Journal & Issues

Volume 74 (2023): Issue 5 (October 2023)

Volume 74 (2023): Issue 4 (August 2023)

Volume 74 (2023): Issue 3 (June 2023)

Volume 74 (2023): Issue 2 (April 2023)

Volume 74 (2023): Issue 1 (February 2023)

Volume 73 (2022): Issue 6 (December 2022)

Volume 73 (2022): Issue 5 (September 2022)

Volume 73 (2022): Issue 4 (August 2022)

Volume 73 (2022): Issue 3 (June 2022)

Volume 73 (2022): Issue 2 (April 2022)

Volume 73 (2022): Issue 1 (February 2022)

Volume 72 (2021): Issue 6 (December 2021)

Volume 72 (2021): Issue 5 (September 2021)

Volume 72 (2021): Issue 4 (August 2021)

Volume 72 (2021): Issue 3 (June 2021)

Volume 72 (2021): Issue 2 (April 2021)

Volume 72 (2021): Issue 1 (February 2021)

Volume 71 (2020): Issue 6 (December 2020)

Volume 71 (2020): Issue 5 (September 2020)

Volume 71 (2020): Issue 4 (August 2020)

Volume 71 (2020): Issue 3 (June 2020)

Volume 71 (2020): Issue 2 (April 2020)

Volume 71 (2020): Issue 1 (February 2020)

Volume 70 (2019): Issue 7 (December 2019)
Special Issue

Volume 70 (2019): Issue 6 (December 2019)

Volume 70 (2019): Issue 5 (September 2019)

Volume 70 (2019): Issue 4 (August 2019)

Volume 70 (2019): Issue 3 (June 2019)

Volume 70 (2019): Issue 2 (April 2019)

Volume 70 (2019): Issue 1 (February 2019)

Volume 69 (2018): Issue 6 (December 2018)

Volume 69 (2018): Issue 5 (September 2018)

Volume 69 (2018): Issue 4 (August 2018)

Volume 69 (2018): Issue 3 (June 2018)

Volume 69 (2018): Issue 2 (March 2018)

Volume 69 (2018): Issue 1 (January 2018)

Volume 68 (2017): Issue 7 (December 2017)

Volume 68 (2017): Issue 6 (November 2017)

Volume 68 (2017): Issue 5 (September 2017)

Volume 68 (2017): Issue 4 (August 2017)

Volume 68 (2017): Issue 3 (May 2017)

Volume 68 (2017): Issue 2 (March 2017)

Volume 68 (2017): Issue 1 (January 2017)

Volume 67 (2016): Issue 6 (December 2016)

Volume 67 (2016): Issue 5 (September 2016)

Volume 67 (2016): Issue 4 (July 2016)

Volume 67 (2016): Issue 3 (May 2016)

Volume 67 (2016): Issue 2 (April 2016)

Volume 67 (2016): Issue 1 (January 2016)

Volume 66 (2015): Issue 6 (November 2015)

Volume 66 (2015): Issue 5 (September 2015)

Volume 66 (2015): Issue 4 (July 2015)

Volume 66 (2015): Issue 3 (May 2015)

Volume 66 (2015): Issue 2 (March 2015)

Volume 66 (2015): Issue 1 (January 2015)

Volume 65 (2015): Issue 6 (January 2015)

Volume 65 (2014): Issue 5 (September 2014)

Volume 65 (2014): Issue 4 (August 2014)

Volume 65 (2014): Issue 3 (May 2014)

Volume 65 (2014): Issue 2 (March 2014)

Volume 65 (2014): Issue 1 (January 2014)

Volume 64 (2013): Issue 6 (November 2013)

Volume 64 (2013): Issue 5 (September 2013)

Volume 64 (2013): Issue 4 (June 2013)

Volume 64 (2013): Issue 3 (May 2013)

Volume 64 (2013): Issue 2 (March 2013)

Volume 64 (2013): Issue 1 (January 2013)

Volume 63 (2012): Issue 6 (December 2012)

Volume 63 (2012): Issue 5 (November 2012)

Volume 63 (2012): Issue 4 (July 2012)

Volume 63 (2012): Issue 3 (May 2012)

Volume 63 (2012): Issue 2 (March 2012)

Volume 63 (2012): Issue 1 (January 2012)

Volume 62 (2011): Issue 6 (November 2011)

Volume 62 (2011): Issue 5 (September 2011)

Volume 62 (2011): Issue 4 (July 2011)

Volume 62 (2011): Issue 3 (May 2011)

Volume 62 (2011): Issue 2 (March 2011)

Volume 62 (2011): Issue 1 (January 2011)

Volume 61 (2010): Issue 6 (November 2010)

Volume 61 (2010): Issue 5 (September 2010)

Volume 61 (2010): Issue 4 (July 2010)

Volume 61 (2010): Issue 3 (May 2010)

Volume 61 (2010): Issue 2 (March 2010)

Volume 61 (2010): Issue 1 (January 2010)

Journal Details
Format
Journal
eISSN
1339-309X
First Published
07 Jun 2011
Publication timeframe
6 times per year
Languages
English

Search

Volume 66 (2015): Issue 3 (May 2015)

Journal Details
Format
Journal
eISSN
1339-309X
First Published
07 Jun 2011
Publication timeframe
6 times per year
Languages
English

Search

0 Articles
Open Access

Variable Structure Sliding Mode Control and Direct Torque Control of Wind Power Generation System Based on the Pm Synchronous Generator

Published Online: 14 Jul 2015
Page range: 121 - 131

Abstract

Abstract

This paper presents a Variable Structure Sliding Mode Control (VS-SMC) scheme and Direct Torque Control (DTC) for Wind Farm (WF) based on the Permanent Magnet Synchronous Generator (PMSG). The WF consists of a 3 PMSGs which are connected to a common dc bus system with rectifier. The dc-bus is connected to the electrical network using only one inverter system, a grid-side filter as well as the transformer. The efficiency of the WF can be greatly improved using an appropriate control approach. So, the control strategy uses the technique of DTC to regulate the speeds of PMSGs for Maximum Power Point Tracking (MPPT) mode. Besides, by employing VS-SMC the grid-side inverter is controlled to inject the generated power into the electrical network, to regulate DC-link voltage and to achieve Unity Power Factor. The used control strategies provide an optimal control solution for WF systems based on the PMSG.

Keywords

  • wind power generation system
  • PMSG
  • MPPT
  • VS-SMC
  • DTC
  • unity power factor
Open Access

Text Line Segmentation With Water Flow Algorithm Based on Power Function

Published Online: 14 Jul 2015
Page range: 132 - 141

Abstract

Abstarct

This manuscript proposes an extension to the water flow algorithm for text line segmentation. Basic algorithm assumes hypothetical water flows under few specified angles of the document image frame from left to right and vice versa. As a result, unwetted image regions that incorporate text are extracted. These regions are of the major importance for text line segmentation. The extension of the basic algorithm means modification of water flow function that creates the unwetted region. Hence, the linear water flow function used in the basic algorithm is changed with its power function counterpart. Extended method was tested, examined and evaluated under different text samples. Results are encouraging due to improving text line segmentation which is a key process stage.

Keywords

  • optical character recognition
  • image processing
  • text line segmentation
  • water flow algorithm
Open Access

Detection of Frames With Single Complete Signs of Finger Alphabet in Video Sequence Using Visual Attention Approach

Published Online: 14 Jul 2015
Page range: 142 - 148

Abstract

Abstract

Visual information is very important in human communication. It is used in any type of sign language communication, and in non-verbal communication of the entire population, as well. Therefore, visual information is crucial for communication of hearing impaired people. Video is the most common way to capture this type of information and it is very important to correctly process it. In this paper we propose a method for finding video frames representing single sign in the finger alphabet. The single sign is identified using standard video quality metrics. The calculations of the metrics are performed only within a region, which is determined by combination of object tracking and salient regions detection method based on human visual attention. For key frame selection, combination of sliding system for finding local extreme and adaptive threshold based on local averaging and variation is used. Proposed method is effective and achieves significantly better results in comparison with other commonly used methods.

Keywords

  • key frame
  • sign language
  • tracking
  • video quality metric
  • visual attention
Open Access

Energy Efficient Auto–Configurable Algorithm for Wireless Sensor Networks

Published Online: 14 Jul 2015
Page range: 149 - 153

Abstract

Abstract

This paper proposed an auto-configurable algorithm for wireless sensor network (WSN) to efficiently re-organize the network topology. The auto-configurable algorithm is based on self- configurable cellular architecture and it has been observed from simulation result that the proposed algorithm achieves lower power consumption than the existing one.

Keywords

  • wireless sensor network
  • auto-configuration
  • self-configuring algorithms
  • topology control
Open Access

Peak to Average Power Ratio Reduction in NC–OFDM Systems

Published Online: 14 Jul 2015
Page range: 154 - 158

Abstract

Abstract

Non contiguous orthogonal frequency division multiplexing (NC-OFDM) is an efficient and adaptable multicarrier modulation scheme to be used in cognitive radio communications. However like OFDM, NC-OFDM also suffers from the main drawback of high peak to average power ratio (PAPR). In this paper PAPR has been reduced by employing three different trigonometric transforms. Discrete cosine transform (DCT), discrete sine transform (DST) and fractional fourier transform (FRFT) has been combined with conventional selected level mapping (SLM) technique to reduce the PAPR of both OFDM and NC-OFDM based systems. The method combines all the transforms with SLM in different ways. Transforms DCT, DST and FRFT have been applied before the SLM block or inside the SLM block before IFFT. Simulation results show the comparative analysis of all the transforms using SLM in case of both OFDM and NC-OFDM based systems.

Keywords

  • peak to average power ratio
  • non contiguous orthogonal frequency division multiplexing
  • selected level mapping
  • discrete cosine transform
  • discrete sine transform
  • fractional Fourier transform
Open Access

Improving CPA Attack Against DSA and ECDSA

Published Online: 14 Jul 2015
Page range: 159 - 163

Abstract

Abstract

In this work, we improved Correlation Power Analysis (CPA) attack against Digital Signature Algorithm (DSA) and its various derivations, such as Elliptic Curve Digital Signature Algorithm (ECDSA). The attack is aimed against integer multiplication with constant secret operand. We demonstrate this improvement on 16-bit integer multiplier in FPGA. The improvement makes it possible to guess more blocks of key, and the improvement also eliminates errors of simulated attacks what is very important when approximating attack success rate and complexity based on simulated attacks. We also discus a possible efficient countermeasure.

Keywords

  • side-channel-attacks
  • correlation power analysis
  • Hamming distance power model
  • DSA
  • ECDSA
  • PKI
Open Access

Application of Digital Filters to Check Quality of the Automatically Scaled Ionograms

Published Online: 14 Jul 2015
Page range: 164 - 168

Abstract

Abstract

The ionospheric observatory Pruhonice serves to monitor the state of ionosphere using ground-based vertical sounding instrument - the Digisonde DPS-4D. Measured ionograms are automatically evaluated (scaled) and basic characteristics are derived. The ionograms and the scaled parameters are sent to the international databases. Especially during disturbed conditions the automatic scaling could give unreliable results. This paper presents simple method how to detect accidental errors in automatic scaling based on the parameters derived from ionograms and on an application of the finite impulse response filters.

Keywords

  • ionogram
  • F2 layer
  • critical frequency
  • virtual height
  • total electron content
  • finite impulse response filter
Open Access

Text–Independent Speaker Recognition Using Two–Dimensional Information Entropy

Published Online: 14 Jul 2015
Page range: 169 - 173

Abstract

Abstract

Speaker recognition is the process of automatically recognizing who is speaking on the basis of speaker specific characteristics included in the speech signal. These speaker specific characteristics are called features. Over the past decades, extensive research has been carried out on various possible speech signal features obtained from signal in time or frequency domain. The objective of this paper is to introduce two-dimensional information entropy as a new text-independent speaker recognition feature. Computations are performed in time domain with real numbers exclusively. Experimental results show that the two-dimensional information entropy is a speaker specific characteristic, useful for speaker recognition.

Keywords

  • biometrics
  • speech
  • speaker recognition
  • feature extraction
  • information entropy
Open Access

Non–Destructive Testing of Conductive Material by Eddy Current Air Probe Based on Swept Frequency

Published Online: 14 Jul 2015
Page range: 174 - 177

Abstract

Abstract

This article deals with non-destructive testing of conductive materials by eddy current method based on swept frequency. A 2D numerical model of eddy current air-core probe was created in the LTspice software at first. The probe consists of two coils: exciting coil and receiving. The probe is positioned in air in this case. Experimental and calculated frequency responses of the probe are obtained within a wide frequency range using swept frequency in order to validate the model. Frther a 3D model used for non-destructive testing of austenitic steel plate with three electro-discharge machined notches is then developed accordingly. Results of measurement are compared with 3D numerical model using COMSOL Multiphysics software.

Keywords

  • non-destructive testing
  • eddy current method
  • swept frequency
  • circuit model
  • air probe
  • numerical simulation
Open Access

Comparison of Algorithms For Fitting a Gaussian Function Used in Testing Smart Sensors

Published Online: 14 Jul 2015
Page range: 178 - 181

Abstract

Abstract

This article offers useful algorithms for estimating the parameters of the Gaussian curve fitted to observed data, gained in testing of sensors. Fitting was realized using two algorithms Caruanas and Guos, which have been compared.

Keywords

  • smart sensors
  • Gaussian function
  • fitting algorithm
  • baseline correction
Open Access

Construction of Error Control Run Length Limited Codes Exploiting Some Parity Matrix Properties

Published Online: 14 Jul 2015
Page range: 182 - 184

Abstract

Abstract

Error control codes (ECC) as well as translation codes (TC) are used today in many different systems such as computer storages, communications systems and consumer electronic devices. ECC introduce redundancy into the encoded digital sequence in order to decrease the number of errors at output of its decoder [1]. TC introduce redundancy, in order to translate any digital sequence at the input of TC encoder to such output sequence, which fulfills constrains deduced from practical requirements. It is possible to construct codes, which have both of these properties, so called Transcontrol codes or their subclass error control run length limited (ECRLL) codes. In this manuscript a new approach to construction of EC-RLL codes is presented. The new construction is based on some parity check matrix properties of a linear binary block code from which the new EC-RLL code is obtained.

Keywords

  • error control codes (ECC)
  • translation codes (TC)
  • error control run length limited codes
  • modifier
0 Articles
Open Access

Variable Structure Sliding Mode Control and Direct Torque Control of Wind Power Generation System Based on the Pm Synchronous Generator

Published Online: 14 Jul 2015
Page range: 121 - 131

Abstract

Abstract

This paper presents a Variable Structure Sliding Mode Control (VS-SMC) scheme and Direct Torque Control (DTC) for Wind Farm (WF) based on the Permanent Magnet Synchronous Generator (PMSG). The WF consists of a 3 PMSGs which are connected to a common dc bus system with rectifier. The dc-bus is connected to the electrical network using only one inverter system, a grid-side filter as well as the transformer. The efficiency of the WF can be greatly improved using an appropriate control approach. So, the control strategy uses the technique of DTC to regulate the speeds of PMSGs for Maximum Power Point Tracking (MPPT) mode. Besides, by employing VS-SMC the grid-side inverter is controlled to inject the generated power into the electrical network, to regulate DC-link voltage and to achieve Unity Power Factor. The used control strategies provide an optimal control solution for WF systems based on the PMSG.

Keywords

  • wind power generation system
  • PMSG
  • MPPT
  • VS-SMC
  • DTC
  • unity power factor
Open Access

Text Line Segmentation With Water Flow Algorithm Based on Power Function

Published Online: 14 Jul 2015
Page range: 132 - 141

Abstract

Abstarct

This manuscript proposes an extension to the water flow algorithm for text line segmentation. Basic algorithm assumes hypothetical water flows under few specified angles of the document image frame from left to right and vice versa. As a result, unwetted image regions that incorporate text are extracted. These regions are of the major importance for text line segmentation. The extension of the basic algorithm means modification of water flow function that creates the unwetted region. Hence, the linear water flow function used in the basic algorithm is changed with its power function counterpart. Extended method was tested, examined and evaluated under different text samples. Results are encouraging due to improving text line segmentation which is a key process stage.

Keywords

  • optical character recognition
  • image processing
  • text line segmentation
  • water flow algorithm
Open Access

Detection of Frames With Single Complete Signs of Finger Alphabet in Video Sequence Using Visual Attention Approach

Published Online: 14 Jul 2015
Page range: 142 - 148

Abstract

Abstract

Visual information is very important in human communication. It is used in any type of sign language communication, and in non-verbal communication of the entire population, as well. Therefore, visual information is crucial for communication of hearing impaired people. Video is the most common way to capture this type of information and it is very important to correctly process it. In this paper we propose a method for finding video frames representing single sign in the finger alphabet. The single sign is identified using standard video quality metrics. The calculations of the metrics are performed only within a region, which is determined by combination of object tracking and salient regions detection method based on human visual attention. For key frame selection, combination of sliding system for finding local extreme and adaptive threshold based on local averaging and variation is used. Proposed method is effective and achieves significantly better results in comparison with other commonly used methods.

Keywords

  • key frame
  • sign language
  • tracking
  • video quality metric
  • visual attention
Open Access

Energy Efficient Auto–Configurable Algorithm for Wireless Sensor Networks

Published Online: 14 Jul 2015
Page range: 149 - 153

Abstract

Abstract

This paper proposed an auto-configurable algorithm for wireless sensor network (WSN) to efficiently re-organize the network topology. The auto-configurable algorithm is based on self- configurable cellular architecture and it has been observed from simulation result that the proposed algorithm achieves lower power consumption than the existing one.

Keywords

  • wireless sensor network
  • auto-configuration
  • self-configuring algorithms
  • topology control
Open Access

Peak to Average Power Ratio Reduction in NC–OFDM Systems

Published Online: 14 Jul 2015
Page range: 154 - 158

Abstract

Abstract

Non contiguous orthogonal frequency division multiplexing (NC-OFDM) is an efficient and adaptable multicarrier modulation scheme to be used in cognitive radio communications. However like OFDM, NC-OFDM also suffers from the main drawback of high peak to average power ratio (PAPR). In this paper PAPR has been reduced by employing three different trigonometric transforms. Discrete cosine transform (DCT), discrete sine transform (DST) and fractional fourier transform (FRFT) has been combined with conventional selected level mapping (SLM) technique to reduce the PAPR of both OFDM and NC-OFDM based systems. The method combines all the transforms with SLM in different ways. Transforms DCT, DST and FRFT have been applied before the SLM block or inside the SLM block before IFFT. Simulation results show the comparative analysis of all the transforms using SLM in case of both OFDM and NC-OFDM based systems.

Keywords

  • peak to average power ratio
  • non contiguous orthogonal frequency division multiplexing
  • selected level mapping
  • discrete cosine transform
  • discrete sine transform
  • fractional Fourier transform
Open Access

Improving CPA Attack Against DSA and ECDSA

Published Online: 14 Jul 2015
Page range: 159 - 163

Abstract

Abstract

In this work, we improved Correlation Power Analysis (CPA) attack against Digital Signature Algorithm (DSA) and its various derivations, such as Elliptic Curve Digital Signature Algorithm (ECDSA). The attack is aimed against integer multiplication with constant secret operand. We demonstrate this improvement on 16-bit integer multiplier in FPGA. The improvement makes it possible to guess more blocks of key, and the improvement also eliminates errors of simulated attacks what is very important when approximating attack success rate and complexity based on simulated attacks. We also discus a possible efficient countermeasure.

Keywords

  • side-channel-attacks
  • correlation power analysis
  • Hamming distance power model
  • DSA
  • ECDSA
  • PKI
Open Access

Application of Digital Filters to Check Quality of the Automatically Scaled Ionograms

Published Online: 14 Jul 2015
Page range: 164 - 168

Abstract

Abstract

The ionospheric observatory Pruhonice serves to monitor the state of ionosphere using ground-based vertical sounding instrument - the Digisonde DPS-4D. Measured ionograms are automatically evaluated (scaled) and basic characteristics are derived. The ionograms and the scaled parameters are sent to the international databases. Especially during disturbed conditions the automatic scaling could give unreliable results. This paper presents simple method how to detect accidental errors in automatic scaling based on the parameters derived from ionograms and on an application of the finite impulse response filters.

Keywords

  • ionogram
  • F2 layer
  • critical frequency
  • virtual height
  • total electron content
  • finite impulse response filter
Open Access

Text–Independent Speaker Recognition Using Two–Dimensional Information Entropy

Published Online: 14 Jul 2015
Page range: 169 - 173

Abstract

Abstract

Speaker recognition is the process of automatically recognizing who is speaking on the basis of speaker specific characteristics included in the speech signal. These speaker specific characteristics are called features. Over the past decades, extensive research has been carried out on various possible speech signal features obtained from signal in time or frequency domain. The objective of this paper is to introduce two-dimensional information entropy as a new text-independent speaker recognition feature. Computations are performed in time domain with real numbers exclusively. Experimental results show that the two-dimensional information entropy is a speaker specific characteristic, useful for speaker recognition.

Keywords

  • biometrics
  • speech
  • speaker recognition
  • feature extraction
  • information entropy
Open Access

Non–Destructive Testing of Conductive Material by Eddy Current Air Probe Based on Swept Frequency

Published Online: 14 Jul 2015
Page range: 174 - 177

Abstract

Abstract

This article deals with non-destructive testing of conductive materials by eddy current method based on swept frequency. A 2D numerical model of eddy current air-core probe was created in the LTspice software at first. The probe consists of two coils: exciting coil and receiving. The probe is positioned in air in this case. Experimental and calculated frequency responses of the probe are obtained within a wide frequency range using swept frequency in order to validate the model. Frther a 3D model used for non-destructive testing of austenitic steel plate with three electro-discharge machined notches is then developed accordingly. Results of measurement are compared with 3D numerical model using COMSOL Multiphysics software.

Keywords

  • non-destructive testing
  • eddy current method
  • swept frequency
  • circuit model
  • air probe
  • numerical simulation
Open Access

Comparison of Algorithms For Fitting a Gaussian Function Used in Testing Smart Sensors

Published Online: 14 Jul 2015
Page range: 178 - 181

Abstract

Abstract

This article offers useful algorithms for estimating the parameters of the Gaussian curve fitted to observed data, gained in testing of sensors. Fitting was realized using two algorithms Caruanas and Guos, which have been compared.

Keywords

  • smart sensors
  • Gaussian function
  • fitting algorithm
  • baseline correction
Open Access

Construction of Error Control Run Length Limited Codes Exploiting Some Parity Matrix Properties

Published Online: 14 Jul 2015
Page range: 182 - 184

Abstract

Abstract

Error control codes (ECC) as well as translation codes (TC) are used today in many different systems such as computer storages, communications systems and consumer electronic devices. ECC introduce redundancy into the encoded digital sequence in order to decrease the number of errors at output of its decoder [1]. TC introduce redundancy, in order to translate any digital sequence at the input of TC encoder to such output sequence, which fulfills constrains deduced from practical requirements. It is possible to construct codes, which have both of these properties, so called Transcontrol codes or their subclass error control run length limited (ECRLL) codes. In this manuscript a new approach to construction of EC-RLL codes is presented. The new construction is based on some parity check matrix properties of a linear binary block code from which the new EC-RLL code is obtained.

Keywords

  • error control codes (ECC)
  • translation codes (TC)
  • error control run length limited codes
  • modifier