ICEST 2017: 52TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATION, COMMUNICATION AND ENERGY SYSTEMS AND TECHNOLOGIES
PROGRAM FOR FRIDAY, JUNE 30TH
Days:
previous day
all days

View: session overviewtalk overview

10:00-12:00 Session 4A: Electronics and Control Systems
Location: Room A
10:00
Energy Efficiency of Wireless Sensor Networks

ABSTRACT. Wireless sensor network includes a large number of simple sensor nodes that consist of sensor, microcontroller and transceiver block. Sensor nodes usually operate with non-rechargeable batteries so that the power consumption becomes a very important issue in the development of these networks. The main goal of this paper is to reduce power consumption of sensor nodes and extend the lifetime of batteries. The total power consumption of a sensor node is evaluated in real application conditions by using information from datasheets for all its blocks. Simulation results show that power-gating technique is superior in respect to power-saving, especially in the case when lower duty-cycling is implemented.

10:15
Mathematical Model of I2C Communication Based on Logics

ABSTRACT. The fundamental goal of this article is to demonstrate how to develop logic gates based driver for communication between two different hardware devices via I2C bus. Once the driver is assembled should be used among peripheral devices captured on this bus. The scope here is high level messages based on designed modules. Avoided is description of low level design which is fundamental for all blocks. Accordingly, the specification of the system, master and slave devices could be different quantity but synchronized. Requirements to the master devices are higher because of its functionality. The example presents driver to communicate with EEPROM memory 24C02. Analysis of researched results.

10:30
Analysis and Design of Ultra Low Voltage Converter

ABSTRACT. Micropower energy harvesting often requires transformation of the voltage from the primary source to somewhat higher output voltage for powering low power sensor modules. Ultra low voltage converter construction and details about the working principle are presented in this paper. Key moments in the design of such converters are the transformer and the switching transistor(s). Details are given on usage of different types of some transistors and transformers, minimum required voltage levels and later some additional directions for further work are described.

10:45
Parameter Estimation Depend on D-RGELS Algorithm for Box-Jenkins systems

ABSTRACT. This paper focuses on the parameter estimation problem for the input linear controlled autoregressive autoregressive moving average (CARARMA) models. First, we decompose the system into two subsystems, the parameter vector and the information vector of the system, and the parameter vector and the information vector of the noise in order to improve the computational efficiency. Next, The problem in using a standard recursive least squares algorithm is the parameter estimation vector of the systems cannot generate because the information vector contains unknown variables and unmeasurable noise terms. The decomposition based on the recursive generalized extended least squares algorithm is presented to solve the this problem by replace the unmeasurable variables in the information vector with their estimates. Finally, an illustrative simulation example indicates the efficiency of the proposed algorithm

11:00
Lambert W Function Application to Time-Delay Automatic Control Systems

ABSTRACT. The paper presents the design of the P (proportional) controller for integral time-delay systems by employing a pole placement method. By determining the set-point conditions on the selection of the dominant poles and the amplification coefficient of the controllers, systems stability in the absence of perturbations is guaranteed.

11:15
Sampled-Data Sliding Mode Control Design of Single-Link Flexible Joint Robotic Manipulator

ABSTRACT. In this paper, we have designed a sampled data control law for the single-link flexible joint robotic manipulator using two different approaches. First, we have designed the sampled-data sliding mode control (SMC) based on the continuous time system. In the second approach, we have obtained the approximate discrete model of the system and then designed discrete sliding mode control based on this approximate system. Simulation results have been obtained and a performance comparison has been presented for both techniques.

11:30
Guidance and Control System for Platoon of Autonomous Mobile Robots

ABSTRACT. This paper presents a concept of platoon movement of autonomous vehicles (smart cars). Autonomous vehicles have Adaptive or Advanced cruise control (ACC) system also called Intelligent cruise control (ICC) or Adaptive Intelligent cruise control (AICC) system. These vehicles are suitable to follow other vehicles on desired distance and to be organized in platoons. To be able to do research to the control and stability of an AGV (Automated Guided Vehicles) string, a car-following model is being determined. To do this, first a single vehicle is modelled and since all cars in the platoon have the same dynamics, the single vehicle model is copied ten times to form model of platoon (string) with ten vehicles. To control this string, equal PID controllers are applied to all vehicles, except the leading vehicle. For control of vehicle with nonlinear dynamics combination of feed-forward control and feedback control approach is used. For simulation and analysis of vehicle and platoon of vehicles Matlab/Simulink models are designed. Simulation results, discussions and conclusions are given and the end of the paper.

10:00-12:00 Session 4B: Computer Science and Internet Technologies I
Location: Room B
10:00
Enumeration of Bent Boolean Functions Using GPU with CUDA

ABSTRACT. Bent functions are special type of cryptographic Boolean functions. These functions make very small subset of the total number of bent functions, especially for large number of variables. Therefore, the only possible method for complete enumeration of bent function is obtained by using the exhaustive search of all possible functions. Testing of bentness across all possible functions, even for small numbers of variables, requires a lot of processing time. Thus, this paper proposes a parallel algorithm for enumeration of bent functions using GPU with CUDA. The algorithm is based on the usage of fast spectral transform calculations and certain restrictions that should be satisfied by bent functions in the spectral Reed-Muller domain. Experimental results showed that the proposed GPU-based algorithm can efficiently enumerate the bent functions of 6 to 10 variables.

10:15
Leveled Binary Trees and Integer Sequences Generation

ABSTRACT. This paper introduces a data structure called a leveled binary tree, as a a generalization of both the complete and full binary tree. It is shown how inserting nodes in a leveled binary tree, while maintaining a preference for a single direction (either strictly left or strictly right) makes the number of single-direction edges in the binary tree increase according to certain regularities. These regularities are formalized using mathematical formulae, which are presented and proved, and it is shown how they produce specific integer sequences which can be expanded to infinity.

10:30
Analysis of Classification Algorithms for using in Vertical Retrieval Systems

ABSTRACT. Classification is the most solved and the most used machine learning problem. In a last few decades many classification algorithms were developed. Because of that, always when classification is needed in some problem solving, the best algorithm should be selected. The problem that is analysed in this paper is choosing classification algorithms that can be used in vertical retrieval system for both document and query classification. We compered SVM, Multinomial Naïve Bayes algorithm, Bernoulli Naïve Bayes algorithm and Random forest. The experiments, that are presented in the paper, show that in the long documents classification SVM and Multinomial Naïve Bayes algorithms have a similar precision (SVM is a little better), but, the Multinomial Naive Bayes algorithm correctly classified 93.14% of queries, and SVM only 22.55%.

10:45
CSPlag: A Source Code Plagiarism Detection Using Syntax Trees and Intermediate Language

ABSTRACT. Different techniques can be used to detect plagiarism in the source code. However, they do not always give good results, especially when the code is deliberately altered to disguise the copied parts from different sources. This paper describes an approach that uses the syntax and semantic analysis of the code to perform the necessary pre-processing steps, and then compare the obtained abstract syntax trees and intermediate language code to determine the precise amount and the locations of the plagiarised code.

11:00
Software Tool for Planning and Monitoring of Provided Medical Services

ABSTRACT. Business planning and monitoring is a very complex process for any company or organization. The problem is especially pronounced in the health systems which are exclusively focused on patients and their health state. In addition to planning a sustainable business health institution, it is necessary to consider a plan for providing services and features in the prevention and treatment of diseases, as well as legislation and regulations governing the health care system of the Republic of Serbia. This paper describes the process of creating a plan for the provision of medical services using the implemented application Medis.NET.PlanRada. The problems that may arise in the planning process are also described. The application can be useful when planning medical services for a certain period of time, usually on an annual basis, as well as for monitoring the implementation of the execution plan in primary health care institutions.

11:15
Statistical Analysis of Dice CAPTCHA Usability

ABSTRACT. In this paper the elements of the CAPTCHA usability are analyzed. CAPTCHA, as a time progressive element in computer science, has been under constant interest of ordinary, professional as well as the scientific users of the Internet. The analysis is given based on the usability elements of CAPTCHA which are abbreviated as user-centric approach to the CAPTCHA. To demonstrate it, the specific type of Dice CAPTCHA is used in the experiment. The experiment is conducted on 190 Internet users with different demographic characteristics on laptop and tablet computers. The obtained results are statistically processed. At the end, the results are compared and conclusion of their use is drawn.

11:30
Tool for Interactive and Automatic Composition of Business Processes

ABSTRACT. Web services provide means for electronic execution of business processes. However, composition of services for this purpose may become a tedious task for non-IT professionals. In this paper we propose an approach to cope with this problem by developing a web-based software tool that is capable to propose to users appropriate services for creation of a business process. Afterwards the tool automatically compose and executes the selected services.

11:45
Analysis and Justification of Indicators for Quality Assessment of Data Centers

ABSTRACT. The quality of a Data Center (DC) can be assessed by different criteria. The purpose of this article is to analyse the indicators that can be used to assess the quality of DC from the point of view of the accessibility of the services provided. Based on the analysis is substantiated set of significant indicators for the DC quality. Quantification of the quality is offered using a complex generalized indicator, which can be used to benchmark between different DC’s and selects an optimal variant for concrete business case.

12:00-14:00 Session 5A: Radio Communications, Microwaves and Antennas
Location: Room A
12:00
On Wavelet Based Modeling of EMC Test Chambers – Economic Prediction of the Refined Expansion Coefficients

ABSTRACT. Electromagnetic compatibility (EMC) is a key issue in the present smart world, and most of EMC standards require measurement in either fully anechoic chambers or semi anechoic chambers or reverberation chambers. In order to give a sufficiently precise approximation on the measurement uncertainty, it is important to know, i.e., to measure and to model the electromagnetic field distribution inside the chamber around the device under test and the test antenna. A one dimensional simplified model is presented for electromagnetic field distribution modelling with a straightforward possibility to extend to higher dimensions. Wavelets are ideal tools for modelling such environments, where the length scale of the obstacles vary, like the test chambers with different sizes of devices under test.

12:15
Evaluation of Variances in Infrared Thermography of a Human Face During the Mental Workload

ABSTRACT. The aim of this study was to explore the relationships between the temperatures of different areas of a person's face in mental workload (MWL). Correlations between points and areas and assessments have been sought and made of the averages and variances during the experiment with a group of people. The brains of these people were initially at rest, and then were loaded with arithmetic calculations.

12:30
Miniaturized Hairpin Defected Ground Structure Filter Design

ABSTRACT. The paper presents research of miniaturized hairpin defected ground structure resonator, corresponding coupling topologies and filter design. The resonance frequency dependence of the resonator according to the length of the coupled lines is investigated. The coupling topologies are simulated in fullwave electromagnetic simulator and the coupling coefficient is derived. Using curve-fitting technique, useful design formulas are proposed for filter synthesis. In order to verify the proposed synthesis procedure, an example filter design is performed. There is a good agreement between the simulated and theoretical results.

12:45
A Comparison of Techniques for Characterizing Varied Microstrip Lines

ABSTRACT. The varied microstrip taper is fully characterized in frequency-domain. A comparison of different techniques for the line characterization is done. The accuracy of the used methods is studied using analysis of linearly tapered microstrip line. Results of numerical simualtions compared with the analytical solutions show good agreement.

13:00
Improving Shielding Effectiveness of a Rectangular Metallic Enclosure with Aperture by Using Printed Dog-bone Dipole Structure

ABSTRACT. In this paper, the electromagnetic shielding results of both numerical and experimental models of an enclosure with a printed dog-bone dipole antenna inside are considered. This printed structure is placed inside the enclosure in order to improve the protective function of the enclosure. The impact of this structure on values of shielding effectiveness of the enclosure is analyzed, especially at the first resonance of the enclosure. In order to obtain the optimal results, the printed structure position inside the enclosure is changed in three parallel positions.

13:15
Study of a Bandwidth of Symmetrical Microstrip Antennas

ABSTRACT. This paper examines the bandwidth of symmetrical microstrip antennas with different 3D reflector plates. Both single symmetrical microstrip dipole and its array are investigated using WIPL-D software. Beside model of well-known symmetrical pentagonal dipole, the models of new symmetrical microstrip dipoles of different shapes are presented too.

13:30
Optimized through the Design of Experiment Theory X-pol Antenna for ISM Applications

ABSTRACT. In this study an optimization of X-pol antenna with reflector dimensions has been described. The goal is achieved using design of experiment theory for antenna suitable for use in 433MHz ISM band. This type of antenna is applicable on order to guarantee better communication in the available ICM bands, where the electromagnetic frequency resource is constantly take busier with more, even M2M, short or permanent in time data transfers.

12:00-14:00 Session 5B: Computer Science and Internet Technologies II
Location: Room B
12:00
Analysis and Mining of Big Spatio-temporal Data

ABSTRACT. Spatio-temporal data analysis and mining has become a critical component of the Big spatial data strategy for most organizations in various domains. The interdisciplinary nature of spatio-temporal data mining means that its techniques must be developed with awareness of the underlying application domains. During the process of data mining, it is important to adjust datasets to the mining task that is being performed, to take into account different temporal and spatial models while mining, and to validate or discard relationships mined from the data. In this paper we give a brief overview of spatio-temporal data analysis and mining process, as well as its demonstration on telecom and OSM data.

12:15
Ontology and Reasoning on Device Connectivity

ABSTRACT. In this paper, we present an approach to cloud application orchestration. The approach allows detection and resolution of interactions among cloud applications. The approach is based on ontology for IoT device connectivity. It is illustrated for applications which add functionality to basic bearer selection procedure.

12:30
An Approach to Design Interfaces for Trust, Security and Load Management in Mobile Edge Computing

ABSTRACT. Mobile Edge Computing (MEC) is an emerging technology aimed to increase network flexibility and to reduce time to market for new services. It brings the cloud capabilities in radio access network. In this paper, we present an approach to design core MEC Web Services for trust and security management, and for load level management. The proposed Web Services allows MEC application registration, discovery of available services and registered applications, and signing service agreement for service usage, as well as control on internal load management.

12:45
E-commerce Development with respect to its Security Issues and Solutions: A Literature Review

ABSTRACT. In today's era of the digital world, we cannot imagine a single day without the use of Internet. Along with the use of internet E-commerce (Electronic commerce) business is growing extremely fast and getting much more in use, compared with other businesses. There are many reasons why maximum customers are using online shopping, some of the reasons are, it is low-cost, real-time, interactive, personalized, cross domain, etc. Due to the use of E-commerce customers can get the real experience in the virtual world. The percentage of customers using the E -shopping is increasing rapidly because it is fast, efficient and which is of economic advantage too. In E-commerce development, the question of security and trust always has been in doubt. The technology is improving day by day, which is a positive sign but at the same time, this improvement creates more and more issues as well. The customer's interest for adaptation of E-commerce is mainly dependent on three factors which are customer's attitude towards online transaction systems, security and the last is trust in the reliability of online product suppliers. Personal information security is major concerns for customers and merchants dealing with in E-commerce. As the popularity of E-commerce increases so the threats grow. Till from the development of the concept of E-commerce many security issues are related to it. In this paper E-commerce development is considered with respect to its security issues and solutions. This paper also has a summary of different issues facing by E-commerce systems. This paper also highlights the summary of security solutions proposed by different researchers.we have also proposed one security model for E-commerce.

13:00
An Approach of Network Protection Against DDoS Attacks

ABSTRACT. An approach of network protection against Distributes Denial of Services (DDoS) attacks is proposed. The research is focused on attacks targeting network resources. Radware attack mitigation solution called DefensePro is used and configured in order to protect the network resource of a data center. The efficiency of the proposed network protection is verified experimentally.

13:15
Review of Modern Virtual Reality HMD Devices and Development Tools

ABSTRACT. The paper describes the development of virtual reality with an emphasis on HMD devices and tools for application development. Firstly, we will describe popular VR HMD devices for PC, mobiles, and consoles. Secondly, we will describe the development environment for native, multi-platform and web applications. Next, through the development of VR software application, we will introduce best practices for VR development and user experience standards.

13:30
Computer Application for Simple Sustainability Assessment

ABSTRACT. Sustainable development has a long history that captured a lot in wide and depth both in theory and practice. Many claimed that a corner stone in the building of “sustainable development” had been marked by John Elkington in 1997 with his “Cannibals and forks – the Triple Bottom Line of 21st century business”. Increasing importance of “sustainable” even made captured “domain of sustainable” wider and deeper in last 17 years, too. UN Millennium Goals from 2000 and Agenda for Sustainable Development in 2015 engraved permanent landmarks in building of society with sustainable development. Therefore, there are many authors who try to develop methods for sustainability assessment/evaluation. In this paper we describe a computer application that we have developed, which enables simple first level assessment of sustainability.

13:45
Optimized Port Allocation Algorithm for Deflection Router with Minimal Buffering

ABSTRACT. In this work we present solutions for improving performance of deflection router with minimal buffering. Proposed solutions modify the both, port allocation algorithm and architecture of the baseline deflection router. In the modified architecture, the buffer inject stage is placed at the output, instead of input of the port allocation stage. The optimized algorithm uses prioritized instead of randomized selection while choosing deflected flit for in-router buffering. Evaluations show that the proposed modifications yield an improvement of 11% in network saturation throughput under uniform traffic pattern.