In this study, the degradation of adjacent channel power ratio (ACPR) performance in personal mobile radio (PMR) systems, which use two-point modulation in their phase locked loops (PLLs) is investigated. First an expression for the widths of charge pump pulses, which arise due to imbalanced modulation are found by also taking into account the low pass filtering of the loop. Then the frequency domain representation of charge pump pulses is obtained by Fourier transform. Using this representation and the loop filter response, the spurious signals in the spectrum of the voltage controlled oscillator (VCO) is calculated by using narrowband FM assumption. Evaluating the power of the spectrum within the bandwidth of the adjacent channel, ACPR performance is obtained. A practical setup is constructed to validate the proposed method. Coherence is observed between the measurements of the test setup and expressions obtained in this study.
{"title":"Analysis of Adjacent Channel Power Ratio Performance in Two-Point Modulated Systems","authors":"G. Selcuk","doi":"10.1109/SIMS.2016.27","DOIUrl":"https://doi.org/10.1109/SIMS.2016.27","url":null,"abstract":"In this study, the degradation of adjacent channel power ratio (ACPR) performance in personal mobile radio (PMR) systems, which use two-point modulation in their phase locked loops (PLLs) is investigated. First an expression for the widths of charge pump pulses, which arise due to imbalanced modulation are found by also taking into account the low pass filtering of the loop. Then the frequency domain representation of charge pump pulses is obtained by Fourier transform. Using this representation and the loop filter response, the spurious signals in the spectrum of the voltage controlled oscillator (VCO) is calculated by using narrowband FM assumption. Evaluating the power of the spectrum within the bandwidth of the adjacent channel, ACPR performance is obtained. A practical setup is constructed to validate the proposed method. Coherence is observed between the measurements of the test setup and expressions obtained in this study.","PeriodicalId":308996,"journal":{"name":"2016 International Conference on Systems Informatics, Modelling and Simulation (SIMS)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123487264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Article describes the architecture design of user authentication system. The key features of architecture is resistance to changes in architectural and infrastructural scopes. That allows to control the functionality of the system and gives possibility to change it without special knowledge and the additional costs, to implement better support for devices from different manufactures. In addition, it allows to create different services based on available authentication functionality, for example: detection of criminals using face or voice recognition functions, authorize public transport ticket just by looking though camera. Commonly, there are many different scenarios where presented architecture can be used.
{"title":"The Distributed Multi-agent-based Architecture for Users Authentication System","authors":"A. Kovalcuks","doi":"10.1109/SIMS.2016.19","DOIUrl":"https://doi.org/10.1109/SIMS.2016.19","url":null,"abstract":"Article describes the architecture design of user authentication system. The key features of architecture is resistance to changes in architectural and infrastructural scopes. That allows to control the functionality of the system and gives possibility to change it without special knowledge and the additional costs, to implement better support for devices from different manufactures. In addition, it allows to create different services based on available authentication functionality, for example: detection of criminals using face or voice recognition functions, authorize public transport ticket just by looking though camera. Commonly, there are many different scenarios where presented architecture can be used.","PeriodicalId":308996,"journal":{"name":"2016 International Conference on Systems Informatics, Modelling and Simulation (SIMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124788880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes a knowledge-based approach that can reason about effects of faults and causes of abnormal situations in building automation systems (BAS). Combining an ontology-based building information model (BIM), which models a BAS formally and semantically, with rules encoding expert knowledge, the fault propagation approach can automatically determine causalities in BAS and propagate faults along the causalities in both forward and backward direction. This enables an immediate assessment of potential consequences of faults respectively an analysis of the root cause(s). The fault propagation approach can enhance fault detection and diagnosis by considering BAS as a whole, being aware of the potentially far reaching consequences of faults, instead of just focusing on single pieces of equipment or zones. This provides a better understanding of BAS and improves the decision making and prioritization of the right emergency and maintenance actions.
{"title":"Knowledge-Based Fault Propagation in Building Automation Systems","authors":"H. Dibowski, Ondrej Holub, J. Rojicek","doi":"10.1109/SIMS.2016.22","DOIUrl":"https://doi.org/10.1109/SIMS.2016.22","url":null,"abstract":"This paper describes a knowledge-based approach that can reason about effects of faults and causes of abnormal situations in building automation systems (BAS). Combining an ontology-based building information model (BIM), which models a BAS formally and semantically, with rules encoding expert knowledge, the fault propagation approach can automatically determine causalities in BAS and propagate faults along the causalities in both forward and backward direction. This enables an immediate assessment of potential consequences of faults respectively an analysis of the root cause(s). The fault propagation approach can enhance fault detection and diagnosis by considering BAS as a whole, being aware of the potentially far reaching consequences of faults, instead of just focusing on single pieces of equipment or zones. This provides a better understanding of BAS and improves the decision making and prioritization of the right emergency and maintenance actions.","PeriodicalId":308996,"journal":{"name":"2016 International Conference on Systems Informatics, Modelling and Simulation (SIMS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122626610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Imants Zarembo, A. Teilans, K. Barghorn, Y. Merkuryev, Gundega Bēriņa
In the upcoming age of semantic web there is a large number of relational databases being widely used. When time comes for a legacy relational database to migrate to semantic web or to be integrated with it, an important issue of determining similarity (compatibility) between two data models expressed in different ways arises. The goal of this paper is to describe the methodology for similarity assessment of relational database models and semantic data models and to present an ontology matching tool research prototype. The methodology consists of a set of steps, including transformation rules for data models, whose compatibility must be assessed, to the same ontology representation and applying ontology matching techniques. The methodology enables domain experts to perform a matching task semi-automatically between a relational data model and data model expressed as an ontology. The results of the semi-automatic matching are manually verified by the domain experts. The methodology was approbated using a use case from land administration domain. In the use case compatibility of data model provided by an international standard and a relational database had to be assessed.
{"title":"Methodology for Similarity Assessment of Relational Data Models and Semantic Ontologies","authors":"Imants Zarembo, A. Teilans, K. Barghorn, Y. Merkuryev, Gundega Bēriņa","doi":"10.1109/SIMS.2016.21","DOIUrl":"https://doi.org/10.1109/SIMS.2016.21","url":null,"abstract":"In the upcoming age of semantic web there is a large number of relational databases being widely used. When time comes for a legacy relational database to migrate to semantic web or to be integrated with it, an important issue of determining similarity (compatibility) between two data models expressed in different ways arises. The goal of this paper is to describe the methodology for similarity assessment of relational database models and semantic data models and to present an ontology matching tool research prototype. The methodology consists of a set of steps, including transformation rules for data models, whose compatibility must be assessed, to the same ontology representation and applying ontology matching techniques. The methodology enables domain experts to perform a matching task semi-automatically between a relational data model and data model expressed as an ontology. The results of the semi-automatic matching are manually verified by the domain experts. The methodology was approbated using a use case from land administration domain. In the use case compatibility of data model provided by an international standard and a relational database had to be assessed.","PeriodicalId":308996,"journal":{"name":"2016 International Conference on Systems Informatics, Modelling and Simulation (SIMS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116072841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A Mobile Ad-hoc Network is a flexible wireless network. The nodes also function as routers which determine and propagate the routing tables amongst their neighbours to ensure a destination can be reached in the network. Without the restraint of physical links, mobility is common, these connections are not necessarily constant, with nodes free to either leave or join the network. This paper presents an analysis of four routing protocols in relation to network performance. In particular, our analysis considers throughput, packet delivery fraction, and total number of packets received. Network Simulator 3 was used to simulate an environment and scenario based on an Interactive Quiz where data such as text, image and video is transmitted to participants of the quiz. 20 simulations with varying parameters, i.e. routing protocol and number of nodes show that DSDV is the most suitable protocol, managing 99.9% packet delivery regardless of number of nodes.
{"title":"An Analysis of MANET Routing Protocol Performance for an Interactive User Engaging Quiz","authors":"Jordan Walton, Stewart Blakeway, A. Kirpichnikova","doi":"10.1109/SIMS.2016.24","DOIUrl":"https://doi.org/10.1109/SIMS.2016.24","url":null,"abstract":"A Mobile Ad-hoc Network is a flexible wireless network. The nodes also function as routers which determine and propagate the routing tables amongst their neighbours to ensure a destination can be reached in the network. Without the restraint of physical links, mobility is common, these connections are not necessarily constant, with nodes free to either leave or join the network. This paper presents an analysis of four routing protocols in relation to network performance. In particular, our analysis considers throughput, packet delivery fraction, and total number of packets received. Network Simulator 3 was used to simulate an environment and scenario based on an Interactive Quiz where data such as text, image and video is transmitted to participants of the quiz. 20 simulations with varying parameters, i.e. routing protocol and number of nodes show that DSDV is the most suitable protocol, managing 99.9% packet delivery regardless of number of nodes.","PeriodicalId":308996,"journal":{"name":"2016 International Conference on Systems Informatics, Modelling and Simulation (SIMS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117105916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}