


default search action
17th SISY 2019: Subotica, Serbia
- 17th IEEE International Symposium on Intelligent Systems and Informatics, SISY 2019, Subotica, Serbia, September 12-14, 2019. IEEE 2019, ISBN 978-1-7281-2143-7

- Ljiljana Trajkovic:

Complex Networks : Plenary Talk. 11-12 - Katalin M. Hangos, Anna Ibolya Pózna:

Structural Decomposition and its Use in Qualitative Model-based Diagnosis of Complex Systems : Plenary Talk. 13-14 - C. L. Philip Chen:

Unmanned Systems Planning and Control based on Bionic Swarm Movement : Plenary Talk. 15-16 - Radu-Emil Precup:

Evolving Fuzzy Models of Mechatronics Applications : Plenary Talk. 17-18 - Póth Miklós, Zeljen Trpovski:

Influence of block size on JPEG compression performance. 19-22 - László Kajdocsi, András Dörömbözi, János Kovács:

Development of Bluetooth Mesh Core Stack using OmNET++. 23-28 - Anton Baláz

, Michal Hulic, Marek Kurilec, Martin Stancel:
Classification of Security for System Vulnerabilities. 29-34 - Dávid Papp, Gábor Szücs, Zsolt Knoll:

Difference based query strategies in active learning. 35-40 - Adil Joldic, Elmir Babovic

, Nina Bijedic, Alin Bejenaru-Vrabie:
Laboratory Environment for Algorithms Testing in Mobile Robotics. 41-46 - Zoltán Gyenes, Emese Gincsainé Szádeczky-Kardoss

:
A novel concept of lane-keeping algorithms for mobile robots. 47-52 - Judith Jakob, József Tick:

Towards a Transfer Concept from Camera-Based Driver Assistance to the Assistance of Visually Impaired Pedestrians. 53-60 - Huanze Zeng

, Argon Chen:
Classification Tree with Hybrid Splitting Mechanism. 61-66 - Radmila Gerov

, Zoran Jovanovic:
Closed-loop identification of a first-order plus time delay model using Lambert W function. 67-70 - Orsolya Máthé, Botond Miklós, István Bege, Attila Farkas, Csaba Sulyok

:
Woody: A Software System for the Design and Production of Doors and Windows. 71-76 - Hunor Hegedüs, Kata Szász, Károly Simon, Tibor Fazakas, Andor Mihály, Katalin Nagy:

Blood Notes: Software System for Promoting and Facilitating Blood Donation. 77-82 - Pál Fehér-Polgár

, Pál Michelberger:
The Information Security Risks of the BYOD, From Theoretical Point of View. 83-88 - György Molnár, Zoltán Szüts, Zoltán Balogh:

Modern digital Web 2.0 devices and services supporting the teaching of Technology and Informatics. 89-94 - József Z. Szabó, Péter Bakucz:

Determination of Critical Fault Tree Components Based on Mixed Fuzzy Top Event. 95-98 - József Z. Szabó, Péter Bakucz:

Determining Algorithmic Performance with Uncertainty Analysis. 99-102 - Sinan Koçak

, Edit Tóth-Laufer, László Pokorádi
:
Fuzzy Failure Modes and Effects Analysis with Different Defuzzification Methods - A Case Study for Bearing Manufacturing Process. 103-108 - Edit Tóth-Laufer, Richárd Horváth:

A MIMO Fuzzy Model to Predict Turning Metrics. 109-114 - Judit Lukács:

Comparison of defuzzification methods for cabin noise prediction of passenger cars. 115-120 - Sandra Buhmiler, Sanja Rapajic, Milan Lukic, Slavica Medic

, Natasa Durakovic
, Tatjana Grbic:
Derivative-free method for singular systems. 121-126 - Slavica Medic

, Nedeljko Stojakovic, Darko Capko, Natasa Durakovic
, Tatjana Grbic:
Mathematical Model of Queue Size in a Postal Network Unit with Variable Number of Servers. 127-132 - Darja Gabriska

, Miroslav Ölvecký
:
Using Deep Learning to Improve Process Operator Reliability. 133-138 - Ján Hurtuk

, Jakub Cervenák, Martin Stancel, Michal Hulic, Peter Fecilak:
Indoor navigation using IndoorAtlas library. 139-142 - Zuzana Dankovicová, Ján Hurtuk

, Peter Fecilak:
Evaluation of Digitalized Handwriting for Dysgraphia Detection Using Random Forest Classification Method. 149-154 - Peter Gnip, Peter Drotár:

Ensemble methods for strongly imbalanced data: bankruptcy prediction. 155-160 - Dusanka Dakic

, Srdjan Sladojevic
, Teodora Lolic, Darko Stefanovic:
Process Mining Possibilities and Challenges: A Case Study. 161-166 - Zlatko Covic, Helena Manojlovic

:
Developing Key Competencies through Hackathon Based Learning. 167-172 - Biljana P. Mihailovic

, Mirjana Strboja
, Milos Todorov
:
The bipolar Choquet g-integrals. 173-178 - Milos Todorov

, Mirjana Strboja
, Biljana P. Mihailovic
:
Jensen type inequality for the bipolar Shilkret and Sugeno integrals. 179-184 - Dragan Jocic

, Ivana Stajner-Papuga:
An overview of the existing classes of aggregation operations with an absorbing element. 185-190 - Kenichi Tamura:

Adaptive Framework for Evolutionary Algorithms to Evaluation-iteration Constrained Optimization Problems. 191-196 - Srikanth Kamath, Shawn Ivan D'souza:

Bit Error Rate Analysis of Analog and Hybrid Beamforming Techniques. 197-202 - Ignacy Duleba, Iwona Karcz-Duleba:

Evaluation of Configurations in Nonholonomic Motion Planning, 2D Case Study. 203-206 - Olga V. Mamoutova

, Mikhail B. Uspenskiy, Anton V. Sochnev, Sergey V. Smirnov, Marina V. Bolsunovskaya:
Knowledge Based Diagnostic Approach for Enterprise Storage Systems. 207-212 - Isabela Dramnesc, Tudor Jebelean

:
Case Studies on Algorithm Discovery from Proofs: The Delete Function on Lists and Binary Trees using Multisets. 213-220 - Gábor Szücs, Dorottya Huszti:

Seq2seq Deep Learning Method for Summary Generation by LSTM with Two-way Encoder and Beam Search Decoder. 221-226 - Dániel Zentai:

Graph Theoretic Risk Classification in Transportation Networks. 227-230 - Gábor Kiss

:
External manipulation recognition modul in self-driving vehicles. 231-234 - László Pokorádi

, Péter Felker:
Interval Uncertainty Analysis of Bridge Structure Systems' Reliability. 235-240 - István Nagy, Farkas Bence Vér:

Practical Analysis of an AMR Wheel Speed Sensor and CAN Bus System for the Communication's Failures and its Implications to the EV's Control System. 241-248 - Attila Szabó, Andras Nagy, Gabor Kozsely:

Laser cutting technology development for Fe based metallic glass. 249-254 - József Kopják, Gergely Sebestyen

:
Event-driven Fuzzy Inference System Implementation in Node-RED. 255-260 - Árpád Varga, György Eigner, József K. Tar:

Numerical Simulations for an Experimental Test Bed for Adaptive Control Methods. 261-266 - Hemza Redjimi

, József K. Tar:
The Use of Multiple Components Fixed Point Iteration in the Adaptive Control of Single Variable Systems. 267-272

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














