2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)最新文献

筛选
英文 中文
Graph-based analysis of data from human behaviour simulations 基于图形的人类行为模拟数据分析
Ales Tavcar, M. Gams, M. Kvassay, M. Laclavik, L. Hluchý, B. Schneider, H. Bracker
{"title":"Graph-based analysis of data from human behaviour simulations","authors":"Ales Tavcar, M. Gams, M. Kvassay, M. Laclavik, L. Hluchý, B. Schneider, H. Bracker","doi":"10.1109/SAMI.2012.6209003","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6209003","url":null,"abstract":"In this article, which describes our current work in progress, we demonstrate the potential and universality of graph-based methods for analysing data from computer simulations of human behaviour. The first method, MASDA algorithm, analyses action sequences through an ontology-driven process of abstraction, and aims at isolating strategic sequences and strategic action descriptions in a graphical and symbolic form. The second method, based on the spreading activation algorithm, aims at finding significant correlations between the simulation results and its various internal parameters, settings, events and entities. We illustrate our methods in the context of the EDA project A-0938-RT-GC EUSAS, where they are to be used after validation.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116331663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Complete low cost SCADA system of the intelligent house 完整的低成本智能住宅SCADA系统
O. Krejcar
{"title":"Complete low cost SCADA system of the intelligent house","authors":"O. Krejcar","doi":"10.1109/SAMI.2012.6208985","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208985","url":null,"abstract":"This project is concerned with the visualisation and operating of an industrial automatic machine from Amit company. Due to the developed SCADA software it is possible to control a specific system of a family house heating which is based on the control elements of Amit Company and the regulators that are compatible with this system. The realized system is implemented and tested in real running of a family house. The software is connected directly to the internal network DB-Net which enables communication on the basis of industrial bus called Ethernet. From this network the software is able to read data of known variables and operate the action parts of PLC programme in accordance to the project documentation input. The developed SCADA system was realized on a platform .NET Framework in the C# language.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116375350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient detection of malicious nodes based on DNS and statistical methods 基于DNS和统计方法的高效恶意节点检测
P. Marko, P. Vilhan
{"title":"Efficient detection of malicious nodes based on DNS and statistical methods","authors":"P. Marko, P. Vilhan","doi":"10.1109/SAMI.2012.6208963","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208963","url":null,"abstract":"The power and flexibility of botnets is rising together with increasing the computational power of personal computers and growing network bandwidth. This implies extreme demands on ISP's security resources in contrast to minimizing the delay and maximizing the throughput of the network. The main contribution of our approach is ability to detect botnet's nodes in LAN using resource friendly solution. This brings high efficiency into the dealing with malicious host's activity. The proposed solution can be transparently integrated into existing security infrastructure even on legacy hardware.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124020296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Requirement analysis of the internal modules of natural language processing engines 自然语言处理引擎内部模块需求分析
P. Barabas, L. Kovács
{"title":"Requirement analysis of the internal modules of natural language processing engines","authors":"P. Barabas, L. Kovács","doi":"10.1109/SAMI.2012.6209005","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6209005","url":null,"abstract":"This paper describesr the modules of natural language processing (NLP) engine which can be used with Hungarian input. There are many standard NLP engines which have tokenization, part-of-speech (POS) tagging, named entity recognition, parsing modules. Most of them work for universal languages like English. Processing of Hungarian language is a much more difficult and there cannot be found such a complete NLP system which satisfies all tasks for syntactic and semantic analysis of incoming inputs. This paper summarizes the existing solutions and techniques and gives a brief description of a proposed NLP engine using for inputs in Hungarian language.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128478842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Homogenization and preheating of non heat treatable aluminium alloys 非热处理铝合金的均匀化和预热
J. Lakner, G. Gyorok, R. Kováts, V. Varga, Z. Olah
{"title":"Homogenization and preheating of non heat treatable aluminium alloys","authors":"J. Lakner, G. Gyorok, R. Kováts, V. Varga, Z. Olah","doi":"10.1109/SAMI.2012.6208998","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208998","url":null,"abstract":"The strength characteristics of non heat treatable aluminium alloys (AlMn, AlMg) are formed by work hardening and softening (annealing) heat treatment. In case of the aluminium alloys the aim of homogenization is usually double, partly the increase of the formability during the plastic deformation, partly the achievement of high strength values. At the non heat treatable alloys the effect of homogenization is less in the forming of these characteristics, its role is to keep back the development of rough crystal structure and earing of deep drawbility materials.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125383572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attitude maneuver path optimization for small scale spacescraft 小型航天器姿态机动路径优化
Runle Du, Jiaqi Liu, Yonghai Wang
{"title":"Attitude maneuver path optimization for small scale spacescraft","authors":"Runle Du, Jiaqi Liu, Yonghai Wang","doi":"10.1109/SAMI.2012.6208949","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208949","url":null,"abstract":"During its flight, Spacecrafts need to maneuver its attitude across a number of predefined positions. The order to traverse these attitudes is a combinational optimization problem. In this article, fuel cost is estimated by analyzing the angular momentum change during attitude transitions. Based on this estimation, an optimization algorithm for both fuel-cost and maneuver-time oriented path planner is introduced. Simulation result demonstrated the effectiveness of proposed approach.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123298209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interactive participatory design of production systems 生产系统的互动参与式设计
J. Kováč, R. Kocis
{"title":"Interactive participatory design of production systems","authors":"J. Kováč, R. Kocis","doi":"10.1109/SAMI.2012.6208947","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208947","url":null,"abstract":"Higher innovative targets presented by high-tech manufacturing and production systems impose condition on large demands for the preparation of the project. These demands can only take adequate development of project activities and support advanced technologies, information and knowledge systems, ensuring the desired quality of implemented projects. Among the factors which positively influencing the process of rapid implementation of advanced manufacturing systems include the application of innovative methods of design. The reported approach allows obtaining variants with the possibility to use the type of projects.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"173 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120940335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preparing databases for network traffic monitoring 准备网络流量监控数据库
L. Vokorokos, A. Pekár, N. Ádám
{"title":"Preparing databases for network traffic monitoring","authors":"L. Vokorokos, A. Pekár, N. Ádám","doi":"10.1109/SAMI.2012.6208950","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208950","url":null,"abstract":"This paper deals with the solution of database related problems which can occur during network traffic monitoring. During data evaluation through a database excessive response time can be noticed. While the time necessary to obtain the data from the database has a significant effect on the result of the monitoring, it is important to keep its value as low as possible. Practically, the vast majority of the monitoring tools have to deal with the problems related to the database's excessive response time, so their solution is really justified. In this paper an alternative method of network monitoring, the BasicMeter tool will be introduced by which the exact problems and their solution will be illustrated.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"528 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113995955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Intrusion detection system based on system behavior 基于系统行为的入侵检测系统
M. Tomásek, M. Cajkovský, B. Madoš
{"title":"Intrusion detection system based on system behavior","authors":"M. Tomásek, M. Cajkovský, B. Madoš","doi":"10.1109/SAMI.2012.6208971","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6208971","url":null,"abstract":"This work aims to designing and implementing own intrusion detection system based on system behavior. The main component of this system used in analysis and later in implementation is widely used against defending to another type of crime. Presumption that some techniques are well working against particular type of computer criminality leads to using those techniques against another type of computer criminality. An intrusion detection systems based on system behavior in general evaluates the behavior of observed system. Therefore the level of system observation is very important. We propose intrusion detection system that works at low level system observation. This is important because of many malicious codes nowadays mask their behavior and therefore is difficult to expose those malicious codes from user perspective. Proposed intrusion detection system aims to be modular because of achieving further development and also as simple as possible because of better user understanding. The interconnection of existing technologies and solutions and developing new one result to complex intrusion detection system.","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131366487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Robust electronic application by PSoC PSoC的稳健电子应用
G. Gyorok, J. Lakner, M. Mako
{"title":"Robust electronic application by PSoC","authors":"G. Gyorok, J. Lakner, M. Mako","doi":"10.1109/SAMI.2012.6209000","DOIUrl":"https://doi.org/10.1109/SAMI.2012.6209000","url":null,"abstract":"Prevalently occur in electronic components, which are also programmable analog circuits. Particularly promising is a symbiosis in which the circuit can be programmed and cooperation of a microcontroller can be realized. Because of these types of devices are becoming more common, a classic circuit and system techniques storey enjoying a renaissance, which was previously difficult to achieve because of the much less important. Typical such application the robust electronics analog systems. Its function then efficient, if the electronic circuit is certain his behavior, its certain parameters, the changed according to conditions, we can modify it. If we place an embedded controller in the environment of the analogous system, that for us important parameters values it, then the controller because of depends of an algorithm, it may intervene in the function of an analogous electronic circuit. We place one or more programmable system on chip (PSoC)1 circuit - mostly inside of a microcontroller - if it is analogous in an electronic circuit system, on suitable places, then these parametrical and you are topology configuring we may intervene very efficiently[5] [2]. Other hand, the use of Field Programmable Analog Arrays (FPAA) or newer version of them, PSoC device suggests on a great opportunity to give additional advantages. More great opportunity is the co-operation of the PSoC's microcontrollers. It is very important to develop such an architecture that allows maximum flexibility and circuit-freedom too[3].","PeriodicalId":158731,"journal":{"name":"2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131372977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信