{"title":"Comparison of Optimized PID and Fuzzy Control Strategies on a Mobile Pendulum Robot","authors":"Á. Odry, R. Fuller","doi":"10.1109/SACI.2018.8440947","DOIUrl":"https://doi.org/10.1109/SACI.2018.8440947","url":null,"abstract":"S-This paper investigates the optimized control performances of fuzzy and proportional-integral-derivative (PID) control schemes developed for the stabilization of an under-actuated mobile robot. The fuzzy control strategy had been designed in an earlier paper, its equivalent PID controller-based scheme is established first. Then a complex cost function is defined that evaluates the reference tracking performance, the efficiency of system oscillations suppression and the average current consumption in the motor drive system. The particle swarm optimization (PSO) is applied to tune both control schemes under the same circumstances by minimizing the formulated cost function. Results demonstrate that the optimized fuzzy control strategy provides the same reference tracking quality with significantly better suppression of system oscillations and current peaks compared to the optimized PID control.","PeriodicalId":126087,"journal":{"name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116158950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gabriel Baban, A. Iovanovici, Cristian Cosariu, L. Prodan
{"title":"High Betweeness Nodes and Crowded Intersections: An Experimental Assessment by Means of Simulation","authors":"Gabriel Baban, A. Iovanovici, Cristian Cosariu, L. Prodan","doi":"10.1109/SACI.2018.8440989","DOIUrl":"https://doi.org/10.1109/SACI.2018.8440989","url":null,"abstract":"Abstract-We use the network betweeness metric to rank the nodes of a network and find hot spots, prone to congestion in a road network. By applying complex networks methodologies and metrics we identify a correlation between the two and validate it by using modern road traffic simulation tools. We also provide an empirical assessment based on the authors' insight while using the road infrastructure of the targeted city.","PeriodicalId":126087,"journal":{"name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122845572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two-Stage Racetrack Segmentation Method Using Color Feature Filtering and Superpixel-Based Convolutional Neural Network","authors":"János Hollósi, Ernő Horváth, C. Pozna","doi":"10.1109/SACI.2018.8440968","DOIUrl":"https://doi.org/10.1109/SACI.2018.8440968","url":null,"abstract":"The Széchenyi István University race car team is an active and successful participant of the Shell Eco-marathon for long time ago. The Shell introduces the autonomous vehicle category on the Eco-marathon for 2018. Our long-term goal is to make the Szenergy racing team's vehicle suitable for the autonomous category. The first milestone is to make a reliable computer vision based intelligent detection system that understands the environment of the racing car. In this paper we will present a solution for racetrack detection i.e. a fusion of image processing and neural network systems. The two-stage recognition system is at the first phase an image processing algorithm which finds the red-white and blue-white striped edge of the road, and at the second phase, a pre-trained superpixel-based neural network which recognize the road on the filtered image.","PeriodicalId":126087,"journal":{"name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129927431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Networks and Critical Information Infrastructure","authors":"Zsolt Illési, Aron Halasz, P. J. Varga","doi":"10.1109/SACI.2018.8441023","DOIUrl":"https://doi.org/10.1109/SACI.2018.8441023","url":null,"abstract":"The dynamic development of economy greatly benefits from the penetration of information and communication technology. The rapid expansion of the use of portable info communication devices brings along the expansion of the supporting infrastructure. The explosive growth of wireless networks blurs the boundaries the simple wired and mixed computer networks. The infrastructure operators should focus on the complex and protected, fully comprehensive network security, instead of managing and protecting individual network segments. Today it is impossible to imagine an up to date workstation, which were not supported by some up to cutting-edge solution. This is the same in the critical information infrastructures (CII). The infrastructure operators are able to adequately protect their wired networks from unauthorised external attacks. On the other hand wireless networks begin a new epoch in network and information security. In this paper we introduce the wireless networking trends in Budapest, based on our decade-long survey. We also evaluate this data in the light of the known wireless attack types.","PeriodicalId":126087,"journal":{"name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130384373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Experiences of Online Education, MOOC Courses, at a University with Technical Training","authors":"F. Hegyesi, G. Kártyás, J. Gáti","doi":"10.1109/SACI.2018.8440983","DOIUrl":"https://doi.org/10.1109/SACI.2018.8440983","url":null,"abstract":"The government has produced several documents, lately, which referred to teaching strategies. They have focused on e-learning, and the need for online training in modern education. There is a significant challenge regarding for the “z” generation for universities, since more than half of the students are currently working beside their studies. Universities have to focus on the needs of the students, besides their training and preparation for their studies as well as their jobs and family life. The response to these challenges is providing online courses, which are suited for this new generation of students, making sure that the courses available for the students are increasing in number as well as quality of teaching. The University of Óduda in 2017/18 has started 7 different K-MOOC courses in 61 syllabuses. The choices are wide, including engineering, social, economic and even healthcare syllabuses. So far we have over 10000 students enrolled in these course. This presentation will give light to our experiences so far.","PeriodicalId":126087,"journal":{"name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127791769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Concerns Towards Security Operations Centers","authors":"David Janos Feher, Nguyen Huu Phuoc Dai","doi":"10.1109/SACI.2018.8440963","DOIUrl":"https://doi.org/10.1109/SACI.2018.8440963","url":null,"abstract":"A security operations center (SOC) is a centralized place for monitoring and frequently managing the safety and security of the company's status. The primary purpose of SOC is to enable better incident detection, investigation, and response capabilities by using data from endpoint devices, logs, security systems, and network flows. Moreover, an efficient SOC can help the organizations enhance the ability of situational awareness and increase the deployment of enterprise resources to mitigate the security issues. However, the cyber threats are the significant challenges for SOC. In this paper, the authors expressed some security threats towards SOC and several solutions to fight against them.","PeriodicalId":126087,"journal":{"name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133028451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mass Event Monitoring by Using Mobile Cell Information: A Case Study for Budapest at the Celebration of the State Foundation Day","authors":"Miklos Mezei, I. Felde","doi":"10.1109/SACI.2018.8440961","DOIUrl":"https://doi.org/10.1109/SACI.2018.8440961","url":null,"abstract":"In case of open-air mass events, such as festivals, concerts, huge amount of people are concentrated on a relatively small territory. To guarantee the public safety and optimize the evacuation plan in such situations, the authorities need an effective tool to estimate the crowd size and monitor the mass movement patterns in real time. As a possible method, our case study utilize the TELCO mobile communication dataset concerning on the downtown of Budapest during the public ceremonies and festivities of State Foundtaion Day in the year 2014.","PeriodicalId":126087,"journal":{"name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127482968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and Simulation of an Operational Transformation Algorithm Using Finite State Machines","authors":"C. Gadea, B. Ionescu, D. Ionescu","doi":"10.1109/SACI.2018.8440930","DOIUrl":"https://doi.org/10.1109/SACI.2018.8440930","url":null,"abstract":"Although the principles of real-time collaborative editing have been explored since the eighties, team collaboration software facilitating the completion of tasks as a group continues to be a very hot research topic. A series of theoretical and practical results obtained by the research and industrial communities originated in the theory of distributed computing. They were devised for managing the concurrent nature of user actions and for maintaining the consistency of data as changes are introduced randomly, by multiple users and in real-time. As such, centralized collaborative editing servers were designed to allow users to work in parallel on a document from a typical web browser. In order to maintain the consistency of the content being modified at different sites in different orders, Operational Transformation (OT) mechanisms are at the core of collaboration servers enabling web-based co-editing. However, as expected of modern web application deployments, a centralized OT algorithm is required that must also exhibit properties such as scalability and reliability. In this paper, the processes involved in the client-server interactions of OT are modeled as real-time systems using Finite State Machine (FSM) theory. The consistency of the data is controlled by formal groups of FSMs. Hierarchical FSMs are used to define and simulate the real-time behavior of client and server components when processing and transforming changes initiated by users. The FSM-based OT implementation is tested using random inputs and the approach is shown to be helpful for organizing and managing the complex distributed aspects of such algorithms.","PeriodicalId":126087,"journal":{"name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132877798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Tool for Audio Signal Analysis and Automatic Music Transcription","authors":"L. Chis, M. Marcu, Florin Dragan","doi":"10.1109/SACI.2018.8440966","DOIUrl":"https://doi.org/10.1109/SACI.2018.8440966","url":null,"abstract":"Music transcription could be defined as an act of listening to a piece of music and writing down music notation for the piece. In this paper we describe our work on automatic music transcription of single instrument polyphonic music. We developed a software tool that can be used to address all the phases of automatic music transcription process.","PeriodicalId":126087,"journal":{"name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115871087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Software Tools for Hydrogel-Based Bioprinting","authors":"A. Robu, Nicolae Robu, A. Neagu","doi":"10.1109/SACI.2018.8440971","DOIUrl":"https://doi.org/10.1109/SACI.2018.8440971","url":null,"abstract":"Tissue engineering seeks to solve the problem of donor organ shortage by building tissues and organs in the laboratory. A powerful approach to tissue engineering is three-dimensional (3D) bioprinting-a numerically controlled deposition of cells and biomaterials. The outcome of bioprinting, however, depends on subsequent cell movements governed by mechanisms known from developmental biology. This work presents new informatics tools for predicting post-printing structure formation in bioprinted constructs. We extended the SIMMMC application, developed for simulating cell rearrangements in scaffold-based tissue engineering, with new modules for modeling and simulating the evolution of bioprinted tissue constructs, composed of cells, hydrogels, and cell culture medium. We adapted the Metropolis Monte Carlo algorithm, which lies at the basis of our simulations, such that it takes into consideration the energies of interaction between all the elements of the system. We also created a module that generates automatically the 3D models of fabricated tissue constructs, after loading an XYZ file. Thus, we have the possibility to integrate in our platform many architectures of bioprinted tissue constructs. To validate our new software components, we generated two models used in experiments and simulated their evolution, finding a qualitative agreement between experiments and simulations. The software packages presented here might be used to optimize extrusion-based bioprinting by testing various paths of the print head and diverse cell-cell and cell-hydrogel interactions.","PeriodicalId":126087,"journal":{"name":"2018 IEEE 12th International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114275022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}