default search action
17th SISY 2019: Subotica, Serbia
- 17th IEEE International Symposium on Intelligent Systems and Informatics, SISY 2019, Subotica, Serbia, September 12-14, 2019. IEEE 2019, ISBN 978-1-7281-2143-7
- Ljiljana Trajkovic:
Complex Networks : Plenary Talk. 11-12 - Katalin M. Hangos, Anna Ibolya Pózna:
Structural Decomposition and its Use in Qualitative Model-based Diagnosis of Complex Systems : Plenary Talk. 13-14 - C. L. Philip Chen:
Unmanned Systems Planning and Control based on Bionic Swarm Movement : Plenary Talk. 15-16 - Radu-Emil Precup:
Evolving Fuzzy Models of Mechatronics Applications : Plenary Talk. 17-18 - Póth Miklós, Zeljen Trpovski:
Influence of block size on JPEG compression performance. 19-22 - László Kajdocsi, András Dörömbözi, János Kovács:
Development of Bluetooth Mesh Core Stack using OmNET++. 23-28 - Anton Baláz, Michal Hulic, Marek Kurilec, Martin Stancel:
Classification of Security for System Vulnerabilities. 29-34 - Dávid Papp, Gábor Szücs, Zsolt Knoll:
Difference based query strategies in active learning. 35-40 - Adil Joldic, Elmir Babovic, Nina Bijedic, Alin Bejenaru-Vrabie:
Laboratory Environment for Algorithms Testing in Mobile Robotics. 41-46 - Zoltán Gyenes, Emese Gincsainé Szádeczky-Kardoss:
A novel concept of lane-keeping algorithms for mobile robots. 47-52 - Judith Jakob, József Tick:
Towards a Transfer Concept from Camera-Based Driver Assistance to the Assistance of Visually Impaired Pedestrians. 53-60 - Huanze Zeng, Argon Chen:
Classification Tree with Hybrid Splitting Mechanism. 61-66 - Radmila Gerov, Zoran Jovanovic:
Closed-loop identification of a first-order plus time delay model using Lambert W function. 67-70 - Orsolya Máthé, Botond Miklós, István Bege, Attila Farkas, Csaba Sulyok:
Woody: A Software System for the Design and Production of Doors and Windows. 71-76 - Hunor Hegedüs, Kata Szász, Károly Simon, Tibor Fazakas, Andor Mihály, Katalin Nagy:
Blood Notes: Software System for Promoting and Facilitating Blood Donation. 77-82 - Pál Fehér-Polgár, Pál Michelberger:
The Information Security Risks of the BYOD, From Theoretical Point of View. 83-88 - György Molnár, Zoltán Szüts, Zoltán Balogh:
Modern digital Web 2.0 devices and services supporting the teaching of Technology and Informatics. 89-94 - József Z. Szabó, Péter Bakucz:
Determination of Critical Fault Tree Components Based on Mixed Fuzzy Top Event. 95-98 - József Z. Szabó, Péter Bakucz:
Determining Algorithmic Performance with Uncertainty Analysis. 99-102 - Sinan Koçak, Edit Tóth-Laufer, László Pokorádi:
Fuzzy Failure Modes and Effects Analysis with Different Defuzzification Methods - A Case Study for Bearing Manufacturing Process. 103-108 - Edit Tóth-Laufer, Richárd Horváth:
A MIMO Fuzzy Model to Predict Turning Metrics. 109-114 - Judit Lukács:
Comparison of defuzzification methods for cabin noise prediction of passenger cars. 115-120 - Sandra Buhmiler, Sanja Rapajic, Milan Lukic, Slavica Medic, Natasa Durakovic, Tatjana Grbic:
Derivative-free method for singular systems. 121-126 - Slavica Medic, Nedeljko Stojakovic, Darko Capko, Natasa Durakovic, Tatjana Grbic:
Mathematical Model of Queue Size in a Postal Network Unit with Variable Number of Servers. 127-132 - Darja Gabriska, Miroslav Ölvecký:
Using Deep Learning to Improve Process Operator Reliability. 133-138 - Ján Hurtuk, Jakub Cervenák, Martin Stancel, Michal Hulic, Peter Fecilak:
Indoor navigation using IndoorAtlas library. 139-142 - Zuzana Dankovicová, Ján Hurtuk, Peter Fecilak:
Evaluation of Digitalized Handwriting for Dysgraphia Detection Using Random Forest Classification Method. 149-154 - Peter Gnip, Peter Drotár:
Ensemble methods for strongly imbalanced data: bankruptcy prediction. 155-160 - Dusanka Dakic, Srdjan Sladojevic, Teodora Lolic, Darko Stefanovic:
Process Mining Possibilities and Challenges: A Case Study. 161-166 - Zlatko Covic, Helena Manojlovic:
Developing Key Competencies through Hackathon Based Learning. 167-172 - Biljana P. Mihailovic, Mirjana Strboja, Milos Todorov:
The bipolar Choquet g-integrals. 173-178 - Milos Todorov, Mirjana Strboja, Biljana P. Mihailovic:
Jensen type inequality for the bipolar Shilkret and Sugeno integrals. 179-184 - Dragan Jocic, Ivana Stajner-Papuga:
An overview of the existing classes of aggregation operations with an absorbing element. 185-190 - Kenichi Tamura:
Adaptive Framework for Evolutionary Algorithms to Evaluation-iteration Constrained Optimization Problems. 191-196 - Srikanth Kamath, Shawn Ivan D'souza:
Bit Error Rate Analysis of Analog and Hybrid Beamforming Techniques. 197-202 - Ignacy Duleba, Iwona Karcz-Duleba:
Evaluation of Configurations in Nonholonomic Motion Planning, 2D Case Study. 203-206 - Olga V. Mamoutova, Mikhail B. Uspenskiy, Anton V. Sochnev, Sergey V. Smirnov, Marina V. Bolsunovskaya:
Knowledge Based Diagnostic Approach for Enterprise Storage Systems. 207-212 - Isabela Dramnesc, Tudor Jebelean:
Case Studies on Algorithm Discovery from Proofs: The Delete Function on Lists and Binary Trees using Multisets. 213-220 - Gábor Szücs, Dorottya Huszti:
Seq2seq Deep Learning Method for Summary Generation by LSTM with Two-way Encoder and Beam Search Decoder. 221-226 - Dániel Zentai:
Graph Theoretic Risk Classification in Transportation Networks. 227-230 - Gábor Kiss:
External manipulation recognition modul in self-driving vehicles. 231-234 - László Pokorádi, Péter Felker:
Interval Uncertainty Analysis of Bridge Structure Systems' Reliability. 235-240 - István Nagy, Farkas Bence Vér:
Practical Analysis of an AMR Wheel Speed Sensor and CAN Bus System for the Communication's Failures and its Implications to the EV's Control System. 241-248 - Attila Szabó, Andras Nagy, Gabor Kozsely:
Laser cutting technology development for Fe based metallic glass. 249-254 - József Kopják, Gergely Sebestyen:
Event-driven Fuzzy Inference System Implementation in Node-RED. 255-260 - Árpád Varga, György Eigner, József K. Tar:
Numerical Simulations for an Experimental Test Bed for Adaptive Control Methods. 261-266 - Hemza Redjimi, József K. Tar:
The Use of Multiple Components Fixed Point Iteration in the Adaptive Control of Single Variable Systems. 267-272
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.