2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)最新文献

筛选
英文 中文
Analyzing road quality using a mobile application 使用移动应用程序分析道路质量
V. Gaspar
{"title":"Analyzing road quality using a mobile application","authors":"V. Gaspar","doi":"10.1109/SAMI.2017.7880325","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880325","url":null,"abstract":"This paper presents the current progress in acquiring and analyzing the data, obtained from smartphone sensor measurements during a drive with a car. The main aim of the research is to create generic rules to identify road state and its quality. Previously, the mobile application has been created, and measurements began. Currently, we acquired data from more than 500km of daily driving and created a road map using binning and basic clustering. The aggregated values on the map contain information about speed, location and peek linear 3-axial acceleration. In the future, we expect to apply Kalman filtering for cleansing the acceleration data and to continue with evaluating other quality metrics.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"499 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123062388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial neural network based IDS 基于人工神经网络的入侵检测系统
N. Ádám, B. Madoš, A. Baláz, T. Pavlík
{"title":"Artificial neural network based IDS","authors":"N. Ádám, B. Madoš, A. Baláz, T. Pavlík","doi":"10.1109/SAMI.2017.7880294","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880294","url":null,"abstract":"The Network Intrusion Detection Systems (NIDS) are either signature based or anomaly based. In this paper presented NIDS system belongs to anomaly based Neural Network Intrusion Detection System (NNIDS). The proposed NNIDS is able to successfully recognize learned malicious activities in a network environment. It was tested for the SYN flood attack, UDP flood attack, nMap scanning attack, and also for non-malicious communication.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114282174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A speed compensation algorithm for a head tilts controller used for wheelchairs and rehabilitation applications 一种用于轮椅和康复应用的头部倾斜控制器的速度补偿算法
Mohammed Faeik Ruzaij, S. Neubert, N. Stoll, K. Thurow
{"title":"A speed compensation algorithm for a head tilts controller used for wheelchairs and rehabilitation applications","authors":"Mohammed Faeik Ruzaij, S. Neubert, N. Stoll, K. Thurow","doi":"10.1109/SAMI.2017.7880360","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880360","url":null,"abstract":"As quadriplegia patients lost the ability to control the upper and lower limbs due to upper spinal cord injury, they need an intelligent control system to use a traditional electric wheelchair, which is driven normally by a joystick controller. One of the successful control systems for this kind of user is the use of head tilts as a controller. It allows the quadriplegia patient to drive the rehabilitation wheelchair with the head tilt or motion around x, y and z-axes. In this paper, the design and realization of a speed compensation algorithm are proposed. The speed compensation algorithm enhances the head tilts controller performance in case of non-straight roads and passing ramps. It is designed to compensate the lost speed in one or both of the wheelchair motors depending on the value of the road slope angle and the user weight. The algorithm uses a closed loop control by receiving speed feedback from two magnetic encoders fixed at the wheelchair motors. The speed of each motor is calculated by counting the number of wheels rotating per time. The wheelchair position and slope information acquisition are realized using a sophisticated Bosch BNO055 orientation sensor fixed on the wheelchair chassis. The practical tests showed excellent performance for the system enhancing both the control and the safety of the user.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120938558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Semantics as the basis of truly cognitive computing 语义学是真正认知计算的基础
V. Raskin
{"title":"Semantics as the basis of truly cognitive computing","authors":"V. Raskin","doi":"10.1109/SAMI.2017.7880286","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880286","url":null,"abstract":"At the 2014 AAAI, Pat Langley, one of the founders of machine learning and, recently, of its detractors, publicly lamented the current abandonment of the \"big issues\" in AI. Indeed, from emulating human intelligence in the process of learning more about it, AI is often confused with non-intelligent emulation of human intelligent activities. Both in the States and Europe, cognitive computing has emerged as attempts to equip the computer with some knowledge of the domain in which it operates. Cognitive robotics is one of the latest applications of this approach. What I am planning to discuss in the plenary is that our Ontological Semantic Technology offers a framework for capturing, structuring, and computerizing our entire knowledge of the world and anchoring natural language semantics in that knowledge.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121065179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Role of information content in multipurpose virtual engineering space 信息内容在多用途虚拟工程空间中的作用
L. Horváth, I. Rudas
{"title":"Role of information content in multipurpose virtual engineering space","authors":"L. Horváth, I. Rudas","doi":"10.1109/SAMI.2017.7880283","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880283","url":null,"abstract":"This paper is about extended application of virtual engineering principles, methodologies, and systems as a possible answer to urgent need for integrated industrial, research, and higher educational programs and processes. One of the motivations is the changed world of engineering which requires quick utilization of new findings as new context. At the same time, development of virtual engineering allows for and requires organized knowledge, experience, and expertise content as active context in engineering model structures. Laboratory of Intelligent Engineering Systems published research results in relevant topics such as virtual engineering space, active information content, content structure for the driving product system model entities, integrating higher education course into industrial engineering systems, and application of intellectual property at virtual engineering processes. In this paper, multipurpose potential of a formerly defined and industrial virtual technology conform virtual engineering space is analyzed, specific contextual knowledge driving of model entity generation is conceptualized, a modified driving content structure is explained, and intellectual property as source of driving knowledge is considered. Finally, configuration and user programming capabilities of recent professional virtual industrial engineering system is considered as the only way for the implementation of proposed multipurpose concept and method.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126964734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Business rule engine for education in virtual laboratory CyberLabTrainSystem 虚拟实验室CyberLabTrainSystem教学业务规则引擎
T. Lojka, P. Papcun, I. Zolotová
{"title":"Business rule engine for education in virtual laboratory CyberLabTrainSystem","authors":"T. Lojka, P. Papcun, I. Zolotová","doi":"10.1109/SAMI.2017.7880331","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880331","url":null,"abstract":"The aim of this work is to design and build a pilot agile educational extension for a virtual laboratory, CyberLabTrainSystem. We identified and designed a virtual laboratory educational extesnsion that is based on Business Rule Engine (BRE) and Business process model and Notation (BPMN). The output is a web portal, which allows a teacher to easily implement educational methodologies, curricula and improves monitoring, controlling and interactions with students via the BRE.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123965934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Relaxed design conditions for Takagi-Sugeno unknown input observers Takagi-Sugeno未知输入观测器的放宽设计条件
D. Krokavec, A. Filasová
{"title":"Relaxed design conditions for Takagi-Sugeno unknown input observers","authors":"D. Krokavec, A. Filasová","doi":"10.1109/SAMI.2017.7880276","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880276","url":null,"abstract":"New design conditions for the Takagi-Sugeno fuzzy model based unknown input observer, is presented in the paper. By the proposed methods, the design problem is parameterized in terms of linear matrix inequalities in relaxed and enhanced structures. Related to the state decoupling and reconstruction in the given class nonlinear systems, the design steps are revealed in the example for attenuation of an unknown input to the state estimation error.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123410494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new computer based design for a 145 kV SF6 switch 145千伏SF6开关的计算机设计
N. Iacobici, F. Frigura-Iliasa, P. Andea, M. Frigura-Iliasa
{"title":"A new computer based design for a 145 kV SF6 switch","authors":"N. Iacobici, F. Frigura-Iliasa, P. Andea, M. Frigura-Iliasa","doi":"10.1109/SAMI.2017.7880304","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880304","url":null,"abstract":"This paper presents a new approach developed in order to provide a better design solution for the 110–123 kV, SF6 type switches. Having an efficient computer based tool for the design of such important equipment it's always a challenge for any high voltage equipment manufacturer worldwide. We have to mention, in the first part of the paper, the particular technical characteristic of SF6 HV switches and all the advantages of using this type of expensive equipment. Our team developed a simple and new algorithm/procedure and a new software package used to optimize the design of that kind of equipment, briefly described in the second part of the paper. The principles and the solutions involved are part of a contract made with Electroputere S.A. a traditional Romanian high voltage equipment manufacturer. It is not only a classic CAD procedure, but also a computational and testing sequence as well","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121651557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using of the forensic analyzing tools, code obfuscation 使用取证分析工具,进行代码混淆
L. Vokorokos, Zuzana Dankovičová, L. Lescisin
{"title":"Using of the forensic analyzing tools, code obfuscation","authors":"L. Vokorokos, Zuzana Dankovičová, L. Lescisin","doi":"10.1109/SAMI.2017.7880329","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880329","url":null,"abstract":"The main goal of this paper is analyzing the methods of code analysis and proposing the most appropriate methods of sample analysis, executing the process of analyzing the available online and offline analyzing tools and explore ways to prevent hiding malicious pieces of code into the source code. Another aim is to focus on what the obfuscation technique of source code has to offer. Obfuscation can be understood as the transformation of program into another program or special case of data coding. The main purpose of this technique is transform the program to prevent its subsequent analysis and understanding, while the functionality of the program is preserved. Because the code obfuscation is a low cost technique and does not affect portability, it represents one of the most promising methodologies for defending programs against malicious host attacks, as backed up by the increasing interest in this technology. The usual obfuscation approaches that are particularly used by metamorphic viruses are for example data flow and control flow obfuscation.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132361803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Investigation of the TP modeling possibilities of the Hovorka T1DM model Hovorka T1DM模型的TP建模可能性研究
G. Eigner, István Böjthe, Péter Pausits, L. Kovács
{"title":"Investigation of the TP modeling possibilities of the Hovorka T1DM model","authors":"G. Eigner, István Böjthe, Péter Pausits, L. Kovács","doi":"10.1109/SAMI.2017.7880314","DOIUrl":"https://doi.org/10.1109/SAMI.2017.7880314","url":null,"abstract":"Controller design based on Linear Parameter Varying (LPV) and Linear Matrix Inequality (LMI) combination can be extremely useful in modeling and controller design for patient specific physiological systems, which are generally nonlinear, time varying systems. These methods allow us the usage of considerations which come from the linear controller design theorems, but require advanced mathematics and high computational capacity also. In this research we exhibit the usage of the Tensor Product (TP) model transformation regarding diabetes researches as a means to realize a Tensor Product based Type 1 Diabetes Mellitus model, whose basis is a control oriented, deviation based qLPV model. Our primary goal is to realize all possible TP models, derived by choosing different combination of parameters for the qLPV model, and to validate all of them, confirming that all the derived TP models approximately mimic the behavior of the original, nonlinear system having only numeric error.","PeriodicalId":105599,"journal":{"name":"2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133512983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信