April 2018, Volume 18, Number 1
BEREŽNÝ, Š. — BUŠA, J. Jr. — STAŠ, M. Software Solution of the Algorithm of the Cyclic-Order Graph |
SHUTENKO, O. Method for Detection of Developing Defects in High-Voltage Power Transformers by Results of the Analysis of Dissolved Oil Gases |
SARAIVA, J. — COUTO, M. — SZABÓ, Cs. — NOVÁK, D. Towards Energy-Aware Coding Practices for Android |
BENBOUHENNI, H. Improved Switching Selection for DTC of Induction Motor Drive Using Artificial Neural Networks |
KASCAK, S. — PRAZENICA, M. — JARABICOVA, M. — KONARIK, R. Four Phase Interleaved Boost Converter - Analysis and Verification |
RANI, P. — BAGHLA, S. — MONGA, H. An Improved PAPR Reduction Technique for Universal Filter Multi-Carrier Modulation |
ORAVEC, J. — TURÁN, J. — OVSENÍK, Ľ. . An Image Encryption Scheme Utilizing Harper's Map |
LABAN, M. — DRUTAROVSKY, M. Low-cost ARM Cortex-M0 Based TRNG for IoT Applications |
SARNOVSKY, M. — SURMA, J. Predictive Models for Support of Incident Management Process in IT Service Management |
Summary: |
Štefan BEREŽNÝ - Ján BUŠA Jr. - Michal STAŠ SOFTWARE SOLUTION OF THE ALGORITHM OF THE CYCLIC-ORDER GRAPH [full paper]
In this paper we describe by pseudo-code the “Algorithm of the cyclic-order graph”, which we programmed in MATLAB 2016a
and which is also possible to be executed in GNU Octave. We describe program’s functionality and its use. The program implementing
this algorithm is an indispensable tool during proofs in the field of graph theory, especially when dealing with crossing numbers for
join products of graphs with paths of given numbers of vertices.
|
Oleg SHUTENKO METHOD FOR DETECTION OF DEVELOPING DEFECTS IN HIGH-VOLTAGE POWER TRANSFORMERS BY RESULTS OF THE ANALYSIS OF DISSOLVED OIL GASES [full paper]
The article describes a method for detecting developing defects in high-power oil-filled transformers, based on the results of
analysis of dissolved gases in oil. It has been found that an early diagnostic sign of development of ionization processes of aging and
thermal degradation in transformers’ isolation is the appearance of a systematic trend in the time dependencies of hydrocarbon gas
content. Though, exceeding the concentrations of gases regulated by boundary values (the traditional criterion) does not always
reflect the damage to the insulation, it often being reversible.
|
João SARAIVA - Marco COUTO - Csaba SZABÓ - Dávid NOVÁK TOWARDS ENERGY-AWARE CODING PRACTICES FOR ANDROID [full paper]
This paper studies how the use of different coding practices when developing Android applications influence energy
consumption. We consider two common Java/Android programming practices, namely string operations and (non) cached image
loading, and we show the energy profile of different coding practices for doing them. With string operations, we compare the
performance of the usage of the standard String class to the usage of the StringBuilder class, while with our second practice we
evaluate the benefits of image caching with asynchronous loading. We externally measure energy consumption of the example
applications using the Trepn profiler application by Qualcomm. Our preliminary results show that selected coding practices do
significantly affect energy consumption, in the particular cases of our practice selection, this difference varies between 20% and
50%.
|
Habib BENBOUHENNI IMPROVED SWITCHING SELECTION FOR DTC OF INDUCTION MOTOR DRIVE USING ARTIFICIAL NEURAL NETWORKS [full paper]
Direct Torque Control (DTC) is a control technique in AC drive systems to obtain high performance torque ripple. This paper
also proposes improvement of the conventional DTC without voltages zeros using the improvement of the switching table and the
application of the Artificial Neural Network (ANN) to minimize the torque ripple, stator flux ripple and Total Harmonic Distortion
(THD) value of stator current and to get better performance of the induction motor (1MW) controlled by DTC, by using two-level
inverter. The comparison with conventional direct torque control, show that the use of the proposed strategies with ANN, reduced the
torque ripple, stator flux ripple and total harmonic distortion value of stator current. The validity of the proposed strategies is
confirmed by the simulative results.
|
Slavomir KASCAK - Michal PRAZENICA - Miriam JARABICOVA - Roman KONARIK FOUR PHASE INTERLEAVED BOOST CONVERTER - ANALYSIS AND VERIFICATION [full paper]
This paper deals with an analysis of four phase interleaved DC-DC converter for higher power application in continuous
conduction mode. The interleaved topology is widely used due to their advantage as lower input current ripple which means volume
reduction of input capacitor. The current ripple equation of an input current for the boost operation mode and the ripple current in
individual phases of the interleaved converter using uncoupled inductor are shown. The theoretical equations are supplemented by
the simulation results using Spice simulator and by measurement on the interleaved converter.
|
Pooja RANI - Silki BAGHLA - Himanshu MONGA AN IMPROVED PAPR REDUCTION TECHNIQUE FOR UNIVERSAL FILTER MULTI-CARRIER MODULATION [full paper]
Universal Filter Multi-Carrier (UFMC) modulation is a potential candidate for next generation wireless communication due to
its advantages like better sub carrier separation and less complexity. Higher peak to average power ratio (PAPR) affects the
performance of UFMC and suitable PAPR reduction technique is required to mitigate the same. In this work, an improved PAPR
reduction technique (CFC-UFMC) has been proposed for UFMC system. Performance of proposed technique is compared with
existing Selective Mapping (SLM), Clipping, Companding and Clipping & Filtering methods as applied on UFMC. Simulation
results show that proposed technique provides better PAPR reduction with variation in design parameters namely FFT Size, Filter
Length and Bits per sub carrier as compared with other techniques. Various PAPR reduction techniques have also been compared
on the basis of bit error rate.
|
Jakub ORAVEC - Ján TURÁN - Ľuboš OVSENÍK AN IMAGE ENCRYPTION SCHEME UTILIZING HARPER’S MAP [full paper]
This paper deals with an image encryption scheme, which could be used for improving security of steganographic algorithms.
Higher level of security is reached by masking information contained in secret data by their encryption. Therefore in the worst case,
the attacks would yield encrypted version of secret data in the worst case. After brief description of reasons for usage and drawbacks
of already used solutions, the paper presents one of chaotic maps as possible tool for encryption algorithms construction. Properties
of this map and proposed algorithms are discussed in detail. The effects caused by application of described encryption scheme are
illustrated by performed experiments.
|
Marek LABAN - Miloš DRUTÁROVSKY LOW-COST ARM CORTEX-M0 BASED TRNG FOR IOT APPLICATIONS [full paper]
The Internet of Things (IoT) is one of perspective electronic sectors. In the near future a lot of common devices from a refrigerator
to a door lock will be connected to the internet. Protection of the IoT devices should not be neglected. The device security is composed
of many safety levels, where every countermeasure increases its robustness.
The paper describes an implementation of a True Random Number Generator (TRNG) used in many cryptographic algorithms
and protocols. It is based on a modern low-cost and low-power STM32F050 ARM-M0 microcontroller, suitable especially for IoT
applications. The main motivation for developing of such generator was its absence in lower members of microcontroller families.
Integrated TRNG uses common features of the microcontroller, which may be portable across ARM-M0 architecture. A source of
randomness is instability of internal RC oscillator, which is acquired using another faster clock and one timer.
The paper follows a previous research, but using the modern microcontroller with proposed on-line embedded tests which are
designed in order to be simple and effective.
|
Martin SARNOVSKY - Juraj SURMA PREDICTIVE MODELS FOR SUPPORT OF INCIDENT MANAGEMENT PROCESS IN IT SERVICE MANAGEMENT [full paper] The work presented in this paper is focused on creating of predictive models that help in the process of incident resolution and
implementation of IT infrastructure changes to increase the overall support of IT management. Our main objective was to build the
predictive models using machine learning algorithms and CRISP-DM methodology. We used the incident and related changes
database obtained from the IT environment of the Rabobank Group company, which contained information about the processing of
the incidents during the incident management process. We decided to investigate the dependencies between the incident observation
on particular infrastructure component and the actual source of the incident as well as the dependency between the incidents and
related changes in the infrastructure. We used Random Forests and Gradient Boosting Machine classifiers in the process of
identification of incident source as well as in the prediction of possible impact of the observed incident. Both types of models were
tested on testing set and evaluated using defined metrics.
|