This article details the design of a traffic system model for vehicles, which examines the traffic traveling through a series of traffic lights on a main road in Bogota. The Adaptive Network Based Fuzzy Inference System is used to synchronize the time of duration and phase angle of the traffic lights, and also tries to maintain the maximum possible velocity of the vehicles traveling on the road. The model is simulated in Matlab software and the results are evaluated at macroscopic level with the fixed time model currently operating in Bogota Colombia.
{"title":"Intelligent Model Traffic Light for the City of Bogota","authors":"L.F. Pedraza, C. Hernandez, O. Salcedo","doi":"10.1109/CERMA.2008.99","DOIUrl":"https://doi.org/10.1109/CERMA.2008.99","url":null,"abstract":"This article details the design of a traffic system model for vehicles, which examines the traffic traveling through a series of traffic lights on a main road in Bogota. The Adaptive Network Based Fuzzy Inference System is used to synchronize the time of duration and phase angle of the traffic lights, and also tries to maintain the maximum possible velocity of the vehicles traveling on the road. The model is simulated in Matlab software and the results are evaluated at macroscopic level with the fixed time model currently operating in Bogota Colombia.","PeriodicalId":126172,"journal":{"name":"2008 Electronics, Robotics and Automotive Mechanics Conference (CERMA '08)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125210283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ibarra-Manzano, D. Almanza-Ojeda, J.J. Aviles-Ferrera, J. Aviña-Cervantes
The radio frequency identification technique has been known since decades ago, however due to some important advances in technology, the amount of micro devices built-in on a chip and the cost of manufacturing, this technology has been implemented in many applications nowadays. A radio frequency identification system used to security check in a University is presented in this work. In this system several autonomous embedded sub-systems are included, which are placed at different entrances at school. Every embedded sub-system has a link up to a master control that registers every event at the entrance. This master control has the command to close or open any entry at any time if a case of emergency is occurred.A detailed analysis about the elements that are included in this autonomous access control is presented. Some important aspects of this system are also presented. Conclusions and perspectives are presented at the end of this work.
{"title":"Access Control System Using an Embedded System and Radio Frequency Identification Technology","authors":"M. Ibarra-Manzano, D. Almanza-Ojeda, J.J. Aviles-Ferrera, J. Aviña-Cervantes","doi":"10.1109/CERMA.2008.31","DOIUrl":"https://doi.org/10.1109/CERMA.2008.31","url":null,"abstract":"The radio frequency identification technique has been known since decades ago, however due to some important advances in technology, the amount of micro devices built-in on a chip and the cost of manufacturing, this technology has been implemented in many applications nowadays. A radio frequency identification system used to security check in a University is presented in this work. In this system several autonomous embedded sub-systems are included, which are placed at different entrances at school. Every embedded sub-system has a link up to a master control that registers every event at the entrance. This master control has the command to close or open any entry at any time if a case of emergency is occurred.A detailed analysis about the elements that are included in this autonomous access control is presented. Some important aspects of this system are also presented. Conclusions and perspectives are presented at the end of this work.","PeriodicalId":126172,"journal":{"name":"2008 Electronics, Robotics and Automotive Mechanics Conference (CERMA '08)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128086825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Web server attacks are increasingly in short time for different purposes, one of the principal vectors of this attacks are RFI and even the automatic way to do this. We suppose that in a botnet involved in RFI attacks, the attackers (host that launch the attack) are web servers compromised since the natural format of the attack and the tool (remote file to include). So we go deeper identified the type of host that is the attacker through a remote analysis based on domain name, content, and dynamic ip addresses.A large botnet involved in RFI attacks was tracked by almost a year and we figure out the behavior and the kind of host are the attackers and the hosters. This track were made by one University web server logs, compared with other sources. The interesting facts founded here are related to the botnet selected to study. This botnet is formed by other kind of hosts, not web servers at all. And the tool used to compromise web server is a very general shell. Other contribution of this work is a methodology for tracking RFI botnets, that could be used in real time or for historical data.
{"title":"Types of Hosts on a Remote File Inclusion (RFI) Botnet","authors":"H. Robledo","doi":"10.1109/CERMA.2008.60","DOIUrl":"https://doi.org/10.1109/CERMA.2008.60","url":null,"abstract":"Web server attacks are increasingly in short time for different purposes, one of the principal vectors of this attacks are RFI and even the automatic way to do this. We suppose that in a botnet involved in RFI attacks, the attackers (host that launch the attack) are web servers compromised since the natural format of the attack and the tool (remote file to include). So we go deeper identified the type of host that is the attacker through a remote analysis based on domain name, content, and dynamic ip addresses.A large botnet involved in RFI attacks was tracked by almost a year and we figure out the behavior and the kind of host are the attackers and the hosters. This track were made by one University web server logs, compared with other sources. The interesting facts founded here are related to the botnet selected to study. This botnet is formed by other kind of hosts, not web servers at all. And the tool used to compromise web server is a very general shell. Other contribution of this work is a methodology for tracking RFI botnets, that could be used in real time or for historical data.","PeriodicalId":126172,"journal":{"name":"2008 Electronics, Robotics and Automotive Mechanics Conference (CERMA '08)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128483271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The remote education is a new and important tool that creates new ways of communication and increases the access to a large quantity information. It really can help to improve the education regarding to the Science field. The aim of this work is to present didactic material, which was developed to create a course on the field of remote education. It was implemented for the course of Mechatronics I, offered by the UPIITA of the IPN to the students registered on the programs of Bionics and Mechatronics Engineering. A commercial software Microsoft FrontPage, was used to develop electronic materials that are available through an elecronic page allocated in the internet. During the implementations of these technologies a great enthusiasm and participation was exhibited by the student that employed them, and it lead to a better understanding of the contents that are treated during the whole course.
{"title":"Education of Mechatronics I (Science and Technology of the Materials) with the TIC","authors":"L.K. Zinayna, C. Rafael","doi":"10.1109/CERMA.2008.85","DOIUrl":"https://doi.org/10.1109/CERMA.2008.85","url":null,"abstract":"The remote education is a new and important tool that creates new ways of communication and increases the access to a large quantity information. It really can help to improve the education regarding to the Science field. The aim of this work is to present didactic material, which was developed to create a course on the field of remote education. It was implemented for the course of Mechatronics I, offered by the UPIITA of the IPN to the students registered on the programs of Bionics and Mechatronics Engineering. A commercial software Microsoft FrontPage, was used to develop electronic materials that are available through an elecronic page allocated in the internet. During the implementations of these technologies a great enthusiasm and participation was exhibited by the student that employed them, and it lead to a better understanding of the contents that are treated during the whole course.","PeriodicalId":126172,"journal":{"name":"2008 Electronics, Robotics and Automotive Mechanics Conference (CERMA '08)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130686136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J.J. Muoz-Cesar, E. A. Merchán-Cruz, L. Hernández-Gómez, E. Guerrero-Guadarrama, A. Jimenez-Ledesma, I. Jaidar-Monter
This work presents the implementation of a conventional PID and a fuzzy PI control schemes in a 16 bits microcontroller. These schemes are designed for the speed control of a DC brush motor. This article makes emphasis in the handling of the floating point for the first case. For the fuzzy control, the data is obtained directly from the digital analogical converter of the system.
{"title":"Speed Control of a DC Brush Motor with Conventional PID and Fuzzy PI Controllers","authors":"J.J. Muoz-Cesar, E. A. Merchán-Cruz, L. Hernández-Gómez, E. Guerrero-Guadarrama, A. Jimenez-Ledesma, I. Jaidar-Monter","doi":"10.1109/CERMA.2008.67","DOIUrl":"https://doi.org/10.1109/CERMA.2008.67","url":null,"abstract":"This work presents the implementation of a conventional PID and a fuzzy PI control schemes in a 16 bits microcontroller. These schemes are designed for the speed control of a DC brush motor. This article makes emphasis in the handling of the floating point for the first case. For the fuzzy control, the data is obtained directly from the digital analogical converter of the system.","PeriodicalId":126172,"journal":{"name":"2008 Electronics, Robotics and Automotive Mechanics Conference (CERMA '08)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128015928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Given the wide acceptance of SMS in mobile devices,it has been applied in unconventional applications beyond chating and exchanging short text messages. In this paper, we review a set of unconventional SMS-based applications. We review the basic operation modes in which they act and their needs for security services. Considering limitations on mobile devices, here we propose an architectural model for implementing security services on SMS-based applications. Some security service implementations reported in literature are discussed.
{"title":"State of Security for SMS on Mobile Devices","authors":"J.J. Garza-Saldaa, A. Díaz-Pérez","doi":"10.1109/CERMA.2008.63","DOIUrl":"https://doi.org/10.1109/CERMA.2008.63","url":null,"abstract":"Given the wide acceptance of SMS in mobile devices,it has been applied in unconventional applications beyond chating and exchanging short text messages. In this paper, we review a set of unconventional SMS-based applications. We review the basic operation modes in which they act and their needs for security services. Considering limitations on mobile devices, here we propose an architectural model for implementing security services on SMS-based applications. Some security service implementations reported in literature are discussed.","PeriodicalId":126172,"journal":{"name":"2008 Electronics, Robotics and Automotive Mechanics Conference (CERMA '08)","volume":"92 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128021371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S.R. Ibanez, R. Santos, V. R. Licea, A. E. Block, Manrique Ruiz
The proliferation of Wireless Local Area Networks (WLANs) facilitates the development of multihop routing protocols. Moreover, the need to cover greater areas has led to the creation of new standards for Wireless Metropolitan Area Networks (WMANs). This paper proposes a new routing protocol that integrates WLANs and WMANs, allowing seamless interconnectivity.
{"title":"Hybrid WiFi-WiMAX Network Routing Protocol","authors":"S.R. Ibanez, R. Santos, V. R. Licea, A. E. Block, Manrique Ruiz","doi":"10.1109/CERMA.2008.24","DOIUrl":"https://doi.org/10.1109/CERMA.2008.24","url":null,"abstract":"The proliferation of Wireless Local Area Networks (WLANs) facilitates the development of multihop routing protocols. Moreover, the need to cover greater areas has led to the creation of new standards for Wireless Metropolitan Area Networks (WMANs). This paper proposes a new routing protocol that integrates WLANs and WMANs, allowing seamless interconnectivity.","PeriodicalId":126172,"journal":{"name":"2008 Electronics, Robotics and Automotive Mechanics Conference (CERMA '08)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132736702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O.-R.J. Manuel, M.-B.M. del Rosario, G. Eduardo, V.-C.H. Rene
Recently, the use of the artificial neural networks technology has been applied with success in the research area of nuclear sciences, mainly in the neutron spectrometry and dosimetry domains, however, the structure (net topology), as well as the learning parameters of the neural networks, are factors that contribute in a significant way in the networks performance. It has been observed that the researchers in the nuclear sciences area carry out the selection of the network parameters through the trial and error technique, which produces poor artificial neural networks with low generalization capacity and poor performance. It has been observed that the use of the evolutionary algorithms, seen as search and optimization approaches, it has allowed to be possible to evolve and to optimize different properties of artificial neural networks, such as the proper synaptic weight initialization, the optimum selection of the network architecture or the selection of the training algorithms. The aim of the present work is focused in analyzing the intersection of the artificial neural networks and the evolutionary algorithms, analyzing like it is that the evolutionary algorithms can be used to help in the design processes and training of an artificial neural network, in such a way that the neural network designed is able to unfold in an efficient way neutron spectra and to calculate equivalent doses, starting only from the count rates obtained from a Bonner spheres spectrometric system.
{"title":"Artificial Neural Networks Modeling Evolved Genetically, a New Approach Applied in Neutron Spectrometry and Dosimetry Research Areas","authors":"O.-R.J. Manuel, M.-B.M. del Rosario, G. Eduardo, V.-C.H. Rene","doi":"10.1109/CERMA.2008.107","DOIUrl":"https://doi.org/10.1109/CERMA.2008.107","url":null,"abstract":"Recently, the use of the artificial neural networks technology has been applied with success in the research area of nuclear sciences, mainly in the neutron spectrometry and dosimetry domains, however, the structure (net topology), as well as the learning parameters of the neural networks, are factors that contribute in a significant way in the networks performance. It has been observed that the researchers in the nuclear sciences area carry out the selection of the network parameters through the trial and error technique, which produces poor artificial neural networks with low generalization capacity and poor performance. It has been observed that the use of the evolutionary algorithms, seen as search and optimization approaches, it has allowed to be possible to evolve and to optimize different properties of artificial neural networks, such as the proper synaptic weight initialization, the optimum selection of the network architecture or the selection of the training algorithms. The aim of the present work is focused in analyzing the intersection of the artificial neural networks and the evolutionary algorithms, analyzing like it is that the evolutionary algorithms can be used to help in the design processes and training of an artificial neural network, in such a way that the neural network designed is able to unfold in an efficient way neutron spectra and to calculate equivalent doses, starting only from the count rates obtained from a Bonner spheres spectrometric system.","PeriodicalId":126172,"journal":{"name":"2008 Electronics, Robotics and Automotive Mechanics Conference (CERMA '08)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133452236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This work describes a hardware architecture implementation of an associative memory neural network (AMNN) using reconfigurable hardware devices such as FPGA (field programmable gates arrays) and its applications in image pattern recognition systems. An associative memory is a content-addressable structure that maps specific input representations to specific output representations. It is a system that "associates" two patterns (X, Y) such that when one is encountered, the other can be recalled. In the design, learning and recognizing algorithms for the neural network are implemented by using VHSIC Hardware Description Language. FPGA is used for implementation because they can reduce development time greatly, ease of fast reprogramming, low price, flexible architecture and permitting fast and non expensive implementation of the whole system. The architecture was evaluated as image recognizing system. Likewise, it was necessary to implement and acquisition stage.
{"title":"Hardware Architecture for FPGA Implementation of a Neural Network and Its Application in Images Processing","authors":"B. Leiner, V.Q. Lorena, T.M. Cesar, M.V. Lorenzo","doi":"10.1109/CERMA.2008.32","DOIUrl":"https://doi.org/10.1109/CERMA.2008.32","url":null,"abstract":"This work describes a hardware architecture implementation of an associative memory neural network (AMNN) using reconfigurable hardware devices such as FPGA (field programmable gates arrays) and its applications in image pattern recognition systems. An associative memory is a content-addressable structure that maps specific input representations to specific output representations. It is a system that \"associates\" two patterns (X, Y) such that when one is encountered, the other can be recalled. In the design, learning and recognizing algorithms for the neural network are implemented by using VHSIC Hardware Description Language. FPGA is used for implementation because they can reduce development time greatly, ease of fast reprogramming, low price, flexible architecture and permitting fast and non expensive implementation of the whole system. The architecture was evaluated as image recognizing system. Likewise, it was necessary to implement and acquisition stage.","PeriodicalId":126172,"journal":{"name":"2008 Electronics, Robotics and Automotive Mechanics Conference (CERMA '08)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126966399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It is common practice to use sinusoidal signals for generating the electric fields needed for particle manipulation using dielectrophoresis (DEP). A direct digital frequency synthesizer (DFFS) is well suited for this application because of its fast switching speed, high resolution, small size and low power. The focus of this paper is on design, analysis, simulation and implementation of a DDFS, using Altera tools. The proposed architecture uses a unipolar digital-to-analog converter (DAC). Memory size is reduced more than 75 percent using quadrant compression. To decrease the amount of hardware even further, the phase generated by the phase accumulator is truncated before it is used by the ROM. Dither is added in order to get higher spurious free dynamic range. Further reduction is achieved storing in the ROM only the difference between the sinusoidal function and the phase.
{"title":"Direct Digital-Frequency Synthesizer for Dielectrophoresis","authors":"F. Heredia, C. Carbajal, S. Martinez","doi":"10.1109/CERMA.2008.58","DOIUrl":"https://doi.org/10.1109/CERMA.2008.58","url":null,"abstract":"It is common practice to use sinusoidal signals for generating the electric fields needed for particle manipulation using dielectrophoresis (DEP). A direct digital frequency synthesizer (DFFS) is well suited for this application because of its fast switching speed, high resolution, small size and low power. The focus of this paper is on design, analysis, simulation and implementation of a DDFS, using Altera tools. The proposed architecture uses a unipolar digital-to-analog converter (DAC). Memory size is reduced more than 75 percent using quadrant compression. To decrease the amount of hardware even further, the phase generated by the phase accumulator is truncated before it is used by the ROM. Dither is added in order to get higher spurious free dynamic range. Further reduction is achieved storing in the ROM only the difference between the sinusoidal function and the phase.","PeriodicalId":126172,"journal":{"name":"2008 Electronics, Robotics and Automotive Mechanics Conference (CERMA '08)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115055251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}