{"title":"Systems engineering in product definition","authors":"L. Horváth, I. Rudas","doi":"10.1109/SAMI.2015.7061872","DOIUrl":"https://doi.org/10.1109/SAMI.2015.7061872","url":null,"abstract":"Product definition in virtual environment is done in the course of engineer and built in knowledge controlled generation of entities for lifecycle integrated model of product. Two recently emerged development directions in this area are company intelligent property (IP) controlled generic product model and unified abstraction based product concept model of multidisciplinary products. These two directions were mixed in the requirement, functions, logical, and physical (RFLP) structure of product model. RFLP structure facilitates product modeling using some methods from systems engineering (SE). The Laboratory of Intelligent Engineering Systems (LIES) at Óbuda University recognized the importance of the above developments and joined to research in relevant issues. Initial results at LIES in abstraction at product definition were developed into method for request driven behavior centered generation of RFLP structure elements. In this paper, citation of preliminary results is followed by introduction of the Multilevel Abstraction Based Self Adaptive Definition (MAAD) method and its role in driving RFLP structure elements. Following this, request engineering (RE) and systems engineering (SE) characteristics are discussed on the levels of MAAD structure. Finally, human influence on the requirements level of MAAD structure and connections of MAAD structure with its virtual-physical environment are discussed.","PeriodicalId":276598,"journal":{"name":"2015 IEEE 13th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127486046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nicolae Iacobici-Luca, P. Andea, F. Frigura-Iliasa, D. Vatau
{"title":"Software and hardware equipment power quality monitoring inside a transelectrica high voltage power station","authors":"Nicolae Iacobici-Luca, P. Andea, F. Frigura-Iliasa, D. Vatau","doi":"10.1109/SAMI.2015.7061891","DOIUrl":"https://doi.org/10.1109/SAMI.2015.7061891","url":null,"abstract":"This paper presents a dedicated software (as well as the associated hardware) used for power quality analysis. Power quality is one of the important objectives of the transmission and distribution network allover the world. Several aspects concerning the PQ monitoring interface between the transmission network and the distribution network are revealed for a 110 kV voltage level. This is a case study for the current situation and for the perspective. The system used for the power quality monitoring parameters (software and hardware) is described as applied on a representative substation within the Romanian Power System (Iernut substation).","PeriodicalId":276598,"journal":{"name":"2015 IEEE 13th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130159417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design pattern driven development of embedded applications","authors":"K. Holman, Zoltán Szabó","doi":"10.1109/SAMI.2015.7061896","DOIUrl":"https://doi.org/10.1109/SAMI.2015.7061896","url":null,"abstract":"Application of microprocessors became common in various fields due to their progressive capabilities and decreasing price, enabling even simple sensors to easily deal with software-heavy tasks. These tendencies resulted in an explosive growth in the embedded market, challenging engineers to build reliable, high performance and cheap microcontroller-based software systems as fast as possible. Such requirements revalue the importance of reusable software components in the world of embedded applications to improve agility and responsiveness to customer needs. Design patterns provide ready-to-use solutions for common problems in the software development process. We are able to describe almost every aspect of a system using nothing but patterns. The rich toolkit of patterns gets overlooked as much as useful as they are. However, they lose expressiveness without available object-oriented features like the C language; the most commonly used one in embedded systems. The goal of this paper is to revisit some well-known design patterns and their applications using the C language. A common mistake when implementing patterns using C is trying to emulate object-oriented concepts for example class, inheritance, etc. - resulting in almost unreadable and hard to understand source code -, instead of thinking with a different mindset and focusing on the intention and purpose of the pattern.","PeriodicalId":276598,"journal":{"name":"2015 IEEE 13th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128886281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image compression techniques using Local Binary Pattern","authors":"Ildiko-Angelica Szoke, D. Lungeanu, S. Holban","doi":"10.1109/SAMI.2015.7061863","DOIUrl":"https://doi.org/10.1109/SAMI.2015.7061863","url":null,"abstract":"This paper proposes a novel approach in image compression based on Local Binary Pattern (LBP). LBP has already been used as a simple texture descriptor, labeling the image pixels by looking at the points surrounding a central point (usually on a 3×3 neighborhood) and examining whether these neighbors' color values are greater or less than the central point and accordingly assigning a binary value to the corresponding bit. The description of image's local pattern results in an eight-bit binary description, but in order to restore the image from such a LBP description, the value of each central pixel is also needed. These two pieces of information, i.e. the LBP description and the actual original value for each local neighborhood central pixel, are stored in a newly proposed Local Binary Compressed format, denoted .LBC, from which the image can be reconstructed by employing statistical methods, i.e. generating smaller or larger sets of random numbers to fill in the missing information within each local neighborhood, based on the LBP descriptor. Two statistical distributions were tested and, apart from the compression performance, a Structural Similarity Index Metric was used to evaluate the results.","PeriodicalId":276598,"journal":{"name":"2015 IEEE 13th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121583653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Balogová, D. Harvanova, R. Hudák, J. Rosocha, J. Živčák
{"title":"3D cultivation of mesenchymal stromal cells from adipose tissue in alginate beads","authors":"A. Balogová, D. Harvanova, R. Hudák, J. Rosocha, J. Živčák","doi":"10.1109/SAMI.2015.7061848","DOIUrl":"https://doi.org/10.1109/SAMI.2015.7061848","url":null,"abstract":"New trends of 3D printing of biological structures are still expanding and witnessing rapid rise of new knowledge. The basis for proper and successful 3D printed structures of biological materials is to create adequate biomaterial which would serve as ink for a 3D printer. Alginate is one of the materials that can be used. Alginate is a hydrogel, which is used mainly in the field of tissue engineering for its useful properties as a biomaterial. The main aim of this study was to create a biomaterial for the purposes of 3D printing and encapsulate selected type of cells to alginate beads, along with studying cell survival and stability of the biomaterial for three weeks. In this study mesenchymal stem cells (MSCs), isolated from rabbit adipose tissue, were used.","PeriodicalId":276598,"journal":{"name":"2015 IEEE 13th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116571028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Osaba, E. Onieva, F. Díaz, R. Carballedo, P. López, A. Perallos
{"title":"An Asymmetric Multiple Traveling Salesman Problem with Backhauls to solve a Dial-a-Ride problem","authors":"E. Osaba, E. Onieva, F. Díaz, R. Carballedo, P. López, A. Perallos","doi":"10.1109/SAMI.2015.7061865","DOIUrl":"https://doi.org/10.1109/SAMI.2015.7061865","url":null,"abstract":"Nowadays, public transportation has become an essential area for the actual society, which directly affects the quality of life. There are different sort of public transportation systems. One type that receives much attention these days because of its great social interest is the transportation on-demand. Some of the most well-known on-demand transports systems are the Demand Responsive Transit, and the Dial-a-Ride. In this paper, a real-world Dial-a-Ride problem is presented and modeled as a Multi-Attribute Traveling Salesman Problem. In addition, in this work a benchmark of this problem is presented, and the first resolution of this benchmark is offered. For the resolution of the problem an Adaptive Multi-Crossover Population Algorithm has been implemented.","PeriodicalId":276598,"journal":{"name":"2015 IEEE 13th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114938944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Vokorokos, Pavol Drienik, O. Fortotira, J. Hurtuk
{"title":"Abusing mobile devices for Denial of Service attacks","authors":"L. Vokorokos, Pavol Drienik, O. Fortotira, J. Hurtuk","doi":"10.1109/SAMI.2015.7061886","DOIUrl":"https://doi.org/10.1109/SAMI.2015.7061886","url":null,"abstract":"The growing popularity of mobile devices have led to the rise of mobile malware. It is also one of the reasons why amount of new mobile malware families, which are secretly connected over the internet to a remote Command & Control server, is increasing. It gives attackers possibility to create botnets for Denial of Service attacks or mining of cryptocurrencies. This paper discusses state of the art in computer and mobile security. Paper also presents proof of concept which can be used to abuse mobile devices' capabilities for malicious purposes. Distributed Denial of Service attack scenario is presented using smartphones with Android operating system against wireless network. Measured results and techniques are presented such as description of Android application specially created for this purposes.","PeriodicalId":276598,"journal":{"name":"2015 IEEE 13th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121384907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information processing with mentor teachers","authors":"I. Simonics","doi":"10.1109/SAMI.2015.7061880","DOIUrl":"https://doi.org/10.1109/SAMI.2015.7061880","url":null,"abstract":"Since 2011, we have been educating mentor teachers at Obuda University Trefort Agoston Centre for Engineering Education - OU TACEE. Mentor teachers can support the preparation process of our engineering teacher students in secondary vocational schools by coaching their teaching practice. I am responsible for teaching six subjects. In the first semester I gave examples on how to create good presentations. I recognized that data collection and processing was really important for our Mentor teachers in their work and decision making processes. Therefore, I involved them in creating good presentations, and taught them how to collect data with these technologies, process and transfer them to the audience according to the established idea. In three semesters we managed a survey with same questionnaire. I summarize the part of the results.","PeriodicalId":276598,"journal":{"name":"2015 IEEE 13th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123823604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of stability measures for feature selection","authors":"P. Drotár, Z. Smékal","doi":"10.1109/SAMI.2015.7061849","DOIUrl":"https://doi.org/10.1109/SAMI.2015.7061849","url":null,"abstract":"The feature selection is inevitable part of machine learning techniques in biomedical engineering and bioinformatics. Feature selection methods are used to select the most discriminative features, e.g. for disease classification. Even if there are plenty of feature selection methods the stability of these algorithms is still open question. Another issue with assessing the stability of feature selection is that there are several stability measures providing different views on stability. Here, we compare well-known stability measures and evaluate their performance on artificial and real data.","PeriodicalId":276598,"journal":{"name":"2015 IEEE 13th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133482001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of inclusions at materials by metrotomography","authors":"D. Glittova, T. Tóth, J. Živčák","doi":"10.1109/SAMI.2015.7061847","DOIUrl":"https://doi.org/10.1109/SAMI.2015.7061847","url":null,"abstract":"The aim of this work is to analyze inclusions of samples from selected materials using metrotomography. The main part of the problem was correct methodology of software processing of the measured data acquired by computed tomography equipment Carl Zeiss METROTOM1500. For various settings of the input parameters was investigated expected output data to a known set of defects. Comparison of the effects of setting on results of the assessment should help in setting parameters for evaluation of defects in industrial applications.","PeriodicalId":276598,"journal":{"name":"2015 IEEE 13th International Symposium on Applied Machine Intelligence and Informatics (SAMI)","volume":"16 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124465550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}