2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)最新文献

筛选
英文 中文
Higher education in recent virtual engineering environments 虚拟工程环境下的高等教育
J. Gáti, G. Kártyás, Krisztina Nemethy
{"title":"Higher education in recent virtual engineering environments","authors":"J. Gáti, G. Kártyás, Krisztina Nemethy","doi":"10.1109/SACI.2014.6840045","DOIUrl":"https://doi.org/10.1109/SACI.2014.6840045","url":null,"abstract":"Changed engineering activities from conventional methods in descriptive product representations to self adaptive contextual lifecycle configured product models needed continuous and relevant changes of higher education curriculums and programs. Currently, change between old and new generations of industrial engineering technology brings need for teaching of new problem solving process both structurally and thematically. The structural change is forced towards more project and virtual solution centered lectures and laboratories. Thematic changes must serve the integrated appearance and application of disciplines. This paper introduces a latest result in research for new approaches and concepts in order to change higher education engineering programs in accordance with the changes in theoretical, methodological, and systemic background of leading engineering technology. Including major advances from the area of lifecycle product engineering during the first decade of this new century in course programs is emphasized.","PeriodicalId":163447,"journal":{"name":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122132146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Economic assessment of some solar installations developed at the Politehnica University of Timisoara, Romania 罗马尼亚蒂米什瓦拉Politehnica大学开发的一些太阳能装置的经济评估
I. Luminosu, A. Sabata
{"title":"Economic assessment of some solar installations developed at the Politehnica University of Timisoara, Romania","authors":"I. Luminosu, A. Sabata","doi":"10.1109/SACI.2014.6840076","DOIUrl":"https://doi.org/10.1109/SACI.2014.6840076","url":null,"abstract":"We present an economic assessment of three solar thermal applications developed at the “Politehnica” University of Timişoara, Romania. The technical and solar radiation data have been obtained by measurements performed in the solar energy laboratories of the university. The economic effectiveness of the solar systems is assessed in terms of the present worth of the cash flow calculated for the life time of the installations. The presented results and underlying calculation procedures are useful for small developers of solar energy applications in view of home use.","PeriodicalId":163447,"journal":{"name":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116614532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Consideration on modeling, identification and control of double stator windings induction generator DSWIG 双定子绕组感应发电机DSWIG的建模、辨识与控制研究
R. Boraci, O. Proștean, N. Budisan, C. Vașar
{"title":"Consideration on modeling, identification and control of double stator windings induction generator DSWIG","authors":"R. Boraci, O. Proștean, N. Budisan, C. Vașar","doi":"10.1109/SACI.2014.6840077","DOIUrl":"https://doi.org/10.1109/SACI.2014.6840077","url":null,"abstract":"The paper contribute to establish pragmatic methods to obtain modeling, identification and control laws of double stator windings induction generator DSWIG. The DSWIG model is obtained by formally juxtaposing/over lapping two induction machines, mechanically and magnetically identical to the real DSWIG machine, and having as stator winding the DSWIG load winding, one of them, and the second one having, as stator winding, the DSWIG excitation winding. The DSWIG parameters may be obtained experimentally by idle-running and short-circuit tests as will shown in the paper. The voltage and current control laws may be obtained using the proposed DSWIG equivalent scheme of it's as will shown below in the paper.","PeriodicalId":163447,"journal":{"name":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125267014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Skin diseases diagnosis using artificial neural networks 基于人工神经网络的皮肤病诊断
Delia-Maria Filimon, A. Albu
{"title":"Skin diseases diagnosis using artificial neural networks","authors":"Delia-Maria Filimon, A. Albu","doi":"10.1109/SACI.2014.6840059","DOIUrl":"https://doi.org/10.1109/SACI.2014.6840059","url":null,"abstract":"Medical informatics is an interdisciplinary area (combining more academic fields), which benefits of technology's progress that reflects on any domain. This paper is an example about how artificial neural networks prove their capacities in medical field. They are successfully used in decision-making, having a strong impact on physicians, who can benefit of a faster diagnosis process for some diseases with multiple and confusing symptoms.","PeriodicalId":163447,"journal":{"name":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115083174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Model-based healthcare applications at Óbuda University Óbuda大学的基于模型的医疗保健应用程序
L. Kovács, Johanna Sápi, G. Eigner, T. Ferenci, P. Szalay, József Klespitz, B. Kurtan, M. Kozlovszky, D. Drexler, Péter Pausits, I. Harmati, Z. Sápi, I. Rudas
{"title":"Model-based healthcare applications at Óbuda University","authors":"L. Kovács, Johanna Sápi, G. Eigner, T. Ferenci, P. Szalay, József Klespitz, B. Kurtan, M. Kozlovszky, D. Drexler, Péter Pausits, I. Harmati, Z. Sápi, I. Rudas","doi":"10.1109/SACI.2014.6840058","DOIUrl":"https://doi.org/10.1109/SACI.2014.6840058","url":null,"abstract":"Following the tradition established at previous IEEE INES conferences, this paper presents the results achieved by the Physiological Controls Group of Óbuda University in the field of physiological control last year (2013). The application target was focused on diabetes (artificial pancreas), tumor (antiangiogenic therapy), and hemodialysis (control of peristaltic pumps).","PeriodicalId":163447,"journal":{"name":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123807376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Wireless sensor network localization using a multistage approach 无线传感器网络多阶段定位方法
László Pál
{"title":"Wireless sensor network localization using a multistage approach","authors":"László Pál","doi":"10.1109/SACI.2014.6840071","DOIUrl":"https://doi.org/10.1109/SACI.2014.6840071","url":null,"abstract":"Wireless sensor networks (WSN) are a collection of devices, capable of a limited amount of data processing and communication. The geographic location of sensor nodes is a basic input for many applications of wireless sensor networks. To determine the positions of sensors, numerous localization algorithms have been proposed recently. In this paper, we propose a multistage type localization scheme where trilateration, local search and simulated annealing are applied to determine the positions of the sensors. The performance in terms of localization error and function evaluation number is tested by simulations for different topologies and compared with a well-known simulated annealing method.","PeriodicalId":163447,"journal":{"name":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127385703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Clone detection algorithm based on the Abstract Syntax Tree approach 基于抽象语法树方法的克隆检测算法
Flavius-Mihai Lazar, O. Banias
{"title":"Clone detection algorithm based on the Abstract Syntax Tree approach","authors":"Flavius-Mihai Lazar, O. Banias","doi":"10.1109/SACI.2014.6840038","DOIUrl":"https://doi.org/10.1109/SACI.2014.6840038","url":null,"abstract":"In this paper we present useful methodologies in analyzing program code written in C programming language in order to detect source code clones between two or multiple files. For detecting student plagiarism in C code, we implemented a three phase clone detection algorithm based on the AST (Abstract Syntax Tree) approach. Starting from the state of the art in this domain, we make a short description and comparison between the proposed methods and finally we present a case study upon student assignments for the Programming Techniques classes. In the end, we conclude pointing the future directions of development and improvement in order to obtain a better clone detection tool.","PeriodicalId":163447,"journal":{"name":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130223397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Initialization and lost track recovery performance analysis of face features tracking 人脸特征跟踪的初始化与失迹恢复性能分析
E. Voisan, R. Precup, Florin Dragan
{"title":"Initialization and lost track recovery performance analysis of face features tracking","authors":"E. Voisan, R. Precup, Florin Dragan","doi":"10.1109/SACI.2014.6840069","DOIUrl":"https://doi.org/10.1109/SACI.2014.6840069","url":null,"abstract":"Face feature tracking is an important element for detection and interpretation of human face expression and for further human mood-based interactions. This paper discusses the current status in face modeling techniques and performs a performance analysis. The analysis concerns the initialization and it also includes the lost track recovery for an Active Appearance Model-based face tracking algorithm.","PeriodicalId":163447,"journal":{"name":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121285209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intrusions detection based on Support Vector Machine optimized with swarm intelligence 基于群智能优化的支持向量机入侵检测
A. Enache, V. Patriciu
{"title":"Intrusions detection based on Support Vector Machine optimized with swarm intelligence","authors":"A. Enache, V. Patriciu","doi":"10.1109/SACI.2014.6840052","DOIUrl":"https://doi.org/10.1109/SACI.2014.6840052","url":null,"abstract":"Intrusion Detection Systems(IDS) have become a necessary component of almost every security infrastructure. Recently, Support Vector Machines (SVM) has been employed to provide potential solutions for IDS. With its many variants for classification SVM is a state-of-the-art machine learning algorithm. However, the performance of SVM depends on selection of the appropriate parameters. In this paper we propose an IDS model based on Information Gain for feature selection combined with the SVM classifier. The parameters for SVM will be selected by a swarm intelligence algorithm (Particle Swarm Optimization or Artificial Bee Colony). We use the NSL-KDD data set and show that our model can achieve higher detection rate and lower false alarm rate than regular SVM.","PeriodicalId":163447,"journal":{"name":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129454602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Bio-cryptographic authentication in cloud storage sharing 云存储共享中的生物密码认证
M. Velciu, Alecsandru Patrascu, V. Patriciu
{"title":"Bio-cryptographic authentication in cloud storage sharing","authors":"M. Velciu, Alecsandru Patrascu, V. Patriciu","doi":"10.1109/SACI.2014.6840054","DOIUrl":"https://doi.org/10.1109/SACI.2014.6840054","url":null,"abstract":"One of the relative recent approaches for enhancing the modern cryptosystems security is to add the biometrics layer to the existing cryptographic infrastructures. The Biometric Encryption process proposes to combine the soft biometrics with existing cryptographic keys, overcoming many of the traditional biometric systems vulnerabilities. In this paper we propose a new and novel implementation for a bio-cryptographic infrastructure, as a safer authentication mechanism for Cloud storage sharing. We talk about the architecture of our approach and we emphasize the benefits brought by combining the two fields, such as storage encryption and access control. Our implementation resides on a voice-based authentication mechanism, which confers access to the system and allows the recovery of the shared access storage encryption key.","PeriodicalId":163447,"journal":{"name":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130389924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信