{"title":"Application of TEM cell in measurement of electromagnetic fields of electronic modules","authors":"Kresimir Ivanus, A. Barić","doi":"10.1109/MIPRO.2014.6859543","DOIUrl":"https://doi.org/10.1109/MIPRO.2014.6859543","url":null,"abstract":"The paper presents measured radiated emissions of an electronic module in the frequency range 150 kHz-200 MHz using the TEM cell method. The TEM cell measurement method is explained and measurement results for different orientations of the electronic module are presented. An explanation for the differences in the measured radiated emissions for different module orientations is given.","PeriodicalId":299409,"journal":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125119280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Systematic evaluation methodology for fingerprint-image quality assessment techniques","authors":"Jutta Hämmerle-Uhl, M. Pober, A. Uhl","doi":"10.1109/MIPRO.2014.6859771","DOIUrl":"https://doi.org/10.1109/MIPRO.2014.6859771","url":null,"abstract":"We propose a systematic methodology to assess fingerprintimage quality indices. Our approach is able to identify specific weaknesses or strengths of quality indices with respect to certain types of quality impairments. For that purpose, we suggest to employ a tool able to simulate a wide class of acquisition conditions and qualities, applicable to any given dataset and also of potential interest in forensic analysis. As an example for such a tool, StirMark image manipulations (as being developed in the context of watermarking robustness assessment) are applied to fingerprint data in this work, to generate corresponding test data, thereby interpreting certain image manipulations as being highly related to realistic fingerprint acquisition conditions. Experimental results document the usefulness of the approach and report significant inter-data set and inter-fingerprint matcher variability for the quality indices investigated.","PeriodicalId":299409,"journal":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116229381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of different feature sets for gait recognition using skeletal data from Kinect","authors":"Bojan Dikovski, Gjorgji Madjarov, D. Gjorgjevikj","doi":"10.1109/MIPRO.2014.6859769","DOIUrl":"https://doi.org/10.1109/MIPRO.2014.6859769","url":null,"abstract":"Gait is a persons manner of walking. It is a biometric that can be used for identifying humans. Gait is an unobtrusive metric that can be obtained from distance, and this is its main strength compared to other biometrics. In this paper we construct and evaluate feature sets with the purpose of finding out the role of different types of features and body parts in the recognition process. The feature sets were constructed from skeletal images in three dimensions made with a Kinect sensor. The Kinect is a low-cost device that includes RGB, depth and audio sensors. In our work automated gait cycle extraction algorithm was performed on the Kinect recordings. Metrics like angles and distances between joints were aggregated within a gait cycle, and from those aggregations the different feature datasets were constructed. Multilayer perceptron, support vector machine with sequential minimal optimization and J48 algorithms were used for classification on these datasets. At the end we give conclusions on which groups of features and body parts gave the best recognition rates.","PeriodicalId":299409,"journal":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116435565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spend analysis systems","authors":"Sanjin Marzic, Perino Krneta, M. Pavlic","doi":"10.1109/MIPRO.2014.6859803","DOIUrl":"https://doi.org/10.1109/MIPRO.2014.6859803","url":null,"abstract":"This paper introduces spend analysis, spend management and supplier management field. It describes the need for a spend analysis system, its' benefits and savings which such system can help to achieve. We present flowchart of spend analysis process in form of a dataflow diagram. We present main issues in development of a spend analysis software, and give an overview of current spend analysis systems.","PeriodicalId":299409,"journal":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122495891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technique for detection of cooperative black hole attack using true-link in Mobile Ad-hoc Networks","authors":"G. Wahane, A. Kanthe, D. Simunic","doi":"10.1109/MIPRO.2014.6859791","DOIUrl":"https://doi.org/10.1109/MIPRO.2014.6859791","url":null,"abstract":"Mobile Ad-hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and predetermined organization of available links. Security is a major challenge for these networks owing to their features of open medium, dynamically changing topologies. A black hole is a malicious node that falsely replies for any route requests without having active route to specified destination and drops all the receiving packets. Sometimes the black hole nodes cooperate with each other with the aim of dropping packets. These are known as cooperative black hole attack. This proposed work suggests the modification of Ad-hoc on Demand Distance Vector (AODV) routing protocol. We used a technique for detecting as well as defending against a cooperative black hole attack using True-link concept. True-link is a timing based countermeasure to the cooperative black hole attack. This paper shows the performance of MANET decreases for end-to-end delay, normalized routing overhead and increases throughput and packet delivery ratio.","PeriodicalId":299409,"journal":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122078514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Uros Tominc, M. Vesel, S. Mawed, M. Dobravec, M. Jug, S. Herman, D. Kreuh
{"title":"Personalized guiding templates for pedicle screw placement","authors":"Uros Tominc, M. Vesel, S. Mawed, M. Dobravec, M. Jug, S. Herman, D. Kreuh","doi":"10.1109/MIPRO.2014.6859570","DOIUrl":"https://doi.org/10.1109/MIPRO.2014.6859570","url":null,"abstract":"Introduction: Pedicle screw fixation is a standard procedure of spinal instrumentation. The aim of this work was to evaluate accuracy and safety of using personalized guiding templates for pedicle screw placement on thoracic spine. Methods and Results: We performed a computer tomography (CT) scan of the spine specimen to acquire virtual 3D model of the spine. Computer software (EBSTM, Ekliptik, Slovenija) was used to design drill templates according to pedicle trajectories. Drill templates were then printed out of the biocompatible polymer using 3D printing technology. Templates were placed on the anatomic specimen vertebras anchoring at three sites - on the lamina at the base of the superior articular process on both sides and at the tip of the spinous process. Holes were drilled, and 3,5 mm screws inserted from T1 do T7 (7 pairs) using custom template for each vertebrae. CT scan was obtained after screw placement to evaluate screw positions. 13 screws were inside of pedicle trajectory without violation of pedicle wall with the tip inside of the vertebral body. One screw perforated medial pedicle wall. Conclusion: The potential use of such a navigational template to insert thoracic pedicle screws in spinal instrumentation is promising. This novel method could improve the accuracy of pedicle screw insertion and reduce the operating time and radiation exposure of spinal fixation surgery.","PeriodicalId":299409,"journal":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116722587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applications methods of the objects, and suitability for universal applications in computer graphics context","authors":"Nderim Zeqiri","doi":"10.1109/MIPRO.2014.6859621","DOIUrl":"https://doi.org/10.1109/MIPRO.2014.6859621","url":null,"abstract":"The use of the primitive objects, can be modified and adapted for universal applications in computer graphics context. The present paper addresses some access and research in the field of computer graphics. The program code present the basics step to increase the study and to explore differently level by describing each of them by math formulas and graphical representations. Also, here is explained the methods how we can use all these recourses to implement to any system, where can be find the better solution in the context of universal applications and solutions. So, to solve all from above questions, are given some characteristics objects and program code for respective representations. Also is given a direct approach for ADC (analog-digital conversion), by use the fundamental steps followed by this topics: sampling rate, quantization. Also is given statistical results by creating the respective images and respective view in the context of the statistical analyses.","PeriodicalId":299409,"journal":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116815438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emergency communication in IMS network: Challenges in implementation","authors":"Ivan Krevatin, I. Visković","doi":"10.1109/MIPRO.2014.6859607","DOIUrl":"https://doi.org/10.1109/MIPRO.2014.6859607","url":null,"abstract":"Emergency communication is an important part of communication for the telecoms not only due to regulation but primary due to their responsibilities to the customers and the role they have in society. This paper describes the challenges which we are facing when implementing emergency communication in IMS network regarding the architecture and special requirements demanded by the Regulator and emergency service centers. In focus are: the architecture for customers accessing the service over fixed access and the possible implementations for customers that are accessing the service over LTE (Long Term Evolution) network.","PeriodicalId":299409,"journal":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117296424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UNDERSTANDER Business Intelligence Seeker — User agent","authors":"V. Damjanovic, W. Behrendt","doi":"10.1109/MIPRO.2014.6859802","DOIUrl":"https://doi.org/10.1109/MIPRO.2014.6859802","url":null,"abstract":"UNDERSTANDER is an exploratory R&D project investigating Business Intelligence (BI) as a knowledge-gathering tool for supporting innovation processes in specific industrial domains. We develop a knowledge-based model that is grounded on the following three concepts: (i) Business Intelligence Model (BIM) developed by a Canadian project for BI technologies, (ii) taxonomy of Competitive Intelligence (CI) developed by CI practitioners, and (iii) Conceptual Dependency (CD) theory dealing with verb-oriented organization of knowledge. We also investigate whether knowledge-based models can be made adequate for the problem of gathering BI from web resources. Such a knowledge model can be used to “prime” a software agent and the agent can then search autonomously for relevant information on the Web. To express the interaction between agents, we consider “mechanism design”, which is a framework for designing interaction between self-interested agents to achieve specific outcomes. A BI Seeker is a multi-agent application developed in WADE. (Workflows and Agents Development Environment). WADE is an extension of JADE, a popular Open Source framework that brings workflow mechanisms to agents. We present the design of the BI Seeker as an application in the field of Industrial Internet.","PeriodicalId":299409,"journal":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117325148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mjolnirr: Private PaaS as distributed computing evolution","authors":"Dmitry I. Savchenko, G. Radchenko","doi":"10.1109/MIPRO.2014.6859596","DOIUrl":"https://doi.org/10.1109/MIPRO.2014.6859596","url":null,"abstract":"Cloud computing became very popular during the last few decades. It provides convenient access to remote computing resources for individual users and organizations. However, there are still security issues arise if the private data is transmitted to the public cloud for processing. This issue can be resolved with private cloud systems. In this paper, we propose the design and implementation of a Mjolnirr private cloud platform for development of the private PaaS cloud systems. It provides infrastructure for cloud applications development, including software developer kit and message brokering system. Proposed cloud platform can be deployed on resources of a distributed computing system, including idling resources of personal computers. For a developer, a Mjolnirr application is represented as a collection of independent components communicating by a message exchange communication protocol.","PeriodicalId":299409,"journal":{"name":"2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129947061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}