index - Computer Information Systems and Industrial Management (CISIM 2017)
   


Full Text Documents

60

Search


Table of Contents
Computer Information Systems and Industrial Management
Khalid Saeed, Władysław Homenda, Rituparna Chaki
Front Matter

Algorithms


Pattern Classification with Rejection Using Cellular Automata-Based Filtering
Agnieszka Jastrzebska, Rafael Toro Sluzhenko
3-14
Distributed NVRAM Cache – Optimization and Evaluation with Power of Adjacency Matrix
Artur Malinowski, Paweł Czarnul
15-26
Optimal Controlled Random Tests
Ireneusz Mrozek, Vyacheslav Yarmolik
27-38
Tabu Search and Greedy Algorithm Adaptation to Logistic Task
Kamil Musiał, Joanna Kotowska, Dagmara Górnicka, Anna Burduk
39-49
Evolutionary Algorithm for the Time-Dependent Orienteering Problem
Krzysztof Ostrowski
50-62
Optimalization of Parallel GNG by Neurons Assigned to Processes
Lukáš Vojáček, Pavla Dráždilová, Jiří Dvorský
63-72

Biometrics and Pattern Recognition Applications


SVM Kernel Configuration and Optimization for the Handwritten Digit Recognition
Monika Drewnik, Zbigniew Pasternak-Winiarski
87-98
Object Classification Using Sequences of Zernike Moments
Aneta Górniak, Ewa Skubalska-Rafajłowicz
99-109
New Year’s Day Speeches of Czech Presidents: Phonetic Analysis and Text Analysis
Milan Jičínský, Jaroslav Marek
110-121
Classifier Selection for Motor Imagery Brain Computer Interface
Izabela Rejer, Robert Burduk
122-130
A Multimodal Face and Fingerprint Recognition Biometrics System
Maciej Szymkowski, Khalid Saeed
131-140
Keystroke Dynamics and Finger Knuckle Imaging Fusion for Continuous User Verification
Tomasz Wesołowski, Rafal Doroz, Krzysztof Wrobel, Hossein Safaverdi
141-152

Data Analysis and Information Retrieval


Gesture Recognition in 3D Space Using Dimensionally Reduced Set of Features
Łukasz Gadomer, Marcin Skoczylas
167-179
Using Cluster–Context Fuzzy Decision Trees in Fuzzy Random Forest
Łukasz Gadomer, Zenon Sosnowski
180-192
Split-and-merge Tweak in Cross Entropy Clustering
Krzysztof Hajto, Konrad Kamieniecki, Krzysztof Misztal, Przemysław Spurek
193-204
Algorithms for Automatic Selection of Allophones to the Acoustic Units Database
Janusz Rafałko
218-226

Engineering of Enterprise Software Products


Blockchain Transaction Analysis Using Dominant Sets
Malik Awan, Agostino Cortesi
229-239
Ontology Driven Conceptualization of Context-Dependent Data Streams and Streaming Databases
Shreya Banerjee, Anirban Sarkar
240-252
Towards the Exploitation of Statistical Language Models for Sentiment Analysis of Twitter Posts
Sukriti Bhattacharya, Prasun Banerjee
253-263
POMSec: Pseudo-Opportunistic, Multipath Secured Routing Protocol for Communications in Smart Grid
Manali Chakraborty, Novarun Deb, Nabendu Chaki
264-276
Localization based Anti-Void Clustering Approach (LAVCA) for Energy Efficient Routing in Wireless Sensor Network
Ayan Das, Rituparna Chaki
290-302
Expressing and Applying C++ Code Transformations for the HDF5 API Through a DSL
Martin Golasowski, João Bispo, Jan Martinovič, Kateřina Slaninová, João Cardoso
303-314
Clustering of Mobile Subscriber’s Location Statistics for Travel Demand Zones Diversity
Marcin Luckner, Aneta Rosłan, Izabela Krzemińska, Jarosław Legierski, Robert Kunicki
315-326
Share Market Sectoral Indices Movement Forecast with Lagged Correlation and Association Rule Mining
Giridhar Maji, Soumya Sen, Amitrajit Sarkar
327-340
Task Allocation Strategies for FPGA Based Heterogeneous System on Chip
Atanu Majumder, Sangeet Saha, Amlan Chakrabarti
341-353
Productivity Oriented Cooperative Approach to Scheduling IT Project Tasks
Tadeusz Nowicki, Robert Waszkowski
354-365
Sequential Purchase Recommendation System for E-Commerce Sites
Shivani Saini, Sunil Saumya, Jyoti Singh
366-375

Industrial Management and Other Applications


Risk Assessment in a Parallel Production System with the Use of FMEA Method and Linguistic Variables
Anna Burduk, Damian Krenczyk
379-390
The Multi Depot One-to-One Pickup and Delivery Problem with Distance Constraints: Real World Application and Heuristic Solution Approach
Olfa Chebbi, Ezzeddine Fatnassi
391-401
Detection of ‘Orange Skin’ Type Surface Defects in Furniture Elements with the Use of Textural Features
Michał Kruk, Bartosz Świderski, Katarzyna Śmietańska, Jarosław Kurek, Leszek Chmielewski, Jarosław Górski, Arkadiusz Orłowski
402-411
Service Strategies in Two-Server Tandem Configurations – Modeling and Investigation
Walenty Oniszczuk
423-435
Image-Driven Decision Making with Application to Control Gas Burners
Ewaryst Rafajłowicz, Wojciech Rafajłowicz
436-446

Modelling and Optimization


Rough Sets in Imbalanced Data Problem: Improving Re–sampling Process
Katarzyna Borowska, Jarosław Stepaniuk
459-469
A Model of Machine Learning Based Interactive E-business Website
Germanas Budnikas
470-480
Towards Golden Rule of Capital Accumulation: A Genetic Algorithm Approach
Sankhadeep Chatterjee, Rhitaban Nag, Soumya Sen, Amitrajit Sarkar
481-491
A Multi-agent System Model for the Personal Rapid Transit System
Ezzeddine Fatnassi, Hadhami Kaabi
492-501
Fractional-Order Linear Systems Modeling in Time and Frequency Domains
Wiktor Jakowluk
502-513
Synthesis Method of Finite State Machines Based on State Minimization for Low Power Design
Adam Klimowicz
526-535
Self-organizing Traffic Signal Control with Prioritization Strategy Aided by Vehicular Sensor Network
Marcin Lewandowski, Bartłomiej Płaczek, Marcin Bernas
536-547
Infinite Impulse Response Approximations to the Non-integer Order Integrator Using Cuckoo Search Algorithm
Shibendu Mahata, Suman Saha, Rajib Kar, Durbadal Mandal
548-556
Designing Moore FSM with Transformation of State Codes
Kamil Mielcarek, Alexander Barkalov, Larisa Titarenko
557-568
Efficient Simulation of Interacting Particle Systems in Continuous Space and Time
Tomasz Ożański
569-579
Sampling Method for the Flow Shop with Uncertain Parameters
Paweł Rajba, Mieczysław Wodecki
580-591
State Assignment of Finite-State Machines by Using the Values of Input Variables
Valery Salauyou, Michal Ostapczuk
592-603
Nonnegative Matrix Factorization Based Decomposition for Time Series Modelling
Tatjana Sidekerskienė, Marcin Woźniak, Robertas Damaševičius
604-613

Various Aspects of Computer Security


Evil-AP - Mobile Man-in-the-Middle Threat
Kamil Breński, Maciej Chołuj, Marcin Luckner
617-627
Intention to Adopt the Cash on Delivery (COD) Payment Model for E-commerce Transactions: An Empirical Study
Mohanad Halaweh
628-637
A Signature Scheme Based on Implicit and Explicit Certificates Against k-Traitors Collusion Attack
Tomasz Hyla, Jerzy Pejaś
638-651
Netflow-Based Malware Detection and Data Visualisation System
Rafał Kozik, Robert Młodzikowski, Michał Choraś
652-660
Application of XGBoost Algorithm in Fingerprinting Localisation Task
Marcin Luckner, Bartosz Topolski, Magdalena Mazurek
661-671
Developing Countermeasures against Cloning of Identity Tokens in Legacy Systems
Pavel Moravec, Michal Krumnikl
672-684
Analysis of Specific Personal Information Protection Assessment in the Social Security and Tax Number System of Local Governments in Japan
Sanggyu Shin, Yoichi Seto, Mayumi Sasaki, Kei Sakamoto
685-696
The Implementation of Electronic Document in Transaction Execution
Gerard Wawrzyniak, Imed El Fray
697-708

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/