F. Cadena, J. Sanipatin, G. Verdezoto, H. Cervantes, D. Ortiz, D. Ojeda
The Surface Electromyography (SEMG) is a technique used for many applications in different areas such as: Neurology, Rehabilitation, Orthopedics, Ergonomics, Sports, etc. [15]. In the last years, this technique has led to great research, and several groups of researchers throughout the world have made inroads in the field of the electromyography applied to the my electric prostheses control. This project aims to detail the stages of amplification and filtering of a my electric signal, as well as to check the device's function for certain muscles of the lower limbs, as the project's first stage, the completed tests were made with obtained data in healthy subjects. For the circuits' design and implementation, components of easy acquisition and existents in the environment, were used, contributing with the technological development of the country.
{"title":"Acquisition and Conditioning of Electromyographic Signals for Prosthetic Legs","authors":"F. Cadena, J. Sanipatin, G. Verdezoto, H. Cervantes, D. Ortiz, D. Ojeda","doi":"10.1109/APCASE.2015.70","DOIUrl":"https://doi.org/10.1109/APCASE.2015.70","url":null,"abstract":"The Surface Electromyography (SEMG) is a technique used for many applications in different areas such as: Neurology, Rehabilitation, Orthopedics, Ergonomics, Sports, etc. [15]. In the last years, this technique has led to great research, and several groups of researchers throughout the world have made inroads in the field of the electromyography applied to the my electric prostheses control. This project aims to detail the stages of amplification and filtering of a my electric signal, as well as to check the device's function for certain muscles of the lower limbs, as the project's first stage, the completed tests were made with obtained data in healthy subjects. For the circuits' design and implementation, components of easy acquisition and existents in the environment, were used, contributing with the technological development of the country.","PeriodicalId":235698,"journal":{"name":"2015 Asia-Pacific Conference on Computer Aided System Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126253178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raniyah Wazirali, S. Slehat, Z. Chaczko, G. Borowik, L. Carrion
The main goal of hiding data is to conceal the very existence of the hidden information, therefore there is a significant demand for steganographic approaches that can ensure imperceptibility of such infromation. However, there is a limited corresponding evaluation parameters available. Most of the studies use the Peak Signal to Noise Ratio (PSNR) as a metric for imperceptibility evaluation, although it could provide less accurate results than the Human Visual System (HVS) evaluation. This paper provides a review of the existent evaluation metrics that are used to assess the quality of steganography. The examination of the correlation between the existing objective and subjective metrics is also conducted. Pixel differences metrics have a poor correlation with the subjective metrics, hence the HSV based metrics have better correlation than pixel metrics.
{"title":"Objective Quality Metrics in Correlation with Subjective Quality Metrics for Steganography","authors":"Raniyah Wazirali, S. Slehat, Z. Chaczko, G. Borowik, L. Carrion","doi":"10.1109/APCASE.2015.49","DOIUrl":"https://doi.org/10.1109/APCASE.2015.49","url":null,"abstract":"The main goal of hiding data is to conceal the very existence of the hidden information, therefore there is a significant demand for steganographic approaches that can ensure imperceptibility of such infromation. However, there is a limited corresponding evaluation parameters available. Most of the studies use the Peak Signal to Noise Ratio (PSNR) as a metric for imperceptibility evaluation, although it could provide less accurate results than the Human Visual System (HVS) evaluation. This paper provides a review of the existent evaluation metrics that are used to assess the quality of steganography. The examination of the correlation between the existing objective and subjective metrics is also conducted. Pixel differences metrics have a poor correlation with the subjective metrics, hence the HSV based metrics have better correlation than pixel metrics.","PeriodicalId":235698,"journal":{"name":"2015 Asia-Pacific Conference on Computer Aided System Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115366596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study proposes an Intelligent Tutor System for assessing slide presentations from novice undergraduate students. To develop such system, two learner models (rule based model and clustering model) were built using 80 presentations graded by three human experts. An experiment to determine the best learner model and students' perception was carried out using 51 presentations uploaded by students. The findings show that the clustering model classified in a similar way as a human evaluator only when a holistic evaluation criterion was used. Whereas, the rule-base model was more precise when the evaluation rules were easier to be followed by a human evaluator. Furthermore, students agreed with the usefulness of the system as well as the level of agreement with the grading model, although the latter in a lesser extent. Results from this study encourage to explore this area and adapt the proposed Intelligent Tutor System to other existing automated grading systems.
{"title":"Mirroring Teachers' Assessment of Novice Students' Presentations through an Intelligent Tutor System","authors":"Vanessa Echeverría, B. Guamán, K. Chiluiza","doi":"10.1109/APCASE.2015.53","DOIUrl":"https://doi.org/10.1109/APCASE.2015.53","url":null,"abstract":"This study proposes an Intelligent Tutor System for assessing slide presentations from novice undergraduate students. To develop such system, two learner models (rule based model and clustering model) were built using 80 presentations graded by three human experts. An experiment to determine the best learner model and students' perception was carried out using 51 presentations uploaded by students. The findings show that the clustering model classified in a similar way as a human evaluator only when a holistic evaluation criterion was used. Whereas, the rule-base model was more precise when the evaluation rules were easier to be followed by a human evaluator. Furthermore, students agreed with the usefulness of the system as well as the level of agreement with the grading model, although the latter in a lesser extent. Results from this study encourage to explore this area and adapt the proposed Intelligent Tutor System to other existing automated grading systems.","PeriodicalId":235698,"journal":{"name":"2015 Asia-Pacific Conference on Computer Aided System Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124759387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Metropolitan Area of Caracas, Venezuela, has a geographical distribution such that almost every middle-class and wealthy neighborhood is located next to at least one barrio -- informal squatter settlements. We propose a Wireless Mesh Network (WMN) that exploits the urban geography of the city, so some poor families could gain access to the Internet via one or more Internet Service Providers contracted by some neighbors living in surrounding middle-class or wealthy neighborhoods. We present the design of the intended WMN, according to some deployment strategy issues: provisioning, node locations, interference, node associations, connectivity, coverage and types of antennas. Then we describe the results of the simulation study in terms of throughput and packet loss rate for three routing protocols: Optimized Link State Routing Protocol (OLSR), Hybrid Wireless Mesh Protocol (HWMP) (reactive and proactive). In order to implement the WMN, some kind of agreement must be established between the person who pays for the Internet connection service in the neighborhood and the members of the community in the barrio. Also, given the policies of the government in matter of laptop provisioning for the low-income families, we expect to have enough mesh nodes in the barrios so connectivity along the mesh network could be guaranteed.
{"title":"Planning a Wireless Mesh Network Which Takes Advantage of the Urban Geography of the City","authors":"M. E. Villapol, David Perez Abreu, Carlos Cordero","doi":"10.1109/APCASE.2015.77","DOIUrl":"https://doi.org/10.1109/APCASE.2015.77","url":null,"abstract":"The Metropolitan Area of Caracas, Venezuela, has a geographical distribution such that almost every middle-class and wealthy neighborhood is located next to at least one barrio -- informal squatter settlements. We propose a Wireless Mesh Network (WMN) that exploits the urban geography of the city, so some poor families could gain access to the Internet via one or more Internet Service Providers contracted by some neighbors living in surrounding middle-class or wealthy neighborhoods. We present the design of the intended WMN, according to some deployment strategy issues: provisioning, node locations, interference, node associations, connectivity, coverage and types of antennas. Then we describe the results of the simulation study in terms of throughput and packet loss rate for three routing protocols: Optimized Link State Routing Protocol (OLSR), Hybrid Wireless Mesh Protocol (HWMP) (reactive and proactive). In order to implement the WMN, some kind of agreement must be established between the person who pays for the Internet connection service in the neighborhood and the members of the community in the barrio. Also, given the policies of the government in matter of laptop provisioning for the low-income families, we expect to have enough mesh nodes in the barrios so connectivity along the mesh network could be guaranteed.","PeriodicalId":235698,"journal":{"name":"2015 Asia-Pacific Conference on Computer Aided System Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128672614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. D. Mavares, Reinaldo Velásquez, Keila Candotti, Monica Huerta
A channel prediction based space-time code selection technique for multiple input-single output systems is proposed. This transmit antenna diversity technique selects both the space-time code and the number of transmitter antennas using estimated and predicted channel state information. Linear channel prediction, designed to be optimal in the mean-square sense, has been used. Simulation results show that the proposed technique achieve SNR gains up to 2dB at high SNRs and high mobile speed.
{"title":"Space-Time Code Selection Using Channel Prediction","authors":"T. D. Mavares, Reinaldo Velásquez, Keila Candotti, Monica Huerta","doi":"10.1109/APCASE.2015.55","DOIUrl":"https://doi.org/10.1109/APCASE.2015.55","url":null,"abstract":"A channel prediction based space-time code selection technique for multiple input-single output systems is proposed. This transmit antenna diversity technique selects both the space-time code and the number of transmitter antennas using estimated and predicted channel state information. Linear channel prediction, designed to be optimal in the mean-square sense, has been used. Simulation results show that the proposed technique achieve SNR gains up to 2dB at high SNRs and high mobile speed.","PeriodicalId":235698,"journal":{"name":"2015 Asia-Pacific Conference on Computer Aided System Engineering","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123203558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bent functions have important applications in cryptography and coding theory, but there are many open problems in bent functions. No formal method is known to construct all bent functions, and their number is also unknown for variables of more than eight by now. Different constructions of bent functions are proposed using different techniques, some are extremely brief. In this paper we study the relation and enumeration of some constructions of bent functions. We prove that Steinbach et al.'s construction include all the bent functions of Rothaus's construction and its extension. The comparison shows that Boolean differential equation is a powerful tool which constructs a relative large subset of all bent functions.
{"title":"Relations between Different Constructions of Bent Functions and Their Enumerations","authors":"Chunhui Wu, B. Steinbach","doi":"10.1109/APCASE.2015.61","DOIUrl":"https://doi.org/10.1109/APCASE.2015.61","url":null,"abstract":"Bent functions have important applications in cryptography and coding theory, but there are many open problems in bent functions. No formal method is known to construct all bent functions, and their number is also unknown for variables of more than eight by now. Different constructions of bent functions are proposed using different techniques, some are extremely brief. In this paper we study the relation and enumeration of some constructions of bent functions. We prove that Steinbach et al.'s construction include all the bent functions of Rothaus's construction and its extension. The comparison shows that Boolean differential equation is a powerful tool which constructs a relative large subset of all bent functions.","PeriodicalId":235698,"journal":{"name":"2015 Asia-Pacific Conference on Computer Aided System Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121786989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Solano-Quinde, Brett M. Bode, Arun Kumar Somani
Graphics Processing Units (GPUs) have been successfully used to accelerate scientific applications due to their computation power and the availability of programming languages that make more approachable writing scientific applications for GPUs. However, since the programming model of GPUs requires offloading all the data to the GPU memory, the memory footprint of the application is limited to the size of the GPU memory. Multi-GPU systems can make memory limited problems tractable by parallelizing the computation and data among the available GPUs. Parallelizing applications written for running on single-GPU systems can be done (i) at runtime through an environment that captures the memory operations and kernel calls and distributes among the available GPUs, and (ii) at compile time through a pre-compiler that transforms the application for decomposing the data and computation among the available GPUs. In this paper we propose a framework and implement a tool that transforms an OpenCL application written to run on single-GPU systems into one that runs on multi-GPU systems. Based on data dependencies and data usage analysis, the application is transformed to decompose data and computation among the available GPUs. To reduce the data transfer overhead, computation-communication overlapping techniques are utilized. We tested our tool using two applications with different data transfer requirements, for the application with no data transfer requirements, a linear speedup is achieved, while for the application with data transfers, the computation-communication overlapping reduces the communication overhead by 40%.
{"title":"Automatic Parallelization of GPU Applications Using OpenCL","authors":"L. Solano-Quinde, Brett M. Bode, Arun Kumar Somani","doi":"10.1109/APCASE.2015.56","DOIUrl":"https://doi.org/10.1109/APCASE.2015.56","url":null,"abstract":"Graphics Processing Units (GPUs) have been successfully used to accelerate scientific applications due to their computation power and the availability of programming languages that make more approachable writing scientific applications for GPUs. However, since the programming model of GPUs requires offloading all the data to the GPU memory, the memory footprint of the application is limited to the size of the GPU memory. Multi-GPU systems can make memory limited problems tractable by parallelizing the computation and data among the available GPUs. Parallelizing applications written for running on single-GPU systems can be done (i) at runtime through an environment that captures the memory operations and kernel calls and distributes among the available GPUs, and (ii) at compile time through a pre-compiler that transforms the application for decomposing the data and computation among the available GPUs. In this paper we propose a framework and implement a tool that transforms an OpenCL application written to run on single-GPU systems into one that runs on multi-GPU systems. Based on data dependencies and data usage analysis, the application is transformed to decompose data and computation among the available GPUs. To reduce the data transfer overhead, computation-communication overlapping techniques are utilized. We tested our tool using two applications with different data transfer requirements, for the application with no data transfer requirements, a linear speedup is achieved, while for the application with data transfers, the computation-communication overlapping reduces the communication overhead by 40%.","PeriodicalId":235698,"journal":{"name":"2015 Asia-Pacific Conference on Computer Aided System Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128556158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Borowik, T. Luba, Cezary Jankowski, Michal A Mankowski
Classification is one of the main issues of data mining. Knowledge hidden in the data can be discovered by induction of decision rules. However, with the increase in the size of the decision tables there is a need to decompose the problem. An appropriate solution to this problem may be hierarchical induction of decision rules. In this article the decomposition algorithm of decision tables containing multi-valued attributes has been presented. It has also been shown that efficient algorithms derived from logic synthesis may be applied to the hierarchical induction of decision tables. Experimental results have proven that by using presented methods one can achieve a considerable data compression and acceleration of calculations.
{"title":"Decision Table Decomposition for Further Rule Induction","authors":"G. Borowik, T. Luba, Cezary Jankowski, Michal A Mankowski","doi":"10.1109/APCASE.2015.25","DOIUrl":"https://doi.org/10.1109/APCASE.2015.25","url":null,"abstract":"Classification is one of the main issues of data mining. Knowledge hidden in the data can be discovered by induction of decision rules. However, with the increase in the size of the decision tables there is a need to decompose the problem. An appropriate solution to this problem may be hierarchical induction of decision rules. In this article the decomposition algorithm of decision tables containing multi-valued attributes has been presented. It has also been shown that efficient algorithms derived from logic synthesis may be applied to the hierarchical induction of decision tables. Experimental results have proven that by using presented methods one can achieve a considerable data compression and acceleration of calculations.","PeriodicalId":235698,"journal":{"name":"2015 Asia-Pacific Conference on Computer Aided System Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122974954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Valencia-Redrovan David, Guijarro-Rubio Octavio, Basantes-Montero David, Enriquez-Champutiz Victor
The UAV (Unmanned Aerial Vehicles) they have demonstrated their enormous capabilities in military and civilian applications in recent years. They have become an indispensable tool in the field of defense, security and support for the development of a nation. Similarly, the technological development has allowed these aircraft to fly autonomously thanks to electronic control systems called autopilots. The functional architecture of the autopilot which has been presented in this paper bases its operation on fuzzy logic for complete control of the aircraft, in stability, altitude, course, direction and acceleration using the minimum possible controls, reducing the computational processing. The system presented is tested through multiple flight hours in different climatic conditions, the results are satisfactory and the system shows to be really promising. Both the hardware and software of the proposed control system are the result of teamwork of Ecuadorian researchers.
{"title":"Analysis, Design, and Implementation of an Autopilot for Unmanned Aircraft - UAV's Based on Fuzzy Logic","authors":"Valencia-Redrovan David, Guijarro-Rubio Octavio, Basantes-Montero David, Enriquez-Champutiz Victor","doi":"10.1109/APCASE.2015.42","DOIUrl":"https://doi.org/10.1109/APCASE.2015.42","url":null,"abstract":"The UAV (Unmanned Aerial Vehicles) they have demonstrated their enormous capabilities in military and civilian applications in recent years. They have become an indispensable tool in the field of defense, security and support for the development of a nation. Similarly, the technological development has allowed these aircraft to fly autonomously thanks to electronic control systems called autopilots. The functional architecture of the autopilot which has been presented in this paper bases its operation on fuzzy logic for complete control of the aircraft, in stability, altitude, course, direction and acceleration using the minimum possible controls, reducing the computational processing. The system presented is tested through multiple flight hours in different climatic conditions, the results are satisfactory and the system shows to be really promising. Both the hardware and software of the proposed control system are the result of teamwork of Ecuadorian researchers.","PeriodicalId":235698,"journal":{"name":"2015 Asia-Pacific Conference on Computer Aided System Engineering","volume":" 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120829380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hybrid systems and tools have been developed on several computer areas along years, for harnessing of advantages of different approaches. Monitoring is one of the goals of hybrid computer systems. However there is not a complete hybrid system for monitoring Wireless Sensor Networks (WSN) operation. This work presents a proposal of a Hybrid Monitoring System (HMS) for WSN. It consists on a combination of active and passive approaches. This achieves a complete view of WSN behavior with very low intrusion on the observed system. Active components consist on monitor nodes attached to WSN nodes. Passive component is implemented by means of a sniffer network. Data collected by both components is sent to a server for analysis and visualization. The proposed HMS provides enough information about WSN performance in order to determine sources of problems.
{"title":"Hybrid Monitoring Proposal for Wireless Sensor Network","authors":"Marlon Navia, A. Bonastre, J. Campelo","doi":"10.1109/APCASE.2015.63","DOIUrl":"https://doi.org/10.1109/APCASE.2015.63","url":null,"abstract":"Hybrid systems and tools have been developed on several computer areas along years, for harnessing of advantages of different approaches. Monitoring is one of the goals of hybrid computer systems. However there is not a complete hybrid system for monitoring Wireless Sensor Networks (WSN) operation. This work presents a proposal of a Hybrid Monitoring System (HMS) for WSN. It consists on a combination of active and passive approaches. This achieves a complete view of WSN behavior with very low intrusion on the observed system. Active components consist on monitor nodes attached to WSN nodes. Passive component is implemented by means of a sniffer network. Data collected by both components is sent to a server for analysis and visualization. The proposed HMS provides enough information about WSN performance in order to determine sources of problems.","PeriodicalId":235698,"journal":{"name":"2015 Asia-Pacific Conference on Computer Aided System Engineering","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115142781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}