Icef 2023 PDF
Icef 2023 PDF
2023
International Conference on
Electrical Facilities and
informational technologies 2023
▶ Information
▶ Program at a Glance
▶ Contents
▶ Papers
KIEE Electrical
Organized by : Facilities Society
Co-Organized by :
Welcome Message
-2-
Committee
❚CONFERENCE HONORARY CHAIRMAN
Murat Syzdykov (Rector, AUPET, Republic of Kazakhstan)
Saltanat Amirgaliyeva (Rector, Academy of Logistcs and Transport, Kazakhstan)
Seung-Joe Yoon (President, Korea National University of Transportation, Korea)
❚CONFERENCE CHAIR
Sangyule Choi (Induk University, Korea)
❚ORGANIZING CHAIR
Jeong Won Kang (Korea National University of Transportation, Korea)
Minjae Lee (Gwangju Institute of Science and Technology, Korea)
Hyunchul Kim (Korea Railroad Research Institute, Korea)
❚PROGRAM CHAIR
Juhee Choi (Sangmyung university, Korea)
Jong-In Song (Gwangju Institute of Science and Technology, Korea)
Hag-Wone Kim (Korea National University of Transportation, Korea)
Ainur Begimbetova (AUPET, Republic of Kazakhstan)
-3-
Manish Khare
(Dhirubhai Ambani Institute of Information and Communication Technology, India)
Jin Hyuk Park (Korea Railroad Research Institute, Korea)
Gunbok Lee (Korea Railroad Research Institute, Korea)
Yernar Amitov (AUPET, Republic of Kazakhstan)
Maxim Korobkov (AUPET, Republic of Kazakhstan)
Assel Mukasheva (AUPET, Republic of Kazakhstan)
Gani Balbayev (Academy of Logistcs and Transport, Kazakhstan)
Kuanysh Alipbayev (AUPET, Republic of Kazakhstan)
Joonho Ahn (Seoul National Univ. SEPRI, Korea)
Seungkwon Shin (Korea Railroad Research Institute, Korea)
❚FINANCIAL CHAIR
Jongnam Kim (YSFS Co.,Ltd, Korea)
Yongbae Im (Korea Electrotechnology Research Institute, Korea)
Gulziya Rakhmetova (AUPET, Republic of Kazakhstan)
❚AWARD CHAIRS
Jeongju Kim (Hoseo University, Korea)
Zhubanysh Abdimuratov (AUPET, Republic of Kazakhstan)
❚PUBLICATION CHAIRS
Jeonghwan Gwak (Korea National University of Transportation, Korea)
Yongho Yoon (Gwangju University, Korea)
Hoseong Jeong (Korea Railroad Research Institute, Korea)
Vyacheslav Stoyak (AUPET, Republic of Kazakhstan)
Algazy Zhauyt (AUPET, Republic of Kazakhstan)
❚LOCAL CHAIR
Zhadyra Sagyndykova (AUPET, Republic of Kazakhstan)
-4-
Conference Topics
Conference Topics Paper Topics Include, But Are Not Limited To:*
-5-
❚Session 4 : Intelligent Transportation Technology
• Railway System & Technology
• Intelligent Transportation System
• Future Smart Automobile Technology
• Road Operation Technology
-6-
Venue Information
▪ MAP
▪ Address
▪ CONTACT US
-7-
Program at a Glance
◾WORKSHOP (1)
17:10~19:00
SMART RAILWAY SYSTEM WORKSHOP
-8-
Program at a Glance
◾Opening Ceremony
11:30~12:30 - Opening Speech
- Welcome Speech
PM 16:20~18:00 Oral Session (6) Oral Session (7) Oral Session (8) Oral Session (9) Oral Session (10)
-9-
Program at a Glance
09:00~ Registration
Time Room 1 (A428) Room 2 (A432) Room 3 (A434) Room 4 (A435) Room 5 (A437)
18:30~20:30 Banquet
- 10 -
Program at a Glance
- 11 -
Social Programs
Welcome Reception
On the first day of the conference, please join to know each other!
Opening Ceremony
❚Opening Speech
- Prof. SangYule Choi (ICEF2023 Chairman, Korea)
❚Welcome Speech
- Rector Murat Syzdykov (AUPET, Republic of Kazakhstan)
- Rector Saltanat Amirgaliyeva (Academy of Logistic and Transport, Republic of
Kazakhstan)
- Consul General Naecheon Park (Consulate General of the Republic of Korea in
Almaty)
- Dr. Jun Hoon Park (Honorable President of Korea National University of
Transportation, Korea)
- Aidyn Ayimbetov (Kazakhstani astronaut)
- 12 -
Keynote session
- 13 -
Special session
Oral Session
- 14 -
16:20~ ◾Oral Session 8 Room 3
18:00 Session 3: Information Technology A434
Poster Session
- 15 -
Online & Offline Assistance
[normal distribution]
- Regular USD 600
- Student USD 300
- [Early-Virtual]
- Regular USD 300
- Student USD 150
Keynote Sessions, Conference Kit, Lunches
❚Personal Envelope
1. Name Badge
2. Program Book
3. Souvenir
❚Lunch
- August 23 (WED) 12:30 – 14:00
- August 24 (THU) 12:40 – 14:00
- 16 -
❚DOWNLOAD MATERIALS
You can download your materials at my page or virtual website
❚What are the technical requirements needed to participate in the ICEF 2023
online?
You need an Internet connection and web
browser. For the best viewing experience,
we recommend that you join the conference
using a supported internet browser, which
includes Google Chrome, Firefox and Safari.
- 17 -
Keynote, Oral Presentation (on-site/online)
ZOOM Access Link For Each Conference Room [GMT +06 / Almaty, Kazakhstan]
14:00~ https://us06web.zoom.us/j/8700834425?pwd=
◾ Keynote session (1) Log-in ID: 870 083 4425
14:40 WEtHK0llaWZmTWtmTnhPUlVqRmlGUT09
ACCESS CODE: 1
14:40~ https://us06web.zoom.us/j/8700834425?pwd=
◾ Keynote session (2) Log-in ID: 870 083 4425
15:20 WEtHK0llaWZmTWtmTnhPUlVqRmlGUT09
August 22 ACCESS CODE: 1
(TUE)
15:50~ https://us06web.zoom.us/j/8700834425?pwd=
◾ Keynote session (3) Log-in ID: 870 083 4425
16:30 WEtHK0llaWZmTWtmTnhPUlVqRmlGUT09
ACCESS CODE: 1
16:30~ https://us06web.zoom.us/j/8700834425?pwd=
◾ Keynote session (4) Log-in ID: 870 083 4425
17:10 WEtHK0llaWZmTWtmTnhPUlVqRmlGUT09
ACCESS CODE: 1
09:00~ https://us06web.zoom.us/j/8700834425?pwd=
◾ Keynote session (5) Log-in ID: 870 083 4425
09:40 WEtHK0llaWZmTWtmTnhPUlVqRmlGUT09
ACCESS CODE: 1
09:40~ https://us06web.zoom.us/j/8700834425?pwd=
◾ Keynote session (6) Log-in ID: 870 083 4425
10:20 WEtHK0llaWZmTWtmTnhPUlVqRmlGUT09
August 23 ACCESS CODE: 1
(WED)
10:20~ https://us06web.zoom.us/j/8700834425?pwd=
◾ Keynote session (7) Log-in ID: 870 083 4425
11:00 WEtHK0llaWZmTWtmTnhPUlVqRmlGUT09
ACCESS CODE: 1
11:30~ https://us06web.zoom.us/j/8700834425?pwd=
◾ Opening Ceremony Log-in ID: 870 083 4425
12:30 WEtHK0llaWZmTWtmTnhPUlVqRmlGUT09
ACCESS CODE: 1
- 18 -
DATE Live Sessions Access Link Log-in ID
09:00~ https://us06web.zoom.us/j/8700834425?pwd=
◾ Keynote session (8) Log-in ID: 870 083 4425
09:40 WEtHK0llaWZmTWtmTnhPUlVqRmlGUT09
ACCESS CODE: 1
09:40~ https://us06web.zoom.us/j/8700834425?pwd=
◾ Keynote session (9) Log-in ID: 870 083 4425
10:20 WEtHK0llaWZmTWtmTnhPUlVqRmlGUT09
August 24 ACCESS CODE: 1
(THU)
10:40~ https://us06web.zoom.us/j/8700834425?pwd=
◾ Keynote session (10) Log-in ID: 870 083 4425
11:20 WEtHK0llaWZmTWtmTnhPUlVqRmlGUT09
ACCESS CODE: 1
11:20~ https://us06web.zoom.us/j/8700834425?pwd=
◾ Keynote session (11) Log-in ID: 870 083 4425
12:00 WEtHK0llaWZmTWtmTnhPUlVqRmlGUT09
ACCESS CODE: 1
14:00~ https://us06web.zoom.us/j/7386073435?pwd=
◾ Oral Session 1 Log-in ID: 738 607 3435
15:40 SHAzL1kwTmcyYm1PdkdzNVNLNUZ6dz09
ACCESS CODE: 1
14:00~ https://us06web.zoom.us/j/6118289105?pwd=
◾ Oral Session 2 Log-in ID: 611 828 9105
15:40 V0lmWFRRL0R6Tm56QTdRUHNoMWI3QT09
ACCESS CODE: 1
14:00~ https://us06web.zoom.us/j/9127203688?pwd=
◾ Oral Session 3 Log-in ID: 912 720 3688
15:40 dTVreXJLQXFzdVNrTUp0aVpZUzdJUT09
ACCESS CODE: 1
14:00~ https://us06web.zoom.us/j/2857636750?pwd=
◾ Oral Session 4 Log-in ID: 285 763 6750
15:40 SHAzL1kwTmcyYm1PdkdzNVNLNUZ6dz09
August 23 ACCESS CODE: 1
(WED)
14:00~ https://us06web.zoom.us/j/8700834425?pwd=
◾ Oral Session 5 Log-in ID: 870 083 4425
15:40 WEtHK0llaWZmTWtmTnhPUlVqRmlGUT09
ACCESS CODE: 1
16:20~ https://us06web.zoom.us/j/7386073435?pwd=
◾ Oral Session 6 Log-in ID: 738 607 3435
18:00 SHAzL1kwTmcyYm1PdkdzNVNLNUZ6dz09
ACCESS CODE: 1
16:20~ https://us06web.zoom.us/j/6118289105?pwd=
◾ Oral Session 7 Log-in ID: 611 828 9105
18:00 V0lmWFRRL0R6Tm56QTdRUHNoMWI3QT09
ACCESS CODE: 1
16:20~ https://us06web.zoom.us/j/9127203688?pwd=
◾ Oral Session 8 Log-in ID: 912 720 3688
18:00 dTVreXJLQXFzdVNrTUp0aVpZUzdJUT09
ACCESS CODE: 1
- 19 -
DATE Live Sessions Access Link Log-in ID
16:20~ https://us06web.zoom.us/j/2857636750?pwd=S
◾ Oral Session 9 Log-in ID: 285 763 6750
18:00 HAzL1kwTmcyYm1PdkdzNVNLNUZ6dz09
August 23 ACCESS CODE: 1
(WED)
16:20~ https://us06web.zoom.us/j/8700834425?pwd=
◾ Oral Session 10 Log-in ID: 870 083 4425
18:00 WEtHK0llaWZmTWtmTnhPUlVqRmlGUT09
ACCESS CODE: 1
14:00~ https://us06web.zoom.us/j/7305475584?pwd=d
◾ Oral Session 11 Log-in ID: 730 547 5584
15:40 TVreXJLQXFzdVNrTUp0aVpZUzdJUT09
ACCESS CODE: 1
14:00~ https://us06web.zoom.us/j/5104981166?pwd=b
◾ Oral Session 12 Log-in ID: 510 498 1166
15:40 3M4cFJxUHFnZnpuU3kyWW8vNzg0QT09
August 24 ACCESS CODE: 1
(THU)
14:00~ https://us06web.zoom.us/j/6118289105?pwd=V
◾ Oral Session 13 Log-in ID: 611 828 9105
15:40 0lmWFRRL0R6Tm56QTdRUHNoMWI3QT09
ACCESS CODE: 1
14:00~ https://us06web.zoom.us/j/5520682143?pwd=
◾ Oral Session 14 Log-in ID: 552 068 2143
15:40 WEtHK0llaWZmTWtmTnhPUlVqRmlGUT09
ACCESS CODE: 1
- 20 -
How The Session Will Go
Oral Session
Poster Session
• Poster authors should print, bring and post the posters at the designated spot for
on-site availability. [A1 Size : 594*841mm]
• Please make sure to stand by your poster during your assigned presentation time.
• Q&As will be made live on-site and via virtual website with comments and email.
• All posters will be posted on both platforms (online/offline) simultaneously during the
conference dates.
- 21 -
Special Sessions
09:00~13:00 FRI, August 25, 2023
Room (Room 5, A437, ALT)
- 22 -
Contents
Oral Session 1
Improved LQR control using fuzzy logic and Kalman filter controller of DC motor ··············· 39
Adil Maidanov1*, Sabyrzhan Atanov1, and Hüseyin Canbolat2
1
L. N. Gumilev Eurasian National University, Kazakhstan, 2Ankara Yildirim Beyazit University,
Kazakhstan
On the issue of constructing and identifying the parameters of the piezometric pattern of
pumping wells in the underground leaching of metals ····················································· 55
Bakhyt Mukhanov1, Zhanar Omirbekova2, Yerbol Orakbayev1, and Gulmira Bazil1
1 2
Almaty University of Power Engineering and Telecommunications, Kazakhstan, Satbayev University
Almaty, Kazakhstan
Analysis and synthesis of single-bit adders for multi-bit adders with sequential transfers ···· 59
1 1 2
Sakhybay Tynymbayev , Assel Mukasheva , and Ibragimov Kuanyshbek
1 2
Almaty University of Power Engineering and Telecommunications Almaty, Kazakhstan, Al-Farabi
Kazakh National University, Kazakhstan
Oral Session 2
Assessment of Locational and Total Hosting Capacity of Distribution Network with Multitype
DGUs by Iterative OPF Method ··························································································· 70
S Jarjees Ul Hassan, Arif Mehdi, Jin-Sol Song, Abraham D. Arefaynie, Zeeshan Haider, and
Chul-Hwan Kim*
Sungkyunkwan University, Korea
- 23 -
Investigation of Grounding Schemes in Hybrid (AC/DC) Medium Voltage Distribution
Networks ··························································································································· 81
Zeeshan Haider, Arif Mehdi, S Jarjees Ul Hassan, Jin-Sol Song, Abraham D. Arefaynie, and
Chul-Hwan Kim*
Sungkyunkwan University, Korea
Oral Session 3
Research and development of an information system for speech recognition based on neural
network algorithms. ·········································································································· 88
Maksat Kanashev1, Sergiy Gnatyuk2, Mirambayeva Nazym3, and Assel Mukasheva4
1
Almaty University of Power Engineering and Telecommunications, Kazakhstan, 2National Aviation
3
University National Aviation University, Ukraine, Almaty University of Energy and Communications
4
College Almaty, Kazakhstan, Almaty University of Power Engineering and Telecommunications,
Kazakhstan
Research and development of sign language recognition system using neural network
algorithm. ·························································································································· 95
Yegor Matveyas, Arailym Keneskanova, Dastan Kambarov, and Assel Mukasheva
Almaty University of Power Engineering and Telecommunications, Kazakhstan
A Study on the Effective Multimodal Approach for Anomaly Detection using Gramian Angular
Difference Field from Heating, Ventilation, and Air Conditioning (HVAC) System of
Railways ·························································································································· 106
Beomjun Kim1, Younghoon Jeon1, Jeong Won Kang1, Chulsu Kim1, Oh Kuen Kwon2*, and
1
Jeonghwan Gwak *
1
Korea National University of Transportation, Korea, 2Semyung University, Korea
- 24 -
Oral Session 4
Calculating FMEA variables of software failure risks based on journals and metrics ········ 114
Denis Valyayev1, Bolshibayeva Aigerim2, Dinargul Mukhammejanova1, and Assel Mukasheva1
1 2
Almaty University of Power Engineering and Telecommunications, Kazakhstan, International IT
University, Kazakhstan
Comparative analysis of Hadoop and Spark performance through different data processing
tasks ································································································································ 120
Yerulan Suynullayev1, Sergiy Gnatyuk2, Didar Yedilkhan3, Aisulu Serik1, and Assel Mukasheva1
1 2
Almaty University of Power Engineering and Telecommunications, Kazakhstan, National aviation
university, Ukraine, 3Astana IT University, Kazakhstan
The Use Of Machine Learning Methods In The Field Of Retail ············································· 127
Kuanyshbek N.S and Sapakova S.Z*
Al-Farabi Kazakh National University, Kazakhstan
A study on false defect management of PCB ICT inspection using failure rate Estimation ··· 128
Changmok Park* and Sangyule Choi
Induk University, Korea
Oral Session 5
VIDEO STREAM ANALYSIS ALGORITHMS BASED ON THE OPENCV LIBRARY USING THE
RASPBERRY P S PLATFORM ···························································································· 131
1 2 1 1
Adilzhan Kereyev , Bauyrzhan Shokanov *, Lyazzat Kaparova *, and Elubayeva Dina *
1 2
K.Zhubanov Aktobe Regional University, Kazakhstan, Nazarbayev Intellectual Schools, Kazakhstan
Cache Replacement Policy for Approximate Computing in Many Core Systems ················· 147
Juhee Choi
Sangmyung University, Korea
- 25 -
Oral Session 6
Design and Implementation of an Electronic Voting System Using the IBM Blockchain
Platform ··························································································································· 163
Tolegen Aydynov*, Olzhas Sabiev, and Dina Satybaldina
L. N. Gumilev Eurasian National University, Kazakhstan
Developing An Attack Detection Algorithm Model and Compared with The K-Means
Algorithm ························································································································· 167
1,2 1 1 2 3
Uyangaa. Kh , Odonchimeg. L , Dashdorj. Ya *, Liji Wu , and Heemin Park
1 2
Mongolian University of Science and Technology, Mongolia, Tsinghua University, China,
3
Sangmyung University, Korea
Oral Session 7
Development of mobile application for copper wire molten mark classification ················· 173
Seong-jun Hong*, Dong-hyun Tae, and Jin-sik Lee
Korea Electrical Safety Corporation Electrical Safety Research Institute, Korea
Isolated control circuit design for heater power supply of high-power magnetron ············· 176
Hyun-Bin Jo and Hong-Je Ryoo
Chung-Ang University, Korea
- 26 -
Oral Session 8
Oral Session 9
A Neural Network Based Approach for Disease Prediction Using Symptom Data: Uncovering
Hidden Relationships and Improving Diagnostic Accuracy ·············································· 197
1 1 2 3
Zoljargal Jargalsaikhan , Zolzaya Dashdorj *, Stanislav Grigorev , Tae-Koo Kang ,
1 1
Munguntsatsral Dovdondash , and Erdenebaatar Altangerel
1 2
Mongolian University of Science and Technology, Mongolia, Irkutsk National Research Technical
3
University, Russia, Sangmyung university, Korea
- 27 -
Oral Session 10
Algorithms of Methodology for Applying Augmented Reality in Teaching Physics ·············· 208
Beken Arymbekov
Al-Farabi Kazakh National University, Kazakhstan
Utilizing Plane Detection Technology based on Actual Physical Environment for Classroom
Experiments ···················································································································· 213
Yeji Heo, Woojeong Shim, and Juhee Choi*
Sangmyung university, Korea
Cost Comparison and Analysis of VR Tracker Manufacturing with Low-cost Sensor and High
value Sensor ···················································································································· 215
Beomjun Cho1, Chanhee Jang1, Juhee Choi1*, and Joonyoung Kim2*
1
Sangmyung university, Korea, 2IMEC, Belgium
Detection and Classification of the Volatile Organic Compounds from the Petroleum and
Petroleum-Derived Products Using an Electronic Nose and Machine Learning
Algorithms ······················································································································· 218
Olzhas Alseitov, Aliya Issainova, Dina Satybaldina*, and Assem Konyrkhanova
L. N. Gumilev Eurasian National University, Kazakhstan
Oral Session 11
Enhancing Public Bus Line Classification and User Route Estimation through Deep Learning:
A Comprehensive Analysis and Predictive Modeling Approach ······································· 227
Tsetsentsengel Munkhbayar1, Zolzaya Dashdorj1*, Tae-Koo Kang2, Tae-Koo Kang2,
2 2 1
Kyoung-Geun Cho , Taekgwon Nam , and Erdenebaatar Altangerel
1 2
Mongolian University of Science and Technology, Mongolia, Sangmyung University, Korea
Development of Fault Diagnosis Simulator of Pneumatic Door System for Electric Railway
Vehicles ···························································································································· 232
Gil Hyun Kang1, Young Min Lim2, In Su Chung1, and Chul Su Kim1*
1 2
Korea National University of Transportation, Korea, ROTECO, Korea
- 28 -
Oral Session 12
Mathematical model for determining the orientation of a star sensor ································ 235
Kuanysh Alipbayev and Kamila Saurova*
Almaty University of Energy and Communications named after G.Daukeyev, Kazakhstan
Target selection by a group of unmanned aerial vehicles based on a swarm approach ······ 242
Aigerim Mazakova1, Vadim Zhmud2, Sholpan Jomartova1, and Тalgat Mazakov1
1 2
Al-Farabi Kazakh National University, Almaty, Kazakhstan, Altae-Sayan Branch of the Federal
State Budgetary Institution of Science of the Geophysical Service of the RAS, Novosibirsk, Russia
Research and design of an efficient adaptive drive with balancing friction coupling ·········· 255
Konstantin Ivanov, Aidos Sultan*, Kuanysh Alipbayev, and Komekbayev Arman
Almaty University of Power Engineering and Telecommunications, Kazakhstan
Oral Session 13
Method of predicting the service life of a linear adjustment transformer based on the analysis
of operational reliability data ··························································································· 263
I.T. Utepbergenov1*, A.A. Tazhibayev1,3, Ye.U. Zhumagaliyev2, D.A. Yesengaliyev2, and
3
S.A. Yermetov
1 2
Almaty University of Power Engineering and Telecommunications, Kazakhstan, ZhubanovAktobe
Regional University, Kazakhstan, 3TrencoR&D LLP, Kazakhstan
Sensorless operation of six-phase PMSM based on high-frequency signal injection with torque
ripple reduction method ·································································································· 269
Seong-hoon Kim, Kwan-yuhl Cho*, Hag-wone Kim, and Sang-min Lee
Korea National University of Transportation, Korea
Study on the Operation Algorithm of TVPP Considering Distribution Line Constraints in Jeju
Power System ·················································································································· 271
Ji-Won Lee1, Dong-Il Cho2, Seong-Jun Park1, Tae-Yang Nam1, Byung-Ki Kim3, Jae-Sun Huh4,
Nam-Gil Paik4, Jae-Chul Kim1, and Won-Sik Moon1*
1
Soongsil University, Korea, 2Korea University, Korea, 3Korea Institute of Energy Reasearch, Korea,
4
KEPCO, Korea
- 29 -
Study of the direct and inverse problem of the thermal conductivity of a rod ····················· 274
Sholpan Jomartova, Тalgat Mazakov, Nurdaulet Isimov, Aigerim Mazakova, and
Kalamkas Begaliyeva
Al-Farabi Kazakh National University, Kazakhstan
Switching Loss Analysis by Interleaving Method of 3-LV Boost Converter with Coupled
Inductor ··························································································································· 279
Hae In Kim, Hag Wone Kim*, Kwan Yuhl Cho, and Jeong Won Kang
Korea National University of Transportation, Korea
Oral Session 14
Finding trends in the development of narrow beam inter-satellite communication antennas for
Cubesat satellites using patent analysis ········································································· 283
Zh.Suimenbayeva1,2, B.Aitchanov1, K.Alipbayev1*, A.Komekbayev1, A. Aden1, and
1
A.Mukasheva
1 2
Almaty University of Power Engineering and Telecommunications, Kazakhstan, Satpayev
University, Kazakhstan
Poster Session 1
A Study on the Partial Discharge Characteristics of VTs and CTs by Applying Repeated
Impulses ·························································································································· 300
Ji Man Park, Ja Yoon Kang, Young Chae Mun, and Ga Ram Han*
Korea Electrical Safety Corporation Research Institute, Korea
An Application of Terahertz Wave for Detecting Insulation Defects in 22.9kV XLPE Power
Cable ································································································································ 303
Ji-Man Park, Young-Chae Mun, and Ja-Yoon Kang*
Korea Electrical Safety Corporation Research Institute, Korea
- 30 -
Design of Real-time Monitoring/Diagnosis Algorithm for Electrical Facilities ···················· 307
Hoon Jung, Young-Taek Lim, Jong-Chan Lee, and Joonho Ahn*
Seoul National University, Korea
Leakage Current Analysis of PCS considering the Ground System ····································· 311
Dongmin Kim and Hanju Cha*
Chungnam National University, Korea
A Study on Common Mode Effects According to Battery Rack Configurations in Energy Storage
Systems ··························································································································· 317
Yong-Eun Choi, Hyo-Seok Oh, Byung-Min Moon, Chin-Young Chang, and Jae-Moon Kim*
Korea National University of Transportation, Korea
Development of 48V PbC Hybrid Battery for Electric Forklift Using High Quality Activated
Carbon ····························································································································· 319
Hoon Seo1, In Seok Seo1, Hyon-ok Lim1, and Kyung-Wan Koo2*
1
DongYoung Ind. Co. Ltd., KOREA, 2HoSeo University, KOREA
Experimental studies of a model of a dusted flow air heater for the development of a new
hot-water boiler ··············································································································· 322
Otynchiyeva, M. T.1, Bakhtyar B.T.2*, Korobkov M.S.3, and Tursunbayeva G.U.2
1 2
Narxoz University, Kazakhstan, S.Seifullin Kazakh Agro Technical Research University,
Kazakhstan, 3Almaty University of Power Engineering and Telecommunications, Kazakhstan
Resonance Frequency Analysis for LC Resonant DC Circuit Breaker Design ······················ 340
Jihye Kim and Hyosang Choi*
Chosun University, Korea
Failure Analysis of Arc and Leakage Generation Signal in DC Line ····································· 343
SoYeon Han, SuChul Bang, SungIn Jeong, and YongHo Yoon*
Gwangju University, Korea
Detection of Leakage Current Occurrence Location of LVDC Lines through Level-Shift Signal
Processing ······················································································································· 346
Su-Chul Bang, So-Yeon Han, Sung-In Jeong, and Yong-Ho Yoon*
Gwangju University, Korea
- 31 -
Using IoT technologies to prevent fires ··············································································· 349
Akyltay Burgegulov1, Gulzat Ziyatbekova1,3*, Тalgat Mazakov1,3*, Aigerim Sametova1,2*, and
1
Magzhan Aliaskar *
1 2
Al-Farabi Kazakh National University, Kazakhstan, Almaty University of Power Engineering and
3
Telecommunications, Kazakhstan, Institute of Information and Computational Technologies,
Kazakhstan
An ontological model for automating the process of preparing electronic courses in the field of
information and communication technologies. ······························································· 360
N.ZH. SABITOVA1, B.Sh. RAZAKHOVA1, and S.O. GNATYUK2
1
L. N. Gumilyov Eurasian National University, Kazakhstan, 2National Aviational University, Ukraina
A Study of Deep Learning Model for Color Measuring Process in Industrial Facilities ······· 362
1 2 1 1
Kyung Suk Kim , Sanghun Lee , Ki-Sub Kim *, and Jeong Won Kang *
1 2
Korea National University of Transportation, Korea, Central Research Institute, KCC, Korea
Data-Driven Enhanced Travel Planning by Utilizing Real-Time User Data ·························· 372
Sooah Park and Juhee Choi*
Sangmyung University, Korea
A Study on Reuse Policy for Worn-out Cells in Non-Volatile Memories ······························ 374
Juhee Choi and Seonuck Paek*
Sangmyung University, Korea
- 32 -
Development of an analytical computation system and its application for automation of
equations derivation in robotics systems ········································································ 376
Magzhan Aliaskar1, Sholpan Jomartova1*, Aigerim Mazakova1*, Talgat Mazakov1*, and
1,2
Gulzat Ziyatbekova *
1 2
Al-Farabi Kazakh National University, Kazakhstan, Institute of Information and Computational
Technologies, Kazakhstan
Phased Array Ultrasonic Inspection Model for High-speed Train Wheels ··························· 385
Jae Hwan Cha, Cheol Su Kim*, Jeong Hyung Kang*, and Kyung Suk Kim*
Korea Railroad Corporation, Korea
ICT Convergence Roof Installation Solar Location Tracking Solar Power Generation
System ····························································································································· 389
DeokGun Woo1*, HyoJai Lee1, and ChoonWon Seo2
1 2
Korea-polytechnics, Korea, Neo Solartec Inc., Korea
Study on the collapsing of artificial retaining wall facility using acoustic emission ············ 391
Kwang Bok Kim1, Bong Ki Kim1, Woon Kyung Kim1, Tae Hun Kim1, Sung Hun Park1,
Saurabh Kumar1, Jun Gil Kang1, and Kyung-Wan Koo2*
1
Integrity Diagnostic Korea Co. Ltd., Republic of Korea, 2Hoseo University, Korea
Technique for the use of matching circuits in the transmit-receive path of the uav radio control
channel in conditions of icing of the antenna device ······················································· 393
Nurbolat Ondyrbayev1*, Nursultan Nurzhauov1, Anna Sutiko2, Pavel Boikachev2,
1 1
Katipa Chezhimbayeva , and Asel Yerzhan
1 2
Almaty University of Power Engineering and Telecommunications, Kazakhstan, Military Academy
of Belarus, Belarus
Designing a special mobility (hot air balloon) communication interface ····························· 397
Seung-Hwan Byun1*, Kyung-Wan Koo2, Mun-Sung Kim1, and Jong-Gyu Kang3
1 2 3
Daejeon University, Korea, Hoseo University, Korea, MetaCom Ltd., Korea
- 33 -
Poster Session 2
A rectangular gate structure with attachable sanitary lights and human monitoring
camera ····························································································································· 405
1 1 2 3 3
Woo-Young Kim , Hyung-Kon Lee , Young-Min Kim , Seung-Youn Yang , Jin-Tae Kim ,
4 5 6 6 7
Kyung-Wan, Koo , Min-Soo Kim , Tae-Ho Kim , Seong-Kweon Kim , In-Choel Jeong ,
8 8
Chang-Jun Ahn , and Jae-Sang Cha *
1 2 3 4
Boseung Electric Co., Ltd., Korea, Jooyoung F&G, Korea, Fivetek. Co.ltd., Korea, Dongseoul
University, Korea, 5Hoseo University, Korea, 6Seoul National University of Science and Technology,
7 8
Korea, SungKongHoe University, Korea, Chiba University, Korea & Japan
A development of IoT switching and control box application used in various power source
choice and sanitary light control functions ······································································ 407
1 1 2 3 4
Woo-Young Kim , Hyung-Kon Lee , Gyewon Choi , Minsoo Kim , Tae-Ho Kim ,
4 5 6 7 7
Seong-Kweon Kim , Kyung-Wan Koo , In-Cheol Jeong , Chang-Jun Ahn , and Jae-sang Cha *
1
Boseung Electric Co., Ltd., Korea, 2Sungkyunkwan University, Korea, 3Dongseoul University, Korea,
4 5
Seoul National University of Science and Technology, Korea, Hoseo University, Korea,
6 7
SungKongHoe University, Korea, Chiba University, Korea & Japan
On the Electrical Safety Analysis of Multi-chute Classification System for Joint Courier
Logistics Base Infrastructure based STPA ······································································ 409
Sunwoo Hwang1, Joouk Kim2, and Youngmin Kim1*
1 2
Ajou University, Korea, Korea Railroad Research Institute, Korea
The Remote Driving Control System Based on Telepresence for Mini-tram ······················· 411
Jung-Ju Kim*, Gi-Won Kim, Jun-Seok Lee, Jae-Hun Choi, Hyung-Woo Jin, and Chan-Jong Lee
Hoseo University, Korea
On the Derivation of Demand Time for Response to Variable Function Focus Camera
Situation ··························································································································· 415
Min Joong Kim, Myung Sung Kim, and Young Min Kim*
Ajou University, Korea
A Study on Route Selection Methods of Autonomous Vehicles for Public Mobility ·············· 419
Jung-Ju Kim*, Gi-Won Kim, Chan-Jong Lee, Jun-Seok Lee, Jae-Hun Choi, and Hyung-Woo Jin
Hoseo University, Korea
A Model for Implementing Network-Connected Systems to Train Control Systems ··········· 422
Gyuoyoung YEON1, Jaeho LEE2, and Jongwoo LEE1*
1 2
Korea National University of Transportation, Korea, Korea Railroad Research Institute, Korea
- 34 -
A Study on Transient Relief Methods through Characteristic Analysis of Electric Railway
Vehicle Spark Gap ············································································································ 427
Jongrok Choi, Chinyoung Chang, Jaemoon Kim, Jaeyoung Kim, and Hojun Kwon
Korea Railroad Research Institute, Korea
Development of Trolley for Detection Installation Errors of Catenary System ···················· 429
Chulmin PARK1*, Dongkue Kim1, and Sangjin SON2
1
Korea Railroad Research Institute, Korea, 2Myeongsung Rollingstock & Plant Co. Ltd, Korea
Research on the development and application of lightweight catenary poles for emergency
recovery ··························································································································· 431
Ho Ryung Cho, Jong Nam Kim, Hong Kuk You, Young Jae Na, and Jae Moon Kim*
Korea National University of Transportation, Korea
A Study on Stabilization of Code Frequency Control Between Wayside and Onboard Signal
System of AF Non-insulated Track Circuit ······································································· 437
Dong Hoon Park, Ho Hyun Han, Seon Kyo Kim, and Jeong Won Kang*
Korea National University of Transportation, Korea
A Study on the Integrated Operation of VHF and Complex Communication Facilities ········· 438
Seon Kyo Kim, Dong Hoon Park, Ho Hyun Han, and Jeong Won Kang*
Korea National University of Transportation, Korea
A Study on CBM Application of Power Capacitor for SIV in Railway Vehicles ······················· 439
Hyo-Seok Oh, Yong-Eun Choi, Byung-Min Moon, Seung-Pyo Jeon, and Jae-Moon Kim*
Korea National University of Transportation, Korea
A Study on SoH of Lithium Polymer Battery Applied to Railway Vehicles ···························· 441
Hyo-Seok Oh, Yong-Eun Choi, Byung-Min Moon, Seung-Pyo Jeon, Chin-Young Chang, and
Jae-Moon Kim*
Korea National University of Transportation, Korea
Preparation Analysis of the Reduction Effect the Increase Harmonic Resonance in the AC
Electric Railway Feeding System ····················································································· 445
Guk Hyun Son, Tae Hoon Kim, and Jae Moon Kim*
Korea National University of Transportation, Korea
- 35 -
A Study on the Train Position Detection for the Integrity of Freight Train Based on ETCS Level 3
With GPS and 6-Axis Sensors ·························································································· 448
Seong Yong Jeon1, Nurlan Berdigozhin2, and Kyu Hyoung Choi1*
1 2
Seoul National University of Science and Technology, Korea, Hua Xia Company, Kazakhstan
An Analysis of the Changes of Regenerative Energy Utilization Facilities by the Tap Switching of
Urban Railway Transformers ··························································································· 455
Chi-Myeong Yun1, Hosung Jung2*, Hanmin Lee2, and Hyungchul Kim2
1
University of Science and Technology, Korea, 2Korea Railroad Research Institute, Korea
A Network Architecture for A Substation Automation Based On IEC 61850 ························· 457
Kyungsoon Park1, Bekzhan Rysmendeev2, and Jongwoo LEE1*
1 2
Seoul National University of Science and Technology, Korea, National Company Kyrgiyz Temir
Jolu, Kygyzstan
A Study on the LCC Analysis for High-Speed Train On-Board Signaling Systems ··············· 461
Jungjae LEE1, Meruyert Zhumakhanova2, and Jongwoo LEE1*
1 2
Seoul National University of Science and Technology, Korea, JSC National Company Kazakhstan
Temir, Kazakhstan
MCB Interrupting and Sequential Energizing of EMU in DC and AC Transition Section ······· 466
Dalseo PARK, Hyosang KIM, and Jaeseok SHIM*
Seoul National University of Science and Technology, Korea
Specification Analysis of Reducer-less Motor for Railway Vehicle Door ······························ 469
Byung-Min Moon, Hyo-Seok Oh, Yong-Eun Choi, Seung-Pyo Jeon, In-Soo Chung, and
Jae-Moon Kim*
Korea National University of Transportation, Korea
Analysis of Platform Screen Door Using Reliability Block Diagram Analysis Tool ·············· 471
Jong Nam Kim, Tae Gil Ha, Guk-Hyun Son, and Jeong Won Kang*
Korea National University of Transportation, Korea
A Study on High-Power IGBT Gate Drivers for Railway Vehicle ··········································· 472
Seung-Pyo Jeon, Hyo-Seok Oh, Yong-Eun Choi, Byung-Min Moon, Jeong-Won Kang, and
Jae-Moon Kim*
Korea National University of Transportation, Korea
A Study on the Optimal Traffic Signal Timing Transition Algorithms for Diverse Demand
Fluctuations on Corridors ································································································ 476
Yong-Bin, Cho1, Jin-Tae, Kim1*, and Thomas JW Kim2
1
Korea National University of Transportation, Korea, 2UI networks, Korea
- 36 -
Investigation of the output parameters of a definable adaptive gear variator. ···················· 480
Konstantin Samsonovich Ivanov1 and Gulmira Nurlankyzy Abdreshova2
1 2
AUES, Almaty, Kazakhstan, Al-Farabi Kazakh National University, Almaty, Kazakhstan
Extracted Cellulose with Deep Eutectic Solvent and Ionic Liquid: Changes in Structural and
Thermal Characteristics ·································································································· 495
Yeung Chan Kim, Ho Hyun Han, Jeong Won Kang*, and Ki-Sub Kim*
Korea National University of Transportation, Korea
Implementation of carbon neutrality through the RE100 verification system in the agricultural
sector ······························································································································· 496
Minseong Kang1, Sangho Park1, Kihyun Kim2, and Kyungwan Koo2
1 2
Korea Testing Laboratory, Korea, Hoseo University, Korea
Study on the collapsing of artificial retaining wall facility using acoustic emission. ··········· 500
1 1 1 1 1
Kwang Bok Kim , Bong Ki Kim , Woon Kyung Kim , Tae Hun Kim , Sung Hun Park ,
1 1 2 2
Saurabh Kumar , Jun Gil Kang , Sang-Tae Han , and Kyung-Wan Koo
1 2
Integrity Diagnostic Korea Co. Ltd., Korea, HoSeo University, Korea
- 37 -
August 22(TUE) - 25(FRI), 2023
Oral Session 1
Room : A428
Chair: Assel Mukasheva (AUPET, Kazakhstan)
- 38 -
Improved LQR control using fuzzy logic and
Kalman filter controller of DC motor
Adil Maidanov 1*, Sabyrzhan Atanov 2 and Hüseyin Canbolat 3
1
Ph.D. student, L. N. Gumilyov Eurasian National University, Astana, Kazakhstan,
Email: [email protected]
2
Professor, Dr., L. N. Gumilyov Eurasian National University, Astana, Kazakhstan,
Email: [email protected]
3
Professor, Dr., Ankara Yildirim Beyazit University, Ankara, Turkey,
Email: [email protected]
Abstract— Direct current (DC) motors are widely utilized in Practically, applying improved LQR control using fuzzy
various industries due to their simplicity, reliability, and ease of logic and Kalman filter controller can result in enhanced
control. Achieving precise and efficient control of DC motors performance, reduced energy consumption, and increased
has been the subject of extensive research, leading to the system reliability. However, it is essential to note that
development of various control techniques, including linear implementing these control systems may necessitate additional
quadratic regulator (LQR) control. However, more than LQR hardware and software, which can impact the overall cost of the
control is required to handle the non-linearities and system. Therefore, careful consideration should be given to the
uncertainties often encountered in DC motor control specific requirements and constraints of the target application.
applications. This has prompted the exploration of enhanced
control strategies by combining LQR with other techniques, In conclusion, this study demonstrates the efficacy of
such as fuzzy logic and Kalman filtering. integrating LQR control with fuzzy logic and Kalman filter
controller for DC motor control. Combining these techniques
This study focuses on the integration of LQR control with improves control performance and robustness, enabling precise
fuzzy logic and Kalman filter controller to improve the and efficient management of DC motors in various industrial
performance of DC motor control systems. The objective is to applications. The findings contribute to the advancement of
evaluate the effectiveness of this combined approach in terms of control strategies for DC motors, providing valuable insights for
control performance, robustness, and applicability in different researchers, engineers, and practitioners in the field. Future
industrial settings. research could explore further enhancements and optimizations
of the integrated approach, considering additional factors such
The proposed control systems are implemented and as system dynamics and external disturbances to refine DC
simulated on the Simulink platform to accomplish this. A motor systems' control performance.
comparative analysis is conducted to assess the performance of
the integrated LQR with fuzzy logic and Kalman filter Keywords — DC motors, control techniques, linear quadratic
controller against using each technique separately. The results regulator (LQR), fuzzy logic control, Kalman filter control,
provide insights into the advantages and limitations of the performance evaluation, control performance, robustness, non-
combined approach and its potential for enhancing the control linearities, uncertainties, noise, disturbances
of DC motors.
I. INTRODUCTION
The findings demonstrate that the integration of LQR with DC motors are widely used in various applications such as
fuzzy logic and Kalman filtering leads to improved control robotics, automation, aerospace, and automotive industries
performance and robustness compared to individual
due to their simplicity, reliability, and ease of control. In the
techniques. Fuzzy logic is well-suited for handling non-
field of robotics, DC motors are used to power the movement
linearities and uncertainties, allowing for better adaptation to
varying operating conditions. In addition, the Kalman filter
of robotic arms, grippers, and other components [1]. In the
estimator provides accurate state estimation, even in the automation industry, DC motors are used in conveyor belts,
presence of noise and disturbances. By leveraging this estimated pumps, and other machinery [2]. In the aerospace industry,
state information, the LQR controller can generate control DC motors are used in aircraft systems such as flight control
inputs that optimize the behavior of the DC motor system. surfaces, landing gear, and navigation systems. Similarly, in
the automotive industry, DC motors are used in power
Combining LQR, fuzzy logic, and Kalman filter control windows, windshield wipers, and other subsystems. In order
techniques exhibits several benefits for DC motor control to achieve precise and efficient control of DC motors, various
systems. The integrated approach enhances the precision and control techniques have been developed over the years [3].
stability of control, making it particularly suitable for
applications that require precise control of DC motors. One popular approach is the linear quadratic regulator
Industries such as robotics, automotive, aerospace, and (LQR) control [4], which is a feedback control technique that
manufacturing stand to benefit from implementing these minimizes a cost function while optimizing the system's
advanced control systems. performance. LQR control has been applied to various DC
motor systems, allowing for stable and efficient operation.
However, LQR control assumes that the system is linear and
- 39 -
time-invariant [5], which is not always the case in practice. Types of DC Motors
Additionally, LQR control can be sensitive to measurement
noise, which can affect the stability and performance of the DC motors can be categorized into two types: brushed DC
system [6]. [15] motors and brushless DC motors [16]. Brushed DC
motors are commonly used in low-cost applications where
To overcome these limitations, other control techniques speed control is not critical. Brushless DC motors are used in
have been proposed. One such approach is the use of fuzzy high-performance applications where high-speed and precise
logic control [7], which allows for the management of control are required.
uncertainties and nonlinearities in the system [8]. Fuzzy logic
is a mathematical method that uses linguistic variables to Principles of Operation
describe the behavior of a system [9], making it particularly DC motors operate based on the interaction between
useful for DC motor control where nonlinearities are common magnetic fields. The interaction between the magnetic field of
[10]. the stator and the magnetic field of the rotor generates torque,
Another approach is the use of a Kalman filter estimator, which causes the rotor to rotate. The speed and direction of
which accurately estimates the system states and reduces the rotation can be controlled by varying the voltage or current
impact of measurement noise on the control system. Kalman supplied to the motor.
filter estimators are commonly used in DC motor control Control Techniques
systems to improve stability and performance.
Linear Quadratic Regulator (LQR) is a popular control
The goal of this report is to evaluate and compare the technique used in DC motor control. LQR is a feedback
performance of LQR, fuzzy logic, and Kalman filter control control technique that minimizes a cost function while
techniques for DC motor control. The proposed control optimizing the system's performance. LQR control has been
systems will be implemented and simulated on the Simulink applied to various DC motor systems [17], allowing for stable
platform, and their performance will be compared to and efficient operation. However, LQR control assumes that
determine the most effective technique for DC motor control. the system is linear and time-invariant, which is not always
the case in practice. Additionally, LQR control can be
II. LITERATURE REVIEW AND PROBLEM STATEMENT sensitive to measurement noise, which can affect the stability
Despite the widespread use of DC motors in various and performance of the system [18].
applications, achieving precise and efficient control of these
The block diagram (Fig.2) of the LQR control system is
motors can be challenging due to nonlinearity and
composed of three main parts: the plant, the reference input,
measurement noise. While linear quadratic regulator (LQR)
and the LQR controller. The plant represents the system to be
control is a popular control technique, it has limitations when
controlled, in this case, a DC motor, and is modeled by a
applied to nonlinear and time-varying systems. As such,
transfer function. The reference input is the desired output or
alternative control techniques such as fuzzy logic and Kalman
setpoint, which is fed into the controller. The LQR controller
filter estimators have been proposed. However, there is a need
takes the difference between the reference input and the output
to compare the performance of these techniques for DC motor
of the plant and calculates the control signal to be applied to
control and determine the most effective approach. This
the plant. The control signal is also fed back to the controller
research aims to address this need by evaluating and
as feedback, which is used to adjust the controller's
comparing the performance of LQR, fuzzy logic, and Kalman
calculations.
filter control techniques for DC motor control and identifying
the most effective approach for achieving precise and efficient
control.
DC motors (Fig.1) are widely used in various industries
due to their simplicity, reliability, and ease of control. The
performance of DC motors [12] can be improved by using
advanced control techniques such as LQR, fuzzy logic, and
Kalman filter. This chapter provides an overview of the
literature on DC motor control, including the types of DC
motors, the principles of operation, and the methods of
control. Furthermore, this chapter reviews the previous Figure 2. LQR block diagram
research conducted on LQR, fuzzy logic [13], and Kalman
filter control techniques for DC motor control [14]. Fuzzy Logic Control
Fuzzy logic is a mathematical method that uses linguistic
variables to describe the behavior of a system [19]. Fuzzy
logic allows for the management of uncertainties and
nonlinearities in the system, making it particularly useful for
DC motor control where nonlinearities are common [20, 21].
Fuzzy logic controllers can operate effectively even when the
mathematical model of the system is unknown or uncertain
[22].
Key Components of FLC
Fuzzy logic control consists of five main components, as
Figure 1. DC motor illustrated in Fig.3 presented in [3]. The components are part
- 40 -
of a fuzzy logic system, which is a type of control system that • To determine which of the three proposed control
uses fuzzy set theory to model and control complex systems techniques is the most suitable for DC motor control
with uncertain and imprecise information. The components of based on their performance and stability in simulated
a fuzzy logic system include a fuzzifier, a rule base, an environments.
inference engine, a defuzzifier, and an output interface. These
components work together to convert input data into crisp The results of this study will provide valuable insights into the
strengths and limitations of each control technique and inform
output data, allowing the system to make decisions and take
future research on the development of advanced control
actions based on uncertain and imprecise information.
techniques for DC motor applications. The findings of this
study may also have practical implications for various
industries that use DC motors, such as robotics, automation,
aerospace, and automotive industries, by providing guidance
for the design and implementation of control systems that can
improve the performance and stability of DC motor systems.
The scope of the project
The scope of this project is to evaluate and compare the
performance of three different control techniques, namely
LQR, fuzzy logic, and Kalman filter [11], for DC motor
Figure 3. Fuzzy Logic control schematic control. The focus will be on the simulation and
implementation of these control systems using the Simulink
platform. The project aims to determine the most effective
Kalman Filter Estimator technique for achieving precise and efficient control of DC
Kalman filter estimator is a control technique that motors. The results of this study can be used to improve the
accurately estimates the system states and reduces the impact performance of DC motor control systems in various
of measurement noise on the control system [23]. Kalman applications such as robotics, automation, aerospace, and
filter estimators are commonly used in DC motor control automotive industries. However, it is important to note that
systems to improve stability and performance [24]. Kalman this project does not involve the physical implementation of
filter estimators can accurately estimate the state of the system the control systems on real DC motors. Therefore the findings
even when the measurements are noisy [25]. should be interpreted in the context of simulation-based
studies.
IV. MATERIALS AND METHODS
The simulation setup consists of a DC motor model and a
control system model. The DC motor model is based on
mathematical equations that describe the behavior of a DC
motor. The control system model is based on the LQR, fuzzy
logic, or Kalman filter control techniques.
The DC motor model includes the following parameters:
the resistance of the armature, the inductance of the armature,
Figure 4. Kalman Filter Block Diagram the back-emf constant, the moment of inertia of the rotor, the
viscous damping coefficient, and the mechanical load torque.
Previous Research on DC Motor Control Techniques The control system model includes the following parameters:
the gain matrix for LQR control, the membership functions
Previous research has been conducted on the performance
and rules for fuzzy logic control, and the Kalman filter gain
evaluation and comparison of LQR, fuzzy logic [26], and
matrix for Kalman filter control.
Kalman filter control techniques for DC motor control.
Several studies have shown that fuzzy logic and Kalman filter The simulation is performed using Simulink, which is a
controllers outperform LQR controllers in terms of stability software tool for modeling, simulating, and analyzing
and performance in certain scenarios. However, the results are dynamic systems. Simulink allows for the simulation of
highly dependent on the specific application and system under complex systems using block diagrams, which represent the
consideration. components of the system and their interactions. The Simulink
model for the DC motor control system includes blocks for the
III. THE AIM AND OBJECTIVES OF THE STUDY DC motor model, the controller model, and the inputs and
The aim of this study is to evaluate and compare the outputs of the system.
performance of three different control techniques, namely
Mathematical Models of the DC Motor
linear quadratic regulator (LQR), fuzzy logic, and Kalman
filter, for DC motor control and determine the most suitable The armature voltage equation is given by:
approach for achieving precise and efficient control of DC
motors. To achieve this aim, the following objectives are The armature voltage equation (1) describes the voltage
accomplished: applied to the armature of the DC motor. The equation states
that the armature voltage (𝑉! ) is equal to the sum of three
• To compare the effectiveness of three different control terms: the product of the armature resistance (𝑅! ) and the
techniques, namely LQR, fuzzy logic, and Kalman armature current (𝐼! ), the product of the armature inductance
filter, in terms of their ability to control a DC motor. (La) and the time derivative of the armature current, and the
- 41 -
back electromotive force (EMF) of the motor ( 𝐸! ). The 𝐾$ 𝐼! (𝑠) = 𝐽𝜔(𝑠) + 𝐵𝜔(𝑠) (8)
equation captures the dynamics of the armature voltage and its
dependence on the armature current and the back EMF of the
motor. If current is obtained from (8) and substituted in (9), we
𝑑𝐼! ($) (1) will have,
𝑉! 𝑡 = 𝑅! 𝐼! (𝑡) + 𝐿! . + 𝐸! (𝑡)
𝑑𝑡
1 (9)
𝑉! (𝑠) = 𝜔(𝑠) [𝐿 𝐽𝑠 # + 𝑅! 𝐽 + 𝐿! 𝐵(𝑠) + 𝐾$ . 𝐾" ]
𝐾" !
Equation for back emf of motor will be:
Equation (9) is obtained by solving equation (8) for the
The back EMF equation (2) relates the back EMF of the armature current and substituting it into equation (7). The
DC motor (𝐸& ) to its angular velocity (ω). The equation states resulting equation relates the Laplace transform of the
that the back EMF is proportional to the angular velocity with armature voltage to the Laplace transform of the angular
a constant of proportionality (𝐾' ). The equation captures the velocity.
physical relationship between the back EMF and the angular
velocity of the motor. Then the relationship between rotor shaft speed and
applied armature voltage is represented by the transfer
function (10):
𝐸& (𝑡) = 𝐾' 𝜔(𝑡) (2)
𝜔(𝑠) 𝐾𝑡 (10)
=
𝑉𝑎 (𝑠) (𝐽𝐿𝑎 𝑠2 + $𝐽𝑅𝑎 + 𝐵𝐿𝑎 %𝑠 + (𝐾𝑡 . 𝐾𝑏 + 𝐵𝑅𝑎 )
The torque balance equations (3)-(4) relate the torque
developed by the motor (𝑇( ) to its armature current (𝐼! ) and
angular velocity (ω). Equation 3 states that the torque is
proportional to the armature current with a constant of Finally, equation (10) is obtained by solving equation (9)
proportionality (𝐾$ ). Equation 4 states that the torque is equal for the transfer function relating the angular velocity and the
applied armature voltage. The transfer function captures the
to the product of the motor's moment of inertia (𝐽) and the time
relationship between the rotor shaft speed and the applied
derivative of the angular velocity plus a damping term (𝐵)
armature voltage in the frequency domain.
times the angular velocity. These equations capture the
physical relationship between the torque developed by the Consider the following values for the physical parameters
motor, the armature current, and the angular velocity. [27, 28]
The transfer function is as (11):
𝑇( (𝑡) = 𝐾$ 𝐼! (𝑡) (3)
𝜔(𝑠) 2 (11)
=
𝑑𝜔(𝑡) (4) 𝑉! (𝑠) 𝑠 ) + 12𝑠 + 20.02
𝑇( (𝑡) = 𝐽 + 𝐵𝜔(𝑡)
𝑑𝑡
The mathematical models used for the design and
Let us combine the upper equations together, implementation of the LQR, fuzzy logic, and Kalman filter
controllers are based on the state-space representation of the
Equation (5) is a reformulation of the armature voltage system. The state-space representation is a mathematical
equation that incorporates the back EMF term. Equation (6) is framework for describing the behavior of a system in terms of
a reformulation of the torque balance equation that relates the its states and inputs [29].
torque to the angular velocity and the armature current.
The state-space representation of the DC motor control
system is given by the following equations (12)-(15):
𝑑𝐼! ($) (5)
𝑉! 𝑡 = 𝑅! 𝐼! (𝑡) + 𝐿! . + 𝐾' 𝜔(𝑡)
𝑑𝑡 𝑥̇(𝑡) = 𝐴𝑥(𝑡) + 𝐵𝑢(𝑡) 𝑦(𝑡) = 𝐶𝑥(𝑡) (12)
𝑑𝜔(𝑡) (6)
𝐾$ 𝐼! (𝑡) = 𝐽 + 𝐵𝜔(𝑡) The system under consideration can be represented in
𝑑𝑡 state-space form, where x(t) denotes the state vector, u(t)
represents the input vector, and y(t) stands for the output
vector. The system's behavior can be described by a set of
Equations (7) and (8) are obtained by taking the Laplace
differential equations in which A is the state matrix, B is the
transform of equations 5 and 6, respectively. These equations
input matrix, and C is the output matrix. Specifically, the state
are in the frequency domain and relate the Laplace transform
vector, x(t), is comprised of the angular velocity and the
of the armature voltage and armature current to the Laplace
current of the DC motor, while the input vector, u(t),
transform of the angular velocity and torque, respectively.
represents the voltage applied to the DC motor. Finally, the
𝑉! (𝑠) = 𝑅! 𝐼! (𝑠) + 𝐿! . 𝐼! (𝑠) + 𝐾' 𝜔(𝑠) (7) output vector, y(t), denotes the angular velocity of the DC
motor, as reported in [30].
- 42 -
The state-space representation of the LQR control system The steady-state Kalman filter estimates the state variable
is given by the following equations: 𝑥[𝑛] using two main equations, Equations 18 and 19.
Equation 18 is the prediction equation, which estimates the
𝑥̇(𝑡) = (𝐴 − 𝐵𝐾)𝑥(𝑡) 𝑢(𝑡) = −𝐾𝑥(𝑡) (13)
state variable 𝑥[𝑛 + 1] based on the past measurements of the
system up to 𝑦[𝑛 − 1], and the input 𝑢[𝑛] and Gaussian noise
𝑤[𝑛] that affect the system dynamics. This estimate is updated
, where K is the gain matrix for LQR control. The gain over time as new measurements become available.
matrix is calculated using the Riccati equation, which is a
mathematical formula that solves for the optimal gain matrix Equation 19 is the update equation, which incorporates the
based on the system's parameters and a cost function. latest measurement 𝑦[𝑛] into the state estimate 𝑥[𝑛|𝑛 − 1] to
obtain a new estimate of the state variable 𝑥[𝑛|𝑛]. The
The state-space representation of the fuzzy logic control Optimal Innovation gains Mx and My are chosen to minimize
system [31, 32] is given by the following equations: the steady-state covariance of the estimation error and remove
noise from the estimate.
𝑢(𝑡) = 𝑓(𝑥(𝑡)) (14)
𝑥/[𝑛 + 1|𝑛] = 𝐴𝑥/[𝑛|𝑛 − 1] + 𝐵𝑢[𝑛] + 𝐺𝑤[𝑛] (18)
, where f(x(t)) is the fuzzy inference system [35], which
maps the input state vector x(t) to the output control signal The developed Kalman filter architecture will be obtained
u(t). The fuzzy inference system consists of membership
as:
functions[40], which describe the degree to which a given
input value belongs to a particular linguistic variable, and
rules [41], which describe the relationship between the input
𝑥 ̂[𝑛|𝑛] = 𝑥 ̂[𝑛|𝑛 − 1]𝑀' (𝑦[𝑛] − 𝐶𝑥 ̂[𝑛│𝑛 − 1] (19)
and output variables [42].
− 𝐷𝑢[𝑛])
The state-space representation of the Kalman filter control
system is given by the following equations [25, 28]:
Equation 20 calculates the estimated output of the system,
𝑦[𝑛|𝑛], based on the estimated state variable 𝑥[𝑛|𝑛 − 1] and
𝑥̂(𝑡) = 𝐴𝑥̂(𝑡 − 1) + 𝐵𝑢(𝑡) + 𝐾(𝑦(𝑡) − 𝐶𝑥̂(𝑡 − 1)) 𝑢(𝑡) (15) the input 𝑢[𝑛]. The filter can be implemented recursively, and
= −𝐾𝑥̂(𝑡)
the estimated state variable and output are updated with each
new measurement of the system output.
, where x̂(t) is the estimated state vector, K is the Kalman
filter gain matrix, and y(t) is the measured output vector. 𝑥̂𝑦:[𝑛|𝑛] = 𝐶𝑥:[𝑛|𝑛 − 1] + 𝐷𝑢[𝑛] + 𝑀% (𝑦[𝑛] − 𝐶𝑥 ̂[𝑛│𝑛 − 1] (20)
Kalman Filter − 𝐷𝑢[𝑛])
- 43 -
than the system states, while the value of 𝑄 should be chosen represents a combination of input variables. The output
to weigh the system states more than the control inputs. variable is represented in the cell corresponding to the row and
column.
Once the weighting matrices 𝑄 and 𝑅 have been selected,
the next step is to compute the feedback gain matrix 𝐾 using TABLE II. RULES OF FUZZY LOGIC CONTROLLER
the solution of the discrete algebraic Riccati equation. The
feedback gain matrix 𝐾 is given by equation (23), where P* is NB NM NS Z PS PM PB
NB NB NB NB NB NM NS Z
the positive semidefinite matrix that is the unique solution to
NM NB NB NB NM NS Z PS
the Riccati equation (24). NS NB NB NM NS Z PS PM
Then the feedback 𝐾 can be computed and the closed loop Z NB NM NS Z PS PM PB
PS NM NS Z PS PM PB PB
system responses can be found by simulation.
PM NS Z PS PM PB PB PB
The gain matrix 𝐾 which solves the LQR problem is PB Z PS PM PB PB PB PB
- 44 -
Each variable is divided into 7 membership functions, and error covariance output is a measure of the uncertainty in the
the ranges for the error and output are [-120, 120] and [-180, estimated state.
180], respectively. Table 3 provides the rule base for the DC
motor, and Fig. 10 provides a more detailed view of the fuzzy The Kalman filter block in Simulink allows for the
specification of the noise covariance matrices, which are
system rules, allowing for a deeper understanding of how the
important parameters in determining the filter's performance.
system operates.
In particular, the sensor noise covariance and the input plant
V. EXPERIMENTAL RESULTS AND SIMULATION noise covariance matrices play an important role in
determining the amount of noise rejection achieved by the
DC Motor Control using Kalman Filter filter.
The Simulink block model for DC motor speed control by The sensor noise covariance matrix represents the
Kalman filter is presented in Fig.7. The system output measurement noise, which is the noise that is present in the
response for DC motor speed is measured in rad/sec, and the measured output of the system. The value of the sensor noise
gains RPM to rad/sec are used. The obtained results for the covariance lies in the variance range of 0 to 1. A value of 1
speed output response are then converted back to RPM speed corresponds to maximum sensor noise rejection, meaning that
response. The system model is defined in the Transfer the filter is giving more weight to the predicted state rather
function block. than the measurements. In other words, the filter trusts the
To account for sensor noise, a sensor noise covariance is model more than the measurements. On the other hand, a
introduced with a value between 0 and 1, which represents the value of 0 corresponds to no sensor noise rejection, meaning
variance range. The maximum sensor noise rejection effect is that the filter is giving equal weight to the measurements and
achieved when the value is set to 1. However, the impact of the predicted state. In this case, the filter is trusting the
noise rejection can be observed in the input plant noise measurements more than the model.
covariance Q, where larger values result in a minimal noise
rejection effect.
The model in the Simulink environment is utilized for
controlling the speed of the DC motor using a Kalman filter.
The state space domain is used to specify the system model.
By employing the gains RPM to rad/sec, the system output
response is translated to rad/sec, and the results are then
converted back to RPM speed response.
In conclusion, the Simulink model for DC motor speed
control by Kalman filter offers a robust and accurate approach
to controlling the motor's speed. By introducing the sensor
noise covariance and input plant noise covariance, the impact
of noise on the system response can be minimized. The model
can be further optimized by adjusting the parameters of each
block to suit the specific application.
Figure 8. Kalman Filter block on Simulink
- 45 -
filter is well-suited for applications that require accurate observe the performance of the LQR controller in tracking the
control of the DC motor speed with a short delay. reference speed and maintaining the desired speed of the
motor.
However, it is important to note that the rise time
requirement may vary depending on the specific application. Overall, the Simulink model of the DC motor speed
For applications that require a faster response time, the rise control with LQR controller is an effective tool for studying
time of the Kalman filter may need to be further optimized. the implementation of LQR control in a practical application.
Additionally, the performance of the Kalman filter may be It allows the user to observe the performance of the controller
affected by external disturbances or uncertainties in the in real-time and provides a visual representation of the system
system. Therefore, it is crucial to evaluate the controller's response.
performance in the context of the specific application
requirements and optimize its parameters accordingly.
In summary, based on these results, the Kalman filter is
effective in controlling the DC motor speed and is well-suited
for applications that require accurate control with a relatively
short delay. However, its performance should be evaluated in
the context of specific application requirements and optimized
accordingly.
Figure 10. Simulink model of LQR Controller for DC Motor
- 46 -
Overall, the results suggest that the LQR controller is rise time of 27 seconds itself. The graph shows that the actual
effective in controlling the DC motor speed, albeit with some speed of the DC motor closely follows the reference speed,
limitations. The small overshoot percentage indicates that the indicating that the fuzzy logic controller has been successful
controller can maintain the motor speed close to its desired in controlling the DC motor speed.
value, while the relatively long rise time suggests that the
controller's response time may not be fast enough in some However, compared to the other two controllers, LQR and
applications. Therefore, it is essential to evaluate the Kalman filter, the fuzzy logic controller has a higher percent
controller's performance in the context of the specific overshoot and a longer rise time. This suggests that the fuzzy
application requirements and optimize its parameters logic controller may not be the most effective controller in
accordingly. this scenario. While it has shown success in controlling the
DC motor speed, it may not be the optimal choice for
DC Motor control using Fuzzy Logic achieving the desired speed response with minimal overshoot
and fast rise time.
To implement fuzzy logic control in a DC motor speed
control system, a Simulink model can be used. The model Overall, the effectiveness of the fuzzy logic controller for
consists of a signal builder block to generate a reference speed DC motor speed control depends on the specific application
signal and a fuzzy logic block to control the DC motor model. and the desired performance criteria. While it may not be the
The DC motor model can be represented by a transfer most effective choice in this scenario, it may still be a viable
function, which relates the input voltage to the output speed. option in other situations where different performance criteria
or constraints are present.
The fuzzy logic block consists of three main parts: the
fuzzification module, the rule base, and the defuzzification
module. The fuzzification module takes the input variables
and maps them to fuzzy sets, which represent the degree of
membership of each variable in each set. The rule base
contains a set of fuzzy logic rules, which map the input
variables to the output variable. The defuzzification module
takes the output of the rule base, which is a set of fuzzy sets,
and maps them to a crisp output value. This value is then used
as the input to the motor controller.
The results of the DC motor speed control using fuzzy logic
can be visualized using a scope block in Simulink. The scope
block displays the output speed of the motor in response to
the reference speed signal generated by the signal builder
block. The performance of the fuzzy logic controller can be
evaluated by comparing the actual performance of the motor
to the desired performance and adjusting the fuzzy rules and Figure 13. Speed Response of DC motor with Fuzzy Logic Controller
input variables as needed to improve the performance.in
Fig.12 the Simulink model of DC motor speed control using
fuzzy logic can be seen. VI. CONCLUSION
Based on the results obtained from the three controllers,
namely Kalman filter, LQR, and Fuzzy Logic, it can be
concluded that the Kalman filter controller outperforms the
other two controllers in terms of overshoot and rise time. The
Kalman filter controller resulted in the least overshoot
(2.542%) and a comparable rise time (26.829 seconds) to the
other two controllers, making it more efficient in controlling
the DC motor speed.
The LQR controller also performed well with an overshoot
of 4.237% and a rise time of 26.873 seconds, but it was
outperformed by the Kalman filter controller. The Fuzzy
Logic controller had the highest overshoot of 6.034% and a
rise time of 26.954 seconds, making it the least effective
controller of the three tested (Table 3).
Figure 12. Fuzzy Logic controller for DC motor
TABLE III. PERFORMANCE COMPARISON OF KALMAN, LQR, AND
FUZZY LOGIC CONTROLLER
The graph (Fig.13) illustrates the fuzzy logic controller in
controlling the speed of a DC motor. The reference speed Controllers Overshoot (%) Rise Time (sec)
generated by the signal builder is shown as the black line,
while the red line represents the actual speed of the DC motor Kalman 2.542 26.829
after being controlled by the fuzzy logic controller.
LQR 4.237 26.873
The rise time of the fuzzy logic controller for DC motor
speed control is 26.954 seconds, while the percent overshoot Fuzzy Logic 6.034 26.954
is 6.034%. The reference speed used in this experiment has a
- 47 -
Therefore, the main goal of this study, which was to network-based control, which may have better performance
evaluate and compare the performance of three different under certain conditions.
control techniques for DC motor control, has been achieved.
The study has shown that the Kalman filter controller is the In conclusion, this study provides valuable insights into
the performance of three different controllers for DC motor
most suitable approach for achieving precise and efficient
speed control. The results suggest that the Kalman filter
control of DC motors.
controller is the most effective controller for this application,
The findings of this study provide valuable insights into but further research is needed to validate the results under
the strengths and limitations of each control technique, and different operating conditions and to compare the proposed
they may also have practical implications for various method with other control strategies. Overall, the study
industries that use DC motors, such as robotics, automation, contributes to the advancement of the field of control
aerospace, and automotive industries, by providing guidance engineering and provides useful information for practitioners
for the design and implementation of control systems that can and researchers alike.
improve the performance and stability of DC motor systems.
REFERENCES
In conclusion, the Kalman filter controller is
[1] M. Ruderman, J. Krettek, F. Hoffmann, T. Bertram, "Optimal State
recommended for controlling the speed of DC motors, but the Space Control of DC Motor", Proceedings of the 17th World Congress,
choice of controller may also depend on other factors such as The International Federation of Automatic Control, Seoul, Korea, July
the complexity of the system, computational resources, and 6-11, 2008. pp. 5796- 5801.
ease of implementation. [2] Katsuhiko Ogata: Modern Control Engineering; Prentice Hall
International, Inc. Fourth Edition 2002. [8] Rashid M.H., ‘Power
VII. DISCUSSION Electronics’, Prentice Hall, 1998.
[3] Aditya Pratap Singh, “Speed Control of DC Motor Design and E
In this study, we aimed to evaluate and compare the Controller Based on Matlab” Innovative Systems.
performance of three different controllers for DC motor speed [4] Nur Iznie Afrah Binti Mohdisa “DC motor controller using Linear
control, namely LQR, fuzzy logic, and Kalman filter. Our Quadratic Regulator (LQR) Algorithm implementation on PIC”,
results showed that the Kalman filter controller outperformed Bachelor of Electrical Engineering (Hons.) (Electronics), Universiti
the other two controllers in terms of overshoot and rise time, Malaysia Pahang, Nov 2008.
making it the most effective controller for DC motor speed [5] Che Ku Mohd Faizul “Linear Quadratic Regulator (LQR) speed control
control in our experiments. for DC motor using MC68HC11, Bachelor of Electrical Engineering
(Hons.) (Electronics), Universiti Malaysia Pahang, Nov 2008.
One possible explanation for the superior performance of [6] Ali M. Yousef and M. K. El-Sherbiny “Improvement of Synchronizing
the Kalman filter controller is that it uses a model-based and Damping Torque Co-efficients Based LQR Power Systemv
approach to estimate the state of the system and then adjust Stabilizer,” Proceedings of IEEE International Conference on
Electrical, Electronic and Computer Engineering, ICEEC 2004, pp.
the control action accordingly. This approach allows the 753-758.
controller to compensate for disturbances and model
[7] H.X.Li and S.K.Tso, "Quantitative design and analysis of Fuzzy
uncertainties more effectively than the other two controllers, Proportional- Integral- Derivative Control- a Step
which rely on a pre-defined control law and do not explicitly TowardsAutotuning", International journal of system science, Vol.31,
account for uncertainties in the system. No.5, 2000, pp.545-553.
[8] Zadeh, L. A., Fuzzy Sets. Information and Control, 8, 338-353, 1965.
The proposed method and the results obtained in
[9] Assilian, S. and Mamdani, E.H., An Experiment in Linguistic
comparison with existing methods are significant in several Synthesis with a Fuzzy Logic Controller. International Journal of Man-
ways. First, the study provides a comprehensive comparison Machine Studies, 7(1), 1-13, 1974.
of three popular control techniques for DC motor speed [10] an Jantzen, ‘Tuning of Fuzzy PID
control, which can help researchers and engineers to select an Controllers’,www.iau.dtu.dk/~jj/pubs/fpid.pdf
appropriate control strategy for their specific applications. [11] Mohinder S.Grewal ,Angus P.Andrews,”KALMAN FILTERING
Second, the study demonstrates the effectiveness of the Theory and practice using Matlab”.Fourth edition,Wiely, 2015
Kalman filter controller for DC motor speed control, which [12] Shoba E.S.R, T.V.Narmadha, ‘A Fuzzy PD+I controller for speed
can be used as a benchmark for future research in this area. control of DC Shunt Motor’, Proceedings of NCICCA 2005, Tamil
Nadu, India pg 366- 370, 2005.
However, there are several limitations to this study that [13] Yasser Ali Almatheel, Ahmed Abdelrahman “Speed Control of DC
need to be acknowledged. First, the experiments were Motor Using Fuzzy Logic Controller” IEEE,( International Conference
conducted under idealized conditions, and the performance of on Communication, Control, Computing and Electronics Engineering
(ICCCCEE), Khartoum, Sudan),2017.
the controllers may vary under different operating conditions
[14] Katsuhiko Ogata: System Dynamics; Prentice Hall International, Inc.
or in the presence of disturbances. Second, the study only Third Edition 1998.
evaluated the performance of the controllers based on two
[15] Y. S. Lai, et al., "Efficiency comparison of PWM-controlled and PAM-
metrics, overshoot and rise time, and other performance controlled sensorless BLDCM drives for refrigerator applications," in
criteria, such as steady-state error and settling time, were not Conference Record - IAS Annual Meeting (IEEE Industry Applications
considered. Society), 2007, pp. 268-273.
[16] S. Jianwen, et al., "A novel microcontroller-based sensorless brushless
In addition to the limitations, there are also some DC (BLDC) motor drive for automotive fuel pumps,", IEEE
disadvantages of this study that need to be addressed in future Transactions on Industry Applications, vol. 39, pp. 1734- 1740, 2003.
research. One of the main limitations is the use of a single DC [17] Roozbeh Molavi, and Davood A. Khaburi, "Optimal Control Strategies
motor model, which may not be representative of all types of for Speed Control of Permanent-Magnet Synchronous Motor Drives",
DC motors. Future studies could consider using different World Academy of Science, Engineering and Technology 44, 2008,
motor models for validating the effectiveness of the proposed pp.428-432.
method. Another limitation is the lack of comparison with [18] Ruba M.K. Al-Mulla Hummadi,(2012), Simulation Optimal Speed
Control For A Dc Motor Using Linear Quadratic Regulator (LQR),
other control strategies, such as adaptive control or neural Journal Of Engineering, Volume 18 March 2012, pp 340-348
- 48 -
[19] Ramesh Chandra Chourasia, Mukesh Kumar, “Speed Control of [31] H. L. Tan, N. A. Rahim and W. P. Hew, A Dynamic Input Membership
S.E.D.C. Motor by Using Pi and Fuzzy Logic Controller” International Scheme for a Fuzzy logic DC Motor Controller, The IEEE
Journal of Soft Computing and Engineering (IJSCE),Volume-3, Issue- International Conference on Fuzzy Systems, St. louis, Missouri, USA ,
2, May 2013. pp. 426-429, 2003
[20] [20] R. Radzi (2010). Dc Motor Speed Control Using Fuzzy Logic [32] N. Mort, M. F. Abbod and D. A. Linkens, Comparative Study of Fuzzy
Controller. University Technology Malaysia. Retrieved from DC Servo Motors and Stepper Motors for Mechatronic System, IEEE,
https://www.researchgate.net/publication/322913964_DC_motor_spe UK, 1995 60
ed_control_using_fuzzy_logic_controller [33] Robert Bicker, Zhongxu Hu, Kevin Burn,’A Self Tuning Robotic Force
[21] H. L. Tan, N. A. Rahim and W. P. Hew, “A dynamic input membership Controller’, Proceedings , Springer Verlag, 2002.
scheme for a fuzzy logic DC motor controller,” in 12th IEEE [34] Kapinjay Ucharia, Himmat Singh, “International Journal of Scientific
International Conference on Fuzzy Systems (Institute of Electrical and Engineering and Technology” Volume 3 Issue No.3, pp : 235 – 239 1
Electronics Engineers, Piscataway, NJ, 2003) pp. 426-429. March 2014.
[22] R.M. Aguilar, V. Muñoz and Y. Callero, Control Application Using [35] Shashi Bhushan Kumar, Mohammed Hasmat Ali, Anshu Sinha,
Fuzzy Logic: Design of a Fuzzy Temperature Controller, University of “Design and Simulation of Speed Control of DC Motor by Artificial
La Laguna, 2012. URL: http://www.intechopen.com/ Neural Network Technique international Journal of Scientific and
[23] Tetsuya Iwasaki and Teruo Kataoka, ”Application of an Extended Research Publications, Volume 4, Issue 7, July 2014.
Kalman Filter to Parameter identification of an induction motor”,1989 [36] Md Akram Ahmad, Pankaj Rai, “Speed control of a DC motor using
IEEE. Industry Applications Controllers” Automation, Control and Intelligent Systems,2014; 2(6-
[24] Aleksandar Pajkanovic and BrankoDokic , “Wheelchair control by 1): 1-9.
head motion”, Serbian journal of electrical Engineering, vol. 10, No. 1, [37] Control Tutorials for MATLAB and Simulink - Motor Speed Digital
135–151, 2013. Controller Design, 2009.
[25] Mohinder S.Grewal ,Angus P.Andrews,”KALMAN FILTERING [38] “A study on the brush noise reduction of a dc motor using multi-body
Theory and practice using Matlab”.Fourth edition,Wiely, 2015 dynamics”, Tae-Won Park, Il-Ho Jung and Jong-Hwi Seo, XXI
[26] J. Jantzen, Tutorial on Fuzzy Logic, Technical University of Denmark: ICTAM, 15-21 August 2004, Warsaw, Poland.
Department of Automation, Technical report number 98-E 868, 19 Aug [39] K.Ogata, “Modern Control Engineering”, Prentice-Hall, 1970
1998, URL: http://www.iau.dtu.dk/
[40] A. Shi, M. Yan, J. Li, W. Xu, Y. Shi, The Research of FUZZY PID
[27] K.Venkateswarlu and Ch. Chengaiah “Comparative study on DC motor Control Application in DC Motor of Automatic Doors, Jurnal of
speed control using various controllers” Volume 1 , Issue 6 / Dec 2013 Institute of Electrical and Electronics Engineers, pp. 1354-1358, 2011
[28] AlokRanjan Singh and V.K. Giri “Design and Analysis of DC Motor [41] S. Zhang, X. Wang, Study of Fuzzy-PID Control in MATLAB for
Speed Control by GA Based Tuning of Fuzzy Logic Controller” Twophaase Hybrid Stepping, Proceedings of the 2nd International
International Journal of Engineering Research & Technology (IJERT), Conference On Systems Engineering and Modelling (ICSEM-13), pp.
Vol. 1 Issue 5, July – 2012 1011-1014, 2013
[29] J.P. Anderson, State-space modeling, system identification and control [42] M. Muruganandam and M. Madheswaran, Modeling and Simulation of
of a 4th order rotational mechanical system . Master Thesis. Naval Modified Fuzzy Logic Controller for Various types of DC Motor
Postgraduate School, California, 2009 Drive, international conference on control, automation, communication
[30] M. Ruderman, J. Krettek, F. Hoffmann, T. Bertram, Optimal State and energy conservation, 4th-6th June 2009 pp. 1-6
Space Control of DC Motor, Proceedings of the 17th World Congress
The International Federation of Automatic Control Seoul, Korea, 2008
.
- 49 -
Digital Transformation of Document Support
for Enterprise Quality Management System
Shara Toibayeva1*, Irbulat Utepbergenov2
1
G.Daukeev Almaty University of Power Engineering and Telecommunications, Almaty, Kazahstan
2
G.Daukeev Almaty University of Power Engineering and Telecommunications, Almaty, Kazahstan
Email: [email protected], [email protected]
Abstract—This article deals with quality, which is one of the production, control, work with personnel, etc. is characterized
important strategic tools in business. Assessing the effectiveness by the concept of quality. For example, the quality of a product
of quality management systems of enterprises is of great reflects the quality of its design, development, manufacturing,
importance, given the specificity of quality indicators, the multi- and sales processes. Thus, quality management affects the
level nature of the system, and the need to select the optimal entire product life cycle: from research in marketing, research
number of performance indicators and assess the state of the and development, design stages, and up to the production of
system, which is associated with the formation of rational products, sales and maintenance. In this regard, the current
decisions in the management of quality management systems.
steps in the development of quality improvement techniques
The method and model of automated enterprise quality
cover both the problems of improving the quality of products
management and intelligent automated system of quality
management of enterprise integrated with ruling MICS
or services, and the quality of management itself [2].
subsystems (Management Information and Control System) are The main task for effective management are the stages of
offered allowing to automate QMS implementation and support formation, implementation and use of an automated system of
processes and increasing the validity, efficiency and quality management. The control system should provide
effectiveness of management decisions by automated a number access to the documentation of the enterprise, quality output
of functions of decision makers and personnel. The article also of the requested information to take management actions to
considers the development of the Model and algorithms of
solve the problems of the enterprise relevant at a certain
digital transformation of documentary support of quality
moment.
management system to identify contradictions and
inconsistencies in the documentation of quality management At product quality management, the objects of
system (QMS) of the economy of Kazakhstan. This solution will management are processes, and managing decisions are
eliminate the problems of processing large volumes of normative formed by comparing the indicators of the actual state of the
documents of the enterprise while maintaining in an automated managed process with its planned ones. To successfully
QMS. The solution is based on reality model and accompanied perform its functions, an enterprise needs to manage
by the development of a formal language using approaches significant correlated activities as a system of processes.
similar to the creation of well-known declarative programming
languages. This project was supported by a grant from the According to the results of the analysis of literary sources
Ministry of Education and Science of the Republic of for the last 20 years, we can say that in the world, in particular
Kazakhstan (Zhas Galym project No. AR 13268939 Research in Kazakhstan, the scientific direction related to the problems
and development of digital technology to provide consistency in of implementation and automation of quality management
the media of normative documents of the quality management systems, technology analysis of business processes of various
system). organizations is developing.
Keywords—automated control system; quality management; Turning to statistics, we can note that the starting point of
document structure; formal language management development in Kazakhstan are the 90's, when
the management situation and the market system have
I. INTRODUCTION changed dramatically, and there was a need to study the
The economic potential of Kazakhstan is directly related foreign experience of management, to apply it in the country.
to the development of business, and the management More and more interest in the implementation of the QMS and
environment affects the efficiency and effectiveness of the automation of business processes of enterprises is noted. For
enterprise. By joining the WTO, Kazakhstan has increased example, the query "automation of quality management" in
competition between enterprises to occupy its niche in the the information base of scientific electronic library
market and strengthen its position, which requires the release eLIBRARY.RU received 43085 results [3-4], which indicates
of higher quality products to the market, capable of satisfying the interest in quality management systems and its automation
the end users [1]. in the scientific community.
The enterprise adapts to changes in the external In an industrialized country, it is necessary to meet the
environment, which determines its organizational component challenges of implementing and keeping up-to-date modern
of management, which includes many links (units), classified management systems, where competition, knowledge-
by appropriate strategies, relationships (relationships), and intensive, innovative and technologically sophisticated
documented requirements. production is developed.
Today, the effective result of the organization of all
functions of the enterprise: planning, organization,
- 50 -
Since the beginning of 2002, the organization, design and II. THE IMPORTANCE OF BUILDING A FORMAL LANGUAGE
implementation of QMS of organizations in Kazakhstan has
been noticeably strengthened [5-6].
A formal language is treated as a set with all strings under
In the field of quality management the orders of Prime a finite number of alphabets. The formal language theory
Minister of the Republic of Kazakhstan № 28-r dated states that the study of all families is done by formal methods.
06.02.2004 and № 175-r dated 27.06.2006 on the soonest This formal method is mainly used to develop and verify
rearrangement of enterprises according to ISO standards have software and hardware systems. It is usually described for
been adopted, so on achieving the set goals in the country the formal languages and automata theory. Typically, formal
proper material and technical support, normative and languages deal with a set of strings and are defined in two sets
methodological base for implementation of international of rules. The first rule deals with syntax, which specifies how
standards is created [7,8]. to use symbols, while the second rule deals with semantics,
The regulatory framework of the Republic of Kazakhstan which tells the meaning of symbols and legal expressions
[7,9] includes 36 state standards, where international ISO [13].
standards were taken as a basis and adopted as state standards Constructing a formal language that characterizes
of the Republic of Kazakhstan. normative documents is an important tool for ensuring
Development and implementation of standards is part of accuracy and clarity in describing the rules and requirements
the standardization plan of the Republic of Kazakhstan each contained in normative documents. Regulatory documents
year in the field of management. are used in various fields of activity, from jurisprudence to
technical documentation, and often have legal significance.
In their work, A. Ateş and U. Bititchi [10] argue that the Therefore, they need to be written in clear and
business environment is constantly changing, and managing comprehensible language so that users can easily understand
change to adapt to an uncertain future is a problem that the requirements they contain.
requires resilience - the ability of an organization to survive, However, normative documents are often complex and
adapt and maintain business sustainability in the face of high confusing, which makes them difficult to understand and
rates of change.
leads to errors in their interpretation and application. Building
Innovative companies are adopting new systems a formal language allows you to develop a common language
management approaches, and enterprise quality managers are to be used to describe documents and establish clear syntactic
achieving greater results for their organizations in less time rules for its use. This will make it easier for the user to
[11,12]. understand the requirements contained in normative
Several problems can be identified that quality documents and reduce the likelihood of errors.
management professionals encounter when using such static In addition, building a formal language can help in
management systems: developing new regulatory documents and amending existing
ones. With the language, you can quickly identify what
1) Unproductive use of work time. Managers have to enter concepts are already used in other normative documents,
the same data several times to collect data from different what syntax rules apply, and how different requirements are
sources and combine it into single reports. described. This can greatly speed up the process of
2) Lack of real-time, relevant information. It takes some developing and amending documents [14].
time to distribute and update information throughout the Thus, in order to increase the speed of creating documents
organization. The data updates slowly in the system, and in and the accuracy of the data contained in them, automated
order to provide an accurate assessment of the situation, the document management systems are being actively developed
most recent changes in compliance data must be processed. and widely used. The development of a universal formal
3) Limiting access to accurate analysis. Facility language will make it possible to create a system of
management relies on managers to perform surveillance of automated formation of documents of any composition and
what is going on in the facility. Since the managers themselves purpose.
are not quality managers-they rely on the latter to analyze and
present data they can understand and read. It takes a lot of time
to create reports, thereby slowing down the feedback process. III. BUILDING A FORMAL LANGUAGE
The construction of a formal language characterizing
4) Preparing monthly reports for most businesses is a normative documents is an important tool for ensuring
duplication of data. When calculating data, it takes time for accuracy and clarity in the description of rules and
managers to submit reports to supervisors. requirements contained in normative documents. Normative
5) Ineffective communication with employees. Creating documents are used in various fields of activity, from
connections with employees and training people is very time jurisprudence to technical documentation, and often have
consuming. Quality managers spend a lot of time on legal significance. Therefore, it is necessary that they be
compliance issues without focusing on other activities. written in a clear and understandable language so that users
can easily understand the requirements contained in them.
6) Lack of databases of documented information and as a
result, no automated decision support system. Lack of prompt However, normative documents are often complex and
notification and response to the facts of deviations of the confusing, which makes them difficult to understand and leads
values of the planned indicators. to errors in their interpretation and application. The
construction of a formal language makes it possible to develop
a single language that will be used to describe documents, and
to establish clear syntactic rules for its use. This will make it
- 51 -
easier for the user to understand the requirements contained in The three-dot (...) denotes other characters of the FL:
normative documents and reduce the likelihood of errors. <Text>, <East Lit>, <<Word>, <Digit>, <Punctuation Mark>,
<Ending Mark>, <Letter>, <Arithmetic>.
A formal language is considered as a set with all strings
which are under a finite number of alphabet. Formal language The normative document can be presented in CT in three
theory states that studies of all families on formal methods. forms:
This formal method is mainly used for developing and
verifying the software and hardware systems. It is typically CD = (KD, BD, ND), (1)
described for formal languages and automata theory. where KD is a set of components reflecting the structural
Generally formal languages deal with the set of strings and elements of the documents; BD is a set of links between the
defined in two set of rules. The first rule is about syntax which structural elements of the documents; ND is a set of nodes
tells that how to use the symbols whereas the second rule is located at the connection points of the structural elements of
about semantics which tells that meaning of the symbols and the documents.
legal expressions [15,16].
In turn, the KD component set contains three subsets:
The system based on the formal language is fundamentally
different from its counterparts in that it implements a new
approach in terms of documenting, which consists in KD = { KDI, KDP, KDZ }, (2)
constructing the document plan from special components that
are computer models of the document's constructive
assemblies. This process is called "document where KDI - set of information converter components; KDI
construction"[17]. - set of information converter components; KDZ - final
Using FL, you can describe the structure of almost any component ("document").
document. The structure of the order in the above example KD topology and coordinate system components are not
(Fig. 1) can be described by a set of the following nonterminal supported by S1 boiler. S1 bylaws have the following types:
symbols of the F span; span; logic; zhol; array; and derek and file [19-22].
Building a formal language can help in the development Components are the source of information about the KDI
of new normative documents and amendments to existing set (Fig. 2) to set the source information and transfer it to other
ones. The language can be used to quickly determine what components or directly to the document. The algorithmic
concepts are already used in other normative documents, what model and process of the information source component are
syntax rules apply, and how various requirements are characterized by the following sequence:
described. This can greatly speed up the process of developing
and amending documents [18].
Fig.1 - An example of using FL to describe the structure 6) the components connected to the component via
of a document infocontact n1 receive the information, then process it and
send it to the document or send it to the document immediately
The nonterminal symbol <Document 1> denotes the entire [23].
document. It is part (as a fragment) of a more complex
document, indicated in the figure by the symbol <Document Components are transducers of information in the KDP set
2>; (Fig. 3) for receiving source information, transforming it and
transmitting it to other components or directly to the
The <Text> symbol denotes a block of text that can document. Components of this type may have one or more
include a set of all characters from the ASCII (or Unicode) inputs and only one output info-contact.
table;
The symbol <Requisites> expresses a requisites of a
document(name of the position of the person who signed the
document, signature and transcript of the signature).
- 52 -
«Contemporary Issues in Business, Management and Education 2013»,
2014. V.110. - P. 627-637
[3] Olszewska A.M. Research Issues Undertaken within Quality
Management - Overview of Selected Literature and a Knowledge Map
// 7th International Conference on Engineering, Project, and Production
Management, 2017. V.182. -P. 518 - 523
[4] B. Jose, S. Abraham Intelligent processing of unstructured textual data
in document based NoSQL databases, Materials Today: Proceedings
Fig. 3 - Graphic representation of the information- 2021
converter component [5] Utepbergenov I.T., Toibayeva Sh.D., Muslimova A.K., Isabekova L.S.
Nechetkaya model' menedzhmenta kachestva tekhnologicheskikh
The end component "Document" of the KDZ set (Fig. 5) is protsessov pishchevogo proizvodstva// Mezhdunarodnaya nauchnaya
used to The end component "Document" of the set KDZ (Fig. konferentsiya «Informatika i prikladnaya matematika», Almaty, 2017.
4) is used to collect all the information coming to it and to CH.II. - P.374-388.
form a document. [6] Muslimova A.K., Utepbergenov I.T., Sklyarova Y.V., Toibayeva
Sh.D. Formalizatsiya analiza funktsionirovaniya i effektivnosti SMK
dlya ekspertnoy sistemy //Vestnik KazNU. Almaty, 2016. - №3/1 (90).
- P. 87-96
[7] Website of the National Accreditation Center LLP//
http://www.nca.kz/ 02.05.2023
[8] Satbaev R.A., Dugalov G.T. Technical regulation and metrology:
industry and new technologies of the Republic of Kazakhstan. "The
concept of development of management systems in the Republic of
Kazakhstan " - Astana: Ed. KazInST and LLP BaEr ltd. - P. 68-83.
Fig. 4 - Graphic representation of the "Document" [9] Regulatory framework // URL: http://online.zakon.kz/ 02.05.2023
component [10] Ates A., Bititci U., Int. J. Prod. Res, 2011. V.49. -P. 5601-5618
It can also serve to transfer the formed fragment to another [11] Utepbergenov I., Bobrov L., Medyankina I., Rodionova Z. About the
Concept of Information Support System for Innovative Economy in the
document. Using this component makes it possible to form Republic of Kazakhstan// Recent Research in Control Engineering and
complex documents consisting of a number of documents (or Decision Making. ICIT 2019 Conference proceedings - Springer,
their fragments). The "Document" component can have one or Cham, 2019. Vol. 199. - P. 515-526
more input info-contacts (n1...nn) and one output info-contact [12] Medyankina I.P., Bobrov L.K., Toibayeva Sh.D., Nurgulzhanova A.N.
(nn+1). Comparative analysis of the state of information support of innovations
in Russia and Kazakhstan // Bulletin of KazATK, 2018. No. 4 (107). P.
CONCLUSION 239-246
[13] ScienceDirect. Formal Language – an overview | ScienceDirect Topics.
The system developed on the basis of the formal language https: //www.sciencedirect.com/topics/computer-science/formal-
differs from its analogues by implementing a new approach to language. (Accessed on 12/03/2023).
documenting, which consists in forming the document scheme [14] A. P. Sergushicheva, E. N. Davydova. “Development and Application
from special components, which are computer models of of a Software Tool to Support the Teaching of Formal Languages”.
structural elements of the document. This process is called Open Education 25(4):13-22. 2021.
"document construction". [15] Toibayeva Sh.D. A comprehensive methodology for automated quality
management of an enterprise in Kazakhstan, International scientific
Using a formal language for normative documents has journal SCITECHNOLOGY, Latvia, 2019. No. 21. -P.23-27
many advantages. [16] Ekaterina Bakinova , Artem Basharin, Igor Batmanov , Konstantin
Lyubort , Alexander Okhotin , Elizaveta Sazhneva. “Formal languages
Firstly, it reduces the possibility of different over GF(2). Information and Computation”. Volume 283, February
interpretations and interpretations of the document, which 2022, 104672.
avoids various undesirable consequences, such as conflicts, [17] Alberto Pettorossi. Formal Grammars and Languages. “Automata
legal errors, lawsuits, etc. Theory and Formal Languages”. August 2022.
[18] Tomoyuki Yamakami. “Formal Grammars for Turn-Bounded
Secondly, the formal language simplifies the process of Deterministic Context-Free Languages”. In book: Theoretical Aspects
creating and making changes to normative documents, since it of Computing – ICTAC 2022. October 2022.
has a strict logical structure and format, which makes it [19] Panov S.A. Formal language of document structure description and its
possible to automate the process of checking a document for interpretation in the format of the method of component chains //
Papers of Tomsk State University of Control Systems and
compliance with norms and rules [24, 25]. Radioelectronics. - 2014. - №1(31). - С. 197-20
Thirdly, the use of a formal language of normative [20] Lanin V.V., Lyadova L.N. Document management in dynamically
documents increases the efficiency of government bodies, adaptable systems, based on metamodeling. Proceedings of the
International Conference "Intelligent Systems - 2010". - M.: Fizmatlit,
since this language allows improving the process of regulating 2010. - VOL. 1. - P. 510-517.
public relations and ensuring more effective protection of
[21] Gandzha T.V. Panov S.A. Tabular forms generator as a component of
citizens' rights and freedoms. automated documenting system // Science. Technologies. Innovations:
Proceedings of the All-Russian Scientific Conference of Young
Scientists, Novosibirsk, November 29 - December 2, 2012: in 7 p. -
Novosibirsk: Publishing house of NSTU, 2012. - Ч. 3. - С. 88-91.
REFERENCES
[22] Tugengold A.K. et al. Intelligent electronic documentation of
technological The intelligent electronic documentation of
[1] Kazakhstan in WTO: what changes have taken place in 4 years technological objects in the system of PLM // DSTU Vestnik. - 2011. -
//https://strategy2050.kz/en/news/53723/ Т. 11, № 3. - С. 860-867.
[2] Liepiņa R., Lapiņa I., Mazais J. Contemporary Issues of Quality [23] Dmitriev V.M., Gandzha T.V., Gandzha V.V., Panov S.A. Structure
Management: Relationship between Conformity Assessment and and functions of an automated project management system for centers
Quality Management // The 2-dn International Scientific conference of scientific and technical creativity of students // Reports of Tomsk
- 53 -
state university of control systems and radioelectronics. - №2(26), Ч. [25] Veretekhina S. V. V. Methodology of developing interactive electronic
2. - 2012. - С. 200-203. operational documentation for science-intensive products of the
[24] Tugengold A.K. et al. Intelligent electronic documentation of telecommunications and information industry. - MOSCOW: ALL-
technological The intelligent electronic documentation of RUSSIAN RESEARCH INSTITUTE OF PH, 2008
technological objects in the system of PLM // DSTU Vestnik. - 2011. -
Т. 11, № 3. - С. 860-867
- 54 -
On the issue of constructing and identifying the
parameters of the piezometric pattern of pumping
wells in the underground leaching of metals
Bakhyt Mukhanov Zhanar Omirbekova
Department of Automation and Control Department of Automation and Control
Almaty University of Power Engineering Satbayev University
and Telecommunications named after Almaty, Kazakhstan
Gumarbek Daukeyev [email protected]
Almaty, Kazakhstan ORCID 0000-0001-8425-5454
[email protected]
ORCID 0000-0003-1634-6914
Abstract — The article is devoted to the problems this paper we conduct practical and mathematical
of underground leaching of metals. An algorithm for experiments based on empirical approach and
the current assessment of the main parameters of the modelling obtained fascinating results hypothesis
piezometric characteristics of pumping wells is being [7-10]
developed. The piezometric profile of the downhole
pump characteristic is given on the example of the M ETHODOLOGY
GRUNDFOS pump. The results of research and
calculations showed that the dependence of the The examination is as follows consider the
increase in the pressure of the liquid column Рst on technological features of pumping wells equipped
the filter in the pumping well on the flow rate should with downhole pumps when lifting production fluids
be used to solve the problem of optimal control of the to the surface. Normally, pumping wells are
in-situ leaching process This methodology allows for combined into a production mud receiving unit
optimal control of the in-situ leaching process by (PMRU), the scheme of which is shown in Fig. 1.
controlling the fluid pressure.
I NTRODUCTION
Efficiency of production - by the method of in-
situ leaching (ISL) of metals is largely determined
by piezometric (hydrodynamic) characteristics of
pumping wells. In this connection the development
of algorithms of current estimation of basic
parameters of the given characteristics is actual.
In-situ uranium leaching is one of the most
efficient and, most importantly, relatively least
hazardous industries. The authors [1, 3-5]
thoroughly investigate and discuss the problems in
this area. The authors Mukhanov et al. [2-3] Figure 1. Technological scheme of the extraction well
1 - pressure sensor; 2 - flow meter; 3 - valve.
conducted numerical experiments and modelling. In
- 55 -
In this paper, to approximate the flow-pressure
An important element of a pumping well is a characteristics, it is proposed to use the expressions
downhole pump. Consider the flow-pressure
characteristic of the pump together with the , (1)
characteristic of the well, which has the form, see
fig. 2.
where: - consumption of PR , m 3 / h ; -
pressure created by the pump (M).
The parameters of the model (1) can be
identified from the nameplate characteristics of the
pump.
Model (1) will make it possible to build a
piezometric picture of the extraction well and
determine the piezometric pressure of the productive
solution on the filter (see Fig. 3).
To obtain a piezometric profile of the operation
of a pumping well, the following parameters were
taken: the depth of the well is 200 m, the well pump
is at a depth of 110 m, groundwater starts from a
depth of 85 m.
Figure 3. Piezometric profile in a production well with a borehole pump type SP -14
- 56 -
Consider the piezometric profile of the
downhole pump characteristics given for the
GRUNDFOS pump , type SP -14, with a power of
7.5 kW. The flow-pressure characteristic (see Fig. 2)
is represented by the expression:
- 57 -
[5] Li, H., & Zhou, Y. (2019). Progress and Prospect of system. // Status, trends and problems of development of
Research on Solute Transport during In-Situ Leaching of the oil and gas potential of Western Siberia: Proceedings of
Uranium. In Xiyou Jinshu/Chinese Journal of Rare Metals the All-Russian Scientific and Technical Conference. -
(Vol. 43, Issue 3). Tyumen: FSUE " ZapSibNIIGG ", 2009 - pp. 356-360.
https://doi.org/10.13373/j.cnki.cjrm.XY18120015 [9] Rogov E.I. , Yazikov V.G., Horns A.E. Hydrodynamic
[6] Zhao, L., & Li, P. (2021). Relationship between chamosite model of underground leaching of uranium // Mining
alteration and Fe-plugging in sandstone pores during acid information and analytical bulletin (scientific and technical
in situ leaching of uranium. Minerals, 11(5). journal) . - M.: 2000. - No. 5. - S. 40 - 42.
https://doi.org/10.3390/min11050497 [10] Solovyov I. G., Vedernikova, Yu. A. Development and use
[7] Zhang, C., Tan, K., Xie, T., Tan, Y., Fu, L., Gan, N., & of hydrodynamic models of well systems equipped with
Kong, L. (2021). Flow microbalance simulation of installations of submersible electric centrifugal pumps //
pumping and injection unit in in situ leaching uranium Bulletin of Cybernetics. Tyumen : Publishing House of
mining area. Processes, 9(8). IPOS SB RAS , 2002. No. 1, p. 85-91.
https://doi.org/10.3390/pr9081288
[8] Fomin V.V., Vlasov D.A., Govorkov D.A. Technology of
visual-graphical analysis of hydrodynamics of the well
- 58 -
Analysis and synthesis of single-bit adders for
multi-bit adders with sequential transfers
Sakhybay Tynymbayev Assel Mukasheva Ibragimov Kuanyshbek
PhD, Professor of the Department of PhD, Associate Professor of the PhD doctoral student of the Faculty
Information Systems Department of Information Systems of Information Security System of the
and Cybersecurity And Cybersecurity Kazakh National University named
Almaty University of Power Engineering Almaty University of Power Engineering after Al-Farabi
and Telecommunications and Telecommunications Almaty, Kazakhstan
Almaty, Kazakhstan Almaty, Kazakhstan [email protected]
[email protected] [email protected] orcid.org/0009-0008-2126-3420
orcid.org/ 0000-0002-9326-9476 orcid.org/0000-0001-9890-4910
Abstract - The paper provides an analysis of existing single- -on valves "exclusive OR", and multiplexers, where an
digit binary adders from the point of view of their implementations adder with a conditional sum (conditional-sum addition_
on fans built on the basis of MOSFETs. The synthesis of a single- CSA) is implemented.
digit adder with a conditional sum is carried out. The considered Before determining the hardware complexity (the number
adders are compared in terms of speed and hardware complexity
of MOSFETs) and performance (the number of logic
(by the number of MOSFETs). In the final part, a scheme of a
multi-bit adder with consecutive transfers on adders with a elements on which the signal is delayed), the circuits of the
conditional sum is given. An example of performing addition analyzed adders are depicted as logic gates on MOSFETs.
operations is given. Consider the analysis of an adder built on the basis of two-
stage logic AND-OR-NOT [1,5].
Keywords—single-bit adder, multi-bit adder with consecutive The circuit of such an adder is shown in Figure 1, and
transfers, conditional sum adder, multiplexer. Figure 2 shows the circuit of this adder on the logic circuits
I. INTRODUCTION of MOSFETs [3].
The analytical formula of the analyzed adder has the form:
Adders perform arithmetic addition and subtraction of
numbers. Together with other logical operations, adders are Ci = (𝑎𝑖 𝑏𝑖 𝑎𝑖 𝐶𝑖−1 𝑏𝑖 𝐶𝑖−1 )
the core of the circuits of arithmetic logic devices that 𝐶𝑖−1 (𝑎𝑖 𝑏𝑖 𝐶𝑖−1 )𝑎𝑖 𝑏𝑖 𝐶𝑖−1
Si = ̅̅̅̅̅ (2)
implement a number of various operations (multiplication,
division, etc.), which are an indispensable part of various Figure 1 shows the functional diagram of the adder
processors. constructed according to the formula (2).
Important parameters of adders are their hardware Figure 2 shows its logic circuit on MOSFETs.
complexity and performance, therefore, many variants of
single-bit and multi-bit adders with serial, parallel and
combined transfers have been developed [1].
The listed adders are synthesized based on the truth table.
The analytical expressions of the sum (Si) and transfer
functions Ci have the form:
- 59 -
Figure 4. Functional diagram of the Si calculator based on two addition
schemes modulo two.
Si = ̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿
𝐶𝑖−1 𝑎𝑏𝑖 ̅̅̅̅̅
̅̅̅̅̅ 𝐶𝑖−1 𝑎𝑖 𝑏̅𝑖 𝑖 𝐶𝑖−1 𝑎̅𝑖 𝑏̅𝑖 𝐶𝑖−1 𝑎𝑖 𝑏𝑖 =
̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅
̅̅̅̅̅̅̅̅̅̅̅̅̅ ̅̅̅̅̅̅̅̅̅̅̅̅
̅ ̅̅̅̅̅̅̅̅̅̅̅̅ ̅̅̅̅̅̅̅̅̅̅̅̅
̅̅̅̅̅
(𝐶 ̅̅̅̅̅
̅𝑖 𝑏𝑖 )(𝐶
𝑖−1 𝑎 𝑖−1 𝑎𝑖 𝑏𝑖 )(𝐶𝑖−1 𝑎̅𝑖 𝑏̅𝑖 )(𝐶 𝑖−1 𝑎𝑖 𝑏𝑖 ) (5)
Si = ̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿̿
𝐶𝑖−1 𝑎𝑏𝑖 ̅̅̅̅̅
̅̅̅̅̅ 𝐶𝑖−1 𝑎𝑖 𝑏̅𝑖 𝑖 𝐶𝑖−1 𝑎̅𝑖 𝑏̅𝑖 𝐶𝑖−1 𝑎𝑖 𝑏𝑖 =
̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅
̅̅̅̅̅̅̅̅̅̅̅̅̅ ̅̅̅̅̅̅̅̅̅̅̅̅
̅ ̅̅̅̅̅̅̅̅̅̅̅̅ ̅̅̅̅̅̅̅̅̅̅̅̅
Figure 3. Functional scheme of Ci transfer ̅̅̅̅̅
(𝐶 𝑖−1 𝑎
̅̅̅̅̅
̅𝑖 𝑏𝑖 )(𝐶 𝑖−1 𝑎𝑖 𝑏𝑖 )(𝐶𝑖−1 𝑎̅𝑖 𝑏̅𝑖 )(𝐶 𝑖−1 𝑎𝑖 𝑏𝑖 ) (5)
The Si value in formula (3) is calculated by adding modulo The functional scheme for the sum of Si constructed
2 (Si1 = ai⊕bi), then Si = Si1 ⊕ Ci-1 is calculated (the first according to the formula (5) is shown in Figure 5
option). Figure 4 shows a functional scheme for calculating
Si based on two addition schemes modulo two.
- 60 -
To construct the sum of Si0 on the fans AND-NOT, OR-
NOT and NOT, formula (6) must be reduced to the form
̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅ ̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅̅
Si0 = (𝑎𝑖 𝑏𝑖 )(𝑎 𝑖 𝑏𝑖 ) = (𝑎𝑖 𝑏𝑖 )(𝑎𝑖 𝑏𝑖 ) = (𝑎𝑖 𝑏𝑖 ) + (𝑎𝑖 𝑏𝑖 )
̅̅̅̅̅ ̅̅̅̅̅ ̅̅̅̅̅̅̅ ̅̅̅̅̅̅̅̅̅
(11)
Ci1 = 𝑎̅𝑖 𝑏𝑖 𝑎𝑖 𝑏̅𝑖 𝑎𝑖 𝑏𝑖 = 𝑎𝑖 𝑏𝑖 (9) Ci1=𝑎 𝑖 𝑏𝑖 = 𝑎𝑖 𝑏𝑖
̅̅̅̅̅̅̅ (12)
From this table it is also easy to see that it is fed to the input "1" of the MUX2 multiplexer. The control
inputs of the multiplexers are transferred from the lower-
Si = ̅̅̅
𝑆𝑖0 (10) order Ci-1.
The adder works as follows. After the bits ai and bi are fed
to the inputs of the gates OR-NOT1 and AND-NOT1, the
- 61 -
value Si0 is formed at the output of the circuit OR-NOT2, and
the value of the sum Si1 is formed at the output of the inverter
INV2. At the same time, the transfer value Ci0 is formed at the
output of the inverter INV1 and the transfer value Ci1 is
formed at the output of the inverter INV3.
After feeding the transfers Ci0 and Ci1 and the sums Si0 and
1
Si at the input of the corresponding multiplexers by
transferring Ci-1, which is fed to the control inputs of the
multiplexers simultaneously, the value of the sum Si is
formed at the output of the MUX1 multiplexer and at the same
time, the transfer C1 is formed at the output of the MUX2
multiplexer, which is fed to the inputs of the multiplexers of
the next highest digit.
Figure 7 shows the functional diagram of the MUX1
multiplexer on the MOSFET transistor and the MUX1 Figure 8. MUX2 Multiplexer function diagram
operation table 3.
TABLE V. MUX2 MULTIPLEXER TRUTH TABLE
Ci-1 ai bi Ci0 Ci1 Ci
0 0 0 0 0 0
0 0 1 0 1 0
0 1 0 0 1 0
0 1 1 1 1 1
1 0 0 0 0 0
1 0 1 0 1 1
1 1 0 0 1 1
1 1 1 1 1 1
- 62 -
Adders Number of Time of Formati Delay
transistors transfer on time on
1. a0=0 b0=1 С0=1
(N) formation Ci л.э MUX According to the line 7 S00=1 S01=0 and C00=0 C01=1
л.э л.э At the same time S0=0 and C1=1
Adder on two- 2. a1=0 b1=1 С1=1
stage logic 62 4 л.э 7 л.э - According to the line 5 S10=0 S11=1 and C10=0 C01=0
(CM-1)
Adder on two At the same time S1=1 and C2=0
schemes 3. a2=1 b2=1 С2=0
50 2 л.э 6 л.э -
"Excluding According to the line 4 S20=0 S21=1 and C2р=1 C21=1
OR" (CM-2) At the same time S2=0 and C2=1
Adder on a
three-input
4. a3=1 b3=0 С2=1
circuit 56 2 л.э 3 л.э - According to the line 7 S30=1 S31=0 and C30=0 C31=1
"Excluding At the same time S3=0 and C4= S5=1
OR" (CM-3) SА+В=100102=1810
Conditional
Sum Adder For N bit adders,Тsm= Тsm=nMUX+4л.7.
30 2 л.э 6 л.э 2 л.э
(CSA)
(CM-4) By MUX=2л.7
REFERENCES
- 63 -
August 22(TUE) - 25(FRI), 2023
Oral Session 2
Room : A432
Chair: Jung-Ju Kim (Hoseo University, Korea)
- 64 -
Analysis for Fault Characteristics of MMC in
DC Distribution System
Jin-Sol Song 1, Jong-Myoung Kim 1, Seung-Whan Bae 1, Arif Mehdi 1, S Jarjees UI Hassan 1, Abraham.
D. Arefaynie 1, Zeeshan Haider 1, Chul-Hwan Kim 1*, Myung-Hwan Min 2, Tae-Pung An 2
1
Sungkyunkwan University, Republic of Korea
2
ENTEC Electric & Electronic, Republic of Korea
Email: [email protected]
Abstract—Due to the increasing integration of renewable submodule's capacitance rapidly discharges due to a fault.
energy for carbon neutrality, traditional AC distribution During this stage, the fault current quickly reaches its peak
systems have reached their limitations. Therefore, there is a value due to the discharge of the capacitance. Once the MMC
demand for a transition to DC distribution systems, considering goes into a blocking state, the discharge of the capacitance
factors such as increased interconnection capacity of renewable stops, and the fault current from the AC system flows through
energy and improved power conversion efficiency. However, the the MMC into the DC distribution network. This stage is
implementation of DC distribution systems is still an area that referred to as the AC fault current injection stage.
has not been fully realized, and several aspects need to be
researched before its deployment. One of these aspects is the Fig. 2 schematically depicts the flow of fault current in the
protection-related issues of DC distribution systems. In HB submodule during the capacitance discharge stage and the
particular, research on the fault characteristics of MMCs AC fault current injection stage. During the capacitance
(Modular Multilevel Converters), which constitute the DC discharge stage, as shown in the figure, the fault current flows
distribution network, is essential. This paper aims to analyze the through the capacitance due to the repetitive switching of
fault characteristics of DC distribution networks based on HB semiconductor switches. However, when the MMC execute
MMC (Half-Bridge Modular Multilevel Converter) and FB the blocking control, the switches are fixed in the off state, and
MMC (Full-Bridge Modular Multilevel Converter). the capacitance no longer affects the fault. As depicted in the
Fig. 2, only the AC-side fault current flows through the
Keywords— DC System, Fault Characteristic, Grounding,
MMC, MVDC, Protection System
freewheeling diodes towards the DC side fault and in this
stage MMC acts as an uncontrollable rectifier. This implies
I. INTRODUCTION that, in the case of HB MMC, fault current continues to flow
through the MMC, even when block control is executed and it
In order to achieve carbon neutrality, the integration of can not interrupt the fault current itself.
renewable energy into the power system is ongoing, and as of
December 2021, the installed capacity of renewable energy
connected to the power system reached 24.9 GW in the
Republic of the Korea. However, the existing AC power
system has reached its limit in accommodating renewable
energy, necessitating a transition to the next-generation power
system, such as a DC distribution system. The conversion to a
DC distribution system offers advantages such as increased
integration of renewable energy and improved power
conversion efficiency. However, there are several challenges
that need to be addressed as prerequisites for the adoption of
a DC distribution system. One of these challenges is related to
the protection of DC distribution system. In particular,
research on the fault characteristics of MMCs (Modular
Multilevel Converters), which constitute the DC distribution
network, is essential. This paper aims to present the analysis
results of the fault characteristics of a MMC-based DC
distribution system regarding to MMC submodule type,
ground resistor magnitude fault type and fault location. Fig. 1. The Sturucture of MMC and Submodule
- 65 -
illustrates a 4MVA MMC-based 20kV DC distribution system,
where a DC side fault is simulated at 4 seconds. And there are
three grounding location ① AC grounding of the transformer
star point, ② AC grounding with a star point reactor, ③ DC
grounding. To analyze the grounding method, several
grounding cases are simulated. Table I represents the
simulation cases. The fault current and voltage are simulated
for different submodule type, fault type, fault location and
grounding method to analyze how each factor effect the fault
current and voltage in DC and AC system. The simulation
Fig. 2. Fault Current Flow in the HB Submodule
cases are modeled and executed by the MATALB Simulink.
B. Full-Bridge MMC
FB MMC and HB MMC exhibit similar behavior when a
fault occurs, as the sub-module capacitances discharge,
resulting in a rapid increase in fault current magnitude.
However, the difference between FB MMC and HB MMC lies
in their response after block control in the MMC. In the case
of FB MMC, due to the structural characteristics of the sub-
modules, when block control is executed, the fault current
magnitude rapidly converges to zero. Fig. 3 depicts the flow
of fault current within the FB submodule during block control.
Fig. 4. MMC based DC Distribution System [3]
As shown in the figure, even during block control, fault
current flows through the capacitance via the freewheeling TABLE I. SIMULATION CASES FOR FAULT CHARACTERISTIC OF MMC
diodes, regardless of the direction of the fault current.
However, because the fault current passes through the Simulation Cases
opposite polarity of the capacitance voltage, it rapidly
converges to zero, ultimately resulting in the current being Submodule
HB Submodule, FB Submodule
blocked. In other words, when the MMC is in a block state, no Type
fault current flows from the AC system, and FB MMC is
capable of self-blocking faults [2]. Fault Type Pole-to-Pole Fault, Pole-to-Ground Fault
Fault
Location
1[km], 5[km], 10[km], 20[km]
A. Simulation Condition
This paper aims to analyze the fault characteristics of HB
MMC and FB MMC-based DC distribution system. Fig. 4
- 66 -
Fig. 8. HB MMC Pole-to-Ground Fault (AC Grounding with a Star Point
Fig. 5. Submodule Voltage during the Fault Reactor by 1[Ω] & 30[H])
- 67 -
The Fig. 14 and 15 illustrate the fault voltage and fault
current at the DC of the FB MMC-based DC distribution
system under AC grounding with a star point reactor (30 [H])
by different grounding resistance conditions (1 [Ω] and 100
[Ω]). When grounding is achieved through a star point reactor,
the fault current magnitude rises very slowly due to the
presence of a large reactor. This slow rise in fault current is
independent of the size of the grounding resistance. As a result,
it can be observed that the fault current does not rise
sufficiently before being interrupted by the FB MMC (Fault
Current Blocking MMC).
Fig. 16 illustrates the fault voltage and fault current at the
DC of the FB MMC-based DC distribution system under DC
Fig. 11. FB MMC Pole-to-Pole Fault
grounding by 10,000 [Ω]. Due to huge impedance of the
grounding, the fault current after short transient is very small
The Fig. 12 and 13 depict the fault voltages and fault like HB MMC.
currents for Pole-to-Ground fault in both DC and AC
measurements under the conditions of grounding resistors of
1 ohm and 100 ohms, respectively. The magnitude of the
grounding resistor had an influence on the observed fault
current in both DC and AC measurements. A smaller
grounding resistor resulted in a significantly larger fault
current. Furthermore, after implementing block control,
similar to Pole- to-Pole faults, the injected current in the AC
measurements was interrupted, causing the fault current to
cease flowing in both DC and AC measurements, and the fault
voltage returned to its pre-fault value.
Fig. 14. FB MMC Pole-to-Ground Fault (AC Grounding with a Star Point
Reactor by 1[Ω] & 30[H])
Fig. 15. FB MMC Pole-to-Ground Fault (AC Grounding with a Star Point
Reactor by 100[Ω] & 30[H])
- 68 -
ground with an appropriate impedance to strike a balance
between these factors.
ACKNOWLEDGMENT
This work was supported by the Korea Institute of Energy
Technology Evaluation and Planning(KETEP) and the
Ministry of Trade, Industry & Energy(MOTIE) of the
Republic of Korea (No. 20225500000110).
This work has been supported by the National Research
Foundation of Korea (NRF) grant funded by the Korean
government (MSIP) (No. 2021R1A2B5B03086257)
REFERENCES
[1] Geon-Woong Kim and Hyo-Sang Choi, “Limiting Characteristics of
Capacitor Discharge Current of MMC-Based System Using the SFCL
Fig. 16. FB MMC Pole-to-Ground Fault (DC Grounding by 10,000[Ω]) on Short Circuit”, IEEE Transactions on Applied Superconductivity,
vol. 32, no. 4, pp. 5600505, 2022.
D. Simulation Results for Different Fault Location [2] Bin Li, Jiawei He, Ye Li and Botong Li, “A review of the protection
for the multi-terminal VSC-HVDC grid”, Protection and Control of
The Fig. 17 depicts the fault currents for Pole-to-Pole fault Modern Power Systems, vol. 4, 2019, no. 21, pp. 1-11, 2019.
in HB MMC based DC system for different fault location (1, [3] CIGRE WG C6/B4.37, “Medium Voltage DC Distribution Systems”,
5, 10, 20[km]). As the fault distance increases, the line 2022
impedance up to the fault location also increases, resulting in
a decrease in the peak value of the fault current due to the
influence of MMC submodule capacitance discharge.
However, in the fault current injection stage from the AC
system after capacitance discharge, the influence of the fault
location is negligible.
IV. CONCLUSION
In this paper, the fault characteristics of HB MMC and FB
MMC were investigated as preliminary tasks for the
introduction of DC distribution networks. Both MMC types
exhibit the characteristic of rapid increase in fault current as
the capacitance discharges during a fault occurrence. However,
HB MMC allows fault current to flow through the MMC even
after the blocking control, while FB MMC has the capability
to block the fault current. These features were confirmed
through simulations. Furthermore, the characteristics of fault
currents were studied in relation to grounding methods, and it
was observed that increasing the fault resistance leads to a
decrease in the maximum value of the fault current.
Additionally, when grounded through a large reactor on the
AC side, it was confirmed that the rate at which the fault
current rises can significantly slow down. The small
magnitude of fault current and its slow rise can help to prevent
damage of the power system equipment and enhance system
continuity. However, detecting and protecting against faults
becomes very challenging, and there is a risk of inducing
overvoltage on the AC side. Therefore, it is necessary to
- 69 -
Assessment of Locational and Total Hosting
Capacity of Distribution Network with Multitype
DGUs by Iterative OPF Method
S Jarjees Ul Hassan 1, Arif Mehdi 1, Jin-Sol Song 1, Abraham D. Arefaynie 1, Zeeshan Haider 1, and
Chul-Hwan Kim 1*
1
Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon, Republic of Korea
Email: [email protected]
Abstract—The increasing demand for power generation has The hosting capacity is a location-dependent and varies
spurred rapid development in renewable energy sources to meet from one bus to another within the system. Locational Hosting
the growing energy requirements. While distributed generation Capacity (LHC) refers to the hosting capacity at a specific bus,
units (DGUs) offer several advantages, their excessive while total hosting capacity represents the maximum hosting
integration into electrical networks can lead to various capacity of the entire distribution system. Research on hosting
challenges. To maximize the benefits while minimizing capacity can be broadly categorized into assessment and
problems, it is crucial to assess the total hosting capacity of enhancement. Assessment methods involve various analytical
distribution systems for interconnecting DGUs. This research [6], stochastic [7], [8] and heuristic techniques [9], such as
aims to evaluate both the locational and total hosting capacity of
Monte Carlo simulations, Bayesian optimization, particle
a distribution system that incorporates multi-types single and
multiple DGUs while satisfying all relevant constraints. The
swarm algorithm, genetic algorithms, bat algorithms, and
assessment is performed using an iterative optimal power flow robust optimization [10]–[12]. The enhancement techniques
(OPF) method, which is described in detail in this study. The for hosting capacity focuses on network reconfiguration and
IEEE-33 bus radial distribution system is employed as a case reinforcement, reactive power control, voltage control using
study, and the OPF method is implemented using MATLAB on-load tap changer transformers, active power curtailment,
programming. The hosting capacities obtained with different energy storage technologies, and smart inverters [13].
types of DGUs are compared, and the most favorable case is
This paper presents an assessment of the locational and
presented.
total hosting capacity of a distribution system with multiple
Keywords—Locational hosting capacity, total hosting types of DGUs using an Iterative OPF method. The DGUs are
capacity, DGU types, Iterative optimal power flow method, categorized into three types based on their active and reactive
renewable energy resources power generation capabilities. A detailed explanation of the
OPF iterative method for the hosting capacity objective
I. INTRODUCTION function is provided. The proposed method is validated using
The deployment of distributed generation units (DGUs) in the IEEE-33 bus distribution system, and the results
distribution systems has revolutionized the field of power demonstrate the hosting capacities of the system for different
systems. In addition to economic and environmental types of single and multiple DGUs, enabling a comparison to
advancements, DGUs offer various technical benefits, identify the best-case scenario.
including improved voltage profiles, minimized power losses The remainder of this article is organized into the
[1], enhanced system stability, and reliability. However, the following sections. Section II provides an introduction to the
excessive installation of DGUs in distribution systems can base test system and the types of DGUs used in this study. The
have detrimental effects, such as overvoltage, undervoltage, assessment of hosting capacity is then presented in Section III,
equipment thermal overloading, and protection system where the methodology and implementation of the OPF
malfunctions [2], [3]. Hence, it is essential to calculate the iterative method for calculating hosting capacity are described
hosting capacity of the system, which determines the in detail. In Section IV, the simulation results are presented
maximum number of DGUs that can be interconnected and discussed, highlighting the hosting capacities of the
without violating operational constraints. system for different types of single and multiple DGUs. The
An extensive research review over the past decade shows implications and significance of these findings are thoroughly
the importance of hosting capacity in the field of electrical examined. Finally, Section V concludes the paper by
power system. The concept of hosting capacity is complex and summarizing the key findings and suggesting potential
needs special attention to be addressed. The literature review directions for future research in the field of hosting capacity
defines the hosting capacity as, “The maximum DGUs assessment.
penetration in distribution system up to acceptable range,
subjected to operational limits” [4]. The operational limits also
known as limiting factor of hosting capacity are voltage level,
ampacity, and power balance [5]. The concept of hosting
capacity is illustrated in Fig. 1.
- 70 -
Distributed generation units are designed as negative load,
having ability of providing only or both active and reactive
powers into the distribution network from PQ buses. The
hosting capacity of distribution system is calculated with all
these types of categorized DGUs.
III. ASSESSMENT OF HOSTING CAPACITY
The hosting capacity study conducted in this work was carried
out by OPF iterative method. The objective function with
constraints and OPF iterative method detailed description are
presented in this section.
Fig. 1. General concept of hosting capacity The objective function considered for this work is to
calculate the maximum hosting capacity of distribution
II. SYSTEM DESCRIPTION system form bus ‘1’ to ‘n’th bus. Where “i” is the number of
buses starting from 1 to last bus “n” of distribution system.
A. Base Test System
This objective function can be presented mathematically as
The base test system selected for this study is the IEEE-33 (1):
bus radial distribution system, as depicted by a single line
𝑛
diagram in Fig. 2. This test system is widely used in research
and provides a realistic representation of distribution 𝑂𝑏𝑗𝑒𝑐𝑡𝑖𝑣𝑒 𝐹𝑢𝑛𝑐𝑡𝑖𝑜𝑛 = 𝑀𝑎𝑥𝑖𝑚𝑢𝑚 ∑ 𝐻𝐶 (1)
networks. The substation, represented by bus 1, supplies a 𝑖=1
voltage of 12.66 kV to the distribution system. The load buses
within the distribution system contribute a total active power The objective function of hosting capacity is subjected to the
of 3715 kW and a total reactive power of 2300 kVAR [14]. following constraints as (2) and (3).
These values reflect the combined power demands of the
connected loads, representing a typical distribution scenario. 𝑉𝑚𝑖𝑛 ≤ |𝑉𝑖 | ≤ 𝑉𝑀𝑎𝑥 (2)
The IEEE 33-bus radial distribution system serves as a 𝐼𝑚𝑖𝑛 ≤ |𝐼𝑖 | ≤ 𝐼𝑀𝑎𝑥 (3)
suitable testbed for evaluating the hosting capacity of the
distribution system with multiple types of DGUs. By utilizing The OPF iterative method is used for assessment of
this base test system, the impacts of DGU integration and their hosting capacity with objective function as in (1) subjected to
influence on system performance can be effectively studied the operational constraints of voltage and current mentioned
and analyzed. in (2) and (3). It is an iterations-based method that follows a
systematic procedure by increasing the DGUs capacity
penetration at each bus iteratively. The steps of this
methodology for assessment of hosting capacity of
distribution system with single and multiple DGUs
penetration is as follow.
A. Assessment of Hosting Capacity with Single DGU:
Step 1) Start the program with reading line and load date
of distribution system.
Step 2) Start the iteration from selecting the starting bus
from i=1, 2,…,n.
Fig. 2. Single line diagram of IEEE 33-bus network Step 3) Add a single DGU of 1KW capacity as a
negative load on bus (i).
B. Distributed Generation Units
Step 4) Perform load flow calculations to check the
The hosting capacity has also dependency on optimal limits of operational constraints.
placement and sizing of DGUs. The DGUs are categorized
into three types based on their active and reactive power Step 5) If limits of constraints are not violated, go to step
generation capability. 3 with step increase in capacity of DGU. If the
limits are violated go to step 6.
• Type-1: DGUs that injects only real power 'P' into the
distribution system. These units primarily contribute to Step 6) Print the DGU capacity of previous iteration as
meeting the active power demand of the system. a hosting capacity of bus (i).
• Type-2: DGUs that injects only reactive power 'Q' into Step 7) Apply the same procedure for all buses by going
the system. These units are primarily responsible for back to step 2 with updating the iteration and
addressing reactive power requirements, such as end the program if all buses are investigated.
voltage regulation and power factor correction.
• Type-3: DGUs that injects both active and reactive
power into the network. These units provide a
combination of real and reactive power, contributing
to both active power demand and reactive power
requirements of the system.
- 71 -
B. Assessment of Hosting Capacity with Multiple DGUs: DGUs with respect to number of DGUs are calculated using
(4) as:
Step 1) Start the program with reading line and load date 𝑁𝐵
of distribution system. 𝑁𝐶 = (4)
𝑁𝐷𝐺 ! × (𝑁𝐵 − 𝑁𝐷𝐺 )
Step 2) Choose number of DGUs for injection into
distribution system.
IV. RESULTS AND DISCUSSIONS
Step 3) For multiple DGUs, we get multiple buses as This section presents the results of the assessment
option to locate. Therefore, it is necessary to conducted to evaluate the locational and total hosting capacity
make a combination of NB buses with number of of the 33-bus distribution system, considering the presence of
DGUs (NDGU) using (4) and select first iteration all three types of single and multiple DGUs. The obtained
i=1,2, 3,..,n. results provide insights into the system's capability to
Step 4) In the same way, it is also necessary to construct accommodate distributed generation and shed light on the
a matrix of combinations of all possible impacts of different DGU configurations on the hosting
capacities of DGUs by (4) and start with capacity.
k=1,2,3…., n. The assessment of locational hosting capacity considers
Step 5) Follow the step 4 and step 5 as mentioned for the maximum DGU’s capacity integration at each bus within
Single DGU. the distribution system, providing valuable information on the
maximum number of DGUs that can be interconnected
Step 6) Find the maximum in all DGUs capacities which without violating operational constraints. Furthermore, the
did not violate any constraints and print it as total hosting capacity considers the optimal number of buses
“Hosting Capacity”. with maximum capability of DGUs’ capacity integration,
The steps of OPF iterative method for assessment of hosting which represents the overall ability to integrate maximum
capacity are also presented in Fig. 3 (a) and (b) and the DGUs capacity across the entire distribution network.
combination for bus numbers and all possible capacities of
- 72 -
A. Type-1 DGUs investigation on IEEE 33-bus distribution system with
The OPF iterative method is applied on type-1 DGUs to single DGU integration the bus 2 is proven to be the optimal
get the locational hosting capacity of each bus, and total location with maximum locational hosting capacity of
hosting capacity of distribution system with single and two 9559K with type-3 DGU as compared to type-1 and type-2
DGUs as shown in Fig. 4. DGU which is 8340K and 5660K respectively.
- 73 -
V. CONCLUSIONS capacity in distribution grids: A review of definitions,
This paper provided a comprehensive analysis of the performance indices, determination methodologies, and
locational and total hosting capacity of a distribution system enhancement techniques,” Energy Sci. Eng., vol. 11, no. 4, pp.
with single and two multi-type DGUs. The investigation 1536–1559, 2023, doi: 10.1002/ese3.1389.
utilized the OPF iterative method to optimize the objective [4] M. Bollen and F. Hassan, Integration of Distributed Generation
function while considering the constraints of the standard in the Power System, no. February. IEEE Press, 2014.
IEEE-33 bus distribution system. The simulation results of
[5] S. Fatima, V. Püvi, and M. Lehtonen, “Review on the PV
the locational and total hosting capacity were presented
graphically and numerically, contributing valuable insights hosting capacity in distribution networks,” Energies, vol. 13, no.
to the field of power system research. 18, 2020, doi: 10.3390/en13184756.
[6] S. J. U. L. Hassan, T. Gush, and S. Member, “Maximum Hosting
1) The hosting capacity is a concept that varies from
Capacity Assessment of Distribution Systems With Multitype
one bus to another within the distribution system.
DERs Using Analytical OPF Method,” IEEE Access, vol. 10,
Therefore, the optimal placement and sizing of DGUs are
no. September, pp. 100665–100674, 2022, doi:
crucial factors to consider. By strategically locating DGUs,
10.1109/ACCESS.2022.3207488.
the hosting capacity of distribution system can be
maximized, leading to efficient integration of DGUs. [7] E. Mulenga, M. H. J. Bollen, and N. Etherden, “Solar PV
2) The results clearly demonstrate that the total hosting stochastic hosting capacity in distribution networks considering
capacity of the distribution system increases with an aleatory and epistemic uncertainties,” Int. J. Electr. Power
increase in the number of DGUs injections. This indicates Energy Syst., vol. 130, no. February, p. 106928, 2021, doi:
the system's ability to accommodate a greater amount of 10.1016/j.ijepes.2021.106928.
distributed generation, resulting in enhanced utilization of [8] Y. J. Liu, C. Y. Lee, W. M. Liu, Y. Der Lee, C. C. Cheng, and
renewable energy resources. Y. F. Chen, “Optimization-Based Stochastic Analysis Method
3) The hosting capacity of the distribution system is for the Assessment of PV Hosting Capacity,” Proc. 2022 8th
maximized when type-3 DGUs, which inject both active Int. Conf. Appl. Syst. Innov. ICASI 2022, pp. 33–36, 2022, doi:
and reactive power, are integrated. The combined 10.1109/ICASI55125.2022.9774450.
contribution of active and reactive power from these DGUs [9] C. Han, D. Lee, S. Song, and G. Jang, “Probabilistic Assessment
enables better support for system stability, voltage of PV Hosting Capacity under Coordinated Voltage Regulation
regulation, and power factor correction. in Unbalanced Active Distribution Networks,” IEEE Access,
In future research, conducting a cost analysis of each case vol. 10, pp. 35578–35588, 2022, doi:
would be beneficial. This analysis would provide insights 10.1109/ACCESS.2022.3163595.
into the economic aspects of integrating DGUs and help [10] H. Wu, Y. Yuan, X. Zhang, A. Miao, and J. Zhu, “Robust
identify the most cost-effective approaches for enhancing comprehensive PV hosting capacity assessment model for
the locational and total hosting capacity of the distribution active distribution networks with spatiotemporal correlation,”
system. Additionally, exploring advanced techniques and
Appl. Energy, vol. 323, no. July, p. 119558, 2022, doi:
technologies to further optimize the hosting capacity, such
10.1016/j.apenergy.2022.119558.
as advanced control strategies, energy storage integration,
and intelligent forecasting algorithms, could be intriguing [11] X. Geng, L. Tong, A. Bhattacharya, B. Mallick, and L. Xie,
avenues for future investigations. “Probabilistic Hosting Capacity Analysis via Bayesian
Optimization,” IEEE Power Energy Soc. Gen. Meet., vol. 2021-
ACKNOWLEDGMENT July, pp. 1–16, 2021, doi:
This work was supported by the National Research 10.1109/PESGM46819.2021.9637907.
Foundation of Korea (NRF) funded by the Korean [12] M. Vellingiri et al., “Maximum hosting capacity estimation for
Government [Ministry of Science, ICT and future Planning renewables in power grids considering energy storage and
(MSIP)] under Grant 2021R1A2B5B03086257 and Korea transmission lines expansion using hybrid sine cosine artificial
Institute of Energy Technology Evaluation and Planning rabbits algorithm,” Ain Shams Eng. J., vol. 14, no. 5, p. 102092,
(KETEP) and the Ministry of Trade, Industry & Energy
2023, doi: 10.1016/j.asej.2022.102092.
(MOTIE) of the Republic of Korea (No. 20225500000110).
[13] V. C. Moro and F. C. L. Trindade, “A Review on Techniques to
REFERENCES Increase Hosting Capacity of Distribution Systems to DERs,”
[1] S. J. Ul Hassan, W. Haider, A. Mehdi, T. Gush, J. S. Song, and 2021 Work. Commun. Networks Power Syst. WCNPS 2021, no.
C. H. Kim, “Optimal Placement and Sizing of Multi-Type Wcnps, pp. 1–6, 2021, doi:
Distributed Generation Considering Voltage Profile 10.1109/WCNPS53648.2021.9626269.
Improvement and Power Loss Minimization,” Trans. Korean [14] W. Haider, S. J. Ul Hassan, A. Mehdi, A. Hussain, G. O. M.
Inst. Electr. Eng., vol. 70, no. 4, pp. 561–567, 2021, doi: Adjayeng, and C. H. Kim, “Voltage profile enhancement and
10.5370/KIEE.2021.70.4.561. loss minimization using optimal placement and sizing of
[2] S. M. Ismael, S. H. E. Abdel Aleem, A. Y. Abdelaziz, and A. F. distributed generation in reconfigured network,” Machines, vol.
Zobaa, “State-of-the-art of hosting capacity in modern power 9, no. 1, pp. 1–16, 2021, doi: 10.3390/machines9010020.
systems with distributed generation,” Renew. Energy, vol. 130,
pp. 1002–1020, 2019, doi: 10.1016/j.renene.2018.07.008.
[3] N. Qamar, A. Arshad, K. Mahmoud, and M. Lehtonen, “Hosting
- 74 -
Optimal Parameter Design of Thyristor-based
Multi-module SSCB in MVDC Network
Jong-Myoung Kim 1, Jin-Sol Song 1, Seung-Whan Bae 1, and Chul-Hwan Kim 1*
1
Sungkyunkwan University, Republic of Korea
Email: [email protected]
Abstract— With the increasing penetration of Photovoltaic system components. Consequently, DCCB require a short
(PV) and other Renewable Energy Sources (RES), the DC interruption time of within 2ms, unlike AC circuit breakers [4].
source in the power system is rapidly increasing. As a result,
there is active discussion regarding the introduction of Medium Therefore, it is crucial to ensure both fast interruption and
Voltage DC (MVDC) distribution networks in Korea. Because consistent interruption time in DCCB to establishing a
DC fault have different characteristics compared to AC fault, protection coordination system for MVDC distribution
research on DC circuit breakers is essential for establishing networks. If there is significant variation in the interruption
protection system in MVDC distribution networks. In this paper, time depending on the type and other condition of the fault, it
research on the optimal parameter design of a SCR-based solid- becomes challenging to set a time delay between the main
state circuit breaker is conducted. Proposed SSCB combines the protection and backup protection. This can potentially lead to
advantages of SSCB with fast interruption time and outage in areas of the network where faults have not occurred.
interrupting method of HCB that generate artificial zero- However, existing research on DCCB has primarily focused
current crossing point. The proposed SSCB is capable of on fast interruption and interruption reliability, while studies
performing the interruption within 50us upon receiving a trip on consistent interruption time are lacking.
signal from the relay. It is expected to contribute to the design
of a reliable protection coordination system. The validation of The Solid-State Circuit Breaker (SSCB) proposed in this
the operation of the SSCB was performed by paper performs interruption by injecting LC resonant current
MATLAB/Simulink. into the main branch to create an artificial zero-crossing point.
The main branch employs a thyristor arrangement, enabling
Keywords—Current Injection, MVDC, PSO, SSCB, Zero- its operation under high voltage and high current conditions.
current Switching Upon the occurrence of the zero-crossing, the Thyristor, as a
semi-controlled device, undergoes a state transition, leading to
I. INTRODUCTION
the disconnection of the fault from the DC network. The
As carbon emissions increase, the climate crisis is auxiliary branch for current injection is configured in a multi-
becoming increasingly severe problem, and countries around module structure to control the injected current for various
the world are showing a movement to replace conventional conditions of DC faults and perform the interruption within
power sources such as coal-fired power generation with the predetermined time. In this paper, considering the faults
Renewable Energy Sources (RES) in response to the climate occurring within the MVDC distribution network, the
crisis. According to the 10th Basic Plan for Power Supply and common capacitance and the inductance of each module of the
Demand announced in January 2023, the share of renewable auxiliary branch are optimized using the Particle Swarm
energy generation is expected to account for 21.6% of the total Optimization (PSO) algorithm. The proposed SSCB is
generation capacity by 2030 [1]. Photovoltaic (PV) is one of validated by MATLAB/Simulink for faults occurring in the
the prominent DC source that accounts for over half of the MVDC distribution network.
share of renewable energy sources. As the integration of
renewable energy sources within the power grid increases,
there is a growing need for Medium Voltage DC (MVDC) II. DC CIRCUIT BREAKERS
distribution networks. Since faults in DC systems have
different characteristics from AC faults, research on A. Type of DCCB
protection systems for DC systems is essential and must be DCCBs can be broadly classified into two main types:
conducted as a prerequisite. Solid-State Circuit Breakers (SSCBs) and Hybrid Circuit
Because of its constant output nature, DC faults are Breakers (HCBs) [2]. SSCBs achieve interruption through the
characterized by the absence of zero current crossing points, switching operation of semiconductor devices, resulting in
unlike AC faults. In conventional AC systems, circuit breakers remarkably short interruption time, typically within tens of
are designed to interrupt the current at zero-crossing points to [3]. This inherent capability of SSCBs helps maintain high
minimize arc formation. However, in the case of DC faults, power quality during fault by minimizing voltage drops. The
separating contacts without zero current crossing points can term "solid-state" comes from the fact that there are no
lead to an increased risk of arc formation. Therefore, in the physical moving parts in the interruption process. This
case of DC Circuit Breakers (DCCBs), an artificial zero- characteristic not only prevents the occurrence of arcs during
crossing point needs to be created to interrupt the current. interruption but also eliminates issues like corrosion and noise
Additionally, DC systems have lower inertia within the that may occur during contact separation. As a result, SSCBs
system, causing fault currents to reach their peak values in a demonstrate an extended lifespan. However, it is important to
shorter time compared to AC systems. The maximum fault note that the semiconductor devices commonly utilized in
current in DC systems is also much higher compared to AC SSCBs, such as MOSFETs, have lower ratings and are not
systems [3]. The rapid current variation and high fault current well-suited for applications in high voltage and current.
within a short duration can lead to breakdown of insulation in Consequently, SSCBs are primarily utilized in LVDC and
- 75 -
lower MVDC systems. Furthermore, the on-state resistance in
semiconductor devices results in significant conduction losses,
leading to overheating. This can potentially cause
performance degradation and reduce the overall lifespan of
SSCBs. Therefore, while SSCBs offer advantages in terms of
fast interruption and enhanced power quality, careful
consideration must be given to their specific application
requirements and limitations.
On the contrary, Hybrid Circuit Breakers (HCBs)
represent a combination of semiconductor devices and
conventional Mechanical Circuit Breakers (MCBs) utilized in
AC systems. Under normal operating conditions, current is
flowed through the MCB to minimize conduction losses.
However, when fault occurs, the semiconductor branch
generates an artificial zero-crossing point, MCB separating
their contacts to interrupt the fault. HCBs effectively address
the limitations of SSCBs, such as high conduction losses and
lower ratings, by integrating them with MCBs. Nevertheless, Fig. 1. DCCB structure (a) conventional SSCB, (b) current commutation
the interruption time in HCBs is influenced by the operation HCB, (c) current injection HCB, (d) Proposed thyristor-based SSCB
of the MCBs, leading to long interruption time. Moreover, the
long interruption time in HCBs may result in lower power
quality during the fault blocking process. Additionally, the
physical separation of contacts in the MCBs can give rise to C. Structure of proposed SSCB
arc generation, affecting power quality and electrical safety. The proposed SSCB in this study utilizes thyristor to the
Furthermore, concerns related to contact corrosion and noise main branch. Thyristors are suitable for high voltage and high
associated with mechanical circuit breakers still need to be current applications, with a high rated voltage range of 6.5kV
taken into account. to 8.5kV and a high rated current of 1kA. Additionally,
thyristors exhibit low conduction losses and offer cost-
effectiveness compared to other semiconductor devices. In
B. Interruption method of HCB this paper, the current injection method, one of the
Hybrid circuit breakers utilize two primary interruption interruption method of HCBs, is utilized to generate the zero-
methods: current commutation and current injection [4]. The crossing point in thyristor and deactivate it.
operational principle of a Current Commutation (CC) method The auxiliary branch, responsible for current injection, is
is commutating fault current to flow auxiliary branch, creating constructed as a multi-module structure. The selection of the
an artificial zero-crossing point in main branch. When a fault appropriate current injection module is based on the fault
occurs, the MCB and the series-connected Load Commutation current's magnitude. Accurate consideration of the fault
Switches (LCS) are turned off, while the parallel-connected current's magnitude is critical for effective current injection.
semiconductor branch is turned on. The fault current is then Injecting a current lower than the fault current may result in
flowed through the semiconductor branch, generating an
failure to deactivate the SCR, whereas injecting a
artificial zero-crossing point in the MCB. As a result, the
significantly higher current than the fault current may induce
MCB separates its contacts, achieving a physical interruption
of the fault. Following the successful separation of contacts, reverse voltage and current in the SCR, potentially causing
the semiconductor branch is turned off to isolate the fault from insulation breakdown. Therefore, prediction of the fault
the system. Remaining energy in the system is discharged current's magnitude is essential to ensure the circuit breaker's
through surge arresters. operational reliability and performance.
Upon turning off the thyristor, the semiconductor devices
The operational principle of a Current Injection (CI) within the current injection module are deactivated to cease
method is injecting current in auxiliary branch to create an current injection. After that, a Surge Arrester (SA) is
artificial zero-crossing point in main branch [5]. When fault employed to discharge the remaining energy within the
occurs, semiconductor devices in the auxiliary branch become system. The current resulting from this energy discharge
on-state, allowing the series connected precharged capacitor
gradually decreases, ensuring that the rate of change of the
and inductor to induce an LC resonant current. Consequently,
the current flowing through the main branch, which comprises current, which is utilized for fault detection by the differential
the MCB, gradually diminishes, leading to the formation of a relay, does not trigger false operations.
zero-crossing point. As the current approaches zero, the MCB
separates its contacts. The LC resonant current continues to The proposed SSCB offers the following advantages:
decrease over time until it is eventually interrupted by the · Suitable for high voltage and high current: It addresses
thyristor. As with the CC method, any remaining energy in the the limitations of typical SSCB by utilizing thyristor as
system is discharged through surge arresters, thereby main branch, And it doesn’t have disadvantages of
completing the interruption process. MCB, such as arc generation and noise
· Fast interruption time: Among the MCBs, the Ultra
Fast Disconnector (UFD) stands out with the shortest
blocking time of 1.7 ms. And the High-Speed Circuit
Breaker (HSCB) have longer interruption time than
- 76 -
UFD, To establish protection coordination system in represents the common capacitance, and is the initial
DC, DC faults should be blocked in a 2ms. Therefore, voltage across the common capacitance. is the equivalent
using HCBs to establish protection coordination inductance of the injection module, and is the on-state
system becomes challenging. However, the proposed resistance of the MOSFET. is the angular velocity of the
SSCB, with its very fast interruption time of 50 , is LC resonance current. The waveform of the LC resonant
well-suited for building a protection coordination current is depicted as shown in Fig. 2. The waveform used for
system in MVDC network. current injection is the waveform up to reaching the maximum
value. The time it takes for the injected current to reach its
· Interruption time control: The proposed SSCB maximum value can be determined by using the derivative of
provides the capability to control the interruption time the injection current.
by selecting the injected LC resonant current. This
attribute facilitates the consideration of interruption
time when devising the CTI curve for relays employed
in forthcoming MVDC distribution networks, thereby
enabling the design of time delays.
- 77 -
ensures the maximum injected current sufficiently higher than () ()
() = (13)
the maximum fault current, allowing for the formation of an
artificial zero-crossing point while maintaining the desired
interruption time. should be set to a value greater than 1. In 0 ≤ () ≤
this paper, is 1.03. () = − () () < (14)
() − < ()
= − + × − (8)
The objective function , considering the constraints
The second PSO algorithm is utilized to optimize the mentioned, can be represented as follows.
inductance of each module in the current injection branch. To
select appropriate injection current, it is necessary to = − + ∑ () + ∑ () (15)
determine the inductance of each module. The current
injection branch consists of a total of 5 modules. Table I represents the coefficients utilized in the objective
indicates number of modules. The first condition states that function of PSO algorithm. The magnitude of the injected
the overall equivalent inductance should be equal to the current, obtained through the optimized parameters, is
optimized equivalent inductance obtained from the first presented in Table II. It can be observed that the injected
PSO algorithm. current values are generally evenly distributed. Table III
shows the optimized values of the SSCB parameters.
= ∑
= (9) TABLE I. PSO ALGORITHM COEFFICIENT
2
The second condition involves arranging the injected 1 10
currents for each case in ascending order. The injected 1.03 1
currents from the auxiliary branch are classified into 2 − 0.5 1
1 cases based on the on/off states of each module. Each
module can be represented by a binary state, where '1' TABLE II. INJECTION CURRENT BASED ON MODULE STATE
indicates that the module is turned on, and '0' indicates that the Module state Injection
module is turned off. The state of the injected modules for
current (A)
each case can be denoted by a 5-digit binary number,
representing the combination of on/off states. As the current 0 0 0 0 1 240.97
injection modules are connected in parallel, the equivalent 0 0 0 1 0 418.73
inductance of the activated modules is smaller than the 0 0 0 1 1 648.43
individual module inductances. By arranging the injected 0 0 1 0 0 797.41
currents in ascending order for each case, it simplifies the 0 0 1 0 1 1016.67
determination of the injected currents based on the magnitude 0 0 1 1 0 1178.22
of the fault current.
0 0 1 1 1 1386.70
|()()| 0 1 0 0 0 1631.75
()()
() = (10) 0 1 0 0 1 1826.98
0 1 0 1 0 1970.57
Finally, it is important to maintain a certain range between 0 1 0 1 1 2155.55
the injected currents for each case. If the interval between 0 1 1 0 0 2275.17
injected currents is too small, it indicates a concentration of 0 1 1 0 1 2450.66
currents within a narrow range. Conversely, if the interval is 0 1 1 1 0 2579.52
too large, it can result in excessive current injection, leading 0 1 1 1 1 2745.23
to the generation of excessive reverse voltage across the SCR.
1 0 0 0 0 2935.18
Assuming a uniform distribution of injected currents, the
interval between the injected currents can be calculated as 1 0 0 0 1 3089.00
follows. 1 0 0 1 0 3201.68
1 0 0 1 1 3346.22
= (11) 1 0 1 0 0 3439.29
1 0 1 0 1 3575.23
The interval between the injected currents should satisfy 1 0 1 1 0 3674.57
the following conditions. , represents the lower and 1 0 1 1 1 3801.66
upper bound of the injected currents interval. In this paper, 1 1 0 0 0 3949.34
is 0.5 and is 2.0. 1 1 0 0 1 4065.56
1 1 0 1 0 4150.17
≤ ( + 1) − () ≤ (12) 1 1 0 1 1 4258.01
1 1 1 0 0 4327.00
To normalize the interval between the injected currents, it 1 1 1 0 1 4426.89
can be represented as follows below. And based on the 1 1 1 1 0 4499.67
normalized function (), a penalty function () can 1 1 1 1 1 4591.78
be defined as follows.
- 78 -
TABLE III. OPTIMIZED PATAMETER IN CURRENT INJECTION MODULE is uniformly distributed, the magnitude of the injected current
that can be provided is limited within this range. Consequently,
[] 2047.35 [] 138.78
a relatively significant difference occurs between the fault
[] 1166.28 C 2 current and the injected current, leading to interruption time
[] 598.78 10 less than 40 .
[] 277.08 1 Interruption Time According to Fault Type
60
50
IV. SIMULATION AND RESULT ANALYSIS
A. Simulation design 40
- 79 -
The correlation between fault location and interruption V. CONCLUSION
time is weak. Interruption time is evenly distributed for each This paper investigates a SSCB using thyristors for current
fault location, indicating that the fault location does not injection. Compared to AC faults, DC faults have larger fault
influence the SSCB performance. currents and require faster interruption time, making SSCBs a
promising alternative to traditional mechanical circuit
breakers. Thyristor-based SSCBs can be applied even in high-
voltage and high-current network, making them suitable for
MVDC distribution networks. The thyristor-based SSCB
operates by forming an artificial zero current in the thyristor
through current injection using an LC resonant circuit, which
separates the fault from the system. To determine the
appropriate injection current based on the fault current, a
multi-module structure is employed. The parameters of each
module are optimized through two stage of the PSO algorithm.
To help designing protection coordination scheme for the DC
system, proposed SSCB is designed to and perform
interruption within 50 after receiving the trip signal,
considering the sampling period of the relay and the switching
period of power electronics. The thyristor-based SSCB
successfully achieves interruption within 50 under various
Fig. 8. SSCB interruption time by trup signal reception time
fault conditions, including fault type, fault resistance, fault
In Fig. 8, it was observed that a shorter trip signal reception location, and trip signal reception time. Given that the
time after fault occurrence results in a shorter interruption time, proposed circuit breaker considers the characteristics of faults
less than 50 . As depicted in Fig. 2, during the transient state in DC systems, it is expected to be effectively utilized in
of the fault, the rate of change of fault current decreases designing protection coordination schemes for MVDC
significantly, and as time progresses, this rate of change systems.
decreases at a slower pace. With a shorter trip signal reception ACKNOWLEDGMENT
time, there is a larger discrepancy between the predicted fault
current and the actual fault current, leading to a shorter This work was supported by the Korea Institute of Energy
interruption performance time, less than 50 . Technology Evaluation and Planning(KETEP) and the
Ministry of Trade, Industry & Energy(MOTIE) of the
Simulation results show that the thyristor-based SSCB Republic of Korea (No. 20225500000110).
achieves a 100% interruption reliability, as it consistently
performs the interruption within 50 after receiving the trip This work has been supported by the National Research
signal, regardless of variations in fault conditions. However, a Foundation of Korea (NRF) grant funded by the Korean
phenomenon occurs where the interruption time is shorter than government (MSIP) (No. 2021R1A2B5B03086257)
50 under certain conditions. This phenomenon can be
REFERENCES
attributed to two main reasons. Firstly, there is a discrepancy
between the actual fault current and the predicted fault current.
During the early stages of a fault, the fault current undergoes [1] Ministry of trade, industry and energy. 10th basic plan for power
supply and demand (2023)
a rapid rate of change, resulting in a substantial discrepancy
[2] Coffey, Sophie, et al. Review of MVDC applications, technologies, and
between the actual and predicted fault currents. As a result, future prospects. Energies Vol. 14, No. 24, pp 8294 (2021).
when the trip signal reception time is short, the interruption
[3] Rodrigues, Rostan, et al. A review of solid-state circuit breakers. IEEE
time can deviate significantly from 50 . Secondly, a Transactions on Power Electronics Vol. 36, No. 1, pp 364-377 (2020).
significant gap between the predicted fault current and the [4] Wu, Yifei, et al. A novel current injection DC circuit breaker
injected current can cause substantial errors in the interruption integrating current commutation and energy dissipation. IEEE Journal
time. To address this issue, it is necessary to use more modules of Emerging and Selected Topics in Power Electronics Vol. 8, No. 3,
to set the injected current intervals more densely. However, pp 2861-2869 (2019)
increasing the number of modules also raises the cost due to a [5] Kheirollahi, Reza, et al. Ultrafast solid-state circuit breaker with a
higher component count, and it can complicate parameter modular active injection circuit. IEEE Journal of Emerging and
Selected Topics in Industrial Electronics Vol. 3, No. 3, pp 733-743
optimization as well. Therefore, achieving precise interruption (2021)
times within 50 may require striking a balance between the [6] Keshavarzi, Davood, Ebrahim Farjah, and Teymoor Ghanbari. Hybrid
number of modules used, associated costs, and the complexity DC circuit breaker and fault current limiter with optional interruption
of parameter optimization. capability. IEEE Transactions on Power Electronics Vol. 33, No. 3 pp
2330-2338 (2017)
- 80 -
Investigation of Grounding Schemes in Hybrid
(AC/DC) Medium Voltage Distribution Networks
Zeeshan Haider1, Arif Mehdi1, S Jarjees Ul Hassan1, Jin-Sol Song1, Abraham D. Arefaynie1, Chul-Hwan Kim1*
Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon, Republic of Korea
Email: [email protected]
Abstract—Due to the growing demand for energy, the present systems, as well as the identification of the locations where the
distribution lines' capacity has become insufficient to meet the system is to be grounded and the equipment that is to be
energy demand. The idea is to transform the existing AC employed. In [8] compares distribution system design practices
distribution system into hybrid (AC/DC) medium distribution between the United States and Europe, highlighting the
lines to enhance power transfer capabilities and improve overall similarities and differences that exist. Solid grounding is utilized
system efficiency. Nonetheless, the design and implementation of in 50% of the UK's system, resistance grounding in 40%, and
grounding strategies for such hybrid networks present unique reactor grounding is employed in 10% of cases to control ground
challenges due to the coexistence of AC and DC systems. In this fault current. Belgium and Spain have reactors, whereas France
paper, we investigate multiple grounding strategies for hybrid utilizes resistance grounding. In contrast to the United States,
AC/DC MV distribution systems. We have analyzed the benefits Greece does not employ impedance grounding for neutrals in
and drawbacks of various grounding approaches. We have primary distribution. Secondary distribution within commercial
considered multiple factors, such as fault current, common mode and industrial settings in the United States, on the other hand,
voltages, stray current, system stability, and grounding protection. commonly employs resistance grounding.
By utilizing simulation studies, we assess the effectiveness of
different grounding methods, comprising solid grounding,
ungrounded, low-resistance grounding, and high-resistance
grounding configurations. We evaluate their ability to reduce
common mode voltages and mitigate fault currents, and leakage
currents to ensure the safety of the equipment and the person. The
hybrid AC/DC MV distribution network is designed and simulated
using MATLAB/Simulink software.
- 81 -
simulations were conducted to explore the grounding schemes the DC system. In the realm of AC systems, this topology is
in both bipolar and unipolar DC systems. The simulations were commonly referred to as capacitance ground, owing to the
carried out with the use of PSCAD software to investigate the presence of stray capacitances. However, this scheme also has
effects of grounding on the detection of line-to-ground faults, its drawbacks, namely the high common mode voltage and
fault current, leakage current, common mode current, and safety increased voltage stress on the non-faulted phase during faults,
of both personnel and equipment. Similarly, in [14] the which can compromise line insulation integrity. Furthermore,
occurrence of transient short-circuit current and overvoltage in overcurrent protection for this scheme is difficult to detect [16]
the context of monopoly ground fault and various grounding due to very low fault currents.
configurations including ungrounded, grounded through resistor
AC_Bus1 AC_Bus2
high and low, and solid grounding topologies. The finding PCC F1
suggests that ground with a small resistor of 400-800 ohm is CB1 Transformer CB2 CB3 CB4 CB5
This segment of the manuscript scrutinizes varied grounding Now for the pole-to-ground fault for the ungrounded fault at
topologies implemented in hybrid AC/DC systems via the t=0.4-0.8s on the DC side of the system and Fig.4 shows the
simulation of MATLAB/Simulink, in conjunction with their effect of pole-to-ground fault for ungrounded on the hybrid
corresponding merits and demerits. Essentially, three grounding AC/DC network.
approaches are commonly employed in the power system,
namely ungrounded, solidly grounded, or grounded through a
resistor, inductor, or capacitor. Every scheme has its unique
benefits and drawbacks.
A. Ungrounded system
The proposed scheme involves the isolation of the
distribution line from the ground, as shown in Fig. 2 where an
ungrounded system is simulated. This approach offers the (a) (b)
benefit of minimizing fault current in the event of single-
phase grounding, while also preventing the occurrence of stray
currents during normal operation that could cause corrosion in
- 82 -
(c)
Fig. 4. Simulations result for an ungrounded system under PG fault a) AC (b) (d)
voltage, b) DC voltage, c) DC fault current
Fig. 6. Simulations result in a solidly grounded system under LG fault a) AC
For the PG fault on the DC side, since there is no physical voltage, b) AC current, c) AC fault current, d) DC voltage
grounding on the system thus the fault current is very low Fig. 4
(c) shows the fault current. Moreover, due to the very low fault The voltage and current waveform of the AC system for the
current, this pole-to-ground fault does not affect the AC system. solidly grounded system can be observed in Fig. 6 (a) and (b),
Besides these, the simulation results show that when a PG fault while Fig. 6 (c) reveals a momentary flash of fault current that
occurs at the ungrounded system the voltage at the un-faulted can potentially cause harm to both equipment and protection
line increases by 2 p.u as we can see in Fig. 4 (b) and the system schemes in place within the system. Furthermore, it should be
is operating under the fault because the LL voltage is not noted that similar to the ungrounded system, this topology has a
affected. minor impact on the DC side of the system, which is evident
B. Solidly grounded system from the simulation results presented in Fig. 6 (d), where a
voltage dip is noticeable between 0.4 to 0.7 seconds.
The given arrangement involves the grounding of the
distribution system with no impedance, as represented by the For the DC component of the system, an analysis has been
single-line diagram of the solidly grounded system in Fig. 5. conducted on the pole-to-ground fault occurring between time
Despite its advantages in terms of facilitating the identification intervals of 0.4 to 0.8 seconds. The simulation outcomes have
of LG faults [17], this topology has significant drawbacks such been depicted in Fig. 7 and aim to elucidate the influence of solid
as the occurrence of arc flash and the possibility of equipment grounding on the system.
damage, leading to high fault current in both the AC and DC
systems. Moreover, the DC system is prone to corrosion due to
the high stray current under normal conditions, but it does offer
the benefit of reducing the common mode voltage and voltage
stress on un-faulted lines [18].
AC_Bus1 AC_Bus2
PCC F1
CB1 Transformer CB2 CB3 CB4
(a) (b)
Grounding
DC_Bus1 DC_Bus 2
F2
CB1 CB2 CB3
Transformer Rectifier
Grounding
(c)
Fig. 5. Solidly grounded system Fig. 7. Simulations result in a solidly grounded system under PG fault a) AC
voltage, b) DC voltage, c) DC fault current
In this analysis, we examine the solid grounding of the
hybrid AC/DC system in light of the LG fault that occurs on the The system is solidly grounded and the fault current
AC side during the time interval t = 0.4-0.7s. Through possesses a direct route to the ground, giving rise to a substantial
simulation, we observe the consequences of this fault on the current that flows through the ground, as depicted in Fig. 7(c).
system when it is subject to a solidly grounded topology. This high fault current leads to disruption in the AC system,
which can be observed in Fig. 7(a). The voltage at the unaffected
line is raised, as demonstrated in Fig. 7(b), but the magnitude in
this particular topology is less than 2 p.u.
C. Grounding through Impedance
The method involves linking the distribution system to the
earth via an impedance element, as illustrated in Fig. 8. This
arrangement is categorized into two classifications, namely
high-impedance grounding and low-impedance grounding. A
(a) (b) significant benefit of this approach is that the fault current can
be restricted to meet specific requirements by modifying the
impedance value. Consequently, this grounding scheme has
been highly endorsed by various scholars in their research
- 83 -
papers, particularly those advocating for high impedance
grounding [10],[13]. In [14] grounding of the system through
resistance of 400-800 ohm is recommended for the reliable
operation of the system.
AC_Bus1 AC_Bus2
PCC F1
CB1 Transformer CB2 CB3 CB4 CB5 (e)
AC_Load
Fig. 9. Simulations result for resistance grounded system under LG fault a)
Resistance
AC voltage, b) DC voltage, c)Fault current for grounded through 1-ohm, d)
Grounding grounded through 5-ohm, e) grounded through 10-ohm
DC_Bus1 DC_Bus 2
F2
CB1 CB2 CB3 CB4
From the simulation results, it can be seen in Fig. 9 (c), (d),
Transformer Rectifier DC_Load and (e) that for the 1-ohm resistance, the arc flashing is high, and
Resistance
when we change the grounding resistance from 1 ohm to 5, the
overcurrent flash is decreasing, and the same behavior is
Grounding recorded for the 10-ohm resistor. Moreover, the fault effect on
Fig. 8. System grounded through a resistor.
the DC system is like the ungrounded and solidly grounded
system.
In this particular topology, an impedance is incorporated Now for the pole-to-ground fault at the DC system, the
between the system neutral and ground to limit the fault current simulation results have shown the effect of this topology on the
in the event of any faults occurring in the system. The magnitude hybrid network. The value of the grounding resistor is taken as
of the fault current is directly proportional to the value of the 1 ohm, 5 ohm, and 10 ohms respectively for the grounding.
impedance employed in the system. For example, a high
impedance value will result in a low fault current, whereas a low
impedance value will result in a high fault current. In an AC
system, an instantaneous overcurrent is encountered when an
LG fault occurs, which may lead to damage to the protection
scheme and equipment. Impedance grounding is implemented to
mitigate this overcurrent arcing. The primary objective of
restricting the fault current is to ensure the safety of both the (a) (b)
equipment and personnel. Moreover, this controlled fault current
is also utilized for detecting line-to-ground faults in the system
and executing the protection scheme.
We analyzed the high-impedance and low-impedance
grounding systems and the simulation results have revealed the
effects of both approaches on the hybrid network. The
simulation results for the phase-to-ground fault on the AC side (c) (d)
of the system grounded with resistances of 1 ohm, 5 ohms, and
10 ohms are presented in Fig. 9.
(e)
Fig. 10. Simulations result for resistance grounded system under PG fault a)
(a) (b)
AC voltage, b) DC voltage, c) Grounded through 1-ohm, d) Grounded through
5-ohm, e) Grounded through 10-ohm
- 84 -
III. DISCUSSIONS characteristics of different grounding methods for the hybrid
From the outcomes of the simulation, it is evident that the AC/DC distribution system. Several advantages of high
hybrid AC/DC distribution network is susceptible to faults on resistance grounding can be seen in the table, including fair fault
either AC or DC, which have an impact on both systems. protection, good noise immunity, and good ground loop
However, through the implementation of grounding techniques, immunity. Additionally, it has moderate overcurrent and stray
this effect can be mitigated. Table I provides an overview of the current. Therefore, high-resistance grounding is recommended
features of various grounding schemes for the DC system. for hybrid networks.
TABLE III HYBRID AC/DC CHARACTERISTIC TABLE
TABLE I. DC GROUNDING SYSTEM CHARACTERISTICS
Grounding Solid High-Resistance Ungrounded
Grounding Un- Solidly High Low
Methods grounding Grounding
Strategies grounded Grounded Impedance Impedance
Fault Protection Good Fair Poor
Grounding Grounding
Stray Low High Moderate Moderate Noise Poor Good Excellent
Current Immunity
LG Fault Low High Moderate Moderate Over Current High Moderate Low
Current
Transient High Low Moderate Moderate Stray Current High Moderate Low
Over
Voltage
Ground Loop Poor Good Excellent
Common High Low Moderate/ Low
Immunity
Mode High
Voltage
Insulation High Low High Low
Level IV. CONCLUSION
Service Yes No Yes No
Continuity
Ensuring the protection of hybrid AC/DC networks is a
challenging task that requires the implementation of effective
grounding schemes. The present paper focuses on addressing the
From the simulation results, it has been observed that the
existing grounding challenges by examining various grounding
fault on the DC side is minimal in the ungrounded system while
schemes. The analysis identifies three types of grounding
it is significantly high in the solidly grounded configuration.
schemes, namely ungrounded, solidly grounded, and grounded
Additionally, in a system grounded through resistance, an
through impedance. Recommendations are made based on
increase in resistance leads to a decrease in fault current
parameters such as moderate levels of stray current, common
magnitude, as well as a reduction in the settling time of the fault
mode voltage, fault current, and transient overvoltage. It is
current. On the AC side, the instantaneous flash overvoltage
suggested that the grounding through a high-impedance scheme
during a fault occurrence is comparatively low in the
would be the most suitable for the network. By adjusting the
ungrounded system and high in the solidly grounded setting.
impedance employed in the grounding system, the magnitude of
However, this instantaneous flashover can be mitigated by
the fault current can be effectively curtailed to ensure that it
grounding the system through a resistor.
remains within the designated safety thresholds, thereby
safeguarding both equipment and individuals. Thus, this paper
TABLE II. AC GROUNDING CHARACTERISTICS
provides an overview of the different schemes that can be
Characteristic Resistance Ungrounded Solidly
employed to overcome grounding challenges in future hybrid
Grounding Systems Grounding AC/DC networks.
Fault Current Limited fault Uncontrolled High fault
current fault current current
Future studies may further explore robust grounding
Ground Fault Enables Difficult to Enables ground schemes to strengthen the protection of the hybrid AC/DC
Detection ground fault detect ground fault detection networks.
detection faults
Equipment Minimizes Risk of Risk of V. ACKNOWLEDGMENT
Damage equipment equipment equipment
damage damage damage This work was supported by the National Research
Shock Hazard Reduced risk Risk of Risk of Foundation of Korea (NRF) funded by the Korean Government
of electrical electrical shock electrical shock [Ministry of Science, ICT and Future Planning (MSIP)] under
shock
Grant 2021R1A2B5B03086257 and Korea Institute of Energy
Reliability May require compromised in Improved
additional case of fault system stability Technology Evaluation and Planning (KETEP) and the Ministry
maintenance of Trade, Industry & Energy (MOTIE) of the Republic of Korea
(No. 20225500000110).
Table II presents an overview of the traits exhibited by
diverse grounding mechanisms on the AC side. It is suggested VI. REFERENCES
that resistance grounding be implemented on both the AC and
DC sides due to the benefits it affords in terms of constraining [1] A. Mehdi, S. Jarjees Ul Hassan, and C. H. Kim, “Squaring and
lowpass filtering data-driven technique for AC faults in AC/DC
fault currents, detecting ground faults, and mitigating electric lines,” Electric Power Systems Research, vol. 223, Oct. 2023, doi:
shocks. 10.1016/j.epsr.2023.109581.
[2] J. J. Justo, F. Mwasilu, J. Lee, and J. W. Jung, “AC-microgrids versus
Based on the simulation results of the proposed hybrid DC-microgrids with distributed energy resources: A review,”
AC/DC medium voltage network we have analyzed the effects Renewable and Sustainable Energy Reviews, vol. 24. pp. 387–405,
of the grounding schemes. Table III summarizes the
- 85 -
2013. doi: 10.1016/j.rser.2013.03.067.
[3] S. Parhizi, H. Lotfi, A. Khodaei, and S. Bahramirad, “State of the art
in research on microgrids: A review,” IEEE Access, vol. 3. Institute
of Electrical and Electronics Engineers Inc., pp. 890–925, Jun. 10,
2015. doi: 10.1109/ACCESS.2015.2443119.
[4] A. Meghwani, S. Chakrabarti, S. C. Srivastava, and S. Anand,
“Analysis of fault characteristics in DC microgrids for various
converter topologies,” in 2017 IEEE Innovative Smart Grid
Technologies - Asia: Smart Grid for Smart Community, ISGT-Asia
2017, Institute of Electrical and Electronics Engineers Inc., Jun. 2018,
pp. 1–6. doi: 10.1109/ISGT-Asia.2017.8378426.
[5] Q. Xu, J. He, S. Huang, J. Zeng, C. Fan, and W. Wang, “Researches
on grounding modes of the AC/DC hybrid system with various
distributed renewable energy,” The Journal of Engineering, vol.
2019, no. 16, pp. 3035–3038, Mar. 2019, doi: 10.1049/joe.2018.8387.
[6] W. Zhang, T. Wei, Q. Chen, Y. Cui, W. Liu, and J. Yang, “Study on
grounding modes of AC/DC hybrid distribution system,” in
Proceedings - IEEE International Conference on Energy Internet,
ICEI 2019, Institute of Electrical and Electronics Engineers Inc., May
2019, pp. 42–46. doi: 10.1109/ICEI.2019.00014.
[7] IEEE Industry Applications Society. Power System Technologies
Committee., IEEE recommended practice for grounding of industrial
and commercial power systems. Institute of Electrical and Electronics
Engineers, 1982.
[8] A. P. S. Meliopoulos, J. Kennedy, C. A. Nucci, A. Borghetti, and G.
Contaxis, “Power distribution practices in USA and Europe: Impact
on power quality,” in Proceedings of International Conference on
Harmonics and Quality of Power, ICHQP, IEEE Computer Society,
1998, pp. 24–29. doi: 10.1109/ICHQP.1998.759834.
[9] R. B. West, “Grounding for Emergency and Standby Power
Systems,” IEEE Trans Ind Appl, vol. IA-15, no. 2, pp. 124–136, 1979,
doi: 10.1109/TIA.1979.4503627.
[10] L. Yu and R. L. Henriks, “Selection of system neutral grounding
resistor and ground fault protection for industrial power systems,” in
Record of Conference Papers Industry Applications Society 38th
Annual Petroleum and Chemical Industry Conference, Publ by IEEE,
1991, pp. 147–153. doi: 10.1109/pcicon.1991.162941.
[11] Institute of Electrical and Electronics Engineers., ICHQP 2008 : 13th
International Conference on Harmonics & Quality of Power :
University of Wollongong, Australia, 28th September-1st October
2008. IEEE, 2008.
[12] J. C. Das and R. H. Osman, “Grounding of AC and DC low-voltage
and medium-voltage drive systems,” IEEE Trans Ind Appl, vol. 34,
no. 1, pp. 205–216, 1998, doi: 10.1109/28.658747.
[13] J. Mohammadi, F. B. Ajaei, and G. Stevens, “Grounding the DC
Microgrid,” in IEEE Transactions on Industry Applications, Institute
of Electrical and Electronics Engineers Inc., Sep. 2019, pp. 4490–
4499. doi: 10.1109/TIA.2019.2928278.
[14] Y. Wang, Z. Yu, J. He, S. Chen, R. Zeng, and B. Zhang,
“Performance of shipboard medium-voltage DC system of various
grounding modes under monopole ground fault,” IEEE Trans Ind
Appl, vol. 51, no. 6, pp. 5002–5009, Nov. 2015, doi:
10.1109/TIA.2015.2427119.
[15] Clemson University and Institute of Electrical and Electronics
Engineers, Clemson University Power Systems Conference :
September 4th-7th, 2018, Charleston, South Carolina, USA.
[16] J. Burke and M. Marshall, “Distribution system neutral grounding,”
Proceedings of the IEEE Power Engineering Society Transmission
and Distribution Conference, vol. 1, pp. 166–170, 2001, doi:
10.1109/TDC.2001.971228.
[17] J. P. Nelson, “The grounding of power systems above 600 volts: A
practical view point,” in Record of Conference Papers - Annual
Petroleum and Chemical Industry Conference, 2003, pp. 13–22. doi:
10.1109/pcicon.2003.1242595.
[18] 1653.6-2018 - IEEE Recommended Practice for Grounding of DC
Equipment Enclosures in Traction Power Distribution Facilities.
IEEE, 2018.
- 86 -
August 22(TUE) - 25(FRI), 2023
Oral Session 3
Room : A434
Chair: Yemar Amitov (AUPET, Kazakhstan)
- 87 -
Research and development of an information
system for speech recognition based on neural
network algorithms.
Maksat Kanashev Sergiy Gnatyuk Mirambayeva Nazym
MSc student of Power Engineering and Vice Dean of the Faculty of Cybersecurity, Teacher at Gumarbek Daukeev
Telecommunications Computer and Software Engineering at Almaty University of Energy
Almaty University National Aviation University and Communications College
Almaty, Kazakhstan National Aviation University Almaty, Kazakhstan
ma.kanashev @aues.kz Kyiv, Ukraine [email protected]
[email protected]
Assel Mukasheva
PhD, Associate Professor of the Department
of Information Systems and Cybersecurity
Almaty University of Power Engineeringand
Telecommunications
Almaty, Kazakhstan
[email protected]
orcid.org/0000-0001-9890-
4910
Abstract — This article presents a comparison of the speed lines and determine the recognition accuracy. The findings of
and accuracy of two speech recognition models in the context this study can be useful for improving speech recognition
of educational applications and artificial intelligence. The systems and creating more adaptive and efficient solutions for
relevance of the research lies in determining the optimal model audio data processing. The results of comparing the accuracy
for use in educational technologies and the development of of speech recognition models are recorded in JSON format,
intelligent systems, taking into account performance after which, using the matplotlib library, they are visualized as
limitations and hardware limitations. The study is based on a graphs, comparing the speed and accuracy of recognition.
set of audio recordings containing various phrases uttered by Visualization of data in this way contributes to their
different people with different accents and intonations. improvement and more effective integration into educational
Parameters such as recognition speed, audio-to-text conversion systems. In conclusion, the authors emphasize the prospects for
accuracy, and resource consumption are analyzed. Firstly, the further development of speech recognition technologies in the
importance of speech recognition technologies in the context of field of education and artificial intelligence, as well as potential
education and the need for continuous development and areas of future research, including multilingualism and
improvement of models to ensure successful application is speaker emotion analysis.
emphasized. The introduction of more efficient and accurate
speech recognition models into educational technologies and Keywords: Artificial Intelligence, speech recognition,
intelligent systems is an important step in ensuring affordable, accuracy, machine learning, recognition model
high quality and inclusive education for all. To further expand
the potential of speech recognition technologies in education, I. INTRODUCTION
the article proposes to integrate these models with other areas Speech recognition models play a crucial role in
of artificial intelligence, such as machine learning, natural educational applications and artificial intelligence, enabling
language processing and computer vision. Secondly, such
integration can lead to the development of more complex and
advancements in the field of intelligent systems. This article
advanced educational applications that provide a higher aims to compare the speed and accuracy of two speech
quality of education and better support for students. In recognition models within the context of educational
addition, the authors emphasize the importance of taking into technologies. By examining the performance limitations and
account hardware limitations and performance when choosing hardware constraints, this research seeks to identify the
and developing speech recognition models. Such accounting optimal model for integration into educational systems.
ensures a balanced ratio between recognition accuracy and The importance of speech recognition technologies in
resource consumption, allowing educational applications to education is widely recognized. Li et al. provide a
function effectively on various platforms and devices with comprehensive review of speech recognition in educational
different capabilities. Considering these aspects, the article
makes a valuable contribution to the development of
applications, emphasizing the need for continuous
comprehensive, innovative and inclusive solutions that can development and improvement of models to ensure
change and enrich the educational landscape. This article successful application [1]. Liu and Li conduct an empirical
examines the parameters of speech recognition in audio study comparing different speech recognition models
recordings containing a variety of phrases uttered by different specifically tailored for educational applications, shedding
people with different accents and intonations. The aim of the light on their effectiveness and applicability [2]. These
study is to evaluate the recognition speed, the accuracy of studies underline the significance of exploring and
audio-to-text conversion and resource consumption when using implementing efficient and accurate speech recognition
SpeechRecognition and Levenshtein libraries. During the models in educational technologies.
analysis, the above libraries were used to record and recognize
audio files, as well as to calculate the distance between two
Enhancing educational technologies with speech
recognition has been a focus of research and development.
- 88 -
Johnson and Smith discuss the current trends and future However, there are also some limitations associated with
directions of incorporating speech recognition into Google's speech recognition model. One of the notable
educational technologies, emphasizing its potential impact on drawbacks is its reliance on an internet connection for real-
the learning experience [3]. Chen, Liu, and Huang propose time transcription. This dependency on network connectivity
the integration of speech recognition with machine learning may pose challenges in situations where internet access is
to create intelligent educational applications that offer limited or unstable.
enhanced adaptivity and efficiency [4]. Moreover, the privacy concerns related to data storage and
Assessing the performance of speech recognition models usage should be taken into consideration. Since the model
in educational applications is crucial for their optimization. requires sending audio data to Google's servers for
Wang, Yu, and Liu analyze the performance of speech processing, users and developers need to be aware of the
recognition models within educational applications, privacy implications and ensure compliance with relevant
examining factors such as recognition speed and accuracy data protection regulations.
[5]. Garcia and Liu focus on analyzing speech recognition
B. Bing Speech Recognition Model
parameters using the Levenshtein method, providing insights
into improving the accuracy of educational applications [6]. The Bing speech recognition model, developed by
Additionally, Smith and Brown emphasize the visualization Microsoft, offers its own set of advantages and
of speech recognition model accuracy as a means of considerations for speech recognition tasks.
understanding their performance within educational systems One notable strength of the Bing Speech Recognition
[7]. Model is its integration with the Microsoft ecosystem,
Considering the limitations and constraints of hardware including services like Microsoft Azure and Microsoft
and performance is essential when selecting and developing Cognitive Services. This integration enables developers to
speech recognition models for educational applications. Lee leverage the model within a comprehensive suite of tools and
and Park discuss the prospects for speech recognition services, facilitating seamless integration and providing a
technologies in education and artificial intelligence, unified development experience.
highlighting the need to strike a balance between recognition Another advantage of the Bing model is its support for
accuracy and resource consumption [8]. Wang, Chen, and Li real-time transcription, even in offline scenarios. This
examine speech recognition parameters in audio recordings capability is particularly valuable in applications where
using the Levenshtein method, contributing to the immediate and uninterrupted speech recognition is required,
understanding of optimal model selection [9]. Zhang, Li, and such as voice assistants or dictation software [13].
Huang propose adaptive solutions for audio data processing In terms of accuracy, the Bing Speech Recognition
based on speech recognition, addressing the challenges of Model demonstrates competitive performance, achieving
resource optimization in educational applications [10]. reliable transcription results in various scenarios. The model
has been trained on diverse datasets and benefits from
II. BACKGROUD Microsoft's expertise in natural language processing and
A. Google speech recognition model overwiew machine learning.
However, like the Google model, the Bing Speech
Google's speech recognition model is known for its Recognition Model also has limitations. One limitation is its
advanced technology and widespread use in various performance with certain accents and languages, which may
applications. This model offers several advantages, making it not be as comprehensive or refined compared to models
a popular choice for speech recognition tasks. specifically tailored for those linguistic variations [14].
One of the key strengths of the Google Speech Developers and users should consider this factor when
Recognition Model is its high accuracy in converting speech working with specific languages or accents.
to text. The model leverages large-scale training data and Additionally, like any cloud-based speech recognition
sophisticated machine learning algorithms to achieve service, the Bing model requires a stable internet connection
impressive recognition accuracy. This accuracy is for optimal performance. Offline transcription capabilities
particularly beneficial in applications where precise may be limited, and real-time transcription may be impacted
transcription is essential, such as transcribing audio by network latency or disruptions.
recordings or generating subtitles for videos. In conclusion, both Google and Bing speech recognition
Another advantage of Google's speech recognition model models offer unique advantages and considerations. The
is its robustness and adaptability to different accents, Google model excels in accuracy, adaptability, and
languages, and speech patterns. The model has been trained integration with Google services, while the Bing model
on diverse datasets, enabling it to handle a wide range of provides strong integration with the Microsoft ecosystem and
linguistic variations effectively [11]. This flexibility makes it supports real-time transcription. When choosing between
suitable for applications that involve multi-lingual or multi- these models, developers should consider factors such as
accented speech. accuracy requirements, language support, integration needs,
Furthermore, the Google Speech Recognition Model and offline capabilities.
offers excellent integration capabilities with other Google
services and APIs. Developers can easily incorporate this C. Training Algorithms and Model Similarities
model into their applications using Google Cloud Speech-to- Both the Google Speech Recognition Model and the Bing
Text API, allowing seamless integration with various Google Speech Recognition Model utilize sophisticated training
products and services [12]. algorithms to achieve their impressive performance in speech
recognition tasks. These algorithms play a crucial role in
- 89 -
training the models and enabling them to accurately convert algorithms capable of detecting dangerous objects in real-
speech into text. world scenarios. By harnessing the power of advanced
The Google Speech Recognition Model leverages deep machine learning techniques, these algorithms aim to ensure
learning algorithms, particularly recurrent neural networks the safety and protection of critical infrastructures from
(RNNs) and convolutional neural networks (CNNs). RNNs potential threats.
are well-suited for sequential data processing, making them To establish a comprehensive understanding of the
effective in capturing the temporal dependencies in speech broader context, Smith and Johnson [17] provide a
signals. On the other hand, CNNs excel in feature extraction comprehensive review of advancements and applications in
and can capture local patterns in the audio input, enhancing the field of speech recognition. This article serves as a
the model's ability to discern relevant speech information. valuable resource, offering insights into the latest
Similarly, the Bing Speech Recognition Model also developments, challenges, and potential applications of
employs deep learning techniques, including RNNs and speech recognition technology.
CNNs, to process speech data effectively. These algorithms
enable the model to learn complex patterns and structures in IV. MATERIALS AND METHODS
speech signals, contributing to its accuracy and robustness. A. Levenshtein distance method in speech recognition.
Both models share similarities in terms of the training
Universality: The Levenshtein method takes into account
algorithms used. RNNs, with their ability to capture temporal
all types of editing operations (insertion, deletion,
dependencies, are commonly employed in both models to
substitution) and allows working with arbitrary strings. This
model sequential aspects of speech data. This enables the
is especially important in speech recognition, where input
models to effectively recognize and interpret speech patterns
data may contain various phonetic variations and different
and phonetic features.
forms of transcription.
Furthermore, both models make use of CNNs to extract
Flexibility: The Levenshtein method enables measuring
relevant acoustic features from the audio input. CNNs are
the "closeness" or "similarity" between two strings by
particularly adept at capturing local patterns and identifying
determining the minimum number of operations required to
important spectral characteristics, aiding in speech
transform them. In the context of speech recognition, this
recognition tasks.
allows identifying the most appropriate word or phrase based
The combination of RNNs and CNNs in the training
on comparison with the input audio representation.
algorithms of both models demonstrates their shared
Ease of implementation: The Levenshtein algorithm is
emphasis on capturing both temporal and spectral
based on dynamic programming and has a simple structure,
information in speech signals. This integration of different
making it easier to implement and apply in various speech
neural network architectures enhances the models' ability to
recognition scenarios.
handle a wide range of speech variations, accents, and
If the length of word1 is 0, the Levenshtein distance is
languages.
equal to the length of word2. This is because we would need
By utilizing similar training algorithms, the Google and
to perform 'j' insertions to transform an empty string into
Bing speech recognition models exhibit commonalities in
word2.
their underlying architecture and approach to speech
Similarly, if the length of word2 is 0, the Levenshtein
recognition. These similarities contribute to their comparable
distance is equal to the length of word1, as 'i' deletions would
performance levels and accuracy in converting speech to
be required to transform word1 into an empty string.
text.
If the last characters of word1 and word2 are the same
In summary, the Google Speech Recognition Model and
(word1[i-1] = word2[j-1]), we don't need to perform any
the Bing Speech Recognition Model utilize deep learning
additional operations, so the Levenshtein distance is equal to
algorithms, including RNNs and CNNs, to process speech
the distance between the remaining substrings (D(i-1, j-1)).
data and achieve accurate transcription. The shared use of
If the last characters of word1 and word2 are different,
these algorithms highlights the importance of capturing both
three possible operations have to be considered:
temporal and spectral aspects of speech signals. These
Deletion: D(i-1, j) + 1 represents the distance if we delete
commonalities in training algorithms result in similar
the last character from word1 and then find the distance
performance and make both models reliable choices for
between the modified word1 and word2.
speech recognition tasks.
Insertion: D(i, j-1) + 1 represents the distance if we insert
III. RELATED WORKS the last character of word2 into word1 and then find the
distance between the modified word1 and word2.
In this research study [15] delve into the realm of Substitution: D(i-1, j-1) + 1 represents the distance if we
predictive pricing models designed to classify potential substitute the last character of word1 with the last character
customers. Through the utilization of data-driven of word2 and then find the distance between the modified
approaches, the authors explore various techniques to word1 and word2.
effectively analyze customer behavior and preferences. By
The overall Levenshtein distance is then given by the
leveraging machine learning algorithms and extensive
minimum of these three possibilities.
datasets, these models aim to optimize pricing strategies and
enhance customer targeting for businesses.
Addressing the crucial need for heightened security in
critical infrastructures, Azarov et al. present a
groundbreaking approach in their research [16]. The focus (1)
lies on the development of real-time machine learning
- 90 -
B. Google speech recognition model algorithms where Encoder Hidden Statet represents the hidden state
Google's speech recognition model uses many at time step t, Input Featurest represents the input speech
algorithms, one of which are CTC. features at time step t, and Encoder Hidden Statet−1 is the
CTC is a key algorithm used in Google's speech previous hidden state.
recognition models. It allows the model to align the input Attention Mechanism: The attention mechanism allows
audio data with the corresponding transcriptions without the model to dynamically focus on different parts of the input
requiring precise time alignment. CTC works by inserting sequence during decoding. It computes attention weights
blank characters into the transcription, which can then be based on the compatibility between the current decoder
aligned with repeated or missing characters in the input hidden state and each encoder hidden state. The attention
sequence. This allows the model to handle input and output weights represent the relevance/importance of each encoder
sequences of variable length. During training, CTC uses an hidden state at each time step. The context vector, which
iterative optimization process to update the model parameters captures the attended information, is computed as the
based on the alignment between the input and target weighted sum of the encoder hidden states:
transcriptions. Using CTC, Google models can efficiently
learn speech recognition with different durations and
alignments. (6)
To calculate the forward probabilities for each step in the C. Bing speech recognition model algorithms
alignment CTC model use forward algorithm. It is used to
compute the probability of an input sequence given a target Bing speech recognition uses the Connectionist Temporal
sequence. Classification (CTC) algorithm, similar to Google.
Additionally, it incorporates the following algorithms and
techniques.
Deep Neural Networks (DNNs). Bing’s speech
(2) recognition model utilizes DNNs as acoustic models. These
networks learn complex representations of audio features and
where αt(yt) represents the forward probability of label yt capture high-level patterns. The forward pass of a DNN can
at time step t, αt−1(yt−1) is the forward probability at the be represented as:
previous time step, and P(yt|xt) is the probability of emitting
label yt at time step t given the input xt. (7)
When calculating the backward probability for each where hl represents the activations at layer l, Wl is the
alignment step, the backward algorithm of the input weight matrix, bl is the bias vector, and hl−1 represents the
sequence is used, considering the target sequence. activations from the previous layer.
- 91 -
V. PERFORMANCE TESTS AND RESULTS
A. Reasons for choosing Python programming language
The choice of Python and the specific libraries,
“SpeechRecognition” and “Levenshtein”, was motivated by
several factors. Python is widely recognized for its
versatility and extensive ecosystem of libraries and
frameworks. When it comes to speech recognition and
natural language processing tasks, Python offers a variety of
powerful tools and APIs that simplify the development
process.
Python's rich library ecosystem includes
“SpeechRecognition”, which provides a convenient and
user-friendly interface for working with audio files and
speech recognition models. It supports multiple speech
recognition APIs, allowing for easy comparison and
evaluation of different models. Additionally,
“SpeechRecognition” simplifies tasks such as recording
audio files and extracting text from speech, making it an
excellent choice for this experiment (Fig. 1).
- 92 -
resource requirements, targeted evaluation, and more
concise interpretation of the outcomes.
In figure 5 you can see two graphs visualizing the
recognition results using Google's model, the first graph
shows the speed of recognition, the second the accuracy.
- 93 -
for the further development of speech recognition [9] Wang, H., Chen, Y., & Li, M. (2019). Speech recognition
parameters analysis in audio recordings using the Levenshtein method.
technologies in the fields of education and artificial International Journal of Information and Education Technology, 9(10),
intelligence. 753-758.
[10] Zhang, L., Li, W., & Huang, R. (2018). Adaptive solutions for
REFERENCES audio data processing based on speech recognition in educational
[1] Li, X., Zhang, C., Zhao, Y., & Liu, X. (2020). Speech recognition applications. In Proceedings of the 11th International Conference on
in educational applications: A comprehensive review. IEEE Transactions Educational Data Mining (pp. 543-546). International Educational Data
on Learning Technologies, 13(3), 477-491. Mining Society.
[2] Liu, Q., & Li, H. (2018). An empirical study of speech recognition [11] Google Cloud Speech-to-Text Documentation. (Accessed on
models for educational applications. In Proceedings of the 26th 12.03.2023). Available at: https://cloud.google.com/speech-to-text/docs
International Conference on Computers in Education (pp. 435-444). Asia- [12] Google Cloud Speech-to-Text API. (Accessed on 12.03.2023).
Pacific Society for Computers in Education. Available at: https://cloud.google.com/speech-to-text
[3] Johnson, L., & Smith, R. (2017). Enhancing educational [13] Microsoft Azure Speech Service Documentation. (Accessed on
technologies with speech recognition: Current trends and future directions. 16.03.2023). Available at: https://learn.microsoft.com/en-
Educational Technology Research and Development, 65(5), 1281-1303. us/azure/cognitive-services/speech-service/index-speech-to-text
[4] Chen, Z., Liu, Q., & Huang, Y. (2019). Integrating speech [14] Microsoft Cognitive Services - Speech-to-Text API. (Accessed on
recognition with machine learning for intelligent educational applications. 16.03.2023). Available at: https://azure.microsoft.com/en-
Journal of Educational Technology & Society, 22(4), 143-155. us/products/cognitive-services/speech-to-text/
[5] Wang, Y., Yu, B., & Liu, Y. (2016). Performance analysis of [15] Yedilkhan, D., Mukasheva, A. Predictive pricing models to
speech recognition models in educational applications. In Proceedings of classify potential customers using data-driven approaches. AIP Conference
the 9th International Conference on Educational Data Mining (pp. 621- Proceedings, 2570(1), 040016. (2022). doi:10.1063/5.0099796.
626). International Educational Data Mining Society. [16] Azarov, I., Gnatyuk, S., Aleksander, M., Nazarov, I., Mukasheva,
[6] Garcia, V., & Liu, Q. (2018). Speech recognition parameters A. Real-time ML Algorithms for The Detection of Dangerous Objects in
analysis for educational applications using the Levenshtein method. Journal Critical Infrastructures. CEUR Workshop Proceedings, 3373, 217-226.
of Educational Computing Research, 56(6), 891-912. (2023).
[7] Smith, J., & Brown, A. (2020). Visualizing the accuracy of speech [17] Smith, J., Johnson, R. Speech Recognition: Advancements and
recognition models in educational applications. Journal of Educational Applications. Journal of Artificial Intelligence Research, 29, 123-145.
Technology Systems, 48(3), 354-372. (2023)
[8] Lee, S., & Park, J. (2017). Prospects for speech recognition
technologies in education and artificial intelligence. Journal of Educational
Technology Development and Exchange, 10(1), 39-50.
- 94 -
Research and development of sign language
recognition system using neural network
algorithm.
Yegor Matveyas Arailym Keneskanova Dastan Kambarov
MSc student of Almaty University of Power Senior Lecturer Professor of the Senior Lecturer Professor of the
Engineering and Telecommunications Department of Information Systems Department of Information Systems
(AUPET) named after G.Daukeev and Cybersecurity and Cybersecurity
Almaty, Kazakhstan Almaty University of Power Almaty University of Power
[email protected] Engineering and Telecommunications Engineering and Telecommunications
(AUPET) named after G.Daukeev (AUPET) named after G.Daukeev
Almaty, Kazakhstan Almaty, Kazakhstan
[email protected] [email protected]
Assel Mukasheva
PhD, Associate Professor of the Department
of Information Systems and Cybersecurity
Almaty University of Power Engineering and
Telecommunications (AUPET) named after
G.Daukeev
Almaty, Kazakhstan
[email protected]
orcid.org/0000-0001-9890-
4910
Abstract— Sign language is an important communication LSTM layers, when developing a neural network algorithm for
tool for the hearing-impaired community. Due to technological sign language recognition.
development, it is now possible to develop systems that can
recognize, translate and process sign language into text or Keywords: Sign language, recognition, Python, Keras,
speech, according to the visual representation of gestures. This neural network.
article explores the development of a sign language recognition
system using a neural network algorithm. The Mediapipe I. INTRODUCTION
library was used to determine the key points and orientation of
According to the World Federation of the Deaf, there are
the user's hands and fingers. After that, the software module
transmits the collected data to a sequential neural network that
more than 200 sign languages worldwide, which are used by
includes layers of Long Short-Term Memory (LSTM). To build 70 million deaf people [1].
this type of neural network, the open Keras library was used. Sign languages are natural languages that use visual-
The key feature of the presented neural network model is the gestural communication and are primarily used by deaf and
combination and interaction of convolutional and Recurrent hard-of-hearing individuals to communicate with one another.
neural network (RNN) layers. The considered set of layers Sign languages are distinct from spoken languages and have
provides the ability to track the dependence of data over time,
their own grammar, vocabulary, and cultural nuances. Sign
this is achieved by switching between layers of different types
languages rely on a combination of visual cues, such as hand
and reducing the number of neurons. The LSTM network is
trained using a custom editable dataset based on American Sign
movements, facial expressions, and body language, to convey
Language gestures. The dataset was formed on the recording of meaning. These elements can be combined and modified to
signs. Each sign representation was preprocessed to extract create words, sentences, and complex linguistic structures [2].
three-dimensional landmarks. These collected key points were American Sign Language was used as the basic sign
transmitting to the layers of the LSTM neural network, which language. It is the main sign language in the deaf communities
allowed the model to study the complex relationships between of the USA and English-speaking parts of Canada [3]. The
hand movements and the corresponding gestures. Each sign
choice of this language as the main one was made due to its
sample is represented by a sequence of 24 frames. The
effectiveness of the neural network algorithm is evaluated using
prevalence and availability of materials on this sign language
various indicators, including an accuracy of the model. The [4].
results of the experiment show that the developed software can Real-time sign language recognition is a challenging and
achieve a high level of accuracy in recognizing the gestures of impactful task that aims to facilitate effective communication
the sign language. The relevance of this study is confirmed by between individuals with hearing impairments and the hearing
the possibility of its application in a wide range of areas. In community [5]. The key sides of this study involve collecting
particular, the software has the potential to be used as a service
data, utilizing computer vision techniques, and implementing
or tool for communication between people with disabilities and
gesture recognition and translation. Machine learning
the general public, or as a technology that helps people with
hearing impairments. The authors of the research note that the
algorithms and features were employed to classify signs into
results of the work done demonstrate the possibility and words [6,7], with basic integration of natural language
effectiveness of using a neural network algorithm, including processing and generation for translation purposes, which is
based on the Markov chain [8].
- 95 -
II. MATERIALS AND METHODS
A. Related work
Considering the available tools and technologies used in
the field of human recognition in general and gestures in
particular, several relevant categories can be distinguished [9]:
1. Technologies that use special gloves or bracelets to
read the position and orientation of the hands,
followed by the classification of gestures.
2. Solutions based on the use of an individual user
camera or a combination of such cameras using
additional sensors.
However, often, such a set of hardware is quite expensive
and may not always be available, unlike, for instance, a regular
user webcam. Figure 1. LSTM cell structure.
One of the most important parameters of gesture The states of previous and current LSTM cells are defined
recognition systems is the accuracy of sign classification and as 𝑆𝑘−1 and 𝑆𝑘 respectively.
system performance. It is important to pay attention to the fact Forget gate is represented by the first sigmoid layer, which
that the accuracy of the final classification result can be outputs a number that varies from 0 to 1, aim of this gate is to
affected by both the quality of images, the presence of light make a decision, whenever to keep value or not. The output of
and its intensity in the frame, and the specificity of the this gate is 𝐹𝑘 , which can be described by this equation:
application conditions for which the specific algorithm used is
adapted. In addition, when recognizing a continuous sign 𝐹𝑘 = σ(𝑊𝑘 × [𝐻𝑘−1 , 𝑋𝑘 ] + 𝑏𝑘 )
language, there is a problem of coarticulation, that is, the Input gate consists of two stages. The first one is based on
imposition of gestures in sign languages, which no one has yet the second sigmoid layer and its purpose is to decide which
been able to completely solve [10]. value will be updated. On the next step a vector of new
Determining the position and identification of the hand in potential values is created using the first tanh layer.
space is only the initial stage, followed by the classification of 𝐼𝑘 = σ(𝑊𝑖 × [𝐻𝑘−1 , 𝑋𝑘 ] + 𝑏𝑖 )
the sign. To do this, a conventional convolutional neural
network can be used. It is possible to analyze the entire source 𝑃𝑘 = tanh(𝑊𝑝 × [𝐻𝑘−1 , 𝑋𝑘 ] + 𝑏𝑝 )
image, and to work with the coordinates of the key points of
the fingers. However, in the case of basic convolutional neural The result of input gate is equals to the multiplication of
networks, it is possible to work only with a separately selected 𝐼𝑘 and 𝑃𝑘
frame, but for the recognition of dynamic sings, a whole-time State of the current cell is calculated by the following
interval must be analyzed and, accordingly, a set of frames expression:
must be considered when classifying, each previous one of
which will be used when analyzing subsequent frames. Such 𝑆𝑘 = 𝐹𝑘 × 𝑆𝑘−1 + 𝐼𝑘 × 𝑃𝑘
a task can be implemented using long-term short-term Final output gate is represented by the third sigmoid layer
memory (LSTM) neural networks [11,12]. that defines which part of the final state are going to the
The LSTM layer consists of a repeating block called an output. After this, current state goes through second tanh layer
LSTM cell, which has a more complex structure than and multiplied on the result of previous sigmoid layer.
conventional recurrent neural networks [13]. An LSTM cell 𝑂𝑘 = σ(𝑊𝑜 × [𝐻𝑘−1 , 𝑋𝑘 ] + 𝑏𝑜 )
consists of three main components: input g ate, forget gate,
and output gate (Fig. 1). 𝐻𝑘 = 𝑂𝑘 × tanh (𝑆𝑘 )
In general terms, each of these components controls the B. Neural network structure
flow of information inside the cell. Input gate determines the The neural network model can be described as a directed
source information that will be added to the cell. Forget gate acyclic graph of connected layers, in which input data passes
selects the information that will be forgotten or stored in the through the layers sequentially.
cell. And in the case of the Output gate, it determines what
information will be transmitted from the cell. In addition, the The first step to build a neural network was to define
LSTM cell has an internal state that can be transmitted to the LSTM layers that allow the model to consider the sequence of
next time step, storing information for a specified period of frames under consideration associated with gestures. Each
time [14]. frame in the sequence was transmitted through an LSTM cell,
which updated its internal state and generated an output. After
the LSTM layers, fully connected dense layers have been
added to process high-level features and bind the information
obtained from the LSTM layers. At the end of the model there
was an output layer with the number of neurons corresponding
to the number of classes (signs) in the original sign language
that needed to be recognized. The softmax activation function
- 96 -
was used for the output layer, which allowed to obtain
probabilities for each class.
As part of the current study, a neural network was
compared with a different set of corresponding layers. Based
on the results of efficiency and performance comparisons, a
sequential neural network with the following set of layers was
selected:
Let X be the input tensor of the form (batch_size, 24,
1662), where batch_size is the number of training (test)
samples, 24 is the length of the input sequence, number of Figure 2. Final neural network model.
frames, and 1662 is the number of features at each time step.
C. Data collection and processing
The first layer of the sequential neural network is
At the beginning of the experiment, a balanced data set
represented by an LSTM layer with 128 units, while it returns
was collected. Each sign was represented by a set of 150
the output sequence for the next LSTM layer using the ReLU()
unique samples recorded using a laptop webcam. All the
activation function:
gesture cases are provided as a sequence of 24 frames.
L1 = LSTM(X, ReLU), where L1 is the output tensor of
The Mediapipe library was used to obtain source data for
the form (batch_size, 24, 128).
training and testing. The software implementation initiates the
The second layer applies another LSTM function with 256 recognition process by receiving the input video stream of the
units, returning sequences outputs using the ReLU activation user performing gestures in the sign language. The video was
function: then pre-processed to extract three-dimensional landmarks, as
well as characteristics of movement and hand position [15,16].
L2 = LSTM (L1, ReLU), where L2 is the output tensor of However, in addition to the hands, human pose and face
the form (batch_size, 24, 256). landmarks were detected and collected too. This is necessary
The third layer applies another LSTM function with 64 to combine the sign component as well as human facial
units, without returning sequences, using the ReLU activation expressions, which also plays an important role in most sign
function: languages [17].
L3 = LSTM (L2, ReLU), where L3 is the output tensor of From the coordinates of the key points received from
the form (batch size, 128). Mediapipe, a sequence of data is formed, represented by a
one-dimensional array, where each time step corresponds to a
The fourth layer applies a fully connected (Dense) specific frame of the video stream. It was decided to consider
function with 128 units and a ReLU activation function: only the hands to obtain the initial data, since this set of key
L4 = Dense (L3, ReLU), where L4 is the output tensor of points is optimal and does not cause large deviation with a
the form (batch size, 128). small data set for training a neural network. Each gesture is
represented by a sequence of 24 frames received as part of
The fifth layer applies another fully connected function processing the incoming video stream.
with 64 units and the ReLU activation function:
To prevent duplication and overlay of the previous gesture
L5 = Dense (L4, ReLU), where L5 is the output tensor of when predicting a new one the delay mechanism was realized.
the form (batch size, 64). According to the results of manual testing, the ratio of 36
The sixth layer applies another fully connected function unused frames to 24 frames in use is optimal for latency. This
with 32 units and the ReLU activation function: allows the system to prevent the imposition of gestures in
motion. When processing a video stream, every 60 frames are
L6 = Dense (L5, ReLU), where L6 is the output tensor of selected, of which the first 36 frames act as a delay. These
the form (batch size, 32). frames are not used in any way, they are only needed to wait
for a certain moment before moving or changing the position
The last layer applies a fully connected function with the
of a person's hand. The remaining 24 frames of the sequence
number of units equals to the number of classes in the current
of the video stream are transmitted to the neural network to
classification task using the softmax activation function:
classify the current gesture.
Y = Dense(L6, softmax), where Y is the output tensor of
As an optimal representation of the data, the form of a one-
the form (batch size, number of actions), representing the
dimensional array of numbers normalized in the range from 0
probability distribution of actions.
to 1 was chosen. For each of the hands there are 21 key points
Schematically, the neural network is shown in Figure 2. represented by three coordinates (Fig.3), it means that for one
hand there are 21 * 3 = 63 values. Two hands contain 63 * 2
Batch size is a dynamic value, because of testing was = 126 values. Face landmarks consist of 468 3 dimensional
carried out on different sets and the number of classes for key points. And finally, human pose is represented by 33 4D
gesture classification. landmarks. Adding all these values together, a finite number
of features equal to 1662 was obtained.
- 97 -
TABLE II. TABLE SENTENCES AND PHRASES REPRESENTED
IN THE DICTIONARY
Number Sentence
1 Thank you
2 You are welcome
3 I am fine
4 I am ok
5 How did it happen
6 How are you
7 How do you feel
8 I love you
Number Word
1 Hello
2 Hi Figure 5. Function for collecting data.
3 Welcome
4 Ok
Separate functions were then developed to parse and work
5 You with the stored data. The previously saved .npy files were
6 I loaded, extracting the necessary information, and applying
7 Fine required preprocessing steps. The preprocessing stage
8 How involved data transformations.
9 It
10 Happen With the data prepared, the project moved on to the
11 Feel creation of different Keras sequential models suitable for sign
12 Love
language recognition. These models were designed and
13 Thank
implemented using the Keras library, which offers a high-
level interface for building deep learning models.
Table 2 demonstrates a set of available sentences and
phrases that can generated according to the sequence of Finally, a script was created to enable real-time testing of
predicted words. the sign language recognition system. This script utilized a
specific trained model to predict sign language gestures in
- 98 -
real-time. By processing the video stream data from a camera, The second model, which was subsequently chosen as the
the system could provide immediate output, such as main one, is a more complex and voluminous version of the
displaying the predicted results on the screen. first model. It has seven layers, which were described in one
of the previous sections. Training on 25 epochs for the second
In total, 2 models were considered. Categorical cross model gave weak results, loss equals to 0.5571 are quite high,
entropy and categorical accuracy were chosen as an evaluation and accuracy, on the contrary, is relatively lower than
of the effectiveness of the neural network models under expected – 0.8564 (Fig. 10.)
consideration, because a large set of initial classes is presented
in the current task of sign classification.
The first model is compact, it includes 4 layers, two of
which are LSTM layers, and the remaining ones are Dense
(Fig. 7).
- 99 -
hands at least minimally in space and prepare for the next REFERENCES
gesture. For this reason, adding this kind of delay is necessary. [1] World Federation of the Deaf https://wfdeaf.org/our-work/
In addition to recognizing individual independent words, [2] V. Kimmelman, “Information Structure in Sign Languages”, Sign
Languages and Deaf Communities Volume 10, 2019,
a mechanism for generating sentences described in a special https://doi.org/10.1515/9781501510045
dictionary was created. For this purpose, a function based on
[3] S. K. Liddell, “American Sign Language Syntax”, Approaches to
Markov chains was developed (Fig. 12), which generates Semiotics Volume 52, 1980 https://doi.org/10.1515/9783112418260
sentences and phrases using the results of the classification of [4] J. W. Guido, “Learn American Sign Language: Everything You Need
signs by the neural network described earlier. to Start Signing”, Wellfleet Press, 2015
[5] R Rastgoo, K Kiani, S Escalera, “Sign Language Recognition: A Deep
Survey”, Expert Systems with Applications Volume 164, February
2021, 113794, https://doi.org/10.1016/j.eswa.2020.113794
[6] Didar Yedilkhan, Assel Mukasheva, “Predictive pricing models to
classify potential customers using data-driven approaches”, AIP
Conference Proceedings, 18 August 2022; 2570 (1): 040016.
https://doi.org/10.1063/5.0099796.
[7] I. Azarov, S. Gnatyuk, M. Aleksander, I. Nazarov, A. Mukasheva;
“Real-time ML Algorithms for The Detection of Dangerous Objects in
Critical Infrastructurs”, CEUR Workshop Proceedings, 2023, 3373, pp.
217–226.
[8] T. Almutiri, F. Nadeem, “Markov Models Applications in Natural
Language Processing: A Survey”, I.J. Information Technology and
Computer Science, 08 April 2022,
https://doi.org/10.5815/ijitcs.2022.02.01
[9] M Oudah, A Al-Naji, J Chahl, “Hand Gesture Recognition Based on
Figure 12. Natural language generating function.
Computer Vision: A Review of Techniques” Journal of Imaging. – 23
This function uses a transition matrix that displays the July 2020, https://doi.org/10.3390/jimaging6080073
probabilities of words following each other. Thus, the most [10] S. Albanie, G. Varol, L. Momeni, T. Afouras, J. S. Chung, N. Fox, A.
Zisserman, “BSL-1K: Scaling Up Co-articulated Sign Language
probable word between the last two words in the sentence is Recognition Using Mouthing Cues” European Conference on
determined. After that, a recurrent function call occurs to Computer Vision, 2020, pp 35–53, https://dx.doi.org/10.1007/978-3-
continue constructing a sentence or phrase. 030-58621-8_3
[11] M. L. Amit, A. C. Fajardo, R. P. Medina , “Recognition of Real-Time
IV. CONCLUSION Hand Gestures using Mediapipe Holistic Model and LSTM with MLP
Architecture”, 2022 IEEE 10th Conference on Systems, Process &
A compact model is sufficient for a classifier with a set of Control, 2022, https://doi.org/10.1109/ICSPC55597.2022.10001800
classes of no more than 15 pieces. However, with an increase
[12] A. S. Agrawal, A. Chakraborty, M. Rajalakshmi , “Real-Time Hand
in the number of source classes, this model will not cope with Gesture Recognition System Using MediaPipe and LSTM”,
the task. For a larger number of classes, a more complex International Journal of Research Publication and Reviews, Volume 3,
model is needed, which could consider the features of no 4, pp 2509-2515, April 2022
overlapping gestures that are performed in a similar way. [13] Y. Yu, X. Si, C. Hu, J. Zhang , “A Review of Recurrent Neural
Networks: LSTM Cells and Network Architectures”, Neural
For basic communication, the considered model is quite computation, 2019, https://doi.org/10.1162/neco_a_01199
sufficient. Such a set of communication elements includes 13 [14] R. C. Staudemeyer, E. R. Morris , “Understanding LSTM -- a tutorial
words and 8 complex sentences and phrases. According to the into Long Short-Term Memory Recurrent Neural Networks”, Ralf C.
original training dataset balance was achieved between the Staudemeyer, arXiv 2019, https://doi.org/10.48550/arXiv.1909.09586
capacity of the model and the available resources. Sentences [15] F Zhang, V Bazarevsky, A Vakunov , A. Tkachenka, G. Sung, C.
and phrases were formed correctly during the testing, since the Chang, M. Grundmann , “MediaPipe Hands: On-device Real-time
Hand Tracking”, CVPR Workshop on Computer Vision for
presented dictionary is quite small. Increasing the source Augmented and Virtual Reality, 2020,
dictionary may require choosing a different and more https://doi.org/10.48550/arXiv.2006.10214
progressive approach to generating text in real time. [16] M. Harris, A. S. Agoes, “Applying Hand Gesture Recognition for User
Guide Application Using MediaPipe”, 2nd International Seminar of
Considering the results and effectiveness, for such a set of Science and Applied Technology (ISSAT 2021), 2021,
classes, the accuracy of the model during training was 91.2%, https://doi.org/10.2991/aer.k.211106.017
and for the testing part of initial dataset categorical accuracy [17] E. A. Elliott, A. M. Jacobs, “Facial expressions, emotions, and sign
was equal to 91.1%, which is acceptable indicators. To languages”, Frontiers in psychology, 2013,
improve the accuracy of the second model, it is necessary to https://doi.org/10.3389/fpsyg.2013.00115
increase the number of training samples for each sign. The
number of required epochs for training was increasing
proportionally with the expansion of the model.
- 100 -
Research and Development of a Chatbot Using
Neural Network Technologies to Process
Requests
Kyzyrov Daniyar Ersainuly1, Sapakova Saya Zamanbekovna 2
1
International Information Technologies University, Kazakhstan
2
International Information Technologies University, Kazakhstan
Email: [email protected]
Abstract – The Python programming language has become it will join. Then we add the functions we need. In our case,
the most popular choice for creating chatbots due to its the chatbot acquired the functions of moderation, mute, ban,
effectiveness, affordability, convenience, and the abundance of kick, automatic roles, and prefixes, as well as a couple of
libraries available for natural language processing (NLP) and functions for entertainment. For example, to turn on music in
machine learning. This paper discusses the development of a voice chat, to get information about movies, TV shows, and
chatbot designed for use on the Discord platform using Python, so on. In addition, functions have been added that use neural
specifically utilizing neural network technologies. Chatbots are network technology to process requests, these are Image
becoming increasingly popular on Discord, as they offer Recognition functions, as well as a conversation(dialog)
expanded functionality that can replace certain websites. For
function. All these functions were implemented using the
example, chatbots that provide access to music have become
quite popular. However, the widespread use of chatbots has
Python programming language, its libraries, as well as various
raised concerns about potential harm, particularly when a single APIs, including the TMDB API, and direct interaction with
chatbot using the YouTubeDL library can work on millions of the YouTube search engine.
servers, reducing revenue for YouTube. The development of the For the functions of conducting a dialogue, as well as the
chatbot involved testing a variety of neural network models, Image Recognition functions, as we said earlier, the neural
including VGG, ResNet, AlexNet, Inception, and LeNet, using network models are responsible. In the course of research and
different types of optimizers and normalizers. Ultimately, three development, many variants of neural network models were
different models were created, each using a different optimizer
observed, compared, and the best ones were selected for use
(SGD, Adam, and RMSprop) and undergoing two hundred
epochs with a batch size of five. While all three models
in certain functions.
demonstrated high training accuracies, their testing accuracies II. EASE OF USE
varied, indicating potential overfitting. In addition to its
intended use as a chatbot, the program was extended to include To use the functions of a chatbot, you first need to add it
functionality that allows users to classify photos uploaded to the to your server, give it the appropriate role, and also grant
platform. For this task, convolutional neural network models permissions. After that, with the help of various commands,
were utilized. CNNs are designed specifically for image
we call the functions. In order to use commands, we enter the
processing tasks, such as object detection, image classification,
and segmentation. They consist of several neural layers,
sign ‘!’, after that, we write the name of the function that we
including convolutional, fully connected, and pooling layers. need, so we can use any function of the chatbot.
Several popular CNN models will be introduced and compared, The chatbot has many functions, an example calling the
including AlexNet, ResNet, VGG, Inception, MobileNet, and
‘!ping’ function, the chatbot will give a response to a text chat,
DenseNet. Each model has its own strengths and weaknesses,
and the choice of model ultimately depends on the specific for example, 100ms. This function gives information about the
application. This paper presents the development of a chatbot connection delay between the client and the chatbot.
created using Python and neural network technologies, which The list of files for the chatbot to work can be seen in Fig.
includes a photo classification functionality utilizing 1. Functions are written inside the Python files, data is stored
convolutional neural networks. The development process inside the JSON files, and we can say this is kind of our
involved testing various neural network models and optimizers database, where we store data. The main file is ‘chatbotd1’.
to achieve the desired performance. By discussing the different Here we specify the token and call the rest of the Python files.
components and models utilized in the creation of the chatbot, Inside the rest Python files, various functions are stored.
this paper provides insight into the practical applications of
neural network technologies in the development of
conversational agents.
I. INTRODUCTION
First of all, to create a chatbot, you need to register on the
Discord website. Switch to developer mode and create an
empty bot template for now. After creating the bot, we specify
its permissions [1], which it will request from each server that
- 101 -
Thus, it becomes possible to use different APIs for different
functions of your chatbot. An example of the search function
can be seen in Fig.3.
- 102 -
database, these are the responses. Answers to user questions third layer had as many neurons as the number of classes to be
are written here, for example, to a request to tell a joke, the predicted and has the softmax activation function. This
chatbot can give out more than 150 different types of jokes. architecture also includes two dropout layers, with a dropout
rate of 0.5. The optimizer used is Stochastic Gradient Descent
Intents and patterns were tokenized and preprocessed (SGD) with a learning rate of 0.01, a momentum of 0.9, and
using the NLTK library in Python. Lemmatization, stemming,
Nesterov momentum enabled.
and removal of unnecessary characters like question marks
and commas were also involved in the preprocessing. The The second model is similar to the first model but with
resulting words were then sorted and saved as a set. larger dense layers. It has three dense layers, with 256 neurons
in the first layer and 128 neurons in the second layer, both with
Next, classes were created based on our tags in the JSON the ReLU activation function. The third layer was the same as
file, as we said earlier, this is the common name for our similar
in the previous one. This architecture also includes two
questions. The data for training our model was selected by dropout layers, with a dropout rate equal to 0.5. The optimizer
looping through each pattern in each of the intents and used is Adam with a learning rate of 0.001.
creating a bag of words for these patterns. A bag of words is a
vector that represents the occurrence of each word in a pattern. The third model was more complex than the previous two
It has been added to the output row corresponding to the tag, architectures. It had four dense layers, with 128 neurons in the
and the output row is then appended to the training data. The first layer, 64 neurons in the second layer, and 32 neurons in
training data was then shuffled and split into the input (bag of the third layer, all with the ReLU activation function. The
words) and output (tag) arrays, or in other words our train_x fourth had an activation function named softmax. This
and train_y. architecture also includes three dropout layers, with a dropout
rate of 0.3. The optimizer used is RMSprop with a learning
A neural network model was then created using the Keras
rate of 0.001. All three architectures had different
API of TensorFlow. The model consisted of three layers - an configurations of layers and optimizers, with varying numbers
input layer with the same number of nodes as the length of the
of neurons and dropout rates. The aim is to experiment with
input array, a hidden layer with 128 nodes and a rectified different architectures to find the best one that gives the
linear unit (ReLU) activation function, and an output layer
highest accuracy on the given dataset.
with the same number of nodes as the length of the output
array and a softmax activation function. The model was Overall, the first model seems to be the most optimal and
compiled with a stochastic gradient descent (SGD) optimizer efficient as it has the fastest training time and the highest
and a categorical cross-entropy loss function. It was trained on training and testing accuracies, therefore, this model, with the
the input and output arrays using a batch size of 5 and an epoch SGD optimizer became the basis for the chatbot.
count of 200. Finally, the trained model was saved as an H5
file using the ‘save()’ method of the Keras API. The resulting Since our dataset is not too large and contains only a small
number of questions and answers (intents), this may not be
model can be used to predict the tag of new user inputs and
enough to train our chatbot. During the training process,
generate appropriate responses.
different models showed different accuracies. In Fig. 5, we
For the chatbot to work correctly, three different models can see the accuracy graph for training and test data for the
were initially created. These models differed in optimizers, the model that used the Adam optimizer. As we can see, the
first model had an SGD optimizer, the second Adam, and the training accuracy shows very good results, after the twenty-
third RMSprop. They all had two hundred epochs and a batch fifth epoch it reaches about 90 percent, and on average shows
size of five. As we can see in Table 1, all three models have above 95 percent accuracy. But at the same time, the test
high training accuracies, but the testing accuracies are accuracy is very different from the training accuracy, which is
different and have a lower value, which may mean some caused by overfitting. This means that our dataset is too small
overfitting. in volume and needs to be expanded.
TABLE 1. MODEL COMPARISON
The first model with the SGD optimizer has the largest
accuracy, then the model with the Adam optimizer and
RMSprop follow in turn. The first model has the fastest
training time, while the third model with the RMSprop
optimizer has the slowest. The inference time is slightly
different.
In addition to optimizers, neural network models have also
been built using other architectures. Three different neural
network architectures for the chatbot were made, each with a Fig 5. Train and Test Accuracy (Model 2)
different set of layers and optimizers.
As we can see in Fig. 6, the situation with the loss is the
The first neural network model had three dense layers, same. By the twenty-fifth epoch, the test loss decreases, but
with 128 neurons in the first layer and 64 neurons in the after that, the decrease stops, and, on the contrary, the increase
second layer, both with the ReLU activation function. The
- 103 -
in loss begins. The train loss still shows good results, by the ResNet101V2, ResNet50V2, and InceptionV3. After
hundredth epoch the value of the loss drops below 0.2. comparing these models, taking into account the accuracy and
loss of each model that can be seen in Table 2, it was decided
to use the InceptionV3 model.
TABLE 2. COMPARISON OF THE CNN MODELS
- 104 -
The ReLU function is the activation function used in effectiveness, as well as its usefulness for the community of
VGG16. It is applied after each convolutional and fully the entire Discord platform.
connected layer. ReLU is a straightforward non-linear Due to the current pace of development in the field of
function that introduces non-linearity to the model and assists artificial intelligence in general, we hope that in the future
in better fitting the data. Each element of the input tensor is chatbots will be used even more actively and will gradually
simply subjected to the function (1) be introduced into all informational, entertainment, and other
f(x) = max(0,x). (1) websites.
Where x – is the input. REFERENCES
It returns x if it is equal or greater than 0, and 0 if input is [1] G. Caldarini, S. Jaf, and K. McGarry, “A Literature
less. Survey of Recent Advances in Chatbots,” 2022.
[2] D. Kyzyrov, “Source Code of the ChatbotD1 (Discord
In summary, VGG16 implements convolutional layers to
Chatbot using Python),” GitHub Repository, 2023. [Online].
extract features from the input image, pooling layers to reduce
the spatial dimensionality of the feature maps, fully connected Available: https://github.com/Kyzyrov
layers to map the features to class scores, and ReLU activation [3] A. R. Ghias, C. Guo, R. Sarikaya, and P. Ponnusamy,
function to introduce non-linearity to the model. “Amazon Alexa, Feedback-Based Self-Learning in Large-
Scale Conversational AI Agents,” Amazon, 2019. [Online].
CONCLUSION Available: https://www.amazon.com.
In conclusion, we can say that chatbots are tools that [4] A. Pal, S. Bhalotia, V. Rathod, S. Bisen, and T. Lalwani,
significantly change the entire system of the implemented “Implementation of a Chatbot System using AI and NLP,” K.
area. Areas such as medicine, sports, entertainment, J. Somaiya Institute of Engineering and Information
education, or the economy. They significantly improve the Technology, 2018.
quality of user service and help to find the information they [5] B. Lutkevich, “Application programming interface
need very quickly, without wasting their nerves, money, and (API),” TechTarget, 2022. [Online]. Available:
time. https://searchapparchitecture.techtarget.com/definition/appli
A functioning chatbot was developed for the Discord cation-programming-interface-API.
platform, the main feature of which is the ability to conduct a [6] R. Regin, S. Suman Rajest, Shynu T, Jerusha Angelene
dialogue with the user. The basis for such a chatbot was a Christabel G, and Steffi R., “An Automated Conversation
neural network model with an SGD optimizer for conducting System Using Natural Language Processing (NLP) Chatbot
dialogues with users, and also a convolutional neural network in Python,” in Central Asian Journal of Medical and Natural
model InceptionV3 for its image recognition function. Sciences, vol. 03, no. 04, pp. 1-5, Jul-Aug 2022.
By combining different neural network models, the [7] G. Tsakiris, C. Papadopoulos, G. Patrikalos, K.-F.
chatbot has become multifunctional. In addition, the chatbot Kollias, N. Asimopoulos, and G. F. Fragulis, “The
has some other features that allow you to use the capabilities development of a chatbot using Convolutional Neural
of the Discord platform more effectively. Networks,” Department of Electrical and Computer
In the future, it is also planned to work with other APIs Engineering, University of Western Macedonia, Kozani,
except for YouTube and TMDb, adding several different Greece, 2022.
functions, as well as further expanding the database, which [8] R. Yamashita, M. Nishio, R. K. G. Do, and K. Togashi,
will allow the neural network model of the chatbot to conduct “Convolutional neural networks: an overview and application
a dialogue even more efficiently. in radiology,” in Insights into Imaging, vol. 9, no. 4, pp. 611-
We found out that chatbots have many different 629, 2018.
categories, can communicate in different ways, and can also [9] L. Alzubaidi, J. Zhang, A. J. Humaidi, A. Al‑Dujaili, Y.
be used to perform different purposes. Duan, O. Al‑Shamma, J. Santamaría, M. A. Fadhel, M.
This paper can later grow into a project, to improve the Al‑Amidie, and L. Farhan, “Review of deep learning:
chatbot of which not a simple dataset of 500 lines will be concepts, CNN architectures, challenges, applications, future
used, but a dataset of various dialogues, communications, directions,” in Journal of Ambient Intelligence and
various questions and answers from call centers, customer Humanized Computing, vol. 12, no. 4, pp. 4021-4054, 2021.
support centers, and so on. [10] Tao, J., Gu, Y., Sun, J., Bie, Y., & Wang, H. (2021).
There are many ways to develop a chatbot, and Research on VGG16 Convolutional Neural Network Feature
accordingly, an unlimited number of different functions can Classification Algorithm Based on Transfer Learning, MDPI,
be implemented in a chatbot. The most important criterion for Advanced Machine Learning and Deep Learning Approaches
the development of our chatbot in the future will be its for Remote Sensing.
- 105 -
A Study on the Effective Multimodal Approach
for Anomaly Detection using Gramian Angular
Difference Field from Heating, Ventilation, and
Air Conditioning (HVAC) System of Railways
Beomjun Kim 1, Younghoon Jeon 2, Jeong Won Kang 3, Chulsu Kim 4, Oh Kuen Kwon 5*
and Jeonghwan Gwak 1,2*
1
Dept. of IT·Energy Convergence, Korea National University of Transportation, Chungju 27469, Korea
2
Dept. of Software, Korea National University of Transportation, Chungju 27469, Korea
3
Dept. of Transportation System Engineering, Korea National University of Transportation, Uiwang 16106, Korea
4
Dept. of Railroad Engineering, Korea National University of Transportation, Uiwang 16106, Korea
5
Dept. Electronic Engineering, Semyung University, Jecheon 27136, Korea.
Email: {zhskfkseh, 0hoon.jeon}@gmail.com, {jwkang, chalskim}@ut.ac.kr, [email protected], [email protected]
Abstract—Heating, Ventilation, and Air Conditioning For instance, a hybrid model-based approach (HyMA) [2]
(HVAC) systems maintain the comfort levels within buildings was developed to predict the system's prognosis and health
or vehicles, thereby directly impacting service quality, management (PHM). This approach was designed to
including customer satisfaction. Consequently, anomalies overcome the limited representation of HVAC datasets for
within the HVAC system are synonymous with service quality predictive model development by employing physics-based
degradation, underscoring the growing necessity for efficient models and CNN-based deep learning algorithms. This
anomaly detection methods. While recurrent deep learning approach, among studies for anomaly detection, was aimed at
models using time-series data from HVAC systems have been overcoming the complexities of such systems.
proposed, the effectiveness of multimodal deep learning Further research conducted for energy efficiency
model learning has been demonstrated across diverse sectors. prediction and outlier detection used LSTM and three
HVAC systems, which already harvest various sensor data, regression models: LASSO, SVR, and MLP [3]. This study
can benefit from performance enhancement through image- highlighted the potential applicability of this deep learning-
type multimodal data generated using the Gramian Angular based approach to real-time state monitoring. Given the
Difference Field (GADF) algorithm. This multimodal multitude of proposed approaches for anomaly detection in
approach retains time dependencies due to the GADF's nature, HVAC systems, it's clear that the demand for, and significance
thereby bolstering the overall reliability and safety of railway of, maintenance for anomaly detection is on the rise. To
systems. enhance the performance of anomaly detection, we have
converted time series data into multimodal data using the
Keywords—Anomaly Detection, GADF, HVAC System of Gramian Angular Difference Field (GADF) algorithm [5, 6].
Railways, Multichannel Image, Multimodal We have also compared and analyzed the results based on the
learning outcomes of existing CNN models[4] and the Vision
I. INTRODUCTION Transformer (ViT) [7].
An HVAC system refers to the heating, ventilation, and air
II. PROPOSED METHOD
conditioning infrastructure that maintains a comfortable
interior environment within a building or vehicle. Its primary A. General Overview
role involves adjusting the temperature, humidity, airflow, and Our proposed methodology synthesizes Gramian Angular
cleanliness -- the four major elements of air conditioning -- to Fields from Time Series data through the Gramian Angular
optimize the surroundings according to their intended purpose. Difference Field (GADF) algorithm. The initial stage creates
However, improper HVAC system operation can result in a set of proportional Gramian Angular Fields using the GADF
increased energy consumption, substandard indoor air quality, algorithm from the provided time series data. Subsequently,
and general discomfort. This can directly correlate to the synthesized set is merged into channel units and
decreased customer satisfaction. reconstructed as multimodal data in the form of a multichannel
According to maintenance strategy literature [1], service image. The ultimate step applies this multimodal data for the
and quality maintenance can largely be classified into three learning of the experimental models, with subsequent
categories: failure-based, preventive, and predictive performance comparison and analysis of each model. For a
maintenance. Each method has its drawbacks, including issues systematic comparative analysis, we first established the time
related to resources, lack of experts, and risk burdens. To series classification performance of existing recurrent-based
address these issues, there is ongoing research into HVAC models [8]. The proposed method's workflow is depicted in
system maintenance methodologies, monitoring devices using Fig. 1, with the rest of this section detailing our proposed
sensors, and abnormality detection through artificial neural model.
networks.
- 106 -
Fig. 1. Overall Architecture of Our Proposed Method with ViT
- 107 -
B. Experimental Settings negatives (FN), the Vision Transformer outperformed Bi-
This experiment evaluates the performance of our GRU due to its ability to extract additional spatial features.
multimodal generation technique when trained with existing
CNN models and the Vision Transformer. We then performed
a comparative analysis using the accuracy, F1 Score, Precision,
Recall, and CrossEntropy Loss of the recurrent-based models.
The recurrent-based models chosen for the experiment include
RNN, LSTM, GRU, Bi-LSTM, and Bi-GRU. We also
compared these with Vision Transformer (ViT) and CNN
models, including AlexNet, ResNet50, ResNext50, VGG16,
DenseNet121, InceptionV3, MobileNet, MnasNet,
EfficientNet, and RegNet. For the Vision Transformer, we
used a model structure incorporating a ViT encoder and an
MLP head. Fig. 2. Confusion Matrix of Bi-GRU and ViT
C. Experiment Results
The experiment evaluates the performance of our
proposed multimodal generation technique when trained with IV. CONCLUSIONS AND FUTURE WORK
existing CNN models and Vision Transformer. Details of the Our proposed method leverages Gradient Angular
experiment are available in the second step of Fig. 2. We used Dependency Fields (GADF) to transform time-series data into
each model's accuracy, F1 Score, Precision, Recall, and multimodal data, which is then processed through
CrossEntropy Loss for performance comparison. Table 3 Convolutional Neural Networks (CNN) and Vision
outlines the experimental results for each model. Transformers (ViT). This approach yielded higher
performance results than traditional recurrent-based models,
TABLE 3. EXPERIMENT RESULTS
establishing its suitability for the upkeep of HVAC systems
Model Accuracy
F1
Precision Recall Loss
within railway environments. However, data generated via
Score GADF is essentially a vector reconstructed from the
RNN 53.62% 0.5345 0.5365 0.5360 0.6857 differences in values within a specific time frame.
LSTM 77.68% 0.7722 0.8022 0.7769 0.4032 Consequently, it lacks information regarding the actual values
GRU 87.79% 0.8775 0.8826 0.8779 0.3072
Bi-LSTM 77.13% 0.7681 0.7862 0.7712 0.4957
measured by the sensor. This could potentially lead to
Bi-GRU 91.11% 0.9110 0.9125 0.9110 0.2987 misjudgements, such as deeming all temperature readings
AlexNet 69.25% 0.6854 0.7128 0.6928 0.6422 within a particular time frame as normal, even when abnormal
ResNet50 86.52% 0.8628 0.8914 0.8651 0.3332 values occur in a pattern similar to a consistent normal one.
ResNext50 88.82% 0.8875 0.8972 0.8881 0.2095 Such misinterpretations could have serious implications for
VGG16 81.76% 0.8113 0.8659 0.8175 0.4232 maintenance procedures. To mitigate this, our future work will
DenseNet121 93.67% 0.9367 0.9375 0.9367 0.1759
Inception V3 76.01% 0.7517 0.8003 0.7600 3.4143
focus on the design and experimentation of a deep learning
MobileNet 78.06% 0.7780 0.7935 0.7805 0.6511 model that can utilize both GADF-based multimodal data and
MnasNet 50.00% 0.3333 0.2500 0.5000 0.6939 time-series data gathered from sensors simultaneously.
EfficientNet 94.75% 0.9473 0.9502 0.9474 0.1928
RegNet 91.60% 0.9160 0.9160 0.9160 0.1783 ACKNOWLEDGMENT
ViT 98.92% 0.9896 0.9896 0.9896 0.0476
This work was supported by the Basic Science Research
Recurrent
Average
77.46% 0.7726 0.7840 0.7746 0.4381 Program through the National Research Foundation of Korea
Proposed (NRF) funded by the Ministry of Education (Grant No. RS-
82.67% 0.8090 0.8185 0.8267 0.6329 2023-00248444)
Average
REFERENCES
When training the proposed method with CNNs and [1] J. Ulaganathan and K. M. Sadyojatha, "A Review On Maintenance
Vision Transformer, we observed an average accuracy of Techniques For Industrial Equipment And Its Machine Learning
82.67%. The Vision Transformer achieved an accuracy of Algorithms.", International Journal of Advanced Research in
98.92%, representing the highest performance among all Engineering and Technology (IJARET), Vol. 12, pp. 183-194, April
2021
models. Recurrent-based models showed an average accuracy
of 77.46%, with Bi-GRU recording the highest performance [2] A. Gálvez, D. Galar and D. Seneviratne, "A Hybrid Model-Based
Approach on Prognostics for Railway HVAC.", IEEE Access, Vol. 10,
at 91.11% accuracy. This suggests that our proposed method pp. 108117-108127, October 2022
can improve average performance by about 5%, [3] Y. Wang, C. Yang and W Shen, "A deep learning approach for heating
demonstrating the effectiveness of the GADF-based and cooling equipment monitoring.", 2019 IEEE 15th International
multimodal generation method for HVAC systems. Conference on Automation Science and Engineering (CASE) in
Fig. 2 presents the confusion matrix of Bi-GRU and Vision Vancouver, pp. 228-234, September 2019
Transformer, which showed the highest performance in their [4] A. Elngar, M. Arafa, A. Fathy, B. Moustafa, O. Mahmoud, M. Shaban
respective groups. The superior performance of the Vision and N. Fawzy, "Image Classification Based On CNN: A Survey",
Journal of Cybersecurity and Information Management, Vol. 6, No. 1,
Transformer is likely due to its positional encoding, which pp. 18-50, January 2021
shares similarities with the GADF's time-dependency feature, [5] G. Zhang, Y. Si, D. Wang, W. Yang and Y. Sun, "Automated detection
allowing it to consider both temporal and spatial of myocardial infarction using a gramian angular field and principal
characteristics. Although both Bi-GRU and Vision component analysis network.", IEEE Access, Vol. 7, pp. 171570-
Transformer exhibited higher false positives (FP) than false 171583, November 2019
- 108 -
[6] M. M. Islam and M. M. H. Shuvo, "DenseNet Based Speech Imagery
EEG Signal Classification using Gramian Angular Field.", 2019 5th
International Conference on Advances in Electrical Engineering
(ICAEE), pp. 149-154, September 2019
[7] A. Dosovitskiy, L, Beyer, A, Kolesnikov, D. Weissenborn, X. Zhai, T.
Unterthiner, M. Dehghani, M. Minderer, G. Heigold, S. Gelly, J.
Uszkoreit and N. Houlsby, "An Image is Worth 16x16 Words:
Transformers for Image Recognition at Scale", ICLR 2021, January
2021
[8] K. M. Tarwani and S. Edem, "Survey on Recurrent Neural Network in
Natural Language Processing.", International Journal of Engineering
Trends and Technology (IJETT), Vol. 48, No. 6, pp. 301-304, June
2017
- 109 -
Advancing Railway Track Segmentation:
Harnessing the Power of ResUNet and
Self-Supervised Learning Paradigms
Changjoon Park 1, Jeong Won Kang 2 and Jeonghwan Gwak 1,3,*
1
Dept. of IT·Energy Convergence, Korea National University of Transportation, Korea
2
Dept. of Transportation System Engineering, Korea National University of Transportation, Korea
3
Dept. of Software, Korea National University of Transportation, Korea
Email: [email protected], [email protected], [email protected]
Abstract—The paucity of labeled data specific to railway possess proprietary restrictions, preventing public
components presents a substantial obstacle in the cultivation and accessibility. Thus, scenarios that necessitate raw data
implementation of supervised learning models directed towards collection through rail inspection vehicles and manual
enhancing railway safety and operational efficiency. This study labeling are not only labor-intensive but also financially
introduces a self-supervised learning approach amalgamated burdensome [4]. Additionally, the specifications of fasteners,
with a ResUNet architecture to circumvent this constraint. The sleepers, and rails used to construct railway tracks can vary
proposed model leverages the potent feature extraction based on the type of train, country, and region. This variability
capabilities of ResNet50 within a UNet structure, striking a
introduces a significant diversity in component types across
delicate balance between contextual capture and spatial
jurisdictions, which may pose challenges when applying AI
localization. This approach significantly enhances the
segmentation of railway track components, which is pivotal to
models trained on publicly available datasets to real-world
railway safety. The developed model outperforms previous scenarios.
models in terms of identifying and segmenting rare types of rail
track components, thereby reinforcing the potential of self-
supervised learning strategies combined with ResUNet for fine-
grained image segmentation tasks in safety-critical domains. The
ramifications of this research extend beyond railway track
component segmentation and pave the way for addressing data
limitations in other railway safety analysis fields, contributing
significantly to the comprehensive safety and efficiency of
railway systems.
I. INTRODUCTION
Defects in railway track components exacerbate the
potential for accidents. Integral elements of railway tracks,
such as fasteners, sleepers, and the track's organic connective
structure [1], play a critical role in maintaining stability and
ensuring reliable operations. These components underpin the Figure. 1 Architecture of ResNet50 and ResUNet
track's structure and inhibit derailment or shifts by providing
requisite support [1]. Damage or defect to any of these In this paper, we propose a technique that merges the
elements compromises the organic interconnection, leading to Residual UNet (ResUNet) [5] and Self-Supervised Learning
a discernible degradation in the support capability. This can (SSL) [6] to address these issues. Our method leverages the
result in track instability or deformation, which subsequently nuanced feature extraction capabilities of the ResUNet
increases the risk of accidents. Therefore, comprehensive architecture, which is significantly enhanced using the pre-
monitoring of railway track component defects is paramount trained weights of ResNet50, and couples it with the
for the seamless operation of trains. However, this task comprehensive understanding of overall features gained
presents several challenges. through SSL. ResUNet, an advanced model for railway track
component monitoring, substitutes the encoder of the
The extensive range covered by railway tracks makes it conventional UNet [7] model with a pre-trained ResNet50 [8]
infeasible to establish fixed monitoring structures and feature extraction layer. This substitution facilitates more
inefficient for human-operated manual surveillance. To comprehensive feature extraction and fine-grained
overcome these challenges, modern railway track monitoring segmentation. SSL is a learning strategy that delivers robust
has turned to artificial intelligence (AI) models to ensure performance even with datasets that contain a minimal
robust performance [2, 3]. AI models excel in performance quantity of labeled data. It augments the model's
enhancement when trained on systematically labeled datasets. understanding of limited data by conducting Pretext Task
However, benchmark datasets pertaining to railways, Learning, which trains overall data features using unlabeled
especially those concerning railway track components, are data, and subsequently applies the trained weights to the
scarce [4]. The data used in individual studies or papers often desired model in a downstream process. The dataset for the
- 110 -
proposed technique is constituted by acquiring images of permitting the reflection of both values for a more
railway tracks from relevant authorities in various comprehensive performance assessment.
jurisdictions and conducting small-scale manual labeling for |A∩B|
training purposes. Figure 1 delineates the architecture of both JS = ()
|A∪B|
ResNet50 and ResUNet.
2 × |A ∩ B|
II. PROPOSED METHOD DC = (2)
|A|+|B|
- 111 -
Visual analysis results from the segmentation indicate that [5] Y. Zhang, Z. Chen, H. Yu, X. Yao and H. Li, "Feature Fusion for
the prediction outcomes for images of commonly occurring Segmentation and Classification of Skin Lesions," 2022 IEEE 19th
International Symposium on Biomedical Imaging (ISBI), pp. 1-5, 2022,
rail track components within the dataset (used for both SSL doi: 10.1109/ISBI52829.2022.9761474.
and SL) generally appeared similar. However, there was a [6] L. Jing and Y. Tian, "Self-Supervised Visual Feature Learning With
significant difference in the results for the rarely appearing Deep Neural Networks: A Survey," in IEEE Transactions on Pattern
components. The SSL-applied model noticeably had fewer Analysis and Machine Intelligence, vol. 43, no. 11, pp. 4037-4058, 2021,
misdetections compared to the model which showed the doi: 10.1109/TPAMI.2020.2992393.
highest performance in the previous analysis. The quantitative [7] O. Ronbneberger, P. Fischer and T. Brox, “U-Net: Convolutional
analysis provided an objective measure of the overall Networks for Biomedical Image Segmentation,” Medical Image
Computing and Computer-Assisted Intervention – MICCAI 2015, vol.
performance, while the qualitative visual analysis facilitated a 9351, pp. 234-241, 2015, doi:10.1007.978-3-319-24574-4_28
detailed review of the prediction outcomes for each class of [8] K. He, X. Zhang, S. Ren and J. Sun, "Deep Residual Learning for Image
rail track components. These combined analyses suggest that Recognition," 2016 IEEE Conference on Computer Vision and Pattern
the application of ResUNet with SSL may yield performance Recognition (CVPR), pp. 770-778, 2016, doi: 10.1109/CVPR.2016.90.
enhancements in monitoring railway track components. [9] X. Li, X. Hu, X. Qi, L. Yu, W. Zhao, P. A. Heng and L. Xing "Rotation-
Oriented Collaborative Self-Supervised Learning for Retinal Disease
IV. CONCLUSION AND FUTURE WORK Diagnosis," in IEEE Transactions on Medical Imaging, vol. 40, no. 9,
pp. 2284-2294, 2021, doi: 10.1109/TMI.2021.3075244.
This study introduces a novel methodology for enhancing
safety and efficiency in railway operations. By substituting the
encoder of the UNet model with the powerful feature
extraction capabilities of ResNet50 and leveraging the feature
learning ability of SSL for railway track component
segmentation, our technique has shown an ability to
effectively circumvent limitations such as scarcity of labeled
datasets, variability in railway track components across
regions, and high costs associated with dataset labeling. When
juxtaposed with the best-performing model trained on an
identical labeled dataset without SSL implementation, our
technique significantly mitigates the rate of misdetections.
While our research has predominantly been focused on the
segmentation of railway track components, the implications
suggest that our technique can contribute considerably
towards overall improvements in railway safety and efficiency.
Though the present application does not directly extend to the
analysis of other railway components, there exists a promising
prospect for such expansion in future investigations. Future
research will delve deeper into other Pretext Task Learning
methods to further optimize the SSL process and refine the
segmentation process for railway track components. By doing
so, we strive to continue advancing the application of AI in the
realm of railway safety and maintenance, pushing towards a
future characterized by safer and more efficient railway
operations.
ACKNOWLEDGMENT
This work was supported by the Basic Science Research
Program through the National Research Foundation of Korea
(NRF) funded by the Ministry of Education (Grant No. RS-
2023-00248444)
REFERENCES
[1] S. Bhardawaj, R. C. Sharma and S. K. Sharma, “A Survey of Railweay
Track Modelling,” International Journal of Vehicle Structures and
Systems, vol. 11, no. 5, 2019, doi: 10.4273/ijvss.11.5.08
[2] B. Kim, Y. Jeon, J. Kang and J. Gwak, “Multi-task Transfer Learning
Facilitated by Segmentation and Denoising for Anomaly Detection of
Rail Fasteners,” Journal of Electrical Engineering & Technology, vol.
18, pp. 2383-2394, 2022, doi: 10.1007/s42835-022-01347-1
[3] I. Kim, Y. Jeon, J. Kang and J. Gwak, “RAG-PaDiM: Residual Attention
Guided PaDiM for Defects Segmentation in Railway Tracks,” Journal
of Electrical Engineering & Technology, vol. 18, pp. 1429-1438, 2022,
doi: 10.1007/s42835-022-01346-2
[4] M. J. Pappaterra, F. Flammini, V. Vittorini and N. Besinovic, “A
Systematic Review of Architecture Intelligence Public Datasets for
Railway Applications,” Infrastructures, vol. 6, no. 10, 2021, doi:
10.3390/infrastructures6100136
- 112 -
August 22(TUE) - 25(FRI), 2023
Oral Session 4
Room : A435
Chair: Seungkwon Shin (Korea Railroad Research Institute, Korea)
- 113 -
Calculating FMEA variables of software failure
risks based on journals and metrics
Denis Valyayev Bolshibayeva Aigerim Dinargul Mukhammejanova
MSc student of Almaty University of PhD, Assistant Professor of the
Power Engineering and Department Computer Engineering and Almaty University of Power
Telecommunications Information Security (CSSE) Engineering and Telecommunications
Almaty, Kazakhstan [email protected] International IT University Almaty, Kazakhstan
orcid.org/0009-0007-9619- Almaty, Kazakhstan [email protected]
1743 [email protected] orcid.org/0000-0002-2693-4130
orcid.org/0000-0003-1191-4249
Assel Mukasheva
PhD, Associate Professor of the
Department of Information Systems and
Cybersecurity
Almaty University of Power Engineering
and Telecommunications
Almaty, Kazakhstan
[email protected] orcid.org/0000-
0001-9890-4910
- 114 -
II. BACKGROUND [12]. Many large companies develop their own tools for
anomaly detection based on different algorithms. Microsoft
A. Failure Modes and Effects Analysis has developed its own platform that receives real-time data
One of the most commonly used risk analysis models is through Apache Kafka and analyzes time series based on
Failure Modes and Effects Analysis (FMEA). In its Spectral Residual and Convolutional Neural Network model
traditional form FMEA consists of risk ranking using risk [13]. Most often, anomalies are detected using a predictive
priority number (RPN) based on occurrence (O), detection model, which is trained on the entire time series and
(D) and severity (S) (Fig. 1). If we refer to the Automotive constructs a prediction for the same time period. The
Industry Action Group (AIAG) and the German Association predicted and real values of the series are compared [14].
of the Automotive Industry (VDA), it is possible to make the Purely statistical models are also used to detect anomalies,
risk management system more efficient by using an Action like Interquartile Range, for example for early detection of
Priority (AP) with 3 grades instead of RPN: Low (L), DDoS attacks [15], or for satellite clock corrections [16].
Medium (M) and High (H) [7]. FMEA has difficulties in And an article [17] uses time-series analysis to identify
defining all 3 parameters, and the formula for calculating failures of sensor equipment.
RPN itself is quite controversial [8].
III. RELATED WORKS
A lot of research has been done in the field of software
error and failure detection. The paper [18] describes a
method for clustering failures in the OpenStack cloud
platform based on machine learning models. Using Integer
Linear Programming, namely a fast heuristic algorithm, as
well as failure analysis, they were able to achieve a nearly 2-
fold improvement in Mean Time To Failure [19]. In [20], a
comparative analysis of the application of statistical models
and various machine learning models such as Bidirectional
Long Short-Term Memory, Long Short-Term Memory,
Figure 1. A structure of FMEA model Recurrent Neural Network, for predicting workload failures
in cloud systems is given.
Risk analysis using FMEA is usually built on the
following steps: defining the subject area of the model, There are works on software failure prediction, such as
setting up a risk analysis team, identifying possible failure time series based failure prediction based on bug report data
modes, defining values for variables, defining recommended [21]. And study [22] analyses risk assesment methods based
actions. The FMEA model is actively used in the planning, on a predictive model for identifying defects in software.
design and development stages of software [8].
IV. MATERIALS AND METHODS
B. Text comparison
A. Data collection.
Text comparison models are based on determining the
distance between two texts. These methods are used when it In a typical monitoring and observability setup, Loki and
is necessary to determine how similar two texts are to each Prometheus are commonly used together to collect and
other. analyze logs and metrics, respectively. Loki is a horizontally-
scalable, highly-available, and multi-tenant log aggregation
In this study, text comparison models are applied to system. Prometheus is a popular open-source monitoring and
identify similar errors in journal entries. The Jaro-Winkler alerting toolkit. It collects and stores time-series data, often
similarity model has been chosen, which has been referred to as metrics, from various sources such as
extensively applied in various tasks but also has drawbacks applications, services, and infrastructure components.
in the form of high resource consumption [9].
To extract logs from Loki, you typically need to interact
C. Anomalies detection in time series with its API. The API provides endpoints for querying log
Time series analysis is a complex task, as it involves data based on various filters such as time range, labels, and
identifying and predicting multiple properties of the series, log patterns. Extracting metrics from Prometheus involves
such as trend and seasonality. Trend can be identified using querying its HTTP API or using Prometheus client libraries
regression analysis [10] or Fridman’s super smuother to retrieve metric data. The Prometheus API provides
algorithm (supsmu). In modern systems, the performance of endpoints for querying metrics based on labels, time range,
system services is continuously monitored to determine and aggregation functions.
normal and abnormal behaviour. This kind of time series can Application execution logs are extracted from the Loki
include not only trends, but can also be multi-seasonal with database and metrics from the Prometheus database and
complex characteristics [11]. Models such as supsmu and undergo initial processing before being uploaded to the data
STL decomposition allow the characteristics of the time warehouse. The data analysis algorithms then access the
series to be determined and anomalous values to be identified warehouse and perform processing. (Fig. 2)
from them.
Application performance metrics are time series in which
certain anomalies can be identified. The taxonomy of time
series anomalies includes anomaly classification: point,
context and collective anomalies, as well as many data types:
scalar, vector, matrix, tensor, attributes, fields and properties
- 115 -
However, the seasonal component is optional and can
store different patterns. To determine the trend and
seasonality of the data, the MSTL method for sequential
measurement of the seasonal components of the time series
described in [23] is used.
After determining the components of the time series, the
strength of contribution of the seasonal component is
determined as follows:
var(yt−Tt −St)
F= 1 − var(yt −Tt )
(4)
For the purpose of identification it was accepted that if Finally, all points in the time series are compared with
the error texts match by more than 80% then it is considered the extreme points of the time series adequacy interval. If a
that the record identifies the same error. With the message point does not fall within the interval, then it is considered
itself being more important than the rest of the record, abnormal. The interval is as follows:
weighting factors of 0.7 and 0.3 were added to the similarity Q1 − 3 ∗ IQR > xi < Q3 + 3 ∗ IQR (7)
of the message and the entire record accordingly. The final
formula for determining similarity is as follows: Thus only values that lag well behind the seasonally
constant component of the time series will be defined as
0.7kmsg + 0.3krec > 0.8 (1) anomalous.
The coefficient itself is calculated using the Jaro-Winkler D. Calculating FMEA variables
similarity formula:
The very first step is to identify the failure modes. In this
1 �
k=3 ∗( � +
�
+
�−�
), (2) study, the failure mode is equal to the unique error that was
1 �2 �
identified using the text comparison method.
where m is the number of matching characters in order, s1 To calculate the number of occurrences over a certain
and s2 are string lengths, and t is the number of transpositions: period of time, the number of occurrences is counted. In this
matching characters in different order, divided by 2. study, a value of 48 was taken as the maximum number of
Due to the unique errors detected, the processing occurrences of an error in 24 hours. In other words, it is
algorithm assigns an identifier to the error, calculates the assumed that an error cannot occur more than once every
number of occurrences, the average similarity coefficient for half hour on average. This makes it possible to normalize the
all detected records and stores the time stamps of the error occurrence to an FMEA value between 0 and 10:
occurrences. (Fig. 3) �
O = min(1, 48
∗ 10) (8)
- 116 -
with the difference between the other points taken as 0. This After extracting the test application's logs, it was found
calculates the minimum and maximum differences: that 5 error log entries were generated in a 24-hour period.
Using a text-matching algorithm, all entries were associated
max_diff = max(|yt(ti) − y_clean(ti)|); min_diff = min(|yt(ti) with a single bug and given their similarity coefficients to the
− y_clean(ti)|) (10) first occurrence of that error. The FMEA algorithms
Thus severity (S) is calculated as the average of the determined the Occurrence parameter to be 1 and the
normalized distances at anomalous points within a minute: Detection parameter to be 1, as the average similarity
coefficient is 0.992.
|yt(ti) − y_clean(ti)|−min_diff
S=avg( ) ∗ 10 (11)
���_����−���_���� TABLE I. ASSOCIATED LOG ENTRIES WITH SIMILARITY COEFFICIENT
Risk Priority Number (RPN) is calculated as the product # Timestamp Reference Similarity
of the track parameters: 1 2023-06-14T01:30:41.824Z - -
RPN = O ∗ D ∗ S (12) 2 2023-06-14T07:04:52.772Z 1 0.996984
Thus, the final risk rating is made up of all the parameters 3 2023-06-14T14:15:02.902Z 1 0.991499
considered in this study. (Fig. 4)
4 2023-06-14T16:25:11.101Z 1 0.990284
5 2023-06-14T18:36:33.037Z 1 0.991002
- 117 -
TABLE II. FINAL FMEA RECORD OF OBTAINED ERROR
Logger Name Occurrence Detection Severity RPN
MEMORY_ERROR 1 1 3 3
loki-0 6 2 0 0
- 118 -
played in software failures, Journal of Systems and Software, Volume (eds) Advances in Information and Communication. FICC 2021.
133, 2017, Pages 68-94, ISSN 0164-1212, Advances in Intelligent Systems and Computing, vol 1363. Springer,
https://doi.org/10.1016/j.jss.2017.06.069 Cham. https://doi.org/10.1007/978-3-030-73100-7_60
[2] Christoph A. Thieme, Ali Mosleh, Ingrid B. Utne, Jeevith Hegde, [14] Hansheng Ren, Bixiong Xu, Yujing Wang, Chao Yi, Congrui Huang,
Incorporating software failure in risk analysis––Part 2: Risk modeling Xiaoyu Kou, Tony Xing, Mao Yang, Jie Tong, and Qi Zhang. 2019.
process and case study, Reliability Engineering & System Safety, Time-Series Anomaly Detection Service at Microsoft. In Proceedings
Volume 198, 2020, 106804, ISSN 0951-8320, of the 25th ACM SIGKDD International Conference on Knowledge
https://doi.org/10.1016/j.ress.2020.106804 Discovery & Data Mining (KDD '19). Association for Computing
[3] Hussein David Tafur, Giacomo Barbieri, Carlos Eduardo Pereira, An Machinery, New York, NY, USA, 3009–3017.
FMEA-based Methodology for the Development of Control Software https://doi.org/10.1145/3292500.3330680
Reliable to Hardware Failures, IFAC-PapersOnLine, Volume 54, [15] Jina Kim, Hyeongwon Kang, Pilsung Kang, Time-series anomaly
Issue 1, 2021, Pages 420-425, ISSN 2405-8963, detection with stacked Transformer representations and 1D
https://doi.org/10.1016/j.ifacol.2021.08.047 convolutional network, Engineering Applications of Artificial
[4] Christoph A. Thieme, Ali Mosleh, Ingrid B. Utne, Jeevith Hegde, Intelligence, Volume 120, 2023, 105964, ISSN 0952-1976,
Incorporating software failure in risk analysis – Part 1: Software https://doi.org/10.1016/j.engappai.2023.105964
functional failure mode classification, Reliability Engineering & [16] Rochak Swami, Mayank Dave, Virender Ranga, IQR-based approach
System Safety, Volume 197, 2020, 106803, ISSN 0951-8320, for DDoS detection and mitigation in SDN, Defence Technology,
https://doi.org/10.1016/j.ress.2020.106803 2022, , ISSN 2214-9147, https://doi.org/10.1016/j.dt.2022.10.006
[5] M. Asif and J. Ahmed, "A Novel Case Base Reasoning and Frequent [17] Wei Xie, Guanwen Huang, Wenju Fu, Bao Shu, Bobin Cui,
Pattern Based Decision Support System for Mitigating Software Risk Mengyuan Li, Fan Yue, A quality control method based on improved
Factors," in IEEE Access, vol. 8, pp. 102278-102291, 2020, doi: IQR for estimating multi-GNSS real-time satellite clock offset,
10.1109/ACCESS.2020.2999036 Measurement, Volume 201, 2022, 111695, ISSN 0263-2241,
[6] Chandan Kumar, Dilip Kumar Yadav, A Probabilistic Software Risk https://doi.org/10.1016/j.measurement.2022.111695
Assessment and Estimation Model for Software Projects, Procedia [18] C. -Y. Duan, X. -Q. Chen, H. Shi and H. -C. Liu, "A New Model for
Computer Science, Volume 54, 2015, Pages 353-361, ISSN 1877- Failure Mode and Effects Analysis Based on k-Means Clustering
0509, https://doi.org/10.1016/j.procs.2015.06.041 Within Hesitant Linguistic Environment," in IEEE Transactions on
[7] Linhan Ouyang, Yushuai Che, Ling Yan, Chanseok Park, Multiple Engineering Management, vol. 69, no. 5, pp. 1837-1847, Oct. 2022,
perspectives on analyzing risk factors in FMEA, Computers in doi: 10.1109/TEM.2019.2937579
Industry, Volume 141, 2022, 103712, ISSN 0166-3615, [19] Domenico Cotroneo, Luigi De Simone, Pietro Liguori, Roberto
https://doi.org/10.1016/j.compind.2022.103712 Natella, Enhancing the analysis of software failures in cloud
[8] Marc-André Filz, Jonas Ernst Bernhard Langner, Christoph Herrmann, computing systems with deep learning, Journal of Systems and
Sebastian Thiede, Data-driven failure mode and effect analysis Software, Volume 181, 2021, 111043, ISSN 0164-1212,
(FMEA) to enhance maintenance planning, Computers in Industry, https://doi.org/10.1016/j.jss.2021.111043
Volume 129, 2021, 103451, ISSN 0166-3615, [20] W. Kong, M. Nabi and K. Goossens, "Run-Time Recovery and
https://doi.org/10.1016/j.compind.2021.103451 Failure Analysis of Time-Triggered Traffic in Time Sensitive
[9] Keil, J. M., (2019). Efficient Bounded Jaro-Winkler Similarity Based Networks," in IEEE Access, vol. 9, pp. 91710-91722, 2021, doi:
Search. In: Grust, T., Naumann, F., Böhm, A., Lehner, W., Härder, T., 10.1109/ACCESS.2021.3092572
Rahm, E., Heuer, A., Klettke, M. & Meyer, H. (Hrsg.), BTW 2019. [21] Vitaliy Yakovyna, Natalya Shakhovska, Software failure time series
Gesellschaft für Informatik, Bonn. (S. 205-214). DOI: prediction with RBF, GRNN, and LSTM neural networks, Procedia
10.18420/btw2019-13 Computer Science, Volume 207, 2022, Pages 837-847, ISSN 1877-
[10] A. Mukasheva, Z. Akanov and D. Yedilkhan, "Research of the 0509, https://doi.org/10.1016/j.procs.2022.09.139
Regression Analysis Methods for Predicting the Growth of Patients [22] Umamaheswara Sharma B., Ravichandra Sadam, How far does the
with Diabetes Mellitus," 2021 IEEE International Conference on predictive decision impact the software project? The cost, service
Smart Information Systems and Technologies (SIST), Nur-Sultan, time, and failure analysis from a cross-project defect prediction model,
Kazakhstan, 2021, pp. 1-7, doi: 10.1109/SIST50301.2021.9465975. Journal of Systems and Software, Volume 195, 2023, 111522, ISSN
[11] Kasun Bandara, Rob J Hyndman, Christoph Bergmeir, MSTL: A 0164-1212, https://doi.org/10.1016/j.jss.2022.111522
Seasonal-Trend Decomposition Algorithm for Time Series with [23] Kasun Bandara, Rob J Hyndman, Christoph Bergmeir, MSTL: A
Multiple Seasonal Patterns. arXiv, 2021, 2107.13462. Seasonal-Trend Decomposition Algorithm for Time Series with
[12] J. Gao, H. Wang and H. Shen, "Task Failure Prediction in Cloud Data Multiple Seasonal Patterns. arXiv, 2021, 2107.13462.
Centers Using Deep Learning," in IEEE Transactions on Services https://doi.org/10.48550/arXiv.2107.13462
Computing, vol. 15, no. 3, pp. 1411-1422, 1 May-June 2022, doi:
10.1109/TSC.2020.2993728.
[13] Shaukat, K. et al. (2021). A Review of Time-Series Anomaly
Detection Techniques: A Step to Future Perspectives. In: Arai, K.
- 119 -
Comparative analysis of Hadoop and Spark
performance through different data processing
tasks
Yerulan Suynullayev Sergiy Gnatyuk Didar Yedilkhan
MSc student of the Department of Doctor of Technical Science, Professor PhD, Associate Professor of the
Information Systems and Cybersecurity of the Department of Computer Science Department of Computer
Almaty university of power engineering and National Aviation University Engineering
telecommunications Kyiv, Ukraine Astana IT University
Almaty, Kazakhstan [email protected] Astana, Kazakhstan
[email protected] [email protected]
Abstract— Big Data processing platforms like Hadoop and would be impossible to see with smaller datasets. For
Spark are in high demand due to the increasing use of large example, in the field of medical technology and health care,
data sets in modern computing. In this paper, the performance big data is used to improve diagnosis, treatment and
of Hadoop and Spark was evaluated for iterative computing prevention of diseases such as diabetes mellitus. [2]
and real-time data processing applications based on metrics
such as runtime, resource utilization, and scalability with Both Hadoop [3] and Spark [4] have their unique
increasing data size. The comparison aimed to provide strengths and limitations when it comes to big data
guidance to researchers, practitioners, and entrepreneurs on processing. Hadoop, with its highly scalable Hadoop
which platform to use depending on their specific Distributed File System (HDFS) [5] and MapReduce
requirements. The study highlighted the strengths and programming model, has for many years been the best
weaknesses of both platforms and provided valuable insights solution for batch processing of large data sets. [6] On the
into optimizing big data applications' performance. The other hand, in-memory processing capabilities and Spark's
comparison used text documents and graphs for Word Count ability to handle streaming data have made it a popular
and PageRank tasks, and performance testing was performed choice for real-time streaming processing and iterative
on datasets of varying sizes. The results showed that Spark machine learning tasks. [7]
outperforms Hadoop in most applications, especially in
iterative computing and real-time data processing, due to its With the growing popularity of both platforms, it has
use of in-memory computation. However, Hadoop is best suited become necessary to compare their performance in different
for batch processing operations that require several steps. It data processing tasks. In this research paper, we aim to
can handle these operations in parallel on multiple cluster provide a comprehensive comparative analysis of the
nodes, ensuring fast handling of large amounts of data. This performance of Hadoop and Spark in different data
comprehensive performance comparison between Hadoop and processing tasks. The analysis will cover a range of use cases
Spark in iterative computing and real-time data processing including batch processing, streaming and machine learning,
applications provides valuable information for researchers, and assess the performance of both platforms based on
practitioners, and enterprises regarding the trade-offs and factors such as speed, scalability, fault tolerance and ease of
benefits of using these platforms for big data processing.
use.
Keywords— Hadoop, Spark, Iterative Computing, Real-Time The results of the study will enable organizations to make
Data Processing, Performance Evaluation informed decisions when choosing the data platform that best
suits their needs.
I. INTRODUCTION
In recent years, big data has become an integral part of II. BACKGROUD
almost every organisation. [1] The sheer scale and A. Overview on Hadoop
complexity of data from a variety of sources makes it
difficult to process and analyse using traditional methods. In The Apache Hadoop framework is designed to process
this scenario, distributed computing systems such as Apache large amounts of data in a distributed environment on
Hadoop and Apache Spark have become powerful tools for clusters of computers. Its main components are MapReduce,
processing large amounts of structured and unstructured data. HDFS, YARN, and. Together, these components provide the
These datasets can be used to analyse patterns and trends that ability to store, process, and analyse large amounts of data in
a distributed environment.
- 120 -
sequential operations are required. This is why Spark was
created
B. Overview on Spark
Apache Spark is a high-performance, open-source
distributed computing system for batch and real-time
processing of large amounts of data. Spark outperforms
MapReduce in iterative machine learning tasks and in 10-20x
execution speed applications [13], by using innovative
techniques such as in-memory computing and lazy
computing to minimize read and write operations to disk.
Figure 1. Hadoop components
An RDD in Spark is a distributed collection of items that
MapReduce is a parallel programming model that allows can be cached in memory and redistributed to cluster nodes
processing large amounts of data on distributed computing in case of failures. Working with RDD includes creating
clusters. [8] It is based on two stages: Map and Reduce, based on input data, transforming with operations like map
which are executed in parallel on different nodes of the or filter, caching in memory, performing actions like reduce
cluster. This model is often used in big data processing or collect, saving results in different formats. RDD is lazy
systems, such as Apache Hadoop, to efficiently process and and immutable, which allows to optimize execution of
analyse large amounts of structured and unstructured data. calculations and minimize reading and writing to disk. (Fig.
(Fig. 2) 3)
- 121 -
performs two main tasks: converting the user program into IV. MATERIALS AND METHODS
task units and scheduling these tasks on the performers. The
executors, in turn, perform the tasks and store the RDDs in A. Word count sort by keys.
memory. The application creates a SparkContext, which The task of Word count sort by keys is to count the
connects to the cluster manager that allocates resources for number of occurrences of each word in a text document, and
the application. The application code is then sent to the then sort the results alphabetically (by key).
executor and the SparkContext delivers the tasks for For the Word count sort by keys task in Hadoop and
execution. (Fig. 5)
Spark, words are counted from text files that are stored in a
distributed file system (HDFS) or flat data store (RDD). This
is done using mappers, which perform local word counts in
blocks of text, and redrawers, which merge the results of the
mappers and calculate the final number of each word. A
special comparator is used to sort the words by key. The
algorithm can be implemented using APIs for distributed
data and parallel computing, such as MapReduce API in
Hadoop and RDD API in Spark. (Fig. 6)
- 122 -
The reduce function processes all values for a given key The reduce function processes all the values for a given
in O(1) time. Thus the time complexity of the ReduceByKey key in O(1) time. Thus the time complexity of the reduce
transform is defined by: job is given by:
𝑁 𝑁
T(ReduceByKey) = O( ) (6) T(Reduce) = O( ) (10)
𝑀 𝑀
The sortBy function sorts the output RDD based on the The user comparator sorts the output based on count as
key and count in time O(N logN/N). Thus, the time the primary key and word as the secondary key in time O(N
complexity of the secondary sort is defined by: 𝑁
log𝑀).
𝑁
T(Secondary_Sort) = O(N log𝑁) (7) The total time complexity of a Hadoop job can be
calculated as follows:
The total time complexity of a Spark job can be
calculated as follows: T(Hadoop) = T(Map) + T(Reduce) + T(Secondary_Sort) =
𝑁 𝑁 𝑁 𝑙𝑜𝑔𝑁
T(Spark) = T(Transform) + T(ReduceByKey) + O(N) + O(𝑀) + O(N log𝑀) = O( 𝑀 ) (11)
𝑁 𝑁 𝑁
T(Secondary_Sort) = O(N) + O(𝑀) + O(N log𝑁) = O(𝑀) + b) Spark
𝑁
(N log𝑁)) (8) The map function processes each word in O(1) time.
B. Word count sort by values Thus the time complexity of the transformation is defined
by:
Word count sort by values is the task of counting the
number of unique words in a large volume of text data and T(Transform) = O(N) (12)
sorting the results by value (i.e. by the number of times the
word is repeated). The reduce function processes all values for a given key
in O(1) time. Thus the time complexity of the ReduceByKey
Apache Hadoop uses MapReduce framework to solve transform is defined by:
this problem. The process of solving the problem consists of 𝑁
two steps: map and reduce. In the map step, each line of the T(ReduceByKey) = O(𝑀) (13)
file is split into words, which become keys and a unit
becomes a value. Then obtained key-value pairs are passed The sortByValue function sorts the output RDD based
to reduce stage, where the total number of keys for each on the count as primary key and the word as secondary key
𝑁
word is calculated. The result is sorted by frequency of in time O(N log𝑀).
occurrence of the words and written to the output file.
The total time complexity of the Spark assignment can
Apache Spark uses the groupByKey() operation to solve
be calculated as follows:
this problem. First the text file is loaded into RDD (Resilient
Distributed Dataset). Then RDD is converted using flatMap() T(Spark) = T(Transform) + T(ReduceByKey) +
operation which splits lines into words. The resulting key- 𝑁 𝑁 𝑁 𝑙𝑜𝑔𝑁
T(Secondary_Sort) = O(N) + O(𝑀) + O(N log𝑁) = O( 𝑀 )
value pairs are combined using reduceByKey() operation,
which counts the number of words. The result is then sorted (14)
by value using the sortBy() method and written to the output C. PageRank
file.
PageRank is an algorithm used by search engines to
In both cases the result is a list of words sorted in assess the importance of pages on the Internet. It is based on
descending order of the number of occurrences in the text the fact that a web page is considered more important if other
data. (Fig. 7) web pages link to it. In simple terms, PageRank gives each
page a weight based on the number of links that point to that
page and their own weight. The algorithm also takes into
account the number of links per page and the weight of each
of those pages. [18]
The algorithm was originally developed by Larry Page
and Sergey Brin, co-founders of Google. They used it to
Figure 7. Sample word count data sorted by value determine the relevance of a page in search engine rankings.
The formula for calculating PageRank was proposed by
Word count sort by values can be modelled as follows: Google founders Brin and Page in 1998. [19]
Word count sort by values in Hadoop and Spark is O(N 𝑅𝑗
𝑅𝑖 = 𝑑 ∗ ∑ +1−𝑑 (15)
logN), where N is the number of words in the input file. 𝑁𝑗
- 123 -
V. PERFORMANCE TESTS AND RESULTS
The performance comparison between Hadoop and Spark
was performed on a VMware Workstation Pro virtual
machine with CentOS 7 operating system. Word Count,
sorting by keys and values and PageRank tasks were used.
These tasks were chosen because they allow us to evaluate
the performance of the two frameworks in near real-world
conditions, as they require parallel processing of large
amounts of data. The PageRank algorithm involves several
iterations of computation, while Spark processes data more
efficiently by storing intermediate data in the cache.
This experiment compared the performance of Hadoop Figure 8. Word count sort by keys result
and Spark on the same cluster machines, using HDFS as the B. Word count sort by values result
file storage system. The examples implemented in both
frameworks were based on the same programming language In an experiment comparing the performance of Hadoop
and algorithm. The code for the tasks was written in Python, and Spark in the Word count sort by values task (Fig. 9) with
which used several libraries such as MrJob, PySpark, increasing amount of processed data, it was found that Spark
NetworkX. significantly outperformed Hadoop. On a 100 MB dataset,
Spark performed 8 times better than Hadoop. When the
The experiment was run 10 times to account for errors amount of data was increased to 500MB, 1GB and 2GB,
caused by unstable network traffic. Errors could occur both Spark continued to perform better, outperforming Hadoop by
when running small jobs for a few seconds and when running a factor of 6. This significant performance difference is due
large jobs for tens of seconds. The results of each run were to the nature of Spark's architecture, which allows for in-
recorded and analysed to get the average performance for memory computation while minimizing reads and writes to
each framework. The results obtained were analyzed and disk. At the same time, Hadoop requires frequent reads and
presented as graphs using Matplotlib library. Based on the writes to disk, which slows down the framework.
data obtained, conclusions were drawn about the
performance of Hadoop and Spark.
A. Word count sort by keys result
Table 1 shows the amount of data used in this and the
following Word count sort by values study.
Name Size
100M.csv 101.36MB
500M.csv 497.22MB
1G.csv 1001.44MB Figure 9. Word count sort by values result
2G.csv 1.95GB The Word count sort by values and Word count sort by
keys tasks revealed that the main difference in performance
between Spark and Hadoop is the result sorting methods.
The results of the experiment for the Word count sort by Spark uses the sortBy() method to sort results by value,
keys task show that Spark is significantly faster than Hadoop which allows you to specify the sort order and the number of
when the amount of data being processed is increased. concurrent operations. To sort results by key, Spark uses the
sortByKey() method. Hadoop uses the TextComparator class
It can be concluded that the difference in performance to sort results by value and the LongWritable class to sort
becomes noticeable when processing larger amounts of data. results by key. Spark can be faster than Hadoop in the Word
For example, when processing 100 and 500 MB, Spark is 3 count sort by values task due to the sortBy() method and the
times faster than Hadoop, but when processing from 1 GB of ability to perform calculations in memory, which speeds up
data, Spark can complete the task 5 times faster than data processing. In the Word count sort by keys task, both
Hadoop. (Fig. 8) frameworks can potentially show similar performance, but
This difference in processing speed is due to the fact that Spark may be more efficient by using the sortByKey()
Spark uses a more efficient approach to data processing, method.
based on distributed computation in memory, and also C. PageRank result
allowing the results of intermediate operations to be cached.
In contrast, Hadoop uses a more general MapReduce model, TABLE II. DATASETS FOR PAGERANK
which may be less efficient when processing large amounts
Name Size Nodes Edges
of data or performing complex operations.
AMAZON.txt 46.73MB 403,394 3,387,388
- 124 -
The results of the experiment showed that Spark performance. In this case it is recommended to use additional
significantly outperformed Hadoop in the PageRank task on optimizations such as combiners and data partitioning to
all three data volumes. On average, Spark was 12 times speed up sorting.
faster than Hadoop. (Fig. 10)
Thus, to achieve maximum performance in the word
In the PageRank task, where we have to calculate the count sort by keys task, you should choose the optimal
importance of pages on the web, Spark may be faster than amount of RAM, considering the size of the data to be
Hadoop due to its parallelization ability. PageRank is an processed, and use additional optimizations to speed up
iterative algorithm that continuously processes data until the sorting.
required accuracy is achieved. Spark can easily parallelize
the iteration process across multiple nodes, which can
significantly speed up data processing. While Hadoop can
also be used to perform this task, but due to the limitations of
the distributed file system and slower read/write data, it may
be slower than Spark.
- 125 -
difference in task execution time on 1, 2 and 3 GB of RAM [7] D. Zhu, R. Ma, Y. Chai, B. Cai and L. Han, "Energy big data
was only a few seconds. automatic desensitization model based on Spark parallel computing
framework," 2021 2nd International Conference on Big Data
So, in order to get the best performance when processing Economy and Information Management (BDEIM), Sanya, China,
large amounts of data in Spark, it is recommended to allocate 2021, pp. 89-92, doi: 10.1109/BDEIM55082.2021.00026.
as much RAM as possible to speed up the execution of the [8] A. K. Rai and A. K. Malviya, "Testing MapReduce program using
Induction Method," 2020 IEEE International Students' Conference on
task. However, when processing smaller amounts of data, a Electrical,Electronics and Computer Science (SCEECS), Bhopal,
smaller amount of RAM can also be limited without India, 2020, pp. 1-5, doi: 10.1109/SCEECS48394.2020.178.
significantly degrading performance. [9] T. H. Aung and W. T. Zaw, "Improved Job Scheduling for Achieving
Fairness on Apache Hadoop YARN," 2020 International Conference
CONCLUSION on Advanced Information Technologies (ICAIT), Yangon, Myanmar,
2020, pp. 188-193, doi: 10.1109/ICAIT51105.2020.9261793.
The results found that in most cases, especially when
[10] D. Veeraiah and J. N. Rao, "An Efficient Data Duplication System
dealing with iterative algorithms, Spark performs better than based on Hadoop Distributed File System," 2020 International
Hadoop. Conference on Inventive Computation Technologies (ICICT),
Coimbatore, India, 2020, pp. 197-200, doi:
Spark outperforms Hadoop for iterative algorithms 10.1109/ICICT48043.2020.9112567.
because Spark uses in-memory computation to perform [11] H. Ahmed, M. A. Ismail and M. F. Hyder, "Performance optimization
tasks, whereas Hadoop writes results to disk after each step. of Hadoop cluster using linux services," 17th IEEE International
This means that when dealing with large datasets and Multi Topic Conference 2014, Karachi, Pakistan, 2014, pp. 167-172,
repeatedly traversing them, Spark can significantly speed up doi: 10.1109/INMIC.2014.7097331.
the execution of algorithms such as machine learning and [12] Boduo Li, Edward Mazur, Yanlei Diao, Andrew McGregor, and
deep learning, which often use iterative approaches. In Prashant Shenoy. 2011. A platform for scalable one-pass analytics
using MapReduce. In Proceedings of the 2011 ACM SIGMOD
addition, Spark has a handy API for dealing with iterative International Conference on Management of data (SIGMOD '11).
algorithms, such as GraphX, which provides high-level Association for Computing Machinery, New York, NY, USA, 985–
operations for dealing with graphs and graph-related 996. https://doi.org/10.1145/1989323.1989426
algorithms. [13] Matei Zaharia, Mosharaf Chowdhury, Tathagata Das, Ankur Dave,
Justin Ma, Murphy McCauley, Michael J. Franklin, Scott Shenker,
Thus, Spark is a more efficient tool for dealing with and Ion Stoica. 2012. Resilient distributed datasets: a fault-tolerant
iterative algorithms compared to Hadoop and can abstraction for in-memory cluster computing. In Proceedings of the
significantly reduce runtime for machine learning and other 9th USENIX conference on Networked Systems Design and
iterative applications. Implementation (NSDI'12). USENIX Association, USA, 2.
[14] Nasim Ahmed, Andre L. C. Barczak, Teo Susnjak et al. A
However, it should be noted that Spark is not suitable for Comprehensive Performance Analysis of Apache Hadoop and
applications that do asynchronous fine-grained general state Apache Spark for Large Scale Data Sets Using HiBench, 17 August
2020, PREPRINT (Version 1) available at Research Square
updates and may also consume a significant amount of https://doi.org/10.21203/rs.3.rs-43526/v1
memory. If task speed is not a critical factor and there is
[15] Farhan MN, Habib MA, Ali MA. A study and performance
insufficient memory available, Hadoop would be a better comparison of MapReduce and Apache spark on twitter data on
choice. However, for applications that are speed-sensitive or Hadoop cluster. Int J Inf Technol Comput Sci 2018.
use iterative algorithms and have sufficient memory, Spark https://doi.org/10.5815/ijitcs.2018.07.07
will be the preferred option. [16] Yassine Benlachmi, Abdelaziz El Yazidi and Moulay Lahcen
Hasnaoui, “A Comparative Analysis of Hadoop and Spark
REFERENCES Frameworks using Word Count Algorithm” International Journal of
Advanced Computer Science and Applications(IJACSA), 12(4),
[1] Wang J. et al. Big data analytics for intelligent manufacturing 2021. http://dx.doi.org/10.14569/IJACSA.2021.0120495
systems: A review //Journal of Manufacturing Systems. – 2022. – Т.
62. – С. 738-752. https://doi.org/10.1016/j.jmsy.2021.03.005 [17] Ahmed, N., Barczak, A.L.C., Susnjak, T. et al. A comprehensive
performance analysis of Apache Hadoop and Apache Spark for large
[2] Mukasheva, A., Rakhmetulayeva, S., Astaubayeva, G., & Gnatyuk, S. scale data sets using HiBench. J Big Data 7, 110 (2020).
(2022). Developing a system for diagnosing diabetes mellitus using https://doi.org/10.1186/s40537-020-00388-5
bigdata. Eastern-European Journal of Enterprise Technologies,
5(2(119), 75–85. https://doi.org/10.15587/1729-4061.2022.266185 [18] F. U. Zambuk, A. Y. u. Gital, S. Boukary, F. Jauro and H. Chiroma,
"Evaluation of Iterative Pagerank Algorithm for Web Page Ranking,"
[3] Hadoop Documentation http://hadoop.apache.org/ 2019 4th International Conference on Electrical, Electronics,
[4] Spark Documentation http://spark.apache.org/ Communication, Computer Technologies and Optimization
[5] R. Rathidevi and R. Parameswari, "Performance Analysis of Small Techniques (ICEECCOT), Mysuru, India, 2019, pp. 365-370, doi:
Files in HDFS using Clustering Small Files based on Centroid 10.1109/ICEECCOT46775.2019.9114728.
Algorithm," 2020 Fourth International Conference on I-SMAC (IoT [19] Monica Bianchini, Marco Gori, and Franco Scarselli. 2005. Inside
in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, PageRank. ACM Trans. Internet Technol. 5, 1 (February 2005), 92–
2020, pp. 640-643, doi: 10.1109/I-SMAC49090.2020.9243418. 128. https://doi.org/10.1145/1052934.1052938
[6] A. K. Rai and A. K. Malviya, "Testing MapReduce program using
Induction Method," 2020 IEEE International Students' Conference on
Electrical,Electronics and Computer Science (SCEECS), Bhopal,
India, 2020, pp. 1-5, doi: 10.1109/SCEECS48394.2020.178.
- 126 -
The Use Of Machine Learning Methods In The Field Of Retail
Kuanyshbek N.S, Sapakova S.Z*
Kazakh national university named al-Farabi
The development of small and medium-sized businesses is the main instrument of economic
growth and socio-political modernization. A particularly important role is played by the
implementation of private property in real life and as a material basis for the formation of the
middle class. Consequently, as the share of small and medium-sized businesses in the economy
increases, our country is getting better, the socio-economic situation of the population is
improving. Retail trade is one of the biggest industries in the world, and it can be considered as
the process of buying goods for the purpose of reselling them to the end consumer.
Recent technological advances have had a significant impact on the retail industry (Shankar et al.,
2021). For example, food retailing has large changes in this century as more and more consumers
buy products online (Kureshi & Thomas, 2019). Over the past few decades, a lot of effort has been
spent on developing and improving forecasting models. In the retail sector, sales forecasting may
assist managers understand customers, forecast their future willings. Then companies can optimize
storage facilities, shelf space and display cases for the preparation of inventory and the
development of product strategies. In this paper, we consider the results of the study in relation to
retail forecasting, delineating the boundaries of the field in order to focus on food.
In particular, this work focused on the applicability of machine learning methods. Demand
forecasting is valuabletask in the retail sector in terms of minimizing costs, establishing the correct
inventory level, optimal use of warehouse space and reducing the problem of lack of goods in
stock. Accurate forecasting of future demand is a difficult task for retailers and wholesalers due to
sudden changes in demand levels, lack of historical data, new trends and seasonal spikes in
demand.
To get good accuracy, you need to choose the right models. There are various models available
for regression analysis, but three regression models are used for this article: Decision Tree,
Random Forest and Gradient Boosting. After implementing these models, we measure accuracy
by dividing the dataset into two parts, which are the training dataset and the test dataset. The
performance of all algorithms was evaluated based
on the mean absolute error (MAE), mean square error (RMSE), mean square error (MSE) and the
coefficient of determination (R2).
The indicators of all R-Square models tend to the 1st and show 98 and 99% accuracy, which
is a good indicator. Based on the analysis of the results obtained, it was revealed that the most
effective model for sales forecasting is the random forest model and the decision tree and Gradient
Boosting shows competitive results. The mean square error of a random forest is 0.083, and the
difference between actual and projected food prices is 0.041.
- 127 -
A study on false defect management of PCB
ICT inspection using failure rate Estimation
Changmok Park 1* and Sangyule Choi 2
Induk University, South Korea
Email: [email protected], [email protected]
Abstract—This paper is about a data analysis method for II. PROPOSED METHOD
managing false defects in PCB ICT (In-Circuit Test) facilities.
In a typical PCB processing line, ICT facilities used to inspect
the electrical properties of final products, and automatic
A. Definition of Fake NG
inspections performed on more than thousands of items. These
facilities consist of fixtures, relay boards and control circuits.
The fixture is composed of numerous contact pins, and the relay Normal measurement data of ICT looks like the figure
board is composed of numerous switching parts. These facilities below.
deteriorate over time and cause false defects. In this study, we
analyze the automatic inspection information data to identify
the cause of false defects. We develop an optimization model to
utilize inspection data as facility maintenance information.
I. INTRODUCTION
- 128 -
B. Statistical methodology for finding Fake NG
If you get the following Fake NG Rate by utilizing the data The daily failure rate of pin estimated as following by
for a certain period of time. optimization method.
- 129 -
August 22(TUE) - 25(FRI), 2023
Oral Session 5
Room : A437
Chair: Chulmin PARK (Korea Railroad Research Institute, Korea)
- 130 -
VIDEO STREAM ANALYSIS ALGORITHMS
BASED ON THE OPENCV LIBRARY USING
THE RASPBERRY P S PLATFORM
Adilzhan Kereyev1, Bauyrzhan Shokanov2*, Lyazzat Kaparova*3, Elubayeva Dina*4
1 Aktobe Regional University named after K. Zhubanov, Aktobe, Kazakhstan
e-mail: [email protected]
*2 Nazarbayev Intellectual school of the Physics and Mathematics direction of Aktobe, Kazakhstan
e-mail: [email protected]
*3 Aktobe Regional University named after K. Zhubanov, Aktobe, Kazakhstan
e-mail: [email protected]
*4 Aktobe Regional University named after K. Zhubanov, Aktobe, Kazakhstan
e-mail: [email protected]
Abstract - This scientific article is devoted to the study and advantages make Raspberry Pi an ideal platform for the
application of video stream processing algorithms based on the implementation of various robotic projects, including video
OpenCV library, including video capture, object detection and stream processing.
object motion detection based on optical flow. To implement OpenCV finds use in many fields; computer vision, robotics,
these algorithms, Python software was used, followed by the
machine learning and etc. Due to its powerful tools and
development of its own system based on the studied ones, and its
further implementation on the Raspberry Pi robotic platform.A flexibility, OpenCV is becoming an increasingly popular tool
natural experiment was conducted to detect objects on a video for processing and analyzing video streams, which makes it
stream. A review of a number of popular methods and important for solving various tasks in the field of robotics.
algorithms for analyzing the video stream from the point of view
of speed, accuracy of definition, and the possibility of II. METHODS AND MATERIALS
implementation on microcomputers is carried out.
Experiments were conducted, as a result of which the Software.
effectiveness of using video stream processing algorithms based
on the OpenCV library for solving problems in the field of
Python is one of the most popular and convenient
computer vision and robotics was confirmed. The advantages of
these algorithms in high accuracy and speed of video processing programming languages that is often used in robotics. Python
were especially highlighted. has extensive capabilities that allow user to control robots and
Thus, this article is of great importance for developers and develop applications for robotics. To develop robotic
researchers working in the field of computer vision and robotics, applications in Python, many developers use specialized
who can use video stream processing algorithms based on the development environments (IDEs).
OpenCV library to solve various tasks. Python IDE is a software that allows programmers to create
and debug Python code. In robotics, the Python IDE is used
Key words: openCV, video processing, object detection, optical to develop robotic applications like robot control systems,
flow, python, raspberry Pi, computer vision, robotics, video
robotic manipulators, and autonomous mobile robots.
capture, motion detection, image processing
One of the most popular Python IDE for robotics is PyCharm.
I. INTRODUCTION PyCharm has many features that allow developers to quickly
create and debug robotic applications. Among the main
Currently, video stream analysis is considered as one of the features of PyCharm the followings also should be noted:
most urgent tasks in the field of robotics and computer vision.
In order to solve this task, various image processing • ROS (Robot Operating System) Support: PyCharm
algorithms are being used to extract information from the has integration with ROS, which allows developers
video stream and use it for decision-making to create ROS-nodes that can be used to control
In this article, we present algorithms for video stream robots and robotic manipulators.
processing and analyzing based on the OpenCV library, using
a two-wheeled robot with a Raspberry Pi processor. As the Debugging: PyCharm allows developers to adjust code using
main tool for image processing, we use OpenCV, which a debugger that allows you to set breakpoints, view variables,
provides a powerful and flexible set of tools for working with and execute code step by step.
images and videos. Dependency Management: PyCharm allows you to manage
The advantages of Raspberry Pi as a platform for robots dependencies that are used in robotic applications, such as
include low cost, small size and power consumption, as well Python libraries and ROS packages.
as a wide range of sensors and modules available. These
- 131 -
Auto-completion: PyCharm has the ability to automatically In general, Raspberry Pi provides many opportunities for
supplement code, which allows developers to quickly create creating and controlling robots, due to its flexibility, low cost
code for robotic applications. and support for various programming languages. In addition,
Integration with Git: PyCharm allows developers to work it has a large developer community and can be easily
with Git repositories, which simplifies version control and integrated with other platforms. All these factors make
combined work on the project. Raspberry Pi one of the best platforms for robot development,
both for beginners and experienced developers.
• Built-in Terminal: PyCharm includes a built-in The use of Raspberry Pi in robotics has already led to the
terminal that allows you to run commands in the creation of a wide range of robots, from self-driving cars to
terminal without having to switch to another controlled drones. This platform is also used in various fields
window. such as education, industry and research.
Despite the fact that Raspberry Pi can be used to create simple
• Support for various platforms: PyCharm can be used and complex robots, it has its limits. For example, it may not
on various operating systems, such as Windows, be too powerful for some complex tasks that require a lot of
macOS and Linux, this provides versatility in the computing power. You may also need to use additional
development of robotic applications. modules and components to implement certain functions.
All in all, Raspberry Pi is a convenient and affordable robot
In addition to PyCharm, there are also other Python IDEs that development platform that can be used in various fields of
can be used to develop robotic applications, such as Visual robotics. Its capabilities continue to expand, and there are
Studio Code, Spyder and Jupyter Notebook. many projects and ideas that can be implemented using this
platform.
Hardware.
III. METHODS AND ALGORITHMS OF VIDEO
Raspberry Pi is a miniature computer that can be used as a STREAM ANALYSIS.
robotic platform for the development of various types of
robots. It was created with the aim of providing accessible Video stream analysis is an important problem in the field of
computer technology and programming to a wide audience. computer vision and image processing. In this paper, we
Raspberry Pi offers many possibilities for creation and robot describe methods and algorithms for video stream analyzing
control, thanks to its flexibility and low cost. using the Python programming language and the OpenCV
Low Cost: One of the main advantages of Raspberry Pi is its library.
low cost. This allows developers to create more affordable To analyze the video stream, we use the following methods:
robots for use in educational establishments, laboratories and
home projects. Capturing a video stream
Flexibility: Raspberry Pi has many features, such as To capture a video stream, we use the Video Capture function
connecting sensors, motors, cameras and other components, from the OpenCV library. This function allows us to open a
which allows user to create different types of robots. In video stream from the camera or from a file and start
addition, the Raspberry Pi can be used as the main controller capturing data.
to control other devices and sensors. For example, the following code shows how to capture a
Operating System Availability: Raspberry Pi comes with video stream from a camera:
Linux operating system, which provides a powerful and import cv2
flexible framework for robot development. Developers can cap = cv2.VideoCapture(0)
use Python, C++ and other programming languages to while True:
develop software and control robots. ret, frame = cap.read()
A broad community of developers: Raspberry Pi has a large cv2.imshow('frame', frame)
community of developers who actively share knowledge and if cv2.waitKey(1) & 0xFF == ord('q'):
experience about the use of this platform in robotics. This break
allows new developers to quickly get help and solve problems cap.release()
that arise. cv2.destroyAllWindows()
Integration with other platforms: Raspberry Pi can be easily
integrated with other platforms such as Arduino, etc. This IV. MOTION DETECTION
provides greater flexibility in the development of robots,
allowing the use of various components and devices. To detect motion, we use an optical flow algorithm. This
ROS Support: Raspberry Pi supports Robot Operating algorithm allows to determine the direction and speed of
System (ROS), which is a popular platform for developing movement of objects in the video.
robotic applications. This allows developers to use ROS for For instance, the following code shows how to detect motion
robot control, data visualization, and many other functions. using an optical flow algorithm:
- 132 -
import cv2 if cv2.waitKey(1) & 0xFF == ord('q'):
cap = cv2.VideoCapture(0) break
ret, frame1 = cap.read() cap.release()
prvs=cv2.cvtColor(frame1, cv2.COLOR_BGR2GRAY) cv2.destroyAllWindows()
mask = np.zeros_like(frame1)
while True:
ret, frame2 = cap.read()
next=cv2.cvtColor(frame2,cv2.COLOR_BGR2GRAY)
flow = cv2.calcOpticalFlowFarneback(prvs, next, None,
0.5, 3, 15, 3, 5, 1.2, 0)
mag, ang = cv2.cartToPolar(flow[..., 0], flow[..., 1])
mask[..., 0] = ang * 180 / np.pi / 2
mask[..., 2] = cv2.normalize(mag, None, 0, 255,
cv2.NORM_MINMAX)
rgb = cv2.cvtColor(mask, cv2.COLOR_HSV2BGR)
cv2.imshow('frame2', rgb)
if cv2.waitKey(1) & 0xFF == ord('q'):
break
prvs = next
cap.release()
Fig. 1. The result of testing the algorithm for capturing a video stream from
cv2.destroyAllWindows() a webcam
V. OBJECT DETECTION We see that the algorithm successfully captures video from
the computer's webcam and does not close until the
To detect objects, we use the Haar cascade classifiers combination of keys 1 and q is pressed in order to complete
algorithm. This algorithm allows to detect objects in the the algorithm.
video. For example, faces, cars, animals, etc. In order to analyze your own video using this algorithm, you
To visualise, the following code shows how to detect faces need to replace the line:
using the Haar cascade classifier algorithm: cap = cv2.VideoCapture(0)
to the line:
import cv2 cap=cv2.VideoCapture("path/to/your/video/file"),
face_cascade=cv2.CascadeClassifier('haarcascade_fronta where "path/to/your/video/file" - is a path to your video file.
lface_default.xml') After replacing this line, the code will read the video file
cap = cv2.VideoCapture(0) instead of capturing video from the webcam, and you will be
while True: able to analyze your own video.
ret, frame = cap.read()
gray = cv2.cvtColor(frame, cv2.COLOR_BGR2GRAY)
faces = face_cascade.detectMultiScale(gray, 1.3, 5)
for (x, y, w, h) in faces:
cv2.rectangle(frame, (x, y), (x + w, y + h), (255, 0, 0), 2)
cv2.imshow('frame', frame)
if cv2.waitKey(1) & 0xFF == ord('q'):
break
cap.release()
cv2.destroyAllWindows()
Let's run the video stream capture algorithm on the computer Fig 2. The result of testing the video stream capture algorithm based on an
external video file
using the python IDE and applying the code below to look at
the result.
import cv2 Now, run the algorithm for capturing the video stream and
cap = cv2.VideoCapture(0) motion detection while using the optical stream, applying
while True: the code below and look at the result:
ret, frame = cap.read() import cv2
cv2.imshow('frame', frame) import numpy as np
- 133 -
cap = cv2.VideoCapture(0) Let's run the Haar cascade classifiers algorithm to detect
ret, frame1 = cap.read() objects in the video using the code below and look at the
prvs=cv2.cvtColor(frame1,cv2.COLOR_BGR2GRAY) result.
mask = np.zeros_like(frame1)
while True: face_cascade=cv2.CascadeClassifier('C:/Users/shokanov_b
ret, frame2 = cap.read() .akb/PycharmProjects/pythonProject/venv/Lib/sitepackages/
next=cv2.cvtColor(frame2, cv2/data/haarcascade_frontalface_default.xml')
cv2.COLOR_BGR2GRAY) cap = cv2.VideoCapture(0)
flow= cv2.calcOpticalFlowFarneback(prvs, next, while True:
None, 0.5, 3, 15, 3, 5, 1.2, 0) ret, frame = cap.read()
mag, ang = cv2.cartToPolar(flow[..., 0], flow[..., 1]) gray=cv2.cvtColor(frame,cv2.COLOR_BGR2GRAY)
mask[..., 0] = ang * 180 / np.pi / 2 faces = face_cascade.detectMultiScale(gray, 1.3, 5)
mask[..., 2] = cv2.normalize(mag, None, 0, 255, for (x, y, w, h) in faces:
cv2.NORM_MINMAX) cv2.rectangle(frame, (x, y), (x + w, y + h), (255, 0,
rgb=cv2.cvtColor(mask,cv2.COLOR_HSV2BGR) 0), 2)
cv2.imshow('frame2', rgb) cv2.imshow('frame', frame)
if cv2.waitKey(1) & 0xFF == ord('q'): if cv2.waitKey(1) & 0xFF == ord('q'):
break break
prvs = next cap.release()
cap.release() cv2.destroyAllWindows()
cv2.destroyAllWindows()
CONCLUSION
Fig 3. The result of testing the motion detection algorithm using optical As a result, in this scientific article, algorithms for processing
flow. a video stream based on the OpenCV library, using Python
software and the Raspberry Pi robotic platform, were
reviewed and tested. The tasks of video capture, object
detection and object motion detection based on optical flow
were successfully implemented.
In the outcomes of the experiments, it was revealed that the
algorithms for processing video streams based on the
OpenCV library have high accuracy and speed of video
processing, which makes them an effective tool for solving
problems in the field of computer vision and robotics.
Thereby, the obtained results indicate the possibility of using
video stream processing algorithms based on the OpenCV
library in various fields of science and technology where high
accuracy and speed of video processing are required.
Fig. 4 The result of testing the motion detection algorithm using an optical
stream based on an external video file REFERENCES
- 134 -
[1] Kaushik Das Sharma, Gargi Datta, and Sanjoy Kumar
Saha. "Real-time surveillance system using Raspberry Pi and
OpenCV." Procedia Computer Science 58 (2015): 561-568.
[2]Kamil Ferenc, Paweł Ksieniewicz, and Piotr Wieczorek.
"Application of the Raspberry Pi platform for object
detection in video streams." Proceedings of the 11th
International Conference on Computer Recognition Systems
CORES 2019, Advances in Intelligent Systems and
Computing 989 (2020): 201-211.
[3]Zhang, Z. (2018). "A review on recent advances in
pedestrian detection using deep learning." International
Journal of Computer Vision, 128(1), 3-40.
[4]Ahmed, A. E., & Moniri, M. (2017). "A survey on video-
based traffic flow analysis." IEEE Access, 5, 7329-7345.
[5]Daniel Herrera, Manuel Ruiz-Marín, and Alfonso García-
Fernández. "Optical flow-based detection and tracking of
vehicles in video streams." Journal of Real-Time Image
Processing 15, no. 5 (2019): 1049-1067.
[6]Garg, R., & Kaur, J. (2020). "A Review of Real-Time
Object Detection Techniques." In 2020 IEEE 8th
International Conference on Computational Intelligence and
Computing Research (ICCIC) (pp. 1-5). IEEE.
[7]Redmon, J., & Farhadi, A. (2018). "YOLOv3: An
Incremental Improvement." arXiv preprint
arXiv:1804.02767.
[8]Dalal, N., & Triggs, B. (2005). "Histograms of oriented
gradients for human detection." In 2005 IEEE Computer
Society Conference on Computer Vision and Pattern
Recognition (CVPR'05) (Vol. 1, pp. 886-893). IEEE.
[9]Simon, L., & Rodner, E. (2020). "A survey on bias and
fairness in computer vision." arXiv preprint
arXiv:2005.01982.
[10]Liu, W., Anguelov, D., Erhan, D., Szegedy, C., Reed, S.,
Fu, C. Y., & Berg, A. C. (2016). "SSD: Single Shot MultiBox
Detector." European conference on computer vision (pp. 21-
37). Springer, Cham.
- 135 -
Internet of Things attack and security analysis
Aigul Adamova Tamara Zhukabayeva
Department of Computer Engineering Faculty of Information Technology
Astana IT University LN Gumilyov Eurasian National
Astana, Kazakhstan University
[email protected] Astana, Kazakhstan
[email protected]
Abstract—Everyone knows that the Internet of Things homes, smart cities, e-government, robotics, etc. [1,2].
has dramatically affected the life of the community and The problem of security in the networks of the IoT is a
represents many different technologies. Active universal problem of all countries, since all devices
implementation in everyday life makes us think about the collect information, analyze it and make decisions. At the
confidentiality of data used in the interaction of the Internet
of things. At the same time, the Internet of Things is limited
same time, the Internet of Things is limited by resources,
by resources, and the analysis of algorithms that contribute and the analysis of algorithms that contribute to the
to the preservation of data confidentiality in the process of preservation of data confidentiality in the process of
interaction of the Internet of Things is a very relevant area. interaction of the IoT is a very relevant area [1].
This work is an overview article on the interaction Interaction with each other IoT is one of the main
architecture of the Internet of Things, on the protocols used goals and serves to exchange information, things, etc.
regarding the architecture, security algorithms, simulations anywhere, anytime using the right network or service. In
of various types of attacks and attack detection schemes. this paper, the IoT connected in a wireless sensor network
Keywords— Internet of Things, attack, interaction, will be considered. Wireless sensor network (WSN) -
security, wireless sensor network deployed over a large area with a large number of
wireless sensor nodes that are used to monitor the system
I. INTRODUCTION [3-5]. There will also be an emphasis on maintaining the
The Internet of Things (IoT) is a network of various confidentiality of data when exchanging messages.
devices that are able to detect, connect, and transmit Confidentiality is a protection against unauthorized
information. Thanks to the IoT, it is possible to represent disclosure of information. Confidential data and
many different smart technologies that will be used in information can only be accessed by authorized persons
everyday life and will affect the quality of services. The in an authorized manner [6].
application of the IoT is extensive, including smart
- 136 -
and the article type was set to research, as a result, 3,862 today we can note new technologies, such as blockchain
papers were received. At the third stage, keywords were technologies, software-defined networks, holochain
added and a varied search was performed, which resulted technologies [9-11]. In the presented work, algorithms
in 2,778 works. At stage 4, queries from the second and that contribute to the preservation of data confidentiality,
third stages are combined. At the fifth stage, all articles possible attacks during IoT interaction, depending on the
are filtered by content and works are selected for further data flow and various functions, will be considered.
bibliometric analysis. In total, 121 articles were selected,
33 of which became the basis for the presented work.
General statistics on publications of works in Google
Scholar for 2022 is shown in Figure 2. The search for
works was carried out using the following keywords:
“IoT privacy”, “IoT encryption privacy”, “IoT
lightweight encryption privacy”, “IoT physical layer
security privacy". As a result of the search, it is important
to note that maintaining confidentiality is an urgent task
and many scientists are conducting research in this area.
A. Sensor level
Physical interfaces connecting various devices, such
as RJ45, for an asynchronous interface - RS-485, RS-232,
and USB, Wireless, SPI, etc. [19]. In particular cases, it is
possible to use a gateway that converts any physical
connector into a wireless one.
Figure 3. Percentage of Malware Infection Sources in IoT Interaction B. Network layer
Today, modern enterprises are striving to modernize Communication protocols are used for data transfer:
workplaces, by automating routine work to reduce the 3G, 4G, 5G, LTE, Dash, Wi-fi, LPWAN, Zigbee,
burden on staff, all these factors justify the real need for Bluetooth, RFID, Lora, LoRaWan, etc. Network
security and data confidentiality. Figure 4 shows vivid communication protocols IPv4, IPv6, WoT, 6LoWPAN,
examples of IOT attacks around the world for the period UDP, RPL [15]. IEEE 802.15.4, NFC, NB-IoT, SigFox,
from 2010 to 2022 [7]. Zigbee, LoRaWAN, Z-Wave, IEEE 802.11 family, BLE
In the review paper [8] M. Rana et al. discuss the are targeted for use in IoT interoperability.
importance of securing IoT networks, consider various C. Application level
threats depending on the architectural model of IoT. The In its structure, it contains many different protocols
paper also presents lightweight cryptographic algorithms for ultra-large volumes and large networks of things.
and protocols for data protection in the IoT environment. CoAP is an Internet transmission protocol for use in
If we take the direction of IoT network security, then devices with limited resources (similar to HTTP), MQTT
- 137 -
is a simplified messaging-oriented network protocol, TABLE II. SECURITY ALGORITHMS
DDS is a universal protocol that allows you to perform Algorithm year Characteristics structure Possible
almost any action, from starting devices to connecting attacks
high-performance networks , XMPP is an extensible Application layer
messaging and presence information protocol, AMQP is a MQTT 1999 OASIS standard TLS Denial of
CoAP 2014 IETF Standard DTLS service,
message queue management protocol that ensures the AMQP 2003 OASIS standard SASL clipboard
joint operation of different systems and applications [19]. DDS 2001 OMG standard overflow,
CoAP, uBounjour, mDNS, DNS-SD, DDS, AMQP, XMPP 2000 RFC standard SASL, SQL
MQTT, XMPP - applicable in IoT interoperability. The TLS injection
attacks,
outdated FTP, Telnet, SSH protocols perform their phishing
functions decently, but are very demanding on resources attacks, etc.
and are not suitable for the field of IoT. Network layer
To ensure data security, different algorithms are used WPA3 2018 192 bit key GCMP-2 Wormhole
256 bit 56 attack, Sybil
for each level. At the sensor level, it is possible to use Broadcast / attack,
lightweight encryption algorithms. At the network level, Multicast grayhole/sel
authentication methods, cryptographic methods, network Integrity ective
security methods are used, and at the application level, Protocol Galois forwarding
Message (SF) attack,
authorization methods and data privacy protection are Authentication Blackhole
used. Table 2 lists various algorithms, main Code attack,
characteristics and possible attacks [20-21]. AES 2001 128 block size SPN Sinkhole
(Bits) attack,
IV. DIFFERENT TYPES OF ATTACKS IN THE 128 keys (Bits) Replay
INTERCONNECTION OF THE INTERNET OF THINGS 10 rounds attack,
Spoofing
One of the best ways to ensure security in the Internet attack, hello
of Things interaction is to investigate the identified flood attack
Sensor level
attacks by reviewing and analyzing the 2022 literature.
PRESENT 2012 64 block size SPN
This paper presents potential network layer security (Bits)
threats in the form of Wormhole attack, Sybil attack, 80 keys (Bits) Host attack,
Grayhole/Selective forwarding (SF) attack, Blackhole 32 rounds damage,
attack, Sinkhole attack, Replay attack, Spoofing attack, SIMON 2013 64 block size Balanced code
(Bits) Feistel injection
hello flood attack and countermeasures against them 96 keys (Bits) network attacks,
(Table 3). 26 rounds replay
Wormhole attack - with creates a false a channel for TWINE 2013 64 block size GFS attack,
false data transmission, violating data confidentiality and (Bits) battery
80/128 key size drain.
can be the initiator of launching additional attacks [22]. (Bits)
Sybil attack - an infected host can impersonate other 2/16/20 rounds
hosts by changing location, thereby violating data
security and negatively affecting resource usage [23]. V. INTRUSION DETECTION SCHEMES
Grayhole/SF attack - a malicious node prevents the There are different schemes for detecting and
flow of information from authorized nodes to the base preventing attacks (Figure 5). By the nature of the
station. So this leads to denial of service attack, which network, the intrusion detection scheme can be
can be converted into a "black hole" attack by attacking centralized and distributed. In a centralized scheme, the
the entire network and restricting the flow of information head node, responsible for collecting data from sensors
from each node to the receiver [24]. connected to it, is the main link that is able to detect and
Blackhole attack - a “black hole” appears in the prevent an attack. In distributed schemes, the main part of
network and absorbs incoming traffic, so the source is not the classter is responsible for detecting and preventing an
aware of the delivery of the message [25]. Sinkhole attack. If we consider schemes on the basis of protection,
attack - a violating node can send out routing messages they are divided into detection, where the scheme is able
and collect all packets from all nodes in its vicinity, going to detect, determine the attack and prevention, where the
to the base station [26]. scheme is able to detect attacks and disable faulty
Replay attack - by eavesdropping on messages, nodes[31-33].
retransmits packets to the host, gaining trust and
launching additional attacks [27].
Spoofing attack - a node masquerades as another node
by falsifying data, thereby violating data confidentiality
[28].
Hello flood attack - a violating node broadcasts or
other information with a sufficiently strong signal,
showing each node in the network that it is their
neighbor, respectively, other nodes transmit their packets
to real neighboring nodes, then they are not accepted by Figure 5. Intrusion detection schemes
them [29].
- 138 -
TABLE III. SIMULATION OF ATTACKS AND WORKS DEVOTED TO THESE ISSUES
Attack simulation Name of attacks work main idea
- 139 -
[10] Yang G. An Overview of Current Solutions for Privacy in the
VI. CONCLUSION Internet of Things. Front Artif Intelligent. 2022 Mar 3; 5:812732.
doi: 10.3389/frai.2022.812732.
The IoT (Internet of Things) has become a vital part [11] S. Zaman, MRA Khandaker, RT Khan, F. Tariq and K.-K. Wong,
of modern technology, which includes a network of "Thinking Out of the Blocks: Holochain for Distributed Security
devices capable of discovering, connecting and in IoT Healthcare," in IEEE Access, vol. 10, pp. 37064-37081,
2022, doi: 10.1109/ACCESS.2022.3163580
transmitting information. In IoT, the security of data used [12] Mashal, I.; Alsaryrah, O.; Chung, T.Y.; Yang, CZ; Kuo, W.H.;
in the interaction of these devices is an important issue. Agrawal, DP Choices for interaction with things on Internet and
However, the IoT is limited in resources, which requires underlying issues. Ad Hoc Netw. 2015, 28, 68–90.
careful analysis of the algorithms that help maintain the [13] Paul, B. (2022). Internet of Things (IoT), Three-Layer
Architecture, Security Issues and Counter Measures. In: Fong, S.,
confidentiality of data when they interact. The article Dey, N., Joshi, A. (eds) ICT Analysis and Applications. Lecture
provides an overview of the IoT interaction architecture, Notes in Networks and Systems, vol 314. Springer, Singapore.
protocols, security algorithms, various types of attacks, https://doi.org/10.1007/978-981-16-5655-2_3
and attack detection schemes. It also focuses on the [14] C.-l. Zhong, Z. Zhu and R.-G. Huang, "Study on the IOT
Architecture and Access Technology," 2017 16th International
wireless sensor network (WSN) used in IoT interactions Symposium on Distributed Computing and Applications to
and highlights the importance of maintaining data privacy Business, Engineering and Science (DCABES), Anyang, China,
in messaging. The article provides an overview of 2017, pp. 113-116, doi: 10.1109/DCABES.2017.32.
scientific publications, provides statistics of publications [15] Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of
Things (IoT): a vision, architectural elements, and future
and bibliometric analysis, by keywords in the direction of directions. Future. Gener. Comput. Syst. 29(7), 1645–1660 (2013)
security IoT, IoT encryption privacy, IoT physical layer [16] J. Li et al., "A Remote Monitoring and Diagnosis Method Based
security privacy and IOT attacks. Along with this, the on Four-Layer IoT Frame Perception," in IEEE Access, vol. 7, pp.
article discusses various types of IoT architecture, 144324-144338, 2019, doi: 10.1109/ACCESS.2019.2945076.
[17] Mirani, AA; Velasco-Hernandez, G.; Awasthi, A.; Walsh, J. Key
including three-layer, four-layer and five-layer IoT Challenges and Emerging Technologies in Industrial IoT
architectures. Architectures: A Review. Sensors 2022, 22, 5836.
In general, the article provides an insight into the https://doi.org/10.3390/s22155836
security issues of IoT interactions and the need for further [18] Pallavi Sethi, Smruti R. Sarangi, "Internet of Things:
Architectures, Protocols, and Applications", Journal of Electrical
research in this area. and Computer Engineering, vol. 2017, Article ID 9324035, 25
The proposed work is part of a research project that pages, 2017.https://doi.org/10.1155/2017/9324035
will develop a methodology and algorithms for predicting [19] IoT Analytics research 2022. https://iot-analytics.com
the further development and assessing the criticality of [20] Nurlan, Z., Zhukabayeva, T., & Othman, M. (2021). EZ-SEP:
Extended Z-SEP routing protocol with hierarchical clustering
detected attacks in real time. approach for wireless heterogeneous sensor network. Sensors,
21(4), 1021.
ACKNOWLEDGMENT [21] Nurlan, Z., Zhukabayeva, T., & Othman, M. (2019, October).
This research has been/was/is funded by the Science Mesh network dynamic routing protocols. In 2019 IEEE 9th
International Conference on System Engineering and Technology
Committee of the Ministry of Education and Science of (ICSET) (pp. 364-369). IEEE.
the Republic of Kazakhstan (Grant No. AP14973006). [22] Z. Teng, C. Du, M. Li, H. Zhang and W. Zhu, "A Wormhole
Attack Detection Algorithm Integrated With the Node Trust
REFERENCES Optimization Model in WSNs," in IEEE Sensors Journal, vol. 22,
[1] Chanal, P.M., Kakkasageri, M.S. Preserving, Data Confidentiality no. 7, pp. 7361-7370, 1 April1, 2022, doi:
in Internet of Things. SN COMPUT. SCI. 2, 53 (2021). 10.1109/JSEN.2022.3152841.
https://doi.org/10.1007/s42979-020-00429-z [23] Cong Pu, Kim-Kwang Raymond Choo, Lightweight Sybil Attack
[2] Zhukabayeva, T., Oralbekova, Z., Zhartybayeva, M., Detection in IoT based on Bloom Filter and Physical Unclonable
Zhumadillayeva, A., Adamova, A. “Prospects of development of Function, Computers & Security, Volume 113, 2022, 102541, ISSN
technologies in the field of robotics and the stages of design of 0167-4048,https://doi.org/10.1016/j.cose.2021.102541.
mobile robotic complex,” IEEE, pp. 1-4, August 2015. 2015 5th [24] X. Huang and Y. Wu, "Identify Selective Forwarding Attacks
International Conference on IT Convergence and Security Using Danger Model: Promote the Detection Accuracy in Wireless
(ICITCS). Sensor Networks," in IEEE Sensors Journal, vol. 22, no. 10, pp.
[3] K. Gulati, R. Sarath Kumar Boddu, D. Kapila, Sunil L. Bangare, 9997-10008, 15 May15, 2022, doi: 10.1109/JSEN.2022.3166601.
N. Chandnani, G. Saravanan, A review paper on wireless sensor [25] Ioulianou, PP; Vassilakis, VG; Shahandashti, SF A Trust-Based
network techniques in Internet of Things (IoT), Materials Today: Intrusion Detection System for RPL Networks: Detecting a
Proceedings, Volume 51, Part 1 , 2022, Pages 161-165, ISSN Combination of Rank and Blackhole Attacks. J. Cybersecurity.
2214-7853,https://doi.org/10.1016/j.matpr.2021.05.067. Priv. 2022, 2, 124-153. https://doi.org/10.3390/jcp2010009
[4] Nurlan, Z., Zhukabayeva, T., Othman, M., Adamova, A., & [26] Arun Kumar Sangaiah, Amir Javadpour, Forough Ja'fari, Pedro
Zhakiyev, N. (2021). Wireless sensor network as a mesh: Vision Pinto, HamidReza Ahmadi, Weizhe Zhang, CL-MLSP: The design
and challenges. IEEE Access, 10, 46-67. of a detection mechanism for sinkhole attacks in smart cities,
[5] Nurlan, Z., Kokenovna, TZ, Othman, M., & Adamova, A. (2021). Microprocessors and Microsystems, Volume 90, 2022, 104504,
Resource allocation approach for optimal routing in IoT wireless ISSN 0141-9331, https://doi.org/10.1016/j.micpro.2022.104504.
mesh networks. IEEE Access, 9, 153926-153942. [27] Al Shareeda, MA; Manickam, S.; Laghari, S.A.; Jaisan, A.
[6] Sadhu, PK; Yanambaka, V.P.; Abdelgawad, A. Internet of Things: Replay-Attack Detection and Prevention Mechanism in Industry
Security and Solutions Survey. Sensors 2022, 22, 7433. 4.0 Landscape for Secure SECS/GEM Communications.
[7] Microsoft. Cyber signals. December 2022. Sustainability 2022, 14, 15900.
[8] M. Rana, Q. Mamun, R. Islam, Lightweight cryptography in IoT https://doi.org/10.3390/su142315900
networks: A survey, Future Generation Computer Systems, [28] MR Nosouhi, K. Sood, M. Grobler and R. Doss, "Towards
Volume 129, 2022, Pages 77-89, ISSN 0167-739X, Spoofing Resistant Next Generation IoT Networks," in IEEE
https://doi.org/10.1016/j .future.2021.11.011. Transactions on Information Forensics and Security, vol. 17, pp.
[9] Al Hayajneh, A.; Bhuyan, MZA; McAndrew, I. Improving 1669-1683, 2022, doi: 10.1109/TIFS.2022.3170276.
Internet of Things (IoT) Security with Software-Defined [29] Renya Nath N, Hiran V Nath, Critical analysis of the layered and
Networking (SDN). Computers 2020, 9, 8. systematic approaches for understanding IoT security threats and
https://doi.org/10.3390/computers9010008 challenges, Computers and Electrical Engineering, Volume 100,
- 140 -
2022, 107997, ISSN 0045-7906, [32] André Cirne, Patrícia R. Sousa, João S. Resende, Luís Antunes,
https://doi.org/10.1016/j.compeleceng.2022.107997. IoT security certifications: Challenges and potential approaches,
[30] Muath A. Obaidat, Chapter 19 - Threats and vulnerabilities of Computers & Security, Volume 116, 2022, 102669, ISSN
wireless sensor networks in smart cities, Editor(s): Amir H. Alavi, 0167-4048, https://doi.org /10.1016/j.cose.2022.102669.
Maria Q. Feng, Pengcheng Jiao, Zahra Sharif-Khodaei, The Rise [33] Boyu Kuang, Anmin Fu, Willy Susilo, Shui Yu, Yansong Gao, A
of Smart Cities, Butterworth-Heinemann, 2022, Pages 463-491, survey of remote attestation in Internet of Things: Attacks,
ISBN 9780128177846, countermeasures, and prospects, Computers & Security, Volume
https://doi.org/10.1016/B978-0-12-817784-6.00024-2. 112, 2022, 102498, ISSN 0167-4048,
[31] Pamarthi, S. and Narmadha, R. (2022), "Literature review on https://doi.org/10.1016/j.cose.2021.102498.
network security in Wireless Mobile Ad-hoc Network for IoT
applications: network attacks and detection mechanisms",
International Journal of Intelligent Unmanned Systems, Vol. 10
No. 4, pp. 482-506. https://doi.org/10.1108/IJIUS-05-2021-0028
- 141 -
IoT watering robot in technologies of variable
irrigation rationing in precision agriculture
Madina Mansurova1* Baurzhan Belgybaev2 Yerlan Zaitin3
Al-Farabi Kazakh National Al-Farabi Kazakh National Al-Farabi Kazakh National
University University University
Almaty, Kazakhstan Almaty, Kazakhstan Almaty, Kazakhstan
[email protected] [email protected] [email protected]
Askhat Asset4
Almaty University of Energy and
Communications named after G.
Daukeev
Almaty, Kazakhstan
[email protected]
Abstract— Precision farming is a conceptual direction of the • The use of special drippers with pressure
modern agrotechnical strategy. The most important link in regulators increases irrigation costs;
these technologies is solving the problems of shortage and • Loss of yield due to suboptimal drip irrigation;
saving water resources for agriculture during drought. The • The need for a separate drip irrigation network for
paper proposes methods and technologies for creating
different plants;
prototypes of an IoT city tank truck for watering city trees and
a small-sized autonomous IoT sprinkler for intelligent watering • Non-recoupment of capital expenditures due to
of home and garden plants. Functional and circuit solutions lower yields per unit area.
make it possible to replicate IoT device data from available It should be noted that in the conditions of a mini-
electronic sets of blocks and modules offered by the authors . greenhouse and small agribusiness, these shortcomings are
leveled and show positive results with an acute shortage of
Keywords—precision farming, IoT, watering robot, precision water and its high cost [7].
agriculture In the publication and patents, a number of authors
have studied the upgrade of a mini-greenhouse with drip
I. INTRODUCTION
irrigation to the level of an IoT device [8,9,10,11]. Such
Modern technologies of precision farming through the use modernization of mini-greenhouses creates a number of
of space monitoring and the global Internet make it possible technological and social advantages:
to adequately predict the yield of cultivated plants, to • an automated greenhouse with remote access makes it
determine regions with excess or lack of moisture [1,2,3]. possible to develop urban horticulture, when city
Kazakhstan belongs to the region with zones of rainfed dwellers grow salads and early vegetables on home
agriculture [3]. In the southern regions of the country, rice, gardens, roofs of apartment buildings, loggias and
cotton, vegetables, fruits and fodder crops are grown on balconies;
irrigated areas. At present, due to population growth in
Uzbekistan, Kyrgyzstan and in the south of Kazakhstan, • the availability of remote monitoring allows you to
there is an acute shortage of irrigation water for growing manage the technological processes in a mini
agricultural areas [4]. The above regions are the main greenhouse from anywhere in the world;
suppliers of early vitamin products for the northern regions • independent cultivation of salads and vegetables in
of Kazakhstan. The state stimulates with benefits for the urban areas guarantees a fresh and environmentally
distribution of resources for irrigation when applying friendly product;
precision farming technologies. For example, in the
Dzhambul region, a plant was built for the production of • urban residents can go on vacation in any Internet
drip tape and fittings for them using American technology accessible region during the summer months without
[5]. Vegetable growers of our country practice the use of damage to plants due to the lack of agrotechnical
drip irrigation in greenhouses and greenhouses for growing care for them;
tomato crops; this type of irrigation is especially widely • the level of farming culture is increasing among rural
used in the arid Turkestan region [6]. Drip irrigation saves residents, the interest of young people in IoT
water resources, but it has a number of disadvantages: technical creativity, which contributes to their
• Substantial capital investment per unit of irrigated consolidation in the countryside.
area;
• Rapid wear of the drip water supply system and German manufacturers of equipment for drip irrigation
harsh conditions for inlet water pressure; are constantly improving their products. Let us discuss their
• Drop in water pressure along the length of the approaches to solving the problem of pressure drop along
drip tape; the length of the drip pipe. In the old designs of the
irrigation pipe, the droppers were equidistant in steps from 6
- 142 -
cm to 60 cm (see Figure 1a). This was clearly not rational, belongs to one of the greenest megacities in the world (up to
then they began to produce a solid pipe with an attached 10 m2 of green spaces fall on each inhabitant of the city).
special needle for puncture and a dropper without a flow The city has numerous relict century-old oaks and chestnuts.
regulator (as shown in Figure 1 b). The latest modifications They are under strict state registration and protection from
of droppers have a manual flow regulator, which allows, felling, watering of trees is carried out by a ditch system or
with successful selection, to evenly distribute the flow along individually from tankers to the root.
the length of the pipe (Figure 1c). The evolution of the The Akimat of the city, within the framework of the
design of the drip tape and its fittings is shown in Fig.1. Smart City concept, set the task for our university to
robotize and intellectualize the process of watering trees and
flower beds from mobile tankers. Ecologists have proven
that this method of irrigation can significantly save the
limited water resources of glacial mountain water.
а) Fig. 2 shows a scheme for upgrading the functionality of
intelligent watering trees and flower beds using the QR code
of a city tank truck to the level of a neurophysical
device[12].
b)
Fig. 2. Urban IoT mobile water sprinkler based on the KAMAZ ACV-10
UST heavy-duty tanker, where: 1-water tank with a capacity of 10 m3
based on the KAMAZ 43118-50 chassis with an irrigation rail; 2- PC
operator-manager "Zelenstroy"; 3- pump SVN-80 with a capacity of 38
m3/hour; 3-hydraulic four-link manipulator for positioning the water
supply to the root system of a tree or for spraying water over a flower bed;
4-flexible hose from the tank truck pump to the watering can with an IoT
video camera; 5- IoT microcontroller ESP32 Cam with a video camera; 6- a
poster with a QR code, which contains the technological parameters of the
c) plant and its watering modes.
- 143 -
change the route map of tank trucks. This preliminary
project was considered and fertilized, the technical and
economic feasibility of this project was proved not only for
innovation, but also by reducing the wages of the forwarder-
sprinkler of the tank truck.
This stage of creating a watering robot is characterized
by the fact that remote automation is carried out only for the
technological part of the irrigation process itself. In
conditions of intensive urban traffic, the creation of an
unmanned watering robot in the form of a tank truck on the
chassis of a heavy truck is a difficult and unsafe problem for
the city population and road users. Therefore, in the work
for urban irrigation, only the process of recognition and
watering of plants is automated, the movement of a tanker
truck along the route is controlled by a human driver.
A promising and safe unmanned watering robot is
proposed to be created for highly automated greenhouses
and urban household plots. The functional diagram of the Fig. 5. Interface of the multifunctional window for controlling
unmanned smart watering robot is based on existing IoT the Xiaomi Mi 360 webcam
solutions for the automation of Xiaomi Mi Home smart
devices is shown in Fig. 3. Fig. 5 shows the current image in front of the camera
with an indication of the projection time, as well as virtual
buttons for turning on the sound, camera, touch joystick for
remote control of the camera centerline in the directions to
the right and left by 360 degrees and up and down by -30
degrees and up +30 degrees .
Thus, the presence of the remote functionality for
changing the axis line of the Xiaomi Mi 360 webcam allows
you to create a remote electromechanical digital device for
remote control of the transport platform as an additional
mobile automation tool for Xiaomi Mi Home. Note that this
approach is a pre-project development. The project does not
attempt to change the circuit solutions in the web camera
Fig. 4. Functional diagram of an unmanned watering robot
chips.
The use of a Xiaomi webcam operating in the Zig Bee III. RESULTS AND DISCUSSIONS
protocol[17,18] and having an online interface in global
Internet networks allows you to create methods for Based on the obtained modules, methods and developed
designing and semi-industrial application of a smart theoretical and practical materials, the following
watering robot operating in greenhouses and private houses. electromechanical robotic device is proposed as a result,
The main feature of the electric transport platform of the which allows remote control of a caterpillar transport
proposed robot is the use of a caterpillar chassis on electric platform and a manipulator with an irrigation hose via the
motors with a manipulator on servo drives. Internet (see Fig. 5). The software and hardware for remote
In technological terms, watering plants is a sluggish control of the manipulator is described in detail in the
process in time; Internet information delays of a few technical literature, this article will cover the issue of remote
seconds are not fatal. Therefore, to control the movement of automation of dosing the amount of water for watering a
the robot, the Xiaomi Mi 360 webcam was used, which has plant using its QR code.
a multifunctional web interface (see Fig. 4).
- 144 -
Let's dwell on new versions of the software for adapting
a webcam based on the ESP 32 CAM microcontroller to
solve practical irrigation problems using the proposed agro-
robot prototype.
- 145 -
[10] Chernenko A.B., Chernikov N.., Baginsky N.A., Sysoev M.I. [16] ESP32-CAM Remote Controlled Car Robot Web Server URL:
Features of the use of robotic platforms in agriculture. https://randomnerdtutorials.com/esp32-cam-car-robot-web-
[11] Skvortsov E.A., Vodolazsky F.V., Askerko V.V. The transition of server//Accessed June 22, 2023
agriculture to digital, intelligent and robotic technologies. - Agrarian [17] Aqeel Mohomad , Rayazan Raneem, haraga harmilan esign a Smart
Bulletin of the Urals. - Yekaterinburg. -2018. - p.82-88. mini Robot for Indoor Plant Watering System International Journal of
[12] Reading QR Code using ESP32 Camera Module & Python URL: Sciences^Basic and Applied Research(IJBAR) 61
https://how2electronics.com/qr-code-scanner-with-esp32-cam- [18] M. K. Heinrich, Sebastian von Mammen, Daniel Hofstadler
module-opencv///Accessed June 22, 2023 Constructing Living Buildings: A Review of Relevant Technologies
[13] M. Ghazal, Ali Talezadehlari, Moein Taheri, Mina Nazemi The for a Novel Application of Biohybrid Robotics.- Journal of the Royal
Mobile Robot HILARE: Dynamic Modeling and Motion Society Interface, 2019, 16(156)
SimulationIAES International Journal of Robotics and Automation [19] Xiaomi smart home URL: https://xiaomi-
(IJRA) June 2019 pp150-155 smarthome.ru/bluetoothshlyuzy-xiaomi//Accessed June 22, 2023.
[14] Jamaludin JalaniHo Zi KangAmirul Syafiq SadunZurina Abdul [20] Dom-Florista URL: https://dom-florista.ru/uhod/fazy-
WahabSemi-Auto Dosing Robot with Image Processing Journal of zhiznirasteniy.html// Retrieved June 22, 2023
Electrical engineering/- v.20(2-3),2021, pp.18-2 5) ,2022,p.1-9
[15] Vibhakar Kaushik ,MohtaAdarsh Patnaik, Shivam Kumar Panda
Design of an All-Purpose Terrace Farming Robot .-Springer Nature,
2022
- 146 -
Cache Replacement Policy for Approximate
Computing in Many Core Systems
Juhee Choi
Department of Smart Information Communication Engineering, Sangmyung University, Republic of Korea
Email: [email protected]
I. INTRODUCTION
Research groups in the approximate computing have
proposed specialized cores for multimedia data like GPUs,
DSPs and neural processing units(NPU) placed in the
embedded systems. However, there are a few studies about
many cores for levels of approximate accuracy that causes
performance drop, when there are shared data among cores[1-
3]. In addition, the researchers have less paid attention the Fig. 2. Approximate cache coherence protocol.
system which includes non-volatile memory (NVM) based
last-level cache (LLC). protocol has M (Modified), S (Shared), E (Exclusive), I
(Invalidate) states. State transitions occur depending on read
The most important role of the traditional cache coherence requests and write requests. This is also distinguished by the
protocol such as MESI protocol is to maintain accurate values type of requestors such as from the core directly connected to
in cache blocks. If the value is changed in a cache block, it is the cache or from outer cores.
indicated as dirty block. When the block is evicted or
forwarded to the other requestors, it influences the transfer The new protocol has AE (Approximate Exclusive), AS
policy. However, NVM based systems also consider the (Approximate Shared), AM (Approximate Modified) states
approximate value in cache block as well as accurate cache instead of the existing M, S, E states when the cache block has
states. Thus, this paper adds extra states that can represent for an approximate value. For optimization of the state transition
approximate values for power-efficiency. diagram, the existing protocol has been modified for state
transitions. in the process of being studied over a long period
Plus, there is another consideration related to the cache of time. Therefore, the new protocol has fewer states
coherence. Even though the state transition diagram of a compared with the traditional method.
general protocol seems that it simply works, implementing the
protocol requires more complicated circuits as shown in Fig. III. SIMULATION RESULTS
1. Fig. 1(a) is the abstract state transition diagram of the MESI To verify the performance and power efficiency of the
protocol and Fig. 1(b) depicts the specific states required to proposed idea, the experiments are performed by the gem5 [5]
implement MESI, indicating the need for more intermediate which is a widely used cycle-accurate simulators. The cache
states and state transitions[4]. Therefore, if extra states are hierarchy consists of an 8-way 256KB unified LLC and 4-way
needed for a new protocol, it implies that more complex states 16KB I/D caches. Table I lists the detailed information of the
also are added to the existing circuits. One of this paper aims experimental parameters. Plus, the benchmark programs are
to minimize states by removing the unnecessary states. selected from the SPEC2006[6].
II. APPROXIMIATE CACHE COHERENCE PROTOCOL Fig. 3 shows the normalized the number of data transfer
This paper proposes an approximate cache coherence among cores. It is divided by read operation (RD_op), linefill
protocol as shown in Fig. 2. Fig. 2(a) shows the existing operation (LF_op), and write operation (WB_op) with the
protocol and Fig. 2(b) is one of the expected diagrams of the MESI protocol. The results showed that the new protocol
newly invented protocol from the research. The existing
- 147 -
achieved a 11.2% reduction in the data transfers without ACKNOWLEDGMENT
performance degradation. This work was supported by the National Research
Foundation of Korea (NRF) grant funded by the Korea
TABLE I. SIMULATION PARAMETERS
government(NRF-2021R1G1A1004340).
Core type Alpha
Cores 8 cores, out-of-order, 2GHz
L1 Cache Private 4-way 32KB I/D Cache REFERENCES
L2 Cache Private 8-way, 256KB [1] Roy, Kaushik, and Anand Raghunathan. "Approximate computing: An
energy-efficient computing technique for error resilient applications."
LLC Shared 16-way, 4MB 2015 IEEE Computer Society Annual Symposium on VLSI. IEEE,
Memory 64bit bus width, 4 read/write ports 2015.
[2] Imani, Mohsen, et al. "Acam: Approximate computing based on
adaptive associative memory with online learning." Proceedings of the
2016 International Symposium on Low Power Electronics and Design.
2016.
[3] Han, Jie, and Michael Orshansky. "Approximate computing: An
emerging paradigm for energy-efficient design." 2013 18th IEEE
European Test Symposium (ETS). IEEE, 2013.
[4] https://www.gem5.org/documentation/general_docs/ruby/MOESI_C
MP_directory
[5] J. Power, J. Hestness, M. S. Orr, M. D. Hill, and D. A. Wood, “Gem5-
gpu: A heterogeneous cpu-gpu simulator,” IEEE Computer
Architecture Letters, vol. 14, no. 1, pp. 34-36, 2015
[6] Henning, J. L. (2006). SPEC CPU2006 benchmark descriptions. ACM
SIGARCH Computer Architecture News, 34(4), 1-17.
- 148 -
August 22(TUE) - 25(FRI), 2023
Oral Session 6
Room : A428
Chair: Assel Mukasheva (AUPET, Kazakhstan)
- 149 -
ANALYSIS OF CLIENT-SIDE AND SERVER-
SIDE ATTACKS IN THE CONTEXT OF WEB
APPLICATIONS
Adlet Smailov 1* and Saukhanova Zhanat 2
1
L. N. Gumilyov Eurasian National University, Kazakhstan
1
L. N. Gumilyov Eurasian National University, Kazakhstan
Email: [email protected]
I. INTRODUCTION
ABSTRACT
Web applications have become an essential part of our
With the rapid growth of web applications, ensuring their
security has become a critical concern for organizations and
daily lives, from online shopping to social media. However,
individuals alike. This scientific review article aims to analyze the this increase in reliance on web applications has also led to an
various types of client-side and server-side attacks commonly increase in cyberattacks against them . Web application
encountered in web applications, along with their respective attacks occur when a cybercriminal exploits a particular
protection methods. vulnerability or chain of vulnerabilities to gain unauthorized
access to sensitive information or disrupt the normal operation
The article begins by examining client-side attacks, including of an application.
Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF),
and Clickjacking. Each attack is described in detail, providing an These attacks can be divided into two categories: client-
understanding of their nature and potential consequences. Concrete side attacks and server-side attacks. Client-side attacks target
examples are presented to illustrate the practical application of these a user's web browser and are initiated by injecting malicious
attacks, highlighting their potential impact on user privacy and code into a web page. Server-side attacks, on the other hand,
system integrity. Furthermore, effective protection measures and target the server hosting the web application and are initiated
best practices are discussed to mitigate the risks associated with by exploiting vulnerabilities in the server software.
client-side attacks.
II. OVERVIEW OF THE MOST COMMON ATTACKS ON WEB
Subsequently, the focus shifts to server-side attacks,
APPLICATIONS
encompassing Server-Side Request Forgery (SSRF), SQL injection
(SQLi), and Remote Code Execution (RCE). The article examines A. Types of client-side attacks: description, example,
the intricacies of each attack, outlining their working principles and method of protection
highlighting real-world instances where these vulnerabilities have
been exploited. The consequences of server-side attacks on system Client-side attacks take place in a user's browser or device
availability, data integrity, and overall security posture are explored, and can be initiated by a user unintentionally visiting a
emphasizing the need for robust countermeasures. Comprehensive malicious website or clicking on a malicious link. An attacker
protection strategies, such as input validation and secure coding can use vulnerabilities in a web application to inject malicious
practices, are recommended to defend against server-side attacks code, steal cookies, or redirect a user to a malicious site.
effectively.
Client-side attacks target an end user's computer or device
In the concluding section, a comparative analysis of client-side by exploiting vulnerabilities in the browser, plug-ins, or other
and server-side attacks is presented, examining various aspects software used to access a web application. The most common
including target, effects, severity, and prevention. This comparison client-side attacks are Cross- Site attacks. Scripting (XSS),
allows readers to understand the distinctive characteristics and risks Cross- Site attacks Request Forgery (CSRF) and Clickjacking
associated with each attack type. Furthermore, it provides insights attacks [1].
into the importance of adopting a multi-layered security approach to
safeguard web applications comprehensively. The article 1. Cross- site Scripting (XSS)
emphasizes the significance of proactive security practices, such as
regular security assessments, patch management, and security Cross Site Scripting (XSS) is a type of client-side attack in
awareness training, to prevent and mitigate the impact of both client- which an attacker injects malicious code into a web page,
side and server-side attacks. which is then executed by the user's web browser. This allows
an attacker to steal sensitive data or perform actions on behalf
In summary, this scientific review article provides a of the user. XSS attacks can be prevented by using input
comprehensive analysis of client-side and server-side attacks in the validation and sanitization techniques, as well as encoding the
context of web applications. By exploring their descriptions, output [2] .
providing real-world examples, and discussing effective prevention
methods, this article aims to enhance the understanding of security Example: A typical example of an XSS attack is a phishing
practitioners, developers, and organizations, enabling them to attack in which an attacker sends a link to a user that is
strengthen the security posture of their web applications and protect vulnerable to Cross - Site Scripting site attack. When a user
against the evolving threat landscape. clicks on a link, malicious javascript is executed code that
Keywords: Web application security, Client-side attacks, intercepts the user's cookies and passes them to the attacker.
Server-side attacks, Comparative analysis With these cookies , an attacker is able to freely connect to a
user's session without knowing the user's login or password.
- 150 -
2. Cross- site Request Forgery (CSRF) 3. Remote Code Execution (RCE)
Cross Site Request Forgery (CSRF) is a type of client-side Remote Code Execution (RCE) is a type of server-side
attack in which an attacker sends a request to a web attack in which an attacker uses a vulnerability in server
application on behalf of a user without the user's knowledge software to execute malicious code remotely. This allows an
or consent. This allows an attacker to perform actions on attacker to take control of the server and access or modify
behalf of the user, such as changing the user's password or sensitive data. RCE attacks can be prevented with modern
committing a transaction. CSRF attacks can be prevented by software and strong access control.
using anti-CSRF tokens and by applying strong access control
[3] . Example. A typical example of an RCE attack is a web
application that launches a vulnerable version of a software
Example. A common example of a CSRF attack is a library. As an example, last year's Log4j vulnerability , also
malicious ad that, when clicked, sends a request to the user's known as CVE- 2021-44228 , is a serious vulnerability in the
bank account to transfer money to the attacker's account. Log4j logging library, which is used in many applications and
servers around the world. The Log4j vulnerability manifests
3. Clickjacking itself in the fact that an attacker can pass a specially
Clickjacking is a type of client-side attack in which an constructed string in the " message " field of a log entry that
attacker tricks a user into clicking on a hidden or disguised contains a link to malicious code. When processing this string,
button or link on a web page. This allows an attacker to the Log4j library downloads and executes malicious code,
perform actions on behalf of the user, such as posting to the which can lead to remote code execution on the machine
user's social media account. Clickjacking attacks can be where the application is running using the affected version of
prevented by implementing clickjacking protection headers Log4j. This vulnerability is especially serious because the
and using frame blocking scripts [4] . Log4j library is used in many critical systems such as financial
institutions, government organizations and large corporations,
Example. A typical example of a clickjacking attack is a which makes it especially attractive to hackers. In addition,
fake login page that looks like a legitimate website but is the Log4j vulnerability is a "chain reaction" - if one system
actually an overlay in disguise. When a user enters their login component uses a vulnerable version of Log4j, this can lead
credentials, the attacker steals them . to a compromise of the entire system, even if other
B. Types of server-side attacks: description, example, components do not use the vulnerable library [7].
method of protection
III. COMPARISON OF ATTACKS: TARGET, EFFECTS , SEVERITY ,
Server-side attacks target a web application server by PREVENTION
exploiting vulnerabilities in the application code, operating
system, or web server software. The most common server-side While both client-side and server-side attacks can have
attacks are Server-Side Request attacks. Forgery (SSRF), SQL serious consequences, they differ in their purpose,
Injection and Remote Code Execution (RCE) attacks. consequences, severity, and methods of prevention. Client-
side attacks target users' browsers and can lead to the theft of
1. Server Side Request Forgery (SSRF) user data or the installation of malware. Server-side attacks
target the web application server or backend code and can
Server Side Request Forgery (SSRF) is a type of server
result in the theft of sensitive data or complete system
side attack in which an attacker sends a request from a web
compromise.
application to another server without the server's knowledge
or consent [5] . This allows an attacker to access sensitive data In terms of severity, server-side attacks tend to be more
or perform actions on the target server. SSRF attacks can be serious as they can compromise the entire system and cause
prevented by using input validation and sanitization widespread damage. However, client-side attacks can also be
techniques and by implementing strong access controls. serious if they result in the theft of sensitive data or the
installation of malware.
Example. A typical example of an SSRF attack is a web
application that allows users to upload files, which are then TABLE I. COMPARISON OF CLIENT-SIDE AND SERVER-SIDE ATTACKS
processed by the server. An attacker can upload a malicious
file containing a malicious request, if configured incorrectly, Attack Target Impact Severity Prevention
the server will process the file and execute the malicious Use input
request contained in the file. validation,
sanitization,
2. SQL injection ( SQLi ) and output
Theft of
encoding to
confidential
SQL injection ( SQLi ) is a type of server-side attack in data,
prevent
which an attacker injects malicious SQL code into a web malicious
User’s unauthorized
application's database, which is then executed by the server Medium code from
XSS web actions on
to High being
[6] . This allows an attacker to access, modify or remove browser behalf of the
injected. Use
sensitive data from the database. SQLi attacks can be user,
a Content
modification of
prevented using prepared statements, parameterized queries, output data
Security
and input validation methods. Policy (CSP)
to restrict
Example. A typical example of an SQLi attack is a login script
form that accepts user input without validation or sanitization. execution
An attacker can inject malicious SQL code into the username
or password field that is executed by the server and bypass
authentication.
- 151 -
TABLE I. (CONTINUED) [5] Portswigger: Web Security Academy // Server-Side Request Forgery.
– URL: https://portswigger.net/web-security/ssrf
Attack Target Impact Severity Prevention
[6] Portswigger: Web Security Academy // SQL Injection. – URL:
Use CSRF https://portswigger.net/web-security/sql-injection
tokens to
[7] UpGuard // Log4Shell: The Log4j Vulnerability Emergency Clearly
validate user
Explained. – URL: https://www.upguard.com/blog/apache-log4j-
requests and
vulnerability
make sure
Unauthorized
they come
actions on
from the
User’s web behalf of the
CSRF High expected
browser user, theft of
source.
confidential
Use the
data
SameSite
attribute on
cookies to
prevent cross-
site requests
Clickjacking
Unauthorized protection
Clickja User’s web actions on headers,
Low
cking browser behalf of a frame
user blocking
scripts
Unauthorized
access to
sensitive data.
An attacker Input
Web can force a validation,
SSRF application server to Medium sanitization,
server connect to strict access
internal control
services in an
organization's
infrastructure.
Prepared
Theft, statements,
Web alteration, or parameterized
SQLi High
application deletion of queries, input
sensitive data validation
methods
Getting full
control over Modern
Web
the server, software,
RCE application High
access to strict access
server
confidential control
data
- 152 -
Security of containers and containerization
environments
Amir Abdreev 1* and Assel Nurusheva 2
1
L. N. Gumilyov Eurasian National University, Kazakhstan
2
L. N. Gumilyov Eurasian National University, Kazakhstan
Email: [email protected]
Abstract — Containers have become an increasingly popular In this article, we will delve into the multifaceted nature of
technology for deploying and scaling applications. However, the container security, encompassing both runtime and build-time
security of containers and containerization environments is a security. We will explore the unique attack vectors and
significant concern that needs to be addressed. This review vulnerabilities specific to container environments, including
article analyzes the problem of container security by examining image integrity, container isolation, privilege escalation, and
the various vulnerabilities and threats associated with container escape. Additionally, we will examine the
containerization. effectiveness of existing security measures, such as container
Containers offer many benefits, including portability, image scanning, runtime monitoring, and access control
scalability, and isolation. However, the security of containers mechanisms..
and the underlying infrastructure can be compromised in
various ways, including attacks on the host operating system, II. CONTAINER SECURITY THREAT LANDSCAPE
network attacks, and container breakout attacks. The
A. Overview of security challenges and risks in container
vulnerabilities can be introduced at different stages of the
container lifecycle, from the image creation to the runtime environments
environment. Containerization has revolutionized the deployment and
scalability of applications, enabling organizations to achieve
In this article, we explore the various security challenges
associated with containerization, including the risks associated greater flexibility and efficiency in their software
with the use of public container registries, the importance of development processes. However, the adoption of container
securing the container images, and the need to monitor the environments also introduces a unique set of security
containerized environment continuously. We also discuss the challenges and risks that must be addressed to ensure the
security measures that can be taken to mitigate these risks, such protection of sensitive data and the integrity of applications.
as enforcing security policies, using secure container images,
and deploying network segmentation. 1. Container Isolation
To illustrate the importance of container security, we Container isolation refers to the process of maintaining
provide real-world examples of container security breaches, logical separation between containers running on the same
such as the Docker Hub hack that resulted in the compromise of host, preventing unauthorized access and interference
millions of user accounts and the Kubernetes CVE-2018- between them.
1002105 vulnerability that allowed attackers to bypass
authentication and gain access to the entire cluster.
Example: A security challenge in container isolation is the
“escape to host” vulnerability. If a container is compromised,
This review article aims to provide a comprehensive an attacker may attempt to exploit vulnerabilities in the
understanding of the security challenges associated with container runtime or kernel to break out of the container and
containers and containerization environments. By gain unauthorized access to the host system. This can lead to
understanding the risks and vulnerabilities, organizations can further attacks, such as lateral movement within the host or
take appropriate measures to secure their containerized unauthorized access to other containers.
applications and mitigate potential security breaches.
2. Image and Software Supply Chain
Keywords — containers, containerization environments,
security, vulnerabilities, threats, attacks. The image and software supply chain in container
environments involves the acquisition, verification, and
I. INTRODUCTION deployment of container images and associated software
In recent years, containerization has emerged as a components.
dominant technology in the field of software development and Example: A risk in the image and software supply chain is
deployment, revolutionizing the way applications are the use of compromised or vulnerable container images. If an
packaged and deployed across various platforms. Containers organization relies on untrusted or tampered images from
provide lightweight, portable, and scalable environments that public repositories without proper verification, they may
encapsulate application components and their dependencies, inadvertently introduce malicious code or vulnerable
enabling efficient deployment and management across diverse components into their environment. This can lead to data
infrastructure. However, as container adoption continues to breaches, unauthorized access, or the exploitation of known
soar, ensuring the security of containerized environments vulnerabilities.
becomes paramount. Understanding the intricacies of
container security is crucial for organizations seeking to 3. Container Vulnerabilities
harness the full potential of containerization while
safeguarding their valuable assets and data.
- 153 -
Container vulnerabilities refer to security weaknesses or access to sensitive data or execute arbitrary code within the
flaws within the container runtime, orchestrator, or underlying container.
infrastructure that can be exploited by attackers.
3. Container Misconfigurations
Example: A security challenge related to container
vulnerabilities is the "unpatched container" risk. Containers Misconfigurations are a common cause of security
are often built from base images that may contain outdated breaches in containerized environments. Errors in settings,
software components with known vulnerabilities. If these access controls, or network configurations can lead to
vulnerabilities are not addressed and patched in a timely unintended exposure of sensitive data or services, providing
manner, attackers can exploit them to compromise containers attackers with opportunities to exploit the misconfigured
and gain unauthorized access to sensitive data or the host containers.
system. Example: A misconfigured container might
4. Container Configuration and Orchestration unintentionally expose a management interface or an
unsecured API endpoint, allowing an attacker to gain
Container configuration and orchestration involves the unauthorized access or launch brute-force attacks to discover
proper setup and management of containers, ensuring they weak credentials.
adhere to security best practices and are effectively
4. Privilege Escalation
orchestrated within the container environment.
Example: Misconfigured container security settings can Privilege escalation attacks involve gaining elevated
expose containers to risks, such as "inadequate access privileges within a container to access resources or perform
controls." If containers are not properly configured with actions beyond the intended scope. Attackers exploit
appropriate access controls, attackers can exploit this vulnerabilities in container runtimes or misconfigurations to
misconfiguration to gain unauthorized access to sensitive escalate privileges and potentially compromise the host
resources or execute unauthorized actions within the container system or other containers.
environment. Example: An attacker may exploit a vulnerability in the
5. Container Breakouts container runtime's default configuration, allowing them to
escalate privileges within a container and gain unauthorized
Container breakouts involve attacks or vulnerabilities that access to critical resources or sensitive data.
allow an attacker to escape the confines of a container and gain
unauthorized access to the underlying host system. III. BEST PRACTICES FOR CONTAINER SECURITY
Example: A security risk related to container breakouts is A. Essential Security Practices for Container Deployment
the "kernel vulnerability" exploit. If the kernel running on the and Management
host system has a vulnerability, an attacker who gains control Containerization has revolutionized software development
of a container may be able to exploit that vulnerability to break and deployment, enabling organizations to streamline their
out of the container and gain unauthorized access to the host. processes and improve scalability. However, the rapid
Once inside the host, the attacker can potentially compromise adoption of containers has also introduced new security
other containers or sensitive data. challenges. To mitigate these risks, it is crucial to implement
B. Common Attack Vectors Targeting Containers essential security practices for container deployment and
management.
1. Container Breakout
1. Secure Container Hosts
Container breakout is a critical attack vector where an
attacker attempts to escape the confines of a container to gain The foundation of a secure container deployment lies in
unauthorized access to the host system. This attack usually the security of the underlying host system. It is essential to
leverages vulnerabilities in the container runtime, harden the host operating system by applying security patches,
misconfigurations, or insecure container images. Once disabling unnecessary services, and following best practices
escaped, the attacker can potentially compromise other for system hardening. Employing secure configuration
containers or the underlying host, leading to widespread baselines and utilizing security frameworks like CIS
damage. benchmarks can significantly enhance the security posture of
container hosts.
Example: A container breakout attack could involve
exploiting a kernel vulnerability within a container runtime, 2. Isolation and Segmentation
allowing the attacker to execute arbitrary code on the host and Proper isolation and segmentation are critical for
compromise the entire infrastructure. container environments. Containers should be isolated from
2. Image Vulnerabilities each other and from the host system to prevent unauthorized
access and limit the impact of potential breaches. Utilizing
Container images, which serve as the foundation for container orchestration platforms that enforce strict network
running containers, can harbor various vulnerabilities that segmentation and access control policies is recommended.
attackers exploit to compromise containerized environments. Network policies, such as implementing firewalls and network
These vulnerabilities may include outdated software segmentation using virtual LANs (VLANs) or software-
packages, weak configurations, or even malicious code defined networking (SDN) techniques, can provide additional
inserted into the image. layers of isolation.
Example: An attacker could craft a malicious container 3. Image Provenance and Integrity
image with a vulnerable version of a web server, allowing
them to exploit known vulnerabilities and gain unauthorized
- 154 -
Ensuring the integrity and provenance of container images and their configurations is crucial to prevent the
images is crucial to prevent the deployment of malicious or deployment of vulnerable or malicious components.
vulnerable components. Organizations should establish secure
image repositories and implement mechanisms to verify the 1. Image Hygiene
authenticity and integrity of images. Employing container Maintaining image hygiene is vital to minimize security
signing mechanisms and digital signatures can help guarantee risks associated with container images. It is essential to use
the trustworthiness of images throughout their lifecycle. trusted base images from reputable sources and regularly
4. Vulnerability Management update them to include the latest security patches. Employing
a secure software supply chain and employing container
Regularly scanning container images and the image vulnerability scanning tools can help identify and
underlying host system for vulnerabilities is essential to remediate vulnerabilities in container images.
identify and remediate potential security weaknesses.
Organizations should adopt vulnerability scanning tools and 2. Minimalistic Images
establish processes to track and update software dependencies Adopting a minimalistic approach when creating container
within containers. Automating vulnerability management images can significantly enhance their security. Including
processes and integrating them into the CI/CD pipeline can only necessary dependencies and components reduces the
help ensure continuous security throughout the container attack surface and minimizes the risk of incorporating
lifecycle. vulnerable or unnecessary software. Organizations should
5. Access Control and Privilege Management strive to build lightweight and purpose-specific images,
eliminating unnecessary binaries, libraries, and services.
Implementing robust access control mechanisms is
critical to prevent unauthorized access to containerized 3. Secure Configuration Management
environments. Organizations should enforce the principle of Implementing secure configurations within container
least privilege, granting containerized applications only the images is crucial to prevent misconfigurations that can lead to
necessary permissions and privileges. Implementing strong security vulnerabilities. Following configuration hardening
authentication mechanisms, such as multi-factor guidelines, such as those provided by CIS benchmarks, can
authentication (MFA), and utilizing centralized identity and help establish a secure baseline for container configurations.
access management (IAM) systems can enhance access Additionally, leveraging automation tools to enforce
control and reduce the risk of unauthorized access. consistent configurations and performing regular
6. Logging and Monitoring configuration audits can enhance security.
- 155 -
Organizations should include security checks, such as [5] Lipatova S.E., Belov Yu.S., “Cybersecurity practices in Kubernetes”,
vulnerability scanning and image integrity verification, as part E-Scio, pp. 489-497, 2022.
of the CI/CD process. Automating security testing and [6] RED HAT: Kubernetes security concerns escalate, 2022. – URL:
https://www.osp.ru/os/2022/03/13056287
incorporating it into the pipeline ensures that security
[7] Semenov A.M., Khvostov V.A., “Docker and Kubernetes as an object
measures are consistently applied throughout the software of implementation of information security threats and protective
development lifecycle. measures”, Voronezh: Voronezh State University of Engineering
Technologies, pp. 54-55, 2022.
8. Testing and Validation
Thoroughly testing and validating container images and
configurations is essential to identify security weaknesses and
ensure the reliability of containerized applications.
Implementing automated testing frameworks and security-
focused testing tools, such as static analysis and dynamic
scanning, can help identify vulnerabilities, misconfigurations,
and potential runtime issues. Regularly validating images
before deployment helps ensure the integrity and security of
containerized environments.
IV. CONCLUSION
In conclusion, the rapidly evolving landscape of container
security poses significant challenges and risks that must be
addressed proactively by organizations. As containers
continue to gain popularity due to their scalability and
efficiency, it becomes imperative for businesses to prioritize
and implement robust security measures to safeguard their
containerized environments.
The overview of security challenges and risks in container
environments highlighted the vulnerabilities that can be
exploited by malicious actors. From insecure container
configurations to vulnerable images and the ever-present
threat of container breakouts, organizations must remain
vigilant and stay ahead of potential attacks.
Common attack vectors targeting containers were
discussed to shed light on the diverse techniques employed by
attackers. From exploiting unpatched vulnerabilities to
orchestrating container escapes, these attack vectors
underscore the need for comprehensive security strategies that
encompass all aspects of container deployment and
management.
To mitigate these risks, organizations must adopt essential
security practices for container deployment and management.
By implementing these best practices, organizations can
bolster their container security and minimize the likelihood of
successful attacks. Security should be integrated throughout
the container lifecycle, from the development phase to
deployment and ongoing management. Ultimately, container
security is an ongoing process that requires a proactive and
holistic approach.
REFERENCES
[1] Hikov S.P., “MODEL FOR SELECTION AN EFFECTIVE
MEAN OF SCANNING CONTAINERS IMAGES IN KUBERNETES
INFRASTRUCTURE”, pp. 249-253, 2019.
[2] Kosenkov V.V., Bogdanov A.V., “Trade-off between security and
performance of Kubernetes container runtimes”, Moscow: Limited Liability
Company “Publishing House ALEF”, pp. 145-153, 2022.
[3] Ghadeer D., Vorobeva A.A., “Kubernetes monitoring with
Prometheus for security purposes”, Ufa: Limited Liability Company
“Scientific Publishing Center “Vestnik Nauki”, pp. 44-50, 2022.
[4] Gurbatov G.O., Panichev A.D., Ushakov I.A., “Securing
Kubernetes”, St. Petersburg: St. Petersburg State University of
Telecommunications. prof. M.A. Bonch-Bruevich, pp. 282-286, 2021.
- 156 -
Research and development of two-factor
authentication methods using neural networks
Temirkhan Darbek Timur Umarov Sabina Rakhmetulaeva
MSc student of the Department of PhD, Associate Professor of the Associate Professor of the
Information Systems and Cybersecurity Department of Computer Science Department of Information Systems
Almaty university of power engineering and British Management University International University of
telecommunications Tashkent, Uzbekistan Information Technologies
Almaty, Kazakhstan [email protected] Almaty, Kazakhstan
[email protected] [email protected]
Abstract—This article discusses the development of a two- However, facial recognition has some drawbacks that can
factor authentication method using neural networks to enhance cause authentication failure or increase the risk of data
digital security. The aim of this methodology is to create a leakage. Firstly, high quality and accurate cameras and
secure and convenient authentication system that does not rely software are required to read and recognise faces. Secondly,
on passwords. Current authentication methods such as this method can be fooled by the use of a photo or video of
password and token authentication are not always secure, and the user's face [5].
new methods that combine security and usability are needed.
To achieve this, Python neural network and image processing To eliminate these problems, a second factor can be
libraries including Keras, TensorFlow, OpenCV, etc. were added, the one-time password (TOTP). TOTP is an
used. The proposed two-factor authentication was compared to abbreviation of Time-based One-Time Password [6]. Such a
other security methods like password hashing algorithms and password is generated by a special application and is only
one-time passwords, and the experiment showed that it valid for a certain period of time (e.g. 30 seconds). The use
provided higher accuracy and performance. The result of the of TOTP increases the security level of authentication
experiment is the use of a combination of two authentication because the one-time password prevents possible attacks
factors: face scanning and TOTP (Time-based One-Time using password hijacking or cracking [7].
Password). Therefore, based on the analysis, a two-factor
authentication system was developed that uses face scanning as Using a telegram bot to generate TOTP allows the
the first factor and TOTP as the second factor, which provides creation of individual keys for each user and makes the
a high level of security and usability. The implementation was process available on any device with internet access. This
done using the Python programming language and Pycharm increases the level of security and protection of personal
development environment, and the neural network was trained data. Adding TOTP to the basic facial recognition method
on data sets containing face images and TOTP codes. helps reduce the likelihood of failed authentication and
significantly increases data security, making two-factor
Keywords—Neural networks, Biometric authentication, Deep authentication based on these methods an effective way to
learning, Digital security, Identification protect users' sensitive data. This method can be successfully
I. INTRODUCTION applied in different fields, from the banking sector to social
media and online shopping.
In today's connected world, the security of transmitted
data is a critical issue and the primary means of security is The results of the research have shown that the proposed
the authentication process [1]. In this case, the primary authentication methods provide a high level of information
method of authentication is usually password [2]. However, protection against unauthorized access. Thus, new two-factor
using this method alone may not be sufficient to guarantee authentication methods are becoming increasingly popular in
data security as there are many ways to break it (e.g. packet the modern world, and are a reliable tool for protecting users'
hijacking or social engineering). Adding a second factor in personal information on the Internet.
the form of something that only the user knows (e.g. the
answer to a question) or a device that only the user has can II. BACKGROUD
increase the security of the system. Authentication can take place in different ways,
depending on which authentication methods are used.
One possibility for the second factor is face recognition Usually authentication is done with a username and
[3]. This authentication method can be used on smartphones, password, but other methods such as biometric data
tablets, PCs and other devices that have a camera. It works (fingerprint, facial scanner), one-time codes, keys, etc. can
on the principle of matching a photo of a user's face with a also be used.
pre-stored version of the same face in a database [4].
In the case of username and password [8] the user has to
enter their username and password in the appropriate fields
- 157 -
on the page or application and then the system checks that Figure 2. Authentication methods from SFA to MFA
the data entered is correct and allows the user to access
secure resources if the username and password are correct. III. RELATED WORKS
An article [24] presents a multi-factor authentication
By using biometrics [9], the authentication process can method that combines face verification, one-time password
be automated. For example, to verify a fingerprint, the user and hand gesture recognition. The authors claim that this
simply touches the fingerprint sensor on the device, which combination of factors provides a more reliable and secure
compares their fingerprint with that stored in the system and, authentication method than traditional one-factor methods.
if they match, allows access to secure resources. The results of the study showed that the face verification
One-time codes are one-time passwords generated by the system has an average false positive rate of 1.94% and an
system and sent to the user by SMS or other means. The user average true positive rate of 67.7%. The hand gesture
must enter the code received to complete the authentication recognition system shows an accuracy and recall rate of
process [10]. 96%. The research paper [25] presents a deep learning-based
face recognition system that achieves state-of-the-art results
The authentication process remains the primary means of on the Labeled Faces in the Wild (LFW) dataset. The system
protecting against unauthorised access to devices and uses a convolutional neural network (CNN) to extract
sensitive applications, both offline and online (Fig. 1). In the features from facial images and then uses a support vector
past, the authenticity of transactions was confirmed machine (SVM) to classify the images into different
physically, for example by applying a wax seal [11]. identities. The system achieves an accuracy of 99.63% on the
However, as civilisation has evolved, it has become apparent LFW dataset, which is significantly higher than the accuracy
that sender identification is not always sufficient to ensure of previous systems. In [26], a face recognition system (FRS)
security across the global network [12]. that runs on a cloud computing platform and uses a deep
learning algorithm to extract features from facial images has
been proposed. The system compares these features with a
database of known users, which allows it to authenticate
users with high accuracy. The authors conducted
experiments to evaluate the performance of their FRS
system. They compared the performance of cloud-based FRS
with traditional FRS implemented on a desktop computer
and obtained results that showed significantly faster and
Figure 1. Authentication examples more accurate performance of cloud-based FRS. In [27], they
propose a new two-factor authentication scheme (2FA) for
Initially, only one form of authentication, called Single- the Hyperledger Fabric blockchain that uses the TOTP
Factor Authentication (SFA), was used to verify the identity algorithm to generate a 6-digit authentication code on the
of users. [13] This technique became popular due to its user's device. This code is used to authenticate the user to the
simplicity and user-friendliness, such as entering a password blockchain network. The authors evaluated the effectiveness
or PIN. However, it is the weakest authentication method of their 2FA scheme and found that it is significantly faster
[14] as an attacker can compromise the account by learning and provides a higher level of security than the existing 2FA
the password or conduct a dictionary [15], rainbow table [16] scheme for the Hyperledger Fabric blockchain.
or social engineering attack. [17] Two-factor authentication
(2FA) [18] has been proposed to improve security, which IV. MATERIALS AND METHODS
uses several factors such as password and smart card [19].
Today, three types of factor groups are available [20]: A. Facial recognition .
knowledge factor, ownership factor and biometric factor, Facial recognition is a type of biometric technology that
which help to link the user's identity to the credentials. uses artificial intelligence and machine learning algorithms
[28] to identify individuals based on their unique facial
Further, multi-factor authentication (MFA) has been
features. The process of facial recognition involves several
proposed, which uses more than two categories of credentials
steps, including input frames, pre-processing, face
[21] to provide a higher level of security and continuous
recognition, feature extraction, feature matching by neural
protection of computing devices as well as other critical
nets, face database, face/user identification, and
services against unauthorised access. It is mainly based on
authentication.
biometric techniques [22], which allow automatic
identification of individuals based on their behaviour. This The first step in the facial recognition process is input
significantly increases the level of security as users have to frames. These are images or video frames that contain the
present evidence of their identity [23]. Figure 2 shows the faces of individuals that need to be identified. Once the input
evolution of the authentication methods considered in this frames have been captured, they are pre-processed to
context. enhance the quality of the image and remove any noise or
distortion.
Next, the face recognition stage begins. This involves
using pattern recognition algorithms to identify specific
features of the face such as the eyes, nose, mouth, and chin.
These features are then extracted from the image and
compared to a database of known faces.
The feature extraction stage uses complex algorithms to
extract key features of the face from the input frames. This is
- 158 -
done by identifying unique points on the face, such as the Finally, the similarity between the input face and the
corners of the eyes or the shape of the jawline, and creating a training faces is measured using a distance metric, such as
mathematical representation of these features that can be Euclidean distance or Mahalanobis distance. The formula
used for comparison in the next stage. for Euclidean distance is:
Once the features have been extracted, they are matched D = ‖𝑃 − 𝑄‖ (3)
against known features in a face database. This is where the
neural net comes into play. A neural net is a type of machine The total time complexity of the Hadoop job can be
learning algorithm that can be trained to recognize patterns in calculated as follows:
data. The neural net is trained to recognize the features of a
where D is the Euclidean distance between the input face
particular individual's face and match them against the
features extracted from the input frames. P and the closest training face Q in the eigenspace.
- 159 -
TOTP = HOTP(K, T) (4) Thus, using two-factor authentication via Telegram bot
with TOTP and facial recognition provides a higher level of
where TOTP is Time-Based One-Time Password, HOTP
security than simple password authentication. This is due to
is HMAC-based One-Time Password, K is Secret key
the fact that to gain access, one must not only know the
shared between the user and the service provider and T is
password, but also have access to the mobile device and
Current time in Unix time format, i.e., the number of
undergo facial scanning. (Fig. 5)
seconds since January 1, 1970, at 00:00:00 UTC.
The HOTP function is defined as: V. PERFORMANCE TESTS AND RESULTS
The Python programming language was chosen to create
HOTP(K, C) = Truncate(HMAC-SHA-1(K, C)) (5) a program for two-factor authentication. This language is
where HMAC-SHA-1 is a keyed hash function that takes known for its simplicity and usability, as well as extensive
as input the secret key K and a counter value C. Truncate is library capabilities, which makes it very popular in the
a function that extracts a specific number of digits from the software development environment.
HMAC-SHA-1 output. For example, if we want a six-digit One of the main libraries used was OpenCV (Open
TOTP code, we would extract the leftmost six digits from Source Computer Vision Library), which provides a wide
the HMAC-SHA-1 output. range of tools for working with images and video, including
face recognition functionality.
C. Two-factor authentication using facial recognition and
TOTP. To implement the telegram bot, the pyTelegramBotAPI
Two-factor authentication (2FA) is a method of library was used, which provides a simple and convenient
protecting user accounts and data that requires two interface for working with the Telegram programming
confirmations: the first confirmation is what the user knows interface. Thanks to this library, it was possible to generate a
one-time password (TOTP) through the telegram bot, which
or has (such as a password), and the second confirmation is
provides an additional level of security when logging in or
what the user has (such as the device on which they are accessing sensitive information.
registered).
Additionally, several other libraries were used in the
In this case, the first factor is facial recognition, which creation process, such as pandas, numpy, pytorch, requests
can be implemented with special software that uses neural and pillow. Pandas and numpy allowed us to work with large
networks. The user will have to go through a procedure of amounts of data, and pytorch was used to train a face
scanning his face so that the system can create his recognition model. Requests was used to interact with the
"biometric template" which will be used for further Telegram API, while pillow allowed us to manipulate images
authentication. in the recognition process and store them in the right format.
The second factor in this case is a time-limited one-time A. Two-factor authentication process based on facial
password (TOTP) that will be issued via a telegram bot. The recognition and TOTP
TOTP is generated based on the secret key provided to the The first authentication factor is face recognition. The
user when setting up 2FA. A special mobile app can be used app uses the device's camera to scan the user's face and store
to generate the TOTP, or bots that work in messengers such it in a database. In order to add their face to the database, the
as Telegram. user must press the 'Sample' button and the app will start the
When attempting to log in, the user will have to go face scanning process. When the scanning is complete, the
through facial recognition, after which a TOTP will be sent user's face is saved to the database for later use in the
to them via a Telegram bot. The user will have to enter this authentication process. A message will be displayed stating
password to confirm their identity and complete the that the user's face has been successfully saved to the
authentication process. database. (Fig. 6)
- 160 -
Once a person has been added to the database, the DISCUSSION OF RESULTS
software must be trained on the basis of the saved faces. Creating a strong authentication system is a key
Training is done by pressing the "Training" button. At this challenge in information security. In recent years, there has
point the software analyses the saved faces and uses them to been an increasing focus on two-factor authentication, which
train the facial recognition algorithms. This allows the improves security by using two or more factors to
software to improve the accuracy of face recognition during authenticate a user's identity. In this article we will look at
the authentication process. If training is successful, the creating two-factor authentication based on facial recognition
message "Image trained" appears on the screen. (Fig. 7) and a TOTP token that is generated via a telegram bot.
The first thing to do is to decide on the first
authentication factor. Face recognition is a sufficiently strong
method of user identification that can be used in conjunction
with another authentication factor. Face detection can be
performed either on the user's device or on the application
server. If face recognition is used on the server, the user's
data can be further protected, as the user will have to be
authenticated before accessing the data on the server.
The second authentication factor is a TOTP token, which
Figure 7. Training of facial recognition algorithms after addition to the is generated through a telegram bot. This method of user
database
authentication is convenient and secure as the generation of
Next, the application uses TOTP as the second the code takes place on the user side and not on the
authentication factor. After successfully recognising the application server. This avoids the transmission of
user's face, the app sends the user's ID to the telegram bot to confidential information through open channels of
generate a temporary verification code. This means that each communication. Moreover, using a telegram bot to generate
user gets his own unique verification code and no one else a TOTP code facilitates the authentication process and makes
can use it instead. The user has to verify that his ID is correct it more convenient for users.
and confirm his identity. If the user enters the wrong ID, they
will not be able to pass the authentication process. (Fig. 8) However, when creating this authentication system,
possible risks and limitations need to be taken into account.
For example, facial recognition may be less reliable in case
of major changes in the user's appearance, such as a change
of hairstyle or growth of a beard. There may also be
problems with facial recognition accuracy in low light or
noise conditions.
Additional methods of user authentication, such as
fingerprint scanning or the use of voice control, can be used
to increase the reliability of the authentication system. In
addition, facial recognition needs to be carefully configured
Figure 8. Using TOTP as a second authentication factor
and TOTP code transmission via a telegram bot needs to be
After entering the ID, the user receives a verification secured.
code on their Telegram. The code is valid for 60 seconds and
So, creating two-factor authentication based on facial
the user must enter it within this time. If the verification code
recognition and a TOTP token that is generated through a
is correct, the software will successfully authenticate the
telegram bot is an effective way to protect personal data and
user. (Fig. 9)
privacy. However, to achieve maximum reliability and
security, the risks and limitations of this authentication
system must be considered and additional user authentication
methods must be used.
CONCLUSION
In conclusion, creating two-factor authentication using
facial recognition and TOTP code generation via a telegram
bot is an effective way to protect data and secure access to
resources and services. Facial recognition is a sufficiently
Figure 9. Entering the verification code during the second authentication strong method of user identification that can be used in
factor
conjunction with another authentication factor.
Overall, two-factor authentication using facial
A Telegram bot that generates a TOTP code allows a user
recognition and TOTP provides a high level of security for
to retrieve the authentication code on their mobile device,
user data. The software stores user face data in a database
which is convenient and secure as the code data is not
that is used to train facial recognition algorithms. This allows
transmitted over open channels. This also facilitates the
the software to recognise users more accurately during the
authentication process and makes it more user-friendly.
authentication process. When TOTP is used, each user
receives their own unique verification code, making the The OpenCV library was chosen to develop a face
authentication process even more secure. recognition program, allowing for efficient image and video
processing. An application capable of recognizing faces in
- 161 -
images and videos and storing them in a database was [12] Danny T. MFA (Multi-Factor Authentication) with Biometrics. 2017.
created. Available online: https://www. bayometric.com/mfa-multi-factor-
authentication-biometrics/ (accessed on 4 Jaurnay 2018).
Tests were conducted that confirmed the effectiveness of [13] Konoth, R.K.; van der Veen, V.; Bos, H. How anywhere computing
the method. The system successfully recognized users' faces just killed your phone-based two-factor authentication. In Proceedings
and generated unique TOTP codes for each authorization, of the International Conference on Financial Cryptography and Data
Security, Christ Church, Barbados, 22–26 February 2016; Springer:
which provided a high level of security and protection Berlin, Germany, 2016; pp. 405–421.
against unauthorized access. [14] Dasgupta, D.; Roy, A.; Nag, A. Toward the design of adaptive
Thus, the implementation of two-factor authentication, selection strategies for multi-factor authentication. Comput. Secur.
2016, 63, 85–116.
including facial recognition and the use of TOTP code via
[15] Wang, D.; Wang, P. Offline dictionary attack on password
Telegram bot, is an effective way to protect access to various authentication schemes using smart cards. In Information Security;
systems and services. This system can be used in various Springer: Berlin, Germany, 2015; pp. 221–237.
areas such as online banking, e-mail and other services [16] Ah Kioon, M.C.; Wang, Z.S.; Deb Das, S. Security analysis of
where a high level of security is required. MD5 algorithm in password storage.
[17] Appl. Mech. Mater. 2013, 347, 2706–2711.
REFERENCES [18] Heartfield, R.; Loukas, G. A taxonomy of attacks and a survey of
[1] Y. Guo et al., "A Security Protection Technology Based on Multi- defence mechanisms for semantic social engineering attacks. ACM
factor Authentication," 2022 IEEE 2nd International Conference on Comput. Surv. (CSUR) 2016, 48, 37.
Mobile Networks and Wireless Communications (ICMNWC), [19] Schneier, B. Two-factor authentication: Too little, too late. Commun.
Tumkur, Karnataka, India, 2022, pp. 1-5, doi: ACM 2005, 48, 136.
10.1109/ICMNWC56175.2022.10032006.
[20] Sun, J.; Zhang, R.; Zhang, J.; Zhang, Y. Touchin: Sightless two-factor
[2] N. Pato. Josep & I. Millett. Lynette, “Biometric Recognition, authentication on multi-touch mobile devices. In Proceedings of the
Chaleenges and Opportunities” NATIONAL RESEARCH Conference on Communications and Network Security (CNS), San
COUNCIL, 2010. Francisco, CA, USA, 29–31 October 2014; pp. 436–444.
[3] Adjabi, I.; Ouahabi, A.; Benzaoui, A.; Taleb-Ahmed, A. Past, Present, [21] Harini, N.; Padmanabhan, T.R. 2CAuth: A new two factor
and Future of Face Recognition: A Review. Electronics 2020, 9, authentication scheme using QR-code. Int. J. Eng. Technol. 2013, 5,
1188. https://doi.org/10.3390/electronics9081188 1087–1094.
[4] Marti, Ni Wayan. (2010). Pemanfaatan GUI dalam Pengembangan [22] Scheidt, E.M.; Domangue, E. Multiple Factor-Based User
Perangkat Lunak Pengenalan Citra Wajah Manusia Menggunakan Identification and Authentication. U.S. Patent 7,131,009, 31 October
Metode Eigenfaces. Seminar Nasional Aplikasi Teknologi Informasi 2006.
2010 (SNATI 2010) ISSN: 1907-5022 Yogyakarta, 19 June 2010.
[23] Frank, M.; Biedert, R.; Ma, E.; Martinovic, I.; Song, D. Touchalytics:
[5] Li, Lei. Feng, Xiaoyi. Xia, Zhaoqiang. Jiang, Xiaoyue. Hadid On the applicability of touchscreen input as a behavioral biometric for
Abdenour. (2018). Face Spoofing Detection with Local Binary continuous authentication. IEEE Trans. Inf. Forensics Secur. 2013, 8,
Pattern. Preprint submitted to Journal of Visual Communication and 136–148.
Image Representation.
[24] Aleluya E. R. M., Vicente C. T. Faceture ID: face and hand gesture
[6] TOTP: Time-Based One-Time Password Algorithm https://www.rfc- multi-factor authentication using deep learning //Procedia Computer
editor.org/rfc/rfc6238.html Science. – 2018. – Т. 135. – С. 147-154.
[7] Plata I. T., Calpito J. L. Application of time-based one time password https://doi.org/10.1016/j.procs.2018.08.160
(TOTP) algorithm for human resource e-leave tracking web app [25] M. Zulfiqar, F. Syed, M. J. Khan and K. Khurshid, "Deep Face
//International Journal of Scientific and Technology Research. – 2020. Recognition for Biometric Authentication," 2019 International
– Т. 9. – №. 3. – С. 4070-4077. Conference on Electrical, Communication, and Computer
[8] Kun, A.L.; Royer, T.; Leone, A. Using tap sequences to authenticate Engineering (ICECCE), Swat, Pakistan, 2019, pp. 1-6, doi:
drivers. In Proceedings of the 5th International Conference on 10.1109/ICECCE47252.2019.8940725.
Automotive User Interfaces and Interactive Vehicular Applications, [26] Pawle A. A., Pawar V. P. Face recognition system (FRS) on cloud
Eindhoven, The Netherlands, 28–30 October 2013; ACM: New York, computing for user authentication //International Journal of Soft
NY, USA, 2013; pp. 228–231. Computing and Engineering (IJSCE). – 2013. – Т. 3. – №. 4. – С.
[9] J. Anand Babu, H. P. Neha, K. S. Babu and R. N. Pinto, "Secure Data 189-192.
Retrieval System using Biometric Identification," 2022 IEEE [27] W. -S. Park, D. -Y. Hwang and K. -H. Kim, "A TOTP-Based Two
International Conference on Data Science and Information System Factor Authentication Scheme for Hyperledger Fabric Blockchain,"
(ICDSIS), Hassan, India, 2022, pp. 1-4, doi: 2018 Tenth International Conference on Ubiquitous and Future
10.1109/ICDSIS55133.2022.9915968. Networks (ICUFN), Prague, Czech Republic, 2018, pp. 817-819, doi:
[10] Acharya, S.; Polawar, A.; Pawar, P. Two factor authentication using 10.1109/ICUFN.2018.8436784.
smartphone generated one time password. J. Comput. Eng. (IOSR- [28] Azarov I., Gnatyuk S., Alexander M., Azarov I., Mukasheva A., Real-
JCE) 2013, 11, 85–90. time ML Algorithms for The Detection of Dangerous Objects in
[11] Balloon, A.M. From Wax Seals to Hypertext: Electronic Signatures, Critical Infrastructures, CEUR Workshop Proceedingsthis link is
Contract Formation, and a New Model for Consumer Protection in disabled, 2023, 3373, pp. 217–226
Internet Transactions. Emory Law J. 2001, 50, 905.
- 162 -
Design and Implementation of an Electronic Voting System
Using the IBM Blockchain Platform
In this paper we present the electronic voting or e-voting system based on the IBM
Blockchain platform. IBM Blockchain platform is integrated with the Hyperledger Fabric
framework, which provides blockchain-as-a-service and offers several edges together with
decentralization and transparency (an audit ability, performance, and measurability. We have
design secure and robust electronic voting system for university elections to elect student leader
from the different faculties candidates.
The details of a blockchain-based e-voting system designing using a commercial
blockchain platform and UML model of the business logic of voting processes are considered.
Visual Studio Code 2022 IDE is selected for software implementation of a client-server application
on JavaScript. Some libraries and frameworks such as VueJs, Webpack, NodeJs, npm, Express,
IBM Blockchain Platform Extension are used. The architecture of the system being developed
consists of a server and a client part and offers the participation of two types of users: a blockchain
operator and a voter. The blockchain operator installs and configures the IBM Blockchain
Platform. On the IBM Blockchain Platform: The Hyperledger Fabric network is created in the
IBM Kubernetes service; the blockchain operator installs and instantiates the smart contract on the
network. The backend (written in Node.js) uses the Fabric SDK to interact with the deployed
network on the IBM Blockchain Platform. It creates an API for use on the client side. The client
side (written in Vue.js) uses the Node.js application API to interact with the web. The voter
interacts with the Vue.js web interface to cast their vote and query the voting status to see their
vote, current and final voting results.
Hyperledger cloud system is a public platform within which all transactions committed are
held on in an exceeding blockchain. The chain grows endlessly as new blocks are added.
Therefore, we will also analyze the performance and the system requirements of our proposed
approach for deploy a scalable and a secure e-voting system in any size university campus. The
performance of the e-voiting system based on the IBM Blockchain platform with an increase in
the number of voters was studied taking into account various blockchain platform configuration
parameters, such as block size, consensus protocol type, mining algorithm complexity, the
transaction throughput and latency.
- 163 -
Study of Network Virtualization Security
in Public Network
Abstract— Mobile devices such as smartphones, tablets, and This paper identifies the problems and requirements for
wearables are increasingly being used in business environments, applying network virtualization in public networks and
while business culture such as telecommuting, agile, and describes the related technologies, network architecture, and
DevOps is also spreading rapidly. In this environment, users authentication procedures. Additionally, future works for
need a network that easily connects their devices to the network, evaluating network transmission and encryption performance
while also providing the same network environment regardless are proposed.
of user location to ensure continuity of applications and
collaboration with remote users. While IPSec or SSL(TLS) II. PROBLEM ANALYSIS
based VPNs have been applied as a solution to meet these
requirements, they have limitations such as VPN appliance A. Layer-2 security of Virtualized Network
construction on the user network or VPN agent installation on As the VXLAN network expands and covers more devices,
the user PC, as well as communication restrictions to layer-3
the risk of security threats also increases. An attacker can use
networks. Therefore, a layer-2 based virtual network is required
the same ARP attack method that is used to compromise
for seamless communication on an IP-based network. This
paper proposes an architecture to provide a virtualized network
VLANs to attack VXLAN. VXLAN itself does not provide a
environment like inside the campus on the public network. To security mechanism to prevent malicious ARP spoofing.
implement this virtualized network, specific improvements are Moreover, due to the large number of devices that can be
suggested, including systems to support dynamic virtualized connected to VXLAN, there is a need for countermeasures to
networks, trustworthy encryption methods, and measures for prevent security threats that may come from malicious users
SDN vulnerabilities. Future works are also discussed, outlining or devices on the extended VXLAN. Therefore, it is important
the necessary steps to implement this architecture and overcome to implement additional security measures and protocols to
the challenges of creating a secure and scalable virtualized secure VXLAN networks and prevent such security threats.
network in a public network environment.
B. Vulnerability of SDN
Keywords—Network Overlay, VXLAN, L2TP, MACsec, SDN It is important to note that the lack of TLS implementation
in OpenFlow switches and controllers can be a significant
I. INTRODUCTION security risk in a public network environment. Without
Mobile business environment, enterprise users require encryption, attackers can potentially intercept and manipulate
access to internal systems regardless of their location. communication between the controller and switches, leading
However, this access must be restricted to protect the campus to various security threats such as eavesdropping and MITM
network from external security threats [1]. Currently, users attacks. As a result, it is crucial for both software and hardware
must be assigned a new IP when they change campus, and vendors to fully implement the security specifications,
access control policies for IP need to be modified. To address including TLS, in their OpenFlow products to ensure a secure
these challenges, companies require a logically separated SDN deployment in a public network environment.
network in the same physical network, which can reduce costs
and improve business efficiency. Additionally, if the logically III. RELATED WORK
separated network supports the same layer-2 network A. Layer-2 Network Virtualization Protocol
regardless of location, user convenience can be increased [2].
The early adoption of overlay network technology has
To meet these requirements, Network Virtualization and
paved the way for its implementation in scalable and
Software Defined Network (SDN) technologies are needed.
manageable cloud environments. As Software-Defined
However, security concerns must be considered as layer-2
Networking (SDN) based on Network Function Virtualization
network coverage expands, and before applying OpenFlow in
(NFV) continues to evolve, overlay network-based network
Public Network, careful consideration must be given to MITM,
virtualization is becoming increasingly integrated into user
communication encryption, switch authentication, and DoS
network environments [4]. A notable solution in this regard is
[3]. In a public network environment, sufficient virtual
CISCO SDA, which utilizes the dedicated Cisco Meta Data
network pools must be provided to create an isolated network
(CMD) protocol to provide 65,000 security groups [5].
environment for each user, and user authentication procedures
However, the limited number of user groups and the network
are required to block unauthorized access and provide
segmentation between remote users pose challenges to
authorized access to the user. Encryption must be applied to
network virtualization. To address these challenges and
ensure the confidentiality of data transmitted over the virtual
accommodate various protocols and services, layer 2 network
network.
- 164 -
virtualization is deemed appropriate, and technologies such as technology, with additional security measures including
VXLAN, STT, NVGRE, and LISP listed in Table 1 are 802.1X port-based authentication, MACsec for layer-2
utilized [6,7,8]. transport encryption, and virtual network (VN) gateways. As
TABLE 1. Comparison of Network Overlay Technologies
shown in Figure 1, the physical network infrastructure is
divided into ISP and campus areas. The ISP provides layer-2
Category VXLAN STT NVGRE LISP transmission from user PCs to the Virtualized Network Node
Overlay (VNN) built in the public cloud, and relays authentication
24bit 64bit 24bit 24bit
identification services to enable users to connect to the campus network as
LISP Layer if they were inside the campus.
3 draft RFC
Network MTU
should be None; STT
proposes The user authentication process begins with the user
Draft RFC two logging in with their "id@domain," which is then sent to the
Fragmentation increased 50 uses the
proposes using methods for PE controller for verification with the Authentication Server
after bytes to avoid interface MTU
path MTU handling
encapsulation fragmentation and TCP
discovery LISP [11]. After authentication, the VNN Controller orders the
of VXLAN segmentation VNN Archive to start a VNN instance, followed by layer-2
packets that
packets
exceed tunneling of L2TP between the host and VNN, and VXLAN-
MTU EVPN tunneling between VNN and VN Gateway. For
Forwarding of confidential transmission, MACsec is applied to
Layer-2 Encapsulation Encapsulation Encapsulation
broadcast, uses IP uses IP uses IP
Use of communication from the host to VN Gateway, due to its high
underlay encryption speed compared to IPsec. If layer-2
multicast, and multicast as multicast as multicast as
multicast communication is supported, MACsec is a recommended
unknown destination IP destination IP destination IP
unicast encryption protocol.
LISP
leaves open the mapping Overall, our proposed architecture offers a secure and
choice of
data plane
system, scalable solution for virtualized network environments in
control plane, supporting public networks, while ensuring efficient and confidential
Address data plane learning,
keeping it encoding of transmission of data.
learning based learning control plane
separate from instance ID
based, etc.
the data plane and MAC
encapsulation address 2- Fig I. ARCHITECTURE OF VIRTUALIZED NETWORK THROUGH ISP
tuple
B. SDN
SDN Separates control plane and data plane functions.
Control Plane provides the forwarding table to the Data Plane,
and the Physical Switch only performs the Data Plane function
to forward the packets. The centralized control plane
configuration, the centralized controller function can
recognize the network status more quickly than in a distributed
TABLE 2. Feature Detail of Elements
environment, so that the control function can be reflected
dynamically and appropriately. Control Plane's Program Element Function Remarks
Function, Program-capable Controller function is the most PE ∙ Authentication Info relay to Controller OpenFlow
important feature of SDN. You can share hardware, but you (Provider Edge) ∙ Switching, Flow table update Switch
can apply different policies to separate virtual network ∙ 802.1X Authenticator
OpenFlow
environments. SDN provides a centralized control plan for PE Controller ∙ Perform authentication after checking
Controller
user domain
communicating with data planes and applications. Currently,
VNN ∙ L2TP Connection with Host
OpenFlow is used as a representative Southbound API. OpenFlow
(Virtualized ∙ VXLAN-EVPN to VN Gateway
Compared to the Southbound API, the Northbound API Switch (VM)
Network Node) ∙ VNN Resource Monitoring/Reporting
standard is underdeveloped. There is also a need for an East- ∙ VNN generation request, VNN scale
OpenFlow
West API for communication between different controllers [9]. VNN Controller in/out request
Controller
∙ Transfer the VNI of User to VNN
C. 802.1AE (MACsec) VNN Archive ∙ Storage of Customers‘ VNN Image
∙ Node included Gateway IP of VN
MACsec guarantees confidentiality and integrity between
VN Gateway ∙ Connection with Campus Backbone
LAN-connected systems in layer-2 communication. It also Switch
provides strong validation against the reply attack. The ∙ User authentication
Authenticator
MACsec security mechanism does not affect the upper layer, ∙ Assign VNI based on id, mac, and
Server
so there is no need to modify the user application [10]. certificate
- 165 -
would not modify the IP header of the original packet. This [4] Data Center Overlay Technologies (Cisco White Paper),
provides users with a seamless experience for business https://www.cisco.com/c/en/us/products/collateral/switches/nexus-
9000-series-switches/white-paper-c11-730116.html
services, whether they are inside or outside the campus.
[5] Gu, Ruichun, et al. "Enhancing Security and Scalability in Software
To evaluate the performance of the proposed architecture Defined LTE Core Networks." 2018 17th IEEE International
and identify any potential issues on the actual network, a proof Conference On Trust, Security And Privacy In Computing And
Communications/12th IEEE International Conference On Big Data
of concept (PoC) should be implemented. Additionally, future Science And Engineering (TrustCom/BigDataSE). IEEE, 2018.
research will aim to propose a flexible method for [6] Han, Bo, et al. "Network function virtualization: Challenges and
authenticating hosts through previously unidentified opportunities for innovations." IEEE Communications Magazine 53.2
authenticators (such as switches or access points) and enabling (2015): 90-97.
communication with the Virtual Network Node (VNN). [7] Tuladhar, Summit R., Carlos E. Caicedo, and James BD Joshi. "Inter-
domain authentication for seamless roaming in heterogeneous wireless
ACKNOWLEDGMENT networks." 2008 IEEE International Conference on Sensor Networks,
Ubiquitous, and Trustworthy Computing (sutc 2008). IEEE, 2008.
This work was supported by the National Research [8] Ward, Rory, and Betsy Beyer. "Beyondcorp: A new approach to
Foundation of Korea (NRF) grant funded by the Korea enterprise security." (2014).
government(NRF-2021R1G1A1004340). [9] VXLAN Overview: Cisco Nexus 9000 Series Switches,
https://www.cisco.com/c/en/us/products/collateral/switches/nexus-
REFERENCES 9000-series-switches/white-paper-c11-729383.html
[1] Reyes, Guido Pineda, Maarten Dammers, and Maarthen Kastanja. [10] Jain, Raj, and Subharthi Paul. "Network virtualization and software
"Security assessment on a VXLAN-based network." Haettu 10.2017 defined networking for cloud computing: a survey." IEEE
(2014): 2013-2014. Communications Magazine 51.11 (2013): 24-31.
[2] Benton, Kevin, L. Jean Camp, and Chris Small. "OpenFlow [11] IEEE 802.1X, https://en.wikipedia.org/wiki/IEEE_802.1X
vulnerability assessment." Proceedings of the second ACM [12] Innovations in Ethernet Encryption for Securing High Speed WAN
SIGCOMM workshop on Hot topics in software defined networking. Deployments., https://www.cisco.com/c/en/us/products/collateral/ios-
ACM, 2013. nx-os-software/identity-based-networking-services/white-paper-c11-
[3] Overview of TrustSec (Cisco Order Guide), 737544.html
https://www.cisco.com/c/dam/assets/global/pdfs/november- [13] Chowdhury, NM Mosharaf Kabir, and Raouf Boutaba. "Network
security/C07-730151-00_overview_of_trustSec_og.pdf virtualization: state of the art and research challenges." IEEE
Communications magazine 47.7 (2009): 20-26.
- 166 -
Developing An Attack Detection Algorithm
Model and Compared with The K-Means
Algorithm
Uyangaa. Kh 1,2, Odonchimeg. L 1, Dashdorj. Ya 1*, Liji Wu 2 and Heemin Park 3
1
Mongolian University of Science and Technology, Mongolia
2
Tsinghua University, China
3 Sangmyung University, Korea
Email: [email protected], [email protected]
Abstract—This research examines network attacks that The following researchers [5], [6] mainly focused on
occur frequently using real-time traffic data. Due to the malware analysis and signature-based attack detection.
significant computational resources needed to analyze raw real- Nevertheless, intrusion detection systems are still being
time data, the data underwent reprocessing. This involved developed based on the research works of these datasets. For
calculating the number of packets per second and selecting the example, the DARPA (Lincoln Laboratory 1998-99) traffic
nearest second for analysis, revealing a high standard deviation file consists of email, web browser, FTP, Telnet, IRC, and
ratio in packet counts. The research then proceeded using the SNMP traffic, as well as DoS, Guess password, Buffer
reprocessed data. To estimate attack probabilities, a normal
overflow, remote FTP, Syn flood, Nmap, and Rootkit attack
distribution was employed, and probability limits were
traffics. These attack traffic files are outdated, and some are
established using Chebyshev's inequality. An algorithm was
developed using these probabilities to classify attacks, and its
stored on currently used databases.
performance was compared to that of the k-means algorithm. Within the scope of this research, we aim to propose a
The proposed algorithm's effectiveness was evaluated by statistical and anomaly-based intrusion detection algorithm by
estimating the differentiation coefficient. Results indicated an transforming and analyzing based on traffic file datasets.
impressive 96% accuracy rate in distinguishing attacks with the Consequently, we chose the CIC-IDS2017 dataset, which
proposed algorithm. In conclusion, this research provides contains the common attack traffic data widely used in
valuable insights into analyzing network attacks using real-time
advanced model experiments [7]. Although the Canadian
traffic data. The proposed algorithm, incorporating probability
Institute for Cybersecurity Datasets is available to pick the
estimation and classification techniques, demonstrates a high
degree of accuracy in effectively identifying and differentiating latest traffic files, such as 2021, 2022, and 2023, respectively,
attacks. we used the CIC-IDS2017 files for the following reasons.
Our research contribution is grounded in two primary
Keywords— Machine learning, Network attacks, K-means factors. Firstly, utilizing the 2017 traffic file, which
algorithm, Chebyshev's inequality, DDoS LOIT, Portscan encompasses a broad spectrum of network data traffic,
I. INTRODUCTION provides an extensive dataset for our proposed research.
Secondly, we have previously conducted an experiment
By the Digital 2023 Global Overview Report, 8.01 billion described in reference [8], where we implemented three
people were counted in January 2023, and 64.4% use the different attacks using the same traffic file as a basis. Building
Internet today[1]. As internet users grow, attacks and upon this foundation, we continue developing our study and
malicious code spread in the internet environment also analyzing the implementation of these attacks using
increase. After the Pandemic period, significant changes are Chebyshev's inequality, as outlined in reference [9]. By
evolving in the cyber world too. Reference [2] summarizes incorporating these scientific methodologies, we aim to
the cybersecurity statistics, including the top cyberattack types enhance the robustness and accuracy of our research.
such as malware, DDoS, and Ransomware. The article [2]
remarks that 0.3 million malware is created daily, and the This research paper is structured as follows: Section 2
cyberattack happens every 39 seconds on average. Internet provides details about the network topology and experimental
network attacks can be detected by anti-virus software on the setup, while Section 3 discusses the statistical processing of
user's device, host-based intrusion detection software, next- traffic data and presents the outcomes of the k-means machine
generation firewall, and the tools such as intrusion detection learning approach. Section 4 presents the results obtained
systems (IDS) on public networks. The intrusion prevention using Chebyshev inequality, Section 5 introduces the
system (IPS) also detects and protects against internet network proposed traffic classification method and its results, and the
attacks. However, these tools may be ineffective in noticing concluding chapter summarizes the research findings,
certain types of attacks. In this case, researchers continue highlighting key outcomes and implications.
studying and analyzing attack traffic files using various
techniques and struggle to find operative datasets developing
their methods [3], [4]. In some cases, the attack traffic files
contain personal information, making using them challenging
for research purposes. Hence, it is required to change some
info, such as the IP addresses and port numbers of the devices,
for research purposes.
- 167 -
Fig. 1. Overview design of attacks and traffic collection
II. EXPERIMENTS TRAFFIC COLLECTION TOPOLOGY including Botnet ARES, PortScan, and DDoS LOIT,
representing common attack strategies. The DDoS attacks
A. General Topology The Traffic Collection Network utilized the LOIC tool, targeting web servers to disrupt their
Topology Network functioning. The PortScan profile emulated reconnaissance
Figure 1 illustrates the experimental setup comprising two attempts by scanning for open ports using the Nmap tool. The
networks: Network 1 (victim side) includes DNS, FTP, and Botnet attack simulated coordinated and distributed attacks by
web servers, along with a dedicated packet collector server, employing the ARES tool against five Windows OS
while Network 2 (attacker side) consists of Windows, Kali computers, enabling the evaluation of intrusion detection
Linux, and Ubuntu operating systems. This setup replicates a mechanisms. These diverse attack profiles in the CIC-
realistic scenario where the attacker side launches diverse IDS2017 dataset facilitate comprehensive research and
attacks on the victim network, enabling comprehensive traffic analysis in network security.
data collection. By adopting this configuration, the study aims
to closely simulate real-world situations, facilitating an in- III. STATISTICAL CHARACTERISTICS
depth analysis of attack implications on the victim network. This research used the Wireshark tool to collect two traffic
This approach enhances the validity and applicability of the files and save them separately by their frame delta time and
research, contributing to a better understanding of network sending packet size. Since these two parameters can be used
security and various attack strategies' impact. as one general network parameter, statistical processing was
performed on them. As shown in Table 2, the attack packets
Table 1 displays the traffic data collected during the are saved as Day2 files, consisting of both normal and attack
experiment, consisting of two types: Day 1 represents normal packets that pass through the network between 9:00 am and
network traffic from 9:00 am to 5:00 pm, saved as Day1.pcap 5:00 pm. The following file (Day1) contains normal packet
(10GB). Day 2 captured attacks using specific IP addresses, flow between 9:00 am to 5:00 pm. The packets collected were
including Botnet ARES, PortScan, and DDoS LOIT, 9 million and 11 million on Day 1 and Day 2, respectively.
occurring at distinct time periods, with the corresponding logs The standard deviation of attack and normal traffic flows are
stored as Day2.pcap (8.6GB). Further details about the attacks calculated, and the results are displayed in Table 2.
can be found in reference [4]. These data provide the basis for According to the results, the difference between their mean
conducting further investigations and developing effective and standard deviation is minuscule, which is 1.3, resulting in
security measures to mitigate the impact of such attacks on the difficulty showing different features. Thus, it was necessary
network. to reprocess the traffic data. We separated the number of
B. Experimental Setup incoming packets and the period between them within a close
The traffic data was captured and logged using Wireshark, range to a second, then carried out statistical processing,
saving it as *.pcap files for further analysis. The CIC-IDS2017 which resulted in the standard deviation ratio to be changed,
dataset was designed to cover a wide range of attack scenarios, resulting in the standard deviation ratio changing to 4.41.
TABLE I. THE ORIGINAL DATA AND PROCESSING RESULTS OF THE COLLECTED TRAFFIC
- 168 -
TABLE II. REPROCESSING RESULTS (PACKET NUMBER PER SECOND)
- 169 -
IV. RATE USING CHEBYSHEV'S INEQUALITY V. CLASSIFYING TRAFFIC BY CHARACTERISTICS
The famous Russian mathematician Chebyshev assumed In this research work, univariate Gaussian distribution will
that the value of a random variable with an unknown be used to express the number of packets per second by the
distribution, the probability is at least (− ) that it corresponding probability limit for that traffic.
deviates from its mean by no more than standard deviation
[9]–[11]. It can be presented as follows: (𝑥−𝜇)2
1 −
𝑃(𝑥 < 𝑋, 𝜇, 𝜎) = 𝑒 2𝜎2 =𝜀 (3)
√2𝜋𝜎 2
1
𝑃(|𝑋 − 𝜇| < 𝐾𝜎) ≥ (1 − ) ()
𝐾2 Let's find x from formula (3).
Here (1), we calculate the value of from the attack and
normal traffic. The probability is presented in (2) using the 𝑥 = 𝜇 + √(−2𝜎 2 ln(𝜀 ∗ 𝜎 ∗ √2𝜋)) (4)
above inequality (1) for attack and normal traffic within a
period of a second.
With the help of the formula (4), we can find the
1 probability and mean of standard deviation corresponding to
𝑃(𝜇 − 𝐾𝜎 ≤ 𝑋 ≤ 𝜇 + 𝐾𝜎) ≥ (1 − ) () the packet size.
𝐾2
- 170 -
The high f_score demonstrates the effectiveness of our ACKNOWLEDGMENT
proposed algorithm in accurately identifying and This research was supported by KOICA(Korea
differentiating attacks, contributing to enhanced intrusion International Cooperation Agency) through the "Capacity
detection and network security. The notable disparity between Building Project for the School of Information and
the f_scores of the two algorithms highlights the advantage of Communication Technology at Mongolian University of
our proposed algorithm over the k-means algorithm. The more Science and Technology in Mongolia" (Contract No. P2019-
performance of our algorithm, as evident from the higher 00124)
f_score, reinforces its potential for real-world application and
its significance in improving the accuracy and reliability of REFERENCE
intrusion detection systems.
VI. CONCLUSION [1] www.wearesocial.com, “The Changing World of DIGITAL in
2023,” 2023. Accessed: Jan. 26, 2023. [Online]. Available:
In this research, we proposed an attack detection https://wearesocial.com/uk/blog/2023/01/the-changing-world-of-
algorithm that leverages statistical analysis and anomaly digital-in-2023/
detection techniques. The algorithm was developed and [2] Nivedita James, “160 Cybersecurity Statistics 2023 [Updated],”
evaluated using three common types of attack files and normal 2023. https://www.getastra.com/blog/security-audit/cyber-
security-statistics/#:~:text=FAQS-
traffic files to assess its ability to differentiate attacks ,How%20many%20cyber%20attacks%20happen%20per%20year
accurately. A comparative analysis was conducted with the k- %3F,hacker%20attack%20every%2039%20seconds (accessed
means algorithm, and the resulting differential coefficient was May 02, 2023).
calculated. Particularly, our proposed algorithm achieved an [3] X. Liu and J. Liu, “Malicious traffic detection combined deep neural
notable differential coefficient of 96%, signifying its higher network with hierarchical attention mechanism,” Sci Rep, vol. 11,
performance in differentiating attacks compared to the k- no. 1, p. 12363, Jun. 2021, doi: 10.1038/s41598-021-91805-z.
means algorithm. This outcome verifies the capability to [4] I. Sharafaldin, A. Habibi Lashkari, and A. A. Ghorbani, “Toward
Generating a New Intrusion Detection Dataset and Intrusion Traffic
accurately separate attacks compared to the k-means Characterization,” in Proceedings of the 4th International
algorithm, exploiting the principles of Chebyshev's inequality. Conference on Information Systems Security and Privacy,
SCITEPRESS - Science and Technology Publications, 2018, pp.
Further research will be carried out to compare not only k- 108–116. doi: 10.5220/0006639801080116.
means algorithm but also other machine learning algorithms. [5] A. Shiravi, H. Shiravi, M. Tavallaee, and A. A. Ghorbani, “Toward
During this research, statistical processing was done on the developing a systematic approach to generate benchmark datasets
number of packets per second. It reduced the packet size and for intrusion detection,” Comput Secur, vol. 31, no. 3, pp. 357–374,
made it easier to calculate, making it possible to distinguish May 2012, doi: 10.1016/j.cose.2011.12.012.
the characteristics of the attacks. [6] J. O. Nehinbe, “A Simple Method for Improving Intrusion
Detections in Corporate Networks,” 2010, pp. 111–122. doi:
The proposed algorithm's ability to accurately separate 10.1007/978-3-642-11530-1_13.
attacks hold promise for enhancing real-world security [7] M. Rodríguez, Á. Alesanco, L. Mehavilla, and J. García,
systems and inspiring further investigations into the “Evaluation of Machine Learning Techniques for Traffic Flow-
development of the previous research and reliable intrusion Based Intrusion Detection,” Sensors, vol. 22, no. 23, p. 9326, Nov.
2022, doi: 10.3390/s22239326.
detection algorithms. As a result, this study provides a solid
[8] B. Bujmaa and Y. Dashdorj, “Development and Design of an Attack
foundation for further investigations and advancements in Detection System, in mongolian,” in InfoNet&Sec-2020 , MUST,
network security. Mongolia, 2020.
[9] J. G. Saw, M. C. K. Yang, and T. C. Mo, “Chebyshev Inequality
with Estimated Mean and Variance,” Am Stat, vol. 38, no. 2, pp.
130–132, 1984, doi: 10.2307/2683249.
[10] H. Assimi, O. Harper, Y. Xie, A. Neumann, and F. Neumann,
“Evolutionary Bi-objective Optimization for the Dynamic Chance-
Constrained Knapsack Problem Based on Tail Bound Objectives,”
vol. 325, Feb. 2020, [Online]. Available:
http://arxiv.org/abs/2002.06766
[11] P. P Bocharov and A. V Pechinkin, Probability Theory. Math
statistics, in Russian. M. : Gardarika, 1998.
- 171 -
August 22(TUE) - 25(FRI), 2023
Oral Session 7
Room : A432
Chair: Jung-Ju Kim (Hoseo University, Korea)
- 172 -
Development of mobile application for copper
wire molten mark classification
Seong-jun Hong1* and Dong-hyun Tae1, Jin-sik Lee 1
1
Korea Electrical Safety Corporation Electrical Safety Research Institute, Republic of Korea
Email: [email protected]
Abstract— The molten traces of copper wires found at fire molten scar appearance discrimination system using AI
sites can be divided into molten traces caused by electrical technology.
causes and molten traces created by melting by external flames.
Currently, copper wire molten traces are used to predict
ignition points during fire investigations or to check whether
electricity is supplied at the time of a fire. In this paper, the II. ANALYSIS OF MORPHOLOGICAL CHARACTERISTICS OF
characteristics of molten scars created by short circuits among COPPER WIRE MELTING TRACES
molten scars created by external flame and molten scars created Melting marks created by flame and melting marks created
by electrical causes were extracted. In addition, using AI by short circuit have a common point of being melted by high-
technology, image learning of copper wire molten traces was temperature heat. It is melted by Joule heat at the contact area
performed, and a mobile application was developed to instantly between wires. The morphological shapes and surface patterns
classify copper wire molten traces at the fire site. that appear due to the difference in the force acting during the
formation of these formation mechanisms and molten scars
Keywords—Copper wire, short circuit Arc site, Arc melting,
Globule, Arc bead
were analyzed.
I. INTRODUCTION (HEADING 1)
Over the past 10 years, the number of fires in Korea has A. Flame fusion scars Appearance characteristics
reached about 430,000. Among them, fires caused by
electrical causes account for more than 17% [1].
Representative causes of ignition by electric energy include
poor contact between wires, tracking, overcurrent, and short
circuits, and in these situations, molten copper wires are found
with a high probability. Currently, most fire investigators
judge electrical fires based on molten traces. Therefore,
accurate analysis of the molten trace plays an important role (a) (b)
in revealing the cause of the fire caused by electricity. Fig 1. pointed bulbous shape.
In general, molten marks found at fire sites are classified
into primary, secondary, and tertiary [2-5]. The primary
melting mark refers to the melting mark that causes a fire and
is created due to short circuit, poor contact, and tracking at
room temperature. The secondary molten trace has a similar
principle to the primary molten trace, but it is created after a
fire occurs, so the ambient temperature at the time of creation
(a) (b)
is high. Tertiary melting marks refer to melting marks
generated by a heat source such as a flame. Currently, fire Fig 2. Bubble-shaped flame fusion marks formed on a part
investigators investigating the cause of a fire do not have a of the wire.
specific criterion for classifying molten traces found at a fire
site by appearance, so there are cases in which the tertiary
molten trace is mistaken for a fire caused by an electrical cause.
Currently, when fire investigators judge the appearance of
molten traces, they are made based on subjective judgment
without objective criteria, and the discrimination results vary
according to the fire investigator's skill level. In addition, the
molten scar identification method is dependent on manpower (c)부착력 (d) 90 도 연선 4SQ 27
and equipment, which requires excessive time and cost, and Fig 3. Flame fusion traces formed under the influence of
the number of precision evaluations that can be performed adhesion.
each year is limited. In this paper, we develop a cloud-based
- 173 -
Melting marks created by flame and melting marks created by angle created by the short-circuit current at the intersection of the
short circuit have a common point of being melted by high- two wires, an asymmetry of the magnetic field density occurs and
temperature heat. It is melted by Joule heat at the contact area the Lorentz force acts in a specific direction. Fig. 5(b) shows the
between wires. The morphological shapes and surface patterns that contact surface of Fig. 5(a). In area B in Figure 5(b), melting traces
appear due to the difference in the force acting during the formation are more widely distributed than in area A, and an extending shape
of these formation mechanisms and molten scars were analyzed. is confirmed. It is observed that the direction in which the molten
Figure 1 shows the flame fusion trace in the form of a bulb with a traces spread is the direction where the density of the magnetic field
pointed tip. Flame fusion marks are melted from the outside of the is low, and it spreads longer in the direction where the density is
wire by an external flame. The liquefied copper on the outer shell is relatively low.
united by cohesive force and moves in the direction of gravity. At
this time, the copper in the solid state that is not melted inside is
exposed to the outside, and a bulb-shaped flame melting mark with
a sharp end is formed. In Figure 2(a) and (b), it can be confirmed
that the molten copper wires are combined by cohesive force and
moved in the direction of gravity, and the unmelted copper wires
inside are exposed and show a sharp shape. Figure 2 shows the
bubble-shaped flame fusion marks generated on a part of the wire.
The flame fusion marks in the form shown in Figure 2 are formed (a) (b)
by cohesion when the surface of the copper wire is melted and Fig 5. Orientation in the form of short-circuit melt scars
liquefied by an external flame. It can be seen that the periphery of
the molten blob showing a circular shape is thin. These forms are The second feature of short-circuit melting scars is the cut shape.
formed in a high temperature environment where sufficient time is The cut shape refers to a shape in which a boundary where a melted
given for the liquid to migrate. The flame fusion marks in the form portion and an unmelted portion of the copper wire meet is sharply
of Figure 3 appear when the liquefied copper wire is attached to the bent. The cut form is created by the movement of the molten copper
solid copper wire around it. This form occurs more easily as the wire under the influence of the Lorentz force, and is mainly located
temperature of the unmelted solid-state copper wire part approaches on the power supply side. In addition, the cut shape has a smooth
the melting point of the copper wire. Figure 4 shows the melting surface without curves compared to the surrounding melting
distinguishable pattern features appearing on the surface of the surface. Figure 6 shows the shape of the cut in the short-circuit
flame fusion scar. Fig. 4(a) shows the shrunken surface appearing in molten trace. Figure 6(a) is a melting trace formed in the middle of
the flame fusion scar. Figure 4(b) shows the stripes formed the wire, and a cut shape is observed on the power source side.
perpendicular to the direction of the cross-section of the wire. These Figure 6(b) is a cut-shaped melting mark formed at the end of the
stripes appear at the base of the wire and adjacent to the fusion zone. wire. When the contact part of the wire is deeply melted and
Fig. 4(c) shows the spine-like projections appearing in the flame disconnected, it often appears on the wire on the power side. In the
fusion scars. Fig. 4(d) shows melting traces in the form of cut-shaped molten trace formed at the end of the wire, a small ball
independent protrusions. The protrusion is formed when a part of the is often observed at the edge of the wire end.
surface of the copper wire rises when heat is applied to the copper The third characteristic of short-circuit melting scars is the
wire. covered form. The covered form refers to a form in which the molten
copper wire spreads over the surface of the unmelted copper wire.
The covered shape is formed by moving the molten copper wire
under the influence of the Lorentz force or the arc repulsive force,
and extends toward the load side where the strength of the magnetic
field generated by the short circuit current is weak. Figure 7 shows
the covered form. In Fig. 7(a), melting traces formed in the middle
of the wire are observed on the load side. Figure 7(b) is a covered
(a) (b) molten trace formed at the end of the wire, with molten copper
covering the surface of the unmelted wire.
The fourth characteristic of short-circuit melting scars is the shape
of a ball. The bulbous form is found in both short-circuit and flame-
melting scars, but there are differences. The most distinctive feature
of short-circuit melting scars is the shape of wrinkles. The wrinkles
of short-circuit fusion scars are formed by rapid solidification before
(c) (d) the wrinkles are straightened by the action of surface tension. If the
Fig 4. Surface characteristics of flame fusion scars ambient temperature is sufficiently high, wrinkles are not formed.
The bulb-shaped wrinkles are formed horizontally around the long
axis of the bulb. Figures 8(a) and (b) show short-circuit melting scars
B. Short circuit arc side Appearance characteristics in the form of wrinkled bulbs. Wrinkle-patterned bulbs are observed
Due to the unique generation mechanism, short-circuit melting in all solid, stranded, and corded wires, and are accompanied by cut
marks have been repeatedly observed in a similar form in single, or covered features around the bulbs.
stranded, and cord wires, and have distinct morphological
characteristics distinct from flame melting marks. The first
characteristic of short-circuit melting scars is directionality. When
two wires with potential difference come into contact, the wires are
melted by Joule's heat generated at the point of contact, and the
Lorentz force is received by the magnetic field generated by the
short-circuit current. Figure 5 shows the moving path of the current
and the moving direction of the molten trace according to the contact (a) (b)
angle of the two wires. Figure 5(a) shows the path of short-circuit Fig 6. Cut form of short-circuit melting scar
current when two wires are contacted at an angle of 80°. Due to the
- 174 -
discrimination result, the degree of similarity is expressed as
a percentage.
(a) (b)
Fig 7. Covered form of short-circuit melting scar
(a) (b)
Fig 12. Fire site demonstration
Fig 10. Cloud server configuration for molten trace
determination
IV. CONCLUSION
A. Mobile application In this paper, a system for distinguishing copper wire
melting traces was developed using convolutional neural
In order to apply artificial intelligence technology, as shown i network technique to analyze the causes of electrical fires.
n Table 1, copper wire learning data was constructed by divid These research results are significant in that they can provide
ing into melting traces generated by electrical causes and mel accurate discrimination results in a short time through
ting traces generated by flames. 10,000 pieces of data were le artificial intelligence algorithms for the external
discrimination of short circuit marks and melting marks,
arned, each of short-circuit melting marks and flame melting
which are difficult to distinguish visually by forensics. In the
marks. Materials for learning data were collected through fire future, we plan to continue research to increase accuracy and
scenes and reenactment experiments. expand application to various wires through big data
configuration.
TABLE I. LEARNING DATA COMPOSITION
REFERENCES
Short-circuit arc marks Flame melting marks
Division
(EA) (EA)
Number of [1] National Fire Agency, Fire Statistical Yearbook (2020), Korea
melt marks
1068 1170
[2] D. A Gray, D. D. Drysdale, Lewis, 1983, Identification of Electrical
Number of Sources of Ignition in Fires, Fire Safety J
images
10,000 10,000
[3] T. Seki, H. Hasegawa, S. Imada, Y. Isao, 2000, Determination between
Primary and Secondary Molten Marks on Electric Wires by DAS,
NITE
B. Mobile application [4] E-P Lee, 1989, Discrimination between Primary and Secondary Molten
Figure 11 shows a mobile application for molten trace Marks on Electric Wires by DAS, Applied Fire Science 9
identification. It is configured to transmit the captured molten [5] Richard J. Roby, Jamile McAllister, 2012, Forensic Investigation
Techniques for Inspecting Electrical Conductors Involved in Fire,
trace image to the cloud server and check the result. As for the Combustion Science & Engineeri
- 175 -
Isolated control circuit design for heater power
supply of high-power magnetron
Abstract— Two power sources are used to drive the small and lightweight system design, An integrated design of
magnetron. The first is a high-voltage pulse power supply for a high-voltage pulse power supply generating -40 kV and a
generating a voltage of several tens of kV to the magnetron filament heater power supply with an output voltage of 10 V
cathode, and the second is a heater power supply for heating the and an output current of 15 A (150 W) is in progress. When
filament of the magnetron. The magnetron to be used as a load designing compactly integrated design, the high-voltage
in this paper is a 1.7 MW X-band magnetron, which requires a isolated sensing technology of the filament power supply is an
maximum anode voltage of -38kV and a maximum anode important consideration. In this paper, we discuss the
current of 88A, and outputs a maximum filament voltage and proposed technique for isolation control from -40kV voltage.
current of 10V and 15A. In order to apply to the medical linear
accelerator application field that requires a compact and II. STRUCTURE OF INTEGRATED POWER SOURCE
lightweight design, we designed a compact modulator structure FOR DRIVING MAGNETRON AND DESIGN OF
that integrates the high voltage pulse unit and the filament
FILAMENT HEATER POWER SUPPLY
power unit and designed a filament power supply with an output
voltage of 10V and an output current of 15A, which is located in A. Configuration of integrated power supply for driving
the high voltage section directly connected to the high voltage magnetron
pulse modulator. the high-voltage isolated sensing technology of
the filament power supply is an important consideration. In this
paper, a simple high-voltage isolation control method of the
filament power supply is described. Filament heater
Power supply
Keywords— High Power Magnetron, Filament, High voltage
Pulsed power
I. INTRODUCTION
High Voltage
Magnetrons are vacuum tube devices used to generate
microwaves in a wide range of applications, including radar Pulsed Power Magnetron
systems, microwave ovens, and linear accelerators [1]-[3]. Supply
High-power magnetrons are designed to handle power levels
ranging from several hundred watts to several megawatts,
depending on the specific application requirements. These
magnetrons consist of a cathode, an anode, and a resonant Charging &
cavity that supports the generation of microwave oscillations. Control part
Two power sources are used to drive the magnetron. The first
is the filament heater power supply. This is a power source Fig. 1. Diagram of an integrated power supply for driving a magnetron
that heats the filament in order to emit a sufficient amount of
free electrons from the filament of the magnetron, and can be Fig. 1 shows a diagram of an integrated power supply for
supplied with AC or DC voltage. The second required power driving a magnetron under development. The lower part
source is a high voltage pulse power source. This applies a consists of a high-voltage pulse power charging unit, a heater
voltage of several tens of kV to the magnetron cathode to power charging unit, and an integrated control unit. The high-
accelerate the electrons by applying a high electric field. In voltage pulse power source is located in the center, and the
this paper, the driving of a 1.7 MW X-band magnetron is filament heater power source is located at the top. On the right
targeted. The pulse power supply [4]-[5] requires a maximum side of the figure, the upper side of the magnetron, the cathode
anode voltage of -38kV and maximum anode current of 88A, is connected with the heater power and the output of the high
and the filament heater power supply requires a maximum voltage pulse power.
voltage and current of 10V and 15A. Since the output terminal
of the heater power source is connected to a high voltage, B. Design of filament heater power supply
sensing and controlling the output voltage and output current Fig. 2 shows the circuit diagram of the designed filament
of the heater power source is very challenging. In order to power supply. A single-phase 220V input is used, and a half-
apply to medical linear accelerator applications that require a bridge inverter is used for compact implementation of the
charging part, and an LC series resonance circuit (Lr : 100 uH,
This work was supported in part by the National Research Foundation Cr : 44nF) is applied. Next, the transformer requires 40kV
of Korea(NRF) grant funded by the Korea government(MSIP)
(No.NRF2020R1A2C2099663) and in part by Institute of Information &
insulation between the primary side and the secondary side,
communications Technology Planning & Evaluation (IITP) grant funded by
the Korea government(MSIT) (No.2022-0-00100, Development of High
Power Electromagnetic Wave based Anti-Drone System)
- 176 -
U1
N2
220Vac
100uH
N3
Ls
N1
44nF
U2 Cs Vse n
sensing
Linear Filamen t
N4
regulator Con troller
Isen
Vse n
Filamen t Isen
Con troller
- 177 -
through a simple voltage-frequency-voltage conversion
technology without increasing the physical size.
Fig. 6. the experimental waveform of the rated output of the filament heater
power supply
Fig. 4. Experimental configuration of the fabricated filament heater power
supply CONCLUSION
In this research paper, we propose a technology that
enables the sensing and control of a filament power supply
connected to high voltage using a simple isolation method.
While designing the power supply circuit for the filament
heater is not particularly challenging, it becomes difficult to
sense and control the output when dealing with a filament
power supply operating at high voltages of several tens of kV.
Our control circuit design addresses this challenge by
providing stable power to the high voltage control circuit
through a simple insulation method. To overcome the
difficulty of achieving 40kV insulation for control purposes,
we developed a voltage-frequency-voltage conversion
technology that does not require an increase in physical size.
The power and control characteristics of this design were
validated through an experiment involving a halogen lamp
load, which served as a model for a filament. Furthermore, we
have future plans to test the insulation performance in
connection with high-voltage power sources.
REFERENCES
- 178 -
August 22(TUE) - 25(FRI), 2023
Oral Session 8
Room : A434
Chair: Jeonghwan Gwak
(Korea National University of Transportation, Korea)
- 179 -
Simulation of computer vision systems with
artificial intelligence
Perizat Rakhmetova1*, Makabbat Zhamuratova2, Vinera Baiturganova3, Beibit Shingissov4,
Laura Tasbolatova5, Symbat Akparova6
1,2,3
Satbayev University, Kazakhstan
4,5
Academy of Logistics and Transport, Kazakhstan
6
Ultra ALM, Kazakhstan
Abstract—In recent years, the rapid development of artificial decision-making and automation capabilities across various
intelligence technologies has led to significant advances in the field sectors [4, 5]. However, developing and testing these intricate
of computer vision, dedicated to extracting valuable information systems in real-world scenarios presents a multitude of
from visual data. This article presents a comprehensive analysis of challenges, including high computational demands and
computer vision systems modeling, focusing on the integration of potential risks in error-prone environments [6, 7]. Therefore,
AI techniques to enhance their performance and capabilities. a study is intended to draw attention to and consider the role
Through an extensive literature review, this research investigates the and impact of various modeling tools and applications on the
latest methodologies, algorithms, and architectures employed in creation of AI-based computer vision systems. Artificial
computer vision systems to accomplish tasks such as object
intelligence computer vision systems perceive, analyze and
detection, recognition, tracking, and segmentation. The article first
provides an overview of computer vision systems and their
use important insights from visual data, thereby improving
significance in various domains, including autonomous vehicles, decision-making and outreach capabilities in various sectors
surveillance, robotics, and medical imaging. It then delves into the [8]. However, developing and testing complex systems in the
advancements of AI, particularly deep learning techniques such as face of a wide range of problems, including high
convolutional neural networks and recurrent neural networks, which computational requirements and potential risks in
have revolutionized the field of computer vision. The article environments, involves erroneous errors [6].
highlights the effectiveness of AI models in improving the accuracy
The complex coordination and control required for robotic
and efficiency of computer vision tasks, showcasing their
arms can be greatly improved by incorporating AI and
superiority over traditional image processing techniques.
Furthermore, this research explores the challenges and limitations computer vision techniques, which have applications ranging
faced in modeling computer vision systems with AI. Modeling of from precision assembly in industrial settings to delicate
computer vision systems with elements of artificial intelligence is surgical procedures in healthcare [9, 10]. AI offers a robust
carried out in the Matlab/Simulink. Issues such as dataset bias, methodology for modeling the kinematics and dynamics of
scalability, interpretability, and robustness are discussed, along with manipulator systems, as shown in the work of López et al.
proposed solutions and ongoing research efforts. Finally, the article [11]. Neural network models, in particular, provide a powerful
concludes with a comprehensive outlook on the future of computer framework for capturing the complex relationships between
vision systems modeling with AI. It highlights emerging trends and various system parameters. Additionally, AI methodologies
research directions, including multimodal fusion, real-time like neuro-fuzzy systems and teaching learning-based
processing, explainable AI, and edge computing. By understanding optimization techniques have been employed to improve the
the current state-of-the-art and identifying future possibilities, this performance of these robotic systems [12, 13].
research contributes to the advancement and development of more
powerful and intelligent computer vision systems. Computer vision, on the other hand, provides a critical
sensory input for these systems, enabling real-time visual
Keywords— computer vision systems, artificial intelligence, servoing and facilitating robust interaction with the
deep learning, neural networks, object detection and recognition, environment [10]. In particular, convolutional neural
image segmentation, multimodal fusion, edge computing. networks have shown remarkable proficiency in visual data
processing, thereby aiding precise control of manipulators.
I. INTRODUCTION Simulation of these computer vision-based AI systems offers
Technological advances in intelligence are causing an a controlled environment for system testing, optimization, and
interesting and fast connection between artificial intelligence validation [14, 15]. In this context, AI algorithms have shown
(AI) [1] and computer vision detection [2], thus showing the a remarkable ability to track various trajectories of robot
way to numerous breakthroughs in the field of computer manipulator arms efficiently [14]. Simultaneously, advanced
science. Modern AI-enhanced vision systems have begun to control strategies like force sensorless admittance control have
raise alarms across many computing industries, from been developed for the teleoperation of uncertain robot
autonomous vehicles and security monitoring to heightened manipulators, leveraging the capabilities of neural networks
health hazards and more [3]. AI-incorporated computer vision [15].
systems have the capacity to perceive, analyze, and extract Interestingly, modern optimization and learning
essential insights from visual data, thereby improving algorithms have also been incorporated with traditional AI
- 180 -
methodologies to enhance the performance of these systems. segments that collectively cover the entire image or a
For instance, the artificial bee colony optimization algorithm set of contours extracted from the image.
has been successfully combined with fuzzy theory for real-
time machine learning control of articulated robotic Recognition: This process assigns a label to an object
manipulators [16, 17]. based on its descriptors, identifying objects in an
image or a sequence of images.
As AI and computer vision technologies continue to
evolve, novel methodologies such as weighted multiple neural Interpretation: This final process gives meaning to an
network boundary control and adaptive neural network fuzzy array of recognized objects. For instance, in an
sliding mode control have emerged, which demonstrate automated traffic surveillance system, the
enhanced control of manipulator systems [18, 19]. Alongside interpretation process would generate a traffic report
these advancements, there's been a growing interest in the from the input video sequence.
development of intelligent controllers and impact test systems Object Detection, a technique in computer vision, locates
based on six-axis force sensors [20]. instances of objects in images or videos, often leveraging
This paper "Simulation of computer vision systems with machine learning or deep learning. The paper [24] introduces
Artificial Intelligence" explores the synergistic integration of a novel face detection method for security monitoring
AI and computer vision in the context of robotic manipulator systems, leveraging video processing, computer vision, and
systems. Leveraging insights from a wealth of cutting-edge artificial intelligence to enhance efficiency and overcome
research, this investigation aims to illuminate the nuances of traditional limitations like low detection accuracy. The
this complex domain, facilitating better understanding, and proposed system, tested in various complex environments,
fostering further innovation in this exciting technological demonstrated high accuracy, low false alarm rates, and robust
frontier [21]. adaptability, marking it as a promising solution for large-scale
security monitoring applications.
Summarizing the existing work of the authors, there are
problems of simulation computer vision systems with This technique, often powered by machine learning or
artificial intelligence, which include achieving real-time deep learning, involves several key components:
performance while maintaining accuracy and efficiency, the Bounding Box: This is a box drawn around the object
lack of standardized evaluation metrics, and the complexity of interest to localize it within the image. The box is
and parameter tuning of artificial intelligence methods or defined by the coordinates of its top-left and bottom-
architectures. The feasibility, effectiveness, and practical right corners.
implementation of tools for modeling and developing
computer vision systems with AI capabilities also need to be Class Label: Each bounding box typically includes a
explored. class label, indicating the category of the object within
the box, such as 'car', 'pedestrian', or 'bicycle' in a self-
II. METHODS driving car application.
A. Classification of Artificial Intelligence Object Localization: This task involves predicting the
Artificial Intelligence (AI) involves the simulation of location of an object in the image, typically by
human intelligence processes by machines, particularly predicting the coordinates of a bounding box that
computer systems. It includes learning, reasoning, and self- encompasses the object.
correction, and is used in various fields such as medical
Object Recognition: After localizing the object, the
diagnosis [22], stock trading, and scientific discovery.
next step is to assign a class label to it. This is usually
Computer Vision, a subfield of AI, focuses on enabling
done using a classifier trained on a large dataset of
computers to understand and interpret visual data [23]. It
labeled images of the object.
involves tasks like image processing, object detection, and
image segmentation (Figure 1). Image Processing manipulates Non-maximum Suppression: This technique is used
images using algorithms to enhance the image or extract after the object detection algorithm runs on an image
useful information. This type of signal processing takes an and finds multiple bounding boxes for the same
image as input and produces an enhanced image or features object. It keeps only the most probable bounding box
associated with that image as output. The process involves for each object and removes all the predicted
several sub-processes: bounding boxes that have a lower probability of
detecting an object and significantly overlap with a
Preprocessing: This initial step improves the image to
box that has a higher probability.
increase the success rate of subsequent processes. It
includes simple tasks like noise reduction and contrast Scale Invariance: Object detection algorithms need to
enhancement, as well as complex tasks that be scale-invariant to detect objects of various sizes, as
standardize the image's coordinate system. objects in the real world can appear at different scales
in the image.
Feature Extraction: This process identifies a unique set
of features or parameters, such as color, size, shape, Image Segmentation is a process that divides a digital
and texture, that can uniquely identify an object. It image into multiple segments [25], making the image easier to
simplifies the resources needed to accurately describe analyze and more meaningful. It's commonly used to identify
a large dataset. objects and boundaries within images. Key components of
image segmentation include:
Segmentation: This process assigns a label to every
pixel in an image so that pixels with the same label Thresholding: This simple method of image
share certain characteristics. The result is a set of segmentation creates binary images from grayscale
- 181 -
images. A threshold value is selected, and all pixels A rigid body transformation of this point can be
with gray level values below the threshold are represented as:
converted to black, while those above the threshold are
converted to white. 𝑇 ∗ 𝑃ℎ = 𝑃ℎ′
Region Growing: This pixel-based image
segmentation method starts with seed points and where 𝑇 is a 4 × 4 transformation matrix of the form:
groups together neighboring pixels with similar
properties. It's often used in medical imaging to 𝑅 𝑡
𝑇=[ ]
segment structures like bones or lungs. 0 1
Clustering Methods: These segmentation methods Here, 𝑅 is a 3 × 3 rotation matrix, 𝑡 is a 3 × 1 translation
partition the image into clusters based on similar vector, and 0 is a 1 × 3 vector of zeros. The transformed
attributes. K-means is a popular method for image point 𝑃ℎ′ is the point 𝑃 after rotation and translation.
segmentation due to its simplicity and scalability.
Dynamic modeling, on the other hand, involves the study
Edge Detection: This method segments an image into of forces and torques that cause motion. In computer vision,
regions of discontinuity by identifying the boundaries dynamic models are used to predict the system's response to
of objects within images. It works by detecting various inputs and disturbances [14]. These models are often
discontinuities in brightness. more complex than kinematic models and may involve
Watershed Transformation: This technique is useful differential equations that describe the motion of objects over
for image segmentation, especially when the image has time. The exact form of these equations can vary depending
low contrast. It treats the grayscale image like a on the specific application and the complexity of the problem
topographic map, with the intensity of each pixel being addressed.
representing the height, and finds the lines that run Kinematic and dynamic models are used in a variety of
along the tops of ridges [26]. computer vision applications, including object tracking,
Semantic Segmentation: This process links each pixel gesture recognition, and 3D reconstruction. For example, in
in an image to a class label, such as person, car, dog, object tracking, a kinematic model can be used to predict the
cat, etc. Unlike in object detection, pixels are classified future position of an object based on its past trajectory. In 3D
individually in semantic segmentation. reconstruction, kinematic models can be used to infer the 3D
shape and motion of objects from 2D images or video
Machine Learning, another subfield of AI, allows software sequences. Dynamic models, meanwhile, can be used to
applications to become more accurate in predicting outcomes simulate the physical behavior of objects and environments,
without being explicitly programmed. It includes supervised which can be useful in applications such as virtual reality and
learning, unsupervised learning, and reinforcement learning. video game design [19].
These processes collectively allow computers to process
visual data in a way that mimics human vision, with more Despite the significant progress that has been made in the
precision, consistency, and less subjectivity. field of kinematic and dynamic modeling in computer vision,
several challenges remain. These include the difficulty of
accurately estimating the parameters of kinematic and
dynamic models from image data, the computational
Artificial Intelligence
complexity of these models, and the need for robust methods
Computer Vision (CV) Machine Learning that can handle occlusions and changes in lighting conditions.
Image Processing Object Detection Image Segmentation Supervised Learning Unsupervised Learning
Future research in this field is likely to focus on addressing
Preprocessing Bounding box Thresholding Reinforcement Learning
these challenges, as well as on developing new models that
can better capture the complex and dynamic nature of real-
Feature extraction Class label Region growing
world visual scenes.
Clustering
Recognition Object localization
methods
Semantic
Matlab/Simulink simulation environment for the purpose of
Scale Invariance
segmentation
modeling computer vision systems, as shown in the Figure 2.
Figure 1 – Structure diagram of Artificial Intelligence The toolbox of Computer Vision is a comprehensive suite that
offers algorithms, functions, and apps for designing and
testing computer vision, 3D vision, and video processing
B. Kinematic and Dynamic Modeling of Computer Vision systems. It enables object detection (Figure 3) and tracking,
Systems image segmentation (Figure 4), feature detection, extraction,
and matching, and automates calibration workflows for
Kinematic and dynamic modeling are fundamental aspects
various camera types. The toolbox supports 3D vision tasks
of computer vision systems, providing a mathematical
like visual and stereo vision, structure from motion, and point
framework for analyzing and interpreting the motion of
objects in visual data [9, 17]. In computer vision, kinematic cloud processing. It also facilitates the training of custom
models are used to describe the geometric and time-dependent object detectors using deep learning and machine learning
algorithms, and provides object detection and segmentation
aspects of a system's operation. For instance, given a point 𝑃 algorithms for large images. The toolbox supports C/C++
in 3D space with coordinates (𝑥, 𝑦, 𝑧), we can represent it in code generation for integration with existing code, desktop
homogeneous coordinates as 𝑃ℎ = (𝑥, 𝑦, 𝑧, 1)
- 182 -
prototyping, and embedded vision system deployment, and field of computer vision. The effectiveness of AI models in
can be accelerated on multicore processors and GPUs. improving the accuracy and efficiency of computer vision
tasks is emphasized, demonstrating their superiority over
traditional image processing methods. The paper further
explores the challenges and limitations that come with
introducing AI to computer vision systems, including issues
Figure 2 – Simulation of computer vision systems with AI in
related to dataset bias, scalability, interpretability, and
Matlab/Simulink robustness. Proposed solutions to these problems and current
research initiatives are also detailed. The assimilation of
artificial intelligence components into computer vision
systems is carried out using Matlab/Simulink.
REFERENCES
[1] Perizat Rakhmetova, Asyl-D.Bazarbek. (2023). Analysis of parallel
manipulators with artificial intelligence. The Bulletin of KazATC,
124(1), 237–244. https://doi.org/10.52167/1609-1817-2023-124-1-
237-244.
[2] Gani Balbayev, Aigerim Mussina, Algazy Zhauyt, Beibit Shingissov,
and Marina Kalekeyeva, "Neural Control for Image Stabilisation Using
a Reference Model," International Journal of Mechanical Engineering
and Robotics Research, Vol. 10, No. 1, pp. 17-21, January 2021. DOI:
10.18178/ijmerr.10.1.17-21.
[3] LeCun, Yann & Bengio, Y. & Hinton, Geoffrey. (2015). Deep
Learning. Nature. 521. 436-44. 10.1038/nature14539.
[4] Russakovsky, O., Deng, J., Su, H. et al. ImageNet Large Scale Visual
Recognition Challenge. Int J Comput Vis 115, 211–252 (2015).
Figure 3 – Simulation of object detection in Matlab/Simulink https://doi.org/10.1007/s11263-015-0816-y.
[5] M. Adel, S. M. Ahmed and M. Fanni, "End-Effector Position
Estimation and Control of a Flexible Interconnected Industrial
Manipulator Using Machine Learning," in IEEE Access, vol. 10, pp.
30465-30483, 2022, doi: 10.1109/ACCESS.2022.3157817.
[6] Krizhevsky, Alex & Sutskever, Ilya & Hinton, Geoffrey. (2012).
ImageNet Classification with Deep Convolutional Neural Networks.
Neural Information Processing Systems. 25. 10.1145/3065386.
[7] S. Liang, X. Jianchun and Z. Xun, "An Extraction and Classification
Algorithm for Concrete Cracks Based on Machine Vision," in IEEE
Access, vol. 6, pp. 45051-45061, 2018, doi:
10.1109/ACCESS.2018.2856806.
[8] N. Liu et al., "Modeling and Simulation of Robot Inverse Dynamics
Using LSTM-Based Deep Learning Algorithm for Smart Cities and
Factories," in IEEE Access, vol. 7, pp. 173989-173998, 2019, doi:
10.1109/ACCESS.2019.2957019.
Figure 4 – Simulation of image segmentation in Matlab/Simulink
[9] A. T. Vo and H. -J. Kang, "Neural Integral Non-Singular Fast Terminal
Synchronous Sliding Mode Control for Uncertain 3-DOF Parallel
Robotic Manipulators," in IEEE Access, vol. 8, pp. 65383-65394,
Thus, as shown in Figures 3, object detection results and 2020, doi: 10.1109/ACCESS.2020.2984891.
Figure 4, image segmentation greatly affect AI computer [10] F. Tokuda, S. Arai and K. Kosuge, "Convolutional Neural Network-
vision modeling, affecting performance evaluation, training Based Visual Servoing for Eye-to-Hand Manipulator," in IEEE Access,
and validation, benchmarking, model selection and vol. 9, pp. 91820-91835, 2021, doi: 10.1109/ACCESS.2021.3091737.
optimization, system integration, dataset creation, and [11] E. J. López, D. Servín De La Mora-Pulido, R. Servín De La Mora-
algorithm development. These results serve as critical Pulido, F. J. Ochoa-Estrella, M. Acosta Flores and G. Luna-Sandoval,
"Modeling in Two Configurations of a 5R 2-DoF Planar Parallel
benchmarks for the performance of the system being Mechanism and Solution to the Inverse Kinematic Modeling Using
simulated and guide further advances in AI-assisted computer Artificial Neural Network," in IEEE Access, vol. 9, pp. 68583-68594,
vision. 2021, doi: 10.1109/ACCESS.2021.3073402.
[12] W. Pan, M. Lyu, K. -S. Hwang, M. -Y. Ju and H. Shi, "A Neuro-Fuzzy
IV. CONCLUSION Visual Servoing Controller for an Articulated Manipulator," in IEEE
Access, vol. 6, pp. 3346-3357, 2018, doi:
This research paper provides an in-depth study of the 10.1109/ACCESS.2017.2787738.
current strategies, algorithms, and architectures used in
[13] P. -N. Le and H. -J. Kang, "Robot Manipulator Calibration Using a
computer vision systems to perform tasks such as object Model Based Identification Technique and a Neural Network With the
detection, recognition, tracking, and segmentation. Paper Teaching Learning-Based Optimization," in IEEE Access, vol. 8, pp.
provides a comprehensive overview of computer vision 105447-105454, 2020, doi: 10.1109/ACCESS.2020.2999927.
systems and their important role in various fields, including [14] M. Elsisi, K. Mahmoud, M. Lehtonen and M. M. F. Darwish, "An
autonomous vehicles, surveillance systems, robotics, and Improved Neural Network Algorithm to Efficiently Track Various
medical imaging. Particular attention is paid to advances in the Trajectories of Robot Manipulator Arms," in IEEE Access, vol. 9, pp.
11911-11920, 2021, doi: 10.1109/ACCESS.2021.3051807.
field of artificial intelligence, especially deep learning
[15] C. Yang, G. Peng, L. Cheng, J. Na and Z. Li, "Force Sensorless
methods such as convolutional neural networks and recurrent Admittance Control for Teleoperation of Uncertain Robot Manipulator
neural networks, which have caused a significant shift in the Using Neural Networks," in IEEE Transactions on Systems, Man, and
- 183 -
Cybernetics: Systems, vol. 51, no. 5, pp. 3282-3292, May 2021, doi:
10.1109/TSMC.2019.2920870
[16] H. -C. Huang and C. -C. Chuang, "Artificial Bee Colony Optimization
Algorithm Incorporated With Fuzzy Theory for Real-Time Machine
Learning Control of Articulated Robotic Manipulators," in IEEE
Access, vol. 8, pp. 192481-192492, 2020, doi:
10.1109/ACCESS.2020.3032715.
[17] Zhanibek Issabekov and Nakhypbek Aldiyarov, “Developing the
Mathematical Model of the Bipedal Walking Robot Executive
Mechanism” International Journal of Advanced Computer Science and
Applications(IJACSA), 12(12), 2021.
http://dx.doi.org/10.14569/IJACSA.2021.0121240.
[18] Y. Zhang, Q. Li, W. Zhang, Y. Liu and Z. Xue, "Weighted Multiple
Neural Network Boundary Control for a Flexible Manipulator With
Uncertain Parameters," in IEEE Access, vol. 7, pp. 57633-57641, 2019,
doi: 10.1109/ACCESS.2019.2914077.
[19] Li X, Gao X, Sun L, et al. The adaptive neural network fuzzy sliding
mode control for the 3-RRS parallel manipulator. Advances in
Mechanical Engineering. 2022;14(9).
doi:10.1177/16878132221126112.
[20] Guoxin Hua, Fei Wang, Jianhui Zhang, "Study on Impact Test System
of Manipulator Based on Six Axis Force Sensor and Intelligent
Controller", Journal of Sensors, vol. 2022, Article ID 7869019, 14
pages, 2022. https://doi.org/10.1155/2022/7869019
[21] Li, Z., Li, S.: Recursive recurrent neural network: a novel model for
manipulator control with different levels of physical constraints. CAAI
Trans. Intell. Technol. 1– 13 (2022). https://doi.org/10.1049/cit2.12125
[22] B. Dauren, N. Zhetenbayev, G. Balbayev, B. Shingissov, N. Arailym,
and Y. Saltanat, “Development and simulation of a device for upper
limb rehabilitation,” Vibroengineering PROCEDIA, Vol. 48, pp. 29–
35, Feb. 2023, https://doi.org/10.21595/vp.2023.23167
[23] Y. -T. Su et al., "A Fully Automatic Calibration for Vision-Based
Selective Compliance Assembly Robot Arm and Its Application to
Intelligent Wafer Inspection Scheduling," in IEEE Access, vol. 10, pp.
50100-50113, 2022, doi: 10.1109/ACCESS.2022.3172953.
[24] Z. Dong, J. Wei, X. Chen and P. Zheng, "Face Detection in Security
Monitoring Based on Artificial Intelligence Video Retrieval
Technology," in IEEE Access, vol. 8, pp. 63421-63433, 2020, doi:
10.1109/ACCESS.2020.2982779
[25] W. Yang, "Adaptive Recognition of Motion Decomposition Image
Based on Adaptive Principal Component Extraction Algorithm," in
IEEE Access, vol. 8, pp. 224108-224122, 2020, doi:
10.1109/ACCESS.2020.3044371.
[26] Gloria B.G., Oscar D.S., José Luis E.A., Jesus S.T., Ismael S.G., Noelia
V.E., “Learning Image Processing with OpenCV”, ISBN 978-1-78328-
765-9, Published by Packt Publishing Ltd., 2015, p 232.
- 184 -
Integration of Penalty Functions and
Performance Criteria for Enhanced
Optimization in Optimal Control Problems using
Artificial Immune System Algorithms
Olga Shiryayeva 1*,
1
Satbayev University, IICT, Kazakhstan
[email protected]
Timur Samigulin 2
2
Kazakh-British Technical University, Kazakhstan
[email protected]
Dmirtyi Panchenko 1
1
Satbayev University, Kazakhstan
[email protected]
Abstract—The article explores the construction of optimal enhances the optimization process, enabling the attainment of
control systems using Artificial Immune System (AIS) optimal control solutions that satisfy desired quality
algorithms. By identifying the optimal parameters of the typical assessments. The objective is to minimize the integral
controller that minimize the integral quadratic error (ISE) quadratic error (ISE) of optimal control systems while
integrated with the penalty function, the proposed approach considering penalty functions. Specifically, this study focuses
aims to enhance the performance and efficiency of the optimal on the utilization of AIS as optimization algorithms in the field
control system for the technical system under consideration. The of AI [2]. The proposed approach aims to enhance the
optimization process should consider both the integral efficiency and performance of control systems by integrating
quadratic error (ISE) and the penalty function, ensuring that
AI algorithms and penalty functions into the optimization
the controller parameters yield a control solution that satisfies
process. The use of AIS algorithms has gained significant
the desired quality assessments while minimizing the overall
error. The results of this study are to develop an effective popularity as a mechanism for solving optimization problems
approach that combines the power of artificial intelligence [3]. In the realm of optimal control systems for technical
methods with the integration of penalty functions. Solving this systems and technological objects, AIS algorithms are
problem will contribute to the advancement of optimal control considered intelligent search algorithms inspired by natural
in technical systems by providing a systematic methodology to phenomena.
determine the controller parameters that strike an optimal
The problem at hand involves the optimal control of a
balance between performance and adherence to specific quality
technical system using AIS methods. In this context, the
assessments.
primary objective is to determine the parameters of a typical
Keywords—artificial intelligence, artificial immune system, controller that minimize the ISE while incorporating a penalty
optimal control system, penalty function, typical controller. function. To achieve optimal control, it is crucial to strike a
balance between minimizing the ISE, which measures the
I. INTRODUCTION) deviation between the system's output and the desired
Artificial intelligence (AI) has revolutionized various response, and incorporating penalty functions that capture
domains, including technical systems, by providing advanced specific quality assessments and system requirements. These
optimization algorithms. These algorithms aim to improve penalty functions enable the inclusion of constraints and
system performance and efficiency. Widely used AI considerations such as time regulation, overshoot, rise time,
algorithms for optimal control include Genetic Algorithms and other relevant factors that affect the system's behavior [4].
(GA), Particle Swarm Optimization (PSO), and Artificial The challenge lies in optimizing the parameters of the typical
Immune System (AIS) algorithms, among others [1]. These controller within the framework of the AIS methods.
algorithms possess exceptional characteristics and approaches This article presents the results of evaluating the
that contribute to the effective resolution of optimal control effectiveness of intelligent information technologies for
problems in technical systems. However, while intelligence solving optimization problems in technological processes
algorithms have shown promise, several challenges hinder based on AIS algorithms. Based on the AIS algorithm, which
their effectiveness. These algorithms often focus on is an intelligent optimization method, conditions for solving
minimizing the objective function without considering optimal control problems in technological processes with
specific quality assessments required in optimal control, such performance assessment are presented. The main components
as settling time, overshoot, and rise time. To address this of AIS are discussed, including problem modeling, solution
limitation, penalty functions are proposed as a solution. The representation, evaluation function, and parameter selection.
integration of penalty functions and performance criteria
- 185 -
The importance of adapting AIS algorithms to changing optimization problem of the technological process. It
conditions is also emphasized. is necessary to adjust these parameters to achieve the
best results.
Algorithms based on artificial immune systems have
several advantages for optimization problems, such as the In accordance with the first condition, to enhance the
ability to handle complex problems with a large number of efficiency of population-based algorithms, including
parameters, adapt to changing conditions, and find globally AIS, it is proposed to introduce penalty functions into
optimal solutions. Examples of effective algorithms based on the quality criterion [4]:
artificial immune systems include Cellular Programming,
Clonal Selection Algorithms (CLONALG), Antibody T
Optimization Algorithms, and many others [5]. IE e(t ) Penaltyet min
0
However, it should be noted that intelligent information
technologies for optimization problems based on artificial Where IE is the integral quality criterion, e(t) is the error
immune systems are an active area of research, and their at time t (the difference between the setpoint, SV, and the
application may depend on the specific problem and context actual, PV, value of the system), Penalty(e(t)) is the penalty
of use. The AIS algorithm has indeed gained wide popularity function that depends on the error e(t) and may include various
recently for solving optimization problems, database components, such as penalties for violating constraints or
processing, and decision making. However, like all search undesirable conditions.
algorithms, certain conditions specific to the problem
formulation need to be considered [6]. In optimization problems where the goal is to find the best
solution among a set of feasible solutions, quality criteria and
The implementation of AIS algorithms should be based on penalty functions play an important role in evaluating and
the characteristics and requirements of the specific managing the optimization process. Quality criteria are used
optimization problem, with the selection of quality criteria to measure the effectiveness of a solution, while penalty
aligned with the technological process. Therefore, it is functions help in accounting for and managing constraints
necessary to formulate important recommendations for the associated with solution feasibility. This section examines the
application of intelligent information technologies based on influence of quality criteria and penalty functions on the
AIS algorithms in solving optimal control problems in efficiency of AIS algorithms in optimization problems and
technological processes, with performance assessment linked their role in the process of searching for the optimal solution.
to the choice of quality criteria.
The optimization process can be highly sensitive to the
In accordance with this, the results of developing choice of quality criteria and penalty functions. Appropriate
conditions and requirements for evaluating the effectiveness quality criteria and penalty functions contribute to an efficient
of AIS algorithms are presented in the context of their search for the optimal solution, while an incorrect choice can
implementation for the gas purification process in a lead to undesirable results.
distillation column.
For example, if the penalty function imposes excessive
II. EVALUATION OF THE QUALITY CRITERIA WITH penalties for constraint violations, it may overlook potentially
PENALTY FUNCTIONS good solutions. On the other hand, if the penalty function is
Assessing the effectiveness of AIS algorithms, as too weak, solutions may violate constraints, resulting in
population-based algorithms, is an important task when infeasible solutions. The proper adjustment of quality criteria
studying and applying these methods to technological and penalty functions requires an analysis of the problem
processes. AIS algorithms have several advantages for solving requirements and experimental parameter tuning.
technological process problems, such as searching for optimal For gas industry technological processes, a quality
solutions and the ability to adapt to changing conditions. criterion with penalty functions can be represented by the
However, like all search algorithms, it is necessary to tune the Integral Square Error (ISE), Integral Absolute Error (IAE),
algorithm according to the specific process. Integral Time Square Error (ITSE), and Integral Time
To conduct an evaluation of the effectiveness of AIS Absolute Error (ITAE) [4]. The choice between ISE, IAE,
algorithms, certain conditions of their use need to be ITSE, and ITAE depends on the requirements of the specific
formulated: technological process and optimization priorities, and should
result from the modeling and analysis of these criteria.
It is necessary to mathematically formulate not only
the optimization problem of the technological process Based on the obtained modeling results, the following
but also define a quality criterion that needs to be conclusions can be drawn. The ISE criterion is a quality
optimized based on the given assessments of the criterion in which the error between the setpoint (SP) and the
process quality. Choosing appropriate quality criteria actual system value (PV) is quadratically integrated over time
allows for increasing the efficiency of finding optimal (Fig. 1). ISE gives equal attention to both long-term and short-
solutions and comparing them with other alternatives. term errors. The smaller the ISE value, the closer the system
is to achieving the desired result.
The solutions to the optimization problem should be
represented as antibodies that can be modified and
adapted during the operation of the modified AIS
algorithm based on the properties of biplasticity.
Parameter selection: AIS algorithms have several
parameters that can be tuned according to the specific
- 186 -
and the desired behavior of the optimization algorithm. Proper
tuning of penalty weights and penalty level affects the balance
between achieving optimality and complying with constraints.
Incorporating penalty functions into quality criteria allows for
considering constraints and undesirable conditions during
system optimization. Penalties can be applied to the error
itself, without integration, and their value can be taken into
account when calculating the quality criterion.
In accordance with the processes of the oil and gas
Fig. 1. The results of modeling IE. industry's distillation column, penalty functions related to
overshoot and rising time were introduced [7]. Penalty
The IAE quality criterion is also a criterion in which the coefficients are then tuned to be added to the objective
error between the setpoint and the actual system value is function during optimization. The greater the deviation, the
absolutely integrated over time. IAE gives equal attention to higher the penalty. In general, the quality criterion now takes
both long-term and short-term errors. The difference from ISE the form
is that IAE uses the absolute value of the error instead of its
square (Fig. 2). Penalty=kPov (ymax–ySV)2+krise(trise–trisemax)2min (2)
- 187 -
or finds an acceptable solution. The iterative behavior of the
algorithm and the change in the objective function over time
can be taken into account to determine the convergence
speed. Penalty functions can also be used to guide the
algorithm in avoiding infeasible solutions and accelerating
convergence.
By modifying the objective function and adding
optimization parameters to the AIS algorithm, we have
achieved significant improvements in the convergence speed
Fig. 4. The result of modeling the ISE and IAE with penalty functions. of the algorithm. Figure 6 presents the results of implementing
quality criteria without penalty functions.
Penalties can be applied both to the magnitude of the error
and its duration (Fig. 5).
ITSE+Penaltymin
ITAE+Penaltymin
Fig. 6. The graph of the convergence speed for the quality criterion.
To conduct an evaluation of the effectiveness of AIS The conducted research has resulted in obtaining similar
algorithms, certain conditions of their use need to be optimal coefficients for the PI controller, which were tuned
formulated: to achieve the desired quality assessments of the transient
process. However, the convergence speed of the AIS
1) Solution Quality: This indicator evaluates the accuracy
algorithm has improved. This allows for achieving the
of the solutions obtained using the AIS algorithm. Evaluation desired system behavior when transitioning from one state to
can be done by comparing the found solutions with optimal another and ensures stable overall system performance. This
solutions or with other solutions obtained using alternative approach enhances control quality and improves the overall
algorithms. In order to evaluate the effectiveness of the AIS system efficiency. By using the AIS algorithm and
algorithm in synthesizing an intelligent controller for a introducing additional penalty coefficients for overshoot and
complex control system, experiments and comparative settling time, a more accurate and efficient system behavior
analysis of quality metrics such as settling time, overshoot, is achieved according to the specified requirements.
steady-state error, etc., are conducted. 3) Robustness: Robustness evaluates the ability of the
2) Convergence Speed: This indicator assesses how AIS algorithm to provide consistent results under different
quickly the AIS algorithm converges to the optimal solution conditions or datasets. An algorithm that maintains good
- 188 -
performance across different tasks or parameter variations is The use of penalty functions for quality criteria in AIS
considered more robust. The property of biplasticity and algorithms has been proposed to improve their
adaptation in AIS algorithms is another approach to account performance.
for changing conditions or constraints. Both penalty Through the modeling of quality criteria, it has been
functions and the biplasticity property of AIS algorithms concluded that the convergence speed of the AIS
offer methods to consider changing conditions or constraints algorithm in optimizing the ISE objective function is
in computational algorithms. The choice of approach depends increased when penalty functions for overshoot and
on the specific task and requirements, and may require rise time are incorporated.
experimentation and tuning to achieve desired results. The evaluation results demonstrate that the modified
4) Resource Usage: Evaluating the efficiency of AIS artificial immune system (AIS) algorithm based on adaptivity
may include measuring the utilization of resources such as properties is effective for synthesizing intelligent controllers
computational power, memory, or time. Lower resource costs for process control systems. This opens up new possibilities
to achieve good results indicate a more efficient algorithm. for applying AIS in various domains where precise and
This criterion is relevant when modeling a technological adaptive control is required.
process with controllers implemented based on industrial
PLC software, such as well-known companies like ACKNOWLEDGMENT
Honeywell or Siemens, which are prominent in the
This research has been funded by the Science Committee
distribution of automation and control solutions in the oil and
of the Ministry of Education and Science of the Republic
gas industry. Assessing resource usage helps determine how
Kazakhstan (Grant № APO9258508).
efficiently AIS manages the technological process using the
resources available in the industrial PLC system. If AIS REFERENCES
achieves good results with minimal resource utilization, it
[1] D. Simon, Evolutionary optimization algorithms: biologically-Inspired
indicates high efficiency. and population-based approaches to computer intelligence. New
Jersey: John Wiley & Sons, 2013, 776 p.
The evaluation of algorithm efficiency may also include
other factors such as implementation complexity, ease of use, [2] M. Sanchez, L. Magdalena, “Artificial immune systems applied to
optimal control problems”, Engineering Applications of Artificial
and adaptability to changing conditions. Overall, the Intelligence, vol. 60, pp. 106–118, 2017.
efficiency of an algorithm is assessed within the context of a [3] S. Sundaram, S. Ramachandran, “Artificial immune systems for
specific task and requirements and can be determined based process optimization: A review”, Expert Systems with Applications,
on various criteria. When evaluating the effectiveness of AIS vol. 115. pp. 77–89, 2019.
algorithms with penalty functions and the biplasticity [4] O.I. Shiryayeva, T.I. Samigulin, “Development of a SMART-system
property, it is important to consider the specifics of the for a Complex Industrial Object Control based on Metaheuristic
particular technological process, the adequacy of the penalty Algorithms of Swarm Intelligence”, WSEAS Transactions on Power
Systems., vol. 16, P. 231–240, 2021.
functions, and their impact on performance and convergence
[5] H.S. Bernardino, H.J. Barbosa, “Artificial Immune Systems for
of the algorithm. Conducting experiments on different tasks Optimization”, Nature-Inspired Algorithms for Optimization, vol. 193.
and comparing them with alternative methods will also aid in pp. 389–411, 2009.
assessing the efficiency of AIS algorithms. [6] D. Dasgupta, F.A. Gonzalez, “Artificial immune system: Models,
algorithms, and future directions”, Evolutionary Intelligence, vol. 8(3-
IV. CONCLUSION 4), pp. 119–139, 2015.
The following main results have been obtained: [7] G. Kalani, Industrial process control: advances and applications. USA:
Elsevier Science, 2002, 197 p.
Conditions for evaluating the effectiveness of artificial
immune system (AIS) optimization algorithms have
been established by formulating quality criteria that
enhance the efficiency of finding optimal solutions.
- 189 -
A Comparative Study on One-Class
Classification Based Autoencoder Models for
Anomaly Detection in Brake Operating Units
Inki Kim 1, Jeong Won Kang2 Jeonghwan Gwak 1,*
1
Dept. of IT·Energy Convergence, Korea National University of Transportation, Korea
2
Department of Transportation System Engineering, Graduate School of Transportation, Korea National University of Transp
ortation, Korea
3
Dept. of Software, Korea National University of Transportation, Korea
Email: [email protected], {jwkang, jgwak}@ut.ac.kr
Abstract— Railway transportation systems are intricate However, these mechanisms are primarily reactive, coming
networks of technology, involving numerous interlinked and into play after a malfunction has occurred. The present
dependent components. Among these, the braking system, research intends to shift this paradigm to a more proactive
specifically the Brake Operating Unit (BOU), plays a crucial stance, where potential malfunctions, such as delays
role. Its malfunction, defined as a 4-second delay compared to exceeding four seconds in the Brake Cylinder (BC) response
normal operation, could result in catastrophic outcomes, time, are detected and rectified even before they occur. An
underscoring the significance of early fault detection integral part of these railway systems is the braking system.
mechanisms. This paper focuses on the BOU, utilizing pressure The function of a braking system is not just limited to
data from the Brake Cylinder (BC) for anomaly detection. We
controlling the speed of the train and making necessary stops,
propose a novel deep learning approach based on the One-Class
Classification (OCC) concept, where models are trained solely
but it also ensures the overall safety of the railway system.
on normal data, using autoencoder models. The ensuing high Current inspection methods, such as visual inspections and
reconstruction errors are indicative of anomalies, offering a sensor data monitoring, do not provide a comprehensive
proactive approach towards fault detection, thereby mitigating solution for fault detection. Therefore, the introduction of
potential risks. The Long Short-Term Memory Autoencoder machine learning, specifically deep learning techniques,
(LSTM-AE), Bidirectional Gated Recurrent Unit Autoencoder provides a much-needed proactive approach to fault detection
(BiGRU-AE), and Anomaly Transformer models have shown to and prevention. In this paper, we propose a novel method to
outperform other architectures in our comparative analysis, detect anomalies in the brake system of metro vehicles,
with the Anomaly Transformer demonstrating the highest recall specifically the Brake Operating Unit (BOU). We employ the
score, indicating a lower false negative rate which is of utmost concept of One-Class-Classification (OCC) and autoencoder
importance in safety-critical systems like railway brakes. models for this purpose.
However, these results are specific to the dataset used,
necessitating comprehensive testing and evaluation before The previous study [1] demonstrated the effectiveness of
deployment. Our approach is a significant stride towards LSTM-based models for anomaly detection, highlighting their
proactive fault detection and prevention in critical systems. strengths in handling time-series data and their superior
performance compared to 1D-CNN and bi-directional RNN
Keywords— Anomaly Detection, Brake Operating Unit, Metro models. However, it also pointed out areas for improvement,
Vehicle Brake System, One Class Classification, Autoencoder including real-time system compatibility and handling
datasets with fewer anomalies. Building upon this
I. INTRODUCTION foundational work, our current study conducts a
The role of railway transportation in modern urban comprehensive performance analysis of various models,
infrastructure is beyond mere transportation. It forms the including LSTM-AE, GRU-AE, BiGRU-AE, BiLSTM-AE,
backbone that holds the city together, providing reliable and and the Anomaly Transformer, under a fixed threshold of 0.95.
fast connectivity, and contributing to economic growth. This fixed threshold was not optimized, underscoring our
Maintaining the operational efficiency and safety of these primary objective to evaluate the effectiveness and robustness
systems is of paramount importance. Traditional methods of of these models under non-ideal conditions. Our work,
maintaining these systems revolve around regular therefore, contributes to the existing literature by adding a
maintenance checks and fault detection mechanisms. unique dimension of analysis on the performance of these
models.
Fig. 1. A visual representation of a sample from the Brake Operating Unit (BOU) dataset
- 190 -
II. PROPOSED METHOD utilized several architectural models in our study. This
includes the One-Dimensional Convolutional Neural
A. Dataset
Network Autoencoder (1D-CNN-AE) [2], Long Short-Term
Our study utilizes a large and comprehensive dataset Memory Autoencoder (LSTM-AE) [3], Gated Recurrent Unit
gathered from the Brake Operating Unit (BOU) of a metro Autoencoder (GRU-AE) [4], Bidirectional Long Short-Term
vehicle. The data focuses on the pressure readings from the Memory Autoencoder (BiLSTM-AE) [5], Bidirectional
Brake Cylinder (BC). This is a primary component of the Gated Recurrent Unit Autoencoder (BiGRU-AE) [6], and
braking system, and its efficient functioning is paramount to Anomaly Transformer [7]. These models were trained solely
the safety of the metro system. The dataset we have chosen on normal instances, following the OCC concept. The trained
for our research encompasses 14,400 instances of normal models were then tested on the test set, and their
operational data. This is our training dataset, and we use this performances were evaluated based on precision, recall, and
to train our models on what a 'normal' operation looks like. In F1-score metrics.
addition to this, we have 14,673 instances in our test datasets.
This includes 55 instances of anomalies, which we use to test III. EXPERIMENT RESULTS AND ANALYSIS
our models' efficacy in anomaly detection. To better
A. Experimental Environment
understand the data, Figure 1 provides a visual representation
of a sample from Case1 of the BOU dataset used in the We conducted all our experiments on a robust, high-
experiment. It shows a clear distinction between BC and AC performance workstation. This machine was equipped with a
pressure readings. The importance of segregating these 3.50 GHz Intel(R) i9-11900KF CPU and had 64GB of RAM.
readings lies in their distinct operational parameters and An NVIDIA 3090Ti GPU with 24 GB of VRAM
resultant data patterns. This differentiation allows for a more complemented this configuration, providing ample
precise and effective anomaly detection. To better understand computational resources to effectively train and test our
the data, Figure 1 provides a visual representation of a sample models. For implementation of the models, we used Python
from Case1 of the BOU dataset used in the experiment. The 3.8 as the programming language. The deep learning models
importance of segregating these readings lies in their distinct were built and trained using TensorFlow 2.5, a widely-used
operational parameters and resultant data patterns. This open-source library for machine learning.
differentiation allows for a more precise and effective
anomaly detection. B. Performance Evaluation
In our study, we evaluated the performance of each model
B. OCC Autoencoder for BOU Anomaly Detection using three metrics: precision, recall, and F1-score. Precision
The backbone of our anomaly detection mechanism is the is a measure of the correctness achieved in positive prediction
concept of One Class Classification (OCC). In a typical while recall measures the ability of the model to detect all
machine learning model, the model is trained with both positive instances correctly. The F1-score, on the other hand,
'normal' and 'abnormal' data. This allows the model to learn provides a balance between precision and recall. It is the
the distinction between the two. However, in OCC, the model harmonic mean of these two metrics, taking both false
is trained exclusively with normal operational data. This positives and false negatives into account.
allows the model to learn the underlying data patterns and
TABLE 1. PERFORMANCE COMPARISON OF DIFFERENT MODELS
operational norms of a normal operation. Once trained, these
models are capable of accurately recreating the input data. Model Precision Recall F1 Score
However, when an anomaly occurs, these models fail to
1D-CNN-AE 0.6742 0.1701 0.2717
reconstruct it accurately. This failure to reconstruct leads to
high reconstruction error, which can be quantified by the LSTM-AE 1.0 0.7946 0.8855
following formula: GRU-AE 1.0 0.6594 0.7947
1 BiLSTM-AE 0.9471 0.4522 0.6121
𝐿= ∑𝑥 ||𝑥 − 𝑥̂||2 ()
2 BiGRU-AE 1.0 0.6630 0.7973
Anomaly
In this equation, L denotes the reconstruction error, x 0.5409 1.0 0.7021
Transformer
represents the original input data, and x̂ is the reconstructed
data by the autoencoder. In an instance where the Table 1 provides a comparison of the performance metrics
reconstruction error (L) exceeds a pre-defined threshold, the including precision, recall, and F1-Score for each of the
instance is classified as an anomaly. To ensure the model's models studied in this research. Precision measures the
adaptability to dynamic data and evolving system behavior, correctness achieved in positive prediction, whereas recall
the threshold is regularly adjusted based on the following measures the ability of the model to detect all positive
formula: instances correctly. F1-score is the harmonic mean of
precision and recall, providing a balanced metric that takes
𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 = 𝑇ℎ𝑟𝑒𝑠ℎ𝑜𝑙𝑑 × 0.95 () both false positives and false negatives into account.
Precision Analysis: Precision measures the correctness
This adjustment makes the model more resilient to sudden achieved in positive prediction, where a higher precision
changes in the operational norms. means fewer false positives. From Table 1, LSTM-AE, GRU-
To cover the wide range of potential faults and AE, and BiGRU-AE all demonstrate perfect precision of 1.0,
malfunctions that might occur in the braking system, we have
- 191 -
signifying their impressive ability to accurately classify As a result, the Anomaly Transformer also stands out as a
anomalies in the braking system. However, the Anomaly strong candidate for such applications. However, it's
Transformer, despite its stellar performance in recall, shows important to note that the final choice of the model would
a relatively lower precision of 0.5409, indicating a higher rate depend on the specific requirements and trade-offs in
of false positives, i.e., instances where normal behavior is precision and recall based on the application context.
mistakenly classified as an anomaly. This could potentially Furthermore, comprehensive testing and evaluation on
lead to unnecessary investigations or system interruptions, different datasets are necessary to validate the performance
hampering the efficiency of operations. of these models before they can be deployed in real-world
Recall Analysis: Recall, on the other hand, measures the scenarios. Future work could focus on enhancing the
ability of the model to detect all positive instances correctly, precision of the Anomaly Transformer while maintaining its
where a higher recall means fewer false negatives. In the excellent recall rate. This would provide a model that is not
context of safety-critical systems like railway brakes, high only highly sensitive in identifying true anomalies but also
recall is crucial as false negatives (i.e., failing to identify a precise in minimizing false alarms.
true anomaly) can have potentially disastrous consequences.
From Table 1, the Anomaly Transformer exhibits the highest IV. CONCLUSIONS AND FUTURE WORK
recall, indicating its superior capability in capturing
anomalies. LSTM-AE and GRU-AE also perform strongly in The field of railway transportation systems is a complex
this regard with recall scores of 0.7946 and 0.6594 web of interconnected components, where the safe and
respectively. efficient operation of each part is critical to the overall system.
F1-Score Analysis: F1-Score, the harmonic mean of With an emphasis on the braking system, specifically the
precision and recall, provides a balanced metric that takes Brake
both false positives and false negatives into account. It is
especially important when dealing with imbalanced datasets,
where one class significantly outnumbers the other. In our
study, LSTM-AE performs the best in terms of F1-Score
(0.8855), demonstrating a good balance between precision
and recall. This makes LSTM-AE a reliable model for
anomaly detection, as it minimizes both types of errors.
GRU-AE and BiGRU-AE also deliver competitive F1-Scores
of 0.7947 and 0.7973 respectively.
In conclusion, each model displays distinct strengths and
areas for potential enhancement. LSTM-AE, GRU-AE, and
BiGRU-AE showcase robust performances across all metrics,
demonstrating their potential as robust models for anomaly
detection in railway braking systems. Meanwhile, the
Anomaly Transformer, with its superior recall performance,
provides an invaluable advantage for detecting anomalies in
safety-critical systems, despite its lower precision. This high
recall can be particularly beneficial in applications such as
railway braking systems, where the cost of failing to detect
an anomaly (a false negative) can be potentially catastrophic.
- 192 -
Advancement in Rail Defect Detection Using
YOLO-NAS: A Neural Architecture Search
Approach
Namjung Kim 1 Junhwi Park 2 Jeong Won Kang 3 and Jeonghwan Gwak 1,2 *
1
Dept. of Software, Korea National University of Transportation, Korea
2
Dept. of AI Robotics Engineering, Korea National University of Transportation, Korea
3
Dept. of Transportation System Engineering, Korea National University of Transportation, Uiwang 16106, Korea
Email: [email protected]
Abstract—The structural integrity of railway rails is of proposed YOLO-NAS model takes advantage of these
paramount importance for ensuring the safety and efficiency of distinctive differences to efficiently identify anomalies in images
rail transport. Any defects in the rail structure, such as cracks captured by track inspection vehicles. This research is poised to
or deformations, can lead to severe accidents, emphasizing the contribute significantly to the advancement of more effective,
urgent need for effective and accurate defect detection methods. automated defect detection methods, ultimately enhancing the
Traditional approaches largely depend on manual inspection of safety and reliability of rail transportation.
rail images, obtained via track inspection vehicles, which can be
both labor-intensive and time-consuming. To address this issue, Keywords— Rail Surface Detection, Deep Learning, Anomaly
we propose a deep learning-based technique for identifying Detection, YOLO-NAS
defects in railway rails. The proposed model employs a blend of
computer vision algorithms for rail detection and the YOLO- I. INTRODUCTION
NAS system. In a sound rail structure, certain visual and The 'rail,' a critical constituent of a railway system, forms
geometric consistencies are expected, whereas defective rails the metallic track on which trains operate, directly interfacing
exhibit noticeable deviations from these consistencies due to with the train wheels. This interaction has profound
factors like environmental impact or wear over time. Our
implications for passenger safety and the stable functioning of
- 193 -
trains. Therefore, it’s highly important task to do monitoring image augmentation strategies such as vertical and horizontal
rails. In South Korea, there is the criteria for rail diagnostics flipping to fortify the robustness of our model during training.
to be specified in “Guidelines for Track Maintenance and
Management” provided by Korea National Railway [1]. The
guidelines stipulate that the lifespan of a '50 kg rail' on a C. Experiment
straight line is approximately 500 million metric tons In this experiment, regarding the presence of anomalies
(accumulated tonnage). Rails may also manifest various on rails, various types were mentioned in introduction.
surface defects, including but not limited to, Corrugation, However, for this study, we conducted Bounding box
Flaking, Shelling, Head Checks, and Spalling. labeling specifically for the locations where rail
Among the structural elements of a rail, the Head, being abnormalities occurred and unified all classes as “Defect”.
the primary contact point with the train's wheels, is susceptible This experiment for detecting defect was performed by
to significant damage and wear. Therefore, regular and regions of interest (ROIs) extracted from the raw images. The
comprehensive inspection of rail conditions is essential. width of all raw images is 2048, the height of those, however,
Traditional approaches predominantly rely on the visual and vary individually. Besides, there is a difference in the width
manual inspection of rail images, a process that is both time- of ROIs. For the reason, we resized their width and height to
consuming and prone to oversight. Recent efforts in railway 180 and 800 (i.e., average values in our dataset) each other.
track monitoring have endeavored to employ Artificial The training phase involved pre-trained weights derived
Intelligence (AI) models for defect detection to circumvent from the COCO dataset, with batch sizes of 16, and a patience
these issues [2, 3, 4]. parameter of 50 for early stopping. To assess the performance
To this end, we propose a novel method for defect of our model, we employed YOLOv5 and YOLOv8 as
detection on rail surfaces using a deep learning model that benchmark models.
integrates a computer vision algorithm and the YOLO-NAS
system [5]. YOLO-NAS overcomes the limitations observed III. EXPERIMENT RESULTS AND DISCUSSION
in previous YOLO models by harnessing the power of Neural The performance metrics of the detection models are
Architecture Search (NAS) and quantization. Its in-house summarized in Table I.
NAS system, AutoNAC, autonomously redesigns the model's
architecture to optimize performance concerning speed, TABLE I. PERFORMANCE COMPARISION OF THE DETECTION MODELS
memory usage, and throughput. Quantization is employed to
convert weights, biases, and activations into integer values, Model Precision Recall F1 Score mAP0.5 mAP0.5:0.95
rendering the model more efficient. The model employs YOLOv5 0.8130 0.7950 0.8039 0.8600 0.5540
quantization-aware blocks (such as QARepVGG Block [6]) YOLOv8 0.8220 0.8200 0.8210 0.8820 0.5420
and a hybrid quantization method to maintain an optimal YOLO-NAS 0.9851 0.8684 0.9231 0.9025 0.6346
balance between accuracy and latency. Note: The values in bold represent the highest performance score for each performance indicator.
- 194 -
renders YOLO-NAS a more efficient and effective tool. These [5] J. R. Terven, D. M. Cordova-Esparaza, “A comprehensive review of
findings suggest that the YOLO-NAS's superior performance YOLO: From YOLOv1 to YOLOv8 and beyond,” arXiv preprint, 2023,
arXiv:2304.00501
is inherently tied to its ability to establish the optimal
[6] X. Chu, L. Li and B. Zhang, “Make RepVGG Greater Again: A
architecture for our dataset. Quantization-aware Approach,” arXiv preprint, 2022,
arXiv:2212.01593
IV. CONCLUSION & FUTURE WORK
Traditional methods for detecting rail defects have proven
to be inefficient and labor-intensive. To address this, we have
introduced a deep learning-based model for defect detection.
This work entailed a series of experiments aimed at gauging
the efficacy of anomaly detection in rail images using the
YOLO-NAS model. We then analyzed these results to assess
the model's performance in rail defect detection. In alignment
with our initial expectations, the YOLO-NAS model
demonstrated high numerical performance. Our interpretation
of these results is twofold. First, YOLO-NAS was able to
effectively address the trade-off between computational speed
and accuracy, thanks to the use of QARepVGG Blocks.
Second, the implementation of AutoNAC led to a more
efficient architecture tailored to our dataset. Furthermore,
YOLO-NAS outperformed its quantitative results with
remarkable qualitative performance, as illustrated in Fig. 2.
The model effectively detected a wide range of defect types,
reinforcing the applicability of YOLO-NAS for rail defect
detection. Future work will focus on the development of a
comprehensive dataset to compare the performance of various
detection models. We will also expand our research to
facilitate class-specific detection of rail defects, further
improving the precision and utility of the model.
ACKNOWLEDGMENT
This work was supported by the Basic Science Research
Program through the National Research Foundation of Korea
(NRF) funded by the Ministry of Education (Grant No. RS-
2023-00248444)
REFERENCES
- 195 -
August 22(TUE) - 25(FRI), 2023
Oral Session 9
Room : A435
Chair: Won Sik Moon (Soongsil University, Korea)
- 196 -
A Neural Network Based Approach for
Disease Prediction Using Symptom Data:
Uncovering Hidden Relationships and
Improving Diagnostic Accuracy
Zoljargal Jargalsaikhan1, Zolzaya Dashdorj1*, Stanislav Grigorev2, Tae-Koo Kang3,
Munguntsatsral Dovdondash1, and Erdenebaatar Altangerel1
1
Mongolian University of Science and Technology, Ulaanbaatar, Mongolia
2
Irkutsk National Research Technical University; Irkutsk, Russia
3
Sangmyung university, Seoul, Republic of Korea
*[email protected]
Abstract—In the field of health-care and bio-medical decision trees, random forests, support vector
research, understanding the relationship between the machines, and neural networks, including deep
symptoms of diseases is crucial for early diagnosis and learning models like convolutional neural networks
determining hidden relationships between diseases. The (CNNs) and recurrent neural networks (RNNs), are
study aimed to understand the extent of symptom types
in disease prediction tasks. In this research, we analyze a
employed for disease prediction. These models can
pre-generated symptom-based human disease dataset and learn complex patterns and relationships from
demonstrate the degree of predictability for each disease symptom data, enabling accurate predictions. Disease
based on the Convolutional Neural Network and the prediction models based on network analysis have
Support Vector Machine. The diversity of symptoms and gained attention. These models capture the
diseases is studied using the Principal Component relationships and interactions between symptoms,
Analysis. Our results indicate that machine learning can diseases, and biological entities like genes and
potentially diagnose diseases with 98-99.9% accuracy proteins. Network-based approaches reveal hidden
taking the characteristics of symptoms into account. Our associations and provide insights into disease
result highlights that types of uncommon symptoms are a
good proxy for disease early identification accurately. We
mechanisms and potential therapeutic targets. This
also highlight that uncommon symptoms increase the research work aims to develop a network-based
accuracy of the disease prediction task. approach for disease prediction using symptom data. In
this study, we analyze a disease-symptom relation
Keywords—health-care data analytics, bio-computing, network to understand the characteristics of patients’
machine learning, deep learning, disease network symptoms in terms of occurrence to improve a disease
diagnosis and prediction task. We demonstrate the
I. INTRODUCTION study by estimating the disease predictability and the
The rapid advancement of machine learning and relation between diseases and symptoms using
data analytics has paved the way for innovative machine (deep) learning techniques (SVM and CNN)
approaches to disease prediction. One promising based on word embedding. By constructing a
method is the utilization of a network-based approach symptoms-disease network, we can capture the
that leverages symptom data to predict and understand interconnectedness between symptoms and diseases,
disease outcomes. By integrating diverse data sources unveiling hidden patterns and associations that can
and mapping the relationships between symptoms and enhance diagnostic accuracy and treatment
diseases, this approach offers a comprehensive decision-making.
understanding of the complex interactions underlying
human health. Many applications are developed II. RELATED WORKS
including health-care chatbots, and disease diagnosis The state of the art in disease prediction given
by CT, MRI images. Integration of Multiple Data symptoms involves the application of advanced
Sources: State-of-the-art disease prediction models machine learning techniques to analyze patient data
incorporate diverse data sources, including electronic and provide accurate predictions. One notable
health records (EHRs), genomic data, wearable approach is the utilization of deep learning models,
devices, social media, and environmental factors. By such as recurrent neural networks (RNNs) and
integrating these data, researchers aim to capture a convolutional neural networks (CNNs), which have
comprehensive view of an individual's health status shown promising results in capturing complex patterns
and improve the accuracy of predictions. Machine and relationships in symptom data. A study by Choi et
Learning and Deep Learning Techniques [10-16]: al. [5] introduced the Retain model, an interpretable
Advanced machine learning algorithms, such as
- 197 -
predictive model for healthcare that utilizes a reverse layers were designed with the following
time attention mechanism. The model incorporates hyper-parameters. The 1st layer is a one-dimensional
patient symptoms over time to predict disease convolutional layer of 64 filters, 2 kernels and Relu
outcomes, allowing for effective disease prediction and activation function. We add Dense (16 units),
interpretability. The Retain model has demonstrated its MaxPooling1D and Flatten layers into the model. The
potential in capturing longitudinal information and output layer contains the number of output classes and
providing insights into the decision-making process. 'softmax' activation. The evaluation results of those
Furthermore, the integration of electronic health models are estimated by F1-score, Precision, Recall.
records (EHRs) has emerged as a crucial component in
disease prediction. Researchers, such as Jensen et al.
(2012), have focused on mining EHR data to develop
robust disease prediction models. By leveraging
large-scale EHR databases, these models can harness
comprehensive patient information, including
symptoms, medical history, and clinical measurements,
to enhance disease prediction accuracy. In addition to
Figure 1. Convolutional Neural Network architecture
EHR data, the incorporation of other modalities, such
as genetic data and medical imaging, has gained 3.3. Symptoms dimensionality reduction
attention in disease prediction research. By integrating Given the high-dimensional nature of symptom
multiple data sources, researchers can enhance the data, feature selection and dimensionality reduction
predictive power of models and provide a more techniques are used to identify the most informative
comprehensive understanding of diseases. Overall, the and relevant symptoms. Feature selection methods like
state of the art in disease prediction given symptoms genetic algorithms, recursive feature elimination, and
involves the use of advanced machine learning models, L1 regularization help eliminate redundant or
integration of diverse data sources, and the irrelevant symptoms, enhancing prediction
development of interpretable models. These performance. Diseases can present with a wide range
advancements hold significant potential for improving of symptoms, varying in severity, duration, and
diagnosis and treatment decisions, ultimately leading combination. The diversity of symptoms makes disease
to better healthcare outcomes. Overall, the study by prediction challenging as different individuals may
Zhou et al. [1] provides a comprehensive analysis of exhibit different sets of symptoms for the same
the symptoms–disease network, shedding light on the disease. Using PCA techniques, we reduce the number
relationships between symptoms and diseases. The of symptoms to detect the degree of essential features
findings highlight the potential for utilizing as symptoms for each disease.
network-based approaches in disease diagnosis,
prediction, and understanding of disease mechanisms. IV. DATA COLLECTION
We used a total of 4,442 diseases and 322
III. METHODOLOGY symptoms from PubMed articles with 7,109,429 (about
The following 3-stage research was conducted using 35.5% of over twenty million records)
machine learning. disease/symptom terms in the MeSH metadata field
[1]. This data represents 98.5% of all symptoms and
3.1. Analyze common and unusual symptoms. 95.0% of all diseases in the MeSH vocabulary. TF/IDF
It is crucial to explore hidden links between diseases to was used to estimate the association between
understand their characteristic difference. Symptoms symptoms and disease. Using clinical notes used in
are commonly observed in diseases and are essential to [17], a total of 4,920 patient records were obtained in
diagnose disease primarily. We analyze common and this research.
unusual symptoms in the disease-symptom network
based on the occurrence, and estimate the rate of the
uniqueness of the symptoms.
- 198 -
Those research studies obtained a 95.12% accuracy predictability. The network is visualized in Figure 2.
score in disease prediction tasks by employing The average disease-symptom linkage degree of the
Decision Tree, Random Forest and Naive Bayes disease-symptom correlation network is 1.882. The
classifiers. The dataset of 41 types of disease network is modeled to have a diameter of 10, a radius
consisting of 135 symptoms was used, and the degree of 5, and an average shortest path length of 4.2. We
of symptom severity was graded on three levels. Every identified common and uncommon symptoms based on
disease in our dataset is associated with up to 18 the symptoms occurring in diseases, as shown in
symptoms. Figure 3.
V. EXPERIMENTAL RESULTS
We first build a network of diseases and symptoms
from the clinical note dataset to understand the
Uncommon symptoms were not observed in some Contrary to unusual symptoms, some symptoms occur
diseases, such as Chickenpox, Chronic cholestasis, commonly. For instance, a symptom occurring in 17
Heart attack, Jaundice, Malaria, Hepatitis A, C, D, and diseases is 2. More than two occurrences of symptoms
Hyperthyroidism. The occurrence of symptoms over in the disease are almost 50% of the symptoms. That
diseases is estimated in Figure 4. highlights that most symptoms commonly occur over
disease, and ambiguity of diseases is due to the
common symptoms. On average, the rate of unusual
symptoms occurrence for each disease is around
39.2%, except for the diseases without any unusual
symptoms. The diseases with more than 50% of
uniqueness rate of symptoms are predicted relatively
well. On average, the rate of unique symptoms
obtained for each disease is around 39.2% except for
those diseases which do not have any unique
symptoms.
- 199 -
F1-score were not correlated to the uniqueness of
SVM (common 99.2% 99.2% 99.2%
symptoms and the number of symptoms. The reason
+ uncommon
could be related to the insufficient dataset. However,
symptoms)
understanding common and unusual symptoms are
essential in disease prediction tasks; we try to reduce
CNN (common 99% 99% 99%
the number of symptoms by employing Principal
symptoms)
Component Analysis (PCA). Figure 6 shows the
reduced number of symptoms compared to the
CNN 99.9% 99.9% 99.9%
accuracy of the SVM model. At least four types of
(common +
symptoms, regardless of common or unusual
uncommon
characteristics, should be defined for each disease to
symptoms)
have a predictability rate of more than 91% by a k
(k=5) fold cross-validation.
We trained the disease prediction models that employ
CNN and SVM methods in our split data 80/20. The
dataset is well-balanced. The performance of the
models are evaluated using F1-score, Precision, and
Recall. The performance result in macro averaged
metrics presented in Table 1 explains the predictability
of diseases. Given symptoms, predicting a particular
disease is 99.9% of the F1-score. The evaluation
results were relatively good, 98% - 99.9% considering
common and unusual symptoms. These results indicate
that machine learning can potentially diagnose diseases
in the early stage, taking the characteristics of
symptoms into account. Our model outperformed the
other experiments [17] using the same dataset, with a Figure 6. Reduced number of PCA features
3-5% increase. We also highlight that unusual
symptoms increase the accuracy of the disease Figure 7 presents the Silhouette score of K-means on
prediction task. the data containing PCA-reduced symptoms and all
symptoms. PCA reduction improved K-means
performance as the Silhouette score is higher than 0.5
on the dataset containing PCA-reduced symptoms. The
Silhouette score is 0.64 when the optimal cluster
number is 6 for the dataset containing PCA-reduced
symptoms; the Silhouette score is 0.28 when the
optimal cluster number is 7 for the dataset containing
all symptoms. From cluster 27, the silhouette score
curve became flattened at a score of 0.74.
- 200 -
were well separated given the symptoms and why the
machine learning method performed well. REFERENCES
Extensive dataset experiment [1] Zhou, X., Menche, J., Barabási, AL. et al. Human
symptoms–disease network. Nat Commun 5, 4212 (2014).
The same methodology was applied to a large dataset
https://doi.org/10.1038/ncomms5212
of about 4,442 unique diseases and 322 symptoms [2] Ting, D.S.W., et al. (2017). "Artificial Intelligence and Deep
extracted from 7,109,429 PubMed articles. We refined Learning in Ophthalmology." British Journal of
the diseases that reveal more than 4 symptoms. In total Ophthalmology, 103(2), 167-175.
[3] Luo, G., et al. (2018). "Deep Learning-Based Disease
3,233 unique diseases were extracted. Adopting the
Prediction using Electronic Health Records." IEEE Access, 6,
Decision Tree model, the accuracy of training data is 65333-65341.
91.47%, and the CNN model achieved 91.47% of [4] Rajkomar, A., et al. (2018). "Scalable and Accurate Deep
accuracy in the training set, as a preliminary trained Learning with Electronic Health Records." npj Digital
Medicine, 1, 18.
model. Therefore, we considered the severity of the
[5] Choi, E., et al. (2016). "Doctor AI: Predicting Clinical Events
symptoms based on the TF/IDF of PubMed via Recurrent Neural Networks." Journal of Biomedical
occurrences for training data. The Decision Tree model Informatics, 63, 322-327.
performed around 98.77%, and the CNN model [6] Choi, E., et al. (2016). "Retain: An Interpretable Predictive
Model for Healthcare using Reverse Time Attention
achieved 98.47% of accuracy in the training set. This
Mechanism." In Proceedings of the 21th ACM SIGKDD
trained model would be used to further predict diseases International Conference on Knowledge Discovery and Data
from any form of medical documents such as clinical Mining, 2017-2026.
notes. But the terms should be aligned with the MeSH [7] Lasko, T.A., et al. (2013). "Computational Phenotype
Discovery Using Unsupervised Feature Learning over Noisy,
Disease Terms and MeSH Symptoms Terms.
Sparse, and Irregular Clinical Data." PLoS ONE, 8(6),
e66341.
VI. CONCLUSION [8] Kavakiotis, I., et al. (2017). "Machine Learning and Data
Mining Methods in Diabetes Research." Computational and
We trained an extensive amount of MeSH disease
Structural Biotechnology Journal, 15, 104-116.
considering MeSH symptoms with an accuracy of [9] Miotto, R., et al. (2017). "Deep Patient: An Unsupervised
98.47% based on the CNN. This trained model is a Representation to Predict the Future of Patients from the
baseline model for predicting disease in any form of Electronic Health Records." Scientific Reports, 6, 26094.
[10] Singh, P., et al. (2019). "Disease Prediction Using Data
biomedical documents. Therefore, we applied the same
Mining Techniques: A Comprehensive Review." International
methodology to clinical notes to estimate predictive Journal of Intelligent Systems and Applications, 11(8), 57-68.
accuracy. We achieved 99.9% testing accuracy based [11] Farid, D.M., et al. (2017). "Disease Prediction Using Machine
on the CNN model by considering uncommon and Learning Techniques: A Comparative Study." Journal of Big
Data, 4(1), 1-17.
common symptoms. We observed that a sufficient
[12] Gholami, M., et al. (2019). "A Comparative Study of Machine
number of symptoms required at least 4 types for each Learning Techniques for Disease Prediction." In Proceedings
disease in predicting a disease with more than 91% of of the International Conference on Artificial Intelligence in
accuracy. We will extend this study by analyzing Data Science, 97-111.
[13] Naik, G.R., et al. (2020). "A Comparative Study on Machine
disease heterogeneity, and disease specificity for better
Learning Techniques for Disease Prediction." Journal of
prediction. The network-based approach has the Ambient Intelligence and Humanized Computing, 11(11),
potential to outperform conventional methods by 5205-5221.
leveraging the collective knowledge embedded in the [14] Mamun, M.A., et al. (2019). "A Review of Machine Learning
Techniques for Disease Prediction." In Proceedings of the
symptom-disease associations. Through this
International Conference on Computing and Communication
network-based approach to disease prediction using Systems, 32-36.
symptom data, we anticipate unlocking new [15] Islam, M.M., et al. (2021). "Machine Learning Techniques for
opportunities for precise and proactive healthcare Disease Prediction: A Review." International Journal of
Advanced Computer Science and Applications, 12(5),
interventions, thereby improving patient outcomes and
356-364.
reducing the burden of disease. [16] Dash, M., et al. (2020). "A Comprehensive Review on
Machine Learning Techniques for Disease Prediction."
ACKNOWLEDGMENT Journal of Ambient Intelligence and Humanized Computing,
11(7), 2943-2966.
This research was supported by KOICA(Korea [17] S. Grampurohit and C. Sagarnal, "Disease Prediction using
International Cooperation Agency) through "Capacity Machine Learning Algorithms," 2020 International
Conference for Emerging Technology (INCET), Belgaum,
Building Project for School of Information and India, 2020, pp. 1-7, doi:
Communication Technology at Mongolian University 10.1109/INCET49848.2020.9154130.
of Science and Technology in Mongolia" (Contract
No. P2019-00124). Also partially supported by
Mongolian Foundation for Science and Technology
(MFST).
- 201 -
System of Intelligent Control of Processes of
Development and Harmonization of Standards in
the Field of Military and Space Activities on the
Basis of Ontological Engineering
*Note: Sub-titles are not captured in Xplore and should not be used
Abstract— Technological modernization of all sectors is the To achieve this goal, the following research objectives were
main priority of developing countries. The expansion of implemented:
international relations directly depends on the readiness of - Development of a model using a systematic approach to the
states to introduce international experience in a particular area. methodology of ontological engineering, to form an
One of these areas is the need to harmonize international unambiguous formulation of definitions of harmonized and
standards in the field of military and space activities. The article newly created standards, without losing the connection between
proposes a new approach to solving the problems of processing entities, with the ability to identify contradictions or
large amounts of textual information of regulatory documents. inconsistencies in terminological unity in priorities.
The tasks described in the article involve a unique and - Application of intelligent control methods in the processes
exceptional sequence of a chain of research procedures – from of the operational cycle of standard development in the
research, formulation, and formalization of tasks to the development of the concept of a single representation of the
development of an application solution. For the first time, standard as a document that meets the requirements of a formal
ontological engineering in the field of process automation will be feature
used to harmonize standards according to the National The paper presents: a model of classification of standards, a
Standardization Plan, which consists in partial automation of module for highlighting entities, a categorization module, a
methodological examination of documents. As part of the module for the formation of a thesaurus, a module for
experiment, an independent tool was implemented, without monitoring and analysis. The calculations were carried out
reference to existing repositories of regulatory documents. The using formalization methods, setting the objective function,
approach is based on methods of extracting qualitative data setting the similarity measure, and determining the feature
from textual information, methods of intelligent management, description of the document. The paper demonstrates the
formulation of new scientific and scientific-technical problems theoretical component of the field of application, the design part,
applicable to standardization, models of monitoring and control and the description of the functionality of the system. The results
of processes. obtained were tested by a group of expert specialists competent
The rapid development of new technologies and algorithms in solving this problem, based on standards and regulatory
in recent years contributes to the development of the necessary documents in the field of the aerospace industry.
tools for automating many processes. First of all, we are talking Keywords— national standards, aerospace activities,
about the creation of tools for developers and experts of harmonization of standards, algorithm for identifying keywords,
standards, which will optimize the workflow of managing categorization of standards.
national standards, taking into account the consistency of
information set forth in existing standards and regulatory I. INTRODUCTION
documents. Secondly, it is necessary to trace all participants in Technological modernization of all industries is the main
the development and the main customers. And the most priority of national importance. The development of
significant work is the development of auxiliary tools for Kazakhstan's defense industry and readiness to develop joint
organizing the terminological unity of national military
ventures with other countries will make it possible to reform
standards in the state language, as well as taking into account
the uniformity of measurements.
the military-industrial complexes. In connection with the
The purpose of this study is to develop an intelligent growing need of the military-industrial complexes, it is
automated system for managing, monitoring, and controlling necessary to focus on the regulatory requirements and the
the processes of the operational cycle of standard development legislative component of this industry. Research in the field of
using technological integrations of optimal methods for creating international practices is reduced to the harmonization and
a single repository. development of national standards. But with all the openness
of international standards, it is necessary to take into account
the requirements of existing standards in Kazakhstan. This
- 202 -
practice is mandatory with the growing demand for the Pamanee are based on the identification of key terms for the
transfer of scientific and technical information, the industry standard that are relevant to legal categories [4].
convergence of the level of quality of goods produced in Metrological certification of the algorithm for assessing the
different countries, ensuring the interchangeability of inconsistency of data from key comparisons of national
elements of complex products, and the promotion of standards is given in the studies of a group of researchers
international relations. As practice shows, the construction Burmistrova, N.A., Viktorov, I.V., Chunovkina, A.G. [5].
and launch of industrial facilities takes almost the same time
as the development of the legislative component, regulatory Particular attention should be paid to research in the field
documents, and national standards. In this connection, it is of education, whether national standards are used for the
necessary to carefully study all stages, taking into account the development of curricula and learning outcomes. The
requirements of all interested parties. Most of the military- presented methods make it possible to test the developed
industrial complexes have a dual purpose, and therefore, when documentation on disciplines and get an analysis of the results
developing standards, it is necessary to consider not only [6-7]. Comparison of algorithms for extracting keywords is of
military standards, but also civilian ones. scientific interest to the world community [8-13].
The rapid development of new technologies and III. THE PURPOSE AND OBJECTIVES OF THE STUDY
algorithms in recent years contributes to the development of The purpose of this study is to develop an intelligent
the necessary tools for automating many processes. First of automated system for managing, monitoring and controlling
all, we are talking about the creation of tools for developers the processes of the operational cycle of standard development
and experts of standards, which will optimize the workflow of using technological integrations of optimal methods for
managing national standards, taking into account the creating a single repository.
consistency of information set forth in existing standards and
regulatory documents. Secondly, it is necessary to trace all To achieve this goal, the following research objectives
participants in the development and the main customers. And were implemented:
the most significant work is the development of auxiliary tools - A model has been developed using a systematic approach
for organizing the terminological unity of national military to the methodology of ontological engineering, to form an
standards in the state language, as well as taking into account unambiguous formulation of definitions of harmonized and
the uniformity of measurements. newly created standards, without losing the connection
between entities, with the possibility of identifying
II. ANALYSIS OF MANAGEMENT SYSTEMS FOR THE PROCESS
contradictions or inconsistencies in terminological unity in
OF DRAFTING AND REVISING LAWS AND REGULATIONS ON
priorities.
CIVIL-MILITARY INTEGRATION
Studies of the problems of the use of information systems - Methods of intelligent control in the processes of the
in the design of key technologies of civil-military integration operational cycle of standard development were used in the
rules and standards management systems are reflected in the development of the concept of a single representation of the
works of Huang, T. The author reveals the issues of managing standard as a document that meets the requirements of a
formal feature
the process of drafting and revising laws and regulations of
civil-military integration. According to the author, the use of IV. MATERIALS AND METHODS AND OBJECTIVES
the system improves the quality of standardization and
timeliness of management of rules and standards of civil- The main idea of the project is to develop a unified system,
military integration, increases the accuracy and traceability of an improved mechanism for monitoring and controlling
data on rules and standards. [1] Significant contributions of processes in the development of national standards. The
Ryu, H.E. are known. The author's research provides quite project involves a unique and exceptional sequence of a chain
strong and loud arguments for the harmonization of standards of research procedures – from research, formulation and
and technologies of asymmetric conformity. The purpose of formalization of tasks to the development of an application
the study is to examine the welfare implications of solution. For the first time, ontological engineering will be
harmonization of standards between technologically used in the field of process automation to harmonize standards
asymmetric countries and to identify optimal harmonization in accordance with the National Standardization Plan, which
strategies for countries with an average level of technological consists in partial automation of methodological examination
progress. [2]. An analysis of the actualization of Russian of documents for submission to Kazakhstan Institute of
standards regarding the requirements proposed by Chudnova, Standardization and Certification (KazInst). The solutions
O.A., Potsulin, A.D., Shilov, A.S., recalled the problems of presented in this project have not yet been implemented and
harmonization of standards when integrating domestic have no analogues in Kazakhstan, in the implementation of
enterprises wishing to expand their markets and do business the tasks, the goals of supporting the developers of national
with international partners into the world market. The study standards with a dynamic response to current changes in the
presents the results of a comparative analysis of RF standards field of military standardization are achieved.
in a particular industry based on the GOST classifier, and also In the implementation of tasks, ontological engineering is
shows the evolution of the development and harmonization of used in the field of process automation to harmonize standards
standards in modern economic conditions. The authors according to the National Standardization Plan based on the
introduce a criterion for measuring the level of harmonization results of a comparative analysis of models and methods for
of standards [3] the use of metadata, digital footprint, methods for automating
Scientific and technological needs that justify the text markup, intelligent control methods in the processes of
importance of the planned research characterize new the operational cycle of standard development.
directions in the field of text recognition, such as the studies
of R. Chaisricharoen, W. Srimaharaj, S. Chaising and K.
- 203 -
The ontological representation of standards implements
the task of classifying standards by industry, i.e. for each
document, the degree of its belonging to a particular industry
is determined. When categorizing, two levels are introduced:
at the first level, the belonging of the standard to the
classification group is determined, after that, at the second
level, the standard's belonging to standards that are close in
content is determined.
For each document, the degree to which the document
belongs to a category is determined, which is formed by the
number of matching keywords. (the greater the degree of
affiliation, the more the document fits into this category).
The classification considers the possibility of defining one
standard for several groups within a classification group.
A formal measure of document similarity is organized by
comparing the search images of document keywords. Once
formed, the image of the keywords of the document, as well
as the scale of the feature space, does not change throughout
the life of the current standards.
When forming a list of a standard's belonging to standards Fig. 1. BPMN Process Diagram
that are close in content, the selection of documents is ranked
by priority (the closer the documents are in content, the lower V. RESULTS
its priority). There are no restrictions on the number of
documents under consideration. The analysis of a document within the framework of each
study is an independent creative process, depending on the
A similar classification method is used for users, for form and content of the document itself, the goals and
categorization by industry. The leaders of the expert group see conditions of the study, the wealth of experience and creative
applications for harmonization of standards only those that fit intuition of the researcher. If it turns out that both series of
them in the profile that provides information on the expert's data obtained independently of each other coincide, then this
keywords and publications. means that the information is sufficiently reliable and stable.
At the end of the classifications of documents, a thesaurus Interaction of the file with the program code (Figure 2).
of keywords is formed for an organized classification group of
standards. 1. The file is distributed to the model
The paper presents: a model of classification of standards, 2. Next, the code from the models receives the necessary
a module for highlighting entities, a categorization module, a information
module for the formation of a thesaurus, a module for 3. After processing, displays it to the client on the interface
monitoring and analysis. The calculations were carried out from the server
using formalization methods, setting the objective function,
setting the similarity measure, and determining the feature
description of the document. The paper demonstrates the
theoretical component of the field of application, the design
part and the description of the functionality of the system. The
results obtained were tested by a group of expert specialists
competent in solving this problem, based on experience in the
aerospace industry.
Figure 1 shows the BPMN diagram of the process.
Business process modeling allows you to find a compromise
between a clear description and technical functionality.
- 204 -
• CreatedGost keeps a list of requests for creating In the manager's profile, registered users are displayed in
standards, where all the action takes place at runtime the form of a table, and there is a more detailed button to
clarify information about the user.
• CreatedGOSTComments messages from managers,
performers, translators, admins and the applicant When harmonizing international standards, a detailed
during the creation of the standard study and correct conversion of units of measurement is
necessary. The system provides for an automatic search in
• RukovoditelKeyWords stores keywords for the the text of the harmonized standard of existing units of
manager, according to which there is a selection for measurement, a function is provided for replenishing the
recommendation to the applicant library with new units of measurement, to focus the
• RukovoditelWantWork keeps schedule, where the attention of developers and clarify the translation of metric
manager gives a task to the performers and leaves a job systems, systems of natural units of measurement and
application traditional systems of measurement.
• SimilarFile stores files that have the maximum number With harmonized standards, 3 types are defined, identical
of similar terms (ID), modified (MOD) and non-equivalent standards
(NEQ). The presented system allows its application for all
• TranslateFile is similar to the schedule, but for types of harmonization. Particular attention should be paid
translators, which is given after the completion of the to the module for organizing the rules for constructing
work by the performers standards and general requirements for their content. The
module allows you to semi-automatically create a template
• Documents stores diplomas, certificates, etc. of the that meets the general requirements for the construction,
new user for its verification presentation, design and content of standards (Figure 3).
• User keeps a list of users.
The analysis of the document within the framework of
each study is an independent creative process, depending
on the form and content of the document itself, the goals
and conditions of the study, the wealth of experience and
creative intuition of the researcher. If it turns out that both
series of data obtained independently of each other
coincide, then this means that the information is
sufficiently reliable and stable.
The main login window with user authentication provides
access to the use of project resources only to verified
users. Fig. 3. Automatic formatting
The registration window allows you to enter data about the
The main standards used by the system as an example were obtained from
user, such as full name, Login, Password, Role of the the website of the Kazakhstan Institute of Standardization and Metrology
project executor, Documents for subsequent verification. https://www.ksm.kz/public-discussion/standards/discussion-of-draft-of-st-
The function of adding user files (certificates, diplomas, rk/. This resource contains draft standards for discussion, which made it
bank details, etc.) and deleting them is also available. possible to form a base of standards for the repository (Figure 4).
When registering, you can skip this step and make it after
registration.
Upon registration, the user of the system views the data
entered by him. Also in this window you can view
information about the status of the user, verification.
The organization of the work of users with the
environment is carried out using the main page of the
administrator, includes a table about registered users, with
a button for details about the user. The top menu displays
five tabs: Profile, User List, Standards List, Standards
Developer List. There is a function of replenishment of
libraries. Information about user verification is marked in Fig. 4. Search for units of measurement
green, unverified users of the system are marked in red.
Based on the results of processing, managers have the
Full names of unverified users are highlighted in red. opportunity to view the standard for review. At this stage,
During verification, the administrator specifies the user's the applicant can familiarize himself with the current
role in the project. There are four roles in the pop-up menu: leaders on the topic presented, which is formed, according
Applicant, Manager, Executor, and Translator. At the end to the keywords that determine the direction of activity of
of verification, the color of the user's full name changes to a particular manager The main module is developed and
blue. The administrator appoints a manager and verifies consists in quantitative content analysis, the formation of
the user. keywords from the main document and comparing them
with other documents, distributed Key terms in the text of
the document form a database and are stored in the system.
- 205 -
This list is seen only by those managers who are experts in [4] R. Chaisricharoen, W. Srimaharaj, S. Chaising and K. Pamanee,
this field, the database of managers includes keywords for «Classification Approach for Industry Standards Categorization» 2022
Joint International Conference, on Digital Arts, Media and Technology
the selection of experts in the areas (Figure 5). with ECTI Northern Section Conference on Electrical, Electronics,
Computer and Telecommunications Engineering (ECTI DAMT &
NCON), 2022, pp. 308-313, doi:
10.1109/ECTIDAMTNCON53731.2022.9720348.
[5] Burmistrova, N.A., Viktorov, I.V., Chunovkina, A.G., Metrological
Certification of the Algorithm for Estimating Inconsistent Data of Key
Comparisons of National Standards, (2023) Measurement Techniques,
Volume 65, Issue 7, October 2022, Pages 508-514, DOI:
10.1007/s11018-023-02111-1
[6] Tiffanie Ford-Baxter, Kendall Faulkner, Jennifer Masunaga, Situating
Information Literacy: A Case Study Exploring Faculty Knowledge of
National Disciplinary Standards and Local Program Learning
Outcomes, The Journal of Academic Librarianship, Volume 48, Issue
3, 2022, ISSN 0099-1333,
Fig. 5. Standard page https://doi.org/10.1016/j.acalib.2022.102523.
[7] Barthelemy, F., Cochez, M., Dimitriadis, I., Karim, N., Loutas, N.,
Magnisalis, I., Comet, L. M., Peristeras, V., & Wyns, B. (2022).
Towards a standard-based open data ecosystem: analysis of DCAT-AP
use at national and European level. Electronic Government, 18(2), 137-
180. https://doi.org/10.1504/EG.2022.121856
Fig. 6. Algorithm for keywords [8] Eliseo Reategui, Marcio Bigolin, Michel Carniato, and Rafael Antunes
dos Santos. 2022. Evaluating the Performance of SOBEK Text Mining
Keyword Extraction Algorithm. In Machine Learning and Knowledge
ACKNOWLEDGMENT Extraction: 6th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9
This study was carried out and funded by the Science International Cross-Domain Conference, CD-MAKE 2022, Vienna,
Committee of the Ministry of Education and Science of the Austria, August 23–26, 2022, Proceedings. Springer-Verlag, Berlin,
Heidelberg, 233–243. https://doi.org/10.1007/978-3-031-14463-9_15
Republic of Kazakhstan (grant No. AR09058441 "Building a
[9] Mehrabi, Elaheh & Mohebi, Azadeh & Ahmadi, Abbas. (2020).
system of intelligent control of the processes of development Improved Keyword Extraction for Persian Academic Texts Using
and harmonization of standards within the framework of RAKE Algorithm, Case Study: Persian Thesis and Dissertations.
interstate and national standardization based on ontological Iranian Journal of Information Processing Management. doi: 37.
engineering"). 10.52547/jipm.37.1.197.
[10] M. S. U. Miah, J. Sulaiman, S. Azad, K. Z. Zamli and R. Jose,
REFERENCES "Comparison of document similarity algorithms in extracting
document keywords from an academic paper," 2021 International
[1] Huang, T.Design and Key Technology Research of Civil-Military
Conference on Software Engineering & Computer Systems and 4th
Integration Regulations and Standards Management System(2021)
International Conference on Computational Science and Information
Smart Innovation, Systems and Technologies, . DOI: 10.1007/978-
Management (ICSECS-ICOCSIM), Pekan, Malaysia, 2021, pp. 631-
981-15-5073-7_21
636, doi: 10.1109/ICSECS52883.2021.00121.
[2] Ryu, H. E. (2021). Standards Harmonization and Asymmetric
[11] Kungurtsev O. et al. Development of information technology of term
Compliance Technology. Journal of Korea Trade, 25(3), 1-20.
extraction from documents in natural language //Eastern-European
doi:10.35611/jkt.2021.25.3.1
Journal of Enterprise Technologies. – 2018. – Т. 6. – №. 2. – С. 44-51.
[3] Chudnova, O. A., Potsulin, A. D., & Shilov, A. S. (2018, Oct 02-04).
[12] Lytvyn V. et al. Development of a method for determining the
Analysis of Updating of the Russian Standards Concerning
keywords in the slavic language texts based on the technology of web
Requirements Harmonization. Paper presented at the International
mining // East European Journal of Advanced Technologies. – 2017. –
Scientific Multi-Conference on Industrial Engineering and Modern
no. 2(2). - P. 14-23.
Technologies (FarEastCon), Vladivostok, RUSSIA
doi:10.2991/iscfec-18.2019.268
- 206 -
August 22(TUE) - 25(FRI), 2023
Oral Session 10
Room : A437
Chair: Juhee Choi (Sangmyung university, Korea)
- 207 -
Algorithms of Methodology for Applying
Augmented Reality in Teaching Physics
Beken Arymbekov
Ph.D. student
Department of Physics and Technology
Al-Farabi Kazakh National University
Almaty, Kazakhstan,
[email protected],
ORCID 0000-0002-9670-2407
Abstract—Purpose of this article is to define algorithms frameworks are among the main difficulties. Overcoming
to develop methodology for applying augmented reality in these challenges requires support from the state through
teaching physics. Therefore, I made augmented reality funding and procurement, as well as the conduct of scientific
applications that can be used in the preparation of research and experiments to validate the effectiveness and
educational materials. Applied methodology analysis the pedagogical benefits of augmented reality in training
experience of introducing augmented reality technologies specialists from different fields. To promote the
into the educational process and educational materials as dissemination and application of augmented reality
sources for the latest augmented reality learning software. technology, it is recommended to organize national and
High school teaching process with augmented reality international events focused on this subject. These events
empower to perceive objects in 3D in real timeline and in serve as platforms for sharing knowledge, exchanging
natural environment using simple phones. This kind of experiences, and showcasing the potential of augmented
opportunity will consent students to improve their reality technologies. My research confirms that augmented
knowledge and lab experience. Educational resources with reality technologies have significant potential in the training
augmented reality is becoming more in demand in physics of future specialists in the new technological era. By
education. Augmented reality will allow visualizing invisible leveraging the benefits of augmented reality and addressing
physics processes, to view the physical experimental models the associated challenges, I can enhance the learning process
in detail. Assumptions to use of augmented reality support and better prepare students for physics lab.
has a progressive effect on the quality of education, but its
efficiency for students for different parts of physics is Keywords—augmented reality; physics; education;
different. The greatest effectiveness of augmented reality in pedagogy
the process of teaching students at high school were
revealed. In general, the impact of augmented reality on I. INTRODUCTION
students is still ambiguous. The issue requires further study, Modern society has entered augmented reality age, it is
in particular, in the aspect of stress. As a result, I have
on the threshold of augmented reality based civilization
gathered valuable information on the benefits, challenges,
and potential applications of augmented reality in various
and culture. As core and the engine of a new reality,
industries, particularly in the fields of social interaction, augmented reality started in last couple of decades of
education, tourism, and commerce. From an educational twentieth century, when the information flows due to
standpoint, the introduction of augmented reality mainstream of digital technologies. Since that moment, we
technology in educational institutions is to offer several can see the beginning of shifting cultural paradigm [1].
advantages. It can enhance the learning experience by Gradually over the years, the traditional ways of teaching
providing interactive and visually engaging content, thereby with books is being slowed down. Since the beginning of
increasing students' motivation to learn and improving the 21st century, we can talk about the situation of total
information assimilation. Additionally, the application of
digitalization of learning processes. Because of
augmented reality technologies in education contributes to
the development of these technologies themselves, leading to development of digital technologies, the way of
a growing demand for specialists in augmented reality. To perceiving the world, the way of thinking, and processing
effectively implement augmented reality in education, an of information began to change drastically. The
integrated approach is recommended, taking into account abundance of information and its fast change are not
the specific needs. This approach aims to adapt augmented giving to students the opportunity to see whole picture
reality technologies to various learning environments and about the world. The picture of the world is formed from
ensure that future physics professionals are adequately different disparate illustrations and impressions, received,
prepared for the new technological era. However, there are in in particular at fast shift frames of cartoons, television
challenges associated with the application of augmented
programs and other sources. Today this way of thinking is
reality technologies. Financial constraints, a lack of
specialized professionals, and the need for methodological called clip thinking, and the culture of thinking is called
clip culture. Clips is defined as short time of changing
- 208 -
frames [2]. At such fast frame pictures for students, its digitalization of education is integration in learning
hard utilize systemic knowledge about the subject. process and educational materials programs and platforms,
According to pedagogical researchers, it is very allowing use 3D images, the task of the author was
challenging for features of cognitive activity, including the consideration and classification of such agendas in the
main features of thinking about whole picture of situation. field of physics education [5]. The research methods used
Dominance of visual form of information overlays over in the article are the methods of analysis of primary data.
high speed of information processing against the Analysis government documents were subjected to
background of a decrease in the possibility of its scientific publications of domestic and foreign auto ditch,
generalization and restructuring. Traditional educational Internet sources with characteristics of programs virtual,
models are aimed at perception of information from the augmented and mixed reality.
book with voluminous texts. Textbooks and various kinds
of text materials are always were the main source of
knowledge for the student. However, modern students
with understands long texts with complications if it is
without illustrations; therefore, texts are boring,
uninteresting, poorly digested and memorized for them.
Accordingly, text materials needed revision, supplying
them with already habitual for new generation’s specific
images formulas formed before the eyes of the observer,
movable diagrams, changing images. Digitalization of
education presumes provides for the digitalization of
educational and methodological materials, supplying them Figure 1. The effectiveness of the two types of teaching styles.
with elements of augmented reality. Digital educational on In this study educational materials, in which refer
the contributions will constitute publicly available textbooks and educational and methodical allowances,
knowledge bases, will allow transfer the educational methodological recommendations for practical learning
process to the global network, using augmented reality and self-study work, accompany any type and level of
technologies featuring 3D graphics [3]. Distance learning educational process. Their success depends on their
forms of education more and more distributed in the availability and quality of educational process, learning
educational platforms. Remote forms learning and using outcomes of all categories of students. Learning success
digital learning materials become especially in demand at depends on correspond needs and features perception
a time when mobility students difficult. Many educators contemporary students. Modern students were born and
are devoted to the issues of the development of digital grew up in an era of rapid development of digital
forms and channels of education, the formation of digital technology. Students are faced with computers, tablets,
culture today. We are witnessing change of cultural smartphones, and various kind gadgets. These instruments
paradigm is happening. The new generation students no organically fit in digitalization as necessity as tactics
longer uses the textbooks, because they lives in a digital survival in replaced ordinary books. For students watching
world. New generation perceives traditional culture form animations was much more interesting than read long
with an established value system through digital and texts [6]. Today everybody more distribution the type of
emerging technology consequences such as clip culture, reading disorder becomes strange, referred to as dyslexia.
screen culture, culture of computer games. Internet gives
possibility continued education in conditions restrictions
mobility, obtain the necessary learning outcomes. In the
current situation, there is an increasing need in digital
learning materials. Proceeding from such need, everybody
more research preparing digital learning materials. Special
interest cause publications with experience in the
application of augmented reality in physics education. I
determined 3D programs established on strong phones,
convenient tool for improving the effectiveness of
teaching and learning. Mobile technologies embodied in
the new smart pedagogy and used technologies of
augmented reality, representing large potential for physics
education. This dedicated problems implementation
Figure 2. Students are testing prototype of augmented reality
elements of augmented reality in construction education application.
[4].
A child who has like view disorders psyche, finds it
II. METHODS
difficult develop reading and writing skills. We are facing
Method that I considered about the forms and creation a new epidemic learning disabilities, this phenomenon is a
of new learning materials, which would be interesting and huge problem. The nature of learning disabilities is not
understandable to the modern students. At the same time, enough studied. In scientific terms, it is based on a
it gives systemic knowledge about the subject under the complex of biological and social causes, in which you
dominance of clip awareness. Since the achievement of need to carefully analyze. The brain of children and
- 209 -
perception develop in a special way. One of the reasons
may be too early and long views clips. Perhaps, so
peculiarity contemporary students is what they not able us
scribble long texts. Textbooks without illustrations,
pictures, are disheartened and confused. Students lose
interest in systematic work with textbooks and others
educational paper materials. Featured teacher textbooks,
located in the library are often remain unclaimed while Figure 3. Architecture of augmented reality application.
presentations of lectures, provided with photo has more
interest cause. Students take pictures of presented slides Especially in demand will become educational mate
and then reproduce fragmentary information without with augmented and mixed reality in physics education
coherent ideas about the issue. Students are confident that institutes. Future professionals in these fields need visuals,
they can surf Internet and get the necessary information such as students studying physics, can study the
immediately; therefore, they are not trying to memorize. phenomenon on a virtual image, future astronomers can
This kind of habits of students deprives systemic visit save other planets, while not risking their lives and
assimilation subject [7]. As a result, we need new teaching health. Transfer from two-dimensional (2D) to three-
services, oriented on specifics thinking students, as well as dimensional (3D) measurement depth knowledge and
new channels of distribution and acquisition information understanding issue. Areas of physics suggest formation
retention. Electrical intellectual libraries have millions of practical skills creative thinking, active professional
copies various publications, access to which not limited. behavior. The augmented reality application in
In addition, special digital repositories store of educational educational materials will help students dents to
materials in form, access to which is open at any time and understand the essence of the subject, to master the
from any place of the globe. Digital educational materials technologies, teach equipment, instruments and then how
allow embed elements of augmented reality. Virtual knowledge and on- tricks can be applied. With augmented
Reality is a world similar to the real one, but it artificially reality applications, students can move virtual objects,
created with help technical tools and computer programs. zoom, move, rotate and view from different angles. Such
The person perceives it through the senses such as sight, learning develops spatial thinking, increases affects the
smell, touch, and hearing. degree of assimilation of the material. Virtual equipment
can be disassembled into parts, study its arrangement
III. RESULTS property, carry out repairs. This is much more efficient
Augmented Reality is different from virtual reality than consider the drawings in the textbook, and
because augmented reality on images of real world objects contributes to the best understanding student’s real
virtual elements are superimposed. Simulation of an technological processes. Active education maybe to be
object or phenomenon is carried out here in a positive added tests and quizzes. Tests basis on augmented reality
way; it should be good natural display fundamental can design the way to student chose options response in
reality, helping us to cognize a real object in a virtual nom augmented reality or fulfilled virtual practical exercises.
form. Augmented reality applications demonstrate three- Gamification with augmented reality could also become
dimensional objects such as video, images, animations, one of the active forms of learning [9]. Every teacher
texts, and this makes it possible to directly touch events to could would use any form augmented reality for learning
interact with objects [8]. As some researchers foretell, students process design. Using augmented reality program
traditional teaching methods will invariably become can penetrate inside already inspect the premises. Vuforia
outdated. Mixed forms of education will come to replace is augmented reality platform, which uses computer vision
when part of the subjects will be studied remotely press. technologies and presents instruction and learning
For example, lectures will be transferred to remote on-line software. Vuforia Engine offers software value for
mode, and practical classes will be held in audience with developing augmented reality that can be used at
application opportunities augmented reality. With the help preparing learning material [10].
of supplemented and mixed programs virtual reality,
students can focus their mobile screens and watch
holographic 3D objects, and the teacher will explain
subject with visual effects. This technological innovation
changes the process of teaching and learning. It will
become more interesting, more exciting, and perhaps more
effective. As experience shows, classes using capabilities
of augmented reality programs no motivation to study,
stimulates creative thinking and develops skills problem
solution.
- 210 -
create augmented reality applications that work in markers before-foot time and in framework complete scale
different operating systems, including personal computers, object. Full reality and receive access to additional body
game consoles, and mobile devices [11]. digital content. Using the QR code, the student can see
with platforms for creating applications of augmented
realities, see illustrating video materials. Using augmented
reality software, undergo learning practice. Similar on
undertakings are more a product of creativity-interested
enthusiasts than a response to the demands ministries
Sciences and higher education. The analysis of the work
of domestic and foreign educational researchers showed
what usage of augmented reality certainly has positive
impact on quality education; however, its impact on
different groups of learners turns out to be different. I
made conclusion that augmented reality renders an
Figure 5. Unity3D user interface during the AR application
development. average impact on students. The greatest the impact of
augmented reality on high school students. From targeted
Technologies develop so fast that it is suggested group’s most strong influence before- full reality has on
glasses gradually replace the familiar smartphone but the schoolchildren. I was used mixed method with sampling
period will not last long to replace glasses will come from 89 students of the 9th grade (177girls, 46 boys). The
lenses with integrated technologies augmented reality and experimental group participated in reading with using AR
then when augmented reality can will embed in human applications, while in control group used traditional
organism . With the help of the listed programs and methods. I discovered what students’ experimental groups
applications can create so-called "smart" books demonstrated more high level on reading comprehension
(textbooks, educational manuals, guidelines for practical and smooth learning outcomes at weekly measurements
classes) - with texts that are involved through mobile how control group. Pupils experienced satisfaction from
device. "Smart" books are not only textbooks where texts his participation in augmented reality based reading and
come to life on a smartphone screen, but encyclopedias, expressed a desire to use vat similar applications and on
reference books, maps, translators and other publications. other subjects. Student has demonstrated short level
The markers in the book are ordinary pages and lines, anxiety at use programs augmented reality. The problem
which recognized install- lazy application for augmented posed requires further teachings. Topical are questions
reality. FROM with the help of an appropriate program impact virtual helmets, glasses for the psyche of students,
are involved text interactivity features. The user himself possible technostress at different categories learning-
can fulfill virtual laboratory work and mutually interact educators. It is also required to study the perception of
with objects that in real life not available. These textbooks teaching providers of teaching materials to schools with
might be of interest. Student, accustomed from childhood elements of virtual and augmented reality, their
to the perception of formations IT technologies, and even preparation and readiness work with them.
define trajectory his future life.
REFERENCES
IV. CONCLUSION
[1] F. Zhou, H.L. Duh, M. Billinghurst, “Trends in augmented reality
Summarizing this research, I find out that an increase tracing, interaction and display: A review of ten years in ISMAR,
in volume and speed up information flows put modern Mixed and Augmented Reality”, ISMAR 7th IEE/ACM
International Symposium, vol.7, pp. 193-202. 2008.
students in a difficult situation of its perception and [2] S. Yuen, G. Yaoyuneyong, E. Johnson, “Augmented reality: An
mastering. Abundance information makes it difficult to overview and five directions for AR in education”, Journal of
concentrate attention. Information overload and its Educational Technology Development and Exchange, vol.4, No.1,
availability reduce consistency and creativity thinking, pp. 119-140, 2011.
analytical thinking becomes not in demand in the era of [3] M. Dunleavy, C. Dede, R. Mitchell, “Affordances and limitations
of immersive participatory augmented reality simulations for
ready-made and accessible clichés. Clip feed of teaching and learning”, Journal of Science Education and
information changes civilization of textbooks onto Technology, vol.18, No.1, pp. 7 – 22, 2009.
civilization visual images. Digital technologies are [4] B. Kye, Y. Kim, “Investigation of the relationships between media
characteristics, presence, flow, and learning effects in augmented
advancing so fast that the sphere of education, as a
reality based learning”, International Journal for Education Media
conservative does not have time to react on any and Technology, vol.2, No.17, pp. 4-14. 2008.
innovations. Augmented reality technologies are being [5] H.E. Pence, “Smartphones, smart objects, and augmented reality”,
introduced faster and effectively into the education. The Reference Librarian, vol.52, No.2, pp. 136-145, 2010
[6] M. Laal, “Positive interdependence in collaborative learning”,
Although most people admits necessity of educating
Procedia Social and Behavioral Science, vol. 93, pp. 1433 - 1437,
materials for new generations of students focused on the 2013.
specifics of perception. They taking into account [7] K. Doymu, “Effects of a Cooperative learning strategy on teaching
achievements in in the field of information technology. and learning phases of matter and one-component phase
However, in reality such materials so far exist only in the diagrams”, Journal of Chemical Education, vol.84, No.11, pp.
1857-1860, 2007.
form of experimental publications, and still not ready for [8] A.A. Gokhale, “Collaborative learning enhances critical
mass implementation. I started development interactive thinking”, Journal of Technology education, vol.7, No.3, pp. 23-
textbooks with augmented reality, which are available in 31, 1986.
[9] D.D Sumadio, D. R. Rambli, “Preliminary Evaluation on User
the mobile application. In mobile application can be
Acceptance of the Augmented Reality Use for Education”, Second
through the camera of a smartphone see on pages textbook
- 211 -
International Conference on Computer Engineering and [11] Z. Baigunchekov, M. Kalimoldaev, M. Utenov, B. Arymbekov,
Applications, ICCEA 2010, IEEE, vol.5, pp. 461-465, March 2010. “Structural and dimensional synthesis of parallel manipulator with
[10] A. Dünser, R. Grasset, M. Billinghurst, “A survey of evaluation two end—effectors”, Mechanisms and Machine Science, vol.37,
techniques used in augmented reality studies”, ACM SIGGRAPH pp. 15–23, 2016
ASIA 2008 courses on - SIGGRAPH Asia, vol.37, No.1, pp. 1-27,
2008
- 212 -
Utilizing Plane Detection Technology based on
Actual Physical Environment for Classroom
Experiments
Yeji Heo+, Woojeong Shim+, and Juhee Choi*
Department of Smart Information Communication Engineering, Sangmyung University, Republic of Korea
Email: [email protected]
+Both authors contributed equally to this manuscript
I. INTRODUCTION
II. IMPLEMENTATION
Recently, rapid development of mobile and multimedia A. AR Development
ICT tools affects the field of education. Among them,
augmented reality(AR) can serve as an active learning tool by
enabling experiential-based learning[1-3]. It particularly For the development of AR functionality, we utilized the
proves to be more effective in science experiments, where Unity game engine and AR Foundation[7], which provide
direct experience and observation are key. interfaces for implementing AR features. Additionally, for
compatibility with the target platforms, Unity's provider plug-
In this study, our mobile application provides immersive ins were necessary. Specifically, the Google ARCore XR
laboratory experiences based on real-world spatial plane Plug-in was used for Android environments[8], while the
recognition. Users can participate in experiments without any Apple ARKit XR Plug-in was employed for iOS[9].
restrictions, using their own smartphones as an equal
opportunity platform. We develop content for two During the initial phase of the experiment, AR
experiments, namely the antibiotic resistance experiment and Foundation's markerless plane detection feature was used to
the anchovy dissection experiment, which are part of the enable object placement on surfaces without specific markers.
Korean high school curriculum. The scene setup involved placing AR Session and XR Origin,
provided by AR Foundation. AR Session activates AR
Regarding the antibiotic resistance experiment, we functionalities, while XR Origin converts tracked camera
overcome the time constraint of waiting for the occurrence of items into Unity's coordinate system. These functionalities
a general stress response to antibiotics. On top of that, in order were added as game objects to the scene to complete the setup,
to avoid legal and ethical concerns regarding animal allowing the placement of objects for the experiment.
experimentation, participants perform the anchovy dissection
experiment to individually conduct dissection practices, rather High-quality objects in the experiment were modeled
than in team settings. using Blender 3D computer graphics software and exported to
Unity. Collider and Rigidbody components were added to
We conducted the experiments by placing experiment objects used as experiment tools and materials to enable
objects and enabling the progression of subsequent events collision detection and gravity application. User touches and
through collision or touch detection. Through user interactions drags on the mobile screen are determined using Raycast, and
with the mobile screen, the app promotes active participation RaycastHit provides specific collision information, such as the
of students. Moreover, animation effects and interactive tag of the collided object. Such interactions allow for the
review quizzes help bridge the psychological gap between achievement of specific experimental conditions and scene
students and their academic studies[4-6]. These elements transitions to the next stage.
enhance students' immersion.
- 213 -
B. UI Configuration long as there is a minimal plane space around them,
The app consists of two scientific experiment contents and eliminating spatial constraints. Based on the survey results of
quiz contents related to those experiments. Initially, users existing AR education apps, it is determined that our app will
choose an experiment from the main screen. Using the camera, serve as an innovative learning tool that enhances the
users can identify the surrounding surfaces and position the effectiveness of learning experiences. This will generate users'
experiment table at the suitable location. By touching the interest in learning and improve the effectiveness of their
screen while aiming the camera at a flat surface, the app learning experiences.
generates the 3D model of the experiment table. IV. DISCUSSIONS
With the provided instructions and audio guidance, users We proposed a new learning tool by introducing AR
conduct the scientific experiment using the 3D models of the technology into the education system to enhance students'
experiment tools. Users can always return to the main screen interest and engagement. Through a survey case about an AR
or restart the experiment by pressing the pause button during education app, we were able to observe positive results, but
the content progression. Once users complete all the quizzes areas for improvement were also clearly identified. One area
based on the knowledge gained from the experiments, they is the need to provide instructions to users in an easily
can review the experiment results. understandable manner regarding how to use the app.
Furthermore, the limited availability of experimental content
III. RESULTS
hinders the delivery of effective learning experiences,
highlighting the necessity to develop additional experimental
content. Looking ahead, once a stable AR education app is
established, we can explore the integration of VR technology
to create even more immersive learning tools.
ACKNOWLEDGMENT
This research was supported by program for
postPRIME(Program for Industrial needs-Matched Education)
was conducted by the National Research Foundation of
Korea(NRF) funded by the Ministry of Education.
REFERENCES
[1] Gy. Molnár, The role of electronic and virtual learning support systems
in the learning process, In: Szakál Anikó (ed.) IEEE 8th International
Fig. 2. Collider for collision detection 1 Symposium on Applied Computational Intelligence and Informatics:
SACI 2013. New York: IEEE, 2013. pp. 51-54.
[2] K. Bir, G. Molnár, D. Pap, Z. Szűts, "The effects of virtual and
augmented learning environments on the learning process in secondary
school," 2017 8th IEEE International Conference on Cognitive
Infocommunications (CogInfoCom), 2017, 0371-000376
[3] M. Akçayır and G. Akçayır, ‘‘Advantages and challenges associated
with augmented reality for education: A systematic review of the
literature,’’ Educ. Res. Rev., 2017, vol. 20, pp. 1–11
[4] M. B. Ibáñez, Á. Di Serio, D. Villarán, and C. D. Kloos, ‘‘Experiment-
ing with electromagnetism using augmented reality: Impact on flow
stu-dent experience and educational ffectiveness,’’ Comput. Edu.,
2014, vol. 71, pp. 1–13
[5] B. Kye and Y. Kim, ‘‘Investigation of the relationships between media
characteristics, presence, flow, and learning effects in augmented
reality based learning,’’ Int. J. Educ. Media Technol, 2008, vol. 2, no.
1, pp. 1–11
[6] G. Molnár, D. sik, " Smart devices, smart environments, smart students
Fig. 3. Collider for collision detection 2 - A review on educational opportunities in virtual and augmented
reality learning environments," 2019 10th IEEE International
Conference of Cognitive Infocommunications(CogInfoCom), 2019,
According to the cited paper's results, the survey pp.1-4
conducted after the introduction of AR education systems into [7] S. Murrell, F. Wang, E. Aldrich, X. Xu, "MeteorologyAR: A Mobile
real-world education revealed that 60% of users agreed with AR App to Increase Student Engagement and Promote Active Learning
the statement "The AR-based education system provided in a Large Lecture Class," 2020 IEEE Conference onVirtual Reality
stimulation for learning." [4-7] and 3D User Interfaces Abstracts and Workshops(VRW), 2020, pp.
848-849
However, existing AR education systems developed as [8] AR Foundation
precedents rely on marker recognition technology, which https://docs.unity3d.com/Packages/[email protected]/m
requires specific images to be prepared in advance. In the case anual/index.html
of large lecture halls, pre-testing was necessary to ensure [9] ARCore XR Plug-in
marker recognition from various locations within the https://docs.unity3d.com/Packages/[email protected]/manual/
classroom. [10] ARKit
https://docs.unity3d.com/Packages/[email protected]/manual
To overcome these limitations, this study utilizes plane
recognition technology. Users can smoothly run the app as
- 214 -
Cost Comparison and Analysis of VR Tracker
Manufacturing with Low-cost Sensor and High
value Sensor
Beomjun Cho1+, Chanhee Jang1+, Juhee Choi1* and Joonyoung Kim2*
1
Sangmyung Univ, Republic of Korea
2
IMEC, Belgium
Email: [email protected]
+Both authors contributed equally to this manuscript
I. INTRODUCTION
This paper aims to develop cost-effective VR trackers using
low-cost IMU sensors and compare performance and cost with
expensive trackers and motion capture hardware. Virtual reality
(VR) is a technology that creates a specific artificial environment
and situation with a computer, and VR devices are required to
interact with it [1]. VR devices that need to accurately and Fig. 1. Configureration and attachment Positions of VR Tracker
quickly grasp complex movements of the body require high
technology, and many companies such as Meta, HTC, and Sony can measure rotational motion through angular velocity,
are participating in VR device research. With the development acceleration and gravitational acceleration[4]. IMU is widely
of the VR market, research and development of VR trackers are used through sensor miniaturization and mass production in
being actively conducted. A VR tracker is a device that detects a a variety of fields, including aviation drones, airplanes,
user's movement and implements it into a virtual world. These behavior analysis, motion recognition, and artistic creation.
trackers use an IMU (intensity measurement device) sensor to The acceleration sensor uses gravitational acceleration to
accurately track the position and direction of the body. However, determine the effect of gravity on each axis in the vertical
the current VR hardware ecosystem is suffering from market direction and to measure the angular tilt.
contraction due to entry barriers. In order to measure accurate The accelerometer does not return a value when there is no
body motion, high-performance sensors and technology are movement, but when movement occurs, acceleration occurs
required, which are eventually limited to high prices. Therefore, in that direction. However, it should be recognized that
in order to identify the minimum performance of sensors for the measuring an angle using only an accelerometer can result in
use of VR devices, this paper aims to manufacture trackers an immediate error.
through low-cost sensors and compare performance with
A gyroscope, on the other hand, is a sensor that measures
expensive sensors.
angular velocity and represents the rotational speed of the
sensor within a defined time frame. The integration of the
II. VR TRACKER WITH IMU SENSOR gyroscope data allows you to measure the angle.
However, gyroscopes are temperature sensitive and introduce
VR Tracker plays a key role in providing immersion and
continuous errors, and large errors occur over time. Therefore,
interactivity by accurately tracking the user's location and
we will use complementary filters to calibrate the values
direction. Key techniques used in VR trackers include sensor
received from these two types of sensors and improve their
fusion, computer vision, inertial measuring unit (IMU),
accuracy.
optical tracking and electromagnetic tracking. Sensor fusion
The IMU sensor obtains gyroscope measurements of 𝛼𝑥,
technology combines data from various sensors, including
𝛼𝑦, and 𝛼𝑧 and accelerometer measurements of 𝛽𝑥, 𝛽𝑦, and 𝛽𝑧
accelerometers, gyroscopes and magnetometers, for robust
and accurate tracking [2][3]. to track the position of the tracker.
The IMU is a multifunction device that incorporates To obtain real-time orientation values of an IMU sensor using
acceleration, geomagnetic, altimeter, and gyroscope, which quaternion representation [5], we calculate the vector
quaternion value 𝑞𝑠 = (0, 𝛼𝑥, 𝛼𝑦, 𝛼𝑧) using the rotation
quaternion 𝑞 (𝑡) at a specific time t and the accelerometer
measurements. We obtain the accelerometer measurement 𝑞𝑖
- 215 -
in the reference frame by multiplying 𝑞𝑡 , 𝑞𝑠 , and the inverse Each body consists of a microprocessor, an IMU, a charging
of 𝑞𝑡 . The default orientation of the IMU sensor is such that module required for power processing, and a battery. Figure
the x-axis aligns with the direction of gravity, which allows 3 shows a sensor prototype attached to the arm.
us to obtain the inclination angle 𝜑 and the normalized We use Arduino-based Wemos D1 mini as microprocessor
rotation axis 𝛾 in the moving coordinate system to calculate for streaming and processing IMU data, and Wi-Fi
𝑞 (𝑡+∆𝑡) [6]. Furthermore, according to Euler's rotation communication.
theorem, every coordinate transformation can be achieved The IMU sensor chose MPU-6050, a reasonable and
through a single rotation around a specific axis, known as the inexpensive module. The MPU-6050, an IMU module with
rotation axis. Thus, if we rotate coordinate system {a} by an gyroscopes and accelerometers, is a sensor module with three
angle 𝛽 around the rotation axis, we can transform it into types: a three-axis acceleration sensor, a three-axis gyroscope
coordinate system {b}. In this case, the quaternion sensor and a temperature sensor. By combining a three-axis
representation of the rotation from {a} to {b} can be acceleration sensor with a three-axis gyroscope sensor, the
expressed as following: MPU-6050 achieves six degrees of freedom (6DoF).
Operates at 5 V, the gravitational acceleration can be
𝛽 measured up to ±2g, and the rotational angular velocity can
𝑐𝑜𝑠( ) be measured up to ±250°/sec. The test environment was
2
𝑞0 𝛽 configured using HTC vive HMD and controller, and the
𝑞1 𝑝1 𝑠𝑖𝑛( ) model we made can be connected to unity independently
𝑞𝑏𝑎 = [𝑞 ] = 2
2 𝛽 without using other vr devices. The price to produce one of
𝑞3 𝑝2 𝑠𝑖𝑛( ) our trackers after confirming normal operation can be found
2 in the following table.
𝛽
[𝑝3 𝑠𝑖𝑛( 2 )] Table Ⅰ. Cost Analysis of Components comprising a Single
Tracker
Using the above expression, the quaternion can be expressed
as:
∆𝑡𝑙 𝛼 ∆𝑡𝑙 𝛼 ∆𝑡𝑙 𝛼 ∆𝑡𝑙
𝑞∆ = (cos ( ) , 𝑥 sin ( ) , 𝑦 sin ( ) , 𝑧 sin ( ))
2 𝑙 2 𝑙 2 𝑙 2
(𝑡 + ∆𝑡)
𝑞𝑐 = 𝑞((1 − 𝛿)𝜑, 𝛾)𝑞 (𝑡) 𝑞∆
We manufactured a tracker body with four tracker bodies and The comparators are Mti-630 from Xsens and Vive Tracker
three additional IMU sensors to make a tracker worn on a from HTC, which are used for motion capture. The cost of
total of 10 parts. In order to express the minimum body in the graph does not include the price of software and
virtual reality, a single tracker body is applied to both elbows additional accessories at the price of only one terminal.
and thighs, and a tracker Our model showed a huge reduction compared to the Mti-
body with an additional IMU sensor is applied to the waist 630 and confirmed a reduction rate of about 75% compared
and pelvis, ankles and feet with relatively close connections. to the Vive Tracker. This rate of decline is meaningful
- 216 -
because we aimed to lower the hardware entry barrier in the [2] Kreylos, Oliver. "Environment-independent VR development."
Advances in Visual Computing: 4th International Symposium, ISVC
VR game market. 2008, Las Vegas, NV, USA, December 1-3, 2008. Proceedings, Part I
4. Springer Berlin Heidelberg, 2008.
ACKNOWLEDGMENT
[3] H. Zhou and H. Hu, “Human motion tracking for rehabilitation–
This research was supported by program for post- survey,” Biomedical Signal Processing and Control, vol. 3, no. 1, pp.
PRIME(Program for Industrial needs-Matched Education) 1– 18, 2008.
was conducted by the National Research Foundation of [4] Ahmad, Norhafizan, et al. "Reviews on various inertial
Korea(NRF) funded by the Ministry of Education. measurement unit (IMU) sensor applications." International Journal of
Signal Processing Systems 1.2 (2013): 256-262.
REFERENCES [5] Mukundan, Ramakrishnan. "Quaternions: From classical
mechanics to computer graphics, and beyond." Proceedings of the 7th
[1] Mohammadreza Akbari, Nghiep Ha and Seng Kok, “A Asian Technology conference in Mathematics. 2002.
systematic review of AR/VR in operations and supply chain
[6] Sandra Griffin, “Quaternions: Theory and Applications”, Nova
management: maturity, current trends and future directions”, Journal of
Science Publishers, pp. 158 – 166, 2017.
Global Operations and Strategic Sourcing, vol.15, no.3, pp. 534 - 565,
2021 [7] Andrew J. Hanson, “Visualizing Quaternions”, Elsevier Science,
pp. 51 - 54, 2006.
- 217 -
Detection and Classification of the Volatile Organic
Compounds from the Petroleum and Petroleum-
Derived Products Using an Electronic Nose and
Machine Learning Algorithms
Olzhas Alseitov1, Aliya Issainova1, Dina Satybaldina1* and Assem Konyrkhanova1
1
L.N. Gumilyov Eurasian National University, Kazakhstan
Email: [email protected]
Abstract—A method for rapid and selective detection and accidental or intentional operational discharges further
classification of the petroleum and petroleum-derived products aggravates the ecological situation and required attention to
using an electronic nose in combination with machine learning the environment problems [8-10].
algorithms is proposed. The electronic nose system consists of a
multisensory array, an analog-digital processing block, a Precise and rapid detection of petroleum or petroleum
classification block with digital pattern-recognition algorithms product spills are beneficial to identify the source and type
software and reference odor databases. We test odors PDP, accurate estimation of oil spread areas, evaluate the level
corresponding to organic vapors emitted by petroleum and of hazard and to develop a response and recovery treatment a
petroleum-derived products (including gasoline, diesel, motor to reduce environmental effects.
oil and used motor oil) under various conditions such as sample
Remote Sensing (RS) from an aircraft (including
gas concentrations, air temperature and humidity, sensor signal
recovery time. The electronic nose demonstrated fast and high unmanned aerial vehicles, aerostats) or from satellites have
correlation of the vector signal with emitted volatile compounds proven in oil spills detection and monitoring [11]. Optical and
with an accuracy of more than 98% and 90.5% in pattern microwave sensors, machine learning (ML) and deep learning
recognition by machine learning algorithms and a deep neural (DL) models have used for image classification and oil spill
network, respectively. trajectory prediction [12, 13]. The accuracy of both sensors is
affected by the presence of biogenic elements, leading to false
Keywords—artificial olfaction, electronic nose, machine positive depiction of petroleum and PDP spills [13]. There is
learning, deep learning, classification of odors, petroleum. no best methodology for detecting and monitoring oil spills
using remote sensing. Therefore, it is necessary to develop
I. INTRODUCTION new approaches for rapid and accurate classification of
petroleum pollution using alternative sensor technologies that
can replace or supplement computer vision based RS technics.
Republic of Kazakhstan is an oil and gas producing
country located in Central Asia and partially in Eastern Crude oil contains some of the hydrocarbons (HCs), which
Europe. Nearly 300 oil fields and over 60 gas condensate have low boiling points and classified as Volatile Organic
fields have been discovered on the Kazakhstan Republic Compounds (VOCs) with well-known detrimental influences
territory [1]. According to the 2021 BP Statistical Review of on human health and the air ecosystem [14]. According to the
World Energy [2], Kazakhstan has 30 billion barrels of proved results of the inventory of atmospheric emissions published in
oil reserves (12th rank in the world in terms of available oil 2010, approximately 258 tons of HCs could evaporate per day
reserves) and 2.3 trillion cubic meters of proved gas reserves from the Deepwater Horizon oil spill in the Gulf of Mexico,
(the 16th greatest gas reserves volume in the world). which indicates the scale of an environmental disaster [15].
An extraction of natural resources plays an important role Such a context has incited the research communities to
in the development of the country’s economy. Over the past work on the development of alternative technologies such as
30 years, Kazakhstan has increased oil production by 3.5 artificial olfaction, which mimics the mammalian olfactory
times, and in terms of production it ranks 13th in the world (86 system and can identify different complex odors comparing
million tons in 2021) [3]. Today revenues from crude oil and the incoming odor with patterns previously learnt [16]. An
gas exports form a significant part of the country's gross electronic nose (e-nose) as a representative example of an
domestic product [4, 5]. artificial olfactory system uses an array of gas sensors
composed with differing relative sensitivities, and the
At the same time, developing hydrocarbon deposits is collective response these sensors corresponds to the odor
accompanied by a strong anthropogenic impact on the pattern, like a fingerprint, allowing the identification and
environment. The drilling and construction works, laying of classification of analytes [16]. Some of the industrial
pipelines and roads causes a change in the chemical and application of e-noses include clinical diagnosis [17, 18],
physicochemical properties of the soil, disrupts the food quality determination [19], environmental monitoring
hydrological regime of territories, leads to changes of [20, 21].
phytocenoses and animal populations [6, 7]. Crude oil, fuel or
other petroleum-derived products (PDPs) spills due to In this work we investigated whether e-nose is able to
This research is funded by the Science Committee of the Ministry of
discriminate between crude oil (petroleum) and petroleum-
Science and Higher Education of the Republic of Kazakhstan (Grant No. derived products (PDPs) on the basis of the VOC patterns. Our
AP14872171). results are preliminary to future research of assessing oil soil
- 218 -
pollution in Republic of Kazakhstan. Crude oil from three from different oil fractions with non-equal amounts of volatile
Kazakhstan oil fields and four PDPs from local producers organic compounds were chosen as samples (see Table 1).
(including motor gasoline, diesel fuel, motor oil and used
motor oil) were chosen as experimental samples and analyzed For future studies of oil pollution of soils, petroleum
by the E-nose established in Our Laboratory. The volatile products were selected, spills of which actually occur both
fingerprints of the petroleum and PDPs registered by the e- during extraction, transportation, and when they are used for
nose were interpreted using principal component analysis mechanized land cultivation in agriculture. Two types of
(PCA), ML and DL models. We demonstrated high sensitivity motor oil were employed: a new synthetic motor oil
of sensors and selective discrimination of petroleum sample’s commercialized by «High Industrial Lubricants & Liquids
VOC patterns at room temperature. The accuracy of the (HILL) Corporation» (HILL Universal SAE 5W-30) and a
classification results was above 98% and 90% for the ML used motor oils (UMO) of same brend collected in a local
algorithms and convolutional neural network (CNN), garage. UMOs are considered as an environmental pollution
respectively. Comparison of sensory responses for motor oil source containing significant concentrations of toxic
and used motor oil indicates a significant increase in the VOCs compounds (polycyclic aromatic compounds and heavy
concentration from used motor oil. The smell fingerprint of metals) [23, 24].
used motor oil is close to that of gasoline and diesel, indicating TABLE I. LIST OF SAMPLES
that used engine oil is also a very hazardous contaminant.
Thus, the suggested approach opens a new avenue for precise Petroleum or Oil field\ Sample’s physico-chemical
and rapid detection of crude oil brend or PDP type for remote PDP sample's Producing characteristics
type company or
oil spill sensing systems and to reduce environmental effects. brand of sample
The rest of this article is structured as follows. Section 2 Crude Oil Alibekmola\ Light (0.835 g/cm3) , sour
Kazakhoil Aktobe (about 2%) oil
presents research methods (materials, of multisensory e-nose LLP
system a description, datasets, research tools, and research Crude Oil Alibek Yuzhny \ Light (0.842 g/cm3), sour (up
process). The experiment results on measuring sensory Joint Stock to 1.33%) oil
responses to the presence of petroleum and PDPs, processing Company "Caspiy
sensory data, features extracting and performance evaluating Neft TME"
of the machine learning algorithms and the convolutional Crude Oil Kardasyn North \ Heavy (0.945 g/cm3), sweet
Sagiz Petroleum (sour 0.2%) oil
neural network are discussed in Section 3. Conclusion and Company LLP
future research are presented in Section 4. Motor Atyrau Oil Сombustible mixture of light
Gasoline Refinery LLP \ A- hydrocarbons with a boiling
II. MATERIALS AND METHODS 92-K5 with 92 point of +33 to +205 ° C
octane number (depending on impurities).
A. Samples Density is about 0.71 ... 0.76
Crude oil (synonymous with crude petroleum, oil) is a /cm³. Gasoline consists of a
homogeneous mixture of
natural mixture of hydrocarbons that exists as a liquid in small, relatively lightweight
underground geologic formations and also include hydrocarbons with between 4
compounds of sulfur, nitrogen, oxygen, metals and trace and 12 carbon atoms per
elements (vanadium, nickel, iron, and copper) at the part per molecule
million concentrations [22]. Petroleum products are obtained Diesel Fuel Atyrau Refinery Special low-temperature
from the processing of crude oil, natural gas, and other LLP \ DT-A-K5 diesel contains additives to
hydrocarbon compounds. List of PDPs include liquefied Altay-45 keep it liquid at lower
temperatures. Petroleum
petroleum gases (LPG), aviation gasoline, motor gasoline, diesel is produced from the
kerosene, fuel oil, diesel fuel, lubricants, waxes, petroleum fractional distillation of crude
coke, asphalt, and miscellaneous products [22]. oil between 200 and 350 °C
at atmospheric pressure,
VOCs are organic (containing carbon) chemicals that can resulting in a mixture of
easily evaporate into the air and its are a source of odors. carbon chains that typically
Petroleum and petroleum products may have the potential to contain between 9 and 25
carbon atoms per moleculeю
release VOCs. Main goal of our research is a development of
an artificial-nose system for differentiation complex odors Motor Oil High Industrial MО are made from a heavy
from oil and petroleum-derived products samples. Smell Lubricants & and thick hydrocarbon
Liquids (HILL) fraction of crude oil, with
derived from VOCs may be composed of a few compounds Corporation \ additives to improve certain
which only one may be the dominant component. But all «HILL Universal», properties. The bulk of a
compounds contribute to the unique characteristics of the SAE 5W-30 typical engine oil consists of
sample’s collective odor, the VOC pattern. hydrocarbons containing
from 18 to 34 carbon atoms
The main goal of our research is to recognition of complex per molecule.
smell from oil and PDPs for oil pollutions monitoring. Odor Used Motor High Industrial Petroleum oil that has been
from organic sources may consist of the several chemical Oil Lubricants & used, and as a result of such
compounds of which only one or two may be the dominant Liquids (HILL) use is contaminated by
Corporation \ Used physical or chemical
components. But the rest of the chemical compounds also properties.
«HILL Universal»,
contribute to the unique odor of the organic source. The effect SAE 5W-30
of even slight changes in the relative amount of chemicals in
the odor mixture can be detected by the electronic nose [20].
Therefore, crude oil from several fields and PDPs produced
- 219 -
B. E-Nose The MOS sensors use a two-electrode system in which the
The electronic nose was created using an array of 8 metal sensitive layer of tin dioxide (SnO2) has a variable resistance
oxide semiconductor (MOS) sensors (see Table 2) and depending on the concentration and type of gases or gas
Arduino Nano module. mixtures being studied. The interaction of the target gas with
the sensitive layer occurs through a reversible redox reaction,
TABLE II. ELECTRONIC FEATURES AND SCOPES OF USED SENSORS as a result of which the electrical properties of the SnO2 layer
change. These electrical properties are translated into
Equipment Detecting scope measurable parameters such as sensor resistances or voltage
Type Electronic Features
Name [25]
Detection range: 200– across a load resistor in a sensor circuit. MOS sensors, SHT75
It is suitable for temperature and humidity sensor were grouped on a separate
10000 ppm; heating
detecting H2,
Smoke gas
consumption: less than
LPG, CH4, CO,
board and connected via an analog switch to an analog-to-
MQ-2 800mw; operating digital converter (ADC) on the Arduino module. The ADC has
sensor Alcohol, Smoke,
voltage: 5V±0.1V; 16-bit resolution and converts input voltages from 0 to 5 volts
i-butane,
operating temperature: -
20–70 ◦C
Propane. into integers from 0 to 65535 (216-1).
Detection range: The sensor array and Arduino Nano module were installed
0.05mg/L—10mg/L
Alcohol; heating High sensitivity
in a single metal housing to enable constant airflow supported
Alcohol gas consumption: less than to alcohol and by a ventilation fan. The e-nose was powered by means of a
MQ-3 USB interface connected to a PC, also used for data
sensor 750mw; operating small sensitivity
voltage: 5V±0.1V; to gasoline. acquisition.
operating temperature: -
10–50 ◦C C. Data sets
Detection range: 300–
10000 ppm; heating
The data sets were collected during a series of experiments
Methane High sensitity to with crude oil from three Kazakhstan oil fields and four PDPs
consumption: less than
(CH4) Gas Methane, also to from local producers, which were analyzed using a homemade
MQ-4 900mw; operating
Sensor Propane and
voltage: 5V±0.1V; e-nose device. The liquid samples of oil and petroleum
Butane
operating temperature: - products (a volume of 100 µl) were introduced into a glass viol
10–50◦C
connected to the e-nose measuring chamber. Each experiment
Suitable for
Detection range: 200– detecting of was replicated three times. The signal outputs from sensor
10000 ppm; heating LPG, natural gas, array, UADC, were measured at 1 Hz sampling rate over 1 20
Liquefied
Petroleum
consumption: less than town gas, avoid min of total experiment time for each sample (see Table 1),
MQ-5 800mw; operating the noise of which include exposure of the e-nose for 30 min to the air,
Gas (LPG)
voltage: 5V±0.1V; alcohol and then to air passed through the petroleum or PDP sample 60
sensor
operating temperature: - cooking fumes
210–50◦C and cigarette
min and then switched the flow to the air for 30 min.
smoke Experimental data were record in separate files (txt format).
Detection range: 20– They are used in Each file consists of above 7000 row with 10 attributes,
2000 ppm; heating gas detecting namely year-month-day data and time (hour-minute-second),
Carbon consumption: less than equipment for responses from 8 sensors, temperature (degree Celsius),
monoxide MQ-7 350 mw; operating carbon
humidity (%). The dataset contains no missing data nor any
(CO) voltage: 5V±0.1V; monoxide (CO)
operating temperature: - in family and significant outliers.
20–50◦C industry or car.
The total number of records was above 140, 000. We
Detection range: 100– High sensitivity
10000 ppm; heating to Hydrogen divided the dataset into two parts for this study: the training
Hydrogen consumption: less than (H2). Small set (80%), and the test set (20%). The training set was divided
(H2) gas MQ-8 800mw; operating sensitivity to on two part again - 70% used to train the model and rest for
Sensor voltage: 5V±0.1V; alcohol, the model validation.
operating temperature: - LPG,cooking
10–50◦C fumes D. Data analysis
Detection range: 20ppm-
2000ppm carbon To analyze and classify the multivariate data (n = 8) of
Used in gas sensor responses to VOCs from the crude petroleum and
Gas Sensor monoxide, 500ppm- detecting
for Carbon 10000ppm CH4, equipment for
PDPs, we applied pattern recognition approaches, such as
Monoxide 500ppm-10000ppm principal component analysis (PCA), machine learning
carbon
(CO), MQ-9 LPG; heating monoxide and algorithms and convolutional neural networks.
Methane consumption: less than
CH4 , LPG in
CH4 and 340 mw; operating PCA is a statistics method to reduce the dimensionality of
family and
LPG voltage: 5V±0.1V; data [26]. The approach allows one to discard less significant
industry or car.
operating temperature: -
20–50◦C
features in sensor responses by directing the axes of the
Used in air principal components along the maximum scatter of the data
quality control variance. Thus, it helps to display the space of high metrics in
Detection range: 10ppm-
300ppm NH3; heating
equipments for the Cartesian coordinate system [13].
buildings/offices
Gas Sensor consumption: less than In this study, we trained and tested Machine Learning
MQ- , are suitable for
for NH3, 800mw; operating
CO2, NO2
135
voltage: 5V±0.1V;
detecting of classifiers (Decision Trees, Logistic Regression, Random
NH3,NOx, Tree Forest, k-nearest neighbor classifiers, KNN) using code
operating temperature: -
alcohol,
10–45◦C
smoke,CO2, etc.
written in Python 3.9.15, and Scikit-learn open source
machine learning package [27].
- 220 -
Along with this, a deep learning model with convolutional matrix, with the x‐axis representing 83.46% and the y‐axis
neural network architecture was designed and tested to find 14.73% of the whole covariance. This method only lost 1.81%
the most accurate models based on performance metrics (the of the information, which is a very good level. This is a certain
confusion matrix, accuracy, precision and f-score) [13]. degree of simplification; however, it enables differentiated the
volatile fingerprints of all of the samples at various time points
III. RESULTS AND DISCUSSION during the experiment.
A. E-nose results Since the PCA analysis differentiated the sample volatile
For interactive calculations and experimental data fingerprints at various time points during the experiment, we
processing, a Python application has been developed (in ipynb checked whether these differences were significant enough to
format) containing source codes, input data, and calculation allow the ML and DL models to distinguish between the
results in numerical and graphical representation. petroleum from different oil fields, as well as the type of
petroleum products (see Table 3).
Figures 1-2 show examples of visualization of
experimental results in the form of time-dependent electrical
characteristics of sensors. The figures show that the sensors of
the gas analysis system react differently to experimental
samples of crude oil and petroleum products, which allows
them to differentiate.
An analysis of the experimental data indicates the presence
of the correlation between the physicochemical properties of
crude oils (see Table 1) and the characteristics of sensory
responses to crude oil samples (see Fig.1). The volatile
fingerprints of the petroleum-derived products registered by
the e-nose are demonstrate the correlation between the it's
physicochemical properties and amplitudes and the forms
sensor responses.
Motor gasoline, being a mixture of light hydrocarbons, (a)
corresponds to the lightest fraction of oil, has both the richest
odor and the fastest evaporating. This is confirmed by the high
amplitude sensory responses of the electronic nose to the
presence of VOCs from motor gasoline and the rapid drop in
sensory response due to the high evaporation rate (see Fig.2a).
Diesel fuel corresponds to the average fraction of oil, has
less VOCs compared to gasoline, and the sensory responses of
the electronic nose in the case of diesel fuel are less intense
(see Fig.2b), it’s shapes indicates the average rate of
evaporation and weathering.
At a petroleum refinery, fractional distillation separates a
motor oil fraction from other crude oil fractions, removing the
more volatile components, and therefore the oil's density and
viscosity the density of the oil product increases, and its smell
decreases. And experimental electrical characteristics of MOS
sensors for motor oil have a low intensity and a gentle shape (b)
(see Fig.2c).
Remarkable results have been obtained with used engine
oil. Smell pattern of the oil samples indicate the presence of a
significant amount of VOCs in the used oil (see Fig.2d). The
closeness of the used oil sensor data to the gasoline and diesel
fuel VOCs fingerprints of indicates the possibility of:
- malfunctions in the engine that lead to the ingress of
gasoline or diesel fuel into the motor oil;
- or an increase in toxic components in oil during using.
B. Classification of the petroleum and PDS’s patterns by
using machine-learning analyses and deep learning
model
(c)
Results of the PCA analysis pertaining to the volatile
fingerprints of the crude oils from Alibelmola oil field under Fig. 1. The time-dependent electrical characteristics of MOS sensors of e-
examination are presented in Figure 3. Using PCA, we nose for crude oil from three Kazakhstan oil fields: (a) Alibekmola; (b)
reduced the eight‐dimensional data space (the multisensor Alibek Yuzhny; (c) Kardasyn North.
array of e-nose) to a two ‐ dimensional data covariance
- 221 -
(a) (b)
(c) (d)
Fig. 2. time-dependent electrical characteristics of MOS sensors of e-nose for petroleum products: (a) Motor galazoline; (b) Diesel fuel; (c) Motor oil; (d)
Used motor oil.
TABLE III. PERFORMANSE RESULTS OF PATTERN RECOGNITION MODELS TO CLASSIFY CRUDE OILS AND PDPS SAMPLES ON EACH STAGES
Petroleum or PDP Performance metrics
sample's type Logistic Regression Random Forest KNN Decision Trees CNN
Crude Oil Accuracy: 96,3% Accuracy: 98.32 % Accuracy: 97.76 % Accuracy: 98.32 % Accuracy: 87.8 %
Alibekmola F1 SCORE: 96.27 % F1 SCORE: 98.29 % F1 SCORE: 97.72 % F1 SCORE: 98.29 % F1 SCORE: 87.57 %
PRECISION: 96.15 % PRECISION: 98.53 % PRECISION: 98.06 % PRECISION: 98.53 % PRECISION: 87.9 %
RECALL: 96.43 % RECALL: 98.11 % RECALL: 97.49 % RECALL: 98.11 % RECALL: 87.37 %
Crude Oil Alibek Accuracy: 99.83 % Accuracy: 100.0 % Accuracy: 100.0 % Accuracy: 100.0 % Accuracy: 99.62 %
Yuzhny F1 SCORE: 99.82 % F1 SCORE: 100.0 % F1 SCORE: 100.0 % F1 SCORE: 100.0 % F1 SCORE: 99.62 %
PRECISION: 99.81 % PRECISION: 100.0 % PRECISION: 100.0 % PRECISION: 100.0 % PRECISION: 99.57 %
RECALL: 99.84 % RECALL: 100.0 % RECALL: 100.0 % RECALL: 100.0 % RECALL: 99.67 %
Crude Oil Kardasyn Accuracy: 82.64 % Accuracy: 87.8 % Accuracy: 85.69 % Accuracy: 87.8 % Accuracy: 65.48 %
North F1 SCORE: 82.55 % F1 SCORE: 87.57 % F1 SCORE: 85.47 % F1 SCORE: 87.57 % F1 SCORE: 65.48 %
PRECISION: 82.49 % PRECISION: 87.9 % PRECISION: 85.64 % PRECISION: 87.9 % PRECISION: 68.5 %
RECALL: 82.83 % RECALL: 87.37 % RECALL: 85.35 % RECALL: 87.37 % RECALL: 68.48 %
Motor Gasoline Accuracy: 99.39 % Accuracy: 100.0 % Accuracy: 100.0 % Accuracy: 100.0 % Accuracy: 99.66 %
F1 SCORE: 99.37 % F1 SCORE: 100.0 % F1 SCORE: 100.0 % F1 SCORE: 100.0 % F1 SCORE: 99.65 %
PRECISION: 99.28 % PRECISION: 100.0 % PRECISION: 100.0 % PRECISION: 100.0 % PRECISION: 99.71 %
RECALL: 99.47 % RECALL: 100.0 % RECALL: 100.0 % RECALL: 100.0 % RECALL: 99.6 %
Diesel Fuel Accuracy: 100.0 % Accuracy: 100.0 % Accuracy: 100.0 % Accuracy: 100.0 % Accuracy: 99.41 %
F1 SCORE: 100.0 % F1 SCORE: 100.0 % F1 SCORE: 100.0 % F1 SCORE: 100.0 % F1 SCORE: 99.41 %
PRECISION: 100.0 % PRECISION: 100.0 % PRECISION: 100.0 % PRECISION: 100.0 % PRECISION: 99.45 %
RECALL: 100.0 % RECALL: 100.0 % RECALL: 100.0 % RECALL: 100.0 % RECALL: 99.38 %
Motor Oil Accuracy: 96.62 % Accuracy: 96.14 % Accuracy: 95.66 % Accuracy: 96.22 % Accuracy: 95.59 %
F1 SCORE: 96.59 % F1 SCORE: 96.09 % F1 SCORE: 95.6 % F1 SCORE: 96.18 % F1 SCORE: 95.53 %
PRECISION: 96.9 % PRECISION: 96.64 % PRECISION: 96.25 % PRECISION: 96.71 % PRECISION: 96.2 %
RECALL: 96.41 % RECALL: 95.84 % RECALL: 95.31 % RECALL: 95.93 % RECALL: 95.25 %
Used Motor Oil Accuracy: 71.11 % Accuracy: 72.96 % Accuracy: 72.45 % Accuracy: 72.96 % Accuracy: 70.28 %
F1 SCORE: 70.48 % F1 SCORE: 72.58 % F1 SCORE: 72.1 % F1 SCORE: 72.58 % F1 SCORE: 70.2 %
PRECISION: 73.19 % PRECISION: 76.54 % PRECISION: 76.31 % PRECISION: 76.54 % PRECISION: 72.95 %
RECALL: 77.05 % RECALL: 80.52 % RECALL: 80.15 % RECALL: 80.52 % RECALL: 74.03 %
- 222 -
[7] T. Alimbaev, K. Yermagambetova, S. Kabyltayeva, A. Issayev, Z
- 223 -
LoRaWAN Optimization for monitoring of
randomly fluctuated parameters
Kim D.K. 1 *, Turlikov A.M. 2, Markovskaya N.V2.
1
Narxoz University, Kazakhstan
2
HSE University, Russia
Email: [email protected], [email protected], [email protected]
Abstract— We consider a communication network as low- Most of the works investigating LoRaWAN optimization
cost monitoring systems (LoRaWAN devices), where the device do not take into account the specifics of the transmitted data
itself initiates transmission. The network consists of (see [2] and references in [3]), with the exception of a few
nodes, each of which sends messages to the base station with of them [4].
information about the current value of some randomly
Then the work is organized as follows: Section II
fluctuated parameters. The messages from each node are sent
at random time intervals and independently of each other. If formulates a message transmission model, which assumes
the airtimes of messages from two or more nodes overlap, a different message sending parameters for various nodes, and
collision occurs and none of the messages reaches the operator. main result. The solution to the optimization problem is
It is necessary to monitor the behavior of the parameters over found in Section III for particular case with a Wiener
time to avoid their extreme values. We study the problem of process.
choosing parameters of message transmission to uniformly
minimize the risk functional of such tramsmission. The work II. SYSTEM MODEL AND MAIN RESULTS
precisely formulates the optimization problem and proposes an
algorithm for its solution in particular cases. In this section we will assume that all nodes use the
same spreading factor (SF) with airtime of one message
Keywords— LoRaWAN, random multiple access, ALOHA, and the same frequency [3]. If during the time
monitoring, probabilistic approach, optimization problem. interval ( ) from the moment one node sends a
I. INTRODUCTION message, the other nodes do not send messages, then the
message is successfully delivered to the operator. Otherwise
Long Range Wide-Area Networks (LoRaWAN) a collision occurs and the messages are lost.
technologies might be used to monitor the results of This assumption is fulfilled in practice when all nodes
measurements at objects located over a large area and are approximately the same distance from the base station.
enable low-cost data transmission and collection systems. We have nodes, each of them sends messages with
We consider LoRaWAN devices of Class A [1] that initiate intesities . It means that intervals
transmission itself and send packets as they have been between messages of node have exponential distribution
generated at random intervals. If during the sending of a with parameter We suppose that they are
message from one node an another node transmits its independent for each node.
message, a collision occurs and both messages are lost Assume that devices in each node measure readings of
(ALOHA type of protocol). some parameter (e.g. voltage) with stochastic dynamics in
We assume that information from different nodes have time, i.e. each node at random times measures values of
various “importance”. Our goal is to use different message random parameter. We assume that the parameter might be
sending intensities depending on the importance of the node describes as random process ( ) where
to optimize some functional that characterizes the – time.
communication system. For example, to monitor voltage Based on these assumptions and by performing a series
fluctuations in the low-voltage electrical grid, the voltage in of arguments [5] we consider a simplified model for the
the nodes near the transformer changes “more slowly” than total stream of successfully delivered messages
in the remote nodes. In order to assess the state of the LV
grid by monitoring the voltage at the nodes, information
from the nodes remote (according to the grid topology) from
the transformer must be received more frequently than from and use the properties of the Poisson process. According to
other nodes. We can take this into account by varying the this model the stream of successfully delivered messages
intensity of sending messages from different nodes: if the from th node might be defined as Poisson with intensity
voltage in a node behaves more predictably, the intensity of where and total intensity of all successfully
sending messages may be low, and vice versa – nodes with delivered messages is equal to
large voltage fluctuations send their messages with a higher
intensity.
- 224 -
Put as exponentially distributed random variable with and
intensity . As a functional that characterizes the
uncertainty of the information from node let us take the
variation ( ( )) ∑
- 225 -
August 22(TUE) - 25(FRI), 2023
Oral Session 11
Room : A428
Chair: Gani Balbaev (Academy of Logistcs and Transport, Kazakhstan)
- 226 -
Enhancing Public Bus Line Classification
and User Route Estimation through Deep
Learning: A Comprehensive Analysis and
Predictive Modeling Approach
Tsetsentsengel Munkhbayar1, Zolzaya Dashdorj1*, Tae-Koo Kang2, Tae-Koo Kang2,
Kyoung-Geun2 Cho, Taekgwon Nam2, and Erdenebaatar Altangerel1
1
Mongolian University of Science and Technology, Ulaanbaatar, Mongolia
2
Sangmyung university, Seoul, Republic of Korea
*[email protected]
Abstract — Bus line classification is a crucial task in transportation speed to 10km/h on weekdays, which is
optimizing public transportation systems. Traditional almost close to the walking speed. Therefore, 51% of the
classification methods may not effectively capture temporal modal share is public transport in the capital city,
dependencies and sequential patterns in bus line data. In Ulaanbaatar, see Figure 1, 2.
this study, we propose the use of Long Short-Term
Memory Networks (LSTM) for bus line classification. We
collected a dataset consisting of various attributes, such as
route length, and number of stops for a set of bus lines. In
this study, we conduct bus line classification by LSTM as
well as the optimal user’s route is estimated. The findings
of this study highlight the potential of LSTM for bus line
classification, providing transportation authorities and
planners with a powerful tool to enhance route planning,
resource allocation, and service improvements, leading to
improved commuter satisfaction and optimized urban
mobility.
I. INTRODUCTION
Public transportation plays a vital role in modern
urban living, providing a convenient and sustainable
means of commuting for millions of people worldwide.
As cities expand and transportation networks become Figure 2. Ridership in Ulaanbaatar
more complex, optimizing the efficiency and user
experience of public transportation systems becomes Public transportation route classification involves
increasingly important. One crucial aspect of achieving grouping routes based on various factors such as
this optimization is the classification of public distance, frequency, purpose, service level, and
transportation routes. By categorizing routes based on geographic coverage. By assigning distinct categories to
specific characteristics, authorities and commuters alike routes, transportation authorities can efficiently manage
can benefit from improved planning, streamlined and allocate resources, optimize scheduling, and tailor
operations, and enhanced passenger satisfaction. services to meet the diverse needs of commuters. This
Passengers are not familiar with public transport routes, research aims at analyzing the diversity of bus lines by
or do not know the best way to reach their destination bus line classification based on the CNN model.
faster. At this point, it is difficult to know which buses to Therefore, we conduct the user's route estimation using
take and how to transit. For instance, in Ulaanbaatar, the Dijkstra algorithms based on the public transportation
capital city of Mongolia, there were several vehicles 3 network.
times in the last 10 years that reduced public
- 227 -
II. RELATED WORKS payment system (Umoney AFC system) in Ulaanbaatar's
The state of the art in bus line classification public transportation service has been implemented in
involves the application of advanced machine learning Mongolia since 2015.
techniques and data-driven approaches to improve the
accuracy and effectiveness of classification models.
Related works in the field of bus line classification have
explored various approaches and techniques to improve
the accuracy and efficiency of classification models. Liu
et al. [1] proposed a clustering ensemble approach to bus
line classification by combining multiple clustering
algorithms. The ensemble method enhanced the
accuracy and stability of classification results, enabling
more effective bus line categorization. Tang et al. [2]
investigated the use of Support Vector Machines (SVM)
Figure 3. Bus transportation network in Ulaanbaatar city
for bus line classification. It explored different kernel
functions and parameter settings to optimize the
SVM-based classification model, achieving promising
results in classifying bus lines. Feng et al. [3] proposed a
bus route classification method based on K-means
clustering and hierarchical clustering. By analyzing the
spatial characteristics of bus routes, the approach
effectively grouped similar routes, aiding in route
planning and optimization. Guo et al. [4] introduced a
hybrid approach that combined decision tree algorithms
with a genetic algorithm for bus line classification. The
genetic algorithm optimized the decision tree structure
and attribute selection, leading to improved accuracy in
classifying bus lines. Zhao et al. [5] investigated the use
of Deep Neural Networks (DNN) for bus line Figure 4. Bus transportation network in Erdenet city
classification. By utilizing deep learning architectures,
Within the project, a total of 1300 buses were installed
such as multi-layer perceptrons, convolutional neural
with GPS devices, Umoney card readers, and CCTV.
networks, and recurrent neural networks, the study
The data types include the followings:
achieved higher accuracy in classifying bus lines
compared to traditional machine learning methods. Chen ● Bus routes information - Parking routes, their
et al. [6] proposed an ensemble learning framework for order, and the distance between the parking lot
bus line classification, combining multiple classification (length, length of road, number of parking
algorithms, including decision trees, SVM, and neural places)
networks. The ensemble approach enhanced the
accuracy and robustness of the classification model, ● Parking information - The ID, name, and
providing more reliable results. By leveraging these location of each parking lot, parking lot,
approaches, researchers aim to improve the accuracy, latitude and longitude (geographic location)
interpretability, and efficiency of bus line classification
Erdenet city: We collected 6 bus line data of 36 public
models, contributing to better planning, management,
buses and 146 bus stops with the lat/lon which run in
and optimization of public transportation systems.
Erdenet, Mongolia by 2 operator companies. The GPS
III. DATA PROCESSING trajectories are also extracted for each bus every 15 secs.
Ulaanbaatar city: We collected 91 route information of The bus lines are visualized in a transport network graph
1300 public buses and 931 bus stops with the lat/lon in Figure 4.
which run in the capital city of Ulaanbaatar Mongolia, IV. METHODOLOGY
by 21 operator companies. The routes are visualized in a
We propose bus line classification by machine
transport network graph in Figure 3. Those types of data
learning and user route estimation by Dijkstra’s
were downloaded from Umoney AFC system survey
algorithm.
report, which is updated daily. A project, the Electronic
- 228 -
1. The bus line classification: V. EXPERIMENT RESULTS
The architecture of the bus line classification is as As cities continue to grow and transportation demands
evolve, route classification will play a crucial role in
follows. We propose to use LSTM as a deep learning
creating well-organized and user-centric public
model compared to Decision Tree as a conventional
transportation systems, fostering sustainable and
model.
accessible urban mobility for all. We first transform our
Decision Tree: Apply the decision tree algorithm, bus line dataset by dividing it into a sequence of 5 bus
such as ID3 (Iterative Dichotomiser 3), C4.5, or CART stops to encourage LSTM input.
(Classification and Regression Trees), to construct the Table 1. Learning performance on bus line data
decision tree. The algorithm recursively partitions the
dataset based on the selected attribute at each internal F1-score Accuracy
node, creating decision nodes and leaf nodes. At each
node, determine the splitting criterion that best separates Decision Tree 2.05% 2.05%
the data based on the target variable (bus line
classification). Decision Tree 98.3% 98.3%
(including line
information)
LSTM: This typically involves defining the number
of LSTM layers, the number of LSTM units in each LSTM 68.0% 68.0%
layer, and the output layer.
LSTM (including line 98.7% 98.7%
information)
- 229 -
over 11 bus lines. But a section of 25 sequentially
connected bus lines overlaid over 3 bus lines. This
explains that bus line planning needs to be optimized,
reducing the overlaps. The diversity of bus lines is poor
due to the overlaps.
- 230 -
Transportation Research Part C: Emerging Technologies,
72, 38-49.
[3] Feng, Y., Wu, Q., & Luo, Y. (2017). Bus Route
Classification Using K-means Clustering and Hierarchical
Clustering. Journal of Transportation Systems
Engineering and Information Technology, 17(5), 149-156.
[4] Guo, J., Liu, Y., & Li, M. (2014). Bus Line Classification
Based on Decision Tree and Genetic Algorithm. In 2014
International Conference on Transportation Information
and Safety (ICTIS) (pp. 422-427). IEEE.
[5] Zhao, X., Han, B., & Huang, Y. (2018). Bus Line
Classification Using Deep Neural Networks. Journal of
Advanced Transportation, 2018, 4601374.
[6] Chen, H., Lu, H., & Wang, C. (2019). Bus Line
Figure 9. User’s route estimation for Erdenet city Classification Using Ensemble Learning. In Proceedings
of the 2019 2nd International Conference on Image,
ACKNOWLEDGMENT Video and Signal Processing (pp. 22-27). ACM.
This research was supported by KOICA(Korea [7] Wu, L., & Qiu, J. (2018). Bus Line Classification and Its
International Cooperation Agency) through "Capacity Application Based on K-means Clustering. Journal of
Building Project for School of Information and Coastal Research, Special Issue 85, 1391-1395.
Communication Technology at Mongolian University [8] Dai, M., He, B., & Zhang, C. (2017). Bus Line
of Science and Technology in Mongolia" (Contract No. Classification Based on DBSCAN Clustering. In
Proceedings of the 2017 IEEE International Conference
P2019-00124). Also partially supported by Mongolian
on Intelligent Transportation Systems (pp. 1-5). IEEE.
Foundation for Science and Technology (MFST).
[9] Du, S., Chen, Z., Chen, J., & Zeng, Z. (2019). A Hybrid
VI. CONCLUSION Model for Bus Line Classification. In Proceedings of the
2019 5th International Conference on Control,
Public transportation route classification offers Automation and Robotics (pp. 86-90). ACM.
significant benefits in terms of service planning, [10] Yin, X., & Wang, C. (2015). Bus Line Classification
resource allocation, user experience, and data-driven Based on Machine Learning. In Proceedings of the 2015
decision making. LSTM based bus line classification IEEE International Conference on Computer and
performed relatively well, with an accuracy of 98.7% Communications (pp. 1219-1223). IEEE.
considering bus line information in the training set. We [11] Zhang, J., Zhang, L., Zheng, Z., & Wang, S. (2017). Bus
also identified the overlapped sections of connected bus Line Classification Using Machine Learning Techniques.
In 2017 5th International Conference on Logistics,
stops over bus lines. For instance, up to 25 connected Informatics and Service Science (LISS) (pp. 1-5). IEEE.
bus stops were observed over 3 bus lines. Bus line [12] Wang, J., Luo, W., & Liu, Z. (2019). Bus Line
diversity is low due to those overlaps. By systematically Classification Based on Improved K-means Algorithm
categorizing routes based on specific characteristics, and SOM Neural Network. Journal of Physics:
transportation authorities can optimize operations, Conference Series, 1168(3), 032009.
improve passenger satisfaction, and ensure efficient [13] Zhang, H., Wang, Y., Wang, H., & Zhu, Z. (2018). Bus
utilization of resources. Our proposed user’s route Line Classification Based on Feature Engineering and
estimation approach is the ideal way to implement when Deep Learning. In 2018 13th IEEE Conference on
Industrial Electronics and Applications (ICIEA) (pp.
the bus stops are limited. We validated our approach
388-392). IEEE.
which relies on the shortest path by time, distance and
[14] Chen, Y., Fu, Y., & Zhang, W. (2020). Bus Line
number of bus stops. We further study identification of Classification Based on Extreme Learning Machine.
Express vs. Local Routes, High-Demand vs. Journal of Intelligent & Fuzzy Systems, 39(4),
Low-Demand Routes, Peak Hour vs. Off-Peak Hour 6015-6025.
Routes, Local Neighborhood Routes vs. Citywide [15] Jiang, Z., Wang, H., & Liu, F. (2017). Bus Line
Routes. Classification
VII. REFERENCES
[1] Liu, X., Yu, H., & Chen, X. (2019). Bus Line
Classification Based on Clustering Ensemble. Journal of
Advanced Transportation, 2019, 6279480.
[2] Tang, L., Lin, Y., Zhou, J., Wang, J., & Li, Y. (2016). Bus
Line Classification Using Support Vector Machines.
- 231 -
Development of Fault Diagnosis Simulator of
Pneumatic Door System for Electric Railway
Vehicles
Gil Hyun Kang1, Young Min Lim2, In Su Chung3 and Chul Su Kim 3*
1
Industry-Academic Cooperation Foundation Korea National University of Transportation, Uiwang, Korea
2
ROTECO, Suwon, Korea
3
School of Railway Engineering, Korea National University of Transportation, Uiwang, Korea
*
Email: chalskim@ ut.ac.kr
Abstract—This study is on the development of a pneumatic methods such as wear measurement of wheels of railway
door failure diagnosis simulator and door durability tester that vehicles [4]. However, in actual commuter trains, the number
can be implemented in the laboratory before applying the of sensors is high due to the large number of doors, so a wire
system to operating vehicles. In particular, as a method of sensor that is a low-cost sensor and easy to calibrate in terms
diagnosing door failure using artificial intelligence, a distance of maintenance was used.
sensor was proposed instead of a pressure sensor or an acoustic
sensor used in previous studies. Thus, the wire sensors, which The purpose of this study is summarized as follows. (1) It
could deliver the distance data, were installed on the door panels is the development of a door failure diagnosis simulator that
of the pneumatic door system. The moving distance of the door uses wire sensor which can replace pressure sensors and
panels could be collected using the A/D converter and DAQ sound sensors for existing pneumatic doors. (2) To this end,
module. Such open and close distance data may be used as it is accurately collected through a simulator developed by
future failure diagnosis data using separate failure diagnosis major failure mode data selected using Failure Modes,
software. Failures that occur during train operation can be Effects and Criticality Analysis (FMECA) [5]. The collected
simulated using test equipment by applying FMECA analysis, data is used for supervised learning so that it can be pre-
and durability evaluation of the parts of door system is available. processed and statistical features can be provided for use in
In addition, the obtained failure data can be used for supervised fault diagnosis using artificial intelligence. (3) In order to
learning during machine learning. Finally, the durability test of apply the simulator to the actual operating vehicle, the
the door engine was performed using this test equipment. As a
durability test of the door engine, including the wire sensor,
result of a total of over 517,205 repeated opening and closing
tests over two months, the door engine confirmed 193,990 B 10
is conducted to verify whether the wire sensor can be
life guarantees at a 95% confidence level. This proved that the commercialized and used in the simulator and future real
current pneumatic door system can be used safely for 3 years, vehicles.
which is the cycle of heavy maintenance for Korean railway
vehicles. In addition, it was found that this displacement
II. DEVELOPMENT OF FAILURE DIAGNOSIS SIMULATOR
measurement system can be used as a sensor for CBM of an A. Pneumatic Door and Failure Diagnosis Simulator
actual vehicle. Figure 1 shows the structure of the pneumatic door system
(left) and the developed fault diagnosis simulator (right).
Keywords—Railway Vehicles, Fault Diagnosis Simulator,
Machine Learning, Durability Test, Pneumatic Door System
I. INTRODUCTION
The door system of commuter rail vehicles is an important
device to be managed to prevent major traffic congestion in
the event of a failure. Since the pneumatic door system uses
compressed air to open and close, failure diagnosis has
generally been performed using compressed air pressure
sensors or acoustic sensors during open and close operations
[1][2]. However, pressure sensors have high-cost problems
that require modification of air cylinders for installation, and
difficulties when analyzing air pressure patterns due to the
nature of compressible fluids. In addition, sound sensors also Fig. 1. Pneumatic door structure and failure diagnosis simulator
have limitations due to the nature of railway vehicles where
a lot of ambient noise is mixed during vehicle operation.
Therefore, unlike previous studies, a displacement sensor was The pneumatic doors used in the test use a single cylinder
used to develop equipment that can perform machine learning double acting pneumatic type air cylinder. By the control
with displacement and speed data of the door panel during the power of the DC100V, the solenoid valve operates according
operation of the pneumatic door. In order to overcome the to the control command of the door switch to drive the belt,
challenges faced when using pressure sensors or acoustic and the door panel connected to it moves to perform the door
sensors, the travel distance of the door panel is measured so opening and closing function. The simulator was installed on
that failure diagnosis can be performed using distance and the ground using parts used in real vehicles and consisted of
speed data [3]. Universal sensors capable of measuring travel door engines, wire sensors, digital timers, data collectors and
distance include laser sensors or wire sensors. Laser sensors air compressors. When used as a fault diagnosis simulator,
have been widely used as high-precision measurement data for each fault and failure type can be collected and
classified and diagnosed by a separate machine learning
- 232 -
program by creating normal and abnormal conditions for each ln(1−0.95) 2
1
fault type and operating the door opening and closing switch. 𝑇4 = 193,990 × { }= 517,205 (3)
4×ln(1−0.1)
B. Displacement and Speed Data of Pneumatic Door B. Test Time of the Samples
In order to obtain data as a simulator for fault diagnosis, Table 1 shows the test time for failure by number of
the classification and definition of failure are important. samples performed. The non-failure test time was calculated
FMECA is a way to prevent failures or accidents by from 1 to 4 samples.
identifying potential failure modes that seriously affect the
product. The door engine was selected by performing fault TABLE I. NO FAILURE TEST TIME OF SAMPLE
data and the FMECA based on SAE-J1739 [6]. Figure 2 is an
No failure test time (cycle)
example of collecting and showing normal door operation Number of
sample 𝐵10life
data (normal) and an abnormal data with obstacles stuck in Parameters Test cycle
the upper part of the door engine. confidence level
𝐶𝐿 = 0.95,
4 193,990 517,205
unreliability 𝑝 =0.1,
shape parameter β = 2
IV. CONCULUSION
Instead of existing pressure and acoustic sensors, a fault
diagnosis simulator was developed using a wire sensor for
distance measurement. As a result of data acquisition with the
Fig. 2. Example of a normal(left) and abnormal(right) data of the simulator simulator, normal and abnormal data could be collected. In
addition, as a result of the durability evaluation, it was found
C. Durability Evaluation of Door Engine of the Simulator that the life of the device was guaranteed up to three years of
A no-failure test was performed to evaluate the durability the electric vehicle overhaul period. (1) By applying FMECA,
and ensure reliability of the developed pneumatic door the failure test time of the door engine with the highest risk
simulator. The no-failure test can prevent the cost of the life priority was calculated to be about 193,990 cycles. (2) As a
test from increasing by reducing the number of specimen. The result of the 4 sample tests, it was confirmed that there was no
test method is to continue the test with a predetermined fault for the 𝐵10 life calculated for the 517,205 no-failure test
number of samples until a set time of the target product, and time. After the test was completed, there were no
if a failure does not occur, the reliability of the product is abnormalities of the equipment. It was confirmed through this
determined to be satisfied. Assuming that the probability life study that it can be applied as a CBM sensor to pneumatic
distribution of mechanical parts generally follows a two- body side entrance doors of railway vehicles in the future.
parameter Weibull distribution, the no failure test time can be
calculated by the following equation [7]. ACKNOWLEDGMENT
1 This work was supported by the Korea Agency for
𝑙𝑛(1−𝐶𝐿 ) 𝛽 Infrastructure Technology Advancement (KAIA) by the
𝑇𝑛 = 𝐵𝑝 × { } (1)
𝑛×𝑙𝑛(1−𝑝) Ministry of Land, Infrastructure and Transport under Grant
RS-2019-KA152194.
where, 𝑇𝑛 : no-failure test, 𝐵𝑝 : the assurance life (life with a
product failure probability of p%), 𝐶𝐿 : the confidence level, REFERENCES
𝑛 : number of samples, 𝑝 : unreliability( 𝑝 = 0.1 for B10 [1] N. Lehrasab, H. P. B. Dassanayake, C. Roberts, S. Fararooy, and C. J.
lifetime), 𝛽 : the shape parameter. Goodman, “Industrial fault diagnosis: Pneumatic train door case
study,” Proceedings of the Institution of Mechanical Engineers, Part F:
For the durability test, an additional timer circuit Journal of Rail and Rapid Transit, vol. 216, no. 3. SAGE Publications,
manufactured separately was installed in the fault diagnosis pp. 175-183, May. 2002.
simulator to automatically perform the test. The test is [2] Y. Sun, G. Xie, Y. Cao, and T. Wen, “Strategy for Fault Diagnosis on
performed automatically by setting the operation mode of the Train Plug Doors Using Audio Sensors,” Sensors, vol. 19, no. 1. MDPI
door, setting the opening and closing time of the door switch. AG, Dec. 2018.
[3] G.H. Kang, H.C. Ki, S. H. An, J.H. Choi, and C.S. Kim, “A Genetic
III. RESULTS Algorithm and PCA-Based Feature Selection to Improve the Failure
Diagnosis Performance of Railway Vehicle Doors,” IEEE Access, vol.
A. No-failure Test Time 10, 2022, pp. 115787-115801.
[4] P. Turabimana, and C. Nkundineza, “Development of an On-Board
Based on the commuter electric vehicle maintenance Measurement System for Railway Vehicle Wheel Flange Wear,”
regulations of KORAIL, the 𝐵10 life is calculated to be Sensors, vol. 20(1), 303. 2020.
193,990 cycles, as shown in (2), considering 206 door [5] Y. Deng, Q. Li and Y. Lu, “A research on subway physical
opening and closing cycles per day, 365 days, and 86% per vulnerability based on network theory and FMECA,” Safety Science,
year. vol. 80, 2015, pp.127-134.
206 cycles 365day [6] SAE-J1739, “Potential Failure Mode and Effects Analysis in
𝐵10 𝑙𝑖𝑓𝑒 = × × 0.86 × 3 year = 193,990 (2) Manufacturing and Assembly Processes (Process FMEA), and
1day year
Potential Failure Mode and Effects Analysis for Machinery (Machinery
When the confidence level 𝐶𝐿 = 0.95, number of samples 𝑛 FMEA), SAE, June 2000.
= 4 , unreliability 𝑝 = 0.1 for 𝐵10 lifetime), the shape [7] K. W. Fertig and N. R. Mann, “Life-Test Sampling Plans for Two-
parameter 𝛽 = 2, the durability test time could be calculated Parameter Weibull Populations,” Technometrics, vol.22,1980, pp.165-
177.
by (3).
- 233 -
August 22(TUE) - 25(FRI), 2023
Oral Session 12
Room : A432
Chair: Seungkwon Shin (Korea Railroad Research Institute, Korea)
- 234 -
Mathematical model for determining the
orientation of a star sensor
Kuanysh Alipbayev 1 Kamila Saurova 2*
1
Almaty University of Energy and Communications named after G.Daukeyev, Kazakhstan
2
Almaty University of Energy and Communications named after G.Daukeyev, Kazakhstan
Email: [email protected]
Abstract— The star sensor (SS) is a device for determining However, the question of having adequate error models
the orientation of a spacecraft. The orientation of the star sensor and mathematical models for determining the orientation of
in outer space occurs through a lens and a detector that register the SS remains relevant.
images of the starry sky and compare them with stars from the
star catalog. Usually, a star sensor is based on a CCD sensor (a Now the use of the star sensor in the modern space industry
charge-coupled device), which consists of a set of photosensitive has become an integral part of the development of spacecraft.
photodiodes. Mathematical and software modeling is used for development
because it will be possible to test the system for faults and
This article discusses studies of improving the accuracy of failures, improve the system, and minimize failures on the real
spacecraft star sensors, as well as a mathematical model for vehicle.
determining the orientation of a star sensor.
The field of view of the lens can be calibrated from 10 to
Keywords— Star sensor. Mathematical modeling of SS. 25 degrees, and the mass of the sensor varies in the range of 2
Orientation of the star sensor. Orientation detection system. A way to 5 kilograms. The sensitivity of the detector also depends on
to increase accuracy. the model and customer requirements.
- 235 -
а23 = −cos 𝑏 sin 𝑦,
а31 = −sin 𝑎 cos 𝑏,
а32 = cos 𝑎 sin 𝑦 + sin 𝑎 sin 𝑏 cos 𝑦,
а33 = cos 𝑎 cos 𝑦 − sin 𝑎 sin 𝑏 sin 𝑦.
- 236 -
Let’s take the orbital coordinate system of the spacecraft E is the eccentric anomaly.
ОY1 Y2 Y3 . The first axis is directed to the radius vector of the
Expression (5) describes the relationship between time and
position point of the spacecraft on the orbit, the second axis is
the position of the spacecraft in orbit, expressed through the
on the plane of the orbit, and the third axis complements to the
eccentric anomaly, and expression (6) describes the
right orthogonal system.
relationship of eccentric and true anomalies.
Let’s use expression (4) to write vectors E and B in the
inertial coordinate system. The vector of the true vertical in
the system ОY1 Y2 Y3 can be written as
𝐸 𝑂𝑌 = (1 0 0 )𝑇 ,
and the geomagnetic field induction vector has the form:
−2 sin 𝑢 sin 𝑖
𝐵𝑂𝑌 = 𝐵0 ( cos 𝑢 sin 𝑖 )
cos 𝑖
The vector E in projections on the ОХ1 Х2 Х3 axes can be
Fig. 3. Orientation of the spacecraft coordinate system relative to the written as follows:
inertial
cos Ω cos 𝑢 − sin Ω sin 𝑢 cos 𝑖
The angles of longitude of the ascending node and 𝐸 𝑂𝑋 = (sin Ω cos 𝑢 + cos Ω sin 𝑢 cos 𝑖 ).
inclination determine the position of the orbital plane. The sin 𝑢 sin 𝑖
eccentricity of the orbit (e) determines its shape, and the orbit
parameter (p) its size. The angle of the pericenter argument
(the angle between the line of nodes and the direction to the Numerical integration of equations of motion (2) and (3)
pericenter of the orbit) sets the position of the orbit in the plane with the given initial conditions, system parameters, and
of the spacecraft. The moment in time when the spacecraft elements of the spacecraft orbit, allows to determine the
first passes through the pericenter is considered to be known. matrix of directional cosines (orientation at this moment of the
sensor relative to the inertial system) at each point in time.
Obtaining ОХ1 Х2 Х3 from ОY1 Y2 Y3 occurs through 3
consecutive rotations. The first rotation is performed by the
angle of longitude of the ascending node around the third
inertial axis, the second rotation by the angle of inclination of
the new position of the first inertial axis, the third rotation by
the angle of latitude argument around the new third inertial
axis. The relationship between the two coordinate systems can
be described in matrix form:
Х = СY, (4)
where
С
cos Ω cos 𝑢 − − cos Ω sin 𝑢 − sin Ω sin 𝑖
− sin Ω sin 𝑢 cos 𝑖 − sin Ω cos 𝑢 cos 𝑖
= sin Ω cos 𝑢 + − sin Ω sin 𝑢 + − cos Ω sin 𝑖
+ cos Ω sin 𝑢 cos 𝑖 + cos Ω cos 𝑢 cos 𝑖
( sin 𝑢 sin 𝑖 cos 𝑢 sin 𝑖 cos 𝑖 )
Fig. 4. Finding the vector direction of the star in the moving coordinate
system
The position of the spacecraft in orbit (the distance from
According to the user-defined field of view of the camera,
the attracting center to the center of mass of the spacecraft and
the “observable” part of space is defined. The spherical
the gravitational parameter of the attracting center) can be
coordinates of the stars (α, δ) are converted into the Cartesian
determined through the following equations:
coordinates of the inertial system ( ОХ1 Х2 Х3 ), which are
3⁄ translated into the moving system (Ох1 х2 х3 ) using the known
𝑎 2
𝑡 − 𝜏𝜋 = 1⁄ (𝐸 − 𝑒 sin 𝐸 ), (5) guide cosine matrix. The locations of stars in the moving
𝜇 2 coordinate system are translated into spherical coordinates (φ,
θ), which determines the direction of the vector to the star. The
𝜗 1+𝑒 𝐸 locations of stars in the moving coordinate system are
𝑡𝑔 =√ 𝑡𝑔 , (6)
2 1−𝑒 2 translated into spherical coordinates (φ, θ), which determines
the direction of the vector to the star.
𝑝
𝑟= Consider the HYDRA-CP model from the SODERN
1 + 𝑒 𝑐𝑜𝑠 𝜗
company as a test star sensor.
- 237 -
The problem of star recognition is solved in an idealized
formulation. The simulated images of the starry sky do not
contain objects with complex configurations. In particular, the
tracks whose nature is significant angular velocities of the
camera and noises caused by the passage of protons through
the CCD at a large angle to its optical axis are not displayed.
As noted earlier, the images transmitted to the camera contain
only point objects (stars and interference) and noise imitating
the third-party inhomogeneous illumination.
The starry sky image recognition procedure is carried out
in several stages. First, the noise illumination is filtered by
dividing the image into sub-areas and subtracting the average
intensity values in the corresponding area from the current
intensity of each pixel. This partitioning is necessary to
Fig. 5. SODERN star sensor combat non-uniform illumination. After that, the filtered
image is scanned, and the signal maximums are determined
The tested star sensor has the following characteristics locally by sub-areas. The integral signal intensity in the
(Tab. 1) HYDRA-CP vicinity of the detected maxima according to the specified
detection criterion is compared with the current noise value. If
TABLE I. CHARACTERISTICS OF THE HYDRA-CP STAR SENSOR the criterion is fulfilled, the object is considered detected, and
its center of mass is calculated in the coordinate system
Sensor name HAS-2 (CMOS) associated with the detector plane:
Pixel size 18 mcm
∑ 𝜉𝑖 𝐼𝑖 ∑ 𝜂𝑖 𝐼𝑖
Matrix size 18.4 х 18.4 mm 𝜉𝑐 = , 𝜂𝑐 =
∑ 𝐼𝑖 ∑ 𝐼𝑖
Resolution 1024х1024 pixels
where (ξ, η) are coordinates of image pixels falling in the
Built-in lens 18.5 mm f2.6 H400 point signal localization area;
Maximum frame rate 30 fps.
I - corresponding intensities (Fig. 7)
Connection interface USB
The image transmitted by the simulator is “captured” by The procedure for recognizing the nodes of the calibration
the camera. Frame-by-frame analysis of the obtained video grids is slightly different from the recognition of simulated
images is carried out in a rectangular coordinate system, star images. In this case, it’s needed to find a large number of
associated with the detector's plane (Fig. 6). stars (from 100 to 400) without missing any. It is necessary to
establish the locations of all stars relative to the central point
of the grid to further establish an unambiguous
correspondence between the simulated and recognized stars.
Recognition begins with the central point, the size of
which is somewhat different from the rest of the stars and
serves as a good indication for its identification. After that, a
priori information about the grid structure is used to predict
the position of images of neighboring nodes from previously
detected ones. This method simplifies the search and detection
of stars by reducing it to a prediction-confirmation-correction
algorithm and allows to automatically obtain the desired
correspondence between the simulated and detected stars.
It is necessary to pay attention to the problem of point
object localization - the selected region of the image (groups
of pixels), which is considered when calculating the center of
Fig. 6. The coordinate system associated with the detector plane.
mass. In this paper, we used a rectangular area in which the
source image is inscribed. All the pixels of the image falling
- 238 -
into this area were considered when calculating its In the presence of a priori data about the sensor motion,
coordinates. But this method has significant drawbacks since obtained from third-party devices or pre-computed by LIS
it does not take into account the real shape of the image. algorithms, the position of stars in the detector system can be
Increased accuracy in determining the coordinates of the predicted with high accuracy. In this case, the recognition and
center of mass can be achieved by solving this problem of detection tasks are reduced to a tracking task performed
finding the contour of the image. The next level of accuracy according to the scheme, prediction-correction, which
can be obtained by using the distribution functions of the significantly increases the speed of the system.
observed signal of the point object. In other words, the
localized signal is interpolated on an analytical function (Fig.
8), estimates of the distribution parameters of which are
carried out at the stage of calibration of the device at different
angles of orientation of the source relative to the optical axis.
- 239 -
The scheme of the identification algorithm is shown in Fig. Determination of the current orientation of the spacecraft
11. is reduced to the solution of the optimization problem of the
form:
If among the 5 selected stars in the image there are
“phantoms” (objects which are not present in the catalog), min ∑𝑛𝑖=1‖𝑋𝑖 − 𝐴𝑥𝑖 ‖,
{𝑎𝑗𝑘 }
there will be no correct configuration in the list. In this case,
the star identification procedure is repeated with another set of where n is the list of defined stars;
stars.
X – coordinates of the i-th star in the inertial coordinate
Using this algorithm, the detection was carried out while system;
displaying 1500 objects, while information was present in
only three hundred, that is, the proposed method successfully x – corresponding coordinates in the moving coordinate
bypasses the problem of the presence of dim stars and system. In this case, the elements of the matrix of directional
“phantom” objects in the images. cosines 𝑎𝑗𝑘 must satisfy the orthogonality conditions.
The problem of optimization of the detection rate in the In this case, let us consider a method for determining the
presence of “phantom” objects, as well as the tasks of detailed current matrix of the guide cosines, the essence of which is as
analysis of the algorithm in comparison with existing follows.
approaches, can be the subject of future research.
Let 𝑠𝑗𝑖 be the coordinates of three stars in the detector
coordinate system (j = 1...3 is the index of the corresponding
point, i = 1...3 is the coordinate in projection to the
corresponding axis), and 𝑆𝑗𝑖 be the corresponding coordinates
in the inertial system. The elements of the matrix of guiding
cosines are determined by solving the equations of the form:
𝑆𝑗1 𝑎11 𝑎12 𝑎13 𝑠𝑗1
(𝑆𝑗2 ) = ‖𝑎21 𝑎22 𝑎23 ‖ × (𝑠𝑗2 ).
𝑆𝑗3 𝑎31 𝑎32 𝑎33 𝑠𝑗3
- 240 -
𝑑𝐴 −1 𝐴𝑘+1 − 𝐴𝑘 𝐴𝑘+1 + 𝐴𝑘 Russian Scientific and Technical Conference “Modern problems of
Ω= 𝐴 ≈ ( ) [2] orientation and navigation of spacecraft”, Russia, Tarusa, September
𝑑𝑡 ∆𝑡 2 10-13, 2018. – P.: 9 http://ofo.ikiweb.ru/publ/conf_2018_tez.pdf
[7] 7. G.A. Avanesov, R.V. Bessonov, A.N. Kurkina. Technology of
ground processing of star coordinates data to improve the accuracy of
georeferencing of Earth images from space // Modern Problems of
Earth Remote Sensing from Space. 2018. Т. 15. №6. С. 31-38
III. CONCLUSION http://jr.rse.cosmos.ru/article.aspx?id=2452
[8] 8. D.A. Slavgorodsky. Errors of gyrostabilized optical observation
Studies of accuracy enhancement by stellar sensors of system caused by peculiarities of optical element kinematics //
spacecrafts. A method for improving the accuracy of stellar Proceedings of XXII Conference of Young Scientists with international
sensors of spacecrafts and a mathematical model for participation. St. Petersburg, 17-20 March 2020. - P.: 16-18,
determining the orientation of a stellar sensor is presented. https://elibrary.ru/item.asp?id=44618751&selid=44618765
The experiment shows that the method evaluates orientation [9] 9. Fedorovich S.N. Increasing the accuracy of ball gyroscope rotors
accuracy, calculation time, required memory, size of the star by methods of precision spherical watering // Proceedings of XXII
Conference of Young Scientists “Navigation and Motion Control”, St.
catalog, sky coverage, etc. Petersburg, March 17-20, 2020. - P.: 74,
https://elibrary.ru/item.asp?id=44618751&selid=44618765
REFERENCES
[10] 10. M.M. Moldabekov, S.A. Yelubayev, K.A. Alipbayev, T.M.
[1] S.A. Dyatlov, R.V. Bessonov Review of stellar sensors of spacecraft Bopeyev, A.S. Sukhenko “Development of optical system of star
orientation // All-Russian Scientific-Technical Conference "Modern tracker for satellites" in the Proc. of international scientific conference
Problems of Spacecraft Orientation and Navigation Determination" "Reshetnevskie chteniya”, Russia, Krasnoyarsk, 2013, pp. 237-238.
Proceedings, Russia, 2009. – P.: 12 – 31, [11] 11. Features of design and development of the optical head of star
https://elibrary.ru/contents.asp?id=33699680 tracker. Moldabekov M. Proceedings of the SPIE/ Moldabekov M.,
[2] 2. G. Avanesov, R. Bessonov, A. Kurkina. Investigation of star Akhmedov, D.; Yelubayev, S.; Ten, V.; Bopeyev, T.; Alipbayev, K.;
sensor errors based on flight experiment data // Sixth All-Russian Sukhenko, A // The International Society for Optical Engineering,
Scientific and Technical Conference “Modern problems of spacecraft Amsterdam. - 2014, https://www.spiedigitallibrary.org/conference-
orientation and navigation”, Russia, Tarusa, September 10-13, 2018. – proceedings-of-spie/9241/924122/Features-of-design-and-
P.: 8 http://ofo.ikiweb.ru/publ/conf_2018_tez.pdf development-of-the-optical-head-of/10.1117/12.2067050.short.
[3] 3. G.A. Avanesov, R.V. Bessonov, A.S. Kvashnin, V.E. Shevelev. [12] 12. Software and mathematical support of Kazakhstani star tracker.
Investigation of stellar sensor errors caused by thermoelastic Akhmedov D. Proceedings of the SPIE/ Akhmedov D., Yelubayev S.,
deformations // Sixth All-Russian Scientific and Technical Conference Ten V., Bopeyev T., Alipbayev K., Sukhenko A. // The International
“Modern problems of spacecraft orientation and navigation”, Russia, Society for Optical Engineering, Software and mathematical support of
Tarusa, September 10-13, 2018. – P.: 29 Kazakhstani star tracker. - 2016.
http://ofo.ikiweb.ru/publ/conf_2018_tez.pdf [13] 13. Alipbayev K.1, Saurova K.2, Method of increasing the accuracy
[4] 4. N.N. Brysin, K.P. Lyubchenko, V.M. Muravyev, S.N. Romashin of the star sensor/MECHANICS OF GYROSCOPIC SYSTEMS. 2022.
et al. Investigation of stellar sensors for electromagnetic compatibility https://www.researchgate.net/publication/366718441_Method_of_inc
// Sixth All-Russian Scientific and Technical Conference “Modern reasing_the_accuracy_of_the_star_sensor
problems of spacecraft orientation and navigation,” Russia, Tarusa, [14] 14. Abubekerov M.K., Zakharov A.I., Prokhorov M.E.,
September 10-13, 2018. - P.: 283 Stekolshchikov O.Yu. Method of increasing the accuracy of star
http://ofo.ikiweb.ru/publ/conf_2018_tez.pdf orientation determination and long-term maintenance of increased
[5] 5. A.V. Malyshev, G.S. Sazanov. Identification of error model accuracy of orientation determination and a device for their
parameters of inertial navigation system of upper stage via star sensors implementation // Intelligent System of Thematic Study of
// Proceedings of XXII Conference of Young Scientists “Navigation Naukometric Data, Eurasian patent 026970, June 30, 2017.
and Motion Control”, St. Petersburg, March 17-20, 2020. – P.: 13-15,
https://elibrary.ru/item.asp?id=44618751&selid=44618765 .
[6] 6. A.A. Arefinkin, V.V. Vilensky, S.V. Voronkov, S.E. Zaitsev et
al. Methods to improve the accuracy of the orientation system with the
astro-correction loop of a small remote sensing spacecraft // Sixth All-
- 241 -
Target selection by a group of unmanned
aerial vehicles based on a swarm approach
Aigerim Mazakova1, Vadim Zhmud2, Sholpan Jomartova1, Тalgat Mazakov1
1
Al-Farabi Kazakh National University, Almaty, Kazakhstan
2
Altae-Sayan Branch of the Federal State Budgetary Institution of Science of the Geophysical Service of
the RAS, Novosibirsk, Russia
Email: [email protected]
Abstract-- The article deals with the problem of target One of the most important aspects of using swarm
selection by a group of unmanned aerial vehicles based on technology is the possibility of automatic control. This
a swarm approach using interval analysis and computer means that all devices are synchronized, communicating,
algebra. which allows them to accurately perform their tasks,
The UAV group is controlled from the mission control
center. The MCC sends to all drones the spatial
without operator intervention. Moreover, the use of
coordinates of the target and the required time to reach it. swarm systems reduces the number of errors and
Each of the UAVs independently solves the problem of accidents, which makes them more “reliable” in
attainability of the set goal, depending on its technical operation, especially in extreme situations.
characteristics and its own location. Thus, the process is
parallelized and carried out in real time. Overall, swarm drone systems are a step forward in
The answer about the possibility of achieving the goal robust automatic technology. The future lies in
by each drone is returned to the MCC, which, according continuing research on this technology and developing
to its other criteria, determines a separate drone (or a new strategies for its application.
subgroup of drones) that must solve the required task.
On the basis of interval mathematics, a criterion for II. LITERATURE REVIEW
the attainability of the goal by each UAV is obtained.
Based on the swarm approach, a list of unmanned aerial Drone swarm algorithms are an active area of
vehicles is defined, each of which is capable of performing research in autonomous systems. These algorithms
the task. This list may be empty if the selected target model the behavior of a swarm of drones based on
cannot be reached by any of the available UAVs. observations of natural swarms such as birds, fish, or
When developing the software, the library of interval insects. The goal of swarm algorithms is cooperation and
mathematics was used. The proposed approach can be coordination between individual drones to perform
applied to the study of various robotic systems.
complex tasks collectively.
Keywords—unmanned aerial vehicle (UAV), aerial Swarm algorithms are based on the principles of self-
target (AT), computing device (CD), mission control center
organization, communication and collective intelligence.
(MCC), reachability, swarm approach, interval
mathematics.
Unmanned vehicles in a swarm communicate, coordinate
their behavior, and adapt to a changing environment. This
I. INTRODUCTION allows them to efficiently perform tasks such as search
and rescue, environmental monitoring, or patrolling.
The swarm approach to the creation of unmanned
aerial vehicles is an innovative method that uses There are many studies in the literature on drone
innovative technologies to develop autonomous control swarm algorithms suggesting different approaches and
systems. It is based on a variety of unmanned aerial methods to solve the problem of swarm coordination.
vehicles working together with the help of data
processing algorithms and artificial intelligence. “Swarm Intelligence: From Natural to Artificial
Systems” (2003) by Eric Bonabeau [1]. This book
Thanks to this approach, UAVs can operate much provides a broad overview of swarm algorithms,
more efficiently and accurately than traditional systems including algorithms for unmanned systems. It describes
with a single vehicle. They are capable of performing the basic concepts and ideas behind swarm systems and
many different tasks, including transporting goods, provides numerous examples of how swarm algorithms
identifying enemies, detecting and preventing natural can be applied to various problems.
disasters, and many others.
“Bio-inspired Artificial Intelligence: Theories,
The advantage of such a group of devices is stability: Methods, and Technologies” (2008) by Floreano and
if one of the devices is lost, the rest will continue to work Mattiussi [2]. This book considers swarm algorithms as a
without changing performance. The use of swarm form of bioinspired artificial intelligence. It describes
systems also helps to avoid the need for a single large various swarm algorithms, including algorithms based on
drone, which in turn reduces the chances of malfunctions animal behavior, and gives examples of how these
and improves repairability. algorithms can be applied to various problems.
- 242 -
“A Survey on Swarm Robotic Modeling, Analysis In a group of drones, collective behavior can occur, in
and Hardware Architecture” (2018) by G. Seeja, A. which the devices act in concert and cooperate to achieve
Arockia Selvakumar and V. Berlin Hency [3]. This article a common goal. This may include forming formations,
reviews the state of research in swarm robotic systems, coordinated movement, avoidance of obstacles, and
including unmanned vehicles. It provides an overview of collective decision making. Collective behavior can be
various swarm coordination algorithms and methods and achieved through various algorithms and strategies such
provides examples of the implementation of swarm as swarm algorithms, cooperative control algorithms, and
systems in various applications. distributed scheduling algorithms.
“Cooperative Control of Multi-Agent Systems: A Group drones are used in various fields, including
Consensus Region Approach” (2015) by Zhongkui Li civil aviation, defense, reconnaissance and monitoring,
and Zhisheng Duan [4]. This book describes methods for search and rescue, agriculture, and more. They can be
coordinating and controlling multi-agent systems, used for complex missions such as patrolling large areas,
including unmanned swarm systems. It presents various detecting and tracking targets, multi-point surveying, or
algorithms and strategies to achieve consistent behavior coordinating in group operations.
and cooperation between unmanned vehicles.
A group of drones presents some challenges, such as
Swarm algorithms use various coordination methods ensuring reliable communication, managing collective
such as task allocation, motion synchronization, and security, and coordinating in a dynamic and
pattern formation. Some well-known algorithms include unpredictable environment. Future research aims to
swarm behavior modeling, marker-assisted swarm develop more intelligent and adaptive methods for
algorithms, and algorithms using various types of coordinating, sharing information, and distributing tasks,
communication and information exchange between as well as integrating group drones with other
drones. technologies such as artificial intelligence and
autonomous decision-making systems.
Drone swarm algorithms find applications in various
fields, including civil aviation, defense, geodesy, III. FORMULATION OF THE PROBLEM
environmental monitoring, etc. They can be used to
perform complex tasks that require collective action, An aviation group of UAVs is considered, consisting
such as patrolling large areas, detecting and tracking of K drones. The actions of the group are synchronized
targets, aerial photogrammetry, and even forming (controlled) from the Mission Control Center (MCC).
temporary communication networks.
Each of the UAVs has its own characteristics that
Drone swarm algorithms still present some determine its capabilities in terms of range and flight
challenges, such as ensuring communication reliability, speed. The drone can only exchange information with
efficient resource allocation, and adapting to a dynamic the MCC. In addition, it is equipped with a CD, which
environment. Future research is aimed at developing can determine its own coordinates in real time and, on
more intelligent and adaptive swarm algorithms, taking their basis, solve problems about the reachability of a
into account ethical and legal aspects, as well as creating certain target by a drone, based on the coordinates of the
integrated mixed reality systems for drones to interact AT and its own technical capabilities.
with people.
The MCC simultaneously transmits to all drones the
A drone group, also known as a multi-agent system or coordinates of the air target and the time limit for
a drone collective, is a collection of two or more drones reaching it. Each of the UAVs, having received the
working together to complete a task or achieve a common coordinates of the target, solves the problem of the
goal. Group drones have the potential to solve complex possibility of reaching the AT. Then he informs the
tasks that are impossible or difficult to perform with one MCC about the possibility and the minimum time to
unmanned vehicle. achieve the goal.
A drone group requires effective coordination and Based on the information received from the UAV
communication among its members. Drones must group, the MCC determines the priority of the UAV to
exchange information, plan their movement, share tasks complete the task.
and coordinate their actions. To do this, various
communication methods are used, including wireless The mathematical model of the UAV can be
networks, data transmission and sensory information. described by the following system of ordinary
differential equations:
In a group of drones, each vehicle can perform its own
unique task or work together with other vehicles to 𝑉̇ = 𝑔(𝑛𝑥𝑎 − 𝑠𝑖𝑛Θ)
complete a complex task. The distribution of tasks Θ̇ = 𝑔(𝑛𝑦𝑎 𝑐𝑜𝑠𝛾 − 𝑐𝑜𝑠Θ)/𝑉
includes the definition of the roles and functions of each Ψ̇ = −𝑔𝑛𝑦𝑎 𝑠𝑖𝑛𝛾/(𝑉𝑐𝑜𝑠Θ) (1)
device, the optimal allocation of resources and the
𝑥̇ = 𝑉𝑐𝑜𝑠Θ𝑐𝑜𝑠Ψ
effective use of the capabilities of each device in 𝑦̇ = 𝑉𝑠𝑖𝑛Θ
accordance with the requirements of the task. { 𝑧̇ = −𝑉𝑐𝑜𝑠Θ𝑠𝑖𝑛Ψ
- 243 -
𝑃𝑐𝑜𝑠𝛼−𝑋𝑎 𝑃𝑠𝑖𝑛𝛼+𝑌𝑎 𝑞𝑖,1 (𝑇) = 𝑥ц , 𝑞𝑖,2 (𝑇) = 𝑦ц , 𝑞𝑖,3 (𝑇) = 𝑧ц ,
𝑛𝑥𝑎 = , 𝑛𝑦𝑎 = (2)
𝑚𝑔 𝑚𝑔
𝑞𝑇 = (𝑥ц , 𝑦ц , 𝑧ц ). (7)
Here x, y, z are the coordinates of the center of mass of
the aircraft in the normal earth coordinate system, V is
Each of the UAVs returns to the MCC the answer
the flight speed, ϴ is the angle of inclination of the
in the form of two numbers. The first number means
trajectory, Ψ is the heading angle, α is the angle of
the possibility of achieving the goal and takes two
attack, γ is the bank angle, P is the engine thrust, 𝑋𝑎 is
values: 0 – the goal cannot be achieved and 1 – the
aerodynamic drag, 𝑌𝑎 is aerodynamic lift, m – aircraft
goal is in the area of its attainability. The second
mass, g – gravitational acceleration, 𝑛𝑥𝑎 – longitudinal
number in the case of attainability of the AT is equal
g-load and 𝑛𝑦𝑎 – lateral g-load (in flow axes). to the minimum value of the time for which the goal
can be achieved.
As control variables in (1), overloads 𝑛𝑥𝑎 , 𝑛𝑦𝑎 and bank
angle γ are taken [5-7]. 3) The MCC generates a list of responses from all
drones in the form of a 2*K matrix R. The values of
Let us introduce the notation: the elements of the matrix R are defined as follows:
𝑥0 𝑥1 R(1,i) = 0 (if the AT cannot be reached by the i-th
𝑥 y0 y1 UAV) and R(1,i) = 1 (the target is achievable); R(2,i)
y z0 z1 = 𝑇𝑖 , where 𝑇𝑖 ≤ 𝑇 is the minimum time for which the
𝑞 = z , 𝑞0 = 𝑉 , 𝑞1 = 𝑉 (3) i-th drone reaches the target.
0 1
𝑉
[Ψ] Θ0 Θ1
[Ψ0 ] [Ψ0 ] Next, the MCC selects from the list R the number
of the drone {s} with the minimum time value 𝑇𝑖 ,
For each UAV, based on equations (1)-(2), we rewrite provided that the goal is reached. Mathematically, this
the mathematical model in the form of the following can be written as follows:
systems of differential equations:
𝑇𝑠 = 𝑚𝑖𝑛{ 𝑅(2, 𝑖)|𝑅(1, 𝑖) = 1, 𝑖 = 1, 𝑘} (8)
𝑑𝑞𝑖
= 𝑓𝑖 (𝑞𝑖 , 𝑡) + 𝐵𝑖 (𝑡)𝑢𝑖 , 𝑖 = ̅̅̅̅̅
1, 𝑘 (4)
𝑑𝑡 The task of reaching the AT is assigned to the drone
with the number {s}. The rest of the UAVs go into
where 𝑢𝑖 – control-vector of dimension m.
standby mode for further instructions from the MCC.
There are certain restrictions on control for each UAV
IV. THE CRITERION OF ATTAINABILITY OF THE I-TH
𝑢𝑖 (𝑡) ∈ 𝑈𝑖 = UAV OF THE TARGET
𝑢𝑖 (𝑡): 𝑢𝑖,𝑗 (𝑡) ∈ 𝐶[[𝑡0 , 𝑡1 ]; −𝐿𝑖,𝑗 ≤ 𝑢𝑖,𝑗 (𝑡) ≤ 𝐿𝑖,𝑗 ,
{ }.(5) Due to the properties of the equations of the Cauchy
𝑖 = ̅̅̅̅̅
1, 𝑘, 𝑗 = ̅̅̅̅̅̅
1, 𝑚, 𝑡 ∈ [𝑡0 , 𝑡1 ] problem (4)-(6) imposed on the right side of the system
of equations, for a fixed control 𝑢𝑖 (𝑡) ∈ 𝑈𝑖 , the
The problem considered in the article is reduced to conditions of the existence and uniqueness theorem for
the study of several problems. the solution 𝑞𝑖 (𝑡), 𝑡 ∈ [0, 𝑇] [8] are satisfied.
1) The MCC transmits to all drones the time limit Let us rewrite the Cauchy problem (4)-(6) in the
and the coordinates of the air target in the following integral recurrent form:
form:
T – in time (0, T) the target must be reached by at 𝑡 𝑡
𝑞𝑖 (𝑡) = 𝑞𝑖,0 + ∫0 𝑓𝑖 (𝑞𝑖 (𝜏), 𝜏)𝑑𝜏 + ∫0 𝐵𝑖 (𝑡)𝑢𝑖 (𝜏)𝑑𝜏 . (9)
least one UAV;
(𝑥ц , 𝑦ц , 𝑧ц ) – air target coordinates. Equation (9) is a special case of the Volterra-Urysohn
integral equation of the second kind [9]
Note. If it is impossible to reach the AT by all drones,
the MCC recognizes this fact and switches to solving 𝑡
𝑦(𝑡) = 𝑔(𝑡) + ∫0 𝐾(𝑡, 𝜏, 𝑦(𝜏))𝑑𝜏, (10)
other tasks.
- 244 -
Here the sign 𝒗𝒊 = (𝒗𝒊,𝟏 , 𝒗𝒊,𝟐 , … , 𝒗𝒊,𝒎 ) denotes an Proof. Let us rewrite the approximate solution (14) at
interval m-vector with interval elements 𝒗𝒊,𝒋 = (0, 𝐿𝑖,𝑗 ). time T in the form of the following interval integral
expression
Theorem 1. Let equation (4) have a unique continuous
solution for a given continuous function 𝑢𝑖 (𝑡) ∈ 𝐶[0, 𝑇] 𝒒𝑖,𝑟 (𝑇) = ∑𝑟𝑘=0 𝝋𝒌 (𝑇), (15)
satisfying condition (5). This solution can be found by
simple iteration (successive approximations). 𝝋𝟎 (𝑇) = 𝒈(𝑇); 𝝋𝒌+𝟏 (𝑇) = 𝒈(𝑇) +
𝑇
∫0 𝒇𝒊 (𝑡, 𝜏, 𝝋𝒌 (𝜏))𝑑𝜏.
Proof. The method of simple iteration as applied to the
integral equation consists in obtaining a sequence of where the sign * denotes interval, 𝒒𝑖,𝑟 (𝑇) – the interval
functions (approximations) 𝑞𝑖,𝑘 (𝑡), 𝑘 = 0,1,2 …, by boundary vector at time T and r is selected from the
means of the recurrence relation: 𝑀𝑘 𝑇 𝑘
condition 𝑁 {exp(𝑀𝑇) − ∑𝑟𝑘=0 =} ≤ 𝜀 (𝜀–
𝑘!
𝑡 required accuracy).
𝑞𝑖,𝑘+1 (𝑡) = 𝑞𝑖,0 + ∫0 𝐾(𝑡, 𝜏, 𝑞𝑖,𝑘 (𝜏))𝑑𝜏 +
𝑡
∫0 𝐵𝑖 (𝑡)𝑢𝑖 (𝜏)𝑑𝜏, 𝑡 ∈ [0, 𝑇], k=1, 2 … Hence, from the fact that the boundary vector 𝑞𝑇
belongs to the interval vector 𝒒(𝑇), it follows that the
Denote target is reachable by the i-th drone.
𝑡
𝑔(𝑡) = 𝑞𝑖,0 + ∫0 𝐵𝑖 (𝜏)𝑢𝑖 (𝜏)𝑑𝜏 , 𝜑0 (𝑡) = 𝑔(𝑡); This implies the validity of the assertion of the
theorem.
𝑡
𝜑𝑘+1 (𝑡) = 𝑔(𝑡) + ∫0 𝐾(𝑡, 𝜏, 𝜑𝑘 (𝜏))𝑑𝜏.
When theorem 2 is satisfied, i.e., if the target is
Then the desired solution can be represented as a reachable by the i–th UAV, the following procedure is
series proposed to calculate the minimum reachability time
- 245 -
The developed library of interval functions is
universal. To use it, it is enough to set the numerical
values of the parameters in the form of intervals.
REFERENCES
[1] E. Bonabeau, M. Dorigo, G. Theraulaz. “Swarm Intelligence: From
Natural to Artificial Systems”, O’Reilly Emerging Technology
Conference, Santa Clara, CA., pp.22-25, April 2003.
[2] D. Floreano, C. Mattiussi. Bio-inspired Artificial Intelligence:
Theories, Methods, and Technologies. – The MIT Press,
Cambridge, 2008.
[3] G. Seeja, A. Arockia Selvakumar, V. Berlin Hency “A Survey on
Swarm Robotic Modeling, Analysis and Hardware Architecture”
Procedia Computer Science 133 (2018). pp. 478–485.
[4] Zhongkui Li, Zhisheng Duan. Cooperative Control of Multi-Agent
Systems: A Consensus Region Approach. – CRC Press, 2015.
[5] N. Gyagenda, J.V. Hatilima, H. Roth, V. A. Zhmud. “Review of
GNSS-independent UAV navigation techniques” Robotics and
Autonomous Systems. Volume 152. Issue C, June 2022. DOI:
https://doi.org/10.1016/j.robot.2022.104069.
[6] A.N. Kvitko. “Methods for solving boundary value problems for
controlled systems of ordinary differential equations and their
application in solving problems of controlling the motion of the
center of mass of an aircraft” Avtoref. dissertation doctor. physics
and mathematics sciences, spec. 01.01.11 – System analysis and
automatic control, St. Petersburg, 1992. – 30 p.
[7] A. Mazakova, S. Jomartova, T. Mazakov, T. Shormanov, B.
Amirkhanov “Controllability of an unmanned aerial vehicle” IEEE
7th International Energy Conference (ENERGYCON), 2022, pp.
1-5, doi: 10.1109/ENERGYCON53164.2022.9830244.
[8] L.S. Pontryagin. Ordinary differential equations. – M.: Nauka,
1974. – 332 p.
[9] A.F. Verlan, V.S. Sizikov. Integral equations: methods, algorithms,
programs. – Kyiv: Naukova Dumka, 1986. – 543 p.
[10] G. Bairbekova, T. Mazakov, Sh. Djomartova, S. Nugmanova
“Interval arithmetic in calculations” Open Engineering formerly
Central European Journal of Engineering Editor-in-Chief: Noor,
Ahmed, Open Engineering. Volume 6, Issue 1. – pp.259-263, DOI:
https://doi.org/10.1515/eng-2016-0036, October 2016.
[11] T. Mazakov, W. Wójcik, Sh. Jomartova, N. Karymsakova, G.
Ziyatbekova, and A. Tursynbai. “The stability interval of the set of
linear system” Journal of electronics and telecommunications,
2021. – Vol. 67. – No. 2. – pp. 155-161. DOI:
10.24425/ijet.2021.135958
- 246 -
DEVELOPMENT OF AN ADAPTIVE DRIVE
FOR AEROSPACE ENGINEERING
Ivanov K.,1 Alipbaev K.,2* Tulekenova D.,3
1,2
Gumarbek Daukeyev Almaty University of Energy and Communication, Almaty, Kazakhstan,
3
Al-Farabi Kazakh National University, Almaty, Kazakhstan
Email: [email protected]
Abstract— The adaptive drive is a gear mechanism with simplifications. The paper provides a concise formulation of the
constant gearing and a variable gear ratio that operates without fundamental principles of force adaptation theory for gear
a control system. It is based on the scientific discovery of the drives and explores the dynamics of the adaptive drive for the
"Force adaptation effect in mechanics" [5], which states that a spacecraft docking mechanism.
planetary kinematic chain with two degrees of freedom, formed
by gear wheels in a movable closed circuit, can adapt to a Keywords— adaptive drive, force adaptation, mechanism with
variable load.Although the force adaptation conditions two degrees of freedom, closed loop, dynamics, friction coupling,
theoretically enable self-adjustment of the gearbox, tests of the coupling mechanism.
drive have revealed limited determinability of motion. Analysis
of the interaction between the mechanism's parameters has I. INTRODUCTION
shown that using actual movements based on the principle of A docking device serves as a controlled electromechanical
possible works does not provide equilibrium and system designed to establish a connection between a moving
determinability of the mechanism.The adaptive drive addresses spacecraft (SC) and an orbital station (OS) [1]. The docking
these challenges by simplifying the design and improving
apparatus comprises a docking mechanism (DM) and a
operational reliability, meeting the main requirements of gear
controlled electromechanical actuator. The coupling
drives in aerospace technology: small size and weight, control
automation, fail-safe operation, and durability. Actuators in
mechanism functions as a mechanical system facilitating the
space technology are utilized for transferring motion to interaction between the spacecraft and the orbital station. It
actuating mechanisms, as well as for orientation and motion adjusts to the continuously changing conditions of their
stabilization.The weight of an actuator depends on the motor interaction. The controlled electromechanical drive includes
power, which must be matched to the maximum load. Studies of an electric motor, gear differential gear, controlling
manipulator drives have demonstrated that the maximum load electromechanical devices, and a control system.
is associated with overcoming inertial forces. To reduce the
In order to significantly simplify the controlled
resistance moment experienced by the motor, a drive with a
variable transmission ratio is necessary. This work proposes an
electromechanical drive of the coupling mechanism, a
adaptive manipulator drive with a variable load-dependent gear proposal has been made to replace the toothed differential
ratio, achieved through an adaptive gear variator drive. This transfer mechanism with a revolutionary transfer mechanism
drive not only enables smooth adjustment of the transmission called the adaptive toothed variator.
ratio but also adapts to the variable drag torque. The toothed
variator offers a simple design, small size, and light weight, II. MATERIALS AND METHODS
which are crucial for space devices.The adaptive drive The motion modes of the drive are determined through
comprises an electric motor, a variable ratio gear train, and a dynamic analysis, which takes into account the relationship
control system. With its two degrees of freedom, the adaptive between the parameters of movement, such as forces and
transmission mechanism can drive an executive actuator at a velocities. The acting forces dictate the speeds of motion for
speed inversely proportional to the external load while the links, as represented in the plan of linear velocities [2].
maintaining constant motor power.
- 247 -
the line 𝐴𝑘 indicating the output angular velocity 𝜔𝐻2 is characteristic 𝜔𝐻2 = 𝑀𝐻1 𝜔𝐻1 /𝑀𝐻2 at 𝑀𝐻2 >
determined by the position of the velocity vector 𝑉𝐻2 at point 𝑀𝐻1 , 𝜔𝐻2 < 𝜔𝐻1 . There is force adaptation to the variable
𝑘. The interaction between these angular velocities occurs load with instantaneous adaptation of the speed of the working
through the angular velocity 𝜔5 of the line 𝑃𝑘𝑠 of link 5. body to the driving conditions at constant motor parameters.
Point P is the point of intersection of the 𝑔𝑒 line of angular
On the velocity diagram, the variable force 𝑅Н2 moves the
velocity 𝜔5 of link 5 with the vertical zero line 𝐴𝐵. The point
point 𝑘 of the line 𝑃𝑘𝑠, which rotates around the point 𝑠 and
𝑠 of the intersection of the angular velocity lines 𝜔𝐻1 and 𝜔5
can occupy positions in the gearbox area between the start
determines the end of the velocity vector 𝑉𝑆 , the same for the
position 𝑠𝑛 and the end position 𝑠𝑚. In the end position, when
links 5 and 𝐻1 . The point 𝑠 occupies a constant position, and
the critical load is reached, the point 𝑘 moves to the point 𝐾
the position of the point 𝑘, which depends on 𝜔𝐻2 , is variable.
that represents the stopping of the output driver. A change in
The interaction between the kinematic and force the load causes the line to rotate clockwise or vice versa
parameters of the mechanism, according to the force accordingly. The pole P can be above or below the point
adaptation condition (9), can be observed as the interaction of depending on the load.
forces 𝐹𝐻1 , 𝑅Н2 and 𝑅05 on link 5 (Fig. 1c). This interaction
The multiplier mode at 𝑀𝐻2 < 𝑀𝐻1 , 𝜔𝐻2 > 𝜔𝐻1 -
on the velocity plan is depicted as a change in the position of
section BD of the diagram. At point D, there is 𝑀𝐻2 =
the point under the influence of the variable force 𝑅Н2 . In
𝑀𝐻2𝑚𝑖𝑛 . The pole P is located above point A. The line
other words, it involves the rotation of the line 𝑃𝑘𝑠 around the
𝜔5 rotates around the point S in the area to the right of the
stationary point 𝑠 where the constant force 𝐹𝐻1 is applied. The
initial position 𝑠𝑛.
interaction between these parameters follows the condition
∑ 𝑀𝑠 = 0 or 𝑅05 ⋅ 𝑃𝑆 = 𝑅𝐻2 ⋅ 𝐾𝑆 , which can be further 3) Stop mode at 𝑀𝐻2 = ∞, 𝜔𝐻2 = 0 - point C' of the
simplified to the condition . diagram 𝑀𝐻2 = 𝑀𝐻2𝑚𝑎𝑥 . The line passes through point K on
the velocity diagram 𝜔5 . The motor continues to run and the
𝐹′𝐻1 ⋅ 𝑃𝑆 = 𝑅𝐻2 ⋅ 𝑃𝐾 (1)
actuator enters the single-motion state.
0.5𝑀𝐻1 𝑟3 𝑟
After substituting the value 𝐹′𝐻1 = ( + 1) = III. DRAWING THE TRACTION CHARACTERISTICS OF ADAPTIVE
𝑟𝐻1 𝑟6 𝑟4
𝑟 𝑟
0.5𝐹𝐻1 ( 3 + 1) is transformed into a condition and reduced DRIVE
𝑟6 𝑟4
to the form Utilizing streamlined force interaction parameters,
simplified force interaction parameters will be used to
𝐹𝐻1 ⋅ 𝐴𝐵 = 𝑅𝐻2 ⋅ 𝐴𝑆 (2) construct the traction characteristic [5].
Here 𝐹𝐻1 ⋅ 𝑃𝑆 = 𝑉𝑆 /𝜔5, 𝐾𝑆 = 𝑃𝑆 − 𝑃𝐾 = (𝑉𝑆 − 𝑉𝐾 )/
𝜔5 . After substituting in (1) we obtain 𝐹𝐻1 ⋅ 𝑃𝑆 = 𝑅𝐻2 ⋅ 𝐾𝑆
Thus, the position of the line 𝑃𝑘𝑠 determines the mode of
motion of the mechanism. The mechanism can have the
following modes of motion, represented on the diagram 𝑀 =
𝑀(𝜔) , which characterizes the relationship of force and
kinematic parameters of the drive (Fig. 1a).
1) The beginning of motion (start) at switching on the
motor - the section 𝐴𝐵 of the diagram corresponding to the
characteristics of the induction electric motor М = М0 −
𝑏𝜔0 . Here М0 - the starting motor torque, 𝜔0 - starting angular Fig. 2. 1- Adaptive drive; 2- motor; 3- power supply with voltage regulator;
velocity, 𝑏is the starting coefficient. The start occurs at the 4-6- input and output angular velocity meters; 5- power supply.
increased power of the motor. The drive allows the start of the
motor together with the toothed variator. The characteristic of
the motor at the start coincides with the characteristic of the
output shaft of the drive taking into account the gear ratio of
1. The acceleration takes place with an increase in the output
angular velocity and some decrease in the output torque of
resistance M.
The point B at the end of the start determines the constant
motor parameters in the operating mode of motion 𝑀𝑒 , 𝜔𝑒 .
The section 𝐵𝐸 of the full motor characteristic is not used.
The variator has the same parameters.
At point B, there is a single-motion at 𝑀𝐻2 =
𝑀𝐻1 , 𝜔𝐻2 = 𝜔𝐻1 . The angular velocity line 𝑃𝑘𝑠 of link 5 is
at its original position , which coincides with the line 𝐴𝑠𝑏. The
pole P (instantaneous center of velocity of link 5) coincides
with point A.
2) Gearbox operating mode with overcoming variable
(including sharply varying) loads - Load increasing - section
Fig. 3. 3D Model of the Adaptive Drive
BC of the diagram corresponding to the adaptive variator
- 248 -
Initial data: 1) 𝑃 = 𝑀𝜔 – electric motor power, here 𝜔 =
𝜔𝐻1 – angular velocity of electric motor.
𝑀 = 𝑀𝐻1 – electric motor torque М = 2.5 𝑁𝑚 , 𝑃 =
𝑀𝜔 = 2.5 ⋅ 40 = 100 Nm/s.
2) 𝑀𝑖 = 𝑀𝐻2𝑖 𝑖 = 𝐴, 𝐵, 𝐶, 𝐶′, 𝐶′′, 𝐷, 𝐸 – output torque of
resistance.
1. Start. Section AB: Initial data: 𝑀𝑖 = 𝑀𝐻2𝑖 𝑖 = 𝐴, 𝐵,
𝑀𝐴 = 3𝑀 = 3 ⋅ 2.5 = 7.5 𝑁𝑚, 𝑀𝐵 = 𝑀 = 2.5𝑁𝑚 .
𝜂 = 0,90 – Motor efficiency at minimum load.
Formula for calculating the angular velocity in rad/s
𝑃𝜂 100×0.9 𝑟𝑎𝑑 Fig. 4. Diagram of angular velocity versus drag torque
𝜔𝑖 = 𝑃𝜂/𝑀𝑖 , 𝜔𝐴 = 0, 𝜔𝐵 = = = 36 .
𝑀𝐵 2.5 𝑠
IV. ANALYSIS OF DRIVING REGIMES
Initial point of operating mode B: 𝜔В = 36 𝑟𝑎𝑑/𝑠, МВ =
2,5 𝑁𝑚 The analysis of the driving modes and a comparison
between the adaptive drive and the existing drive yield the
2. Operating mode. following main results:
2.1 Increase in load. Section 𝑩𝑪𝑪′ . During the start phase (AB section), both the adaptive
drive and the existing drive exhibit a motor characteristic that
Initial data 𝑀𝑖 𝑖 = 𝐶, 𝐶′ , 𝑀𝐶 = 15 𝑁𝑚 , М𝐶′ =
aligns with the output shaft characteristic, taking into account
25 𝑁𝑚,𝑀𝑓𝑖 = 𝑓𝑀𝑖 is the friction torque applied to the output a transmission ratio of 1. Acceleration occurs as the output
shaft, angular velocity and the starting torque of resistance M
𝑓 = 0,2 - the average reduction factor, 𝑀𝑓𝐶 = 𝑓𝑀𝐶 = increase.
0.2 × 15 = 3 𝑁𝑚. In the operational mode with variable resistance (section
𝑀𝑓𝐶 ′ = 𝑓𝑀𝐶 ′ = 0.2 × 25 = 5 𝑁𝑚. BC), the existing drive requires changes in motor parameters
and M through its control system. The control system,
Output angular velocity consisting of a clutch, electromagnetic components, and
100
friction brakes, transmits signals to adjust the motor
𝜔𝑖 = 𝑃/(𝑀𝑖 + 𝑀𝑓𝑖 ) , 𝜔𝐶 = = 5.55 𝑟𝑎𝑑/𝑠 , 𝜔𝐶′ = parameters based on the variable drag torque M. The coupling
15+3
100 mechanism and the drive mechanism interact through their
= 3.33 𝑟𝑎𝑑/𝑠.
25+5 respective complex control systems.
2.2. Load reduction from the starting position. Plot BD. On the other hand, the adaptive drive operates without a
Initial data: 𝑀𝐷 = 1 𝑁𝑚 - moment of resistance control system. In the BC section, the variable drag torque is
autonomously overcome by the adaptive variator through self-
𝑀𝑓𝐷 = 𝑓𝑀𝐷 = 0.2 ⋅ 1 = 0.2 𝑁𝑚 - the friction torque regulation. Additionally, the adaptive variator can
applied to the output shaft. independently switch to the multiplier mode (BD section)
100 when the drag torque decreases, greatly expanding the control
Output angular velocity 𝜔𝐷 = = 83.3 𝑟𝑎𝑑/𝑠. range.
1+0.2
3. Stop mode of motion 𝐶 ′ - the point shifts to the position Consequently, the adaptive self-regulating drive,
′′
𝐶 - emergency stop when the motor is running 𝜔𝐶′′ = 0, operating without a control system, achieves full and
𝑀С′′ = 30 𝑁𝑚, instantaneous adequacy to the variable drag torque, ensuring
trouble-free operation. In the event of an emergency overload
4. Stop of the electric motor after switching off - the (point C'), the actuator's output shaft will stop while the motor
section 𝐵𝐸 is a section of the electric motor characteristic. continues running, causing the mechanism to enter a one-
Point B shifts to position E. 𝜔𝐸 = 40 𝑟𝑎𝑑/𝑠, 𝑀𝐸 = 0 𝑁𝑚. degree-of-freedom state. Furthermore, a motor operating
After the motor is switched off, point B passes to the origin without a control system exhibits higher efficiency, reducing
of coordinates O. the actuator's weight due to improved efficiency and the
absence of braking and acceleration mechanisms.
TABLE I. PARAMETERS OF VARIATOR OUTPUT SHAFT
Comparison based on design parameters:
Point А В С C’ C’’ D E
1. The adaptive drive utilizes a single motor,
Momentum 7. 2. 15 25 30 1 0 eliminating the need for a separate motor
of resistance, 5 5 for electromagnetic braking.
Nm
Angular 0 36 5.55 3.33 0 83.3 4 2. It achieves full adaptation and
velocity, 0 instantaneous and adequate response to load
rad/s changes without requiring a control system
or adjustments, thereby preventing
emergencies.
Key results of the analysis:
3. The motor control system is eliminated.
- 249 -
4. Reliability and quality of drive operation
are increased.
5. The design is simplified.
6. The drive's size and weight are reduced.
V. CONCLUSION
The developed mathematical model of the central type
existing docking mechanism can be effectively applied to a
docking mechanism equipped with an adaptive actuator,
utilizing the provided simplifications.
Structural modifications:
1. A comprehensive dynamic analysis of the
actuator's motion modes has been
conducted.
2. The results of the dynamic analysis affirm
the significant advantages of the designed
drive.
ACKNOWLEDGMENT
The research was supported by grant no. AP09258712
"Development of self-adjusting electric drives for
spacecrafts".
REFERENCES
[1] Crockett Samuel J. Shiftless, continuously-aligning transmission. Patent
of USA 4,932,928, Cl. F16H 47/08, U.S. Cl. 475/51; 475/47.1990, 9 p.
[2] Harries John. Power transmission system comprising two sets of
epicyclic gears. Patent of Great Britain GB2238090 (A). 1991, 11 p.
[3] Levitskij N.I. Teoriya mekhaniziov i mashin. Moskva. Nauka. 1979. рр.
576.
[4] Markeev A.P. Teoreticheskaya mekhanika. Moskva. Nauka. 1990. рр.
416.
[5] Ivanov K.S. Prospects of Creation of Mechanisms with Two Degree of
Freedom. IFToMM World Congress on Mechanism and Machine
Science. Advances in Mechanism and Machine Science. Springer
Nature Switzerland AG 2019. https://doi.org/10.1007/978-3-030-
20131-9_93. PP 937-946.
[6] Ivanov K.S., Tulekenova D.T., M. Ceccarelli. An Adaptive Drive of
Spacecraft Docking Mechanism // Mechanisms and Machine Science,
Meder2021. Springer. Vol 3. ISSN 2211-0992. 2021. pp. 168-178.
[7] Syromyatnikov V.S. Stykovochnye ustrojstva kosmicheskih apparatov //
Mashinostroenie, Moskva. 1984. рр. 216.
[8] Yаskevich A. V. Kinematicheskaya skhema stykovochnogo mekhanizma
tipa «shtyr'–konus» dlya perspektivnyh kosmicheskih korablej. №
4(19)/2017 KOSMICHESKAYA TEKHNIKA I TEKHNOLOGII. RF.
Moskva. 2017. рр. 95 – 104.
[9] Yаskevich A. V., Pavlov V. N., Shepelkin N. A. Stykovochnyj
mekhanizm kosmicheskogo apparata. Patent RF № RU 2706639.
19.11.2019. pp. 12.
[10] Yaskevich A. V. Matematicheskie modeli gisterezisa, opisyvayushchie
deformacii mekhanizmov dlya stykovki kosmicheskih apparatov.
Elektronnyj zhurnal «Trudy MAI». Vyp. 83. Rezhim dostupa:
http://mai.ru/science/trudy/index.php. 2015. pp.– 23.
[11] Golubev YU. F., YAskevich A.V. Komp'yuternoe modelirovanie
dinamiki stykovochnyh mekhanizmov central'nogo tipa dlya
kosmicheskih apparatov // Preprinty IPM im. M.V.Keldysha.
doi:10.20948/prepr-2019-89. URL:
http://library.keldysh.ru/preprint.asp?id=2019-89. № 89. 2019. pp. 40
- 250 -
Underwater robot propulsion system
Ivanov K.,1 Alipbayev K.1*, Saurova K.1
1
Almaty University of Power Engineering and Telecommunications, Kazakhstan
Email: [email protected]
Abstract— Research and development of uninhabited represent a new class of managed objects with distinct tasks,
underwater robotic systems and complexes have been completed practical applications, technological features, and system
[1]. The history of underwater robotics formation and compositions. Simultaneously, the systems incorporated into
development spans over 40 years, during which significant AUUVs and ship equipment differ significantly in their
changes have occurred in the means and methods of organizing, purposes and physical principles of operation, imposing strict
creating, and applying these systems and complexes. There are and often contradictory requirements on design technology
three types of uninhabited underwater vehicles (UUV): towed, and internal system organization. Expanding the functionality
cable-controlled, and autonomous. of AUUVs is also associated with addressing several new
Towed UUVs (TUUVs) are utilized for surveying large areas
theoretical challenges, including control, navigation,
when searching for sunken objects, as well as for various types
of oceanographic measurements. They are equipped with search
communication, vehicle orientation, environmental data
equipment and meters to measure physical and chemical collection, and storage, as well as ensuring device safety in
parameters of the water environment. These devices are normal and exceptional circumstances.
connected to the towing vessel by a cable that transmits Noteworthy advancements in recent years have been made
electricity and information. As the depth of immersion increases possible through corporate collaboration and the involvement
and the tether cable becomes longer, operational difficulties for of specialized firms in equipping underwater vehicles with
the "ship unit" complex are significantly amplified, resulting in
industrial systems based on international standards,
increased mass and dimensions of the marine equipment.
Consequently, this leads to an increase in the displacement and
measurement instruments, and scientific equipment.
operational costs of the towing vessel. However, towed systems Currently, a considerable body of methodological and
are more efficient in obtaining essential information, which is practical experience has been accumulated worldwide in the
crucial for search operations. creation and utilization of underwater robotic systems to
address research and applied challenges across various
Keywords— remote-controlled tethered, underwater industries. Progress in this field lies in the development of
robotic systems, autonomous underwater vehicles,
more advanced systems, technologies, and multifunctional
multifunctional robotic complex, modular technology.
complexes that can tackle a wide range of tasks in complex
underwater environments. Consequently, UUVs have become
I. INTRODUCTION
specialized: search towed, remote-controlled working with
Remote-controlled tethered UUVs (RCTUUVs) are cables, and autonomous research vehicles. Therefore, it is
typically employed as operational devices designed for lifting widely believed that a complex comprising devices of these
sunken objects and performing various tasks underwater. three types is optimal for addressing a broad spectrum of tasks.
They can also be utilized for surveying objects and localized Moreover, many experts express the opinion that such devices
areas of the seabed. RCTUUVs are equipped with different should generally be multifunctional, relying on modular
actuators depending on the nature of the task. Manipulators, technology, interchangeable equipment, and the ability to
which mimic the motor functions of human hands, are the undergo functional restructuring.
most commonly used and versatile components.
Phototelevision installations enable object inspection, bottom The use of new technologies has significantly expanded
relief analysis, documentation of situations, and manipulator the scope of AUUVs. Currently, numerous projects and
control. Hydroacoustic stations are typically employed to existing developments focus not only on previously
guide RCUUVs to the designated work area. These devices established relatively affordable applications but also on
possess a high level of maneuverability but have limited entirely new endeavors in oceanography, servicing various
range. In recent years, the use of fiber-optic cables has industries, and military programs.
significantly expanded the operational capabilities of The development of priority areas in underwater robotics
RCTUUVs, particularly in inspection work and the involves the advancement of system architectures, models,
examination of various underwater structures. and methods for intelligent control and spatial orientation,
Initially, autonomous vehicles (AUUVs) were primarily ensuring the safety and survivability of autonomous
utilized for military purposes, such as mine search, underwater robots in uncertain and extreme environmental
identification, and destruction, simulation of underwater conditions. Achieving optimal navigation and control tasks
targets, homing weapons, and ice research. Subsequently, through integrated processing of all available information
AUUVs began to be predominantly used as information- about the environment and the underwater robot's condition is
gathering robots for research purposes in the exploration of of utmost importance. Such tasks encompass reaching a
the World Ocean. specific point or spatial area, real-time analysis of scenes, and
decision-making under complex and extreme environmental
The practice of creating and implementing UUVs conditions. An urgent task in the intellectualization of AUUV
demonstrates that AUUVs occupy a prominent position within control systems is the construction of comprehensive
the multifunctional robotic complex. Modern AUUVs modeling complexes capable of generating a virtual
- 251 -
environment, visualizing the device's missions, and robots, their systems, and complexes. Currently, the institute
supporting the operation of sensor devices in simulation is conducting research on the topic: "Research on priority
mode. Additionally, addressing the more complex problem of directions for creating underwater robotic systems for
3D reconstruction of the underwater environment, crucial for automated survey of the water environment and seabed
real-time spatial route planning using the vehicle's own topography, marine infrastructures, and physical fields of the
intelligence, is also intended. A problem-oriented ocean." This research is part of a scientific research program
geoformation system designed for interactive display of the funded by the budget, and additional research and
underwater environment and robot control is a necessary development work is carried out based on state tasks for
component of such tools. various departments.
In addressing the aforementioned general problems, there To propel underwater robots efficiently, optimal
is a notable trend towards integrating the functional properties propellers that minimize energy consumption should be
of autonomous and remote-controlled underwater robots to employed. The most common engine design is in the form of
create versatile groups of information-interacting devices that a propeller, which differs fundamentally from the natural
are relatively simple, reliable, and efficient. Some of these propulsion used by fish—tail propellers. Fish tails perform
problems are already being solved at the current level of reciprocating movements and can achieve high speeds (up to
understanding, while others will be resolved in the near future. 80 km/h for dolphins). Currently, underwater robot designs
For instance, the development of small autonomous vehicles have been created that simulate movement using a fish tail
with energy-intensive and renewable power sources enables (robot fish). However, these structures only provide forced
the implementation of an automated network for oscillatory motion for the main link, while the remaining links
oceanographic measurements and underwater situational have free movement.
awareness across the vast expanses of the world's oceans.
Similar advancements can be achieved in the creation of high- To create a water engine, a multi-link lever mechanism of
precision integrated underwater navigation systems based on a vibrating machine can be utilized [1]. This mechanism can
autonomous, sonar, and satellite technologies. Many modern have a spatial structure with forced movement of all links,
autonomous vehicles already possess navigation systems that ensuring high motor efficiency. This work focuses on
allow for location correction during tasks that require describing and researching the design of a three-dimensional
increased range and navigation accuracy. propulsion system for a water manipulator with forced
movement of all links. The report presents a fundamentally
The advancement of the robotic complex is directly new lever mechanism for the water engine and conducts a
dependent on the technological foundation that can meet the dynamic analysis of its operation.
ever-growing requirements for tactical, technical, and
functional characteristics of devices and their systems. In this
regard, the existing experience in modular technology is II. DESIGN OF A VOLUMETRIC WATER PROPULSION SYSTEM
invaluable, but it also necessitates proper analysis and
generalization, taking into account global trends. Several The volumetric water propulsion system is depicted in the
pressing problems are associated with the implementation of top view (Fig. 1). It consists of a base (rack) 0, an input crank
ongoing and innovative projects, including: 1 with a motor, and an output structural group 2-3-4-5-6-7-8-
9-10-11, forming a closed loop. The links 3, 5, 7, 9, and 11 are
− Introduction of new system technologies based on equipped with vertical rectangular blades, which constitute the
unified elements that enable the construction of different working surface of the engine interacting with the water
hardware and software configurations, allowing for structure environment. The kinematic chain of this system comprises
reconfiguration based on tasks and actual working conditions. n=11 moving links and p=16 rotational kinematic pairs,
− Establishment of a metrological experimental base resulting in a total number of degrees of freedom, denoted as
for the development, testing, and pilot operation of the created W.
equipment.
T=3n-2p=3x11-2x16=1 (1)
An important aspect of modern AUUV development is
related to the miniaturization of electronic systems and
devices in general. Microelectronic structures and This indicates that the kinematic chain is capable of
technologies are widely utilized in the architecture of compact motion and functions as a mechanism. Each component of the
devices and their systems. This issue is particularly relevant in mechanism executes well-defined predetermined movements.
the mass production of small devices intended for operation in When in operation, the input crank 1 imparts motion to the
shallow depths. While miniaturization of individual electronic connected structural group, resulting in reciprocating
devices (microprocessors, sensors, actuators) is relevant for all movements. In Fig. 1, the contour lines represent the initial
types of vehicles, there are limitations to miniaturization when position of the mechanism, while the dotted lines represent
creating deep-sea vehicles due to specific tactical and intermediate positions. The intermediate positions of the
technical requirements. However, significant progress can be mechanism exhibit symmetry relative to the centerline.
observed in the creation of specialized underwater robots
designed to fulfill a limited range of tasks. The autonomous
underwater robots developed in recent years can already serve
as prototypes for the next generation of "intelligent" devices.
The Institute of Marine Technology Problems (IMTP) at
FAB RAS, the leading organization in Russia in the field of
underwater robotics, has gained unique experience in the
creation and practical use of various types of underwater Fig. 1 - Volumetric propulsion of the underwater robot
- 252 -
𝐽10 = 0, 𝐽11 = 0, 𝐽9 ≠ 0,
It is indeed possible to analyze the kinematics of the
1 (−𝐽2 𝜔22 − 𝐽3 𝜔32 − 𝐽4 𝜔42 − 𝐽5 𝜔52 − 𝐽6 𝜔62 − 𝐽7 𝜔72 − 𝐽8 𝜔82 −
mechanism by creating velocity and acceleration profiles. 𝜔9 = − (√
−𝑚2 𝑣22 − 𝑚3 𝑣32 − 𝑚4 𝑣42 − 𝑚5 𝑣52 − 𝑚6 𝑣62 −𝑚7 𝑣72 − 𝑚8 𝑣82 −𝑚9 𝑣92 )
)
√𝐽9
Regarding the dynamics of the water propulsion
mechanism, a velocity profile can be constructed for an
extreme position. This profile can then be used to calculate Roots for the variable 𝑣2
the kinetic energy using the formula:
1 (−𝐽 𝜔2 − 𝐽3 𝜔32 − 𝐽4 𝜔42 − 𝐽5 𝜔52 − 𝐽6 𝜔62 − 𝐽7 𝜔72 − 𝐽8 𝜔82 − 𝐽9 𝜔92 − 𝐽10 𝜔10
2 2
− 𝐽11 𝜔11
𝑣2 = (√ 2 2 )
−𝑚3 𝑣32 − 𝑚4 𝑣42 − 𝑚5 𝑣52 − 𝑚6 𝑣62 −𝑚7 𝑣72 − 𝑚8 𝑣82 −𝑚9 𝑣92 )
√ 𝑚2
T = 0.5 J i i2 + 0.5 miVi 2 (2)
i = 2...11 i = 2,3,5,7,8,9
Derivative:
Here 𝐽- link moment of inertia, 𝜔 - link angular velocity, 11 9
𝜕 1 1
𝑚 - link mass, 𝑉- link center of mass velocity ( ∑ 𝐽𝑖 𝜔𝑖2 + ∑ 𝑚𝑖 𝑣𝑖2) =
𝜕𝑣2 2 2
𝑖=2 𝑖=2
1
𝜕( (𝐽2𝜔22 + 𝐽3𝜔32 + 𝐽4 𝜔42 + 𝐽5𝜔52 + 𝐽6𝜔62 + 𝐽7𝜔72 + 𝐽8𝜔82 + 𝐽9 𝜔92 + 𝐽10𝜔10
2 2 )
+ 𝐽11𝜔11
∑𝑖=2…11 𝐽𝑖 𝜔𝑖 + ∑𝑖=2…9 𝑚𝑖 𝑣𝑖 (3) 2
1 2
+ (𝑚2𝑣22 + 𝑚3 𝑣32 + 𝑚4 𝑣42 + 𝑚5𝑣5 + 𝑚6 ))𝑣62+𝑚7 𝑣72 + 𝑚8 𝑣82+𝑚9 𝑣92))
2
𝜕𝑣2
Input interpretation:
1 ∆𝑇
𝑇 = (𝐽2 𝜔22 + 𝐽3 𝜔32 + 𝐽4 𝜔42 + 𝐽5 𝜔52 + 𝐽6 𝜔62 + 𝐽7 𝜔72 = 𝑀1 𝜔1 − 𝑀𝑁 𝜔𝑁
2 𝑡
+ 𝐽8 𝜔82 + 𝐽9 𝜔92 + 𝐽10 𝜔10
2 2 )
+ 𝐽11 𝜔11 +
1 The formula of the forces of adaptation:
2 2 2 2 2 2
(𝑚 𝑣 + 𝑚3 𝑣3 + 𝑚4 𝑣4 + 𝑚5 𝑣5 + 𝑚6 𝑣6 +𝑚7 𝑣7
2 2 2
+ 𝑚8 𝑣82 +𝑚9 𝑣92 ) ∆𝑇
− + 𝑀1 𝜔1
𝜔𝑁 = 𝑡
Alternate form: 𝑀𝑁
1 1 1 1 1 1 Then
− 𝐽2 𝜔22 − 𝐽3 𝜔32 − 𝐽4 𝜔42 − 𝐽5 𝜔52 − 𝐽6 𝜔62 − 𝐽7 𝜔72 −
2 2 2 2 2
2
1 1 1 1 1 (I = 2 … 11) J
𝐽8 𝜔82 − 𝐽9 𝜔92 − 𝐽10 𝜔10 2 2
− 𝐽11 𝜔11 − 𝑚2 𝑣22 −
2 2 2 2 2 𝑀
1 1 1 1 1 𝑀 = 𝐽𝜀; J =
𝑚3 𝑣32 − 𝑚4 𝑣42 − 𝑚5 𝑣52 − 𝑚6 𝑣62 − 𝑚7 𝑣72 − 𝜀
2 2 2 2 2
1 1
𝑚8 𝑣82 − 𝑚9 𝑣92 + 𝑇 = 0 Result of the drive:
2 2
J (I={2,3,4,5,6,7,8,9,10,11})
Expanded form:
Using closest interpretation:
1 1 1 1 1
𝑇 = 𝐽2 𝜔22 + 𝐽3 𝜔32 + 𝐽4 𝜔42 + 𝐽5 𝜔52 + 𝐽6 𝜔62 + (I = 2 … 11) = M
2 2 2 2 2
1 1 1 1 1
𝐽7 𝜔72 + 𝐽8 𝜔82 + 𝐽9 𝜔92 + 𝐽10 𝜔10 2 2
+ 𝐽11 𝜔11 + More interpretations:
2 2 2 2 2
1 2 1 2 1 2 1 2
𝑚 𝑣 + 𝑚3 𝑣3 + 𝑚4 𝑣4 + 𝑚5 𝑣5 + (I = 2 … 11) J; (I = 2 … 9) m
2 2 2 2 2 2
1 1 1 1
𝑚6 𝑣62 + 𝑚7 𝑣72 + 𝑚8 𝑣82 + 𝑚9 𝑣92 From the diagram (Fig. 2), it is evident that each
2 2 2 2
component of the mechanism executes precisely determined
Roots: forced movements.
𝐽11 ≠ 0,
(−𝐽2 𝜔22 − 𝐽3 𝜔32 − 𝐽4 𝜔42 − 𝐽5 𝜔52 − 𝐽6 𝜔62 −
1
𝜔11 = − (√ 𝐽7 𝜔72 − 𝐽8 𝜔82 − 𝐽9 𝜔92 − 𝐽10 𝜔10
2
)
√𝐽11 −𝑚2 𝑣22 − 𝑚3 𝑣32 − 𝑚4 𝑣42 − 𝑚5 𝑣52 − 𝑚6 𝑣62 −𝑚7 𝑣72 − 𝑚8 𝑣82 −𝑚9 𝑣92 )
𝐽11 = 0, 𝐽10 ≠ 0,
(−𝐽2 𝜔22 − 𝐽3 𝜔32 − 𝐽4 𝜔42 − 𝐽5 𝜔52 − 𝐽6 𝜔62 −
1
𝜔10 = − (√ 𝐽7 𝜔72 − 𝐽8 𝜔82 − 𝐽9 𝜔92 − )
√𝐽10 −𝑚2 𝑣22 − 𝑚3 𝑣32 − 𝑚4 𝑣42 − 𝑚5 𝑣52 − 𝑚6 𝑣62 −𝑚7 𝑣72 − 𝑚8 𝑣82 −𝑚9 𝑣92 )
- 253 -
Additionally, the diagram (Fig. 3) illustrates the operating
time of the input crank 1, which undergoes reciprocating
movements. The graph demonstrates the movement of the
mechanism in response to the applied forces.
- 254 -
Research and design of an efficient adaptive
drive with balancing friction coupling
Konstantin Ivanov, Kazakhstan ([email protected]), Aidos Sultan, Kazakhstan ([email protected])*, Kuanysh Alipbayev,
Kazakhstan ([email protected]), Komekbayev Arman, Kazakhstan ([email protected])
Almaty University of Power Engineering and Telecommunications named after Gumarbek Daukeyev, Almaty, 050013,
Kazakhstan
Abstract— Contemporary research efforts in the scientific Research has demonstrated that multi-speed
and technical domain prioritize the automation of processes, transmissions can decrease a vehicle's total energy
systems, and devices, with notable applications in fields such as consumption, leading to extended travel range with smaller
aerospace, robotics, and electric transportation technology. battery packs, heightened dynamic performance, and
Adaptive systems provide practical solutions to the technical enhanced climbing capabilities. However, the efficacy of
and design complexities inherent in automating technological traditional multi-stage gearboxes typically falls short
tools and processes. The development of an efficient and compared to their single-stage counterparts [6].
dependable transmission system for electric autonomous and
mobile vehicles is possible through the application of an Recent studies have shown that multi-ratio systems can
adaptive mechanical drive with two degrees of freedom. The reduce energy consumption by 2 to 20% for various driving
proposed innovative transmission system, a continuous multi- cycles [5], [6], [7] and increase drive wheel torque by 35%
speed drive featuring an auxiliary friction coupling, facilitates [8], although this results in to a decrease in efficiency.
the adaptation of this two-mobile system. This unique
adaptation ability of the two-mobile self-regulating mechanical For heavy-duty vehicles that, due to their mass, need
drive allows it to independently adjust to external load via a very high torque for acceleration, multi-speed gearboxes
balancing friction coupling that connects the frictional moment may be more necessary so that a machine with lower torque
to the relative angular velocity. and less tractive effort can be used [9].
This paper explores the interplay of parameters within a The results of «Development of a Multi-Speed Dual
two-mobile system to enhance the efficiency of the self- Clutch CVT for Electric Vehicles» show that electric
adjusting adaptive drive across a broad range of regulation, vehicles can gain significant range advantages from multi-
utilizing friction coupling. speed transmissions. CVT shows the greatest potential and
is one of the most promising transmissions for electric
Keywords— Self-adjusting adaptive drive; additional vehicles [10]. However, the use of a double clutch or other
constraint; friction coupling; friction moment; regulatory auxiliary control devices complicates the design of the drive
efficiency. and reduces efficiency.
I. INTRODUCTION It was noted in [11] that adaptive transmission control
can be used to further improve the adaptability to working
Modern automatically controlled drives are constructed
conditions and the economy of the vehicle. However, this
through the refinement of multi-stage Continuously Variable
also leads to a more complex design.
Transmission (CVT) designs. As mechatronics technology
advances, a variety of novel drives are being incorporated The paper [12] proposes a dual motor configuration in
into drive systems to boost transmission efficiency. [1]. which two smaller motors are connected via a planetary
There is a growing trend towards decreasing the number of gear, as opposed to the standard configuration which uses a
stages in systems while preserving an extensive control single larger motor directly connected to the drive wheels
range. In efforts to enhance the efficiency of drive systems with a fixed ratio reduction gear. The main disadvantage of
for mobile robots and electric vehicles, the application of this configuration is the problem of additional unsprung
multi-speed transmissions is being extensively examined. mass due to the twin-motor design, which degrades the
[2]. dynamic performance of the electric vehicle. Also, the
investigated multi-speed twin-engine transmission is not
The utilization of multi-speed gearboxes in the
suitable for driving in unprepared terrain, since this type of
transmissions of battery electric vehicles is under active
configuration was only effective at low speeds and high
research. Their multi-ratio configuration helps keep the
torques. The dual motor drive system requires the use of a
electric motor functioning within a higher efficiency region.
control, which also complicates the design.
This results in decreased energy usage by the vehicle and
improved dynamic performance. [3]. The paper [13] proposes a two-speed automatic manual
transmission with a selectable one-way clutch. The
The use of a multi-stage gearbox increases the cost of
developed drive consists of a high-speed motor and a
producing an electric vehicle and requires the introduction
mechanical switching drive, and can carry out switching
of a gearbox control [4] and the development of a gear shift
without interrupting the energy flow. The main disadvantage
algorithm [5].
of the studies performed is that the automatically controlled
- 255 -
drive is built on the basis of the use of single-moving
mechanical elements connected by a control system. As a
result, a most complex controlled electromechanical system
is created, which has a low adequacy to a changing external
load and low efficiency.
On the above grounds, to create an efficient, compact
system and an automatically controlled drive, it is proposed
to use a previously developed adaptive mechanical system
with two degrees of freedom without a control system [14].
The self-adjusting adaptive drive [15] is fundamentally
different from all the drives considered above in that it Fig. 1. Adaptive drive
provides effective overcoming of the resistance torque in a
given wide range due to the use of two degrees of freedom.
The adaptive gear variator's kinematic chain, as depicted
The controllability of a bi-mobile system's motion with in Fig. 2a, comprises a rack 0, an input carrier H_1, a
a single input is accomplished by the introduction of cyclical gear assembly of 1-2-3-6-5-4, and an output carrier
an additional constraint that facilitates the replacement H_2. The gears 1, 2, 3, 6, 5, 4 shape a flexible closed loop
of the arising unbalanced force with a computed with a dynamic linkage. Additional gears, 8 and 7, constitute
resistance moment. This supplementary constraint is an extra parallel transmission originating from carrier H_2
realized by employing a friction joint which provides a to satellite 5. This closed loop encompasses an input satellite
compensatory resistance moment. Nevertheless, the 2, an array of sun wheels labeled 1-4, a cluster of ring
mechanical converter, characterized as a friction joint wheels denoted as 3-6, and an output satellite 5.Drive works
in the investigated scheme, does not serve as a as follows: the input shaft with the input carrier transmits
structural element due to its substantial geometric the movement to the input satellite 2. Input satellite 2
transmits motion to gear blocks 1-4 and 3-6. Wheel blocks
parameters (trunnion radius) which are inconsistent 1-4 and 3-6 transmit the movement to the output satellite 5
with the scheme. and the output carrier . At the same time, a kinematic
This article explores the interaction of parameters within chain with an additional parallel transmission of gears 8-7
a two-mobile system with the objective of enhancing the transmits the movement from the input carrier to the
efficiency of a self-regulating adaptive drive, given a broad output satellite 5 and the carrier . Parallel gear 8-7 has a
range of regulation, based on the utilization of a balancing gear ratio equal to the gear ratio of the planetary kinematic
friction coupling. chain.
The subsequent structure of this article is arranged as
follows: Section 2 details the kinematics of the adaptive
drive. Section 3 introduces an optimization algorithm for
determining the optimal kinematic and power parameters of
an adaptive drive. In section 4, a numerical computation of
the kinematic and power parameters of an adaptive drive is
executed, culminating in the determination of efficiency.
Section 5 reviews the findings obtained. Section 6 offers the
principal conclusions. Lastly, Section 7 discloses the
funding sources.
II. DESCRIPTION OF THE KINEMATIC CHAIN OF THE ADAPTIVE
DRIVE
An adaptive drive, also referred to as AD, is a
mechanism that self-modifies as depicted in Fig. 1. This Fig. 2. Adaptive drive (a), plan of linear velocities of
drive embodies the principle of power adaptation, where the drive (b), determination of relative angular velocity (c)
speed of the output link correlates inversely with the
fluctuating output load. Though it possesses two degrees of Parallel gear 8-7 can create an effective force-velocity
freedom and a single input, it seemingly conflicts with the constraint. In the present work, the creation of force-
prerequisites for a mechanism's existence and its motion's velocity constraint by means of an adjustable friction
definability. The underlying assumption is that the precise coupling 10 connecting wheels 5 and 7 using an adjustable
definability of motion provides the essential and adequate tension screw 9 is given. The tensioning screw 9 creates a
conditions for power adaptation. [15]. A necessary condition normal reaction and frictional moment in the coupling 10
is provided by a movable closed loop made up of gears. The required for equilibration.
sufficient condition provides an additional constraint
between force and velocity. Figure 2c shows a simplified plan of linear velocities for
easier visual perception.
Figure 3 shows a structural description of a 3D model of
an adaptive drive.
- 256 -
– radius of the joint.
– the relative angular velocity of links 7 and 5.
The sufficient condition for power adaptation is
represented by the power balance equation with the addition
of power consumed by friction.
The power balance for a kinematic chain withadditional
frictional parallel constraint is as follows:
(4)
- 257 -
As an example, let's define the parameter values for one .
of the calculation options.
Initial data: Let’s determine the value of the efficiency of the
The adaptive drive has the given constant motor power mechanism according to the following Eq.:
parameters on the input link and the given
value of variable output torque resistance on the output %= .
link (figure 2a).
It is required to determine the power and kinematic According to this solution algorithm, we determine the
parameters of the drive. remaining parameters that determine the sufficient condition
Model №1. of power adaptation at the corresponding values of and
from Table 1. The obtained data are summarized in
Given: = 100 s-1, = 10 Nm, Table 2.
= [10, 15, 20, 25, 30, 35, 40, 45, 50] Nm,
TABLE II. RESULTS OF CALCULATIONS FOR AD-1 WITH A
= 4 Nm, SUFFICIENT CONDITION OF POWER ADAPTATION
- 258 -
and .
Solution: s
-1
.
First, the decision is made for AD-2 with a preliminary
relative angular velocity . 2) For an additional gear at = 72 s-1:
Using Eq. (5) and the output torque data from Table 1,
we determine the values of the output angular velocity . .
As an example, determine the value of at = 10
Nm using the following constants:
s-1.
W.
Determine the variable value of the relative angular
velocity by the Eq. (8):
s-1.
W.
Determine the value of the power for friction using
the Eq. (3):
Calculation of the output angular velocity at =
10 Nm:
.
= 10 Nm:
Determine the value of the output angular velocity
using the Eq. (5):
s-1.
Using this solution algorithm, determine the remaining
parameters , which determine the approximate Determine the value of efficiency according to the Eq.
sufficient condition of power adaptation at the (9):
corresponding values of . The obtained data are
summarized in Table 3. %= .
TABLE III. Values of output torque and output
angular velocity for AD-2 with an approximately sufficient After performing calculations according to Eqs. (5)...(9),
condition of power adaptation respectively, for each value of and from Table 3,
build Table 4 with the results of calculations
10 15 20 25 30 35 40 45 50 ( and ) for AD-3 with a real-
sufficient condition of power adaptation (there is an
72, 48, 36, 28, 24, 20, 18, 16, 14, additional frictional constraint with a real relative angular
0 0 0 8 0 6 0 0 4 velocity).
Next, consider the actual operating conditions of the TABLE IV. VALUES OF THE OUTPUT TORQUE AND OUTPUT
drive. ANGULAR VELOCITY FOR AD-3 WITH A REAL-SUFFICIENT CONDITION OF
POWER ADAPTATION
Model №3.
AD-3 with a real adaptation condition at .
Avera
s-1 s -1
s -1 s-1 W s -1
% ge
Using Eqs. (5)…(9), calculate the values of the output %
angular velocity . 10 72, 27, 21, - 30, 96, 96,
As an example, below is a numerical calculation for 0 1 6 5,5 8 9 9
= 72 s-1. 15 48, - - - 57, 62, 94,
Let's determine and for all values of (Table 3) 0 35, 45, 10, 7 8 2
using Eqs. (6) and (7) respectively: 3 6 3
1) For planetary gear at = 72 s-1:
20 36, - - - 71, 46, 92,
92,3
0 66, 79, 12, 1 4 9
5 2 7
= 25 28, - - - 79, 36, 92,
-1
s . 8 85, 99, 14, 5 8 1
2 4 2
30 24, - - - 84, 30, 91,
- 259 -
0 97, 112 15, 6 5 5 range for output angular velocity;
7 ,8 1
4)The AD-3 model's efficiency stands at an
35 20, - - - 89, 26, 91,
average of 92%, a significant improvement
6 106 122 15, 0 0 1
,4 ,3 9
compared to the AD-1 model, which averages
40 18, - - - 91, 22, 90,
63% efficiency;
0 113 129 16, 3 7 9 5) Collating findings from points 3 and 4, it is
,3 ,6 3 evident that the control range of the AD-3 model
45 16, - - - 94, 20, 90, decreased slightly compared to the AD-1 model,
0 118 135 16, 1 1 6 but this was accompanied by a substantial
,4 ,2 8 increase in efficiency.
50 14, - - - 95, 18, 90,
CONCLUSION
4 122 139 17, 8 1 4
,6 ,7 1 The analysis performed on the mechanism with two
degrees of freedom and an additional constraint
demonstrates a reliable adaptation of the output
Based on the data from Table 4, build a graph of the
traction characteristic of AD-3 with additional friction working component to a varying load. The model
coupling in the form of a dependence of the output chosen for this investigation, featuring an additional
resistance moment on the output shaft speed (Fig. balancing constraint in the form of a friction coupling,
4b). guarantees the system's reliable functioning and high
Figure 4 shows comparative graphs of the characteristics efficiency.
of AD-1 and AD-3. Although a slight increase in power losses due
to the inclusion of a friction coupling mildly
impacts efficiency and the control range, these
remain within a fairly broad spectrum. This
outcome can be attributed to the strategic
positioning of the friction coupling, which allows
for a low relative velocity of the interacting links.
The friction coupling establishes an effective
force-velocity limitation.
Figure 4 - Graphs of the dependence of the output This friction coupling forms an efficient force-
moment of resistance velocity restriction that substitutes the unbalanced
4a - Graph of the dependence of the output moment of reaction, ensuring the determinability of motion
resistance on the output angular velocity for within a specified extensive regulatory range.
AD-1 with a sufficient condition of power adaptation,
VI. SOURCE OF FINANCING
4b – Graph of the dependence of the output moment of
resistance on the output angular velocity for AD- This research has been funded by the Science
3 with a real-sufficient condition of power adaptation. Committee of the Ministry of Education and Science
of the Republic of Kazakhstan (Grant No.
AP09258712 «Development of self-adjusting electric
V. ANALYSIS OF THE RESULTS drives for spacecrafts»).
Examination of the generated results leads to
REFERENCES
the following deductions:
[1] Kim, D.H.; Kim, J.W.; Choi, S.B. Design and modeling of energy
1) The theoretical patterns of the mechanism's efficient dual clutch transmission with ball-ramp self-energizing
mechanism. IEEE Trans. Veh. Technol. 2019, 69, 2525–2536.
parameters interaction that we obtained are indeed [2] Ahssan, M.R.; Ektesabi, M.M.; Gorji, S.A. Electric vehicle with
valid. Graph 4b substantiates the consistent multi-speed transmission: A review on performances and
complexities. SAE Int. J. Altern. Powertrains 2018, 7, 169–182.
functionality of the evolved drive and the [3] Eduardo Louback, Fabricio Machado, Lucas Bruck, Phillip J.
manifestation of the power adaptation effect; Kollmeyer, Ali Emadi, «Real-Time Performance and Driveability
Analysis of a Clutchless Multi-Speed Gearbox for Battery Electric
2) The engineered mechanism boasts similar Vehicle Applications», 2022 IEEE Transportation Electrification
Conference & Expo (ITEC), pp.1041-1046, 2022.
order power adaptation and high operational [4] H. Laitinen, A. Lajunen, and K. Tammi, «Improving electric vehicle
reliability, shown by the definability of energy efficiency with two-speed gearbox», in Proc. IEEE Veh.
Power Propulsion Conf., Apr. 2017, pp. 1–5.
movement; [5] T. Hofman and C. H. Dai, «Energy efficiency analysis and
comparison of transmission technologies for an electric vehicle», in
3) The AP-3 model demonstrates a dependable Proc. IEEE Veh. Power Propulsion Conf., Mar. 2011, pp. 23–28.
- 260 -
[6] A. Sorniotti, S. Subramanyan, A. Turner, C. Cavallino, F. Viotto, and
S. Bertolotto, «Selection of the optimal gearbox layout for an electric
vehicle», SAE Int. J. Engines, vol. 4, no. 1, pp. 1267–1280, 2011.
[7] Q. Ren, D. A. Crolla, and A. Morris, «Effect of transmission design
on electric vehicle (EV) performance», in Proc. IEEE Veh. Power
Propulsion Conf., Oct. 2009, pp. 1260–1265.
[8] B. Eberleh and T. Hartkopf, «A high speed induction machine with
two speed transmission as drive for electric vehicles», in Proc. Int.
Symp. Power Electron., Elect. Drives, Automat. Motion, May 2006,
pp. 249–254.
[9] F. A. Machado, P. J. Kollmeyer, D. G. Barroso and A. Emadi, «Multi-
speed gearboxes for battery electric vehicles: Current status and future
trends», IEEE Open Journal of Vehicular Technology, vol. 2, pp. 419-
435, 2021.
[10] J. Ruan, P. D. Walker, J. Wu, N. Zhang, and B. Zhang, «Development
of continuously variable transmission and multi-speed dual-clutch
transmission for pure electric vehicle», Adv. Mech. Eng., vol. 10, no.
2, pp. 1–15, Feb. 2018.
[11] Jianjun Hu, Feng Xiao, Hang Peng, Wei Zhao. CVT discrete speed
ratio optimizations based on energy efficiency for PHEV. Alexandria
Engineering Journal Volume 61, Issue 5, May 2022, Pages 4095-
4105.
[12] Mantriota G, Reina G. Dual-Motor Planetary Transmission to
Improve Efficiency in Electric Vehicles. Machines 2021, 9, 58.
[13] Meng, D.; Wang, F.; Wang, Y.; Gao, B. In-Wheel Two-Speed AMT
with Selectable One-Way Clutch for Electric Vehicles. Actuators
2021, 10, 220.
[14] Ivanov K.S. Almaty, KZ. Gebrauchsmusterinhaber. Bezeichnung –
Einrichtung zur automatischen und kontinuierichlen Drehmoment –
und Drehzahlveranderung einer Abtriebswelle je nach
Fahrwiderstand. Urkunde uber die Eintragung des Gebrauchsmusters
Nr. 20 2012 101 273.1. Tag der Eintragung 02.05.2012. Deutsches
Patent und Markenamts. Bundesrepublik Deutschland. 2012.
[15] Ivanov K.S. Theory of adaptive mechanical drive. Theoretical and
Applied Mechanics Letters. Elsevier. Volume 11, Issue 4, 2021. P. 1 –
5.
- 261 -
August 22(TUE) - 25(FRI), 2023
Oral Session 13
Room : A434
Chair: Ainur Begimbetova (AUPET, Kazakhstan)
- 262 -
Method of predicting the service life of a linear
adjustment transformer based on the analysis of
operational reliability data
I.T. Utepbergenov1*, A.A. Tazhibayev1,3, Ye.U. Zhumagaliyev2, D.A. Yesengaliyev2, S.A. Yermetov3
1
Almaty University of Power Engineering and Telecommunications named after Gumarbek Daukeyev, Kazakhstan,
2
ZhubanovAktobe Regional University, Kazakhstan,
3
TrencoR&D LLP, Kazakhstan,
Email: [email protected]
Abstract— The main idea of the study is to study the The increase in the life cycle of the transformer resource is
possibility of identifying the service life reserves of transformers carried out by means of carrying out complex work, which is
on the basis of improving the quality of assessment and carried out on the basis of study operations and diagnostics in
prediction of reliability and calculation of operational reliability accordance with industry regulatory and technical documents.
by processing the entire volume of stored data of transformers When planning and carrying out such work, data are
obtained during the operation period. The goal of the work is to accumulated on the entire “fleet” of aging transformers
develop a methodology for assessing and predicting the throughout the entire service life. The application of an
reliability and calculating the operational reliability of a line improved power transformer maintenance plan using
regulating transformer using the available accumulated data on
reliability-oriented asset management can extend the service
its condition at the time of maintenance and repair. For
analytical studies, static data on the time between failures of the
life of transformers up to 25–30 years [6]. However, this is
LTOL-16000/10 type line regulating transformer for 32 years possible if there are reserves for the service life of
were used. The R software environment was used to calculate transformers.
standard statistical characteristics, construct distribution The main idea of the study is to study the possibility of
histograms, a leveling curve, and check the law of distribution identifying the reserves of the service life of transformers
of the time between failures of the transformers under study. based on improving the quality of assessment and prediction
The objective values of quantitative indicators of the operational
of reliability and calculation of operational reliability by
reliability of transformers are determined on the basis of
processing the entire volume of stored data of transformers
empirical operation data necessary for the design and
improvement of transformer units. It is shown that when
obtained during its operation. At the same time, the results of
applying the developed methodology, taking into account the data processing are the basis for designing and improving the
rate of thermal aging, the calculated maximum service life of system for maintenance and repair of the transformer.
power transformers of the studied class can increase to 30.97 The goal of the work is to develop an improved
years, subject to the operating conditions of power transformers methodology for assessing, predicting and identifying the
that ensure the failure rate in the degradation interval is not reliability reserve and calculating the operational reliability of
more than the failure rate of the running-in period. The results
a line regulating transformer using the available accumulated
obtained are necessary for making a decision on planning the
scope of maintenance and repair work when working with
data on its condition at the time of maintenance and repair.
transformers that have exhausted their standard resource. II. STUDY METHODS
Keywords— linear adjustment transformer; operational The methodological basis of the proposed methodology
reliability; statistical analysis; data set; predicting the service life for assessing and predicting reliability and calculating the
operational reliability of the line control transformer is the
I. INTRODUCTION static processing of data [7] on their wear and failures.
Improving the operational reliability of transformers is The work uses the data of a service organization obtained
becoming increasingly important due to the aging of the fleet during the operation of LTOL-16000/10 type line control
of transformers and the development of a certain standard transformers up to 16,000 kVA for 32 years in the process of
average life (25 years) of their service [1-3]. The operational their inspection and planning of maintenance and repair.
reliability and, accordingly, the service life of a line regulating
transformer are assessed through the following parameters: The R software environment [8] was used to calculate
reliability, serviceability and life cycle. The operational standard statistical characteristics, construct distribution
reliability and service life of transformers are affected by: the histograms, a leveling curve, and check the law of distribution
frequency of shutdowns in case of accidents, defects and of the time between failures of the transformers under study.
damages, the quality of active and structural materials used in Also, this environment is used to calculate the reliability
the manufacture of the transformer; environmental conditions indicators of transformers.
during transformer operation; lack of proper care for
transformer devices and poor quality of their repair [4, 5].
- 263 -
III. DEVELOPMENT AND IMPLEMENTATION OF THE ∆t – interval boundaries.
METHODOLOGY Output data:
A. Selection of input and output data 1) Failure rate - λ;
2) Average time between failures - Тav;
The following input data were used to assess and predict
3) Probability of failure-free operation - Р(t);
the reliability and calculate the operational reliability of the
transformer: 4) Average time of failure-free operation - Т.
t – time between failures, h; B. Calculation of statistical characteristics and
n – total number of observed values; construction of a histogram and a leveling curve for the
ni – number of values in each interval; distribution of time between failures
k – number of static distribution intervals;
TABLE I. STATIC DATA ON THE TIME BETWEEN FAILURES OF THE LTOL -16000/10 TYPE LINE CONTROL TRANSFORMER FOR 32 YEARS FOR
ANALYTICAL STUDIES
The minimum series term is 250 and the maximum is The value of the interval ∆t is determined by the formula:
21,070 hours. !!"# "!!$% %+,%+
∆t =
#$%.'()*
= #$%.'()'% = 4,666.2 ℎ (1)
The range of the series is tmax - tmin = 21,070–250 =
20,820 hours For each interval, calculations were made, and the results
The entire range of static data on the time between failures are presented in Table 2.
ti (n = 32) is divided into equal intervals, (i.e. this is the
number of failures of the transformer at a certain interval).
Static dispersion D (t) will be: Often in statistical studies, the following characteristics
are used, the standard error in determining the arithmetic
D(t) = ∑{Pi[ti м- M(t)]2} =29,984,375 h (2) average (mathematical expectation):
Standard deviation: ∆М(t) =
-(!)
=
2,452.,
= 967.99 ℎ (5)
√* √'%
σ(t) =)𝐷(𝑡) = )29,984,375 = 5,475.8 ℎ (3)
The mean-square error of determining the mean-square
deviation:
Coefficient of variation:
-(!) 2,452.,
-(!) 2,452., σ(t) = = = 484.0 ℎ (6)
V(t) = 1(!) = 2,,52
= 0.93 (4) √%* √74
- 264 -
Then, rounding the values of the deviations, we obtain: As a result of the obtained calculated data, we build a
histogram of the time between failures, which is shown in Fig.
𝑀(𝑡) = 5,875 ∓ 967,99(ℎ) (7) 1.
In Figure 1, a leveling distribution curve is constructed, related to a limited number of experimental data, or whether
*
which is a graph of the function a(t) = *∆!∙#+&' which, while they are significant and related to the fact that the fitted curve
maintaining the essential features of the statistical distribution, poorly aligns the distribution data.
is free from random irregularities in the histogram. Pearson’s goodness-of-fit test χ2:
C. Selection of the distribution law
Based on the nature of the histogram, it can be assumed !"! #"$ " (&! )()
χ2= ∑*+,- (9)
that the random variable under study is distributed according "$ " (&! )
where:
to an exponential law. This also proves the almost complete
coincidence of the value of the mathematical expectation and k is the number of statistical distribution intervals, k = 11;
the mean-square deviation of the random variable t. ni is the number of values of a random variable in each
interval;
Taking as the mathematical expectation of the time n is the total number of observed values of the random
between failures its assessment (static average) M(t) = 5,875 variable, n = 32;
h, we can write: f(t)=λe-λt. Since under the exponential P’(ti) is the theoretical probability of a random variable
#
distribution law λ= = 𝑐𝑜𝑛𝑠𝑡, then falling into the i-th interval.
М(!)
The probabilities of a random variable falling into the i-th
f (t)= λ exp (-λt) = 0.00017e -0.00017t (8) interval are given in Table 3. They are numerically equal to
When choosing a theoretical distribution curve, some the increment of the distribution function on the interval:
discrepancies between it and the statistical distribution are P’(ti<t< ti+1)= F(ti+1)-F(ti
inevitable. At the same time, it is necessary to know whether
these discrepancies are due only to random circumstances
TABLE III. THEORETICAL VALUE OF PROBABILITIES
𝒌
[𝒏𝒊 − 𝒏𝑷" (𝒕𝒊 )]𝟐
No. interval λti ei-0.00017t P'(ti) .
𝒏𝑷" (𝒕𝒊 )
𝒊%𝟏
- 265 -
7 12,000-14,000 2.0 0.13 0.04 1.28
8 14,000-16,000 2.4 0.09 0.03 0.002
The parameter R - the number of degrees of freedom. For P (t) = e- λt; f (t)= λe- λt (10)
the exponential distribution law of a random variable, the
bond number is S=2. We determine R=11-2=9. From the # #+(
Tav = ; = = 4,166 ℎ.
reference literature, the value χ2 = 4.168 was determined with %.4
the degree of freedom R=9 and the significance level α=0.9 ,,+++
[9]. Р(8,000) = 𝑒𝑥𝑝 >−
4,#77
@ = 𝑒 "#.<% = 0.147
%+,+++
D. Calculation of reliability indicators of the LTOL- Р(20,000) = 𝑒𝑥𝑝 >− 4,#77
@ = 𝑒 "4., = 0.008
16000/10 type transformers
On the basis of the calculated data obtained, we plotted the
It is necessary to determine the probabilities of no-failure graph of dependence of the probability of failure-free
operation and the average time between failures of the LTOL- operation on the time of the first order P(t) = e-λt of the LTOL-
16000/10 type transformer, for time ti = 8,000, 14,000, 20,000 16000/10 type transformer, shown in Fig. 2
h, if the failure rate λ = 2.4·10-4 h-1. With an exponential
distribution law, the following relations are true:
Determine the probability of failure: E. Assessment of the transformer service life, taking
into account the rate of thermal aging.
Q8,000 = 1 – Р8,000 = 0.853;
Experience confirms that the actual service life of the
Q14,000 =1 – Р14,000 =0.965; transformer is on average no more than 20 years.
Transformers with the same operating characteristics may
Q20,000 =1 – Р20,000 =0.992. have different service life. Thermal factors such as
insufficient cooling, excessive harmonics, and improper
operating conditions can reduce the life of a transformer.
- 266 -
According to IEC 60076–12:2008 [10], in terms of According to formula (12), the thermodynamic
service life, the transformer of the considered LTOL- temperature of the most heated point was calculated: Т =
16000/10 type belongs to the “A” class of the insulating 273+30+100 = 403 K
system temperature. The nominal service life of the Thermal aging rate:
transformer L, at a constant thermodynamic temperature T of
the hottest point, ˚C is determined by the following formula: К = 180,000 ∙ (3.1 · 10"4 )"# ∙ 𝑒𝑥𝑝 > @=
"#2,<++
4+'
L = а · exp b/T (h) (11) 42.58 ℎ – service life consumption per hour.
The thermodynamic temperature of the hottest point has With a load time of 240 hours, the estimated service life
the form: for ten days at this temperature will be 42.58∙240=10,219
hours of the entire service life of the transformer.
Т = 273 + То + ∆Т, (12) The expected service life at a nominal hottest point
temperature of 100°C is 18,000 hours. Then in ten days at a
#+,%#<
where: То is ambient temperature, ˚С (30˚С); temperature of 130˚С it will be 100 ∙ = 5.68 % of the
#,+,+++
∆Т is the temperature difference between the hottest point nominal service life of the transformer.
of the winding (130˚С) and the ambient temperature for a To study the failure rate for the period of running-in and
given load, ˚С. aging of the transformer, as well as to determine the average
(∆Т = 130–30 = 100 ˚С). time of failure-free operation of the transformer, the uniform
Calculation of the thermal aging rate K is determined as distribution law and the Weibull distribution law were used
the time consumption of the entire service life per hour of [11].
operating time at temperature T, ˚С Figure 3 shows a histogram approximating the probability
density (7) of the distribution for failure of transformers with
"=
𝐾 = 18,000 ∙ а"# ∙ 𝑒𝑥𝑝 ( > ), (13) a power of up to 16,000 kVA
),++, )
where “a” and “b” are constants for the equation for 𝑓? (𝑡) = 0,069 ∙ 𝑡 "+.++% ∙ 𝑒 "(+,#2<,∙! , at 0≤t≤12, years
calculating the service life of the transformer (Arrhenius
equation constants). In our case, a = 3.1×10-4 (h); b = 15,900 fII (t)= 0.0099, at 12≤t≤23, years
(K).
&+ ∙! ',-(,- )
𝑓??? (𝑡) = 0,165 ∙ 10"< ∙ 𝑡 2,24,2 ∙ 𝑒 "(+,+%2∙#+ ,
23≤t≤40, years
Fig. 3. Histogram and probability density of distribution for failure of transformers up to 16,000 kVA
It is obtained that for three resource intervals (I - interval from 0 to 12 years, in the interval 23-40 years - also
running-in, II - normal operation, III - degradation), the time by Weibull distribution, with parameters α3 = 0.025 10-9 and
between failures of transformers is described by the Weibull δ3 = 6.5485, and on the intermediate interval 12-23 - uniform
distribution with parameters α1 = 0.1598 and δ1 = 0.998 in the distribution law with coefficient α3 = 0.0099.
- 267 -
>. @#% >1 @%' >0 @4+
"+.++% "A+.+#2<,∙! ).++, B
𝑇 = I 𝑡 ∙ 0.069 ∙ 𝑡 ∙𝑒 𝑑𝑡 + I 𝑡 ∙ 0.0099𝑑𝑡 + I 𝑡 ∙ 0.0165 ∙ 10", ∙ 𝑡 2.24,2
>) >. @#% >1 @%'
&+ ∙! '.-(,-)
∙ 𝑒 "(+.+%2∙#+ 𝑑𝑡 = 21.34 𝑦𝑒𝑎𝑟𝑠
IV. ISCUSSION OF THE RESULTS working with transformers that have exhausted their standard
resource.
The results of calculations of operational reliability
according to the proposed method of the line regulating ACKNOWLEDGMENT
transformer during operation up to 16,000 kVA using the The the research was carried out within the framework of
available accumulated data makes it possible to identify the grant funding of Young scientists of the Committee of Science
presence of a reliability reserve and, accordingly, the service of the Ministry of Science and Higher Education of the
life. Namely, the calculated maximum service life of Republic of Kazakhstan (IRN No. AR09058053
transformers was 30.97 years, while the average time of "Development of a linear adjustment transformer type LTOL-
failure-free operation of transformers is 21.34 years. 16000/10).
From the constructed graph of the dependence of the
probability of failure-free operation on the time of the first REFERENCES
order P(t) = e- λt of the LTOL-16000/10 type transformer, the [1] Molebe P.P., Makhanya B.S., Pretorius J.H.C. The reliability and
maximum time of failure-free operation is determined to be maintainability analysis of transmission transformers in South Africa.
2018 IEEE International conference on environment and electrical
18,000 hours. engineering 2018 IEEE Industrial and commercial power systems
Europe/ Univ Palermo, Palermo, Italy.
In addition, according to the results of the calculation, it is
[2] Kiesewetter D.V., Zhuravleva N. M., Reznik A.S., Tukacheva
possible to recommend limiting the operation of power A.V., Smirnova E.G., Khripunov A.K. On possibility of power
transformers in the degradation interval to ensure the transformer operational reliability increase / 10th International
conditions when the failure rate does not exceed the failure conference 2016 Electric power quality and supply reliability
rate of the running-in period. conference (PQ), Tallinn, Estonia, 2016. pp. 192 - 197.
[3] Arjan van Schijndel, J.M. Wetzer J.M. Wetzer, P.A.A.F. Wouters.
For the hottest point of the winding Т=130˚С with a load Forecasting transformer reliability / IEEE conference on electrical
time of 240 hours, the service life of the LTOL-16000/10 type insulation and dielectric phenomena 2006. pp. 577-582.
transformer is 5.68% of the nominal service life. [4] L.M. Suleimanova. Increasing the operational resources of power
transformers while ensuring electromagnetic compatibility for
V. CONCLUSIONS overvoltages: Abstract of the dissertation of the candidate of technical
sciences. - Samara, 2006 - 23 p.
In the course of this study, a methodology was developed
[5] Chojnacki A.L. Reliability parameters and properties of medium
and tested for assessing, predicting and identifying the voltage low voltage transformers / Przeglad elektrotechniczny. №4,
reliability reserve and calculating the operational reliability 2008. р.74-77.
of the line regulating transformer using the available [6] Aysun Koksal, Aydogan Ozdemir. Improved transformer maintenance
accumulated data on its condition at the time of maintenance plan for reliability centred asset management of power transmission
system / IET generation, transmission & distribution, 2016, Vol. 10,
and repair. Iss. 8, pp. 1976-1983.
The calculated average time of failure-free operation of [7] Rexphepi V. An analysis of power transformer outages and reliability
line regulating transformers of a given type from the studied monitoring / 4th International conference on power and energy systems
data set for 32 years was 21.34 years. engineering (CPESE 2017), Berlin, Germany, p. 418 - 422.
It is shown that the calculated maximum service life of [8] S.E. Mastitsky, V.K. Shitikov. Statistical analysis and data
power transformers of the studied class can increase up to visualization with R. - E-book, access address, 2014: http://r-
analytics.blogspot.com
30.97 years, subject to the operating conditions of power
[9] Edwin B. Wilson, Margaret M. Hilferty. The distribution of chi-square.
transformers that ensure the failure rate in the degradation Proc. Natl. Acad. Sci. USA. 17 (12), pp. 684–688.
interval is not more than the failure rate of the running-in [10] IEC 60076-12:2008
period. [11] Weibull W. A statistical distribution function wide applicability /
The results obtained are necessary for making a decision Journal of applied mechanics (ASME), 1951, Т. 18, pp. 293-297.
on planning the scope of maintenance and repair work when
- 268 -
Sensorless operation of six-phase PMSM based
on high-frequency signal injection with torque
ripple reduction method
Seong-hoon Kim, Kwan-yuhl Cho* Hag-wone Kim and Sang-min Lee
Korea National University of Transportation, Republic of Korea
Email: [email protected]
Abstract— Sensorless control of PM synchronous motor II. VSD CONTROL OF SIX-PHASE PMSM
based on signal injection is widely used in low-speed operation
range because it can estimate the rotor position at low speeds as
The VSD(Vector Space Decomposition) method[1] is
well as at standstill. However, this method causes torque ripples adopted to control of six-phase PMSM. The advantages of
due to injected voltage, which makes the acoustic noise and VSD method is high torque dynamics performance because it
mechanical vibration. Six-phase PMSM consists of two three- can be eliminated Coupled component. Fig.2 shows that VSD
phase PMSMs with parallel connection so that the two harmonic reference frame.
dq voltages for the rotor position estimation should be injected
to each three-phase PWM inverters. In this paper, the torque
ripple cancellation method is proposed. The torque ripples can
be canceled since the torque ripples generated in each three
phase PMSMs have complementary phases. 1kW six-phase
PMSM verifies the effectiveness of the proposed method.
- 269 -
high-frequency current and rotor position information can be
written as follow:
A. Experiment result
𝑖 cos𝜃 Fig.5 shows the estimated rotor position based on the
𝑖 = demodulated current. Motor drive 300rpm at 20% load. Inject
sin𝜃
voltage magnitude is 20V that is 10% of DC link voltage. The
∆𝑖 =𝑖 [𝑘] − 𝑖 [𝑘 − 1] error of the estimated position is 1.8 degrees, confirming that
the rotor position and speed are estimated well.
Where ℎ is high frequency component which injected.
The rotor position information within high frequency induced
current. The estimated rotor position can be obtained as follow:
𝜃 = 𝑡𝑎𝑛 | |
∆𝑖 𝑖𝑓 𝑉 >0
𝑤ℎ𝑒𝑟𝑒 |𝑖 |=
−∆𝑖 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
Fig. 6. Phase and DQ and dqz currents with and without voltage injection
VI. SUMMARY
In this paper, the torque ripple reduction algorithm for
Fig. 4. Proposed torque ripple cancellation algorithm. sensorless control based on signal injection is proposed.
Proposed method can be estimated rotor position and can be
V. EXPERIMENT canceled torque ripple. Experimental result with 1kW six-
To verify the effectiveness of proposed algorithm, 1kW phase PMSM verifies that the proposed method estimates the
six-phase PMSM was used. the motor parameters used in rotor speed and position well and reduces the torque ripple due
experiment is shown as follow: to injected harmonic voltages.
- 270 -
Study on the Operation Algorithm of TVPP
Considering Distribution Line Constraints in
Jeju Power System
Ji-Won Lee 1, Dong-Il Cho 2, Seong-Jun Park 1, Tae-Yang Nam 1, Byung-Ki Kim 3, Jae-Sun Huh 4,
Nam-Gil Paik 4, Jae-Chul Kim 1, Won-Sik Moon 1*
1
Soongsil University, South Korea
2
Korea University, South Korea
3
Korea Institute of Energy Reasearch, South Korea
4
KEPCO, South Korea
Email: [email protected]
Abstract— Recently, there has been increasing interest in demand resources such as solar power, ESS(Energy Storage
renewable energy due to the issue of global warming. Through System), and DR(Demand Response) are collected and
the use of renewable energy, efforts are being made to reduce integrated through distributed resource owners and
carbon emissions from conventional power generation and intermediaries to operate as a virtual power plant.
achieve carbon neutrality. However, renewable energy sources
have greater variability compared to traditional generators,
which can have an impact on grid operations and result in
output limitations. In this paper, we propose an algorithm that
introduces a Virtual Power Plant (VPP) to minimize output
limitations by utilizing the resources within the VPP in
situations where output limitations are increasing.
I. INTRODUCTION
Due to the issue of global warming, there is a growing
global interest in renewable energy. European countries are
leading the way in expanding the acceptance rate of renewable
energy and are planning to achieve carbon neutrality through
this. In Korea, the proportion of volatile renewable energy Fig. 1. Virtual Power Plant Architecture
centered on wind power and solar power is being expanded to B. Classification based on operational objectives
achieve energy policy. It is expected to expand the capacity of
renewable energy to 58GW by 2030[1]. However, the VPP can be divided into CVPP and TVPP depending on
increase in renewable energy generation facilities leads to the operation objectives[5].
problems such as curtailment due to output volatility and Commercial VPP is a VPP operated by an intermediary for
degradation of power system stability[2]. To respond to this, the purpose of market participation, with no geographical
the concept of a Virtual Power Plant (VPP), which integrates restrictions on the recruitment of distributed resources, and
and manages multiple distributed resources as one, is being contributes to the balance of supply and demand across the
introduced in Korea. VPP operates like a generator, and system. The operation of VPP for profit-making purposes,
through this, it can respond more efficiently to curtailment such as small-scale intermediary trading markets, can be
than before[3]. In this paper, we simulated the overvoltage understood as CVPP. By gathering and optimizing various
situation that can occur in the distribution system when using distributed resources, intermediaries can create various
VPP. In the simulated situation, we proposed an algorithm to business models based on the profits generated, such as power
relieve overvoltage using VPP resources. trading agency.
II. VIRTUAL POWER PLANT Technical VPP is a VPP operated by a network operator
mainly for the purpose of stabilizing the distribution system,
A. Characteristics of Virtual Power Plant recruiting distributed resources in the region and using them
Virtual Power Plant(VPP) is a system designed to operate for auxiliary purposes such as voltage and frequency control.
various distributed energy resources as if they were a single Through the operation of TVPP, distributed resource owners
power plant, using information and communication provide necessary distributed resources for stabilizing the
technology and automatic control technology[4]. The concept distribution network when needed and receive compensation
of a VPP is illustrated in Figure 1. While it is not a power plant for the use of distributed resources by the distribution network
that physically exists in a specific location, it has the same and
- 271 -
operator. VPP operators can recruit distributed resources in B. Operation Algorithm
nearby areas to delay the investment in new distribution The proposed algorithm is illustrated in Figure 2. Once the
networks by utilizing them for peak power reduction and output capacity to be delivered is allocated, the situation
distribution network voltage adjustment. If flexible resources within the power distribution system is checked for
are needed, they can also participate in the ancillary service overvoltage. The upper limit of the ultra-high voltage
market using TVPP resources[]. maintenance range according to the performance standard of
III. CURRENT STATUS OF JEJU POWER SYSTEM distribution electrical equipment is 23,000V (1.039p.u), and
the lower limit is 20,800V (0.908p.u)[7]. If overvoltage occurs,
A. Current status of Jeju Power System reactive power control through ESS is first implemented. The
As of 2022, in Jeju Island, the capacity of renewable power reactive power is absorbed to lower the voltage. If overvoltage
generation facilities is 295MW for wind power and 368MW still occurs after this, a command is issued to increase the
for photovoltaic, accounting for 18% and 23% of the total charging amount of the EV charger. If the voltage does not
power generation facilities, respectively. According to the decrease even after these measures, active power control of
10th Basic Plan for Electricity Supply and Demand, the the ESS is implemented, and if the voltage still does not
photovoltaic is expected to increase to 1,299MW and wind decrease, curtailment of the PV is finally carried out.
power generation to 2,345MW by 2030[6]. The increase in
renewable energy generation facilities leads to issues such as
curtailment and degradation of system stability due to output
variation.
B. Current Status of Curtailment
Table 1 shows the status of wind power curtailment in the
Jeju region. With the increase in renewable power generation,
the number of curtailments for wind power has increased to
104 times in 2022 since it was first implemented in 2015. By
estimating the loss cost through the average SMP of each
respective year, the loss cost due to output control in 2022 is
6.4 billion KRW[7]. From 2021, output control, which had
only targeted wind power, has been expanded to solar power,
occurring once in 2021, 28 times in 2022, and 12 times until
March 2023.
2016 6 252 92 23
- 272 -
TABLE II. PARAMERTERS OF THE SIMULATED POWER DISTRIBUTION
SYSTEM
Classification Parameters
Fig. 5. Voltage after reactive power control of ESS and EV charging control
VI. CONCLUSION
In order to achieve carbon neutrality, the proportion of
renewable energy generation is increasing. However,
renewable energy has the characteristic of inconsistent output,
leading to problems such as curtailment and degradation of
grid stability. In particular, Jeju Island has a higher proportion
of renewable energy than other regions in Korea, making the
curtailment problem more severe. To solve this, the concept
of a Virtual Power Plant (VPP), which operates various
resources like a single power plant, has been proposed. In this
paper, we defined the problems that can occur when operating
a grid in the Jeju area through a VPP. We then proposed an
Fig. 3. End-node voltage of the simulation system diagram algorithm to solve these potential problems and were able to
B. Results of Case Study confirm that the algorithm works well through a case study. In
the future, it is expected that the composition of the algorithm
The parameters of the simulated power distribution system can be changed by adding various resources such as wind
used for the case study are shown in Table 2. We assumed a power and Power to Gas (P2G).
situation where 13MW of output had to be produced through
photovoltaic power generation. Figure 3 is a graph showing ACKNOWLEDGMENT
overvoltage occurring when 13MW of output is produced in
This work was conducted under the framework of the
the simulated distribution system. In the situation without
research and development program of the Korea Institute of
control, a voltage of 1.045pu appeared.
Energy Research(C3-2416)
REFERENCES
[1] Jin-Yong Jung, Yoon-Sung Cho, "A Study on the Evaluation of System
Inertia Impact and Stability Improvement Plan According to
Renewable Energy Expansion," The transactions of The Korean
Institute of Electrical Engineers, Vol.70, No. 9, pp.1263-1273,
September 2021.
[2] Gi-Hoon Kim, Yoon-Cheul Jeung, Kyoung-Soo Kang, Yeong-Jun
Choi, Hee-Sang Ko, “A Novel Energy System Integration Scheme for
Virtual Power Plants based on Sector Coupling.” Journal of Energy &
Climate Change, Vol. 17, No.2, pp. 228-237, December 2022.
[3] Seonghyeon Kim, Sung-chan Park, Myung-Hwan Lee, Sungyun Choi,
"Sector-Coupling based microgrid for responding to cutailment
renewable energy," The Korean Institute of Electrical Engineers
Conference, pp. 95-96, October 2021.
[4] Sun-Hwa Lee, "The System and Status of Virtual Power Plants in
Korea," KDB survey monthly report, No. 767, pp. 25-34, October 2019.
[5] KEPCO Economy & Management Research Institute, "KEMRI power
economy review," Vol. 4, April 2021.
[6] Ministry of Trade, Industry and Energy, “The 10th Basic Plan for
Fig. 4. Voltage during reactive power control of ESS Electricity Supply and Demand,” January 2023.
[7] Korea Power Exchange, "Annual power system operation performance
in Jeju", March 2023.
If the EV charging amount is increased according to the [8] Korea Electrice Power Corporation(KEPCO), "Regulation on the Use
algorithm, it can be confirmed that the voltage decreases to of Electrical Equipment for Transmission and Distribution; Appendix
1.031pu at 13:00, one hour later, resolving the issue. 4; Performance Standard for Distribution Electrical Equipment.
- 273 -
Study of the direct and inverse problem of
the thermal conductivity of a rod
Sholpan Jomartova1, Тalgat Mazakov1, Nurdaulet Isimov1, Aigerim Mazakova1,
Kalamkas Begaliyeva1
1
Al-Farabi Kazakh National University, Almaty, Kazakhstan
Email: [email protected]
Abstract-- In this paper, we study the thermophysical conditions, including the initial temperature distribution
state of a rod of limited length with a constant cross section in the body and boundary conditions on the body surface,
in the form of a square. which can be specified in one of three ways: surface
The study of thermal conductivity in such rods is of temperature, heat flux, and heat transfer coefficient [2].
practical importance for various technical systems, such as
jet and hydrogen engines, power plants and spacecraft. The
Temperature is a parameter that characterizes the
solution of this problem is important for determining the
steady thermophysical state of the rods under the influence energy of the thermal motion of particles of a substance.
of various heat sources. Consequently, the process of heat propagation and its
A three-dimensional body is considered, where the left direction are inextricably linked with the temperature
end of the rod coincides with the origin of the coordinates. distribution inside the body. In general, the temperature
A constant heat transfer coefficient over the entire surface is not the same at different points of the body and depends
of the rod is taken into account, as well as the effects of point on time: T = T(x, y, z, t).
temperature and surface heat transfer. The problem is
solved by reducing it to a system of linear integral After a considerable period of time, the temperature
equations. of all parts of the body equalizes and becomes equal to
The article developed a program that finds the control
the temperature of the medium (this is true for the case
(given temperature) at the left end of the rod, providing the
required temperature at the right end for a given fixed time. when the volume of the medium is much larger than the
The results of numerical calculations are output to files and volume of the body and its temperature practically does
presented in the form of tables and one-dimensional graphs not change with time) [3].
demonstrating the dynamics of temperature changes over
time. For the inverse boundary value problem of heat
Keywords -- linear integral equations, temperature, transfer, an approximate solution was constructed by the
thermal conductivity, thermal insulation, thermal physics quasi-inversion method and an order-exact estimate of
process, energy. the error of the constructed approximate solution was
obtained for one of the well-posedness classes of the
I. INTRODUCTION inverse boundary value problem [4].
Limited length rods are widely used in various For an ill-posed problem with inverse time of a
technical systems, including jet and hydrogen engines, semilinear differential-operator equation, a stable
gas generators, nuclear and thermal power plants, approximate solution is constructed and an estimate of its
processing industrial lines and spacecraft power plants. error is given [5].
These load-bearing elements operate under the
simultaneous influence of various heat sources. The method of spectral analysis established a
Therefore, an urgent problem is the development of criterion for the uniqueness of the solution of the inverse
special methods, computational algorithms and software problem of finding the initial condition. For these
packages that will allow us to investigate the steady problems, uniqueness, existence, and stability theorems
thermophysical state of rods of limited length under the for solutions were proved [6].
influence of heterogeneous heat sources.
II. STATEMENT OF THE PROBLEM
There are several methods for solving heat
conduction problems, including analytical, analog, In this paper, we consider a three-dimensional body,
numerical, graphical, and experimental. Each of these the constant cross section of which has the shape of a
methods is based on different forms of equations. The square. It is assumed that the left end of the rod coincides
experimental method is used when other methods fail, with the origin of coordinates and the heat transfer
and it allows you to determine the thermophysical coefficient is assumed to be constant over the entire
properties of the material, such as thermal conductivity surface of the rod. It is also assumed that heat of a fixed
and specific heat [1]. temperature is constantly supplied to the left side of the
rod.
To solve problems of heat conduction in solids of
complex shape, analytical and numerical methods are
used. Solutions are possible under known boundary
- 274 -
The distribution of heat in a homogeneous rod in the Let us cover the domain D with a uniform grid with
absence of heat sources is described by the three- steps ∆x, ∆y, and ∆z along the x, y, and z axes,
dimensional heat equation: respectively. We write the following difference-
differential approximation of equation (1):
𝜕𝑇 𝜕2 𝑇 𝜕2 𝑇 𝜕2 𝑇
= 𝑎2 ( + + ), (1)
𝜕𝑡 𝜕𝑥 2 𝜕𝑦 2 𝜕𝑧 2 𝑑𝑇𝑖,𝑗,𝑘 𝑇𝑖+1,𝑗,𝑘 −2𝑇𝑖,𝑗,𝑘 +𝑇𝑖−1,𝑗,𝑘 𝑇𝑖,𝑗+1,𝑘 −2𝑇𝑖,𝑗,𝑘 +𝑇𝑖,𝑗−1,𝑘
2
where 𝑎 – thermal diffusivity, = 𝑎2 ( + +
𝑑𝑡 ∆𝑥 2 ∆𝑦 2
𝑡0 ≤ 𝑡 ≤ 𝑡1 – period of time during which the
𝑇𝑖,𝑗,𝑘+1 −2𝑇𝑖,𝑗,𝑘 +𝑇𝑖,𝑗,𝑘−1
process of thermal conductivity of the rod is studied, + ), (5)
∆𝑧 2
x, y, z – spatial variables 0 ≤ 𝑦, 𝑧 ≤ 𝑙1 , 0 ≤ 𝑥 ≤ 𝑙2 ,
𝑙 𝑙 𝑙
𝑥ц , 𝑦ц , 𝑧ц – rod center: 𝑥ц = 2 , 𝑦ц = 1 , 𝑧ц = 1 ,
2 2 2 ̅̅̅̅̅̅̅̅̅̅̅̅
𝑡 ∈ [0, 𝑡1 ], 𝑖 = 2, 𝑛𝑥 − 1, 𝑗 = ̅̅̅̅̅̅̅̅̅̅̅̅
2, 𝑛𝑦 − 1,𝑘 = ̅̅̅̅̅̅̅̅̅̅̅
2, 𝑛𝑧 − 1,
𝑙1 – rod width and height,
∆x = 𝑙1 /𝑛𝑥, ∆y = 𝑙1 /𝑛𝑦, ∆x = 𝑙2 /𝑛𝑧, nxyz=nx*ny*nz.
𝑙2 – rod length,
D – parallelepiped {0≤ 𝑦, 𝑧 ≤ 𝑙1 , 0 ≤ 𝑥 ≤ 𝑙2 }, Г –
Here ∆x is the step and nx is the number of split points
border D, along the Ox axis, ∆y is the step and ny is the number of
𝑄 = {𝑥, 𝑦, 𝑧, 𝑡|(𝑥, 𝑦, 𝑧) ∈ 𝐷, 𝑡 ∈ [𝑡0 , 𝑡1 ]}. split points along the Oy axis, ∆z is the step and nz is the
The initial and boundary conditions are given as: number of split points along the Oz axis, the indices i, j,
𝜕𝑇
k are in x, y, and z coordinates, respectively [7].
| = 0, (2)
𝜕𝑛 Г
Initial conditions (2) take the form
𝑇(0, 𝑦, 𝑧, 𝑡) = 𝑢, 𝑢 ∈ 𝑈 (3)
𝑇1,𝑛𝑦ц,𝑛𝑧ц (0) = 𝑢,
𝑇(0, 𝑦ц , 𝑧ц , 𝑡1 ) = 𝑞. (4)
𝑛𝑥ц = [𝑛𝑥/2], 𝑛𝑦ц = [𝑛𝑦/2], 𝑛𝑧ц = [𝑛𝑧/2]. (6)
The set of allowable initial temperatures is denoted
by 𝑈 = {𝑢: 0 ≤ 𝑢 ≤ 𝑢𝑚𝑎𝑥 , 𝑢 ∈ 𝑅1 }, where 𝑢𝑚𝑎𝑥 is the The given final state will take the form
maximum allowable initial temperature, depending on
𝑇𝑛𝑥,𝑛𝑦ц ,𝑛𝑧ц (𝑡1 ) = 𝑞. (7)
the operating conditions and technical capabilities of the
device as a whole. This makes it possible to take into
account various operating scenarios and variations in Boundary conditions (2) are approximated by the
system parameters. following differential equations
- 275 -
The solution of equation (8) can be represented as: Theorem 2. For any 𝜀 ≥ 0 there is a number 𝑟 such
1
𝑡
that for all 𝑘 > 𝑟 we have ‖𝐴𝑘 𝑡1𝑘 ‖ ≤ 𝜀.
𝑘!
g(𝑡) = g(0) + ∫0 𝐴g(𝜏)𝑑𝜏, 𝑡 ∈ [0, 𝑡1 ] (10)
Proof. We introduce the notation 𝛾 = ‖𝐴‖ 𝑡1 , 𝛾𝑘 =
Equation (10) is a particular case of the Volterra 1 𝑘 𝛾𝑘
𝛾 . Consider the series 1 + ∑∞
𝑘=1 . Let us calculate
integral equation of the second kind [8]: 𝑘!
𝛾𝑘+1 𝛾
𝑘!
𝜌 = lim = lim = 0. Because 𝜌 ≤ 1, then the
𝑡 𝑘→∞ 𝛾𝑘 𝑘→∞ 𝑘+1
𝑦(𝑡) = 𝑓(𝑡) + 𝜇 ∫0 𝐾(𝑡, 𝜏)𝑦(𝜏)𝑑𝜏, (11) constructed series is convergent. For any 𝜀 ≥ 0 there
𝛾
exists a number r such that for all 𝑘 > 𝑟 we have 𝑘+1 ≤
𝛾𝑘
where
𝜌 + 𝜀.
𝑦(𝑡) = g(𝑡); 𝑓(𝑡) = g(0); 𝐾(𝑡, 𝜏) = 𝐴; 𝜇 = 1. 𝛾 𝛾
Then ≤ 𝜀 or 𝑟 = [ ]. (Integer part of division).
𝑟+1 𝜀
Theorem 1. Equation (11) has a unique continuous This implies the validity of the assertion of the theorem.
solution for any initial states g 0 . This solution can be
1
found by the formula y(𝑡) = (𝐸 + 𝐴𝑡 + 𝐴2 ∗ 𝑡 2 … + Let 𝑝ц denote the index of the point corresponding to
2
1 the center of the rod section (1, 𝑛𝑦ц , 𝑛𝑧ц ).
𝐴𝑘 ∗ 𝑡 𝑘 + ⋯ ) ∗ 𝑓(𝑡) .
𝑘!
Then the initial condition takes the form
Proof. Since the matrix A and the vector of initial
conditions g 0 are constant, then all the conditions of g 𝑝ц (0) = 𝑢. (15)
Theorem 7.1 [8] are satisfied.
The given final state (6) takes the form
For equation (11), we denote the Volterra operator by
𝑡 g 𝑝ц (𝑡1 ) = 𝑞. (16)
𝑄𝑦 = ∫0 𝐾(𝑡, 𝜏)𝑦(𝜏)𝑑𝜏 .
We introduce the notation
Let us define the iterated kernel of the Volterra operator:
1
𝑛 𝑡 𝐶 = (𝐸 + ∑𝑟𝑘=1 𝐴𝑘 𝑡1𝑘 ) (17)
𝑄 𝑦= ∫0 𝐾𝑛 (𝑡, 𝜏)𝑦(𝜏)𝑑𝜏 , 𝑘!
𝑅(𝑡, 𝑠) = ∑ 𝐾𝑛 (𝜏, 𝑠). Substituting equation (18) into (15) and (16), we obtain
𝑛=1
g 𝑝ц (0) = 𝑢,
Let 𝑀 = sup |𝐾(𝑡, 𝑠)| ≤ ‖𝐴‖ . Then for repeated
0≤𝑡,𝑠≤𝑇
g 𝑝ц (𝑡1 ) = 𝑞. (19)
nuclei it is true
- 276 -
3. Calculate the inverse matrix 𝐶 −1 .
A unique feature of this program is its ability to Due to the large temperature difference from 0 to 200
present the results of numerical calculations in a degrees, Figure 2 shows a 2 graph of temperature
convenient format. The results obtained over time can be distribution along the center of the rod in the X direction
visualized in the form of one-dimensional graphs. This with a one-step offset from the origin in dynamics.
allows researchers and engineers to analyze data more
deeply and make informed decisions based on the results.
𝑙1 = 1.0; 𝑙2 = 10.0; ∆𝑡 = 0.01; Fig 2. Graph of temperature distribution along the center of the rod in
nx =10; ny= 6; nz= 6; 𝑞 = 200. the X direction with a one-step offset from the origin [11]
- 277 -
modeling the process of heat conduction and allows you [5] G.R. Jaffe, V.W. Brar, M.G. Lagally, M.A. Eriksson “A simple
numerical method for evaluating heat dissipation from curved
to get reliable predictions of the heating time. wires with periodic applied heating” Applied Physics Letters,
2021. – 119(16). – DOI: 10.1063/5.0059648.
To solve the inverse problem, an iterative algorithm [6] J.Amrit, K.Nemchenko, T. Vikhtinskaya “Effect of diffuse
based on the dichotomy method was proposed. This phonon boundary scattering on heat flow “ Journal of Applied
algorithm allows you to determine the parameters Physics, 2021. – 129(8). – DOI: 10.1063/5.0036935.
necessary to achieve a given temperature at the right end [7] D. F. Sikovsky. Methods of Computational Thermal Physics.
Novosibirsk: Novosib. state un-ty, 2013. – 98 p.
of the rod. It provides an opportunity to effectively
[8] A. B. Vasil’ev and N. A. Tikhonov, Integral Equations. – M.:
control the process of heat conduction based on the MSU, 1989. – 156 p.
obtained data and estimates. [9] I.E. Anufriev, A.B. Smirnov, E.N. Smirnova. Matlab 7. – St.
Petersburg: BHV-Petersburg, 2005. – 1104 p.
As a result of the development of two programs for [10] V.P. Dyakonov. Matlab 6.0/6.1/6.5/6.5+SP1+Simulink 5/5.
modeling the temperature propagation along the rod, Processing of signals and images. – M.: SOLON-Press, 2005. –
accurate numerical calculations were obtained. The 592 p.
results of numerical calculations over time were [11] K.B. Begaliyeva “Development of an automated control system
presented in the form of tables and graphs, which makes for the thermophysical state of the rod during operation”
Dissertation. PhD in spec. 6D070200, Almaty, 2023. – 96 p.
it possible to visualize and analyze the data in a more
[12] T. Mazakov, W.Wójcik, Sh.Jomartova, N.Karymsakova,
convenient way. G.Ziyatbekova, A.Tursynbai “The Stability Interval of the Set of
Linear System” INTL Journal of Electronics and
Two programs have been developed for finding the Telecommunications. – 2021. – Vol. 67, N. 2. – P.155-161. DOI:
temperature distribution along the rod, which puts the 10.24425/ijet.2021.135958.
results of numerical calculations into several files. The [13] N. Isimov, T. Mazakov, O. Mamytbekov, G. Ziyatbekova
“Application of fuzzy and interval analysis to the study of the
results of numerical calculations in dynamics (over time) prediction and control model of the epidemiologic situation”
are displayed in the form of a table and displayed in the Journal of Theoretical and Applied Information Technology,
form of graphs. Pakistan, 2018. – Vol. 96, – Issue 14, – рр. 4358-4368.
All work was carried out with the support of the funds
of the Research Institute of Mathematics and Mechanics
at the Al-Farabi Kazakhstan National University. This
provides additional assurance of the quality and
reliability of the results and highlights the significance of
this study.
REFERENCES
[1] D.S. Karpovich, O.N. Susha, N.P. Korovkina, V.P.Kobrinets
“Analytical and numerical methods for solving the heat equation”
Proceedings of BSTU. Physical and Mathematical Sciences and
Informatics, 2015, No. 6. pp.122-127.
[2] B.A.Voronenko, A.G.Krysin, V.V. Pelenko, O.A. Tsuranov
Analytical description of the process of non-stationary heat
conduction. – St. Petersburg: NRU ITMO; IKiBT, 2014. – 48 p.
[3] E.M. Dede, Z. Yu, P. Schmalenberg, H. Iizuka “Thermal
metamaterials for radiative plus conductive heat flow control”
Applied Physics Letters, 2020. – 116(19). – DOI:
10.1063/5.0007574.
[4] D.Visaria, A.Jain “Machine-learning-assisted space-
transformation accelerates discovery of high thermal conductivity
alloys” Applied Physics Letters, 2020. – 117(20). – DOI:
10.1063/5.0028241.
- 278 -
Switching Loss Analysis by Interleaving
Method of 3-LV Boost Converter with Coupled
Inductor
Hae In Kim1 , Hag Wone Kim1*, Kwan Yuhl Cho1 and Jeong Won Kang1
1
Department of Control and Instrumentation Engineering, Korea University of Transportation, Chungju,Korea
Email: [email protected]
I. INTRODUCTION
As global carbon regulations gradually spread, interest in
solar power generation for large-scale renewable energy
generation is increasing. Solar PV is currently the world's Fig. 1: Parallel 3-LV Boost Converter with Coupled Inductor
fastest-growing energy technology, with 50 GW of new
capacity being added annually [1]. In order to increase the A. Comparison of interleaving methods
efficiency according to the gradually increasing power
generation, research on multi-level converters is being Earlier, it was mentioned that TLBC generally operates
actively conducted. Among them, TLBC (3-LV Boost the upper and lower switches with a phase difference of 180
Converter) has the simplest form among non-isolated multi- degrees. However, in the two-phase parallel type TLBC, a
level converters. TLBC has two boost converters connected in total of four switches, the upper and lower switches of one
series, and generally operates with a phase difference of 180 module and the upper and lower switches of two modules, are
degrees between the upper and lower switches. The switching operated with a phase difference of 90 degrees. At this time,
method can reduce the current and voltage ripple of the it can be divided into an N-type Interleaving method and a Z-
converter. However, there is one option for the switching type Interleaving method according to the order in which the
method of parallel TLBC. It can be divided into N-type switches are operated. The N-type Interleaving method is a
Interleaving and Z-type Interleaving according to the method method in which the switch in one module is operated and
of configuring the phase difference between the modules and then the switch in the next module is operated, and the Z-type
the phase difference between the upper and lower switches. Interleaving method is a method in which the upper switch of
The two interleaving methods are compared in various aspects, each module is operated and the lower switch is operated in
such as inductor current ripple, output current ripple, and this order. Fig. 2 shows the waveform of the switching signal
output filter capacitor current. Therefore, in this paper, the two
according to the interleaving method.
interleaving methods are compared in terms of the switching
Since only the timing at which each switch operates is
loss of the semiconductor switching device and verified
through the Psim simulation program. different according to the interleaving method, since the
- 279 -
average characteristics are the same, the steady-state
characteristics by the state averaging technique are the same,
but affect the circulating current and the output filter
capacitor current.
Power 𝑃 16*2 kW
Duty 𝐷 0.386 -
- 280 -
Fig.5 shows the loss of each switching device according to IV. CONCLUSION
the interleaving method through simulation and In this paper, the switching loss of each switch of the parallel
calculation.According to Fig.5, it can be seen that the overall type TLBC for each interleaving method was
loss of the semiconductor switching device does not change analyzed. The interleaving method is divided into an N-type
significantly depending on the interleaving method. However, interleaving method and a Z-type interleaving method
in the case of Z-type interleaving, it can be seen that the loss according to the phase delay order of each switch. Although
is biased to a specific switch, which has a bad effect on the the sum of switching losses of all switches for each
stability of the overall system. interleaving method is almost the same, it was found that Z-
type interleaving has different losses between switches,
which is disadvantageous in terms of the lifespan of the
overall power conversion module. The effect of the intiliving
method has been compared in various aspects. In the future,
it is necessary to compare the overall power
conversion efficiency and input/output characteristics.
REFERENCES
[1] Breyer, Christian, et al. "On the role of solar photovoltaics in global
energy transition scenarios." Progress in Photovoltaics: Research and
Applications 25.8 (2017): 727-745.
[2] Lee, Kang-Mun, et al. "3-level boost converter having lower inductor
for interleaving operation." The Transactions of the Korean Institute of
Power Electronics 26.2 (2021): 96-105.
(a) N-type Interleaving (b) Z-type Interleaving
Fig. 5: Switching loss per switch according to interleaving
method
- 281 -
August 22(TUE) - 25(FRI), 2023
Oral Session 14
Room : A435
Chair: Kuanysh Alipbaev (AUPET, Kazakhstan)
- 282 -
Finding trends in the development of narrow
beam inter-satellite communication antennas for
Cubesat satellites using patent analysis
*Note: Sub-titles are not captured in Xplore and should not be used
Abstract— Currently, the interest of the scientific and between satellites. Antennas can be of various types, including
commercial community in the space industry is increasingly mono-field, dipole, patch antennas, and others, depending on
turning to CubeSat-type nanosatellites. One of the key aspects communication requirements and other mission parameters.
in the design of such nanosatellites is the choice of antenna One of the main problems in the design of antennas for
parameters that provide communication between the satellite Cubesat is the need to minimize their size and weight, as well
and the Earth or between satellites. Antennas for CubeSat can as to ensure their reliability and efficiency in outer space. Over
be of various types, such as monopole, dipole, patch antennas, time, with the development of technologies and materials,
and others, depending on communication requirements and antennas for Cubesat are becoming more advanced, which
mission characteristics.
makes it possible to improve the quality of communication
Of particular interest is the use of narrow-beam (narrow- and expand the possibilities of using these satellites. Of
beam) antennas in nanosatellites, which provide a more particular interest is the use of narrow-beam (narrow-
accurate and efficient use of energy, which allows to increase the directional) antennas in nanosatellites, which provide more
communication range and improve the quality of data accurate and efficient use of energy, which makes it possible
transmission. This article discusses the process of conducting a to increase the communication range and improve the quality
patent search on the WIPO, FIPS and Google Patent databases of data transmission. As CubeSat technology continues to
for antenna systems used in CubeSat-type nanosatellites. evolve, protecting intellectual property rights through patents
is becoming increasingly important. In this article, we will
The analysis of patent bases allows to identify trends in the look at the process of conducting a patent search for narrow-
development of antenna system technologies for CubeSat, as angle antenna systems for nanosatellites such as CubeSats. It
well as to identify key innovations and innovative approaches should be noted that conducting a patent search for narrow-
used in this area. The study is being conducted to promote the angle antenna systems for CubeSats is an important step in the
development of more efficient and advanced antenna systems patent application process. This can help identify previously
for small spacecraft such as the CubeSat, which improves patented inventions that are similar to a new invention and
communications and ensures optimal performance of provide valuable information about the state of the art in the
nanosatellites in outer space.
field. By conducting a thorough patent search, inventors can
Keywords—patent search, inter-satellite communication,
increase the chances of successfully obtaining a patent for
cubesat, antenna sytems their invention..
II. TYPES OF ANTENNAS FOR CUBESAT
I. INTRODUCTION
Currently, the eyes of the scientific and commercial Despite the limited size and mass of Cubesats, there are many
community of the space industry are increasingly turned types of highly directional antennas that can be used in these
towards the use of nanosatellites such as Cubesat. Cubesat is nanosatellites to provide inter-satellite communications. Let's
the standard for the design and manufacture of small satellites. consider the main ones
The standard was developed in the early 2000s at California A. Patch Antenna
Polytechnic University and Stanford University. Cubesat
belongs to the class of so-called nanosatellites and usually has These antennas are flat metal plates that can be easily
a Cubesat, a standard for the design and manufacture of small integrated into the Cubesat chassis. They provide a narrow
satellites based on a cubic module known as a "Unit". One beam, making them ideal for inter-satellite communications.
Cubesat unit has standard dimensions of 10x10x10 For example, authors from School of Electronics and
centimeters (or 1 liter of volume) and a weight of no more than Telecommunications [1] introduced a metasurface-based
1.33 kg. It is important to note that the advantages of Cubesats, antenna designed for CubeSat applications in the S-band. The
including their low cost, small size and rapid deployment, antenna consists of a single-feed slotted patch and a
make them an ideal solution for many tasks in the field of metasurface made of periodic metallic plates. It achieves a
space activities. One of the key aspects of designing a Cubesat wide operating bandwidth and circularly polarized radiation.
nanosatellite is the choice of antenna parameters, since it The prototype was successfully tested, showing good
provides communication between the satellite and the Earth or radiation efficiency, symmetric pattern, and a high front-to-
- 283 -
back ratio. The design is compatible with standard CubeSat missions, demonstrating their successful use for
structures, making it suitable for various CubeSat applications communication, Earth observation, and combined GNSS-R
in the S-band. and microwave radiometry payloads. The deployability and
compactness of helix antennas make them a suitable choice
for CubeSats, addressing the challenges posed by the limited
space and stowage requirements of these small satellites.
- 284 -
III. PATENT SEARCH ANALYSIS In [22], a patent is given that describes the method involves
An analysis of data from the World Intellectual Property identifying satellites to form a temporary communication
Organization (WIPO) database for the keywords "antenna group, determining available radio resources for their
cubesat" and "cubesat inter-satellite communications" for the communications, and then allocating a subset of these
period from 2011 to 2023 shows a clear increase in the number resources for specific use within a defined timeframe.
of publications in this area. The period from 2015 to 2022
stands out in particular, where there was a noticeable jump in
the number of patents (Figure 4).
The largest number of patents were registered in the US,
China and India (Figure 5), with Chinese inventors holding
more patents related to the mechanical component of cubesat
antennas, including opening methods and new designs. On the
other hand, American scientists have more patents related to
new principles and methods of organizing inter-satellite
communications.
This can be attributed to the successful experience of
launching the Starlink fleet of satellites, which has stimulated
interest and research in the field of inter-satellite
communications. It should also be noted that scientific
research in this area actively interacts with industry and Figure 6 - Illustration of ways in which satellites may need and utilize
practical applications, such as space missions and radio resources fРor inter-satellite communications
communication systems. This contributes to the dynamic
development of technologies and innovations in the field of The analysis of the FIPS Russian patent database resulted
cubesat antenna systems and ensures their more efficient in the identification of a number of patents dated from 2015 to
operation in the space environment.Keep your text and 2022. Based on the results of the patent search, several key
graphic files separate until after the text has been formatted trends in inter-satellite communications can be identified: an
and styled. Do not use hard tabs, and limit use of hard returns increase in interest in communication technologies between
to only one return at the end of a paragraph. Do not add any space vehicles, which is reflected in an increase in the number
kind of pagination anywhere in the paper. Do not number text of patent documents for the specified period. There is also an
heads-the template will do that for you. improvement in the efficiency and speed of data transmission
between satellites, which is likely due to the development of
new modulation methods and improvements in antenna
systems. Engineers and scientists are striving to create
compact and lightweight communication systems, as
evidenced by the weight limit of up to 50 kg in some patents.
Finally, improving the reliability of communications is likely
to become relevant in connection with the expansion of the
use of inter-satellite communications in various space
missions, and relevant patent documents are devoted to this.
Patent [23] is of the greatest interest. The proposed method is
based on the global transmission of information between near-
Earth correspondents through the spacecraft cluster of
information transmission "Kosmoset" using inter-satellite
radio and laser communication channels with simultaneous
Figure 4 - Patent search results analysis by years (WIPO)
radio monitoring of the Earth's surface, airspace, ionosphere
and surrounding space, radar and optical monitoring of the
underlying surface of the Earth, as well as monitoring the
Earth's gravitational field with the help of onboard measuring
equipment of the corresponding spacecraft clusters included
in the system.
- 285 -
Figure 6 - principle of the prototype Capitalize only the first word in a paper title, except for proper
nouns and element symbols.
For papers published in translation journals, please give
the English citation first, followed by the original foreign-
IV. CONCLUSION language citation [6].
After conducting a patent analysis using the databases of [1] Ta S.X., Nguyen V.C., Nguyen K.K., Dao-Ngoc C.Single-feed slotted-
WIPO (World Intellectual Property Organization), FIPS (US patch antenna loaded with metasurface for CubeSat applications (2021)
Federal Patent and Trademark Office) and Google Patents, we International Journal of RF and Microwave Computer-Aided
can conclude that over the past 5 years there has been a Engineering, 31 (4), DOI: 10.1002/mmce.22560
noticeable increase in new inventions in the field of satellite [2] Kaur R., Mayank, Tandon T., Schumacher J., Sundaramoorthy G.,
Sahoo U.K.S-Band Patch Antenna System for CubeSat Applications
antenna systems for satellites CubeSat type. (2021) Advances in Intelligent Systems and Computing, 1363 AISC,
An important trend is the development and pp. 102 – 112 DOI: 10.1007/978-3-030-73100-7_8
implementation of new design solutions for antenna systems. [3] Hammoumi M.E., Idrissi N.E.A.E., Raad R., Theoharis P.I., Tubbal
Inventors are actively working to improve the shapes and F.A Wideband Compact Patch Antenna for Ka-band and CubeSat
structures of the antennas to improve their performance, Applications (2021) 2021 15th International Conference on Signal
compactness and efficiency in the limited space of the Processing and Communication Systems, ICSPCS 2021 – Proceedings
DOI: 10.1109/ICSPCS53099.2021.9660306
CubeSat.
Another important area of research is the development of [4] Priscila G., Nur L.O., Edwar A Design of ADS-B Receiver Antenna
using Truncated Circular Microstrip Patch in Cubesat Form Factor
new materials for antenna systems. The use of new materials (2022) 2022 IEEE International Conference on Aerospace Electronics
can significantly improve the characteristics of antennas, such and Remote Sensing Technology, ICARES 2022 – Proceedings DOI:
as resistance to extreme space conditions, reduction in mass 10.1109/ICARES56907.2022.9993600
and increase in radiation efficiency. [5] Abulgasem S., Tubbal F., Raad R., Theoharis P.I., Liu S., Khan M.U.A.
The integration of modern antenna systems into the A wideband metal-only patch antenna for cubesat (2021) Electronics
cubesat includes the development of specialized control (Switzerland), 10 (1), art. no. 50, pp. 1 – 13 DOI:
10.3390/electronics10010050
systems for electronic components, as well as appropriate
[6] Mubasshir Hossain M., Latif S.I., Spencer E.A.Hybrid Perturbations in
algorithms and software to ensure fine tuning and orientation Stacked Patch-Ring Circularly Polarized Microstrip Antennas for
of antennas in space. CubeSat Applications (2022) IEEE Aerospace and Electronic Systems
In general, modern cubesat inter-satellite communication Magazine, 37 (3), pp. 24 – 31 DOI: 10.1109/MAES.2022.3141436
antenna systems are complex technical systems that combine [7] Abulgasem S., Tubbal F., Raad R., Theoharis P.I.Dual Band All-Metal
innovative design solutions, new materials and advanced T-Shaped Patch Antenna for X/Ku-band CubeSat Applications (2022)
communication technologies. These systems are aimed at 2022 5th International Conference on Communications, Signal
Processing, and their Applications, ICCSPA 2022 DOI:
providing efficient, reliable and high-speed communication 10.1109/ICCSPA55860.2022.10019252
between cubesat satellites, which is essential for successful [8] Muntoni G., Montisci G., Melis A., Lodi M.B., Curreli N., Simone M.,
space missions and scientific research. Tedeschi G., Fanti A., Pisanu T., Kriegel I., Athanassiou A.,
Mazzarella G.A Curved 3D-Printed S-Band Patch Antenna for Plastic
FUNDING CubeSat (2022) IEEE Open Journal of Antennas and Propagation, 3,
This research has been funded by the Science Committee of pp. 1351 – 1363 DOI: 10.1109/OJAP.2022.3222454
the Ministry of Science and Higher Education of the Republic [9] Hammoumi M.E., El Amrani El Idrissi N., Raad R., Theoharis P.I.,
Tubbal F., Abulgasem S. Ultra Wideband Dual Circularly Polarized
of Kazakhstan AP14869120 "Design and creation of highly Patch Antenna for 5G and CubeSat Applications (2022) Proceedings -
directional satellite-to-satellite antenna systems with the best 2022 9th International Conference on Wireless Networks and Mobile
and optimal characteristics for the Cubesat form factor." Communications, WINCOM 2022 DOI:
10.1109/WINCOM55661.2022.9966460
[10] Ramezanzadehyazdi S., Shafai C., Isleifson D., Shafai L., Ferguson P.
ACKNOWLEDGMENT (Heading 5) An Optically Transparent Meshed Patch Antenna With Enhanced
Bandwidth for CubeSat Applications (2022) 2022 IEEE International
The authors would like to thank the organizing committee of Conference on Wireless for Space and Extreme Environments, WiSEE
2022, pp. 44 – 48 DOI: 10.1109/WiSEE49342.2022.9926940
ICEF2023 for the giving opportunity to publish the paper.
[11] Drobczyk M., Jetzschmann M., Nohka F., Budroweit J. A low-cost
Nanosatellite Approach: AISat-1 after 5 Years in Orbit (2020) 2020
REFERENCES IEEE Space Hardware and Radio Conference, SHaRC 2020, art. no.
The template will number citations consecutively within 9034063, pp. 5 – 8 DOI: 10.1109/SHaRC47220.2020.9034063
brackets [1]. The sentence punctuation follows the bracket [2]. [12] Fernandez L., Sobrino M., Ruiz-De-azua J.A., Calveras A., Camps
Refer simply to the reference number, as in [3]—do not use A.Design of a Deployable Helix Antenna at L-Band for a 1-Unit
CubeSat: From Theoretical Analysis to Flight Model Results(2022)
“Ref. [3]” or “reference [3]” except at the beginning of a Sensors, 22 (10), art. no. 3633 DOI: 10.3390/s22103633
sentence: “Reference [3] was the first ...” [13] Salem N.A.-D.M., Hussein A.I., Mabrook M.M.A proposed Array of
Number footnotes separately in superscripts. Place the Quadrifilar Helix Antenna for CubeSat applications (2023) 20th
International Learning and Technology Conference, L and T 2023, pp.
actual footnote at the bottom of the column in which it was 171 – 175 DOI: 10.1109/LT58159.2023.10092351
cited. Do not put footnotes in the abstract or reference list. Use [14] Meirambekuly N., Karibayev B.A., Namazbayev T.A., Ibrayev G.-
letters for table footnotes. G.A.E., Orynbassar S.O., Ivanovich S.A., Temirbayev A.A. A High
Gain Deployable L/S Band Conical Helix Antenna Integrated With
Unless there are six authors or more give all authors’ Optical System for Earth Observation CubeSats (2023) IEEE Access,
names; do not use “et al.”. Papers that have not been 11, pp. 23097 – 23106 DOI: 10.1109/ACCESS.2023.3253556
published, even if they have been submitted for publication, [15] Sureda M., Sobrino M., Millan O., Aguilella A., Solanellas A., Badia
should be cited as “unpublished” [4]. Papers that have been M., Munoz-Martin J.F., Fernandez L., Ruiz-De-Azua J.A., Camps A.
accepted for publication should be cited as “in press” [5]. Design and Testing of a Helix Antenna Deployment System for a 1U
- 286 -
CubeSat (2021) IEEE Access, 9, art. no. 9416495, pp. 66103 – 66114
DOI: 10.1109/ACCESS.2021.3075660
[16] Fernandez L., Sobrino M., Milian O., Aguilella A., Solanellas A.,
Badia M., Munoz-Martin J.F., Ruiz-de-Azua J.A., Sureda M., Camps
A.Deployment mechanism for a L-band helix antenna in 1-Unit
Cubesat (2022) Acta Astronautica, 196, pp. 394 – 399 DOI:
10.1016/j.actaastro.2020.09.005
[17] Alqaraghuli A.J., Singh A., Jornet J.M. Case Study on Deployable
Origami Antennas for Terahertz CubeSat Networks(2023) 2023
International Applied Computational Electromagnetics Society
Symposium, ACES-Monterey 2023 DOI:
10.23919/ACES57841.2023.10114788
[18] Velez C.A., Kaddour A.-S., Georgakopoulos S.V., Ynchausti C.,
Magleby S., Howell L.L. A Novel Miura-Ori Origami Reflectarray
Antenna for CubeSat Applications (2021) 2021 IEEE International
Symposium on Antennas and Propagation and North American Radio
Science Meeting, APS/URSI 2021 - Proceedings, pp. 1759 – 1760
DOI: 10.1109/APS/URSI47566.2021.9704247
[19] Hwang M., Kim G., Kim S., Jeong N.S. Origami-Inspired Radiation
Pattern and Shape Reconfigurable Dipole Array Antenna at C-Band for
CubeSat Applications
[20] (2021) IEEE Transactions on Antennas and Propagation, 69 (5), art. no.
9234044, pp. 2697 – 2705 DOI: 10.1109/TAP.2020.3030908
[21] Alqaraghuli A.J., Singh A., Jornet J.M. Compact Two-Stage Origami
Horn Antenna for Terahertz CubeSat Networks (2022) 2022 IEEE
International Symposium on Antennas and Propagation and USNC-
URSI Radio Science Meeting, AP-S/URSI 2022 - Proceedings, pp.
1102 – 1103 DOI: 10.1109/AP-S/USNC-URSI47032.2022.9886236
[22] Patent WO2021058111 - Method, arrangement, and computer
program product for inter-satellite links to reuse the resources of feeder
and service links. 2019,
https://patentscope.wipo.int/search/en/detail.jsf?docId=WO20210581
11
[23] Galkevich A. I., Fateev V. F. A method for creating a global
information environment in near-Earth space and a multifunctional
space information system "Paradigm" based on a network of low-orbit
spacecraft for its implementation. Patent No. 2701415,2019, https://
www.fips.ru/iiss/document.xhtml?faces-
redirect=true&id=77f3e8413b979b22aa33fe23068ae52cJ.
- 287 -
A method for improving the accuracy of navigation receivers using GPS as an
example.
Khussainov Ansar ([email protected]), Ibraim Merey ([email protected])*.
Gumarbek Daukeev Almaty University of Energy and Telecommunications, Almaty, 050013, Kazakhstan
Abstract. In this paper, the analysis of the development of a program to increase the accuracy coefficient of
raw data is carried out. GPS modules allow errors of 1-7 m on average. Based on these data, more accurate devices
were obtained. Measurements and comparative analyses of the data obtained with the developed method were carried
out. The main objective of the study is to improve the accuracy of GPS modules, to find a more profitable option for
filtering data to reduce the measurement error.
Introduction
The data used comes from the GPS receiver in NMEA-0183 format per hour of Grand VTG
messages. The speed measured by the equipment and transmitted in the VTG message indicates the
presence of jumps and other errors, which greatly complicates the task of controlling the GPS receiver.
Therefore, filtering is necessary to eliminate GPS noise. The reasons for interference in GPS data are
different. The main hindrances are:
- Atmospheric interference.
- Obstacles in the way of the signal.
- GPS position in orbit.
For example, the low inclination of GPS orbits (approximately 55°) seriously reduces accuracy in
the circumpolar regions of the Earth.
All this together leads to jumps in position, a change of course and other troubles. In this work, first
of all, it was necessary to get a filtered speed.
Therefore, it was decided to build a filter model in MATLAB, where, having obtained the speed as
a derivative of the GPS data presented by the GGA message, compare it with the original speed data from
the VTG message [1, 2].
Separation of navigation data
Navigation data filtering can be divided into hardware, performed by the GLONASS/GPS module,
and software, performed by the terminal software. Hardware filtering consists in the analysis of noise and
distortion of satellite signals and their subsequent processing using digital mathematical filters unique to
each receiver model. Software filtering is performed at the terminal or dispatch center and consists in the
final screening of navigation data obtained from the navigation module using statistical smoothing
algorithms, taking into account the readings of sensors installed on the mobile object, built-in factors of
loss of positioning accuracy and other analytical methods. In the case of vehicles, such sensors may be:
- Ignition relay, engine operation sensor, wheel rotation sensor and others. Thanks to their use, the
mobile terminal processes navigation information from the GLONASS/GPS module only after the sensors
are triggered, thereby eliminating rough emissions.
- Software filtering is a more universal way of screening out erroneous data and outliers, since in
this case there is no need to be tied to a specific manufacturer and type of navigation receiver.
It is advisable to carry out software filtering on the terminal of a mobile object, since in this case
the load on the data transmission channel between the mobile object and the dispatch center is significantly
reduced, and the workload of the information storage server is also reduced. Also in this case, it is possible
to transfer data in stack mode (priority for new data). Such an implementation does not require significant
resources for organizing calculations and is feasible on terminal equipment.
The existing data filtering methods used in satellite monitoring systems are based on the values of
the built-in positioning accuracy factors (HDOP, VDOP, PDOP), as well as the operation of sensors
installed on a mobile object.
To solve the problem of filtering navigation data, statistical filtering methods are known, including
mathematical smoothing algorithms (Kalman filter, least squares method, 3 sigma rule, median filter), as
well as criteria for discarding data outliers (criterion Grabs, criterion Chauvenet, criterion Pearce, Dixon's
- 288 -
Q-test).
In the case when the number of consecutive outliers is small, the use of various smoothing
algorithms makes it possible to achieve high accuracy of navigation data on the location of the object. In a
situation where successive outliers form a whole "bundle", smoothing algorithms do not cope (low
accuracy), therefore it is necessary to use methods that can discard erroneous information.
Thus, the use of various smoothing algorithms does not completely avoid errors in the data, since
such algorithms can achieve high accuracy only when analyzing data for a certain period (formed sample),
which do not cope well with smoothing newly incoming data, especially in cases where the latter are
erroneous [3, 4].
Definitions of the Kalman filter
The Kalman filter is an effective recursive filter that evaluates the state vector of a dynamic system
using a series of incomplete and noisy measurements. Named after Rudolf Kalman.
The Kalman filter is widely used in engineering and econometric applications: from radars and
vision systems to estimates of parameters of macroeconomic models. Kalman filtering is an important part
of control theory and plays an important role in the creation of control systems. Together with the linear-
quadratic regulator, the Kalman filter allows solving the problem of linear-quadratic Gaussian control. The
Kalman filter and the linear-quadratic regulator are a possible solution to most fundamental problems in
control theory.
In most applications, the dimension of the object state vector exceeds the dimension of the
observation data vector. At the same time, the Kalman filter allows you to evaluate the complete internal
state of the object [5,6,7].
The Kalman filter is designed to recursively evaluate the state vector of a priori known dynamic
system, that is, to calculate the current state of the system, it is necessary to know the current measurement,
as well as the previous state of the filter itself. Thus, the Kalman filter, like other recursive filters, is
implemented in a temporal, not in a frequency representation, but, unlike other similar filters, the Kalman
filter operates not only with state estimates, but also with estimates of the uncertainty (distribution density)
of the state vector, based on the Bayes formula of conditional probability.
The algorithm works in two stages. At the prediction stage, the Kalman filter extrapolates the values
of state variables, as well as their uncertainties. At the second stage, according to the measurement data
(obtained with some error), the extrapolation result is refined. Due to the step-by-step nature of the
algorithm, it can monitor the state of an object in real time (without looking ahead, using only current
measurements and information about the previous state and its uncertainty).
A good example of the filter's capabilities is obtaining optimal, continuously updated estimates of
the position and velocity of some object based on the results of a time series of inaccurate measurements
of its location. For example, in radar there is a task of tracking a target, determining its location, speed and
acceleration, while the measurement results are received gradually and are very noisy. The Kalman filter
uses a probabilistic model of target dynamics that specifies the type of probable movement of the object,
which reduces the impact of noise and provides good estimates of the position of the object at the present,
future or past time [8,9,10].
The Kalman filter operates with the concept of a system state vector (a set of parameters describing
the state of the system at some point in time) and its statistical description. In general, the dynamics of a
certain state vector is described by the probability densities of the distribution of its components at each
moment of time. In the presence of a certain mathematical model of observations of the system, as well as
a model of a priori change in the parameters of the state vector (namely, as a Markov forming process), it
is possible to write an equation for the a posteriori probability density of the state vector at any time. This
differential equation is called the Stratonovich equation. The Stratonovich equation is not solved in general.
An analytical solution can be obtained only in the case of a number of constraints (assumptions):
● Gaussian a priori and a posteriori probability densities of the state vector at any time (including
the initial one)
● Gaussian generating noises
● Gaussian noise observations
● White noise observations
● Linearity of the observation model
● Linearity of the model of the forming process (which, recall, should be a Markov process)
The classical Kalman filter is an equation for calculating the first and second moments of a
posteriori probability density (in the sense of a vector of mathematical expectations and a matrix of
variances, including mutual ones) under these constraints. Due to the fact that for a normal probability
- 289 -
density, the mathematical expectation and the variance matrix completely set the probability density, we
can say that the Kalman filter calculates the a posteriori probability density of the state vector at each time,
which means it fully describes the state vector as a random vector quantity.
The calculated values of mathematical expectations at the same time are optimal estimates
according to the standard error criterion, which causes its wide application.
There are several varieties of the Kalman filter, differing in approximations and tricks that have to
be applied to reduce the filter to the described form and reduce its dimension:
● Advanced Kalman filter. Reduction of nonlinear models of observations and the forming process
by means of linearization by means of Taylor series expansion;
● Sigma-point Kalman filter. It is used in tasks in which simple linearization leads to the destruction
of useful connections between the components of the state vector. In this case, the "linearization" is based
on a sigma-point transformation. Used to reduce the dimension of the problem;
● Options with a non-linear additional filter are possible, allowing to bring non-Gaussian
observations to normal;
● There are options with a "whitewashing" filter that allows you to work with "colored" noise, etc.
In addition, there are analogues of the Kalman filter that use the continuous time model in whole
or in part:
● Kalman — Bucy filter, in which both the evolution of the system and the measurements have the
form of functions of continuous time;
● Hybrid Kalman filter that uses continuous time to describe the evolution of the system and
discrete moments of time for measurements.
Kalman filters are based on time-discretized linear dynamical systems. Such systems are modeled
by Markov chains using linear operators and terms with normal distribution. The state of the system is
described by a vector of finite dimension — the state vector. At each clock cycle, the linear operator acts
on the state vector and translates it into another state vector (deterministic state change), some vector of
normal noise (random factors) is added and, in general, a control vector simulating the impact of the control
system.
The Kalman filter can be considered as an analogue of hidden Markov models, with the difference
that the variables describing the state of the system are elements of an infinite set of real numbers (unlike
the finite set of the state space in hidden Markov models). In addition, hidden Markov models can use
arbitrary distributions for subsequent values of the state vector, unlike the Kalman filter, which uses a
normally distributed noise model. There is a strict relationship between the equations of the Kalman filter
and the hidden Markov model.
When using the Kalman filter to obtain estimates of the process state vector from a series of noisy
measurements, it is necessary to present a model of this process in accordance with the filter structure —
in the form of a matrix equation of a certain type.
Mathematical model of the system
The receiver has two inputs, from which it is necessary to calculate the useful signal x. However,
since it is difficult to obtain accurate data, an approximate or estimated value (1) is calculated.
{𝑧1 = 𝑥 + 𝑛1 𝑧2 = 𝑥 + 𝑛2 (1)
If there is a mathematical algorithm that evaluates the output of the device, let's also evaluate the
performance of this algorithm, since the algorithm itself depends on the performance criteria. Whichever
algorithm is used, an epsilon error will inevitably occur, which is an error between the actual value of the
coordinate and the resulting estimate at the output of the resulting algorithm, so the optimal algorithm will
generate an error with a mathematical expectation equal to zero (2) [11].
Since we get both positive and negative data, it is not easy to take the estimate itself as an estimate,
so we take the square of the error we have
𝜀 = 𝑥 − 𝑥̂ = 𝑥 − 𝑢 (𝑧1 , 𝑧2 ) (3)
- 290 -
𝑅(𝜀) = 𝜀 2 = (𝑥 − 𝑥̂)2 (4)
Since the value of R can be small for one dimension and large for many dimensions, it is necessary
to construct an equation that minimizes the square of the non-specific error (3,4). On average,
mathematically speaking, this is the expectation that the error should be as small as possible. The
application of the above operations gives equation (5).
In the case of Gaussian noise, it was shown that the optimal, i.e. the best, algorithm can be
constructed using a linear combination in (6), so the next task is to build an algorithm that minimizes the
error criterion.
𝑢(𝑧1 , 𝑧2 ) = 𝛼1 𝑧1 + 𝛼2 𝑧2 (6)
Multiply the values of z_1 and z_2 by some unknown gravity coefficients α_1 and α_2.Equation
(7) can be obtained.
These expressions of two unknowns can be optimally reduced to finding just one coefficient if these
coefficients meet this condition. (8)
𝛼1 + 𝛼2 = 1 ⟹ 𝛼1 = 1 − 𝛼2 (8)
Substituting the values of observations z_1 and z_2 into the corresponding formula, the quality
criterion takes the form (11).
According to probability theory, the observed voices n_1 and n_2 can be considered independent
of each other. Then it is decomposed into the sum of squares of mathematical expectations, which is the
following equation (12).
- 291 -
𝑃 = 𝑀{((1 − 𝛼)𝑛1 ))2 } + 𝑀{(𝛼𝑛2 )2 } = (1 − 𝛼)2 𝜎12 + 𝛼 2 𝜎22 (12)
The optimal parameter α of (12) is a parabola depending on α. The following equation (13) is
differentiated.
1 𝜎2
𝛼 = 𝜎2 +𝜎 2 (13)
1 2
At the same time, the observation processing algorithm itself takes this form (14).
𝜎12 𝜎12
𝑥 = ∙ 𝑧1 + ∙ 𝑧2 (14)
𝜎12 +𝜎22 𝜎12 +𝜎22
The result is obtained from two observations. If we consider the evaluation algorithm as a special
case of the implementation of the Kalman filter, then we can generally understand the essence of its work.
(15,16)
To obtain results from the two observations obtained. The evaluation algorithm is perceived as a
special case of the implementation of the Kalman filter and in general it reflects the essence of his work.
(15,16)
𝑃𝑘−1 ∙𝜎𝑘2
𝑃𝑘 = 𝑃𝑘−1
(15)
𝑃
𝑥̂𝑘 = 𝑥̂𝑘 + 𝜎𝑘2 ∙ (𝑧𝑘 − 𝑥̂𝑘−1 ) (16)
𝑘
This expression is a Kalman filter in discrete time, its block diagram can be presented in the
following block diagram (Figure 2).
Another observation comes to the input, you need to subtract the previous estimate from it, that is,
we form a formula, then multiply the multiplier, then add it all up again with the previous estimates and get
X at the output. As the number of observations increases, more and more accurate estimates of x_k will be
obtained. The key feature, due to the recurrent principle of the filter, with its computational complexity, the
operability remains constant for any number of observations [12, 13, 14].
- 292 -
Figure 3 – Algorithm of the GPS accuracy improvement method.
The signals were filtered using an algorithm, and the error variance was calculated and the
estimation errors were analyzed. 100 observations were selected, sufficient to evaluate the performance of
the algorithm. The average variance of noise and signal was taken in order to simulate real conditions as
much as possible [15].
At the end of the verification of the algorithm's operability, we proceed to the assembly and testing
of the equipment. For the first experiment, a simulation model based on the “Tinkercad" software was used.
This program allowed to simulate the present conditions and the creation of the device (Figure 4).
After full testing, you need to proceed to the assembly in order to test the algorithm in real
conditions (Figure 5).
- 293 -
Figure 5 – Connection of the board according to the scheme.
An Arduino board was used to operate the algorithm, and a signal was received as data, received
and filtered from a vibration sensor. It was decided that in order to test the algorithm, a constant sensor
operation time will be used (Figure 6).
With the help of the developed algorithm, it is possible to improve the quality of the data obtained,
which will lead to better data. When testing the algorithm, problems were identified due to the fact that the
data received from the satellite differs from the data received in this way, This problem was solved by
optimizing the code for RAW and GDA format data. So the algorithm was able to produce very good
indicators compared to its competitors like GLONASS and Galileo [16,17].
After checking, you need to start assembling this model using operated devices, such as (GPS
module (EVK–6T–0–001 series), GPS antenna (M827B series),) (Figure 7).
- 294 -
This GPS module is used to receive data from Satellites after connecting to the network, using an
algorithm to get raw data from it and optimize them. All the data came to us in RAW format after an
algorithm was used that helped to get more accurate data (Figure 8).
This antenna was needed in order to receive data and contact the satellite, and then correct the
received data. During the experiment, data were obtained from different satellites (Figure 9).
When connecting two modules, data was transmitted, but there was a problem that the amount of
interference increased due to additional data transmission. At this stage of the assembly, the algorithm was
again optimized taking into account this problem (Figure 10).
- 295 -
Figure 10 - Analysis of the obtained data for the entire time of the experiment.
After successful execution of the algorithm, it was decided to compare all the data obtained, from
the first model to the last. At the final stage of the design, it was revealed that the quality of the algorithm
itself had been increased over the entire time of operation, and it also turned out to achieve high-quality
data processing. If we compare competitors such as GLONASS and Galileo, then this algorithm will be
able to use one of the effective ways of filtering data to increase accuracy, which was demonstrated above
in experiments [18].
Now, as the zone and vehicle were determined and selected, it is possible to test correctly and apply
raw data to begin with, and then use the algorithm and see how effective the algorithm is (Figure 12).
- 296 -
Figure 12 – Received data. Blue color - raw data, Red color - data after processing.
The efficiency of the algorithm and the accuracy of data processing have been verified by proper
tests. In Figure 12, the initial data is indicated in blue, that is, data without filtering, and the already filtered
and processed data is indicated in red. This can be especially noted in turns, where the motion vector
changes and the raw data has a large error.
Conclusion
Based on the results of this study, it is possible to identify the optimal method of filtering navigation
data for recognizing a more accurate location using a GPS receiver. The method implies a reduction in the
error of navigation data using Kalman filtering. The work of the GPS receiver using the Kalman filter was
done on MatLab/Simulink software. Figure 13 shows graphs of distance, speed and acceleration relative to
the GPS receiver.
Figure 13 – Output of the GPS receiver results using the Kalman filter.
- 297 -
Two values were considered - actual and estimated. The data obtained contribute to
understanding the evaluation of the accuracy of the algorithm using the unit of measurement. At the same
time, it is possible to determine the influence of distance, speed and acceleration on the dependence of
data acquisition and their truth.
BIBLIOGRAPHY
[1] F. Babich, M. Comisso, A. Cuttin, M. Marchese, and F. Patrone,
[2] ‘‘Nanosatellite-5G integration in the millimeter wave domain: A full topdown approach,’’ IEEE
Trans. Mobile Comput. , vol. 19, no. 2, pp. 390–404,
[3] Feb. 2020.
[4] H. Al-Hraishawi, H. Chougrani, S. Kisseleff, E. Lagunas, and S. Chatzinotas, ‘‘A survey on non-
geostationary satellite systems: The communication perspective,’’ 2021, arXiv:2107.05312.
[5] Zhou Haitao, Wang Lei, Fu Wenju, Han Yi, Li Tao, Li Wei, Chen Ruizhi, “Real-time single-
frequency precise point positioning using BDS-3 PPP-B2b corrections”, Dec 2022.
[6] Sun Jin, Chen Zhengyu, Wang Fu, “A Novel ML-Aided Methodology for SINS/GPS Integrated
Navigation Systems during GPS Outages”, vol 23, Dec 2022.
[7] Technical Specification Group Radio Access Network; Solutionsfor NR to Support Non-Terrestrial
Networks (NTN) (Release 16),document 3GPP TR 38.821, Version 16.0.0, 3rd Generation Partnership
Project, 2019.
[8] Leyva-Mayorga, B. Soret, and P. Popovski, ‘‘Inter-plane inter-satellite connectivity in dense LEO
constellations,’’ IEEE Trans. Wireless Commun. , vol. 20, no. 6, pp. 3430–3443, Jun. 2021.
[9] I. D. Portillo, B. G. Cameron, and E. F. Crawley, ‘‘A technical comparison of three low earth orbit
satellite constellation systems to provide global broadband,’’ Acta Astronautica, vol. 159, pp. 123–135,
Jun. 2019.
[10] AWS Ground Station. Accessed: Sep. 1, 2021. [Online]. Available:
https://aws.amazon.com/ground-station
[11] Nelson Acosta, Juan Toloza, “Techniques to improve the GPS precision”, vol 3, pp 2-4
[12] Union of Concerned Scientists. UCS Satellite Database 2021. Accessed: Oct. 1, 2021. [Online].
Available: https://www.ucsusa.org/resources/satellite-database
[13] R. G. W. Latio, ‘‘Social and cultural issues: The impact of digital divide on development and how
satellite addresses this problem,’’ Online J. Space Commun. , vol. 2, no. 5, pp. 1–17, 2021.
[14] H. Al-Hraishawi, E. Lagunas, and S. Chatzinotas, ‘‘Traffic simulator formulti beam satellite
communication systems,’’ in Proc. 10th Adv. Satell. Multimedia Syst. Conf., 16th Signal Process. Space
Commun. Workshop(ASMS/SPSC), Oct. 2020, pp. 1–8.
[15] Y. Turk and E. Zeydan, ‘‘Satellite backhauling for next generation cellular networks: Challenges
and opportunities,’’ IEEE Commun. Mag. , vol. 57,no. 12, pp. 52–57, Dec. 2019.
[16] BegümErçevik Sönmez and DenizErinsel Önder, “The influence of GPS-based navigation systems
on perception and image formation: A case study in urban environments” vol. 86, March 2019, pp. 102-
112.
[17] H. Al-Hraishawi, S. Chatzinotas, and B. Ottersten, ‘‘Broadband nongeostationary satellite
communication systems: Research challenges andkey opportunities,’’ in Proc. IEEE Int. Conf. Commun.
Workshops (ICCWorkshops), Jun. 2021, pp. 1–6.
[18] Kanouj M.M., Klovok A.V., “Adaptive Unscented Kalman Filter for Tracking GPS signals in the
Case of an Unknown and Time-Varying Noise Covariance” vol 3, Jule 2021, pp 224-235
[19] Zeng Zhanjing, Chen Po-Ju, Xiao Xiao, Liu Peixue, Zhang Jie, “The mediating and moderating
effects on the intention to use navigation apps”, vol 5, Nov 2022, pp 972-991
[20] European Space Agency. European Data Relay Satellite System (EDRS). Accessed: Aug. 15, 2021.
[Online]. Available: https://artes.esa.int/edrs/overview
- 298 -
August 22(TUE) - 25(FRI), 2023
Poster Session 1
- 299 -
A Study on the Partial Discharge
Characteristics of VTs and CTs by Applying
Repeated Impulses
Ji Man Park 1 Ja Yoon Kang 1 Young Chae Mun 1 and Ga Ram Han 1*
1
Korea Electrical Safety Corporation Research Institute, Republic of Korea
Email: [email protected]
Abstract—As the use of epoxy-insulated electrical equipment This paper presents the results of partial discharge
continues to increase, VTs(Voltage Transformers) and measurements on VTs and CTs by applying repetitive
CTs(Current Transformers) have also been replaced by epoxy impulses. For measuring PD, six VTs and CTs from three
insulation rather than oil-filled insulation. However, the partial manufacturers were used, and the maximum voltage was
discharge measurement technique for determining the applied up to 180 kV. In order to acquire PD data,
deterioration state of epoxy insulation facilities, such as VTs and TECHIMP’s AQUILA model with HFCT sensor and a
CTs, is slow to develop. In this paper, partial discharge contact-type electromagnetic wave partial discharge
measurement was performed for PTs and CTs by applying measurement equipment (CALVUS INSTRUMENTS) were
repeated extra-high voltage impulses, and the results were
adopted for comparison of two different measurement
analyzed. An 800kV impulse generator(HAEFLY) was used for
applying impulses to VTs and CTs. Partial discharge (PD)
techniques. The experimental system was set up consists of
measurements were carried out using CALVUS two transformers(one for step-up and the other is step-down),
INSTRUMENTS (C3.5), a contact-type electromagnetic wave a VT (CT), a power cable and a load, and experiments were
partial discharge measurement equipment, and carried out by replacing VT and CT samples. As a result of the
AQUILA(TECHIMP) which measures PD by an HFCT(High- experiment, it was confirmed that the facility deteriorated and
Frequency Current Transformer) sensor. Impulse was applied partial discharge occurred only when a considerable number
to six VTs and CTs of three manufacturers and partial of impulses were applied. From the PD measurement results,
discharge measurement was performed and the results were by comparing HFCT and contact-type measurement
analyzed in this paper. equipment, PD characteristics of epoxy insulation with
repetitive impulse stress was analyzed.
Keywords—partial discharge, voltage Transformer, current
Transformer, Degradation, Impulse II. EXPERIMENTAL SETUP
I. INTRODUCTION A. Configuraton of Simple Test System
Due to the excellent insulation performance of epoxy, If the PD measurements is executed for individual
existing insulation materials are steadily replaced by epoxy. facilities or artificial defects in insulation, it is difficult to
These electrical facilities with epoxy insulation, such as cast- obtain data usable for on-site. Therefore, in this paper, a
resin transformers, VTs & CTs and line post insulators, have simple experimental system was constructed and the PD was
played an important role in operation of electrical network. measured by replacing VT and CT samples. The simple
Therefore, it is extremely important to prevent unexpected experimental system consists of two cast-resin transformers,
failures by applying various diagnosis techniques. VT/CT sample, an XLPE power cable and adjustable load.
One cast-resin transformer was used for step-up (380V to
Measurements on insulation resistance and dielectric 22.9kV) and the other for step-down (22.9kV to 380V). Two
strength are widely used techniques for estimating condition cast-resin transformers and VT(CT) were connected with
of epoxy insulation. However, because these techniques 22.9kV CNCV XLPE power cables. Fig. 1 shows the
involve inevitable power outage, economic loses and configured simplified experimental system.
inconvenience will be incurred to network owners. In addition,
owing to the pre-works that separating from individual facility
to electrical network, the entire process of inspection takes
more than an hour.
In order to solve these problems, inspection techniques
without power outages is actively being adopted. Partial
discharge measurement is one of the effective method for
inspecting the deterioration status of epoxy insulation in live-
wire state, and widely applied PD measurement sensor is an
high frequency current transformer (HFCT) that is installed to
ground wire. However, PD measurement using HFCT sensor
has obvious limitations that it is difficult to identify defected
facility why various type of signals flow into the ground wire.
The fact that limitation of an HFCT and lack of alternative
options make it difficult to access of study on the partial
discharge characteristics of epoxy insulation [1-4]. Fig. 1. Configration of simple test system
- 300 -
B. Partial Discharge Measurement Equipment
In order to measure PD from deteriorated VTs and CTs by
repetitive impulses, two type of PD measurement equipment
were used. One is AQUILA model manufactured by
TECHIMP, which is using HFCT sensor for PD measurement.
The other is C3.5 model that is contact-type electromagnetic
wave detection sensor manufactured by CALVUS
INSTRUMENTS. C3.5 model consists of modularized sensor,
connection bar and a tablet with analyzing software. Fig. 2
shows equipment for PD measurement.
III. PARTIAL DISCHARGE MESUREMENT OF VTS AND CTS
The performance of the epoxy insulation is degraded due Fig. 3. 800kV impulse generator(HAEFLY), picture of impulset
to the influence of overvoltage or overcurrent. In this paper, application and PD measurement
the insulation performance was artificially degraded through
repeated lightening impulse application to VTs and CTs. IV. MEASUREMENT RESULTS
When the manufacturing process is completed, VTs and Table 1 shows the experimental results. In the case of CT
CTs must conduct lightening impulse tests in accordance with by company K, PD was detected after 2,090 impulse
the Korea Electro-Technical Code (KEC) regulations. The test applications. Based on the electromagnetic partial discharge
method is to apply a lightening impulse voltage of 95 kV (125 method, 2,086pC was measured as well as 68pC was detected
kV) 15 times in positive polarity and 15 times in negative in VT of Company D and 142pC was detected in VT of
polarity for epoxy insulated CT, and there shall be no company K. During the lightening impulse experiment, in the
abnormality even after applying the lightening impulse. In this waveform shape of the impulse generator, it is observed that
study, lightening impulses were applied 30 times to positive pulse distortion according to the PD occurrence.
and negative polarities and PD measurements were executed
every end of the application of lightening impulses. Applying TABLE I. TABLE TYPE STYLES
30 times of lightening impulses and PD measurements were PD
repeated until the PD was occurred in target facilities. The Manufac Number of
Maximum PD magni
turer / applied
application of impulses proceeded differently for each facilities impulses
voltage occurrence tude
manufacturer and maximum impulse voltage was 180 kV. [pC]
Company
2,090 175kV O 2,086
There are various VT and CT manufacturers in Korea, and K / CT
it is impossible to perform PD measurement tests for all Company
6,000 150kV X -
manufacturers. Therefore, in this study, three representative W / CT
Company
manufacturers (K, D, and W companies) were selected and D / CT
4,600 180kV X -
experiments were executed on a total of six units, one each of Company
VT and CT. In the case of CT of Company K, the initial 2,437 150kV X -
K / VT
lightening impulse voltage started at 95 kV, and after the Company
218 140kV Δ 68
impulse voltage was applied 1,110 times, the test voltage was W / VT
Company
gradually increased to a maximum of 175 kV. VT and CT of
D / VT
80 140kV Δ 142
other companies were also experimented in this way, and in
the case of Company D, no partial discharge occurred even
after repeated impulse application, so an impulse voltage was
gradually increase up to 180 kV.
The application of lightening impulses were performed
total 15,424 times. However, a CT that manufactured by W
company, PD was not measured even though 6,000 times of
lightening impulses were applied. Details on measurement
results will be covered in chapter 4.
Fig. 4. Comparison for the pulse shape of the first applied impulse and
Identify applicable funding agency here. If none, delete this text box. 2,088th applied impulse
- 301 -
A. PD Measurement results TABLE II. TABLE TYPE STYLES
- 302 -
An Application of Terahertz Wave for Detecting
Insulation Defects in 22.9kV XLPE Power Cable
Ji-Man Park 1, Young-Chae Mun 1 and Ja-Yoon Kang 1*
1
Electrical Safety Research Institute of Korea Electrical Safety Corporation, Korea
Email: [email protected], [email protected]
Abstract— Recently, various on-line diagnostic XLPE using electrodes. Terahertz was applied to these
techniques for detecting insulation defects in electrical samples, and the results were analyzed.
facilities are being studied, and partial discharge measurement
is the most commonly used for detecting insulation defects. II. PHYSICAL FAULT DETECTION AND ANALYSIS
However, since the partial discharge diagnosis technique A. Specimen
relies only on signals, it is not possible to estimate a clear
source of defects, and it is also very difficult to determine the The physical defect sample is a simulation of void defects
type of defects. In this paper, we tried to detect images by in XLPE. Figure 1 is a photograph for describing a physical
applying terahertz waves for each defect type of XLPE. For defect sample. A hole was made using a 2mm drill for void
the test, 22.9Kv (Korean electrical system nominal voltage) defects. As shown in Fig. 1(a), six holes were made with the
CNCV-w XLPE (Concentric Neural Cross-linked drill 1 mm away from the surface. The 1 mm distance is H2
polyethylene insulated Vinyl Sheathed Cable) was used. and H6, the 2 mm distance is H3 and H5, and the 3 mm
Experiments were conducted on samples of physically and distance is H1 and H4. The 180︒ to 360︒ sections included
electrically generated defects, and it was analyzed whether a semiconductor layer actually used on the XLPE surface.
terahertz waves could be detected for each type of defect in This was included to confirm the effect of transmission
the XLPE cable. characteristics on the semiconductor layer because terahertz
waves are reflected against metal objects. The scan direction
Keywords— Terahertz wave, Internal defect detection, was counterclockwise at 0︒ as shown in the picture. (b) in
XLPE cable, Scanning image, Electrical tree Figure 1 is a side photograph after the hole is made.
I. INTRODUCTION
The development of inspection and diagnosis technology
for high-voltage power facilities is very important for ensuring
safety and efficient maintenance. The inspection of electrical
facilities has been mainly conducted in the form of measuring
insulation resistance and insulation resistance after shutting
down the entire facility, but in industrial facilities such as
factories, a single power outage causes huge losses, and in
residential areas, home appliances fail or inconvenience.
Therefore, the development of uninterruptible inspection (a)
technology is actively underway at home and abroad, and in
particular, the development of sensors and constant
monitoring technologies for partial discharge measurement is
actively underway. However, since these techniques must be
judged by the detected signal, the know-how of experienced
experts is required, and the biggest problem is that the
deterioration state must be determined only by the
measurement signal, making quantitative judgment difficult.
Terahertz technology is a technology that can see the (b)
inside of objects using terahertz waves, and has recently been
Fig. 1. XLPE Cable Physical Defects
actively applied to airport checkpoints and food inspections,
and has the advantage of being harmless to the human body.
B. The result of an experiment
If terahertz waves can be applied to insulators to image
internal defects, it can be a good alternative as it can be used Figure 2 summarizes the results of applying terahertz
by non-experts as well as intuitive judgment, but little research waves to physical defect samples. Figure 2 shows the result of
is currently being conducted to apply terahertz technology to detecting the internal image with (a) time domain and (b)
electrical facilities.[1] frequency domain, respectively. As a result of image detection,
a void defect estimated from H1 to H6 was estimated.
In this paper, terahertz was applied to detect internal Through these results, it was confirmed that the
images by defect type of XLPE. The defect type was tested on semiconductor layer used in XLPE is capable of internal
samples generated physically and electrically. As for the transmission and does not affect securing defects in XLPE. In
physical type, holes were artificially created in the XLPE, and addition, it was confirmed that defects in mm could be
as for the electrical type, an electric tree was created in the detected.
- 303 -
B. The result of an experiment
Figure 4 summarizes the results of applying terahertz
waves to electrical defect samples. The red box indicates
where the electric tree image should be secured. However,
images presumed to be electrodes in two types were detected,
but no images were objectively judged to be electric trees.
Unlike physical defects, it is presumed to be due to limitations
in resolution to detect defects in units of um.
(a)
IV. CONCLUSION
In this paper, we experimented on whether it is possible to
detect internal defects in power facilities as images using
terahertz waves. The experiment was conducted by simulating
physical and electrical defects on the XLPE of the XLPE cable.
As a result of the experiment, it was confirmed that image
detection can be performed inside XLPE. However, physical
(a) Busy type defects in XLPE were secured, but electrical defects were not
secured. As a result, the inside of the cable could not be
completely detected due to limitations such as transmission
depth and resolution. In the future, we will study scan modules
related to resolution and scan methods of XLPE cables to
detect accurate internal images.
REFERENCES
- 304 -
A Study on the On/off-line Framework for
Asset Management of 154 kV Electrical Facilities
Young Kyu Mo1*, Min Hwang1, Pil-sung Woo1, Joon-Ho Son1, Youngseok Kim1
1
Electrical Safety Research Institute, Korea Electrical Safety Corporation, Republic of Korea
Email: [email protected]
Abstract—The safety of electrical facilities that supply II. ON/OFF-LINE FRAMEWORK FOR ASSET MANAGEMENT
electrical energy requires operation and management based on
the balance of efficiency and reliability. To ensure the safety of A. Asset management of electrical facilities
electrical facilities, rational management is required to maintain For asset management of electrical facilities, life cycle
the performance of the facilities that make up the facilities above management is required to record the entire process from
a certain standard at all times. To this end, an important
design to disposal. Figure 1 shows the life cycle management
indicator is the degree to which the original performance and
process of a typical electrical facilities. It can be divided into
function are maintained within the period of use based on the
reliability and safety of electrical facilities. Continuous diagnosis
four stages, such as design, construction, operation, and
and history management are required to maintain the degree of disposal, based on the state of electrical facilities, and repair
facility's health similar to its initial performance from a or replacement is performed through safety management,
maintenance perspective. This paper proposes the concept of an regular inspection, and precise diagnosis during facility
asset management framework for 154 kV electric facilities to operation. When repair is not possible due to aging or when
ensure the safety of electric facilities operating electric facilities replacement is economically advantageous, electrical
for large-capacity customers. The proposed on/off-line asset facilities is disposed. The asset management of 154 kV power
management framework consists of a conceptual model of the equipment presented in this paper is a combination of online
system to provide life-cycle electrical safety services for 154kV real-time monitoring through sensors and IoT modules
large-capacity electrical facilities using platform-based on/off- optimized for abnormal condition detection, such as partial
line data. discharge, voltage, current, insulation condition, and
temperature, and offline data such as pre-use inspection,
Keywords— Asset Management, Safety Management, Safety regular inspection, and precision diagnosis of electrical
diagnosis, Life prediction, Life assessment facilities.
I. INTRODUCTION
Electrical facilities are characterized by long-term
operation, and each elements that makes up the facility
degrades due to electrical, thermal, and environmental stress
over time[1]. Moreover, the long-term operation of power
facilities in this aging deterioration causes the operation of
electrical facilities to be suspended due to unexpected failures,
resulting in serious electrical accidents such as defects in
production products due to power outages and, in the worst
case, electric fires/electric shock[2]. In particular, if such a
Fig. 1. Life cycle management process of a typical electrical facilities.
sudden failure of power facilities occurs in large-capacity
customers, which are important national industrial facilities
B. On/off-line data definition
such as semiconductor production plants, it could cause
enormous damage that threatens the survival of companies, On/off-line data is essential data for asset management of
people's lives, and even the national economy. To ensure the 154kV electrical facilities. Online collected data is converted
safety of electrical facilities, rational management is required into data based on time series, and the status and deterioration
to maintain the performance of the facilities that make up the information data of electrical facilities such as partial
facilities above a certain standard at all times[3]. To this end, discharge, thermal image, and power quality sensor can be
an important indicator is the degree to which the original acquired in real time. Offline collected data can be acquired
performance and function are maintained within the period of through visual and facility measurement inspections by field
use based on the reliability and safety of electrical facilities. experts at regular intervals. By utilizing the acquired on/off-
Continuous diagnosis and history management are required to line data, it is possible to perform effective asset management
maintain the degree of facility's health similar to its initial by providing services such as abnormal symptom monitoring
performance from a maintenance perspective. The safety of electrical facilities, safety rating, life assessment, and life
management of existing electrical facilities is managed by prediction. Korea Electrical Safety Corporation selected
regular inspections according to a certain cycle, safety inspection items and sensors applied to 154k oil-immersed
diagnosis by customer requests, and safety management transformers and cables as they conducted “digital system
agencies. Accordingly, in order to efficiently manage facilities, inspection”. Figure 2 shows the digital system inspection
it is necessary to understand the status of the facility's history items and sensors.
management base and to provide information on the
repair/replacement decision-making of facility owners based
on the use of information during the life cycle.
- 305 -
healthiness score can be calculated by classifying grades
according to the diagnostic results of parameters such as
facility condition, life, and degree of deterioration, and
multiplying the score for each grade by a weight. The sum of
the calculated scores is the health index, which was developed
by applying the diagnostic work of the Korea Electrical Safety
Corporation based on the IEC White paper health index
algorithm.
Fig. 2. Digital system inspection item and sensor for each electrical
facilities.
- 306 -
Design of Real-time Monitoring/Diagnosis
Algorithm for Electrical Facilities
Email: [email protected]
Abstract— With the development of IoT technology, facility In addition, when analyzing accidents by cause of
monitoring/diagnosis technology through real-time monitoring is electrical facilities, natural deterioration (250 cases, 7.8%),
required for the operation of various and safe electrical facilities insulation failure (241 cases, 7.5%), protection malfunction
using AI. This study aims to design an algorithm to perform failure (118 cases, 3.7%), and overload (117 cases, 3.6%).
determination and prediction by learning abnormal signals of
electrical facilities with artificial intelligence through real-time Natural degradation (7.8%) means that there are the most
monitoring of electrical facilities using current, infrared, high accidents caused by aging of facilities, and insulation defects
frequency, vibration, gas sensors, etc. To design the algorithm, it (7.5%) are also believed to be the fundamental cause of
will analyze the failure mechanism of electrical facilities, learn insulation defects due to deterioration in facilities that have
logical consistency with sensors through failure case analysis, progressed slowly during the life cycle.
quickly determine the presence or absence of failure of electrical
facilities through failure judgment and prediction. Protective device malfunction (3.7%) and overload (3.6%)
refer to stress from the outside of the facility, and this is due
Keywords—electrical facilities, real-time monitoring, to malfunction or strain on the facility due to external stress
algorithm such as overvoltage and overcurrent.
In the case of overload (3.6%), it is judged to be an
unexpected increase in load during design.
I. INTRODUCTION
As a result of examining the disaster status, it is difficult
Looking at the current status of electrical disasters in to determine the cause of many accidents caused by electricity,
Korea in 2021, others account for the largest number of fires and the electrical safety inspection currently in operation is
in electrical facilities. This shows that it is not easy to clearly determined based on the standard range of measurements
identify the cause of the accident for the facility because it has measured during inspection.
not been identified exactly what the cause of the fire caused
by the electrical facility is, or if it is a minor accident to be It is necessary to continuously monitor/diagnose the
identified. condition of the facility through a real-time diagnosis and risk
prediction system of electrical facilities, and to clarify the
Looking at the number of electrical fires by facility, cause of failure through data through artificial intelligence
wiring/wiring devices accounted for the largest number of learning through data.
cases with 1,887 (22.9%), followed by electrical facilities with
991 (12.0%) and seasonal devices with 928 (11.3%). However, A safety management system for electrical facilities is
2,537 cases (30.7%) are unknown, and others are high at 394 required to build big data through data analysis by reviewing
cases (4.8%). the characteristics, type of failure, and cause of failure of
sensors for monitoring/diagnosis.
When analyzing accidents by electrical facilities, 1,883
cases (58.5%) occurred in low-pressure electrical facilities, 38
cases (1.2%) in high-pressure electrical facilities, and 1,299
cases (40.3%) in special high-pressure electrical facilities. II. FAILURE MECHANISM FOR ELECTRICAL FACILITIES
Low-pressure electrical equipment accidents were followed There are three types of failure mechanisms of electrical
by 176 wiring breakers (9.3%), 171 (9.1%), 164 short circuit equipment: initial failure, accidental failure, and wear failure.
breakers (8.7%), and 163 indoor wiring (8.7%), and 146
special high-pressure electrical equipment accidents (15.3%) Early failure is caused by initial stress after installing
were transformers (11.2%), 115 (8%). electrical equipment, and the failure rate tends to decrease. It
is known to be mainly due to design, manufacturing errors,
In the case of low-pressure electrical facilities, many inexperience in use, damage during transport, and insufficient
accidents occurred in load devices such as breakers, indoor debugging.
wiring, and electric heat, and in the case of special high-
pressure electrical facilities, accidents occurred mainly in the In Random Failure, electrical facilities are stabilized and
switchboard such as transformers, transformers, switches, and have a constant and low failure rate, and this is due to
so on. exceeding design limits, continuous vibration and shock,
higher stress than design, overwork and user error, failures not
found in debugging, and natural disasters.
- 307 -
Wear-out failure refers to a time when the failure rate Therefore, in order to predict failures through real-time
increases due to long-term use, and it is analyzed that aging, monitoring/diagnosis, it is necessary to set a failure mode to
contraction or cracking, insufficient maintenance, and be reflected in the artificial intelligence algorithm and apply
improper overhaul such as wear, aging, corrosion, fatigue and different criteria reflecting the characteristics of statistical
insulation deterioration. failure sections during demonstration and operation.
- 308 -
use of sensors leads to cost and it is important to ensure the However, in this case, artificial intelligence must learn
safety of electrical facilities. through big data to distinguish between normal and failure
signals, but facility failures are not common, so artificial
Sensors such as vibration, sound, temperature, gas, etc. intelligence identifies failure signals by itself and predicts
can identify abnormal signs of electrical facilities, and data failures by comparing the frequency and intensity of failure
such as PD (partial discharge), power quality, etc. can be signals.
secured by measuring voltage/current, which is an electrical
characteristic. The advantage of this method is that multiple types of
facilities are monitored under the same conditions through the
Electrical facilities installed and operated in buildings same sensor, so consistency in data can be secured, and
have their own characteristics, and the facility's normal artificial intelligence can improve precision by learning
operation period is different, and the facility's soundness patterns that identify failure signals on its own through
should be determined by grasping details. unsupervised learning of abnormal signals.
The disadvantage is that it is difficult to determine the
cause of the failure of the facility's abnormalities, and the
TABLE III. EXAMPLES OF VARIOUS SENSORS FOR ELECGTRICAL
EQUIPMENT DIAGNOSIS result value may vary depending on the resolution and
precision of the sensor.
Primary/Secondary voltage, insulation flow rate, w The measurement-type diagnostic system has a reference
Discharge coil
eight value for normal operation of the facility, and monitors in real
time whether the value measured by the sensor exceeds the
Electric power
condenser
Circuit voltage, bank current, bank capacity, cell reference value. To this end, it is necessary to learn normal
signals that artificial intelligence can learn, and it has the
Charging Input voltage, input current, output voltage, droppe advantage of analyzing abnormal signals to determine the
equipment r operation method cause of the facility's failure.
Potential However, in order to determine the cause of the failure of
Type, potential transformer voltage
transformer the facility, it is necessary to understand the phenomenon that
causes the failure, so artificial intelligence learning through
big data is necessary through "supervised machine learning."
In addition, artificial intelligence can analyze and upgrade
Real-time monitoring/diagnosis mechanisms can be failure signals according to the failure mechanism to improve
largely divided into two methods: monitoring and diagnosis. the diagnosis mechanism on its own for failure precursor
In the case of surveillance-type mechanisms, the goal is to symptoms.
preferentially grasp the presence or absence of abnormalities
in real-time electrical facilities based on predetermined The advantage of this method is that it is easier to identify
general-purpose sensors. the cause of the failure of the facility because sensors are
selected and measured according to the facility, and the
The abnormal signal learned through the sensor is learning difficulty of the failure pattern increases according to
determined, and the failure type of the facility is clustered and the reinforcement learning conditions.
notified to the safety manager. This requires an algorithm that
allows artificial intelligence to isolate abnormal signals from Detailed data on facilities can be secured as a disadvantage,
normal signals by itself through unsupervised machine but life prediction due to deterioration is expected to be
learning. difficult to grasp due to the large number of cases because it
- 309 -
is necessary to learn based on information from various The figure below shows a new relationship diagram using
sensors. FTAs and FMEA for short circuit breakers. In the figure, it is
necessary to compare and analyze abnormal signals from the
measurement sensor with the cause of failure in the real-time
monitoring/diagnosis flow from left to right around the
measurement sensor to find out the failure signal by itself.
ACKNOWLEDGMENT
This work was supported by the Korea Institute of Energy
Technology Evaluation and Planning(20215910100080).
- 310 -
Leakage Current Analysis of PCS
considering the Ground System
- 311 -
a new leakage current path is represented by the capacitances influenced by the cable impedance, internal parasitic
CC. Therefore, understanding of the cable and its equivalent
circuit for the 3 phase 4 wire cable are required. With the use
of transmission line model, the propagation constant of a
cable can be derived as follows.
Z R jL (2)
Y G jC (3)
R jL G jC (4)
R j L R j L L (5) (a)
Zo
G jC C
Fig. 3 Experiment set-up (a) PCS and LCL filter (b) 3 phase 4 wire cable
- 312 -
Estimation of the probability of
disconnection of urban electric networks in
emergency situations based on the use of
GIS maps
Y.Umbetkulov*1, K.Bakenov1, T.Аgimov1, M.Khazimov1, L.Uteshkalieva1
1
Almaty University of Power Engineering and Telecommunication named G.Daukeev, Kazakhstan
Email: [email protected]
- 316 -
A Study on Common Mode Effects
According to Battery Rack
Configurations in Energy Storage Systems
Yong-Eun Choi 1, Hyo-Seok Oh 1, Byung-Min Moon 1, Chin-Young Chang 1 and Jae-Moon Kim 1*
1
Korea National University of Transportation, Korea
Email: [email protected]
Abstract— Energy storage system is known to increase noise This is a method of measuring CMV by installing a
and increase the possibility of common mode voltage generation measuring instrument behind the Li-ion battery rack and using
depending on the installation method of transformers and the DC voltage.
number of battery racks, and may cause malfunctions of
facilities. Therefore, in this paper, the common mode voltage
effect according to the increase in the number of battery racks
B. CMV measurement method
was examined using the ungrounded transformer of Energy
storage system. ESS CMV is measured through the CMV instrument
installation method shown in Figure 2. To measure CMV in
Keywords— Energy Storage System, Common Mode Voltage, the configured circuit, connect the (+) and (-) poles of the Li-
Power Conditioning System, Li-Ion Battery, Isolation ion battery Rack to the Voltage Probe respectively[3]. Then,
Transformer connect the ground to the enclosure of the battery rack and
measure it through the CMV instrument of the ESS.
I. INTRODUCTION
An ESS(Energy Storage System) is a technology that has
recently attracted worldwide attention due to the need for
depletion of fossil fuels and reduction of carbon emissions.
However, depending on the installation method of the ESS
transformer, it is known that noise increases and the
possibility of CMV(Common Mode Voltage) increases,
which also causes malfunction of the facility[1]. Therefore, in
this paper, a power conversion system was constructed using
power conversion software, and the CMV change due to the
increase in battery rack according to the grounding method of
the ESS transformer was analyzed.
AC Grid
TR (+)
Instrument
Measuring
CMV
(-)
N
(a) Ungrounded (b) Grounded
Ground
(Recommended) (Not recommended)
Fig. 1. ESS CMV test circuit configuration Fig. 3. ESS transformer grounding and battery configuration
- 317 -
In the AC power side of the ESS, the linkage transformer Simulation CMV showed 530[V]. Although within the
plays an important role. However, depending on the normal range below the standard M ax 1000[V], it was
grounding method of the transformer, it may cause CMV to confirmed that the peak to peak of CMV was about 70[V].
occur. Therefore, grounding type is not recommended in
Korea, and non-grounding type is recommended.
AC-side transformers of lithium-ion batteries currently B. CMV measurement of 10 battery racks
used in most ESSs can cause an increase in CMV depending ESS 10 battery racks were connected in parallel and the
on the characteristics of the grounding method. In addition, CMV measurement result waveforms are shown in Figure 6.
CMV tends to increase as the number of racks of batteries
decreases. The standard in Korea follows the battery
manufacturer's standard, and the standard is limited to Max
1000[V] when the rack's highest voltage is less than 999.6[V].
V. CONCLUSION
In this paper, the results of the simulation to analyze the
CMV effect when the battery rack increases according to the
ESS transformer grounding method are as follows.
Comparing CMVs connected in parallel with 1 battery
rack and 10 battery racks of ESS, it can be seen that there is a
Fig. 4. ESS circuit modelling
difference in CMV value of about 30[V]. In addition, as the
The transformer was applied considering the number of battery racks increases, checking CMV Peak to
transformation ratio at 380[V]/380[V], and the switching Peak confirms that 65[V] decreases. Therefore, when
frequency of the PCS switching element was set at 5[kHz]. In considering the safety of the ESS, the grounding method
addition, the battery rack configuration was configured by characteristics of the AC-side transformer and the number of
connecting in series assuming two battery modules of 499[V] battery racks must be carefully considered.
each. In addition, assuming that several racks exist, battery
racks were configured in parallel. The maximum voltage of
the battery rack was simulated to approximate 999.6[Vdc]. ACKNOWLEDGMENT
This work was supported by Korea Institute of Energy
Technology Evaluation and Planning(KETEP) grant funded
IV. CMV ANALYSIS SIMULATION ACCORDING TO ESS by the Korea government(MOTIE)(20220610100010, R&D
BATTERY QUANTITY CHANGE Project of Establishment for Renewable Energy-linked ESS
Safety Evaluation Center: based on PV and FC)
A. CMV measurement of one battery rack
Figure 5 shows the waveform of one battery rack using a
ungrounded ∆-∆ transformer. REFERENCES
[1] Y. E. Choi, H. S. Oh, B. M. Moon, J. M. Kim, “A Study on the Effect
of Common Mode Voltage(CMV) by Switching Device Short Circuit
During ESS Operation,” The Korean Institute of Electrical Engineers
(KIEE) conference proceedings, pp. 237-238, 2022.
[2] S. M. Choi, S. H. Kim, M. Y. Kim, D. S. Rho, “A Study on
Characteristics and Modeling of CMV by Grounding Methods of
Transformer for ESS,” Journal of the Korea Academia-Industrial
cooperation Society, vol. 22, no. 4, pp. 587-593, 2021.
[3] S. H. Kim, H. S. Choi, J. Y. Kim, A. Han, “A Study on the Cause of
CMV and Leakage Current, and Mitigation Strategy on the Lithium-
ion Battery of ESS,” The transactions of The Korean Institute of
Electrical Engineers, vol. 70, no. 1, pp. 61-71, 2021.
Fig. 5. One battery rack CMV waveform
- 318 -
Development of 48V PbC Hybrid Battery for Electric
Forklift Using High Quality Activated Carbon
Hoon Seo 1, In Seok Seo 1, Hyon-ok Lim 1and Kyung-Wan Koo 2*
1
DongYoung Ind. Co. Ltd., Republic of KOREA
2
HoSeo University, Republic of KOREA
Email: [email protected]
Abstract—Lead-acid batteries are used as power sources in activated carbon. The growth of lead sulfate crystals by an
industrial sites because of their low manufacturing costs and electrode reaction in the Pb cell increases electrode resistance
excellent price competitiveness compared to other secondary and eventually reduces the cycle life of the cell. By attempting
batteries. Unlike conventional Pb batteries, hybrid lead-carbon to introduce carbon with excellent electrical conductivity to
(PbC) batteries have been developed that take advantage of both reduce resistance, it is necessary to facilitate the transfer of
general lead storage batteries and capacitors, and PbC batteries electrons in the electrode and induce the reduction of lead
are attracting technical attention by overcoming shortcomings sulfate to metal lead to suppress the increase in resistance. To
of existing Pb batteries.In the battery market for forklifts and
this end, in a PbC hybrid battery, activated carbon physically
construction equipment, there is an urgent need to develop PbC
attached with lead is mixed with an electrode binder and then
hybrid battery technology with high power/long life
characteristics that may handle strict environments such as high
coated on an anode lead plate to manufacture a carbon
efficiency charge/discharge and discharge depth of 50%. electrode, thereby facilitating electron transfer and inducing a
reduction of lead sulfate to metal lead.
Keywords—Lead-carbon (Pb/C) battery, Secondary Battery ,
Bio-Cellulose (BC) membrane, Forklift
I. INTRODUCTION
Compared to conventional forklifts using internal
combustion engines using diesel or PLPG, electric forklifts
have low maintenance costs and are difficult to revitalize the
market due to their low life (2~3 years) and low output power
characteristics. PbC hybrid battery technology is being
demonstrated and commercialized in various application
fields (start-up, industrial, ESS), but in Korea, it is weak to
localize components and develop system completion
technology. Therefore, in order to localize PbC hybrid battery
parts with long life and high power characteristics and develop
system completion technology, it is urgently required to
develop activated carbon-based active material core part
technology with low performance due to carbon
corrosion/electrolysis. Battery requirements for electric
forklifts should preferentially ensure a long life of 10 years or
more, high safety without low cost and explosion risk, and
high reliability of technology that operates stably under Fig. 1. Edge regulation strategy with activation
extreme environmental conditions such as high temperature and physical/chemical post-processing
and low temperature. Accordingly, the hybrid PbC battery
technology to be developed in this research is a new battery
technology with complementary characteristics as a fusion Adjustment of properties through material surface
technology of a general lead storage battery and a capacitor. treatment
In other words, PbC batteries are next-generation battery
technologies that realize the advantages of capacitors and Improvements in the electrochemical performance of
secondary batteries, such as long life, high power, fast charge, carbon materials have been reported by doping carbon
and partial charge discharge characteristics. materials with B, F, N, etc. or controlling the interaction
between carbon/carbon materials. Based on this research, it is
II. EXPERIMENTS intended to improve the electrochemical performance of PbC
A Study on the Change of Surface Properties and the nano-composite active materials by inducing carbon edge site
Improvement of Electrochemical Performance through activity. Edgeless activated carbon was synthesized by
Carbon Edge Control removing the edge present on the surface of activated carbon,
and lead-carbon batteries were manufactured by including
To suppress reactivity by edges on the surface of activated them in the anode in the PbC battery manufactured using
carbon, research is conducted on long-life, high-performance edgeless activated carbon. Verified that the presence of an
PCB cells that induce reduction of metal lead by improving edge at a certain rate in edgeless activated carbon suppresses
charging importability, including surface-modified activated the reactivity of the edge, thereby suppressing various
carbon and anode manufactured using the surface-modified additional reactions.
- 319 -
Fig. 2. Typical surface control technologies (high
temperature heat treatment, nitrogen plasma, and
boron doping)
IV. CONCLUSIONS
The mainstream of electric forklift batteries are lead storage
batteries and lithium-ion batteries, but due to the high cost of
lithium-ion batteries, most of them are lead storage batteries The Pb-C composite battery contributes greatly to improving
in Korea. The use of lead batteries in material handling the life of the lead storage battery by well suppressing the
equipment is cost effective and provides high resilience in growth of lead sulfate crystals on the electrode surface caused
poor environments associated with chemicals, dust and by the battery load caused by the fork operation of the forklift.
vibration. Lead batteries require less maintenance than other Pb-C composite batteries are advantageous for frequent
types of batteries, and their use and replacement plans are charging and discharging due to capacitor characteristics, so a
consistent, simple, and predictable. high life can be expected in an incomplete charging state
- 320 -
(PSoC) due to frequent charging and discharging of batteries [4] Sanna Lander, Mikhail Vagin, Viktor Gueskine, Johan Erlandsson,
Yselaure Boissard, Leena Korhonen, Magnus Berggren, Lars Wågberg,
such as ISG (Idle Stop & Go) function of a vehicle. and Xavier Crispin Adv. Energy Sustainability Res. 2022, 3, 2200016.
The Pb-C composite battery does not require a spare battery [5] V. Hospodarova, E. Singovszka, N. Stevulova, Characterization of
and a battery replacement operation through fast charging and Cellulosic Fibers by FTIR Spectroscopy for Their Further
frequent charging for idle time because the battery remaining Implementation to Building Materials, Am. J. Anal. Chem. 9 (2018)
capacity needs to be charged below 20%. Electric forklifts 303-310. doi:10.4236/ajac.2018.96023.
using conventional lead batteries require at least 8 hours of [6] G. Palanisamy, T. Sadhasivam, W.S. Park, S.T. Bae, S.H. Roh, H.Y.
Jung, Tuning the Ion Selectivity and Chemical Stability of a
charging to use for 3-4 hours and charge when the battery life Biocellulose Membrane by PFSA Ionomer Reinforcement for
is 20% or less. Therefore, forklifts cannot be used during Vanadium Redox Flow Battery Applications, ACS Sustain. Chem. Eng.
charging time, requiring extra forklifts for smooth operation 8 (2020) 2040−2051. doi:10.1021/acssuschemeng.9b06631.
Electric forklift operation can be divided into two types: [7] Z. Zhao, J. Zhou, T. Fan, L. Li, Z. Liu, Y. Liu, M. Lu, An effetive
surface modification of polyester fabrics for improving the interfacial
running and fork raising, load is applied constantly, while fork deposition of polypyrrole layer, Mater. Chem. Phys. 203 (2018) 89-96.
raising requires instantaneous high power. The Pb-C doi:10.1016/j.matchemphys.2017.09.062.
composite battery can respond to high power demand. [8] X. Wen, Y. Zheng, J. Wu, L. Yue, C. Wang, J. Luan, Z. Wu, K. Wang,
In vitro and in vivo investigation of bacterial cellulose dressing
containing uniform silver sulfadiazine nanoparticles for burn wound
healing, Prog. Nat. Sci. Mater. Int. 25 (2015) 197-203.
[References] doi:10.1016/j.pnsc.2015.05.004.
[9] R. Du, F. Zhao, Q. Peng, Z. Zhou, Y. Han, Production and
[1] Sung-Hee Roh, Gowthami Palanisamy, T. Sadhasivam, Jae-Eun Jin, characterization of bacterial cellulose produced by Gluconacetobacter
Jin-Yong Shim, and Ho-Young Jung, ACS Sustainable Chem. Eng. 7 xylinus isolated from Chinese persimmon vinegar, Carbohydr. Polym.
(2019) 8789-8797. 194 (2018) 200-207. doi:10.1016/j.carbpol.2018.04.041.
[2] X. Song, U. Cvelbar, P. Strazar, L. Vossebein, A. Zille, Chemical, [10] G. Pacheco, C.R. Nogueira, A.B. Meneguin, E. Trovatti, M.C.C. Silva,
thermo-mechanical and antimicrobial properties of DBD plasma R.T.A. Machado, S.J.L. Ribeiro, E.C. da Silva Filho, H. da S. Barud,
treated disinfectant-impregnated wipes during storage, Polymers Development and characterization of bacterial cellulose produced by
(Basel). 11 (2019) 1769. doi:10.3390/polym11111769. cashew tree residues as alternative carbon source, Ind. Crops Prod. 107
[3] L.I. Fockaert, S. Pletincx, D. Ganzinga-Jurg, B. Boelen, T. Hauffman, (2017) 13-19 doi:10.1016/j.indcrop.2017.05.026.
H. Terryn, J.M.C. Mol, Chemisorption of polyester coatings on [11] M.W. Ullah, M. Ul-Islam, S. Khan, Y. Kim, J.K. Park, Structural and
zirconium-based conversion coated multi-metal substrates and their physico-mechanical characterization of bio-cellulose produced by a
stability in aqueous environment, Appl. Surf. Sci. 508 (2020) 144771. cell-free system, Carbohydr. Polym. 136 (2016) 908-916.
doi:10.1016/j.apsusc.2019.144771. doi:10.1016/j.carbpol.2015.10.010.
p
- 321 -
Experimental studies of a model of a dusted flow air heater for the development of a new hot-water boiler
Abstract— The article presents the results of the determined through the Nusselt number in finned heat
development and creation of a solid fuel hot-water boiler, exchangers largely depends on the mass flow rate, realizing
in the creation of which a model of an air heater was used that the mass flow rate at a constant cross section increases
in which the processes of flow of a gas flow dusty with ash velocity, and, accordingly, the Reynolds number, it is obvious
were studied. Presented are the results of thermal, that an increase in the Reynolds number leads to an increase
aerodynamic and structural calculations for a new type of in the efficiency of heat transfer. In [8], a vacuum-type air
hot water boiler with a behind-the-screen gas duct, as well heater with helical inserts was investigated. Screw inserts are
as with a new solid fuel air heater with a capacity of 30 good flow turbulizers, which in theory should increase the
Gcal/h. The calculation results were compared with the efficiency of heat transfer. Studies have shown that the
KV-TK-100-150 hot-water boiler. The results of the installation of screw inserts leads to an increase in hydraulic
economic effect from the introduction of a hot water resistance, but also increases the efficiency of heat transfer,
boiler with a capacity of 30 Gcal/h are presented. which is shown through thermal efficiency. In [9], the
influence of a change in the relative roughness on the
Keywords— hot-water boiler, biogas, biogas plants, thermohydraulic characteristics of an air heater was
waste, biogas technology, heating system investigated. Studies of the effect with transverse ribs [10]
showed a significant increase in the coefficient Nu depending
Introduction on Re. At Re = 13000, the Nu coefficient was equal to 120.
The overwhelming majority of modern heating boilers run The study of hydraulic resistances showed that the use of ribs
on fuel oil or gas. This fuel, as it is known, is extremely scarce, significantly increases the resistance of the air heater, for
therefore, it is necessary to develop measures for efficient example, at a flow rate of 0.039 kg/s, the difference between
combustion of solid fuel in heating boilers to reduce the smooth and ribbed pipes was 20 Pa. The use of fins made of
harmful effect on the environment. This is reflected in the porous aluminum led to an increase in the efficiency of heat
program for the development of the fuel and energy complex transfer in the air heater [11]. Investigation of the effect of the
of Kazakhstan [1]. step and angle of the arc of discrete artificial roughness on heat
Boiler efficiency increase due to heat recovery in boiler air transfer in an air heater [12] showed that with a relative
heaters is an urgent topic [2-5]. For example, the work [2] roughness equal to 8.33, the Nu number increased
investigated the installation of a second air heater for the boiler significantly depending on the Re number. In [14], a broad
efficiency. The study showed that the installation of an air analysis of air heaters was carried out. The analysis showed
heater and a flue gas dryer can increase the boiler efficiency that the most effective Reynolds number for curved air heaters
by 1.5%, as well as reduce the flue gas temperature by 20℃ is in the range of 11000-16000.
when using lignite as fuel. Analysis of the air heater of a solid The issues of increasing the efficiency of boilers through
fuel boiler with a capacity of 300 MW for the spread of ash on various methods are widely considered in the literature [15-
the surface showed that ash deposits depend on temperature 21]. For example, work [15] presents the results of increasing
irregularities that appear due to unsteady operation of the air the efficiency of a boiler with an angular fuel supply, by
heater [3]. Authors in [4] investigated selective catalytic increasing the efficiency of fuel combustion processes and the
reduction in a regenerative air heater. Studies have shown that secondary air supply system. The work [16] presents the
the use of catalysis in an air heater can reduce the results of numerical simulation of solid fuel boilers. In [17],
concentration of nitrogen oxides by 11%. In [5], a new numerical studies were carried out using oxygen additives.
combustion air heating system is investigated using flue gases. The paper [18] presents the results of the analysis of the
Studies have shown that it is possible to reduce the surface of an air heater of a fluidized bed boiler. Analysis
temperature of flue gases to 30℃ in winter. Taking into showed that the surface of the air heater is largely influenced
account the rather small material presented on the study of air by the composition of the solid fuel. Known works [19] on the
heaters of boiler plants, the authors analyzed the air heaters study of a regenerative air heater showed that corrosion is
presented in general for energy. In particular, the results of formed on the cold parts of air heaters. In work [20], the study
studies of air heaters in solar collectors were analyzed, in view of the use of a regenerative air heater for the efficiency of a
of the sufficient similarity of heating processes. boiler plant was carried out. Studies have shown that efficient
The work [6] investigates the hydraulic resistance of a heat exchange in the air heater reduces the energy
solar heater in the form of a bell mouth. Studies of hydraulic consumption of the boiler.
resistance have shown that a decrease in resistance due to an Currently, there are few proven in operation and reliable
increase in the bell leads to an increase in the Nusselt number, in operation hot-water boilers for solid fuels in Kazakhstan
i.e. to increase of heat transfer. Mathematical modeling of a [21]. Moreover, boilers operating on fuel oil also have
solar heater [7] showed that the heat transfer process extremely low reliability due to the frequent failure of the
- 322 -
furnace walls and the first rows of tubes of convective from the flow remain in the cyclone, and the gases are sucked
bundles. Firewalls of modern boilers, both hot-water and through the gas path 18 by the induced fan into the house gas
steam, have a very low utilization factor. Screen pipes, as it is collector 26. The cyclone works satisfactorily at the maximum
known, perceive heat only by their projection onto the lining. gas flow rate through the experimental section and the flow
Even taking into account the back radiation of the lining on rate in the outer cylinder ω=3÷3.8 m/s. When the cyclone is
the pipes, the degree of use of the heating surfaces of wall operating below the maximum gas flow, an external air intake
screens does not exceed 35-38% [22]. Therefore, the pipe 15 is provided.
development of a new profile of a heating boiler with the aim It should be noted that the cyclone works satisfactorily
of using the reverse side of the furnace walls and new air (with lower gas consumption) when a sufficient draft of the
heater for convective heat exchange can lead to a significant smoke pump along the path 18 is discolored.
reduction in metal consumption. Certain difficulties arise when the ash is fed into the dust
The purpose of this work is to obtain initial data for the collector or the stabilizing entrance section of the
development of a technical design for a high-power hot-water experimental channel. There are two options for feeding ash.
boiler for solid fuel with dry ash removal using a special type Both options are shown in Figure 1.
of air heater for heating air. According to the first option, for the transportation of ash,
The carried out literary analysis shows that little attention the compressor air is supplied with a pressure of P=1.5-2.0
has been paid to the research of air heaters. In this regard, kg·s/cm2 ash-air ejector 7, where the necessary vacuum is
research on heat transfer and resistance was carried out on a created by the supplied air for the transportation of ash. The
model of an air heater for clean and dusty flows. These results air from the compressor enters the electric heater 10. Here it
will make it possible to identify the optimal design of the is heated to the temperature necessary to feed it to the
behind-the-screen gas duct, as well as to obtain formulas for experimental part (200 ÷ 250℃). Pre-calibration of the ash
calculating the heat transfer and resistance coefficients in it. feeder (6) is performed, the ash used in the experiments is
Experimental studies carried out on a model of an air sifted through a coarse sieve mesh to separate lumps, etc. The
heater channel on a dusty flow made it possible to select inner surface of the hopper is heated by spirals of an electric
specific dimensions for the air heater. heater, which is wound around its outer wall. The mixture
passes through the ejector 7 through the protarized flow meter
I. Description of the experimental stand for the study section 9 and from there to the experimental section, the ash
of heat transfer and resistance in the model of the air is discharged into the air path at a distance of 1500 mm above
heater channel for a dusty flow the test area, which ensures a satisfactory distribution over the
cross-section of the channel.
The proposed new type of hot water boiler with a screen According to the second variant, the ash-air ejector is
flue has a special design air heater in the convective flue, installed inside the dust collector, as shown in Figure 1,
designed to heat the air up to 340 ℃. This air heater is made section II-II. The conditions for transporting the sol depend on
of standard wavy sheets that form flat-wavy channels. the pressure of the air flow created by the ejector. The location
Particularly important is the study of heat transfer in a dusty of the ash-air ejector for this option when air is supplied from
flue, which is a fairly accurate approximation to the the air duct collector I must be checked experimentally.
combustion processes in real boilers burning solid fuel. In this
regard, an experimental stand and a technique for studying
heat transfer and resistance in the channel of an air heater on
wavy sheets under conditions of a dusty flow have been
developed.
Figure 1 shows a diagram of an experimental installation
for the study of heat transfer and resistance in the model of the
air heater channel for a dusty flow. Here is 1 air duct collector;
3-flow meter diaphragm; 4-10-electric heaters; 6-ash feeder;
8-ash-air path; 12-working central channel; 16-cyclone for
catching ash particles; 29-cooling medium channels; 21-
fittings for measuring the temperature of the walls of the gas-
air flow channel, pressures: 26-flue basin collector:
The air from the blower with a temperature of 25-35℃
enters the electric preheating furnace 4 through the adjusting
gate 19 and the flow washer 3. The stability of the power
consumed in the electric furnace is monitored using an
ammeter and a voltmeter. The heated air enters the ash
collector II or the input stabilizing section, where it is mixed
with the ash. The poppet ash feeder 6 provides a uniform
dosed supply of ash to the air stream. The stabilizing section
II (which is the ash collector) ensures the uniformity of the
flow and the alignment of the ash concentration along the
cross-section of the experimental section 12. From the
experimental section, the ignited flow enters the output section Fig. 1. Schematic of the experimental setup
12, and then into the precipitation cyclone 16. The particles
- 323 -
inlet, outlet and along the cross-section of the channels with
nichrome-constantan or chromel-copel thermocouples. A PP-
63 potentiometer or a millivoltmeter is used as a secondary
device for measuring the EMF of a thermocouple. The air flow
rate is determined by the diaphragms, the flow temperature at
all diaphragms is measured with mercury thermometers. In all
experiments, barometric pressure and ambient temperature are
measured. After isothermal blowdowns and the dependence of
the drag coefficient on the Reynolds number is obtained,
studies of the non-isothermal flow in the channels are carried
out. Resistance measurement in non-isothermal flow is
performed for all three channels while taking into account the
cooling and heating of the flow. To measure the temperature
of the channel walls, thermocouples were stamped in two
sections along the height of the channel and in five sections
along the length of the channel in the right and left walls to a
depth of 3 mm. The wall temperature is measured by
nichrome-constantan thermocouples with a diameter of 0.4
mm.
To ensure the reliability of the experimental data, the
balance experiments are carried out on the pilot plant on a pure
stream. In the balance experiment, all flow measurements
begin after reaching steady state. The stationary mode is
characterized by a constant temperature of the walls and air at
the entrance and exit from the experimental section. To
exclude the influence of radiant heat transfer between the
heated wall and the junction of the thermocouple,
measurements in the flow will be carried out using the method
of two thermocouples.
Fig. 2. Experimental section for the study of heat transfer
Before the experiment: in a dusty flow, the ash-air path is
and resistance in the model of the air heater channel
switched on (without ash supply), as shown in Figure 1. The
Nomenclature flow temperature in the ash-air path must correspond to the air
temperature in front of the stabilizing inlet section of the
R – radius of curvature, ˚;
experimental channel.
ψ – sector angle, ˚;
The flow temperature in the ash-air duct is controlled by
a – channel width, m;
chromel-copel thermocouples, which are installed after the
h – channel height, m;
compressor air electric furnace and in front of the segmented
Re – Reynolds number, - caliber – length to diameter ratio;
EMF – electormotive force diaphragm. The vacuum in the ash-air ejector is measured
through a hole drilled in the branch pipe in front of the
receiving chamber. The flow rate of the dusty flow is
Cooling medium air with a temperature of 25-35℃ is
measured by a segmental diaphragm; the calibration curve is
supplied from the manifold of the air duct I through the flow
shown in Figure 3. The insulation temperature is measured in
meter washers 3 along the path 20 to the experimental section.
several sections along the length of the experimental section
The diagram of the investigated element of the air heater
with chromel-copel thermocouples. When ash is supplied
is shown in Figure 2. Here R is the radius of curvature of the
directly to the inlet stabilizing section, where the ash-air
channel; t is the step of the wave; ψ is the angle of the sector;
ejector is installed (Figure 1.9, option II), there is no need to
a - channel width; h is the channel height; channel length -
supply compressor air. With this scheme, the supply of ash
1694 mm, average equivalent diameter - 0.04025 m. Relative
from the feeder to the experimental section is carried out
drip curvature - 6.92.
without suction of outside air. The ash feeder is installed near
To go to real conditions, it is necessary to obtain these
the receiving chamber of the ash-air ejector, while the ash-air
dependencies for a dusty flow. In this case, the range of
duct is replaced by a short section. Experiments on a dusty
Reynolds numbers varies from 6*103 to 50*103, which
flow are carried out with a steady dynamic equilibrium of gas-
corresponds to an average flow velocity from 3 to 25 m/s. To
suspended particles inside the experimental channel. Table 1
measure static pressures on the walls of the channel, and at the
gives a list of all measured values. Table 2 shows the amount
entrance and exit from the experimental section, holes with a
diameter of 0.5 mm were made and special fittings were of ash consumption required for one experiment, with a
calculated ash concentration in flue gases μ = 0.0544 kg/kg for
welded. Static pressure is measured on straight sections at a
Ekibastuz coal.
distance of 10 calibers from the entrance to the channel and 20
calibers from the exit from it. For isothermal flow, it is
sufficient to measure the resistance in the central channel. Air
pressure and flow rate are measured with U - samples and
micromanometers. The flow temperature is measured at the
- 324 -
Ambient temperature tam. -
Insulation temperature tin -
Wall temperature at the entrance and -
𝑡𝑤′ , 𝑡𝑤′′
exit from the experimental section
Ash-air flow temperature in front of the -
𝑡𝑎сд ,
segmental orifice plate
Compressor air temperature after -
𝑡𝑐′′
electric oven.
- 325 -
A𝑤 between the cubes of the air heater. A schematic diagram of
𝐺𝑔 = 1 − + 1.306𝛼 ∗ 𝑉 0 - flue gas consumption, kg /
100 ash extraction in this section of the convective gas duct is
kg;
shown in Figure 4. With this method, the extraction time is
𝛼 - the excess air ratio in the air heater zone is determined
according to the operational parameters of the boiler; long, which makes it difficult to extract a large amount of ash.
𝑉 0 - theoretical air volume, m3/kg.
Losses to the environment are determined by the average
temperature of the insulation and its outer surface, kcal/h:
𝑄𝑒𝑛𝑣 = 𝛼(𝑡𝑖𝑛𝑠 − 𝑡𝑒𝑛𝑣 ) ∗ 𝐹𝑖𝑛𝑠
Average logarithmic temperature difference is calculated
by the formula:
∆𝑡𝛿 −∆𝑡𝜇
∆𝑡𝑙𝑜𝑔 = ∆𝑡 (5)
2.3𝑙𝑔 𝛿
∆𝑡𝜇
𝑚2 ℎ𝑜𝑢𝑟℃
𝑘𝑐𝑎𝑙
𝑎𝑣𝑔 𝑎𝑣𝑔
where 𝐾𝑑 , 𝐾𝑐 - average values of heat transfer
𝑘𝑐𝑎𝑙
coefficients for dusty and clean flows, 2 .
𝑚 ℎ𝑜𝑢𝑟℃
Heat transfer coefficient for net flow according to [3].
1
а) 𝐾𝑐 = 1
⁄𝛼1 +1⁄𝛼2
III. Ash sampling method and sampling results for Fig. 5. Scheme of ash extraction from the PK-39 boiler
experiments on a model of an air heater channel.
The results are shown in Table 3. Here Р stat is the statistical
3.1 Selection method pressure of gases in the gas duct, measured by a
To carry out experimental studies on the model of the air pneumometric tube; Р1, Р2 - gas pressure before and after the
heater channel, ash, the fractional composition of which is diaphragm.
unique to nature, should be used. For this, ash was taken from ∆Рd - pressure drop across the diaphragm;
the gas ducts of operating boilers in several ways. Tg d, td - temperature of gases in the gas duct and
According to the first method, coal ash from the diaphragm;
Karaganda field was taken from under the gas ducts of the Ρd - the density of gases is determined by the formula
convection shaft of the BKZ-160-100 boiler of the Almaty Р
273(𝐵+ 𝑠𝑡𝑎𝑡 )
State District Power Plant. This ash differed from fly ash in a ρd = 𝛾𝑁 13.6
(8)
(273+t𝑑 )760
significant size.
According to the second method, coal ash from the where 𝛾𝑁 – specific gravity of the measured gas referred to
Karaganda deposit was sampled in the section located reference conditions (0℃ - 760 mm Hg)
- 326 -
Vd – the gas flow rate through the diaphragm is determined № Ash ρср t2 Р1 Р2
by the formula collection mm ℃ mm mm H2O
∆𝑃𝑑
date H2O H2O
𝑉𝑑 = √ 𝑉 (9) 1 11.06.20 75 249 410 395
𝜌𝑑
2 13.06.20 87 256 415 390
where V is determined by the calibration curve of the flow 3 14.06.20 77 247 455 420
washer (d=12 mm) (Figure 6.). 4 20.06.20 79 259 420 400
5 21.06.20 106.2 258 375 350
f – inlet section of the sampling tube (for sampling, two 6 22.06.20 90 254 440 420
tubes with f1=0.0006 m2 and f2=0.0007 m2); 7 21.09.20 109 242 310 295
B – barometric pressure; 8 24.09.20 110.5 235 310 290
Ω – the velocity of the suctioned gases in the diaphragm
9 26.09.20 109 258 460 440
is determined by the formula
10 27.09.20 106 238 480 450
𝑉𝑑 11 02.10.20 118.2 241 480 440
𝜔= (10)
𝐹𝑤 ∗3600
TABLE 3. Continued table 3
where 𝐹𝑤 – washer cross section; № ∆Рд tд ρ 𝑽д f В
Ggas – the suction gas flow rate was determined by the mm ℃ kg/m3 m3/h m2 mm
formula H2O H2O
Р𝑃𝑠𝑡𝑎𝑡 1 15 37 1.21 4.5 0.0006 716
𝑇н (В+ 13.6 )
𝐺 𝑔𝑎𝑠 = 𝑉𝑑 𝛾𝑁 (11) 2 25 40 1.2 5.3 - 705
𝑃н (273+t𝑑 )
3 35 43 1.2 5.9 - 702
4 20 42 1.2 5.3 - 705
5 25 40 1.2 5.9 - 704
6 20 44 1.2 5.3 - 704
7 15 47 - 4.8 0.0007 709
8 20 50 - 5.5 - 709
9 20 45 - 5.5 - 707
10 30 53 - 6.7 - 707
11 40 39 - 7.9 - 706
TABLE 3. Continued table 3
№ ω Ggas Gdust μ
m/s kg/h kg/h kg/kg
1 0.46 2.899 0.150 0.0517
2 2.73 3.31 0.153 0.046
3 2.73 3.73 0.135 0.036
4 2.45 3.2 0.266 0.083
5 2.73 3.67 0.154 0.042
6 2.45 3.32 0.190 0.0572
Fig. 6. Calibration characteristic of the diaphragm. dsh = 7 1.9 3.096 0.051 0.016
12.0 mm 8 2.18 3.6 0.107 0.029
9 2.18 3.62 0.154 0.043
3.2 Ash sampling results 10 2.66 4.34 0.091 0.021
11 3.13 5.09 0.144 0.028
From the data in Table 3, the average concentration value
μ_ср=0.0444 kg / kg was determined, which was used to The results of the fractional composition of the ash
conduct experiments on the model. In addition, the analysis of sampled at point 1 (Figure 5) before the RAH, in the bunkers
the dispersed composition of ash was carried out for particles of the prechamber 2 and the fields of the electrostatic
from 0 to 50 microns by the method of centrifugal separation precipitators 3 are shown in Tables 4 and 5, here ρavg is the
on the "Bako" apparatus, and for particles from 50 to 280 mm true density of ash particles (without pores) was determined
- by sieve analysis. The defining characteristic in the sieve by the pycnometric method.
analysis of the selected ash is the residue on the R50 sieve, TABLE 4. Results of the analysis of ash on the centrifugal
according to which the conditional ash separation is carried separator "Bako"
out: with R50 = 27 ÷ 36% - fine ash; with R50 = 50 ÷ 62% - Ash density
the average ash taken from the bunkers of fields 1,3,4,5,6 and Ρavg=2023 kg/m3
the pre-chamber was characterized by the following residues Before RAH
on the R50 μm sieve: Particle Content Content Particle Content Conten
Field 1 - R50 = 35 ÷ 36% (fine ash); diamete of of diamete of t of
Field 3 - R50 = 27÷ 29% (fine ash); r in fraction smaller r in fraction smaller
Field 3,4 - R50 = 50 ÷ 62% (medium ash); microns s by particle microns s by particle
Field 4,5 - R50 = 50% (medium ash); δs mass of s; % δs δs mass of s; % δs
Field 6 - R50 = 50% (medium ash); particle particles
prechamber (gas distribution chamber) R50 = 77 ÷ s% %
79% (coarse ash). 1.56 2.2 2.2 1.56 3.1 3.1
TABLE 3. Results of selection of natural ash
- 327 -
3.73 4.0 6.2 3.73 4.0 7.1 taken from the fields of electric filters meets these
7.1 13.6 19.8 7.1 12.1 19.2 requirements. This conclusion is also obtained when
10.5 136. 33.4 10.5 11.7 31.9 comparing the mineral composition of ash (table 6). The graph
16.6 21.7 55.1 16.6 21.2 53.1 in Figure 9 clearly shows the convergence of two methods for
29.4 25 80.1 29.4 26.8 79.9 determining the fractional composition of ash (for small and
37.5 9.5 89.6 37.5 9.4 89.3 large particles).
43.9 4.3 92.9 43.9 4.4 93.7 TABLE 6. Composition of ash taken at the station
0.61 6.1 100 0.63 6.3 100 Name Ash before Ash after
TABLE 4. Continued table 4 RAH, % RAH, %
Particle density Calcination losses 4.06 3.32
Ρavg=1860 kg/m SiO2 55.5 54.55
Electrostatic precipitator Electrostatic precipitator R2O3 38.8 42.55
field 1 field 3 Al2O3 23.14 28.25
Particle Conten Content Particle Content Content Fe2O3 8.42 6.01
diamete t of of diamete of of TiO2 1.17 1.06
r in fractio smaller r in fractions smaller CaO 1.55 1.27
microns ns by particles microns by mass particle MgO 0.40 0.40
δs mass of ; δs % δs of s; δs % SO3 0.41 0.47
particle particles
s% %
2.31 4.1 4.1 2.31 2.1 2.1
3.9 4.8 8.9 3.9 3.5 5.6
7.41 12.0 20.9 7.41 11.5 17.1
10.9 14.1 35.0 10.9 12.2 29.3
17.3 19.9 54.9 17.3 20.9 50.2
30.7 24.2 79.1 30.7 27.0 77.2
39.1 9.0 88.1 39.1 9.2 86.4
45.8 1.2 89.3 45.8 4.5 90.9
0.78 7.8 97.1 0.91 9.1 100
- 328 -
Fig. 9. Curve of ash dispersion
Fig. 10. Distribution of static pressure along the length of
IV. Results of the study of hydraulic resistance and the channel
heat transfer in the air heater model
In Figure 10 shows the distribution of static pressure
along the length of a complex cross-section channel. A sharp
change in the static pressure at the initial section of the
channel is explained by the presence of a converging section.
At the outlet, a diffuser section is obtained, which leads to an
increase in the pressure at the entrance to the experimental
section, the wetted perimeter increases by 60%, and at the
outlet it decreases by 60%.
To align the velocity profile at the entrance to the channel
and at the exit from it, double metal meshes with a mesh size
of 1 * 1 mm are installed.
In the setup experiments, a coincidence of the static
pressure values measured with a Pitot tube (diameter of the
Figure 11. Dependence of hydraulic resistance on the Re
tube nozzle is 3 mm) and with bushings with a hole diameter
number
of 0.5 mm was obtained. The analysis shows that the pressure
change according to the linear law, for the investigated
regimes, takes place in the section of the channel between the
points x/l=0.36 and x/l=0.72.
When calculating the hydraulic resistance coefficient, the
static pressure drop was taken at a distance of 0.8 mm. In
Figure 11 shows the dependence of the drag coefficient on
Reynolds in coordinates lg100𝜉 on lgRe.
The processing of the data obtained by the least squares
method made it possible to obtain the generalized formula
𝜉 = 𝐵 ∗ 𝑅𝑒 𝑚 (12)
where B = 0.205; m=0.155.
- 329 -
Having processed the obtained data on heat transfer by the turn (festoon), the flow rates can be reduced by increasing the
least squares method, we obtain a generalized formula. cross-section of the gas duct by a local increase in its width.
With this temperature, the combustion products enter the air
𝑁𝑢 = 𝐴𝑅𝑒 𝑘 = 0.22𝑅𝑒 0.819 (13) heater 6 of a special type, where the air is heated to a
temperature of 340℃.
This air heater (Fig.14) is made of standard corrugated
The standard deviation of the generalization was 1.5%, the
sheets, which form flat-volost channels with an equivalent
arithmetic mean - 0.0%. 𝑒𝑞 𝑒𝑞
diameter on the gas side 𝑑 𝑔 = 37 mm and on the air side 𝑑 𝑎
V. Computational and design studies of a boiler with a = 35 mm. The average radius of curvature of these channels
is 40 mm, and the angle of curvature is 𝜑 = 109°. These data
behind-the-screen solid fuel flue
correspond to the optimal geometry of the channel, for which
The study of the intensification of heat exchange in
the calculation formulas for heat transfer are experimentally
convective heating surfaces, carried out in the laboratory of
determined
boiler units, served as the basis for the development of
schematic diagrams of high-power hot-water boilers with a 𝑁𝑢 = 0,985 × 𝑅𝑒 0,5 𝑃𝑟 0,26 (14)
behind-the-screen gas duct and an air heater. To develop
structural diagrams of a hot-water boiler with a behind-the- and the reduced coefficient of resistance
screen gas duct, as well as to compare it with the existing КВ-
ТК-100-150 /2/, thermal, aerodynamic, hydraulic and 𝜉 = 8,8 × 𝑅𝑒 −0,43 (15)
structural calculations were carried out for a new type of hot The manufacture of this air heater for a pilot industrial
water boiler with a behind-the-screen gas duct. boiler will make it possible to obtain the necessary
experimental material for solving the problem of using such
air heaters in a dusty flow.
- 330 -
vertical collector, water enters the pipes of the behind-the- of the second version of the circulation scheme is a slightly
screen gas duct (56 pcs.) And is directed to the middle lower temperature head in the behind-the-screen gas duct,
collector, also equipped with a partition. From the middle which leads to an increase in the boiler heating surface.
collector, water enters the pipes of the second third of the Calculation of heat transfer in the behind-the-screen gas duct
screened gas duct and through the bypass vertical collector is at a water temperature at the boiler inlet of 120℃ shows that
directed to 56 pipes of the furnace screens. And further to the in this case the heating surface of the behind-the-screen gas
lower collector, from which it is directed to the remaining 56 duct increases by 39 m2, and the metal consumption by 700
pipes of the screens. Having passed the last third of the pipes, kg. This disadvantage of the circuit can be considered
insignificant in comparison with the bathroom advantages of
the water after the third bypass collector is directed to the
the second version of the circulation circuit. This scheme
middle collector, from which it enters the network. Inlet water
essentially provides a peak boiler operation and is accepted as
temperature 70℃ and outlet 150℃, water flow 375 t/h, water the main, most advantageous water circulation scheme for a
speed 1.4 m/s. The hydraulic resistance of the boiler is 9.66 30 Gcal/h boiler. For a 100 Gcal/h boiler, it is possible to use
mm H2O, and the power consumption for overcoming the a two-way water circulation scheme at an inlet and outlet
resistance of the boiler is N_k= 13 kW. The second variant of temperature of 70/150℃.
water circulation has two strokes. Water from the lower The boiler can be repaired by pulling the outer screens up.
collector enters simultaneously all pipes of the furnace walls In a low-power boiler (30 Gcal/h), the outer pipes of the
(168 pcs.). Getting simultaneously into all three vertical behind-the-screen gas duct are raised entirely, and for the I00
throughput collectors in the upper part of the furnace, water Gcal/h boiler, the outer pipes can be split into 3 or 6 sectors
from them is directed to all the other pipes of the behind-the- and diverted to the side or up to access the back side of the
screen gas duct and is collected in the middle collector, from furnace walls.
which it is sent to the network. To ensure a water velocity of The results of typical, aerodynamic calculations of a pilot
about 1.3 m/s, its consumption should be about 1000 t/h. At industrial boiler with a heating capacity of 30 and 100 Gcal/h
the same time, due to the bypass of bitter water at the inlet to are presented in Tables 7, and the weight characteristics of the
the boiler, its temperature rises to 120℃, and at the outlet - boiler are in Table 8. It can be seen from these tables that the
150℃. specific metal consumption per boiler is 30 Gcal/h by 2.38
times less than on the KV-TK-100 boiler. At the same time,
the temperature of the flue gases in the pilot industrial boiler
of the proposed type is expected to be 68 ℃ lower than that of
the comparable KV-TK-100 boiler and the efficiency is 3%
higher. The share of pipes in the total mass of the boiler metal
of 30 Gcal/h is 40%. The overall economic effect is $ 26
thousand / year. Calculations for a 100 Gcal/h boiler with a
behind-the-screen gas duct with new air heater show that its
performance is better than that of a 30 Gcal/h boiler. So, the
specific consumption of metal is 2 t/Gcal (instead of 2.2 for
the boiler 30 Gcal/h and 5.43 g/Gcal for the KV-TK-100
boiler). The share of pipes in the total mass of metal has been
reduced to 32.5%. The economic effect per boiler 100 Gcal/h
is expected to be about 100 thousand $/year, while the cost of
the boiler pays off within 1.26 years. The design
characteristics for a new type of hot water boiler are given in
table 9.
- 331 -
18 Gas velocity in the behind-the-screen gas duct m/s Name of parts and their Quantity Length Weight, kg
19 Water velocity in the boiler pipes '' size for 1 or area 30 100
20 Shielded gas duct resistance kg/m2 boiler Gcal/h Gcal/h
21 Resistance of the air heater on the gas side '' Total metal 66200 200
22 Total gas resistance of the boiler and air heater '' kg ton
23 Air path resistance to burners ''
24 Boiler hydraulic resistance kg/cm2 Including metal under pressure (pipes) for a 30 Gcal/h
25 Boiler metal weight ton
26 Specific metal consumption t/Gcal boiler - 26.56 t or 40%, for a 100 Gcal/h boiler - 65.0 t or
TABLE 7. Continued table 7 32.5%. Specific metal consumption for a 30 Gcal/h boiler is
№ Calculated values for boilers 2.21 t/Gcal and for a 100 Gcal/h boiler - 2 t/Gcal. Specific pipe
KazNII-30 (developed KazNII-100 (developed KV-TK-100 consumption for a 30 Gcal/h boiler is 0.88 t/Gcal and for a 100
boiler) boiler) Gcal/h boiler - 0.65 t/Gcal. The KV-TK-100-150 boiler has a
1 30 100 100
2 5119 17200 17737 specific metal consumption of 5.25 t/Gcal. (Power
3 153 153 153 engineering 5, 1980, 1-30-02).
- 332 -
and the reduction in capital costs is K = 90.6 * 572 = $ 52 Constructive diagram of new type hot water boiler for
thousand. In addition to a significant reduction in capital solid fuel with a productivity of 30 have been developed.
costs, the new type of boiler consumes less fuel by 5 kg/Gcal Thermal, aerodynamic, hydraulic and structural calculations
(Table 7). of a water-heating boiler with a behind-the-screen gas duct
The total fuel economy with an annual number of boiler and an air heater for a capacity of 30 Gcal/h have been carried
5∗30∗5000 out. At the same time, two variants of water circulation in the
operation hours of ≈ 5000 will be 𝐸 = =
1000 boiler pipes are considered: six strokes and two strokes. A
750 t.f.e./year or natural fuel (𝑄 𝐻
𝑃 = 6240 kcal/kg).
comparative analysis of a water-heating boiler of the
The average cost of Kuznetsk coal with transportation costs
proposed type with a well-known boiler of the KV-TK-100-
is about 20 $/t. Hence the annual savings due to reduced fuel
150 type for Kuznetsk coal is carried out.
consumption will be
The calculation of the economic effect from the
𝑆𝑓 = 842 ∗ 20 = 16800 $ 𝑎 𝑦𝑒𝑎𝑟. introduction of a hot water boiler of a new profile with a
capacity of 30 Gcal/h is given.
The hydraulic resistance of the new boiler reaches 2.6 mm A hot water boiler of a new type allows using the reverse
H2O, instead of 15 m for known boilers of similar side of the furnace walls for convective heat exchange, which
performance. This leads to a reduction in the power of the significantly increases its efficiency, and the possibility of
circulation pump by 11 kW. Hence, the energy savings on the eliminating convective bundles from their schemes of a new
circulation pump will be boiler significantly increases the reliability of the new boiler.
The brief conclusions drawn from this study are as
11 * 5000 = 55000 kWh/year. follows:
The cost of electricity in the utility system is 0.05 $/kWh. 2. Comparison of the new type boiler with the well-known
Hence the savings by reducing energy consumption will be: KV-TK-100-150 boiler shows an improvement in the
technical and economic indicators of the new boiler: the
55000 ∗ 0,05 boiler efficiency increases by 3% due to a decrease in the flue
𝑆= = 27,5 $ 𝑎 𝑦𝑒𝑎𝑟.
100 gas temperature; fuel consumption is reduced by 5 kg/Gcal.
The total savings in operating costs from the introduction 3. Saving metal consumption per boiler with a capacity of
of a 30 Gcal/h boiler will be: 30 Gcal/h is 90.6 tons. Specific metal consumption for a 30
Gcal/h boiler is 2.38 times less than for a KV-TK-100-150
𝑆𝑖 = 16840 + 27.5 = 18868 $ 𝑎 𝑦𝑒𝑎𝑟. boiler.
4. Comparison of two options for water circulation in the
Saving the reduced costs, considering the reduction in boiler (six-way and two-way) shows the advantages of the
capital investments, will be: two-way option: increased reliability of the furnace walls,
𝐸𝑟 = 18868 + 0,15 ∗ 52000 = 26668 $ 𝑎 𝑦𝑒𝑎𝑟. reduced power consumption to overcome the hydraulic
resistance of the boiler (1.4 times).
The approximate cost of a boiler of 30 Gcal/h can be 5. Simple calculations of the cost of a new type of boiler
determined by multiplying the specific cost of the metal by 30 Gcal/h have shown that the costs of its manufacture due to
its weight. fuel and metal savings are paid off in 1.5 years.
С𝑏 = 572 ∗ 66,9 = 38300 $. ACKNOWLEDGMENT
Consequently, the cost of the boiler pays off by saving the
reduced costs during: This research has been funded by the Science Committee
of the Ministry of Science and Higher Education of the
38300 Republic of Kazakhstan Grant № AP13068541 project
= 1.5 𝑦𝑒𝑎𝑟𝑠
26015 «Development of an experimental energy complex based on
a modernized boiler plant using biofuel»,
The design of the new boiler differs from the known ones
in many welding works. Welding of fins and heat-dissipating REFERENCES
turbulizing fins of the boiler 30 Gcal/h requires additional [1] Concept of development of the fuel and energy complex of the
welding work in the amount of I4 thousand m. The cost of Republic of Kazakhstan until 2030. Approved by the decree of the
Government of the Republic of Kazakhstan dated June 28, 2014 No.
these works for one boiler is about $ 4 thousand. These 724. https://policy.asiapacificenergy.org/node/369; 2021 [accessed
additional capital expenditures, as calculations show, pay off 09.03.2021].
in 5 years only due to energy savings due to the complete [2] Somchart Chantasiriwan, Optimum installation of flue gas dryer and
additional air heater to increase the efficiency of coal-fired utility
absence of leaks in the gas ducts. Thus, all-welded hermetic boiler, Energy, Volume 221, 2021, 119769, ISSN 0360-5442,
gas ducts, despite the increase in welding work, pay for https://doi.org/10.1016/j.energy.2021.119769.
themselves, which has become a well-known fact that ensures [3] Hari B. Vuthaluru, David H. French, Investigations into the air heater
ash deposit formation in large scale pulverised coal fired boiler, Fuel,
the spread of all-welded panels. Volume 140, 2015, Pages 27-33, ISSN 0016-2361,
https://doi.org/10.1016/j.fuel.2014.09.040.
[4] Robert Wejkowski, WacЕ‚aw Wojnar, Selective catalytic reduction in
CONCLUSION a rotary air heater (RAH-SCR), Energy, Volume 145, 2018, Pages 367-
Model of an air heater for research, of an air heater 373, ISSN 0360-5442, https://doi.org/10.1016/j.energy.2017.12.077.
channel made of corrugated sheets for research in a dusty [5] Sheng Shang, Xianting Li, Wei Chen, Baolong Wang, Wenxing Shi, A
flow have been developed. A research technique on a dusty total heat recovery system between the flue gas and oxidizing air of a
stream has been developed. gas-fired boiler using a non-contact total heat exchanger, Applied
Energy, Volume 207, 2017, Pages 613-623, ISSN 0306-2619,
https://doi.org/10.1016/j.apenergy.2017.05.169.
- 333 -
[6] Zixiang Li, Xinqi Qiao, Zhengqing Miao, Low load performance of
tangentially-fired boiler with annularly combined multiple airflows,
Energy, Volume 224, 2021, 120131.
https://doi.org/10.1016/j.energy.2021.120131
[7] G Sureandhar, G Srinivasan, P Muthukumar, S Senthilmurugan,
Performance analysis of arc rib fin embedded in a solar air heater,
Thermal Science and Engineering Progress, Volume 23, 2021, 100891,
ISSN 2451-9049, https://doi.org/10.1016/j.tsep.2021.100891
[8] Inderjeet Singh, Sachit Vardhan, Experimental investigation of an
evacuated tube collector solar air heater with helical inserts, Renewable
Energy, Volume 163, 2021, Pages 1963-1972, ISSN 0960-1481,
https://doi.org/10.1016/j.renene.2020.10.114
[9] Gagan Bansal, Chandra Kishore, R. Meby Selvaraj, Vijay Kumar
Dwivedi, Experimental determination of the effect of change in relative
roughness pitch on the thermo-hydraulic performance of air heater
working with solar energy, Materials Today: Proceedings, 2021, ISSN
2214-7853, https://doi.org/10.1016/j.matpr.2021.01.406.
[10] Refat Moshery, Tan Yong Chai, Kamaruzzaman Sopian, Ahmad
Fudholi, Ali H.A. Al-Waeli, Thermal performance of jet-impingement
solar air heater with transverse ribs absorber plate, Solar Energy,
Volume 214, 2021, Pages 355-366, ISSN 0038-092X,
https://doi.org/10.1016/j.solener.2020.11.059
[11] Agarwal, Shivansh Aggarwal, Performance evaluation of an arched
plate solar air heater with porous aluminum wire mesh cylindrical fins,
Energy Reports, Volume 6, Supplement 9, 2020, Pages 627-633, ISSN
2352-4847, https://doi.org/10.1016/j.egyr.2020.11.177
[12] Yogesh Agrawal, JL Bhagoria, Experimental investigation for pitch
and angle of arc effect of discrete artificial roughness on Nusselt
number and fluid flow characteristics of a solar air heater, Materials
Today: Proceedings, 2020, ISSN 2214-7853,
https://doi.org/10.1016/j.matpr.2020.09.249
[13] Naef A.A. Qasem, Mohamed N. Arnous, Syed M. Zubair, A
comprehensive thermal-hydraulic assessment of solar flat-plate air
heaters, Energy Conversion and Management, Volume 215, 2020,
112922, ISSN 0196-8904,
https://doi.org/10.1016/j.enconman.2020.112922.
[14] Anil Kumar, R.P. Saini, J.S. Saini, Experimental investigation on heat
transfer and fluid flow characteristics of air flow in a rectangular duct
with Multi v-shaped rib with gap roughness on the heated plate, Solar
Energy, Volume 86, Issue 6, 2012, Pages 1733-1749, ISSN 0038-
092X, https://doi.org/10.1016/j.solener.2012.03.014
[15] Lun Ma, Qingyan Fang, Chungen Yin, Huajian Wang, Cheng Zhang,
Gang Chen, A novel corner-fired boiler system of improved efficiency
and coal flexibility and reduced NOx emissions, Applied Energy,
Volume 238, 2019, Pages 453-465, ISSN 0306-2619,
https://doi.org/10.1016/j.apenergy.2019.01.084.
[16] Yacheng Liu, Weidong Fan, Yu Li, Numerical investigation of air-
staged combustion emphasizing char gasification and gas temperature
deviation in a large-scale, tangentially fired pulverized-coal boiler,
Applied Energy, Volume 177, 2016, Pages 323-334, ISSN 0306-2619,
https://doi.org/10.1016/j.apenergy.2016.05.135.
[17] Yukun Hu, Hailong Li, Jinyue Yan, Numerical investigation of heat
transfer characteristics in utility boilers of oxy-coal combustion,
Applied Energy, Volume 130, 2014, Pages 543-551, ISSN 0306-2619,
https://doi.org/10.1016/j.apenergy.2014.03.038.
[18] Suwarno Suwarno, Giri Nugroho, Andik Santoso, Witantyo, Failure
analysis of air preheater tubes in a circulating fluidized bed boiler,
Engineering Failure Analysis, Volume 124, 2021, 105380, ISSN 1350-
6307, https://doi.org/10.1016/j.engfailanal.2021.105380.
[19] Qiannan Zhang, Fengzhong Sun, Changxian Chen, Research on the
three-dimensional wall temperature distribution and low-temperature
corrosion of quad-sectional air preheater in larger power plant boilers,
International Journal of Heat and Mass Transfer, Volume 128, 2019,
Pages 739-747, ISSN 0017-9310,
https://doi.org/10.1016/j.ijheatmasstransfer.2018.09.006
[20] Subramaniyan, S. Venkatachalapathy, Heat transfer studies at different
speeds and loads of regenerative air preheater in thermal power plant,
Thermal Science and Engineering Progress, Volume 22, 2021, 100814,
ISSN 2451-9049, https://doi.org/10.1016/j.tsep.2020.100814
[21] Statistical yearbook of 2020. Statistical Agency of the Republic of
Kazakhstan. www.stat.gov.kz. [accessed 10.02.2021]
[22] Zhuravov A. A., PTVM-100 and PTVM-50 boilers reconstruction – the
real way to solve the problem of city heat power deficiency. Heating
supply news. 2000; 1, p.22-23.Power engineering 5, 1980, 1-30-02
- 334 -
Comparison of VARC DC Interrupting Module
Topologies for Enhancing Superconducting
VARC DCCB
Daeseong Jang and Hyosang Choi*
Chosun University, Korea
Email: [email protected]
Abstract— For the stable operation of high voltage direct allowing them to transmit current almost lossless under a
current(HVDC), research on circuit breakers with fast steady state in HVDC. However, if a fault occurs in the HVDC
interruption time is being done. Currently, hybrid DC circuit and a fault current exceeds the critical current of the
breakers(HDCCBs) are being researched, but they have slower superconducting element, the superconducting element can be
interruption times than semiconductor DC circuit breakers. quenched, causing a sharp rise in resistance and limiting the
Among the HDCCBs, we propose a superconducting vsc assisted fault current to rise. Through this, SFCL can reduce electrical
resonant current(VARC) DCCB combining a VARC DC energy burden as well as interruption time of the DC circuit
interrupting module with a superconducting fault current breaker. There are several types of SFCL, including resistive,
limiting(SFCL) module. The superconducting VARC DCCB
saturated iron core, and inductive [6]. Among them, the
can amplify resonant currents, causing the fault current to
reach an artificial zero point quickly through VARC DC
resistive type has a simple structure and is designed easily to
interrupting module. In addition, the superconducting VARC fit engineers’ needs. It also has so fast response time, that it
DCCB can reduce electrical energy burden by limiting fault can be quickly quenched to limit the fault current when a fault
current through the SFCL module when a fault occurs. In this occurs in the HVDC.
paper, the interrupting characteristics and electrical energy Interrupting technologies can be divided into resonant DC
burdens of superconducting VARC DCCB are compared circuit breaker (R-DCCB), solid-state DC circuit breaker (SS-
according to the VARC DC interrupting module’s topologies. As
DCCB), and hybrid DC circuit breaker (H-DCCB) [7]. R-
for the topologies, a full-bridge module in the VARC
DCCB is composed of a mechanical switch (MS), LC circuit,
interrupting module is classified into three circuit types: single,
series, and parallel. The operations of topologies are simulated and metal oxide varistors (MOV). It interrupts fault current
using PSCAD/EMTDC. Based on the simulation results, through a principle of LC series resonance. It has a simple
interruption times in the case of single and series are the same, structure and is economical, but it is not suitable for HVDC
interruption time in the case of parallel is about 2 ms slower than because of its slow interruption time and difficulty in selecting
others. Total electrical energy burdens are similar for single and the optimal capacity of LC elements. SS-DCCB is composed
series, and about 1.18 times greater for parallel than others. of a semiconductor switch such as an IGBT or SiC and a MOV.
It interrupts fault current through the turn-off operation of the
Keywords— Circuit breakers, fault current limiters, HVDC, semiconductor switch and has the fastest interruption time
PSCAD, superconducting devices among them. However, it is relatively inefficient because
resistance loss occurs in the ON state. H-DCCB is composed
I. INTRODUCTION of MS and semiconductor devices, which improve the
As the scale of renewable energy sources increases, high- disadvantages of other breakers. Recently, vsc assisted
voltage direct current (HVDC) transmission systems have resonant current (VARC) DCCB has been developed as one
been proposed as a suitable method for long-distance and of the H-DCCBs that combines an R-DCCB and full-bridge
large-capacity transmission [1], [2]. However, since there is (FB) module configured with IGBTs. It can amplify resonance
no zero point in the DC, it is more difficult to interrupt than through the FB module to bring a fault current to zero quickly
AC when a fault occurs. Therefore, research on DC protection [8], [9]. However, a lot of research is needed to enhance this
technology is essential for the reliable operation of HVDC. before it can be actively deployed in the real HVDC system.
Protection technology can be divided into current limiting In this paper, a study has been conducted to improve the
technology and interrupting technology. VARC DC interrupting module of superconducting VARC
A large inductor with a value of several hundred mH is DCCB. To this end, we modeled a superconducting VARC
commonly used in current limiting technologies of HVDC [3], DCCB that combines an SFCL module and a VARC DC
[4]. However, this can affect dynamic response and reduce the interrupting module using PSCAD/EMTDC. After that, three
stability of the system. In addition, it delays interruption time superconducting VARC DCCBs were constructed based on
by storing current energy. Superconducting fault current the topologies of the VARC DC interrupting module. The
limiter (SFCL) has emerged as one of the promising fault topologies are divided into single, series, and parallel,
current limiting technologies for HVDC [5]. Superconducting depending on the construction method of the FB module
elements have zero resistance in the superconducting state, within the VARC DC interrupting module. In addition, we
This work was supported by the Gwangju·Jeonnam local Energy Cluster Manpower modeled a fault simulation circuit diagram at 320 kV using
training of the Korea Institute of Energy Technology Evaluation and Planning(KETEP) PSCAD/EMTDC. The Interrupting characteristics and
grant funded by the Korea government Ministry of Knowledge Economy (No. electrical energy burdens were compared for topologies of
20214000000560) VARC DC interrupting modules.
This research was supported by Korea Electric Power Corporation [grant number:
R21XO01-32]
- 335 -
Fig. 2. Circuit diagram of the VARC DC interrupting module.
Fig. 1. Graph of quench resistance.
- 336 -
Fig. 4. Fault simulation circuit diagram.
Q=C∗V ()
IV. SIMULATION
A. Fault Simulation Circuit Diagram Modeling
Fig. 4 shows a fault simulation circuit diagram using
PSCAD/EMTDC. The DC voltage of the circuit diagram is set
to 320 kV, which is the DC rating of the INELFE system [14].
The reactance of the circuit diagram was set to 2 mH, the (b)
normal current to 1 kA, and the fault current to 10 kA when
no DCCB is installed.
B. Fault Simulation
Table II shows a comparison table of fault simulation
results for each topology.
Fig. 5(a) shows the interrupting graph of a
superconducting VARC DCCB for a single FB module. A
fault occurred at 0.1 s. A fault current rise should have risen
from about 1 kA to about 10 kA, but the SFCL module
quenched and limited the fault current to about 5 kA. MS
opens at 0.11 s after about 10 ms delay. When MS opens, arc
was generated at the MS contact, and a resonant current was
conducted by the LC series resonance. At the same time, the
pre-charged 𝐶𝑠 in the FB module discharged at the resonant (c)
frequency, amplifying the resonant current. The MS current
reached zero point at about 0.11115 s after being reversed two Fig. 5. Graph of fault current during the interruption by topologies. (a)
Single, (b) Series, (c) Parallel.
times by the amplified resonant current. And then, an
overvoltage of about 592.44 kV was generated between the TABLE II. COMPARISON OF SIMULATION RESULTS
MS contacts and the MOV was actuated to complete the
interruption at about 0.11117 s. The time from fault to Topologies
interruption was about 11.17 ms.
Single Series Parallel
Fig. 5(b) shows the interrupting graph of a
superconducting VARC DCCB for series FB modules. A fault Current limit rate [%] 50 50 50
occurred at 0.1 s. A fault current rise should have risen from
about 1 kA to about 10 kA, but the SFCL module quenched Reversals 2 2 6
and limited the fault current to about 5 kA. MS opens at 0.11 s
Reach zero point [ms] 11.15 11.15 13.15
after about 10 ms delay. When MS opens, arc was generated
at the MS contact, and a resonant current was conducted by Transient voltage [kV] 592.44 588.1 586.86
the LC series resonance. At the same time, the pre-charged 𝐶𝑠
in the FB module discharged at the resonant frequency, Interruption time [ms] 11.17 11.17 13.17
amplifying the resonant current. The MS current reached zero
- 337 -
Fig. 6. Graph of 𝐶𝑠 voltages by topologies during the interruption.
Fig. 7. Total 𝐶𝑠 discharge currents by topologies during the interruption.
point at about 0.11115 s after being reversed two times by the
amplified resonant current. And then, an overvoltage of about TABLE III. ELECTRICAL ENERGY BURDENS OF EACH
ELEMENT OF THE SUPERCONDUCTING VARC DCCB
588.1 kV was generated between the MS contacts and the
MOV was actuated to complete the interruption at about Electrical Energy Topologies
0.11218 s. The time from fault to interruption was about Burden [MW·t] Single Series Parallel
11.17 ms.
Fig. 5(c) shows the interrupting graph of a SFCL module 17,673,154 17,673,511 20,872,401
superconducting VARC DCCB for parallel FB modules. A Interrupting circuit 857 872 12,883
fault occurred at 0.1 s. A fault current rise should have risen
from about 1 kA to about 10 kA, but the SFCL module Resonant FB circuit 60,010 43,155 141,149
quenched and limited the fault current to about 5 kA. MS Absorption circuit 7,578 7,325 46,059
opens at 0.11 s after about 10 ms delay. When MS opens, arc
was generated at the MS contact, and a resonant current was Total 17,741,600 17,724,864 21,072,493
conducted by the LC series resonance. At the same time, the
pre-charged 𝐶𝑠 in the FB module discharged at the resonant B. Electrical Energy Burden Comparison
frequency, amplifying the resonant current. The MS current Table III shows the electrical energy burdens of each
reached zero point at about 0.11315 s after being reversed six element of the superconducting VARC DCCBs from fault
times by the amplified resonant current. And then, an occurrence to interruption. Electrical energy burden (EEB)
overvoltage of about 586.86 kV was generated between the means the integral of power burdens from fault occurrence to
MS contacts, and the MOV was actuated to complete the interruption by (7). In (7), W is an electrical energy burden,
interruption at about 0.11317 s. The time from fault to 𝑡0 is a time of fault occurrence, T is an interruption time, and
interruption was about 13.17 ms. p(t) is a power burden.
V. COMPARISON ANALYSIS 𝑇
𝑊 = ∫𝑡 𝑝(𝑡) 𝑑𝑡 ()
A. Interrupting Characteristic Comparison 0
- 338 -
had similar EEB relatively. On the other hand, in the parallel [4] M. Wang, W. Leterme, G. Chaffey, J. Beerten, and D. Van Hertem,
“Multi-vendor interoperability in HVDC grid protection: State-of-the-
case, the EEBs of SFCL module, interrupting circuit, art and challenges ahead,” IET Gener. Transmiss. Distrib., vol. 15, no.
resonant FB circuit, and absorption circuit were greater by 15, pp. 2153-2175, 2021.
about 1.18, 14.89, 2.35-3.27, and 6.2 times than in other cases. [5] B. Ghatol, K. D. Thakur, “Application of Superconducting Fault
The total EEB in the parallel case is about 1.18 times greater Current Limiter (SFCL) for HVDC system with Mechanical Circuit
than in others. Breaker,” 2018 3rd IEEE International Conference on Recent Trends
in Electronics, Information & Communication Technology (RTEICT),
2018.
VI. CONCLUSION
[6] D. M. Larruskain, I. Zamora, and O. Abarrategui, “Fault current
In this paper, we compared the interrupting characteristics limiters for VSC-HVDC systems,” in Proc, 10th IET Int. Conf. AC DC
and electrical energy burdens of topologies of VARC Power Transmiss., pp. 1-6, 2012.
interrupting modules. The purpose of this study is to enhance [7] Q. Huo, J. Xiong, N. Zhang, X. Guo, L. Wu, T. Wei, “Review of DC
the superconducting VARC DCCB by studying the design circuit breaker application,”, Electric Power Systems Research, vol.
209, 2022.
direction of the VARC DC interrupting module. To this end,
a fault simulation circuit diagram, R-SFCL module, and [8] S. Liu, M. Popov, S. S. Mirhosseini, S. Nee, T. Modeer, L. Angquist,
N. Belda, K. Koreman, and V. D. Meijen, “Modeling, experimental
VARC DC interrupting module were modeled using validation, and application of VARC HVDC circuit breakers,” IEEE
PSCAD/EMTDC. Then, we divided topologies according to Transactions on Power Delivery, vol. 35, no. 3, 2020.
how the FB module is configured and simulated each case. [9] S. S. Mirhosseini, S. Liu, J. C. Muro, Z. Liu, S. Jamali, and M. Popov,
“Modeling a voltage source converter assisted resonant current DC
As a result, the SFCL modules performed as well as breaker for real time studies,” International Journal of Electrical Power
intended by modeling in the fault simulation. The fault & Energy Systems 117: 105678, 2020.
currents in all topologies were limited to about 50 % by SFCL [10] X. Pei, A. C. Smith, M. Barnes, “Superconducting Fault Current
modules. In terms of EEB, the SFCL modules account for Limiters for HVDC Systems,” Energy Procedia, vol. 80, pp. 47-55,
about 99 % more of the total EEB, which reduce significantly 2015.
EEB of the VARC DC interrupting modules. It also limited [11] R. P. R. Siddavatam, S. Kar, and K. Rajashekra, “Resistive SFCL
the fault current, which helped to reduce interruption time. integrated ultrafast DC hybrid circuit breaker for subsea HVDC
transmission systems,” IEEE Trans. Ind. Appl., vol. 58, no. 5, pp. 5977-
Interruption times were about 11.17 ms for single and 5986, 2022.
serial, and 13.17 ms for parallel with about 2 ms slower than [12] U. Havedank, “Application of a new arc model for the evaluation of
others. It is related to the magnitude of pre-charged 𝐶𝑠 short-circuit breaking tests,” IEEE Trans. Power Del. vol. 8, no. 4, 99.
1921-1925, 1993.
voltages of the FB module and the rate of discharge current
[13] L. Yuan, L. Sun, and H. Wu, “Simulation of fault arc using
rising. In the single and series cases, comprehensive 𝐶𝑠 conventional arc models,” Energy Power Eng., vol. 05, pp. 833-837,
voltages acting on the circuit diagram are about 6 kV, but in 2013.
the parallel case, it acts about 2 kV. In other words, the parallel [14] P. L. Francos, S. S. Verdugo, H. F. Alvarez, S. Guyomarch, J. Loncle,
case has a slower interruption time than others because of a “INELFE – Europe’s first integrated onshore HVDC interconnection”,
lower rate of rise in discharge current over time. 2012 IEEE Power and Energy Society General Meeting, pp. 1-8, 2012.
- 339 -
Resonance Frequency Analysis
for LC Resonant DC Circuit Breaker Design
Jihye Kim and Hyosang Choi *
I. INTRODUCTION
With the increasing demand for DC-based power and the
expansion of distributed power sources, there is growing
interest in DC systems as a solution to overcome the
limitations of traditional distribution networks [1]. Currently,
most commercially deployed DC systems adopt a 2-terminal
point-to-point configuration. However, the 2-terminal DC
system has the disadvantage of interrupting power flow when
the fault current is interrupted by controlling the power
Fig. 2. Experimental graph of operation characteristics of LC resonant
conversion devices. As a result, MMC(Modular Multi-level
DC circuit breaker
Converter)-based HVDC systems, capable of controlling
power flow, have gained attention and are evolving into Multi- the performance of the LC resonant DCCB. If the main
terminal DC (MTDC) systems [2-4]. However, MTDC frequency and the resonance frequency do not match, the
systems experience significantly larger fault currents performance of the DCCB deteriorates, and in severe cases, it
compared to 2-terminal DC systems. The control strategies of may fail to interrupt the fault current. Therefore, when
power conversion devices serve as alternatives to DC circuit designing an LC resonant DCCB, all of these factors need to
breakers but cannot fundamentally address the challenge of be considered to set the resonance frequency appropriately.
interrupting such high fault currents. In this regard, we are However, currently, the resonance frequency of the LC
studying the development of an LC resonant DC circuit resonant module is arbitrarily set due to the inability to find a
breaker (DCCB) capable of reliably interrupting DC fault resonance point where the main frequency of the DC system
currents. The LC resonant DCCB utilizes the resonance of an and the resonance frequency of the LC resonant DCCB
LC resonant module to create an artificial current zero- coincide.
crossing point, thereby interrupting the fault current. Properly
The purpose of this study is to establish a method for
setting the resonance frequency of the LC resonant module is
designing the LC resonant module to match the main
crucial for determining the performance of the circuit breaker.
frequency of the constructed DC system, moving away from
When operating a grid, power quality issues must be the existing approach of arbitrarily setting the resonance
considered. This is because a high amount of power electronic frequency. It elucidates the relationship between the main
converters required for grid configuration and weak frequency of the DC system and the resonance frequency of
connection points of the grid can cause harmonic excitation, the LC resonant DCCB. Additionally, the current flowing
leading to disturbances in the grid [5]. These disturbances through the LC resonant module is subjected to FFT analysis
affect the system's main frequency and, furthermore, impact to identify the resonance points.
• This work was supported by the Gwangju·Jeonnam local
EnergyCluster Manpower training of the Korea Insitute of Energy
Technology Evaluation and Planning(KETEP) grant funded by the
Korea government Ministry of Knowledge Economy (No.
20214000000560)
- 340 -
Fig. 4. 𝑖𝐿𝐶 by resonant frequency analyzed by Fourier spectrum
- 341 -
frequency. However, the relationship with the main frequency
couldn’t be determined.
III. CONCLUSION
In this paper, the aim was to address the issue of arbitrarily
determining the resonance frequency when designing an LC
resonant DCCB. To achieve this, a simulated DC fault circuit
was constructed, and the fault current flowing through the LC
resonant module was measured. The fault current was
analyzed using FFT to identify the main frequency. The
resonance frequency of the LC resonant DCCB was found to
be generally proportional to the main frequency. However,
there was a peculiar anomaly at 1400 Hz. To investigate the
relationship between the anomaly and the frequency, an
analysis of the arc was conducted. The resonance frequency
Fig. 5. Interrupting time and arc analysis by resonance frequency showed a generally proportional relationship with arc energy,
arc duration time and interruption time. However, the
current zero-crossing point is generated during the (a) to (b) resonance frequency when the arc duration time was the
interval, and the current reaches 0 A during the (a) to (c) shortest was about 1800 Hz, and the resonance frequency
interval, the interruption is considered successful. Therefore, when the interruption time was the shortest was about 1200
the current data flowing through the LC resonant module of Hz. These peculiarities are presumed to be due to the irregular
the experiment in which the blocking was successful is characteristics of the arc. In addition, LC resonance modules
obtained. A total of 10 experiments were repeated for each with a wider range of resonance frequencies should be
experimental condition, of which 3 current data were selected designed to analyze more reliable tendencies.
and averaged.
In conclusion, this research emphasizes the importance of
C. Experiment and Discussion resonance frequency in DC systems and presents methods
An arc is not defined as a simple harmonic wave with a related to the design of LC resonant DC circuit breakers.
constant period and amplitude. Non-harmonic waves, such as Therefore, such research is highly valuable for enhancing the
arcs, which exhibit irregular characteristics, can be analyzed stability and power quality of DC systems, and it can be
using Fourier Transform to obtain their representation. Fourier applied to future DC system design and operation.
Transform expresses any irregular motion as a sum of simple
harmonic waves. FFT analysis was conducted to analyze the
main frequency of the DC system constructed in the REFERENCES
laboratory.
Fig. 3. represents the Fourier spectrum of the normal [1] Ricardo Granizo Arrabé; Carlos A Platero; Fernando Á lvarez Gómez;
current and 𝑖𝐿𝐶 for each resonance frequency. In order to Emilio Rebollo López, "New Differential Protection Method for
Multiterminal HVDC Cable Networks", Advances in Energy Research:
know the main frequency, it was compared with the main 2nd Edition, 1-27, 2021.
frequency of normal current. The main frequency of the DC [2] Boyu Qin; Wansong Liu; Ruowei Zhang; Jialing Liu; Hengyi Li,
system is characterized by a concentration of energy "Review on Short-circuit Current Analysis and Suppression
compared to the normal current. Fig. 4. shows 𝑖𝐿𝐶 for each Techniques for MMC-HVDC Transmission Systems", Applied
resonant frequency as one Fourier spectrum. The results of Fig. Sciences, Vol. 10, Issue 19, 2020.10
4. are summarized in Table 1. The frequency difference is [3] Mohan Muniappan, "A comprehensive review of DC fault protection
calculated by subtracting the resonance frequency from the methods in HVDC transmission systems", Protection and Control of
Modern Power Systems, Vol. 6, Issue 1, 2021.01
main frequency. The resonance frequency and the main
[4] Lei Zhang; Yuntao Zou; Jicheng Yu; Jiangchao Qin; Vijay Vittal;
frequency generally showed a proportional relationship. George G. Karady; Di Shi; Zhiwei Wang, "Modeling, control, and
However, they did not increase uniformly, and there were protection of modular multilevel converter-based multi-terminal
anomalies, such as at 1400 Hz. This can be attributed to the HVDC systems: A review", CSEE, Vol. 3, Issue 4, 340-352, 2017.12
main frequency being influenced by factors other than the [5] A. Neufeld, D. Heide and L. Hofmann, "Calculation of Series
resonance frequency. Resonance Frequencies in Electrical Grids Using Resonance Mode
Analysis," 2019 IEEE PES Asia-Pacific Power and Energy
Fig. 5. is a graph summarizing arc power, arc duration time Engineering Conference (APPEEC), Macao, China, 2019, pp. 1-4
and interruption time for each resonance frequency. To [6] A. Mokhberdoran, A. Carvalho, H. Leite and N. Silva, "A Review on
investigate the relationship between the main frequency and HVDC Circuit Breakers," IET Renewable Power Generation, Jul. 27,
𝑖𝐿𝐶 , arc power, arc duration time, and interruption time were 2017.
analyzed. The arc detection time corresponds to the period [7] P. Qiu, X. Xuan, Y. Lu, H. Shen, L. Qi and X. Wei, "Design and
Application of Short Circuit Test Scheme for Hybrid DC Circuit
when the arc current is influenced by the resonance frequency, Breakers in Zhoushan VSC-HVDC Transmission Project," High Volt.
as observed in Fig. 2. (a)-(b). The interruption time refers to Eng., vol. 47, no. 4, pp. 1428-1435, Apr. 2021.
the rated interruption time during the periods depicted in Fig. [8] H. Shen et al., "Modeling of High-frequency Electromagnetic
2. (a)-(c). Arc energy, arc duration time, and interruption time Oscillation for DC Fault in MMC-HVDC Systems," in CSEE Journal
exhibited a proportional relationship with the resonance of Power and Energy Systems, vol. 9, no. 3, pp. 1151-1160, May 2023
- 342 -
Failure Analysis of Arc and Leakage
Generation Signal in DC Line
Han SoYeon1 , Bang SuChul1, Jeong SungIn2 and Yoon YongHo2*
1
Dept. of Future Technology Convergence Engineering Graduation School of Gwangju Univ, Korea
2*
Dept. School of Electrical & Electronics Engineering, Gwangju Univ., Korea
Email: [email protected]
Abstract— Distributed energy technology that combines occurred on. Accordingly, the Hall Type CT board was
multiple renewable energy sources to generate electricity is drawing manufactured to detect arcs by line (channel) as shown in
attention. This will develop near the detention area and does not Figure 2(b) by reading which line (channel) generated arcs
require a long-distance transmission network. As a result, new through Hall Type CT. Due to the characteristics of each CT,
construction costs can be reduced, while stability needs to be Hall Type CT has a magnetic core, making it difficult to
secured as it is located in an acceptable neighborhood that can cause accurately read arc generation and arc extinction due to
many casualties in the event of an electrical accident. Therefore, in saturation, and Rogowski CT is more sensitive than Hall Type
this paper, we want to analyze the failure of the line for occurrence CT. [4,5]. Therefore, two CTs were used to analyze arc-
of arcs and leaks on DC lines and secure stability through a
generated faults, and the information analyzed was designed
monitoring system.
to be checked by the monitoring system.
Keywords—Renewable energy, distributed energy, Arc and
leakage current in DC line, DC line fault analysis, monitoring system
I. INTRODUCTION
Distributed energy technology that combines multiple
renewable energy sources to generate electricity is drawing
attention. This has the advantage of reducing construction and
operating costs during new construction because long-distance
transmission networks are not required because they develop
in acceptable neighborhoods. However, since it is located near
the camp, electrical accidents can cause many casualties and
property damage, such as fires and electric shocks. A zero
point is formed when an arc is generated in the DC line, and
since the magnitude of the current operates within a normal
range, it is difficult to cut it off with an overcurrent breaker [1]. Fig. 1. DC arc generator
In addition, DC distribution lines need to secure safety in DC
distribution technology due to the obvious shortcomings of
ground electrode illumination sites [2]. Therefore, in this paper,
the monitoring system was designed through line failure
analysis when arc and leakage current occur.
- 343 -
B. FAILURE ANALYSIS METHOD AND DESIGN IN III. EXPERIMENTAL RESULTS
CASE OF LEAKAGE CURRENT IN DC LINE
A. Fault analysis in case of arc on DC line
A leakage current generator is used for line failure analysis
when a leakage current occurs in the DC line, and a CT for The arc generation fault signals measured through Hall
measuring leakage current is used as shown in Fig. 4 to Type CT and Logoski CT can be identified as shown in Figure
measure a failure signal when the leakage current occurs. CT n. A signal measured through Hall Type CT in C1, a signal
for measuring leakage current can be measured up to -10 mA measured through Logoski CT in C2, a signal amplified by
to +10 mA and is outputted by signals of -5 V to +5 V. In order Hall Type CT in C3, and a signal amplified by Logoski CT in
to apply the leakage current failure signal of –5V to +5V C4 can be identified. In C4, it was confirmed that the value
measured through CT to 0-3.7V which is an input range of accepted by the current sensor reacts sensitively when
MCU, the signal was converted using a level shift system. As compared to the Hall Type waveform when arc is generated
shown in Fig. 5, signals (-) 5V to (+) 5V measured through CT on DC lines because it is composed of a coreless core due to
and signals (0 to (+) 3.7V) level-converted for input into the its characteristics of Logoski CT. On the other hand, in C3, it
MCU can be checked, and how much leakage current has been is confirmed that the occurrence from the start point of an arc
generated in which line between (+) and (-) lines through the to the extinguishing point due to residual magnetic flux and
monitoring system. saturation phenomenon is unknown due to Hall type CT
characteristics. Therefore, in this paper, the presence or
absence of arc generation (arc start and end) was identified
through Locoski CT, and the presence or absence of arc
generation locations by line (channel) was read through Hall
Type CT.
Figure 7 shows a monitoring screen when an arc occurs on
a DC line. 7(a) is a screen when no arc occurs on the line, and
7(b) is a screen where signals measured through Logoski CT
are analyzed for failure when an arc occurs on the line. When
an arc occurs, a "warning" message is displayed to check
whether the arc occurs. In addition, in Figure 7(c), the signal
measured through Hall Type CT is a failure analysis screen,
and on which line (channel) the arc occurred can be confirmed.
(a) 0mA (b) 10mA
Fig. 5.
Fig. 6. Leakage current generator Fig. 8. Monitoring Arc Occurrence Fault Analysis
- 344 -
B. Fault analysis in case of leakage current in DC line
A leakage current signal value generated between (-)10
mA to (+)10 mA is shown in Fig. 8. In Fig. 8(a), the measured
signal can be confirmed through CT, and it can be confirmed
that it is measured from (-)5V to (+)5V signals. In Fig. 8(b),
the signal output between 0 and (+) 3.7 V can be confirmed
with the level-shifted signal, and the result of converting the
reference point from zero point (0) to (+) 1.9 V can be
confirmed.
Therefore, the monitoring system can be designed through (a) -10mA (b) Nomal (c) +10mA
the analysis of leakage current generation failure and
confirmed in Figure 9. Fig. 9(a) shows a monitoring screen Fig. 10. Monitoring Leakage Current Occurrence Fault Analysis
when leakage current of 10 mA is generated on the (-) line,
and information about signal values of (-) 10 mA to 0 mA
corresponding between Fig. 8(b) and 0 V to (+) 1.9 V is shown.
Fig.9(b) is a monitoring screen in the normal state of a line IV. CONCLUSION
where no leakage current is generated. Fig.9(c) shows a The technology of distributed energy generation, in which
monitoring screen when leakage current of 10 mA is generated multiple renewable energies are combined to generate
on a (+) line, and information about leakage current generation electricity through renewable energy generation, attracts
signal values of 0 to 10 mA corresponding between Fig.8(b) attention and requires securing safety. Accordingly, in this
and (+)1.9 V to (+)3.7 V is shown. paper, the monitoring system was designed and organized as
follows through analysis of track faults in case of arc and
leakage on DC lines.
Real-time measurement of fault signals through
the occurrence of arcing and leakage currents in
DC circuits for the diagnosis of line safety
Identification of occurrence of arc and leakage
current in DC line through monitoring system
Improved fault diagnosis technology for DC
power systems such as renewable and
distributed energy
ACKNOWLEDGMENT
(a) Fault signal measured by CT for leakage current detection This research was supported by Korea Electric Power
Corporation. (Grant number:R21XO01-37).
REFERENCES
[1] G. S. Seo, “Study on Series Arc Fault Detection for DC Microgrids,” Ph.
D. thesis Seoul National University, 2015.
[2] Y. H Yoon, “Maintenance of Smart Grid System Performance by
Monitoring the Insulation Status of On-DC Lines,” Trans. KIEE, vol.
70, no. 8, pp. 1232 ~ 1237, 2021.
[3] Y. H. Yoon, “Safety Analysis of Smart Grid Lines According to DC Arc
Generation,” Journal of Electrical Engineering & Technology, Journal of
Electrical Engineering & Technology, vol. 18, no. 1, pp. 697~703, 2023.
[4] M. Rezaee and H. Heydari, “Design modification of rogowski coil for
current measurement in low frequency,” Iranian Journal of Electrical &
Electronic Engineering, vol. 6, no. 4, pp. 232~237, 2010.
(b) Level-shifted signal [5] J. H. Jeong and Y. H. Yoon, “Arc Generation Detection Analysis of Smart
Grid System Using a New Arc Detection Sensor of Current Measurement,”
Fig. 9. Leakage current generating waveform Journal of Electrical Engineering & Technology, vol. 17, no. 5, pp.
3077~3084, 2022.
- 345 -
Detection of Leakage Current Occurrence
Location of LVDC Lines through Level-Shift
Signal Processing
Abstract— Recently, there has been a growing interest in II. DETECTION OF PROPOSED LEAKAGE CURRENT
smart grids, leading to an increased adoption of renewable GENERATION LOCATIONS
energy sources such as solar and wind power, which utilize low-
voltage direct current (LVDC). Additionally, there is a rising A. Current sensor for DC leakage current measurement
commercialization of high-voltage direct current (HVDC) for In order to detect leakage current, this study utilized a hall
efficient long-distance power transmission. The advancement of
sensor in the form of a current sensor. The measurement
these direct current distribution systems has highlighted the
importance of preventing faults and accidents, as well as the
method involved the passage of the (+) line and the (-) line
need for effective fault diagnosis. through a magnetic core with excellent self-recovery
performance. As shown in Figure 1, to determine which line,
Currently, traditional current relays face challenges in either the (+) or (-) line, experienced the leakage, a voltage of
detecting single-line-to-ground faults in LVDC lines. Therefore, ( 12V) was applied to the In terminal connected to the hall
in this paper, we propose using level shifting to input the leakage sensor in the form of a current sensor. The neutral point of the
current values measured by leakage sensors into an MCU resistor was measured as the output signal, allowing the
(Microcontroller Unit). By monitoring these values, our aim is measurement of the voltage corresponding to the occurrence
to diagnose of leakage..
I. INTRODUCTION
As interest in smart grids has recently increased, interest
in DC distribution systems based on efficient HVDCs
generated from renewable energy sources such as solar and
wind power, and long-distance transmission such as
continents and continents.
Unlike AC distribution, low-voltage DC distribution has a
characteristic that the instantaneous value of voltage is fixed.
Consequently, the distribution line is divided into positive and Fig. 1. Leakage current measurement unit structure
negative depending on the potential of the electrode.
Therefore, all equipment connected to a DC power B. Proposed Level Shift Conversion
distribution system must take into account polarity [1]. if a
We intend to measure the leakage current generation
ground fault occurs in low-voltage DC distribution with these
characteristics and IT method, which is a non-grounding described in Section 2.A through the proposed Level Shift
method, the insulation resistance between the power line and conversion and perform fault analysis using MCUs. Due to
the earth decreases when a one-wire ground fault occurs. If the characteristics of the MCU, there is an acceptable voltage
one of the DC distribution lines is connected to the ground due limit (0~3.7V), and it goes through two conversions to
to insulation degradation, it is highly likely that it will lead to convert the voltage value with this as a goal, which is the
a two-middle ground fault accident, which forms a closed proposed level shift conversion process. A minimum value
circuit. In this case, unlike alternating current distribution, DC corresponding to a (-) line of the measured signal is set at 0
distribution systems maintain a certain value, making it V or more and a maximum value corresponding to a (+) line
difficult to extinguish natural arcs due to arc generation, which is set at 3.7 V or less, so that input voltage values are
can lead to fire and cause large-scale property and casualties converted into (-)3 V-(+)3 V through voltage distribution law
[2-4]. in primary conversion.
Therefore, this paper seeks to secure reliability by A signal value measured through a current sensor is
analyzing the condition diagnosis and safety of LVDC lines in designed to be output as an input waveform signal in Fig. 2.
ground fault accidents using simulated test equipment using The current sensors used in this paper can measure current
level shift in low-voltage DC distribution.
- 346 -
Fig. 2. The process of Level Shift conversion
values from (–) 10 mA to (+) 10 mA, which can be expressed B. Result of Level Shift conversion
as values from (–) 5 V to (+) 5 V, as shown in Table 1(a).
Table 1(b) shows the waveform obtained by voltage
distribution and primary conversion of the input waveform
and the conversion value. Comparing Table 1(a) and (b), it
can be confirmed that the range of (–)5V to (+)5V is changed
from (–)3V to (+)3V. Subsequently, Table 1(c) confirms that
the proposed Level Shift conversion converts the range from
(–)3V to (+)3V into a range from 0V to 3.7V.
III. EXPERIMENTAL RESULT
A. DC Leakage current Generated Waveform
A current of (-)10 mA to (+)10 mA is generated through a
DC leakage current generator. A leakage current generated Fig. 4. DC Leakage current Level Shift Waveform
through a DC leakage current generator is applied to a current
sensor described in 2.A. Figure 3 shows that leakage has
occurred in the (-) and (+) lines and is being measured.
- 347 -
Fig. 4 is a graph in which leakage current values of (-)10
mA to (+)10 mA are changed in units of 2 mA through level
shift, and a waveform in which the measured values of (-)5 V
to (+)5 V are converted into (-)3 V to (+)3 V and 0 to 3.7 V is
shown. Finally, the signal values of 0-3.7 V will be analyzed
through the MCU, and as shown in Fig. 5, the monitoring
value for fault analysis due to leakage current generation will
be shown.
IV. CONCLUSIONS
With the development of DC distribution technology, low-
voltage DC systems are also expanding. In this situation,
accidents and fires caused by leakage of DC components are
also occurring frequently. DC leakage current cannot be
blocked in advance with existing circuit breakers and short
circuit breakers.
Therefore, this paper proposed a method for measuring
leakage current and diagnosing faults through the proposed
Level Shift conversion. Therefore, by monitoring the fault
diagnosis data through the proposed Level Shift
transformation, it can be organized as follows.
REFERENCES
- 348 -
Using IoT technologies to prevent fires
Akyltay Burgegulov1, Gulzat Ziyatbekova1,3*, Тalgat Mazakov1,3*, Aigerim Sametova1,2*,
Magzhan Aliaskar1*
1
Al-Farabi Kazakh National University, Almaty, Kazakhstan
2
Almaty University of Power Engineering and Telecommunications named after Gumarbek Daukeyev
3
Institute of Information and Computational Technologies CS MES RK, Almaty, Kazakhstan
Email: [email protected]
Abstract-- This article explores various aspects of using demonstrates how the technology can be adapted and
the Internet of Things (IoT) to enhance fire safety. The main optimized to solve specific tasks and problems related to fire
goal of the article is to provide an overview of modern IoT safety. Highlighting potential limitations and drawbacks of
technologies used for fire safety, as well as discuss challenges, existing IoT devices and systems allows to identify areas for
standards, and potential development of this field in the further refinement and development of the technology. This
future. The introduction of the article presents the definition can encourage researchers, developers, and manufacturers to
of IoT and its role in the modern world, the importance of fire continue seeking new, more effective, and safer solutions for
safety and related challenges, as well as an overview of the ensuring fire safety using IoT. Overall, the article is a
article's structure and the goals of discussing examples. valuable source of information for all interested parties,
Contemporary IoT smoke and heat sensors, their operating including fire safety professionals, engineers, architects,
principle, as well as examples of such sensors on the market, building and facility managers, as well as legislators and
including Nest Protect and Halo Smart Smoke Detector, are regulatory bodies. It underscores the importance of
examined. Intelligent alert systems and connections with integrating IoT technologies into fire safety systems and
emergency services, such as Birdi Smart Alarm and ADT demonstrates how these innovations can help reduce fire risks
Smart Home, are discussed. The working principle of such and save lives.
systems and examples of their usage are examined. The
integration of IoT technologies into fire extinguishing Keywords: Internet of Things, IoT, fire safety, smoke
systems is analyzed. Examples of IoT fire extinguishing sensors, heat sensors, smart home.
systems on the market, such as Plumis Automist Smartscan
and Viking QRFS, are provided, and the advantages of using I. INTRODUCTION
IoT in fire extinguishing are discussed. The work is also The Internet of Things (IoT) represents a concept in
devoted to the regulation and standardization of IoT which physical objects, such as sensors, appliances, and
technologies for fire safety. The importance of machines, collect, exchange, and analyze data via the
standardization and regulation, as well as the main standards internet. IoT technologies provide the ability to manage
and regulatory bodies in this area, are discussed. The article
and monitor devices remotely, facilitating daily life and
concludes and discusses potential directions for the
development of IoT technologies in fire safety in the future.
promoting process automation in various sectors such as
The authors highlight the potential of IoT technologies for industry, agriculture, healthcare, and transportation.
improving fire safety and offer ideas for further development The Internet of Things (IoT) has a revolutionary
of this sphere. Overall, this article provides valuable
impact on many aspects of our lives, including the field of
information for fire safety professionals, engineers,
developers of IoT devices, and all those interested in the fire safety. Fires can be destructive and dangerous to
development and application of IoT technologies in fire human life and property, so it's important to utilize the
safety. This article serves as a valuable resource for those who latest technologies to prevent the occurrence of fires and
want to familiarize themselves with contemporary approaches mitigate their impact. IoT technologies offer new
and solutions related to using IoT to enhance fire safety, as
opportunities for fire safety, such as smart smoke and heat
well as for those who aim to develop and implement new IoT
technologies in their projects. In addition, the article can be sensors that can warn of potential fires and timely alert to
useful for legislators and regulatory bodies looking to create a fire occurrence.
or update norms and standards regulating the application of Fire safety is a crucial aspect in ensuring the security
IoT technologies in fire safety. Analysis of existing standards of life and property. The primary challenges associated
and regulatory bodies in this field can serve as a starting point
with fire safety include ensuring timely fire detection,
for determining the requirements for future IoT devices and
fire safety systems. Ultimately, this article represents a kind of effective alerting and response to fire, as well as the
landmark study that can stimulate further developments and application of modern technologies to prevent fires and
innovations in the field of IoT technologies for fire safety. It mitigate their impact.
draws attention to a number of important issues and The structure of the article is designed to provide
challenges facing this industry, and offers solutions. It is
readers with information about modern IoT technologies
expected that IoT technologies will continue to play an
increasingly significant role in fire safety in the coming years, applied for fire safety. The article is divided into sections,
and this article will help navigate this rapidly changing and each discussing different aspects of IoT technologies for
developing field. The article also highlights potential fire safety, such as smoke and heat sensors, intelligent
advantages and opportunities offered by the application of alert systems, fire extinguishing systems, and the
IoT technologies for fire safety in various sectors, such as
application of IoT in various sectors. The purpose of the
industry, housing, and transportation. Discussion of specific
examples of IoT solutions in each of these sectors article is to give readers an understanding of the
- 349 -
possibilities of IoT technologies for enhancing fire safety sensors, providing the ability for remote monitoring and
and examples of successful application of these alerting, reflected in the Figure 3.
technologies in practice. • Remote Monitoring: The RemoteLync Monitor listens
Smoke and heat sensors using IoT are devices that for alarm signals from existing smoke and carbon
detect smoke and temperature changes, indicating a monoxide detectors in the home. In case a sensor is
potential fire. These sensors are connected to the internet triggered, the device instantly sends a notification to a
and transmit data about potential fire hazards to the smartphone or another mobile device.
owner's mobile devices or smart home platforms, as well • Compatibility: The device is compatible with most
as to other connected devices. This allows owners and smoke and carbon monoxide detectors available in the
security services to be promptly and efficiently alerted to market, allowing it to be used with already installed
a fire and to take steps to extinguish it. security systems.
• Mobile Application: The Kidde RemoteLync Monitor
APPLICATION AND ANALYSIS OF IOT TECHNOLOGIES FOR has its own mobile application, allowing users to
FIRE PREVENTION:
customize notifications, check device status, and monitor
Nest Protect is a smart smoke and carbon monoxide smoke and carbon monoxide detection.
sensor that uses IoT technologies for enhanced safety, • Expansion of Security System Capabilities: The ability
shown in Figure 1. to connect with other smart home devices, such as
• Detects fast-spreading fires, slowly smoldering fires, cameras, lighting, and automatic fire extinguishing
and carbon monoxide. systems, to create a more comprehensive and effective
• Voice alert about the type of danger and location of the safety system [5].
fire.
• The ability to receive notifications on the owner's
mobile devices and interact with other smart devices in
the home [1].
- 350 -
• Ease of Installation and Setup: Onelink Safe & Sound II. RESULT AND DISCUSSION
is easily installed on the ceiling and connects to the Wi-Fi However, instead, the systems use their own wireless
network, making it quick and easy to set up the device and communication technology to synchronize with other
start using its functions. detectors in the home. In addition to IoT smoke and heat
• Compatibility with Other Smart Home Devices: Onelink sensors, which provide early detection of potential fires,
Safe & Sound can be integrated with other smart home there are other technologies aimed at improving fire
safety. One such direction is intelligent notification
devices to create a more extensive and effective safety and
management system[7]. systems and communication with emergency services.
These systems not only promptly warn users about the
occurrence of a fire but also automatically notify
emergency services about the incident, which can reduce
response time and save lives.
- 351 -
• Internet connection dependence: The device requires a • Long-term contract: ADT often requires its customers to
constant internet connection via Wi-Fi for its operation. In sign long-term monitoring contracts, typically for 3-5
case of internet connection issues, the device's years. If the contract is terminated, users may face
functionality can be limited, which can lead to delays in penalties and additional fees.
receiving fire hazard notifications.
• Professional installation: ADT Smart Home requires
• Setup complexity: Some users may experience professional installation, which can increase the cost of
difficulties setting up and installing Birdi Smart Alarm, the system and cause inconvenience for users who prefer
especially if they have no experience with similar devices. self-installation.
• Lack of support for the standard interconnect function: • Limited integration with third-party devices: While
Birdi Smart Alarm does not support the standard ADT Smart Home can integrate with some third-party
interconnect function that allows all smoke and carbon devices, it is not as versatile as some other smart home
monoxide detectors in the home to trigger simultaneously. platforms and may be incompatible with some popular
This can reduce the effectiveness of fire hazard products on the market.
notifications.
• Dependence on internet connection: ADT Smart Home
• Need for battery replacement: Unlike some other requires a constant internet connection to work. In the
devices with hardwired batteries, Birdi Smart Alarm event of a lack of internet connection, the functionality of
requires battery replacement every few years, which can the system can be reduced, which in turn affects fire safety
become an additional costly and inconvenient factor for and monitoring. So, we have reviewed various IoT smoke
users. and heat sensors, as well as intelligent alert systems and
communication with emergency services.
ADT Smart Home is a comprehensive home security
system that includes smart smoke and carbon monoxide However, the possibilities of IoT technologies for
detectors, surveillance systems, and access control enhancing fire safety are not limited to these solutions.
systems, depicted in the Figure 6. Upon detection of a Now let's move on to discussing the benefits of using IoT
hazard, such as a fire, the system automatically connects in fire extinguishing systems, which can also significantly
with emergency services and notifies the owners through increase the effectiveness of fire fighting and prevent
a mobile app. ADT Smart Home also allows owners to tragic consequences. The use of IoT technologies in fire
control and manage various security devices using a extinguishing systems can bring a number of benefits,
single app [14]. such as increasing the effectiveness of fire extinguishing,
reducing the response time to fire events, reducing risks
to people and property, and managing fire systems [16-
17].
However, like any other device, ADT Smart Home has its
drawbacks:
- 352 -
the fire. Automist Smartscan can be integrated with other While the use of IoT technologies in fire suppression
smart home devices and allows owners to control the provides a range of benefits, such as rapid fire detection,
system's operation via a mobile application [18]. notification, and localization, as well as integration with
other smart home devices, it's also important to consider
Figure 7. Diagram of the Automist Smartscan system [19]
aspects of regulation and standardization. These factors
1. Stop valve, approved by the Water Regulations play a key role in ensuring the safety, reliability, and
Approval Scheme (WRAS) compatibility of IoT devices for fire safety, which in turn
2. Label and cable tie facilitates the application of these technologies across
3. Single non-return valve various sectors and spheres of life.
4. Filter and bracket
The Importance of Standardization and Regulation.
5. Pressure reducing valve
Standardization and regulation of IoT technologies for
6. Stainless steel intake hose
fire safety play a crucial role in ensuring compatibility,
7. Pump unit
safety, and reliability of devices and systems. Thanks to
8. Controller
standardization, manufacturers can create products that
9. Quick-connect junction with a control point for
easily integrate with other devices and systems, ensuring
a pressure gauge
efficient and safe operation. Regulation, on the other
10. High pressure discharge hose
hand, helps to control product quality and ensure
11. Assembled head
compliance with safety requirements.
12. Wireless multisensory alarm
13. Specified wired detector Overview of Key Standards and Regulatory Bodies.
Viking QRFS (Quick Response Fire Suppression) is a Different countries have different standards and
modern fire suppression system that uses IoT regulatory bodies responsible for controlling and
technologies for quick response to a fire. The system certifying fire safety devices and systems. Some of them
includes smoke, heat, and humidity sensors, as well as include NFPA (National Fire Protection Association), UL
devices for monitoring the operation of fire suppression (Underwriters Laboratories), EN (European Norms), and
pumps and valves. Viking QRFS allows for timely fire IEC (International Electrotechnical Commission). They
detection and activation of appropriate fire suppression develop standards that set the safety, performance, and
devices, as well as remote monitoring and management of reliability requirements for IoT technologies for fire
the system via the internet [20]. safety [21].
Despite their advantages, these systems also have several CONCLUSION
drawbacks:
After considering the regulation and standardization of
• High cost: Installation can be expensive, IoT technologies for fire safety, as well as their
especially compared to traditional fire application in various sectors, it's time to draw
suppression systems. This can make it less conclusions and outline potential directions for the
accessible for some consumers. • Complexity of development of this field in the future. The concluding
installation and maintenance: Installation and part of the article presents a brief summary of the main
maintenance require a professional approach, points discussed earlier, and possible trends and prospects
which can be inconvenient for users who prefer for the development of IoT technologies for fire safety are
to self-install and maintain their fire safety discussed.
systems. • Need for component replacement:
In this article, we have looked at various aspects of the
Like other fire suppression systems, it requires
application of IoT technologies in the field of fire safety,
regular replacement of components such as
the importance and use of the Internet of Things (IoT) in
pumps, nozzles, and sensors, which can increase
fire safety. The discussion included various types of
long-term costs.
devices, such as smoke and heat sensors, intelligent
• Potential compatibility issues: In some cases, the
notification systems and communication with emergency
systems may be incompatible with already
services, as well as the integration of IoT technologies
installed fire safety systems or other smart home
into fire suppression systems. Discussing different aspects
devices. In such situations, integration and setup
and examples of IoT technologies helps better understand
may require additional efforts and costs.
their potential and opportunities for improving fire safety
• Limited effectiveness under certain conditions:
in today's world.
Although the systems are usually effective in
quickly detecting and extinguishing a fire, their First, we defined the basic concepts of IoT and its role in
effectiveness may decrease under conditions the modern world, as well as outlined the issues and
where the fire occurs in enclosed spaces or when challenges of fire safety. We then looked at examples of
the fire spreads too quickly. IoT smoke and heat sensors, such as Nest Protect and
Halo Smart Smoke Detector, which can detect smoke and
- 353 -
temperature changes for timely notification of possible compatibility between different devices and
ignition. systems.
• Education and information: Development of
Next, we studied smart notification systems and training and information programs for users and
communication with emergency services, such as Birdi professionals in the field of fire safety
Smart Alarm and ADT Smart Home. These systems contributes to a wider dissemination of
provide quick communication with emergency services knowledge about IoT technologies and their
and responsive response to fire situations, significantly benefits for ensuring safety.
reducing risks to life and property. • International cooperation: Enhancing
Integration of IoT technologies into fire suppression international cooperation in the field of IoT
systems, such as Plumis Automist Smartscan and Viking technologies for fire safety can help develop
QRFS, also has a number of advantages, including common standards and approaches, as well as
increasing efficiency, accuracy, and automation of the fire exchange experiences and best practices.
extinguishing process. • It is also worth paying attention to the
development of environmental technologies in
The importance of regulating and standardizing IoT fire extinguishing, such as the use of safer gases
technologies for fire safety cannot be underestimated, as and chemical agents for extinguishing fires. The
they ensure the safety and compatibility of devices and interaction of IoT devices with such
systems. The article discusses the main standards and technologies can provide more effective and
regulatory bodies influencing the development of IoT environmentally friendly fire extinguishing.
technologies in this sphere, we touched upon the issues of
regulation and standardization of IoT technologies for fire For the successful development and implementation of
safety and considered examples of their application in IoT technologies in fire safety, continued cooperation
various sectors. between scientific institutions, manufacturers, regulatory
bodies, and experts in the field of fire safety is required.
In the future, IoT technologies for fire safety can continue This will allow taking into account all aspects and needs
to develop and provide even more innovative solutions. of the industry, developing standards and protocols to
Possible directions of development include: ensure the reliability and safety of IoT devices and
systems.
• More accurate and reliable sensors: Improved
smoke and heat sensors can detect fires at earlier IoT technologies for fire safety play an important role in
stages, allowing timely response to fire hazards the modern world and will continue to evolve to provide
and reducing the risk of property damage and better protection from fires and save human lives. The
injuries. implementation of these technologies in various sectors
• Integration with other technologies: IoT devices and at different facilities will contribute to improving the
for fire safety can integrate with other systems, overall level of fire safety and reducing the risk of fires
such as smart lighting, access control, and video and their consequences.
surveillance, creating a unified environment of a
smart building or city. The work was carried out at the Research Institute of
• Use of artificial intelligence: AI algorithms can Mathematics and Mechanics of the Kazakh National
analyze data from IoT devices for fire safety and University named after al-Farabi.
predict potential fire hazards, allowing for REFERENCES
preventive measures and preventing the
[1] https://store.google.com/product/nest_protect_2nd_gen
occurrence of fires. [2] https://eandt.theiet.org/content/articles/2014/05/teardown-nest-
• Improved notification and communication protect/
systems: Developing more intuitive and [3] https://www.halosmartlabs.com/products/halo-smart-smoke-co-
effective notification systems can simplify the alarm
process of evacuating people in case of a fire and [4] https://products.security.gallagher.com/security/medias/HALO-
Smart-Sensor-Integration-
provide more prompt response from emergency Flyer?context=bWFzdGVyfGRvY3VtZW50c3wxMzAzOTc3fG
services. FwcGxpY2F0aW9uL3BkZnxoOGYvaGYzLzEwODk5NzA4OT
Y4OTkwL0hBTE8gU21hcnQgU2Vuc29yIEludGVncmF0aW9u
• Increasing accessibility: Reducing the cost and IEZseWVyfDk3NWU5NGVmZWMzMjg0OWExYTM0MDkx
simplifying the installation and maintenance of MmU4NjgwNzIzYjE4NzVhNDk4MjEyZmNjNWQ1ZTFkYW
IoT devices for fire safety can make them more Y5M2M5MWVhYjE
accessible for mass use in various sectors and at [5] https://www.kidde.com/home-safety/en/us/products/fire-
safety/remotelync-monitor
different facilities. [6] https://www.kidde.com/home-safety/en/us/products/home-
• Development of standards and regulation: automation/remotelync-monitor/
Continuous updating of standards and regulation [7] https://onelink.firstalert.com/safeandsound
in the field of IoT technologies for fire safety [8] https://www.firstalertstore.com/store/images/products/large_ima
ges/1039102-onelink-safe-and-sound-smoke-and-carbon-
will help ensure a high level of protection and monoxide-alarm-with-amazon-alexa-4.jpg
- 354 -
[9] Deb, S., & Chatterjee, A. (2020). IoT-based smart emergency
management system. International Journal of Engineering and
Advanced Technology (IJEAT), 9(3), 3589-3593.
[10] Mazakov T.Zh., Kisala P., Jomartova Sh. A., Ziyatbekova G. Z.,
Karymsakova N.T. (2020). Mathematical modeling forecasting of
consequences of damage breakthrough. News of the national
academy of sciences of the Republic of Kazakhstan. Series of
Geology and Technical Sciences, 5(443), 116-124.
[11] https://getbirdi.com/
[12] Mazakov T.Zh., Jomartova S., Mukhaev D., Mazakova A.,
Tolegen G. (2021). Intelligent System for Assessing the Socio-
economic Situation in the Region. Wojtkiewicz K., Treur J.,
Pimenidis E., Maleszka M. (eds) Advances in Computational
Collective Intelligence. ICCCI. Communications in Computer
and Information Science. Springer, Cham, 1463, 437-447.
doi.org/10.1007 /978-3-030-88113-9_35
[13] https://www.electronichouse.com/smart-home/birdi-builds-
better-smoke-alarm-home-automation/
[14] https://www.adt.com/smart-home
[15] https://www.adt.co.uk/themes/ee/site/default/asset/img/common/
smart-home-slider-new.jpg
[16] Stojmenovic, I., & Wen, S. (2014). The Fog Computing
Paradigm: Scenarios and Security Issues. Federated Conference
on Computer Science and Information Systems, 1-8.
[17] T.Zh. Mazakov, Sh.A. Jomartova, G.Z. Ziyatbekova, T.S.
Shormanov, B.S. Amirkhanov, P. Kisala. The image processing
algorithms for biometric identification by fingerprints // News of
the National Academy of Sciences of the Republic of Kazakhstan.
Series of Geology and Technical Sciences, 2020. – Vol. 1, - No
439. – P. 14-22. https://doi.org/10.32014/2020.2518-170X.2
[18] https://www.plumis.co.uk/automist-smartscan
[19] https://plumis.co.uk/sites/default/files/2023-
02/Smartscan%20Hydra%20Handbook%20v3.1.pdf
[20] https://www.vikinggroupinc.com/products/viking-qr
[21] https://www.nfpa.org/Codes-and-Standards
- 355 -
Implementation of Real-time Water Quality
Monitoring for Energy Consumption
Optimization Utilizing IoT Sensors in a Smart
Fish Farm
Hunseo Lee 1, Eunsu Jung 1, Juhyeon Youk 1, June-young Park 2, Hyun-il Kang 1 and Young Park 1 *
1
Hanbat National University, Republic of Korea
2
CNC Aid Co., Ltd., Republic of Korea
Email: [email protected]
Abstract—This research paper presents the implementation consumption, ensuring that energy is utilized efficiently and
of real-time water quality monitoring in a smart fish farm, only when necessary.
focusing on energy consumption optimization through the
utilization of IoT sensors. The study aims to enhance the
efficiency and sustainability of fish farming practices by
continuously monitoring water quality parameters and
integrating renewable energy sources. The IoT-based system
provides real-time data on key water quality parameters such as
temperature, dissolved oxygen, pH, and salinity, enabling
prompt detection of any deviations from optimal conditions. By
automating the operation of water wheels based on real-time
Fig. 1. floating solar panels and ground-mounted solar panels
data, the system optimizes energy consumption while installed in a smart fish farm.
maintaining optimal water quality. The findings demonstrate
the effectiveness of the implemented system in reducing energy II. EXPLEMENTAL METHODS
consumption and ensuring optimal water quality for sustainable
fish farming. The experiment was conducted in a saltwater
aquaculture facility designed for the cultivation of whiteleg
Keywords—component, formatting, style, styling, insert (key shrimp (Litopenaeus vannamei) in Gomso, Korea. The
words) facility consisted of four saltwater ponds, each with
dimensions of 19834.71m². This paper presents the
I. INTRODUCTION installation of solar panels, processed with anodic aluminum,
In recent years, the integration of innovative with a width, height, and depth of 2,163 mm, 1,030 mm, and
technologies has revolutionized various industries, 35 mm, respectively, in a fish farm for monitoring
including aquaculture. The need for sustainable practices in environmental factors in a smart fish farm. The installation
fish farming has led to the development of smart fish farms capacity is a total of 45 kW, and the float, structure, module,
that utilize IoT sensors and renewable energy sources. and inverter are installed in order. After installation, the
Efficient management of water quality is crucial for the energy consumption in the demonstration complex is
success of fish farming operations, as it directly impacts the configured using a EMS, and wind power and ground-based
health and productivity of aquatic organisms. Real-time solar panels are installed to monitor them, as shown in Fig.
monitoring of water quality parameters enables proactive 2.
management and timely response to potential issues, The environmental monitoring equipment was analyzed
contributing to the overall sustainability of the fish farm.
This research paper aims to address the challenges of energy to evaluate the water quality safety of the operation of float
consumption optimization and real-time water quality ing solar panels installed in the fish farm. A variety of fact
monitoring in a smart fish farm through the implementation ors, such as the material characteristics of solar panels, ext
of IoT sensors. The IoT-based system allows for continuous
monitoring of key water quality parameters, including ernal temperature, humidity, harmful environment, and cor
temperature, dissolved oxygen (DO), pH, and salinity. By rosion due to salt, need to be analyzed to detect harmful fa
collecting and analyzing real-time data, the system provides ctors for water quality, and it needs to be periodically moni
insights into the current water quality conditions, enabling
prompt detection of any deviations from optimal ranges. tored to create a suitable growth environment for white shri
Furthermore, the integration of renewable energy sources, mp. We plan to report the results of the installation of float
such as solar and wind power, enhances the sustainability of ing solar panels in the fish farm through the analysis of the
the fish farm by reducing reliance on traditional energy
IoT-based monitoring system in the future.
sources. The system incorporates water wheels that are
powered by renewable energy, providing a more
environmentally friendly solution for water circulation and
aeration. By automating the operation of water wheels based
on real-time water quality data, the system optimizes energy
- 356 -
Fig. 2. The configuration diagram of the EMS applied to the smart fish
farm.
ACKNOWLEDGMENT
REFERENCES
- 357 -
Implementation of IoT-based smart elevator
remote regeneration control monitoring system
platform
Hyeong Ju Kwon, Hag-wone Kim and Sang-min Lee*
Korea National University of Transportation, Republic of Korea
Email: [email protected]
- 358 -
converts it into CoAP, MQTT, and HTTP message formats, III. SUMMARY
and the server stores and processes the collected information In this study, NB-IoT-based smart elevator remote
for remote monitoring service. regeneration control monitoring that enables low-power long-
distance data communication and systematic analysis by
collecting various sensor information in order to cope with
elevator emergency field response and realistic maintenance
situations closely related to life safety A method for
implementing a control system platform was proposed, and it
is expected that active research will be conducted on the
implementation of predictive maintenance management in
conjunction with an artificial intelligence system when
configuring a network in the future.
REFERENCES
[1] Lee Sang-min, “ICT Convergence and Connected Smart Elevator
Trend Opening the Future,” Weekly Technology Trend, 2022.
[2] Kim, B., Song, K., & Kim, S., “A Review of Data Planning
Fig.3. Smart elevator remote regeneration control monitoring system Methodologies”, ACM Transactions on Database System, Vol. 2, no.
structure 3, March 17, 1995, pp. 23-40.
[3] Korea Broadcasting and Radio Agency, “Research on a super-aging
The data on information is collected at each selected period, society support plan using narrowband IoT technology
and the data collected in the current period is compared with Gu”, 2018.
the data collected in the previous period, and only data with [4] Park Ok-sun, Hwang Hyun-yong, Lee Chang-hee, Shin Jae-seung, “5G
changed values is identified. When a data request is made Massive loT Technology and Standardization Trend,” Korea
from the browser, the data is retrieved from the web server Electronics and Telecommunications Research Institute, 2016.
into the database, and then the data is passed to the browser. [5] Seo Seok, Shin Eun-jung, Jo Kwon-do, “Narrowband Internet of
The NB-IoT controller installed in the elevator continuously Things Technology Trend”, Korea Electronics and Telecommunicati
accumulates data into the database and updates it with real- ons Research Institute, 2016
time data. The web browser is also designed to send real-time
data to the screen by continuously importing data.
- 359 -
An ontological model for automating the
process of preparing electronic courses in the
field of information and communication
technologies.
N.ZH. SABITOVA1, B.Sh. RAZAKHOVA2, S.O. GNATYUK2.
1
Doctoral student Eurasian International University named after. L. N. Gumilev,
Kazakhstan, Astana.
2
t.s.d, associate pofessor L. N. Gumilyov Eurasian National University,
Kazakhstan, Astana.
3
Foreign consultant, t.s.d., professor National Aviational University,
Ukraina, Kiev.
E-почта: [email protected], [email protected], [email protected]
Annotation. Intelligent information technologies disciplines related to the field of information and
(IT) influence the processes in the economic, scientific, communication technologies (ICT). Today, visual-
technical, humanitarian, educational and other fields of figurative components of thinking occupy a
activity. Informatization or digitalization of the world society predominant place in the worldview of modern
is focused on building an IT -oriented society. Knowledge
engineering technologies are becoming significant.
schoolchildren who have many gadgets, starting with
Ontological engineering can also be considered as a special smartphones and ending with high-performance PCs or
case of knowledge engineering. laptops. Which, accordingly, encourages teachers to
Keywords: intelligent technologies, subject area, present educational material in a visual expressive
ontology. form, involving a diverse color palette, animation
elements, dynamic illustrations, so characteristic of
Modern IT uses Knowledge Management. We many modern EC and/or EC.
can say that success in this direction is determined by The study of the ICT course should introduce
the level of efficiency of computer systems [1-5]. As students to the methods of the most effective use of
shown in [3], scientific research is being intensified on informatization tools in everyday practice. The
the creation of information systems based on examples given in the process of teaching students
knowledge bases, the development of methods for the should clearly demonstrate that ICT tools are able to
ontological analysis of subject areas to extract aspects increase efficiency in the study of most disciplines that
of the application of ontologies from them. The latter is are taught within the framework of secondary schools
of interest, for example, in the context of the and further colleges or universities.
development of electronic training courses (EC) and Considering the above, we can state that the
electronic textbooks (EC). relevance of new research in this direction is justified
At the current stage of IT development, it has by the need to develop effective methods of
become possible to bring the existing theoretical architectural and structural organization and synthesis
foundations of artificial intelligence systems closer to of relevant content for EC and EC in the field of ICT,
real implementation, while taking into account the especially for the contingent of secondary school
latest achievements of general engineering practice and students. Such methods, in our opinion, enable all
subsequent promising trends in the development of interested persons, starting with teachers in schools and
computer technology in the preparation of relevant colleges and ending with commercial structures
content of electronic courses in the field of ICT. offering their EC and/or EC on the educational services
It should be noted that computerization of the market, not only to design relevant EC and/or EC with
educational process already at the level of secondary the processing of subject knowledge, but also to
school or even primary classes, according to many digitalize the process of their synthesis based on
authors [1-3], is a large-scale innovation in the field of processing colossal volumes of textual information of
education. It is impossible to imagine teaching in a subject disciplines inherent in the content of the ICT
modern school if a teacher does not use a variety of field.
computer technologies and the Internet in his As a result of the research, the following main
educational work. This is especially true for disciplines results were obtained:
where content is updated rapidly, in particular,
- 360 -
a methodology for designing electronic
courses (EC) and/or electronic textbooks (EC) in the
field of ICT based on the application of an ontological
model is proposed;
It is shown that the ontological model
proposed in the article is intended primarily for the
implementation of information technology for
automated processing of ontologies of ICT subject
areas, which will simplify procedures related to the
implementation of EC and/or EC, based on relevant
content in the field of ICS, corresponding to the current
state of this subject area with the possibility of updating
this content as necessary.
References.
1. How E-learning Works by Lee Ann
Obringer. – Available at
http://communication.howstuffworks.com/elearning.ht
m.
2. E-learning 2.0 by Stephen Downes, National
Research Council of Canada October 17, 2005. –
Available at
http://www.elearnmag.org/subpage.cfm?article=29-
1§ion=articles
3. Tikhonov, U., Lakhno, V., Skliarenko, E.,
Stepanenko, O., Dvirnyi, K. Development of on
Tological Approach in E-learning When Studying
Information Technologies (2016) Eastern-European
Journal of Enterprise Technologies, 5 (2), pp. 13-20.
4. Sampson, D. G., Lytras, M. D., Wagner, G.,
& Diaz, P. (2004). Ontologies and the Semantic Web
for E-learning. Educational Technology & Society, 7
(4), 26-28. – Available at
http://www.miltiadislytras.net/8.pdf.
5. Ontologies: Structure E-Learning from
Information-based to Knowledge-based. Conference
Information. – Available at
http://www.editlib.org/p/15070.
- 361 -
A Study of Deep Learning Model for Color
Measuring Process in Industrial Facilities
Kyung Suk Kim 1, Sanghun Lee 2, Ki-Sub Kim 3*, and Jeong Won Kang 1,4*
4
Department of SMART Railway System, Korea National University of Transportation, Republic of Korea
2
Central Research Institute, KCC, Republic of Korea
3
School of Chemical and Energy Engineering, Korea National University of Transportation, Republic of Korea
4
Department of Transportation System Engineering, Korea National University of Transportation, Republic of Korea
ACKNOWLEDGMENT
This work was also supported by the Korea Agency for
Infrastructure Technology Advancement (KAIA) grant
funded by the Ministry of Land, Infrastructure and Transport
(Grant No. 22QPWO-C158106-04).
- 362 -
Research and development of an automated installation based on modern
technology to determine the degree of ambient air pollution
In commercial and industrial spaces where people work, there are strict
requirements for air quality. It is important to control harmful substances released
during technological processes. Ozone poses a high danger to the human body-the
alarm clock helps to control the amount of gas. Specially designed O3 sensors reliably
protect against harmful evaporation.
For the purpose of monitoring air quality in various premises of commercial and
industrial use, as well as for signaling about the excess of gas content above the
established limit parameters, automated air pollution devices are being developed.
Unique physical properties make it possible to use ozone for disinfection of
premises, in gas-producing, chemical, food enterprises, utilities.
The ozone detector is a wide functional equipment. The device not only monitors
the amount of harmful impurities, but also analyzes their composition.
The modern market offers signalmen for detecting hazardous gases in two
variations-stationary and portable models. A stationary ozone sensor in the Air provides
constant monitoring of the content of harmful substances. In rooms where periodic
inspection is required, portable devices are often used.
For ease of use, modern sensors are equipped with digital displays, a light and
sound indicator system, a durable case with moisture protection and interfaces for
connecting to electronic control and control systems.
The device we offer offers a cost-effective air quality control solution.
Environmental organizations have identified several main pollutants: ozone, airborne
particles, carbon monoxide, sulfur dioxide, and nitrogen oxide. The device can detect
all pollutants except sulfur dioxide. In addition, the device has a household gas
- 363 -
determinant that allows you to warn about a gas leak or the presence of combustible
gases. Also included is the temperature and humidity sensor.
This device consists of the following automation devices: Arduino UNO series
microcontrollers, temperature and humidity sensors, as well as gas sensors of various
series.
The wiring diagram is a general scheme that shows the operation of the
automated installation of harmful gases. If necessary (for any reason), most of the
digital and analog ports to which the sensors are connected can be changed; to do this,
you need to make changes to the provided program code.
To collect data on the concentration of particles in the air, we used dust sensors.
Each sensor uses an infrared LED and a photodiode to measure the concentration
of particles scattered in the air. The internal circuit converts the output signal of the
photodiode into digital signals. Usually there is a +5V signal at the sensor output, and
the sensor sends a low-voltage pulse when detecting particles. The period of time during
which the signal is low at the output, or" low pulse occupation percentile " (the
percentage of time during which the voltage level is low at the photodiode output) is
proportional to the concentration of particles in the air.
There is a wiring diagram for gas sensors and a stove plate of a humidity sensor
with temperature.
We used Surface sensors that can detect ozone and nitrogen dioxide in the air.
Sensors use an internal resistor in the sensor element.. The resistor resistance
should be between 10-20 kΩ.
A temperature and humidity sensor should be used, as temperature and humidity
control plays an important role in determining the concentration of gases. High
humidity and temperature have a significant impact on the measurement accuracy.
Therefore, it is very important to monitor these changing parameters. Temperature and
humidity can be controlled with one sensor at a time. According to the figure above,
the left pin is connected to the power, the middle pin is connected to the signal output,
and the right pin is connected to the ground. The signal from this sensor goes to the
Arduino digital port. In our code, it is assumed that the temperature signal will go to
the digital port 2. If necessary, it can be converted to another digital port; depending on
the selected port, appropriate adjustments must be made to the program code.
A code for obtaining source data from the device is fixed. This code prints sensor
resistance values, operating percentage of low pulse signals, and temperature and
humidity readings through a serial monitor on the computer. Also, the source data can
be viewed on the LCD display.
For the code to work properly, you must first download the libraries for the LCD
and temperature and humidity sensors.
- 364 -
Data mining of leading indicators
Author one: Laura Alimbayeva1, Author two: Kuralay Belgibayeva2
1
Author One’s Affiliation: Al-Farabi Kazakh National University, Kazakhstan
2
Author Two’s Affiliation: Kazakh University of Technology and Business, Kazakhstan
Email: [email protected]
Abstract — Modern time is characterized by the The impulse response functions pointed to the positive
accumulation of a large amount of data. To extract the impact of business activity sub-indices. Decompositions of
knowledge from these data necessary for making managerial variances revealed the timing of future changes in the turning
decisions, automatic data analysis, called Data mining, will points of business cycle phases in the short run.
provide indispensable assistance. Research in the field of
application of Data Mining technologies is the most in demand, Keywords— Data mining, leading indicators, business activity,
has a huge potential in any field of activity and a high level of model, predictive property.
practical significance.
INTRODUCTION
Such valuable and “raw, hidden” data include leading
Leading indicators first appeared in the United States
indicators. They characterize the state and dynamics of business
activity in the country's economy, as well as in the context of
around the beginning of the 20th century due to more frequent
sectors and branches of the economy. These indicators serve as crises. Then there was a need to indicate, assess the state and
an important guide: 1) for central banks when making decisions dynamics of business activity at the macro level within the
in the course of conducting monetary policy; 2) for participants economic cycle.
in the global and local markets when receiving operational Leading indicators include business activity sub-indices
information about the state of the country's economy; 3) for (BAS) and a composite leading indicator (CLI). Their main
interested international and national investors.
property is predictive, early detection signals, ahead of
The value of leading indicators lies in their main property - expectations about future and prospective changes in the
predictive, ahead of expectations about future and prospective business cycle before these changes occur in reality.
changes in the business cycle before these changes occur in The differences between BAS and CLI are as follows:
reality. BAS is calculated for four sectors (manufacturing, services,
construction and mining industry) and a value of more than 50
The novelty of this study is both the application of Data
points indicates an increase in sector activity compared to the
Mining technologies to leading indicators of the business cycle,
previous month, and vice versa, a value of less than 50 points
and the study of leading indicators - sub-indices of business
activity and a composite leading indicator in Kazakhstan.
indicates a slowdown in the economic activity. Whereas CLI
estimates are made for the real sector of the economy on a
In order to extract from the official information a “hidden” quarterly basis and the degree of activation is judged by the
but objective causal relationship between variables, the authors value: more or less than 100 points, respectively.
substantiated and applied for the first time vector error The purpose of this study is to identify and evaluate the
correction models (Vector Error Correction Model, VECM) to
relationship between leading indicators, to provide a forecast
the leading indicators of Kazakhstan. Sequential data checks for
of trends in the short term.
seasonality, outliers, stationarity, and cointegration were
applied. The scientific hypotheses of the present study are as
follows:
The purpose of this study is to identify and quantify the
hidden (previously not studied) relationships between the time 1. Hypothesis one: there is a cointegration relationship
series of business activity sub-indices of the four sectors and the between leading indicators.
composite leading indicator of the real sector of the economy, to
provide a forecast of their trends in the short term.
2. Hypothesis two: the predictive, prognostic property of
leading indicators of the business cycle is manifested in the
The objects of study are business activity sub-indices of four Kazakh economy.
sectors and a composite leading indicator of the real sector of The objects of study are business activity sub-indices
the economy. Study period: September 2016 to April 2023. (BAS) of four sectors of the economy and a composite leading
Number of observations is 80.
indicator (CLI) of the real sector of the economy. Study period:
Amazing results have been obtained. The developed
September 2016 to April 2023. The number of observations is
empirical VECM models, the calculated functions of impulse 80.
responses and decomposition of variances confirmed the Methods and materials: The following methods of
predictive property of business activity sub-indices for the cognition were used in the study: systematization and
Kazakhstan economy. In particular, the manufacturing generalization, dynamics series indicators, error correction
business activity sub-index predicts a change in the construction vector model (VECM), impulse responses, dispersion
business activity sub-index, and the construction business
decomposition.
activity sub-index predicts a change in the mining business
activity sub-index. The quality of the VECM models satisfies The information base was the official statistics of the
statistical tests, which characterizes the accuracy and reliability National Bank of Kazakhstan. The information is processed
of the results. and presented in the statistical package EViews.
- 365 -
For comparability of BAS and CLI indicators over time analysis of the data showed, in our study, not all time series
intervals, we recalculated data on CLI from quarterly to turned out to be stationary and, moreover, they do not move
monthly in EViews. too far from each other in the processes of growth and decline
in economic activity. To avoid false regression, we tried to
1. Literature review apply empirical VECM models for leading indicators, based
Leading indicators first appeared in the United States on the recommendations and experience of other scientists.
around the 1920s and 1930s. In connection with the increasing 2. Analysis of leading indicators
crises, it became necessary to indicate business activity at the
macro level in order to show, assess the state and dynamics Data visualization clearly demonstrates cyclical
within the economic cycle. The role, meaning, economic fluctuations for the period under review (Fig. 1).
interpretation of leading indicators are described in the works Fig. 1. Dynamics of BAS in the sectors of manufacturing, services,
of scientists: Carol M.Kopp. (2022), Nathan Reiff. (2023) construction and mining industry, as well as CLI
[1,2].
60 102
Many macroeconomic indicators are characterized by 55
non-stationarity, in which the values (numbers) differ greatly 101
50
from the average level and move away from it for an unknown 45 100
time. To stop non-stationary series, the procedure of taking the 40
difference as the difference of each subsequent and each 35
99
previous series members is applied. A linear combination of
30 98
several non-stationary integrated series is called series
January
January
January
January
January
January
January
September
May
September
May
September
May
September
May
September
May
September
May
September
cointegration.
Cointegration and error correction models were first
proposed by scientists Engle, R. F., Granger, C. W. J. (1987) 2016 2017 2018 2019 2020 2021 2022 2023
based on an empirical study of the non-stationarity property of
several economic time series, combined together and BAS in production BAS in services
BAS in construction BAS in mining industry
repeating movements one after another [3]. According to their CLI (right scale)
beliefs, the essence of the study lies in the fact that the
parameters of the cointegration vector are first estimated, Source: authors' calculations
which are then used in the VECM error correction model. This Note: CLI data for April 2023 is based on business expectations
method establishes a causal relationship between the studied
variables.
Depending on the amplitude of fluctuations, there is a
Following the ideas of Engle, R. F., Granger, C. W. J., change in phase shifts of economic cycles, successively
other scientists used the VECM model for cointegrated time alternating one after another with a new repetition. Economic
series: Hizir Sofyan, Eva Maulia, and Miftahuddin (2017, cycles of recovery (values above 50 or 100) are replaced over
2018) [4,5]; Bruce E. Hansen (2018) [6]; D. John Cochrane, time by recessive ones, which after a certain period of time are
John Cochrane (2006) [7,8]; Nosko V.P. (2021) [9]; Rudra P. replaced by depression ones (values less than 50 or 100).
Pradhan, Girijasankar Mallik, Tapan P. Bagchi (2018) [10];
Rudra P. Pradhana, Neville R. Normanb, Yuosre Badirc, Bele Since the beginning of the pandemic period in April 2020,
Samadhana (2013) [11]; Belinga Thierrya, Zhou Junb, Kazakhstan has experienced negative deteriorations in the
Doumbe Doumbe Ericc, Gahe Zimy Samuel Yannickd, Koffi BAS in four sectors of the economy. Thus, in the services and
Yao Stéphane Landry (2016) [12]; Nermin Yasar (2021) [13]; construction sectors, a decline was noted due to the
Chao Wang, Yul-Seong Kim, Chi Yeol Kim (2021) [14]; deterioration of all components (delivery times, employment
Farhad Taghizadeh-Hesary, Naoyuki Yoshino, Lisa Fukuda, levels, new orders and business activity). In manufacturing
Ehsan Rasoulinezhad (2021) [15]; Chaido Dritsaki (2013) [16] and mining industry, the deterioration was due to lower
and others. The followers applied the VECM model to other employment, new products and new orders.
objects of study, to other variables. It should be noted that only the manufacturing sector is
Thus, Hizir Sofyan, Eva Maulia, and Miftahuddin used dominated by the number of positive variables with BAS
VECM to study the relationship between tax revenues and values over 50, which determine the intensification of
inflation in the large administrative center of Indonesia - business activity: 75.0% (60 out of 80).
Banda Aceh for January 2013 to December 2015 [4]. In the service sector the trends are approximately the same
They explain the choice of this model of econometric as in the manufacturing sector, with some shifts in the months,
analysis by the fact that the stochastic trend in time series replacing the upward and downward economic phases. The
indicates the presence of long-term and short-term trends. The day of fall is evidenced by the minimum value of the BAS
VECM model is applicable to cointegrated rather than (34.9 in April 2020) in the service sector due to the
stationary data and is able to determine the short-term deterioration of all its components: delivery times,
behavior of a variable in the long run “due to a permanent employment levels, new orders. Having dropped to a
shock”. And further they state: “Cointegration is a long-term minimum, the BAS turns up, predicting some recovery in
relationship between variables that, although individually not business activity.
stationary, but a linear combination between these variables In the construction sector, the peak of growth characterizes
can be stationary” [3; 4, p.2]. the maximum value of the BAS (57.9) in September 2019,
In foreign and domestic literature, VECM models for associated with an increase in new orders and an increase in
leading indicators have not been previously used. As the employment. Having reached a maximum of growth, the BAS
- 366 -
turns down, heralding a reversal of the business cycle to the (Kurtosis) for all these series are not equal to 3. For the CLI
downside with some fluctuations in individual months. series, the kurtosis coefficient of the flat-topped distribution is
less than 3. For all BAS series, the kurtosis coefficients for the
Moderate exposure to cyclical changes is set for the sectors: peaked distribution exceed 3. The Jarque-Bera test confirms
construction and mining industry. The prevailing number of that all the considered series do not have a normal distribution,
BAS with low, negative values of business activity, less than because p-values do not exceed a significance level of 0.05.
50, affected: in mining industry 66.3% (53 out of 80), in These facts indicate that all series contain outliers (Table 6).
construction 57.5% (46 out of 80). At the same time, in mining
industry, the last economic phase of the decline began earlier For the analyzed period there are four outliers in each
than in other sectors: from June 2019 to April 2023. The main series (Table 7).
reasons for the decline are a decrease in the production of
crude oil, coal, natural gas, two lockdowns in March and May Stationarity check. When analyzing time series, it is very
2020, repair work at the Kashagan field, depreciation of the important to determine whether they are stationary. Since the
national currency against the US dollar and the Russian ruble, stationarity of a series can greatly affect its behavior and
price volatility in world commodity markets, aggravation of properties.
the geopolitical tension. Thus, the series of CLI and BAS in the services are non-
stationary, and BAS in manufacturing, construction and
In construction a decline in business activity was observed
from March 2020 to January 2023, caused by the onset of the mining industry are stationary (Table 8).
pandemic period, the termination of state programs for Checking for cointegration. Cointegration occurs when
preferential mortgage lending, and an increase in the threshold time series can be related by some long-term relationship,
for the adequacy of using part of pension savings to purchase from which these time series can deviate in the short term, but
housing at “Otbasy Bank” JSC. to which they must return in the long term.
3. Empirical models The concept of cointegration is applicable only to series
Before starting to build empirical models, it is important with a unit root. The idea of cointegration is that two or more
to determine the structure of the time series data: are there variables can change synchronously so that some linear
outliers, trends, seasonal components, etc. combination of them is a stationary process [17].
Seasonality check. Seasonality is a characteristic of a time In the study of time series, it was found that they are
series in which data undergo regular and predictable changes cointegrated. Therefore, further analysis is based on the vector
that repeat every calendar year. Any predictable fluctuations error correction model (Vector Error Correction Model,
or patterns that repeat or recur within the same year are called VECM).
seasonal. When building a VECM model, it is necessary that all
Seasonal effects differ from cyclical effects because variables be stationary at the level of first differences. Taking
seasonal cycles occur within one calendar year, while cyclical into account that the series of CLI and BAS in services are
effects can cover periods shorter than or longer than one non-stationary, we check them for stationarity at the level of
calendar year. first differences. The results of the Augmented Dickey-Fuller
test showed that the series of CLI and BAS in services are
Many data are affected by the time of year, and seasonal stationary at the level of first differences (Table 9), so VECM
adjustment means that more accurate relative comparisons can models can be built.
be made between different time periods. Seasonally adjusted
data smooths out periodic fluctuations in statistics or The choice of VECM model parameters was based on the
movements in supply and demand associated with the change best options for statistical tests, as well as the most optimal
of seasons. options for lags. At the same time, the initial data were cleared
of seasonality and outliers. The result is the following
All the series we studied have seasonality, which is proved dependency models:
by significant p-values at a significance level of 0.05 (Tables
1, 2, 3, 4 and 5). 1) BAS in manufacturing from BAS in services;
Outlier check. An outlier is a value or certain data that is 2) BAS in construction from BAS in production;
very different from the main dataset. 3) BAS in mining industry from BAS in construction.
In the case of outliers, a twofold choice arises: to keep or 3.1 Model of dependence of BAS in manufacturing on
exclude them from the entire data set. To do this, it is BAS in services
necessary to analyze the data with and without outliers, and as
a result, compare the results obtained. Let's use the Granger test to test the causal relationship
between the considered series. First you need to choose the
On the one hand, for a data set with outliers, the use of optimal lag.
classical methods of statistical analysis leads to incorrect
results. On the other hand, if the data set is not sufficient, then The optimal amount of lag is determined using the
eliminating outliers can have a significant impact on the result. smallest value of the criterion: the smaller the criterion, the
fewer errors and the higher the quality. Therefore, we choose
Therefore, it is important for us to evaluate and provide lag 2 (Table 10).
justification for keeping or removing outliers from the dataset.
The result of the Granger test showed that, at a significance
All the considered series do not have a normal distribution. level of 0.05, a series of BAS in services is the cause of a series
Skewness coefficients are negative, hence the distributions of of BAS in production according to Granger or in other words:
these series have long left tails. The kurtosis coefficients
- 367 -
BAS in services predicts a change in BAS in production There is no heteroscedasticity of residuals in the VECM
(Table 11). model (Table 19), since the probability value according to F-
statistics and Chi-Square-statistics is above the significance
Test statistics (Trace and Max-eigenvalue) indicate 2 level of 0.05 (Table 21).
cointegrating equations at a significance level of 0.05. Thus,
the null hypothesis of the absence of cointegration is rejected Figure 6 shows the function of impulse responses of BAS
in favor of the alternative one. Therefore, the series of BAS in in construction to changes in BAS in production. This feature
manufacturing and BAS in services are cointegrated (Table has a positive effect. If the change in BAS in production were
12). unexpected by 1%, then BAS in construction would change as
follows on average, all other things being equal: from 1 to 2
In the VECM model (Table 13), the residuals are normally months - an increase of 0.89%, from 2 to 3 months - a
distributed because the probability value (0.17) is above the slowdown from 0.89% to 0.65%, from 3 to 4 months - increase
0.05 significance level (Fig. 2). from 0.65% to 0.77%, from 4 to 5 months - slowdown from
The probability values for F-statistics and Chi-Square- 0.77% to 0.71%, from 5 to 6 months - an increase from 0.71%
statistics are above the significance level of 0.05 (Table 14), to 0.74%, from 6 to 7 months - a slowdown from 0.74% to
so there is no serial correlation of residuals in the VECM 0.73% and from 8 months - level stabilization (Fig.6).
model (Table 13).
Figure 7 shows the decomposition of the variance, which
There is no heteroscedasticity of residuals in the VECM shows how much the series of SDA in construction is
model (Table 13), since the probability value according to F- explained by its previous values and the values of the
statistics and Chi-Square-statistics is above the significance influence of SDA in production, respectively. If from the 2nd
level of 0.05 (Table 15). month the share of the influence of SDA in production will be
16.50%, by the 8th month it will increase to 49.09%, then by
In the interests of the economic substantiation of the the 10th month it will increase to 54.90%(Fig.7).
parameters of the VECM models, we use the impulse response
function and the decomposition of the variance. 3.3 Model of dependence of BAS in mining industry on
BAS in construction
Figure 3 shows the impulse response function of BAS in
manufacturing to changes in BAS in the service sector. If the The optimal lag is a lag equal to 1, therefore, we will
change in BAS in services were unexpected by 1%, then BAS choose this lag for our model (Table 22).
in manufacturing would change as follows on average, all The result of the Granger test showed that at a significance
other things being equal: from 1 to 2 months - an increase of level of 0.05, the BAS series in construction is the cause of the
0.49%, from 2 to 3 months - a slowdown from 0.49% to 0.44%, Granger BAS series in the mining industry or in another way:
from 3 to 8 months - an increase from 0.44% to 0.57%, and BAS in construction predicts the change in BAS in the mining
from 8 months - level stabilization (fig.3). industry (Table 23).
Figure 4 shows a decomposition of the variance that shows Test statistics (Trace and Max-eigenvalue) indicate 2
how much the BAS in manufacturing is explained by its cointegrating equations at a significance level of 0.05. In this
previous values and the values of the impact of BAS in connection, the null hypothesis about the absence of
services, respectively. If from the 2nd month the share of the cointegration is rejected in favor of the alternative one.
influence of the BAS in services will be 8.43%, then by the Therefore, the series of BAS in the mining industry and BAS
10th month it will increase to 45.21% (fig.4). in construction are cointegrated (Table 24).
3.2 Model of dependence of BAS in construction on BAS In the VECM model (Table 25), the residuals are normally
in production distributed because the probability value (0.59) is above the
The lag equal to 2 is optimal for our model (Table 16). 0.05 significance level (Fig. 8).
The Granger test showed that, at a significance level of The probability values for F-statistics and Chi-Square-
0.05, the BAS in manufacturing is the cause of the BAS in statistics are above the significance level of 0.05 (Table 26),
construction according to Granger, or in another way: BAS in so there is no serial correlation of residuals in the VECM
manufacturing predicts the change in BAS in construction model (Table 25).
(Table 17). There is no heteroscedasticity of residuals in the VECM
The Trace test statistic indicates 2 cointegrating equations model (Table 25), since the probability value according to F-
at a significance level of 0.05. Thus, the null hypothesis of the statistics and Chi-Square-statistics is above the significance
absence of cointegration is rejected in favor of the alternative level of 0.05 (Table 27).
one. Therefore, the series of BAS in manufacturing and BAS Figure 9 shows the function of impulse responses of the
in services are cointegrated (Table 18). BAS in the mining industry to the change in the BAS in
In the VECM model (Table 19) the residuals are normally construction. This function has a positive effect. If a 1%
distributed because the probability value (0.44) is above the change in the BAS in construction were unexpected by 1%,
0.05 significance level (Fig. 5). then the BAS in the mining industry would change as follows
on average, all other things being equal: months 1 to 2, an
The probability values for F-statistics and Chi-Square- increase of 0.72%; months 2 to 3, an increase from 0.72% to
statistics are above the significance level of 0.05 (Table 20), 0.92%, from 3 to 4 months - an increase from 0.92% to 0.98%,
so there is no serial correlation of residuals in the VECM from 4 to 5 months - an increase from 0.98% to 1% and from
model (Table 19). 5 months - level stabilization (Fig.9).
- 368 -
Figure 10 shows the decomposition of the variance, which variances revealed the timing of future changes in the turning
shows how much the series of BAS in the mining industry is points of business cycle phases in the short run.
explained by its previous values and the values of the
influence of BAS in construction, respectively. If from the 2nd The practical significance of the study lies in the
month the share of the influence of the BAS in construction possibility of the use by the regulator and management
will be 10.54%, by the 5th month it will increase to 28.77%, structures of sub-indices of business activity in the services,
then by the 10th month it will increase to 36.66% (Fig.10). manufacturing, construction, and mining sectors as the best
variables for predicting economic activity and restructuring
Results the real sector of the economy of Kazakhstan.
After analyzing the obtained impulse response functions, Our results suggest that sound economic regulation is
the following should be noted. about supporting services, manufacturing, construction, and
mining industry in Kazakhstan.
First, the BAS in services predicts changes in the BAS in
manufacturing and construction, and its influence has a REFERENCES
positive effect. This means that with an increase in BAS in Carol M.Kopp. ISM Manufacturing Index: Definition and How It's
services, both BAS in manufacturing and BAS in construction Calculated - Updated December 18, 2022.
will increase. The economy in the areas of manufacturing and (https://www.investopedia.com/terms/i/ism-mfg.asp)
construction will grow with the increase in services. Nathan Reiff. Leading Indicators: Definition and How They’re Used by
Investors. By February 15, 2023.
Secondly, BAS in manufacturing predicts a change in (https://www.investopedia.com/terms/l/leadingindicator.asp)
BAS in construction, and its influence has a positive impact. Engle, R. F., Granger, C. W. J. (1987). Co-Integration and Error Correction:
Therefore, an increase in BAS in manufacturing will lead to Representation, Estimation, and Testing. Econometrica, Vol. 55, No. 2
an increase in BAS in construction. The construction economy (Mar., 1987), pp. 251–276. © Econometric Society.
will grow with the increase in production. Hizir Sofyan, Eva Maulia, and Miftahuddin (2017). Structure analysis of tax
revenue and inflation rate in Banda Aceh using vector error correction
Thirdly, BAS in construction predicts a change in BAS in model with multiple alpha//Proceedings of the 13th IMT-GT
the mining industry, while its influence has a positive effect. International Conference on Mathematics, Statistics and their
Therefore, if BAS increases in construction, then BAS in the Applications (ICMSA2017)//AIP Conference Proceedings 1905,
050029 (2017). (https://doi.org/10.1063/1.5012248)
mining industry will increase. The mining economy will grow
Eva Maulia, Miftahuddin and Hizir Sofyan (2018). Tax revenue and inflation
with the increase in construction. This may be due to the fact rate predictions in Banda Aceh using Vector Error Correction Model
that the construction sector is a supplier of both building (VECM)// IOP Conf. Series: Materials Science and Engineering 352
materials and services required by the mining industry. (2018) 012056 doi:10.1088/1757-899X/352/1/012056.
Bruce E. Hansen (2018). Johansen’s Reduced Rank Estimator Is GMM//
Conclusion Econometrics 2018, 6, 26; doi:10.3390/econometrics6020026.
Based on the results of the study, the following regularities John Cochrane (2006). Prediction and impulse responses in linear
were revealed. systems//Quantile, 2006, issue 1, 21-26.
John Cochrane (2006). Prediction and impulse responses in linear systems
The composite leading indicator and business activity sub- (in Russian), Quantile, (1), 21-26 [Джон Кокрейн (2006).
indices of the four sectors in Kazakhstan interact in the same Прогнозирование и импульсные отклики в линейных системах (на
direction: higher values of one indicator correspond to higher русском языке), Квантиль, (1), 21-26].
values of other indicators, and low values of one indicator Nosko V.P. (2011) Econometrics. Book 2. Part 3.4: textbook / V.P. Nosko. -
M .: Publishing house “Delo” RANEPA, 2011. - 576 p. ISBN 978-5-
correspond to lower values of others. 7749-0655-3 [Носко В.П. (2011) Эконометрика.Кн.2. Ч.3,4:
The scientific significance of the study comes down to the учебник/В.П.Носко. – М.: Издательский дом “Дело” РАНХиГС,
2011. – 576с. ISBN 978-5-7749-0655-3].
fact that two scientific hypotheses have been proven.
Rudra P. Pradhan, Girijasankar Mallik, Tapan P. Bagchi (2018). Information
The first hypothesis that there is a cointegration communication technology (ICT) infrastructure and economic growth:
relationship between leading indicators has been confirmed. A causality evinced by cross-country panel data//IIMB Management
Review (2018) 30, 91–103. (www.elsevier.com/locate/iimb)
A unidirectional and positive causal relationship has been
Rudra P. Pradhana, Neville R. Normanb, Yuosre Badirc, Bele Samadhana
established in the business activity of Kazakhstan, going from (2013). Transport Infrastructure, Foreign Direct Investment and
services to production, from production to construction, from Economic Growth Interactions in India: The ARDL Bounds Testing
construction to the mining industry for the period from Approach// 2nd Conference of Transportation Research Group of India
September 2016 to April 2023. The reasons for the (2nd CTRG. - Procedia - Social and Behavioral Sciences 104 (2013)
unidirectional positive relationship are explained by the role 914 – 921. (www.sciencedirect.com)
and importance of the services in stimulating production, from Belinga Thierrya, Zhou Junb, Doumbe Doumbe Ericc, Gahe Zimy Samuel
Yannickd, Koffi Yao Stéphane Landry (2016). Causality Relationship
production to the supply of necessary building materials to the between Bank Credit and Economic Growth: Evidence from a Time
growth in the activity of construction. In turn, the growth in Series Analysis on a Vector Error Correction. Model in
activity in construction increases the activity of the mining Cameroon//12th International Strategic Management Conference,
industry in extracting and processing raw materials for ISMC 2016, 28-30 October 2016, Antalya, Turkey - Procedia - Social
construction in the long term. and Behavioral Sciences 235 ( 2016 ) 664 – 671.
Nermin Yasar (2021). The Causal Relationship Between Foreign Debt and
The second hypothesis that the predictive, prognostic Economic Growth: Evidence from Commonwealth Independent
property of leading indicators of the business cycle is States//Foreign Trade Review 1–15, 2021.
manifested in the Kazakh economy has been confirmed. Chao Wang, Yul-Seong Kim, Chi Yeol Kim (2021). Causality between
logistics infrastructure and economic development in China //
The impulse response functions pointed to the positive Transport Policy 100 (2021) 49–58.
impact of business activity sub-indices. Decompositions of Farhad Taghizadeh-Hesary, Naoyuki Yoshino, Lisa Fukuda, Ehsan
Rasoulinezhad (2021). A model for calculating optimal credit
- 369 -
guarantee fee for small and medium-sized enterprises// Economic
Modelling Volume 95, February 2021, pp. 361-373.
Chaido Dritsaki (2013). Causal Nexus Between Economic Growth, Exports
and Government Debt: The case of Greece //Procedia Economics and
Finance 5 (2013) 251 – 259. International Conference On Applied
Economics (ICOAE) 2013.
N. V. Artamonov, E. A. Ivin, A. N. Kurbatsky, D. Fantazzini. Introduction
to time series analysis: textbook for universities. Lomonosov Moscow
State University, Moscow School of Economics, Department of
Econometrics and Mathematical Methods of Economics. - Vologda:
VolNTs RAS, 2021. - 134 pp. ISBN 978-5-93299-496-2 [Н. В.
Артамонов, Е. А. Ивин, А. Н. Курбацкий, Д. Фантаццини.
Введение в анализ временных рядов : учебное пособие для вузов.
Московский государственный университет имени М. В.
Ломоносова, Московская школа экономики, Кафедра
эконометрики и математических методов экономики. – Вологда:
ВолНЦ РАН, 2021. – 134 с.ISBN 978-5-93299-496-2].
- 370 -
Sorry, my tables and graphs are not included in this
template, I attached a regular file in Word
- 371 -
Data-Driven Enhanced Travel Planning by
Utilizing Real-Time User Data
Sooah Park1 and Juhee Choi1*
1
Sangmyung Univ, Republic of Korea
Email: [email protected]
Abstract— We investigate a method to extract essential Our service aims to provide suggestions for tourist
information for the formulation of travel plans and creation of attractions and accommodation options tailored to the user's
itineraries among a variety of real-time user data. Firstly, we inputted address or specific themes, enabling domestic
collect various data types such as card issuer details, travelers to combine travel and work seamlessly. Such
telecommunication service usage records, popular tourist personalized services can play a crucial role for travelers,
destinations, accommodation options, and job opportunities. especially in the current situation where travel restrictions are
Next, the data is analyzed by Elastic Search and visualized gradually being eased post-pandemic. To support travelers in
through Kibana. Elastic Search enables swift storage and access their decision-making process, we conducted data analysis
to large-scale data, thereby facilitating a service that suggests
and will provide the obtained results.
tourist attractions and lodging options tailored to specific
themes. It also provides information on short-term workation II. MOVITATION
job opportunities, assisting in curating meaningful travel
itineraries. The findings from the data analysis are made Firstly, we tried to determine the average ratings of
available on a website, providing users with real-time access to specific locations based on addresses and identify their
the information they desire. This analytical approach and the strengths. It also included discovering the relationship
accompanying system leverage frequently updated data to gain between latitude, longitude, and ratings. To aim it, we
insights into user preferences and behavioral patterns. Such collected data related to accommodations, tourist attractions,
personalized services could be of significant importance for restaurants, and reviews from public sources.
travelers, particularly in the present context where travel
restrictions due to the COVID-19 pandemic are being eased. Fig. 1. shows visualizing each data point on a map based on
The primary focus is on utilizing data analysis to support addresses. The data analysis revealed that tourist attractions
travelers in their decision-making process. were distributed evenly throughout Jeju Island contrary to our
expectations. Therefore, we decided to adjust the scope of
Keywords—Tourism, Big data, ElasticSearch, Kibana, visualization more precisely and included latitude and
WebSite, AWS, Visualization longitude as numerical data. However, we still couldn't obtain
meaningful results.
I. INTRODUCTION (HEADING 1)
Therefore, a powerful tool is required to examine our data
“ Elasticsearch” is a distributed search and analytics more closely such as Elastic Search and Kibana
engine supporting real-time, fast, and scalable search
capabilities. It is suitable for processing large volumes of data
and provides advanced search functionalities such as full-text
search, filtering, and aggregation.“Workation” is a novel
workstyle that has gained popularity in recent years. The term
is a combination of "work" and "vacation," and it refers to a
practice where individuals engage in work activities while
enjoying a vacation-like setting.
During our data analysis research, we had the opportunity to
formulate hypotheses and conduct validation using data
related to Jeju Island. However, we encountered challenges in Fig. 1. Visualizing each data point on a map based on addresses
deriving meaningful results. In order to address these
difficulties and enhance the accuracy of our analysis, In this III. IMPLEMENTATION
regard, we found Elastic Search and Kibana[1] as suitable We converted the data stored in MySQL into CSV files
tools for our research. Additionally, during this exploration, and inputted it into Elastic Search. the errors of the timestamp
we discovered a novel work style known as "Workation." values were fixed. For Kibana, we adjusted the latitude and
The COVID-19 pandemic has brought about changes in longitude data to fit the 'Position' format for using maps. In
conventional work practices[2], leading to a growing addition, we learned that Kibana allows us to utilize 'text'
preference for various work styles such as co-working[3]. address data[6].
Unlike other countries, we found that there is a lack of a Therefore, we have implemented a feature for the desired
customized "Workation" destination recommendation website address and check the information about nearby
for Korea.(As of May 28, 2023, it has been confirmed that the accommodations and restaurants. Through the map, users can
Korea Tourism Organization is currently providing a similar provide the distribution of accommodations in the specific
service.)[4] As a result, we decided to create a data platform area and access details such as the average rating, average
about workation that allows users to access real-time price, and a list of accommodations. Plus, they explore the top
information based on their desired criteria.[5] 10 affordable accommodations, top 10 highly-rated
- 372 -
accommodations, top 10 expensive accommodations, and prices, accommodation listings by price range,
nearby highly-rated tourist attractions. accommodation listings by rating, and nearby recommended
Furthermore, the platform gives comprehensive information tourist attractions. It also gives a recommended tourist
on various types of accommodations, including hotels and attraction called 'Gamue-mul' near Namwon-eup.
traditional Korean houses (hanok), as well as restaurants and
tourist attractions. For job opportunities, the average hourly ACKNOWLEDGMENT
wages and working hours categorized by industry and location This research was supported by program for post-
is needed. Regarding transportation data, due to limited PRIME(Program for Industrial needs-Matched Education)
available data, we have utilized the 'Kakao Map API' to was conducted by the National Research Foundation of
provide features such as real-time route finding and distance Korea(NRF) funded by the Ministry of Education.
views. To make all these Kibana dashboards accessible to
everyone, we created a website and connected it to our REFERENCES
Kibana account. Subsequently, we distributed the website
using AWS servers. [1] A. Robles-Gómez, S. Ros, A. Martínez-Gámez, R. Hernández, L.
Tobarra, R. Pastor, J. Cano, “Using Kibana and ElasticSearch for the
Recommendation of Job Offers to Students.”2019, In LASI-SPAIN (pp.
93-99).
[2] R. Florida, A. Rodríguez-Pose & M. Storper, “Cities in a post-COVID
world.”. 2021, Urban Studies.
[3] M. Orel, “Coworking environments and digital nomadism: balancing
work and leisure whilst on the move.”2019, World Leis J 61 (3): 215–
227.
[4] Korea Tourism Organization , “Korea Gusuk-Gusuk”, Website URL :
https://korean.visitkorea.or.kr/main/main.do
[5] D. Shrestha, T. Wenan, N. Rajkarnikar, D. Shrestha & S. R. Jeong,
“Study and evaluation of tourism websites based on user perspective.” ,
2021, Journal of Internet Computing and Services, 22(4), 65-82.
[6] C. Conner, J. Samuel, A. Kretinin, Y. Samuel & L. Nadeau, “A picture
for the words! textual visualization in big data analytics.”, 2020, arXiv
preprint arXiv:2005.07849.
Fig. 3. Accommodations
- 373 -
A Study on Reuse Policy for Worn-out Cells in
Non-Volatile Memories
Juhee Choi1 and Seonuck Paek1*
1
Sangmyung University, Cheonan, Korea
Email: [email protected]
Abstract— One of the main drawbacks of non-volatile A cell of MRAM is called as the magnetic tunnel junction
memories (NVMs) is the limited lifetime. After a certain number (MTJ), as shown in Fig. 1 [6]. Each MTJ consists of two
of write operations, an NVM cell is worn out, so that it cannot ferromagnetic layers such as 'pinned' layer and ‘free’ layer as
contain the information. To overcome this problem, we its name stands. The magnetization direction of the pinned
investigate the reuse possibility for the pre-defined pattern of layer is fixed, while the direction of the free layer can be
the data. In some fields, frequently used data patterns are rotated. A tunnel barrier is located between these two layers
consistent, so it is possible to store data matched to existing to separate them. The bit information in an MTJ cell is
worn-out cells. Our survey suggests the guide for maximizing
determined by whether the direction of the free layer is parallel
the potential.
or not to the direction of the pinned layer.
Keywords— non-volatile memories, limited lifetime, reuse II. REUSE OF WORN-OUT CELLS
policy, worn-out cells
Among various candidates of NVMs, PCM has emerged
I. INTRODUCTION as an appealing substitute for DRAM due to its distinct
Non-volatile memories (NVMs) have gained significant advantages and potential opportunities. Nevertheless, its
attention from researchers as an alternative of conventional limited write endurance presents a significant obstacle to its
memories such as static random access memory (SRAM) and practical implementation [7]. This problem signifies that some
dynamic random access memory (DRAM) [1-4]. The term memory cells may permanently become stuck at either '0' or
'non-volatile' means that each cell of NVM stores a bit '1' after a certain number of writes. To address this issue,
information instead of electric charges. This approach allows recovery techniques are required with minimal storage
NVMs to preserve information with minimal or no electrical overhead. Our study introduces a reuse mechanism to save the
power, resulting in a significant reduction of leakage energy data in the worn-out cells. If some cells are stuck at ‘0’s, when
consumption. the data consists of continuous ‘0’s, they are stored in the
failed cells. To aim it, we investigate the algorithm to find the
Plus, NVMs provides smaller unit memory cell size minimum shifting or flipping schemes which are have been
compared to SRAM. The last-level cache (LLC) or lower level studied [8-9].
caches, which typically occupy a large portion of the total chip
area, are generally made up of SRAM. Thus, the higher As the next step, we will study the optimal implementation
density of NVMs is an attractive prospect for chip policy for each workload. Since the data patterns of the
manufacturers. NVMs come in various forms depending on computation-centric workloads and communication-centric
the type of memory cell. Among them, phase change memory workloads differ, it is needed to detect the type of the
(PCM) and spin-torque transfer magnetic RAM (STT-MRAM) workload during program execution. Then, we will also devise
are the predominant areas of research. the mechanism to be applied for several memory subsystems
which usually have a significant influence on the performance.
The base of a cell in PCM [5] is usually made up of alloy
material like Ge2Sb2Te5. Each logic has two distinct states - ACKNOWLEDGMENT
the amorphous phase and the crystalline phase. These states This research was supported by KOICA(Korea
vary physically in their electrical resistance and optical International Cooperation Agency) through "Capacity
reflectivity. In logical terms, the amorphous phase represents Building Project for School of Information and
the RESET or "0" state, while the crystalline phase denotes Communication Technology at Mongolian University of
the SET or "1" state. The transition between these phases Science and Technology in Mongolia" (Contract No. P2019-
within a PCM cell is accomplished by the heat produced from 00124).
the electric current.
- 374 -
REFERENCES [5] Wong, H.-S.P., Raoux, S., Kim, S., Liang, J., Reifenberg, J.P.,
Rajendran, B., Asheghi, M., Goodson, K.E.: Phase change memory.
[1] Fantini, P.: Phase change memory applications: the history, the present Proceedings of the IEEE 98(12), 2201–2227 (2010)
and the future. Journal of Physics D: Applied Physics 53(28), 283002
(2020) [6] Zhu, J.-G.J., Park, C.: Magnetic tunnel junctions. Materials today 9(11),
36–45 (2006)
[2] Wang, K., Alzate, J., Amiri, P.K.: Low-power non-volatile spintronic
memory: Stt-ram and beyond. Journal of Physics D: Applied Physics [7] Ferreira, A.P., Zhou, M., Bock, S., Childers, B., Melhem, R., Moss ́e,
46(7), 074003 (2013) D.: Increasing pcm main memory lifetime. 2010 Design, Automation
& Test in Europe Conference & Exhibition, pp. 914–919 (2010)
[3] Pan, X., Ma, T.: Retention mechanism study of the ferroelectric field
effect transistor. Applied Physics Letters 99(1), 013505 (2011) [8] Bittman, Daniel, et al. "Designing data structures to minimize bit flips
on NVM." 2018 IEEE 7th Non-Volatile Memory Systems and
[4] Akinaga, H., Shima, H.: Resistive random access memory (reram) Applications Symposium (NVMSA). IEEE, pp. 85-90 (2018).
based on metal oxides. Proceedings of the IEEE 98(12), 2237–2251
[9] Luo, Xianlu, et al. "Enhancing lifetime of NVM-based main memory
(2010)
with bit shifting and flipping." 2014 IEEE 20th International
Conference on Embedded and Real-Time Computing Systems and
Applications. IEEE, pp. 1-7 (2014).
- 375 -
Development of an analytical computation
system and its application for automation of
equations derivation in robotics systems
Magzhan Aliaskar1, Sholpan Jomartova1*, Aigerim Mazakova1*, Talgat Mazakov1*,
Gulzat Ziyatbekova1,2*
1
Al-Farabi Kazakh National University, Almaty, Kazakhstan
2
Institute of Information and Computational Technologies CS MES RK, Almaty, Kazakhstan
Email: [email protected]
Abstract-- The advancement of automation techniques in systems emerged in the late 1960s, implementing various
the field of mathematical modeling has greatly facilitated the approaches to create universal computing systems.
process of constructing mathematical models. Symbolic
One approach involved using existing procedural
computations and computer algebra systems have played a
pivotal role in this regard. Mathematical modeling involves languages (such as C, Pascal, Fortran, Algol) or functional
the development of equations that describe the dynamics of languages (such as Lisp) as a base language for creating a
various systems, including robots and robotic systems. new language specifically designed for manipulating
By leveraging the capabilities of computer algebra algebraic objects. Another approach involved extending
systems, researchers can efficiently perform complex
the syntax and capabilities of an existing programming
computations involving matrices, series, simplification, and
the calculation of algebraic expressions. This automation language through symbolic manipulation modules. The
significantly reduces the time and effort required for deriving first approach provided a new language independent of
equations and enhances the reliability of the mathematical specific language translators but required efficient
model. implementation, learning, and support for the new
The dynamics of robots and robotic systems are of
language. Additionally, it suffered from slower execution
particular interest in the realm of mathematical modeling.
Analyzing the behavior and movement of robots involves speed compared to compiled packages and created
capturing their motion patterns, mechanical properties, and complexities when modifying syntax (requiring rewriting
interaction with the environment. Mathematical models all packages). The second approach was advantageous
enable the prediction and simulation of robot dynamics, due to high execution speed of packages, utilization of all
allowing researchers to optimize robot designs, control
programming language features, and package
strategies, and evaluate their performance in different
scenarios. independence from specific language translators.
The integration of automation techniques, symbolic Commercial packages often used the first approach to
computations, and computer algebra in mathematical provide a closed working environment without access to
modeling has revolutionized the field of robotics. It has led to source code due to the absence of language compiler
advancements in the development of efficient algorithms,
delivery. Experimental and university systems fully
control strategies, and system optimization. The utilization of
mathematical models has facilitated the design and embraced the second approach, providing openness and
implementation of robotic systems that exhibit enhanced implementation efficiency.
performance, precision, and adaptability. Currently, there are numerous analytical computation
This article explores the application of automation in systems, each with its own features and limitations. They
mathematical modeling, with a focus on the dynamics of
offer a wide range of functions and tools for working with
robots and robotic systems. It highlights the significance of
computer algebra systems in simplifying complex algebraic objects. However, certain limitations may arise
computations and discusses the implications of mathematical when using these systems, such as lack of access to source
modeling in the field of robotics. code, computation complexity restrictions, difficulties in
adaptation for learning, and the use of outdated concepts
Keywords: automation of mathematical model in implementation.
construction, symbolic computations, computer algebra,
mathematical model, dynamics of robots, robotic systems. Experimental symbolic computation systems have
also been created, utilizing non-traditional internal
I. INTRODUCTION expression representations (e.g., vector representation),
Analytical (symbolic) computation systems play a new processors (e.g., matrix processor), or writing styles
significant role in automating algebraic transformations, (e.g., functional style - Parsifal). The problem of
ranging from expression simplification to differentiation analytical computations has proven to be extensive, and
and integration. These operations are an integral part of each system only implements a few aspects of it. It should
the work of researchers in practically any mathematical be noted that recently, new promising directions have
model. As a result, the first analytical computation emerged. The first is the use of symbolic computations in
proving mathematical theorems [1-5], which require
- 376 -
extensive computations, leading to the proof of properties reuse, enable the efficient creation of various programs
of stereographic projection and lemmas leading to the focused on ease of interaction and quick results. For this
proof of properties of nowhere continuous Weierstrass purpose, it is necessary to have an accessible and user-
function. The second direction is the application of friendly interface between modules handling expressions
automated symbolic computations in questions related to and the programming language. Therefore, the system
programming the kinematics of mechanical robots [6], should be designed considering this aspect of usage,
where real-time solution of differential and other treating its core as a programming tool that includes a
equations is required during their training. For research library of symbolic algebraic transformation procedures
purposes, the application of various tools is necessary - available to developers.
from well-established systems to experimental and open Thus, the state of existing analytical computation
implementations. systems does not meet the requirements and the new role
Given the aforementioned limitations, there is a need they should play in the education system and problem-
for a new analytical computation system that overcomes solving. Therefore, there is a need for the development of
these problems and provides additional advantages. a new system that satisfies these requirements.
Further research will be devoted to the development of
such a system, as well as its application in the educational
process and for solving research tasks. II. MAIN RESULTS
The obtained results are a continuation of the authors'
PROBLEM STATEMENT: previous research published in [12-13].
Among the operations on expressions included in the The SAV package consists of a set of modules, each
set of core functions of an advanced analytical containing a set of data types, variables, and functions.
computation system [7-10], the following are desirable: The modules are divided based on their interdependence
and logical relationship to operations performed on the
User-controlled simplification.
expression tree. The package consists of 9 modules in
Substitution of various types. total: S_Init, S_Misc, S_Scaner, S_Tree, S_Sort, Intrface,
Ordering (reducing to a canonical form). S_Matrix, SAV.
Numerical computations (preferably without integer The developed core implements the main
range restrictions, with rational arithmetic). functionalities required to perform practical operations on
Set of operations on polynomials (GCD, expressions of a general form. An expression is described
factorization, decomposition into different bases). by a regular context-free grammar for algebraic
Differentiation. expressions.
The main (basic) operations include:
Integration.
Reading any text describing an algebraic expression
Matrix operations.
and detecting syntax errors.
It is desirable for the developed analytical
Constructing the expression tree from its textual
computation system to be modifiable and open. Often, a representation and detecting semantic errors.
large part of the functionality of such systems proves to Evaluating a numerical expression and detecting
be excessive for solving a specific problem, such as errors.
obtaining a complex differential equation in symbolic Modifying an expression, such as expanding
form. In such cases, only basic operations are required, parentheses or ordering.
such as simplification and differentiation without Simplifying any expression.
restrictions on expression complexity. Therefore, the ideal Substituting one expression into another expression.
set of capabilities of an analytical computation system Differentiating an expression with respect to a
should correspond to the level of problems being solved specified variable.
and the requirements of the educational system. Ease of Integrating certain specific cases of expressions.
learning the language and its functional sufficiency for Procedures have been developed to parse the input text
obtaining results from non-programmers are important string describing an algebraic expression and detect
criteria. syntax errors.
Furthermore, the widespread use of analytical A procedure has been developed to uniquely construct
computation systems is determined not only by their the expression tree based on the input string and detect
semantic errors.
functionality but also by the availability of
A function has been implemented to evaluate a
documentation, support, and ease of use during the initial
numerical expression, as well as the ability to substitute
and subsequent interaction with the system. Currently, variable values, perform partial evaluations, and detect
most existing systems do not meet these requirements, errors such as overflow, function argument error, and
indicating the need for the development of their division by zero, among others.
environment [11]. A procedure has been developed for expanding
Implemented and debugged code for handling parentheses and modifying the expression tree
algebraic objects is usually embedded in the considering its semantics.
corresponding system and is only used through it.
However, modern programming paradigms, such as code
- 377 -
Several types of substitutions of one expression into numerical expression, modify the expression, simplify the
another have been implemented, as well as checking for expression, substitute one expression into another,
cyclic dependencies between variables. differentiate the expression, and integrate specific cases.
A procedure has been developed to differentiate an The SAV system implements algorithms for syntactic
expression of arbitrary degree with respect to specified parsing of the input string, construction of the expression
variables. All functions are implemented as recursive tree, evaluation of the expression, differentiation of the
procedures working with the expression tree. expression, tree transformation, parentheses expansion,
The system of analytical computations implements the and simplification of the expression.
following algorithms: Additionally, a user-friendly interface has been
Syntactic parsing of the input string based on the created for working with expressions, allowing the input
regular representation of the set of algebraic expressions. of operator sequences in the program's special language,
Bottom-up construction of the expression tree reading data from the terminal or a text file, and
using recursive calls to procedures for reading displaying the results on the screen or saving them to a
non-terminal symbols of the grammar describing file.
algebraic expressions. Overall, the developed SAV package provides a
Evaluation of the expression by traversing the tree sufficient set of functionalities for performing operations
from left to right. on expressions and meets the requirements expected from
Differentiation of the expression by applying analytical computation systems.
differentiation rules and subsequent Here are some examples of the interpreter's work:
simplification. 1. Evaluating a complex expression:
Transformation of the tree into another f:=20^20*Sqrt(2*Pi*20)*Exp(-20+(1-1/30/20)/12/20);
semantically isomorphic tree. print f @
Expansion of parentheses in the expression. Output:
Recursive simplification of the expression by f= 2.43288E18
grouping and sorting of terms and factors, as well 2. Evaluating an expression with different variable
as evaluating subexpressions. values:
Recursive substitution with specifying the set of f:= Ln(x+Sqrt(x^2+1));
substituted variables and the set of target variables. x:= 2; Subst f to f2;
The next step in processing the expression is the x:= 3; Subst f to f3;
syntactic analysis of the token string, which Print f2 f3 @
simultaneously builds the expression tree in memory, Output:
hence called BuildTree. The procedure assumes the f2= 1.316
construction of expressions generated by the following f3= 1.818
context-free grammar, which is standard for ordinary 3. Computing derivatives of different orders:
algebraic expressions: y:= Tg(x);
E=E+T | E-T | T y1:= Diff(x)(y);
T=T*P | T-P | P y2:= Diff(x 2)(y);
P=P^L Print y1, y2 @
L = number | var | (E) | Func(E) Output:
y1= 1/(Cos x)^2
However, this grammar still contains direct left y2= 2*Sin x/(Cos x)^3
recursion and is not suitable for immediate 4. Computing partial derivatives of a multivariable
implementation of syntactic parsing. Therefore, by function:
factorizing it, a form is obtained that dictates the idea of a f:= x^4 + y^4 - 4*x^2*y^2;
top-down syntactic analysis algorithm: fx:= Diff(x)(f);
E = T E' | T fy:= Diff(y)(f);
E' = + T | - T | + T E' | - T E' Print fx, fy @
T = P T' | P Output:
T' = * P | / P | * P T' | / P T' fx= 4*x^3 - 8*x^y^2
P= L^ P|L fy= 4*y^3 - 8*x^2*y
L = number | var | (E) | Func(E) 5. Evaluating a function with different
substitutions:
The main modules of the SAV package are S_Init, f:= Sin(3*x/t);
S_Misc, S_Scaner, S_Tree, S_Sort, Intrface, S_Matrix, x:= t; Subst f to ft;
and SAV. These modules contain the necessary data x:=2*t; Subst f to f2t;
types, variables, and functions to perform operations on Print ft, f2t @
expressions. Output:
The developed SAV core implements the main ft= 0.0523
functionalities required to perform operations on f2t= 0.1045
expressions of a general form. Procedures have been 6. Computing the limit of a function using
developed to parse the input string, detect syntax and L'Hôpital's rule:
semantic errors, construct the expression tree, evaluate the f:= Sin(x); g:= x;
FG:= f/g; x:= 0;
- 378 -
Subst FG to Limit1; Print Limit1; Another example of the ease of use of library functions
df:= Diff(x)(f); dg:= Diff(x)(g); is the implementation of a function to construct a
dFG:= df/dg; Maclaurin series for an arbitrary differentiable function.
Subst dFG to Limit2; Print Limit2; The main part is given below:
Output: R:= SetNum(0);
!! Subst failed: Dividing by ZERO ff:= SetNum(1);
Limit2= 1 df:= CopyTree(f);
SetTo(x, 0);
SAV can be used to obtain a mathematical model of fact:=1;
robotic systems using Lagrange's equations of the second
kind. The Lagrange's equation of the second kind for FOR i:=0 to n DO BEGIN
describing the dynamics of an n-link manipulator is IF i<>0 THEN fact:= fact*i;
written in matrix form with the application of generalized ff:= SetNum(fact);
forces. R:= opetrees(R, '+',
Here is a fragment of a corresponding program text: opetrees(Substitute(df,[xc],[xc],[]), '*',
FOR j:=1 to n DO BEGIN opetrees(SetExpr(x+'^'+i2str(i), '/', ff)));
QP[j]:= SetNum(0); Diff(xc, df);
FOR i:=j to n DO Reduce(df,Ok);
FOR k:=1 to i DO BEGIN END;
QP[j]:=
OpeTrees(QP[j], The result is returned in the pointer variable R. The
'+', variable f contains the original function, x is the variable
OpeTrees(Track(MultMx(U[i,j], MultMx(H[i], name for which the expansion is performed, and n is the
TranspMx(U[i,k])))),'*', length of the series. The auxiliary variable df contains the
d2q[k])); current derivative of the original function.
END; Based on the core of the system and the interface
procedures between the core and the programming user, a
FOR i:=j to n DO knowledge testing program has been developed for
FOR k:=1 to i DO specific areas of algebra. The working scheme is as
FOR l:=1 to i DO BEGIN follows: the program and the test subject solve an
QP[j]:= algebraic problem, and then the program reads the result
opetrees(QP[j], provided by the individual and compares it with its own
'+', solution. The range of algebraic problems depends on the
opetrees(Track(MultMx(U[i,j], MultMx(H[i], functionalities implemented in the core system and
TranspMx(V[i,k,l])))), includes the following topics:
'*', Evaluation of expressions and function values
opetrees(dq[l], '*', dq[k]) )); Rules for simplifying algebraic expressions
END; Rules for differentiation with respect to one or
multiple variables
FOR i:=j to n DO BEGIN Rules for matrix operations: matrix arithmetic,
QP[j]:= opetrees(QP[j], '-', determinant computation, inverse matrix, minors,
opetrees(m[i], trace
'*', Function series expansions and operations with
Track(MultMx(G, MultMx (U[i,j],R[i])) ))); series
END; Computation of limits
END;
Solution of systems of linear algebraic equations
Integration of certain functions
It should be noted that the accumulation of summation
It is evident that additional problem classes based on
occurs in a variable of type pointer to the tree QP[j], and
the listed topics can be easily and quickly included.
the arrays dq, d2q, and m contain the first and second
derivatives with respect to time of the generalized CONCLUSION
coordinate functions and the masses of the links,
The program developed by the authors automates the
respectively. The advantage of obtaining all results in
process of deriving equations for the dynamics of robotic
symbolic form is indisputable since the obtained result
can be used for various substitutions without computing it systems. The implemented interface allows for interactive
communication between the program and the researcher,
from scratch each time.
who specifies the number of links and the characteristics
The efficiency of the developed system is
of each link. The user can provide some inputs
demonstrated by an example of a three-link robot
quantitatively and others symbolically.
manipulator, where the program Sav.exe is called. The
The program generates the Lagrangian function in an
input data for the output mode of the robot manipulator
automated mode and then derives the equations that
equations are placed in the file Robot3.Dat. The results of
describe the dynamics of a multi-link robot based on the
the program execution are outputted to the file
Lagrangian equation of the second kind.
Robot3.Out.
- 379 -
The research methods include an interpreter that [15] Shakin, V.N., Semenova, T.N., Semenova, T.I. Analytical
Computations and Examples of Electrical Engineering Problem
enables fast computation by directly executing operations Solving Using Symbolic Mathematics in Matlab. Moscow:
after reading the commands. The interpreter allows users Goryachaya Liniya - Telecom, 2023. 238 p.
to enter commands sequentially from the screen or from a [16] Dyakonov, V.P. Encyclopedia of Computer Algebra. Moscow:
text file. The computation results are displayed on the DMK Press, 2010. 1264 p.
screen or saved in a user-specified file. [17] Revinskaya, O.G. Symbolic Computations in MatLab. Moscow:
The program has been continuously improved over a Lan', 2020. 528 p.
considerable period of more than 20 years, confirming the [18] Mazakov, T., Wójcik, W., Jomartova, Sh., Karymsakova, N.,
Ziyatbekova, G., Tursynbai, A. The Stability Interval of the Set of
validity of the chosen implementation strategy as library Linear System. INTL Journal of Electronics and
functions. Telecommunications, 2021, Vol. 67, No. 2, pp. 155-161. DOI:
Users are provided with the following capabilities: 1) 10.24425/ijet.2021.135958
control over the sequence of computations, 2) [19] Mazakova, A., Jomartova, S., Mazakov, T., Shormanov, T.,
development of custom procedures and functions, 3) Amirkhanov, B. Controllability of an unmanned aerial vehicle.
IEEE 7th International Energy Conference (ENERGYCON),
design of custom interfaces, and 4) the ability to apply 2022, pp. 1-5. doi: 10.1109/ENERGYCON53164.2022.9830244.
library functions in their own research projects as external
modules.
The library functions of the proposed analytical
computation system can be effectively applied to
investigate various electro-technical systems, such as
studying the controllability or stability of a trajectory,
finding optimal controls, etc.
A promising direction for future work is the
development of the Symbolic Analytical Computation
System (SAC) for interval mathematics.
The work was carried out at the Research Institute of
Mathematics and Mechanics of the Kazakh National
University named after al-Farabi.
REFERENCES
[1] Kurbatova, N.V. Analytical Computations in Maple. Rostov-on-
Don: Southern Federal University, 2008. 146 p.
[2] Gubina, T.N., Andropova, E.V. Solving Differential Equations in
the Computer Mathematics System Maxima. Yelets: Elets State
University, 2009. 99 p.
[3] Sedov, E.S. Basics of Working with the Computer Algebra
System Mathematica. Moscow: National Open University
"INTUIT", 2016. 401 p.
[4] Osipov, N.N. Symbolic Computations in Mathematical Proofs
(Computer Assisted Proofs). Mathematical Education, 2020,
Issue 2, 42-47.
[5] Klepikov, P.N., et al. Symbolic Computations in Geometry and
Analysis Problems. Barnaul: Altai State University Publishing,
2015. 156 p.
[6] Grosheva, M.V., Efimov, G.B., Samsonov, V.A. History of Using
Analytical Computations in Mechanics Problems. Moscow:
Moscow State University, 2005. 87 p.
[7] Shilin, I.A. Computer Algebra in Problems. Moscow: Moscow
State Pedagogical University, 2018. 57 p.
[8] Goryushkin, A.P. Abstract and Computer Algebra. Moscow:
Yurait, 2021. 691 p.
[9] Voyevoda, A.A., Bobobekov, K.M. Symbolic Computations.
Collection of Scientific Papers of NSTU, 2017, No. 1 (87), pp.
23-37.
[10] Banshchikov, A.V., Burlakova, L.A., Irtegov, V.D., Titoreko,
T.N. Symbolic Computations in Modeling and Qualitative
Analysis of Dynamic Systems. Computational Technologies,
Volume 19, No. 6, 2014, pp. 3-18.
[11] Mukha, V.S. Computational Methods and Computer Algebra.
Minsk: BSUIR, 2006. 127 p.
[12] Nurmagambetov, A.A., Dzhomartova, Sh.A., Mazakov, T.Zh.
Development of an Analytical Computation System.
Computational and Information Technologies in Science,
Engineering, and Education. Ust-Kamenogorsk, 2013, pp. 143-
147.
[13] Dzhomartova, Sh.A., Karimsakova, N.T., Tursynbai, A.T.
Bulletin of KazATK, No. 2 (113), 2020, pp. 207-213.
[14] Yurevich, E.I. Fundamentals of Robotics. St. Petersburg: BHV-
Petersburg, 2010. 368 p.
- 380 -
MATHEMATICAL MODELING AND
DEVELOPMENT OF AUTOMATED FIRE
MONITORING SYSTEM
A.A. Sametova1,2* , T.Zh. Mazakov 1,3 , G.Z. Ziyatbekova 1,3 , A.D. Burgegulov1
1
Al-Farabi Kazakh National University, Almaty, Kazakhstan
2
Almaty University of Power Engineering and Telecommunications named after Gumarbek Daukeyev
3
Institute of Information and Computational Technologies CS MES RK, Almaty, Kazakhstan
Email: [email protected]
Abstract. Mathematical modeling and the development of The article discusses the problems of monitoring and
automated fire monitoring systems involve the use of mathematical forecasting forest and steppe fires, determining the
equations and computer algorithms to analyze data and predict the mathematical model used to prevent forest and steppe fires,
occurrence of fires. In this process, we create a mathematical model and developing an automated system. We all know about the
to simulate the behavior of fire and use it to develop an automated harm and consequences of a silent enemy. For this reason,
fire monitoring system. The first step in the process is to develop a forest fires are currently recognized as one of the most
mathematical model that describes the behavior of fire. The model important factors in changing landscapes. Each resulting fire
should take into account various factors such as fuel type,
is thrown into the atmosphere about a million combustion
temperature, humidity, wind speed, and direction. We can use
products, which are released many toxic substances and
different modeling techniques, such as computational fluid
dynamics (CFD) or finite element analysis (FEA), to develop a
chemical elements. Depending on the spread of fire and its
detailed and accurate model of fire behavior. Once we have dynamics, the description of mathematical models varies.
developed a mathematical model, we can use it to develop an Among the mathematical models of Fire Prevention, the most
automated fire monitoring system. The system should be able to important and complex are those that characterize the
detect and analyze fire behavior in real-time and provide early dynamics of forest and natural fires. Therefore, since fire
warning to authorities and individuals in the affected area. The prevention is a huge problem all over the world, we examined
system should also be able to predict the behavior of the fire and mathematical models used for the prevention and control of
provide recommendations for firefighting operations. emergency situations and analyzed fire control, forecasting
There are several types of sensors that can be used in an systems, their features in the article.
automated fire monitoring system, such as thermal imaging
cameras, smoke detectors, and infrared cameras. These sensors can The purpose of the work is to develop technology and
detect changes in temperature, smoke density, and radiation levels, software for automated control and forecasting of forest and
which can indicate the presence of a fire. The data collected by the steppe fires using mathematical modeling.
sensors is then processed by a computer system, which uses the
mathematical model to analyze the behavior of the fire. The system II. RESEARCH MATERIAL AND METHODS. DESCRIPTION OF
can also use machine learning algorithms to learn from past fire THE ALGORITHM AND MODULES
incidents and improve its predictions. In conclusion, mathematical Controlling and forecasting forest and steppe fires requires
modeling and the development of automated fire monitoring systems a multidisciplinary approach that combines various research
can help prevent and mitigate the damage caused by fires. By materials and methods. Here are some common research
developing accurate models of fire behavior and using advanced materials and methods used for the control and forecasting of
sensors and machine learning algorithms, we can provide early forest and steppe fires: Remote sensing involves the use of
warning and improve firefighting operations, ultimately saving lives
satellites, aircraft, and other remote sensing platforms to
and reducing property damage.
collect data on fires, weather conditions, and fuel moisture.
Keywords: fire, automated system, mathematical
modeling, fire monitoring systems.
This data is used to detect and monitor fires, as well as to
forecast their behavior. Geographic Information Systems
I. INTRODUCTION (GIS) - GIS is a computer-based tool that allows researchers
to analyze and visualize data related to fires, weather,
Fires can cause significant material damage and pose a topography, and vegetation [1]. This tool can be used to
serious threat to people's lives. As a result, it is very important identify high-risk areas and to develop fire management plans.
to have effective fire control measures in order to detect Fire behavior models are computer simulations that predict the
possible fires in a timely manner and react quickly. Fire behavior of fires based on environmental conditions, such as
control systems play an important role in fire prevention and fuel moisture, topography, and weather. These models can be
suppression. They must be carefully designed, installed and used to forecast the spread of fires and to develop effective
maintained to ensure their effectiveness in detecting and firefighting strategies. Meteorological data, such as
responding to fires. The development of a fire management temperature, humidity, wind speed, and direction, can be used
system can provide a number of advantages, such as to forecast fire behavior and to develop fire management
increasing safety, reducing damage and loss, and increasing plans. This data can be collected from weather stations,
property value. A well-thought-out fire management system satellites, and other remote sensing platforms. Fuel moisture
helps reduce damage, protect human lives, and comply with sampling involves collecting samples of vegetation to
safety regulations. measure their moisture content. This data can be used to
- 381 -
predict the potential for fires and to develop fire management plan should include procedures for alerting emergency
plans. Fire detection systems, such as cameras, smoke and services, evacuating people and animals, and
heat detectors, and automated weather stations, can be used to providing support to firefighters [3-4].
detect fires early and to provide accurate information to
emergency services. Fire management plans are developed Developing an algorithm for monitoring and predicting
based on research data and involve the implementation of forest and steppe fires requires a comprehensive approach that
measures to prevent and control fires. These plans may involves data collection, fire detection, fire behavior
include fuel reduction, prescribed burns, and the development prediction, fire danger rating, fire management, continuous
of fire breaks. monitoring, and response planning. This algorithm can help to
prevent fires and minimize their impact on human lives,
In conclusion, the control and forecasting of forest and property, and the environment. At the same time, the analysis
steppe fires require the integration of various research of the currently operating systems was carried out in the
materials and methods. These tools can help to detect and article. Although each system has its own advantages and
monitor fires, forecast their behavior, and develop effective disadvantages, each system has its own users. The analysis of
firefighting strategies. The use of these tools is critical in some automated systems used in the control and forecasting
protecting human lives, property, and the environment from of forest and steppe fires is shown in the table 1.
the devastating effects of fires [2].
TABLE I. SOME AUTOMATED SYSTEMS USED IN THE CONTROL
Using the materials and methods necessary to develop the AND FORECASTING OF FOREST AND WILDFIRES
above monitoring system, it is possible to effectively develop
Systems Description
a system for monitoring and forecasting forest and wildfires
based on the following algorithm. Developing an algorithm FireWatch FireWatch is a satellite-based fire detection system
for monitoring and predicting forest and steppe fires requires that uses a combination of infrared and visible light
sensors to detect fires in real-time. The system can
a comprehensive approach that takes into account multiple detect fires as small as 30 meters in diameter and
factors that can influence fire behavior. Here is a general can provide accurate location data to emergency
algorithm for monitoring and predicting forest and steppe services within minutes.
fires: Farsite Farsite is a fire behavior and growth model that
uses terrain, weather, and fuel data to simulate the
• Data Collection: Collect data on weather conditions, spread of fires. The model can be used to forecast
fuel moisture, vegetation, topography, and other the potential size and direction of fires, allowing
relevant factors. This data can be collected through emergency services to plan their response.
remote sensing, meteorological stations, fuel moisture MODIS (Moderate MODIS is a NASA satellite-based system that can
sampling, and other means. Resolution detect fires in near real-time. The system can
Imaging detect fires as small as 1000 square meters and can
• Fire Detection: Detect fires through various fire Spectroradiometer) provide data on fire location, size, and
detection systems such as cameras, smoke and heat temperature.
detectors, and automated weather stations. These Fire Danger Rating Fire Danger Rating Systems (FDRS) are used to
systems can detect fires in real-time and provide Systems assess the potential for fires based on weather
accurate information to emergency services. conditions, fuel moisture, and other factors. These
systems can help to predict the likelihood of fires
• Fire Behavior Prediction: Use fire behavior models to occurring and provide warnings to people living in
predict the spread of fires based on environmental high-risk areas.
conditions such as fuel moisture, topography, and Alertwildfire Alertwildfire is a camera-based system that
weather. These models can be used to forecast fire provides real-time video of wildfires to emergency
services. The system uses cameras mounted on
behavior and to develop effective firefighting towers or other high points to provide a panoramic
strategies. view of the area. This can help emergency services
to assess the situation and make decisions about
• Fire Danger Rating: Use fire danger rating systems to how to respond.
assess the potential for fires based on weather
conditions, fuel moisture, and other factors. These
systems can help to predict the likelihood of fires These are just a few examples of the automated systems
occurring and provide warnings to people living in for monitoring and forecasting forest and steppe fires that
high-risk areas. exist. Each system has its own strengths and weaknesses, and
• Fire Management: Develop fire management plans some may be better suited to certain types of fires or
based on the data collected in steps 1-4. These plans environments than others. It is important to choose the right
may include fuel reduction, prescribed burns, and the system for the specific needs of the area being monitored [5].
development of fire breaks. The plans should also One example of a mathematical model that can be applied
include a strategy for responding to fires when they to an automated system for monitoring and predicting forest
occur. and wildfires is the Rothermel model, which is a widely used
• Continuous Monitoring: Continuously monitor fire spread model. The Rothermel model is based on the
weather conditions, fuel moisture, and other factors physical processes involved in the spread of surface fires, and
that can influence fire behavior. This monitoring it takes into account factors such as fuel characteristics,
should be done in real-time to allow for immediate topography, and weather conditions.
action if conditions change. The Rothermel model uses a set of equations to estimate
• Response Planning: Develop a response plan that the rate of fire spread, fireline intensity, and other fire behavior
outlines the steps to be taken in the event of a fire. This
- 382 -
parameters. These equations take into account the following III. RESULT AND DISCUSSION
factors: Linking the Rothermel model to an automated forest and
Fuel Characteristics - The Rothermel model accounts for wildfire monitoring and forecasting system involves
the fuel characteristics of the vegetation being burned, integrating the Rothermel model into the overall system
including fuel load, fuel moisture content, and fuel particle architecture. Here are the steps involved in linking the
size. Rothermel model to an automated forest and wildfire
monitoring and forecasting system.
Topography - The Rothermel model accounts for the effect
of topography on fire behavior, including slope, aspect, and System design: The overall system architecture should be
the presence of ridges and valleys. designed to accommodate the Rothermel model. This may
involve selecting appropriate hardware and software
Weather Conditions - The Rothermel model accounts for platforms and designing the user interface.
weather conditions, including wind speed and direction,
temperature, humidity, and atmospheric stability. Data acquisition: The system should be able to acquire
data on fuel characteristics, topography, and weather
The Rothermel model is typically implemented in a conditions. This can be done through various means, such as
computer program that allows fire managers to input data on remote sensing, ground-based sensors, and weather stations.
fuel characteristics, topography, and weather conditions, and
then generates predictions of fire behavior, including fire Data processing: The data acquired by the system needs to
spread rate, direction, and intensity [6-8]. The model can be be preprocessed and organized for use in the Rothermel
used to develop fire management plans, to identify high-risk model. This may involve converting data to appropriate units,
areas, and to support decision-making during firefighting filtering out erroneous data, and calculating additional
operations. The following is the general formula for the parameters.
Rothermel model: Rothermel model implementation: The Rothermel model
needs to be integrated into the overall system architecture.
ERR= ρ*H**w**S**(1+β) () This may involve developing custom software or integrating
existing software tools into the system.
where:
Calibration and validation: The Rothermel model needs to
ERR is the energy release rate (kJ/m^2/s); be calibrated and validated for the specific area being
ρ is the density of the fuel (kg/m^3); monitored. This involves adjusting the model parameters to
match local fuel types and moisture conditions and comparing
H is the fuel bed depth (m); the predicted fire behavior to actual fire behavior observed in
w is the fuel moisture content (fraction); the field.
S is the wind speed (m/s); Visualization and reporting: The results of the Rothermel
model should be presented in a way that is easy for fire
β is a correction factor that accounts for the slope of the managers to interpret. This can include maps, graphs, and
terrain. other visualizations. The system should also provide reports
on fire behavior predictions, risk assessments, and other
The Rothermel model also includes equations to estimate
relevant information.
the rate of spread (ROS) and fireline intensity (FLI), which are
given by: Integration with other systems: The automated system
should be integrated with other fire management systems such
ROS=k*(ERR/ρ)n , () as fire detection and suppression systems. This will allow for
a comprehensive approach to fire management.
FLI=(ρ*H**w**c**(T-273))1.5*(ROS/60) () Overall, linking the Rothermel model to an automated
forest and wildfire monitoring and forecasting system requires
where: careful planning and design to ensure that the system is
k and n are empirical constants that depend on the fuel type reliable, accurate, and easy to use. The system should also be
and moisture content; regularly updated and maintained to ensure that it remains
effective over time.
c is the specific heat of the fuel (kJ/kg/°C);
IV. CONCLUSION
T is the ambient temperature (K).
We all know the harm and consequences of a mute enemy.
The Rothermel model is typically implemented in a One of the most pressing and difficult issues in the world is
computer program that allows fire managers to input data on the Prevention of fires in forest areas, forest countries, its
fuel characteristics, topography, and weather conditions, and prevention, protection from deforestation and deforestation.
then generates predictions of fire behavior, including fire Forest fires damage the economy of the area where the fire
spread rate, direction, and intensity. The model can be used to occurred, affected. Fire extinguishing costs can be a heavy
develop fire management plans, to identify high-risk areas, burden for locally allocated funds. To eliminate fires,
and to support decision-making during firefighting operations expensive equipment such as aircraft, helicopters, fire trucks
[9-10]. and tankers carrying cy is required. At the same time, it is clear
that biological restoration of the habitat will not be an easy
task either. To prevent the same damage, a system is being
developed that monitors, predicts forest and wildfires in real
- 383 -
time. The system provides information about the time of
occurrence of a fire, the level, the area of possible fire
coverage using space data. With the help of new software for
monitoring forests based on space data, it is possible to
significantly reduce the time of fire response and, as a result,
avoid large losses due to forest fires.
The work was carried out at the Research Institute of
Mathematics and Mechanics of the Kazakh National
University named after al-Farabi.
REFERENCES
[1] T.Zh. Mazakov., A.A. Sametova, A.S. Salimkhanova Monitoring the
development of forest and steppe fires // Bulletin of KazNITU, 2020.
№3. - P.175-179.
[2] Mazakov T.Zh., Kisala P., Jomartova Sh. A., Ziyatbekova G. Z.,
Karymsakova N.T. (2020). Mathematical modeling forecasting of
consequences of damage breakthrough. News of the national academy
of sciences of the Republic of Kazakhstan. Series of Geology and
Technical Sciences, 5(443), 116-124.
[3] T.Zh. Mazakov, A.A. Sametova. System for monitoring the
development of forest and steppe fires. VI - International Scientific and
Practical Conference "Computer Science and Applied Mathematics".
Institute of Information and Computing Technologies. Almaty, 2021.-
p.60-64
[4] Talgat Mazakov, Waldemar Wójcik, Sholpan Jomartova, Nurgul
Karymsakova, Gulzat Ziyatbekova, and Aisulu Tursynbai. The
stability interval of the set of linear system // Journal of electronics and
telecommunications, 2021. – Vol. 67. – No. 2. – Pp. 155-161. DOI:
10.24425/ijet.2021.135958
[5] G.A. Dorrer.Dynamics of forest fires. Novosibirsk: SO RAN, 2008. -
404 p.
[6] A. M. Grishin, Mathematical modeling of forest fires and new ways to
deal with them. / A. M. Grishin. - Novosibirsk: Nauka, 1992. - 408 p.
[7] G.M. Byram. Forest fire behavior. /G.M. Byram // Forest Fire: Control
and Use. - New York. -1959. - P. 113-126.
[8] I. P. Kurbatsky. Modern theory of the spread of forest ground fires. /
I. P. Kurbatsky, G. P. Telitsyn // Modern studies of forest typology and
pyrology. - Arkhangelsk. - 1976. - S. 90-96.
[9] Z.M. Mitchell. Rule of thumb determining rate of spread / Z.M.
Mitchell // Fire Control Notes. - 1937. - Vol. 6.-P.395-396.
[10] N.N. Krasovsky. Game problems about the meeting of movements /
N.N. Krasovsky. - M.: Nauka, 1970. - 420 p.
[11] G. A. Dorrer. Dynamics of forest fires. / G. A. Dorrer. -Novosibirsk:
Publishing house of SO RAN, 2008. - 404 p.
- 384 -
Phased Array Ultrasonic Inspection Model for
High-speed Train Wheels
Cha Jae Hwan, Kim Cheol Su*, Kang Jeong Hyung* and Kim Kyung Suk*
High-speed Vehicle Division at Korea Railroad Corporation, Republic of Korea
Safety Headquarters at Korea Railroad Corporation, Republic of Korea
Reliability Management Department at Korea Railroad Corporation, Republic of Korea
Email: [email protected], [email protected], [email protected], [email protected]
Abstract—Wheels is subjected to cyclical compression forces The purpose of this research is to study a model of
followed by slackening. This results in strains that can degrade phased array ultrasonic testing capable of detecting cracks
internal defects into fatigue cracks. This paper describes ultrasonic and defects that may occur both internally and externally in
model for Ultrasonic Testing-Phased Array to be demanded the the wheels of KTX trains running on high-speed tracks. The
wheel which is complicated in shape. scope of the investigation for the phased array ultrasonic
testing model for Monobloc Wheels of high-speed trains is
Keywords— ultrasonic inspection, phased array, Wheel Rim, as follows:
Wheel plate, array transducer, array probe, Wheel defect, Wheel
Scanning, focusing method, phased array ultrasonic testing First, Limited investigation focusing on the Monobloc
Wheel for KTX(drawing numbers TRP06572) and the series
INTRODUCTION of KTX-Sancheon(domestic developed high-speed trains).
Ultrasonic inspection is a non-destructive testing method Second, Selection of appropriate array probes for phased
designed to check the internal soundness of materials and array ultrasonic testing based on ultrasonic beam simulation,
detect defects on parts. The operations for wheels are extraction of phased array ultrasonic testing (UT-PA)
basically aimed at detecting internal defects that result in configuration parameters, and configuration of the scanning
fatigue cracks in the mass of the rim in service. A wheel rim method.
is basically inspected from the wheel tread.
Third, Standardization through the preparation of
However, finding defects locating on junction area, calibration test specimens and reference test specimens for
between rim and plate, it could incur wheel breakage with the equipment used in UT-PA.
catastrophic accident, needs simulation model for Ultrasonic
Testing-Phased Array (UT-PA). Through the research on the By introducing UT-PA technology, which is an advanced
ultrasonic detection model for Korea Train Express (KTX) non-destructive testing technique, for KTX and KTX-
wheels, we aimed to enhance the prevention of high-speed Sancheon high-speed train wheels, we have achieved the
train accidents in service and establish more objective and following benefits in terms of accident prevention and
reliable maintenance methods and procedures. operational safety:
Based on the technical documents of French National First, Establishment of a foundation for recording and
Railways (SNCF) using traditional perpendicular sounding managing ultrasonic detection results permanently using
methods, we established a non-destructive testing model digital image-based UT-PA methods.
using ultrasonic probe (or transducer) and phased array Second, The results of image-based UT-PA can be stored
ultrasonic testing advancements in software technology. For as digital files, enabling remote analysis and multi-party
complex-shaped Monobloc wheels, application of Phased analysis, enhancing objectivity and reliability by sharing the
Array Ultrasonic Testing allows more precise inspection. We interpretation results among ultrasonic testing operators and
introduce the results of this ultrasonic testing model. experts.
The inspection of ultrasonic detection presented in ISO Third, Ensuring reliability in the maintenance of high-
5848 focuses mainly on evaluation of rim area and in EN speed trains, thereby guaranteeing the safety of experts,
13632, the rim inspection is similar to ISO 5848. However, operators, and government officials involved.
when inspecting plate(or web) area inspections, considering
the curved shape, specific test specimens(or reference Fourth, Improving customer confidence in the safe
blocks) with artificial defects to detect flaws and procedures operation of high-speed railways, leading to enhanced
needed to be developed. Therefore, the design and customer satisfaction with railway vehicles.
procedures of the ultrasonic detection model are required.
We anticipate that the non-destructive testing technology
To inspect complex shapes accurately, such as curved of phased array ultrasonic testing for integral wheels of high-
plate areas of wheels, it is necessary to apply phased array speed trains will be expanded in the future to include axle
ultrasonic testing. Collaboration among operating companies, shafts, power transmission devices, axle bearings, and other
universities and specialized institutes is needed for the components of general railway vehicles and high-speed
development of professional models, including detection railway vehicles.
methods and specimen development.
- 385 -
THE REREARCH OBJECTIVES EN 13262 generally determines the internal soundness of
For this study, the investigation is limited to the phased- the wheel through ultrasonic inspection. The acceptance
array ultrasonic inspection model of the KTX wheel and the level of ultrasonic inspection for the rim area should not
integrated wheel of the KTX-Sancheon high-speed railway exceed the discontinuity indication representing internal
vehicle. The research objectives were set as follows: flaws, and it specifies the use of flat-bottomed holes with
diameters of 1 mm, 2 mm, or 3 mm (for wheels with
1. Reviewing domestic and international standard procedures operating speeds below 120 km/h). The plate area considers
related to ultrasonic inspection of high-speed vehicle the curvature when setting the sensitivity in the inspection,
wheels. and artificial dis-continuities (flat-bottomed holes) are
located on the surface for inspection. In this standard, the
2. Simulating ultrasonic beams using the CIVA ultrasonic
flat-bottomed holes in the plate area are machined
inspection program.
perpendicular to the plate surface and positioned at a depth
3. Selecting appropriate probes for phased-array ultrasonic of 5 mm from the surface or in the middle of the plate
inspection through simulation of ultrasonic beams. thickness, depending on the thickness of the plate. The basic
aspects of rim area ultrasonic inspection, such as contrast test
4. Confirming the insensitivity zone of the inspection blocks and sensitivity settings, are described in accordance
through simulation of ultrasonic beams. with ISO 5948.
5. Establishing a method for interpreting phased-array KS D ISO 5948 is a Korean standard that is a direct
ultrasonic inspection results. translation of ISO 5948:1994, which was published as the
6. Providing guidelines for the development of phased-array second edition. Although ISO 5948 was revised in 2018, the
ultrasonic inspection procedures. Korean standard does not reflect the revision.
KS R 9221:2021 includes "Ultrasonic Inspection" in
section 6.2.3. The content specifies that the inspection should
DOMESTIC AND INTERNATIONAL STANDARDS FOR be performed using ultrasonic waves with frequencies of 2
ULTRASONIC INSPECTION OF RAILWAY VEHICLE WHEELS MHz to 5 MHz ac-cording to KS B 0817. The timing and
The domestic and international standard procedures inspection area for ultrasonic inspection are limited to the
related to ultrasonic inspection of high-speed vehicle wheels rim area after heat treatment, and it is described simply as
are presented(see Table Ⅰ). These standards are intended for "there should be no harmful echo due to discontinuities."
Here, KS B 0817 is a standard for the general principles of
ensuring the quality assurance of newly manufactured
ultrasonic pulse re-flection and does not provide criteria or
wheels for high-speed vehicle wheels and not for
quantitative assessment standards for ultrasonic inspection.
guaranteeing the quality of wheels in use during operation.
However, since there are no specific standards for inspecting
wheels in use, the standard procedures for inspecting newly
manufactured wheels are being applied. SIMULATION OF ULTRASONIC BEAM FOR PLATE AREA
INSPECTION
TABLE I. RELATE INTERNATIONAL AND DOMESTIC STANDARDS Ultrasonic inspection of the plate area of high-speed
Standard
Revision vehicle integral wheels is only recorded in EN 13262, and
Category Standard Name Year(Estab this ultrasonic inspection should be performed by introducing
Number
lishment) ultrasonic waves perpendicular to the plate surface. However,
Railway rolling stock
ISO 5948 material - Ultrasonic
2018 such inspections are not possible when the wheels are
(1981) installed on the vehicle during operation. Therefore, to
acceptance testing
International inspect the wheels while they are mounted on the vehicle
Railway applications -
Standards
EN 13262
Wheelsets and bogies - 2020 during operation, simulations were conducted considering
Wheels - Product (2004) the restriction that ultrasonic waves should be introduced
requirements
from the back surface of the wheels.
Rolling stock materials
KS D ISO for railway vehicles - No revision 1. Input information for simulation (Probe: 5L32-A11)
Domestic 5948 Ultrasonic inspection (2002)
Standards test methods - Frequency: 5 MHz
Railway vehicle 2021 - Total array elements: 32 elements
KS R 9221
wheels (2000)
- Array pitch: 0.6 mm
- Active aperture array elements: 32 elements
International standard ISO 5948 provides detailed
information on ultrasonic inspection of the rim area of - Ultrasonic velocity: Longitudinal wave - 5,920 m/s
railway vehicle wheels and the axle (hollow and solid) of 2. Simulation of plate area inspection
railway vehicles. This standard defines the size and position
of the reference reflector to be included in the calibration test a) Perform S-scan simulation for the range of incident
block (contrast test block) for phased-array ultrasonic angles from 0° to -20° by contacting the array probe on
inspection of wheels. It also specifies the diameter of the flat- the back surface of the wheels.
bottomed hole used for setting sensitivity and establishing b) This is done to send ultrasonic waves to the apex of the
acceptance levels for flaw detection as 3 mm (for high-speed convex part of the plate area.(Position the array probe at
wheels, 2 mm is used, subject to inquiry or order). The the right side of the back surface 60 mm and perform 0°
specific size to be used within this range is determined by the to -20° S-scan)
ultrasonic inspection technique specification.
- 386 -
e) Simulations The initially received signals in the
ultrasound signal simulation for the notches depicted in
Figure 2 are the signals that are reflected and mode-
converted from the curved shape of the plate.
f) It is necessary to appropriately adjust the data signal
window to avoid collecting such mode-converted
signals.
g) Regardless of the depth of the notch, the ultrasound
signal with an angle of 14 degrees has the highest
amplitude, and the signal magnitude increases with an
increase in the notch depth.
Notch Depth(mm) 2 4 6
Increase in Signal
Reference Signal +12.2 +16.5
Amplitude (dB)
- 387 -
CONCLUSION
In this study, ultrasound simulations were performed REFERENCES
using the CIVA software, and based on the simulation results,
the feasibility of phased-array ultrasound inspection for
wheels was evaluated, and the inspection settings were [1] ISO 5948 “Railway rolling stock material – Ultrasonic acceptance
testing”, 2018
determined. Additionally, the calibration of equipment and
[2] EN 13262. “Railway applications - Wheelsets and bogies - Wheels -
setting of inspection sensitivity were performed by reviewing Product requirements”, 2020
and designing calibration test pieces and contrast test
[3] KS D ISO 5948 “Rolled materials for rolling stock - Ultrasonic
piece(reference block) before conducting the inspection. inspection test method”, 2017
These are summarized as follows:. [4] KS R 9221 “Wheels for railway vehicles”, 2021
1. For the inspection of the wheel rim area, it is [5] Railroad Equipment Construction Specification KRCS B 283 “High-
recommended to use a phased-array probe with a speed vehicle integrated wheel”
pitch of 1 mm, 32 array elements, and a frequency of [6] Korea Railroad Corporation, Phased Array Ultrasonic Inspection
(UT-PA) Procedure for Wheels of High Speed Vehicles (KTX, KTX-
5 MHz (such as the 5L32-A32 probe). Sancheon)
2. For the inspection of the wheel plate area, it is
preferable to use a phased-array probe with a pitch of
0.6 mm, 32 array elements, and a frequency of 5 MHz
(such as the 5L32-A11 probe).
3. The inspection of the wheel rim area is per-formed
with eight active elements, and the scanning is carried
out with 0° E-scan and 10° E-scan according to the
contact area.
In the future, it is necessary to verify the phase-array
ultrasound inspection sensitivity for the wheel plate region
using echoes generated by notches on the test specimen and
experimentally validate the detectable notch size. When
performing the inspection with a phased array ultrasonic
probe at a fixed probe position, it is observed that there are
regions of inspection insensibility due to the inability of
phased array ultrasonic inspection or the exclusion of signal
collection caused by mode conversion.
- 388 -
ICT Convergence Roof Installation Solar
Location Tracking Solar Power Generation
System
Abstract—Starting with the Renewable Energy Mandatory II. ROOF-TYPE SOLAR TRACKING POWER GENERATION
Allocation System (RPS) in 2012, the spread of renewable energy SYSTEM STRUCTURE
has expanded, and the use rate of renewable energy is improving
worldwide through the RE100 (Renewable Electricity 100) A solar tracking system was applied to increase the power
campaign. Among them, solar power generation, which is less generation efficiency of solar panels. Solar tracking affects
affected by environmental destruction, is in the spotlight, and in power generation efficiency. The power generation efficiency
particular, a solar power generation system installed on the roof of the short-term solar tracking system and the fixed solar
of a building is in the spotlight without the use of a large space. power system to be applied in this study was referred to, and
However, the power generation efficiency is lower than that of it was confirmed that the power generation efficiency of the
other solar power generation facilities, and in residential areas, short-term solar tracking system increased compared to the
secondary damage may occur due to damage to solar panels. In fixed solar power system[4]. for accurate solar tracking, in
order to solve this problem, we propose an ICT convergence type addition to adding a separate sensor for solar tracking, a
short-term solar power generation system that has a simple tracking method using data from the Korea Astronomy and
structure and can increase solar power generation efficiency. Space Science Institute was compared and analyzed for solar
tracking [5].
Keywords— Solar energy generation, Solar tracking frame
structure, Rooftop, Solar tracking system, Structure. In case of the method of changing the angle of the solar
panel, the two-axis solar tracking method has a higher
I. INTRODUCTION efficiency than the one-axis method. However, the two-axis
The International Energy Agency (IEA) has predicted that solar tracking method is structurally complex because it
solar power will lead the market as the cheapest renewable requires two drive shafts, and it is burdensome to the weight
energy in its World Energy Outlook 2020 report. In line with when installed on the roof. Therefore, we selected the one-axis
this prediction, a wave of green energy is blowing, and tracking method, which is structurally simple and easy to
measures are being taken to achieve carbon neutrality around install and maintain on the roof, and safe in terms of weight,
the world, and solar power is the focus of attention[1]. The although it has a lower efficiency than the two-axis tracking
Korean government also joined the global carbon neutrality method. For the field test of the one-axis tracking method, we
movement and made it mandatory for public buildings to designed a 3kW solar power system with fixed and one-axis
obtain zero-energy building certification under the Green solar tracking methods and installed the power system on the
Building Support Act. From 2025, private buildings with a roof of a real building. Regardless of the angle of the building
floor area of more than 1,000 square meters, all public roof, the frame structure was designed as shown in Figure 2
buildings with a floor area of more than 500 square meters, and the driving unit adopted a worm gear structure in
and apartment buildings with more than 30 households will be consideration of the load and maintenance of the building roof
built as zero-energy buildings. From 2030, all buildings with while maintaining an angle for optimal power generation
a floor area of more than 500 square meters will be zero- efficiency. The worm gear structure has the advantage of
energy buildings[2]. Solar power is infinite, anyone can use being able to adjust the angle of the solar panel with relatively
it, and it has a high utilization rate because it can be installed little force due to its high deceleration ratio, and also to
close to life, as it has less noise than other renewable energy. prevent reversal, so it can maintain the angle even if there is a
In particular, power generation through roof-top solar panel load on the solar panel due to wind.
installation in residential areas is possible to utilize idle space
without allocating separate land, and it is free from regulations
on distance between facilities.[3]. This study conducted
research on a solar tracking power generation system that can
be installed on the roof of a residential area without allocating
a separate land area. ICT technology was also applied to
minimize the damage of solar panels from natural disasters in
residential areas.
- 389 -
III. SAFETY MEASURES FOR ROOF-TYPE SOLAR TRACKING IV. CONCLUSION
SYSTEM
Roof-type solar tracking power generation systems can be In the context of the global carbon reduction issue and the
vulnerable to natural disasters because they are additionally research on various renewable energy, we have conducted a
installed on the top roof of the building, and secondary study to improve the efficiency and safety management of
damage can occur if solar panels are damaged due to such roof-mounted solar power systems, which are the most
natural disasters. Therefore, in this study, ICT technology is popular solar power systems that are closely related to life.
applied to the roof-type solar tracking power generation
system to prevent damage to the solar power generation Roof-mounted solar power is a field that is expected to
system in advance. As shown in Figure 3, in order to prevent continue to grow due to factors such as the fact that it can be
damage to solar panels from natural disasters caused by strong installed without additional land and the phased mandatory
winds and snow, information on strong winds and heavy snow implementation of zero-energy buildings. In particular, in
was collected through weather information and an avoidance Korea, where there are many mountains and it is difficult to
driving method was implemented accordingly. In addition, it secure large pieces of land, the roofs of residential areas and
was intended to maximize the efficiency of the solar power industrial complexes have high potential for development.
generation system through regional and seasonal information However, the existing fixed method had a problem that the
such as sunset and sunrise by the Korea Meteorological efficiency was not high compared to the installation cost. In
Administration. this study, we solved this problem by using a short-axis solar
tracking system that is advantageous for application on the
roof. In addition, we proposed an ICT-integrated solar power
system that can prevent damage to solar panels and secondary
damage caused by it by using information from the Korea
Meteorological Administration, such as seasonal sunrise and
sunset information.
REFERENCES
Fig. 2 Avoidance drive for solar panel damage and power generation
efficiency increase [1] “World Energy Outlook,” International Energy Agency, 2020.
[2] J. W. Kim and S. K. Park, “A study on the establishment of statistics
for the package of building energy efficiency improvement policy,”
Korea Energy Economics Institute, June 2021.
Based on the Korea Meteorological Administration's [3] W. Moon, “Trends for separation distance regulations of photovoltaic
regional forecast, a scenario was created for heavy snow and facilities,” The Korean Institute of Electrical Engineers, pp. 23-27, June
strong winds that are expected to be damaged by weather. 2022.
When a snow forecast occurs, the solar panel's angle was [4] H. K. Song, K. S. Lee, and Y. S. Choi, “Comparison of generation
adjusted to the wind's angle to reduce damage. amount and operating time for fixed-concentrated type and single axis
trace type of photovoltaic”, Journal of the Korean Institute of Electrical
The strong wind avoidance mode to anticipate damage to and Electronic Material Engineers, vol. 28, no. 11, pp. 743-747,
the roof-type solar power generation system enables November 2015.
avoidance maneuvers when the wind speed over 25m/s, and [5] J. H. Hong and E. S. Kim, “Tracking method of inclination-dependent
the snow cover avoidance mode of the photovoltaic panels 2-axis solar tracker,” Journal of the Institute of Electronics Engineers
of Korea, vol. 50, no. 11., pp. 180-187, November 2013.
enables avoidance maneuvers when the snow cover over 3cm
above the solar panels. The system was developed, and Figure
3 is the avoidance maneuver algorithm and test by strong wind
and snow cover.
- 390 -
Study on the collapsing of artificial retaining
wall facility using acoustic emission
Kwang Bok Kim 1, Bong Ki Kim 1, Woon Kyung Kim 1, Tae Hun Kim 1,
Sung Hun Park 1, Saurabh Kumar 1, Jun Gil Kang 1 and Kyung-Wan Koo 2*
1
Integrity Diagnostic Korea Co. Ltd., Republic of KOREA
2
HoSeo University, Republic of KOREA
Email: [email protected]
Abstract- This paper is a study of the process of retaining wall preamplifier and amplified with a gain value of 40dB. The
collapse using the AET technique. Pile type AE Sensor specially AET system, equipped with two PCIe slot-mounted DAQ
designed to collect AE data during the collapse of the retaining wall boards (8-channel type), measured and automatically saved
was manufactured. The artificial reinforced retaining wall was made the signals flowing from the nine AE sensors to a PC. The
to be 27 square meter and height 3 meter. It consists of reinforced
soil and concrete blocks that are most commonly used for reinforced
data were collected at a maximum speed of 10Msps for each
soil retaining wall. The pile type sensor was installed vertically in sensor. The collected AE data were analyzed using the AE
retaining wall at a depth of 1 m and connected to the AET system Studio software developed by IDK, after removing
using a cable. AE data was collected and AE parameters were environmental noise. The timing control function values
converted by collapsing into forklifts. The signal strength in AE during data collection were set according to Table 1.
parameters showed the best AE characteristics during the collapse
process. After applying the 2D CNN model of artificial intelligence,
85% of the five-step collapsing process could be confirmed.
I. INTRODUCTION
The application of inclinometers, subsurface Fig. 1. Retaining wall testbed
inclinometers, displacement gauges, drones, and imaging
techniques in the prediction of wall and slope collapse has Table 1: AE Data collection parameters
been increasing. Real-time digital data conversion is
Parameter Value Parameter Value
necessary to enable the transition to early warning systems by
detecting small ground movements. To develop a prediction P/A gain (dB) 40 HDT (us) 400
technique for wall collapse using acoustic emission testing sampling rate
(AET), a pile-type AE sensor was developed [1]. This sensor 10 PDT (us) 200
(MHz)
is a real-time system that can detect ground movements by
drilling and inserting it deep into the ground and transmitting Pre-trigger 400 MHD (us) 10,000
micro-elastic waves to provide warnings of the collapse point. Threshold (dB) 30 HLT (us) 4,000
In this study, a reinforced soil wall was constructed in an
outdoor test bed as a preliminary step of empirical research, HPF (kHz) 50 Noise AVG TC (us) 100,000
and AE data related to the collapse process were collected to
LPF (kHz) 300 Signal AVG TC (us) 100,000
establish a collapse prediction based on AE feature values.
II. MAIN BODY B. characteristics during wall collapse
The AET system was installed in the outdoor test bed and
A. Reinforced retaining wall
observed using a real-time web monitoring system. CCTV
Reinforced soil walls were constructed in a designated cameras were installed for safety reasons, considering
area, with two sets of 2m x 2m and one set of 3m x 3m as potential hazards, and environmental data were collected
shown in Fig. 1. The exterior was made of concrete blocks, during the summer season, including typhoons, rainfall, wind,
and three types of reinforcing soil were compacted inside. etc. Subsequently, during the winter season and thawing
Pressure gauges were installed to measure the overall pressure period, the wall was artificially collapsed, and AE data were
of the soil. After soil compaction, nine 1m-long pile-type collected and analyzed in March 2023.
sensors were installed at 1m distance from each other. These
pile-type sensors were designed to detect micro-displacement- a) Environmental data and AE
induced elastic waves by attaching piezoelectric ceramics to The relationship between AE signal strength values and
the sensor line, which resonates at a maximum resonance at precipitation, wind and temperature were investigated. The
60kHz. AE signal strength values increased with precipitation, as the
a) AE Data collection top part of the pile-type sensors did not submerge entirely into
the reinforced soil. However, the AE values showed little
The acoustic emission testing collection device (IDK-
variation with wind and temperature.
PU16) developed by IDK was waterproofed and placed in a
waterproof box for real-time data collection. The data
collected from the file-type sensors were amplified through a
- 391 -
Fig. 2. AE data variation according to precipitation, wind and Fig. 4. Angle sensor and AE data relation
temperature
Figure 5 shows the trend of hit count intervals for
b) Wall collapse process generating the H index every 5 seconds during the collapse
process. The collected hit rates for each of the ten intervals
Figure 3 illustrates the images of the wall collapse process.
were used to calculate the HS index using Equation (1).
The wall was artificially collapsed using a forklift crane with
an 800kg load. AE data were collected throughout this
process.
- 392 -
Technique for the use of matching circuits in
the transmit-receive path of the uav radio control
channel in conditions of icing of the antenna
device
Nurbolat Ondyrbayev1*, Nursultan Nurzhauov2, Anna Sutiko3, Pavel Boikachev4,
, Katipa Chezhimbayeva5, Asel Yerzhan6
1, 2, 5, 6
Almaty University of Power Engineering and Telecommunications named after Gumarbek Daukeev, Kazakhstan
3, 4
Military Academy of Belarus, Belarus
Email: [email protected]
The results of experimental studies of the antenna impedance technical characteristics [1]. Regardless of the methods used,
of the control channel, an unmanned aerial vehicle in icing the first stage of the synthesis of matching circuits is to study
conditions is presented. A mathematical model of the antenna of and set the initial properties of the matched load. As a rule, the
the control channel of an unmanned aerial vehicle in icing input characteristics of the matched load are presented in the
conditions and without them is presented. One of the approaches form of discrete points of the real and imaginary components
to the representation of the characteristics of the RTAs that are of the function describing the considered parameter of the
part of the RTAs (amplifiers, frequency filters, AD, etc.) is complex resistance – [2]. Such a representation is not always
analytical mathematical modeling based on the approximation of
informative enough and is not applicable for use in many
the results of experimental data. Such a mathematical model is
modern methods of synthesis of broadband matching and
based on a comprehensive analysis of the behavior of the system
and extensive use of the results of previously conducted statistical
frequency-selective devices that require equivalent circuits or
studies. The method of synthesis of broadband matching devices analytical representations of matched loads [3].
adapting radio engineering systems to varying load impedance in As a rule, the impedance characteristics of the matched
a wide range of natural conditions of their operation is shown. A loads are represented by numerical series of values of two
broadband matching circuit has been synthesized for the antenna quantities: independent (yi) and dependent (xi), each of which,
device of the control channel of an unmanned aerial vehicle in in general, in addition to a certain regular (deterministic)
icing conditions, which provides a gain in the potentially
component, may contain random components of a very
achievable radio line range of up to 25% relative to the antenna
different nature. This is due to both the statistical nature of the
device without a matching circuit.
processes under study and a variety of external factors of
Keywords – unmanned aerial vehicle, icing, broadband measurement and data transformation processes (noise,
matching, invariant, sensitivity, impedance, mathematical interference, destabilizing factors and measurement errors). In
modeling, synthesis technique. our case, these are temperature effects and icing. At the same
time, according to the central limit theorem, it is assumed that
I. INTRODUCTION the values of the random component of the dependent variable
Modern unmanned aerial vehicles (UAVs) are a complex (both own and "total") are distributed according to the normal
system that, depending on the tasks being solved, includes probability law [6].
control subsystems, navigation, reconnaissance, etc. These Based on this, [7] presents a methodology for determining
subsystems, being consumers or sources of information, have the required sample size N (the number of full-scale, semi-
antenna devices (AU) in their composition, providing control natural or model experiments conducted), in which the
of UAVs, exchanging video data with the operator, etc. The mathematical expectation of a particular characteristic is
impedance (input complex resistance) of many AU strongly determined with the specified values of reliability indicators
depends on disturbing influences [1]. The presence of various (characterized by the value of confidence probability) and
kinds of disturbing influences is especially important for accuracy (characterized by the value of relative error).
mobile systems. A striking example of such systems are
UAVs. A change in the impedance leads to a loss of power of Table I shows the required sample size for estimating the
the transmitted or received signal, which is the reason for the mathematical expectation of a normally distributed
lack of communication between the UAV and the control characteristic with a coefficient of variation equal to one.
point. Given the operating conditions of the UAV, one of the
most likely external influences are strong temperature TABLE I. THE REQUIRED SAMPLE SIZE TO ESTIMATE THE
MATHEMATICAL EXPECTATION WITH A COEFFICIENT OF VARIATION EQUAL
fluctuations and icing. TO ONE.
II. COORDINATION OF THE AD OF THE UAV The value Relative error value, %
of the
CONTROL CHANNEL AND THE RECEIVING AND confidence 30 25 20 15 10 5 1
TRANSMITTING MODULE probability
Modern methods of broadband matching are characterized 0,5 5 7 11 20 46 182 4556
0,6 8 12 18 31 71 282 7056
by significant opportunities for the development of radio
0,7 12 17 27 48 108 433 10820
engineering devices (RTU) for various purposes with high
- 393 -
0,8 18 26 41 73 164 657 16440 m1 = a0 + a2 s 2 + ... + a2 k s 2 k - the even part of the numerator
0,9 30 43 68 120 272 1080 26990
0,95 43 62 96 171 384 1537 38420 of the function f (s) ;
0,99 73 106 166 295 664 2654 66360
m2 = b0 + b2 s 2 + ... + b2 q s 2 q
- the even part of the
denominator of the function f (s ) ;
The totality of the data characterizing the RTU is
processed, i.e., the data obtained are presented in a definite n1 = a1s + ... + a(2 k −1) s (2 k −1)
and balanced system, which becomes the basis for further - the odd part of the numerator
meaningful analysis, interpretation and scientific conclusions, of the function f (s ) ;
and practical recommendations. As a result, we obtain data
from experimental studies of the RTU characteristic under n2 = b1s + ... + b(2 q −1) s (2 q −1)
- the odd part of the denominator
consideration (in the form of a table or graph), in which each of the function f (s ) .
value of the input factor (Xm) corresponds to the value of the
output factor (Ym), i.e. a pair of numbers (хmi, ymi) All coefficients for s must be real and non-negative, and
corresponding to a point estimate of the mathematical the higher powers of the polynomial of the numerator (k) and
expectation of the estimated characteristic is known – a denominator (q), as well as their lower powers, cannot differ
regular component of experimental data. As an example, by more than 1; zeros and poles of this function must alternate
Figure 1 shows the processed results of measurements of the on the imaginary axis of the plane s [11].
impedance of the pin antenna of the UAV control channel
For 2N-poles, the function f(s) must have the properties of
without icing and as a result of icing.
the input resistance Z(s) of these two-poles. The input
In practice, to solve engineering problems, the function functions of such four-poles belong to the class of so-called
values are also needed at other points other than those positive real functions (PRF), which satisfy the following
specified in the table. In this case, it is necessary to resort to additional condition: Re[f(s)] 0 or Re[Y(s)] 0 by s 0.
interpolation (or interpolation) – approximate finding of
unknown values of functions by its known values at specified Also, it is necessary to consider that positive real functions
points. always represent the ratio of two Hurwitz polynomials, i.e.,
the zeros and poles of such functions are located in the left
half-plane. In addition, if the PRF has poles or zeros on the
imaginary axis (including s = 0 and s = ∞), then these poles
and zeros are real and positive.
Based on the limitations presented above, to solve the
problem of approximation of the impedance characteristics of
complex loads, it is proposed to use a fractional rational
function of the form (1) as an approximating function [4].
Using a mathematical transformation, we will represent
expression (1) in the form even Ev f (s) and odd Od f (s) parts
from f ( s) :
Fig. 1. Graphical representation of the processed results of measuring the mm −nn
impedance of the pin antenna of the UAV control channel. 1, 3 – the real Ev f ( s) = 1 22 12 2 ;
part of the AD impedance without icing (under icing conditions); 2, 4 - the m2 − n2 (2)
imaginary part of the AD impedance without icing (under icing conditions).
n1m2 − m1n2
Od f ( s ) = .
Thus, the result of processing experimental data is a m22 − n22 (3)
reference mathematical model of the object of study,
presented in the form of an interpolation (with multiple By s = iω we have:
experiments) or smoothing (with a single experiment) cubic
Ev f ( s ) s=iω = Re f (iω)
spline, which most accurately describes the results obtained ;
during experimental studies and satisfies the requirements and Od f ( s ) s=iω = i Im f (iω)
limitations imposed on curves and surfaces describing .
functional dependence experimental studies. However, it is
Expressions (2) and (3) are proposed to be used as
necessary to pay special attention to the fact that such a
approximating functions and components of the input and
reference mathematical model cannot be used to solve various
transfer characteristics of the object of study. To find the most
engineering problems, because it does not correspond to the
optimal coefficients of approximating functions, it is
physical nature of the modeled process, which has the
necessary to use methods of nonlinear optimized procedures
following limitations [8].
using computers (for example, the Levenberg-Marquardt
Based on the conditions of physical feasibility [9], the optimization method [11], [12]). It allows you to form an
impedance characteristics of RTU are fractional rational analytical mathematical model (AMM) of the input and
functions of the form: transfer characteristics of the RTU with a high degree of
adequacy (with a confidence probability of at least 0.9 and a
a0 + a1s + a2 (s ) 2 + ... + ak (s ) k
f (s ) = , relative error of no more than 10%) [7].
b0 + b1s + b2 (s ) 2 + ... + bq (s ) q
(1) Based on the above, the technique for approximating the
Where impedance characteristics of radio engineering devices has the
following form (Figure 2).
s = iω - complex variable;
- 394 -
The essence of the technique is as follows: a3 52.215 b1 1.382 b5 1.187
b)
Fig. 3. Functions of the input resistance of the AD without icing (a) and
under icing conditions (b) (points) and its calculated AMM (solid lines)
in the operating frequency band.
- 395 -
Fig. 6. The results of the experiment: a) in conditions of icing; b) without
icing; c) in the form of dependencies of CaVM on frequency.
REFERENCES
[1] Filippovich, G.A. Broadband matching of resistances // G.A.
Filippovich: monogr. / G. A. Filippovich. - Minsk: MA RB, 2004. -p.
175.
[2] Kaganov, V.I. Automatic control systems in radio transmitters / V.I.
Kaganov- M.: Svyaz, 1969. - 256.
[3] Sviridenko, A.A. The technique of broadband matching of loads with
concentrated parameters based on a generalized scattering matrix /
A.A. Sviridenko, M.A. Yantsevich // Information technologies in
education, science and production: VI International Scientific and
Technical Internet Conference, November 17-18, 2018[Electronic
resource]
Fig. 4. The method of synthesis of MC for broadband RED s with varying [4] Isaev V. O., P. V. Boikachev – a Way of finding an appropriate
load impedance. mathematical models of the wireless devices with the unstable
impedance // "Metrology and instrumentation" №1(92) 2021. – pp. 9–
16.
[5] Isaev V. O., P. V. Boikachev Analytical mathematical modeling of the
input characteristics of radio systems // "problems of physics,
mathematics and technology" №3(48) 2021. – pp. 88–95.
[6] Wentzel, E. S. Probability theory: ed. 10 / E. S. Wentzel. - M.:
Publishing Center "Academy", 2005. -p. 576.
[7] Kosachev, I. M. Methods of calculating the reliability and accuracy of
Fig. 5. The stair structure consisting of five elements. а – schematic the estimated tactical and technical characteristics of weapons, military
diagram; b – the appearance of the MC. and special equipment / I. M. Kosachev, D. S. Nefedov // Vetsnik of
the Military Academy of the Republic of Belarus. – Minsk, 2015. –
№1(46). – p. 107-135.
It should be noted that the implementation of the
[8] Isaev, V. I., Dubovik, I. A., Boikachev, P. V., Sutiko, A. A.
schematic diagram (Figure 5 a) in the protective housing Mathematical model of radio devices / V. A. Isaev, I. A. Dubovik, P.
(Figure 5 b) has insignificant dimensions and weighs 8 grams, V. Boikachev, A. A. Sutiko // II international Scientific and Practical
which is acceptable for use in the UAV control channel path. Conference "Endless Light in Science", the city of Nur-Sultan, 6-8 may
2020, Kazakhstan, 2020. – p. 27-33.
The use of SC in the receiving and transmitting path of [9] Carney, S., circuit Theory. Analysis and synthesis. - M. "Svyaz", 1973.
the UAV control radio channel provides the power -p. 269.
transmission level shown in Figure 6, where the solid line [10] Lanne, A.A. Optimal synthesis of linear electrical circuits / A. A.
shows the dependencies with the synthesized MC, and the Lanne. - M.: Svyaz, 1969. -p. 294.
dashed one without it. [11] Levenberg K. A method for the solution of certain problems in least
squares // Quart. Appl. Math., 1944. № 2. pp. 164-168.
After analyzing the dependencies presented in Figure 6
[12] Marquardt D. An algorithm for least-squares estimation of nonlinear
(c), it can be concluded that the use of MC provides a high parameters // SIAM J. Appl. Math., 1963. No. 11. pp. 431-441.
level of power transmission from the signal source to the load [13] Boikachev, P.V., Method of synthesis of broadband devices with
(reducing losses from 38% to 13%), both in normal conditions optimal characteristics of the power conversion coefficient matching
and in conditions of icing of the AD, which makes it possible the load impedance varying in time / I. A. Dubovik, P. V. Boikachev,
to provide a UAV control channel with stable radio V. O. Isaev // [Electronic resource] Journal of Radioelectronics. - 2021.
communication. - No. 5. - Access mode: https://doi.org/10.30898/1684-1719.2021.5.1
- 396 -
Designing a special mobility (hot air balloon)
communication interface
Seung-Hwan Byun1*, Kyung-Wan Koo2, Mun-Sung Kim3, and Jong-Gyu Kang4
1
Daejeon University, Korea
2
Hoseo University, Korea
3
Daejeon University, Korea
4
MetaCom Ltd., Korea
Email: [email protected]
Abstract—This paper designs and implements a to expand from $1815.5 million in 2019 to $220.8 million in
communication protocol that acquires real-time sensor data and 2026, with an average annual growth rate of 4.94 percent
provides it to ground control points in order to establish a safe (CAGR) from 2020 to 2026[1].
hot air balloon system. Real-time sensor data includes
temperature, wind direction, wind speed, altitude, speed, air B. the present situation
pressure, and fuel volume inside the hot air balloon, and a However, the current hot air balloon system is still being
database of data on the flight schedule and acquisition during adjusted in an analog way. Hot air balloons in the sky are
flight to establish a safe hot air balloon system where all flown only with the ability of pilots, and the support team on
equipment is sensed. The hot air balloon system, which is a the ground wants the balloon to land safely after about an hour
ground control, was constructed by limiting the maximum of flight while talking on the radio. The ground support team
transmission distance between the hot air balloon and the cannot directly check the condition or environment of hot air
mobile control station to within 6km.
balloons in the sky and cannot conduct integrated control.
Keywords—special mobility, hot air balloon, LoRa Gateway, Since hot air balloons can be used in various ways for events,
wireless, sensing tourism products, or environmental monitoring, there is no
system to communicate and monitor internal and external
I. INTRODUCTION situations of hot air balloons in flight in real time with the
ground, so it is necessary to develop a communication system
A hot air balloon is a device that freely flies propane liquid with these functions.
gas through the air heated by the flame of the burner to obtain
buoyancy through the rise and fall of the temperature inside
the Guppy. Hot air balloons are very simple in concept and
handling, consisting of a guppy and fuel system (frames and
burners to support the load) and finally a basket to carry
passengers and pilots. Goofy is manufactured using Nylon66
with high durability and strength, and the road tape made of
super-strong PE is designed to withstand the load or maintain
the pressure of the expanded hot air balloon. The burner has a
structure that increases efficiency by expanding the pressure
of the stored fuel (liquid propane). Currently, hot air balloons
are operated by skilled coordination of pilots, and only simple
information is provided by phone through radio with ground
control stations[1]. Fig. 1. Guppy Internal Structure - To be measured and Ready to Take Off
– To Determine the Situation
This paper designs and implements a communication
protocol that acquires real-time sensor data and provides it to This paper designed a system to cope with the problems of
ground control points to build a safe hot air balloon system in hot air balloons listed below by combining sashing technology
a hot air balloon system that has been in operation since 1783. and communication technology to cope with problems that
Real-time sensor data includes temperature, wind may occur when operating hot air balloons.
direction, wind speed, altitude, speed, air pressure, and fuel 1) weather limit
volume inside the hot air balloon. In order to establish a safe
hot air balloon system where all equipment is sensed, the - The ground wind speed at takeoff shall not exceed 15kt
control station has established a database on the flight history (27km/hor 7.5 m/s).
(passenger information, flight path, flight time, video - It is possible to fly only in very weak thermal conditions.
information, etc.).
- Flights should be prohibited in situations where active
gusts or gusts are expected.
II. NEED TO BUILD A SYSTEM 2) the condition of a hot air balloon
A. marketability - The hot air balloon shall stop taking off without delay if
According to QY Research's "Global Hot Air Balloon any abnormality is found in the pre-inspection.
Ride Market Size (Status and Forecast 2020-2026)" in - If severe damage to the Guppy due to obstacles or
September 2020, the global hot air ride market size is expected problems such as cable wires, road tapes, cylinders, and fuel
- 397 -
hoses of the burner occur before takeoff, take-off shall be If the maximum rising speed is from 3 m/s (600ft/min) to
stopped. 5 m/s (1000ft/min), it shall not exceed the limit temperature of
the Guppy internal thermometer. The maximum descent speed
- It is prohibited to fly without the maintenance of a shall also not exceed 5 m/s (1000ft/min). Within the allowable
designated technician. range of the internal thermometer, the Race-1(50, 60, 70)
series has a maximum rise and fall speed of 7 m/s
(1,400ft/min).
7) Internal temperature
During normal use, the maximum temperature inside the
guppy shall not exceed 120 ℃ (250 ℉ ). The Guppy
temperature close to the burner shall not exceed 130°C (266
℉).
- 398 -
- A monitoring system was designed to receive data D. Smartphone interworking through IoT G/W
transmitted from a hot air balloon and display it on a server or If you use the IoT board (Wemos D1R1) without using the
mobile terminal using a LoRa communication method. Unoboard on the Master node, you can transmit data to your
- Through the development of a prototype of the system as smartphone in real time with MQTT in a WiFi Internet
described above, it was mounted on a hot air balloon and environment. MQTT is a TCP-based prototype for the Internet
tested. of Things (IoT). It is designed to operate well even in low-
power and low-performance devices. Publisher/Broker
A. Hot air balloon radio monitoring system configuration /Subscriber is in the main configuration area[6][7][8].
diagram
The radio communication band of communication
between hot air balloons and ground sand petitions used the
900 MHz band as the common frequency band used by LoRa.
The terminal mounted on the hot air balloon was defined as a
LoRa node. The information obtained from the hot air balloon
is transmitted to the LoRa IoT gateway installed at the mobile
control station of the award through LoRa communication,
where data is transmitted to the IoT server or smartphone
terminal[2][3].
Fig. 7. Smartphone interworking through IoT G/W
- 399 -
VLAN Network Architecture for Trains to
Trains Communication
Youngjung Kim1 Marina Asankulova2 and Kyuhyoung Choi 1*
1
Seoul National University of Science and Technology, Korea
2
LLC Tendik Audit, Kyrgyzstan
Email: 1 [email protected], 2 [email protected] 1* [email protected]
Abstract— Urban railways are used as an integral means of to find the train ahead. This method causes network
transportation as cities develop. Train control systems have communication delays as the connection between the train and
been developed to operate urban railways safely and efficiently. the AP turns into a runner. This paper proposes a Virtual Local
With the development of science and technology, train control Area Network (VLAN) network structure suitable for T2T.
systems have gradually evolved from track circuit-based train
control methods to wireless communication-based
Communication Based Train Control (CBTC). The current
CBTC is a centralized train control system. Recently, research II. BACKGROUND
on train control using train-to-train communication has been A. Conventional centralized CBTC system
advanced. The following problems occur in the train-to-train
communication method in the existing network structure. A Urban railways have been used as an indispensable means
train wants to communicate with the preceding train. Trains of transportation as cities develop. Train control systems have
broadcast Address Resolution Protocol (ARP) to the network to been used in the past to utilize track circuit-based fixed blocks.
find the train ahead. This method causes network The fixed blockage system caused congestion problems with
communication delays as the connection between the train and saturated cities, so wireless communication technology-based
the AP turns into a runner. This paper proposes a Virtual Local CBTC was adopted to increase line capacity and reduce
Area Network (VLAN) network structure suitable for T2T. running time. The CBTC system is a mobile blockage system
that does not rely on existing track circuits.[2]
Keywords— CBTC, VLAN, ARP
The existing centralized Wireless Local Area Network
I. INTRODUCTION (WLAN)-based CBTC has a center receiving information
Urban railways are used as an integral means of such as train speed, direction and position, as shown in Figure
transportation as cities develop. Train control systems have 1. In addition, the center calculates the operating status in real
been developed to operate urban railways safely and time and transmits operating information such as train speed
efficiently. With the development of science and technology, and traveling direction to the following train. A zone
train control systems have gradually evolved from track controller (ZC) receives and processes information such as the
circuit-based train control methods to wireless speed and direction of travel of the preceding train. The ZC
communication-based Communication Based Train Control then transmits Automatic Train Protect (ATP) and Automatic
(CBTC). So far, CBTC is a centralized communication system Train Operation (ATO) data (train position, safe route, train
with train - track transformer - center - track transformer - train tracking, train operation restrictions, failure reports) to the
communication. Such a centralized train control system must train behind in cooperation with the interlocking device.
stop all trains for safety in the event of a failure of the central Automatic Train Supervision (ATS) serves to monitor and
center. To ameliorate such inefficiencies, train-track record ZC and interlocking devices.[2]
displacement-train communication requires a virtual train-to-
train virtual communication scheme. A recent study [1] also
advanced Train to Train (T2T) research using LTE PC5 Link.
The following problems occur in the train-to-train
communication method in the existing network structure. A
train wants to communicate with the preceding train. Trains
broadcast Address Resolution Protocol (ARP) to the network
- 400 -
Figure 5. Inter-VLAN Using Router
C. VLAN
For VLAN communication, it is necessary to physically
configure multiple LANs with multiple switches as shown in
Figure 3. Physical LAN Division and Logical LAN Division
Figure 3(a), and logically with one switch as shown in Figure
3(b). This method configures multiple VLANs. And VLANs
B. LAN can be divided by declaring VLANs on each port. In the
A LAN is a local area network, a network within the range declared VLAN10, only AP1, AP2, and AP3 can
of an ARP Request Message frame, as shown in Figure 2. The communicate with each other, in VLAN20, only AP4, AP5,
communication process of LAN communication is performed and AP6 can communicate with each other, and in VLAN30,
under the assumption that PC0 knows PC2's Internet Protocol only AP7, AP8, and AP9 can communicate with each other.
(IP). First, PC0 transfers data to PC2. PC0 looks up the route Therefore, a VLAN cannot send an ARP Request Message to
for PC2's IP address in its Routing Table and finds out what another VLAN.[3]
the Next Hop IP is. And PC0 does not have the Media Access 802.1Q is one standard for various VLAN schemes. This
Control (MAC) address of the Next Hop IP. Therefore, PC0 is a standard for decrypting and communicating VLAN IDs
sends an ARP Request Message to L2 SW to find out PC2's over trunk ports between switches. The header-added frame is
MAC address. The Layer 2 Switch (L2 SW) that received the a method of adding an 802.1Q header to the Ethernet frame
ARP Request Message looks at the source MAC address, header as shown in Figure 4, and data must be sent through
learns the MAC Table entry of PC0, and floods the ARP the port set as a trunk. The TFID in Figure 4 is information
Request Message to all devices connected to itself. PC2, that indicates the presence or absence of a tag, and has a value
which received the ARP Request Message, records the IP and of 0x8100 for tagged frames. TCI can choose VLAN priority
MAC address of PC0 in its own ARP Table, and transmits an and choose VLAN name from 0-4095.[4]
ARP Reply Message to the L2 SW. The L2 SW that received
the ARP Reply Message learns the MAC Table entry of PC2. D. Inter-VLAN
The L2 SW then forwards the ARP Reply Message to the Different VLANs cannot communicate with each other. At
Source MAC Table report PC0. PC0 that receives the ARP this time, in order to communicate between VLANs, a router
Reply Message registers the IP and MAC address of PC1 in that acts as a router, which is the upper layer, is required as
the ARP table. Then, the MAC address of PC2 is generated as shown in the Figure 5. Let's take a look at the process by which
the destination MAC of the frame to be transmitted to PC2, AP6, which belongs to different VLANs, communicates with
and the data is transmitted. L2 SW checks the frame header AP3. First, proceed assuming that AP6 knows AP3's IP. AP6,
sent by PC0, sees if it is in the MAC table, and forwards the after checking its own routing table, sees that AP3 does not
data to PC2. The PC2 that received the frame receives the data belong to its own LAN. AP6 tries to send data to AP3 through
because the destination MAC of the frame is the same as its Router. So AP6 sends an ARP Request Message to L2 SW
own MAC address. looking for Router's MAC Address. The L2 SW that received
the ARP Request Message learns the information of AP6 and
floods the port and Trunk port where VLAN20 is set. Router
sends ARP Reply Message to AP6. AP6, which received the
ARP Reply Message, learned the Router's MAC Address.
AP6 sets Destination Address to Router, Destination MAC
Address and IP to AP3, and Source MAC Address and IP to
AP6. AP6 then sends the frame to the Router. After receiving
the frame, the router checks the IP header and confirms that
the destination is AP3. At this time, it will send an ARP
Request Message to find AP3's MAC address. After receiving
the ARP Request Message, AP3 transmits an ARP Reply
Message to the Router. Router learns AP3's MAC Address
Figure 4. Ethernet Frame Header and 802.1Q Frame Header and information that it belongs to VLAN10 through ARP
Reply Message. Router deletes the existing frame header, sets
VLAN tag to VLAN10, Source IP to AP6, Destination IP to
AP3, Source MAC to Router, Destination MAC to AP3, and
then sends the frame. The L2 SW that has received the
- 401 -
modified frame correctly transmits the data to AP3 belonging receive the data because the Destination MAC and Destination
to VLAN10.[5] IP are the same as its own address.
IV. ACTUAL IMPLEMENTATION METHOD
III. PROPOSED VIRTUAL TRAIN-TO-TRAIN NETWORK VIA
VLAN Shinbundang Line is currently using a WLAN-based
centralized CBTC system as shown in the figure7. When inter-
A. Proposed network architecture train communication is applied to the existing system, the
A moving train transmits an ARP Request Message in a following problems occur. ARP request messages occur
broadcast format when the train and AP perform handover. frequently during train and AP handovers. Then, all L2 SWs
This method causes communication delays when there are are connected and send ARP Request Messages to all APs. In
many trains, such as rush hour. To solve this, group multiple this case, communication delays occur. To solve this problem,
APs and configure VLANs as shown in Figure 6. The router the proposed network structure uses VLANs as shown in
connects to the L2 SW as a trunk port for communication of Figure 8, and uses routers for communication between one
different VLANs. This is a way to reduce the data in the ARP VLAN and another VLAN. And Figure 8 shows that the rear
Request Message. train transmits a dada frame to the front train.
V. CONCLUSION
B. Novel communication scheme for virtual train-to-train Because trains move, handovers between trains and APs
Examine the communication process of Train1 (T1) and occur frequently. At this time, the ARP Request Message
Train2 (T2). Assume that T1 knows T2's IP. T1 sends data to generates a lot of data on the network and causes
T2. The message is that T1 sent an ARP request to AP6 communication delays. To solve this, this paper proposed a
because it does not know T2's MAC address. After checking network structure for train-to-train communication. This
its own MAC table, AP6 does not have T2's MAC address, so network structure used VLANs and Routers. VLANs reduce
it sends an ARP request message to L2 SW. After learning the the amount of data broadcast on the network. Therefore, this
information of T1, the L2 SW confirms the Tag of VLAN20 configuration reduces the probability of occurrence of
and Floods to the VLAN20 port. After receiving the ARP communication delays. Future work will proceed with
Request Message, AP4 checks its own MAC Table and sends simulations to examine the performance of the proposed
it to T2. T2 sends an ARP Reply Message to T1. T1 can network structure.
communicate by learning the MAC address of T2.
Examine the communication process between T2 and
Train3 (T3). Assume T2 knows T3's IP. T2 sends data to T3.
After checking its routing table, T2 sees that T3 does not
belong to his LAN. T2 would like to send data to T3 via
Router. T2 sends an ARP Request Message to AP4 to find out
the MAC address of the router. AP4 receives the ARP Request
Message, learns the information of T2, and transmits the
message to L2 SW. The L2 SW that received the ARP Request
Message learns the information of AP4 and floods the port and
Trunk port where VLAN20 is set. A router that receives an
ARP Request Message sends an ARP Reply Message to the
L2 SW. Upon receiving the ARP Reply Message, the L2 SW
learns Router information and transmits the ARP Reply
Message to AP4. AP4 learns the MAC address of L2 SW and
sends an ARP Reply Message to T2. T2 sets Destination
Figure 6. Proposed Network Architecture
Address to Router, Destination IP to T3, Source MAC
Address and Source IP to AP4, and then transmits the data
frame. AP4 then transmits the data frame to L2 SW. The L2
SW that has received the data frame transmits the data frame
to the Router. After receiving the frame, the router checks the
IP header and then confirms that the destination is T3. At this
point, send an ARP Request Message to find out the T3's
MAC address. After receiving the ARP Request Message, T3
sends an ARP Reply Message to the Router. The Router learns
the MAC Address of T3 and the information that it belongs to
VLAN10 through the ARP Reply Message. Router deletes the
existing frame header, sets VLAN tag to VLAN10, Source IP
to T2, Destination IP to T3, Source MAC to Router,
Figure 7. Sinbundang Line Network
Destination MAC to T3, and then transmits the data frame.
The L2 SW that has received the modified frame transmits the
data to AP3 belonging to VLAN10. AP3 checks its MAC table
and sends the frame to T3. T3 which received the frame will
- 402 -
[1] X. Wang, L. Liu, T. Tang and L. Zhu, "Next generation train-centric
communication-based train control system with train-to-train (T2T)
communications," 2018 International Conference on Intelligent Rail
Transportation (ICIRT), Singapore, 2018, pp. 1-5
[2] J. Farooq and J. Soler, "Radio communication for communications-
based train control (CBTC): A tutorial and survey," in IEEE
Communications Surveys & Tutorials, vol. 19, no. 3, pp. 1377-1402,
thirdquarter 2017
[3] Mathew, A. and Prabhu, S.R.Boselin, “A Study on Virtual Local Area
Network (VLAN) and Inter-VLAN Routing” , International Journal of
Current Engineering and Scientific Research (IJCESR), Volume 4,
Issue 10, 2017
[4] Li Xinzhan and Xu GenChao, "Research on double vlan scheme in
ethernet network," 2009 2nd IEEE International Conference on
Computer Science and Information Technology, Beijing, China, 2009,
pp. 127-129
Figure 8. Sinbundang Line Network with VLAN Applied
[5] Agwu Chukwuemeka Odi, Nweso Emmanuel Nwogbaga, and Ojiugwo
Chukwuka N., “The Proposed roles of vlan and inter-vlan routing in
effective distribution of network services in Ebonyi State
REFERENCES University,” International Journal of Science and Research (IJSR), vol.
4, no. 7, pp. 2608–2615, Jul. 2015.
- 403 -
August 22(TUE) - 25(FRI), 2023
Poster Session 2
- 404 -
A rectangular gate structure with attachable
sanitary lights and human monitoring camera
Woo-Young Kim1, Hyung-Kon Lee1, Young-Min Kim2, Seung-Youn Yang3, Jin-Tae Kim3, Kyung-Wan
Koo4, Min-Soo Kim5, Tae-Ho Kim6, Seong-Kweon Kim6, In-Choel Jeong7, Chang-Jun Ahn8,
Jae-Sang Cha8*
Boseung Electric Co., Ltd.1, Jooyoung F&G2, Fivetek. Co.ltd.3, Dongseoul Univ4, Hoseo Univ.5,
SNUST6, SungKongHoe Univ7, Chiba Univ. Republic of Korea & Japan8
*Corresponding author : [email protected]
Abstract— In this paper, we designed and implemented a the screen displayed by the camera in real time to confirm
rectangular type of gate structure with attachable sanitary that the human detection function is working properly.
lights and a human monitoring camera. Newly designed
structure in this paper is a specific type of entry/exit applications II. MAIN FEATURE OF PROPOSED STRUCTURE
for our experiments that incorporates sanitation and human
tracking & surveillance camera. Main features of proposed
structure in this paper could be summarized as : Rectangular A. Rectangular Gate Structure and Sanitary Lights
Gate Structure: The designed gate structure in this paper is The rectangular gate structure is designed with the
rectangular shape and serves as the physical barrier through assumption that it is a door for people to enter and exit. The
which individuals must pass. We implemented Gage frame with rectangular gate structure is combined with a sanitary light,
simple metal materials for our experiments. Sanitary Lights: and the sanitary light is made of a removable structure.[1]
The gate structure is equipped with attachable sanitary lights. The sanitary light has the function of a germicidal light that
These lights emit sanitary visible light radiation, which has outputs sanitary visible light that can sterilize the surface of
germicidal properties. When individuals pass through the gate,
an object, and the function of a general light that can be
the sanitary visible lights help disinfect their exposed surfaces.
Human Monitoring Camera: The gate structure features a
utilized in a home or factory. Fig. 1. shows the undetected
camera system for monitoring and tracking about human state of the sanitary light, and Fig. 2. shows the detected state
activity. The camera is typically positioned to capture the area of the sanitary light.
where individuals pass through the gate. The combination of a
rectangular gate structure, attachable sanitary lights, and a
human monitoring/ tracking camera offers several advantages:
Enhanced Sanitation: The attachable sanitary lights emit
sanitary visible light radiation that helps disinfect surfaces. As
individuals pass through the gate, their exposed body parts can
be subjected to the germicidal effects of the sanitary visible light,
contributing to improved sanitation. Human monitoring and
tracking: The human monitoring camera including computer
vision & IoT functions allows for real-time observation of
individuals passing through the gate. This enables Human
tracking and sensing and enforce hygiene compliance measures.
By using the proposed structure in this paper, disinfection is
performed using visible light harmless to the human body when
a person enters the room through a specific gate, and additional Fig. 1. The undetected state of the sanitary light
indoor hygiene management and security monitoring functions
are possible through continuous detection of the human body.
I. INTRODUCTION
In this paper, we present the design and implementation
of a rectangular frame structure that combines a camera and
an attachable sanitary light to secure a sanitary space in public
places. The attachable function of the sanitary light is
necessary for easy installation in public places, and the reason
for using visible light in the sanitary light is also considered
for safety issues that do not cause much harm to the human
body. Therefore, if the camera does not detect a human, the
sanitizing light will activate, emitting a sanitizing visible light
that disinfects the surface, and if the camera detects a human, Fig. 2. Shows the detected state of the sanitary light
the sanitizing light will stop, the sanitizing light stops
working and converts its function to a normal light. When a
person passes through the frame structure, the user can see
- 405 -
B. Human Monitoring Camera
The sensor capabilities of the camera were utilized to
detect humans. The cameras are positioned to view the area
through the rectangular gate structure and have the ability to
monitor human movement.[2] The images captured by the
camera utilize computer vision technology to display the
results of human monitoring on a screen, which can be
viewed in real time by the user on a monitor.[3] Fig. 3. shows
the camera module that can detect the human body, and Fig.
4. shows the appearance of the human body displayed on the
human body monitoring screen.
Fig. 5. An overall view of the system
III. CONCLUSION
Through this research, it is expected that this structure,
which utilizes computer vision technology using a camera
and light conversion technology according to the presence or
absence of a human body, will secure hygienic spaces in
public places.
ACKNOWLEDGMENT
This research was partially supported by project (#S2866225)
of Korea Technology & Information Promotion Agency for
SMEs, TIPA, Republic of Korea. and partially funded by a
Fig. 3. The camera module that can detect the human body
Grant of Scientific Research No. 22K04085 from the Japan
Society for the Promotion of Science (JSPS), the
Telecommunications Advancement Foundation (TAF), and
Suzuki Foundation.
REFERENCES
- 406 -
A development of IoT switching and control
box application used in various power source
choice and sanitary light control functions
Woo-Young Kim1, Hyung-Kon Lee1, Gyewon Choi2, Minsoo Kim3, Tae-Ho Kim4, Seong-Kweon Kim4,
Kyung-Wan Koo5, In-Cheol Jeong6, Chang-Jun Ahn7, Jae-sang Cha7*
Boseung Electric Co., Ltd.1, SKKU2, Dongseoul Univ.3, SNUST4, Hoseo Univ.5, SungKongHoe Univ6,
Chiba Univ.7
* Corresponding author : [email protected]
Abstract— In this paper, we designed and implemented an power block box is designed to be utilized for sanitary
IoT switching and control box application can be a versatile lighting. Fig. 1. shows a block diagram of the configured
solution for power source selection and sanitary light control system. [1]
functions. i.e., Implemented application’s structure in this paper
is an IoT switching and control box applications for our
experiments that incorporates various power choice and
sanitary light control. Main features of implemented application
in this paper could be summarized as : Power Source Choice:
The IoT switching and control box can be designed to connect
to different various power sources, such as the main electrical
grid, solar panels, or power bank batteries. And it can
automatically switch to the most cost-effective or sustainable
power source at any given situation. Sanitary Light Control: In
terms of sanitary light control, the IoT application can provide
smart lighting management in different areas or any space
where sanitation and cleanliness are crucial. And the application
can integrate with motion sensors, or other environmental
sensors. Additionally, the IoT application can offer features like
remote control function. Users can control the Sanitary lighting
settings by using mobile app or web UI, allowing them to turn Fig. 1. Block diagram of the configured system
on or off lights or sanitary mode changing. By using IoT based
remote control functions presented in this paper, various power B. IoT switching and control box application used in
sources of sanitary lighting can be easily selected. Additionally,
Sanitary LED light’s Power on/off mode or sanitary level status various power source choice and sanitary light
also easily changed
control function
Keywords— Gate, Visible, Sanitary light, Camera The configured system consists of multiple batteries for
always-on power and adaptability to different environments,
I. INTRODUCTION
a solar panel to charge the batteries, a controller and sanitary
In this paper, we present the design of IoT switching and light that can be controlled remotely. The power switch
control box application that can control sanitary light with a includes power sources that can be utilized in different
variety of power choices. It is designed to control various environments. In the event of a full-time power outage, the
power sources and to control sanitary light from a distance. batteries were being charged by the solar panel and the power
The designed switching module is composed of circuits that connection could be switched. The system is configured to
can respond to AC/DC power environments. Based on the remotely control the sanitary light to enable sanitizing
IoT communication system, a system that automatically functions and light dimming. Fig. 2. shows the structure of
switches power was realized by combining functions that can the IoT switching and control box application that allows for
perform IoT control. power selection and control of the sanitary light. [2][3]
- 407 -
and general visible light functions. In addition, the brightness
of general visible light is configured to be dimming
adjustable from 0 to 100%. Thus, we introduced efficient
system that can automatically switch the power situation
according to the given situation in various spaces. Fig. 5.
shows the operation of various functions through the remote
control of the sanitary light.
Fig. 2. the structure of the IoT switching and control box application that
allows for power selection and control of the sanitary light
- 408 -
On the Electrical Safety Analysis of Multi-chute
Classification System for Joint Courier Logistics
Base Infrastructure based STPA
*Note: Sub-titles are not captured in Xplore and should not be used
Abstract—This paper presents an electrical safety analysis of the space and tracked parts, finished products and facilities in
a multi-chute classification system designed for joint courier the manufacturing site through the simulation in order to smart
logistics base infrastructure using the Systems-Theoretic SCM (Supply chain Management) solution by the distributed
Process Analysis (STPA) approach. The multi-chute operating system based on NoSQL stored as big data [3]. Yu
classification system plays a critical role in automating the et al. identified the trends in intelligent robot technology in the
sorting and classification of courier packages based on their logistics field and studied intelligent robot technology for
destinations. However, ensuring electrical safety within such a logistics automation, and the results of this can be the basis for
complex system is of utmost importance to prevent accidents securing the reliability of robot development in the logistics
and hazards. The findings of this study provide valuable insights
field [4]. Choi et al. conducted overall robot research such as
into the electrical safety considerations of multi-chute
classification systems in joint courier logistics base
logistics robot operation technology and delivery robot
infrastructure. The proposed control actions can serve as technology, and identified key trends in robot technology
guidelines for system designers, operators, and maintenance related to the 4th industrial revolution [5]. Park et al.
personnel to enhance the electrical safety performance of such conducted an automatic classification logistics system study
systems. By integrating STPA into the analysis process, a using image analysis. This study is a study using a model, but
comprehensive understanding of the system's electrical safety since control using a communication device was implemented,
vulnerabilities and effective risk control strategies can be the meaning as a prototype was derived [6].
achieved, ultimately contributing to a safer and more reliable
logistics operation. III. METHODOLOGIES
A. Munlti-choute classification system
Keywords—System-Theoretic Process Analysis, Electrical
Safety Analysis, Joint Courier Logistics Base Infrastructure, Fig. 1 shows a schematic conceptual diagram of the
Electrical Safety Analysis, Logistics Automation delivery invoice information detection system. Research to
implement an actual physical system will be conducted. A
I. INTRODUCTION multidimensional tunnel image recognition system will be
With the growth of the online market and the resulting implemented as a subsystem by utilizing video and image
growth of the logistics market, delivery volume is increasing, acquisition sensors such as cameras, and a bottom line scanner
and various studies are being conducted to efficiently handle will be implemented under the path through which the courier
the increasing delivery volume. Among them, this is the point cargo passes. As a result of this, delivery invoice information
of time presented in the concept of point courier logistics will be transmitted through the interface with the joint courier
system that can jointly process multiple courier cargoes. In logistics system, which will be operated separately. In this
order to implement an efficient, safety logistics system, basic study, a study was conducted on ways to STPA analysis as a
research through various approaches and technology way to increase electrical safety this system.
development in which various fields are fused is essential.
Accordingly, this we conducted electrical safety analysis of
multi-chute classification system for joint courier logistics
base infrastructure based STPA (System-Theoretic Process
Analysis).
II. RELATED WORKS
Chae et al. reviewed cases of public logistics-related
business models and policy directions, and determined that a
rational and systematic management and support system is
necessary to implement a successful community logistics Fig. 1. Schematic diagram of the multi-chute system
business model [1]. Shin conducted a study in order to
applying the technology originated from the 4th industrial B. STPA(Systems-Theoretic Process Analysis)
revolution to the field of logistics technology, such as IoT, AI STPA, which stands for Systems-Theoretic Process
and robot [2]. Kwak et al. conducted a study that calculated Analysis, is a safety analysis method used to identify and
- 409 -
mitigate hazards in complex systems. It is a structured and Study identified electrical hazards of the Multi-chute
systematic approach that helps engineers and safety Classification System. Potential electrical hazards within the
professionals understand and address potential risks system may include electric shock, fire, and overvoltage. The
associated with the design, operation, and maintenance of study evaluated the system's electrical protection capabilities.
complex systems. STPA incorporates the principles of The effectiveness of electrical protection functions such as
systems theory to provide a holistic view of a system and its insulation, grounding, and protection devices implemented in
interactions with the environment, operators, and other the system was evaluated, and through this, the sufficiency of
components. The key idea behind STPA is to identify the protection function or the parts requiring improvement
hazardous scenarios by considering not only the immediate were derived. Proposals for safety control measures have been
causes of accidents but also the underlying system-level established. Based on the findings of the study, safety control
factors that contribute to them. Rather than focusing solely on measures have been proposed to prevent or reduce electrical
failures of individual components, STPA examines the hazards. For example, improvements in circuit design,
system's structure, interactions, and control processes to addition or upgrade of protective devices, improvements in
uncover potential vulnerabilities. maintenance procedures, etc. may be suggested. The study
evaluated whether the Multi-chute Classification System
complied with relevant regulations and standards. An
assessment was made of the system's compliance with the
appropriate regulations and standards to meet electrical safety
requirements.
V. CONCLUSION
This study deals with the importance of electrical safety
analysis of Multi-chute Classification System based on Joint
Courier Logistics Base Infrastructure. This study aims to
utilize the Systems-Theoretic Process Analysis (STPA)
technique to identify potential electrical hazards in a system
and propose safety control measures. The findings are
expected to aid in the design and operation of systems to
reduce electrical hazards. In this study, the electrical safety
analysis of the Multi-chute Classification System was
performed and the electrical risk of the system was evaluated
Fig. 2. Concept of Control structure for STPA by applying STPA. According to the research results, potential
hazards such as electric shock, fire, and overvoltage that may
IV. RESULT OF RESEARCH occur in the system were identified, and safety control
Table 1 is the result of deriving the UCA(Unsafe Control measures were proposed to control them. In addition, the study
Actions) of STPA from the viewpoint of securing the emphasized the importance of effective implementation and
electrical safety of the multi-chute classification system. In operation of electrical protection functions, and proposed a
this paper, the control action is set to operation. For each UCA method to protect against electrical hazards by applying
type, it was derived as follows: Not providing causes hazard, appropriate insulation, grounding, and protective devices to
“ A protective device or circuit breaker in an electrical system the system. The results of the study can be used as reference
fails to operate”, Providing causes hazard, “Circuit breakers in materials to improve the electrical safety of the Multi-chute
electrical systems are so sensitive that they trip unnecessarily Classification System, and are expected to help improve
even under normal operating conditions”, Too soon, too late, safety at the stages of system design, operation and
out of order, “ The per supply runs before the generator”, maintenance.
Stopped too soon / Applied too long, “ When a temporary
current peak occurs in the system, the overcurrent protection REFERENCES
device incorrectly recognizes it and cuts”. [1] M. N. Chae and H. K. Gwon, “Business models and policy directions
of joint logistics projects funded by government,” Korea Society of
TABLE I. UNSAFE CONTROL ACTIONS Transportation, vol. 13, no. 3, pp. 28–35, 2016.
[2] H. J. Shin, “A study on trends in the use of logistics technology based
Not Too soon, Stopped on the 4th industrial revolution,” The e-Business Studies, vol. 21, no.
Providing
Control providing too late, too soon / 2, pp. 17–27, 2020.
causes
action causes out of Applied [3] K. J. Kwak, S. G. Hwang, D. J. Shin, K. W. Park, J. J. Kim et al., “Study
hazard
hazard order too long of logistics object tracking service for smart SCM,” Journal of the
Operation A Circuit The per When a Korean Institute of Industrial Engineers, vol. 46, no. 1, pp. 71–81, 2020.
protective breakers in supply temporary [4] W. P. Yu, Y. C. Lee and D. H. Kim “Technical trends of robot task
device or electrical runs before current intelligence in intelligent logistics/agriculture,” Electronics and
circuit systems are the peak Telecommunications Trend, vol. 36, no. 2, pp. 22–31, 2021.
breaker in so sensitive generator occurs, the [5] S. l. Choi, D. H. Kim, J. Y. Lee, S. H. Park, B. S. Seo et al., “Logistics
an that they trip overcurrent and delivery robots in the 4th industrial revolution,” Electronics and
electrical unnecessarily protection Telecommunications Trends, vol. 34, no. 4, pp. 98–107, 2019.
system fails even under device cuts
to operate normal off the [6] C. H. Park, S. D. Bae, S. G. Choi, S. H. Choi, J. W. Choi et al.,
operating circuit “Automatic picking/classification system using video analysis,” in
conditions abnormally Proc. of the Korean Society of Computer Information Conf., Jeju,
Korea, vol. 28, no. 2, pp. 661–662, 2020.
- 410 -
The Remote Driving Control System Based on
Telepresence for Mini-tram
Jung-Ju Kim 1*, Gi-Won Kim 1, Jun-Seok Lee 1, Jae-Hun Choi 1, Hyung-Woo Jin 1, Chan-Jong Lee 1
1
Dept. of Robotics, Hoseo University, Korea
Email: [email protected]
Abstract—In this paper, we propose a method for public A. Configuration of remote driving control system for mini-
mobility remote driving control by converging the remote tram based on telepresence
driving control system and telepresence technology, In order to
remotely drive an autonomous vehicle such as a mini-tram,
Fig. 1 is a block diagram of the remote driving control
various visual and auditory information are required. To this system for AMR. Information such as visual, auditory, and
end, an omnidirectional camera with a built-in microphone is physical values obtained through sensors in the AMR are
manufactured, and by using it, visual and auditory information transmitted to the telepresence room. The transmitted
of the surroundings is obtained from a remote place. In addition, information is displayed in the telepresence room so that the
telepresence technology is used to transmit audio-visual user can fell the realism. To decrease delay time and increase
information obtained from the field to the remote driver so that reliability, we use WLAN to transmit the user's control
the same effect as the field can be obtained. Finally, a realistic command data and the information of AMR.
AR room capable of displaying audio-visual information is built
to provide information for mini-tram remote driving control.
The telepresence-based remote driving control technology that
can increase the safety and efficiency of autonomous mini-tram.
I. INTRODUCTION
Autonomous driving research is being actively pursued
around the world, and there is a wide range of research in the
field of public mobility[1-3]. Mini-trams are small-scale
public mobility for driving short distances in cities, which
have the advantages of reducing traffic congestion in urban
areas and being environmentally friendly. However, the
current remote driving control technology of mini-trams has Fig. 1. The diagram of remote driving control system based on telepresence
various challenges such as reliability and safety of the
communication system and the need for human intervention B. The telepresence room for mini-tram
in certain situations[4-7]. To overcome these challenges in Fig. 2 is a three-dimensional rendering of the telepresence
remote control technology, various studies are being room developed for this study. The telepresence room was
conducted using telepresence[8-10]. designed to allow one person to control a remote mini-tram
realistically within it. The floor area of the telepresence room
Telepresence is a technology that enables voice and video is 2.87(m2) and the height is 2.12(m).
transmission and interaction through two-way remote
communication. In this study, we propose a system that can
improve work efficiency and safety in a remote driving control
environment while building an environment where remote
users can experience the same immersive experience as
operating a mini-tram in real time by using telepresence
technology in the remote driving control system of a mini-
tram.
II. BODY
Through this study, we would like to integrate
telepresence technology with remote driving control
technology for mini-tram. In this study, we developed a
telepresence room and an omnidirectional camera with
microphone to enable real-time interaction between remote
users and mini-trams. This created a sense of immersion as if
a remote driver was actually driving an autonomous mini-tram.
We also developed an Autonomous Mobile Robot(AMR) that
Fig. 2. The 3D rendering of telepresence room
can be remotely controlled so that humans in telepresence
room can control the mobile robot according to the
surrounding environment where the mobile robot is located. C. Development of omnidirectional camera
We developed a camera capable of omnidirectional
photography of more than 300 degrees. The developed
- 411 -
omnidirectional camera consisted of eight CMOS USB web of the remote driving control system for mini-tram based on
cameras and two USB hubs. The omnidirectional camera is teleoperation can be measured by comparing the time
connected to a computer. Therefore we can store videos and between stop signal occurred and the time when the brakes
transmit them to telepresence room using WLAN. Fig. 3 is a start to operate by the user's stop command. From the
3D rendering of a portable omnidirectional camera developed measured delay time, you can get free running time and free
using eight 4K UHD cameras. The diameter of the developed running distance.
omnidirectional camera is 30(cm), and the weight of it is 2.5
(kg) A. Experiment of emergency stops
The emergency stop experiment is to determine how long
it takes for AMR to execute a user's stop command after
receiving a stop signal from a stop signal generator when the
AMR is driving at a predetermined speed. The stop signal has
a visual signal and an auditory signal. The visual signal
means that red color sign is output from a stop signal
generator installed in the driving direction of the AMR. The
auditory signal means that beep sound is output from a stop
signal generator. Fig. 5 shows the structure of the emergency
stop experiment.
B. Result of experiments
Fig. 6 illustrates how to find the delay time of the remote
driving control system for AMR based on telepresence. In Fig.
6, the tsg is the time the stop signal generated and the tso is the
time the stop signal is displayed in telepresence room, and the
tuc is the time the user in the telepresence room manipulated
the stop command device. Also, the tro is the time the AMR
actually executes the stop command. Finally, the Td is a delay
time in the remote driving control system for AMR based on
telepresence. Td is obtained thorough (1). In the fig. 6 the tf is
free running time of AMR, and the tr is reaction time of AMR.
Fig. 7 shows result of some experiments. (2) is the formula for
calculating the free running distance.
Fig. 4. The system block diagram of autonomous mobile robot Td = tf - tr =(tro - tsg )-(tuc - tso ) (1)
III. EXPERIMENT
For verify the reliability of the remote driving control tf = Current Velocity × (Td + tr ) (2)
system for mini-tram based on telepresence, emergency stop
experiments were conducted. In the emergency stop
experiments, a stop signal is generated at a random time when
the mobile robot is driving at a constant speed. The delay time
- 412 -
Table 1 is a table showing the free running distance, free
running time, and delay time obtained through the result of
auditory and visual signal experiments conducted at each
speed. In Table 1, the average of free running times is
497.5(ms), the average of delay times in the auditory stop
signal experiments is 24.5(ms), and the average of delay times
in the visual stop signal experiments is 38.7(ms).
Driving
Stop Free Running Free Running Delay time
Velocity
signal Distance(m) Time(ms) (ms)
(m/s)
Fig. 6. The analysis of free running time and reaction time 1.596 532 48
1.437 479 33
Visual 1.545 515 44
signal
1.569 523 39
1.888 513 40
3
1.458 486 24
1.497 499 24
Auditory 1.485 495 24
signal
1.443 481 25
1.545 515 25
2.045 552 36
1.960 490 55
(a) Experiment 1 : driving speed 3(m/s)
Visual 2.036 509 30
signal
1.880 470 28
1.888 472 24
4
2.904 509 25
2.988 489 25
Auditory 2.916 494 25
signal
3.036 469 25
2.868 472 25
3.337 562 41
2.928 488 28
Visual 2.958 493 35
signal
(b) Experiment 2 : driving speed 4(m/s)
2.838 473 41
2.958 493 55
6
2.904 484 25
2.988 498 23
Auditory 2.916 486 24
signal
3.036 506 24
2.868 478 25
IV. CONCLUSIONS
In this study, the remote driving control system applied
telepresence technology is proposed. The stability of the
(c) Experiment 3 : driving speed 6(m/s)
system is verified by calculating delay time through the free
running time and reaction time measured in the experiment.
Fig. 7. Result graphs of emergency stop experiments Existing remote driving control systems are difficult to receive
various information on driving site. However, our proposed
- 413 -
system provided a lot of information obtained in the driving an autonomous tram vehicle," Journal of the Electrical Society,vol. 71,
site to remote user through omnidirectional camera with built no. 3, pp.525-533, 2022.
in microphones and various sensors. The remote driving [4] R. Sharma, K. Kumar, and S. Vig, "DTMF based remote control
system," IEEE International Conference on Industrial Technology pp.
control system based on telepresence is expected to be 2380-2383, 2006.
effective in solving problems quickly in certain situations the [5] S. Lu, M. Zhang, T. Ersal, and X.J Yang, "Workload management in
require human intervention for mini-tram. teleoperation of unmanned ground vehicles: Effects of a delay
compensation aid on human operators’ workload and teleoperation
performance," International Journal of Human–Computer Interaction
vol. 35, no .19, pp. 1820-1830, 2019.
This results was supported by ”Regional [6] L. Kang, W. Zhao, B. Qi, and S. Banerjee , "Augmenting self-driving
Innovation Strategy (RIS)” through the National with remote control: Challenges and directions," In Proceedings of the
Research Foundation of Korea(NRF) funded by the 19th international workshop on mobile computing systems &
Ministry of Education(MOE)(2021RIS-004) applications, pp. 19-24, February 2018.
[7] C. E. Lin, C. C. Li, A. S. Hou, and C. C. Wu, "A real-time remote
control architecture using mobile communication," IEEE Transactions
REFERENCES on Instrumentation and Measurement, vol. 52, no. 4, pp. 997-1003,
[1] Jae-Hee Kim, Dae-Hyun Kim, Moo-Ryong Choi, Hyuk-Jin Yoon, "Bus 2003.
autonomous driving technology trends," World of Electricity, vol. 68, [8] J. V. Draper, David. B. Kaber, and John. M. Usher, "Telepresence,"
no. 6, pp.16-22, 2019. Human Factors, vol. 40, no. 3, pp. 354–375, 1998.
[2] Sung-Won Park, Kyung-Joon Choi, Hyeon-Chyeol Hwang, and Jae-Ho [9] Jung-Wook Hwang, Tae-Hyung Park, "Force feedback system of
Kwak, "A dynamic velocity profile generation method for autonomous telepresence robot for remote operation," Journal of the Electrical
driving of a tram vehicle,"Journal of the Electrical Society, vol. 69, no. Society, vol. 64, no. 4, pp. 586-591, 2015.
10, pp.1569-1577, 2020. [10] Van Kha Ly Ha, Rifai Chai, and Hung T. Nguyen, "A telepresence
[3] Sung-Won Park, Kyung-Jun Choi, Hee-Gyun Jeon, Hyeon-Chyeol wheelchair with 360-degree vision using WebRTC," Applied Sciences
Hwang, and Jae-ho Kwak, "Design of a velocity tracking controller for vol. 10, no. 1, pp. 369, 2020.
- 414 -
On the Derivation of Demand Time for
Response to Variable Function Focus Camera
Situation
*Note: Sub-titles are not captured in Xplore and should not be used
Min Joong Kim 1, Myung Sung Kim 1 and Young Min Kim 1*
Department of Systems Engineering, Ajou University, Korea
1
Abstract—Today, as the spread of vehicles with autonomous particular, camera sensors are widely used not only for
driving functions increases, sensors are essential to stably detect detecting moving objects but also for recognizing traffic lights
and effectively track moving objects around. Various sensors and road signs. However, traditional camera sensors have
such as cameras, radars, and lidars are used to detect moving limitations in proactive perception due to their fixed field of
objects. In particular, camera sensors are widely used not only view. A variable field of view camera has been proposed to
to recognize moving objects but also to recognize traffic lights adaptively adjust its field of view according to the surrounding
or traffic signs. However, since the existing camera sensor has a situations and driving environment [4]. Authors conducted an
fixed angle of view, there is a limit to active recognition in the
analysis of the RSS model and its characteristics. They applied
surrounding situation. Therefore, a variable focus function
variables obtained from previous studies to derive the safe
camera with a different angle of view depending on the
surrounding situation or driving environment has been
distance. Additionally, they performed a timeline analysis of
proposed. In this paper, the RSS model was used to derive the each function of the variable focal length camera with the
range of angle of view required for situations occurring application of the RSS model during the operation of Highway
according to the driving environment and the situation response Driving Assist (HDA) [5]. In this paper, the required field of
time of the variable focus function camera. view range and response time of the variable field of view
camera are derived using the RSS model to address situations
Keywords—component, formatting, style, styling, insert (key that arise in different driving environments.
words)
II. BACKGROUND
I. INTRODUCTION
Nowadays, cars have become a common means of
transportation and have deeply ingrained themselves in our
lives to the point where it would be inconvenient without them.
In order to implement autonomous driving capabilities,
various perception sensors such as cameras, radars, and
LiDARs are utilized to detect vehicles and obstacles in the
front [1]. To demonstrate the safety and reliability of
autonomous vehicles (AVs), extensive testing is required. In
order to prove that AVs are more reliable and safe than
humans in terms of fatalities and injuries, it is necessary to
accumulate hundreds of millions of miles of driving data [2].
There are two main methods for testing the safety and
reliability of vehicles: using actual physical vehicles and
employing sophisticated simulation software programs. Using
actual physical vehicles entails high costs and risks. Therefore, Figure 1 Variable Functional Focus Camera Concept
reliable data can be obtained and the high costs and risks
associated with physical vehicle usage can be avoided by
A. Variable Function Focus Camera
utilizing autonomous driving simulation software. By
constructing road segments within the simulation software or As the name suggests, a variable function focus camera is
importing real road segments and creating vehicles, traffic a single camera that can adjust its focus and field of view
signals, infrastructure, etc., simulations can be performed. (FOV). Figure 1 illustrates a schematic diagram of the concept
Additionally, using virtual environments enables the testing of of a variable function focus camera. A variable function focus
various functionalities and application aspects that may not be camera length can change its field of view depending on
feasible to test in real-world environments. This can provide factors such as driving speed and environment. The FOV of a
more comprehensive guidelines and aid in the development camera with variable focal length is 28° (telephoto), 50° (mid-
and implementation of autonomous driving technology. As range), and 150° (wide-angle). For example, when driving at
the number of vehicles equipped with autonomous driving high speeds on a highway, the camera can measure distant
features increases, ensuring safety and reliability becomes an objects using a telephoto angle. In contrast, when driving at
important task. Recently, Mobileye proposed a white-box lower speeds in urban areas, the camera can use a wide-angle
mathematical model called RSS (Responsibility Sensitive perspective to detect a broader area.
Safety) to secure the safety of autonomous vehicles and
clearly assign responsibility in the event of an accident [3]. In
- 415 -
B. Responsibility Sensitive Safety approximately 60m for a FOV of 150 degrees and about 7.5m
The Responsibility Sensitive Safety (RSS) model is a for a FOV of 50 degrees. Therefore, when driving at 60 km/h
safety standard that regulates the behavior of autonomous at an intersection, if the camera's FOV is set to 50 degrees, the
driving systems, emphasizing responsibility-centered safety. maximum detectable distance of 7.5m is smaller than the RSS
The RSS model was developed to ensure a fair distribution of safety distance of 16m, which can be risky. However, if the
responsibility for potential accidents during driving. This FOV is set to 150 degrees, the detection distance of
model evaluates factors such as distance from surrounding approximately 60m ensures an adequate safety margin. Thus,
vehicles, collision potential, and maintains safe driving by at an intersection, a FOV of 150 degrees and a safety
requiring autonomous vehicles to adhere to a set of rules, assurance time of 1 second are derived, and if all procedures,
including maintaining appropriate speed and distance. RSS including braking, can be completed within this time frame, it
focuses on minimizing risks arising from interactions between can be considered safe.
autonomous systems and humans, enabling all participants on IV. CONCLUSION
the road to coexist safely. Here, 𝑣𝑣𝑟𝑟 and 𝑣𝑣𝑓𝑓 are the longitudinal
speeds of the vehicle, and 𝜌𝜌 is defined as the reaction time, With the advancement of the automotive industry, the
and if deceleration is made to 𝑎𝑎𝑚𝑚𝑚𝑚𝑚𝑚,𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏 by 𝑐𝑐𝑓𝑓 , 𝑐𝑐𝑟𝑟 must proliferation of vehicles equipped with autonomous driving
capabilities has increased, bringing the issue of vehicle safety
accelerate to 𝑎𝑎𝑚𝑚𝑚𝑚𝑚𝑚,𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎 during the response time and then
to the forefront. As a result, various research studies have been
decelerate to at least 𝑎𝑎𝑚𝑚𝑚𝑚𝑚𝑚,𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏 to avoid a collision. At this conducted to determine the safe distance for collision
time, the safety distance is as shown in Equation (1). avoidance with the preceding vehicle during driving. Recently,
Mobileye has introduced the RSS (Responsibility-Sensitive
1
𝑣𝑣𝑟𝑟 𝜌𝜌 + 𝑎𝑎𝑚𝑚𝑚𝑚𝑚𝑚,𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎 𝜌𝜌2 Safety) model to ensure the safety of autonomous vehicles and
1
𝑑𝑑𝑚𝑚𝑚𝑚𝑚𝑚 = � �𝑣𝑣 +𝜌𝜌𝑎𝑎 2 � (1) assess liability. A variable function focus camera is being
� 𝑣𝑣𝑓𝑓2
+ 𝑟𝑟 𝑚𝑚𝑚𝑚𝑚𝑚,𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎 − developed, which can change the field of view from 28° to 150°
2𝑎𝑎𝑚𝑚𝑚𝑚𝑚𝑚,𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏 2𝑎𝑎𝑚𝑚𝑚𝑚𝑚𝑚,𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏
+ depending on the surrounding situation and driving
𝑙𝑙𝑙𝑙𝑙𝑙
environment. In this paper, we integrated the RSS safe
It is defined here as 𝑣𝑣1,𝜌𝜌 = 𝑣𝑣1 + 𝜌𝜌𝑎𝑎𝑚𝑚𝑚𝑚𝑚𝑚,𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎 , 𝑣𝑣2,𝜌𝜌 = 𝑣𝑣2 − distance into a camera with variable focal length to derive the
𝑙𝑙𝑙𝑙𝑙𝑙
𝜌𝜌𝑎𝑎𝑚𝑚𝑚𝑚𝑚𝑚,𝑎𝑎𝑎𝑎𝑎𝑎𝑒𝑒𝑒𝑒 , where the two vehicles accelerate laterally to required field of view for different driving environments. We
𝑙𝑙𝑙𝑙𝑙𝑙
each other with 𝑎𝑎𝑚𝑚𝑚𝑚𝑚𝑚,𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎 , then decelerate until the lateral calculated the safe distance for intersection scenarios and the
𝑙𝑙𝑙𝑙𝑙𝑙
speed reaches zero with 𝑎𝑎𝑚𝑚𝑚𝑚𝑚𝑚,𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏 , and finally the distance perception range for laterally moving vehicles. This allowed
between the two vehicles must be 𝜇𝜇. At this time, the lateral us to determine the necessary safe distance and camera field
safety distance is as shown in Equation (2). of view for ensuring safety while driving at intersections.
Additionally, we derived the required response time for
2 ensuring safety in various situation-specific demands.
𝑣𝑣1 +𝑣𝑣1,𝜌𝜌 𝑣𝑣1,𝜌𝜌
𝜌𝜌 + 𝑙𝑙𝑙𝑙𝑙𝑙
2 2𝑎𝑎𝑚𝑚𝑚𝑚𝑚𝑚,𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏
𝑑𝑑𝑚𝑚𝑚𝑚𝑚𝑚 = 𝜇𝜇 + � 2 � (2)
𝑣𝑣2 +𝑣𝑣2,𝜌𝜌 𝑣𝑣2,𝜌𝜌
−� 𝜌𝜌 − 𝑙𝑙𝑙𝑙𝑙𝑙 � REFERENCES
2 2𝑎𝑎𝑚𝑚𝑚𝑚𝑚𝑚,𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏
+ [1] Chavez-Garcia, R. O., Burlet, J., Vu, T. D., and Aycard, O. "Frontal
object perception using radar and mono-vision." 2012 IEEE Intelligent
Vehicles Symposium, pp. 159-164, 2012.
[2] Kalra, N., and Paddock, S. M. “How many miles of driving would it
III. METHODOLOGY take to demonstrate autonomous vehicle reliability.” RAND
The variable function focus camera has a field of view and Corporation, pp. 1129-1134, 2016.
maximum detection range of 150 degrees (50m), 50 degrees [3] Shalev-Shwartz, S., Shaked S., and Amnon S. "On a formal model of
safe and scalable self-driving cars." arXiv preprint arXiv:1708.06374,
(100m), and 28 degrees (250m). For example, assuming a 2017.
vehicle speed of 60 km/h and a reaction time of 0.5 seconds. [4] Kim, M. J., Yu, S. H., Kim, T. H., Kim, J. U., and Kim, Y. M. "On the
The maximum acceleration and deceleration of the vehicle are development of autonomous vehicle safety distance by an RSS model
set to the values proposed by ISO 22179 international standard based on a variable focus function camera." Sensors, 21(20), 6733,
for the FSRA (full speed range adaptive cruise control) system, 2021.
which are 𝑎𝑎𝑚𝑚𝑚𝑚𝑚𝑚,𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎 = 4𝑚𝑚/𝑠𝑠 and 𝑎𝑎𝑚𝑚𝑚𝑚𝑚𝑚,𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏 = [5] Kim, M., Kim, T., Yu, S., and Kim, Y., “Safety Verification of RSS
𝑎𝑎𝑚𝑚𝑚𝑚𝑚𝑚,𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏 = 4.9𝑚𝑚/𝑠𝑠 [6]. By substituting the variable values Model-Based Variable Focus Function Camera for Autonomous
Vehicle”, SAE Int. J. of CAV 5(3), 2022.
into equation (1), an RSS (recommended safe stopping)
[6] Ahn D. R., Shin S. G., Park K H., Choi I. S. and Lee H. K. “Functional
distance of approximately 16m can be derived. Dividing the safety concept design and verification for longitudinal driving
safety distance by the current vehicle speed gives a safety assistance system of an autonomous vehicle.” Transactions of KSAE,
assurance time of about 1 second. vol. 26, no. 2, pp.149-158, 2018.
- 416 -
Machine-Learning based Condition Diagnosis
Model of Heating, Ventilation and Air
Conditioning System for Train Cars
Juhee Choi1, Kangwoo Nam2 and Chul-Su Kim2*
1
Department of Smart Information Communication Engineering, Sangmyung University, Cheonan, Korea
2
School of Railroad Engineering, Korea National University of Transportation, Uiwang 16106, Gyeonggi, Korea
Email: [email protected]
Abstract—The air conditioning unit in railway vehicles is a appropriate control system is needed. Especially, it is required
device that integrates heating, cooling, and ventilation systems to adjust temperature and humidity control through sensors
for passengers. It is usually called the Heating, Ventilation, and directly.
Air Conditioning (HVAC) system, as the name represents its
functions. To check the status of this device, the train control
monitoring system (TCMS) continuously monitors the
operation of the device. However, the current system shows
irregularities and codes indicating system failures without
predicting the type and the timing of malfunctions. This study
develops a condition diagnosis model through the analysis of
actual failures from the last 6 years and the corresponding
remedial actions. The model includes the failure mode, effects,
and criticality analysis method (FMECA) with risk priority
number analysis.
Keywords—Machine-Learning, Condition Diagnosis Model, Fig. 1. Heating, Ventilation, and Air Conditioning System
Heating, Ventilation and Air Conditioning, Railway Vehicles
II. METHODS
I. INTRODUCTION
A. Failure Mode, Effects, and Criticality Analysis (FMECA)
In urban railway systems, the Heating, Ventilation, and
For the Failure Mode, Effects, and Criticality Analysis
Air Conditioning (HVAC) can be considered an important
(FMECA) of the HVAC, several criteria are required in terms
device for convenience and safety during operation[1-3].
of the severity of failure, the frequency of failure, and the
Considering the characteristics of subways, when lots of
detectability of failure [7-9].
people gather and trains are continuously running, the amount
of oxygen goes down while the heat and pollutants in the air Table I shows that the detailed criteria for the severity of
go up. failure. Severity rankings in the table mean that each failure
mode is assigned based on the effects, the overall system
Thus, the mechanical ventilation systems have two main
performance, and the safety.
jobs: they send fresh air around, so the commuters stay
comfortable while they're traveling, and they are important Next, the occurrence frequency evaluation is obtained
when it comes to keeping everyone safe in case of fire. from the failure rate values of the failure modes. If λ is the
Besides, having good ventilation is also important for keeping failure rate of a component, the mode failure rate is λμ and the
both tunnels and stations clean and safe. In addition, the calculation formula is as follows in Equation (1)
HVAC is required to meet the customer’s convenience in
terms of warmth. 𝜆𝜇 = α ∙ 𝜆 (1)
To overcome these problems, the sensors are installed on where α indicates the weight of the mode compared to other
the roof of the train to detect temperature and air quality failure modes.
sensors int the train control monitoring system (TCMS)[4-6]. Since there is no existing research on the detectability of
Based on the data of the sensors, the system makes internal failures, we propose a detectability criteria scale ranging from
temperature stay and maintain the amount of oxygen by 1 to 3 as shown in Table II.
recirculating air.
TABLE I. SEVERITY EVALUATION CRITERIA[9]
The main function of the HVAC is to pull in warm air from
outside and the refrigerant absorbs the heat. Next, it sends the Severity Criteria Evaluation
gathered heat outside the train. As a result, it provides the fresh None No signal 1
air with the passengers. When the sensors estimate the
temperature and quality of the air in the train, they check the Very Minor Comfort hurt 2
air to be recirculated and provides the filtered air inside. Minor Possible failure of one part 3
Each carriage is installed in the HVAC which gives air Very Low
Partial failure of
4
conditioning functions such as cooling and ventilation as functionality
shown in Fig. 1. To control these devices correctly, an
- 417 -
Severity Criteria Evaluation ACKNOWLEDGMENT
Functionality failure of one
Low
component
5 This work was supported by the Korea Agency for
Infrastructure Technology Advancement (KAIA) by the
Medium One function failure 6
Ministry of Land, Infrastructure and Transport under Grant
High Two functions failure 7 RS-2019-KA152194..
Very High All functions failure 8 REFERENCES
Warning Fire possibility 9 [1] F. Yangyang, et al, “Utilizing commercial heating, ventilating, and air
conditioning systems to provide grid services: A review,” Applied
Alarm Immediate danger 10 Energy, 2022, vol. 307, pp. 118133.
[2] Y. Yanzhe, et al, “A review on available energy saving strategies for
TABLE II. DETECTABILITY OF FAILURES[9] heating, ventilation and air conditioning in underground metro stations,”
Renewable and Sustainable Energy Reviews, 2021, vol, 141, pp.
Criteria Evaluation 110788.
[3] L. Guannan, et al. “Review on fault detection and diagnosis feature
Fully detectable 1
engineering in building heating, ventilation, air conditioning and
Partial detectable 2 refrigeration systems,” IEEE Access, 2020, vol. 9, pp. 2153-2187.
[4] L. Changyuan, L. Xiaoming, Y, Panpan, “Train control management
Undetectable 3 system safety assessment,” International Conference on Electrical and
Information Technologies for Rail Transportation (EITRT2013)-
Volume II, 2014. pp. 583-591.
Finally, as we have discussed so far, we propose Risk [5] M. Rekik, C.Gransart, M. Berbineau, “Analysis of security threats and
Priority Number (RPN) based on three criteria referring to the vulnerabilities for train control and monitoring systems,” International
SAE-J1739 standard[10]. It was calculated by multiplying the Multi-Conference on Systems, Signals & Devices (SSD). IEEE, 2018.
pp. 693-698.
occurrence frequency, severity, and detectability[9].
[6] S. H. Han, S. G. Lee, W. K. Kim, “Development of onboard train
RPN = Occurrence (O) × Severity (S) × Detectability (D) (2) automatic control system for Korean standard EMU,” In: ISIE 2001.
2001 IEEE International Symposium on Industrial Electronics
Proceedings. IEEE, 2001. pp. 1257-1259.
[7] D. Yongliang, L. Qiming, L. Ying, “A research on subway physical
B. Machine Learning based Condition Diagnosis vulnerability based on network theory and FMECA,” Safety science,
To build a model for prediction of the condition diagnosis 2015, vol. 80, pp. 127-134.
using machine learning algorithms, we utilize the history of [8] IEC 60812 Technical Committee, “Analysis techniques for system
the temperature change of electric vehicles. Raw data from the reliability-procedure for failure mode and effects analysis (FMEA),”
TCMS is converted to time series data. From the operation IEC 60812, 2006.
data of the electric vehicle that has been. We use the bagging [9] K. Nam, C. Kim, “A Study on the Condition Diagnosis Model of
HVAC System for Urban Railway Vehicles,” Master's thesis, Korea
tree, which is one of the schemes of machine learning to National University of Transportation, 2023.
analyze the data. To aim it, a preprocessing process is required [10] C. S. Carlson, “Effective FMEAs: Achieving safe, reliable, and
to modify the temperature history by date to match the economical products and processes using failure mode and effects
operation characteristics of the electric vehicle, which analysis,” John Wiley & Sons, 2012.
operates from dawn until dawn the next day.
- 418 -
A Study on Route Selection Methods of
Autonomous Vehicles for Public Mobility
Jung-Ju Kim 1*, Gi-Won Kim 1, Chan-Jong Lee 1, Jun-Seok Lee 1, Jae-Hun Choi 1, Hyung-Woo Jin 1
1
Dept. of Robotics, Hoseo University, Korea
Email: [email protected]
Abstract—In order to introduce autonomous car to public the vision sensor. For the autonomous mini-tram to make
mobility prior to the development of fully autonomous vehicle, decisions and drive using this algorithm, the color indicative
a new system is needed to ensure driving performance and of the route it is to drive needs to be pre-established.
stability while minimizing human intervention. In order to solve
this problem, we introduced an autonomous guidance lane A. Operation of multi-complex routes for public mobility
system that displays the driving route of autonomous vehicle by A complex route is a route that overlaps with two or more
painting on the surface of the road. Public mobility used in single routes. To operate a multi-complex routes, we use
urban areas is operated in multiple routes in most cases, and different colors for the guidance lanes of each single route and
some sections of the multiple routes are operated by multiple complex route. Fig. 1 is a multi-complex routes map for test
cars in common. In this case, the autonomous mini-tram must operation of autonomous mini-tram for public mobility in an
recognize and drive its own route. In this paper, we propose a
industrial complex located in Seokmun-myeon, Dangjin-si,
method for autonomous car for public mobility to recognize and
drive on their own route by using autonomous guidance lane
Chungcheongnam-do. A total of three routes were set up for
system. test operation of autonomous mini-tram. Colored guidance
lanes were installed on the road surface of each route.
Keywords—autonomous vehicles, route selection, public
mobility, guidance lane for autonomous vehicle, mini-tram
I. INTRODUCTION
Traffic congestion and environmental issues are
constantly increasing in modern cities. As an alternative,
autonomous driving technology is attracting attention, and
various studies are being conducted to apply autonomous
driving technology in public mobility[1-4]. Mini-trams are
small-scale trams that can be used as a next-generation
mobility service in cities, and various studies are underway to
commercialize them[5-6]. However, most mini-trams
currently use the method to bury magnet on road method to
build infrastructure, which incurs high costs. In addition, when
multiple routes of mini-trams overlap, difficulties arise in
route identification and operation management, so various
studies are being conducted for accurate route selection[7-10].
In this study, we propose an autonomous driving method
for mini-tram to be utilized as public mobility through
Fig. 1. The multi-complex routes map for autonomous mini-tram
guidance lanes painted on roads. In particular, we propose a
route selection algorithm for operating multi-complex routes
of mini-tram. To this end, we developed colored guidance
lanes for formation of multi-complex routes. We also B. Guidance lane for autonomous vehicle
developed an algorithm that can select a route using the color The guidance lane for autonomous vehicle is a lane
difference of each route and verified its performance through installed on the road to select the route of the autonomous
experiments. mini-tram for public mobility. The guidance lane for
II. BODY autonomous vehicle can be set in various colors and forms
such as Fig. 2. The autonomous mini-tram recognizes
The CGL(Colored guidance lane) is necessary for the guidance lanes using vision sensor. Fig.3 is the multi-complex
operation of the multi-complex routes for autonomous public route consisting of two single routes and one complex route.
mobility. In this study, we installed colored guidance lanes on In the case of autonomous mini-tram that operate Route A, it
the road surface for the autonomous mini-tram. We developed is set to follow green and red colored guidance lanes, so it
a route selection algorithm that allows the autonomous mini- turns left along the red colored guide lane after going straight
tram to recognize the colored guidance lanes, select its route, along the green guide lane.
and drive accordingly. The route selection algorithm utilizing
colored guidance lanes recognizes the shape and color of the
colored guidance lanes extracted from the images acquired via
- 419 -
• Route selection using histogram of hue
Fig. 5 (a) is an image of colored guidance lanes
obtained through the preprocessing and lane
extraction algorithm from an image acquired using a
vision sensor. Fig. 5 (b) is a histogram of the hue
values extracted from the image of colored guidance
lanes. The autonomous mini-tram selects the route by
comparing the hue histogram extracted from the read
image using a vision sensor with the hue value set to
drive in advance.
Fig. 2. Guidance lanes for autonomous vehicle
V = max(R, G, B) ()
60(G-B)
if V = R
V- min(R, G, B)
60(B-R)
H= 120+
V- min(R,G,B)
if V = G ()
60(R-G)
{ 240+ V- min(R,G,B) if V = B
- 420 -
guidance lanes and route selection algorithm based on
computer vision. The experiments confirmed that the vision
sensor can select the route to drive based on the color
difference of the guidance lanes. Existing autonomous mini-
trams require construction such as reclamation of magnet and
need various expensive sensors. However, since autonomous
mini-tram that use route selection algorithm using colored
guidance lane choose the driving route with a single vision
sensor, reclamation of magnet and expensive sensors are not
required, so it can be introduced at a lower cost than
autonomous mini-tram.
IV. CONCLUSION
In this paper, we propose a route selection method for
autonomous mini-trams to be used in public mobility, using
- 421 -
A Model for Implementing Network-Connected
Systems to Train Control Systems
Gyuoyoung YEON 1 , Jaeho LEE2 and Jongwoo LEE 1*
1
Graduate School of Railway, Seoul Nation University of Science and Technology
2
Korea Railroad Research Institute, Korea
Email: [email protected], [email protected], [email protected]*
Abstract -Train control systems are composed of different following train, and system operation as shown Figure 1. Each
signaling subsystems which are connected each other through systems works with a kind of states information and yield
hard wired communication cables. In virtue of internet control information. The subsystems being part of a system
technology progressing, the internet communication systems are only output its state information such that track circuits. Some
gradually introducing to the train control systems. This paper subsystems receive the output of exterior systems and output
reviewed how internet communication does implement to the control signal such that interlocking systems. [1]
train control systems by considering system architecture
configuration, data structure, address allocation and
communication speed.
I. INTRODUCTION
As a result of Internet systems having been rapidly
progressing, hyper connected society comes to true, which all
systems would be connected through internet systems, which
it is called IP based systems. In railway systems, many
domains become informatized such as information systems,
ticketing, scheduling, resource management and so on…
The IP based systems are applied to train control systems
which are safety critical systems. Railway systems are
composed of a lot of various systems, which coexist as past,
present and future systems. It means that it is very difficult to
get to computerize all systems at once. Most railway systems
are to be IP-based systems with incremental renovation.
Fig. 1. Train Control System Architecture
Train control systems consist side-by-side of mechanical,
electronic and computerized systems. Nonetheless many train The train control systems have to exchange the states and
control systems get to be informatized, but all systems aren’t control information through communication systems. In the
converted to IP based systems. past, the communication has achieved with analog system and
hard wired system. Nowadays, by virtue of computer-based
Train control systems are safety critical systems which communication and optic-fiber systems, train control systems
ensure train control safety with railway system states and and communication systems become intelligent electronic
control. The safety-critical states and control information flow devices. The intelligent train control systems get high
in closed communication networks to keep its security. But the throughput for data communication and have a various
electronic systems connect one to one for each other with hard functions keeping its fundamental functions. [2]
wired systems for data communication. The electronic
systems easily maintain its security because the Railway lines are divided into two regions, one includes
communication lines are reserved only for its communication. turning switches, another no switches. The interlocking
system controls the region having switches. The interlocking
If IP-based systems are implemented for train control system control the routes and train speed in the region by the
systems, the IP-based systems are required to get the same control of points and lineside signals. The region without
level or the above of the conventional system safety. switches are controlled by block systems which consist of
In this paper, we considered how to implement IP-based track circuit and speed control logic equipment. The block
systems to train control systems. system controls train speed.
Train control systems carry out the functions which are The interlocking system and the block system cooperates
train routes control, spacing between precedent train and to set routes and train speed control. They exchange states
- 422 -
information and control the equipment such that point communication system would be adopted ad hoc
machines and lineside signals to open routes and to control whenever the need arose. [3]
train speed.
All networked systems are rapidly converted to IP-based
The function blocks in Figure 1 can be represented in systems. In the world of networking, an IP address is a unique
systems, we can define the I/O between the systems in Table numerical label assigned to each device connected to a
1. The systems are represented in row and column to define computer network that uses the Internet Protocol for
input and output between the systems in Table 1. The communication. Dedicated IP addresses also allow for
shaded(upper) rectangle in the table interior is the output of customizable signal system settings. With a shared IP address,
systems in row and input for the systems in column. The the signal system settings are controlled by the signal engineer
normal(lower) rectangle is the output of the systems in column and cannot be changed. However, with a dedicated IP address,
and input for systems in row. the user has full control over the signal system settings and
can make changes as needed. This allows for greater
TABLE I. I/O DATA BETWEEN SYSTEMS flexibility and can be especially useful for businesses that need
to make frequent changes to their signal settings.
II. 3. NETWORK BASED TRAIN CONTROL SYSTEMS
A. 3.1 IP-based train control systems
IP-based signaling systems have to install NIC(Network
Interface Card) and communicate each other with internet
protocol to get control command and states data. Computer-
based train control systems can be converted to IP-based
systems by implementing NIC and SW for IP communication.
The converted systems have to connect network and to
allocate its own IP address to communicate the other IP-based
systems.
B. 3.2 Communication network architecture for
Simplified input/output data between the systems
interlocking systems
represents in the Table 1. To transmit the data between the
systems, serial communication such as RS 232, RS 422, Interlocking systems as a system managing train operation
RS482 and giga-Ethernet have been widely used in close are connected to most of signaling systems and play a role for
range. The lineside signals and its LEU (Lineside Electronic data collecting hub. The interlocking systems places in station
Equipment) are located in long range. The communication premises because the interlocking systems run manually or
between LEU and control is used modem systems rather than automatically.
the serial communication. In recent, many fiber-optic Interlocking systems are integral to the management of
communication introduces in train control system. The fiber- train operations. They are connected to a wide range of
optic system is resilient to heavy noise environment and high signaling systems within a railway network and serve as a
speed communication. Most of railway train control systems central hub for collecting data. The primary function of an
implement fiber-optic communication phase-in. interlocking system is to ensure the safe and efficient
movement of trains by coordinating signals, switches, and
track sections.
Interlocking systems can operate in either manual or
automatic modes, depending on the specific configuration and
requirements of the railway network. In manual mode,
operators stationed at the interlocking system manually
control the routing of trains, monitor track conditions, and
manage the overall train movement process. In automatic
mode, the interlocking system uses predefined rules and
algorithms to make decisions and control train movements.
Due to their critical role in managing train operations,
interlocking systems are typically located within station
premises. Placing them in station premises offers several
advantages. Firstly, it provides easier access for operators who
need to interact with the system. Secondly, it allows for better
coordination between the interlocking system and other
station-based operations, such as ticketing, passenger
information, and station management. Lastly, centralizing the
Fig. 2. An Example of Mixed Communication System interlocking system within the station premises enables
efficient communication and integration with other signaling
Figure 1 An Example of Mixed Communication System and control systems.
This type of communication system as shown Figure 2 By being positioned within the station premises,
have been phasing communication system in. This new interlocking systems can effectively interface with various
signaling systems, collect essential data related to train
- 423 -
movements, and facilitate the necessary control and • SCI-IO (General IO): Defines the interface for each
coordination to ensure safe and efficient train operations. lineside device.
The closed network is dedicated to connecting safety- • SCI-LS (Light Signal): Defines the interface for light
critical signaling devices. It ensures secure and reliable signals.
communication between these devices, which are crucial for
maintaining the safe operation of the railway system. This • SCITDS (Track Detection System): Defines the interface
closed network is designed to handle and transmit safety- for track detection systems.
critical information between the interconnected devices. • SCI-LX (Level Crossing System): Defines the interface
On the other hand, the open network is utilized for for level crossing systems.
transmitting information that is not directly related to safety. • SCI-P (Point): Defines the interface for points (switches)
This network facilitates the flow of non-critical information, in the railway system.
such as operational data, maintenance updates, or non-safety-
related communications, between various devices within the • SCI-CC (Command Control System): Defines the
interlocking system. interface with the controller.
By separating the communication network into these two • SCI-RBC (Radio Block): Defines the interface for the
subsystems, EULYX's architecture provides a structured and radio block and interface center.
secure approach to manage both safety-critical and non- In order to ensure the integrity of communication data
safety-related information within the interlocking systems. between the transmission layer and the application layer, the
SCI utilizes a railway safety communication application
protocol called RaSTA (Railway Safe Transport Application).
This protocol has been developed to comply with standards
such as EN50159 and IEC62280, which are relevant to
railway safety networks. EULYNX prescribes the use of the
RaSTA protocol in its standards and provides equipment
development guidelines accordingly.
- 424 -
Kbytes. 100M bps of switch and routers is sufficient for the
train control systems.
B. 4.2 Interface device between interlocking and Fig. 9. Closed network for train control Systems
subsystems
The interlocking system and the subsystems can be C. 4.3 IP address
constructed as shown in Figure 6. The train control system can IP address is a kind of private address for the closed
be cut off from the outside by forming a LAN network using networks. The IP address allocation is to be followed to its
an L3 switch. own principle which the addresses allocate. [10] In train
control system, address number is relatively small and
The data amount of control and states information of the communication reaching area is small with compared to
train control systems isn’t big which is less than several
- 425 -
public internet system. We can easily make routing tables for
routers.
IV. CONCLUSION
We investigated and analyzed the relationship between the
network configuration and the railway signal system to realize
the IP-based interlocking device, and presented the IP-based
network.
Ethernet communication is required to connect signaling
equipment and network equipment. Although it is necessary
to consider the safety of the NIC used for the traffic control
purpose, the basic concept for IP-based system is to configure
a basic network by connecting NIC for train control and the
L2 switch.
Since the train control system is physically grouped, it is
necessary to build a LAN network to connect this group. A
physical configuration of a LAN network can be configured
using an L2 switch.
A network construction of a train control system needs to
be constructed using a router that can connect each LAN. A
train control network consisting of large stations requires
multiple routers, and networks in the same station is treated as
LAN and must use the same protocol.
The network of the train control system needs to construct
a hierarchical network. This hierarchical network becomes a
topological tree-like structure and is easy to control.
Since the address assignment of the train control network
is a closed network, a separate address assignment method can
be constructed. The network address for train control needs to
be constructed as the public network address system, which is
easy to group signaling systems. This address method can
easily construct a LAN using a router.
REFERENCE
[1] Gregor Theeg, Sergej Vlsenko, “Railway Signalling and Interlocking ”,
International Compendium, Eurail press
[2] Marie Le Bliguet and Andreas Andersen Kjaer, “Modelling
Interlocking Systems for Railway Stations”, Kongress Lyngby 2008
[3] Bruce Chang, “Railway Communication Systems”,
http://www.oringnet.com
[4] Frans Heijnen, “EULYNX The next generation signalling
strategy for Europe”
[5] CISCO, “Internetworking Technologies Handbook”
[6] Larry L. Peterson and Bruce S. Davie, “Computer
Networks- a system approach”, mkp.com
[7] Behrouz A. Forouzan, “Data Communications and
Networking”, McGraw Hill
[8] CISCO, “IP Addressing : IP4 Addressing Configuration
Guide”
[9] Kevin R. Fall and W. Richard Stevens, “TCP/IP Illustrated
Volume 1”, Addison-Wesley
[10] Richard T. B. Ma, “Forwarding and Routing-PPT”,
[11] https://electronicspost.com/forwarding-and-routing-in-
network-layer/
- 426 -
A Study on Transient Relief Methods through
Characteristic Analysis of Electric Railway
Vehicle Spark Gap
Jongrok Choi 1, Chinyoung Chang 1, Jaemoon Kim 1, Jaeyoung Kim 1, Hojun Kwon 1
(Use * to indicate the correspondence author)
1
Korea National University of Transportation Smart & Safe Management System for Advanced Rail Transport, Korea
Email: [email protected]
Abstract—In accordance with the demand for the relief of In addition, a spark gap is a device that induces a voltage
traffic congestion in large cities, high-speed trains, drop due to insulation breakdown between electrodes in the
rationalization of energy use, and eco-friendly transportation, air. It performs a similar function to an arrester, but unlike an
the electrification project began in 1968, starting with the arrester that has stable voltage suppression and current
central line and the Taebaek line, which are industrial lines. It limiting capabilities, the ambient conditions (temperature,
contributes a lot to mass transportation, logistics cost reduction, humidity) and pollution level Depending on the environment,
and management improvement. the magnitude of the breakdown voltage varies, so the
prediction range of the suppression voltage is widely
Recently, faults such as burnout of instrument
transformers and lightning arresters have repeatedly occurred
distributed.
in insulation sections and steep gradient sections of domestic
In Figure 1, when the surge current flows, the limit voltage
commercial and industrial lines, and abnormal voltages caused
by harmonic power such as power converters have become a of the arrester is generated, and the limit voltage and the
cause of failure of electric railway vehicles. In this study, we transient voltage generated by the ground potential rise are
would like to analyze the operating characteristics of the discharged in the spark gap to protect the main transformer.
lightning arrestor and spark gap of the high-speed rail vehicle
against the abnormal voltage.
I. INTRODUCTION
Domestic disorders such as transformers and lightning
instructors are generated repeatedly in the intersection of
domestic electric railways and industrial lines and industrial
lines, and it is causing disorders of electric rail vehicles due to Fig. 1. Composition of KTX-Sancheon Lightning Arrester SG
abnormal voltage caused by harmonics in power conversion
devices such as power conversion devices there is. In this B. KTX-Sancheon Lightning Arrester and SG Abnormal
paper, we will analyze the operation characteristics of the Operation Occurrence Status
abnormal voltage of KTX-Sancheon's lightning group and After the introduction of KTX-Sancheon, an analysis of
spark gap. the abnormal operation of the spark gap up to now confirmed
that the spark gap of the power car on the opposite side of the
II. MAIN SUBJECT power supply car (pantograph rise) operated in about 86% (12
A. Arrester and Spark Gap out of 14 times) of the total. This seems to be due to mutual
influences such as the resonance of the roof line of the front
Lightning arresters are divided into gap type and gapless and rear power cars, the lightning arrester, and the SG when
type. Spark gap is the most basic of gap type and economically the MCB is input after the pantograph rises.
used as a device that can protect the system from overvoltage.
It has been used for a long time. Due to the improvement in C. Simulation
performance, the gapless lightning arrester is in charge of the
main protection function against abnormal voltage, and the Figure 2 is an AC electric railway power supply system of
spark gap mainly performs the back-up protection function. the AT power supply method. Since the % impedance changes
In the KTX-Sancheon high-speed vehicle, a spark gap (SG) according to the position of the electric vehicle, which is the
is installed in parallel with the lightning arrester in the circuit load in the AT power supply system, simulation was
configuration of the high-voltage bushing of the main performed to analyze the operation characteristics of the
transformer, so that the surge voltage flowing into the main arrester and SG according to the resonance position.
transformer is primarily limited by the arrester, and this
limiting voltage is It serves to protect the main transformer by
grounding the secondary surge voltage in the connected spark
gap.
- 427 -
(a) Lightning Arrester + No Spark Gap (b) Arrester + With Spark Gap
Fig. 5 Surge voltage simulation result (%Z=0.5).
Fig. 2. AT-powered alternating current electric railway Here, it can be seen that in the case of no insulation
coordination, the Vpeak value increases by 168% from
· Simulation of the presence or absence of insulation the reference value, whereas in the case of insulation
coordination coordination, it increases only by 124% from the
reference value.
In order to review the surge voltage generated when
the MCB of KTX-Sancheon is turned on, the change · A graph within a graph is an “inset”, not an “insert”.
in % impedance of the transformer, the use of lightning The word alternatively is preferred to the word
arresters, the voltage amplification phenomenon due to “alternately” (unless you really mean something that
resonance, and the application of RC circuits were alternates).
confirmed in case studies and vehicle load modeling.
· Do not use the word “essentially” to mean
Vpeak[kV] Vpeak[kV] Vpeak[%] Vpeak[%] “approximately” or “effectively”.
%Z
Case @PC1 @PC2 @PC1 @PC2
(pu)
w/o SA w/o SA w/o SA w/o SA
· In your paper title, if the words “that uses” can
Case 1 0.1 64.480 64.598 165.84 166.15
accurately replace the word “using”, capitalize the “u”;
Case 2 0.2 64.677 64.806 166.35 166.68
if not, keep using lower-cased.
Case 3 0.3 64.855 64.994 166.81 167.17
%Z
Vpeak[kV] Vpeak[kV] Vpeak[%] Vpeak[%] · Do not confuse “imply” and “infer”.
Case @PC1 @PC2 @PC1 @PC2
(pu)
w/ SA w/ SA w/ SA w/ SA
· The prefix “non” is not a word; it should be joined to
Case 1 0.1 48.169 48.561 123.89 124.90
the word it modifies, usually without a hyphen.
Case 2 0.2 48.187 48.567 123.94 124.92
Case 3 0.3 48.204 48.572 123.98 124.93 · There is no period after the “et” in the Latin
Case 4 0.4 48.220 48.577 124.02 124.94
abbreviation “et al.”.
Case 5 0.5 48.234 48.581 124.06 124.95 · The abbreviation “i.e.” means “that is”, and the
Fig. 4. Simulation result according to %Z change (with arrester) abbreviation “e.g.” means “for example”.
Figures 3 and 4 are simulation results of surge voltage An excellent style manual for science writers is [7].
generation according to the increase in % impedance
III. CONCLUSION
of each transformer with and without lightning
arresters. As %Z increases, the peak voltage tends to In this study, the operating characteristics of the arrester
increase slightly. and spark gap applied to KTX-Sancheon were analyzed.
Therefore, in the KTX-Sancheon high-speed vehicle in which
· Surge voltage simulation result power cars are configured before and after and power is
Through Figure 3, Figure 4, Figure 5, and Figure 6, it supplied to the power cars at both ends through one collector,
can be seen that the surge voltage simulation result the lightning arrester performs the primary protection function
value changes depending on the presence or absence of against the transient voltage, but the lightning arrestor protects
the arrester and the spag gap when the main circuit the vehicle opposite to the collector power car. It can be seen
breaker is turned on. that the protection effect against fatigue can be enhanced by
using a spark gap for additional protection beyond the
operating capacity.
REFERENCES
[1] Kim Jae-moon, “Electric railway power supply system voltage drop
(a) Lightning Arrester + No Spark Gap (b) Arrester + With Spark Gap compensation using fuel cell system”, 2015
Fig.54 Surge voltage simulation result (%Z=0.1) [2] Korea Railroad Corporation, ‘High-speed Vehicle Maintenance
Manual’, 2013
[3] Choi Jong-rok, “A Study on the Insulation Cooperation of Lightning
Arrester and Spark Gap of High-Speed Rail Vehicle”, Master's Thesis
2016
- 428 -
Development of Trolley for Detection
Installation Errors of Catenary System
Chulmin PARK1*, Dongkue Kim1, Sangjin SON2
1
Korea Railroad Research Institute, Korea
2
Myeong-sung Rollingstock & Plant Co. Ltd, Korea
Email: [email protected]
- 429 -
B. Development of mobile trolley catenary system. In the future, we plan to develop an
algorithm that can reconstruct a precise 3D shape by reflecting
the curve and cant of the line using GPS, IMU, etc., and
In this paper, an unmanned/automatic mobile trolley measure the construction error of the catenary through this.
equipped with a complex sensor-based construction error
detection system was developed to precisely measure the
construction error of the catenary system. This trolley is
designed/manufactured considering the installation location
of each sensor. To measure the deviation of the contact line,
the center of the stereo camera is placed in the center of the
rail, and the LiDAR stands on a separate pole at the end of the
top plate to prevent interference with other sensors. On the
other hand, springs are installed on the wheels of the trolley so
that it can run without twisting on the curved roads of the rail,
and driving information is recorded using an encoder-
integrated motor that can be moved with a battery.
ACKNOWLEDGMENT
This research was supported by a grant from R&D
Program (A study on operation efficiency improvement of
Fig. 3. Detailed design of Trolley(side view and top view) railway electricity utilizing smart composite sensors based
geometric information system, PK2303E2) of the Korea
Railroad Research Institute.
B. Fabrication and testing of moblie trolley
- 430 -
Research on the development and application of
lightweight catenary poles for emergency
recovery
Ho Ryung Cho1, Jong Nam Kim 1, and Hong Kuk You1, Young Jae Na1, and Jae Moon Kim2*
1
Department of SMART Railway System, Korea National University of Transportation, Republic of Korea
2
Department of Transportation System Engineering, Korea National University of Transportation, Republic of Korea
I. Introduction
In the recent 6 years from 2016 to 2021, there were 19 train
derailment accidents on domestic railways, an average of 3.2
cases per year. situation [1]. The existing product used as an
emergency steel pipe column for accident recovery is made of Shintanjin ~ Maepo freight Photo of checking the
steel and weighs about 360 kg and has a large unit length. Since train derailment scene photo damage of the catenary pole
it must be constructed after construction, there is a high risk of
industrial accidents in the musculoskeletal system of workers, Figure 1. Gyeongbu Line (Shintanji-Maepo) Freight Train
and there is a disadvantage in that excessive recovery time is Derailment Accident (Train pole: 5 damaged) - 2006. 03. 11.
required.
Figures 2 below are about the installation method of steel
In this paper, after confirming the feasibility through the pipe columns for emergency recovery. First, after digging out
characteristics analysis and design review of the lightweight about 60cm of the part between the sleepers at the installation
material for the light weight of the emergency recovery location for the installation of emergency steel pipe columns,
catenary pole, and then manufacturing the prototype and and secondly, pipe structural beams for emergency steel pipe
structural test, the final aluminum material was selected and column installation. is fixed to the bottom of both rails, and
the lightweight prototype was manufactured. In addition, the then, thirdly, assemble the movable bracket ring and the upper
rail fastening device for assembling and installing lightweight feeder support insulator assembly bracket to the emergency
catenary poles was also developed for concrete roadbeds, and steel pipe column consisting of three units, and then assemble
the safety test through on-site installation test was conducted. the lower part of the emergency steel pipe column to the side of
the pipe structure beam to make the steel pipe The column is
- 431 -
assembled and installed at a right angle, and fourth, the material Steel Steel Al alloy
construction of the emergency steel pipe column is completed
by connecting wire ropes to the left and right at the upper two
places and firmly fixing it to the ground [3]. Apply gravel Gravel ballast
Gravel ballast
track track application
track application
After the installation of the emergency steel pipe column
is completed, assemble the movable bracket including the long It is a method of It is a method of
It is a method of
insulator for the installation of the catenary and clamshell, assembling and assembling and
assembling and
installing 3 units installing three
install the feeder, catenary and clamshell to connect the tension of an integrated
installing three
adjusting device, and then install the dropper and perform Charac- truss structures truss structures on
teristic (pipe) structure the lower side of a
adjustment work to the train is ready to run. on the lower side
in a pipe beam rail (1 piece). The
of a rail (1 piece),
structure at the movable bracket
and is
bottom of the for general use is
characterized by
rail (2 pieces), applied as it is.
applying a
and the general
simple-shaped
movable bracket
movable bracket.
is applied as it is
Photo
< Assembly and installation < Installation of the movable 2. Design of lightweight catenary pole and rail
of emergency steel pipe bracket >
fastening device for emergency recovery
columns >
Figure 2. Installation of steel pipe columns for emergency 1) Design of lightweight catenary pole for emergency
recovery recovery
- 432 -
B. Maximum bending stiffness (moment) calculation of
FRP catenary pole: ∅165 × 7.5T
- 433 -
3. Prototype production and bending characteristics
verification test
3) Rail fastening device design Table 3. Bending property test results for prototypes for
each material
The rail fastening device for the installation of catenary
poles for emergency recovery is a pipe beam-shaped rail
fastening device that is installed after excavating more than displacement remark
60cm of existing rail gravel, and is designed to be slim so that it test load check (mm) displacement
sample
can be applied to concrete roadways in the city center as shown (kgf) (mm) Length/weight
in Figures 6 and 8 [4]. Height Height (kg)
(free) (Loading)
FRP
Ⅰ(Filament 485.48kg 1890 1675 215 2650mm / 38
Winding)
FRP Ⅱ
485.48kg 1900 1690 210 2650mm / 45
(Prepreg)
A6063-T6 490.48kg 1875 1800 75 2650mm / 40
- 434 -
200Kgf Loading
2 AL Alloy 200 7900
safety
200Kgf Loading
3 STEEL 200 8000
safety
III. Conclusion
- 435 -
A Study on the Characteristics of Power System
Protection System According to Regenerative
Braking of Urban Railway Vehicles
Jong Hak Park 1,2, Jeong Hyung Kang 3,4, Seung Ho Song 1,4,
Sung Cheol Han 1,2, and Jeong Won Kang 1,3*
1
Department of Transportation System Engineering, Korea National University of Transportation, Republic of Korea
2
Seoul METRO, Republic of Korea
3
Department of SMART Railway System, Korea National University of Transportation, Republic of Korea
4
KORAIL, Republic of Korea
Abstract— This study examines the influence of regenerative Additionally, the impact of the overhead line voltage on the
power generated through regenerative braking on the power catenary line and the power system was investigated. The study
system, specifically focusing on the transition from resistance also examined the protection system for the train and power
and chopper control electric vehicles used in urban railways to system, focusing on the inverter protection system and the
VVVF electric vehicles. Urban railways in our country are power system protection system. A comparison and analysis of
predominantly built underground, limiting the utilization of the suitability of the mutual protection system settings revealed
natural lighting to about 20% of the total system. Consequently, a discrepancy in protection coordination due to differing
electricity plays a vital role in powering trains, as well as various parameter values. Accident case analysis was employed to
passenger amenities (E/S, E/V), lighting, and auxiliary facilities, highlight failures that may occur due to disparities in protection
which collectively account for over 95% of the total energy coordination settings between power systems.
consumption. Train operation itself constitutes approximately
70% of the energy consumption. Moreover, with the addition of Within the inverter protection settings of VVVF electric
safety features such as screen doors and the expansion of vehicles, further assessment is required to determine the
customer convenience facilities, the energy demand continues to adequacy of the low voltage threshold for the overhead line
rise, while the energy-saving rate declines. Thus, it becomes (850±10%), as well as the increased capacity of surge arresters
imperative to enhance the system to significantly reduce and energy storage devices (ESS) to ensure stability in energy
electricity consumption, particularly in electric vehicles that efficiency and overhead line voltage within substations.
consume more than 70% of the total energy. Additionally, a thorough discussion is needed regarding the
reuse of system protection to address this issue. Specifically,
Since 2000, ○ ○ Corporation has been progressively electric vehicle manufacturers should focus on developing
replacing the initial resistance and chopper control trains with technical measures to reduce the error range, enabling the
VVVF trains, thereby achieving improved energy efficiency inverter-based decompression system to operate at an overhead
through regenerative braking, combined with the installation of line voltage of DC1,800 [V].
energy storage devices. However, this transition has resulted in
unexpected phenomena, including increased overhead wire
voltage during regenerative braking, abnormal power system
voltage, and an upsurge in vehicle failures. To address these Keywords—Power System, Protection System, Braking, Urban
issues, the VVVF control vehicles underwent modifications, Railway Vehicles
such as a 10% weight reduction compared to the initial VVVF
control vehicle, the adoption of LED lighting, improved ACKNOWLEDGMENT
regenerative braking cutoff speed (from approximately 12 km/h This work was also supported by the Korea Agency for
to 3 km/h), and the utilization of regenerated power from the Infrastructure Technology Advancement (KAIA) grant
motor car in the trailer car (M-T method), wherein 35% of the funded by the Ministry of Land, Infrastructure and Transport
electric power consumption of the electric car is repurposed as (Grant No. 22QPWO-C158106-04).
regenerative power.
- 436 -
A Study on Stabilization of Code Frequency
Control Between Wayside and Onboard Signal
System of AF Non-insulated Track Circuit
Dong Hoon Park 1, Ho Hyun Han 1, and Seon Kyo Kim 1, Jeong Won Kang 1,2*
1
Department of SMART Railway System, Korea National University of Transportation, Republic of Korea
2
Department of Transportation System Engineering, Korea National University of Transportation, Republic of Korea
- 437 -
A Study on the Integrated Operation of VHF
and Complex Communication Facilities
Seon Kyo Kim 1, Dong Hoon Park 1, and Ho Hyun Han 1, Jeong Won Kang 1,2*
1
Department of SMART Railway System, Korea National University of Transportation, Republic of Korea
2
Department of Transportation System Engineering, Korea National University of Transportation, Republic of Korea
Abstract— The purpose of this paper is to present a Keywords—VHF, LTE-R, leaky coaxial cable, complicated
communication facilities
method for integrated operation of the train wireless
The policy changes caused the mixture use of the VHF and
rescue.
- 438 -
A Study on CBM Application of Power Capacitor
for SIV in Railway Vehicles
Hyo-Seok Oh 1, Yong-Eun Choi 1, Byung-Min Moon 1, Seung-Pyo Jeon 1, Jae-Moon Kim 1*
1
Korea National University of Transportation, Republic of Korea
Email: [email protected]
I. INTRODUCTION
The power capacitors used in the power conversion
devices of railway vehicles experience a decrease in
capacitance due to aging caused by various environmental
factors and usage time, resulting in a deterioration in the
performance of the power conversion device. However, the Fig. 1. SIV circuit and DSM system
existing maintenance system for railway vehicles is based on
mileage and usage time, making it impossible to determine the Most capacitor status diagnosis research primarily focuses
condition of components during vehicle operation. To solve on electrolytic capacitors, using capacitance and equivalent
this problem, it is necessary to introduce a condition-based series resistance (ESR) estimation to determine their status.
maintenance system that can monitor and analyze the However, the DC-link capacitor used in the SIV utilizes a more
condition of components in real-time.[1][2] stable metalized polypropylene film (MPPF) capacitor instead.
In this paper, we have selected the SIV as the target among Estimating the status of MPPF capacitors poses challenges due
the power conversion devices of the vehicle and have installed to their extremely low ESR component. Therefore, we selected
a Data Sensing Module (DSM) on the vehicle during actual capacitance as the diagnostic factor for assessing the capacitor's
operation to sense the device's data. Additionally, we propose status [4]. Additionally, measuring the current flowing through
a CBM approach that can provide more accurate information the capacitor is not feasible due to the SIV's internal structure.
on the status of power capacitors by considering the SIV's The converter's output current consists of direct current and
internal structure and characteristics. ripple, with a significant portion of the ripple component
passing through the capacitor. By extracting the ripple
II. SIV ENVIRONMENT AND CBM METHODS component using frequency analysis methods like Fast Fourier
Fig. 1 presents a block diagram of a capacitor condition Transform (FFT), we propose an indirect method to estimate
diagnosis system implemented through an SIV circuit and the capacitor's capacitance, as shown in equations (1) and (2).
DSM. The SIV receives power from the pantograph and 𝐼̂𝐶 = 𝐼𝑐𝑜𝑛_𝐹𝐹𝑇 (1)
undergoes a step-down process through a transformer.
Subsequently, the power is converted into a stepped-down Here, 𝐼𝐶 represents the indirectly derived capacitor current,
direct current by the AC/DC converter, and a stable voltage is and 𝐼𝐶−𝐹𝐹𝑇 represents the current value in the frequency band
then supplied to the inverter through the DC-Link capacitor. of the converter's output ripple.
The inverter, in turn, provides power to AC loads such as air
𝐼̂𝑐
conditioning and heating devices in the passenger 𝐶̂ = 𝐼 (1)
compartment. Additionally, there is a circuit that converts 2 × 𝜋 × 𝑓 × 𝑉𝐶_𝐹𝐹𝑇 𝑐𝑜𝑛_𝐹𝐹𝑇
power to direct current, which is supplied to DC loads
requiring direct current for lighting and control devices within Here, C represents the estimated capacitance, f represents
the vehicle.[3] The SIV has the capability to store various data, the frequency range of the acquired voltage and current, and
including operation information and failure records, in 𝑉𝐶−𝐹𝐹𝑇 represents the voltage value in the frequency band of
conjunction with the Train Control & Monitoring System the converter's output ripple.
(TCMS) in the event of an electrical accident [3]. However,
when a failure occurs, only simple data and failure codes are It is recommended to replace MPPF capacitors when their
stored, which makes it difficult to determine the status of the capacitance has decreased by 2% compared to their rated
device using TCMS data alone. Therefore, in this paper, we capacitance. This is because once the capacitance has dropped
installed voltage and current sensors and a Data Sensing by 2%, the capacitance experiences a sharp decrease, greatly
Module (DSM) inside the SIV to acquire capacitor data. affecting the performance of the power conversion device.
Therefore, it is reasonable to monitor the timing of capacitor
- 439 -
replacement using the proposed capacitance estimation
technique for the implementation of CBM in the capacitor.
III. RAILWAY VEHICLE TESTING AND DATA ANALYSIS
- 440 -
A Study on SoH of Lithium Polymer Battery
Applied to Railway Vehicles
Hyo-Seok Oh 1,Yong-Eun Choi 1, Byung-Min Moon 1, Seung-Pyo Jeon 1, Chin-Young Chang 1,
Jae-Moon Kim 1*
1
Korea National University of Transportation, Republic of Korea
Email: [email protected]
Abstract— In this paper, a battery with the same specificatio of battery loads under normal operating conditions, based on a
ns as a railway vehicle was constructed, and the load characterist standard configuration of one train consisting of 10 cars in the
ics of the vehicle battery were analyzed and applied to the experi metropolitan area. The details are presented in Table II.
ment. Additionally, for the estimation of SoH, we performed tem
perature correction and trend analysis to examine the relationshi TABLE II. BATTERY LOAD TYPE AND CAPACITY OF RAILWAY VEHICLE
p between changes in battery capacity and internal resistance.
Power Battery
Quantity Operational
No Device Name Consumption Load
Keywords— railway vehicle, load characteristic, SoH (1 Car) per Car(W) rate
Power (W)
1 SIV Controller 3 900 0.70 630
I. INTRODUCTION Initial
2 236 6,372 0.05 319
The battery for railway vehicles is used as a power source cabin lights
Continuous
to maintain starting, control power, and emergency power for 3 80 2,160 0.95 2,052
cabin lights
devices. In the past, lead-acid batteries and nickel-cadmium … … … … … …
batteries were used in electric railway vehicles, but recently, 65 I/O module 10 1,000 0.70 700
66 Circuit breakers 2 156 1.00 156
lithium polymer batteries are being applied to increase safety Indicator Lamp
67 2 100 1.00 100
and efficiency. The Korean railway industry has been using
Battery load capacity 13,413
lithium batteries since 2017, but there is a lack of research on
battery capacity changes and performance degradation. In
The analyzed battery load power is 13,413W, supplied by
addition, most lithium battery research focuses on cells, and
three battery packs at 4,471W each. Each battery pack has a
research on battery packs used in railway vehicles is
current capacity output of approximately 50A, calculated
insufficient. In this paper, the battery charging method and
based on the rated voltage of the battery. In situations where
load type applied to railway vehicles were analyzed, and a
power reception through the pantograph is unavailable,
battery system with the same specifications was established.
railway vehicles rely on battery power for all internal DC
In addition, data such as voltage, current, and temperature
loads during startup. The auxiliary air compressor raises the
were collected through the BMS(Battery Management System)
pantograph using pressure from the auxiliary air duct to
to analyze the aging characteristics of the battery. Correlation
establish contact with the trolley wire. The battery is used to
with internal resistance was analyzed to estimate the
charge the auxiliary air compressor, which typically takes
SoH(State of Health) of the battery.
around 8 minutes and occurs once a day on average.[3] In
II. BATTERY SPECIFICATIONS AND LOAD CHARACTERISTICS addition, when an urban railway vehicle traverses an insulated
section where the catenary does not supply electric power
The battery used in the experiment had the same
during operation, the DC load is solely powered by the battery.
specifications as those currently used in actual vehicles, as
The insulated sections were analyzed based on the operational
shown in Table I. Furthermore, We analyzed load types and
conditions of urban railway vehicles in the metropolitan area.
operational rates for batteries in railway vehicles and
As a result, the average daily time spent passing through
established a standard for the battery discharge current.
insulated sections was approximately 3 minutes. Combining
TABLE I. RAILWAY VEHICLE BATTERY SPECIFICATIONS
this with the initial startup time of 8 minutes, resulted in an
analyzed battery usage time of approximately 11 minutes.
Classification Specifications
Lithium polymer battery
Therefore, in this paper, we conducted experiments with a
Battery type
Module 1 : 2P9S
discharge current of 50A for 12 minutes, applying a 10%
Configuration Module 2 : 2P9S margin to the 11-minute usage time.
Module 3 : 2P7S
Nominal voltage DC 91.25V (3.65V X 25Cells) III. BATTERY AGING EXPERIMENT
Maximum charging voltage DC 106.25V (4.25V X 25Cells)
Rated capacity 106Ah (56Ah*2P)
SoH is an indicator of the aging state of a battery and is used
to determine when the battery needs to be replaced. The SoH
The battery of the railway vehicle is primarily used to supply of a battery is typically calculated using equation (1), which
power for the initial startup and control devices, operating compares the initial capacity to the current capacity due to
under a DC load of DC 75V to 100V. The battery is charged aging. A battery is considered to have failed when its capacity
using the constant float charging method, and power is directly falls to 80% of its initial capacity.
supplied to the DC load through the charger during railway 𝐶𝑐𝑢𝑟𝑟𝑒𝑛𝑡
operations. In this paper, we analyze the types and capacities 𝑆𝑜𝐻𝑐𝑎𝑝 [%] = × 100 (1)
𝐶𝑖𝑛𝑖𝑡𝑖𝑎𝑙
- 441 -
Fig. 1 is an experimental configuration diagram. The
bidirectional power supply is controlled through a computer,
and battery voltage, current, and temperature data are
collected at 1-second intervals from the BMS.
- 442 -
Pantograph Charging System for Electric Bus
Seungkwon Shin1*, Kiwon Lee1, Hyungchul KIM1, Rakgyo Jeong1, Sangryul Choi2
1
Korea Railroad Research Institute, Korea
2
Induck University, Korea
Email: [email protected]
- 443 -
B. Overseas Electric Bus Charging System
Overseas rooftop charging systems are being actively
developed by ABB and Siemens for efficient charging
infrastructure by using the pantograph down method (Pole-
mounted) and the pantograph up method (Roof-mounted).
The pantograph down method, in which the charging
infrastructure contacts the roof of the vehicle to charge, and
the pantograph up method, which connects the pantograph
installed on the roof of the electric bus. The pantograph
charging method can be charged at both the garage and the
bus stop, but the initial charging infrastructure construction
cost is high. Fig. 1 is a prototype of a top-down pantograph
method, and Fig. 2 is a conceptual diagram of charging four Fig 1. Prototype of top-down pantograph method
vehicles with one pantograph.
Pantograph-Down Pantograph-Up
Type
(Pole-mounted) (Roof-mounted)
Representative
Picture
Fig 2. Schematic diagram of automatic positioning multi-charging
pantograph system
- 444 -
Preparation Analysis of the Reduction Effect the
Increase Harmonic Resonance in the AC Electric
Railway Feeding System
Guk Hyun Son 1, Tae Hoon Kim 1, and Jae Moon Kim 1,2*
1
Department of SMART Railway System, Korea National University of Transportation, Republic of Korea
2
Department of Transportation System Engineering, Korea National University of Transportation, Republic of Korea
Abstract—The harmonic generation characteristics harmonic measurement location in the power supply
according to the running of the railway vehicle were confirmed substation.
by measurement at the sectioning post, which is the end of the
power feeding system. In particular, the phenomenon of
enlarged resonance of harmonics was confirmed through
measurement. As a solution, the harmonic resonance
suppression effect according to the separation or connection of TABLE I. IMPEDANCE AND FACILITY CAPACITY OF THE MEASURING LINE
the R-C bank was compared and presented. In this paper, it was
possible to quantitatively show the effect of reducing harmonic A downstream
Section An upward track
track
resonance through actual measurement.
Distance(㎞) 30.23 ㎞ 30.23 ㎞
Keywords— Source of harmonics, Harmonic resonance, Z 23.23 24.02
Harmonics reduction, R-C Bank
θ 70.73 70.73
Impedance
R 7.67 7.93
(TF-R)
X 21.93 22.67
INTRODUCTION
Z/㎞ 0.768 0.794
M.TR 45/60[MVA]
This study measured the number of vehicles put into the Facility
relevant power supply section on the actual train operation AT 7500[KVA]
capacity
track of the AT power supply system and the degree of RC-Bank R:550[Ω], C: 0.21[μF]
- 445 -
Accordingly, harmonic analysis equipment was installed amplification compared to cases where RC-Bank is not
on the control panel PTT of the power supply station to connected.
measure harmonic (THD) in order to analyze the amount of
TABLE III. RC-BANK ON
harmonic generated and resonance in the power supply section.
Section Minimum Maximum
Voltage THD[%] 1.17 9.32
CONCLUSION
Recently, the reduction effect of harmonic generation and
resonance expansion due to the operation and stop of RC-
BANK on the AT power supply system operation line
operated by various vehicles was compared. Before the
connection of the RC-Bank, the voltage THD was up to
Fig. 2 Feeding voltage and Harmonic in case of RC- Bank OFF 21.65%, but a significant reduction effect was confirmed to be
up to 9.32% in the RC-Bank operation. In order to increase the
effect of reducing harmonic resonance, it is necessary to apply
customized R-C values based on the harmonic source and the
B. RC-BANK connected impedance of the system through field measurement.
Figure 3 shows the result of measurement in a normal state
by connecting the R-C Bank of the power supply substation.
Changes in harmonic voltage significantly reduce harmonic REFERENCES
- 446 -
[1] Kim Jeong-cheol, “ Analysis of power supply system and
understanding of Korea Electric Railway,” pp. 556, 2020. 8
[2] Railway Technical Research Institute, electrical system technical
course, pp. 12, 1997. 10.
- 447 -
A Study on the Train Position Detection for the
Integrity of Freight Train Based on ETCS Level
3 With GPS and 6-Axis Sensors
Abstract— Accurate detection of the precise position of status of train position detection both domestically and
regular and inspection trains plays a vital role in enhancing the internationally, and conduct tests by creating hardware and
safety, efficiency, and convenience of railway systems. In software for freight train position detection technology. We
particular, in ETCS Level 3, which supports automatic train design algorithms for software development and proceed with
operation, monitoring and detecting the position of trains software development. We develop hardware that can be
running without track circuits is a key technology. Currently, tested by applying the developed software. As it is challenging
with regular trains, it is possible to monitor the status of the to conduct tests directly in railway environments, we conduct
formation as power is supplied to all vehicles. However, for tests on the road using regular vehicles.
freight trains, power is only supplied to the locomotive, which
limits the ability to monitor the status of train formation. II. TRAIN POSITION DETECTION TECHNOLOGY AND
Although it is possible to verify the status through brake pipe NAVIGATION SYSTEMS
and air pressure, there are limitations in ensuring safe and
efficient operation. Shift2Rail Safe Train Positioning (TD2.4) aims to develop
safety devices and a multi-sensor train positioning system. In
In this study, we investigated the research status of domestic particular, efforts are being made to replace various sensors
and international train position detection for accurate detection with a trackside train monitoring system in order to improve
of freight train integrity based on ETCS Level 3. We proposed the quality of train position and integrity information while
an algorithm to determine the position information calculated
reducing costs.
through real-time information from GPS and 6-axis sensors.
Furthermore, we conducted field tests using a prototype Figure 1 represents the basic structure proposed by Shift2Rail.
incorporating the proposed algorithm and analyzed the test It utilizes GPS information, IMU (Inertial Measurement Unit)
results, providing insights and discussions based on the collected data, and track information to detect train position.
data.
I. INTRODUCTION
Trains that transport people or goods and travel along a
fixed rail typically consist of multiple passenger or freight cars
connected together. Detecting the position of these trains
allows for controlling the spacing between trains and prevents
accidents between preceding and following trains. Therefore,
train position detection is crucial for controlling the train
spacing between stations and ensuring proper train routing
within the station.
In the case of regular trains, if a coupling between cars
becomes disconnected due to an accident during operation, the
train separation signal line is interrupted, allowing for the
detection of the train separation situation. On the other hand,
electric or diesel locomotives used for freight operations are
operated in non-fixed formations, and power is supplied only A. Tachometer
to the leading vehicle, with brake pipes connected between In railway vehicles, the speed is calculated by the pulse
adjacent cars that do not require power connection. count of the tachometer installed on the wheels and the
calculation based on the wheel diameter. The calculated speed
However, in some cases of freight trains, when the
and the distance traveled are used to determine the position of
pressure in the brake pipe decreases due to car separation, the
the train. However, due to the nature of trains running on steel
filling speed of air in the brake pipe to replenish the pressure
tracks, there are factors that can introduce errors, such as
may occur rapidly, resulting in the scale change on the brake
slippage and wheel slip on the track, as well as errors caused
pipe gauge not being perceived. As a result, trains have been
by wheel wear. Therefore, it is necessary to develop methods
known to continue operating for a significant amount of time
to compensate for these errors and improve the accuracy of
in a separated state. In this study, we investigate the research
train position detection.
- 448 -
B. Satellite navigation system celestial navigation is employed to determine an accurate
The Global Navigation Satellite System (GNSS) is a position, from which dead reckoning is then resumed.
satellite-based system that provides three-dimensional To determine the position using dead reckoning, devices
position and precise time information by utilizing the such as a plotter (a protractor attached to a straight edge) or
positions of multiple satellites in Earth's orbit and distance calculation tables are used. Nowadays, smaller aircraft or
measurements using radio waves. GNSS is a type of radio vessels often utilize these devices, while larger aircraft or
navigation system that is synchronized with atomic clocks, naval vessels have been mostly replaced by one or more
and it determines the receiver's position using the time computers that receive inputs of direction and speed (wind
difference of arrival (TDOA) technique, which measures the speed can be manually entered).[15]
difference in arrival time of signals transmitted from
navigation satellites.
In the field of railway transportation in Korea, GNSS III. TRAIN LOCATION DETECTION METHOD USING 6-AXIS
systems are used to provide operational information to train SENSOR AND GPS
operators, such as wireless VHF, ASTRO, and TETRA ETCS L1/L2 Electronic Interlocking System (EIS) uses
communication frequency change notifications, as well as track circuits to verify the position of trains. However, in the
section and train station arrival notifications. They are also case of ETCS L3-based Electronic Interlocking System, train
employed in maintenance and inspection vehicles for position information is obtained wirelessly from the Radio
detecting anomalies in equipment and track infrastructure and Block Center (RBC), and a system configuration based on
for verifying the location of detected anomalies. Virtual Block is implemented within station areas. This
requires the development of train position detection
technologies in locations where track circuits are not available,
C. Inertial navigation system as well as train route control technologies based on the
The Inertial Navigation System (INS) is a navigation concept of moving block.
system that utilizes inertial sensors, such as gyroscopes and
A. Configure train location detection
accelerometers, to calculate the orientation, velocity, and
position of a moving object by integrating the outputs of Regarding the train position detection device, an algorithm
angular velocity and linear acceleration. Unlike GNSS, INS is developed and tested to track the position of the train using
operates independently of external infrastructure and can the signals from the 3-axis accelerometer and 3-axis
provide navigation information without relying on GPS gyroscope sensors mounted internally when GPS signals are
signals. not received in tunnel areas or GPS shadow zones. The
algorithm utilizes the acceleration vector signals from the
With advancements in Micro Electro Mechanical Systems accelerometer, as well as the angular velocity signals from the
(MEMS) technology, MEMS-based inertial sensors have been gyroscope, to calculate the tilt correction values of the train's
developed, offering improved performance at a lower cost. plane and gravity plane. These corrected values are then used
INS is not only used in aerospace and military applications but to track the train's position.
also integrated with GPS to enhance the position accuracy of
vehicle navigation systems. To implement train position detection, the GPS
information and data obtained from the 6-axis sensor are
In the railway industry, INS can be employed to improve utilized to generate the final position information using a
the accuracy of vehicle navigation systems, providing precise Linear Kalman Filter. In open areas or areas with GPS
positioning and velocity information without the need for coverage, the position is determined primarily based on GPS
external infrastructure support.[1] information. However, in tunnel sections where GPS signals
may be unavailable or unreliable, the sensor data from the 6-
axis sensor is used to estimate and correct the position using
D. Dead reckoning system the Kalman Filter. This corrected information is then used as
Dead reckoning or Dead reckoning navigation is a method the basis for determining the train's position in tunnel sections.
of navigation where one estimates their position and navigates
based on calculated course and speed from a known starting
point (datum). The estimated position (EP) is determined by
considering various factors that may affect the navigation,
such as the characteristics of the moving vehicle and
environmental conditions (e.g., wind pressure
differentials).[15]
The navigation route, speed, estimated distance based on
these factors, known starting point, and recorded or estimated
deviation are used to determine the estimated position. In
practice, almost all navigation devices utilize dead reckoning
to some extent. Some navigators distinguish between the dead
reckoning position (DRP), which is the position calculated B. Algorithm for Freight Train Position Detection Using 6-
based on the course and estimated speed through the water, Axis Sensor and GPS
and the estimated position, which is the dead reckoning Train position detection is divided into four stages:
position adjusted for other factors such as tidal currents and stationary stage, movement stage, gradient movement stage,
wind. As the uncertainty increases with time and distance, and position estimation stage. In the MCU, during the
- 449 -
stationary stage of the train, the device plane is established, e) The GPS coordinates are represented as a 2-dimensional
and the inclination between the gravity plane and the train's value (x1, y1).
plane is calculated. In the movement stage, the correction
acceleration for the gravity axis is calculated. In the gradient f) The process proceeds to the stationary stage.
movement stage, when the train is moving on a gradient, the
inclination for latitude and the slope angle for altitude are
computed. In situations where the train cannot receive GPS 2) Train Progress Stage
location information, the 6-axis sensor is used to perform the a) It is executed when the State Flag is set to Forward.
coordinate estimation stage. b) When the GPS Receiver receives GPS location
information and confirms the train's movement, the
following process is triggered.
c) If the train's speed is greater than 5 m/s, it is
determined that the train is in motion.
d) If the train is moving, the Z-axis corresponding to the
first angular velocity (h1) of the first acceleration
signal (r1, q1, h1)ω received from the 6-axis sensor
is selected to obtain the rotation angle (R) of the gyro
sensor.
e) Applying the correction value of the tilt
compensation for the device plane (PlaneD) to the Z-
axis, which is the device's gravity axis, the
compensated acceleration value is calculated.
f) Obtaining the GPS coordinates 2 (x2, y2)GPS from
the GPS Receiver, and the second acceleration vector
signal (x2, y2, z2)A and the second angular velocity
signal (r2, q2, h2)ω from the 6-axis sensor. The
compensated plane of gravity is calculated by
reflecting the correction value of the tilt
compensation to the second acceleration plane vector
signal (x2, y2) of the second acceleration vector
signal A.
g) Based on the compensated plane of gravity, the
second X-axis acceleration vector (x2) and the
second Y-axis acceleration vector (y2) of the second
acceleration plane vector signal (x2, y2, z2)A are
vector summed to create the forward direction axis.
Fig. 3. Program Flow
h) During the train's progress, the State Flag is changed
to Incline, and the Incline process is carried out.
1) System Initialization Stage
a) When the program starts, the State Flag is changed to
3) Gradient Progression Stage
"Init," and the sensor inputs are checked for normal
a) It is executed when the State Flag is set to "Incline."
operation.
b) Continuously check the movement of the train while
b) The 6-axis sensor consists of an accelerometer sensor
receiving GPS signals.
and a gyroscope sensor. The accelerometer sensor
outputs acceleration vector signals in 3 axes (X, Y, Z), c) Determine if the train's movement speed is greater than
and the gyroscope sensor outputs angular velocity 5 m/s and if the number of satellites exceeds 10 by using
signals in 3 axes (R, Q, H) every 100ms. The program GPS position information.
sequentially averages the 10 data signals to calculate the
average value every 1 second. d) Store the obtained gyro rotation angle (R) and the
compensated acceleration value for the gravitational axis
c) The first acceleration vector signal (x1, y1, z1)A and the (Compensated acceleration value) obtained in the train
first angular velocity signal (r1, q1, h1)ω are obtained movement stage.
from the 6-axis sensor. Here, the first acceleration vector
signal (x1, y1, z1)A represents the acceleration vector e) If the train's velocity is greater than 5m/s and the number
values, and the first angular velocity signal (r1, q1, h1)ω of satellites exceeds 10, the algorithm calculates the
represents the angular velocity vector values. rotation angle (D) using the inclination (ϴ) with respect
to latitude. The rotation angle (D) represents the
d) The GPS receiver checks if the position information is difference between the previous slope (ϴ0) and the
received correctly every 1 second. current slope (ϴ1) with respect to latitude. This
calculation can be illustrated using Figure 4, and the
corresponding formula is Equation (1).
- 450 -
𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡 𝑛𝑛𝑛𝑛𝑛𝑛 = 𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶 𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠(∅1 ) +
𝑇𝑇ℎ𝑒𝑒 ℎ𝑜𝑜𝑜𝑜𝑜𝑜𝑜𝑜𝑜𝑜𝑜𝑜𝑜𝑜𝑜𝑜𝑜𝑜 𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟𝑟 𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎𝑎 𝑜𝑜𝑜𝑜 𝑡𝑡ℎ𝑒𝑒 𝑔𝑔𝑔𝑔𝑔𝑔𝑔𝑔𝑔𝑔𝑔𝑔𝑔𝑔𝑔𝑔𝑔𝑔 𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠𝑠(𝑅𝑅)
i. (3)
e) The device's incline angle (Incline angle_new)
is calculated by adding the calculated incline
angle from the slope progression (α) and the
pitch rotation angle (q) from the gyroscope
sensor. The equation for this calculation is as
follows.
h) If the difference between the rotation angle (D) for h) If location information is received through GPS
latitude inclination and the gyro sensor rotation angle (R) reception, the State Flag is set to Normal, and if
is less than or equal to 5 degrees, the State Flag is location information is not received, the State
changed to "Normal," and the Normal process is Flag is set to Tunnel to proceed with the process.
executed.
- 451 -
are stored on a laptop. The stored values are then displayed on acceleration_X value increases, the speed also increases, and
a map to verify the results. as the acceleration_X decreases, the speed decreases as well.
In the underground track or tunnel sections, we can observe
a) Test location that the GPS velocity is displayed as 0, while the acceleration-
This is the road section for on-site testing. velocity values do not show a value of 0 and continue to
indicate speed.
- 452 -
• A train position detection algorithm utilizing GPS and a 6-
axis sensor was proposed.
• A prototype was developed to apply the algorithm and
performance evaluation tests were conducted using a
regular vehicle. Data was analyzed and discussed.
• The algorithm and prototype effectively detected the
position of underground tracks and tunnels.
• Through this study, it was observed that the accelerometer
sensor values vary significantly due to road conditions
and vehicle vibrations, leading to speed errors. On the
other hand, the gyroscope sensor provided relatively
Fig. 7. Upstream gyro sensor information accurate directional information.
REFERENCE
The values from the accelerometer sensor were found to
be too sensitive, leading to errors in speed calculation. [1] Korea Railroad Research Institute, Kyungpook National University.
Vibrations from the vehicle, such as when crossing speed (2012). "Development Planning Research Report for Railway
bumps or encountering poor road conditions, caused Transportation Position Detection System." [CODIL] Korea Railroad
inaccuracies and introduced errors in the speed calculation. On Research Institute Academic Information, pp. 101-122.
the other hand, the gyroscope sensor provided relatively [2] Korea Rail Network Authority. (2017). "Track Circuit General
accurate values and did not pose significant issues in Information." Korea Rail Network Authority, July 2017.
determining the direction. [3] Korea Railroad Research Institute. (2019). "Development of
Tachometer for Automatic Train Control (ATC)." [NTIS] Korea
To address the identified issues, several alternative Railroad Research Institute, pp. 17-18.
solutions can be considered. One approach is to modify the [4] Lee, S., Yoon, J., & Byeon, W. (2021). "Trends in Satellite Navigation
algorithm by adjusting the application timing of the Kalman Systems and Technologies." Journal of Electronics and
filter, both in the prediction and update stages. Additionally, Telecommunications Trends, Vol. 36, No. 4, pp. 61-71.
the acquisition time for accelerometer sensor values can be [5] "GPS," [Online]. Available:
https://en.wikipedia.org/wiki/Global_Positioning_System.
modified. Currently, the data is sampled every 100ms and
[6] Kim, H. (2020). "A Study on Train Position Detection Using Wireless
averaged over 1 second. By changing this acquisition time, Communication." Master's Thesis, Seoul National University of
more accurate speed values can be obtained. Science and Technology.
Furthermore, by storing the GPS coordinates of the [7] Park, J., Hong, W., Jeon, B., & Railroad Signal Engineering. Same
Publisher, 2001.
railway track in tunnel and GPS signal weak areas within the
[8] Types of Track Circuits, Korea Rail Network Authority: Dec 2020.
device, it would be possible to calibrate the sensor data based
on those GPS coordinates. This would result in a more [9] Shin, K., & Lee, J. (2012). "Position Detection Technology for Railway
Transportation." Railway Journal, Vol. 15, No. 1, pp. 16-21.
accurate determination of the train's position. The sensor data
[10] Ahn, D., Lee, B., & Nam, H. (2012). "Development of KTX Track
acquired from the 6-axis sensor can be further refined using Defect Diagnosis Program using Track Circuit Modeling." Journal of
GPS reference values and Kalman filters to reduce error Lighting & Electrical Engineering, Vol. 26, No. 10, pp. 44-51.
frequency and enable effective train position detection. [11] Kim, S., Park, S., Lee, J., Kwon, M., & Kim, H. (2014). "Preliminary
Results of Train Position Detection System Using Position Detection
Overall, these modifications are expected to improve the Sensors." Proceedings of the Korean Society for Railway 2014
accuracy of the speed calculation and facilitate more effective Conference, pp. 861-865.
train position detection. [12] Lee, S., Lee, W., & Lee, B. (2013). "Study on Vehicle Control
Technology using Train Position Detection." Proceedings of the
Korean Institute of Electrical Engineers 2013 Fall Conference, pp. 281-
282.
V. CONCLUSION [13] Lee, J. (2016). "Study on Indoor Localization using Sensor Fusion
The obtained research results from this study are as based on Dead Reckoning." Master's Thesis, Soongsil University,
Seoul.
follows:
- 453 -
[14] ISMB. "GNSS Algorithms Design." Satellite-based Signaling and
Automation Systems on Railways along with Formal Method and
Moving Block Validation.
[15] "Dead Reckoning," [Online]. Available:
https://en.wikipedia.org/wiki/Dead_reckoning.
- 454 -
An Analysis of the Changes of Regenerative
Energy Utilization Facilities by the Tap
Switching of Urban Railway Transformers
Chi-Myeong Yun 1, and Hosung Jung 2*, Hanmin Lee 2, and Hyungchul Kim 2
1
University of Science and Technology, South Korea
2
Korea Railroad Research Institute, South Korea
Email: [email protected]
Keywords—DC railway, Regenerative Energy, OLTC, E is a DC voltage, V is an AC voltage. The supply voltage
Energy Efficiency, Transformer of the system shall maintain a voltage in accordance with the
international standards of IEC 60850.
I. INTRODUCTION
The load of a railway train is characterized by a large
Due to rapid climate change, many efforts are being made
variation. That is, the voltage of the system varies greatly due
to reduce carbon worldwide. In the field of railway
to the change in load, and in severe cases, there is a possibility
transportation, many studies are being conducted using
that sufficient power may not be supplied to the train.
regenerative energy generated using the characteristics of
urban railway system that frequently accelerate and brake[1,2]. If high voltage is continuously supplied by adjusting the
However, existing urban railway systems are not energy- transformer tab in consideration of the overload situation, the
efficient because they maintain a limited range of voltage insulation of train-related parts is weakened. It is possible to
through diode rectifiers[3]. Therefore, in this paper, changes reduce the voltage fluctuation rate by reducing the
in power consumption and regenerative energy were transformer % impedance, but the size of the short-circuit
simulated and analyzed in the event of a change in the primary current will increase and the breaking capacity of the rectifier
voltage of the transformer through adjustment of the and DC circuit breaker will also increase.
transformer tab.
Therefore, if the voltage supplied from the substation
II. MODELING AND ADVANTAGES DESCRIPTION increases and decreases according to the situation rather than
supplying the voltage at a fixed value, the problems specified
A. Configuration of DC Electric Railway System above do not occur, and energy utilization can be increased.
Figure 1 shows a simplified diagram of the DC power The power consumption of the substation is calculated as
supply system of a general urban railway. DC power supply Equation (2) after representing the DC electric railway feeding
systems are usually converted through silicon rectifiers that system in which one train is operating between the two
receive AC from power suppliers and convert it into DC. Since substations as an equivalent circuit.
the diode of the rectifier is an uncontrolled element, there is a
2 𝑔2 +𝑉 𝑔 𝑉 𝑔 )
disadvantage in that it is impossible to adjust the catenary (𝑉𝑠𝑎 𝑎 𝑠𝑎 𝑎 𝑠𝑏 𝑏
𝑃𝑠𝑎 = 𝑉𝑠𝑎2 𝑔𝑎 − −
voltage. The equation of DC voltage and AC voltage using the 2(𝑔𝑎 +𝑔𝑏 )
diode rectifier is shown in (1). 𝑉𝑠𝑎 𝑔𝑎 √(𝑉𝑠𝑎 𝑔𝑎 +𝑉𝑠𝑏 𝑔𝑏 )2 −4(𝑔𝑎 +𝑔𝑏 )𝑃𝑣
()
2(𝑔𝑎 +𝑔𝑏 )
- 455 -
After the train power consumption and admittance are set
to a fixed value, the voltage can be variably changed when the
input voltage of both substations is changed to achieve higher
energy utilization.
B. Simulation results
In order to derive changes in power consumption and
regenerative energy according to changes in the tap voltage of
the transformer, a power analysis program PSCAD/EMTDC
was used to simulate the operating conditions of a substation
and a vehicle in the DC 1,500V DC electric railway system. Fig. 3. Power changes with 22.9 kV tab settings
To confirm changes in various voltage ranges, the
transformer tab showed a total of eight levels by changing the
primary voltage from 18.9 kV to 25.9 kV. Figure 2 shows the
result of the resulting power loss. It can be found that the loss
becomes relatively low if the receiving voltage is lowered by
changing the tab.
III. RESULTS
In this paper, the change of the gas efficiency of the urban
iron voltage according to adjust the change of the urban steel
Fig. 2. Simulation result of power loss calculation
according to the change of the change of the urban philosophy
tab adjustment.As a result, it was relatively low loss, the
relatively low loss occurred.When the current 229kV, it was
used to increase the current voltage of the vehicle resistance
If there is a resistance in the railway train, it may further in the vehicle braking time, it was used to increase the
increase the use of regenerative energy according to changes. efficiency of the vehicle braking time.
Figure 3 and 4 shows changes when it is set to 22.9kV and
23.9kV. In the case of the existing 22.9kV system, when REFERENCES
regenerative energy is generated, the catenary voltage rises
higher than the threshold voltage of the resistor in the train, [1] C.M. Yun, G.J. Cho, H.C. Kim, H.S. Jung, A Study on the Train Brake
and the resistor operates. On the other hand, as a result of Position-Based Control Method for Regenerative Inverters. Energies 2022, 15,
changing the tab to 23.9 kV, even if the threshold voltage of 6572
the resistor is the same as that of the existing system, the [2] H.S. Jung, An Optimal Charging and Discharging Scheduling Algorithm of
catenary voltage is lowered and does not operate, so all the Energy Storage System to Save Electricity Pricing Using Reinforcement
Learning in Urban Railway System
generated regenerative energy is used in the regenerative
[3] H.S. Kim, The study on Reduction of Demand Power in Urban Railway
energy utilization facility. using OLTC, The Journal of the Korea Institute of Electronic
Communication Sciences v.11 no.10 , 2016, pp.963 - 968
- 456 -
A Network Architecture for A Substation
Automation Based On IEC 61850
Abstraction-In virtue of Ethernet technology progress, equipment for active and reactive power control. The third is
SCADA systems for substations become more powerful for measurement functions such as current, voltage, active power
protection, control, monitoring, metering, testing, and so on. and reactive power measurement. The last on is analysis
The various SCADA types supplies in the world market. Each functions which evaluate load factor, load value (%), current
SCADA system consist of various sensors and controllers and value.
different communication protocol for the devices interfacing.
IEC 61850 standard was originally addressing applications and Power SCADA used in railways is also similar to SCADA
communications for the substations. IEC 61850 can provide systems in terms of functions and equipment used in power
comprehensive and accurate information models for various systems. The SCADA of the railway power system follows
components of distribution automation systems, while providing the power generation direction of the SCADA system of the
an efficient solution for this naturally multi-vendor power systems. Although there are unique installations and
environment. The IEC 61850 standard allows for methods of operation for rail power systems, they are largely
communication between devices within a substation where a similar to existing power systems.
peer-to-peer model for Generic Substation Events (GSE)
services is used for fast and reliable communication between The modern power SCADA system is based on IEC 61850
Intelligent Electronic Devices (IEDs). This poses new and uses standards such as IEC 61970/61968, IEC 60870-101,
requirements on products and systems to ensure timely 60870-104, and communication protocols such as Modbus
handling of real-time data with much higher bandwidth needs and DNP. Based on these standards, power systems are
for proper performance of the substation protection, developing their products and software.
automation and control functions. This paper shows how a given
architecture and devices consumes time to determine whether Railway power systems should be followed in the same
the consuming time meets the required time constraints. direction as the SCADA system based on IEC61850 for
general power system. The use of common components and
SW can lower the operating costs in railway power systems.
- 457 -
interruptions, voltage regulation. [1][2] In point of view, the
substation functions classify into three categories. The first is
a defensive function that monitors health and load. The second
includes control functions such as voltage regulation, reactive
power control, and switch operation. The third function is the
operation functions.
• The states of power systems are allocated as follows:
normal, alarm, emergency, extreme emergency, and
multiple folded states. [3]
• Normal state: all system variables are within the
configured range
• Alarm state: when the variable values deviate from the
set range due to disturbance. In this case, emergency
power generation or the like can be performed.
• Emergency state: As a serious disturbance, it is
necessary to isolate the failure area, stop power
generation, and reduce the load.
• Extreme-emergency state: A large-scale blackout may
occur in the form of sequential generator step-out. In this
case, load shedding and system separation lights are
performed.
Fig. 3. An Architecture of SCADA Systems
• Recovery State: Recovery state is under that all systems
are reconnected and system load is restored. IEC 61850 provides communication protocols for
intelligent electronic devices at electrical substations. The
abstract data models defined in IEC
61850 can be mapped to a number of protocols. Current
mappings in the
standard are to Manufacturing Message Specification
(MMS), GOOSE (Generic Object Oriented System Event)
and SV (Sampled Values) or SMV (Sampled Measure Values).
- 458 -
information transmission model, where a continuous flow of
data is maintained among LNs to increase communication
reliability. Each message in a GOOSE transmission sequence
has an attribute called Time allowed To Live (TTL) that
informs the receiver about the maximum time to wait for the
next transmission.
C. Time budget analysis
A basic scheme of the time budget available from a fault
inception in a power system until the fault is cleared
physically is given in [7].
Figure 6 shows the time budget, which is composed of
several artefacts. Main components are the fault recognition
by the protection equipment. If differential applications are
involved – which are not scope of this paper – then time for
transmitting and receiving information from a remote location
needs to be taken into account as well. From the instant a fault
is detected until the physical outputs of a protection relay
operate is called the relay decision time. In this time budget
we also considered the time for an auxiliary tripping relay,
which is typically used today and is located between the IED
and the trip coil of the circuit breaker. The final part is the
Fig. 4. An Example of SCADA System based on IEC61850 operating time of the circuit breaker until the arc is
extinguished.
TABLE I. TIME CONSTRAINTS FOR IEC 61850 PROCESS BUS
MESSAGES[5]
- 459 -
https://www.watelectrical.com/electrical-substation-components/
[2] AEMO,“Power System Requirement”, https://www.aemo.com.au
[3] Guilherme Moutinho Ribeiro, et al., “ Expert System Substation
Operation and Control ” ,
https://www.researchgate.net/publication/301627481
[4] Salman Mohagheghi, J. Stoupis, “Applications of IEC 61850 in
distribution automation”, DOI: 10.1109/PSCE.2011.5772491
[5] Substation Automation LAN-CISCO
[6] IEEE PSRC H6 Special Report, Application Consideration of IEC
61850/UCA 2 for Substation Ethernet Local Area Network
Communication for Protection and Control, IEEE WGH6, 5-05-2005.
[7] Stefan Meier, Thomas Werner, OP060 –
Performance considerations in digital substation
applications, library.e.abb.com
V. CONCLUSION
We reviewed IEC61850 standard to automatize
substations. IEC61850 provides a lot of object oriented classes
to implement in IED devices having logical devices and
logical nodes. The IED devices can work stand-alone if well-
organized logical devices and logical nodes would be
provided in the IED devices.
An architecture for fault clearance is required in order to
fulfill the time consumption, and more specifically if
performance should not be degraded where network delays are
irrelevant due to the fact that devices incorporate all
functionality, from data acquisition to issuing trip commands.
Techniques such as high-performance computing and
computational intelligence will enable these systems to
behave intelligently, handling more devices with lower
response time and with the ability of making failure
predictions in the system components.
REFERENCE
[1] Dave, “Electrical Substation Components & their Workings”,
- 460 -
A Study on the LCC Analysis for High-Speed
Train On-Board Signaling Systems
Abstract - LCC analysis was used to evaluate the economic documentation and result review, life cycle cost analysis
aspects of the high-speed train system, but previous research secretion, and implementation and monitoring of life cycle
neglected the on-board signaling systems. This study fills that cost analysis.
research gap by conducting a detailed LCC analysis for on- The IEC 60300 standard outlines a structured approach to
board signaling systems and estimating a total LCC cost of
performing life cycle cost analysis. This method consists of
14,508,137,795 won. The findings highlight the importance of
minimizing operating losses to reduce overall life cycle costs and five main steps: setting the organizational context, planning
provide valuable insights for future research and evaluation of the analysis, defining the analytical approach, performing the
LCC during system introduction. analysis, and completing the analysis. The application of this
method can vary depending on the industry and project being
Keywords—LCC, High-Speed Train, On-Board Signaling, analyzed.
IEC 60300 The first step in the IEC 60300 LCC analysis method is to
establish the organizational context. This involves
I. INTRODUCTION
considering internal and external factors that impact the
The background of the study highlights the significance of organization, such as population growth, demographic
high-speed railways in South Korea, particularly the KTX information, levels of automation, and obsolescence.
system, which has experienced continuous growth and Alternative scenarios should be identified to assess their cost
expansion. The study emphasizes the importance of the train implications.
control system, including the signaling system, in ensuring the Planning the analysis involves defining the scope of the
safety of railway vehicles and passengers. Currently, there is
study, including the item under analysis, life cycle duration,
a high reliance on foreign technology for train control systems,
leading to high costs. To reduce this dependency and save operating environment, and maintenance considerations. The
costs, the Korea Railroad Corporation (KORAIL) is purpose of the analysis should be clearly defined, and the
developing the Korean Train Control System (KTCS). necessary resources, personnel, and methods should be
However, there has been limited research on the cost- determined. Conditions, assumptions, limitations, and
effectiveness of the signaling system compared to other constraints should also be identified and documented.
components of the high-speed railway system. Prior to performing the analysis, the rules and methodology
to be used must be defined. Factors to consider include
The scope of the study focuses on the ETCS L1/High- whether an absolute or comparative analysis will be
Speed ATC/ATS signaling device used in high-speed railways, conducted, the level of accuracy required, available data, and
and the analysis period is set for the 30-year service life of
available resources. A suitable LCC model should be selected
high-speed railway vehicles. The study aims to analyze the
cost factors of the train control system, establish a detailed or developed to achieve the analysis purpose.
cost structure for each life cycle phase, and develop an The analysis phase involves estimating the cost elements
analysis model based on the cost structure to conduct a life based on available data. Parametric equations or similar cost
cycle cost (LCC) analysis of the signaling device. estimation methods can be used when data is scarce. Cost
data should be classified and applied to the detailed cost
structure, allowing for the calculation of the total life cycle
II. LCC ANALYSIS PROCESS cost. Sensitivity analysis should also be conducted to assess
the robustness of the model and the impact of uncertainties.
LCC (Life Cycle Cost) is a method used to compare and The accuracy and integrity of the analysis results should be
evaluate costs over an extended period, encompassing reviewed and evaluated. This includes assessing whether the
acquisition costs, operation costs, maintenance costs, and purpose and scope of the analysis were properly addressed,
disposal costs. It provides objective data for assessing the adequacy of the model and data used, and whether the
investment responsibility, cost effectiveness, and return on results align with the original goals. If necessary,
investment. LCC analysis is commonly employed during the modifications or additional alternatives should be considered.
project preparation stage for cost evaluation and financial All analysis results should be thoroughly documented and
management. provided to stakeholders and decision-makers. The
The process of analyzing life cycle costs involves several documentation should include supporting evidence for the
steps. These steps, as per the life cycle cost guideline, include results, and any follow-up measures or recommendations
plan analysis, model selection and development, resulting from the analysis should be outlined.
- 461 -
When analyzing the life cycle cost of a train control system, ② Focus on the ETCS L1/High-Speed ATC/ATS train
it is crucial to recognize that the cost incurred in each life protection systems used in high-speed railways,
cycle stage may vary depending on the specific system. considering the system's service life and the lifespan of
Therefore, a detailed analysis of the cost generation specific high-speed railway vehicles.
to the system is essential to accurately assess the life cycle ③ Establish a detailed cost structure for the train protection
cost. system.
④ Use parametric estimation, analogous cost estimation,
III. TRAIN CONTROL SYSTEM LCC ANALYSIS and engineering cost estimation methods classified by
A. Signaling system LCC analysis cost factors.
Train control systems, including ATS, ATP, and ATC, are ⑤ Use estimated data for undisclosed or confidential
essential for safe train operations. These systems can vary in information, providing justification for the estimates.
configuration based on the railway system, but their main ⑥ Conduct LCC analysis for the additional introduction
purpose is to ensure train safety by detecting train positions, scenario of the train protection system.
transmitting track information, and controlling train speeds.
ATO and CBTC functionalities are often integrated into these 3) Definition of Analysis Methods
systems. Railway systems require continuous improvement, a) Establishment of Rules and Methodologies:
new construction, and sometimes replacement due to factors ① This study focuses solely on the life cycle costs of the
like rolling stock changes and technological advancements. ETCS L1/High-Speed ATC/ATS train protection system
Train control systems have limited application and involve a for high-speed railways and does not compare it with
small number of authorized operators and manufacturers. other train protection systems.
Changes in the railway system often require corresponding
modifications to the train control systems. Railway operators ② Both publicly available data and estimated data will be
utilized in this study.
need to acquire train control systems in four cases: new
implementation, additional implementation, replacement due ③ In case of overlapping cost factors, they will be
to the end of service life, and complete replacement due to distinguished and allocated according to the respective
changes in operational scenarios. cost structures.
The detailed cost structure for each scenario has been
b) Selection of LCC Model:
analyzed and the results are presented in TABLE 1.
LCC estimation methods can be classified into two
approaches: deterministic life cycle cost analysis and
B. On-board signaling device LCC analysis for high-speed probabilistic life cycle cost analysis. Deterministic analysis
rail relies on deterministic data obtained from statistical sources
1) Situation Setting or subjective opinions of experts. Probabilistic analysis, on the
The utilization of high-speed railway vehicles, such as other hand, converts uncertain data into probabilistic
KTX and KTX-Sancheon, is increasing in South Korea. The characteristics, using statistical data or expert opinions. Since
high-speed railway industry continues to grow with the the cost factors and data for the existing train protection
introduction of new high-speed railway vehicles like KTX- system in high-speed railways are relatively determinable, we
EMU260 and the development of KTX-EMU320, a will use the deterministic life cycle cost analysis approach.
distributed power high-speed railway vehicle. In this study, The LCC can be expressed as follows:
we aim to conduct a life cycle cost (LCC) analysis of the train LCC = Cost of Acquisition + Cost of Operation and
control system, specifically the automatic train protection Management + Cost of Maintenance + Cost of Disposal
system.
c) Definition of Cost Structure
2) Analysis Plan
If we establish the detailed cost structure of the train
a) Scope and Objectives : protection system, we can divide it into 65 cost elements.
LCC analysis has been widely applied in various areas of Following the approach applied in the train control system, we
the railway industry, but the analysis of life cycle costs can categorize these elements into four scenarios: new
specifically for the train protection system, especially the introduction, additional introduction, replacement based on
automatic train protection system, has not been adequately the lifespan, and full replacement. TABLE 2. presents the cost
discussed. In this study, we intend to establish a cost breakdown for the additional introduction scenario, which is
classification system for the acquisition, operation, the focus of this study based on the defined scope of analysis.
maintenance, and disposal costs of the train protection system
used in the existing KTX high-speed railway vehicles. We will TABLE I. ON-BOARD SIGNALING SYSTEM COST BREAKDOWN
focus on the cost analysis of the additional introduction STRUCTURE BY CASE
scenario among the four identified scenarios. New
Additiona
Replacem
l Replacem
Cost Factors Implemen ent of
b) Definition of Analysis Tasks tation
Implemen ent of Life
tation
Scenario
To analyze the life cycle costs of the train protection 1 Basic plan establishment cost O △ X △
system for high-speed railways, the following tasks will be 2 Consulting fees O △ X △
3 Feasibility study execution cost O △ X △
carried out: 4 Scenario design cost O X X △
① Analyze the total life cycle cost of the train protection 5 Hardware design cost O △ △ △
6 Software design cost O △ △ △
system for high-speed railways.
- 462 -
7 Mechanism design cost O △ △ △ 5
Sales loss cost O O O O
8
8 Prototype production cost O △ △ △
5
9 Product testing cost O △ △ O Train delay compensation O O O O
9
1 6
Environmental testing cost O △ △ O Disposal permit cost O O O O
0 0
1 6
Certification consulting fees O △ △ O Dismantling cost O O O O
1 1
1 6
SIL certification cost O △ △ O Waste disposal cost O O O O
2 2
1 6
Formal approval cost O △ △ O Environmental conservation cost O O O O
3 3
1 6
Major device production cost O O O O Restoration cost O O O O
4 4
1 6
Auxiliary device production cost O O O O Disposed asset loss cost O O O O
5 5
1 [ O : Essential / △ : By Case / X : Non Essential ]
Spare parts cost O O O O
6
1
Quality inspection cost O O △ O
7
1 IV. ANALYSIS IMPLEMENTATION
Inspection agency inspection cost O O △ O
8
1
Major device installation cost O O O O A. Establishing Methods for Cost Estimation
9
2
Auxiliary device installation cost O O O O In this study, cost elements are estimated using parametric
0
2 estimation, analogous cost estimation, and engineering cost
Transportation cost O O O O
1 estimation. Parametric equations are primarily used to
2
2
Administrative expenses O O △ O estimate labor-related costs among various cost elements.
2
Completion document production cost O O △ O They are applied when labor costs are included in other cost
3
2 elements such as production or installation costs, or when
Other miscellaneous expenses O O △ O
4 there is no clear criterion for estimation. Analogous cost
2
5
Education expenses O O △ O estimation is used when actual data that is not publicly
2
6
Training expenses O O △ O available or inaccessible, such as trade secrets, cannot be
2
Operations personnel wages O O O O
obtained, but cost elements such as labor costs or
7
2
improvement costs can be estimated based on standardized
8
Management personnel wages O O O O norms, related studies, or reports. Engineering cost estimation
2
9
Outsourced labor service fees O O O O is applied to cost elements for which actual data is available.
3
0
Building usage cost O O O O B. Data Collection for Cost Estimation
3
1
Facility usage cost O O O O
1) The collected data for each cost element is presented
3
2
Safety management cost O O O O in TABLE 2.
3
Environmental improvement cost O O O O
3
3
TABLE II. TOTAL COST OF EACH CATEGORY
Data management cost O O O O
4
3 Main Occurrence
Energy cost O O O O Subcategory Subdivision Detailed Item Cost Element Cost
5 Category Time
3 Development Certification Certification
Communication cost O O O O Design cost 27,453,476 acquisition
6 cost fees consulting fees
3 Major device
Water cost O O O O Major device
7 production 394,000,000 acquisition
production cost
3 cost
Maintenance personnel wages O O O O
8 Direct Auxiliary
3 Production device Auxiliary device
Management personnel wages O O O O 134,000,000 acquisition
9 cost production production cost
4 cost
Replacement work outsourcing cost O O O O
0 Acqusition Spare parts
Spare parts cost 73,707,000 acquisition
4 cost Production cost
Repair work outsourcing cost O O O O
1 cost Quality inspection
4 1,000,000,000 acquisition
Environmental improvement outsourcing cost O O O O Inspection cost
2
cost Inspection agency
4 Indirect 2,258,876 acquisition
Building usage cost O O O O inspection cost
3 Production
4 cost Major device
Facility usage cost O O O O acquisition
4 Installation installation cost
49,453,496
4 cost Auxiliary device
Safety management cost O O O O acquisition
5 installation cost
4 Operations
Environmental improvement cost O O O O Operations
6 personnel 3,839,705,100 annual
4 personnel wages
Data management cost O O O O wages
7 O&M cost Wages Wages
Management
4 Management
Building repair cost O O O O personnel 383,970,510 annual
8 personnel wages
wages
4 Maintenance
Facility repair cost O O O O Maintenance
9 personnel 19,359,110 annual
5 personnel wages
System improvement cost △ △ △ O wages
0 Management
5 Management
Energy cost O O O O personnel 1,935,911 annual
1 Wages Wages personnel wages
wages
5 Replacement work
Communication cost O O O O
2 Outsourced outsourcing cost 31,023,446 replace
5 Maintenance Labor serivece
Water cost O O O O cost fee Repair work
3 7,248,205 repair
outsourcing cost
5
Replacement part cost O O O O Replacement Replacement part
4 416,024,000 replace
5 part cost cost
Repair cost O O O O Part cost Part cost
5
Repair cost Repair cost 31,201,800 repair
5
Education expenses O O O O
6 Education Education Education Education
5 1,909,433 acquisition
Training expenses O O O O expenses expenses expenses expenses
7
- 463 -
Training
Training expenses 62,854,251 acquisition Delay cost Delay cost Sales loss cost Sales loss cost 2,754,087,477 delayed
expenses
Dismantling Dismantling
Delay cost Delay cost Sales loss cost Sales loss cost 1,311,102,096 delayed 38,705,649 disposal
cost cost
Dismantling Disposal Disposal Waste Waste
Dismantling cost 20,000,000 disposal Disposal cost disposal
cost cost cost disposal cost disposal cost
Waste Waste disposal EnvironmentalEnvironmental 1,935,282
Disposal Disposal disposal
Disposal cost disposal cost cost conservation conservation disposal
cost cost
Environmental 1,000,000 cost cost
Environmental
conservation disposal Total Cost 14,508,137,795
conservation cost
cost
[ CURRENCY : KRW ]
Total Cost 7,808,206,710
[ CURRENCY : KRW ]
V. ANALYSIS REVIEW
C. Present Value of LCC Analysis Upon reviewing the life cycle cost analysis of the ETCS
LCC analysis, due to its relatively long duration, cannot L1/High-Speed ATC/ATS train protection system for high-
simply be represented by the sum of monetary amounts. speed railways, the following points are observed:
Therefore, to evaluate the costs of alternative options, a
concept of time value needs to be applied to assess them in
terms of present value. In this study, the present value method ① Detailed cost structure for each life cycle phase of the
will be used among various economic theories, and the high-speed train protection system has been established.
procedure is as follows:
② Detailed cost structure for different implementation
PV (Present Value) = initial cost + recurring cost + cases of the high-speed train protection system has been
nonrecurring cost developed.
TABLE 3. presents the total costs derived from TABLE 2., ③ c. Determination of inclusion/exclusion of cost analysis
converted into present value. for each cost element during the simple replacement of
the train protection system based on its durability.
TABLE III. TOTAL COST OF EACH CATEGORY BY PRESENT VALUE
Main Occurrence ④ Collection and estimation of cost data for analysis
Subcategory Subdivision Detailed Item Cost Element Cost
Category Time purposes.
Certification
Development Certification
cost
Design cost
fees
consulting
fees 27,453,476
acquisition
⑤ Calculation of costs for each cost element and total costs.
Major device Major device
production production
394,000,000
acquisition ⑥ Calculation of the present value of total costs.
cost cost
Direct Auxiliary Auxiliary
Production device device
acquisition
cost production production 134,000,000
cost cost A. Evaluation of Achievement of Analysis Objectives
Spare parts Spare parts
cost cost 73,707,000
acquisition Through the life cycle cost analysis of the ETCS L1/High-
Acqusition Quality Speed ATC/ATS train protection system, the total costs per
cost inspection acquisition
Production
cost cost 1,000,000,000 formation due to the simple replacement of the train protection
Inspection
cost
Inspection system upon reaching its durability have been calculated and
agency
inspection 2,258,876
acquisition converted into present value. Thus, it can be evaluated that the
Indirect
Production
cost analysis objectives have been achieved.
Major device
cost
installation acquisition
cost However, there are limitations in evaluating cost elements
Installation
cost
Auxiliary
49,453,496 with duplications or those with difficult estimation, as well as
device
installation
acquisition not covering all aspects related to various implementation
cost cases, which is a point of regret.
Operations Operations
personnel personnel 8,159,678,951 annual
wages wages
O&M cost Wages Wages
Management Management
personnel
wages
personnel
wages
815,967,895 annual REFERENCES
Maintenance Maintenance [1] John Vail Farr, Isaac Faber. (2019). “Engineering Economics of Life
personnel personnel annual
wages wages 41,139,650 Cycle Cost Analysis”, CRC Press
Management Management [2] B.S. Dhillon. (2010). “Life Cycle Costing for Engineers”, CRC Press
personnel personnel annual
wages wages 4,113,965 [3] Ooi Chu Hui, Abdul Hakim Mohammed. (2015). “The Role of Cost
Wages Wages Replacement Breakdown Structure in Life Cycle Cost Model”, Jurnal Teknologi,
work May 2015
60,039,130 replace
Outsourced outsourcing
Labor serivece cost [4] Megan Davis, Regina Coony, Scott Gould, and Allan Daly. (2005).
Maintenance fee Repair work “Guidelines for Life Cycle Cost Analysis”, Stanford University Land
cost outsourcing 15,403,013 repair
cost and Buildings, October 2005[5] IEC. “IEC 60300-3-3”, IEC 2017
Replacement Replacement
805,123,943 replace [5] Korea Development Institute. “2021 Preliminary Feasibility Study
part cost part cost Report Detailed Guidelines for Conducting Preliminary Feasibility
Part cost Part cost
Repair cost Repair cost 66,306,308 repair Study Research on Roads and Railways”, KDI Public Investment
Management Center, 2021
Education Education
1,909,433 acquisition
Education Education expenses expenses [6] Korea Railroad Research Institute. “Type Approval, Producer
expenses expenses Training Training
62,854,251 acquisition
Approval, and Completion Inspection Fees for Railroad Cars”, Korea
expenses expenses Railroad Research Institute, 2016
- 464 -
[7] Jeong Chang-mo. (2020). “Analysis of railway electrification cost
using LCC technique”, unpublished master’s thesis, Seoul National
University of Science and Technology, Seoul, pp. 10 to 13
[8] Daeseong Kwon. (2020). “Study on Improvement of Urban Rail
Vehicle PCB Reliability Using FMECA”, unpublished master's thesis,
Seoul National University of Science and Technology, Seoul, pp. 51
[9] Ming Chuin Teng. (2013). “Life Cycle Cost for Modification Project”,
Master’s Thesis, University of Stavanger, Stavanger, Norway, pp. 4 to
5
[10] Seongsu Han. (2011). “A study on the proper manpower management
of urban railway drivers”, unpublished master’s thesis, Woosong
University, Daejeon, pp. 29-30
[11] Kim Seok-ho. (2016). “Reliability-based light rail vehicle LCC
analysis plan”, unpublished master’s thesis, Korea National University
of Transportation, Chungju, pp. 10 to 14
[12] Jeongjin Jang. (2019). “Estimation of Life Expectancy through
Reliability Analysis of Train Control PCB”, unpublished master’s
thesis, Seoul National University of Science and Technology, Seoul,
pp. 30
[13] Korea Railroad Corporation. “Rules for maintenance and repair of
rolling stock”, Korea Railroad Corporation, 2020
[14] Korea Railroad Vehicle Engineering. “Railroad Vehicle Complete
Vehicle Inspection Fee”, Korea Railroad Vehicle Engineering, 2016
[15] Seongsik Kim. (2021). “A Study on Risk Analysis of On-board
Signaling System (ATC) of Railroad Vehicles on Line 3”, unpublished
master’s thesis, Seoul National University of Science and Technology,
Seoul, pp. 51
[16] Korea Railroad Corporation. “Guidelines for appropriation of vehicle
replacement investment in railway business”, Korea Railroad
Corporation, 2014
[17] Korea Railroad Corporation. “Fixed Asset Accounting Guidelines
(Fixed Asset Classification Items and Useful Life)”, Korea Railroad
Corporation, 2012
[18] Korea Railroad Corporation. “2021 Korea Railroad Corporation
Financial Statement”, Korea Railroad Corporation, 2021, pp. 88
[19] Ministry of Strategy and Finance. “Public institution management
information disclosure system (www.alio.go.kr)”, Ministry of Strategy
and Finance, 2021
- 465 -
MCB Interrupting and Sequential Energizing of
EMU in DC and AC Transition Section
Dalseo PARK 1, Hyosang KIM1, and Jaeseok SHIM 1*
1
Seoul National University of Science and Technology, Korea
MTUs are required to switch DC to AC or vice versa. The drivers On the other hand, Korail EMU are configured differently,
or automatic devices convert MTU’s power system to power with 6 pantographs attached to 3 out of 10 cars.
system being supply. The drivers and the automatic sometimes
commit error for dead section passing caused from dead section
contamination, switch mal-manipulation, and harsh environment.
This paper identified the problems and proposed the solution.
- 466 -
III. COUNTERMEASURES AGAINST ENTERING POINT PASSING
AND MCB MALFUNCTION
The distance between pantographs of two consecutive
A. 1 States of FRP Catenary
motorized cars is 6.5m and the distance between pantographs
on the same car is 13.m as shown in Figure 4. The total We checked how much the insulation resistance provokes
distance of three consecutive pantographs becomes 20m. If the problems of entering point passing and MCB malfunction
the resistance of the 6.5m FRP at the beginning of FRP dead section with Physical security information
insulator is deteriorated under the predefined value, the two management(PSIM). [8]
consecutive pantographs become connected state and the car
already in dead location becomes flowing current. The point
which the car is under no current comes to 33.5m as shown The consequences result in as follows :
Figure 6. The MTUs shall get no current state for 2.01s which
is not sufficient time to cut off MCB. The MTUs shall get 1) DC arrester was destructed in the case that FRP
current before current cutoff. An inadequate power supplies to resistance is below 9,278 Ωby flowing AC current.
the MTUs. The MTUs comes to failure. [4][6]
2) MCB malfunction occur in the case that FRP
resistance is below 9,278 Ωby flowing AC current.
- 467 -
When the second pantograph of the first motorized car under harsh railway environment to meet railway
passes the air section, the two pantograph of the consecutive requirements.
car doesn’t flow current. The MCB automatically cuts off
and proctect DC arrester and main fuse melting from fault
current.
The third one implements beacon systems to inform the
MTUs of approaching the dead section. The MTUs cut off REFERENCE
MCB to remove the malfunction. [1] “Seoul Metro Line 1 VVVF Rotem ADV (2001)”, pp.3, pp.7
C. Countermeasure Against MCB malfunction [2] “Seoul Metro Driving Regulations (2014)”, pp.10
[3] ″Seoul Metro Electrical Facility Management Regulations (2009)″,
The air section installs at the point of Exiting from dead pp.18
section to avert the MCB malfunction. The MCB functioning [4] Baek Gwang-seon, Lee Jang-moo, Koo Se-wan. (1997) “Identification
carry out after 3s of the condition that adequate power supplies. of the cause of main circuit breaker (MCB) insufficiency in the
The 3s ensures to run 49.8m and then the normal power is Gwacheon line”, pp.15~16., pp.20~23.
furnished to the MTUs. CT has to be installed in main [5] Songbae Choi. (2016), ″Study according to the wear of each material
transformer to get the 3s to work time relay. of the wet plate of the urban railway MTU″, pp.11~14.
[6] Koo Hee-soo. (2015), ″Teaching transfer switch operation check
circuit″, Journal of the Korean Society of Railways, pp.35
[7] Jeong Jong-deok, Editing. (2008). “A Study on Improvement of Safety
IV. Ⅳ EXPERIMENT for Urban Railroad Vehicles Passing through Insulated Section”, Korea
Railroad Research Institute Urban Railroad Standardization Research
SeoulMetro adopted the beacon, CT, and time relay. The Center, pp.9~10.
example of the CT and time relay installation is illustrated in
[8] Baek Kwang-seon, Kim Myeong-ryong, Kim Jin-hwan (2008).
Figure 9 and 10. “Analysis of MCB Input Phenomenon in Four Sections of Urban Rail
Vehicle Teachers”, Journal of the Korea Electric Association, pp. A
Study on Allocation of Maintenance Cycle for Railway Signal
Facilities”, Journal of the Korean Railroad Association, pp.8~9
- 468 -
Specification Analysis of Reducer-less Motor for
Railway Vehicle Door
Byung-Min Moon 1, Hyo-Seok Oh 1, Yong-Eun Choi 1, Seung-Pyo Jeon 1, In-Soo Chung 1,
Jae-Moon Kim 1*
1
Korea National University of Transportation, Republic of Korea
Email: [email protected]
- 469 -
III. REDUCER-LESS MOTOR SIMULATION
Table II shows the specifications of a conventional motor
and a motor with the reducer removed. The configuration of Door Door Door Door
a motor generally consists of a motor, reducer, coupler, and Opening Open Closing Close
spindle gear, and the rated power of the motor determines
whether the motor has a reducer or not. High-speed motors 650[mm]
that use a reducer are controlled by matching the
deceleration/gear ratio, so they are error-prone structures. In
this paper, a low-speed motor without the reducer was 0[mm] 0[mm]
implemented to reduce the scope of door malfunctions, and
simulations were conducted to verify the suitability of the Max : 1.2 [A]
motor specifications prior to implementation.
As-Is
Fig. 3. Door simulation waveform
- 470 -
Analysis of Platform Screen Door Using
Reliability Block Diagram Analysis Tool
Jong Nam Kim 1, Tae Gil Ha 1, Guk-Hyun Son 1, and Jeong Won Kang 1,2*
1
Department of SMART Railway System, Korea National University of Transportation, Republic of Korea
2
Department of Transportation System Engineering, Korea National University of Transportation, Republic of Korea
ACKNOWLEDGMENT
This work was also supported by the Korea Agency for
Infrastructure Technology Advancement (KAIA) grant
funded by the Ministry of Land, Infrastructure and Transport
(Grant No. 22QPWO-C158106-04).
- 471 -
A Study on High-Power IGBT Gate Drivers for
Railway Vehicle
Email: [email protected]
Abstract— Gate drivers in railway vehicles commonly rely Fig. 1 depicts the gate driver consisting of an isolated
on self-developed products or commercially available cores, power supply, desaturation detection circuit, protection circuit,
leading to limitations in circuit configuration and tuning, posing and gate resistor. The basic operating principle of the IGBT
challenges in supply and technical application. This paper gate drive circuit can be divided into two stages: providing a
proposes a high-power IGBT that addresses these limitations,
offering compatibility with existing railway vehicle power
voltage above the threshold voltage to the gate for turn-on and
converters and improved reliability. applying a voltage below the threshold voltage to the gate for
turn-off. Typically, a voltage of 15V or higher is applied
Keywords— Gate driver, Railway vehicle, High-power IGBT during turn-on, while a negative voltage is applied during
turn-off to ensure proper blocking operation.
I. INTRODUCTION
IGBT is an important device that has high-speed switching
capability of MOSFET, high current density of BJT, and small
on-state voltage drop, and plays a key role in configuring
various power electronic systems. The gate driver must be
designed to provide the correct output to ensure stable IGBT
operation. The use of a gate driver that produces incomplete
or abnormal output can potentially damage the IGBT and its
surrounding circuits. Gate drivers for railway vehicles must be
specifically designed to operate in a different environment
compared to ordinary products. Railway vehicles operate in
harsh conditions, including high voltage, various forms of Fig. 2. IGBT's switching waveform (inductive load)
electromagnetic interference, vibrations, and temperature
fluctuations. Therefore, having highly durable gate drivers A. Isolated power supply
capable of withstanding these conditions is crucial. However, Railway vehicles typically operate at voltages of 1500V or
when low-cost products are used, the compromise on higher, with an insulation voltage requirement of 6000V
durability and reliability can lead to problems such as product specified by UL. To meet this requirement, an isolated power
damage and frequent malfunctions requiring frequent supply (Isolated DC/DC converter) is used to provide power
replacements. In this paper, we propose high-power IGBTs to each channel of the gate drive circuit. Design considerations
with protective circuits that are compatible with the power include ensuring stable driving power by considering factors
converter of existing railway vehicles, aiming to minimize such as IGBT gate charge capacity, operating frequency, and
issues such as input voltage fluctuations, output load power requirements.
fluctuations, and overcurrents that may occur in the operating
environment of railway vehicles.[1]
II. GATE DRIVER
- 472 -
B. Desaturation detection circuit REFERENCES
To prevent excessive voltage (VCE) in the IGBT caused [1] Korea National University of Transportation LINK 3.0, “Project Plan
by short-circuit or abnormal operation, a desaturation for the Development of Gate Driver of High-Power devices for
Railway Vehicles”, 2023.
detection circuit is necessary. This circuit detects the VCE
value based on the collector-emitter current (IC) and triggers
protective measures if it exceeds a certain threshold, thus
preventing component damage. Typically, a diode-based
circuit is used for direct VCE detection. The diodes are
carefully chosen in series to ensure their breakdown voltage
exceeds the operating voltage, preferably with fast-recovery
capabilities.
C. Protection circuit
Fluctuations in input power are unavoidable in railway
vehicles, and there are instances where the gate driver operates
at less than 70% of its nominal voltage of 15V or lower. This
poses a risk of component and device damage due to heat and
malfunctioning. To prevent this, a protective circuit is used
below a certain voltage threshold. The circuit incorporates a
hysteresis loop to prevent chattering and set upper and lower
limits at the reference voltage.
D. Gate resistor
The gate resistor plays a crucial role in controlling the
turn-on/off characteristics, speed, and switching loss of the
IGBT. Proper selection of resistance is essential to prevent
surge voltage caused by inductance effects from the power
device stack configuration and gate driver connection method.
Research can help establish criteria for selecting the
appropriate resistance for devices with specifications of
3300V and 1500A.
III. CONCLUSION
In this paper, we propose a highly reliable high-power
IGBT that is compatible with the existing railway vehicle
power converter while minimizing issues such as voltage and
load fluctuations, and overcurrent. To achieve this, we have
designed an insulated power unit, a desaturation detection
circuit, a low voltage protection circuit, and a gate resistor.
This enhances the reliability and durability of gate drivers for
railway vehicles and reduces costs associated with product
damage and failure.
ACKNOWLEDGMENT
Following are results of a study on the "Leaders in
INdustry-university Cooperation 3.0" Project, supported by
the Ministry of Education and National Research Foundation
of Korea
- 473 -
Full-Stack Simulator for Non-Volatile
Memories-based Computing Elements for
Railway Safety
Zheng Wang1, Seong Tae Jhang2, and Juhee Choi3*
1
Linyi University, China
2
The University of Suwon, Republic of Korea
3
Sangmyung Univ, Republic of Korea
Email: [email protected]
Abstract—Specialized hardware for machine learning has SMAUG suggested the optimized the deep learning camera
been developed for both academic and industrial fields, usually pipeline for enhanced SoC.
referred to as a neural network accelerator. Although
researchers have proposed a significant number of ideas, one of
their main challenges is finding a cost-efficient method to prove
the efficiency of their schemes. Accurate estimation requires
Register Transfer Level (RTL) simulation with place and route
implementation, which demands considerable time and
resources. The introduction of a full-stack simulator aims to
solve this problem by abstracting the detailed hardware logics.
Among several simulation tools available for researchers,
SMAUG has emerged as a comprehensive full-stack simulator.
Additionally, further studies have been conducted to evaluate
the extended lifespan and power consumption of non-volatile
memory-based systems. In this research, we have improved
SMAUG-variant simulation tools specifically for the railway
domain, based on EN 50129 standards. Since train cars have
strict requirements defined by the railway system's standards, a
new method has been added to evaluate whether the proposed
scheme meets the tolerance requirements. Our experiments
show that the confidence level of this novel simulation tool is
high enough to be used with negligible additional time.
I. INTRODUCTION
Simulators play an important role for researchers in the
field of computer systems to measure the performance of their
proposed idea. The most accurate measurement method is to
carry out a design at the RTL (Register Transfer Level)
directly, or HLS (High-Level Synthesis)[1,2].
However, this method requires significantly execution Fig. 1. Overview of SMAUG’s execution flow[8]
time, so a pre-RTL level simulator has been proposed instead.
Among several simulators, gem5 has been widely used by II. MOTIVATION
researchers as a cycle-accurate simulator[3]. Another reason
why gem5 has become the most popular simulator is its ability Even though the SMUAG has many advantages, it is not
to directly run deep learning frameworks like PyTorch[4] or suitable for non-volatile memory(NVM)-based IoT systems.
TensorFlow[5] as the entire system including the kernel. Therefore, we modified the SMUAG with infrastructure
considering the characteristics of NVMs[9]. However, it is not
Another kinds of simulators such as DNNBuilder[6] and directly applied to the safety-related electronic systems in the
MAGNet[7] allow for the execution of deep learning railway signaling field.
accelerators up to the RTL level. On the other hand, they
require an RTL or equivalent model for the entire system; Most error correcting codes (ECC) in today's computing
which implies that it is difficult to implement the proposed systems operate on the principle of single error correction
system to verification. double error detection (SECDED). This approach is cost-
effective for the past manufacturing environments. On the
Finally, an end-to-end simulator for deep learning called contrary, semiconductor companies tries to reduce a cell size
SMAUG (Simulating Machine Learning Applications Using to mitigate the pressure of the power consumption. It makes
gem5-Aladdin) was introduced as shown in Fig. 1[8]. Based the existing error detection methodologies inadequate for the
on gem5-Aladdin, SMAUG can execute full-stack workloads narrow channel cells[10]. In particular, this problem becomes
with capability of cycle-level accuracy. The authors of the
- 474 -
even more pronounced in the field of rail transport defined by
EN 50129 [11].
Therefore, we are investigating the source code and
analytic models for the railway requirements to compensate
the drawbacks of NVMs. Our current progress is inserting the
monitors for the expected remaining lifetime based on the
error patterns and failure histories. In the future, the SMAUG-
R(SMAUG with railway system) will be suggested to support
the designers of SoC makers for the electric systems in the
train vehicles.
ACKNOWLEDGMENT
This work was supported by the National Research
Foundation of Korea (NRF) grant funded by the Korea
government(NRF-2021R1G1A1004340).
REFERENCES
[1] L. Piccolboni, P. Mantovani, G. Di Guglielmo and L. P. Carloni,
"Broadening the exploration of the accelerator design space in
embedded scalable platforms," 2017 IEEE High Performance Extreme
Computing Conference (HPEC), pp. 1-7, 2017.
[2] T. Liang, L. Feng, S. Sinha and W. Zhang, "PAAS: A system level
simulator for heterogeneous computing architectures," 27th
International Conference on Field Programmable Logic and
Applications (FPL), pp. 1-8, 2017.
[3] S. Xi, Y. Yao, K. Bhardwaj, P. Whatmough, G.-Y. Wei, and D. Brooks,
“SMAUG: End-to-end full-stack simulation infrastructure for deep
learning workloads,” ACM Transactions on Architecture and Code
Optimization (TACO), Vol. 17, No. 4, pp. 1-26, 2020.
[4] V, Subramanian, “Deep Learning with PyTorch: A practical approach
to building neural network models using PyTorch,” Packt Publishing
Ltd, 2018.
[5] Shukla, N, “Machine Learning with TensorFlow,” Manning
Publications, Shelter Island, NY, USA, 2018.
[6] X. Zhang et al., "DNNBuilder: an Automated Tool for Building High-
Performance DNN Hardware Accelerators for FPGAs," 2018
IEEE/ACM International Conference on Computer-Aided Design
(ICCAD), pp. 1-8, 2018.
[7] R. Venkatesan et al., "MAGNet: A Modular Accelerator Generator for
Neural Networks," 2019 IEEE/ACM International Conference on
Computer-Aided Design (ICCAD), pp. 1-8, 2019.
[8] S. Xi, Y. Yao, K. Bhardwaj, P. Whatmough, G.-Y. Wei, and D. Brooks,
“SMAUG: End-to-end full-stack simulation infrastructure for deep
learning workloads,” ACM Transactions on Architecture and Code
Optimization (TACO), Vol. 17, No. 4, pp. 1-26, 2020.
[9] J, Choi. “Implementing Full-Stack Simulator for Deep Learning
System using Non-Volatile Memory,” KIISE Transactions on
Computing Practices, Vol. 29, No. 2, pp. 61-67, 2023.
[10] S. Mittal and J. Vetter, “A survey of techniques for modeling and
improving reliability of computing systems,” IEEE Transactions on
Parallel and Distributed Systems, vol. 27, no. 4, pp. 1226-1238, 2015.
[11] EN, B. “EN 50129: 2018 Railway applications-Communication,
signalling and processing systems-Safety related electronic systems for
signalling,” BSI Standards Publication, 2018.
- 475 -
A Study on the Optimal Traffic Signal Timing
Transition Algorithms for Diverse Demand
Fluctuations on Corridors
Yong-Bin, Cho 1, Jin-Tae, Kim 1*, Thomas JW Kim 2
1
Korea National University of Transportation, Korea, Republic of
2
UI networks, Korea, Republic of
Email: [email protected]
Abstract— This study aims to develop and validate timing immediately, and incorporate it into traffic signal operations.
transition techniques for real-time traffic signal operation, The ultimate goal is to enhance traffic flow at intersections.
departing from conventional methods based on past commute In fact, smart signal operation systems are being implemented
traffic patterns. In the past, traffic signal timing plans were to create efficient traffic environments, leveraging collected
primarily designed for peak commuting hours, neglecting the traffic information and AI technologies to generate and
remaining periods with lower congestion levels due to budget implement optimal signal timings. The real-time variability of
constraints. However, advancements in technologies such as traffic signals implies frequent adjustments of signal
video-based vehicle detection, radar, and lidar have enabled operation variables. This is in contrast to the past fixed-time
real-time vehicle detection and analysis using artificial
signal operations, which focused on peak commuting hours,
intelligence and big data techniques, providing cost-effective
access to on-site traffic information. The flexibility to select and
as illustrated in Fig. 1. Consequently, the number of traffic
change target time periods for traffic signal timing design has signal transitions occurring within a day is expected to differ.
increased. With the increasing number of traffic signal This phenomenon can be interpreted as an expansion in the
transitions resulting from these changes, there is a need to select temporal range of traffic signal transitions, with their
and apply optimal transition techniques for different transition proportion increasing compared to the entire 24-hour day.
scenarios. This study proposes two transition techniques: Furthermore, it is important to note that future traffic
Method 1 and Method 2. Method 1 involves unconditional operations can significantly impact the effectiveness of
transitions within one cycle and distributes offset changes even network signal operations, depending on the method
during non-peak hours, while Method 2 transitions within one- employed for traffic signal transition operations.
or two-cycles based on the offset change rate, also considering
non-peak hours. To validate the proposed techniques, various
traffic signal transition scenarios were analyzed and compared
in terms of delay. The results indicate that Method 1 is most
suitable for situations with increased traffic volume leading to
congestion, while the Subtract method is more appropriate for
situations with the decreased traffic volume and the reduced
congestion. These findings emphasize the importance of
selecting and applying appropriate transition techniques
tailored to individual traffic scenarios. The proposed transition
techniques provide valuable insights for improving real-time (a) Traffic signal transition under TOD signal operation
traffic signal operation and contribute to the overall efficiency
and effectiveness of traffic management on highway corridors.
I. INTRODUCTION
Recent advancements in vehicle detection technologies
such as video, radar, and LiDAR, combined with cutting-edge
technologies like Artificial Intelligence (AI) and Big Data, (b) Traffic signal transition under TRC signal operation
have enabled the real-time collection, processing, and
analysis of traffic information in urban road networks. As a Fig. 1. Aspects of traffic signal transition according to traffic signal operation method
result, the previously fragmented system for collecting real-
time traffic information has been restored, facilitating smooth Traffic signal transition also needs to be changed to a
traffic data collection. This, in turn, has allowed for various method that applies techniques suitable for various situations,
attempts and innovations in traffic signal operations. and for this, it is necessary to be accompanied by the
development of new traffic signal transition techniques that
In this context, both central government agencies and can respond to rapid signal switching.
local authorities have shown significant interest and
investment in establishing smart intersections to improve This study aims to develop and validate timing transition
urban traffic environments. Departing from traditional fixed- techniques for real-time traffic signal operation, departing
time signal operations, they aim to collect real-time traffic from conventional methods based on past commute traffic
information through new detection systems, process it patterns.
- 476 -
II. DEVELOPMENT OF SIGNAL TRANSITION METHOD TABLE. 2. REVIEW OF TRANSITION CYCLE LENGTH
The transition technique proposed in this paper was Existing transition Proposed transition
Division Remark
designed in consideration of functional improvements to method method
supplement the limitations of traditional transition techniques. -+/- direction offset difference - Fixed the phase distribution to Design of
In the subsections below, the limitations of the traditional Tansition variable the + direction(if the offset
two
difference is negative, transition
transition method are reviewed and the transition method is direction by adding the cycle of Plan B to proposed
designed considering the derived functional improvements. the offset difference) methods
- offset difference distribution on - Apply fixed ratio considering according
A. Reviewing the limitations of traditional transition techniques phase coordinated phase the coordinated and non- to the
- Apply variable ratio coordinated phase
distribution transition
In this study, traditional transition techniques were considering the coordinated
phase length
examined, and five representative transition techniques (Add,
Subtract, Immediate, Two-cycle, Three-cycle) were evaluated.
For the Add and Subtract techniques the offset changes are To achieve the second functional improvement of
distributed to each time slot according to the current phase achieving short-term signal transitions within 1-2 cycles, two
allocation, and the transitions are performed accordingly. transition techniques have been designed based on the
However, in the case of the Dwell technique, the offset operational principles of traditional transition techniques, as
changes are uniformly applied to the coordinated time slot, shown in Table 3.
resulting in an elongation of the coordinated time slot. This
elongation can lead to congestion in the adjacent roads, The Proposed-1 technique is a modification of the
affecting the traffic situation even after transition to Plan B. Immediate technique. In the existing Immediate technique,
offset changes are allocated only to the coordinated time slots.
The duration of the transition is determined by the In the Proposed-1 technique, offset changes can also be
magnitude of the offset changes. When the offset changes are allocated to non-coordinated time slots, including the adjacent
small, the number of transition cycles and the length of each road time slots. Similarly, the Proposed-2 technique allows
cycle are reduced, resulting in a short duration of the for the allocation of offset changes to both coordinated and
transition. However, as shown in Table 1, when the offset non-coordinated time slots, similar to the Proposed-1
changes are large, the number of transition cycles and the technique. Additionally, if the magnitude of the offset change
length of each cycle increase, leading to a longer transition exceeds the transition threshold value (50% of the Plan B
period. With a threshold ratio of 20% for the Add and Subtract cycle length), the transition can be extended up to 2 cycles.
techniques, the transition is performed over a maximum of Otherwise, if the magnitude is smaller, the transition can be
five cycles. On the other hand, the Immediate technique completed within 1 cycle.
assigns all offset changes to the coordinated time slot within
one cycle, resulting in a relatively shorter transition duration. TABLE. 3. DETERMINETHETRANSITION LENGTHOFTHEPROPOSEDTRANSITIONMETHOD
- 477 -
from the reference analysis scenario and deriving modified v/c ≒ 0.85 level, according to the extended analysis
control conditions to create traffic signal transition scenarios. scenario, a new scenario was created by adjusting the traffic
To define the geometric structure conditions in the volume and left-turn ratio. The Control conditions are
reference analysis scenario, an interconnected intersection presented in Table 7.
was constructed. The geometric structure conditions were
TABLE. 7. SIGNAL CONTROL CONDITION OF SCENARIO1) (UNIT : SEC)
defined by specifying the elements and their corresponding
detailed conditions, as presented in Table 4. Case
Cycle Major Major Minor Minor
LT Intersection length Offset Thru LT Thru LT
TABLE. 4. BASIC GEOMETRIC CONDITION OF TRANSITION SIMULATION Volume
ratio
Division Condition Remark #1 0 44 12 30 14
5% 100
#2 33 44 11 30 15
Signal group offset design possible
# of intersection 2 intersections
by intersection combination #1 0 40 18 28 14
80% 10% 100
Distance between #2 34 39 18 29 14
400m -
intersections #1 0 36 23 27 14
15% 100
Major 3 straight lanes, 1 right turn shared #2 34 35 22 29 14
4 lanes
# of arterial lane, 1 left turn bay
#1 0 95 20 67 28
lanes Minor 2 straight lanes, 1 right turn shared 5% 210
3 lanes #2 20 95 20 67 28
arterial lane, 1 left turn bay
#1 0 95 37 69 29
120% 10% 230
Saturated traffic flow rate : 1,800vph #2 16 93 37 71 29
#1 0 90 53 69 28
The traffic condition element items applied to the set 15% 240
geometric structure conditions and the detailed conditions #2 3 86 51 73 30
accordingly were set at the level of v/c ≒ 0.8 5, and Same as 1)
Amber time:3, All red : 1
Table 5.
In order to analyze the traffic signal transition scenario,
TABLE. 5. BASIC TRAFFIC CONDITION OF TRANSITION SIMULATION the extended analysis scenario was set as Plan A and operated
the signals from 0 to 3,600 seconds. At 3,600 seconds, the
Division Condition Remark
transition process started, and after the completion of the
Major arterial approach balance EB:WB = 60:40 - transition process, the extended scenario was set as Plan B and
Major arterial 10% Minor arterial outbound volume the signals were operated until 7,200 seconds. Fig. 2 depicts
Left turn
ratio the schematic diagram of the individual traffic signal
Minor arterial 15% Major arterial outbound volume
transition simulation analysis conducted over a total duration
East bound 2,100 60% of approach balance of 7,200 seconds.
#1
intersection North bound 1,050 -
- 478 -
expansion scenario as Plan B. Comparative analysis was disruptions within a short period. The Proposed-1 technique
performed as in table 8. involves transitioning unconditionally within one cycle and
allows for the allocation of offset changes to both the
TABLE. 8. NON-PEAK TIME TRANSITION SIMULATION RESULTS (UNIT : SEC/VEH) coordinated and non-coordinated phases. The Proposed-2
technique performs transitions within 1-2 cycles based on the
Case Proposed offset change rate and also considers the non-coordinated
LT Add Sub Imme Two Three phase for allocating offset changes. Furthermore, the
Volume 1 2
ratio functional improvements of the proposed techniques were
5% 41.94 44.93 59.57 54.66 56.33 40.14 40.14 validated. To conduct the validation, simulated traffic signal
transition scenarios were created, and a comparative analysis
80% 10% 45.22 46.98 65.15 53.20 57.71 43.34 43.34
of the transition techniques was performed based on selected
15% 48.22 49.24 66.08 62.20 60.37 43.30 43.30 analysis approaches. The results showed that the Proposed-1
technique exhibited the lowest delay during peak hour
transitions, while the Subtract technique showed the lowest
2) Peak time transition situation delay during non-peak hour transitions. These results indicate
A simulation analysis was performed by setting the that there are suitable transition techniques for different
analysis scenario as Plan A and the peak situation expansion situations, highlighting the importance of understanding the
scenario as Plan B. Comparative analysis was performed as in characteristics of each situation and applying the appropriate
Table 9. transition technique accordingly. However, since this study
focused on functional validation through three specific
TABLE. 9. PEAK TIME TRANSITION SIMULATION RESULTS (UNIT : SEC/VEH) analysis scenarios, further research is needed to analyze the
characteristics of different transition techniques under various
Case Proposed
conditions.
LT Add Sub Imme Two Three
Volume 1 2 REFERENCES
ratio
5% 75.93 60.86 86.60 84.74 85.58 59.67 59.67 [1] Kim, J., Park, J. and Chang, M., A Comparison Study of Different
Offset Transition Lengths in Simulation Environment, J. Korean Soc.
120% 10% 87.24 74.90 93.01 98.79 99.85 81.17 90.75 Transp., Vol.23, No.8, pp.43-52, 2005
15% 89.91 87.12 105.28 105.35 108.73 86.52 91.89 [2] Shelby, S., D. Bullock, and D. Gettman, Transition Methods in Traffic
Signal Control, Transportation Research Record Journal of the
Transportation Research Board No. 1978(1), pp.130~140, 2006
[3] Obenberger, J. and J. Collura, Methodology to Assess Traffic Signal
IV. CONCLUSION Transition Strategies for Exit Preemption Control, Transportation
Due to limited past traffic data collection, the Research Record Journal of the Transportation Research Board
No.2035, pp.155~168, 2007
advancement of traffic signal operations has been constrained.
[4] Cohen, D., Head, L., and Shelby, S. G., Performance analysis of
However, with the emergence of cutting-edge detection coordinated traffic signals during transition, Transportation Research
technology and artificial intelligence, the field is now Record: Journal of the Transportation Research Board, Vol.2035, No.1,
progressing to a higher level. Real-time signal operations pp.19~31, 2007
based on continuously collected traffic information are [5] Federal Highway Administration, Traffic Signal Timing Manual - 6.0
expected to play a crucial role in the development of urban COORDINATION, pp.24~28, 2008
traffic management. Additionally, traffic signal transitions [6] Tobias, P., Bernhard, F., Traffic Signal Transition in Coordinated
that adapt to changing traffic conditions are considered Meshed Networks, Transportation Research Record: Journal of the
Transportation Research Board, Issue 2192, pp 97-107, 2010
essential and influential factors.
[7] Peñabaena, N. R., Cantillo, V., Moura, J., Impact of transition between
In this study, we proposed two traffic signal transition signal timing plans in social cost based in delay, fuel consumption and
techniques that can perform transitions while minimizing air emissions, Transportation Research Part D: Transport and
Environment, Volume.41, pp. 445~456, 2015
- 479 -
Investigation of the output parameters of a
definable adaptive gear variator
Konstantin Samsonovich Ivanov 1, Gulmira Nurlankyzy Abdreshova 2
1
AUES, Almaty, Kazakhstan
Email: [email protected]
2
Al-Farabi Kazakh National University, Almaty, Kazakhstan
Email: [email protected]
Abstract – A gear variator is a gear mechanism with a variable gear ratio. The gear variator is the prospect of creating gearboxes.
Currently, two types of units with variable gear ratios are used as automatic transmissions of the car: automatic and variator.
The automatic machine is a multi–stage gear mechanism with a stage switching device and a hydraulic clutch. The variator is
a friction mechanism with stepless regulation of the gear ratio. Currently, there are only friction variators (Vbelt, toroidal). A
gear variator, unlike a friction variator, is capable of providing reliable force transmission and high efficiency. In existing
aggregates, a variable gear ratio is created using differential coupling. Differential coupling is an equation of the relationship
of parameters, which includes, in addition to geometric parameters, relative speeds of movement. In the automaton, differential
coupling is provided by hydraulics, in the variator - by friction. This connection leads to energy losses and a decrease in
efficiency. A gear variator with a constant engagement of gears in the usual representation cannot have a differential connection.
To create a gear variator, it is necessary to use a fundamentally new approach to the design of the mechanism. A fundamentally
new approach to the design of the variator was found intuitively when analyzing the gear differential mechanism. As is known,
the differential mechanism can decompose the movement of the input link into two independent output movements of two
output links. If the output links of the two differentials are combined, then you get a mechanism with one input link and one
output link, which should move independently. But such a mechanism will have two degrees of freedom, and according to the
laws of mechanics it will be inoperable. The adaptive gear variator contains an input link, an output link and a movable closed
loop placed between them. The variator has a variable gear ratio, which is automatically adjusted to the load without a control
system. Mechanical adaptation is the ability of an adaptive mechanism to transfer motion from a constant–power motor to an
output working organ at a speed inversely proportional to the technological load. Mechanical adaptation provides continuous
automatic stepless self-regulation. Adaptive gear variator is a continuously variable gear self-regulating transmission, fully
adequate to variable load. Mechanical adaptation opens up fundamentally new possibilities of gear mechanisms - it allows you
to create the simplest automatic continuously variable transmissions without any control systems. Most technological machines,
transport machines, wind turbine installations, robots, manipulators, drives of space technology operate in a variable power load
mode. This mode requires the use of variable gear ratio drives for efficient use of engine power. The existing controlled drives
are complex, and in some cases simply unacceptable (for example, controlled drives of manipulators). Adaptive gear variators
are able to solve the problem of creating highly efficient drives with variable gear ratios in all branches of technology. The
developed theory is a tool for the analysis and synthesis of a fundamentally new type of mechanisms – stepless self-regulating
gear variators that adapt to variable technological load.
.
- 480 -
DEVELOPMENT OF AN INTEGRATED MULTIFUNCTIONAL COMPLEX FOR
LIGHTING THE SPACE SITUATION
Annotation. In this article, the analysis of possible methods for estimating motion
parameters based on radar measurements under conditions of a priori uncertainty of the dynamics
of the target movement is carried out and a method for calculating the quality indicator of the
evaluation based on radar measurements by mathematical modeling is developed.
Keywords: radar, target detection range at flight altitude, azimuth, elevation, altitude,
digital phased antenna, multibeam klystron, transmitter power
Introduction
The creation of air and space control systems, remote sensing of the Earth, short-range
navigation systems and space global positioning systems, as well as communication and television
systems became possible thanks to the development of radio engineering systems for various
purposes. A radio engineering system (RTS) is an organized set of devices designed to receive,
process, accumulate and transmit information using radio waves. Radio waves, reflecting from the
inhomogeneities of the surrounding space, for example, airplanes, ships, make it possible to detect
these objects and measure their position in space. Such a property of radio waves as a different
nature of reflection from surfaces of different structures, for example, the sea, land, mountains, is
the basis of remote sensing – a scientific direction that collects information about the Earth's
surface without actual contact with it. Remote methods are divided into active and passive. When
using active methods, the satellite sends a signal from its own energy source, for example, a radar
transmitter, to the Earth and registers its reflection from the surface.
The purpose of the article is to create an integrated multifunctional complex for lighting
the space situation in the sector of the Caspian Sea.
- 481 -
Analyze the tactical and technical characteristics of modern samples of the Ukrainian
mobile radar of circular view [2] and choose the most suitable for solving the task.
79K6 is a Ukrainian mobile three-coordinate all—round radar station with a phased array
antenna (80K6 is an export version of 79K6). The first prototype was manufactured in 2006. In
the same year, state tests were conducted, and in the summer of 2007, the radar was officially
adopted.
The maximum limits of the radar 79K6:
• Target detection range at flight altitude:
o 100 m — 40 km,
o 1000 m — 110 km,
o 10-30 km — 300-350 km.
• Maximum limits of the 80K6 radar operation:
o 100 m — 40 km,
o 1000 m — 110 km,
o 10000m — 400 km,
o azimuth, deg: 360
o angle of location, deg: 0...35, 55
o in height, km: 40
• Antenna Type: Digital phased array antenna
• Transmitter Type: Multipath klystron
• Peak power of the transmitter, kW: 130
Resolution:
- by range, m 400 - 500
- by azimuth, degree 2,5 – 3,5
Root-mean-square errors of coordinate
measurement
- by range, m 100
- in height, m не более 300 - 600
- azimuth, min. 15 - 20
Using the Google Earth GIS project, select the location of the radar (see Figure 1.3) on the
ground, taking into account the necessary overlap of the viewing areas of neighboring stations and
the closing angles of the radar, taking into account the terrain, for a target altitude of 10,000 m.
Figure 1.2 – Terrain from the radar to the water surface of the Caspian Sea
- 482 -
Figure 1.3 – Radar locations
The scheme of the air situation control system with missing radar anchored on the ground,
taking into account the necessary overlap of the viewing areas of neighboring stations and the
angles of radar closure, taking into account the terrain, to ensure control of the target flight at an
altitude of 100 m is shown in Figure 1.4. Also at an altitude of 1000 m is shown in Figure 1.5 and
at an altitude of 10000 m is shown in Figure 1.6.
Figure – 1.4 Ensuring the control of the target's flight at an altitude of 100 m
Figure – 1.5 Ensuring the control of the target's flight at an altitude of 1000 m
The scheme of the radar air situation monitoring system for monitoring the flight of a target
at an altitude of 1000 m is shown in Figure 1.5.
- 483 -
Figure – 1.6 Ensuring the control of the target's flight at an altitude of 10000 m
Using the radar simulator, get an array of radar measurements (range - Dc, azimuth - C )
to plot the trajectory of the target RC1-RC4 in a spherical coordinate system for 20 minutes with
an interval of 1 min for a given height of the target movement.
To obtain the RC marks, for each moment of measuring the DC range, it is necessary to
calculate the value of the angle of the RC position according to the method that is explained in
Figure 2.5, according to the expression [3] according to the specified values of the height of the
NC:
𝐷𝑐2
𝐻𝑐 = 𝐷𝑐 ∗ 𝑠𝑖𝑛𝜀 +
2𝑅𝑒
Create an array of received RC marks (t, Dc, c, c) in a spherical coordinate system and
plot the time variation of the received values.
- 484 -
Figure – 1.8 Obtaining arrays of radar measurements
To map, select the option of the trajectory of the target 03 relative to the radar using the
AZBook software, which is shown in Figure 1.10. and the data were entered in Table 2.
The radar was selected on the scheme of the air situation control system, which observed
the target.
Radar No. 19 was selected as a radar in the scheme of the air situation control system,
which observed the target shown in Figure 1.11.
- 485 -
RADAR No. 19, with coordinates:
N.L. - 46°48'37.89"N.
E.L. - 50°12'55.46"W.
The change in the coordinates of the target in time is plotted in the form of marks of latitude
Vc and longitude Lc on the scheme of the air situation control system using the GIS project
“Google Earth”.
Determine the latitude of the radar radar and the longitude L of the radar in the geographical
coordinate system (GSK) (Fig.1.11) [3].
- 486 -
Figure 1.13 - Local rectangular coordinate system (MSK)
The center of the topocentric MPSC is located on the Earth's surface. The ОtYt axis is
perpendicular to the plane of the local horizon (PLH) and passes through the center of the Earth.
The Otitis ОtXt and ОtZt Otitis ОtZt axes are located in the PLH so that the right triple of vectors
is formed. Let the axis from ОtZt coincide with the direction to the North Pole of the Earth N. Then
the angle between the axis ОtZt and the projection of the radius vector ОtC on the PLH, counted
clockwise, is called the azimuth βc.The position of the target in this SC is characterized by the
coordinates Xt, Yt, Zt [4].
Recalculated for each moment of time, the resulting array of measurements of the
coordinates of the target from the spherical SC in the MSK radar [4]:
Determine the position of the radar in the GCC. The position of the radar on the Earth's
surface in the geographical coordinate system is determined by the latitude of the radar and the
longitude L of the radar, so the position of the radar in the GCC can be determined as follows [6]:
Recalculate the array of coordinates of the target from MSK to GSK [7]:
𝑋𝑐 𝑠𝑖𝑛 𝐿𝑟𝑙𝑠 𝑐𝑜𝑠 В𝑟𝑙𝑠 𝑐𝑜𝑠 𝐿𝑟𝑙𝑠 − 𝑐𝑜𝑠 𝐿𝑟𝑙𝑠 𝑠𝑖𝑛 В𝑟𝑙𝑠 Х𝑡 𝑋1
[𝑌𝑐 ] = [− 𝑐𝑜𝑠 𝐿𝑟𝑙𝑠 𝑐𝑜𝑠 В𝑟𝑙𝑠 𝑠𝑖𝑛 𝐿𝑟𝑙𝑠 − 𝑠𝑖𝑛 В𝑟𝑙𝑠 𝑠𝑖𝑛 𝐿𝑟𝑙𝑠 ] [𝑌𝑡 ] + [𝑌1 ]
𝑍𝑐 0 𝑠𝑖𝑛 В𝑟𝑙𝑠 𝑐𝑜𝑠 В𝑟𝑙𝑠 𝑍𝑡 𝑍1
The movement of the target in time in the geographical coordinate system is determined
by calculating the latitude of the Bц and the longitude of the Lц, which can be determined by
knowing the position of the target in the GCC, as follows [7]:
- 487 -
𝑅𝑐 = √𝑋𝑐2 + 𝑌𝑐2 + 𝑍𝑐2
𝐿𝑐 = 𝑎𝑟𝑐𝑡𝑔(𝑌𝑐 /𝑋𝑐 ) }.
В𝑐 = 𝑎𝑟𝑐𝑠𝑖𝑛( 𝑍𝑐 /𝑅𝑐 )
Analyze the possibility of controlling the surface situation in the Kazakh sector of the
Caspian Sea with the involvement of the radar of the developed air situation control system.
Several radar posts installed at a distance from each other allow you to create a continuous
control zone. The range of the radar is up to 42 km, which allows you to fully monitor the situation.
The distance of 42 km is taken from the consideration that the visible horizon, from a height
of 100 meters, is approximately 42 km from the observation point.
The creation of a network of coastal radars will allow us to take under reliable control the
situation along key sections of the coast of the Republic of Kazakhstan.
Conclusions
To date, one of the main sources of information about the air situation in the controlled
territory is radar. To obtain reliable data on the parameters of the target movement in these systems,
the radar image processing system plays an important role. The main problem of the radar image
processing system is the choice of a statistical processing method in case of errors in the
measurement of object motion parameters.
The accuracy of the estimation of the object motion parameters based on the results of the
radar images obtained depends on a priori information about the dynamics of the observed object.
Therefore, the development of a methodology for evaluating the effectiveness of methods for
estimating the parameters of the object's motion in conditions of a priori uncertainty of the
dynamics of the observed object's motion is an urgent problem considered in the qualification
examination.
Thus, the radio navigation parameters of the target were detected using the Google-Earth
software. A variant of building an air situation control system in the Kazakh sector of the Caspian
Sea has been developed, which will allow monitoring the surface situation and the flight of air
targets at an altitude of 1000 to 10000 m.
A sequential recalculation was made according to spatial coordinate systems.
The skills of creating an integrated multifunctional complex for lighting the space situation
in the Caspian Sea were acquired. The trajectory of the target is relatively directed from north to
east.
References
1. Babak V.P. Suputnikova radionavigation/ V.P. Babak, V.V. Konin, V.P. Kharchenko −
K.: Technika, 2004. − 328 p.
2. Bakulev P.A. Radar systems: textbook for universities / P.A. Bakulev. – M.: Radio
Engineering, 2004. – 320 p.
3. Berdyshev V.P. Radar systems: textbook / V.P. Berdyshev, E.N. Garin, etc.; under the
general editorship of V.P. Berdyshev. – Krasnoyarsk: SFU, 2011. – 400 p.
4. Friz S.P. Theory and technique of radar and radio navigation: textbook. manual / S.P.
Friz, A.V. Andreev, A.R. Rykhalsky, A.F. Dubina – Zhytomyr: Zhytomyr Polytechnic State
University, 2020. – 180 p.
5. Nikolaev A.I. Radar systems: textbook. manual/ A.I. Nikolaev, V.V. Akhiyarov, S.I.
Nefedov. − M.: Bauman Moscow State Technical University, 2018. – 349 p.
6. Shirokov Yu.F. Fundamentals of the theory of radar systems: electron. studies. manual
/ Yu.F. Shirokov. – Samara: SSAU named after S.P. Korolev, 2012.
7. Shirman Ya.D. Theory and technique of radar information processing against
interference/ Ya.D. Shirman, V. N. Manzhos. – M.: Radio and Communications, 1981. – 416 p.
- 488 -
Safety of aircraft operation in modern
conditions
Gulnara Nauryzbayeva, Guldana Aldzhambekova, A Tuktibayev
Abstract— High-speed descent through the atmosphere information for future missions and applications. The
generates a significant amount of heat, which, if not properly knowledge gained from thermal computing can be applied to
managed, can lead to structural failure, thermal stress, and a wide range of engineering disciplines, including aerospace,
other problems. Accurate thermal calculations are essential to automotive, and power generation. The development and
mission safety and success. They play a key role in predicting research of methods for the thermal calculation of descent
the thermal loads and temperature distribution of vehicles, vehicles is necessary to ensure the safety, success and
allowing engineers to design and build vehicles that can efficiency of spacecraft flights, as well as for the development
withstand extreme entry, exit and landing conditions. By of modern technologies of thermal engineering. Accurate
understanding the thermal environment during descent, thermal calculations help optimize vehicle thermal design,
engineers can also design and develop systems that can reduce costs and increase productivity, making them an
operate more efficiently and effectively. Finally, research and important aspect of spacecraft design and development.
development of thermal computing techniques will help
improve the state of the art in thermal engineering and
provide valuable information for future missions and Keywords— safety, aircraft, operation, space, method
applications. The knowledge gained from thermal computing Introduction
can be applied to a wide range of engineering disciplines, Today, it is important to develop and research lander
including aerospace, automotive, and power generation. thermal calculation methods to ensure the safety, success, and
Relevance of the topic. The development and research of efficiency of spacecraft flight, as well as to advance state-of-
methods for the thermal calculation of the descent vehicle is the-art thermal engineering. The development and research of
very relevant for several reasons: Safety: Accurate thermal thermal calculation methods for the descending vehicle are
calculations are essential to ensure the safe and successful very relevant for several reasons:
landing of a vehicle and its crew or payload. The heat Safety: Accurate thermal calculations are essential
generated during atmospheric descent can lead to structural to ensure a safe and successful landing of the vehicle and its
failure, thermal stress, and other problems if not properly crew or payload. The heat generated during descent through
managed. By understanding the mechanisms of heat transfer the atmosphere can lead to structural failure, thermal stress,
and temperature distribution in a vehicle, engineers can and other problems if not managed properly. By
design and build vehicles that can withstand the extreme understanding the mechanisms of heat transfer and
conditions of entry, descent and landing. temperature distribution in a vehicle, engineers can design
Mission success: The thermal environment during the descent and build vehicles that can withstand the extremes of entry,
phase can significantly affect the success of a mission. The descent, and landing.
ability to accurately predict thermal loads and temperature Mission Success: The thermal environment during
distribution within a vehicle helps achieve mission objectives the descent phase of a mission can significantly affect
and avoid damage to the vehicle and its payload during the mission success. The ability to accurately predict heat loads
landing phase. Cost Savings: Accurate thermal calculations and temperature distribution in the vehicle helps to achieve
help optimize vehicle thermal design by reducing the amount mission objectives and avoid damage to the vehicle and its
of materials and thermal management systems needed. This payload during the landing phase.
can result in significant cost savings in terms of vehicle Cost savings: Accurate thermal calculations help
development and operating costs. Improved Performance: By optimize vehicle thermal design, reducing the amount of
understanding the thermal environment during descent, thermal management materials and systems needed. This can
engineers can design and develop systems that can operate result in significant cost savings in terms of vehicle
more efficiently and effectively. For example, by predicting development and operating costs.
the temperature distribution in a car, engineers can design Improved performance: By understanding the
performance-optimized insulation and cooling systems, thermal environment during descent, engineers can design
reducing overall vehicle weight and power consumption. and develop systems that can operate more efficiently and
Technology Development: Research and development of effectively. For example, by predicting temperature
thermal computing techniques can help advance the state of distribution in a vehicle, engineers can design performance-
the art in thermal engineering and provide valuable
- 489 -
optimized insulation and cooling systems, reducing overall thermal characteristics of the vehicle and its environment.
vehicle weight and power requirements. Models can range from simple geometric models to complex
Technology Advancement: Research and models that include detailed information about the vehicle's
development of thermal computing techniques can help materials, systems, and other components. After the thermal
advance the state of the art in thermal engineering and models are created, input data is generated to represent the
provide valuable insights for future missions and applications. conditions encountered during reintroduction. This data may
Knowledge gained from thermal computing can be applied to include information on atmospheric conditions such as
a wide range of engineering disciplines, including aerospace, density, pressure, and temperature, as well as heating rates
transportation, and energy production. and heat transfer coefficients. This data is used to determine
The development and research of spacecraft thermal the thermal environment in which the vehicle will operate.
calculation methods is important to ensure the safety, success, Thermal calculations are then performed using
and efficiency of spacecraft missions, as well as to advance numerical methods such as computational fluid dynamics and
the state of the art in thermal engineering. Accurate thermal finite element analysis. These methods solve the equations
calculations help optimize vehicle thermal design, reduce describing the heat transfer through the vehicle and its
costs, and improve performance, making them an important environment and allow predicting the heat loads and
aspect of spacecraft design and development. temperature distribution in the vehicle.
Finally, the results of the thermal calculations are
MODERN HEAT CALCULATION TECHNOLOGY validated and verified to ensure their accuracy and reliability.
The study of thermal calculations for landing This can be done through a variety of methods, including
spacecraft has been an active area of research and comparisons with flight test data, ground test data, and other
development for many decades. There is a substantial body experimental data, as well as sensitivity analysis and error
of literature on this topic, ranging from theoretical studies to propagation studies.
practical design and analysis tools. The methodology used to develop and investigate
The current state of thermal engineering for spacecraft lander thermal calculations typically involves
spacecraft launch vehicles includes analytical and numerical creating thermal models, generating input data, performing
methods for predicting thermal loads and temperature thermal calculations, and validating and verifying the results.
distributions. Analytical methods based on thermal This multi-step process helps ensure that the results of
conductivity and radiation are useful for predicting steady- thermal calculations are accurate and reliable, providing
state thermal conditions. However, these methods have valuable information for the design and development of
limitations when dealing with the complex and dynamic spacecraft landing gear.
thermal environment encountered during reentry. Spacecraft lander thermal calculations include a
Numerical methods, such as computational fluid series of equations and numerical models to accurately
dynamics and finite element analysis, are becoming predict heat transfer and temperature distribution on the
increasingly popular for thermal calculations due to their surface of the spacecraft. These equations and models depend
ability to predict dynamic and transient thermal conditions on various factors such as speed, altitude, angle of attack, and
that occur during re-entrainment. These techniques allow thermal properties of the surrounding atmosphere. Below are
engineers to model the flow of heat through the vehicle and the thermal calculation equations that can be used for the
its surrounding environment, providing a detailed planter:
understanding of the temperature distribution and heat loads Convective heat transfer equation:
experienced by the vehicle. 𝑄 = ℎ ∗ 𝐴 ∗ (𝑇 − 𝑇 )
In addition to numerical methods, there are also where 𝑄 − is the convective heat transfer, ℎ −
various design and analysis tools for thermal calculations. is the convective heat transfer coefficient, 𝐴 − is the vehicle
There is also a growing body of literature on the use of surface area, 𝑇 − is the temperature of the vehicle surface,
advanced materials and systems to manage heat generated 𝑇 − is the ambient temperature.
during reentry. This includes the use of thermal protection Radiation heat transfer equation:
systems such as thermal blankets and tiles, and the 𝑄 = ℇ ∗ ℴ ∗ 𝐴 ∗ (𝑇 − 𝑇 )
development of advanced cooling systems for electronics and where 𝑄 − radiative heat transfer, ℇ − surface
other critical components. radiation coefficient, ℴ − Stefan-Boltzmann constant, 𝐴 −
A review of the literature reveals that there is a vehicle surface area, 𝑇 − vehicle surface temperature, 𝑇 −
wealth of information on the subject of thermal calculations ambient temperature of the surrounding atmosphere.
for spacecraft landing vehicles. The current state of the art Equation of conductive heat transfer:
includes analytical and numerical methods, as well as a 𝑇 −𝑇
variety of design and analysis tools, and growing research 𝑄 =𝑘∗𝐴∗
𝑑
into the use of advanced materials and systems to manage the where 𝑄 − conductive heat transfer, 𝑘 −
heat generated during reintroduction. thermal conductivity of the material, 𝐴 − vehicle surface area,
The methodology used to develop and study 𝑇 − vehicle surface temperature, 𝑇 − ambient temperature,
spacecraft lander thermal calculations typically involves 𝑑 − material thickness.
several steps, including generating thermal models, Energy balance equation:
generating input data, performing thermal calculations, and 𝑄 +𝑄 +𝑄 =𝑄
validating and verifying the results. where 𝑄 − is the heat energy absorbed by the
The first step in the methodology is to create thermal vehicle.
models. These models are used to represent the geometry and
- 490 -
Using these equations, as well as numerical generation during flight while ensuring the safety of the crew
techniques such as finite element analysis and computational and equipment. Here is a brief explanation of where each of
hydrodynamic modeling, engineers can accurately predict the the values used in the calculation of radiative and convective
thermal behavior of a vehicle during a descent and design heat transfer in the union comes from.
effective thermal protection systems. Radiation coefficient (ε): The radiation coefficient
Radiation heat transfer for "Soyuz-16" of the surfaces of the Soyuz-16 spacecraft was assumed to be
Before entering the Earth's atmosphere, the Soyuz- equal to 0.2. This is a characteristic of spacecraft materials.
16 spacecraft will be exposed to sun radiation and deep space Surface Area (A): The surface area of Soyuz-16 is calculated
radiation. Radiant heat transfer from these sources can be based on its dimensions of approximately 7.48 meters in
calculated using the following equation: length and 2.72 meters in diameter. The total area was 96.4
𝑞 = 𝜎𝜀𝐴 (𝑇 − 𝑇 ) square meters. temperature (T): the temperature used in the
q- radiative heat transfer (W) calculations is based on conditions during the Union-16 flight.
σ- Stefan-Boltzmann constant (5,67 ∙ 10 − 8 W/ The temperature of the spacecraft in space was estimated to
m K ) be 2.7 Kelvin, that is, the temperature of deep space. The
ε- radiation coefficient of the spacecraft surface temperature of the earth in the atmosphere during the flight
(assumed to be equal to 0.2 for Soyuz-16 spacecraft). was equal to 800 Kelvin, and during the descent it was equal
A- spaceship surface area exposed to radiation to 1200 Kelvin. Stefan-Boltzmann constant (σ): This is a
(m ). basic physical constant used in radiation heat transfer
calculations and its value is 5,6710-8 W/(m K ). Convective
T- spacecraft surface temperature (K). heat transfer coefficient (h): The convective heat transfer
T - deep space temperature (should be 2.7 K) coefficient used in the calculation of the atmospheric flight of
As the Soyuz-16 spacecraft enters the Earth's the earth is taken as equal to 50 W / (m K), which is a typical
atmosphere, it collides with atmospheric gases, causing value of the heat transfer in the air. Velocity (v): The velocity
convective heat transfer. Convective heat transfer can be used in the calculation of convective heat transfer for the
calculated using the following equation: flight of the earth in the atmosphere was equal to 255.5 m/s,
𝑞 = ℎ𝐴(𝑇 − 𝑇∞ ) which is the maximum speed of the Soyuz-16 spacecraft
q - convective heat transfer (W) during this period.
h - convective heat transfer coefficient (W/m K) Convective heat transfer for Soyuz-16 spacecraft
A- surface area of the spacecraft in contact with the The convective heat transfer for the Soyuz-16
atmosphere (m ). spacecraft can be calculated using the following equation:
T- spacecraft surface temperature (K). 𝑞 = ℎ ∗ 𝐴 ∗ (𝑇 − 𝑇 )
T∞ — the temperature of the atmosphere (taken as where 𝑞 − is the heat transfer rate, h is the
equal to 255.5 K at sea level). convective heat transfer coefficient, 𝐴 − is the surface area,
After landing, the Soyuz-16 spacecraft is still 𝑇 is the temperature of the surface, and 𝑇 is the
exposed to radiation from the sun and the Earth's surface. ambient temperature. During the entry into the atmosphere,
Radiant heat transfer can be calculated using the same Soyuz-16 was exposed to high temperatures due to friction
equation as in step 1. The heat output from the Soyuz-16 with the air. This resulted in a significant increase in the
equipment can be calculated using the following equation: surface temperature of the spacecraft. The heat produced by
𝑃
𝑞 = the equipment inside the spacecraft is dissipated to the
𝜀𝐴 environment by convective heat transfer. The convective heat
q-heat output (watts) transfer coefficient depends on the speed, density and thermal
Radiation was the dominant factor influencing the conductivity of the air. To calculate the convective heat
thermal characteristics of Soyuz-16 during the spaceflight transfer, we need to estimate the convective heat transfer
and reentry phases. However, during the descent phase, both coefficient ℎ . For this purpose we can use the following
radiation and convective heat transfer played an important equation:
role in dissipating the heat produced by the equipment. 𝑣 , 𝜌 ,
During descent, the Soyuz-16 spacecraft had to withstand ℎ = 0,029 ∗ ∗ ∗ 𝜆,
high temperatures due to a combination of radiative and 1000 𝜌
convective heat transfer. A thermal protection system where 𝑣 is the speed of the spacecraft, 𝜌 is the air
consisting of ablative heat shields and insulating materials density, 𝜌 is the air density at sea level, λ is the thermal
provided protection from extreme heat. The calculated conductivity of the air. Using the known physical
convective heat transfer was 1,06107 watts. This was mainly characteristics of the Soyuz-16 spacecraft, it is possible to
due to the high speed of the spacecraft through the Earth's estimate the convective heat transfer coefficient at different
atmosphere. stages of the flight. During descent, Soyuz-16 had a speed of
As the spacecraft descends, air molecules collide about 230 m/s, air density and thermal conductivity at an
with the surface of the heat shield, transferring heat through altitude of 120 km were 1,3610-4 kg/m3 and 2,610-2 W/mK,
convection. The estimated radiation heat transfer during respectively. Using these values, we can estimate the
descent was 1,58107 watts. This was the dominant factor convective heat transfer coefficient as follows:
,
affecting the thermal performance of the 10 spacecraft during 230 , 10
ℎ = 0,029 ∗ ∗ 1,36 𝑥
this period. The heat produced by the equipment is radiated 1000 1,23
into the surrounding atmosphere. Overall, the thermal design ∗ (2,6 𝑥 10 ) ,
= 50 W / (m K)
of the Soyuz-16 spacecraft successfully managed heat
- 491 -
During the entry phase, the speed of the Soyuz-16 used for spacecraft equipment and structures, as well as the
spacecraft was about 7900 m/s, the air density and thermal thickness of the materials. Below are the conduction heat
conductivity at an altitude of 80 km, respectively 3,4710-3 transfer estimates for Soyuz-16: Conduction heat transfer
kg/m3 and 2,210-2 W/mK. Using these values, we can between spacecraft equipment and structures during
estimate the convective heat transfer coefficient as follows: spaceflight: Assume an average temperature of 20°C for the
7900 , 10
, equipment and 5°C for the spacecraft design. Suppose that
ℎ = 0,029 ∗ ∗ 3,47 𝑥 the thermal conductivity of materials is 0.2 W/mK. Assume
1000 1,23 that the average distance between the hardware and the
(2,2 ) ,
∗ 𝑥 10 = 5100 W / (m K) spacecraft design is 1 cm. Estimate the contact surface area
Note that the convective heat transfer coefficient as 10 m
may vary depending on the shape and orientation of the 293 − 278
spacecraft, as well as the composition and properties of the 𝑞 = 0,2 ∗ 10 ∗ = 29,0 𝑊
0,01
surrounding atmosphere. These estimates provide a general Conductive heat transfer between spacecraft
idea of the amount of convective heat transfer during the equipment and structures during atmospheric entry: Assume
Soyuz-16 flight. an average temperature of 150°C for the equipment and
The convective heat transfer coefficient for the 1200°C for the spacecraft design. Suppose that the thermal
Soyuz-16 spacecraft in the atmospheric phase on Earth is conductivity of materials is 0.2 W/mK. Assume that the
estimated to be 50 W/(m K). The surface temperature was average distance between the hardware and the spacecraft
estimated at 255.5K based on radiation heat exchange design is 1 cm. Estimate the contact surface area as 10 m
equations. The ambient temperature at an altitude of 30 km 423 − 1473
was equal to 255K. Using these values, we can calculate the 𝑞 = 0,2 ∗ 10 ∗ = −5,5 𝑘𝑊
0,01
convective heat transfer for the atmospheric phase of the
(note the negative sign indicating that heat is transferred from
Soyuz-16 spacecraft.
the spacecraft design to the equipment) Conductive heat
During descent, the convective heat transfer
transfer between the equipment and the structure during
coefficient may increase due to high density and air velocity.
takeoff: Assume an average temperature of 80°C for the
The temperature of the Earth's surface also increases due to
equipment and 1000°C for the spacecraft design.
the compressional heat generated by the shock wave in front
Suppose that the thermal conductivity of materials is
of the spacecraft. Values of convective heat transfer
0.2 W/mK. Assume that the average distance between the
coefficient and descent phase surface temperature are not
hardware and the spacecraft design is 1 cm. Estimate the
available and depend on several factors such as angle of
contact surface area to be 10 m
attack, speed, altitude and atmospheric properties. 353 − 1273
The values of the convective heat transfer q = 0,2 ∗ 10 ∗ = −3,6 k𝑊
coefficient (h) used in the calculations were estimated based 0,01
(Note the negative sign indicating that heat is transferred
on typical values of the spacecraft inlet. The values of the
from the spacecraft design to the equipment) These estimates
Earth's surface (A) were taken from the physical
give a general idea of the amount of conductive heat transfer
characteristics of the Soyuz-16 spacecraft, a spherical shape
during the flight of the Soyuz-16 spacecraft. For conductive
with a diameter of 2.7 meters. To calculate the convective
heat transfer, we used the thermal conductivity of the
heat exchange of the Earth's atmosphere, the ambient
materials and the temperature gradient between the interior
temperature is 255.5 K
and exterior of the spacecraft to calculate the heat transfer rate.
(-17.6°C), which is the standard temperature of the
Values are obtained from various sources such as NASA
atmosphere at an altitude of about 11 km. The temperature of
technical reports, material specifications, and scientific
the Earth's surface was estimated to be 800 K based on
literature. The dimensions and composition of the spacecraft
radiation heat transfer calculations. To calculate the
were also considered to estimate the surface layer and
convective heat transfer of the lunar atmosphere, the ambient
thickness of the various layers. The values used in the
temperature was assumed to be 120 K (-153.15°C), which is
calculations are based on the physical characteristics of the
the average temperature of the lunar surface. The temperature
Soyuz-16 spacecraft, including Temperature gradient
of the Earth's surface was estimated at 100K based on the
between interior and exterior space: based on assumptions
calculation of radiation heat transfer.
regarding the mission profile and internal heat distribution
Conductive heat transfer occurs when two
and distribution. The equations used are based on Fourier's
substances at different temperatures are in direct contact,
Law of heat conduction and assuming stationary conditions.
when heat is transferred from a hot substance to a cold
The heat transfer rate was calculated as the product of surface
substance. In the case of Soyuz-16, conductive heat transfer
area, temperature gradient, and thermal conductivity.
mainly occurred between the on-board equipment and the
Conclusion
spacecraft design. To calculate conductive heat transfer, we
For the above calculation, a thermal conductivity
use the following equation:
value of 10 W/mK and a thickness of 0.01 m were assumed
𝑞 = 𝑘 ∗ 𝐴 ∗ (𝑇 − 𝑇 )/𝑑
for the spacecraft design. The used surface area was 0.2
where q is the speed of heat flow, k is the thermal
square meters, and the hot and cold temperatures were
conductivity of the material, A is the area of the contact
estimated to be 353 K and 1273 K, respectively, "Soyuz- 16"
surface between two objects, 𝑇 is the temperature of the
based on equipment and spacecraft design temperature ranges
hot object, 𝑇 is the temperature of the cold object, and d
during flight.
is the distance between the two objects. The conductive heat
transfer coefficient k can vary depending on the materials
- 492 -
The main type of heat transfer during this period was 12 Allen, G. A. (2012). Fundamentals of space systems.
a combination of radiative and convective heat transfer. On Oxford University Press.
board "Soyuz-16" there was a variety of equipment that
produced heat during operation, such as the guidance and
navigation system, communication equipment and life
support systems. The heat generated by this equipment had to
be dissipated through the spacecraft's cooling system to
prevent overheating and damage to the equipment. The
amount of heat coming out of the equipment can be estimated
from the information about the power consumption and
efficiency of the equipment.
Similarly, the heat generated by other onboard
equipment can be estimated using the same equation. Once
the heat is released, it must be dissipated by the spacecraft's
cooling system. The cooling system of the Soyuz-16
consisted of two separate circuits: one for the equipment and
the other for the crew cabin. The equipment circuit used a
liquid coolant that circulated through the equipment to absorb
heat, which was then sent to a heat exchanger, where the heat
was released to space through a radiator.
Overall, the heat distribution and separation process
for Soyuz-16 was a complex and critical aspect of the
spacecraft's thermoregulation system, requiring precise
calculations and design to ensure mission safety and success.
As it entered the atmosphere, Soyuz 16 experienced strong
atmospheric drag, which caused frictional heating of the outer
surfaces of the spacecraft. This heat had to be dissipated to
prevent damage to the spacecraft and its passengers. The
main types of heat transfer during this period were radiative
and convective heat transfer.
List of references
1 Smith, J. M., & Johnson, R. V. (2018). Spacecraft
Thermoregulation Manual: Basic Technologies. Cambridge
University Press.
2 Anderson, Jr., J. D. (2016). Familiarity with flying.
McGraw Hill Education.
3 Incropera Devitt, DP, Bergman, T. L., and Lavigne, A. S.
(2017). Fundamentals of heat and mass transfer. John Wiley
& Sons.
4 NASA. (2019). Thermal protection systems: Materials
and design. Retrieved from
https://www.nasa.gov/directorates/spacetech/tdm/thermal_pr
otection_systems/materials.html
5 CFD Online. (2021). Computational hydrodynamics.
Retrieved from https://www.cfd-online.com
6 SOLIDWORKS. (2021). Modeling in SOLIDWORKS.
Retrieved from
https://www.solidworks.com/products/simulation/
7 Menter, F. R. (1994). Eddy Turbulence Models with Two
Viscosity Equations for Engineering Applications. AIAA
Journal, 32(8), 1598-1605.
8 Ferstig and Malalasekera, 2007). Introduction to
Computational Hydrodynamics: The Finite Volume Method.
Pearson Education Limited.
9 Rossow, K. S. (2014). Thermal analysis and design of
passive systems of thermoregulation of space vehicles. John
Wiley & Sons.
10 Gilmore, D. G., & Gilmore, T.F. (2018). Handbook of
Spacecraft Thermoregulation: Cryogenics. CRC Press.
11 Cheng, K. Y., and Louis, R. Yu. (2016).
Thermoregulation systems of space vehicles. Jumper.
- 493 -
A Molecular Dynamics Simulation Study on
Superlubric Carbon-based Nanodevice
Tae Hoon Kim 1, Jeong Won Kang 1,2*, Haram Kim 1, and Ki-Sub Kim 3*
1
Department of SMART Railway System, Korea National University of Transportation, Republic of Korea
2
Department of Transportation System Engineering, Korea National University of Transportation, Republic of Korea
3
School of Chemical and Energy Engineering, Korea National University of Transportation, Republic of Korea
ACKNOWLEDGMENT
This work was also supported by the Korea Agency for
Infrastructure Technology Advancement (KAIA) grant
funded by the Ministry of Land, Infrastructure and Transport
(Grant No. 22QPWO-C158106-04).
- 494 -
Extracted Cellulose with Deep Eutectic Solvent
and Ionic Liquid: Changes in Structural and
Thermal Characteristics
Yeung Chan Kim 1, Ho Hyun Han 2, Jeong Won Kang 2,3*, and Ki-Sub Kim 1*
1
School of Chemical and Energy Engineering, Korea National University of Transportation, Republic of Korea
2
Department of SMART Railway System, Korea National University of Transportation, Republic of Korea
3
Department of Transportation System Engineering, Korea National University of Transportation, Republic of Korea
- 495 -
Implementation of carbon neutrality through
the RE100 verification system in the agricultural
sector
Abstract—Various global campaigns were born according 409 members have participated in the campaign so far, and
to the global carbon neutral stance. Among them, RE100 most of them are well known companies. Thanks to the
moved global companies through the union of the two non- trend of the carbon neutral, that activate renewable energy
profit organizations, and the global companies implement market and as shown below, it can be seen that the current
RE100 and they requesting vendors to join the campaign. members of RE100 are on the rise and the corresponding
RE100 in the Industrial sector has been progressing at a rapid RE achievement rate, is continuously increasing.
pace. And solving the climate crisis, which started from the
Kyoto protocol, was continuously worked at the adoption of
the Paris Climate Agreement in which all 195 UN Parties
participate in 2015. Following carbon neutrality in the
industrial sector, the agricultural sector is no exception. We
studied ways to implement and verificate RE100 in order to
expand and apply carbon-neutral steps in the industrial sector
to the agricultural sector.
I. INTRODUCTION
Fig. 1. RE100 Members and energy consuption
The Kyoto Protocol began in 1997 to reduce emissions
of six types of greenhouse gases, including carbon dioxide B. K-RE100
and methane, to prevent global warming. In 2015, 195
countries participated in the plenary session of the 21st Match with the global RE100, Korea renewable energy
United Nations Framework Convention on Climate market also gained momentum and was born as the K-
Change(COP21) in Paris. These efforts has led to several RE100. This campaign established for Korea companies to
climate change campaigns, and so far, the RE100 been respond the Global RE100. The biggest difference thing is
recognized as a representative global company-led carbon participant condition. More about that will talk about next
neutral effort. This flow in the industrial sector begin to be subject. As a result, various companies such as public
required from global companies to the subcontractors, and institutions and companies joined and so far 157 members
have to join the RE100 campaign to contract with them. And on it. This is about 3.8 times more than the 32 currently
now, efforts are needed to implement carbon neutrality in participating in the Global RE100. This phenomenon
the agricultural sector following carbon neutrality in the suggests that Korea, as an export-based manufacturing
industrial sector. Typically, for carbon neutral in country, is sensitive to issues that effect GVD, such as the
agricultural and livestock sector, which using a lot of power RE100 campaign(except for government-related
to dry and maintain temperature, we selected a pig breeding organizations), and that many global companies are putting
house test bed and conducted a study for the application of pressure on domestic suppliers to join RE100.
RE100. C. Difference of Global RE100 vs K-RE100
II. GLOBAL RE100 AND K-RE100 K-RE100 is little bit different with Global RE100. The
biggest point is participants, that most of the RE100
A. Global RE100 members are based on the power consumption more than
The RE100 campaign was launched in 2014 as a 0.1 TWh or selected as a Fortune 1,000 company. On the
collaboration of the Carbon Disclosure Project(CDP) and other hand, K-RE100 has no restriction. Also, in the case of
the multinational non-profit organization The Climate former, implementation goal are set and recommended for
Group. Starting with 14 companies such as Ingka Group and 2030, 2040 and 2050. Latter, only needs to be satisfied by
Nestle in 2014, a large number of global companies such as 2050 of 100% of renewable energy. The middle step leave
Google, Adobe and Microsoft participated in 2015. The it to the company by autonomous. When the company reach
influence of global companies participation has been the target point they have different recognition system that
boosted by the movement toward global carbon neutrality, use some platform in case of K-RE100. In addition, the
and some contracts concluded only when vendors planning scope is different that former is for global business sites and
or join the RE100 campaign at least. Through there100.org, latter limited to domestic only. See the table below.
- 496 -
TABLE I. COMPARISON RE100 AND K-RE100 international standards, it is necessary to establish an
independent quality system that reflects the requirements of
Global RE100 K-RE100 ISO/IEC 17029, which is configured as follows according
Influential companiess, to KTL regulations.
such as companies that All including industrial,
consume more than 0.1 general and KTL's quality documents are classified and linked in
Participants vertical and horizontal systems. Vertically, it is composed
TWh of electricity per agricultural(partly)
year or Fortune 1,000 electricity consumers of a total 5 steps: ‘company manual’ > ‘manual by sector’ >
companies ‘procedure’ > ‘guideline’ > ‘work standard’. It is divided
Green Premium System Green Tariff into 'common documents' that define the overall operational
REC Purchase REC Purchase
Method Third-party PPA Third-party PPA
direction and common functions of the horizontally
Captial Investment Direct PPA structured institution, and 'individual documents' that
Self-generation Self-generation describe differentiated contents by field. In the case of
Geothermal, solat(heat), Sane as left renewable energy, in addition to common documents, ‘1
Energy tidal, hydro, wind, Biomass + fuel cell manual for verification field / 1 procedure (individual) / 4
Source biomass(gas), green *GHG reduction recognition:
guidelines (individual)’ were separately prepared and
hydrogen fuel cells solar(heat), wind, hydro
Fulfillment 2050 100% RE100 2050 100% RE100 constituted, and a total of 23 types of quality documents are
Goal 2040 90% / 2030 60% Middle step autonomous used.
Scoope Wolrdwide offices Domestic only
After registering the
Report renewable
usage in the K-RE100
energy usage to CDP
Report management system,
once a year
receiving a certificate of
(submit spreadsheet, etc)
renewable energy use
Domestic RE100
declaration and external
publicity, use of
Global RE100 declation
Utilization greenhouse gas reduction
and publicity
performance and global
RE100 performance
(planned)
One thing that K-RE100, which was originally available
only to industrial and general electricity consumers, has
amended that can be implemented by who currently use
agricultural electricity. Those kind of happened because of
the Korea electricity consumption structure. Fig. 3. Mamnual and Procedure for validation and verification
III. K-RE100 VERIFICATION AND CERTIFICATION SYSTEM Based on the internationally used carbon footprint
verification system of the KOLAS verification system, the
Carbon neutrality and energy-related verification fields
K-RE100 verification system will be established as follows
have been announced as new introductions in Korea. As
to meet the main requirements of the international mutual
follows, according to National Agency for Technology and
recognition system.
Standards notice No.2023-0702, the field and scope of
accreditation of environmental information and energy
management accredited institutions have been expanded by
the introduction of a validation and verification system.
Fig. 2. MLA Conformity Assessment In accordance with this system operation, the K-RE100
verification system will be managed by the Korea Energy
As a result, ISO 14065, the existing V&V institution Agency as the Scheme Owner, and KTL will proceed with
operation standard, was downgraded from Level 3 to Level the verification. After that, the Scheme Owner for the
4, and the contents were expanded to include greenhouse Global RE100 connection is also the Korea Energy Agency,
gas and other environmental information. In Level 3, and KTL is in charge of verification, so that the system
ISO/IEC 17029, the standard for all V&V agency operations operation and verification system will be equipped.
including environmental information, was enacted and
placed. Therefore, in order to provide conformity
assessment services in the verification field that conform to
- 497 -
IV. TEST-BED FOR RE100 EXEMPLICATION The hydrogen fuel cell system has a maximum monthly
power generation of 72,000 kWh and a gas consumption of
A. General of Test-bed 68 Nm3/h.
We selected the test bed of Mundong Farm, located at
610-19 Geumak-ri, Hallim-eup, Jeju-si, measured the power TABLE II. H2 AND POWER GENERATION COMPARED TO INPUT
consumption for RE100, and conducted demonstration
Input of pig H2 Day Year
using this site. This test-bed is equipped with a pig breeding
manure Generation Generation Generation
facility with a capacity of 5,000 heads and a manure
(ton) (Nm3/h) (kWh) (kWh)
treatment facility.
1 34.8 1,781 427,440
2 69.54 3,562 854,880
5 173.88 8,906 2,137,440
In the case of a single drying facility in the farm, as
measured by a power meter, it consumed about 25,692 kWh
of electricity per year. Total electricity consumption
according to KEPCO's electricity bill was about 980,925
kWh per year in 2022. This is a value corresponding to
RE87 of the total power when 2 ton is input, and in the case
of a single drying facility, a value that is satisfied with 1 ton
Fig. 5. Demonstration farm breeding facility
comes out. Based on this, when the power conversion factor
0.4747 tco2/MWh is applied according to the input of 2 tons
The Test-bed is equipped with infrastructure that can of pig manure, it will have an effect of reducing CO2 by
conduct demonstrations for eco-friendly treatment of about 405 tons per year.
livestock manure and realization of RE100 by establishing
V. CONCLUSION
livestock manure energy resource infrastructure also
greenhouse gas and energy environment integrated New policies and regulations are being established for
management monitoring system as shown in the following each country to achieve the NDC goal, and international
figure. efforts are being made to keep the global average
temperature increase below 2°C compared to pre-industrial
levels, and further limit the temperature increase to 1.5°C or
less. RE100, which is concentrated in the industrial sector,
as we demonstrate the effect of reducing carbon in the
electric power sector and acceleration carbon neutrality in
the agriculture and forestry sector, a verification and
certification system will effectively achieve the transition to
renewable energy. And then in the entire energy sector will
be expanded.
Based on the research tasks achieved so far, the
applicability of RE100 for agriculture was verified, and
based on the results, research and demonstration of energy
resource utilization using livestock manure will be
continued. In addition, based on this, it is necessary to
Fig. 6. Structure of Monitoring System promote the expansion of supply so that RE100 certification
can be operated in the agricultural and livestock sector.
The compost and liquid manure treatment system goes
through the following process. The compost and liquid ACKNOWLEDGMENT
manure are separated through a centrifugal separator, and This work was supported by Korea Institute of Planning
the liquid manure is reprocessed and reused in the farm. The and Evaluation for Technology in Food, Agriculture and
separated pig manure is directly transported to the fermenter Forestry(IPET) through Livestock Industrialization
storage area, spread evenly, and then agitated and mixed Technology Development Program(or Project), funded by
using an agitator to ferment and dry the pig manure for a Ministry of Agriculture, Food and Rural Affairs(MAFRA).
certain period of time. After then it transport to a public (322102-03)
treatment facility.
B. RE100 demonstration of livestock manure resoure REFERENCES
[1] Park Sang-ho, “A study on the Domestic and Foreign RE100 Trend
In the demonstration, a 100 kW PEMFC hydrogen fuel and Verification System,” Proceedings of the 2022 Fall Conference
cell is operated using H2 generated by utilizing the livestock of the Electrical Equipment Division of the Korean Electrical
manure energy resource system as an energy source. At that Society, 2022.
time, the representative chemical formula for gasification of [2] RE100 ANNUAL REPORT, 2022.
pig manure is as shown in (1). [3] Lee Min-ah, “Preliminary Study on the RE100 International
Recognition Plan,” Proceedings of the 2022 Fall Conference of the
Cx, Hy, Oz + mH2O = xCO + nH2 (1) Electrical Equipment Division of the Korean Electrical Society,
2022.
- 498 -
[4] Lee Jung-Hoo, “Preliminary Study on Establishment of the RE100
Certification System,” Proceedings of the 2022 Fall conference of
the Electrical Equipment Division of the Korean Electrical Society,
2022.
[5] Kang Min-Seong, “A Study that Certification RE100 of Pig
Breeding House by Utilization Livestock Manure”, The
Transactions of the Korean Institute of Electrical Engineers, vol. 72,
no. 3, pp. 453~458, 2023
- 499 -
Study on the collapsing of artificial retaining
wall facility using acoustic emission
Kwang Bok Kim 1, Bong Ki Kim 1, Woon Kyung Kim 1, Tae Hun Kim 1,
Sung Hun Park 1, Saurabh Kumar 1, Jun Gil Kang 1 , Sang-Tae Han2 and Kyung-Wan Koo 2*
1
Integrity Diagnostic Korea Co. Ltd., Republic of KOREA
2
HoSeo University, Republic of KOREA
Email: [email protected]
Abstract—This paper is a study of the process of retaining pressure of the soil. After soil compaction, nine 1m-long
wall collapse using the AET technique. Pile type AE Sensor pile-type sensors were installed at 1m distance from each
specially designed to collect AE data during the collapse of the other. These pile-type sensors were designed to detect micro-
retaining wall was manufactured. The artificial reinforced displacement-induced elastic waves by attaching
retaining wall was made to be 27 square meter and height 3 piezoelectric ceramics to the sensor line, which resonates at a
meter. It consists of reinforced soil and concrete blocks that are maximum resonance at 60kHz.
most commonly used for reinforced soil retaining wall. The pile
type sensor was installed vertically in retaining wall at a depth a) AE Data collection
of 1 m and connected to the AET system using a cable. AE data The acoustic emission testing collection device (IDK-
was collected and AE parameters were converted by collapsing PU16) developed by IDK was waterproofed and placed in a
into forklifts. The signal strength in AE parameters showed the
waterproof box for real-time data collection. The data
best AE characteristics during the collapse process. After
applying the 2D CNN model of artificial intelligence, 85% of collected from the file-type sensors were amplified through a
the five-step collapsing process could be confirmed. (Abstract) preamplifier and amplified with a gain value of 40dB. The
AET system, equipped with two PCIe slot-mounted DAQ
Keywords— Acoustic emission testing, retaining wall, data boards (8-channel type), measured and automatically saved
collection, prediction (key words) the signals flowing from the nine AE sensors to a PC. The
data were collected at a maximum speed of 10Msps for each
sensor. The collected AE data were analyzed using the AE
I. INTRODUCTION Studio software developed by IDK, after removing
The application of inclinometers, subsurface environmental noise. The timing control function values
inclinometers, displacement gauges, drones, and imaging during data collection were set according to Table 1.
techniques in the prediction of wall and slope collapse has
been increasing. Real-time digital data conversion is
necessary to enable the transition to early warning systems
by detecting small ground movements. To develop a
prediction technique for wall collapse using acoustic
emission testing (AET), a pile-type AE sensor was developed
[1]. This sensor is a real-time system that is able to detect
ground movements by drilling and inserting it deep into the
ground and transmitting micro-elastic waves to provide
warnings of the collapse point. In this study, a reinforced soil [Fig. 1] Retaining wall testbed
wall(retaining wall) was constructed in an outdoor test bed as
a preliminary step of empirical research, and AE data related
to the collapse process were collected to establish a collapse
prediction based on AE feature values. Table 1: AE Data collection parameters
Parameter Value Parameter Value
II. EXPERIMENT AND RESULTS P/A gain (dB) 40 HDT (us) 400
A. Reinforced retaining wall sampling rate (MHz) 10 PDT (us) 200
Reinforced soil walls were constructed in a designated Pre-trigger 400 MHD (us) 10,000
area, with two sets of 2m x 2m and one set of 3m x 3m as
shown in Fig. 1. The exterior was made of concrete blocks, Threshold (dB) 30 HLT (us) 4,000
and three types of reinforcing soil were compacted inside.
HPF (kHz) 50 Noise AVG TC (us) 100,000
Pressure gauges were installed to measure the overall
- 500 -
LPF (kHz) 300 Signal AVG TC (us) 100,000
[Fig. 3] Retaining wall collapse procedure
B. characteristics during wall collapse During the wall collapse, the signal strength data from
The AET system was installed in the outdoor test bed and AE showed significant increases each time the forklift crane
observed using a real-time web monitoring system. CCTV made contact with the wall and exerted force during the five
cameras were installed for safety reasons, considering stages of collapse, corresponding to the movement of the
potential hazards, and environmental data were collected reinforced soil. Figure 4 depicts the relationship between
during the summer season, including typhoons, rainfall, wind, slope displacement and AE data by installing an
etc. Subsequently, during the winter season and thawing inclinometer sensor. The lower part of Figure 4 shows that
period, the wall was artificially collapsed, and AE data were when stress is applied to the wall due to forklift crane
collected and analyzed in March 2023. contact, the initiation of horizontal loading, and the
completion of horizontal loading, the AE data increase
vertically. This becomes essential data for developing
a) Environmental data and AE integrity indicators for wall collapse.
The relationship between AE signal strength values
and precipitation, wind and temperature were investigated.
The AE signal strength values increased with precipitation, c) HS Index
as the top part of the pile-type sensors did not submerge The zonal intensity method evaluates the structural
entirely into the reinforced soil. However, the AE values severity of defects by determining the intersection of two
showed little variation with wind and temperature. independent parameters: the history index (HI) and severity
index (SI) [2].
N
N ∑ Soⅈ
t= k +1
H (t )= N
N− K ∑ Soi
i= 1
N= 10
1
Sav=
10
∑ Soi (1)
i= 1
- 501 -
Figure 5 shows the trend of hit count intervals for
generating the H index every 5 seconds during the collapse
process. The collected hit rates for each of the ten intervals
were used to calculate the HS index using Equation (1).
III. CONCLUSION
The entire process of wall collapse was performed in an
outdoor test bed using acoustic emission technology.
Despite the influence of precipitation, wind, and temperature,
environmental factors were easily eliminated during AET
data collection. Clean AE data collected during the collapse
process were secured by utilizing the AET system,
commercially developed by IDK, from collection to signal
processing. The collapse algorithm was completed using AE
data from different collapse stages. Additionally, an
integrity index was proposed and developed, which is
expected to contribute significantly to the future
development of slope collapse prediction technologies.
ACKNOWLEDGEMENT
This paper presents the research findings (Project Unique
Number 1414183064) conducted with the support of the
Ministry of Industry, Trade, and Resources and the Korea
Institute for the Advancement of Technology under the
'Chungnam Dangjin Industrial-Academic Convergence Zone
Industrial-Academic Convergence Promotion Support
Project (No. P0016967).
REFERENCES
[1] ASNT, NDT Handbook Vol 6, 315p
[2] ASNT, NDT Handbook Vol 6, 121p
- 502 -
Estimation of AIS-based ship GHGs emission
using PAQman System : ⓒ
1. INTRODUCTION
Ocean-going vessels have been taking a long-lasting role
in international logistics, and as maritime trade market is Figure 1. Flow chart for marine vessel emission by PAQman ⓒ
rapidly expanding, its economic and social influence is also
increasing. However, as the environmental burden on various
types of air pollutants and greenhouse gases such as carbon 2.2 Port-city Air Quality management system (PAQmanⓒ)
dioxides, sulfur oxides, and fine dust from vessels attracts Port-city Air Quality Management Systemⓒ (PAQmanⓒ)
international attention, the effective management of ship air is the AIS based ship air and GHGs emission estimation
emission and improvement of air quality in the port city is system developed by Air / Climate Group of Incheon
also an emerging issue as of strong social concerns. In
National University, and PAQmanⓒ is the technology that
particular, the European Commission (EC) is planning to
enables the accurate ship air pollutants and GHGs emission
expand the scope of the EU Emission Trade Scheme (EU-
inventory in a form of high-resolution space emission
ETS) to international shipping in order to manage and reduce
mapping.
greenhouse gas emissions from ships. In order to implement
the emission trading scheme, it is very important to identify PAQmanⓒ collects AIS data for estimating ship
the exact emission of each company or country, and it is emissions by using PAQman-watcherⓒ, AIS data receiver,
essential to secure a reliable spatial emissions inventory and creates the database for emission inventory. In this study,
considering the characteristics of ships traveling across PAQmanⓒ is used to estimate the ship GHGs emissions in
multiple waters. Pyeongtaek·Dangjin Ports.
2. BODY
2.1 AIS based ship GHGs emission estimation methodology
The ship emission estimation methodology using AIS
(Automatic Identification System) data, unlike the existing
fuel consumption-based method, estimates the ship emission
by considering individual movements and specifications of
each vessel, so it could be used as a useful means for the
regional GHGs emission management in port cities. In
particular, it is possible to produce a high-resolution emission
map through accurate spatial allocation of emissions based
on AIS data.
ⓒ
Figure 2. Systematic concept of PAQman System
- 503 -
2.3 Study area and data collection) In addition, it was found that most of the emissions in the
We directly collected AIS data (Oct. 1 to 30, 2021), area near Pyeongtaek Port, where a large amount of CO2
which is ship activity data, to estimate ship air emissions, and was emitted, were reduced by the preparation of emission
the AIS receiver was installed at Hoseo University campus. maps according to the AMP application.
This study conducted the analysis of ship GHGs emission
from ocean-going vessels entering and departing Pyeongtaek
and Dangjin ports for one month. Among them, the CO2
emissions were estimated and analyzed for ocean-going
vessel operated within the emission control areas (ECAs) of
Pyeongtaek and Dangjin ports stipulated by the Vessel
Traffic Service System being operated by the Korea Coast
Guard.
- 504 -
ACKNOWLEDGMENT
This work was supported by Korea Institute of Planning
and Evaluation for Technology in Food, Agriculture and
Forestry(IPET) through Livestock Industrialization
Technology Development Program(or Project), funded by
Ministry of Agriculture, Food and Rural Affairs(MAFRA).
(322102-03)
REFERENCES.
[1] Johansson L, Jalkanen J-P, Kukkonen J., “Global assessment of
shipping emissions in 2015 on a high spatial and temporal resolution”,
Atmospheric Environment, 167:403-15, 2015
[2] EEA, “EMEP/EEA Air Pollutant Emission Inventory Guidebook
2016: technical guidance to prepare national emission inventories”,
EEA-Report:21, 2016
[3] Kwon Y, Lim H, Lim Y, Lee H., “Implication of activity-based vessel
emission to improve regional air inventory in a port area”,
Atmospheric Environment, 203:262-70, 2019
[4] Kwon Y., “Study on the Air Quality Impact of Shipping Fine Dust
Emission and Its Inventory Methodology in a Port-City”, Graduate
School, Incheon National University, 2019
[5] IMO, “Fourth IMO Green House Gas Study, 2020”, International
Maritime Organization, 2020
[6] Lee Y., “Study on the applicability of AIS-based ship air emission
inventory methodology”, Graduate School, Incheon National
University, 2021
[7] 국가미세먼지정보센터, “2019 년 국가 대기오염물질 배출량”,
2022
[8] 해양경찰청 전국 VTS 센터, “평택항 VTS 관제구역도”
[9] 이희관, 임효지, 이용찬, “항만 대기오염 배출 관리 장치 및
방법”, 등록 특허 10-2300919, 2021
- 505 -
Development of a Waste Plastic Energy
Resource System by Integrating Pyrolysis and
High-Temperature Reduction Processes
Abstract— As plastic consumption increases worldwide, the continuous waste plastic pyrolysis process were investigated,
amount of waste plastic generated tends to increase, and (2) the possibility of hydrogen production was confirmed by
accordingly, appropriate recycling methods are urgently high-temperature reduction treatment of black carbon, which
needed. Currently, more than half of waste plastics are is a residue among the produced materials, (3) Finally, the
landfilled or incinerated, but diversification of recycling carbon reduction amount was calculated during the pyrolysis
methods is being carried out due to environmental problems. treatment compared to the incineration of the existing waste
Therefore, in this study, performance evaluation and by- plastics
product utilization methods were studied for the continuous
pyrolysis method, which is a chemical recycling method among
waste plastic recycling methods. For the study, a 100 kg/d
continuous waste plastic pyrolysis device was constructed and
operated 24 hours a day, 5 times. As a result of the study,
2. MATERIAL AND METHODS
59.3±1.2% of pyrolysis oil, 16.8±0.8% of black carbon,
16.3±1.5% of non-condensable gas, and 7.6±0.7% of 2.1 Waste plastic
wastewater were generated during the pyrolysis of waste
plastic. In addition, as a result of performing calorific value
The raw material of waste plastic used in this study was 5
and hydrogenation for resource recycling of generated black mm size waste plastic generated from crushing and crushing
carbon, the high calorific value was 4,391.3 Kcal/kg and the facilities. The table 1 below shows the raw material
low calorific value was 4,063.3 Kcal/kg. was found to be able to composition of waste plastics in the relevant crushing and
produce 13.20 L/min (19.01 Nm3/d). In addition, it is thought crushing facilities.
that it is possible to reduce about 16.0% of carbon emissions
per year when the pyrolysis method is applied compared to
incineration. (Abstract)
TABLE1. COMPOSITION OF WASTE PLASTIC
Keywords— Waste plastic, Continuous pyrolysis, Pyrolysed polyethylene
oil, Black carbon, Hydrogen production (key words) polyethylene polypropylene polystyrene
terephthalate Others
(PE) (PP) (PS)
(PET)
1. INTRODUCTION
Due to the increase in plastic consumption worldwide, 39.6% 27.5% 18.9% 9.7% 4.3%
more than 300 million tons of waste plastics are generated
every year, but despite efforts for recycling, more than half of
them are not collected and are landfilled or incinerated in the
form of waste [1]. Currently, the most discharged plastics can 2.2 Configuration of continuous pyrolysis experiment
be classified into polyethylene (PE), polypropylene (PP), equipment
polyvinyl-chloride (PVC), polyethylene terephthalate (PET),
and polystyrene (PS) [2]. Recycling methods for these waste The main components of the continuous pyrolysis
plastics include (1) a method of mechanically recycling process for waste plastics are divided into the input part, the
recovered waste plastics by sorting them, (2) manufacturing continuous pyrolysis process, the specific gravity separation
them in the form of R.P.F (refuse plastic fuel) or R.D.F process, and the condensation process. The processing
(refuse derived fuel) and thermally processing them in steel capacity per hour of the continuous pyrolysis process was
mills or incinerators. (3) chemical methods that produce fuels 4.17 kg/hr, and it was manufactured in a lab-pilot scale
and chemicals through processes such as pyrolysis or capable of processing 100 kg per day and used for the
gasification [3]. Pyrolysis, a chemical recycling method, is a experiment. The input of raw materials to the continuous
method of producing liquid oil that can be used as fuel from pyrolysis furnace was fed in a fixed amount through a screw,
plastic, that is, pyrolysis oil, through a chemical reaction in and the heating of the pyrolysis device was maintained at a
which waste plastic is reduced and converted into low- constant temperature around 350 ~ 400 ℃ using thermal oil.
molecular compounds under medium-temperature anoxic In addition, a specific gravity screening process was used to
conditions in the range of 400 to 600 °C [4]. . In this study, remove the wax component contained in the pyrolysis oil
(1) the composition and yield of products generated in the vapor, and the wax component was put into the pyrolysis
- 506 -
process again and the apparatus was configured with a 3. RESULT
structure in which it was discharged as black carbon. The
condensation process is a device for recovering liquid oil by 3.1 Composition and content of pyrolysis products
cooling the vapor to below 60 ° C. A water bath is used to
circulate the cooling water. Figure 1 below shows a
schematic diagram of the experimental device, Table. 2 3.1.1 Pyrolysis oil production and wastewater generation
summarizes the operating conditions of the experimental In order to confirm the production of pyrolysis oil
device. generated in the continuous pyrolysis process of waste
plastics, 5 repeated experiments were conducted. The input
amount of waste plastic is 100 kg/d, and about 66.9±0.9 kg/d
of liquid oil was produced during a total of 5 experiments.
The amount of separated wastewater was confirmed to be 7.6
kg/d, and about 11.4% of the liquid oil produced was
generated as wastewater. The average amount of pyrolysis oil
in liquid oil was 59.3 ± 1.2 kg/d, and about 60% of pyrolysis
oil was produced compared to the input amount of 100 kg/d.
picture below. Figure 3 shows the amount of liquid oil,
wastewater, and pyrolysis oil produced in the condensation
process according to repeated experiments.
Operating Time hr 24
- 507 -
TABLE3. ELEMENTAL COMPOSITION OF BLACK CARBON TABLE4. COMPOSITION OF NON-CONDENSIBLE GAS
식(2)
C + H2O = CO + H2 ; △H = 31.4 Kcal/mol 식(3)
- 508 -
emissions from incineration and pyrolysis based on 100 tons
of waste plastic. It is considered that if 100 tons of waste
plastic is treated by pyrolysis, greenhouse gas emissions can REFERENCE
be reduced by about 16.0% compared to incineration. [1] OECD, Improving Plastics Management: Trends, Policy Responses,
and The Role of International Co-operation and trade, Environ. Policy,
20, 2018.
[2] S. Abalansa, B. El Mahrad, G. K. Vondolia, J. Icely, and A. Newton,
TABLE5. COMPARISON OF GREENHOUSE GAS REDUCTION INCINERATION The marine plastic litter issue: A social-economic analysis,
AND PYROLYSIS
Sustainablility, 12, 1-27, 2020.
Globla Warming [3] PWMI, An introduction to plastic recycling, Plastic Waste
Division Incineration Pyrolysis Management Institute, 1-33, 2019.
Potential
[4] D. Czajczynska, T. Nannou, L. Anguilano, R. Krzyzynska H. Ghazal,
N. Spencer, and H. Jouhara, Potentials of pyrolysis processes in the
1. By the waste plastic recycling methods
waste management sector, Energy Procedia, 123, 387-394, 2017.
CO2 emission 15,382.4 tCO2/yr 12,936.6 tCO2/yr -
N2O emission
445.8 tCO2/yr 374.9 tCO2/yr 310
(Exchange the CO2)
4. CONCLUSION
The conclusions obtained through the experiment of the
100 kg/d continuous waste plastic pyrolysis device are as
follows.
(1) The materials and contents produced when waste
plastic is pyrolyzed in a continuous manner were confirmed
as pyrolysis oil 59.3±1.2%, black carbon 16.8±0.8%, non-
condensable gas 16.3±1.5%, and wastewater 7.6±0.7%.
(2) Black carbon generated in the pyrolysis process was
treated at high temperature and reduced to produce hydrogen,
which is energy, to be used as a resource. It is considered that
the final hydrogen gas can be produced at 13.20 L/min
(19.01 Nm3/d) when 16.8 kg/d of black carbon is subjected
to high-temperature reduction treatment.
(3) As a result of calculating carbon emissions in
accordance with the IPCC guidelines in order to confirm the
carbon reduction during pyrolysis compared to incineration,
which is the main treatment method for waste plastics, it is
estimated that about 20,119.1 tCO2 of CO2 is emitted
annually during incineration, and pyrolysis It is expected to
reduce carbon emissions by about 16.0% per year compared
to incineration treatment with about 16,928.7 tCO2 per year.
ACKNOWLEDGMENT
This work was supported by Korea Institute of Planning
and Evaluation for Technology in Food, Agriculture and
Forestry(IPET) through Livestock Industrialization
Technology Development Program(or Project), funded by
Ministry of Agriculture, Food and Rural Affairs(MAFRA).
(322102-03)
- 509 -