https://cyber.bibl.u-szeged.hu/index.php/actcybern/issue/feedActa Cybernetica2025-03-18T17:18:06+01:00Boglárka G.-Tóthboglarka@inf.szte.huOpen Journal Systems<div id="main-content" class="region clearfix"> <div class="region region-content"> <div id="block-system-main" class="block block-system"> <div class="content"> <div id="node-30" class="node node-page clearfix"> <div class="content"> <div class="field field-name-body field-type-text-with-summary field-label-hidden"> <div class="field-items"> <div class="field-item even"> <p><img style="margin-left: 10px; margin-right: 10px; float: right; width: 203px; height: 291px;" src="https://www.inf.u-szeged.hu/sites/default/files/kutatas/actacover1802qh.png" alt=""></p> <p>A scientific journal published by the <a href="https://www.inf.u-szeged.hu" target="_blank" rel="noopener">Institute of Informatics</a>, <a href="https://www.u-szeged.hu/english/" target="_blank" rel="noopener">University of Szeged</a>, <a href="https://www.szeged.hu/" target="_blank" rel="noopener">Szeged</a>, <a href="https://www.fsz.bme.hu/hungary/homepage.html" target="_blank" rel="noopener">Hungary</a>.</p> <p>Acta Cybernetica is abstracted by <a href="https://www.ams.org/publications/math-reviews/math-reviews" target="_blank" rel="noopener">Mathematical Reviews</a>, <a href="https://computingreviews.com/" target="_blank" rel="noopener">Computing Reviews</a>, <a href="https://zbmath.org/" target="_blank" rel="noopener">Zentralblatt für Mathematik</a> and <a href="https://dl.acm.org/journal/accy" target="_blank" rel="noopener">ACM Digital Library</a></p> <p> <a href="https://www.scimagojr.com/journalsearch.php?q=13024&tip=sid&clean=0"><img style="margin-left: 10px; margin-right: 10px; float: right; width: 135px; height: 135px;" src="/public/site/images/boglarka/esci-button.png"></a> </p> <p>It is also indexed by <a href="https://www.scopus.com/sourceid/13024" target="_blank" rel="noopener">Scopus</a>, <a href="https://dblp.uni-trier.de/db/journals/actaC/index.html" target="_blank" rel="noopener">DBLP</a>, EBSCO and Emerging Sources Citation Index (ESCI).</p> <p><strong>We are not accepting any new proposals for Special Issues.</strong> The Special Issues for the next few years are already filled.</p> <p> </p> <p><a title="SCImago Journal & Country Rank" href="https://www.scimagojr.com/journalsearch.php?q=13024&tip=sid&exact=no"><img style="margin-left: 10px; margin-right: 10px; float: right; width: 201px; height: 201px;" src="https://www.scimagojr.com/journal_img.php?id=13024" alt=""></a></p> </div> </div> </div> </div> </div> </div> </div> </div> </div>https://cyber.bibl.u-szeged.hu/index.php/actcybern/article/view/4618Preface2025-03-18T17:17:42+01:00Imre Vargavarga.imre@inf.unideb.huGergely Kovásznaikovasznai.gergely@uni-eszterhazy.hu<p>In today's dynamic and ever-evolving digital landscape, applied informatics plays a pivotal role in shaping the future of technology. From refining algorithms for enhanced data analysis to optimizing communication networks and advancing artificial intelligence, the realm of applied informatics continues to drive innovation and transformation across industries.</p> <p>This current Special Issue features contributions from the 12th International Conference on Applied Informatics (ICAI 2023), which was held in Eger, Hungary on March 2-4, 2023. These research papers explore novel insights, innovative methodologies, and practical applications within the field of computer science and informatics. Each of them represents a valuable contribution to the applied informatics field and offers insights that bridge the gap between theory and practical application. They are a testament to the diversity and dynamism of our field, showcasing a wide range of research topics and applications.</p>2025-03-16T14:44:05+01:00Copyright (c) https://cyber.bibl.u-szeged.hu/index.php/actcybern/article/view/4476Invariants and String Properties in the Analysis of the Knuth-Morris-Pratt Algorithm2025-03-18T17:17:52+01:00Tibor Ásványiasvanyi@inf.elte.hu<p>This paper is about the string-matching problem. We find the occurrences of a pattern inside a text. First, we formally define the problem and summarise its naive solution. Next, we analyse an efficient method, the Knuth-Morris-Pratt (KMP) algorithm. We prove the correctness of the KMP algorithm. We also analyse its efficiency. Our reasoning is based on the properties of the pattern and the text. It is also based on the invariant properties of KMP. In this way, we could develop an extremely compact and elegant proof. And the method of proving program correctness with the invariant properties of the program is already familiar to our students at our university.</p>2025-03-16T14:37:57+01:00Copyright (c) https://cyber.bibl.u-szeged.hu/index.php/actcybern/article/view/4460How Egocentric Distance Estimation Changes in Virtual Environments by Using a Desktop Display or the Gear VR2025-03-18T17:17:55+01:00Tibor Guzsvineczguzsvinecz.tibor@zek.uni-pannon.huJudit Szűcsszucs.judit@zek.uni-pannon.huErika Pergeperge@eng.unideb.hu<p>Due to the importance of depth perception in virtual spaces, the combined effects of display devices and human factors on egocentric distance estimation were investigated. We developed a virtual environment that can assess distance estimation skills of users at 10 various distances, starting from 25 cm and ending at 160 cm. Our results show that people are either accurate or overestimate distances on a desktop display, while underestimation occurs with the Gear VR in most cases. Combined with display devices, human factors also had effects on distance estimates. With the Gear VR, 35.73%-57.14% faster estimation times were obtained, and these can also be influenced by human factors and distances.</p>2025-03-16T14:46:33+01:00Copyright (c) https://cyber.bibl.u-szeged.hu/index.php/actcybern/article/view/4461Effective Supervision of Students' Activity During Classroom Learning and Testing2025-03-18T17:17:56+01:00Szabolcs Szilágyiszilagyi.szabolcs@inf.unideb.hu<p>Due to the lockdowns caused by the COVID-19 pandemic, the majority of educational institutions worldwide have been forced to switch to online education, which has created a significant challenge for teachers and students alike. In order to communicate effectively in the online space, educational institutions had a wide range of tools to choose from (e.g. Adobe Connect, Cisco Webex, Google Meet, Microsoft Teams, Skype, Zoom, etc.). The challenge for teachers was to learn how to use them, to teach practical subjects effectively and to provide a supervised examination environment. The return to face-to-face (in-class) teaching after the end of the COVID-19 pandemic has allowed the online collaborative environments listed above to fade into the background, but the supervision of interactive, computer-based practical lessons (e.g. teaching programming languages, network programming etc.) and proctored examinations can still be a challenge for teachers. This article reviews some screen monitoring systems developed for both corporate and educational environments. We present one of them in more detail, namely Veyon, which is available free of charge\footnote{The basic version of Veyon is free, but you have to pay for the various desired add-on licenses.} and can be used on different operating systems, and whose applicability in both teaching and examination has been tested for almost a year at the Faculty of Informatics of the University of Debrecen.</p>2025-03-16T14:49:02+01:00Copyright (c) https://cyber.bibl.u-szeged.hu/index.php/actcybern/article/view/4465P4 Specific Refactoring Steps2025-03-18T17:17:58+01:00Máté Tejfelmatej@inf.elte.huDániel Lukácsdlukacs@inf.elte.huPéter Hegyiimmsrb@inf.elte.hu<p>P4 is a domain-specific programming language for programmable switches running inside next-generation computer networks. The language is designed to use the software defined networking (SDN) paradigm which separates the data plane and the control plane layers of the program. The paper introduces tool-supported refactoring steps for P4. The challenge in this task is that P4 has special domain-specific constructs that cannot be found in other languages and as such there is no existing methodology yet for refactoring these constructs. The proposed steps are implemented using P4Query, an analyzer framework dedicated to P4.</p>2025-03-16T14:49:59+01:00Copyright (c) https://cyber.bibl.u-szeged.hu/index.php/actcybern/article/view/4464Co-reference, Thematic, and Network Analysis of a Selected Hungarian Poem and Its English Translation (Füst Milán: A szőlőműves / The Vine-Dresser)2025-03-18T17:18:01+01:00István Károly Bodaboda.istvan@drhe.huErzsébet Tóthtoth.erzsebet@inf.unideb.hu<p>In our paper we present a parallel co-reference analysis of the Hungarian poem A szőlőműves (The Vine-Dresser) by Milán Füst and its English translation. We explore the textual world of the poem and compare the Hungarian and English texts using formal linguistic tools based on semiotic textology. We also reveal the possible differences between the original Hungarian text and its English translation. The results of the analysis prove that co-reference analysis devised and elaborated by János S. Petőfi can be effectively applied in a polyglot environment. We also introduce the hypertext implementation of the co-reference analy-sis of the selected poetic texts in a form of a web page. We would like to show that this has many practical advantages, for example, the analysis and its results can be transparent, accessible, and verifiable to everyone. In addition, the created web page provides additional aspects for the analysis. For example, considering the poetic text as a network, we can investigate whether the scale-free feature is also relevant in the textological environment – as it can be experienced in many other areas of reality.</p>2025-03-16T14:51:17+01:00Copyright (c) https://cyber.bibl.u-szeged.hu/index.php/actcybern/article/view/4462Hungarian Sentence Analysis Learning Application with Transformer Models2025-03-18T17:18:02+01:00Noémi Evelin Tóthnoemitth.10@gmail.comBeatrix Oszkóoszko.beatrix@nytud.hun-ren.huZijian Győző Yangyang.zijian.gyozo@nytud.hun-ren.hu<p>The purpose of our research is to present a project in which we started to develop an educational support tool that helps primary and high school students to use the correct techniques of sentence analysis based on the rules of Hungarian grammar taught in school. The aim was to create an application called LMEZZ that would help students of the Hungarian education system to practise tasks related to native language lessons. In this way, we expect them to have a more accurate understanding of the grammar rules. The application allows them to learn in the comfort of their own homes by providing immediate and accurate feedback on the solutions to various tasks. Natural language processing has made spectacular progress with the application of neural network technology, especially the contextual transformer model. In our research, Hungarian transformer-based BERT models were trained for our sentence analyser task. The results showed that the transformer models were much more condescending than the previously trained convolutional neural network based SpaCy models. This allowed us to increase the reliability of our software.</p>2025-03-16T14:52:22+01:00Copyright (c) https://cyber.bibl.u-szeged.hu/index.php/actcybern/article/view/4459Scalix Mix Network2025-03-18T17:18:03+01:00Ádám Vécsivecsi.adam@inf.unideb.huAttila Pethőpetho.attila@inf.unideb.hu<p>Mix networks have now advanced to a level where they can compete in the domain of low-latency anonymous communication, owing to their "strong" anonymity design advantage. However, a few bottlenecks still exist, primarily because users are required to select the complete message path. This characteristic of mix networks hinders the implementation of load balancing and necessitates the use of an extensive shared database. To address this issue, we introduce Scalix, which presents a new topology featuring load balancers, modified path selection, and a mix package based on identity-based encryption and attribute-based encryption. Additionally, Scalix can serve as an anonymous return channel with minimal modifications.</p>2025-03-16T14:53:48+01:00Copyright (c)