2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)最新文献

筛选
英文 中文
Integrated diagnostic system for winding fault detection of the three-phase PMSM 三相永磁同步电动机绕组故障综合诊断系统
Lukáš Otava, Ludek Buchta
{"title":"Integrated diagnostic system for winding fault detection of the three-phase PMSM","authors":"Lukáš Otava, Ludek Buchta","doi":"10.1109/ICUMT51630.2020.9222438","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222438","url":null,"abstract":"This paper deals with the detection of the winding faults of the three-phase PMSM. The algorithm based on the three-phase model of the winding and the extended Kalman filter is used for inter-turn short detection. Additionally, the functionality of the sensors used for the detection algorithms is verified. The decision system is in charge of the diagnosis of the fault (winding/sensors). All the presented algorithms were implemented in Simulink and tested on data measured on a real inverter with the motor connected to the dynamometer. Algorithms were also tested on a microcontroller.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133916758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impact of household electrical appliances on transmission speed in PLC networks 家用电器对PLC网络传输速度的影响
R. Duriga, M. Koppl, Stefan Pocarovsky, M. Orgon
{"title":"Impact of household electrical appliances on transmission speed in PLC networks","authors":"R. Duriga, M. Koppl, Stefan Pocarovsky, M. Orgon","doi":"10.1109/ICUMT51630.2020.9222461","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222461","url":null,"abstract":"The paper deals with the impact of switching power supplies, surge protection and current protector on the throughput in PLC (Power Line Communication) networks created with PLC adapters TL-PA8010v2 and TL-WPA8630v2. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols were used for data transmission and the PLC network itself was implemented on aluminum and copper lines. Measurements of transmission speeds made it possible to analyze the various effects of interference on data transmission on both lines and compare them. This paper is a supplement to the testing of PLC networks with the mentioned adapters, which is the subject of another paper at the conference.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132430390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Advanced Slow Denial of Service Attack Generator 先进的慢速拒绝服务攻击发生器设计
M. Sikora, Andrej Krivulcik, R. Fujdiak, Petr Blazek
{"title":"Design of Advanced Slow Denial of Service Attack Generator","authors":"M. Sikora, Andrej Krivulcik, R. Fujdiak, Petr Blazek","doi":"10.1109/ICUMT51630.2020.9222423","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222423","url":null,"abstract":"This work investigates the optimization and usability of slow Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in computer networks. This paper focuses on Slowloris, Slow POST, and Slow Read attack. The reader is introduced to the principles and detection issues of these attacks, together with a closer look at the design of an advanced slow DoS attack generator. This paper also presents experimental testing of a proposed generator. The test scenarios are close to real attack cases, including distributed attacks. The proposed generator is applicable for future research or improvement of detection systems and webserver security modules.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130377646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Human action recognition using an image-based temporal and spatial representation 使用基于图像的时空表示的人类动作识别
Vinícius Silva, F. Soares, J. Esteves, G. Vercelli
{"title":"Human action recognition using an image-based temporal and spatial representation","authors":"Vinícius Silva, F. Soares, J. Esteves, G. Vercelli","doi":"10.1109/ICUMT51630.2020.9222408","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222408","url":null,"abstract":"Researchers have been using different technological solutions (platforms) as intervention tools with children with Autism Spectrum Disorder (ASD), who typically present difficulties in engaging and interacting with their peers. Social robots, one example of these technological solutions, are often unaware of their game partners, preventing the automatic adaptation of their behaviour to the user. Therefore, enriching the interaction between the user and the platform, lightening up the cognitive burden on the human operator, may be a valuable contribution. An information that can be used to enrich this interaction and, consequently, adapt the system behaviour is the recognition of different actions of the user through skeleton pose data from depth sensors. The present work proposes a method to automatically detect in real-time typical and stereotypical actions of children with ASD by using the Intel RealSense and the Nuitrack SDK to detect and extract the user joints coordinates. A Convolution Neural Network learning model trained on the different actions is used to classify the different patterns of behaviour. The model achieved an average accuracy of 92.6±0.5% on the test data. The entire pipeline runs on average at 31 FPS.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124371040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Machine Learning Based Predicting Student Academic Success 基于机器学习预测学生学业成绩
Khalfan Al Mayahi, M. Al-Bahri
{"title":"Machine Learning Based Predicting Student Academic Success","authors":"Khalfan Al Mayahi, M. Al-Bahri","doi":"10.1109/ICUMT51630.2020.9222435","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222435","url":null,"abstract":"Today, all institutions and companies are accelerating the use of AI technologies in their businesses to achieve a clear vision and quality results. The education sector is one of the sectors where AI can be used because of big data. In this work we created a machine-based learning model to predict a student’s educational performance. The developed model relied on the student’s previous data and performance in the last stage of the school. The model showed a very accurate accuracy rate that can be adopted.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"28 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123120334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained Devices 约束设备上机密性、真实性和隐私性的加密协议
J. Hajny, Petr Dzurenda, Raúl Casanova Marqués, L. Malina
{"title":"Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained Devices","authors":"J. Hajny, Petr Dzurenda, Raúl Casanova Marqués, L. Malina","doi":"10.1109/ICUMT51630.2020.9222243","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222243","url":null,"abstract":"Cyber security and privacy protection play a crucial role in modern communication systems. While it is relatively easy to secure classical networks, it is a hard problem to provide even basic security properties, such as confidentiality, integrity, authenticity and privacy, in heterogeneous networks that involve devices with restricted resources. In these environments, such as industrial networks, sensor networks or IoT networks, the protection of user data is still very low. In this paper, we present the design of cryptographic protocols that provide the crucial security and privacy-protection features while they’re fully implementable on constrained devices. First, we present a computationally efficient scheme for the establishment of a secure channel on a device with almost no cryptographic support and very low computational and memory resources. Second, we present a privacy-enhancing scheme for achieving so-called anonymous authentication, that is the verification of user authorization without disclosing her identity. Also in this case we use only very limited support of cryptographic operations and computational resources. Besides the full cryptographic description, we also show the benchmarks based on our implementation of protocols and the way of integration into real-world applications.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125077219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparison of application dynamics in two types of CLOUD solutions 两种云解决方案中应用程序动态的比较
Stefan Pocarovsky, M. Orgon
{"title":"Comparison of application dynamics in two types of CLOUD solutions","authors":"Stefan Pocarovsky, M. Orgon","doi":"10.1109/ICUMT51630.2020.9222425","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222425","url":null,"abstract":"The cloud of applications is currently one of the significant trends in IT infrastructure. This is the next step that follows the virtualization of servers and enables greater resource efficiency. With the rediscovered paradigm, where computing power is primarily transferred to the server, it is possible to minimize client performance, which is one of the most important consequences of such a procedure. There are many variations of cloud applications and also several options for presentations of these applications. The article is concentrating on two of them. First, there is only a database in the cloud and the application is at the client (in the LAN, or installed on a specific client). The second one is the whole application with a database installed in the cloud (outside the client’s LAN). We will virtualize all system and the client can connect remotely to the virtualized application.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121324697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Study of Fatigue-Induced Electrical Impedance Models of Biceps Tissues 二头肌疲劳电阻抗模型的实证研究
N. Herencsar
{"title":"An Empirical Study of Fatigue-Induced Electrical Impedance Models of Biceps Tissues","authors":"N. Herencsar","doi":"10.1109/ICUMT51630.2020.9222426","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222426","url":null,"abstract":"Electrical impedance myography (EIM) is a noninvasive approach to muscle assessment based on the measurement of the electrical impedance in frequency range of interest. In this paper, fatigue-induced electrical impedance models of biceps tissues are investigated. After the dataset used is briefly described, complete set of parameters of the modified Fricke model, utilizing Foster I RC network-based fractional-order capacitor (FOC), are computed. The goodness of fitting of proposed FOCs and bioimpedance models were evaluated visually and statistically. The fit accuracy of designed electrical impedance models is ${mathbf{R}}_{{text{R}},{text{X}}}^2 geq 0.9978$. Proposed models provide more intuitive representation of the electrical behavior of biceps tissues. EIA standard compliant E96 series lumped parameter-based practical models give an appropriate explanation of fatigue effect on biceps tissues from resistance and capacitance point of view.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126535636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Technique for Analyzing Bytecode in a Java Project for the Purpose of an Automated Assessment of the Possibility and Effectiveness of the Hidden Investment of Information and its Volumes in a Java Project 一种在Java项目中分析字节码的技术,目的是自动评估Java项目中信息隐藏投资及其数量的可能性和有效性
A. Krasov, P. I. Sharikov
{"title":"A Technique for Analyzing Bytecode in a Java Project for the Purpose of an Automated Assessment of the Possibility and Effectiveness of the Hidden Investment of Information and its Volumes in a Java Project","authors":"A. Krasov, P. I. Sharikov","doi":"10.1109/ICUMT51630.2020.9222419","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222419","url":null,"abstract":"The relevance of the problem under study is due to the rapid development of the java programming language, as well as the proposed java machines. The purpose of the article is to develop a methodology for analyzing class files and the ability to embed information into java program files. It is necessary that the digital watermark is not damaged, and the class files and the entire java project are functioning without changes. Thus, first, an analysis of the java project is created, the selection of the class files most suitable for attachment, the embedding of a digital watermark in the class file of the java application, and a health check. After checking the file's functionality, it checks the safety and invariability of the digital watermark in the file. Methods proposed by the authors of the article to significantly save time for the file device and the applied nesting techniques.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"115 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126118114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Approaches to Modeling Blockchain Systems 区块链系统建模方法
A. Spirkina, E. A. Aptrieva, V. Elagin, A. A. Shvidkiy, A. A. Savelieva
{"title":"Approaches to Modeling Blockchain Systems","authors":"A. Spirkina, E. A. Aptrieva, V. Elagin, A. A. Shvidkiy, A. A. Savelieva","doi":"10.1109/ICUMT51630.2020.9222437","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222437","url":null,"abstract":"Currently, blockchain technology has been actively developed due to decentralization and the possibility of organizing a safe, holistic exchange and storage of information. This technology is starting to be applied in various fields. At the same time, the task arises to consider the influence of this technology on the characteristics of the network to predict the behavior of traffic on the network and ensure the required indicators of the quality of services, as well as the stability of the state of the communication network elements during the operation of the distributed registry technology. However, to consider and analyze the effect of technology in a full-scale experiment is a laborious task that cannot always be performed, therefore, in this paper, the authors propose to consider approaches to modeling these systems and, as an alternative, propose using the Anylogic system.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"287 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127202504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信