Pub Date : 2014-05-22DOI: 10.1109/AQTR.2014.6857848
M. Risteiu, I. Ileana, M. Muntean, G. Marc
Because the gas monitoring domestic use is important issue for all involved actors, many researchers and designers have approached this field. After a detailed state-of-arts analysis, in this paper deep research has been devoted for information flow and communication link design. Two important criteria have been established for information linking between collective residences and a general monitoring system, then ultra-low power Wi-Fi, and Zigbee-based devices have been used for experiments. Then, because of many unpredicted risk situations, a fuzzy model of gas leak risk evaluation has been designed. The used core device was a microcontroller with major roles: fuzzy/defuzzy processes, packet data link operating and processing, and regulatory user interface. Timed communication events and sets of action rules have been tested on the implemented system.
{"title":"A redundant solution for collective residences inflammable gas leaking monitoring using ultra-low power transmission system and automatic control","authors":"M. Risteiu, I. Ileana, M. Muntean, G. Marc","doi":"10.1109/AQTR.2014.6857848","DOIUrl":"https://doi.org/10.1109/AQTR.2014.6857848","url":null,"abstract":"Because the gas monitoring domestic use is important issue for all involved actors, many researchers and designers have approached this field. After a detailed state-of-arts analysis, in this paper deep research has been devoted for information flow and communication link design. Two important criteria have been established for information linking between collective residences and a general monitoring system, then ultra-low power Wi-Fi, and Zigbee-based devices have been used for experiments. Then, because of many unpredicted risk situations, a fuzzy model of gas leak risk evaluation has been designed. The used core device was a microcontroller with major roles: fuzzy/defuzzy processes, packet data link operating and processing, and regulatory user interface. Timed communication events and sets of action rules have been tested on the implemented system.","PeriodicalId":297141,"journal":{"name":"2014 IEEE International Conference on Automation, Quality and Testing, Robotics","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117352543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-22DOI: 10.1109/AQTR.2014.6857881
G. Daian, M. M. Santa, T. Letia
The European Commission adopted a roadmap for the next decade to build a competitive transport system that will increase mobility, remove major barriers in key areas and fuel growth and employment. Passenger Information system is a component of rail system that can grow the quality of services on railway market. One of the major problems of these systems are the prediction of arriving train time to intermediary or final station. This paper proposes a solution for railway network modeled with a development of UML components. The component behavior is modeled by Delay Time Petri Net (DTPN). These models detail the railway network into stations and further represent the resources and the time spent on each resource to calculate the remaining travel duration. Every delay in railway network involves an update of the planned routes with new arrival time estimation.
{"title":"Hierarchical railway traffic model for information systems","authors":"G. Daian, M. M. Santa, T. Letia","doi":"10.1109/AQTR.2014.6857881","DOIUrl":"https://doi.org/10.1109/AQTR.2014.6857881","url":null,"abstract":"The European Commission adopted a roadmap for the next decade to build a competitive transport system that will increase mobility, remove major barriers in key areas and fuel growth and employment. Passenger Information system is a component of rail system that can grow the quality of services on railway market. One of the major problems of these systems are the prediction of arriving train time to intermediary or final station. This paper proposes a solution for railway network modeled with a development of UML components. The component behavior is modeled by Delay Time Petri Net (DTPN). These models detail the railway network into stations and further represent the resources and the time spent on each resource to calculate the remaining travel duration. Every delay in railway network involves an update of the planned routes with new arrival time estimation.","PeriodicalId":297141,"journal":{"name":"2014 IEEE International Conference on Automation, Quality and Testing, Robotics","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126787541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-22DOI: 10.1109/AQTR.2014.6857908
C. Ionescu, F. Ionescu
It is known that the human brain reacts favorably to whatever it perceives as beautiful. It is also equally known that beauty is in fact an ideal symmetry in the objects, phenomena and natural processes of any kind. Using this insight, we have shown that patterns can be build to represent the human body in a concise, structural and geometrical form. In this paper we use the same insights to deduct the process of brain activation to mechanical stimuli of the skin receptors. This work is aimed to discuss the understanding of the pain transmission process in the body using tools from mathematics, i.e. fractional calculus.
{"title":"Power law and fractional derivative models can measure analgesia","authors":"C. Ionescu, F. Ionescu","doi":"10.1109/AQTR.2014.6857908","DOIUrl":"https://doi.org/10.1109/AQTR.2014.6857908","url":null,"abstract":"It is known that the human brain reacts favorably to whatever it perceives as beautiful. It is also equally known that beauty is in fact an ideal symmetry in the objects, phenomena and natural processes of any kind. Using this insight, we have shown that patterns can be build to represent the human body in a concise, structural and geometrical form. In this paper we use the same insights to deduct the process of brain activation to mechanical stimuli of the skin receptors. This work is aimed to discuss the understanding of the pain transmission process in the body using tools from mathematics, i.e. fractional calculus.","PeriodicalId":297141,"journal":{"name":"2014 IEEE International Conference on Automation, Quality and Testing, Robotics","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125679836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-22DOI: 10.1109/AQTR.2014.6857879
Sándor Lukács, Andrei V. Lutas, Dan H. Lutas, G. Sebestyen
We describe the implementation and the evaluation of a hypervisor level, hardware-enforced security solution suitable for the latest embedded platforms. Our solution is based on thin layer bare-metal hypervisor, a memory introspection engine and is validated on Silvermont microarchitecture based Intel x86 processors, running Windows. The approach is well suited to enhance the security of many POS and industrial embedded devices. We also present various kinds of attacks our solution defends against, and several remaining limitations.
{"title":"Hardware virtualization based security solution for embedded systems","authors":"Sándor Lukács, Andrei V. Lutas, Dan H. Lutas, G. Sebestyen","doi":"10.1109/AQTR.2014.6857879","DOIUrl":"https://doi.org/10.1109/AQTR.2014.6857879","url":null,"abstract":"We describe the implementation and the evaluation of a hypervisor level, hardware-enforced security solution suitable for the latest embedded platforms. Our solution is based on thin layer bare-metal hypervisor, a memory introspection engine and is validated on Silvermont microarchitecture based Intel x86 processors, running Windows. The approach is well suited to enhance the security of many POS and industrial embedded devices. We also present various kinds of attacks our solution defends against, and several remaining limitations.","PeriodicalId":297141,"journal":{"name":"2014 IEEE International Conference on Automation, Quality and Testing, Robotics","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130931086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-22DOI: 10.1109/AQTR.2014.6857913
O. Dragomir, Florin Dragomir
This paper proposes to prosumers a NN based decision support application for selecting an optimal forecasting tool for energy produced from renewable sources. The exploration and the assessment of criteria used for choosing a forecasting tool are made in the neural network (NN) framework. Firstly, the criteria for selecting the best forecasting tool are addressed. Secondly, the identified criteria are integrated in an object oriented software application, built using Matlab-Guide User Interface. In order to underline the effects of the users' decision making, in the third part, the forecasting performances of feed forward neural networks (FF-NN) are tested and evaluated.
{"title":"NN based support system for renewable energy forecasting","authors":"O. Dragomir, Florin Dragomir","doi":"10.1109/AQTR.2014.6857913","DOIUrl":"https://doi.org/10.1109/AQTR.2014.6857913","url":null,"abstract":"This paper proposes to prosumers a NN based decision support application for selecting an optimal forecasting tool for energy produced from renewable sources. The exploration and the assessment of criteria used for choosing a forecasting tool are made in the neural network (NN) framework. Firstly, the criteria for selecting the best forecasting tool are addressed. Secondly, the identified criteria are integrated in an object oriented software application, built using Matlab-Guide User Interface. In order to underline the effects of the users' decision making, in the third part, the forecasting performances of feed forward neural networks (FF-NN) are tested and evaluated.","PeriodicalId":297141,"journal":{"name":"2014 IEEE International Conference on Automation, Quality and Testing, Robotics","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130262739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-22DOI: 10.1109/AQTR.2014.6857898
S. Răileanu, T. Borangiu, O. Morariu, O. Stocklosa
The paper presents the design and realization of an optimization model for the jobshop planning and execution problem. The computational model is realized in using the IBM ILOG OPL application. The computation of optimized planning and scheduling is performed using the constraint programming technique. The model contains the input data (client orders and resource status), the objective function (makespan minimization) and the set of constraints related to the real execution of products and to the limitations of the production system. The proposed model, implemented in ILOG OPL, is integrated into a centralized Scheduling System which transfers the planning and scheduling results to the shop floor automation layer of the Manufacturing Execution System (MES).
{"title":"ILOG-based mixed planning and scheduling system for job-shop manufacturing","authors":"S. Răileanu, T. Borangiu, O. Morariu, O. Stocklosa","doi":"10.1109/AQTR.2014.6857898","DOIUrl":"https://doi.org/10.1109/AQTR.2014.6857898","url":null,"abstract":"The paper presents the design and realization of an optimization model for the jobshop planning and execution problem. The computational model is realized in using the IBM ILOG OPL application. The computation of optimized planning and scheduling is performed using the constraint programming technique. The model contains the input data (client orders and resource status), the objective function (makespan minimization) and the set of constraints related to the real execution of products and to the limitations of the production system. The proposed model, implemented in ILOG OPL, is integrated into a centralized Scheduling System which transfers the planning and scheduling results to the shop floor automation layer of the Manufacturing Execution System (MES).","PeriodicalId":297141,"journal":{"name":"2014 IEEE International Conference on Automation, Quality and Testing, Robotics","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134117964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-22DOI: 10.1109/AQTR.2014.6857927
M. Ungureșan, V. Muresan, T. Colosi
It is presented the numerical simulation of a control system, with PID algorithm, for a process modeled through a partial differential equation of second order (PDE II·2), with respect to time (t) and to a spatial variable (p). The details of using the PID control are pointed out, for an example of a system which contains a process with PDE II·2 structure. A technological process from the isotope separation domain is taken as example. The modeling procedure of this type of technical process is presented. Also, the open loop numerical simulation of the considered process is made.
{"title":"Control system for a distributed parameter process, with applications in isotope separation domain: Case study","authors":"M. Ungureșan, V. Muresan, T. Colosi","doi":"10.1109/AQTR.2014.6857927","DOIUrl":"https://doi.org/10.1109/AQTR.2014.6857927","url":null,"abstract":"It is presented the numerical simulation of a control system, with PID algorithm, for a process modeled through a partial differential equation of second order (PDE II·2), with respect to time (t) and to a spatial variable (p). The details of using the PID control are pointed out, for an example of a system which contains a process with PDE II·2 structure. A technological process from the isotope separation domain is taken as example. The modeling procedure of this type of technical process is presented. Also, the open loop numerical simulation of the considered process is made.","PeriodicalId":297141,"journal":{"name":"2014 IEEE International Conference on Automation, Quality and Testing, Robotics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115299799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-22DOI: 10.1109/AQTR.2014.6857877
S. Folea, G. Mois, M. Hulea, L. Miclea, Vio Biscu
This paper presents the development of an embedded system based on a programmable system-on-chip (PSoC), namely a temperature and humidity data logger. The main characteristics of the device consist in low power consumption, small dimensions and the possibility of easily reconfiguring the firmware. This later feature allows the use of a large number of probes in different combinations and in different scenarios. The recorded values are saved in an EPROM and can be retrieved by printing them on thermal paper or by copying them on an USB flash drive. The real-time clock, current measured values, the active alarms and the number of recordings in memory are displayed continuously on the attached LCD.
{"title":"Data logger for humidity and temperature measurement based on a programmable SoC","authors":"S. Folea, G. Mois, M. Hulea, L. Miclea, Vio Biscu","doi":"10.1109/AQTR.2014.6857877","DOIUrl":"https://doi.org/10.1109/AQTR.2014.6857877","url":null,"abstract":"This paper presents the development of an embedded system based on a programmable system-on-chip (PSoC), namely a temperature and humidity data logger. The main characteristics of the device consist in low power consumption, small dimensions and the possibility of easily reconfiguring the firmware. This later feature allows the use of a large number of probes in different combinations and in different scenarios. The recorded values are saved in an EPROM and can be retrieved by printing them on thermal paper or by copying them on an USB flash drive. The real-time clock, current measured values, the active alarms and the number of recordings in memory are displayed continuously on the attached LCD.","PeriodicalId":297141,"journal":{"name":"2014 IEEE International Conference on Automation, Quality and Testing, Robotics","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132303425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-22DOI: 10.1109/AQTR.2014.6857919
I. Stoian, S. Ignat, D. Capatina, O. Ghiran
SCADA systems are broadly employed in supervising and controlling industrial areas comprising manufacturing industries, traffic control, power plants, integrated water management systems (distribution, treatment and sewage). The security of SCADA systems represents a significant subject on account of the critical function that these systems perform in offering vital utility services. In nowadays industrial systems ubiquitous access to Internet enhance the vulnerabilities of SCADA systems, for the reason that this allows a remote attacker to obtain control of, or produce interruption to the network critical functions. The attacks affect the network control plane and /or the data plane. Critical infrastructures, requiring uninterrupted operation, maintenance, and protection, have need of robust and secured control SCADA systems. The paper intends to depicts the critical architectural constituents of these systems, detect vulnerabilities and possible threats, and illustrate protection techniques that may be set up in order to reduce attacks involving situation awareness solutions.
{"title":"Security and intrusion detection on critical SCADA systems for water management","authors":"I. Stoian, S. Ignat, D. Capatina, O. Ghiran","doi":"10.1109/AQTR.2014.6857919","DOIUrl":"https://doi.org/10.1109/AQTR.2014.6857919","url":null,"abstract":"SCADA systems are broadly employed in supervising and controlling industrial areas comprising manufacturing industries, traffic control, power plants, integrated water management systems (distribution, treatment and sewage). The security of SCADA systems represents a significant subject on account of the critical function that these systems perform in offering vital utility services. In nowadays industrial systems ubiquitous access to Internet enhance the vulnerabilities of SCADA systems, for the reason that this allows a remote attacker to obtain control of, or produce interruption to the network critical functions. The attacks affect the network control plane and /or the data plane. Critical infrastructures, requiring uninterrupted operation, maintenance, and protection, have need of robust and secured control SCADA systems. The paper intends to depicts the critical architectural constituents of these systems, detect vulnerabilities and possible threats, and illustrate protection techniques that may be set up in order to reduce attacks involving situation awareness solutions.","PeriodicalId":297141,"journal":{"name":"2014 IEEE International Conference on Automation, Quality and Testing, Robotics","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115076630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-05-22DOI: 10.1109/AQTR.2014.6857832
O. Elshazly, M. El-Bardini, N. El-Rabaie
In this paper, an adaptive fuzzy iterative learning control algorithm is proposed for controlling one of the Mecha-tronics systems. The proposed control scheme is based upon a proportional-derivative-integral (PID) iterative learning control (ILC), for which a fuzzy control is added to tune the parameters of the PID-type ILC. Moreover, an adaptation law is added to the fuzzy control in order to automatically select the proper fuzzy membership functions. The performance of proposed algorithm was assessed in computer numerical controlled (CNC) machine X-Y table to illustrate the validation and the effectiveness of the proposed procedure. The simulation results show that the proposed algorithm can reduce the trajectory error in a far less number of iterations.
{"title":"Adaptive fuzzy iterative learning controller for X-Y table position control","authors":"O. Elshazly, M. El-Bardini, N. El-Rabaie","doi":"10.1109/AQTR.2014.6857832","DOIUrl":"https://doi.org/10.1109/AQTR.2014.6857832","url":null,"abstract":"In this paper, an adaptive fuzzy iterative learning control algorithm is proposed for controlling one of the Mecha-tronics systems. The proposed control scheme is based upon a proportional-derivative-integral (PID) iterative learning control (ILC), for which a fuzzy control is added to tune the parameters of the PID-type ILC. Moreover, an adaptation law is added to the fuzzy control in order to automatically select the proper fuzzy membership functions. The performance of proposed algorithm was assessed in computer numerical controlled (CNC) machine X-Y table to illustrate the validation and the effectiveness of the proposed procedure. The simulation results show that the proposed algorithm can reduce the trajectory error in a far less number of iterations.","PeriodicalId":297141,"journal":{"name":"2014 IEEE International Conference on Automation, Quality and Testing, Robotics","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114346965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}