


default search action
CSOC 2018
- Radek Silhavy:

Cybernetics and Algorithms in Intelligent Systems - Proceedings of 7th Computer Science On-line Conference 2018, Volume 3. Advances in Intelligent Systems and Computing 765, Springer 2019, ISBN 978-3-319-91191-5 - Broderick Crawford, Ricardo Soto, Alvaro Peña, Gino Astorga:

A Binary Grasshopper Optimisation Algorithm Applied to the Set Covering Problem. 1-12 - Nur Syakirah Mohd Jaafar, Izzatdin Abdul Aziz

, Jafreezal Jaafar, Ahmad Kamil Mahmood, Abdul Rehman Gilal
:
A Survey on Signal Processing Methods in Fiber Optic Sensor for Oxidized Carbon Steel. 13-24 - Libor Pekar

, Pavel Navrátil
, Radek Matusu:
Some Recent Results on Direct Delay-Dependent Stability Analysis: Review and Open Problems. 25-34 - Daniel Honc

:
Modelling and Identification of Magnetic Levitation Model CE 152/Revised. 35-43 - Marek Simon

, Ladislav Huraj
, Tibor Horák
:
DDoS Reflection Attack Based on IoT: A Case Study. 44-52 - Tomás Barot

:
Complemented Adaptive Control Strategy with Application in Pedagogical Cybernetics. 53-62 - Shima Ramesh Maniyath, V. Thanikaiselvan

:
Robust and Lightweight Image Encryption Approach Using Public Key Cryptosystem. 63-73 - Yurii Sheliazhenko

:
Computer Modeling of Personal Autonomy and Legal Equilibrium. 74-81 - Chiranjib Patra, Nicolea Botezatu:

Improving the Performance of Hierarchical Clustering Protocols with Network Evolution Model. 82-95 - Samuel Zák, Peter Sevcík, Martin Revák:

Efficient Control of SEPIC DC-DC Converter with Dynamic Switching Frequency. 96-101 - Inna Trofimova

, Boris V. Sokolov, Dmitry A. Ivanov:
Multiple-Model Description and Control Construction Algorithm of Supply Chain. 102-108 - Václav Skala, Michal Smolik

:
A New Approach to Vector Field Interpolation, Classification and Robust Critical Points Detection Using Radial Basis Functions. 109-115 - Vadim N. Tsypyschev:

Trusted Cryptographic Tools Locking. 116-124 - Yuri Ryzhikov:

Calculation of the Closed Multi-channel Queueing Systems. 125-132 - Jiri Vojtesek

, Lubos Spacek:
MATLAB as a Tool for Modelling and Simulation of the Nonlinear System. 133-143 - Peter Benes, Ivo Bukovsky

:
An Input to State Stability Approach for Evaluation of Nonlinear Control Loops with Linear Plant Model. 144-154 - Jury S. Manuilov, Alexander N. Pavlov, Dmitry A. Pavlov

, Alexey A. Slin'ko:
The Technique of Informational Interaction Structural-Parametric Optimization of an Earth's Remote Sensing Small Spacecraft Cluster. 155-166 - Lubos Spacek, Jiri Vojtesek

, Jiri Zatopek:
Collaborative Robot YuMi in Ball and Plate Control Application: Pilot Study. 167-175 - Dmitry N. Verzilin

, Tatyana Maximova
, Yury Antokhin, Irina Sokolova:
Integration of Heterogeneous Data in Monitoring Environmental Assets. 176-185 - Sergey G. Baranov

:
Hidden Asymmetry in Shape of Biological Patterns. 186-195 - Sadiq Hussain

, Rasha Ragheb Atallah, Amirrudin Kamsin, Jiten Hazarika:
Classification, Clustering and Association Rule Mining in Educational Datasets Using Data Mining Tools: A Case Study. 196-211 - Preethi K. Mane

, K. Narasimha Rao:
Review of Research Progress, Trends and Gap in Occupancy Sensing for Sophisticated Sensory Operation. 212-222 - Pavel Pokorný, Pavla Dockalová:

A 3D Visualization Application of Zlín in the Eighteen-Nineties. 223-232 - Mohamad Kadi, Said Krayem, Roman Jasek

, Petr Zacek
, Bronislav Chramcov
:
Multi-agent Systems Interacting (Addressing Scopes, Control Resources). 233-245 - Ammar Alhaj Ali, Roman Jasek

, Said Krayem, Bronislav Chramcov
, Petr Zacek
:
Improved Adaptive Fault Tolerance Model for Increasing Reliability in Cloud Computing Using Event-B. 246-258 - Jianjun Lei

, Shengjie Peng
, Yu Dai
:
Adaptive Access Mechanism Based on Network State Detection in Multi-rate IEEE802.11 WLANs. 259-271 - Mikhail Abrosimov, Alexander Brovko

, Ruslan Pakharev, Anton Pudikov, Konstantin Reznikov:
Reconstruction of 3D Permittivity Profile of a Dielectric Sample Using Artificial Neural Network Mathematical Model and FDTD Simulation. 272-279 - Jan Vávra, Martin Hromada

:
Novelty Detection System Based on Multi-criteria Evaluation in Respect of Industrial Control System. 280-289 - R. Anusha

, V. Veena Devi Shastrimath
:
TRMA: An Efficient Approach for Mutual Authentication of RFID Wireless Systems. 290-299 - C. K. Vanamala

, G. Raghvendra Rao:
SC-MANET: Threats, Risk and Solution Strategies for Security Concerns in Mobile Ad-Hoc Network. 300-310 - K. Pradeep Kumar

, B. R. Prasad Babu:
DSMANET: Defensive Strategy of Routing Using Game Theory Approach for Mobile Adhoc Network. 311-320 - M. Shahina Parveen, Gugulothu Narsimha

:
OCSLM: Optimized Clustering with Statistical Based Local Model to Leverage Distributed Mining in Grid Architecture. 321-336 - Mohamed Loukili

, Soumia Mordane
:
New Numerical Investigation Using Meshless Methods Applied to the Linear Free Surface Water Waves. 337-345 - Jyoti Neeli

, N. K. Cauvery:
Framework for Capturing the Intruders in Wireless Adhoc Network Using Zombie Node. 346-355 - B. Prathiba, K. Jaya Sankar

, V. Sumalatha
:
SDQE: Sensor Data Quality Enhancement in Reconfigurable Network for Optimal Reliability. 356-363 - Chanda V. Reddy, K. V. Padmaja:

Relaxed Greedy-Based Approach for Enhancing of Resource Allocation for Future Cellular Network. 364-373 - Chetana Tukkoji

, K. Seetharam:
ITM-CLD: Intelligent Traffic Management to Handling Cloudlets of the Large Data. 374-381 - Najiya Sultana:

A Novel Computational Modelling to Optimize the Utilization of Intrusion Detection Paradigm in a Large-Scale MANET. 382-392 - A. C. Yogeesh, Shantakumar B. Patil, Premajyothi Patil, H. R. Roopashree:

DSP-IR: Delay Sensitive Protocol for Intelligent Routing with Medium Access Control. 393-402 - Shamshekhar S. Patil

, N. R. Sunitha
:
A Novel, Lightweight, and Cost-Effective Mechanism to Secure the Sensor-Gateway Communication in IoT. 403-412 - G. R. Kavitha, T. S. Indumathi:

Quality of Service (QoS) Aware Reconfigurable Optical Add/Drop Multiplexers (ROADM) Model with Minimizing the Blocking Rate. 413-422 - David A. Oladepo, Olawale Joshua Adeleke

, Churchill T. Ako:
A Mixed Hybrid Conjugate Gradient Method for Unconstrained Engineering Optimization Problems. 423-431 - Ameen Shaheen

, Azzam Sleit
, Saleh H. Al-Sharaeh
:
Chemical Reaction Optimization for Traveling Salesman Problem Over a Hypercube Interconnection Network. 432-442 - Sergey Kucherov, Yuri I. Rogozov, Julia Lipko, Dmitry Elkin

:
The Concept of the Method for Dynamic Control of Traffic Flows on Multi-lane Roads Based on Configurable Information Systems. 443-449

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














