Search Results

You are looking at 1 - 10 of 30 items for :

  • "terminology" x
  • Materials and Applied Sciences x
  • Refine by Access: All Content x
Clear All

Abstract

The fourth industrial revolution, often identified as the terminology of Industry 4.0, more and more enforces changes and modifications from each participant of the socio-economic ecosystem. These enforced corrections concern the households, the governmental areas in different degrees, but the operation of the company sectors is rearranged most strongly by them. The study analyses this latter structure in the following respect: which are the most important supports of Industry 4.0 and what kind of competency elements are required from the employees and the management? According to the research data to be introduced, the domestic companies lag behind in preparations for the challenges raised by Industry 4.0; the international experiences are more favourable in this field. After—partial—review of the professional literature, the author concludes that the business sphere is in a condition before paradigm shift due to Industry 4.0. As per the analysis of decision-making based on digitalization, the question in the subtitle is answered—Industry 4.0 does not change fundamentally the traditional management functions of the company sector, but the decision-supporting applications based on digitalization must be learnt and applied. That statement seems to be founded that only company management, being able to live with decision making based on digitalization, can win competitive advantage.

Open access
Scientia et Securitas
Authors:
Péter Ekler
and
Dániel Pásztor

Összefoglalás. A mesterséges intelligencia az elmúlt években hatalmas fejlődésen ment keresztül, melynek köszönhetően ma már rengeteg különböző szakterületen megtalálható valamilyen formában, rengeteg kutatás szerves részévé vált. Ez leginkább az egyre inkább fejlődő tanulóalgoritmusoknak, illetve a Big Data környezetnek köszönhető, mely óriási mennyiségű tanítóadatot képes szolgáltatni.

A cikk célja, hogy összefoglalja a technológia jelenlegi állapotát. Ismertetésre kerül a mesterséges intelligencia történelme, az alkalmazási területek egy nagyobb része, melyek központi eleme a mesterséges intelligencia. Ezek mellett rámutat a mesterséges intelligencia különböző biztonsági réseire, illetve a kiberbiztonság területén való felhasználhatóságra. A cikk a jelenlegi mesterséges intelligencia alkalmazások egy szeletét mutatja be, melyek jól illusztrálják a széles felhasználási területet.

Summary. In the past years artificial intelligence has seen several improvements, which drove its usage to grow in various different areas and became the focus of many researches. This can be attributed to improvements made in the learning algorithms and Big Data techniques, which can provide tremendous amount of training.

The goal of this paper is to summarize the current state of artificial intelligence. We present its history, introduce the terminology used, and show technological areas using artificial intelligence as a core part of their applications. The paper also introduces the security concerns related to artificial intelligence solutions but also highlights how the technology can be used to enhance security in different applications. Finally, we present future opportunities and possible improvements. The paper shows some general artificial intelligence applications that demonstrate the wide range usage of the technology.

Many applications are built around artificial intelligence technologies and there are many services that a developer can use to achieve intelligent behavior. The foundation of different approaches is a well-designed learning algorithm, while the key to every learning algorithm is the quality of the data set that is used during the learning phase. There are applications that focus on image processing like face detection or other gesture detection to identify a person. Other solutions compare signatures while others are for object or plate number detection (for example the automatic parking system of an office building). Artificial intelligence and accurate data handling can be also used for anomaly detection in a real time system. For example, there are ongoing researches for anomaly detection at the ZalaZone autonomous car test field based on the collected sensor data. There are also more general applications like user profiling and automatic content recommendation by using behavior analysis techniques.

However, the artificial intelligence technology also has security risks needed to be eliminated before applying an application publicly. One concern is the generation of fake contents. These must be detected with other algorithms that focus on small but noticeable differences. It is also essential to protect the data which is used by the learning algorithm and protect the logic flow of the solution. Network security can help to protect these applications.

Artificial intelligence can also help strengthen the security of a solution as it is able to detect network anomalies and signs of a security issue. Therefore, the technology is widely used in IT security to prevent different type of attacks.

As different BigData technologies, computational power, and storage capacity increase over time, there is space for improved artificial intelligence solution that can learn from large and real time data sets. The advancements in sensors can also help to give more precise data for different solutions. Finally, advanced natural language processing can help with communication between humans and computer based solutions.

Open access

References ASTM , 2010 : ASTM E-1316, Standard Terminology for Nondestructive Examinations , 2010 . Carpinteri , A. 1982 . Fatigue

Restricted access

Seismic resilience assessment of critical infrastructures – Case study of M1 highway bridges

Kritikus infrastruktúrák szeizmikus ellenálló képesség vizsgálata – Az M1 autópálya hidak esettanulmánya

Scientia et Securitas
Authors:
László Gergely Vigh
,
Dániel Honfi
,
László Dunai
,
Ádám Zsarnóczay
,
József Simon
,
Máté Dohány
, and
Zsolt Berki

loss reduction, TR news 250. Transportation Research Board, pp. 14–15. 29 UNISDR (2009) 2009 UNISDR terminology on disaster risk reduction. United

Open access

Villamos rendszerek kiberbiztonsága az Ukrajnával kapcsolatos történések tükrében

Cyber security of electric power systems in light of the events related to Ukraine

Scientia et Securitas
Authors:
János Csatár
,
Péter Görgey
, and
Tamás Holczer

.] 14 ISA (2007) ISA-62443-1-1-2007 Security for Industrial Automation and Control Systems Part 1-1: Terminology, Concepts, and Models, International Society of Automation

Open access

Folyamatalapú, szabványos irányítási rendszerek a biztonságos és rugalmas vállalati működésért

Process-based, standardized management systems for secure and resilient corporate operations

Scientia et Securitas
Author:
Pál Michelberger

/IEC 33001:2015 Information technology – Process assessment – Concepts and terminology 53 ISO/IEC 33002:2015 Information technology – Process assessment

Open access

Early crisis warning system using community engagement through social network sites in times of disaster

Study case of the Dead Sea flash floods

Korai krízisjelző rendszerek alkalmazása a közösség bevonásával katasztrófák idején a közösségi oldalakon keresztül

A 2018-as holt-tengeri villámárvizek példája
Scientia et Securitas
Author:
Abdelkarim Alhloul

.05.016 38 United Nations Office for Disaster Risk Reduction (UNISDR) (2009) 2009 UNISDR Terminology on Disaster Risk Reduction, International Stratergy for Disaster Reduction (ISDR), pp. 1

Open access

spring length in the free or unloaded situation, as shown in Fig. 1 . Fig. 1. Compression spring terminology (Own source) Spring free length, (2) L F = n ′   × d + δ max + 0.15   δ max where δ max = Maximum compression 0.15 δ max = Clearance between

Open access

]. Test questions are then prepared deliberately avoiding the usual mathematical terminology. We are interested in the later “life” of concepts and methods in engineering environments rather than schematic steps or visual information that students can

Open access

digitization transition experienced in company processes. However, parallel to the significant macroeconomic effects of Industry 4.0, the terminology can also be applied to the entire macroeconomics of [ 11 , 12 ]. In general, it can be stated that shortening

Open access