Loading...

Proceedings of

3rd International Conference on Advances in Computing, Electronics and Communication ACEC 2015

Date
11-Oct-2015
Location
zu , United Kingdom
Authors
132
ISBN
978-1-63248-064-4

46 Articles Published

1. REGIONAL WEIGHT OPTIMIZATION BASED MULTI-SENSOR IMAGE FUSION IN SPATIAL DOMAIN

Authors: VEYSEL ASLANTAS , EMRE BENDES

Abstract: In this paper, a new multi-sensor image fusion method that combines the source images by optimally weighting in terms of predetermined regions is proposed. The Artificial bee colony algorithm is employed to determine weights. The regions are produced by K-Means algorithm. The experiments are conducted with images for different applications. The proposed method is objectively and subjectively compared with well-known image fusion methods from the literature. Experimental results show that the method outperforms the other methods.

Keywords: Image fusion, Multi-sensor fusion, ABC, KMeans.

Pages: 1 - 5 | DOI: 10.15224/978-1-63248-064-4-01

2. GEORGIAN SPEECH RECOGNIZER IN FAMOUS SEARCHING SYSTEMS AND MANAGEMENT OF THE SOFTWARE PACKAGE BY VOICE COMMANDS IN GEORGIAN LANGUAGE

Authors: IRAKLI KARDAVA

Abstract: The speech recognition system and creation of program Software based on it is one of the important components of natural language computer modelling. For example, the popular Google Voice system, by which the word or sentence pronounced by a person is automatically written in textual form, in Google’s Search system field for given language by using already realized speech recognition systems. The trial Software program has been developed by us, which is able to solve the problems, as for the Google search system, also for YouTube, Yahoo, Bing, Yandex and Wikipedia in Georgian language. Also, it is possible to translate automatically Georgian words or sentences pronounced individually and get texts in the appropriate language by using Google Translate. Program management is performed with Georgian voice commands.

Keywords: Georgian voice commands, Google voice, Software, Speech recognition

Pages: 6 - 9 | DOI: 10.15224/978-1-63248-064-4-02

3. ENERGY ECONOMY USING LED MULTIPLEXING

Authors: E. C. M. G. JABOUR , F. C. JABOUR , R. R. BERNARDO , Y. M. GUEDES

Abstract: This work is based on use of LED multiplexing. With this technique, it is possible to use a smaller number of pins of a microcontroller to energize the same number of LED. We explored the retinal persistence. It is a physiological property of the human eye. Due to this property, the human eye retains the captured image on the retina during a short time interval. Using the retinal persistence, it is possible to use multiplexing techniques to minimize the number of the microcontroller pins used and the energy consumed by the circuit. Instead of using multiplexing to switch the power among different displays, multiplexing was used also among the seven segments of a single display. Next, we combined more than one display on the same circuit. A prototype was developed and achieved up to 65% energy savings without perceptible loss of display quality

Keywords: Energy, Economy , LED, Multiplexing

Pages: 10 - 14 | DOI: 10.15224/978-1-63248-064-4-03

4. SIMULATION OF SYNCHRONOUS CONDENSER WITH PSCAD AND OPTIMIZATION IT WITH CHAOS AND FROG-LEAPING ALGORITHMS

Authors: SAEID JALILZADEH

Abstract: One of the power system problem is reducing the quality due to using semiconductor devices, that should be compensate. With regarding to compensation, different compensator exist, that one of is passive filter(LCL).One of aspects of power quality is voltage or current harmonic distortion, that THD(Total Harmonic Distortion) was used for obtaining it. Obtaining of optimized parameters of filter (L,C) is more effective on reducing the THD. In this paper Frog- Leaping and Chaos optimization algorithms on obtaining of L and C and reducing of THD were used simultaneity.

Keywords: frog,chaos,compensation,optimization,passive filter

Pages: 15 - 19 | DOI: 10.15224/978-1-63248-064-4-04

5. RAINFALL FORECAST OF A SYNOPTIC STATION USING ARTIFICIAL NEURAL NETWORK

Authors: HASAN ALMASI , SAEID FAZLI

Abstract: In this paper, we have utilized ANN (Artificial Neural Network) modeling for forecasting rainfall in Babolsar synoptic station in Iran. To achieve such a model, we have used daily rainfall data from 1978 to 2007 for the synoptic station. A Time Delay Series Neural Network is used in this work. Two hidden layers are considered for the neural network. Inputs are daily rainfall with variable lag to achieve optimal prediction. Using this method as a black box model, we have realized the hidden dynamics of rainfall through the past information of the system. Root Mean Square Error (RMSE) and Correlation Coefficient (r2) are evaluated for comparison purposes. Optimum delay days are calculated for rain forecasting which can be used in climatology application.

Keywords: Daily Rainfall Forecasting, Back Propagation Neural Network, Time Delay Series, optimum lag

Pages: 20 - 24 | DOI: 10.15224/978-1-63248-064-4-05

6. APPLICATION OF MEDICAL INFORMATICS IN ONLINE MEDICAL DATABASE SYSTEM AND INTERNATIONAL MEDICAL CARD USING SINGLE WINDOWS INFORMATION SERVICE SYSTEM IMCSWISS- A CASE STUDY OF ADVANCE ARCHITECTURE OF ONLINE MEDICAL DATABASE

Authors: JITENDER SOLANKI

Abstract: The medical informatics is a combination of information technology and health care. It deals with the resources, devices, and methods to optimize the acquisition, storage, retrieval and use of information in medical science.It is also known as health informatics.

Keywords: International medical card, Online Database, Patients, Doctors, Pathology laboratory, Medical tourism, Air ambulance, Mobile medical, Internet medical

Pages: 25 - 30 | DOI: 10.15224/978-1-63248-064-4-06

7. AN EXTENDED HUMAN THREATS TAXONOMY TO IDENTIFY INFORMATION SECURITY BREACHES

Authors: IHSAN OMUR BUCAK

Abstract: Many Information Security (IS) researchers emphasize the importance of human factor within information security. The main problem is that the ones responsible for information security do not take the thoughts, feelings and behavior of employees into account. It is common for organization management and people responsible for security not to listen to employees but mainly deal with commanding them. Unintelligent countermeasures may result in employees behaving in a way that would negatively affect security, because security solutions are developed to attempt to protect information, but the human factor is often left without attention. Taxonomy is an important milestone for this work because it will enhance the ability to examine the problem in a more systematic way and will eventually contribute to the establishment of a behavior-based intrusion detection model. The taxonomy work here covers a more recent and up-to-date taxonomy effort with increased dimensions and features. None of the

Keywords: information security; taxonomy; intrusion detection systems; human factors

Pages: 31 - 36 | DOI: 10.15224/978-1-63248-064-4-07

8. COMBINED NUMERICAL AND PSO-BASED CAMERA CALIBRATION FOCUSING ON LENS DISTORTION

Authors: MOHAMMAD HEMMATI , VAHID RASHTCHI

Abstract: Camera calibration is one of the most important steps, recognized as a bottleneck, in 3D scanning devices that a very small error in the camera parameters can lead to imprecise 3D models. In the last two decades, different approaches have been taken and improved the precision of the calibration parameters; but still the desire for better precisions and more stability exists. In this work, we have used an easy-to-implement and cheap checkerboard as the calibration object. The initial data for calibration is obtained with only three images captured from the checkerboard. To optimize the non-linear camera equations, both numerical and Particle Swarm Optimization (PSO) algorithms together have been applied in order to increase the precision and reduce the sensitivity of the algorithm to noise and errors. Capability of combined numerical and PSO-based algorithm for camera calibration especially lens distortion is demonstrated using a criterion called re-projection error. This work is distin

Keywords: Camera Parameters; intrinsic and Extrinsic Parameters; PSO; Re-projection Error; Lens Distortion; Checkerboard

Pages: 37 - 41 | DOI: 10.15224/978-1-63248-064-4-08

9. A NOVEL CRITERION FOR VEHICLE CLASSIFICATION USING INDUCTIVE VEHICLE SIGNATURES

Authors: PAULA M. CASTRO , JOSE J. LAMAS-SECO , FRANCISCO J. VAZQUEZ-ARAUJO , ADRIANA DAPENA

Abstract: Inductive Loop Detectors (ILD) are the most commonly used sensors in traffic management systems. Using the acquired inductive signatures, most proposed systems classify the vehicles using a criterion based on the estimation of the vehicle length, which requires to have a good a-priori estimate of its speed. Contrary to such standard proposals, in this paper we present a method for vehicle classification based on the criterion of the Fourier Transform (FT), which shows several interesting properties: firstly, robustness against variations in vehicle speed or constant acceleration, and secondly, only one inductive signature is required. Our method will be evaluated using real inductive signatures captured with a hardware prototype also developed by us.

Keywords: vehicle classification, inductive loop detectors, Fourier transform, sensors, signal processing, data acquisition, data classification, decision making, hardware prototype.

Pages: 42 - 45 | DOI: 10.15224/978-1-63248-064-4-09

10. SELECTING NEGATIVE TRAINING DOCUMENTS FOR BETTER LEARNING

Authors: ABDULMOHSEN ALGARNI

Abstract: In general, there are two types of feedback documents: positive feedback documents and negative feedback documents. These types share some knowledge because they retrieved using the same query. It is clear that all feedback documents contain some noise knowledge that affects the quality of the extracted features. The amount of noise is different from document to another. Therefore, the number of feedback documents affects the amount of extracting noise features. Then, using all feedback documents can increase the number of extracted noise features. However, we believe that negative feedback documents contain more noise than positive feedback documents. In this paper, we introduce a methodology to select some negative feedback documents to extract high-quality features and to reduce the amount of noises features.

Keywords: knowledge extraction, feature selection , relevance feedback.

Pages: 46 - 50 | DOI: 10.15224/978-1-63248-064-4-10

11. THE DANGEROUS OPTICAL POWER IN POTENTIALLY EXPLOSIVE ATMOSPFERE MEASURING OPTICAL FIBERS IN EX

Authors: MARTIN KYSELAK , MARTIN MAFKA

Abstract: This paper deals with the problem of optical fibre communication in potentially explosive atmospfere / hazardous area. Optical fibers are traditionally safe and useful in all environment, but it is shown, that a dangerous mix of explosive gas can be a big problem for optical fibres.

Keywords: OPTICAL FIBRE, EXPLOSIVE ATMOSPHERE, HAZARDOUS AREA, OPTICAL POWER.

Pages: 51 - 53 | DOI: 10.15224/978-1-63248-064-4-11

12. FOTA DELTA SIZE REDUCTION USING FILE SIMILARITY ALGORITHM’S

Authors: SHIVANSH GAUR , SHYJUMON N , SURENDRA GADWAL

Abstract: In today’s word, mobile devices are changing regularly. Thus the supporting software and applications needs to be regularly updated. Firmware over the air (FOTA) updates is a fresh technology for easy updation of mobile devices. However the FOTA delta size for updates is increasing considerably. Thus optimizing the network consumption for downloading the updates is a big challenge. Large FOTA delta size implies greater network bandwidth consumption while downloading the updates. This paper addresses this problem and aims to reduce the delta size for the FOTA updates. Various algorithms were implemented and their performance was analyzed. The analysis shows that the percentage reduction in delta size is reasonable

Keywords: FOTA, delta, fingerprints, chunking, hashing, simHash, TTTD.

Pages: 54 - 58 | DOI: 10.15224/978-1-63248-064-4-12

13. RESOURCE ALLOCATION BASED GAME THEORY IN A CONVERGED MACRO/FEMTO LTE NETWORKS

Authors: DERYA YILTAS-KAPLAN , MAURICIO ITURRALDE , PINAR KIRCI , TARA ALI YAHIYA

Abstract: In this article, we propose two levels of resource allocation method in a converged scenario for Macro and Femtocells LTE system. We use a Soft Frequency Reuse for guaranteeing the Quality of Service (QoS) for different Service Data Flows (SDFs) in the converged wireless networks. The first level of our method includes the use of bandwidth allocation between macro and femtocells and admission control based on bankruptcy game which is a special type of a cooperative game. A coalition among the converged scenario is formed to offer bandwidth to a new connection. Then, the second level will be coordinating the allocation among different SDFs in both networks. Our scheme for resource blocks allocation balances between maximizing the overall throughput of the system while guaranteeing the QoS requirements for a mixture of real-time and non-real-time SDFs. We present simulations to demonstrate the various degrees of macro/femtocell coordination and to take advantages of multiuser diversity.

Keywords: femtocell, macrocell, QoS, soft frequency reuse

Pages: 63 - 68 | DOI: 10.15224/978-1-63248-064-4-14

14. COLLISION EVASION METHOD USING AUXILIARY HASH

Authors: JAEMIN HWANG , SANGGIL KANG , JOOHYEONG SONG , JONGSIK LEE

Abstract: In this paper, we develop a conflict-free index generator to increase performance in a big data environment. There are several problems with the conventional hash functions, such as Minimal Perfect Hash Function (MPHF) on dynamic systems like big data. The collision-free problem occurs with an increase in the amount of data and the overhead in securing additional space to solve this problem. To solve this problem, we propose a collision evasion method using an auxiliary hash. In this paper, we divide the data into two categories by constructing a double hash to solve the problem.

Keywords: big data, conflict free, hash function, index generation function

Pages: 69 - 73 | DOI: 10.15224/978-1-63248-064-4-15

15. SENTIMENT ANALYSIS: PUBLICLY AVAILABLE DATASETS

Authors: DIANA TUULIK

Abstract: Sentiment analysis includes computational techniques to understand opinions and sentiment in texts. Several studies have explored supervised and unsupervised methods for sentiment classification covering natural language processing techniques, information retrieval and lexical resources. Training and testing data are appropriate from documents since each review has already labeled. This paper describes labeled datasets publicly available for sentiment classification problem.

Keywords: sentiment analysis, dataset, public, online

Pages: 74 - 78 | DOI: 10.15224/978-1-63248-064-4-16

16. ALTITUDE ROBUST CONTROL OF A QUAD-ROTOR AIRCRAFT USING INTEGRAL SLIDING MODE CONTROLLER

Authors: IVAN GONZALEZ-HERNANDEZ

Abstract: As we know, sliding mode control methodology is one of the robust control technique to handle systems with model uncertainties, parameter variations and external disturbances. In this paper, a robust altitude control scheme is proposed for a nonlinear quad-rotor aircraft system based on sliding mode controller with an integral action to eliminate the steady-state error effect. The proposed sliding mode controller is chosen to improve the stability and robustness of overall z-dynamics during the altitude control at a desired height. The stability of the system is guaranteed via Lyapunov stability theory. A suitable sliding manifold is designed to achieve the control objective. At last, the theoretical results are supported by different simulation tests to verify the satisfactory performance of proposed robust control scheme under external disturbances applied to autonomous quad-rotor aircraft

Keywords: Sliding mode, Robust control, Integral action in Sliding mode, Quadrotor aircraft stabilization, steady-state error.

Pages: 79 - 83 | DOI: 10.15224/978-1-63248-064-4-17

17. FAULT EFFECT ANALYSIS BASED ON A MODELLING APPROACH FOR REQUIREMENTS, FUNCTIONS AND COMPONENTS

Authors: HUIQIANG WANG , MICHAEL WEYRICH , NASSER JAZDI

Abstract: At present most of fault diagnosis systems are dedicated to fault detection, fault elimination and fault effect analysis with specific diagnosis approaches. Even though fault effect based on these approaches concerns the affected components as well as functions. However, there is no analysis of the still available functions which could continue to operate despite the failure. Currently, there are few approaches working on the fault analysis based on the existing fault diagnosis system. To support a full fault diagnosis, this paper proposes a novel full fault effect analysis approach based on system models. Within a defect component in an automation system, available functions can be identified by the presented approach. The presented approach uses the results of the existing fault diagnosis system as an analysis basis, e.g. the fault ID and the fault location. The propagation of a fault is identified with the help of the requirement-function-component models, which are provided by the

Keywords: requirement model, functional model, component model, fault effect analysis, function degradation, requirement dependency

Pages: 84 - 89 | DOI: 10.15224/978-1-63248-064-4-18

18. MEASUREMENT RECONSTRUCTION IN SENSOR NETWORKS FOR INDUSTRIAL SYSTEMS

Authors: SEPEHR MALEKI , CHRIS BINGHAM , YU ZHANG

Abstract: For signal processing in sensor networks there is an on-going challenge for filling missing information when it is either incomplete, uncertain or biased, in ways that are both efficient and with confidence. This paper reviews three established and additional newly developed techniques addressing the problem. Considering sensor signals that are highly correlated in a sensor network, one sensor measurement can be reconstructed based on measurements from other sensors. In such cases, three signal reconstruction methods are considered: 1) principal component analysis (PCA) based missing value approach; 2) self-organizing map neural network (SOMNN) based algorithm; and 3) an analytical optimization (AO) technique. To demonstrate the efficacy of the methods, temperature data are studied on an industrial gas turbine system, where, especially, a faulty sensor signal is utilized to be reconstructed from the other sensor measurements.

Keywords: signal reconstruction, principal component analysis, self-organizing neural network, analytical optimization.

Pages: 90 - 93 | DOI: 10.15224/978-1-63248-064-4-19

19. 2-D ONLINE CHANGEPOINT DETECTION ALGORITHM FOR SENSOR-BASED FAULT DETECTION

Authors: CHRIS BINGHA , SEPEHR MALEKI , YU ZHANG

Abstract: An online 2-D changepoint detection algorithm for sensor-based fault detection, is proposed. The algorithm consists of a differential detector and a standard detector and can detect anomalies and meaningful changepoints while maintaining a low false-alarm rate. The efficiency of the algorithm is validated by two industrial examples. It is thereby shown that the proposed algorithm can be used as an early warning indicator and prevent impending unit failures.

Keywords: Fault Detection, FDI, Changepoint Detection

Pages: 94 - 99 | DOI: 10.15224/978-1-63248-064-4-20

20. GENERATION OF VARIABLE SESSION KEYS BASED ON PIGGYBACKING STRATEGY

Authors: C. T. BHUNIA , MANASH PRATIM DUTTA , SUBHASISH BANERJEE

Abstract: Since the dawn of computer networks, protecting information from unauthorized users becomes like a battle field for the researchers and the attackers. Whenever any new solutions have been designed by the researchers to achieve the confidentiality and integrity towards the shared information, a new problem is always arisen by the attackers who are always ready to find out the loopholes. One of the solutions is to achieve and make difficult for the attacker by changing the keys frequently during the message transmission. In this regard, Automatic Variable Key (AVK) is an alternative approach to fulfill the requirements of such key variations. Therefore, in this article we have analyzed such approaches and given the contributions by proposing a new method to generate the keys which can enhance the security issues by increasing the randomness among the set of auto generated keys.

Keywords: AVK, randomness, security, session keys

Pages: 100 - 104 | DOI: 10.15224/978-1-63248-064-4-21

21. AN ENTROPY-BASED SIGNAL RESTORATION METHOD ON GRAPHS

Authors: JIANJIA PAN , XIANWEI ZHENG , YUAN YAN TANG

Abstract: This paper proposes an entropy-based best tree decomposition and reconstruction method for signals on graphs. A recently popular method for graph signal decomposition is to down-sample and filter a graph signal by low-pass and high-pass filters, then iterate decomposition on every low-pass component. This method is not well-suited for graph signals with significant high frequency components. We propose a new method to decompose a graph signal according to an entropy based best tree decomposition scheme. This method is adaptive for graph signal decomposition, and it gives more accurate and robust representations for graph signals. The proposed decomposition method is shown to provide an efficient representation well-suited for graph signal compression, or graph-based image compression. The performance of the proposed method is validated by real-world graph signal recovery problems. The new method also achieves better performance than the existing wavelet-like decomposition in graph-base

Keywords: Graph Fourier transform, graph signal filter, entropy, graph signal compression.

Pages: 105 - 109 | DOI: 10.15224/978-1-63248-064-4-22

22. EXPLORING THE SQL INJECTION VULNERABILITIES OF .BD DOMAIN WEB APPLICATIONS

Authors: DELWAR ALAM , TANJILA FARAH , MD. ALAMGIR KABIR

Abstract: Web applications have been proven most efficient by providing easy access to services such as online education, banking, reservation, shopping, resources, and information sharing. Though the use of web applications is a comparatively new concept, various government and private organizations of Bangladesh have started getting accustomed to it. Bangladesh government has also taken initiative to support web based services and ensure their security and reliability. Most of the web applications of Bangladesh are registered under .bd domain. The global accessibility and sensitivity of the information’s of web applications make them a target for web attackers. However the security issues of the .bd domain web applications are not addressed. No through study has been done so far on the existing vulnerabilities of these web applications. Hence the web applications are vulnerable to basic attack such as Structured Query Language injection (SQLi). This paper presents an evaluation of existing Use

Keywords: component, formatting, style, styling, insert

Pages: 110 - 114 | DOI: 10.15224/978-1-63248-064-4-23

23. HARDWARE IMPLEMENTATION OF A TURBO CODE WITH 3 DIMENSIONS ON FPGA

Authors: AAROUD ABDESSADEK , ALI EL HORE , MENSOURI MOHAMMED

Abstract: Recent wireless communication standards such as 3GPP-LTE, WiMax, DVB-SH, HSPA and LTE / LTE advanced incorporate turbo code for their excellent performance. In this paper, we present a new 3 dimensional turbo decoder including bit error rate (BER) is much better than the 2 dimensional turbo decoder used by LTE / LTE advanced, as is illustrated by simulation. We also address the issue of the implementation of the 3 dimensional turbo decoder on FPGA using the environment QUARTUS II. In this work, we also present the implementation on FPGA of 3 dimensional Turbo encoder using two interleavers QPP (Quadratic Permutation Polynomial) and ARP (Almost Regular Rotation). In decoding scheme, the core of the iterative decoding structure is a soft-input soft-output (SISO) decoder. The MAP algorithm, which is used for SISO decoders, embodies complex mathematical operations such as division, exponential and logarithm calculations. Therefore, MAP algorithm was avoided and the sub-optimal derivatives

Keywords: 3 dimensional turbo encoder, QPP interleaver, ARP interleaver, MAP algorithm, Log max MAP, SISO decoder, 3 dimensional turbo-decoder, FPGA

Pages: 115 - 120 | DOI: 10.15224/978-1-63248-064-4-24

24. DETECTING AND FOCALIZING SPOOFING ATTACKS IN WIRELESS NETWORKS

Authors: NEELAVATHY PARI S , NEELAVATHY PARI S , SIVA KUMAR G R

Abstract: An important problem in wireless network security is node authentication. The existing schemes for node authentication are based on IP and MAC address which can be easily spoofed by the adversaries. Wireless spoofing attacks are easy to establish and significantly affects the functionality of the network. In the proposed approach, log files are used for authenticating each node which is hard to falsify and difficult to modify or delete the contents. The proposed system determines the spoofing attacks and localize the adversaries using spatial correlation of received signal strength (RSS). In this paper, the problem of identifying the number of attackers is determined by Partitioning Around Mediods (PAM), a cluster-based analysis method and Euclidean distance between successive packets. The simulation results show that the proposed approach over performs all other existing approaches with high detection ratio

Keywords: Spoofing attacks, RSS, PAM, Euclidean distance.

Pages: 121 - 126 | DOI: 10.15224/978-1-63248-064-4-25

25. REALIZATION OF OTA-C UNIVERSAL FILTER BASED ON Q- FACTOR

Authors: M. M. MUTSADDI , MANJULA V. KATAGERI , RAJESHWARI S. MATHAD

Abstract: A second order OTA-C filter based on OTA integrator and register is selected as a suitable structure in the design of universal filter by selecting proper inputs VA, VB and Vc. This selection reflects the Q factor sensitization in obtaining -3dB frequency in low-pass, high-pass, band-pass and band-reject filter structures. The variation in the values of C1 and C2 and their contribution in the values of Q factors is studied. The studied structure is superior to the other types of filters at radio and microwave frequencies in communication system.

Keywords: OTA-C Operational Transconductance AmplifierCapacitor, Ib1 Bias current of OTA1 , Ib2- Bias current of OTA2, BW- Band width

Pages: 127 - 132 | DOI: 10.15224/978-1-63248-064-4-26

26. A SEMANTIC APPROACH FOR TEXT CLUSTERING USING WORDNET BASED ON MULTI-OBJECTIVE GENETIC ALGORITHMS

Authors: HAN HEE HAHM , JONG JOO LEE , SOON CHEOL PARK

Abstract: In this paper, we propose a method of Multi- Objective Genetic Algorithms (MOGAs), NSGA-II and SPEA2, for document clustering with semantic similarity measures based on WordNet. The MOGAs showed a high performance compared to other clustering algorithms. The main problem in the application of MOGAs for document clustering in the Vector Space Model (VSM) is that it ignores relationships between important terms or words. The hierarchical structure of WordNet as thesaurus-based ontology is an effective technique, which is used in semantic similarity measure. We tested these algorithms on Reuter-21578 collection data sets and compared them with Genetic Algorithms (GA) in conjunction with the semantic similarity measures based on WordNet. Also, we used F-measure to evaluate the performance of these clustering algorithms. The experimental results show that the performance of MOGAs based on WordNet is superior to those of the other clustering algorithms in the same similarity environments.

Keywords: Document Clustering, Multi-Objective Genetic Algorithm, Semantic Similarity Measure, WordNet

Pages: 133 - 137 | DOI: 10.15224/978-1-63248-064-4-27

27. EXPLOITING SELF-ADAPTIVE, 2-WAY HYBRID FILE ALLOCATION ALGORITHM

Authors: JAECHUN NO , SUNG-SOON PARK

Abstract: We present hybridFS file system that provides a hybrid structure, which makes use of performance potentials of NAND flash-based SSD (Solid-State Device). As the technology of flash memory has rapidly improved, SSD is being used in various IT products as a nonvolatile storage media. Applications looking for better I/O performance attempt to achieve desirable bandwidth, by employing SSD to storage subsystems. However, building a large-scale SSD storage subsystem deploys several issues that need to be addressed. Those issues include peculiar physical characteristics related to flash memory and high SSD cost per capacity compared to HDD devices. This paper presents a new form of self-adaptive, hybrid file system, called hybridFS, which properly attempts to address aforementioned issues. The main goal of hybridFS is to combine attractive features of both HDD and SSD devices, to construct a large-scale, virtualized address space in a costeffective way. The performance evaluation shows that h

Keywords: SSD, transparent file mapping, data section, 2- way extent allocation, data layout

Pages: 138 - 142 | DOI: 10.15224/978-1-63248-064-4-28

28. PREDICTABLE CPU ARCHITECTURE DESIGNED FOR SMALL REAL-TIME APPLICATIONS – IMPLEMENTATION RESULTS

Authors: IONEL ZAGAN , VASILE GHEORGHITA GAITAN

Abstract: The purpose of this paper is to describe and present the implementation results of nMPRA-MT processor concept designed for small real-time applications. Our target is to validate a fine-grained multithreading CPU architecture that uses replication and remapping techniques for the program counter, general purpose registers and pipeline registers. The new predictable CPU implementation is based on a hardware scheduler engine, being able to schedule dynamically a set of tasks on the five-stage pipeline assembly line. Using a FPGA device from Xilinx, we validate the innovative nMPRA-MT processor, interleaving different types of threads into the pipeline assembly line, providing predictability and hardware-based isolation for hard real-time threads. Mechanisms for synchronization and inter-task communication are also taken into consideration

Keywords: predictable; real-time systems; fine-grained multithreading; hardware scheduler; pipeline; hard real-time

Pages: 143 - 150 | DOI: 10.15224/978-1-63248-064-4-29

29. DYNAMIC MATRIX CONTROL OF 1 DOF ROTOR SYSTEM

Authors: JAE-HEON PARK , OH-KYU KWON , YEONG-SANG PARK

Abstract: This paper presents DMC algorithm in order to apply to systems with relatively fast process. Firstly, C MEX Sfunction was used to create the QP solver based on C-code with optimal control algorithm. Secondly, a real-time application is considered using library blocks from Matlab/Simulink. Finally, DMC simulator and PI controller were used for the velocity control of 1 DOF rotor. Through this paper, the implementation of a real-time application was considered for using DMC algorithm by creating C MEX S-function to generate a single DMC block in Matlab/Simulink. Additionally, the proposing theory applied to the SISO system (1 DOF rotor) as a previous experiment for the possibility of controlling the TRMS (Twin Rotor MIMO System).

Keywords: Dynamic Matrix Control, 1 Degree of Freedom, DC motor control, Nonlinear system, QP solver, C MEX Sfunction, Matlab/Simulink.

Pages: 151 - 155 | DOI: 10.15224/978-1-63248-064-4-30

30. THE METHODOLOGY FOR IMPLEMENTATION OF CLOUD COMPUTING IN THE ENTERPRISE AND UNIVERSITIES

Authors: ZUZANA PRISCAKOVA , IVANA RABOVA

Abstract: This article analyzes the process of the implementation of cloud computing in a university environment. The goal of the implementation is to enhance the security of the data, that are handled via cloud. Two different implementation environments to increase the accuracy of the data are used – the enterprise and the university environment. The verification of the formalized methodics contains the architecture proposal, the infrastructure and implementation proposal, and testing of the virtualized technologies. The undertaken research had aim to identify the life cycle of the data, that are stored in the virtualized environment (where the observed constituents are the implementation environment requirements, the origin of the data, the data sensitivity, the integrity preservation and secrecy of the data, and the linking between the virtualized environment and hardware). As generalized methodics, there we can find the available algorithms, standards, and security protocols which are recomm

Keywords: cloud computing, data security, data integrity

Pages: 156 - 160 | DOI: 10.15224/978-1-63248-064-4-31

31. TRAFFIC GROOMING FAULT TOLERANT TECHNIQUE FOR LOAD-BALANCED ROUTING AND WAVELENGTH ASSIGNMENT IN WDM NETWORKS

Authors: ACHALA DESHMUKH , SURENDRA BHOSALE , NISHA SARWADE

Abstract: This problem of traffic grooming, routing, and wavelength assignment (GRWA) is considered with the objective of minimizing the number of transponders in the network. We first formulate the GRWA problem as an integer linear programming (ILP) problem. Unfortunately, the resulting ILP problem is usually very hard to solve computationally, in particular for large networks. To overcome this difficulty, a decomposition method is proposed that divides the GRWA problem into two smaller problems: the traffic grooming and routing (GR) problem and the wavelength assignment (WA) problem. In the GR problem, we only consider how to groom and route traffic demands onto light paths and ignore the issue of how to assign specific wavelengths to light paths. Similar to the GRWA problem, we can formulate the GR problem as an ILP problem. The size of the GR ILP problem is much smaller than its corresponding GRWA ILP problem. Once we solve the GR problem, we can then consider the WA problem, in which our go

Keywords: ILP: integer linear programming, RWA: Routing and Wavelength Assignment, GRWA: grooming, routing, and wavelength assignment, GR: grooming and routing, FTPS: Fault Tolerant Path Set, NSF: National Science Foundation Standard network model.

Pages: 161 - 165 | DOI: 10.15224/978-1-63248-064-4-76

32. THE ADOPTION OF MOBILE-LEARNING TO SUPPORT PHYSICALLY CHALLENGED LEARNERS WITH SPECIAL EDUCATIONAL NEEDS: CASE OF ZIMBABWE

Authors: SIBUSISIWE DUBE

Abstract: Education is a key investment in any nation as it plays a crucial role to sustainable human, economic, social and technological development of that nation. The right to education for all has been a long standing commitment for Zimbabwe and as such the Zimbabwe Education Act stipulates that all children have the right to the provision of education without discrimination in compliance with the Millennium Development Goals (MDG). On the contrast the situation in Zimbabwe shows that many children with physical disabilities are still segregated as regards education for very few neither have access to basic education nor reach the highest levels of education. This study investigated ways through which mobile technologies can be used as learner support services for learners with special educational needs due to physical disabilities. In this paper, disabled learners with special education needs refer to learners with physical and hearing impairments. This paper is timely since there is signif

Keywords: mobile-learning, mobile technologies, mobile devices, special education needs learners, learning Management Systems, e-learning

Pages: 166 - 170 | DOI: 10.15224/978-1-63248-064-4-77

33. OCTOPUS ONLINE COLLABORATIVE TOLL-CARD-SHARING PUBLIC SYSTEM

Authors: CHRISTOS KAKLAMANIS , ELINA BAGIAKOU , EVI PAPAIOANNOU , STAVROS ATHANASSOPOULOS

Abstract: We present OCTOPUS, an internet based system that allows users to voluntarily share prepaid “aller-retour” toll cards of limited lifetime or/and use a car pooling service. Users have to register and provide details about the resource they either possess or wish to make use of. OCTOPUS is then responsible for processing and matching user requests utilizing geographical information also allowing users to select their matching members just using their smartphone or any mobile device with an internet connection. OCTOPUS is yet another proof of concept that internet and the web can actually promote resource sharing for social welfare in our modern society.

Keywords: OCTOPUS, internet, web, culture, smartphone, wireless, geographical information, online matching, resource sharing, collaborative consumption, social welfare

Pages: 171 - 174 | DOI: 10.15224/978-1-63248-064-4-78

34. THE EFFECT OF LED CHIP CONNECTION TYPE ON LIGHTING AND THERMAL PERFORMANCE OF A LUMINAIRE

Authors: ALI AJDER , HAKAN AKCA , HUSEYIN AKDEMIR , ISMAIL NAKIR , MUGDESEM TANRIOVEN , RAMAZAN AYAZ

Abstract: LED Lighting system is an alternative to conventional lighting system for their special advantages in terms of power rating, lifetime, luminous efficacy, etc. This paper proposes the results obtained from a DC/DC converter powered LED streetlight system. In this study, high and low voltage output DC/DC converter is used for operating serial and parallel connected LED modules. The effects of connection type and output voltage are presented to verify the effectiveness on LED driver in terms of thermal, electrical and lighting aspects. Then it is shown that thermal and optical performance is better in serial connection, reliability performance is better on the parallel connection

Keywords: connection type, luminaire, LED drivers, streetlight I

Pages: 175 - 179 | DOI: 10.15224/978-1-63248-064-4-82

35. OPTIMIZATION APPROACH TO SOLVING OF N-VERSION SOFTWARE SYSTEMS DESIGN PROBLEM

Authors: ANNA VOROSHILOVA , DMITRY KOVALEV , IGOR KOVALEV , NATALIA IVLEVA , PAVEL ZELENKOV

Abstract: The problem of developing an optimal structure of N-version software system presents a kind of very complex optimization problem. This causes the use of deterministic optimization methods inappropriate for solving the stated problem. In this view, exploiting heuristic strategies looks more rational. In the field of pseudo-Boolean optimization theory, the so called method of varied probabilities (MVP) has been developed to solve problems with a large dimensionality. Some additional modifications of MVP have been made to solve the problem of N-version systems design. Those algorithms take into account the discovered specific features of the objective function. The practical experiments have shown the advantage of using these algorithm modifications because of reducing a search space.

Keywords: N-version software, optimal structure, software system design, pseudo-Boolean optimization.

Pages: 180 - 186 | DOI: 10.15224/978-1-63248-064-4-83

36. FINDING OUTLIER BY USING A MODIFIED HYBRID MODEL WITH THE INTEGRATION OF DEMATEL AND DANP TECHNIQUES, AND COMBINING THE CLUSTER ANALYSIS

Authors: GWO-HSHIUNG TZENG , JIARUI ZHANG , SHAN-LIN HUANG , SU-MEI LIN

Abstract: A hybrid model (in this paper we call it D-DANP) with the integration of DEMATEL (Decision-Making Trial and Evaluation Laboratory) and DANP (DEMATEL-base ANP) techniques is a popular and effective tool which can output some visual maps to summarize those complex human thinking by its systematization method, and provide some vital information to decision maker. D-DANP model uses questionnaire to collect raw data from expert. Therefore, the most important thing is to collect effective and reliable sample by confirming the quality of the expert. The D-DANP uses the function of consistence examination to verify the reliability of raw data which can influence the outcome of INRM directly and disturb the interpretation of result. However, the D-DANP can not provide the more reliable INRM without finding the outlier form raw data. This paper intends to propose a new modified hybrid model based on the D-DANP model, to develop trustworthy INRM by eliminating outlier which can be found by cluste

Keywords: D-DANP model, raw data, reliability, INRM, appraisal system of B&B, new modified hybrid model

Pages: 187 - 192 | DOI: 10.15224/978-1-63248-064-4-84

37. HIGHER ORDER APPROXIMATIONS FOR DERIVATIVES USING HYPERCOMPLEX-STEPS

Authors: H. M. NASIR

Abstract: Complex-step differentiation is a recent popular method to compute a real valued function and its first derivative approximately with second order error using imaginary step size. We propose a generalization of complex-step method to compute a complex valued function and its derivatives up to order n – 1 with approximate error of order n, for any desired integer n. For this, we use a hypercomplex number system of dimension n and Taylor series expansion of the function at a hypercomplex number. Computations can be performed efficiently by using fast Fourier transform.

Keywords: complex-step differentiation, hypercomplex numbers, automatic differentiation, a

Pages: 193 - 198 | DOI: 10.15224/978-1-63248-064-4-106

38. COMPARISON OF ROAD LIGHTING LUMINAIRES FOR M2 ROAD LIGHTING CLASS CONSIDERING ENERGY EFFICIENCY

Authors: ADEM UNAL , ALI AJDER , ASIYE KAYMAZ , HAKAN AKCA

Abstract: Using LED luminaires instead of luminaires with conventional lamps may lead better energy savings and energy efficiency. In order to decide to choose more efficient road lighting system a comparison between conventional lighting luminaires and LED based luminaires should be examined. In this study, the luminaires with high pressure sodium (HPS) lamp which is the most widely used technologies in road lighting and less frequently used luminaires with metal halide (MH) lamps analyzed and compared with LED luminaires. The photometric data of the three different luminaries were investigated by using Goniophotometer and Integrating Sphere in the laboratory. After that, the obtained data applied to a sample road model in Dialux software program. Lighting designs using different types of lighting luminaires are created by taking minimum criteria of CIE standards for M2 lighting class into consideration. This study shows that 36.6% energy saving can be achieved in case of using new LED technolo

Keywords: Road lighting, energy efficiency, LED luminaire, M2 road class

Pages: 199 - 203 | DOI: 10.15224/978-1-63248-064-4-107

39. COMPUTED AUTOMATIC 3D SEGMENTATION METHODS IN COMPUTED TOMOGRAPHY LASER MAMMOGRAPHY

Authors: A.JALALIAN , A.R.RAMLI , B.KARASFI , M. I. SARIPAN , N.BAHRI , R.MAHMUD , S. A/P.SUPPIAH , S.MASHOHOR

Abstract: The use of computer assisted diagnosis systems (CADs) has been recognized to improve sensitivity and specificity of diagnostic in radiology research. Accurate segmentation of clinical imaging is a critical step in the CAD systems which affect the efficiency of subsequence stages such as feature extraction and classification. In this paper we propose a 3-dimensional (3D) segmentation method to extract volume of interests (VOIs) in computed tomography laser mammography (CTLM). Three automatic segmentation techniques consist of Color quantization (CQ), K-Mean (Kmean) and Fuzzy C-Means (FCM) clustering have been implemented as a proposed method in a 3D structure. The evaluations were performed by comparison of segmented images and ground truth. The ground truth are extracted using windows/level technique on the original CTLM images. The Jaccard and Dice coefficients in addition volumetric overlap error are employed to quantify the accuracy of segmentation methods. According to the outcomes

Keywords: Computed Tomography Laser Mammography; Computer Aided Diagnosis; Segmentation; Breast Cancer

Pages: 204 - 208 | DOI: 10.15224/978-1-63248-064-4-110

40. COMPARATIVE ANALYSIS OF SCHEDULING TECHNIQUES IN DOWNLINK LTE USING MATLAB-BASED LTE MACLAB SIMULATOR

Authors: A. A. ATAYERO , O. I. OSHIN , A. S. ALATISHE

Abstract: Traffic scheduling plays an important role in LTE technology by assigning the shared resources among users in the most efficient manner. This research compares the performance of three types of scheduling algorithms namely: Round Robin, best Channel Quality Indicator (CQI) and Proportional Fair (PF) schedulers representing the extreme cases in scheduling. The scheduling algorithms performances on the downlink were measured in terms of throughput and block error rate using a MATLAB-based system level simulation.

Keywords: LTE, Scheduling, Throughput, 3GP

Pages: 209 - 212 | DOI: 10.15224/978-1-63248-064-4-111

41. COMPARATIVE ANALYSIS OF ROUTING INTERNET PROTOCOL AND OPEN SHORTEST PATH FIRST PROTOCOLS USING QUALNET

Authors: A. A. ATAYERO , A. A. ATAYERO , O. I. OSHIN , A. S. ALATISHE

Abstract: Reliability is a major consideration in Network Design and Implementation in order to cater for link failures. Link failure is a frequent occurrence in Networks and Communications Systems, and the speed at which this disruption is noticed and (or) fixed varies. The use of dynamic routing means in case of link failure, the routers are able to learn alternate routes via periodic updates about the network topology and link states from its neighbors. This report shows how to simulate and study how dynamic routing protocols such Link state and Distance-vector routing protocols respond to link failures and restart, their performance is compared using Qualnet.

Keywords: LTE, Scheduling, Throughput, 3GPP

Pages: 213 - 216 | DOI: 10.15224/978-1-63248-064-4-112

42. RESIDUAL ENERGY IN CORONA-BASED DEPLOYMENT STRATEGIES IN WIRELESS SENSOR NETWORK

Authors: ABDULRAHMAN ALHARBY , ADNAN RASHID CHAUDHRY , ATIQ UR RAHMAN , IRSHAD AHMAD

Abstract: Wireless sensor networks (WSNs) are getting in a wide range of applications, such as mart homes, military surveillance, habitat monitoring, and precision agriculture. Sensor node placement is the most challenging problem in wireless sensor network due to the limited battery power. For critical applications, sensor node placement in efficient way is necessary to monitor the event precisely, which alternatively achieve balance energy depletion and extend the network lifetime. In multi-hop transmission, nodes lies in sink vicinity have heavier traffic loads which deplete their energy quickly; this leads to energy holes around the sink, which ends network lifetime. However, most of sensor nodes have enough residual energy in network. This paper presents corona based sensor node deployment strategies and their effect on residual energy has been showed. Simulation result shows residual energy of each corona during network lifetime.

Keywords: Corona-based Wireless Sensor Network, Engineered Gaussian deployment, Energy hole problem, Arithmetic and Geometric proportions.

Pages: 217 - 221 | DOI: 10.15224/978-1-63248-064-4-116

43. REAL TIME SPECIFIC WEED CLASSIFIER BASED ON VARIATION IN ENVIRONMENTAL CONDITIONS

Authors: ABDULRAHMAN ALHARBY , ATIQ UR RAHMAN , IRSHAD AHMAD

Abstract: Natural light is an important factor that needs to be considered in the implementation of an automatic sprayer system. This paper evaluates the scalability of real time specific weed recognition system using histogram analysis, and its comparison with two dimensional weed coverage rate (2DWCR), and Angular Cross Sectional Intensities (ACSI) classifiers based on the variation in the natural lighting conditions to encompass the cloudy and bright shiny outdoor environment. A large image dataset of 1500 images was used as compared to the previously used image datasets (200-1200 image datasets). The dataset images are further subdivided based on different lighting conditions and is termed as normal, dark, and bright. The proposed classifier was applied to classify these images into broad and narrow class for real time selective herbicide application using a single constant threshold. The analysis of the results shows over 94 percent weeds detection and classification accuracy (broad and nar

Keywords: Image Processing, automatic sprayer system, weed classification, histogram analysis

Pages: 222 - 226 | DOI: 10.15224/978-1-63248-064-4-117

44. A BI-OBJECTIVE PROPOSAL TO GROUP POPULATION WITHOUT TAP WATER OR DRAINAGE NETWORK SERVICES

Authors: JORGE RUIZ VANOYE , MARÍA BEATRÍZ BERNABE LORANCA , MARTÍN ESTRADA ANALCO , ROGELIO GONZÁLEZ VELÁZQUEZ

Abstract: Proposing a multi-objective method is a common part of the process of supporting the decision-making process in population problems. This with the goal of motivating the selection of projects that help the population sector that has scarce water and drainage services at home. The method should provide a set of solutions that reflect the urgency to attend this population sector. Each solution is a set of geographical zone partitions formed by geographical units that fulfill the geometric compactness and homogeneity criteria, this homogeneity is given by the variable named "private houses without tap water, drainage network nor electricity services". We present basic theoretical aspects about the multiobjective methodology and a method supported on the order theory to find the Pareto Frontier. Given that the problem solves a kind of partitioning that optimizes two quality measures, the approximation to the optimal solution is made with variable neighborhood search (VNS). Once we obtained

Keywords: grouping, multiobjective, population, pareto frontier.

Pages: 227 - 231 | DOI: 10.15224/978-1-63248-064-4-125

45. A MAXIMUM CONSTANT BOOST QUASI-Z-SOURCE INVERTOR WITH THIRD HARMONIC INJECTION FOR LINEAR INDUCTION MOTORS

Authors: ADAM PR TAYLOR , SHUBHENDU BAGHEL , VIGNESH RADHKRISHNAN

Abstract: Three phase voltage linear induction motors (LIMs) are emerging as a reliable means of providing both fast transport solutions and significant amount of linear thrust. However, conventional Voltage Source Invertor (VSI) and Current Source Invertor (CSI) motor drives applied to LIMs suffer from the generation of harmonic currents from the nonlinear nature of the LIM. This paper presents an improved Quasi-Z-Source Inverter (QZSI) for a linear induction motor (LIM) whose controller has been built, and its simulated results. The proposed QZSI controller herein for a LIM will injects uniformly spaced shoot through states, and promises a high output voltage gain and reduced THD.

Keywords: Maximum , Constant , Boost Quasi, Source Invertor

Pages: 232 - 237 | DOI: 10.15224/978-1-63248-064-4-126

46. A 2-PORT NETWORK MODEL OF A Z-SOURCE CONVERTER

Authors: ADAM P.R. TAYLOR , BRYN PARKER

Abstract: A 2-port network model of an ideal Z-source convertor has been developed and is presented in both the Zdomain and the S-domain. The reciprocicity of the Z-source convertor is confirmed with Z12 is shown to equal Z21, and S12 is shown to equal S21, and the transfer function for the Voltage Gain of the network is derived. The 2-port model is validated against a MATLAB Simscape Z-Source convertor simulation and found compliant. It was shown and confirmed that an increase in inductance in the Z-source convertor reduces the resonant frequency and its magnitude, while increasing capacitor values will decrease the resonant frequency of the system but as opposed to the inductor sweep the resonant magnitude increases and the phase shift bandwidth is almost unaffected. Two different configurations with the same resonant frequency were compared revealing the damping effect on the resonant frequency. The larger characteristic was found for a system with a large value of capacitance with respect to

Keywords: Port, Network, Model, Z-Source Converter

Pages: 238 - 243 | DOI: 10.15224/978-1-63248-064-4-127

Popular Proceedings

ESSHBS 2017 - 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ICETM 2023 - 2023

9th International E-Conference on Engineering, Technology and Management

ASET 2017 - 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017 - 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017 - 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017 - 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022 - 2022

8th International E- conference on Engineering, Technology and Management

SEM 2019 - 2019

9th International Conference on Advances in Social Science, Economics and Management Study