Pub Date : 2018-12-01DOI: 10.1109/ICSEE.2018.8646206
E. Hadad, S. Gannot
A direction of arrival (DOA) estimator for concurrent speakers in a reverberant environment is presented. The DOA estimation task is formulated in the short-time Fourier transform (STFT) in two stages. In the first stage, a single narrow-band DOA per time-frequency (T-F) is selected, since the speech sources are assumed to exhibit disjoint activity in the STFT domain. The narrow-band DOA is obtained as the maximum of the narrow-band steered response power phase transform (SRP-PHAT) localization spectrum at that T-F bin. In addition, for each narrow-band DOA, a quality measure is calculated, which provides the confidence in the estimated decision. In the second stage, the wide-band localization spectrum is calculated using a weighted histogram of the narrow-band DOAs with the quality measures as weight. Finally, the wide-band DOA estimation is obtained by selecting the peaks in the wide-band localization spectrum. The results of our experimental study demonstrate the benefit of the proposed algorithm as compared to the wide-band SRP-PHAT algorithm in a reverberant environment.
{"title":"Multi-Speaker Direction of Arrival Estimation using SRP-PHAT Algorithm with a Weighted Histogram","authors":"E. Hadad, S. Gannot","doi":"10.1109/ICSEE.2018.8646206","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646206","url":null,"abstract":"A direction of arrival (DOA) estimator for concurrent speakers in a reverberant environment is presented. The DOA estimation task is formulated in the short-time Fourier transform (STFT) in two stages. In the first stage, a single narrow-band DOA per time-frequency (T-F) is selected, since the speech sources are assumed to exhibit disjoint activity in the STFT domain. The narrow-band DOA is obtained as the maximum of the narrow-band steered response power phase transform (SRP-PHAT) localization spectrum at that T-F bin. In addition, for each narrow-band DOA, a quality measure is calculated, which provides the confidence in the estimated decision. In the second stage, the wide-band localization spectrum is calculated using a weighted histogram of the narrow-band DOAs with the quality measures as weight. Finally, the wide-band DOA estimation is obtained by selecting the peaks in the wide-band localization spectrum. The results of our experimental study demonstrate the benefit of the proposed algorithm as compared to the wide-band SRP-PHAT algorithm in a reverberant environment.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124892111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This work presents a concept of intelligent micro drones which are motivated by flying insects such as bees. The presented micro drones can perform bio inspired complex tasks autonomously using simple sensors which require very low computing power. In particular, we present a set of algorithms for obstacle avoiding, navigation, swarm formation flight and mapping all based on sub-gram sensors which are applicable for on-board processing by micro drones. Using both simulation and field experiment we conclude that many bio-inspired challenges can be performed without the use of high resolution visual sensors. Moreover autonomous micro drones can take part in a wide range of research fields including: mobile sensor networks and swarm algorithms for search & rescue.
{"title":"Bio-Inspired Micro Drones","authors":"Boaz Ben-Moshe, Yael Landau, Revital Marbel, Aviv Mishiner","doi":"10.1109/ICSEE.2018.8645997","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8645997","url":null,"abstract":"This work presents a concept of intelligent micro drones which are motivated by flying insects such as bees. The presented micro drones can perform bio inspired complex tasks autonomously using simple sensors which require very low computing power. In particular, we present a set of algorithms for obstacle avoiding, navigation, swarm formation flight and mapping all based on sub-gram sensors which are applicable for on-board processing by micro drones. Using both simulation and field experiment we conclude that many bio-inspired challenges can be performed without the use of high resolution visual sensors. Moreover autonomous micro drones can take part in a wide range of research fields including: mobile sensor networks and swarm algorithms for search & rescue.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125864650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSEE.2018.8646158
Moran Davoodi, Y. Buchris, I. Cohen
In this paper, we present a new approach for analyzing white light speckle patterns. The paper introduces an analytic model and heuristic explanations for the phenomena using the contrast and intensity statistics of the speckles. Relations between the coherence length, central wavelength and surface roughness are examined. It is shown that the speckle intensity is directly related to the autocorrelation function. We show that the new approach is consistent with previous models using simulation results and experimental data.
{"title":"Analysis of White Light Speckle Imaging","authors":"Moran Davoodi, Y. Buchris, I. Cohen","doi":"10.1109/ICSEE.2018.8646158","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646158","url":null,"abstract":"In this paper, we present a new approach for analyzing white light speckle patterns. The paper introduces an analytic model and heuristic explanations for the phenomena using the contrast and intensity statistics of the speckles. Relations between the coherence length, central wavelength and surface roughness are examined. It is shown that the speckle intensity is directly related to the autocorrelation function. We show that the new approach is consistent with previous models using simulation results and experimental data.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"17 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125918236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSEE.2018.8646173
K. Ibn-Bari, Y. Horen, S. Bronshtein, D. Baimel
This paper analyses an optimal time-sharing design for obtaining the maximum efficiency of a Multiple-Input Single Ended Primary Inductor Converter (MI SEPIC). The analysis approach is based on the average model methodology and considers conduction losses. Theoretical results are supported by simulations.
{"title":"Optimal Time-Sharing for Multiple-Input Single Ended Primary Inductor Converter (SEPIC)","authors":"K. Ibn-Bari, Y. Horen, S. Bronshtein, D. Baimel","doi":"10.1109/ICSEE.2018.8646173","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646173","url":null,"abstract":"This paper analyses an optimal time-sharing design for obtaining the maximum efficiency of a Multiple-Input Single Ended Primary Inductor Converter (MI SEPIC). The analysis approach is based on the average model methodology and considers conduction losses. Theoretical results are supported by simulations.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125399896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSEE.2018.8646277
Mordechai Guri, Matan Monitz
In 1998, researcher showed how attackers can transmit data from computers through electromagnetic radio waves generated by the computer video card. 20 years later, we examine this type of threat in a context of modern cyber-attacks. In this type of threat, attackers can covertly leak sensitive data from isolated (‘air-gapped’) computers using the electromagnetic emission from the video card. We present related work and give a brief technical background. We tested the TEMPEST attack with modern LCD screens and affordable user-defined-radio hardware available today for only $30. We implement a transmitter malware that can modulate binary data and transmit it over electromagnetic waves emitted from the video cable. We also implement a remote receiver, which demodulate and decode the transmission using GNU Radio. We present an analysis of the frequency range, effective distance and the bandwidth of this covert-channel. We found that malware can covertly leak data (e.g., encryption keys, keylogging data and documents) from air-gapped computers to a nearby RF receiver via the electromagnetic emission. The effective bitrate of this channel is 60 bit/sec to 640 bit/sec.
{"title":"LCD TEMPEST Air-Gap Attack Reloaded","authors":"Mordechai Guri, Matan Monitz","doi":"10.1109/ICSEE.2018.8646277","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646277","url":null,"abstract":"In 1998, researcher showed how attackers can transmit data from computers through electromagnetic radio waves generated by the computer video card. 20 years later, we examine this type of threat in a context of modern cyber-attacks. In this type of threat, attackers can covertly leak sensitive data from isolated (‘air-gapped’) computers using the electromagnetic emission from the video card. We present related work and give a brief technical background. We tested the TEMPEST attack with modern LCD screens and affordable user-defined-radio hardware available today for only $30. We implement a transmitter malware that can modulate binary data and transmit it over electromagnetic waves emitted from the video cable. We also implement a remote receiver, which demodulate and decode the transmission using GNU Radio. We present an analysis of the frequency range, effective distance and the bandwidth of this covert-channel. We found that malware can covertly leak data (e.g., encryption keys, keylogging data and documents) from air-gapped computers to a nearby RF receiver via the electromagnetic emission. The effective bitrate of this channel is 60 bit/sec to 640 bit/sec.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122701646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSEE.2018.8646105
Hodaya Hammer, Gilad Rath, Shlomo E. Chazan, J. Goldberger, S. Gannot
In this paper we present a mixture of Gaussians-deep neural network (MoG-DNN) algorithm for single-microphone speech enhancement. We combine between the generative mixture of Gaussians (MoG) model and the discriminative deep neural network (DNN). The proposed algorithm consists of two phases, the training phase and the test phase. In the training phase, the clean speech power spectral density (PSD) is modeled as a MoG representing an unsupervised assortment of the speech signal. Following, the database is labeled to fit the given MoG. DNN is then trained to classify noisy time-frame features to one of the Gaussians from the already inferred MoG. Given the classification results, a speech presence probability (SPP) is obtained in the test phase. Using the SPP, soft spectral subtraction is then applied, while, simultaneously updating the noise statistics. The generative unsupervised MoG can be applied to any unknown database, in addition to preserving the speech spectral structure. Furthermore, the discriminative DNN maintains the continuity of the speech. Experimental study shows that the proposed algorithm produces higher objective measurements scores compared to other speech enhancement algorithms.
{"title":"Speech Enhancement With Deep Neural Networks Using MoG Based Labels","authors":"Hodaya Hammer, Gilad Rath, Shlomo E. Chazan, J. Goldberger, S. Gannot","doi":"10.1109/ICSEE.2018.8646105","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646105","url":null,"abstract":"In this paper we present a mixture of Gaussians-deep neural network (MoG-DNN) algorithm for single-microphone speech enhancement. We combine between the generative mixture of Gaussians (MoG) model and the discriminative deep neural network (DNN). The proposed algorithm consists of two phases, the training phase and the test phase. In the training phase, the clean speech power spectral density (PSD) is modeled as a MoG representing an unsupervised assortment of the speech signal. Following, the database is labeled to fit the given MoG. DNN is then trained to classify noisy time-frame features to one of the Gaussians from the already inferred MoG. Given the classification results, a speech presence probability (SPP) is obtained in the test phase. Using the SPP, soft spectral subtraction is then applied, while, simultaneously updating the noise statistics. The generative unsupervised MoG can be applied to any unknown database, in addition to preserving the speech spectral structure. Furthermore, the discriminative DNN maintains the continuity of the speech. Experimental study shows that the proposed algorithm produces higher objective measurements scores compared to other speech enhancement algorithms.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123385954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSEE.2018.8646211
Oren Cohen, Alexander Apartsin, J. Alon, E. Katz
Stabilization and tracking of objects in egocentric videos captured by law enforcement body-worn cameras are often much more challenging compared to standard videos captured by regular mobile cameras. That is due to extreme motion caused either by the camera or by objects in the video frames. Therefore, standard stabilization and tracking methods may be less effective on such video clips, and more robust methods are required. The work presented in this paper describes robust methods for video frame stabilization and in-frame object stabilization and tracking for egocentric video analysis. During forensic investigations, sometimes more than one type of analysis is required for egocentric videos, captured in a variety of motion conditions. Hence we first define four types of use-cases that influence the requirements from the stabilization and tracking algorithms. These use-cases are categorized according to the camera motion vector, the type, size and number of objects in the scene, and to the relative motion between the objects. The methods we provide for those four use-cases are specifically adapted for forensic investigation, and have the ability to simultaneously stabilize and track both background as well as foreground regions in the video frames. The proposed methods are robust to the frame content, perform joint estimation and filtering of the camera path, and handle multiple moving objects in the scene, as demonstrated in our experiments.
{"title":"Robust Motion Compensation for Forensic Analysis of Egocentric Video using Joint Stabilization and Tracking","authors":"Oren Cohen, Alexander Apartsin, J. Alon, E. Katz","doi":"10.1109/ICSEE.2018.8646211","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646211","url":null,"abstract":"Stabilization and tracking of objects in egocentric videos captured by law enforcement body-worn cameras are often much more challenging compared to standard videos captured by regular mobile cameras. That is due to extreme motion caused either by the camera or by objects in the video frames. Therefore, standard stabilization and tracking methods may be less effective on such video clips, and more robust methods are required. The work presented in this paper describes robust methods for video frame stabilization and in-frame object stabilization and tracking for egocentric video analysis. During forensic investigations, sometimes more than one type of analysis is required for egocentric videos, captured in a variety of motion conditions. Hence we first define four types of use-cases that influence the requirements from the stabilization and tracking algorithms. These use-cases are categorized according to the camera motion vector, the type, size and number of objects in the scene, and to the relative motion between the objects. The methods we provide for those four use-cases are specifically adapted for forensic investigation, and have the ability to simultaneously stabilize and track both background as well as foreground regions in the video frames. The proposed methods are robust to the frame content, perform joint estimation and filtering of the camera path, and handle multiple moving objects in the scene, as demonstrated in our experiments.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"113 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113945555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSEE.2018.8646194
R. Gal, R. Shavit
In this paper a design method is proposed to construct a dual-band operation antenna array, interleaving two arrays, operating at Ku and Ka-band frequencies, on the same real estate. Sharing the same antenna aperture is required to utilize a limited real estate for multiple tasks. First, each array configuration is examined, to achieve optimal initial guess to the thinning algorithms. Triangular lattice is applied for both arrays and overlapping elements are shifted along major axes to allow interleaving of both arrays. Circular aperture is used for the larger Ku array. To analyze the configuration performance, reference arrays are constructed, with rectangular aperture and rectangular lattice. Moreover, genetic algorithm is used to further thinning the Ku array and maintaining a required property of the application. All the analysis is taken considering a scan range of $35^{mathrm {o}} bullet 65^{mathrm {o}}$, to achieve a design that is applicable for satellite communication purposes. The optimal Ku array directivity after thinning at scan angle $theta =50^{mathrm {o}}$ is 32.53 dBi (1 dB decrease relative to reference array), using only 74% of the reference arrays elements (rectangular aperture and rectangular lattice). Side lobes level (SLL) remained at -22.19 dB (SLL requirement is -22 dB). The results for the requested scan range shows no grating-lobes in radiation patterns, and satisfactory results comparing to the reference arrays.
{"title":"Thinning Satellite Communication Antenna Arrays for Dual Band Operation","authors":"R. Gal, R. Shavit","doi":"10.1109/ICSEE.2018.8646194","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646194","url":null,"abstract":"In this paper a design method is proposed to construct a dual-band operation antenna array, interleaving two arrays, operating at Ku and Ka-band frequencies, on the same real estate. Sharing the same antenna aperture is required to utilize a limited real estate for multiple tasks. First, each array configuration is examined, to achieve optimal initial guess to the thinning algorithms. Triangular lattice is applied for both arrays and overlapping elements are shifted along major axes to allow interleaving of both arrays. Circular aperture is used for the larger Ku array. To analyze the configuration performance, reference arrays are constructed, with rectangular aperture and rectangular lattice. Moreover, genetic algorithm is used to further thinning the Ku array and maintaining a required property of the application. All the analysis is taken considering a scan range of $35^{mathrm {o}} bullet 65^{mathrm {o}}$, to achieve a design that is applicable for satellite communication purposes. The optimal Ku array directivity after thinning at scan angle $theta =50^{mathrm {o}}$ is 32.53 dBi (1 dB decrease relative to reference array), using only 74% of the reference arrays elements (rectangular aperture and rectangular lattice). Side lobes level (SLL) remained at -22.19 dB (SLL requirement is -22 dB). The results for the requested scan range shows no grating-lobes in radiation patterns, and satisfactory results comparing to the reference arrays.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125639393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSEE.2018.8646223
Alexander Naitsat, Y. Zeevi
The most common security authentication systems rely on automatic face recognition, which is particularly vulnerable to various spoofing attacks. Often these attacks include attempts to deceive a system by using a photo or video recording of a legitimate user. Recent approaches to this problem are based on pure machine learning techniques that require large training datasets and generalize or scale, poorly.By contrast, we present a geometric approach for detecting spoofing attacks in face recognition based authentication systems. By locating planar regions around racial landmarks, our method distinguishes between genuine user recordings and recordings of spoofed images such as printed photos and video replays.The proposed algorithm is based on projective invariant relationships that are independent of the camera parameters and lighting conditions. Unlike previous geometric approaches, the input to our system is a stream of two RGB cameras. Comparing with methods implemented by a single RGB camera, our approach is significantly more accurate and is completely automatic, since we do not require head movements and other user interactions. While, on the other hand, our method does not employ expensive devices, such as depth or thermal cameras, and it operates both in indoor and outdoor settings.
{"title":"Face anti-spoofing based on projective invariants","authors":"Alexander Naitsat, Y. Zeevi","doi":"10.1109/ICSEE.2018.8646223","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646223","url":null,"abstract":"The most common security authentication systems rely on automatic face recognition, which is particularly vulnerable to various spoofing attacks. Often these attacks include attempts to deceive a system by using a photo or video recording of a legitimate user. Recent approaches to this problem are based on pure machine learning techniques that require large training datasets and generalize or scale, poorly.By contrast, we present a geometric approach for detecting spoofing attacks in face recognition based authentication systems. By locating planar regions around racial landmarks, our method distinguishes between genuine user recordings and recordings of spoofed images such as printed photos and video replays.The proposed algorithm is based on projective invariant relationships that are independent of the camera parameters and lighting conditions. Unlike previous geometric approaches, the input to our system is a stream of two RGB cameras. Comparing with methods implemented by a single RGB camera, our approach is significantly more accurate and is completely automatic, since we do not require head movements and other user interactions. While, on the other hand, our method does not employ expensive devices, such as depth or thermal cameras, and it operates both in indoor and outdoor settings.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134446885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSEE.2018.8646268
Elena Polykarpou, M. Asprou, E. Kyriakides, Christos Hadjilaou, A. Petoussis, Z. Achillides
The Cyprus power system is undergoing vast changes due to the increasing penetration of renewable energy sources. The isolated nature of the system makes it more vulnerable to large frequency deviations. As a consequence, frequency control becomes challenging especially in the case of large disturbances. To keep the system in admissible frequency limits and avoid brownouts or even system blackout, it is important to have a detailed and accurate model of the system to improve monitoring and control, and enhance the situational awareness of the system operators. One important component of the system to be modelled is the system load. Although this is not a straightforward task, the significance of load modelling can be underlined by the fact that the system response is affected by the type of the system loads. In this sense, the type of the load in combination with the increased penetration of dispersed renewable energy sources can significantly affect the system frequency response to generation loss events. In this paper, the importance of accurate load modelling and the associated effect to the response of the Cyprus power system is examined. The system frequency response to generation loss events for multiple scenarios is investigated. Various load compositions are examined, while PV generation is also considered in order to simulate realistic system conditions. Furthermore, two cases of different plant mix are also examined.
{"title":"Effect of Load Composition on the Frequency Response of the Cyprus Power System","authors":"Elena Polykarpou, M. Asprou, E. Kyriakides, Christos Hadjilaou, A. Petoussis, Z. Achillides","doi":"10.1109/ICSEE.2018.8646268","DOIUrl":"https://doi.org/10.1109/ICSEE.2018.8646268","url":null,"abstract":"The Cyprus power system is undergoing vast changes due to the increasing penetration of renewable energy sources. The isolated nature of the system makes it more vulnerable to large frequency deviations. As a consequence, frequency control becomes challenging especially in the case of large disturbances. To keep the system in admissible frequency limits and avoid brownouts or even system blackout, it is important to have a detailed and accurate model of the system to improve monitoring and control, and enhance the situational awareness of the system operators. One important component of the system to be modelled is the system load. Although this is not a straightforward task, the significance of load modelling can be underlined by the fact that the system response is affected by the type of the system loads. In this sense, the type of the load in combination with the increased penetration of dispersed renewable energy sources can significantly affect the system frequency response to generation loss events. In this paper, the importance of accurate load modelling and the associated effect to the response of the Cyprus power system is examined. The system frequency response to generation loss events for multiple scenarios is investigated. Various load compositions are examined, while PV generation is also considered in order to simulate realistic system conditions. Furthermore, two cases of different plant mix are also examined.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132767417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}