June 2015, Volume 15, Number 2
Summary: |
Martin PETRVALSKÝ - Oto PETURA - Miloš DRUTAROVSKÝ REMOTE FPGA LABORATORY FOR TESTING VHDL IMPLEMENTATIONS OF DIGITAL FIR FILTERS [full paper] In this paper, we develop a new remotely testable setup based on Altera Cyclone III field-programmable gate array. The setup
is part of the European project EDIVIDE in which our department participates. The setup is prepared for an educational purposes
in the field of the reconfigurable devices. The setup uses Nios II soft core processor with reconfigurable coprocessor for the digital
filtration. The design of the coprocessor is provided in VHDL which can by modified by the end user. The Nios processor programmed
in C language ensures an interface between the coprocessor and EDIVIDE project servers. The complete setup uses a Nios II Cyclone
III embedded evaluation kit board with additional debug and monitoring interfaces for EDIVIDE project infrastructure. Besides the
VHDL design and C implementation, we created a web interface for the remote testing and debugging of the end user designs.
|
Liberios VOKOROKOS - Ján HURTUK - Branislav MADOŠ - Peter OBEŠTER SECURITY ISSUES OF EMAIL MARKETING SERVICE [full paper] The paper deals in its first part with the topic of email marketing as well as with the topic of sending undesired messages when performing email marketing. The paper discusses industry standards and laws according which the email messages are to be compliant. Special attention is paid to the unwanted emails detection. Concept of solving the issues of spreading undesired emails when providing the service of email marketing is also described.
|
Lenka MACKOVÁ - Anton ČIŽMÁR - Jozef JUHÁR A STUDY OF ACOUSTIC FEATURES FOR EMOTIONAL SPEAKER RECOGNITION IN I-VECTOR REPRESENTATION [full paper] Recently recognition of emotions became very important in the field of speech and/or speaker recognition. This paper is dedicated to experimental investigation of best acoustic features obtained for purpose of gender-dependent speaker recognition from emotional speech. Four feature sets - LPC (Linear Prediction Coefficients), LPCC (Linear Prediction Cepstral Coefficients), MFCC (Mel-frequency Cepstral Coefficients) and PLP (Perceptual linear prediction) coefficients - were compared in an experimental setup of speaker recognition system, based on i-vector representation. For evaluation of the system emotional speech recordings from newly created Slovak emotional database and Mahalanobis distance metric as scoring method were used. The results of the experiment showed the MFCC representation as the best fitted for speaker verification from Slovak emotional speech with recognition rate higher than 80%.
|
Liberios VOKOROKOS - Ján HURTUK - Branislav MADOŠ - Kamil FRIGA DESIGN OF STEGANOGRAPHIC ALGORITHM USING WEB SERVICES [full paper] The aim of the paper is focused on the design of steganographic algorithm that is using web services as the cover medium. The
principle of steganographic algorithm is to insert a secret message to an ordinary communication, which in the background with the
help of an automated system generates this secret message to a desired recipient. Covert communication is available to public and it
is not hidden from third parties. This paper summarizes the results of the algorithm and at the very end there is also testing of the
software application that was used as the proof of concept.
|
Ján TÓTH - Ľuboš OVSENÍK - Ján TURÁN FREE SPACE OPTICS EXPERIMENTAL SYSTEM – LONG TERM MEASUREMENTS AND ANALYSIS [full paper] This paper considers Free Space Optics (FSO) systems. FSO availability and reliability is taken under the scope. FSO links operate within the infrared wavelength region. Lasers are used as light sources between two nodes to carry informational stream. FSO systems use Line of Sight (LOS) technology in order to maintain connection between two points. Weather conditions have quite significant impact on FSO operation in terms of availability and reliability. It is necessary to evaluate the air quality at the actual geographical location where FSO link is supposed to be placed. It is important to determine the impact of a light scattering, absorption, turbulence as well as a receiving power when dealing with FSO systems. Visibility has one of the most critical impacts on the quality of an optical transmission channel. Moreover, it is essential to monitor and store information about rain, snow and fog conditions. This paper introduces a device which measures all mentioned weather indicators such as a fog density, a relative humidity and a temperature. FSO availability and reliability estimation is based on measured data. These results evaluate weather conditions for Košice (a campuse of Technical University of Košice) in terms of FSO operation.
|
Liberios VOKOROKOS - Juraj MIHAĽOV - Eva CHOVANCOVÁ POTENTIAL OF LEGO c EV3 MOBILE ROBOTS [full paper] This paper highlights the potential of LEGO
c EV3 mobile robots in industry, especially as an alternative to life-threatening
professions. In the context of experimental construction of a powerful robot, particular sections carefully describe the story of a
successful project called Snail (the robot), its mission and technical details. The most important scientific contribution is believed to be
the design of powerful robot solution as an experimental proof that LEGO
c based low-cost commercial robotic platform might be an
interesting choice when dealing with difficult situations, money and knowledge. The robot is adapted to moving up the ladder including
LEGO
c Kit equipped by various sensors for data measuring as well as orientation in the terrain.
|
Martin TOMÁŠEK MULTI-AGENT SYSTEM FOR BUSINESS APPLICATIONS [full paper] In this paper we describe a multi-agent system which implements distributed computational system. The software architecture identifies distributed locations as abstractions of distributed computational system and various software agents as abstractions of different autonomous functional components. The interactions among agents within a system are the most critical for the application. Most common and one of the elementary types of e-commerce applications is consumer buying behavior. We propose a model of a general consumer buying behaviour application using general multi-agent system to examine its expressiveness. By identifying specific roles of software agents and designing new specific interaction patterns for them we implement the commercial model.
|
Liberios VOKOROKOS - Branislav MADOŠ - Ján HURTUK - Mária FEKOVÁ MULTI-CARRIER STEGANOGRAPHIC ALGORITHM USING LSB STEGANOGRAPHY [full paper] The ambition to achieve covering of secret messages into another file is implemented in many steganographic solutions, but usually the message is covered only into one file. In this paper the mechanism based on the method of steganography, with use of many cover files, is described. Proposal of the algorithm, based on Last Significant Bit method of steganography, is also described. The main contribution of this work is in the proposal of multi-carrier steganographic solution along with its implementation in the software application.
|
Tomáš LOJKA - Marek BUNDZEL - Iveta ZOLOTOVÁ INDUSTRIAL GATEWAY FOR DATA ACQUISITION AND REMOTE CONTROL [full paper] New industrial trends, related problems and proposed solutions are discussed here. The amount of data produced by various devices increases continually causing problems with remote control. We intend to address these problems with a proposed architecture, context-based services and new algorithms. We have analyzed suitable machine learning algorithms for data acquisition and selected K nearest neighbors for Event detection and Query Processing to manage data in a network of sensors and actuators. The implemented method comprises a part of the designed gateway architecture based on Internet of Things (IoT) and Serviced Oriented Architecture (SOA). We aim to improve remote control and data acquisition, monitoring and understanding of processes in technological layer in HMI interaction.
|
Petr BUJOK - Josef TVRÍK NEW VARIANTS OF ADAPTIVE DIFFERENTIAL EVOLUTION ALGORITHM WITH COMPETING STRATEGIES [full paper] New variants of the adaptive competitive differential evolution algorithm are proposed and tested experimentally on the CEC 2013
test suite. In the new variants, the adaptation is based on the competition of several strategies. The current-to-pbest mutation borrowed
from JADE is included into the pool of the competing strategies in newly proposed variants. The aim of the experimental comparison
is to find whether the presence of the current-to-pbest mutation strategy increases the efficiency of the differential evolution algorithm,
especially on rotated objective functions. The results of the experiments show that the new variants performed better in a few of the test
problems, while the benefit is not observed in the majority of the test problems.
|
Miroslav MIKITA - Michal KOLCUN SIMULATION MODEL OF PUMPED HYDROELECTRIC POWER PLANT [full paper] The Pumped hydroelectric power plants are very suitable way to avoid the unpredictable imbalance in power generation,
but it´s construction is very expensive and reliability is very long-term. Every single pumped hydroelectric power plant is like
rechargeable battery which can generate electricity when there is a deficiency in power generation and also can consume when there
is conversely reserve on power generation. That’s the main reason why is important to build such sources of energy. When you create
new project of every power plant that prediction of it´s performance is highly important and simulation software is useful in this cases.
For good prediction is also important true data in simulation and knowledge about locality of this project, because every project varies
from other similar projects. For obtaining optimal conditions of using pumped hydroelectric power plant is needed to find best
algorithm of generating or consuming the electricity.
|
Ján HURTUK - Branislav MADOŠ - Štefan HALČÍN SOUND-BASED COMMUNICATION IN THE PROCESS OF MALWARE DISTRIBUTION [full paper]
This article describes a case study dealing with the analysis of the evolution of malicious software from its beginning to the part. It examines the behaviour and weaknesses and the conclusion of this analysis antics the most important indicators of the effectiveness of its activities, the self is devoted to experimental method of communication by sound waves of frequencies outside the audible spectrum.
|