Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880325
V. Gaspar
This paper presents the current progress in acquiring and analyzing the data, obtained from smartphone sensor measurements during a drive with a car. The main aim of the research is to create generic rules to identify road state and its quality. Previously, the mobile application has been created, and measurements began. Currently, we acquired data from more than 500km of daily driving and created a road map using binning and basic clustering. The aggregated values on the map contain information about speed, location and peek linear 3-axial acceleration. In the future, we expect to apply Kalman filtering for cleansing the acceleration data and to continue with evaluating other quality metrics.
{"title":"Analyzing road quality using a mobile application","authors":"V. Gaspar","doi":"10.1109/SAMI.2017.7880325","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880325","url":null,"abstract":"This paper presents the current progress in acquiring and analyzing the data, obtained from smartphone sensor measurements during a drive with a car. The main aim of the research is to create generic rules to identify road state and its quality. Previously, the mobile application has been created, and measurements began. Currently, we acquired data from more than 500km of daily driving and created a road map using binning and basic clustering. The aggregated values on the map contain information about speed, location and peek linear 3-axial acceleration. In the future, we expect to apply Kalman filtering for cleansing the acceleration data and to continue with evaluating other quality metrics.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"499 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123062388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880294
N. Ádám, B. Madoš, A. Baláz, T. Pavlík
The Network Intrusion Detection Systems (NIDS) are either signature based or anomaly based. In this paper presented NIDS system belongs to anomaly based Neural Network Intrusion Detection System (NNIDS). The proposed NNIDS is able to successfully recognize learned malicious activities in a network environment. It was tested for the SYN flood attack, UDP flood attack, nMap scanning attack, and also for non-malicious communication.
{"title":"Artificial neural network based IDS","authors":"N. Ádám, B. Madoš, A. Baláz, T. Pavlík","doi":"10.1109/SAMI.2017.7880294","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880294","url":null,"abstract":"The Network Intrusion Detection Systems (NIDS) are either signature based or anomaly based. In this paper presented NIDS system belongs to anomaly based Neural Network Intrusion Detection System (NNIDS). The proposed NNIDS is able to successfully recognize learned malicious activities in a network environment. It was tested for the SYN flood attack, UDP flood attack, nMap scanning attack, and also for non-malicious communication.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114282174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880360
Mohammed Faeik Ruzaij, S. Neubert, N. Stoll, K. Thurow
As quadriplegia patients lost the ability to control the upper and lower limbs due to upper spinal cord injury, they need an intelligent control system to use a traditional electric wheelchair, which is driven normally by a joystick controller. One of the successful control systems for this kind of user is the use of head tilts as a controller. It allows the quadriplegia patient to drive the rehabilitation wheelchair with the head tilt or motion around x, y and z-axes. In this paper, the design and realization of a speed compensation algorithm are proposed. The speed compensation algorithm enhances the head tilts controller performance in case of non-straight roads and passing ramps. It is designed to compensate the lost speed in one or both of the wheelchair motors depending on the value of the road slope angle and the user weight. The algorithm uses a closed loop control by receiving speed feedback from two magnetic encoders fixed at the wheelchair motors. The speed of each motor is calculated by counting the number of wheels rotating per time. The wheelchair position and slope information acquisition are realized using a sophisticated Bosch BNO055 orientation sensor fixed on the wheelchair chassis. The practical tests showed excellent performance for the system enhancing both the control and the safety of the user.
{"title":"A speed compensation algorithm for a head tilts controller used for wheelchairs and rehabilitation applications","authors":"Mohammed Faeik Ruzaij, S. Neubert, N. Stoll, K. Thurow","doi":"10.1109/SAMI.2017.7880360","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880360","url":null,"abstract":"As quadriplegia patients lost the ability to control the upper and lower limbs due to upper spinal cord injury, they need an intelligent control system to use a traditional electric wheelchair, which is driven normally by a joystick controller. One of the successful control systems for this kind of user is the use of head tilts as a controller. It allows the quadriplegia patient to drive the rehabilitation wheelchair with the head tilt or motion around x, y and z-axes. In this paper, the design and realization of a speed compensation algorithm are proposed. The speed compensation algorithm enhances the head tilts controller performance in case of non-straight roads and passing ramps. It is designed to compensate the lost speed in one or both of the wheelchair motors depending on the value of the road slope angle and the user weight. The algorithm uses a closed loop control by receiving speed feedback from two magnetic encoders fixed at the wheelchair motors. The speed of each motor is calculated by counting the number of wheels rotating per time. The wheelchair position and slope information acquisition are realized using a sophisticated Bosch BNO055 orientation sensor fixed on the wheelchair chassis. The practical tests showed excellent performance for the system enhancing both the control and the safety of the user.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120938558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880286
V. Raskin
At the 2014 AAAI, Pat Langley, one of the founders of machine learning and, recently, of its detractors, publicly lamented the current abandonment of the "big issues" in AI. Indeed, from emulating human intelligence in the process of learning more about it, AI is often confused with non-intelligent emulation of human intelligent activities. Both in the States and Europe, cognitive computing has emerged as attempts to equip the computer with some knowledge of the domain in which it operates. Cognitive robotics is one of the latest applications of this approach. What I am planning to discuss in the plenary is that our Ontological Semantic Technology offers a framework for capturing, structuring, and computerizing our entire knowledge of the world and anchoring natural language semantics in that knowledge.
{"title":"Semantics as the basis of truly cognitive computing","authors":"V. Raskin","doi":"10.1109/SAMI.2017.7880286","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880286","url":null,"abstract":"At the 2014 AAAI, Pat Langley, one of the founders of machine learning and, recently, of its detractors, publicly lamented the current abandonment of the \"big issues\" in AI. Indeed, from emulating human intelligence in the process of learning more about it, AI is often confused with non-intelligent emulation of human intelligent activities. Both in the States and Europe, cognitive computing has emerged as attempts to equip the computer with some knowledge of the domain in which it operates. Cognitive robotics is one of the latest applications of this approach. What I am planning to discuss in the plenary is that our Ontological Semantic Technology offers a framework for capturing, structuring, and computerizing our entire knowledge of the world and anchoring natural language semantics in that knowledge.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121065179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880283
L. Horváth, I. Rudas
This paper is about extended application of virtual engineering principles, methodologies, and systems as a possible answer to urgent need for integrated industrial, research, and higher educational programs and processes. One of the motivations is the changed world of engineering which requires quick utilization of new findings as new context. At the same time, development of virtual engineering allows for and requires organized knowledge, experience, and expertise content as active context in engineering model structures. Laboratory of Intelligent Engineering Systems published research results in relevant topics such as virtual engineering space, active information content, content structure for the driving product system model entities, integrating higher education course into industrial engineering systems, and application of intellectual property at virtual engineering processes. In this paper, multipurpose potential of a formerly defined and industrial virtual technology conform virtual engineering space is analyzed, specific contextual knowledge driving of model entity generation is conceptualized, a modified driving content structure is explained, and intellectual property as source of driving knowledge is considered. Finally, configuration and user programming capabilities of recent professional virtual industrial engineering system is considered as the only way for the implementation of proposed multipurpose concept and method.
{"title":"Role of information content in multipurpose virtual engineering space","authors":"L. Horváth, I. Rudas","doi":"10.1109/SAMI.2017.7880283","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880283","url":null,"abstract":"This paper is about extended application of virtual engineering principles, methodologies, and systems as a possible answer to urgent need for integrated industrial, research, and higher educational programs and processes. One of the motivations is the changed world of engineering which requires quick utilization of new findings as new context. At the same time, development of virtual engineering allows for and requires organized knowledge, experience, and expertise content as active context in engineering model structures. Laboratory of Intelligent Engineering Systems published research results in relevant topics such as virtual engineering space, active information content, content structure for the driving product system model entities, integrating higher education course into industrial engineering systems, and application of intellectual property at virtual engineering processes. In this paper, multipurpose potential of a formerly defined and industrial virtual technology conform virtual engineering space is analyzed, specific contextual knowledge driving of model entity generation is conceptualized, a modified driving content structure is explained, and intellectual property as source of driving knowledge is considered. Finally, configuration and user programming capabilities of recent professional virtual industrial engineering system is considered as the only way for the implementation of proposed multipurpose concept and method.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126964734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880331
T. Lojka, P. Papcun, I. Zolotová
The aim of this work is to design and build a pilot agile educational extension for a virtual laboratory, CyberLabTrainSystem. We identified and designed a virtual laboratory educational extesnsion that is based on Business Rule Engine (BRE) and Business process model and Notation (BPMN). The output is a web portal, which allows a teacher to easily implement educational methodologies, curricula and improves monitoring, controlling and interactions with students via the BRE.
{"title":"Business rule engine for education in virtual laboratory CyberLabTrainSystem","authors":"T. Lojka, P. Papcun, I. Zolotová","doi":"10.1109/SAMI.2017.7880331","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880331","url":null,"abstract":"The aim of this work is to design and build a pilot agile educational extension for a virtual laboratory, CyberLabTrainSystem. We identified and designed a virtual laboratory educational extesnsion that is based on Business Rule Engine (BRE) and Business process model and Notation (BPMN). The output is a web portal, which allows a teacher to easily implement educational methodologies, curricula and improves monitoring, controlling and interactions with students via the BRE.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123965934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880276
D. Krokavec, A. Filasová
New design conditions for the Takagi-Sugeno fuzzy model based unknown input observer, is presented in the paper. By the proposed methods, the design problem is parameterized in terms of linear matrix inequalities in relaxed and enhanced structures. Related to the state decoupling and reconstruction in the given class nonlinear systems, the design steps are revealed in the example for attenuation of an unknown input to the state estimation error.
{"title":"Relaxed design conditions for Takagi-Sugeno unknown input observers","authors":"D. Krokavec, A. Filasová","doi":"10.1109/SAMI.2017.7880276","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880276","url":null,"abstract":"New design conditions for the Takagi-Sugeno fuzzy model based unknown input observer, is presented in the paper. By the proposed methods, the design problem is parameterized in terms of linear matrix inequalities in relaxed and enhanced structures. Related to the state decoupling and reconstruction in the given class nonlinear systems, the design steps are revealed in the example for attenuation of an unknown input to the state estimation error.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123410494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880304
N. Iacobici, F. Frigura-Iliasa, P. Andea, M. Frigura-Iliasa
This paper presents a new approach developed in order to provide a better design solution for the 110–123 kV, SF6 type switches. Having an efficient computer based tool for the design of such important equipment it's always a challenge for any high voltage equipment manufacturer worldwide. We have to mention, in the first part of the paper, the particular technical characteristic of SF6 HV switches and all the advantages of using this type of expensive equipment. Our team developed a simple and new algorithm/procedure and a new software package used to optimize the design of that kind of equipment, briefly described in the second part of the paper. The principles and the solutions involved are part of a contract made with Electroputere S.A. a traditional Romanian high voltage equipment manufacturer. It is not only a classic CAD procedure, but also a computational and testing sequence as well
{"title":"A new computer based design for a 145 kV SF6 switch","authors":"N. Iacobici, F. Frigura-Iliasa, P. Andea, M. Frigura-Iliasa","doi":"10.1109/SAMI.2017.7880304","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880304","url":null,"abstract":"This paper presents a new approach developed in order to provide a better design solution for the 110–123 kV, SF6 type switches. Having an efficient computer based tool for the design of such important equipment it's always a challenge for any high voltage equipment manufacturer worldwide. We have to mention, in the first part of the paper, the particular technical characteristic of SF6 HV switches and all the advantages of using this type of expensive equipment. Our team developed a simple and new algorithm/procedure and a new software package used to optimize the design of that kind of equipment, briefly described in the second part of the paper. The principles and the solutions involved are part of a contract made with Electroputere S.A. a traditional Romanian high voltage equipment manufacturer. It is not only a classic CAD procedure, but also a computational and testing sequence as well","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121651557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880329
L. Vokorokos, Zuzana Dankovičová, L. Lescisin
The main goal of this paper is analyzing the methods of code analysis and proposing the most appropriate methods of sample analysis, executing the process of analyzing the available online and offline analyzing tools and explore ways to prevent hiding malicious pieces of code into the source code. Another aim is to focus on what the obfuscation technique of source code has to offer. Obfuscation can be understood as the transformation of program into another program or special case of data coding. The main purpose of this technique is transform the program to prevent its subsequent analysis and understanding, while the functionality of the program is preserved. Because the code obfuscation is a low cost technique and does not affect portability, it represents one of the most promising methodologies for defending programs against malicious host attacks, as backed up by the increasing interest in this technology. The usual obfuscation approaches that are particularly used by metamorphic viruses are for example data flow and control flow obfuscation.
{"title":"Using of the forensic analyzing tools, code obfuscation","authors":"L. Vokorokos, Zuzana Dankovičová, L. Lescisin","doi":"10.1109/SAMI.2017.7880329","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880329","url":null,"abstract":"The main goal of this paper is analyzing the methods of code analysis and proposing the most appropriate methods of sample analysis, executing the process of analyzing the available online and offline analyzing tools and explore ways to prevent hiding malicious pieces of code into the source code. Another aim is to focus on what the obfuscation technique of source code has to offer. Obfuscation can be understood as the transformation of program into another program or special case of data coding. The main purpose of this technique is transform the program to prevent its subsequent analysis and understanding, while the functionality of the program is preserved. Because the code obfuscation is a low cost technique and does not affect portability, it represents one of the most promising methodologies for defending programs against malicious host attacks, as backed up by the increasing interest in this technology. The usual obfuscation approaches that are particularly used by metamorphic viruses are for example data flow and control flow obfuscation.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132361803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/SAMI.2017.7880314
G. Eigner, István Böjthe, Péter Pausits, L. Kovács
Controller design based on Linear Parameter Varying (LPV) and Linear Matrix Inequality (LMI) combination can be extremely useful in modeling and controller design for patient specific physiological systems, which are generally nonlinear, time varying systems. These methods allow us the usage of considerations which come from the linear controller design theorems, but require advanced mathematics and high computational capacity also. In this research we exhibit the usage of the Tensor Product (TP) model transformation regarding diabetes researches as a means to realize a Tensor Product based Type 1 Diabetes Mellitus model, whose basis is a control oriented, deviation based qLPV model. Our primary goal is to realize all possible TP models, derived by choosing different combination of parameters for the qLPV model, and to validate all of them, confirming that all the derived TP models approximately mimic the behavior of the original, nonlinear system having only numeric error.
{"title":"Investigation of the TP modeling possibilities of the Hovorka T1DM model","authors":"G. Eigner, István Böjthe, Péter Pausits, L. Kovács","doi":"10.1109/SAMI.2017.7880314","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880314","url":null,"abstract":"Controller design based on Linear Parameter Varying (LPV) and Linear Matrix Inequality (LMI) combination can be extremely useful in modeling and controller design for patient specific physiological systems, which are generally nonlinear, time varying systems. These methods allow us the usage of considerations which come from the linear controller design theorems, but require advanced mathematics and high computational capacity also. In this research we exhibit the usage of the Tensor Product (TP) model transformation regarding diabetes researches as a means to realize a Tensor Product based Type 1 Diabetes Mellitus model, whose basis is a control oriented, deviation based qLPV model. Our primary goal is to realize all possible TP models, derived by choosing different combination of parameters for the qLPV model, and to validate all of them, confirming that all the derived TP models approximately mimic the behavior of the original, nonlinear system having only numeric error.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133512983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}