By Topic

Computer Information Systems and Industrial Management Applications, 2007. CISIM '07. 6th International Conference on

28-30 June 2007

Filter Results

Displaying Results 1 - 25 of 74
  • 6th International Conference on Computer Information Systems and Industrial Management Applications-Title

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • 6th International Conference on Computer Information Systems and Industrial Management Applications-Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (43 KB)
    Freely Available from IEEE
  • 6th International Conference on Computer Information Systems and Industrial Management Applications - TOC

    Publication Year: 2007, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (50 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2007, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (27 KB) | HTML iconHTML
    Freely Available from IEEE
  • CISIM 2007 Steering Committee Chair's Message

    Publication Year: 2007, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (62 KB) | HTML iconHTML
    Freely Available from IEEE
  • CISIM 2007 Organization

    Publication Year: 2007, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • Plenary Abstracts

    Publication Year: 2007, Page(s): xv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (65 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Should Normal Distribution be Normal? The Student's T Alternative

    Publication Year: 2007, Page(s):3 - 8
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (353 KB) | HTML iconHTML

    In the paper we try to answer, whether the Gaussian distribution - called widely the 'normal' distribution - is really basic, natural and normal. In particular, we investigate how the above statement conforms with the distribution of real data, namely daily returns of some stock indexes. It was the authors former experience that, when looking at the distributions of real data, it was very difficul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Approach to the Computer Support of Strategic Decision Making in Enterprises by Means of a New Class of Understanding Based Management Support Systems

    Publication Year: 2007, Page(s):9 - 13
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Automatic understanding is a new term, which would hardly appear in bibliographies three or four years ago but nowadays it is being used by increasing numbers of researchers and discussed in a growing number of papers. Most of these papers take into account the automatic understanding of information in the traditional text form - sometimes on the basis of ideas such as Semantic Networks and Ontolo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GUI Patterns and Web Semantics

    Publication Year: 2007, Page(s):14 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB) | HTML iconHTML

    In this paper, we introduce a new approach to semantic analysis of Web pages. To prove this approach we designed method for analysis and evaluation of Web pages. The method is built on a silent agreement between Web designers and users. The key aspects of this agreement are Web patterns which are used by Web designers in their Web page implementations. With our method we can find out whether the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding a Needle in a Haystack: From Baldwin Effect to Quantum Computation

    Publication Year: 2007, Page(s):20 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    If we want to break someone else's PIN (personal identification number) of, say, an ATM (automated teller machine), how many trials would be necessary when we want to be efficient? This is a sort of what we call a-needle-in-a-hay-stack problem. In 1987, in their wonderful paper, Hinton & Nowlan proposed a genetic algorithm with a needle being a unique configuration of 20-bit binary stri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iris Image Recognition

    Publication Year: 2007, Page(s):26 - 30
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    The authentication of people using iris-based recognition is a widely developing technology. Iris recognition is feasible for use in differentiating between identical twins. Though the iris color and the overall statistical quality of the iris texture may be dependent on genetic factors, the textural details are independent and uncorrelated for genetically identical iris pairs. The feature extract... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward Higher Level Intelligent Systems

    Publication Year: 2007, Page(s):31 - 36
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (494 KB) | HTML iconHTML

    If much remains still to discover concerning animal brain's internal structure as well as concerning its learning and self-organization mechanisms,, a number of recent advances in "neurobiology" already highlight some of key mechanisms of this marvels machine. Among them one can emphasizes brain's "modular" structure and its "self-organizing" capabilities. The main goal of this paper is to show ho... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introduction of Humatronics--Towards Integration of Web Intelligence and Robotics

    Publication Year: 2007, Page(s):37 - 44
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (749 KB) | HTML iconHTML

    In recent years, various systems based on electronics, such as cars, computers and robots have been getting into our daily lives. Unfortunately, asymmetrical relationship exists between human and such systems, imposing burdens especially on elderly or handicapped persons. In order to solve various problems for balancing such asymmetrical relationship, humatronics is proposed. Main purpose of humat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Benchmark problems of Signal Processing and Control for Testing Emergent Architectures and Programming Techniques of DSP's, FASIC's, and PLD's

    Publication Year: 2007, Page(s):45 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    In this paper we present four carefully selected computationally intensive signal processing problems, which can serve as benchmark applications for efficiency testing of modern DSP's, FASIC's, and PLD's. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Location Prediction Methods with Markovian Approach and Extended Random Walk Model

    Publication Year: 2007, Page(s):53 - 58
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (381 KB) | HTML iconHTML

    Recent wireless networks offer more bandwidth than ever. High quality services are developed and provided by the operators, the number of users is constantly increasing. As the transferred data and the number of terminals are growing, the network providers have to face the increasing complexity of the network management and operation tasks. In this paper we observe one of the main problems that ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture of a Predictive Maintenance Framework

    Publication Year: 2007, Page(s):59 - 64
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (179 KB) | HTML iconHTML

    Predictive maintenance is a promising maintenance strategy. However, existing solutions are isolated from enterprise systems and limited to specific applications. A predictive maintenance framework that integrates the diversity of existing techniques for equipment failure predictions and that incorporates data both from machine level and the upper enterprise level is still missing. We envision the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Theoretical Framework of the Optimization of Public Transport Travel

    Publication Year: 2007, Page(s):65 - 70
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    With the increase of cars on the streets, more and more people in big cities, decide to move from one place to another by public transport, such as tram, metro or bus. Public transport users need detail informations about network connections. Therefore, some urban portals offer to use systems of optimization of public transport travel. However, finding one or several optimal routes, according to u... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimation of the Average Time of Computations of Probabilistic Algorithms with Continuous Time Parameter

    Publication Year: 2007, Page(s):71 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB) | HTML iconHTML

    In this paper computations of iterative probabilistic programs with continuous time parameter are investigated. The main goal is to propose a new method of determining the average time of probabilistic programs computations. Programs with continuous time parameter are considered as finite Markov processes. Therefore in the first method we use the popular solution based on Markov Process Theory. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UBMSS (Understanding Based Managing Support Systems) as an Example of the Application of Cognitive Analysis in Data Analysis

    Publication Year: 2007, Page(s):77 - 80
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB) | HTML iconHTML

    This paper discusses a general method of applying UBMSS (understanding based managing support systems) in data analysis. The method proposed is based on the analysis of economic data, especially data that is essential for a company's strategic decisions. The general method of applying UBMSS as sub-systems of a more general class of cognitive categorization systems is presented as a theoretical exa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interpretation of Probabilistic Algorithmic Logic in Nondeterministic Algorithmic Logic

    Publication Year: 2007, Page(s):81 - 86
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    In this paper probabilistic and nondeterministic programs are considered on the ground of logic of programs. The formal semantics of probabilistic and nondeterministic computations of a program are the starting point for the comparing properties of these programs. We are interested in dependencies, especially in similarities between nondeterministic and probabilistic interpretation of a program. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Toeplitz Matrices Minimal Eigenvalues in Moving Object Description

    Publication Year: 2007, Page(s):87 - 92
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (463 KB) | HTML iconHTML

    In this paper we apply Toeplitz matrices minimal eigenvalues approach to represent two-dimensional images. The problem of moving object identification is considered on an example and some theoretical results are derived. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some Criteria of Making Decisions in Pedestrian Evacuation Algorithms

    Publication Year: 2007, Page(s):93 - 96
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (106 KB) | HTML iconHTML

    The main goal of this paper is to introduce a model of intelligent behavior in pedestrian dynamics using cellular automata. Authors take into account classical situation of large room evacuation, where several exits are available. Presented model includes some criteria of making decisions by a particular pedestrian. Proposed criteria are: distance to all exits, density of crowd in each exit neighb... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Universally Composable Key-Evolving Signature

    Publication Year: 2007, Page(s):97 - 102
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    The standard digital signature scheme can be easily subject to key exposure problem In order to overcome this problem; a feasible and effective approach is employed by key-evolving signature scheme. In this paper, we study key-evolving signature within the UC framework and propose an appropriate ideal functionality that captures the basic security requirements of key-evolving signature. Then, we p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Histogram-Based Dimensionality Reduction of Term Vector Space

    Publication Year: 2007, Page(s):103 - 108
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (132 KB) | HTML iconHTML

    One of the most vital problems of free-text document processing is the curse of dimensionality. The paper presents a dimensionality reduction algorithm based on informed feature selection. Terms describing the document are based on histogram-like statistics which can be computed as well as incrementally updated at low complexity. The document representation can adapt to changing document collectio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.