{"title":"Warm start oriented discrete coordinate descent for dynamic CVR: A UK case study","authors":"H. Gharavi, X. Liu, S. McLoone","doi":"10.1109/ISSC.2017.7983628","DOIUrl":"https://doi.org/10.1109/ISSC.2017.7983628","url":null,"abstract":"Conservation Voltage Reduction (CVR) has been found to be an effective methodology for dealing with thermal and voltage challenges caused by increasing penetration of low carbon technologies in power system distribution networks. Using validated openDSS simulation models of a number of distribution networks in the greater Manchester area in the UK, this paper evaluates the effectiveness of dynamically optimized CVR for energy reduction on distribution networks equipped with tap-changing transformers and switchable capacitor banks. Optimization of these controllable devices is carried out every 30 minutes using an oriented discrete coordinate descent (ODCD) algorithm, with a warm start strategy adopted to address local minima issues. Results show that the performance of warm start ODCD is comparable to Particle Swarm Optimisation, a benchmark global optimization technique, at a substantially reduced computation cost. The resulting dynamically optimized CVR yields an average reduction in energy consumption of 8% relative to nominal operating conditions for the low voltage distribution networks considered in the study.","PeriodicalId":170320,"journal":{"name":"2017 28th Irish Signals and Systems Conference (ISSC)","volume":"29 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132286364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daniel O'Keeffe, S. Riverso, L. Albiol-Tendillo, Gordon Lightbodyt
{"title":"Distributed hierarchical droop control of boost converters in DC microgrids","authors":"Daniel O'Keeffe, S. Riverso, L. Albiol-Tendillo, Gordon Lightbodyt","doi":"10.1109/ISSC.2017.7983615","DOIUrl":"https://doi.org/10.1109/ISSC.2017.7983615","url":null,"abstract":"Voltage stability and accurate current-sharing are primary features of an efficiently operating power distribution network, such as a dc islanded-microgrid. This paper presents the development of a distributed hierarchical droop control architecture for dc-dc boost converters within a dc islanded-microgrid. Decentralised controllers are conventionally designed for local voltage and current control without accounting for coupling to other converters. However, due to the non-minimum phase action of boost converters, global knowledge of coupling is required to inform stable local controller tuning over a range of load disturbances. Consensus-based distributed secondary controllers, utilising low-bandwidth communications, are designed to coordinate voltage levels and improve current-sharing accuracy. The control architecture is tested in response to communication faults, non-linear loads, and plug-and-play operations.","PeriodicalId":170320,"journal":{"name":"2017 28th Irish Signals and Systems Conference (ISSC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114533109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive sliding window load forecasting","authors":"J. Foster, X. Liu, S. McLoone","doi":"10.1109/ISSC.2017.7983638","DOIUrl":"https://doi.org/10.1109/ISSC.2017.7983638","url":null,"abstract":"Small-scale, renewable generation which is embedded in the distribution network is causing previously unseen fluctuations in demand. In Northern Ireland this new generation, which is not visible to, or controllable by, the system operator, is presenting major challenges for accurate load forecasting. Currently deployed load forecasting methods are struggling to cope due to the rapid growth in this new generation, and its weather dependent nature. In this paper linear load forecasting methods are investigated within a sliding window parameter updating framework, which is adopted to address the non-stationarity of the problem. Initially, models are built using historical load terms selected based on correlation analysis of recorded load data. Then, Forward Selection Regression is used to choose the most important variables from a candidate set, consisting of historical load variables and a range of weather related parameters. Model performance is evaluated on load data for the period 2015–2016. A 7-input model, with parameters updated on the basis of a 5-day sliding window of historical data, is shown to yield optimal results, with a mean absolution percentage error of 2.4%.","PeriodicalId":170320,"journal":{"name":"2017 28th Irish Signals and Systems Conference (ISSC)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126333387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Functional safety and Industrie 4.0","authors":"T. Meany","doi":"10.1109/ISSC.2017.7983633","DOIUrl":"https://doi.org/10.1109/ISSC.2017.7983633","url":null,"abstract":"Industrie 4.0 offers a new vision for the factories of the future. In these factories of the future safety will be critical. Functional safety addresses confidence that a piece of equipment will carry out its safety functionality when required to do so. It is an active form of safety in contrast to other forms of safety. Integrated circuits are fundamental in the implementation of functional safety and therefore to Industrie 4.0. This paper explores the implications of functional safety for Industrie 4.0. The implications include requirements for networks, security, robots/cobots and software and the semiconductors used to implement these features.","PeriodicalId":170320,"journal":{"name":"2017 28th Irish Signals and Systems Conference (ISSC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115797224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A ZigBee honeypot to assess IoT cyberattack behaviour","authors":"Seamus Dowling, M. Schukat, H. Melvin","doi":"10.1109/ISSC.2017.7983603","DOIUrl":"https://doi.org/10.1109/ISSC.2017.7983603","url":null,"abstract":"Wireless Personal Area Networks (WPAN) allow for the implementation of applications such as home automation, remote control services, near-field technologies and personal health care management. Security is a critical requirement of the standards and protocols for these environments. One suite of layered protocols within WPAN is ZigBee. ZigBee is a low bit rate protocol utilised in Wireless Sensor Networks (WSN). Attacks such as physical, crypto key interception, injection and replay are perpetrated on ZigBee networks. These attacks can be instigated and controlled within the physical ZigBee WSN location or via a gateway. This paper creates a honeypot that simulates a ZigBee gateway. It is designed to assess the presence of ZigBee attack intelligence on a SSH attack vector. It captures all attack traffic for retrospective analysis. It sandboxes attacks of interest to determine if any attempts are targeting ZigBee specifically. Finally it concludes that all captured mass attacks are mainstream DDoS and bot malware, whereas individual attackers where attracted to and interacted with the ZigBee simulated Honeypot.","PeriodicalId":170320,"journal":{"name":"2017 28th Irish Signals and Systems Conference (ISSC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121074449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An evaluation of the UniDoodle student reponse system in a first year systems and control module","authors":"S. McLoone, Christine Kelly","doi":"10.1109/ISSC.2017.7983610","DOIUrl":"https://doi.org/10.1109/ISSC.2017.7983610","url":null,"abstract":"UniDoodle is a multi-platform, smart device based student response system that provides a freeform-style input using sketch capabilities. This offers significant advantages over existing student response systems, such as Clickers, which are limited in their input capabilities and generally only allow for a multiple-choice selection. In contrast, UniDoodle caters for writing equations, drawing diagrams, annotating figures or any form of graphical input. The key focus of this paper is to evaluate the use of this response system in an active classroom environment over an extended period of time. Fundamentally, we wish to address the following key questions in relation to UniDoodle: do students find it easy to use; do they find it beneficial to their own learning; does the lecturer find the sketch-based student responses beneficial; and how does the use of this response system affect the typical classroom lecture? Here, UniDoodle was used in a first year Systems and Control module, in the Dept. of Electronic Engineering in Maynooth University, for the duration of an entire semester. This paper will present an outline of the UniDoodle system and its key features, details of the actual evaluation with some sample questions, and a summary of the student and lecturer feedback obtained.","PeriodicalId":170320,"journal":{"name":"2017 28th Irish Signals and Systems Conference (ISSC)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128734978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advanced methodologies to deter internal attacks in PTP time synchronization networks","authors":"Waleed Alghamdi, M. Schukat","doi":"10.1109/ISSC.2017.7983636","DOIUrl":"https://doi.org/10.1109/ISSC.2017.7983636","url":null,"abstract":"High accurate time synchronization is very important for many applications and industrial environments. In a computer network, synchronization of time for connected devices is provided by the Precision Time Protocol (PTP), which in principal allows for device time synchronization down to microsecond level. However, PTP and network infrastructures are vulnerable to cyber-attacks, which can de-synchronize an entire network, leading to potentially devastating consequences. This paper will focus on the issue of internal attacks on time synchronization networks and discuss how counter-measures based on public key infrastructures, trusted platform modules, network intrusion detection systems and time synchronization supervisors can be adopted to defeat or at least detect such internal attacks.","PeriodicalId":170320,"journal":{"name":"2017 28th Irish Signals and Systems Conference (ISSC)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116273007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mariusz P. Wilk, A. Urru, Salvatore Tedesco, B. O’flynn
{"title":"Sub-pixel point detection algorithm for point tracking with low-power wearable camera systems: A simplified linear interpolation","authors":"Mariusz P. Wilk, A. Urru, Salvatore Tedesco, B. O’flynn","doi":"10.1109/ISSC.2017.7983629","DOIUrl":"https://doi.org/10.1109/ISSC.2017.7983629","url":null,"abstract":"With the continuous developments in vision sensor technology, highly miniaturized low-power and wearable vision sensing is becoming a reality. Several wearable vision applications exist which involve point tracking. The ability to efficiently detect points at a sub-pixel level can be beneficial, as the accuracy of point detection is no longer limited to the resolution of the vision sensor. In this work, we propose a novel Simplified Linear Interpolation (SLI) algorithm that achieves high computational efficiency, which outperforms existing algorithms in terms of the accuracy under certain conditions. We present the principles underlying our algorithm and evaluate it in a series of test scenarios. Its performance is finally compared to similar algorithms currently available in the literature.","PeriodicalId":170320,"journal":{"name":"2017 28th Irish Signals and Systems Conference (ISSC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131789378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An analysis of loss-free data aggregation for high data reliability in wireless sensor networks","authors":"Stephen Brown","doi":"10.1109/ISSC.2017.7983622","DOIUrl":"https://doi.org/10.1109/ISSC.2017.7983622","url":null,"abstract":"Data aggregation is am important feature in Wireless Sensor Networks, used primarily to reduce energy use. This paper extends our previous results, which showed that data aggregation can improve the reliability of data delivery rather than degrading it as previously assumed. These previous results were based on the use of scaleable aggregation functions, such as SUM, COUNT, MIN, MAX which work independently of the network size. In this paper we extend these results to consider the reliability and energy efficiency of lossless data delivery with the semi-scaleable aggregation function APPEND, and determine the boundary conditions under which the data reliability can be maintained without an increase in the energy cost. These new results show that lossless aggregation using the APPEND aggregation function can provide improved reliability with reduced energy usage in certain conditions.","PeriodicalId":170320,"journal":{"name":"2017 28th Irish Signals and Systems Conference (ISSC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133274042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach for secure identity authentication in legacy database systems","authors":"Juanita Blue, Eoghan Furey, J. Condell","doi":"10.1109/ISSC.2017.7983624","DOIUrl":"https://doi.org/10.1109/ISSC.2017.7983624","url":null,"abstract":"Information systems in the digital age have become increasingly dependent on databases to store a multitude of fundamental data. A key function of structured databases is to house authentication credentials that verify identity and allow users to access more salient personal data. Authentication databases are frequently a target of attack as they potentially provide an avenue to commit further, more lucrative crimes. Despite the provision of industry standard best practice recommendations from organisations such as Open Web Application Security Project (OWASP), Payment Card Industry Security Standards Council (PCI-SSC), Internet Engineering Task Force (IETF) and Institute of Electrical and Electronics Engineers (IEEE), often practical security implementations within industry flounder. Lacking or substandard implementations have cultivated an environment where authentication databases and the data stored therein are insecure. This was demonstrated in the 2016 exposure of a breach experienced by Yahoo where approximately one billion user credentials were stolen. The global technology company was found to be using obsolete security mechanisms to protect user passwords. Dated implementations such as these pose serious threat as they render authentication data highly vulnerable to theft and potential misuse. This paper offers a novel solution for securing authentication databases on non-compliant Apache servers. The method applies the recommended best practice mechanisms in the form of salt, one-way encryption (hashing) and iterations to both pre-existing and newly created passwords that are stored on insecure systems. The proposed solution can be implemented server-side, with little alteration to the existing infrastructure, unbeknownst to the user. It possesses the potential to improve system security, aid compliance, preserve privacy and protect users.","PeriodicalId":170320,"journal":{"name":"2017 28th Irish Signals and Systems Conference (ISSC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115719725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}