Having a wireless communication, indoor environment, in particular, represents unfriendly environment. Wireless sensor network applications indoors are in contrast to the mentioned fact and they are very common. Considering radio frequency signal propagation in a real environment (without bearing in mind interferences from other sources) we meet, in general, four basic phenomenon - reflection, path-loss, scattering and diffraction. Every single one impacts on the signal propagation and contributes to the path-loss and distortion at the receiver. A thorough picture of the electromagnetic wave propagation in the space can theoretically obtain the solution of Maxwell's equations. Though, this approach is computationally demanding and ineffective for the practical cases. In order to better describe the propagation of a radio frequency signal, the approximate models are used that usually base on experimental results. This paper presents case study on the indoor radio frequency signal propagation at 2.4 GHz ISM Band (Industrial, Scientific and Medical) supported by the propagation models implementation and experimental results..
{"title":"Indoor propagation of 2.4GHz radio signal propagation models and experimental results","authors":"Michal Kochlán, J. Micek","doi":"10.1109/DT.2014.6868703","DOIUrl":"https://doi.org/10.1109/DT.2014.6868703","url":null,"abstract":"Having a wireless communication, indoor environment, in particular, represents unfriendly environment. Wireless sensor network applications indoors are in contrast to the mentioned fact and they are very common. Considering radio frequency signal propagation in a real environment (without bearing in mind interferences from other sources) we meet, in general, four basic phenomenon - reflection, path-loss, scattering and diffraction. Every single one impacts on the signal propagation and contributes to the path-loss and distortion at the receiver. A thorough picture of the electromagnetic wave propagation in the space can theoretically obtain the solution of Maxwell's equations. Though, this approach is computationally demanding and ineffective for the practical cases. In order to better describe the propagation of a radio frequency signal, the approximate models are used that usually base on experimental results. This paper presents case study on the indoor radio frequency signal propagation at 2.4 GHz ISM Band (Industrial, Scientific and Medical) supported by the propagation models implementation and experimental results..","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133962691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Kharchenko, Elena Odarushchneko, O. Odarushchenko, D. Butenko, V. Butenko
The diversity approach is commonly used to ensure dependability attributes of such critical computer-based systems as nuclear power plants information and control (NPPs I&C) systems, including the Reactor Trip System. There are two basic problems emerging in this approach - the choice of product-process diversity kinds and assessment of multi-version systems dependability. This paper presents a study for dependability assessment of two architectures of a typical NPP I&C system, the Reactor Trip System: a diverse two-channel system with three parallel tracks on voting logic “2-out-of-3” in each channel and a diverse three-channel system with two parallel tracks on voting logic “1-out-of-2” in each channel. The multi-fragmentation approach is proposed to provide a detailed description of RTS hardware-software interconnection. The resulting models are stiff, which poses a problem in case of achieving the accurate numerical solution. Thus, the models are solved using a number of approaches and tools to verify the results. Obtained results can help to make informed decision between the observed RTS architectures.
{"title":"Assessment of the Reactor Trip System dependability: Two Markov's chains — Based cases","authors":"V. Kharchenko, Elena Odarushchneko, O. Odarushchenko, D. Butenko, V. Butenko","doi":"10.1109/DT.2014.6868699","DOIUrl":"https://doi.org/10.1109/DT.2014.6868699","url":null,"abstract":"The diversity approach is commonly used to ensure dependability attributes of such critical computer-based systems as nuclear power plants information and control (NPPs I&C) systems, including the Reactor Trip System. There are two basic problems emerging in this approach - the choice of product-process diversity kinds and assessment of multi-version systems dependability. This paper presents a study for dependability assessment of two architectures of a typical NPP I&C system, the Reactor Trip System: a diverse two-channel system with three parallel tracks on voting logic “2-out-of-3” in each channel and a diverse three-channel system with two parallel tracks on voting logic “1-out-of-2” in each channel. The multi-fragmentation approach is proposed to provide a detailed description of RTS hardware-software interconnection. The resulting models are stiff, which poses a problem in case of achieving the accurate numerical solution. Thus, the models are solved using a number of approaches and tools to verify the results. Obtained results can help to make informed decision between the observed RTS architectures.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132126347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we observe the implementation of flexible FPGA-based architectures by using the mechanism of parameterization, then we propose a classification of parameterization of FPGA-based projects by providing them flexibility during the operating mode, also, a common approach to the FPGA-based scalable implementation using multiparameterization technique is offered. Finally, the method of FPGA-based scalable implementation using static parameterization of the number of parallel and sequential structures on different levels of decomposition of the project is suggested and recommendations of proposed methods that provide flexibility of a computer system according to some requirements specification are given.
{"title":"Scalable FPGA-based projects via static and dynamic parameterization technique","authors":"Vitaliy Kulanov, A. Perepelitsyn","doi":"10.1109/DT.2014.6868710","DOIUrl":"https://doi.org/10.1109/DT.2014.6868710","url":null,"abstract":"In this paper, we observe the implementation of flexible FPGA-based architectures by using the mechanism of parameterization, then we propose a classification of parameterization of FPGA-based projects by providing them flexibility during the operating mode, also, a common approach to the FPGA-based scalable implementation using multiparameterization technique is offered. Finally, the method of FPGA-based scalable implementation using static parameterization of the number of parallel and sequential structures on different levels of decomposition of the project is suggested and recommendations of proposed methods that provide flexibility of a computer system according to some requirements specification are given.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132299769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we present the model for estimation reliability measures of reserved of air-conditioning systems for hotels, apartments, offices or cooling rooms that have a specific regime of temperature/humidity conditions, which described as stochastic process. In this reservation mode the demand of the required temperature and humidity condition is provided by aging cooling generator (air-conditioner) with reserved generator orders from rented firm. The suggested approach is based on combined Lz-transform and stochastic processes method for computation of availability, performance and performance deficiency for multi-state system. The model takes into consideration the important factors such as cooling generator output, failure and repair rate, availability, time of supply of rented generator. Corresponding procedures are suggested. Numerical example is presented to illustrate the described approach.
{"title":"On reliability measures assessment for the air conditioning system with rental equipment working in heavy weather conditions: Lz-transform approach","authors":"I. Frenkel, L. Khvatskin","doi":"10.1109/DT.2014.6868694","DOIUrl":"https://doi.org/10.1109/DT.2014.6868694","url":null,"abstract":"In this paper we present the model for estimation reliability measures of reserved of air-conditioning systems for hotels, apartments, offices or cooling rooms that have a specific regime of temperature/humidity conditions, which described as stochastic process. In this reservation mode the demand of the required temperature and humidity condition is provided by aging cooling generator (air-conditioner) with reserved generator orders from rented firm. The suggested approach is based on combined Lz-transform and stochastic processes method for computation of availability, performance and performance deficiency for multi-state system. The model takes into consideration the important factors such as cooling generator output, failure and repair rate, availability, time of supply of rented generator. Corresponding procedures are suggested. Numerical example is presented to illustrate the described approach.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115591838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The semi-Markov models is used to describe the complex systems operation processes. This model allows to tie the results of investigations of critical infrastructures inside-dependences together with the results concerned with critical infrastructures outside-dependencies. Linking of the inside and outside complex systems dependencies, under the assumed their structures multi-state models, is the main idea of the presented in the paper critical infrastructures safety analysis methodology. The proposed safety methodology is applied to safety modeling and prediction of a computational example.
{"title":"Prediction of critical infrastructures safety","authors":"K. Kolowrocki, J. Soszyńska-Budny","doi":"10.1109/DT.2014.6868704","DOIUrl":"https://doi.org/10.1109/DT.2014.6868704","url":null,"abstract":"The semi-Markov models is used to describe the complex systems operation processes. This model allows to tie the results of investigations of critical infrastructures inside-dependences together with the results concerned with critical infrastructures outside-dependencies. Linking of the inside and outside complex systems dependencies, under the assumed their structures multi-state models, is the main idea of the presented in the paper critical infrastructures safety analysis methodology. The proposed safety methodology is applied to safety modeling and prediction of a computational example.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122323738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Article analyses modern machine vision-based approaches of the rotary kiln monitoring and control which reduces energy consumption and improve clinker quality. Article describes fuzzy advising control unit developed by the authors. It based on sintering zone state assessment, the kiln rotation period and the relative change of the exhaust gases temperature. Advising control rule base for rotary cement kiln of wet technological process is developed. Structure of fuzzy control system is proposed on the basis of advising control unit. It is applicable both independently and as a part of the existing rotary kiln control systems.
{"title":"Fuzzy control of rotary cement kiln using sintering zone image recognition","authors":"D. Yudin, Valery Magergut, V. Rubanov","doi":"10.1109/DT.2014.6868741","DOIUrl":"https://doi.org/10.1109/DT.2014.6868741","url":null,"abstract":"Article analyses modern machine vision-based approaches of the rotary kiln monitoring and control which reduces energy consumption and improve clinker quality. Article describes fuzzy advising control unit developed by the authors. It based on sintering zone state assessment, the kiln rotation period and the relative change of the exhaust gases temperature. Advising control rule base for rotary cement kiln of wet technological process is developed. Structure of fuzzy control system is proposed on the basis of advising control unit. It is applicable both independently and as a part of the existing rotary kiln control systems.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115703971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the paper a general model of a critical infrastructure system with variable operation process is presented. The critical infrastructure system safety structure and the system components' safety parameters are changing dependently at the various operation states. The general safety model for this system and the linear programming are applied to optimize that system operation process and to obtain optimal values of its safety characteristics. The optimization problem depends on finding the optimal values of the critical infrastructure operation process transient probabilities at the particular operation states. Those transient probabilities optimal values maximize the system mean value of the unconditional system lifetime in the safety states subset not worse than a critical system safety state. Moreover, the procedure of finding the optimal values of other main critical infrastructure safety characteristics is presented and applied to an exemplary critical infrastructure.
{"title":"Optimization of critical infrastructures safety","authors":"K. Kolowrocki, J. Soszyńska-Budny","doi":"10.1109/DT.2014.6868705","DOIUrl":"https://doi.org/10.1109/DT.2014.6868705","url":null,"abstract":"In the paper a general model of a critical infrastructure system with variable operation process is presented. The critical infrastructure system safety structure and the system components' safety parameters are changing dependently at the various operation states. The general safety model for this system and the linear programming are applied to optimize that system operation process and to obtain optimal values of its safety characteristics. The optimization problem depends on finding the optimal values of the critical infrastructure operation process transient probabilities at the particular operation states. Those transient probabilities optimal values maximize the system mean value of the unconditional system lifetime in the safety states subset not worse than a critical system safety state. Moreover, the procedure of finding the optimal values of other main critical infrastructure safety characteristics is presented and applied to an exemplary critical infrastructure.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131040001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reliability is an important characteristic of many systems. One of the important steps of reliability analysis is the representation and mathematical description of the analyzed system. Binary Decision Diagrams (BDDs) are very convenient for representation of large systems, because they can be processed on computers efficiently. The application of this technique in reliability analysis requires the development of new methods that can be applied on this structure (representation). Some of the most popular tools of reliability engineering are methods based on Minimal Cut Sets (MCSs) or Minimal Path Sets (MPSs). However, these methods are based on the assumption that MCSs (MPSs) are known a priori. Therefore, the development of methods for definition of MCSs (MPSs) based on a BDD is actual problem in reliability analysis. In this paper, we investigate the relation between BDDs and MCSs (MPSs) and proposed a new algorithm that can be used to detect all MCSs (MPSs) in a BDD. Our approach is based on the use of logical differential calculus, especially one of its parts that is known as a direct partial logic derivative.
{"title":"Minimal Cut Sets and Path Sets in Binary Decision Diagrams and logical differential calculus","authors":"M. Kvassay, J. Kostolny","doi":"10.1109/DT.2014.6868712","DOIUrl":"https://doi.org/10.1109/DT.2014.6868712","url":null,"abstract":"Reliability is an important characteristic of many systems. One of the important steps of reliability analysis is the representation and mathematical description of the analyzed system. Binary Decision Diagrams (BDDs) are very convenient for representation of large systems, because they can be processed on computers efficiently. The application of this technique in reliability analysis requires the development of new methods that can be applied on this structure (representation). Some of the most popular tools of reliability engineering are methods based on Minimal Cut Sets (MCSs) or Minimal Path Sets (MPSs). However, these methods are based on the assumption that MCSs (MPSs) are known a priori. Therefore, the development of methods for definition of MCSs (MPSs) based on a BDD is actual problem in reliability analysis. In this paper, we investigate the relation between BDDs and MCSs (MPSs) and proposed a new algorithm that can be used to detect all MCSs (MPSs) in a BDD. Our approach is based on the use of logical differential calculus, especially one of its parts that is known as a direct partial logic derivative.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"1988 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130744685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Energy Systems are undergoing radical changes, driven by a combination of factors, including full economic cost, efficiency, environmental impact and security-of-supply, while being facilitated by increased deregulation. This complexity can only be dealt with effectively with the rollout of complex ICT systems that will play a significant role in managing, planning, and securing the energy infrastructure. However, this ever-increasing complexity of energy and support ICT systems greatly increases the potential for cyber attacks. Modern energy systems are becoming increasingly coupled and interdependent and the move/convergence from heterogeneous protocols and systems to all IP-based systems and open standards, whilst beneficial from many perspectives, increases the attack surface and scope, and thus raises many cyber-security challenges. This paper will provide an overview of the cyber threat landscape in smart grid infrastructure from a Machine-to-Machine (M2M) communication perspective and discuss the role of PKI and authentication protocols for risk mitigation.
{"title":"Securing critical infrastructure","authors":"M. Schukat","doi":"10.1109/DT.2014.6868731","DOIUrl":"https://doi.org/10.1109/DT.2014.6868731","url":null,"abstract":"Energy Systems are undergoing radical changes, driven by a combination of factors, including full economic cost, efficiency, environmental impact and security-of-supply, while being facilitated by increased deregulation. This complexity can only be dealt with effectively with the rollout of complex ICT systems that will play a significant role in managing, planning, and securing the energy infrastructure. However, this ever-increasing complexity of energy and support ICT systems greatly increases the potential for cyber attacks. Modern energy systems are becoming increasingly coupled and interdependent and the move/convergence from heterogeneous protocols and systems to all IP-based systems and open standards, whilst beneficial from many perspectives, increases the attack surface and scope, and thus raises many cyber-security challenges. This paper will provide an overview of the cyber threat landscape in smart grid infrastructure from a Machine-to-Machine (M2M) communication perspective and discuss the role of PKI and authentication protocols for risk mitigation.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"1026 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116461267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Medical survival censored data of 524 patients were evaluated in order to: (1) compare two types of surgical techniques and (2) develop the integrated survival model, who can adjust for other patients characteristics. Evaluated data come from patients who underwent colectomy in the University Hospital in Ostrava. There are used two basic surgical techniques for the colectomy: either classical (open) or laparoscopic operation. Basic questions which arise at the colectomy operation are which type of operation to choose to guarantee longer overall survival time and what are the other parameters, which can influence the survival time of the patient. The semiparametric Cox proportional hazards model was used to answer these questions.
{"title":"Medical decision support system for evaluation of risk of mortality of patients undergoing colorectal surgery","authors":"K. Janurová, L. Martínek","doi":"10.1109/DT.2014.6868698","DOIUrl":"https://doi.org/10.1109/DT.2014.6868698","url":null,"abstract":"Medical survival censored data of 524 patients were evaluated in order to: (1) compare two types of surgical techniques and (2) develop the integrated survival model, who can adjust for other patients characteristics. Evaluated data come from patients who underwent colectomy in the University Hospital in Ostrava. There are used two basic surgical techniques for the colectomy: either classical (open) or laparoscopic operation. Basic questions which arise at the colectomy operation are which type of operation to choose to guarantee longer overall survival time and what are the other parameters, which can influence the survival time of the patient. The semiparametric Cox proportional hazards model was used to answer these questions.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134356718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}