June 2014, Volume 14, Number 2


VOKOROKOS, L. — MADOŠ, B. - RUSKA, V.
FPGA Hardware Acceleration for Visualization with Use of the Ray Tracing Algorithm

VAVREK, J. — JUHÁR, J. — ČIŽMÁR, A.
The SVM Binary Tree Classification Using MRMR and F-Score Feature Selection Algorithms

TOMÁŠEK, M.
Security Properties Verification of Security Protocols

KOVÁČ, V. — PASTIRČÁK, J. — FRIGA, L.
Brief Guide for Agent-Based Modelling

SULÍR, M. — ŠIMOŇÁK, S.
A Terse String-Embedded Language for Tree Searching and Replacing

VOKOROKOS, L. — MADOŠ, B. — ČAJKOVSKÝ, M. — HURTUK, J. — MORAVČÍK, K.
Analysis of the Software Behaviour Using Forensic Methods for Computer Security Purposes

TOMÁŠEK, M.
Reconfiguring the Structure of Component-Based Systems

ÁDÁM, N. — MADOŠ, B. — ČAJKOVSKÝ, M. — HURTUK, J. — TOMČÁK, T.
Methods of the Data Mining and Machine Learning in Computer Security

SIVÝ, R. – GIROVSKÝ, P.
Master-Slave Control of Dynamixel Actuators

SCHNEIDER, J. – GAMEC, J.
Overview of UWB Low-Profile Planar Antennas

MACEKOVÁ, Ľ. — ŽIGA, M.
The Wireless Sensor Network Concept for Measurement of Water Quality in Water Streams

Summary:
Liberios VOKOROKOS - Branislav MADOŠ - Viktor RUSKA
FPGA HARDWARE ACCELERATION FOR VISUALIZATION WITH USE OF THE RAY TRACING ALGORITHM [full paper]

This paper deals with the issue of hardware acceleration of photorealistic visualization with use of ray tracing technique in real time. First part of the article briefly introduces ray tracing and presents existing hardware architectures that are accelerating computations with aim to bring real time ray tracing; second part of the article introduces the implementation of the designed solution that represents two modules implemented with use of the VHDL language and the FPGA technology. Modules are accelerating the part of ray tracing algorithm that according to the research requires the most system resources. This part consists of computation needed to find the ray-object intersection. The first module computes ray – sphere intersection, and the second computes ray – triangle intersection. Both modules are composed of number of components, which were optimized and parallel computing was applied in highest possible measure.


Jozef VAVREK - Jozef JUHÁR - Anton ČIŽMÁR
THE SVM BINARY TREE CLASSIFICATION USING MRMR AND F-SCORE FEATURE SELECTION ALGORITHMST [full paper]

The discrimination between various types of speech and non-speech signals in audio data stream is the fundamental step for further indexing and retrieving. This paper considers some of the basic problems in audio content classification which is the key component in automatic audio retrieval system. It illustrates a potential use of statistical learning algorithm called support vector machine (SVM) for broadcast news (BN) audio classification task. The overall classification architecture uses binary tree SVM (BT-SVM) decision scheme in combination with well known audio features such as, MFCCs and low level MPEG-7 audio descriptors. The important step in creating such classification system is to define the optimal features for each binary SVM classifier. There exist various feature selection algorithms that help to create such feature set. Therefore we decided to implement F-score and Minimum Redundancy Maximum Relevance (MRMR) feature selection algorithms, as an effective search algorithms used in many pattern recognition tasks.


Martin TOMÁŠEK
SECURITY PROPERTIES VERIFICATION OF SECURITY PROTOCOLS [full paper]

We introduce security protocols by analyzing and verifying their properties. We use spi-calculus, an extension of the p-calculus, that enables us to consider cryptographic issues in more details. In this work we represent the security protocol as a process and we use the behavioral equivalences for describing secrecy and authenticity properties. Our goal is to design the practical procedure for verification of security protocols.


Viliam KOVÁČ - Ján PASTIRČÁK - Lukáš FRIGA
BRIEF GUIDE FOR AGENT-BASED MODELLING [full paper]

This paper is devoted to agent-based modelling as a form of simulation process. It provides a brief introduction to agent-based modelling process. This article introduces a new modern approach to compose complex systems. It also deals with a role of agent as the substantial part of agent-based system. Successively, types of usage of agent-based systems are mentioned. General goals of common modelling process are provided in the next part. It offers basic description of agent-based modelling process too. Main attention is paid on a introduction to the software solutions for agent-based modelling, where one of the most applied pieces of software are described with their advantages and disadvantages. Various agent-based modelling software platforms have been developed in recent period. Many of them are aimed at particular activities. The separate chapter is devoted to the NetLogo software with focus laid on brief characteristics of this software followed by description of modelling process within its graphic user interface. The conclusion involves summary of this paper.


Matúš SULÍR - Slavomír ŠIMOŇÁK
A TERSE STRING-EMBEDDED LANGUAGE FOR TREE SEARCHING AND REPLACING
[full paper]

Treepace is a new library and a domain specific language for tree pattern matching and replacing, implemented in Python. Selected concepts resemble the well-known application programing interface (API) for string regular expressions. The language is terse since it is possible to write a simple transformation consisting of a pattern and a replacement in one row. Objects of any types can be used as node values. Calling host language constructs, e.g., functions, in the embedded language is straightforward. Node class inheritance allows for mapping tree nodes to external objects like GUI (graphical user interface) components.


Liberios VOKOROKOS - Branislav MADOŠ - Marek ČAJKOVSKÝ - Ján HURTUK - Kristián MORAVČÍK
ANALYSIS OF THE SOFTWARE BEHAVIOUR USING FORENSIC METHODS FOR COMPUTER SECURITY PURPOSES [full paper]

Static analysis of malicious software is a complicated process. This complication stems from the fact that the process of analysis has to be carried out on the malicious binary file which is represented in assembly language and therefore lacks critical semantics such as functions, types and buffers that are only found in the source code of high-level languages. This work presents a method that is built on top of IDA Pro disassembler and can be used for analysis of binary files by describing their structure using finite-state automaton. This kind of approach allows a reverse engineer to perform advanced features such as visualization, comparison, etc on a malicious file.


Martin TOMÁŠEK
RECONFIGURING THE STRUCTURE OF COMPONENT-BASED SYSTEMS [full paper]

We introduce component-based system architecture and basic software components. The main goal of this paper is to present a novel solution for component-based system design in UML language. Any UML diagram of component-based system is automatically optimized and then reconfigured to satisfy the hierarchical structure of component-based system. This solution is created as a plug-in for Eclipse IDE and the results of the work are tested in various practical examples.


Norbert ÁDÁM - Branislav MADOŠ - Marek ČAJKOVSKÝ - Ján HURTUK - Tomáš TOMČÁK
METHODS OF THE DATA MINING AND MACHINE LEARNING IN COMPUTER SECURITY [full paper]

Due to the expansion of high-speed Internet access, the need for secure and reliable networks has become more critical. Since attacks are becoming more sophisticated and networks are becoming larger there is a need for an efficient intrusion detection systems (IDSs) that can distinguish between legitimate and illegitimate traffic and be able to signal attacks in real time, before serious damages are produced. Although there are some existing mechanisms for intrusion detection, there is need to improve the performance. Data mining techniques and machine learning are a new approach for intrusion detection. In this work naive Bayes classifier and decision trees with C4.5 and CART algorithms for detecting abnormal traffic patterns in the KDD Cup 1999 data are used. The IDS system is supposed to distinguish normal traffic from intrusions and to classify the intrusions into five classes: Normal, DoS, probe, R2L and U2R. Research shows that decision trees gives better overall performance than the naive Bayes classifier.


Radovan SIVÝ - Peter GIROVSKÝ
MASTER-SLAVE CONTROL OF DYNAMIXEL ACTUATORS [full paper]

This paper presents the control of actuators Dynamixel from BIOLOID kits and creating graphical user interface. Beginning of this paper is devoted to description of the BIOLOID kits, focused especially for Dynamixel actuator AX-12A. The next parts of the paper describe the comunication of actuators with the control unit and ways how to control the actuators. One of the way for the controls of dynamixel actuators is control in program Matlab. At the end of this paper is a description of the created graphical user interface for control drives with identification of position robotic arm based on Denavit-Hartenberg notation.


Ján SCHNEIDER - Ján GAMEC
OVERVIEW OF UWB LOW-PROFILE PLANAR ANTENNAS [full paper]

Historical overview of evolution wideband antennas and some practical realizations of UWB antennas are presented. Practical realization of antennas are made by LTCC technology mostly, PCB technology or their combinations. Main features of antennas such as wide frequency bandwidth, high gain and the smallest dimensions as possible are described. The features should be helpful for future research of described antennas suitable for UWB radar applications.


Ľudmila MACEKOVÁ - Matej ŽIGA
THE WIRELESS SENSOR NETWORK CONCEPT FOR MEASUREMENT OF WATER QUALITY IN WATER STREAMS [full paper]

This article describes main aspects and steps of our design of water quality monitoring wireless sensor network. Interconnections between the ecologic-environmental, biologic-chemical measurements and electronic-telecommunications areas can be found in this matter. is Both the consultation with environmental specialists and data from the legislative documents from this area are unavoidable parts of such study. The result of study is selection of the measure indicators of water quality, proposal of suitable sensors, measurement method and architecture of the wireless sensor network. This work is a part of international crossborder co-operation, with the aim to build a system for both monitoring the ecologic-biological state of the cross-border river and early warning in case of an ecological disaster.


 

Publisher

    Faculty of Electrical Engineering and Informatics, Technical University of Košice, Slovak Republic

    Reg. No.: EV 2921/09,
    thematic group B1,
    ISSN 1335-8243
    The editorial board assumes no responsibility for damages suffered due to use of acts, methods, products, instructions for use or other ideas published by the article authors whatsoever.
EAN 9771335824005