The concept of Smart Grid technology, which promises highly efficient and dynamic energy systems, has to be backed by suitable information and communication system. The availability and reliability must be important features of the power energy grid. These are features which must satisfy too the communication network built to support it. The paper analyses theoretical basis and presents selected practical experience with circuit oriented and packet oriented network technologies to enable build of the fault tolerant systems. This paper describes availability model of the communication network with different network technology based on our own experiences and experiments. The common topology with path protection on optical fibres is considered.
{"title":"Reliability study of selected communication systems for energy grid","authors":"J. Vodrazka, P. Jares","doi":"10.1109/DT.2014.6868740","DOIUrl":"https://doi.org/10.1109/DT.2014.6868740","url":null,"abstract":"The concept of Smart Grid technology, which promises highly efficient and dynamic energy systems, has to be backed by suitable information and communication system. The availability and reliability must be important features of the power energy grid. These are features which must satisfy too the communication network built to support it. The paper analyses theoretical basis and presents selected practical experience with circuit oriented and packet oriented network technologies to enable build of the fault tolerant systems. This paper describes availability model of the communication network with different network technology based on our own experiences and experiments. The common topology with path protection on optical fibres is considered.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133853885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The combinations of low probability events (hardware and software faults, anomalous nature events, human operator errors) cause the infrastructure accidents and disruptions. There are different approaches for evaluation of human operator's reliability. Multi-factor analysis is the essential step for obtaining the trustworthiness estimations of infrastructure's safety. The application of Bayesian Belief Networks (BBN) as a basis of multi-factor safety analysis is suggested in the paper. Two approaches for integration of probabilistic estimations in different qualimetric scales are proposed. The example of using of BBN for assessment of human factor in NPP Fukushima-1 disaster is considered.
{"title":"Probabilistic network-based approach to infrastructure safety assessment with human factor consideration","authors":"Eugene Brezhnev, A. Boyarchuk","doi":"10.1109/DT.2014.6868684","DOIUrl":"https://doi.org/10.1109/DT.2014.6868684","url":null,"abstract":"The combinations of low probability events (hardware and software faults, anomalous nature events, human operator errors) cause the infrastructure accidents and disruptions. There are different approaches for evaluation of human operator's reliability. Multi-factor analysis is the essential step for obtaining the trustworthiness estimations of infrastructure's safety. The application of Bayesian Belief Networks (BBN) as a basis of multi-factor safety analysis is suggested in the paper. Two approaches for integration of probabilistic estimations in different qualimetric scales are proposed. The example of using of BBN for assessment of human factor in NPP Fukushima-1 disaster is considered.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"104 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133452186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The aim of the article was to explore the possibility of incorporation of mobile technology into university course environment. Quantitative approach in the form of questionnaire was selected as appropriate. Students at the course answered questions focused on their hardware and software equipment, utilization of their devices for the study, curiosity and attitudes towards collaborative project development. The questionnaire also covered practical tasks for smartphone and tablet users. These practical tasks aimed to show how the students are used to solve problems using mobile technology, but there was also a question whether by the use of mobile technologies these tasks will be more interesting for students and if they show creativity.
{"title":"Preparedness for mobile learning at higher education","authors":"H. Kopackova","doi":"10.1109/DT.2014.6868706","DOIUrl":"https://doi.org/10.1109/DT.2014.6868706","url":null,"abstract":"The aim of the article was to explore the possibility of incorporation of mobile technology into university course environment. Quantitative approach in the form of questionnaire was selected as appropriate. Students at the course answered questions focused on their hardware and software equipment, utilization of their devices for the study, curiosity and attitudes towards collaborative project development. The questionnaire also covered practical tasks for smartphone and tablet users. These practical tasks aimed to show how the students are used to solve problems using mobile technology, but there was also a question whether by the use of mobile technologies these tasks will be more interesting for students and if they show creativity.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133469368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
WiFi is one of the most popular wireless standard today. However its popularity is killing itself. The number of local networks dramatically arises and as results one can achieve much worse parameters then expected if taking into accounts the devices and different 802.11 standards specifications. One of the main reasons is interference. The authors test two real networks and make an optimisation of channel choice using tools which are available for ordinary user. The results shows total lack of any channel coordination in private networks and necessity of future works to improve the situation.
{"title":"Channel selection in home 802.11 standard networks","authors":"A. Masiukiewicz, I. Dolinska, Grzegorz Rządkowski","doi":"10.1109/DT.2014.6868691","DOIUrl":"https://doi.org/10.1109/DT.2014.6868691","url":null,"abstract":"WiFi is one of the most popular wireless standard today. However its popularity is killing itself. The number of local networks dramatically arises and as results one can achieve much worse parameters then expected if taking into accounts the devices and different 802.11 standards specifications. One of the main reasons is interference. The authors test two real networks and make an optimisation of channel choice using tools which are available for ordinary user. The results shows total lack of any channel coordination in private networks and necessity of future works to improve the situation.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132447255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The knowledge base is a key element of many decision support systems. In the paper, we describe, the knowledge base implemented in the Copernicus system - a tool for computer-aided diagnosis of mental disorders based on data coming from psychometric tests, in the current version, coming from the Minnesota Multiphasic Personality Inventory (MMPI) test. This tool uses a variety of classification ways for differential interprofile diagnosis. Therefore, the knowledge base embodied in the tool is of different character. The special attention is focused on new elements added in the last version of the Copernicus system.
{"title":"The knowledge base for computer-aided diagnosis of mental disorders based on psychometric tests","authors":"Olga Mich, A. Burda, K. Pancerz, Jerzy Gomula","doi":"10.1109/DT.2014.6868724","DOIUrl":"https://doi.org/10.1109/DT.2014.6868724","url":null,"abstract":"The knowledge base is a key element of many decision support systems. In the paper, we describe, the knowledge base implemented in the Copernicus system - a tool for computer-aided diagnosis of mental disorders based on data coming from psychometric tests, in the current version, coming from the Minnesota Multiphasic Personality Inventory (MMPI) test. This tool uses a variety of classification ways for differential interprofile diagnosis. Therefore, the knowledge base embodied in the tool is of different character. The special attention is focused on new elements added in the last version of the Copernicus system.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116649263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper deals with an analysis of internal parameters of the P.563 non-intrusive quality prediction model forming an overall quality prediction of this model in the context of an impact of natural and synthesized speech degraded by packet loss (independent and dependent losses) and speech coding (ITU-T G.711 codec, ITU-T G.729AB codec and iLBC codec). A main aim of this paper is to identify dominant internal parameters of the P.563 model for all the investigated codecs and clp parameters by conducting two-way analysis of variance (ANOVA) tests on all internal parameters of the P.563 model. All the identified dominant internal parameters will be further used in an investigation of non-monotonic behavior of the P.563 model predictions in this context, reported for ITU-T G.729AB codec in [6].
{"title":"An analysis of the impact of packet loss, codecs and type of voice on internal parameters of P.563 model","authors":"Jozef Polacky, P. Počta","doi":"10.1109/DT.2014.6868728","DOIUrl":"https://doi.org/10.1109/DT.2014.6868728","url":null,"abstract":"This paper deals with an analysis of internal parameters of the P.563 non-intrusive quality prediction model forming an overall quality prediction of this model in the context of an impact of natural and synthesized speech degraded by packet loss (independent and dependent losses) and speech coding (ITU-T G.711 codec, ITU-T G.729AB codec and iLBC codec). A main aim of this paper is to identify dominant internal parameters of the P.563 model for all the investigated codecs and clp parameters by conducting two-way analysis of variance (ANOVA) tests on all internal parameters of the P.563 model. All the identified dominant internal parameters will be further used in an investigation of non-monotonic behavior of the P.563 model predictions in this context, reported for ITU-T G.729AB codec in [6].","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124814299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents an efficient algorithm using Local search, various heuristics and Tabu search elements, which is capable to find solution for huge instances of the n-queens (hundreds of millions n). The algorithm returns random solutions in short time even on an ordinary personal computer. There is no other faster algorithm in n-Queens bibliography as our presented algorithm so far.
{"title":"N-queens problem by efficient non-backtracking algorithm using local search, heuristics and Tabu search elements","authors":"M. Kováč","doi":"10.1109/DT.2014.6868708","DOIUrl":"https://doi.org/10.1109/DT.2014.6868708","url":null,"abstract":"This paper presents an efficient algorithm using Local search, various heuristics and Tabu search elements, which is capable to find solution for huge instances of the n-queens (hundreds of millions n). The algorithm returns random solutions in short time even on an ordinary personal computer. There is no other faster algorithm in n-Queens bibliography as our presented algorithm so far.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125432444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Embedded systems devices have a wide application range, an instance of which is their use in Low-power and Lossy Networks (LLNs), which are anticipated to become one of the fundamental building blocks for the realisation of the Internet of Things (IoT). The security issues emerging from the requirement for Web accessibility can be fulfilled by appropriate cryptographic techniques, so as to secure the communicated information, supported by appropriate key exchange protocols, able to cope with the particular nature of such networks. The properties of Identity-Based Encryption (IBE) seem to match well the nature of such networks, thus an IBE-based key establishment protocol would be a good choice to be used in an LLN. However, severe limitations on those devices resources render deployment of expensive key establishment protocols inappropriate. Alternatives are therefore proposed such as offloading some of the computationally-intensive tasks to other, more powerful devices. Our IBE-based key establishment protocol enables a constrained node to exchange a shared secret with a remote party, that typically operates outside the node's network through an also non-constrained proxy node that undertakes the task of performing some of the expensive computations. The proposed key establishment scheme facilitates secure communications among embedded systems devices providing information and services to remote parties, towards the realisation of the Internet of Things.
{"title":"Proxied IBE-based key establishment for LLNs","authors":"A. Papanikolaou, K. Rantos, I. Androulidakis","doi":"10.1109/DT.2014.6868727","DOIUrl":"https://doi.org/10.1109/DT.2014.6868727","url":null,"abstract":"Embedded systems devices have a wide application range, an instance of which is their use in Low-power and Lossy Networks (LLNs), which are anticipated to become one of the fundamental building blocks for the realisation of the Internet of Things (IoT). The security issues emerging from the requirement for Web accessibility can be fulfilled by appropriate cryptographic techniques, so as to secure the communicated information, supported by appropriate key exchange protocols, able to cope with the particular nature of such networks. The properties of Identity-Based Encryption (IBE) seem to match well the nature of such networks, thus an IBE-based key establishment protocol would be a good choice to be used in an LLN. However, severe limitations on those devices resources render deployment of expensive key establishment protocols inappropriate. Alternatives are therefore proposed such as offloading some of the computationally-intensive tasks to other, more powerful devices. Our IBE-based key establishment protocol enables a constrained node to exchange a shared secret with a remote party, that typically operates outside the node's network through an also non-constrained proxy node that undertakes the task of performing some of the expensive computations. The proposed key establishment scheme facilitates secure communications among embedded systems devices providing information and services to remote parties, towards the realisation of the Internet of Things.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131235724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hudák Radovan, Živčák Jozef, Tóth Teodor, Majerník Jaroslav, L. Martin
Verification of custom-made implants manufactured using the additive manufacturing technologies is the key task to be fulfilled prior to the clinical application of an implant. It consists of parameters verification within individual steps, from a software design, through manufacturing, surface finishing, up to finalisation of a medical product. The use of additive technologies facilitates the manufacture of custom-made implants for human body parts which are not mechanically loaded (e.g. cranial implant), as well as replacement of joints, or bones, which are mechanically loaded during common everyday activities. The article presents possible uses of a plastic 3D printing and the computed tomography (Metrotom 1500, Carl Zeiss, Germany) for the verification of selected parameters of static customised implants manufactured using the Direct Metal Laser Sintering (DMLS) technology with the EOSINT M280 equipment (EOS GmbH, Germany) from the biocompatible titanium alloy Ti-6Al-4V (Grade 5).
使用增材制造技术制造的定制植入物的验证是植入物临床应用之前要完成的关键任务。它包括各个步骤中的参数验证,从软件设计,到制造,表面处理,直到医疗产品的定型。增材技术的使用有助于制造非机械载荷的人体部位(例如颅骨植入物)的定制植入物,以及替换关节或骨骼,这些关节或骨骼在日常活动中受到机械载荷。本文介绍了塑料3D打印和计算机断层扫描(Metrotom 1500, Carl Zeiss,德国)的可能用途,用于验证使用直接金属激光烧结(DMLS)技术和EOSINT M280设备(EOS GmbH,德国)制造的静态定制植入物的选定参数,这些植入物来自生物相容性钛合金Ti-6Al-4V(5级)。
{"title":"Evaluation of custom-made implants using industrial computed tomography","authors":"Hudák Radovan, Živčák Jozef, Tóth Teodor, Majerník Jaroslav, L. Martin","doi":"10.1109/DT.2014.6868696","DOIUrl":"https://doi.org/10.1109/DT.2014.6868696","url":null,"abstract":"Verification of custom-made implants manufactured using the additive manufacturing technologies is the key task to be fulfilled prior to the clinical application of an implant. It consists of parameters verification within individual steps, from a software design, through manufacturing, surface finishing, up to finalisation of a medical product. The use of additive technologies facilitates the manufacture of custom-made implants for human body parts which are not mechanically loaded (e.g. cranial implant), as well as replacement of joints, or bones, which are mechanically loaded during common everyday activities. The article presents possible uses of a plastic 3D printing and the computed tomography (Metrotom 1500, Carl Zeiss, Germany) for the verification of selected parameters of static customised implants manufactured using the Direct Metal Laser Sintering (DMLS) technology with the EOSINT M280 equipment (EOS GmbH, Germany) from the biocompatible titanium alloy Ti-6Al-4V (Grade 5).","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122648757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The problem of modeling blood flow can be approached on different levels of accuracy. We investigate a model consisting of two major components: the fluid representing blood plasma and the elastic objects representing all types of cells in blood, e.g. red blood cells. The elastic objects are immersed in the fluid and they interact with each other. Our research is focused on spring-network models of elastic objects. We present the results concerning the scalability of meshes. We investigate the relation between mechanical properties of physical cells and the stiffness parameters of underlying meshes. Further, we present new metric that supplements energy-based approaches in cases when the energy is difficult to calculate. To demonstrate the abilities of our software implementation, we provide tests concerning the computational complexity. We show the significant speed-up caused by using templates when generating many cells with the same elastic properties. We also demonstrate the quadratic dependence of the computational time on increasing number of simulated cells. We suggest several directions for further model enhancements, such as better implementation of cell-cell collisions, inclusion of adhesion processes, monitoring the rupture of cells, and development of physically more relevant implementation of forces for some cell's elastic moduli.
{"title":"Recent advances in mesh-based modeling of individual cells in biological fluids","authors":"I. Cimrák, Iveta Jančgová, R. Tóthová","doi":"10.1109/DT.2014.6868686","DOIUrl":"https://doi.org/10.1109/DT.2014.6868686","url":null,"abstract":"The problem of modeling blood flow can be approached on different levels of accuracy. We investigate a model consisting of two major components: the fluid representing blood plasma and the elastic objects representing all types of cells in blood, e.g. red blood cells. The elastic objects are immersed in the fluid and they interact with each other. Our research is focused on spring-network models of elastic objects. We present the results concerning the scalability of meshes. We investigate the relation between mechanical properties of physical cells and the stiffness parameters of underlying meshes. Further, we present new metric that supplements energy-based approaches in cases when the energy is difficult to calculate. To demonstrate the abilities of our software implementation, we provide tests concerning the computational complexity. We show the significant speed-up caused by using templates when generating many cells with the same elastic properties. We also demonstrate the quadratic dependence of the computational time on increasing number of simulated cells. We suggest several directions for further model enhancements, such as better implementation of cell-cell collisions, inclusion of adhesion processes, monitoring the rupture of cells, and development of physically more relevant implementation of forces for some cell's elastic moduli.","PeriodicalId":330975,"journal":{"name":"The 10th International Conference on Digital Technologies 2014","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127850913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}