sreela Sasi:
Autonomic University Administration System. 377-382 - Yong-Ju Lee, Chang-Su Kim:
Building semantic ontologies for RESTful web services. 383-386 - Sanjeev Kumar, Devendra K. Chaturvedi:
Financial forecasting using generalized neural method. 387-391 - Suresh Kumar, Rakesh K. Prajapati, Manjeet Singh, Asok De:
Security enforcement using PKI in Semantic Web. 392-397 - Ramakanta Mohanty, Vadlamani Ravi, Manas Ranjan Patra:
Application of fuzzy multi attribute decision making analysis to rank web services. 398-403 - Weisen Guo, Steven B. Kraines:
Enriching city entities in the EKOSS failure cases knowledge base with Linked Open Data. 404-409 - Raj Kamal, Shweta Agrawal:
A design framework of Orchestrator for computing systems. 410-413 - Walter Christian Kammergruber, Maximilian Viermetz, Karsten Ehms, Manfred Langen:
Using association rules for discovering tag bundles in social tagging data. 414-419 - Hong Qing Yu, Stefan Dietze, Neil Benn:
Autonomous Matchmaking Web Services. 420-425 - Tanakorn Wichaiwong, Chuleerat Jaruskulchai:
A simple approach to optimize XML Retrieval. 426-431 - Santosh Kumar Ray, Shailendra Singh:
Blog content based recommendation framework using WordNet and multiple Ontologies. 432-437 - B. Athira, Philip Samuel:
Web services regression test case prioritization. 438-443 - S. S. Deshpande, Rajiv V. Dharaskar:
Finding user groups on the basis of GSM logs - a survey. 444-447 - Anshu Gupta, D. K. Mishra, Rajesh Khatri, U. B. S. Chandrawat, Preet Jain:
A two stage and three stage CMOS OPAMP with fast settling, high DC gain and low power designed in 180nm technology. 448-453 - Mohammed Firoz Mridha, Mohammad Nurul Huda, Md. Sadequr Rahman, Chowdhury Mofizur Rahman:
Structure of Dictionary Entries of Bangla morphemes for morphological rule generation for Universal Networking Language. 454-459 - Md. Sadequr Rahman, Sangita Rani Poddar, Mohammed Firoz Mridha, Mohammad Nurul Huda:
Open morphological machine translation: Bangla to English. 460-465 - Muqeem Ahmed, S. Zeeshan Hussain, Syed Afzal Murtaza Rizvi:
Knowledge grid based knowledge discovery in distributed environment. 466-470 - Shaily Malik, Anisha Goel, Saurabh Maniktala:
A comparative study of various variants of SPARQL in semantic web. 471-474 - Sarina Sulaiman, Siti Mariyam Shamsuddin, Ajith Abraham, Shahida Sulaiman:
Intelligent Mobile Web Pre-fetching (IMWeP) using XML technology. 475-480 - Michael Auxilia, D. Tamilselvan:
Anomaly detection using negative security model in web application. 481-486 - Mong-Fong Horng, Mao-Hsiung Hung, Yi-Ting Chen, Jeng-Shyang Pan, Wen Huang:
A new approach based on XMPP and OSGi technology to home automation on Web. 487-490 - A. S. Poornima, B. B. Amberker, H. S. Likith Raj, S. Naveen Kumar, K. N. Pradeep, S. V. Ravithej:
Secure data collection in Sensor Networks using tree based key management scheme and secret sharing. 491-496 - Subrata Sinha, Smriti Kumar Sinha, Bipul Syam Purkayastha:
Extra-Tree: A model to organize execution traces of Web services. 497-501 - Sarangthem Ibotombi Singh, Smriti Kumar Sinha:
A new trust model using Hidden Markov Model based mixture of experts. 502-507 - Neha Verma, Niti Verma, Rishika Bansal, Bhagyashree Kulkarni, A. B. Patki, R. C. Meharde:
Software implementation issues in RFD analysis. 508-513 - Milena Janáková:
Database technology analysis for obtaining knowledge with support Web services. 514-517 - Dhirendra Kumar Jha, Anil Rajput, Manmohan Singh, Archana Tomar:
An efficient model for information gain of sequential pattern from web logs based on dynamic weight constraint. 518-523 - Susmitha Dey, Siby Abraham:
Personalised and domain specific user interface for a search engine. 524-529 - Monika Rajput, Pallavi Khatri, Alankar Shastri, Keshav Solanki:
Comparison of Ad-hoc reactive routing protocols using OPNET modeler. 530-534 - Suman Roy, Kiran Prakash Sawant, Aditya K. Ghose:
Ontology modeling of UBL process diagrams using OWL. 535-540 - Gabriel M. Prado, Sérgio Donizetti Zorzo:
Interactive Service Provider Architecture for Interactive Digital Television systems. 541-546 - Ajaya Kumar Tripathy, Manas Ranjan Patra:
An event based, non-intrusive monitoring framework for Web Service Based Systems. 547-552 - Amit Kant Pandit, Shekhar Verma, Geetam S. Tomar:
Pruned-AZB for reduced complexity block matching in video compression. 553-556 - Jiri Dvorský, Václav Snásel, Vit Vozenilek:
On maps comparison methods. 557-562 - Nemi Chandra Rathore, Shekhar Verma, Ranjeet Singh Tomar, Geetam S. Tomar:
CMAC: A cluster based MAC protocol for VANETs. 563-568 - Hong Tian, Yunhong Li, Hongbo Liu, Ajith Abraham:
An optimized ontology transfer learning method. 569-572 - Yuehui Chen, Bo Yang, Kun Ma, Runyuan Sun, Ajith Abraham:
An executable business model for generic web applications. 573-577 - Alireza Ghahari, Mohsen Mosleh:
Hybrid clustering-based 3D face modeling upon non-perfect orthogonality of frontal and profile views. 578-584 - Saurabh Bhardwaj, Smriti Srivastava, S. Vaishnavi, J. R. P. Gupta:
Chaotic time series prediction using combination of Hidden Markov Model and Neural Nets. 585-589 - Nashwa El-Bendary, Hossam M. Zawbaa, Mahmoud S. Daoud, Aboul Ella Hassanien, Kazumi Nakamatsu:
ArSLAT: Arabic Sign Language Alphabets Translator. 590-595 - Saeed Shariati, Mahdi Motavalli Haghighi:
Comparison of anfis Neural Network with several other ANNs and Support Vector Machine for diagnosing hepatitis and thyroid diseases. 596-599 - Wafaa Abd-Elmonim Ghnaim, Neveen I. Ghali, Aboul Ella Hassanien:
Known-ciphertext cryptanalysis approach for the Data Encryption Standard technique. 600-603 - C. Sunil Kumar, C. V. Guru Rao, A. Govardhan:
A framework for interoperable healthcare information systems. 604-608 - Mostafa A. Salama, Aboul Ella Hassanien, Aly A. Fahmy:
Reducing the influence of normalization on data classification. 609-613 - Hadi Dehbovid, Farbod Razzazi, Shapour Alirezaii:
A novel method for de-warping in Persian document images captured by cameras. 614-619 - Ali Ilkhani, Golnoosh Abaee:
Extraction test cases by using data mining; reducing the cost of testing. 620-625 - Mohammad Taghi Ameli, Vahid Shokri, Saeed Shokri:
Using Fuzzy Logic & Full Search for Distributed generation allocation to reduce losses and improve voltage profile. 626-630
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.