Loading...

Proceedings of

International Conference on Advances in Information Processing and Communication Technology IPCT 2014

Date
08-Jun-2014
Location
Rome , Italy
Authors
67
ISBN
978-1-63248-021-7

29 Articles Published

1. OUTLIER DOCUMENT FILTERING APPLIED TO THE EXTRACTIVE SUMMARIZATION

Authors: METIN HUSEM

Abstract: Summarization requires selection of the more informative sentences within a set of documents. Generally, process assumes the document set includes related topics to a subject. However, some of the documents may be outlier and the effect of an outlier document might affect the success of extractive summary. Research is focused on filtering documents at the extraction stage these are outlier. Extraction finds the outlier documents far distance from representative document set word vector (DSWV). DUC 2006 data set is used for tests. System summaries are compared with the systems generated by DUC participants. Results points out that filtering outlier documents overwhelm all the systems fairly.

Keywords: Document Processing, Extractive Summarization, Outlier Detection, Similarity Measure

Pages: 1 - 4 | DOI: 10.15224/978-1-63248-021-7-67

2. INDUCTION OF LDA OBLIQUE DECISION RULES

Authors: MARCIN MICHALAK

Abstract: This paper presents a new algorithm of decision rules with oblique conditions induction. It bases on the Fisher’s Linear Discriminant Analysis as a tool of finding an initial classes separation. This technique has a good ability of oblique dependencies generalisation what reduces the number of decision rules and their complexities.

Keywords: classification, machine learning, Linear Discriminant Analysis, decision rules, oblique decision rules

Pages: 21 - 25 | DOI: 10.15224/978-1-63248-021-7-70

3. DESIGN OF PARTIALLY REPLICATED DISTRIBUTED DATABASE SYSTEMS WITH COMBINATION OF TOTAL COST AND WORKLOAD BALANCING

Authors: SUKKYU SONG

Abstract: In partially replicated distributed database systems, the minimization of total time usually attempts to minimize resource consumption and therefore to maximize the system throughput. On the other hand, the minimization of response time may be obtained by having a large number of parallel executions to different sites, requiring a higher resource consumption, which means that the system throughput is reduced. Workload balancing implies the reduction of the average time that queries spend waiting for CPU and I/O service at a network site, but its effect on the performance of partially replicated distributed database systems cannot be isolated from other distributed database design factors. In this research, the total cost refers to the combination of total time and response time. This paper presents a framework for total cost minimization and workload balancing for partially replicated distributed database systems considering important design factors together. The framework incorporates

Keywords: Partially replicated distributed database, Total time, Response time, Workload, Operation (subquery) allocation, Data allocation, Genetic algorithms

Pages: 5 - 16 | DOI: 10.15224/978-1-63248-021-7-68

4. A SIMPLE, BUT THOROUGH EXPERIMENTATION FOR BREAST CE-MRI CLASSIFICATION

Authors: CARMELA LUONGO , FRANCO ALBERTO CARDILLO , GIUSEPPE AMATO

Abstract: We present the results of an experimentation with dynamic features for breast cancer detection in Contrast-Enhanced Magnetic Resonance of the female breast. In order to understand how good the various features are we built a dataset from real dataset with proven histological diagnosis. We compared human-readable features, commonly used in the clinical practice, with a non-linear artificial neural network trained with a double k-fold cross validation. The results show that the ANN reaches very good results when two specific dynamic features are used. The particular validation procedure used in this experimentation allows us to better understand the discriminative power of the various approaches and move toward a better classifier that might be used in the clinical environment. Breast cancer, in fact, is the second form of diagnosed cancer among women living in the western countries and any improvement in its diagnosis would lead to a lower mortality rate.

Keywords: medical image analysis, breast cancer, contrast-enhanced magnetic resonance imaging

Pages: 17 - 20 | DOI: 10.15224/978-1-63248-021-7-69

5. PASS-COOB A NEW GRAPHICAL PASSWORD BASED ON COLORS AND OBJECTS

Authors: ARASH HABIBI LASHKARI , AHMAD Z. EL-RUFAI

Abstract: Text-based password is commonly used in user authentication. Due to its complexity, users are having trouble remembering their password combination. An alternative was introduced by Blonder in 1996, called graphical password which was easier to remember because of its graphical content. Therefore usability and memorability are improved. In this paper, we propose and develop a new graphical password called Pass-Coob (Pass color and object), which uses colors and object to authenticate user for improving the security and usability aspects.

Keywords: Graphical password, colors, objects, recognition- based schemes, pure recall-based schemes, cued recall-based schemes

Pages: 26 - 30 | DOI: 10.15224/978-1-63248-021-7-71

6. ON MODELING AND TESTING COMPONENTS OF THE EUROPEAN TRAIN CONTROL SYSTEM

Authors: ANA CAVALLI , CESAR ANDRES , JOAO SANTOS

Abstract: This paper studies the abilities of the formal model of a Timed Extended Finite State Machine (TEFSM) to represent the safety properties of the European Train Control System (ETCS). The model is based on Finite State Machines augmented with continuous variables and time information, which allows representing the basic functioning of the units in this real-time system. In order to represent temporal requirements, timeouts are used for modeling some aspects of the (internal) critical behavior of the train control system. The model abilities to represent safety properties are evaluated using different testing scenarios for model implementations in IF, XML and JAVA languages. Tests are automatically generated using the tool TestGen-IF where corresponding safety properties are specified as test objectives. Based on the obtained experimental results the advantages and disadvantages of a developed model are briefly discussed.

Keywords: European Train Control System, formal model, Timed Extended FSM, active testing, safety properties.

Pages: 31 - 35 | DOI: 10.15224/978-1-63248-021-7-72

7. PIA – PERSONAL IADL ASSISTANT RESULTS OF THE FOCUS GROUPS

Authors: ANNA ZIRK , EVA SCHULZE

Abstract: PIA aims to improve the everyday competencies of older people (with and without cognitive impairment). It provides video instructions to help with operating everyday tasks or handling technologies in the household. The instructions are made by relatives or carers and are provided to the users on a tablet. Focus groups with potential users and carers showed that most of them like the idea of providing video instructions. Furthermore important hardware aspects were evaluated, obstacles were mentioned and suggestions for improvements were made

Keywords: older people, memory diffciculties, video instructions

Pages: 36 - 39 | DOI: 10.15224/978-1-63248-021-7-73

8. ONTOLOGY GENERATION FROM XML DOCUMENTS

Authors: LAMARA AYMEN , MOSTFAI SIHEM

Abstract: XML has become the de facto standard for data exchange in the Internet. It allows different parties to exchange data by providing common understanding of the basic concepts in a domain. XML covers the syntactic level, but lacks support for expressing semantics. Ontologies provide a promising technology for domain knowledge representation and sharing using classes, properties and instances; they support efficient reasoning and convey domain semantics by their expressive power. In this paper we survey the most relevant strategies for ontology generation from XML documents

Keywords: omponent, XML, Ontology generation, Semantic.

Pages: 40 - 45 | DOI: 10.15224/978-1-63248-021-7-74

9. ON HANDWRITING PREPROCESSING FOR 2D OBJECT RECOGNITION SYSTEMS

Authors: DAWID POLAP , MARCIN WOZNIAK , ZBIGNIEW MARSZALEK

Abstract: This paper illustrates object preprocessing using some interpolation methods. Interpolation is used to obtain the best angle of inclination of input curve based on human signature. This feature is one of crucial aspects for efficiency in object recognition systems that are basing on handwriting signature. In the article is presented analysis of selected methods that may help in preprocessing of handwriting for artificial intelligence systems.

Keywords: handwriting recognition, 2D object interpolation.

Pages: 46 - 53 | DOI: 10.15224/978-1-63248-021-7-75

10. DEVELOPMENT OF VIRTUAL INSTRUMENT FOR PIEZOELECTRICAL SENSOR SIGNAL TRANSFORMATION USING THE TRANSFER FUNCTION

Authors: A. ANDZIULIS , J. VENSKUS , M. KURMIS , Z. LUKOSIUS

Abstract: At the moment determining of the pulse wave main parameters using a piezo sensor is performing using the RC adjustments in the circuit. With the increasing adaptation of the virtual instrumentation it is possible to reduce the RC complexity. The purpose of this work was to determine the piezo-electric actuator transfer function according to the signal of the air pressure sensor using virtual instruments. In this works it was created a virtual piezo-electric sensor transfer function measurement model which proved that in order to change the sensor frequency amplitude we do not need to use electronics components.

Keywords: Piezo sensors, transfer function, virtual instrument

Pages: 54 - 57 | DOI: 10.15224/978-1-63248-021-7-76

11. DEVELOPMENT OF VIRTUAL INSTRUMENT FOR PIEZOELECTRICAL SENSOR SIGNAL TRANSFORMATION USING THE TRANSFER FUNCTION

Authors: A. ANDZIULIS , J. VENSKUS , M. KURMIS , Z. LUKOSIUS

Abstract: At the moment determining of the pulse wave main parameters using a piezo sensor is performing using the RC adjustments in the circuit. With the increasing adaptation of the virtual instrumentation it is possible to reduce the RC complexity. The purpose of this work was to determine the piezo-electric actuator transfer function according to the signal of the air pressure sensor using virtual instruments. In this works it was created a virtual piezo-electric sensor transfer function measurement model which proved that in order to change the sensor frequency amplitude we do not need to use electronics components.

Keywords: Piezo sensors, transfer function, virtual instrument

Pages: 54 - 57 | DOI: 10.15224/978-1-63248-021-7-76

12. A CHIP ID GENERATION CIRCUIT – LATCH BASED

Authors: ALEXANDRA STANCIU , FLORIN MOLDOVEANU , MARIUS TUDORANCEA

Abstract: In this paper, we introduce a chip ID generation circuit, which uses process variations, that appear during the physical execution of an FPGA. In [1] Gassend et al. introduced for the first time the ROs digital circuit with the aim of emphasizing the uncontrollable effect of silicon process variations at the delay of the digital component interconnection. After that, different constructions based on process variations start to appear. The digital circuit analyzed is a modification of the latch based circuit with the scope to minimizing the hardware resource usage and to fit an FPGA implementation. We also introduce a new statistic assessment method based on Kolmogorov-Smirnov test for the inter-distance and the intra-distance analysis. The chip ID generation circuit could produce FPGA secret keys that deal with the security issues such as: cloning, overproducing or stealing the implemented applications on FPGA.

Keywords: process variation, latch, FPGA, chip ID

Pages: 58 - 64 | DOI: 10.15224/978-1-63248-021-7-77

13. ON PREPROCESSING LARGE DATA SETS BY THE USE OF TRIPLE MERGE SORT ALGORITHM

Authors: DAWID POLAP , MARCIN WOZNIAK , ZBIGNIEW MARSZALEK

Abstract: This paper illustrates preprocessing large data sets by the use of triple merge sort algorithm. Examined algorithm is oriented on large data sets and as research results have shown the version is about 15% faster than classic one. This feature may be crucial for efficiency in NoSQL database systems or other intelligent application operating on large data sets. In the paper is presented and discussed examined version. There are presented theoretical discussion and practical verification.

Keywords: computer algorithm, data mining, sorting algorithm, analysis of computer algorithms

Pages: 65 - 72 | DOI: 10.15224/978-1-63248-021-7-78

14. INTELLIGENT PUBLIC ADDRESS BY MEANS OF ADAPTATION TO SPEECH TRANSMISSION INDEX OR AMBIENT NOISE PROFILE RATIONALE AND SIGNAL PROCESSING ALGORITHMS

Authors: FRANCIS F. LI

Abstract: The seemingly mature technologies for public address systems are not often as straightforward as they are thought to be. The usability of such systems depends, to some extent, on their capability to adapt to ambient noise so that the required intelligibility can be achieved, while unnecessary loudness is avoided for the tranquility of environmental sound. The time varying and unpredictable nature of noise in occupied spaces necessities the deployment of intelligent adaptation. A new scheme to achieve a specified speech transmission index, an objective acoustic parameter for speech intelligibility, is developed in this paper based on a set of blind estimation algorithms using machine learning. The paper details the rationale of the method and associated algorithms. In addition, for systems designed to achieve a specific signal to noise ratio, a simplified version is derived.

Keywords: public address system, speech intelligibility, speech transmission index, signal to noise ratio, blind estimation, machine learning, envelope spectrum

Pages: 73 - 77 | DOI: 10.15224/978-1-63248-021-7-79

15. RFID SOCIAL NETWORKING MEASURING CONSUMER SATISFACTION INDEX BY MEANS OF NFC

Authors: ABDERRAZAK HACHANI , HICHEM BARGAOUI , LAMIS AMAMOU

Abstract: Radio frequency identification still is a source of inspiration and innovation. In this context it is legitimate to think about sustainable development repercussion and how RFID may improve human being life. This paper presents pilot solution for consumer called social RFID platform providing services such as sharing information about consumed products or service and the associated satisfaction degree. Also, the platform offers a publicity service for any company through loyalty and marketing models. Finally the platform provides statistics to institution such us consumer defense associations and statistics organism.

Keywords: RFID; NFC;Social networkinng

Pages: 78 - 80 | DOI: 10.15224/978-1-63248-021-7-80

16. HARMONIC DISTORTION CONTROL TECHNIQUE FOR UNINTERRUPTIBLE POWER SUPPLIES WITH DC VOLTAGE BOOST TECHNIQUE UNINTERRUPTIBLE POWER SUPPLY

Authors: ARVIND S.M. , PEEYUSH AGARWAL , SANGYA THAKUR

Abstract: This paper presents a new control strategy for UPS inverter, which is based on the addition of the DC voltage boost compensation for keeping the fundamental output voltage at the preset value and suppressing the generation of low-order harmonics caused by nonlinear load. Thus, the proposed strategy is viewed as a refinement term added to the outer voltage control loop.The new strategy is quite simple and requires only the measurement of the output voltage to compute the THD.

Keywords: Uninterruptible Power Supply, Harmonic Distortion, Simul

Pages: 81 - 85 | DOI: 10.15224/978-1-63248-021-7-81

17. A SIMPLE WAY TO MODEL URBAN ATTENUATION USING FRIIS EQUATION

Authors: FABIOLA MARTINEZ-ZUNIGA , JORGE SOSA-PEDROZA

Abstract: Friis equation describes relationship between power leaving transmitting antenna and power delivered by receiving antenna; we present in this paper a modification of the Friis Free Space Attenuation equation to model propagation in urban scenarios. We adjust it changing the exponent value of 2 and adding an arbitrary attenuation factor to fit regression curves obtained from measurements made in Mexico City in the frequency of 3.3 GHz, after find scenarios with similar characteristics in different places of Mexico City.

Keywords: Modification of Free Space Attenuation, Measurement of urban attenuation, WiMAX.

Pages: 86 - 91 | DOI: 10.15224/978-1-63248-021-7-82

18. PROPOSAL FOR COMPUTING AREAS OF POLYGONS IN GEOGRAPHIC INFORMATION SYSTEM. COMPUTATIONAL ANALYSIS

Authors: LIDISY HERNÁNDEZ MONTERO, , LIDISY HERNÁNDEZ MONTERO , ROMANUEL RAMON ANTUNEZ

Abstract: Most of spatial analyzes in geographic information systems (GIS) use simple geometric calculations, from which more complex algorithms are built. Traditionally these calculations have been conducted in Euclidean metric, but the geographical information has become more available and planimetric accuracy what has caused these calculations in GIS are inaccurate. These errors could become significantly important in some individuals cases, such as large geographical areas or equidistant projections. Therefore in this paper we proposed an algorithm for calculating the area of polygons supported in a generic method that takes into account the coordinate system and / or projection with which it works, allowing a correct and efficient functioning in GIS applications.

Keywords: algorithm, computational geometry, geometric analysis, geographic information

Pages: 92 - 96 | DOI: 10.15224/978-1-63248-021-7-83

19. UCGVISION: UNDERGROUND COAL GASIFICATION PROCESS DATA VISUALIZATION ASPECTS

Authors: MARCIN MICHALAK , KAROLINA NURZYNSKA , SEBASTIAN IWASZENKO

Abstract: This work presents the UCGVision system designed for underground coal gasification process visualization, prediction, and monitoring. The possibility to visualize the ongoing reactions during the process is crucial for better insight into the process itself. Moreover, the system task is to give researchers and in the future process supervisor a tool to observe the current state of the process by a wide range of provided functionalities. This paper addresses problems regarding data presentation with utilization of computer graphics. Several issues concerning clear data presentation is discussed. The system performance is evaluated mostly on the modelled data, but it also enables the cooperation with a real time process observations.

Keywords: computer graphics, visualization, point cloud, process data, underground coal gasification

Pages: 97 - 101 | DOI: 10.15224/978-1-63248-021-7-84

20. THE R2FM METHOD FOR REQUIREMENT ANALYSIS IN SOFTWARE PRODUCT LINE FOR E-GOVERNMENT APPLICATIONS

Authors: AHMAD NURUL FAJAR , EKO K.BUDIARDJO , ZAINAL A. HASIBUAN

Abstract: Requirement analysis phase has significant contribution in successfully software system in software development. Software development in e-government application is intended to support government business processes in order to achieve good governance. These business processes may derive features commonality and variability. Failure to recognizes these features in e-government software development may cause wasted resources and shortened software life time. This study explores 8 implemented Indonesia e-government applications in order to extract commonality and variability features. These applications cover area of budgeting, administration, accounting, and local tax. Government business processes determine by government regulations. The R2FM method is proposed to analyze the alignment of regulation, business process model (BPM), and feature model (FM). The study results show the applications that developed from successfully requirement analysis of government regulations and use them fo

Keywords: Requirement analysis, software product line, business process model (BPM), feature model (FM), e-government applications, R2FM method.

Pages: 102 - 106 | DOI: 10.15224/978-1-63248-021-7-85

21. WTMS : A LOCATION INTELLIGENCE´S TOOL

Authors: ALEXANDER RODRIGUEZ TORRES

Abstract: This work describes the development of a service that allows the creation of thematic maps from statistical information provided by the users and from the geographical base chosen by them. The services become a tool of Location Intelligence that allow to represent the statistical information available to people in a given geospatial area, that are open source and also available on line or being disconnected from the network. A study of the different technologies of cartographic symbolization and of some of the most important IT tools that are in use at present for the generation of thematic maps was carried out. As a result we obtained a tool that will support the decision making process and will give added value to information systems to which it will incorporate. decision making process, geographical base, service, statistical information, technologies of cartographic symbolization, thematic maps.

Keywords: decision making process, geographical base, service, statistical information, technologies of cartographic symbolization, thematic maps.

Pages: 107 - 110 | DOI: 10.15224/978-1-63248-021-7-86

22. QUESTION ANSWERING SYSTEMS IN E-GOVERNMENT: A PROPOSAL FOR THE COLOMBIAN CONTEXT

Authors: ADAN BELTRAN GOMEZ , LEONARDO MELO GONZALEZ

Abstract: Given the staggering quantity of textual information on the Internet, several systems of information search and retrieval have been proposed in recent years, such as Question-Answering Systems (QAS), whereby users employ natural language in their search, retrieving a specific answer to their question instead of a list of relevant documents. Government websites publish a wide array of textual information such as laws, procedures, and policies. Users generally do not perform searches in government websites due to the complexity of search mechanisms, which are sometimes too technical for lay people. The article proposes an architecture for the integration of QAS with government web portals in order to improve the search process on the part of citizens, thereby improving the interaction between citizens and government. It also discusses the research findings related to the design and implementation of a QAS in the Colombian context proposed for a local government

Keywords: —e-government, Question Answering, citizens interaction

Pages: 111 - 115 | DOI: 10.15224/978-1-63248-021-7-87

23. A LOW-RATE WIRELESS SPREAD-SPECTRUM COMMUNICATION TECHNIQUE USING LINEAR STEP FM SIGNAL

Authors: YIH-MIN CHEN

Abstract: A low data-rate communication technique using linear step frequency modulated (LSFM) signal is presented. When the carrier frequency offset (CFO) between the transmitter and the receiver is significant comparingto the symbol rate, the techniques using normal signaling waveforms with matched filtering become infeasible. In this scenario, wideband chirp (linear FM) signal is feasible because of its favorable characteristicsin ambiguity function. However the fully digital implementation of the matched filter for the chirp signal is not economic. In this paper, we propose the use of a linear step FM signal, which has similar characteristics as a chirp signal, and an efficient hardware structure in the digital implementation of the corresponding matched filter.

Keywords: Chirp, Linear Step FM, Low-Rate

Pages: 116 - 119 | DOI: 10.15224/978-1-63248-021-7-88

24. A DEVELOPED SHADOW AGENT BASED ON AD-HOC ROUTING USED TO OPTIMIZE THE PERFORMANCE OF DSR IN DIFFERENT NETWORK ENVIRONMENTS

Authors: MOHAMED A. ABDELHADI

Abstract: In this research paper, Dynamic Source Routing were under certain studies from different aspects including a comparison between DSR performance according to different environments and with other protocols. DSR is a well-known ad hoc protocol, which is restricted to small networks. A new developed Agent used to enhance the performance of the DSR. A developed shadow Agent has made a new step forward to solve the problem of routing maintenance. This developed Agent has the ability to control the routing in the network which normally holding a routing table to increase the utilization of the routing protocol. The developed shadow Agent has played a major role to handle the expected dis-connectivity that may happen when the Agent changes its location.

Keywords: Ad-hoc routing algorithms, performance analysis, optimization.

Pages: 120 - 125 | DOI: 10.15224/978-1-63248-021-7-89

25. SEMANTICALLY ENHANCED CYBER SECURITY OVER CLOUDS: METHODOLOGICAL APPROACH

Authors: IVANA OGNJANOVIC , RAMO SENDELJ

Abstract: Cloud computing is achieving increased popularity among both, researchers and practitioners; while security is one of the major issues which reduces its growth and complications with data privacy and data protection continue to plague the market. Stimulated by the promising solutions of Semantic Web (also known as Web 3.0) for addressing the problems of management and monitoring of services shared by different parties (with different semantics and interests), the service-oriented transformations over cloud-computing processes are today a rapidly growing demand. In this paper we go one step further and propose methodology for increasing cyber security over cloud services by using Semantic Web technology, hierarchical ontology and intelligent reasoning techniques.

Keywords: cyber security, cloud computing, semantic technologies, intelligent reasoning

Pages: 126 - 131 | DOI: 10.15224/978-1-63248-021-7-90

26. SEMANTICALLY ENHANCED CYBER SECURITY OVER CLOUDS: METHODOLOGICAL APPROACH

Authors: IVANA OGNJANOVIC , RAMO SENDELJ

Abstract: Cloud computing is achieving increased popularity among both, researchers and practitioners; while security is one of the major issues which reduces its growth and complications with data privacy and data protection continue to plague the market. Stimulated by the promising solutions of Semantic Web (also known as Web 3.0) for addressing the problems of management and monitoring of services shared by different parties (with different semantics and interests), the service-oriented transformations over cloud-computing processes are today a rapidly growing demand. In this paper we go one step further and propose methodology for increasing cyber security over cloud services by using Semantic Web technology, hierarchical ontology and intelligent reasoning techniques.

Keywords: cyber security, cloud computing, semantic technologies, intelligent reasoning

Pages: 126 - 131 | DOI: 10.15224/978-1-63248-021-7-90

27. VERIFYING AND TESTING ETCS TRAIN IMPLEMENTATIONS BASED ON IF SPECIFICATIONS

Authors: NATALIA KUSHIK , NINA YEVTUSHENKO , ANA CAVALLI , MOUNIR LALLALI

Abstract: This paper presents test generation scenarios for a train implementation based on the requirements for European Train Control System (ETCS). The formal model used for the test derivation is the model of a Timed Extended Finite State Machine (TEFSM) given in the IF language. This language allows to capture some important properties such as safety properties that should be checked for train implementations represented as corresponding test objectives. The tool TestGen-IF is then used for automatic generation of test cases.

Keywords: Timed Extended FSM, ETCS, IF language, TestGen-IF tool. I.

Pages: 132 - 136 | DOI: 10.15224/978-1-63248-021-7-91

28. THE PROSESS OF WITHDRAWAL OF KNOWLEDGE MATRIX ON PRECEDENT

Authors: ILIPOV MARLEN , ISKAKOVA AYMAN

Abstract: In this work the process of operational withdrawal of knowledge matrix on precedent described situational vectors is precented. The new method of withdrawal president and its application in managment RFID system are precented.

Keywords: knowledge matrix, precedent, minimax metod.

Pages: 137 - 149 | DOI: 10.15224/978-1-63248-021-7-92

29. IMU AND COMPASS SENSORS FOR WIRELESS CONTROL OF 6 DOF PARALLEL MANUPULATOR

Authors: KHO KEE CHEN , WAN RAHIMAN

Abstract: Almost six decades ago, the first parallel manipulator designed by Gough V. E. with his team for tire test system, and then Stewart D. designed with different configuration to build a platform with 6 degrees-of-freedom (DOF) as flight simulator. Until today, many researchers are inspired by Gough-Stewart platform with exploit the parallel manipulator potential over serial manipulator. Thus, in this paper, a new model of 6 DOF parallel link manipulator with rotary actuator driven by DC servo motors is fabricate and control using wireless controller integrated with Inertial Measurement Unit (IMU) sensor and campus sensor. The control methods are to orientate the upper platform of parallel manipulator follow the orientation of remote controller. The IMU sensor unit consists of ITG-3200 gyroscope and ADXL345 accelerometer which combine together with HMC5883L magnetometer sensor (compass) to control three axis rotation orientations. In addition, the analog joystick is use to control linear

Keywords: 6 DOF, Kalman Filter, inverse kinematic

Pages: 140 - 146 | DOI: 10.15224/978-1-63248-021-7-93

Popular Proceedings

ICETM 2023

9th International E-Conference on Engineering, Technology and Management

ESSHBS 2017

7th International Conference On Advances In Economics, Social Science and Human Behaviour Study

ASET 2017

7th International Conference on Advances in Applied Science and Environmental Technology

ACSM 2017

7th International Conference on Advances in Civil, Structural and Mechanical Engineering

CSM 2017

5th International Conference on Advances in Civil, Structural and Mechanical Engineering

SEM 2017

5th International Conference on Advances in Social, Economics and Management

ICETM 2022

8th International E- conference on Engineering, Technology and Management

ACSEE 2019

8th International Conference on Advances in Civil, Structural and Environmental Engineering