Default Cover Image

2015 XXV International Conference on Information, Communication and Automation Technologies (ICAT)

Oct. 29 2015 to Oct. 31 2015

Sarajevo, Bosnia and Herzegovina

Table of Contents

Title pageFreely available from IEEE.pp. 1-1
Copyright pageFreely available from IEEE.pp. 1-1
Learning from depth sensor data using inductive logic programmingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
3D point cloud compression using conventional image compression for efficient data transmissionFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Design and application of an active suspension system on a 6 DOF half vehicle modelFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Time domain disturbance observer based control of a quadrotor unmanned aerial vehicleFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Classification of interruption causes used in quality regulation — Case of BiHFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Inverse feedforward control with output polynomial smoothingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Internal penetration testing of Bring Your Own Device (BYOD) for preventing vulnerabilities exploitationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Implementation of enterprise GIS in power distribution utilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A numerically controlled oscillator based on De Moivre's identity and linear approximation: A ROMless NCOFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
The effect of dictionary learning algorithms on super-resolution hyperspectral reconstructionFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Enhancing museum exhibitions with interactive digital content: Sarajevo city model interactiveFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
User and mobile-friendly learning management system designFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Spatial analysis of target signaturesFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
SLA : Smart log analyticsFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Miniaturized safety systems: A way for future tasks in safety engineeringFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Prediction of lung nicotine concentration based on novel GA-ANFIS system approachFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Fail-safe protection Circuit for industrial safety applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Using multiple selections to improve the efficiency of the genetic algorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Backstepping trajectory tracking control of a quadrotor with disturbance rejectionFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
VPCA-based fault diagnosis of spacecraft reaction wheelsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Modelling constraints in school timetabling using integer linear programmingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Implementation of the open-software models of switched reluctance motor on model-in-the-loop platformFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Feature enhanced time-aware recommender systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Fuzzy modeling of complex, multi-source, dynamic frictionFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Modeling of voting expert system prototype in classification of acid-base disordersFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Error detection on precise laser scanner based navigationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Storing and analysing fuzzy data from surveys by relational databases and fuzzy logic approachesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Design of a distributed ultrasound-based sensory systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
CAN open safety on safety-related system-on-chipFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Evaluation of the quality of impulse high voltage measuring systemFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
An Internet of Things visual domain specific modeling language based on UMLFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Review of Green ICT related policies in Bosnia and HerzegovinaFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
The effect of denoising on classification of ECG signalsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Investigation of a reliability prevention model for remanufactured systems in automotiveFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Contribution to reducing the critical faults in critical Software SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Showing 49 out of 49