2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics最新文献

筛选
英文 中文
Creditworthiness decision-making system based on self-organising maps 基于自组织地图的信用决策系统
J. Bozsik, Maksay Dorottya, I. Zsolt
{"title":"Creditworthiness decision-making system based on self-organising maps","authors":"J. Bozsik, Maksay Dorottya, I. Zsolt","doi":"10.1109/SISY.2012.6339509","DOIUrl":"https://doi.org/10.1109/SISY.2012.6339509","url":null,"abstract":"Credit rating evaluates the creditworthiness of a company. The evaluation traditionally relies on algorithms and sophisticated programs requiring the analysis of a large amount of data. The aim of this article is to demonstrate a new method of financial classification, which uses artificial intelligence. This method is based on the analysis of data using a neural network to get accurate and reliable results. In addition to presenting the theoretical algorithm, this article details the phases of evaluation process and solutions to problems that emerged during program's development.","PeriodicalId":207630,"journal":{"name":"2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116895564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling context for access control systems 为访问控制系统建模上下文
G. Sladić, B. Milosavljević, Z. Konjovic
{"title":"Modeling context for access control systems","authors":"G. Sladić, B. Milosavljević, Z. Konjovic","doi":"10.1109/SISY.2012.6339572","DOIUrl":"https://doi.org/10.1109/SISY.2012.6339572","url":null,"abstract":"Access control is one of key aspects of computer security. Current access control models do not take into account the context of the system and its environment. In this paper, we present a particular context model for the access control system primarily-intended for business processes access control. By using a context-sensitive access control, it is possible to define more sophisticated access control policies that cannot be implemented by existing access control models. The proposed context is modeled using Web Ontology Language (OWL) in order to provide: formal representation of context, rich representation of different contextual information, semantic interoperability between different context-aware systems and high degree of inference making.","PeriodicalId":207630,"journal":{"name":"2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122812263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Bayesian network model of HCV therapy response prediction in FBiH FBiH HCV治疗反应预测的贝叶斯网络模型
N. Bijedić, Indira Hamulic, Z. Vukobrat-Bijedic, A. Husic-Selimovic
{"title":"Bayesian network model of HCV therapy response prediction in FBiH","authors":"N. Bijedić, Indira Hamulic, Z. Vukobrat-Bijedic, A. Husic-Selimovic","doi":"10.1109/SISY.2012.6339487","DOIUrl":"https://doi.org/10.1109/SISY.2012.6339487","url":null,"abstract":"This research is aiming to set higher standards in healthcare research in Bosnia and Herzegovina from the aspect of mathematical and information science methodology. The data on Hepatitis C virus treatment published in previous work was reinvestigated using the Bayesian network methodology. The results are still in the line with the results published worldwide, but this research provides an additional quality, through the conditional probabilities for treatment outcome. Further development of this model may result in an acceptable prediction model for HCV treatment outcome.","PeriodicalId":207630,"journal":{"name":"2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114250338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blended learning in adult education in the 混合式学习在成人教育中的应用
F. Hegyesi
{"title":"Blended learning in adult education in the","authors":"F. Hegyesi","doi":"10.1109/SISY.2012.6339563","DOIUrl":"https://doi.org/10.1109/SISY.2012.6339563","url":null,"abstract":"Taking into consideration the changes in higher education teaching, is paramount that the teachers receive the most up to date training. Lately, the increasing number of students is parallel with the difference in age of our students, which accentuates the need for lifelong learning. Training mature students has shown a need for different approaches in teaching, in comparison to traditional teaching. Besides the lectures during the day, a bigger role is played by distance learning and e-learning. The teachers pedagogical knowledge and motivation, in any teaching institution is the most important.","PeriodicalId":207630,"journal":{"name":"2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129683786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Asymptotic practical stability of time delay systems 时滞系统的渐近实用稳定性
D. Debeljkovic, Ivan Buzurovic, G. Simeunovic, M. Misic
{"title":"Asymptotic practical stability of time delay systems","authors":"D. Debeljkovic, Ivan Buzurovic, G. Simeunovic, M. Misic","doi":"10.1109/SISY.2012.6339548","DOIUrl":"https://doi.org/10.1109/SISY.2012.6339548","url":null,"abstract":"This paper provides sufficient conditions for the asymptotic practical and finite time stability of linear continuous time delay systems mathematically described as x'(t)= A0x(t) - A1x(t - τ). The Lyapunov-Krassovski functionals were used to establish the novel delay independent conditions. These conditions were applied in the system stability analysis. Consequently, the functionals do not have to be positive in the whole state space, and they do not need to have negative derivatives along the system trajectories. Practical stability was analyzed using the derived novel conditions. The described approach was combined with the classical Lyapunov technique to guarantee the attractive practical stability of the system.","PeriodicalId":207630,"journal":{"name":"2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129072979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implementation of event driven software gates for combinational logic networks 组合逻辑网络中事件驱动软件门的实现
J. Kopják, J. Kovacs
{"title":"Implementation of event driven software gates for combinational logic networks","authors":"J. Kopják, J. Kovacs","doi":"10.1109/SISY.2012.6339533","DOIUrl":"https://doi.org/10.1109/SISY.2012.6339533","url":null,"abstract":"The paper presents one implementation possibility of event driven software model of distributed or classical combination logic networks. The paper first reviews the basics of event-driven systems. Greater part of article presents the mathematical basics and architecture of event-driven combinational logic and example software implementation of the model. The paper shows the software implementation of AND and OR gate. After the introduction of basic gates of combinational logic the paper introduces the concept of the universal event-driven gate. The paper ends with software implementation of symmetrical event-driven XOR gate to create odd and even functions.","PeriodicalId":207630,"journal":{"name":"2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124200052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
KVM & OpenVZ virtualization based IaaS open source cloud virtualization platforms: OpenNode, Proxmox VE 基于KVM和OpenVZ虚拟化的IaaS开源云虚拟化平台:OpenNode、Proxmox VE
A. Kovari, P. Dukan
{"title":"KVM & OpenVZ virtualization based IaaS open source cloud virtualization platforms: OpenNode, Proxmox VE","authors":"A. Kovari, P. Dukan","doi":"10.1109/SISY.2012.6339540","DOIUrl":"https://doi.org/10.1109/SISY.2012.6339540","url":null,"abstract":"The evolution of cloud computing over the past few years is one of the major advances in the history of computing. OpenNode Virtualization Platform is an open source CentOS based server virtualization and management solution, and Proxmox VE is a tweaked Debian distribution with a custom optimized kernel. The two platforms are highly identical, but they are based on distinct Linux distributions, and there are minor differences. In this paper these two open-source IaaS systems are analyzed as KVM & OpenVZ based virtualization solutions.","PeriodicalId":207630,"journal":{"name":"2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114629899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Authenticating vehicles and drivers in motion based on computer vision and RFID tags 基于计算机视觉和RFID标签对车辆和驾驶员进行身份验证
A. Makarov, M. Spanovic, Vojislav Lukic
{"title":"Authenticating vehicles and drivers in motion based on computer vision and RFID tags","authors":"A. Makarov, M. Spanovic, Vojislav Lukic","doi":"10.1109/SISY.2012.6339556","DOIUrl":"https://doi.org/10.1109/SISY.2012.6339556","url":null,"abstract":"A system consisting of a vehicle interior-mounted device and a supporting infrastructure is designed to allow authorized drivers and authorized vehicles to access restricted areas of the airports, as well as government, office and private parking facilities. The device authenticates to the infrastructure using its own digital certificate, while the driver authenticates through the digital certificate stored on his or her smart card inserted into the device. The system can be configured to work with and without additional biometric verification of the driver.","PeriodicalId":207630,"journal":{"name":"2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124350656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Multifractal detrended fluctuation analysis and local scale exponents of inter spike intervals 峰间间隔的多重分形趋势波动分析及局部尺度指数
Tamara Ceranic, T. Lončar-Turukalo, László Négyessy, E. Procyk, D. Bajić
{"title":"Multifractal detrended fluctuation analysis and local scale exponents of inter spike intervals","authors":"Tamara Ceranic, T. Lončar-Turukalo, László Négyessy, E. Procyk, D. Bajić","doi":"10.1109/SISY.2012.6339577","DOIUrl":"https://doi.org/10.1109/SISY.2012.6339577","url":null,"abstract":"The study presents the analysis of detrended fluctuations (DFA) in inter spike intervals (ISI) of neuronal ensemble from cortex of awake behaving macaque monkeys. The original DFA method was applied to analyze fluctuation of variances from fitted trends of different order. The spectrum of local scale exponent was calculated to investigate the presence of different scaling regions. It was observed that the single scaling exponent is insufficient to describe the firing pattern dynamics, the better fit is achieved using both short-term a1 and long-term α2 scaling coefficients. The validation procedure using phase randomized surrogates provided more reliable local scale exponents' estimates. Generalized DFA analysis revealed the presence of multifractality in ISI time series. Results indicate that multifractality is partly due to the broad probability distribution function and partly due to the presence of long-range correlations. Isodistributional surrogate data were used to test the significance of generalized Hurst exponent spectrum and origin of multifractal behavior. In conclusion, both DFA and its multifractal expansion reveal the presence of long-range correlation in ISI time series indicating the presence of memory in the neuronal firing pattern.","PeriodicalId":207630,"journal":{"name":"2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130449631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The EM field register of the SEMONT Broadband monitoring network SEMONT宽带监控网络的电磁场寄存器
N. Djuric, Nikola Kavecan, D. Kljajić
{"title":"The EM field register of the SEMONT Broadband monitoring network","authors":"N. Djuric, Nikola Kavecan, D. Kljajić","doi":"10.1109/SISY.2012.6339550","DOIUrl":"https://doi.org/10.1109/SISY.2012.6339550","url":null,"abstract":"The remote electromagnetic field monitoring systems rapidly develops in recent years. Thanks to the modern wireless sensor network technology such systems are able to perform monitoring over wide area and moreover to present the measurement results over public Internet network. Raising number of the electromagnetic field sources increases interest of the general population about potentially harmful effects of the long-term exposure to the electromagnetic radiation. Therefore, those monitoring systems become valuable tools in the area of the radiation protection. This paper considers the work in progress of development of the Serbian electromagnetic field monitoring network-SEMONT and its Internet portal as foundation for the so called electromagnetic field register. Information network SEMONT is a unique project at national level and develops within the program of technological development of the Republic of Serbia, for the period of 2011-2014 year.","PeriodicalId":207630,"journal":{"name":"2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132827850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信