Pub Date : 2009-12-04DOI: 10.1109/ICAT.2009.5348436
Yuanlong Liu, R. Sahandi
Availability of Zigbee-based sensor network technology with low-power consuming sensors has made their implementation in healthcare possible, particularly for remote patient monitoring. Two alternative approaches for the deployment of Zigbee-based Wireless Personal Area Networks (WPANs) for remote patient monitoring on general wards are discussed and their performances evaluated in a simulation environment. In the first approach, a single WPAN is considered for gathering and transmitting physiological data from the patients on a ward. In the second approach, which is proposed in this paper, multiple WPANs are considered instead. In this approach, a WPAN will be allocated to each patient on the ward. The simulation results show that the multiple WPANs approach out-performed the single one in respect of efficiency and reliability for data transmission for the entire ward.
{"title":"Zigbee network for remote patient monitoring on general hospital wards","authors":"Yuanlong Liu, R. Sahandi","doi":"10.1109/ICAT.2009.5348436","DOIUrl":"https://doi.org/10.1109/ICAT.2009.5348436","url":null,"abstract":"Availability of Zigbee-based sensor network technology with low-power consuming sensors has made their implementation in healthcare possible, particularly for remote patient monitoring. Two alternative approaches for the deployment of Zigbee-based Wireless Personal Area Networks (WPANs) for remote patient monitoring on general wards are discussed and their performances evaluated in a simulation environment. In the first approach, a single WPAN is considered for gathering and transmitting physiological data from the patients on a ward. In the second approach, which is proposed in this paper, multiple WPANs are considered instead. In this approach, a WPAN will be allocated to each patient on the ward. The simulation results show that the multiple WPANs approach out-performed the single one in respect of efficiency and reliability for data transmission for the entire ward.","PeriodicalId":211842,"journal":{"name":"2009 XXII International Symposium on Information, Communication and Automation Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125739939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-04DOI: 10.1109/ICAT.2009.5348421
S. Beyhan, M. Alci
This paper presents a new orthogonal neural network (ONN) which is utilized successively for online identification and control of nonlinear discrete-time systems. The proposed network is designed with auto regressive with exogenous (ARX) terms of inputs and outputs, and their orthogonal terms by Chebyshev polynomials. The network is a single layer neural network and computationally efficient with less number of parameters. The identification by the network is performed in stable sense by using Lyapunov stability guaranteed learning rate. Hence, the learning rate depends on the current knowledge of the system instead of using constant learning rate. This learning rate provides fine online optimization. In simulation study, one benchmark nonlinear system is identified and results are compared. Then, one nonlinear functioned system is identified and controlled by model reference control. From results, it is seen that the proposed model has good learning capability for identification and control.
{"title":"An orthogonal ARX network for identification and control of nonlinear systems","authors":"S. Beyhan, M. Alci","doi":"10.1109/ICAT.2009.5348421","DOIUrl":"https://doi.org/10.1109/ICAT.2009.5348421","url":null,"abstract":"This paper presents a new orthogonal neural network (ONN) which is utilized successively for online identification and control of nonlinear discrete-time systems. The proposed network is designed with auto regressive with exogenous (ARX) terms of inputs and outputs, and their orthogonal terms by Chebyshev polynomials. The network is a single layer neural network and computationally efficient with less number of parameters. The identification by the network is performed in stable sense by using Lyapunov stability guaranteed learning rate. Hence, the learning rate depends on the current knowledge of the system instead of using constant learning rate. This learning rate provides fine online optimization. In simulation study, one benchmark nonlinear system is identified and results are compared. Then, one nonlinear functioned system is identified and controlled by model reference control. From results, it is seen that the proposed model has good learning capability for identification and control.","PeriodicalId":211842,"journal":{"name":"2009 XXII International Symposium on Information, Communication and Automation Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133975995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-04DOI: 10.1109/ICAT.2009.5348411
N. Zivic, E. Kadusic, M. Skrbic
In this work, the strategy for correction of bits using Soft Input Decryption is analyzed. Soft Input Decryption is used for correction of cryptographic check values, which are very fragile when they are transmitted over noisy channels: only one wrong bit at input of the decryptor causes about 50% of errors at output of the decryptor. Soft Input Decryption corrects incorrect bits of cryptographic check values in most of cases using combination of SISO channel decoding and decrypting. Soft Input Decryption is an iterative process and therefore it is needed to minimize duration of iterations. This paper suggests an algorithm for optimization of Soft Input Decryption, which enables restriction of needed computing time of the Soft Input Decryption algorithm. Suggested optimization is performed for ECDSA digital signatures.
{"title":"Mathematical optimization of decrypting algorithm for soft input decryption","authors":"N. Zivic, E. Kadusic, M. Skrbic","doi":"10.1109/ICAT.2009.5348411","DOIUrl":"https://doi.org/10.1109/ICAT.2009.5348411","url":null,"abstract":"In this work, the strategy for correction of bits using Soft Input Decryption is analyzed. Soft Input Decryption is used for correction of cryptographic check values, which are very fragile when they are transmitted over noisy channels: only one wrong bit at input of the decryptor causes about 50% of errors at output of the decryptor. Soft Input Decryption corrects incorrect bits of cryptographic check values in most of cases using combination of SISO channel decoding and decrypting. Soft Input Decryption is an iterative process and therefore it is needed to minimize duration of iterations. This paper suggests an algorithm for optimization of Soft Input Decryption, which enables restriction of needed computing time of the Soft Input Decryption algorithm. Suggested optimization is performed for ECDSA digital signatures.","PeriodicalId":211842,"journal":{"name":"2009 XXII International Symposium on Information, Communication and Automation Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132104158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-04DOI: 10.1109/ICAT.2009.5348434
O. Jalilian, A. Haghighat, Alireza Rezvanian
According to the growth of information sources in recent years along the web, many of web servers have been dedicated to the information sources storage. Until yet many methods are presented for storing and transforming information on the web in the case of paralleling or processing. But one of the researcher's challenges in derivation and restoring data in data mining and information retrievals are to face to this huge amount of information for storing. One of the solutions of this problem is compression of information resources. Notice that the published statistics, Persian language is one of the oldest and the most diffused languages all around the world and web and also according to its kind of alphabets and variety along the Persian texts, an evaluation on compression for Persian texts will be useful. First of all in this paper variety difficulties and huge amount of information on the web, general aspects of Huffman compression methods are introduced, and also some features of Persian language. The state of choosing Persian texts collections has been investigated and the result of tests in compare with some experimental datasets form Persian, English and Arabic were shown. The experimental results are given at the end of paper.
{"title":"Evaluation of Persian text based on Huffman data compression","authors":"O. Jalilian, A. Haghighat, Alireza Rezvanian","doi":"10.1109/ICAT.2009.5348434","DOIUrl":"https://doi.org/10.1109/ICAT.2009.5348434","url":null,"abstract":"According to the growth of information sources in recent years along the web, many of web servers have been dedicated to the information sources storage. Until yet many methods are presented for storing and transforming information on the web in the case of paralleling or processing. But one of the researcher's challenges in derivation and restoring data in data mining and information retrievals are to face to this huge amount of information for storing. One of the solutions of this problem is compression of information resources. Notice that the published statistics, Persian language is one of the oldest and the most diffused languages all around the world and web and also according to its kind of alphabets and variety along the Persian texts, an evaluation on compression for Persian texts will be useful. First of all in this paper variety difficulties and huge amount of information on the web, general aspects of Huffman compression methods are introduced, and also some features of Persian language. The state of choosing Persian texts collections has been investigated and the result of tests in compare with some experimental datasets form Persian, English and Arabic were shown. The experimental results are given at the end of paper.","PeriodicalId":211842,"journal":{"name":"2009 XXII International Symposium on Information, Communication and Automation Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125097762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-04DOI: 10.1109/ICAT.2009.5348401
G. Bal, Nihat Öztürk, E. Bekiroglu
In this study, the speed control of the vector controlled induction motor was implemented by using hard switching and soft switching inverters. A TMS320F243 digital signal processor was used to implement control algorithm during practical implementation. With the use of the vector control, complex structure of the controller is simplified, and dependence to variations of the motor parameters is reduced. In order to reduce switching losses arising mainly from hard switching method a soft switching method was designed and implemented. Switching signals of the auxiliary switches are independent from main switching signals in the proposed method. The method can be applied to the puls width modulation (PWM) inverter by setting up proper switching strategies.
{"title":"Implementation of indirect vector control to induction motor with zero current transition inverter","authors":"G. Bal, Nihat Öztürk, E. Bekiroglu","doi":"10.1109/ICAT.2009.5348401","DOIUrl":"https://doi.org/10.1109/ICAT.2009.5348401","url":null,"abstract":"In this study, the speed control of the vector controlled induction motor was implemented by using hard switching and soft switching inverters. A TMS320F243 digital signal processor was used to implement control algorithm during practical implementation. With the use of the vector control, complex structure of the controller is simplified, and dependence to variations of the motor parameters is reduced. In order to reduce switching losses arising mainly from hard switching method a soft switching method was designed and implemented. Switching signals of the auxiliary switches are independent from main switching signals in the proposed method. The method can be applied to the puls width modulation (PWM) inverter by setting up proper switching strategies.","PeriodicalId":211842,"journal":{"name":"2009 XXII International Symposium on Information, Communication and Automation Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126203155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-04DOI: 10.1109/ICAT.2009.5348447
M. Schwarz, H. Sheng, B. Batchuluun, Oleksandr Sheleh, W. Chaaban, J. Börcsök
Reliable software development and methods to validate programming code and source code gain nowadays more importance and will be even more significant in the future. It is not enough that the developer has understood the task, but it has to be validated that from simulation to the actual desired hardware the developed code is functioning correctly. This research and development area increases rapidly and tools are required and demanded from researchers and industries. Our developed tools use Matlabreg / Simulinkreg as a platform to simulate and analyse the functionality of the model and then to verify the functionality of the created meta-programme, which is in this case converted to C. Finally, the functionality has to be verified of the binary source-code downloaded onto the actual operating hardware. This paper describes the necessary steps and tools which have been developed and uses a simple example to illustrate different stages and methods necessary to validate the functionality of the developed programme.
{"title":"Reliable software development methodology for safety related applications: From simulation to reliable source code","authors":"M. Schwarz, H. Sheng, B. Batchuluun, Oleksandr Sheleh, W. Chaaban, J. Börcsök","doi":"10.1109/ICAT.2009.5348447","DOIUrl":"https://doi.org/10.1109/ICAT.2009.5348447","url":null,"abstract":"Reliable software development and methods to validate programming code and source code gain nowadays more importance and will be even more significant in the future. It is not enough that the developer has understood the task, but it has to be validated that from simulation to the actual desired hardware the developed code is functioning correctly. This research and development area increases rapidly and tools are required and demanded from researchers and industries. Our developed tools use Matlabreg / Simulinkreg as a platform to simulate and analyse the functionality of the model and then to verify the functionality of the created meta-programme, which is in this case converted to C. Finally, the functionality has to be verified of the binary source-code downloaded onto the actual operating hardware. This paper describes the necessary steps and tools which have been developed and uses a simple example to illustrate different stages and methods necessary to validate the functionality of the developed programme.","PeriodicalId":211842,"journal":{"name":"2009 XXII International Symposium on Information, Communication and Automation Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125179739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-04DOI: 10.1109/ICAT.2009.5348439
Sabina Baraković, J. Barakovic
Service providers have been in the process of evaluating and evolving their multiple networks to a single converged Internet Protocol (IP)-based infrastructure upon which they will deploy existing and future services. Although many approaches have been proposed, provisioning of Quality of Service (QoS) in the IP-based networks is still a challenging task. From the evolution of QoS solutions, Differentiated Services (DiffServ) appears to become the mainstream QoS solution. Using service differentiation principle, DiffServ approach for providing QoS omits the integration with other traffic control mechanisms. Multi-Protocol Label Switching (MPLS) complements DiffServ providing mechanisms to choose and reserve resources on the best available path for a given traffic. This paper discusses the MPLS DiffServ integration to achieve QoS in IP-based networks and to illustrate its effectiveness by performing a simulation using Network Simulator (ns-2).
{"title":"Traffic performances improvement using DiffServ and MPLS networks","authors":"Sabina Baraković, J. Barakovic","doi":"10.1109/ICAT.2009.5348439","DOIUrl":"https://doi.org/10.1109/ICAT.2009.5348439","url":null,"abstract":"Service providers have been in the process of evaluating and evolving their multiple networks to a single converged Internet Protocol (IP)-based infrastructure upon which they will deploy existing and future services. Although many approaches have been proposed, provisioning of Quality of Service (QoS) in the IP-based networks is still a challenging task. From the evolution of QoS solutions, Differentiated Services (DiffServ) appears to become the mainstream QoS solution. Using service differentiation principle, DiffServ approach for providing QoS omits the integration with other traffic control mechanisms. Multi-Protocol Label Switching (MPLS) complements DiffServ providing mechanisms to choose and reserve resources on the best available path for a given traffic. This paper discusses the MPLS DiffServ integration to achieve QoS in IP-based networks and to illustrate its effectiveness by performing a simulation using Network Simulator (ns-2).","PeriodicalId":211842,"journal":{"name":"2009 XXII International Symposium on Information, Communication and Automation Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128829339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-04DOI: 10.1109/ICAT.2009.5348452
M. Gaham, B. Bouzouia
As a specialisation of Holonic agent-based distributed manufacturing control, intelligent product-driven manufacturing control paradigm has recently emerged as one of the most promising paradigms for the development of next generation manufacturing intelligent control systems. But major issue to be solved to make this paradigm effective in real world industrial environment is related to the lack of efficiency of agent-based local decision-making approaches employed. The research work presented in this paper focuses on this pending issue and proposes and formalizes the combination of main capabilities of agent-based intelligent product-driven manufacturing control paradigm and computational intelligence genetic algorithm optimisation tool for the development of effective and efficient intelligent product driven agent-based distributed dynamic scheduling and control strategy. This challenging combination is achieved by neural network-based machine learning technique and enables enhancing manufacturing system reactivity, flexibility and fault tolerance, as well as maintaining behavioural stability and optimality.
{"title":"Intelligent product-driven manufacturing control: A mixed genetic algorithms and machine learning approach to product intelligence synthesis","authors":"M. Gaham, B. Bouzouia","doi":"10.1109/ICAT.2009.5348452","DOIUrl":"https://doi.org/10.1109/ICAT.2009.5348452","url":null,"abstract":"As a specialisation of Holonic agent-based distributed manufacturing control, intelligent product-driven manufacturing control paradigm has recently emerged as one of the most promising paradigms for the development of next generation manufacturing intelligent control systems. But major issue to be solved to make this paradigm effective in real world industrial environment is related to the lack of efficiency of agent-based local decision-making approaches employed. The research work presented in this paper focuses on this pending issue and proposes and formalizes the combination of main capabilities of agent-based intelligent product-driven manufacturing control paradigm and computational intelligence genetic algorithm optimisation tool for the development of effective and efficient intelligent product driven agent-based distributed dynamic scheduling and control strategy. This challenging combination is achieved by neural network-based machine learning technique and enables enhancing manufacturing system reactivity, flexibility and fault tolerance, as well as maintaining behavioural stability and optimality.","PeriodicalId":211842,"journal":{"name":"2009 XXII International Symposium on Information, Communication and Automation Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125447811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-04DOI: 10.1109/ICAT.2009.5348417
Vedran Ljubovic
In this paper we will build a computer traffic model simulating movement of each individual vehicle through the traffic network and the interactions of that vehicle with other vehicles and semaphores (an agent-based model). It will model a simple traffic network (a two-way coordinated semaphore system a.k.a. "green wave") to test certain hypotheses on different kinds of semaphore systems. We will show that, with certain limitations, such a model can run on an average PC computer at speed up to ten times the real-time. In order to validate this model, a two-way coordinated semaphore system will be statistically compared to a non-coordinated system, hopefully proving the advantage of semaphore coordination.
{"title":"Traffic simulation using agent-based models","authors":"Vedran Ljubovic","doi":"10.1109/ICAT.2009.5348417","DOIUrl":"https://doi.org/10.1109/ICAT.2009.5348417","url":null,"abstract":"In this paper we will build a computer traffic model simulating movement of each individual vehicle through the traffic network and the interactions of that vehicle with other vehicles and semaphores (an agent-based model). It will model a simple traffic network (a two-way coordinated semaphore system a.k.a. \"green wave\") to test certain hypotheses on different kinds of semaphore systems. We will show that, with certain limitations, such a model can run on an average PC computer at speed up to ten times the real-time. In order to validate this model, a two-way coordinated semaphore system will be statistically compared to a non-coordinated system, hopefully proving the advantage of semaphore coordination.","PeriodicalId":211842,"journal":{"name":"2009 XXII International Symposium on Information, Communication and Automation Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114884574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-12-04DOI: 10.1109/ICAT.2009.5348422
R. M. Esfanjani, S. Nikravesh
A robust model predictive controller is proposed for input constrained linear systems with discrete and distributed delay in the states, where uncertainty is described by an additive bounded disturbance. The method is an extension of recently developed, tube based model predictive control to time-delay systems. A robust local controller maintains the disturbed trajectory of the controlled system in a tube whose center is the nominal trajectory and whose cross section is a robust control invariant set. Asymptotic stability of the invariant set centered on the origin is proved. Moreover, structured procedures are presented to determine offline controller parameters to guarantee closed loop stability and robustness. Online computational burden is reduced compared with the existent min-max and worst case robust predictive controllers.
{"title":"Robust model predictive control for constrained distributed delay systems","authors":"R. M. Esfanjani, S. Nikravesh","doi":"10.1109/ICAT.2009.5348422","DOIUrl":"https://doi.org/10.1109/ICAT.2009.5348422","url":null,"abstract":"A robust model predictive controller is proposed for input constrained linear systems with discrete and distributed delay in the states, where uncertainty is described by an additive bounded disturbance. The method is an extension of recently developed, tube based model predictive control to time-delay systems. A robust local controller maintains the disturbed trajectory of the controlled system in a tube whose center is the nominal trajectory and whose cross section is a robust control invariant set. Asymptotic stability of the invariant set centered on the origin is proved. Moreover, structured procedures are presented to determine offline controller parameters to guarantee closed loop stability and robustness. Online computational burden is reduced compared with the existent min-max and worst case robust predictive controllers.","PeriodicalId":211842,"journal":{"name":"2009 XXII International Symposium on Information, Communication and Automation Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121591500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}