{"title":"Perception in autonomous ground vehicles","authors":"C. Ilas","doi":"10.1109/ECAI.2013.6636180","DOIUrl":"https://doi.org/10.1109/ECAI.2013.6636180","url":null,"abstract":"This paper reviews current approaches, challenges, objectives, architecture and trends in the perception, one of the most important systems in autonomous ground vehicles AGV. Several implementations reported in the literature in the past five years are reviewed to see the evolution and to determine the main areas for future research.","PeriodicalId":105698,"journal":{"name":"Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013","volume":"35 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120937041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A neural networks application in ergonomics","authors":"A. Ene, D. Anghel","doi":"10.1109/ECAI.2013.6636177","DOIUrl":"https://doi.org/10.1109/ECAI.2013.6636177","url":null,"abstract":"In this paper is presented a feed forward neural networks application in ergonomics. The neural network is used to quantify from the ergonomics point of view, a working place. Based on the combination of six input measurable parameters, the working place is characterized with one from the following three categories: “good”, “medium” or “poor”. The six input parameters that are taken into account by our application are: temperature, humidity, noise, luminosity, weight and frequency. The Java application crates the feed forward neural network, trains it using a set of training patterns and then tests it using real data. The experiment and the Java application were made at University of Pitesti.","PeriodicalId":105698,"journal":{"name":"Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114193022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EM performance improvements through advanced winding techniques","authors":"Blaz Stefe, G. Lampič","doi":"10.1109/ECAI.2013.6636159","DOIUrl":"https://doi.org/10.1109/ECAI.2013.6636159","url":null,"abstract":"For the development of new electric motor winding techniques a detailed knowledge in the currently used techniques is essential; therefore a review of the most commonly used winding techniques is provided in this paper, focusing on the winding of PMSM AC winding. To compare several different winding topologies and production techniques the two key parameters are presented with the mathematical model. These two parameters are the length of the straight part of the wire and the conductor diameter, from which the efficiency peak and motor power are calculated. These calculations are based on the model of the newly developed high pole pair number three phase wave winding topology - Elaphe type winding. The results can be used also in other PMSM winding topologies since they show the key important facts of the winding detail. In addition, the methodology can be adopted for any winding type.","PeriodicalId":105698,"journal":{"name":"Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121781433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network performance evaluation for RIP, OSPF and EIGRP routing protocols","authors":"Ioan Fitigau, G. Toderean","doi":"10.1109/ECAI.2013.6636217","DOIUrl":"https://doi.org/10.1109/ECAI.2013.6636217","url":null,"abstract":"The main function of a network layer is to route packets from the source machine to the destination machine. Algorithms that are used for route selection and data structure are the main parts for the network layer. In this paper we examine the network performance when using three routing protocols, RIP, OSPF and EIGRP. Video, HTTP and Voice application where configured for network transfer. We also examine the behaviour when using link failure/recovery controller between network nodes. The simulation results are analyzed, with a comparison between these protocols on the effectiveness and performance in network implemented.","PeriodicalId":105698,"journal":{"name":"Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115121938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Presentation design of e-assessments for blind users using touch screen devices","authors":"M. Fakrudeen, S. Yousef, A. Hussein, Maaruf Ali","doi":"10.1109/ECAI.2013.6636214","DOIUrl":"https://doi.org/10.1109/ECAI.2013.6636214","url":null,"abstract":"The Web Content Accessibility Guidelines (WCAG) have been used by web developers to develop accessible web pages. However, touch screen accessibility varies with web site accessibility. This research is dedicated to the improvement of accessibility of e-assessment in mobile touch screen for blind users. We chose IMS' Question and Test Interoperability specification (QTI) as a basis to generate the components of the e-assessment. We then extended the components to derive the Accessibility and Usability features Guidelines (AUG) using the WCAG. Specifically, we designed a prototype according to the derived AUG to check the accessibility for blind users. We analysed the results and found that the performance of the prototype is promising.","PeriodicalId":105698,"journal":{"name":"Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124685740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of the development and implementation of VANET network intervehiculary communication systems","authors":"M. Surugiu, R. V. Alexandrescu","doi":"10.1109/ECAI.2013.6636190","DOIUrl":"https://doi.org/10.1109/ECAI.2013.6636190","url":null,"abstract":"Severe and immediate consequences of social and economical nature of the anual worldwide road accidents lead towards the development of new active and passive vehicle safety systems. Vehicle-to-vehicle communication is a relatively new concept in the field of road traffic safety, an increasing number of worldwide studies and research being performed on the subject. Traffic safety has become a priority and, with the development of communication technologies and wireless networks, VANET networks have emerged. VANET, or Vehicular Ad-hoc Network, ensures a communication protocol between close vehicles or between a vehicle and infrastructure (indicator, traffic light, road junction). The main purpose of these networks remains occupant safety and comfort in traffic. This paper is an analysis of the concept of vehicle-to-vehicle communication currently proposed in the technical literature of the field.","PeriodicalId":105698,"journal":{"name":"Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131245098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration of RFID and WSN for supply chain intelligence system","authors":"Shiva Mirshahi, S. Uysal, A. Akbari","doi":"10.1109/ECAI.2013.6636160","DOIUrl":"https://doi.org/10.1109/ECAI.2013.6636160","url":null,"abstract":"Radio Frequency Identification (RFID) system is used for detecting and identifying the tagged objects by electromagnetic signals. Wireless Sensor Networks (WSN), which consists of a huge numbers of nodes, can monitor the condition of the environment including pressure, humidity, and temperature. Data is transferred via nodes to a certain location. Integration of RFID and WSN provides a new feature and improves their functionalities. In the RFID system, each tag can only communicate with a reader. By integrating RFID tags with nodes, communication of the RFID tags with each other is possible and also integration of readers with nodes facilitates negotiation of readers together. The RFID and WSN integration in supply chain provides system intelligence. In such a case, tag is embedded in objects and reader is integrated with nodes. Therefore, identification and detection of tagged items is provided by using RFID and monitoring of environment can be obtained by using WSN. The present case study is simulated in the Petri Net Toolbox in MATLAB environment. It represented the negotiation of smart devices spontaneously in managing variety of instructions in order to enhance system performance.","PeriodicalId":105698,"journal":{"name":"Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116544474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Doping concentration variation in the barrier layers of a 462 nm In0.02Ga0.98N QW laser for structure performance improvement","authors":"A. Dragulinescu","doi":"10.1109/ECAI.2013.6636166","DOIUrl":"https://doi.org/10.1109/ECAI.2013.6636166","url":null,"abstract":"Lasers with quantum wells, based on the InGaN material system, have been researched for more than a decade, taking advantage from their wide bandgap energy, high emission efficiency and possibility of working in various spectra (red, green, blue, ultraviolet). We investigated if, for a structure of a 462 nm (blue) In0.02Ga0.98N QW laser, the variation of doping concentration in the barrier layers of the structure may lead to obtaining a lower threshold current, a higher slope efficiency and external differential quantum efficiency.","PeriodicalId":105698,"journal":{"name":"Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125013218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The analysis of the .NET architecture security system","authors":"M. Pirnau","doi":"10.1109/ECAI.2013.6636185","DOIUrl":"https://doi.org/10.1109/ECAI.2013.6636185","url":null,"abstract":"The security and integrity of data play an essential role in distributed environments. Due to the large number of independent components that must work together in order to distribute data processing, special emphasis must be placed on providing security applications, in order to prevent errors that could affect the integrity of the data, as well as the potential attacks that such distributed systems may be exposed. The NET Framework component, stands at the base of NET technology and is the last interface between NET applications and the operating system. In practice, both operating systems and computer networks on which NET platform is based on , contain inherent risks that can be vulnerable in case of inappropriate management. Even though in most instances, the security model .NET can eliminate in a transparent manner a number of errors at the level of the code. This one is not immune in case of wrong configured accounts or granting access rights to resources for some insecure systems.","PeriodicalId":105698,"journal":{"name":"Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125131835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Weights set selection method for feed forward neural networks","authors":"A. Ene, C. Stirbu","doi":"10.1109/ECAI.2013.6636168","DOIUrl":"https://doi.org/10.1109/ECAI.2013.6636168","url":null,"abstract":"In this paper is described a method for weights set selection for a feed forward neural network, based on the fault tolerance analysis of the network. For a certain neural network used in a specific problem, one can obtain many weight sets, as a result of backpropagation training algorithm, due to the fact that this algorithm initializes the weights with random numbers. Each time we repeat the training, we obtain a new set of weights. We propose a method to select one of the available training sets of weights, taking into account the fault tolerance of the network. We considered as a typical fault, the fault of the neurons from the hidden layer. We developed a Java application to illustrate the proposed method.","PeriodicalId":105698,"journal":{"name":"Proceedings of the International Conference on ELECTRONICS, COMPUTERS and ARTIFICIAL INTELLIGENCE - ECAI-2013","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126901380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}