Pub Date : 2017-10-01DOI: 10.1109/ICAT.2017.8171612
Dila Turkmen, Merve Acer
There are BBots (BristleBots) consist of a single and double vibration motor design. A single-actuated robot agent is more preferable due to its lower cost and energy consumption. Some studies reporting and modeling the linear motion single-actuated BBots are present in the literature. On the other hand, few of them included an explanation on its rotational motion. In this study, the planar motion of a novel single-actuated BBot design, composed of three bristle legs is analyzed. The BBot performs CW (clockwise) motion under a transition frequency (ftr), forward locomotion at ftr and CCW (counterclockwise) motion over it. The mechanism behind this novel observation is inspected experimentally and results are reported. Proposed design performed a path following task with an open loop control.
{"title":"Development of a planar BBot using a single vibration motor","authors":"Dila Turkmen, Merve Acer","doi":"10.1109/ICAT.2017.8171612","DOIUrl":"https://doi.org/10.1109/ICAT.2017.8171612","url":null,"abstract":"There are BBots (BristleBots) consist of a single and double vibration motor design. A single-actuated robot agent is more preferable due to its lower cost and energy consumption. Some studies reporting and modeling the linear motion single-actuated BBots are present in the literature. On the other hand, few of them included an explanation on its rotational motion. In this study, the planar motion of a novel single-actuated BBot design, composed of three bristle legs is analyzed. The BBot performs CW (clockwise) motion under a transition frequency (ftr), forward locomotion at ftr and CCW (counterclockwise) motion over it. The mechanism behind this novel observation is inspected experimentally and results are reported. Proposed design performed a path following task with an open loop control.","PeriodicalId":112404,"journal":{"name":"2017 XXVI International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123598451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICAT.2017.8171622
B. N. Soufiani, M. U. Salamci
This paper studies chaotic behavior in cancer dynamics when a treatment procedure is introduced. Recently introduced virotherapy is considered for the cancer treatment. Chaotic behaviors are investigated by using the Lyapunov Exponent for a set of parameters. The chaotic behavior is studied by using the mathematical model of the cancer dynamics involving the virotherapy. Through simulations and the Lyapunov Exponent, it is proven that recently introduced virotherapy exhibits chaotic behavior. The results indicate that virotherapy may result in re-growth of the tumor due to chaotic nature of the treatment.
{"title":"Chaotic behavior in virotherapy for cancer treatment","authors":"B. N. Soufiani, M. U. Salamci","doi":"10.1109/ICAT.2017.8171622","DOIUrl":"https://doi.org/10.1109/ICAT.2017.8171622","url":null,"abstract":"This paper studies chaotic behavior in cancer dynamics when a treatment procedure is introduced. Recently introduced virotherapy is considered for the cancer treatment. Chaotic behaviors are investigated by using the Lyapunov Exponent for a set of parameters. The chaotic behavior is studied by using the mathematical model of the cancer dynamics involving the virotherapy. Through simulations and the Lyapunov Exponent, it is proven that recently introduced virotherapy exhibits chaotic behavior. The results indicate that virotherapy may result in re-growth of the tumor due to chaotic nature of the treatment.","PeriodicalId":112404,"journal":{"name":"2017 XXVI International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116671093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICAT.2017.8171641
Damir Bilić, T. Uzunović, Edin Golubovic, Baris Can Ustundag
This paper describes an Internet Of Things-based wearable system for physical rehabilitation monitoring and characterization. The system is recording movement data with 3-axial accelerometer and gyroscope sensors. Data recorded by the sensors are used for characterization of movement, thus allowing for monitoring and estimation of the patients' state at all times. Main three parts of the system are: data acquisition unit, data processing unit, and cloud-based service for remote access to data. Hardware implementation is described and shown for each of the three parts. The system is demonstrated for monitoring of elbow rehabilitation. Results show that the device can be used for highly precise and accurate monitoring of elbow flexion and extension characteristics, thus allowing for remote rehabilitation tracking through the use of the cloud-based service.
{"title":"Internet of things-based system for physical rehabilitation monitoring","authors":"Damir Bilić, T. Uzunović, Edin Golubovic, Baris Can Ustundag","doi":"10.1109/ICAT.2017.8171641","DOIUrl":"https://doi.org/10.1109/ICAT.2017.8171641","url":null,"abstract":"This paper describes an Internet Of Things-based wearable system for physical rehabilitation monitoring and characterization. The system is recording movement data with 3-axial accelerometer and gyroscope sensors. Data recorded by the sensors are used for characterization of movement, thus allowing for monitoring and estimation of the patients' state at all times. Main three parts of the system are: data acquisition unit, data processing unit, and cloud-based service for remote access to data. Hardware implementation is described and shown for each of the three parts. The system is demonstrated for monitoring of elbow rehabilitation. Results show that the device can be used for highly precise and accurate monitoring of elbow flexion and extension characteristics, thus allowing for remote rehabilitation tracking through the use of the cloud-based service.","PeriodicalId":112404,"journal":{"name":"2017 XXVI International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129369191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICAT.2017.8171628
S. Ribic, Razija Turcinhodzic, Arnela Tumbul
Creating school timetables is problematic in many schools due to the complexity of models that need to be solved. If schools do not have enough resources (rooms, teachers), they are forced to work double or several shifts. This paper deals with shift types and ways to write them in formats used by computers to generate timetables automatically. Even though many schools work in shifts, the constraint to include shifts in creating timetables is rarely discussed in literature. This paper discusses a way to formulate school shifts using the XHSST format, a way to modify a domain specific language to support shifts, and an example of a way to modify the mathematical model of integer linear programming to support working in several shifts.
{"title":"Modelling double-shift school timetables","authors":"S. Ribic, Razija Turcinhodzic, Arnela Tumbul","doi":"10.1109/ICAT.2017.8171628","DOIUrl":"https://doi.org/10.1109/ICAT.2017.8171628","url":null,"abstract":"Creating school timetables is problematic in many schools due to the complexity of models that need to be solved. If schools do not have enough resources (rooms, teachers), they are forced to work double or several shifts. This paper deals with shift types and ways to write them in formats used by computers to generate timetables automatically. Even though many schools work in shifts, the constraint to include shifts in creating timetables is rarely discussed in literature. This paper discusses a way to formulate school shifts using the XHSST format, a way to modify a domain specific language to support shifts, and an example of a way to modify the mathematical model of integer linear programming to support working in several shifts.","PeriodicalId":112404,"journal":{"name":"2017 XXVI International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129611230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICAT.2017.8171638
Nina Slamnik, Jasmin Musovic, Armin Okie, Faris Tankovic, Irfan Krijestorac
The heterogeneous network concept in many respects meets customer requirements and maintains high energy efficiency. In this paper, we mainly investigate the impact of deployment efficiency of heterogeneous small cells BSs compared to the advantages of increasing the performance of wireless networks as a whole. We used well-known analytical models for calculating the values that can be obtained for certain network scenarios and compared them with the results of the simulation of the ns-3 simulator. This analysis shows that the introduction of small cells in traditional networks with an even distribution of base stations has a major impact on energy efficiency, and spectrum efficiency must be addressed by other mechanisms and radio resource management schemes. However, a major impact is shown in terms of significant cost reductions and CAPEX and OPEX.
{"title":"An approach to analysis of heterogeneous networks' efficiency","authors":"Nina Slamnik, Jasmin Musovic, Armin Okie, Faris Tankovic, Irfan Krijestorac","doi":"10.1109/ICAT.2017.8171638","DOIUrl":"https://doi.org/10.1109/ICAT.2017.8171638","url":null,"abstract":"The heterogeneous network concept in many respects meets customer requirements and maintains high energy efficiency. In this paper, we mainly investigate the impact of deployment efficiency of heterogeneous small cells BSs compared to the advantages of increasing the performance of wireless networks as a whole. We used well-known analytical models for calculating the values that can be obtained for certain network scenarios and compared them with the results of the simulation of the ns-3 simulator. This analysis shows that the introduction of small cells in traditional networks with an even distribution of base stations has a major impact on energy efficiency, and spectrum efficiency must be addressed by other mechanisms and radio resource management schemes. However, a major impact is shown in terms of significant cost reductions and CAPEX and OPEX.","PeriodicalId":112404,"journal":{"name":"2017 XXVI International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130970634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICAT.2017.8171620
B. Perunicic-Drazenovic, S. Huseinbegović, C. Milosavljevic, B. Veselić
This paper introduces a control method for finite time stabilization of continuous-time controllable linear time invariant multiple-input multiple-output systems. The proposed approach uses higher order sliding mode control to reduce the system order to zero and thus providing the system states to reach the origin in finite time. Such control is called finite time order zeroing control, because it annihilates all sliding variables and their associated derivatives in finite time, while system states converge to equilibrium point. Sliding manifold reaching control uses quasi-continuous control functions. Properties of the proposed control system are demonstrated on a simulation example of a real system model.
{"title":"Higher order sliding mode based finite-time order zeroing control for MIMO LTI systems","authors":"B. Perunicic-Drazenovic, S. Huseinbegović, C. Milosavljevic, B. Veselić","doi":"10.1109/ICAT.2017.8171620","DOIUrl":"https://doi.org/10.1109/ICAT.2017.8171620","url":null,"abstract":"This paper introduces a control method for finite time stabilization of continuous-time controllable linear time invariant multiple-input multiple-output systems. The proposed approach uses higher order sliding mode control to reduce the system order to zero and thus providing the system states to reach the origin in finite time. Such control is called finite time order zeroing control, because it annihilates all sliding variables and their associated derivatives in finite time, while system states converge to equilibrium point. Sliding manifold reaching control uses quasi-continuous control functions. Properties of the proposed control system are demonstrated on a simulation example of a real system model.","PeriodicalId":112404,"journal":{"name":"2017 XXVI International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134109853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICAT.2017.8171642
I. Muhic, M. Hodzic
In this paper several methods of verification and validation process (V&V) of simulation models are discussed. In general, different set of techniques used for verification and validation vary from statistic to dynamic one. Theoretical methods presented in this paper are applicable in a real communication networks. V&V of simulation models have been mostly studied in the context of defense applications. In this paper, Kolmogorov-Smirnov test and Lilliefors test as non-parametric statistical tests are applied to the novel application layer communication protocol developed for wireless sensor networks for intruder tracking application. Protocol is tested on the newly established testbed at the Future Internet — Internet of Things Laboratory (FiT IoT-Lab) in Grenoble, France. The study demonstrated practical application of certain V&V methods.
{"title":"Verification and validation of wireless sensor network energy consumption in internet of things","authors":"I. Muhic, M. Hodzic","doi":"10.1109/ICAT.2017.8171642","DOIUrl":"https://doi.org/10.1109/ICAT.2017.8171642","url":null,"abstract":"In this paper several methods of verification and validation process (V&V) of simulation models are discussed. In general, different set of techniques used for verification and validation vary from statistic to dynamic one. Theoretical methods presented in this paper are applicable in a real communication networks. V&V of simulation models have been mostly studied in the context of defense applications. In this paper, Kolmogorov-Smirnov test and Lilliefors test as non-parametric statistical tests are applied to the novel application layer communication protocol developed for wireless sensor networks for intruder tracking application. Protocol is tested on the newly established testbed at the Future Internet — Internet of Things Laboratory (FiT IoT-Lab) in Grenoble, France. The study demonstrated practical application of certain V&V methods.","PeriodicalId":112404,"journal":{"name":"2017 XXVI International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128254811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICAT.2017.8171634
Kemal Hajdarevic, Adna Kozic, I. Avdagic, Zerina Mašetić, Nejdet Dogru
The threat of resource starvation attacks is one of the major problems for the e-Business. More recently these attacks became threats for Cloud environments and Denial of Service is a sub-category of these kinds of attack. The network management is process of taking proactive actions before the attack has taken effect which is responsibility of skilled employees — network managers. In recent time vulnerability testing skills are needed to harden system security. These skills have to be developed thus for we created scenario in a controlled environment, to provide opportunity for student trainees to train their skills, so that defense could be prepared. This paper describes a simulation-based training scenario using simulator and by using hacking tools in which student trainees experience the symptoms and effects of a DDoS attack, practice their responses in a simulated environment, with goal to prepare them for the real attacks.
{"title":"Training network managers in ethical hacking techniques to manage resource starvation attacks using GNS3 simulator","authors":"Kemal Hajdarevic, Adna Kozic, I. Avdagic, Zerina Mašetić, Nejdet Dogru","doi":"10.1109/ICAT.2017.8171634","DOIUrl":"https://doi.org/10.1109/ICAT.2017.8171634","url":null,"abstract":"The threat of resource starvation attacks is one of the major problems for the e-Business. More recently these attacks became threats for Cloud environments and Denial of Service is a sub-category of these kinds of attack. The network management is process of taking proactive actions before the attack has taken effect which is responsibility of skilled employees — network managers. In recent time vulnerability testing skills are needed to harden system security. These skills have to be developed thus for we created scenario in a controlled environment, to provide opportunity for student trainees to train their skills, so that defense could be prepared. This paper describes a simulation-based training scenario using simulator and by using hacking tools in which student trainees experience the symptoms and effects of a DDoS attack, practice their responses in a simulated environment, with goal to prepare them for the real attacks.","PeriodicalId":112404,"journal":{"name":"2017 XXVI International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122636890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICAT.2017.8171624
Aida Čaušević
Systems of systems (SoS) have been introduced in early 1990s in air traffic control domain, defense and information technologies. Systems like this contain a set of components, being systems itself, with constituent components retaining operational independence. The definition and configuration of SoS have evolutionary nature and emergent behavior is one of the many important characteristics to be mentioned. Over the past ten years fast technological and industrial advances in the domain of autonomous and cooperating systems started to occur, which created new opportunities to use the benefits of SoS. In the near future, fully autonomous and cooperating systems are expected to become our reality and increase the production efficiency, while decreasing the human effort in harmful environments. There exist the need to make sure that critical properties of SoS, such as safety and security are guaranteed as a joint effort, since it is not sufficient anymore to address these properties independently in the development process. In this paper an overview of the most common approaches and methods used to provide reasoning about joint safety and security is provided, as well as a check of the latest updates in standards related to these properties.
{"title":"A risk and threat assessment approaches overview in autonomous systems of systems","authors":"Aida Čaušević","doi":"10.1109/ICAT.2017.8171624","DOIUrl":"https://doi.org/10.1109/ICAT.2017.8171624","url":null,"abstract":"Systems of systems (SoS) have been introduced in early 1990s in air traffic control domain, defense and information technologies. Systems like this contain a set of components, being systems itself, with constituent components retaining operational independence. The definition and configuration of SoS have evolutionary nature and emergent behavior is one of the many important characteristics to be mentioned. Over the past ten years fast technological and industrial advances in the domain of autonomous and cooperating systems started to occur, which created new opportunities to use the benefits of SoS. In the near future, fully autonomous and cooperating systems are expected to become our reality and increase the production efficiency, while decreasing the human effort in harmful environments. There exist the need to make sure that critical properties of SoS, such as safety and security are guaranteed as a joint effort, since it is not sufficient anymore to address these properties independently in the development process. In this paper an overview of the most common approaches and methods used to provide reasoning about joint safety and security is provided, as well as a check of the latest updates in standards related to these properties.","PeriodicalId":112404,"journal":{"name":"2017 XXVI International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122671480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/ICAT.2017.8171621
F. Koumboulis, D. Fragkoulis
In the present paper a bank of local linear observers is designed for an alcoholic fermentation process. The design is based on the respective linear approximants of the mathematical description of the nonlinear process at particular operating points. The target and tolerance operating areas of the process are determined. A residual of the performance of the observers is introduced. A switching mechanism is developed on the basis of the minimal residual. The performance of the proposed observer design scheme is illustrated using simulation results.
{"title":"Switching design for the observation of the biomass in alcoholic fermentation processes","authors":"F. Koumboulis, D. Fragkoulis","doi":"10.1109/ICAT.2017.8171621","DOIUrl":"https://doi.org/10.1109/ICAT.2017.8171621","url":null,"abstract":"In the present paper a bank of local linear observers is designed for an alcoholic fermentation process. The design is based on the respective linear approximants of the mathematical description of the nonlinear process at particular operating points. The target and tolerance operating areas of the process are determined. A residual of the performance of the observers is introduced. A switching mechanism is developed on the basis of the minimal residual. The performance of the proposed observer design scheme is illustrated using simulation results.","PeriodicalId":112404,"journal":{"name":"2017 XXVI International Conference on Information, Communication and Automation Technologies (ICAT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125986200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}