2016 IEEE 11th International Symposium on Applied Computational Intelligence and Informatics (SACI)

12-14 May 2016

Filter Results

Displaying Results 1 - 25 of 98
  • Author's index

    Publication Year: 2016, Page(s): 11
    Request permission for commercial reuse | |PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2016, Page(s):3 - 4
    Request permission for commercial reuse | |PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • [Front cover]

    Publication Year: 2016, Page(s): 1
    Request permission for commercial reuse | |PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):5 - 9
    Request permission for commercial reuse | |PDF file iconPDF (184 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): 2
    Request permission for commercial reuse | |PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Gesture-based interaction in medical interfaces

    Publication Year: 2016, Page(s):519 - 523
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (446 KB) | HTML iconHTML

    The latest generation of medical visualizations systems that provide gesture based interaction usually rely on closed source software modules. This paper presents a novel approach since the interaction with the rendered 3D images is done via a Web browser. The entire system is based on open source software components and this way eliminates the requirement to have a specific operating system prein... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New mixed models of optimal saving

    Publication Year: 2016, Page(s):407 - 412
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (282 KB) | HTML iconHTML

    This paper studies mixed models of saving with three types of risks: labor income risk, interest rate risk, and background risk. Each risk can be probabilistically modeled by a random variable or possibilistically modeled by a fuzzy number. For each model a notion of precautionary saving is defined in order to measure the effect that various types of risk have on optimal saving. The main results e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Facial expression recognition system based on a face statistical model and Support Vector Machines

    Publication Year: 2016, Page(s):63 - 68
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (835 KB) | HTML iconHTML

    Facial expression recognition is an important research domain in developing human-machine relations. This paper proposes a facial expression recognition system. This system is built using Constrained Local Models to fit the shapes on a face image and on Support Vector Machines (SVMs) to detect the face expressions. Different SVM architectures and trainings have been used including applying outlier... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hierarchical control system for autonomous vehicles based on robotic formalism

    Publication Year: 2016, Page(s):69 - 74
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1693 KB) | HTML iconHTML

    In this paper a novel method is presented for hierarchical control of autonomous vehicles consisting of high-level (HLC) and low-level (LLC) control systems. The LLC system can be commanded to assure a prescribed velocity and steering profile using PID-type active suspension, velocity and steering control. The outputs of the LLC system are the generalized forces and moments required by the vehicle... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security sandbox based on RBAC model

    Publication Year: 2016, Page(s):75 - 80
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (623 KB) | HTML iconHTML

    The article presents a security solution of mapping RBAC model in to Linux kernel systems. RBAC management model represents an effective concept of mapping user organization structure to access control of computer systems objects. Definition of RBAC model roles allows declaring permitted operations with specified security policy. Based on the roles, system management model provides a comprehensive... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing knowledge transfer in Physics education by fitting supplemental materials to individual learners

    Publication Year: 2016, Page(s):81 - 84
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (414 KB) | HTML iconHTML

    It can hardly be predicted how a student's complex knowledge is being evolved during a course of Physics. Probably that's why such a lecture is usually divided into several parts, containing multiple tests and checkpoints. The effectiveness of the learning process might be evaluated by tests, experiments and problems. However, even if all of these distinct evaluation types seem to reflect a succes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application for UDS automated test generation

    Publication Year: 2016, Page(s):85 - 88
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (351 KB) | HTML iconHTML

    The presented application aims to ease the testing process performed over the diagnostic services on CAN. With the help of automated tests, diagnostic service requests can be generated and, through the feedback from the ECU, one can determine the correlation between customer requirements and the current implementation. Using this application, the necessary time can be reduced from three days to ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computation of electrical generator parameters using regression functions

    Publication Year: 2016, Page(s):89 - 92
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (793 KB) | HTML iconHTML

    The paper presents regression functions used for the computation of some electrical generator's parameter, such as efficiency, power or frequency. The considered regression functions can be applied for any type of electrical generator: permanent magnet synchronous (PMSG), squirrel cage asynchronous (IG) or double fed asynchronous (DFIG), etc. The methodology involves the usage of primary measured ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing railway interlocking systems with session types and Event-B

    Publication Year: 2016, Page(s):93 - 98
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (400 KB) | HTML iconHTML

    Choosing the Event-B formal method to model and develop distributed railway interlocking systems can give us a great advantage over the general purpose programming languages, especially in case of the safety analysis of these systems. Despite its many benefits, Event-B suffers from an efficient reuse mechanism, which is highly disadvantageous in the development of large interlocking systems. In th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy control of a two-wheeled mobile pendulum system

    Publication Year: 2016, Page(s):99 - 104
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (743 KB) | HTML iconHTML

    In this paper, the fuzzy control of a mechatronic system will be studied. The mechatronic system is a special mobile robot (called two-wheeled mobile pendulum) that has two contact points with the supporting surface and its center of mass is located under the wheel axis. Due to the mechanical structure, the inner body (which acts as a pendulum between the wheels) tends to oscillate during the tran... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blood glucose model for liver transplantation: Alteration of physiological parameters

    Publication Year: 2016, Page(s):105 - 110
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (448 KB) | HTML iconHTML

    During liver-transplantation (LT) a tight glycemic control protocol can improve the clinical outcomes. The ICING (Intensive-Control-Insulin-Nutrition-Glucose) model is validated for medical intensive care unit (MICU) application. Previous studies have showed that changes in the model parameters are necessary to use it in LT environments. This study analyses the optimal range of physiological param... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Physiological control systems for high-quality interdisciplinary researches

    Publication Year: 2016, Page(s):11 - 12
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (159 KB) | HTML iconHTML

    The aim of the Physiological Controls Group of Obuda University is to investigate pathophysiological systems and develop mathematical models in order to create automatic control algorithms or model-based treatment protocols enhancing personalized healthcare possibilities. The presentation deals with the given problem starting with a short introduction on the control of diabetes and then focuses on... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discrete time state feedback with setpoint control, actual state observer and load estimation for a tumor growth model

    Publication Year: 2016, Page(s):111 - 118
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (423 KB) | HTML iconHTML

    With the current scientific knowledge, there is no medical device which can handle continuous infusion cancer therapy. Hence, only a quasi continuous infusion therapy can be achieved using discrete drug administration (which can be sufficiently frequent). Therefore, a discrete time control has to be designed for a tumor growth model for real-life application. We designed state feedback control, au... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Kapteyn-Kummer series' integral form

    Publication Year: 2016, Page(s):119 - 122
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (361 KB) | HTML iconHTML

    In this short research note we obtain double definite integral expressions for the Kapteyn type series built by Kummer's M (or confluent hypergeometric 1F1) functions. These kind of series unify in natural way the similar fashion results for Neumann-, Schlömilch- and Kapteyn-Bessel series recently established by Pogány, Süli, Baricz and Jankov Mas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the robustness of a concept of dichotomy with different growth rates for linear discrete-time systems in Banach spaces

    Publication Year: 2016, Page(s):123 - 130
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (294 KB) | HTML iconHTML

    The paper studies the problem of robustness of a general dichotomy concept for linear discrete-time systems in Banach spaces. This concept contains particular cases of wellknown dichotomy concepts such as uniform and nonuniform exponential respectively polynomial dichotomy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generation of floating point 2D scaling operators for FPGA

    Publication Year: 2016, Page(s):131 - 136
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (255 KB) | HTML iconHTML

    This paper presents several architectures for an FPGA implementation of a matrix operator for geometric two dimensional scaling using floating point numbers. We have generated synthesizable VHDL implementations of the proposed architectures for several floating point precisions: half, simple and double. Besides the precision of the floating point operators, the parallelization degree of the intern... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sobolev interpolation inequalities on Hadamard manifolds

    Publication Year: 2016, Page(s):161 - 166
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (334 KB) | HTML iconHTML

    We prove Sobolev-type interpolation inequalities on Hadamard manifolds and their optimality whenever the Cartan-Hadamard conjecture holds (e.g., in dimensions 2, 3 and 4). The existence of extremals leads to unexpected rigidity phenomena. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On some concepts of exponential stability for skew-evolution semiflows in Banach spaces

    Publication Year: 2016, Page(s):167 - 172
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (283 KB) | HTML iconHTML

    The paper treats the concepts of strong exponential stability and exponential stability for the general case of skew-evolution semiflows. The main aim is to obtain necessary and sufficient criterias for this notions. Also, are emphasized the results for the concepts of exponential stability in sense of Barreira and Valls and some representative examples. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generalized exponential trichotomy for difference equations

    Publication Year: 2016, Page(s):173 - 176
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (243 KB) | HTML iconHTML

    In this note we address two trichotomy concepts for discrete-time linear time-varying systems. We extend the notion of exponential trichotomy in the sense of Elaydi-Janglajew to the so called notion of generalized exponential trichotomy. This approach is motivated by an example. Also, a characterization for generalized exponential trichotomy in terms of necessary and sufficient conditions is given... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Logical inference modeled by Petri nets

    Publication Year: 2016, Page(s):137 - 140
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (328 KB) | HTML iconHTML

    Decision-making is a fundamental step in a large variety of activities and the persons that are responsible for this should be able, in any circumstances, to find the right solutions. Some decisional systems have been developed in order to help humans, trying to provide intelligent behavior. Logical inference is one of the handiest mechanisms of artificial intelligence that is suitable for decisio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.