Pub Date : 2016-06-12DOI: 10.1109/MECO.2016.7525728
Y. Bekhtin, A. A. Bryantsev, P. Babayan
This paper describes the relatively simple algorithm for quick calculating rough estimators of point source coordinates within an image formed by onboard IR-sensor having the line of photoelements with interlaced photosensitive squares. It is assumed that the diameter of the light spot from the point object is equal to the size of the photoelement. The algorithm based on the iterative least square method uses the model which describes the cases when the spot is put on both three and two squares, small quantity of samples for channel impulses, voltage shifts and correlated white noise for each photoelement. The experiments have shown that the suggested algorithm provides with accuracy of point source coordinates up to few hundredth of the square size that allows replacing routine processing of whole image.
{"title":"Onboard rough estimation of point source coordinates for linear IR-sensor","authors":"Y. Bekhtin, A. A. Bryantsev, P. Babayan","doi":"10.1109/MECO.2016.7525728","DOIUrl":"https://doi.org/10.1109/MECO.2016.7525728","url":null,"abstract":"This paper describes the relatively simple algorithm for quick calculating rough estimators of point source coordinates within an image formed by onboard IR-sensor having the line of photoelements with interlaced photosensitive squares. It is assumed that the diameter of the light spot from the point object is equal to the size of the photoelement. The algorithm based on the iterative least square method uses the model which describes the cases when the spot is put on both three and two squares, small quantity of samples for channel impulses, voltage shifts and correlated white noise for each photoelement. The experiments have shown that the suggested algorithm provides with accuracy of point source coordinates up to few hundredth of the square size that allows replacing routine processing of whole image.","PeriodicalId":253666,"journal":{"name":"2016 5th Mediterranean Conference on Embedded Computing (MECO)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121826418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-12DOI: 10.1109/MECO.2016.7525731
V. I. Koshelev, V. G. Andrejev
This work aims to modify the structure of frequency-multichannel filter for processing fluctuating signals with staggered period, analyze the efficiency of the modified filter and estimate additional computational costs required for its implementation in comparison with frequency-multichannel filter based on the fast Fourier transform (FFT). We also consider the issues involved in simplification of modeling random staggered-period signals by means of the parallel structure of autoregressive filters.
{"title":"Modeling and processing of fluctuating signals with staggered period","authors":"V. I. Koshelev, V. G. Andrejev","doi":"10.1109/MECO.2016.7525731","DOIUrl":"https://doi.org/10.1109/MECO.2016.7525731","url":null,"abstract":"This work aims to modify the structure of frequency-multichannel filter for processing fluctuating signals with staggered period, analyze the efficiency of the modified filter and estimate additional computational costs required for its implementation in comparison with frequency-multichannel filter based on the fast Fourier transform (FFT). We also consider the issues involved in simplification of modeling random staggered-period signals by means of the parallel structure of autoregressive filters.","PeriodicalId":253666,"journal":{"name":"2016 5th Mediterranean Conference on Embedded Computing (MECO)","volume":"1991 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125513581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-12DOI: 10.1109/MECO.2016.7525697
V. Ruchkin, Marat Mahmudov, V. Romanchuk, V. Fulin, B. Kostrov, E. Ruchkina
The current research looks at possibilities of creating a smart compiler based on explicit and implicit cluster parallelism, and suggests a design option. With this view, smart compilation procedures are studied, and we also analyze the algorithms of explicit parallelism, and define a production model of and expert system to monitor operations and build a route. We define an algorithm of implicit parallelism of multi-criterion fuzzy choice based on definitions of algorithms of “criteria value evaluation” and “route effectiveness evaluation”.
{"title":"Smart compiler embedded computing systems based on cluster parallelism","authors":"V. Ruchkin, Marat Mahmudov, V. Romanchuk, V. Fulin, B. Kostrov, E. Ruchkina","doi":"10.1109/MECO.2016.7525697","DOIUrl":"https://doi.org/10.1109/MECO.2016.7525697","url":null,"abstract":"The current research looks at possibilities of creating a smart compiler based on explicit and implicit cluster parallelism, and suggests a design option. With this view, smart compilation procedures are studied, and we also analyze the algorithms of explicit parallelism, and define a production model of and expert system to monitor operations and build a route. We define an algorithm of implicit parallelism of multi-criterion fuzzy choice based on definitions of algorithms of “criteria value evaluation” and “route effectiveness evaluation”.","PeriodicalId":253666,"journal":{"name":"2016 5th Mediterranean Conference on Embedded Computing (MECO)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132687640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-12DOI: 10.1109/MECO.2016.7525733
Igor Jovančević, Al Arafat, J. Orteu, T. Sentenac
In this paper, we propose a new approach to detect and inspect airplane tires. We use normalized correlation based template matching to detect tires and GrabCut segmentation method to extract them from the background. We inspect the tires condition by investigating the tire treads. Ridge based intensity profiling gives satisfying inspection results.
{"title":"Airplane tire inspection by image processing techniques","authors":"Igor Jovančević, Al Arafat, J. Orteu, T. Sentenac","doi":"10.1109/MECO.2016.7525733","DOIUrl":"https://doi.org/10.1109/MECO.2016.7525733","url":null,"abstract":"In this paper, we propose a new approach to detect and inspect airplane tires. We use normalized correlation based template matching to detect tires and GrabCut segmentation method to extract them from the background. We inspect the tires condition by investigating the tire treads. Ridge based intensity profiling gives satisfying inspection results.","PeriodicalId":253666,"journal":{"name":"2016 5th Mediterranean Conference on Embedded Computing (MECO)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116718818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-12DOI: 10.1109/MECO.2016.7525693
Tijana Vujicic, S. Scepanovic, J. Jovanović
As software systems have become increasingly complex and sophisticated, the process of defining requirements for software development has become increasingly demanding and challenging. Still, requirements elicitation is a necessity in any software development project that aims to create solution that will satisfy human and technical needs. There is no unique approach to requirements engineering, and project team should define methodology for requirements elicitation and management, and accordingly choose the right requirement engineering techniques. Requirements elicitation is especially challenging when software users originate from countries with different culturally and technology diverse conditions. Often, socio-cultural factors appear as the core constrains to use software across different countries. In this paper authors as a part of project team present requirements elicitation methodology used in FP7 project Enhanced Government Learning (EAGLE). EAGLE project aims to introduce e-learning and open educational resources in public administration institutions in culturally and technologically diverse European countries.
{"title":"Requirements elicitation in culturally and technologically diverse settings","authors":"Tijana Vujicic, S. Scepanovic, J. Jovanović","doi":"10.1109/MECO.2016.7525693","DOIUrl":"https://doi.org/10.1109/MECO.2016.7525693","url":null,"abstract":"As software systems have become increasingly complex and sophisticated, the process of defining requirements for software development has become increasingly demanding and challenging. Still, requirements elicitation is a necessity in any software development project that aims to create solution that will satisfy human and technical needs. There is no unique approach to requirements engineering, and project team should define methodology for requirements elicitation and management, and accordingly choose the right requirement engineering techniques. Requirements elicitation is especially challenging when software users originate from countries with different culturally and technology diverse conditions. Often, socio-cultural factors appear as the core constrains to use software across different countries. In this paper authors as a part of project team present requirements elicitation methodology used in FP7 project Enhanced Government Learning (EAGLE). EAGLE project aims to introduce e-learning and open educational resources in public administration institutions in culturally and technologically diverse European countries.","PeriodicalId":253666,"journal":{"name":"2016 5th Mediterranean Conference on Embedded Computing (MECO)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116745797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-12DOI: 10.1109/MECO.2016.7525719
V. Lesnikov, T. Naumovich, A. Chastikov, Denis Garsh
One of parts of digital signal processing is processing with undersampling. In this case, the sampling frequency is lower, than it is required by the sampling theorem. At undersampling, the spectrum of signals is distorted by an aliasing. Various ways of correction of the arising distortions are known. These ways are known under the name the unaliasing. In this article, one more method of the unaliasing is offered. It is offered to carry out multirate digital signal processing in parallel in two channels. Sampling frequencies in these channels are various. Both sampling frequencies are less, than the theorem of counting demands. The method is based on consecutive performance of several stages. At each stage on the next interval of frequencies, the part of a range is restored. Length of an interval is equal to a difference of two sampling frequencies. Therefore, the number of steps is defined by a relationship of width of the restored range and the interval size. For calculations, only subtraction operations are required. In paper, application of the offered way for restoration of a power range is shown. The same way can be applied also to complex Fourier-spectrum.
{"title":"Unaliasing of undersampled spectra","authors":"V. Lesnikov, T. Naumovich, A. Chastikov, Denis Garsh","doi":"10.1109/MECO.2016.7525719","DOIUrl":"https://doi.org/10.1109/MECO.2016.7525719","url":null,"abstract":"One of parts of digital signal processing is processing with undersampling. In this case, the sampling frequency is lower, than it is required by the sampling theorem. At undersampling, the spectrum of signals is distorted by an aliasing. Various ways of correction of the arising distortions are known. These ways are known under the name the unaliasing. In this article, one more method of the unaliasing is offered. It is offered to carry out multirate digital signal processing in parallel in two channels. Sampling frequencies in these channels are various. Both sampling frequencies are less, than the theorem of counting demands. The method is based on consecutive performance of several stages. At each stage on the next interval of frequencies, the part of a range is restored. Length of an interval is equal to a difference of two sampling frequencies. Therefore, the number of steps is defined by a relationship of width of the restored range and the interval size. For calculations, only subtraction operations are required. In paper, application of the offered way for restoration of a power range is shown. The same way can be applied also to complex Fourier-spectrum.","PeriodicalId":253666,"journal":{"name":"2016 5th Mediterranean Conference on Embedded Computing (MECO)","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114431902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-12DOI: 10.1109/MECO.2016.7525789
D. V. Almazov, A. D. Maslov, T. Kholomina, V. G. Mishustin, N. Vishnyakov, O. Konkov
In this paper the distribution of built-in electric field in p-i-n based on a-Si:H and heterojunction solar cells based on a-Si:H/c-Si is investigated. The theoretical simulation of electrophysical characteristics of barrier structures is performed. The distribution of built-in electric field in active layers is measured experimentally. Comparison of theoretical and experiential results is performed.
{"title":"Investigation of electric field distribution across the barrier silicon solar cells","authors":"D. V. Almazov, A. D. Maslov, T. Kholomina, V. G. Mishustin, N. Vishnyakov, O. Konkov","doi":"10.1109/MECO.2016.7525789","DOIUrl":"https://doi.org/10.1109/MECO.2016.7525789","url":null,"abstract":"In this paper the distribution of built-in electric field in p-i-n based on a-Si:H and heterojunction solar cells based on a-Si:H/c-Si is investigated. The theoretical simulation of electrophysical characteristics of barrier structures is performed. The distribution of built-in electric field in active layers is measured experimentally. Comparison of theoretical and experiential results is performed.","PeriodicalId":253666,"journal":{"name":"2016 5th Mediterranean Conference on Embedded Computing (MECO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133875922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-12DOI: 10.1109/MECO.2016.7525794
A. Varnavsky
Dependence of the integral evaluation of the human-machine system quality from the parameters of the operator labor organization is modeled based on a simulation model. The simulation model describes employee activities in the form of sequences of work and rest intervals. It is obtained the family of dependencies curves of private quality indicators and integrated assessment of the human-machine system quality from the number of rest intervals at different values of the initial work activity, the intensities of fatigue and recovery of operator.
{"title":"Simulation of quality level dependence of human-machine system on the parameters of the operator labor organization","authors":"A. Varnavsky","doi":"10.1109/MECO.2016.7525794","DOIUrl":"https://doi.org/10.1109/MECO.2016.7525794","url":null,"abstract":"Dependence of the integral evaluation of the human-machine system quality from the parameters of the operator labor organization is modeled based on a simulation model. The simulation model describes employee activities in the form of sequences of work and rest intervals. It is obtained the family of dependencies curves of private quality indicators and integrated assessment of the human-machine system quality from the number of rest intervals at different values of the initial work activity, the intensities of fatigue and recovery of operator.","PeriodicalId":253666,"journal":{"name":"2016 5th Mediterranean Conference on Embedded Computing (MECO)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132739875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-12DOI: 10.1109/MECO.2016.7525689
Arsim Susuri, Mentor Hamiti, A. Dika
Applying machine learning algorithms for detecting vandalism in two languages are described in this paper. Vandalism is a major issue in Wikipedia as it accounts for about 1% of edits during 2015. The majority of vandalism is from human editors, whose vandalism can be traced through access and edit logs. In this paper, we propose using a list of classifiers in one language, and then evaluate them across languages in two datasets: the hourly count of views of each Wikipedia article, and the used edit history of articles. For this purpose, Simple English and Albanian Wikipedia datasets will be used. The results obtained show that the characteristic features of vandalism can be learned from view and edit patterns, and models built in one language can be applied successfully to other languages.
{"title":"Machine learning based detection of vandalism in Wikipedia across languages","authors":"Arsim Susuri, Mentor Hamiti, A. Dika","doi":"10.1109/MECO.2016.7525689","DOIUrl":"https://doi.org/10.1109/MECO.2016.7525689","url":null,"abstract":"Applying machine learning algorithms for detecting vandalism in two languages are described in this paper. Vandalism is a major issue in Wikipedia as it accounts for about 1% of edits during 2015. The majority of vandalism is from human editors, whose vandalism can be traced through access and edit logs. In this paper, we propose using a list of classifiers in one language, and then evaluate them across languages in two datasets: the hourly count of views of each Wikipedia article, and the used edit history of articles. For this purpose, Simple English and Albanian Wikipedia datasets will be used. The results obtained show that the characteristic features of vandalism can be learned from view and edit patterns, and models built in one language can be applied successfully to other languages.","PeriodicalId":253666,"journal":{"name":"2016 5th Mediterranean Conference on Embedded Computing (MECO)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116662728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-12DOI: 10.1109/MECO.2016.7525730
Mirza Husovic, V. Dokovic
In the paper, an image watermark procedure based on Hermite projection method is presented. The watermark is embedded into the coefficients used for the Hermite expansion. Different number of the Hermite function is chosen for the image reconstruction and at the same time, watermark embedding. Therefore, image compression and watermarking is done within the same procedure. This enables the protection of copyrights for different applications that demand the image compression, data and recording protection which are transferred via Internet. The theory is proved with the experimental result. Image is reconstructed by using different number of Hermite functions. Image quality is proved by measuring Peak signal-to-noise ratio (PSNR) and watermark detection performance is tested by observing standard correlator response.
{"title":"Hermite expansion method for the image watermarking","authors":"Mirza Husovic, V. Dokovic","doi":"10.1109/MECO.2016.7525730","DOIUrl":"https://doi.org/10.1109/MECO.2016.7525730","url":null,"abstract":"In the paper, an image watermark procedure based on Hermite projection method is presented. The watermark is embedded into the coefficients used for the Hermite expansion. Different number of the Hermite function is chosen for the image reconstruction and at the same time, watermark embedding. Therefore, image compression and watermarking is done within the same procedure. This enables the protection of copyrights for different applications that demand the image compression, data and recording protection which are transferred via Internet. The theory is proved with the experimental result. Image is reconstructed by using different number of Hermite functions. Image quality is proved by measuring Peak signal-to-noise ratio (PSNR) and watermark detection performance is tested by observing standard correlator response.","PeriodicalId":253666,"journal":{"name":"2016 5th Mediterranean Conference on Embedded Computing (MECO)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122342073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}