Applied sciences

International Journal of Electronics and Telecommunications

Content

International Journal of Electronics and Telecommunications | 2021 | vol. 67 | No 2

Download PDF Download RIS Download Bibtex

Abstract

In order to solve the problem of misjudgment caused by the traditional power grid fault diagnosis methods, a new fusion diagnosis method is proposed based on the theory of multisource information fusion. In this method, the fault degree of the power element is deduced by using the Bayesian network. Then, the time-domain singular spectrum entropy, frequencydomain power spectrum entropy and wavelet packet energy spectrum entropy of the electrical signals of each circuit after the failure are extracted, and these three characteristic quantities are taken as the fault support degree of the power components. Finally, the four fault degrees are normalized and classified as four evidence bodies in the D-S evidence theory for multifeature fusion, which reduces the uncertainty brought by a single feature body. Simulation results show that the proposed method can obtain more reliable diagnosis results compared with the traditional methods.
Go to article

Bibliography

[1] Yao Yuantao, Wang Jin, Xie Min, Hu Liqin and Wang Jianye, ”A new approach for fault diagnosis with full-scope simulator based on state information imaging in nuclear power plant”, Annals of Nuclear Energy, 2020, 141, 1-9.
[2] Lei Koua, Chuang Liua, Guo-wei Caia, Zhe Zhangb, ”Fault Diagnosis for Power Electronics Converters based on Deep Feedforward Network and Wavelet Compression”, Electric Power Systems Research, 2020, 185, 1-9.
[3] Haibo Zhang, Kai Jia, Weijin Shi, Jianzhao Guo, Weizhi Su and Li Zhang, ”Power Grid Fault Diagnosis Based on Information Theory and Expert System”, Proceedings of the CSU-EPSA,, 2017, 29(8), 111-118.
[4] Jianfeng Zhou, Genserik Reniers and Laobing Zhang, ”A weighted fuzzy Petri-net based approach for security risk assessment in the chemical industry”, Chemical Engineering Science, 2017, 174, 136-145.
[5] Sen Wang and Xiaorun Li, ”Circuit Breaker Fault Detection Method Based on Bayesian Approach”, Industrial Control Computer, 2018, 31(4), 147-151.
[6] Kaikai Gu and Jiang Guo, ”Transformer Fault Diagnosis Method Based on Compact Fusion of Fuzzy Set and Fault Tree”, High Voltage Engineering , 2014, 40(05), 1507-1513.
[7] Jun Miao, Qikun Yuan, Liwen Liu, Zhipeng You and Zhang Wang, ”Research on robot circuit fault detection method based on dynamic Bayesian network”, Electronic Design Engineering, 2020, 28(9), 184- 188.
[8] Bangcheng Lai and Genxiu Wu, ”The Evidence Combination Method Based on Information Entropy”, Journal of Jiangxi Normal University (Natural Science), 2012, 36(5), 519-523.
[9] Libo Liu, Tingting Zhao, Yancang Li and Bin Wang, ”An Improved Whale Algorithm Based on Information Entry”, Mathematics in practice and theory, 2020, 50(2), 211-219.
[10] Juan Yan, Minfang Peng, et al., ”Fault Diagnosis of Grounding Grids Based on Information Entropy and Evidence Fusion”, Proceedings of the CSU-EPSA, 2017, 29(12),8-13.
[11] Ershadi, Mohammad Mahdi and Seifi, Abbas, ”An efficient Bayesian network for differential diagnosis using experts’ knowledge”, International Journal of Intelligent Computing and Cybernetics, 2020, 13(1), 103-126.
[12] Guan Li, Zhifeng Liu, Ligang Cai and Jun Yan, ”Standing-Posture Recognition in Human–Robot Collaboration Based on Deep Learning and the Dempster–Shafer Evidence Theory”, Sensors, 2020, 20(4), 1- 17.
[13] Xiaofei He, Xiaoyang Tong and Shu Zhou, ”Power system fault diagnosis based on Bayesian network and fault section location”, Power system protection and control, 2010, 38(12), 29-34.
Go to article

Authors and Affiliations

Xin Zeng
1 2
Xingzhong Xiong
1 3
Zhongqiang Luo
1 3

  1. School of Automation and Information Engineering, Sichuan University of Science and Engineering, Yibin, China
  2. Artificial Intelligence Key Laboratory of Sichuan Province, Sichuan University of Science and Engineering, Yibin, China
  3. Artificial Intelligence Key Laboratory of Sichuan Province, Sichuan Universityof Science and Engineering, Yibin, China
Download PDF Download RIS Download Bibtex

Abstract

This article presents the design of a miniaturized wearable patch antenna to be utilized for the body area network (BAN) applications. To reduce the size of the antenna a crown fractal geometry antenna design technique has been adopted, and which resulted in a size reduction of 26.85%. Further, the polyester cloth has been used as the substrate of the antenna to make the proposed antenna a flexible one, and suitable for wearable biomedical devices. The designed antenna functions for the 2.45 GHz ISM band and has the gain and bandwidth of 4.54 dB and 131 MHz respectively, covering the entire ISM band. The antenna characteristics like return loss (S11), directivity and radiation pattern have been simulated and analyzed. Specific absorption rate (SAR) and front to back ratio (FBR) of the proposed antenna at the human body tissue model (HBTM) in the planer and different bending conditions of the antenna have also simulated and analyzed, and the proposed antenna fulfils the desired design standards.
Go to article

Bibliography

[1] S. Sindhu, S. Vashisth and S. K. Chakarvati., “A review on wireless body area network (WBAN) for health monitoring system: Implementatioeen protocols,” Communications on Applied Electronics, vol. 4, no. 7, pp. 16-20, Mar. 2016. [2] A. Amsaveni, M. Bharathi and J. N. Swaminathan, "Design and performance analysis of low SAR hexagonal slot antenna using cotton substrate,” Microsystems Technologies, vol. 25, no.6, pp. 2273-2278, Jun. 2019. [3] F. N. Giman, P. J. Soh, M. F. Jamlos, H. Lago, A. A. Al-Hadi and M. A. N. Abdulaziz, “Conformal dual-band textile antenna with metasurface for WBAN application,” Applied Physics A, vol. 123, no. 1, pp. 32 (1-7), Jan. 2017. [4] N. F. M. Aun, P. J. Soh, M. F. Jamlos, H. Lago and A. A. Al-Hadi, “A wideband rectangular-ring textile antenna integrated with corner-notched artificial magnetic conductor (AMC) plane,” Applied Physics A, vol.123, no.1, pp. 19 (1-6), Jan. 2017. [5] B. S. Dhaliwal, S. S. Pattnaik, “BFO-ANN ensemble hybrid algorithm to design compact fractal antenna for rectenna system,” Neural Computing and Applications, vol. 28, no 1, pp. 917-928, Dec. 2017. [6] C. A. Balanis, “Antenna Theory: Analysis and Design,” 2nd ed., Singapore: Wiley, 2005. [7] J. G. Joshi, S. S. Pattnaik and S. Devi, “Metamaterial embedded wearable rectangular microstrip patch antenna,” International Journal of Antennas and Propagation, vol. 2012, pp. 1-9, Sep. 2012. [8] S. Roy and U. Chakraborty, “Metamaterial based dual wideband wearable antenna for wireless applications,” Wireless Personal Communications, vol. 106, no. 3, pp. 1117-1133, Jun. 2019. [9] E. Thangaselvi and K. Meena alias Jeyanthi, “Implementation of flexible denim nickel copper rip stop textile antenna for medical application,” Cluster Computing, vol.22, no. 1, pp. 635-645, Feb. 2018. [10] M. P. Joshi, J. G. Joshi and S. S. Pattnaik, “Hexagonal slotted wearable microstrip patch antenna for body area network, IEEE Pune Section International Conference, 18-20 Dec. 2019. [11] A. Amsaveni, M. Bharathi and J. N. Swaminathan, “Design and performance analysis of low SAR hexagonal slot antenna using cotton substrate,” Microsystem Technologies, vol. 25, no. 6, pp. 2273-2278, Jun. 2019. [12] E. A. Mohammad, A. Hasliza, H. A. Rahim, P. J. Soh, M. F. Jamlos, M. Abdulmalek and Y. S. Lee, “Dual-band circularly polarized textile antenna with split-ring slot for off-body 4G LTE and WLAN applications,” Applied Physics A, vol. 124, no. 8, pp. 568 (1-10), Aug. 2018. [13] M. E. Jalil., M. K. A. Rahim, N. A. Samsuri, R. Dewan and K. Kamardin, “Flexible ultra-wideband antenna incorporated with metamaterial structures: multiple notches for chipless RIFD application,” Applied Physics A, vol. 123, no. 1, pp. 48 (1-5), Jan. 2017. [14] P. J. Gogoi, S. Bhattacharyya and N. S. Bhattacharyya, “Linear low density polyethylene (LLDPE) as flexible substrate for wrist and arm antennas in C-band,” Journal of Electronic Materials, vol. 44, no. 4, pp. 1071-1080, Apr. 2015. [15] M. N. Ramli., P. J. Soh, M. F. Jamlos, H. Lago., N. M. Aziz and A. A. Al-Hadi, “Dual-band wearable fluidic antenna with metasurface embedded in a PDMS substrate,” Applied Physics A, vol. 123, no. 2, pp. 149 (1-7), Feb. 2017. [16] http://www.fcc.gov/encylopedia/specific-absorption-rate-sar-cellulattelephones. [17] A. Y. I. Ashyap, Z. Z. Abidin, S. H. Dahlan, H. A. Majid, M. R. Kamarudin and A. A. Alhameed, “Robust low-profile electromagnetic band-gap- based on textile wearable antennas for medical application,” International workshop on Antenna Technology, Small Antennas, Innovative Structures, and Applications, Athens, Greece, 1-3 Mar. 2017.
Go to article

Authors and Affiliations

Vikas Jain
1
Balwinder Singh Dhaliwal
2

  1. Research Scholar of IK Gujral Punjab Technical University, Kapurthala, Punjab, India
  2. Faculty of Electronics & Communication Engineering Department, National Institute of Technical Teachers’ Training and Research, Chandigarh, India
Download PDF Download RIS Download Bibtex

Abstract

The article considers the problem of stability of interval-defined linear systems based on the Hurwitz and Lienard- Shipar interval criteria. Krylov, Leverier, and Leverier- Danilevsky algorithms are implemented for automated construction and analysis of the interval characteristic polynomial. The interval mathematics library was used while developing the software. The stability of the dynamic system described by linear ordinary differential equations is determined and based on the properties of the eigenvalues of the interval characteristic polynomial. On the basis of numerical calculations, the authors compare several methods of constructing the characteristic polynomial. The developed software that implements the introduced interval arithmetic operations can be used in the study of dynamic properties of automatic control systems, energy, economic and other non-linear systems.
Go to article

Bibliography

[1] Y. Y. Aleksankin, A. E. Brzhozovsky, V. A. Zhdanov and others, "Automateddesign of automatic control systems," ed. V. V. Solodovnikov, Moscow: Mashinostroenie, 1990, pp. 1-332.
[2] A. A. Voronov and I. A. Orourke, "Analysis and optimal synthesis of computer control systems," Moscow: Nauka, 1984, pp. 1–344.
[3] V. E. Balnokin and P. I. Chinaev, "Analysis and synthesis of automatic control systems on a computer. Algorithms and programs: Reference," Moscow: Radio and communications, 1991, pp 1–256.
[4] P. D. Krutko, A. I. Maximov and L. M. Skvortsov, "Algorithms and programs for designing automatic systems," Moscow: Radio and communications, 1988, 1–306.
[5] G. Davenport, I. Sira and E. Tournier, "Computer algebra," Moscow: Mir, 1991, pp. 1-352. [6] D. M. Klimov, V. M. Rudenko, "Methods of computer algebra in problems of mechanics," Moscow: Nauka, 1989, pp. 1–215.
[7] N. G. Chetayev, "Stability of motion," Moscow: GITL, 1955, pp. 1–207.
[8] V. I. Zubov, "Dynamics of managed systems," High School, 1982, pp. 1– 286.
[9] V. M. Matrosov, "On the theory of motion stability," Applied Mathematics and Mechanics, no 6, pp. 992-1002, 1962.
[10] R. Bellman, "Vector Lyapunov function," J. Soc. Indastr. Appl. Math., vol. 1., no 1, pp. 32-34, 1962.
[11] V. M. Matrosov and S. N. Vasilyev, "Comparison principle for derivation of theorems in mathematical system theory," International Conference on Artificial Intelligence. Moscow: USSR, 1975, pp. 25-34.
[12] V. M. Popov, "On the absolute stability of non-linear automatic control systems," Automatics and Telemechanics, vol. XXII, no. 8., pp. 50-59, 1961.
[13] V. M. Popov, "Hyper-Stability of automatic systems," Moscow: Nauka, 1970, pp. 1–456.
[14] V. Rezvan, "Absolute stability of automatic systems with delay," Moscow: Nauka, 1983, pp. 1–360.
[15] V. V. Rumyantsev and A. S. Oziraner "Stability and stabilization of motion in relation to a part of variables," Moscow: Nauka, 1987, pp. 1– 256.
[16] V. I. Vorotnikov, "Stability of dynamic systems in relation to some variables," Moscow: Nauka, 1991, pp. 1–288.
[17] K. G. Valeev and O. A. Zhautykov, "Infinite systems of differential equations," Alma-ATA: Nauka, 1974, pp. 1–415.
[18] A. K. Bedelbaev, "Stability of nonlinear automatic control systems," Almaty: ed. an KazSSR, 1960, pp. 1–163.
[19] B. J. Magarin, "The Stability and quality of non-linear automatic control systems," Almaty: Science of The Kazakh SSR, 1980. pp. 1–316.
[20] S. A. Aisagaliev, "Analysis and synthesis of autonomous nonlinear automatic control systems," Almaty: Science of The Kazakh SSR, 1980, pp. 1–244.
[21] R. E. Moor, "Interval analysis," New Jersey: Prentice-Hall, 1966, pp. 1- 245. [22] Y. I. Shokin, "Interval analyze," Novosibirsk: Science, 1986, pp. 1–224.
[23] T. I. Nazarenko and L. V. Marchenko, "Introduction to interval methods of computational mathematics, " Irkutsk: Publishing house of Irkutsk University, 1982, pp. 1–108.
[24] S. A. Kalmykov, Y. I. Shokin and Z. H. Yuldashev, "Methods of interval analyze. – Novosibirsk: Science, 1986. – 224 p.
[25] Yu. M. Gusev, V. N. Efanov, V. G. Krymsky and V. Yu. Rutkovsky, "Analysis and synthesis of linear interval dynamic systems (state of the problem)," RAN. Technical cybernetics, no. 1, 1991, pp. 3-30.
[26] E. M. Smagina, A. N. Moiseev and S. P. Moiseeva, "Methods for calculating the IHP coefficients of interval matrices," Computational Technologies, vol. 2, no.1. 1997, pp. 52-61.
[27] V. A. Pochukaev and I. M. Svetlov, "Analytical method of constructing Hurwitz interval polynomials," Automatics and Telemechanics, no. 2, 1996, pp. 89-100.
[28] N. A. Bobylev, S. V. Emelyanov and S. K. Korovin, "On positive definiteness of interval families of symmetric matrices," Automatics and Telemechanics, no. 8, 2000, pp. 5-10.
[29] S. B. Partushev, "Improving the accuracy of interval estimates of voltage deviations in General-purpose electrical networks," Computational Technology, no. 1, 1997, pp. 45-51.
[30] I. V. Svyd, A. I. Obod, G. E. Zavolodko, I. M. Melnychuk, W. Wójcik, S. Orazalieva and G. Ziyatbekova, "Assessment of information support quality by “friend or foe” identification systems," Przegląd Elektrotechniczny, vol. 95, no. 4, 2019, pp. 127-131.
[31] T. Zh. Mazakov, Sh. A. Jomartova, T. S. Shormanov, G. Z. Ziyatbekova, B. S. Amirkhanov and P. Kisala, "The image processing algorithms for biometric identification by fingerprints," News of the National Academy of Sciences of the Republic of Kazakhstan. Series of Geology and Technical Sciences, vol. 1, no 439. 2020, pp. 14-22.
[32] V. M. Belov, V. A. Sukhanov, E. V. Lagutina, "Interval approach for solving problems of kinetics of simple chemical reactions," Technol, no. 1, 1997, pp. 10-18.
[33] A. Kydyrbekova, M. Othman, O. Mamyrbayev, A. Akhmediyarova and Z. Bagashar, "Identification and authentication of user voice using DNN features and i-vector," Cogent Engineering, vol. 7, 2020, pp. 1-22.
[34] I. Nurdaulet, M. Talgat, M. Orken, G. Ziyatbekova, "Application of fuzzy and interval analysis to the study of the prediction and control model of the epidemiologic situation," Journal of Theoretical and Applied Information Technology, Pakistan, vol. 96, no. 14, 2018, pp. 4358-4368.
[35] V. N., Podlesny and V. G. Rubanov, "A simple frequency criterion for robust stability of a class of linear interval dynamic systems with delay," Automatics and Telemechanics, no. 9, 1996, pp. 131-139.
[36] A. P. Molchanov and M. V. Morozov, "Sufficient conditions for robust stability 5f linear non-stationary control systems with periodic interval restrictions," Automatics and Telemechanics, no. 1, 1997, pp. 100-107.
[37] A. M. Letov, "Stability of nonlinear control systems, " Moscow: Fizmatgiz, 1962, pp. 1–312.
[38] N. S. Bakhvalov, "Numerical methods," Moscow: Nauka, 1973. pp. 1–632.
[39] A. I. Lurie , "Some nonlinear problems of the automatic control theory," Moscow: GITL, 1951, pp. 1–216.
[40] K. I. Babenko, "Fundamentals of numerical analysis," Moscow: Nauka, 1986. pp. 1–744.
[41] B. P. Demidovich, I. A. Maron and E. Z. Shuvalova, "Numerical methods of analysis. Approximation of functions, differential and integral equations," Moscow: Nauka, 1967, pp. 1–368 p.
[42] V. N. Afanasiev, V. B. Kolmanovsky and V. R. Nosov, "Mathematical theory of designing control systems," Moscow: Higher. SHK., 1989, pp. 1–447.
[43] G.A. Amirkhanova, A. I. Golikov and Yu.G. Evtushenko, "On an inverse linear programming problem," Proceedings of the Steklov Institute of Mathematics, vol. 295. no. 1, 2016, pp. S21-S27.




Go to article

Authors and Affiliations

Talgat Mazakov
1
Waldemar Wójcik
2
Sholpan Jomartova
1
Nurgul Karymsakova
3
Gulzat Ziyatbekova
1
Aisulu Tursynbai
3

  1. Institute of Information and Computational Technologies CS MES RK, Al-Farabi Kazakh National University, Almaty, Kazakhstan
  2. Lublin Technical University, Poland
  3. Al-Farabi Kazakh National University, Almaty, Kazakhstan
Download PDF Download RIS Download Bibtex

Abstract

The article deals with the features and characteristics of intelligent systems for modelling business processes. Their classification was made and criteria for comparison were developed. According to the comparative analysis of existing expert systems for intelligent analysis, a reasonable choice of system for modelling business processes of a particular enterprise has been carried out. In general, it was found that the introduction of intelligent systems for modelling business processes of the enterprise and forecasting its activities for future allows management of the company to obtain relevant and necessary information for the adoption of effective management decisions and the development of a strategic plan.
Go to article

Bibliography

[1] B. V. Kuzmenko, and O. A. Chaikovska, “The systems of artificial intelligence,” Kyiv, Alterpres, 2006.
[2] H. F. Ivanchenko,“The systems of artificial intelligence,” Kyiv, KNEU, 2011.
[3] D. F. Liuher, “The artificial intelligence: strategies and methods of solving difficult issues,” Moscow, Vyliams (in Russian), 2003, pp. 866.
[4] A. A. Emelianov, E. A. Vlasova, and R. V. Duma, “Simulation modeling of economic systems,” Moscow, Finansy i statistika (in Russian), 2002.
[5] D. Waterman, “Guide to expert systems,” Moscow, Myr, 1989.
[6] A. A. Barsehian, M. S. Kupryianov, V. V. Stepanenko, and Y. Y. Kholod, “Methods and models of data analysis: OLAP and Data Mining,” St-Petersburg, BKhV, 2004.
[7] V. Mashkov and A. Smolarz and V. Lytvynenko, “The problem of system fault-tolerance,” Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska (IAPGOŚ), 4(4), pp. 41-44, 2014.
[8] Z. Omiotek and W. Wójcik, “The use of Hellwig's method for dimension reduction in feature space of thyroid ultrasound images,” Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, 4(3), pp. 14-17, 2014.
[9] P. V. Poliakov, and S. A. Korobov, “Software tools for developing business plans: Project Expert system,” Volhohrad, vol. HU, pp. 48, 2004.
[10] H. S. Prokudin, M. T. Dekhtiaru, “Simulation modeling in informational systems,” Kyiv: NTU., no. 9, pp. 181–189, 2004.
[11] A. P. Rotshtein, and H. B. Rakytyanska, “Diagnosis problem solving using fuzzy relations,” IEEE Transactions on Fuzzy Systems, vol. 16, no. 3, pp. 664-675, 2008.
[12] S. I. Vyatkin, A. N. Romanyuk, and Z. Y. Gotra, “Offsetting, relations, and blending with perturbation functions,” Proc. of SPIE 10445, 2017.
[13] L. I. Timchenko, S. V. Pavlov, N. I. Kokryatskaya, et al. “Bio-inspired approach to multistage image processing,” Proc. of SPIE 10445, 2017.
[14] M. F. Kirichenko, Yu. V. Krak, A. A. Polishchuk, “Pseudo inverse and projective matrices in problems of synthesis of functional transformers,” Kibernetika i Sistemnyj Analiz, vol. 40, no. 3, pp. 116-129, 2004.
[15] K. G. Selivanova, O. G. Avrunin and S. M. Zlepko, “Quality improvement of diagnosis of the electromyography data based on statistical characteristics of the measured signals,” Proc. of SPIE 10031, 2016.
Go to article

Authors and Affiliations

Svetlana A. Yaremko
1
Elena M. Kuzmina
1
Nataliia B. Savina
2
Konrad Gromaszek
3
Bakhyt Yeraliyeva
4
Gauhar Borankulova
4

  1. Vinnytsia Institute of Trade and Economics of Kyiv National University of Trade and Economics, Ukraine
  2. National University of Water and Environmental Engineering, Rivne, Ukraine
  3. Lublin University of Technology, Lublin, Poland
  4. Taraz State University after M.Kh.Dulaty, Taraz, Kazakhstan
Download PDF Download RIS Download Bibtex

Abstract

The possibility and expediency of estimation of risk factors based on fundamental positions of information and entropy are grounded. In accordance with the principle of addiction, the possibility of using the H-criterion as an indicator of business uncertainty is shown. The algorithm of risk estimation of these investments is offered.
Go to article

Bibliography

[1] D. A. Endovutskiy, “Complex analysis and control of investment activity: methodology and practice,” in Finance and statistics, 2001, pp. 4–400.
[2] V. M. Anshun, “Investment analysis: Study practice allowance,” in Delo, 2000, pp. 1–280.
[3] E. Nickbaht, and A. Gropelli, “Finance 17th ed.,” in Barrons Educational Series, New York, 2018, pp. 1–640.
[4] A. I. Zagorodniy, “Financial Vocabulary,” in Znannia, 2000, pp. 21–87.
[5] V. V. Vitlinskiy, and S. I. Nakonechnyj, “Risk in management,” in LLC Borysphen-M, 1996, pp. 15–336.
[6] A. Vorontsovskyj, “Analysis and basement of investment decisions on the stock market,” in Problems of theory and practice of management, 1996, pp. 104–109.
[7] A. S. Grinberg, R. M. Kachalov, and V. N. Shander, “Dual management on the base of risk theory in lifelong cycle man-machine system,” in Computer science-89, Minsk, 1989, pp. 891–896.
[8] L. O. Bakaev, “Quantitative methods at investment management,” in KNEU, 2000, pp. 131–151.
[9] A. P. Nesenyuk, “Undetermined dimensions in management with incomplete information,” Moscow: Mir, 1978, pp. 55–64.
[10] C. Shannon, “Works on theory information and cybernetics,” Moscow: Mir, 1963, pp. 54-223.
[11] C. E. Shannon, “Mathematical Theory of Communication,” The Bell System Technical Journal, vol. 27, pp. 379–423 and 623-656, 1948.
[12] A. S. Kovalenko, S. V. Tymchyk, S. V. Kostyshyn, S. M. Zlepkoand W. Wójcik, A. Kalizhanova, A. Burlibay and A. Kozbekova., “Concept of information technology of monitoring and decision-making support,” Proc. of SPIE 10445, pp. 95–101, 2017.
[13] A. P. Rotshtein, M. Posner, and H. B. Rakytyanska, “Cause and effect analysis by fuzzy relational equations and a genetic algorithm,” Reliability Engineering and System Safety, vol. 91, no. 9, pp. 1095–1101, 2006.
[14] V. Mashkov, A. Smolarz and V. Lytvynenko, “The problem of system fault-tolerance,” Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska (IAPGOŚ), vol. 4, no. 4, pp. 41–44, 2014.
[15] L. I. Timchenko, “A multistage parallel-hierarchic network as a model of a neuronlike computation scheme,” Cybernetics and Systems Analysis, vol. 36, no. 2, pp. 251–267, 2000.

Go to article

Authors and Affiliations

Nataliia B. Savina
1
Nina V. Slyusarenko
2
Maryna S. Yakobchuk
1
Konrad Gromaszek
3
Saule Smailova
4
Kuanysh Muslimov
5

  1. National University of Water and Environmental Engineering, Rivne, Ukraine
  2. Kherson State University, Ukraine
  3. Lublin University of Technology, Lublin, Poland
  4. East Kazakhstan State Technical University named after D.Serikbayev, Ust-Kamenogorsk, Kazakhstan
  5. Kazakh National Research Technical University named after K.I.Satpayev, Almaty, Kazakhstan
Download PDF Download RIS Download Bibtex

Abstract

Due to the severe damages of nuclear accidents, there is still an urgent need to develop efficient radiation detection wireless sensor networks (RDWSNs) that precisely monitor irregular radioactivity. It should take actions that mitigate the severe costs of accidental radiation leakage, especially around nuclear sites that are the primary sources of electric power and many health and industrial applications. Recently, leveraging machine learning (ML) algorithms to RDWSNs is a promising solution due to its several pros, such as online learning and self-decision making. This paper addresses novel and efficient ML-based RDWSNs that utilize millimeter waves (mmWaves) to meet future network requirements. Specifically, we leverage an online learning multi-armed bandit (MAB) algorithm called Thomson sampling (TS) to a 5G enabled RDWSN to efficiently forward the measured radiation levels of the distributed radiation sensors within the monitoring area. The utilized sensor nodes are lightweight smart radiation sensors that are mounted on mobile devices and measure radiation levels using software applications installed in these mobiles. Moreover, a battery aware TS (BATS) algorithm is proposed to efficiently forward the sensed radiation levels to the fusion decision center. BA-TS reflects the remaining battery of each mobile device to prolong the network lifetime. Simulation results ensure the proposed BA-TS algorithm’s efficiency regards throughput and network lifetime over TS and exhaustive search method.
Go to article

Bibliography

[1] R. Elhabyan, W. Shi and M. St-Hilaire, ”Coverage protocols for wireless sensor networks: Review and future directions,” Journal of Communications and Networks, 21, (1), 45-60, Feb. 2019, DOI: 10.1109/JCN.2019.000005.
[2] X. Ge, Q. Han, X. Zhang, L. Ding and F. Yang, ”Distributed Event-Triggered Estimation Over Sensor Networks: A Survey,” IEEE Transactions on Cybernetics, 50 (3), 1306-1320, March 2020, DOI: 10.1109/TCYB.2019.2917179.
[3] International ATomic Energy Authority (IAEA) accident reports available online, https://www.iaea.org/topics/accident-reports.
[4] R. R. Kumar, L. Macwin and R. Rathna, ”Nuclear radiation detection using Wireless Sensor Network,” 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, 2015, pp. 1-4, DOI: 10.1109/ICIIECS. 2015.7192790.
[5] R. Dersch,Primary and secondary measurements of 222Rn, Journal of Applied Radiation and Isotopes, 60, Issues 2–4, 2004, Pages 387-39, 2004, DOI: 10.1016/j.apradiso.2003.11.046.
[6] Drew, Christina Grace, Deirdre Silbernagel, Susan Hemmings, Erin Smith, Alan Griffith, William Takaro, Tim Faustman, Elaine, ”Nuclear Waste Transportation: Case Studies of Identifying Stakeholder Risk Information Needs”. Environmental Health Perspectives, 111, 263- 72, DOI: 10.1289/ehp.5203.
[7] Manar, M.K., Mohamed, S., Hashima, S., Imbaby, I.M., Amal-Eldin, M., Nesreen, I. “Hardware Implementation for Pileup Correction Algorithms in Gamma Ray Spectroscopy. International Journal of Computer Applications, 176, 43-48, 2017. DOI: 10.5120/ijca2017915634
[8] Bensaleh, Mohammed Saida, Raoudha Hadj kacem, Yessine Abid, Mohamed. ”Wireless Sensor Network Design Methodologies: A Survey”. Journal of Sensors, pp.1-13, 2020. DOI: 10.1155/2020/9592836.
[9] B. Xing, R. Ding and J. Wang, ”Design of Wireless Sensor Network for Protection of X-Ray Detection,” 2013 6th International Conference on Intelligent Networks and Intelligent Systems (ICINIS), Shenyang, 2013, pp. 282-285, DOI: 10.1109/ICINIS.2013.79.
[10] M. Altayeb, M. Mekki, O. Abdallah, A. B. Mustafa and S. Abdalla, ”Automobile and fixed wireless sensor network for radiation detection,” 2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE), Khartoum, 2015, pp. 199-202, DOI: 10.1109/ICCNEEE.2015.7381361.
[11] C. Liu, P. -. Drouin, G. St-Jean, M. D´eziel and D. Waller, ”Wireless Radiation Sensor Network with directional radiation detectors,” IEEE Nuclear Science Symposium and Medical Imaging Conference (NSS/MIC), Seattle, WA, pp. 1-6, 2014. DOI: 10.1109/NSSMIC.2014.7431111.
[12] Jianxin Sun, ”Radiation detection using mobile sensor networks”, PhD thesis, University of Delaware, Spring 2016.
[13] Ding, Fei Zhang, Deng-yin Wang, Wanping Lei, Zhenzhong. (2018). ”A Low Complexity Active Sensing and Inspection System for Monitoring of Moveable Radiation Environments”. Journal of Sensors, 2018, 1-9. 10.1155/2018/8096012.
[14] M. S. Muktadir, S. Islam and A. R. Alam Chowdhury, ”Development of a Wireless Safety System Based on Multiple Radiation Detector for Nuclear Facilities,” International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), Dhaka, Bangladesh, pp. 539- 542, 2019. DOI: 10.1109/ICREST.2019.8644312.
[15] Vasile Buruian˘a, Mihaela Oprea. A Microcontroller-Based Radiation Monitoring and Warning System. 8th International Conference on Artificial Intelligence Applications and Innovations (AIAI), Sep 2012, DOI: 10.1007/978-3-642-33412-2 39.
[16] Barbar´an, Javier D´ıaz, a Esteve, I˜naki Rubio, Bartolom´e. RadMote: a mobile framework for radiation monitoring in nuclear power plants, 2007.
[17] S. Duraisamy, G. K. Pugalendhi and P. Balaji, ”Reducing energy consumption of wireless sensor networks using rules and extreme learning machine algorithm,” The Journal of Engineering, vol. 2019, no. 9, pp. 5443-5448, 2019, DOI: 10.1049/joe.2018.5288.
[18] Thompson, William R. ”On the Likelihood That One Unknown Probability Exceeds Another in View of the Evidence of Two Samples.” Biometrika 25, no. 3/4, 1933. DOI: 10.2307/2332286.
[19] F. Wilhelmi, C. Cano, G. Neu, B. Bellalta, A. Jonsson, and S. Barrachina-Mu˜noz, “Collaborative spatial reuse in wireless networks via selfish multi-armed bandits,” Ad Hoc Networks, vol. 88, pp. 129–141, 10 2017. DOI: 10.1016/j.adhoc.2019.01.006.

Go to article

Authors and Affiliations

Sherief Hashima
1
Imbaby Mahmoud
2

  1. Engineering Dept., Nuclear Research Center, Egyptian Atomic Energy Authority, Cairo 13759, Egypt
  2. Radiation Engineering Dept., National Center of Radiation Research and Technology (NCRRT) Egyptian Atomic Energy Authority, Cairo, Egypt
Download PDF Download RIS Download Bibtex

Abstract

The article is devoted to some critical problems of using Bayesian networks for solving practical problems, in which graph models contain directed cycles. The strict requirement of the acyclicity of the directed graph representing the Bayesian network does not allow to efficiently solve most of the problems that contain directed cycles. The modern theory of Bayesian networks prohibits the use of directed cycles. The requirement of acyclicity of the graph can significantly simplify the general theory of Bayesian networks, significantly simplify the development of algorithms and their implementation in program code for calculations in Bayesian networks..
Go to article

Bibliography

[1] A. Nafalski and A.P. Wibawa, “Machine translation with javanese speech levels’ classification,” Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, vol. 6, no 1, pp 21-25, 2016. https://doi.org/10.5604/20830157.1194260
[2] Z.Omiotek and P. Prokop, “The construction of the feature vector in the diagnosis of sarcoidosis based on the fractal analysis of CT chest images,” Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, vol. 9, no. 2, pp. 16-23, 2019. https://doi.org/10.5604/01.3001.0013.2541
[3] A. Litvinenko, O. Mamyrbayev, N. Litvinenko, A. Shayakhmetova, “Application of Bayesian networks for estimation of individual psychological characteristics,” Przeglad Elektrotechniczny, vol. 95, no. 5, pp. 92-97, 2019
[4] X.Q. Cai, X.Y. Wu, X. Zhou, “Stochastic scheduling subject to breakdown-repeat breakdowns with incomplete information,” Operations Research, vol. 57, no. 5, pp. 1236–1249, 2009. doi: 10.1287/opre.1080.0660
[5] K.W. Fornalski, “The Tadpole Bayesian Model for Detecting Trend Changes in Financial Quotations,” R&R Journal of Statistics and Mathematical Sciences, vol. 2, no. 1, pp. 117–122, 2016.
[6] J. Pearl “Artificial Intelligence Applications”, in How to Do with Probabilities what people say you can't,/ Editor Weisbin C.R., IEEE, North Holland, pp. 6–12, 1985.
[7] J. Pearl “Probabilistic Reasoning in Intelligent Systems”. San Francisco: Morgan Kaufmann Publishers, 1988,
[8] A. Tulupiev “Algebraic Bayesian networks,” in “Logical-probabilistic approach to modeling knowledge bases with uncertainty,” SPb.: SPIIRAS, 2000.
[9] S. Nikolenko, A. Tulupiev “The simplest cycles in Bayesian networks: Probability distribution and the possibility of its contradictory assignment,” SPIIRAS. Edition 2, 2004. vol.1.
[10] F.V. Jensen, T.D. Nielsen “Bayesian Networks and Decision Graphs,” Springer, 2007.
[11] D. Barber, “Bayesian Reasoning and Machine Learning,” 2017, 686 p. http://web4.cs.ucl.ac.uk/ staff/D.Barber/ textbook/020217.pdf
[12] R.E. Neapolitan “Learning Bayesian Networks,” 704p. http://www.cs.technion.ac.il/~dang/books/Learning%20Bayesian%20Networks(Neapolitan,%20Richard).pdf
[13] O. Mamyrbayev, M. Turdalyuly, N. Mekebayev, and et al. “Continuous speech recognition of kazakh language», AMCSE 2018 Int. conf. On Applied Mathematics, Computational Science and Systems Engineering, Rom, Italy, 2019, vol. 24, pp. 1-6.
[14] A. Litvinenko, N. Litvinenko, O. Mamyrbayev, A. Shayakhmetova, M. Turdalyuly “Clusterization by the K-means method when K is unknown,” Inter. Conf. Applied Mathematics, Computational Science and Systems Engineering. Rome, Italy, 2019, vol. 24, pp. 1-6.
[15] O.Ore “Graph theory,” Мoscow: Science, 1980, 336 p.
[16] Ph. Kharari “Graph theory,” Мoscow: Mir, 1973, 300 p.
[17] V. Gmurman “Theory of Probability and Mathematical Statistics: Tutorial,” Moscow: 2003, 479 p.
[18] A.N. Kolmogorov “Theory: Manual,” in “Basic Concepts of Probability,” Moscow: Science, 1974.
[19] N. Litvinenko, A. Litvinenko, O. Mamyrbayev, A. Shayakhmetova “Work with Bayesian Networks in BAYESIALAB,” Almaty: IPIC, 2018, 311 p. (in Rus). ISBN 978-601-332-206-3.

Go to article

Authors and Affiliations

Assem Shayakhmetova
1 2
Natalya Litvinenko
3
Orken Mamyrbayev
1
Waldemar Wójcik
4 5
Dusmat Zhamangarin
6

  1. Institute of Information and Computational Technology, 050010 Almaty, Kazakhstan
  2. Al-Farabi Kazakh National University, Almaty, Kazakhstan
  3. Information and Computational Technology, 050010 Almaty, Kazakhstan
  4. Institute of Information and Computational Technologies CS MES RK, Almaty
  5. Lublin Technical University, Poland
  6. Kazakh University Ways of Communications, Kazakhstan
Download PDF Download RIS Download Bibtex

Abstract

This paper presents the design of a wearable electroencephalography device and signal processing algorithm for early detection and forecasting of the epileptiform activity. The availability of the examination of functional brain activity for a prolonged period, outside of the hospital facilities, can provide new advantages in early diagnosis and intervention systems. In this study, the low-cost five-channel device is presented. The system consists of two main parts: the data acquisition and transmission units and processing algorithms. In order to create the robust epileptiform pattern recognition approach the application of statistical sampling and signal processing techniques are performed. The discrete wavelet and Hilbert- Huang transforms with principal component analysis are used in order to extract and select a low-dimension feature vector.
Go to article

Bibliography

[1] Stacey, William C. ”Seizure Prediction Is Possible–Now Let’s Make It Practical.”, EBioMedicine, No. 27,2018,pp. 3-4.
[2] Federico, P., Abbott, D. F., Briellmann, R. S., Harvey, A. S. ”Functional MRI of the pre-ictal state”, Brain vol. 128, 2005, pp. 1811 - 1817.
[3] Smith S. J. M. ”EEG in the diagnosis, classification, and management of patients with epilepsy”, Journal of Neurology, Neurosurgery & Psychiatry. no. 76, 2005, pp. 112 - 117.
[4] V. Mihajlovi´c, B. Grundlehner, R. Vullers and J. Penders ”Wearable, Wireless EEG Solutions in Daily Life Applications: What are we Missing?”, Journal of Biomedical and Health Informatics vol. 19, no. 1, 2015, pp. 6-21.
[5] Malmivuo, Plonsey, Jakko Malmivuo, Plonsey Robert, ”Bioelectromagnetism: principles and applications of bioelectric and biomagnetic fields”, Oxford University Press, USA, 1995.
[6] Sudakov O., Kriukova G.,Natarov R. et al., ”Distributed System for Sampling and Analysis of Electroencephalograms”, in Proc. 2017 IEEE 9th International conference IDAACS 2017, Bucharest, 21-23 September 2017, pp. 306-310
[7] Direito B. et al. ”A realistic seizure prediction study based on multiclass SVM.” International Journal of Neural Systems, vol. 27, no. 3 , 2017.
[8] Federico P., Abbott, D. F., Briellmann, R. S., Harvey, A. S. ”Functional MRI of the pre-ictal state”, Brain, vol. 128., 2005, pp. 1811-1817
[9] Obermaier B. et al. ”Hidden Markov models for online classification of single trial EEG data.”, Pattern recognition letters, No. 12, 2001, pp.1299-1309.
[10] Zaena J.V. ”Adaptive tracking of EEG oscilattiond”, Neuroscience Methods, 2010.
[11] Dilran S.W., Lakshitha P.W, Sudaraka M. ”Seizure prediction using Hilbert-Huang transform on field programmable gate array”, IEEE Global conference on signal and information processing, Orlando, 2015.
[12] Jin-De Zhu, Chin-Feng L. et al. ”Analysis of spike waves in epilepsy using Hilbert-Huang transform”, Journal of Medical Systems, 2015.
[13] Kshischang F. R.”The Hilbert transform”, University of Toronto, 2006.
[14] Herrmann C.S., Grigutsch M., Bush N.A. ”EEG oscillations and wavelet analysis”, Event-related potencial,2005.
[15] Shaiens J.”A tutorial on Principal Analysis”, arXiv preprint, Cornell University, 2014.

Go to article

Authors and Affiliations

Viktoriia Gaidar
1
Oleksandr Sudakov
1

  1. Taras Shevchenko National University of Kyiv, Ukraine
Download PDF Download RIS Download Bibtex

Bibliography

[1] D. J. Bernstein and T. Lange, “Montgomery curves and the montgomery ladder.” IACR Cryptol. ePrint Arch., vol. 2017, p. 293, 2017.
[2] C. Costello and B. Smith, “Montgomery curves and their arithmetic,” Journal of Cryptographic Engineering, vol. 8, no. 3, pp. 227–240, 2018.
[3] P. L. Montgomery, “Speeding the pollard and elliptic curve methods of factorization,” Mathematics of Computation, vol. 48, pp. 243–264, 1987.
[4] E. Brier and M. Joye, “Weierstraß elliptic curves and side-channel attacks,” in International workshop on public key cryptography. Springer, 2002, pp. 335–345.
[5] R. R. Farashahi and S. G. Hosseini, “Differential addition on twisted edwards curves,” in Australasian Conference on Information Security and Privacy. Springer, 2017, pp. 366–378.
[6] B. Justus and D. Loebenberger, “Differential addition in generalized edwards coordinates,” in International Workshop on Security. Springer, 2010, pp. 316–325.
[7] R. R. Farashahi and M. Joye, “Efficient arithmetic on hessian curves,” in International Workshop on Public Key Cryptography. Springer, 2010, pp. 243–260.
[8] W. Castryck and F. Vercauteren, “Toric forms of elliptic curves and their arithmetic,” Journal of Symbolic Computation, vol. 46, no. 8, pp. 943–966, 2011.
[9] R. Dryło, T. Kijko, and M. Wro´nski, “Determining formulas related to point compression on alternative models of elliptic curves,” Fundamenta Informaticae, vol. 169, no. 4, pp. 285–294, 2019.
[10] K. Okeya and K. Sakurai, “Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the y-coordinate on a montgomery-form elliptic curve,” in International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 2001, pp. 126–141.
[11] M. Joye, M. Tibouchi, and D. Vergnaud, “Huff’s model for elliptic curves,” in International Algorithmic Number Theory Symposium. Springer, 2010, pp. 234–250.
[12] H. Wu and R. Feng, “Elliptic curves in huff’s model,” Wuhan University Journal of Natural Sciences, vol. 17, no. 6, pp. 473–480, 2012.
[13] T. Oliveira, J. L´opez, H. Hıs¸ıl, A. Faz-Hern´andez, and F. Rodr´ıguez- Henr´ıquez, “How to (pre-) compute a ladder,” in International Conference on Selected Areas in Cryptography. Springer, 2017, pp. 172–191.
[14] R. R. Farashahi and S. G. Hosseini, “Differential addition on binary elliptic curves,” in International Workshop on the Arithmetic of Finite Fields. Springer, 2016, pp. 21–35.
[15] D. Moody and D. Shumow, “Analogues of v´elu’s formulas for isogenies on alternate models of elliptic curves,” Mathematics of Computation, vol. 85, no. 300, pp. 1929–1951, 2016.
[16] C. Costello and H. Hisil, “A simple and compact algorithm for sidh with arbitrary degree isogenies,” in International Conference on the Theory and Application of Cryptology and Information Security. Springer, 2017, pp. 303–329.
[17] D. Jao, R. Azarderakhsh, M. Campagna, C. Costello, L. Feo, B. Hess, A. Jalali, B. Koziel, B. LaMacchia, P. Longa, M. Naehrig, G. Pereira, J. Renes, V. Soukharev, and D. Urbanik, “Supersingular isogeny key encapsulation,” 04 2019.
[18] D. Jeon, C. H. Kim, and Y. Lee, “Families of elliptic curves over quartic number fields with prescribed torsion subgroups,” Mathematics of Computation, vol. 80, no. 276, pp. 2395–2410, 2011.

Go to article

Authors and Affiliations

Robert Dryło
1
Tomasz Kijko
1
Michał Wroński
1

  1. Institute of Mathematics and Cryptology, Faculty of Cybernetics, Military University of Technology, Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used in the proxy delegation of signing rights. The description of the system architecture and the possible application of the protocol in edge computing designs is enclosed.
Go to article

Bibliography

[1] A. Boldyreva, ”Threshold signatures, multi-signatures and blind signatures based on the Gap Diffie-Hellman Group signature scheme”, LNCS, vol. 2567, pp. 31-44, 2003.
[2] D. Boneh, C. Gentry, H. Shacham, B. Lynn, ”Short signatures from the Weil pairing”, Journal of Cryptology, vol. 17, no. 4, pp. 297-319, 2004.
[3] D. Boneh, C. Gentry, H. Shacham, B. Lynn, ”Aggregate and verifiably encrypted signatures from bilinear pairing”, Proceedings of Eurocrypt 2003, LNCS 2656, pp. 416-432, 2003.
[4] Y. Desmedt, ”Society and group oriented cryptography”, Crypto 87, pp. 120-127, 1987.
[5] Y. Desmedt, Y. Frankel, ”Threshold cryptosystems”, LNCS, vol. 718, pp. 1-14, 1993.
[6] D. E. Kouicem, A. Bouabdallah, H. Lakhlef, ”Internet of things security: A top-down survey”, 2018
[7] W. Gao, G. Wang, X. Wang, Z. Yang, ”One-Round ID-Based Threshold Signature Scheme from Bilinear Pairings”, Informatica, Vol. 20, No. 4, pp. 461-476, 2009.
[8] K. Itakura, K. Nakamura, ”A public key cryptosystem suitable for digital multisignatures”, NEC Research and Development, pp. 1-8, vol. 71, 1983.
[9] A. Joux, ”A one-round protocol for tripartite Diffie-Hellman”, Journal of Cryptology, vol. 17, no. 4, pp. 263-276, 2004.
[10] S. Kim, S. Park, D. Won, ”Proxy signatures, revisited”, LNCS, vol. 1334, pp. 223-232, 1997.
[11] A. Lysyanskaya, ”Unique signatures and verifiable random functions from the DH-DDH separation”, Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology, pp. 597-612, 2002.
[12] M. Mambo, K. Usuda, E. Okamoto, ”Proxy signatures for delegating signing operation”, ACM Conference on Computer and Communications Security, pp. 48-57, 1996.
[13] A. Manzoor, M. Liyanagey, A. Braekenz, S. Kanherex, M. Ylianttila, ”Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing”, 2018.
[14] B.C. Neuman, ”Proxy-based authorization and accounting for distributed systems”, Proceedings of the 13th International Conference on Distributed Computing Systems, pp. 283-291, 1993.
[15] K.G. Paterson, ”ID-based signatures from pairings on elliptic curves”, Journals and Magazines, Electronics Letters, Volume: 38 Issue: 18, pp. 1025 - 1026, 2002.
[16] J. Pomykała and T Warchoł, ”Threshold signatures in dynamic groups”, Proceedings of Future Generation Communication and Networking, IEEE Computer Science, pp. 32-37, 2007.
[17] J. Pomykała, B. ´ Zrałek, ”A model of ID-based proxy signature scheme”, Proc. of 6-th Collecter Iberoamerica, pp. 1-8, 2008.
[18] A. Shamir, ”How to share a secret”, Communications of the ACM, 22:612-613, 1979.
[19] N. Suryadevara and S. Mukhopadhyay, ”Internet of things: A review and future perspective” Reliance, 2018.
[20] R. Taylor, D. Baron, and D. Schmidt, ”The world in 2025-predictions for the next ten years”, Microsystems, Packaging, Assembly and Circuits Technology Conference (IMPACT), 2015 10th International. IEEE, pp. 192–195, 2015.
[21] V. Varadharajan, P. Allen, S. Black, ”An analysis of the proxy problem in distributed systems”, Proc. IEEE Computer Society Symposium on Research in Security and Privacy, pp. 255-275, 1991.
[22] H. Watanabe, S. Fujimura, A. Nakadaira, Y. Miyazaki, A. Akutsu, and J. Kishigami, ”Blockchain contract: Securing a blockchain applied to smart contracts”, Consumer Electronics (ICCE), 2016 IEEE International Conference on. IEEE, pp. 467–468, 2016.
[23] Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, ”An overview of blockchain technology: Architecture, consensus, and future trends”, Big Data (BigData Congress), 2017 IEEE International Congress IEEE, pp. 557–564, 2017.
Go to article

Authors and Affiliations

Jacek Pomykała
1
Henryk Kułakowski
1
Piotr Sapiecha
2
Błażej Grela
1

  1. Warsaw University of Technology, Poland
  2. National Institute of Telecommunications in Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

The purpose of this paper is to generate cryptographically strong elliptic curves over prime fields Fp, where p is a Mersenne prime, one of the special primes or a random prime. We search for elliptic curves which orders are also prime numbers. The cryptographically strong elliptic curves are those for which the discrete logarithm problem is computationally hard. The required mathematical conditions are formulated in terms of parameters characterizing the elliptic curves.We present an algorithm to generate such curves. Examples of elliptic curves of prime order are generated with Magma.
Go to article

Bibliography

[1] Daniel J. Bernstein and Tanja Lange. SafeCurves: choosing safe curves for elliptic curve cryptography, 2015. http://safecurves.cr.yp.to (accessed 27 September 2015).
[2] I. Blake, G. Serroussi, N. Smart. Elliptic curves in cryptography. Cambridge University Press, 1999.
[3] H. Cohen. A course in computational number theory. Springer 1983.
[4] H. Cohen, G. Frey. Handbook of Elliptic and Hyperelliptic Curve Cryptography. Chapman and Hall CRC, 1994.
[5] P. Da˛browski, R. Gliwa, J. Szmidt, R. Wicik. Generation and Implementation of Cryptographically Strong Elliptic Curves. Number-Theoretical Methods in Cryptology. First International Conference, NuTMiC 2017. Warsaw, Poland, 11-13, 2017. Lecture Notes in Computer Sciences, (Eds), Jerzy Kaczorowski, Josef Piprzyk, Jacek Pomykała. Volume 10737, pages 25-36. 2017.
[6] W. Diffie, M. E. Hellman. New Directions in Cryptography. IEEE Trans. Information Theory, IT 22(6), pp. 644-654, 1976.
[7] Jean-Pierre Flori, Jerome Plut, Jean-Rene Reinhard. Diversity and transparency for ECC. NIST Workshop on ECC Standards, June 11-12, 2015.
[8] Gerhard Frey, private communication, 2015.
[9] G. Frey, H. Rück. A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves. Mathematics of Computations, 62 91994), 865-874.
[10] S. D. Galbraith, P. Gaudry. Recent progress on the elliptic curve discrete logarithm problem. Cryptology ePrint Archive, 2015/1022.
[11] Steven D. Galbraith and James McKee. The probability that the number of points on an elliptic curve over a finite field is prime. J. London Math. Soc. (2), 62(3):671–684, 2000.
[12] R. Gliwa, J. Szmidt, R. Wicik Searching for cryptographically secure elliptic curves over prime fields. Science and Military, 2016, nr 1, volume 11, pages 10-13, ISSN 1336-8885 (print), ISSN 2453-7632 (on-line).
[13] R. Granger, M. Scott. Faster ECC over F2521��1. In: Katz, J. ed., PKC 2015. LNCS, vol. 9020, pp. 539–553.[14] D. Johnson, A. Menezes. The Elliptic Curve Digital Signature Algorithm (ECDSA). Technical Report CORR 99-34, University of Waterloo, Canada. http://www.math.uwaterloo.ca
[15] Manfred Lochter and Andreas Wiemers. Twist insecurity, 2015. iacr. ePrint Archive 577 (2015).
[16] A. Menezes, T. Okamoto, S. Vanstone. Reducing elliptic curve logarithms to logarithms in a finite field. IEEE. Transactions on Information Theory, 39 (1993), 1639-1646.
[17] N. Koblitz. Elliptic curve cryptosystems. Math. Comp., 48(177), pp. 203- 209, 1987.
[18] V. S. Miller. Use of elliptic curves in cryptography. In Advances in Cryptology - CRYPTO’85, LNCS vol 218, pp. 417-426, 1985.
[19] P. Pohlig, M. Hellman. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transaction on Information Theory, 24 (1979), 106-110.
[20] J. Pollard. Monte Carlo methods for index computations mod pn: Mathematics of Computations, 32 (1978), 918-924.
[21] R. L. Rivest, A. Shamir, L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM, 21(2), pp. 120- 126, 1978.
[22] T. Satoh, K. Araki. Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves, Commentarii Mathematici Universitatis Sancti Pauli, 47 (1998), 81-92.
[23] I. Semaev. Evaluation of discrete logarithms in a group of p-torsion points of an elliptic curve in characteristic p. Mathematics of Computations, 67 (1998), 353-356.
[24] N. Smart. The discrete logarithm problem on elliptic curves uf trace one. Journal of Cryptology, 12 (1999), 193-196.
[25] J. H. Silverman. The arithmetic of elliptic curves. Springer 1986.
[26] Elliptic Curve Cryptography (ECC) Brainpool Standard. Curves and Curve Generation, v. 1.0. 2005. Request for Comments: 5639, 2010. 7027, 2013. http://www.bsi.bund.de
[27] Technical and Implementation Guidance on Generation and Application of Elliptic Curves for NATO classified, 2010.
[28] US Department of Commerce. N.I.S.T. 2000. Federal Information Processing Standards Publication 186-2. FIPS 186-2. Digital Signature Standard.
[29] Standards for Efficient Cryptography Group. Recommended elliptic curve domain parameters, 2000. www.secg.org/collateral/sec2.pdf
[30] Mersenne prime. en.wikipedia.org
[31] Magma Computational Algebra System. School of Mathematics and Statistics. University of Sydney.
Go to article

Authors and Affiliations

Marcin Barański
1
Rafał Gliwa
1
Janusz Szmidt
1

  1. Military Communication Institute, National Research Institute, Warszawska 22A, 05-130 Zegrze
Download PDF Download RIS Download Bibtex

Abstract

The article presents the results of the questionnaire research carried out after the first and repeated after the second semester of crisis distance education, conducted at the Academy of Special Education. Academic lecturers participating in the study indicate a significant decrease in the level of commitment, activity, the regularity of work and the quality of performing tasks presented by students. Lecturers benefit from training and technical support organized by the university. They feel an acute inability to contact students personally, but appreciate the time savings and no need to travel to work. The respondents point to the problem of controlling student integrity during remote examinations. Growing experience in remote education results in higher IT competences and conviction to this type of teaching.
Go to article

Bibliography

[1] P. Topol, ”Metody i narzędzia kształcenia zdalnego w polskich uczelniach w czasie pandemii COVID-19 – Część 1, Dyskusja 2020.” Studia Edukacyjne (58), 2020, pp. 69-83. DOI: 10.14746/se.2020.58.4
[2] M. W. Romaniuk and J. Łukasiewicz-Wieleba, ”Zdalna edukacja kryzysowa w APS w okresie pandemii COVID-19.” 2020, Warszawa, DOI: 10.13140/RG.2.2.18059.52006.
[3] M. W. Romaniuk, J. Łukasiewicz-Wieleba and S. Kohut, ”Nauczyciele akademiccy wobec kryzysowej edukacji zdalnej.” E-Mentor, 5 (87), 2020, pp. 15-26, DOI: 10.15219/em87.1489.
[4] A. Karwińska and M. Karwiński, ”Zdalna edukacja uniwersytecka w czasach pandemii: wyzwania i reakcje: komunikat z badań sondażowych.” Kultura i Rozwój, (7), 2019, pp. 215-243.
[5] B. Jankowiak and S. Jaskulska, ”Dobrostan nauczycieli i nauczycielek a ich postawy wobec kształcenia na odległość w czasie pandemii COVID-19.” Przegląd Pedagogiczny, (1), 2020, pp. 219-232.
[6] P. Topol, ”Metody i narzędzia kształcenia zdalnego w polskich uczelniach w czasie pandemii COVID-19 – Część 2, Dyskusja 2020.” Studia Edukacyjne, (59), 2020, pp. 103-117. DOI: 10.14746/se.2020.59.8
[7] M. W. Romaniuk and J. Łukasiewicz-Wieleba, ”Crisis Remote Education at The Maria Grzegorzewska University During Social Isolation in the Opinions of Students.” International Journal of Electronics and Telecommunications, 66 (4), 2020, pp. 807-812, DOI: 10.24425/ijet.2020.135675.
[8] P. Długosz, ”Raport z II etapu badań studentów UP. Opinia na temat zdalnego nauczania i samopoczucia psychicznego.”, 2020.
[9] P. Długosz and G. Foryś, ”Zdalne nauczanie na Uniwersytecie Pedagogicznym im. Komisji Edukacji Narodowej w Krakowie z perspektywy studentów i wykładowców.”, 2020.
[10] L. Mishra, T. Gupta and A. Shree, ”Online teaching-learning in higher education during lockdown period of COVID-19 pandemic.” International Journal of Educational Research Open, 1, 2020, 100012. DOI: 10.1016/j.ijedro.2020.100012
[11] W. Bao, “COVID‐19 and online teaching in higher education: A case study of Peking University.” Human Behavior and Emerging Technologies, 2 (2), 2020, pp. 113-115, DOI: 10.1002/hbe2.191
[12] D. Salto, “COVID-19 and Higher Education in Latin America: Challenges and possibilities in the transition to online education.” eLearn, 2020 (9). DOI: 10.1145/3424971.3421751
[13] J. Crawford, K. Butler-Henderson, J. Rudolph, B. Malkawi, M. Glowatz, R. Burton, P. Magni and S. Lam, ”COVID-19: 20 countries' higher education intra-period digital pedagogy responses.” Journal of Applied Learning & Teaching, 3 (1), 2020, pp. 1-20. DOI: 10.37074/jalt.2020.3.1.7
[14] G. Marinoni, H. Van’t Land and T. Jensen, “The impact of Covid-19 on higher education around the world. IAU Global Survey Report.”, 2020
[15] M.W. Romaniuk and J. Łukasiewicz-Wieleba, ”Crisis Remote Education at The Maria Grzegorzewska University During Social Isolation in the Opinions of Academic Teachers.” International Journal of Electronics and Telecommunications 66 (4), 2020, pp. 801-806, DOI: 10.24425/ijet.2020.135673.
[16] M. W. Romaniuk, “E-learning in College on the Example of Academy of Special Education.” International Journal of Electronics and Telecommunications, 61 (1), 2015, pp. 25-29, DOI: 10.1515/eletel-2015-0003.
[17] C. Sánchez-Cruzado, R. Santiago Campión and M. T. Sánchez-Compaña, ”Teacher Digital Literacy: The Indisputable Challenge after COVID-19.” Sustainability, 13 (4), 2021, 1858. DOI: 10.3390/su13041858
[18] W. Cellary, ”Edukacja w świetle pandemii.” In: Nauczanie po pandemii. Nowe pytania czy nowe odpowiedzi na stare pytania? Warszawa: Instytut Problemów Współczesnej Cywilizacji im. Marka Dietricha LXXII, 2020, pp. 15-23.
[19] M. W. Romaniuk, “Digital Competences of Maria Grzegorzewska Academy of Special Education Students – Method and Results of a Survey.” International Journal of Electronics and Telecommunications, 61 (3), 2015, pp. 267-272, DOI: 10.1515/eletel-2015-0035.
[20] P. Du Preez and L. Le Grange, “The COVID-19 pandemic, online teaching/learning, the digital divide and epistemological access.” In: Re-thinking the Humanities Curriculum in the Time of COVID-19, L. Ramrathan, N. Ndimande-Hlongwa, N. Mkhize, J. A. Smit, Ed. Durban: CSSALL Publishers, 2020, pp. 90-106.
[21] K. Bertol, ”Nihil novi sub sole? Stare pytania. Jakie odpowiedzi?” In: Nauczanie po pandemii. Nowe pytania czy nowe odpowiedzi na stare pytania? Warszawa: Instytut Problemów Współczesnej Cywilizacji im. Marka Dietricha LXXII, 2020, s. 9-13.
[22] F. R. A. Ahmed, T. E. Ahmed, R. A. Saeed, H. Alhumyani, S. Abdel-Khalek, H. Abu-Zinadah, “Analysis and Challenges of Robust E-Exams Performance under COVID-19.” Results in Physics, 2021, 103987.
[23] T. M. Clark, C. S. Callam, N. M. Paul, M. W. Stoltzfus and D. Turner, “Testing in the time of COVID-19: A sudden transition to unproctored online exams.” Journal of Chemical Education, 97 (9), 2020, pp. 3413-3417.
[24] A. Kraśniewski, ”O jakości kształcenia w czasach COVID-19: stare odpowiedzi na nowe pytania?” In: Nauczanie po pandemii. Nowe pytania czy nowe odpowiedzi na stare pytania? Warszawa: Instytut Problemów Współczesnej Cywilizacji im. Marka Dietricha LXXII, 2020, s. 39-50.
[25] C. Rapanta, L. Botturi, P. Goodyear, L. Guàrdia and M. Koole, “Online university teaching during and after the Covid-19 crisis: Refocusing teacher presence and learning activity.” Postdigital Science and Education, 2 (3), 2020, pp. 923-945.
[26] G. Penkowska, “Polski e-learning w opiniach ekspertów (cz. II).” E-mentor, 4 (21), 2007, pp. 39-38.
[27] A. Elzainy, A. El Sadik and W. Al Abdulmonem, ”Experience of e-learning and online assessment during the COVID-19 pandemic at the College of Medicine, Qassim University.” Journal of Taibah University Medical Sciences, 15 (6), 2020, pp. 456-462.
Go to article

Authors and Affiliations

Miłosz Wawrzyniec Romaniuk
1
Joanna Łukasiewicz-Wieleba
1

  1. The Maria Grzegorzewska University, Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

The article presents the results of the questionnaire research carried out after the first and repeated after the second semester of crisis remote education, conducted at The Maria Grzegorzewska University. Students participating in the study indicate a significant increase in their IT competences and the level of remote education. They declare a similar, high level of commitment and independence during classes. They indicate that commitment, activity, contact with the lecturers, regularity and quality of work, as well as the adequacy of the grades given are better during traditional education, although their timeliness is higher during distance education. The computer equipment of students and the way of accessing the Internet have not changed significantly. 20% of respondents admitted to using unauthorized assistance during exams. In the statements of students, on the one hand, there is a desire to return to social contacts and traditional classes, and on the other hand, a desire to maintain remote education, associated with the comfort of home-based learning and independence.
Go to article

Bibliography

[1] M. W. Romaniuk, “Digital Competences of Maria Grzegorzewska Academy of Special Education Students – Method and Results of a Survey.” International Journal of Electronics and Telecommunications, 61 (3), 2015, pp. 267-272, DOI: 10.1515/eletel-2015-0035.
[2] M. Händel, M. Stephan, M. Gläser-Zikuda, B. Kopp, S. Bedenlier and A. Ziegler, “Digital readiness and its effects on higher education students’ socio-emotional perceptions in the context of the COVID-19 pandemic.” 22 July 2020, DOI: 10.31234/osf.io/b9pg7
[3] D. A. Bardzińska, ”Kompetencje informatyczne studentów kierunków pedagogicznych,” in Przygotowanie nauczycieli do nowych wyzwań edukacyjnych. Problemy współczesnej edukacji, J. Bojanowicz, K. Ziębakowska-Cecot, Ed. Radom: Wydawnictwo Uniwersytetu Technologiczno-Humanistycznego w Radomiu, 2018, pp. 33-43
[4] M. W. Romaniuk and J. Łukasiewicz-Wieleba, ”Zdalna edukacja kryzysowa w APS w okresie pandemii COVID-19.” Warszawa, 2020. DOI: 10.13140/RG.2.2.18059.52006.
[5] M. W. Romaniuk and J. Łukasiewicz-Wieleba, ”Crisis Remote Education at The Maria Grzegorzewska University During Social Isolation in the Opinions of Students.” International Journal of Electronics and Telecommunications, 66 (4), 2020, pp. 807-812, DOI: 10.24425/ijet.2020.135675.
[6] M. W. Romaniuk, J. Łukasiewicz-Wieleba and S. Kohut, ”Nauczyciele akademiccy wobec kryzysowej edukacji zdalnej.” E-Mentor, 5 (87), 2020, pp. 15-26, DOI: 10.15219/em87.1489.
[7] M. W. Romaniuk and J. Łukasiewicz-Wieleba, ”Crisis Remote Education at The Maria Grzegorzewska University During Social Isolation in the Opinions of Academic Teachers.” International Journal of Electronics and Telecommunications 66 (4), 2020, pp. 801-806, DOI: 10.24425/ijet.2020.135673.
[8] M. W. Romaniuk, ”E-learning in College on the Example of Academy of Special Education.” International Journal of Electronics and Telecommunications, 61 (1), 2015, pp. 25-29, DOI: 10.1515/eletel-2015-0003.
[9] J. M. Mischke, “Przeszkody, powody i utracone korzyści. E-nauczanie w polskich uczelniach wyższych.” in E-edukacja–analiza dokonań i perspektyw rozwoju, M. Dąbrowski, M. Zając, Ed. Warszawa: Fundacja Promocji i Akredytacji Kierunków Ekonomicznych, 2009, pp. 19-24.
[10] J. Kozłowska, ”E-learning jako forma doskonalenia studentów uczelni wyższych.” Rynek–Społeczeństwo–Kultura, 1, 2017, pp. 41-48.
[11] M. Rebizant, ”Nauczanie hybrydowe jako jedna z form kształcenia w uczelni wyższej w opinii studentów Akademii Pedagogiki Specjalnej,” in Pedagogika dialogu. Emancypacyjny potencjał dialogu, D. M. Jankowska, Ed. Warszawa: Wydawnictwo Akademii Pedagogiki Specjalnej, 2017, pp. 252-265
[12] M. Jabłonowska and J. Wiśniewska, ”Wykorzystanie otwartych zasobów edukacyjnych w kształceniu akademickim,” in: Cyberprzestrzeń-Człowiek-Edukacja. T. 5, Otwarte zasoby edukacyjne w perspektywie pedagogicznej, M. Tanaś, S. Galanciak, Ed. Kraków: Oficyna Wydawnicza Impuls, 2020, pp. 93-108
[13] S. Kuruliszwili, ”Samokształcenie i technologie informacyjne – zmienność form i trudność klasyfikacji,” Edukacja Ustawiczna Dorosłych, vol. 104, nr 1, 2019, pp. 39-50
[14] A. H. Rohayani, “A literature review: readiness factors to measuring e-learning readiness in higher education.” Procedia Computer Science, 59, 2015, pp. 230-234.
[15] A. A. M. Al-Araibi, M. Naz’ri bin Mahrin, R. C. M. Yusoff and S. B. Chuprat, “A model for technological aspect of e-learning readiness in higher education.” Education and Information Technologies, 24 (2), 2019, pp. 1395-1431.
[16] L. Pokrzycka, ”Efektywność e-nauczania w szkolnictwie wyższym. Studia przypadków.” Zarządzanie mediami 7 (1), 2019, pp. 15-27. DOI: 10.4467/23540214ZM.18.019.10571
[17] L. R. Amir, I. Tanti, D. A. Maharani, Y. S. Wimardhani, V. Julia, B. Sulijaya and R. Puspitawati, ”Student perspective of classroom and distance learning during COVID-19 pandemic in the undergraduate dental study program Universitas Indonesia.” BMC medical education, 20(392), 2020, pp. 1-8. DOI: 10.1186/s12909-020-02312-0
[18] R. Kalman, M. Macias Esparza and C. Weston, ”Student Views of the Online Learning Process during the COVID-19 Pandemic: A Comparison of Upper-Level and Entry-Level Undergraduate Perspectives.” Journal of Chemical Education, 97(9), 2020, pp. 3353-3357, DOI: 10.1021/acs.jchemed.0c00712
[19] D. Leżański, B. Marek and J. Sobolewska, ”Kształcenie zdalne. Historia prawdziwa oczami studentów.” 2020, Warszawa
[20] K. Hill and R. Fitzgerald, ”Student perspectives of the impact of COVID-19 on learning.” All Ireland Journal of Higher Education, 12 (2), 2020.
[21] A. Elzainy, A. El Sadik and W. Al Abdulmonem, “Experience of e-learning and online assessment during the COVID-19 pandemic at the College of Medicine, Qassim University.” Journal of Taibah University Medical Sciences, 15(6), 2020, pp. 456–462, DOI: 10.1016/j.jtumed.2020.09.005
[22] M. Trzcińska-Król, “Students with special educational needs in distance learning during the COVID-19 pandemic – parents’ opinions.” Interdisciplinary Contexts of Special Pedagogy, no. 29, 2020, pp. 173–191. DOI: 10.14746/ikps.2020.29.08
[23] J. Wiśniewska and J. Łukasiewicz-Wieleba, Budowanie i wzmacnianie relacji w edukacji zdalnej przez nauczycieli młodszych klas szkoły podstawowej. E-mentor, 1 (88), 2021, pp. 37-46, DOI: 10.15219/em88.1501
[24] A. Thakur, “Mental Health in High School Students at the Time of COVID-19: A Student’s Perspective.” Journal of the American Academy of Child and Adolescent Psychiatry, 59 (12), 2020, pp. 1309-1310, DOI: 10.1016/j.jaac.2020.08.005.
Go to article

Authors and Affiliations

Miłosz Wawrzyniec Romaniuk
1
Joanna Łukasiewicz-Wieleba
1

  1. The Maria Grzegorzewska University, Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

The rapid development of the Internet of Things (IoT) and the wide area of application rise the IoT concept to be the future of the internet. Indeed, IoT environment has a special nature with a lot of constraints in term of resource consumption. Moreover, the data exchanged between things and the internet is big data. In order to achieve efficiency in IoT communication, many technologies and new protocols based on these technologies have been developed. This paper aims to study the performance of Message Queuing Telemetry Transport (MQTT) by implementing this protocol on test-bed network infrastructure and analyzing the performance properties such as delay, jitter, packet loss and throughput for real time and non-real time scenarios. Finally, future research issues in MQTT protocol are suggested.
Go to article

Bibliography

[1] I. T. S. Sector, Recommendation ITU-T Y. 2060, “Overview of the Internet of things. Series Y: Global information infrastructure, internet protocol aspects and next-generation networks-Frameworks and functional architecture models,” 2012. Retrieved from https://www. itu. int/rec/T-REC-Y, 2060-201206.
[2] D. Bandyopadhyay, and J. Sen, “Internet of Things: Applications and Challenges in Technology and Standardization,” Wireless Pers Commun, vol. 58(1), pp. 49-69, 2011. http://dx.doi.org/10.1007/s11277-011-0288-5
[3] MQTT Version 5.0. Edited by Andrew Banks, Ed Briggs, Ken Borgendale, and Rahul Gupta. 07 March 2019. OASIS Standard. https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html.
[4] Postscapes.com, Internet of Things Examples – Postscapes, 2020. Retrieved 20 April 2020, from http://postscapes.com/internet-of-things-examples/
[5] S. Schneider, Understanding The Protocols Behind The Internet Of Things. Electronicdesign.com, 2013. Retrieved 20 April 2020, from http://electronicdesign.com/iot/understanding-protocols-behind-internet-things
[6] C. Karasiewicz, Why HTTP is not enough for the Internet of Things (The Mobile Frontier). Ibm.com, 2013. Retrieved 20 April 2020, from https://www.ibm.com/developerworks/community/blogs/mobileblog/date/201309?lang=en
[7] IoT Analytics - Market Insights for the Internet Of Things, The 10 most popular Internet of Things applications right now, 2015. Retrieved 20 April 2020, from http://iot-analytics.com/10-internet-of-things-applications/
[8] Mqtt.org, FAQ - Frequently Asked Questions | MQTT, 2020. Retrieved 20 April 2020, from http://mqtt.org/faq
[9] U. Hunkeler, H. L. Truong, and A. Stanford-Clark, “MQTT-S—A publish/subscribe protocol for Wireless Sensor Networks,” In 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE'08), Jan. 2008, pp. 791-798, IEEE. https://doi.org/10.1109/COMSWA.2008.4554519
[10] R. Webb, A Brief, but Practical Introduction to the MQTT Protocol and its Application to IoT | Zoetrope, 2016. Retrieved 20 April 2020, from https://zoetrope.io/tech-blog/brief-practical-introduction-mqtt-protocol-and-its-application-iot

Go to article

Authors and Affiliations

Ghofran Hijazi
1
Mohamed Hadi Habaebi
1
Ahmed Al-Haddad
1
Alhareth Mohammed Zyoud
2

  1. Department of Electrical and Computer Engineering, Faculty of Engineering, International Islamic University Malaysia, Kuala Lumpur, Malaysia
  2. Department of Electrical and Computer Engineering, Faculty of Engineering and Technology, Birzeit University, Birzeit, Ramallah, Palestine
Download PDF Download RIS Download Bibtex

Abstract

The article describes methods of user identification using authentication based on the second factor. Known algorithms and protocols for two-factor authentication are considered. An algorithm is proposed using mobile devices as identifiers and generating a temporary password based on the hash function of encryption standards. For an automated control system, a two-factor authentication model and a sequential algorithm for generating a temporary password using functions have been developed. The implementation of the system is based on the Node.js software platform using the JavaScript programming language, as well as frameworks and connected system libraries. MongoDB, an open source database management system for information storage and processing was used.
Go to article

Bibliography

1] D. R. Yuryev and O. S. Rogova, “Comparative analysis of two-factor authentication”, Proc. of Int. Conference Technical sciences - from theory to practice to mater SibAK2017, Novosibirsk, 2017, pp.46–51.
[2] Transfer of Customer Details OAuth, (2019, May) [Online], Available: https://www.ibm.com/ developerworks/ru/library/se-oauthjavapt2/index.html
[3] HMAC: Keyed-Hashing for Message Authentication, (2019, May) [Online], Available: https://tools.ietf.org/ html/rfc2104
[4] N. Moretto. (2019, Aug). Two-factor authentication with TOTP, Available: https://medium.com/@n.moretto/two-factor-authentication-with-totp-ccc5f828b6df
[5] O. Ussatova, S. Nyssanbayeva and W. Wójcik, “Development of an authentication model based on the second factor in an automated control system,” KBTU News, vol. 16, pp. 115–118, 2019.
[6] S. Nysanbayeva, W. Wojcik and O. Ussatova, “Algorithm for generating temporary password based on the two-factor authentication model,” Przegląd Elektrotechniczny 5(R95), pp. 101–106, 2019.
[7] Two-factor authentication, (2019, Aug) [Online]. Available: https://www.infobip.com/ru/glossariy/dvukhfaktornaya-autentifikatsiya (last accessed September 07, 2019 y.).
[8] FIPS 140-2 standard and self-encryption technology. (2018, Sep) [Online]. Available: https://www.seagate.com/files/www-content/solutions-content/security-and-encryption/id/docs/faq-fips-sed-lr- mb-605-2-1302-ru.pdf
[9] National Security Agency. (2018, Jun). [Online]. Available: https://www.cryptomuseum.com/intel/nsa/index.htm
[10] O. Ussatova and S. Nyssanbayeva, “Generators of one-time two-factor authentication passwords,” Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, no. 2(R71), pp. 60–64, 2019.
[11] MongoDB Tutorial. (2019, Sep) [Online]. Available: https://www. tutorialspoint.com/mongodb/index.htm
[12] O. Ussatova, S. Nyssanbayeva and W. Wójcik, “Two-factor authentication algorithm implementation with additional security parameter based on mobile application,”, Proc. on International Conference on Wireless Communication, Network and Multimedia Engineering (WCNME2019), Guilin, 2019, pp. 84–86.
[13] O. Ussatova, S. Nyssanbayeva and W. Wójcik, “Software implementation of two-factor authentication to ensure security when accessing an information system,” News of KazNU im. al-Farabi, 136, pp. 87–95, March 2019.
Go to article

Authors and Affiliations

Olga Ussatova
1 2
Saule Nyssanbayeva
2
Waldemar Wójcik
3

  1. Al-Farabi Kazakh National University, Almaty, Kazakhstan
  2. Institute of Information and Computational Technologies, Almaty, Kazakhstan
  3. Lublin University of Technology, Nadbystrzycka 38a, 20-618 Lublin
Download PDF Download RIS Download Bibtex

Abstract

The article presents the possibilities of using popular MEMS inertial sensors in the object tilt angle estimation system and in the system for stabilizing the vertical position of the balancing robot. Two research models were built to conduct the experiment. The models use microcontroller development board of the STM32F3 series with the Cortex-M4 core, equipped with a three-axis accelerometer, magnetometer and gyroscope. To determine the accuracy of the angle estimation, comparative tests with a pulse encoder were performed.
Go to article

Bibliography

[1] P. Groves, “Principles of GNSS, Inertial, and Multisensor Integrated Navigation Systems”, Norwood, MA: Artech House, 2008.
[2] J. Collin, P. Davidson, M. Kirkko-Jaakkola, H. Leppäkoski “Inertial Sensors and Their Applications” S. Bhattacharyya, E. Deprettere, R. Leupers, J.Takala “Handbook of Signal Processing Systems”. Springer, 2019, pp.51-85. DOI 10.1007/978-3-319-91734-4_2
[3] M. Labowski, P. Kaniewski, P. Serafin, "Inertial Navigation System for Radar Terrain Imaging," Proceedings of IEEE/ION PLANS 2016, Savannah, GA, pp. 942-948, April 2016.
[4] M. Elhoushi, J. Georgy, A. Noureldin and M. J. Korenberg, "A Survey on Approaches of Motion Mode Recognition Using Sensors," in IEEE Transactions on Intelligent Transportation Systems, vol. 18, no. 7, pp. 1662-1686, July 2017, DOI: 10.1109/TITS.2016.2617200.
[5] B. Aguiar, T. Rocha, J. Silva and I. Sousa, "Accelerometer-based fall detection for smartphones," 2014 IEEE International Symposium on Medical Measurements and Applications (MeMeA), Lisboa, 2014, pp. 1-6, DOI: 10.1109/MeMeA.2014.6860110.
[6] J. M. Darmanin et al., "Development of a High-G Shock Sensor Based on MEMS Technology for Mass-Market Applications," 2019 IEEE International Symposium on Inertial Sensors and Systems (INERTIAL), Naples, FL, USA, 2019, pp. 1-4, DOI: 10.1109/ISISS.2019.8739763.
[7] M. Mansoor, I. Haneef, S. Akhtar, M. A. Rafiq, S. Z. Ali and F. Udrea, "SOI CMOS multi-sensors MEMS chip for aerospace applications," SENSORS, 2014 IEEE, Valencia, Spain, 2014, pp. 1204-1207, DOI: 10.1109/ICSENS.2014.6985225.
[8] A. Mikov, A. Panyov, V. Kosyanchuk and I. Prikhodko, "Sensor Fusion For Land Vehicle Localization Using Inertial MEMS and Odometry," 2019 IEEE International Symposium on Inertial Sensors and Systems (INERTIAL), Naples, FL, USA, 2019, pp. 1-2, DOI: 10.1109/ISISS.2019.8739427.
[9] C. Acar, "High-performance 6-Axis MEMS inertial sensor based on Through-Silicon Via technology," 2016 IEEE International Symposium on Inertial Sensors and Systems, Laguna Beach, CA, 2016, pp. 62-65, DOI: 10.1109/ISISS.2016.7435545.
[10] I. P. Prikhodko, B. Bearss, C. Merritt, J. Bergeron and C. Blackmer, "Towards self-navigating cars using MEMS IMU: Challenges and opportunities," 2018 IEEE International Symposium on Inertial Sensors and Systems (INERTIAL), Moltrasio, 2018, pp. 1-4, DOI: 10.1109/ISISS.2018.8358141.
[11] R. E. Kalman, "A New Approach to Linear Filtering and Prediction Problems." ASME. J. Basic Eng. March 1960; vol. 82, no1, pp. 35–45. DOI 10.1115/1.3662552
[12] J. Gajda, R. Sroka, M. Stencel, T. Żegleń, “Data fusion applications in the traffic parameters measurement”, Metrology and Measurement Systems, vol. 2, no. 3, pp. 249–262, 2005.
[13] S.Chudzik, “The idea of using artificial neural network in measurement system with hot probe for testing parameters of heat-insulating materials”, Measurement, vol. 42 pp. 764–770, 2009.
Go to article

Authors and Affiliations

Stanisław Chudzik
1

  1. Czestochowa University of Technology, Czestochowa, Poland
Download PDF Download RIS Download Bibtex

Bibliography

[1] E. Yablonovitch, “Inhibited spontaneous emission in solid-state physics and electronics,” Physical Review Letters, vol. 58, no. 20, p. 2059, 1987.
[2] S. John, “Strong localization of photons in certain disordered dielectric superlattices,” Physical Review Letters, vol. 58, no. 23, p. 2486, 1987.
[3] Y. Pennec, J. O. Vasseur, B. Djafari-Rouhani, L. Dobrzy´nski, and P. A. Deymier, “Two-dimensional phononic crystals: Examples and applications,” Surface Science Reports, vol. 65, no. 8, pp. 229–291, 2010.
[4] R. M. Younis, N. F. Areed, and S. S. Obayya, “Fully integrated and and or optical logic gates,” IEEE Photonics Technology Letters, vol. 26, no. 19, pp. 1900–1903, 2014.
[5] M. Pirzadi, A. Mir, and D. Bodaghi, “Realization of ultra-accurate and compact all-optical photonic crystal or logic gate,” IEEE Photonics Technology Letters, vol. 28, no. 21, pp. 2387–2390, 2016.
[6] E. H. Shaik and N. Rangaswamy, “Phase interference dependent single phc based logic gate structure with t-shaped waveguide as xor, not and or logic gates,” in 2017 Progress in Electromagnetics Research Symposium- Fall (PIERS-FALL). IEEE, 2017, pp. 210–214.
[7] E. Y. Glushko and A. Zakhidov, “Theory of the nonlinear all-optical logical gates based on pbg structures,” in Proceedings of CAOL 2005. Second International Conference on Advanced Optoelectronics and Lasers, 2005., vol. 2. IEEE, 2005, pp. 184–190.
[8] A. Glushko et al., “Nonlinear pbg structures for all-optical signal processing,” in 2006 International Workshop on Laser and Fiber-Optical Networks Modeling. IEEE, 2006, pp. 473–476.
[9] K. Goudarzi, A. Mir, I. Chaharmahali, and D. Goudarzi, “All-optical xor and or logic gates based on line and point defects in 2-d photonic crystal,” Optics & Laser Technology, vol. 78, pp. 139–142, 2016.
[10] S. Mitatha, S. Chaiyasoonthorn, and P. Juleang, “Optical asymmetric key cryptography in rofso for high security using ring resonator system,” in 2019 5th International Conference on Engineering, Applied Sciences and Technology (ICEAST). IEEE, 2019, pp. 1–4.
[11] A. Macker, A. K. Shukla, and V. P. Dubey, “A novel design of all optical and gate based on 2-d photonic crystal,” in 2017 International Conference on Emerging Trends in Computing and Communication Technologies (ICETCCT). IEEE, 2017, pp. 1–3.
[12] M. M. Gupta and S. Medhekar, “All-optical not and and gates using counter propagating beams in nonlinear mach–zehnder interferometer made of photonic crystal waveguides,” Optik, vol. 127, no. 3, pp. 1221– 1228, 2016.
[13] A. Rahmani and M. Asghari, “An ultra-compact and high speed all optical or/nor gate based on nonlinear phcrr,” Optik, vol. 138, pp. 314– 319, 2017.
[14] E. H. Shaik and N. Rangaswamy, “Realization of xnor logic function with all-optical high contrast xor and not gates,” Opto-Electronics Review, vol. 26, no. 1, pp. 63–72, 2018.
[15] G. Joseph and V. Kalyani, “Study of quality factor of silicon based not logic gate using fdtd,” in 2014 International Conference on Computational Intelligence and Communication Networks. IEEE, 2014, pp. 909–912.
[16] E. H. Shaik and N. Rangaswamy, “Investigation on phc based t-shaped waveguide as all-optical xor, not, or and and logic gates,” in 2017 IEEE International Conference on Industrial and Information Systems (ICIIS). IEEE, 2017, pp. 1–6.
[17] K. Bhadel and R. Mehra, “Design and simulation of 2-d photonic crystal based all-optical and logic gate,” in 2014 International Conference on Computational Intelligence and Communication Networks. IEEE, 2014, pp. 973–977.
[18] H. Mondal, S. Chanda, M. Sen, and T. Datta, “All optical and gate based on silicon photonic crystal,” in 2015 International Conference on Microwave and Photonics (ICMAP). IEEE, 2015, pp. 1–2.
[19] M. Pirzadi and A. Mir, “Ultra optimized y-defect waveguide for realizing reliable and robust all-optical logical and gate,” in 2015 23rd Iranian Conference on Electrical Engineering. IEEE, 2015, pp. 1067–1071.
[20] H. Mondal, S. Chanda, and P. Gogoi, “Realization of all-optical logic and gate using dual ring resonator,” in 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT). IEEE, 2016, pp. 553–556.
[21] B. Ghosh, R. R. Pal, and S. Mukhopadhyay, “A new approach to alloptical half-adder by utilizing semiconductor optical amplifier based mzi wavelength converter,” Optik, vol. 122, no. 20, pp. 1804–1807, 2011.
[22] A. Kabilan, X. S. Christina, and P. E. Caroline, “Photonic crystal based all optical or and xo logic gates,” in 2010 Second International conference on Computing, Communication and Networking Technologies. IEEE, 2010, pp. 1–4.
[23] S. Dey, A. K. Shukla, and V. P. Dubey, “Design of all optical logical or gate based on 2-d photonic crystal,” in 2017 International Conference on Emerging Trends in Computing and Communication Technologies (ICETCCT). IEEE, 2017, pp. 1–3.
[24] Y. Wan, M. Yun, L. Xia, and X. Zhao, “13 beam splitter based on self-collimation effect in two-dimensional photonic crystals,” Optik, vol. 122, no. 4, pp. 337–339, 2011.
[25] E. haq Shaik and N. Rangaswamy, “High contrast all-optical xor gate with t-shaped photonic crystal waveguide using phase based interference,” in 2017 Fourteenth International Conference on Wireless and Optical Communications Networks (WOCN). IEEE, 2017, pp. 1–3.
[26] A. Coelho Jr, M. Costa, A. Ferreira, M. Da Silva, M. Lyra, and A. Sombra, “Realization of all-optical logic gates in a triangular triplecore photonic crystal fiber,” Journal of Lightwave Technology, vol. 31, no. 5, pp. 731–739, 2013.
[27] P. Rani, Y. Kalra, and R. Sinha, “Design of all optical logic gates in photonic crystal waveguides,” Optik, vol. 126, no. 9-10, pp. 950–955, 2015.
[28] S. Combri´e, A. Martin, G. Moille, G. Lehoucq, A. De Rossi, J.-P. Reithmaier, L. Bramerie, and M. Gay, “An efficient all-optical gate based on photonic crystals cavities and applications,” in 2014 16th International Conference on Transparent Optical Networks (ICTON). IEEE, 2014, pp. 1–4.
[29] L. E. P. Caballero, J. P. V. Cano, P. S. Guimar˜aes, and O. P. V. Neto, “Effect of structural disorder on photonic crystal logic gates,” IEEE Photonics Journal, vol. 9, no. 5, pp. 1–15, 2017.
[30] P. Rani, Y. Kalra, and R. Sinha, “Realization of and gate in y shaped photonic crystal waveguide,” Optics Communications, vol. 298, pp. 227– 231, 2013.
[31] L. He, W. Zhang, and X. Zhang, “Topological all-optical logic gates based on two-dimensional photonic crystals,” Optics Express, vol. 27, no. 18, pp. 25 841–25 859, 2019.
[32] A. Saharia, N. Mudgal, A. Agarwal, S. Sahu, S. Jain, A. K. Ghunawat, and G. Singh, “A comparative study of various all-optical logic gates,” in Optical and Wireless Technologies. Springer, 2020, pp. 429–437.

Go to article

Authors and Affiliations

Mahesh V. Sonth
1
G. Srikanth
1
Pankaj Agrawal
1
B. Premalatha
2

  1. Department of Electronics and Communication Engineering, CMR Technical Campus, Hyderabad-501401, Telangana, India
  2. Department of Electronics and Communication Engineering, CMR College of Engineering & Technology, Hyderabad-501401,Telangana, India
Download PDF Download RIS Download Bibtex

Abstract

More and more street lighting deployments use LED technology as a light source. Unfortunately, the new technology also brings some challenges with it that remain unnoticed until installed at scale. This article presents issues related to capacitive reactive power consumed by LED luminaires. The problem is even more profound if the luminaire is dimmed, because it consumes capacitive reactive power, which is very undesirable in the power system. Countermeasures in terms of reactive power compensation for a luminaire working with variable power and their effects are also presented. The article also contains the results of the harmonic analysis of the LED luminaires current for full power and dimmed operation.
Go to article

Bibliography

[1] M. Traverso, S. Donatello, H. Moons, R. Rodriguez Quintero, M. Gama Caldas, O. Wolf, P. Van Tichelen, V. Van Hoof and T. Geerken, “Revision of the EU green public procurement criteria for street lighting and traffic signals - preliminary report,” EU - scientific and technical research reports June 2017. DOI: 10.2760/479108.
[2] A. Manolescu and F. Sisak, “LED source, a comparative analysis on lighting efficiency,” 2016 International Conference and Exposition on Electrical and Power Engineering (EPE), Iasi, 2016, pp. 525-528, DOI: 10.1109/ICEPE.2016.7781395.
[3] D. Jenkins and A. Bhargava, “LED Lighting: Maximizing the Reliability, Safety, and Efficiency of Light Fixtures in Hazardous Environments,” in IEEE Industry Applications Magazine, vol. 21, no. 1, pp. 64-67, Jan.-Feb. 2015, DOI: 10.1109/MIAS.2014.2345829.
[4] L.T. Doulos, A. Tsangrassoulis, P.A. Kontaxis, A. Kontadakis and F.V. Topalis, “Harvesting daylight with LED or T5 fluorescent lamps? The role of dimming,” Energy and Buildings, vol. 140. pp. 336-347, April 2017 DOI: 10.1016/j.enbuild.2017.02.013.
[5] G. Gagliardi, M. Lupia, G. Cario, F. Tedesco, F. Cicchello Gaccio, F. Lo Scudo and A. Casavola, “Advanced Adaptive Street Lighting Systems for Smart Cities,” Smart Cities 2020, vol. 3, pp. 1495-1512, November 2020, DOI: 10.3390/smartcities3040071.
[6] B.A. Portnov, R. Saad and T. Trop, “Interactive Scenario-Based Assessment Approach of Urban Street Lighting and Its Application to Estimating Energy Saving Benefits,” Energies 14, no. 2: 378. DOI: 10.3390/en14020378.
[7] Ł. Kosicki and D. Typańska, “Badanie odkształceń prądów i napięć generowanych przez oprawy z diodami LED,” Poznan university of technology academic journals, Electrical Engineering 2017, 92, 215-226.
[8] A. Djuretic, V. Skerovic, N. Arsic and M. Kostic, “Luminous flux to input power ratio, power factor and harmonics when dimming high-pressure sodium and LED luminaires used in road lighting,” Lighting Research & Technology, 2019. 51(2), 304–323. DOI: 10.1177/1477153518777272.
[9] A. Djuretic and M. Kostic, “Actual energy savings when replacing high-pressure sodium with LED luminaires in street lighting,” Energy 2018, vol. 157, pp. 367–378. DOI: 10.1016/j.energy.2018.05.179
[10] T. Lerch, M. Rad and I. Wojnicki, "Selected power quality issues of LED street lighting," 2020 12th International Conference and Exhibition on Electrical Power Quality and Utilisation- (EPQU), Cracow, Poland, 2020, pp. 1-4, DOI: 10.1109/EPQU50182.2020.9220310.
[11] F. A. Karim, M. Ramdhani and E. Kurniawan, "Low pass filter installation for reducing harmonic current emissions from LED lamps based on EMC standard," 2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC), Bandung, 2016, pp. 132-135, DOI: 10.1109/ICCEREC.2016.7814966.
[12] L. S. Czarnecki, "Considerations on the Reactive Power in Nonsinusoidal Situations," in IEEE Transactions on Instrumentation and Measurement, vol. IM-34, no. 3, pp. 399-404, Sept. 1985, DOI: 10.1109/TIM.1985.4315358.
[13] D. Vieira, R. A. Shayani and M. A. G. de Oliveira, "Reactive Power Billing Under Nonsinusoidal Conditions for Low-Voltage Systems," in IEEE Transactions on Instrumentation and Measurement, vol. 66, no. 8, pp. 2004-2011, Aug. 2017, DOI: 10.1109/TIM.2017.2673058.
[14] C.I. Budeanu, “Puissances reactives et fictives,” Instytut Romain de l'Energie, Bucharest, Romania. 1927.
[15] D. Jeltsema, "Budeanu's concept of reactive and distortion power revisited," 2015 International School on Nonsinusoidal Currents and Compensation (ISNCC), Lagow, 2015, pp. 1-6, DOI: 10.1109/ISNCC.2015.7174697.
[16] IEC 61000-3-2 – “Electromagnetic compatibility (EMC) – Part 3-2: Limits – Limits for harmonic current emissions (equipment input current ≤ 16 A per phase),” 2019
[17] R. Nawrowski, Z. Stein and M. Zielińska, “Analiza wpływu przekraczania dopuszczalnych wartości współczynnika mocy w sieci nn na pracę systemu elektroenergetycznego,” Poznan University of Technology Academic Journals, Electrical Engineering 2013, 74, 111-117.
[18] IEEE 519-1992 - IEEE “Recommended Practices and Requirements for Harmonic Control in Electrical Power Systems,” 1993.
[19] S. Ernst, L. Kotulski, T. Lerch, M. Rad, A. Sȩdziwy and I. Wojnicki “Calculating Reactive Power Compensation for Large-Scale Street Lighting”, Computational Science – ICCS 2020. Amsterdam, June 2020, vol 12138. DOI: 10.1007/978-3-030-50417-5_40.
Go to article

Authors and Affiliations

Tomasz Lerch
1
ORCID: ORCID
Michał Rad
1
ORCID: ORCID
Igor Wojnicki
1

  1. AGH University of Science and Technology, Krakow, Poland
Download PDF Download RIS Download Bibtex

Abstract

Assessment of seismic vulnerability of urban infrastructure is an actual problem, since the damage caused by earthquakes is quite significant. Despite the complexity of such tasks, today’s machine learning methods allow the use of “fast” methods for assessing seismic vulnerability. The article proposes a methodology for assessing the characteristics of typical urban objects that affect their seismic resistance; using classification and clustering methods. For the analysis, we use kmeans and hkmeans clustering methods, where the Euclidean distance is used as a measure of proximity. The optimal number of clusters is determined using the Elbow method. A decision-making model on the seismic resistance of an urban object is presented, also the most important variables that have the greatest impact on the seismic resistance of an urban object are identified. The study shows that the results of clustering coincide with expert estimates, and the characteristic of typical urban objects can be determined as a result of data modeling using clustering algorithms.
Go to article

Bibliography

[1] I. Riedel, Ph. Guéguen, M. D. Mura, E. Pathier, T. Leduc, J. Chanussotet, “Seismic vulnerability assessment of urban environments in moderate-to-low seismic hazard regions using association rule learning and support vector machine methods”, Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer, vol. 76, no. 2, March 2015, pp. 1111-1141, DOI: 10.1007/s11069-014-1538-0.
[2] Z. Zhang, T.-Y. Hsu, H.-H. Wei, J.-H. Chen, “Development of a Data-Mining Technique for Regional-Scale Evaluation of Building Seismic Vulnerability,” Applied Sciences, vol. 9, no. 7, April 2019, p. 1502, DOI: 10.3390/app9071502.
[3] C. S. Chen, M. Y. Cheng, Y. W. Wu, “Seismic assessment of school buildings in Taiwan using the evolutionary support vector machine inference system,” Expert Systems with Applications, vol. 39, no. 4, March 2012, pp. 4102-4110, DOI: 10.1016/j.eswa.2011.09.078.
[4] H. M. Chen, W. K. Kao, H. C. Tsai, “Genetic programming for predicting aseismic abilities of school buildings,” Engineering Applications of Artificial Intelligence, vol. 25, no. 6, Sep. 2012, pp. 1103-1113, DOI: 10.1016/j.engappai.2012.04.002
[5] W. K. Kao, H. M. Chen, J. S. Chou, “Aseismic ability estimation of school building using predictive data mining models,” Expert Systems with Applications, vol. 38, Aug. 2011, pp. 10252-10263, DOI: 10.1016/j.eswa.2011.02.059.
[6] Y. Liu, Z. Li, B. Wei, Xiaoli li, “Seismic vulnerability assessment at urban scale using data mining and GIScience technology: application to Urumqi (China),” Geomatics, Natural Hazards and Risk, vol. 10, no. 1, Jan. 2019, pp. 958-985, DOI: 10.1080/19475705.2018.1524400.
[7] X. Shang, Xibing Li, A. Morales-Esteban, G. A. Cortés, “Data field-based K-means clustering for spatio-temporal seismicity analysis and hazard assessment”, Remote Sensing, vol. 10, no. 3, March 2018, p. 461, DOI:10.3390/rs10030461.
[8] J. Ortega, G. Vasconcelos, H. Rodrigues, M. Correia, “Development of a Numerical Tool for the Seismic Vulnerability Assessment of Vernacular Architecture”, Journal of Earthquake Engineering, pp. 1-29, Sep. 2019, DOI: 10.1080/13632469.2019.1657987.
[9] G. Brando, G. De Matteis, E. Spacone, “Predictive model for the seismic vulnerability assessment of small historic centres: application to the inner Abruzzi Region in Italy”, Engineering Structures, vol. 153, Dec. 2017, pp. 81-96, DOI: 10.1016/j.engstruct.2017.10.013.
[10] C. Drago, R. Ferlito, M. Zucconiс, “Clustering of damage variables for masonry buildings measured after L’Aquila earthquake,” Sep. 2015.
[11] E. Irwansyah, Е. Winarko, “Spatial data clustering and zonation of earthquake building damage hazard area,” The European Physical Journal Conferences, 68. Feb. 2014. DOI: 10.1051/epjconf/20146800005.
[12] A. Guettiche, Ph. Gueguen, “Seismic vulnerability assessment using association rule learning: application to the city of Constantine, Algeria,” Natural Hazards, vol. 86 no. 3, Jan. 2017. doi: 10.1007/s11069-016-2739-5.
[13] I. Riedel, P. Gueguen, F. Dunand, S.Cottaz, “Macroscale vulnerability assessment of cities using association rule learning,” Seismol Res Lett, vol. 85, no. 2, pp. 295–305, 2014.
[14] D. P. Sari, D. Rosadi, A. R. Effendie, D. Danardono, “Application of Bayesian network model in determining the risk of building damage caused by earthquakes,” in 2018 International Conference on Information and Communications Technology, January 2018, pp. 131-135.
[15] D. P. Sari, D. Rosadi, A. R. Effendie, D. Danardono, “K-means and bayesian networks to determine building damage levels,” Computer Science, vol. 17, no. 2, pp. 719–727, April 2019. DOI: 10.12928/telkomnika.v17i2.11756.
[16] R. Zhang, Zh. Chen, S. Chen, J. Zheng, O. Büyüköztürk, H. Sun, “Deep long short-term memory networks for nonlinear structural seismic response prediction,” Computers & Structures, pp. 55-68, Aug. 2019.
[17] V. N. Kasyanov, V. A. Evstigneev, “Graphs in programming: processing, visualization and application,” SPb.: BHV-Petersburg, 2003.
[18] P. J. Tan, D. L. Dowe, “MML inference of decision graph with milti-way and dynamic attributes,” http://www.csse.monash.edu.au/~dld/ Publications/2003/Tan+Dowe2003_MMLDecisionGraphs.pdf.
[19] L. Breiman, “Random forests,” Machine Learning, vol. 45, no. 1, pp. 5-32, 2001.
[20] T. Hastie, R. Tibshirani, J. Friedman, “Chapter 15. Random Forests,” in The Elements of Statistical Learning: Data Mining, Inference, and Prediction, Springer-Verlag, 2009.
[21] M. Pal, “Random forest classifier for remote sensing classification,” International Journal of Remote Sensing, vol. 26, no. 1, pp. 217–222, 2015.
[22] M. Karmenova, A. Nugumanova, A. Tlebaldinova. “Klasternyy analiz dannykh v reshenii zadach po otsenke seysmicheskoy uyazvimosti ob’yektov gorodskoy sredy,” Scientific and technical journal «Vestnik AUES», vol. 1, no. 48, 2020.
[23] M. Karmenova, A. Nugumanova, A. Tlebaldinova, A. Beldeubaev, G. Popova, A. Sedchenko, “Seismic assessment of urban buildings using data mining methods,” ICCTA’20, April 2020, pp 154–159. DOI: 10.1145/3397125.3397152.
[24] L. Breiman, R. Friedman, R. Olshen, C. Stone. “Classification and Regression Trees,” Belmont, California: Wadsworth International, 1984.
[25] J. R. Quinlan, “Simplifying decision trees,” International Journal of ManMachine Studies, vol. 27, pp. 221–234, 1987.
[26] C. P. Chistyakov, “Random forests: an overview,” Proceedings of the Karelian scientific center of the Russian Academy of Sciences, no. 1, pp. 117-136, 2013.
[27] V.F. Rodriguez-Galiano, B. Ghimire, J. Rogan, M. Chica-Olmo, J. P. Rigol-Sanchez, “An assessment of the effectiveness of a random forest classifier for land-cover classification,” ISPRS Journal of Photogrammetry and Remote Sensing, vol. 67, pp. 93-104, Jan 2012.
[28] R. Dzierżak, “Comparison of the influence of standardization and normalization of data on the effectiveness of spongy tissue texture classification,” Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, vol. 9, no. 3, pp. 66-69, Mar. 2019. https://doi.org/10.35784/iapgos.62
[29] Otchet po vyborochnomu obsledovaniyu zdaniy v ramkakh «Issledovaniya po upravleniyu riskami, svyazannymi s seysmicheskimi bedstviyami v gorode Almaty, Respublika Kazakhstan», Almaty, Feb. 2008. https://openjicareport.jica.go.jp/pdf/11961802_02.pdf.

Go to article

Authors and Affiliations

Waldemar Wójcik
1
Markhaba Karmenova
2
Saule Smailova
2
Aizhan Tlebaldinova
3
Alisher Belbeubaev
4

  1. Lublin Technical University, Poland
  2. D. Serikbayev East Kazakhstan State Technical University, Kazakhstan
  3. S. Amanzholov East Kazakhstan State University, Kazakhstan
  4. Cukurova University, Turkey
Download PDF Download RIS Download Bibtex

Abstract

Cyber-attacks are increasing day by day. The generation of data by the population of the world is immensely escalated. The advancements in technology, are intern leading to more chances of vulnerabilities to individual’s personal data. Across the world it became a very big challenge to bring down the threats to data security. These threats are not only targeting the user data and also destroying the whole network infrastructure in the local or global level, the attacks could be hardware or software. Central objective of this paper is to design an intrusion detection system using ensemble learning specifically Decision Trees with distinctive feature selection univariate ANOVA-F test. Decision Trees has been the most popular among ensemble learning methods and it also outperforms among the other classification algorithm in various aspects. With the essence of different feature selection techniques, the performance found to be increased more, and the detection outcome will be less prone to false classification. Analysis of Variance (ANOVA) with F-statistics computations could be a reasonable criterion to choose distinctives features in the given network traffic data. The mentioned technique is applied and tested on NSL KDD network dataset. Various performance measures like accuracy, precision, F-score and Cross Validation curve have drawn to justify the ability of the method.
Go to article

Bibliography

[1] Ektefa, M. Mohammadreza, S. Sara and A. Fatimah, “Intrusion detection using data mining techniques,” 200 - 203. DOI: 10.1109/INFRKM.2010.5466919.
[2] Y. Wang, W. Cai and P. Wei, “A Deep Learning Approach For Detecting Malicious Javascript Code,” Wiley Online Library . February 2016.
[3] C. Yin , Y. Zhu, J. Fei and H. Xinzheng, “A Deep Learning Approach For Intrusion Detection Using Recurrent Neural Networks,” IEEE Access. November 7, 2017.
[4] Q. Niyaz, W. Sun, Y Javaid and A. Mansoor, “A Deep Learning Approach For Network Intrusion Detection system,” In Eai Endorsed Transactions on Security and Safety, Vol. 16, Issue 9, 2016.
[5] M. Preeti, V. Vijay, T. Uday and S. P. Emmanuel, “A Detailed Investigation And Analysis Of Using Machine Learning Techniques For Intrusion Detection,” IEEE Communications Surveys & Tutorials, Volume: 21, Issue:1, First quarter 2019.
[6] Y. Li, M. Rong And R. Jiao, “A Hybrid Malicious Code Detection Method Based On Deep Learning,” International Journal of Software Engineering and Its Applications 9(5):205-216, May 2015.
[7] Gulshan and Krishan, “A Multi-Objective Genetic Algorithm Based Approach For Effective Intrusion Detection Using Neural Networks,” Springer. 2015.
[8] K. Levent and D. C. Alan, “Network Intrusion Detection Using A Hidden Naïve Bayes Binary Classifier,” 2015 17th Uksim-Amss International Conference on Modelling and Simulation (Uksim).
[9] A. Nadjaran, K. Mohsen, “A New Approach To Intrusion Detection Based On An Evolutionary Soft Computing Model Using Neuro-Fuzzy Classifiers,” July 2007, Computer Communications 30(10):2201-2212.
[10] D. Amin and R Mahmood, “Feature Selection Based On Genetic Algorithm And Support Vector Machine For Intrusion Detection System,” The Second International Conference On Informatics Engineering & Information Science (Icieis2013).
[11] A. Preeti and S. Sudhir, “Analysis of KDD Dataset Attributes - Class wise for Intrusion Detection,” Procedia Computer Science, Volume 57, 2015, 842-851,
[12] D. M. Doan, D. H. Jeong and S. Ji, “Designing a Feature Selection Technique for Analyzing Mixed Data,” 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2020, pp. 0046-0052, doi: 10.1109/CCWC47524.2020.9031193.
[13] Campbell and Zachary, “Differentially Private ANOVA Testing,” 2018 1st International Conference on Data Intelligence and Security (ICDIS) (2018): 281-285.
[14] S. K. Murthy, “Automatic Construction of Decision Trees from Data: A Multi-Disciplinary Survey. Data Mining and Knowledge Discovery 2, 345–389 (1998).
[15] S. Dhaliwal, A. Nahid and R. Abbas, “Effective Intrusion Detection System Using XGBoost. Information 2018, 9, 149.
[16] Pedregosa et al., “Scikit-learn: Machine Learning in Python,” JMLR 12, pp. 2825-2830, 2011.

Go to article

Authors and Affiliations

Shaikh Shakeela
1
N. Sai Shankar
1
P Mohan Reddy
1
T. Kavya Tulasi
1
M. Mahesh Koneru
1

  1. ECM, Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP, India
Download PDF Download RIS Download Bibtex

Abstract

In the article, three types of proximity sensors that might be used in bicycle rangefinder to measure the distance between the bicycle and an overtaking car are compared. The influence of various factors on the accuracy of the distance measurements obtained using ultrasonic, infrared and laser sensors is tested, among others, light conditions, car surface type and colour, rain, pollination and vibrations.
Go to article

Bibliography

[1] M. De Angelis, V.M. Puchades, F. Fraboni, L. Pietrantoni, and G. Prati, “Negative attitudes towards cyclists influence the acceptance of an in-vehicle cyclist detection system,” Transportation Research Part F: Traffic Psychology and Behaviour, vol. 49, pp. 244–256, Aug. 2017. DOI: https://doi.org/10.1016/j.trf.2017.06.021
[2] E. Robartes, and T. D. Chen, “Crash histories, safety perceptions, and attitudes among Virginia bicyclists.” Journal of Safety Research, vol. 67, pp. 189–196, Dec. 2018. DOI: https://doi.org/10.1016/j.jsr.2018.10.009
[3] I. Walker, I. Garrard, and F. Jowitt, “The influence of a bicycle commuter's appearance on drivers’ overtaking proximities: An on-road test of bicyclist stereotypes, high-visibility clothing and safety aids in the United Kingdom,” Accident Analysis & Prevention, vol. 64, pp. 69–77, Mar. 2014. DOI: https://doi.org/10.1016/j.aap.2013.11.007
[4] B. Beck, D. Chong, J. Olivier, M. Perkins, A. Tsay, A. Rushford, L. Li, P. Cameron, R. Fry, and M. Johnson, “How much space do drivers provide when passing cyclists? Understanding the impact of motor vehicle and infrastructure characteristics on passing distance,” Accident Analysis & Prevention, vol. 128, pp. 253–260, Jul. 2019. DOI: https://doi.org/10.1016/j.aap.2019.03.007
[5] M. O'Reilly, “The device that measures cyclist passing distances,” http://www.executivestyle.com.au/the-device-that-measures-cyclist-passing-distances-gpehki (accessed on 8 July 2020).
[6] M. Dozza, R. Schindler, G. Bianchi-Piccinini, and J. Karlsson, “How do drivers overtake cyclists?” Accident Analysis & Prevention, vol. 88, pp. 29-36, Mar. 2016. DOI: https://doi.org/10.1016/j.aap.2015.12.008
[7] C3FT v1 | Codaxus LLC: http://codaxus.com/c3ft/c3ft-v1/ (accessed on 8 July 2020).
[8] C3FT v2 | Codaxus LLC: http://codaxus.com/c3ft/c3ft-v2/ (accessed on 8 July 2020).
[9] C3FT v3 | Codaxus LLC. http://codaxus.com/c3ft/c3ft-v3/ (accessed on 8 July 2020).
[10] A. K. Debnath, N. Haworth, A. Schramm, K. C.Heesch, and K. Somoray, “Factors influencing noncompliance with bicycle passing distance laws,”, Accident Analysis & Prevention, vol. 115, pp. 137-142, Jun. 2018. DOI: https://doi.org/10.1016/j.aap.2018.03.016
[11] J. Coburn, “Distance Sensor.” In: Build Your Own Car Dashboard with a Raspberry Pi. Apress, Berkeley, CA (2020). DOI: https://doi.org/10.1007/978-1-4842-6080-7_13
[12] Heckathorn, B.; MacPherson, T.; Schumacher, T., “ Distance Sensors,” http://www.eecs.umich.edu/courses/eecs270/270lab/270_docs/Distance%20Sensor%20Presentation.pdf (accessed on 8 July 2020).
[13] B.G. Pavithra, P. Siva Subba Rao, A. Sharmila, S. Raja, and S.J.Sushma, “Characteristics of different sensors used for Distance Measurement,” International Research Journal of Engineering and Technology (IRJET), vol. 4, pp. 698-702, Dec. 2017.
[14] S. Adarsh, S. Mohamed Kaleemuddin, B. Dinesh, and K.I. Ramachandran, “Performance comparison of Infrared and Ultrasonic sensors for obstacles of different materials in vehicle/ robot navigation applications,” Proc. IOP Conf. Series: Materials Science and Engineering, 149, 2016. DOI: 10.1088/1757-899X/149/1/012141
[15] J. Majchrzak, M. Michalski, and G. Wilczyński, “Distance Estimation With a Long-Range Ultrasonic Sensor System,” IEEE Sensors Journal, vol. 9, pp. 767–773, 2009.
[16] T. Mohammad, “Using Ultrasonic and Infrared Sensors for Distance Measurement,” International Journal of Mechanical and Mechatronics Engineering, vol. 3, no. 3, pp. 273-278, 2009.
[17] S. Rzydzik, A. Saltarski, M. Roziński, and K Psiuk, “Infrared Distance Sensors for Autonomous Model of Truck with Semi-trailer,” 2020 6th International Conference on Mechatronics and Robotics Engineering (ICMRE), Barcelona, Spain, 2020, pp. 104-109 (2020). DOI: 10.1109/ICMRE49073.2020.9065091
[18] W. Xu, C. Yan, W. Jia, X, Ji, and J. Liu, “Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles,” IEEE Internet of Things Journal, vol. 5, no. 6, pp. 5015–5029, Dec. 2018. DOI: 10.1109/JIOT.2018.2867917.
[19] R. Burnett, Ultrasonic vs Infrared (IR) Sensors – Which is better? https://www.maxbotix.com/articles/ultrasonic-or-infrared-sensors.htm (accessed on 8 July 2020).
[20] Distance Sensor Comparison Guide. https://www.sparkfun.com/distance_sensor_comparison_guide (accessed on 8 July 2020).
[21] HC-SR04 (ultrasound) vs Sharp GP2Y0A02YK0F (IR) vs VL53L0X (Laser), which solution to choose for distance measurement with Arduino or Raspberry Pi. https://diyprojects.io/hc-sr04-ultrasound-vs-sharp-gp2y0a02yk0f-ir-vl53l0x-laser-solutions-choose-distance-measurement-arduino-raspberrypi/#.XSWSkBLTAsc (accessed on 8 July 2020).
[22] https://diyprojects.io/proximity-sensor-a02yk0-test-calibration-sharp-gp2y0a02yk0f-asian-clone/#.XSMH7xLTAsc (accessed on 8 July 2020).
[23] Product User’s Manual – HC-SR04 Ultrasonic Sensor. Cytron Technologies, 2013. GP2Y0A02YK0F. Sharp Corporations, 2006
[24] A. Szydło, A device that measures the distance between a bicycle and a car. Master thesis written under supervision of Bartłomiej Zieliński, Silesian University of Technology, Institute of Computer Science, Gliwice 2017 [in Polish].
Go to article

Authors and Affiliations

Bartłomiej Zieliński
1

  1. Silesian University of Technology, Poland
Download PDF Download RIS Download Bibtex

Abstract

The wide variety of electrode shapes and their arrangement relative to each other, as well as the possibility of corona discharge in the ambient air, have created prerequisites for the development of a number of new methods and corona discharge transducers designed to measure microwire parameters and linear dimensions of various objects. The principally new noncontact control method is based on the dependence of the corona discharge current value on the diameter of the corona wire placed inside the discharge chamber. This paper provides an overview of this method.
Go to article

Bibliography

[1] Sh.A.Bahtaev, A.A.Bokanova, G.V.Bochkareva, G.K.Sydykova. Fizika i tehnika koronnorazrjadnyh priborov. Almaty 2007.
[2] Sh.A.Bahtaev, G.K.Sydykova, A.Zh. Tojgozhinova, K.Kodzhabergenova. Koronnyj razrjad na mikrojelektrodah. Almaty 2017 – 78p.
[3] Sh.A.Bakhtaev, G.V Bochkareva., G.D.Musapirova, “The pulsed current mode of the negative corona,” Vestnik Kaz NTU, no. 3, pp. 212-217, 2010.
[4] T. Abiru, F. Mitsugi, T. Ikegami, K. Ebihara, S.-ichi Aoqui, K. Nagahama, “Environmental application of electrical discharge for ozone treatment of soil,” Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, vol. 5, no. 4, pp. 42-44, 2015, https://doi.org/10.5604 /20830157.1176573.
[5] Z. Lv, S. Rowland, S.Chen, H. Zheng, K.Wu, “Modelling of partial discharge characteristics in electrical tree channels: Estimating the PD inception and extinction voltages,” IEEE Transactions on Dielectrics and Electrical Insulation, no. 25, pp. 1999-2010, 2018. doi: 10.1109/TDEI.2018.007175.
[6] M. Szadkowski, “New method of analysis of partial discharges,” Przegląd Elektrotechniczny, vol. 90 no. 3, 103-106, 2014. doi: 10.12915/pe.2014.03.21
[7] Sh.A. Bahtaev, G.V.Bochkarjova, G.I. Bokova, “Sposob kontrolja diametra mikroprovoloki,” Republic of Kazakhstan Patent no. 5070, Ofic.bjull., Prom.sobstv., no. 10, 1998.
[8] Sh.A.Bahtaev, G.D. Musapirova et al., “Ustrojstvo dlja izmerenija diametra mikroprovoloki,” Republic of Kazakhstan Patent no. 96543, Ofic.bjull., Prom.sobstv., no. 2, 30.01.2017.
[9] Predpatent RK №12038.Sposob izmerenija skorosti protjazhki mikroprovoloki // Bahtaev Sh.A. i dr.Opubl. Bjull.№9, 16.09.2002.
[10] G.V.Bochkareva, G.D.Musapirova, “The frequency characteristics of the differential conductivity of the corona in the high-frequency region,” in proc. The main problems of modern science: international materials. scientific-practical conf. - Bulgaria, pp. 92-94, 2010.
[11] Sh.A.Bakhtaev, G.V.Bochkareva, G.D. Musapirova, “Areas of existence of anomalies in the high-frequency conductivity of the positive corona,” Tomsk State University Journal. AIPP no. 2, pp. 18-23, 2010.

Go to article

Authors and Affiliations

Aliya S. Tergeussizova
1
Shabden A. Bakhtaev
2
Waldemar Wójcik
3
Bekmurza H. Aitchanov
4
Gulzada D. Mussapirova
2
Aynur Zh. Toygozhinova
5

  1. Kazakh National University named after al-Farabi, Almaty, Kazakhstan
  2. Almaty University of Power Engineering and Telecommunications, Almaty, Kazakhstan
  3. Lublin University of Technology, Lublin
  4. Suleyman Demirel University, Almaty, Kazakhstan
  5. Kazakh Academy of Transport and Communications named after M.Tynyshpayev, Almaty, Kazakhstan
Download PDF Download RIS Download Bibtex

Abstract

The clock synchronization is considered as a key technology in the time-sensitive networking (TSN) of 5G fronthaul. This paper proposes a clock synchronization enhancement method to optimize the link delays, in order to improve synchronization accuracy. First, all the synchronization dates are filtered twice to get the good calculation results in the processor, and then FPGA adjust the timer on the slave side to complete clock synchronization. This method is implemented by Xilinx Zynq UltraScale+ MPSoC (multiprocessor system-on-chip), using FPGA+ARM software and hardware co-design platform. The master and slave output Pulse Per-Second signals (PPS). The synchronization accuracy was evaluated by measuring the time offset between PPS signals. Contraposing the TSN, this paper compares the performance of the proposed scheme with some previous methods to show the efficacy of the proposed work. The results show that the slave clock of proposed method is synchronized with the master clock, leading to better robustness and significant improvement in accuracy, with time offset within the range of 40 nanoseconds. This method can be applied to the time synchronization of the 5G open fronthaul network and meets some special service needs in 5G communication.
Go to article

Bibliography

1] M. Dong, Z. Qiu, W. Pan, C. Chen, J. Zhang and D. Zhang, "The Design and Implementation of IEEE 1588v2 Clock Synchronization System by Generating Hardware Timestamps in MAC Layer," 2018 International Conference on Computer, Information and Telecommunication Systems (CITS), Colmar, 2018, pp. 1-5.
[2] Chavan A., Nagurvalli S., Jain M., Chaudhari S. (2018) Implementation of FPGA-Based Network Synchronization Using IEEE 1588 Precision Time Protocol (PTP). In: Sa P., Bakshi S., Hatzilygeroudis I., Sahoo M. (eds) Recent Findings in Intelligent Computing Techniques. Advances in Intelligent Systems and Computing, vol 708. Springer, Singapore.
[3] R. Exel, T. Bigler and T. Sauter, "Asymmetry Mitigation in IEEE 802.3 Ethernet for High-Accuracy Clock Syn chronization," in IEEE Transactions on Instrumentation and Measurement, vol. 63, no. 3, pp. 729- 736, March 2014.
[4] W. Tseng, S. Siu, S. Lin and C. Liao, "Precise UTC dissemination through future telecom synchronization networks," 2015 Joint Conference of the IEEE International Frequency Control Symposium & the European Frequency and Time Forum, Denver, CO, 2015, pp. 696-699.
[5] O. Ronen and M. Lipinski, "Enhanced synchronization accuracy in IEEE1588," 2015 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS), Beijing, 2015, pp. 76-81.
[6] IEEE Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Sys tems," in IEEE Std 1588-2008 (Revision of IEEE Std 1588-2002) , vol., no., pp.1-300, 24 July 2008.
[7] Eleftherios Kyriakakis, Jens Sparsø, and Martin Schoeberl. 2018. Hardware Assisted Clock Synchronization with the IEEE 1588-2008 Precision Time Protocol. In Proceedings of the 26th International Conference on Real-Time Networks and Systems (RTNS ’18). Association for Computing Machinery, New York, NY, USA, 51–60.
[8] W.Jinqi, C.Hong, "Implementation of IEEE1588 Precision Clock Synchronization Protocol Based on ARM",2019,42(06):1527-1531.
[9] G. Giorgi and C. Narduzzi, "Performance Analysis of Kalman-Filter- Based Clock Synchronization in IEEE 1588 Networks," in IEEE Transactions on Instrumentation and Measurement, vol. 60, no. 8, pp. 2902-2909, Aug. 2011.
[10] Lee S. An enhanced IEEE 1588 time synchronization algorithm for asymmetric communication link using block burst transmission[J]. IEEE communications letters, 2008, 12(9): 687-689.
[11] Chen, W., Sun, J., Zhang, L. et al. An implementation of IEEE 1588 protocol for IEEE 802.11 WLAN. Wireless Netw 21, 2069–2085 (2015).
[12] P. A. Crossley, H. Guo and Z. Ma, "Time synchronization for transmission substations using GPS and IEEE 1588," in CSEE Journal of Power and Energy Systems, vol. 2, no. 3, pp. 91-99, Sept. 2016.
[13] H. Guo and P. Crossley, "Design of a Time Synchronization System Based on GPS and IEEE 1588 for Transmission Substa tions," in IEEE Transactions on Power Delivery, vol. 32, no. 4, pp. 2091-2100, Aug. 2017.
[14] O. Seijo, I. Val, J. A. Lopez-Fernandez and M. Velez, "IEEE 1588 Clock Synchronization Performance over Time-Varying Wireless Channels," 2018 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS), Geneva, 2018, pp. 1-6.
[15] S. Lee and C. Hong, "An Accuracy Enhanced IEEE 1588 Synchronization Protocol for Dynamically Changing and Asymmetric Wireless Links," IEEE Communications Letters, vol. 16, no. 2, pp. 190-192, February 2012.
[16] The Linux PTP Project. [Online]. Available: http://linuxptp.sourceforge.net/, accessed Dec. 2015.
[17] N. Moreira, J. Lázaro, U. Bidarte, J. Jimenez, and A.Astarloa, "On the Utilization of System-on-Chip Platformsto Achieve Nanosecond Synchronization Accuracies in Substation Automation Systems."
Go to article

Authors and Affiliations

Xiaohan Wei
1
Xingzhong Wei
1
Zhongqiang Luo
1
Jianwu Wang
1
Kaixing Cheng
1

  1. School of Automation and Information Engineering and Artificial Intelligence Key Laboratory of Sichuan Province, Sichuan University of Science and Engineering, Yibin, China
Download PDF Download RIS Download Bibtex

Abstract

In the paper, an overview of the methods and algorithms of synthesis, realization and implementation used by the author to obtain orthogonal 3-D filters with a structure made of Givens rotations has been presented. The main advantage of orthogonal filters, which may have a lower sensitivity to quantization of the coefficients, was indicated. The author proposed a number of possible changes and modifications of individual stages, which may result in obtaining filters with even better parameters. The work will be the basis for the direction of further research.
Go to article

Bibliography

[1] P.P. Vaidyanathan, „Multirate Systems And Filter Banks”, Prentice-Hall, Englewood Cliffs, New Jersey, 1993. ISBN: 81-7758-942-3
[2] V. C. Liu, P. P. Vaidyanathan, „ Roundoff noise generated by orthogonal building blocks in signal processing structures”, IEEE International Symposium on Circuits and Systems, Finland, 1988, pp. 2731-2734. DOI: 10.1109/ISCAS.1988.15504
[3] E. Deprettere, „Synthesis and fixed-point implementation of pipelined true orthogonal filters”, ICASSP '83. IEEE International Conference on Acoustics, Speech, and Signal Processing, 1983, pp. 217-220. DOI: 10.1109/ICASSP.1983.1172177
[4] A. Fettweis, „Digital filter structures related to classical filter networks”, AEÜ, vol. 25, no. 2, 1971, pp. 79-89.
[5] E. Deprettere, „Synthesis and fixed-point implementation of pipelined true orthogonal filters”, ICASSP '83. IEEE International Conference on Acoustics, Speech, and Signal Processing, 1983, pp. 217-220. DOI: 10.1109/ICASSP.1983.1172177
[6] R. Wirski, K. Wawryn, „Stanowa synteza systemów bezstratnych o skończonej odpowiedzi impulsowej”, Przegląd Elektrotechniczny, vol. 86(11a), 2010, str. 218-221.
[7] R.T.Wirski, „Synthesis of 2-D state-space equations for orthogonal separable denominator systems”, International Conference on Signals and Electronic Systems (ICSES), Gliwice 2010, pp. 285-288.
[8] R.T.Wirski, „On the realization of 2-D orthogonal state-space systems”, Signal Processing, vol. 88, no. 11, 2008, pp. 2747-2753. DOI: 10.1016/j.sigpro.2008.05.018
[9] R. Wirski, K. Wawryn, „State space synthesis of two-dimensional FIR lossless filters”, International Conference on Signals and Electronic Systems (ICSES), Krakow 2008, pp. 367-370. DOI:   10.1109/ICSES.2008.4673438
[10] R.T. Wirski, „Synthesis of orthogonal Roesser model for two-dimensional FIR filters”, International Symposium on Information Theory and its Applications (ISITA), Taichung Taiwan 2010. DOI: 10.1109/ISITA.2010.5649701
[11] R.Wirski, K.Wawryn, B. Strzeszewski, „State-space approach to implementation of FIR systems using pipeline rotation structures”, International Conference on Signals and Electronic Systems (ICSES), Wroclaw 2012. DOI: 10.1109/ICSES.2012.6382223
[12] K.Wawryn, R.Wirski, B. Strzeszewski, „Implementation of finite impulse response systems using rotation structures”, International Symposium on Information Theory and Its Applications (ISITA), Taichung Taiwan 2010, pp. 606-610. DOI: 10.1109/ISITA.2010.5649712
[13] R. T. Wirski, B. Strzeszewski, K. Wawryn, „Orthogonal implementation of two-dimensional separable denominator systems”, International Conference on Signals and Electronic Circuits (ICSES), Gliwice 2010, pp. 371-374.
[14] P. Poczekajło, R. Wirski, „Synteza separowalnych trójwymiarowych filtrów ortogonalnych o strukturze potokowej”, Przegląd Elektrotechniczny, vol. 89(10), 2013, str. 150-152. DOI: 10.15199/48.2016.09.02
[15] P. Poczekajło, R. Wirski, „Synthesis and Realization of 3-D Orthogonal FIR Filters Using Pipeline Structures”, Circuits Systems and Signal Processing, vol. 37, no. 4, 2018 (online 2017), pp. 1669-1691. DOI: 10.1007/s00034-017-06
[16] P. Poczekajło, K. Wawryn, „Algorithm for Realisation, Parameter Analysis, and Measurement of Pipelined Separable 3D Finite Impulse Response Filters Composed of Givens Rotation Structures”, IET Signal Processing, vol. 12, iss. 7, 2018, pp. 857-867. DOI: 10.1049/iet spr.2017.0450
[17] K. Wawryn, P. Poczekajlo, R. Wirski, „FPGA implementation of 3-D separable Gauss filter using pipeline rotation structures”, 22nd International Conference on Mixed Design of Integrated Circuits Systems (MIXDES), Torun 2015, pp. 589-594. DOI: 10.1109/MIXDES.2015.7208592
[18] P. Poczekajlo, K. Wawryn, „Hardware implementation of 3D pipelined laplace filter based on rotation structures”, 24th International Conference on Mixed Design of Integrated Circuits Systems (MIXDES), Bydgoszcz 2017, pp. 276-280. DOI: 10.23919/MIXDES.2017.8005215
[19] P. Poczekajło, „Analiza wybranych metod realizacji sprzętowej rotatorów Givensa w układzie FPGA”, Przegląd Elektrotechniczny, vol. 94(9), 2018, str. 26-28. DOI: 10.15199/48.2018.09.06
[20] R. P. Roesser, „A discrete state-space model for linear image processing”, IEEE Trans. Automat. Contr., vol. 20, no. 1, Feb. 1975, pp. 1–10.
[21] R. Suszyński, K. Wawryn, R. Wirski, „2D signal processing for identification and tracking moving object”, Przegląd Elektrotechniczny, vol. 87(10), 2011, str. 126-129. ISSN 0033-2097
[22] K. Gałkowski, „State-space realisations of linear 2-D systems with extensions to the general nD (n>2) case”, Springer, London, 2001. ISBN: 978-1-84628-573-8. DOI: https://doi.org/10.1007/BFb0110347
Go to article

Authors and Affiliations

Paweł Poczekajło
1

  1. Faculty of Electronics and Computer Science, Koszalin University of Technology, Koszalin, Poland
Download PDF Download RIS Download Bibtex

Abstract

The objective of this paper is to estimate performance of a new approach for spectrum sharing and coordination between terrestrial base stations (BS) and On-board radio access nodes (UxNB) carried by Unmanned Aerial Vehicles (UAV). This approach employs an artificial intelligence (AI) based algorithm implemented in a centralized controller. According to the assessment based on the latest specifications of 3rd Generation Partnership Project (3GPP) the newly defined Unmanned Aerial System Traffic Management (UTM) is feasible to implement and utilize an algorithm for dynamic and efficient distribution of available radio resources between all radio nodes involved in process of optimization. An example of proprietary algorithm has been described, which is based on the principles of Kohonen neural networks. The algorithm has been used in simulation scenario to illustrate the performance of the novel approach of centralized radio channels allocation between terrestrial BSs and UxNBs deployed in 3GPP-defined rural macro (RMa) environment. Simulation results indicate that at least 85% of simulated downlink (DL) transmissions are gaining additional channel bandwidth if presented algorithm is used for spectrum distribution between terrestrial BSs and UxNBs instead of baseline soft frequency re-use (SFR) approach.
Go to article

Bibliography

[1] 3GPP, “UAS-UAV”, https://www.3gpp.org/uas-uav, accessed 18 November 2019.
[2] 3GPP TR 36.777, “Release 15. Enhanced LTE support for aerial vehicles”, January 2018.
[3] 3GPP TS 22.125, “Release 16. Unmanned Aerial System (UAS) support in 3GPP. Stage 1”, September 2019.
[4] 3GPP TS 22.125, “Release 17. Unmanned Aerial System (UAS) support in 3GPP. Stage 1”, December 2019.
[5] S. Zhang, Y. Zeng, R. Zhang, “Cellular-Enabled UAV Communication: A Connectivity-Constrained Trajectory Optimization Perspective”, IEEE Transactions on Communications, Vol. 67, No. 3, March 2019. DOI: 10.1109/TCOMM.2018.2880468.
[6] B. Li, Z. Fei, Y. Zhang, “UAV Communications for 5G and Beyond: Recent Advances and Future Trends”, IEEE Internet of Things Journal, Vol. 6, No. 2, April 2019. DOI: 10.1109/JIOT.2018.2887086.
[7] L. Sboui, H. Ghazzai, Z. Rezki, M.-S. Alouini, “Energy-Efficient Power Allocation for UAV Cognitive Radio Systems”, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall). DOI: 10.1109/VTCFall.2017.8287971.
[8] J. Huang, W. Mei, J. Xu, Q. Ling, Z. Rui, “Cognitive UAV Communication via Joint Maneuver and Power Control”, IEEE Transactions on Communications, Vol. 67, No. 11, November 2019. DOI: 10.1109/TCOMM.2019.2931322.
[9] G. Hattab, D. Cabric, “Energy-Efficient Massive IoT Shared Spectrum Access over UAV-enabled Cellular Networks”, Accepted for publication in IEEE Transactions on Communications, 2020. DOI: 10.1109/TCOMM.2020.2998547.
[10] C. Zhang, W. Zhang, “Spectrum Sharing for Drone Networks”, IEEE Journal on Selected Areas in Communications, Vol. 35, No. 1, January 2017. DOI: 10.1109/JSAC.2016.2633040.
[11] X. Ying, M.M. Buddhikot, S. Roy, “SAS-Assisted Coexistence-Aware Dynamic Channel Assignment in CBRS Band”, IEEE Transactions on Wireless Communications, Vol. 17, No. 9, September 2018. DOI: 10.1109/TWC.2018.2858261.
[12] T. Kohonen, “Self-Organizing Maps”, Series in Information Sciences, Vol. 30, Springer-Verlag Berlin Heidelberg, Third ed., 2001.
[13] K. Bechta, “Radio resource allocation”, International Application No.: PCT/FI2017/050149.
[14] Y. Yu, E. Dutkiewicz, X. Huang, M. Mueck, G. Fang, “Performance Analysis of Soft Frequency Reuse for Inter-cell Interference Coordination in LTE Networks”, 2010 10th International Symposium on Communications and Information Technologies. DOI: 10.1109/ISCIT.2010.5665044.
[15] 3GPP TS 38.901, “Release 16. Study on channel model for frequencies from 0.5 to 100 GHz”, January 2020.

Go to article

Authors and Affiliations

Kamil Bechta
1

  1. Mobile Networks Business Division of Nokia
Download PDF Download RIS Download Bibtex

Abstract

High definition video transmission is one of the prime demands of modern day communication. Changing needs demand diverse features to be offered by the video codec standards, H.264 fits to these requirements for video compression. In this work, an attempt has been made to optimize the inter prediction along with improved intra prediction to ensure the minimal bit rates thereby reduction in the channel bandwidth, which is required in most of the wireless applications. In intraprediction, only DC prediction mode is chosen out of 9 modes with 4*4 luma blocks that reduces the coding complexity towards optimal logic utilization in order to support typical FPGA board for hardware implementation. Most significantly, Inter prediction is carried out utilizing the M9K blocks efficiently with proper timing synchronization to reduce the latency in the encoding operation. Experimental set up comprising of two Altera DE2-115 boards connected through Ethernet cable demonstrated the video transmission. These optimized intra prediction and inter prediction stages resulted in significant improvement in the video compression possessing good subjective quality and increased video compression.
Go to article

Bibliography

[1] Bernatin.T ,Sundari.G, “ Video compression based on Hybrid transform and quantization with Huffman coding for video codec”, International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), pp 476-480,IEEE.
[2] The Evolution of H.264 From Codec to System Architecture, White Paper , VBrick Systems, December, 2010
[3] Arun Kumar Pradhan, Lalit Kumar Kanoje and BiswaRanjan Swain, 2013 “FPGA based High Performance CAVLC Implementation for H.264 Video Coding” International Journal of Computer Applications (0975 – 8887) Volume 69– No.10.
[4] Teng Wang, Chih-Kuang Chen, Qi-Hua Yang and Xin-An Wang (2012), “FPGA Implementation and Verification System of H.264/AVC Encoder for HDTV Applications”, Advances in CSIE, Springer-Verlag Berlin Heidelberg, Vol. 2, AISC 169, pp. 345-352
[5] Gwo-Long Li et al. (2013), “135-MHz258-K gates VLSI design for all-intra H.264/AVC scalable video encoder”, IEEE Trans. Very Large Scale Integr.(VLSI) Syst., Vol. 21, No. 4, pp. 636-647
[6] Kuo, H.-C., Wu, L.-C., Huang, H.-T., Hsu, S.-T. and Lin, Y.-L. (2013), “A low power high-performance H.264/AVC intra-frame encoder for 1080pHD video”, IEEE Trans. Very Large Scale Integr. (VLSI) Syst., Vol. 19, No. 6, pp. 925-938

Go to article

Authors and Affiliations

T. Bernatin
1
G. Sundari
1
Sahaya Anselin Nisha
1
M.S. Godwin Premi
1

  1. Sathyabama Institute of Science and Technology, India

Instructions for authors

Author Guidelines

We recommend the use of LaTeX2e for the preparation of your camera-ready manuscript, together with the corresponding class file.

We do not encourage the use of Microsoft Word, particularly as the layout of the pages (the position of figures and paragraphs or fonts) can change between printouts. If you would like to prepare your manuscript using MS Word please contact Editorial Office.

Please carefully read the information below, and download the relevant files.

To do so, please download JETInfo.pdf

Microsoft Windows or Macintosh LaTeX2e style file:

      Please download IEEEtran.zip

Publication requirement is to prepare no less than 6 pages including references using provided LaTeX2e style. All papers that do not meet this requirement will be rejected before review stage.

 

 

Please submit the following:

  •     All source LaTeX files.
  •     Final PDF file (for reference).
  •     PS/EPS or TIFF files for all figures.
  •     Complete contact information for all authors.
  •     Mailing address, a VAT/CIF/NIF/NIP number (depending on the country) of affiliated company the invoice should be sent.

 

IMORTANT! Before staring submission please prepare a contact information for all co-authors (full names, e-mails and affiliations). A contact information for all authors should be provided during submission process in "Step 2. Entering the Submission's Metadata". Papers submitted without contact information for all co-

This page uses 'cookies'. Learn more