Acta Polytechnica Hungarica
Browse by
Acta Polytechnica Hungarica (APH) is a multidisciplinary international peer reviewed journal of applied sciences publishing high-quality articles in min. 6 issues per year. The journal aims to provide an international forum for the publication of original, novel fundamental research and applications-based investigation topics, interpretative reviews and discussion of new developments in engineering sciences as listed below: • Mechanical Engineering • Electrical Engineering • Informatics Reports of carefully executed experimental work are also welcome. The overall focus is on original and rigorous research results which have generic significance. Within APH, the Mechanical Engineering track presents papers dealing with topics in Materials Science and Technologies, Manufacturing Engineering, Machinery and Modeling, Design in Mechanical Engineering, Actuators and Sensors, Intelligent Control, Robotics, and Automotive Systems. Within APH, the Electrical Engineering track presents papers including Power Systems and Renewable Energy, Power Conversion and Automation, Microelectronic Technology, and Mobile Communication. Within APH, the Informatics track presents papers dealing with different aspects of Embedded Systems, Software Engineering, and Control Engineering.
Collections in this community
Recent Submissions
-
Priority Decision Rules with a Fuzzy MCDM Approach for Solving Flexible Job Shop Problem: A Real Case Study of Optimizing Manufacturing
(2025)The Flexible Job Shop Problem (FJSP) represents a significant challenge in the field of planning due to its complexity and the constant need for problem-solving in the market. It should be emphasized that FJSP is one of ... -
A Fuzzy Framework for Assessing and Prioritizing Railway Infrastructure Retrofitting Against Seismic Hazards – A Case Study
(2025)The railway system plays a crucial role in a nation's economy and society, extending beyond mere transportation. In earthquake-prone regions like Razavi Khorasan in Iran, railway infrastructure is highly vulnerable to ... -
Influence of Rail Surface Geometry on Wear and Service Life of Crossing Rails
(2025)Malfunctioning components on railroads can lead to the decrease of efficiencies. Switch frog is costly, but has a short service life. However, for safety reasons, regular inspection is necessary. Determining the service ... -
Hierarchical Knowledge Graphs and their Application
(2025)The transformation of the world's knowledge from poorly structured texts, to well-structured knowledge graphs (KG) is a common practice. KGs are well-suited for AI applications, but their human representation can pose ... -
Social and Sexual Robots: Technological Development, Social Acceptance and Ethical Challenges
(2025)Japanese society is characterised by a unique technological development and openness to it, which has allowed the development of sexual and social robots. This article provides an overview of the technological development, ... -
A Comparison of Neural Networks and Fuzzy Inference Systems for the Identification of Magnetic Disturbances in Mobile Robot Localization
(2025)Three-axis magnetometers are widely used in the field of localization in both outdoor and indoor environments. However, magnetic field measurements are disturbed by the presence of metallic objects due to the soft and ... -
SFIST-based Fast Data Classification
(2025)Fuzzy logic is a powerful tool in computer science, which has been used in countless applications since its conception in the late 80s. Numerous classifiers have been based on it, taking advantage of the flexibility and ... -
Fuzzy Decision-Making for the Optimization of Off-Grid Multisource Power Generation Systems
(2025)The search for alternative energy sources has become critical in a time of increasing energy demand and awareness of environmental practices. The increasing demand for energy worldwide may be met effectively and sustainably ... -
Enhancing Intrusion Detection System Performance through Feature Selection
(2025)Network intrusion detection systems are critical for identifying anomalous activities and cyberthreats. The anomaly detection method for network intrusion detection systems has become substantial in detecting novel attacks ... -
How IT Professionals Perceive Artificial Intelligence Myths
(2025)Artificial Intelligence (AI) has been recently attracting a lot of attention despite its long history. A good part of its presence in media and non-technical conversations is linked to existing myths and fears about its ... -
Game-Creative Learning in Programming Courses Over 15 Years
(2025)This article highlights the impact of game creation on an introductory programming course (CS0, CS1) combined with problem-based learning. It introduces and defines the Game-Creative Learning (GCL) approach, which gradually ... -
Mathematical Modelling and Case Study with File System Performance Comparison for Linux-based Hypervisors
(2025)This paper concentrates on comparing the file system performance across various type-1 Linux-based hypervisors. The main contribution of this paper is a mathematical model of the hypervisor-based virtual environment, ... -
Improving Efficiency: P-Graph Modeling for Business Workflows with Dynamic and Fuzzy Extensions
(2025)The solution for an error-free and cost-effective operation of complex administrative and business processes, or rather, the effectiveness of the solution, is a very important issue in both the profit-oriented and the ... -
Thermodynamic Embedding of the Temperature Increment of a Collapsing Oscillator
(2025)This paper examines the thermal behavior of the spontaneous wave-function collapse model heating in quantum harmonic oscillators. A peculiar result of the theory is that the obtained temperature increase is proportional ... -
Artificial Neural Network Models for Solar Radiation Estimation Based on Meteorological Data
(2025)The presence of solar energy in a particular area is closely related to meteorological parameters in that region. In this study, solar radiation estimation was carried out by using meteorological data recorded in different ... -
Fake News Detection System, based on CBOW and BERT
(2025)Fake news is becoming a major challenge that greatly affects the public’s trust in the media. In this paper, we propose a new solution, combining word embedding based on CBOW (Continuous Bag Of Words) and the BERT ... -
A Centralized Approach to Intrusion Detection System Management: Design, Implementation and Evaluation
(2025)This paper presents the design, implementation, and evaluation of a novel control node for managing Intrusion Detection Systems (IDS). Existing IDS management solutions primarily focus on data visualization and lack ... -
Integrated Automation for Threat Analysis and Risk Assessment in Automotive Cybersecurity Through Attack Graphs
(2025)Attack graphs contribute to the evaluation of network security vulnerabilities, offering a visualization of possible attack paths. Despite their common use in IT security for analyzing system vulnerabilities, attack ... -
Developing Security Information and Events Management Use Cases for 5G Specific Vulnerabilities and Attacks
(2025)The number of cybersecurity attacks and sensitive data breaches in businesses and organizations has increased significantly in recent years, and companies that are increasingly using or providing 5G technology are no ... -
Security Operation Center Methodology for 5G Networks
(2025)The utilization of the recently introduced yet rapidly proliferating new generation of 5G mobile communications offers many new advantages. However, it has also brought with it the introduction of many new services and ...