2019 22nd International Conference on Control Systems and Computer Science (CSCS)最新文献

筛选
英文 中文
Noise Removal from ECG Signal Based on Filtering Techniques 基于滤波技术的心电信号噪声去除
M. Almalchy, Vlad Ciobanu, N. Popescu
{"title":"Noise Removal from ECG Signal Based on Filtering Techniques","authors":"M. Almalchy, Vlad Ciobanu, N. Popescu","doi":"10.1109/CSCS.2019.00037","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00037","url":null,"abstract":"The Electrocardiogram (EKG or ECG) is a semi-cyclic, rhythmically, and synchronous signal with a cardiac function through the passive sensory apparatus in which the apparatus is performing as generator of bioelectric signal mimicking the function of the heart. The EKG signals are inherently weak, and noisy signals built of many variable components due to many environmental factors in which it may include but is not limited to changes in body temperature, body movement, and line frequency 50/60 Hz. The ECG signal cannot be conditioned, amplified, nor reproduced directly and therefore, digital filtering techniques with adjustable window are used in this paper. The paper analyses several models of Finite Impulse Response (FIR) filters of low-pass and high-pass and their aspects in term of response time, gain, and harmonic distortion, and rejection to determine the best band-pass filtering model to reproduce an ECG signal that closely resembles the actual Heart function of a patient. A hybrid filtering model is proposed and experimentally tested. Mean square error (MSE) is used to estimate a signal goodness. MATLAB environment has been used for the experimental part to simulate the signals. This research work has been considered in the context of a larger project that consists of a complex wearable health monitoring system comprising biosensors, wireless communication modules and links, control and processing units, medical shields, wearable materials and advanced algorithms used for decision making and data extracting. The proposed filtering technique is useful in the medical data preprocessing phase.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131773661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Cyber Security of Smart Grids in the Context of Big Data and Machine Learning 大数据和机器学习背景下的智能电网网络安全
D. Dogaru, I. Dumitrache
{"title":"Cyber Security of Smart Grids in the Context of Big Data and Machine Learning","authors":"D. Dogaru, I. Dumitrache","doi":"10.1109/CSCS.2019.00018","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00018","url":null,"abstract":"The power system can be seen as a cyber-physical system where big data plays a major role in managing the overwhelming volume of data underlining the importance of big data in both the power industry and security domain. In this article, it is presented the challenges of cyber security in power systems and machine learning techniques, like artificial neural networks, to prevent and overcome cyber-attacks. The motivation for choosing this topic resides in the evolution of power systems with the need for cyber security implementation.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122413595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Brain-Computer Interface: Challenges and Research Perspectives 脑机接口:挑战与研究展望
R. Lupu, F. Ungureanu, Corina Cimpanu
{"title":"Brain-Computer Interface: Challenges and Research Perspectives","authors":"R. Lupu, F. Ungureanu, Corina Cimpanu","doi":"10.1109/CSCS.2019.00071","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00071","url":null,"abstract":"Nowadays, the interest in the Brain-Computer Interfacing (BCI) domain is continuously growing, only judging by the number of BCI related papers published or presented in neuro-engineering or neuroscience journals, conferences or workshops. In all these studies, brain activity is considered as a simple modality of providing a system or a device with knowledge from human interactions. Although this simple transfer of information represents a significant development since BCI also integrates brain signals with data from sources like speech, eye gaze, gestures, facial expressions, body postures or physiological measures like heart rate, blood pressure or electrodermal activity. This fusion creates a context-aware and a context-dependent interpretation of the brain signals but represents in the same time a challenge for the neuroscience researchers that must process and represent all this data for clinical or non-clinical applications. BCI has become an addictive and powerful research domain offering a wide range of applications from cognitive load in educational tasks and gaming to automotive and assistive technology. This paper aims to outline current trends in brain-computer interface development and research from the perspective of the authors' experience and scientific literature.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126104033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Demand Dispatch for the Distribution Grid – A Proposal for the Romanian Power System 配电网的需求调度——罗马尼亚电力系统的建议
N. Arghira, I. Fagarasan, Cristina Nichiforov, S. S. Iliescu, Iulia Stamatescu, V. Calofir, N. Ignat
{"title":"Demand Dispatch for the Distribution Grid – A Proposal for the Romanian Power System","authors":"N. Arghira, I. Fagarasan, Cristina Nichiforov, S. S. Iliescu, Iulia Stamatescu, V. Calofir, N. Ignat","doi":"10.1109/CSCS.2019.00061","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00061","url":null,"abstract":"The paper presents the demand dispatch (DD) concept and applications after a thorough analysis of the main studies in the field. From distribution system operator (DSO)/utility perspective, a main DD classification split was observed: energy price strategies and incentives strategies. On the consumer side, DD methods can be divided into two control options: load shifting and load shedding, with different control approaches. At the distribution grid level, a demand dispatch control framework was proposed. A multi-criteria optimization problem was formulated, considering the 3 involved actors: the utility, the energy market and the consumer. The testing scenario was built, based on the Romanian power system context with data considered from the transport operator and the energy market.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124712700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detecting Vital Signs Using Inertial Measurement Unit Sensors in Military Applications 惯性测量单元传感器在军事中的应用
Alexandru Cismas, Eduard Cismas, D. Popescu
{"title":"Detecting Vital Signs Using Inertial Measurement Unit Sensors in Military Applications","authors":"Alexandru Cismas, Eduard Cismas, D. Popescu","doi":"10.1109/CSCS.2019.00022","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00022","url":null,"abstract":"Soldiers are subjected during the mission to death threats. Moreover, the medical crew when they need to intervene takes very high risks being forced to move through cross-fire. Being aware of the status of every soldier in battle gives a great advantage in terms of prioritization. Besides the military applications, there is a visible need of new methods of determination of the vital signs. Discovering such new methods offers the advantage of versatility. Wearables will no longer be constrained by where they should be worn, or there will be enough methods of analyzing the vital signs that it will be easier to find a method of wearing it that suits the need. Because the IMU sensors are used in every device that consists of a movement analyzing feature, searching for new applications to use them brings a big gain. In this paper, we analyze the possibilities of using IMU sensors in detecting the vital signs of a person, and the results obtained will represent a starting point for the implementation of a solution for monitoring the vital signs of soldiers.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"AES-7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126513241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Collecting and Processing a Self-Driving Dataset in the UPB Campus UPB校园自动驾驶数据集的采集与处理
A. Nica, Mihai Trăscău, Alexandru Andrei Rotaru, C. Andreescu, Alexandru Sorici, A. Florea, Vlad Bacue
{"title":"Collecting and Processing a Self-Driving Dataset in the UPB Campus","authors":"A. Nica, Mihai Trăscău, Alexandru Andrei Rotaru, C. Andreescu, Alexandru Sorici, A. Florea, Vlad Bacue","doi":"10.1109/CSCS.2019.00041","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00041","url":null,"abstract":"Although there is a diversity of publicly available datasets for autonomous driving, from small-scale to larger collections with thousands of miles of driving, we consider that the process of collecting and processing them is often overlooked in the literature. From a data-driven perspective, quality of a dataset has proven as important as quantity especially when evaluating self-driving technologies where safety is crucial. In this paper, we provide a guideline going through all the steps from configuring the hardware setup to obtaining a clean dataset. We describe the data collection scenario design, the hardware and software employed in the process, the challenges that must be considered, data filtering and validation stage. This work stems from our experience in collecting the UPB campus driving dataset released together with this work. It is our belief that having a clean and efficient process of collecting a small but meaningful dataset has the potential to improve benchmarking autonomous driving solutions, capturing local environment particularities.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126597814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
DEW: A New Edge Computing Component for Distributed Dynamic Networks 分布式动态网络的一种新的边缘计算组件
Giorgiana Cristescu, R. Dobrescu, Oana Chenaru, G. Florea
{"title":"DEW: A New Edge Computing Component for Distributed Dynamic Networks","authors":"Giorgiana Cristescu, R. Dobrescu, Oana Chenaru, G. Florea","doi":"10.1109/CSCS.2019.00100","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00100","url":null,"abstract":"The paper proposes the introduction of a new component in the family of distributed computer networks, with specific functions for edge computing devices. The DEW component is a network layer located between Fog and Edge, a position currently attributed to the Mist concept. Specifically, DEW is designed as a Mist counterpart that can be used in Distributed Dynamical Networks (DDN). The DEW characteristics and the associated specific algorithms are discussed on a particular type of DDN - microgrids and microgrids clusters.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122303632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Nonlinear Identification and Controller Design for the Air Levitation System 空气悬浮系统的非线性辨识与控制器设计
M. Schaefer, Daniel Escobar, H. Roth
{"title":"Nonlinear Identification and Controller Design for the Air Levitation System","authors":"M. Schaefer, Daniel Escobar, H. Roth","doi":"10.1109/CSCS.2019.00011","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00011","url":null,"abstract":"This paper presents an alternative method for modeling the air levitation system using nonlinear identification, to overcome common mismatches between simulation and the real system. The proposed controller pursues to compensate the nonlinearities present in the system, allowing the design of classical PID controller. Within the results are presented the behavioral comparison between a nonlinear and a linear identified system. The presented approach aims to use available simulation tools, so that the results can be included as part of laboratory experiments.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133619523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of Suspicious Connections on Android Mobile Devices Android移动设备的可疑连接检测
Dragos Costea, N. Tapus
{"title":"Detection of Suspicious Connections on Android Mobile Devices","authors":"Dragos Costea, N. Tapus","doi":"10.1109/CSCS.2019.00058","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00058","url":null,"abstract":"Mobile devices are vulnerable to becoming part of botnet operations just as any other computing device. Attackers use domain generation algorithms to increase their chance of controlling a mobile device. In order to harden a user's defense against such an attack, this paper proposes a method for inspecting outgoing connections. By inspecting DNS packets that are transferred between the mobile device and the Internet, domain names are extracted and classified as legit or suspicious based on specific lexical features inspired from existing literature. Packet inspection is done without superuser privilege and with minimal user interaction. The solution displays the connections established by a mobile devices with and without the user's consent. Performance analysis on the packet inspection process was done to understand and visualize the CPU and memory usage together with the impact on user experience.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132482253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Size Adaptation of Separable Dictionary Learning with Information-Theoretic Criteria 基于信息论标准的可分离词典学习的大小自适应
Andra Baltoiu, B. Dumitrescu
{"title":"Size Adaptation of Separable Dictionary Learning with Information-Theoretic Criteria","authors":"Andra Baltoiu, B. Dumitrescu","doi":"10.1109/CSCS.2019.00009","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00009","url":null,"abstract":"In sparse representation problems, the size of the dictionary is critical to the performance of the learning algorithm and, apart from loose guidelines concerning dictionary integrity, there is little indication on how to determine the optimal size. Information-theoretic criteria (ITC), used generally for model selection, have recently been employed for the task. This paper extends the work for the case of separable dictionaries, by modifying the Extended Renormalized Maximum Likelihood criterion to the 2D model and proposes an adaptation algorithm that almost entirely relies on the ITC score. Results in terms of mean size recovery rates are within 1 atom away from the true size, while representation errors are consistently below those obtained when applying dictionary learning with the known size.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"41 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116734362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信