{"title":"Fundamental Matrix Based Moving Object Detection Using Monocular Camera","authors":"Yeon-seok Choi, Ju H. Park, Ho-Youl Jung","doi":"10.1109/ICSEng.2017.28","DOIUrl":"https://doi.org/10.1109/ICSEng.2017.28","url":null,"abstract":"A typical road environment includes a variety of moving/stopping objects. It is important to detect moving objects for safety driving. However, moving object detection is difficult, as background is also moving when ego-vehicle is driving. In this paper, we introduce the method that detects moving objects using fundamental matrix. Fundamental matrix is calculated from previous and current frames. Feature points are obtained using Harris corner detection in previous frame and correspondence points in current frame are estimated by Lucas-Kanade method. The feature points are evenly selected by considering x-coordinate, y-coordinate and feature magnitude of flow for calculating fundamental matrix using RANSAC. Next, whether each point is inlier or outlier is determined and the points with negative direction is detected. In the simulations, we compare the performances according to the selecting method.","PeriodicalId":202005,"journal":{"name":"2017 25th International Conference on Systems Engineering (ICSEng)","volume":"406 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116688551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design, Prototype Implementation, and Comparison of Scalable Web-Push Architectures on Amazon Web Services Using the Actor Model","authors":"Hussachai Puripunpinyo, M. Samadzadeh","doi":"10.1109/ICSEng.2017.42","DOIUrl":"https://doi.org/10.1109/ICSEng.2017.42","url":null,"abstract":"Push technology has become an essential part of many web applications that require near real-time notification. The Hypertext Transfer Protocol (HTTP) is widely used for exchanging information between clients and servers. The growth of the Internet of Things (IoT) and the expansion/penetration of Internet access to new areas have resulted in the ever-rapidly increasing number of Internet users. Consequently, scalability has become one of the key requirements of modern web applications. One of the challenging problems of scalability is scaling out web-push applications since they are constrained by unshareable resources and their stateful nature. Amazon Web Services (AWS) is the leading cloud service provider that offers a variety of services. Web-push applications can leverage the services that AWS provides. Developers can build their entire service stack on Amazon Elastic Compute Cloud (EC2) if other services cannot fulfill their business requirements. To enable the scalability feature, a centralized message mediator is needed to orchestrate and coordinate messages across the web-push nodes. The publish-subscribe pattern should be implemented from upstream to downstream in order to optimize the flow of data. This paper examines the technologies that could be used as building blocks to create scalable web-push applications, and proposes three architectures using three different messaging services, i.e., Amazon Simple Notification Service (SNS), Redis Pub/Sub, and Apache ActiveMQ. A couple of push and pull models as well as an adaptive push/pull model are introduced and experimentally compared in this paper. The actor model, on account of its being a robust model, is used for handling concurrency and for coordinating the flow of messages between a messaging server and a web client. We created a chat room application to evaluate the architectures with different criteria and conditions, and the push technology used our experimentation was WebSocket. From our experiment, we found that Amazon SNS performed relatively poorly compare to the other two due to the overhead of web services calls. The architectures using Redis Pub/Sub and ActiveMQ performed equally well even though the ActiveMQ server took more time to process messages. We acknowledge that there are a large number of factors involved in and potentially affecting the performance, and that the response time is merely one of the properties that ought to be considered in making a design decision.","PeriodicalId":202005,"journal":{"name":"2017 25th International Conference on Systems Engineering (ICSEng)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127312692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Data Collection in Spatially Clustered Wireless Sensor Networks","authors":"Minki Kim, Haengrae Cho","doi":"10.1109/ICSEng.2017.14","DOIUrl":"https://doi.org/10.1109/ICSEng.2017.14","url":null,"abstract":"A wireless sensor network (WSN) can provide a low cost and flexible solution to sensing and monitoring for large distributed applications. To save energy and prolong the network lifetime, the WSN is often partitioned into a set of spatial clusters. Each cluster includes sensor nodes with similar sensing data, and only a few sensor nodes (samplers) report their sensing data to a base node. Then the base node may predict the missed data of non-samplers using the spatial correlation between sensor nodes. The problem is that the WSN is vulnerable to internal security threat such as node compromise. If the samplers are compromised and report incorrect data intentionally, then the WSN should be contaminated rapidly due to the process of data prediction at the base node. In this paper, we propose three algorithms to detect compromised samplers for secure data collection in the WSN. The proposed algorithms leverage the unique property of spatial clustering to alleviate the overhead of compromised node detection. Experiment results indicate that the proposed algorithms can identify compromised samplers with a high accuracy and low energy consumption when as many as 50% sensor nodes are misbehaving.","PeriodicalId":202005,"journal":{"name":"2017 25th International Conference on Systems Engineering (ICSEng)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123321524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Planned Renewable Energy Usage during Power Outage","authors":"Catherine S. Salvador, A. A. L. Manalo","doi":"10.1109/ICSEng.2017.79","DOIUrl":"https://doi.org/10.1109/ICSEng.2017.79","url":null,"abstract":"Stable power plant operation is the only way to ensure daily production of electricity. However, this operation is highly prone to breakdowns that often lead to a power outage known as a power failure. Another disadvantage of this operation is its significant contribution to environmental pollution in its consumption of fossil fuels. To avoid these problems, this study investigates ways to integrate renewable energy sources (RESs) to a combined-cycle power plant in the Philippines through matrix laboratory (MATLAB) simscape simulations.Results show that MATLAB simulations obtain a 90% level of acceptance in terms of power, voltage, and current outputs generated from the wind solar farm system simscape model with the use of data in the Philippine setting. These observations prove that the more RESs are combined and incorporated in a simscape model, the more energy set to replace power loss during a power outage will be harnessed.","PeriodicalId":202005,"journal":{"name":"2017 25th International Conference on Systems Engineering (ICSEng)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128297316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alireza Abbaspour, Michael Sanchez, A. Sargolzaei, K. Yen, Nalat Sornkhampan
{"title":"Adaptive Neural Network Based Fault Detection Design for Unmanned Quadrotor under Faults and Cyber Attacks","authors":"Alireza Abbaspour, Michael Sanchez, A. Sargolzaei, K. Yen, Nalat Sornkhampan","doi":"10.1109/ICSEng.2017.12","DOIUrl":"https://doi.org/10.1109/ICSEng.2017.12","url":null,"abstract":"The occurrence of faults and failures in flight control systems of unmanned aerial vehicles (UAVs) can destabilize the system which could cause potential economic and life losses. Therefore, it's necessary to detect faults and attacks in real time and modify the control system based on the occurred fault. In this paper, a neural network-based fault detection (NNFD) approach is introduced to detect and estimate the faults and false data injection (FDI) attacks on the sensor systems of a quadrotor in real time. An unmanned quadrotor is selected as our case study to demonstrate the effectiveness of our proposed NFDD strategy. The simulation results show that the applied NNFD method can detect the faults and FDI attacks on an unmanned quadrotor sensors with sufficient accuracy.","PeriodicalId":202005,"journal":{"name":"2017 25th International Conference on Systems Engineering (ICSEng)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124191265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework for Safe Navigation of Unmanned Aerial Vehicles in Unknown Environments","authors":"M. Wzorek, Cyrille Berger, P. Doherty","doi":"10.1109/ICSEng.2017.58","DOIUrl":"https://doi.org/10.1109/ICSEng.2017.58","url":null,"abstract":"This paper presents a software framework which combines reactive collision avoidance control approach with path planning techniques for the purpose of safe navigation of multiple Unmanned Aerial Vehicles (UAVs) operating in unknown environments. The system proposed leverages advantages of using a fast local sense-and-react type control which guarantees real-time execution with computationally demanding path planning algorithms which generate globally optimal plans. A number of probabilistic path planning algorithms based on Probabilistic Roadmaps and Rapidly-Exploring Random Trees have been integrated. Additionally, the system uses a reactive controller based on Optimal Reciprocal Collision Avoidance (ORCA) for path execution and fast sense-and-avoid behavior. During the mission execution a 3D map representation of the environment is build incrementally and used for path planning. A prototype implementation on a small scale quad-rotor platform has been developed. The UAV used in the experiments was equipped with a structured-light depth sensor to obtain information about the environment in form of occupancy grid map. The system has been tested in a number of simulated missions as well as in real flights and the results of the evaluations are presented.","PeriodicalId":202005,"journal":{"name":"2017 25th International Conference on Systems Engineering (ICSEng)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125712327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Adam Włodarczyk, I. Pozniak-Koszalka, L. Koszalka, A. Kasprzak, D. Zydek
{"title":"Task Allocation in Torus Mesh Networks Using Differential Evolution","authors":"Adam Włodarczyk, I. Pozniak-Koszalka, L. Koszalka, A. Kasprzak, D. Zydek","doi":"10.1109/ICSEng.2017.54","DOIUrl":"https://doi.org/10.1109/ICSEng.2017.54","url":null,"abstract":"In the paper, the problem of efficient task allocation in torus mesh network is considered. The authors tested the implemented metaheuristic algorithm which is based on Differential Evaluation method. The focus is taken on tuning the algorithm, i.e., choosing the best parameters of mutation scheme. The research was made using the new designed and implemented experimentation system. Ten mutation schemes were taken into consideration. These schemes and a random algorithm as the reference were compared. The results of experiments showed that using one of mutation schemes called DE/rand/1 can ensure the greatest profit.","PeriodicalId":202005,"journal":{"name":"2017 25th International Conference on Systems Engineering (ICSEng)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121447831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reversible Color Compression Transform for Big Data System Using Human Visual System","authors":"Hanadi Hakami, Z. Chaczko","doi":"10.1109/ICSEng.2017.27","DOIUrl":"https://doi.org/10.1109/ICSEng.2017.27","url":null,"abstract":"In today's life, images play a significant role in many Big Data application fields for various purposes. Image processing has to face the huge challenges because of images created in a digital format which leads to huge data volumes. Using Joint Photographic Experts Group 2000 (JPEG2000) compression techniques to meet the diverse type of real-time applications. Lossless compression JPEG2000 and others are used to minimize the expenditure of possessions such as hard disk space and transmission bandwidth. This experimental work shows an improved lossless color image compression that uses a wavelet based Human Visual System.This Reversible Color Compression Transform method (RCCT) produces an efficient algorithm to compress the image without loss of information. JPEG2000 as a lossless mode is utilized for bit-preserving and to refer globally for encoding and decoding processes. The Reversible Color Transform (RCT) is used in JPEG 2000 using wavelets which provide a mathematical way to encode the information in such a way that it is layered according to the level of detail by using HVS attributes in the stage of quantization. In this research, the goal of lossless image compression is to decrease the number of bits required to demand computing resources such as store and transmit images without any loss of information.","PeriodicalId":202005,"journal":{"name":"2017 25th International Conference on Systems Engineering (ICSEng)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133992600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of \"Strawberry Picking\" Apps for Foreign Tourists","authors":"Arisa Fujinoki, T. Fujimoto","doi":"10.1109/ICSEng.2017.70","DOIUrl":"https://doi.org/10.1109/ICSEng.2017.70","url":null,"abstract":"In recent years, the number of foreign tourists who come to fruit picking in Japan is increasing. Japanese fruits are sweet and tasty. Especially strawberry picking is popular. However, there are few sources of information on strawberry picking in Japan, and there are no portal sites and apps. To improve this, we develop the portal smartphone app of strawberry picking that has English version. Information on strawberry farms in Japan, kinds of strawberries that can be harvested, and the strawberry picking method will be introduced. This app aims to trigger foreign people's interest in Japanese fruits and the fruit picking.","PeriodicalId":202005,"journal":{"name":"2017 25th International Conference on Systems Engineering (ICSEng)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131911207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analog and Mixed-Signal Verification Using Satisfiability Solver on Discretized Models","authors":"H. Selvaraj, Nikita Ramesh Wanjale","doi":"10.1109/ICSEng.2017.10","DOIUrl":"https://doi.org/10.1109/ICSEng.2017.10","url":null,"abstract":"In recent years, the growth in compact electronic devices has been tremendous. Moore's law states that the number of transistors on integrated circuit chips has doubled every year since its invention. With a steady compression of circuits, the complexity has gone up, making the validation process vital. Automation tools have benefitted the EDA industry for circuit design, validation and testing for years. However, continuous nature of Analog and Mixed-Signal (AMS) circuits make them unsuitable for these tools. This work proposes two approaches, DC verification and transient analysis, using Satisfiability solvers on Discretized models of AMS circuits to increase the level of automation in the verification process. The run-time performance is tested on suitable examples and results are compared with existing approaches. The comparison demonstrates that the approach is a good balance between accuracy and run-time.","PeriodicalId":202005,"journal":{"name":"2017 25th International Conference on Systems Engineering (ICSEng)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129570891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}