{"title":"Design and implementation of a multiport power converter 2-inputs & 1-output","authors":"M. Mihai","doi":"10.1109/ECAI.2016.7861195","DOIUrl":"https://doi.org/10.1109/ECAI.2016.7861195","url":null,"abstract":"In this paper is presented the design and operation of a multiport power converter. Multiport converters occupy an increasingly important role in energy conversion systems. A proper design of these converters according to the needs of the energy system leads to lower costs with energy conversion and increase the energetic efficiency. The designed multiport converter is two inputs and one output. The structure of multiport power converter contains two DC-DC buck converters. Experimental results lead to improved electronic converter circuit.","PeriodicalId":122809,"journal":{"name":"2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123348924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of an ontology-based configuration management system","authors":"Naratich Na-Lampang, W. Vatanawood","doi":"10.1109/ECAI.2016.7861164","DOIUrl":"https://doi.org/10.1109/ECAI.2016.7861164","url":null,"abstract":"This paper proposes an alternative of configuration management system development using IT ontology and semantic technology. To make the IT service management more effective especially the configuration management, the manager needs the appropriate and ad-hoc analysis for decision making. Our approach proposes a knowledge base to accompany the conventional database system in order to flexibly cope with the strategic problems. An ontology schema is designed to handle the configuration management of IT service resources in term of RDF N-triple. The classes and hierarchy of the schema are provided along with the appropriate property relations among the configuration items. We design the queries by SWRL & SQWRL rules for IT service functions, such as how to allocate the budget for the annual maintenance fee, etc. The Protege software is used during our ontology schema design. We develop a Java web application with Jena Framework along with the Jena Fuseki ontology server to successfully demonstrate our ontology-based approach.","PeriodicalId":122809,"journal":{"name":"2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125150439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Pólkowski, Myhkailo Shtefanitsa, C. Savulescu, N. Dutta
{"title":"Mobile solutions in small and medium enterprises","authors":"Z. Pólkowski, Myhkailo Shtefanitsa, C. Savulescu, N. Dutta","doi":"10.1109/ECAI.2016.7861133","DOIUrl":"https://doi.org/10.1109/ECAI.2016.7861133","url":null,"abstract":"The paper concerns the problem of using and implementing mobile solutions in SMEs (Small and Medium Enterprises). Some of the existing examples of mobile solutions are analyzed and characterized. A significant part of the paper is a presentation of the research on mobile solutions which can be used to manage the business activities in SMEs. The role and methods of testing the mobile systems have been presented. A significant part of paper concerns the research on using mobile solutions in SMEs. Additionally, the article contains information related to the direction of development of mobile solutions in SMEs in particular: mobile Business Intelligence, business tourism. The work ends with short conclusions.","PeriodicalId":122809,"journal":{"name":"2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134182844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IDS rule management made easy","authors":"Zeeshan Afzal, S. Lindskog","doi":"10.1109/ECAI.2016.7861119","DOIUrl":"https://doi.org/10.1109/ECAI.2016.7861119","url":null,"abstract":"Signature-based intrusion detection systems (IDSs) are commonly utilized in enterprise networks to detect and possibly block a wide variety of attacks. Their application in industrial control systems (ICSs) is also growing rapidly as modem ICSs increasingly use open standard protocols instead of proprietary. Due to an ever changing threat landscape, the rulesets used by these IDSs have grown large and there is no way to verify their precision or accuracy. Such broad and non-optimized rulesets lead to false positives and an unnecessary burden on the IDS, resulting in possible degradation of the security. This work proposes a methodology consisting of a set of tools to help optimize the IDS rulesets and make rule management easier. The work also provides attack traffic data that is expected to benefit the task of IDS assessment.","PeriodicalId":122809,"journal":{"name":"2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134223856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Text prediction techniques based on the study of constraints and their applications for intelligent virtual keyboards in learning systems","authors":"R. Radescu, Valentin Pupezescu","doi":"10.1109/ECAI.2016.7861162","DOIUrl":"https://doi.org/10.1109/ECAI.2016.7861162","url":null,"abstract":"This paper aims to observe how one can apply fixed and probabilistic constraints on information sources and to emphasize the benefits obtained from this process for learning systems. Constraints applied may be both fixed, that are initially established with rigorous formulation, and probabilistic, in which case the process becomes an adaptive one, using statistical properties of the input symbols. Using fixed constraints, one can determine the fixed probabilities of appearance for letters or words and using probabilistic constraints one can determine the relationships between letters or words in a row by building lists of probabilities containing conditions allowed for transitions that are based on certain letters prefix or reference to a particular word. In order to illustrate the usefulness and applicability of these constraints predictive techniques of text insertion will be presented, as well as how they are implemented in applications such as predictive keyboard for smartphones or portable devices.","PeriodicalId":122809,"journal":{"name":"2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133824920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modulation recognition of RF carriers using neural networks","authors":"C. Oprina, Otilia Cangea, Mihai Dima","doi":"10.1109/ECAI.2016.7861188","DOIUrl":"https://doi.org/10.1109/ECAI.2016.7861188","url":null,"abstract":"This paper presents an analysis using the method of modulation discrimination with neural networks trained on RF samples with known modulations. The method resorts to speed flash algorithms in order to extract the essential features of a RF carrier — amplitude, frequency, phase, and pedestal — that are afterwards presented at the entrance of the neural network for discrimination.","PeriodicalId":122809,"journal":{"name":"2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114279244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The errors study of the second order current-mode RC oscillators","authors":"L. Grigorescu","doi":"10.1109/ECAI.2016.7861075","DOIUrl":"https://doi.org/10.1109/ECAI.2016.7861075","url":null,"abstract":"This paper proposes a systematic approach of second order current-mode RC oscillators (CMO-RC) and the study of the errors introduced by these oscillators. The generation is done by current amplifying active blocks whit a single input and two opposing outputs (SIDO) and standard current amplifiers (a single input and a single output). This solution of using one input — two outputs current amplifiers represents the edge of this proposed generation method. Theoretically such current amplifiers can be easily obtained, using current-conveyors. From the transfer function of the oscillator I intended determination of errors introduced by the parameters that can be estimated and intervene in the gain expression (Go) and in the frequency of oscillation (ω0). The appreciation of the parameter influence into changing the values of interest, previously determined, will be done considering constant the other parameters.","PeriodicalId":122809,"journal":{"name":"2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114589752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Pólkowski, D. Zając, J. Vasilev, Arnautu Lidia Florina
{"title":"A content analysis of existing educational portals for teaching data warehouse and business intelligence","authors":"Z. Pólkowski, D. Zając, J. Vasilev, Arnautu Lidia Florina","doi":"10.1109/ECAI.2016.7861146","DOIUrl":"https://doi.org/10.1109/ECAI.2016.7861146","url":null,"abstract":"The purpose of this article is to analyze literature on educational portals. The main approach is content analysis. A lot of educational portals exist. From one side, the content of educational portals is organized in a unique way. On the other side, educational portals are web portals. That is why different instruments are used for building web portals. Two main problems are identified — the structure of the contents of an educational portal and the IT tools for its creation. This paper proposes a concept for a new educational portal on the basis of analysis of the functionality of existing educational portals and recent publications in scientific online journals about educational portals.","PeriodicalId":122809,"journal":{"name":"2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114746941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of five PWM modulation strategies applied to spread the power spectrum of the power converters","authors":"A. Bogdan, N. Bizon","doi":"10.1109/ECAI.2016.7861150","DOIUrl":"https://doi.org/10.1109/ECAI.2016.7861150","url":null,"abstract":"Electromagnetic interference (EMI) resulting from the process of energy conversion using switching power converters, can adversely affect the performance of other neighbor electronic systems, health of human beings, but not only that. Normally EMI can be reduced by adding bulky filters to reduce the conducted EMI, by shielding for radiated EMI, by installing snubber circuits or by other methods. Some of these methods have the unwanted effect of decreasing efficiency of power converter. At the same time, the cost and the physical dimensions of the converters increase, especially if large values are used for the coils and capacitors of the input filter. Another technique to reduce EMI is to use the Spread Spectrum Power Converter (SSPC) that uses the Spread Spectrum Frequency Modulation (SSFM) technique for PWM command. This paper aims to evaluate the performance of spreading the SSPC power spectrum using five SSFM PWM command techniques.","PeriodicalId":122809,"journal":{"name":"2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117276357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chinese sentence based lexical similarity measure for artificial intelligence chatbot","authors":"Wen Zhang, Heng Wang, Kaijun Ren, Junqiang Song","doi":"10.1109/ECAI.2016.7861160","DOIUrl":"https://doi.org/10.1109/ECAI.2016.7861160","url":null,"abstract":"Artificial intelligence chatbots are computer programs that make interactions via auditory or textual information between human and machine using natural language processing techniques, most of which work on the basis of pattern matching. Typically, a chatbot recognizes the audio from human and translates it to text, and then matches the text with sentences stored in advance in the database by means of measuring similarity. So far, English chatbots have done much better than Chinese ones, mainly for the reason that processing sentences in Chinese requires more sophisticated techniques than that in English. Considering the low efficiency and accuracy of the existing Chinese sentence similarity measure methods, we propose a novel method oriented for lexical similarity measure of Chinese sentences by means of Chinese sentence segmentation and weighted word matching. Based on this method, a Chinese AI chatbot is developed and tested under a variety of settings. Experimental results show that our proposed method can achieve satisfactory performance in various cases.","PeriodicalId":122809,"journal":{"name":"2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115737144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}