Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 647
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

Echinoids represent an important component of the Cenozoic marine benthic communities. Their diversity in the Mediterranean area is reviewed within the Late Miocene–Recent, a period of remarkable paleogeographic and paleo- climate changes. Of the 37 genera that lived during the Late Miocene, only Holaster, Pliolampas, and Trachyaster did not survive the Messinian Mediterranean salinity crisis (MSC), indicating that this event was not as drastic as for other marine groups. The presence of Brissopsis within the uppermost Messinian testifies to the existence of fully marine conditions at least towards the end of the MSC. Severe drops in the echinoid diversity, involving the loss of 40% of the Pliocene genera, occurred during the Piacenzian, likely because of the onset of the Northern Hemisphere glaciation. Most of the echinoid extinctions correlate with the crisis of the Mediterranean bivalve assemblage recorded at about 3 Ma. The Early Pleistocene progressive cooling caused the disappearance of further thermophilous shallow-water genera (Clypeaster, Schizechinus, Echinolampas) and allowed the entrance of temperate taxa ( Paracentrotus lividus, Placentinechinus davolii and Sphaerechinus granularis) from the Atlantic. Some deep-water taxa ( Histocidaris sicula, Stirechinus scillae, Cidaris margaritifera), whose Recent relatives are currently restricted to tropical areas, are not found in the area after the Calabrian possibly because of the disappearance of the psychrosphere. The extant Mediterranean echinoid fauna mainly derives from the Late Miocene fauna, reduced after several climatic changes by about 43% at the genus level. The recent increase of the sea surface temperatures allowed the entrance of the Lessepsian Diadema seto sum and confined the deep-water species of Holanthus to the coldest areas of the basin, making this genus endangered.
Go to article

Authors and Affiliations

Enrico Borghi
1
Vittorio Garilli
2

  1. Società Reggiana di Scienze Naturali, Via A. Gramsci 109, 42024,Castelnovo Sotto (RE), Italy
  2. PaleoSofia—Research and Educational Service,Via Gagini 19, 90133 Palermo, Italy
Download PDF Download RIS Download Bibtex

Abstract

This paper presents low-cost, configurable PCI Express (PCIe) direct memory access (DMA) interface for implementation on Intel Cyclone V FPGAs. The DMA engine was designed to support DAQ tasks including pre-triggering acquisition for transient analysis and multichannel transmission. Performance of the interface has been evaluated on Terasic OVSK board (PCIe Gen2 x4). Target configuration of this interface is based on the Avalon-MM Hard IP for Cyclone V PCIe core and Jungo WinDriver x64 for Windows. A sample speed of 1200 MB/s has been reported for DMA writes to PCIe memory.
Go to article

Bibliography

[1] PCI Express Base Specification, rev. 3.0, PCI-SIG, Nov. 2010
[2] A. Wójcik, R. Łukaszewski, R. Kowalik, W. Winiecki, “Nonintrusive Appliance Load Monitoring: An Overview, Laboratory Test Results and Research Directions”, Sensors, 2019, 19, 3621
[3] A. Wójcik, P. Bilski, R. Łukaszewski, K. Dowalla, R. Kowalik, “Identification of the State of Electrical Appliances with the Use of a Pulse Signal Generator”, Energies, 2021, 14, 673.
[4] K. N. Trung, E. Dekneuvel, B. Nicolle, O. Zammit, C. N. Van, G. Jacquemod, “Using FPGA for Real Time Power Monitoring in a NIALM System”, In Proc. 2013 IEEE International Symposium on Industrial Electronics (ISIE), 2013, pp. 1-6
[5] Intel Corporation, Modular Scatter-Gather DMA Core, In Embedded Peripherals IP User Guide v. 18.1
[6] Intel Corporation, Intel® Quartus® Prime Standard Edition User Guide v. 18.1, Platform Designer
[7] Intel Corporation, Cyclone® V Avalon® Memory Mapped (Avalon-MM) Interface for PCIe Solutions User Guide, UG-01110, 2020
[8] Intel Corporation,V-Series Avalon-MM DMA Interface for PCIe Solutions User Guide, UG-01154, 2016
[9] WinDriver, https://www.jungo.com/st/products/windriver/wd_windows/
[10] OpenVINO Stater Kit GT Edition User Manual, available on https://www.terasic.com.tw/
[11] L. Rota, M. Caselle, S. Chilingaryan, A. Kopmann, M. Weber, “A PCIe DMA Architecture for Multi-Gigabyte Per Second Data Transmission”, IEEE Transactions on Nuclear Science, vol. 62, no. 3, 2015, pp. 972 - 976
[12] A. Byszuk, J. Kołodziejski, G. Kasprowicz, K. Późniak, W. M. Zabołotny “Implementation of PCI Express bus communication for FPGA-based data acquisition systems”, In Proceedings of SPIE Vol. 8454, 2015
[13] L. Boyang, “Research and Implementation of XDMA High Speed Data Transmission IP Core Based on PCI Express and FPGA”, in 2019 IEEE 1st International Conference on Civil Aviation Safety and Information Technology (ICCASIT), Oct. 2019, pp. 408–411
Go to article

Authors and Affiliations

Krzysztof Mroczek
1

  1. Institute of Radioelectronics and Multimedia Technology, Warsaw University of Technology, Poland
Download PDF Download RIS Download Bibtex

Abstract

Lane detection is one of the key steps for developing driver assistance and vehicle automation features. A number of techniques are available for lane detection as part of computer vision tools to perform lane detection with different levels of accuracies. In this paper a unique method has been proposed for lane detection based on dynamic origin (DOT). This method provides better flexibility to adjust the outcome as per the specific needs of the intended application compared to other techniques. As the method offers better degree of control during the lane detection process, it can be adapted to detect lanes in varied situations like poor lighting or low quality road markings. Moreover, the Piecewise Linear Stretching Function (PLSF) has also been incorporated into the proposed method to improve the contrast of the input image source. Adding the PLSF method to the proposed lane detection technique, has significantly improved the accuracy of lane detection when compared to hough transform method from 87.88% to 98.25% in day light situations and from 94.15% to 97% in low light situations.
Go to article

Bibliography

[1] V. Gaikwad, S. Lokhande, “Lane departure identification for advanced driver assistance,” IEEE Transactions on Intelligent Transportation Systems., 2015, 16(2): 910–918.
[2] Sandipann P. Narote, Pradnya N. Bhujbal, Abbhilasha S. Narote, Dhiraj M. Dhane, “A review of recent advances in lane detection and departure warning,” System. Pattern Recognition, 2018, 73:216-234.
[3] P.C. Wu, C. Chang, C.H. Lin, “Lane mark extraction for automobiles under complex conditions,” Pattern Recognition, 2014, 47: 2756–2767.
[4] C. Mu, X. Ma, “Lane detection based on object segmentation and piecewise fitting,” Telkomnika Indonesian Journal of Electrical Engineering, 2014, 12(5):3491–3500.
[5] CALTECH database http://www.vision.caltech.edu/archive.html
[6] Y. Dong, J. Xiong, L. Li, J. Yang “Lane detection based on object segmentation and piecewise fitting,” ICCP proceedings, 2012, 461–464.
[7] P. Hsiao, C.W. Yeh, S. Huang, L.C. Fu, “Portable vision based real time lane departure warning system day and night,” IEEE Transactions on Vehicular Technology,2009, 58(4):2089–2094.
[8] Prashanth Viswanath, Pramod Swami, “A Robust and Real -Time Image Based Lane Departure Warning System,” IEEE International Conference on Consumer Electronics, 2016.
[9] Minghua Niu, Jianmin Zhang, Gen Li, “Research on the Algorithms of Lane Recognition based on Machine Vision,” International Journal of Intelligent Engineering and Systems, 2015, 8(4).
[10] Gulivindala Suresh,Chanamallu Srinivasa Rao, “Localization of Copy-Move Forgery in Digital Images through Differential Excitation Texture Features,” International Journal of Intelligent Engineering and Systems, 2019, 12(2).
[11] C.R. Jung, C.R. Kelber, “Lane following and lane departure using a linear parabolic mode,” Image and Vision Computing, 2005, 23(13):1192–1202.
[12] D. Kragic, L. Petersson and H.I. Christensen, “Visually guided manipulation tasks,” Robotics and Autonomous Systems, 2002, 40(2/3):193-203.
[13] J.W. Lee, “A machine vision system for lane departure detection. Computing,” Vision Image Understanding, 2002, 86(1): 52–78.
[14] J. Melo, A. Naftel, A. Bernardino, J. Santos, “Detection and classification of highway lanes using vehicle motion trajectories,” IEEE Transactions on Intelligent Transportation Systems, 2006, 7(2): 188–200.
[15] Chaiwat Nuthong; Theekapun Charoenpong, “Lane detection using smoothing,” 3rd International Congress on Image and Signal Processing, 2010, 989-993.
[16] Bing Yu; Weigong Zhang; Yingfeng Cai, “A Lane Departure Warning System Based on Machine Vision,” Proceeding IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 2008, 197-201.
[17] J.G. Wang, C. Lin, S. Chen, “Applying fuzzy method to vision-based lane detection and departure warning system,” Expert Systems with Applications, 2010, 3(1):113–126.
[18] H. Xu, H. Li, “Study on a robust approach of lane departure warning algorithm,” IEEE International Conference on Signal Processing System (ICSPS), 2010, 201–204.
[19] S. Srivastava, M. Lumb, R. Singal, “Improved Lane Detection using Hybrid Median Filter and Modified Hough Transform,” International Journal of Advanced Research in Computer Science and Software Engineering, 2014, 4(1): 30–37.
[20] H. Aung, M.H. Zaw, “Video based lane departure warning system using hough transform,” International Conference on Advances in Engineering and Technology (ICAET), 2010, 85–88.
[21] X. An, E. Shang, J. Song, J. Li, H. He, “Real-time lane departure warning system based on a single fpga,” Eurasip Journal on Image and Video Processing, 2013,38(1–18).
[22] J. Son, H. Yoo, S. Kim, K. Sohn, “Real-time illumination invariant lane detection for lane departure warning system,” Expert Systems with Applications, 2015, 42(4):1816–1824.
[23] Y. Wang, D. Shen, E.K. Teoh, “Lane detection using spline model,” Pattern Recognition, 2000, 21(9): 677–689.
[24] C.J. Lin, J.G. Wang, S.M. Chen, C.Y. Lee, “Design of a lane detection and departure warning system using functional link-based neuro-fuzzy network,” IEEE International Conference on Fuzzy System (FUZZ), 2010, 1–7.
[25] Q. Lin, Y. Han, H. Hahn, “Real time lane detection based on extended edge-linking algorithm,” IEEE International Conference on Computer Research and Development, 2010, 725–730.
[26] C. Tu, B.V. Wyk, Y. Hamam, K. Djouni, S. Du, “Vehicle Position Monitoring using,” Hough Transform.IERI Procedia, 2013;4:316–322.
[27] E. Salari, D. Ouyang, “Camera-based forward collision and lane departure warning system using svm,” IEEE 56th International Midwest Symp. On Circuits and Systems (MWSCAS), 2013,1278–1281.
[28] A.S. Aguadoa, Eugenia, Montie and M. S. Nixonc, “Invariant characterisation of the Hough transform for pose estimation of arbitrary shapes,” Pattern Recognition, 2002, 35(5):1083-1097.
[29] Borkar, M. Hayes, M. Smith, “Robust lane detection and tracking with ransac and kalman filter,” 16th IEEE International Conference on Image Processing (ICIP), 2009, 3261–3264.
[30] N. Madrid, P. Hurtik “Lane departure warning for mobile devices based on a fuzzy representation of images,” Fuzzy Sets System, 2016, 291:144–159.
[31] P.Maya, C.Tharini, “Performance Analysis of Lane Detection Algorithm using Partial Hough Transform,” 21st International Arab Conference on Information Technology (ACIT'2020), 2020, Egypt.
Go to article

Authors and Affiliations

P. Maya
1
C. Tharini
2

  1. B S Abdur Rahman Crescent Institute of Science and Technology, Chennai, India
  2. B S Abdur Rahman Crescent Institute of Science and Technology,Chennai, India
Download PDF Download RIS Download Bibtex

Abstract

The world is heading towards deployment of 5G commercially by the year 2020. But providing broadband 5G connectivity to remote rural regions is a significant challenge. Fiber connectivity has attempted to penetrate rural regions but last mile connectivity is still a problem in many rural sectors due to improper land demarcation and hostile terrain. A scheme which is based on the Integrated Access and Backhaul (IAB) concept is proposed to provide last mile 5G connectivity to satisfy the broadband needs of rural subscribers. A wireless 5G downlink environment following 3GPP NR specifications with a significantly high throughput is simulated. The last mile link is provided through a 28GHz carrier from a proposed IAB node delivering a data throughput of 4.301 Gbps for singleuser carrier aggregation and 5.733 Gbps for multi-user carrier aggregation which is quite promising for broadband service, like high-speed Internet and streaming video. The results presented in this work are observed to agree favourably with the results of other researchers in the field.
Go to article

Bibliography

[1] 3GPP TR 21.916V0.5.0(2020-07), Summary of Rel-16 Work Items
[2] Henrik Ronkainen, Jonas Edstam, Anders Ericsson, Christer O¨ stberg, ”Integrated access and backhaul – a new type of wireless backhaul in 5G”, Ericsson Technology Review June 23, 2020. ISSN 0014-0171 284 23-3346 — Uen.
[3] Biswas, A. S., Sil, S., Bera, R., and Mitra, M., ”5G Based Broadband Last Mile Connectivity for Rural Sectors”, International Conference on Emerging Technologies for Sustainable Development (ICETSD’19) Proceedings, GCELT Kolkata, 2019.
[4] Vidhya R and Karthik P, ”Dynamic Carrier Aggregation in 5G network scenario,” 2015 International Conference on Computing and Network Communications (CoCoNet), Trivandrum, 2015, pp. 936-940, https://doi.org/10.1109/CoCoNet.2015.7411303.
[5] M. Xu et al., ”Bidirectional fiber-wireless access technology for 5G mobile spectral aggregation and cell densification,” in IEEE/OSA Journal of Optical Communications and Networking, vol. 8, no. 12, pp. B104-B110, December 2016, https://doi.org/10.1364/JOCN.8.00B104.
[6] E. Chavarria-Reyes, I. F. Akyildiz and E. Fadel, ”Energy-Efficient Multi-Stream Carrier Aggregation for Heterogeneous Networks in 5G Wireless Systems,” in IEEE Transactions on Wireless Communications, vol. 15, no. 11, pp. 7432-7443, Nov. 2016, https://doi.org/10.1109/TWC.2016.2602336.
[7] P. D. Diamantoulakis, K. N. Pappi, S. Muhaidat, G. K. Karagiannidis and T. Khattab, ”Carrier Aggregation for Cooperative Cognitive Radio Networks,” in IEEE Transactions on Vehicular Technology, vol. 66, no. 7, pp. 5904-5918, July 2017, https://doi.org/10.1109/TVT.2016.2635112.
[8] Z. Limani Fazliu, C. Chiasserini, G. M. Dell’Aera and E. Hamiti, ”Distributed Downlink Power Control for Dense Networks With Carrier Aggregation,” in IEEE Transactions on Wireless Communications, vol. 16, no. 11, pp. 7052-7065, Nov. 2017, https://doi.org/10.1109/TWC.2017.2737998.
[9] T. Xu and I. Darwazeh, ”Transmission Experiment of Bandwidth Compressed Carrier Aggregation in a Realistic Fading Channel,” in IEEE Transactions on Vehicular Technology, vol. 66, no. 5, pp. 4087-4097, May 2017, https://doi.org/10.1109/TVT.2016.2607523.
[10] J. Jia, Y. Deng, J. Chen, A. Aghvami and A. Nallanathan, ”Availability Analysis and Optimization in CoMP and CA-enabled HetNets,” in IEEE Transactions on Communications, vol. 65, no. 6, pp. 2438-2450, June 2017, https://doi.org/10.1109/TCOMM.2017.2679747.
[11] R. M. Rao, V. Marojevic and J. H. Reed, ”Adaptive Pilot Patterns for CA-OFDM Systems in Nonstationary Wireless Channels,” in IEEE Transactions on Vehicular Technology, vol. 67, no. 2, pp. 1231-1244, Feb. 2018, https://doi.org/10.1109/TVT.2017.2751548.
[12] R. Khdhir, B. Cousin, K. Mnif and K. Ben Ali, ”Neural network approach for component carrier selection in 4G/5G networks,” 2018 Fifth International Conference on Software Defined Systems (SDS), Barcelona, 2018, pp. 112-117, https://doi.org/10.1109/SDS.2018.8370431.
[13] K. Tateishi et al., ”Field experiments on 5G radio access using 15-GHz band in outdoor small cell environment,” 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Hong Kong, 2015, pp. 851-855, https://doi.org/10.1109/PIMRC.2015.7343416.
[14] Z. Shi and Y.Wang, ”Joint DFT-s-OFDM scheme for non-contiguous carriers transmission,” 2017 IEEE/CIC International Conference on Communications in China (ICCC), Qingdao, 2017, pp. 1-6, https://doi.org/10.1109/ICCChina.2017.8330481.
[15] M. Bi, W. Jia, L. Li, X. Miao and W. Hu, ”Investigation of F-OFDM in 5G fronthaul networks for seamless carrier-aggregation and asynchronous transmission,” 2017 Optical Fiber Communications Conference and Exhibition (OFC), Los Angeles, CA, 2017, pp. 1-3.
[16] S. Rostami, K. Arshad and P. Rapajic, ”A joint resource allocation and link adaptation algorithm with carrier aggregation for 5G LTE-Advanced network,” 2015 22nd International Conference on Telecommunications (ICT), Sydney, NSW, 2015, pp. 102-106, https://doi.org/10.1109/ICT.2015.7124665.
[17] 3GPP TS 38.211 version 15.3.0 Release 15, 2018-10, Physical channels and modulation.
[18] 3GPP TS 38.104 version 15.2.0 Release 15, 2018-07, Base Station (BS) radio transmission and reception.
[19] 3GPP TR 38.901 v15.0.0, 2018-06, Study on channel model for frequencies from 0.5 to 100 GHz.
Go to article

Authors and Affiliations

Ardhendu Shekhar Biswas
1
Sanjib Sil
2
Rabindranath Bera
3
Monojit Mitra
4

  1. Department of Electronics and Communication Engineering, Techno International New Town, Kolkata - 700156, India
  2. Department of Electronics and Communication Engineering, Calcutta Institute of Engineering and Management, Kolkata -700040, India
  3. Department of Electronics Communication Engineering, Sikkim Manipal Institute of Technology, Sikkim, India
  4. Department of Electronics and Telecommunication Engineering, IIEST Shibpur, Howrah, India
Download PDF Download RIS Download Bibtex

Abstract

The power distribution internet of things (PD-IoT) has the complex network architecture, various emerging services, and the enormous number of terminal devices, which poses rigid requirements on substrate network infrastructure. However, the traditional PD-IoT has the characteristics of single network function, management and maintenance difficulties, and poor service flexibility, which makes it hard to meet the differentiated quality of service (QoS) requirements of different services. In this paper, we propose the software-defined networking (SDN)- enabled PD-IoT framework to improve network compatibility and flexibility, and investigate the virtual network function (VNF) embedding problem of service orchestration in PD-IoT. To solve the preference conflicts among different VNFs towards the network function node (NFV) and provide differentiated service for services in various priorities, a matching-based priorityaware VNF embedding (MPVE) algorithm is proposed to reduce energy consumption while minimizing the total task processing delay. Simulation results demonstrate that MPVE significantly outperforms existing matching algorithm and random matching algorithm in terms of delay and energy consumption while ensuring the task processing requirements of high-priority services.
Go to article

Bibliography

[1] Z. Zhou, J. Bai, Z. Sheng, ”A Stackelberg Game Approach for Energy Management in Smart Distribution Systems with Multiple Microgrids”, in IEEE ISADS 2015 workshop on Smart Grid Communications and Networking Technologies. Taiwan, China, 2015.
[2] A. Dadashzade, F. Aminifar, M. Davarpanah, ”Unbalanced Source Detection in Power Distribution Networks by Negative Sequence Apparent Powers”, IEEE Trans. Power Deliv. 36(5), 481-483 (2021).
[3] Z. Lv, W. Xiu, ”Interaction of Edge-Cloud Computing Based on SDN and NFV for Next Generation IoT”, IEEE Internet Things J. 7 (4), 5706-5712 (2020) .
[4] Z. Zhou, X. Chen, B. Gu, ”Multi-Scale Dynamic Allocation of Licensed and Unlicensed Spectrum in Software-Defined HetNets”, IEEE Netw. 33 (6), 9-15 (2019).
[5] G. Wang, S. Zhou, S. Zhang, Z. Niu, X. Shen, ”SFC-Based Service Provisioning for Reconfigurable Space-Air-Ground Integrated Networks”, IEEE J. Sel. Areas Commun. 38 (3), 1478-1489 (2020) .
[6] J. Li, W. Shi, N. Zhang, X. Shen, ”Delay-Aware VNF Scheduling: A Reinforcement Learning Approach With Variable Action Set”, IEEE Trans. Cogn. Commun. Netw. 7 (2), 304-318 (2021).
[7] G. Faraci, G. Schembra, ”An Analytical Model to Design and Manage a Green SDN/NFV CPE Node” IEEE Trans. Netw. Service Manag. 12 (4), 435-450 (2015).
[8] B. R.Al-Kaseem, ”Al-Raweshidy, H.S. SD-NFV as an Energy Efficient Approach for M2M Networks Using Cloud-Based 6LoWPAN Testbed”, IEEE Internet Things J. 4 (2), 1787-1797 (2017).
[9] Z. Zhou, J. Gong, Y. He, Y. Zhang, ”Software Defined Machineto- Machine Communication for Smart Energy Management”, IEEE Commun. Mag. 55(7), 52-60 ( 2017).
[10] C. Mouradian, N. T. Jahromi, R. H.Glitho, ”NFV and SDN-Based Distributed IoT Gateway for Large-Scale Disaster Management”, IEEE Internet Things J., 5 (2), 4119-4131 ( 2018).
[11] L. You, B. Tuncer, R. Zhu, H. Xing, C. Yuen, ”A Synergetic Orchestration of Objects, Data and Services to Enable Smart Cities”, IEEE Internet Things J. 6(2), 10496-10507 ( 2019).
[12] B. Cheng, S. Hou, M.Wang, S. Zhao, J. Chen, ”HSOP: A Hybrid Service Orchestration Platform for Internet-Telephony Networks”, IEEE/ACM Trans. Netw. 28 (5), 1102-1115 (2020).
[13] G. Castellano, F. Esposito, F. Risso, ”A Service-Defined Approach for Orchestration of Heterogeneous Applications in Cloud/Edge Platforms”, IEEE Trans. Netw. Service Manag. 16(3), 1404-1418 (2019).
[14] B. Kar, E. H.-K.Wu, Y. D .Lin, ”Energy cost optimization in dynamic placement of virtualized network function chains”, IEEE Trans. Netw. Service Manag. 15 (4), 372–386 (2018).
[15] M. M.Tajiki, S. Salsano, L. Chiaraviglio, M. Shojafar, B. Akbari, ”Joint Energy Efficient and QoS-Aware Path Allocation and VNF Placement for Service Function Chaining”, IEEE Trans. Netw. Serv. 16 (6), 374-388 (2019) .
[16] L. Ruiz, et al. ”Genetic Algorithm for Holistic VNF-Mapping and Virtual Topology Design”, IEEE Access. 8 (3), 55893-55904 (2020).
[17] K. S. Ghaia, S. Choudhurya, A. Yassineb, ”A stable matching based algorithm to minimize the end-to-end latency of edge nfv”, Procedia Computer Science. 151 (9), 377-384 (2019).
[18] C. Pham, N. H.Tran, C. S. Hong, ”Virtual Network Function Scheduling: A Matching Game Approach”, IEEE Commun. Lett. 22 (5), 69-72 (2018) .
[19] C. Pham, N. H.Tran, S. Ren, W. Saad, C. S. Hong, ”Traffic-Aware and Energy-Efficient vNF Placement for Service Chaining: Joint Sampling and Matching Approach”, IEEE Trans. Serv. Comput. 13 (9), 172-185 (2020).
[20] Z. Zhou et al. Context-Aware Learning-Based Resource Allocation for Ubiquitous Power IoT. IEEE Internet Things Mag. 4(1), 46-52 (2020) .
[21] Z. Zhou, H. Liao, H. Zhao, B. Ai, M. Guizani, ”Reliable Task Offloading for Vehicular Fog Computing Under Information Asymmetry and Information Uncertainty”, IEEE Trans. Veh. Technol.68 (6), 8322-8335 (2019).
[22] Z. Xu, X. Zhang, S. Yu, J. Zhang, ”Energy-Efficient Virtual Network Function Placement in Telecom Networks”, in 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 2018.
[23] M. C. Luizelli, L. R. Bays, L. S.Buriol, M. P. Barcellos, L. P. Gaspary, ”Piecing together the NFV provisioning puzzle: Efficient placement and chaining of virtual network functions”, in 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), Ottawa, ON, Canada, 2015.
[24] X. Fei, F. Liu, H. Xu, H. Jin, ”Adaptive VNF Scaling and Flow Routing with Proactive Demand Prediction”, in IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, Honolulu, HI, USA, 2018.
[25] M. Chen, Y. Hao, ”Task Offloading for Mobile Edge Computing in Software Defined Ultra-Dense Network”, IEEE J. Sel. Areas Commun. 36 (2), 587-597 (2018).
[26] D. Yuan, X. Yang, Y. Jiang, Y. Meng, ”An Energy-Delay Trade-Off in Wireless Visual Sensor Networks Based on Two-Sided Matching”, IEEE Sensors J. 19 (6), 10099-10110 (2019).
[27] J. Xu, M. Li, J. Fan, X. Zhao, Z. Chang, ”Self-Learning Super- Resolution Using Convolutional Principal Component Analysis and Random Matching”, IEEE Trans. Multimedia21 (5), 1108-1121 (2018)
Go to article

Authors and Affiliations

Xiaoyue Li
1
Xiankai Chen
1
Chaoqun Zhou
1
Zilong Liang
1
Shubo Liu
1
Qiao Yu
1

  1. State Grid Qingdao Power Supply Company, China
Download PDF Download RIS Download Bibtex

Abstract

The Internet of Things has a set of smart objects with smart connectivity that assists in monitoring real world environment during emergency situations. It could monitor the various applications of emergency situations such as road accidents, criminal acts including physical assaults, kidnap cases, and other threats to people’s way of life. In this work, the proposed work is to afford real time services to users in emergency situations through Convolutional Neural Networks in terms of efficiency and reliable services. Finally, the proposed work has simulated with respect to the performance parameters of the proposed scheme like the probability of accuracy and processing time.
Go to article

Bibliography

[1] A P. Pandey, R. Litoriya, “An IoT Assisted System for Generating Emergency Alerts Using Routine Analysis,” Journal of Wireless Personal Communications, vol.11, no.1, pp.1-22, 2020.
[2] S. S. Sabry, N. A. Qarabash, H. S. Obaid, “The Road to the Internet of Things: A Survey,” in Proceedings of 9th Annual Information Technology, Electromechanical Engineering and Microelectronics Conference (IEMECON), IEEE, Jaipur, India, pp. 1-7, 2019.
[3] P. Sethi, S. R. Sarangi, “Internet of Things: Architecture, Protocols, and Applications,” Journal of Electrical and Computer Engineering, vol. 2017, no. 9324035, pp. 1-25, 2017.
[4] N. Sahli, N. Jabeura, M. Badra, “Agent-based Framework for Sensor-to-Sensor Personalization,” Journal of Computer and System Sciences, vol.81, no.3, pp. 487-495, 2015.
[5] F. Derakhshan, S. Yousefi, “A Review on the Applications of Multiagent Systems in Wireless Sensor Networks,” International Journal of Distributed Sensor Networks, vol.15, no.5, pp. 1-19, 2019.
[6] S. Albawi, T. A., Mohammed, S. Alzawi, “Understanding of a Convolutional Neural Network,” in Proceedings of the International Conference on Engineering and Technology, IEEE, Turkey, pp. 1-17, 2017.
[7] S. Frizzi, R. Kaabi, M, Bouchouicha, J.M., Ginoux, E, Moreau, F. Fnaiech, “Convolutional Neural Network for Video Fire and Smoke Detection,” in Proceedings of 42nd Annual Conference of the IEEE Industrial Electronics Society, Florence, IEEE, Italy, pp. 877- 881, 2016.
[8] M. Manas, A. Sinha, S. Sharma, Md. R. Mahboob, “A Novel Approach for IoT based Wearable Health Monitoring and Messaging System,” Journal of Ambient Intelligence and Humanized Computing, Vol. 10, pp.2817–2828, 2019.
[9] N. R. Sogi, P. Chatterjee, U. Nethra, V. Suma, “SMARISA: A Raspberry Pi based Smart Ring for Women Safety Using IoT,” in Proceedings of International Conference on Inventive Research in Computing Applications (ICIRCA 2018), IEEE, Coimbatore, India, pp.451- 454, 2018.
[10] A. Jesudoss, Y. Nikhila, T. Sahithi Reddy, “Smart Solution for Women Safety Using IoT,” International Journal of Pure and Applied Mathematics, vol.119, no.12, pp. 43-49, 2018.
[11] K. Sharma, D. D. Londhe, “Human Safety Devices Using IoT and Machine Learning: A Review,” in Proceedings of 3rd International Conference for Convergence in Technology (I2CT), IEEE, Pune, India, pp.1-7, 2018.
[12] R. Darbar, M. Choudhury, V. Mullick, “Ring IoT: A Smart Ring Controlling Things,” in Physical Spaces, 2019. Available from: https://rajkdarbar.github.io/RingIoT.pdf
[13] I. Aljarrah, D. Mohammad, “Video Content Analysis using Convolutional Neural Networks,” in Proceedings of 9th International Conference on Information and Communication Systems (ICICS), IEEE, Jordan, pp. 122-126, 2018.
[14] S. Sharma, S. Sebastian, “IoT based car accident detection and notification algorithm for general road accidents,” International Journal of Electrical and Computer Engineering (IJECE), vol. 9, no.5, pp. 4020-4026, 2019.
[15] R. Chauhan, K. K. Ghanshala, R.C. Joshi, “Convolutional Neural Network (CNN) for Image Detection and Recognition,” in Proceedings of 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC), IEEE, Jalandhar, India, pp.1-6, 2018
[16] S. Sharma, V. Chang, U. S. Tim, J. Wong, S. Gadia, “Cloud and IoT –based Emerging Services Systems,” Journal on Cluster Computing, Vol. 22, pp.71-91, 2019.
[17] W. Akram, M. Jain, C. S. Hemalatha, “Design of a Smart Safety Device for Women using IoT,” in Proceedings of International Conference on Recent Trends in Advanced Computing, VIT, Chennai, Elsevier, pp.656-662, 2019.
[18] K. Muhammad, J. Ahmad, I. Mehmood, S. Rho, S. W. Baik, “Convolutional Neural Networks based Fire Detection in Surveillance Videos,” Journal on IEEE Access, vol.6, pp.18174-18183, 2018.
[19] F. Wu, C. Rüdiger, J. Redoute, M. R. Yuce, “WE-Safe: A Wearable IoT Sensor Node for Safety Applications via LoRa,” in Proceedings of IEEE 4th World Forum on Internet of Things (WF-IoT), IEEE, Singapore, pp. 144-148, 2018.
[20] A. Kaur, A. Jasuja, “Health Monitoring based on IoT using Raspberry Pi,” in Proceedings of International Conference on Computer Communication and Automation. (ICCCA), IEEE, Greater Noida, India, pp.1335-1340, 2017.
[21] F. Bhatti, M. A. Shah, C. Maple, S.U. Islam, “A Novel Internet of Things-Enabled Accident Detection and Reporting System for Smart City Environments,” Journal on Sensors, Vol.19, No.9, pp.1-29, 2019.
Go to article

Authors and Affiliations

Lokesh B. Bhajantri
1
Ramesh M. Kagalkar
2
Pundalik Ranjolekar
3

  1. Department of Information Science and Engineering, India
  2. KLE College of Engineering and Technology, Chikodi, Karnataka, India
  3. Department of CSE, KLE Society's Dr. M. S. Sheshgiri College of Engineering and Technology, Karnataka, India
Download PDF Download RIS Download Bibtex

Abstract

Atmospheric turbulence is considered as major threat to Free Space Optical (FSO) communication as it causes irradiance and phase fluctuations of the transmitted signal which degrade the performance of FSO system. Wavelength diversity is one of the techniques to mitigate these effects. In this paper, the wavelength diversity technique is applied to FSO system to improve the performance under different turbulence conditions which are modeled using Exponentiated Weibull (EW) channel. In this technique, the data was communicated through 1.55 μm, 1.31 μm, and 0.85 μm carrier wavelengths. Optimal Combining (OC) scheme has been considered to receive the signals at receiver. Mathematical equation for average BER is derived for wavelength diversity based FSO system. Results are obtained for the different link length under different turbulence conditions. The obtained average BER results for different turbulence conditions characterized by EW channel is compared with the published result of average BER for different turbulence which is presented by classical channel model. A comparative BER analysis shows that maximum advantage of wavelength diversity technique is obtained when different turbulence conditions are modeled by EW channel.
Go to article

Bibliography

[1] V. W. S. Chan, “Free-Space Optical Communications,” J. Light. Technol., vol. 24, no. 12, pp. 4750–4762, dec 2006. [Online]. Available: https://doi.org/10.1109/JLT.2006.885252
[2] R. S. Lawrence and J. W. Strohbehn, “A survey of clearair propagation effects relevant to optical communications,” Proc. IEEE, vol. 58, no. 10, pp. 1523–1545, 1970. [Online]. Available: https://doi.org/10.1109/PROC.1970.7977
[3] J. Schuster, “Free space optics technology overview,” a Present., 2002.
[4] H. A. Fadhil, A. Amphawan, H. A. B. Shamsuddin, T. H. Abd, H. M. R. Al-Khafaji, S. A. Aljunid, and N. Ahmed, “Optimization of free space optics parameters: An optimum solution for bad weather conditions,” Opt. J. Light Electron Opt., vol. 124, no. 19, pp. 3969–3973, 2013. [Online]. Available: https://doi.org/10.1016/j.ijleo.2012.11.059
[5] E. Wainright, H. H. Refai, and J. J. Sluss Jr, “Wavelength diversity in free-space optics to alleviate fog effects,” in Free. Laser Commun. Technol. XVII, vol. 5712. International Society for Optics and Photonics, 2005, pp. 110–118. [Online]. Available: https://doi.org/10.1117/12.591193
[6] L. C. Andrews, R. L. Phillips, C. Y. Hopen, and M. A. Al-Habash, “Theory of optical scintillation,” JOSA A, vol. 16, no. 6, pp. 1417–1429, 1999. [Online]. Available: https://doi.org/10.1364/JOSAA.16.001417
[7] H. Henniger and O. Wilfert, “An Introduction to Free-space Optical Communications.” Radioengineering, vol. 19, no. 2, 2010.
[8] H. Moradi, M. Falahpour, H. H. Refai, P. G. LoPresti, and M. Atiquzzaman, “BER analysis of optical wireless signals through lognormal fading channels with perfect CSI,” in 2010 17th Int. Conf. Telecommun. IEEE, 2010, pp. 493–497. [Online]. Available: https://doi.org/10.1109/ICTEL.2010.5478870
[9] M. Uysal and J. Li, “Error rate performance of coded free-space optical links over gamma-gamma turbulence,” in 2004 IEEE Int. Conf. Commun. (IEEE Cat. No. 04CH37577), vol. 6. IEEE, 2004, pp. 3331– 3335. [Online]. Available: https://doi.org/10.1109/ICC.2004.1313162
[10] H. E. Nistazakis, V. D. Assimakopoulos, and G. S. Tombras, “Performance estimation of free space optical links over negative exponential atmospheric turbulence channels,” Opt. J. Light Electron Opt., vol. 122, no. 24, pp. 2191–2194, 2011. [Online]. Available: https://doi.org/10.1016/j.ijleo.2011.01.013
[11] M. Uysal, S. M. Navidpour, and J. Li, “Error rate performance of coded free-space optical links over strong turbulence channels,” IEEE Commun. Lett., vol. 8, no. 10, pp. 635–637, 2004. [Online]. Available: https://doi.org/10.1109/LCOMM.2004.835306
[12] R. Barrios and F. Dios, “Exponentiated weibull distribution family under aperture averaging for gaussian beam waves,” Optics express, vol. 20, no. 12, pp. 13 055–13 064, 2012. [Online]. Available: https://doi.org/10.1364/OE.20.013055
[13] L. M. Wasiczko and C. C. Davis, “Aperture averaging of optical scintillations in the atmosphere: experimental results,” in Atmos. Propag. II, vol. 5793. International Society for Optics and Photonics, 2005, pp. 197–208. [Online]. Available: https://doi.org/10.1117/12.606020
[14] P. R. Barbier, D. W. Rush, M. L. Plett, and P. Polak-Dingels, “Performance improvement of a laser communication link incorporating adaptive optics,” in Artif. Turbul. Imaging Wave Propag., vol. 3432. International Society for Optics and Photonics, 1998, pp. 93–102. [Online]. Available: https://doi.org/10.1117/12.327974
[15] J. A. Anguita, I. B. Djordjevic, M. A. Neifeld, and B. V. Vasic, “High-rate error-correction codes for the optical atmospheric channel,” in Free. Laser Commun. V, vol. 5892. International Society for Optics and Photonics, 2005, p. 58920V. [Online]. Available: https://doi.org/10.1117/12.615760
[16] S. S. Muhammad, T. Javornik, I. Jelovcan, E. Leitgeb, and O. Koudelka, “Reed solomon coded PPM for terrestrial FSO links,” in 2007 Int. Conf. Electr. Eng. IEEE, 2007, pp. 1–5. [Online]. Available: https://doi.org/10.1109/ICEE.2007.4287281
[17] D. Shah and D. K. Kothari, “BER Performance of FSO link under strong turbulence with different Coding Techniques,” IJCSC, vol. 8, pp. 4–9, 2015. [Online]. Available: https://doi.org/10.031206/IJCSC.2016.002
[18] H. E. Nistazakis and G. S. Tombras, “On the use of wavelength and time diversity in optical wireless communication systems over gamma–gamma turbulence channels,” Optics & Laser Technology, vol. 44, no. 7, pp. 2088–2094, 2012. [Online]. Available: https: //doi.org/10.1016/j.optlastec.2012.03.021
[19] D. Shah, D. K. Kothari, and A. K. Ghosh, “Bit error rate analysis of the K channel using wavelength diversity,” Opt. Eng., vol. 56, no. 5, p. 56106, 2017. [Online]. Available: https://doi.org/10.1117/1.OE.56.5.056106
[20] T. A. Tsiftsis, H. G. Sandalidis, G. K. Karagiannidis, and M. Uysal, “Optical wireless links with spatial diversity over strong atmospheric turbulence channels,” IEEE Trans. Wirel. Commun., vol. 8, no. 2, pp. 951–957, 2009. [Online]. Available: https://doi.org/10.1109/TWC.2009.071318
[21] D. Giggenbach, B. L. Wilkerson, H. Henniger, and N. Perlot, “Wavelength-diversity transmission for fading mitigation in the atmospheric optical communication channel,” in Free. Laser Commun. VI, vol. 6304. International Society for Optics and Photonics, 2006, p. 63041H. [Online]. Available: https://doi.org/10.1117/12.680924
[22] M. M. Ibrahim and A. M. Ibrahim, “Performance analysis of optical receivers with space diversity reception,” IEE Proceedings- Communications, vol. 143, no. 6, pp. 369–372, 1996. [Online]. Available: https://doi.org/ip-com:19960885
[23] K. P. Peppas, F. Lazarakis, A. Alexandridis, and K. Dangakis, “Simple, accurate formula for the average bit error probability of multiple-input multiple-output free-space optical links over negative exponential turbulence channels,” Opt. Lett., vol. 37, no. 15, pp. 3243–3245, 2012. [Online]. Available: https://doi.org/10.1364/OL.37.003243
[24] R. R. Parenti and R. J. Sasiela, “Distribution models for optical scintillation due to atmospheric turbulence,” MASSACHUSETTS INST OF TECH LEXINGTON LINCOLN LAB, Tech. Rep., 2005.
[25] S. Nadarajah and A. K. Gupta, “On the moments of the exponentiated Weibull distribution,” Commun. Stat. Methods, vol. 34, no. 2, pp. 253–256, 2005. [Online]. Available: https://doi.org/10.1080/03610920509342418
[26] M. Abramowitz and I. A. Stegun, “Handbook of Mathematical Functions 10th Printing with Corrections,” Natl. Bur. Stand. Appl. Math. Ser., vol. 55, 1972.
[27] A. Goldsmith, Wireless communications. Cambridge university press, 2005.
Go to article

Authors and Affiliations

Dhaval Shah
1
Hardik Joshi
1
Dilipkumar Kothari
1

  1. Faculty of Electronics and Communication Engineering, Institute of Technology, Nirma University, Ahmedabad, India
Download PDF Download RIS Download Bibtex

Abstract

The article is devoted to some critical problems of using Bayesian networks for solving practical problems, in which graph models contain directed cycles. The strict requirement of the acyclicity of the directed graph representing the Bayesian network does not allow to efficiently solve most of the problems that contain directed cycles. The modern theory of Bayesian networks prohibits the use of directed cycles. The requirement of acyclicity of the graph can significantly simplify the general theory of Bayesian networks, significantly simplify the development of algorithms and their implementation in program code for calculations in Bayesian networks..
Go to article

Bibliography

[1] A. Nafalski and A.P. Wibawa, “Machine translation with javanese speech levels’ classification,” Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, vol. 6, no 1, pp 21-25, 2016. https://doi.org/10.5604/20830157.1194260
[2] Z.Omiotek and P. Prokop, “The construction of the feature vector in the diagnosis of sarcoidosis based on the fractal analysis of CT chest images,” Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, vol. 9, no. 2, pp. 16-23, 2019. https://doi.org/10.5604/01.3001.0013.2541
[3] A. Litvinenko, O. Mamyrbayev, N. Litvinenko, A. Shayakhmetova, “Application of Bayesian networks for estimation of individual psychological characteristics,” Przeglad Elektrotechniczny, vol. 95, no. 5, pp. 92-97, 2019
[4] X.Q. Cai, X.Y. Wu, X. Zhou, “Stochastic scheduling subject to breakdown-repeat breakdowns with incomplete information,” Operations Research, vol. 57, no. 5, pp. 1236–1249, 2009. doi: 10.1287/opre.1080.0660
[5] K.W. Fornalski, “The Tadpole Bayesian Model for Detecting Trend Changes in Financial Quotations,” R&R Journal of Statistics and Mathematical Sciences, vol. 2, no. 1, pp. 117–122, 2016.
[6] J. Pearl “Artificial Intelligence Applications”, in How to Do with Probabilities what people say you can't,/ Editor Weisbin C.R., IEEE, North Holland, pp. 6–12, 1985.
[7] J. Pearl “Probabilistic Reasoning in Intelligent Systems”. San Francisco: Morgan Kaufmann Publishers, 1988,
[8] A. Tulupiev “Algebraic Bayesian networks,” in “Logical-probabilistic approach to modeling knowledge bases with uncertainty,” SPb.: SPIIRAS, 2000.
[9] S. Nikolenko, A. Tulupiev “The simplest cycles in Bayesian networks: Probability distribution and the possibility of its contradictory assignment,” SPIIRAS. Edition 2, 2004. vol.1.
[10] F.V. Jensen, T.D. Nielsen “Bayesian Networks and Decision Graphs,” Springer, 2007.
[11] D. Barber, “Bayesian Reasoning and Machine Learning,” 2017, 686 p. http://web4.cs.ucl.ac.uk/ staff/D.Barber/ textbook/020217.pdf
[12] R.E. Neapolitan “Learning Bayesian Networks,” 704p. http://www.cs.technion.ac.il/~dang/books/Learning%20Bayesian%20Networks(Neapolitan,%20Richard).pdf
[13] O. Mamyrbayev, M. Turdalyuly, N. Mekebayev, and et al. “Continuous speech recognition of kazakh language», AMCSE 2018 Int. conf. On Applied Mathematics, Computational Science and Systems Engineering, Rom, Italy, 2019, vol. 24, pp. 1-6.
[14] A. Litvinenko, N. Litvinenko, O. Mamyrbayev, A. Shayakhmetova, M. Turdalyuly “Clusterization by the K-means method when K is unknown,” Inter. Conf. Applied Mathematics, Computational Science and Systems Engineering. Rome, Italy, 2019, vol. 24, pp. 1-6.
[15] O.Ore “Graph theory,” Мoscow: Science, 1980, 336 p.
[16] Ph. Kharari “Graph theory,” Мoscow: Mir, 1973, 300 p.
[17] V. Gmurman “Theory of Probability and Mathematical Statistics: Tutorial,” Moscow: 2003, 479 p.
[18] A.N. Kolmogorov “Theory: Manual,” in “Basic Concepts of Probability,” Moscow: Science, 1974.
[19] N. Litvinenko, A. Litvinenko, O. Mamyrbayev, A. Shayakhmetova “Work with Bayesian Networks in BAYESIALAB,” Almaty: IPIC, 2018, 311 p. (in Rus). ISBN 978-601-332-206-3.

Go to article

Authors and Affiliations

Assem Shayakhmetova
1 2
Natalya Litvinenko
3
Orken Mamyrbayev
1
Waldemar Wójcik
4 5
Dusmat Zhamangarin
6

  1. Institute of Information and Computational Technology, 050010 Almaty, Kazakhstan
  2. Al-Farabi Kazakh National University, Almaty, Kazakhstan
  3. Information and Computational Technology, 050010 Almaty, Kazakhstan
  4. Institute of Information and Computational Technologies CS MES RK, Almaty
  5. Lublin Technical University, Poland
  6. Kazakh University Ways of Communications, Kazakhstan
Download PDF Download RIS Download Bibtex

Abstract

More and more street lighting deployments use LED technology as a light source. Unfortunately, the new technology also brings some challenges with it that remain unnoticed until installed at scale. This article presents issues related to capacitive reactive power consumed by LED luminaires. The problem is even more profound if the luminaire is dimmed, because it consumes capacitive reactive power, which is very undesirable in the power system. Countermeasures in terms of reactive power compensation for a luminaire working with variable power and their effects are also presented. The article also contains the results of the harmonic analysis of the LED luminaires current for full power and dimmed operation.
Go to article

Bibliography

[1] M. Traverso, S. Donatello, H. Moons, R. Rodriguez Quintero, M. Gama Caldas, O. Wolf, P. Van Tichelen, V. Van Hoof and T. Geerken, “Revision of the EU green public procurement criteria for street lighting and traffic signals - preliminary report,” EU - scientific and technical research reports June 2017. DOI: 10.2760/479108.
[2] A. Manolescu and F. Sisak, “LED source, a comparative analysis on lighting efficiency,” 2016 International Conference and Exposition on Electrical and Power Engineering (EPE), Iasi, 2016, pp. 525-528, DOI: 10.1109/ICEPE.2016.7781395.
[3] D. Jenkins and A. Bhargava, “LED Lighting: Maximizing the Reliability, Safety, and Efficiency of Light Fixtures in Hazardous Environments,” in IEEE Industry Applications Magazine, vol. 21, no. 1, pp. 64-67, Jan.-Feb. 2015, DOI: 10.1109/MIAS.2014.2345829.
[4] L.T. Doulos, A. Tsangrassoulis, P.A. Kontaxis, A. Kontadakis and F.V. Topalis, “Harvesting daylight with LED or T5 fluorescent lamps? The role of dimming,” Energy and Buildings, vol. 140. pp. 336-347, April 2017 DOI: 10.1016/j.enbuild.2017.02.013.
[5] G. Gagliardi, M. Lupia, G. Cario, F. Tedesco, F. Cicchello Gaccio, F. Lo Scudo and A. Casavola, “Advanced Adaptive Street Lighting Systems for Smart Cities,” Smart Cities 2020, vol. 3, pp. 1495-1512, November 2020, DOI: 10.3390/smartcities3040071.
[6] B.A. Portnov, R. Saad and T. Trop, “Interactive Scenario-Based Assessment Approach of Urban Street Lighting and Its Application to Estimating Energy Saving Benefits,” Energies 14, no. 2: 378. DOI: 10.3390/en14020378.
[7] Ł. Kosicki and D. Typańska, “Badanie odkształceń prądów i napięć generowanych przez oprawy z diodami LED,” Poznan university of technology academic journals, Electrical Engineering 2017, 92, 215-226.
[8] A. Djuretic, V. Skerovic, N. Arsic and M. Kostic, “Luminous flux to input power ratio, power factor and harmonics when dimming high-pressure sodium and LED luminaires used in road lighting,” Lighting Research & Technology, 2019. 51(2), 304–323. DOI: 10.1177/1477153518777272.
[9] A. Djuretic and M. Kostic, “Actual energy savings when replacing high-pressure sodium with LED luminaires in street lighting,” Energy 2018, vol. 157, pp. 367–378. DOI: 10.1016/j.energy.2018.05.179
[10] T. Lerch, M. Rad and I. Wojnicki, "Selected power quality issues of LED street lighting," 2020 12th International Conference and Exhibition on Electrical Power Quality and Utilisation- (EPQU), Cracow, Poland, 2020, pp. 1-4, DOI: 10.1109/EPQU50182.2020.9220310.
[11] F. A. Karim, M. Ramdhani and E. Kurniawan, "Low pass filter installation for reducing harmonic current emissions from LED lamps based on EMC standard," 2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC), Bandung, 2016, pp. 132-135, DOI: 10.1109/ICCEREC.2016.7814966.
[12] L. S. Czarnecki, "Considerations on the Reactive Power in Nonsinusoidal Situations," in IEEE Transactions on Instrumentation and Measurement, vol. IM-34, no. 3, pp. 399-404, Sept. 1985, DOI: 10.1109/TIM.1985.4315358.
[13] D. Vieira, R. A. Shayani and M. A. G. de Oliveira, "Reactive Power Billing Under Nonsinusoidal Conditions for Low-Voltage Systems," in IEEE Transactions on Instrumentation and Measurement, vol. 66, no. 8, pp. 2004-2011, Aug. 2017, DOI: 10.1109/TIM.2017.2673058.
[14] C.I. Budeanu, “Puissances reactives et fictives,” Instytut Romain de l'Energie, Bucharest, Romania. 1927.
[15] D. Jeltsema, "Budeanu's concept of reactive and distortion power revisited," 2015 International School on Nonsinusoidal Currents and Compensation (ISNCC), Lagow, 2015, pp. 1-6, DOI: 10.1109/ISNCC.2015.7174697.
[16] IEC 61000-3-2 – “Electromagnetic compatibility (EMC) – Part 3-2: Limits – Limits for harmonic current emissions (equipment input current ≤ 16 A per phase),” 2019
[17] R. Nawrowski, Z. Stein and M. Zielińska, “Analiza wpływu przekraczania dopuszczalnych wartości współczynnika mocy w sieci nn na pracę systemu elektroenergetycznego,” Poznan University of Technology Academic Journals, Electrical Engineering 2013, 74, 111-117.
[18] IEEE 519-1992 - IEEE “Recommended Practices and Requirements for Harmonic Control in Electrical Power Systems,” 1993.
[19] S. Ernst, L. Kotulski, T. Lerch, M. Rad, A. Sȩdziwy and I. Wojnicki “Calculating Reactive Power Compensation for Large-Scale Street Lighting”, Computational Science – ICCS 2020. Amsterdam, June 2020, vol 12138. DOI: 10.1007/978-3-030-50417-5_40.
Go to article

Authors and Affiliations

Tomasz Lerch
1
ORCID: ORCID
Michał Rad
1
ORCID: ORCID
Igor Wojnicki
1

  1. AGH University of Science and Technology, Krakow, Poland
Download PDF Download RIS Download Bibtex

Bibliography

[1] E. Yablonovitch, “Inhibited spontaneous emission in solid-state physics and electronics,” Physical Review Letters, vol. 58, no. 20, p. 2059, 1987.
[2] S. John, “Strong localization of photons in certain disordered dielectric superlattices,” Physical Review Letters, vol. 58, no. 23, p. 2486, 1987.
[3] Y. Pennec, J. O. Vasseur, B. Djafari-Rouhani, L. Dobrzy´nski, and P. A. Deymier, “Two-dimensional phononic crystals: Examples and applications,” Surface Science Reports, vol. 65, no. 8, pp. 229–291, 2010.
[4] R. M. Younis, N. F. Areed, and S. S. Obayya, “Fully integrated and and or optical logic gates,” IEEE Photonics Technology Letters, vol. 26, no. 19, pp. 1900–1903, 2014.
[5] M. Pirzadi, A. Mir, and D. Bodaghi, “Realization of ultra-accurate and compact all-optical photonic crystal or logic gate,” IEEE Photonics Technology Letters, vol. 28, no. 21, pp. 2387–2390, 2016.
[6] E. H. Shaik and N. Rangaswamy, “Phase interference dependent single phc based logic gate structure with t-shaped waveguide as xor, not and or logic gates,” in 2017 Progress in Electromagnetics Research Symposium- Fall (PIERS-FALL). IEEE, 2017, pp. 210–214.
[7] E. Y. Glushko and A. Zakhidov, “Theory of the nonlinear all-optical logical gates based on pbg structures,” in Proceedings of CAOL 2005. Second International Conference on Advanced Optoelectronics and Lasers, 2005., vol. 2. IEEE, 2005, pp. 184–190.
[8] A. Glushko et al., “Nonlinear pbg structures for all-optical signal processing,” in 2006 International Workshop on Laser and Fiber-Optical Networks Modeling. IEEE, 2006, pp. 473–476.
[9] K. Goudarzi, A. Mir, I. Chaharmahali, and D. Goudarzi, “All-optical xor and or logic gates based on line and point defects in 2-d photonic crystal,” Optics & Laser Technology, vol. 78, pp. 139–142, 2016.
[10] S. Mitatha, S. Chaiyasoonthorn, and P. Juleang, “Optical asymmetric key cryptography in rofso for high security using ring resonator system,” in 2019 5th International Conference on Engineering, Applied Sciences and Technology (ICEAST). IEEE, 2019, pp. 1–4.
[11] A. Macker, A. K. Shukla, and V. P. Dubey, “A novel design of all optical and gate based on 2-d photonic crystal,” in 2017 International Conference on Emerging Trends in Computing and Communication Technologies (ICETCCT). IEEE, 2017, pp. 1–3.
[12] M. M. Gupta and S. Medhekar, “All-optical not and and gates using counter propagating beams in nonlinear mach–zehnder interferometer made of photonic crystal waveguides,” Optik, vol. 127, no. 3, pp. 1221– 1228, 2016.
[13] A. Rahmani and M. Asghari, “An ultra-compact and high speed all optical or/nor gate based on nonlinear phcrr,” Optik, vol. 138, pp. 314– 319, 2017.
[14] E. H. Shaik and N. Rangaswamy, “Realization of xnor logic function with all-optical high contrast xor and not gates,” Opto-Electronics Review, vol. 26, no. 1, pp. 63–72, 2018.
[15] G. Joseph and V. Kalyani, “Study of quality factor of silicon based not logic gate using fdtd,” in 2014 International Conference on Computational Intelligence and Communication Networks. IEEE, 2014, pp. 909–912.
[16] E. H. Shaik and N. Rangaswamy, “Investigation on phc based t-shaped waveguide as all-optical xor, not, or and and logic gates,” in 2017 IEEE International Conference on Industrial and Information Systems (ICIIS). IEEE, 2017, pp. 1–6.
[17] K. Bhadel and R. Mehra, “Design and simulation of 2-d photonic crystal based all-optical and logic gate,” in 2014 International Conference on Computational Intelligence and Communication Networks. IEEE, 2014, pp. 973–977.
[18] H. Mondal, S. Chanda, M. Sen, and T. Datta, “All optical and gate based on silicon photonic crystal,” in 2015 International Conference on Microwave and Photonics (ICMAP). IEEE, 2015, pp. 1–2.
[19] M. Pirzadi and A. Mir, “Ultra optimized y-defect waveguide for realizing reliable and robust all-optical logical and gate,” in 2015 23rd Iranian Conference on Electrical Engineering. IEEE, 2015, pp. 1067–1071.
[20] H. Mondal, S. Chanda, and P. Gogoi, “Realization of all-optical logic and gate using dual ring resonator,” in 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT). IEEE, 2016, pp. 553–556.
[21] B. Ghosh, R. R. Pal, and S. Mukhopadhyay, “A new approach to alloptical half-adder by utilizing semiconductor optical amplifier based mzi wavelength converter,” Optik, vol. 122, no. 20, pp. 1804–1807, 2011.
[22] A. Kabilan, X. S. Christina, and P. E. Caroline, “Photonic crystal based all optical or and xo logic gates,” in 2010 Second International conference on Computing, Communication and Networking Technologies. IEEE, 2010, pp. 1–4.
[23] S. Dey, A. K. Shukla, and V. P. Dubey, “Design of all optical logical or gate based on 2-d photonic crystal,” in 2017 International Conference on Emerging Trends in Computing and Communication Technologies (ICETCCT). IEEE, 2017, pp. 1–3.
[24] Y. Wan, M. Yun, L. Xia, and X. Zhao, “13 beam splitter based on self-collimation effect in two-dimensional photonic crystals,” Optik, vol. 122, no. 4, pp. 337–339, 2011.
[25] E. haq Shaik and N. Rangaswamy, “High contrast all-optical xor gate with t-shaped photonic crystal waveguide using phase based interference,” in 2017 Fourteenth International Conference on Wireless and Optical Communications Networks (WOCN). IEEE, 2017, pp. 1–3.
[26] A. Coelho Jr, M. Costa, A. Ferreira, M. Da Silva, M. Lyra, and A. Sombra, “Realization of all-optical logic gates in a triangular triplecore photonic crystal fiber,” Journal of Lightwave Technology, vol. 31, no. 5, pp. 731–739, 2013.
[27] P. Rani, Y. Kalra, and R. Sinha, “Design of all optical logic gates in photonic crystal waveguides,” Optik, vol. 126, no. 9-10, pp. 950–955, 2015.
[28] S. Combri´e, A. Martin, G. Moille, G. Lehoucq, A. De Rossi, J.-P. Reithmaier, L. Bramerie, and M. Gay, “An efficient all-optical gate based on photonic crystals cavities and applications,” in 2014 16th International Conference on Transparent Optical Networks (ICTON). IEEE, 2014, pp. 1–4.
[29] L. E. P. Caballero, J. P. V. Cano, P. S. Guimar˜aes, and O. P. V. Neto, “Effect of structural disorder on photonic crystal logic gates,” IEEE Photonics Journal, vol. 9, no. 5, pp. 1–15, 2017.
[30] P. Rani, Y. Kalra, and R. Sinha, “Realization of and gate in y shaped photonic crystal waveguide,” Optics Communications, vol. 298, pp. 227– 231, 2013.
[31] L. He, W. Zhang, and X. Zhang, “Topological all-optical logic gates based on two-dimensional photonic crystals,” Optics Express, vol. 27, no. 18, pp. 25 841–25 859, 2019.
[32] A. Saharia, N. Mudgal, A. Agarwal, S. Sahu, S. Jain, A. K. Ghunawat, and G. Singh, “A comparative study of various all-optical logic gates,” in Optical and Wireless Technologies. Springer, 2020, pp. 429–437.

Go to article

Authors and Affiliations

Mahesh V. Sonth
1
G. Srikanth
1
Pankaj Agrawal
1
B. Premalatha
2

  1. Department of Electronics and Communication Engineering, CMR Technical Campus, Hyderabad-501401, Telangana, India
  2. Department of Electronics and Communication Engineering, CMR College of Engineering & Technology, Hyderabad-501401,Telangana, India
Download PDF Download RIS Download Bibtex

Abstract

Cyber-attacks are increasing day by day. The generation of data by the population of the world is immensely escalated. The advancements in technology, are intern leading to more chances of vulnerabilities to individual’s personal data. Across the world it became a very big challenge to bring down the threats to data security. These threats are not only targeting the user data and also destroying the whole network infrastructure in the local or global level, the attacks could be hardware or software. Central objective of this paper is to design an intrusion detection system using ensemble learning specifically Decision Trees with distinctive feature selection univariate ANOVA-F test. Decision Trees has been the most popular among ensemble learning methods and it also outperforms among the other classification algorithm in various aspects. With the essence of different feature selection techniques, the performance found to be increased more, and the detection outcome will be less prone to false classification. Analysis of Variance (ANOVA) with F-statistics computations could be a reasonable criterion to choose distinctives features in the given network traffic data. The mentioned technique is applied and tested on NSL KDD network dataset. Various performance measures like accuracy, precision, F-score and Cross Validation curve have drawn to justify the ability of the method.
Go to article

Bibliography

[1] Ektefa, M. Mohammadreza, S. Sara and A. Fatimah, “Intrusion detection using data mining techniques,” 200 - 203. DOI: 10.1109/INFRKM.2010.5466919.
[2] Y. Wang, W. Cai and P. Wei, “A Deep Learning Approach For Detecting Malicious Javascript Code,” Wiley Online Library . February 2016.
[3] C. Yin , Y. Zhu, J. Fei and H. Xinzheng, “A Deep Learning Approach For Intrusion Detection Using Recurrent Neural Networks,” IEEE Access. November 7, 2017.
[4] Q. Niyaz, W. Sun, Y Javaid and A. Mansoor, “A Deep Learning Approach For Network Intrusion Detection system,” In Eai Endorsed Transactions on Security and Safety, Vol. 16, Issue 9, 2016.
[5] M. Preeti, V. Vijay, T. Uday and S. P. Emmanuel, “A Detailed Investigation And Analysis Of Using Machine Learning Techniques For Intrusion Detection,” IEEE Communications Surveys & Tutorials, Volume: 21, Issue:1, First quarter 2019.
[6] Y. Li, M. Rong And R. Jiao, “A Hybrid Malicious Code Detection Method Based On Deep Learning,” International Journal of Software Engineering and Its Applications 9(5):205-216, May 2015.
[7] Gulshan and Krishan, “A Multi-Objective Genetic Algorithm Based Approach For Effective Intrusion Detection Using Neural Networks,” Springer. 2015.
[8] K. Levent and D. C. Alan, “Network Intrusion Detection Using A Hidden Naïve Bayes Binary Classifier,” 2015 17th Uksim-Amss International Conference on Modelling and Simulation (Uksim).
[9] A. Nadjaran, K. Mohsen, “A New Approach To Intrusion Detection Based On An Evolutionary Soft Computing Model Using Neuro-Fuzzy Classifiers,” July 2007, Computer Communications 30(10):2201-2212.
[10] D. Amin and R Mahmood, “Feature Selection Based On Genetic Algorithm And Support Vector Machine For Intrusion Detection System,” The Second International Conference On Informatics Engineering & Information Science (Icieis2013).
[11] A. Preeti and S. Sudhir, “Analysis of KDD Dataset Attributes - Class wise for Intrusion Detection,” Procedia Computer Science, Volume 57, 2015, 842-851,
[12] D. M. Doan, D. H. Jeong and S. Ji, “Designing a Feature Selection Technique for Analyzing Mixed Data,” 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2020, pp. 0046-0052, doi: 10.1109/CCWC47524.2020.9031193.
[13] Campbell and Zachary, “Differentially Private ANOVA Testing,” 2018 1st International Conference on Data Intelligence and Security (ICDIS) (2018): 281-285.
[14] S. K. Murthy, “Automatic Construction of Decision Trees from Data: A Multi-Disciplinary Survey. Data Mining and Knowledge Discovery 2, 345–389 (1998).
[15] S. Dhaliwal, A. Nahid and R. Abbas, “Effective Intrusion Detection System Using XGBoost. Information 2018, 9, 149.
[16] Pedregosa et al., “Scikit-learn: Machine Learning in Python,” JMLR 12, pp. 2825-2830, 2011.

Go to article

Authors and Affiliations

Shaikh Shakeela
1
N. Sai Shankar
1
P Mohan Reddy
1
T. Kavya Tulasi
1
M. Mahesh Koneru
1

  1. ECM, Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP, India
Download PDF Download RIS Download Bibtex

Abstract

Assessment of seismic vulnerability of urban infrastructure is an actual problem, since the damage caused by earthquakes is quite significant. Despite the complexity of such tasks, today’s machine learning methods allow the use of “fast” methods for assessing seismic vulnerability. The article proposes a methodology for assessing the characteristics of typical urban objects that affect their seismic resistance; using classification and clustering methods. For the analysis, we use kmeans and hkmeans clustering methods, where the Euclidean distance is used as a measure of proximity. The optimal number of clusters is determined using the Elbow method. A decision-making model on the seismic resistance of an urban object is presented, also the most important variables that have the greatest impact on the seismic resistance of an urban object are identified. The study shows that the results of clustering coincide with expert estimates, and the characteristic of typical urban objects can be determined as a result of data modeling using clustering algorithms.
Go to article

Bibliography

[1] I. Riedel, Ph. Guéguen, M. D. Mura, E. Pathier, T. Leduc, J. Chanussotet, “Seismic vulnerability assessment of urban environments in moderate-to-low seismic hazard regions using association rule learning and support vector machine methods”, Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer, vol. 76, no. 2, March 2015, pp. 1111-1141, DOI: 10.1007/s11069-014-1538-0.
[2] Z. Zhang, T.-Y. Hsu, H.-H. Wei, J.-H. Chen, “Development of a Data-Mining Technique for Regional-Scale Evaluation of Building Seismic Vulnerability,” Applied Sciences, vol. 9, no. 7, April 2019, p. 1502, DOI: 10.3390/app9071502.
[3] C. S. Chen, M. Y. Cheng, Y. W. Wu, “Seismic assessment of school buildings in Taiwan using the evolutionary support vector machine inference system,” Expert Systems with Applications, vol. 39, no. 4, March 2012, pp. 4102-4110, DOI: 10.1016/j.eswa.2011.09.078.
[4] H. M. Chen, W. K. Kao, H. C. Tsai, “Genetic programming for predicting aseismic abilities of school buildings,” Engineering Applications of Artificial Intelligence, vol. 25, no. 6, Sep. 2012, pp. 1103-1113, DOI: 10.1016/j.engappai.2012.04.002
[5] W. K. Kao, H. M. Chen, J. S. Chou, “Aseismic ability estimation of school building using predictive data mining models,” Expert Systems with Applications, vol. 38, Aug. 2011, pp. 10252-10263, DOI: 10.1016/j.eswa.2011.02.059.
[6] Y. Liu, Z. Li, B. Wei, Xiaoli li, “Seismic vulnerability assessment at urban scale using data mining and GIScience technology: application to Urumqi (China),” Geomatics, Natural Hazards and Risk, vol. 10, no. 1, Jan. 2019, pp. 958-985, DOI: 10.1080/19475705.2018.1524400.
[7] X. Shang, Xibing Li, A. Morales-Esteban, G. A. Cortés, “Data field-based K-means clustering for spatio-temporal seismicity analysis and hazard assessment”, Remote Sensing, vol. 10, no. 3, March 2018, p. 461, DOI:10.3390/rs10030461.
[8] J. Ortega, G. Vasconcelos, H. Rodrigues, M. Correia, “Development of a Numerical Tool for the Seismic Vulnerability Assessment of Vernacular Architecture”, Journal of Earthquake Engineering, pp. 1-29, Sep. 2019, DOI: 10.1080/13632469.2019.1657987.
[9] G. Brando, G. De Matteis, E. Spacone, “Predictive model for the seismic vulnerability assessment of small historic centres: application to the inner Abruzzi Region in Italy”, Engineering Structures, vol. 153, Dec. 2017, pp. 81-96, DOI: 10.1016/j.engstruct.2017.10.013.
[10] C. Drago, R. Ferlito, M. Zucconiс, “Clustering of damage variables for masonry buildings measured after L’Aquila earthquake,” Sep. 2015.
[11] E. Irwansyah, Е. Winarko, “Spatial data clustering and zonation of earthquake building damage hazard area,” The European Physical Journal Conferences, 68. Feb. 2014. DOI: 10.1051/epjconf/20146800005.
[12] A. Guettiche, Ph. Gueguen, “Seismic vulnerability assessment using association rule learning: application to the city of Constantine, Algeria,” Natural Hazards, vol. 86 no. 3, Jan. 2017. doi: 10.1007/s11069-016-2739-5.
[13] I. Riedel, P. Gueguen, F. Dunand, S.Cottaz, “Macroscale vulnerability assessment of cities using association rule learning,” Seismol Res Lett, vol. 85, no. 2, pp. 295–305, 2014.
[14] D. P. Sari, D. Rosadi, A. R. Effendie, D. Danardono, “Application of Bayesian network model in determining the risk of building damage caused by earthquakes,” in 2018 International Conference on Information and Communications Technology, January 2018, pp. 131-135.
[15] D. P. Sari, D. Rosadi, A. R. Effendie, D. Danardono, “K-means and bayesian networks to determine building damage levels,” Computer Science, vol. 17, no. 2, pp. 719–727, April 2019. DOI: 10.12928/telkomnika.v17i2.11756.
[16] R. Zhang, Zh. Chen, S. Chen, J. Zheng, O. Büyüköztürk, H. Sun, “Deep long short-term memory networks for nonlinear structural seismic response prediction,” Computers & Structures, pp. 55-68, Aug. 2019.
[17] V. N. Kasyanov, V. A. Evstigneev, “Graphs in programming: processing, visualization and application,” SPb.: BHV-Petersburg, 2003.
[18] P. J. Tan, D. L. Dowe, “MML inference of decision graph with milti-way and dynamic attributes,” http://www.csse.monash.edu.au/~dld/ Publications/2003/Tan+Dowe2003_MMLDecisionGraphs.pdf.
[19] L. Breiman, “Random forests,” Machine Learning, vol. 45, no. 1, pp. 5-32, 2001.
[20] T. Hastie, R. Tibshirani, J. Friedman, “Chapter 15. Random Forests,” in The Elements of Statistical Learning: Data Mining, Inference, and Prediction, Springer-Verlag, 2009.
[21] M. Pal, “Random forest classifier for remote sensing classification,” International Journal of Remote Sensing, vol. 26, no. 1, pp. 217–222, 2015.
[22] M. Karmenova, A. Nugumanova, A. Tlebaldinova. “Klasternyy analiz dannykh v reshenii zadach po otsenke seysmicheskoy uyazvimosti ob’yektov gorodskoy sredy,” Scientific and technical journal «Vestnik AUES», vol. 1, no. 48, 2020.
[23] M. Karmenova, A. Nugumanova, A. Tlebaldinova, A. Beldeubaev, G. Popova, A. Sedchenko, “Seismic assessment of urban buildings using data mining methods,” ICCTA’20, April 2020, pp 154–159. DOI: 10.1145/3397125.3397152.
[24] L. Breiman, R. Friedman, R. Olshen, C. Stone. “Classification and Regression Trees,” Belmont, California: Wadsworth International, 1984.
[25] J. R. Quinlan, “Simplifying decision trees,” International Journal of ManMachine Studies, vol. 27, pp. 221–234, 1987.
[26] C. P. Chistyakov, “Random forests: an overview,” Proceedings of the Karelian scientific center of the Russian Academy of Sciences, no. 1, pp. 117-136, 2013.
[27] V.F. Rodriguez-Galiano, B. Ghimire, J. Rogan, M. Chica-Olmo, J. P. Rigol-Sanchez, “An assessment of the effectiveness of a random forest classifier for land-cover classification,” ISPRS Journal of Photogrammetry and Remote Sensing, vol. 67, pp. 93-104, Jan 2012.
[28] R. Dzierżak, “Comparison of the influence of standardization and normalization of data on the effectiveness of spongy tissue texture classification,” Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, vol. 9, no. 3, pp. 66-69, Mar. 2019. https://doi.org/10.35784/iapgos.62
[29] Otchet po vyborochnomu obsledovaniyu zdaniy v ramkakh «Issledovaniya po upravleniyu riskami, svyazannymi s seysmicheskimi bedstviyami v gorode Almaty, Respublika Kazakhstan», Almaty, Feb. 2008. https://openjicareport.jica.go.jp/pdf/11961802_02.pdf.

Go to article

Authors and Affiliations

Waldemar Wójcik
1
Markhaba Karmenova
2
Saule Smailova
2
Aizhan Tlebaldinova
3
Alisher Belbeubaev
4

  1. Lublin Technical University, Poland
  2. D. Serikbayev East Kazakhstan State Technical University, Kazakhstan
  3. S. Amanzholov East Kazakhstan State University, Kazakhstan
  4. Cukurova University, Turkey
Download PDF Download RIS Download Bibtex

Abstract

The rapid development of the Internet of Things (IoT) and the wide area of application rise the IoT concept to be the future of the internet. Indeed, IoT environment has a special nature with a lot of constraints in term of resource consumption. Moreover, the data exchanged between things and the internet is big data. In order to achieve efficiency in IoT communication, many technologies and new protocols based on these technologies have been developed. This paper aims to study the performance of Message Queuing Telemetry Transport (MQTT) by implementing this protocol on test-bed network infrastructure and analyzing the performance properties such as delay, jitter, packet loss and throughput for real time and non-real time scenarios. Finally, future research issues in MQTT protocol are suggested.
Go to article

Bibliography

[1] I. T. S. Sector, Recommendation ITU-T Y. 2060, “Overview of the Internet of things. Series Y: Global information infrastructure, internet protocol aspects and next-generation networks-Frameworks and functional architecture models,” 2012. Retrieved from https://www. itu. int/rec/T-REC-Y, 2060-201206.
[2] D. Bandyopadhyay, and J. Sen, “Internet of Things: Applications and Challenges in Technology and Standardization,” Wireless Pers Commun, vol. 58(1), pp. 49-69, 2011. http://dx.doi.org/10.1007/s11277-011-0288-5
[3] MQTT Version 5.0. Edited by Andrew Banks, Ed Briggs, Ken Borgendale, and Rahul Gupta. 07 March 2019. OASIS Standard. https://docs.oasis-open.org/mqtt/mqtt/v5.0/os/mqtt-v5.0-os.html.
[4] Postscapes.com, Internet of Things Examples – Postscapes, 2020. Retrieved 20 April 2020, from http://postscapes.com/internet-of-things-examples/
[5] S. Schneider, Understanding The Protocols Behind The Internet Of Things. Electronicdesign.com, 2013. Retrieved 20 April 2020, from http://electronicdesign.com/iot/understanding-protocols-behind-internet-things
[6] C. Karasiewicz, Why HTTP is not enough for the Internet of Things (The Mobile Frontier). Ibm.com, 2013. Retrieved 20 April 2020, from https://www.ibm.com/developerworks/community/blogs/mobileblog/date/201309?lang=en
[7] IoT Analytics - Market Insights for the Internet Of Things, The 10 most popular Internet of Things applications right now, 2015. Retrieved 20 April 2020, from http://iot-analytics.com/10-internet-of-things-applications/
[8] Mqtt.org, FAQ - Frequently Asked Questions | MQTT, 2020. Retrieved 20 April 2020, from http://mqtt.org/faq
[9] U. Hunkeler, H. L. Truong, and A. Stanford-Clark, “MQTT-S—A publish/subscribe protocol for Wireless Sensor Networks,” In 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE'08), Jan. 2008, pp. 791-798, IEEE. https://doi.org/10.1109/COMSWA.2008.4554519
[10] R. Webb, A Brief, but Practical Introduction to the MQTT Protocol and its Application to IoT | Zoetrope, 2016. Retrieved 20 April 2020, from https://zoetrope.io/tech-blog/brief-practical-introduction-mqtt-protocol-and-its-application-iot

Go to article

Authors and Affiliations

Ghofran Hijazi
1
Mohamed Hadi Habaebi
1
Ahmed Al-Haddad
1
Alhareth Mohammed Zyoud
2

  1. Department of Electrical and Computer Engineering, Faculty of Engineering, International Islamic University Malaysia, Kuala Lumpur, Malaysia
  2. Department of Electrical and Computer Engineering, Faculty of Engineering and Technology, Birzeit University, Birzeit, Ramallah, Palestine
Download PDF Download RIS Download Bibtex

Abstract

The article presents the results of the questionnaire research carried out after the first and repeated after the second semester of crisis remote education, conducted at The Maria Grzegorzewska University. Students participating in the study indicate a significant increase in their IT competences and the level of remote education. They declare a similar, high level of commitment and independence during classes. They indicate that commitment, activity, contact with the lecturers, regularity and quality of work, as well as the adequacy of the grades given are better during traditional education, although their timeliness is higher during distance education. The computer equipment of students and the way of accessing the Internet have not changed significantly. 20% of respondents admitted to using unauthorized assistance during exams. In the statements of students, on the one hand, there is a desire to return to social contacts and traditional classes, and on the other hand, a desire to maintain remote education, associated with the comfort of home-based learning and independence.
Go to article

Bibliography

[1] M. W. Romaniuk, “Digital Competences of Maria Grzegorzewska Academy of Special Education Students – Method and Results of a Survey.” International Journal of Electronics and Telecommunications, 61 (3), 2015, pp. 267-272, DOI: 10.1515/eletel-2015-0035.
[2] M. Händel, M. Stephan, M. Gläser-Zikuda, B. Kopp, S. Bedenlier and A. Ziegler, “Digital readiness and its effects on higher education students’ socio-emotional perceptions in the context of the COVID-19 pandemic.” 22 July 2020, DOI: 10.31234/osf.io/b9pg7
[3] D. A. Bardzińska, ”Kompetencje informatyczne studentów kierunków pedagogicznych,” in Przygotowanie nauczycieli do nowych wyzwań edukacyjnych. Problemy współczesnej edukacji, J. Bojanowicz, K. Ziębakowska-Cecot, Ed. Radom: Wydawnictwo Uniwersytetu Technologiczno-Humanistycznego w Radomiu, 2018, pp. 33-43
[4] M. W. Romaniuk and J. Łukasiewicz-Wieleba, ”Zdalna edukacja kryzysowa w APS w okresie pandemii COVID-19.” Warszawa, 2020. DOI: 10.13140/RG.2.2.18059.52006.
[5] M. W. Romaniuk and J. Łukasiewicz-Wieleba, ”Crisis Remote Education at The Maria Grzegorzewska University During Social Isolation in the Opinions of Students.” International Journal of Electronics and Telecommunications, 66 (4), 2020, pp. 807-812, DOI: 10.24425/ijet.2020.135675.
[6] M. W. Romaniuk, J. Łukasiewicz-Wieleba and S. Kohut, ”Nauczyciele akademiccy wobec kryzysowej edukacji zdalnej.” E-Mentor, 5 (87), 2020, pp. 15-26, DOI: 10.15219/em87.1489.
[7] M. W. Romaniuk and J. Łukasiewicz-Wieleba, ”Crisis Remote Education at The Maria Grzegorzewska University During Social Isolation in the Opinions of Academic Teachers.” International Journal of Electronics and Telecommunications 66 (4), 2020, pp. 801-806, DOI: 10.24425/ijet.2020.135673.
[8] M. W. Romaniuk, ”E-learning in College on the Example of Academy of Special Education.” International Journal of Electronics and Telecommunications, 61 (1), 2015, pp. 25-29, DOI: 10.1515/eletel-2015-0003.
[9] J. M. Mischke, “Przeszkody, powody i utracone korzyści. E-nauczanie w polskich uczelniach wyższych.” in E-edukacja–analiza dokonań i perspektyw rozwoju, M. Dąbrowski, M. Zając, Ed. Warszawa: Fundacja Promocji i Akredytacji Kierunków Ekonomicznych, 2009, pp. 19-24.
[10] J. Kozłowska, ”E-learning jako forma doskonalenia studentów uczelni wyższych.” Rynek–Społeczeństwo–Kultura, 1, 2017, pp. 41-48.
[11] M. Rebizant, ”Nauczanie hybrydowe jako jedna z form kształcenia w uczelni wyższej w opinii studentów Akademii Pedagogiki Specjalnej,” in Pedagogika dialogu. Emancypacyjny potencjał dialogu, D. M. Jankowska, Ed. Warszawa: Wydawnictwo Akademii Pedagogiki Specjalnej, 2017, pp. 252-265
[12] M. Jabłonowska and J. Wiśniewska, ”Wykorzystanie otwartych zasobów edukacyjnych w kształceniu akademickim,” in: Cyberprzestrzeń-Człowiek-Edukacja. T. 5, Otwarte zasoby edukacyjne w perspektywie pedagogicznej, M. Tanaś, S. Galanciak, Ed. Kraków: Oficyna Wydawnicza Impuls, 2020, pp. 93-108
[13] S. Kuruliszwili, ”Samokształcenie i technologie informacyjne – zmienność form i trudność klasyfikacji,” Edukacja Ustawiczna Dorosłych, vol. 104, nr 1, 2019, pp. 39-50
[14] A. H. Rohayani, “A literature review: readiness factors to measuring e-learning readiness in higher education.” Procedia Computer Science, 59, 2015, pp. 230-234.
[15] A. A. M. Al-Araibi, M. Naz’ri bin Mahrin, R. C. M. Yusoff and S. B. Chuprat, “A model for technological aspect of e-learning readiness in higher education.” Education and Information Technologies, 24 (2), 2019, pp. 1395-1431.
[16] L. Pokrzycka, ”Efektywność e-nauczania w szkolnictwie wyższym. Studia przypadków.” Zarządzanie mediami 7 (1), 2019, pp. 15-27. DOI: 10.4467/23540214ZM.18.019.10571
[17] L. R. Amir, I. Tanti, D. A. Maharani, Y. S. Wimardhani, V. Julia, B. Sulijaya and R. Puspitawati, ”Student perspective of classroom and distance learning during COVID-19 pandemic in the undergraduate dental study program Universitas Indonesia.” BMC medical education, 20(392), 2020, pp. 1-8. DOI: 10.1186/s12909-020-02312-0
[18] R. Kalman, M. Macias Esparza and C. Weston, ”Student Views of the Online Learning Process during the COVID-19 Pandemic: A Comparison of Upper-Level and Entry-Level Undergraduate Perspectives.” Journal of Chemical Education, 97(9), 2020, pp. 3353-3357, DOI: 10.1021/acs.jchemed.0c00712
[19] D. Leżański, B. Marek and J. Sobolewska, ”Kształcenie zdalne. Historia prawdziwa oczami studentów.” 2020, Warszawa
[20] K. Hill and R. Fitzgerald, ”Student perspectives of the impact of COVID-19 on learning.” All Ireland Journal of Higher Education, 12 (2), 2020.
[21] A. Elzainy, A. El Sadik and W. Al Abdulmonem, “Experience of e-learning and online assessment during the COVID-19 pandemic at the College of Medicine, Qassim University.” Journal of Taibah University Medical Sciences, 15(6), 2020, pp. 456–462, DOI: 10.1016/j.jtumed.2020.09.005
[22] M. Trzcińska-Król, “Students with special educational needs in distance learning during the COVID-19 pandemic – parents’ opinions.” Interdisciplinary Contexts of Special Pedagogy, no. 29, 2020, pp. 173–191. DOI: 10.14746/ikps.2020.29.08
[23] J. Wiśniewska and J. Łukasiewicz-Wieleba, Budowanie i wzmacnianie relacji w edukacji zdalnej przez nauczycieli młodszych klas szkoły podstawowej. E-mentor, 1 (88), 2021, pp. 37-46, DOI: 10.15219/em88.1501
[24] A. Thakur, “Mental Health in High School Students at the Time of COVID-19: A Student’s Perspective.” Journal of the American Academy of Child and Adolescent Psychiatry, 59 (12), 2020, pp. 1309-1310, DOI: 10.1016/j.jaac.2020.08.005.
Go to article

Authors and Affiliations

Miłosz Wawrzyniec Romaniuk
1
Joanna Łukasiewicz-Wieleba
1

  1. The Maria Grzegorzewska University, Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

The article presents the possibilities of using popular MEMS inertial sensors in the object tilt angle estimation system and in the system for stabilizing the vertical position of the balancing robot. Two research models were built to conduct the experiment. The models use microcontroller development board of the STM32F3 series with the Cortex-M4 core, equipped with a three-axis accelerometer, magnetometer and gyroscope. To determine the accuracy of the angle estimation, comparative tests with a pulse encoder were performed.
Go to article

Bibliography

[1] P. Groves, “Principles of GNSS, Inertial, and Multisensor Integrated Navigation Systems”, Norwood, MA: Artech House, 2008.
[2] J. Collin, P. Davidson, M. Kirkko-Jaakkola, H. Leppäkoski “Inertial Sensors and Their Applications” S. Bhattacharyya, E. Deprettere, R. Leupers, J.Takala “Handbook of Signal Processing Systems”. Springer, 2019, pp.51-85. DOI 10.1007/978-3-319-91734-4_2
[3] M. Labowski, P. Kaniewski, P. Serafin, "Inertial Navigation System for Radar Terrain Imaging," Proceedings of IEEE/ION PLANS 2016, Savannah, GA, pp. 942-948, April 2016.
[4] M. Elhoushi, J. Georgy, A. Noureldin and M. J. Korenberg, "A Survey on Approaches of Motion Mode Recognition Using Sensors," in IEEE Transactions on Intelligent Transportation Systems, vol. 18, no. 7, pp. 1662-1686, July 2017, DOI: 10.1109/TITS.2016.2617200.
[5] B. Aguiar, T. Rocha, J. Silva and I. Sousa, "Accelerometer-based fall detection for smartphones," 2014 IEEE International Symposium on Medical Measurements and Applications (MeMeA), Lisboa, 2014, pp. 1-6, DOI: 10.1109/MeMeA.2014.6860110.
[6] J. M. Darmanin et al., "Development of a High-G Shock Sensor Based on MEMS Technology for Mass-Market Applications," 2019 IEEE International Symposium on Inertial Sensors and Systems (INERTIAL), Naples, FL, USA, 2019, pp. 1-4, DOI: 10.1109/ISISS.2019.8739763.
[7] M. Mansoor, I. Haneef, S. Akhtar, M. A. Rafiq, S. Z. Ali and F. Udrea, "SOI CMOS multi-sensors MEMS chip for aerospace applications," SENSORS, 2014 IEEE, Valencia, Spain, 2014, pp. 1204-1207, DOI: 10.1109/ICSENS.2014.6985225.
[8] A. Mikov, A. Panyov, V. Kosyanchuk and I. Prikhodko, "Sensor Fusion For Land Vehicle Localization Using Inertial MEMS and Odometry," 2019 IEEE International Symposium on Inertial Sensors and Systems (INERTIAL), Naples, FL, USA, 2019, pp. 1-2, DOI: 10.1109/ISISS.2019.8739427.
[9] C. Acar, "High-performance 6-Axis MEMS inertial sensor based on Through-Silicon Via technology," 2016 IEEE International Symposium on Inertial Sensors and Systems, Laguna Beach, CA, 2016, pp. 62-65, DOI: 10.1109/ISISS.2016.7435545.
[10] I. P. Prikhodko, B. Bearss, C. Merritt, J. Bergeron and C. Blackmer, "Towards self-navigating cars using MEMS IMU: Challenges and opportunities," 2018 IEEE International Symposium on Inertial Sensors and Systems (INERTIAL), Moltrasio, 2018, pp. 1-4, DOI: 10.1109/ISISS.2018.8358141.
[11] R. E. Kalman, "A New Approach to Linear Filtering and Prediction Problems." ASME. J. Basic Eng. March 1960; vol. 82, no1, pp. 35–45. DOI 10.1115/1.3662552
[12] J. Gajda, R. Sroka, M. Stencel, T. Żegleń, “Data fusion applications in the traffic parameters measurement”, Metrology and Measurement Systems, vol. 2, no. 3, pp. 249–262, 2005.
[13] S.Chudzik, “The idea of using artificial neural network in measurement system with hot probe for testing parameters of heat-insulating materials”, Measurement, vol. 42 pp. 764–770, 2009.
Go to article

Authors and Affiliations

Stanisław Chudzik
1

  1. Czestochowa University of Technology, Czestochowa, Poland
Download PDF Download RIS Download Bibtex

Abstract

The article describes methods of user identification using authentication based on the second factor. Known algorithms and protocols for two-factor authentication are considered. An algorithm is proposed using mobile devices as identifiers and generating a temporary password based on the hash function of encryption standards. For an automated control system, a two-factor authentication model and a sequential algorithm for generating a temporary password using functions have been developed. The implementation of the system is based on the Node.js software platform using the JavaScript programming language, as well as frameworks and connected system libraries. MongoDB, an open source database management system for information storage and processing was used.
Go to article

Bibliography

1] D. R. Yuryev and O. S. Rogova, “Comparative analysis of two-factor authentication”, Proc. of Int. Conference Technical sciences - from theory to practice to mater SibAK2017, Novosibirsk, 2017, pp.46–51.
[2] Transfer of Customer Details OAuth, (2019, May) [Online], Available: https://www.ibm.com/ developerworks/ru/library/se-oauthjavapt2/index.html
[3] HMAC: Keyed-Hashing for Message Authentication, (2019, May) [Online], Available: https://tools.ietf.org/ html/rfc2104
[4] N. Moretto. (2019, Aug). Two-factor authentication with TOTP, Available: https://medium.com/@n.moretto/two-factor-authentication-with-totp-ccc5f828b6df
[5] O. Ussatova, S. Nyssanbayeva and W. Wójcik, “Development of an authentication model based on the second factor in an automated control system,” KBTU News, vol. 16, pp. 115–118, 2019.
[6] S. Nysanbayeva, W. Wojcik and O. Ussatova, “Algorithm for generating temporary password based on the two-factor authentication model,” Przegląd Elektrotechniczny 5(R95), pp. 101–106, 2019.
[7] Two-factor authentication, (2019, Aug) [Online]. Available: https://www.infobip.com/ru/glossariy/dvukhfaktornaya-autentifikatsiya (last accessed September 07, 2019 y.).
[8] FIPS 140-2 standard and self-encryption technology. (2018, Sep) [Online]. Available: https://www.seagate.com/files/www-content/solutions-content/security-and-encryption/id/docs/faq-fips-sed-lr- mb-605-2-1302-ru.pdf
[9] National Security Agency. (2018, Jun). [Online]. Available: https://www.cryptomuseum.com/intel/nsa/index.htm
[10] O. Ussatova and S. Nyssanbayeva, “Generators of one-time two-factor authentication passwords,” Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska, no. 2(R71), pp. 60–64, 2019.
[11] MongoDB Tutorial. (2019, Sep) [Online]. Available: https://www. tutorialspoint.com/mongodb/index.htm
[12] O. Ussatova, S. Nyssanbayeva and W. Wójcik, “Two-factor authentication algorithm implementation with additional security parameter based on mobile application,”, Proc. on International Conference on Wireless Communication, Network and Multimedia Engineering (WCNME2019), Guilin, 2019, pp. 84–86.
[13] O. Ussatova, S. Nyssanbayeva and W. Wójcik, “Software implementation of two-factor authentication to ensure security when accessing an information system,” News of KazNU im. al-Farabi, 136, pp. 87–95, March 2019.
Go to article

Authors and Affiliations

Olga Ussatova
1 2
Saule Nyssanbayeva
2
Waldemar Wójcik
3

  1. Al-Farabi Kazakh National University, Almaty, Kazakhstan
  2. Institute of Information and Computational Technologies, Almaty, Kazakhstan
  3. Lublin University of Technology, Nadbystrzycka 38a, 20-618 Lublin
Download PDF Download RIS Download Bibtex

Abstract

Beamforming training (BT) is considered as an essential process to accomplish the communications in the millimeter wave (mmWave) band, i.e., 30 ~ 300 GHz. This process aims to find out the best transmit/receive antenna beams to compensate the impairments of the mmWave channel and successfully establish the mmWave link. Typically, the mmWave BT process is highly-time consuming affecting the overall throughput and energy consumption of the mmWave link establishment. In this paper, a machine learning (ML) approach, specifically reinforcement learning (RL), is utilized for enabling the mmWave BT process by modeling it as a multi-armed bandit (MAB) problem with the aim of maximizing the long-term throughput of the constructed mmWave link. Based on this formulation, MAB algorithms such as upper confidence bound (UCB), Thompson sampling (TS), epsilon-greedy (e-greedy), are utilized to address the problem and accomplish the mmWave BT process. Numerical simulations confirm the superior performance of the proposed MAB approach over the existing mmWave BT techniques.
Go to article

Authors and Affiliations

Ehab Mahmoud Mohamed
1 2

  1. Electrical Engineering Dept., College of Engineering, Prince Sattam Bin Abdulaziz University, Wadi Aldwaser 11991, Saudi Arabia
  2. Electrical Engineering Dept., Faculty of Engineering Aswan University, Aswan 81542, Egypt
Download PDF Download RIS Download Bibtex

Abstract

In nuclear facilities, the reading of the sensors is very important in the assessments of the system state. The existence of an abnormal state could be caused by a failure in the sensor itself instead of a failure in the system. So, being unable to identify the main cause of the “abnormal state” and take proper actions may end in unnecessary shutdown for the nuclear facility that may have expensive economic consequences. That is why, it is extremely important for a supervision and control system to identify the case where the failure in the sensor is the main cause for the existence of an abnormal state. In this paper, a system based on a wireless sensor network is proposed to monitor the radiation levels around and inside a nuclear facility. A new approach for validating the sensor readings is proposed and investigated using the Castalia simulator.
Go to article

Authors and Affiliations

Mohamed Yehia Habash
1
Nabil Mohamed Abd Elfatah Ayad
1
Abd Elhady Abd Elazim Ammar
2

  1. Nuclear Research Center, Egyptian Atomic Energy Authority, Egypt
  2. Electrical Engineering Dept., Faculty of Engineering, Al azhar University, Egypt
Download PDF Download RIS Download Bibtex

Abstract

The validation of the measurements quality after on-site diagnostic system installation is necessary in order to provide reliable data and output results. This topic is often neglected or not discussed in detail regarding measurement systems. In the paper recently installed system for soft X-ray measurements is described in introduction. The system is based on multichannel GEM detector and the data is collected and sent in special format to PC unit for further postprocessing. The unique feature of the system is the ability to compute final data based on raw data only. The raw data is selected upon algorithms by FPGA units. The FPGAs are connected to the analog frontend of the system and able to register all of the signals and collect the useful data. The interface used for data streaming is PCIe Gen2 x4 for each FPGA, therefore high throughput of the system is ensured. The paper then discusses the properties of the installation environment of the system and basic functionality mode. New features are described, both in theoretical and practical approach. New modes correspond to the data quality monitoring features implemented for the system, that provide extra information to the postprocessing stage and final algorithms. In the article is described also additional mode to perform hardware simulation of signals in a tokamak-like environment using FPGAs. The summary describes the implemented features of the data quality monitoring features and additional modes of the system.
Go to article

Authors and Affiliations

Andrzej Wojenski
1
Paweł Linczuk
1
Piotr Kolasinski
1
Maryna Chernyshova
2
Didier Mazon
3
Grzegorz Kasprowicz
1
Krzysztof T. Pozniak
1
Michał Gaska
1
Tomasz Czarski
2
Rafał Krawczyk
1 4

  1. Warsaw University of Technology, Institute of Electronics Systems, Poland
  2. Institute of Plasma Physics and Laser Microfusion, Warsaw, Poland
  3. CEA, Saint-Paul-lez-Durance, France
  4. CERN, Geneva, Switzerland
Download PDF Download RIS Download Bibtex

Abstract

A novel approach to a trigger mode in the Gas Electron Multiplier (GEM) detector readout system is presented. The system is already installed at WEST tokamak. The article briefly describes the architecture of the GEM detector and the measurement system. Currently the system can work in two trigger modes: Global Trigger and Local Trigger. All trigger processing blocks are parts of the Charge Signal Sequencer module which is responsible for transferring data to the PC. Therefore, the article presents structure of the Sequencer with details about basic blocks, theirs functionality and output data configuration. The Sequencer with the trigger algorithms is implemented in an FPGA chip from Xilinx. Global Trigger, which is a default mode for the system, is not efficient and has limitations due to storing much data without any information. Local trigger which is under tests, removes data redundancy and is constructed to send only valid data, but the rest of the software, especially on the PC side, is still under development. Therefore authors propose the trigger mode which combines functionality of two existing modes. The proposed trigger, called Zero Suppression Trigger, is compatible with the existing interfaces of the PC software, but is also capable to verify and filter incoming signals and transfer only recognized events. The results of the implementation and simulation are presented.
Go to article

Authors and Affiliations

Piotr Kolasinski
1
Krzysztof Pozniak
1
Andrzej Wojenski
1
Paweł Linczuk
2
Rafał Krawczyk
1 3
Michał Gaska
1
Wojciech Zabolotny
1
Grzegorz Kasprowicz
1
Maryna Chernyshova
4
Tomasz Czarski
4

  1. Institute of Electronic Systems, Faculty of Electronics and Information Technology, University of Technology, Warsaw, Poland
  2. Institute of Electronic Systems, Faculty of Electronics and Information Technology, University of Technology, Warsaw, Poland
  3. CERN, Geneva, Switzerland
  4. Institute of Plasma Physics and Laser Microfusion, Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

The article herein presents a new technique of controlling the system of collecting, storing and processing the information from the solar collectors, which might be applied to heating the industrial and domestic compartments for hot water supply. The most profitable usage of the solar collectors in the industry is replacement of a human interference with wireless sensor nets. The solar collector standard system consumes in average 30% of the heat due to poor control and configuration. Our monitoring and control system allows upgrade the performance of heating the industrial and domestic premises by means of solar collector for hot water supply.
Go to article

Authors and Affiliations

Waldemar Wojcik
1
Yedilhan Amirgaliyev
2
Murat Kunelbayev
2
Aliya Kalizhanova
2
Ainur Kozbakova
2
Talgat Sundetov
Didar Yedilkhan
3

  1. Lublin Technical University, Poland
  2. Institute of Information and Computational Technologies CS MES RK, Al-Farabi Kazakh National University
  3. Institute of Information and Computational Technologies CS MES RK, Astana IT University
Download PDF Download RIS Download Bibtex

Abstract

The paper discusses the characteristics of spatial electromagnetic noise generators, as well as the formation of a broadband noise signal. A number of well-known methods for assessing the quality of masking noise interference and the approaches used in them have been described. Approaches to the measurement of masking noise were also determined in assessing their quality. In conclusion, additional methods are proposed for assessing the quality of masking noises, such as searching for correlation of noise in different frequency sub-bands and using statistical and (or) graphical methods (tests) for randomness.
Go to article

Authors and Affiliations

Nurzhigit Smailov
1
Askhat Batyrgaliyev
1
Ainur Akhmediyarova
2
Nurgul Seilova
1
Madina Koshkinbayeva
3
Moldir Baigulbayeva
4
Ryszard Romaniuk
5
Maxat Orunbekov
6
Kabdoldina Assem
4
Andrzej Kotyra
7

  1. Satpayev University, 050000 Almaty, Kazakhstan
  2. Institute of Information and Computational Technology, 050010 Almaty, Kazakhstan
  3. Miras University, 160012 Shymkent, Kazakhstan
  4. Al-Farabi Kazakh National University, 050040 Almaty, Kazakhstan
  5. Warsaw University of Technology, Poland
  6. Kazakh Academy of Transport and Communications named after M.Tynyshpayev, Almaty, Kazakhstan
  7. Lublin University of Technology, Lublin, Poland
Download PDF Download RIS Download Bibtex

Abstract

In this paper, it has been shown that the spectrum aliasing and folding effects occur only in the case of non-ideal signal sampling. When the duration of the signal sampling is equal to zero, these effects do not occur at all. In other words, the absolutely necessary condition for their occurrence is just a nonzero value of this time. Periodicity of the sampling process plays a secondary role.
Go to article

Authors and Affiliations

Andrzej Borys
1
ORCID: ORCID

  1. Department of Marine Telecommunications, Faculty of Electrical Engineering, Gdynia Maritime University, Gdynia, Poland
Download PDF Download RIS Download Bibtex

Abstract

A new model of ideal signal sampling operation is developed in this paper. This model does not use the Dirac comb in an analytical description of sampled signals in the continuous time domain. Instead, it utilizes functions of a continuous time variable, which are introduced in this paper: a basic Kronecker time function and a Kronecker comb (that exploits the first of them). But, a basic principle behind this model remains the same; that is it is also a multiplier which multiplies a signal of a continuous time by a comb. Using a concept of a signal object (or utilizing equivalent arguments) presented elsewhere, it has been possible to find a correct expression describing the spectrum of a sampled signal so modelled. Moreover, the analysis of this expression showed that aliases and folding effects cannot occur in the sampled signal spectrum, provided that the signal sampling is performed ideally.
Go to article

Authors and Affiliations

Andrzej Borys
1
ORCID: ORCID

  1. Department of Marine Telecommunications, Faculty of Electrical Engineering, Gdynia Maritime University, Gdynia, Poland

This page uses 'cookies'. Learn more