2017 IEEE 14th International Scientific Conference on Informatics

14-16 Nov. 2017

Filter Results

Displaying Results 1 - 25 of 85
  • [Front cover]

    Publication Year: 2017, Page(s): 1
    Request permission for reuse | PDF file iconPDF (14 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2017, Page(s): 1
    Request permission for reuse | PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2017, Page(s):iii - vi
    Request permission for reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2017, Page(s):vii - xi
    Request permission for reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • On some recent advancements within the pairwise comparison methodology

    Publication Year: 2017, Page(s):1 - 5
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    This paper is devoted to the inconsistency analysis within the pairwise-comparisons-based inference. We show that some conventional beliefs demonstrated in literature can be questioned. New important discoveries related to this issue were reported in recent literature. These new results indicate the necessity of the development of new methods for the inconsistency analysis. Here we also present so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to apply model-driven paradigm in information system (Re)engineering

    Publication Year: 2017, Page(s):6 - 11
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    Inability of traditional information system development approaches, methodologies and tools to cope with ever increasing complexity of contemporary information systems leads towards paradigm shift. Model-driven (MD) paradigm assumes orientation on models at all stages of system development. MD approach to information system and software engineering addresses complexity through abstraction. The app... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Augmented virtuality for the next generation production intelligence

    Publication Year: 2017, Page(s): 12
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (110 KB)

    Several compelling IT trends of the past few years show us how the next possible paradigm change in business intelligence could remodel everything in production informatics. Along the example of Virtual Reality and a community-based granulated software ecosystem, namely the Node.js world and its interference with the System of Systems and Internet of Anything concepts, the presentation will uncove... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deep learning powered automated tool for generating image based datasets

    Publication Year: 2017, Page(s):13 - 17
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    During the last decade, rapid growth of the social media usage and the Internet in general led to the drastic expansion of the publicly available data. This gives the great opportunity for research and analysis in many fields of machine learning and data science. Even though this data is open to use, often it is distributed over the various sources on the web and in order to be used in data scienc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Determination of the critical congestion point in urban traffic networks: A case study

    Publication Year: 2017, Page(s):18 - 23
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (581 KB) | HTML iconHTML

    At present, most of the attempts to quantify urban traffic flow have completely ignored its predominant social footprint, while literature concerning the appearance and forecasting of congestion points remains scarce. This paper presents a methodology for determining the critical point leading to congestion in urban traffic, based on analyzing the network topology and flow using an innovative mixt... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Manual techniques for evaluating domain usability

    Publication Year: 2017, Page(s):24 - 30
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (693 KB) | HTML iconHTML

    Domain usability is the aspect of a particular user interface that relates to its terminology, hierarchy of terms, feature descriptions or icons, language and consistency. However, domain usability is often neglected not only by software developers, but also by many researchers. To support the development of better, domain-usable user interfaces, the main contribution of this paper is the design o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Complex networks analysis of international import-export trade

    Publication Year: 2017, Page(s):31 - 34
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (532 KB) | HTML iconHTML

    International trade represent one of the main driving forces of the economy, while there are still some patterns regarding the major players in this field. Our research attempts to uncover the global import-export market by using techniques based on complex networks analysis on publicly available data. Based on our previous research and the data regarding economic cycles, we identify the links bet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Naive Bayes for statlog heart database with consideration of data specifics

    Publication Year: 2017, Page(s):35 - 39
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    Heart disease belongs to one of the main reasons for mortality nowadays and it is expected to become worse due to factors such as aging, diabetes and obesity. In addition, existing misdiagnosis of patients reporting heart related ailment worsens this situation even further. In the paper, a probability approach to recognition of heart disease is analyzed with the employment of Naive Bayes on Statlo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nearest neighbor method using non-nested generalized exemplars in breast cancer diagnosis

    Publication Year: 2017, Page(s):40 - 44
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    Every year there are several million people in the world who die from cancer while breast cancer is belonging to the most prevalent cancers diagnosed in women. In this paper, a nearest neighbor method which uses non-nested generalized exemplars is analyzed for diagnosis of breast cancer. The aim is to improve its accuracy so that the severity of a mammographic mass lesion is predicted more accurat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unsupervised method for detection of high severity distresses on asphalt pavements

    Publication Year: 2017, Page(s):45 - 50
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (749 KB) | HTML iconHTML

    Efficient detection of distresses on asphalt pavements has a great impact on safe driving, thus it has been very active research subject in recent years. High severity level distresses, such as potholes, are the most severe threat to safe driving, hence timely detecting and repairing potholes is crucial in ensuring safety and quality of driving. Existing methods often require sophisticated equipme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On a top down aspect mining approach for monitoring crosscutting concerns identification

    Publication Year: 2017, Page(s):51 - 56
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (87 KB) | HTML iconHTML

    Aspect Mining is a research domain that tries to identify crosscutting concerns implementation in software systems that were developed without using the aspect oriented paradigm. The goal is to refactor the implementation of these concerns in order to use aspects, and gain the benefits introduced by this paradigm. The aspect mining approaches proposed so far are all bottom-up approaches: starting ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Heuristic sampling for the subgraph isomorphism problem

    Publication Year: 2017, Page(s):57 - 62
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (125 KB) | HTML iconHTML

    Subgraph isomorphism is one of the fundamental search problems in computer science. In this article we consider the counting variation of this problem. The task is to count all instances of the pattern G occurring in a (usually larger) graph H. All algorithms for this problem use a variation of backtracking. Most commonly they assign one vertex of G to one vertex of H at each level of the search t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overview of the handwriting processing for clinical decision support system

    Publication Year: 2017, Page(s):63 - 67
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (65 KB) | HTML iconHTML

    A clinical decision support system (CDSS) is an information system used in healthcare, designed to help with the clinical decision. It supports medical diagnostics, treatment and prevention. CDSS systems exist in many forms and make use of the different types of data. In this paper, we focus on CDSS based on handwriting and provide the overview of current state-of-the-art in the handwriting proces... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation study of critically loaded arrays of pillars

    Publication Year: 2017, Page(s):68 - 73
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (730 KB) | HTML iconHTML

    A failure in an overloaded system is a complex engineering problem. Arrays of pillars belong to a group of modern nanodevices composed of a large number of identical parts that function as a unit. This is because the pillars are fixed on a flat support and interactions among them emerge due to the support's rigidity. When a growing load is applied to the pillars it induces a sequence of failures a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimating the time complexity of the algorithms by counting the Java bytecode instructions

    Publication Year: 2017, Page(s):74 - 79
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (204 KB) | HTML iconHTML

    Ranging the selected algorithms with the same theoretical time complexity boundaries can only be done by comparing the behavior of their implementations in the real environment. Timing the algorithms in practice is very difficult since it is hard to ensure a fair and reproducible environment in which implementations can be compared. In this paper we present a system called ALGator that was develop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The variability constraints in simulation of index-2 differential-algebraic processes

    Publication Year: 2017, Page(s):80 - 86
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (125 KB) | HTML iconHTML

    In the article a general simulation task of index-2 differential-algebraic equations (DAEs) is considered. To overcome difficulties connected with a nonlinear process dynamics, a new constraints type - the variability constraints - was introduced. The designed solution procedure is based on a multiple shooting method - it was assumed, that process dynamics in each shooting interval is constant. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining cybersecurity and cyber defense to achieve cyber resilience

    Publication Year: 2017, Page(s):87 - 93
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (120 KB) | HTML iconHTML

    Cybersecurity encompasses a broad range of practices, tools and concepts related closely to those of information and operational technology security. Cybersecurity is distinctive in its inclusion of the offensive use of information technology to attack adversaries. Use of the term “cybersecurity” as a key challenge and a synonym for information security or IT security confuses customers and securi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WLAN heat mapping in hybrid network

    Publication Year: 2017, Page(s):94 - 97
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (618 KB) | HTML iconHTML

    Wireless Local Area Network (WLAN) have become popular because of mobility and easy installation. Nowadays, WLAN access points (APs) are everywhere. For proper operation of own hybrid network, it may be necessary to know the APs locations. The visualization can help to get the best coverage or the best conditions of the network. In addition, the measurements help to create an AP inventory or ident... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prediction of electricity consumption using biologically inspired algorithms

    Publication Year: 2017, Page(s):98 - 103
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (551 KB) | HTML iconHTML

    Prediction of electricity consumption has become a very investigated field of research recently. By lowering prediction error, we can minimize costs of suppliers. The classical approach using one prediction model has been proved insufficient. The problem is that none of the currently existing prediction models is sufficiently robust to estimate the forecast of time series accurately. One of the so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Superimposed multidimensional schemas for RDF data analysis

    Publication Year: 2017, Page(s):104 - 110
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (380 KB) | HTML iconHTML

    Traditional data analysis employs online analytical processing (OLAP) systems operating on multidimensional (MD) data. The Resource Description Framework (RDF) serves as the foundation for the publication of a growing amount of semantic web data still largely untapped by data analysis. RDF data, however, do not typically follow an MD structure and, therefore, elude traditional OLAP. We propose an ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Creation of interactive panoramic video for phobia treatment

    Publication Year: 2017, Page(s):111 - 116
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    This paper presents the possibilities ofdesigning new environments for virtual reality exposure therapy (VRET), effective for treating phobias. Virtual reality (VR) tools can help immerse the patient into a stressful environment and induce phobia. If this environment is sufficiently realistic and the patient can freely rotate and move in this environment at the same time, deception of senses occur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.