rss_2.0Carpathian Journal of Electronic and Computer Engineering FeedSciendo RSS Feed for Carpathian Journal of Electronic and Computer Engineering Journal of Electronic and Computer Engineering 's Cover control using TCP IP communication under LabVIEW USB6001 environment<abstract> <title style='display:none'>Abstract</title> <p>This article introduces a basic LED control using the USB6001 hardware, which is a LabVIEW product. It may be thought of as an extension device for real-time testing of simulation results. LabVIEW2014 is the software used. TCP is the communication technique, which has already been incorporated in LabVIEW via one of the communication modules. It might also be done on the same platform. There are two objects in this article, a server and a client, that may transport data or messages between these two applications. The Transmission Control Protocol governs the transmission process.</p> </abstract>ARTICLE2022-01-21T00:00:00.000+00:00A Survey on Automatic Design Methods for Swarm Robotics Systems<abstract> <title style='display:none'>Abstract</title> <p>Swarm robots are a branch of robotics that draws inspiration from biological swarms to mimic their collective behavior. Automatic design methods are part of swarm engineering, depend on artificial intelligence algorithms to produce the collective behavior of robots. In general, they follow two-approach evolutionary algorithms like practical swarm optimization and reinforcement learning. This paper studies these approaches, illustrating the effect of modifications and enhancements of algorithms for both directions, showing important parameters considered for the best performance of the swarm, and explaining the methods and advantages of using deep learning to reinforcement learning.</p> </abstract>ARTICLE2022-01-21T00:00:00.000+00:00A survey for Communication security of the embedded system<abstract> <title style='display:none'>Abstract</title> <p>The embedded operating system is a task-oriented computing platform that can be tailored, low-cost, and has high requirements for reliability and real-time performance. It plays an extremely important role in engineering applications. With the gradual application of embedded systems in various fields, the shortcomings of its insufficient ability to respond to security threats have gradually emerged, and many hackers have turned their attack targets into embedded systems. The important reason for these attacks is that embedded systems lack sufficient multi-layer protection mechanisms. This article focuses on the threats embedded systems face in terms of communication security. Then analyze the existing communication security-related technologies from the perspectives of the network layer, the transport layer, and the application layer. Finally, it summarizes the research direction of embedded system security countermeasures.</p> </abstract>ARTICLE2022-01-21T00:00:00.000+00:00Environmental Parameters Monitoring System<abstract> <title style='display:none'>Abstract</title> <p>The project presents the development of a system for monitoring environmental parameters. At the base of this system is the ESP-32S board that collects, processes and transmits data from the three sensors to the two web interfaces. The role of these web interfaces is to display the data collected from the sensors. The local web interface consists of two windows, the first window contains the table of sensors that displays the data measured by the sensors at that time. In the second window you can see the data measured by the sensors through graphs. They store the sensor data, giving the user the ability to view previously measured data. The local web interface provides sensor data only in the Wi-Fi network coverage area, and its data is deleted when the server is closed. The global web interface displays data using graphs. At the base of this web interface is the ThingSpeak platform that allows the system to transmit data anywhere in the world, store data in the Cloud space and the possibility of using special analysis functions.</p> </abstract>ARTICLE2022-01-21T00:00:00.000+00:00Hardware accelerated image processing on FPGA based PYNQ-Z2 board<abstract> <title style='display:none'>Abstract</title> <p>In this paper we present the partial results of a research in progress made in order to develop a prototype of a self-driving car’s controller and processing unit. The framework that we used consisted of a camera for input of visual imagery information (Logitech 720p), a laser range finder for depth and object sensing (Parallax; PulsedLight LIDAR-Lite v2), and the main processing board, an FPGA based accelerator board PYNQ Z2.</p> </abstract>ARTICLE2021-10-16T00:00:00.000+00:00Increasing Energy Efficiency Using Photovoltaic Panels<abstract> <title style='display:none'>Abstract</title> <p>The paper analyses the way of design of photovoltaic systems. The objective of this paper is to study the production capacity of electrical energy and the way it is influenced by real time conditions. In order to realize some energetic models that could be implemented on a large scale and used as a model of good practice we used photovoltaic systems of 3 dimensions: 60 PV panels, 100 PV panels and 160 PV panels respectively. The present study considered the climate conditions of the city of Cluj-Napoca for 12 months. It considered the consumption profile (hourly consumption) and the period of the year (summer, winter, etc.) for 3 typical buildings. We used Matlab/Simulink software for simulations. The result is an estimation of the production of electrical energy for renewable sources and the reduction of GreenHouse Gases (GHG). The aim is to reduce both GHG and the energy consumption from conventional sources.</p> </abstract>ARTICLE2021-10-16T00:00:00.000+00:00Audio Database for TIAGo Service Robot<abstract> <title style='display:none'>Abstract</title> <p>In this paper we present an updated version of the audio database acquired by the TIAGo service robot and by the simulated TIAGo service robot. To the initial database which consists in 1380 audio signals we have added 1920 more acoustic signals. The audio database consists now in 3300 isolated audio events corresponding to 110 classes. All the recorded sound events correspond to the indoor environment, and they are spread into five different scenarios: kitchen, room, appliances, voice and non-verbal. The audio database is intended to be used in order to identify indoor events based on audio signature, especially when elderly or chronically ill people live alone.</p> </abstract>ARTICLE2021-10-16T00:00:00.000+00:00Security System Aided by Voice Fingerprint<abstract> <title style='display:none'>Abstract</title> <p>The goal of this paper is to create a security system to identify a specific person who wants to access private information or enter a building using their voice. To perform this system, we identified a database containing the audio files of the users who will be able to authenticate with this system. Several steps were sequentially performed in order to extract the characteristics of the Mel Frequency Cepstral Coefficients from the audio files. Based on the k-Nearest Neighbor algorithm with an Euclidean distance and 4 neighbors, a training model was created. Through experimental results we prove in two ways, using confusion matrix and scatter plot, that the overall voice fingerprint recognition is 100%, for this particular configuration.</p> </abstract>ARTICLE2021-10-16T00:00:00.000+00:00Designing a Low-Code CRUD framework<abstract> <title style='display:none'>Abstract</title> <p>Nowadays programmers write source code for inserting, editing and deleting records of a relational table. The majority of commercial relational databases include a specific management tool that offers such possibilities and most database programmers take this ability as granted. When it comes to real life applications, programmers use Object Oriented (OO) paradigm to build user friendly windows/screens/forms for database operations. The current work shows a different approach using a Low-code CRUD (Create, Read, Update, Delete) framework. Views and guidelines of how to design a Low-code CRUD framework will be detailed. “Low-code” motivation is due to the fact that the new framework will provide the ability to use less code in order to build fast and efficient complex applications. It will be up to the reader to envision a specific framework.</p> </abstract>ARTICLE2021-10-16T00:00:00.000+00:00Using Pathological Elements in Analog Circuit Analysis and Simulation<abstract><title style='display:none'>Abstract</title><p>This paper is focused on some kind of mystery circuit nullator, nullor, current mirror, and voltage mirror, all of them known as pathological elements. These pathological elements can be used to perform circuit modelling, symbolic circuit analysis, circuit synthesis, circuit design and to develop applications that involve modern active devices. It is described a new modeling of nullor-based active devices from the circuit abstraction level. In this paper it is presented the way all types of equations which describe the circuit containing nullors can be directly formulated from the diagrams of these circuits if we took into account that a nullator is an over-determined two-port circuit element (zero voltage, zero current) and the norator is an undetermined two-port circuit element (any voltage and any current). To simulate the nullors with ideal voltage controlled voltage sources, ec = Ac_c uc, with the control gate an ideal independent current source, jC = 0.0 A and with the amplification (transfer) factor Ac_C very big (theoretically ∞), the analog circuits with nullors can be analyzed by using any of the existing simulation software. By this way, it was possible the elaboration of efficient algorithms for an automatic formulation of Kirchhoff’s equations, of loop equations, of modified nodal equations and of state equations for circuits with pathological elements. These procedures can be easily implemented in dedicated programs for the simulations of the complex analog circuits with pathological elements. The example presented in this paper validates the presented models for nullors.</p></abstract>ARTICLE2020-12-31T00:00:00.000+00:00Increasing fault tolerance in service-level agreement constrained context-aware data networks<abstract><title style='display:none'>Abstract</title><p>Attribute study and analysis of fault tolerant data networks. This work is aimed at introducing SLA constrain into fault tolerance and thus increasing overall network availability. Proposed model will evaluate given constraints and select best path that fits requirements. Fault tolerance is increased by adding multiple constraints and thus reducing available paths to best fitting ones.</p></abstract>ARTICLE2020-12-31T00:00:00.000+00:00Pragmatic Implementation of the Front-End of an N-bit/V ADC based on FPGA and FPAA<abstract><title style='display:none'>Abstract</title><p>Reconfigurability has made it possible, among other benefits, to replace traditional discrete components with chips, whose internal components can be programmed in this case FPAAs (Field Programmable Analog Arrays). This paper presents a design and implementation of FPAA of the analog front end dedicated to a new ADC architecture called “N-bit/V”. After validation of the algorithm in simulation, the experimentation results show that the obtained reconfigurable circuit can replace the traditional discrete components-based circuits.</p></abstract>ARTICLE2020-12-31T00:00:00.000+00:00A Survey about Intelligent Solutions for Autonomous Vehicles based on FPGA<abstract><title style='display:none'>Abstract</title><p>Safe driving and reducing the number of accidents victims have been the main motivations for researchers and automotive companies for decades. Today, humanity is very close to make the old dream of fully autonomous vehicles a reality, thanks to the rapid spread of AI (artificial intelligence) and the evolution of semiconductor technologies. But the real problem here is the increasing demand for computational power and that of course will increase power requirements, hence it will not be suitable for autonomous driving applications. GPU is not suitable for solving this problem due to its power consumption as well as heat generation. On the other hand, CPU also does not satisfy the performance requirements. For the above condition, FPGA (Field Programmable Gate Array) has drawn attention as a hardware accelerator since it features high performance with low power consumption. This paper reviews the common solutions involving artificial intelligence implemented on FPGA for autonomous vehicle applications. Research, development, and current trends related to the topic are emphasized.</p></abstract>ARTICLE2020-12-31T00:00:00.000+00:00Theoretical and experimental aspects of the controlled movement of solenoid actuators by means of the voltage static converter with logic gates<abstract><title style='display:none'>Abstract</title><p>The purpose of the scientific research in this paper is to control the movement of electromechanical actuators, through a new voltage convertor. The optimization of the system consists in finding new solutions to control the movement of electromechanical actuators in the gas valve, used in thermal power plants, which can be operated by static converters - with logic gates.</p></abstract>ARTICLE2020-12-31T00:00:00.000+00:00New Solar Water Heating System: Safety, Design and Implementation Issues<abstract><title style='display:none'>Abstract</title><p>This paper presents a new electronic controller, devoted to solar water heating systems, that implements safety functions to prevent <italic>L. pneumophila</italic> bacteria outbreaks. The controller uses data retrieved from strategically located probes in order to implement the proposed safety actions. The electronic solution was integrated and validated on a solar system prototype bench that uses real equipment such as collectors, a water storage tank and expansion vessels. Moreover, two particular solar water heating installations were designed devoted to a house family and a nursing home both located on the Mealhada area. The methodology and reported technical solutions in this research could be a practical guide to promote mass market usage of the solar water heating systems in Portugal.</p></abstract>ARTICLE2018-10-16T00:00:00.000+00:00An Image Encryption Algorithm with Total Diffusion<abstract><title style='display:none'>Abstract</title><p>This paper proposes an image encryption algorithm which uses four scans of an image during the diffusion stage in order to achieve total diffusion between intensities of image pixels. The condition of total diffusion is fulfilled by a suitable combination of techniques of ciphertext chaining and plaintext related diffusion. The proposed encryption algorithm uses two stages which utilize chaotic logistic map for generation of pseudo-random sequences. The paper also briefly analyzes approaches described by other researchers and evaluates experimental results of the proposed solution by means of commonly used measures. Properties of our proposal regarding modifications of plain images prior to encryption or modifications of encrypted images prior to decryption are illustrated by two additional experiments. The obtained numeric results are compared with those achieved by other proposals and briefly discussed.</p></abstract>ARTICLE2018-10-16T00:00:00.000+00:00Stability study of the neural network at particle physics detectors<abstract><title style='display:none'>Abstract</title><p>Neural networks are used as triggers at highenergy physics detectors. These triggers can separate the event that must be saved for later analysis from the other events or noises. Using the raw data of the detector, the signal and the background can be separated offline. After separation, sets of signals and backgrounds can be used to train the neural network. A gas-filled detector (multiwire proportional chamber) was used to study the trigger at different noise levels to find the most stable neural network that tolerates the random hits. The ratio of the recognized and the unrecognized signal and background events is used for the measurement. Its stability is part of the systematical uncertainty.</p></abstract>ARTICLE2018-10-16T00:00:00.000+00:00Design of Pyramidal Horn Antenna for 2.45GHz in FEKO for Application in Experimental FSO/RF Hybrid System<abstract><title style='display:none'>Abstract</title><p>Communication technologies are growing for day to day because demand on data sharing is unstoppable. Users require availability of approach to network at all time. Implementation of smart technologies allows communication of all type of devices. Capacity of data flow have to grow. Video formats HD or 4K require transmit on high data speed. Based on the demands many types of different communication systems which are suitable for these speeds were designed. One of these systems is FSO (Free Space Optics). FSO system is based on transmission of optical beams which carry the information. This system allow high data speed comparable with standard optical fiber in range to 10km. One of drawbacks of this system is LOS (Light of Sight) between communication points. The other drawback is sensitivity to weather changes. Optical beams interfere with water particles and cause attenuation on transmission path. The solution is in implementation using hybrid FSO/RF system which combines optical communication system with RF (Radio Frequency) backup link. We realized FSO communication link on Technical University of Košice. Our research is focused on design of appropriate type of antenna for our RF backup link. Our results in this area were published.</p></abstract>ARTICLE2018-10-16T00:00:00.000+00:00Simulation of Downlink of 10G-PON FTTH in the city of Košice<abstract><title style='display:none'>Abstract</title><p>Optical fiber has the great advantages of capacity and reliability. That is why network providers started to deploy FTTx (Fiber-To-The-x) optical access using various PON (Passive Optical Network) architectures. The leading technology right now is Gigabit PON (GPON). However, with increasing amount of multimedia we need to further develop existing technologies to go on with these high demands. Fiber-To-The-Home (FTTH) using 10G-PON technology for broadband access application is effective solution for high speed networks with high capacity. In this paper, we look at the passive optical network in the city of Košice and based on the real network we created simulation model of downlink of 10G-PON based FTTH with triple-play service.</p></abstract>ARTICLE2018-10-16T00:00:00.000+00:00Activity and health monitoring systems<abstract><title style='display:none'>Abstract</title><p>This paper presents an Open Platform Activity and health monitoring systems which are also called e-Health systems. These systems measure and store parameters that reflect changes in the human body. Due to continuous monitoring (e.g. in rest state and in physical effort state), a specialist can learn about the individual's physiological parameters. Because the human body is a complex system, the examiner can notice some changes within the body by looking at the physiological parameters. Six different sensors ensure us that the patient's individual parameters are monitored. The main components of the device are: A Raspberry Pi 3 small single-board computer, an e-Health Sensor Platform by Cooking-Hacks, a Raspberry Pi to Arduino Shields Connection Bridge and a 7-inch Raspberry Pi 3 touch screen. The processing unit is the Raspberry Pi 3 board. The Raspbian operating system runs on the Raspberry Pi 3, which provides a solid base for the software. Every examination can be controlled by the touch screen. The measurements can be started with the graphical interface by pressing a button and every measured result can be represented on the GUI’s label or on the graph. The results of every examination can be stored in a database. From that database the specialist can retrieve every personalized data.</p></abstract>ARTICLE2018-10-16T00:00:00.000+00:00en-us-1