Search Results - "2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)"

Refine Results
  1. 1

    Concept of predictive maintenance of production systems in accordance with industry 4.0 by Spendla, Lukas, Kebisek, Michal, Tanuska, Pavol, Hrcka, Lukas

    “…In the proposed paper, we described the approach to build Hadoop based knowledge discovery platform. The proposal focuses on predictive maintenance of…”
    Get full text
    Conference Proceeding
  2. 2

    A minimal model of tumor growth with angiogenic inhibition using bevacizumab by Drexler, Daniel Andras, Sapi, Johanna, Kovacs, Levente

    “…Modeling the tumor growth under angiogenic inhibition is an important step towards designing tumor treatment therapies based on mathematical tools. Our goal is…”
    Get full text
    Conference Proceeding
  3. 3

    Leaf recognition algorithm using support vector machine with Hu moments and local binary patterns by Lukic, Marko, Tuba, Eva, Tuba, Milan

    “…Leaf recognition is convenient for plant classification and it is an important subfield of pattern recognition. Different leaf features such as color, shape…”
    Get full text
    Conference Proceeding
  4. 4

    Robot navigation in unknown environment using fuzzy logic by Kumar, Neerendra, Takacs, Marta, Vamossy, Zoltan

    “…In this paper, a Simulink model for the robot navigation in unknown environment is presented. The robot navigation is handled by two controllers: pure pursuit…”
    Get full text
    Conference Proceeding
  5. 5

    Parkinson's disease patients classification based on the speech signals by Vadovsky, Michal, Paralic, Jan

    “…Parkinson's disease is the second most frequent neurodegenerative disorder after Alzheimer's disease. There are numerous symptoms among the population…”
    Get full text
    Conference Proceeding
  6. 6

    Anti-spoofing in face recognition with liveness detection using pupil tracking by Killioglu, M., Taskiran, M., Kahraman, N.

    “…In this work, we focused on liveness detection for facial recognition system's spoofing via fake face movement. We have developed a pupil direction observing…”
    Get full text
    Conference Proceeding
  7. 7

    Implementing English speech interface to Jaguar robot for SWAT training by Pleva, Matus, Juhar, Jozef, Cizmar, Anton, Hudson, Christopher, Carruth, Daniel W., Bethel, Cindy L.

    “…This paper describes the development of a specialized application for voice command recognition for the Jaguar V4 robot in conjunction with the Starkville, MS,…”
    Get full text
    Conference Proceeding
  8. 8

    Ontology based navigation model of the ILONA system by Kun, Daniel P., Varga, Erika Baksane, Toth, Zsolt

    “…This paper presents the model of the navigation component of the ILONA System, which is a flexible indoor positioning framework. Navigation in closed…”
    Get full text
    Conference Proceeding
  9. 9

    Fuzzy rule interpolation and reinforcement learning by Vincze, David

    “…Reinforcement Learning (RL) methods became popular decades ago and still maintain to be one of the mainstream topics in computational intelligence. Countless…”
    Get full text
    Conference Proceeding
  10. 10

    TCP/IP protocol utilisation in process of dynamic control of robotic cell according industry 4.0 concept by Bohuslava, Juhasova, Martin, Juhas, Igor, Halenar

    “…Communication and possibilities of flexible manufacturing systems control through a variety of communication protocols are described in this article. The main…”
    Get full text
    Conference Proceeding
  11. 11

    Comprehensive healthcare interoperability framework integrating telemedicine consumer electronics with cloud architecture by Garai, Abel, Adamko, Attila

    “…This article reviews and demonstrates the necessary abstraction levels of interoperability for enhanced healthcare systems integration. Defined…”
    Get full text
    Conference Proceeding
  12. 12

    Artificial neural network based IDS by Adam, Norbert, Mados, Branislav, Balaz, Anton, Pavlik, Tomas

    “…The Network Intrusion Detection Systems (NIDS) are either signature based or anomaly based. In this paper presented NIDS system belongs to anomaly based Neural…”
    Get full text
    Conference Proceeding
  13. 13

    Design and implementation of low-cost intelligent wheelchair controller for quadriplegias and paralysis patient by Ruzaij, Mohammed Faeik, Neubert, Sebastian, Stoll, Norbert, Thurow, Kerstin

    “…Wheelchair controller selection is very important for users or patients with disabilities like quadriplegia, paralyzed, amputee and elderly. The comfort,…”
    Get full text
    Conference Proceeding
  14. 14

    Effective navigation in narrow areas: A planning method for autonomous cars by Kiss, Domokos, Papp, David

    “…Development of driverless road vehicles is one of the most active research areas of robotics today. Path planning among obstacles is one of the challenging…”
    Get full text
    Conference Proceeding
  15. 15

    Spherical RBF vector field interpolation: Experimental study by Smolik, Michal, Skala, Vaclav

    “…The Radial Basis Function (RBF) interpolation is a common technique for scattered data interpolation. We present and test an approach of RBF interpolation on a…”
    Get full text
    Conference Proceeding
  16. 16

    Survey on perspectives of PV technology and their applications by Lamnini, Soukaina, Kadar, Peter

    “…Oil for electricity generation, burning of coal, heat production is the largest sources of greenhouse emission that cause climate change worldwide. Therefore…”
    Get full text
    Conference Proceeding
  17. 17

    Offline signature identification via HOG features and artificial neural networks by Taskiran, Murat, Cam, Zehra Gulru

    “…In this work, an offline signature identification system based on Histogram of Oriented Gradients (HOG) vector features is designed. Handwritten signature…”
    Get full text
    Conference Proceeding
  18. 18

    Applications of remote controlled robotics in the intelligent space by Hvizdos, J., Vojtko, I., Koscelansky, M., Pavlov, J., Vascak, J., Sincak, P.

    “…As the concept of the Internet of Things (IoT) permeates the industry and our lives it becomes more and more advantageous to use its emerging services and…”
    Get full text
    Conference Proceeding
  19. 19

    Application and properties of the radon transform for object image matching by Kertesz, Gabor, Szenasi, Sandor, Vamossy, Zoltan

    “…The Radon transform and the reverse formulas are mostly used in computer tomography to reconstruct the original shape. The projections of an image could be…”
    Get full text
    Conference Proceeding
  20. 20

    An evaluation of biometrie identification approach on low-frequency eye tracking data by Cherepovskaya, Elena N., Lyamin, Andrey V.

    “…During the last decade many information systems started applying various biometric identification modules. This type of identification is secure and provides a…”
    Get full text
    Conference Proceeding