Loading...

Proceedings of

2nd International Conference on Advances in Computing, Electronics and Communication ACEC 2014

Date
26-Oct-2014
Location
zurich , Switzerland
Authors
83
ISBN
978-1-63248-029-3

43 Articles Published

1. APPLICATION OF MEDICAL INFORMATICS IN ONLINE MEDICAL DATABASE SYSTEM AND INTERNATIONAL MEDICAL CARD USING SINGLE WINDOWS INFORMATION SERVICE SYSTEM IMC-SWISS- A CASE STUDY OF ARCHITECTURE OF ONLINE MEDICAL DATABASE

Authors: JITENDER SOLANKI

Abstract: The medical informatics is a combination of information technology and health care. It deals with the resources, devices, and methods to optimize the acquisition, storage, retrieval and use of information in medical science.It is also known as health informatics.The online medical database system is such a database where all type of health facilities will be stored in online database and this can be access by card. In this paper it proposes the how this card uses for access medical related activities. It is just like ATM card but it deals only health issue. The name of the card is International Medical Card (IMC). It is a application of medical informatics in which all detail of health are stored in the online database and can access by International Medical Card (IMC).

Keywords: International medical card, online medical database, Patients, Doctors, Pathology laboratory, Primary key, Foreign key,

Pages: 1 - 5 | DOI: 10.15224/978-1-63248-029-3-63

2. LOW OVERHEAD CLUSTERING APPROACH FOR LONG LIFETIME OBJECT TRACKING APPLICATIONS

Authors: A.MAHANI , M.MIRSADEGHI , Y.S. KAVIAN

Abstract: Target tracking is one of the most important applications of wireless sensor networks (WSNs), especially for the urgent event of interest. In this paper we propose a new clustering algorithm beside our accurate prediction mechanism which was proposed previously, that detects and tracks a moving target, and alerts head nodes along the predicted path of the target. The main advantages of proposed clustering algorithms are low transmission overheads with high coverage. Then based on the accuracy of the predictor the best cluster is selected to make more accurate tracking while reducing dramatically the object miss ratio. According to our proposed method in each time instant, only some nodes which, are near to the target and have short distance to the head node, will be selected for tracking and other nodes go to the power saving mode which can strongly reduces the consumed energy.

Keywords: Target tracking, Wireless sensor networks, Cliustering, Coverage, energy efficiency

Pages: 6 - 10 | DOI: 10.15224/978-1-63248-029-3-64

3. UTM VIRTUAL LAB DESIGN

Authors: DHARI KH ABEDULA

Abstract: In this paper , I will examine the Security design parts of the University Technology Malaysia UTM Virtual LAB environment , beginning with the security areas and requirements that guided the creation and evolution of the LAB project . In addition, design Guides provide an overview of the Security solutions architecture and Scenarios. with Security traffic across the Security server through the internet , with Active Directory server to provide the Authentication methodology, and data protection provide backups with checkpoint and rollback mechanisms

Keywords: VMware, Virtual LAB .

Pages: 11 - 13 | DOI: 10.15224/978-1-63248-029-3-65

4. THE MAIN ASPECTS OF DATA SECURITY IN CLOUD COMPUTING

Authors: ZUZANA PRISCAKOVA , IVANA RABOVA

Abstract: Cloud computing is a modern trend in information technologies. Implementation of the cloud is associated with data security. Data security includes phishing, provider personnel with privileged access, data origin and lineage. Another security aspect is determination of data categorization. In this article we point to two ways for data categorization. The aim of this paper is to determine the safety aspects based on the special security points. We set user login, encryption and data security, risks and data integrity as the main aspects. These aspects we summarized in nondeterministic finite automaton. We determined a new methodology of security using automaton.

Keywords: cloud computing, data security, data categorization, storage, data integrity

Pages: 14 - 19 | DOI: 10.15224/978-1-63248-029-3-66

5. AN EFFICIENT MANAGEMENT SCHEDULING FOR RAPID DATA TRAVERSE IN WIRELESS SENSOR NETWORK

Authors: S. DIWAKARAN

Abstract: A wireless sensor network is a collection of nodes organized into a cooperative network. It comprising of spatially appropriated self-ruling mechanisms utilizing sensors to screen physical or ecological conditions. Now a day’s wireless sensor network is applied in many applications like military, nuclear power plant. In those applications data transmission rate should be in higher manner and the data transmission time should be very lower and all the nodes are in the cluster should be very secure also. For that single source shortest path algorithm – Dijkstra’s algorithm is used , from this algorithm the intermediate node between the sender and the sink node will be reduced and the data path will be reduced and the data transmission time will be reduced .If the node and the cluster is not secure the sensed data will be read by some of the intruder. For secure our cluster three tier security scheme is used. In this security scheme the node, cluster head, sink node are having their own k

Keywords: MD5 hashing, Single source shortest path, Three tier security.

Pages: 20 - 24 | DOI: 10.15224/978-1-63248-029-3-67

6. LIMITS OF INFORMATION RETRIEVAL USING BASIC NATURAL LANGUAGE PROCESSING APROACHES REASEARCH FOCUSED ON USED WORDS FOR SUMMARIZING THE KEY MESSAGE OF GIVEN TEXT BY READERS

Authors: RADIM BRIXI

Abstract: The paper presents original results from research that analyses words that are used by the readers of given text to describe the key message in the entire text. Those readers’ words are then lemmatized and compared to lemmatized words from the original main text. The research reveals that for texts with deeper meaning are used surprisingly and also significantly such words by the readers that cannot be found in the entire original text. The percentage of such words increases when forced to express the key message using less words.

Keywords: word, limit, natural language processing, lemmatization, meaning, summary

Pages: 25 - 28 | DOI: 10.15224/978-1-63248-029-3-68

7. A PERFORMANCE OF MAC LAYER OVER ERROR-PRONE CHANNEL IN THE IEEE 802.11AC

Authors: HA CHEOL LEE

Abstract: A MAC (Medium Access Control) layer throughput is evaluated over error-prone channel in the IEEE 802.11ac-based wireless LAN. In this evaluation, DCF (Distributed Coordination Function) protocol and A-MPDU (MAC Protocol Data Unit Aggregation) scheme are used. Using theoretical analysis method, the MAC saturation throughput is evaluated with the PER (Packet Error Rate) on the condition that the number of station, transmission probability, the number of parallel beams and the number of frames in each A-MPDU are variables. When the PER is 10-2 and the number of aggregated MPDUs in each A-MPDU is 20, it is identified that the MAC layer throughput of IEEE 802.11ac can be maximally attained up to a 92.8% of physical transmission rate in this evaluation.

Keywords: Wireless LAN, MAC, Throughput, CSMA/CA, DCF, IEEE 802.11ac.

Pages: 33 - 37 | DOI: 10.15224/978-1-63248-029-3-70

8. AN EFFICIENT ESTIMATION OF CARRIER FREQUENCY ERROR IN MULTICARRIER SPREAD SPECTRUM SYSTEM FOR POWER LINE COMMUNICATIONS

Authors: GAOYONG LUO

Abstract: Multicarrier spread spectrum (MC-SS) systems exhibit good robustness against all kinds of narrowband interference, coloured noise or selective attenuation for power line communications. However, the systems’ vulnerability to frequency synchronization errors, which introduce loss of orthogonality between the subcarriers, is still a challenging problem for robust communications. This paper presents a novel multicarrier spread spectrum system with carrier frequency error estimation and low complexity by frequency division multiple access (FDMA) approach to cope with highly unpredictable harsh power line channel. Experimental results demonstrate that the frequency error estimation and compensation based on a successive phase difference measurement can achieve performance near to that without frequency errors, leading to robust communications for smart grid applications.

Keywords: multicarrier spread spetrum system, frequency error estimation and compensation, power line communications

Pages: 38 - 41 | DOI: 10.15224/978-1-63248-029-3-71

9. P : A NEW PATH PLANNING ALGORITHM FOR AUTONOMOUS ROBOT IN AN UNKNOWN ENVIRONMENT

Authors: FAROUK MEDDAH , LYNDA DIB

Abstract: In this paper we present P* “P-Star” witch is a new algorithm for sensor based path planning. This work is based on PointBug algorithm [11] where we applied some improvements and modifications to overcome some important problems (like infinite loops and the bypass of some sub-paths). Moreover, we present some simulation results and comparisons with PointBug to evaluate and to verify the performance and the power of the proposed algorithm.

Keywords: Mobile Robot, Path Planning, Unknown Environment, PointBug

Pages: 42 - 46 | DOI: 10.15224/978-1-63248-029-3-72

10. TOWARDS A THEORETICAL BASIS FOR MODELLING OF HIDDEN LAYER ARCHITECTURE IN ARTIFICIAL NEURAL NETWORKS

Authors: ASOKA S. KARUNANANDA , N. MIHIRINI WAGARACHCHI

Abstract: Artificial neural networks (ANNs) are mathematical and computational models that are inspired by the biological neural systems. Just like biological neural networks become experts by learning from the surrounding, ANNs also have the ability to be experts in the particular area by training the network. Despite of their many advantages, there are some unsolved problems in applying artificial neural networks. Determine the most efficient architecture for the given task is identified as one of those major issues. This paper provides a pruning algorithm based on the backpropagation training algorithm to obtain the optimal solution of ANN. The pruning is done according to the synaptic pruning in biological neural system. Experiments were done with some well known problems in machine learning and artificial neural networks and results show that the new model performs better than the initial network in training data sets.

Keywords: artificial neural netowrks; backpropagation; delta values; hidden layer architecture;

Pages: 47 - 52 | DOI: 10.15224/978-1-63248-029-3-73

11. AN ANALYSIS OF SUBFIELD BASED ON FUZZY FOR DETERMINISTIC INDOOR LOCALIZATION IN WSN

Authors: GUNGOR YILDIRIM , YETKIN TATAR

Abstract: In many wireless applications, location awareness is of paramount importance and, therefore, there are many algorithms regarding localization problems in literature. Fingerprint-based algorithms are one of them, consisting of two phases; mapping and location estimation. In location estimation phases of some technics based on fingerprint, subfields are used for the purpose of filtering data. A subfield analysis could be complex in applications having big radio maps. In addition to this, unstable RSSI values could make the analysis more difficult. In such a state, different approaches can be used to increase the efficiency. In this paper, an alternative deterministic localization technique suggested by the authors of this paper in an earlier study was explained and then unlike the earlier study, a subfield analysis based on fuzzy was applied with the aim of examining a soft computing approach in localization. The results of the experiments were compared with the results of classical dete

Keywords: WSN, RSSI, K-Means, KNN, Fuzzy

Pages: 53 - 57 | DOI: 10.15224/978-1-63248-029-3-74

12. KNOWLEDGE REPRESENTATION FOR AN EFFICIENT RE-USE OF PROJECT MEMORY USING ONTOLOGY CONCEPT

Authors: HATEM BEN STA , SABRI ALLANI

Abstract: This paper presents a knowledge management experiment realized in an in high technological industry. After some definitions of project memory, related works and some critiques of existing approaches of project memory we suggest an approach based on two key guidelines : representation of both the context and the design rationale of a project for an efficient access to knowledge using the technology of the ontology field . Finally, after avoiding some of the weaknesses the existing approaches we suggest our ontology approach with is based on [1] rational approach , showing how ontology technology can effectively contribute to the conceptualization of memories projects in order to allow preserving relevant information to be used later

Keywords: Project Memory, Knowledge Management, Ontology

Pages: 58 - 62 | DOI: 10.15224/978-1-63248-029-3-75

13. PARAMETRIC STUDIES ON THE SEISMIC PERFORMANCE OF TYPICAL RURAL BUILDINGS IN INDIA

Authors: SREENIVAS SARMA PARAITHAM , SAI KRISHNA ANUDEEP PARAITHAM

Abstract: India is divided in to four seismic zones ,viz.,zone II( moderate) to zone V (Very Severe). In each of these zones , rural areas exist and the rural buildings are unique in pattern to that particular zone . Many of these rural buildings are non-engineered and are always the ‘worst hit’ during devastating earthquakes . However, it is interesting to note that some of these buildings which follow traditional construction patterns and practices , popularly known as vernacular constructions , have withstood the power of earthquakes and are time tested. In this work , the results of a parametric study conducted on the seismic performance of typical rural houses of India , are presented . The study involved the analysis of representative numerical models of typical rural buildings of various geometries , materials and patterns . These representative models are the outcome of the several field investigations and review of the extensive standard literature available on construction practices ad

Keywords: Rural buildings , Vernacular Constructions , Seismic Performance , Parametric Studies

Pages: 63 - 67 | DOI: 10.15224/978-1-63248-029-3-76

14. KNOWLEDGE REPRESENTATION FOR AN EFFICIENT RE-USE OF PROJECT MEMORY USING ONTOLOGY CONCEP

Authors: HATEM BEN STA , SABRI ALLANI

Abstract: This paper presents a knowledge management experiment realized in an in high technological industry. After some definitions of project memory, related works and some critiques of existing approaches of project memory we suggest an approach based on two key guidelines : representation of both the context and the design rationale of a project for an efficient access to knowledge using the technology of the ontology field . Finally, after avoiding some of the weaknesses the existing approaches we suggest our ontology approach with is based on [1] rational approach , showing how ontology technology can effectively contribute to the conceptualization of memories projects in order to allow preserving relevant information to be used later.

Keywords: Project Memory, Knowledge Management, Ontology.

Pages: 58 - 62 | DOI: 10.15224/978-1-63248-029-3-75

15. PARAMETRIC STUDIES ON THE SEISMIC PERFORMANCE OF TYPICAL RURAL BUILDINGS IN INDIA

Authors: SREENIVAS SARMA PARAITHAM , SAI KRISHNA ANUDEEP PARAITHAM

Abstract: India is divided in to four seismic zones ,viz.,zone II( moderate) to zone V (Very Severe). In each of these zones , rural areas exist and the rural buildings are unique in pattern to that particular zone . Many of these rural buildings are non-engineered and are always the ‘worst hit’ during devastating earthquakes . However, it is interesting to note that some of these buildings which follow traditional construction patterns and practices , popularly known as vernacular constructions , have withstood the power of earthquakes and are time tested. In this work , the results of a parametric study conducted on the seismic performance of typical rural houses of India , are presented . The study involved the analysis of representative numerical models of typical rural buildings of various geometries , materials and patterns . These representative models are the outcome of the several field investigations and review of the extensive standard literature available on construction practices ad

Keywords: Rural buildings , Vernacular Constructions , Seismic Performance , Parametric Studies

Pages: 63 - 67 | DOI: 10.15224/978-1-63248-029-3-76

16. SOFTWARE AND HARWARE IMPLEMENTATION OF DIGITAL AUDIO WATERMARKING

Authors: G. N RATHNA , MADHUPARNA CHAKRABORTY

Abstract: Many digital files are shared nowadays through internet especially due to the increase in the number of cell phone users. However, digital files can be easily copied, distributed, and altered leading to the copyright infringement of intellectual property. One way to prevent this is by using watermarking technique. The file in which watermark is embedded can be audio, image, text or video file. In this paper watermarking on audio file is done. The audio watermarking algorithm using fast Fourier transform is studied here. The watermarking system consists of two main steps watermark embedding and watermark extraction system. The technique used here is to put the watermark into the selected prominent peaks of the magnitude spectrum of the audio signal. The reason of hiding the watermark in this position is that it will be imperceptible for the human auditory system. The algorithm is also implemented on Beagle board hardware for online operation

Keywords: watermarking, embedding, detection, copyright

Pages: 74 - 77 | DOI: 10.15224/978-1-63248-029-3-78

17. KALMAN FILTER AND PROJECTION HISTOGRAM BASED PEOPLE COUNTING

Authors: ADITYA PIRATLA , JAYALAKSHMI SURENDRAN , SATHISH KUMAR SHIVAGURUNATHAN

Abstract: This paper presents an algorithm for real time people counting using a stationary camera for outdoor and indoor scenarios. The objective of the algorithm is to count the number of people entering or leaving a particular area by checking for the crossing of a user defined line. The algorithm implemented consists of four modules. The first module deals with image segmentation where in the information obtained from the camera frames are converted into foreground objects using a temporal difference based algorithm, followed by a computation of an undirected optimized graph to establish the relationship between the foreground objects of two consecutive frames. The second module is related to object tracking using a Kalman based tracking mechanism. The third module is the object crossing detection module which discusses three techniques namely block matching, optimized block matching and a simple region crossover. The last module is related to counting based on a projection histogram based m

Keywords: Video surveillance, People counting, Image processing, Kalman filter application

Pages: 78 - 82 | DOI: 10.15224/978-1-63248-029-3-79

18. A ROBUST WATERMARKING TECHNIQUE BASED ON HYBRID PSO

Authors: SHEETAL KHOKHAR , PARVINDER SINGH

Abstract: This paper presents a robust image watermarking technique usingWeight ImprovedParticle Swarm Optimization. The concept of WIPSO makes the technique intelligent because the watermark is embedded into the image adaptively, depending on the test image. Significant difference of wavelet coefficients quantization method has been used for embedding watermark that provides robustness and makes the technique blind. The watermark is embedded in the predetermined bit plane in the given lower frequency sub bands by adjusting the values of the wavelet coefficients. Hybrid of Particle Swarm Optimization (PSO) gives more promising results than PSO

Keywords: Watermark, WIPSO, Significant coefficients, Fitness function

Pages: 88 - 92 | DOI: 10.15224/978-1-63248-029-3-81

19. PRACTICAL CONTOUR TRACING VIA INTEGRATION OF ADAPTIVE CONTRAST STRETCHING AND GABOR WAVELET TRANSFORM

Authors: HABIB MOHAMADIAN , HANG YIN , ZHENGMAO YE , YONGMAO YE

Abstract: The Gabor filter is applied using discrete wavelet transform for edge detection and contour tracing on true color images, whose wavelet functions provide the high resolution in both spatial and frequency domains. The number of wavelets also affects the quality of edge detection. To generate more accurate outcomes, integration of adaptive contrast stretching and Gabor wavelet transform is properly carried out for edge detection and contour tracing on broadly selected images. Contrast stretching is based on adaptive histogram equalization generalization, where the accumulation function is used to generate intensity mapping of three primary color components stem from local histograms. Any digital image consists of major objects, edges, corners and blobs as well as the noises and background fluorescence. Critical changes in image properties can be captured via detecting sharp variations in the intensity. Although the gray level intensity is commonly used for edge detection, the mixture of

Keywords: Gabor Wavelet Transform, Adaptive Contrast Stretching, Canny Edge Detection, Quantitative Analysis

Pages: 93 - 97 | DOI: 10.15224/978-1-63248-029-3-82

20. CONSTRAINEDNESS MEASUREMENT OF PETRI NET MODELS

Authors: DOGUS BEBEK , HUREVREN KILIC

Abstract: It is shown that Shannon’s information capacity calculation metric (originally developed for discrete noiseless channels) can be used for constrainedness quantification of Petri Net based models if they are k-bounded and deadlock free. The proposed approach includes generation of finite marking reachability graph from a given restricted Petri Net based model followed by capacity calculation using the graph by setting up an analogy between Petri Net transitions and letters of Shannon languages.

Keywords: constrainedness quantification, information capacity calculation, Shannon language, Petri Nets

Pages: 98 - 101 | DOI: 10.15224/978-1-63248-029-3-83

21. COLLABORATIVE MONITORING OF TRAFFIC IN INTERSECTIONS USING VIDEO AND IMAGE PROCESSING

Authors: KONSTANTINOS KOKKINOS , DIMITRIOS VENTZAS

Abstract: Effective monitoring and traffic management at modern urban area road systems contribute significantly to resolving traffic problems and enhance the quality of life. Congestion caused by lack of capacity and strength of the traffic network due to traffic bursts essentially directs the flow control management in urban area intersections which also imposes restrictions on the development of a city. To address this problem, we develop algorithms for the identification of vehicles, their license plate recognition and the tracking of pedestrians when crossing intersections. The proposed framework is developed in a C# standalone application which collaborates with matlab libraries for the image and video processing and it is an open-ended environment for future extensions.

Keywords: collaborative simulations, video/image processing vehicle identification, plate recognition, pedestrian detection

Pages: 102 - 107 | DOI: 10.15224/978-1-63248-029-3-84

22. LEAST SUPPORT ORTHOGONAL MATCHING PURSUIT (LS-OMP) RECOVERY METHOD FOR INVISIBLE WATERMARKING IMAGE

Authors: ISRAA SH. TAWFIC , SEMA KOC KAYHAN

Abstract: In this paper a watermark embedding and recovery technique based on the compressed sensing theorem is proposed. Both host and watermark images are sparsified using DWT. In recovery process, a new method called Least Support Matching Pursuit (LS-OMP) is used to recover the watermark and the host images in clean conditions. LS-OMP algorithm adaptively chooses optimum L (Least Part of support), at each iteration. This new algorithm has some important characteristics: it has a low computational complex-ity comparing with ordinary OMP method Also, we develop an invisible image watermarking algorithm in the presence of compressive sampling using the LS-OMP. Simulation results show that LS-OMP outperforms many algorithms

Keywords: Compressed sensing, Lest Support Orthogonal Matching Pursuit, Orthogonal matching pursuit, restricted isometry property, Watermark

Pages: 108 - 112 | DOI: 10.15224/978-1-63248-029-3-85

23. PERSONAL ACCOMPANYING REMOTE-NONINVASIVE MEDICAL SYSTEM

Authors: K. ABLYAZOV , R. SINGATULIN

Abstract: At present there is a significant class of different personalized mobile systems for human health control. These personalized systems have been developed in order to run diagnostic procedures of patient’s health conditions. Systems like this are passive means of measuring, control, and accumulation of medical and biological information having a limited number of active tasks. The new class of medical and biological systems is originating right now; it includes active interaction between electronic components, health aids, and human organism, wider integration of instrumental and measuring system, neural-network interaction, and human in a real-time mode. The description of one of the version under development is given below. It is a personal accompanying remote noninvasive medical system based on mobile applications.

Keywords: Mobile medicine, basic architecture, webcameras, neural networks, diagnostics

Pages: 113 - 115 | DOI: 10.15224/978-1-63248-029-3-86

24. TOWARDS QUANTITATIVE METRICS FOR EVALUATION OF VOIP SECURITY SYSTEMS

Authors: NAWAZ MOHAMUDALLY , SHEEBA ARMOOGUM

Abstract: VoIP systems is the new voice communication technology and is playing a key role in various sectors (Government, business, education etc) for the development of a country. Unfortunately, industry and academic researchers find difficulties to evaluate existing systems with focus on security to countermeasure the various attacks for either implementation in a real operator or future enhancement. This paper aims at enhancing the set of evaluation criteria presented in our last work by introducing metrics in a similar way done in software engineering. The V-Model is used to extract data. At the end, a metrics mechanism is developed together with the computation of each metric.

Keywords: Evaluation Criteria, IDS, Metrics, SIP, VoIP Systems

Pages: 116 - 120 | DOI: 10.15224/978-1-63248-029-3-87

25. ARTIFICIAL INTELLIGENCE AND ECONOMICS: FROM HOMO SAPIENS TO ROBO SAPIENS

Authors: AD J.W. VAN DE GEVEL , CHARLES N. NOUSSAIR

Abstract: The integration of artificial intelligence into daily life and the production of goods and services will have large effects on the economy. In the future the labour market will change, with large differences in impact between sectors

Keywords: singularity, methuselarity, robotics, whole brain emulation, artificial life, artificial consciousness, artificial happiness

Pages: 121 - 126 | DOI: 10.15224/978-1-63248-029-3-88

26. TOWARDS A EUROPEAN JURISDICTION BASED ON BRAIN COMPUTER INTERFACES

Authors: THOMAS GRECHENIG , MARTIN GLETTLER

Abstract: As demonstrated in our recent work “Improving the accuracy in person lineups and identification via brain-computer interfaces “ we used brain computer interface technology to distinguish between known and unknown persons faces when presented to a witness as a set of stimuli. The classifiers are built using the BCI2000 framework, a multi-purpose research software. In this paper we will extend this approach and explore the potential of our “BCI based analytic proof” in detail at the example of Austria, a jurisdiction in the European Union.

Keywords: BCI, Brain computer interface, BCI2000, P300, Evoked Potentials, Improving Accuracy in person lineups, EyeWitness, BCI based Jurisdiction

Pages: 127 - 131 | DOI: 10.15224/978-1-63248-029-3-89

27. DETIBOOT: A FAST, WIRELESS SYSTEM TO INSTALL OPERATING SYSTEMS ON STUDENTS LAPTOPS

Authors: JOAO SILVESTRE , ANDRE ZUQUETE , CARLOS FANECA

Abstract: This work presents a system conceived to deploy temporary Linux systems into an unlimited number of client hosts using a Wi-Fi source station (DETIboot server). The ultimate goal of this system is to provide a simultaneous and just-in-time installation of a custom Linux distribution on several tens of laptops for being used in classes or exams. DETIboot uses a server to endlessly broadcast a custom Linux distribution at maximum Wi-Fi transmission speed, using an ad-hoc network topology to reach all nearby target systems wishing to install it. To deal with packet losses and avoid feedback from the client hosts, we used Fountain Codes. With these codes, client hosts can start at any time the reception and the expected time for completing the download is mainly a function of the number of codewords (wireless frames) effectively received. Field tests were done to evaluate the performance of our system and in average it took around 69 seconds to download a custom Linux image (based on Slax)

Keywords: operarating systems, ad-hoc networks, broadcast, fountain codes, LT codes

Pages: 132 - 137 | DOI: 10.15224/978-1-63248-029-3-90

28. SPLINE KERNELS IN NONPARAMETRIC REGRESSION

Authors: MARCIN MICHALAK

Abstract: This paper presents a new group of kernel functions – spline kernels. This group of kernels connects advantages of Epanechnikov kernel and a multiple differentiability, required in several aspects of building kernel estimators.

Keywords: nonparametric regression, kernel estimators, kernel function

Pages: 138 - 141 | DOI: 10.15224/978-1-63248-029-3-91

29. ANALYZING SUPPLY CHAIN NODES IN HETEROGENEOUS ENVIRONMENTS BASED ON TRANSACTION DATA WITH RESPECT TO INDEPENDENT ITEM BEHAVIOR

Authors: LUKAS KOPECKI , SEBASTIAN LAUCK , SIMON BOXNICK

Abstract: Sizing and redesign of new and existing supply chain nodes, like warehouses or logistic hubs are highly data-dependent tasks, incorporating lots of transaction information which are mostly available through ERP systems. Therefore, item-based forecasting and lot sizing models, approximations or both are used widely when planning new supply chain nodes. This paper introduces a new approach of data-aggregation based on probability functions of each item (e.g. stock keeping units (SKU)) incorporating compensating behavior and time-dependent aspects.

Keywords: data mining, big data aggregation, supply chain analysis, material flow analysis, warehouse planning

Pages: 142 - 146 | DOI: 10.15224/978-1-63248-029-3-92

30. METAMATERIAL-INSPIRED ELECTROMAGNETIC BAND GAP STRUCTURE FOR ISOLATION IMPROVEMENT OF MICROSTRIP PATCH ANTENNA

Authors: GOLGE OGUCU , SAMAT TURDUMAMATOV

Abstract: The microstrip patch antenna arrays are widely used in the wireless communication applications. Mutual coupling between the antenna elements affects the array performance, and reduction of the coupling and improvement of the isolation are important tasks for an array system. In this paper, some compact, metamaterial-based electromagnetic band gap (EBG) structures are proposed, which are an alternative to the existing EBGs used in various applications, to reduce the mutual coupling effect between the antennas in an array. The design is obtained by using a simulation program and the simulation results show that the isolation between the elements can be enhanced with the proposed EBGs.

Keywords: microstrip patch antenna array, electromagnetic band gap structure, metamaterials, mutual coupling, isolation

Pages: 147 - 150 | DOI: 10.15224/978-1-63248-029-3-93

31. 2D POINT RECONSTRUCTION BY MHR METHOD

Authors: DARIUSZ JACEK JAKOBCZAK

Abstract: Applied science and mechanics need mathematical methods for 2D processes modeling using the set of data points. A novel method of Hurwitz-Radon Matrices (MHR) is used in 2D curve modeling. Proposed method is based on the family of Hurwitz-Radon matrices which possess columns composed of orthogonal vectors. Two-dimensional process is modeled via different functions: sine, cosine, tangent, logarithm, exponent, arc sin, arc cos, arc tan and power function.

Keywords: process modeling, Hurwitz-Radon matrices, coefficient of MHR method, mathematical modeling

Pages: 181 - 184 | DOI: 10.15224/978-1-63248-029-3-100

32. PONG GAME AS AN EMBEDDED SYSTEM

Authors: SADIYE NERGIS TURAL-POLAT

Abstract: In this study, a Pong game running on an FPGA development and education board using VHDL hardware description language is synthesized. To this end, an original pong game code that works solely on the FPGA board is designed. One important aspect of this design is that the code does not use any SRAM modules for storage. Though Altera DE0 development and education board is used for the implementation, thanks to the usage of only the standard VHDL functions, it can run on any other FPGA boards.

Keywords: pong game, game code in VHDL, embedded systems.

Pages: 170 - 174 | DOI: 10.15224/978-1-63248-029-3-98

33. OPTIMISATION AND DESIGN ANALYSIS OF YAGI ANTENNAS FOR DIGITAL TELEVISION BROADCASTING SERVICES

Authors: DUSHYANT RAMSAHYE , SHEEBA ARMOOGUM , VINAYE ARMOOGUM

Abstract: In this paper, an in-depth investigation on Yagi antennas are conducted. The antenna design is based on two distinct approaches: firstly, using the addition of further parasitic elements in the model and secondly, using different types of materials – Copper, Aluminum and Stainless steel. The Yagi models are simulated at frequencies near the 530 MHz. Six antennas are then fabricated based on the positive simulated results. The Yagi Antennas are physically tested on a DVB-T decoder at various locations using a Field Strength Meter. The maximum gain achievable is around 12.62 dBi with a MER value of around 25.0 dBi. Comparative analysis with existing antenna structures are made. A better performance of 3.72 dBi for non-commercialised antennas and of 1.12 dBi for comercialised antennas is obtained.

Keywords: Dipole, Fabrication, Gain, Optimisation, Yagi structure.

Pages: 166 - 169 | DOI: 10.15224/978-1-63248-029-3-97

34. ANTENNA ARRAY PATTERN NULLING USING CONSTRAINT BASED OPTIMIZATION TECHNIQUES

Authors: DEBALINA GHOSH , LAKSHMAN PAPPULA

Abstract: Modern communication systems employ antenna arrays for enhanced coverage and efficiency. Such arrays need to exhibit low peak sidelobe level (PSLL) and the capability of positioning multiple asymmetrical mulls. In this paper, modified Invasive Weed Optimization (IWO) algorithm is used to estimate the complex elemental excitations required for achieving multiple nulls in specified directions while maintaining PSLL below the detectable range of -40dB. The novelty of the proposed approach is in the application of a constraint-based static penalty function during optimization of the array. The static penalty function is able to put selective pressure on the PSLL, the first null beam width (FNBW) or the accurate null positioning as desired by the application at hand lending a high degree of flexibility to the synthesis process. Several numerical results of periodic array patterns with the imposed asymmetrical multiple null conditions are presented to illustrate the performance of the propos

Keywords: Linear antenna array; invasive weed optimization; static penalty function; side lobe level; asymmetrical nulls; null steering.

Pages: 161 - 165 | DOI: 10.15224/978-1-63248-029-3-96

35. PHOTONIC GENERATION OF MICROWAVE SIGNALS USING SINGLE LASER TECHNIQUE

Authors: BIJAYANANDA PATNAIK , P. K. SAHU , SOMANATH PRADHAN

Abstract: Photonic generation methods of microwave signal employing single LASER (light amplification by stimulated emission of radiation) technique and Mach-Zehnder modulator (MZM) are presented in this paper. The impact of the finite extinction ratio (ER) of MZM and fiber dispersion on the generated microwave signal is discussed. This system is compared with other reported microwave generation schemes. The results of the system are simulated using OptiSystem12 software.

Keywords: Optical generation of microwave signal, MachZehnder modulator (MZM), LASER, dispersion, Optisystem 12.

Pages: 156 - 160 | DOI: 10.15224/978-1-63248-029-3-95

36. FREE VIBRATION ANALYSIS OF ELASTIC CYLINDRICAL HELIX VIA A MIXED FINITE ELEMENT METHOD

Authors: AKIF KUTLU , NIHAL ERATLI

Abstract: Referring to the previous theoretical and numerical studies on the static/dynamic analyses of elastic helicoidal bars, only circular or square cross-sections were considered up today. The main purpose of this study is to investigate the dynamic behavior of the elastic cylindrical helices having hollow circle and elliptical hollow sections. For this purpose, a mixed finite element formulation with the Timoshenko beam assumptions is employed. Frenet triad is adopted as the local coordinate system in the helix geometry. Isoparametric curved elements involve two nodes, where each node has 12 DOF, namely three translations, three rotations, two shear forces, one axial force, two bending moment and one torque. Numerical solutions are performed to analyze the free vibration behavior of the cylindrical helices and benchmark results are presented. Parametric studies are carried out to investigate the influence of the parameters e.g. section geometry, boundary conditions, density of the material

Keywords: cylindrical helix, elliptical hollow section, mixed finite element method, free vibration

Pages: 57 - 60 | DOI: 10.15224/978-1-63248-030-9-12

37. MULTISCALE ANALYSIS OF WATER QUALITY TIME SERIES DATA USING THE HILBERT HUANG TRANSFORM

Authors: JANGA REDDY M , ADARSH S

Abstract: This paper presents the multiscale spectral analysis of four water quality time series data from an Indian river. First, the Complete Ensemble Empirical Mode Decomposition with Adaptive Noise (CEEMDAN) is employed for multiscale decomposition and the resulted orthogonal modes namely Intrinsic Mode Functions (IMFs) are subsequently subjected to the Normalized Hilbert Transform (NHT). The spectral representation clearly depicts the nonlinearity and non-stationarity of the datasets and the time varying behavior of dominant frequency. The marginal Hilbert spectrum of different parameters shows that the dominant frequency of most of the pollutants is at high frequency range which indicates the significant anthropogenic impacts in the study area. Also the trend analysis performed upon the instantaneous amplitudes show that the high frequency components are responsible for overall trend of the four time series during the study period under consideration. The multiscale decomposition process a

Keywords: Amplitude, Frequency, Multiscale Decomposition, Hilbert Huang Transform, Water Quality

Pages: 65 - 68 | DOI: 10.15224/978-1-63248-030-9-14

38. MONITORING AND PREDICTION OF FUGITIVE DUST CONCENTRATION IN AN OPENCAST COAL PROJECT USING AERMOD

Authors: D.P. TRIPATHY

Abstract: This paper focuses on the real time monitoring of dust level at different sources of a mechanised coal mine using DustTrak II and finally prediction of dust concentration at different locations of the mine and nearby areas using AERMOD view software. The paper summarizes the findings of dust measurement at different work places in different size range PM10, 4 micron, 2.5 micron and , 1 micron and using meteorological data and AERMOD software dust concentration around the mine were predicted. The predicted value of dust concentrations (PM10) were compared with NAAQS-2009 standard.

Keywords: coal

Pages: 73 - 76 | DOI: 10.15224/978-1-63248-030-9-16

39. RAILWAY CROSSING MONITORING SYSTEM BASED ON IMAGE PROCESSING

Authors: MARTIN DOBROVOLNY , ZDENEK SILAR

Abstract: This article deals with the occupancy detection on a railway crossing (clearance detection). The presented detection is based on the optical flow estimation and classification of the flow vectors by K-means clustering algorithm. The optical flow is based on a modified Lucas-Kanade method. For testing of the developed methods a model was created and the results were verified on a real data.

Keywords: railway crossing monitoring, objects detection, background estimation, K-means clustering, Matlab, optical flow, velocity vectors

Pages: 151 - 155 | DOI: 10.15224/978-1-63248-029-3-94

40. A PERFORMANCE OF MAC LAYER OVER ERROR-PRONE CHANNEL IN THE IEEE 802.11AC

Authors: HA CHEOL LEE

Abstract: A MAC (Medium Access Control) layer throughput is evaluated over error-prone channel in the IEEE 802.11ac-based wireless LAN. In this evaluation, DCF (Distributed Coordination Function) protocol and A-MPDU (MAC Protocol Data Unit Aggregation) scheme are used. Using theoretical analysis method, the MAC saturation throughput is evaluated with the PER (Packet Error Rate) on the condition that the number of station, transmission probability, the number of parallel beams and the number of frames in each A-MPDU are variables. When the PER is 10-2 and the number of aggregated MPDUs in each A-MPDU is 20, it is identified that the MAC layer throughput of IEEE 802.11ac can be maximally attained up to a 92.8% of physical transmission rate in this evaluation

Keywords: Wireless LAN, MAC, Throughput, CSMA/CA, DCF, IEEE 802.11ac.

Pages: 33 - 37 | DOI: 10.15224/978-1-63248-029-3-70

41. IMPROVING AUTOMATED LEARNING IN MOBILE ENVIRONMENT

Authors: YANYAN YANG , SAMARA BANNO

Abstract: The advance of mobile learning technologies has led to a new research issue in education, that is, the development of educational assessment with personalized learning system supports. In the meantime, it also becomes a challenging issue to evaluate the students learning achievement in mobile environment. In this paper, an integration of student modeling system with dynamic assessment strategy and context recommendations is proposed. This combination is able to guide the student to the proper level of performance by providing him with the necessary hints and learning material recommendations. The theoretical basis of dynamic assessment produce a proper mediation to help learners to apply some necessary principles to independently solve problems and thus learn more, plus provide more accurate individual knowledge estimation. Moreover, proper learning materials are suggested to the students to support their understanding and development of their knowledge level.

Keywords: Mobile Learning, Dynamic Assessment, Student Modeling, Recommender System.

Pages: 68 - 73 | DOI: 10.15224/978-1-63248-029-3-776

42. ARTIFICIAL INTELLIGENCE AND ECONOMICS: FROM HOMO SAPIENS TO ROBO SAPIENS

Authors: AD J.W. VAN DE GEVEL , CHARLES N. NOUSSAIR

Abstract: The integration of artificial intelligence into daily life and the production of goods and services will have large effects on the economy. In the future the labour market will change, with large differences in impact between sectors.

Keywords: singularity, methuselarity, robotics, whole brain emulation, artificial life, artificial consciousness, artificial happiness

Pages: 121 - 126 | DOI: 10.15224/978-1-63248-029-3-88

43. TOWARDS A EUROPEAN JURISDICTION BASED ON BRAIN COMPUTER INTERFACES

Authors: THOMAS GRECHENIG , MARTIN GLETTLER

Abstract: As demonstrated in our recent work “Improving the accuracy in person lineups and identification via brain-computer interfaces “ we used brain computer interface technology to distinguish between known and unknown persons faces when presented to a witness as a set of stimuli. The classifiers are built using the BCI2000 framework, a multi-purpose research software. In this paper we will extend this approach and explore the potential of our “BCI based analytic proof” in detail at the example of Austria, a jurisdiction in the European Union.

Keywords: BCI, Brain computer interface, BCI2000, P300, Evoked Potentials, Improving Accuracy in person lineups, Eye- Witness, BCI based Jurisdiction

Pages: 127 - 131 | DOI: 10.15224/978-1-63248-029-3-89

Popular Proceedings

ICETM 2023

9th International E-Conference on Engineering, Technology and Management

ESSHBS 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ASET 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022

8th International E- conference on Engineering, Technology and Management

ACSEE 2019

8th International Conference on Advances in Civil, Structural and Environmental Engineering