Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705192
U. Oktay, M. Aydin, O. K. Sahingoz
Cloud computing has recently emerged and gained momentum to implement existing networks and data centers in a new architecture to enable services in a timely manner. Although it offers tremendous opportunities, there are some major challenges, such as security, that must be solved for efficient usage. Confidentiality is one of the most important points of information security especially in financial, governmental and military usage. In this paper, we propose a hybrid approach for cloud computing to protect cloud users from the untrusted cloud providers and untrusted employees. The proposed approach is built as an improvement on an existing model, which is called AdjointVM. In this model, it is aimed to overcome one of the weakest points of AdjointVM model, the defenselessness of the protection architecture, and to build a more secure cloud environment for users. In AdjointVM, to protect the VM, there have to be two configured VMs: the protected VM and the protector VM. These VMs are connected in a circular chain to monitor intrusions. Unlike AdjointVM, in which the number of running VMs is proportional to the number of VMs that have to be protected, in the proposed model, this number remains the same, and this results in a decrease in the capital expenditure (capex).
{"title":"A circular chain intrusion detection for cloud computing based on improved AdjointVM approach","authors":"U. Oktay, M. Aydin, O. K. Sahingoz","doi":"10.1109/CINTI.2013.6705192","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705192","url":null,"abstract":"Cloud computing has recently emerged and gained momentum to implement existing networks and data centers in a new architecture to enable services in a timely manner. Although it offers tremendous opportunities, there are some major challenges, such as security, that must be solved for efficient usage. Confidentiality is one of the most important points of information security especially in financial, governmental and military usage. In this paper, we propose a hybrid approach for cloud computing to protect cloud users from the untrusted cloud providers and untrusted employees. The proposed approach is built as an improvement on an existing model, which is called AdjointVM. In this model, it is aimed to overcome one of the weakest points of AdjointVM model, the defenselessness of the protection architecture, and to build a more secure cloud environment for users. In AdjointVM, to protect the VM, there have to be two configured VMs: the protected VM and the protector VM. These VMs are connected in a circular chain to monitor intrusions. Unlike AdjointVM, in which the number of running VMs is proportional to the number of VMs that have to be protected, in the proposed model, this number remains the same, and this results in a decrease in the capital expenditure (capex).","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126137556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705221
P. Salgado, P. Afonso
In this paper a fall body detection system for a smartphone device is proposed. Its embedded tri-accelerometer sensor was utilized to collect the information about the body motion used by a real-time Pose Body Model (PBM) identified by an Extended Kalman filter algorithm. The PBM supply an estimate about the vertical pose angle value and a neural network is used to detect body fall incidents. Moreover, an automatic Multimedia Messaging Service (MMS) will be sent to a central of vigilant where additional information including the time and the GPS coordinates, reports the suspected fall location.
{"title":"Fall body detection algorithm based on tri-accelerometer sensors","authors":"P. Salgado, P. Afonso","doi":"10.1109/CINTI.2013.6705221","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705221","url":null,"abstract":"In this paper a fall body detection system for a smartphone device is proposed. Its embedded tri-accelerometer sensor was utilized to collect the information about the body motion used by a real-time Pose Body Model (PBM) identified by an Extended Kalman filter algorithm. The PBM supply an estimate about the vertical pose angle value and a neural network is used to detect body fall incidents. Moreover, an automatic Multimedia Messaging Service (MMS) will be sent to a central of vigilant where additional information including the time and the GPS coordinates, reports the suspected fall location.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133279838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705193
D. Szalóki, Norbert Koszó, K. Csorba, G. Tevesz
This paper presents the optimization of a camera placement for improved localization accuracy. It is the basis of a localization system aiming for high localization accuracy. This goal is achieved using several cameras with very redundant field-of-views. The paper presents the calculation of the localization accuracy - which depends on the camera model and the pixel quantizing error - at one specific point. A method is introduced for handling areas in a probabilistic sense instead of examining only one point. The accuracy can be improved by adding a new camera to the system. The calculation of the optimal position of the new camera at compliance to some restrictions is demonstrated. The Smart Mobile Eyes for Localization (SMEyeL) project is open-source: the source code, all measurement input data and documentation are public available.
为了提高定位精度,本文提出了一种优化摄像机放置的方法。它是实现高定位精度的定位系统的基础。这个目标是通过几个具有冗余视场的相机来实现的。本文给出了特定点定位精度的计算方法,定位精度取决于相机模型和像素量化误差。介绍了一种从概率意义上处理区域的方法,而不是只检查一个点。通过在系统中增加一个新的摄像头,可以提高精度。给出了新摄像机在满足某些约束条件下的最优位置的计算。Smart Mobile Eyes for Localization (SMEyeL)项目是开源的:源代码、所有测量输入数据和文档都是公开的。
{"title":"Optimizing camera placement for localization accuracy","authors":"D. Szalóki, Norbert Koszó, K. Csorba, G. Tevesz","doi":"10.1109/CINTI.2013.6705193","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705193","url":null,"abstract":"This paper presents the optimization of a camera placement for improved localization accuracy. It is the basis of a localization system aiming for high localization accuracy. This goal is achieved using several cameras with very redundant field-of-views. The paper presents the calculation of the localization accuracy - which depends on the camera model and the pixel quantizing error - at one specific point. A method is introduced for handling areas in a probabilistic sense instead of examining only one point. The accuracy can be improved by adding a new camera to the system. The calculation of the optimal position of the new camera at compliance to some restrictions is demonstrated. The Smart Mobile Eyes for Localization (SMEyeL) project is open-source: the source code, all measurement input data and documentation are public available.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133410156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705181
T. Betina, I. Polásek
This paper proposes a method to directly facilitate the author's needs during the creation of text documents or source code. The Information retrieval system is integrated with a text editor in order to find similar documents to the created document during its writing phase. The Suggested retrieval method consists of text extraction and segmentation from different text document formats and source code documents into logical and semantic segments. These segments are subsequently used to calculate similarity with the new document using an optimal matching algorithm.
{"title":"Document creation with Information retrieval system support","authors":"T. Betina, I. Polásek","doi":"10.1109/CINTI.2013.6705181","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705181","url":null,"abstract":"This paper proposes a method to directly facilitate the author's needs during the creation of text documents or source code. The Information retrieval system is integrated with a text editor in order to find similar documents to the created document during its writing phase. The Suggested retrieval method consists of text extraction and segmentation from different text document formats and source code documents into logical and semantic segments. These segments are subsequently used to calculate similarity with the new document using an optimal matching algorithm.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"133 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124254064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705180
Pipik Roman, I. Polásek
Refactoring is necessary in large software projects and an aspect-oriented approach can help to maintain concerns in the source code. While tools for object-oriented refactoring are the usual part of development environments, support for aspect-oriented refactoring is minimal. We analyzed object-oriented bad smells applicable for an aspect-oriented approach and propose a method for the detection of crosscutting concerns and consecutive refactoring.
{"title":"Semi-automatic refactoring to aspect-oriented platform","authors":"Pipik Roman, I. Polásek","doi":"10.1109/CINTI.2013.6705180","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705180","url":null,"abstract":"Refactoring is necessary in large software projects and an aspect-oriented approach can help to maintain concerns in the source code. While tools for object-oriented refactoring are the usual part of development environments, support for aspect-oriented refactoring is minimal. We analyzed object-oriented bad smells applicable for an aspect-oriented approach and propose a method for the detection of crosscutting concerns and consecutive refactoring.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121258473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705203
L. Ladanyi, M. Ďulík, J. Mullerová
In this article we focus on the numerical investigation of random temperature changes in different sections of the optical fibers and their influence on material properties of the fibers. The important issue is to determine whether these temperature changes affect the dispersion and nonlinear effects in the fiber and consequently the transmitted pulse. Moreover, the effects of pressure are also investigated. We found out that the pressure and temperature changes influence dispersion effects in single-channel optical transmission system.
{"title":"Effects of random temperature and pressure influence on the single-channel optical transmission system","authors":"L. Ladanyi, M. Ďulík, J. Mullerová","doi":"10.1109/CINTI.2013.6705203","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705203","url":null,"abstract":"In this article we focus on the numerical investigation of random temperature changes in different sections of the optical fibers and their influence on material properties of the fibers. The important issue is to determine whether these temperature changes affect the dispersion and nonlinear effects in the fiber and consequently the transmitted pulse. Moreover, the effects of pressure are also investigated. We found out that the pressure and temperature changes influence dispersion effects in single-channel optical transmission system.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123683868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705171
M. Kozlovszky
Accurate motion monitoring can provide detailed information through qualitative and quantitative analysis of patient movements in the field of rehabilitation and thus can become an effective tool set for treatment of motion problems. Normally patients are doing rehabilitation training programs under the guidance of their supervisor only during some small fragment (1-2 hours) of the day. Remote motion monitoring can enable skilled medical staff to monitor closely patient's training activities at home during the whole day, thus multi-part (morning, afternoon, evening) training sessions can be included easily into the daily life and in certain cases (e.g.: stroke rehabilitation) this can enhance the healing process significantly and can lead to better restoration results. Accurate movement/motion monitoring can enable medical experts to introduce individual (patient specific) rehabilitation programs, and assess the value of the training program at any time with high granularity level. The MOVANDIS framework is a novel, generic, vendor independent motion data collector and movement visualizer software solution. This paper focuses mainly its internal architecture, and its usage scenarios within the field of telerehabilitation.
{"title":"Enabling patient remote rehabilitation through motion monitoring and analysis","authors":"M. Kozlovszky","doi":"10.1109/CINTI.2013.6705171","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705171","url":null,"abstract":"Accurate motion monitoring can provide detailed information through qualitative and quantitative analysis of patient movements in the field of rehabilitation and thus can become an effective tool set for treatment of motion problems. Normally patients are doing rehabilitation training programs under the guidance of their supervisor only during some small fragment (1-2 hours) of the day. Remote motion monitoring can enable skilled medical staff to monitor closely patient's training activities at home during the whole day, thus multi-part (morning, afternoon, evening) training sessions can be included easily into the daily life and in certain cases (e.g.: stroke rehabilitation) this can enhance the healing process significantly and can lead to better restoration results. Accurate movement/motion monitoring can enable medical experts to introduce individual (patient specific) rehabilitation programs, and assess the value of the training program at any time with high granularity level. The MOVANDIS framework is a novel, generic, vendor independent motion data collector and movement visualizer software solution. This paper focuses mainly its internal architecture, and its usage scenarios within the field of telerehabilitation.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124959723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705201
Mohammad Khanjary
Several Approaches have been proposed so far to optimize traffic lights timing of traffic lights based on different technologies such as wireless sensor networks, fuzzy-neural, agents, fuzzy-genetic algorithm, dynamic programming, petri-nets and recently, game theory. In this paper, we propose a new approach based on game theory. The Simulation results showed that the proposed scheme can improve the traffic significantly.
{"title":"Using game theory to optimize traffic light of an intersection","authors":"Mohammad Khanjary","doi":"10.1109/CINTI.2013.6705201","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705201","url":null,"abstract":"Several Approaches have been proposed so far to optimize traffic lights timing of traffic lights based on different technologies such as wireless sensor networks, fuzzy-neural, agents, fuzzy-genetic algorithm, dynamic programming, petri-nets and recently, game theory. In this paper, we propose a new approach based on game theory. The Simulation results showed that the proposed scheme can improve the traffic significantly.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128756167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705165
Ing Francisco Siles
This paper presents a new dissimilarity measure for the detection of dynamic overlays in football games from TV broadcasting. The detection of the dynamic overlays is used for finding the replays in the input video, that are to be removed for further processing. The replays' detection and removal is part of the first module of the system ACE-Football for the automated interpretation of association football games, which is being developed at the PRIS-lab. Positive results of experiments conducted on several games of the latest FIFA's World Cup are presented.
{"title":"Detection of dynamic overlays for association football from TV broadcasting","authors":"Ing Francisco Siles","doi":"10.1109/CINTI.2013.6705165","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705165","url":null,"abstract":"This paper presents a new dissimilarity measure for the detection of dynamic overlays in football games from TV broadcasting. The detection of the dynamic overlays is used for finding the replays in the input video, that are to be removed for further processing. The replays' detection and removal is part of the first module of the system ACE-Football for the automated interpretation of association football games, which is being developed at the PRIS-lab. Positive results of experiments conducted on several games of the latest FIFA's World Cup are presented.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128446999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705236
A. Sakalli, E. Yesil, Erhan Musaoglu, Cihan Ozturk, M. F. Dodurka
In this study, a further extension of the vehicle routing problem with pickup and delivery (VRPPD) is considered. The VRPPD problem is seen in many practical applications as logistic, distribution and transportation. However, a formal definition of the VRPPD cannot fully represent the real-life daily macro routing problem. For this reason, firstly, a new model of the very close to real-life problem is defined. Secondly, a novel heuristic algorithm with a new objective function is proposed to solve the daily macro routing problem. The proposed nature-inspired algorithm called as Heuristic Bubble Algorithm (HBA) is suitable for the proposed problem because of its particular new operators and fast response. The Matlab simulation results motivate that the proposed model and HBA is capable of solving real-life macro routing problems.
{"title":"Heuristic bubble algorithm for a linehaul routing problem: An extension of a vehicle routing problem with pickup and delivery","authors":"A. Sakalli, E. Yesil, Erhan Musaoglu, Cihan Ozturk, M. F. Dodurka","doi":"10.1109/CINTI.2013.6705236","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705236","url":null,"abstract":"In this study, a further extension of the vehicle routing problem with pickup and delivery (VRPPD) is considered. The VRPPD problem is seen in many practical applications as logistic, distribution and transportation. However, a formal definition of the VRPPD cannot fully represent the real-life daily macro routing problem. For this reason, firstly, a new model of the very close to real-life problem is defined. Secondly, a novel heuristic algorithm with a new objective function is proposed to solve the daily macro routing problem. The proposed nature-inspired algorithm called as Heuristic Bubble Algorithm (HBA) is suitable for the proposed problem because of its particular new operators and fast response. The Matlab simulation results motivate that the proposed model and HBA is capable of solving real-life macro routing problems.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130724667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}