smart applications & technologies for electronic engineeringsatee.uab.ro/upls/satee2012.pdf ·...

46
„1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering Smart Applications & Technologies for Electronic Engineering SATEE 2012 BOOK OF ABSTRACTS October, 26-27, 2012 Alba Iulia, România

Upload: others

Post on 18-Sep-2019

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

„1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

Smart Applications & Technologies for Electronic

Engineering

SATEE 2012

BOOK OF ABSTRACTS

October, 26-27, 2012 Alba Iulia, România

Page 2: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

2

“1 DECEMBRIE 1918”

UNIVERSITY OF ALBA IULIA

UNIVERSITY POLITEHNICA OF

BUCHAREST “POLITEHNICA” UNIVERSITY OF

TIMISOARA

Scientific Comitee Organizing Comitee

Chair

• Ioan ILEANA

Vice Chair

• Lucia CABULEA, Vice-rector

Members • Loredana BOCA • Emilian CEUCA • Bogdan CROITORU • Ciprian Ioan CUCU • Ovidiu DOMSA • Ioana FARKAS • Constantin HUTANU • Arpad INCZE • Remus JOLDES • Manuella KADAR • Gheorghe MARC • Maria MUNTEAN • Emil OLTEANU • Mircea RÎSTEIU • Corina ROTAR • Adrian TULBURE

• Mihail ABRUDEAN, RO • Mihaela ALBU, RO • Ion BAROSAN, NL • Alexandru BORCEA, RO • Gheorghe BREZEANU, RO • Gabriel CHINDRIS, RO • Calin ENACHESCU, RO • Alexandru HEDES, RO • Sergiu ILIESCU, RO • Branko KATALINICI, AT • Gheorghe MANOLEA, RO • Bazil MERTIOS, GR • Liviu MICLEA, RO • Liviu MORAR, RO • Nicolae MUNTEANU, RO • Dumitru NEDELCU, RO • Teodor PETRESCU, RO • Dan PITICA, RO • Aron POANTA, RO • Dan STOICHESCU, RO • Paul SVASTA, RO • Paul SCHIOPU, RO • Ioan TÂRNOVAN, RO • Honoriu VALEAN, RO

Secretary

• Mihaela CIORTEA

Tipar executat la Tipografia Universitatii „1 Decembrie 1918” din Alba Iulia Editura AETERNITAS, ISBN 978-606-613-051-6

Page 3: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

3

Table of Contents

1. Simulation Models for Network Communication in a Distillation Column 5

2. Handling in Manufacturing Systems Modeling 7 3. Creating a Transducer Electronic Datasheet using I2C Serial

EEPROM Memory and PIC32-Based Microcontroller Development Board 9

4. Symmetrical Components Relay for LV Electrical Power Networks 11

5. Aspects Regarding Activity Recognition Using Wireless Sensor Networks 13

6. Automated Driver Assistance System for Traffic Light Detection 15

7. Enhancing The Bit Sieve /Pixel Sieve Methods 17 8. Feature Selection For Time Improvement In Glass Dielectric

Materials 19 9. Designing a PLC-based Manufacturing Control System for

Cutting and Packing Processes 21 10. Adjustment Formula for a Device Used to Check the Thread

Gauges 23 11. Mechatronic Platforms, Ideal Bases In Training, Education

And Research (2) 25 12. The Influence of Support Vector Machine Kernel

Parameters on Classification Accuracy 27 13. Software Simulation Study For Fourier series 29 14. Support Vector Machines for light refraction 31 15. Procedure to Reduce Conducted Emissions Generated by

Corona Electroseparator 33 16. Web-Based Tools for Real Time Data Acquisition 35 17. Rapid Prototyping Scale Using Lego Mindstorms NXT

Educational Kit 37 18. Mechatronic Platforms , Ideal Bases In Training, Education

And Research (1) 39 19. Positioning System with Optoelectronic Sensors 41 20. Design of Anti Burglar Alarm Systems 43 21. An EMC Problem Inside An IC And Its Workaround 45

Page 4: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

4

Page 5: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

5

Simulation Models for Network Communication in a Distillation Column

Maria Loredana BOCA1), Mihail ABRUDEAN2), Emil OLTEANU1)

1) University “1 Decembrie 1918” of Alba Iulia, [email protected]

2) Technical University of Cluj-Napoca, [email protected]

Summary: The design of the control systems for sensor networks presents important

challenges1. One aspect regarding networks communication represents the mission critical situations that can appear in a distillation column. The process of monitoring and supervision of the network communication in a distillation column is a complex process. Because the distillation column is a critical process, is needed to have a good communication network, between the column and administrator, which monitor the process. In this way he can easily find every critical or faulty situation which can affect the stability and functionality of the process. All these faulty or critical situations from the system are called in this study” mission-critical”.

In this paper we present some simulation models of a possible “mission-critical” situation in distributed network using to control and supervision a distillation column. These models are created to be able to easily finding the moments that can be critical for entire process.

Keyword list: mission-critical, distributed network, data acquisition, distillation column.

Motivation

In the last period of time, process control performance monitoring software has become an important tool in the control engineer’s toolbox [1]. Still, the number of performance tests and statistics that can be calculated for any given control loop can be overwhelming. One concerning problem is the permanently increasing number of data. These data become even more complex to be gathered and the management is also very difficult. Even more difficult is to make results readable and meaningful.

Distributed systems are increasingly being applied in critical real-time applications and their complexity forces programmers to use design methods which guarantee correctness and increase the maintainability of the products. Object-oriented methodologies are widely used to cope with complexity in any kind of system[2], but most of them lack a formal foundation to allow the analysis and verification of designs, which is one of the main requirements for dealing with concurrent and reactive systems.

The present paper describes one method to detect a possible “mission-critical” situation in a communication network for a distillation column and find the moments that can be critical for entire system.

We propose some simulation models that can be able to monitor the communication network between administrator of the column and distillation column.

The sensitive aspects which may lead to “mission-critical” situations and relevant to our system are: abnormal changes of environment parameters, the monitored processes, sensors failure, DAQ (data acquisition devices) failure, problems regarding communication between devices (cables or wireless), server failure and other mechanical or non-mechanical failures from the system (Fig 1).

Page 6: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

6

Fig.1. Model of “mission-critical” possible situations in a distributed sensors network In the work with anomaly detection that has been carried out so far, the main emphasis

has been on monitoring the behavior of the system (sequences of function calls, connections between machines and so on) rather than the data passed around the system.

One research shows how the accuracy and security of distributed network can be improved by using anomaly detection to identify bad values caused by attacks and faults. The performance of invariant induction and n-gram anomaly-detectors will be compared and also outline plans by integrating the output from several anomaly-detecting techniques using Bayesian networks. This research springs from a more general attempt to improve the security and dependability of distributed systems using anomaly detection.

This problem was solving with a some simulation models which can help us to easily observe every abnormal moment that can appear in the system like: abnormal changes of environment parameters, the monitored processes, sensors failure, DAQ (data acquisition devices) failure, problems regarding communication between devices (cables or wireless), server failure and other mechanical or non-mechanical failures from the system.

References [1] Bogdan M., Panu M., Viorel A., “Teaching data acquisition on a virtual laboratory, the

4th Balkan Region Conference on Engineering Education”, ISSN 1843-6730, 12-14 Iulie, Sibiu, 2007.

[2] Schmidt D.C., Schantz R., Masters M., Cross J., Sharp D., L.iPalma, “Towards adaptive and reflective middleware for network-centric combat systems”, CrossTalk — The Journal of Defense Software Engineering pp. 10–16, 2001.

[3] Widom J., “TRIO - A system for data, uncertainty, and lineage”, 2008. http://ilpubs.stanford.edu:8090/843/1/2008-27.pdf

Page 7: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

7

Handling in Manufacturing Systems Modeling Ciortea, Elisabeta Mihaela1)

1) Sciences and Engineering, “1 Decembrie 1918” University of Alba Iulia, Romania, [email protected]

Summary: In preparing this paper we started from the idea that flexible manufacturing system are automated system with sophisticated technology, the machines used to determine cell manufacturing cells.

A flexible manufacturing system consist of several automation stations, is able to achieve varying routes between stations.

The concept integrates many technologies such as flexible automation, control distributed system, automatic handling and storage.

The application used is a general example modelled with Petri nets and handling system is in place highlights the emergence of cunning to wait. This paper seeks their elimination by changing cell site, combining types of products and establish if handling multiple deposits. Keywords: flexible manufacturing system, Petri nets, distributed system, handling system Motivation

This work represented a way of handling the flexible manufacturing system that resembles a staging system string.

Waiting threads [1] [2] allow mathematical modeling and interpretation issues pending in order to obtain optimum running rules taking into account restrictions.

Analyzed case study shows a system of transport and handling with the calling thread, fig. 1 and a linear system automatically presented as a directed graph, fig. 2.

Figure 1: Transportation and handling system with auxiliary time.

Figure 2: Transportation and handling system without auxiliary time.

TR = transport system (TR1, TR2, TR3) PR = processing (PR1, PR2, PR3) ST= storage space (ST1, ST2)

TR = transport system (TR1, TR2, TR3) PR = processing (PR1, PR2, PR3) WD= storage space (D1) M=processing center (M1, M2, M3)

Page 8: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

8

Results

In fig. 3 is presented the variation of flow and tra nsport in different centers handling for systemic in Fig. 1 and in Figure 4 highlights the variation of flow processing center handling 2. for systemic in Fig. 2, no variations were notified representation is linear and continuous, and the reporting was done as for Fig. 1 all at the same time.

Figure 2: Variation flow processing centers and warehouse 2.

Figure 3: Charge for processing the store is variation in flow and load handling parts

warehouse for processing without highlights the variation in flow parts handling

Waiting thread is defined by the ratio of the number of entries in the system and processing capacity they have machines in the system.

Output flow is important because it represents an input to another queuing system in the context of the system form a network of staging systems.

References

[1] A. Bejan, „Modelarea timpului de orientare în sisteme de asteptare cu prioritati”, Teza de doctorat, Chisinau, Septembrie 2007, Universitatea de Stat din Moldova, Facultatea Matematica si Informatica

[2] Gh. Boncoi, G. Calefari, A. Fota, P. Maniut, V. Enache „Sisteme de productie”, Vol. I, Editura Universitatii TRANSILVANIA Brasov, 2000, ISBN 973-9474-88-8

Page 9: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

9

Creating a Transducer Electronic Datasheet using I2C Serial EEPROM Memory and PIC32-Based Microcontroller

Development Board

B. S. M. Croitoru1), M. Abrudean2), L. Boca1), M. Risteiu1)

1) Department of Mathematics-Informatics-Electronics, ”1 Decembrie 1918” University of Alba Iulia, Romania

2) Department of Automation, Technical University of Cluj-Napoca, Romania Corresponding author: B. S. M. Croitoru, e -mail: [email protected] ;

Summary: The present paper describes a method for creating two different types of Transducer Electronic Datasheets (TEDS) according to IEEE 1451.4 standard, but with few minor modifications and adaptations regarding the length in bytes of the TEDS, in order to develop a prototype of smart transducer with Plug & Play capabilities on any arbitrary network. In the experiments were used: one temperature sensor, one light sensor, one PIC32-based microcontroller development board with many I/O ports and other computing resources, two 24LC256 and 24LC512 I2C serial Electrically Erasable Programmable Read Only Memory (EEPROM) memories with 64KB and 128 KB available space and 64 and 128 bytes internal buffer for page writes. It was developed a prototype algorithm for writing and reading TEDS information to / from I2C EEPROM memories using C / C++ language. The algorithm is able to write and read two types of TEDS: transducer information with standard TEDS content and transducer information with standard TEDS and calibration table TEDS. A second software application, written on .NET platform, was developed in order to access the EEPROM sensor information from a computer through a serial interface (USB, RS-232). Keywords: smart, sensors, TEDS, EEPROM, microcontroller. Motivation

Using a 32 bits microcontroller (PIC32MX320F128) on embedded systems, it brings the complexity of intelligent functions of smart transducers to a higher level. In this way the sensors will become more reliable and more intelligent in time in many heterogeneous domains [1]. Also, some specifications of the IEEE 1451 standard can be modified, improved and integrated into prototypes of smart sensor boards [1]. Thus, the end user has access to more complex sensor functions, more complex mathematical computations, and to some new special sensor data resulted by applying more complex mathematical algorithms and new processing functions. Results

The main goal of the research was achieved and two types of TEDS were successfully written on EEPROM memories using a special C / C++ algorithm which carefully compute each detail of the IEEE 1451.4 standard [1]. Anyway, the length in bits for each parameter of the TEDS was increased, and all the variables used to store TEDS information uses data types like: INT, LONG INT, BYTE, CHAR, CHAR[n]. In Fig. 1 are illustrated the components of the smart sensor board system: one EEPROM memory connected via I2C bus to the PIC32 development board, two analog sensors used to create the TEDS for them. Fig. 2 displays a high level software application created using VB.NET programming language, which is capable for writing and reading TEDS to / from EEPROM devices attached to development board together with some a nalog sensors [1].

Page 10: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

10

Fig. 1 In the left PIC32-based microcontroller development board and I2C serial EEPROM used to store sensor TEDS information according to IEEE 1451 standard; the picture in the middle displays

two analog sensors used in experiments; the right picture displays the structure of a smart transducer device according to IEEE 1451 standard

Fig. 2 The Visual Basic application used to write / read TEDS information to / from EEPROM memory of the development board using serial communication (USB); also other opperations can be performed with the MCU-based development board

References [1] L. Bissi, P. Placidi, A. Scorzoni, I. Elmi, S. Zampolli, “Environmental monitoring system compliant with the IEEE 1451 standard and featuring a simplified transducer interface” , Sensors and Actuators A 137, pp. 175–184, Science Direct, Elsevier, 2007.

Page 11: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

11

Symmetrical Components Relay for LV Electrical Power Networks Remus, DOBRA1) and Carol, ZOLLER 2)

1) Department of Electrical and Power Systems, University of Petrosani, Petrosani, Romania,

email: [email protected] 2) Department of Electrical and Power Systems, University of Petrosani, Petrosani, Romania,

email: [email protected]

Summary: Faults occurred in the three-phase power networks are causing an unbalance of supply voltages with undesirable effects on consumer electric. For these reasons it is important to make a careful study of the causes, effects and possibilities of restoration of the unbalances occurred in the three-phase systems. To control this, there are specific methods and electronic relays, which are hardware programmed to survey the symmetrical components of currents and voltages. The paper describes a control method of positive, negative and zero components, using a programmable system on chip that was programmed in accordance with a designed symmetrical components flowchart. Keywords: symmetrical components, voltage unbalance, sampling methods, embedded systems. Motivation

Real power systems must be symmetrical and balanced, so for practical purposes they must be analyzed consequently. Frequently the degree of unbalance cannot be neglected [8]. Such cases may occur during emergency conditions like unsymmetrical faults (one or two-phase short-circuiting), unbalanced loads, open conductors, unsymmetrical operation of rotating machines, etc. Electrical power systems require specific standards regarding energy quality [7]. For this reason, we have developed a digital technologies based on a peculiar fast flowchart which provides information in real time on symmetrical components generated by the asymmetry of the systems in their abnormal operating conditions. Reference [5] shows an example of fast method for identification of symmetrical components for power system protection. In order to obtain Fortescue’s sequence components it must be summed the sampling voltages shown in fig.1.

Figure 1: Voltage samplings and the strategy to obtain symmetrical components.

Page 12: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

12

Results The symmetrical components relay was develop using an embedded system

belonging to Cypress family microcontrollers. Were used three comparators to generate the interrupt whenever voltages cycle crossing trough zero. In that interrupt, the 16-bit timer will start for the time after which to read input as presented in figure 2. According with the designed flowchart the delay time is 1.1 [ms]. In the following stages timer interrupt is enable and the Terminal Count is keep interrupt.

Figure 2: Digital section of the PSoC architecture for symmetrical components relay.

Figure 3: Analog section of the PSoC architecture for symmetrical components relay.

When the capture input is asserted high, the transition is synchronized to the system clock and the value in the Count register will be transferred to the Compare register. In the CY8C29466 families used for testing this method, the interrupt type was set to "capture", an interrupt will occur following the capture event of zero crossing voltages. The count value can then be read using the ReadTimer API function.

After da ta is stored in to the system registers, using its software facility the Fortescue’s formulas, positive, negative and zero sequence voltages will be calculated. In the extended paper, is presented the symmetrical components relay architecture that contain all subsystems used in the developed project. References [1] C. Zoller, I. Fotau, Virtual instruments to analyze the quality of the electrical power networks. Annals of the University of Petrosani, Electrical Engineering, vol 6(XXXIII), Petrosani, 2004; [2] S. Costinas, C. Zoller, R. Dobra, Control Real-Time Flowchart for Symmetrical Components of the Power Systems, IEEE PowerTech 2009, 28 June - 2 July 2009, Bucharest, Romania. [3] M. Farghaly, N. Ibrahim, Two Three-Phase Symmetrical Component Filters of 6-Phase Electrical Power Systems, Electric Power Components, vol. 34, Number 11, 2006 , pp. 1231-1242(12) [4] M. Duric, Z. Radojevic, I. Škokljev, V. Terzija, A simple algorithm for the symmetrical components relaying and monitoring, vol. 79, Number 3 / June, 1996 [5] K. M. EL-Naggar, A fast method for identification of symmetrical components for power system protection, Electrical power & energy systems, Elsevier, 2001 [6] S. E. Zocholl, “Introduction to Symmetrical Components,” document #6606 Schweitzer Engineering Laboratories, Inc., Pullman, WA. [7] F. Mantilla, An analytical and graphical study of the symmetrical components in an induction motor supply in relation to the voltage unbalance parameters, 2009. [8] H. Saadat, Power System Analysis. Chapter 10: Symmetrical Components and Unbalanced Faults. The McGraw-Hill Companies, New York, NY, 1999.

Page 13: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

13

Aspects Regarding Activity Recognition Using Wireless Sensor Networks

Ioana -Iuliana, Farkas1)

1) Science and Engineering, 1 Decembrie 1918 University of Alba-Iulia, Alba -Iulia, Romania, [email protected]

Summary: For the last past yeas, sensor networks for monitoring home care environments have became a significant concern for advanced researches. An algorithm with multiple threshold methods for detecting and classifying the postures of the subjects in free living live was used. The system used for this research is able to collect data and perform posture analysis. A set of postures/movements and seven basic positions have been identified by this system from four healthy subjects. Keywords: accelerations sensor boards, Gumstix Verdexdevice, netmicroSD-vx board, posture analysis.

Motivation

This paper brings contributions improving the system developed by Brusey [1] by adding a new hardware component, netmicroSD-vx board. A new version of hardware and software was designed in order to assess data capacity, to evaluate and extend battery life of more than two hours available for Brusey’s system, to expand the memory, and record the human postures/movements. This contribution is important because of the small memory available on the Gumstix device (4 MB) which is insufficient to save data from accelerometers for eight hours required for our experiments.

Figure 1: System components (1) Gumstix Verdex, (2) Sensor board, (3) Expansion board, (4) NetmicroSD-vx board, (5) Batteries

For detecting and classifying the postures/movements, an algorithm with multiple threshold methods has been implemented and used [2]. Our goal is to build a new sensing system that can monitor and assess daily activities in free living live and to use this system for home care patients using body accelerometers. The system is able to perform postures

Page 14: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

14

detection at a rate of 10 frames per second. The work related to the system presented in this paper approaches different monitoring system designs for acquiring the data from sensors for long periods of time without the need to replace the batteries.

First we applied a high pass filter (HPF) with the cut off frequency of 0.25Hz (as low as possible) to remove gravitational acceleration component from the data collected with tri-axial accelerometer. After gravitational component was removed from the signal, the high frequency noise spike has to be removed. For that we applied a low pass filter (LPF) with the cut off frequency of 0.25Hz, length n=19 samples, and a non-overlapping moving window of width w=0.1seconds. We removed the gravitational component and high frequency noise spikes in order to calculate signal magnitude area (SMA-magnitude x time). This one includes both effects of magnitude and duration to be able to distinguish between periods of activity and periods of rest. We applied for this purpose the preset threshold of 2.3 . SMA was defined as the sum of the signal integrals, normalized to the length of the signal and calculated by the areas defined on each of the three axes:

( ) ( ) ( )( )11 2 3SMA a t dt a t dt a t dt

t t tt= × + +∫ ∫ ∫ (1)

where a1, a2 and a 3 are the acceleration signals from the tri-axial accelerometer.

Results 4 healthy subjects, 2 female and 2 male, 19-32 years old, weight 49-82 kg and

height 1.59-1.91m, were wearing the system in a free living live for a period of 8 hours each. Each subject noted at the end of the experiment what he did in that period of time.

Table1. A total accuracy for all seven posture detected

References: [1] Brusey, J., Rednic, R., Gaura, E.I., Kemp, J., Poole, P.: Postural activity monitoring for increasing safety in bomb disposal missions. Measurement Science and Technology, 20(7):075204 (11pp) (2009) [2] Farkas, I.I., Doran, R.E.: Classification of a number of postures/activities based on unsupervised learning algorithms. In: Proceedings of the 1st International Conference on Quality and Innovation in Engineering and Management, pp 277-281, 17-19 March (2011)

Postures ACC S1 [%]

ACC S2 [%]

ACC S3 [%]

ACC S4 [%]

Average ACC [%]

Sitting 99.39 98.40 99.28 99.74 99.20 Standing 98.18 99.64 99.79 99.28 99.22 Kneeling 96.44 99.01 - 99.14 98.19 Crawling 96.44 99.01 - 100 98.48 Walking 98.09 99.68 99.43 99.51 99.17 Lying up 99.18 97.51 - 99.68 98.79 One Side - 99.57 - 100 99.78

Page 15: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

15

Automated Driver Assistance System for Traffic Light Detection Ileana Ioan, Marc Gheorghe, Risteiu Mircea, Kela Paul

Science and Engineering Department, “1 Decembrie 1918” University, Alba Iulia, Romania,

[email protected], [email protected] , [email protected], [email protected]

Summary: Starting from the necessity point out the driver in time the traffic light colour, it was developed, at prototype scale, an automated system that senses and tells the light. The decision unit was built using feed forward Artificial Neural Networks, trained in Matlab and implemented hardware. Some practical results obtained with this system are presented.

Keywords: driver assistance system, color detection, artificial neural networks.

Motivation Nowadays it is a great scientific and technologic effort intended to obtain Advanced Driver Assistance Systems (ADAS), like In-vehicle navigation systems, Automated Cruise Control System, Night Vision, Driver drowsiness detection-System, etc. In this direction we built, at a prototype scale, an automated system, using Artificial Intelligence approaches, that sense and notice the traffic light color.

Figure 1. The system prototype Approaches and results The main blocks of the prototype are displayed bellow:

Figure 2. The main building blocks of the system prototype

Page 16: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

16

The system uses three fotosensors, for the three colors, mounted on the car and a decision bloc that establish and point out the current semaphore light. At the moment, the notification is optic but we intend to use a vocal communication system.

For decisions we used a feed forward ANN [1], trained in Matlab with data (semaphore’s light) acquired at different distances and environment level of illumination. The ANN was implemented hardware using operational amplifiers.

Figure 3. The ANN decision block

The prototype was tested at several distances between car and traffic lights and in many environmental illumination conditions. It showed a good rate of decisions but we saw a great dependence of the accuracy on the environmental illumination.

Some images of tests are displayed bellow:

Figure 4. Examples of test setup References 1. Dumitra? Adriana, Proiectarea Re?elelor Neurale Artificiale, Casa Editoriala ODEON,

Bucure?ti, 1997. 2. Enachescu, C., Bazele teoretice ale retelelor neuronale., Casa Cartii de Stiinta, Cluj-

Napoca, 1998. 3. Hau Chee-Yiau Vincent, Colour Sensor for the Blind , Thesis, Cutin University of tehnology,

2004. 4. Trifa Viorel, Gaura Elena Ioana, Retele Neuronale Artificiale - Arhitecturi Fundamentale,

MEDIAMIRA, 1996.

Page 17: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

17

Enhancing The Bit Sieve /Pixel Sieve Methods Incze Arpad1)

1) Univ. 1 Decembrie 1918, Alba Iulia/Romania, [email protected] Summary: Two years since the pixel sieve and bit sieve[1] cryptographic methods were proposed in its basic form. Several authors picked up the ideea and enhenced it. In this paper we intend to present the latest enhancements based on other authors papers and our own experience gained while testing the sieving method. Also an easy way to get long binary keyes are described. Keywords: Visual cryptography, Secret sharing, Encryption, Pixel expansion, Key shifting. Motivation

The pixel sieve method [1] combines two cryptographic methods namely Visual cryptography and secret sharing[2][3] . In its basic form the pixel sieve method has some serious flaws from cryptographic point of view. Few proposals ware made to enhance the method. Some authors proposed a key shifting version to obtain better results [4]. Shifting of the encryption key is an important part of various cryptographic algorithms. In this method the key sieve used for pixel sieving is shifted in each round. Key sieve shifting method enhances the security of the pixel sieve method. This method provides security against nearly equal keys used for decryption. Another advantage of this method is that it also increases the randomness in the decrypted image. The pixels in the encrypted image are scattered more randomly then the existing pixel sieve method. Another approach with minimal computational requirements uses the idea behind the sieving in a proposed keyless encryption method[5]. The approach employs Sieving, Division and Shuffling to generate random shares such that with minimal computation, the original secret image can be recovered from the random shares without any loss of image quality.

Flaws of the method and proposed solutions. During testing the method few flaws emerged. One of them is about the fact that the

length (the size) of the shares is given by the number of zeros and ones, or black and white pixels in the advancing method in which a share gets a bit (pixel) only if a bit (pixel) is sieved in that share thru the key. This issue was described in earlier papers as al3 rule where we stated that the ratio between zeros and ones should not be less than 1/3 in favor of any of the bits.

If l- length of the key, m the number of zeros and n the number of ones (of course n+m=l) the l3 rule stated that under any circumstances the m/n and n/m ratio should be < 3. This considerably reduces the number of usable keys for a given key space. Practically 1/3 of all keys are safe to use.

To solve this issue we recommend a new algorithm. Two additional variables are introduced in the building process of the shares. In this variables we store the temporary lengths of each shares. These values are incremented for the corresponding shares each time a share gets a bit/pixel thru the key. After each operation the two values are compared and a new rule is added. According to this rule each time when the length of a share exceeds a threshold value the next bit/pixel will be put in the shortest share regardless of the value of the key. Actually we are swapping the shares. In this way the l3 rule becomes obsolete because the maximum difference in length between the shares should be no more than the threshold. Also from cryptographic point of view a better shuffle of the original file is achieved in the shares.

The second enhancement is for the key. One proposed use of the method is like a supplementary authentication step. For this a user who intends to log in to a certain site will

Page 18: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

18

get an encrypted image. He will have to enter his password. This password is used also as a key to both encrypt the image at server side an decrypt the image at user side. After decryption the content of the image should be sent back to the server as final step of authentication just like in the case of captcha. Statistically users chose passwords no longer than 10 characters if longer keys are not mandatory. If the simplest way of converting characters in their corresponding ASCII code followed by binary conversion of the numbers is used, the length of the key will be short therefore unsecure from cryptographic point of view due to high number of repetitions of the key.

To overcome this issue a very simple and quick method to enlarge the length of the key is proposed in the followings but only as a primitive model that needs further improvements.

After conversion of the ASCII characters in a binary string that string undergoes to the following process:

The first an second bits are XOR-ed. The resulting bit is XOR-ed with the second bit, the newly obtained bit is XOR-ed with the third bit and so on. Thus we have two keys: k the original key and kx a XOR-ed key. The mathematical relation between these two keys are:

kx1=k1 XOR k2 kxi = ki XOR kxi-1 (i>=2) With this basic method the length of the binary key before a repetition appears can

be doubled. If l is the length of the original key the XOR-ed key length will be 2·l. For example the number 22 in binary is 0010110 (7 digits for ASCII). With the basic method described above the following row is obtained 00011011110010000110111100100001101… After 14 digits the row start to repeat itself.

Further more if a key shifting algorithm is added to the method the length of the key, without risking repetition of the blocks, increases to 2·l·l = 2·l2 This means for a 10 character password 10·7 bits = 2·702 = 9800 bits = 1225 bytes.

Results

The algorithm that implements the proposed models are under development but the first test result are encouraging. More detailed results will be published later. References [1] A.Incze, “Pixel Sieve method for secret sharing & visual cryptography”. 9th RoEduNet IEEE International Conference 2010. [2] Moni Naor and Adi Shamir. Visual Cryptography, EUROCRYPT 1994, ppl- 12. [3] Shamir, Adi. “How to share a secret”. Communications of the ACM 22 (II): 1979,6 12-613. [4] Vaibhav Choudhary, Kishore Kumar, Pravin Kumar, D.S. Singh „Modified Pixel Sieve Method for Visual Cryptography“, International Journal of Computer Applications, Number 9 - Article 2, Year of Publication: 2011, 10.5120/1714-2297 [5] Siddharth Malik, Anjali Sardana, Jaya, "A Keyless Approach to Image Encryption," Communication Systems and Network Technologies, International Conference on, pp. 879-883, 2012 International Conference on Communication Systems and Network Technologies, 2012

Page 19: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

19

Feature Selection For Time Improvement In Glass Dielectric

Materials Manuella Kadar1), Maria Muntean2)

1) Exact Sciences and Engineering Department, “1 Decembrie 1918” University of Alba Iulia, Romania, [email protected]

2) Exact Sciences and Engineering Department, “1 Decembrie 1918” University of Alba Iulia, Romania, [email protected]

Summary: Most of the time lots of data means better results. Although such statement is in generally true, still there are cases when lots of redundant data and lots of attributes are weakly related to what we are trying to find out by evaluating the data. The main idea behind feature selection is to keep the data that bring the most amount of information for learning how to evaluate future data that are going to be fed to the system and to discard the features that do not bring any new information.

In this paper we investigate whether Wrapper Feature Selection method can improve the classification accuracy of a dataset made by a variety of glasses. Keywords: feature selection, classification, accuracy, dielectric materials. Motivation

The problem of feature selection involves finding a “good” set of attributes under some objective function that assigns some numeric measure of quality to the patterns discovered by the data mining algorithm [1]. In the wrapper method, the attribute subset selection algorithm exists as a wrapper around the data mining algorithm and result evaluation. The induction algorithm is used as a black box. The feature selection algorithm conducts a search for a good subset using the induction algorithm itself as a part of the evaluation function [2], [3].

The implementation of the feature selection procedure in Weka environment [4] is done through the Wrapper Subset Evaluation . As any feature selection, the Wrapper Subset Evaluation is going to eva luate the attributes, arrange them in the order of their importance, and tell the user which are the non important attributes and the weakly relevant ones but with redundant features. After this operation the result would be a dataset containing only relevant features, and weakly relevant features, but with non redundant information. The result should be a shorter time spent for classification task. Results

For the evaluation, we used the glass dataset [5], with the following attribute information: Id number: 1 to 214, RI: refractive index, Na: Sodium (unit measurement: weight percent in corresponding oxide, as are attributes 4-10), Mg: Magnesium, Al: Aluminum, Si: Silicon, K: Potassium, Ca: Calcium, Ba: Barium, 10. Fe: Iron, Type of glass (class attribute): 1-building windows float processed, 2 -building windows non float processed, 3-vehicle windows float processed, 4-vehicle windows non float processed, 5-containers, 6-tableware and 7-headlamps.

The dataset class distribution is given in Figure 1. The dataset was transformed in an .arff file (Attribute-Relation File Format, Figure 2.), in order to train the learning algorithm.

Page 20: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

20

Glass dataset class distribution

29

70

76

17

0

13

9

Class 1Class 2

Class 3Class 4

Class 5Class 6Class 7

Figure 1: The glass dataset class distribution

Figure 2: The glass.arff file structur e obtained after data integration

After running the Wrapper Subset Evaluation algorithm on glass we observed the importance in percentage of each attribute (Table 1.). As a search method we used RandomSearch.

Table 1. The relevance of the attributes

1 2 3 4 5 6 7 8 9 10 100% 40% 10% 0% 30% 10% 70% 30% 0% 10%

The most important attributes are: 1 (ID), 7(K), 8(Ca) 2 (RI), 3(Na), 6 (Si), 10 (Fe). The fourth attribute (Ba) and the ninth (Mg) will be removed, and in the next data mining experiments we used the obtained attribute subset in order to reduce the time needed to train the classifier. References [1] I. H. Witten, E. Frank, Data Mining, Practical Machine Learning Tools and Techniques, Morgan Kaufmann Publishers, Elsevier Inc., 2005. [2] R. Kohavi, Wrappers for Performance Enhancement and Oblivious Decision Graphs, Stanford University, 1995. [3] T. Mitchell, Machine Learning, The McGraw-Hill Companies, Inc., 1997, pp. 52-78. [4] http://www.cs.waikato.ac.nz/ml/weka/ [5] Frank, A. & Asuncion, A. (2010). UCI Machine Learning Repository [http://archive.ics.uci.edu/ml]. Irvine, CA: University of California, School of Information and Computer Science.

Page 21: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

21

Designing a PLC-based Manufacturing Control System for Cutting and Packing Processes

Gheorghe Marc1), Ioan Ileana 2), Mircea Risteiu 3)

Science and Engineering Department, ,,1 Decembrie 1918” University, Alba Iulia, Romania [email protected], [email protected], [email protected]

Abstract:

The present paper is focused on developing a controlling device for manufacturing system. This research is framed into intelligent machinery approach. The paper describes the most used PLC development environment for underlying the most effective related aspects. Moeller is the „winner” from the cost point of view. A study case is analysed and implemnted next- the cutting and packing processes, which are the most slow down phases from the entire manufacturing process. Next, the program structure and hardware implementation are described, with significant results with some extra implementation recommendations. Keywords: PLC, manufacturing processes, controlling devices, cutting processes, packing processes

Process description and implementation

The figure 1 will show the logical diagram of the entire technological process. The figure 2 shows the cutting and packing processes logical diagram. This

diagram is implemented into PLC, and is interfaced with the technological process, shown in figure 1 and explained in full paper.

Fig. 1 Technological flow diagram

Page 22: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

22

Fig. 2 Process block diagram

Results

The sistem is implemented in S.C. BAUMIT TEIUS, and it is working since 6 months ago. By running this PLC-based implementation some dead steps are cleaned. We have added to the techical solution a production reporting facility.

Page 23: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

23

Adjustment Formula for a Device Used to Check the Thread Gauges

A. C. Micaciu

Colegiul Tehnic I.D. Lazarescu, Cugir, Romania, [email protected]

Summary: The paper presents the operating principle of uniting control device based on the existence of a kinematic coupling ring and shaft adjustment formula of this device. The device can be used to check buffer gauges used to check threads.

Keywords: Helical motion, propeller cylindrical, coupling kinematic, control device.

Motivation

Figure 1 presents a device to check for thread gauges based on the existence with a bearing kinematic couplings.

Figure 1: Device for checking the threaded buffer gauges The components are: 1 - basic board, 2 - support, 3 - gear snail snail-wheel, 4 - bearing axial positioning

system, 5 - bow disc, 6 - sleeve bearing, 7 - piece shaft port, 8 - roller bearing axial, 9 - handwheel, 10 - action mechanism of snail snail-wheel gear, 11 - dial comparator rod

Feel its flanks dial comparator rod thread and outside thread gauge checked. When operating the handwheel 9, rotates shaft port piece 7 and by contact with sleeve bearings is done properly positioned movement necessary to verify pitch of thread gauge screw. To adjust for the desired device is considered infinitesimal right triangle with cathetes:

ϕdRdr ⋅ and 1dy (Fig.2). The angle between the hypotenuse and cathetus ϕdRdr ⋅

is drθ .

Resulting mathematical expression below:

11 dyd

Rdy

dRctg dr

drdr

ϕϕθ ⋅=

⋅=

. (1)

Page 24: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

24

Given the helical parameter expression,

ϕddyh 1=

, (2) expression (1) becomes:

drdr ctghR θ⋅= (3)

where h is the parameter heical which passes through a point P in Figure 2.

Figure 2: Generation of helical surfaces Ruler Results

IF, taking into account the relation (1), equation (3), the term beam steering cylinder receives the form:

drE

dr ctgp

R θπ

⋅⋅

=2 (4)

where will get generated propeller pitch control device according to the formula:

drdrE tgRp θπ ⋅⋅⋅= 2 (5)

For positive values of the angle, propeller sense is right. If, is negative, meaning propeller will be left.

Conclusions: - Kinematic couplings with bearings can generate helical motion - Due bearings used kinematic coupling efficiency (yield) is high - With adjustment formula the device control can be easily adjusted to the desired pitch.

References [1] Maros D., Killmann V., Rohonyi, V., „Angrenaje melcate. Bucuresti”, Editura Tehnica, 1966 [2] Murgulescu, E., Flexi, S., Kreindler, O., Sacter, O., Târnoveanu, M., „Geomertie Analitica si diferentiala”, Bucuresti, Editura didactica si pedagogica, 1962 [3] Vuscan, I, „Tehnologii si utilaje de reconditionare”, Cluj-Napoca, Editura Risoprint, 2000

Page 25: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

25

Mechatronic Platforms, Ideal Bases In Training, Education And Research (2)

A. C. Micaciu 1) and 2) G. D. Scânteie

1) Colegiul Tehnic Ion.D. Lazarescu, Cugir, Romania, [email protected] 2) Colegiul Tehnic Ion.D. Lazarescu, Cugir, Romania, [email protected]

Summary: Outlining the principles of mechatronics education, concerns the development of systemic thinking and training teamwork skills. These are possible due to academic efforts to provide training specialists in accordance with the requirements of new technologies. Transdisciplinary laboratory basis for the materialization of mechatronic principles "learning by doing", "learning through research". Mechatronics design stimulates the synergy by linking all resources and changes in order same function. Keywords: mechatronic platform, networking, PLC, Control Prototyping (CP), Software In the Loop (SIL), Ha rdware In the Loop (HIL). Motivation

Mechatronic platform is an ideal base for training, education and research mechatronics, to assist with retraining and vocational guidance and trades according to EU requirements.

Other approaches in research aimed at design techniques that parts of the system are real, others are virtual so that the test procedures and data validation can be performed even in the absence of components of the target system. Methods Development and Prototyping Control (Control Prototyping), Software In the Loop (SIL) Hardware In the Loop (HIL) are increasingly used in industry and research in the design process, they allow the design development phase in an integrated environment . These methods involve a real-time operating platform design. A detailed summary of the development of these techniques is made in Fig. 1.

Fig. 1. Application development methods

- Control Prototyping (Control Prototyping): the process is real and is controlled by a control system simulated by using a different hardware than what will ultimately be used.

- Hardware-In-the-Loop (HIL) and controlled process is simulated based on a control strategy implemented on a specific hardware (the one that will be used to control the system).

- Software in the loop: the process is simulated and executed in real time along with control algorithm, which is also simulated.

Page 26: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

26

Thus, following approaches are possible: testing of new features on an existing system without jeopardizing the system, testing each component in the system by connecting the virtual system, the occurrence of a fault system testing, testing new control strategies that optimize system operation . In terms of education, namely in terms of research techniques, identifies three approaches to the study of systems: - Study the real system (process real real controller, components are real; - Study of the simulated system (process simulated simulated controller, all system components are simulated - concept SIL); - Study the real part system - partially simulated (hybrid - HIL concept).

Fig. 2. Study on real partial system - partially simulated (HIL concept)

FluidSIM H/P - is software for creating, simulating and studying electro-pneumatic

circuits, electrohydraulic and digital. The program features photos, animations and explanations of the principle of operation of hydraulic and pneumatic components to normal. This makes it very good for people himself.

Fig. 9. Fluid SIM Aplication

References [1] Matie? V. ?. a., tehnologie ?i esuca?ie mecatronica. Auxiliar curricular pentru liceul tehnologic, Editura economica, BUCURE?TI, 2007 [2] Curs 5, Dezvoltare tehnologica ?i tehnologii educa?ionale, Proiect FLEXFORM, Cluj, 2012 [3] SR EN 61131-3, Automate programabile, partea 3. Limbaje de programare [4] www.nxp.com/acobat_download/aplicationnotes/APPCHP3.PDF

Page 27: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

27

The Influence of Support Vector Machine Kernel Parameters on Classification Accuracy

Maria Muntean1), Honoriu Valean 2)

1) Exact Sciences and Engineering Department, “1 Decembrie 1918” University of Alba Iulia, Romania, [email protected]

2) Automation Department, Technical University of Cluj Napoca, Romania, [email protected]

Summary: Support Vector Machine (SVM) is a powerful classification method, based on kernels, working with large data sets. In almost all cases, in Polynomial Kernel SVM classification, two distinct parameters can be modified for obtaining best results: the complexity parameter and the exponent of the kernel function. The output features that are of interest are: how the two coefficients affect the accuracy of the evaluation and also how they influence the time spent on the evaluation. Keywords: classification, Support Vector Machines, kernel parameters. Motivation

The expected outcomes of the experiments will be able to accurately predict the parameters’ values that give the best results, in order to use the classifier in an unattended manner. Another important outcome is to see how these values affect the time consumed by SVM learning scheme on the dataset evaluation.

Results

We performed several evaluations on four datasets: Romanian Cancer, Pima Diabetes and Australian Credit Card, and DARPA, obtained from the online UCI Machine Learning Repository. In each of the evaluation performed, the value of complexity parameter (c) and then the value of the exponent (e) were changed.

Figure 1: Accuracy variation in Pima dataset Figure 2: Accuracy variation in Australian

dataset

0,9910,9920,9930,9940,9950,9960,9970,998

11,

41,

792,

19 2,6 3

3,4

3,8

4,2

4,6 5

5,4

5,8

6,2

6,6

Accuracy variation with respect to c

Acc

Figure 3: Accuracy in Romanian dataset Figure 4: Accuracy variation in DARPA dataset

Page 28: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

28

Figure 5: Accuracy variation in Pima dataset Figure 6: Accuracy variation in Australian dataset

0,991

0,9920,9930,994

0,9950,9960,997

0,998

1 1,2 1,4 1,6 1,79 1,99 2,19 2,4 2,6

Accuracy variation with respect to e

Acc

Figure 7: Accuracy variation in Romanian dataset

Figure 8: Accuracy variation in DARPA dataset

After performing these experiments the following conclusions could be drawn from the results: no matter the size of the dataset, the accuracy of the evaluation depends on the values of c and e, most of the time. When any change in these values is not helping, the user should try using a different Kernel than the Polynomial one. The kernel parameter values vary from dataset to another dataset, and are depending on the class distribution and separation level, and also on the number of instances of a certain class. If we change the values of these parameters, we are mostly going to affect other aspects of the evaluation as well. The time in which the evaluation is performed, is affected in a small, but perceivable manner by the increase in value of c, and very visibly affected by the value of e.

References

[1] D. I. Morariu, L. N. Vintan, “A Better Correlation of the SVM Kernel’s Parameters”, 5th RoEduNet IEEE International Confe rence, Sibiu, Romania, 2006.

[2] Y., C., Zhang, “A New Incremental Learning Support Vector Machine”, 2009 International Conference on Artificial Intelligence and Computational Intelligence, Nanjing, China, 2009, pp. 7-10.

Page 29: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

29

Software Simulation Study For Fourier series

Olteanu Emil1), Ciortea Mihaela1) 1) Science and Engineering Department, “1 Decembrie 1918” University, Alba Iulia, Romania

[email protected], [email protected]

Summary: In telecommunications systems, the useful information carrier is the electromagnetic one. The electromagnetic wave, the voltage or the current containing information are called signals. In telecommunications channel appear also unwanted signals called disturbance. There are two types of signals: signals deterministic and non-deterministic signals. It is very useful to find mathematical methods and software tools for viewing waveforms for these waveforms.

Keywords: signal, electromagnetic wave, communication channel

Motivation

Creating a support for students, which enable viewing waveforms for various signals studied at Applied Electronics program subjects.

Results A signal s (t) is regular if it satisfies the equation: s (t) = s (t + T). Signals that can be most easily decomposed in elementary signals are the periodic signals. Periodic signals can be represented by Fourier series. Fourier series expansion may take the following forms:

( ) ( )∑=

Φ++≈n

kkt

1kk0 cosAats ω

Our study refers to an exponential periodic function f (t) of a p period, defined on the interval

(0, p) by ( ) atetf −= . For a> 0, f (t) is the graphical representation of the following figure:

We analyzed the data in Matlab programming language and we obtained the following diagrams:

Page 30: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

30

References [1] Olteanu E. – Proiectarea sistemelor informatice pentru ingineri, Editura Aeternitas, Alba Iulia, 2010.

[2] Olteanu E. – Proiectarea sistemelor informatice de gestiune, Editura Aeternitas, Alba Iulia, 2006. [3] Olteanu E. – Bazele matematice ale calculatoarelor, Editura Aeternitas, Alba Iulia, 2009.

[4] Olteanu E. – Programarea calculatoarelor pentru ingineri, Editura Aeternitas, Alba Iulia, 2009. [5] Olteanu E. – Teoria codurilor, Editura Aeternitas, Alba Iulia, 2009. [6] Olteanu E. – Comparison of mathematical modeling and simulation software long lines - Smart Applications & Technologies for Electronic Engineering Conference 2010. [7] Olteanu Emil, Tulbure Adrian and Joldes Remus – An matrix model of an infinite series of two-port elementary components – ICTAMI 2009.

Page 31: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

31

Support Vector Machines for light refraction

Emil Olteanu 1), Maria Muntean 1) , Remus Joldes 1) 1) Science and Engineering Department, “1 Decembrie 1918” University, Alba Iulia, Romania

[email protected], [email protected], [email protected] Summary: Support Vector Machine (SVM) is an invaluable tool for many practical applications in classification, regression, and event recognition. A SVM seeks the best compromise between learning accuracy and learning ability according to the limited sample information, and it has good generalization ability [1], [2], [3]. In this paper, we trained SVM in order to simulate a physical event, light refraction. We studied the deviation of the propagation direction of a wave, when it meets the separation surface of the two environments considered in simulation: air and crown glass. Keywords: Support Vector Machine, light refraction, simulation.

Motivation

Our purpose was to extend the linear classification technique in the field of optical physical phenomena.

Results

The initial test data simulate photons belonging to a light beam perpendicular on the boundary surface (Eroare! Fara sursa de referinta.). The initial beam was rotated with an alpha angle in order to simulate the refraction phenomena (Eroare! Fara sursa de referinta.). The rotated beam was classified in two classes accordingly to linear Support Vector Machines learning scheme. The two classes used in the experiment were the photons situated in air space (class 1) and the photons situated in the diamond space (class 2) (Figure 3). The class 2 photons were deviated with an angle corresponding to the diamond and air indices rate (Figure 4). The photons within the classes represented in Figure 3 and Figure 4 were used as training data in the classification process.

We obtained a classification model which was used for prediction of the class of the new photons. The model can be used for refraction simulation on the boundary surface between any two environments.

Figure 1. Figure 2.

Page 32: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

32

Figure 3. Figure 4. References [1] X. Fan, Z. He, ”A Fuzzy Support Vector Machine for Imbalanced Data Classification”. Proceedings of the 9th Intenational Conference on Applied and Theoretical Electricity, vol. I, pp. 21-26, Craiova, June 4-6, 1998, Romania. [2] T. Zhou, D. Tao, X. Wu, “NESVM: A Fast Gradient Method for Support Vector Machines”, 2010 IEEE International Conference on Data Mining, 2010, pp.679-688, Sydney, Australia. [3] C.-H. Li, C.-T. Lin, B.-C. Kuo, H.-H. Ho, “An Automatic Method for Selecting the Parameter of the Normalized Kernel Function to Support Vector Machines”, 2010 International Conference on Technologies and Applications of Artificial Intelligence, 2010, pp.226-232, Hsinchu, Taiwan.

Page 33: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

33

Procedure to Reduce Conducted Emissions Generated by Corona

Electroseparator

1)I. Pocan, 2)R.Morar 3)A. Tulbure, 4)E. Ceuca, 5)O. Muntean

1) 3) 4) “1 Decembrie 1918” University of Alba Iulia, Romania, 2) Technical University of Cluj-Napoca, Romania,

5) University of Petrosani, Romania,

Summary: The paper represents a continuation of the author’s research, in the field of electromagnetic compatibility, about evaluating and designing of solutions for reducing the conducted emissions in the main system of electrostatic separator. In the operation mode, the electrostatic separator, powered by a high voltage source, generates the corona discharge phenomena, in the active area in which the separation process takes place. On these physical phenomena , focuses the investigations described in the final version of the contribution.The carried out measurement methods, are very close to the ones described in the standards. Also the used equipment is appropriate to this kind of test for conducted emission in the main system. Based on previous experiences, the authors achieved some results concerning the choice and use of appropriate EMI industrial filters.

Keywords: conducted emissions, corona discharge, electrostatic separator, EMI filter, electromagnetic compatibility.

Motivation Firstly, it is necessary to describe briefly the electrical system of ELSEP

electroseparator with major components of active cells, considered as key elements [5], [6], which generate electromagnetic interferences and noise. Electroseparation is a process of sorting a mixture of granular particles with electrical and mechanical forces acting on charged particles. The corona effect can be obtained in an irregular field generated by electrodes with peaks, wire or blade.

a. Functional principle b. Design layout Fig. 1. Laboratory electroseparator ELSEP. 1.feed hopper; 2.Vibro-transporter; 3.Roll grounded electrode; 4.Brush removal; 5.Neutralizing electrode; 6.Adjustable ac voltage 7.Bunker for electroseparation; 8. Electric power and control panel; 9.Adjustable dc voltage; 10.High voltage electrode; 11.Corona electrode; 12.Electrical heater;

Page 34: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

34

Results The paper presents, a specific method of measuring conducted emissions in the

main system using standards-based electromagnetic compatibility procedure. Conducted emissions are measured using artificial networks (AMN Artificial Main Network) [2], [3], also known as the LISN (Line Impedance Stabilising Network-HM 6050-2) as a transducer between the supply terminals and the EUT (Equipment Under Test). Fig.2. Set-up of EMI filters measurement Fig.3. Common mode direct transfer

diagram under the Average and Max Hold of the EMI filter, by linear scale FN2030-04-06

It have been taken conducted emissions measurements by inserting the HF filters, achieving good results. Consequently, the levels of the conducted emissions are below the limits allowed by the standard [7], [8].

In the paper have been used different methods of conducted emissions measurements, methods to measure insertion loss characteristics of EMI filters, EMI filter design principles and criteria for use of these filters. By implementing such methods for each unit, it has been succeeded to reduce the main conducted emissions for the whole separator.

The contribution describes all the necessary settings of HM 5014 analyzer [4] with tracking generator, embedded software and associated interface for both scheme of measurement setup. Besides of this, the correction for attenuation measurement cables increases the capability of effective and correct use of such equipment.

References [1] SW 5012E-V153 Software Operating Instructions, Hameg Instruments [2] G. Hortopan “Principii si tehnici de compatibilitate electromagnetica”, Editura Tehnica

Bucuresti, 1998 [3] E.Simion, “ Interferenta electromagnetica” , UTCN, Ed. Cluj-Napoca, România, 1999 [4] Spectrum Analizer HM 5014, user manual, Hameg Instruments [5] I. Pocan, R. Morar, C. Ra casan, I. O. Munteanu, I. Suarasan, I. Sfârlea, “Conducted

Emissions Measurement of the Assembly “High Voltage Source – Corona Electrostatic Separator”, Proceedings of the 2nd International Conference on Modern Power Systems-MPS 2008 ,12-14 Nov., pag. 329-332, Cluj Napoca, Romania.

[6] I. Pocan, Munteanu, C.,Hebedean, C.,Plesa, C.,Morar,R., Muntean, I. O.,Suarasan, I., Conducted Emissions of “The Assembly Corona Electrostatic Separator –High Voltage Source” and Solutions to Reduce them, Proceedings of the 3rd MPS 2010, 18 – 21May 2010, ISSN 1841-3323, Cluj Napoca, Romania.

[7] CISPR 16-1-1:2003, Specification for radio disturbance and immunity measuring apparatus and methods-Part 2-1: Methods of measurement of disturbance and immunity – Conducted disturbance measurements

[8] SR EN 50081-1 Standard generic de emisii, mediu rezidential, comercial si usor industrializat, ASRO 1999

Page 35: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

35

Web-Based Tools for Real Time Data Acquisition

MIRCEA Risteiu1, a, IOAN Ileana1, b, GHEORGHE Marc1, c 1 Gabriel Bethlen Str., No.11, 510009 Alba Iulia, Romania

[email protected], [email protected], [email protected]

Abstract: The present paper is focused on integration TCP-IP devices into smart projects. Smart projects are designed with possibilities to send data over TCP/IP protocols to a web application. The proposed implementation starts from server sent events for real time measurements. Keywords: domotics, smart measurements, web-based measurements, real time measurements, server sent event, GET method Extended abstract

They are many other developers, and solutions for smart automation. The main keywords that describe this area of work, from the main task point of view, are: security systems, lighting, heating and air conditioning, distributed audio- video, home theater, energy management. From the rules point of view, they are some dedicated protocols like X10, or UPB (Universal Powerline Bus Protocol). For storing the data, most of implementations use Internet, as the main database [1, 2].

Andreas Kamilaris, [2] suggests in his paper, that the reference for his kind of work can be REST (REpresentational State Transfer) [7] that defines how to use HTTP as an application protocol. The paper’s authors propose three layer- based architecture (device, control and presentation layers). Resources can only be manipulated by the methods specified in the HTTP standard (e.g. GET, POST), under a uniform interface. On the other hand, “the REST guarantees interoperability, loose-coupling and a smooth transition from the Web to home environments”.

Our proposed architecture started from two different approaches. First of all there are a lot of device which are “connected” to the web. For instance, publishing room temperature on the web is very easy today. On the other hand, in our lab we have tested a web-based application for green energy measurement. The core device around our implementation is a simple wireless card built with 802.11b/g protocol.

The environment parameters are sensed by proper sensors that are connected and adapted to the data acquisition system through a signal conditioning system. The microcontroller controls all the actions related to conditioning, data acquisitioning, and data formatting for sending it to the web, via TCP/IP, and wireless 802.11b/g protocols. Next code sequence shows the specific structure related to continuous work, status checking, measurement and preliminary processing, some technical delays, session closing. Test and results

Testing procedure has been focused most on real time results displaying. In [9] there were explained some real time considerations related to delays when data is sent through TCP-IP and 802.11b/g protocols.

Other delays appear when data is sent to the SVG container from client. For minimizing the displaying delay, the SVG is refreshed after each 10 received pairs of data (figure 6).

Page 36: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

36

Figure 1 Showing data in SVG container after receiving packets of 10 pairs of data

Next figure shows the long term stored data into the web data base. When we arrive to the office, the window has been opened and the temperature fall down around daily temperature.

Figure 2 Long term recorded data into web database

Acknowledgements The main part of the work has been developed in the local lab (Interdisciplinary Lab for

Modeling, Simulation and Control of Environment) research unit. Some of the work has been successful tested in two graduating projects done by Bota Daniel, Metea Mihai, Adrian Rosian.

Page 37: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

37

Rapid Prototyping Scale Using Lego Mindstorms NXT Educational Kit

G. D. Scânteie

Colegiul Tehnic Ion.D. Lazarescu, Cugir, Romania, [email protected] Summary: The main objectives of the paper aims to familiarize them with the

concept of rapid prototyping scale and mechatronic modules, or components LEGO Mindstorms. Theoretical aspects are presented since their encounter in practical applications. Resorting to progressive design functionality using graphical programming means NXT-G, as the mechanical structure is built to foster interdisciplinary thinking specific mechatronics.

Keywords: rapid prototyping, programming means, reconfigurability, mechatronics platform, sensor, actuator, controller.

Motivation

In the first application is provided building a mobile mechatronic platform.

Figure 1: Assembly instructions

- The first block performs a movement advance (5 revolutions per each engine), engine output is 75%. - The second block has the same settings, the difference being the direction of engine displacements.

Figure 2: Control blocks for programming mobile base Shortly after practice everyone is able to describe the operation of various types of

sensors, actuators and a LEGO NXT controller with its functional components - screen, keyboard, ports of entry / exit, way radio, speaker.

Figure 3 shows a functional replica of a structure is carried out without instructions. In Figure 4 you can see blocks:

Page 38: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

38

I. Advance Actuator moving; II. Ultrasonic sensor; III. Actuator off; IV. Light sensor; V. Block WAIT (2 seconds); VI. Light sensor off; VII. Actuator retreat.

VEHICLE (ROBOT)

WORK WITH MINIMUM

MECHANICAL ELEMENTS

Figure 3: Execution phases of the mechanical structure After the program is finished, download the NXT programmable controller ("robot

brain"). Thus the robot will perform movements that have been ordered.

Figure 4: Programming blocks closed loop (repeat 3 cycles)

Results Activities aim was to highlight the importance of courses "hands-on". Is focused on the "learning by doing" method that will be implemented throughout the practical application. At the same time, the teacher has a constant feedback as the extent to which theoretical concepts were understood and each student's ability to implement the theoretical concepts learned. During training, participants found that teachers put aside any fuss and they started working. I can say that any student from the very beginning, apply and integrate the content of the various disciplines in authentic moments of action, rather than insulating or artificial situations and supports the integration of theory with practice. Is used so analytical skills for conceptualizing experiment. References [1] PROIECTUL FLEXFORM, Curs 4 - Metode si tehnici de inovare si creativitate,

Cluj-Napoca, 2011. [2] MATIES, V., MÂNDRU, D., BALAN, R., TATAR, O., RUSU, C, 2001, “Tehnologie ?i educatie mecatronica”, Ed. Todesco, Cluj-Napoca. [3] www.mediafire.com/?zmyne5m14ez – SENZORI ?I TRADUCTOARE

Page 39: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

39

MECHATRONIC PLATFORMS, IDEAL BASES IN TRAINING, EDUCATION AND RESEARCH (1)

G. D. Scânteie1) and A. C. Micaciu2)

1) Colegiul Tehnic Ion.D. Lazarescu, Cugi r, Romania, [email protected] 2) Colegiul Tehnic Ion.D. Lazarescu, Cugir, Romania, [email protected]

Summary: Outlining the principles of mechatronics education, concerns the development of systemic thinking and training teamwork skills. These are possible due to academic efforts to provide training specialists in accordance with the requirements of new technologies. Transdisciplinary laboratory basis for the materialization of mechatronic principles "learning by doing", "learning through research". Mechatronics design stimulates the synergy by linking all resources and changes in order same function. Keywords: mechatronic platform, networking, PLC, Control Prototyping (CP), Software In the Loop (SIL), Hardware In the Loop (HIL). Motivation

Mechatronics was born in the industrial environment, the term was patented by Japanese corporation Yaskawa Electric. The academic efforts to ensure the training of specialists in accordance with the requirements of new technologies have led to the shaping of mechatronic principles in education. These principles concern the development of systemic thinking and training teamwork skills. Transdisciplinary laboratory basis for the materialization of mechatronic principles "learning by doing", "learning through research". The network structure that stimulates and facilitates the integration of control, so ''Networking'' is the key word mechatronics education. Mechatronics philosophy marked leap from traditional engineering, sequential, simultaneous or concurrent engineering, the general trend is the "intellectualization of machines and systems".

Designing mechatronic systems and products requires the development cycles of modeling, identification, simulation, synthesis, analysis, optimization, testing, so the final product to integrate intimate level hardware and software contributions of all components. This design approach fosters synergy effect by linking all resources and changes in order same functions.

Workstations allow: reconfigurations in accordance with various applications, development of various control strategies, development of control concepts embedded systems, electronic management systems (PLC and PC), functional optimization processes, implementing standardized communication techniques, develop techniques detect and remedy malfunctions. Covered the following technology areas: mechatronics systems, drive systems (electrical, pneumatic, hydraulic) modeling and simulation of mechatronic processes, PLC programming, motion control techniques/force robot programming techniques for handling, assembly technologies, sensor techniques for measuring and monitoring the process parameters, standardized communication.

The stands allow independent study of specific groups of mechatronic sensors systems, through acquisition and signal processing tools Matlab/Simulink/Signal processing. The stands include analog sensors inductive, capacitive, photoelectric, ultrasonic, strain gauge stamps, piezoelectric pressure sensors, linear potentiometers, sensors numerical, encoders, etc. Mechatronic concepts applied research in education and the development of applications

Page 40: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

40

that integrates various technologies regardless of the nature of energy transformations (Fig. 1 and 2).

Fig. 1. Modular production stations: distribution, testing, processing, handling, assembly, sort.

Control technology: PLCs (SIMATIC S7-313C, Festo FEC Standard), EasyPort, PC. Software: Siemens Step 7,COSIMIR®Robotics, COSIMIR®PLC, FluidSIM®P, Mechatronics Assistant.

Fig. 2. Mechatronic systems for the study and development of motion control algorithms: the

engines and stepper motors, pneumatic, mechanical transmission by toothed belt sensors such numerical incremental encoders, digital controllers or PLC technology dSPACE,

development environments Matlab/Simulink, dSpace, Step 7, Festo FST.

In many cases, the laws of motion can not be included analytically, but only through an environment provided by the manufacturer and as permitted by this (Fig. 3).

Fig. 3. Servopneumatic system pick & place

Programming is performed using specific industrial PLC languages: statement list (STL), Ladder Diagram (LDR). Functioning, the configuration time synchronization operation involves two PLCs, as both contribute to the performance of a particular task or industrial use of two languages for the implementation of tasks: G code for the laws of motion, statement list for the European laws context of an application. References [1] Matie? V. ?. a., tehnologie ?i esuca?ie mecatronica. Auxiliar curricular pentru liceul tehnologic, Editura economica, BUCURE?TI, 2007 [2] Curs 5, Dezvoltare tehnologica ?i tehnologii educa?ionale, Proiect FLEXFORM, Cluj, 2012 [3] SR EN 61131-3, Automate programabile, partea 3. Limbaje de programare [4] www.nxp.com/acobat_download/aplicationnotes/APPCHP3.PDF

Page 41: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

41

Positioning System with Optoelectronic Sensors

Petre Stroica1), and Marian Vladescu2)

1) SOEL Systems, Bucharest, Romania, [email protected] 2) Politehnica University of Bucharest, Romania, [email protected]

Summary: The positioning system described in this paper has been used in a biometric identification equipment, having the role to adjust automatically the position of the mobile part of the equipment, in order to match the height of the person that is subject to identification. We used optoelectronic proximity sensors for detecting the presence or absence of the person in front of the identification equipment, and also for detecting if the position of the mobile part is higher or lower than needed, in order to send the appropriate commands for moving it according to the situation. The design of this positioning system aimed a simple and reliable automation circuit in order to achieve a low manufacturing cost. Keywords: optoelectronic sensors, positioning system, automation. Motivation

During the development of a biometric identification equipment, it occurs the need to modify the position the biometric sensors according to the height of the subjects to be identified, so that the biometric sensors can take the right images.

The biometric identification equipment shown in Fig. 1 is using three kinds of biometric data: fingerprints, face and iris images [1], [2]. The biometric data are taken through the following biometric sensors: - a fingerprint sensor, placed at the bottom side of the mobile part; - a camera for taking pictures of the face, placed at the topside of the mobile part ; - a camera for taking pictures of the iris, placed in the center of the mobile part.

The position of the mobile part can be adjusted using manual commands (up/down push buttons), but we considered being useful to have also an automation, for a quick positioning.

Initially we used two proximity sensors, one (S1) placed at the bottom side of the mobile unit, above the fingerprint sensor, and the other one (S2) placed at the top side, above the camera for taking pictures of the face. The sensor S1 is detecting if a person is present in front of the equipment and initiates the positioning procedure. The sensor S2 is detecting if the mobile unit starts from a position higher or lower than the height of the person. There are two situations possible: - if the position detected is higher, then a command is given to the actuators so the mobile unit goes down, until the sensor S2 detects the head of the person. - if the position detected is lower, then a command is given to the actuators so the mobile unit goes up, until the sensor S2 no longer detects the head of the person.

In either of the situations the sensor S2 is taken into consideration for giving the stop command to the actuators.

Page 42: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

42

Figure 1: Biometric identification equipment.

There is indeed a slight difference in positioning in the two situations, but being quite small (only few centimeters), we consider this to be acceptable as positioning error.

The problem we experienced with this implementation was the positioning error that occurs if the person has big hair, because the proximity sensor S2 is mislead by the reflection coming from the hair, and the mobile unit will be placed higher than normal.

The challenge was to find another reference for positioning and other placement of the sensors, in order to avoid this positioning error. Results

Finally we used three proximity sensors that have been placed as shown in Fig. 1. The sensor S1 is placed same as before and it has the same function. But instead of

the sensor S2 placed previously at the topside, we used another two sensors (S2 and S3) placed top-left side and top-right side. These two sensors are triggered by the shoulders of the person, which proved to be a better reference for positioning.

The positioning procedure is similar with those described previously, but now it takes into consideration any of the sensors S2 and S3 for giving the stop command to the actuators. References [1] P. Stroica, M. Vladescu, "Implementation of a multiple biometric identification system based on face, fingerprints and iris recognition", Advanced Topics in Optoelectronics, Microelectronics and Nanotechnologies ATOM-N, August 2012, Constanta, Romania. [2] P. Stroica, M. Vladescu, ”An overview on biometric identification methods and implementations”, Advanced Topics in Optoelectronics, Microelectronics and Nanotechnologies ATOM-N, August 2010, Constanta, Romania, Proceedings SPIE Volume 7821, pp. 78211T-78211T-4, 2010.

Page 43: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

43

Design of Anti Burglar Alarm Systems Prof. Dr. Ing. Paul Schiopu, and Ing. Aurelian Costea

Microelectronics Dept, Faculty of Electronics, Communications and Information Technology

University “Politehnica” Bucharest, Romania

[email protected], [email protected]

Summary: Security, as an important element that defines the quality of a system, represents the capacity of a system to preserve his own functional characteristics under pressure of external disruptive agents capable to represent danger for the system, for the environment of the system, and for the life of people inside the defined risk zone. The main goal of security is system stability. With ever new ideas, technology, procedures, actions and specialized institutions, integrated security services offer protection, surveillance and optimum conditions for system to function and to be used properly. Therefore, security represents the main quality parameter of all systems and processes, without it efficiency was not possible. Keywords: Security; Anti-Burglar Alarm Systems; Anti-Bridge of Close; CCTV; sensor; redundancy;

Motivation Procedures and strategies are used for real life security situations. Their

documents contain general security objectives and associated activities, thoroughly defined and evaluated risk situations, fundamental decisions to establish acceptable risk values, objectives, operations and maintenance regarding security of institution activities.

Risk evaluation represents an operation that have to lead to an optimum balance between acceptable risk values and cost. The answers to the following questions will help to build the risk matrix along with required security mechanisms:

• What values we have to protect? • What threats we have to counterattack?

Results The security plan and the security mechanism have to be built and implemented. Now

the security zones attributes and the attack delay zones have to be defined, using the principle “outer zones will protect inner zones”. Delay time will be increased by serial obstacles that an intruder has to pass, that will help gaining time for intervention forces to arrive and to implement/enforce a response/reaction. The next questions have to be answered:

• How do we think to protect the values? • What means do we have available to assure protection? • What is the amount/distribution of the resources we need in the allocated security

budget? Building the required answers represent an interactive process, any new version is

thoroughly analyzed regarding the established performance criteria. The process ends when an acceptable balance between requests, dangers, causes, countermeasures efficiency and costs limits is reached.

Practice shows that if enough time is available, any security mechanism can be bridged. For that reason it is mandatory to achieve a balance between the structural component elements (Fig. 1).

Page 44: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

44

To design a security system for one designated situation regarding reaction time we have to consider the following important moments of time (Fig. 2) [1, 2]: t0 - moment when the burglar attack begin t1 - moment when the first alarm is triggered by detection elements activated first t2 - moment when the alarm is evaluated and configured T2-T1 - time interval needed for detection, evaluation and confirmation of the alarm t3 - moment when intervention force have annihilated the perpetrator T3 - time interval until intervention T3-T2 - response time of intervention team.

Fig. 1: The structural components of security Fig. 2: The important time moments

The necessary rule is that the time to achieve the goal of hostile action Tc (burglar, breach of close) to be longer than T3. Problem consists of constant decrease of time intervals T2-T1, T3-T2 through following actions:

- insertion of corresponding mechanic elements in the perpetrator path to effectively delay them;

- use of performing alarm equipment; - high speed reaction of intervention team; - implementation of multiple redundancy logic/diagram in security systems.

The constitutive elements of an anti burglar security system are as follows [3]: - Sensors, which are devices that receive information. - Central unit, which processes information passed by sensors according to system

status (active or not). The main role is to signal that an intrusion was detected inside the protected area.

- Peripheral units: keyboards, expander modules, whose main role is to increase number of inputs and command of the system (activation/deactivation, stop, alarm, event log, etc.).

- Signaling devices: sirens, optical and/or acoustic flashes. - Remote communications devices: phones using digital or vocal messages, serial

interfaces, TCP/IP. The “zone” concept: From the electric point of view, the zone represents one input of

the central unit. From the “system” point of view, the zone represents a well defined space that is protected against burglar.

The “partition” concept: The partition represents one or more zone(s) that is (are) activated or deactivated simultaneously by the same user.

The codes are used to authenticate the users in a system with according “rights” assigned to them. The “rights” means what a user can do, what parts of the system a user can access, operations permitted to the user, etc. Codes are structured and named, as follows: Installer, master, user. References [1] Ilie, Gheorghe; Urdareanu, Tiberiu: Securitatea deplina, Editura UTI, Bucuresti, 2001. (references) [2] Ilie, Gheorghe: Securitatea mediului de afaceri, Editura UTI Press, Bucuresti, 2006. [3] Documentatie OCTAVE-S and Documentatie MEHARI.

Page 45: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

45

An EMC Problem Inside An IC And Its Workaround

Dan Tudor Vuza1), and Marian Vladescu2)

1) Institute of Mathematics of the Romanian Academy, Bucharest, Romania, [email protected]

2) Politehnica University of Bucharest, Romania, [email protected] Summary: During the development of an electronic module using a CPLD and a micro-controller, we discovered an abnormal behavior of the CPLD having as result the reset of a counter without giving the command for this purpose. We found that a spike occurring on the internal reset line had the effect of resetting the counter, and we suspected this to be in connection with the change in the state of the 20 data lines to the micro-controller. The solution we found was to introduce two kinds of delays so that the first 10 data lines changed first, followed by the next data lines. After introducing the delays we did no longer remark any disturbance. Keywords: CPLD, EMC, EMI. Motivation

Our task was to develop a CPLD-based module for temporary storage of data from an emitter and delivery to a receiver (in our case, a micro-controller), for which we used Xilinx XC2C256. Inside the module we configured two registers A, B that each can store 4 words of 20 bits. Synchronous work is ensured by a 4-bit counter that is externally clocked. During interval 0-7 of the counter, data is stored to B and can be read from A via 20 output lines; during interval 8 -15, data is stored to A and can be read from B. The receiver is notified, via an interrupt signal, about register swapping; subsequently it can download the words stored in the register not currently in use by selecting in turn the four words via a 2-bit multiplexer.

The 20 output lines change status synchronously, at register swapping, as well as asynchronously, in the moment when the receiver acts on the multiplexer. If a high number of lines change simultaneously, a perturbation internal to the chip may occur, as we have discovered.

Figure 1: Scope screen capture displaying the perturbation.

Page 46: Smart Applications & Technologies for Electronic Engineeringsatee.uab.ro/upls/SATEE2012.pdf · „1 Decembrie 1918” University of Alba Iulia Department of Science and Engineering

46

The manufacturer recommends the use of the global reset net that is common to all function blocks for reset purposes [1], [2]. However, being more distributed across the chip than the other nets, it seems to be also more sensitive to EMI. The problem is shown in Fig. 1. Trace with number 3 shows the negative of bit 3 of the counter and trace with number 1 shows the nega tive of bit 2; the latter is also the signal that triggers the micro-controller interrupt for the transfer of 4 words. Prior to the disturbance that occurs near the middle of the screen on both mentioned traces, the counter had the value 1111. At the transition to 0000, the change in bit 3 triggered register swapping and hence the change in the state of the 20 output lines. Apparently this created a spike on the internal reset net, which had the effect in setting the counter to its reset value 1111 shortly after the transition. Consequently traces 3 and 1 assumed the value 1 (as normally should be) and then went immediately to 0 as seen (because of the spurious reset). At the next clock the phenomenon repeated and produced the second spike.

Results

We divided the 20 output lines into two groups L and H of 10 lines each. For the synchronous change of state we found a way to reconfigure the register

swapping so that group L changes one clock before group H. It remained to solve the asynchronous change, which happens when the receiver

acts on the two lines that commonly drive the multiplexers of groups L and H. To avoid having both groups changing simultaneously, one should create a delay on the path to the group H multiplexer while keeping the direct path to the group L multiplexer. However, the Xilinx documentation [1], [2] does not mention the possibility of configuring an internal delay; any attempt of creating a delay by chaining logic gates would be removed by the optimizer. Therefore, we created the delay by routing the line from inside the chip to the outside via an output pin and back to inside via an input pin; the output and input pin were externally connected. Since the optimizer cannot know what we would do with the two pins, it had not removed the path we created.

After introducing both kinds of delays we did no longer remark any disturbance so far.

References [1] Xilinx Corporation, "CoolRunner-II CPLD Family Data Sheet", ver. 3.1, September

2008. Available at www.xilinx.com/support/documentation/coolrunner-ii_data_sheets.htm

[2] Xilinx Corporation, " XC2C256 CoolRunner-II CPLD", ver. 3.2, March 2007. Available at www.xilinx.com/support/documentation/coolrunner-ii_data_sheets.htm