Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880345
B. Svobodová, M. Penhaker, V. Kasik, M. Augustynek, J. Kubícek
This paper is dealing with the final assembly of the spectrophotometric instrument and especially with creating of the control and calculation software. The resulting device is primarily intended for measuring phototherapy sources used in neonatal wards in hospitals. On the basis of the measured spectrum (i. e. dependence of the radiation intensity on the wavelength) and other input parameters are calculated spectrometric, radiometric, photometric and colorimetric values by the program.
{"title":"Design of spectrophotometer for neonatal phototherapy","authors":"B. Svobodová, M. Penhaker, V. Kasik, M. Augustynek, J. Kubícek","doi":"10.1109/SAMI.2017.7880345","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880345","url":null,"abstract":"This paper is dealing with the final assembly of the spectrophotometric instrument and especially with creating of the control and calculation software. The resulting device is primarily intended for measuring phototherapy sources used in neonatal wards in hospitals. On the basis of the measured spectrum (i. e. dependence of the radiation intensity on the wavelength) and other input parameters are calculated spectrometric, radiometric, photometric and colorimetric values by the program.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114693260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880308
Zuzana Vantová, Ján Paralič, V. Gaspar
This paper presents an application for managing education by creating presence lists. An administration application has also been created in order to allow manipulating with the content of the enumerables in the presence lists. Overviews of possible solutions are presented. Our main motivation was to provide secure and reliable way of evaluating student attendance on specific lectures. In order to accomplish this task, we utilized the NFC technology on a smartphone and student ISIC ID card, the ownership of which is compulsory for every university student at the Technical University of Košice. The application has been implemented for specific conditions at the Technical University of Košice.
{"title":"Mobile application for creating presence lists","authors":"Zuzana Vantová, Ján Paralič, V. Gaspar","doi":"10.1109/SAMI.2017.7880308","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880308","url":null,"abstract":"This paper presents an application for managing education by creating presence lists. An administration application has also been created in order to allow manipulating with the content of the enumerables in the presence lists. Overviews of possible solutions are presented. Our main motivation was to provide secure and reliable way of evaluating student attendance on specific lectures. In order to accomplish this task, we utilized the NFC technology on a smartphone and student ISIC ID card, the ownership of which is compulsory for every university student at the Technical University of Košice. The application has been implemented for specific conditions at the Technical University of Košice.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123078321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880326
M. Vadovský, Ján Paralič
Parkinson's disease is the second most frequent neurodegenerative disorder after Alzheimer's disease. There are numerous symptoms among the population suffering from the disease including tremor, slowed movement, impaired posture and balance, and rigid muscles, however dysphonia — changes in speech and articulation — is the most significant precursor. This is the reason why the article is focused on patients classification based on their speech signals. Algorithms C4.5, C5.0, RandomForest and CART were used to generate the decision trees in Rstudio interface. In addition, cut-off values of individual attributes were applied in order to classify the patients. The dataset in the article consists of 40 individuals' records, half of which were affected by Parkinson's disease. Each individual's coverage was represented by several records such as permanent vowels pronunciation, certain words, numbers and sentences. The objective was to determine the most accurate classification model (decision tree) using the individual types of speech signals. Cross-validation method was used for evaluation of models. The highest average model accuracy of 66.5% was obtained for data taken when individuals pronounced the numbers.
{"title":"Parkinson's disease patients classification based on the speech signals","authors":"M. Vadovský, Ján Paralič","doi":"10.1109/SAMI.2017.7880326","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880326","url":null,"abstract":"Parkinson's disease is the second most frequent neurodegenerative disorder after Alzheimer's disease. There are numerous symptoms among the population suffering from the disease including tremor, slowed movement, impaired posture and balance, and rigid muscles, however dysphonia — changes in speech and articulation — is the most significant precursor. This is the reason why the article is focused on patients classification based on their speech signals. Algorithms C4.5, C5.0, RandomForest and CART were used to generate the decision trees in Rstudio interface. In addition, cut-off values of individual attributes were applied in order to classify the patients. The dataset in the article consists of 40 individuals' records, half of which were affected by Parkinson's disease. Each individual's coverage was represented by several records such as permanent vowels pronunciation, certain words, numbers and sentences. The objective was to determine the most accurate classification model (decision tree) using the individual types of speech signals. Cross-validation method was used for evaluation of models. The highest average model accuracy of 66.5% was obtained for data taken when individuals pronounced the numbers.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129902953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880303
Renata-Graziela Boar, A. Iovanovici, H. Ciocarlie
The multitude of events that rapidly take place on the political scene of the whole world have fundamental economic consequences in the development of all countries. Our study combines financial elements which may influence the economic relations that currently exist between the countries of the world and the ones belonging to the European Union in particular. The processing of the high quantity of information is done through complex networks and the graph theory. They reflect the achievement and acceptance of new approaches related to the financial markets, but also to the most important macroeconomic indicator, GDP. Thus, we obtain new tools of analysis through methodological approaches on complex networks which allow numerous geometrical visualizations.
{"title":"Complex network interpretation of European Union economic dynamics","authors":"Renata-Graziela Boar, A. Iovanovici, H. Ciocarlie","doi":"10.1109/SAMI.2017.7880303","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880303","url":null,"abstract":"The multitude of events that rapidly take place on the political scene of the whole world have fundamental economic consequences in the development of all countries. Our study combines financial elements which may influence the economic relations that currently exist between the countries of the world and the ones belonging to the European Union in particular. The processing of the high quantity of information is done through complex networks and the graph theory. They reflect the achievement and acceptance of new approaches related to the financial markets, but also to the most important macroeconomic indicator, GDP. Thus, we obtain new tools of analysis through methodological approaches on complex networks which allow numerous geometrical visualizations.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129932218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880342
Mohammed Faeik Ruzaij, S. Neubert, N. Stoll, K. Thurow
Wheelchair controller selection is very important for users or patients with disabilities like quadriplegia, paralyzed, amputee and elderly. The comfort, simplicity, and safe use, directly affect their social efficiency and quality of life. In this paper, the design and test of a new low-cost intelligent wheelchair controller for users with disabilities has been proposed. It consists of two main controllers, which are the voice controller and the head tilt controller. The voice controller consists of two voice recognition modules that use dynamic time warping DTW and hidden Markov model HMM to implement the voice recognition. This controller has been tested with three global languages English, German, and Chinese at two different noise levels 42 and 72 dB. The voice controller was tested with a motion command and can be used for other parameters like light, sound alarm, etc. The second controller is the head tilt controller. It uses a sophisticated orientation detection module BNO055 to detect and track the user's head orientation and the wheelchair orientation basing on Euler angles. It has an auto-calibrated algorithm to calibrate the control commands and adjust the speed of the wheelchair motors in case of ascending or descending ramp or when passing non-straight roads. The head tilt controller was tested successfully for indoor and outdoor applications.
{"title":"Design and implementation of low-cost intelligent wheelchair controller for quadriplegias and paralysis patient","authors":"Mohammed Faeik Ruzaij, S. Neubert, N. Stoll, K. Thurow","doi":"10.1109/SAMI.2017.7880342","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880342","url":null,"abstract":"Wheelchair controller selection is very important for users or patients with disabilities like quadriplegia, paralyzed, amputee and elderly. The comfort, simplicity, and safe use, directly affect their social efficiency and quality of life. In this paper, the design and test of a new low-cost intelligent wheelchair controller for users with disabilities has been proposed. It consists of two main controllers, which are the voice controller and the head tilt controller. The voice controller consists of two voice recognition modules that use dynamic time warping DTW and hidden Markov model HMM to implement the voice recognition. This controller has been tested with three global languages English, German, and Chinese at two different noise levels 42 and 72 dB. The voice controller was tested with a motion command and can be used for other parameters like light, sound alarm, etc. The second controller is the head tilt controller. It uses a sophisticated orientation detection module BNO055 to detect and track the user's head orientation and the wheelchair orientation basing on Euler angles. It has an auto-calibrated algorithm to calibrate the control commands and adjust the speed of the wheelchair motors in case of ascending or descending ramp or when passing non-straight roads. The head tilt controller was tested successfully for indoor and outdoor applications.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130024868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880355
Juraj Petrík, D. Chudá, Branislav Steinmüller
The paper describes similarity detection method for language independent source code similarity detection. It is based on idea of maximum reusability of standard Unix filters. This method was implemented and benchmarked with different datasets from real world (students' assignments) and also synthetic datasets (perfect plagiarism experiment). Our method achieved significantly better results than competitors, which are considered as gold standard in plagiarism detection.
{"title":"Source code plagiarism detection: The Unix way","authors":"Juraj Petrík, D. Chudá, Branislav Steinmüller","doi":"10.1109/SAMI.2017.7880355","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880355","url":null,"abstract":"The paper describes similarity detection method for language independent source code similarity detection. It is based on idea of maximum reusability of standard Unix filters. This method was implemented and benchmarked with different datasets from real world (students' assignments) and also synthetic datasets (perfect plagiarism experiment). Our method achieved significantly better results than competitors, which are considered as gold standard in plagiarism detection.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121076966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880313
Peter Piros, Rita Fleiner, L. Kovács
Óbuda University wanted to publish public information related to the university in the form of Linked Open Data. Information about subjects, courses, events and teachers are successfully published using the related standards. We had to collect and categorize the sources where information come from; define a way for each category to make these information available; and develop algorithms and softwares to generate the gathered information in form of Linked Open Data. Finally, the automation of the generation process was partly achieved.
{"title":"Linked data generation for courses and events at Óbuda University","authors":"Peter Piros, Rita Fleiner, L. Kovács","doi":"10.1109/SAMI.2017.7880313","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880313","url":null,"abstract":"Óbuda University wanted to publish public information related to the university in the form of Linked Open Data. Information about subjects, courses, events and teachers are successfully published using the related standards. We had to collect and categorize the sources where information come from; define a way for each category to make these information available; and develop algorithms and softwares to generate the gathered information in form of Linked Open Data. Finally, the automation of the generation process was partly achieved.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122006920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880290
A. Lyamin, Elena N. Cherepovskaya
In order to provide high security level, different identification and verification methods are being used in information systems. A development of the new highly accurate methods are of great interest nowadays. Those methods that analyze biometric signals are becoming more widespread as biometric data can provide hardly forged information about a person. This paper presents the developed biometric identification approach and the results of its evaluation on the ECG data collected during the experimental study.
{"title":"An evaluation of biometrie identification approach on low-frequency ECG signal","authors":"A. Lyamin, Elena N. Cherepovskaya","doi":"10.1109/SAMI.2017.7880290","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880290","url":null,"abstract":"In order to provide high security level, different identification and verification methods are being used in information systems. A development of the new highly accurate methods are of great interest nowadays. Those methods that analyze biometric signals are becoming more widespread as biometric data can provide hardly forged information about a person. This paper presents the developed biometric identification approach and the results of its evaluation on the ECG data collected during the experimental study.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115971223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880352
Matus Uchnar, J. Hurtuk
Network security is often neglected even by users. This paper deals with user authentication in a network environment and offers analysis of this topic and possibilities how to increase its security by cryptographic methods. A synthetic part provides a detailed description of the design of a simple web application to authenticate users with protection against selected attacks and also its practical implementation in the form of implementation in PHP. In order to perform later testing there is also design and creation of version without protection mechanisms described in this part. The evaluation part contains the results of testing of both applications in order to demonstrate the effectiveness of methods against attacks. One of the benefits of this work is also demonstration of the necessity of appropriate choice of password by user, considering his length and combination of characters from different character sets. Another benefit is also proving, how easy is to perform such attacks as well as how easy is to implement protection against them. Last but not least, another benefit of this work is a comparison of efficiency of two different password cracking methods.
{"title":"Safe user authentication in a network environment","authors":"Matus Uchnar, J. Hurtuk","doi":"10.1109/SAMI.2017.7880352","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880352","url":null,"abstract":"Network security is often neglected even by users. This paper deals with user authentication in a network environment and offers analysis of this topic and possibilities how to increase its security by cryptographic methods. A synthetic part provides a detailed description of the design of a simple web application to authenticate users with protection against selected attacks and also its practical implementation in the form of implementation in PHP. In order to perform later testing there is also design and creation of version without protection mechanisms described in this part. The evaluation part contains the results of testing of both applications in order to demonstrate the effectiveness of methods against attacks. One of the benefits of this work is also demonstration of the necessity of appropriate choice of password by user, considering his length and combination of characters from different character sets. Another benefit is also proving, how easy is to perform such attacks as well as how easy is to implement protection against them. Last but not least, another benefit of this work is a comparison of efficiency of two different password cracking methods.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125836012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880333
Gábor Kertész, S. Szénási, Z. Vámossy
The Radon transform and the reverse formulas are mostly used in computer tomography to reconstruct the original shape. The projections of an image could be used in computer vision for object recognition, based on projection matching. By comparing the projections, an effective method could be defined. To understand the projection behavior the basic properties of the transform are inspected, and the results of several image transformations are analyzed.
{"title":"Application and properties of the radon transform for object image matching","authors":"Gábor Kertész, S. Szénási, Z. Vámossy","doi":"10.1109/SAMI.2017.7880333","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880333","url":null,"abstract":"The Radon transform and the reverse formulas are mostly used in computer tomography to reconstruct the original shape. The projections of an image could be used in computer vision for object recognition, based on projection matching. By comparing the projections, an effective method could be defined. To understand the projection behavior the basic properties of the transform are inspected, and the results of several image transformations are analyzed.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125467572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}