{"title":"Creditworthiness decision-making system based on self-organising maps","authors":"J. Bozsik, Maksay Dorottya, I. Zsolt","doi":"10.1109/SISY.2012.6339509","DOIUrl":"https://doi.org/10.1109/SISY.2012.6339509","url":null,"abstract":"Credit rating evaluates the creditworthiness of a company. The evaluation traditionally relies on algorithms and sophisticated programs requiring the analysis of a large amount of data. The aim of this article is to demonstrate a new method of financial classification, which uses artificial intelligence. This method is based on the analysis of data using a neural network to get accurate and reliable results. In addition to presenting the theoretical algorithm, this article details the phases of evaluation process and solutions to problems that emerged during program's development.","PeriodicalId":207630,"journal":{"name":"2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116895564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling context for access control systems","authors":"G. Sladić, B. Milosavljević, Z. Konjovic","doi":"10.1109/SISY.2012.6339572","DOIUrl":"https://doi.org/10.1109/SISY.2012.6339572","url":null,"abstract":"Access control is one of key aspects of computer security. Current access control models do not take into account the context of the system and its environment. In this paper, we present a particular context model for the access control system primarily-intended for business processes access control. By using a context-sensitive access control, it is possible to define more sophisticated access control policies that cannot be implemented by existing access control models. The proposed context is modeled using Web Ontology Language (OWL) in order to provide: formal representation of context, rich representation of different contextual information, semantic interoperability between different context-aware systems and high degree of inference making.","PeriodicalId":207630,"journal":{"name":"2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122812263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Bijedić, Indira Hamulic, Z. Vukobrat-Bijedic, A. Husic-Selimovic
{"title":"Bayesian network model of HCV therapy response prediction in FBiH","authors":"N. Bijedić, Indira Hamulic, Z. Vukobrat-Bijedic, A. Husic-Selimovic","doi":"10.1109/SISY.2012.6339487","DOIUrl":"https://doi.org/10.1109/SISY.2012.6339487","url":null,"abstract":"This research is aiming to set higher standards in healthcare research in Bosnia and Herzegovina from the aspect of mathematical and information science methodology. The data on Hepatitis C virus treatment published in previous work was reinvestigated using the Bayesian network methodology. The results are still in the line with the results published worldwide, but this research provides an additional quality, through the conditional probabilities for treatment outcome. Further development of this model may result in an acceptable prediction model for HCV treatment outcome.","PeriodicalId":207630,"journal":{"name":"2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114250338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blended learning in adult education in the","authors":"F. Hegyesi","doi":"10.1109/SISY.2012.6339563","DOIUrl":"https://doi.org/10.1109/SISY.2012.6339563","url":null,"abstract":"Taking into consideration the changes in higher education teaching, is paramount that the teachers receive the most up to date training. Lately, the increasing number of students is parallel with the difference in age of our students, which accentuates the need for lifelong learning. Training mature students has shown a need for different approaches in teaching, in comparison to traditional teaching. Besides the lectures during the day, a bigger role is played by distance learning and e-learning. The teachers pedagogical knowledge and motivation, in any teaching institution is the most important.","PeriodicalId":207630,"journal":{"name":"2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129683786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Debeljkovic, Ivan Buzurovic, G. Simeunovic, M. Misic
{"title":"Asymptotic practical stability of time delay systems","authors":"D. Debeljkovic, Ivan Buzurovic, G. Simeunovic, M. Misic","doi":"10.1109/SISY.2012.6339548","DOIUrl":"https://doi.org/10.1109/SISY.2012.6339548","url":null,"abstract":"This paper provides sufficient conditions for the asymptotic practical and finite time stability of linear continuous time delay systems mathematically described as x'(t)= A0x(t) - A1x(t - τ). The Lyapunov-Krassovski functionals were used to establish the novel delay independent conditions. These conditions were applied in the system stability analysis. Consequently, the functionals do not have to be positive in the whole state space, and they do not need to have negative derivatives along the system trajectories. Practical stability was analyzed using the derived novel conditions. The described approach was combined with the classical Lyapunov technique to guarantee the attractive practical stability of the system.","PeriodicalId":207630,"journal":{"name":"2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129072979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of event driven software gates for combinational logic networks","authors":"J. Kopják, J. Kovacs","doi":"10.1109/SISY.2012.6339533","DOIUrl":"https://doi.org/10.1109/SISY.2012.6339533","url":null,"abstract":"The paper presents one implementation possibility of event driven software model of distributed or classical combination logic networks. The paper first reviews the basics of event-driven systems. Greater part of article presents the mathematical basics and architecture of event-driven combinational logic and example software implementation of the model. The paper shows the software implementation of AND and OR gate. After the introduction of basic gates of combinational logic the paper introduces the concept of the universal event-driven gate. The paper ends with software implementation of symmetrical event-driven XOR gate to create odd and even functions.","PeriodicalId":207630,"journal":{"name":"2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124200052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"KVM & OpenVZ virtualization based IaaS open source cloud virtualization platforms: OpenNode, Proxmox VE","authors":"A. Kovari, P. Dukan","doi":"10.1109/SISY.2012.6339540","DOIUrl":"https://doi.org/10.1109/SISY.2012.6339540","url":null,"abstract":"The evolution of cloud computing over the past few years is one of the major advances in the history of computing. OpenNode Virtualization Platform is an open source CentOS based server virtualization and management solution, and Proxmox VE is a tweaked Debian distribution with a custom optimized kernel. The two platforms are highly identical, but they are based on distinct Linux distributions, and there are minor differences. In this paper these two open-source IaaS systems are analyzed as KVM & OpenVZ based virtualization solutions.","PeriodicalId":207630,"journal":{"name":"2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114629899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authenticating vehicles and drivers in motion based on computer vision and RFID tags","authors":"A. Makarov, M. Spanovic, Vojislav Lukic","doi":"10.1109/SISY.2012.6339556","DOIUrl":"https://doi.org/10.1109/SISY.2012.6339556","url":null,"abstract":"A system consisting of a vehicle interior-mounted device and a supporting infrastructure is designed to allow authorized drivers and authorized vehicles to access restricted areas of the airports, as well as government, office and private parking facilities. The device authenticates to the infrastructure using its own digital certificate, while the driver authenticates through the digital certificate stored on his or her smart card inserted into the device. The system can be configured to work with and without additional biometric verification of the driver.","PeriodicalId":207630,"journal":{"name":"2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124350656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tamara Ceranic, T. Lončar-Turukalo, László Négyessy, E. Procyk, D. Bajić
{"title":"Multifractal detrended fluctuation analysis and local scale exponents of inter spike intervals","authors":"Tamara Ceranic, T. Lončar-Turukalo, László Négyessy, E. Procyk, D. Bajić","doi":"10.1109/SISY.2012.6339577","DOIUrl":"https://doi.org/10.1109/SISY.2012.6339577","url":null,"abstract":"The study presents the analysis of detrended fluctuations (DFA) in inter spike intervals (ISI) of neuronal ensemble from cortex of awake behaving macaque monkeys. The original DFA method was applied to analyze fluctuation of variances from fitted trends of different order. The spectrum of local scale exponent was calculated to investigate the presence of different scaling regions. It was observed that the single scaling exponent is insufficient to describe the firing pattern dynamics, the better fit is achieved using both short-term a1 and long-term α2 scaling coefficients. The validation procedure using phase randomized surrogates provided more reliable local scale exponents' estimates. Generalized DFA analysis revealed the presence of multifractality in ISI time series. Results indicate that multifractality is partly due to the broad probability distribution function and partly due to the presence of long-range correlations. Isodistributional surrogate data were used to test the significance of generalized Hurst exponent spectrum and origin of multifractal behavior. In conclusion, both DFA and its multifractal expansion reveal the presence of long-range correlation in ISI time series indicating the presence of memory in the neuronal firing pattern.","PeriodicalId":207630,"journal":{"name":"2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130449631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The EM field register of the SEMONT Broadband monitoring network","authors":"N. Djuric, Nikola Kavecan, D. Kljajić","doi":"10.1109/SISY.2012.6339550","DOIUrl":"https://doi.org/10.1109/SISY.2012.6339550","url":null,"abstract":"The remote electromagnetic field monitoring systems rapidly develops in recent years. Thanks to the modern wireless sensor network technology such systems are able to perform monitoring over wide area and moreover to present the measurement results over public Internet network. Raising number of the electromagnetic field sources increases interest of the general population about potentially harmful effects of the long-term exposure to the electromagnetic radiation. Therefore, those monitoring systems become valuable tools in the area of the radiation protection. This paper considers the work in progress of development of the Serbian electromagnetic field monitoring network-SEMONT and its Internet portal as foundation for the so called electromagnetic field register. Information network SEMONT is a unique project at national level and develops within the program of technological development of the Republic of Serbia, for the period of 2011-2014 year.","PeriodicalId":207630,"journal":{"name":"2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132827850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}