2017 28th Irish Signals and Systems Conference (ISSC)最新文献

筛选
英文 中文
Warm start oriented discrete coordinate descent for dynamic CVR: A UK case study 面向热启动的动态CVR离散坐标下降:一个英国案例研究
2017 28th Irish Signals and Systems Conference (ISSC) Pub Date : 2017-07-20 DOI: 10.1109/ISSC.2017.7983628
H. Gharavi, X. Liu, S. McLoone
{"title":"Warm start oriented discrete coordinate descent for dynamic CVR: A UK case study","authors":"H. Gharavi, X. Liu, S. McLoone","doi":"10.1109/ISSC.2017.7983628","DOIUrl":"https://doi.org/10.1109/ISSC.2017.7983628","url":null,"abstract":"Conservation Voltage Reduction (CVR) has been found to be an effective methodology for dealing with thermal and voltage challenges caused by increasing penetration of low carbon technologies in power system distribution networks. Using validated openDSS simulation models of a number of distribution networks in the greater Manchester area in the UK, this paper evaluates the effectiveness of dynamically optimized CVR for energy reduction on distribution networks equipped with tap-changing transformers and switchable capacitor banks. Optimization of these controllable devices is carried out every 30 minutes using an oriented discrete coordinate descent (ODCD) algorithm, with a warm start strategy adopted to address local minima issues. Results show that the performance of warm start ODCD is comparable to Particle Swarm Optimisation, a benchmark global optimization technique, at a substantially reduced computation cost. The resulting dynamically optimized CVR yields an average reduction in energy consumption of 8% relative to nominal operating conditions for the low voltage distribution networks considered in the study.","PeriodicalId":170320,"journal":{"name":"2017 28th Irish Signals and Systems Conference (ISSC)","volume":"29 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132286364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Distributed hierarchical droop control of boost converters in DC microgrids 直流微电网升压变换器的分布式分层下垂控制
2017 28th Irish Signals and Systems Conference (ISSC) Pub Date : 2017-07-20 DOI: 10.1109/ISSC.2017.7983615
Daniel O'Keeffe, S. Riverso, L. Albiol-Tendillo, Gordon Lightbodyt
{"title":"Distributed hierarchical droop control of boost converters in DC microgrids","authors":"Daniel O'Keeffe, S. Riverso, L. Albiol-Tendillo, Gordon Lightbodyt","doi":"10.1109/ISSC.2017.7983615","DOIUrl":"https://doi.org/10.1109/ISSC.2017.7983615","url":null,"abstract":"Voltage stability and accurate current-sharing are primary features of an efficiently operating power distribution network, such as a dc islanded-microgrid. This paper presents the development of a distributed hierarchical droop control architecture for dc-dc boost converters within a dc islanded-microgrid. Decentralised controllers are conventionally designed for local voltage and current control without accounting for coupling to other converters. However, due to the non-minimum phase action of boost converters, global knowledge of coupling is required to inform stable local controller tuning over a range of load disturbances. Consensus-based distributed secondary controllers, utilising low-bandwidth communications, are designed to coordinate voltage levels and improve current-sharing accuracy. The control architecture is tested in response to communication faults, non-linear loads, and plug-and-play operations.","PeriodicalId":170320,"journal":{"name":"2017 28th Irish Signals and Systems Conference (ISSC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114533109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Adaptive sliding window load forecasting 自适应滑动窗口负荷预测
2017 28th Irish Signals and Systems Conference (ISSC) Pub Date : 2017-07-18 DOI: 10.1109/ISSC.2017.7983638
J. Foster, X. Liu, S. McLoone
{"title":"Adaptive sliding window load forecasting","authors":"J. Foster, X. Liu, S. McLoone","doi":"10.1109/ISSC.2017.7983638","DOIUrl":"https://doi.org/10.1109/ISSC.2017.7983638","url":null,"abstract":"Small-scale, renewable generation which is embedded in the distribution network is causing previously unseen fluctuations in demand. In Northern Ireland this new generation, which is not visible to, or controllable by, the system operator, is presenting major challenges for accurate load forecasting. Currently deployed load forecasting methods are struggling to cope due to the rapid growth in this new generation, and its weather dependent nature. In this paper linear load forecasting methods are investigated within a sliding window parameter updating framework, which is adopted to address the non-stationarity of the problem. Initially, models are built using historical load terms selected based on correlation analysis of recorded load data. Then, Forward Selection Regression is used to choose the most important variables from a candidate set, consisting of historical load variables and a range of weather related parameters. Model performance is evaluated on load data for the period 2015–2016. A 7-input model, with parameters updated on the basis of a 5-day sliding window of historical data, is shown to yield optimal results, with a mean absolution percentage error of 2.4%.","PeriodicalId":170320,"journal":{"name":"2017 28th Irish Signals and Systems Conference (ISSC)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126333387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Functional safety and Industrie 4.0 功能安全和工业4.0
2017 28th Irish Signals and Systems Conference (ISSC) Pub Date : 2017-06-20 DOI: 10.1109/ISSC.2017.7983633
T. Meany
{"title":"Functional safety and Industrie 4.0","authors":"T. Meany","doi":"10.1109/ISSC.2017.7983633","DOIUrl":"https://doi.org/10.1109/ISSC.2017.7983633","url":null,"abstract":"Industrie 4.0 offers a new vision for the factories of the future. In these factories of the future safety will be critical. Functional safety addresses confidence that a piece of equipment will carry out its safety functionality when required to do so. It is an active form of safety in contrast to other forms of safety. Integrated circuits are fundamental in the implementation of functional safety and therefore to Industrie 4.0. This paper explores the implications of functional safety for Industrie 4.0. The implications include requirements for networks, security, robots/cobots and software and the semiconductors used to implement these features.","PeriodicalId":170320,"journal":{"name":"2017 28th Irish Signals and Systems Conference (ISSC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115797224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A ZigBee honeypot to assess IoT cyberattack behaviour ZigBee蜜罐用于评估物联网网络攻击行为
2017 28th Irish Signals and Systems Conference (ISSC) Pub Date : 2017-06-20 DOI: 10.1109/ISSC.2017.7983603
Seamus Dowling, M. Schukat, H. Melvin
{"title":"A ZigBee honeypot to assess IoT cyberattack behaviour","authors":"Seamus Dowling, M. Schukat, H. Melvin","doi":"10.1109/ISSC.2017.7983603","DOIUrl":"https://doi.org/10.1109/ISSC.2017.7983603","url":null,"abstract":"Wireless Personal Area Networks (WPAN) allow for the implementation of applications such as home automation, remote control services, near-field technologies and personal health care management. Security is a critical requirement of the standards and protocols for these environments. One suite of layered protocols within WPAN is ZigBee. ZigBee is a low bit rate protocol utilised in Wireless Sensor Networks (WSN). Attacks such as physical, crypto key interception, injection and replay are perpetrated on ZigBee networks. These attacks can be instigated and controlled within the physical ZigBee WSN location or via a gateway. This paper creates a honeypot that simulates a ZigBee gateway. It is designed to assess the presence of ZigBee attack intelligence on a SSH attack vector. It captures all attack traffic for retrospective analysis. It sandboxes attacks of interest to determine if any attempts are targeting ZigBee specifically. Finally it concludes that all captured mass attacks are mainstream DDoS and bot malware, whereas individual attackers where attracted to and interacted with the ZigBee simulated Honeypot.","PeriodicalId":170320,"journal":{"name":"2017 28th Irish Signals and Systems Conference (ISSC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121074449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
An evaluation of the UniDoodle student reponse system in a first year systems and control module 对UniDoodle学生反应系统在第一年的系统和控制模块的评估
2017 28th Irish Signals and Systems Conference (ISSC) Pub Date : 2017-06-20 DOI: 10.1109/ISSC.2017.7983610
S. McLoone, Christine Kelly
{"title":"An evaluation of the UniDoodle student reponse system in a first year systems and control module","authors":"S. McLoone, Christine Kelly","doi":"10.1109/ISSC.2017.7983610","DOIUrl":"https://doi.org/10.1109/ISSC.2017.7983610","url":null,"abstract":"UniDoodle is a multi-platform, smart device based student response system that provides a freeform-style input using sketch capabilities. This offers significant advantages over existing student response systems, such as Clickers, which are limited in their input capabilities and generally only allow for a multiple-choice selection. In contrast, UniDoodle caters for writing equations, drawing diagrams, annotating figures or any form of graphical input. The key focus of this paper is to evaluate the use of this response system in an active classroom environment over an extended period of time. Fundamentally, we wish to address the following key questions in relation to UniDoodle: do students find it easy to use; do they find it beneficial to their own learning; does the lecturer find the sketch-based student responses beneficial; and how does the use of this response system affect the typical classroom lecture? Here, UniDoodle was used in a first year Systems and Control module, in the Dept. of Electronic Engineering in Maynooth University, for the duration of an entire semester. This paper will present an outline of the UniDoodle system and its key features, details of the actual evaluation with some sample questions, and a summary of the student and lecturer feedback obtained.","PeriodicalId":170320,"journal":{"name":"2017 28th Irish Signals and Systems Conference (ISSC)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128734978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Advanced methodologies to deter internal attacks in PTP time synchronization networks 阻止PTP时间同步网络内部攻击的高级方法
2017 28th Irish Signals and Systems Conference (ISSC) Pub Date : 2017-06-01 DOI: 10.1109/ISSC.2017.7983636
Waleed Alghamdi, M. Schukat
{"title":"Advanced methodologies to deter internal attacks in PTP time synchronization networks","authors":"Waleed Alghamdi, M. Schukat","doi":"10.1109/ISSC.2017.7983636","DOIUrl":"https://doi.org/10.1109/ISSC.2017.7983636","url":null,"abstract":"High accurate time synchronization is very important for many applications and industrial environments. In a computer network, synchronization of time for connected devices is provided by the Precision Time Protocol (PTP), which in principal allows for device time synchronization down to microsecond level. However, PTP and network infrastructures are vulnerable to cyber-attacks, which can de-synchronize an entire network, leading to potentially devastating consequences. This paper will focus on the issue of internal attacks on time synchronization networks and discuss how counter-measures based on public key infrastructures, trusted platform modules, network intrusion detection systems and time synchronization supervisors can be adopted to defeat or at least detect such internal attacks.","PeriodicalId":170320,"journal":{"name":"2017 28th Irish Signals and Systems Conference (ISSC)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116273007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Sub-pixel point detection algorithm for point tracking with low-power wearable camera systems: A simplified linear interpolation 低功耗可穿戴相机系统点跟踪的亚像素点检测算法:一种简化的线性插值
2017 28th Irish Signals and Systems Conference (ISSC) Pub Date : 2017-06-01 DOI: 10.1109/ISSC.2017.7983629
Mariusz P. Wilk, A. Urru, Salvatore Tedesco, B. O’flynn
{"title":"Sub-pixel point detection algorithm for point tracking with low-power wearable camera systems: A simplified linear interpolation","authors":"Mariusz P. Wilk, A. Urru, Salvatore Tedesco, B. O’flynn","doi":"10.1109/ISSC.2017.7983629","DOIUrl":"https://doi.org/10.1109/ISSC.2017.7983629","url":null,"abstract":"With the continuous developments in vision sensor technology, highly miniaturized low-power and wearable vision sensing is becoming a reality. Several wearable vision applications exist which involve point tracking. The ability to efficiently detect points at a sub-pixel level can be beneficial, as the accuracy of point detection is no longer limited to the resolution of the vision sensor. In this work, we propose a novel Simplified Linear Interpolation (SLI) algorithm that achieves high computational efficiency, which outperforms existing algorithms in terms of the accuracy under certain conditions. We present the principles underlying our algorithm and evaluate it in a series of test scenarios. Its performance is finally compared to similar algorithms currently available in the literature.","PeriodicalId":170320,"journal":{"name":"2017 28th Irish Signals and Systems Conference (ISSC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131789378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An analysis of loss-free data aggregation for high data reliability in wireless sensor networks 面向无线传感器网络高数据可靠性的无丢失数据聚合分析
2017 28th Irish Signals and Systems Conference (ISSC) Pub Date : 2017-06-01 DOI: 10.1109/ISSC.2017.7983622
Stephen Brown
{"title":"An analysis of loss-free data aggregation for high data reliability in wireless sensor networks","authors":"Stephen Brown","doi":"10.1109/ISSC.2017.7983622","DOIUrl":"https://doi.org/10.1109/ISSC.2017.7983622","url":null,"abstract":"Data aggregation is am important feature in Wireless Sensor Networks, used primarily to reduce energy use. This paper extends our previous results, which showed that data aggregation can improve the reliability of data delivery rather than degrading it as previously assumed. These previous results were based on the use of scaleable aggregation functions, such as SUM, COUNT, MIN, MAX which work independently of the network size. In this paper we extend these results to consider the reliability and energy efficiency of lossless data delivery with the semi-scaleable aggregation function APPEND, and determine the boundary conditions under which the data reliability can be maintained without an increase in the energy cost. These new results show that lossless aggregation using the APPEND aggregation function can provide improved reliability with reduced energy usage in certain conditions.","PeriodicalId":170320,"journal":{"name":"2017 28th Irish Signals and Systems Conference (ISSC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133274042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A novel approach for secure identity authentication in legacy database systems 遗留数据库系统中安全身份验证的新方法
2017 28th Irish Signals and Systems Conference (ISSC) Pub Date : 2017-06-01 DOI: 10.1109/ISSC.2017.7983624
Juanita Blue, Eoghan Furey, J. Condell
{"title":"A novel approach for secure identity authentication in legacy database systems","authors":"Juanita Blue, Eoghan Furey, J. Condell","doi":"10.1109/ISSC.2017.7983624","DOIUrl":"https://doi.org/10.1109/ISSC.2017.7983624","url":null,"abstract":"Information systems in the digital age have become increasingly dependent on databases to store a multitude of fundamental data. A key function of structured databases is to house authentication credentials that verify identity and allow users to access more salient personal data. Authentication databases are frequently a target of attack as they potentially provide an avenue to commit further, more lucrative crimes. Despite the provision of industry standard best practice recommendations from organisations such as Open Web Application Security Project (OWASP), Payment Card Industry Security Standards Council (PCI-SSC), Internet Engineering Task Force (IETF) and Institute of Electrical and Electronics Engineers (IEEE), often practical security implementations within industry flounder. Lacking or substandard implementations have cultivated an environment where authentication databases and the data stored therein are insecure. This was demonstrated in the 2016 exposure of a breach experienced by Yahoo where approximately one billion user credentials were stolen. The global technology company was found to be using obsolete security mechanisms to protect user passwords. Dated implementations such as these pose serious threat as they render authentication data highly vulnerable to theft and potential misuse. This paper offers a novel solution for securing authentication databases on non-compliant Apache servers. The method applies the recommended best practice mechanisms in the form of salt, one-way encryption (hashing) and iterations to both pre-existing and newly created passwords that are stored on insecure systems. The proposed solution can be implemented server-side, with little alteration to the existing infrastructure, unbeknownst to the user. It possesses the potential to improve system security, aid compliance, preserve privacy and protect users.","PeriodicalId":170320,"journal":{"name":"2017 28th Irish Signals and Systems Conference (ISSC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115719725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信