


default search action
ISCSIC 2019: Amsterdam, The Netherlands
- ISCSIC 2019: 3rd International Symposium on Computer Science and Intelligent Control, Amsterdam, The Netherlands, September 25-27, 2019. ACM 2019, ISBN 978-1-4503-7661-7

Autonomous Systems
- Jawad Naveed Yasin, Mohammad Hashem Haghbayan, Jukka Heikkonen, Hannu Tenhunen

, Juha Plosila:
Formation Maintenance and Collision Avoidance in a Swarm of Drones. 1:1-1:6 - Timur Muratov, Aleksandr S. Zagarskikh

:
Octree-Based Hierarchical 3D Pathfinding Optimization of Three-Dimensional Pathfinding. 2:1-2:6 - Matthias Rollenhagen, Matthias Lutz, Nayabrasul Shaik, Kevin Andrews, Sebastian Steinau, Manfred Reichert, Christian Schlegel:

Towards Flexible Process Automation: An Approach for Flexible Service Robot Adaptation and Allocation. 3:1-3:7 - Fan Bai, Renjie Yao, Maoning Chen, Zhexin Cui:

Robotic Grasp Pose Estimation Oriented Deep Learning Algorithm Based on Residual Network. 4:1-4:5 - Daniil Chebotkov

, Aleksandr S. Zagarskikh
:
Intellectual Route Planning Methods for Realistic Agents' Movement. 5:1-5:5 - Jens Vankeirsbilck

, Hans Hallez
, Jeroen Boydens
:
Automatic Implementation of Control Flow Error Detection Techniques. 6:1-6:8 - Nourelimane Bousmaha, Mohamed Maachaoui

, Rachid Chelouah
:
Trust Mechanism Using Clustering Approach in Vehicular Network. 7:1-7:5 - Mahmood Al-Tekreeti, Sibel Tariyan Özyer, Can Özdemir, Altug Karadag, Saad Al-Dakheel:

Unmanned Surface Vehicle Prototype with Obstacle Avoidance System Area: Applications and Evaluation of Real-Time Big Data Systems. 8:1-8:5
Computer Vision, Image and Signal Processing
- Srinivas Koduri:

Lexisearch for Modeling Pushbroom Imaging Systems. 9:1-9:6 - Jiyun Li, Kaihua Li:

Study on Medical Imaging Reports Tagging Extraction Based on Bi-LSTM + CRF. 10:1-10:5 - Mazen Megahed, Utkars Jain

, Michael T. Leasure, Adam A. Butchy:
Localization of Myocardial Infarction from 12 Lead ECG Empowered with Novel Machine Learning. 11:1-11:5 - Hyunduk Kim, Sang-Heon Lee, Myoung-Kyu Sohn:

Real-time Head Detection for Automated Passenger Counting in Embedded Systems. 12:1-12:5 - Risako Aoki, Takuro Oki, Hiro Yokokawa, Ryusuke Miyamoto:

A Computationally Efficient Tracking Scheme for Localization of Soccer Players in an Aerial Video Sequence. 13:1-13:6 - Qian Zhang, Weina Chen, Shunye Wang, Hongguang Hao:

Research on Automatic Recognition of Homologous Plastic Seals. 14:1-14:6 - Tomokazu Ishikawa

, Ryota Nakazato, Ichiro Matsuda:
Procedural Animation of Aurora and its Optimization for Keyframe Animation. 15:1-15:8
Deep Learning
- Shuai Wang

, Jinyang Liu, Ye Qiu, Zhiyi Ma, Junfei Liu, Zhonghai Wu:
Deep Learning Based Code Completion Models for Programming Codes. 16:1-16:9 - Terry Tan:

Singing Evaluation based on Deep Metric Learning. 17:1-17:5 - Weidong Wen, Zhonglu Wang, Jianbo Liu, Chen Chen, Ni Li:

LD-Parser: Leaf Detection Based Dependency Parsing Using BiLSTM and Attention Mechanism. 18:1-18:6
Intelligent Sensing of Environment
- Yanli Geng, Yawei Chen, Bokai Xuan, Qian Wang:

Gait Tracking for Lower Extremity Exoskeleton Based on Impedance Control. 19:1-19:5 - Peng Yang, Xiaodong Cai, Yanli Geng, Lingling Chen:

The Research of Gait Recognition Based on High Dynamic Force Sensing Resistor. 20:1-20:5 - Jeroen van Vugt

:
Human Body Prediction of Size and Shape A Hormonal Framework. 21:1-21:9 - Nkyi Stephen, Yan Xue Feng, Rodor Gershon, Kusi Ankrah Bonsu:

Integrated Round Trip Path Dual Registers (RTPDR) Fault Detection. 22:1-22:6
IoT Communication and Coordination Middleware and Platforms
- Raffaele Chianese, Francesco Gargiulo, Michele Arciprete:

An IoT-based HIS for Healthcare Risk Management and Cost Control: A Proposal. 23:1-23:6 - Ionel Zagan, Vasile Gheorghita Gaitan:

Hardware Scheduler Implementation based on Replicated Resource Architecture for Reconfigurable Systems. 24:1-24:6 - Layla S. Aldawsari

:
Naming Anonymous Processes with Test-and-Set Registers. 25:1-25:7 - Sulaiman Aljarallah, Russell Lock:

A Comparison of Software Quality Characteristics and Software Sustainability Characteristics. 26:1-26:11 - Xuezhen Huang, Yang Yang, Xinglu Wu:

A Meta-Heuristic Computation Offloading Strategy for IoT Applications in an Edge-Cloud Framework. 27:1-27:6
Machine Learning and Artificial Intelligence
- Chunpeng Wang, Jie Zhu:

A Combination Method of Deep Learning Speech Separation and Independent Vector Analysis on Multi-channel Source Separation. 28:1-28:5 - Antoun Yaacoub

, Zainab Assaghir, Sara Makki, Radwan Almokdad
:
Diagnosing Clinical Manifestation of Apathy Using Machine Learning and Micro-facial Expressions Detection. 29:1-29:6 - Snehalika Lall, Sanghamitra Bandyopadhyay:

An l1-Norm Regularized Copula Based Feature Selection. 30:1-30:6 - Vladislav Gorshkov, Aleksandr S. Zagarskikh

:
Development of Tactical Level AI for Melee and Range Combat. 31:1-31:5 - Melike Günay, Zeynep Orman

:
Disease Prediction Using Weighted Artificial Immune System. 32:1-32:5 - Zhanchun Gao, Zhiyang Zhang:

A Multi-Radar Track Fusion Methodology Based on Random Forest Regression. 33:1-33:6 - Shikha Verma, Arun Kumar Gautam:

Machine Learning Techniques for Classification of Spambase Dataset: A Hybrid Approach. 34:1-34:6 - Douglas Cirqueira, Markus Helfert, Marija Bezbradica:

Towards Preprocessing Guidelines for Neural Network Embedding of Customer Behavior in Digital Retail. 35:1-35:6 - Pijitra Jomsri:

An Optimal Travel Route Recommender System for Tourists in Om Non Canal, Thailand. 36:1-36:5
Modeling and Control of Cyber-Physical Systems
- Lijin Wu, Guoqiang Gu, Weihua Zhang:

Cyber-Physical System Fusion Modeling and Simulation Method. 37:1-37:6 - Nilakantha Paudel, Ram C. Neupane:

A General Architecture for a Real-Time Monitoring System Based on the Internet of Things. 38:1-38:12 - Jingjing Ran, Zhiyong Fan, Yamei Luo, Liangen Yang, Tao He, Xuanze Wang:

Multi-sample Unit Preprocessing Platform and Its Control System Design. 39:1-39:5 - Anh Tuan Vo

, Hee-Jun Kang, Tien-Dung Le:
An Adaptive Integral Sliding Mode Tracking Control for Robotic Manipulators. 40:1-40:6 - Thanh Nguyen Truong

, Hee-Jun Kang, Tien-Dung Le:
Adaptive Neural Sliding Mode Control for 3-DOF Planar Parallel Manipulators. 41:1-41:6 - Young-Kyu Kim, Dong-Sun Kim, Young-Jong Jang:

A Data-Centric Accelerator Design Based on Processing in Memory. 42:1-42:4 - Gellért István Hegyi, Markosz Maliosz

, Csaba Simon:
Performance Measurements of Function as a Service Platforms. 43:1-43:6
Modeling and Formal Methods
- Jie Jiang, Zhang Yan:

Adaptive Multi-Parameter Prediction Model Based on Grey Theory. 44:1-44:6 - Yang Li, Ke Chen, Liu-wei Mao:

A Compensation Method for FOG Temperature Drift Error Based on Double-section Polynomial Fitting. 45:1-45:5 - Tao He, Wenting Sheng, Shu-rong Wen, Xing Wang, Wenchao Liu, Liangen Yang:

Research on Denoising Localization Algorithm for Positioning Laser Spots and Noise Spots Interlaced Image. 46:1-46:6 - Waled Khaled, Jin-Guan Lin:

Modal Regression Estimation for Heteroscedastic Single-Index Model. 47:1-47:5 - Raymund Herradura, Fadi A. Thabtah, M. Andrews:

Trend Analyses for Blockchain Technology Innovations Using Data Analytics. 48:1-48:6
Networked and Distributed Systems
- Pasu Poonpakdee, Jarotwan Koiwanit, Chumpol Yuangyai:

Epidemic System Conversion on Industry 4.0's Perspective Under Dynamic Network Condition. 49:1-49:5 - Nikolaos A. Panayiotou

, Vasileios P. Stavrou, Konstantinos E. Stergiou:
Reengineering of the New Customer Gas Connection Process Utilizing Industry 4.0 Technologies: The Greek Case of Public Gas Distribution Networks S.A. 50:1-50:6
Networking Infrastructure for IoT to Address Heterogeneity
- Igla Hoxha, Michael Opoku Agyeman

:
High Performance Heterogeneous Multicore Architectures: A Study. 51:1-51:5 - Ola Challabi, Raghad Zenki, Michael Opoku Agyeman

:
A Study of FPGA-Based Supercomputing Platforms. 52:1-52:5 - Raghad Zenki, Ola Challabi, Michael Opoku Agyeman

:
Protection of Memory Using Code Redundancies: A Brief Study. 53:1-53:6 - Jianbin Zou, Kai Gao, Erbao Li:

10Gbps Real-time OFDM Wireless Communication System. 54:1-54:5 - Francesco Buccafurri, Celeste Romolo:

A Blockchain-Based OTP-Authentication Scheme for Constrainded IoT Devices Using MQTT. 55:1-55:5
Pattern Recognition
- Wei Ding, Junli Wang, Haohao Zhu:

Using Graph Representations for Semantic Information Extraction from Chinese Patents. 56:1-56:5 - Muhammadjon Musaev

, Ilyos Khujayorov
, Mannon Ochilov
:
Image Approach to Speech Recognition on CNN. 57:1-57:6 - Dulyawit Prangchumpol:

Face Recognition for Attendance System Using Neural Networks Technique. 58:1-58:5
Security, Privacy, Reliability, and Dependability
- Lukas Merkle

:
Cloud-Based Battery Digital Twin Middleware Using Model-Based Development. 59:1-59:7 - Cheah Huei Yoong, Jonathan Heng:

Framework for Continuous System Security Protection in SWaT. 60:1-60:6 - Mohammed Mahdi Hashim, Ahmed Kamal Mohsin, Mohd Shafry Mohd Rahim:

All-encompassing Review of Biometric Information Protection in Fingerprints Based Steganography. 61:1-61:8 - Yanyan Xu, Xiao Zhao, Jiaying Gong:

A Secure CBIR Method based on Bag-of-Visual-Words Model under Cloud Environment. 62:1-62:8 - Armin Krzalic

, Nedzad Korajlic, Senka Mesihovic Dinarevic:
Securitization and Criminalization of Migrants in Bosnia and Herzegovina. 63:1-63:5
Smart home
- Michael Opoku Agyeman

, Ali Al-Mahmood, Igla Hoxha:
A Home Rehabilitation System Motivating Stroke Patients with Upper and/or Lower Limb Disability. 64:1-64:6 - Mutaz Ryalat

, Mahmoud Alsherqatli, Hisham ElMoaqet
:
IoT-aided Smart Lawnmower. 65:1-65:8

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














