Open Access Open Access  Restricted Access Access granted  Restricted Access Subscription Access

Vol 53, No 4 (2019)

Article

Influence of Nonlinearity of Fast Sawtooth Voltage on Stroboscopic Transformation of Signals in Receivers of Sensors Locators

Aristov V.

Abstract

Sawtooth voltage with the possibility of changing its nonlinearity was modeled for a stroboscopic signal converter used in pulsed ultrawideband gigahertz sensor locators. The pattern of automatic shift in signal sample pulses is described mathematically, on the basis of which the formula of the law of shift in the aforementioned pulses at a nonlinear fast sawtooth voltage has been obtained. The effect of the nonlinearity of sawtooth voltage on the output signal of the stroboscopic converter is shown.

Automatic Control and Computer Sciences. 2019;53(4):291-297
pages 291-297 views

Optimal Robust Control of a Robots Group

Osadchy S.I., Zozulya V.A., Ladanyuk A.P., Vikhrova L.G., Kalich V.M.

Abstract

The article focuses on the development of an on-board system design method for optimal control of an autonomous mobile group of objects. It is assumed that the group consists of a leader and some agents. A new method for the synthesis of an optimal multivariable control system, which is needed for preserving desired position of the agent relatively to the leader, was substantiated in the article. The leader passes along a random trajectory and measurement of the agent position with respect to the leader is accompanied with random noise. All group members experience the action of random disturbances.

Automatic Control and Computer Sciences. 2019;53(4):298-309
pages 298-309 views

Sensor Fault Isolation in a Liquid Flow Process Using Kalman Filter

Nanditha Nair ., Santhosh K.V.

Abstract

Investigation of the effect of sensor fault in liquid process loop and designing a suitable fault isolation technique using the Kalman filter is proposed in this work. The objective of the work is to design an observer to estimate the process parameters, so as to compare with sensor functionality and thus identify and isolate faults in sensor. Based on the derived system model, observer is designed using Kalman filter approach. The proposed system with observer is subject to test in simulation and validated using physical system. The designed observer was successfully able to isolate drift, short circuit and open circuit faults in sensor. Practical validation shows the system with observer was able to track the set point with the root mean square of 0.986% error, even with faulty sensor.

Automatic Control and Computer Sciences. 2019;53(4):310-319
pages 310-319 views

Using Hybrid Discriminative-Generative Models for Binary Classification

Abroyan N.

Abstract

Discriminative and generative machine learning algorithms have been successfully used in different classification tasks during the last several decades. They both have some advantages and disadvantages and depending on a problem, one type of algorithm performs better than the other one. In this paper we contribute to the research of combination of both approaches and propose literature based a hybrid discriminative-generative generic model. Also, we propose hybrid model structure finding and building a new algorithm. We present theoretical and practical advantages of the hybrid model over its consisting algorithms, efficiency of the model structure finding algorithm, then perform experiments and compare results.

Automatic Control and Computer Sciences. 2019;53(4):320-327
pages 320-327 views

LSTM-Based Robust Voicing Decision Applied to DNN-Based Speech Synthesis

Pradeep R., Reddy M.K., Rao K.S.

Abstract

The quality of statistical parametric speech synthesis (SPSS) relies on voiced/unvoiced classification. Errors in voicing decision can contribute to significant degradation in speech quality. This paper proposes a robust voicing detection method based on power spectrum and long short term memory (LSTM) network for SPSS. The performance of the proposed method is evaluated using CMU Arctic, Keele and MIR-1K databases. Further, the effectiveness of the proposed method is analyzed for deep neural network (DNN)-based SPSS. The results show that the proposed method can better classify the voiced and unvoiced speech segments, which significantly improves the speech quality.

Automatic Control and Computer Sciences. 2019;53(4):328-332
pages 328-332 views

Optimization of URL-Based Phishing Websites Detection through Genetic Algorithms

Muhammad Taseer Suleman ., Shahid Mahmood Awan .

Abstract

Website phishing is an online crime for obtaining secret information such as passwords, account numbers, and credit card details. Attackers lure users through attractive hyperlinks, in order to, redirect to the fake websites. Phishing detection through a machine-learning approach has become quite effective nowadays. In this research, the Uniform Resource Locator (URL) based phishing detection approach has been used. Machine-learning classifiers like Naïve Bayes, Iterative Dichotomiser-3 (ID3), K-Nearest Neighbor (KNN), Decision Tree and Random Forest used for the classification of legitimate and illegitimate websites. This classification would help in the detection of phishing websites. However, it has been observed that use of Genetic Algorithms (GAs) for feature selection can improve the detection accuracy. Our experimental results portrayed the use of Iterative Dichotomiser-3 (ID3) along with Yet Another Generating Genetic Algorithm (YAGGA) improves the detection accuracy up to 95%.

Automatic Control and Computer Sciences. 2019;53(4):333-341
pages 333-341 views

Security Protection of System Sharing Data with Improved CP-ABE Encryption Algorithm under Cloud Computing Environment

Shumin Xue ., Chengjuan Ren .

Abstract

As the scale of cloud computing expands gradually, the security of data sharing in cloud computing environment is facing more and more challenges. In this study, an improved, efficient data encryption method was proposed, which was based on ciphertext policy attribute-based encryption and controlled time cost using fixed-length ciphertext. The generation and aggregation of public and private keys and the encryption and decryption of data were introduced. Then simulation experiments were carried out in the cloud computing environment. Compared with the traditional ciphertext-policy attribute-based encryption (CP-ABE) algorithm, the improved algorithm had better performance in dealing with massive data and multi-user attributes although the steps increased. The comparison with other improved algorithms suggested that the improved algorithm put forward in this study had a high reliability, which indicated a good practicability of the improved algorithm in safe data sharing under cloud computing environment.

Automatic Control and Computer Sciences. 2019;53(4):342-350
pages 342-350 views

Practical Prediction of CFO-Made OFDM Symbol Distortion

Lipovac A., Škaljo E., Lipovac V., Njemčević P.

Abstract

The Carrier Frequency Offset (CFO) is considered to be a major drawback of the Orthogonal Frequency-Division Multiplexing (OFDM) signal. So, in many practical situations, specifically with LTE-Advanced downlink introducing carrier aggregation, estimation of the CFO-induced OFDM symbol phase deviation, is of interest. However, this demands complex test equipment, such as e.g. a Vector Signal Analyzer (VSA), which might not be always and everywhere available. Therefore, we applied the link abstraction principle on the Bit Error Rate (BER) that is considered to be determined just by the CFO-caused phase deviation, i.e. as if the channel was noiseless and time-dispersion-free (so that evident bit errors occur just due to the actual CFO). Furthermore, as the CFO-caused squared phase deviation is linear with the instantaneous (per-OFDM-symbol) Peak-to-Average Power Ratio (PAPR), which is related to the Error Vector Magnitude (EVM) and so with BER, we develop a simple model for analytical BER-based estimating of CFO. In this sense, we considered the easy-to-measure BER degradation as resulting just from the according additive white Gaussian noise (AWGN) source, which abstracts the CFO distortion. The proposed analytical model is validated by according Monte-Carlo simulations.

Automatic Control and Computer Sciences. 2019;53(4):351-363
pages 351-363 views

Design of Printed log-Periodic Antennas for Long Range Communication within a Wireless Sensor Network for Sea Water Quality Monitoring

Gragnani G.L., Caviglia D.D., Montecucco C.

Abstract

In this paper the design of printed log-periodic antennas is presented. Focus is on the design of an antenna for long range communication within a wireless sensor network system for sea water quality monitoring, but the contents of the paper can also be useful at other frequencies and other applications. The difficulties in using the design procedure for log-periodic dipole antennas proposed by Carrel are discussed and some limitations are pointed out. New design hints are given, and preliminary examples of printed antennas are presented. Simulations are carried out not only for free-space but also in presence of sea and wave motion. Results show that printed log-periodic antennas can be good candidates for the intended application.

Automatic Control and Computer Sciences. 2019;53(4):364-375
pages 364-375 views

User Mobility in a 5G Cell with Quasi-Random Traffic under the Complete Sharing and Bandwidth Reservation Policies

Efstratiou P., Moscholios I.

Abstract

5G cellular mobile networks aspire to accommodate large numbers of users and devices most of which are expected to be mobile. They will also provide much higher data rates than previous generations’ networks. Analyzing how a cell’s performance is impacted by user mobility becomes paramount in an effort to provide the best possible quality of services. In this paper we propose a model of a generic cell where each user is moving based on the random waypoint model. We then adapt this model to a 5G cell to extract meaningful quality of service metrics. To this end and to provide a better perspective of how the model can be adapted to different bandwidth allocation policies, we extend the Engset multirate loss model to obtain recursive but efficient formulas for various performance measures, including call blocking and time congestion probabilities for both the complete sharing and bandwidth reservation policies.

Automatic Control and Computer Sciences. 2019;53(4):376-386
pages 376-386 views