Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645890
J. Panyavaraporn
Digital watermarking techniques embed information in multimedia, such as image, audio and video. The watermark has been resolved copyright ownership and verifying the integrity of content. This paper proposed a watermarking technique based on wavelet transform and binary watermark. The embedded algorithm has been done in two bands of video. Furthermore, the watermark extraction process does not need the original video sequence. The experimental results show the algorithm is more robust and it can achieve copyright protection and authentication.
{"title":"Multiple video watermarking algorithm based on wavelet transform","authors":"J. Panyavaraporn","doi":"10.1109/ISCIT.2013.6645890","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645890","url":null,"abstract":"Digital watermarking techniques embed information in multimedia, such as image, audio and video. The watermark has been resolved copyright ownership and verifying the integrity of content. This paper proposed a watermarking technique based on wavelet transform and binary watermark. The embedded algorithm has been done in two bands of video. Furthermore, the watermark extraction process does not need the original video sequence. The experimental results show the algorithm is more robust and it can achieve copyright protection and authentication.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123734058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645858
A. Marzaki, V. Bidal, R. Laffont, W. Rahajandraibe, J. Portal, R. Bouchakour
In this paper, a comparison between the DCG-FGT (Dual-Control-Gate Floating-Gate Transistor) and its equivalent circuit composed of standard components is proposed. We demonstrate the DCG-FGT advantages with measurement and simulations under electrical simulator (ELDO). It is not easily to reproduce the DCG-FGT operating mode with standard MOS technology.
{"title":"Study of comparison between the DCG-FGT and its equivalent circuit in MOS technology","authors":"A. Marzaki, V. Bidal, R. Laffont, W. Rahajandraibe, J. Portal, R. Bouchakour","doi":"10.1109/ISCIT.2013.6645858","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645858","url":null,"abstract":"In this paper, a comparison between the DCG-FGT (Dual-Control-Gate Floating-Gate Transistor) and its equivalent circuit composed of standard components is proposed. We demonstrate the DCG-FGT advantages with measurement and simulations under electrical simulator (ELDO). It is not easily to reproduce the DCG-FGT operating mode with standard MOS technology.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"452 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124297425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645823
Miftadi Sudjai, Le Chung Tran, F. Safaei
This paper proposes a simple, but efficient, adaptive space-time-frequency coded (STFC) multiband orthogonal frequency division multiplexing ultra-wideband (MB-OFDM UWB) system to improve the average BER performance for body-to-external link wireless body area network (WBAN) applications. The novelty of this paper is the proposed body direction based adaptive algorithm that controls the set of modulation scheme, space-time-frequency code (STFC) coding rate, and power of signal constellations implemented in STFC MB-OFDM UWB WBAN. Simulation results show that the proposed system can provide a consistent 1-2 dB improvement in the case of 2I1O configuration, and 1-3 dB improvement in a medium-to-high SNR region in the case of 2I2O configuration, compared to the non-adaptive system. The improvement practically means a possible reduction of 12.5%-50% of the total transmitted power to achieve the similar performance as the non-adaptive system. In other words, it can save significantly the power consumption and prolong the battery life of WBAN devices.
{"title":"A simple adaptive STFC MB-OFDM UWB system for WBAN applications","authors":"Miftadi Sudjai, Le Chung Tran, F. Safaei","doi":"10.1109/ISCIT.2013.6645823","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645823","url":null,"abstract":"This paper proposes a simple, but efficient, adaptive space-time-frequency coded (STFC) multiband orthogonal frequency division multiplexing ultra-wideband (MB-OFDM UWB) system to improve the average BER performance for body-to-external link wireless body area network (WBAN) applications. The novelty of this paper is the proposed body direction based adaptive algorithm that controls the set of modulation scheme, space-time-frequency code (STFC) coding rate, and power of signal constellations implemented in STFC MB-OFDM UWB WBAN. Simulation results show that the proposed system can provide a consistent 1-2 dB improvement in the case of 2I1O configuration, and 1-3 dB improvement in a medium-to-high SNR region in the case of 2I2O configuration, compared to the non-adaptive system. The improvement practically means a possible reduction of 12.5%-50% of the total transmitted power to achieve the similar performance as the non-adaptive system. In other words, it can save significantly the power consumption and prolong the battery life of WBAN devices.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124348802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645918
Kanjana Pattanaworapan, K. Chamnongthai, Jing-Ming Guo
This paper presents an approach for hand gesture recognition that can be employed to enhance the capability of existing applications, especially in sign language communication. For practical use, the hand posture is taken at the back instead of the front and occurred under unexpected background environment. Unlike the front-hand, the back hand view image is less information than the front-viewed. Thus, the recognition among lack of information is the challenge of this task. Codebook-based foreground detection model is used to detect the hand region under an unexpected background environment. Moreover, the Pixel-Based Hierarchical Feature method is proposed to extract the importance features which are further classified by Adaboosting that yields a high recognition rate. For performance evaluation, we have applied perturbation recognition rate analysis of five alphabet patterns and the experimental results shows that the proposed method provides higher recognition accuracy than existing method.
{"title":"Hand gesture recognition using codebook model and Pixel-Based Hierarchical-Feature Adaboosting","authors":"Kanjana Pattanaworapan, K. Chamnongthai, Jing-Ming Guo","doi":"10.1109/ISCIT.2013.6645918","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645918","url":null,"abstract":"This paper presents an approach for hand gesture recognition that can be employed to enhance the capability of existing applications, especially in sign language communication. For practical use, the hand posture is taken at the back instead of the front and occurred under unexpected background environment. Unlike the front-hand, the back hand view image is less information than the front-viewed. Thus, the recognition among lack of information is the challenge of this task. Codebook-based foreground detection model is used to detect the hand region under an unexpected background environment. Moreover, the Pixel-Based Hierarchical Feature method is proposed to extract the importance features which are further classified by Adaboosting that yields a high recognition rate. For performance evaluation, we have applied perturbation recognition rate analysis of five alphabet patterns and the experimental results shows that the proposed method provides higher recognition accuracy than existing method.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116618385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645895
W. Sae-Tang, M. Fujiyoshi, H. Kiya
This paper proposes an intensity range reduction method for amplitude-only images (AOIs) which are inversely transformed amplitude components of images and are used in the digital fingerprinting-based image trading system. The conventional method using two dimensional discrete Fourier transformation (2D DFT) causes intensity range (IR) of AOIs too large to store and/or transmit, and random sign assignment (RSA) is needed in the conventional method to reduce the IR of AOIs. The proposed method uses one dimensional discrete cosine transformation (1D DCT) to generate AOIs with low IRs. In the proposed method, RSA is not needed, and the computational complexity is reduced by using 1D frequency transformation instead of 2D frequency transformation. By using DCT signs instead of DFT phases, a binary image can be used for storing and transmitting DCT signs of a purchased image from a content provider to a consumer; memory and bandwidth consumption is significantly reduced in the proposed method. In addition, a series of inverse DCT, quantization, inverse quantization, and DCT is not needed to handle DCT signs in the proposed method. That is, not only process reduction but also perfect handling of DCT signs which leads to high quality of fingerprinted images is achieved by the proposed method. Experimental results confirm the effectiveness of the proposed method in terms of both quality of fingerprinted images and fingerprinting performance.
{"title":"An intensity range reduction method for the image trading system with digital fingerprinting in visually protected domain","authors":"W. Sae-Tang, M. Fujiyoshi, H. Kiya","doi":"10.1109/ISCIT.2013.6645895","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645895","url":null,"abstract":"This paper proposes an intensity range reduction method for amplitude-only images (AOIs) which are inversely transformed amplitude components of images and are used in the digital fingerprinting-based image trading system. The conventional method using two dimensional discrete Fourier transformation (2D DFT) causes intensity range (IR) of AOIs too large to store and/or transmit, and random sign assignment (RSA) is needed in the conventional method to reduce the IR of AOIs. The proposed method uses one dimensional discrete cosine transformation (1D DCT) to generate AOIs with low IRs. In the proposed method, RSA is not needed, and the computational complexity is reduced by using 1D frequency transformation instead of 2D frequency transformation. By using DCT signs instead of DFT phases, a binary image can be used for storing and transmitting DCT signs of a purchased image from a content provider to a consumer; memory and bandwidth consumption is significantly reduced in the proposed method. In addition, a series of inverse DCT, quantization, inverse quantization, and DCT is not needed to handle DCT signs in the proposed method. That is, not only process reduction but also perfect handling of DCT signs which leads to high quality of fingerprinted images is achieved by the proposed method. Experimental results confirm the effectiveness of the proposed method in terms of both quality of fingerprinted images and fingerprinting performance.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117289414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645925
M. Barakat, C. Ritz, D. Stirling
User generated video product reviews in social media gaining popularity every day due to its creditability and the broad evaluation context provided by it. Extracting sentiment automatically from such videos will help the consumers making decisions and producers improving their products. This paper investigates the feasibility of sentiment detection temporally from those videos by analyzing the transcription generated by a speech recognition system which was not investigated before. Another two main contribution for this paper is introducing a solution to the problem of fixed threshold estimation for the Naïve Bayesian classifier output probabilities and irrelative text filtering for improving the sentiment classification. Various experiments indicated the proposed system can achieve an F-score of 0.66 which is promising knowing that the sentiment classifier offers an F-score of 0.78 provided that the input text is error free.
{"title":"Temporal sentiment detection for user generated video product reviews","authors":"M. Barakat, C. Ritz, D. Stirling","doi":"10.1109/ISCIT.2013.6645925","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645925","url":null,"abstract":"User generated video product reviews in social media gaining popularity every day due to its creditability and the broad evaluation context provided by it. Extracting sentiment automatically from such videos will help the consumers making decisions and producers improving their products. This paper investigates the feasibility of sentiment detection temporally from those videos by analyzing the transcription generated by a speech recognition system which was not investigated before. Another two main contribution for this paper is introducing a solution to the problem of fixed threshold estimation for the Naïve Bayesian classifier output probabilities and irrelative text filtering for improving the sentiment classification. Various experiments indicated the proposed system can achieve an F-score of 0.66 which is promising knowing that the sentiment classifier offers an F-score of 0.78 provided that the input text is error free.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114981351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645921
Phimmarin Keerin, W. Kurutach, Tossapon Boongoen
Gene expressions measured during a microarray experiment usually encounter the native problem of missing values. These are due to possible errors occurring in the primary experiments, image acquisition and interpretation processes. Leaving this unsolved may critically degrade the reliability of any consequent downstream analysis or medical application. Yet, a further study of microarray data may not be possible with many standard analysis methods that require a complete data set. This paper introduces a new method to impute missing values in microarray data. The proposed algorithm, CLLS impute, is an extension of local least squares imputation with local data clustering being incorporated for improved quality and efficiency. Gene expression data is typically represented as a matrix whose rows and columns corresponds to genes and experiments, respectively. CLLS kicks off by finding a complete dataset via the removal of rows with missing value(s). Then, gene clusters and their corresponding centroids are obtained by applying a clustering technique on the complete dataset. A set of similar genes of the target gene (with missing values) are those belonging to the cluster, whose centroid is the closest to the target. Having known this, the target gene is imputed by applying regression analysis with similar genes previously determined. Empirical evaluation with several published gene expression datasets suggest that the proposed technique performs better than the classical local least square method and recently developed techniques found in the literature.
{"title":"An improvement of missing value imputation in DNA microarray data using cluster-based LLS method","authors":"Phimmarin Keerin, W. Kurutach, Tossapon Boongoen","doi":"10.1109/ISCIT.2013.6645921","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645921","url":null,"abstract":"Gene expressions measured during a microarray experiment usually encounter the native problem of missing values. These are due to possible errors occurring in the primary experiments, image acquisition and interpretation processes. Leaving this unsolved may critically degrade the reliability of any consequent downstream analysis or medical application. Yet, a further study of microarray data may not be possible with many standard analysis methods that require a complete data set. This paper introduces a new method to impute missing values in microarray data. The proposed algorithm, CLLS impute, is an extension of local least squares imputation with local data clustering being incorporated for improved quality and efficiency. Gene expression data is typically represented as a matrix whose rows and columns corresponds to genes and experiments, respectively. CLLS kicks off by finding a complete dataset via the removal of rows with missing value(s). Then, gene clusters and their corresponding centroids are obtained by applying a clustering technique on the complete dataset. A set of similar genes of the target gene (with missing values) are those belonging to the cluster, whose centroid is the closest to the target. Having known this, the target gene is imputed by applying regression analysis with similar genes previously determined. Empirical evaluation with several published gene expression datasets suggest that the proposed technique performs better than the classical local least square method and recently developed techniques found in the literature.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115430900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645893
B. Kailkhura, Y. Han, Swastik Brahma, P. Varshney
In distributed detection systems, nodes make one bit decisions regarding the presence of a phenomenon and collaboratively make a global decision at the fusion center (FC). The performance of such systems strongly depends on the reliability of the nodes in the network. The robustness of distributed detection systems against attacks is of utmost importance for the functioning of distributed detection systems. The distributed nature of such systems makes them quite vulnerable to different types of attacks. In this paper, we introduce the problem of intelligent data falsification attacks on distributed detection systems. First, we propose a scheme to detect data falsification attacks and analytically characterize its performance. Next, we obtain the optimal attacking strategy from the point of view of a smart adversary to disguise itself from the proposed detection scheme while accomplishing its attack.
{"title":"On covert data falsification attacks on distributed detection systems","authors":"B. Kailkhura, Y. Han, Swastik Brahma, P. Varshney","doi":"10.1109/ISCIT.2013.6645893","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645893","url":null,"abstract":"In distributed detection systems, nodes make one bit decisions regarding the presence of a phenomenon and collaboratively make a global decision at the fusion center (FC). The performance of such systems strongly depends on the reliability of the nodes in the network. The robustness of distributed detection systems against attacks is of utmost importance for the functioning of distributed detection systems. The distributed nature of such systems makes them quite vulnerable to different types of attacks. In this paper, we introduce the problem of intelligent data falsification attacks on distributed detection systems. First, we propose a scheme to detect data falsification attacks and analytically characterize its performance. Next, we obtain the optimal attacking strategy from the point of view of a smart adversary to disguise itself from the proposed detection scheme while accomplishing its attack.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124975962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645897
Shu-Wei Sun, Xiang-Yuan Liu, Lei-Bo Liu, Cao Peng
This paper proposes a reconfigurable SoC architecture based on a large-scale reconfigurable processing elements (PEs) array, a high-performance RISC core and several embedded peripherals on-chip, which are coupled tightly through System buses of AMBA2.0. The large-scale PEs array is used to process video signals with different standards under appropriate contexts disposed dynamically. The embedded peripherals are with responsibility for the input of media stream data and output of the decoded multimedia data to display, while the RISC core takes charge of the initialization of the peripherals and the reconfigurable PEs, the pretreatment of media stream data, the audio decoding, the synchronization between audio and video data, and some other scheduling functions. The antitype SoC chip is implemented based on 65nm CMOS silicon techniques, and the testing results show that the reconfigurable SoC achieves the performance of real-time decoding of videos with size of 1920*1080 @ 30fps which follow the H.264, AVS and MPEG-2 standards respectively.
{"title":"Design and implementation of a reconfigurable SoC for high-definition video applications","authors":"Shu-Wei Sun, Xiang-Yuan Liu, Lei-Bo Liu, Cao Peng","doi":"10.1109/ISCIT.2013.6645897","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645897","url":null,"abstract":"This paper proposes a reconfigurable SoC architecture based on a large-scale reconfigurable processing elements (PEs) array, a high-performance RISC core and several embedded peripherals on-chip, which are coupled tightly through System buses of AMBA2.0. The large-scale PEs array is used to process video signals with different standards under appropriate contexts disposed dynamically. The embedded peripherals are with responsibility for the input of media stream data and output of the decoded multimedia data to display, while the RISC core takes charge of the initialization of the peripherals and the reconfigurable PEs, the pretreatment of media stream data, the audio decoding, the synchronization between audio and video data, and some other scheduling functions. The antitype SoC chip is implemented based on 65nm CMOS silicon techniques, and the testing results show that the reconfigurable SoC achieves the performance of real-time decoding of videos with size of 1920*1080 @ 30fps which follow the H.264, AVS and MPEG-2 standards respectively.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123396046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-24DOI: 10.1109/ISCIT.2013.6645924
Wimonrat Runghimmawan, W. Chatlatanagulchai, P. Sooraksa
Hard disk drives are used for storage information in its recording disk or media. Actuator arm is mechanical part to move heads that fly over a track from any position to the target track. Accuracy signal and access time are the key parameters to control the actuator seeking position. However, the accuracy signal and access time are adverse when actuator moves faster and then the system create the residual vibration at the target track. The causes of the vibration are part from the fact that the reference signals, which are acceleration, velocity, and position, have high power spectrum energy over wide frequency range including over the actuator's natural frequency. The input shaping is convolved two signals at referent position signal and properly designed impulse signal. The impulse sequence produces an input signal to cancel residual vibration, then the result is smoother and the residual vibration is canceled in actuator-arm movement. Hence the residual vibration should be reduced by the recommended input shaping.
{"title":"Track-seeking control using input-shaping method to reduce vibration in HDD","authors":"Wimonrat Runghimmawan, W. Chatlatanagulchai, P. Sooraksa","doi":"10.1109/ISCIT.2013.6645924","DOIUrl":"https://doi.org/10.1109/ISCIT.2013.6645924","url":null,"abstract":"Hard disk drives are used for storage information in its recording disk or media. Actuator arm is mechanical part to move heads that fly over a track from any position to the target track. Accuracy signal and access time are the key parameters to control the actuator seeking position. However, the accuracy signal and access time are adverse when actuator moves faster and then the system create the residual vibration at the target track. The causes of the vibration are part from the fact that the reference signals, which are acceleration, velocity, and position, have high power spectrum energy over wide frequency range including over the actuator's natural frequency. The input shaping is convolved two signals at referent position signal and properly designed impulse signal. The impulse sequence produces an input signal to cancel residual vibration, then the result is smoother and the residual vibration is canceled in actuator-arm movement. Hence the residual vibration should be reduced by the recommended input shaping.","PeriodicalId":356009,"journal":{"name":"2013 13th International Symposium on Communications and Information Technologies (ISCIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127710749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}