Atjaunināt sīkdatņu piekrišanu

Computer Information Systems and Industrial Management: 13th IFIP TC 8 International Conference, CISIM 2014, Ho Chi Minh City, Vietnam, November 5-7, 2014, Proceedings 2014 ed. [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 702 pages, height x width: 235x155 mm, 313 Illustrations, black and white; XVIII, 702 p. 313 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 8838
  • Izdošanas datums: 09-Oct-2014
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3662452367
  • ISBN-13: 9783662452363
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 702 pages, height x width: 235x155 mm, 313 Illustrations, black and white; XVIII, 702 p. 313 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 8838
  • Izdošanas datums: 09-Oct-2014
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3662452367
  • ISBN-13: 9783662452363
This book constitutes the proceedings of the 13th IFIP TC 8 International Conference on Computer Information Systems and Industrial Management, CISIM 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 60 paper presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections named: algorithms; biometrics and biometrics applications; data analysis and information retrieval; industrial management and other applications; modelling and optimization; networking; pattern recognition and image processing; and various aspects of computer security.
Keynote Papers
Processing Collective Knowledge --- Conflict Resolution and Integration Aspects
1(4)
Ngoc Thanh Nguyen
How to Store and Process Big Data: Are Today's Databases Sufficient?
5(6)
Jaroslav Pokorny
Algorithms
A New Contention Management Technique for Obstruction Free Transactional Memory
11(12)
Ammlan Ghosh
Anubhab Sahin
Anirban Silsarma
Rituparna Chaki
Evolutionary Algorithm for Decision Tree Induction
23(10)
Dariusz Jankowski
Konrad Jackowski
A New Method for Mining High Average Utility Itemsets
33(10)
Tien Lu
Bay Vo
Hien T. Nguyen
Tzung-Pei Hong
Spectral Clustering Based on Analysis of Eigenvector Properties
43(12)
Malgorzata Lucinska
Slawomir T. Wierzchon
Applying Recurrent Fuzzy Neural Network to Predict the Runoff of Srepok River
55(12)
Hieu Ngoc Duong
Quyen Ngoc Thi Nguyen
Long Ta Bui
Hien T. Nguyen
Vaclav Snasel
Comparison of Chaos Driven PSO and Differential Evolution on the Selected PID Tuning Problem
67(10)
Roman Senkerik
Michal Pluhacek
Ivan Zelinka
Donald Davendra
Zuzana Kominkova Oplatkova
Improving Rule Selection from Robot Soccer Strategy with Substrategies
77(12)
Vaclav Svaton
Jan Martinovic
Katerina Slaninova
Vaclav Snasel
Novel Ranking Methods Applied to Complex Membership Determination Problems
89(11)
Loc Hoang Tran
Linh Hoang Tran
Hoang Trang
Combination of Self Organizing Maps and Growing Neural Gas
100(12)
Lukas Vojacek
Pavla Drazdilova
Jiri Dvorsky
Biometrics and Biometrics Applications
A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud
112(10)
Tapalina Bhattasali
Khalid Saeed
Nabendu Chaki
Rituparna Chaki
On the Comparison of the Keystroke Dynamics Databases
122(8)
Piotr Panasiuk
Marcin Dabrowski
Khalid Saeed
Katarzyna Bochenska-Wlostowska
Influence of Eye Diseases on the Retina Pattern Recognition
130(11)
Emil Saeed
Anna Bartocha
Piotr Wachulec
Khalid Saeed
Pupil and Iris Detection Algorithm for Near-Infrared Capture Devices
141(10)
Adam Szczepanski
Krzysztof Misztal
Khalid Saeed
Data Analysis and Information Retrieval
Query Selectivity Estimation Based on Improved V-optimal Histogram by Introducing Information about Distribution of Boundaries of Range Query Conditions
151(14)
Dariusz Rafal Augustyn
Dynamic Centrality for Directed Co-author Network with Context
165(10)
Alisa Babskova
Jan Martinovic
Pavla Drazdilova
Katerina Slaninova
Towards a Conceptual Search for Vietnamese Legal Text
175(11)
Thinh D. Bui
Son T. Nguyen
Quoc B. Ho
A Vietnamese Question Answering System in Vietnam's Legal Documents
186(12)
Huu-Thanh Duong
Bao-Quoc Ho
An Inner-Enterprise Wiki System (IWkS) Integrated with an Expert Finding Mechanism for Lesson-Learned Knowledge Accumulation in Product Design
198(11)
Ywen Huang
Zhua Jiang
Xde Xiang
Cneng He
Jfeng Liu
Ying Huang
Movie Recommendation Using OLAP and Multidimensional Data Model
209(10)
Worapot Jakkhupan
Supasit Kajkamhaeng
Decision Trees and Their Families in Imbalanced Pattern Recognition: Recognition with and without Rejection
219(12)
Wladyslaw Homenda
Wojciech Lesinski
An Approach for Integrating Multidimensional Database into Context-Aware Recommender System
231(12)
Mai Nhat Vinh
Nguyen Nhat Duy
Ho Thi Hoang Vy
Le Nguyen Hoai Nam
Vietnamese Sentence Similarity Based on Concepts
243(11)
Hien T. Nguyen
Phuc H. Duong
Vinh T. Vo
Materialized View Construction Based on Clustering Technique
254(12)
Santanu Boy
Ranak Ghosh
Soumya Sen
Big Data Spectra Analysis Using Analytical Programming and Random Decision Forests
266(12)
Petr Saloun
Peter Drabik
Ivan Zelinka
Jaroslav Bucko
Man-Machine Interaction Improvement by Means of Automatic Human Personality Identification
278(12)
Ryszard Tadeusiewicz
Adrian Horzyk
Industrial Management and Other Applications
viaRODOS: Monitoring and Visualisation of Current Traffic Situation on Highways
290(11)
Dusan Fedorcak
Tomas Kocyan
Martin Hajek
Daniela Szturcova
Jan Martinovic
Computation of Swing-up Signal for Inverted Pendulum Using Dynamic Optimization
301(14)
Stepan Ozana
Martin Pies
Radovan Hajovsky
System and Application Scenarios for Disaster Management Processes, the Rainfall-Runoff Model Case Study
315(12)
Antoni Portero
Stepan Kuchar
Radim Vavrik
Martin Golasowski
Vit Vondrak
An Approach to Continuous Pervasive Care of Remote Patients Based on Priority Based Assignment of Nurse
327(12)
Paramita Sarkar
Ditipriya Sinha
Abbreviation Method for Some Jointed Relations in Displaying Genealogy
339(12)
Seiji Sugiyama
Daisuke Yokozawa
Atsushi Ikuta
Satoshi Hiratsuka
Susumu Saito
Miyuki Shibata
Tohru Matsuura
Proposing a Novel Architecture of Script Component to Incorporate the Scripting Language Support in SCADA Systems
351(12)
Muhammad Waseem Anwar
Farooque Azam
Modelling and Optimization
Agent-Based Context Management for Service-Oriented Environments
363(12)
Adrija Bhattacharya
Avirup Das
Sankhayan Choudhury
Nabendu Chaki
Event Based Approaches for Solving Multi-mode Resource Constraints Project Scheduling Problem
375(12)
Ripon Kumar Chakrabortty
Ruhul Amin Sarker
Daryl L. Essam
Non-cooperative Games Involving Type-2 Fuzzy Uncertainty: An Approach
387(10)
Juan Carlos Figueroa-Garcia
Emanuel Jonathan Medina-Pinzon
Jannan David Rubio-Espinosa
Joining Concept's Based Fuzzy Cognitive Map Model with Moving Window Technique for Time Series Modeling
397(12)
Wladyslaw Homenda
Agnieszka Jastrzebska
Witold Pedrycz
Time Series Modeling with Fuzzy Cognitive Maps: Simplification Strategies: The Case of a Posteriori Removal of Nodes and Weights
409(12)
Wladyslaw Homenda
Agnieszka Jastrzebska
Witold Pedrycz
An Effective Initialization for ASM-Based Methods
421(12)
Hong-Quan Hua
T. Hoang Ngan Le
Bac Le
A Multiple Refinement Approach in Abstraction Model Checking
433(12)
Phan T.H. Nguyen
Thang H. Bui
Chaos Driven Particle Swarm Optimization with Basic Particle Performance Evaluation --- An Initial Study
445(10)
Michal Pluhacek
Roman Senkerik
Ivan Zelinka
Chaos Powered Grammatical Evolution
455(10)
Ivan Zelinka
Petr Saloun
Roman Senkerik
Networking
Network Anomaly Detection Using Parameterized Entropy
465(14)
Przemyslaw Berezinski
Marcin Szpyrka
Bartosz Jasiul
Michal Mazur
Universal Central Control of Home Appliances as an Expanding Element of the Smart Home Concepts - Case Study on Low Cost Smart Solution
479(10)
Jan Dvorak
Ondrej Berger
Ondrej Krejcar
An Off-the-Shelf Platform for Automatic and Interactive Text Messaging Using Short Message Service
489(12)
Daniel Oliveira
Diana Oliveira
Nuno M. Garcia
Graca Esgalhado
Application of PIL Approach for Automated Transportation Center
501(13)
Stepan Ozana
Martin Pies
Radovan Hajovsky
Jiri Koziorek
Ondrej Horacek
A Model of a System for Stream Data Storage and Analysis Dedicated to Sensor Networks of Embankment Monitoring
514(12)
Anna Pieta
Michal Lupa
Monika Chuchro
Adam Piorkowski
Andrzej Lesniak
Analysis of Social Influence and Information Dissemination in Social Media: The Case of Twitter
526(9)
Chien-Wen Shen
Chin-Jin Kuo
Multi---criteria Route Planning in Bus Network
535(12)
Vo Dang Khoa
Tran Vu Pham
Huynh Tuong Nguyen
Tran Van Hoai
Pattern Recognition and Image Processing
Enhanced LBP-Based Face Recognition System Using a Heuristic Approach for Searching Weight Set
547(12)
Nhat-Quan Huynh Nguyen
Thai Hoang Le
A Local Gaussian Filter and Adaptive Morphology as Tools for Completing Partially Discontinuous Curves
559(12)
Przemyslaw Spurek
Alena Chaikouskaya
Jacek Tabor
Elzbieta Zajac
Subspaces Clustering Approach to Lossy Image Compression
571(9)
Przemyslaw Spurek
Marek Smieja
Krzysztof Misztal
An Impact of the User and Time Parameters to Sequence Alignment Methods for Process Mining
580(12)
Jakub Stolfa
Svatopluk Stolfa
Katerina Slaninova
Jan Martinovic
Vaclav Snasel
An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature
592(10)
Puchong Subpratatsavee
Promote Kuacharoen
Grasping Action for Impaired Vision Action Using HC2D Barcode Technology
602(13)
Puchong Subpratatsavee
Suchai Tanaiadehawoot
Various Aspects of Computer Security
Hardware Approach for Generating b-detectors by Immune-Based Algorithms
615(9)
Maciej Brzozowski
Andrzej Chmielewski
Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges
624(12)
Feng Xie
Yong Peng
Wei Zhao
Yang Gao
Xuefeng Han
Protection Profile for Secure Sensitive Information System on Mobile Devices
636(15)
Imed El Fray
Tomasz Hyla
Wlodzimierz Chocianowicz
Implicit and Explicit Certificates-Based Encryption Scheme
651(16)
Tomasz Hyla
Witold Mackow
Jerzy Pejas
Malware Behavior Modeling with Colored Petri Nets
667(13)
Bartosz Jasiul
Marcin Szpyrka
Joanna Sliwa
A Proposal of Algorithm for Web Applications Cyber Attack Detection
680(8)
Rafal Kozik
Michal Choras
Rafal Renk
Witold Holubowicz
Semantic Set Analysis for Malware Detection
688(13)
Nguyen Van Nhuong
Vo Thi Yen Nhi
Nguyen Tan Cam
Mai Xuan Phu
Cao Dang Tan
Author Index 701