Go to content Go to navigation Go to search

A Database of Manoeuvres for Avoiding Conflicts Between Aircraft in Selected Training Simulations

Naděžda BARTOŠOVÁ

Abstract


This article focuses on a proposed database of manoeuvres, which can be used to prevent conflict situations (reduction of the minimum separation limits between planes). The presented database is part of a more extensive project, which involves presentation of an expert system serving for automatic detection of conflict situations and for a proposal of their optimum resolution in training simulations, which are used to provide basic training to air traffic controllers.

Keywords


Conflict Situations, Aircraft, Expert System, Database, Manoeuvres Avoidance, Simulation Air Situations.
Full paper

2014-11-27

Lessons Learned from Data Mining Challenges

Petr BERKA

Abstract


It becomes a good habit to organize a data mining cup, a competition or a challenge at machine learning or data mining conferences. Such events can be used for comparison of various approaches and algorithms, they give the participants a possibility to access and analyze real-world data, and they can result in knowledge interesting for the domain experts who provided the data. Cups and competitions are usually organized around a well-defined classification problem whereas challenges do not have a clear specification what to look for. The paper describes our experience gained when organizing and evaluating the data mining challenges during European Conferences on Data Mining and Machine Learning. It shows the challenge settings, describes the used data and the solved tasks and summarizes the lessons learned.

Keywords


Data Mining, Machine Learning, Classification, Prediction, Knowledge Acquisition, Discovery Challenge.
Full paper

2014-11-26

Optimization of Induction Motor by FE Analysis

Dušan MAGA

Abstract


The concept of FE model of induction (asynchronous) motor has been analyzed by author in [1]. While in [1] the analytical design [2] has been verified by numerical (finite element) analysis, this paper deals with optimization technique based on finite element solution. The aim of the optimization is to obtain the maximal possible torque. The optimization procedures, based on procedures successfully used by author with reluctance machinery [3], are transformed to spheres of induction machinery, where possible changes applied to model geometry and electric (supply current density and rotor bars current response) parameters are generating different mechanical torque on machine shaft. The induction machines are very often equipped in pumps and pump systems produced in industrial region in Tatabanya, Hungary.

Keywords


Induction Motor; Finite Element Magnetic Field Analysis; Torque Computation; Optimization.
Full paper

2014-08-05

An Assessment of Informational Threat in the Functioning Process of Virtual Community

Ruslan HUMINSKYI and Andrii PELESHCHYSHYN

Abstract


In addition to the support functions of communication, an exchange of opinions, obtaining information, business organization and management, social networks have increasingly become an objects and instruments of external communicatory-psychological management and the arena of informational antagonism at different levels. Social networks have become the perfect tool of influence on national interests in the informational area. In order to prevent informational threats in virtual communities and to prevent implementation in the real world there is a need to assess their performance at the stage of their functioning in social networks.

Keywords


virtual communities, social networks, informational security, informational threats.
Full paper

2014-08-01

FE Model of Induction Motor

Dusan MAGA

Abstract


Based on local situation in the industrial region of Tatabanya, Hungary, the most frequently used mechatronical actuator has been identified. Wastewater and/or other pumps, as well as scuba pump systems are mostly equipped by induction (asynchronous) motors. This machinery often meets the major production of the largest local company, as well as a lot of other smaller corporations dealing with electrical machinery and mechatronical actuators. The numerical analysis of the machine, presented in the paper, is a base for following optimization processes. The main objective of this work is to optimize the used machinery with special attention paid to motor’s torque and so to save the energy necessary to power the used technologies (the optimization procedures and the following results will be presented in author’s next paper).

Keywords


Electrical machines, Induction Motors, Finite Element Field Simulation, Numerical Analysis, Comparison of Analytical Design and Numerical Analysis.
Full paper

2014-01-29

Possibilities of Increasing Approaches to MENTAL

Kamil HALOUZKA

Abstract


The purpose of this article, “Possibility of increasing approach to MENTAL” is to analyse users access to the knowledge systém MENTAL, that was implemented in 2011 in an environment of Staff Information System (SIS). For this analysis was twice carried out a collection of information about users access to the SIS. Within two years, there has been a reduction in the number of visitors, and therefore the article will deal not only about the MENTAL, but also about possibilities how to increase the number of these approaches.

Keywords


Knowledge management, Topic Maps, MENTAL, AToM2.
Full paper

2013-12-17

Collaborative Society: Military Universities

Vojtěch ONDRYHAL

Abstract


Based on the created MilUNI portal on military universities the project team tries to create a community of cooperating universities. Analysis of the concept of Collaborative Society is elaborated. Description of the MilUNI project is included. Areas for university cooperation are specified and the measures are published for the development of cooperation society and the formation of community.

Keywords


Collaborative Society, Military Universities, System MilUNI, Cooperation.
Full paper

2013-11-28

Visual Analytics Applied to Cyber Security

Vlastimil MALÝ

Abstract


The field of Visual Analytics (VA) seeks to combine computational power, visual display, and human capabilities in order to extract knowledge from large, heterogeneous data sets. VA is in part a response to the scale and complexity of information that is now potentially available. It seeks to aid people in making sense of the world by helping them identify and exploit relevant information. Within the field of VA we are trying to exploit and enable the considerable capabilities of the human visual perceptual process. Visual analytics techniques can be extremely helpful to addressing the potential and actual consequences of cyber attacks. Visual analytics, when applied to anomalous network behaviours, could provide a basis for a realtime indications and warnings system usable for supposed cyber incidents.
Visual Analytics arose in the post nine-eleven eras in order to provide tools to the analyst to aid in the identification of threats. It was formulated primarily by experts from the field of information visualization and emphasized visual tools for information understanding and extracting patterns.

Keywords


Visual Analytics, Cyber Threats, Network Traffic, Human Visual Perceptual Process, Visual Tools Technologies, Patterns, Decision-making Process, Big Data, Cyber-Crime, Graphics.
Full paper

2013-11-28

Personal Information Management in the Cyber Defence

Oldřich LUŇÁČEK, Jaroslav ŠANDA

Abstract


The personal information management area is addressed by each of us. Any organisation or company addresses the issues of access to information. For each of us it is important to sort, organize, find, acquire and maintain information, as appropriate, among them the search of mutual respect. Information has a key role in our decision making, especially due to the fact, that the human capacity to process all of the available information is limited by the capacity and time demands.

Keywords


Knowledge system, Learning Management System, Fragmentation, Personal Information Management.
Full paper

2013-11-28

PossibleCyberAttacksOfTheFuture

Petr HRŮZA

Abstract


Social networking is a way for people to connect and share information with each other online. Millions of people worldwide regularly access these types of services from mobile devices, applications, and websites. Mobile phones and smartphones give users mobile access to email, the internet, GPS navigation, and many other applications. Smartphone security has not kept pace with traditional computer security. Unfortunately, many smartphone users do not recognize these security shortcomings. Meanwhile, mobile phones are becoming more and more valuable as targets for attack.

Keywords


Social Networking, Mobile phone, Smartphones, Security.
Full paper

2013-11-28

Previous Next