


default search action
9. CISIM 2010: Krakow, Poland
- 2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM, Krakow, Poland, October 8-10, 2010. IEEE 2010, ISBN 978-1-4244-7817-0

- Anna Bartkowiak:

Anomaly, novelty, one-class classification: A short introduction. 1-6 - Rituparna Chaki:

Intrusion detection: Ad-hoc networks to ambient intelligence framework. 7-12 - Wlodzimierz Kasprzak:

Integration of different computational models in a computer vision framework. 13-18 - Václav Matyás Jr., Zdenek Ríha:

Security of biometric authentication systems. 19-28 - Piotr Porwik

:
The modern techniques of latent fingerprint imaging. 29-33 - Ryszard Tadeusiewicz

:
Computers in psychology and psychology in computer science. 34-38 - Takashi Uozumi, Junichiro Wakatsuki, Kentarou Fukuta, Takahiko Shinmi, Haruyuki Tatsumi:

Construction of monitoring agent systems for an era of ubiquitous medical engineering. 39-41 - Michal Wozniak

, Marcin Zmyslony:
Chosen problems of designing effective Multiple Classifier Systems. 42-47 - Petr Gajdos, Pavel Moravec

, Václav Snásel:
Preprocessing methods for SVD-based iris recognition. 48-53 - Sumit Kumar Ghanty, Soharab Hossain Shaikh

, Nabendu Chaki
:
On recognition of spoken Bengali numerals. 54-59 - Yoshifumi Okada, Takahiro Tada, Kentarou Fukuta, Tomomasa Nagashima:

Audio classification based on a closed itemset mining algorithm. 60-65 - Hiroshi Yamada, Hironobu Kamimura, Noriaki Kaneki, Takayuki Koike

:
The performance and physical responses during an attention shift task with grapefruit and skatole odor presentation. 66-68 - Hironobu Kamimura, Noriaki Kaneki, Takayuki Koike

, Hiroshi Yamada:
The Graphical modeling of the physiological and psychological effects of odors on the human body during a footbath. 69-74 - Hidetsugu Suto:

Media biotope: Media designing analogous with biotope. 75-80 - Takayuki Koike

, Hiroshi Yamada, Noriaki Kaneki, Hironobu Kamimura:
The pleasant odor reduces the brain activity and enhances behavioral performance during kanji word-color stroop task: A multi-fiber NIRS study. 81-85 - Masahiro Sawai, Yoshifumi Okada, Tomomasa Nagashima:

An efficient method for relating various human impressions to physical features. 86-89 - Mehdi Faed

, Mohammad Mortazavi, Alireza Faed:
Analysis of digital DSP blocks using GDI technology. 90-95 - Alireza Ghahari, Mohsen Mosleh

:
Automatic MPEG4 compatible face representation using clustering-based modeling schemes. 96-102 - Janusz Baczynski, Michal Baczynski:

Simple system for determining starting position of cable-driven manipulator. 103-106 - Juan J. Bosch

, Fanny Klett:
Safe and flexible human-robot cooperation in industrial applications. 107-110 - Junichiro Wakatsuki, Takaaki Saito, Ali Abrishamian, Makiba Sakamoto, Takashi Uozumi:

Constructing causal networks for facial packs. 111-115 - Jae Hoon Cho, Dong Hwa Kim, Ajith Abraham:

Nature inspired solutions for green energy. 116-119 - Hüseyin Demirkale, Ekrem Duman

, Ali Fuat Alkaya:
Exact and metahueristic approaches for optimizing the operations of chip mounter machines. 120-125 - Indrajit De, Jaya Sil:

ANFIS tuned no-reference quality prediction of distorted/decompressed images featuring wavelet entropy. 126-131 - Mahdi Pakdaman Naeini, Hamid Reza Taremian, Homa Baradaran Hashemi:

Stock market value prediction using neural networks. 132-136 - Meshrif Alruily, Aladdin Ayesh

, Hussein Zedan:
Automated dictionary construction from Arabic corpus for meaningful crime information extraction and document classification. 137-142 - Luciana Morogan:

Prion neural system: Modeling the binding affinities between neurons of a network. 143-147 - Ivan Zelinka, Donald Davendra

, Václav Snásel, Roman Jasek
, Roman Senkerik
, Zuzana Oplatková
:
Preliminary investigation on relations between complex networks and evolutionary algorithms dynamics. 148-153 - Anirban Sarkar, Swapan Bhattacharya, Sankhayan Choudhury, Nabendu Chaki

:
Object relational implementation of Graph based conceptual level Multidimensional Data Model. 154-159 - Karin Kandananond

:
The detection of shifts in autocorrelated processes with MR and EWMA charts. 160-165 - Kentarou Fukuta, Tomomasa Nagashima, Takashi Uozumi, Yoshifumi Okada:

Gene analysis framework for biomarker mining. 166-170 - M. Jeihoonian, Seyed Farid Ghaderi, Mehdi Piltan:

Modeling and comparing energy consumption in basic metal industries by neural networks and ARIMA. 171-175 - Jan Platos

, Petr Gajdos:
Large data real-time classification with Non-negative Matrix Factorization and Self-Organizing Maps on GPU. 176-181 - Karin Kandananond

:
Evaluating the statistical process control performance for monitoring stationary observations using Monte Carlo simulation. 182-186 - Mete Eminagaoglu, Saban Eren:

Implementation and comparison of machine learning classifiers for information security risk analysis of a human resources department. 187-192 - Anchana Khemphila, Veera Boonjing:

Comparing performances of logistic regression, decision trees, and neural networks for classifying heart disease patients. 193-198 - Luigi Troiano

, Pravesh Kriplani:
Predicting trend in the next-day market by Hierarchical Hidden Markov Model. 199-204 - Hüseyin Kaya

, Sule Gündüz Ögüdücü:
A new approach for mutation analysis using data mining techniques. 205-210 - Yue Dai, Tuomo Kakkonen, Erkki Sutinen

:
MinEDec: A decision support model that combines text mining with competitive intelligence. 211-216 - Pavel Hruska, Jan Martinovic

, Jiri Dvorský, Václav Snásel:
XML compression improvements based on the clustering of elements. 217-221 - Seiji Sugiyama, Atsushi Ikuta, Miyuki Shibata:

A basic concept of displaying electronic text with seamless pages: Wheel Action for Reeling Paragraphs (WaRP) in the MaSSTExt. 222-227 - Ferhat Khenak:

V-Learning. 228-232 - Reshmi Maulik

, Nabendu Chaki
:
A comprehensive review on wormhole attacks in MANET. 233-238 - Cheng-Chieh Huang, Ching-Cha Hsieh:

Social relevance, then protection: A social-technical approach to CIIP. 239-243 - Jiri Dvorský, Eliska Ochodkova, Václav Snásel:

Quasigroups with good statistical properties. 244-249 - Saif ur Rehman, Saeed Ullah

, Sardar Ali:
On enhancing the WEP security against brute-force and compromised keys. 250-254 - Syed Naqvi, Gautier Dallons, Christophe Ponsard:

Protecting corporate ICT infrastructures by using digital forensics. 255-258 - Nabendu Chaki

:
LAR2P: A Location Aided Reactive Routing Protocol for near-optimal route discovery in MANET. 259-264 - Yonghoon Chung, Ki-Hyung Kim, Seung-Wha Yoo:

Time slot schedule based minimum delay graph in TDMA supported wireless industrial system. 265-268 - Krzysztof Malarz

, Vikas Chandra, Eve Mitleton-Kelly, Krzysztof Kulakowski
:
Probabilistic spreading of information in a spatial network. 269-272 - Arijit Ukil

:
Context protecting privacy preservation in ubiquitous computing. 273-278 - Adam Brennan, Michael J. O'Grady

, Gregory M. P. O'Hare
:
Simulating interaction with Wireless Sensor Networks. 279-282 - Jaydip Sen

:
An efficient algorithm for detection of selfish packet dropping nodes in Wireless Mesh Networks. 283-288 - Aida Saeed-Baginska, Romuald Mosdorf

:
The recurrence plot as a tool in the analysis of network traffic anomaly detection. 289-294 - Dipak Kr. Neog, Reeta Devi

:
Band width of rectangular microstrip patch antenna with the use of Clonal selection algorithm. 295-298 - Tomasz M. Gwizdalla

, Sebastian Grzebielucha:
The traffic flow through different form of intersections. 299-304 - Juan J. Bosch

, Fanny Klett:
Towards a generic framework for the evaluation of knowledge-based infrastructures. 305-308 - Zenon Syroka, Tomasz Zajac, Pawel Dubilowicz:

Generation of linear maximum length sequences. 309-313 - Alireza Faed:

A conceptual model for interactivity, complaint and expectation for CRM. 314-318 - Muhammad Wasim Bhatti, Farah Hayat, Nadeem Ehsan, Sohail Ahmed, Azam Ishaque, Ebtisam Mirza:

A methodology to manage the changing requirements of a software project. 319-322 - Muhammad Wasim Bhatti, Farah Hayat, Nadeem Ehsan, Sohail Ahmed, Azam Ishaque, Sheikh Zahoor Sarwar:

An investigation of changing requirements with respect to development phases of a software project. 323-327 - Svatopluk Stolfa

, Jan Kozuszník
, Michal Kosinár, Marie Duzí
, Martina Cíhalová, Ivo Vondrák:
Building process definition with ontology background. 328-334 - Seiji Sugiyama, Atsushi Ikuta, Miyuki Shibata, Tohru Matsuura:

An event oriented data management method for displaying genealogy: Widespread Hands to InTErconnect BASic Elements (WHIteBasE). 335-340 - Radha Thangaraj, C. Thanga Raj

, Pascal Bouvry
, Millie Pant, Ajith Abraham:
Optimal design of induction motor for a spinning machine using population based metaheuristics. 341-346 - Seba Maity, Jaya Sil:

CMYK model color image segmentation using type 2 fuzzy sets. 347-352 - Rupesh Kumar:

Recovery in multithreaded applications using execution monitoring and recovery engine (EMRE). 353-358 - Abhijit Sanyal

, Soumya Sankar Basu, Sankhayan Choudhury:
A requirement framework for enablement of automatic generation of domain model. 359-364 - Vivek Kumar Singh

, Debanjan Mahata, Rakesh Adhikari:
Mining the Blogosphere from a socio-political perspective. 365-370 - Aakash Ahmad

, Claus Pahl
:
Pattern-based customisable transformations for style-based service architecture evolution. 371-376 - Brian McIntyre, Mansi Alsmarah, Sreela Sasi:

Autonomic University Administration System. 377-382 - Yong-Ju Lee, Chang-Su Kim:

Building semantic ontologies for RESTful web services. 383-386 - Sanjeev Kumar

, Devendra K. Chaturvedi
:
Financial forecasting using generalized neural method. 387-391 - Suresh Kumar

, Rakesh K. Prajapati
, Manjeet Singh, Asok De
:
Security enforcement using PKI in Semantic Web. 392-397 - Ramakanta Mohanty, Vadlamani Ravi, Manas Ranjan Patra:

Application of fuzzy multi attribute decision making analysis to rank web services. 398-403 - Weisen Guo, Steven B. Kraines

:
Enriching city entities in the EKOSS failure cases knowledge base with Linked Open Data. 404-409 - Raj Kamal

, Shweta Agrawal
:
A design framework of Orchestrator for computing systems. 410-413 - Walter Christian Kammergruber, Maximilian Viermetz, Karsten Ehms, Manfred Langen:

Using association rules for discovering tag bundles in social tagging data. 414-419 - Hong Qing Yu, Stefan Dietze, Neil Benn:

Autonomous Matchmaking Web Services. 420-425 - Tanakorn Wichaiwong, Chuleerat Jaruskulchai:

A simple approach to optimize XML Retrieval. 426-431 - Santosh Kumar Ray

, Shailendra Singh:
Blog content based recommendation framework using WordNet and multiple Ontologies. 432-437 - B. Athira

, Philip Samuel:
Web services regression test case prioritization. 438-443 - S. S. Deshpande, Rajiv V. Dharaskar

:
Finding user groups on the basis of GSM logs - a survey. 444-447 - Anshu Gupta, D. K. Mishra, Rajesh Khatri

, U. B. S. Chandrawat, Preet Jain:
A two stage and three stage CMOS OPAMP with fast settling, high DC gain and low power designed in 180nm technology. 448-453 - Mohammed Firoz Mridha

, Mohammad Nurul Huda, Md. Sadequr Rahman, Chowdhury Mofizur Rahman:
Structure of Dictionary Entries of Bangla morphemes for morphological rule generation for Universal Networking Language. 454-459 - Md. Sadequr Rahman, Sangita Rani Poddar, Mohammed Firoz Mridha

, Mohammad Nurul Huda:
Open morphological machine translation: Bangla to English. 460-465 - Muqeem Ahmed

, S. Zeeshan Hussain, Syed Afzal Murtaza Rizvi
:
Knowledge grid based knowledge discovery in distributed environment. 466-470 - Shaily Malik, Anisha Goel, Saurabh Maniktala:

A comparative study of various variants of SPARQL in semantic web. 471-474 - Sarina Sulaiman, Siti Mariyam Shamsuddin, Ajith Abraham, Shahida Sulaiman:

Intelligent Mobile Web Pre-fetching (IMWeP) using XML technology. 475-480 - Michael Auxilia, D. Tamilselvan:

Anomaly detection using negative security model in web application. 481-486 - Mong-Fong Horng, Mao-Hsiung Hung, Yi-Ting Chen, Jeng-Shyang Pan, Wen Huang:

A new approach based on XMPP and OSGi technology to home automation on Web. 487-490 - A. S. Poornima

, B. B. Amberker, H. S. Likith Raj, S. Naveen Kumar, K. N. Pradeep, S. V. Ravithej:
Secure data collection in Sensor Networks using tree based key management scheme and secret sharing. 491-496 - Subrata Sinha, Smriti Kumar Sinha, Bipul Syam Purkayastha:

Extra-Tree: A model to organize execution traces of Web services. 497-501 - Sarangthem Ibotombi Singh, Smriti Kumar Sinha:

A new trust model using Hidden Markov Model based mixture of experts. 502-507 - Neha Verma, Niti Verma, Rishika Bansal, Bhagyashree Kulkarni, A. B. Patki, R. C. Meharde:

Software implementation issues in RFD analysis. 508-513 - Milena Janáková:

Database technology analysis for obtaining knowledge with support Web services. 514-517 - Dhirendra Kumar Jha, Anil Rajput, Manmohan Singh, Archana Tomar:

An efficient model for information gain of sequential pattern from web logs based on dynamic weight constraint. 518-523 - Susmitha Dey, Siby Abraham

:
Personalised and domain specific user interface for a search engine. 524-529 - Monika Rajput, Pallavi Khatri

, Alankar Shastri, Keshav Solanki:
Comparison of Ad-hoc reactive routing protocols using OPNET modeler. 530-534 - Suman Roy

, Kiran Prakash Sawant, Aditya K. Ghose:
Ontology modeling of UBL process diagrams using OWL. 535-540 - Gabriel M. Prado, Sérgio Donizetti Zorzo:

Interactive Service Provider Architecture for Interactive Digital Television systems. 541-546 - Ajaya Kumar Tripathy

, Manas Ranjan Patra:
An event based, non-intrusive monitoring framework for Web Service Based Systems. 547-552 - Amit Kant Pandit, Shekhar Verma

, Geetam S. Tomar
:
Pruned-AZB for reduced complexity block matching in video compression. 553-556 - Jiri Dvorský, Václav Snásel, Vit Vozenilek

:
On maps comparison methods. 557-562 - Nemi Chandra Rathore

, Shekhar Verma
, Ranjeet Singh Tomar, Geetam S. Tomar
:
CMAC: A cluster based MAC protocol for VANETs. 563-568 - Hong Tian, Yunhong Li, Hongbo Liu

, Ajith Abraham:
An optimized ontology transfer learning method. 569-572 - Yuehui Chen, Bo Yang, Kun Ma

, Runyuan Sun, Ajith Abraham:
An executable business model for generic web applications. 573-577 - Alireza Ghahari, Mohsen Mosleh

:
Hybrid clustering-based 3D face modeling upon non-perfect orthogonality of frontal and profile views. 578-584 - Saurabh Bhardwaj

, Smriti Srivastava
, S. Vaishnavi, J. R. P. Gupta:
Chaotic time series prediction using combination of Hidden Markov Model and Neural Nets. 585-589 - Nashwa El-Bendary

, Hossam M. Zawbaa
, Mahmoud S. Daoud, Aboul Ella Hassanien
, Kazumi Nakamatsu:
ArSLAT: Arabic Sign Language Alphabets Translator. 590-595 - Saeed Shariati, Mahdi Motavalli Haghighi:

Comparison of anfis Neural Network with several other ANNs and Support Vector Machine for diagnosing hepatitis and thyroid diseases. 596-599 - Wafaa Abd-Elmonim Ghnaim, Neveen I. Ghali

, Aboul Ella Hassanien
:
Known-ciphertext cryptanalysis approach for the Data Encryption Standard technique. 600-603 - C. Sunil Kumar

, C. V. Guru Rao
, A. Govardhan
:
A framework for interoperable healthcare information systems. 604-608 - Mostafa A. Salama

, Aboul Ella Hassanien
, Aly A. Fahmy:
Reducing the influence of normalization on data classification. 609-613 - Hadi Dehbovid

, Farbod Razzazi
, Shapour Alirezaii:
A novel method for de-warping in Persian document images captured by cameras. 614-619 - Ali Ilkhani, Golnoosh Abaee

:
Extraction test cases by using data mining; reducing the cost of testing. 620-625 - Mohammad Taghi Ameli, Vahid Shokri, Saeed Shokri:

Using Fuzzy Logic & Full Search for Distributed generation allocation to reduce losses and improve voltage profile. 626-630

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














