Ales Tavcar, M. Gams, M. Kvassay, M. Laclavik, L. Hluchý, B. Schneider, H. Bracker
{"title":"Graph-based analysis of data from human behaviour simulations","authors":"Ales Tavcar, M. Gams, M. Kvassay, M. Laclavik, L. Hluchý, B. Schneider, H. Bracker","doi":"10.1109/SAMI.2012.6209003","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6209003","url":null,"abstract":"In this article, which describes our current work in progress, we demonstrate the potential and universality of graph-based methods for analysing data from computer simulations of human behaviour. The first method, MASDA algorithm, analyses action sequences through an ontology-driven process of abstraction, and aims at isolating strategic sequences and strategic action descriptions in a graphical and symbolic form. The second method, based on the spreading activation algorithm, aims at finding significant correlations between the simulation results and its various internal parameters, settings, events and entities. We illustrate our methods in the context of the EDA project A-0938-RT-GC EUSAS, where they are to be used after validation.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116331663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Complete low cost SCADA system of the intelligent house","authors":"O. Krejcar","doi":"10.1109/SAMI.2012.6208985","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208985","url":null,"abstract":"This project is concerned with the visualisation and operating of an industrial automatic machine from Amit company. Due to the developed SCADA software it is possible to control a specific system of a family house heating which is based on the control elements of Amit Company and the regulators that are compatible with this system. The realized system is implemented and tested in real running of a family house. The software is connected directly to the internal network DB-Net which enables communication on the basis of industrial bus called Ethernet. From this network the software is able to read data of known variables and operate the action parts of PLC programme in accordance to the project documentation input. The developed SCADA system was realized on a platform .NET Framework in the C# language.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116375350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient detection of malicious nodes based on DNS and statistical methods","authors":"P. Marko, P. Vilhan","doi":"10.1109/SAMI.2012.6208963","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208963","url":null,"abstract":"The power and flexibility of botnets is rising together with increasing the computational power of personal computers and growing network bandwidth. This implies extreme demands on ISP's security resources in contrast to minimizing the delay and maximizing the throughput of the network. The main contribution of our approach is ability to detect botnet's nodes in LAN using resource friendly solution. This brings high efficiency into the dealing with malicious host's activity. The proposed solution can be transparently integrated into existing security infrastructure even on legacy hardware.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124020296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Requirement analysis of the internal modules of natural language processing engines","authors":"P. Barabas, L. Kovács","doi":"10.1109/SAMI.2012.6209005","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6209005","url":null,"abstract":"This paper describesr the modules of natural language processing (NLP) engine which can be used with Hungarian input. There are many standard NLP engines which have tokenization, part-of-speech (POS) tagging, named entity recognition, parsing modules. Most of them work for universal languages like English. Processing of Hungarian language is a much more difficult and there cannot be found such a complete NLP system which satisfies all tasks for syntactic and semantic analysis of incoming inputs. This paper summarizes the existing solutions and techniques and gives a brief description of a proposed NLP engine using for inputs in Hungarian language.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128478842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Lakner, G. Gyorok, R. Kováts, V. Varga, Z. Olah
{"title":"Homogenization and preheating of non heat treatable aluminium alloys","authors":"J. Lakner, G. Gyorok, R. Kováts, V. Varga, Z. Olah","doi":"10.1109/SAMI.2012.6208998","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208998","url":null,"abstract":"The strength characteristics of non heat treatable aluminium alloys (AlMn, AlMg) are formed by work hardening and softening (annealing) heat treatment. In case of the aluminium alloys the aim of homogenization is usually double, partly the increase of the formability during the plastic deformation, partly the achievement of high strength values. At the non heat treatable alloys the effect of homogenization is less in the forming of these characteristics, its role is to keep back the development of rough crystal structure and earing of deep drawbility materials.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125383572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attitude maneuver path optimization for small scale spacescraft","authors":"Runle Du, Jiaqi Liu, Yonghai Wang","doi":"10.1109/SAMI.2012.6208949","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208949","url":null,"abstract":"During its flight, Spacecrafts need to maneuver its attitude across a number of predefined positions. The order to traverse these attitudes is a combinational optimization problem. In this article, fuel cost is estimated by analyzing the angular momentum change during attitude transitions. Based on this estimation, an optimization algorithm for both fuel-cost and maneuver-time oriented path planner is introduced. Simulation result demonstrated the effectiveness of proposed approach.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123298209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactive participatory design of production systems","authors":"J. Kováč, R. Kocis","doi":"10.1109/SAMI.2012.6208947","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208947","url":null,"abstract":"Higher innovative targets presented by high-tech manufacturing and production systems impose condition on large demands for the preparation of the project. These demands can only take adequate development of project activities and support advanced technologies, information and knowledge systems, ensuring the desired quality of implemented projects. Among the factors which positively influencing the process of rapid implementation of advanced manufacturing systems include the application of innovative methods of design. The reported approach allows obtaining variants with the possibility to use the type of projects.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"173 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120940335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preparing databases for network traffic monitoring","authors":"L. Vokorokos, A. Pekár, N. Ádám","doi":"10.1109/SAMI.2012.6208950","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208950","url":null,"abstract":"This paper deals with the solution of database related problems which can occur during network traffic monitoring. During data evaluation through a database excessive response time can be noticed. While the time necessary to obtain the data from the database has a significant effect on the result of the monitoring, it is important to keep its value as low as possible. Practically, the vast majority of the monitoring tools have to deal with the problems related to the database's excessive response time, so their solution is really justified. In this paper an alternative method of network monitoring, the BasicMeter tool will be introduced by which the exact problems and their solution will be illustrated.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"528 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113995955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion detection system based on system behavior","authors":"M. Tomásek, M. Cajkovský, B. Madoš","doi":"10.1109/SAMI.2012.6208971","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208971","url":null,"abstract":"This work aims to designing and implementing own intrusion detection system based on system behavior. The main component of this system used in analysis and later in implementation is widely used against defending to another type of crime. Presumption that some techniques are well working against particular type of computer criminality leads to using those techniques against another type of computer criminality. An intrusion detection systems based on system behavior in general evaluates the behavior of observed system. Therefore the level of system observation is very important. We propose intrusion detection system that works at low level system observation. This is important because of many malicious codes nowadays mask their behavior and therefore is difficult to expose those malicious codes from user perspective. Proposed intrusion detection system aims to be modular because of achieving further development and also as simple as possible because of better user understanding. The interconnection of existing technologies and solutions and developing new one result to complex intrusion detection system.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131366487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust electronic application by PSoC","authors":"G. Gyorok, J. Lakner, M. Mako","doi":"10.1109/SAMI.2012.6209000","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6209000","url":null,"abstract":"Prevalently occur in electronic components, which are also programmable analog circuits. Particularly promising is a symbiosis in which the circuit can be programmed and cooperation of a microcontroller can be realized. Because of these types of devices are becoming more common, a classic circuit and system techniques storey enjoying a renaissance, which was previously difficult to achieve because of the much less important. Typical such application the robust electronics analog systems. Its function then efficient, if the electronic circuit is certain his behavior, its certain parameters, the changed according to conditions, we can modify it. If we place an embedded controller in the environment of the analogous system, that for us important parameters values it, then the controller because of depends of an algorithm, it may intervene in the function of an analogous electronic circuit. We place one or more programmable system on chip (PSoC)1 circuit - mostly inside of a microcontroller - if it is analogous in an electronic circuit system, on suitable places, then these parametrical and you are topology configuring we may intervene very efficiently[5] [2]. Other hand, the use of Field Programmable Analog Arrays (FPAA) or newer version of them, PSoC device suggests on a great opportunity to give additional advantages. More great opportunity is the co-operation of the PSoC's microcontrollers. It is very important to develop such an architecture that allows maximum flexibility and circuit-freedom too[3].","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131372977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}