A. Approach and .. , 387 Juan Carlos Figueroa-García, Emanuel Jonathan Medina-Pinzón, and Jannan David Rubio-Espinosa Joining Concept's Based Fuzzy Cognitive Map Model with Moving Window Technique for, Time Series Modeling, p.397

T. Hong-quan-hua, Hoang Ngan Le, and Bac Le A Multiple Refinement Approach in Abstraction Model Checking, p.433

T. H. Phan, . Nguyen, and H. Thang, Bui Chaos Driven Particle Swarm Optimization with Basic Particle Performance Evaluation ? An Initial Study, p.445

I. Zelinka, P. Saloun, and R. , 465 Przemyss law Berezi´nskiBerezi´nski, Marcin Szpyrka, Bartosz Jasiul, and Michaa l Mazur Table of Contents XVII Universal Central Control of Home Appliances as an Expanding Element of the Smart Home Concepts -Case Study on Low Cost Smart Solution, p.479

J. Dvorak, O. Berger, and .. , and Ondrej Krejcar An Off-the-Shelf Platform for Automatic and Interactive Text Messaging Using Short Message Service, p.489

D. Oliveira, D. Oliveira, and M. Nuno, Garcia, and Graça Esgalhado Application of PIL Approach for Automated Transportation Center, p.501

S. Ozana, M. Pies, R. Hajovsky, and .. , Jiri Koziorek, and Ondrej Horacek A Model of a System for Stream Data Storage and Analysis Dedicated to Sensor Networks of Embankment Monitoring, p.514

A. Pi¸etapi¸eta, M. Michaa-l-lupa, and .. Chuchro-twitter, Adam Piórkowski, and Andrzej Le´sniakLe´sniak Analysis of Social Influence and Information Dissemination in Social Media: The Case of, p.526

T. Vo-dang-khoa, . Vu-pham, and T. Huynh-tuong-nguyen, Van Hoai Pattern Recognition and Image Processing Enhanced LBP-Based Face Recognition System Using a Heuristic Approach for Searching, A Local Gaussian Filter and Adaptive Morphology as Tools for Completing Partially Discontinuous Curves 559 Przemyss law Spurek Jacek Tabor, and Elzbieta Zaj¸acZaj¸ac Subspaces Clustering Approach to Lossy Image Compression . . . . . . . . . . 571 Przemyss law Spurek, Marek´SmiejaMarek´ Marek´Smieja, and Krzysztof Misztal

S. Jakub?tolfajakub?jakub?tolfa, K. Slaninová-martinovi?, and .. , 592 Puchong Subpratatsavee and Pramote Kuacharoen XVIII Table of Contents Grasping Action for Impaired Vision Action Using HC2D Barcode Technology 602 Puchong Subpratatsavee and Suchai Tanaiadehawoot Various Aspects of Computer Security Hardware Approach for Generating b-detectors by Immune-Based Algorithms, 615 Maciej Brzozowski and Andrzej Chmielewski Evaluating Industrial Control Devices Security: Standards, p.624

I. El-fray and .. , Tomasz Hyla, and W lodzimierz Chocianowicz Implicit and Explicit Certificates-Based Encryption Scheme, p.651

. Rafa-l-kozik and .. Michaa-l-chora´schora´s, Rafa l Renk, and Witold Hoo lubowicz Semantic Set Analysis for Malware Detection