V. Vujovic, M. Maksimovic, B. Perišić, V. Milosevic
{"title":"A Graphical Editor for RESTful Sensor Web networks modeling","authors":"V. Vujovic, M. Maksimovic, B. Perišić, V. Milosevic","doi":"10.1109/SACI.2014.6840036","DOIUrl":"https://doi.org/10.1109/SACI.2014.6840036","url":null,"abstract":"Effectiveness of communication is measured by speed, ease, and accuracy in which the information can be understood. From the cognitive aspect graphical presentations are usually more effective than textual ones, especially when communication between end-users and/or domain practitioners is concerned. Model-Driven Engineering (MDE) graphical tools have become extremely popular concerning the development of applications for a large number of domains. In this paper the emphasis is put on the design and implementation of Graphical Editor for RESTful Sensor Web Network in order to equip designers, with no expert knowledge in specific solution-domain, with a tool that would enable them to easily define tasks, specify network architecture and implement RESTful services. Based on the pilot sensor network design model, the verification, validation and proper functionality of proposed Graphical Editor are performed.","PeriodicalId":163447,"journal":{"name":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123459542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature extraction from accelerometric activity monitoring system","authors":"Gergo Sántha, G. Hermann","doi":"10.1109/SACI.2014.6840070","DOIUrl":"https://doi.org/10.1109/SACI.2014.6840070","url":null,"abstract":"In this paper, various feature extraction methods are described using a wireless activity monitoring system [2]. The 3-axis accelerometric data was received from a collar, which can be mounted on free-roaming animals. Statistical signal features (mean, standard deviation, correlation between axes), tilt angles, periodicity and spectral features were extracted to form feature vectors for further analysis.","PeriodicalId":163447,"journal":{"name":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122810958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Testing metric relations on Finsler manifolds via a geodesic detecting algorithm","authors":"A. Kristály, Á. Róth","doi":"10.1109/SACI.2014.6840087","DOIUrl":"https://doi.org/10.1109/SACI.2014.6840087","url":null,"abstract":"By using evolutionary techniques (genetic algorithms), we provide a geodesic detecting algorithm in order to test metric relations on a large class of not necessarily reversible Finsler manifolds. In particular, we focus our attention to a rigidity conjecture: any Finsler manifold which is a Busemann NPC space is Berwaldian. Beside of existing theoretical results in the literature, we support this statement by several numerical examples provided by our algorithm.","PeriodicalId":163447,"journal":{"name":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115156083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Consideration about on-line parameters estimation of an induction generator model","authors":"I. Filip, I. Szeidert","doi":"10.1109/SACI.2014.6840041","DOIUrl":"https://doi.org/10.1109/SACI.2014.6840041","url":null,"abstract":"The paper presents an analysis concerning the evolution of the parameter estimates of a linearized model describing an induction generator connected to a power system. The performed studies consider the parameters estimation for two main cases: the induction generator operates in open-loop, respectively the induction generator operates in closed loop, under constrain of a controller (being embedded into a control system). The studies show a different shape-pattern of parameter estimates for the two considered cases, revealing a strong dependence by the variance level of disturbing noise. Therefore, especially in the case of an open-loop operating regime, a high variance of the stochastic noise can quickly leads the parameters estimator towards numerical instability.","PeriodicalId":163447,"journal":{"name":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134331264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to survive email","authors":"M. Vacek","doi":"10.1109/SACI.2014.6840097","DOIUrl":"https://doi.org/10.1109/SACI.2014.6840097","url":null,"abstract":"Email is a good servant but a bad master. Email as a useful tool for communication hides many potential threats. As well as it is fast and straightforward it can easily grow to a state when user must deal with hundreds of email every month, not being able to do other work. This state is often referred to as email overload. This paper follows on a research conducted at UHK in 2012 and extends it to its second phase. The results are used to analyze users' requirements on electronic communication and to describe formally the process of dealing with email. Another objective is author's own definition of email overload in terms of obtained and derived findings. A set of improvements is proposed for a new communication tool which shall be designed and shaped in the future work.","PeriodicalId":163447,"journal":{"name":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133539874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The challenge of safety and security in automotive systems","authors":"C. Briciu, I. Filip","doi":"10.1109/SACI.2014.6840056","DOIUrl":"https://doi.org/10.1109/SACI.2014.6840056","url":null,"abstract":"In the same time with the growing of complexity for E/E systems, the level of safety needed to be fulfilled by the work products increased very fast. Could we determine the way to fulfill a standard safety level for all manufacturers? Are these standardized and applicable? The article sheds light these standards and provides the basic knowledge to design a functional safety system from the software point of view. Functional safety concepts are described in the ISO 26262 [1] standard where concepts like ASIL, risk assessment methods and hazards analysis are described very clear. The article briefly describes these concepts in a manner related to software development. Also, in AUTOSAR complaint system the needed for functional safety concepts is very huge because in the context of standardized interfaces between modules can leads also to some errors. But for avoiding this, the AUTOSAR requirements provide some methods that are taken into consideration and described also in the article. Last part of the article presents a lightweight implementation of a safety system considering as use case the designing of a remote keyless entry system.","PeriodicalId":163447,"journal":{"name":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123246971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Continuous glucose monitoring systems in the service of artificial pancreas","authors":"G. Eigner, P. Sas, L. Kovács","doi":"10.1109/SACI.2014.6840047","DOIUrl":"https://doi.org/10.1109/SACI.2014.6840047","url":null,"abstract":"Diabetes mellitus is a chronic disease causing several side effects. The basis of conventional diabetes management is the blood glucose detection with glucometers. Another approach is the continuous glucose monitoring (CGM) that can be the solution for individual and optimal management of diabetes because it is less painful and inconvenient. Although there are several challenges with CGM which must be solved there are proofs of the usability and justification of using CGM systems. In this paper, we gave a short review of the basics, goals and methods of CGM systems.","PeriodicalId":163447,"journal":{"name":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125380905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel cloud bursting technique","authors":"S. Ács, M. Kozlovszky, P. Kacsuk","doi":"10.1109/SACI.2014.6840050","DOIUrl":"https://doi.org/10.1109/SACI.2014.6840050","url":null,"abstract":"Companies (even SMEs) are roused by the success and potentials of the public clouds and they build their own private cloud infrastructures. Thus, they open the door to an easier and more flexible way for outsourcing their IT services than before. However, the currently available software solutions still do not provide seamless extensibility by cloud bursting. Therefore, the IaaS users have to prepare their images in every infrastructure. This paper presents the criteria for idealistic cloud bursting and introduces a method that overcomes the current cloud bursting issues (e.g. different administration domains and networking policies). The proposed technique uses nested virtualization, that reduces the complexity of the cloud bursting procedure. Furthermore, we have evaluated the applicability of our design by performance tests. The evaluation showed that the seamless extensibility has a cost of 5-10% overhead on the deployment time.","PeriodicalId":163447,"journal":{"name":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125149990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A network motif based approach for classifying online social networks","authors":"Alexandra Duma, Alexandru Topîrceanu","doi":"10.1109/SACI.2014.6840083","DOIUrl":"https://doi.org/10.1109/SACI.2014.6840083","url":null,"abstract":"Complex networks facilitate the understanding of natural and man-made processes and are classified based on the concepts they model: biological, technological, social or semantic. The relevant subgraphs in these networks, called network motifs, are demonstrated to show core aspects of network functionality. They are used to classify complex networks based on that functionality. We propose a novel approach of classifying complex networks based on their topological aspects using motifs. We define the classifiers for regular, random, small-world and scale-free topologies, as well as apply this classification on empirical networks. The study brings a new perspective on how we can classify and differentiate online social networks like Facebook, Twitter and Google Plus based on the distribution of network motifs over the fundamental network topology classes.","PeriodicalId":163447,"journal":{"name":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125798380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the vulnerability of a Group Key Transfer protocol based on secret sharing","authors":"Ruxandra F. Olimid","doi":"10.1109/SACI.2014.6840053","DOIUrl":"https://doi.org/10.1109/SACI.2014.6840053","url":null,"abstract":"Group Key Transfer (GKT) protocols allow multiple parties to share a common secret key: a trusted entity selects a private key and securely distributes it to the qualified participants. Hsu et al. introduced a GKT protocol based on secret sharing, which they claimed to be secure. Unlike their affirmation, we report a vulnerability: an insider can cancel key consistency such that at the end of the protocol distinct users own different keys. This leads to the futility of the protocol. Even more, the attacker is able to choose the values of the injected keys on his own wish. Finally, we propose a simple and efficient countermeasure that stands against the revealed attack.","PeriodicalId":163447,"journal":{"name":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131570779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}