{"title":"A PI Controller Based on State-Feedback Algorithm for an X-Y Positioning System","authors":"Dora Sabau, P. Dobra","doi":"10.1109/CSCS.2019.00017","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00017","url":null,"abstract":"The case of a small Computer Numerical Controlled (CNC) machine control of the axis is studied. A new approach is presented, which consist on obtaining a ProportionalIntegrative (PI) controller for the position of both axis of the machine, based on pole-placement state-feedback algorithm. This is mainly based on the augmentation of the state-space equation by adding an extra state variable. The ProportionalIntegrative controller parameters are obtained based on the state-feedback gains and simulation results and experimental tests are also presented.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127065677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Broadband Services on Power Line Communication Systems: A Review","authors":"Salih Hassan Mahmood, A. M. Salih, M. I. Khalil","doi":"10.1109/CSCS.2019.00085","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00085","url":null,"abstract":"This paper is present an overview of broadband over power lines services, in terms of work method, features, defects, spread, bandwidth, future challenges, etc. That the broadband over power line (BPL), also it's sometimes called power line communications (PLC) is technology that allows transferring of voice and Internet data over power lines. Due to the rapid evolution of the Internet and the broadband communication systems, the technology of BPL has developed rapidly over the past few years. The review of previous research papers, showed there are many challenges facing applications of this technology, such as attenuation, reflection, noise and security and etc. Despite these challenges, BPL is a promising, reliable and efficient technology for broadband services and communications, and can provide value-added services such as Internet, voice, video and other applications, in the near future, BPL may be an alternative effective and competitive for communications companies to provide BPL services on a large scale and at low cost.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125746296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Fiodorov, I. Cojuhari, B. Izvoreanu, Dumitru Moraru
{"title":"Analytical Algorithms for Synthesis of PID Controllers to the Complex Objects","authors":"I. Fiodorov, I. Cojuhari, B. Izvoreanu, Dumitru Moraru","doi":"10.1109/CSCS.2019.00026","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00026","url":null,"abstract":"In this paper it is proposed to extend the maximum stability degree criterion method for synthesis of the typical controllers to the model of objects with arbitrary order inertia and non-minimum phase, astatism and time delay for the automatic control systems with aperiodic response. There are designed the analytical algorithms for synthesis of the P, PI, PD and PID controllers, which represent simple algebraic expressions, that require the reduced volume of calculations and not impose the restrictions on the complexity of the control object. It was analyzed the efficiency of the developed algorithms and some study cases are presented.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123722360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Vlădăreanu, V. Vlădăreanu, Octavian Melinte, Mihai Radulescu, Marius Pandelea, Alexandra-Cătălina Ciocîrlan
{"title":"Mobile Robots Applied on Virtual and Real Environments","authors":"L. Vlădăreanu, V. Vlădăreanu, Octavian Melinte, Mihai Radulescu, Marius Pandelea, Alexandra-Cătălina Ciocîrlan","doi":"10.1109/CSCS.2019.00111","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00111","url":null,"abstract":"The paper presents a VIPRO versatile, intelligent and mobile platform for real time robot control, by applying an original virtual projection method which involves the representation of modern mobile robots in a 3D virtual environment using a strong robotic simulator, an open architecture system and adaptive networks over the classical control system of the robot, developing intelligent control interfaces that use advanced control technologies adapted to the robot environment such as extended control (Extenics), neutrosophic control, human adaptive mechatronics. The obtained results lead to application development on mobile robots in virtual and real environments, allowing a correct evaluation of force-position robot behaviors and high level real-time simulation in order to correctly model interactions among the robot and the motion environment.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114608957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Flexible and Lightweight Agent Deployment Architecture","authors":"Andrei Olaru, Alexandru Sorici, A. Florea","doi":"10.1109/CSCS.2019.00048","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00048","url":null,"abstract":"While the multi-agent system (MAS) paradigm is popular for many application domains, different frameworks exist for different applications. These frameworks are not interoperable and many times force the developer into a specific model for agents and for the system as a whole. This paper presents a framework featuring a lightweight, open model for the entities in a MAS, together with a means of deployment that brings both flexibility and versatility. This architecture is compared to the most popular frameworks in the MAS domain.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129667507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jan-Alexandru Vaduva, Stefan Dascalu, Iulia-Maria Florea, Iulia Culic, R. Rughinis
{"title":"Observations over SPROBES Mechanism on the TrustZone Architecture","authors":"Jan-Alexandru Vaduva, Stefan Dascalu, Iulia-Maria Florea, Iulia Culic, R. Rughinis","doi":"10.1109/CSCS.2019.00057","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00057","url":null,"abstract":"In this paper we try to reproduce the results described in the paper \"SPROBES: Enforcing Kernel Code Integrity on the TrustZone Architecture\" [1]. The implementation revolves around the idea of protecting the operating system against rootkits with minimum overhead. This is described as an introspection mechanism implemented through TrustZone Secure Monitor Calls (SMC) and handled in secure world. It can instrument any operating system instruction. Since the challenge with this implementation was to avoid being removed by a rootkit, five invariants were enforced and considered to be enough to protect the operating system. This implementation was done on a Linux kernel 2.6.38 and used only 12 such SPROBES. As the original article was written the ARM market is expanding further and further with TrustZone extension now available even on the M series cortex systems. In addition to smartphones as described in previous article, the TrustZone extension is found in a lot of IoT device, such as RaspberryPi and in high-end devices. We try to reimplement the above-mentioned work on a new 4.9 Linux kernel and latest arm-trusted-firmware implementation for a reference ARM 64 hardware in order to identify if it could prove a viable software solution Also we provide feedback and observations for this whole process.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130881415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Evaluation of Wordpress Backup Plugins","authors":"Ionut Cernica, N. Popescu, Bogdan Tiganoaia","doi":"10.1109/CSCS.2019.00056","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00056","url":null,"abstract":"Protecting the web applications is an important task for every organization. Wordpress is the most preferred content management system by organizations. In this paper we discuss why Wordpress is an important web application and the necessity of securing it. Another analyzed aspect regards the security of backup plugins created for Wordpress from the perspective of sensitive data leak, number of vulnerable modules, causes of vulnerability, most common mistakes and the impact of such vulnerabilities. Based on an experimental plan, the paper also emphasizes the destructive potential of those vulnerable backup plugins on the most relevant websites among the top ten million worldwide websites.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130680057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Moisescu, I. Sacala, I. Dumitrache, S. Caramihai, N. Constantin, Bogdan Barbulescu, Marius Danciuc
{"title":"A Cyber-Physical Approach in Heterogeneous Communication Networks","authors":"M. Moisescu, I. Sacala, I. Dumitrache, S. Caramihai, N. Constantin, Bogdan Barbulescu, Marius Danciuc","doi":"10.1109/CSCS.2019.00112","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00112","url":null,"abstract":"Several paradigms that have the ability to reshape the architecture of the Enterprise Systems have emerged in the last few years. These refer to \"Internet of Things\" and Cyber-Physical Systems\". Enterprise Systems are required to support the integration of smart devices, usually geographically distributed and connected in heterogenous networks. A set of principles and models needs to be addressed in order to facilitate the development of such systems. The main purpose of the paper is to address the design of Communication Networks that facilitate the integration of heterogenous devices, by adopting Cyber-Physical Systems principles. Such networks of devices can be integrated in enterprise systems or become part of large-scale networks such as Internet of Things oriented networks. A case study, involving the design of a Cyber-Physical Systems oriented communication device is presented.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"287 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133342902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Acceleration Techniques for Fully-Homomorphic Encryption Schemes","authors":"Cristian Lupascu, Mihai Togan, V. Patriciu","doi":"10.1109/CSCS.2019.00028","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00028","url":null,"abstract":"It is known that cloud computing opened new opportunities for many organizations regarding the cost-savings and the availability rate. Homomorphic encryption schemes are well known for solving the privacy preserving issue, but these schemes bring deficiency in execution times, therefore accelerating these encryption schemes using different technologies is the next step towards the wide use of homomorphic primitives. The main contribution is an implementation of a homomorphic encryption library using multiple GPU's, more precisely an adaptation of the HElib library. While other single GPU accelerations of HElib do exist, the proposed implementation uses multiple graphic processors units to distribute computational tasks.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125535936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Moldoveanu, A. Ciobanu, A. Morar, A. Moldoveanu, V. Asavei
{"title":"Real-Time Segmentation of Depth Map Frames on Mobile Devices","authors":"F. Moldoveanu, A. Ciobanu, A. Morar, A. Moldoveanu, V. Asavei","doi":"10.1109/CSCS.2019.00052","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00052","url":null,"abstract":"This paper presents a real-time method for segmentation of depth map video frames on devices with limited computational capabilities. The depth maps are segmented based on the edges extracted by using an edge detector kernel. The entire scene is divided into regions that are separated by their edges. Furthermore, for providing a spatio-temporal consistency of the data, an association step is introduced in order to match the regions in the current frame with the ones in the previous frames. The proposed method may be used in scenarios where the objects in the 3D scene are placed at different distances from the acquisition device. The method was tested on a Raspberry Pi 2 board and on a series of Apple mobile devices (iPhone 6s, iPhone 5s and iPad Mini), using depth data acquired with the Microsoft Kinect v2 sensor at a resolution of 512x424 pixels. Since the Raspberry Pi and the Apple devices do not have full support for the Kinect v2 sensor, for the tests we have used a recorded dataset. Also, we tested the performance of the algorithm on the Apple devices by using a compatible depth sensor developed by Occipital (Structure Senor).","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124601648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}