Proceedings of the 2nd International Conference on Advances in Computer Science and Engineering (CSE 2013)

Session: Electronics Engineering

20 articles
Proceedings Article

Various New Methods of Implementing AVK

T. Bhunai
Researchers have proposed many data encryption techniques / standards to protect data from various types of attacks like brute force attack, frequency attack and differential frequency attack. Shannon [1-2] documented the theory of perfect secrecy with time variant key. An idea of time variant key namely...
Proceedings Article

Cbufferless: A Novel Congestion Control for Bufferless Networks On-Chip

Jili Yan, Xiaola Lin, Guoming Lai
In this paper, we propose a novel distributed source-throttling congestion control mechanism for bufferless NoC, called Cbufferless. Our strategy uses a novel congestion detection and control model, computing deflection rate of routing flit and throttling message injection. The congestion information...
Proceedings Article

Power Quality Improvement by Shunt Active Performance Filters Emulated by Artificial Intelligence Techniques

Radek Martinek, Jakub Manas, Jan Zidek, Petr Bilik
This article is focused on progressive strategies of shunt active performance filters with intension to compensate higher harmonic currents of non-linear load. The authors of this article deal with usage of a combination of fuzzy system techniques and artificial intelligence, which is also known as Adaptive...
Proceedings Article

Fractional Order Modeling and Control of Depth System of AUV A Case Study

Sneha D. Joshu, B.D. Talange
In this paper Fractional Order Proportional Integral Derivative Controller (FOPID) is designed for Depth system of Autonomous Underwater Vehicle (AUV). For real time and actual implementation fractional order PID Controller is approximated. Numerous simulation comparisons are mentioned in this paper....
Proceedings Article

Tracking Object Using Particle Filter and DCT features

Cong Lin, Chi-Man Pun
In this paper, we proposed an object tracking method for video stream based on conventional particle filter. Feature vectors are extracted from coefficient matrices of Discrete Cosine Transform (DCT). The feature, as experiment showed, is very robust to occlusion and rotation and it is not sensitive...
Proceedings Article

The Research on Attack Threat Sensing based on "Software Security Sensor"

Yuan Zhao, Qiangbo Liu, Dingyi Fang, Huaijun Wang, Cong Zhang
Aim at the different attack threats the running software faced with during reversing, a method of sensing attack threats based on "software security sensor "is proposed in this paper. And the instance has demonstrated that the method is effective and feasible. Drawing lessons from the thought of physical...
Proceedings Article

Shortening of the Automata Cycle of Industrial Communication System Nodes

Marcin Sidzina, Andrzej Kwiecie, Jacek Stój
The distributed computer systems applied in industry are usually of the real-time type. In those systems the maximal system response time has to be always well known in order to ensure the functional as well as the safety parameters of the system. However, the system response time may be subject to change...
Proceedings Article

Study on Chebyshev FIR Filters in Airborne Gravity Data Processing

Wei Zhou, Tijing Cai, Zeyang Xu
In order to pick up the low-frequency gravity anomaly from airborne gravity data, a finite impulse response (FIR) low-pass digital filter with the Chebyshev approximation theorem was designed, and the filtering effects of three design parameters were studied. Results show that the filter order may amplify...
Proceedings Article

Sequential QoS Mapping Model for Multi-layerVideo Delivery in 802.11e Wireless Networks

Lamia Romdhani, Abr Mohamed
Multi-layer video transmission over wireless networks poses numerous challenges due to symantec nature of the encoded video and the intrinsic dependency between the video layers, which, if not considered, may cause severe quality degradation. In this paper, we present a new analytical model leveraging...
Proceedings Article

Low Voltage Ride through Capability Improvement of DFIG using Feed Forward Current Regulator

D.S. Bankar, D.B. Talange
Doubly fed induction generator have become the most common type of wind turbine generators. These wind plants are required to have grid ride through capabilities. [1] However, this type of generator is susceptible to grid-side low voltage and short circuits due to existence of a power electronics converter...
Proceedings Article

Using Fuzzy Inference System to Develop an Optimal Tube Voltage and Tube Current Chart for Radiation Reduction in Pediatric CT Examinations

Ying Bai, Gupta Sunil, Xue Bai, Dali Wang
Many different techniques and researches on reducing the radiation dose for computed tomography (CT) examinations have been reported and developed in recent 30 years. However, most those technologies are not practical enough to enable them to be directly and easily implemented in clinic real applications...
Proceedings Article

BTS-SRP: An Energy-Efficient Concurrency Control Protocol for Embedded Real-Time Systems

Jun Wu, Jun-Xing Wu
In this paper, we explored the scheduling problem of dependent real-time tasks that may access multiunit resources on a non-ideal dynamic voltage scaling (DVS) processor. Based on the stack resource policy (SRP) protocol and the earliest deadline first (EDF) algorithm, we propose an approach, called...
Proceedings Article

S-wane Model Designed to Improve Security Association Negotiation Process in IPv6

Khadidiatou Wane Keïta, Alex Corenthin, Claude Lishou, Sidi Mouhamed Farssi
Network security is a major concern as well as a very active research field today. Internet Protocol version 6 has been developed as a result. For a matter of fact, this new IP protocol is based on a number of mechanisms designed to handle specific security services. The main security services supported...
Proceedings Article

Survivability-Oriented APT Penetration Analysis

Pengfei Wang, Wentao Zhao, Fan Zhang
This article foremost introduces the survivability theory into the analysis of APT penetration, proposes the concept of penetration survivability and addresses it from the basic attributes of concealment, recoverability, self-adaptability and evolutionary. Proposed a survivability-oriented APT penetration...
Proceedings Article

Energy Aware Battery Powered Electric Vehicles:A Predictive Model Driven Approach

Dennis Babu, Anirudh Kumar, Joydeb Roychowdhury
Active energy management for power optimization is essential for successful commercialization of battery powered electric vehicles. In this paper we propose and implement an energy aware electric vehicle using an efficient battery management system, EffBMS which estimates the remaining charge of the...
Proceedings Article

Lightweight Model Driven Process to Ensure Model Traceability and a Case for SYSMOD

Saulius Pavalkis, Lina Nemuraite
When various software and systems development methodologies may be used in an organization, a problem becomes the process how to ensure project traceability independently from a chosen development method. Current state of traceability implementations in CASE tools lack flexibility, customizability and...
Proceedings Article

Application of parallel-hierarchical transformations for rapid recognition of dynamic images based on GPU technology

Leonid Timchenko, Nataliya Kokriatskaia, Andriy Yarovyy, Igor Ivasyuk, Alyona Denysova
The paper presents a method of parallel-hierarchical transformations for rapid recognition of dynamic images using GPU technology. Direct parallel-hierarchical transformations based on cluster CPU-and GPU-oriented hardware platform. Mathematic models of training of the parallel hierarchical (PH) network...
Proceedings Article

Online Handwriting Recognition Using an Accelerometer-Based Pen Device

Wang Jeen-Shing, Hsu Yu-Liang, Chu Cheng-Ling
This paper presents an accelerometer-based pen device for online handwriting recognition applications. The accelerometer-based pen device consists of a triaxial accelerometer, a microcontroller, and an RF wireless transmission module. Users can hold the pen device to write numerals in air without space...
Proceedings Article

A Novel Causal Model Based Distributed Fault Detection Method For Locomotive Electric Traction System

Shu Cheng, Te-fang Chen, Wei Li, Rong-jun Ding
Aimed on the massive computation burden, lack of precise fault mathematic model and uncertainty of analysis method on subsystem parasitic parameters, a novel distributed fault diagnosis Method based on causal Model has been proposed. By the way of splitting entire system into several causal independent...
Proceedings Article

Design of a Control System of Single-Head Pneumatic Hinging Machine Based on STC90C58

Yu Xie
The spectacle frame and earpiece of plate glasses frame are connected by a hinge. The hinge is welded into the plastic spectacle frame or temple tip by using microcomputer control, but the hinging equipment is very expensive. So STC90C58 is chosen as the control core. We have designed a low-cost control...