Gábor Hosszú

Gábor Hosszú
  • Candidate of Sciences, PhD
  • Professor (Associate) at Budapest University of Technology and Economics

About

130
Publications
12,953
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
591
Citations
Current institution
Budapest University of Technology and Economics
Current position
  • Professor (Associate)
Additional affiliations
October 1990 - present
Budapest University of Technology and Economics
Position
  • Professor (Associate)
October 1990 - present
Budapest University of Technology and Economics
August 1985 - October 1990
Microelectronics Corporation, Hungary
Position
  • Grandholder of the Hungarian Academy of Sciences and research engineer
Education
September 1981 - July 1985
Budapest University of Technology and Economics
Field of study
  • Electrical and Electronic Engineering

Publications

Publications (130)
Article
Full-text available
A method for optimization of MOS model parameters is introduced. The method is based upon dynamically fitting the measured frequency response of a reconfigurable ring oscillator. The ring oscillator contains two added switching transistors and two loading capacitors. By controlling the switching transistors, the capacitive load of the inverters and...
Book
Full-text available
The Heritage of Scribes introduces the history and development of five members of the Rovash (pronounced “rove-ash”, other spelling: Rovas) script-family: the Proto-Rovash, the Steppe Rovash, the Carpathian Basin Rovash, and the Székely-Hungarian Rovash. The historical and linguistic statements in the book are based on the published theories and st...
Book
Full-text available
Scripts (writing systems) usually belong to specific languages and have temporal, spatial and cultural characteristics. The evolution of scripts has been the subject of research for a long time. This is probably because the long-term development of human thinking is reflected in the surviving script relics, many of which are still undeciphered toda...
Chapter
Full-text available
Computational palaeography, as a branch of applied computer science, investigates the evolution of graphemes, explores relationships between scripts, and provides support for deciphering ancient inscriptions, among others. The author applied methods often used to describe evolutionary processes in phylogenetics to analyse the development of scripts...
Conference Paper
This paper presents a machine learning approach to explore the phenetic relations of historical scripts and their glyphs. Its first step is the identification of the observable topological transformations in the development of the glyphs, and with the use of these transformations, the method collects the possible cognate glyphs by minimizing the ne...
Article
Full-text available
The purpose of this paper is to describe a feature selection algorithm and its application to enhance the accuracy of the reconstruction of phylogenetic trees by improving the efficiency of tree construction. Applying machine learning models for Arabic and Aramaic scripts, such as deep neural networks (DNNs), support vector machines (SVMs), and ran...
Preprint
Full-text available
The purpose of this paper is to describe a feature selection algorithm and its application to enhance the accuracy of the reconstruction of phylogenetic trees by improving the efficiency of tree construction. Applying machine learning models for Arabic and Aramaic scripts such as Deep Neural Networks (DNN), Support Vector Machines (SVM) and Random...
Article
Full-text available
This paper introduces the concept of pattern systems that evolve, with a focus on scripts, a specific type of pattern system. The study analyses the development of different script systems, known as scriptinformatics, with a focus on the historical Rovash scripts used in the Eurasian steppe. The aim is to assess the traditional classification of hi...
Conference Paper
This study examines the effectiveness of different distance-based techniques in creating optimal and suboptimal parsimony trees for extensive datasets. We introduce a distance-based approach for constructing tree topology, combined with a random method for score computation, which can efficiently detect optimal or suboptimal trees in vast datasets....
Conference Paper
Full-text available
As the digital and physical worlds connect, machine-learning tools are increasingly being used by businesses and institutions, including archaeological research institutes and museums. The article presents research that, based on the evolution of human scripts, provides a tool for identifying script variants used in old manuscripts and stone inscri...
Article
This article explains the idea of pattern systems that develop gradually. These systems involve symbolic communication that includes symbols, syntax, and layout rules. Some pattern systems change over time, like historical scripts. The scientific study of pattern systems is called pattern evolution research, and scriptinformatics is concerned with...
Chapter
This paper presents an evolutionary research study on pattern systems. A pattern system is a way of communicating symbolically and includes symbols, syntax and layout rules. Symbol sequences can be created from pattern systems, the physical implementation of which is a graph sequence. Scripts refer to the various types of the human writing that com...
Chapter
This paper introduces a feature selection algorithm that enhances the precision of the phylogenetic trees computed by feature-based reconstruction methods. The frequency function concept was introduced in the context of the algorithm for feature selection. A pattern system refers to a symbolic communication type that can be defined by features like...
Research
Full-text available
The file contains the similarity feature groups of several historical scripts and script variants. This text database or a part of it can be used to create various taxon-feature matrices (datasets) for further phylogenetic analyses.
Chapter
Full-text available
A Magyarságkutató Intézet 2019-ben indította Ősi írásaink konferenciasorozatát, s a jelen kötet alapját a 2021. évi III. konferencia előadásai adják. Mindegyik eddig megjelent kötetünkben hangsúlyozni kívántuk, hogy a magyarság írástörténetének kutatása nem pusztán rovásírás-kutatás. Írásunk és az előttünk itt élt pusztai nomád népek írása ennél ga...
Chapter
Full-text available
A Magyarságkutató Intézet 2019-ben indította Ősi írásaink konferenciasorozatát, s a jelen kötet alapját a 2021. évi III. konferencia előadásai adják. Mindegyik eddig megjelent kötetünkben hangsúlyozni kívántuk, hogy a magyarság írástörténetének kutatása nem pusztán rovásírás-kutatás. Írásunk és az előttünk itt élt pusztai nomád népek írása ennél ga...
Article
The main objective of this paper is to demonstrate that the developed exploratory data analysis algorithm can be applied to the processing of pattern systems, data sets, and their cladistic modelling. Pattern systems are specific representations of symbolic communication, consisting of symbols and the syntactic rules that govern their use. Among th...
Article
This paper aims to introduce the phenetic method for processing paleographical datasets and evaluating their similarity relationships. The presented numerical taxonomic method was applied for selected varieties of the Arabic and Aramaic scripts. The phenetic model was evaluated by hierarchical clustering and—after applying multidimensional scaling—...
Chapter
Full-text available
The study deals with the cladistic analysis of the evolution of scripts that originate from more than one predecessor script. The starting point of the elaborated procedure is the ‘extended’ phenetic model that expands the phenetic description with evolutionary information with the help of which the predecessor scripts of the scripts under examinat...
Chapter
This paper presents the results of a decipher historical inscriptions approach to demonstrate the application of different similarity metrics, classification and algorithm acceleration methods. Deciphering historical inscriptions is difficult in the most cases because the survived inscriptions typically contain calligraphic glyphs, grapheme errors...
Chapter
This paper presents an extended phenetic approach to classifying the examined historical scripts and determining some properties of their evolution. The main challenge in the phenetic modeling of historical scripts is the very large number of homoplasies, i.e. the coincidence of unrelated graphemes or writing rules in different scripts. A data-driv...
Chapter
This paper presents a tool for evaluating transport layer congestion control schemes, including various TCP variants. In real computer networks, it is difficult to obtain detailed information about the internal state and operation of network protocols without disturbing protocol behavior. This is especially true for transport layer protocols where...
Article
Full-text available
A cikk ismerteti a tűtartó feliratának eddigi megfejtési kísérleteit, és egy új olvasatot javasol. Ezt hangtörténeti, morfematikai, grammatikai és szókincstani elemzésekkel támogatja meg. Megvizsgáltuk a tűtartó feliratával kapcsolatba hozható hiedelemnek, a vas és a tű varázserejének a továbbélését a néphagyományban. A Szarvasi tűtartó grafémakész...
Chapter
A cikk az írások evolúciójának modellezésére szolgáló kiterjesztett fenetikai modellt kiértékelő eljárásokat ismertet. Ezek segítségével a fenetikai modellben meglévő bizonytalanságok hatása csökkenthető. A kifejlesztett eljárás alkalmazásra került a rovás írások evolúciójának modellezésére. A kapott eredményekből következtetéseket lehet levonni a...
Conference Paper
This paper proposes a detection method of fetal breathing movement (FBM) as an important data of fetal well-being. To analyze the chaotic nature of the individual episodes, the frequency band has been split into single test frequencies in order to find its starting point (SP) as a signal free (quiet) zone. Computing some features of the signal the...
Conference Paper
Full-text available
This article presents the palaeographic and linguistic analysis of the in-scriptions of the bone plates for the grip of a bow found in Kiskundorozsma, Hungary. The relics were buried in the late Avar period, in the second half or the last third period of the eighth century. The comparative palaeographic analysis resulted that the inscriptions conta...
Conference Paper
Full-text available
An evolutionary computation method was elaborated to model the evo-lution of the scripts. The developed similarity feature groups contain the possi-ble lineage models of the graphemes of the examined scripts. The elaborated method was applied in the examination of the evolution of the Rovash scripts as taxons, some of the writing systems of the peo...
Article
The article presents a new method developed to increase the efficiency of the identification algorithm for historical inscriptions of unknown origin. The authors extracted topological properties of the symbols containing different script relics, and analyzed them by using statistical tools. The considered topological properties are circular loop, o...
Article
This article proposes a novel mathematical model of logical relationship among glyphs belonging to the same grapheme. Its research belongs to the computational paleography that is a field in the applied computer science. The proposed grapheme model is presented in four logical layers from bottom to up namely as Topology, Visual Identity, Phonetic,...
Article
Full-text available
With the dawn of Cyber-Physical Systems (CPS) the relevance of System-on-Chips equipped with run-time configurable, application-specific macrocells increases as numerous tasks have to be taken over from the microprocessors in order to cope with the real-time requirements typical of CPS applica-tions. One of the largest challenges of macrocell desig...
Chapter
This chapter presents a method to determine the actual version of a script used in constructing of a script relic from unknown origin. The glyphs belong to graphemes as models are realized in the relics as symbols. Some group of glyphs may transform their shape (shapeshifting) through time which produces various versions of scripts that use differe...
Article
Full-text available
The article presents the improvements in the preprocessing part of the deciphering method (shortly preprocessing algorithm) for historical inscriptions of unknown origin. Glyphs used in historical inscriptions changed through time; therefore, various versions of the same script may contain different glyphs for each grapheme. The purpose of the prep...
Article
Register-Transfer Level (RTL) modeling and synthesis is a crucial part of digital system design. The constantly growing complexities of today's data processing systems make it more and more complicated to manage the RTL intent, timing, resource requirement and power-consumption of the macrocells in complex System-on-Chips (SoCs). Although there are...
Conference Paper
Semiconductor sensor systems based on specific MEMS structures usually have to comprise at least a robust on-chip analogue read-out circuitry making it possible to detect and post-process the changes in physical characteristics. In order to ensure mobility or to improve reliability, robustness and performance (speed and/or power-consumption) the su...
Article
Due to the rapid technology advancement in integrated circuit era, the need for the high computation performance together with increasing complexity and manufacturing costs has raised the demand for high-performance configurable designs; therefore, the Application-Specific Instruction Set Processors (ASIPs) are widely used in SoC design. The automa...
Chapter
Examining the genealogy of the graphemes is useful for exploring the evolution of the writing systems, reading undeciphered inscriptions, and deciphering undeciphered scripts. Researching the evolution of various scripts needs sophisticated and automatized procedures for exploring the fine links among the different writing systems, which research b...
Chapter
The constantly growing complexity of data processing systems forces designers to start the design process on a high level of abstraction. The procedure capable to transform an algorithm into a gate level hardware model is called high-level synthesis (HLS). This approach is useful and widely used in case of digital signal processing (DSP) system des...
Chapter
The chapter presents a method to decipher Rovash inscriptions made by the Szekelys in the 15th-18th centuries. The difficulty of the deciphering work is that a large portion of the Rovash inscriptions contains incomplete words, calligraphic glyphs or grapheme errors. Based on the topological parameters of the undeciphered symbols registered in the...
Article
Full-text available
The paper presents a novel screening method to indicate congenital heart diseases (CHD), which otherwise could remain undetected because of their low level. Therefore, not belonging to the high-risk population, the pregnancies are not subject to the regular fetal monitoring with ultrasound echocardiography. Based on the fact that CHD is a morpholog...
Chapter
This chapter presents statistical evaluations of script relics. Its concept is exploiting mathematical statistical methods to extract hidden correlations among different script relics. Examining the genealogy of the graphemes of scripts is necessary for exploring the evolution of the writing systems, reading undeciphered inscriptions, and decipheri...
Article
Full-text available
Multilingual Inscriptions on the Golden Treasure of Nagyszentmiklós This paper presents the bilingual and multilingual Rovash inscriptions of the Golden Treasure of Nagyszentmiklós, including inscriptions No. 9 and 10 on the No. 5 Jug, the inscriptions No. 4, No. 5, and No. 6 on the bottom of the No. 6 Jug, and the inscriptions No. 2/5 and 3 on the...
Article
Full-text available
This paper presents the bilingual and multilingual Rovash inscriptions of the Golden Treasure of Nagyszentmiklós, including inscriptions No. 9 and 10 on the No. 5 Jug, the inscriptions No. 4, No. 5, and No. 6 on the bottom of the No. 6 Jug, and the inscriptions No. 2/5 and 3 on the bottom of the No. 23 Cup. This paper introduces the archaeological...
Article
Structured peer-to-peer networks are capable of fast and efficient lookup operations as a distributed hash table. The topology of these networks makes it possible to send broadcast messages among nodes, either for the purpose of providing a complex query service for participants, or to disseminate information valuable for all nodes. In this article...
Article
The paper presents a novel screening method to indicate congenital heart diseases (CHD) which otherwise would remain undetected because of their low level. Therefore, not belonging to the high-risk population, they are omitted from the regular fetal monitoring with ultrasound echocardiography. Based on the fact that CHDs are morphological defects o...
Article
Full-text available
The history of Rovas scripts of Hungarians and their ancestor nations has been the subject of heavy research efforts from the past until today. The word rovás has several meanings in modern Hungarian, e.g. ‘carving’ (related to the ancient writing technique) and ‘writing’ (to record or make note of). The main branches of the Rovas script family are...
Article
Kademlia is a structured peer-to-peer (P2P) application level network, which implements a distributed hash table (DHT). Its key-value storage and lookup service is made efficient and reliable by its well-designed binary tree topology and dense mesh of connections between participant nodes. While it can carry out data storage and retrieval in logari...
Chapter
This chapter details the potential found in combining to different technologies. The two basically different technologies, LBSs in mobile communication and the well-elaborated multicast technology are merged in the multicast via LBS solutions. As this chapter demonstrates, this emerging new area has a lot of possibilities, which have not been compl...
Chapter
The importance of the virtual communities’ privacy and security problems comes into prominence by the rapid development of online social networks. This article presents the multiple threats currently plaguing the virtual world, Internet privacy risks, and recommendations and countermeasures to avoid such problems. New generations of users feel comf...
Conference Paper
Full-text available
The research results described in this article deal with the exploration of the genealogical relationships of graphemes. Two graphemes are relatives if the voices they designate are the same, or their differences are justified by proper linguistic or palaeographic reasons. Furthermore, graphemes being in genealogical relationship are always similar...
Conference Paper
Full-text available
This article introduces a new procedure for exploring the style related relationships of script relics representing different versions of a script. In doing so, the glyphs of an investigated script were divided into two-dimensional sub-formations, so-called canonical forms. Examples of canonical shape include a circular loop, an oblique section, a...
Conference Paper
Full-text available
The two important problems of collaborative intrusion detection are aggregation and correlation of intrusion events. The enormous amount of data generated by detection probes requires significant network and computational capacity to be processed. In this article we show that a distributed hash table based approach can reduce both network and compu...
Conference Paper
Full-text available
There is no effective method to support IP level Internet wide multisource multicast sessions, that can be easily used from almost every ISP There are several protocols implementing the necessary functionality, but the penetration of them is really low recently. The most obvious work all-round is using SSM – Source Specific Multicasting, in which,...
Article
A large proportion of congenital heart diseases (CHD) remain undetected during pregnancy or even after birth. Many of them generate turbulent blood flow, resulting heart murmur. Doppler ultrasound cardiotocography (CTG) is suitable for the assessment of the fetal heart rate and some derived parameters, but it is inadequate for detecting heart murmu...
Conference Paper
fast and efficient look-up operations as a distrib-uted hash table (DHT); however, they generally do not sup-port complex queries of any kind. To perform such, con-trolled broadcast messages are used. By using the structure inherent to these networks, one can implement broadcast messages efficiently. In this article a broadcast algorithm for the Ka...
Conference Paper
Full-text available
This paper proposes a novel mathematical model that describes the logical relationship among glyphs belong to the same script. The proposed model is presented as three logical layers namely Topology, Visual Identity, and Phonetic layers. In the Topology Layer, a unique glyph that represents a grapheme is defined by a set of geometrical properties....
Conference Paper
This paper presents an improved fetal first heart sound model, which is significantly more accurate than the former one. The details of the comparison are presented. Based on the new model a cluster analysis was performed because the waveform of the first heart sounds varies during the regular 20 minutes test. Large number of first heart sounds was...
Chapter
In this chapter, the authors present a novel peer-to-peer based intrusion detection system called Komondor, more specifically, its internals regarding the utilized peer-to-peer transport layer. The novelty of our intrusion detection system is that it is composed of independent software instances running on different hosts and is organized into a pe...
Chapter
The importance of the virtual communities’ privacy and security problems comes into prominence by the rapid development of online social networks. This article presents the multiple threats currently plaguing the virtual world, Internet privacy risks, and recommendations and countermeasures to avoid such problems. New generations of users feel comf...
Article
This paper presents a complex heuristic method for the evaluation of fetal heart sounds, applying simultaneously several algorithms, where the autocorrelation technique has been completed with the wavelet transform and the matching pursuit methods. In this way, a more reliable heart rate variability can be achieved and further parameters of the car...
Article
The paper presents an overview of the 15 year long development of fetal phonocardiography including the works on the applied signal processing methods for identification of sound components. Based on the improvements achieved on this field, the paper shows that beyond the traditional CTG test the phonocardiography may be successfully applied for lo...
Article
Full-text available
The purpose of this article is to describe a new, phonocardiography-based fetal telemonitoring system, which, due to its passive nature, allows long-term measurements even at the home of the pregnant woman. The input element of the system was the home monitor with two sensors for recording the trans-abdominal fetal heart signal and the uterine cont...
Thesis
Full-text available
The MSc Thesis deals with a special Szekely-Hungarian Rovas relic, which contains Szekely inheritance law from the late 18th century.
Article
Full-text available
Distributed Hash Tables (DHT's) are sophisticated Peer-to-Peer (P2P) overlay networks. Such overlays have the ability to retrieve stored data in a limited time, usually in a logarithmic number of steps. However in contrast to the well-known Gnutella and FastTrack networks, these can only locate data quickly, if the key associated with the data requ...
Article
The main purpose of this paper is to demonstrate the capability of fetal phonocardiographic measurements to indicate some congenital heart defects. It deals with the results of investigations carried out during the last four years involving 820 pregnant women. During the investigations fetal cardiac murmurs presenting typical waveforms and incidenc...
Article
The importance of the virtual communities' privacy and security problems comes into prominence by the rapid development of online social networks. This article presents the multiple threats currently plaguing the virtual world, Internet privacy risks, and recommendations and countermeasures to avoid such problems. New generations of users feel comf...
Article
In this article we represent two novel applications that make extensive use of the peer-to-peer communication method. Dolphin is a file sharing system with improved reliability and searching efficiency compared to other popular file sharing applications. Komondor is a peer-to-peer based security application, a network intrusion detection system tha...
Article
The article presents a comparison of fairness properties of different congestion control schemes. It is hard to investigate the various protocol mechanisms implemented in transport protocols; therefore a simulator called SimCast is developed for the analysis of fairness characteristics of transport protocols as well as a network traffic generator a...
Article
This chapter details the potential found in combining to different technologies. The two basically different technologies, LBSs in mobile communication and the well-elaborated multicast technology are merged in the multicast via LBS solutions. As this chapter demonstrates, this emerging new area has a lot of possibilities, which have not been compl...
Chapter
The importance of the network security problems come into prominence by the growth of the Internet. This article presents a new kind of software that uses the network itself to protect the hosts and increase their security. The hosts running this software create an application level network (ALN) over the Internet (Hosszú, 2005). Nodes connected to...
Chapter
Controlling the access to data based on user credentials is a fundamental part of database management systems. In most cases, the level at which information is controlled extends only to a certain level of granularity. In some scenarios, however, there is a requirement to control access at a more granular way allowing the users to see only the data...
Chapter
The article presents a novel approach to search in shared audio file storages such as P2P-based systems. The proposed method enables the recognition of specific patterns in the audio contents, in such a way it extends the searching possibility from the description-based model to the content- based model. The targeted shared file storages seam to ch...
Article
In this presentation, a novel thematic-based multicast concept (TMC) approach to the group communication is proposed. TMC presents a novel application-layer multicast system. TMC's control, data and query topologies are also discussed. The developed method has partly been implemented in the software ThemaCAST.
Article
A collection of slides from the author's presentation is given. This paper presents the transport protocol fairness and Internet congestion control.
Article
A collection of slides presented by Gabor Richly, Gabor Hosszu and Ferenc Kovacs is given.
Article
Phonocardiography (PCG) makes possible the examination of some fetal cardiac anomalies which otherwise usually remain undetected during pregnancy. The application of PCG in a telemonitoring system enhances its diagnostic capabilities, allowing long-term measurements even at home. The paper summarizes the intensive fetal monitoring campaign carried...
Chapter
This article presents a novel approach to search in shared audio file storages such as P2P based systems. The proposed method is based on the recognition of specific patterns in the audio contents in such a way extending the searching possibility from the description based model to the content based model. The importance of the real-time pattern re...
Chapter
The importance of the network security problems come into prominence by the growth of the Internet. This article presents a new kind of software that uses the network itself to protect the hosts and increase their security. The hosts running this software create an application level network (ALN) over the Internet (Hosszú, 2005). Nodes connected to...
Chapter
The article presents a proposed method to select an optimal set of the multicast protocol parameters, which are linearly independent from each other. A multidimensional hyperspace, as a mathematical model, is stated where every transport protocol parameter is represented with an individual point. A determined novel protocol parameter set is shown a...
Chapter
This article presents the comparison of different transport level congestion control schemes, including variants of the TCP (Postel, 1981). The protocol mechanisms, implemented in various protocols are hard to investigate in a uniform manner (Hosszú, 2005); therefore, the simulator SimCast (Simulator for multicast) is developed for traffic analysis...
Article
A novel compact method for fetal home monitoring optimized for long data acquisition time has already been presented. The method involves preprocessing a disturbed acoustic signal received on the maternal abdomen. The present work summarizes phenomena encountered during analysis of the incoming PCG signal, and describes further improvements made to...
Article
This article reviews the most important fact of the ALM and introduces to the emerging area of the multicasting, namely the multicast over ad hoc networks, including geocast. After these a novel concept of modeling relative density of members called bunched mode and a proposed ALM multicast transport protocol called shortest tunnel first (STF) are...
Chapter
The importance of real-time pattern recognition in streaming media is rapidly growing (Liu, Wang, & Chen, 1998). Extracting information from audio and video streams in an e-collaboration scenario is getting increasing relevance as the networking infrastructure develops. This development enables the use of rich media content. Shared archives of this...
Chapter
This chapter presents various congestion control schemes for transport protocols together with a number of metrics for the evaluation of these protocols with special emphasis on fairness-related measures. The paper analyzes some properties of the TFRC algorithm, which provides applications with congestion control mechanisms that can be applied for...
Chapter
As an example of the application for non-conventional purposes a security system is presented in the article that utilizes just the network for protecting the operating system of the computers. The software maintains a database about the experienced intruding attempts. Its entities working on each computer share their experiments among each other o...
Chapter
This chapter reviews the most important fact of the application-level multicast (ALM) and then describes a novel concept of modeling relative density of members called bunched mode and a proposed host-end multicast routing protocol called shortest tunnel first(STF). The bunched mode is based on the thematic multicast concept (TMC), which means that...
Chapter
As an example of the application for non-conventional purposes a security system is presented in the article that utilizes just the network for protecting the operating system of the computers. The software maintains a database about the experienced intruding attempts. Its entities working on each computer share their experiments among each other o...
Chapter
This chapter reviews the most important fact of the application-level multicast (ALM) and then describes a novel concept of modeling relative density of members called bunched mode and a proposed host-end multicast routing protocol called shortest tunnel first(STF). The bunched mode is based on the thematic multicast concept (TMC), which means that...

Network

Cited By