June 2014, Volume 14, Number 2
Summary: |
Liberios VOKOROKOS - Branislav MADOŠ - Viktor RUSKA FPGA HARDWARE ACCELERATION FOR VISUALIZATION WITH USE OF THE RAY TRACING ALGORITHM [full paper] This paper deals with the issue of hardware acceleration of photorealistic visualization with use of ray tracing technique in real
time. First part of the article briefly introduces ray tracing and presents existing hardware architectures that are accelerating
computations with aim to bring real time ray tracing; second part of the article introduces the implementation of the designed
solution that represents two modules implemented with use of the VHDL language and the FPGA technology. Modules are
accelerating the part of ray tracing algorithm that according to the research requires the most system resources. This part consists of
computation needed to find the ray-object intersection. The first module computes ray – sphere intersection, and the second
computes ray – triangle intersection. Both modules are composed of number of components, which were optimized and parallel
computing was applied in highest possible measure.
|
Jozef VAVREK - Jozef JUHÁR - Anton ČIŽMÁR THE SVM BINARY TREE CLASSIFICATION USING MRMR AND F-SCORE FEATURE SELECTION ALGORITHMST [full paper] The discrimination between various types of speech and non-speech signals in audio data stream is the fundamental step for further
indexing and retrieving. This paper considers some of the basic problems in audio content classification which is the key component in
automatic audio retrieval system. It illustrates a potential use of statistical learning algorithm called support vector machine (SVM) for
broadcast news (BN) audio classification task. The overall classification architecture uses binary tree SVM (BT-SVM) decision scheme
in combination with well known audio features such as, MFCCs and low level MPEG-7 audio descriptors. The important step in
creating such classification system is to define the optimal features for each binary SVM classifier. There exist various feature selection
algorithms that help to create such feature set. Therefore we decided to implement F-score and Minimum Redundancy Maximum
Relevance (MRMR) feature selection algorithms, as an effective search algorithms used in many pattern recognition tasks.
|
Martin TOMÁŠEK SECURITY PROPERTIES VERIFICATION OF SECURITY PROTOCOLS [full paper] We introduce security protocols by analyzing and verifying their properties. We use spi-calculus, an extension of the p-calculus,
that enables us to consider cryptographic issues in more details. In this work we represent the security protocol as a process and we
use the behavioral equivalences for describing secrecy and authenticity properties. Our goal is to design the practical procedure for
verification of security protocols.
|
Viliam KOVÁČ - Ján PASTIRČÁK - Lukáš FRIGA BRIEF GUIDE FOR AGENT-BASED MODELLING [full paper] This paper is devoted to agent-based modelling as a form of simulation process. It provides a brief introduction to agent-based
modelling process. This article introduces a new modern approach to compose complex systems. It also deals with a role of agent as the
substantial part of agent-based system. Successively, types of usage of agent-based systems are mentioned. General goals of common
modelling process are provided in the next part. It offers basic description of agent-based modelling process too. Main attention is paid
on a introduction to the software solutions for agent-based modelling, where one of the most applied pieces of software are described
with their advantages and disadvantages. Various agent-based modelling software platforms have been developed in recent period.
Many of them are aimed at particular activities. The separate chapter is devoted to the NetLogo software with focus laid on brief
characteristics of this software followed by description of modelling process within its graphic user interface. The conclusion involves
summary of this paper.
|
Matúš SULÍR - Slavomír ŠIMOŇÁK A TERSE STRING-EMBEDDED LANGUAGE FOR TREE SEARCHING AND REPLACING [full paper] Treepace is a new library and a domain specific language for tree pattern matching and replacing, implemented in Python. Selected
concepts resemble the well-known application programing interface (API) for string regular expressions. The language is terse since
it is possible to write a simple transformation consisting of a pattern and a replacement in one row. Objects of any types can be used
as node values. Calling host language constructs, e.g., functions, in the embedded language is straightforward. Node class inheritance
allows for mapping tree nodes to external objects like GUI (graphical user interface) components.
|
Liberios VOKOROKOS - Branislav MADOŠ - Marek ČAJKOVSKÝ - Ján HURTUK - Kristián MORAVČÍK ANALYSIS OF THE SOFTWARE BEHAVIOUR USING FORENSIC METHODS FOR COMPUTER SECURITY PURPOSES [full paper] Static analysis of malicious software is a complicated process. This complication stems from the fact that the process of
analysis has to be carried out on the malicious binary file which is represented in assembly language and therefore lacks critical
semantics such as functions, types and buffers that are only found in the source code of high-level languages. This work presents a
method that is built on top of IDA Pro disassembler and can be used for analysis of binary files by describing their structure using
finite-state automaton. This kind of approach allows a reverse engineer to perform advanced features such as visualization,
comparison, etc on a malicious file.
|
Martin TOMÁŠEK RECONFIGURING THE STRUCTURE OF COMPONENT-BASED SYSTEMS [full paper] We introduce component-based system architecture and basic software components. The main goal of this paper is to present a
novel solution for component-based system design in UML language. Any UML diagram of component-based system is automatically
optimized and then reconfigured to satisfy the hierarchical structure of component-based system. This solution is created as a plug-in
for Eclipse IDE and the results of the work are tested in various practical examples.
|
Norbert ÁDÁM - Branislav MADOŠ - Marek ČAJKOVSKÝ - Ján HURTUK - Tomáš TOMČÁK METHODS OF THE DATA MINING AND MACHINE LEARNING IN COMPUTER SECURITY [full paper] Due to the expansion of high-speed Internet access, the need for secure and reliable networks has become more critical. Since
attacks are becoming more sophisticated and networks are becoming larger there is a need for an efficient intrusion detection
systems (IDSs) that can distinguish between legitimate and illegitimate traffic and be able to signal attacks in real time, before
serious damages are produced. Although there are some existing mechanisms for intrusion detection, there is need to improve the
performance. Data mining techniques and machine learning are a new approach for intrusion detection. In this work naive Bayes
classifier and decision trees with C4.5 and CART algorithms for detecting abnormal traffic patterns in the KDD Cup 1999 data are
used. The IDS system is supposed to distinguish normal traffic from intrusions and to classify the intrusions into five classes:
Normal, DoS, probe, R2L and U2R. Research shows that decision trees gives better overall performance than the naive Bayes
classifier.
|
Radovan SIVÝ - Peter GIROVSKÝ MASTER-SLAVE CONTROL OF DYNAMIXEL ACTUATORS [full paper] This paper presents the control of actuators Dynamixel from BIOLOID kits and creating graphical user interface. Beginning of
this paper is devoted to description of the BIOLOID kits, focused especially for Dynamixel actuator AX-12A. The next parts of the
paper describe the comunication of actuators with the control unit and ways how to control the actuators. One of the way for the
controls of dynamixel actuators is control in program Matlab. At the end of this paper is a description of the created graphical user
interface for control drives with identification of position robotic arm based on Denavit-Hartenberg notation.
|
Ján SCHNEIDER - Ján GAMEC OVERVIEW OF UWB LOW-PROFILE PLANAR ANTENNAS [full paper] Historical overview of evolution wideband antennas and some practical realizations of UWB antennas are presented. Practical
realization of antennas are made by LTCC technology mostly, PCB technology or their combinations. Main features of antennas
such as wide frequency bandwidth, high gain and the smallest dimensions as possible are described. The features should be helpful
for future research of described antennas suitable for UWB radar applications.
|
Ľudmila MACEKOVÁ - Matej ŽIGA THE WIRELESS SENSOR NETWORK CONCEPT FOR MEASUREMENT OF WATER QUALITY IN WATER STREAMS [full paper] This article describes main aspects and steps of our design of water quality monitoring wireless sensor network.
Interconnections between the ecologic-environmental, biologic-chemical measurements and electronic-telecommunications areas
can be found in this matter. is Both the consultation with environmental specialists and data from the legislative documents from this
area are unavoidable parts of such study. The result of study is selection of the measure indicators of water quality, proposal of
suitable sensors, measurement method and architecture of the wireless sensor network. This work is a part of international crossborder
co-operation, with the aim to build a system for both monitoring the ecologic-biological state of the cross-border river and
early warning in case of an ecological disaster.
|