Abstract is missing.
- Neuro-Fuzzy Systems and their ApplicationsLeszek Rutkowski. 1-2 [doi]
- New Cryptographic PrimitivesSvein J. Knapskog. 3-7 [doi]
- Modern Methods for the Cognitive Analysis of Economic Data and Text Documents and their Application in Enterprise ManagementRyszard Tadeusiewicz, Lidia Ogiela. 11-23 [doi]
- Investigating Query Similarity Measures for Collaborative Web SearchPavel Krömer, Václav Snásel, Jan Platos. 27-32 [doi]
- On Knowledge Structures ReductionVáclav Snásel, Martin Polovincak, Hussam M. Dahwa Abdulla, Zdenek Horak. 33-37 [doi]
- Procedure to Choose Alternative ANN in the Control of Electrical DrivePavel Brandstetter, Ondrej Skuta. 38-43 [doi]
- Rank Regression by Projection Method vs Graph-Theoretical AlgorithmsMagdalena Topczewska, Kurt Frischmuth. 44-49 [doi]
- Strategy Description and Modelling for Multi-Agent SystemsVáclav Snásel, Jan Martinovic, Jan Kozusznik. 50-55 [doi]
- A Hybrid Multi-Experts Approach for Mechanical Defects Detection and DiagnosisMoustapha Sene, Abdennasser Chebira, Kurosh Madani. 59-64 [doi]
- Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection SystemDivyata Dal, Siby Abraham, Ajith Abraham, Sugata Sanyal, Mukund A. Sanglikar. 65-70 [doi]
- Genetic Algorithms Searching for Turbo Code Interleaver and Solving Linear Ordering ProblemVáclav Snásel, Jan Platos, Pavel Krömer, Nabil Ouddane. 71-77 [doi]
- Kohonen Map Combined to the K-Means Algorithm for the Identification of Day Types of Algerian Electricity LoadFarouk Benabbas, Mohamed Tarek Khadir, Damien Fay, Ahmed Boughrira. 78-83 [doi]
- Particle Swarm Based Meta-Heuristics for Function Optimization and Engineering ApplicationsMillie Pant, Radha Thangaraj, Ajith Abraham. 84-90 [doi]
- Self-Organizing Map and K-Means for Meteorological Day Type Identification for the Region of Annaba - AlgeriaSoufiane Khedairia, Mohamed Tarek Khadir. 91-96 [doi]
- A 4-Bits CSA Adder Using the Arithmetic A2 Redundant Binary Representation for Mixed Neural Networks with On-Chip LearningHatem Boukadida, Zied Gafsi, Nejib Hassen, Kamel Besbes. 97-98 [doi]
- Analytic Programming Powered by Distributed Self-Organizing Migrating Algorithm ApplicationPavel Varacha, Ivan Zelinka. 99-100 [doi]
- A New Reactive Secure Routing Protocol for Mobile Ad-Hoc NetworksSoma Saha, Rituparna Chaki, Nabendu Chaki. 103-108 [doi]
- Assessing the Efficiency of Data Compression and Storage SystemJakub Swacha. 109-114 [doi]
- Frequency and Fractal Analysis of Address Resolution Protocol TrafficOskar Swida, Aida Saeed-Baginska, Romuald Mosdorf. 115-120 [doi]
- HIDS: Honesty-Rate Based Collaborative Intrusion Detection System for Mobile Ad-Hoc NetworksPoly Sen, Nabendu Chaki, Rituparna Chaki. 121-126 [doi]
- Negotiation Behaviors Based on Artificial Intelligence and Social and Cognitive Human-Agent InteractionAmine Chohra, Arash Bahrammirzaee, Kurosh Madani. 127-132 [doi]
- Relation Analysis in eLearningJan Martinovic, Pavla Drázdilová, Katerina Slaninová, Václav Snásel. 133-138 [doi]
- Reliability in Wireless Sensor Networks Using Soft SensingRubina Sultan, Muhammad Shafiq, Noor M. Khan. 139-144 [doi]
- Similarity in Information RetrievalJan Martinovic, Petr Gajdos, Václav Snásel. 145-150 [doi]
- A Web-Based Collaborative Environment Based on a Shared Ontology for the Maintenance of Steam TurbinesMohamed Tarek Khadir, Mokhtar Sellami. 151-152 [doi]
- Information System Integrated SecurityMilena Tvrdikova. 153-154 [doi]
- Multi Background Memory TestingIreneusz Mrozek, Vyacheslav Yarmolik, Eugenia Buslowska. 155-156 [doi]
- Wireless Sensor Network Protocols for Secure and Energy-Efficient Data TransmissionSang-Eon Lee, Sang-Ho Shin, Geum-Dal Park, Kee-Young Yoo. 157-162 [doi]
- Wireless Sensor Network Protocols for Secure and Energy-Efficient Data TransmissionSang-Eon Lee, Sang-Ho Shin, Geum-Dal Park, Kee-Young Yoo. 157-162 [doi]
- An Algorithm for Parking Lot Occupation DetectionTomas Fabian. 165-170 [doi]
- Image Segmentation by Self-Organised Region GrowingLeila Djerou, Nacer Khelil, Mohamed Batouche. 171-176 [doi]
- Intrinsic Dimensionality of Data and of their Representatives. A Case Study of Amino-Acid Distribution in ORFsAnna Bartkowiak, Adam Szustalewicz. 177-182 [doi]
- Nonlinear Dimensionality Reduction by Isomap and MLEdim as Applied to Amino-Acid Distribution in Yeast ORFsAnna Bartkowiak. 183-188 [doi]
- Online Signature Classification and its Verification SystemMarcin Adamski, Khalid Saeed. 189-194 [doi]
- Tensor Decomposition for 3D Bars ProblemJan Platos, Jana Kocibova, Pavel Krömer, Pavel Moravec, Václav Snásel. 195-200 [doi]
- Two Hand Tracking Using Colour Statistical Model with the K-means Embedded Particle Filter for Hand Gesture RecognitionSurachai Ongkittikul, Stewart Worrall, Ahmet M. Kondoz. 201-206 [doi]
- Verification of Hypothesis about Image Content Using Active Contour ApproachPiotr S. Szczepaniak. 207-209 [doi]
- A New Method for Bryophyte Canopy Analysis Based on 3D Surface ReconstructionMichal Krumnikl, Eduard Sojka, Jan Gaura, Oldrich Motyka. 210-211 [doi]
- Object Localization Based on Mutual Information in Global Structure Constraint ModelMiao Liu, Dongwei Guo, Jie Ma, Chunguang Zhou. 212-213 [doi]
- Palmprint Recognition Enhanced by the Shape FeaturesRafal Kozik, Aleksandra Zelek, Michal Choras. 214-215 [doi]
- A Description of a Highly Modular System for the Emergent Flood PredictionIvo Vondrák, Jan Martinovic, Jan Kozusznik, Svatopluk Stolfa, Tomas Kozubek, Petr Kubicek, Vit Vondrak, Jan Unucka. 219-224 [doi]
- A Keystroke Dynamics Based System for User IdentificationMariusz Rybnik, Marek Tabedzki, Khalid Saeed. 225-230 [doi]
- Two Methods of Quasi-Optimal Routes Generation in Public Transportation NetworkJolanta Koszelew. 231-236 [doi]
- Intelligent Agents for a Semantic Mediation of Information SystemsBenharzallah Saber, Kazar Okba. 237-238 [doi]
- Remarks on Computer Simulations Based on Algorithms of High ComplexityWiktor Danko. 239-243 [doi]
- Systemic Influence of Corporate Parenting on National Advantage Factors - A Czech ExampleEva Moravcova, Tereza Miklickova. 247-252 [doi]
- A Disaster Management Network for Indian RailwaysDibyahash Bordoloi. 253-254 [doi]
- Complex Marketing Database Specification, Design and ImplementationMaciej Modrzejewski, Jaroslaw A. Chudziak, Rafal W. Cegielski. 255-256 [doi]
- Multimedia Support of Education Biomedical EngineeringRadovan Hajovsky. 257-260 [doi]
- Uncertainty Trust Model in E-commerce EnvironmentDengwen Wei, Zaobin Gan, Lei Xu. 261-266 [doi]
- Efficient Interaction Analysis for an Effective Provision of Knowledge about the Discussion Process to CSCL PracticesSanti Caballé, Fatos Xhafa, Thanasis Daradoumis, Ajith Abraham. 269-274 [doi]
- Tuning Struggle Strategy in Genetic Algorithms for Scheduling in Computational GridsFatos Xhafa, Bernat Duran, Ajith Abraham, Keshav P. Dahal. 275-280 [doi]
- Scheduling in Multiprocessor System Using Genetic AlgorithmsKeshav P. Dahal, M. Alamgir Hossain, Benny Varghese, Ajith Abraham, Fatos Xhafa, Atanasi Daradoumis. 281-286 [doi]
- Finding Candidate Helpers in Collaborative E-Learning Using Rough SetsHani Mahdi, Sally S. Attia. 287-292 [doi]
- Extraction of Emotional Content from Music DataMarcin Bartoszewski, Halina Kwasnicka, Urszula Markowska-Kaczmar, Pawel B. Myszkowski. 293-299 [doi]
- Survey: Using Genetic Algorithm Approach in Intrusion Detection Systems TechniquesSuhail S. J. Owais, Václav Snásel, Pavel Krömer, Ajith Abraham. 300-307 [doi]
- Learning Assistant - Personalizing Learning Paths in e-Learning EnvironmentsHalina Kwasnicka, Dorota Szul, Urszula Markowska-Kaczmar, Pawel B. Myszkowski. 308-314 [doi]
- Data Mining Techniques in e-Learning CelGrid SystemPawel B. Myszkowski, Halina Kwasnicka, Urszula Markowska-Kaczmar. 315-319 [doi]