In this paper, methods for detecting failures in process sensors from the noise measurement due to aging issues are examined. The data are acquired from the water level and pressure measurement transmitters in the Olkiluoto nuclear power plant in Finland: units Olkiluoto 1 and Olkiluoto 2. Methods found from the literature about the failure indicators are presented. Changes in the sensor response...
The problem of ensuring the effective functioning of the measuring data acquisition system of RLC-parameters for non-electric objects such as the objects of an environment, food industry, agriculture etc. has been actualized. It has been suggested to conduct remote metrological control at the site of analytical unit's exploitation with the use of differential measurement method and code-controlled...
The purpose of this study is a solving the multicriteria task of choosing the optimal structure of a hybrid energy system with renewable sources. To achieve this goal the models for making decision on determination of all possible configurations of energy system and a selection of the optimal structure of its elements for each of the configuration were proposed. The proposed model differs from the...
This paper presents the application of runs test for indirect consideration of observation's autocorrelation in estimation of a standard uncertainty of arithmetic mean value. At first stage researches were performed by Monte Carlo (MC) simulation for two kind's random signals: first order autoregression (AR) and moving averaging (MA). Comparison of theoretical values of effective number of observations...
Consensus control problem for a group of agents in a multi-agent networked system is considered. The agents are modeled by linear dynamical systems and the interconnection topology of agent's network is represented as a directed weighted graph. A decentralized approach to the synthesis of consensus control is proposed, including a synthesis of the local stabilizing controllers for each agent of networked...
Network traffic captures are necessary for a variety of security applications like identification of malicious patterns or training of intrusion detection systems. While monitoring of enterprise networks is common practice, it is rarely done for industrial production environments due to low bandwidth, confidential production data and sensitive legacy components. To address these challenges, we present...
The paper presents a new technique for unknown metamorphic viruses' detection. It is based on the analysis of the potentially suspicious behavior of the programs on the host. The novelty of the contribution is that, the analysis is performed via the comparison of the functional blocks of the disassembled code before and after program's emulation, which is executed within the modified emulators installed...
The paper introduces application of the clustering methods fusion to determine operating states of electrical devices with complex modes of operation. The analysis is based on processing patterns characterizing the energy consumption of device. Pattern is a vector of features extracted from current and voltage signal recorded by specialized meter installed nearby electricity network node. Three methods...
The method for finding inverse element by the module is based on the stepwise addition of residue is developed in this paper. This method allows avoiding performing the complex arithmetic operations and implementing calculations on numbers much lower bit compared to the classical approach based on the Euclid's algorithm and its consequences. Analytical expressions of time complexity characteristics...
The influence of ultrasonic radiation in the cavitation regime on the properties of wood activated carbon has been studied. The impedance dependence for the supercapacitors made both of the original and the modified carbon have been analysed. The equivalent electrical circuits modelling the impedance hodographs have been constructed. It has been shown that ultrasonic radiation changes the properties...
A cryptographic security scheme is proposed for a subsystem of the integrated computer-aided system that is intended for holding elections and counting the election returns. The main idea is to use two modern quantum cryptographic technologies: quantum bit commitment and quantum secret sharing. The scheme of information security of vote count procedure, and also the quantum bit commitment protocol...
Efficient detection and reliable matching of image features constitute a fundamental task in computer vision. When real-time operation is required, the solution to this problem becomes a real challenge, because of increased processing requirements. Scale Invariant Feature Transform (SIFT) is considered as a stable and robust algorithm for the extraction of invariant features, however special hardware...
A sensorless V/f speed controller for single phase induction motors is proposed, based on a 3-phase to single-phase matrix converter and a fuzzy asymmetrical PWM modulation technique. The system is implemented with a low-cost microcontroller and achieves smooth response to the input control parameter. It also provides an optimization of the output power factor, since it reduces effectively the inductive...
The paper describes Web SCADA Systems, designed by the authors, for monitoring and automation of control processes in the specialized pyrolysis complexes (SPC) for municipal polymeric waste (MPW) utilization. The functional structure and main components of the generalized SPC Web SCADA system are given. The specific example of the proposed SPC Web SCADA system application is also presented. Considerable...
In this paper the boundary value problem for heat conduction of an isotropic piecewise homogeneous plate with a through foreign inclusions, heated by a heat flow concentrated at one of its boundary surfaces is considered. Coefficient of thermal conductivity for the system as a whole is described by asymmetric unit functions. The result is a heat conduction equation with discontinuous and singular...
This paper presents research results of the novel system to control traffic lights which is based on the common European model. One of the most important measures for dealing with this problem is to adopt favorable traffic signal control strategy. The main objective of this research is to develop an effective procedure to control the traffic, which tries to reduce possibility of traffic jams. Additionally,...
The paper presents and discusses a novel method for reconstructing of surface topology from only one white light interferogram picture. The main idea of the proposed method is reversal of an interferometry channel transform function and applying computationally simple methods of polynomial approximation for single segments of the white light interferogram. The polynomial coefficients are computed...
The paper presents and discusses a novel method of biometrie identification based on ECG data. The main idea of the study is to apply Deep Neural Networks (DNN) for human identification based on the raw ECG signal. To improve overall system accuracy various signal pre-processing and outlier detection techniques have been applied. Also, to make ECG identification approach more user friendly, three-finger...
In this paper the methods of data protection for developed by authors earlier multichannel system of quantum secure communication are proposed. These methods allow closing the intercepted data from the unauthorized user. The simulation model of quantum secure communication system on optical fiber is developed. This model depends on three parameters: probabilities of an error in the fiber optic channel,...
This paper describes a new educational robot called ROBOBO which was developed in order to provide an engaging and natural interactive experience with children. The objective is to motivate children to explore and cooperate with the robots while they learn concepts and abilities related to STEM education (Science, Technology, Engineering and Mathematics). The robot and the educational approach has...