{"title":"Integrated diagnostic system for winding fault detection of the three-phase PMSM","authors":"Lukáš Otava, Ludek Buchta","doi":"10.1109/ICUMT51630.2020.9222438","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222438","url":null,"abstract":"This paper deals with the detection of the winding faults of the three-phase PMSM. The algorithm based on the three-phase model of the winding and the extended Kalman filter is used for inter-turn short detection. Additionally, the functionality of the sensors used for the detection algorithms is verified. The decision system is in charge of the diagnosis of the fault (winding/sensors). All the presented algorithms were implemented in Simulink and tested on data measured on a real inverter with the motor connected to the dynamometer. Algorithms were also tested on a microcontroller.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133916758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of household electrical appliances on transmission speed in PLC networks","authors":"R. Duriga, M. Koppl, Stefan Pocarovsky, M. Orgon","doi":"10.1109/ICUMT51630.2020.9222461","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222461","url":null,"abstract":"The paper deals with the impact of switching power supplies, surge protection and current protector on the throughput in PLC (Power Line Communication) networks created with PLC adapters TL-PA8010v2 and TL-WPA8630v2. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols were used for data transmission and the PLC network itself was implemented on aluminum and copper lines. Measurements of transmission speeds made it possible to analyze the various effects of interference on data transmission on both lines and compare them. This paper is a supplement to the testing of PLC networks with the mentioned adapters, which is the subject of another paper at the conference.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132430390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Sikora, Andrej Krivulcik, R. Fujdiak, Petr Blazek
{"title":"Design of Advanced Slow Denial of Service Attack Generator","authors":"M. Sikora, Andrej Krivulcik, R. Fujdiak, Petr Blazek","doi":"10.1109/ICUMT51630.2020.9222423","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222423","url":null,"abstract":"This work investigates the optimization and usability of slow Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in computer networks. This paper focuses on Slowloris, Slow POST, and Slow Read attack. The reader is introduced to the principles and detection issues of these attacks, together with a closer look at the design of an advanced slow DoS attack generator. This paper also presents experimental testing of a proposed generator. The test scenarios are close to real attack cases, including distributed attacks. The proposed generator is applicable for future research or improvement of detection systems and webserver security modules.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130377646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vinícius Silva, F. Soares, J. Esteves, G. Vercelli
{"title":"Human action recognition using an image-based temporal and spatial representation","authors":"Vinícius Silva, F. Soares, J. Esteves, G. Vercelli","doi":"10.1109/ICUMT51630.2020.9222408","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222408","url":null,"abstract":"Researchers have been using different technological solutions (platforms) as intervention tools with children with Autism Spectrum Disorder (ASD), who typically present difficulties in engaging and interacting with their peers. Social robots, one example of these technological solutions, are often unaware of their game partners, preventing the automatic adaptation of their behaviour to the user. Therefore, enriching the interaction between the user and the platform, lightening up the cognitive burden on the human operator, may be a valuable contribution. An information that can be used to enrich this interaction and, consequently, adapt the system behaviour is the recognition of different actions of the user through skeleton pose data from depth sensors. The present work proposes a method to automatically detect in real-time typical and stereotypical actions of children with ASD by using the Intel RealSense and the Nuitrack SDK to detect and extract the user joints coordinates. A Convolution Neural Network learning model trained on the different actions is used to classify the different patterns of behaviour. The model achieved an average accuracy of 92.6±0.5% on the test data. The entire pipeline runs on average at 31 FPS.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124371040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning Based Predicting Student Academic Success","authors":"Khalfan Al Mayahi, M. Al-Bahri","doi":"10.1109/ICUMT51630.2020.9222435","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222435","url":null,"abstract":"Today, all institutions and companies are accelerating the use of AI technologies in their businesses to achieve a clear vision and quality results. The education sector is one of the sectors where AI can be used because of big data. In this work we created a machine-based learning model to predict a student’s educational performance. The developed model relied on the student’s previous data and performance in the last stage of the school. The model showed a very accurate accuracy rate that can be adopted.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"28 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123120334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Hajny, Petr Dzurenda, Raúl Casanova Marqués, L. Malina
{"title":"Cryptographic Protocols for Confidentiality, Authenticity and Privacy on Constrained Devices","authors":"J. Hajny, Petr Dzurenda, Raúl Casanova Marqués, L. Malina","doi":"10.1109/ICUMT51630.2020.9222243","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222243","url":null,"abstract":"Cyber security and privacy protection play a crucial role in modern communication systems. While it is relatively easy to secure classical networks, it is a hard problem to provide even basic security properties, such as confidentiality, integrity, authenticity and privacy, in heterogeneous networks that involve devices with restricted resources. In these environments, such as industrial networks, sensor networks or IoT networks, the protection of user data is still very low. In this paper, we present the design of cryptographic protocols that provide the crucial security and privacy-protection features while they’re fully implementable on constrained devices. First, we present a computationally efficient scheme for the establishment of a secure channel on a device with almost no cryptographic support and very low computational and memory resources. Second, we present a privacy-enhancing scheme for achieving so-called anonymous authentication, that is the verification of user authorization without disclosing her identity. Also in this case we use only very limited support of cryptographic operations and computational resources. Besides the full cryptographic description, we also show the benchmarks based on our implementation of protocols and the way of integration into real-world applications.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125077219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of application dynamics in two types of CLOUD solutions","authors":"Stefan Pocarovsky, M. Orgon","doi":"10.1109/ICUMT51630.2020.9222425","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222425","url":null,"abstract":"The cloud of applications is currently one of the significant trends in IT infrastructure. This is the next step that follows the virtualization of servers and enables greater resource efficiency. With the rediscovered paradigm, where computing power is primarily transferred to the server, it is possible to minimize client performance, which is one of the most important consequences of such a procedure. There are many variations of cloud applications and also several options for presentations of these applications. The article is concentrating on two of them. First, there is only a database in the cloud and the application is at the client (in the LAN, or installed on a specific client). The second one is the whole application with a database installed in the cloud (outside the client’s LAN). We will virtualize all system and the client can connect remotely to the virtualized application.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121324697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Empirical Study of Fatigue-Induced Electrical Impedance Models of Biceps Tissues","authors":"N. Herencsar","doi":"10.1109/ICUMT51630.2020.9222426","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222426","url":null,"abstract":"Electrical impedance myography (EIM) is a noninvasive approach to muscle assessment based on the measurement of the electrical impedance in frequency range of interest. In this paper, fatigue-induced electrical impedance models of biceps tissues are investigated. After the dataset used is briefly described, complete set of parameters of the modified Fricke model, utilizing Foster I RC network-based fractional-order capacitor (FOC), are computed. The goodness of fitting of proposed FOCs and bioimpedance models were evaluated visually and statistically. The fit accuracy of designed electrical impedance models is ${mathbf{R}}_{{text{R}},{text{X}}}^2 geq 0.9978$. Proposed models provide more intuitive representation of the electrical behavior of biceps tissues. EIA standard compliant E96 series lumped parameter-based practical models give an appropriate explanation of fatigue effect on biceps tissues from resistance and capacitance point of view.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126535636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Technique for Analyzing Bytecode in a Java Project for the Purpose of an Automated Assessment of the Possibility and Effectiveness of the Hidden Investment of Information and its Volumes in a Java Project","authors":"A. Krasov, P. I. Sharikov","doi":"10.1109/ICUMT51630.2020.9222419","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222419","url":null,"abstract":"The relevance of the problem under study is due to the rapid development of the java programming language, as well as the proposed java machines. The purpose of the article is to develop a methodology for analyzing class files and the ability to embed information into java program files. It is necessary that the digital watermark is not damaged, and the class files and the entire java project are functioning without changes. Thus, first, an analysis of the java project is created, the selection of the class files most suitable for attachment, the embedding of a digital watermark in the class file of the java application, and a health check. After checking the file's functionality, it checks the safety and invariability of the digital watermark in the file. Methods proposed by the authors of the article to significantly save time for the file device and the applied nesting techniques.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"115 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126118114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Spirkina, E. A. Aptrieva, V. Elagin, A. A. Shvidkiy, A. A. Savelieva
{"title":"Approaches to Modeling Blockchain Systems","authors":"A. Spirkina, E. A. Aptrieva, V. Elagin, A. A. Shvidkiy, A. A. Savelieva","doi":"10.1109/ICUMT51630.2020.9222437","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222437","url":null,"abstract":"Currently, blockchain technology has been actively developed due to decentralization and the possibility of organizing a safe, holistic exchange and storage of information. This technology is starting to be applied in various fields. At the same time, the task arises to consider the influence of this technology on the characteristics of the network to predict the behavior of traffic on the network and ensure the required indicators of the quality of services, as well as the stability of the state of the communication network elements during the operation of the distributed registry technology. However, to consider and analyze the effect of technology in a full-scale experiment is a laborious task that cannot always be performed, therefore, in this paper, the authors propose to consider approaches to modeling these systems and, as an alternative, propose using the Anylogic system.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"287 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127202504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}