{"title":"Incomplete Krätzel function model of leaky aquifer and alike functions","authors":"T. Pogány, Á. Baricz, I. Rudas","doi":"10.1109/SACI.2015.7208170","DOIUrl":"https://doi.org/10.1109/SACI.2015.7208170","url":null,"abstract":"In this note our aim is to derive certain important properties of a general mathematical model given in the form of an incomplete Krätzel function which contains as sub-models the generalized leaky aquifer function, the van't Hoff thermal analysis temperature integral and the so-called thermonuclear integral among others.","PeriodicalId":312683,"journal":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128419112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Voisan, Bogdan Paulis, R. Precup, Florin Dragan
{"title":"ROS-based robot navigation and human interaction in indoor environment","authors":"E. Voisan, Bogdan Paulis, R. Precup, Florin Dragan","doi":"10.1109/SACI.2015.7208244","DOIUrl":"https://doi.org/10.1109/SACI.2015.7208244","url":null,"abstract":"This paper sets the basis of a robot collaborative application framework that is able to perform basic interactions with a human partner, namely patrol and monitor a designated area, followed by interaction with a human participant when this is detected. The application is developed using an adaptation of ROS to Corobot robot and image processing techniques that involve OpenCV face detection.","PeriodicalId":312683,"journal":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129091255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-scenario optimization approach for fuzzy control of a robot-car model","authors":"I. Kecskés, P. Odry","doi":"10.1109/SACI.2015.7208167","DOIUrl":"https://doi.org/10.1109/SACI.2015.7208167","url":null,"abstract":"A simple dynamic model of a robot-car has been built in the Matlab/Simulink environment [1], which expanded with a minimal dynamic part [2]. A fuzzy route controller was developed and its performance compared to the PID control [2]. The multi-scenario simulation with five different spatial target points is using in order to represent the all expected scenarios during the controller optimization. The multi-objective fitness evaluation of the driving has also been developed based on kinematic and dynamic characteristics. The optimization of the Fuzzy route controller is performed on the multi-scenario simulation using previously implemented heuristic optimization methods [3]. The multi-scenario optimum is compared with the single-scenario optimums, and evaluated in that way.","PeriodicalId":312683,"journal":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125347607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Regression methods used for the determination of induction generator efficiency","authors":"I. Szeidert, I. Filip, O. Proștean, C. Vașar","doi":"10.1109/SACI.2015.7208176","DOIUrl":"https://doi.org/10.1109/SACI.2015.7208176","url":null,"abstract":"The paper presents issues regarding the usage of regression functions for the determination of a dual fed induction generator's efficiency. The authors studied the case of regression function of one, respectively of two independent variables. The preliminary data were obtained through measurements performed on an experimental laboratory setup constituted from a dual fed special type constructive induction generator driven by an induction machine in motor regime. There are presented the results of several regression functions both of one (frequency) and of two variables (frequency and current). There are stated conclusions regarding the obtained results and the suitability of using them in the context of planning control and maximum power point tracking strategies applied in the case of hybrid electrical energy conversion systems - wind/solar/hydro micro grids.","PeriodicalId":312683,"journal":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122575942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of individual information technology systems of experimental vehicles","authors":"Ernő Horváth, P. Kőrös, I. Lakatos, P. Dely","doi":"10.1109/SACI.2015.7208253","DOIUrl":"https://doi.org/10.1109/SACI.2015.7208253","url":null,"abstract":"Two experimental vehicles were developed during the last two years in the Research Center of Vehicle Industry. The vehicles mentioned above are electrically driven and equipped with own developed computational modules. During development of the computational modules it was an important issue for us to create easily extendable systems which are easy-to-use. Different applications are realized in the two vehicles, consequently, different requirements were set up concerning our applications.","PeriodicalId":312683,"journal":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121724891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental study on reduction of one-sided concept lattice based on subsets quality measure","authors":"P. Butka, J. Pócsová, J. Pócs","doi":"10.1109/SACI.2015.7208208","DOIUrl":"https://doi.org/10.1109/SACI.2015.7208208","url":null,"abstract":"The methods from the area of Formal Concept Analysis (or FCA) are usually used for conceptual-based exploratory data-mining tasks. One of the methods used in this area is based on one-sided fuzzification of standard approach, which provides the clusters of objects structured in concept hierarchy according to the specified set of fuzzy attributes. The limiting problem of FCA-based approaches is that they produce large set of concepts, which can be problematic for the interpretability of results and practical usage of the method. We have designed a method for evaluation of concepts from so-called generalized one-sided concept lattice, which is based on the quality measure of objects subsets. This method selects most relevant concepts and therefore leads to reduction of concept lattice. In this paper we will provide experimental study on the reduction, which can be achieved according to different settings of randomly generated data sets.","PeriodicalId":312683,"journal":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125107692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Șorândaru, S. Musuroi, Mihaela-Codruta Ancuti, G. Erdodi, D. Petrescu
{"title":"The control of the wind power systems by imposing the DC current","authors":"C. Șorândaru, S. Musuroi, Mihaela-Codruta Ancuti, G. Erdodi, D. Petrescu","doi":"10.1109/SACI.2015.7208209","DOIUrl":"https://doi.org/10.1109/SACI.2015.7208209","url":null,"abstract":"In this paper, we present a method for controlling a wind system consisting in a wind turbine (WT) and a permanent magnet synchronous generator (PMSG) so as to achieve the operation in the optimum energy efficient zone at time-varying speeds of wind. It analyzes the operation of a WT in the maximum power zone by changing the generator load, while the wind speed varies significantly over time. The coordinates of the maximum power point (MPP) changes over time and they are determined by the values of the instantaneous wind speed and mechanical inertia. So not always the wind system can be brought quickly to operate in the MPP zone. By measuring wind speed, the optimum dc current (ICC-OPTIM) can be obtained, the generator load can be controlled and thus it can extract the maximum mechanical energy at time-varying wind speeds.","PeriodicalId":312683,"journal":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122858858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DHCPAuth — A DHCP message authentication module","authors":"D. Dinu, Mihai Togan","doi":"10.1109/SACI.2015.7208238","DOIUrl":"https://doi.org/10.1109/SACI.2015.7208238","url":null,"abstract":"DHCP is one of the most used network protocols, despite the security issues it has. Our work is motivated by the numerous attacks that can be launched against DHCP and the impact that they can have. Firstly, we formulate the constraints and design principles for a DHCP message authentication module that is flexible and easy to integrate with current DHCP implementations, while providing the necessary level of security. Then we present DHCPAuth, a module for authenticating DHCP messages. The module uses the RFC 3118 authentication option format and is able to authenticate DHCP client and server messages using two trust models: PKI and PGP. The proposed module is evaluated using different public key pairs in the considered trust models to determine the overhead introduced and the impact on DHCP operation. Results show the additional time required to process the DHCP messages, either when signing or verifying the signatures, as well as the authentication option length and the DHCP packet length. We also provide an analysis of worse case time for verifying the authentication option when more certificates or public keys are available on certificate store or public key ring. These information can help network administrators in selecting the trust model, the key types and sizes to use.","PeriodicalId":312683,"journal":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics","volume":"257 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122933642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Support of physics education by means of business informatics methods at University level","authors":"T. Orosz","doi":"10.1109/SACI.2015.7208256","DOIUrl":"https://doi.org/10.1109/SACI.2015.7208256","url":null,"abstract":"University students can start new courses with preconditions, if they are prescribed. Such preconditions are fulfilled even if one passed the required exams with grade 2 or 5. Understanding of Physics typically needs solid knowledge of Mathematics. Because the Math and Physics background of students attending the same class are usually heterogeneous, teachers can cover the necessary Mathematic details in their lectures. Inversely, students should be forced to make efforts and reach the necessary level of the course. There are multiple well-known pedagogic approaches can by implemented. Unfortunately, due to the lack of time, teachers at the University cannot apply any of them in many cases for a particular situation. This paper discusses some selected interdisciplinary approaches of Business Informatics. Enterprise Resource Planning Systems are able to give responses most commonly in real time, which would be a great opportunity in education as well. A few Physics examples are selected in the paper for demonstration purposes how external business tools and methods can support the Education.","PeriodicalId":312683,"journal":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131281099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transmission network expansion planning software-tools","authors":"A. Simo, C. Barbulescu, S. Kilyeni, A. Stoian","doi":"10.1109/SACI.2015.7208195","DOIUrl":"https://doi.org/10.1109/SACI.2015.7208195","url":null,"abstract":"The authors are proposing a software-tool for transmission network expansion planning (TNEP). The developed software-tool is able to be used in case of complex, large scale power systems. It uses a.c. complete power flow mathematical model. Power flow computing is performed using conventional methods. Optimal power flow and network expansion are performed using artificial intelligence methods. Within this field, two methods have been tackled: particle swarm optimization (PSO) and genetic algorithms (GA).","PeriodicalId":312683,"journal":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134533446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}