{"title":"Comparative Study Between Sliding Mode Controller and PI Controller for AC/DC Bridgeless Converter Under Uncertain Parameters","authors":"Moayed Almobaied, Ahmed Mosa Musleh","doi":"10.2478/aei-2022-0016","DOIUrl":"https://doi.org/10.2478/aei-2022-0016","url":null,"abstract":"Abstract In this paper, a comparative study between nonlinear sliding mode controller (SMC) and standard PI controller for stabilizing bridgeless AC/DC converter under uncertain parameters is presented. This type of converters is widely used in harvesting low energy systems as in wind turbine, piezoelectric transducers and heat exchange transducers. Designing robust controllers to enhance the efficiency and accuracy of these converters has become a promising track in control engineering field. The traditional bridge rectifier is widely used in the majority types of AC/DC conventional converters to gain the rectified DC voltage from the low AC input voltage source. However, these traditional converters are not effective for the low output voltage of renewable sources due to the voltage drops across rectifier’s diodes. The proposed SMC-PI controller is used to enhance the stability and the response of these converters under uncertain parameters comparing with the standard PI controller. The proposed approach consists of both Boost and Buck-Boost converters with two controllers in order to maximize the useful output energy from the source. The graphical method has been used to obtain the limitation of the coefficients of the standard PI controller. A parameter space approach is used to find all robust stabilization PI coefficients and the stability regions. A comparative study using simulations in MATLAB is presented to ensure the effectiveness and robustness of the proposed SMC-PI controller under some external disturbances.","PeriodicalId":31657,"journal":{"name":"Acta Electrotechnica et Informatica","volume":"22 1","pages":"3 - 11"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46126593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Principles of Synthesizing Medical Datasets","authors":"Michal Kolárik, Lucia Gojdičová, Ján Paralič","doi":"10.2478/aei-2022-0019","DOIUrl":"https://doi.org/10.2478/aei-2022-0019","url":null,"abstract":"Abstract Data in many application domains provide a valuable source for analysis and data-driven decision support. On the other hand, legislative restrictions are provided, especially on personal data and patients’ data in the medical domain. In order to maximize the use of data for decision purposes and comply with legislation, sensitive data needs to be properly anonymized or synthetized. This article contributes to the area of medical records synthesis. We first introduce this topic and present it in a broader context, as well as in terms of methods used and metrics for their evaluation. Based on the related work analysis, we selected CTGAN neural network model for data synthesis and experimentally validated it on three different medical datasets. The results were evaluated both quantitatively by means of selected metrics as well as qualitatively by means of proper visualization techniques. The results showed that in most cases, the synthesized dataset is a very good approximation of the original one, with similar prediction performance.","PeriodicalId":31657,"journal":{"name":"Acta Electrotechnica et Informatica","volume":"22 1","pages":"25 - 29"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44265605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of Recent Trends in the Detection of Hate Speech and Offensive Language on Social Media","authors":"Zuzana Sokolová, J. Staš, J. Juhár","doi":"10.2478/aei-2022-0018","DOIUrl":"https://doi.org/10.2478/aei-2022-0018","url":null,"abstract":"Abstract In the article, we describe recent trends in the detection of hate speech and offensive language on social media. We accord from the latest studies and scientific contributions. The article describes current trends and the most used methods in connection with the detection of hate speech and offensive language. At the same time, we focus on the importance of emoticons, hashtags, and swearing in the field of social networks. We point out the topicality of the selected topic, describe the next direction of our work, and suggest possible solutions to current problems in this field of research.","PeriodicalId":31657,"journal":{"name":"Acta Electrotechnica et Informatica","volume":"22 1","pages":"18 - 24"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42020316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation and Laboratory Model of Small Hydropower Plant","authors":"Richard Olexa, P. Fedor","doi":"10.2478/aei-2022-0017","DOIUrl":"https://doi.org/10.2478/aei-2022-0017","url":null,"abstract":"Abstract This paper is dedicated to the description of all our research done so far in the field of simulation of small hydropower plants as well as in creating a functional laboratory model based on the proposed simulation models. Comparing to the common structures, we propose some different approaches in modelling parts of the small hydropower plants, e.g. fuzzy model of the hydraulic turbine efficiency. Moreover, this simulation model is created directly for the small hydropower plants, thus it simplifies parts, that are commonly used in other scientific papers and simulate the phenomenon connected to the big scale hydropower plants structure and physical description. As a necessary step in the process of creation of universal laboratory model of a small hydropower plant that should be used for design and tuning purposes of new approaches of controlling such systems, we discuss the research and development phase that led to the final construction of the depicted laboratory model.","PeriodicalId":31657,"journal":{"name":"Acta Electrotechnica et Informatica","volume":"22 1","pages":"12 - 17"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49166196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Number-Theoretic Transform with Constant Time Computation for Embedded Post-Quantum Cryptography","authors":"Eva Kupcová, M. Drutarovský","doi":"10.2478/aei-2022-0020","DOIUrl":"https://doi.org/10.2478/aei-2022-0020","url":null,"abstract":"Abstract In this article, we describe the principles and advantages of using the Number-Theoretic Transform (NTT) in post-quantum cryptography. We deal with usages of NTT in post-quantum algorithms included in the competition announced by the National Institute of Standards and Technology. Attention is paid to the fast multiplication of polynomials using NTT and negacyclic convolution. We also focus on the existing implementation of NTT and its modifications to analyze the effectiveness of individual modifications. Separate attention is paid to the Constant Time implementation of NTT because the constant computation time of the transformation decreases a possibility of side channel attack. We describe measurements performed on OS Linux Ubuntu 20.04 LTS environment in Linux kernel mode, with the highest attention to the measurement executed on a microcontroller with an ARM 32-bit core. Measurements performed on microcontroller units are done using 32-bit and 16-bit arithmetic to demonstrate how to achieve constant computation time of the transformation. We present the results and analysis of measurements performed using modified implementations.","PeriodicalId":31657,"journal":{"name":"Acta Electrotechnica et Informatica","volume":"22 1","pages":"30 - 37"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48923716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Juraj Bilansky, Jozef Ivan, Dávid Bodnár, Milan Lacko
{"title":"Analysis of Li-Ion Battery Cell Internal Impedance Changes Based on Temperature and Soh","authors":"Juraj Bilansky, Jozef Ivan, Dávid Bodnár, Milan Lacko","doi":"10.2478/aei-2022-0011","DOIUrl":"https://doi.org/10.2478/aei-2022-0011","url":null,"abstract":"Abstract The paper is focused on the analysis of changes in the internal impedance of the selected battery cell. In addition, the paper describes basic information about these batteries, their advantages/disadvantages and possible uses. Battery data was obtained using our own testing device, which performed long-term cyclical tests on batteries to decrease SOH. Thanks to these tests, we obtained batteries with different SOH used for further measurement and evaluation. The internal impedance of selected batteries was measured with an accurate measuring device. Based on these measured data, the analysis described in this paper was created.","PeriodicalId":31657,"journal":{"name":"Acta Electrotechnica et Informatica","volume":"22 1","pages":"3 - 8"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41775057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Bouri, Oussama-Abdelfettah Mekkaoui, Anes Mohammed Mamem
{"title":"Comparative Study of Different MPPT Methods of a Boost Chopper of PV Generator","authors":"S. Bouri, Oussama-Abdelfettah Mekkaoui, Anes Mohammed Mamem","doi":"10.2478/aei-2022-0014","DOIUrl":"https://doi.org/10.2478/aei-2022-0014","url":null,"abstract":"Abstract In this article, we focus on improving the performance and efficiency of photovoltaic systems. The main objective is to study and compare the performance of different MPPT methods, and to find the most efficient method (in terms of convergence speed, the MPP point where the oscillation is reduced), so that the generator of maximum power supplied by the photovoltaic can be extracted.. The main points involved in this research are: Modeling of the photovoltaic system Simulation of four MPPT algorithms. The simulation results are obtained using simulink in matlab.","PeriodicalId":31657,"journal":{"name":"Acta Electrotechnica et Informatica","volume":"22 1","pages":"24 - 31"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45194218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Štefko, Miloš Šárpataky, Ľuboš Šárpataky, V. Kohan, Peter Havran, M. Kolcun
{"title":"Modeling of Protection Relays and Renewable Energy Sources for Microgrid Systems","authors":"R. Štefko, Miloš Šárpataky, Ľuboš Šárpataky, V. Kohan, Peter Havran, M. Kolcun","doi":"10.2478/aei-2022-0012","DOIUrl":"https://doi.org/10.2478/aei-2022-0012","url":null,"abstract":"Abstract Further research and development in the field of microgrids and related modelling and testing will be necessary for successful application in practice, which will require various model elements. It will be possible to create near-real test microgrids to help better understand the behaviour of such grids. For this reason, it is necessary to develop elements of independent parts that appear in distribution networks that will experience conversion to microgrids in the future. Therefore, this article will describe and propose models of basic protection relays, whose potential for application in microgrids is high. The article will additionally provide models of some power supplies that will be found in such reconstructed new grids.","PeriodicalId":31657,"journal":{"name":"Acta Electrotechnica et Informatica","volume":"22 1","pages":"9 - 17"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42220737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and Collection Data from IP Network","authors":"M. Hasin, M. Chovanec, J. Palša, Martin Havrilla","doi":"10.2478/aei-2022-0013","DOIUrl":"https://doi.org/10.2478/aei-2022-0013","url":null,"abstract":"Abstract The rapid deployment of technologies that can share data brings, in addition to the positive aspects, also technologies that an attacker can use to misuse personal data. Vulnerabilities in the network can be divided according to the type of attack into horizontal attacks from the perspective of the attacker and vertical attacks from the perspective of the victim. An important goal of organizations is to successfully defend against such an attack. The search for attacks on the network infrastructure can be ensured by implementing machine learning that can capture the current attack. This work describes methods of searching for attacks using graphical representation of data and also using machine learning of the high count type at different sizes of the investigated segments.","PeriodicalId":31657,"journal":{"name":"Acta Electrotechnica et Informatica","volume":"22 1","pages":"18 - 23"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44066776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Which Data Format To Store Scientific Data Should I Use? A Performance Analysis","authors":"Daniel Gecášek, Michal Solanik, J. Genci","doi":"10.2478/aei-2022-0015","DOIUrl":"https://doi.org/10.2478/aei-2022-0015","url":null,"abstract":"Abstract A lot of scientific work is dedicated to the analysis of data. Most of the analyzed data, like data from space missions, are structured. The choice of data format can affect various characteristics - read/write speed of standard files, read/write speed of small files and read/write speed of compressed data formats. In this paper, we analyze binary data formats, proposed types of the tests and testing methods, and compare their performance with human-readable text format. We also discuss compressed and uncompressed modes available for data formats like HDF5 and netCDF. When disregarding precision, the best data format from the size perspective is lossy HDF5 without compression. Losless HDF5 without compression show the best speed performance. Lossy HDF5 without compression is the best balance between size reduction and speed. However, for specific criteria and types of files, there might be better candidates as detailed in the conclusion.","PeriodicalId":31657,"journal":{"name":"Acta Electrotechnica et Informatica","volume":"22 1","pages":"32 - 40"},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41366728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}