2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics最新文献

筛选
英文 中文
High frequency emissions of electromagnetic and electronic fluorescent lamps 电磁和电子荧光灯的高频辐射
I. Robert
{"title":"High frequency emissions of electromagnetic and electronic fluorescent lamps","authors":"I. Robert","doi":"10.1109/SACI.2015.7208231","DOIUrl":"https://doi.org/10.1109/SACI.2015.7208231","url":null,"abstract":"This paper present a study of conducted high frequency noise emission of fluorescent lamps with electromagnetic ballast, glow and electronic starter, and the emission of fluorescent lamps with electronic ballast. In case of lamps with electromagnetic ballast and glow starter the noise emission is much lower than in case of lamps with electromagnetic ballast and electronic starter. The reason is the filter capacitor which is in parallel with glow starter. In case of lamps with electronic ballast the emission of discharge tube is reduced but in spectrum of noise appear the noise produced by the electronic ballast which are narrow band comparison with noise emission of discharge tube which are preponderate broad band noise.","PeriodicalId":312683,"journal":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132043035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Granules of risks prediction services in cloud semantics based on subjective knowledge acquisition from big data 基于大数据主观知识获取的云语义风险预测服务颗粒
H. Fujita
{"title":"Granules of risks prediction services in cloud semantics based on subjective knowledge acquisition from big data","authors":"H. Fujita","doi":"10.1109/SACI.2015.7208189","DOIUrl":"https://doi.org/10.1109/SACI.2015.7208189","url":null,"abstract":"Health Services need to be ubiquitous to patients (users) robustly intelligent in provided health scenarios for predicting risk forecasting. Health forecasting based on different criteria becomes important feature that advanced nations should provide to their elderly growing citizen for better well-being. Predictions in heart attack or epilepsy are important to in reducing risks for patients and also other people surrounding such type pf patients, especially if the patients who have epilepsy symptoms is driving or involving in some task that could affect others.","PeriodicalId":312683,"journal":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132940086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time-suboptimal predictive control of four-in-wheel driven electric vehicles 四轮驱动电动汽车时间次优预测控制
G. Max, B. Lantos
{"title":"Time-suboptimal predictive control of four-in-wheel driven electric vehicles","authors":"G. Max, B. Lantos","doi":"10.1109/SACI.2015.7208232","DOIUrl":"https://doi.org/10.1109/SACI.2015.7208232","url":null,"abstract":"The paper deals with the approximately time optimal control of four in-wheel-driven (4WD) electric cars in a test path under state and input constraints with initial perturbations. The path is divided into sections allowing that path information for the actual section appears in real time based on sensor fusion. For each section a separate optimum control problem is solved in a receding horizon predictive control (RHPC) fashion using the single-track model (2WD) of the vehicle. The problem is given as a dynamic nonlinear optimal control problem (DNOCP) and solved by reformulating it to a static nonlinear program (NLP) using discretization and direct multiple shooting methods. A novel method is presented to convert the RHPC optimal solution to the optimal control of 4WD cars. The conversion assures similar motion of the CoG points of both models and optimal distribution of the longitudinal wheel forces. For closed loop control of 4WD vehicle a discrete time model predictive control (MPC) is proposed which uses the optimal reference signals and the distributed wheel forces and optimizes the perturbations with analytically solvable end constraints.","PeriodicalId":312683,"journal":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics","volume":"602 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133309733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
How to develop cloud security awareness 如何培养云安全意识
Edit Szilvia Ruboczki
{"title":"How to develop cloud security awareness","authors":"Edit Szilvia Ruboczki","doi":"10.1109/SACI.2015.7208221","DOIUrl":"https://doi.org/10.1109/SACI.2015.7208221","url":null,"abstract":"Development of Cloud Computing it is essential to develop the awareness of usage. Crowd of people use any day, on any device, from anywhere. It is necessary to handle those wide scale of users who want to keep their data in safe, and preserve their identity in the cyberspace. Cloud Computing Service Providers have to evolve their platforms as simply as it can be - but it should be given more responsibility for the customers. In an enterprise workflow the rights and policy of cloud using it could be teachable, transmissible in a very ordered way. But can we measure the effectiveness of these trainings? What type of trainings or lessons should be suitable for a company? And what type of trainings or lessons should be suitable for the employees? In my essay I observe the type of teaching, and try to scan the advantages and disadvantages of the types. With deep experiences in personal trainings, online trainings and E-learning in enterprise environment could be measured the results of the effectiveness of these knowledge transferring. Nowadays there is another way to reach the students in an easier and different way to take the advantage of addicting of play games - this another way is the gamification. The author's research to wield in the Cloud Computing teaching, especially the security of cloud and develop the cloud awareness of usage.","PeriodicalId":312683,"journal":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114564976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive control solution for T1DM control T1DM控制的自适应控制方案
G. Eigner, J. Tar, L. Kovács
{"title":"Adaptive control solution for T1DM control","authors":"G. Eigner, J. Tar, L. Kovács","doi":"10.1109/SACI.2015.7208202","DOIUrl":"https://doi.org/10.1109/SACI.2015.7208202","url":null,"abstract":"The “Type 1 Diabetes Mellitus (T1DM)” is a dangerous illness that concerns yearly increasing population. The control of the glucose level in the human body is a widely investigated subject area that also has serious technical difficulties as the lack of reliable system model for each individual patient, the limitations regarding the observability of the complete internal state of the patient (at least in the view of the system model). On this reason the “Model Predictive Control (MPC)” needs either robust or adaptive completion in this field of application. In the lack of observable data the traditional state estimators may have only limited relevance. The “Robust Fixed Point Transformation (RFPT)” based method was elaborated for the design of adaptive controllers typically for such situations. It does not need any sophisticated system model, it can work on the basis of observations that concern only the controlled quantity without the need of complete state estimation. In the present paper the use of the RFPT-based adaptive controller is reported in simulation investigations in which the validity of Bergman's “Minimal Model” is assumed. Promising simulation results are presented.","PeriodicalId":312683,"journal":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122088696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Intelligent feature selection method rooted in Binary Bat Algorithm for intrusion detection 基于二进制Bat算法的入侵检测智能特征选择方法
A. Enache, V. Sgârciu, Alina Petrescu-Nita
{"title":"Intelligent feature selection method rooted in Binary Bat Algorithm for intrusion detection","authors":"A. Enache, V. Sgârciu, Alina Petrescu-Nita","doi":"10.1109/SACI.2015.7208259","DOIUrl":"https://doi.org/10.1109/SACI.2015.7208259","url":null,"abstract":"The multitude of hardware and software applications generate a lot of data and burden security solutions that must acquire informations from all these heterogenous systems. Adding the current dynamic and complex cyber threats in this context, make it clear that new security solutions are needed. In this paper we propose a wrapper feature selection approach that combines two machine learning algorithms with an improved version of the Binary Bat Algorithm. Tests on the NSL-KDD dataset empirically prove that our proposed method can reduce the number of features with almost 60% and obtains good results in terms of attack detection rate and false alarm rate, even for unknown attacks.","PeriodicalId":312683,"journal":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115598509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Business process similarity metric supporting one-to-many relationship 支持一对多关系的业务流程相似度度量
Maria Laura Sebu, H. Ciocarlie
{"title":"Business process similarity metric supporting one-to-many relationship","authors":"Maria Laura Sebu, H. Ciocarlie","doi":"10.1109/SACI.2015.7208242","DOIUrl":"https://doi.org/10.1109/SACI.2015.7208242","url":null,"abstract":"In many areas graph match techniques are used to compare and identify common characteristics. In this paper we apply graph similarity techniques on the business processes used inside organizations and extracted with process mining techniques. The scope is to identify if an organization uses a similar process for a specific business case as another organization. However as the existence of exact matching is less probable, error tolerant graph matching techniques are more suitable for real life data. Business processes could have a different granularity level; one business process is more detailed in specific areas than the business process subject of the comparison. The custom algorithm for business process match presented in this paper takes into consideration a one-to-many relation for activities: one activity is matched with a set of activities in the other graph. Such information is important in extracting the common characteristics of organizations and could represent an input for choosing a collaborator. Business processes if not available are extracted with process mining techniques and are reduced to directed graph format. A custom graph similarity algorithm extended for multivalent nodes is applied and a business process similarity factor is retrieved.","PeriodicalId":312683,"journal":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129809365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A non-iterative robust-Gaussian filtering algorithm for roughness measurements 粗糙度测量的非迭代鲁棒高斯滤波算法
P. Bakucz, J. Z. Szabó, A. Várkonyi-Kóczy
{"title":"A non-iterative robust-Gaussian filtering algorithm for roughness measurements","authors":"P. Bakucz, J. Z. Szabó, A. Várkonyi-Kóczy","doi":"10.1109/SACI.2015.7208172","DOIUrl":"https://doi.org/10.1109/SACI.2015.7208172","url":null,"abstract":"To be introduced a non-iterative robust-Gaussian filter-operator for surface roughness parameters. We use modified bilateral filtering method with an initial approximation for the roughness measurement. The operator is robust and fast in the sense that it can suppress outliers in a non-iterative way. The results are compared with the Gaussian regression filtering method.","PeriodicalId":312683,"journal":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123751549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Physiological modeling and control at Obuda University 小布达大学生理建模与控制
L. Kovács, T. Ferenci, Johanna Sápi, G. Eigner, József Klespitz, P. Szalay, M. Kozlovszky, I. Rudas
{"title":"Physiological modeling and control at Obuda University","authors":"L. Kovács, T. Ferenci, Johanna Sápi, G. Eigner, József Klespitz, P. Szalay, M. Kozlovszky, I. Rudas","doi":"10.1109/SACI.2015.7208222","DOIUrl":"https://doi.org/10.1109/SACI.2015.7208222","url":null,"abstract":"The paper gives a summary of 2014 year results in the topic of physiological modeling and control achieved by the Physiological Controls Group of the Obuda University. The presentation is integrated in the tradition established years ago at IEEE INES conferences and 2014's IEEE SACI conference summarizing the latest results obtained by the group. Four topics are presented, highlighting collaboration with our partner research institutes as well: modern robust control of diabetes, antiangiogenic model-based tumor control, biostatistical modeling methods of diabetes, control of peristaltic pumps in hemodialyisis problem.","PeriodicalId":312683,"journal":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124429360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis and improvements in energy consumption models for RTS RTS能耗模型的分析与改进
C. Stângaciu, Andreea M. Horvath, M. Micea, V. Cretu, V. Groza
{"title":"Analysis and improvements in energy consumption models for RTS","authors":"C. Stângaciu, Andreea M. Horvath, M. Micea, V. Cretu, V. Groza","doi":"10.1109/SACI.2015.7208213","DOIUrl":"https://doi.org/10.1109/SACI.2015.7208213","url":null,"abstract":"In this paper we perform an analysis of the main software methods for consumption reduction in real time systems (RTS). The study covers both scheduling methods and energy consumption models for RTS, where we focus on sensor nodes. Further on, we propose a new consumption model for a large number of node configurations, which suites most of the main scheduling algorithms. We also introduce a software environment which integrates the new model and provides a set of reports and graphical results to compare the power consumption efficiency of the scheduling algorithms.","PeriodicalId":312683,"journal":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131479826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信