June 2015, Volume 15, Number 2


PETRVALSKÝ, M. — PETURA, O. — DRUTAROVSKÝ, M.
Remote FPGA Laboratory for Testing VHDL Implementations of Digital Fir Filters

VOKOROKOS, L. — HURTUK, J. — MADOŠ, B. — OBEŠTER, P.
Security Issues of Email Marketing Service

MACKOVÁ, L. — ČIŽMÁR, A. — JUHÁR, J.
A Study of Acoustic Features for Emotional Speaker Recognition in I-Vector Representation

VOKOROKOS, L. — HURTUK, J. — MADOŠ, B. — FRIGA, K.
Design of Steganographic Algorithm Using Web Services

TÓTH, J. — OVSENÍK, Ľ. — TURÁN, J.
Free Space Optics Experimental System – Long Term Measurements and Analysis

VOKOROKOS, L. — MIHAĽOV, J. — CHOVANCOVÁ, E.
Potential of Lego© EV3 Mobile Robots

TOMÁŠEK, M.
Multi-Agent System for Business Applications

VOKOROKOS, L. — MADOŠ, B. — HURTUK, J. — FEKOVÁ, M.
Multi-Carrier Steganographic Algorithm Using LSB Steganography

LOJKA, T. — BUNDZEL, M. — ZOLOTOVÁ, I.
Industrial Gateway for Data Acquisition and Remote Control

BUJOK, P. — TVRDÍK, J.
New Variants of Adaptive Differential Evolution Algorithm with Competing Strategies

MIKITA, M. — KOLCUN, M.
Simulation Model of Pumped Hydroelectric Power Plant

HURTUK, J. — MADOŠ, B. — HALČÍN, Š.
Sound-Based Communication in the Process of Malware Distribution

Summary:
Martin PETRVALSKÝ - Oto PETURA - Miloš DRUTAROVSKÝ
REMOTE FPGA LABORATORY FOR TESTING VHDL IMPLEMENTATIONS OF DIGITAL FIR FILTERS [full paper]

In this paper, we develop a new remotely testable setup based on Altera Cyclone III field-programmable gate array. The setup is part of the European project EDIVIDE in which our department participates. The setup is prepared for an educational purposes in the field of the reconfigurable devices. The setup uses Nios II soft core processor with reconfigurable coprocessor for the digital filtration. The design of the coprocessor is provided in VHDL which can by modified by the end user. The Nios processor programmed in C language ensures an interface between the coprocessor and EDIVIDE project servers. The complete setup uses a Nios II Cyclone III embedded evaluation kit board with additional debug and monitoring interfaces for EDIVIDE project infrastructure. Besides the VHDL design and C implementation, we created a web interface for the remote testing and debugging of the end user designs.


Liberios VOKOROKOS - Ján HURTUK - Branislav MADOŠ - Peter OBEŠTER
SECURITY ISSUES OF EMAIL MARKETING SERVICE [full paper]

The paper deals in its first part with the topic of email marketing as well as with the topic of sending undesired messages when performing email marketing. The paper discusses industry standards and laws according which the email messages are to be compliant. Special attention is paid to the unwanted emails detection. Concept of solving the issues of spreading undesired emails when providing the service of email marketing is also described.


Lenka MACKOVÁ - Anton ČIŽMÁR - Jozef JUHÁR
A STUDY OF ACOUSTIC FEATURES FOR EMOTIONAL SPEAKER RECOGNITION IN I-VECTOR REPRESENTATION [full paper]

Recently recognition of emotions became very important in the field of speech and/or speaker recognition. This paper is dedicated to experimental investigation of best acoustic features obtained for purpose of gender-dependent speaker recognition from emotional speech. Four feature sets - LPC (Linear Prediction Coefficients), LPCC (Linear Prediction Cepstral Coefficients), MFCC (Mel-frequency Cepstral Coefficients) and PLP (Perceptual linear prediction) coefficients - were compared in an experimental setup of speaker recognition system, based on i-vector representation. For evaluation of the system emotional speech recordings from newly created Slovak emotional database and Mahalanobis distance metric as scoring method were used. The results of the experiment showed the MFCC representation as the best fitted for speaker verification from Slovak emotional speech with recognition rate higher than 80%.


Liberios VOKOROKOS - Ján HURTUK - Branislav MADOŠ - Kamil FRIGA
DESIGN OF STEGANOGRAPHIC ALGORITHM USING WEB SERVICES [full paper]

The aim of the paper is focused on the design of steganographic algorithm that is using web services as the cover medium. The principle of steganographic algorithm is to insert a secret message to an ordinary communication, which in the background with the help of an automated system generates this secret message to a desired recipient. Covert communication is available to public and it is not hidden from third parties. This paper summarizes the results of the algorithm and at the very end there is also testing of the software application that was used as the proof of concept.


Ján TÓTH - Ľuboš OVSENÍK - Ján TURÁN
FREE SPACE OPTICS EXPERIMENTAL SYSTEM – LONG TERM MEASUREMENTS AND ANALYSIS
[full paper]

This paper considers Free Space Optics (FSO) systems. FSO availability and reliability is taken under the scope. FSO links operate within the infrared wavelength region. Lasers are used as light sources between two nodes to carry informational stream. FSO systems use Line of Sight (LOS) technology in order to maintain connection between two points. Weather conditions have quite significant impact on FSO operation in terms of availability and reliability. It is necessary to evaluate the air quality at the actual geographical location where FSO link is supposed to be placed. It is important to determine the impact of a light scattering, absorption, turbulence as well as a receiving power when dealing with FSO systems. Visibility has one of the most critical impacts on the quality of an optical transmission channel. Moreover, it is essential to monitor and store information about rain, snow and fog conditions. This paper introduces a device which measures all mentioned weather indicators such as a fog density, a relative humidity and a temperature. FSO availability and reliability estimation is based on measured data. These results evaluate weather conditions for Košice (a campuse of Technical University of Košice) in terms of FSO operation.


Liberios VOKOROKOS - Juraj MIHAĽOV - Eva CHOVANCOVÁ
POTENTIAL OF LEGO c EV3 MOBILE ROBOTS [full paper]

This paper highlights the potential of LEGO c EV3 mobile robots in industry, especially as an alternative to life-threatening professions. In the context of experimental construction of a powerful robot, particular sections carefully describe the story of a successful project called Snail (the robot), its mission and technical details. The most important scientific contribution is believed to be the design of powerful robot solution as an experimental proof that LEGO c based low-cost commercial robotic platform might be an interesting choice when dealing with difficult situations, money and knowledge. The robot is adapted to moving up the ladder including LEGO c Kit equipped by various sensors for data measuring as well as orientation in the terrain.


Martin TOMÁŠEK
MULTI-AGENT SYSTEM FOR BUSINESS APPLICATIONS [full paper]

In this paper we describe a multi-agent system which implements distributed computational system. The software architecture identifies distributed locations as abstractions of distributed computational system and various software agents as abstractions of different autonomous functional components. The interactions among agents within a system are the most critical for the application. Most common and one of the elementary types of e-commerce applications is consumer buying behavior. We propose a model of a general consumer buying behaviour application using general multi-agent system to examine its expressiveness. By identifying specific roles of software agents and designing new specific interaction patterns for them we implement the commercial model.


Liberios VOKOROKOS - Branislav MADOŠ - Ján HURTUK - Mária FEKOVÁ
MULTI-CARRIER STEGANOGRAPHIC ALGORITHM USING LSB STEGANOGRAPHY [full paper]

The ambition to achieve covering of secret messages into another file is implemented in many steganographic solutions, but usually the message is covered only into one file. In this paper the mechanism based on the method of steganography, with use of many cover files, is described. Proposal of the algorithm, based on Last Significant Bit method of steganography, is also described. The main contribution of this work is in the proposal of multi-carrier steganographic solution along with its implementation in the software application.


Tomáš LOJKA - Marek BUNDZEL - Iveta ZOLOTOVÁ
INDUSTRIAL GATEWAY FOR DATA ACQUISITION AND REMOTE CONTROL [full paper]

New industrial trends, related problems and proposed solutions are discussed here. The amount of data produced by various devices increases continually causing problems with remote control. We intend to address these problems with a proposed architecture, context-based services and new algorithms. We have analyzed suitable machine learning algorithms for data acquisition and selected K nearest neighbors for Event detection and Query Processing to manage data in a network of sensors and actuators. The implemented method comprises a part of the designed gateway architecture based on Internet of Things (IoT) and Serviced Oriented Architecture (SOA). We aim to improve remote control and data acquisition, monitoring and understanding of processes in technological layer in HMI interaction.


Petr BUJOK - Josef TVRÍK
NEW VARIANTS OF ADAPTIVE DIFFERENTIAL EVOLUTION ALGORITHM WITH COMPETING STRATEGIES [full paper]

New variants of the adaptive competitive differential evolution algorithm are proposed and tested experimentally on the CEC 2013 test suite. In the new variants, the adaptation is based on the competition of several strategies. The current-to-pbest mutation borrowed from JADE is included into the pool of the competing strategies in newly proposed variants. The aim of the experimental comparison is to find whether the presence of the current-to-pbest mutation strategy increases the efficiency of the differential evolution algorithm, especially on rotated objective functions. The results of the experiments show that the new variants performed better in a few of the test problems, while the benefit is not observed in the majority of the test problems.


Miroslav MIKITA - Michal KOLCUN
SIMULATION MODEL OF PUMPED HYDROELECTRIC POWER PLANT [full paper]

The Pumped hydroelectric power plants are very suitable way to avoid the unpredictable imbalance in power generation, but it´s construction is very expensive and reliability is very long-term. Every single pumped hydroelectric power plant is like rechargeable battery which can generate electricity when there is a deficiency in power generation and also can consume when there is conversely reserve on power generation. That’s the main reason why is important to build such sources of energy. When you create new project of every power plant that prediction of it´s performance is highly important and simulation software is useful in this cases. For good prediction is also important true data in simulation and knowledge about locality of this project, because every project varies from other similar projects. For obtaining optimal conditions of using pumped hydroelectric power plant is needed to find best algorithm of generating or consuming the electricity.


Ján HURTUK - Branislav MADOŠ - Štefan HALČÍN
SOUND-BASED COMMUNICATION IN THE PROCESS OF MALWARE DISTRIBUTION [full paper]

This article describes a case study dealing with the analysis of the evolution of malicious software from its beginning to the part. It examines the behaviour and weaknesses and the conclusion of this analysis antics the most important indicators of the effectiveness of its activities, the self is devoted to experimental method of communication by sound waves of frequencies outside the audible spectrum.


 

Publisher

    Faculty of Electrical Engineering and Informatics, Technical University of Košice, Slovak Republic

    Reg. No.: EV 2921/09,
    thematic group B1,
    ISSN 1335-8243
    The editorial board assumes no responsibility for damages suffered due to use of acts, methods, products, instructions for use or other ideas published by the article authors whatsoever.
EAN 9771335824005