首页 > 最新文献

2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)最新文献

英文 中文
18-pulse Rectifier with Electronic Phase Shifting with Autotransformer in Inverter and Rectifier Mode 18脉冲整流器与电子相移与自耦变压器在逆变和整流模式
Yurii Voitovych, V. Makarov, Ievgen Pichkalov
To reduce harmonic distortion of the input current, multipulse rectifiers are used. They require the presence of phase-shifting transformers or auto transformers. Elimination of electromagnetic phase-shifting devices while maintaining small harmonic distortion of the input current and obtaining a power factor close to unity is possible with the use of electronic phase shift. The electronic phase shift is realized by means of the rectifier itself: the introduction of positive and negative control angles in the pairs of rectifiers' modules. At present, 12-pulse rectifiers with electronic phase shift are known. Unlike classic rectifiers, they do not use phase-shifting transformers and have a unit power factor. Increasing of the rectifier's pulse makes it possible to improve the harmonic composition of the input current. The use of the principle of electronic phase shift in 18-pulse rectifier leads to different levels of constant voltage at the output of the rectifiers. In this case, to equalize the currents of rectifiers' modules, one can use both an increase the voltage at the input of rectifiers operating with large control angles and a decrease the input voltage of the rectifiers operating with smaller control angles. The principles of constructing of matching auto transformers for the 18-pulse rectifier with an electronic phase shift are considered in the article. Comparison of 18-pulse rectifiers with use of step-up and step-down auto transformers is made. Data on the installed capacity of auto transformers, power losses are obtained. The results of thermophysical modeling are presented. When comparing the parameters of the matching magnetic elements, it can be concluded that it is more appropriate to use a step-down autotransformer.
为了减少输入电流的谐波失真,采用了多脉冲整流器。它们需要相移变压器或自动变压器的存在。利用电子移相可以消除电磁移相器件,同时保持输入电流的谐波畸变较小,并获得接近于1的功率因数。电子相移是通过整流器本身实现的:在整流器模块对中引入正负控制角。目前已知的具有电子相移的12脉冲整流器。与传统整流器不同,它们不使用移相变压器,并且具有单位功率因数。增大整流器的脉冲可以改善输入电流的谐波组成。在18脉冲整流器中使用电子相移原理,导致在整流器输出处产生不同水平的恒压。在这种情况下,为了均衡整流器模块的电流,可以同时使用增大控制角较大的整流器的输入电压和减小控制角较小的整流器的输入电压。本文讨论了18脉冲电子相移整流器匹配自耦变压器的构造原理。对采用升压和降压自耦变压器的18脉冲整流器进行了比较。得到了自耦变压器的装机容量、功率损耗等数据。给出了热物理模拟的结果。通过对匹配磁元件的参数进行比较,可以得出使用降压自耦变压器更为合适的结论。
{"title":"18-pulse Rectifier with Electronic Phase Shifting with Autotransformer in Inverter and Rectifier Mode","authors":"Yurii Voitovych, V. Makarov, Ievgen Pichkalov","doi":"10.1109/AIEEE.2018.8592446","DOIUrl":"https://doi.org/10.1109/AIEEE.2018.8592446","url":null,"abstract":"To reduce harmonic distortion of the input current, multipulse rectifiers are used. They require the presence of phase-shifting transformers or auto transformers. Elimination of electromagnetic phase-shifting devices while maintaining small harmonic distortion of the input current and obtaining a power factor close to unity is possible with the use of electronic phase shift. The electronic phase shift is realized by means of the rectifier itself: the introduction of positive and negative control angles in the pairs of rectifiers' modules. At present, 12-pulse rectifiers with electronic phase shift are known. Unlike classic rectifiers, they do not use phase-shifting transformers and have a unit power factor. Increasing of the rectifier's pulse makes it possible to improve the harmonic composition of the input current. The use of the principle of electronic phase shift in 18-pulse rectifier leads to different levels of constant voltage at the output of the rectifiers. In this case, to equalize the currents of rectifiers' modules, one can use both an increase the voltage at the input of rectifiers operating with large control angles and a decrease the input voltage of the rectifiers operating with smaller control angles. The principles of constructing of matching auto transformers for the 18-pulse rectifier with an electronic phase shift are considered in the article. Comparison of 18-pulse rectifiers with use of step-up and step-down auto transformers is made. Data on the installed capacity of auto transformers, power losses are obtained. The results of thermophysical modeling are presented. When comparing the parameters of the matching magnetic elements, it can be concluded that it is more appropriate to use a step-down autotransformer.","PeriodicalId":198244,"journal":{"name":"2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127268761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of the Lossless Zero Voltage Period Quasi-resonant DC Link Topology for a Dual Input Soft Switched Inverter 双输入软开关逆变器零电压周期无损准谐振直流链路拓扑的评估
Matīss Stunda
In this paper the possibility is evaluated to develop a quasi-resonant DC link inverter with two DC inputs of different voltages by the use of a quasi-resonant circuit that provides a lossless zero voltage period. The respective topology is presented and it's working principle throughout a resonant cycle is explained. Circuit simulation is performed using the Matlab Simulink environment. Regarding control of the resonant process, optimized trip parameter selection has been suggested.
本文评估了利用准谐振电路开发具有两个不同电压输入的准谐振直流链路逆变器的可能性,该电路提供了零电压无损周期。给出了各自的拓扑结构,并解释了其在整个谐振周期中的工作原理。利用Matlab Simulink环境对电路进行仿真。针对谐振过程的控制,提出了优化跳闸参数的选择方法。
{"title":"Evaluation of the Lossless Zero Voltage Period Quasi-resonant DC Link Topology for a Dual Input Soft Switched Inverter","authors":"Matīss Stunda","doi":"10.1109/AIEEE.2018.8592089","DOIUrl":"https://doi.org/10.1109/AIEEE.2018.8592089","url":null,"abstract":"In this paper the possibility is evaluated to develop a quasi-resonant DC link inverter with two DC inputs of different voltages by the use of a quasi-resonant circuit that provides a lossless zero voltage period. The respective topology is presented and it's working principle throughout a resonant cycle is explained. Circuit simulation is performed using the Matlab Simulink environment. Regarding control of the resonant process, optimized trip parameter selection has been suggested.","PeriodicalId":198244,"journal":{"name":"2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124925645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and Management Security Incidents 研究和管理安全事件
Romans Rudzitis, Pjotrs Dorogovs
The IT industry’s crimes are rapidly growing today, so IT security experts must clearly understand that and why an attack on his network / service / resource has taken place. Also, special attention should be given to all these incidents, in order to prevent them as quickly as possible, and to protect the organization so that they no longer appear. It is very important to observe all the legal requirements for the investigation of IT crimes. It is necessary that after the crime investigation they can safely serve in court for full evidence. Consequently, any loophole or lack of information may be an obstacle for them not to be tried by a court or other law enforcement authority. The IT security specialist should understand that it could be used not only in hard disk data but also from network connection for journal entries, human (user) audit trails, IS connections. In addition, IT should be mentioned here, in its investigation and evidence collection, systems developers or service providers, as they often have access to real IS data (which would not be the principles of good practice). Also, as an example the OS Administrator would not be able to perform, without audit trails, any past operations with the database, for example, to make changes to the tables, also to copy, delete or migrate the database.
如今,IT行业的犯罪正在迅速增长,因此IT安全专家必须清楚地了解这一点,以及为什么会发生针对其网络/服务/资源的攻击。此外,应特别注意所有这些事件,以便尽快预防它们,并保护组织,使它们不再出现。在调查信息技术犯罪时,遵守所有的法律要求是非常重要的。在犯罪侦查结束后,他们能够安全地到庭作证是必要的。因此,任何漏洞或缺乏资料都可能成为他们不受法院或其他执法当局审判的障碍。IT安全专家应该明白,它不仅可以用于硬盘数据,还可以用于日志条目的网络连接、人工(用户)审计跟踪、IS连接。此外,在这里应该提到IT,在其调查和证据收集中,系统开发人员或服务提供商,因为他们经常可以访问真实的IS数据(这不是良好实践的原则)。此外,作为一个例子,如果没有审计跟踪,操作系统管理员将无法对数据库执行任何过去的操作,例如对表进行更改,以及复制、删除或迁移数据库。
{"title":"Research and Management Security Incidents","authors":"Romans Rudzitis, Pjotrs Dorogovs","doi":"10.1109/AIEEE.2018.8592159","DOIUrl":"https://doi.org/10.1109/AIEEE.2018.8592159","url":null,"abstract":"The IT industry’s crimes are rapidly growing today, so IT security experts must clearly understand that and why an attack on his network / service / resource has taken place. Also, special attention should be given to all these incidents, in order to prevent them as quickly as possible, and to protect the organization so that they no longer appear. It is very important to observe all the legal requirements for the investigation of IT crimes. It is necessary that after the crime investigation they can safely serve in court for full evidence. Consequently, any loophole or lack of information may be an obstacle for them not to be tried by a court or other law enforcement authority. The IT security specialist should understand that it could be used not only in hard disk data but also from network connection for journal entries, human (user) audit trails, IS connections. In addition, IT should be mentioned here, in its investigation and evidence collection, systems developers or service providers, as they often have access to real IS data (which would not be the principles of good practice). Also, as an example the OS Administrator would not be able to perform, without audit trails, any past operations with the database, for example, to make changes to the tables, also to copy, delete or migrate the database.","PeriodicalId":198244,"journal":{"name":"2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124118061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adapted Anomaly Detection for RAN Performance 自适应RAN性能异常检测
Dovile Momkute, Karolis Žvinys, V. Barzdenas
Complexity of mobile radio access networks is increasing rapidly. At the same time, customers’ expectations for the service quality are keeping the pressure on operators. It requires huge human efforts to maintain a sustainable and high- performance radio access network. To meet the highest quality and service level requirements, more and more network management and maintenance functions are required to be passed to automated solutions. There are many already - like SON, MLB, automatic antenna tilting which helps to scale operations. Those are dedicated to improving specific functions, but they do not pay much attention to service KPIs, which are a direct reflection of customers’ experience. Most often, changes in network performance KPIs indicate some interruption or deterioration of service quality, which needs to be restored as soon as possible. Automated solutions based on machine learning process enables engineers to notice those network issues much faster. There are many algorithms that have been created for this purpose, but most of them are specialized and tuned to detect an anomaly in the special datasets, like fraud, abnormal CPU usage, earthquake, cyber-attack. Consequently, it is either not applicable or not performing well while identifying anomalies on telecommunication network performance data. The research on this paper proofs anomaly detection accuracy problem, lack of functions for telecommunication data in existing R libraries. The only R “changepoint” package has a functionality to detect not a single local anomaly, but also anomalous time series, which is the most relevant in RAN (radio access network) performance monitoring. Default function meanvar() of method – PELT, penalty - BIC returns up to 30 false positive anomalies in retainability and integrity KPI and up to 10 in mobility KPI group on one month time series data. To extract true positive anomalies additional algorithm is applied with a cost of false negative detection increase up to 10% in a single time series data and occurs not more than in 5% of used datasets. These results are compared against other popular R libraries, like “Anomalize”, “AnomalyDetection”, “bcp”, “changepoint” and proofed to be the most accurate on radio network performance data. This adapted anomaly detection algorithm can be treated as a scalable generic algorithm to any kind of high-dimensionality data as it does not require additional tuning for different KPI group or technology. It is the solution for automated network performance monitoring that can take off a lot of workload from daily network engineer routine and improve the quality while tackling network performance issues.
移动无线接入网络的复杂性正在迅速增加。与此同时,客户对服务质量的期望也给运营商带来了压力。维持一个可持续的、高性能的无线接入网需要巨大的人力投入。为了满足最高的质量和服务水平要求,越来越多的网络管理和维护功能需要传递给自动化解决方案。现在已经有很多了,比如SON、MLB、自动天线倾斜,这有助于扩大运营规模。它们致力于改善特定的功能,但不太关注服务kpi,而服务kpi是客户体验的直接反映。大多数情况下,网络性能kpi的变化表明服务质量出现中断或下降,需要尽快恢复。基于机器学习过程的自动化解决方案使工程师能够更快地注意到这些网络问题。有很多算法是为了这个目的而创建的,但它们中的大多数都是专门用于检测特殊数据集中的异常,比如欺诈、异常的CPU使用、地震、网络攻击。因此,在识别电信网络性能数据异常时,它要么不适用,要么表现不佳。本文的研究证明了现有R库对电信数据异常检测的准确性、功能不足等问题。唯一的R“changepoint”包不仅具有检测单个本地异常的功能,还具有检测异常时间序列的功能,这与RAN(无线接入网)性能监控最相关。方法- PELT,惩罚- BIC的默认函数meanvar()在可保留性和完整性KPI中返回多达30个假阳性异常,在一个月时间序列数据的流动性KPI组中返回多达10个假阳性异常。为了提取真阳性异常,应用了额外的算法,在单个时间序列数据中,假阴性检测的成本增加了10%,并且在使用的数据集中发生的概率不超过5%。这些结果与其他流行的R库,如“Anomalize”,“AnomalyDetection”,“bcp”,“changepoint”进行了比较,并被证明是最准确的无线网络性能数据。这种经过调整的异常检测算法可以被视为一种可扩展的通用算法,适用于任何类型的高维数据,因为它不需要针对不同的KPI组或技术进行额外调优。它是一种自动化网络性能监控的解决方案,在解决网络性能问题的同时,可以减轻网络工程师的日常工作负担,提高质量。
{"title":"Adapted Anomaly Detection for RAN Performance","authors":"Dovile Momkute, Karolis Žvinys, V. Barzdenas","doi":"10.1109/AIEEE.2018.8592021","DOIUrl":"https://doi.org/10.1109/AIEEE.2018.8592021","url":null,"abstract":"Complexity of mobile radio access networks is increasing rapidly. At the same time, customers’ expectations for the service quality are keeping the pressure on operators. It requires huge human efforts to maintain a sustainable and high- performance radio access network. To meet the highest quality and service level requirements, more and more network management and maintenance functions are required to be passed to automated solutions. There are many already - like SON, MLB, automatic antenna tilting which helps to scale operations. Those are dedicated to improving specific functions, but they do not pay much attention to service KPIs, which are a direct reflection of customers’ experience. Most often, changes in network performance KPIs indicate some interruption or deterioration of service quality, which needs to be restored as soon as possible. Automated solutions based on machine learning process enables engineers to notice those network issues much faster. There are many algorithms that have been created for this purpose, but most of them are specialized and tuned to detect an anomaly in the special datasets, like fraud, abnormal CPU usage, earthquake, cyber-attack. Consequently, it is either not applicable or not performing well while identifying anomalies on telecommunication network performance data. The research on this paper proofs anomaly detection accuracy problem, lack of functions for telecommunication data in existing R libraries. The only R “changepoint” package has a functionality to detect not a single local anomaly, but also anomalous time series, which is the most relevant in RAN (radio access network) performance monitoring. Default function meanvar() of method – PELT, penalty - BIC returns up to 30 false positive anomalies in retainability and integrity KPI and up to 10 in mobility KPI group on one month time series data. To extract true positive anomalies additional algorithm is applied with a cost of false negative detection increase up to 10% in a single time series data and occurs not more than in 5% of used datasets. These results are compared against other popular R libraries, like “Anomalize”, “AnomalyDetection”, “bcp”, “changepoint” and proofed to be the most accurate on radio network performance data. This adapted anomaly detection algorithm can be treated as a scalable generic algorithm to any kind of high-dimensionality data as it does not require additional tuning for different KPI group or technology. It is the solution for automated network performance monitoring that can take off a lot of workload from daily network engineer routine and improve the quality while tackling network performance issues.","PeriodicalId":198244,"journal":{"name":"2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115813277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information Integrity Estimation Model for Small and Medium Enterprise 中小企业信息完整性评估模型
S. Ramanauskaitė, Jogaile Raslanaite, Laima Kaupadiene, Antanas enys
Information integrity plays an important role in the workflow of an enterprise. Therefore it is necessary to evaluate the integrity of different types of data used by an enterprise. Most existing solutions for evaluation of information integrity are based solely on hardware and software properties. Some solutions have information management process based evaluation, which requires security expert knowledge and work for asset, threat and vulnerability identification. This paper proposes a solution dedicated for small and medium enterprise, providing probabilistic metric of information integrity and requiring no security knowledge. This solution is based on information management structure and it integrates equipment integrity metrics from hardware and software risk assessment.
信息完整性在企业的工作流程中起着重要的作用。因此,有必要评估企业使用的不同类型数据的完整性。大多数现有的信息完整性评估解决方案仅基于硬件和软件属性。一些解决方案具有基于信息管理流程的评估,这需要安全专家的知识和工作来识别资产、威胁和漏洞。本文提出了一种适用于中小型企业的信息完整性概率度量方案,该方案不需要安全知识。该解决方案基于信息管理结构,集成了硬件和软件风险评估的设备完整性指标。
{"title":"Information Integrity Estimation Model for Small and Medium Enterprise","authors":"S. Ramanauskaitė, Jogaile Raslanaite, Laima Kaupadiene, Antanas enys","doi":"10.1109/AIEEE.2018.8592443","DOIUrl":"https://doi.org/10.1109/AIEEE.2018.8592443","url":null,"abstract":"Information integrity plays an important role in the workflow of an enterprise. Therefore it is necessary to evaluate the integrity of different types of data used by an enterprise. Most existing solutions for evaluation of information integrity are based solely on hardware and software properties. Some solutions have information management process based evaluation, which requires security expert knowledge and work for asset, threat and vulnerability identification. This paper proposes a solution dedicated for small and medium enterprise, providing probabilistic metric of information integrity and requiring no security knowledge. This solution is based on information management structure and it integrates equipment integrity metrics from hardware and software risk assessment.","PeriodicalId":198244,"journal":{"name":"2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116432356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classifier based Gateway for Edge Computing 基于分类器的边缘计算网关
Julius Skirelis, D. Navakauskas
Edge Computing technology aims to replace regular cloud IoT solutions on applications where data intensity and link latency plays critical role. Improvement is achieved by placing processing at the edge of the network, deploying service close to data source of user. Limited resources of Edge devices stipulate the need to smartly distribute over devices computational tasks, as well as to implement role switching techniques in order to guarantee smooth distribution when network conditions change. Gateway technique is proposed in this paper, providing experimental comparison of Edge Computing, Cloud Computing and Content Delivery Network (CDN) data flow scenarios where terms of network delay, service time and processing time are considered. Simulation results achieved by EdgeCloudSim software confirms the performance gain of Classifier based Edge gateway in particular balanced hardware to load ratios.
边缘计算技术旨在在数据强度和链路延迟起关键作用的应用中取代常规的云物联网解决方案。通过将处理置于网络边缘,将服务部署在靠近用户数据源的位置来实现改进。边缘设备资源有限,需要在设备间智能分配计算任务,并实现角色交换技术,以保证网络条件变化时的顺利分配。本文提出网关技术,在考虑网络延迟、服务时间和处理时间的情况下,对边缘计算、云计算和CDN (Content Delivery Network)数据流场景进行实验比较。EdgeCloudSim软件的仿真结果证实了基于分类器的边缘网关在平衡硬件负载比下的性能增益。
{"title":"Classifier based Gateway for Edge Computing","authors":"Julius Skirelis, D. Navakauskas","doi":"10.1109/AIEEE.2018.8592162","DOIUrl":"https://doi.org/10.1109/AIEEE.2018.8592162","url":null,"abstract":"Edge Computing technology aims to replace regular cloud IoT solutions on applications where data intensity and link latency plays critical role. Improvement is achieved by placing processing at the edge of the network, deploying service close to data source of user. Limited resources of Edge devices stipulate the need to smartly distribute over devices computational tasks, as well as to implement role switching techniques in order to guarantee smooth distribution when network conditions change. Gateway technique is proposed in this paper, providing experimental comparison of Edge Computing, Cloud Computing and Content Delivery Network (CDN) data flow scenarios where terms of network delay, service time and processing time are considered. Simulation results achieved by EdgeCloudSim software confirms the performance gain of Classifier based Edge gateway in particular balanced hardware to load ratios.","PeriodicalId":198244,"journal":{"name":"2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123161805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Less Data for Face and Iris Biometric Traits: An Approximation for Feature Extraction 人脸和虹膜生物特征的较少数据:特征提取的近似方法
Sercan Aygïn, G. Çavuş, Ece Olcay Gïneş
Biometrics applications have been emerging since the evaluations on the sensors. From fingerprint to iris of the human being, several biometric traits have been used in many security applications. Biometric e-passports use embedded biometric data for person identification. As the data consumption rate increases, a huge amount of data processing need occurs. In the 2020s, it is forecasted that a person will be consuming data almost half of terabytes per day. This is the motivation of approximations in data which helps to reduce the computation load and data storage overhead. In this research, a previously proposed pixel value comparison based operator within a window in image processing namely Relational Bit Operator (RBO) will be revisited by measuring its data approximation property. The less data versus accuracy tradeoff over biometric traits of face and iris is going to be tested. Having used both of the face and iris datasets allows us to see how much it deviates from ideal classification results when there is used the approximate biometric features. Moreover, the proposed method has an underlying motivation on the data occurrence, thus an ease of use for data reduction is emphasized. Therefore, the purpose of this paper is to build a clear understanding of biometrics to have the methods that treat limited data storage. Following sections start with the introduction, continues with motivation, methods, system details, tests and end up with a conclusion.
自对传感器进行评估以来,生物识别技术的应用不断涌现。从人类的指纹到虹膜,许多生物特征已被应用于许多安全领域。生物识别电子护照使用嵌入式生物识别数据进行身份识别。随着数据消耗量的增加,需要进行大量的数据处理。据预测,在21世纪20年代,一个人每天将消耗近一半tb的数据。这就是数据中近似值的动机,它有助于减少计算负载和数据存储开销。在本研究中,先前提出的基于图像处理窗口内像素值比较的算子即关系比特算子(RBO)将通过测量其数据近似特性来重新审视。较少的数据和准确性权衡面部和虹膜的生物特征将被测试。同时使用人脸和虹膜数据集可以让我们看到当使用近似生物特征时,它与理想分类结果的偏差有多大。此外,所提出的方法具有数据发生的潜在动机,因此强调了数据约简的易用性。因此,本文的目的是建立对生物识别的清晰认识,以获得处理有限数据存储的方法。下面的部分从介绍开始,接着是动机、方法、系统细节、测试,最后是结论。
{"title":"Less Data for Face and Iris Biometric Traits: An Approximation for Feature Extraction","authors":"Sercan Aygïn, G. Çavuş, Ece Olcay Gïneş","doi":"10.1109/AIEEE.2018.8592060","DOIUrl":"https://doi.org/10.1109/AIEEE.2018.8592060","url":null,"abstract":"Biometrics applications have been emerging since the evaluations on the sensors. From fingerprint to iris of the human being, several biometric traits have been used in many security applications. Biometric e-passports use embedded biometric data for person identification. As the data consumption rate increases, a huge amount of data processing need occurs. In the 2020s, it is forecasted that a person will be consuming data almost half of terabytes per day. This is the motivation of approximations in data which helps to reduce the computation load and data storage overhead. In this research, a previously proposed pixel value comparison based operator within a window in image processing namely Relational Bit Operator (RBO) will be revisited by measuring its data approximation property. The less data versus accuracy tradeoff over biometric traits of face and iris is going to be tested. Having used both of the face and iris datasets allows us to see how much it deviates from ideal classification results when there is used the approximate biometric features. Moreover, the proposed method has an underlying motivation on the data occurrence, thus an ease of use for data reduction is emphasized. Therefore, the purpose of this paper is to build a clear understanding of biometrics to have the methods that treat limited data storage. Following sections start with the introduction, continues with motivation, methods, system details, tests and end up with a conclusion.","PeriodicalId":198244,"journal":{"name":"2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134145908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modulation Recognition of Unmanned Aerial Vehicle Control Signals Using Software-Defined Radio 基于软件无线电的无人机控制信号调制识别
Jurijs Sadovskis, A. Aboltins, Jānis Eidaks
Unmanned aerial vehicles (UAV) are used in a wide range of tasks. Many UAV owners use these appliances for private purposes. In these cases, it often means non-authorized flights over public or private areas or events. Many flights also take place over no-flight zones. These cases could be considered as malicious even if UAV operators are not informed that flights are forbidden in these areas. This article presents the results of series of experiments devoted to the determination of modulation of control signals used by several commercially available UAVs, using a software-defined radio (SDR). The ultimate goal of the research is the development of a solution that would help to identify UAVs by decoding of the control signals.
无人驾驶飞行器(UAV)用于广泛的任务。许多无人机拥有者将这些设备用于私人目的。在这些情况下,它通常意味着未经授权飞越公共或私人区域或活动。许多航班也在禁飞区上空飞行。这些情况可以被认为是恶意的,即使无人机操作员没有被告知在这些地区禁止飞行。本文介绍了一系列实验的结果,致力于确定几种商用无人机使用的控制信号的调制,使用软件定义无线电(SDR)。这项研究的最终目标是开发一种解决方案,通过解码控制信号来帮助识别无人机。
{"title":"Modulation Recognition of Unmanned Aerial Vehicle Control Signals Using Software-Defined Radio","authors":"Jurijs Sadovskis, A. Aboltins, Jānis Eidaks","doi":"10.1109/AIEEE.2018.8592442","DOIUrl":"https://doi.org/10.1109/AIEEE.2018.8592442","url":null,"abstract":"Unmanned aerial vehicles (UAV) are used in a wide range of tasks. Many UAV owners use these appliances for private purposes. In these cases, it often means non-authorized flights over public or private areas or events. Many flights also take place over no-flight zones. These cases could be considered as malicious even if UAV operators are not informed that flights are forbidden in these areas. This article presents the results of series of experiments devoted to the determination of modulation of control signals used by several commercially available UAVs, using a software-defined radio (SDR). The ultimate goal of the research is the development of a solution that would help to identify UAVs by decoding of the control signals.","PeriodicalId":198244,"journal":{"name":"2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132331141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Influence Analysis of Mutual Coupling Effects between a High-Voltage Transmission Line and a Fibre-optic Cable with a Conductive Support Element 高压输电线路与带导电支撑元件的光纤电缆互耦合效应影响分析
I. Zālītis, A. Dolgicers, J. Kozadajevs
Applications of fibre-optic cables with conductive support elements for installations on high-voltage line towers are not as common as all-dielectric cable designs. Therefore, the influence of high-voltage lines on such cables has not been studied widely. In this paper, a lumped parameter model in phase coordinates is developed to determine the current and voltage of a conductive element of a fibre-optic cable section installed on a high-voltage line. Methods required to determine the parameters of the mutual induction and electrostatic links for this model are provided. A case study is performed for a figure-8 cable application on a 330 kV line, which indicates that the induced voltage to earth is a significant threat to the cable if the conductive element is insulated from the earth. The demonstrated approach can be used for analysing the influence of a high-voltage line on any elongated conductive object.
在高压线路塔上安装带有导电支撑元件的光纤电缆的应用不像全介质电缆设计那样普遍。因此,高压线路对此类电缆的影响尚未得到广泛研究。本文建立了一种相位坐标下的集总参数模型,用于确定高压线路上安装的光纤电缆段导电元件的电流和电压。给出了确定该模型的互感和静电环节参数所需的方法。对图8电缆在330千伏线路上的应用进行了案例研究,结果表明,如果导电元件与地球绝缘,对地的感应电压对电缆是一个重大威胁。所演示的方法可用于分析高压线路对任何细长导电物体的影响。
{"title":"Influence Analysis of Mutual Coupling Effects between a High-Voltage Transmission Line and a Fibre-optic Cable with a Conductive Support Element","authors":"I. Zālītis, A. Dolgicers, J. Kozadajevs","doi":"10.1109/AIEEE.2018.8592447","DOIUrl":"https://doi.org/10.1109/AIEEE.2018.8592447","url":null,"abstract":"Applications of fibre-optic cables with conductive support elements for installations on high-voltage line towers are not as common as all-dielectric cable designs. Therefore, the influence of high-voltage lines on such cables has not been studied widely. In this paper, a lumped parameter model in phase coordinates is developed to determine the current and voltage of a conductive element of a fibre-optic cable section installed on a high-voltage line. Methods required to determine the parameters of the mutual induction and electrostatic links for this model are provided. A case study is performed for a figure-8 cable application on a 330 kV line, which indicates that the induced voltage to earth is a significant threat to the cable if the conductive element is insulated from the earth. The demonstrated approach can be used for analysing the influence of a high-voltage line on any elongated conductive object.","PeriodicalId":198244,"journal":{"name":"2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114017214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FPGA-Based Selected Object Tracking Using LBP, HOG and Motion Detection 基于fpga的基于LBP、HOG和运动检测的选定目标跟踪
Tomyslav Sledeviè, A. Serackis, D. Plonis
This paper describes the hardware architecture for selected object tracking on an embedded system. The LBP and HOG feature extraction algorithm is combined with motion detection to compute and compare the features vectors with captured once only when the target moves. LBP8,1, LBP16,2, and HOG8,1, HOG16,2 are used to create the feature vector. The unit that makes a final decision on tracker update is based on searching of the least SSD of features' histogram. The implemented motion detection algorithm was able to find and mark eight moving objects simultaneously. The previously computed locations update all trackers' locations in every next frame. The experimental investigation showed that implemented tracker, based on HOG features is robust to luminescence variation and partial occlusion. In addition, the LBP based tracker is robust to the rotation. The proposed architecture is implemented on Xilinx Virtex 4 FPGA using VHDL and is able to work in real-time on 60 fps and $640 times 480$ video resolution.
本文介绍了嵌入式系统中选定目标跟踪的硬件结构。将LBP和HOG特征提取算法与运动检测相结合,仅在目标运动时计算并比较捕获的特征向量。使用LBP8、1、LBP16、2和HOG8、1、HOG16、2创建特征向量。最终决定跟踪器更新的单位是基于搜索特征直方图的最小SSD。所实现的运动检测算法能够同时发现并标记8个运动物体。之前计算的位置在下一帧更新所有跟踪器的位置。实验结果表明,所实现的基于HOG特征的跟踪器对发光变化和局部遮挡具有较强的鲁棒性。此外,基于LBP的跟踪器对旋转具有鲁棒性。该架构在Xilinx Virtex 4 FPGA上使用VHDL实现,能够以60fps和$640 × 480$的视频分辨率实时工作。
{"title":"FPGA-Based Selected Object Tracking Using LBP, HOG and Motion Detection","authors":"Tomyslav Sledeviè, A. Serackis, D. Plonis","doi":"10.1109/AIEEE.2018.8592410","DOIUrl":"https://doi.org/10.1109/AIEEE.2018.8592410","url":null,"abstract":"This paper describes the hardware architecture for selected object tracking on an embedded system. The LBP and HOG feature extraction algorithm is combined with motion detection to compute and compare the features vectors with captured once only when the target moves. LBP8,1, LBP16,2, and HOG8,1, HOG16,2 are used to create the feature vector. The unit that makes a final decision on tracker update is based on searching of the least SSD of features' histogram. The implemented motion detection algorithm was able to find and mark eight moving objects simultaneously. The previously computed locations update all trackers' locations in every next frame. The experimental investigation showed that implemented tracker, based on HOG features is robust to luminescence variation and partial occlusion. In addition, the LBP based tracker is robust to the rotation. The proposed architecture is implemented on Xilinx Virtex 4 FPGA using VHDL and is able to work in real-time on 60 fps and $640 times 480$ video resolution.","PeriodicalId":198244,"journal":{"name":"2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122543320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1