


default search action
7. CISIM 2008: Ostrava, Czech Republic
- Václav Snásel, Ajith Abraham, Khalid Saeed, Jaroslav Pokorný:
7th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2008, Ostrava, Czech Republic, June 26-28, 2008. IEEE Computer Society 2008, ISBN 978-0-7695-3184-7
Plenary Lecture
- Leszek Rutkowski:
Neuro-Fuzzy Systems and their Applications. 1-2 - Svein J. Knapskog:
New Cryptographic Primitives. 3-7
Keynote Paper
- Ryszard Tadeusiewicz
, Lidia Ogiela:
Modern Methods for the Cognitive Analysis of Economic Data and Text Documents and their Application in Enterprise Management. 11-23
Session A. Intelligent Computing and Frameworks
- Pavel Krömer
, Václav Snásel, Jan Platos
:
Investigating Query Similarity Measures for Collaborative Web Search. 27-32 - Václav Snásel, Martin Polovincak, Hussam M. Dahwa Abdulla, Zdenek Horak:
On Knowledge Structures Reduction. 33-37 - Pavel Brandstetter
, Ondrej Skuta:
Procedure to Choose Alternative ANN in the Control of Electrical Drive. 38-43 - Magdalena Topczewska, Kurt Frischmuth
:
Rank Regression by Projection Method vs Graph-Theoretical Algorithms. 44-49 - Václav Snásel, Jan Martinovic
, Jan Kozuszník
:
Strategy Description and Modelling for Multi-Agent Systems. 50-55
Session B. Nature Inspired Computing and Problem Solving
- Moustapha Sene, Abdennasser Chebira, Kurosh Madani:
A Hybrid Multi-Experts Approach for Mechanical Defects' Detection and Diagnosis. 59-64 - Divyata Dal, Siby Abraham, Ajith Abraham, Sugata Sanyal, Mukund A. Sanglikar:
Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System. 65-70 - Václav Snásel, Jan Platos
, Pavel Krömer
, Nabil Ouddane:
Genetic Algorithms Searching for Turbo Code Interleaver and Solving Linear Ordering Problem. 71-77 - Farouk Benabbas, Mohamed Tarek Khadir, Damien Fay, Ahmed Boughrira:
Kohonen Map Combined to the K-Means Algorithm for the Identification of Day Types of Algerian Electricity Load. 78-83 - Millie Pant, Radha Thangaraj, Ajith Abraham:
Particle Swarm Based Meta-Heuristics for Function Optimization and Engineering Applications. 84-90 - Soufiane Khedairia
, Mohamed Tarek Khadir:
Self-Organizing Map and K-Means for Meteorological Day Type Identification for the Region of Annaba - Algeria. 91-96 - Hatem Boukadida, Zied Gafsi, Nejib Hassen, Kamel Besbes
:
A 4-Bits CSA Adder Using the Arithmetic A2 Redundant Binary Representation for Mixed Neural Networks with On-Chip Learning. 97-98 - Pavel Varacha
, Ivan Zelinka:
Analytic Programming Powered by Distributed Self-Organizing Migrating Algorithm Application. 99-100
Session C. Digital Communication and Information Management
- Soma Saha, Rituparna Chaki, Nabendu Chaki
:
A New Reactive Secure Routing Protocol for Mobile Ad-Hoc Networks. 103-108 - Jakub Swacha
:
Assessing the Efficiency of Data Compression and Storage System. 109-114 - Oskar Swida, Aida Saeed-Baginska, Romuald Mosdorf
:
Frequency and Fractal Analysis of Address Resolution Protocol Traffic. 115-120 - Poly Sen, Nabendu Chaki
, Rituparna Chaki:
HIDS: Honesty-Rate Based Collaborative Intrusion Detection System for Mobile Ad-Hoc Networks. 121-126 - Amine Chohra, Arash Bahrammirzaee, Kurosh Madani:
Negotiation Behaviors Based on Artificial Intelligence and Social and Cognitive Human-Agent Interaction. 127-132 - Jan Martinovic
, Pavla Drázdilová, Katerina Slaninová
, Václav Snásel:
Relation Analysis in eLearning. 133-138 - Rubina Sultan, Muhammad Shafiq
, Noor Muhammad Khan
:
Reliability in Wireless Sensor Networks Using Soft Sensing. 139-144 - Jan Martinovic
, Petr Gajdos, Václav Snásel:
Similarity in Information Retrieval. 145-150 - Mohamed Tarek Khadir, Mokhtar Sellami
:
A Web-Based Collaborative Environment Based on a Shared Ontology for the Maintenance of Steam Turbines. 151-152 - Milena Tvrdíková
:
Information System Integrated Security. 153-154 - Ireneusz Mrozek
, Vyacheslav N. Yarmolik, Eugenia Buslowska:
Multi Background Memory Testing. 155-156 - Sang-Eon Lee, Sang-Ho Shin, Geum-Dal Park, Kee-Young Yoo:
Wireless Sensor Network Protocols for Secure and Energy-Efficient Data Transmission. 157-162
Session D. Image Processing and Recognition, and Biometrics
- Tomas Fabian:
An Algorithm for Parking Lot Occupation Detection. 165-170 - Leila Djerou, Nacer Khelil, Mohamed Batouche
:
Image Segmentation by Self-Organised Region Growing. 171-176 - Anna Bartkowiak, Adam Szustalewicz:
Intrinsic Dimensionality of Data and of their Representatives. A Case Study of Amino-Acid Distribution in ORFs. 177-182 - Anna Bartkowiak:
Nonlinear Dimensionality Reduction by Isomap and MLEdim as Applied to Amino-Acid Distribution in Yeast ORFs. 183-188 - Marcin Adamski
, Khalid Saeed:
Online Signature Classification and its Verification System. 189-194 - Jan Platos
, Jana Kocibova, Pavel Krömer
, Pavel Moravec
, Václav Snásel:
Tensor Decomposition for 3D Bars Problem. 195-200 - Surachai Ongkittikul, Stewart Worrall, Ahmet M. Kondoz:
Two Hand Tracking Using Colour Statistical Model with the K-means Embedded Particle Filter for Hand Gesture Recognition. 201-206 - Piotr S. Szczepaniak:
Verification of Hypothesis about Image Content Using Active Contour Approach. 207-209 - Michal Krumnikl
, Eduard Sojka, Jan Gaura
, Oldrich Motyka
:
A New Method for Bryophyte Canopy Analysis Based on 3D Surface Reconstruction. 210-211 - Miao Liu, Dongwei Guo, Jie Ma, Chunguang Zhou:
Object Localization Based on Mutual Information in Global Structure Constraint Model. 212-213 - Rafal Kozik, Aleksandra Zelek, Michal Choras:
Palmprint Recognition Enhanced by the Shape Features. 214-215
Session E. Computer System Engineering
- Ivo Vondrák, Jan Martinovic
, Jan Kozuszník
, Svatopluk Stolfa
, Tomás Kozubek
, Petr Kubícek, Vít Vondrák, Jan Unucka:
A Description of a Highly Modular System for the Emergent Flood Prediction. 219-224 - Mariusz Rybnik
, Marek Tabedzki
, Khalid Saeed:
A Keystroke Dynamics Based System for User Identification. 225-230 - Jolanta Koszelew
:
Two Methods of Quasi-Optimal Routes Generation in Public Transportation Network. 231-236 - Saber Benharzallah
, Okba Kazar
:
Intelligent Agents for a Semantic Mediation of Information Systems. 237-238 - Wiktor Danko:
Remarks on Computer Simulations Based on Algorithms of High Complexity. 239-243
Session F. Industrial Management
- Eva Moravcova, Tereza Miklickova:
Systemic Influence of Corporate Parenting on National Advantage Factors - A Czech Example. 247-252 - Dibyahash Bordoloi
:
A Disaster Management Network for Indian Railways. 253-254 - Maciej Modrzejewski, Jaroslaw A. Chudziak
, Rafal W. Cegielski:
Complex Marketing Database Specification, Design and Implementation. 255-256 - Radovan Hájovský:
Multimedia Support of Education Biomedical Engineering. 257-260 - Dengwen Wei, Zaobin Gan, Lei Xu:
Uncertainty Trust Model in E-commerce Environment. 261-266
Session G. CelGrid 2008 Workshop
- Santi Caballé
, Fatos Xhafa
, Thanasis Daradoumis
, Ajith Abraham:
Efficient Interaction Analysis for an Effective Provision of Knowledge about the Discussion Process to CSCL Practices. 269-274 - Fatos Xhafa
, Bernat Duran, Ajith Abraham, Keshav P. Dahal:
Tuning Struggle Strategy in Genetic Algorithms for Scheduling in Computational Grids. 275-280 - Keshav P. Dahal
, M. Alamgir Hossain, Benny Varghese, Ajith Abraham, Fatos Xhafa
, Atanasi Daradoumis
:
Scheduling in Multiprocessor System Using Genetic Algorithms. 281-286 - Hani Mahdi
, Sally S. Attia:
Finding Candidate Helpers in Collaborative E-Learning Using Rough Sets. 287-292 - Marcin Bartoszewski, Halina Kwasnicka
, Urszula Markowska-Kaczmar
, Pawel B. Myszkowski
:
Extraction of Emotional Content from Music Data. 293-299 - Suhail S. J. Owais, Václav Snásel, Pavel Krömer
, Ajith Abraham:
Survey: Using Genetic Algorithm Approach in Intrusion Detection Systems Techniques. 300-307 - Halina Kwasnicka
, Dorota Szul, Urszula Markowska-Kaczmar
, Pawel B. Myszkowski
:
Learning Assistant - Personalizing Learning Paths in e-Learning Environments. 308-314 - Pawel B. Myszkowski
, Halina Kwasnicka
, Urszula Markowska-Kaczmar
:
Data Mining Techniques in e-Learning CelGrid System. 315-319

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.