{"title":"The Binary Images of Aspiny Neurons from the Human Neostriatum: Cluster Classification Using Parameters of Monofractal Analysis","authors":"N. Milosevic, V. Vranes, Damjan Stojić","doi":"10.1109/CSCS.2019.00092","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00092","url":null,"abstract":"The striatum (i.e. neostriatum) is one of the principal components of the basal ganglia. It is complex structure which consists of the three nuclei. Human striatum neurons firstly can be visually classified into two types (spiny and aspiny), but further classification recognizes two subgroups of spiny, and three subgroups of aspiny neurons. The original goal of this study is to confirm or improve the existing division of striatal neurons using two main techniques of cluster analysis. A total of 175 two dimensional images of aspiny neurons have been captured by the light microscope, and recorded with accompanying digital camera. Specialized public software Image J has been used for both image reconstruction and measurement. Each binary image of the neuron have been quantified with apparent parameters of monofractal analysis. Hierarchical cluster analysis and k-cluster method classified two existing groups of aspiny cells into three classes. Moreover, the morphometric difference in all groups between two functional different nuclei were reported. To the best of our knowledge, the presence of neuronal types in the adult human neostriatum has thus far been established and described mainly with Euclidean parameters. Thus, the present study, quantifies cells with monofractal parameters only. In the present study, only two types of aspiny neurons were used. But two techniques of cluster analysis found three groups of neurons. This results need to be verified with same classification technique, but using different computational parameters. Finally, the present study offer vague conclusion regarding difference in cell types between two cores of dorsal lamina.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131808344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Calofir, I. Fagarasan, N. Arghira, Mircea Stefan Simoiu, G. Stamatescu, Cristina Nichiforov, S. S. Iliescu
{"title":"Simulator for Automation and Control Systems in a Power System","authors":"V. Calofir, I. Fagarasan, N. Arghira, Mircea Stefan Simoiu, G. Stamatescu, Cristina Nichiforov, S. S. Iliescu","doi":"10.1109/CSCS.2019.00066","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00066","url":null,"abstract":"Through the future Smart Grid influenced by the challenges brought by distributed and unpredictable generation, limited energy storage infrastructure or shifting consumption patterns, the real-time large-scale system control becomes a necessity. When several energy concepts are translated into simulated processes, it is important to implement and test a large range of applications from process control, electrical grid protection systems, automatic line/reserve switching, monitoring and control of energy systems, for training reasons. Energy applications can vary from generation, transport/distribution and consumption, these covering a wide area of applications of discrete and continuous control. In this context, the paper presents the simulator system architecture, implemented applications and field necessity. As shown in the paper, the simulator applications vary from generation control to load control, including various specific automation functions and energy management in the grid.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116066866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alexandru Sorici, Andrei Olaru, S. Flonta, S. Enyedi, A. Florea
{"title":"Towards Enabling Context-as-a-Service for Social Assistive Robotics","authors":"Alexandru Sorici, Andrei Olaru, S. Flonta, S. Enyedi, A. Florea","doi":"10.1109/CSCS.2019.00045","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00045","url":null,"abstract":"Integrating assistive robots into global-scale management systems comes with a number of challenges and requirements which are pervasive to all applications enabling context-awareness. We argue that the hypermedia model and the agent-oriented paradigm help achieve the vision of Context-as-a-Service. We categorize challenges according to context processing concerns and use a scenario to exemplify how the proposed architectural principles help overcome the challenges. A security model is presented, enabling the correct management of information in a hierarchy of agents.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121658648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anamaria Iamandi, N. Arghira, I. Constantin, S. S. Iliescu
{"title":"The Influence of Digital Communications in Protection Schemes","authors":"Anamaria Iamandi, N. Arghira, I. Constantin, S. S. Iliescu","doi":"10.1109/CSCS.2019.00065","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00065","url":null,"abstract":"Transmission lines are supervised by Intelligent Electronic Device (IED) designed to detect and clear internal faults selectively, at high speed. As the complexity of electrical power systems increase, the demands on the protective devices are also more challenging. A variety of communication schemes which complete the protection schemes have been developed and they are based on the exchange of logical data between the transmission line ends. This supplements the locally available data, confirming that a fault detected at one end in forward direction, is internal to the line, using the information from the other end/ends where protection had also detected a forward direction fault [1]. In this context, the aim of this article is to show the influence of digital communications for protection schemes on a proposed network area in the Romania power system. The studied transmission line is a short line therefore, according to [2] and [3], the protection scheme has both current differential protection as main protection and distance protection as back-up. Several fault scenarios were computed and tested in a platform that has designed the entire 400/220/110 kV transmission and distributions network of the Romanian power system is designed. The results conduct to proposed protection grading plan. Communication between the protection devices represent the basis for fault detection in the case of current differential protection or ensure fast tripping and selectivity requirements in distance protection.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126151407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Fractional Order Control Applied to a Multi-Rotor System","authors":"E. Dulf, Daniel D. Timis, L. Székely, L. Miclea","doi":"10.1109/CSCS.2019.00124","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00124","url":null,"abstract":"Due to their exceptional flying maneuverability and simple dynamics, multirotor systems are widely used for various applications. Such systems vary over time due to external disturbances or unmeasured changes to which they are subjected. In this case, a simple PID controller cannot provide the desired response, unless the controller parameters are re-tuned. An adaptive control algorithm responds to this need. Moreover, to increase robustness, fractional order controllers are designed, being recognized for this property. Such control provides the entire process with good robustness and ensures good operation for major process changes. The present paper describes a comparison between such an algorithm and a classical PID applied to a quadcopter system.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129859326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ianculescu, A. Alexandru, Nicolae-Dragos Nicolau, G. Neagu, Ovidiu Bîcă
{"title":"IoHT and Edge Computing, Warrants of Optimal Responsiveness of Monitoring Applications for Seniors. A Case Study","authors":"M. Ianculescu, A. Alexandru, Nicolae-Dragos Nicolau, G. Neagu, Ovidiu Bîcă","doi":"10.1109/CSCS.2019.00118","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00118","url":null,"abstract":"The global ageing population puts a burden on healthcare systems not only from the point of view of cost-related aspects, but also from the senior patients' point of view who tend to be predominately empowered regarding their own health management, digitally-skilled and demanding for personalized health protocols and solutions. Silver Digital Patients can be defined as seniors that master improved abilities of using digital technology in their daily activities, including in monitoring their health, who prove increased interest in having access to the best healthcare to preserve as much as possible their independence and health. An active, decent and safe life for seniors is at its best in their own homes; therefore, a remote health monitoring represents the most appropriate way to smooth the disruptive degenerative age-related factors, together with the important benefit of relieving the expenditures for senior institutionalizations. In this respect, emerging senior-centered technologies have the potential to provide a reliable support for building the most appropriate healthcare provision and environment. Internet of Health Things (IoHT) is a concept for a great variety of devices connected to the Internet that are able to gather a huge amount of diverse data - like health or environmental parameters - in order to keep a close remote watch on the patient, to improve the diagnose of his/her health status and to establish a better preventative healthcare. Edge computing brings the potential of improving the performance and responsiveness of IoHT by allowing the real-time collected data to be pre-processed closer to the source, which can be extremely important for time-sensitive health data in order to identify and trigger anticipatory or reactive health actions. This paper presents a case study -\" Non-invasive monitoring and health assessment of the elderly in a smart environment (RO-SmartAgeing)\" project - that evaluates the opportunities brought by IoHT and edge computing for a monitoring application. The general objective of this project is to demonstrate the potential of some emerging technology for the positive transformation of how healthcare services are provided to the seniors and to healthcare provider. According to its current development state, a proposed IoHT-based architecture of the monitoring application and a data analytics demo for a health parameter is presented.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130883217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cyber-Physical Systems Oriented Platform Using Web Services","authors":"E. Pop, Daniela Gîfu","doi":"10.1109/CSCS.2019.00110","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00110","url":null,"abstract":"Cyber-Physical Systems (CPS) are obtained by integrating computation, networking, and physical processes. In many applications, within a CPS, mobile and wireless networks are used to realize the data transmission, conforming to the concept of Internet of Things (IoT). This facilitates interactions with several types of devices like sensors, RFID readers, mobile phones etc. Besides, Smartphones include important sensors as GPS, accelerometers, light sensors, phone camera etc. Based on such a foundation, different electronic services can be developed and provided for various types of clients. New research directions revealed the necessity to consider middleware architectures in CPS design. In this direction, Service Oriented Architectures (SOA) represents a paradigm that can be very efficient in designing specific layers of CPS. Web services are examples of SOA implementation, adequate for the requirements of the business environments. This paper presents a Cyber Physical Systems oriented e-business platform using Web services, which can be accessed through mobile and wireless networks, using Android OS Smartphones. A stock market exchange service was considered, as a relevant example of e-business. The time response of the SOAP and REST based Web service was evaluated, on LTE 4G and IEEE 802.11n channels, to determine which protocol is more efficient to increase the real time response capacity of the CPS oriented platform.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121120331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Loss Prevention and Data Protection in Cloud Environments Based on Authentication Tokens","authors":"Vlad Bucur, O. Stan, L. Miclea","doi":"10.1109/CSCS.2019.00128","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00128","url":null,"abstract":"Data leek issues represents a very high or critical importance within the cloud developers. Given the tremendous growth of cloud computing in the past 3 years the authors of this paper believe that an analysis of the implementation of modern security solutions for data leaks and data protection is of the utmost importance. Authentication tokens, provided by several different cloud providers and third parties, are one of the most common and useful tools that developers have in order to secure their applications. The goal of this paper is to analyze how these tokens are currently used and to provide a solution in order to improve their implementation by reviewing their compatibility with novel security concepts or challenges such as data tagging, hybrid data security algorithms, microservices deployment using Docker or serverless applications","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126948903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Control System Design for Unicycle Robots Using Genetic Algorithms with Pareto Immunization","authors":"I. Banu, M. Pătrașcu","doi":"10.1109/CSCS.2019.00016","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00016","url":null,"abstract":"Classical genetic algorithms have been used in various optimization problems in engineering and other science fields. Mobile robots have complex nonlinear dynamics and finding optimal controllers is generally a difficult task. We propose an enhancement of the classical genetic algorithm that seeks to improve search efficiency when dealing with multiple conflicting criteria. Our solution consists in an immunization mechanism. Using an updating Pareto front, we create adaptive vaccines to help the population strengthen its desirable features during evolution. Numerical simulations show that a significant improvement has been obtained in terms of required number of generations to reach a desired optimum. Moreover, the returned solutions offer more consistent closed loop performances when using the proposed Pareto-based immunization mechanism.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128337143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raisa-Gabriela Zamfirescu, C. Rughiniș, Alexandra Hosszu, Darie Cristea
{"title":"Cyber-Security Profiles of European Users: A Survey","authors":"Raisa-Gabriela Zamfirescu, C. Rughiniș, Alexandra Hosszu, Darie Cristea","doi":"10.1109/CSCS.2019.00080","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00080","url":null,"abstract":"Cyber-security concerns, experiences and protective activities are increasingly discussed not only among specialists but among the general public. There is considerable variability among users, at individual and social level, in the intensity of digital activity, experience of cyber-attacks, preventive measures and concern with security. In this paper we rely on the Eurobarometer 87.4/2017 survey and we classify European Internet users in four attitudinal profiles: the avoiding, the exploratory, the wary and the aware. This empirical classification captures statistical variability and helps build a more nuanced profile of European countries, in order to adapt national policies of awareness to cybercrime.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131844158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}