Brand new guest lectures on 5th July at Bécsi út 96/b

Dear Colleagues and Students! We are happy to invite you for the next lectures only available on 5th July at our University.
5th July F07
Spatiotemporal Analysis of Electroencephalographic (EEG) Signals for Emotion Recognition and EEG Based Brain Machine Interface 
Vijayan K. Asari, PhD, University of Dayton, Ohio, USA
A brain machine interface using EEG data facilitates the control of machines through the analysis and classification of signals directly from the human brain. A 14-electrode headset of Emotiv Systems is used to capture EEG data, which is then classified and encoded into signals for controlling a 7-degree-of-freedom robotic arm.  The collected EEG data is analyzed by an independent component analysis based feature extraction methodology and classified using a multilayer neural network classifier into one of several control signals: lift, lower, rotate left, rotate right, open, close etc. The system also collects the data of electromyography signals indicative of movement of the facial muscles. A personal set of EEG data patterns is trained for each individual. Research work is progressing to extend the range of controls beyond a few discrete actions by refining the algorithmic steps and procedures.
Applications of Electroencephalography (EEG) Analysis: Spatial Disorientation, Noise/Artifact Removal, Sound Stimulation, and Human Performance
Theus H. Aspiras, PhD, University of Dayton, Ohio, USA
There are varieties of applications that can utilize electroencephalographic analysis. One application is spatial disorientation (SD), which poses a significant hazard during physically and cognitively demanding activities, such as aviation. This study utilized advanced 256-channel dense-array electroencephalography (dEEG) technology to record neural activity from 8 right-handed participants during combinations of visual tracking and vestibular stimuli. Another application is noise/artifact removal techniques for electroencephalographic data, which is necessary for obtaining the best information without any extraneous information. Various preprocessing are used for the EEG data, including filtering with a Butterworth band-pass filter and a 60Hz notch filter. Three different types of eye artifact removal techniques are explored using the preprocessed data: EOG based linear regression, Principal Component Analysis, and Independent Component Analysis. Sound stimulation and human performance are other application areas for EEG analysis. From previous research, we have the ability to analyze certain emotional states from various participants, which can provide a wide range of applications. The sound stimulation application is an extension of emotion recognition work, which analyzes the emotion state of the user and provides a certain feedback for the user to overcome the current emotional state. Other applications that will be discussed are real estate studies and threatened/challenged studies, which electroencephalographic analysis information can be used in conjunction with other analysis tools to provide a complete evaluation of the participant.
Modern technologies of wireless networks vulnerabilities detection
Bogdan Kyriusha PhD, National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”
Modern technologies of vulnerabilities detection consists of two solutions: hardware and software. Some of hardware which can but used for such scans are cheap and widespread, but but most of them requires qualification and financial basis above regular person possibilities. Some of the most popular hardware solutions will be discussed at the beginning for simplest WiFi vulnerabilities detection. Cheapest and most widespread technology for wireless attacks is Kali linux based OS clones, usually called “administrative tools”. Most popular and some new techniques of these tools usage will be explained. Security politics for these attacks prevention will be given. Mobile versions of wireless vulnerabilities are similar to PC and regular WiFi networks, but have different conditions for attacks. Which attacks for mobile devices is simplest and widespread and how to prevent them will be shown. Also will be discussed specifics of mobile versions of Kali-clones. 
5th July F08
How to publish in scientific journals (authors, referees and editors perspective)
Prof. dr. Ivan Mihajlović, University of Belgrade, Technical Faculty in Bor, Engineering Management Department
This lecture is presenting the observations of the author about most important items, which have to be considering, before and during preparation of the scientific paper for publication in scientific journals. Based on previous experience, this lecture will point out the most important aspects that researchers have to have in mind when preparing their publications. This is especially important for young researchers and PhD students. Also, the most common mistakes will be explained, and the audience will be advised how to avoid those mistakes in the process of preparation and submission of the scientific articles to international journals.
Business ethics - moral dilemmas influencing the commercial issues of the companies
Dr. Danijela Voza, University of Belgrade,Technical faculty in Bor
The main goals of this lecture are: 1) to introduce students with basic ethical concepts, principles and examples and 2) to enhance understanding and use of ethics in solving moral dillemmas that are occuring in the contemporary workplace and workforce. Course is oriented towards defining business ethics and familiarizing the students with examples of ethics in business practice. Ethical issues and problems that firms face with external consumers, government and environmental groups are considered. The question ”How moral can and should corporations be and act in commercial dealings?” is examined. Finally, moral issues and dilemmas employees and managers face and must solve in contemporary workplace, e.g. employeers rights, discrimination, sexual harassment, whistle-blowing, etc., will be analyzed. 
Modern Computer Networks
Mariia Orlova, PhD, National Technical University of Ukraine, “Igor Sikorsky Kyiv Polytechnic Institute” 
Modern computer networks require guaranteed transmission with the necessary quality of service for specific network services, which leads to the modernization of existing software or to the development of a completely new one. In addition to positive aspects, modern Internet technologies have a negative side, which includes virus attacks not only on computers of corporations and ordinary users, but also industrial systems that can lead to disastrous consequences. One of the most promising technologies of modern computer networks, which is capable of providing most of the requirements and transmission parameters today, is the Software Defined Network (SDN) technology. A distinctive feature of this approach is that in such networks the management and data transfer processes are separated, which in turn allows the creation of flexible, secure networks that not only have less problems with the transmission of different traffic than traditional networks, but are also easier to manage.
Please, send a little feedback to us ( if you are interested and hope to see you soon!