{"title":"Specification of user and provenance-based adaptive control points at workflow composition level","authors":"E. Kail, P. Kacsuk, M. Kozlovszky","doi":"10.1109/SISY.2016.7601477","DOIUrl":"https://doi.org/10.1109/SISY.2016.7601477","url":null,"abstract":"With the increasing capacity and power of distributed computing infrastructures in silico experiments have gained widespread popularity. The different scientific communities (physics, earthquake science, biologists, etc.) have developed their own Scientific Workflow Management Systems (SWfMS) to provide dynamic execution to the scientists. These SWfMSs differ from each other due to the divergent requirements. However, in spite of their diversity they agree on the strongest need that have not been completely fulfilled yet; runtime user-steering and adaptive dynamic execution. Additionally, when provenance data is collected during execution, provenance based steering also emerges as a big challenge. To support the scientists with special interaction mechanism during runtime we have introduced the so called iPoints, special intervention points where the scientist or the system can take over the control and are able to manipulate workflow execution based on provenance and intermediary data. In our current work we specified these iPoints in IWIR language which was targeted to provide interoperability between four existing well-known SWfMS within the framework of the SHIWA project.","PeriodicalId":193153,"journal":{"name":"2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123447368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investing in social support — Robots as perfect partners?","authors":"K. Lazányi","doi":"10.1109/SISY.2016.7601513","DOIUrl":"https://doi.org/10.1109/SISY.2016.7601513","url":null,"abstract":"While social embeddedness is vital for humans, not only from a psychological, but also on a somato-physiological level, - and hence has been excessively researched - it is very hard to define, what is needed to dispel the feeling of loneliness. The present paper endeavours to present the preliminary results of a research on how various forms of social support are perceived among young adults from different social backgrounds. The aim is to discover, whether an artificial being, a robot could be a (perfect) partner, and what would be needed for it to happen. In order to do so, a questionnaire has been created and disseminated; in the first phase among university students. The results might not be generalizable for the whole population, but are intriguing and spotlight some thought-provoking correlations.","PeriodicalId":193153,"journal":{"name":"2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117014567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kristina Vakarov, T. Lončar-Turukalo, K. Koprivsek, M. Lucic, O. Sveljo
{"title":"fMRI resting state analysis using empirical mode decomposition","authors":"Kristina Vakarov, T. Lončar-Turukalo, K. Koprivsek, M. Lucic, O. Sveljo","doi":"10.1109/SISY.2016.7601487","DOIUrl":"https://doi.org/10.1109/SISY.2016.7601487","url":null,"abstract":"The paper studies connectivity pattern between two functionally specialized brain areas: the primary motor area and the occipital (visual) cortex in the resting state fMRI using empirical mode decomposition (EMD). EMD enables identification of low frequency oscillatory modes in the resting state range [0, 01-0, 1 Hz]. Three frequency modes were determined in the resting state band in 13 subjects with the mean frequencies 0,07Hz, 0,034Hz and 0,016Hz. The temporal correlations among the oscillatory modes were strongest within homologous (corresponding) sources in left and right hemisphere, and weakest between the motor-occipital fMRI signal pairs. The functional connectivity - spatial distribution of temporal correlations in the resting state - has been identified and refined by the oscillatory modes. Connectivity graph obtained across all subjects and all IMFs showed high connectivity rate between homologous areas in the left and right hemisphere and among the visual cortex areas. Combining EMD with the Hilbert transformation may provide an additional tool for exploring correlations between frequency and amplitude ridges in task related problems.","PeriodicalId":193153,"journal":{"name":"2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122095861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Čović, Urmos Viktor, Janos Simon, D. Dobrilović, Ž. Stojanov
{"title":"Usage of QR codes in web based system for the electronic market research","authors":"Z. Čović, Urmos Viktor, Janos Simon, D. Dobrilović, Ž. Stojanov","doi":"10.1109/SISY.2016.7601494","DOIUrl":"https://doi.org/10.1109/SISY.2016.7601494","url":null,"abstract":"This paper describes the usage of QR codes in a web based system that was developed for the needs of promotion and electronic market research. QR codes can be used in several ways and they provide an opportunity to make various researches that emphasize people's reactions or people's answers. The greatest dilemma is how to present QR codes in order to attract the users' attention. For the needs of this research, a pilot version of the web based multiplatform application was made to detect users of mobile devices and collect data from their scans. This paper describes the functionality of the system and the results of the research. Based on the results of the initial research guidelines for the second version of the web based system are defined and the new target population is chosen.","PeriodicalId":193153,"journal":{"name":"2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129704863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Considerations towards security and privacy in Internet of Things based eHealth applications","authors":"Todor Ivascu, M. Frîncu, V. Negru","doi":"10.1109/SISY.2016.7601512","DOIUrl":"https://doi.org/10.1109/SISY.2016.7601512","url":null,"abstract":"The present paper describes a design of Multi-agent architecture which handles the security and privacy of sensitive medical data. It is based on the Internet of Things technology, in with a plethora of sensors/things can collect a large amount of data about the users, environment, activities and store that data on the cloud for further processing, security and privacy issues may arise. Sensitive data like the patient's name, address or pathologies can be stored and accessed by third-parties. The patient's privacy must be ensured, and sensitive medical data must be visible only to the assigned physician, as part of the patient-doctor relationship. The proposed architecture will use the Remote Patient Monitoring context for validation.","PeriodicalId":193153,"journal":{"name":"2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129992247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing mobile device security with process mining","authors":"L. Hluchý, O. Habala","doi":"10.1109/SISY.2016.7601493","DOIUrl":"https://doi.org/10.1109/SISY.2016.7601493","url":null,"abstract":"We present part of a research project aimed at mobile device security. During the project we have tested several methods of processing of data from mobile devices in order to detect attacks and suspicious activity in general. One method we have tested was also mining of processes found in mobile device activity logs and analysis of those processes. We have used several devices with the AndroidTMOS, collected a large amount of activity data, including (simulated) harmful activity, and then modeled processes found in the data. Results of the comparison of these processes to the harmful activity suggest that this application of process mining shows promise, but also requires a lot of further research.","PeriodicalId":193153,"journal":{"name":"2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127312156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nikola Luburić, M. Stojkov, G. Savić, G. Sladić, B. Milosavljević
{"title":"Crypto-tutor: An educational tool for learning modern cryptography","authors":"Nikola Luburić, M. Stojkov, G. Savić, G. Sladić, B. Milosavljević","doi":"10.1109/SISY.2016.7601498","DOIUrl":"https://doi.org/10.1109/SISY.2016.7601498","url":null,"abstract":"This paper presents Crypto-Tutor, a tool for learning modern cryptographic algorithms. Our tool offers an interactive way to learn about the uses and structure of several popular cryptographic algorithms, as well as the underlying mathematical concepts which guarantee the security of these algorithms. Crypto-Tutor also offers performance benchmarking of the algorithms for several datasets, as well as an interactive environment where the algorithms can be executed for custom input and configuration. This tool was used in the classroom, as part of two undergraduate courses in the Faculty of Technical Sciences, University of Novi Sad. Here we also present our experiences with using Crypto-Tutor in the classroom, and formally evaluate the usefulness of this tool.","PeriodicalId":193153,"journal":{"name":"2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123594687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fuzzy cognitive maps and their applications","authors":"M. Takács","doi":"10.1109/SISY.2016.7601482","DOIUrl":"https://doi.org/10.1109/SISY.2016.7601482","url":null,"abstract":"Summary form only given. Fuzzy Cognitive Map (FCM) is an interaction and inference graph representation for relationships and knowledge base, which uses fuzified system parameters and fuzzy operator-based mechanisms. FCM applications appear increasingly often to present situations and dynamical behavior of social and economic netFuzzy Cognitive Map (FCM) is an interaction and inference graph representation for relationships and knowledge base, which uses fuzified system parameters and fuzzy operator-based mechanisms. FCM applications appear increasingly often to present situations and dynamical behavior of social and economic networks. The fuzzy tools, used in the applications are various, and are based in some novel technologies, related to the global network and graph theory research.works. The fuzzy tools, used in the applications are various, and are based in some novel technologies, related to the global network and graph theory research.","PeriodicalId":193153,"journal":{"name":"2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121571711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development trends in bio-mechatronics","authors":"A. Bencsik, M. Lendvay","doi":"10.1109/SISY.2016.7601481","DOIUrl":"https://doi.org/10.1109/SISY.2016.7601481","url":null,"abstract":"One aim of the bio-mechatronics is to design devices that are capable of working together with muscles, nerves, brain stimulation and the skeleton, sometimes by completely taking over their role, to replace them. The other possible approach is that new results of mechatronics with robotics allow designing robotic remote surgery systems by system modelling in the case of robotic tissue manipulation. In the present work after discussion of operation and tasks of bio-mechatronics will be summarised more important areas of bio-mechatronic developments, showing further possibilities. Illustrative examples provide an overview about military and civilian application areas of different prosthetic designs. The paper shows the current university research directed to creation of soft tissue model starting from problems encountered in the design and modelling of remote surgery systems.","PeriodicalId":193153,"journal":{"name":"2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124190887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FestivApp: Program manager and browser system for large events","authors":"Anna Kiss, Károly Simon, Z. Szilagyi","doi":"10.1109/SISY.2016.7601505","DOIUrl":"https://doi.org/10.1109/SISY.2016.7601505","url":null,"abstract":"Nowadays events consisting of hundreds of happenings are encountered more frequently. The FestivApp application aims to facilitate the navigation in events' program by providing useful functionalities for browsing them. It also provides more than the already existing applications have to offer by being able to handle multiple events simultaneously. Users can browse the program of the currently chosen event using the mobile application, while organizers can edit their programs' data through the web interface. Both client applications rely on data served by FestivApp's server. This paper aims to present the FestivApp project. Firstly, it mentions the important decisions concerning the architecture. Secondly, it describes the implementation of the components referring to the main technologies, tools and methods that were used during the development process. Lastly, the features of the application are demonstrated using some examples.","PeriodicalId":193153,"journal":{"name":"2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121716187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}