Pub Date : 2018-09-01DOI: 10.1109/SISY.2018.8524767
P. Szikora, Bea Ali
The 21st century's knowledge-based society has more and more opportunities to collect and share information with others by info-communication tools. In addition, one can do a lot of activities online, which has several benefits, but the disadvantages shall also be considered. It is further undermining the security-conscious behavior that people can connect to the internet through smart phone, when they are not at home or in a safe place. These tools have become indispensable for individuals, so the purpose of this paper is to call attention to the various dangers connected to smart phones, the importance of data and the privacy of the public, which would develop security-conscious thinking.
{"title":"Information Security in the 21st Century - Smart Phones in Focus","authors":"P. Szikora, Bea Ali","doi":"10.1109/SISY.2018.8524767","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524767","url":null,"abstract":"The 21st century's knowledge-based society has more and more opportunities to collect and share information with others by info-communication tools. In addition, one can do a lot of activities online, which has several benefits, but the disadvantages shall also be considered. It is further undermining the security-conscious behavior that people can connect to the internet through smart phone, when they are not at home or in a safe place. These tools have become indispensable for individuals, so the purpose of this paper is to call attention to the various dangers connected to smart phones, the importance of data and the privacy of the public, which would develop security-conscious thinking.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"42 1","pages":"000255-000260"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80956029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/SISY.2018.8524756
M. Ölvecký, D. Gabriska
This paper presents a theoretical background of main research activity focused on the evaluation of wiping/erasure standards which are mostly implemented in specific software products developed and programming for data wiping. The information saved in storage devices often consists of metadata and trace data. Especially but not only these kinds of data are very important in the process of forensic analysis because they sometimes contain information about interconnection on another file. Most people saving their sensitive information on their local storage devices and later they want to secure erase these files but usually there is a problem with this operation. Secure file destruction is one of many Anti-forensics methods. The outcome of this paper is to define the future research activities focused on the establishment of the suitable digital environment. This environment will be prepared for testing and evaluating selected wiping standards and appropriate eraser software.
{"title":"Wiping Techniques and Anti-Forensics Methods","authors":"M. Ölvecký, D. Gabriska","doi":"10.1109/SISY.2018.8524756","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524756","url":null,"abstract":"This paper presents a theoretical background of main research activity focused on the evaluation of wiping/erasure standards which are mostly implemented in specific software products developed and programming for data wiping. The information saved in storage devices often consists of metadata and trace data. Especially but not only these kinds of data are very important in the process of forensic analysis because they sometimes contain information about interconnection on another file. Most people saving their sensitive information on their local storage devices and later they want to secure erase these files but usually there is a problem with this operation. Secure file destruction is one of many Anti-forensics methods. The outcome of this paper is to define the future research activities focused on the establishment of the suitable digital environment. This environment will be prepared for testing and evaluating selected wiping standards and appropriate eraser software.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"385 1","pages":"000127-000132"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83591552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/SISY.2018.8524831
Zsolt Dongolo, K. Kovacs, Károly Simon, Zsolt Szecsi
The article presents the structure and the functioning of the Nagyappo Android mobile application and its implementation background. The purpose of the project is to create an application that is able to automatically identify legends by image recognition from the Szekeiyföldi Legendárium book and “read” them. To make the audio playback even more interesting, Augmented Reality (AR) elements are integrated into the application. The legends are “read” by the well-known grandfather character from the Legendárium cartoon series. Grandpa (in Hungarian Nagyapo) walks in into the camera view and sitting down on the page of the book tells the story of the legend to which the phone's camera is directed. The application is mainly made for small children. Using the software, they can become acquainted with Transylvania's legends even before they can read. If someone does not have the Szekelyföldi Legendárium book, he/she can still listen to the available content: using the Search functionality, it is possible to search among the available audio books. The media materials (animations, audio books, images) which are used within the application are provided by the Szekelyföldi Legendárium team.
{"title":"Legendárium Nagyappó: Augmented Reality-Based Audiobook Application","authors":"Zsolt Dongolo, K. Kovacs, Károly Simon, Zsolt Szecsi","doi":"10.1109/SISY.2018.8524831","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524831","url":null,"abstract":"The article presents the structure and the functioning of the Nagyappo Android mobile application and its implementation background. The purpose of the project is to create an application that is able to automatically identify legends by image recognition from the Szekeiyföldi Legendárium book and “read” them. To make the audio playback even more interesting, Augmented Reality (AR) elements are integrated into the application. The legends are “read” by the well-known grandfather character from the Legendárium cartoon series. Grandpa (in Hungarian Nagyapo) walks in into the camera view and sitting down on the page of the book tells the story of the legend to which the phone's camera is directed. The application is mainly made for small children. Using the software, they can become acquainted with Transylvania's legends even before they can read. If someone does not have the Szekelyföldi Legendárium book, he/she can still listen to the available content: using the Search functionality, it is possible to search among the available audio books. The media materials (animations, audio books, images) which are used within the application are provided by the Szekelyföldi Legendárium team.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"28 1","pages":"000155-000160"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76963196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/SISY.2018.8524677
Ágnes Incze, Henrietta-Bernadett Jancsó, Z. Szilagyi, Attila Farkas, Csaba Sulyok
Convolutional neural networks (CNNs) are powerful toolkits of machine learning which have proven efficient in the field of image processing and sound recognition. In this paper, a CNN system classifying bird sounds is presented and tested through different configurations and hyperparameters. The MobileNet pre-trained CNN model is fine-tuned using a dataset acquired from the Xeno-canto bird song sharing portal, which provides a large collection of labeled and categorized recordings. Spectrograms generated from the downloaded data represent the input of the neural network. The attached experiments compare various configurations including the number of classes (bird species) and the color scheme of the spectrograms. Results suggest that choosing a color map in line with the images the network has been pre-trained with provides a measurable advantage. The presented system is viable only for a low number of classes.
{"title":"Bird Sound Recognition Using a Convolutional Neural Network","authors":"Ágnes Incze, Henrietta-Bernadett Jancsó, Z. Szilagyi, Attila Farkas, Csaba Sulyok","doi":"10.1109/SISY.2018.8524677","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524677","url":null,"abstract":"Convolutional neural networks (CNNs) are powerful toolkits of machine learning which have proven efficient in the field of image processing and sound recognition. In this paper, a CNN system classifying bird sounds is presented and tested through different configurations and hyperparameters. The MobileNet pre-trained CNN model is fine-tuned using a dataset acquired from the Xeno-canto bird song sharing portal, which provides a large collection of labeled and categorized recordings. Spectrograms generated from the downloaded data represent the input of the neural network. The attached experiments compare various configurations including the number of classes (bird species) and the color scheme of the spectrograms. Results suggest that choosing a color map in line with the images the network has been pre-trained with provides a measurable advantage. The presented system is viable only for a low number of classes.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"30 1","pages":"000295-000300"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75577876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/sisy.2018.8524776
R. Mesiar, M. Komorníková
{"title":"IEEE 16th International Symposium on Intelligent Systems and Informatics","authors":"R. Mesiar, M. Komorníková","doi":"10.1109/sisy.2018.8524776","DOIUrl":"https://doi.org/10.1109/sisy.2018.8524776","url":null,"abstract":"","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"37 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75928465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/SISY.2018.8524656
D. Jocic, I. Štajner-Papuga
The present paper offers a characterization of pairs of aggregation functions (Fst, Uc) so that Fst is a semi-t-operator that is either left of right distributive over the conjunctive uninorm Uc.
{"title":"Left and Right Distributivity of Semi-T-Operators Over Conjunctive Uninorms","authors":"D. Jocic, I. Štajner-Papuga","doi":"10.1109/SISY.2018.8524656","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524656","url":null,"abstract":"The present paper offers a characterization of pairs of aggregation functions (F<inf>st</inf>, U<inf>c</inf>) so that F<inf>st</inf> is a semi-t-operator that is either left of right distributive over the conjunctive uninorm U<inf>c</inf>.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"8 1","pages":"000093-000098"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82553393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/SISY.2018.8524797
Bence Bako, Vivien Emöke Bartha, Károly Simon, Csaba Sulyok, Levente Kintzel
The target audience of the EKETour software system is any organization that manages hikes, tours and/or other outdoor events. The purpose is to create a unified registration interface for tours. This makes signing up easier for returning hikers, because the general information only requires completion upon first registration. The interface provides the possibility for a single user to register the information of multiple people into several profiles. Hikers receive NFC tags to validate at checkpoints. Organizers can use a mobile application to check passers, validate and log their data. The software is designed and implemented at the request of and based on requirements from the Transylvanian Carpathia Society (EKE). The system aims to replace/amend the current personnel on-paper hiker tracking mechanism with a digital solution.
{"title":"EKETour - Software Platform for Organizing Tours","authors":"Bence Bako, Vivien Emöke Bartha, Károly Simon, Csaba Sulyok, Levente Kintzel","doi":"10.1109/SISY.2018.8524797","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524797","url":null,"abstract":"The target audience of the EKETour software system is any organization that manages hikes, tours and/or other outdoor events. The purpose is to create a unified registration interface for tours. This makes signing up easier for returning hikers, because the general information only requires completion upon first registration. The interface provides the possibility for a single user to register the information of multiple people into several profiles. Hikers receive NFC tags to validate at checkpoints. Organizers can use a mobile application to check passers, validate and log their data. The software is designed and implemented at the request of and based on requirements from the Transylvanian Carpathia Society (EKE). The system aims to replace/amend the current personnel on-paper hiker tracking mechanism with a digital solution.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"31 1","pages":"000045-000050"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91430188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/SISY.2018.8524650
Ervin Eross, Peter Adorjan-Ferenc, Balázs Sebestyén, Tibor Fazakas, Zoltán Szabó, Csaba Sulyok
The aim of the Taboo project is to provide a user-friendly interface for creating and managing guitar chord sheets. The target audience is set as musicians with an interest in browsing guitar tablatures and creating their own collection of chord sheets. The essential innovation of the application lies in the interactive interface for creating and editing these sheets, which are described by a Domain Specific Language (DSL). This markup language is interpreted by a rendering engine, facilitating the responsive appearance of the chord sheets on devices with different resolutions. This article presents the Taboo project, including the requirements of the application, its architecture and the details of the implementation. It describes the technologies and tools used during the development process and it demonstrates the usage of the software.
{"title":"Taboo: Chord Sheet Editor and Manager Web Application","authors":"Ervin Eross, Peter Adorjan-Ferenc, Balázs Sebestyén, Tibor Fazakas, Zoltán Szabó, Csaba Sulyok","doi":"10.1109/SISY.2018.8524650","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524650","url":null,"abstract":"The aim of the Taboo project is to provide a user-friendly interface for creating and managing guitar chord sheets. The target audience is set as musicians with an interest in browsing guitar tablatures and creating their own collection of chord sheets. The essential innovation of the application lies in the interactive interface for creating and editing these sheets, which are described by a Domain Specific Language (DSL). This markup language is interpreted by a rendering engine, facilitating the responsive appearance of the chord sheets on devices with different resolutions. This article presents the Taboo project, including the requirements of the application, its architecture and the details of the implementation. It describes the technologies and tools used during the development process and it demonstrates the usage of the software.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"1199 1","pages":"000039-000044"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81525838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/SISY.2018.8524773
Huu Phuoc Dai Nguyen, Rajnai Zoltán
In the near future, drivers will be supported with an intelligent traffic system everywhere by the early warning signals. Moreover, this system can help to minimize vehicle collisions; increase the safe road; decrease the fatal injury for the pedestrians, passengers, and drivers; and inter-vehicle communication. These are some benefits of vehicle to vehicle communication (V2V). With the development of this technology, these vehicles can communicate together and with infrastructure or Road Side Units (RSU). In this article, the authors explored the basic concepts and the benefits of vehicle to vehicle communication. Furthermore, this paper points out several security concerns toward Vehicular Ad hoc Network (VANET) system, vehicle to vehicle and vehicle to infrastructure communication.
{"title":"The Current Security Challenges of Vehicle Communication in the Future Transportation System","authors":"Huu Phuoc Dai Nguyen, Rajnai Zoltán","doi":"10.1109/SISY.2018.8524773","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524773","url":null,"abstract":"In the near future, drivers will be supported with an intelligent traffic system everywhere by the early warning signals. Moreover, this system can help to minimize vehicle collisions; increase the safe road; decrease the fatal injury for the pedestrians, passengers, and drivers; and inter-vehicle communication. These are some benefits of vehicle to vehicle communication (V2V). With the development of this technology, these vehicles can communicate together and with infrastructure or Road Side Units (RSU). In this article, the authors explored the basic concepts and the benefits of vehicle to vehicle communication. Furthermore, this paper points out several security concerns toward Vehicular Ad hoc Network (VANET) system, vehicle to vehicle and vehicle to infrastructure communication.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"20 1","pages":"000161-000166"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89354377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/SISY.2018.8524610
László Schäffer, Zoltán Kincses, Szilveszter Pletl
Combining measurements of different sensors are a crucial step to achieve better precision in pose estimation. Sensor fusion is an effective state estimation method (in this case Kalman filter), which is used in several disciplines. Using sensor fusion, the information from the sensors and the characteristics of each sensor can be used together to improve the estimate and decrease the uncertainty of the measured variables. In this paper a real-time pose estimation algorithm using sensor fusion of visual odometry (optical flow), Inertial Measurement Unit (IMU) and Global Positioning System (GPS) measurements is presented. The IMU contains calibrated three degrees of freedom (3Dof) accelerometer and an also 3DoF gyroscope. A Kalman filter is used for the fusion of the measurements of the different sensors. The algorithm is implemented in MATLAB and on a low-cost Z-7010 Field-Programmable Gate Array (FPGA) using the ZYBO development board, which is capable of real-time pose estimation with sensor fusion.
{"title":"A Real-Time Pose Estimation Algorithm Based on FPGA and Sensor Fusion","authors":"László Schäffer, Zoltán Kincses, Szilveszter Pletl","doi":"10.1109/SISY.2018.8524610","DOIUrl":"https://doi.org/10.1109/SISY.2018.8524610","url":null,"abstract":"Combining measurements of different sensors are a crucial step to achieve better precision in pose estimation. Sensor fusion is an effective state estimation method (in this case Kalman filter), which is used in several disciplines. Using sensor fusion, the information from the sensors and the characteristics of each sensor can be used together to improve the estimate and decrease the uncertainty of the measured variables. In this paper a real-time pose estimation algorithm using sensor fusion of visual odometry (optical flow), Inertial Measurement Unit (IMU) and Global Positioning System (GPS) measurements is presented. The IMU contains calibrated three degrees of freedom (3Dof) accelerometer and an also 3DoF gyroscope. A Kalman filter is used for the fusion of the measurements of the different sensors. The algorithm is implemented in MATLAB and on a low-cost Z-7010 Field-Programmable Gate Array (FPGA) using the ZYBO development board, which is capable of real-time pose estimation with sensor fusion.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"1999 1","pages":"000149-000154"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88272819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}