Pub Date : 2012-06-01DOI: 10.1109/SAMI.2012.6208930
J. Stofa, D. Pal'ová, M. Pavlik
The presented contribution focuses on the area of enterprise security management and the importance of using tools for modeling processes in this field. Within the paper, the enterprise security policy issues are developed and the associated security project is presented. Contribution offers a view on modeling tools as an essential part of the implementation of business processes that affect security. This security is focused on the protection of personal data and all assets that the enterprise works with.
{"title":"Process modeling as a supporting tool for managing of the enterprise security","authors":"J. Stofa, D. Pal'ová, M. Pavlik","doi":"10.1109/SAMI.2012.6208930","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208930","url":null,"abstract":"The presented contribution focuses on the area of enterprise security management and the importance of using tools for modeling processes in this field. Within the paper, the enterprise security policy issues are developed and the associated security project is presented. Contribution offers a view on modeling tools as an essential part of the implementation of business processes that affect security. This security is focused on the protection of personal data and all assets that the enterprise works with.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131564450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-01DOI: 10.1109/SAMI.2012.6208969
V. Komašilovs, E. Stalidzans
Economic benefit of an industrial company depends on forethought deployment of an industrial production system. Robotic systems are used to increase effectiveness of the production system providing variety of automation approaches. The selection of robotic system for particular mission is considered based on options available on the market. The analysis on more detailed level opens opportunity to find better solutions within the domain of heterogeneous robot systems. Authors propose a functional decomposition method that allows the optimization of specification of heterogeneous multi robot system according to defined objective function. Paper describes steps of optimization procedure and provides analysis of practical example. Achieved results are used in development of solution evaluation method using heuristic algorithms. The framework for finding best configuration of the heterogeneous multi-robot system is provided by specification optimization procedure.
{"title":"Procedure of specification optimization of heterogeneous robotic system","authors":"V. Komašilovs, E. Stalidzans","doi":"10.1109/SAMI.2012.6208969","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208969","url":null,"abstract":"Economic benefit of an industrial company depends on forethought deployment of an industrial production system. Robotic systems are used to increase effectiveness of the production system providing variety of automation approaches. The selection of robotic system for particular mission is considered based on options available on the market. The analysis on more detailed level opens opportunity to find better solutions within the domain of heterogeneous robot systems. Authors propose a functional decomposition method that allows the optimization of specification of heterogeneous multi robot system according to defined objective function. Paper describes steps of optimization procedure and provides analysis of practical example. Achieved results are used in development of solution evaluation method using heuristic algorithms. The framework for finding best configuration of the heterogeneous multi-robot system is provided by specification optimization procedure.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134257914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-01DOI: 10.1109/SAMI.2012.6208960
Z. Krizsán, S. Kovács
Robot systems are comprised of several systems working together as a whole. The concrete job of a robotic system determines the elements required by the given task. These reusable and fungible elements can be implemented as robot components which use each other via well-defined interfaces. The behavior of the components and the manner of interaction among them can be standardized by the Robotic Technology Component (RTC) specification. The main component of an RTC system is a central process called naming service, which stores the data about all the other available components. The goal of this paper is to introduce a novel robust RTC system concept, which can handle more naming services to be tolerant for naming services failures.
{"title":"Name service redundancy in robot technology middleware","authors":"Z. Krizsán, S. Kovács","doi":"10.1109/SAMI.2012.6208960","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208960","url":null,"abstract":"Robot systems are comprised of several systems working together as a whole. The concrete job of a robotic system determines the elements required by the given task. These reusable and fungible elements can be implemented as robot components which use each other via well-defined interfaces. The behavior of the components and the manner of interaction among them can be standardized by the Robotic Technology Component (RTC) specification. The main component of an RTC system is a central process called naming service, which stores the data about all the other available components. The goal of this paper is to introduce a novel robust RTC system concept, which can handle more naming services to be tolerant for naming services failures.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114227376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-01DOI: 10.1109/SAMI.2012.6209017
P. Galambos, J. Kocsis
Despite intensive research in the past decades, providing high fidelity haptic feedback in Internet-based telemanipulation is still challenging. As an alternative solution, sensory substitution can be applied to transmit force and tactile information from the remote environment to the human operator. In this paper, an experimental environment is proposed that can be utilized in usability tests and fine tuning of Cognitive Infocommunications (CogInfoCom) based feedback methods for tele-grasping. The main benefit of this system is that it is mainly composed of commercially available components and devices which makes possible the reconstruction of a similar system in other laboratories dealing with sensor-bridging type haptic feedback. The control software is implemented on regular windows PCs, thus its maintenance and customization does not need any special knowledge of real-time operating systems. The master and slave part of the tele-grasping setup are connected via IP network, which gives rise to a number of issues in Internet-based teleoperation caused by network delay. The paper reviews the background of CogInfoCom based force-feedback in general, then describes the proposed experimental environment in details, and finally, presents the result of a pilot experiment that shows the potential of the proposed testbed.
{"title":"Experimental testbed for the investigation of sensor-bridging feedback in tele-grasping","authors":"P. Galambos, J. Kocsis","doi":"10.1109/SAMI.2012.6209017","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6209017","url":null,"abstract":"Despite intensive research in the past decades, providing high fidelity haptic feedback in Internet-based telemanipulation is still challenging. As an alternative solution, sensory substitution can be applied to transmit force and tactile information from the remote environment to the human operator. In this paper, an experimental environment is proposed that can be utilized in usability tests and fine tuning of Cognitive Infocommunications (CogInfoCom) based feedback methods for tele-grasping. The main benefit of this system is that it is mainly composed of commercially available components and devices which makes possible the reconstruction of a similar system in other laboratories dealing with sensor-bridging type haptic feedback. The control software is implemented on regular windows PCs, thus its maintenance and customization does not need any special knowledge of real-time operating systems. The master and slave part of the tele-grasping setup are connected via IP network, which gives rise to a number of issues in Internet-based teleoperation caused by network delay. The paper reviews the background of CogInfoCom based force-feedback in general, then describes the proposed experimental environment in details, and finally, presents the result of a pilot experiment that shows the potential of the proposed testbed.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125577676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-01DOI: 10.1109/SAMI.2012.6209020
M. Vacková, F. Trebuna, Ivan Virgala, M. Kelemen, T. Kelemenová, E. Prada, R. Surovec, Ľ. Miková
The paper concerns to area of in-pipe locomotion. Traditional conceptions of in-pipe machines tend to wheels slipping or self-blocking. Several design stages of improved in-pipe machine are shown. Design of in-pipe machine coming from conception of computer controlled electromechanical device. Final design solution will be able to locomote inside pipe with variation of inner diameter in range from 100 to 200 mm with automatically adjustment to pipe diameter.
{"title":"Intelligent in-pipe machine adjustable to inner pipe diameter","authors":"M. Vacková, F. Trebuna, Ivan Virgala, M. Kelemen, T. Kelemenová, E. Prada, R. Surovec, Ľ. Miková","doi":"10.1109/SAMI.2012.6209020","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6209020","url":null,"abstract":"The paper concerns to area of in-pipe locomotion. Traditional conceptions of in-pipe machines tend to wheels slipping or self-blocking. Several design stages of improved in-pipe machine are shown. Design of in-pipe machine coming from conception of computer controlled electromechanical device. Final design solution will be able to locomote inside pipe with variation of inner diameter in range from 100 to 200 mm with automatically adjustment to pipe diameter.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122788040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-01DOI: 10.1109/SAMI.2012.6208975
M. Ennert, M. Cajkovský, N. Adam
Increase of computing power and network bandwidth has opened new possibilities for using media on internet. The amount of used multimedia has increased automatically several times. Effective management and security of multimedia content is current issue, because it is no rarity to manage and share terabytes of multimedia content on websites nowadays. This paper deals with the proposal of model, which would meet demanding requirements for efficient and safe management of large amounts of media content on the websites. The first step is to analyse existing solutions, compare their features and functions. Nowadays, there are several well-known portal solutions for viewing, sharing, cataloguing and managing of the media content that stand at the forefront of their use thanks to their specific functions and uniqueness. The second step is to analyse the ability to manage content and files and their security in content management system (CMS). The final solution is connection of first and second steps into one unit and creation a model to optimize security and management of multimedia content in CMS Drupal. Results of work are supported by creating a functional prototype of website, which was created during a research phase of this article.
{"title":"Optimization model of management and security of multimedia content using Drupal CMS","authors":"M. Ennert, M. Cajkovský, N. Adam","doi":"10.1109/SAMI.2012.6208975","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208975","url":null,"abstract":"Increase of computing power and network bandwidth has opened new possibilities for using media on internet. The amount of used multimedia has increased automatically several times. Effective management and security of multimedia content is current issue, because it is no rarity to manage and share terabytes of multimedia content on websites nowadays. This paper deals with the proposal of model, which would meet demanding requirements for efficient and safe management of large amounts of media content on the websites. The first step is to analyse existing solutions, compare their features and functions. Nowadays, there are several well-known portal solutions for viewing, sharing, cataloguing and managing of the media content that stand at the forefront of their use thanks to their specific functions and uniqueness. The second step is to analyse the ability to manage content and files and their security in content management system (CMS). The final solution is connection of first and second steps into one unit and creation a model to optimize security and management of multimedia content in CMS Drupal. Results of work are supported by creating a functional prototype of website, which was created during a research phase of this article.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125723874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-01DOI: 10.1109/SAMI.2012.6208974
Jingwen Wu, H. Hamdan
Binning data provides a solution in deducing computation expense in cluster analysis. According to former study, basing cluster analysis on Gaussian mixture models has become a classical and power approach. Mixture approach is one of the most common model-based approaches, which estimates the model parameters by maximizing the likelihood by EM algorithm. According to eigenvalue composition of the variance matrices of the mixture components, parsimonious models are generated. Choosing a right parsimonious model is crucial in obtaining a good result. In this paper, we address the problem of applying mixture approach to binned data (binned-EM algorithm). Six general models are studied and the difference in the performances of six general models is analyzed.
{"title":"Parsimonious Gaussian mixture models of general family for binned data clustering: Mixture approach","authors":"Jingwen Wu, H. Hamdan","doi":"10.1109/SAMI.2012.6208974","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208974","url":null,"abstract":"Binning data provides a solution in deducing computation expense in cluster analysis. According to former study, basing cluster analysis on Gaussian mixture models has become a classical and power approach. Mixture approach is one of the most common model-based approaches, which estimates the model parameters by maximizing the likelihood by EM algorithm. According to eigenvalue composition of the variance matrices of the mixture components, parsimonious models are generated. Choosing a right parsimonious model is crucial in obtaining a good result. In this paper, we address the problem of applying mixture approach to binned data (binned-EM algorithm). Six general models are studied and the difference in the performances of six general models is analyzed.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129020487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-01DOI: 10.1109/SAMI.2012.6208937
S. Jadlovska, J. Sarnovsky
The purpose of this article is to perform an in-depth analysis of the classical double inverted pendulum system using the Inverted Pendula Modeling and Control (IPMaC), a Simulink block library designed by the authors of the paper. The custom function blocks included in the IPMaC offer comprehensive program support for the modeling, simulation and control of classical and rotary inverted pendula systems. The library also incorporates software tools which provide a user-friendly graphical interface (GUI) to modeling and linearization procedures. With the aid of appropriate function blocks, GUI tools and demonstration schemes from the IPMaC, the classical double inverted pendulum system is analyzed, modeled and successfully stabilized in the unstable inverted position.
{"title":"Classical double inverted pendulum — A complex overview of a system","authors":"S. Jadlovska, J. Sarnovsky","doi":"10.1109/SAMI.2012.6208937","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208937","url":null,"abstract":"The purpose of this article is to perform an in-depth analysis of the classical double inverted pendulum system using the Inverted Pendula Modeling and Control (IPMaC), a Simulink block library designed by the authors of the paper. The custom function blocks included in the IPMaC offer comprehensive program support for the modeling, simulation and control of classical and rotary inverted pendula systems. The library also incorporates software tools which provide a user-friendly graphical interface (GUI) to modeling and linearization procedures. With the aid of appropriate function blocks, GUI tools and demonstration schemes from the IPMaC, the classical double inverted pendulum system is analyzed, modeled and successfully stabilized in the unstable inverted position.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"24 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116744267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-01DOI: 10.1109/SAMI.2012.6208946
J. Šesták, V. Rudy
Reconfigurability of manufacturing systems requires new solutions supported by innovative project systems. In solutions of manufacturing engineering systems are significantly in specific areas promoted modular systems using standardized aluminum construct components and accessories. Their integration with technological and other units allows create a flexible and modular solutions of complex manufacturing production systems. In their design is also necessary to use CA software systems, that will significantly contribute to quality improvement of upcoming projects. This article characterizes the approach applied in development of alternatives of such systems in laboratory conditions.
{"title":"Flexible modular system design for production, assembly and testing of product prototypes","authors":"J. Šesták, V. Rudy","doi":"10.1109/SAMI.2012.6208946","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208946","url":null,"abstract":"Reconfigurability of manufacturing systems requires new solutions supported by innovative project systems. In solutions of manufacturing engineering systems are significantly in specific areas promoted modular systems using standardized aluminum construct components and accessories. Their integration with technological and other units allows create a flexible and modular solutions of complex manufacturing production systems. In their design is also necessary to use CA software systems, that will significantly contribute to quality improvement of upcoming projects. This article characterizes the approach applied in development of alternatives of such systems in laboratory conditions.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129069836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-06-01DOI: 10.1109/SAMI.2012.6208959
P. Fanfara, E. Dankova, M. Dufala
Communication security is one of many informatics parts which have huge progress. Sensitive data are increasingly used in communication and that's the reason why is security requirement more timely and important. The risk of obtaining data through an attack increases with enhancing the power of today's computers. Paper attention is mainly devoted to sender authentication based on using digital signature and asymmetric encryption via one-way hash function to calculate public and private keys.
{"title":"Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication","authors":"P. Fanfara, E. Dankova, M. Dufala","doi":"10.1109/SAMI.2012.6208959","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208959","url":null,"abstract":"Communication security is one of many informatics parts which have huge progress. Sensitive data are increasingly used in communication and that's the reason why is security requirement more timely and important. The risk of obtaining data through an attack increases with enhancing the power of today's computers. Paper attention is mainly devoted to sender authentication based on using digital signature and asymmetric encryption via one-way hash function to calculate public and private keys.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126847275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}