Table of Contents
|
Computer Information Systems and Industrial Management Khalid Saeed, Władysław Homenda, Rituparna Chaki |
Front Matter |
Algorithms
|
Pattern Classification with Rejection Using Cellular Automata-Based Filtering Agnieszka Jastrzebska, Rafael Toro Sluzhenko |
3-14 |
Distributed NVRAM Cache – Optimization and Evaluation with Power of Adjacency Matrix Artur Malinowski, Paweł Czarnul |
15-26 |
Optimal Controlled Random Tests Ireneusz Mrozek, Vyacheslav Yarmolik |
27-38 |
Tabu Search and Greedy Algorithm Adaptation to Logistic Task Kamil Musiał, Joanna Kotowska, Dagmara Górnicka, Anna Burduk |
39-49 |
Evolutionary Algorithm for the Time-Dependent Orienteering Problem Krzysztof Ostrowski |
50-62 |
Optimalization of Parallel GNG by Neurons Assigned to Processes Lukáš Vojáček, Pavla Dráždilová, Jiří Dvorský |
63-72 |
Biometrics and Pattern Recognition Applications
|
SVM Kernel Configuration and Optimization for the Handwritten Digit Recognition Monika Drewnik, Zbigniew Pasternak-Winiarski |
87-98 |
Object Classification Using Sequences of Zernike Moments Aneta Górniak, Ewa Skubalska-Rafajłowicz |
99-109 |
New Year’s Day Speeches of Czech Presidents: Phonetic Analysis and Text Analysis Milan Jičínský, Jaroslav Marek |
110-121 |
Classifier Selection for Motor Imagery Brain Computer Interface Izabela Rejer, Robert Burduk |
122-130 |
A Multimodal Face and Fingerprint Recognition Biometrics System Maciej Szymkowski, Khalid Saeed |
131-140 |
Keystroke Dynamics and Finger Knuckle Imaging Fusion for Continuous User Verification Tomasz Wesołowski, Rafal Doroz, Krzysztof Wrobel, Hossein Safaverdi |
141-152 |
Data Analysis and Information Retrieval
|
Gesture Recognition in 3D Space Using Dimensionally Reduced Set of Features Łukasz Gadomer, Marcin Skoczylas |
167-179 |
Using Cluster–Context Fuzzy Decision Trees in Fuzzy Random Forest Łukasz Gadomer, Zenon Sosnowski |
180-192 |
Split-and-merge Tweak in Cross Entropy Clustering Krzysztof Hajto, Konrad Kamieniecki, Krzysztof Misztal, Przemysław Spurek |
193-204 |
Algorithms for Automatic Selection of Allophones to the Acoustic Units Database Janusz Rafałko |
218-226 |
Engineering of Enterprise Software Products
|
Blockchain Transaction Analysis Using Dominant Sets Malik Awan, Agostino Cortesi |
229-239 |
Ontology Driven Conceptualization of Context-Dependent Data Streams and Streaming Databases Shreya Banerjee, Anirban Sarkar |
240-252 |
Towards the Exploitation of Statistical Language Models for Sentiment Analysis of Twitter Posts Sukriti Bhattacharya, Prasun Banerjee |
253-263 |
POMSec: Pseudo-Opportunistic, Multipath Secured Routing Protocol for Communications in Smart Grid Manali Chakraborty, Novarun Deb, Nabendu Chaki |
264-276 |
Localization based Anti-Void Clustering Approach (LAVCA) for Energy Efficient Routing in Wireless Sensor Network Ayan Das, Rituparna Chaki |
290-302 |
Expressing and Applying C++ Code Transformations for the HDF5 API Through a DSL Martin Golasowski, João Bispo, Jan Martinovič, Kateřina Slaninová, João Cardoso |
303-314 |
Clustering of Mobile Subscriber’s Location Statistics for Travel Demand Zones Diversity Marcin Luckner, Aneta Rosłan, Izabela Krzemińska, Jarosław Legierski, Robert Kunicki |
315-326 |
Share Market Sectoral Indices Movement Forecast with Lagged Correlation and Association Rule Mining Giridhar Maji, Soumya Sen, Amitrajit Sarkar |
327-340 |
Task Allocation Strategies for FPGA Based Heterogeneous System on Chip Atanu Majumder, Sangeet Saha, Amlan Chakrabarti |
341-353 |
Productivity Oriented Cooperative Approach to Scheduling IT Project Tasks Tadeusz Nowicki, Robert Waszkowski |
354-365 |
Sequential Purchase Recommendation System for E-Commerce Sites Shivani Saini, Sunil Saumya, Jyoti Singh |
366-375 |
Industrial Management and Other Applications
|
Risk Assessment in a Parallel Production System with the Use of FMEA Method and Linguistic Variables Anna Burduk, Damian Krenczyk |
379-390 |
The Multi Depot One-to-One Pickup and Delivery Problem with Distance Constraints: Real World Application and Heuristic Solution Approach Olfa Chebbi, Ezzeddine Fatnassi |
391-401 |
Detection of ‘Orange Skin’ Type Surface Defects in Furniture Elements with the Use of Textural Features Michał Kruk, Bartosz Świderski, Katarzyna Śmietańska, Jarosław Kurek, Leszek Chmielewski, Jarosław Górski, Arkadiusz Orłowski |
402-411 |
Service Strategies in Two-Server Tandem Configurations – Modeling and Investigation Walenty Oniszczuk |
423-435 |
Image-Driven Decision Making with Application to Control Gas Burners Ewaryst Rafajłowicz, Wojciech Rafajłowicz |
436-446 |
Modelling and Optimization
|
Rough Sets in Imbalanced Data Problem: Improving Re–sampling Process Katarzyna Borowska, Jarosław Stepaniuk |
459-469 |
A Model of Machine Learning Based Interactive E-business Website Germanas Budnikas |
470-480 |
Towards Golden Rule of Capital Accumulation: A Genetic Algorithm Approach Sankhadeep Chatterjee, Rhitaban Nag, Soumya Sen, Amitrajit Sarkar |
481-491 |
A Multi-agent System Model for the Personal Rapid Transit System Ezzeddine Fatnassi, Hadhami Kaabi |
492-501 |
Fractional-Order Linear Systems Modeling in Time and Frequency Domains Wiktor Jakowluk |
502-513 |
Synthesis Method of Finite State Machines Based on State Minimization for Low Power Design Adam Klimowicz |
526-535 |
Self-organizing Traffic Signal Control with Prioritization Strategy Aided by Vehicular Sensor Network Marcin Lewandowski, Bartłomiej Płaczek, Marcin Bernas |
536-547 |
Infinite Impulse Response Approximations to the Non-integer Order Integrator Using Cuckoo Search Algorithm Shibendu Mahata, Suman Saha, Rajib Kar, Durbadal Mandal |
548-556 |
Designing Moore FSM with Transformation of State Codes Kamil Mielcarek, Alexander Barkalov, Larisa Titarenko |
557-568 |
Efficient Simulation of Interacting Particle Systems in Continuous Space and Time Tomasz Ożański |
569-579 |
Sampling Method for the Flow Shop with Uncertain Parameters Paweł Rajba, Mieczysław Wodecki |
580-591 |
State Assignment of Finite-State Machines by Using the Values of Input Variables Valery Salauyou, Michal Ostapczuk |
592-603 |
Nonnegative Matrix Factorization Based Decomposition for Time Series Modelling Tatjana Sidekerskienė, Marcin Woźniak, Robertas Damaševičius |
604-613 |
Various Aspects of Computer Security
|
Evil-AP - Mobile Man-in-the-Middle Threat Kamil Breński, Maciej Chołuj, Marcin Luckner |
617-627 |
Intention to Adopt the Cash on Delivery (COD) Payment Model for E-commerce Transactions: An Empirical Study Mohanad Halaweh |
628-637 |
A Signature Scheme Based on Implicit and Explicit Certificates Against k-Traitors Collusion Attack Tomasz Hyla, Jerzy Pejaś |
638-651 |
Netflow-Based Malware Detection and Data Visualisation System Rafał Kozik, Robert Młodzikowski, Michał Choraś |
652-660 |
Application of XGBoost Algorithm in Fingerprinting Localisation Task Marcin Luckner, Bartosz Topolski, Magdalena Mazurek |
661-671 |
Developing Countermeasures against Cloning of Identity Tokens in Legacy Systems Pavel Moravec, Michal Krumnikl |
672-684 |
Analysis of Specific Personal Information Protection Assessment in the Social Security and Tax Number System of Local Governments in Japan Sanggyu Shin, Yoichi Seto, Mayumi Sasaki, Kei Sakamoto |
685-696 |
The Implementation of Electronic Document in Transaction Execution Gerard Wawrzyniak, Imed El Fray |
697-708 |