Pub Date : 2012-05-16DOI: 10.1109/ECTICON.2012.6254219
A. Serirojanakul, M. Wongsaisuwan
In this paper, the control of a quad-rotor helicopter is considered. The nonlinear model of the quad-rotor is transformed to a linear model subject to time-varying parameters called linear parameter-varying (LPV) systems. Then, the composite quadratic Lyapunov function and the quadratic cost function are used to find the optimal state feedback gain. To obtain the optimal solution, the LPV control problem is cast to the semi-definite programing problem with a set of Linear Matrix Inequality (LMI) constraints. The simulation results are provided to demonstrate the effectiveness of the proposed method.
{"title":"Optimal control of quad-rotor helicopter using state feedback LPV method","authors":"A. Serirojanakul, M. Wongsaisuwan","doi":"10.1109/ECTICON.2012.6254219","DOIUrl":"https://doi.org/10.1109/ECTICON.2012.6254219","url":null,"abstract":"In this paper, the control of a quad-rotor helicopter is considered. The nonlinear model of the quad-rotor is transformed to a linear model subject to time-varying parameters called linear parameter-varying (LPV) systems. Then, the composite quadratic Lyapunov function and the quadratic cost function are used to find the optimal state feedback gain. To obtain the optimal solution, the LPV control problem is cast to the semi-definite programing problem with a set of Linear Matrix Inequality (LMI) constraints. The simulation results are provided to demonstrate the effectiveness of the proposed method.","PeriodicalId":6319,"journal":{"name":"2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology","volume":"12 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2012-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80648623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-16DOI: 10.1109/ECTICON.2012.6254318
S. Nuttawong, S. Naetiladdanon, A. Sangswang, C. Koompai
This paper presents a dsPIC-based constant power controller for induction heating applications. The controller keeps the operation in the inductive mode by providing the minimum phase difference between the output voltage and current. The current limiting protection is also applied. The experiment is set up with a steel crucible of 83 mm in diameter and 100 mm in height with aluminum inside. The output power is controlled to be constant at a certain value from 100 to 800 W and the crucible is heated from the room temperature until the aluminum is melted at 700 °C. The experimental results confirm the validity of the proposed controller.
{"title":"A dsPIC-based constant power controller for induction heating applications","authors":"S. Nuttawong, S. Naetiladdanon, A. Sangswang, C. Koompai","doi":"10.1109/ECTICON.2012.6254318","DOIUrl":"https://doi.org/10.1109/ECTICON.2012.6254318","url":null,"abstract":"This paper presents a dsPIC-based constant power controller for induction heating applications. The controller keeps the operation in the inductive mode by providing the minimum phase difference between the output voltage and current. The current limiting protection is also applied. The experiment is set up with a steel crucible of 83 mm in diameter and 100 mm in height with aluminum inside. The output power is controlled to be constant at a certain value from 100 to 800 W and the crucible is heated from the room temperature until the aluminum is melted at 700 °C. The experimental results confirm the validity of the proposed controller.","PeriodicalId":6319,"journal":{"name":"2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology","volume":"72 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2012-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90541855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-16DOI: 10.1109/ECTICON.2012.6254170
T. Pramoun, T. Amornraksa
This paper proposes a new color image watermarking scheme based on coefficients modification in LL sub-band. Basically, the blue component of original color image is decomposed by the Discrete Wavelet Transform (DWT) to obtain the coefficients in LL sub-band in order for embedding a single watermark bit with a tuned constant value to achieve the optimum watermark strength. To extract this embedded bit, the original DWT coefficients in LL sub-band are predicted using the DWT, and then subtracted from the watermarked coefficient to obtain the extracted watermark bit. The same proposed concept is also extended to embed several bits into the whole image frame in order to improve capacity and robustness of embedded information. The efficiency of the watermarking scheme is evaluated by the Bit Error Rate (BER) from the extracted bits, and compared to the two previous schemes at equivalent image quality. The experiments show promising results in both accuracy and robustness of the extracted watermark.
{"title":"Improved image watermarking scheme based on DWT coefficients modification in LL sub-band","authors":"T. Pramoun, T. Amornraksa","doi":"10.1109/ECTICON.2012.6254170","DOIUrl":"https://doi.org/10.1109/ECTICON.2012.6254170","url":null,"abstract":"This paper proposes a new color image watermarking scheme based on coefficients modification in LL sub-band. Basically, the blue component of original color image is decomposed by the Discrete Wavelet Transform (DWT) to obtain the coefficients in LL sub-band in order for embedding a single watermark bit with a tuned constant value to achieve the optimum watermark strength. To extract this embedded bit, the original DWT coefficients in LL sub-band are predicted using the DWT, and then subtracted from the watermarked coefficient to obtain the extracted watermark bit. The same proposed concept is also extended to embed several bits into the whole image frame in order to improve capacity and robustness of embedded information. The efficiency of the watermarking scheme is evaluated by the Bit Error Rate (BER) from the extracted bits, and compared to the two previous schemes at equivalent image quality. The experiments show promising results in both accuracy and robustness of the extracted watermark.","PeriodicalId":6319,"journal":{"name":"2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology","volume":"23 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2012-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73568500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-16DOI: 10.1109/ECTICON.2012.6254291
T. Wiangtong, S. Prongnuch
This paper presents the use of Visual C++ integrated with OpenCV library as a framework for video analysis applications. Conventionally, applications are developed and control using textual-based Win32 console. In this work, however, the library can be applied in Windows form that helps users to visually control algorithms implemented in applications. The framework, written in OOP style, tailors the existing library into three main class methods; initializing, running and ending. Streaming data can be captured from USB cameras, IP cameras and video files. Implementing computer vision algorithms include object counting and object monitoring is demonstrated. Results show that algorithms work well and they can be developed in short time.
{"title":"Computer vision framework for object monitoring","authors":"T. Wiangtong, S. Prongnuch","doi":"10.1109/ECTICON.2012.6254291","DOIUrl":"https://doi.org/10.1109/ECTICON.2012.6254291","url":null,"abstract":"This paper presents the use of Visual C++ integrated with OpenCV library as a framework for video analysis applications. Conventionally, applications are developed and control using textual-based Win32 console. In this work, however, the library can be applied in Windows form that helps users to visually control algorithms implemented in applications. The framework, written in OOP style, tailors the existing library into three main class methods; initializing, running and ending. Streaming data can be captured from USB cameras, IP cameras and video files. Implementing computer vision algorithms include object counting and object monitoring is demonstrated. Results show that algorithms work well and they can be developed in short time.","PeriodicalId":6319,"journal":{"name":"2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology","volume":"35 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2012-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76958053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-16DOI: 10.1109/ECTICON.2012.6254207
C. Chokchai, S. Chaimool, P. Akkaraekthalin
By coupling a fractal loop resonator onto the back of a loaded-fractal loop monopole and a shorted loop, a new triple-band USB dongle antenna has been achieved and presented. The proposed antenna supports WLAN (2.4-2.5 GHz and 5.15-5.875 GHz) and WiMAX (3.4-3.6 GHz) applications. Omnidirectional radiation patterns for the three bands are observed. The overall dimensions of the fabricated prototype are 10 mm × 42 mm ×0.8 mm, which is suitable for USB dongle. The design of proposed antenna and experimental results are discussed.
{"title":"Miniaturized triple-band USB dongle antenna using loaded-fractal loop monopole with shorted loop and fractal loop resonator","authors":"C. Chokchai, S. Chaimool, P. Akkaraekthalin","doi":"10.1109/ECTICON.2012.6254207","DOIUrl":"https://doi.org/10.1109/ECTICON.2012.6254207","url":null,"abstract":"By coupling a fractal loop resonator onto the back of a loaded-fractal loop monopole and a shorted loop, a new triple-band USB dongle antenna has been achieved and presented. The proposed antenna supports WLAN (2.4-2.5 GHz and 5.15-5.875 GHz) and WiMAX (3.4-3.6 GHz) applications. Omnidirectional radiation patterns for the three bands are observed. The overall dimensions of the fabricated prototype are 10 mm × 42 mm ×0.8 mm, which is suitable for USB dongle. The design of proposed antenna and experimental results are discussed.","PeriodicalId":6319,"journal":{"name":"2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology","volume":"42 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2012-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75073978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-16DOI: 10.1109/ECTICON.2012.6254126
Pawan Nunthanid, V. Niennattrakul, C. Ratanamahatana
Time series motif discovery is an increasingly popular research area in time series mining whose main objective is to search for interesting patterns or motifs. A motif is a pair of time series subsequences, or two subsequences whose shapes are very similar to each other. Typical motif discovery algorithm requires a predefined motif length as its parameter. Discovering motif with arbitrary lengths introduces another problem, where selecting a suitable length for the motif is non-trivial since domain knowledge is often required. Thus, this work proposes a parameter-free motif discovery algorithm called k-Best Motif Discovery (kBMD) which requires no parameter as input, and as a result returns a set of all “Best Motif” that are ranked by our proposed scoring function which is based on similarity of motif locations and similarity of motif shapes.
{"title":"Parameter-free motif discovery for time series data","authors":"Pawan Nunthanid, V. Niennattrakul, C. Ratanamahatana","doi":"10.1109/ECTICON.2012.6254126","DOIUrl":"https://doi.org/10.1109/ECTICON.2012.6254126","url":null,"abstract":"Time series motif discovery is an increasingly popular research area in time series mining whose main objective is to search for interesting patterns or motifs. A motif is a pair of time series subsequences, or two subsequences whose shapes are very similar to each other. Typical motif discovery algorithm requires a predefined motif length as its parameter. Discovering motif with arbitrary lengths introduces another problem, where selecting a suitable length for the motif is non-trivial since domain knowledge is often required. Thus, this work proposes a parameter-free motif discovery algorithm called k-Best Motif Discovery (kBMD) which requires no parameter as input, and as a result returns a set of all “Best Motif” that are ranked by our proposed scoring function which is based on similarity of motif locations and similarity of motif shapes.","PeriodicalId":6319,"journal":{"name":"2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology","volume":"12 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2012-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78342527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-16DOI: 10.1109/ECTICON.2012.6254143
P. Sriploy, P. Uthansakul, M. Uthansakul
Distributed beamforming technique has been introduced in the wireless sensor network (WANs) in order to increase the transmission range and signal strength of sensor node. The identical data is transmitted to the destination by all nodes which have timing and carrier synchronously. Then, the data transmissions are combined gainfully at the destination. Thus accuracy of reference signal for synchronization is extremely significant. Synchronization among nodes can achieve by utilizing the reference signals from Global Position System (GPS). This paper investigates into the effect of inaccuracy of the reference signals from GPS in term of node location (radii and phase of each node) on the beamforming performance. The simulation results show that a slightly imperfection of estimated node location can tremendously affect to the beamforming performance.
{"title":"An effect of imperfection in node location estimation on distributed beamforming","authors":"P. Sriploy, P. Uthansakul, M. Uthansakul","doi":"10.1109/ECTICON.2012.6254143","DOIUrl":"https://doi.org/10.1109/ECTICON.2012.6254143","url":null,"abstract":"Distributed beamforming technique has been introduced in the wireless sensor network (WANs) in order to increase the transmission range and signal strength of sensor node. The identical data is transmitted to the destination by all nodes which have timing and carrier synchronously. Then, the data transmissions are combined gainfully at the destination. Thus accuracy of reference signal for synchronization is extremely significant. Synchronization among nodes can achieve by utilizing the reference signals from Global Position System (GPS). This paper investigates into the effect of inaccuracy of the reference signals from GPS in term of node location (radii and phase of each node) on the beamforming performance. The simulation results show that a slightly imperfection of estimated node location can tremendously affect to the beamforming performance.","PeriodicalId":6319,"journal":{"name":"2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology","volume":"52 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2012-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72904625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-16DOI: 10.1109/ECTICON.2012.6254183
S. Prasopsuk, S. Phichaisawat
This paper presents the method to evaluate the reliability and interrupted energy rate for the high reliable electrical system. The evaluated system is the petrochemical plant system designed based on Tier classification that is a criterion to address a reliability level of electrical and mechanical infrastructure of the data center. This paper modifies the system to the different infrastructure for cost reduction. Then, both actual and modified systems are evaluated. The evaluated results show reliability indices and interrupted energy rates of both systems. These indices help comparing both systems that can guide for system design.
{"title":"Reliabilty and interrupted energy rate evaluation for electrical system based on Tier classification","authors":"S. Prasopsuk, S. Phichaisawat","doi":"10.1109/ECTICON.2012.6254183","DOIUrl":"https://doi.org/10.1109/ECTICON.2012.6254183","url":null,"abstract":"This paper presents the method to evaluate the reliability and interrupted energy rate for the high reliable electrical system. The evaluated system is the petrochemical plant system designed based on Tier classification that is a criterion to address a reliability level of electrical and mechanical infrastructure of the data center. This paper modifies the system to the different infrastructure for cost reduction. Then, both actual and modified systems are evaluated. The evaluated results show reliability indices and interrupted energy rates of both systems. These indices help comparing both systems that can guide for system design.","PeriodicalId":6319,"journal":{"name":"2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology","volume":"49 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2012-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74435123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-16DOI: 10.1109/ECTICON.2012.6254364
N. Promparn, T. Bunyagul, N. Charbkaew
This paper proposes the design of an algorithm to detect fault in underground cable for blocking auto-reclosing in distribution feeder of Metropolitan Electricity Authority (MEA). The algorithm consists of two major steps. First, overcurrent detection algorithm is applied to compare fault current with current setting. Next process, the impedance detection is used to identify the fault location base on comparing between the measuring and the setting of impedance value. Finally, these results (current & impedance) are used to make a decision of auto-recloser blocking. This paper also shows the results from software simulation and hardware simulation.
{"title":"Design of fault detection system for high voltage cable","authors":"N. Promparn, T. Bunyagul, N. Charbkaew","doi":"10.1109/ECTICON.2012.6254364","DOIUrl":"https://doi.org/10.1109/ECTICON.2012.6254364","url":null,"abstract":"This paper proposes the design of an algorithm to detect fault in underground cable for blocking auto-reclosing in distribution feeder of Metropolitan Electricity Authority (MEA). The algorithm consists of two major steps. First, overcurrent detection algorithm is applied to compare fault current with current setting. Next process, the impedance detection is used to identify the fault location base on comparing between the measuring and the setting of impedance value. Finally, these results (current & impedance) are used to make a decision of auto-recloser blocking. This paper also shows the results from software simulation and hardware simulation.","PeriodicalId":6319,"journal":{"name":"2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology","volume":"1 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2012-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82122997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-05-16DOI: 10.1109/ECTICON.2012.6254198
S. Jina, S. Tarnoi, W. Kumwilaisak
This paper proposes a new multi-rate H.264 scalable video multicast in lossy network using network coding. We first prioritize video layer based on its effect to the end-to-end video quality. Each video layer is routed via the path obtained from the optimization framework under the constraints on QoS guarantees. Different destinations may receive different number of video layers depended on their max flows. The bottleneck in the network is resolved by using network coding to ensure that all destinations can receive the rate equaling their max flows. The network coding is only applied within the same layer. Simulation and numerical results under randomly generated networks show the advantage of the proposed scheme in terms of objective and subject qualities of the end-to-end video.
{"title":"QoS-aware multi-rate H.264 scalable video multicast with network coding in lossy networks","authors":"S. Jina, S. Tarnoi, W. Kumwilaisak","doi":"10.1109/ECTICON.2012.6254198","DOIUrl":"https://doi.org/10.1109/ECTICON.2012.6254198","url":null,"abstract":"This paper proposes a new multi-rate H.264 scalable video multicast in lossy network using network coding. We first prioritize video layer based on its effect to the end-to-end video quality. Each video layer is routed via the path obtained from the optimization framework under the constraints on QoS guarantees. Different destinations may receive different number of video layers depended on their max flows. The bottleneck in the network is resolved by using network coding to ensure that all destinations can receive the rate equaling their max flows. The network coding is only applied within the same layer. Simulation and numerical results under randomly generated networks show the advantage of the proposed scheme in terms of objective and subject qualities of the end-to-end video.","PeriodicalId":6319,"journal":{"name":"2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology","volume":"9 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2012-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82629360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}