Pub Date : 2012-06-01DOI: 10.1109/SAMI.2012.6208992
R. Osz
Today we are face so much information which are easily and quickly accessible. I believe that the teachers and the organization are responsible to manage information resources. That is why my research emphasis on mobile communication devices, smart phones, also emphasized the role of organized education. The research focus on the background using new technology devices by new generation.
{"title":"Educational organization for new generation","authors":"R. Osz","doi":"10.1109/SAMI.2012.6208992","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208992","url":null,"abstract":"Today we are face so much information which are easily and quickly accessible. I believe that the teachers and the organization are responsible to manage information resources. That is why my research emphasis on mobile communication devices, smart phones, also emphasized the role of organized education. The research focus on the background using new technology devices by new generation.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126930454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-01DOI: 10.1109/SAMI.2012.6209021
D. Krokavec, A. Filasová, V. Hladký
The paper presents new conditions suitable in design of a stabilizing controller for a class of continuous-time nonlinear systems represented by Takagi-Sugeno models, and measurable premise variables. Based on an enhanced Lyapunov inequality, the conditions are outlined in the terms of linear matrix inequalities to possess a stable structure closest to optimal asymptotic properties. Simulation results illustrate the design procedure and demonstrate the basic performances of the proposed control design method.
{"title":"Stabilizing fuzzy control for a class of nonlinear systems","authors":"D. Krokavec, A. Filasová, V. Hladký","doi":"10.1109/SAMI.2012.6209021","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6209021","url":null,"abstract":"The paper presents new conditions suitable in design of a stabilizing controller for a class of continuous-time nonlinear systems represented by Takagi-Sugeno models, and measurable premise variables. Based on an enhanced Lyapunov inequality, the conditions are outlined in the terms of linear matrix inequalities to possess a stable structure closest to optimal asymptotic properties. Simulation results illustrate the design procedure and demonstrate the basic performances of the proposed control design method.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123001450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-01DOI: 10.1109/SAMI.2012.6208966
A. Mohamed, M. Ahmed, Siu-Cheung Chau
In computer networks, fault detection and identification techniques rely substantially on analyzing a set of observed alarms generated by different network entities due to unknown failures. However, network alarms are subject to becoming lost and spurious and their information is often incomplete, ambiguous, and inconsistent. In this paper, an adaptive distributed Dempster-Shafer evidential reasoning technique is proposed to effectively reduce the negative impact of the uncertainty properties which network alarms can exhibit. Each observed alarm is perceived as a piece of evidence and as such, the incomplete and ambiguous properties can be tackled within the framework of the evidential theory. A discounting mechanism by which the observed alarms are assigned certain weights is also presented. A given weight reflects the significance of the information in the corresponding alarm. Then, the alarms are correlated by the Dempster's rule of combination and the inconsistent alarms play a limited role in the alarm correlation process since they are given lower weights. Simulations confirm that the proposed scheme has a high detection rate even in the presence of defective alarms.
{"title":"A new adaptive evidential reasoning approach for network alarm correlation","authors":"A. Mohamed, M. Ahmed, Siu-Cheung Chau","doi":"10.1109/SAMI.2012.6208966","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208966","url":null,"abstract":"In computer networks, fault detection and identification techniques rely substantially on analyzing a set of observed alarms generated by different network entities due to unknown failures. However, network alarms are subject to becoming lost and spurious and their information is often incomplete, ambiguous, and inconsistent. In this paper, an adaptive distributed Dempster-Shafer evidential reasoning technique is proposed to effectively reduce the negative impact of the uncertainty properties which network alarms can exhibit. Each observed alarm is perceived as a piece of evidence and as such, the incomplete and ambiguous properties can be tackled within the framework of the evidential theory. A discounting mechanism by which the observed alarms are assigned certain weights is also presented. A given weight reflects the significance of the information in the corresponding alarm. Then, the alarms are correlated by the Dempster's rule of combination and the inconsistent alarms play a limited role in the alarm correlation process since they are given lower weights. Simulations confirm that the proposed scheme has a high detection rate even in the presence of defective alarms.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125054263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-01DOI: 10.1109/SAMI.2012.6208990
E. Hajnal, J. Lakner, C. Stenger-Kovács
The recognition of abundance distribution of periphyton species is important both from theoretical ecological aspect, and from the view of the water monitoring practice. The periphyton species showed exponential distribution, but the rare species have an excess above the expected value. The distribution of the rare species can be hardly investigated by classical statistical methods, because the expected value and the standard deviation are in the same order of magnitude. The distribution function was modelled by computer. This software can generate a multitude by the resultant of two different types of distribution functions, and take random samples from it, according to the valid sampling standard. The artificial samples were compared to the real ones by different methods. The distribution of rare species was found to be uniform in the periphyton.
{"title":"Species abundance distribution model for real periphyton samples","authors":"E. Hajnal, J. Lakner, C. Stenger-Kovács","doi":"10.1109/SAMI.2012.6208990","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208990","url":null,"abstract":"The recognition of abundance distribution of periphyton species is important both from theoretical ecological aspect, and from the view of the water monitoring practice. The periphyton species showed exponential distribution, but the rare species have an excess above the expected value. The distribution of the rare species can be hardly investigated by classical statistical methods, because the expected value and the standard deviation are in the same order of magnitude. The distribution function was modelled by computer. This software can generate a multitude by the resultant of two different types of distribution functions, and take random samples from it, according to the valid sampling standard. The artificial samples were compared to the real ones by different methods. The distribution of rare species was found to be uniform in the periphyton.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130183264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-01DOI: 10.1109/SAMI.2012.6208952
V. Rockai, M. Mach
WordNet dictionaries are a commonly used resource in the NLP field. Many papers discuss the theme of WordNet dictionaries, but the processes devoted to their automated construction have still much space for improvement. Many of them are based on machine translation strategies converting the dictionaries from one language to another. Most of them have one attribute in common: they use the knowledge about the language used in the form of dictionaries or even simple grammar parsers. In WordNet dictionaries, terms are represented in the form of concept hierarchies (hypernyms, hyponyms, ...). Since the ALOC approach was used to achieve similar concept structures, we can assume that it could also be used in the area of automated WordNet dictionary construction. This paper discusses such application of ALOC, in the form of correct assignment of new concepts into the existing WordNet hierarchy.
{"title":"Concept mining from natural language texts","authors":"V. Rockai, M. Mach","doi":"10.1109/SAMI.2012.6208952","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208952","url":null,"abstract":"WordNet dictionaries are a commonly used resource in the NLP field. Many papers discuss the theme of WordNet dictionaries, but the processes devoted to their automated construction have still much space for improvement. Many of them are based on machine translation strategies converting the dictionaries from one language to another. Most of them have one attribute in common: they use the knowledge about the language used in the form of dictionaries or even simple grammar parsers. In WordNet dictionaries, terms are represented in the form of concept hierarchies (hypernyms, hyponyms, ...). Since the ALOC approach was used to achieve similar concept structures, we can assume that it could also be used in the area of automated WordNet dictionary construction. This paper discusses such application of ALOC, in the form of correct assignment of new concepts into the existing WordNet hierarchy.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127898923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-01DOI: 10.1109/SAMI.2012.6208999
G. Gyorok, J. Lakner, M. Mako, R. Kováts
During the daily activity we fund huge application in there we us the point-raster like displaying. We use the physiological parameters of human eyes. So we can use discreet light sources as the basic elements of visible picture or simple an alpha-numerical script. And depend of the environmental parameters from the two dimensional space-discreet-, and mostly in time-discreet driving we can a continues images see. For this necessaries an enough high resolution two dimensional matrix-display, there are made from LCD or LED technologies. In this issues we propose and classifying such methods by there on moving mechanical parts we can displaying images with any bright light emitted diodes with cooperation an acceleration sensor and a microcontroller [1] [2].
{"title":"LED displaying on moving mechanical parts","authors":"G. Gyorok, J. Lakner, M. Mako, R. Kováts","doi":"10.1109/SAMI.2012.6208999","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208999","url":null,"abstract":"During the daily activity we fund huge application in there we us the point-raster like displaying. We use the physiological parameters of human eyes. So we can use discreet light sources as the basic elements of visible picture or simple an alpha-numerical script. And depend of the environmental parameters from the two dimensional space-discreet-, and mostly in time-discreet driving we can a continues images see. For this necessaries an enough high resolution two dimensional matrix-display, there are made from LCD or LED technologies. In this issues we propose and classifying such methods by there on moving mechanical parts we can displaying images with any bright light emitted diodes with cooperation an acceleration sensor and a microcontroller [1] [2].","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121410643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-01DOI: 10.1109/SAMI.2012.6208931
J. Gáti, G. Kártyás
Engineering activities are strongly knowledge based. Recent product engineering systems increasingly based on knowledge definition driven product object definition. Knowledge definition and processing can be a common platform of product development in industry and engineering education at universities. The reported research is based on this recognition. The authors of this paper do research in virtual methods based engineering education for several years. In this paper, they summarize, revise, and utilize earlier achievements in a new concept for the application of knowledge processing methods and software tools in virtual engineering systems as assistance for higher education programs. The utmost purpose of the proposed modeling is to move as much as engineering education activity into virtual engineering systems as possible.
{"title":"New ideas for engineering education in virtual environments","authors":"J. Gáti, G. Kártyás","doi":"10.1109/SAMI.2012.6208931","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208931","url":null,"abstract":"Engineering activities are strongly knowledge based. Recent product engineering systems increasingly based on knowledge definition driven product object definition. Knowledge definition and processing can be a common platform of product development in industry and engineering education at universities. The reported research is based on this recognition. The authors of this paper do research in virtual methods based engineering education for several years. In this paper, they summarize, revise, and utilize earlier achievements in a new concept for the application of knowledge processing methods and software tools in virtual engineering systems as assistance for higher education programs. The utmost purpose of the proposed modeling is to move as much as engineering education activity into virtual engineering systems as possible.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122498660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-01DOI: 10.1109/SAMI.2012.6208987
K. Židek, E. Rigasová
The article deals about combination of search algorithm, satellite maps image data with edge detection for trajectory planning. Breath first algorithm is used to create ideal trajectory path for mobile platform movements to finish state. GPS data are used for selection start and finish point and acquiring of actual position of device on satellite maps. Satellite image data are used for obstacles detection by image edges detector to detect buildings. Virtual grid map is fulfilled with unreachable position according of data from edge detector analyzer. For real implementation of algorithm in real platform it is necessary to use local sensors (infrared, ultrasonic) for dynamic obstacle detection during movement and recreating trajectory. Introduced algorithm is specialized for usability in intelligent device for navigation in particular unknown environment in high urbanized areas.
{"title":"Path planning algorithm based on search algorithm, edge detector and GPS data/satellite image for outdoor mobile systems","authors":"K. Židek, E. Rigasová","doi":"10.1109/SAMI.2012.6208987","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208987","url":null,"abstract":"The article deals about combination of search algorithm, satellite maps image data with edge detection for trajectory planning. Breath first algorithm is used to create ideal trajectory path for mobile platform movements to finish state. GPS data are used for selection start and finish point and acquiring of actual position of device on satellite maps. Satellite image data are used for obstacles detection by image edges detector to detect buildings. Virtual grid map is fulfilled with unreachable position according of data from edge detector analyzer. For real implementation of algorithm in real platform it is necessary to use local sensors (infrared, ultrasonic) for dynamic obstacle detection during movement and recreating trajectory. Introduced algorithm is specialized for usability in intelligent device for navigation in particular unknown environment in high urbanized areas.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128077163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-01DOI: 10.1109/SAMI.2012.6209010
W. A. Bhat, S. Quadri
After deletion data recovery is trivial and can be performed by novice hackers. Secure deletion of data can be achieved by overwriting the file's metadata and user data during its deletion. We propose restFS, a reliable and efficient stackable file system, to fulfill the reliability and efficiency lacking in existing transparent per-file secure data deletion file system extensions. restFS is design compatible with all file systems which export block allocation map of a file to VFS and is currently implemented for EXT2 file system. Instead of overwriting at file level found in existing techniques, restFS overwrites at block level for reliability and efficiency. We evaluated the efficiency of restFS using Postmark benchmark and results indicate that restFS can save 28-98% of block overwrites which otherwise need necessarily to be overwritten in existing overwriting techniques. In addition to this, it can reduce the number of write commands issued to disk by 88%.
{"title":"restFS: Secure data deletion using reliable & efficient stackable file system","authors":"W. A. Bhat, S. Quadri","doi":"10.1109/SAMI.2012.6209010","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6209010","url":null,"abstract":"After deletion data recovery is trivial and can be performed by novice hackers. Secure deletion of data can be achieved by overwriting the file's metadata and user data during its deletion. We propose restFS, a reliable and efficient stackable file system, to fulfill the reliability and efficiency lacking in existing transparent per-file secure data deletion file system extensions. restFS is design compatible with all file systems which export block allocation map of a file to VFS and is currently implemented for EXT2 file system. Instead of overwriting at file level found in existing techniques, restFS overwrites at block level for reliability and efficiency. We evaluated the efficiency of restFS using Postmark benchmark and results indicate that restFS can save 28-98% of block overwrites which otherwise need necessarily to be overwritten in existing overwriting techniques. In addition to this, it can reduce the number of write commands issued to disk by 88%.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133525440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-01DOI: 10.1109/SAMI.2012.6208964
P. Butka, J. Pócsová, J. Pócs
In this paper we provide some complexity aspects of incremental algorithm for creation of generalized one-sided concept lattices. The novelty of this algorithm is in its possibility to work with different types of attributes and produce one-sided concept lattice from the generalized one-sided formal context. As it is shown in the paper, the complexity of the algorithm is in general exponential. However, in practice it is reasonable to consider special cases, where the number of attributes is fixed. Then complexity of presented algorithm asymptotically becomes linear function depending on the number of objects in formal context.
{"title":"On some complexity aspects of generalized one-sided concept lattices algorithm","authors":"P. Butka, J. Pócsová, J. Pócs","doi":"10.1109/SAMI.2012.6208964","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208964","url":null,"abstract":"In this paper we provide some complexity aspects of incremental algorithm for creation of generalized one-sided concept lattices. The novelty of this algorithm is in its possibility to work with different types of attributes and produce one-sided concept lattice from the generalized one-sided formal context. As it is shown in the paper, the complexity of the algorithm is in general exponential. However, in practice it is reasonable to consider special cases, where the number of attributes is fixed. Then complexity of presented algorithm asymptotically becomes linear function depending on the number of objects in formal context.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131475596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}