{"title":"Assessing the agile approach to critical infrastructure in the light of primary research","authors":"István Márk Tóth, Ágnes Csiszárik-Kocsir","doi":"10.1109/INES56734.2022.9922622","DOIUrl":"https://doi.org/10.1109/INES56734.2022.9922622","url":null,"abstract":"Critical infrastructures have received increasing attention in recent years. One of the main reasons for this over the past two years or so has been the pandemic of the coronavirus and its aftermath, which has required stability but also rapid response and effective management of change to ensure smooth operations. The agile approach, which has its origins in software development, offers precisely these benefits when applied.","PeriodicalId":253486,"journal":{"name":"2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125571303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi Objective energy mix Optimalization","authors":"P. Kádár","doi":"10.1109/INES56734.2022.9922633","DOIUrl":"https://doi.org/10.1109/INES56734.2022.9922633","url":null,"abstract":"In national energy systems, electricity is generated from various primary energy sources. Different power plant types have different costs and environmental impacts. New power plant capacities should preferably be characterized by lower emissions and more modest costs. Selecting a number of parameters is typically a Multi Objective Optimization (MOO) task. Although optimization can be done, it is difficult to illustrate the results with large tables. Although the decision makers always makes “good” decisions it is hard to sense the relation between these solutions. The current energy system and the targeted new composition can be well represented by the diagram of the optimization goals and the Pareto front. In addition to the present situation, we have proposed an energy mix with minimal costs and emissions. All this is plotted on the optimization diagram, which also shows the directions of optimization and the Pareto front.","PeriodicalId":253486,"journal":{"name":"2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES)","volume":"23 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114100103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quaternion based attitude control of a maneuvering fixed wing UAV","authors":"Stephen Muchai Kimathi, B. Lantos","doi":"10.1109/INES56734.2022.9922611","DOIUrl":"https://doi.org/10.1109/INES56734.2022.9922611","url":null,"abstract":"This paper presents attitude control using the unit quaternion. Specifically, the orientation of a maneuvering fixed wing U A V is investigated through set point tracking. Two formulations are explored; the first, through quaternion error dynamics and the second, through quaternion logarithm. Both methods apply appropriate Lyapunov functions for the design and analysis of the closed stability of the control laws. The error dynamics are deduced from composite rotations between different frames of the UA V. Through the error dynamics, the orientation of the UAV's wind frame is aligned to a desired orientation. Using this procedure, the desired equilibrium points of the closed system are guaranteed to converge and are asymptotically stable. The formulation and implementation of these two methods is simple and intuitive, and through simulations, their successful use and effectiveness is shown.","PeriodicalId":253486,"journal":{"name":"2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116437424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robotics out of the Mainstream: Special Topics in Agrifood and Laboratory Automation: PLENARY TALK","authors":"P. Galambos","doi":"10.1109/ines56734.2022.9922635","DOIUrl":"https://doi.org/10.1109/ines56734.2022.9922635","url":null,"abstract":"Robotics has been the central idea behind flexible automation since its roots. Over the past 60 years, the range of application fields is widening greatly, stepping forward boosted by major technological advancements. Today, the mechatronics under the robots' cover is so developed that it barely limits our imagination when considering a manipulation task or a locomotion-related problem. In the recent era of new-wave robotics, the challenge is to achieve the seamless, highperformance interplay in the jungle of advanced sensors, AIdriven machine cognition, closed-loop control, and the underlying bare metal. There are a wide variety of relatively new areas in which the application of robots gains clear economic motivation. One such area is the agri-food sector, especially the fruit, vegetable, and mushroom harvesting, where human resources render an ever-narrowing bottleneck. At the same time, the crop yield and the overall efficiency pushed higher and higher. Another exciting field is the automation of life science laboratories. COVID-19 has clearly shown that the throughput of pharmaceutical research is crucial when a global epidemic threatens humankind. My talk will focus on two projects that emerged in the practice of the iROB Center of Óbuda University: The first one is the robotic harvesting of button mushrooms and the related planning problems. The other one is the automatic manipulation of microscope slides. Besides giving insight into these topics, the lecture will also uncover the general background and outlook of some promising research directions that potentially bring a paradigm change in robotic automation.","PeriodicalId":253486,"journal":{"name":"2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132090347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Use cases of attack graph for SOC optimization purpose","authors":"Anna Bánáti, Erno Rigó, Rita Fleiner, E. Kail","doi":"10.1109/INES56734.2022.9922617","DOIUrl":"https://doi.org/10.1109/INES56734.2022.9922617","url":null,"abstract":"The development and deployment of dynamic and adaptive cyber defense solutions are essential to face the extremely fast evolving and increasingly common cyberattacks. Security Operation Centers (SOC) are widely used recently to correctly identify, analyze, defend, and investigate security incidents. In order to defend our networks, it is also essential to identify vulnerabilities and weaknesses in the system. Nowadays, attack graphs are the most frequently used graphical representations of a system's vulnerabilities as well as different attack paths an attacker may carry out. This paper investigates the possible use cases of attack graphs in a Security Operation Center. It also identifies different areas and point out potential research directions.","PeriodicalId":253486,"journal":{"name":"2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116369255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Trust in 5G","authors":"Silvana Qose, Esmeralda Kadena","doi":"10.1109/INES56734.2022.9922650","DOIUrl":"https://doi.org/10.1109/INES56734.2022.9922650","url":null,"abstract":"The new generation of mobile technology, 5G, connects everything and everyone, providing new opportunities for customers, society, and industries. However, the trust related to the reliability and security of 5G equipment and systems has been the main topic of several discussions. Hence, in this paper, we introduce the Network Equipment Security Scheme (NESAS), highlighting its main features and benefits in implementing 5G. Then we expand our research for the 5G edge of the network use cases involving routing algorithms. Blockchain-based models can be employed to facilitate the exchange of automotive and traffic data. Our work identifies and debates significant open research problems that the research community should address and provide answers to to fully harness the considerable benefits for upcoming 5G networks and services. We conclude that Blockchain can serve to transfer information between participants in a safe, dependable, and controlled manner that is constantly monitored and evaluated with the help of specialized tools.","PeriodicalId":253486,"journal":{"name":"2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124359665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Modelling Aspects of Short-term Resource Availability Analysis of Electric Power Systems","authors":"Ágnes Gerse, Rita Fleiner","doi":"10.1109/INES56734.2022.9922637","DOIUrl":"https://doi.org/10.1109/INES56734.2022.9922637","url":null,"abstract":"The security of electricity supply is challenged by integrating variable renewable energy sources, phasing-out conventional power plants with high environmental impacts and facing gas market uncertainties in Europe. Business intelligence solutions relying on a large set of publicly available market data can provide an essential contribution to monitoring the adequacy of generation and storage resources in electric power systems. In the context of developing a resource availability monitoring tool relying on electricity market transparency information, the paper summarizes the main aspects of database design and data modelling.","PeriodicalId":253486,"journal":{"name":"2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114897101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Ozone Generator with Embedded Microcontroller","authors":"György Györök, O. Shvets","doi":"10.1109/INES56734.2022.9922612","DOIUrl":"https://doi.org/10.1109/INES56734.2022.9922612","url":null,"abstract":"The recent end of the coronavirus epidemic has raised awareness of the importance of environmental hygiene. There are a number of ways in which the environment can be disinfected. There are chemical and physical processes to reduce the amount of airborne pathogens. One of the most effective disinfection methods is to increase the ozone content of the air, i.e. to kill viruses with ozone. In this article, we give an example of this. Here, ozone is generated by means of a corona discharge and the intensity of the ozone and the time of ozone generation are adjusted and controlled by means of the procedure and the device presented. (Figure 1)","PeriodicalId":253486,"journal":{"name":"2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132179222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the manipulability of the Generalized Triangle Parallel Delta Robots","authors":"László Szűcs, P. Galambos","doi":"10.1109/INES56734.2022.9922638","DOIUrl":"https://doi.org/10.1109/INES56734.2022.9922638","url":null,"abstract":"This article discusses the manipulability of the Gen-eralized Triangle Parallel Delta Robots (GTPR) through a rep-resentative example that compares the regular delta robots to a GTPR with specially tailored workspace. Our study is an attempt to demonstrate and underpin the usefulness of the GTPR concept by investigating the manipulability of the robot in the regions of the workspace which is made accessible by the individual parametrization of the GTPR. The paper derives the Jacobian and the manipulability ellipsoid via the screw theory formulation and presents a simple graphical overview to highlight the similarities and differences between the conventional delta robots and a typical GTPR variant.","PeriodicalId":253486,"journal":{"name":"2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132244722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ruben Hubert, Anna Bánáti, L. Erdődi, Rita Fleiner
{"title":"Strengthening Database Security with Capture the Flag Exercises","authors":"Ruben Hubert, Anna Bánáti, L. Erdődi, Rita Fleiner","doi":"10.1109/INES56734.2022.9922636","DOIUrl":"https://doi.org/10.1109/INES56734.2022.9922636","url":null,"abstract":"Database security has a key role when protecting websites and other IT services. Attacks against databases could result in the leak of confidential data or integrity related security issues. One of the best options to protect services that utilize databases is to simulate real attacks against these. This paper focuses on capture the flag (CTF) style attack simulation and compare existing CTF challenges in the field of database security. The aim was to map the existing databases weaknesses and vulnerabilities into CTF style problems and help penetration testers to understand different attack scenarios against services with database connections. We identified several database related vulnerabilities that are usually not covered by CTF style challenges and a discussion is made how these missing fields could be added to the most well-known offensive security exercises.","PeriodicalId":253486,"journal":{"name":"2022 IEEE 26th International Conference on Intelligent Engineering Systems (INES)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124723253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}