{"title":"18-pulse Rectifier with Electronic Phase Shifting with Autotransformer in Inverter and Rectifier Mode","authors":"Yurii Voitovych, V. Makarov, Ievgen Pichkalov","doi":"10.1109/AIEEE.2018.8592446","DOIUrl":"https://doi.org/10.1109/AIEEE.2018.8592446","url":null,"abstract":"To reduce harmonic distortion of the input current, multipulse rectifiers are used. They require the presence of phase-shifting transformers or auto transformers. Elimination of electromagnetic phase-shifting devices while maintaining small harmonic distortion of the input current and obtaining a power factor close to unity is possible with the use of electronic phase shift. The electronic phase shift is realized by means of the rectifier itself: the introduction of positive and negative control angles in the pairs of rectifiers' modules. At present, 12-pulse rectifiers with electronic phase shift are known. Unlike classic rectifiers, they do not use phase-shifting transformers and have a unit power factor. Increasing of the rectifier's pulse makes it possible to improve the harmonic composition of the input current. The use of the principle of electronic phase shift in 18-pulse rectifier leads to different levels of constant voltage at the output of the rectifiers. In this case, to equalize the currents of rectifiers' modules, one can use both an increase the voltage at the input of rectifiers operating with large control angles and a decrease the input voltage of the rectifiers operating with smaller control angles. The principles of constructing of matching auto transformers for the 18-pulse rectifier with an electronic phase shift are considered in the article. Comparison of 18-pulse rectifiers with use of step-up and step-down auto transformers is made. Data on the installed capacity of auto transformers, power losses are obtained. The results of thermophysical modeling are presented. When comparing the parameters of the matching magnetic elements, it can be concluded that it is more appropriate to use a step-down autotransformer.","PeriodicalId":198244,"journal":{"name":"2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127268761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of the Lossless Zero Voltage Period Quasi-resonant DC Link Topology for a Dual Input Soft Switched Inverter","authors":"Matīss Stunda","doi":"10.1109/AIEEE.2018.8592089","DOIUrl":"https://doi.org/10.1109/AIEEE.2018.8592089","url":null,"abstract":"In this paper the possibility is evaluated to develop a quasi-resonant DC link inverter with two DC inputs of different voltages by the use of a quasi-resonant circuit that provides a lossless zero voltage period. The respective topology is presented and it's working principle throughout a resonant cycle is explained. Circuit simulation is performed using the Matlab Simulink environment. Regarding control of the resonant process, optimized trip parameter selection has been suggested.","PeriodicalId":198244,"journal":{"name":"2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124925645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Management Security Incidents","authors":"Romans Rudzitis, Pjotrs Dorogovs","doi":"10.1109/AIEEE.2018.8592159","DOIUrl":"https://doi.org/10.1109/AIEEE.2018.8592159","url":null,"abstract":"The IT industry’s crimes are rapidly growing today, so IT security experts must clearly understand that and why an attack on his network / service / resource has taken place. Also, special attention should be given to all these incidents, in order to prevent them as quickly as possible, and to protect the organization so that they no longer appear. It is very important to observe all the legal requirements for the investigation of IT crimes. It is necessary that after the crime investigation they can safely serve in court for full evidence. Consequently, any loophole or lack of information may be an obstacle for them not to be tried by a court or other law enforcement authority. The IT security specialist should understand that it could be used not only in hard disk data but also from network connection for journal entries, human (user) audit trails, IS connections. In addition, IT should be mentioned here, in its investigation and evidence collection, systems developers or service providers, as they often have access to real IS data (which would not be the principles of good practice). Also, as an example the OS Administrator would not be able to perform, without audit trails, any past operations with the database, for example, to make changes to the tables, also to copy, delete or migrate the database.","PeriodicalId":198244,"journal":{"name":"2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124118061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adapted Anomaly Detection for RAN Performance","authors":"Dovile Momkute, Karolis Žvinys, V. Barzdenas","doi":"10.1109/AIEEE.2018.8592021","DOIUrl":"https://doi.org/10.1109/AIEEE.2018.8592021","url":null,"abstract":"Complexity of mobile radio access networks is increasing rapidly. At the same time, customers’ expectations for the service quality are keeping the pressure on operators. It requires huge human efforts to maintain a sustainable and high- performance radio access network. To meet the highest quality and service level requirements, more and more network management and maintenance functions are required to be passed to automated solutions. There are many already - like SON, MLB, automatic antenna tilting which helps to scale operations. Those are dedicated to improving specific functions, but they do not pay much attention to service KPIs, which are a direct reflection of customers’ experience. Most often, changes in network performance KPIs indicate some interruption or deterioration of service quality, which needs to be restored as soon as possible. Automated solutions based on machine learning process enables engineers to notice those network issues much faster. There are many algorithms that have been created for this purpose, but most of them are specialized and tuned to detect an anomaly in the special datasets, like fraud, abnormal CPU usage, earthquake, cyber-attack. Consequently, it is either not applicable or not performing well while identifying anomalies on telecommunication network performance data. The research on this paper proofs anomaly detection accuracy problem, lack of functions for telecommunication data in existing R libraries. The only R “changepoint” package has a functionality to detect not a single local anomaly, but also anomalous time series, which is the most relevant in RAN (radio access network) performance monitoring. Default function meanvar() of method – PELT, penalty - BIC returns up to 30 false positive anomalies in retainability and integrity KPI and up to 10 in mobility KPI group on one month time series data. To extract true positive anomalies additional algorithm is applied with a cost of false negative detection increase up to 10% in a single time series data and occurs not more than in 5% of used datasets. These results are compared against other popular R libraries, like “Anomalize”, “AnomalyDetection”, “bcp”, “changepoint” and proofed to be the most accurate on radio network performance data. This adapted anomaly detection algorithm can be treated as a scalable generic algorithm to any kind of high-dimensionality data as it does not require additional tuning for different KPI group or technology. It is the solution for automated network performance monitoring that can take off a lot of workload from daily network engineer routine and improve the quality while tackling network performance issues.","PeriodicalId":198244,"journal":{"name":"2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115813277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Ramanauskaitė, Jogaile Raslanaite, Laima Kaupadiene, Antanas enys
{"title":"Information Integrity Estimation Model for Small and Medium Enterprise","authors":"S. Ramanauskaitė, Jogaile Raslanaite, Laima Kaupadiene, Antanas enys","doi":"10.1109/AIEEE.2018.8592443","DOIUrl":"https://doi.org/10.1109/AIEEE.2018.8592443","url":null,"abstract":"Information integrity plays an important role in the workflow of an enterprise. Therefore it is necessary to evaluate the integrity of different types of data used by an enterprise. Most existing solutions for evaluation of information integrity are based solely on hardware and software properties. Some solutions have information management process based evaluation, which requires security expert knowledge and work for asset, threat and vulnerability identification. This paper proposes a solution dedicated for small and medium enterprise, providing probabilistic metric of information integrity and requiring no security knowledge. This solution is based on information management structure and it integrates equipment integrity metrics from hardware and software risk assessment.","PeriodicalId":198244,"journal":{"name":"2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116432356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classifier based Gateway for Edge Computing","authors":"Julius Skirelis, D. Navakauskas","doi":"10.1109/AIEEE.2018.8592162","DOIUrl":"https://doi.org/10.1109/AIEEE.2018.8592162","url":null,"abstract":"Edge Computing technology aims to replace regular cloud IoT solutions on applications where data intensity and link latency plays critical role. Improvement is achieved by placing processing at the edge of the network, deploying service close to data source of user. Limited resources of Edge devices stipulate the need to smartly distribute over devices computational tasks, as well as to implement role switching techniques in order to guarantee smooth distribution when network conditions change. Gateway technique is proposed in this paper, providing experimental comparison of Edge Computing, Cloud Computing and Content Delivery Network (CDN) data flow scenarios where terms of network delay, service time and processing time are considered. Simulation results achieved by EdgeCloudSim software confirms the performance gain of Classifier based Edge gateway in particular balanced hardware to load ratios.","PeriodicalId":198244,"journal":{"name":"2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123161805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Less Data for Face and Iris Biometric Traits: An Approximation for Feature Extraction","authors":"Sercan Aygïn, G. Çavuş, Ece Olcay Gïneş","doi":"10.1109/AIEEE.2018.8592060","DOIUrl":"https://doi.org/10.1109/AIEEE.2018.8592060","url":null,"abstract":"Biometrics applications have been emerging since the evaluations on the sensors. From fingerprint to iris of the human being, several biometric traits have been used in many security applications. Biometric e-passports use embedded biometric data for person identification. As the data consumption rate increases, a huge amount of data processing need occurs. In the 2020s, it is forecasted that a person will be consuming data almost half of terabytes per day. This is the motivation of approximations in data which helps to reduce the computation load and data storage overhead. In this research, a previously proposed pixel value comparison based operator within a window in image processing namely Relational Bit Operator (RBO) will be revisited by measuring its data approximation property. The less data versus accuracy tradeoff over biometric traits of face and iris is going to be tested. Having used both of the face and iris datasets allows us to see how much it deviates from ideal classification results when there is used the approximate biometric features. Moreover, the proposed method has an underlying motivation on the data occurrence, thus an ease of use for data reduction is emphasized. Therefore, the purpose of this paper is to build a clear understanding of biometrics to have the methods that treat limited data storage. Following sections start with the introduction, continues with motivation, methods, system details, tests and end up with a conclusion.","PeriodicalId":198244,"journal":{"name":"2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134145908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modulation Recognition of Unmanned Aerial Vehicle Control Signals Using Software-Defined Radio","authors":"Jurijs Sadovskis, A. Aboltins, Jānis Eidaks","doi":"10.1109/AIEEE.2018.8592442","DOIUrl":"https://doi.org/10.1109/AIEEE.2018.8592442","url":null,"abstract":"Unmanned aerial vehicles (UAV) are used in a wide range of tasks. Many UAV owners use these appliances for private purposes. In these cases, it often means non-authorized flights over public or private areas or events. Many flights also take place over no-flight zones. These cases could be considered as malicious even if UAV operators are not informed that flights are forbidden in these areas. This article presents the results of series of experiments devoted to the determination of modulation of control signals used by several commercially available UAVs, using a software-defined radio (SDR). The ultimate goal of the research is the development of a solution that would help to identify UAVs by decoding of the control signals.","PeriodicalId":198244,"journal":{"name":"2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132331141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Influence Analysis of Mutual Coupling Effects between a High-Voltage Transmission Line and a Fibre-optic Cable with a Conductive Support Element","authors":"I. Zālītis, A. Dolgicers, J. Kozadajevs","doi":"10.1109/AIEEE.2018.8592447","DOIUrl":"https://doi.org/10.1109/AIEEE.2018.8592447","url":null,"abstract":"Applications of fibre-optic cables with conductive support elements for installations on high-voltage line towers are not as common as all-dielectric cable designs. Therefore, the influence of high-voltage lines on such cables has not been studied widely. In this paper, a lumped parameter model in phase coordinates is developed to determine the current and voltage of a conductive element of a fibre-optic cable section installed on a high-voltage line. Methods required to determine the parameters of the mutual induction and electrostatic links for this model are provided. A case study is performed for a figure-8 cable application on a 330 kV line, which indicates that the induced voltage to earth is a significant threat to the cable if the conductive element is insulated from the earth. The demonstrated approach can be used for analysing the influence of a high-voltage line on any elongated conductive object.","PeriodicalId":198244,"journal":{"name":"2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114017214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA-Based Selected Object Tracking Using LBP, HOG and Motion Detection","authors":"Tomyslav Sledeviè, A. Serackis, D. Plonis","doi":"10.1109/AIEEE.2018.8592410","DOIUrl":"https://doi.org/10.1109/AIEEE.2018.8592410","url":null,"abstract":"This paper describes the hardware architecture for selected object tracking on an embedded system. The LBP and HOG feature extraction algorithm is combined with motion detection to compute and compare the features vectors with captured once only when the target moves. LBP8,1, LBP16,2, and HOG8,1, HOG16,2 are used to create the feature vector. The unit that makes a final decision on tracker update is based on searching of the least SSD of features' histogram. The implemented motion detection algorithm was able to find and mark eight moving objects simultaneously. The previously computed locations update all trackers' locations in every next frame. The experimental investigation showed that implemented tracker, based on HOG features is robust to luminescence variation and partial occlusion. In addition, the LBP based tracker is robust to the rotation. The proposed architecture is implemented on Xilinx Virtex 4 FPGA using VHDL and is able to work in real-time on 60 fps and $640 times 480$ video resolution.","PeriodicalId":198244,"journal":{"name":"2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122543320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}