{"title":"A Social Bonds Integration Approach for Crowd Panic Simulation","authors":"Imene Bouderbal, Abdenour Amamra","doi":"10.15439/2019F35","DOIUrl":"https://doi.org/10.15439/2019F35","url":null,"abstract":"Crowd panic has incurred massive injuries and deaths throughout history; thus understanding it is particularly important in order to save human lives. Recently, numerous simulation methods have been contributed in order to provide insight into the design of evacuation planning strategies. In this paper, we integrate a social structure to the crowd mobility model for the purpose of investigating the influence of social bonds on collective behavior during panic. A macroscopic crowd panic model based on social science theories was integrated as an internal module to the microscopic mobility model. The resulting framework is tunable and permits the implementation of several panic scenarios. It is also designed to run in different situations for a better comprehension of panic-related phenomena. The results demonstrate the smoothness of our crowd flow model and the realism of evacuation during panic.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123744256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GNSS-based Sound Card Synchronization","authors":"A. Carôt, H. Mahmood, C. Hoene","doi":"10.15439/2019F148","DOIUrl":"https://doi.org/10.15439/2019F148","url":null,"abstract":"Audio communication on the public Internet suffers from not synchronized word clocks of the involved audio devices. The resulting clock drift leads to audio dropouts, which is typically compensated by a sample rate conversion (SRC) in standard telecommunication systems. This, however, does not fulfill the requirements of a high-quality audio system, in which all devices share one and the same word clock. Professional IP based network audio systems such as DANTE or AVB with their respective clock synchronization techniques have so been limited to LAN usage, where network jitter and loss have negligible importance regarding the required accuracy in the dimension of several nanoseconds. In a WAN, however, jitter in the millisecond dimension would lead to unacceptable measurement errors for the intended clock synchronization. As a consequence, we decided to investigate alternative clock synchronization techniques for WAN-distributed devices and developed a GNSS-based approach, which leads to precise clock synchronization.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124697060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Malicious and Harmless Software in the Domain of System Utilities","authors":"Jana St'astná","doi":"10.15439/2019F244","DOIUrl":"https://doi.org/10.15439/2019F244","url":null,"abstract":"The focus of malware research is often directed on behaviour and features of malicious samples that stand out the most. However, our previous research led us to see that some features typical for malware may occur in harmless software as well. That finding guided us to direct more attention towards harmless samples and more detailed comparisons of malware and harmless software properties. To eliminate variables that may influence the results, we narrowed down our research study to specific software domain - system maintenance and utility tools. We analysed 100 malicious and 100 harmless samples from this domain and statistically evaluated how they differ regarding packing, program sections and their entropies, amount of code outside common sections and we also looked at differences in behaviour from the high-level view.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125337385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BPM Tools for Asset Management in Renewable Energy Power Plants","authors":"Carchiolo Vincenza, Catalano Giovanni, Malgeri Michele, Pellegrino Carlo, Platania Giulio, Trapani Natalia","doi":"10.15439/2019F110","DOIUrl":"https://doi.org/10.15439/2019F110","url":null,"abstract":"Business Process Management (BPM) is an accepted discipline and its importance in increasing automation inside industrial environment is today recognized by all players. The complexity of modern management process will lead to chaos without a well-designed and effective BPM. Several BPM Suites were compared and BPM approach was applied to the case study of process management in a renewable energy power plant. Results both in process reduction and simplification and flow optimization obtained in the real case are discussed to state efficacy and efficiency of the adopted approach.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122005727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Minimum Set-Cover Problem with several constraints","authors":"Jens Dörpinghaus, Carsten Düing, Vera Weil","doi":"10.15439/2019F2","DOIUrl":"https://doi.org/10.15439/2019F2","url":null,"abstract":"A lot of problems in natural language processing can be interpreted using structures from discrete mathematics. In this paper we will discuss the search query and topic finding problem using a generic context-based approach. This problem can be described as a Minimum Set Cover Problem with several constraints. The goal is to find a minimum covering of documents with the given context for a fixed weight function. The aim of this problem reformulation is a deeper understanding of both the hierarchical problem using union and cut as well as the non-hierarchical problem using the union. We thus choose a modeling using bipartite graphs and suggest a novel reformulation using an integer linear program as well as novel graph-theoretic approaches.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124019361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Object detection in the police surveillance scenario","authors":"A. Wilkowski, Włodzimierz Kasprzak, M. Stefanczyk","doi":"10.15439/2019F291","DOIUrl":"https://doi.org/10.15439/2019F291","url":null,"abstract":"Police and various security services use video analysis when investigating criminal activity. One typical scenario is the selection of object in image sequence and search for similar objects in other images. Algorithms supporting this scenario must reconcile several seemingly contradicting factors: training and detection speed, detection reliability and learning from sparse data. In the system that we propose a combined SVM/Cascade detector is used for both speed and detection reliability. In addition, object tracking and background-foreground separation algorithm together with sample synthesis is used to collect rich training data. Experiments show that the system is effective, useful and suitable for selected tasks of police surveillance.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124041060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. E. Idrissi, A. Idri, Ibtissam Abnane, Z. Bakkoury
{"title":"Predicting Blood Glucose using an LSTM Neural Network","authors":"T. E. Idrissi, A. Idri, Ibtissam Abnane, Z. Bakkoury","doi":"10.15439/2019F159","DOIUrl":"https://doi.org/10.15439/2019F159","url":null,"abstract":"Diabetes self-management relies on the blood glucose prediction as it allows taking suitable actions to prevent low or high blood glucose level. In this paper, we propose a deep learning neural network (NN) model for blood glucose prediction. It is a sequential one using a Long-Short-Term Memory (LSTM) layer with two fully connected layers. Several experiments were carried out over data of 10 diabetic patients to decide on the model’s parameters in order to identify the best variant of it. The performance of the proposed LSTM NN measured in terms of root mean square error (RMSE) was compared with the ones of an existing LSTM and an autoregressive (AR) models. The results show that our LSTM NN is significantly more accurate; in fact, it outperforms the existing LSTM model for all patients and outperforms the AR model in 9 over 10 patients, besides, the performance differences were assessed by the Wilcoxon statistical test. Furthermore, the mean of the RMSE of our model was 12.38 mg/dl while it was 28.84 mg/dl and 50.69 mg/dl for AR and the existing LSTM respectively.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114481201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework for Autonomous UAV Swarm Behavior Simulation","authors":"Piotr Cybulski","doi":"10.15439/2019F278","DOIUrl":"https://doi.org/10.15439/2019F278","url":null,"abstract":"In the last several years a large interest in the unmanned aerial vehicles (UAVs) has been seen. This is mostly due to an increase of computational power and decreasing cost of the UAVs itself. One of an intensively researched area is an application of a swarm behavior within team of such UAVs. Simulation tools are one of the means with which quality of solutions in this matter can be measured. In this paper such simulation framework is proposed. The proposed framework is capable of taking under consideration interferences between communicating UAVs, as well as interaction between UAV and surrounding environment. Mathematical models based on which simulation is performed were described, definition of simulation scenario and results of exemplary simulation were also presented.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126689650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Chmielarz, Marek Zborowski, Üyesi Mesut Atasever
{"title":"Aspects of Mobility of e-Marketing from Customer Perspective","authors":"W. Chmielarz, Marek Zborowski, Üyesi Mesut Atasever","doi":"10.15439/2019F232","DOIUrl":"https://doi.org/10.15439/2019F232","url":null,"abstract":"The main aim of this article is to identify students’ opinions concerning the place, role and influence of electronic marketing tools on making purchases on the Internet. The authors have applied the division of e-marketing into its traditional and electronic forms, on desktop computers and mobile devices, which was significant due to diversified opinions of clients concerning its use. The studies have been carried out with the application of a CAWI method examining a convenient, partially randomly selected sample of clients (students) who are the most active in the Internet. The studies were aimed at evaluating specific e-marketing media and techniques which, in the customers’ view, influenced shopping on the Internet. In particular, the respondents commented on the advantages, disadvantages and benefits resulting from the application of e-marketing on mobile devices. The conclusions and recommendations from the study may contribute to better use of these factors in order to facilitate consumers’ purchases, not only in the Internet.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133431753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Use of Holographic Technology in Online Experimentation","authors":"Jakub Matisák, M. Rábek, K. Žáková","doi":"10.15439/2019F179","DOIUrl":"https://doi.org/10.15439/2019F179","url":null,"abstract":"The paper deals with a web application that allows simulating 3D model of mechatronic system in holographic devices. Purpose of this application is to bring new perspective to interactive education and simplify the process of studying. Background of an application is driven by Scilab Xcos simulation software communicating via web service, which provides data. The resulting animation is displayed on a holographic device, which allows visualization. The displayed system is a 3D model of the mechatronic experiment, which represents digital model of real device. Accurate movement of experiment is obtained by linking data from Scilab Xcos with 3D model. The 3D model visualization should help with easier understanding of the subject matter.","PeriodicalId":168208,"journal":{"name":"2019 Federated Conference on Computer Science and Information Systems (FedCSIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134163458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}