Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Petar Čisar"'
Publikováno v:
Interdisciplinary Description of Complex Systems, Vol 22, Iss 3, Pp 329-340 (2024)
Synchronous motors are essential in various industrial and commercial applications because of their efficiency and constant speed operation. Accurate modelling of these motors is crucial for optimizing performance, control, and maintenance. Tradition
Externí odkaz:
https://doaj.org/article/781c061e98894155a530f823b6cd9ffa
Autor:
Kristijan Kuk, Aleksandar Stanojević, Petar Čisar, Brankica Popović, Mihailo Jovanović, Zoran Stanković, Olivera Pronić-Rančić
Publikováno v:
Axioms, Vol 13, Iss 9, p 624 (2024)
The key point in the process of agent-based management in e-service for malware detection (according to accuracy criteria) is a decision-making process. To determine the optimal e-service for malware detection, two concepts were investigated: Fuzzy L
Externí odkaz:
https://doaj.org/article/0fe36ceac20244e6bc281ddf36b526dd
Publikováno v:
Mathematics, Vol 10, Iss 20, p 3849 (2022)
This paper describes one of the non-linear (and non-stationary) stochastic models, the GSB (Gaussian, or Generalized, Split-BREAK) process, which is used in the analysis of time series with pronounced and accentuated fluctuations. In the beginning, t
Externí odkaz:
https://doaj.org/article/2e93f89781664204bb235c7392ec9629
Publikováno v:
Applied Sciences, Vol 10, Iss 20, p 7044 (2020)
Computer adaptive testing (CAT) enables an individualization of tests and better accuracy of knowledge level determination. In CAT, all test participants receive a uniquely tailored set of questions. The number and the difficulty of the next question
Externí odkaz:
https://doaj.org/article/5f9c047c48c24aa5aec673b1136f736a
Publikováno v:
Acta Polytechnica Hungarica. 19:153-164
Publikováno v:
Security-Related Advanced Technologies in Critical Infrastructure Protection ISBN: 9789402421736
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ba518aa4e0cab7ccac17b29010cc6a39
https://doi.org/10.1007/978-94-024-2174-3_4
https://doi.org/10.1007/978-94-024-2174-3_4
Publikováno v:
Security-Related Advanced Technologies in Critical Infrastructure Protection ISBN: 9789402421736
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::06c6ad5d1a68a5073fea7cc48417adee
https://doi.org/10.1007/978-94-024-2174-3_18
https://doi.org/10.1007/978-94-024-2174-3_18
Autor:
Petar Čisar
Publikováno v:
NBP: Nauka, bezbednost, policija, Vol 22, Iss 2, Pp 33-46 (2017)
To achieve a satisfactory level of security of an information system, different system and application methods are applied. The paper has a focus on general aspects of application IT security, thereby giving an overview of security methods applied to
Publikováno v:
Acta polytechnica hungarica
Today, e-Governments services operate quick answer systems in many different domains in order to help citizens receive answers to their questions at any time and within a very short time. The automatic mapping of relevant documents stands out as an i
Publikováno v:
Elektronika ir Elektrotechnika, Vol 27, Iss 5, Pp 49-58 (2021)
In a criminal investigation, along with processing forensic evidence, different investigative techniques are used to identify the perpetrator of the crime. It includes collecting and analyzing unconstrained face images, mostly with low resolution and
Externí odkaz:
https://doaj.org/article/7dd839269dde411e9070fe3e2513ccf7