Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705192
U. Oktay, M. Aydin, O. K. Sahingoz
Cloud computing has recently emerged and gained momentum to implement existing networks and data centers in a new architecture to enable services in a timely manner. Although it offers tremendous opportunities, there are some major challenges, such as security, that must be solved for efficient usage. Confidentiality is one of the most important points of information security especially in financial, governmental and military usage. In this paper, we propose a hybrid approach for cloud computing to protect cloud users from the untrusted cloud providers and untrusted employees. The proposed approach is built as an improvement on an existing model, which is called AdjointVM. In this model, it is aimed to overcome one of the weakest points of AdjointVM model, the defenselessness of the protection architecture, and to build a more secure cloud environment for users. In AdjointVM, to protect the VM, there have to be two configured VMs: the protected VM and the protector VM. These VMs are connected in a circular chain to monitor intrusions. Unlike AdjointVM, in which the number of running VMs is proportional to the number of VMs that have to be protected, in the proposed model, this number remains the same, and this results in a decrease in the capital expenditure (capex).
{"title":"A circular chain intrusion detection for cloud computing based on improved AdjointVM approach","authors":"U. Oktay, M. Aydin, O. K. Sahingoz","doi":"10.1109/CINTI.2013.6705192","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705192","url":null,"abstract":"Cloud computing has recently emerged and gained momentum to implement existing networks and data centers in a new architecture to enable services in a timely manner. Although it offers tremendous opportunities, there are some major challenges, such as security, that must be solved for efficient usage. Confidentiality is one of the most important points of information security especially in financial, governmental and military usage. In this paper, we propose a hybrid approach for cloud computing to protect cloud users from the untrusted cloud providers and untrusted employees. The proposed approach is built as an improvement on an existing model, which is called AdjointVM. In this model, it is aimed to overcome one of the weakest points of AdjointVM model, the defenselessness of the protection architecture, and to build a more secure cloud environment for users. In AdjointVM, to protect the VM, there have to be two configured VMs: the protected VM and the protector VM. These VMs are connected in a circular chain to monitor intrusions. Unlike AdjointVM, in which the number of running VMs is proportional to the number of VMs that have to be protected, in the proposed model, this number remains the same, and this results in a decrease in the capital expenditure (capex).","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126137556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705221
P. Salgado, P. Afonso
In this paper a fall body detection system for a smartphone device is proposed. Its embedded tri-accelerometer sensor was utilized to collect the information about the body motion used by a real-time Pose Body Model (PBM) identified by an Extended Kalman filter algorithm. The PBM supply an estimate about the vertical pose angle value and a neural network is used to detect body fall incidents. Moreover, an automatic Multimedia Messaging Service (MMS) will be sent to a central of vigilant where additional information including the time and the GPS coordinates, reports the suspected fall location.
{"title":"Fall body detection algorithm based on tri-accelerometer sensors","authors":"P. Salgado, P. Afonso","doi":"10.1109/CINTI.2013.6705221","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705221","url":null,"abstract":"In this paper a fall body detection system for a smartphone device is proposed. Its embedded tri-accelerometer sensor was utilized to collect the information about the body motion used by a real-time Pose Body Model (PBM) identified by an Extended Kalman filter algorithm. The PBM supply an estimate about the vertical pose angle value and a neural network is used to detect body fall incidents. Moreover, an automatic Multimedia Messaging Service (MMS) will be sent to a central of vigilant where additional information including the time and the GPS coordinates, reports the suspected fall location.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133279838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705193
D. Szalóki, Norbert Koszó, K. Csorba, G. Tevesz
This paper presents the optimization of a camera placement for improved localization accuracy. It is the basis of a localization system aiming for high localization accuracy. This goal is achieved using several cameras with very redundant field-of-views. The paper presents the calculation of the localization accuracy - which depends on the camera model and the pixel quantizing error - at one specific point. A method is introduced for handling areas in a probabilistic sense instead of examining only one point. The accuracy can be improved by adding a new camera to the system. The calculation of the optimal position of the new camera at compliance to some restrictions is demonstrated. The Smart Mobile Eyes for Localization (SMEyeL) project is open-source: the source code, all measurement input data and documentation are public available.
为了提高定位精度,本文提出了一种优化摄像机放置的方法。它是实现高定位精度的定位系统的基础。这个目标是通过几个具有冗余视场的相机来实现的。本文给出了特定点定位精度的计算方法,定位精度取决于相机模型和像素量化误差。介绍了一种从概率意义上处理区域的方法,而不是只检查一个点。通过在系统中增加一个新的摄像头,可以提高精度。给出了新摄像机在满足某些约束条件下的最优位置的计算。Smart Mobile Eyes for Localization (SMEyeL)项目是开源的:源代码、所有测量输入数据和文档都是公开的。
{"title":"Optimizing camera placement for localization accuracy","authors":"D. Szalóki, Norbert Koszó, K. Csorba, G. Tevesz","doi":"10.1109/CINTI.2013.6705193","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705193","url":null,"abstract":"This paper presents the optimization of a camera placement for improved localization accuracy. It is the basis of a localization system aiming for high localization accuracy. This goal is achieved using several cameras with very redundant field-of-views. The paper presents the calculation of the localization accuracy - which depends on the camera model and the pixel quantizing error - at one specific point. A method is introduced for handling areas in a probabilistic sense instead of examining only one point. The accuracy can be improved by adding a new camera to the system. The calculation of the optimal position of the new camera at compliance to some restrictions is demonstrated. The Smart Mobile Eyes for Localization (SMEyeL) project is open-source: the source code, all measurement input data and documentation are public available.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133410156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705199
P. Císar, S. M. Cisar, B. Markoski
Edge detection is an important operation in the analysis of a digital image and includes a set of mathematical methods to identify points of discontinuity. For this purpose, different algorithms are used for estimating image gradient. Many edge detection techniques are implemented with convolution mask and based on discrete approximations to differential operators. Differential operations measure the rate of change in the image brightness function. The compass approach implies taking a single mask and rotating it to major compass orientations. Using a suitable programming environment, this paper provides a comparative visual analysis of several digital images, with the ability to change the kernel set in compass edge detection.
{"title":"Kernel sets in compass edge detection","authors":"P. Císar, S. M. Cisar, B. Markoski","doi":"10.1109/CINTI.2013.6705199","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705199","url":null,"abstract":"Edge detection is an important operation in the analysis of a digital image and includes a set of mathematical methods to identify points of discontinuity. For this purpose, different algorithms are used for estimating image gradient. Many edge detection techniques are implemented with convolution mask and based on discrete approximations to differential operators. Differential operations measure the rate of change in the image brightness function. The compass approach implies taking a single mask and rotating it to major compass orientations. Using a suitable programming environment, this paper provides a comparative visual analysis of several digital images, with the ability to change the kernel set in compass edge detection.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122227277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705203
L. Ladanyi, M. Ďulík, J. Mullerová
In this article we focus on the numerical investigation of random temperature changes in different sections of the optical fibers and their influence on material properties of the fibers. The important issue is to determine whether these temperature changes affect the dispersion and nonlinear effects in the fiber and consequently the transmitted pulse. Moreover, the effects of pressure are also investigated. We found out that the pressure and temperature changes influence dispersion effects in single-channel optical transmission system.
{"title":"Effects of random temperature and pressure influence on the single-channel optical transmission system","authors":"L. Ladanyi, M. Ďulík, J. Mullerová","doi":"10.1109/CINTI.2013.6705203","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705203","url":null,"abstract":"In this article we focus on the numerical investigation of random temperature changes in different sections of the optical fibers and their influence on material properties of the fibers. The important issue is to determine whether these temperature changes affect the dispersion and nonlinear effects in the fiber and consequently the transmitted pulse. Moreover, the effects of pressure are also investigated. We found out that the pressure and temperature changes influence dispersion effects in single-channel optical transmission system.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123683868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705181
T. Betina, I. Polásek
This paper proposes a method to directly facilitate the author's needs during the creation of text documents or source code. The Information retrieval system is integrated with a text editor in order to find similar documents to the created document during its writing phase. The Suggested retrieval method consists of text extraction and segmentation from different text document formats and source code documents into logical and semantic segments. These segments are subsequently used to calculate similarity with the new document using an optimal matching algorithm.
{"title":"Document creation with Information retrieval system support","authors":"T. Betina, I. Polásek","doi":"10.1109/CINTI.2013.6705181","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705181","url":null,"abstract":"This paper proposes a method to directly facilitate the author's needs during the creation of text documents or source code. The Information retrieval system is integrated with a text editor in order to find similar documents to the created document during its writing phase. The Suggested retrieval method consists of text extraction and segmentation from different text document formats and source code documents into logical and semantic segments. These segments are subsequently used to calculate similarity with the new document using an optimal matching algorithm.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"133 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124254064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705180
Pipik Roman, I. Polásek
Refactoring is necessary in large software projects and an aspect-oriented approach can help to maintain concerns in the source code. While tools for object-oriented refactoring are the usual part of development environments, support for aspect-oriented refactoring is minimal. We analyzed object-oriented bad smells applicable for an aspect-oriented approach and propose a method for the detection of crosscutting concerns and consecutive refactoring.
{"title":"Semi-automatic refactoring to aspect-oriented platform","authors":"Pipik Roman, I. Polásek","doi":"10.1109/CINTI.2013.6705180","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705180","url":null,"abstract":"Refactoring is necessary in large software projects and an aspect-oriented approach can help to maintain concerns in the source code. While tools for object-oriented refactoring are the usual part of development environments, support for aspect-oriented refactoring is minimal. We analyzed object-oriented bad smells applicable for an aspect-oriented approach and propose a method for the detection of crosscutting concerns and consecutive refactoring.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"283 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121258473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705232
T. Rubina, M. Mednis, E. Stalidzans
In case of model development, it would be an advantage to assess the quality of available models looking for the best one or to find suitable parts of a published model to build a new one. The differences or contradictions in reconstructions can indicate the level of agreement between different authors about the topic of interest. The intersecting part of models can reveal also the differences in the scope of the models. Two pairs of models from BioCyc database were analyzed: 1) the Escherichia coli models ecol199310cyc and ecol316407cyc and 2) the Saccharomyces cerevisiae models iND750 and iLL672. The ModeRator software tool is used to compare models and generate their intersection model. The structural parameters of models are analyzed by the software BINESA. The study reveals very different parameters of the intersections of the pairs of the E. coli and the S. cerevisiae models. The models built by the same group of authors like in the case of E. coli is selected as an example of a high agreement between models and can be interpreted as a consensus part of two initial models. The intersection of the S. cerevisiae models demonstrates very different structural properties and the intersection model would not be able to function even after significant improvement. The structural analysis of the pairs of original models and their intersections is performed to determine which structural parameters can be used to determine a poor agreement between the pairs of models. It is concluded that an application of the automated comparison and intersection generation of two models can give a fast insight in the similarity of the models to find out the consensus level in modelling of metabolism of a particular organism. This approach can be used also to find similarities between the models of different organisms. Automation of intersection creation and structural analysis are enabling technologies of this approach.
{"title":"Agreement assessment of biochemical pathway models by structural analysis of their intersection","authors":"T. Rubina, M. Mednis, E. Stalidzans","doi":"10.1109/CINTI.2013.6705232","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705232","url":null,"abstract":"In case of model development, it would be an advantage to assess the quality of available models looking for the best one or to find suitable parts of a published model to build a new one. The differences or contradictions in reconstructions can indicate the level of agreement between different authors about the topic of interest. The intersecting part of models can reveal also the differences in the scope of the models. Two pairs of models from BioCyc database were analyzed: 1) the Escherichia coli models ecol199310cyc and ecol316407cyc and 2) the Saccharomyces cerevisiae models iND750 and iLL672. The ModeRator software tool is used to compare models and generate their intersection model. The structural parameters of models are analyzed by the software BINESA. The study reveals very different parameters of the intersections of the pairs of the E. coli and the S. cerevisiae models. The models built by the same group of authors like in the case of E. coli is selected as an example of a high agreement between models and can be interpreted as a consensus part of two initial models. The intersection of the S. cerevisiae models demonstrates very different structural properties and the intersection model would not be able to function even after significant improvement. The structural analysis of the pairs of original models and their intersections is performed to determine which structural parameters can be used to determine a poor agreement between the pairs of models. It is concluded that an application of the automated comparison and intersection generation of two models can give a fast insight in the similarity of the models to find out the consensus level in modelling of metabolism of a particular organism. This approach can be used also to find similarities between the models of different organisms. Automation of intersection creation and structural analysis are enabling technologies of this approach.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"68 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133351848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705165
Ing Francisco Siles
This paper presents a new dissimilarity measure for the detection of dynamic overlays in football games from TV broadcasting. The detection of the dynamic overlays is used for finding the replays in the input video, that are to be removed for further processing. The replays' detection and removal is part of the first module of the system ACE-Football for the automated interpretation of association football games, which is being developed at the PRIS-lab. Positive results of experiments conducted on several games of the latest FIFA's World Cup are presented.
{"title":"Detection of dynamic overlays for association football from TV broadcasting","authors":"Ing Francisco Siles","doi":"10.1109/CINTI.2013.6705165","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705165","url":null,"abstract":"This paper presents a new dissimilarity measure for the detection of dynamic overlays in football games from TV broadcasting. The detection of the dynamic overlays is used for finding the replays in the input video, that are to be removed for further processing. The replays' detection and removal is part of the first module of the system ACE-Football for the automated interpretation of association football games, which is being developed at the PRIS-lab. Positive results of experiments conducted on several games of the latest FIFA's World Cup are presented.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128446999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/CINTI.2013.6705183
S. Belyakov, A. Bozhenyuk, I. Rozenberg
This paper investigates the ways of building the routing algorithms in mechanical transport systems on the basis of knowledge. It is assumed that the expert observing the behavior of the system shows his experience by specifying the subsystems with a specific behavior. To create a routing table, the model of fuzzy temporal hypergraph is used. Fixed and dynamic routing is considered; modifications of Dijkstra's algorithm for the case of a fuzzy temporal graph are shown.
{"title":"Routing in the mechanical transport systems on the basis of knowledge","authors":"S. Belyakov, A. Bozhenyuk, I. Rozenberg","doi":"10.1109/CINTI.2013.6705183","DOIUrl":"https://doi.org/10.1109/CINTI.2013.6705183","url":null,"abstract":"This paper investigates the ways of building the routing algorithms in mechanical transport systems on the basis of knowledge. It is assumed that the expert observing the behavior of the system shows his experience by specifying the subsystems with a specific behavior. To create a routing table, the model of fuzzy temporal hypergraph is used. Fixed and dynamic routing is considered; modifications of Dijkstra's algorithm for the case of a fuzzy temporal graph are shown.","PeriodicalId":439949,"journal":{"name":"2013 IEEE 14th International Symposium on Computational Intelligence and Informatics (CINTI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131838265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}