You are on page 1of 280

Proceedings of Papers

Serbia, Niš, September 10 - 12, 2020


2020 55th International Scientific Conference on Information, Communication and
Energy Systems and Technologies (ICEST)

Serbia, Niš, September 10 - 12, 2020

Proceeding of Papers

Editors: Prof. Dr. Nebojša S. Dončov


Prof. Dr. Zoran Ž. Stanković
Dr. Biljana P. Stošić

Technical Support: Dr. Biljana P. Stošić

Published by: Institute of Electrical and Electronics Engineers (IEEE)


Faculty of Electronic Engineering, University of Niš, Serbia

Printing of this edition has been financially supported by


Ministry of Education, Science and Technological Development of Republic of Serbia

Number of copies printed: 50

IEEE Catalog Number: CFP20UWE-PRT


ISBN: 978-1-7281-7142-5 (IEEE)

Copyright and Reprint Permission: Abstracting is permitted with credit to the source. Libraries are
permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in
this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the
code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For reprint
or republication permission, email to IEEE Copyrights Manager at pubs-permissions@ieee.org. All rights
reserved. Copyright ©2020 by IEEE.
Dear Colleagues and ICEST Friends,

On behalf of the Technical Program Committee and Organizing Committee, it is a great pleasure for me to
announce that the 55th International Scientific Conference on Information, Communication and Energy
Systems and Technologies - ICEST 2020 conference was held on-line from 10th to 12th September,
2020. The Conference is jointly organized by the Faculty of Electronic Engineering, Niš, Serbia; the
Faculty of Telecommunications, Sofia, Bulgaria, and by the Faculty of Technical Sciences, Bitola,
Macedonia.

Due to COVID-19 issue ICEST 2020 Conference was moved from beginning of July to the beginning of
September hoping that the situation should resolve by then. After deep considerations and wishes of the
whole organization team for doing it live at least in some form, we found that the only responsible
behavior of organizers is to move ICEST 2020 to a fully virtual on-line conference.

The decision was based not only on safety issue, as we believed that we could handle it by using the
measures to reduce the risks to minimum, it is rather based on the uncertainty where the situation may
escalate and cause various and difficult problems for attendees.

As to the earlier ICEST Conferences, many authors from institutions all over the Europe submitted their
papers. This year, 60 papers have been accepted for on-line presentation.

I hope that all participants had taken opportunities not only to exchange their knowledge, experiences and
ideas but also to make contacts and establish further collaboration.

I hope that we will meet live again at the next ICEST Conference.

Prof. Dr. Nebojša Dončov,


ICEST 2020 Conference Chair
organized by

University of Niš
Faculty of Electronic Engineering
Serbia

Technical University of Sofia


Faculty of Telecommunications
Bulgaria

University "St. Kliment Ohridski", Bitola


Faculty of Technical Sciences
North Macedonia

under auspices of
• Ministry of Education, Science and Technological Development of the
Republic of Serbia

in cooperation with
• Serbia and Montenegro IEEE Section
• IEEE Bulgarian Section
• IEEE Republic of Macedonia Section
TECHNICAL PROGRAM COMMITTEE

Chair:
Nebojša Dočov University of Niš, Serbia

Vice-chairs:
Kalin Dimitrov Technical University of Sofia, Bulgaria
Mitko Kostov University St.Kliment Ohridski, Bitola, Macedonia

Honorary Chairs:
Bratislav Milovanović Singidunum University, Niš, Serbia
Rumen Arnaudov Technical University of Sofia, Bulgaria
Cvetko Mitrovski St. Kliment Ohridski University, Bitola, Macedonia

Local Coordinators:
Dragan Mančić Dean of the Faculty of Electronic Engineering, University of Niš, Serbia
Ilia Iliev Dean of the Faculty of Telecommunications, Technical University of Sofia,
Bulgaria
Stojanche Nusev Dean of the Faculty of Technical Sciences, St. Kliment Ohridski University,
Bitola, Macedonia

Members:
Agata Manolova Technical University of Sofia, Bulgaria
Biljana Stošić University of Niš, Serbia
Boyanka Nikolova Technical University of Sofia, Bulgaria
Brian Barsky University of California, Berkeley, USA
Chrysostomos Stylios Technological Education Institute of Epiros, Greece
Đani Juričić Jožef Stefan Institute, Slovenia
D.D. Rasolomampionona Warsaw University of Technology, Poland
Dimitar Taskovski Ss. Cyril and Methodius University Skopje, Macedonia
Dimiter Alexandrov Lakehead University, Canada
Dragan Denić University of Niš, Serbia
Dragan Stojanović University of Niš, Serbia
Dušanka Bošković University of Sarajevo, Bosnia and Herzegovina
Eduard Ivanjko University of Zagreb, Croatia
Evelin Krmac University of Ljubljana, Slovenia
Evelina Pencheva Technical University of Sofia, Bulgaria
Fernando Alvarez University of Extremadura, Spain
Filiz Güneş Yildiz Technical University, Turkey
Ismail Altas Karadeniz Technical University, Turkey
Ivan Corbev Ss. Cyril and Methodius University Skopje, Macedonia
J.A.R.P. de Carvalho University Beira Interior, Portugal
Jair Minoro Abe Paulista University, Brazil
Jan Machac Czech Technical University, Prague, Czech Republic
Jugoslav Joković University of Niš, Serbia
Karel Raz University of West Bohemia, Czech Republic
Kazumi Nakamatsu University of Hyogo, Japan
Ljupčo Trpezanovski St. Kliment Ohridski University Bitola, Macedonia
Mariofanna Milanova University of Arkansas at Little Rock, USA
Metodija Atanasovski St. Kliment Ohridski University Bitola, Macedonia
Mikolaj Bartłomiejczyk Gdańsk University of Technology, Poland
Mikolaj Leszczuk AGH University of Science and Technology, Poland
Nikola Donato University of Messina, Italy
Pece Mitrevski St. Kliment Ohridski University Bitola, Macedonia
Pero Latkoski Ss. Cyril and Methodius University Skopje, Macedonia
Petar Popovski Aalborg University, Denmark
Peter Planinšič University of Maribor, Slovenia
Slavko Rupčić University of Osijek, Croatia
Stanimir Valtchev New University of Lisbon, Portugal
Stefan Stancescu Polytechnic University of Bucharest, Romania
Stevo Bozinovski South Carolina State University, USA
Szilvia Nagy University of Gyor, Hungary
Urban Burnik University of Ljubljana, Slovenia
Uwe Siart Technical University of Munich, Germany
Vincenzo Piuri University of Milan, Italy
Wojciech Krzysztofik Wroclaw University of Technology, Poland
Wojtek Bock University of Ottawa, Canada
Zdenka Babić University of Banja Luka, Bosnia and Herzegovina
Zoran Jovanović University of Niš, Serbia
Zoran Stanković University of Niš, Serbia

CONFERENCE ORGANIZING COMMITTEE

Chairs:
N. Dončov University of Niš, Serbia
K. Dimitrov Technical University of Sofia, Bulgaria
M. Kostov St. Kliment Ohridski University, Bitola, Macedonia

Local Coordinators:
D. Mančić University of Niš, Serbia
I. Iliev Technical University of Sofia, Bulgaria
S. Nusev St. Kliment Ohridski University, Bitola, Macedonia

Technical Editor:
Z. Stanković University of Niš, Serbia

Secretary:
B. Stošić University of Niš, Serbia

Members:
A. Atanasković University of Niš, Serbia
T. Dimitrijević University of Niš, Serbia
J. Joković University of Niš, Serbia
D. Mančić University of Niš, Serbia
N. Maleš-Ilić University of Niš, Serbia
Z. Marinković University of Niš, Serbia
V. Marković University of Niš, Serbia
M. Milijić University of Niš, Serbia
O. Pronić-Rančić University of Niš, Serbia
B. Veselić University of Niš, Serbia
L. Stoimenov University of Niš, Serbia
J. Milošević University of Niš, Serbia

L. Laskov Technical University of Sofia, Bulgaria


A. Mihaylova Technical University of Sofia, Bulgaria
S. Antonov Technical University of Sofia, Bulgaria
V. Stoynov Technical University of Sofia, Bulgaria
D. Mihaylova Technical University of Sofia, Bulgaria
K. Valkov Technical University of Sofia, Bulgaria
N. Hristova Technical University of Sofia, Bulgaria
D. Kireva-Mihova Technical University of Sofia, Bulgaria
T. Brusev Technical University of Sofia, Bulgaria
M. Todorov Technical University of Sofia, Bulgaria
K. Raynova Technical University of Sofia, Bulgaria
K. Stoyanova Technical University of Sofia, Bulgaria
M. Stoyanova Technical University of Sofia, Bulgaria
M. Nedyalkova Technical University of Sofia, Bulgaria
V. Dolapchieva Technical University of Sofia, Bulgaria

M. Atanasovski St. Kliment Ohridski University, Bitola, Macedonia


B. Arapinoski St. Kliment Ohridski University, Bitola, Macedonia
G. Janevska St. Kliment Ohridski University, Bitola, Macedonia
V. Dancevska St. Kliment Ohridski University, Bitola, Macedonia
N. Mojsovska St. Kliment Ohridski University, Bitola, Macedonia
J. Pargovski St. Kliment Ohridski University, Bitola, Macedonia
M. Spirovski St. Kliment Ohridski University, Bitola, Macedonia
I. Andreevski St. Kliment Ohridski University, Bitola, Macedonia
D. Koltovska St. Kliment Ohridski University, Bitola, Macedonia

CONFERENCE SECRETARIAT
Address:
ICEST 2020 Conference
University of Niš
Faculty of Electronic Engineering
Aleksandra Medvedeva 14
18000 Niš, Serbia
phone: +381 18 529 105, 529 302, 529 303
fax: +381 18 588 399
e-mail: icest@elfak.ni.ac.rs

CONFERENCE INTERNET SITE

For further information, please visit the Conference Internet Site: http://www.icestconf.org
LIST OF ICEST 2020 REVIEWERS

Dr. Aleksandar Atanasković Dr. Marija Milijić


University of Niš, Serbia University of Niš, Serbia

Prof. Dr. Blagoja Arapinoski Prof. Dr. Nenad Milošević


University "St. Kliment Ohridski", Bitola, University of Niš, Serbia
North Macedonia
Prof. Dr. Nebojša Mitrović
Prof. Dr. Metodija Atanasovski University of Niš, Serbia
University "St. Kliment Ohridski", Bitola,
North Macedonia Assist. Prof. Jelena Nikolić
University of Niš, Serbia
Prof. Dr. Milan Bebić
University of Belgrade, Serbia Prof. Dr. Tatjana Nikolić
University of Niš, Serbia
Prof. Dr. Dejan Ćirić
University of Niš, Serbia Nenad Petrović
University of Niš, Serbia
Dr. Tijana Dimitrijević
University of Niš, Serbia Assist. Prof. Bane Popadić
University of Novi Sad, Serbia
Prof. Dr. Nebojša Dončov
University of Niš, Serbia Prof. Dr. Nikola Rendevski
University "St. Kliment Ohridski", Bitola,
Dr. Danijel Djošić North Macedonia
University of Priština, Kosovska Mitrovica, Serbia
Prof. Dr. Blagoj Ristevski
Prof. Dr. Vassil Guliashki University "St. Kliment Ohridski", Bitola,
Bulgarian Academy of Sciences, Sofia, Bulgaria North Macedonia

Filip Filipović Assist. Prof. Ivanovitch Silva


University of Niš, Serbia Universidade Federal do Rio Grande do Norte,
Natal, Brazil
Prof. Dr. Siniša Ilić
University of Priština, Kosovska Mitrovica, Serbia Prof. Dr. Emiliano Sisinni
University of Brescia, Brescia, Italy
Prof. Dr. Aleksandar Jevremović
Singidunum University, Belgrade, Serbia Prof. Dr. Zoran Stanković
University of Niš, Serbia
Prof. Dr. Zoran Jovanović
University of Niš, Serbia Prof. Dr. Dragan Stojanović
University of Niš, Serbia
Prof. Dr. Mitko Kostov
University “St. Kliment Ohridski", Bitola, Dr. Biljana Stošić
North Macedonia University of Niš, Serbia

Prof. Dr. Zlatica Marinković Prof. Dr. Dragan Tasić


University of Niš, Serbia University of Niš, Serbia

Prof. Dr. Vera Marković Prof. Dr. Mladen Veinović


University of Niš, Serbia Singidunum University, Belgrade, Serbia

Prof. Dr. Dejan Milić Assist. Prof. Ivan Vulić


University of Niš, Serbia University of Defence, Belgrade, serbia
TABLE OF CONTENTS
COMPUTER SYSTEMS AND INTERNET TECHNOLOGIES I

Regular papers:
CIT1.1 PIC Microcontroller Module in a Flexible Microprocessor Development System ................................... 3
Valentina Rankovska and Goran Goranov
Technical University of Gabrovo, Faculty of Electrical Engineering and Electronics, Bulgaria
CIT1.2 Efficient Discovery of Bent Function using Reed-Muller Subsets ............................................................ 7
Miloš Radmanović
University of Niš, Faculty of Electronic Engineering, Serbia
CIT1.3 Multilayer Long Short-Term Memory (LSTM) Neural Networks in Time Series Analysis...................... 11
Nemanja Malinović, Bratislav Predić and Miloš Roganović
University of Niš, Faculty of Electronic Engineering, Serbia
CIT1.4 Computer Visualization of Geometry of Polynomial Roots ..................................................................... 15
Ivan Petković and Petar Rajković
University of Niš, Faculty of Electronic Engineering, Serbia
CIT1.5 Continuous 2D Maps Based on Spherical Cube Datasets ....................................................................... 19
Aleksandar Dimitrijević and Peter Strobl*
University of Niš, Faculty of Electronic Engineering, Serbia
*European Commission, DG Joint Research Centre, Ispra, Italy
CIT1.6 Simulation Environment for Optimal Resource Planning during COVID-19 Crisis ............................... 23
Nenad Petrović
University of Niš, Faculty of Electronic Engineering, Serbia
CIT1.7 Tackling the COVID-19 Conspiracies: The Data-Driven Approach.......................................................... 27
Nenad Petrović
University of Niš, Faculty of Electronic Engineering, Serbia

COMPUTER SYSTEMS AND INTERNET TECHNOLOGIES II

Regular papers:
CIT2.1 Augmented and Virtual Reality Web Applications for Music Stage Performance ................................. 33
Nenad Petrović
University of Niš, Faculty of Electronic Engineering, Serbia
CIT2.2 The Application of Search Engine Optimization in Internet Marketing ................................................... 37
Aleksandar Andonov
University of Library Studies and Information Technologies, Faculty of Information Studies, Sofia, Bulgaria
CIT2.3 Improving the Concept of Medication Vending Machine in the Light of COVID-19 and other
Pandemics ..................................................................................................................................................... 42
Dragan Janković, Aleksandar Milenković and Andjelija Djordjević
University of Niš, Faculty of Electronic Engineering, Serbia
CIT2.4 Smart Health Services for Epidemic Control ............................................................................................. 46
Aldina Avdić, Ulfeta Marovac and Dragan Janković*
State University of Novi Pazar, Serbia
*University of Niš, Faculty of Electronic Engineering, Serbia
CIT2.5 Syntax Analysis of Serbian Language using Context-free Grammars.................................................... 50
Teodora Djordjević and Suzana Stojković
University of Niš, Faculty of Electronic Engineering, Serbia

I
CIT2.6 Signaling in 4G/5G with NB-IoT Support in 5G Option 3 .......................................................................... 54
Martina Janakieska, Pero Latkoski and Vladimir Atanasovski
Ss. Cyril and Methodius University, Faculty of Electrical Engineering and Information Technology, Skopje,
North Macedonia
CIT2.7 Supervision and Monitoring System of the Power Line Poles using IIoT Technology ......................... 58
Miloš Djordjević, Jana Vračar and Aleksandra Stojković
University of Niš, Faculty of Electronic Engineering, Serbia

ENGINEERING EDUCATION

Regular papers:
EE.1 Low Cost Laboratory Environment for the Use of Optical Methods for Transmission of Audio
Signals ........................................................................................................................................................... 65
Tsvetan Valkovski and Kalin Dimitrov
Technical University of Sofia, Faculty of Telecommunications, Bulgaria
EE.2 IMA-NET: Innovative e-Management Platform for Academic Network ................................................... 69
Galia Marinova and Krisel Tola
Technical University of Sofia, Faculty of Telecommunications, Bulgaria
EE.3 Expert Tool for Filter Design Program Selection in Online-CADCOM Platform ..................................... 73
Ognyan Chikov and Galia Marinova
Technical University of Sofia, Faculty of Telecommunications, Bulgaria
EE.4 Analysis of Pulse Code Modulation in MATLAB/Octave Environment ................................................... 77
Lyubomir Laskov, Veska Georgieva and Kalin Dimitrov
Technical University of Sofia, Faculty of Telecommunications, Bulgaria
EE.5 Model of Project-Based Learning Platform ................................................................................................ 81
Ava Chikurteva and Denis Chikurtev
Institute of Information and Communication Technologies, Bulgarian Academy of Sciences, Sofia, Bulgaria
EE.6 Practical Methods for Teaching of Solar Cell Characterization ............................................................... 85
Nikola Mitrović and Milan Stojanović
University of Niš, Faculty of Electronic Engineering, Serbia
EE.7 Servo-system Design for Arduino Due Based Laboratory Platform ....................................................... 89
Marija Filipović, Snežana Djordjević, Vladimir Mitić and Boban Veselić
University of Niš, Faculty of Electronic Engineering, Serbia
EE.8 Reception of Audio Signals Received from Different Angles by Optical Methods ................................ 93
Tsvetan Valkovski
Technical University of Sofia, Faculty of Telecommunications, Bulgaria

ENERGY SYSTEMS AND EFFICIENCY I

Regular papers:
ESE1.1 Application of Neural Networks for Short Term Load Forecasting in Power System of North
Macedonia ..................................................................................................................................................... 99
Goran Veljanovski, Metodija Atanasovski, Mitko Kostov and Pande Popovski
St. Kliment Ohridski University, Faculty of Technical Sciences, Bitola, North Macedonia
ESE1.2 Fuzzy Multiple Linear Regression for the Short Term Load Forecast .................................................. 102
Andrija Petrušić and Aleksandar Janjić
University of Niš, Faculty of Electronic Engineering, Serbia
ESE1.3 Power Load Forecast for North Macedonia using Machine Learning................................................... 106
Pande Popovski, Mitko Kostov, Metodija Atanasovski and Goran Veljanovski
St. Kliment Ohridski University, Faculty of Technical Sciences, Bitola, North Macedonia

II
ESE1.4 K-Nearest Neighbor Regression for Forecasting Electricity Demand .................................................. 110
Metodija Atanasovski, Mitko Kostov, Blagoja Arapinoski and Mile Spirovski
St. Kliment Ohridski University, Faculty of Technical Sciences, Bitola, North Macedonia
ESE1.5 MATLAB Simulation of Grid-Connected Photovoltaic System .............................................................. 114
Pande Popovski, Natasa Mojsoska and Blagoja Stevanovski
St. Kliment Ohridski University, Faculty of Technical Sciences, Bitola, North Macedonia
ESE1.6 Influence of Reduction Factors on High Voltage Cables on the Transfer of Potentials in the
Network ....................................................................................................................................................... 119
Nikolce Acevski, Angela Micevska and Ana Manivilovska
St. Kliment Ohridski University, Faculty of Technical Sciences, Bitola, North Macedonia
ESE1.7 Evaluation of Reliability of Power Substations Considering the Uncertainty of the Distributed
Generation ................................................................................................................................................... 123
Atanas Iliev, Dimitar Dimitrov and Natasha Dimishkovska
Ss. Cyril and Methodius University, Faculty of Electrical Engineering and Information Technologies, Skopje,
North Macedonia
ESE1.8 Reduction of Energy and Power Losses in Distribution Network Using Energy Storage
Systems ....................................................................................................................................................... 127
Nikola Krstić
University of Niš, Faculty of Electronic Engineering, Serbia

ENERGY SYSTEMS AND EFFICIENCY II


Regular papers:
ESE2.1 Design and Regulation of the HF Inverter for Contactless Power Transfer Systems ......................... 133
Nikolay Madzharov and Desislav Iliev
Technical University of Gabrovo, Faculty of Electrical Engineering, Bulgaria
ESE2.2 Analysis of Electromagnetic Characteristics of Asynchronous Induction Machine ........................... 137
Igor Sterjovski, Blagoja Arapinoski, Metodija Atanasovski and Vesna Ceselkovska
St. Kliment Ohridski University, Faculty of Technical Sciences, Bitola, North Macedonia
ESE2.3 Comparison of Methods for Control of Linear Induction Motors .......................................................... 141
Bojidar Markov and Diana Markova*
University of Food Technologies, Plovdiv, Bulgaria
*IT Academy, Plovdiv, Bulgaria
ESE2.4 The Cost of Indecision in Energy Efficiency. A Cost of Opportunity Analysis for an Industrial
Consumer .................................................................................................................................................... 145
Ioan-Sevastian Bitir Istrate, Cristian Gheorghiu and Miruna Castravete
POLITEHNICA University of Bucharest, Faculty of Power Engineering, Romania

SIGNAL PROCESSING I
Regular papers:
SP1.1 The Effects of Coefficient Quantization on New CIC FIR Filters ........................................................... 151
Biljana Stošić
University of Niš, Faculty of Electronic Engineering, Serbia
SP1.2 Improvement of Energy Efficiency of PAM Constellation by Applying Optimal Companding
Quantization in Constellation Designing ................................................................................................. 155
Slobodan Vlajkov, Aleksandra Jovanović and Zoran Perić
University of Niš, Faculty of Electronic Engineering, Serbia
SP1.3 The Influence of Compression Parameter μ on the Energy Efficiency of PAM Constellation
Based on μ-law Companding Quantization ............................................................................................. 159
Slobodan Vlajkov, Aleksandra Jovanović and Zoran Perić
University of Niš, Faculty of Electronic Engineering, Serbia

III
SP1.4 How Initialization is Related to Deep Neural Networks Generalization Capability:
Experimental Study .................................................................................................................................... 163
Ljubinka Sandjakoska and Frosina Stojanovska*
University of Information Science and Technology “St. Paul the Apostle”, Faculty of Computer Science and
Engineering, Ohrid, North Macedonia
*Ss. Cyril and Methodius University, Faculty of Computer Science and Engineering, Skopje, North
Macedonia
SP1.5 Using Neural Networks Application for the Font Recognition Task Solution ...................................... 167
Oleksii Bychkov, Kateryna Merkulova, George Dimitrov*, Yelyzaveta Zhabska, Iva Kostadinova*,
Pepa Petrova*, Pavel Petrov**, Iglika Getova* and Galina Panayotova*
Taras Shevchenko National University of Kyiv, Ukraine
*University of Library Studies and Information Technologies, Sofia, Bulgaria
**University of Economics, Varna, Bulgaria

SIGNAL PROCESSING II

Regular papers:
SP2.1 Adaptive 3D Interpolation of Images ........................................................................................................ 173
Rumen Mironov
Technical University of Sofia, Faculty of Telecommunications, Bulgaria
SP2.2 Noise Adaptive Wiener Filtering of Images.............................................................................................. 177
Lora Petkova and Ivo Draganov
Technical University of Sofia, Faculty of Telecommunications, Bulgaria
SP2.3 Along-Track and Cross-Track Noise Analysis of Minimal Curvature on Mars Orbiter Laser
Altimeter Data ............................................................................................................................................. 181
Nicole Christoff and Agata Manolova
Technical University of Sofia, Faculty of Telecommunications, Bulgaria
SP2.4 Analysis for Watermark in Medical Image using Watermarking with Wavelet Transform and
DCT .............................................................................................................................................................. 185
Stoyan Kushlev and Rumen Mironov
Technical University of Sofia, Faculty of Telecommunications, Bulgaria

MICROWAVES, ANTENNAS AND PROPAGATION

Regular papers:
MAP.1 On the Gas Sensing Properties of Microwave Transducers .................................................................. 191
Giovanni Gugliandolo, Mariangela Latino*, Giuseppe Campobello**, Zlatica Marinković***,
Giovanni Crupi**** and Nicola Donato**
Istituto Nazionale di Ricerca Metrologica - INRIM, and Politecnico di Torino, Italy
*University of Messina, MIFT Department, Italy
**University of Messina, Department of Engineering, Italy
***University of Niš, Faculty of Electronic Engineering, Serbia
****University of Messina, BIOMORF Department, Italy
MAP.2 Artificial Neural Network Modeling of Interdigital Capacitor Sensor for Oxygen Detection ............... 195
Zlatica Marinković, Giovanni Gugliandolo*, Mariangela Latino**, Giuseppe Campobello***,
Giovanni Crupi**** and Nicola Donato***
University of Niš, Faculty of Electronic Engineering, Serbia
*Istituto Nazionale di Ricerca Metrologica - INRIM, and Politecnico di Torino, Italy
** University of Messina, MIFT Department, Italy
***University of Messina, Department of Engineering, Italy
****University of Messina, BIOMORF Department, Italy

IV
MAP.3 Analysis of Dual Band PA Nonlinear Performances by Application of Digital Linearisation
Model ........................................................................................................................................................... 199
Aleksandar Atanasković, Aleksandra Djorić and Natasa Maleš-Ilić
University of Niš, Faculty of Electronic Engineering, Serbia
MAP.4 Design of Asymmetrical Slot Antenna Array in Corner Reflector .......................................................... 203
Marija Milijić and Branka Jokanović*
University of Niš, Faculty of Electronic Engineering, Serbia
*Institute of Physics, University of Belgrade and the Academy of Engineering Sciences of Serbia, Serbia
MAP.5 Radar Antenna Array Designing for Unmanned Aerial Vehicles (UAV)................................................. 207
Ivaylo Nachev and Peter Petkov
Technical University of Sofia, Faculty of Telecommunications, Bulgaria
MAP.6 Design of well-matched Microwave Slot Antenna on a Flat Metal Grounded Plate using Neural
Model ........................................................................................................................................................... 211
Zoran Stanković, Nebojša Dončov, Biljana Stošić, Maja Sarevska*, Ivan Milovanović**
University of Niš, Faculty of Electronic Engineering, Serbia
*AUE-FON University Skopje, North Macedonia
**Singidunum University, Educational Center Niš, Serbia
MAP.7 An Automatic System for Antenna Radiation Pattern Measurement .................................................... 216
Ilia Iliev and Ivaylo Nachev
Technical University of Sofia, Faculty of Telecommunications, Bulgaria
MAP.8 Inverse Reading of ITU-R P.1546 Propagation Curves for the Broadcast Transmitter EM Field
Level ............................................................................................................................................................ 220
Miloš Radojković, Olivera Pronić Rančić* and Zlatica Marinković*
Energoprojekt Entel, Belgrade, Serbia
*University of Niš, Faculty of Electronic Engineering, Serbia
MAP.9 GPU-Enabled Simulation of a Combined Macrodiversity System in Gamma-Shadowed
Nakagami-m Fading Channel .................................................................................................................... 224
Nenad Petrović, Dejan Milić, Suad Suljović, Samir Koničanin and Selena Vasić*
University of Niš, Faculty of Electronic Engineering, Serbia
* Metropolitan University, Faculty of Information Technology, Belgrade, Serbia

MEASUREMENTS, CONTROL SYSTEMS AND ICT

Regular papers:
ECI.1 Measurement and Analysis of PM Particles Emitted by Automotive Brakes ....................................... 231
Emil Iontchev, Rosen Miletiev*, Rumen Yordanov* and Ilian Damyanov*
Higher School of Transport, Bulgaria
*Technical University of Sofia, Faculty of Telecommunications, Bulgaria
ECI.2 Investigation of the Method of RMS Measurement Based on Moving Averaging ............................... 235
Anna Kostina, Plamen Tzvetkov* and Andrey Serov
National Research University “Moscow Power Engineering Institute”, Russia
*Technical University of Sofia, Faculty of Automatics, Bulgaria
ECI.3 Monitoring of Air Pollution in Skopje in order to Determine Possible Causes .................................... 239
Vladimir Mijakovski and Monika Lutovska*
University "St. Kliment Ohridski", Faculty of Technical Sciences, Bitola, North Macedonia
*"Mother Teresa" University, Faculty of Technical Sciences, Skopje, North Macedonia
ECI.4 Load Disturbance Rejection in Hydro Turbine Control Based on Wiener Filtering ............................. 244
Teofana Puleva and Elena Haralanova
Technical University of Sofia, Faculty of Automatics, Bulgaria
ECI.5 Multi-Objective LMI Based Robust State-Feedback Design of a Hydro Generator Speed
Controller .................................................................................................................................................... 248
Andrey Yonchev and Teofana Puleva
Technical University of Sofia, Faculty of Automatics, Bulgaria

V
ECI.6 Impact of Microclimate Changes and Noise to Workers as a Part of an Implemented Health
and Safety System ...................................................................................................................................... 252
Ivo Kuzmanov and Roberto Pašić
St. Kliment Ohridski University, Faculty of Technical Sciences, Bitola, North Macedonia
ECI.7 Hardware Implementation and Comparison of CRA and TRA when Trying to Recover the
AES-128 Key ................................................................................................................................................ 256
Ivaylo Vladimirov, Desislava Nikolova and Zornitsa Terneva
Technical University of Sofia, Faculty of Telecommunications, Bulgaria
ECI.8 Software Implementation of CRA and TRA to Recover the AES-128 Key using Side-Channel
Signals with Python3 ................................................................................................................................. 259
Desislava Nikolova, Ivaylo Vladimirov and Zornitsa Terneva
Technical University of Sofia, Faculty of Telecommunications, Bulgaria

VI
COMPUTER SYSTEMS
AND INTERNET TECHNOLOGIES I
PIC Microcontroller Module in a Flexible Microprocessor
Development System
Valentina V. Rankovska1 and Goran D. Goranov2
Abstract – A microcontroller module with a PIC18 II. MICROPROCESSOR DEVELOPMENT SYSTEM
microcontroller has been designed and implemented. It contains
all the components in addition to the microcontroller, necessary
for its operation as a microprocessor core in embedded systems
The main purpose in designing the microprocessor
for real applications. development system has been for it to be flexible and
The microcontroller module is the smaller size and different relatively versatile, because various microcontrollers with
microcontroller compared to the widely used Arduino Uno. different characteristics, functionalities and microprocessor
Sample algorithms and software has been designed to test the cores are studied: 8- and 32-bit; with simpler or advanced
module within the microprocessor system for which it was capabilities; with PIC, AVR, ARM processor cores.
primary intended in order to prove its correct operation. That is why it provides the possibility various replaceable
microcontroller modules to be used, which are with a
Keywords – Microprocessor development system,
minimum set of peripherals (preferably open source) and one
Microcontroller module, PIC18, Development tools.
and the same form factor (Fig. 1). That is possible because,
due to the rapid spread of the Arduino platform, presently
I. INTRODUCTION there is a large variety of development boards compatible with
it. This minimalist approach is even adopted by companies
Nowadays microcontrollers and embedded systems are that manufacture microcontrollers and development tools
almost everywhere in our everyday life. Modern based on ARM cores.
microcontrollers are powerful, versatile, low-cost, reliable,
low-consumption tools for solving various tasks in the field of
automation, control, entertainment etc.
That is the reason to increase the number of the courses
related to microcontrollers in the new Bachelor degree
curriculum of "Industrial and Automotive Electronics" at the
Technical University of Gabrovo: Microprocessor Circuits,
Industrial and Automotive Interfaces, Embedded Systems,
Intelligent Electronic Systems. Furthermore various types of
microcontrollers according to their features, efficiency,
parameters, etc. are studied. This necessitates the use of a Fig. 1. Block diagram of the microprocessor development system
variety of hardware and software development tools, which in uCM - Microcontroller Module; DM - Demonstration Module; M -
turn complicates and makes it more expensive the learning Motors; LM - LED Matrix; К - Keypad; PS - Power Supply
process. That is why an approach is preferred applying unified
and flexible tools that can be easily reconfigured according to The other main part of the development system, in addition
the specific application. to the microcontroller module, is the multifunctional
As a part of that process, a development microprocessor demonstration module, which includes a set of peripheral
system for educational purposes was designed [1]. After that, devices (input/ output, actuators, etc.), often applied in
it was completed with other tools, among which the embedded systems: buttons, LEDs, seven-segment and liquid
demonstration module, presented in [2]. crystal displays, drivers for low power and stepper motors,
Section II describes briefly the above two boards. In relays, etc. The block diagram of the demonstration module is
Section III the designed microprocessor module is presented. shown in Fig. 2.
It contains a PIC18 microcontroller and is intended to be used
with the development system. Some test results are also given.
III. THE DESIGNED PIC18 MICROCONTROLLER
MODULE
1Valentina V. Rankovska is with Technical University of Various development boards can be mounted on the
Gabrovo, Faculty of Electrical Engineering and Electronics, Hadzhi development system, for instance Arduino Uno (with 8-bit
Dimitar 4, 5300 Gabrovo, Bulgaria, E-mail: rankovska@tugab.bg microcontroller with AVR processor core), PIC32-Pinguino-
2Goran D. Goranov is with Technical University of Gabrovo,
OTG (with 32-bit microcontroller with MIPS processor core),
Faculty of Electrical Engineering and Electronics, Hadzhi Dimitar 4, Nucleo L476RGT6 (with 32-bit microcontroller with ARM
5300 Gabrovo, Bulgaria, E-mail: g_goranov@tugab.bg processor core), etc.

978-1-7281-7142-5/20/$31.00 ©2020 European Union 3


Table I
MAIN FEATURES OF PIC18(L)F2X/45K50 MICROCONTROLLERS

A crystal oscillator 20MHz supplies an external clock,


Fig. 2. Block diagram of the demonstration module (DM in Fig. 1)
although the microcontroller can operate with an internal
PS - Power Supply; B - Breadboard; - D&I - Display and oscillator too (31 kHz to 16 MHz).
Indication; ID - Input Devices; D - Drivers; R - Relays; A reset button is connected to the MCLR pin, the latter also
EC - Expansion Connectors used for programming voltage.
As the board is designed for educational, not hobby
Much less common are similar development boards with purposes, it is not provided for it to work with simple
PIC microcontrollers, mostly 32-bit ones. That is why a integrated environments such as Arduino IDE, Pinguino IDE,
microcontroller board, based on 8-bit PIC18 microcontroller etc. That is why there is not a bootloader in the
is designed. Figs. 3 and 4 show respectively its electrical microcontroller and programming could be made only using
circuit and a photograph. common in-circuit debugger/programmer, such as PICkit3/4
via a special single row female header, connected to the
corresponding pins of the microcontroller.
V-USB is the internal power voltage regulator output,
supplying a positive voltage for the USB module. It should be
connected to ground through a ceramic capacitor with a low
value and operating voltage not less than 16V.
The module uses stable 5V power supply, provided either
via dedicated pins, or through the USB-micro B connector.
The latter option is more suitable for the lab classes
(depending on the overall load): we could supply the system
from a PC, a battery, an adapter, provided they supply at least
500mA DC current.
All the general purpose pins of the microcontroller are
connected to two single row female headers, thus making
them accessible by the external parts of the system.
Fig. 3. Electrical circuit of PIC18 microcontroller module
IV. TESTING THE OPERATION OF THE
MICROCONTROLLER MODULE

Sample algorithms and programs have been designed in


order to test the operation of the microcontroller unit. They
will be used also in laboratory classes by the students to study
the operation of the internal microcontroller peripheral
modules and their implementation in embedded systems.
The Microchip’s integrated development environment
MPLAB X IDE v5.20 and the free version of the C compiler
Fig. 4. Photograph of PIC18 microcontroller module ХС8 v2.05 have been used for the design of the software.
The programming has been made with the in-circuit
The suggested module represents a microcontrollercore debugger PICkit4 [4].
with the minimum necessary components to operate. The Saleae logic analyzer, operating with free software, has
The main component is PIC18F25K50. It is an 8-bit been used to test the sample programs in real time (Fig. 5). It
microcontroller with advanced functionality and improved is 8-channel, with sample frequency of up to 24 MHz, and
architecture (in comparison to PIC16 and older PIC18). It is connects to a PC via USB [5].
suitable for educational and development purposes because of Some of the programs use the CCP modules in various
a variety of peripheral blocks. In addition to the “traditional” modes of operation; the ADC; the serial interface blocks, etc.
and often used modules, like analog to digital converter, For instance, Fig. 6 presents the format of the sent ASCII
timers, capture/comare/PWM modules, serial interface blocks, codes of the letters of the word “Hello”, by EUSART module
etc., it has also a Digital-to-Analog Converter (DAC), USB in asynchronous mode. The algorithm is simple, and interrupts
module, SR latch, a set of internal oscillators, etc. are used to receive and transmit data.
The main features of PIC18(L)F2X/45K50 microcontrollers
are summarized in Table I [3].

4
Fig. 5. Logic Analyzer Saleae

In other example, the voltage on a desired analog pin of the


microcontroller is measured and the value is converted and
sent to a 128x64 Dot Matrix OLED display (Organic Light-
Emitting Diode) [6]. The microcontroller communicates with
the displayvia I2C interface, implemented by the MSSP
(Master Synchronous Serial Port) module.
The overall algorithm includes the following user functions:
• The main function, which algorithm is shown in Fig.7;
• ADC_Init (Fig. 8), ADC_Start, ADC_AutoTrigger,
ADC_Interrupt (Fig. 9), which configure the ADC,
initiate the conversion, define an automatic conversion,
and read the converted value in an interrupt;
• OLED_Init, OLED_Command, OLED_Clear,
OLED_Send (Fig. 10): configure the display, send a
command to it, clean the display and send data/
command to it;
• I2C_Init, I2C_Start, I2C_Stop, I2C_Transmit,
I2C_Wait: configure I2C module, start and stop its
operation, send data, wait to complete sending of the
data;
• Interrupt_Enable and __interrupt(low_priority)
IRQ_Handler: first enables the interrupt and the second
is the handler for all the types of interrupts.
Figs. 11 and 12 illustrate a part of the communication Fig. 7. Main function algorithm Fig. 8. ADC_Init function
between the microcontroller and OLED display. The green algorithm
dots in Fig. 11 denote the “Start” conditions, initiating the
communication, and the red dot denotes the “Stop” condition.
A larger scale of the data framing is shown in Fig. 12. ACKNOWLEDGEMENT
The present paper is supported by the Science Research
V. CONCLUSION Fund at the Ministry of Education and Science under contract
№2002E/2020.
A microcontroller module has been designed and
implemented, which, in addition to the microcontroller itself,
contains also all the components necessary for its operation as REFERENCES
a microprocessor core in an embedded system.
The microcontroller module is the smaller size compared to [1] V. Rankovska, S. Rankovski, „Microprocessor Development
the widely used Arduino Uno. However, it is based on widely System Applying a Multifunctional Demonstration Board“,
spread PIC18 microcontroller. ICEST 2019, Conference Proceedings, Ohrid, North Macedonia,
pp. 414-417, 2019.
It is primary intended to be used as a part of the [2] V. Rankovska, S. Rankovski, „Multi-functional Demo Module
microprocessor development system, presented in [2]. The for Microprocessor Development Systems for Educational
proper operation of the module is tested using sample Purposes“, ET2018, Conference Proceedings, Sozopol,
algorithms and software in C programming language and Bulgaria, pp. 55-58, 2018.
software and hardware development tools, applied in teaching [3] PIC18(L)F2X/45K50. 28/40/44-Pin, Low-Power, High-
Microprocessor circuits for Bachelor degree students in Performance Microcontrollers with XLP Technology. Microchp
Industrial and automotive electronics. Technology Inc., 2014.
[4] https://www.microchip.com/developmenttools/ProductDetails/P
G164140
[5] https://www.saleae.com/
[6] 128x64 Dot Matrix OLED/PLED Segment/Common Driver
with Controller. Solomon Systech Limited, 2008.

5
Fig. 9. Algorithm of the function, servicing ADC Interrupts

Fig. 10. Algorithm of the function, sending the data to the OLED

Fig. 6. Waveforms of ЕUSART operation in asynchronous mode

Fig. 11. Waveforms of MSSP operation in I2C mode at communication between the microcontroller and the OLED display

Fig. 12. A larger scale of the waveforms, shown in Fig. 11, showing the parameters of the clock

6
Efficient Discovery of Bent Function Using
Reed-Muller Subsets
Miloš Radmanović
Abstract – Bent functions are functions that have the biggest 2 n Walsh coefficients. Even for small number of function
distance from all linear binary functions. Attacks against variables, this computation requires a lot of processing time
cryptosystems can be defeated when these systems use bent
functions. Generalisation of bent functions is still unknown and
[4]. Therefore, different techniques for discovery of bent
when they have many variables, it is very difficult to find them. functions become very popular. They are mostly based on the
Therefore, the construction of bent functions is done by using reduction of the discovery time [5]. In the present paper I study
discovery of them within a subset of functions. Thus, this paper bent functions using a representation by Reed-Muller (RM)
describes a method for creating groups of functions in Reed- spectral coefficients.
Muller (RM) domain within which efficient detection of bent Reed-Muller spectral transforms have many applications in
functions is performed. As follows, the search space for discovery synthesis, verification, and testing of logic circuits, processing
is limited, and it can be defined for various subsets of Boolean techniques and signal encoding [6], and in many other areas
functions. Experimental results confirm that the time required [7]. For practical applications, the computation of RM spectral
for discovery of bent function when using RM subsets are
smaller than when using general random discovery.
transform needs to be efficient. The fast Reed-Muller spectral
transform algorithm reduces computational complexity from
Keywords – Cryptography, Binary function, Bent construction, O(N2) to O(Nlog2N). This algorithm is derived from Fast
Reed-Muller subsets. Fourier Transform (FFT) algorithm and it is very effective tool
in various applications. This algorithm has also been
developed for parallel computations with shared memory and
I. INTRODUCTION with distributed memory.
Using restrictions of bent function algebraic degree, some
Bent functions are binary functions having the biggest authors [8], and [9] proposed bent functions discovery by
possible Hamming distance from the set of linear functions. using the RM spectrum and related normal form which is in
Thus, bent functions have the highest possible nonlinearity. related literature also called the algebraic normal form [10].
These functions are the core of many cryptographic systems Previous research on discovering of these functions in RM
thanks to their ability to provide secure communication. They domain is discussed for example in [11], [12]. The efficiency
have applications in a variety of such systems, like hash of a multicore CPU parallel algorithm for random bent
functions and block and stream chippers. Therefore, the study function discovery in RM domain is presented in [13]. Parallel
of bent functions for cryptography is essential for secure computing on manycore GPUs also enables parallel
communication in the future. processing on commodity hardware. GPU parallel algorithm
The discovery of cryptographically useful bent functions is a for bent function discovery in RM domain is presented in
difficult task. As the number of variables in a binary function [14].
increases, bent functions become extremely rare in the set of Note that, for functions with 4 variables, number of
all possible binary functions. Bent functions are possible only possible non-zero coefficients in RM spectra varies from 2 to
when the number of variables is even. Furthermore, the precise 11, and there are 896 bent functions., Also, for binary
generalization of bent functions is still unknown. Also, the functions with 4 variables, the search space length is 55
formal method for their construction does not exist. Thus, in functions for RM spectra with 2 non-zero coefficients, and
the last years, many researches are developed a lot of methods 462 for RM spectra with 6 non-zero coefficients. For binary
for construction of bent functions using algebraic [1], functions with 6 variables, the search space length is
combinatorial [2], and heuristic techniques [3]. These methods 538,257,874,440 for RM spectra with 21 non-zero
can be complex, computationally intensive, difficult to coefficients. (the number of the possible non-zero coeffi-
implement, and also do not always produce a sufficient variety cients). Computation time is often a limiting parameter for
of bent functions. practical applications of discovering of bent functions in RM
The absolute values of all Walsh coefficients of bent domain.
functions are equal and it is the most common characterization Therefore, discovery of bent functions certainly needs
for them. All coefficients have the absolute value 2 n / 2 , where reduction of the search space by using some restrictions. Thus,
n is number of binary function variables. Consequently, bent it is presented an efficient technique for discovery of bent
function testing requires computation and comparison of all functions using RM subsets. RM subsets are based on the
restrictions of the number and order of RM coefficients for
The author is with the University of Niš, Faculty of Electronic bent functions. There are vertical, horizonal and grid subsets
Engineering, Aleksandra Medvedeva 14, 18000 Niš, Serbia, E-mail: of binary functions depending on different restrictions of bent
milos.radmanovic@elfak.ni.ac.rs functions in RM domain, [15]. As follows the search space for

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 7


discovery is limited and it is different for various predefined functions is an open problem and it is known the lower and
subsets of Boolean functions. upper bounds in respect to [3].
Experimental results confirm that the described technique A n-variable Boolean function in (1,−1) encoding is called
for efficient discovery of bent functions using RM subsets bent if all elements of the Walsh spectrum vector S f ,W have
shows better computational performance over performing the
random discovering. This method is investigated using the equal absolute value 2 n / 2 [16].
different subsets in RM domain. The number of computations For example, for a bent function f of 4 variables, given by
exponentially increases in relation to the function size. truth vector:
Accordingly, experiments were done with benchmark
F = [1,1,0,0,1,1,1,1,1,0,0,1,0,1,0,1] .
T
functions from 6 to 10 variables. (7)
The Walsh spectrum, in matrix notation, with (1,-1) encoding
II. BACKGROUND THEORY of function truth vector, can be calculated as S f ,W = W (4) F ,
where W ( 4) is Walsh transform matrix of order 4, and result
If a function f and its Reed-Muller spectrum S f , in matrix is:
S f ,W = [- 4,4,-4,-4,4,-4,-4,-4,-4,-4,-4,4,4,4,-4,4] ,
T
notation, are represented by vectors F = [ f 2 n −1 ,, f1 , f 0, ]T (8)
and S f = [ s 2n −1 ,, s1 , s0 ]T respectively, the positive polarity It should be noticed that absolute values of all Walsh
RM transform is defined by the positive polarity RM matrix coefficients is equal to 4.
RM (n) [16]: RM form of previous example of bent function is:
f = 1 ⊕ x3 ⊕ x2 x3 ⊕ x`1 x4 ⊕ x`1 x2 . (9)
S f = RM (n) F , (1)
Note that the algebraic degree is less or equal to value 2.
f ( x0 , x1 ,, xn ) = X (n) S f , (2) The orders of RM coefficients are related with the positions of
these coefficients in the RM spectrum [5]. This characteristic
where is widely used in discovery of bent function in RM domain.
n
There are various subsets of bent functions whose
X (n) = ⊗[ 1 xi ] (3) formation is based on function characteristics and additional
i =1
conditions. For example, one of the most important subset of
and bent functions is subset of quadratic bent functions. All
quadratic bent functions are known and they can be
n
RM (n) = ⊗ RM (1) , (4) constructed by using the affine transformation of the function
i=1 variables [6]. The general drawback of this subset is that this
subset contains very small number compared to the total
1 0 number of bent functions. Many subsets of bent functions
RM (1) =  , (5)
1 1 have this drawback. Therefore, in this paper it expermented
with subsets in RM domain.
where ⊗ is the Kronecker product, addition and multiplication In RM domain, set of all bent functions can be splitted
are in modulo 2, RM (1) represents the basic positive RM relative to 3 different criteria using different properties of
transform matrix. Note that RM (1) is self-inverse in nature. RM-spectra [17]. The number of non-zero RM coefficients
defines vertical RM subset. The order of nonlinearity defined
The FFT computing algorithm can be used to compute the as maximaum number of variables in a product term
coefficients in RM spectrum. This algorithm is composed of corresponding to a non-zero RM coefficient and it defines the
the “butterfly” operations which are repeated and have horizontal RM subset. Both, the number of non-zero RM
structure derived from the basic transform matrices [16]. coefficients and the order of nonliearity defines grid RM
Similar, in the Hadamard ordering, the Walsh spectral subsets [15]. The main objective is to investigate the
transform matrix of order n, denoted by W (n) , is defined as discovery of bent functions in each of these subsets.
[16]: A subset V(k) of bent functions is called Vertical k-subset
if all bent functions in this subset has k RM coefficients not
n 1 1  equal to 0 [15]. The number of variables defines possible V
W ( n) = ⊗ W (1), W (1) =  . (6)
i =1
1 − 1 subsets [15] for bent functions.
For example, for given 4-variables bent functions:
The set of bent functions is very small compared to the set of
all Boolean functions. As noticed above, bent functions exist f1 = 1 ⊕ x1 x2 ⊕ x3 x4 , (10)
for an even number of variables, and the exact number of bent
functions with -variables is known only for small n. In and
literature the number of bent functions was computed using f 2 = x4 ⊕ x1 x2 ⊕ x1 x4 , (11)
super-computers only for . The general number of bent
have same number of non-zero Reed-Muller coefficients and
they are in the same subset (3).

8
A subset H(kmin, kmax) of bent functions is called the functions. Optionally it also takes the min and max parameter
Horizontal (kmin, kmax)-subset if all bent functions in this subset as range for order of the non-zero RM spectrum coefficients.
has order of RM coefficients not equal to 0 between values This max parameter should be less then maximal order of
kmin and kmax [15]. The values kmin and kmax need to be less than coefficients that is allowed for bent functions. The orders of
possible orders of non-zero RM spectrum coefficients for bent RM coefficients restrict the their positions in RM spectrum
functions. The number of variables defines possible H subsets [15].
for bent functions [15]. These restrictions ensure discovery possibility and
For example, for given 4-variables bent functions: conseqetily reduce the possible search space in RM domain
for bent function random discovery.
f1 = x1 x2 ⊕ x2 x4 ⊕ x1 x4 , (12) The bent testing of Walsh coefficient includes checking if
and the coefficient has the absolute value 2n/2, where n is function
f 2 = x1 x3 ⊕ x2 x4 , (13) size. Computation of Walsh coefficients in this algorithm use
fast Walsh spectral transform.
have only coefficients with order 2 and consequently they Note that, in the Boolean domain, bent testing is much
belong to the same subset (22). faster than in the RM domain since it does not include
A subset () of bent functions is called the creation of binary function from RM spectrum (step 6). The
Grid()-subset if all bent functions in this subset method for computation of binary truth vector from RM
has RM-coefficients not equal to 0 and has order of RM spectrum is also use the fast Reed-Muller transform.
coefficients not equal to 0 between values kmin and kmax [15].
The subsets of bent functions are the intersection of and IV. EXPERIMENTAL RESULTS
subsets [15]. Consequentially, the number of variables
defines possible G subsets for bent functions [15]. For experimental analysis, it is developed an
For example, for given 4-variables bent functions: implementation using C++ programming language of method
for the random discovery of bent functions in RM domain.
f1 = x1 x2 ⊕ x3 x4 , (14) Also it is developed an implementation of the discovery of
and bent functions using RM subsets. These experiments are done
on standard PC platform (CPU: 3.6 GHz, RAM: 12 GB).
f 2 = x1 x3 ⊕ x2 x4 , (15)
Table 1 shows computation performance of algorithm for
have same number of coefficients and all with order 2 and random discovery of bent function using the referent C++
consequently they belong to the same subset (2, 2, 2). implementation and the C++ implementation using RM
subsets. The presented computational times are given in
milliseconds. It is compared the computation time needed for
III. DISCOVERY OF BENT FUNCTIONS USING discovery of one bent function for entered number and/or
REED-MULLER SUBSETS order of non-zero coefficients in RM spectrum, in respect to
discovery of one bent function for random number and order
The algorithm for the discovery of bent functions using RM of non-zero coefficients.
subsets is given as Algorithm 1. Comparison of these numbers is motivated by decreasing
computation time when discovery use RM subsets. When the
Algorithm 1 number of non-zero coefficients is relatively small,
1: Set function size discovering of bent function is faster The proposed algorithm
2: Set the vertical subset parameters (min. and max number is implemented and experimentally tested for discovering bent
of the non-zero RM spectrum coefficients). function of 6, 8 and 10 variables in the RM domain. It is
3: Set the horiznatal subsets (min and max order of the non- compared with our previous algorithm for random discovering
zero RM spectrum coefficients). of bent functions in RM domain [12], [13], [14]. Note that, for
4: Set randomly the number of the non-zero RM the Boolean functions with large number of variables,
coefficients using vertical subsets restrictions. experiments were not presented, because the computation
5: Set randomly the positions of the non-zero RM time limit of 30 minutes is exceeded.
coefficients using horizontal subsets restrictions. Bent functions need to be non-deterministic if they are used
6: Create binary function. for cryptographic applications. In this case, when the number
7: Bent testing of all Walsh coefficients of the created and/or order are predefined, bent functions are not completely
function, if not passed go to the step 2. non-deterministic. Therefore, in practical applications, there is
8: Return bent function found. need for using various RM subsets with different number of
non-zero coefficients, as well as different orders.
The algorithm for the discovery of bent functions using RM It should be noticed that the computation times for
subsets takes the number of function variables n (function discovering bent functions using RM subsets of 6, 8, and 10
size) as its input. Optionally it takes as its input the min and variables for all 5 different tests are always smaller than using
max parameter as a range of number of non-zero RM the random discovery. Note that for the larger binary
spectrum coefficients. This max parameter should be less then functions, relative difference between computation times
maximal number of coefficients that is allowed for bent between tests is smaller in percentage.

9
TABLE I ACKNOWLEDGEMENTS
COMPUTATION TIME OF ALGORITHM FOR DISCOVERY OF BENT
FUNCTIONS USING REED-MULLER SUBSETS I would like to acknowledge to the Ministry of Education
and Science of the Republic of Serbia for funded the research
Num. of Computation time [ms] work in this paper, as a part of project III44006 (2011-2020).
function
exhaustive V(6) H(3,6) G(6,3,6)
variables
6 1.532 1.190 982 782 REFERENCES
6 1.512 1.244 876 791
[1] N. Y. Yu, G. Gong, “Constructions of Quadratic Bent Functions
6 1.526 1.116 855 804
in Polynomial Forms”, IEEE Trans. on Information Theory, vol.
6 1.529 1.321 943 756 52, no. 7, pp. 3291-3299, 2006.
6 1.538 1.181 911 772 [2] J. Seberry, X. Zhang, “Constructions of bent functions from two
8 1437 1015 739 648 known bent functions”, Australasian Journal of Combinatorics.
vol. 9, pp. 21-34, 1994.
8 1441 1047 832 633 [3] A. Grocholewska-Czurylo, J. Stoklosa, “Generating Bent
8 1439 986 815 696 Functions”, Proc. Advanced Computer Systems Eighth
8 1443 1211 794 642 International Conference, ACS 2001, pp. 361-370, Springer US,
Mielno, Poland, 2002.
8 1436 973 716 623
[4] P. Langevin, G. Leander, “Counting all Bent Functions in
10 25516 21233 19365 18745 Dimension Eight 99270589265934370305785861242880”,
10 25429 22648 19583 18573 Designs, Codes and Cryptography vol. 59, pp. 193-201, 2011.
10 25678 22751 19976 18459 [5] N. Tokareva, Bent Functions, Results and Applications to
Cryptography, Academic Press, 2015.
10 25577 21177 19023 18011
[6] M. A. Thornton, R. Drechsler, and D. M. Miller, Spectral
10 25433 21375 19856 19683 Techniques in VLSI CAD, Springer, 2001.
[7] T. Sasao, J. Butler, and M. Thornton, Progress in Applications
of Boolean Functions, Morgan and Claypool Publishers, 2010.
V. CONCLUSION [8] S. Mesnager, Bent Functions, Fundamentals and Results,
Springer International Publishing, 2016.
This paper proposes a technique for efficient discovery of [9] J. Climent, F. Garcia, and V. Requena, “On the Iterative
Boolean bent functions in Reed-Muller domain. The Construction of Bent Functions”, in: N. Mastorakis, A. Cecchi,
(eds.), Proc. 5th WSEAS Int. Conf. on Inf. Security and Privacy,
algorithm is based on the random discovery of RM spectrum
pp. 15-18. Stevens Point, Wisconsin, United States, 2006.
of bent function by using RM subsets. The technique is mainly [10] O. Logachev, A. Salnikov, and V. Yashchenko, Boolean
focused on the reduction of the discovery search time. RM Functions in Coding Theory and Cryptography, American
subsets are based on the restrictions of the number and/or Mathematical Society, 2012.
order of RM coefficients for bent functions. Using these [11] M. Radmanović, R. Stanković, “Discovery of Bent Functions in
restrictions in RM domain, there are vertical, horizonal and Fixed Polarity Reed-Muller Domain Using Dual Polarity
grid subsets of binary functions. Restrictions of number and/or Route”, Proc. 13th Int. Workshop on Boolean Problems, pp.43-
order of RM coefficients influence on the size of the search 59, Bremen, Germany, 2018.
space for bent functions in RM domain. [12] M. Radmanović, “Efficient Bentness Testing for Cryptographic
Function using Statistical Analysis of Binary Functions”, Proc.
The proposed algorithm is implemented and experimentally
ICEST 2019, vol. 1, pp. 187-190, Ohrid, Macedonia, 2019.
tested for discovering bent function of 4, 6 and 10 variables. It [13] M. Radmanović, R. Stanković, “Random generation of bent
is compared with our previous algorithm for random functions on multicore CPU platform”. Proc. ICEST 2016, pp.
discovering of bent functions in RM domain. Comparation 239-242. Ohrid, Macedonia, 2016.
includes the computation time needed for discovery of one [14] M. Radmanović, “Efficient Random Generation of Bent
bent function for the predefined number and/or order of non- Functions Using GPU Platform”, Proc. 12th Int. Workshop on
zero coefficients in RM spectrum (using vertical, horizonal Boolean Problems, IWSBP2016, Freiberg, Germany, 2016, pp.
and grid subsets), and time needed for discovery of one bent 167-173.
function for random number and order of non-zero [15] M. Radmanović, R. Stanković, “Construction of Subsets of Bent
Functions Satisfying Restrictions in the Reed-Muller Domain”,
coefficients
Facta Universitatis - Series: Electronics and Energetics, vol. 31,
Experimental results confirm that the time required for no. 2, pp. 207-222, 2018.
discovery of bent function when using RM subsets are smaller [16] M. G. Karpovsky, R. S. Stanković, and J. T. Astola, Spectral
than when using random discovery. It can be also seen that Logic and its Applications for the Design of Digital Devices,
proposed algorithm in RM domain significantly reduces Wiley, 2008.
search space for bent function discovery, which lead to [17] M. Radmanović, R. S. Stanković, “Subsets of Boolean Bent
discovery of bent functions that are not completely non- Functions in the Spectral Reed-Muller Domain”, Proc. 13-th
deterministic. Therefore, in practical application there is need Reed-Muller 2017 Workshop, pp. 33-39, Novi Sad, Serbia,
for using various RM subsets. 2017.
Future work will be on research for discovery of bent
functions using various other spectral domains, like Haar, or
Kronecker domains.

10
Multilayer Long Short-Term Memory (LSTM) Neural
Networks in Time Series Analysis
Nemanja S. Malinović1, Bratislav B. Predić2 and Miloš Roganović3
Abstract – Traditional methods that deal with time series sequence analysis and sequence generating are. Fig. 1
analysis problems are based on statistical models. The latest illustrates a multilayer RNN. An input vector sequence
methods that solve time series analysis problems are based on the = ( , ,…, passes through the stack of hidden layers
use of a special architecture of recurrent neural networks known with neurons first to compute the hidden vector sequence
as Long Short-Term Memory Networks. This paper presents
solutions that address the prediction of product sales on a
denoted as , ,…, where represents an
monthly basis. output of T-th neuron is n-th network layer. After passing the
last layer, on the output is generated predicted sequence
Keywords – Time series, Neural networks, Prediction, LSTM. = ( , ,…, . Each output vector is used to
parameterize a predictive distribution Pr( | ) for the next
possible outputs .
I. INTRODUCTION

Time series represents a phenomenon that describes events


of the same type that recur over a period of time with certain
characteristics. Some of the goals of a time series analysis are
sequence prediction, sequence classification and sequence
generating. Models used for describing time series are
numerous starting from simple statistical methods to the
modern neural network methods. This work will describe the
transition from the basic methods to the state of the art
methods like LSTM neural network. This work will give a
review of neural networks as a model for time series
forecasting focusing on LSTM neural networks architecture
and represent results of sales prediction of a product on a
product type and product category levels.
Fig. 1. Multilayer RNN (taken from [1])
II. NEURAL NETWORKS The skip connection from the inputs to all hidden layers
and from the all hidden layers to the output make a training
In analyzing time series with traditional statistical models as faster by reducing the number of processing steps between the
stochastic processes, there are problems such as missing bottom of the network and the top, and thereby mitigating the
values in a dataset, models often work only with univariate vanishing gradient problem [2] Activation of hidden layers can
data and data are assumed to have a linear dependence. For be calculated as
this purpose particularly good results are shown by a special
class of recurrent networks known as Long-Short Term neural , (1)
networks (LSTM). , (2)
where terms denote weight matrices, is hidden layer
A. Recurrent Neural Networks activation function, and Bias vectors are denoted as b. The
output sequence is computed as
Recurrent neural networks (RNN) represent a feed-forward
class of neural networks that find application in problems as ӯ ∑ , (3)
ӯ , (4)
1Nemanja S. Malinović is with University of Niš, Faculty of
Electronic Engineering, Aleksandra Medvedeva 14, 18000 Niš, where is the activation function of the output layer.
Serbia, E-mail: malinovicnemanja@elfak.rs Adjustment of connections weights can be performed using
2Bratislav B. Predić is with University of Niš, Faculty of Back Propagation (BP) algorithm or its advanced version Back
Electronic Engineering, Aleksandra Medvedeva 14, 18000 Niš, Propagation Through Time (BPTT) [3].
Serbia, E-mail: bratislav.predic@elfak.ni.ac.rs
3Miloš B. Roganović is with University of Niš, Faculty of

Electronic Engineering, Aleksandra Medvedeva 14, 18000 Niš,


Serbia, E-mail: milos.roganovic@elfak.ni.ac.rs

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 11


B. Exploding Gradient Problems

A Back Propagation is actually a propagated gradient


descent algorithm, where gradients are propagated backward.
Recurrent neural networks have exploding gradient problems
in learning a long time series. As explained by Hochreiter and
Schmidhuber [4], error propagation is determined by:
∑ …∑ ∏ . (5)
In Eq. (5), n represents number of non-input units (neurons),
q denotes the number of time steps for how far the error is
propagated from an arbitrary unit u to an arbitrary unit v, w is
a weight on the connection between connected units and
, f is activation function and is an input on
the unit . In case

1 (6) Fig. 2. Basic LSTM cell (taken from [4])


In Eqs. (8)-(11), j represents index of memory block, v is
for all m the largest product increases exponentially with q and
index of memory cell, denotes v-th cell in j-th memory
exploding gradient problem appears. In contrast, when
block and is the weight of connection from unit m to unit
0 (7) l. Cell input is defined as
∑ 1 . (12)
a vanishing gradient problem appears. Those problems cause
difficulties and weights adjustment of neural network With cell input and gate outputs defined in this way,
connections, especially for long time series with the great functions for cell state change and state output can be
value of q. represented as
0 0, (13)
C. Basic Architecture of Long Short-Term Memory
1 , t>0 , (14)
Recurrent neural networks behave badly with data that
contains long time dependencies. Standard RNN is not able to
remember old inputs. Long Short-Term Memory (LSTM) . (15)
neural networks overcome vanishing and exploding gradients Eq. (13) shows initial cell state and Eq. (14) is a function of
problems and have a memory which is used to deal with later changes. The output of the cell is explained in Eq. (15).
the problem of long time-dependent inputs. In calculation of next cell state and cell output g(x) and h(x)
For the first time, this type of architecture was presented in represent a central logistic sigmoid function. This design deals
the paper [4]. The basic design of memory cells contains input fine with vanishing gradient problem, but the output may
and output gate as shown in Fig. 2. become constant if the same sequence continues to come on
With this cell vanishing gradient problem is solved by the cell entrance, which happens because of h(x) saturation
keeping constant error flow in case of new signal absence. A that starts with the same value repeating on the cell exit.
cell contains state denoted as is affected by the cell input
signal and two input signals of gates, an input signal of
the input gate denoted as and signal which D. LSTM with Forget Gate
represents input signal for output gate.
Input gate activation for cell j at the moment t can be Paper [5] represents a solution to this problem by
calculated as introducing the new gate, forget gate. A function of this gate is
to reset memory blocks once their contents are out of date and
= (8) hence useless. The architecture of the LSTM cell with forget
gate is shown in Fig. 3.
with input of gate calculated as Input and output of the forget gate are calculated
∑ 1 . (9) as

Similarly, input and activation for the output gate are shown ∑ 1 , (16)
in Eqs. (10) and (11), respectively:
= . (17)
∑ 1 , (10)

= . (11)

12
A. Individual product sales

Data used for individual product sales forecasting contains


daily product sales in a shop for a period of 30 months. Sales
from the first 30 months are used as a training set and the last
three months make up the training set. The goal of a prediction
was to find a number of potentially sold product items for a
future month.
The architecture of the used neural network includes two
layers, the first ConvLSTM and the simple LSTM layer as the
second. Table I represents the loss and accuracy values of
individual product sales on a monthly base obtained on
training and validation set for different training parameters.

TABLE I
PRODUCT SALES PREDICTION
Fig. 3. LSTM cell with forget gate (taken from [4])
Time Tr. Tr. Val Val
Epochs Batch
steps Acc. Loss Acc Loss
A. ConvLSTM Cells 1000 6 32 96.77% 1.53 100% 0.02
1000 12 32 96.77% 1.53 100% 0.02
This type of cell is first shown in the paper [6]. The
4000 6 32 96.77% 1.52 100% 0.20
ConvLSTM determines the future state of a certain cell in the
4000 12 32 96.77% 1.53 100% 0.20
grid by the inputs and past states of its local neighbors. This
can easily be achieved by using a convolution operator in the 10000 6 32 96.77% 1.51 100% 0.20
state-to-state and input-to-state transitions. Gate outputs are 10000 12 32 96.77% 1.51 100% 0.20
now changed and before activation function is applied gate
inputs pass through convolution operator function Used time steps values are chosen with the assumption that
data owns periodicity on a semi-annual and annual basis.
= , (18) Higher values of training epochs are used to compare training
time values with time values of the network for category sales
= , (19)
prediction.
= . (20)
In Eqs. (18)-(20), function of convolution operator is A. Category Product Sales
represented as . According to [7], this modification ensures
spatial invariance of the unit. Considering the number of layers and type of layers, the
same architecture is used for a prediction of monthly sales on
III. FORECASTING OF SALES TIME SERIES a product category base. Table II shows the same model
parameters for monthly sales of the product category.
An application of LSTM neural networks for prediction of
sales time series is given in this section. Prediction is made on TABLE II
CATEGORY SALES PREDICTION
a dataset that can be found on Kaggle site [8]. The dataset
contains product sales information of several shops in the Epochs Steps Batch T. Ac. T.Los V.Ac. V.Los
period between January 2013 and November 2015. Sales
1000 6 32 86.67% 2.46 33.33% 0.15
information consists of a number of individual products sold
on a daily level in each of the shops. Products are also 1000 12 32 86.67% 2.82 33.33% 0.23
categorized into 84 different categories and there are 1256 4000 6 32 92.77% 2.41 66.66% 0.25
different products. Time series prediction solves problems of 4000 12 32 93.33% 1.54 66.66% 0.22
monthly sales for individual products and product categories 10000 6 32 96.67% 1.82 66.66% 0.31
in the single shop. 10000 12 32 96.67% 1.51 100% 0.21
Since the data are originally given in the form of daily sales
on item level, before training and testing processes data are Since data are aggregated on category level, bigger
grouped on a monthly level for a specific product or product fluctuations are present in monthly sale. More epochs are
category dependent on a problem that is solved. So the time needed by the network to achieve satisfactory prediction
step used in all architectures described below is a month. accuracy.

13
B. Models Parameters another proof that the LSTM network expresses especially
good results in solving this type of problem.
Parameters of trained models will be given in this section. This paper represents a rarely used architecture that
Training times are given in Table III. Since training time is includes the ConvLSTM layer as a part of the network. This
invariant with respect to the number of time steps, table layer is included with the idea to capture relations between
contains only results for 12 time steps. Time is measured in neighbors’ values which are given in successive monthly
seconds. sales before the LSTM layer. Also, the aim of this paper was
In Table IV are shown number of parameters per layer and to show the differences in the way of training models for
time as well as total number of parameters in network. The sales prediction at the product and category level. Since
batch size used in training was 32, as an optimizer is used fluctuations in the number of items sold on category level
Adam optimizer and mean squared error as a loss function. are greater than fluctuations in the product level conclusion
Created two layered LSTM network shows good prediction is that a larger number of epochs are necessary to cover and
results with high accuracy. The used dataset does not show learn all relations.
adrastic difference in semi-annual and annual seasonality
according to results.
REFERENCES
TABLE III
COMPARISON OF TRAINING TIMES [1] A. Graves, “Generating Sequences With Recurrent Neural
Networks”, ArXiv13080850 Cs, Jun. 2014, Accessed: Apr. 13,
Epochs Prediction type Time 2020. [Online]. Available: http://arxiv.org/abs/1308.0850
1000 Product 22.17s [2] Y. Bengio, P. Simard, and P. Frasconi, “Learning Long-Term
Dependencies with Gradient Descent is Difficult”, IEEE Trans.
1000 Category 12.63s Neural Netw., vol. 5, no. 2, pp. 157–166, Mar. 1994, doi:
4000 Product 76.26s 10.1109/72.279181
4000 Category 42.26s [3] J. Guo, “BackPropagation Through Time,” 2013.
[4] S. Hochreiter, J. Schmidhuber, “Long Short-Term Memory”,
10000 Product 205.74s MIT Press, Nov. 01, 1997, Accessed: Apr. 13, 2020. [Online].
10000 Category 114.76s Available:https://doi.org/10.1162/neco.1997.9.8.1735
[5] F. Gers, J. Schmidhuber, and F. Cummins, “Learning to Forget:
TABLE IV Continual Prediction with LSTM”, Neural Comput., vol. 12, pp.
NUMBER OF PARAMETERS PER LAYER 2451-2471, Oct. 2000, doi: 10.1162/089976600300015015
[6] S. Agethen, W. H. Hsu, “Deep Multi-Kernel Convolutional
ConvLSTM LSTM Dense Total LSTM Networks and an Attention-Based Mechanism for
layer layer layer Videos”, ArXiv190808990 Cs Stat, Jul. 2019, Accessed: Apr. 14,
25 4864 33 4922 2020. [Online]. Available: http://arxiv.org/abs/1908.08990
[7] X. Shi, Z. Chen, H. Wang, D.-Y. Yeung, W. Wong, and W.
Woo, “Convolutional LSTM Network: A Machine Learning
IV. CONCLUSION Approach for Precipitation Nowcasting”, ArXiv150604214 Cs,
Sep. 2015, Accessed: Apr. 14, 2020. [Online]. Available:
http://arxiv.org/abs/1506.04214
Compared to the solution given on Kaggle site [8],
[8] “Sales Forecast LSTM - 67% (Beginner-Friendly).”
the network presented in this paper has better accuracy. The https://kaggle.com/carmnejsu/sales-forecast-lstm-67-beginner-
time necessary for network training is longer and that can be friendly (accessed Apr. 14, 2020).
explained by network complexity. This neural network is

14
Computer Visualization of Geometry of Polynomial Roots
Ivan Petković1 and Petar Rajković2
Abstract – Using computer visualization, several results in the quality computer visualization enables entirely new and
field of geometry of polynomial roots are presented. This remarkable insights into a wide variety of disciplines, to
computational tool yields a new dimension and a deep insight mention some of them: architecture and engineering,
into properties of the geometry of polynomial roots and iterative biomedical applications (X-ray Computed Tomography (CT),
processes for finding polynomial roots, discovering at the same
Magnetic Resonance Imaging (MRI), above all), mathematics,
time new properties, quite beyond human abilities. More
generally, the presented communication demonstrates that physics, business and management graphics, education and
sophisticated computer graphics, transforming numerical data learning, user interface design, image syntheses, mapping and
into images, brings modern and novel perspectives of some cartography, video and multimedia technology (animation,
mathematical topics. movies, video games), vector graphics, 3D modeling, digital
image processing, visual arts and design, and so on. Let us
Keywords – Computer visualization, Computer graphics, emphasize that many problems in the mentioned topics are
Geometry of polynomial zeros, Analysis of root-solvers. still mission impossible for humans.
Computer graphics provides very fast and fruitful bridge
I. INTRODUCTION between computers and human beings. Simply, the
combination of technology and mathematics, supplied by
The aim of this paper is to present results of author's computer graphics, has numerous applications in theory and
investigation in the field of geometry of polynomial roots and practice at present and, certainly, a huge perspective in the
root-solvers using computer visualization. This is certainly future. G. David Kerlick [1] said that “... scientific (or
interesting and challenging theme since polynomials are a part mathematical, or engineering) visualization uses computer
of many problems of numerous scientific branches, such as graphics to make the results of analysis, experiment, and
applied mathematics, engineering disciplines, computer simulation accessible to humans via the visual system, thereby
science, physics, chemistry, astronomy, finance, health care, aiding insight into data. A series of case studies illustrate
social science, as well as many other fields of human situations in which visualization has led to new insights. In
activities. Undoubtedly, the use of computer visualization, particular, mathematicians got a powerful tool to visualize the
that actually transforms numerical data into 2D or 3D abstract objects and processes that arise in all branches of
pictures, provides modern and novel approach to some mathematical research.” Today, using computer graphics,
mathematical topics yielding a new dimension and a deep mathematicians are able not only to study the geometric
insight into properties and behaviour of iterative processes for aspects of many mathematical and engineering branches but
finding polynomial roots as well as distribution of the roots. also to discover new properties on various topics of
mathematics and construct new very efficient algorithms.
We end this section with the announcement of computer
II. COMPUTER VISUALIZATION scientists from Carnegie Mellon University (Pittsburgh) that
they developed a new type of computer visualization which
The advance of digital computer hardware and software has automatically turns complex mathematical equations and
had a dramatic influence on many scientific disciplines; at expressions into pictures. This is certainly a further important
present, computers play an increasingly central role in almost advance in the topic. The researchers will present their
every scientific discipline, including mathematics as well. Let software in July of 2020 at the SIGGRAPH (virtually)
us emphasize that many difficult problems in applied Conference on Computer Graphics.
mathematics and other scientific branches cannot be solved
without powerful computational tools, such as symbolic
computation and computer graphics. III. DISTRIBUTION OF ROOTS OF RANDOM
Rapid development of computer graphics during the last POLYNOMIALS
two decades provides scientists in many disciplines to use
sophisticated computer techniques in order to study and Algebraic polynomials whose coefficients are random
visualize phenomena which are not observable directly. High numbers are of great importance since they appear in various
problems of physics, engineering and economics such as
filtering theory, spectral analysis of random matrices,
1Ivan Petković is with University of Niš, Faculty of Electronic statistical communication, regression curves in statistics,
Engineering, Aleksandra Medvedeva 14, 18000 Niš, Serbia, E-mail: characteristic equations of random matrices, the study of
ivan.petkovic@elfak.ni.ac.rs random difference equations, the analysis of capital and
2Petar Rajković is with University of Niš, Faculty of Electronic
investment in mathematical economics. etc. For these reasons,
Engineering, Aleksandra Medvedeva 14, 18000 Niš, Serbia, E-mail: a number of books and papers have been devoted to the study
petar.rajkovic@elfak.ni.ac.rs

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 15


of random polynomials, see, e.g., [2], [3]. Working in the area this purpose we have performed a great number of numerical
of Experimental Mathematics, a new scientific discipline that experiments. Using graphical tools of Wolfram computational
spans numerical mathematics and computational techniques, system Mathematica, we have tested numerous random
we made use of graphical methods to visualize an important polynomials of various degrees. Our experiments confirmed
theorem on distribution of roots and pose a conjecture of the the assertion of Theorem 1.
symmetry of complex roots of random polynomials.
Denote a sequence of independently identically distributed Example 1. For demonstration, we present one experiment
(real or complex valued) random variables with } . Let involving a polynomial of degree 2000 with random
( )= + + ⋯+ + coefficients belonging to the interval −2,2 . From Fig. 1 we
be a random polynomial of degree with the roots a ,…, a . observe that almost all roots are located in the ring
Furthermore, for , (0 ≤ ≤ < ∞) introduce a | 1 − < | | < 1 + } where ≈ 0.01 which empirically
probability measure on the complex plane confirms Theorem 1 to a good extent. As an additional
( , ) = ( | ≤ |a | ≤ }), where (∙) denotes the consequence of our extensive experiment, we arrived at the
number of roots that belong to the ring | ≤ |a | ≤ } in assumption (in terms of convergence in probability) that the
the complex plane. Then / defines the empirical roots of random polynomials are symmetrically located with
distribution of roots of . If ∈ (0,1), respect to the coordinate origin. For now, this assumption
we define = 1 − , = 1 + , then is called delta remains an open problem.
measure in the empirical distribution.
IV. DYNAMIC STUDY OF ROOT-FINDING METHODS
The following theorem has been proved in [3]:
The growing development of computer graphics at the end
Theorem 1. If and only if
of the twentieth century have led to the advance of efficient
E (1 + | |) < ∞, methodology for visual study of convergence behaviour of
iterative methods for solving nonlinear equations. It turned out
then the sequence of the empirical distributions / that dynamic study, relied on basins of attraction, is a
converges to the delta measure at 1 almost surely, that is, powerful tool for realistic quality study of root-finding
1 methods. The basin of attraction is a kind of computer
(1 − , 1 + ) → 1, → ∞
visualization that provides visual insight into the convergence
holds for any ∈ (0,1). behaviour of root-finding methods. Actually, basins of
attraction are the sets of points in the complex plane which
In the above theorem E is mathematical expectation while the simulate the convergence to the roots of a given function
denotation → denotes so-called convergence in probability. under the chosen iterative process. They have brought
This theorem asserts that, under some weak constraints on the significant contribution to the topic due to the important data
coefficients of a random polynomial, almost all its roots and clear visual insight into the basic features of considered
“concentrate uniformly” close to the unit circle with high iterative methods, convergence behaviour and domain of
probability. convergence above all. In this way, we arrive at a fruitful
methodology for estimating quality of root-finding methods
and their ranking, which successfully replaces unreliable
methodologyfor ranking iterative methods based on
numerical examples.
First we give the definition of a basin of attraction.

Definition 1. Define a (convergent) root-finding iteration by


= ( )( = 0,1,2, … )
that involves sufficiently many timesdifferentiable function
in some complex domain ⊆ ℂ having simple or multiple
roots , , … , ∈ . Then the basin of attraction for the
root is defined as follows:

, ( )= ∈ |ℎ = ( ) ℎ
= }
Assume that we have found a rectangle
= − , } × − , } centered at the origin that contains all
roots of a given polynomial . The studied iterative method is
Fig. 1. Location of roots of random polynomial of degree 2000 tested on each of the × equally spaced points in the
rectangle which form an equidistant lattice . First, we
It is of interest to visualize the assertion of Theorem 1, define the limit number of iterations and then run iterative
which is typical subject of Experimental Mathematics. For process = ( ) starting from an initial point ∈ . If

16
the iterative process does not satisfy the given stopping
criterion | − | < ( defines the accuracy of
approximations, say, = 10 or = 10 ) in ≤
iterations, then such starting point is proclaimed “divergent.”
For each basin we record (i) average number of iterations (for
all points belonging to the lattice ) required to satisfy the
stopping criterion, (ii) CPU time in seconds for all
× points and (iii) the number of (proclaimed)
“divergent” points. The data (i)-(iii) provide deeper insight
into the behavior of an iterative method and its domain of
convergence. Obviously, a method is as better as the
consumed CPU time, the average number of iterations and
function evaluations per point, and the number of “divergent”
points are smaller. The best outcome is that the number of
divergent point is 0, which indicates the global convergence
of the considered method.
Furthermore, we associate different colors to different
basins of attraction in such a way that the shading is darker if
Fig. 2. Newton’s method Eq. (1)
the number of iterations is higher. Besides, we color starting
points which do not satisfy the stopping criterion after IT
iterations in black (so-called “divergent” points).
Convergence behavior of any method can be also estimated
to a certain extent according to the shape of basins of
attraction for the tested example.It is always preferable that
the basins of attraction for the roots have as large as possible
unvaried contiguous areas, separated by the boundaries that
have (approximately) straight-line form. The fewer blobs and
fractals on the boundaries also point to good convergence
properties.
To demonstrate the dynamic study of two iterative methods
for finding simple roots, we present a typical example using
equidistant lattice consisting of 360000 points, that is, the
resolution is 600×600. In this example the permitted number
of iterations is = 40, and the stopping criterion is given by
| − | < 10 = . Our aim is to compare two the most
frequently used root-solvers for approximating simple zeros,
Newton's method of the second order
( ) Fig. 3. Halley’s method Eq. (2)
= − (
( = 0,1, … ) (1)
)
According to the above data we conclude that Newton's
and Halley's method of the third order method Eq. (1) has considerably more divergent points (about
( ) ( ) 1.25%) than Halley's method Eq. (2) (less than 0.006%
= − ( ) ( ) ( )
( = 0,1, … ) (2) starting points). Halley's method Eq. (2) reaches the stopping
criterion using only 5.2 iterations (in average) against 10.5 for
Example 2. We have plotted two basins of attraction applying Newton's method Eq. (1) and consumes 58.16 seconds for all
the methods Eq. (1) and Eq. (2) to the polynomial 360000 starting points, which is considerably less than
( )= –1 Newton's method (110.6 seconds). Considering shapes of
and the square = = + | − 3 ≤ ≤ 3, −3 ≤ ≤ 3}. basins we observe that in both cases particular basins are of
The basins are given in Figs. 2 and 3. large unvaried size. However, the basins of Halley's method
Plotting these two basins of attraction we have recorded the Eq. (2) have mild advantage since their boundaries are almost
following useful data: straight lines (desirable property) and contains only few small
Newton's method Eq. (1) Halley's method Eq. (2) blobs, while the boundaries of basins of Newton's method Eq.
divergent point 4508 12 (1) have not only larger blobs but also fractal parts
average number of iteration 10.5 5.2 (undesirable property). The presented results clearly show that
CPU time (in sec) 110.6 58.16 Halley's method Eq. (2) is better than Newton's method
Eq. (1) regarding the most important convergence properties.
This fact could be surprising facts for many numerical
analysts who consider that Newton’s method is most suitable.

17
V. COMPUTER VISUALIZATION OF THE FLOW OF
ITERATIVE PROCESS

In most cases the most powerful methods for approximating


all polynomial roots are based on simultaneous calculation of
all roots. Estimating the quality of simultaneous root-finding
methods it turned out that so called empirical methodology
gives the most realistic ranking, see
Kalantari [4], Andreev et al. [6], and I. Petković and
Herceg [7]. In [7] the authors used empirical methodology
reducing it to the following quality criterion:“Among the set
of iterative methods for the simultaneous approximation of
polynomial roots, the best method is the one that attains the
required accuracy of approximations using the smallest CPU
time starting from the same set of initial approximations”.
Empirical methodology for simultaneous methods is based
on a huge number of experiments by measuring CPU times in
the presence of real conditions. These conditions assume the
choice of arbitrary initial approximations equidistantly spaced Fig. 4. Trajectories of approximations of polynomial roots
on a circle of radius of a disk that contains all roots of a
given polynomial. For demonstration, we present the
following example. VI. CONCLUSION
Example 3. We have considered Ehrlich-Aberth methods Using computer visualization, some results of author's
with Newton's corrections [8] for simultaneous determination investigation in the area of root-finding methods and
of simple zeros of a given polynomial P of degree distribution of polynomial roots are presented. They provide a
new and fruitful deep insight into the geometry of polynomial
( ) ( )
= − ( ) , (3) zeros and iterative processes, simultaneous discovering new
( ) ∑ ( ) ( ) ( ) ( )
properties of the considered topic and ranking roots-solvers.
/ The presented miraculous properties would be impossible for
humans without use of computer visualization.
where ∈ 1, … , } and = 0,1, … is the iteration index. It
was proved in [7] that this method is one of the best methods
for finding polynomial roots simultaneously. The method
REFERENCES
Eq. (3) has been applied to the “two-ring” polynomial
[1] G. David Kerlick, “Four Lectures on Computer Graphics and
( ) = ( + 7)( − 1)( − 5 ) of degree 21. Data Visualization”, Ch. 15 in: Relativity and Scientific
The complete flow of the iterative process is described by Computing, Springer, pp. 287-313, 1996.
trajectories composed of current approximations (marked by [2] A. T. Bharucha-Reid, M. Sambandham, Random Polynomials,
black points) starting from initial approximations Academic Press, 1986.
equidistantly spaced on a circle of a radius of a disk [3] I. Ibragimov, D. Zaporozhets, “On Distribution of Roots of
containing all roots of the given polynomial, see Fig. 4. Red Random Polynomials in Complex Plane”, arXiv:1102.3517v1
points in Fig. 4 denote the targeting roots. [math.PR] 17 Feb 2011.]
From Fig. 4 one can observe that all trajectories possess [4] B. Kalantari, Polynomial Root-Finding and Polynomiography,
World Scientific, New Jersey, 2009.
mainly regular paths; besides,approximations are directly
[5] I. Petković, Đ. Herceg, “Symbolic Computation and Computer
approaching the roots. They are almost radially distributed Graphics as Tools for Developing and Studying New Root-
and continuously gravitate towards the roots in the course of Finding Methods”, Appl. Math. Comput., vol. 295, no. 2, pp.
iterating. Starting from initial points (equidistantly spaced on 95-113, 2017.
the circle), the considered method converge (super) linearly [6] F. Andreev, B. Kalantari, and I. Kalantari, “Measuring the
but almost straightforwardly toward the roots, with rapid Average Performance of Root-Finding Algorithms and Imaging
accelerations at the end of iterative process (due to the it Through Polynomiography”, Proceedings of 17th IMACS
closeness to the target - the exact root). At the moment, there World Congress, Scientific Computation, Applied Mathematics
is no proof that these trajectories always possess this and Simulation, Paris, 2005.
[7] I. Petković, Đ. Herceg, “Computer Methodologies for
desirable straightforward behaviour. The proof is a
Comparison of Computational Efficiency of Simultaneous
challenging but very difficult open problem. Actually, the Methods for Finding Polynomial Zeros”, J. Comp. Appl. Math.,
proof would show that the considered method Eq. (3) is vol. 368, page 19, \# 112513, 2020.
globally convergent. The comparison and analysis of the form [8] A. W.M. Nourein, “An Improvement on two Iteration Methods
of trajectories of tested simultaneous methods can serve for for Simultaneous Determination of the Zeros of a Polynomial”,
the estimation of the quality of these methods. Internat. J. Comput. Math., vol. 6, no 3, pp. 241-252, 1977.

18
Continuous 2D Maps Based on Spherical Cube Datasets
Aleksandar M. Dimitrijević1 and Peter A. Strobl2
Abstract – This paper is one in a series of papers attempting to collecting all relevant features in a single 2D reference
popularize the application of cube-based Discrete Global Grid system. We propose a method for collecting and combining
Systems (DGGSs). To increase acceptability, a simple but all relevant map sections, regardless of the cube face they
effective implementation is proposed. The paper discusses the belong, according to the map creation parameters. The created
fundamental aspects of such an implementation and presents a
2D map is continuous, which means it can be traversed in all
continuous 2D map creation process, based on such systems.
directions without reaching the boundaries.
Keywords – Map, Discrete Global Grid System, Geographic The discussion starts with a brief history of cube-based
Information Systems, Spherical Cube. maps and GDGGSs, in the next section.

I. INTRODUCTION II. RELATED WORK

People have always needed to georeference, to determine The oldest preserved cube-based map dates back more than
their position in the space that surrounds them. Traditionally, two centuries ago. C. G. Reichard created a six-sheet atlas of
parts of the Earth's surface have been transformed into planar the whole world [5] in 1803, using a gnomonic projection.
maps because these were easier to produce and store and have Cube-based projections of the Earth returned to focus in the
proven to be very effective until there was a need to apply early 1970s. Sadourny [6] defined a class of conservative
them to the entire planet. The modern economy, trade, finite-difference approximations of the primitive equations for
science, and not the least military applications, with the use of quasi-uniform spherical grids derived from regular
high-resolution global data sets, require a much more efficient polyhedrons in 1972. The first feasibility study of a
global framework. In recent decades, the amount of collected quadrilateralized spherical cube Earth database system [7] was
data, obtained by satellite and aerial imaging, has further carried out by Chan and O’Neill only a few years later, for the
increased the need for efficient organization and standardized US Navy Department. They proposed a spherical cube map
representation to facilitate their exchange. These are the projection that, with some modifications, was extensively
conditions that led to the development of Discrete Global Grid used for the Cosmic Background Explorer (COBE) project at
Systems. NASA, more than a decade later. O'Neill and Laubscher [8]
Discrete Global Grid Systems are a class of spatial derived the exact equal-area sphere-to-cube mapping in 1976,
reference systems that use hierarchical tessellation of cells to but the proposed formulation was thought to be
partition and address the globe without gaps or overlaps. Most computationally intractable at that time [9]. Increase of the
of such systems are based on regular, multiresolution computation power revived this projection in the last decade
partitions of polyhedra, called Geodesic DGGSs (GDGGS) when e.g. Lambers and Kolb used it for the accurate rendering
[1], with various methods for achieving the proper tessellation of planetary-scale terrain data [10].
of the surface [2]. To foster the interoperability of geospatial At the turn of the century, the sphere-to-cube mapping was
data, Open Geospatial Consortium (OGC) has founded the used as a simple method to extend existing 2D spatial
DGGS Standard and Domain Working Groups and published databases and information browsing systems to the 3D
the abstract specification [3] and extension mechanisms for spherical data model [11]. Some modern open-source
DGGSs. libraries, like S2 [12], made use of spherical cubes to facilitate
This paper is a continuation of the previous work [4] on the seamless geographic databases with low distortion. The
popularization of cube-based GDGGSs, through examining numerous spherical cube maps proposed in recent years,
their properties and optimizing the mapping process. Here the highlight the relevance and popularity of this approach.
focus is on continuous 2D map creation and axis-based In the following section, we discuss various aspects of
indexing. A cube-based dataset consists of six separate data cube-based GDDGs and design choices that influence their
collections, each associated with an appropriate cube face. implementation.
However, cube edges are artificially imposed delimiters that
should not constrain browsing or data manipulation. Also, III. CUBE-BASED GDGGS
some algorithms applied in Geographic Information Systems
(GIS) are developed for planar geometry and may require There are several design choices that fully specify a
GDGGS [1]. Among them are a base polyhedron and its fixed
1 orientation relative to the Earth, an indexing method for cell
Aleksandar M. Dimitrijević is with University of Niš, Faculty of
Electronic Engineering, Aleksandra Medvedeva 14, 18000 Niš,
addressing and polyhedron-to-sphere mapping. In this section,
Serbia, E-mail: aleksandar.dimitrijevic@elfak.ni.ac.rs we discuss our design choices, and how each of them
2Peter A. Strobl is with European Commission, DG Joint Research contributes to the quality and efficiency of the implementation
Centre, Ispra, Italy, E-mail: peter.strobl@ec.europa.eu process.

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 19


A. Base Polyhedron properties can be improved if the cube is rotated. Even the
oldest known cube-based map [5] rotates a cube by 27°
The choice of the base polyhedron crucially influences the around the Earth’s axis of rotation. One of the first discussions
characteristics of GDGGS. We have chosen a cube for several on the orientation of the base cube is given in [8], as a way to
reasons. First, the faces of the cube, as well as the cells that maximize the usefulness and efficiency of the spherical cube
build them, are quadrilaterals, which is the optimal storage database, accompanying with appropriate transformations.
form. They are the most user-friendly, easily mapped to Considering the base cube orientation, our goal is to
standard data structures, and displayed efficiently. minimize the distortion of the landmass and to reduce the
Second, quadrilateral cells allow congruent nesting, continental plates splitting by the cube edges. Confining the
meaning that the lower-level cell completely contains higher- rotation angles to integer numbers, the goal is achieved by
level cells that cover the same area. This feature is consistent rotating about all thee Cartesian axis for the following angles:
with many spatial partitioning data structures, such as ϕ = 17°, θ = -10° and ρ = 32° [4]. Fig.1 displays the
quadtrees. orientation of the cube and shows the position of the
Third, the coordinate axes are orthogonal, and all cells at continental plates on the cube faces for the optimised
the same level of detail are identical. These properties are orientation of the base cube.
usually taken for granted, but cannot be achieved with other
grids, like hexagonal.
C. Spatial Partitioning and Indexing
Unfortunately, the use of the cube, as a base polyhedron,
also has some disadvantages. One of them is relatively large
To create a multiresolution discrete grid, each face of the
distortion. In general, the fewer and larger faces a polyhedron
polyhedron has to be appropriately subdivided into cells. The
has, the worse it approximates the Earth's surface.
partitioning method is defined by topology and refinement
Also, quadrilateral grids do not exhibit uniform adjacency.
ratio. Modern GDGGSs use one of the four partition
Each cell has four edge-sharing neighbors with centers on a
topologies [1]: squares, triangles, diamonds, or hexagons.
certain distance, and four vertex-sharing neighbors on greater
Cube-based GDGGSs, almost exclusively, use square
distance. This property complicates the use of such grids for
partition topology as a natural way to subdivide square faces.
discrete simulations [1].
The refinement ratio is defined as a ratio of the number of
Cube-based GDGGSs have their advantages and
planar polygon cells at two consecutive resolutions. Small
disadvantages. What prevails depends on the application.
refinement ratios are preferred since they allow more grid
Considering that our goal is to popularize the application of
resolutions, and, hence, enable a smoother transition between
GDGGSs, we chose the cube as the base polyhedron to
levels of detail. Simple and popular refinement ratios are 4
simplify the implementation and increase acceptability. To
and 9 but other possibilities exist [13].
reduce the effect of distortion, to some extent, we proposed an
Dealing with an extremely huge number of cells imposes
appropriate mapping of the ellipsoid to the sphere and an
the need for an efficient addressing scheme, usually referred
optimised orientation of the base cube [4].
to as indexing. Many indexing methods have been proposed
for DGGSs, but all of them can be categorized into three types
[14]: hierarchy-based, space-filling curve and axis-based
indexing.
Hierarchy-based indexing follows the refinement process,
usually imposed by a space-partitioning data-structure in the
background. This index is typically represented with a string,
which length corresponds to the resolution and each character
(or number) represents the spatial position of the cell within
its parent. Space-filling curve indexing is based on recursively
defined 1D curves that systematically traverse a space (a unit
square in case of 2D space). This indexing scheme is popular
because it serializes a multidimensional address into a very
compact single number and reduces access time to storage; by
preserving near-neighbor relationship (cells with consecutive
indices are mainly spatially close to each other). The two most
popular space-filling cures, applied in cube-based GDGGSs
Fig. 1. Optimal base cube orientation for the landmass distortion indexing, are Hilbert and Morton curves. For example, a
minimization and the cube-map faces for such orientation quadrilateralized spherical cube Earth database [7] uses the
Morton curve, while S2 Geometry Library [12] uses the
B. Base Cube Orientation Hilbert curve.
Axis-based indexing is a natural way of cell addressing
The simplest orientation of the base cube aligns one using an m-dimensional position vector. By unfolding the
Cartesian axis of the cube with the Earth’s axis of rotation and base cube into a plane, a unique 2D coordinate system can be
points another toward the prime meridian [8]. This orientation used for all its faces. However, most of the implementations
is common to most implementations [7, 12]. However, some utilize separate coordinate systems for each face, which

20
introduces a face dereferencing coordinate (f) in the index. in DGGS nomenclature. However, we are using term section
Also, dealing with multiresolution data adds another to emphasize their compound structure. Even though the size
coordinate referring to the resolution (r). Axis-based indexing of a section can be relatively large, sometimes larger than the
allows trivial neighbors determination, for the cells within the viewport, the viewport may intersect several sections.
same cube face, but also easy adjacent cells addressing across The second step in the map-generation process is to
the edges of the faces, which qualifies it as preferred indexing determine the central section, i.e. the section which contains
method in our continuous 2D map creation process the center of the viewport. To get the coordinates of the
To enable multilayer data organization, we use a 5- viewport center for chosen spherical cube projection, we need
coordinate index (l,r,f,x,y), where l is a layer, r is resolution, f to apply the forward pipeline [4]. The forward pipeline, based
is a face, and x and y are integer cell coordinates within the on the geographic coordinates in the WGS84 system,
face. The order of the coordinates corresponds to the determines the cube face (f) and the relative coordinates
frequency of their change to alleviate a section name creation within the cube face (x,y) ∈ [-1,1].
by concatenating more frequently changed substrings at the Depending on the resolution (r) and the section size, the
end of the section name. The layer and the resolution are fixed coordinates are determined, i.e. indices of the central section
for a map. As such, the procedure for adjacent cell name (is,js) and the relative displacement of the center of the whole
generation recalculates only (f,x,y) part of the index. map from the corner of the central section (xs,ys) ∈ [0,1].
Coordinate f changes only on the edges of the faces, which is Based on the map name, resolution (r), cube face (f) and the
mostly infrequent, while (x,y) part is changed with each cell. section indices (is,js), the name of the given map section is
generated. Moreover, it is now possible to specify the names
D. Sphere-to-Cube Mapping of the sections that make up the entire map. The axis-based
indexing, proposed in the previous section, significantly
Generally, there are two types of mapping the base alleviates the process of section names generation.
polyhedron to a sphere or ellipsoid [1]: direct spherical
subdivision and map projection. The first approach creates
partitions directly on the surface of the sphere or ellipsoid that
correspond to the polyhedral face partitions, while the second
approach uses some inverse map projection.
The second approach is more applicable for the cube-based
GDGGSs, with dozens unique projections being used in recent
decades for geodesy but also in computer graphics [15, 16].
Since a cube can only be projected to a sphere or ellipsoid
preserving either area (equal-area projection) or shape
(conformal projections), distortions are unavoidable. Because
Fig. 3. Orienting sections to fit the neighbor - the upper section
trying to preserve either property, significantly deteriorates rotates by 90° with a change of the lower (central) section
the other, many projections are compromises that are neither
equal-area, nor conformal. The entire map is generated as a tile matrix of sections. For
Choosing the right projection depends on the application, systems with enough memory and larger viewports, a 3×3
and it beyond the scope of this paper. To illustrate the process matrix or larger is recommended, while for systems with less
of the continuous 2D map creation, we use adjusted spherical memory and smaller viewports, a 2×2 matrix is
cube [17]. This spherical cube map projection is neither equal- recommended. A tile matrix with an odd number of sections
area nor conformal, with maximum-to-minimum area along each axis is easier to implement, because its contents do
distortion 1.414, maximum angular distortion 31.167°, and not change as long as the center of the viewport is within the
average angular distortion 11.57°. By rotating the base cube, central section. In a matrix with an even number of sections,
the average angular distortion of the continental plates can be the map modification is triggered by changing the quadrant in
reduced by almost 20%, from 11.21° to 9.03° [4]. which the center of the viewport is, and the central section is
not actually in the middle of the viewport, but is moved to
IV. CONTINUOUS MAP GENERATION some corner of the map. The matrix size (N×N), sections size
(Ssize), and the viewport diagonal (Dsize) are bound by the
The first step in the map-generation process is the input following relation: Dsize ≤ (N-1) Ssize.
parameters parsing. The map is specified by the center of the For each position in the tile matrix, it is necessary to
viewport (in geographic coordinates), the level of detail (or determine the section that should be drawn in it, as well as the
resolution) and the window size (width and height) in map section’s orientation. Fig.3. shows how the upper section
units (i.e. pixels). Although it is a common practice to define changes orientation to fit the lower one. When defining the
map space with a bounding box, we use the center of the map, it is considered that the central section has a correct
viewport to enable usage of geographic coordinates and hide orientation, while the others may be rotated. The rotated
the cube-based DGGS’s coordinate system from the users. sections only change the order of reading their pixels and do
The entire map is created as a mosaic of individual parts, not require resampling.
called sections. Sections are bitmaps that correspond to cells

21
If the central section has both x and y coordinates with In order to provide a simple interface for classical
minimum or maximum values for the cube face, at least one geospatial data processing, we proposed a procedure for
vertex sharing neighbor is an empty section. In the special generating continuous 2D maps. This way data can be
case, when just a single section creates the whole cube face, accessed in native format without the need to know the
all four vertex sharing neighbors are empty sections. Fig.4a. coordinate system or other GDGGS implementation details in
depicts such a case. which they are originally defined.

REFERENCES
[1] K. Sahr, D. White, and A. J. Kimerling, “Geodesic Discrete
Global Grid Systems”, Cartogr Geogr Inf Sci, vol. 30, no. 2, pp.
121-134, 2003.
[2] A. J. Kimerling, K. Sahr, D. White, and L. Song, “Comparing
Geometrical Properties of Global Grids”, Cartogr Geogr Inf Sci,
vol. 26, no. 4, pp. 271-288, 1999.
a) c) [3] Open Geospatial Consortium, “Topic 21: Discrete Global Grid
Systems Abstract Specification”, 2017.
[4] A. Dimitrijević, P. Strobl, M. Lambers, A. Milosavljević, and D.
Rančić, “Distortion Optimized Spherical Cube Mapping for
Discrete Global Grid Systems”, In: Zdravković, M., Konjović,
Z., Trajanović, M. (Eds.) ICIST 2020 Proceedings, vol. 1, pp.
109-113, 2020.
b) d) [5] C. G. Reichard, “Atlas des ganzen Erdkreises in der Central-
Fig. 4. The process of map creation: a) smallest scale initial Projection auf fechs Tafeln entworfen”, Weimar, 1803.
proto-map, b) determining the angle of rotation, c) rotated https://haab-digital.klassik-stiftung.de/viewer/image/926414453
[6] R. Sadourney, “Conservative Finite-Difference Approximations
proto-map, d) clipped map
of the Primitive Equations on Quasi-Uniform Spherical Grids”,
Monthly Weather Review, vol. 100, no. 2, February 1972, pp.
If the adjacent sections belong to the same cube face, they 136-144.
are simply drawn, without any transformations. If they are [7] F. Chan, E. O’Neill, “Feasibility Study of a Quadrilateralized
not, it is necessary to determine whether they are empty or Spherical Cube Earth Data Base”, Tech. Report EPRF 2-75
belong to the other face. One way to determine this is to test (CSC), Environmental Prediction Research Facility, April 1975.
the index values, which are obtained as a displacement in the [8] E. O’Neill, R. Laubscher, “Extended Studies of a
grid relative to the coordinates of the central section. If both x Quadrilateralized Spherical Cube Earth Data Base”, Tech.
and y coordinates of the section are out of range for the face, Report NEPRF 3-76 (CSC), Naval Environmental Prediction
Research Facility, May 1976.
the section is empty. If only one coordinate is out of range,
[9] M. Calabretta, E. Greisen, “Representations of Celestial
section belongs to the adjacent face. Sections from adjacent Coordinates in FITS”, Astronomy & Astrophysics, vol. 395, no.
faces change orientation according on the neighborhood 3, pp. 1077-1122, 2002.
relationship. Fig. 4a shows a proto-map of the smallest scale, [10] M. Lambers, A. Kolb, “Ellipsoidal Cube Maps for Accurate
with New York City being the center of the viewport. Rendering of Planetary-Scale Terrain Data”, in Proc. Pacific
It is a common practice to orient the map up to the north. Graphics (Short Papers), pp. 5-10, 2012.
Therefore, the next step is to determine the angle of rotation, [11] H. Alborzi, H. Samet, “Augmenting SAND with a Spherical
to achieve that property. The angle for which the map should Data Model”, In: Proc. First Int. Conf. on Discrete Global Grids,
be rotated is the angle between the line passing through the Santa Barbara, CA, USA, 26-28. March 2000.
[12] S2 Geometry Library, https://s2geometry.io
center of the viewport and the point having the same longitude
[13] A. M. Amiri, F. Bhojani, and F. Samavati, “One-to-two Digital
and infinitesimally increased latitude, and the Y-axis on the Earth”, In: Bebis G. et al. (eds) Advances in Visual Computing,
map (Fig. 4b). ISVC 2013, LNSC 8034, pp. 681-692, 2013.
In addition to the rotation, it is necessary to move the center [14] A. M. Amiri, F. Samavati, and P. Peterson, “Categorization and
of the viewport to the center of the entire map (Fig. 4c). The Conversions for Indexing Methods of Discrete Global Grid
last step is clipping to the defined viewport (Fig. 4d). Systems”, ISPRS Int. J. Geo-Inf., vol. 4, no. 1, pp. 320-336,
2015.
[15] A. Dimitrijevic, M. Lambers, and D. Rancic, “Comparison of
V. CONCLUSION Spherical Cube Map Projections Used in Planet-Sized Terrain
Rendering”, Facta Universitatis, Series: Mathematics and
Nowadays enormous amounts of geospatial data, collected Informatics, vol. 31, no. 2, pp. 259-297, 2016.
from various sources, pose new challenges for their efficient [16] M. Lambers, “Survey of Cube Mapping Methods in Interactive
management. GDDGSs offer a solution, but are often seen as Computer Graphics”, The Visual Computer, vol. 36, no. 5, pp.
a complex mechanism that is not yet widely accepted by end- 1043-1051, 2020.
users. To overcome this, we presented the basic concepts of [17] R. Lerbour, J.-E. Marvie, and P. Gautron, “Adaptive Real-Time
cube-based GDGGSs and some respective design choices Rendering of Planetary Terrains”, In: Proc. Int. Conf. Computer
Graphics, Visualization and Computer Vision (WSCG), pp. 89-
making these easy to implement and with acceptable
96, 2010.
distortions for many applications.

22
Simulation Environment for Optimal Resource Planning
During COVID-19 Crisis
Nenad Petrović
Abstract – Recent COVID-19 outbreak has affected both 19 crisis.
human resources and economy around the world dramatically In pandemic, it is of utmost importance to plan resources
leading towards pandemic and serious global crisis. In this efficiently, but timely – either human, material resources or
paper, a simulation environment leveraging the synergy of deep equipment. The protection of health and the economy of a
learning-based predictions and linear optimization for efficient
resource planning is presented. The proposed solution shows
country are linked tightly [6]. On the other side, it was shown
satisfiable prediction performance and enables efficient resource that simulation is an effective approach contributing to the
exchange by reducing the trading costs. reduction of pandemic’s consequences, especially at
provincial and local level [7]. Therefore, in this paper, a
Keywords – Deep Learning, Coronavirus, COVID-19, Linear software simulation environment is proposed aiming the
optimization, Simulation. efficient resource planning in current pandemic COVID-19
crisis.
In [8], an approach to prediction of COVID-19 spread
I. INTRODUCTION
based on simulation in Iran, which has been one of the
disease’s epicenters in the beginning, was presented.
The hottest topic since the first days this year was the
However, the work presented in this paper builds upon the
discovery of new infectious disease COVID-19 caused by
approach from [9], that has shown as effective, leveraging
SARS-Cov-2 virus (also known as 2019-nCoV or simply
prediction and linear optimization for optimal blockchain-
coronavirus) in China, which was behind several pneumonia
based energy trading in smart grids. Analogously, in [10],
cases in Wuhan’s Seafood Wholesale Market [1]. One of the
linear optimization was used within smart city simulation
main differences from well-known influenza-alike viruses is
environment for network resource planning together with deep
the fact that even persons without any symptoms might be
learning and fading effect calculation.
potential sources of infection [2, 3], which led to fast outbreak
in China. A long and varying incubation period (2-14 days,
exceptions of up to 27 days) [3] and high death rate in elder II. BACKGROUND
population [1, 2], making the situation even more difficult.
However, after just several weeks, the first cases were
A. Linear Optimization
reported in other continents. It is believed that coronavirus
reached Europe in the end of January, with the first case
Linear optimization (known as linear programming) refers
reported in France [4]. In next several days, the cases were
to mathematical method whose goal is to achieve the best
reported in several other countries as well (Germany, Finland,
possible outcome, relying on a mathematical model, where the
Italy, Sweden) [4]. However, there were still just few cases in
requirements are represented by linear relationships [11]. It
each of these countries and still did not seem so critical. Later,
covers the techniques for optimization of a linear objective
in mid-February, the number of cases in Italy has started to
function, subject to linear equality and inequality constraints.
increase dramatically making it one of the world’s worst-
The vector of variables determined as output of optimization
affected countries. Towards the middle of March, the COVID-
is decision variable.
19 was also detected in most parts of Europe which led to
In this paper, linear programming is leveraged for optimal
limited movement, lockdowns and closing borders in some of
resource planning and exchange between cities during
the countries. Therefore, the new disease turned from Chinese
COVID-19 crisis. The implementation is based on AMPL1, an
outbreak to worldwide pandemic in short time, which led to
algebraic modeling language for mathematical programming
tragic consequences in many countries, huge number of lost
which enables writing linear programs using the syntax
lives, on the first place, but catastrophic financial losses and
inspired by traditional algebraic notation. While it is not used
stagnation of economy as well [2]. Moreover, there is no
for solving optimization problems, it provides interface to
specific treatment for COVID-19 proven by clinical trials yet
other programs responsible for that task. In this paper,
[5]. For all these reasons, the world has reached the COVID-
CPLEX2 based on simplex method [12] was used as a solver.

Nenad Petrović is with University of Niš, Faculty of Electronic


Engineering, Aleksandra Medvedeva 14, 18000 Niš, Serbia, E-mail:
nenad.petrovic@elfak.ni.ac.rs

1
https://ampl.com/
2
https://www.ibm.com/analytics/cplex-optimizer

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 23


Fig. 2. Modelling environment notation as UML class diagram

disinfection) using a visual modelling environment run in web


B. Deep Learning browser. A domain-specific notation is used for that purpose.
The modelling tool implementation is based on JavaScript,
HTML and CSS. Once the model is completed, it is
Deep learning includes various machine learning techniques
augmented by the data about expected resource demands
based on artificial neural networks. Artificial Neural Network
based on the results achieved relying on deep learning
(ANN) is a group of computational units interconnected via
weighted links known as perceptrons. Each unit contains one prediction model. Online public data about number of new
or more weighted input connections, a transfer function infected people and deaths in countries and cities around the
world on daily basis from various sources is aggregated,
combining the inputs and an output connection [13].
filtered and prepared for making new predictions. Moreover,
Perceptron receives a signal, processes it and forwards the
AMPL .dat file generator constructs appropriate input for
result to other connected nodes. Three types of layers exist in
linear optimization process taking the previously created
neural networks [13, 14]: 1) input - corresponds to the input
variables 2) hidden – resides between the input and output model and predictions that are produced as result of deep
learning. After that the linear optimization according to the
layers 3) output - produces the output variables. A deep neural
AMPL optimization model is performed, giving the output
network (DNN) is an artificial neural network (ANN) which
that represents optimal resource exchange which does not
has multiple layers placed between the input and output layers
only help the affected cities from unnecessary distribution
[14].
In this paper, we make use of deep learning in order to costs and spending, but also could lead to more lives saved. In
predict number of new cases and deaths within city, necessary Fig. 1, an illustration of the proposed solution is shown.
for resource demand estimation. The prediction model is
trained on publicly available online data about COVID-19 Online data sources
spread and death cases from previous period. TensorFlow3 for
3

Python programming language with GPU-powered execution Prediction


on CUDA-compatible graphics hardware was used for 1
Modelling
2
4 Linear
6
environment optimization
implementation. AMPL .dat
Users generator
5
Savings

III. IMPLEMENTATION Fig. 1. Solution overview: 1-Model creation 2-Resource model 3-


Aggregated and filtered data from online data sources 4-Predictions
A. Solution Overview based on past data 5-AMPL data file 6-Optimization results

First, user creates models of cities in terms of available B. Modelling and Simulation Environment
resources (medical workers, equipment, vehicles, patients,
A UML class diagram of the metamodel used for city
3
https://www.tensorflow.org/
resource modeling notation is given in Fig. 2. A map consists

24
of cities that are able to exchange resources during the crisis. If one these conditions denoted fails, then an alert occurs in
The parameter describing the city connections is transport the simulation environment and corresponding resource
cost. Relevant parameters for cities are the number of citizens, exchange process based on the selected linear optimization
its area size, number of hours allowed for movement. strategy will be triggered.
Moreover, relevant parameters for pandemic situation are the
total number of cases and number of critical cases. Each city if (conditioni is false) then optimization( strategyi ) (4)
has six types of resources: 1) hospital buildings 2) ambulance
vehicles 3) medical devices 4) medical workers 5) disinfection C. Predictions Based on Deep Learning
products 6) food. An important resource feature is its price. At
each hospital, there is a limited capacity. At each moment, a
The data aggregated from online sources was split into two
number of places within the hospital can be occupied by
disjoint sets – the training set (75%) and test set (25%). It
patients. In case of COVID-19, respiratory equipment is
consists of total eight variables, as it is shown in Table 1.
crucial for saving lives in critical cases. For that reason, it is
one of the most important resources exchanged between the TABLE I
cities, apart from disinfection products which can lead to SPREAD PREDICTION DATASET
reduction of new cases [15]. There is also possibility to set
weather parameters like temperature, rain and snow. Id Density Age Day T. Mh New D.
The implementation of modelling and simulation [p/km2] [y] [0..366] [C] [h] [p] [p]
environment is based on engine used for [9] and [16]. There
are two views within the tool: (a) map view and (b) city view. City id represents the identification number of the
Map view gives a global overview of the affected cities. City considered area within the country. Number of persons per
view is available for each city from the map, by double- km2 provides the information about population density within
clicking on it. In this view, it is possible to perform the the area. Median age is the age that divides a population into
resource allocation for further exchange on a local or global two numerically equally sized sets, which might be of huge
level. In case of foreign cities or countries included as importance for prediction of death cases. Day refers to the
donation/help or resource exchange partners, they can be ordinal number of a day (from 1 to 365 or 366). Temperature
added to the map and their resources set. In Fig. 3, a is the average daily temperature that day which could affect
screenshot of the proposed tool is given. the movement of citizens that day. Instead of temperature,
other weather parameters might be leveraged, such as rainfall.
City: Pirot
Movement hours is time frame during the day when the
Edit hospital_1 parameters

capacity 50
citizens are allowed to go outside and may vary across
countries and cities, ranging from 0 (total quarantine) to 24
hours (regular situation). New cases refer to the number of
patients 7

CONFIRM new infected people identified within the area, as an average


of 7 days which is approximately the average length of the
incubation period [3]. Deaths is the number of people that
died as consequence of COVID-19 disease that day. City id,
density, age, day number, temperature and movement hours
Fig. 3. Modelling and simulation tool screenshot: (a) map view
are treated as independent variables, while the number of new
(b) city view
cases and deaths are dependent variables (predicted values).
Moreover, several simulation mechanisms are However, the information about population density, median
implemented. First, it is checked whether the number of age and movement hours are optional, but the predictions
respiratory devices is greater or equal to the number of critical could also be made without them.
patients: For training, publicly available data about the new cases
and deaths on national level around the world was used from
num _ critical ≤ num _ respiratory (1) [17] together with data for cities in Serbia from [18].

After that, it is checked if the number of medical workers is D. Linear Optimization Model
enough to handle the number of expected new cases based on
estimation of how many patients each medic can handle: There are several optimization models for different resource
expected _ cases exchange strategies implemented within the tool (respirator,
≤ num _ medics (2) medical personnel, food, disinfection, vehicles and patients
patients _ daily _ per _ medic
exchange), but only one of them will be described.
A similar check like (2) is also done for ambulance Let us consider a network of interconnected cities involved
vehicles. into resource trading, denoted as C. Travel cost tc[i,j] is
Finally, it is checked if there is enough free space to place assigned to each link between city[i] and city[j]. Each city[i]
the patients in hospital: has predicted number of critical patients cp[i] and available
respirator devices r[i]. For each critical patient, a respirator
expected _ cases ≤ hospital _ free _ places (3) device is needed. Each city[i] has respirators of price rp[i].

25
Moreover, each city[i] has amount of budget b[i] that is the ACKNOWLEDGEMENT
maximum amount of money which can be spent. To each
connection between cities, a decision variable x[i,j] is This work has been supported by the Ministry of Education,
assigned to indicate the amount of respirators that will be sent Science and Technological Development of the Republic of
from city[i] to city[j]: Serbia.
x[i , j ] ≥ 0 if trading between cityi and city j will be perfromed , (5)
x[i , j ] = 0 otherwise
REFERENCES
However, there are several resource exchange constraints.
First, the overall amount of available respiratory devices after [1] V. C. Bala, P. Kumar, “Review on COVID-19: Rise of SARS-
exchange is always equal or greater than the number of CoV-2 Pandemic Outbreak”, Borneo Journal of Pharmacy,
critical patients. 3(Special-1), pp. 103-120, 2020.
[2] B. Cruz, M. Dias, “COVID-19: From outbreak to pandemic”,
r[i] +  x[i, j ] − x[ j, i] ≥cp[i], i ∈ C (6)
GSJ Vol. 8 Issue 3, March 2020, pp. 2230-2238.
j∈C
[3] D. Oran, E. Topol, Prevalence of Asymptomatic SARS-CoV-2
Moreover, the total cost of respirator acquisition should not Infection: A Narrative Review, Annals of Internal Medicine,
exceed the available budget: June 2020, pp. 1-7, 2020. https://doi.org/10.7326/M20-3012
[4] G. Spiteri et al., “First cases of coronavirus disease 2019
b[i] ≥  tc[i, j ] + x[ j, i]rp[ j ], i ∈ C (7) (COVID-19) in the WHO European Region, 24 January to 21
j∈C February 2020”, Eurosurveillance, pp. 1-6, 2020.
Finally, the objective function minimizes the overall sum of [5] X. Pan et al., “Potential drugs for the treatment of the novel
costs, considering both the travel cost and respirator price: coronavirus pneumonia (COVID-19) in China”, Virus Research,
Volume 286, 198057, pp. 1-12, 2020.
minmize  tc[i, j ] + x[i, j ]rp[i]
i , j∈C
(8) https://doi.org/10.1016/j.virusres.2020.198057
[6] P. Vanini, “Protection of the Population and the Economy in a
Pandemic” [preprint], pp. 1-21, 2020.
[7] D. M. Prieto et al., “A systematic review to identify areas of
IV. EVALUATION enhancements of pandemic simulation models for operational
use at provincial and local levels”, BMC Public Health, 12(1),
For evaluation, a laptop equipped with Intel i7 7700-HQ pp. 1-13, 2012. https://doi.org/10.1186/1471-2458-12-251
quad-core CPU running at 2.80GHz, GTX1050 GPU with [8] N. Ghaffarzadegan, H. Rahmandad, “Simulation-based
Estimation of the Spread of COVID-19 in Iran”, pp. 1-19, 2020.
2GB VRAM, 16GB of DDR4 RAM and 1TB HDD. In Table
[9] N. Petrović, Đ. Kocić, “Data-driven Framework for Energy-
2, the evaluation results in respirator device exchange scenario Efficient Smart Cities”, Serbian Journal of Electrical
for different number of cities involved are given, considering Engineering, Vol. 17, No. 1, Feb. 2020, pp. 41-63.
the execution time for different processing steps – prediction https://doi.org/10.2298/SJEE2001041P
and optimization (in seconds) and cost reduction (as [10] N. Petrović, S. Koničanin, D. Milić, S. Suljović, S. Panić,
percentage). According to the results, the processing time “GPU-enabled Framework for Modelling, Simulation and
increases with the model size, but it does not exceed one Planning of Mobile Networks in Smart Cities”, ZINC 2020, pp.
second in the executed experiments. On the other side, the 1-6, 2020.
reduction of resource exchange costs depends on the problem [11] G. B. Dantzig and M. N. Thapa, Linear Programming 1 -
Introduction, Springer, 1997.
instance itself and varies from case to case. When it comes to
[12] G. B. Dantzig, A. Orden and P. Wolfe, “The generalized
prediction performance, the relative error was 24%, while simplex method for minimizing a linear form under linear
AUC score was 0.81. inequality restraints”, Pacific Journal of Mathematics, Volume
5, Number 2, 1955, pp. 183-195.
TABLE II [13] R. Lippmann, “An introduction to computing with neural nets”,
EVALUATION RESULTS IEEE ASSP Magazine, vol.4(2), 1987, pp. 4-22.
[14] Y. Bengio, “Learning Deep Architectures for AI”, Foundations
Size Tprediction Toptimization Creduction and Trends in Machine Learning 2(1), 2009, pp. 1-127.
[cities] [s] [s] [%] [15] H. Fathizadeh et al., “Protection and disinfection policies
3 0.29 0.016 31 against SARS-CoV-2 (COVID-19)”, Le Infezioni in Medicina
5 0.31 0.021 28 n. 2, April 2020, pp. 185-191.
[16] N. Petrović, “Approach to Dynamic Adaptivity Simulation in
7 0.38 0.059 42
Fog Computing Scenarios”, TELSIKS 2019, pp. 58-61, 2019.
10 0.51 0.084 63 https://doi.org/10.1109/TELSIKS46999.2019.9002322
[17] Coronavirus Update (Live) [online]. Available on:
https://www.worldometers.info/coronavirus/
V. CONCLUSION [18] Statistika COVID-19 u Srbiji [online]. Available on:
https://covid19.data.gov.rs/
The proposed approach gives promising results, enabling
the timely allocation of resources in a pandemic crisis
situation. However, the tool is still a work in progress and
more data about new COVID-19 cases in Serbia is needed for
better prediction performance.

26
Tackling the COVID-19 Conspiracies:
The Data-Driven Approach
Nenad Petrović
Abstract – Apart from obvious impact on many aspects of our In this paper, a data-driven approach is adopted to tackle
everyday lives, the current COVID-19 pandemic has led to the conspiracies in context of COVID-19 disease, leveraging
occurrence many conspiracy theories as side-effect, especially via fuzzy reasoning, performed on facts stored within the
social media. However, in such confusion among population, the semantic knowledge base created as a result of ontology
situation becomes even more difficult to handle, which could learning against open scientific literature and making use of
potentially have even more dramatic consequences on global
correlation analysis of public data sets for truth value
economy and increase the number of lives lost. In this paper, a
data-driven framework for analysis of the facts related to determination. To the best of author’s knowledge, such
COVID-19 disease is proposed. The proposed implementation solution has not been publicly presented yet or documented in
leverages semantic knowledge representation, fuzzy reasoning published scientific literature.
and correlation analysis.

Keywords – Coronavirus, Correlation analysis, Fuzzy


II. BACKGROUND AND RELATED WORK
reasoning, Ontology, Semantic knowledge representation.
A. Fuzzy Logic
I. INTRODUCTION Fuzzy logic refers to a form of multi-valued logic where the
truth values, apart from 0 and 1 could be any real number
Since the beginning of this year, the pandemic of novel
between 0 and 1. Its goal is to handle the concept of partial
infectious disease COVID-19 has affected almost all aspects
truth, where the truth value may range between completely
of our everyday lives. It was first discovered in China, but
true and completely false. It is similar to human reasoning as
spread quickly to other continents in just few weeks [1-3].
it relies on imprecise information to make decisions.
According to [4], until June 15th, 2020, the total number of
Traditional logic which requires deeper understanding of a
identified cases was 8,039,649, while the disease has taken
system, such as exact equations and precise numeric values.
436,498 lives worldwide. However, due to huge number of
On the other side, fuzzy logic enables modeling complex
cases in some countries, several measures were taken by
systems using a higher level of abstraction originating from
governments in order to reduce to disease spread, such as
human knowledge and experience [12, 13]. In many cases,
social distancing, limiting citizens’ movement within country
control of complex systems by experienced human operators
boarders and abroad, often together with prohibition and
is more successful and effective than automatic methods.
cancellation of huge public events [5]. Therefore, from work
Fuzzy reasoning has been adopted in many complex systems
to personal relations and entertainment, COVID-19 pandemic
that cannot be modelled precisely even under various
has brought many changes to our daily routine, habits and
assumptions and approximations incorporating the human
activities. Despite the fact that the pandemic seems weaker
expert knowledge [13].
nowadays, some of the government measures are still applied
The medical decision-making process is fuzzy in its nature
in some countries due to unstable situation.
[14]. During this process, the doctors need to reason about
However, one of the crucial problems related to COVID-19
linguistic concepts in order to bring a decision about diagnosis
which led to dramatic consequences are the speed of its spread
or make prognosis. However, the conversion from fuzzy
and lack of approved vaccine and medication [6]. for the
nature into outcome often leads to loss of precision [14],
disease. Apart from huge number of lost lives and stagnation
which could have dramatic consequences, when it comes to
of economy as well [7], the situation becomes even more
patient treatment. For that reason, fuzzy logic is a suitable
difficult due to spread and circulation of conspiracy theories
way to provide the doctors with the support needed for
worldwide [8, 9], especially via social networks [10]. One of
handling of linguistic concepts and avoiding such loss of
the most common conspiracy theories is the relation between
precision. Fuzzy logic technologies are applied across many
the deployment of 5G network and COVID-19 spread [8-10],
areas of healthcare, and they have been approved as quite
which even lead to organized vandalism against 5G
effective [14, 15]. For example, in [16], a fuzzy medical
equipment [11].
diagnosis expert system based on quantiles of diagnostic
measures was presented, while the work presented in [17]
Nenad Petrović is with University of Niš, Faculty of Electronic focuses on coronary heart disease risk determination based on
Engineering, Aleksandra Medvedeva 14, 18000 Niš, Serbia, E-mail: cholesterol measurements.
nenad.petrovic@elfak.ni.ac.rs

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 27


In this paper, fuzzy reasoning is applied in wider context, in based systems. Within the semantic knowledge bases, the data
order to take into account the partial truth of novel facts about is represented with respect to ontologies. An ontology consists
COVID-19 available online within the decision-making of classes, individuals, attributes and relations. Classes
process. However, the proposed approach can be also applied represent abstract groups, collections or types of objects.
to support medical decision-making when it comes to Individuals are instances of these classes. Attributes refer to
COVID-19 patient assessment and treatment in order to properties, characteristics and parameters of classes. Relations
eliminate any possible conspiracies that can have impact on define ways in which classes and individuals are related. For
treatment. both the ontologies and facts, the RDF standard language is
used. It is used to define (subject, predicate, object) triplets
B. Correlation Analysis that are persisted within the semantic triple stores. On the
other side, SPARQL is used for query execution against the
semantic triple stores. The results are retrieved in order to
Correlation analysis refers to a statistical method which is
support different reasoning mechanisms that enable inference
used for discovery of a relationship between two variables and
how strong that relationship is [18]. Correlation coefficient of new knowledge and facts from the existing knowledge
base.
represents a numerical measure of correlation between the
In [21], ontologies were used for representation of
relative movements of two variables from the observed data
pandemic simulation scenarios in case of H5N1. On the other
set. Its value is in range between -1.0 and 1.0. Positive value
side, in [22], Epidemiology Ontology was introduced to
of correlation means that for positive increase in one variable,
there is also a positive increase in the second variable. On the enable sharing of epidemiology resources within semantic-
other side, negative correlation value indicates that the enabled platforms. Recently, in [23], an extension of the
Infectious Disease Ontology was introduced, including the
variables move in opposite directions - for a positive increase
concepts relevant to coronavirus pandemic.
of one variable, the second variable decreases. In case of
In this paper, semantic knowledge representation is used for
correlation value which is exactly 0, there is no linear
facts about coronavirus pandemic coming from various online
relationship between the observed variables. There are many
types of different correlation coefficients, but the most textual sources - open-access scientific paper repositories
commonly used is the Pearson correlation coefficient (denoted (such as PubMed2) and web pages. The transformation of
textual data to semantic representation is performed relying on
as r) that measures the strength and direction of the linear
ontology learning module built upon the work presented in
relationship between two variables [18]. However, it is not
[24]. Moreover, an ontology is also used for representation of
able to capture nonlinear relationships between two variables
fuzzy rules used by the mechanism of reasoning itself, in a
and distinguish between dependent and independent variables.
similar way as it was done in [25] to support explainable
There are several works that adopt correlation coefficient to
artificial intelligence based on fuzzy reasoning in smart cities.
discover relationships between some factors related to
COVID-19 pandemic. In [19], the analysis of the correlation
between confirmed cases of COVID-19 in Spain and several III. IMPLEMENTATION OVERVIEW
geographic, meteorological and socioeconomic variables at
the province level was presented. On the other side, in [20], a In the first step, the user specifies the desired hypothesis
correlation between racial demographics and COVID-19 cases about COVID-19 disease that will be tested using a graphical
was analyzed. user interface in web browser. The tested hypothesis is given
In this paper, MATLAB’s implementation of Pearson either in form of (condition set->consequence) or pair of
correlation known as corcoeff1 was used to calculate the value potentially connected concepts that are in relation r(concept1,
of correlation between two variables relevant to COVID-19 concept2). A condition set consists of a set of statements
based on publicly available online data sets. Moreover, the connected with and - (condition1 ˄ condition2 ˄ …
calculated value is used as truth value for facts stating that conditionn). After that, the key terms are extracted from
these two observations are related, which is also leveraged provided user-defined hypothesis elements (term1 is extracted
within fuzzy reasoning process relying on semantic from concept1 or term2 is extracted from condition2, for
representation of these facts based on ontologies. example) and forwarded as input to the search and retrieval
module. This module has role to execute search queries for
C. Semantic Knowledge Representation key terms against repositories of publicly available scientific
texts or extract numerical statistic data related to COVID-19
Semantic technology enables encoding the meaning of data pandemic from web pages. Furthermore, the retrieved raw
separately from the content itself and related applications, data is filtered and stored into a form suitable for further steps.
providing the ability to understand data, exchange that Moreover, the prepared data is used as input for two different
understanding and perform reasoning on top of it. The processing modules. While textual data is forwarded to
formalization of this knowledge representation is made in a ontology learning module to construct a semantic knowledge
form understandable and suitable for use by both humans and base about given terms, the numerical data is leveraged for
computers, which is an advantage for usage in reasoning- correlation analysis by calculating the correlation coefficient
between the data about input pair of concepts.

1 2
https://www.mathworks.com/help/matlab/ref/corrcoef.html https://pubmed.ncbi.nlm.nih.gov/

28
Public online data
3

Correlation
analysis 6
Search and
1 User interface 2 4 7 Fuzzy reasoning 8
retrieval
Ontology
User 5 Semantic knowledge
learning
representation Results

Fig. 1. Framework overview: 1-User-defined hypothesis 2-Key words for terms from hypothesis 3-Raw textual or numerical data about
key terms 4-Data prepared for processing 5-Representation of facts extracted from text in semantic triplet form 6-Correlation coefficient
values 7-Facts for given terms found in semantic knowledge base 8-Interpretation of results obtained as output of fuzzy reasoning process

The truth value of facts stored within the semantic have truth value above thresholdconspiracy. Finally, the results
knowledge base takes a real number value from range [0, 1] achieved as outcome of the described reasoning process are
and is calculated in case of concept relation testing according interpreted (whether hypothesis is considered as a conspiracy)
to formula: and shown to the user via GUI.
n( t1 ,t2 ) In Fig. 1, an overview of the proposed framework is
+ correlation _ coeff (t1 , t2 ) summarized. Moreover, in Listing I, pseudocode of the
ntexts (1)
Tt1 ,t2 = conspiracy test based on fuzzy reasoning is given.
2
In Eq. (1), n(t1,t2) denotes the number of texts where the Input: hypothesis, thresholdconspiracy
Output: true/false
relation between the terms extracted from concepts given in Steps:
the hypothesis is present; ntexts is the total number of texts 1. Extract key terms from hypothesis;
returned for given terms; correlation_coeff(t1, t2) refers to 2. For each term t in set of key terms
correlation coefficient between the variables relevant to these 3. Retrieve texts from online sources about term t;
4. term facts:=Perform ontology learning about term t based on texts;
terms extracted from public datasets. In case that search 5. Add term facts to the collection of all facts;
module fails to find the relevant datasets for correlation 6. Retrieve data set related to term t if possible;
analysis, than the truth value is not calculated as average, but 7. Discover transitive relations;
only taking into account the percentage of texts where the 8. Calculate truth based on (1);
9. End for each;
relation from the hypothesis is present (n(t1,t2)/ ntexts), instead. 10. conspiracy:=false;
On the other side, in formula for the other type of hypotheses 11. For each fact f in set of facts
considered, t1 represents a condition from the condition set, 12. If (f.truth < thresholdconspiracy)
while t2 refers to the consequence. Moreover, the relevance of 13. conspiracy:=true;
14. End if;
public online data can be taken into account in order to reduce 15. End for each;
the impact of low-quality publications by including a 16. return not(conspiracy);
trustworthiness coefficient of data source where the 17. End
considered fact was collected, denoted as trusti:
N Listing 1. Pseudocode of COVID-19 conspiracy testing algorithm
 trust ⋅ n i ( t1 ,t 2 )
i =1 (2)
ntexts IV. EXPERIMENTS AND EVALUATION
For this value, either impact factor of scientific publication
can be taken into account or some other metric, such as page For evaluation, a laptop equipped with Intel i7 7700-HQ
rank or relevance [26]. Once the truth values for the collected quad-core CPU running at 2.80GHz, equipped with 16GB of
facts used are ready, the fuzzy reasoning process can begin. It DDR4 RAM and 1TB HDD. In Table 1, the processing times
executes a set of SPARQL queries against the semantic of various steps achieved in several experiments of hypothesis
knowledge base to check whether the tested conditions exist testing are given. PubMed papers were used as basis for
and retrieves their truth values. However, after that, there are textual corpus by the ontology learning module, while the
two possible flows, depending on type of hypothesis testing. numerical statistics used for correlation relied mostly on [4],
In case of concept relation testing, if the truth value of facts together with several pages from [27]. The value of
describing the assumed relationship between the concepts c1 thresholdconspiracy was 0.8 in all cases.
and c2 is below given threshold thresholdconspiracy (a real- The presented framework was able to correctly distinguish
valued number between 0 and 1), than the tested hypothesis is between conspiracy (increased investment in 5G increases
considered as a conspiracy. On the other side, when it comes COVID-19 cases) and valid scientific results (death rate is
to the other type of hypotheses in form of condition set- higher among elderly and persons with chronic diseases). As
>consequence, then the hypothesis passes the conspiracy test it can be noticed, the processing time increases with textual
only in case when all the facts that represent the relation corpus size and data set size in tests where correlation analysis
between a conditioni from the condition set and consequence was performed, as expected.

29
TABLE I [9] M. Uthman et al., “5G Radiation and COVID-19: The Non-
EXPERIMENT RESULTS Existent Connection”, International Journal of Research im
Electronics and Computer Engineering, vol. 8, no. 2, April-June
H Ntexts Tontology Tcorrel Treason Out 2020, pp. 34-38.
[s] [s] [s] [10] W. Ahmed et al., “COVID-19 and the 5G Conspiracy Theory:
increase 10 98 0.13 0.86 false Social Network Analysis of Twitter Data”, J Med Internet Res
(5G, cases) 2020; 22(5):e19458, pp. 1-9, 2020.
[11] Cell Tower Vandals and Re-open Protestors — Why Some
old->deaths 20 147 0.25 0.91 true People Believe in Coronavirus Conspiracies [online]. Available
chronic- 30 289 - 1.01 true on: https://theconversation.com/cell-tower-vandals-and-re-open-
>deaths protestors-why-some-people-believe-in-coronavirus-
conspiracies-138192
[12] S. G. Tzafestas, N. Venetsanopoulos et al., “Fuzzy Reasoning in
V. CONCLUSION AND FUTURE WORK Information, Decision and Control Systems”, Kluwer Academic
Publishers, 1994, https://doi.org/10.1007/978-0-585-34652-6
With respect to the initial results, it can be recognized that [13] C. Carlsson, R. Fullér, “Fuzzy Reasoning in Decision Making
the presented approach has huge potential for adoption within and Optimization. Studies in Fuzziness and Soft Computing”,
various systems and use cases. In future, it is planned to Springer, 2002, https://doi.org/10.1007/978-3-7908-1805-5
integrate it within medical expert systems based on fuzzy [14] G. Gursel, “Fuzzy Logic in Healthcare”, Medical Imaging:
reasoning, such as the one presented in [17], with purpose of Concepts, Methodologies, Tools, and Applications, pp. 1-29,
decisioning improvement, especially when it comes to impact 2017, https://doi.org/10.4018/978-1-5225-0571-6.ch006
[15] K. B. Sundharakumar, S. Dhivya, S. Mohanavalli, R. Vinob
of COVID-19 on patients with chronic heart diseases. Finally, Chander, “Cloud Based Fuzzy Healthcare System”, Procedia
the presented solution will be integrated within the framework Computer Science, vol. 50, 2015, pp. 143-148.
for efficient resource planning in pandemic crisis with goal of [16] H. Choi, K. Han, K. Choi, and J. Y. Ahn, “A Fuzzy Medical
patient risk assessment [28] and leveraged by mobile app [29]. Diagnosis Based on Quantiles of Diagnostic Measures”, Journal
of Intelligent and Fuzzy Systems, vol. 31, no. 6, pp. 3197-3202,
ACKNOWLEDGEMENT 2016.
[17] N. Allahverdi, S. Torun, and I. Saritas, “Design of a Fuzzy
Expert System for Determination of Coronary Heart Disease
This work has been supported by the Ministry of Education, Risk”, CompSysTech’07, pp. 1-8, 2007.
Science and Technological Development of the Republic of [18] S. Senthilnathan, “Usefulness of Correlation Analysis”, SSRN
Serbia. Electronic Journal, pp. 1-9, 2019.
[19] D. Oto-Peralías, “Regional Correlations of COVID-19 in Spain”
REFERENCES [preprint], pp. 1-28, 2020, https://doi.org/10.31219/osf.io/tjdgw
[20] U. V. Mahajan, M. Larkins-Pettigrew, “Racial Demographics
and COVID-19 Confirmed Cases and Deaths: A Correlational
[1] G. Spiteri et al., “First Cases of Coronavirus Disease 2019
Analysis of 2886 US Counties”, Journal of Public Health, pp. 1-
(COVID-19) in the WHO European Region, 24 January to 21
4, 2020, https://doi.org/10.1093/pubmed/fdaa070
February 2020”, Eurosurveillance, pp. 1-6, 2020.
[21] H. Eriksson et al., “Ontology Based Modeling of Pandemic
[2] “Cluster of Pneumonia Cases Caused by a Novel Coronavirus,
Simulation Scenarios”, Studies in health technology and
Wuhan, China” [online], European Centre for Disease
informatics, 129(Pt 1), pp. 755-759, 2007.
Prevention and Control, Stockholm, pp. 1-10, 2020.
[22] C. Pesquita, J. Ferreira, F. Couto, and M. Silva, “The
https://www.ecdc.europa.eu/sites/default/files/documents/Risk%
Epidemiology Ontology: An Ontology for the Semantic
20assessment%20-
Annotation of Epidemiological Resources”, Journal of
%20pneumonia%20Wuhan%20China%2017%20Jan%202020.p
Biomedical Semantics, 2014, 5:4, pp. 1-7.
df
[23] S. M. Babcock, J. Beverley, L. G. Cowell, and B. Smith, “The
[3] B. Cruz, M. Dias, “COVID-19: From Outbreak to Pandemic”,
Infectious Disease Ontology in the Age of COVID-19”
GSJ, vol. 8, no. 3, March 2020, pp. 2230-2238.
[preprint], pp. 1-33, 2020, https://doi.org/10.31219/osf.io/az6u5
[4] Coronavirus Update (Live) [online]. Available on:
[24] N. Petrovic, M. Tosic, “Never-Ending Ontology Learning
https://www.worldometers.info/coronavirus/
Approach Applied to Biomolecular Function Prediction”,
[5] Considerations Relating to Social Distancing Measures in
IcETRAN 2019, pp. 762-767, 2019.
Response to COVID-19 – Second Update [online]. Available:
[25] N. Petrović, M. Tošić, “Explainable Artificial Intelligence and
https://www.ecdc.europa.eu/sites/default/files/documents/covid
Reasoning in Smart Cities”, YuInfo 2020, pp. 1-6, 2020.
19-social-distancing-measuresg-guide-second-update.pdf
[26] H. H. Musa, N. Abdelrhman, “Comparing the Ranking
[6] Y. Song et al., “COVID-19 Treatment: Close to a Cure? – A
Performance of Page Rank Algorithm and Weighted Page Rank
Rapid Review of Pharmacotherapies for the Novel Coronavirus”
Algorithm”, Journal of Computational and Theoretical
[preprint], pp. 1-25, 2020,
Nanoscience, vol. 24, no. 1, pp. 750-753, 2018.
https://doi.org/10.20944/preprints202003.0378.v1
[27] 5G - Statistics & Facts [online]. Available on:
[7] P. Vanini, “Protection of the Population and the Economy in a
https://www.statista.com/topics/3447/5g/
Pandemic” [preprint], pp. 1-21, 2020.
[28] N. Petrović, “Simulation Environment for Optimal Resource
[8] D. Freeman et al., “Coronavirus Conspiracy Beliefs, Mistrust,
Planning During COVID-19 Crisis”, ICEST 2020.
and Compliance with Government Guidelines in England”,
[29] N. Petrović, M. Radenković, and V. Nejković, “Data-Driven
Psychological Medicine, pp. 1–13, 2020.
Mobile Applications Based on AppSheet as Support in COVID-
https://doi.org/10.1017/S0033291720001890
19 Crisis”, IcETRAN 2020, pp. 1-6, 2020.

30
COMPUTER SYSTEMS
AND INTERNET TECHNOLOGIES II
Augmented and Virtual Reality Web Applications for
Music Stage Performance
Nenad Petrović
Abstract – In this paper, it is explored how augmented and stage performance by generating 3D worlds in virtual reality
virtual reality web applications can contribute to stage perceived by the audience.
performance in audio-visual arts. As outcome, application case
study is presented: augmented reality loop sampler interface
integrated with virtual reality song visualizer. Moreover, a II. BACKGROUND AND RELATED WORK
modelling tool leveraging metamodel and code generation for
rapid creation of custom augmented/virtual reality applications A. Augmented Reality (AR)
is introduced. According to the achieved results, the proposed
approach significantly speeds up the development of such Augmented reality (AR) enables merging real scenes with
applications. interactive virtual objects, such as 3D geometric models,
images, sounds and texts in a way that these objects overlap
Keywords – Augmented reality (AR), Metamodeling, Media
with physical world [7].
arts, Music, Virtual reality (VR).
Different types of AR-based music instruments and
interfaces for various purposes have been proposed so far. In
I. INTRODUCTION [4], a solution which enables playing electornic music
compositions interactively, remixing and modulating their
Each technological revolution has affected how music is elements by manipulation of simple physical objects was
created, performed and reproduced [1]. For example, in the presented. Furthermore, a more advanced mobile web solution
early 80s, the rise of digital synthesizers, personal computers for music perfromance which enables AR-based interaction
and MIDI standard has changed the way how music was with audience was introduced in [8]. On the other side, in [7],
created forever by enabling high level of automation in music an AR musical game for cognitive and motor rehabilitation
performance and high precision sequencing [2]. Later, in the was shown. It uses printed markers for each tone and patient
mid 90s, home computers have become powerful enough to
has to repeat the given sequence.
handle heavier sound processing tasks within digital audio
workstation (DAW) substituting hundreds of hardware racks,
B. Virtual Reality (VR)
making the sound editing and music production more
comfortable than ever before [3].
Virtual reality (VR) provides a feeling of presence in virtual
However, it was not exception with augmented reality (AR)
environments where user can interact with objects using
and virtual reality (VR) technologies [4, 5] which have
different sensorial channels [4].
emerged in recent years. The main novelty in music art
Several different usage scenarios of VR in music are
introduced by AR consists in using touch and gestures
identified. In [9], a system providing the ability to listen to
together with physical objects to provide innovative music
music and play different instruments in a 3D environment
interfaces and additional layers of expressivity compared to
with real-world panoramic video as background scenes was
traditional music instruments [4]. On the other side, VR
presented. Furthermore, in [10], the authors developed a VR
enables virtual presence in music-related scenarios, making
orchestral application for interactive music experience,
use of novel input methods, such as biofeedback [5].
allowing virtual musical instruments to be repositioned
In this paper, a framework for automated generation of AR
spatially, dynamically and interactively in virtual space.
and VR applications aiming music stage performance based
Finally, in [11], a museum of interactive music instruments in
on a metamodel is presented. It is inspired by metmodelling
virtual reality was shown.
framework for Future Internet infrastructure code generation
presented in [6]. The proposed approach is tested and
C. Web AR and VR Technology
evaluated in two case studies: AR loop sampler interface and
VR song visualizer. The first one enables performing DJ sets
Web is an emerging platform for lightweight augmented
by mixing sound loops, while the second augments the music
and virtual reality services and applications [12]. On the other
side, vendor-specific platforms and native applications have
Nenad Petrović is with University of Niš, Faculty of Electronic several drawbacks, such as limited compatibility, they often
Engineering, Aleksandra Medvedeva 14, 18000 Niš, Serbia, E-mail:
require additional hardware accessories required and cost too
nenad.petrovic@elfak.ni.ac.rs
much [12]. For that reason, it was decided to rely on
JavaScript libraries for development of web AR and VR
applications presented in this paper.

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 33


Fig. 2. Metamodel used for AR/VR application design notation

AR.js1 is an open-source JavaScript library for development application model is forwarded in JSON format to code
of augmented reality applications which are run in a web generator. Moreover, the code generator parses the received
browser. It provides wide compatibility and solid performance JSON application model in order to extract the necessary
on mobile devices without high hardware requirements, information used for code generation. Finally, the code of the
performing at impressive 60 frames per second, even on older desired AR/VR application is generated as HTML page with
smartphones [13]. It is quite simple and intuitive, making the JavaScript code relying on AR.js and/or Three.js.
development of full augmented reality applications in just
several lines of HTML and JavaScript code [13]. It includes a AR/VR app
1 Code generator3
huge set of built-in features and is integrated with other modelling tool 2

JavaScript libraries that enable loading 3D objects, position User AR/VR app
and location handling, usage of different camera marker Fig. 1. Framework overview: 1-Drawing application model 2-
presets and many others. Application model in JSON format 3-HTML page with JavaScript
code
On the other side, Three.js2 is an open-source, JavaScript-
based library and API which enables rendering rich animated
B. Application Modelling Environment
3D computer graphics inside a web browser. It relies on
WebGL3, but offers a higher-level interface to advanced
A domain-specific notation is used for modelling AR/VR
capabilities, making construction of complex multimedia
applications, described as a UML metamodel shown in Fig. 2.
applications much easier, such as loading different types of 3D
As it can be seen, there are two types of application: AR
models and their animation [14]. On top of that, Three.js
and VR. Depending on application type the final output will
enables easy conversion of traditional 3D scenes into VR
be either AR.js or Three.js-supported JavaScript code packed
applications4.
inside HTML page. Each application consists of (input-
>output) mappings. There are several input methods which
III. IMPLEMENTATION are supported: printed markers (QR, barcode or other), spoken
phrases (relying on speech-to-text framework in JavaScript
A. Framework Overview [15]), keypress events or specific messages received from
server. In case when server messages are used as input
In this paper, a framework for rapid AR/VR application method, the address of that server has to be set. On the other
development (aiming mostly stage performance applications) side, there are possible outputs which occur when specified
is proposed. An illustration of the proposed framework is input is detected: sound file, 3D object model or text. The
given in Fig. 1. User draws a diagram which describes sound can be one-shot or loop, while 3D object and text can
behaviour of the desired AR/VR application for music stage be either static, rotating or include custom animation. Several
performance. For that purpose, a domain-specific visual formats for both sounds and 3D models are supported.
notation is used. Once the modelling is done, the constructed However, the messages can be also used as output in cases
when message has to be sent when specific input occurs. The
1
corresponding code for messages leverages AJAX5 which
https://github.com/AR-js-org/AR.js
2
https://threejs.org/
3
https://www.khronos.org/webgl/wiki/Getting_Started
4 5
https://threejs.org/docs/#manual/en/introduction/How-to-create-VR-content https://www.w3schools.com/xml/ajax_intro.asp

34
allows updating the content without reloading the page by or other) is added to the application code. Furthermore, for
sending the requests or receiving page updates in the each of the possible outputs for the considered input method, a
background. code that produces the desired type of output is appended
The visual modelling tool using the described notation inside the event handler for specific input value (for example
based on metamodel is developed within Node-RED6 barcode “1” or keypress of “a”). For sounds and 3D models it
environment, as in [6]. For that purpose, custom nodes were is checked whether loop/rotate parameters are set. Once all the
created. In Fig. 3, a screenshot of the modelling tool is given. mappings present within the model are traversed, the final
The illustrated example shows AR application model that code is stored in a HTML page file.
consists of two mappings for barcode markers, where each of
them produces different looping sound and rotating object as IV. CASE STUDY
output. The model is exported in JSON format.
Edit sound node
Modelling elements sound
path penenadpi/synth In this paper, a case study application combines the
marker
marker
format .wav utilization of both augmented and and virtual reality for music
speech
object loop true
stage performance. It consists of two distinct parts: AR music
sound mixing interface and VR song visualizer. An overview of the
message
sound application is given in Fig. 4.
marker
object

object Loop 2
Fig. 3. Screenshot of AR/VR application modelling environment 1 2A
based on Node-RED
AR app Sound mix Loop 3
C. Code Generation Loop 1 Loop 2 Loop 3 2B

Performer
In Listing 1, pseudocode of the code generation algorithm is Server
given.
Input: JSON application model
Output: HTML page with AR.js/VR.js code 3
Steps:
1. Parse JSON application model;
2. Get all mappings from model; 4 Audience
3. For each mapping in model.mappings VR app
4. Open event handler template for mapping.input;
5. Use mapping.input as condition for handler trigger;
Fig. 4. AR/VR web application for music stage performance: 1-Loop
6. Get possible outputs for given mapping.input; play/stop event 2a-Loop added or removed from mix 2b-Event
7. For each output in mapping.outputs message sent to server 3-VR application code generation 4-Virtual
8. If(mapping.output instance of object) reality scene
9. If(object.animation is rotate)
10. Generate code for loading and rotating 3D model; The AR-based for loop sampling enables live mixing of
11. Else
12. Generate code for loading 3D model;
multiple sound loops. Its target users are music performers. In
13. End if; order to use the AR application, a paper with barcode markers
14. End if; is needed. By pointing camera to the paper, a 3D cube appears
15. … over each of the makers. Each of the cubes has different color
16. If(mapping.output instance of sound)
17. If(sound.animation is loop)
to make the distinction of sound loops easier to the user. A
18. Generate code for loading and looping sound; sound loop is assigned to each of the markers. The sound loop
19. Else is included or excluded from the generated music mix by
20. Generate code for loading 3D model; placing hands over the corresponding barcode marker. When
21. End if;
22. End if;
loop is stopped, the corresponding cube disappears from the
23. If(mapping.output instance of message) view (as shown in Fig. 5).
24. Generate code for AJAX call to send message.value
25. End if;
26. End for each
27. Close event handler template;
28. End for each
29. End
Listing 1. Algorithm for code generation starting from application model

First, the JSON application model exported from modelling


environment is parsed in order to retrieve all the mappings
from application model. After that, for each mapping’s input, Fig. 5. A screenshot of the author playing his song “Relayman” using
a corresponding event handler (marker read, keypress, speech the AR application7

6 7
https://nodered.org/ https://www.youtube.com/watch?v=LL2yGAJ06UQ

35
Moreover, each time different loop play/stop event is just several minutes. Moreover, an example application for
triggered, a message about the event is sent to the server. The music stage performance leveraging both augmented and
role of this server is to accept the messages generated by the virtual reality was presented. This application enables
AR application and to generate the desired virtual reality affordable and convenient live performance even on distance
scene for each loop combination. On the other side, the VR (without any additional dedicated hardware), which has
application aims the audience. The VR application code is become an important aspect during the recent COVID-19
delivered by server to them within their web browser, giving pandemic crisis due to social distancing which led to
them the impression of presence in a virtual scene which cancellation of music events worldwide.
depends on the music played by the performer. This way, VR
application gives the provides the ability to generate dynamic
song visualization in realtime. An example of VR scene
ACKNOWLEDGEMENT
shown to the audience when synth loop is played is given in
Fig. 6. This work has been supported by the Ministry of Education,
Science and Technological Development of the Republic of
Serbia.

REFERENCES
[1] I. Poupyrev, R. Berry, M. Billinghurst, H. Kato, K. Nakao, L.
Baldwin, and J. Kurumisawa, “Augmented Reality Interface for
Electronic Music Performance”, 9th International Conference
on Human-Computer Interaction, pp. 805-808, 2001.
[2] C. Yavelow, “The Impact of MIDI upon Compositional
Fig. 6. Synth sequence VR scene rendered using Three.js Methodology”, ICMC 86, pp. 21-26, 1986.
[3] J. M. Eargle, “An Overview of Digital Audio Workstations”,
Handbook of Recording Engineering, pp. 439-446, 1996.
V. EVALUATION [4] I. Poupyrev, R. Berry, M. Billinghurst, H. Kato, K. Nakao, L.
Baldwin, and J. Kurumisawa, “Augmented Reality Interface for
A laptop equipped with Intel i7 7700-HQ quad-core CPU Electronic Music Performance”, 9th International Conference
running at 2.80GHz, 16GB of DDR4 RAM and 1TB HDD on Human-Computer Interaction, pp. 805-808, 2001.
[5] P. Jolivet, P. Oomen, G. Pribek, “Large Room-scale Virtual
was used for evaluation. In Table 1, the evaluation results for
Reality in Audio Visual Arts using Sensors and Biofeedback”,
case study application are given. Time needed for each of the LINKs serie 3-4, Spatial Sound Institute, pp. 168-179, 2019.
steps necessary for case study application creation is [6] N. Petrovic, M. Tosic, “SMADA-Fog: Semantic model driven
considered and compared to time needed for manual approach to deployment and adaptivity in Fog Computing”,
development of such applications without using the proposed Simulation Modelling Practice and Theory, 102033, pp. 1-25,
framework. Both AR and VR parts of the case study 2019. https://doi.org/10.1016/j.simpat.2019.102033
application were considered separately. The first column [7] A. G. D. Correa, G. A. de Assis, M. Do Nascimento, I.
denotes application’s name. The second column shows the Ficheman, R. de D. Lopes, “GenVirtual: An Augmented Reality
time needed for manual creation of application model using Musical Game for Cognitive and Motor Rehabilitation”, 2007
Virtual Rehabilitation, pp. 1-6, 2007.
the tool. Moreover, the third column is the time needed to
[8] K. Nishida, A. Yuguchi, K. Jo, P. Modler, M. Noisternig,
transform the corresponding application model to functional “Border: A Live Performance Based on Web AR and a Gesture-
AR/VR web application code. Finally, the last column is the Controlled Virtual Instrument”, International Conference on
approximate time needed for entirely manual creation of case New Interfaces for Musical Expression, pp. 43-46, 2019.
study applications, without relying on the framework [9] X. Lin et al., “Virtual Reality-Based Musical Therapy for
proposed in this paper. Mental Health Management”, CCWC 2020, pp. 1-5, 2020.
[10] Y. Zhang et al., “Interactive Virtual Reality Orchestral Music”,
TABLE I SIGGRAPH 2019, pp. 1-2, 2019.
EVALUATION RESULTS [11] I. A. Zolkifly, L. K. Cheng, Z. A. Sabot, “Virtual Reality
Musical Museum”, Annual International Conferences on
App. Model Generation Manual Computer Games, Multimedia and Allied Technology, pp. 29-
[s] [s] [h] 34, 2008.
[12] X. Qiao, P. Ren, S. Dustdar, L. Liu, H. Ma, J. Chen, “Web AR:
AR 339 0.73 5.5
A Promising Future for Mobile Augmented Reality--State of the
VR 621 1.28 9 Art, Challenges, and Insights”, Proceedings of the IEEE, pp. 1–
16, 2019.
[13] J. Etienne, Creating Augmented Reality with AR.js and A-
VI. CONCLUSION Frame [online]. Available: https://aframe.io/blog/arjs/
[14] J. Dirksen, Learning Three.js: The JavaScript 3D Library for
In this paper, a framework for automated generation of WebGL, Packt Publishing, 2013.
AR/VR applications aiming music stage performance is given. [15] Converting from Speech to Text with JavaScript [online].
The proposed approach dramatically reduces the time needed Available: https://tutorialzine.com/2017/08/converting-from-
for development of such applications – from several hours to speech-to-text-with-javascript

36
The Application of Search Engine Optimization in
Internet Marketing
Aleksandar D. Andonov
Abstract – In the past few years, more and more visitors to introduction of the study, while Section II reflects a thorough
the internet are approaching webpages through search engines, background of SEO and its impact on internet marketing.
instead of utilizing direct links from the other websites. Due to a Section III provides a comprehensive review of literature from
large variety of marketing strategies available for the companies, previous studies, Section IV shows a technique for improving
it has become quite difficult to select a particular strategy that
SEO, and Section V will include the results and discussion in
can enhance the business accordingly. However, SEO is one of
the potential techniques of internet marketing which allows accordance with the research topic. Lastly, in Section VI some
businesses to show their online presence, by improving their conclusions are given, while certain recommendations are also
ranks online and directing the flow of online traffic accordingly. provided accordingly.
Thus, this research study aims to investigate how SEO influences
internet marketing in the modern world. A. Research Question
Keywords – Search engine optimization, Internet marketing, This research article will focus on the below-mentioned
Online traffic. research question throughout the study: How search engine
optimisation influence internet marketing?
I. INTRODUCTION
II. BACKGROUND
With a number of marketing strategies available for the
businesses, it is quite hard to recognise which particular The concept of SEO was first put forward in 1991 when
strategy is best for the business. Before investing in the the first ever website was launched on the internet. In the past,
marketing budget, it is important for organisations to the term SEO was recognised as SEM (Search Engine
thoroughly research every available marketing strategy in the Marketing), as this specific technique was extensively used to
market. However, Search Engine Optimisation (SEO) is one enhance the marketing of business products and services.
of the potential internet marketing applications, which Search engines have comprehensively altered the ways
enhances organisation's website and its online presence, both through which online users find information, shop for services
off-page and on-page in order to boost its ranking within and products, conduct research, connect with others, and
search engines such as Google. SEO is an advanced technique entertain oneself. However, in the current world scenario,
of making the website easier to categorise and easier to find there are a number of search engines on the internet which
for the users. It helps the user to find a particular business ultimately offers businesses an opportunity to optimise their
among millions of other companies. Reports suggest that website and improve its ranking so that the maximum number
about 14 billion online searches take place every month. of online customers can be served through its platform [2].
These figures suggest the strong influence of SEO on internet
marketing. As the website ranks higher in the online search
engines, it will eventually obtain a greater number of clicks III. LITERATURE REVIEW
from the users. Hence, the more the clicks website receives,
the greater number of individuals will visualise the website, A. Evolution of SEO in the Marketing World
thus, increasing the chances of online customers to find the
service or a product of their interest. However, the business In the last decade of the 20th century, the landscape of the
revenues and conversion rate thoroughly increases, as the search engine was highly competitive. In the beginning, on-
website ranks higher in the search engine [1]. page activities were considered as the only channel to perform
The main goal of this article is to thoroughly study the any kind of SEO. This involved ensuring that the web content
significance of SEO, and its influence on internet marketing. is relevant and good enough to attract the audience, and
To accomplish this goal various research studies will be taken whether the keywords are repeating regularly throughout the
into consideration that will help to determine the importance content present on the meta tags and website. In the past, if
of SEO in the current internet marketing world. However, the one business had to outrank the other, they would have to
article is organised as follows; Section I provides a brief ensure that their number of keywords are higher from their
competitor. However, today such practices are known as
Aleksandar D. Andonov is with University of Library Studies and spamming. From 1994 to 1999, a variety of search engines
Information Technologies, Faculty of Information Studies, came into operation including Yahoo, Backrub, Search Engine
Boulevard "Tsarigradsko shose" 119, 1784 Sofia, Bulgaria, E-mail: Watch, and Goto. But all these search engines that were
a.andonov@unibit.bg utilised for SEO were left behind when Google came into the

978-1-7281-7142-5/20/$31.00 ©2020 European Union 37


market [3]. organisation. Relatively, utilising tactics of SEO to spread the
In 2000, Google partnered with Yahoo in order to boost messages regarding ground-breaking services, products, or
its search engine, however, this specific decision of Yahoo is good deals, can act as a game-changer for the businesses. It is
considered its worst move in the search engine history, as important for businesses to ensure that their brands are
Google was hardly known previously, but when it partnered properly visible across those online places where the users
with Yahoo, the end result was that the each and every search needed them the most. Thus, local SEO will play its part by
result of Yahoo stated: “Powered by Google”. Thus, Yahoo enhancing the visibility of the brand and allowing potential
eventually ended up introducing its biggest competitor in the consumers to find the relevant answers which will be
online market that is Google. Until this point, SEO involved thoroughly answered by the businesses. SEO is also quite
ranking of webpages based on basic site structure, domain beneficial for businesses in terms of cost. Studies suggest that
names, and on-page content. But at the same time, Google’s SEO is relatively much cheaper in comparison to other
PageRank algorithm and web crawler were considered quite marketing tactics, while the outcomes are much significant in
revolutionary for the retrieval of data. Google considered both terms of the brand’s bottom line and benefits. By
off-page and on-page factors, which means it monitored both implementing an SEO strategy, businesses do not pay a cost
the quality and quantity of external links that directed users to for marketing, instead, they make an investment with an aim
the website, along with the anchor text utilised in the content. to further prosper the business. SEO can be considered as a
With two potential updates in algorithm during 2011 and long duration strategy, as it can put an effective impact on the
2012, the SEO of webpages was highly affected, as Google business initially depending on the actions undertaken,
attempted to remove all the search results from its online however, these potential actions will put an everlasting impact
directory in order to reward the best quality websites [4]. that will continue for several years. With the evolution of the
However, in the current world scenario, with the market, it is best for businesses to follow the changes and
advancement of search engine, accomplishing the highest rank trends closely. Even if the website does not implement the
through SEO is no longer enough to direct the online traffic intense recommendations of SEO, by following the basic
towards webpages. In the past few years, the Search Engine steps, the businesses can accomplish and provide a decent
Result Pages (SERP) are heavily cluttered with article listings, experience to the online users [7].
links, videos, images, and advertisements. Thus, it is quite
easy for the top-ranked result to get jumbled up with the C. SEO and Internet Marketing
features of other pages. Still, the key phrase and keyword
optimisation is of great importance, but at the same time, the SEO is a technique to alter or develop a webpage in an
SEO experts now must consider other offsite components as optimised manner so that it can become more relevant as
well [5]. compared to other pages on the internet search engine.
However, the process of SEO can be divided into five major
B. Significance of SEO in Business components including, off-page optimisation, on-page
optimisation, selection and research, indexing the site through
The utilisation of SEO by business organisations can put a the search engine, and keywords. How the search engine
huge impact on their online marketing strategy. SEO becomes operates, which search engines are highly preferred by the
more important for those businesses that have a separate online audience, what users search for, and how keywords are
website through which the companies cater the needs of the entered within the search engines, are some of the potential
consumers. Each website has various needs in terms of SEO, elements which are considered in the strategy of SEO internet
but it is quite rare that these needs are determined by the marketing. Searching is one of the potential practices of the
industry or the business. Organic search is considered as the online audience. Several users search different kinds of
potential source for attracting the traffic of the business information on a mundane basis, and about half of the traffic
website, and it is also an important element of the purchasing on the internet starts with the search engine. Marketing a
funnel which eventually leads the users to carry out the website involves enhancing the amount of links. The
engagement or conversion. However, being visible as an significance of SEO can be determined by the fact that it
adequate platform by search engines, such as Google might increases the traffic volume directed to the sites of the
always favour the business in terms of enhanced brand individual through the search engine, thus, making it a reliable
reputation, brand awareness, and sales. Moreover, SEO plays technique for effectively improving exposure and visibility of
an important role to develop a robust foundation for the the webpage. Also, it can help to enhance customer interaction
businesses by developing an attractive website having and contributes towards improving the overall traffic on the
effective and clean user experience which can be easily website [8].
discovered through the search engine. At the same time, The main aim of the entire SEO process is to accomplish
developing an authoritative business brand demands high ranking in the results of a search engine when a user
commitment, effort, and patience, while it also relies on enters specific keywords or phrases in it. Apparently, there is
providing quality and valuable service or product that permits not much difference between internet marketing and SEO, as
customers to put trust on that specific brand [6]. both incorporate the same skills and executes the same
Similarly, SEO can also put a huge impact on the business functions. Through SEO users get engaged in developing an
buying cycle. From the perspective of the buyer, this might be online existence. In practice, the consultant of SEO usually
considered as one of the biggest benefits for the business searches for different areas of digital marketing. The

38
contemporary trends involve optimising a webpage and
perform search engine marketing. For instance, there are
certain elements that take help from SEO in order to select the
potential keywords, such as mobile advertising, behavioural
marketing, contextual marketing, blogging through SEO
content, video content advertising, viral marketing, and social
media marketing. Hence, for this purpose, it is quite important
to have a strong, SEO and internet marketing strategy [9]. The
below Fig. 1 presents how the SEO method is based on
internet marketing reflects.
Fig. 2. Internet Marketing Strategy through SNS and SEO

IV. RANDOM INTERNAL LINKING


The SEO based on backlinks most of the time is pointing
to the home page of the website. However, in e-commerce, the
home page is not so important. A visiting customer will be
annoyed when looking for an item and is redirected to the
main page to either repeat the search or navigate through
categories and subcategories. The good SEO optimized
website should implement a technique for improvement of
Fig. 1. SEO as a Subset of SEM
online marketing and user experience.
There is a so-called SEO “juice” that is flowing through the
Studies suggest that the impact of branding as evidenced home page to the internal pages via links. Search engines are
in the results of the search engine plays a vital role in following the links to discover new pages; therefore, a good
enhancing awareness of the products of business vendors. It structured linking is very important. The main problem in this
has been found out that SEO not only enhances direct traffic approach is where there are too many categories and
through clicks, but it also promotes profiles of brands within subcategories. The SEO developer is not able to place a direct
the setting of online retail. In recent years, the SEO link at the home page of all important pages. A user will get
application in internet marketing has altered dramatically, as confused and could possibly leave the page. Furthermore,
Google search engine is now on the top, carrying out at least search engines are not following and indexing approximately
60 percent of the overall web searches. Due to high 100 links per page. That will make some internal pages
competition in the SEO world, the bid prices are driving inaccessible for crawlers and could never get indexed even if
through the roof, thus, making it quite impossible for the they are in the sitemap file. A useful technique that is used in
limited budget virtual advertisers to obtain top ranking. As a this case is to have a random link appearing on every page
result, it remains no longer feasible to bid on the highest reload. This is a way to present the internal link to the web
searched keyword, and businesses are forced to enhance their crawler in order to get it indexed. Often revisiting the main
campaign by including multiple search engines and different page by crawlers can be set by meta tags, which will result in
keywords. However, in such a kind of environment, SEO can several new pages to be discovered, indexed and pushed up.
offer better outcomes on investment, as compared to other Using such dynamic links from the home page, makes the
channels of marketing, without any kind of obstacles [10]. crawler “think” of the new link as something very important.
Apart from this, studies demonstrates that SEO along with If this technique is presented after the crawler has visited all
Social Networking Sites (SNS) can help to create a strong available pages, this will be something new and interesting for
internet marketing strategy. The significance of marketing the search engine to index.
through online channels is a well-proven fact. A business
organisation for the promotion of its services and product V. RESULTS AND DISCUSSION
must incorporate three important elements including a well-
defined SEO process, the SNS, and the official website [25]. The evaluation and implementation of SEO in online
In recent years, improving webpage ranking through the marketing demonstrated in the previous section of the article
utilisation of appropriate marketing strategy has become a is discussed in this section.
pivotal issue. SNS has thoroughly infiltrated in people’s
mundane lives, as platforms like LinkedIn, Twitter, and A. Influence of SEO on Online Marketing
Facebook, provide users an opportunity to share website links,
photos, and videos of products within the cyber environment. From the results of Ho et al [12] study, it has been found
Thus, by combining SNS and SEO (Fig. 2), the business out that the SEO process can put a strong influence on the
organisation can ensure to have the best marketing strategy, as average time of visits, bandwidth variation, ranking, number
these techniques make sure that the online audiences are of hits, pages, and visits. Although the result of this particular
directed to the particular webpage, and are aware of the study suggests that the number of hits, pages, and visits did
product and services at the same time [11]. not increase significantly, but, on the other hand, the

39
bandwidth has been enhanced, while the ranking of the both are focused on search placement of a website on the first
website has also been effectively increased over the time page. When a particular website is regularly placed on the top
period due to SEO. As can be analysed from (Fig. 3) that the of the search of the keyword, this usually suggests that the
ranking of the website which was taken into consideration in business is the potential player in that sector. Through SEO,
this particular research work was 14th in July 2007, however, the search engines will automatically give a constructive
with the passage of time the site ranking was enhanced until it response to the users regarding its complete portfolio and
reached the 2nd ranking in June 2008 [12]. what it delivers to them. Thus, it will be the responsibility of
the SEO manager to fulfil the user’s expectations in order to
complete the process of branding [14].

B. SEO and its Effect on Online Marketing Cost

Studies indicate that SEO provides a cost-effective


solution for online marketing. Results suggest that online
marketing through SEO is not a costly strategy, because it
attracts businesses to do permanent investment, without
indulging in the complexity of advertising. Once, the website
is ranked at the top of Google search, the company will be
able to achieve continuous sales. Due to the inbound nature
of SEO, businesses get an opportunity to save potential sums
of money in comparison to outbound tactics such as cold
Fig. 3. Monthly Ranking of the Website calling. Although cold-calling can also act as an effective
technique, but it has been found out that the generated cost
Thus, from the above discussed results, it can be said that through cold-calling is much greater as compared to SEO.
SEO can play a crucial in alleviating the business of the Moreover, since, SEO potentially focuses on those users that
organisation. Studies suggest that in the world of digitisation, are regularly searching for the services or products, therefore,
it has become quite significant for the organisations to keep the resulting online traffic is much more qualified as
themselves ahead of their competitors. In order to excel in this compared to other strategies of marketing, thus, resulting in
marketing technique, it is compulsory for the businesses to cost-effectiveness for the businesses [15].
ensure their visibility online. Since SEO can be extensively Since SEO delivers quantifiable and trackable outcomes,
utilised to promote service, product, or the entire brand regardless the businesses have a non-e-commerce or e-
through digital devices such as radio, email, and mobile, commerce website, therefore, the complexity related to ROI
hence, companies have a huge opportunity to boost their sales gets effectively minimised. The agencies of SEO are usually
accordingly [12]. able to monitor nearly every element of their marketing
Since the above mentioned results show a potential impact strategies such as an increase in conversions, traffic, and
of SEO on online ranking of the businesses, thus, this rankings. A wide variety of analytics also enhances the
particular result can also be discussed through research studies capability of businesses to reach within the granular level and
which demonstrate that website that is associated with higher track the information of demographics and other metrics of
rankings through the search engine, has a better chance to engagement associated with individuals that are interacting
attract the attention of visitors. It has been found out that users with the website. Through SEO, by monitoring the channel
usually believe upon the results shared by the search engine, selected by the online users to complete the process of sales,
and when the company accomplishes a top position within the the company can be able to introduce further cost-effective
search engine, it directly signals to the users that this solutions in order to increase the customer base to the
particular website is more effective and can be trusted than maximum extent possible, which eventually results in an
other. The higher the business will be in the search rankings, increase of revenues of the company [16].
the more traffic and clicks the website will generate, hence, From the studies, it has also been found out that in
enhancing user experience, and allowing consumers to comparison to PPC, SEO is more cost-effective. The reason
become regular buyers [13]. behind this is because SEO involves organic channels to
Apart from this, the results of research studies also produce online traffic and accomplish huge sums of money,
demonstrate that SEO acts as a potential source for business although it might take some time, but the outcomes in the long
websites in terms of improving its branding by building run are much more authentic as compared to PPC. PPC might
credibility and trust within the users. The author of the study produce rapid traffic, but from a broader perspective, this
found out that a majority of the online population views those online traffic is not sustainable. Paid marketing like PPC only
businesses adequate that are presented on the first page of the benefits the company for a short period of time by generating
search engine. Thus, it is important for the SEO users to an average amount of revenues very quickly. Thus, PPC is a
ensure that their website is subjected to the first page, and it total wastage of both money and time, and therefore,
should keep the users there during return visits in order to marketing companies usually adopt SEO with an aim to make
achieve positive reviews and satisfied customers altogether. large profits for a longer period [17].
SEO can enhance the branding of the website in a similar way
through which it aids to develop credibility and trust because

40
C. Impact of SEO on Business Performance Through reliability, accessibility, and durability.
Online Marketing

The findings from the research studies demonstrate that REFERENCES


SEO can be the imperative solution for the organisations in
[1] A.N. Hidayanto, M.S. Adha, M.A. Jiwanggi, and T. Melia, “A
order to thoroughly survive in the current competitive
Study of Impact of Search Engine Optimisation to Internet
environment of the market. From the results, it was found out Marketing Strategy”, International Journal of Services,
that the users of the internet are most likely to select the Economics and Management, vol. 4, no. 4, pp.298-316, 2012.
business website from the top 5 results provided on the initial [2] A. Heinze, G. Fletcher, and C. Chadwick, “From Search Engine
page of the search engine. Thus, SEO enhances business Optimisation to Search Engine Marketing Management:
performance, by promoting its feature across the social bloc. It Development of a New Area for Information Systems
has been found out that users who find a particular website Research”, UK Academy for Information Systems Conference
through Yahoo or Google are more likely to promote it on Proceedings, 2010.
Twitter, Facebook, Instagram, and other channels of social [3] J. Grappone, G. Couzin, Search Engine Optimization (SEO): An
Hour a Day, John Wiley & Sons, 2011.
media. Hence, SEO can be quite significant for the running
[4] J. L. Ledford, Search Engine Optimization Bible, vol. 584, John
efficiency of the business website. It provides both direct and Wiley & Sons, 2015.
indirect benefits to the website stakeholders. In terms of [5] M. N. A. Khan, A. Mahmood, “A Distinctive Approach to
direct, SEO ensures to enhance the traffic of the search Obtain Higher Page Rank Through Search Engine
engine, while the indirect benefit is that it offers a coherent Optimization”, Sādhanā, vol. 43, no. 3, p. 43, 2018.
checklist (framework) for utilisation before the content is [6] G. Egri, C. Bayrak, “The Role of Search Engine Optimization
published on the website. Thus, by improving the rate of on Keeping the User on the Site”, Procedia Computer
conversion, SEO allows businesses to transform their online Science, vol. 36, pp. 335-342, 2014.
visitors of the website into potential customers. Through this [7] E. Enge, S. Spencer, J. Stricchiola, and R. Fishkin, The Art of
SEO, O'Reilly Media, Inc., 2012.
phenomenon, the best targeted SEO will aid in attracting
[8] N. Yalçın, U. Köse, “What is Search Engine Optimization:
genuine online users towards a particular website, which will SEO?”, Procedia-Social and Behavioral Sciences, vol. 9, pp.
have true interest in the selected business. Thus, this will help 487-493, 2010.
to enhance the conversion rate by transforming visitors into [9] Educba, Importance of SEO in digital marketing. Available at:
consumers, and eventually increasing the sales of the services https://www.educba.com/seo-in-digital-marketing/. Accessed
or products. Also, it has been found out that SEO plays an on: 18th April 2020.
important role to boost customer engagement altogether. [10] J. Jantsch, P. Singleton, SEO for Growth: The Ultimate Guide
Aligning the needs of the customer to improve service or for Marketers, Web Designers & Entrepreneurs, SEO for
product can be quite crucial for the company. But when Growth, 2016.
[11] B. Y. Shih, C. Y. Chen, and Z. S. Chen, “Retracted: An
company’s blog or web page is optimised through search
Empirical Study of an Internet Marketing Strategy for Search
engine, it will find itself in a strong position to interact and Engine Optimization”, Human Factors and Ergonomics in
engage with customers [18]. Manufacturing & Service Industries, vol. 23, no. 6, pp. 528-540,
2013.
VI. CONCLUSION [12] L. H. Ho, M. H. Lu, J. C. Huang, and H. Y. Ho, “The
Application of Search Engine Optimization for Internet
SEO is one of the significant applications of internet Marketing: An Example of the Motel Websites”, 2010 The 2nd
International Conference on Computer and Automation
marketing that can aid to enhance the company’s website
Engineering (ICCAE), vol. 1, pp. 380-383, February 2010.
and its online presence both off-page and on-page, in order [13] A. Pandey, “Optimising Online Marketing Resources: SEO
to improve its ranking within the online search engines. Strategy”, International Journal of Technology Marketing, vol.
Thus, from the findings of the study, it was evaluated that 7, no. 3, pp. 267-277, 2012.
the process of SEO can put a strong impact on the website’s [14] A. Enaceanu, “SEO Techniques for Business
visit time, bandwidth variation, ranking, and the number of Websites”, Database Systems Journal, vol. 1, pp. 23-26, 2010.
hits. Further, it was investigated that online marketing [15] A. K. Kirtiş, F. Karahan, “To Be or Not To Be in Social Media
through SEO is not an expensive strategy. The current study Arena as the Most Cost-Efficient Marketing Strategy After the
also suggests that in comparison to PPC, SEO is more cost- Global Recession”, Procedia-Social and Behavioral
Sciences, 24, pp. 260-268, 2011.
effective, while it was found out that SEO can act as an
[16] B. Skiera, N. Abou Nabout, “Practice Prize Paper—PROSAD:
imperative solution for the companies to survive in a A Bidding Decision Support System for Profit Optimizing
competitive market. Search Engine Advertising”, Marketing Science, vol. 32, no. 2,
Thus, from the findings of the study, it can be pp. 213-220, 2013.
recommended that businesses, especially start-up businesses [17] W. T. Kritzinger, M. Weideman, “Search Engine Optimization
should adopt SEO techniques in order to attract a maximum and Pay-Per-Click Marketing Strategies”, Journal of
number of audiences in a minimum amount of time. Organizational Computing and Electronic Commerce, vol. 23,
Moreover, it can be recommended that future no. 3, pp. 273-286, 2013.
researchers should also focus on SEO and SNS collectively [18] R. Mahajan, “Use of Social Media as a New Investigative Tool
in Marketing Research for Small Business”, International
in order to bring awareness among the individuals regarding
Journal of e-Education, e-Business, e-Management and e-
the benefits of both these aspects in terms of costs, Learning, vol. 5, no. 3, p. 129, 2015.

41
Improving the Concept of Medication Vending Machine
in the Light of COVID-19 and other Pandemics
Dragan S. Jankovic1, Aleksandar M. Milenkovic2 and Andjelija I. Djordjevic3
Abstract – Pandemics are usually followed by a large number The first vending machine in the US was built in 1888 by
of infected people, enormous number of critical patients and the Thomas Adams Gum Company [3] selling gum on New
unavoidable fatal outcomes. If the disease is transmitted by York City train platforms. The idea of adding games to these
contact, one of the most important measures for preventing the machines as a further incentive to buy came in 1897 when the
spread of the disease is social distancing. Ensuring social
Pulver Manufacturing Company added small figures, which
distancing is one of the most difficult tasks of the governments of
countries during the pandemic. It has been shown in practice would move around whenever somebody bought some gum
that any measure or way to increase social distance significantly from their machines. This idea spawned a whole new type of
reduces the number of victims and shortens the duration of the mechanical device known as the "trade stimulators".
pandemic. This paper proposes a modification of the existing One of the challenging areas of using a vending machine is
concept of a vending machine for distributing drugs (medication the pharmacy. There are examples of medicine vending
vending machines – MVM), which would enable better social machines (MVM) which are used in the last ten years in
distancing in the case of pandemics/epidemics, such as the different countries. The drug vending machines have been
current COVID-19 pandemic. The proposed modification is used in many countries for the last ten years (US, Canada,
adapted to the healthcare system organization that exists in the
UK, Switzerland, and South Africa).
Republic of Serbia and can be implemented in similar health
care systems, such as in the neighboring countries (Western Despite all current usage of medicine vending machine, we
Balkan countries). cannot say that they are widely used and that all potential
which they offer is appropriately and adequately exploited.
Keywords – Medication vending machine, COVID-19, There are restrictions to the list of available drugs which is
Pandemic, Social distancing, Smart city. distributed by means of drug vending machines. Usually in
this way painkillers, oral contraceptives (“morning after pill”),
I. INTRODUCTION baby food, etc. are distributed.
Vending machines are widely used in many domains There are different types of MVM but more or less they
around the world, such as a vending machine for food, drinks, have the same set of components and supported
cigarettes, newspapers, etc. They started a long time ago. The functionalities. In [4] is considered one variant of MVM. The
first vending machine was the coin-operated machine for holy major MVM components are: a scanner to take the input from
water dispensing constructed in 17th century by Hero of a user, a system that includes servo motors for dispensing the
Alexandria, Greek mathematician and engineer from medication, large storage space to store the pills, sensors to
Alexandria [1]. detect the motion of pills, an inventory monitoring system to
The first modern coin-operated vending machines were keep track of the storage, an industrial standard vertical foam
introduced in London, England in the early 1880s, dispensing fill machine to pack the medication separately and a non-
postcards. The machine was invented by Percival Everitt in contact laser inkjet printer to print the description which
1883 and soon became a widespread feature at railway includes the time at which the medicine must be taken. The
stations and post offices, dispensing envelopes, postcards, and inventory monitoring system also keeps track of the expiry
notepaper. The Sweetmeat Automatic Delivery Company was date of each batch of medicine and sends alert to refill the
founded in 1887 in England as the first company to deal storage when the pills run out. It also holds an inbuilt system
primarily with the installation and maintenance of vending to receive money from the user for the drugs that are
machines. In 1893, Stollwerck, a German chocolate dispensed. All these systems are monitored by a central
manufacturer, was selling its chocolate in 15,000 vending microprocessor, which is programmed to receive input from
machines. It set up separate companies in various territories to the user via the scanner and to actuate and control all the
manufacture vending machines to sell not just chocolate, but necessary components required to dispense the medication
cigarettes, matches, chewing gum and soap products [2]. requested by the user.
Different realization of MVM offers a different realization
of some parts of MVM, for example payment system (coins,
1Dragan S. Jankovic is with University of Nis, Faculty of
banknote, pay card, e-Banking, etc.). Therefore, it is not
Electronic Engineering, Aleksandra Medvedeva 14, 18000 Nis, surprising that the price of some MVM is only around 1000
Serbia, E-mail: dragan.jankovic@elfak.ni.ac.rs
2Aleksandar M. Milenkovic is with University of Nis, Faculty of euros.
Electronic Engineering, Aleksandra Medvedeva 14, 18000 Nis, There are different stories of MVM use. In 2014 Arizona
Serbia, E-mail: aleksandar.milenkovic@elfak.ni.ac.rs State University has approved InstyMed machines on its
3Andjelija I. Djordjevic is with University of Nis, Faculty of campus. After the drug store at the health services facility in
Electronic Engineering, Aleksandra Medvedeva 14, 18000 Nis, Arizona State University was closed, school officials set to
Serbia, E-mail: andjelija.djordjevic@elfak.ni.ac.rs

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 42


Fig. 1. Top 10 prescribed drugs at Health Center Nis

replace it with a vending machine for dispensing prescription The proposed use of MVM can be considered as one of the
medication [5]. The InstyMed sending machine was available services provided by smart cities, because the smart city
to students and university employees with approved concept includes improvements in health-care domain too [8].
prescription which could be used during the next month.
Customers have a voucher with unique ID information and a II. REASONS AGAINST USING MVM
24-hour-only code that can transfer over a secure connection There are many obstacles and open-ended issues that have
from the prescription doctor to the machine. prevented the mass use of medication vending machines.
A very interesting real-life story in COVID-19 times comes Some of them are universal while some are specific to some
from Vancouver [6]. The opioid epidemic, which caused the country or region, for example different law regulations. We
declaration of public health emergency in Vancouver four will number some of them. It is the fact that the number of
years ago, is made worse by the COVID-19 pandemic. It is a medications is huge and that it is not possible to make it
crisis on top of a crisis. The usual harm-reduction approach, a available through the vending machines. So, medication
designated location where drugs can be taken with oversight vending machines can be used for a restricted amount of
by first aid-trained staff, is problematic. Such sites constitute a medications. In many cases patients ask a pharmacist for some
public gathering place and have been closed in order to avoid explanation therefore, a simple MVM cannot cover these
public gatherings. The illegal drug supply is getting more cases and patients should request assistance directly at the
expensive and less predictable. Overdose deaths still happen pharmacy, where the staff is available, instead of using MVM.
often. MySafe, Dispension Industries’ opioid-dispensing There are different models of paying for medications. It
ATM, debuted in Vancouver in December 2019 as part of differs from country to country. For example, in the Republic
Tyndall’s plan to replace risky street drugs with safe, of Serbia for a huge number of medications patients should
pharmaceutical-grade opioids and reduce the staggering rate pay only part of price or nothing, while for others they should
of overdoses. About a dozen patients use the machine. All pay full price. Therefore, MVM should support different
report an improved quality of life and less involvement in the pricing/paying models. For most medications, patients must
dangerous street activities that used to pay for their habit. have an adequate prescription. So, MVM should be able to
Previously described cases show that MVM can have a very “read” prescriptions and verify a patient’s request. Of course,
good perspective and there are a set of reasons to use them. there are other practical open questions: where to install
But it is the fact that today’s potential of MVM is not well MVM (near a pharmacy or not), the capacity of MVM,
exploited. There are several reasons. Some of them will be security (especially if there are narcotics), how and when to
discussed in the next chapter. It is quite clear that for the add new medications in a machine, etc.
expansion of MVM use some concepts of MVM should be
changed and adapted to a concrete scenario of use. III. COVID-19 AND EPIDEMICS – NEW CHANCE FOR
One modification we proposed in this paper inspired by the MEDICATIONS VENDING MACHINES
actual COVID-19 pandemic and effort of all countries to
reduce virus SARS-CoV-2 [7] expansion by providing better The emergence and rapid expansion of major epidemics
social distancing as one of the most efficient activities in the have an important influence on the daily lives of people
suppression of the spread of an epidemic. through changing health, economic, working style, social and
political routines. During outbreaks, especially those with a

43
pandemic character, a set of key activities [9] which are MVM placed outside of the pharmacy. Based on some
updated with COVID-19 strategy [10] have been identified identification method (ID, password, QR code at
whose strict implementation has an impact on the reduction of prescriptions, etc.) the patient gets medications from the
a number of infected people and suppression of the spread of machine (which is previously prepared by a person from the
an epidemic. One of the most important activities is pharmacy). The activity diagram for this scenario is shown in
movement reduction and social distancing [11] (decreasing Fig. 2. A small drawback of this concept is the time delay
the number of possible contacts) especially for vulnerable needed until medications become available to the patient from
groups (elderly people, chronic patients) [12]. It is quite clear the time when it notices which of various medications MVM
that health facilities and pharmacies are high-risk places in will use.
relation to the possibility of infection with the virus, Based on proposed concepts MVM should be able to:
especially if the virus is transmitted by droplets i.e. by air such 1. Receive a patient request – there are two scenarios: patient
as SARS-CoV-2 virus. Therefore, the need for people to come sends QR code from the prescription to the concrete
to pharmacies should be reduced, i.e. they should be allowed pharmacy which has MVM; a health-care institution is
to take their medications without entering pharmacies. This connected with pharmacies indirectly via RFZO and all
fact again puts the focus on MVM but it is clear that the prescriptions are available to pharmacies;
existing concept and implementations of vending machines 2. To provide a correct price according to each separate
must undergo significant modification and become part of the request (the price of a medication is not same for all
health care system, and not just independent devices that patients because some patients have a reduction in price
potentially reduce the cost of dispensing some drugs. (different type of health insurance); to provide payment by
One of the limitations of MVM is their capacity, because it coins, banknote (it must return the change) and credit
is not possible to store all existing medicines. It is quite clear cards or e-Banking;
if we have in mind that the number of medications on the 3. To provide a required medication within a reasonable time
Republic Fund of Health Insurance (RFZO) list in the from the arrival of the request and inform the patient about
Republic of Serbia is higher than 3966 while the capacity of a it (or to provide medication within a predetermined time,
machine is less than 200 different kinds of medications. for example 1 hour);
Therefore, MVM could be modified in direction to provide 4. To withdraw medications from MVM if they have not
only the most frequently prescribed medications. The been taken by the patient within the appropriate time
drawback of this approach is the fact that usually one visit period (for example 24 hours) and to remove the requests;
results in more than one prescription i.e. more prescribed 5. To note the number of empty slots in machine i.e.
medications. That means that patient will get prescribed readiness to accept medication for new patients.
medications from MVM only if all prescribed medications are
on the list of most frequently prescribed medications.
Otherwise, the patient again should go to the pharmacy to get
medications which are not on the list of the most frequently
prescribed medications.
Fig. 1 shows top-ten medications prescribed in the Health
Center Nis. We can see that in top-ten medications we have
medications for different diagnoses, but also different
medications used for the same illness (Tensec and Concor are
used for heart illness as well as Binevol which is dominantly
used for hypertension). Practically, that means that a huge
number of medications will not be completely on this list.
So, we must modify MVM in a different way. We propose
a modification of MVM in the way described in the rest of the
paper.
Fig. 2. Sequence diagram
IV. IMPROVED CONCEPT OF MVM
Since very often patients ask the pharmacist for instructions
Improved MVM should solve most of the above-mentioned for the use of the drug (each prescription has a part related to
problems. So, our proposal for improvements follows. the way of use and daily doses and frequency), a function
The concept of MVM as a machine for purchasing which can be added to the MVM, where MVM is printing a
medications from a set of medications available through short instruction for the use of the medication at the request of
machine should be changed to machine for obtaining the patient. It is similar with the interaction with other
medications prescribed by general practitioners to the concrete medications and contraindications. On the other hand, these
patient. In this scenario, the patient has a prescription for services can be independent of MVM and realized as a part of
some medications given by a general practitioner in some the MIS, or as a part of the pharmaceutical information system
healthcare institution (HCI) and it is registered in the medical (PIS).
information system (MIS) of HCI. All prescription data The proposed concept of using MVM implies that the
registered in MIS are sent to the central state repository. This device is located within the pharmacy and is available to
information should be available to a pharmacy that has an patients outside the pharmacy.

44
V. POSSIBILITY AND PERSPECTIVE OF USING MVM however, it can be used in all countries with a similar
IN SERBIA healthcare system, such asex-YU countries.
Besides social distancing there are also some other positive
The proposed concept of MVM can be applied fully in the effects: patients can get medication 24/7, pharmacies can
Republic of Serbia. The facts supporting this claim are as work more efficiently (inexpensive distribution of medication
follows. The healthcare system of the Republic of Serbia is and increased number of patients who can be served).
mainly based of state healthcare institutions divided into In general, the use of proposed MVM can be considered as
three-levels: primary (infirmaries which are spread throughout one of highly important services (in health-care domain)
he whole country), secondary (hospitals which support more provided by smart cities, because the health of citizens is the
specialties), and tertiary – high specialized hospitals, usually most important goal for all governments.
as a part of clinical centers). Patients can get prescriptions
only from the primary health level institution. On the other ACKNOWLEDGEMENT
hand, all primary health level institutions have MIS which This work has been supported by the Ministry of Education,
send data about all prescriptions to the central system (e- Science and Technological Development of the Republic of
Recept in RFZO) which is connected with pharmacies (Fig. Serbia.
3). So, when patients wish to get medications they should go
to any pharmacy, identify themselves (each patient has the REFERENCES
health-care card and unique health-care number (LBO)) and
[1] Heron's Inventions, https://explorable.com/heron-inventions
pay for medications. A special case is provided for chronic (accessed May 23, 2020).
patients who have prescriptions for a 6-month-long therapy [2] L. Oppel, "Drug-Dispensing Machines", BC Medical Journal
(which is extended in COVID-19 pandemic period to 9 vol. 52, No. 1, 2010, https://www.bcmj.org/news/drug-
months). So, in this period chronic patients should go to the dispensing-machines (accessed May 23, 2020).
general practitioner only once and repeat it after 6 or 9 [3] Vending machine, https://www.britannica.com/topic/vending-
months. It is an important feature that directly reduces the machine (accessed May 23, 2020).
number of healthcare institution visits and reduces the chance [4] A. Brolin, M. Ravisankar, V. Gokulnath, M. Harivishanth,
that the patient will be infected with the virus during the visit "Design of automated medicine vending machine using
mechatronics techniques", IOP Conferences Series Materials
[11]. Information from pharmacies go to the RFZO
Science and Engineering, 402 (1):012044, September 2018.
centralized system i.e. for each prescription RFZO has [5] M. Ackerman, "College Campus Allows Vending Machine That
information when medications are taken by the patient. Will Dole Out Prescription Drugs", https://www.thefix.com
/content/college-campus-allows-vending-machine-will-dole-out-
prescription-drugs (accessed May 23, 2020).
[6] A. Bethune, "Could an Opioid Vending Machine from
Dartmouth make Street Drug Users Safer During COVID-19
Pandemic?", https://www.theguardian.pe.ca/business/regional-
business/could-an-opioid-vending-machine-from-dartmouth-
make-street-drug-addicts-safer-during-covid-19-pandemic-
438458/ (accessed May 23, 2020).
[7] C. C. Lai, T. P. Shih, W. C. Ko, H. J. Tang, and P. R. Hsueh,
"Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-
CoV-2) and Coronavirus Disease-2019 (COVID-19): The
Epidemic and the Challenges", Int. J. Antimicrob. Agents, vol.
55, 2020, doi: 10.1016/j.ijantimicag.2020.105924
[8] A. Visvizi, M. Lytras, "Smart Cities: Issues and Challenges",
Fig. 3. Health-care system in Republic of Serbia
Elsevier, June 2019, ISBN: 9780128166390.
VI. CONCLUSION [9] WHO, "Infection prevention and control of epidemic- and
pandemic-prone acute respiratory infections in health care",
This paper proposes a modification of the MVM that should 2014, https://apps.who.int/iris/bitstream/handle/10665/112656/
affect the level of social distancing, which is one of the main 9789241507134_eng.pdf?sequence=1 (accessed May 23, 2020).
measures in preventing the spread of pandemics such as [10] WHO, "COVID-19 Strategy Update", 2020,
https://www.who.int/docs/default-source/coronaviruse/covid-
COVID-19. The proposed modification can have significant
strategy-update-14april2020.pdf?sfvrsn=29da3ba0_19 (accessed
success in the Republic of Serbia if we have in mind that all May 23, 2020).
primary health care institutions have adequate MIS connected [11] A. Milenkovic, D. Jankovic, and P. Rajkovic, "Extensions and
with RFZO while RFZO is connected with all state Adaptations of Existing Medical Information System in order to
pharmacies. So, there are real conditions for installing MVM Reduce Social Contacts During COVID-19 Pandemic",
in pharmacies where patients can get prescribed medicines International Journal of Medical Informatics, Elsevier Press,
without entering pharmacies which will significantly reduce vol. 141, 2020, doi: 10.1016/j.ijmedinf.2020.104224
social contacts inside pharmacies and reduce the spread of the [12] P. G. Walker, C. Whittaker, O. Watson et al., "The Global
virus. Impact of COVID-19 and Strategies for Mitigation and
Suppression", Imperial College London, 2020, doi:
The proposed modification of MVM concept is adapted to
10.25561/77735
the healthcare system organization in the Republic of Serbia,

45
Smart Health Services for Epidemic Control
Aldina R. Avdić1, Ulfeta M. Marovac2, Dragan S. Janković3
Abstract – At the time of an epidemic, it is necessary to have possibility of electronic access to patients' health records,
information about the epidemiological situation from verified telemedicine, health knowledge management, mobile health,
sources. The lack of such information can lead to the spread of etc. In this way, easier and more successful treatment of
news from non-objective sources, irresponsible behavior of patients and reduction of administrative restrictions when
citizens, but also the spread of panic. Epidemic control is one of
providing medical services are achieved. The advantages of e-
the topics in the field of smart health within smart cities. Based
on electronic health records (EHRs), various information on the Health are electronic monitoring and recording of patients'
epidemiological situation in healthcare institutions can be health status, access to this data anywhere and anytime, as
extracted. This paper proposes a framework that enables several well as fast transfer of information to users via telemedicine
smart health services intended for epidemic control and ways to and internet services.
implement them. Examples of the realization of these services are M-Health (mobile health) encompasses a range of health
given, based on EHRs from Health Center Nis. and medicine services that are realized by combining medical
technologies and mobile and ubiquitous computing.
Keywords – Epidemic control, Smart health services, e-Health, S-Health (smart health). The definition is similar to the
Electronic medical reports.
definition of m-Health, with the emphasis that it is used within
smart cities. In addition, s-Health and m-Health differ in the
I. INTRODUCTION source information they use, and the flow of that information.
For m-Health, the source information comes from the user /
Today, information and communication technologies (ICT) patient, while for s-Health, in addition to this information, it
are represented in various spheres of human activity, also uses collective data obtained from the infrastructure of
including solving everyday problems of urban residents. the smart city. As for the difference in data flow, it refers to
Examples of such problems that reduce the quality of life in the fact that after processing in m-Health, the feedback is
cities are traffic jams, inefficient use of resources and the like. returned to the user, and in s-Health to the user, but also
The result of efforts to solve these problems using modern affects the collective data of the smart city [2].
technologies has led to the creation of a new concept whose Epidemic control. A special area within smart health is
description follows. dedicated to epidemic control. The existence of electronic data
Smart city - A city that uses ICT to improve the living on the health status of citizens, along with methodologies for
conditions of its citizens. The concept of a smart city, in their use and the collective intelligence of the city, improve
addition to IC technologies, uses public resources and social the state's competencies in detecting and controlling
information in order to increase the quality of life and public epidemics. Citizens' activities and locations can be used to
administrative services. Jimenez et al. in [1] defined a smart detect potentially new cases during an epidemic, effectively
city as “a developed urban area that creates sustainable identify high-risk sites, and successfully manage an epidemic.
economic development and high quality of life by excelling in Such methods are also applied in the detection and
multiple key areas: economy, mobility, environment, people, organization of other widespread health risks such as, for
living, and e-government”. Hence, improving services that example, air pollution [3, 4].
contribute to better health of residents is also one of the key At the time of writing this paper, there is a current
tasks of a smart city, and a prerequisite for solving them are e- pandemic of a COVID19 disease caused by new type of
Health and m-Health. corona virus SARS-CoV-2. So, we are witnessing how much
E-Health (electronic health) is innovative and more news on this topic are interesting for the public, how much
efficient provision of health services with the help of modern there is talk of matching real data with those from public
technologies and with a very high degree of system information systems and the like. The existing information
integration, and the possibility of mobility of both doctors and system in Serbia, covid.rs, provides information of the number
patients. Examples of e-Health are reflected through the of deaths, the number of infected and the number of patients
on a respirator per day [5]. Until 10.6. it was possible to
monitor the epidemiological situation in the cities, but not
1Aldina R. Avdić is with State University of Novi Pazar, after that. On the other hand, the epidemic curve is most often
Department of Technical Sciences, Vuka Karadžića bb, 36300 Novi tracked on sites such as Worldometers and
Pazar, Serbia, E-mail: apljaskovic@np.ac.rs Endcoronavirus.org, etc. [6, 7].
2Ulfeta M. Marovac is with State University of Novi Pazar,
The motivation for writing this paper stemmed from the
Department of Technical Sciences, Vuka Karadžića bb, 36300 Novi fact that the existing public health services for epidemic
Pazar, Serbia, E-mail: umarovac@np.ac.rs
3Dragan S. Janković is with University of Niš, Faculty of control in Serbia are insufficient and could give citizens more
Electronic Engineering, Aleksandra Medvedeva 14, 18000 Niš,
details about the epidemic than they provide today. Our
Serbia, E-mail: dragan.jankovic@elfak.ni.ac.rs contribution is in identifying the relevant functionalities that

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 46


smart health systems for epidemic control should provide and structured part gives descriptive values for some parameters,
the proposal, design and development of a smart health but the structure is still known (temperature, pressure,
platform for epidemic control and its most important services. laboratory analysis etc.). The unstructured part consists of free
The platform we propose works in real time, directly takes text given by the doctor and consisting of symptoms, history,
data from the medical information system and EHRs and observations, conclusions etc. Unstructured data contain
ensures a large number of details, such as the prevalence of linguistically incomplete, informal and non-standard
the virus by age structure, health facilities and an overview of abbreviations, which complicates computer processing and
the number of infected in the appropriate time interval. analysis. For that, it is necessary to process the data in
The rest of the paper is organized as follows: the second advance before the analysis in order to enter them in a
section describes smart health solutions and services in related standardized form.
research, the third section describes the services within the At the time of writing, there is no publicly available corpus
epidemic control platform and describes how they are of medical reports in Serbian in electronic form. We used
implemented, while fourth section gives an overview of their 5000 medical records in the Serbian language from 32 clinics
use. In the end, the conclusion and directions of further belonging to the Health Center Nis (DZ Nis), collected by the
research are given. information system MEDIS.NET [16]. The corps includes
EHRs from 2018, which contains information about patients
II. RELATED WORK AND STATE OF THE ART suffering from measles, because there was an epidemic of this
disease in Nis at that time. This corpus is created in
Smart health platforms that solve various problems using accordance with ethical standards, with de-identification of
information technology have been described in numerous patients and medical staff.
papers. The paper [8] describes a smart health care model with Table I gives an example of the medical report we are
a decision support system model approach in public health processing. In it, we can identify the structural part that
service. The paper [9] describes IoT-based (Internet of contains the date of the service, the name of the service, the
Things) smart health services in order to support citizens in diagnosis, the diagnostic code, the organizational unit in
cases of health problems due to air pollution, and [10] which the service was provided and the location of the
describes a smart health platform that enables numerous service. Also, this report contains an unstructured section
services for interaction with patients. consisting of anamnesis. This part is more complex to process
Papers about the use of information technology in epidemic because it needs to extract the relevant data and convert it to a
prevention and control vary from those aimed at finding a standardized format, suitable for further processing.
mathematical model and simulating the spread of the
epidemic [11], to those describing platforms to inform citizens TABLE I
AN EXAMPLE OF PROCESSED EHR
about the epidemic, and using technology to monitor the
location of patients [12]. An IoT-based epidemic control Date of the service 02-03-18
platform is described in [13]. The paper [14] proposes the Name of the service First examination of adults
novel paradigm to control the Chickungunya virus. This Anamnesis povisena t 38.5 belicate naslage po ustima,
kasalj, pulmo b.o, hiperemija grla
paradigm has advantages such as timely recognition of (en. fever 38.5 whitish deposits in the mouth,
infection and reducing the spread of infection, enhancements cough, pulmo b.o, hyperemia of the throat)
in the analysis process, monitoring patients regardless of their Diagnosis Morbili – measles
location, benefit for the doctors to work efficiently and for Diagnosis’ code B05
Organizational unit of General medicine
logical / precise decisions etc. The paper [15] analyzes the the service
differences in the use of information technology for epidemic Location of the service Central building
control in China and Western countries. The services available
to our citizens to follow the information about the Covid19
epidemic are mentioned in the previous chapter. I. THE ARCHITECTURE OF THE PLATFORM

Based on the data available from the set of EHRs, it is


III. EHRS AND THE DATASET possible to create several services that would provide insight
into the epidemiological situation in real time and be a valid
Electronic health reports are made mainly according to the means of informing citizens. These services are based on
internal needs of the hospital. They are needed by various medical data mining of medical reports. They could be
actors such as: medical staff, patients whose health is displayed on a public health portal (Fig. 1) and would include
documented, clinical research (medical researchers, the following use cases:
pharmacists, epidemiologists, etc.), hospital management to a) a report on how many people have a specific diagnosis in
monitor finances and inventory planning, budget, etc. EHRs the city, on a daily, weekly and monthly basis. Based on this
may contain numerical and textual information. Medical data service, a visitor to the portal would be aware of the epidemic
consist of structured, semi-structured and unstructured data situation in his city, and whether the number of patients is
and therefore require more complex processing involving the increasing or decreasing. This report is created based on an
existence of appropriate lexical sources. The structural part analysis of the data obtained by entering in the structural field
contains the values of certain variables, so that they are the for the date of the medical service from the EHRs (Fig. 2a).
easiest to process (name, surname, year etc.). The semi-

47
• Reduction to the one alphabet, abbreviation
processing and tokenization. As these EHRs are
written in Serbian, the free text can be found in Latin
and Cyrillic. In order to transform the data into a
standard format, in this step the text is translated into
Latin, with special regard to letters with diacritical
marks. After that, the abbreviations are marked, and
then the sentence is divided into tokens.
• Deleting stop words - this step eliminates words that
do not carry meaning.
• Determining negation - only a few negation symbols
Fig. 1. Smart health framework for epidemic control are used in medical reports, so the negation mark is
attached to the close word, to indicate the possible
b) a report on the number of patients with a specific absence of symptoms;
diagnosis, especially by health stations within the city. This • Reduction on the basis - since the Serbian language
would make the citizen aware of how many patients there are has a rich grammar, words can be found in various
in his immediate vicinity. This report is created based on the forms, it is necessary to reduce on the basis. In the
analysis of data obtained by entering in the structural field for absence of a morphological dictionary, as well as for
the location of the medical service from the EHRs (Fig. 2b). faster results, the base may be a prefix of length n or
c) a report on the presence of the disease in different groups stem;
based on age. Based on this, the citizen would be informed • Classification (labeling). After preprocessing the
whether he or one of his relatives belongs to the risk group text, classification can be performed. Classification
affected by the virus. This report is created based on an can be done using machine learning methods,
analysis of the data obtained by entering in the structural field taggers, but also rule based methods, if symptoms are
for the patient's date of birth from the EHRs (Fig 3). marked in the data model.
d) a report on the most common symptoms in patients These steps of normalization of medical reports in Serbian are
diagnosed with the disease. Based on this report, the citizen described in detail in [17]. The symptoms shown in the
would be more informed about the disease and could diagram are labeled with methods shown in the paper [18].
recognize the symptoms and in that case contact a doctor. This
report is created based on the analysis of data obtained by
entering in the non-structural field for leaving doctors' II. THE REALIZATION OF SMART HEALTH
comments, from the EHRs. With adequate processing of this SERVICES
text, the symptoms can be extracted from this filed and can be
shown on the diagram (Fig 4). The epidemic control service shows the situation about the
e) A simple questionnaire on the patient's current health number of patients who have the appropriate diagnosis, how
condition (presence / absence of symptoms) to check whether old they are, where they came for an examination, and what
to visit to the medical station for treatment or not. symptoms they had.
All these services would enable the citizens to be constantly
up to date with the epidemic and take measures to avoid or
treat the disease, and in that way the consequences of the
epidemic will be reduced.
The first three services require data analysis and
visualization, which is not demanding, while the fourth
requires specific word processing for proper symptom
labeling. Analyzing the non-structural part of the EHRs we
used, we came across abbreviations, spelling mistakes,
different word forms and synonyms for the same symptoms.
The anamnesis should be cleared of words that have no
meaning, and words of meaning should be reduced to the
same form. Abbreviations should also be processed and
stored. There are also negative symptoms in the anamnesis, so
the service would not show the true number of patients who
have a symptom if the negation was not considered.
Natural Language Processing (NLP) techniques are
required to extract information in the free text of the EHRs.
The steps necessary for the extraction of information, in our
case of symptoms, for the implementation of the fourth report
are:
Fig. 2. Chart of patients (a) by months and (b) by health facilities

48
For the realization of this service, it is necessary that a part REFERENCES
of the data stored in the EHRs in hospital systems be publicly
available in order to extract data from them, i.e. the [1] C. E. Jiménez, F. Falcone, A. Solanas, H. Puyosa, S. Zoughbi
appropriate knowledge. Fig. 2 shows an overview of the and F. González, “Smart Government: Opportunities and
number of patients by health stations and by months, the Fig. Challenges in smart cities development”, In Civil and
3 presents patients by age groups, and Fig. 4 shows the Environmental Engineering: Concepts, Methodologies, Tools,
number of patients with the most common symptoms (rash, and Applications, IGI Global, pp. 1454-1472, 2016.
cough, fever and pharyngeal hyperemia are extracted). [2] A. Avdić, D. Janković, “The Importance of e-health in the
Concept of Smart Cities”, In 17th International Symposium
INFOTEH-JAHORINA, pp. 383-387, 2018 (In Serbian).
[3] M. Al-Azzam, M. Alazzam, “Smart City and Smart-Health
Framework, Challenges and Opportunities”, Int. J. Adv.
Comput. Sci. Appl, vol. 10, no. 2, pp. 171-176, 2019.
[4] J. Dutta, F. Gazi, S. Roy, and C. Chowdhury, “AirSense:
Opportunistic Crowd-Sensing Based Air Quality Monitoring
System for Smart City”, In 2016 IEEE SENSORS, IEEE, pp. 1-
3, 2016.
[5] COVID19, https://covid19.rs/ (last visited 20.7.2020)
[6] Worldometers, https://www.worldometers.info/coronavirus/
(last visited 20.7.2020)
[7] End Coronavirus, https://www.endcoronavirus.org/countries
(last visited 20.7.2020)
[8] A. M.H. Pardede, “Framework for Patient Service Queue
System for Decision Support System on Smart Health Care”,
Fig. 3. Review of patients by age 2018.
[9] A. Avdić, E. Kajan, D. Janković, and D. Avdić, “Towards
Context-Aware Smart Healthcare Platform”, International
Journal of Electrical Engineering and Computing, vol. 3, no. 1,
pp. 26-31, 2019.
[10] A. Avdić, U. Marovac, and D. Janković, “Interaktivna
softverska platforma za realizaciju javnih zdravstvenih servisa”,
6. Međunarodna konferencija Upravljanje znanjem i
informatika, pp. 46-52, Kopaonik, 2020 (In Serbian).
[11] J. Wang, X. Wang, and J. Wu, “Inferring Metapopulation
Propagation Network for Intra-City Epidemic Control and
Prevention”, In Proceedings of the 24th ACM SIGKDD
International Conference on Knowledge Discovery & Data
Mining, pp. 830-838, 2018.
[12] G. Pan, G. Qi, W. Zhang, S. Li, Z. Wu and L. T. Yang, “Trace
Analysis and Mining for Smart Cities: Issues, Methods, and
Applications”, IEEE Communications Magazine, vol. 51, no. 6,
Fig. 4. Review of most common symptoms pp. 120-126, 2013.
[13] P. D.S. Tavares, E. B. Rodrigues, “IoT-Based Architecture for
III. CONCLUSION Data Analytics of Arboviruses in Smart Cities”, In 2018 IEEE
Symposium on Computers and Communications (ISCC), pp.
952-957, 2018.
The realization of health services is an important [14] S. Rani, S. H. Ahmed, and S. C. Shah, “Smart Health: A Novel
component of a smart city, especially in the field of epidemic Paradigm to Control the Chickungunya Virus”, IEEE Internet of
control, in order to raise citizens' awareness of protective Things Journal, vol. 6, no. 2, pp. 1306-1311, 2018.
measures and to monitor the epidemic in their place and call a [15] R. K.R. Kummitha, “Smart Technologies for Fighting
doctor on time. The paper proposes the necessary health Pandemics: The Techno- and Human-Driven Approaches in
services that would enable citizens to follow the epidemic Controlling the Virus Transmission”, Government Information
situation in real time. These services are based on the existing Quarterly, 101481, 2020.
information infrastructure, do not require special investments, [16] A. M. Milenkovic, P. Rajkovic, T. Stankovic and D.S. Janković,
“Application of Medical Information System MEDIS.NET in
and provide the population with a lot of verified information
Professional Learning”, 19th Telecommunications Forum
in the field of epidemic monitoring because they are (TELFOR) Proceedings of Papers, pp. 1474-1477, 2011.
centralized. Some of the proposed services have been [17] A. Avdić, U. Marovac, and D. Jankovic, “Normalization of
implemented and briefly presented in the paper. Health Records in the Serbian Language with the Aim of Smart
Health Services Realization”, Facta Universitas, Series
ACKNOWLEDGEMENT Matematics and Informatics, accepted for publishing, 2020.
[18] A. Avdić, U. Marovac, and D. Jankovic, “Automated Labeling
of Terms in Medical Reports in Serbian”, Turkish Journal of
This paper is partially supported by the Ministry of Electrical Engineering & Computer Sciences, accepted for
Education, Science and Technological Development of the publishing, DOI: 10.3906/elk-2002-9, 2020.
Republic of Serbia under projects III44007 and ON 174026.

49
Syntax Analysis of Serbian Language using
Context-free Grammars
Teodora Đorđević1 and Suzana Stojković2
Abstract — Syntax analysis is one of the major phases in This paper is organized in the following way: Section II
natural language processing. This paper presents a method for explains existing algorithms for syntax analysis of natural
syntax analysis of Serbian language based on the context-free languages. Section III presents a method for Serbian language
grammars. First, it describes building a POS tagger for the POS tagger development. It describes corpora that are used in
Serbian language. Secondly, it defines a context-free grammar
this process. The Serbian language context-free grammar is
for Serbian language. The syntax analyzer is implemented by
using NLTK tool. Experiments showed that proposed analyzer shown in Section IV. Section V contains some results of the
creates correct syntax trees for 74% of tested sentences. experiments and Section VI contains summarized results of
the proposed method and discusses a possible future work.
Keywords — Natural Language Processing (NLP), POS
tagging, Context-free grammars, Syntax analysis. II. RELATED WORK
I. INTRODUCTION Syntax analysis represents a procedure in which a sentence
is assigned a certain structure. The idea of teaching a
Natural language processing (NLP) is primarily concerned computer to understand natural language is perhaps as old as
with enabling computers to understand and generate text the computer itself. Also, the algorithms designed for syntax
written in natural language. Typical NLP applications are: analysis advanced over time. At first, algorithms used context-
- Information Extraction – is the process of extracting free grammars [2] as a set of instructions for parsing.
valuable information from textual documents. Although, this seems logical, it is quite difficult to describe an
- Machine Translation – deals with applying software in entire language via a set of rules. One of the biggest problems
order to translate text or speech from one language to with this approach is that no matter how many rules you add
another. to your grammar it doesn’t improve parsing. The effect of
- Sentiment analysis – is contextual mining of text which adding more rules is rather unpredictable parsing caused by
identifies and extracts subjective information from given ambiguity of language itself. So the next logical approach was
material. adding probability. Newer syntax analysis algorithms are
- Text summarization refers to the technique of shortening mostly based on statistics [3].
long pieces of text. The intention is to create a coherent and
A. Parsing Based on Context-Free Grammars
fluent summary having only the main points outlined in the
document. - The first step in this approach is defining a grammar which
- Question answering – is concerned with building systems consists of a large amount of rules and after that using some
which automatically answer questions posed by humans in a parsing algorithm. In the later phases, parsing algorithms
natural language. for artificial languages can be used. This can be a problem
Syntactical analysis is a very important part in processing because these algorithms are designed for languages that
natural languages. If a syntactical analyzer achieves good are far less complicated than natural. Because of that, some
results, it enables to create high-quality semantical analyzers, algorithms specialized for natural language parsing were
as the next logical step in Natural Language Processing. developed.
Syntax analysis is usually used in Information Extraction, - When parsing with context-free grammars the searching
Question Answering Systems, Rule-based Machine method is also very important.
Translation, etc. For determining which algorithm should be used for syntax
This paper presents a syntax parser for the Serbian analysis first we need to consider the search method. There
language developed by using NLTK [1]. In order to develop are two methods: bottom-up and top-down. The task of a
the parser, two important problems should be solved: parser is to search through the space of potential syntax trees
implementation of a POS tagger and a definition of Context- so it can find the correct tree for given input. Top-down
free grammar for Serbian language. parsers search for a syntax tree by trying to build it from the
starting symbol of grammar. The input of a syntax parser is a
sentence. The goal of syntax analysis using top-down search
1Teodora Đorđević is with the Faculty of Electronic Engineering, is to find all the syntax trees whose root is the starting symbol
University of Niš, Aleksandra Medvedeva 14, 18000 Niš, Serbia, of the grammar and that those trees include all of the words in
E-mail: teodora.djordjevic@elfak.ni.ac.rs sentence. Although efficient, the main problem with top-down
2Suzana Stojković is with the Faculty of Electronic Engineering,
analysis is generating large amounts of syntax trees. On the
University of Niš, Aleksandra Medvedeva 14, 18000 Niš, Serbia,
other hand, bottom-up analysis starts with first word in the
E-mail: suzana.stojkovic@elfak.ni.ac.rs

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 50


input array and tries to create a syntax tree from rest of the There are no many corpora for Serbian language. Two were
words applying grammar rules, one by one. Parsing is used for classification:
successful if a parser generates the syntax tree with the - SrpLemKor [8] – training with this corpus achieved an
starting symbol in its root. accuracy of 92%. The problem with this corpus and model
After choosing a search method, we also need to consider is the fact that it only supported shallow tagging. It only
algorithms for searching syntax trees. As a solution to provided information whether a word is a noun, a verb, an
ambiguity, there is a set of algorithms designed to solve this adjective… This corpus doesn’t have any information about
problem. They are based on dynamic programming. Dynamic the form of the word. If we are only interested in part of
programming approaches systematically fill in tables of speech, this tagging will be enough. The problem with
solutions to sub-problems. When complete, the tables contain syntax analysis is that it requires more information about
the solution to all the sub-problems needed to solve the words than just part of speech tag. In the Serbian language
problem as a whole. The algorithms for parsing using this it is very important to know case of nouns, adjectives,
approach are CKY [4], the Earley algorithm [5] and Chart pronouns and numbers, for example. Classification is then
parsing [6]. implemented with another corpus.
- srWac [9] – web corpus formed from .rs top-level domain.
B. Statistical Parsing
The first version contains 894 millions of annotated tokens,
Statistical parsing is definitely the modern approach to
and later versions around 600 million. This corpus contains
syntax analysis and one of its most important features is
all the necessary information for every part of speech, but
solving the ambiguity problem. Sentences can often be
classification became more complicated due to the large
syntactically ambiguous and this is an enormous problem for
amount of possible tags. The accuracy achieved with this
parsing. Statistical parsing solves this problem by calculating
corpus as the training set is 91%. It is important to know
the probability for every possible outcome. The result of the
that this accuracy is accomplished after reducing some
syntactical parsing is then chosen as the syntax tree with the
information from labels that are not important for syntax
largest probability. One of the ways to calculate probability
analysis. Also, the training set contained around 8,5 million
for every syntax tree that is generated is using Probabilistic or
words from this corpus.
Stochastic Context-free grammar (PCFG) [7]. The only
One of the most important parts of this tagging is extracting
difference between regular CFG and PCFG is that in PCFG
features from words. The Naïve Bayes Classifier as one entry
every rule has its own probability.
expects features of a word along with its correct label.
Rule in this grammar is:
Features of the word are chosen to fit the Serbian language.
(1) Some of the features are:
where p represents probability that for this non-terminal A is - Word itself
used this production. Probability for every generated syntax - Whether is the first word in sentence
tree using PCFG is calculated as product of probabilities of all - Whether is the last word in sentence
applied rules. - Does it start with capital letter
- Does it all from small letters
- Prefix – length 1
III. POS TAGGING - Prefix – length 2
Before syntax analysis is started tagging has to be done. - Prefix – length 3
Tagging is very important because syntax rules cannot be - Suffix – length 1
applied to regular words. Syntax rules are built using Part of - Suffix – length 2
speech tags. The Serbian language has ten different parts of - Suffix – length 3
speech. Those are: nouns, adjectives, numbers, pronouns, - The previous word in the sentence if the word is not first
verbs, adverbs, prepositions, conjunction, particles and - The label of the previous word
interjections. The classification represents choosing the right - The next word in the sentence if the world is not last
class for a specific input. As we can see, there are a lot of - Whether the word contains a hyphen
possible tags, so tagging is implemented using classification. - Whether it is a number
Classification is a supervised method of learning which uses a
corpus of words for training. This corpus of words contains IV. SYNTAX ANALYSIS
words with a correct tag for every word. After training, there
comes a testing phase. A small part of corpus is left out of Implementing the syntax analyzer using nltk, needs a
training and used later for testing the accuracy of the created Context-free grammar of the target language. The definition
model. of the grammar includes:
Classification is implemented using nltk. Natural language - A starting symbol of the grammar
toolkit or nltk is one of the most popular tools for NLP - Terminal symbols – strings which contain tags that tagger
implemented in Python. The Naïve Bayes Classifier is used recognizes
for classification. The Naïve Bayes Classifier considers all of - Grammar rules that have only one non-terminal symbol on
the word features when deciding which tag will be assigned to the left side
the input. In order to create model of classification we can use Nltk expects that the word that is being analyzed is part of
to tag words, first we need to choose a corpus for training. the grammar. It is very inconvenient to make rules with every
word of one language. First, there are too many words and

51
also syntax rules cannot be applied to the words of a language.
This is why the terminals of the grammar contain tags instead
of words. Some examples of terminal symbols in the Serbian
language are shown in the Fig. 1.

Fig. 2. The rules for adverbial provision

- Helper words – There are words in the Serbian language


that are not significant for syntax. Those are
conjunctions, particles, abbreviations, punctuation and
residual words (e.g. e-mails). All of these words are
Fig. 1. Terminal symbols of the grammar possible expansions for the non-terminal called helper
The grammar rules can be divided into several logical parts words.
[4]: - Due to large number of rules and limited space all the
- Structure of the sentence – The Serbian language is grammar rules cannot be shown. Several rules for
complicated and one sentence can contain a few simple adverbial provision are shown in Fig. 2.
sentences. Because of that, the first part of the grammar To implement a syntax parser using the created grammar, it
is dedicated to sentence structure. The first rule says that is necessary to choose which type of parser from nltk will be
the starting symbol can be expanded as sentences used. This toolkit offers – Recursive descent parser and Shift
symbol, sentences symbol can then be expanded as one reduce parser. The recursive descent parser uses the created
sentence or an array of sentences, etc. A single sentence grammar and applies a top-down search method. The
can contain a subject or sentence members. Sentence advantage of this parser is that it will always find all possible
members then can be a predicate and helper words. syntax trees for a given input. The problem is the fact that this
- Subject – There are two types of subjects in the Serbian parser starts from the starting symbol of the grammar and
language – logical and grammatical [10]. There are because of that generates a large amount of syntax trees that
multiple rules for subjects according to the grammar have no connection to a given input. The shift-reduce parser,
rules. The logical subject is most likely to be a phrase in on the other hand, starts parsing from a given input and
genitive, dative or accusative. The grammatical subject searches the rules that fit this input. It uses a bottom-up search
represents the doer of the action and it can only be in method. The problem with this parser in nltk is that it doesn’t
nominative. use backtracking. This parser may not find a syntax tree even
- Predicate – can be a verb predicate or a noun predicate. if there is one according to the grammar rules. In order to
A verb predicate represents the action that a subject is guarantee that our parser returns a syntax tree if there is one,
doing and rules for this predicate usually include the recursive descent parser is used.
different combinations of auxiliary verb, main verb, When the parser is initialized with a context-free grammar,
particles yes/no and self-pronoun. A verb predicate can it can be used for parsing sentences. First, we need to divide
be surrounded with different verb additions. Those are our input into tokens. After that, those tokens are forwarded to
object and adverbial phrases. The object can be direct or the POS tagger. When the POS tagger returns tags for a given
indirect. The direct object is in accusative without input they are forwarded to a syntax parser and the output of
prepositions and represents the sufferer of the action. this parser is finally a syntax tree. Example of a syntax tree is
The indirect object can be in any other dependent case. given in Fig 3.
The rules for objects are designed to fit syntax rules for The problem with this parsing is that it can generate more
the Serbian language. Adverbial phrases can describe than one syntax tree for one sentence. Even if often one of
place, time, means or cause. There is a set of rules with those trees is correct, we must have a deep understanding of
verb additions before and after a verb. Also, there are the Serbian grammar to figure out which syntax tree is the
rules for situations when there is more than one verb correct result.
addition. A noun predicate, on the other hand, includes Why is the result often more than one syntax tree? The
an auxiliary verb and a noun, adjective or pronoun. The Serbian language is very complex and there are a lot of
rules for a noun predicate include different combinations situations where one tag can be covered with more rules.
with auxiliary verb and phrases in a few cases. Some examples of ambiguity are indirect object and adverbial
phrases, indirect object and logical subject...

52
V. EVALUATION correctly, there is still room for improvement, especially with
ambiguity. One of the main ideas that could solve the issue of
The implemented syntax parser is first tested with a large
ambiguity is using Probabilistic Context-free grammars to
amount of sentences prepared to fit with the designed
always determine only one syntax tree.
grammar rules and they were all recognized.
Besides these sentences the syntax analyzer was also tested
by using arbitrary text. The text that was chosen is from the ACKNOWLEDGEMENT
book ,,Programming language Java with solved problems” This work has been supported by the Ministry of Education,
[11]. Science and Technological Development of the Republic of
The results are shown in Table I. Sentences with one or Serbia.
more correct trees represent 74% of the total number of
processed sentences. The remaining sentences (26%) weren’t REFERENCES
recognized by the parser at all, meaning that they did not
result in any syntax tree. There are 0 sentences with only one [1] S. Bird, E. Klein, and E. Loper, Natural Language Processing
generated tree that is wrong. with Python, Sebastopol, USA, O'Reilly Media, 2009.
[2] M. Stanković, S. Stojković, and Ž. Tošić, Compiler theory, Niš,
TABLE I Serbia, Faculty of Electronic Engineering, 2018. (in Serbian)
THE RESULTS ON ARBITRARY TEXT [3] Jurafsky, and J. Martin, Speech and Language Processing, 2nd
Number of edition, New Jork, USA, Prentice-Hall, 2009.
Category [4] D. H. Younger, “Recognition and Parsing of Context-Free
sentences in percent
Languages in n3”, Information and Control, vol. 10, no. 2, pp.
Sentences with one or more 189-208, 1967.
74%
correct tree [5] J. Earley, An Efficient Context-Free Parsing Algorithm,
Sentences with a wrong tree 0% Doctoral thesis, Carngie-Mellon University, 1968.
[6] R. M. Kaplan, Natural Language Processing, New York,
Unrecognized sentences 26% Algorithmics Press, 1973.
[7] T. L. Booth, "Probabilistic Representation of Formal
Languages", 10th Annual Symposium on Switching and
VI. CONCLUSION Automata, pp. 74-81, Waterloo, Canada, 1969.
In this paper is explained one way of creating a POS tagger [8] SrpLemKor, http://www.korpus.matf.bg.ac.rs/SrpLemKor/,
for the Serbian language using available corpora. It is 05.06.2020
described how is created context-free grammar for the Serbian [9] srWaC – Serbian web corpus, 12.06.2020
language. Finally, it is presented creating of the syntax parser http://nlp.ffzg.hr/resources/corpora/srwac/
using previously mentioned context-free grammar. [10] Ž. Stanojčić, Lj. Popović, Serbian grammar for high school,
Belgrade, Serbia, Zavod za udžbenike, 2011. (in Serbian)
From all of the above, we can see that although this parser [11] L. Kraus, Programming language Java with solved problems,
can recognize a lot of sentences of the Serbian language Belgrade, Serbia, Academic Mind, 2015. (in Serbian)

Fig. 3 Example of the generated syntax tree

53
Signaling in 4G/5G with NB-IoT
support in 5G Option 3
Martina Janakieska1, Pero Latkoski1, and Vladimir Atanasovski1
Abstract – This paper describes the signaling use cases in Narrowband means that NB-IoT devices’s bandwidth is
4G/5G with NB-IoT support that is the new 3GPP radio maximum 200 kHz, which can coexist either in the Global
standard which “addresses” the requirements of the Inetrent of System for Mobile Communications (GSM) spectrum or by
Things devices. It provides improved indoor coverage low-flow occupying one of the legacy LTE Physical Resource Blocks as
devices, low sensitivity, low power consumption, ultra-low cost
in-band or as guard-band [2]. There are several inherent
and optimized network architecture. NB-IoT is considered to be
the best solution for LPWA technologies. features of NB-IoT technology that make it the best solution
for LPWA. Low power consumption is a prerequisite for
Keywords – Data over NAS, Deployment scenario, 5G, NB-IoT, almost 80% of all LPWA use cases [3], ranging from
RAT type, Signalling. applications such as smart gauges, smart parking, etc.
Additionally, with the availability of massive connections,
I. INTRODUCTION everything around us can be connected smartly. This would
require 50,000 devices per cell, which means that the density
It is expected that fifth generation of mobile networks will of households per square meter is 1,500 households, and that
completely transform the role that telecommunication each household will have an average of 40 devices [3]. From a
technologies have in society. 5G will support a variety of user performance standpoint, the NB-IoT guarantees 20+ dB
scenarios, enhanced mobile broadband, Massive Internet of coverage, approximately 1000x connections, and
Things (mIoT) and Ultra Secure Low Latency. By this way, it approximately 10 years of using only 200 KHz bandwidth [2].
will bring significant changes to both business and our On the other hand, this is a licensed solution that offers
everyday lives. 5G is considered to be a beginning of a new greater security. The most important characteristics of NB-IoT
era in the industrial revolution. Thanks to the functionality are: Multitone transmission support, Power Saving Mode
that this technology brings, we can expect a great (PSM) and Extended DRX (eDRX), Coverage Enhancement
development in all spheres of society. It is expected that 5G Method.
will support IoT and Narrow Band - IoT use cases that will
have deep impact in our everyday life. NB-IoT and LTE-M A. Control Plane and User Plane Optimization
are 4G technologies, but also pay a crucial role in 5G system
to support 5G Low-Power Wide-Area Wireless Technology, NB-IoT Support small data transmissions that are based on
LPWA, use cases. According to 3GPP [1], LTE-M and NB- Cellular IoT, on both User Plane and Control Plane. This kind
IoT will be a part of 5G and they are the only 5G technologies of transission supports small bursts of data efficiently while
to support 5G LPWA use cases in the foreseeable future. guaranteeing the long-range coverage. In this way, NB-IoT
Furthermore, firmware of the most NB-IoT and LTE-M can support more than one data path in CP for the
devices today can be upgraded to support the 5G NB-IoT and transmission of user data which is carried by the signaling
LTE-M features. Thus, it can be said that NB-IoT and LTE-M messages managed by the Mobility Management Entity
are on the road to 5G. The remainder of this article is (MME) node in Core Network. The procedures are optimized
organized as follows. Section 2 gives an overview and key to efficiently support the small data transfer, the mandatory
concepts of NB-IoT technology. Section 3 presents general Control Plane Cellular IoT (CP CIoT) Evolved Packet System
5G deployment scenarios. Section 4 provides description of a (EPS) and optional, User Plane Cellular IoT (UP CIoT) EPS.
signaling in 4G/5G. Finally, the last section conclude the CP CIoT optimization encapsulates the packets in Non -
paper. Access Stratum (NAS) by using control plane signaling, thus
reducing the number of control messages when transferring
II. BASIC CHARACTERISTICS OF NB-IOT less data. The use of CP CIoT will optimize energy
consumption, due to the reduction of signalization and the
reduction of "air time". Data transfer takes place in two
NB-IoT is a cellular Radio Access Technology that is
directions (uplink and downlink). Under this NB-IoT solution,
based on Long Term Evolution technology, introdused by
no data radio carrier is established, instead packets are sent
3GPP in Release 13 [3], for LPWA Networks. The term
through a radio signal.
1Martina Janakieska, Prof. Dr. Pero Latkoski, Prof. Dr. Vladimir
B. Data over NAS
Atanasovski are with University of Ss. Cyril and Methodius, Faculty
of Electrical Engineering and Information Technology, Karpos 2 bb,
MME supports small data transmission over NAS, S11-U
1000 Skopje, Macedonia, E-mails: janakieska.martina@outlook.com;
pero@feit.ukim.edu.mk; vladimir@feit.ukim.edu.mk and SGi interfaces. This is a part of CIoT EPS optimization.

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 54


This feature describes the following aspects of small data protocol) [6]. It means that LTE eNodeB decides if uplink
transfer, IP data over NAS and S11-U interface and Non-IP traffic is routed via NR gNB and/or LTE eNB. Option 3a
Data over NAS (DoNAS) and SGi interface [5]. Non-Access differs from the previous one because data from NR is sent
Stratum is a functional layer in UMTS and LTE, between user from/to SGW via S1-U interface, and eNB and gNB only
equipment and core network and is used to manage the exchange control messages (Bearer switching in SGW).
establishment of communication sessions and to maintain Finally, in option 3x, gNB is master NodeB and decides if
continuous communications with the user equipment. Data uplink traffic is routed via NR gNB and/or LTE eNB.
over NAS is a mechanism designed for small data transfer,
over the S1 Application Protocol (S1AP) [6], in 3GPP
systems by using the existing signaling plane for small data
transfer. DoNAS utilizes the Signaling Radio Bearers (SRB)
to carry data from User Equipment (UE) to eNodeB. The user
data is transported throught the MME node, that encapsulates
user data in NAS Packet Data Units (PDUs). This proces
reduces total number of control plane messages. IP and non-IP
data can be sent over Non-Access Stratum. Small data transfer
is even further optimized using Non-IP Data delivery. SCEF –
Service Capability Exposure Function node, over the control Fig. 1. Option 3 deployment (sub)scenarios
plane, is introduced in 5G core network [7]. This node
delivers Non-IP data. Furthermore, SCEF provides an The dashed lines in Figure 1 refers to a Control Plane.
interface for the network services such as Authentication, Thus, benefits of 5G EPS are: Existing EPS system can be
Access Control or discovery. reused; Possibility of “Smooth” migration; CP/UP for
optimized traffic.
In the following Table 1, are presented the advantages and
III. GENERAL 5G DEPLOYMENT SCENARIOS disadvantages of 5G deployment scenarios.

3GPP supports both [4], 5G Core (5GC) network, as well as TABLE I


a new radio access technology named as 5G “New Radio” ADVENTAGED AND DISADVENTAGES OF 5G DEPLOYMENT
(NR), that uses completely new core network with new nodes, SCENARIOS
and 5G Evolved Packet Core (EPC). In the second option is
used the existing LTE (LTE-M) core, with New Radio Access Adventages Disadventages
Network, 5G NR RAN. It is possible to integrate elements of SA Simple to manage Cannot use LTE
different generations in different configuration with 5G [4]: deployments if NR is used
SA (Stand Alone) and NSA (Non-Stand Alone). SA scenario NSA Existing LTE May impact end user
uses only one radio access technology (5G NR or the evolved Deployments experience
LTE Radio Access Network) and the core networks are EPC Existing EPC Cloud support is optional
operated alone. NSA scenario combines NR radio cells and deployments
LTE radio cells using dual-connectivity to provide radio 5GC Cloud native New deployment is
access and the core network may be either Evolved Packet required
Core or 5G Core. There are few options for deploying 5G. In
NSA scenarios, existing EPS nodes should be upgraded to
support 5G functionalities. [4]: IV. EPC SIGNALLING IN 4G/5G USE CASES
• 5G data rates
• 5G subscription control In this section are described few use cases which show how
• Dynamic mobility switching the signaling messages are transmitted 5G test EPS network.
• Network Slicing – Dedicated Core, 5G Gateway All of the tests are executed by taking the traces for test NB-
selection IoT devices (on the corresponding network nodes) and
• RAN volume reporting of secondary Radio Access analyzing them in Wireshark tool. All of the cases refer to
Type (if it’s used) Data Over NAS scenario.
• Separation of Control Plane and User Plane
One of the migration steps, which will be taken into account A. S11-U Support
in this paper is EPS to NSA option #3. It requires the
development of specifications of NR as non-standalone The first use case refers to the signalling messages that are
access, as part of E-UTRAN connected to EPS, not the full 5G transmitted over S11-User Plane (S11-U) interface when the
system. Option #3 has three sub-options, shown in Fig. 1. In UE sends “Create Session Request Message” to the core
option 3, control messages from LTE RAN are sent to MME, Network. i.e. MME node. This node is responsible for
and user data is transmitted via SGW node in core network. managing UE access and mobility, as well as establishing the
LTE RAN communicates with NR via new X2 interface bearer path for UE's. This interface is introduced as a part of
(Stream Control Transmission Protocol – SCTP based the Control Plane CIoT EPS optimization for small data

55
transmission between the MME and S-GW. Moreover, CP in the network. Due to this functionality, NB-IoT RAT
CIoT EPS optimization enables support of efficient transport, support is not required by SGW, HSS and other network
of user data (IP and Non-IP) or SMS messages over control nodes, which means that on the Ѕ6a interface, from MME to
plane via the MME without triggering data radio bearer HSS, MME will not send NB-IoT RAT type to HSS, as well
establishment [7]. Thus, Ericsson supports IP based Control as to SGW, through S11 interface.
Plane CIoT EPS optimization, Data over NAS, over S11-
U/SGi interface, for IP and Non-IP data as well. This interface
is based on GTP-User Plane (GTP-U) protocol [7]. It is a GTP
version 1 user plane interface and carries small data sent and
received over NAS between the MME and S-GW [7].
Data over S11-U interface supports the following features [7]:
• Allocation and de-allocation of MME S11-U Fully
Qualified Tunnel Endpoint Identifier - FTEID for
S11-U data tunnel termination at MME
• Path management for the S11-U interface in MME
node
• Sending and receiving GTP-U path failure and error
indication on S11-U interface
• S11-U GTPU sessions are recovered after a session
manager restart
• New statistics are introduced to display information Fig. 2. Create Session Request Test
on data packets sent or received over the S11-U per
UE, per PDN and per MME service However, in the previous scenario, shown in Figure 2, it is
• New statistics are introduced to display information noticed that the SGW node is configured to support NB-IoT,
data packet sent/received over S11-U per GTPU thus, MME sends RAT Type NB-IoT to SGW in Create
service Session Request message. HSS is a database that contains
IP data over NAS is transmitted over S11-U interface. Authentication Information and Subscriber's Data, where
Signaling Radio Bearer (SRB) is used for all communication MME shall take care of mobility of UE/Subscriber [7]. This
over the air interface between UE and the eNodeB. The MME interface is used to Authenticate Subscriber, providing
does not send the S1 Initial Context Setup request to the services to subscriber, to store location information of
eNodeB, and the eNodeB does not send RRC re-configuration subscriber sent by MME. In case when the device needs to
to the UE as there is no Initial Context Setup at the eNodeB. update the location, MME sends the Update Location Request
On the other hand, MME sends a NAS Attach Accept to the to HSS via S6a interface. Within the message, MME sends the
UE in S1 Downlink NAS Transport message instead of S1 RAT type to HSS. If HSS is configured to support NB-IoT
Initial Context Setup request. The UE sends NAS Attach RAT type, then MME sends NB-IoT RAT type, otherwise,
Complete in the S1 Uplink NAS Transport message. The MME sends RAT type E-UTRAN. Note that this scenario
MME establishes the S11-U tunnel during S11 Create Session doesn’t have impact on NB-IoT data transmission. Our tests
Request/Response signalling. S11 Modify Bearer request sent are made with HSS node that does not support NB-IoT. Thus,
is not sent to the S-GW after Attach Complete is received when MME sends Update Location Request on S6a interface,
from UE [7]. Create session request is tested with NB-IoT it still sends E-UTRAN RAT type. S6a Interface is diameter
device on our, previously mention, test network. Our NB-IoT based interface. It can be indicated by the MME node in the
device sends Create Session Request to MME node through ULR-Flags AVP, Figure 3. If HSS node support NB-IoT RAT
eNodeB. The results are shown Figure 2. S11-U data tunnel is type, then the URL-Flags AVP will show RAT Type NB-IoT.
established with corresponding Fully Qualified Tunnel End However, handling of NB-IoT RAT by MME has own
Point Identifier, IPv4 address and security key, when UE benefits. For example [7]: Enables the possibility to use NB-
sends NAS Attach Complete in the S1 Uplink NAS Transport IoT as radio for low cost, low complexity devices for low
message. Moreover, the results show RAT-Type NB-IoT. throughput applications; MME (or combines SGSN-MME)
That means that SGW is configured to support NB-IoT handles multiple access, now also including RAT NB-IoT;
devices. In this way, MME sends RAT type NB-IoT to SGW, Possible to deploy RAT NB-IoT without corresponding
while requests “Create Session”, instead of E-UTRAN Radio support in HSS and/or GWs.
Access Type.
C. Power Saving Mode Test Case
B. NB-IoT Support – Handling NB-IoT RAT Type
Power Saving Mode facilitates battery life of device as
To transfer data from NB-IoT devices, it is important that devices are supposed to be in sleep mode most of the time.
the MME node is configured to support NB-IoT functionality. The PSM mode is similar to power-off but the UE is still
MME can handle the case where Home Subscriber Server registered on the network. Power Saving mode should be
(HSS) and/or GW not support NB-IoT RAT. Thus, MME can supported by both, MME and UE. Device supporting power
makes a "bypass" to avoid the impact of SGW and HSS nodes saving mode asks MME for “Active Time” and “Extended

56
Periodic Tracking Area Update (TAU) Time” value during processes with the existing core network are presented, with
attach or RAU/TAU procedure. some changes in the network nodes MME, HSS and SGW.
Those nodes are updated to support primary 5G features and
NB-IOT devices. All tests were performed with a test NB-IOT
device, but on a test network that has the same features and
nodes as the existing core network. The packages were
recorded in Wireshark in order to see the signaling messages
that are transmitted over the network through nodes and
interfaces, based on appropriate protocols.

Fig. 3. NB-IoT Support on S6a interface

The UE activates PSM by including these two timer values


[7]. The T3324 is the Active Timer which defines the time in
which the UE stays active after idle mode, following the
Attach or TAU procedure. The Exended Periodic TAU Timer,
is T3412. It defines the extended time for an UE to send
periodic TAU. The UE requests for a T3324 Active Timer
value during Attach and TAU procedures. The MME allocates Fig. 4. S1-MME Attach Accept – Timers
the T3324 value to the UE. The T3324, determines the
duration in which the device remains reachable for ACKNOWLEDGEMENT
transaction during the transition from connected to idle mode
[7]. Active timer starts when the device moves from
This research was supported by the Ericsson
connected to idle mode. When this active timer expires, the
Telecommunications company, Macedonia and Faculty of
device moves to Power Saving Mode. Moreover, MME
Electrical Engineering and Information Technologies. We
allows a value of ‘0’ for the T3324 timer. In this case the UE
thank our colleagues from Ericsson Telecommunications who
enters the Power Saving Mode immediately. Our tests are
provided test lab, insight and expertise that greatly assisted the
made with Active Timer set to ‘0’. From Figure 4 we can see
research, although they may not agree with all of the
that only T3412 is present and it’s value is 30 min. The T3412
interpretations of the paper.
timer is also referred to as the periodic Tracking Area Update
(TAU) timer. Periodic tracking area updating is used to
periodically notify the availability of the device to the REFERENCES
network. The procedure is controlled in the UE. The value of
the T3412 is sent to the UE in the ATTACH ACCEPT [1] https://www.ericsson.com/en/networks/trending/insights-and-
message through S1 interface [7]. Also, can be sent via reports/nb-iot-and-lte-m-in-the-context-of-5g-industry-white-
TRACKING AREA UPDATE ACCEPT message [7]. The paper
UE should apply this value in all Tracking Areas of the list of [2] Huawei, “NB-IoT – Enabling New Business Opportunities”,
tracking areas assigned to the UE, until a new value is Huawei Technologies, Bantian, Longgang District, 2015.
received. [3] P. Salva-Garcia, J. M. Alcaraz-Caledro, Q. Wang, J. B.
Bernabe, and A. Skarmenta, “5G NB-IoT: Efficient Network
Traffic Filtering for Multitenant IoT Cellular Networks”,
V. CONCLUSION University of the West of Scotland, UK, December 10, 2018.
[4] Ericsson Telecommunications, “MakTel NB-IoT Pilot Project –
This paper has presented the basic overview of NB-IoT and HLD”, , Macedonia, Rev PA1, January 2019.
it’s characteristics. The idea was to present all (so far) [5] S. Tabbane, “5G Networks and 3GPP Release 15”, Nadi, Fiji
possible options for the implementation of the 5G network Islands, October 23-25, 2019.
and which option for the 5G EPC Non Stand Alone is most [6] Ericsson Learning Services, “LTE L15 Air Interface, Protocols
appropriate. Further, were present significant signalization and Procedures”, 2012, https://www.ericsson.com/assets/
local/portfolio/ericsson-academy/rnam/lte-l15-air-interface-
processes in 4G/5G. But we have taken into account the
protocols-and-procedures.pdf
signalization by the current NB-IoT, because the signalization [7] Cisco Systems, Inc, “Ultra IoT C-SGN Administration Guide,
is a broad term that covers many details. The basic signaling StarOS Release 21.6”, January 1, 2018.

57
Supervision and Monitoring System of the Power Line
Poles Using IIoT Technology
Miloš D. Djordjević1, Jana M. Vračar1 and Aleksandra S. Stojković1
Abstract – In this paper, the development of an autonomous II. THEORETICAL BACKGROUND
system for the monitoring and supervision of the power line poles
is presented. It is a new approach to the use of Industrial
Internet of Things technologies in a practical and significant way
The number of utility poles (power line poles, power poles,
in the system of smart control systems. The subject of research is hydro poles) in the distribution network is large, and the
the supervision and monitoring of the angle of slope and construction of the power poles is not as good as that of the
microclimate using Industrial Internet of Things technology and carrier poles in the transmission system. In many countries,
smart sensor nodes. The system is based on: a group of built-in wooden poles are prone to rot and decay. Power poles can
sensors (environmental: BME280, BH1750, and ADXL345 3-axis bend, warp, or fall completely.
accelerometer), a microcontroller with a peripheral interface They are endangered by insects and birds, wild animals,
(PIC) as a core of low levels of the system, a server system and a floods, strong winds and inclement weather in the form of
wireless Internet using the Global System of Mobile
snow and/or rain ice storms. Often these power poles must be
Telecommunications (GSM) module with General Packet Radio
Service (GPRS) as a communication protocol.
repaired even before they collapse, in case of traffic accidents,
growth of seedlings/trees of inappropriate size near the poles,
Keywords – Smart control systems, Industrial Internet of as well as collapses in the event of an earthquake. Landslide
Things, Sensor technology, PIC microcontroller, Monitoring. are also a particular risk for the poles. Rain and snow can
cause freezing, and asymmetric traction causes the poles to
tilt, indicating a safety risk for power poles.
I. INTRODUCTION In [1], the author introduced a street lamp monitoring
system. The system is based on the Raspberry Pi 3. Sensors,
Industrial Internet of Things (IoT) is focused on a variety of such as an accelerometer that monitors the angle of inclination
manufacturing facilities (oil and gas systems, power systems, of the lamp, a photoresistor (LDR, Light Dependent Resistor)
etc.), empowering industrial engineering with sensors, that serves as a sensor for measuring the intensity of
software, and big data analytics to identify problems on time illumination of the lamp, and a current sensor for monitoring
and create efficient, cost-effective and optimal processes. changes in the current and power of the lamp are used. The
Due to the criticality of such infrastructures, the slightest measured parameters are sent to the Cloud (to keep track of
mistake in the system design leaves consequences primarily to them) and, if necessary, to react and repair the street lamps.
human safety, and then to the environment and finances. The paper itself pays little attention on how the system works,
Therefore, concerning CIoT (Consumer-oriented IoT - CIoT), specifically how measurements are made and what the period
IIoT applications are subject to particular limitations and between the two measurements is. There is no information if
requirements regarding security, interoperability, scalability, the accelerometer is used, whether it is analog or digital. In
precision, accuracy, response, reliability. Operation our paper, a 16-bit digital accelerometer is used to obtain an
management in IIoT systems is often more complex than in accurate angle of inclination. Also, the authors used LDR as a
CIoT solutions and due to the almost inevitable abundance light intensity sensor (which affects on measurement
and distribution of heterogeneous devices over long accuracy). Our system is more precise due to usage of 16-bit
geographical distances. One example of the application of IoT digital light intensity sensor. Within the mentioned paper,
technology in the industry will be presented in this paper, there is no information about which one was used as the
based on the power line poles monitoring and monitoring current sensor. In terms of the practical application of the
system. The implemented system monitors the inclination of system, the authors did not provide any results within the
the power line poles, to predict the unintended interruption of paper to confirm the authenticity of the presented system.
electricity supply due to the collapse of the line poles. In the second paper [2], the author presented a system for
monitoring the inclination of electric poles, actually made a
comparison of a uniaxial and three-axis accelerometer when
1Miloš D. Djordjević is with University of Niš, Faculty of
measuring the slope of a power line pole. The system is based
Electronic Engineering, Aleksandra Medvedeva 14, 18000 Niš, on the BeagleBone Black development environment and the
Serbia, E-mail: milos.djordjevic@elfak.ni.ac.rs
1Jana M. Vračar is with University of Niš, Faculty of Electronic ADXL335 analog accelerometer, which measures the slope of
Engineering, Aleksandra Medvedeva 14, 18000 Niš, Serbia, the pole. The sensor used in our system, ADXL345 digital
E-mail: jana.vracar@elfak.ni.ac.rs accelerometer, is more precise than analog sensor, made with
1Aleksandra S. Stojković is with University of Niš, Faculty of MEMS technology.
Electronic Engineering, Aleksandra Medvedeva 14, 18000 Niš,
Serbia, E-mail: aleksandra.stojkovic@elfak.ni.ac.rs

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 58


Fig. 1. Principle of the smart system for supervision and monitoring of the power line poles

An additional advantage, beside those mentioned above, is The microcontroller PIC16F628A [3], which represents the
lower price range because of microcontrollers used in our core of the entire Level 1, manages the sensor block, which
system. Big disadvantage of these systems is need for Wi-Fi serves for measurements and observations. Also, the
or GSM/GPRS modules on each of the power line pole, which communication block is realized using the RF modules. The
increases the cost of the system. An advantage in our paper is sensor part of Level 1 consists of the following sensors:
the use of far cheaper RF communication modules for sending - BME280 (measures temperature [°C] or [°F],
information about measured parameters from power poles. Relative Humidity [%] and Atmospheric pressure [hPa] or
Also, they do not require internet access. [mBar]) [4],
This paper presents an example of a system for supervision - BH1750 (measures light intensity [lx]) (optional) [5],
and monitoring of the power line poles using IIoT technology. - ADXL345 (measures slope angle [°]) [6].
The presented system consists of three levels. The first level is The PIC microcontroller constantly "listens" (or wakes up
in charge of measuring the parameters of the power line poles. from sleep mode) when something is received in the RX
The second level is used for collecting the measured data and buffer. When an adequate message from Level 2 is detected
sending it to the Cloud. The third or highest level of the for the required measurement, the microcontroller sends
system is in charge of monitoring the parameters and messages to the sensors. The message contains a sensor ID
responding. Also, only operators, or people who monitors the and a request to measure a specific parameter like
operation of the entire system, have access to this level. temperature, humidity, pressure or slope angle. When a sensor
is "recognized" by an ID based on the control byte (which
parameter is being measured) it performs a measurement, e.g.
III. WORKING PRINCIPLE OF THE IIOT SMART BME280 (Temp, Hum, and Press). Subsequently, the
SYSTEM microcontroller must send a request to the sensor to read data
from its memory again. The sensor sends the measured data to
A. Design of the System the microcontroller via the I2C bus.
Level 2 is the link between the power line poles and the
Communication between the power line poles (Level 1 control center. The centerpiece of this level is the
measuring nodes) and the control nodes (Level 2 nodes) are PIC18F45K22 [7] microcontroller, which communicates with
realized by the RF module (RF communication), and can be Level 1 and Level 3. All communication blocks are using RF
briefly described as follows: communication because every power line pole (Level l)
The communication is bidirectional (there are two RF consists of the RF module. The second block was
modules (RX and TX)), and therefore the measuring node (at implemented using Wi-Fi or GSM/GPRS modules, to send the
Level 1) knows when to do the measurement and when to data to the Internet, based on which dispatcher has an insight
send data (to avoid unnecessary power consumption) and then into the state of the power line poles. For the microcontroller
control node (Level 2) sends a message from its RF module to be able to monitor the period between two measurements, it
(Fig. 1). Communication speed is 2400 bps and UART is necessary to use the RTC (Real Time Clock) module which
(Universal Asynchronous Receiver/Transmitter) or serial calculates the time that was previously set, as well as the
communication is used. period between the two measurements.

59
Fig. 2. Block diagram of intercommunication between system blocks

Level 3 represents the main (control) part of the whole When a measurement node at the Level 1 receives a
system. From this level, messages are sent to the control message intended for it, the measurement of required
nodes (at Level 2) when it is necessary to perform a specific parameters is starting. After that, the data is converted to be
action or to instruct people who are working to repair the sent as a single message. When there is a request for sending
damage caused on the power line poles. measured parameters, it`s necessary that the body of the
Part of the systems comprising Levels 1 and 2, as well as message includes the measuring node address, to keep track of
the part related to sending data from Level 2 to the Cloud is the exact measuring node or power line pole.
based on the M2M communication protocol [8], similar to Once a message has been received from a particular
some of our previous publications related to the application of measurement node, it is necessary to parse the message to
IoT technology [9-10]. extract useful information, which will be sent to the Internet,
so the control center can monitor the results and react as
B. Usage Scenario needed.
When data is sent from Level 1, the microcontroller on
The realization of the smart system for supervision and
Level 2 observes if the key corresponds to a key defined for a
monitoring power pole lines can be seen on the blocking
particular line pole. If it is the same, the data are received.
scheme for the whole system shown in Fig. 2. The block
When the data reception is completed, a message parsing is
diagram clearly shows how the system is divided into separate
followed to extract integer values for each parameter from the
blocks, each of them operates independently, but ultimately
received string. After parsing, the microcontroller writes the
they represent the whole system. On the system startup, the
values for each parameter into the variables defined for it.
microcontroller on Level 2 communicates with the RTC
This concludes the section on RF communication. The next
module via the I2C bus, to obtain timing information.
step is defining the WiFi/GPRS module and sending the data
Thereafter, it is examined whether the time has elapsed when
to the Cloud or database on the server (arrows from Level 2 to
parameter measurement is required. On that occasion, the
the Cloud) using the MQTT protocol.
microcontroller from Level 2 sends a message to all
Further, the microcontroller checks whether the slope is in a
measuring nodes at Level 1 a measurement should be made.
desirable range (in this case this is set to an angle less than
For informing all of the nodes a measurement is required, a
15°). If the slope angle is greater than 15°, a request for re-
message is sent with a unique address, because every node has
measurement and data transmission is sent every 5 minutes. If
a different ID key. The message is sent by an RF module
it is evaluated to be in danger of falling, the request is sent to
operating at a frequency of 433 MHz, and the distance ranges
the team, which is working to repair the damage and fix the
from 10 m to 7.5 km [11], depending on the need, how far the
problem.
control node is away from the measuring nodes, or the power
line poles.

60
Fig. 3. Results obtained by implementing the realized system

IV. EXPERIMENTAL RESULTS REFERENCES

The parameters are measured during a period of 24 hours, [1] A. Shaikih, M. Thapar, D. Koli, and H. Rambade, “IOT Base
from 5th December to 6th December 2019. Based on the Smart Electric Pole”, ICECA'18, Conference Proceedings of the
simulation of the power line poles in real conditions with the 2nd International Conference on Electronics, Communication
resulting slope problems, the results were obtained in and Aerospace Technology, pp. 594-597, India, 2018.
[2] L. De Yong, N. A. Mohamed Radzi, and Y. E. Jalil, "Pole Tilt
laboratory conditions. Namely, the obtained results (Fig. 3.) Monitoring System Using MEMs Accelerometer and
present the functioning of the realized system. Beaglebone Black", International Journal of Electrical
The number of measured values (every 5 minutes) is greater Engineering and Computer Science, vol. 11, no. 2, pp. 658-664,
in the period when there is a higher slope of the power pole 2018.
than optimal value (slope angle greater than 15°) until the [3] PIC16F628A:https://web.mit.edu/6.115/www/document/16f628.
problem is resolved. When there is no problem occurred, pdf, [On-Line], Data Sheet. Accessed: 15.03.2020.
parameters are measured in 20 minutes time period. [4] BME280 sensor – BOSCH Sensortec: https://cdn-
shsh.adafruit.com/datasheets/BST-BME280_DS001-10.pdf,
[On-Line], Data Sheet, Accessed: 15.03.2020.
V. CONCLUSION [5] BH1750FVI: Sensor Sensor ICS – Mouser Electronics:
http://rohmfs.rohm.com/en/products/databook/datadatas/ic/sens
or/light/bh1721fvc-e.pdf, [On-Line], Data Sheet, Accessed:
This paper describes a reconfigurable smart system for 15.03.2020.
supervision and monitoring power line poles as part of a [6] ADXL345: https://www.analog.com/media/en/technical-
smart city. The presented system is autonomous, which documentation/data-sheets/ADXL345.pdf, [On-Line], Data
means that it monitors the atmospheric parameters, where Sheet, Accessed: 15.03.2020.
the parameter of the slope angle is the most important and, [7] PIC18F45K22:
following the requirements of the control center, monitors http://www.microchip.com/wwwprowwwpr/en/PIC18F45K22,
and measures the parameters. Based on changes in the slope [On-Line], Data Sheet. Accessed: 01.07.2019.
[8] A. Prijić, Z. Prijić, D. Vučković, and A. Stanimirović, “AADL
angle of the line poles, the adequate measures are being
Modeling of M2M Terminal”, Microelectronics Conference
taken to prevent a possible problem that could result from a (MIEL 2010), 16-19 May 2010, pp. 373-376.
fall of the power line poles. [9] M. Đorđević, D. Danković, “A Smart Weather Station Based on
Sensor Technology”, Facta Universitatis, Series: Electronics and
Energetics, vol. 32, no. 2, pp. 195-210, June 2019.
ACKNOWLEDGMENT [10] M. Djordjevic, B. Jovicic, B. Milosavljevic, V. Paunovic, and
D. Dankovic, “Smart House System Based on GSM Mobile and
The authors would like to thank the Ministry of Education, IoT Technology”, IEEESTEC - 11th Student Projects
Science and Technological Development, Republic of Serbia, Conference, Niš, Serbia, 2018, pp. 29-34. (In Serbian)
for financial support. [11] Wireless RF module SX1278 - https://cdn-
shop.adafruit.com/product-files/3179/sx1276_77_78_79.pdf,
Data Sheet, Accessed: 15.03.2020.

61
ENGINEERING EDUCATION
Low Cost Laboratory Environment for the Use of Optical
Methods for Transmission of Audio Signals
Tsvetan Valkovski1 and Kalin Dimitrov2
Abstract – In this paper we will discuss the possibilities of shows a simple diagram of Li-Fi system model with LEDs. As
transmitting audio signals through optical and optoacoustic shown in the figure, the data from the source is modulated to a
methods. An analysis of existing methods and the advantages of digital base signal and it is sent by modulating the visible light
transmitting audio signals through optical methods will be made. with LEDs. The most receiving side, the photodiodes are
A model of a Li-Fi system for transmitting audio signals and
integrated as a photodetector and the LED communication
building one with a minimum number of electrical elements is
considered. This is in order to implement the system presented in circuit of the demodulator, which is capable of converting
the laboratory sessions in front of students, the opportunity to light into an electrical signal. The most the signal attenuation
build such systems from them as a practical exercise and the in the Li-Fi system with LED circuit is urgent issue and thus
consideration of the possibilities for transmitting audio signals the electrical signal is amplified before demodulation [1]. The
through optical methods. basic principle of Li-Fi is shown in Fig. 1.
Keywords – Acoustic, Audio, Optical, Optoacoustic, Li Fi.

I. INTRODUCTION

People have been interested in the transmission of audio


signals without delay and with the highest possible quality for
many years. The goal has always been to convey the original
recording to the listener as much as possible - without
additional noise, without "coloring" the sound picture, exactly Fig. 1. Block scheme of basic Li-Fi system
what is recorded.
Conventional methods for transmitting audio signals over The official standardization of Li-Fi was in December
short and long distances are well known to us. 2011, for VLC technology – visible light 802.15.7 standard
If we divide the audio signals into analog and digital, we completed the project development of the physical layer
could consider different cases. (PHY) and the Media Access Control (MAC) [2-3].
In the case of analog audio signals, it is accepted to transmit If you pay attention to the light source, it can be not only an
the audio signal via copper cables and the audio signal itself is LED diode with visible light, but also a laser, lamp, infrared
electrical. diode. After reviewing the various LEDs, Laser diodes, and
With digital audio signals there is a possibility for Tunable lasers with their atomic structure, electron flow, and
transmission on different media - copper, optical, radio, etc. In the energy level transitions that produce different wavelengths
this article, digital audio signals will not be of interest because of light in semiconductor materials, it is concluded that for the
the goal is to retransmit the original analog audio signal with purposes of our study the most suitable is an LED diode with
as little processing as possible along the transmission path. visible light [4-13].
The features of Li-Fi technology are the capacity,
II. THEORY efficiency, safety and security. Li-Fi provides with greater
bandwidth, which is easy to use and free because it is
The principle of Li-Fi uses changes in magnitude - the unlicensed. Li-Fi provides greater data density compared to
modulation of light for data transmission. Generally, when the that of standard wireless Wi-Fi technology. The data density
LED is on, it transmits a little 1 and when it is off, it transmits is about 1000 times than other technologies. This is due to less
a little 0. The frequency changes so fast that it will remain interference of light than radiofrequency waves. The data
invisible to the human eye continuing to receive a continuous density and bandwidth the output speed is very high. The
white light. Li-Fi only works with a white LED, simply system would be cheap as it requires a smaller number of
because the LED turns on and off in astroboscopic way. Fig. 1 components. No external power input is required for this
technology and moreover, LED illumination is already
1Tsvetan Valkovski is with the Faculty of Telecommunications at
efficient. It eliminates any health hazards caused by
radiofrequency waves. The technology is safe and non-
Technical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000,
Bulgaria, E-mail: tsvalkovski@gmail.com hazardous because the use of light cannot interfere with any
2Kalin Dimitrov is with the Faculty of Telecommunications at electronic circuitry. Hacking or data theft is negligible
Technical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000, compared to other wireless technologies since the range of
Bulgaria, E-mail: kld@gmail.com data transmission is confined to a certain visible area [14-17].

978-1-7281-7142-5/20/$31.00 ©2020 European Union 65


III. OPTICAL METHODS FOR TRANSMISSION OF In the part of the "Audio output" we must have a receiver of
AUDIO SIGNALS an audio signal, which could be anamplified speaker,
multimedia speaker system, phones etc.
After examining the individual blocks, it is time to pay
The article will conduct a study to build a basic Li-Fi
attention to the necessary elemental basis for building the
laboratory environment to demonstrate the transmission of
laboratory environment.
audio signals by optical methods.
The needed elements are:
The experimental part includes a study of the
- The required wiring is standard stereo audio cables and
developments so far, a study of the individual components
3.5 mm jack connectors, known as AUX cable.
needed to build the environment and the selection of
- AnLEDdiode with characteristics 5mm dimensions,
specific, suitable electrical elements and sensors.
6000-15000k nm wave length, 14000-16000 MCD, 3-
From the developments considered so far, the basic
3.2V Voltage and 20mA current.
model of this laboratory environment is presented in
- A resistor with 220 Ohms resistance.
Fig. 2.
- A solar cell panel with characteristics 10x10 cm
dimensions, 6V maximum voltage, 100mA maximum
current.
The possibilities to improve the Li-Fi laboratory
environment are to use a high intensity light source like a
laser, to use a very sensitive solar panel, have a higher audio
input and reduce interference by moving into a dark room.
In further developments, the system could be improved by
increasing the element base in the transmitter and receiver in
order to improve the quality, speed and capabilities of audio
Fig. 2. Block scheme of the basic model of Li-Fi laboratory signals[10].But the basic idea of transmitting audio signals by
environment optical methods remains the same, shown illustratively in
Fig. 4.
In the part of the "Audio input" we must have a source
of audio signal, which could be a smartphone, mp3 player,
laptop, computer, etc.
“Modulation circle LED” is a block which is much
more complex to implement. In it, we must convert the
input audio signal so that we can add power to it, which
will be the carrier signal. At the same time, we should not
degrade the quality of the audio signal, but we should also
strive for a higher power of the carrier signal, which in
turn leads to transmission over longer distances. This is
derived from the laws of light propagation in the free
atmosphere, the higher the power we have, the greater the
distance we will transmit the signal.An easy way to build
this block is through a suitable DC battery and a suitable
resistor, as shown in Fig.3.
Fig. 4. Illustration of proposed Li-Fi System

After building the system, we conducted several


experiments with a random audio signal and a fixed one from
a tone generator.
Table 1 and Fig. 5 show the initial experiment with a sine
test tone at 1 kHz. The greatest distance that we made
measurements at is 1 m and the SPL is 37 dB, that is a very
low sound level and we estimated that we would run the
Fig. 3. Wiring diagram of “Modulation circle LED” experiment until the sound level dropped by 30 dB.

“Solar panel” block includes standard solar panel for visible TABLE I
light and stereo audio cable such as in the “Modulation circle THE SOUND LEVEL AT DIFFERENT DISTANCES
LED” block. When the solar panel receives a light signal, it
Z,cm 5 10 15 20 25 30
transforms it into an electrical signal and this signal is not the
carrier signal from the battery. This signal is exactly the audio SPL,dB 73,6 73,5 71,9 71,3 71,2 70,5
input signal. Z,cm 35 40 45 50 55 60
SPL,dB 70,1 69,7 68,4 66,2 64,1 58,9

66
Fig. 5. Graphic representation of the readings for the sound level at Fig. 7. Graphic representation of the readings for the signal level at
different distances different distances

The next experiments we performed were at a frequency of


1kHz emitted by a tongener and measured on an oscilloscope
in order to increase the accuracy of the measurements.
At Fig. 5 we can see that the noise level decreases by less
than 10 dB at half a meter, which for the size of the LED and
the solar panel used is quite a distance, when visible light is
used and taking into account the dispersion and the
polarization.
Fig. 6 and Table 2 show the laboratory setting and the
obtained results at the signal level when changing the
distance.

Fig. 8. Laboratory environment for measuring the signal level at


15 cm and changing the angle of signal reception by changing the
angle of the solar panel cell

TABLE III
THE SIGNAL LEVEL AT 15 CM AND CHANGING THE ANGLE
OF SIGNAL RECEPTION BY CHANGING THE ANGLE OF
THE SOLAR PANEL CELL

Angle, o 0o 15 o 30 o 45 o
U, V 0,34 0,335 0,33 0,32
Angle, o 60 o 75 o 90 o
U, V 0,315 0,285 0.021

Fig. 6. Laboratory environment for measuring the signal level at


different distances

TABLE II
THE SIGNAL LEVEL AT DIFFERENT DISTANCES

Z, cm 15 30 45 60 75 90
U, V 0,34 0,13 0,12 0.10 0.07 0.05

Fig. 9. Graphic representation of the readings for the signal level at


15 cm and changing the angle of signal reception by changing the
angle of the solar panel cell

67
Fig. 8 and Table 3 show the laboratory setting and the REFERENCES
obtained results at the signal level at 15 cm and changing the
angle of signal reception by changing the angle of the solar [1] A. Assabir, J. Elmhamdi, A. Hammouch, and A. Akherraz,
panel cell.The measurements are from 0o to 90o, because after "Application of Li-Fi Technology in the Transmission of the
90o the angle of view is zero and there is practically no way to Sound at the Base of the PWM", 2016 International Conference
receive a signal. on Electrical and Information Technologies (ICEIT), Tangiers,
From the results obtained in Tables 2 and 3 and the 2016, pp. 260-265, doi: 10.1109/EITech.2016.7519602
graphics in Figs. 7 and 9, the change in the angle of signal [2] C. Gavrincea, J. Baranda, and P. Henarejos, "Rapid Prototyping
of Standard-Compliant Visible Light Communicatios", IEEE
reception does not have such a strong effect as the change in
Journal & Magazines, vol. 52, pp. 80-85, July 2014.
the distance. Because the drop in the signal level from 0o to [3] IEEE Rev. 802.15.7-2011, "Standard for Local and
75o is 0.055 volts. While when changing the distance even Metropolitan Area Networks, Part 15.7: Short-Range Wireless
from 15 to 30 cm, the drop in the signal level is 0.21 volts. Optical Communication Using Visible Light", Sept. 2011.
After the experiments done so far, it can be said that the [4] J. B. Carruthers, "Wireless Infrared Communications", Wiley
laboratory environment is suitable for transmitting audio Encyclopedia of Telecommunications, John Wiley & Sons, Inc.,
signals by optoelectronic methods over relatively short 2003.
distances with a wide angle of signal reception. [5] K. Asatani, T. Kimura, "Analyses of LED Nonlinear
Distortions", IEEE Journal of Solid-State Circuits, vol. 13, no.
1, pp. 125-133, February 1978.
IV. CONCLUSION [6] N. Theofanous, A. Arapoyianni, "Light-to-Input Nonlinearities
in an R-LED Series Network", IEEE Journal of Quantum
As can be seen from experimental and theoretical data, the Electronics, vol. 28, no. 1, pp. 34-38, January 1992.
[7] K. Asatani, T. Kimura, "Linearization of LED Nonlinearity by
Li-Fi laboratory setting can be performed even at home. On Predistortions", IEEE Journal of Solid State Circuits, vol. 13,
the financial side, it is a low-budget project, but with the no. 1, pp. 133-138, February 1978.
advantages it offers, it is interesting to consider.The data [8] P. Petrov, V. Georgieva, "Adaptive Velocity Control for a
transmission experiment by using Li-Fi offers 100 Gbps Differential Drive Mobile Robot", 2018 20th International
maximum speed and it can be up to 240 Gbps theoretically. Symposium on Electrical Apparatus and Technologies (SIELA),
In this experiment, we transmit audio signal over Li-Fi to Bourgas, 2018, pp. 1-4, doi: 10.1109/SIELA.2018.8447091.
present the possibilities of this technology to the students at [9] H. Elgala, R. Mesleh, and H. Haas, "Non-Linearity Effects and
the Technical University - Sofia. Predistortion in Optical OFDM Wireless Transmission Using
This laboratory environment could be set for students to LEDs", Intern. Journal of Ultra Wideband Communications and
Systems, vol. 1, pp. 143-150, October 2009.
perform in laboratory sessions as part of the practical training
[10] H. Qian, S. J. Yao, S. Z. Cai, and T. Zhou, "Adaptive Post-
in the discipline "Optoelectronics and Optical Distortion for Nonlinear LEDs in Visible Light
Communications", taught to bachelors at the Faculty of Communications", IEEE Photonics Journal, vol. 6, pp. 1-8,
Telecommunications at the Technical University of Sofia. In 2014.
addition, it could be a good basis for upgrading in a bachelor's [11] S. H. Ali, S. P, G. R. Embedded, and M. J, "Design and
thesis by considering various electrical elements, achieved Evaluation of LiFi Module for Audio Applications", 2018 15th
results, changing characteristics etc. IEEE India Council International Conference (INDICON),
Coimbatore, India, 2018, pp. 1-5, doi:
10.1109/INDICON45594.2018.8987134
ACKNOWLEDGEMENTS [12] B. Liengme, A Guide to Microsoft Excel 2007 for Scientists and
Engineers, Academic Press, 2008.
We would like to express our sincere gratitude to the [13] G. Popov, K. Raynova, "Diversity in Nature and Technology -
Faculty of Telecommunications at the Technical University of Tool for Increase the Reliability of Systems", 2017 15th
International Conference on Electrical Machines, Drives and
Sofia for providing the laboratory base. Power Systems, ELMA 2017, pp. 464-466.
The scientific research and the results obtained are part of a [14] G. Popov, "Use of System Diversity as Tool for Identification,
contract №202ПД0014-07 for a research project to help International Conference on High Technology for Sustainable
doctoral students: “Using optical methods to collect and Development", HiTech 2018, Article number 8566676.
transmit audio signals” of the Technical University of Sofia, [15] Microsoft Excel 2007 for Scientists and Engineers, Academic
Research Sector. Press, 2008.
[16] L. Johnson, Fiber Optic Active Devices - LEDs, Lasers, and
Detectors, Course, IEEE, 2013.
[17] S. Kulkarni, A. Darekar, and P. Joshi, "A Survey on Li-Fi
Technology", 2016 International Conference on Wireless
Communications, Signal Processing and Networking
(WiSPNET), Chennai, 2016, pp. 1624-1625, doi:
10.1109/WiSPNET.2016.7566413

68
IMA-NET: Innovative e-Management Platform for
Academic Network
Galia I. Marinova1 and Krisel L. Tola2
Abstract – In academic networks are priority in higher II. DESIGN AND SOFTWARE REALIZATION OF
education international cooperation. Successful management of
teachers’ and students’ mobilities is one of the main tasks in
IMA-NET PLATFORM
academic networks. Based on the positive experience with the
coordination of CEEPUS Network - CIII-BG-1103-05-2021 A. Design of IMA-NET Platform
Modelling, Simulation and Computer-aided Design in
Engineering and Management, a platform for Innovative e- The design of the IMA-NET platform is presented in Fig. 1.
Management of Academic Network IMA-NET is developed. The Modules developed in IMA-NET are: Database collecting
paper describes in details the software realization of IMA-NET and storing the know-how of teachers in the network (courses,
platform, its modules and its impact on network management. tools, modules); Survey tool to evaluate students’ interest to
different courses offered; Tool to generate context-oriented
Keywords – E-Management, Academic network, Joint
programs, Students’ mobility, CEEPUS, Web based application. Flexible courses with 3 ECTS, composed by 3 modules from
the Database; Certificate generator and assessment tool; Tool
to assist Joint Doctoral program “Thèse en co-tutelle”; Tool
I. INTRODUCTION for Events with Feedback option; Tool for dissemination of
joint achievements and new knowledge created in the
University networks are a trend in higher education network.
development nowadays. CEEPUS program is a good example
of long term academic network implementation. Schuch K.,
based on Central CEEPUS office information, shows in [1]
that 80 CEEPUS academic networks are granted for the
academic year 2019/2020. The CEEPUS Network CIII-BG-
1103-04-1920 Modelling, Simulation and Computer-aided
Design in Engineering and Management [2] is in its 5th year,
it involves 33 partner HEIs from 15 countries from CEEPUS
region [3] and it is considered as a large scale network.
Management of mobilities in a CEEPUS network is a
challenge. The goal is to organize successful CEEPUS events,
short and long term students’ and teachers’ mobilities, using
the grants awarded to the network, in an optimal way. To
achieve this goal, CEEPUS events, individual study and
teaching programs have to be organized early enough to
permit students and teachers from partner institutions to apply
for CEEPUS grants in the deadlines defined by CEEPUS
program and by the National CEEPUS offices in CEEPUS
Fig. 1. Design of IMA-NET platform
partner countries. To face the challenges an Innovative e-
management platform IMA-NET is designed and developed.
The outline of the paper is: In Section II the design of IMA- B. Framework and Approach Implemented for the Software
NET platform and the software realization are considered, in Realization of IMA-NET Platform
Section III the impact of IMA-NET on mobilities is estimated
and Section IV concludes the paper and describes probation The platform IMA-NET supports three different user
planned for the platform. interfaces, respectively:
• Administrator – Coordinator of the CEEPUS
network and Platform support staff;
• Lecturer – Teachers in the CEEPUS network;
• Student – Students in the CEEPUS network.
The administrator is redirected to a control panel interface
1,2
where he/she can view different statistics and trends. The
Galia I. Marinova and Krisel L. Tola are with Technical administrator can create, edit and delete courses, modules and
University-Sofia, Faculty of Telecommunications, Boulevard
topics. Also, when a lecturer or a student signs up, they are
“Kliment Ohridski” 8, 1000 Sofia, Bulgaria, E-mail: gim@tu-
sofia.bg
stored in a pending list and the system administrator is

978-1-7281-7142-5/20/$31.00 ©2020 European Union 69


responsible for accepting or rejecting them. The administrator Codeigniter [8] source framework to build dynamic PHP
has access to all the surveys, including data about the person applications and the MVC (model-view-controller)
who filled them and the topics he selected. architecture were used for the software design of the platform
The lecturer can manage topics and modules. The data IMA-NET.
entered in the Topics section is used in the survey section.
Each topic belongs to a category. At the end, the survey C. MySQL and Database Structure in IMA-NET
shown to the users will be a categorized list of topics fetched
from the lecturers’/administrator’s input. The Database in IMA-NET relies on a relational database
The lecturer can insert, edit and delete modules. A module management system (RDBMS) called MySQL. A RDBMS is
is part of the specific Joint program called Flexible course. a database management system which depends on the
Each course consists of three modules and each module relational model. Database management systems are the
should have three lessons inside and three practical examples electronic filing containers that help to manage the
conform to CEEPUS teacher’s mobility format and information [9]. On this kind of systems, data is organized
requirements [3]. The web-app offers the possibility to enter a into tables compounded by specific fields. Each field contains
title for each module and a descriptive text making use of the type of data being saved. Some of the main advantages of
external text editing libraries. relational DBMSs are table’s interconnectivity, structured
Students logged in the system are provided a list of flexible queries, scalability, flexibility and security.
courses they can register themselves in. They are able to view Fig. 2 is an illustration of the tables, part of the web
data around the flexible courses such as modules they need to application for IMA-NET, their fields and their relations. All
follow, place and timesheets. credentials of the users who can access the system via the
The information about managers, lecturers, students, login interface are saved in the table called users. Digging a
surveys, courses, topics and their connections is saved in an bit further we can understand that the primary key of users
independent database. table is used as a foreign key in two other tables such as
Selecting the right tools to use for developing the web recovery_req and student_cours. The usage of primary keys
application for IMA-NET, required a serious study of the and foreign keys is part of normalization process and this is
available options. It was opted in for a fully compatible set of essential since it would avoid data repetition in more than one
open source programming languages which interact with each table. All the tables illustrated in the above schema have gone
other for the end goal. “Open source” refers to the notion that through this process.
the encoded instructions for the programs produced are openly To connect to this database system, Codeigniter offers a
available for scrutiny by potential users. One of the goals of configuration file called database.php located in
open source software development is to enhance the quality of application/config/%workingenvironment% where working
the software by increasing scrutiny for errors by more environment can be one of the following folders:
programmers [5].
A combination between HTML, CSS, Javascript, 1) Developing
Codeigniter (PHP framework) and MYSQL [5-7], [9] was 2) Testing
used to accomplish the platform development. 3) Production

Fig. 2. IMA-NET table structure and relations

70
Once opened the file in a text editor all that the user needs sections of 10. The administrator can interact with this section
to do is to insert the database credentials inside the by choosing between checking out lecturer details or deleting
$db['default'] array. All the connection phase is than handled their account. The lecturer details page contains info such as
by Codeigniter. Following the framework rules, all database lecturers name, the University he or she comes from and a list
actions and business logic should reside inside model folder. of proposed topics. The topics that a lecturer proposes are than
The files inside this folder must extend the model class shown in the surveys topics list.
inheriting so all properties and methods of that class. Inside The whole control panel follows this design principle.
the class we can create than methods which would call the $db Unlike the most of pages in IMA-NET, the survey section
class to execute queries via SQL language according our works as a separate entity of the website. No login to the
needs. system is necessary to have access and fill the survey since it
Since there are 3 different user types they are offered a is supposed that this survey will be filled by persons who are
login interface which shows up when the user would send a not necessarily staff or students.
request to the domain. The platform is hosted on the web After the users fill the formal information, the survey
address: ima-net.ubt-uni.net. The login page is illustrated in continues with a list of topics suggested by the lecturers
Fig. 3. registered on the system. Each category has a certain number
of topics and this data is displayed in different tables. To
access the survey a separate link is to follow: http://ima-
net.ubt-uni.net/survey. The web page of the survey is
presented in Fig. 4.

Fig. 3. IMA-NET login page

At this section users can also create an account or recover


their password in case they lost it. The logic behind account
recovery is that the user must insert their e-mail address used
to register initially on the website. Once entered the e-mail
they will receive an activation email giving them the
possibility to set a new password. At the very bottom of the
page you can find a list of partners who made possible the
development of the web application. Each logo contains a link
which will redirect to the corresponding website if clicked.
As stated in the image above, users will have to fill some
formal information such as their name, email, country etc. The
survey continues with a list of topics suggested by the Fig. 4. Web page of the Survey in IMA-NET
lecturers registered on the system. Each category has a certain
number of topics and this data is displayed in different tables. III. IMPACT OF IMA-NET PLATFORM ON
After inserting the correct credentials as an administrator MOBILITY MANAGEMENT
the user is redirected to the control panel. The panel interface
is the same for all user roles. It differs only from the access IMA-NET platform permits to organize the know-how in
rights each user level has and what he can or can not do within the academic network, to automate and optimize the Flexible
the system. The first page the user will see as an administrator course content and Certificate generation [4] for concrete
after logging in, is the dashboard. This page contains some CEEPUS events and Joint doctoral program courses, to inform
useful statistics regarding number of students registered on the students and teachers on time about the events and Joint
system or selected topics trend gathered from the survey program courses and to permit them to apply for CEEPUS
results. The lecturers tab contains a list of all registered grants in the deadlines fixed by CEEPUS program. The
lecturers appears to the administrator. To display the list a platform IMA-NET performs statistics to analyse the students’
paginated table is used. This is handy since there may be a lot and teachers’ interest and feedback. The dashboard of IMA-
of data. Pagination gives the possibility to split these ones into NET is presented in Fig. 5.

71
Fig. 5. Dashboard of IMA-NET

As visible from the figure, the topic of Project Management


is currently the one that has attracted the highest interest from
REFERENCES
students.
[1] K. Schuch, "The Uptake of European Programmes in the
The first experimental implementations showed that IMA-
CEEPUS Cooperation Area", Center for Social Innovation, pp.
NET is an excellent instrument to assist the coordination of 1-24, June 2019
the network [2] Site of the CEEPUS project CIII-BG-1103-03-1920 (2020):
Modelling, Simulation and Computer-Aided Design in
IV. CONCLUSION Engineering and Management, Retrieved February 23, 2020
from: http://ceepusmodcad.ubt-uni.net/
[3] Site of CEEPUS program, Retrieved February 23, 2020 from:
The web application for the IMA-NET platform presented https://www.ceepus.info
in this article will allow CEEPUS members to have an [4] G. Marinova, "Impact of University Networking on Students’
organized and centralized e-management system for their Mobility and Motivation", EUNIS 2019, Trondheim, Norway,
summer school sessions. The set of open source programming 5-7 June 2019, https://www.eunis.org/eunis2019/wp-
languages used to develop this software gives the possibility content/uploads/sites/15/2019/06/S11-3.pdf
to maintain and manipulate gathered data easily significantly [5] D. Delorey, C. Knutson, and C. Giraud-Carrier, "Programming
reducing the error margin. Being an online website, one just Language Trends in Open Source Development: An Evaluation
needs an internet connection to access it thus eliminating Using Data from all Production Phase Source Forge projects",
Second International Workshop on Public Data about Software,
boundary limits. IMA-NET platform will be probated to
pp.1-6, June 2007.
organize Flexible course within CEEPUS, at the Summer [6] G. B. Newby, J. Greenberg, and P. Jones, "Open Source
Academia, Summer Schools and International Weeks Software Development and Lotka's Law: Bibliometric Patterns
incorporated in the annual program of the network. The in Programming", Journal of the American Society for
effectiveness of the platform will be tested through the Information Science and Technology, vol. 54, no. 2, pp. 169-
Feedback tool and the Feedback forms generated by IMA- 178, 2003.
NET. They will be filled by teachers and students attending [7] W. Cui, L. Huang, L. Liang, and J. Li, "The Research of PHP
the courses and events and later they will be analyzed. Development Framework Based on MVC Pattern", IEEE 2009
Management decisions for network will be formulated based Fourth International Conference on Computer Sciences and
Convergence Information Technology, Seoul, Korea, 2009.
on the feedback results.
[8] A. K. Himawan, "Performance Analysis Framework
Codeigniter and CakePHP in Website Creation", International
ACKNOWLEDGEMENT Journal of Computer Applications, vol. 94, no. 20, 2014.
[9] R. Nixon, Learning PHP, MySQL, JavaScript, and CSS,
The results presented in the paper are partly supported by O’REILLY, 2009.
the CEEPUS project CIII-BG-1103-03-1920: Modelling,
Simulation and Computer-aided Design in Engineering and
Management.

72
Expert Tool for Filter Design Program Selection in
Online-CADCOM Platform
Ognyan R. Chikov1 and Galia I. Marinova2
Abstract – The paper describes the software implementation of benchmark example are discussed in Section IV. Conclusions
Expert Tool (ET) for automatic selection of filter design program and implementation in the educational process are drawn in
in the Cloud-based platform Online-CADCOM. It illustrates the Section V.
methodology of development, integration and delivery of
Multicriteria Decision Analysis method used for user-friendly
automatic selection for designing filters through ET. Decision II. DESIGN MODIFICATION IN E-CONTENT
Matrix and MAUT model usage as well as front-end and
backend implementation and integration of the ET are
DEVELOPMENT FOR TOOL SELECTION
described. The platform and the ET are used for education in the
courses of Computer-aided design in Technical University-Sofia, A. Modification Needed in E-content Development to
and for individual students’ projects. Implement the MAUT Additive Aggregation Model Method

Keywords – Expert system, Filter design, Multicriteria decision The development and integration of ET consists in solving
analysis, Decision matrix, MAUT model. 2 tasks: extending the tool passport format through adding a
set of mandatory and desired criteria with different weight
I. INTRODUCTION coefficients (full list for filters is published in [6]) and
implementation of the Multicriteria design analysis formulas
Online and cloud-based EDA tools are a trend during the for performing tool selection. The modifications to develop in
last decade [1]. The Online-CADCOM platform [2], contains Online-CADCOM for adding the ET are presented in Fig. 1.
large number of online tools for computer-aided design
(CAD) which are integrated, based on methodology steps. The
tools are first estimated for reliability by tests of their
qualitative and quantitative features and then classified based
on Daniel-Gajsky Y model [3] for design levels abstraction.
Each tool has its own unified Tool Passport template,
containing its features characterization [2,4]. Conform to
Daniel-Gajsky Y design abstraction model, the platform is
structured on categories and subcategories containing tools,
based on their classification and characterization. Analog
filter design is the first automated in analog area, so different
semiconductor designers and/or manufacturers provide their Fig. 1. Modifications in Online CADCOM for adding ET
own online tools [5], often oriented to the devices they
produce. Seven tools for analog filter design are integrated in The E-content development for filter design program
Online-CADCOM [6]. The Multicriteria Decision Analysis is selection is oriented to the implementation of MAUT additive
used for automated tool selection for filter design. In the aggregation model method [7]. Additive aggregation model is
current paper the approach is implemented in software. based on weighted means and the algorithm works in two
Considerable modifications of the E-content development steps based on mandatory and desired criteria from the
process and the methodology for passport tool publication are specification of the filter to be designed.
introduced in Online-CADCOM in order to integrate the
The value function F(OPTIONk)is expressed as:
Expert Tool (ET) in the platform. A benchmark example for
automatic selection of filter design tool from [6] is solved ( )=∑ ( ), (1)
using the ET.
The paper is organized as follows: The modification in e- where wj is the weight of attribute j and uj(xkj) is the utility
content development is presented in Section II. Online- calculated from the value (x) of criterion j in option k.
CADCOM expert tool database and algorithm implementation Two steps follow - Mandatory criteria are defined and for a
are presented in Section III. The ET implementation and given specification of the filter the set of viable options (VO)
is determined. VO is defined as:
1,2Ognyan R. Chikov and Galia I. Marinova are with Technical =⋂ ∏ ( ), (2)
University-Sofia, Faculty of Telecommunications, Boulevard
“Kliment Ohridski” 8, 1000 Sofia, Bulgaria, E-mail: where Xi, i=1..n - mandatory criteria, σ(Xi=True) - estimate
gim@tu-sofia.bg of selection.

978-1-7281-7142-5/20/$31.00 ©2020 European Union 73


Mandatory criteria options weights and desired criteria C. Software Implementation of the ET
options weights may vary and may be presented or not in a
different filter design tool. That’s why they are separated in The software implementation of every step is composed by
different steps and implemented separately in the E-content so called “component” containing four separated files as
development. The Passport tool process is updated and for its follows:
creation, a multi-step Wizard component is created, designed • Template file which contains the structure of the screen
and used. The Wizard component is composed of 5 steps (HTML Elements). Each component of the screen is built
separated by implementation, but tightly connected by each dynamically, based on the data coming from the database.
other by logic, sequence and requirement. This is needed There are no static elements, which defines the large
because there are different criteria options with different scalability of the platform and easy maintenance. Each
weight to be implemented. criterion with its options is built dynamically based on
properties described and fetch from the Model in MVC
B. General Workflow for Implementing MAUT Additive framework.
Aggregation Model Method • CSS File which contains the cascade sheet styles of the
screen. The major platform styles are exported to a single file
The ET creation process is built of 5 steps corresponding to View “styles.css” in the MVC framework, however each step
the step workflow bar containing the Options used in MAUT from the Wizard needs specific tweaks and options to be
equation for utility function as follows: implemented. The color of the table header is set as well as
• Tool Basic Information – in the tool Passport; media query tag specified for certain screen resolution.
• Mandatory Criteria Options with weight coefficient (1); • Component file – Model Implementation of the template. It
• Desired Criteria Options with weight coefficient (0.5); defines which component to dowhat on the screen, and the
• Desired Criteria Options with weight coefficient (0.33); user actions provided. Component file is the backbone file of
• Success Screen – This screen is a notification screen that certain component and in our implementation, a certain step.
notifies the user for the successful inclusion and successful The fragment on bellow shows how each component import
publication in the ET. specific files that uses and creates its own class that can be
The steps are implemented as independent and no one step implemented by other classes.
can be skipped. The navigation is by the “Next” and “Back”
buttons. import { Component, OnInit } from '@angular/core';
In the first step, the user is filling the well-known attributes import { FormGroup, FormBuilder, FormArray, FormControl
of tool passport from [2]. The Passport and the ET are now } from '@angular/forms';
tightly coupled because entering the tool information Component({
automatically defines the information into the ET. selector: 'app-add-tool',
In the third step, the Desired Criteria Options with weight templateUrl: './add-tool.component.html',
coefficient (0.5) is shown. Here the options are represented styleUrls: ['./add-tool.component.scss']
with a check button. The user can select the desired ones. In })
the fourth step, the Desired Criteria Options with weight
coefficient (0.33) are selected. This is the criteria option with export class AddToolComponent implements OnInit {
lower coefficient. Mandatory and desired option selection are
shown in Fig. 2. In the last fifth step, the user is notified that • Test File is for automation tests scenarios. Test files are
process is completed. From here, the user can be navigated to used for automatic test of implementation of the component.
dashboard. The connection between the components and the data flow
described above is done by sharing data from parent to child
components. The sharing of the data allows keeping the state
of the data between the steps. The goal of next Section is to
show how the data is saved in the database and how the
Criteria Options are organized in the context of the database
in Online-CADCOM.

III. ONLINE-CADCOM EXPERT TOOL DATABASE


AND ALGORITHM IMPLEMENTATION
A. Database Implementation
The platform database is extended and should be redesigned
to accumulate all the necessary Passport Tool extended
information used in the ET. The whole Passport table is not
updated or changed. A new database tables are added as
Fig. 2. Mandatory and Desired Criteria Options with weight described:
coefficient 0.33 • Database Table for Mandatory Criteria Options – This
table contains three rows as showed in Fig. 3.

74
"optional_coefficient_05": { ... },
"optional_coefficient_033": { ... }

The json object is helping to describe every feature request


Fig. 3. Database table for Mandatory Criteria Options
from the user and prepopulated in the front-end part of the
platform, where the ET is launched and the query is executed.
The “frequency_range” row contains the possible options as The execution of the query to the database is made with
described in [6] for “Frequency range / Filter elements” “database queries” containing all the “rules” populated in the
mandatory criteria. The “Type_of_Filter” row contains the json file. Example query is shown below:
possible options as described in [6] for “Type of Filter”
mandatory criteria. The “id” row contains the id associated SELECT * FROM mandatory_criteria_options WHERE
with the id of the Passport Tool form the “tools” table. This is rules.mandatory .frequency_range=”1kHz-100kHz”
the relation between a single tool and mandatory criteria
options with weight coefficient (1). Then execution is made for all other Desired Criteria
• Database table for Desired Criteria Options with weight Options. When the results are retrieved, then the calculation of
coefficient (0.5) – This table contains fourteen rows as the coefficient is performed. The code fragment bellow
showed in Fig. 4. represents the selection formula. Here the overall weight
coefficients are calculated based on loop cycle and addition of
Mandatory criteria weight. Then, the same loop cycle is made
for Desired criteria weight with coefficients 0.5 and 0.33:

queryResults.forEach(element => {
letoveralCoeff = 0;
switch (element.criteria) {
case mandatory:
overalCoeff += element.weightCoeff;
break;
case optional_05:
overalCoeff += element.weightCoeff;
Fig. 4. Database table for Desired Criteria Options with weight break;
coefficient (0.5) case optional_033:
overalCoeff += element.weightCoeff;
The id row is a relation between those criteria options and break;
the Passport Tool itself. default:
• Database table for Desired Criteria Options with weight break;
coefficient (0.33) – This table contains seven rows. });
B. Algorithm Implementation For every retrieved tool that matches a desired criteria
option, a coefficient number is added to the total coefficient
The algorithm of ET is implemented in the platform based on the coefficient of the matched option. At the end of
backend and works on two stages: the algorithm, the calculated coefficient for Tools founded in
• Receive the query from front-end with the desired the platform are sorted and the tool with the highest
parameter specified by user. All these parameters are coefficient is likely the one that the user will use for designing
described in the next section. the filters based on provided options.
• Execute the query on the database with these parameters. The returned result from the algorithm is array of objects
• Return the calculated result to the front-end for showing with JSON format and a fragment is shown below:
the best solution for ET program selection. [
Before executing any operations on the database, the {"id": "KRGj33nHJsekuDLGXErWuvvAoU42", "value":
backend should be connected to it. 1.33},
Receiving the query from the front end is made by calling a {"id": "2iyHVhIX7MNpWjMFUMyXjhGDuYA3",
separate function called: “performExpertQuerry(params)” "value": 0.83},
which receives all the parameters from the front-end as {"id": "4Macg8WlG7OKo56ojenFN2aSz4J3", "value":
JavaScript Object Notation (JSON) object. This object is in 0.83}
the following format and contains key-value pairs: ]
“{ Key: Value }” The “id” key is representing the id of the Tool in the
In our case the request object is slightly different and platform, which will be used later to show the Tool on the
complex. Fragment of it is showed below, as some of the screen and the value is the calculated coefficient based on ET.
content is hidden because of the long code list. The next Section shows how the ET is implemented in the
{ "mandatory": { front-end of the platform and a benchmark example is solved.
"frequency_range": "1kHz-100kHz" },

75
IV. ET IMPLEMENTATION AND REAL-LIFE sensitivity-Monte Carlo. This is the last step from the Wizard
EXAMPLE and the user can navigate back to correct his options. Once the
button “Next” is clicked, the ET algorithm is launched and the
needed queries and backend mathematical solutions are
The ET is implemented on the front-end part of the
performed. During the calculation the user is seeing the screen
platform. It can be launched from the main menu of the
with dynamic loader showing that backend actions are
platform, which is repositioned and restyled.
performed.
The process is designed as workflow wizard steps
The process completes, the loading bar is hidden and the
container, so the user can provide the valuable information
ET provides to the user the best solution for the desired filter
needed for the ET in small and easy to understand steps. Here
design options, then additional tools that might also do the
again the workflow has a toolbar with information about all
job. The result for the benchmark example is shown in Fig.6.
the needed steps in order to complete the process. They are
marked with number and get coloured when single step
information is provided and completed. V. CONCLUSION
• Basic Category Information Step – on this step the user
can select the category of the tool. In our case, the ET is The paper described the software realization of an Expert
implemented for analog filter design and the category is tool for automatic selection of a program for filter design. The
selected. ET is successfully integrated in the platform Online-
The information for this step is provided and the ET CADCOM. A test example based on benchmark was
software implementation lets the user go forward to the next performed in order to illustrate the implementation.
step as makes the “Next” button active. Pressing it will The platform Online-CADCOM with the new ET is used in
navigate to the second step. the educational process in the courses of Computer-aided
• Mandatory Filter Criteria – on this step the user must design in the Faculty of Telecommunications in Technical
specify the mandatory filter option for filter design selection. University, Sofia, Bulgaria. The feedback from about 200
The checkboxes option implementation allows the user to Bachelor student using ET is that it helps them to assimilate
select more than one option. For the demonstration of the ET better and deeper the filter design process and options.
a benchmark filter design specification from [6] is used. The Further development is connected with the design of other
options are selected as shown in Fig. 5. categories of circuits and systems within the ET and Online-
CADCOM platform.

ACKNOWLEDGEMENT
This study is realized andpartly supported by the CEEPUS
network CIII-BG-1103-04-1920.

REFERENCES

Fig. 5. Selection of mandatory criteria [1] Rik, Top 10 online circuit simulators, Electronics-lab.com, 8,
Dec. 2016, https://www.electronics-lab.com/top-ten-online-
circuit-simulators/
[2] G. Marinova, O. Chikov, “Methodology for Tools Integration in
the Online Assisted Platform for Computer-Aided Design in
Communications”, ICEST 2015, pp. 31-35, 2015.
[3] D. Daniel, D. Gajski, S. Abdi, A. Gerstlauer, and G. Schirner,
Embedded System Design: Modeling, Synthesis and
Verification, Springer, 2009.
[4] G. Marinova, O. Chikov, “E-content Development and Task
Solution Using the Content Management System of Online-
CADCOM”, ICEST 2016, Ohrid, Macedonia, June 28-30, 2016,
pp. 213-216.
[5] B. Rodic, G. Marinova, and O. Chikov, “Algorithms and
Decision Making Methods for Filter Design Tool Selection for a
Given Specification in Online-CADCOM Platform”, ERK 2017,
Slovenian IEEE Section, Portoroz, Slovenia, 25-26 September
2017, pp. 247-251.
Fig. 6. Selection of the tools by ET [6] G. Marinova, O. Chikov, and B. Rodic, “E-Content and Tool
Selection in the Cloud-based Online-CADCOM Platform for
Once the mandatory options for ET are selected, the process Computer-Aided Design in Communications”, CONTEL 2019,
can continue and the next step from the Wizard is loaded. The Graz, Austria, 3-5 July 2019, pp. 1-4.
options selected for desired criteria with weight 0.5 are: Flat [7] J. Butler, D. J. Morrice, and P. W. Mullarkey, “A Multiple
Band – Butterwort and Circuit topology – Biquadratic. Then Attribute Utility Theory Approach to Ranking and Selection”, J.
Management Science,vol. 47, no. 6, pp. 800-816, 2001.
for Desired Criteria with weight – 0.33 is chosen: Low

76
Analysis of Pulse Code Modulation in MATLAB / Octave
Environment
Lyubomir Laskov1, Veska Georgieva2 and Kalin Dimitrov3
Abstract – In this paper, we present an approach for MATLAB Simulink because of the supplementary features
investigating the pulse code modulation for signals with various giving students the possibility to change signals and the
shape forms. We have developed an algorithm as well as its parameters of the individual processes performed during
course of implementation in MATLAB and Octave PCM, which is not applicable in MATLAB Simulink [2], [3].
environments. The software we have implemented makes it
The source code writing also results in the expectation that the
possible to investigate the Pulse Code Modulation of various
analog signals along with the signal parameter influence and students are familiar with the processes taking place during
parameters of PCM on the discrete and digital signals. It is PCM.
possible to use the presented approach in education, in the field The environment of MATLAB bears a decisive advantage
of engineering, to study this process. over other programming languages and software products, due
to its built-in functions [3], [4]. Thus, students would be
Keywords – Signal processing, Pulse code modulation, Analog assisted considerably in their work. Another reason to choose
to digital converter, PCM, Computer simulation, MATLAB, MATLAB is that the code written for it, could be started with
Octave. small modification on GNU Octave. GNU Octave is an open
source product, supporting Windows, Linux, BSD and Mac
I. INTRODUCTION OS. It is very suitable for home usage by students, as it
doesn’t cost anything and could be used on almost any device.
Pulse code modulation is very common in any digital This allows students to use MATLAB not only in the
device. It is necessary for analog signals, which exist in university, but also to use the same code in Octave at home.
nature, to be converted into digital signals, which could be Taking into account the current situation with the Covid 19
further processed by the digital devices. After being subjected pandemic, this is a significant advantage over other paid
to PCM, a continuous signal which has an unlimited number software platforms.
of possible values, becomes discrete in time and could take a
finite number of values. II. PROBLEM FORMULATION
The pulse code modulation is studied at the Technical
University of Sofia, at the undergraduate level, within the The major tasks answered by the study of PCM are
"Signals and Systems" seminar, in the following specialties: connected with the different kinds of discretization and
"Electronics", "Telecommunications", and "Computer and quantization, as well as the variety of signal shapes
Software Engineering". During the seminars, it will be (sinusoidal, rectangular, triangular, sawtooth, Gaussian, etc.).
possible for the students to investigate the transformation The process of Pulse Code Modulation has three basic
process of analog signal to discrete signal and to digital signal. steps: discretization, quantization and digitalization.
Students will explore the influence of various parameters of Discretization is a process of transforming the analog
PCM and analog signals on the resulted discrete and digital (continuous) signal to discrete ones. In this step values from
signals. original signals are taken at a specific moment in time and
We suggest for a program code to be applied in the saved as values of the corresponding samples. The interval
environment of MATLAB in order to investigate as many between samples, also known as sample time, is one of the
parameters as possible of the processes performed during important parameters of discretization. Its value must meet
PCM, as well as for signals to be generated, with different Nyquist criteria, which is given in expression 1 [5]:
shape forms of a maximum number, and to change the
parameters of the signal as much as possible [1]. It is 1
Δt ≤ , (1)
preferable to write source code in MATLAB rather than the 2. f max
where the maximum frequency in the analog signal spectrum
1Lyubomir Laskov is with the Faculty of Telecommunications at
is fmax.
Technical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000, The sampled amplitude values are represented by
Bulgaria, E-mail: laskov@mail.com quantization as a limited set of levels, which consists in the
2Veska Georgieva is with the Faculty of Telecommunications at conversion of a sample of continuous amplitude into a signal
Technical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000, of discrete time. Quantization could be linear (uniform) or
Bulgaria, E-mail: vesg@tu-sofia.bg nonlinear (non-uniform). In uniform quantization, all steps are
3Kalin Dimitrov is with the Faculty of Telecommunications at
equal to each other. In the non-uniform one - the steps are
Technical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000, with different sizes. Another important parameter is the
Bulgaria, E-mail: kld@tu-sofia.bg

978-1-7281-7142-5/20/$31.00 ©2020 European Union 77


number of levels. In the uniform quantization, step “h” could Start
be found from the number of allowed levels “N” with
expression [5]
S max Setting up
h= , (2) Signal form
Global
N Selection
Parameters
where Smax is the maximum possible value in the analog
signal. The number of allowed levels themselves depends on
the number of bits “n”, which will be used to represent the Setting up Analog
Specific Signal Signals
value of samples in digital sequences. The dependence is the
Parameters Generation
following [6]:
N = 2n . (3)
Setting up
The level of quantized signal differs from the level of
Discretization
sampled signal, as a result of which the noise is added to the Parameters
signal. This noise is known as error in quantization. The
maximum possible value of the error is equal to half of the
biggest step in quantization.
Discretization
The third step is coding, in which the quantized signal
levels are presented in binary form. Most often, symmetric
binary code is used, in which the first bit indicates the polarity
of the signal and the others - the signal level. Setting up
The major tasks that we can solve by computer simulations, Quantization
Parameters
are as follows:
1. Establish a suitable model for signal presentation.
2. Derive algorithms for signal discretization.
3. Derive algorithms for signal quantization. Determination of
Uniform
4. Derive algorithms for signal digitalization. Coefficients of
No Quantization
5. Study waveform and analog signal parameter influence Levels
on the discrete and digital signals.
6. Investigate the discretization and quantization Yes
parameter influence on discrete and digital signals.
7. Present the obtained results graphically. Determination of Determination of
Levels of Levels of
Quantization Quantization
III. BASIC ALGORITHM FOR PULSE CODE
MODULATION
Determination Of
In Fig. 1, we can see the block diagram of the algorithm Quantization
proposed for analyzing the process of pulse code modulation. Signal
The variables and global parameters are fixed at the start.
Following that, choosing the signal shape form is needed, as
well as the setting of specific parameters for the selected type Digitalization
of signals. Signals with different shape forms have different of the Signal
specific parameters. In addition to the signal shape form, it is
necessary to know whether it is periodic or not. Depending on
this, different models of signals will be created. Taking into Graphic Presentation of
the Analog, Discrete and
account all the signal parameters, the students are required to Digital Signals,
devise a mathematical description of the signals studied (the
investigation of the following analog, periodic and aperiodic
signals are to be focused on: rectangular, sinusoidal, End
triangular, Gaussian, and sawtooth).
Once the signal models are created, the parameters of the Fig. 1. Basic algorithm block diagram
discretization must be set. The parameter that will be changed
in order to investigate its influence on the discrete and digital will be used: uniform quantization and non-uniform
signals will be the discretization step. The next step after quantization. The students need to understand the advantages
discretization is to set the parameters of the quantization. In and disadvantages of both types of quantization. Then it is
this step the following parameters will be set: the number of necessary to determine the levels of the quantization, which in
bits per sample, maximum level, minimum level, as well as case of non-uniform quantization require an additional step –
the type of quantization. The following types of quantization the determination of the coefficients of different levels. Тhe

78
next step is to quantize the signal. Then the quantized discrete Fig. 3. Comparing Fig. 2 and Fig. 3, students may notice how
signal needs to be presented as a digital sequence, which is the much smaller the quantization error becomes, when the
result of the pulse code modulation. In the final step of the number of bits presenting each sample increases. The
algorithm it is necessary to show the graphic representation of maximum value of quantization error in Fig. 2 (8 bits per
analog signal, discrete signal, quantized signal, quantization sample) is 2.10-2, while in Fig. 3 (16 bits per sample) it is
error and digital signal. This allows for the study and 5.10-5.
visualization of specific signal parameter and PCM parameter
impact on the digital signal.
The implemented software for investigation of the process
of the periodic and aperiodic signal pulse code modulation,
allows us to devise a graphic representation of the analog
signals, their corresponding discrete, quantized and digital
signals, as well as the quantization error. The implemented
software can run on both Matlab and GNU Octave. The only
difference is that in Octave it is necessary to load a side
library “symbolic”, which is required for the mathematical
description of the analog signal.

IV. EXPERIMENTAL PART

The problems considered are solved by a MATLAB /


Octave environment computer simulation.
Several results from PCM simulations of periodic signals
are shown in the next figures below. In Fig. 2 is shown the
result from the simulation of PCM for sine wave signal in
Matlab environment. During the simulation, it was assumed
that the uniform quantization will be used and each sample
will be represented with 8 bits. The figure shows the analog
signal, the discrete signal, the quantized signal, the digital
signal and the quantization error. Fig. 3. Analog, discrete, quantized and digital signals and error from
The result from the simulation of sine wave signal with quantization for sine wave signal when 16 bits per sample are used
uniform quantization with 16 bits per sample is shown in

Fig. 2. Analog, discrete, quantized and digital signals and error from Fig. 4. Analog, discrete, quantized and digital signals and error from
quantization for sine wave signal when 8 bits per sample are used quantization for uniform quantization of sawtooth pulse train

79
Fig. 4 shows the result of the simulation of the PCM for the
sawtooth pulse train, when uniform quantization is used and
each sample is represented with 8 bits. The simulation was
done in GNU Octave environment. Fig. 5 shows the analog
signal, the discrete signal, the quantized signal, the digital
signal and the quantization error, for sawtooth pulse train,
with non-uniform quantization with 8 bits per sample. By
comparing Figs. 4 and 5, students can analyze the influence of
the type of quantization on the quantized signal and the
distribution of the quantization error. It can be seen from the
figures that for uniform quantization, the error from
quantization does not depend on the signal level, while for
non-uniform quantization, the error from quantization
increases when the signal level becomes higher.

Fig. 6. Analog, discrete, quantized and digital signals and error from
quantization for uniform quantization of Gaussian pulse train

V. CONCLUSION
In this study, we propose an approach for investigating
periodic and aperiodic signal pulse code modulation. We have
developed an algorithm and its course of implementation in
MATLAB and Octave environments. The students can devise
signal models of various types, shape forms and different
parameters. They can also create models of the individual
processes that make up the PCM. Students will be able to
examine the impact of each of the PCM parameters on the
Fig. 5. Analog, discrete, quantized and digital signals and error from discrete, quantized and digital signals, as well as on the
quantization for non-uniform quantization of sawtooth pulse train quantization error. Our next work will be focused on further
developing the proposed approach to conducting web distance
learning exercises.
Fig. 6 shows the results of a PCM simulation for a Gaussian
pulse train. During the simulation, it was assumed that
uniform quantization will be used and each sample will be REFERENCES
represented with 8 bits. The simulation was done in
MATLAB Environment. Comparing Fig 4 and Fig. 6, the [1] W. Y. Yang, T. G. Chang, I. H. Song, Y. S. Cho, J. Heo, W. G.
students can see differences between natural binary code and Jeon, J. W. Lee, J. K. Kim, Signals and Systems with MATLAB,
Springer, 2009.
symmetric binary code. The second one is used in Fig. 6, and
[2] S. Karris, Signal and Systems with MATLAB; Computing and
as it is seen from it, the first bit is used to show the sign of Simulink; Modeling, Fifth edition, Orchard Publications, 2012.
signal value. From Fig. 4 it is seen that the first bit changes [3] V. Georgieva, P. Petrov, Signals and systems - manual for
depending on signal value, while in Fig 6 it is always the laboratory exercises, King, 2016 (In Bulgarian).
same. [4] L. Chaparro, Signal and Systems using MATLAB, Academic
Press (Elsevier), 2011.
[5] G. Nenov, Signals and systems, Novi Znania, Sofia, 2008 (In
Bulgarian).
[6] Е. Ferdinandov, Signals and systems, Siela, Sofia, 1999 (In
Bulgarian).

80
Model of Project-Based Learning Platform
Ava Chikurteva1 and Denis Chikurtev2
Abstract – The implementation of the Project Based Learning • Students receive adequate preparation for real life.
(PBL) in education facing a number of problems and difficulties, Project-based learning enables students to relate what
prompting teachers to avoid its use and rely on traditional they do in school to the big world around them - to ask
methods of training. The article examines the role of ICT in PBL, questions and to find a solution themselves, using their
the benefits of PBL and its main problems in its implementation. available knowledge and experience. Through project-
A conceptual model of a PBL platform in education is proposed based learning, they learn and practice skills that
to guide and assist the teacher in planning, implementing and
traditional teaching often neglects - group work,
presenting project results. The role of the teacher is leading and
decision making, process monitoring, in-depth
involves preparing, presenting a project, motivating students,
managing the process through continuous communication and
problem-solving, communication, and feedback. Along
facilitating. with the new knowledge, students acquire all the skills
required by the rapidly changing global world [9].
Keywords – Project-based learning, e-learning, Education, • Learning material is better absorbed. Studies show
ICT. that, compared to the traditional way of teaching,
students learn the learning material as well or even
I. INTRODUCTION better. The advantage of project-based training is that
trainees remember the lessons learned longer and are
Project-based learning is defined as “an instructional able to use the knowledge they have acquired [11].
method that gives students complex tasks based on • Improving students' attitude to learning. According
challenging questions or problems that include problem to the results of studies, project-based learning in
solving, decision making, research skills. It focuses on issues mathematics reduces students' anxiety and creates a
that make students come up with basic concepts and principles positive attitude towards the subject [10].
in practical terms. Students do their own research on a leading
• Positive effect on the relationship between students'
issue that allows them to develop valuable research skills, as
achievements and their social background. In
they participate in the design, problem solving, decision schools that work predominantly on projects, students'
making and research activities themselves. Students learn success is not directly dependent on their social status,
from these experiences, take them into account, and apply while in traditional schools this relationship is clearly
them to the world outside their classroom. A different evident.
teaching technique that encourages the practice of forming
new learning habits, emphasizing creative thinking skills and • Collaboration between students is developing.
allowing students to discover that there are many ways to Interpersonal conflicts must be seen as an opportunity
solve the problem" [2, 6]. for change. Classes with real problems cause students
The current project-based learning model was developed by to develop teamwork and teamwork skills, which are a
the Buck Institute for Education in the late 1990s in response prerequisite for successful professional and personal
realization [8]. In addition, during their work, students
to school reform efforts [14]. Unlike ordinary projects, PBO
learn to overcome various difficulties associated with
requires critical thinking, problem solving and communication more passive classmates, difficulties in coordinating
between participants [3]. Students must organize their own online projects, meeting deadlines, or using technical
work and manage their own path when working on the means.
project.
PBL is the interactive method that can most strongly cause • Increases computer literacy of teachers and students
a change in the teaching culture, involving collaboration - ICT is present at every stage of project organization,
between both students and between student and the teacher, implementation and presentation [7, 12]. This unlocks
who often acts as a facilitator [4, 8]. The feedback that the the potential of information technology in training and
teacher periodically gives is concrete, useful, positive [1]. allows PBL to be distance learning.
The advantages the PBL offers over traditional teaching All these advantages over traditional teaching are only
methods are: observed when project-based learning is planned and managed
properly [5, 13].
1Ava
In order to structure the study model and to formulate its
Chikurteva is with Institute of Information and
functions and services, it is necessary to identify and
Communication Technologies, Bulgarian Academy of Sciences,
Sofia, Bulgaria, E-mail: avapaleva5@gmail.com categorize the problems that teachers face when using the PB
2Denis Chikurtev is with Institute of Information and method.
Communication Technologies, Bulgarian Academy of Sciences,
Sofia, Bulgaria, E-mail: dchikurteva@gmail.com

978-1-7281-7142-5/20/$31.00 ©2020 European Union 81


II. PBL PROBLEMS and provides tools and services for working with modules. It
is important to mention that proposed modules are developed
In PBL, the teacher becomes the facilitator and the students according to the minimal needs for successful PBL
work under his guidance. This article explores the problems application.
associated with creating and managing teacher's PB lessons. Modules 1 to 5 are the main modules that make up a single
The problems that teachers encounter when creating a PB PB lesson. Each of these modules can be removed or edited as
lesson are the following [11, 13]: desired by the teacher.
• to identify important issues; Module 1 - Determination of Expected Results - Working
in a team of teachers to formulate and develop the project
• to structure meaningful tasks; idea; Deciding on the scope of the project; Selection of
• to develop knowledge; indicators for achievement of the result; Determination of
overall results; Working on project design criteria; Creating
• to develop social skills; an optimal learning environment;
• to evaluate what students have learned from the Module 2 - Preparation of leading questions - Design of
experience. questions; Clarification of questions; Generalization of
questions; Development of standard based questions.
The specific challenges faced by teachers at PBL are related Module 3 - Evaluation Planning - Defining the Outcome
to: and Evaluation Criteria; Compare the product with the result;
• the selection or design of situations that suggest the Use of headings;
possibility of good projects;
• structuring problems as learning opportunities;
• working with colleagues to develop interdisciplinary
projects;
• dynamic management of the learning and self-learning
process;
• technology integration;
• assisting students in authentic assessment.
There is a great deal of research on PBL, proving the
benefits and effectiveness of the method, ways of its
application, various developments of PB lessons and results of
its application, but there is no comprehensive platform to
integrate this data and provide it to the user in a convenient
and selective form. In order to disseminate and promote the
use of PBL as an integral part of the curriculum, supporting
materials, guidelines, and appropriate conditions for working
with PBL must be created.

III. MODEL OF THE PROJECT-BASED LEARNING Fig. 1. Modular structure of the PBL system
PLATFORM Module 4 - Project Map - Organization of activities by the
teacher, which creates the environment and provides the
The research model provides an opportunity for the teacher preconditions for successful independent research work of the
to prepare and deliver a project-based lesson, following a students; Directing students' attention to key issues and
series of steps to create a new project. To create a PB lesson, focusing on ways to solve the problems as the project
it is necessary to follow the technological modular model progresses; Collecting resources from students; Forming the
presented in Figure 1. Using a modular model allows Performance Matrix i.e. developing a plan for the
consistency in the formation of the individual steps, tasks and implementation of the project and its practical
objectives of the lesson. On the other hand, modularity allows implementation;
modifying and editing the different parts of the individual Module 5 - Project Management - Understanding the role of
modules for a lesson. This means that the teacher can easily the teacher as a Manager; Sharing goals with students; Using
update or modify existing projects. In this way, teachers can different methods and tools to solve problems; Use of anchor
share models of successfully completed PB lessons that can be points and milestones; Assessment and reflection plan.
used as a basis for forming good practices for creating Module N - represents any additional module added by the
improved future lessons in PBL. teacher. The system provides the opportunity to add new or
The module manager takes care of organizing the existing modules both at the end and between already installed
participating modules in one lesson. It interconnects modules modules.

82
A. Tools, Functions, Services The main service of the platform under study is the Data
A key element in the implementation and application of Selection Service, which is presented in Figure 3. When
PBL is the use of ICT. Thanks to ICT, we can create, manage creating a new lesson according to set criteria: subject, class
and present the content of a project. In order to implement and / or keyword, automatically output information about
PBL, we need to research and develop an ICT platform that already completed projects and study materials according to
enables the creation and management of PB lessons online. the assignment of the teacher. This service requires the
Such a platform should provide a range of tools, functions and introduction of at least one of the specified criteria. Increasing
services to facilitate and optimize the work of teachers and the criteria increases the specificity of the information
students in creating and delivering a lesson. provided by the service. This facilitates the work of the
The PBL platform should contain a large amount of teacher by limiting the amount of information required by
materials and data in different fields, subjects and topics. entering keywords.
These materials must be checked for authenticity. Teachers By default, the provided information is sorted by class and
will be able to add new materials and edit current ones. The subject, where the keywords occur. In addition, the user can
materials to the platform database are: lessons, articles, change the ranking criteria according to popularity, rating,
lectures, e-books, presentations and videos. class, subject, date and more.
Tools for creating and editing modules have been The information in the database is organized by subjects
developed. These tools are part of the module manager, they and by class. This makes it possible to distinguish the
are represented by e specific build-in software functions, part specifics of the subject, taking into account the age of the
of the Java script programs. The tools make it easy to edit students (by class). When we have opened a subject for a
texts, assignments, tutorials, and multimedia content. class, we will have references to basic documents for the
Evaluation criteria and automated checks of results can be subject of the class - State educational requirements, curricula,
created and edited. references to other sources of information; lesson units;
Functions and services have been developed for the gradual development - plan of a real problem for the category;
verification of the completion of the tasks, by setting tags and problem projects that have already been worked on; ideas for
a template for the completion of the stages of a project. new project-based lessons.
Functions have also been developed for connecting different
components from one module to another. In this way,
evaluation criteria or guidelines for the implementation of a
project can be set. Functions and services development are
implemented in the Python scripts, as part of the web server
framework.

Fig. 3. Organizing information by subject, class, and keyword

IV. TECHNOLOGY DESIGN OF THE PLATFORM

A PBL portal can be implemented in the form of a website


or web application. For this purpose, the latest ICTs in the
field of mobile and web technologies and database
technologies are used.
The model consists of three main blocks: databases,
Fig. 2. Structure of information on work with the PBL management system and user interface. Each of these
components plays a key role in the implementation of the
An important step in working with PBL is to become above functionalities of the PBL model.
familiar with the nature of this type of training and to learn the The database management unit stores all the information
basic methods of work. Therefore, specialized information for that is needed to create the PB lesson and implementation.
teacher training is structured. In this way, they will get into Databases are based on the MySQL technologies and they are
the matter and become familiar with the opportunities offered accessed by Python scripts. Into the databases, the
by the developed platform for working with PBL. Figure 2 management system stores the already entered training
illustrates developed structure. The main problem in the materials and lesson templates, records the new lessons, as
structure is "What is PBO". To answer this question well as the profile data of each registered user. The sorting
completely, there are several basic categories: basis, and searching of data is performed by standard database
organization, facilitation, application of ICT and result. Each sorting algorithms.
of these categories contains detailed information organized
into sub-categories represented in the blue rectangles.

83
ACKNOWLEDGEMENT
The paper is supported by the National Scientific Program
"Information and Communication Technologies for a Single
Digital Market in Science, Education and Security
(ICTinSES)", financed by the Ministry of Education and
Science.
Fig. 4. General Architecture of the PBL platform

The PBL platform management system is made up of REFERENCES


multiple features and objects that are designed to connect the
user interface to the database. The technologies used for [1] S. Bell, “Project-Based Learning for the 21st Century: Skills for
the Future”, The Clearing House: A Journal of Educational
development of the proposed system are Nodejs and Python
Strategies, Issues and Ideas, 2010, vol. 83, no. 2, pp. 39-43,
Django frameworks. The system includes all the tools and DOI: 10.1080 / 00098650903505415
services for creating and working with lesson modules. This [2] J. W. Thomas, A Review of Research on Project-Based
block executes requests and commands received from the user Learning, 2000.
interface that are processed according to certain algorithms. [3] P. C. Blumenfeld, E. Soloway, R. W. Marx, J. S. Krajcik, M.
This is how complex automated platform management Guzdial, and A. Palincsar, “Motivating Project-Based Learning:
processes are implemented. The management system, on the Sustaining the Doing, Supporting the Learning”, Educational
other hand, sends requests to the database according to Psychologist, 1991, vol. 26, no. 3-4, pp. 369-398.
requests received from the user interface or according to the [4] J. Larmer, J. R. Mergendoller, “Seven Essentials for Project-
Based Learning”, Educational Leadership, 2010, vol. 68, no. 1,
necessary data for the proper functioning of the working
pp. 34-37.
algorithms or the results of their operation. A module for [5] A. M. Novak, J. S. Krajcik, “A Case Study of Project‐Based
providing cyber security and user authorization is also Learning of Middle School Students Exploring Water Quality”,
included in the management system. Depending on whether in The Wiley Handbook of Problem‐Based Learning, 2019, pp.
the user is a teacher or a student, he or she is granted different 551-572.
access rights to projects and databases. If a user is not logged [6] J. S. Krajcik, P. C. Blumenfeld, “Project-Based Learning”, in
in, then the system only allows access to some information The Cambridge Handbook of the Learning Sciences, R. Keith
resources such as - what is PBO, some of the projects already Sawyer (ed), Cambridge University Press, 2006, pp. 317-334.
completed and others. A guest type user is not allowed to [7] V. B. Gómez-Pablos, M. M. del Pozo, and A. G.V. Muñoz-
Repiso, “Project-Based Learning (PBL) through the
create or edit projects, or to access profile information of other
Incorporation of Digital Technologies: An Evaluation Based on
users. the Experience of Serving Teachers”, Computers in Human
The user interface provides interaction between the user Behavior, 2017, vol. 68, pp. 501-512.
and the platform. It provides the necessary menus and buttons [8] C. L. Chiang, H. Lee, “The Effect of Project-Based Learning on
to operate the model. All platform services and tools can be Learning Motivation and Problem-Solving Ability of Vocational
used through the interface. The interface illustrates the High School Students”, International Journal of Information and
necessary information requested by the user. This information Education Technology, 2016, vol. 6, no. 9, pp. 709-712.
can be presented as multimedia or as an electronic textbook. [9] M. E. Beier, M. H. Kim, A. Saterbak, V. Leautaud, S. Bishnoi,
The connections between the WebUI and the management and J. M. Gilberto, “The Effect of Authentic Project‐Based
system are implemented by Javascript packages. The frontend Learning on Attitudes and Career Aspirations in STEM”,
Journal of Research in Science Teaching, 2019, vol. 56, no. 1,
visualization and design are developed by HTML and CSS. pp. 3-23.
[10] V. L. Holmes, Y. Hwang, “Exploring the Effects of Project-
V. CONCLUSION Based Learning in Secondary Mathematics Education”, The
Journal of Educational Research, 2016, vol. 109, no. 5, pp. 449-
463.
Project-based learning has the huge potential of a method [11] M. J. Harris, The Challenges of Implementing Project-Based
that develops key competences and skills of the 21st century. Learning in Middle Schools , Doctoral dissertation, University
The implementation of the method makes it possible to of Pittsburgh, 2015.
increase the efficiency of the education system, implying [12] D. G. Moursund, Project-Based Learning Using Information
intensive, focused and 'smart' use of ICT. The teacher must Technology, Eugene, OR: International Society for Technology
have the necessary training to successfully and fully in Education, 1999.
implement the PBL. The model developed allows the teacher [13] Y. R. Totseva, Project – Based Learning – Technology and
Capabilities for Use in Bulgarian Schools, Reports Awarded
to apply the method quickly and easily. The model has the
with "Best Paper" Crystal Prize, pp. 303-308, 2016.
necessary functionality to learn, create and manage project- [14] Buck Institute for Education: http://www.bie.org
based lessons. This model will contribute to the development,
implementation and dissemination of PBL.
For future work it is envisaged development of graphical
web-based user interface and communication services: video,
chat, forum.

84
Practical Methods for Teaching of Solar Cell
Characterization
Nikola I. Mitrović1 and Milan D. Stojanović2
Abstract – This paper gives insight into methods for practical II. THEORETICAL BACKGROUND
teaching in the field of solar cell characterization. Since machines
for solar cell characterization are mostly situated in some large
factories, it is often hard to give student opportunity to get in
A characterization of solar cell presents a process of
touch with characterization processes. In this paper, the accurate measuring of basic parameters of a solar cell.
chamber that can perform basic characterization is designed and According to these parameters, an appropriate application of
tested. The entire device is built around PIC microcontroller that the cell is selected. Solar cells are then combined into panels
is interfaced with multiple sensors and with a display which gives and into modules, which represent most used method for
characterization results to the user. Setting and measuring of obtaining solar energy. Like for any other measuring, it is
environmental conditions together with measuring solar cell needed to first set some values as standard, so that later
output parameters as open-circuit voltage or short-circuit measured results can be compared with the standard ones.
current is enabled. Characterizations of multiple solar cells have
These standard values for measuring are usually acquired in
been done, with the goal to confirm solar cells parameters. Main
characteristics of solar cells are then discussed.
laboratories, under certain conditions. An industry-wide
standard for indicating solar cells performance was adopted
Keywords – Solar cell, Characterization, PIC microcontroller, and marked as STC (Standard Test Conditions) [5].
Education. Output parameters of the solar cell are dependent on the
properties of light that the cell is subjected to and to position
I. INTRODUCTION between light source and the cell. Besides that, since solar
cells are mostly made of semiconductors, its parameters shift
Solar cells and solar systems are taught in the most of with the change in temperature. Under STC, solar cell is
faculties of electronic engineering worldwide. The main focus exposed to light irradiance of 1000 W/m2, at the cell
of these studies is mostly structure, basic parameters and temperature of 25°C and with an Air Мass 1.5 (AM1.5)
applications of solar systems, but physics and composition of spectrum [6]. Sun irradiance presents the power delivered to
these systems is also presented. Still, laboratories and the Earth by Sun. It is worth mentioning that an irradiance as
factories that are studying and producing solar cells aren’t that high as STC irradiance isn’t possible to be induced by Sun
well spread [1, 2]. Machines needed for these processes are everywhere during the day on the planet. Especially is average
very expensive, and therefore, can be found mostly in large irradiance for Europe significantly lower. Air mass spectrum
factories. Because of that, students often don't have the presents “number of obstacles” that light beam needs to
possibility to have a direct contact with these technologies and overcome in order to reach the destination. Since the Sun
to deepen their knowledge. In order to compensate this lack of beams travel through air, Air Mass spectrum is set to 1.5.
contact with concrete machines, teachers sometimes resort to All of the mentioned conditions must be enabled to conduct
developing some small-size replacements. One example of appropriate measuring of the cell parameters. Mostly all of the
this type of machines is a characterization chamber. Since that data on the solar cells and panels given in datasheets is
it is often case that there aren't any factories using this acquired with measuring under STC. However, datasheet STC
machine in the near area, it is almost impossible to achieve values often tend to be insufficient because irradiance and
visits of students to those factories [3, 4]. temperature change with different parts of the day and with
The complete characterization chamber is designed and different seasons. That is why it is preferred to have insight
tested to describe and simulate characterization process and to into values and parameters not only under some constant
improve practical knowledge of the students. Section II of the conditions, but for the different ranges of different conditions.
paper explains characterization process and parameters that Importance of solar cell characterization is essential
should be measured, while section III presents design of because the cells are composing units for solar panels and
hardware needed for the measuring and assembly of the solar modules. For the panel to work properly and to provide
chamber. In the section IV examples of using of chamber are maximal power, all of the cells should have as matching
given, and results are discussed. characteristics as possible. Beside electrical characteristics,
physical characteristics, as packaging density or cell shape can
1Nikola I. Mitrović is with University of Niš, Faculty of Electronic create difference in the output parameters of a solar panel as
Engineering, Aleksandra Medvedeva 14, 18000 Niš, Serbia, E-mail: well. That is why connection between solar cells is very
nikola.i.mitrovic@elfak.ni.ac.rs important part of the panel designing process [5]. Cells can be
2Milan D. Stojanović is with University of Niš, Faculty of
connected in two ways. Since the solar cell is practically a p-n
Electronic Engineering, Aleksandra Medvedeva 14, 18000 Niš, junction, it has two terminals to be connected. If a p-side of
Serbia, E-mail: milan.stojanovic@elfak.ni.ac.rs the solar cell is connected to the p-side of the other cell,

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 85


connection is parallel, while if a p-side of the solar cell is The benefit of this designed PCB is possibility to solder
connected to the n-side of the other cell, connection is in diodes that produced light of other colors (red, green, blue,
series. Both types of connection have its causes, although etc.). It can be used to achieve different spectrum of light and
mainly, cells are connected serially. With the serial test the behavior of cells under different wavelengths.
connection, output voltage of the connection is increased. This
is because output voltage of a single cell is often too small
(0.6 to 0.7 V) to provide appropriate supply for specified
circuit. It is important to note that capabilities of solar panels
are acquired by accurate characterization and appropriate
connection of the solar cells.

III. DESCRIPTION OF THE DESIGNED CIRCUIT


With the goal to give students opportunity to explore
characterization concept in more details, structure of the
designed chamber needs to be divided in multiple parts. As
stated, it is needed to ensure mechanisms to simultaneously
measure temperature and light intensity, and of course to
measure output current and output voltage. The similar Fig. 2. Schematic of the Light Source Block
characterization chambers, based on Arduino platform, were
presented in papers [7] and [8]. Basic diagram of the chamber Designed and manufactured PCB board for this block is
is given in Fig. 1. given in Fig. 3.

Fig. 3. Manufactured PCB for Light Source Block with components

B. Control Block
Fig. 1. Basic diagram of the designed characterization chamber
Control Block is built around microcontroller
Control part of the chamber is composed out of two printed PIC18F45K22 [10]. It is a powerful microcontroller that
circuit boards (PCB). Boards and electrical circuits are operates at 5 V and has an internal oscillator. It has 44 pins, so
designed using PCB software and later manufactured. One it can interface a fair amount of other circuits and sensors.
PCB is designed to provide light that illuminates solar cell Control Block is divided into environment measurement
(Light Source Block), and other PCB is designed to perform subblock and cell parameters subblock.
control and measuring of the parameters (Control Block). Environment measurement is comprised of light intensity
measuring which is done using light photo sensor APDS9005
A. Light Source Block [11] and temperature measuring which is done by using
temperature sensor LM35 [12]. APDS9005 is connected with
Basic schematic behind Light Source Block is given in resistor, forming a voltage divider. Light intensity determines
Fig. 2. This block is composed out of 32 LE diodes that output analog current of the APDS9005, that flows through
organized in the groups of 8 diodes. The diodes produce light divider. Voltage from the voltage divider is delivered to the
of white color and they can be turn on/turn off by transistor analog pin of the MCU, where ADC is executed. The
Q1. The concrete model of the transistor is IRF520 [9], which datasheet gives insight into calibration with which light
is chosen because of its superior switching characteristics. A intensity can be measured. On the other hand, temperature
potentiometer which value is 10 kΩ, mounted on the case of sensor LM35 does not demand any additional components in
chamber and connected to the connector J1, is used to regulate order to operate. It is a three-pin device where one of the pins
current intensity across the diodes when they turned on. Using is output. Change in the temperature is manifested as a change
this potentiometer, intensity of light induced by diodes can in output voltage, which is brought to the other analog pin of
change in range from 0 to 2500 lux, by changing current. the MCU for ADC.

86
Cell parameters subblock is designed to measure main solar environment. To enable all of this, it is needed to program PIC
cell properties. Parameters of the greatest interest in solar cell MCU. With MCU programming, all values are constantly
characterization are short-circuit current (ISC) and open-circuit being received, calculated and presented to the student or user.
voltage (VOC). ISC presents the current between two contacts of Range of measured ISC is up 15 mA, and up to 8 V for VOC.
the solar cell when they are short-circuited, while VOC presents For presenting results 128x64 Graphical Liquid Crystal
voltage between contacts of the solar cell when they are not Display (GLCD) [15] is used. Printed circuit board for all of
connected (when circuit is open, so there is no current the connectors and for all of the described components is
flowing). However, these values should not be confused with given in Fig. 5. Beside described components, board contains
values measured in some applicable circuits. Basic solar cell push buttons, test LEDs, contrast potentiometers, decoupling
measurements, especially one of ISC, are mostly done under capacitors and others.
some resistance, where these parameters are shifted.
Experience has shown that students mostly misinterpret these
values. So, in order to clarify and to properly measure ISC and
VOC, additional circuits must be designed (Fig. 4).

Fig. 5. Manufactured PCB for Control Block with components

For the end of the design process, it is needed to


encapsulate the board and to provide a suitable box. Final
form of the device is given in Fig. 6.

Fig. 4. Additional circuits for ISC and VOC measurements

Additional two MOSFETs BSS138 [13] are added to the


two measuring circuits to enable accurate measuring.
Transistor Q2 is related to current measuring, while transistor
Q1 is related to voltage measuring. Both transistors have
switching functions in circuits. For the ISC measurement, Fig. 6. Exterior and interior form of the characterization chamber
transistor Q2 is set to on-state to enable short circuit between
two parts of the solar cell, while transistor Q1 is set to off-
state in order to ensure that all of the generated current from IV. CHARACTERIZATION EXAMPLE
the cell will go through the current measuring part. Resistor
R5 is a shunt resistor that is needed for operation of INA213 Characterization can be performed on various solar cells
[14], the circuit used for current measuring. INA213 is an and small panels regardless of their power and size as long as
opamp-based IC which is a current sensing amplifier with the they can fit in the chamber. Example of characterization is
voltage output. Analog output of INA213 is connected to given for the cells showed in Fig. 7. Cells are made of same
another analog pin of the MCU to conduct ADC. Connectors materials, but they differ in sizes.
J12 and J13 are set to give possibility to connect additional For the constant temperature, output parameters of these
resistance for different measuring. For VOC measurement, cells are measured on a range of light intensities. Values of
states of the transistors are inverted. Output of the cell is the output parameters are given constantly on a GLCD, as
connected with the voltage divider, because the output voltage shown in Fig. 8.
of some panels that can be characterized can be greater than
VCC of the MCU that is 5 V. Output of the voltage divider is
forwarded to another analog pin of the MCU, where the value
of VOC is gained with ADC.
All of the analog values received by analog input pins of
the MCU that are used for measuring are, after ADC
processes, further used to determine magnitude of the
parameters. According to the device’s datasheets, it is needed Fig. 7. Characterized solar cells a) Solar cell A (58 mm x 38 mm);
to calibrate and adapt received signals to the changes in b) Solar cell B (53 mm x 18 mm)

87
V. CONCLUSION
This paper describes design process and testing of the solar
cell characterization chamber that can be used in educational
purposes for teaching of practical methods in this field of
engineering. Using designed device, students can improve
practical skills to complement their theoretical knowledge.
Processes of measuring, testing and data analysis are
emphasized in order to encourage further engagement and to
Fig. 8. Measured values shown in GLCD increase research capabilities.
According to the literature, with the increase in the light
intensity, linear growth if the ISC and exponentials growth if
ACKNOWLEDGEMENT
VOC is to be expected [2]. Measured results for the set of
different light intensities are given in Fig. 9. This work has been supported by the Ministry of Education,
Science and Technological Developmentof the Republic of
Serbia.

REFERENCES
[1] T. C. Kandpal, L. Broman, "Renewable Energy Education: A
Global Status Review", Renew. Sustain. Energy Rev., vol. 34,
pp. 300-324, June 2014.
[2] C. Quinto, L. Ocaña, C. Montes, A. Linares, E. Llarena, B.
González-Diaz, S. González-Pérez, R. Guerrero-Lemus, M.
Friend, and M. Cendagorta, "Design, Start Up and Society
Benefits of a PV Solar Cell Laboratory", 29th European
Photovoltaic Solar Energy Conference and Exhibition, pp.
4113-4118, 2014.
[3] R. Ciriminna, F. Meneguzzo, M. Pecoraino, and M. Pagliaro,
"Rethinking Solar Energy Education on the Dawn of the Solar
Econom", Renew. Sustain. Energy Rev., vol. 63, pp. 13-18,
Fig. 9. Measured values for given solar cells 2016.
[4] G. Nikolov, M. B. Marinov, B. Nikolova, and B. Ganev,
Beside only presenting results, designed chamber can plot "Characterization of Different Types of Photovoltaic Cells
measured parameters on GLCD. For the constant temperature, Using Remote vIrtual System", 2018 Seventh Balkan
chamber measures VOC and ISC for 10 values of light intensity, Conference on Lighting (Balkan Light), Varna, 2018, pp. 1-4,
ranging from 200 lux to 2000 lux with the step of 200 lux. All doi: 10.1109/BalkanLight.2018.8546992
measured values are stored in microcontroller memory and [5] M. Zeman , K. Jäger, O. Isabella, A. H.M. Smets, and R. A.C.
based on these values, a plot is created. This is very useful for M.M. van Swaaij, "Solar Energy - Fundamentals, Technology,
and Systems", Copyright of Delft University of Technology,
demonstration of fast characterization and different slopes of
Delft, Netherlands, 2014.
these curves for different PV cells. Plotted results for solar [6] Elsevier House, Solar Energy Engineering - Processes and
cell A are given in Fig. 10. In the described way, chamber can Systems, Amsterdam, The Netherlands, 2013.
be used to characterize some other photo components as well. [7] W. M. Myint Aung, Y. Win, and N. W. Zaw, "Implementation
of Solar Photovoltaic Data Monitoring System", International
Journal of Science, Engineering and Technology Research
(IJSETR), vol. 7, pp. 591-596, August 2018.
[8] S. A. Jumaat, M. H. Othman, "Solar Energy Measurement
Using Arduino", MATEC Web of Conferences, MUCET 2017,
https://doi.org/10.1051/matecconf/201815001007
[9] IRF520 datasheet. Available at:
https://www.vishay.com/docs/91017.pdf
[10] PIC18F45K22 datasheet. Available at:
https://ww1.microchip.com/downloads/en/DeviceDoc/400G.pdf
Fig. 10. Demonstration of plotted values on GLCD for PV cell A [11] APDS9005 datasheet. Available at:
https://docs.broadcom.com/docs/AV02-0080EN
Theoretical facts behind solar cell parameters are confirmed [12] LM35 datasheet. Available at: http://www.ti.com/lit/ds/lm35.pdf
using the chamber. Characterization of different types of the [13] BSS138 datasheet. Available at:
cells and their capabilities can be further examined. Designed https://www.onsemi.com/pub/Collateral/BSS138-D.PDF
chamber is easily mobile and adaptable to various courses and [14] INA213 datasheet. Available at:
laboratory exercises. http://www.ti.com/product/INA213
[15] GLCD datasheet. Available at:
https://mikroe.com/documents/glcd-128x64-datasheet.pdf

88
Servo-system Design for Arduino Due Based
Laboratory Platform
Marija Z. Filipović1, Snežana S. Đorđević2, Vladimir M. Mitić3 and Boban R. Veselić4
Abstract – Realization of a servo-system this is based on II. SYSTEM DESCRIPTION AND WORKING PRINCIPLE
Arduino Due microcontroller is described in this paper. The
developed system was used to create laboratory exercises for
students as well as for experimental purposes. The purpose of
The purpose of this system as a laboratory exercise for
this setup is to demonstrate the difference between systems students is to demonstrate components and working principles
working in open and closed control loop, to example different of a servo-system. The students are encouraged to experience
control strategies and to show how changes in different system the difference between stable and unstable system, realize
parameters influence the system performance. different control strategies, analyze their impact on system
response and learn about different types of responses.
Keywords – Arduino Due, Servo-system, Laboratory exercise, Laboratory platform offers possibility to implement various
Real-time system, Digital controller. controller types in order to notice their performances. Three
types of controllers are currently realized: PI, PID controllers
I. INTRODUCTION and a lead compensator.

Servomechanism or servo-system is a type of a closed loop A. System Elements


control system where the controlled variable is mechanical
position or speed. The main characteristic of the The system is composed of the following elements:
servomechanism is fast and precise response of the output Arduino DUE microprocessor [3], CROUZET 82850002dc
variable with respect to the reference input. The name of these motor (24V, 52W) [4], two identical magnetic absolute
systems has been derived from Latin words servus (the one encoders [5], PWM controlled Pololu VNH5019 motor driver
that serves or follows) and mehanism (mechanism). The main [6], a PC power supply and other accompanying active and
requirement in a servo-system design is to have at least one passive components that are necessary for normal system
integrator within the control contour [1]. operation (Fig. 1). Also, a connection to a computer is
The servomechanism working principle is simple: the provided.
output variable is continuously measured and compared with
the reference input via feedback loop. The basic requirement
is minimization of difference between the input and the output
(error signal) in addition to power amplification. This means
that the output variable tracks the input with some accuracy,
where the tracking error is proportional to the system gain [1].
Since the system output can be a mechanical angle, speed
or acceleration, to provide the control task it is necessary to
implement position, speed or current feedback loops.
Servo-systems are used to drive automated processes in
industry, mobile robotics and many other devices used on a
daily basis, such as cruise control systems in a vehicle or
similar [2].
Fig. 1. Block diagram of the designed system

1Marija
Three voltage levels are required for normal system
Z. Filipović is with the University of Niš, Faculty of operation: 3.3V for Arduino DUE, 5V for encoders and
Electronic Engineering, Aleksandra Medvedeva 14, 18000 Niš,
Serbia, E-mail: marija.filipovic@elfak.rs
drivers and 12V for motors. Although Arduino DUE is
2Snežana S. Đorđević is with the University of Niš, Faculty of incompatible in power supply with other system components,
Electronic Engineering, Aleksandra Medvedeva 14, 18000 Niš, this particular controller has been chosen because of its
Serbia, E-mail: snezanadjordjevic@elfak.rs superior processing power, which allows continuous
3Vladimir M. Mitić is with the University of Niš, Faculty of development and satisfactory performance.
Electronic Engineering, Aleksandra Medvedeva 14, 18000 Niš, The used encoders in this platform utilize the SSI
Serbia, E-mail: vladimir.mitic@elfak.ni.ac.rs communication and are 5V TTL, this is why Logic Leve
4Boban R. Veselić is with the University of Niš, Faculty of
Converters were used. For displaying information on the
Electronic Engineering, Aleksandra Medvedeva 14, 18000 Niš, platform, an LCD was used with four-wire connections, for
Serbia, E-mail: boban.veselic@elfak.ni.ac.rs

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 89


making the wiring much simpler. Also, display menu observe them, interact with them and record them for further
navigation is achieved by using an encoder with a push analysis. This is accomplished using the UART serial
button. communication interface paired with a custom-made Python
application. By changing the model parameters, it is possible
B. Description of the System Operation to record various responses and observe how each parameter
affects the system response.
The designed platform concept allows its operation in
The realized laboratory platform is shown in Fig. 2. In its
simplest form, the system consists of the input knob and the completely stand-alone mode (without PC). Also, the system
output knob, where the output knob, driven by the motor, can operate using connected PC. The control options over PC
application are shown in Fig. 3.
follows the changes in the input knob. Reference angle is
assigned with the encoder mounted on the knob located on the
right side (1), while the output angle is the motor shaft
position on the left side (2). For easily noticing motor
position, a needle has been attached to the output shaft. The
position itself is measured with the encoder mounted on the
rear side of the motor.
LCD display of 16 by 2 characters resolution is used for a
full control of the system directly on the platform [7]. It shows
the real time values of the reference and the output (2 decimal
digit precision) and also supports setting the referent position
for enabling its precise control with the ability for direct step
response demonstration. Going through the menu the user can Fig. 3. PC control interface
change all the variable parameters of the system including the
controller gains. After the parameter changes are applied, the
experiments can be repeated and the system behavior can be III. THE MICROCONTROLLER PROGRAMMING
observed. The goal of this procedure is to experimentally find
the system stability margin and to demonstrate its behavior A. Real Time (RT) Component of the System
under that condition, as well as to show the operation of an
unstable system. In this way, the real physical effects of Servo systems are intended to work in real-time and
different controller parameters are clearly visible. therefore it is necessary that the Arduino DUE program has
both a main loop (loop) and a time-critical loop (RT loop).
During realization, usage of RT loop is crucial, since some
parts of the code must be executed in adequate time instants
i.e.in equidistant time intervals in order to avoid execution
errors. The system must work in RT mode or else it wouldn’t
be able to function at all.
For system to function properly, all calculations must be
done sufficiently fast, i.e. faster than the system discretization
interval. It was experimentally determined that the minimal
discretization interval is equal to 4 ms. In such a short time,
the following must be done: reading of the encoders,
execution of the control loop (speed or position feedback) and
reading of push button encoder for menu navigation. Display
refreshing and communication with PC are not RT critical [8].

B. Parameter Changes and the Display

Beside closing the feedback loop and realization of the


control system itself, implementation of other components
such as display, parameter changes and communication were
also challenging. To enable just taking the control of the
system operation by the PC or the display and releasing it
after that required implementation of a priority scheduler.
It was already mentioned that menu navigation encoder
Fig. 2. Photo of the laboratory platform reading is an RT critical component and therefore its reading,
command interpretation and buffering is done inside the RT
The other part of the system is a visual representation of the loop. The interpretable commands are: turning clockwise,
various system responses on the PC, where students can turning counter-clockwise and pushing, i.e. enter command.

90
The main loop executes reading of the buffered commands Based on these coefficients, the gain and time constant of
and displaying the appropriate content. In case there are no the motor are determined as well as the parameters a and b as:
new commands with in the time of 80 ms, the function for Km =0.03013, Tm = 0.0146, a=68.49315 and b=2.0637.
refreshing the display is executed. This is very important if the
screen displays the value of a tracked variable. This way, the To design the digital control system, the Z-transform is
value will be updated every 80 ms instead of every time the applied with the additional zero-order hold circuit which
command changes. approximates D/A convertor transfer function:
Since the control algorithm is implemented in software, the
transition from positional to speed-tracking system is very
{
G ( z ) = Z ⋅ L−1 Gh0 ( s ) ⋅ G ( s ) . } (2)
simple. The only thing that needs to be done is to extract the
As the result of the transformation the following is
value of the motor speed which is already being calculated
obtained:
and apply the appropriate control strategy, while all the other
structures remain the same. This way, the students can
b z ( aT + e − 1) − aTe − e + 1
− aT − aT − aT

observe how the hardware-software coupling influences the G( z) =


system [11]. a2 z 2 − z ( e − aT + 1) + e − aT
(3)
0.000015004 ( z + 0.9178885630498 )
G(z) =
IV. PI CONTROLLER DESIGN ( z − 1)( z − 0.7607 )

As stated earlier, there are currently implemented three For clarity purposes, the following notation in the digital
controllers in the system. Only one controller at a time domain will be adopted:
calculates the control signal and we can choose which one at b0 z + b1
any time during the exercise. All the controllers were G( z) = (4)
z 2 + a1 z + a2
designed using pole placement method [9]. As an example of
the design procedure, PI controller design will be presented. a1 = −1.7607; a2 = 0.7607
b0 = 0.000015004; b1 = 0.009279500
A. Step Response Recording and System Identification
B. Digital PI Controller Design
A special purpose Arduino code was written for
determining the step response of the system. Step response After the system parameters identification, PI controller
assignment is issued via serial communication by applying gains Kp and Ki are determined using the pole placement
50% of the PWM pulse, resetting the time measurement method. Let the closed loop system dynamics be characterized
system and staring the data transfer to the PC. The PC by relative dumping ratio ξ = 0.9 and the natural in damped
receives the data which consists of current timestamp in frequency ωn =12 rad/s.
milliseconds, current position and current speed. The position
vs time us shown Fig. 4, which was used for system The required technical conditions are determined by the
identification [10]. two conjugate complex roots of the characteristic equation in
s-domain, s1,2 whose location are calculated from:

s1,2 = −ζωn ± jωn 1 − ζ 2


s1,2 = −10.8 ± j 5.23 (5)

Design of the digital controller requires that these closed


loop poles are located in the Z-domain using the following
expressions:
1−ζ 2
Fig. 4. Step response of the motor position z1,2 = e−ζωnT ± jωnT ,
z1,2 = 0.95751 ± j 0.020034 . (6)
The transfer function for the given response is represented
as: where T is the discretization interval, which is T=4 ms.
θ (s) km b The generalized form of the desired closed loop system
G ( s) = = = . (1) characteristic equation is given with:
U ( s) s (1 + Tm ) s(s + a)
z 3 + z 2 ( − ( z1 + z2 ) − σ z ) + z ( z1 z2 + σ z ( z1 + z2 ) ) − z1z2σ z = 0 . (7)
It is obvious that the system is astatic with a negatively
dumped response. The steepest tangent is constructed and its σz is the third real pole of the closed loop system.
coefficients calculated as follows: Open loop transfer function with the applied PI controller is
k = 6.026; n = −0.088263 . in the following form:

91
 z  The correct system functionality is verified by observing its
Wp ( z ) =  K p + K i W ( z ) . (8) recorded step response. After the controller is implemented by
 z −1
the microcontroller, the following step response is obtained
Based on this transfer function, it is possible to derive the (Fig. 5). It is evident from the figure that the desired referent
characteristic equation of the closed loop system as: position is achieved by the designed servo-system. Also, a
larger overshoot than analytically predicted can be noticed.
1 + Wp ( z ) = 0 , (9) This overshoot is produced by nonlinear effect of the motor
z + z ( a1 −1 + b0 K p + b0 Ki ) + z ( a2 − a1 − b0K p + b1Ki ) − a2 − b1K p = 0 . (10)
3 2
caused by a dry friction.

Taking the obtained values of z1,2 into account, the V. CONCLUSION


following holds:
z1 z 2 = 0.917226761; z1 + z2 = 1.91502 . The developed servo-system laboratory platform presented
in this paper, is intended to give students the insight on how
By comparing the equations (7) and (10), a system of three both position and speed servo-system can be implemented
equations with three variables (Kp, Ki, z) is obtained: using the same hardware. Differences and transitions between
the two of them can be done by using the appropriate
a1 − 1 + b0 K p + b0 K i + z1 + z2 + σ z = 0 ,
computer software. Additionally, everything that has been
a2 − a1 − b0 K p + b1 K i − z1 z2 − σ z ( z1 + z 2 ) = 0 , (11) implemented on a PC can also be implemented on a tablet
−a2 − b1 K p + z1 z2σ z = 0 . computer or server and the communication can optionally be
made available over Wi-Fi connection. Considering that the
By solving these equations, the following values of the most important parts of the system are implemented in
controller parameters, along with the third, real root of the software, the same platform can be used for experimental
closed loop system characteristic equation are obtained: research. Advanced topics such as design of different control
strategies as well as further development of the
K p = 0.536426177157006; K i = 0.012432547378634; microcontroller software can be conducted by senior students,
σ z = 0.837727002982122 . from which they can observe how the design of a real time
system is complex and how much care and attention should be
The designed digital PI controlleris implemented in its applied to the smallest of details.
incremental form by the microcontroller, which means that the
current value of the control signal is calculated usingits REFERENCES
previous value, as well as the previous and current position
error signal. The output of the controller is directly [1] M. Nakamura, S. Goto, and N. Kyura, Mechatronic Servo
proportional to the PWM pulse width [9]. System Control, Saga University, Japan, 2004.
[2] M. Bjekić, Z. Stevanović, Servoregulator Lexium LXM32M,
U ( kT ) = U ( ( k − 1) T ) + Ki ⋅ e ( kT ) + K p ( e ( k ) − e ( k − 1) ) . (12) str.7http://www.empr.ftn.kg.ac.rs/7%20REGULACIJE/Lexium
%20LXM32M.pdf
[3] Arduino Due schematic,
https://www.arduino.cc/en/uploads/Main/arduino-Due-
schematic.pdf
[4] Crouset Motors, model Ø 42 mm 22 to 52 Watts 52 W Part
number 82850002,https://soda.crouzet.com/pn/?i=82850002
[5] AEAT-6010/6012 Magnetic Encoder,
https://docs.broadcom.com/docs/AV02-0188EN
[6] Data sheet Pololu VNH5019 Motor Driver Carrier,
www.https://www.pololu.com/product/1451
[7] LCDWH1602B2-TMI-ET# Data Sheet, lcd-2x16-datasheet,
http://www.winstar.com.tw
[8] K. Ogata, Discrete-time Control Systems, N. Jersey, Prentice-
Hall International, Inc., 1995.
[9] M. B. Naumović, Design of Automatic Control Systems, Faculty
of Electronic Engineering, Niš, 1995.
[10] B. Danković, D. Antić, and Z. Jovanović, Process
Identification, Faculty of Electronic Engineering, Niš, 1996 (in
Serbian).
[11] M. M. Maung, M. M. Latt, and C. M. Nwe, “DC Motor Angular
Position Control using PID Controller with Friction
Fig. 5. Step response of the positional system Compensation”, International Journal of Scientific and Research
Publication, vol. 8, no. 11, November 2018.

92
Reception of Audio Signals Received from
Different Angles by Optical Methods
Tsvetan Valkovski
Abstract – In this article we will look at the possibilities of II. THEORY
receiving audio signals from different angles through optical and
optoacoustic methods. An analysis of the optical methods for
transmitting information and transmitting audio signals will be
Visible light communication (VLC) is a centuries-old
performed. technique that uses visible light to send messages from one
A model of a laboratory environment for transmitting audio place to another. In the past, communication by flame was an
signals by optical methods, the so-called Li-Fi system, is effective way to transmit signals from one place to another at
considered. The laboratory environment is designed to be a distance. The principle of using marine headlights for ship
presented to students and to perform experiments in the signalling is similar. Nowadays, for example, a similar
laboratory, as well as the opportunity to prepare term papers method can be seen in lights mounted on modern tall
related to optoelectronics and acoustics. buildings to indicate their presence to aircrafts [1]. Along with
Keywords – Acoustics, Optoelectronics, Education, Audio,
the development of telecommunications, using visible lights
Optical, Optoacoustics, Li Fi.
instead of other electromagnetic waves to transmit
information, to attract the attention of scientists by reviewing
I. INTRODUCTION a famous experiment by Alexander Graham Bell in 1880
using photons in his experiment [2] is done. In the
In practice, various methods are used to receive and experiment, the voice signal was modulated on sunlight and
transmit audio signals. Some of these methods are the information was transmitted remotely from about 200 m.
optoacoustic, through optical microphones and optical fibers. Efforts to study natural lights and artificial lights for
They offer extremely large capabilities for collecting all types communication have been going on for decades. In 1979, FR
of audio signals, their transmission and analysis. Gfeler and G. Bapst demonstrated this technical feasibility of
Optoacoustic methods allow us to extract audio signals optical wireless communication using infrared light emitting
using photonic principles for accurate measurement of sound, diodes (LEDs) [3]. Whether infrared or visible light will be
vibration, pressure and other key physical characteristics in used depends on the source (LED) and the receiver
places where conventional sensors cannot be used. The use of (photodetector). The photodetector could be a photoresistor, a
fiber optic sensors and sensor systems in microphones, solar panel and others.
headphones, noise canceling devices, accelerometers and Visible light communication has many attractive
pressure sensors provide safe, highly efficient and reliable advantages, which include but are not limited to the following
service in the most difficult and demanding applications. aspects - wide spectrum, no electromagnetic interference, easy
Through optical fibers we can transmit audio signals over long implementation, low cost, high energy efficiency, health
distances, with high speed, minimal delays and without safety, information security and others.
electromagnetic interference on the track from other electrical The basic environment for transmitting audio signals
equipment, tracks, etc. through visible light consists of six blocks, shown in Fig. 1. In
The problem we have focused on is the impossibility and this article we will focus on the transmission of the signal
insufficient efficiency of using conventional methods for through light, i.e. the connection between the LED and the
extracting audio signals and the advantages that we could photodetector.
have using optical methods. These conventional methods of
transmitting audio signals are wired and wireless. The former
have a problem with insufficient device mobility and lower
data rates. With wireless methods, depending on the
technology, there are problems with the reliability of the
connection and the speed of data transmission. The method
for Li-Fi systems is suitable for systems requiring high speed
audio transmission.

Tsvetan Valkovski is with the Faculty of Telecommunications at


Technical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000, Fig. 1. Block scheme of basic Li-Fi system
Bulgaria, E-mail: tsvalkovski@gmail.com

978-1-7281-7142-5/20/$31.00 ©2020 European Union 93


The main losses in Li-Fi systems are observed in the
transitions source-fiber, free space channel (communication
between LED and photodetector). Therefore, the losses must
be minimal.
The losses on the free space channel are mainly of three
types - distance losses, "visibility" losses and angular losses.
The main task in the article is to consider the angular losses
and the problem of obtaining an audio signal from different
angles, because from previous experiments of ours and other
colleagues the influence of the distance in the transmission of
audio signals through visible light is considered.
Different statistical methods can be used to process the data
obtained from the system and estimate the angular losses. One (a)
of them is the so-called "Statistical probability of loss" [4].
For the most part, the angular losses are caused by the angle
of incidence of the light beam on the photodetector, but from
the point of view of diffraction, these angular losses decrease
if the diffraction increases, as this is observed at relatively
short distances [5-7].

III. ANGULAR LOSSES IN LI-FI SYSTEMS


The article will conduct a study on the built Li-Fi laboratory (b)
environment, through which is possible the transmission of Fig. 3. Laboratory environment for measurement of the signal level
audio signals by optical methods. at 15 cm and change the angle of signal reception by changing the
The experimental part includes a study of the individual angle of the solar panel cell: (a – the laboratory environment includes
components, a study of previous developments and the Li-Fi system, tone generator and oscilloscope; b – the laboratory
dependencies through which the angular losses can be studied. environment includes conveyor to change the angle of the solar
The basic model of the laboratory environment is shown in panel)
Fig. 2.
TABLE I
THE SIGNAL LEVEL WHEN CHANGES THE ANGLE OF SIGNAL RECEPTION
BY CHANGING THE ANGLE OF THE SOLAR PANEL CELL
AT 15 CM DISTANCE

Angle, o 0o 15 o 30 o 45 o
U, V 0,34 0,335 0,33 0,32
Angle, o 60 o 75 o 90 o
U, V 0,315 0,285 0.021

Fig. 2. Block scheme of the Li-Fi laboratory environment

The actual experimental setup is shown in Fig. 3. It


includes a tone generator, Li-Fi system, oscilloscope and
conveyor to change the angle of the solar panel.
Fig. 4 and Table 1 show the results obtained at the signal
level at a distance of 15 cm and change the angle of signal
reception by changing the angle of the photodetector (solar
panel). Measurements were made from 0 to 90 degrees,
because after 90 degrees, the angle of view is zero and there is
practically no possibility to receive a signal.
The results show that the angle of signal reception does not Fig. 4. Graphic representation of the readings for the signal level
strongly affect the reduction of the signal level, as the when changes the angle of signal reception by changing the angle of
decrease in the signal level is 0.005 volts at a change from 0 the solar panel cell at 15 cm distance
to 75 degrees, this is due to the nature of visible light,
diffraction and its uniform distribution throughout the "field After reviewing the results, it can be said that the change in
of vision". the signal level from 0 degrees to 75 degrees is a decrease of
17.46% compared to the initial signal level. Fig. 5 shows the
percentage of signal level losses when changing the angle of
the solar panel [8].

94
After the experiments, statistical processing and
comparison with the theoretical data, it can be seen that the
experimental data are close enough to the theoretical ones and
it can be said that the angular losses in the Li-Fi system will
have an effect after 80 degrees.
Studies on the subject show that a high level of signal
reception, below 5% loss has up to 30 degrees, and in both
directions. This makes a 60 degree deviation from the central
position [10]. Compared to other methods for receiving
signals through free space optics, this method has a relatively
high tolerance, which allows for a high signal level with easy
adjustment.
Fig. 5. Graphic representation of the signal level losses Given the distance between the LED and the photodetector
(solar panel) and the rotation left and right, this makes a 160
After comparing the obtained angular losses in percent with degree angle of "visibility" (d), i.e. the angle from which the
the standard angular losses for the type of solar panel used, it signal can be received. This is a fairly large angle, which
can be said that the values obtained by us are relatively close allows us to easily set up the device, transmit signals from a
to the theoretically obtained ones, from the experiments of YS relatively long distance and the system's resilience to changes
Khoo, JP Singh, TM Walsh and AG Aberle [9]. They are in the environment from external influencing factors [11].
obtained by the following formula: Fig. 7 shows an exemplary diagram of the angle of "visibility"
(d) of a Li-Fi system.

From the measurements and the statistical processing done


so far, it can be said that the angular losses in the Li-Fi system
up to 60 degrees are relatively small, compared to the losses
from changing the distance and those from closing the
visibility. This provides opportunities for transmission and
reception of audio signals with a large "angle of view", which
Fig. 7. Block scheme of the angle of “visibility” of Li-Fi system
could be used for various applications in the field of smart
home systems, mixing audio signals, studying the influence of
various factors of the transmission environment. IV. CONCLUSION
As it can be seen in Fig. 6, the theoretically obtained graph
and that of the experiment are relatively close to 75 degrees. As it can be seen from the experimental part and the results
Theoretical data and previous research have shown that after obtained, the angular losses of up to 60 degrees do not have a
80 degrees, the angular losses become too large and in particularly strong effect on the signal strength, as the
practice the signal strength decreases to a maximum. movement around these 60 degrees leads to a number of
advantages of the system.
Some of these advantages are: easier setup to receive a
signal from a long distance, the ability to mix different signals
and the stability of the system when changing the angle of any
of the elements (LED or photodetector).
Through this experiment we showed some of the
capabilities of the Li-Fi system for transmission of audio
signals by optical methods, and this task could be assigned to
students in laboratory classes in the discipline
"Optoelectronics and Optical Communications", taught to
bachelors, master’s-additional and master's degree in
equalization training at the Faculty of Telecommunications of
the Technical University in Sofia.
There are opportunities for further experiments on the
subject by adding two or more sources or several separate
Fig. 6. Graphic representation of the experimental signal level losses receivers, using lenses and other optical instruments and
vs theoretical angle losses methods.

95
ACKNOWLEDGEMENT Participation (ELECTRONICA), Sofia, Bulgaria, 2019, pp. 1-4,
doi: 10.1109/ELECTRONICA.2019.8825600
[5] S. Kulkarni, A. Darekar, and P. Joshi, “A Survey on Li-Fi
We would like to express our sincere gratitude to the Technology”, 2016 International Conference on Wireless
Faculty of Telecommunications at Technical University of Communications, Signal Processing and Networking
Sofia for providing the laboratory base. (WiSPNET), Chennai, 2016, pp. 1624-1625, doi:
The scientific research and the results obtained are part of a 10.1109/WiSPNET.2016.7566413
national program "Young scientists and postdoctoral [6] C. Gavrincea , J. Baranda, and P. Henarejos, “Rapid Prototyping
students", adopted by РМС 577/17.08.2018, for research of Standard-Compliant Visible Light Communicatios”, IEEE
project to help young scientists. Journal & Magazines, vol. 52, pp. 80-85, July 2014.
[7] L. Johnson, Fiber Optic Active Devices - LEDs, Lasers, and
Detectors, Course, IEEE, 2013.
REFERENCES [8] Microsoft Excel 2007 for Scientists and Engineers, Academic
Press, 2008.
[1] Z. Wang, Q. Wang, W. Huang, and Z. Xu, “Introduction to [9] Y. S. Khoo, J. P. Singh, T. M. Walsh, and A. G. Aberle,
Visible Light Communications”, in Visible Light “Comparison of Angular Reflectance Losses Between PV
Communications: Modulation and Signal Processing, 2018, pp. Modules with Planar and Textured Glass Under Singapore
1-16, doi: 10.1002/9781119331865.ch1 Outdoor Conditions”, IEEE Journal of Photovoltaics, vol. 4, no.
[2] A. G. Bell, W. G. Adams, Tyndall, and W. H. Preece, 1, pp. 362-367, January 2014, doi:
“Discussion on the Photophone and the Conversion of Radiant 10.1109/JPHOTOV.2013.2284544
Energy into Sound”, J. Soc. Telegraph Eng., vol. 9, no. 34, pp. [10] E. V. Platonova, A. S. Toropov, and A. N. Tulikov, “Simulation
375-383, 1880. of Energy Input to Solar Panels”, 2019 International Ural
[3] F. R. Gfeller, U. Bapst, “Wireless in-House Data Conference on Electrical Power Engineering (UralCon),
Communication via Diffuse Infrared Radiation”, Proc. IEEE, Chelyabinsk, Russia, 2019, pp. 133-137, doi:
vol. 67, no. 11, pp. 1474-1486, November 1979. 10.1109/URALCON.2019.8877633
[4] A. Karipzhanova, K. Sagindykov, and K. Dimitrov, [11] R. B. Nazmul, “Calculating Optimum Angle for Solar Panels of
“Justirication of the Method and Algorithm of Multidimensional Dhaka, Bangladesh for Capturing Maximum Irradiation”, 2017
Parity Control in Distributed Databases of Information IEEE International WIE Conference on Electrical and Computer
Systems”, 2019 X National Conference with International Engineering (WIECON-ECE), Dehradun, 2017, pp. 25-28, doi:
10.1109/WIECON-ECE.2017.8468880

96
ENERGY SYSTEMS AND EFFICIENCY I
Application of Neural Networks for Short Term Load
Forecasting in Power System of North Macedonia
Goran Veljanovski, Metodija Atanasovski, Mitko Kostov, and Pande Popovski
Abstract – Air temperature, type of the day and humidity are The first generation methods called analytical methods
factors that have significant impact on electricity consumption includes time series analysis, regression methods [1-3],
and power system load on a short term. In the paper, neural similar day method, Wavelet Transform [4-5], etc. Artificial
networks are successfully applied for load forecasting on a short intelligence methods, also known as the second generation of
term in a power system of Republic of North Macedonia. The
training of neural network is performed on real input data. The
the load forecast methods, mainly comprises artificial neural
forecast is obtained on the basis on the trained network and networks (ANN) [6-8], including deep neural networks [9-10],
learned relationship through training process. random forests, gradient boosting [11], fuzzy logic [12].
Compared with the second generation, the second generation
Keywords – Neural networks, Load forecast, Power systems. has become more important due to reduced errors. Some
combination of methods (known as hybrid methods) that
I. INTRODUCTION belong to the both generations is also possible [13-14].
Authors in [15] have concluded that all the previous methods
Short term load forecast is very essential for power system appear to have at least one of the following three limitations:
operation in secure and reliable manner. The significance of  Methods work only with a subset of days (electricity
electricity demand forecast relies on several reasons: demand forecast is done only for a one day type, e.g.,
increased penetration of non–dispatchable, renewable sources, working days);
electricity markets structural changes, optimal unit  Narrow time frame is considered in calculations (e.g.,
commitment and operation of conventional power plants. a few months).
Electricity demand forecast depends on several factors: This paper investigates the application of neural networks
climate parameters (temperature, humidity, wind speed etc.), for short term load forecasting in power system of North
type of the day (working day, Saturday, Sunday, holiday), Macedonia. In the paper, neural networks are successfully
demography data, gross domestic product, and economic applied load forecasting on a short term in a power system of
standard of the people, applied measures for energy Republic of North Macedonia. The training of neural network
efficiency, geography and other factors. is performed on real input data. The forecast is obtained on
Climate and calendar parameters such as temperature, day the basis on the trained network and learned relationship
type, humidity, and wind speed are one of the factors, which through training process. The implementation of the neural
has significant impact on electricity consumption and power networks is performed by using two independent variables: air
system load on a short term. Air temperature impact on temperature and type of the day. It means the algorithm
system load is especially important from the power system calculates suitable power load values around a certain
operational management aspects on short run. This fact is temperature for a specific type of the day. The hourly data
evident in power system of Republic of North Macedonia due (8760 per year) for the temperatures and load are used for the
to high variations of consumption and load in year seasons. years 2014-2018 as a training dataset, while 2019
The number of scientific papers on load forecasting has (temperatures and load) data are used as a test dataset.
increased from about 100 before 20 years to more than 1,000 The proposed methodology tries to overcome some of the
in the last years. Therefore, it is very difficult to make full previous methods limitations mentioned, above. Namely,
overview of the existing methodology, and only some papers methodology works with all types of days and calculations are
are mentioned here. There is a number of techniques, which done for a large time frame. Other contributions of the paper
have been used for load forecast, such as: single or multiple are the use of last seven days for day ahead load forecast and
linear or nonlinear regressions, stochastic time series, the fact that for the first time neural networks are applied for
exponential smoothing, state space and Kalman filter, load forecast in power system of North Macedonia using real
knowledge based approach, neural networks, wavelet input data.
transformations, semi parametric additive model, fuzzy logic
etc. II. METHODS
A. Input Data and Basic Analysis
Goran Veljanovski, Metodija Atanasovski, Mitko Kostov and Historical data on load and temperature was collected for
Pande Popovski are with University St. Kliment Ohridski - Bitola,
this study. The case study input data includes hourly power
Faculty of Technical Sciences, Makedonska falanga 37, 7000 Bitola,
North Macedonia, E-mail: goran.veljanovski @uklo.edu.mk system load of the Republic of North Macedonia in the years

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 99


Load (MWh/h)

Fig. 1. Load duration curve for years 2014−2018 for power system of Fig. 2 Load forecast for the year 2019
Republic of North Macedonia

2014-2019 (8760 per year) [18, 19], as well as corresponding C. Neural Network Training
meteorological information on minimum, average and
maximum temperatures collected from [20] (Fig. 1). After the network has been designed, the next step is to
Figure 2 depicts a daily diagram of power system of Republic train the network. Training an ANN is an iterative process.
of N. Macedonia for the day Jan 08, 2014. Three typical points For training the proposed neural network, Levenberg
(minimum daily load Pmin=836MW, average daily load Marquardt technique is used.
Pavg=1100MW, maximum daily load Pmax=1293MW) are For training the network, the proposed algorithm uses 70%
marked on the diagram and they are used in the analysis from of the average day loads data and temperatures, while 15% are
each daily diagram. An average daily load is an average of all used for the network validation and 15% for testing the
24-hourly loads on a daily diagram. The average daily loads in network. The division of data in the proposed algorithm is
correlation with average daily temperatures are used in this done randomly.
paper for analysis and forecast. In [21, 22] was shown that there
is a strong negative correlation between the power load and the III. RESULTS AND DISCUSSION
air temperature. The determination coefficients for polynomial
regression and sinuses regression of the maximum, average and
After proper training of the network, its generalization
minimum daily load due to the average daily temperature are
performance needs to be validated. New data that is not used
very high, which means that the regression analysis shows high
during training will be fed into the network to see if it can
prediction degree of the daily typical loads from the air
predict these "unseen" data well.
temperature [21-23].
The results obtained from testing the trained ANN on new
data for 365 days of the year 2019 are presented in Fig. 2. The
B. Neural Network Structure and Design graph depicts a plot of ‘actual’ and ‘forecast’ load in MW
values for the day of the year. In addition, for evaluation of
In order to achieve the objective of forecasting electrical the numerical predictions success, several alternative
load, first, multilayer artificial neural networks (ANN) are quantities have been calculated and shown in Table I. The
constructed. The theory of ANN is well known in the quantities used to evaluate the model performance are the
literature [1, 6, 7, 8 and 24]. Multilayer feed forward ANN are following:
used in this research for prediction. The basic element of a Mean-squared error (MSE):
feed forward neural network is the neuron, which is a logical-
mathematical model that seeks to simulate the behavior and
MSE =
( p1 − a1 )2 + ⋅ ⋅ ⋅ + ( pn − an )2 . (1)
functions of a biological neuron [1]. n
The number of input neurons is usually set equal to the
number of input variables. Input variables for this research are Mean-absolute error (MAE):
the following: Day of the week; Temperatures (average
p1 − a1 + ⋅ ⋅ ⋅ + pn − an . (2)
temperature) of the seven previous days; Average loads of the MAE =
seven previous days. For the days of the week, numbers from n
1 to 7 are used and for holidays according to calendar number
8 is used.
Root mean-squared error (RMSE):
This results in 15 neural network input values. The output
of the neural network represents the forecasted load data for
the forecasting day. The model is consisted of one hidden RMSE =
( p1 − a1 )2 + ⋅ ⋅ ⋅ + ( pn − an )2 (3)
layer with 10 hidden neurons per layer. n

100
TABLE I [6] W. Charytoniuk and M.-S. Chen, “Very Short-Term Load
MEASURES FOR MODEL EVALUATION Forecasting Using Artificial Neural Networks”, IEEE Trans.
Power Syst., vol. 15, no. 1, pp. 263-268, Feb. 2000.
MAE(%) MAE (MW) MSE (MW2) RMSE (MW) [7] H. S. Hippert, C. E. Pedreira, and R. C. Souza, “Neural
3.04 30.4 1397 37.38 Networks for Short-Term Load Forecasting: A Review and
Evaluation”, IEEE Trans. Power Syst., vol. 16, no. 1, pp. 44-55,
Feb. 2001.
In Eqs. (1)-(3), n represents the total number of instances, [8] P. Mandal, T. Senjyu, N. Urasaki, and T. Funabashi, “A Neural
p1,.., pn are the predicted response values, a1,.., an are the Network Based Several-Hour-Ahead Electric Load Forecasting
actual response values. Using Similar Days Approach”, Int. J. Electr. Power Energy
It is evident that there is a high level of accuracy of ANN to Syst., vol. 28, no. 6, pp. 367-373, 2006.
[9] H. Shi, M. Xu, and R. Li, “Deep Learning for Household Load
forecast electricity demand.
Forecasting - A Novel Pooling Deep RNN”, IEEE Trans. Smart
Grid, vol. 9, no. 5, pp. 5271-5280, Sep. 2018.
IV. CONCLUSION [10] M. Cai, M. Pipattanasomporn, and S. Rahman, “Day-Ahead
Building-Level Load Forecasts Using Deep Learning vs.
Traditional Time-Series Techniques”, Appl. Energy, vol. 236,
The presented results confirm the applicability and pp. 1078-1088, 2019.
efficiency of ANN in short-term electricity demand [11] S. Papadopoulos and I. Karakatsanis, “Short-term electricity
forecasting. Average daily loads and temperatures are used as load forecasting using time series and ensemble learning
historical data. The forecasted average load for the day ahead methods”, in Proc. IEEE Power Energy Conf. Illinois (PECI),
with high level of accuracy, gives the possibility to the system Feb. 2015, pp. 1-6.
operator to estimate the necessary amount of energy day [12] H. H. Çevik and M. Çunka, “Short-Term Load Forecasting
ahead. The methodology presented in the paper uses the last Using Fuzzy Logic and ANFIS”, Neural Comput. Appl., vol.
seven days for day ahead load forecast and for the first time 26, no. 6, pp. 1355-1367, 2015.
[13] P. Lusis, K. R. Khalilpour, L. Andrew, and A. Liebman,
ANN are applied for load forecast in power system of North
“Short-Term Residential Load Forecasting: Impact of Calendar
Macedonia using real input data. For future work, experiments Effects and Forecast Granularity”, Appl. Energy, vol. 205, pp.
should be extended on real input data for power systems in the 654-669, 2017.
region of South East Europe. [14] M. Ghayekhloo, M. B. Menhaj, and M. Ghofrani, “A Hybrid
Short-Term Load Forecasting with a New Data Preprocessing
Framework”, Electr. Power Syst. Res., vol. 119, pp. 138-148,
ACKNOWLEDGEMENT 2015.
[15] M. Tucci, E. Crisostomi, G. Giunta, and M. Raugi, “A Multi-
This research is supported by the EU H2020 project Objective Method for Short-Term Load Forecasting in
TRINITY (Grant Agreement no. 863874) This paper reflects European Countries”, IEEE Trans. Power Syst., vol. 31, no. 5,
only the author’s views and neither the Agency nor the pp. 3537-3547, Sep. 2016.
Commission are responsible for any use that may be made of [16] E. A. Feinberg, D. Genethliou, Chapter 12 Load forecasting,
the information contained therein. Applied Mathematics for Power Systems, pp.269-282.
[17] I. H. Witten, E. Frank, M. A. Hall, C. J. Pal, Data Mining,
Practical Machine Learning Tools and Techniques, Burlington,
REFERENCES USA, Morgan Kaufmann, 2017.
[18] Dispatching and Operational Reports for Power System Load
Data obtained from MEPSO.
[1] W. Charytoniuk, M. S. Chen, and P. Van Olinda,
[19] D. Bajs, M. Atanasovski, Longterm Forecast Study of Electrical
“Nonparametric Regression Based Short-Term Load
Energy and Power Balance and Adequacy Analysis of
Forecasting”, IEEE Trans. Power Syst., vol. 13, no. 3, pp. 725-
Transmission Network of Republic of Macedonia,
730, Aug. 1998.
Zagreb/Skopje EIHP, 2016.
[2] S. Rucic, A. Vuckovic, and N. Nikolic, “Weather Sensitive
[20] https://www.wunderground.com/history.
Method for Short Term Load Forecasting in Electric Power
[21] M. Atanasovski, M. Kostov, B. Arapinoski, I. Andreevski,
Utility of Serbia”, IEEE Trans. Power Syst., vol. 18, no. 4, pp.
“Correlation between Power System Load and Air Temperature
1581-1586, Nov. 2003.
in Republic of Macedonia”, Int. Scientific Conf. on Information,
[3] T. Hong, M. Gui, M. E. Baran, and H. L.Willis, “Modeling and
Communication and Energy Systems and Technologies, pp.
Forecasting Hourly Electric Load by Multiple Linear
213-216, Sozopol, Bulgaria, Jun. 2018.
Regression with Interactions”, in Proc. IEEE PES Gen. Meeting,
[22] M. Kostov, M. Atanasovski, G. Janevska, B. Arapinoski,
Jul. 2010, pp. 1-8.
“Power System Load Forecasting by using Sinuses
[4] Y. Chen, P. B. Luh, C. Guan, Y. Zhao, L. D. Michel, M. A.
Approximation and Wavelet Transform”, Int. Scientific Conf.
Coolbeth, P. B. Friedland, and S. J. Rourke, “Short-Term Load
on Information, Communication and Energy Systems and
Forecasting: Similar Day-Based Wavelet Neural Networks”,
Technologies, pp. 273-276, Ohrid, North Macedonia, Jun. 2019.
IEEE Trans. Power Syst., vol. 25, no. 1, pp. 322-330, Feb. 2010.
[23] S. Vukadinovic, Elements of Probability Theory and
[5] G. Sudheer and A. Suseelatha, “Short Term Load Forecasting
Mathematical Statistics, Belgrade, 1973.
Using Wavelet Transform Combined with Holt_Winters and
[24] H. B. Demuth, M. H. Beale, O. De Jess, and M. T. Hagan,
Weighted Nearest Neighbor Models”, Int. J. Electr. Power
Neural Network Design, 2014.
Energy Syst., vol. 64, pp. 340-346, 2015.

101
Fuzzy Multiple Linear Regression for the Short Term
Load Forecast
Andrija Petrušić1 and Aleksandar Janjić2
Abstract – In predicting the hourly demand for energy trading, prediction as the basis of offline network analysis to
the weather forecast error makes the usage of the exact values of determine the vulnerability of the system. If this is the case,
certain predictor variables (such as temperature) very difficult. corrective action like the additional energy purchase or load
Therefore, the fuzzy input variables are often used. This paper shedding should be prepared. For the energy trading, the day
presents a new way of using the fuzzy inputs in linear regression
in forecasting hourly consumption for the day-ahead period.
ahead load forecast is of crucial importance, because the
Unlike the present approach to the fuzzy linear regression, where inaccurate forecast may cause great financial losses. Some
the regression coefficients have been fuzzified, in this model the corrections may be effectuated in the intra-day market, when
degrees of membership to the fuzzy sets are used as additional the short-term hourly forecast is required.
predictor variables This paper presents a new way of using the fuzzy inputs in
linear regression in forecasting hourly consumption. Unlike
Keywords – Day-ahead market, Fuzzy regression, Multiple the present approach to the fuzzy linear regression, where the
linear regression, Short term load forecast. regression coefficients are fuzzified, in this model the degrees
of membership to the fuzzy sets are used as additional
I. INTRODUCTION predictor variables. This approach allows the input values to
be predefined fuzzy numbers and the output size to remain
For successful decision making in the energy sector, short crisp, which allows the use of standard statistical tests on
term load prediction plays a crucial role in ensuring profitable forecast accuracy. It is also possible to use developed
and reliable power system planning and operations. The more computational methods for linear regression. The method was
accurate the forecast, the more efficient are the operation and tested on real data of a wider consumer area for the period
management of an electric utility. These forecasts influence 2014 to 2018, using temperature and period during the month
all stakeholders included in the process of energy supply, as fuzzy variables
generation, distribution, markets, etc. [1].
According to some authors [2-3], load forecasting can be II. FUZZY ENERGY FORECAST PREDICTORS
divided in 4 categories based on the considered timespan: very
short term (less than a day), short term (one day to two A. Fuzzy Variables
weeks), medium term (two weeks to three years) and long
term (three years to thirty years or more); whereas according In order to determine how and to what extent predictor
to others, there are three categories – short term forecasts variables shape the power supply curve it is necessary to
which are usually from one hour to one week, medium select the appropriate variables and their types for the model
forecasts which are usually from a week to a year, and long attributes. Among the meteorological variables, temperature
term forecasts which are longer than a year [1], [4-5]. has the greatest influence on electricity consumption and is
These forecasts are equally important for different closely correlated with it, so it is often used in electricity
operations and can be widely used by all sectors within a consumption forecasting models. The short term load forecast
company, e.g. short term load forecasting can be applied in is characterized by the large volume and high quality of time
operations, maintenance, and demand response and energy series data. Because of advanced metering technology today,
market activities [6-7]. Accurate load forecasting helps the many utilities are comfortable with the data quality at the
operator to make decisions about unit commitment, decreases corporate level. However, some data may be still missing or
spinning reserve capacity and properly design a generator corrupted.
maintenance plan. Besides reducing production costs, accurate Furthermore, it is considered that the temperature forecast
load forecast is also essential for the reliability of power is relatively accurate only up to the day ahead for the purposes
systems. The system operators use the result of load of forecasting electricity consumption and this is the main
reason why there are more and more methods that avoid the
use of temperature or any other meteorological attribute.
1Andrija Petrušić is with University of Niš, Faculty of Electronic Another reason is that the correlation between temperature
Engineering, Aleksandra Medvedeva 14, 18000 Niš, Serbia, E-mail: and electrical consumption varies from data set to data set,
andrija.petrusic@elfak.rs even from year to year, and thus the inclusion of temperature
2Aleksandar Janjić is with University of Niš, Faculty of Electronic may have a poor effect on model accuracy [8]. Finally, the
Engineering, Aleksandra Medvedeva 14, 18000 Niš, Serbia, E-mail: forecast model must be adapted to thermal inertia of the
aleksandar.janjic@elfak.ni.ac.rs system.

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 102


variable, also known as factor or qualitative variables that
classify observations into groups. They have a limited number
of different values. In these steps, the categorical variables are
recorded into a set of separate binary variables, and the
problem is solved as standard forecast of the output value
depending on the presence of the fuzzy set (for example the
number ‫ܥ‬ሚ in Fig. 3).

Fig. 1. Fuzzy values of ambient temperatures

Due to these reasons, the temperature should not be treated


as crisp, but rather fuzzy variable. An example of temperature
modelled with a group of triangular fuzzy sets (“around 15”,
“around 20” etc.) is presented in Fig. 1.
Linear models are generally more robust in higher
dimensional space, especially when there is certain amount of
noise in measurements [9].

Fig. 3. Same shape of fuzzy variables in the past and future


A. Types of Fuzzy Predictor Variables

The forecast problem can be treated as a problem of one • Case C


dependent and multiple independent variables and it is a
suitable situation for analyzing data by the multiple regression Let the regression model be formed on the basis of the
method to help predict future values from past values. fuzzy predictor variables A and B. In some cases, the input
Although the training model may use the fuzzy predictor values may have a different shape from the predictor variables
variables, the future value of the independent variable may on the basis of which the regression model was formed. Let Ai
differ from the predefined set of training variables. be a symmetric fuzzy set denoted by (αi, ci)L, with αi as the
center and ci as the spread, with reference function
• Case A L ( x ) = max ( 0,1 − x ) and the membership function
In the case when temperature values from the past are
determined as in:
missing or corrupted, they must be estimated with appropriate
fuzzy sets. Any recorded temperature can be transformed to μ A ( ai ) = L ( ( ai − α i ) ci ) . (2)
the N - length vector of membership degrees corresponding to i

N temperature fuzzy sets: Using (1) on intersection points every other fuzzy set (the
fuzzy set C on Fig. 4) is uniquely determined by the
FT { x} =  μ1 ( x ) , μ2 ( x ) ,, μ N ( x )  . (1) membership degrees to sets A and B.
In traditional fuzzy regression, the deviations between the
The example of transformation with two fuzzy sets A and B
observed values and the estimated values are regarded as the
is given in Fig. 2, where the value x1 is transformed to the
fuzziness of the parameters of the system. The main idea is to
vector [μA(x1), μB(x1)].
define the possibilistic linear function:
Y = A1 x1 +  + Ap x p . (3)

Fig. 2. Crisp future value

• Case B
If the input predictor variable is a fuzzy set (for example,
hourly temperatures are recorded as triangular fuzzy numbers Fig. 4. Different shape of fuzzy variables in the past and future
‫ܣ‬ሚ, ‫ܤ‬෨ and ‫ܥ‬ሚ ) in Fig. 3, they can be treated as a categorical

103
More detailed discussions of fuzzy regression can be found variable, the hourly temperature forecast for the next day has
in [10] and [11] where identification of the parameters of the been fuzzified. Other data for the 24 hours period are loaded
fuzzy linear regression model is formulated as a linear and the forecasted energy demand is obtained.
programming problem. If the relationship between them is
linear, the case transfers to a multiple linear model. Let Y be a Step 5) Prediction error
dependent variable and x1 , x2 ,, x p independent variables – Root Mean Square Error (RMSE) as the standard deviation
then a linear model is represented by: of the residuals and Mean Absolute Percentage Error (MAPE)
has been calculated.
Y = β0 + β1 x1  + β p x p + ε , (4)
TABLE I
where β0 , β1 ,, β p are unknown coefficient that have to be TYPE OF PREDICTOR VARIABLE
estimated, while ε represents the measurement error, or
residual. Let the original predictor variable xn be divided in m Predictor Type
fuzzy numbers. According to (1) it is also possible to form a
regression model that considers these degrees of membership Hour categorical
as predictor variables: Day categorical
Month categorical
Y = β0 + β1 x1 +  + βn μ1 ( xn ) + β n μ2 ( xn ) +
1 2 Temperature fuzzy
(5)
+  + β n μm ( xn ) +  + β p x p + ε
m
Period fuzzy
Load of the same hour of the numerical
For the sake of simplicity, a new set of variables Z will be previous day
introduced, consisting of both crisp and segmented fuzzy
predictors, with (p+m-1) dimension:
III. CASE STUDY
Z =  x1 , x2 ,, μ1 ( xn ) , μ2 ( x2 ) ,, μm ( xn ) ,, x p  (6)

Since the enlarged set of parameters βi is unknown, it should The fuzzy multiple linear regression was tested on the
be estimated from observations of y and z. Let actual load power data for the city of Belgrade for the year
2018. The model was trained with data sets of total
bi ( i = 0,1, 2,, p + m − 1) be the estimates in terms of consumption for 2014, 2015, 2016 and 2017.
βi ( i = 0,1, 2,, p + m − 1) . Hence the predicted value of y is: The model is trained with the predictor variables presented
in Table I. The temperature is presented with 13 fuzzy sets,
Yˆ = b0 + b1 z1 +  + bp + m −1 z p + m−1 . (7)
starting from “around -20” to “around 40” degrees. The model
is compared with the classical multiple linear regression
Learning and forecasting procedures for the proposed fuzzy model with crisp values of temperature and ordinal day in the
regression model are as follows. month. Data series for temperature contains only average
hourly values for the whole city. The model is trained with the
Step 1) Determine the learning range MATLAB fitlm function for the total of 35000 records. The
The regression model is trained by using three types of model is tested on actual data for 2018 using the forecasted
variables (Table I). temperature day ahead values. Load demand curves for typical
Time predictor variables (hour of the day, day in the week winter (February 5), and summer (August 23) days are given
and month) are categorical, while the temperature is presented in Figs. 5 and 6, respectively.
by 13 triangular fuzzy numbers, starting from “around minus It can be noticed that in winter the electrical load is about
20 degrees” to “around 40 degrees” with the spread of 10 twice as high with marked variations and trend changes from
degrees. day to day. The summer is characterized by a more stable
load, with less variation and almost no trend. The change in
Step 2) Fuzzification of input data trend during the week is reflected in increased loads on the
Depending on types of input data for the temperature days after the weekend (Monday and Tuesday), when people
variable, according to Figs. 2 and 3, the extended set Z of are somewhat more active than in the second half of the week.
predictor variables is formed. Weekend days are characterized by reduced consumption, a
direct consequence of non-working days when people are less
Step 3) Parameter calculation active and industrial production stands still.
The parameter set B is determined, using QR decomposition It is visible that the fuzzy regression model gives better
as the main fitting algorithm. For robust fitting, M-estimation results than the classical model. The model is more effective
can be used to formulate estimating equations and solve them in extreme weather conditions when predicted values in
using the method of iterative reweighted least squares (IRLS). winter months show the less deviation from the actual ones.
The comparison of RMSE and MAPE values is given in
Step 4) Day-ahead energy forecast Table II.
Depending on types of input data for the temperature

104
based on extended set of predictor variables has shown
1300000 better results than classical method. Furthermore, the
1200000 methodology allows to perform statistical tests with already
1100000 reliable and proven methods, for which there is extensive
1000000 computer support. Further research will be focused on
900000 different fuzzy sets modelling
800000
700000 REFERENCES
600000
1 3 5 7 9 11 13 15 17 19 21 23 [1] E. A Feinberg, D. Genethliou, “Load Forecasting”, Applied
Mathematics for Restructured Electric Power Systems, Springer,
TRUE Fuzzy Crisp Boston, MA, 2005, pp. 269-282.
[2] T. Hong, P. Wang, “Fuzzy Interaction Regression for Short
Fig. 5. Predicted and actual values for a winter day Term Load Forecasting”, Fuzzy Optimization and Decision
Making, vol. 13, no. 1, pp. 91-103, 2014.
1100000 [3] A. D. Papalexopoulos, T. Hasterberg, “A Regression based
1000000 Approach to Short Term System Load Forecast”, IEEE Trans.
900000 on Power Systems, vol. 5, no. 4, pp. 1535-1544, 1990.
[4] A. M. Al-Kandari, S. A. Soliman, and M. E. El-Hawary, “Fuzzy
800000
Short-term Electric Load Forecasting”, International Journal of
700000 Electrical Power & Energy Systems, vol. 26, no. 2, pp. 111-122,
600000 2004.
500000 [5] D. Srinivasan, M. A. Lee, “Survey of Hybrid Fuzzy Neural
400000 Approaches to Electric Load Forecasting”, IEEE International
Conference on Systems, Man and Cybernetics, Intelligent
1 3 5 7 9 11 13 15 17 19 21 23
Systems for the 21st Century, Vancouver, BC, 1985, pp. 4004-
TRUE Fuzzy Crisp 4008.
[6] T. Hong, “Short Term Electric Load Forecasting”, Ph.D.
Fig. 6. Predicted and actual values for summer day dissertation, North Carolina State University, Raleigh, USA,
2010.
[7] T. Hong, P. Wang, “On the Impact of Demand Response: Load
TABLE II
COMPARISON OF ERRORS Shedding, Energy Conservation, and Further Implications to
Load Forecasting”, IEEE Power & Energy Society General
RMSE (kWh) MAPE (%) Meeting, 2012, pp. 1-3.
[8] B.-J. Chen, M.-W. Chang, “Load Forecasting using Support
Crisp 42585.7 3.65 Vector Machines: A Study on EUNITE Competition 2001”,
Fuzzy 36915.6 3.26 IEEE Transactions on Power Systems, vol. 19, no. 4, pp. 1821-
1830, 2004.
[9] H. Tanaka, I. Hayashi, and J. Watada, “Possibilistic Linear
Regression Analysis for Fuzzy Data”, European Journal of
IV. CONCLUSION Operational Research, vol. 40, no. 3, pp. 389-396, 1989.
[10] T. Hong, P. Wang, “Fuzzy Interaction Regression for Short
Although the temperature is a desirable attribute in the Term Load Forecasting”, Fuzzy Optimization and Decision
formation of a model for forecasting electrical Making, vol. 13, no. 1, pp. 91-103, 2014.
consumption, the fact that cannot be ignored is that the [11] G. James, D. Witten, T. Hastie, and R. Tibshirani, An
Introduction to Statistical Learning with Applications in R,
precise temperature value for the day ahead is unknown so Springer Texts in Statistics, Springer Science + Business Media,
that the model can only use the forecasted temperature New York, 2015.
value. In this paper, the model with the fuzzy input values
and crisp output variable is developed. The methodology

105
Power Load Forecast for North Macedonia Using
Machine Learning
Pande Popovski, Mitko Kostov, Metodija Atanasovski and Goran Veljanovski
Abstract – Estimating power load has always been of a great humidity and wind speed on the power load forecast accuracy:
importance for making power purchase agreements on the how a few machine learning models perform when different
electricity market or maintaining power system stability and combinations of meteorological parameters are taken into
reliability. This paper analyses power load forecasts for North consideration. Therefore, a contribution of the paper is that
Macedonia when different combinations of independent
variables are used – air temperature, humidity and wind. Several
several types of machine learning models for the first time
types of machine learning models were trained in order to were trained on real data of North Macedonia power system in
evaluate their performances and impact on the power load order to evaluate and compare their performances.
forecast. The paper is organized as follows. After the introduction, a
brief explanation on the used machine learning algorithms is
Keywords – Machine learning, Regression, Power load given. The third section shows the numerical results obtained
forecast, Forecast accuracy, Model performance. from the trained models, while the fourth section concludes
the paper.
I. INTRODUCTION
II. ALGORITHMS
Estimating power load has always been a practice of key
importance whether it comes to making power purchase
A. Decision Trees
agreements on the electricity market, or maintaining power
system stability and reliability. With the increasing trend of
renewable energy sources over the decades, new questions This type of algorithms obtains its name from the decision
arise, one of them being inertia in the power systems. Having tree (DT) diagram. Decision tree diagram is used to
prior knowledge on electrical energy demand by means of graphically present a process of making a decision. It shows
power load forecasting can help to deal with the negative the factors that play a role in the decision making, and
effects that come with the decrease of power system inertia, conditions that have to be fulfilled, as well as all the possible
by minimizing the mismatch that can appear between supply solutions. DT algorithms apply the same concept to machine
and demand. This can be done through better production learning, however a different approach than simple decision
planning, which is greatly determined by the estimated making is used in order to construct a model that behaves like
increase in power demand. Furthermore, power load forecast a DT. These algorithms partition the feature space into a set of
can be used when it comes to minimizing power loss and rectangles, and then fit a simple model in each one [3]. The
coping with growing power demand: forecasting would problem results in constructing the algorithm in a way so it
determine which power units should increase their production could decide itself under what criteria to make the partitions.
and which generators should be dispatched [1]. Thereby the A number of DT algorithms are common when dealing with
accuracy and reliability of an optimal calculated generation classification and regression problems: ID3 (Iterative
curve is determined by the reliability of the power load data Dichotomiser 3), CART (Classification And Regression
which is used. Tree), MARS (Multivariate Adaptive Regression Splines) and
There is a number of factors that play an essential role others [3].
when conducting power load forecasting - air temperature, There are also a number of methods used to deal with the
day of the week, holidays, geographical differences, drawbacks from using TDs. One of these methods is
demographic information, people's standards of living, etc. Bootstrap Aggregating (commonly called Bagging) [4], more
[1]. specifically developed to reduce the negative impact that
A very close correlation between air temperature and power variance has on the model performance. In other words, it is
system load is studied for the Republic of North Macedonia, implemented to reduce the sensitivity of a model to different
along with forecast accuracy using sinuses and polynomial starting parameters. Bagging method is composed of two
regressions and discrete wavelet transformation [2]. In this parts: bootstrapping and aggregating [5]. Bootstrapping is a
paper, an analysis is made on the effect of air temperature, sampling method, where a sample is chosen out of a set, using
the replacement method. Using sampling, multiple smaller
datasets are formed from the original dataset, and a model is
Pande Popovski, Mitko Kostov, Metodija Atanasovski and Goran trained using each one. Then, the predictions made from these
Veljanovski are with the Faculty of Technical Sciences-Bitola, St. “weaker” models are aggregated to obtain a more accurate
Kliment Ohridski University, Republic of N. Macedonia, E-mail: prediction:
pande.popovski@uklo.edu.mk

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 106


1 B
mˆ bag (x ) =  mˆ S (x ) ,
B b =1 b
(1)
C. Gaussian Process Regression
where m̂S is estimator of a model m: XY, for a bootstrap
b

sample Sb, which is obtained from the sample S = {yi, xi} with Gaussian processes (GPs) can be thought of as an extension
i = {1, …, n}. of multivariate Gaussian distribution. GPs fall in the category
Decision trees are sensitive to the specific data on which commonly known as Bayesian methods, because of the fact
they are trained. Different subsets of the training data may that they originate from the Bayes' theorem [11].
result in different resulting decisions, and the predictions may The Gaussian distribution is very useful in machine
be completely different. When bagging with decision trees, learning because it can conveniently model noise, which is a
one is less concerned about individual trees overfitting the very common occurrence in data. Also, they are convenient
training data. The only parameter is the number of samples for many analytical manipulations. Because of this, Gaussian
and consequently the number of trees to include. It can be distributions are useful for modelling finite collections of real-
selected by continuously increasing the number of trees until valued variables. GPs are the extension of multivariate
the accuracy starts to stop improving. Gaussians to infinite-sized collections of real-valued
variables. This extension defines GPs as distributions not just
over random vectors, but also over random functions [11].
B. Support Vector Machines Following the assumption that data can be represented as a
sample from a multivariate Gaussian distribution, the
Support-Vector Machines (SVMs, also called Support- following expression is given [12]:
Vector Networks) are supervised learning models with
associated learning algorithms that analyse data used for y  K K*T   , (3)
classification and regression analysis [6]. The support-vector  y  ~ N  0,  
 *   K* K**  
network works in such a way that an input training data
(support vectors) is mapped into a high dimensional feature where tilde (~) denotes "has the probability distribution of", T
space, and in this space a decision surface is constructed with indicates matrix transposition. Matrices K, K* and K** contain
special properties that ensure high generalization ability of the the values of a covariance function for all possible
network [7]. In other words, the algorithm constructs a combinations of data points, due to the variance of the
hyperplane, a subspace whose dimension is one less than that responses differing:
of its ambient space, by using the mapped data from the
training dataset [8]. This hyperplane (or set of hyperplanes)  k (x1 , x1 ) k (x1 , x2 )  k (x1 , xn )
acts as a sort of a border that divides data points, which is why k (x , x ) k (x , x )  k ( x2 , xn ) ,
SVMs were primarily used for classification problems. Once a K = 2 1 2 2

model has been trained, further instances added in the created      


 
space can be classified using the hyperplane. However,  k (xn , x1 ) k (xn , x2 )  k (xn , xn )
modified SVMs can be used for regression analysis as well.
In their most general form, SVMs [9] find a hyperplane in a K * = [k (x* , x1 ) k (x* , x2 )  k ( x* , xn )] ,
space different from that of the input data. It is a hyperplane in
a feature space induced by a kernel K. In other words, because K** = [k (x* , x* )] ,
most of the time a problem does not contain linearly separable
data, it is presented in a higher dimensional space so its data  − ( x − x ' )2 
 
k ( x , x ') = σ e
2
may become linearly separable. This is often called the kernel 2
f
 2 l  ,
trick [10]. This can be seen as a set of functions in a
Reproducing Kernel Hilbert Space (RKHS) [9]. with l and δ - a length parameter and the Kronecker delta
For regression purposes SVMs solve the following function, respectively. The goal is, given n observations y, to
minimization problem: predict y*. The conditional probability p(y*|y) follows a
l Gaussian distribution y:
+ C  y i − f (xi ) ε
2
min f (2)
f K
i =1 (
y * | y ~ N K * K −1 y, K ** − K * K −1 K *T . ) (4)
where C is a "regularization parameter" that controls the
trade-off between empirical error and complexity of the The best estimate for y* is the mean of this distribution:
hypothesis space used. The variables x and y belong to a set of
y * = K * K −1 y , (5)
training data containing l instances. The function f represents
a hyperplane, expressed via the input data x. K represents the and the uncertainty in the estimate is captured in its variance:
kernel that defines the RKHS, and f 2 is the RKHS norm of
var( y* ) = K ** − K * K −1 K *T .
K
the function f. (6)

107
TABLE I The following three machine learning algorithms generated
PERFORMANCE RESULTS FROM TRAINING DATASET the most accurate models: Ensemble of trees (Bootstrap
Bagged Radial Exponen Aggregation, or Bagged trees), Support Vector Machine
Attributes: Measures (Radial kernel SVM) and Gaussian Process Regression
trees SVM tial GPR
R 0,93 0,91 0,93 (Exponential kernel GPR). The measures used to evaluate
RMSE [MW] 59,29 67,48 59,34 model performance are the following [15]:
Temperature
MSE [MW] 3515,54 4553,07 3521,28
MAE [MW] 45,78 54,69 46,11 Mean-squared error (MSE):
R 0,92 0,91 0,91
Temperature, RMSE [MW] 63,78 66,43 66,21 ( y1* − a1 )2 + ⋅ ⋅ ⋅ + ( y n* − an )2 . (7)
MSE =
Wind MSE [MW] 4068,10 4412,28 4384,16 n
MAE [MW] 50,73 53,37 53,55
R 0,92 0,91 0,91 Mean-absolute error (MAE):
Temperature, RMSE [MW] 63,28 66,72 66,30
y1* − a1 + ⋅ ⋅ ⋅ + yn* − an . (8)
Humidity MSE [MW] 4004,26 4451,58 4396,12 MAE =
MAE [MW] 50,37 53,95 53,82 n
R 0,91 0,91 0,91 Root mean-squared error (RMSE):
Temperature,
RMSE [MW] 66,75 65,67 65,54
Humidity,
MSE [MW] 4456,20 4311,93 4295,65
Wind
MAE [MW] 53,16 52,70 52,72
( y1* − a1 )2 + ⋅ ⋅ ⋅ + ( y n* − an )2 . (9)
RMSE =
n

III. CASE STUDY Correlation coefficient (R):


SYA . (10)
The entirety of the collected data is made up of R=
SY S A
meteorological documentation and power load data. More
specifically the meteorological data consists of the daily where:
averages of the air temperature (expressed in degrees Celsius),
air humidity (expressed in %), and wind speed (expressed in n n n

 ( y − y )(a − a ) (y − y) (a − a )


2 2
mph-miles per hour) for the city of Skopje, North Macedonia i i i* i

throughout the years 2014-2019 [13]. For the same time SYA = i =1 , SY = i =1 , SA = i =1 .
n −1 n −1 n −1
period, the daily averages of the power load in the Republic of
North Macedonia are provided [14].
The data is divided into a training dataset, which consists of In Eqs. (6)-(9), n represents the total number of instances,
the statistical information for the period 2014-2018 (1826 y1*,.., yn* are the predicted response values, a1,.., an are the
instances), and the test dataset with the data for the year 2019 actual response values, and y* and a are their average values.
(365 instances). The performance of the trained models for the
Table I shows the performance results of the trained models
training dataset is evaluated using 10-fold cross-validation.
when the training dataset (years 2014-2018) is tested by 10-
Multiple models were trained using Linear Regression,
fold cross-validation. By observing the acquired numerical
Regression Trees, Support Vector Machines, Gaussian
results from the cross-validation, it can be concluded that the
Process Regression and Ensembles of Trees. Different
performance of the trained models does not change noticeably
combinations of the meteorological factors were used as
by adding humidity and wind speed as attributes alongside air
attributes. In each of the models, the average daily power load
temperature. In fact, slightly worse results are obtained for the
remained as the dependant variable. More specifically, four
models trained with the Bagged trees and Exponential kernel
cases were taken into consideration:
GPR algorithms. A minor improvement in forecast accuracy is
• Attributes: Temperature; Dependant variable: Power load noted for the model trained with Radial kernel SVM.
• Attributes: Temperature and wind; Dependant variable: However, this applies for the training dataset, as different
Power load results might be acquired from the test dataset.
• Attributes: Temperature and humidity; Dependant
variable: Power load
• Attributes: Temperature, humidity and wind; Dependant
variable: Power load.

108
TABLE II accurate results are achieved when air temperature and
PERFORMANCE RESULTS FROM TEST DATASET humidity are used as independent variables. The models
Bagged Radial Exponen trained with Exponential kernel GPR gain the most accuracy
Attributes Measures from using multiple attributes, while for the models trained
trees SVM t ial GPR
R 0,93 0,95 0,94 with Radial kernel SVM the least improvement is noted.
RMSE [MW] 67,41 56,23 64,49 However, in general the models trained with Radial kernel
Temperature SVM give the most accurate results.
MSE [MW] 4543,66 3162,17 4158,66
MAE [MW] 51,30 41,54 47,80
R 0,94 0,94 0,95 ACKNOWLEDGEMENT
Temperature, RMSE [MW] 59,32 58,97 57,24
Wind MSE [MW] 3518,44 3478,35 3276,04
This research is supported by the EU H2020 project
MAE [MW] 45,14 43,64 41,83
TRINITY (Grant Agreement no. 863874) This paper reflects
R 0,94 0,95 0,95
only the author’s views and neither the Agency nor the
Temperature, RMSE [MW] 58,71 55,36 54,77
humidity
Commission are responsible for any use that may be made of
MSE [MW] 3447,72 3064,59 3000,08
MAE [MW] 43,63 41,44 40,83
the information contained therein.
R 0,94 0,95 0,95
Temperature,
Humidity,
RMSE [MW] 61,69 55,57 55,77 REFERENCES
MSE [MW] 3805,37 3088,48 3109,75
Wind
MAE [MW] 46,84 41,74 41,66 [1] E. A. Feinberg, D. Genethliou, “Chapter 12 Load
Forecasting”, Applied Mathematics for Power Systems,
Performance results obtained for the test dataset (year pp.269-282.
2019) are given in Table II. Results from the test dataset show [2] M. Kostov, M. Atanasovski, G. Janevska, and B.
that when only the air temperature has been chosen as an Arapinovski, "Power System Load Forecasting by using
independent variable, prediction accuracy for the models Sinuses Approximation and Wavelet Transform", ICEST -
Ohrid, North Macedonia, 27-29 June 2019.
trained with Bagged trees and Exponential GPR is worse [3] T. Hastie, R. Tibshirani, and J. Friedman, "The Elements of
compared to the training dataset, whereas there is an Statistical Learning: Data Mining, Inference, and Prediction"
improvement for the model trained with Radial kernel SVM. - Second EDITION, pp. 305-306, Springer, May 2001.
When multiple independent variables are considered, an [4] "Bootstrap Aggregation, Random Forests and Boosted
improvement in forecast accuracy is noted in each model. Trees", https://www.quantstart.com/articles/bootstrap-
Examining the test results further, it can be noticed that aggregation-random-forests-and-boosted-trees.
trained models perform overall better when humidity is taken [5] L. Breiman, ‘‘Bagging Predictors’’, Machine Learning, vol.
as an attribute along with temperature, compared to when 24, no. 2, pp. 123-140, 1996.
wind and temperature are taken as attributes. This leads to the [6] https://en.wikipedia.org/wiki/Support_vector_machine.
[7] C. Cortes, V. Vapnik, “Support-Vector Networks”, Machine
consideration that humidity may be more closely correlated to Learning 20, pp. 273-297, 1995,
power load than wind speed is. When all three attributes are https://doi.org/10.1007/BF00994018.
used to train a model, very slight changes in accuracy can be [8] https://en.wikipedia.org/wiki/Hyperplane.
noticed compared to the case when two attributes are used. [9] T. Evgeniou, M. Pontil, “Support Vector Machines: Theory
and Applications”, chapter from book Machine Learning and
Its Applications: Advanced Lectures, pp 249-257, 2001.
IV. CONCLUSION [10] https://en.wikipedia.org/wiki/Bayes%27_theorem
[11] C. B. Do, H. Lee, "Gaussian Processes", lecture notes,
From several machine learning algorithms used for power November 22, 2008.
load forecast, the following three are presented in the paper: [12] M. Ebden, "Gaussian Processes for Regression: A Quick
Bagged trees, Radial kernel SVM and Exponential kernel Introduction", August 2008.
GPR. Using each of the three algorithms, a number of models [13] https://www.wunderground.com/history.
[14] Dispatching and Operational Reports for Power System Load
are trained where different combinations of meteorological
Data obtained from MEPSO.
factors are used. [15] I. H. Witten, E. Frank, M. A. Hall, C. J. Pal, Data Mining:
From the results it can be concluded that combining the Practical Machine Learning Tools and Techniques,
attributes improves its accuracy. From the four cases, the most Burlington, USA, Morgan Kaufmann, 2017.

109
K-Nearest Neighbor Regression for Forecasting
Electricity Demand
Metodija Atanasovski, Mitko Kostov, Blagoja Arapinoski, and Mile Spirovski
Abstract – Power system load forecasting plays a vital role in
all aspects of power system planning, operation and control. It is
a basic function for reliable and economical operation of power
systems. This paper analyses the power system load forecast
performed by applying k-nearest neighbour machine learning
model, which is for the first time applied on real data of North
Macedonia power system. The results are compared with
polynomial and sinuses regressions.

Keywords – Power system load, Forecast, Machine learning, K-


nearest neighbour, Correlation, Regression.

I. INTRODUCTION
Electricity load forecasting is a process of projecting future
electric energy demand in order to meet the increasing
demand. Electric load forecasting will control which power
plants should increase their output and which generators
should be dispatched. In terms of the period of load
forecasting, it can be divided into three categories: short-term
Fig. 1. Load duration curve for years 2014-2018 for power system of
load forecasting, medium-term load forecasting and long-term Republic of N.Macedonia
load forecasting [1].
Short-term load forecasting refers to forecasting electricity used for the years 2014-2018 as a training dataset, while 2019
demand several days in advance every hour. An (temperatures and load) data are used as a test dataset. The
underestimation of the power load can result in lack of effectiveness of the model is evaluated and confirmed by
electricity production. On the other hand, in the case of cross-validation.
overestimation of the load sub-optimal dispatch of power The remainder of this paper is structured as follows.
plants could be scheduled. Section II briefly describes the basic statistical analysis of
The factors that play a key role in forecasting energy power system load data and air temperature. The methodology
consumption are temperature, type of the day (weekday, used in the paper is introduced in Section III. Section IV
weekend, holiday), geographic differences, people standard, elaborates the experimental results and the conclusions are
demographics, etc. The number of scientific articles about given in Section V.
power forecasting is very large. Some of the used techniques
include regression methods [2-4], discrete wavelet transform
[5, 6], neural networks [7-11], fuzzy logic [12]. This paper II. BASIC ANALYSIS
studies the forecast of power load consumption by applying k-
nearest neighbour (KNN) machine learning model, which is In this paper, dataset consists of power system load data for
for the first time applied on real data of North Macedonia Republic of North Macedonia for the calendar years 2014-2019
power system and the results are compared with polynomial on hourly basis (8760 per year) (Fig. 1) [13, 14] and the
and sinuses regressions. The implementation of the k-nearest matching meteorological data about minimal, average and
neighbor machine-learning model is performed by using two maximal air temperatures for the city of Skopje,
independent variables: air temperature and date. It means the North Macedonia [15].
algorithm searches for/calculates suitable power load Fig. 2 shows the normalized daily average power load
candidates around a certain period and temperature. The diagram and normalized daily air temperature diagram from
hourly data (8760 per year) for the temperatures and load are 2014 to 2019, both of which were normalized in the interval
[0 1]. An average load is average of all 24-hourly loads on a
daily diagram. The analysis of the power load data shows that
Metodija Atanasovski, Mitko Kostov, Blagoja Arapinoski and there is a high variation between hourly loads in the power
Mile Spirovski are with the Faculty of Technical Sciences-Bitola, system on a year basis. Fig. 2 confirms the strong negative
University St. Kliment Ohridski, Republic of North Macedonia, E- correlation between the power load and the air temperature
mail: metodija.atanasovski@uklo.edu.mk

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 110


Selecting the
Defining the
independent and
training and Tuning the model
dependendent
testing dataset
variables
Loads and Temperatures

Applying the Evaluating the


Training the
model over the model with the
model
testing dataset training dataset

Fig. 3. Phases of the defined machine learning model

performance, overfitting can be avoided. If the model


performs well on the training data, but poorly on the test data,
then it is overfitted. Besides with the correlation coefficient R
and determination coefficient R2, the performance can be
measured in other ways; two of those ways are through the
Fig. 2. Normalized average daily loads and air temperatures for the root-mean-squared error RMSE and mean-absolute error
years 2014-2019 MAE:

which is typical for this region: 1) the electric energy ∑


= , (1)
consumption is large in winter; 2) the positive air temperature
peaks correspond to negative power load peaks and vice ∑ | |
versa. = , (2)
The regression analyses over power load and temperature
datasets in 2014 and 2015 performed in [16] and [17] examined where pi and ai are the predicted and actual values,
the approximations parameters, determination coefficients (R2) respectively, while n is the total number of the test instances.
and correlation coefficients [18]. According to [16] and [17], the All the phases of the machine learning model are illustrated
determination coefficients for polynomial regression and sinuses in Fig. 3.
regression of the maximal, average and minimal daily load due
to the average temperature are very high, which means that the IV. CASE STUDY
regression analysis shows high prediction degree of the daily
typical loads from the air temperature. The correlation This section presents the results obtained by using the
coefficients for polynomial regression and sinuses regressions presented methodology. The temperatures, dates and power
have values in a range between −0.90 to −0.95 what implies very load for the years 2014-2018 are used as a training dataset, while
close negative relation between all the combinations of typical corresponding data for 2019 as a testing dataset. Figure 4
daily loads and air temperatures. illustrates distributions of the average air temperatures and the
average power loads for the years 2014-2018 through 365 days,
III. METHODOLOGY respectively. The blue circles in Figures 4 denotes the
temperatures and power loads in the period 2014-2018,
K-nearest neighbour machine learning model [19] is respectively, while the red stars denote the temperatures and
considered for power system load forecast. The power load as power loads in the forecast period 2019. Figure 5 illustrates
a dependent variable depends on two independent variables – distribution of the real average power load in the period Mar. 1-
average air temperature and date. This means the algorithm 21 2014-2019.
will search for suitable k power load candidates around a According to the above methodology the average power
certain period and temperature. After defining the training system load for the year of 2019 is forecasted on the basis of the
dataset (temperatures, dates and power load for the years defined training dataset. KNN machine learning model is used
2014-2018), the model is tuned by setting an appropriate over the two independent variables, average air temperature and
parameter for the number of neighbours k, and then it is date, and the distance between neighbours is measured by
trained on the training dataset. Euclidean distance function as a commonly used distance
The effectiveness of the model is evaluated by 10-fold and metric. The experiments for this case study show that a suitable
Leave-one-out cross-validations. Cross-validation is a method number of neighbours in the model is 30. The minimum and the
for obtaining reliable estimates of model performance using maximum of the variable average air temperature data are −15
only training data. To predict the performance of a model on a and +30(C), respectively, while the minimum and maximum of
new dataset, it is needed to assess its performance on a dataset the variable date are 1 and 365 (the first and the last day in a
that plays no part in the formation of the model – the test year), respectively. Variables measured on different scales
dataset. By comparing the test performance and training contribute differently to the analysis, which may eventually lead

111
Power load [MW]
Temperature [C]

(a) Fig. 5. Distribution of average power load for the period Mar. 01-21,
2014-2019

TABLE I
PERFORMANCE OF THE MODEL MEASURED ON THE TRAINING DATASET
[MW]
Cross-validation normalized variables non-normalized variables
10-fold 62.2467 66.4218
Leave-one-out 65.8212 62.2133

for power load forecast with different models. Fig. 6 graphically


illustrates the deviation between forecasted and real power load
data. These results show that for power load forecasts, k-
nearest neighbour regression outperforms polynomial and
sinuses regressions.

V. SUMMARY
(b)
This paper is the first one using k-nearest neighbour
Fig. 4. Distribution of average air temperatures and average power
machine-learning model for investigation the forecast of
loads for the years 2014-2019
power system load in correlation with air temperature and date
on real data of power system of Republic of North Macedonia.
to bias. The variable date (due to the larger range) will outweigh On the basis of statistical analysis, it can be noticed that there
the variable air temperature, i.e. the variable date will have a is a close time matching in appearance of power system
bigger weight in an analysis compared to the variable air maximum load and minimum air temperature. The same time
temperature. This means the date will have higher influence on matching is noticed between power system summer maximum
the calculated distance than the air temperature will do. load and registered maximum temperature in analysed years.
Transforming the data to a comparable scale can avoid this The presented results show that for power load forecasts the
problem. Normalization is a way of standardizing a set of proposed algorithm outperforms polynomial and sinuses
numbers so each one is between 0 and 1. Hence, both the regressions. The effectiveness of the model is evaluated by 10-
variables in this model are normalized in the range [0−1]. fold and Leave-one-out cross-validations. Methodology works
The model is evaluated by 10-fold and Leave-one-out with all types of days and simulation results are given in a
cross-validations through the root-mean-squared error and the large time frame.
mean-absolute error (30 neighbours used over the 2014−2018
dataset). Results given in Table 1 show that the errors are
smaller when the variables are normalized. ACKNOWLEDGEMENT
Results of applying the model over the testing dataset (2019,
30 neighbours used) and forecasting the corresponding power This research is supported by the EU H2020 project
load are given in Table 2 and Figure 6. Table 2 gives an TRINITY (Grant Agreement no. 863874) This paper reflects
overview of MAE and RMSE errors and correlation coefficient only the author’s views and neither the Agency nor the

112
TABLE II
COMPARISON OF MAE, RMSE ERRORS AND CORRELATION COEFFICIENT
R OF DIFFERENT MODELS FOR POWER LOAD FORECAST FOR 2019 DATA

Algorithm MAE RMSE R


k-nearest neighbour
38.4046 50.6231 0.9614
(normalized variables)
k-nearest neighbour
39.1885 51.7435 0.9564
(non-normalized var.)
polynomial (order 4) 41.3541 56.4752 0.9488
sinuses (order 4) 40.7253 55.3602 0.9523
sinuses (order 4) + wavelet
41.1788 54.2211 0.9584
transform

Fig. 6. Comparison of power load KNN forecast with normalized


Commission are responsible for any use that may be made of variables and real average power load for the year 2019
the information contained therein.

using Similar Days Approach”, Int. J. Electr. Power Energy


REFERENCES Syst., vol. 28, no. 6, pp. 367-373, 2006.
[10] H. Shi, M. Xu, and R. Li, “Deep Learning for Household Load
[1] E. A. Feinberg, D. Genethliou, Chapter 12: Load Forecasting, Forecasting - A Novel Pooling Deep RNN”, IEEE Trans. Smart
Applied Mathematics for Power Systems, pp. 269-282. Grid, vol. 9, no. 5, pp. 5271-5280, Sep. 2018.
[2] W. Charytoniuk, M. S. Chen, and P. Van Olinda, [11] M. Cai, M. Pipattanasomporn, and S. Rahman, “Day-ahead
“Nonparametric Regression Based Short-Term Load Building-Level Load Forecasts using Deep Learning vs.
Forecasting”, IEEE Trans. Power Syst., vol. 13, no. 3, pp. 725- Traditional Time-Series Techniques”, Appl. Energy, vol. 236,
730, Aug. 1998. pp. 1078-1088, 2019.
[3] S. Rucic, A. Vuckovic, and N. Nikolic, “Weather Sensitive [12] Dispatching and Operational Reports for Power System Load
Method for Short Term Load Forecasting in Electric Power Data obtained from MEPSO.
Utility of Serbia”, IEEE Trans. Power Syst., vol. 18, no. 4, pp. [13] H. H. Çevik and M. Çunka³, “Short-Term Load Forecasting
1581-1586, Nov. 2003. using Fuzzy Logic and ANFIS”, Neural Comput. Appl., vol. 26,
[4] T. Hong, M. Gui, M. E. Baran, and H. L. Willis, “Modeling and no. 6, pp. 1355-1367, 2015.
Forecasting Hourly Electric Load by Multiple Linear [14] D. Bajs, M. Atanasovski, Longterm Forecast Study of Electrical
Regression with Interactions”, in Proc. IEEE PES Gen. Meeting, Energy and Power Balance and Adequacy Analysis of
Jul. 2010, pp. 1-8. Transmission Network of Republic of Macedonia,
[5] Y. Chen, P. B. Luh, C. Guan, Y. Zhao, L. D. Michel, M. A. Zagreb/Skopje EIHP, 2016.
Coolbeth, P. B. Friedland, and S. J. Rourke, “Short-Term Load [15] https://www.wunderground.com/history
Forecasting: Similar Day-Based Wavelet Neural Networks”, [16] M. Atanasovski, M. Kostov, B. Arapinoski, and I. Andreevski,
IEEE Trans. Power Syst., vol. 25, no. 1, pp. 322-330, Feb. 2010. Correlation between Power System Load and Air Temperature
[6] G. Sudheer and A. Suseelatha, “Short Term Load Forecasting in Republic of Macedonia, Int. Scientific Conf. on Information,
using Wavelet Transform Combined with Holt_Winters and Communication and Energy Systems and Technologies, pp.
Weighted Nearest Neighbor Models”, Int. J. Electr. Power 213-216, Sozopol, Bulgaria, Jun. 2018.
Energy Syst., vol. 64, pp. 340-346, 2015. [17] M. Kostov, M. Atanasovski, G. Janevska, and B. Arapinoski,
[7] W. Charytoniuk, M.-S. Chen, “Very Short-Term Load “Power System Load Forecasting by using Sinuses
Forecasting using Artificial Neural Networks”, IEEE Trans. Approximation and Wavelet Transform”, Int. Scientific Conf.
Power Syst., vol. 15, no. 1, pp. 263-268, Feb. 2000. on Information, Communication and Energy Systems and
[8] H. S. Hippert, C. E. Pedreira, and R. C. Souza, “Neural Technologies, pp. 273-276, Ohrid, North Macedonia, Jun. 2019.
Networks for Short-Term Load Forecasting: A Review and [18] S. Vukadinovic, Elements of Probability Theory and
Evaluation”, IEEE Trans.Power Syst., vol. 16, no. 1, pp. 44-55, Mathematical Statistics, Belgrade, 1973.
Feb. 2001. [19] I. H. Witten, E. Frank, M. A. Hall, and C. J. Pal, Data Mining:
[9] P. Mandal, T. Senjyu, N. Urasaki, and T. Funabashi, “A Neural Practical Machine Learning Tools and Techniques, Burlington,
Network Based Several-Hour-Ahead Electric Load Forecasting USA, Morgan Kaufmann, 2017.

113
MATLAB Simulation of
Grid-Connected Photovoltaic System
Pande Popovski1, Natasa Mojsoska2 and Blagoja Stevanoski2
Abstract – In this paper work will be briefly covered the The key standards in the field of IEC photovoltaic systems
principle of operation of photovoltaic system, the procedure of are:
integration of such power plants in the power system, their • IEC 61730 Photovoltaic Safety Module
impact on the system and the technical norms that they should • IEC 61215 Crystalline silicon terrestrial photovoltaic (PV)
meet. Furthermore, the numerical results obtained from the
simulation of a photovoltaic system conducted in Simulink will
modules - Design qualification and type approval
be shown and commented on. Along with this, the model with • IEC 61646 Thin-film terrestrial photovoltaic (PV) modu-
which the simulation was made, which was made on the basis of les - Design qualification and type approval
a real photovoltaic system owned by the Technical Faculty - The IEC 61730 standard covers thorough structural
Bitola, will be discussed. requirements in order to ensure mechanical safety as well as
reliability in the operation of photovoltaic systems during
Keywords – Photovoltaic system, Matlab/Simulink simulation, their lifetime. This standard in combination with the IEC
Renewable energy sources RES. 61215 or IEC 61646 standard practically covers the thorough
construction of photovoltaic modules.
I. INTRODUCTION The IEEE - SA standards for photovoltaic systems are:
• IEEE 1262 Recommended Practice for Qualification of
In the last few decades, especially since the beginning of Photovoltaic (PV) Modules
the 21st century, the interest in the participation of renewable • IEEE 1374 Guide for Terrestrial Photovoltaic Power
energy sources (RES) as producers in the power system has System Safety
been progressively increasing. One of the reasons for this is • IEEE 928 Recommended Criteria for Terrestrial Photo-
the continuous increase in consumption, both in developing voltaic Power Systems.
countries and in already developed countries. Global warming There are organizations that are committed to developing
has also contributed to this, which has become a major topic and coordinating standards. The most important of these are
of interest due to its close connection to the use of fossil fuels the following organizations:
[1]. • ISO (International Organization for Standardization) is an
Among other types of renewable sources is the energy organization composed of 145 national institutions and 193
obtained from photovoltaic power plants, which is marked by technical boards, and is the most important organization for
the highest increase from the others. In 2002, an average development and standardization.
annual increase of 48% was recorded, and by the end of 2008 • IEC (International Electrotechnical Commission) is a
the total installed capacity of such power plants in the world leading organization for the development and adoption of
exceeded 16 GW [2]. A report by the European Photovoltaic norms in the field of electrical engineering. It consists of 112
Industry Association (EPIA) shows that in 2010 the total technical boards.
installed capacity of photovoltaic power plants in Europe was • CEN (Comité Européen de Normalisation) is the
29,777 MW, while in 2019 in the European Union this power European Normalization Organization, while CENELEC
was 130GW. In whole world in 2019 installed capacity of (European Committee for Electrotechnical Standardization) is
photovoltaic power energy was 585GW. the European Organization for Normation in the field of
electrical engineering.
A. Standards B. Procedures for Development and Construction of Power
Plants from Renewable Energy Sources
The organizations in charge of normalization in
photovoltaic systems are IEC and IEEE - SA. In the Republic of North Macedonia, for the
implementation of projects for renewable energy sources,
1Pande Popovski is postgraduate student at Technical Faculty - more specifically photovoltaic power plants, relevant legal
Bitola, Makedonska falanga 33, 7000 Bitola, E-mail: and regulatory acts have been established. [6] provides
popovski.pande@gmail.com detailed guidelines for investors planning to enter the market
2Natasa Mojsoska is with University of Sv. Klimenit Ohridski –
as electrical energy producers from renewable energy sources.
Bitola, Technical Faculty - Bitola, Makedonska falanga 33, 7000
The following steps, procedures, and required documentation
Bitola, E-mail: natasa.mojsoska@tfb.uklo.edu.mk
2Blagoja Stavanoski is with University of Sv. Klimenit Ohridski – are generally included in this process:
Bitola, Technical Faculty - Bitola, Makedonska falanga 33, 7000 • Establishing a company
Bitola, E-mail: blagoj.stavanovski@uklo.edu.mk • Land use

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 114


• Environmental Impact Assessment Study with the voltages of the series solar modules has been made
• Consent for connection to the distribution system taking into account the dependence of the voltage of the solar
• Building permit modules on the temperature. That temperature range ranges
• Gaining temporary status of preferential producer from -10°C to 70°C. The inverter has a rated power of 20kW,
• Design and construction of the connector and has MPPT capability. Furthermore, the inverter with the
• Approval for use main switchboard is connected via a three-pole switch.
• License to produce electrical energy Simulink is a graphically oriented tool that can use blocks
• Registration of the object in the register of objects for to construct and simulate a particular system. The tool
production of electrical energy from renewable energy contains a wide library, which also contains a package of
sources: blocks designed to simulate power systems. Using the
• Awarding the status of preferential producer required blocks, the model shown in Fig. 1 is constructed.
• Electrical energy purchase agreement with electrical In addition to the model of the photovoltaic power plant,
energy market operator oscilloscopes, along with other additional blocks, have been
installed to carry out the necessary measurements. In general,
solar radiation is measured at one of the block inputs for solar
II. MATLAB SIMULATION OF GRID CONNECTED modules, the effective values of the phase voltages and
PV SYSTEM currents at the output of the power system connected to the
network, as well as the active power at the output of the PV
An analysis of the performance of a photovoltaic power system. Also, the output power is sampled at certain time
system through simulation using Simulink - a graphically intervals in order to be further used to calculate the produced
oriented program tool based on Matlab - will be explained. electrical energy. The measurements were made with the help
The structure of the model to be used for the simulation and of a measuring block that provides data on the voltages and
how it works will be explained. The used model is based on currents at the output of the system.
an already existing photovoltaic system that is installed on the
roof at the Technical Faculty - Bitola, and is connected on the
distribution network.

Fig. 2. Instruments for conducting the necessary measurements

In order to measure the effective values of current and


voltage as well as the active power transmitted by the PV
Fig. 1. Model for a photovoltaic plant built in Simulink system, it is necessary to divide the voltages and currents from
the measuring block into a module and an argument. The
An existing database on solar radiation in the area where modules are then divided by √2 to obtain the effective values.
the plant is installed will be used for the assessment of the Ultimately, the active power is calculated using the obtained
energy potential of the PV system, as well as for the quantities.
consumption of the Technical Faculty - Bitola for two It can be seen from the Fig. 2 images of the instruments and
characteristic days. With the help of the model, the produced blocks for the required calculations that the power factor is
electrical energy will be calculated in such conditions. The not taken into account in the calculation of active power, i.e. it
results will be compared with those obtained in the conceptual is adopted to be 1, and the instrument for measuring active
design made for the existing power system. power is used a switching block that misses the active power
signal after a certain time. This is done in order to avoid
A. Model of the Photovoltaic System inaccuracies in the results due to the occurrence of oscillations
in voltage, current, as well as the phase shift in them at the
Two PV systems with a power of 10 kW or a total of 20 moment of connection of the PV system to the network. This
kW are installed on the roof of the Technical Faculty in is a transient phenomenon that lasts for a fraction of a second,
Bitola. The real photovoltaic system for which the model is but due to the short time of the software simulation, these
made in Simulink is composed of a structure with solar phenomena last relatively long and can lead to large errors in
modules made of polycrystalline silicon with a power of the results.
250W. The modules are grouped into four arrays, where each
array has 20 serial-connected modules. The four arrays via a B. Used Data to Perform the Simulation
DC switchboard with single-pole fuses and surge arresters are
connected to separate inputs from a three-phase inverter. A database of two characteristic days was used to perform
Compliance of the voltage and current levels of the inverter the simulation. Specifically, the solar radiation in the area of

115
the Technical Faculty was measured, as well as its III. ANALYSIS RESULTS
consumption for one working day (24.01.2020) and one non-
working day (16.02.2020). The measurements were made at a After the simulation is released, the oscilloscopes draw the
time interval of 15 minutes. curves of the production of the photovoltaic system and the
The data obtained are implemented in the model shown consumption of the faculty. Also, as mentioned in the 0.01
earlier. Two different models have been used that use the data second time interval, the values of the power generated by PV
from both days. system in Matlab's desktop are preserved. This data can be
In the function, the collected data for the whole day are used to calculate the energy produced for both days.
entered for a time interval of 0.96 seconds in order to shorten
the simulation time. This means that in the simulation one
hour is represented by a time interval of 0.04 seconds, and 15
minutes by a time interval of 0.01 second. This data is
important for the calculation of the produced energy after the
simulation is performed. The resulting solar radiation
diagrams are shown in the figures below Fig. 3 and 4.

Fig. 5. Production on 24.01.2020

Fig. 3. Diagram obtained for solar radiation on 16.02.2020

The resulting algebraic expressions for radiation


dependence and time consumption are implemented in
Simulink through a block that connects a function written in
Matlab to the model in which that block is placed. The inputs Fig. 6. Production on 16.02.2020
of this block are the coefficients generated by the tool shown
in the pictures before, and also the block that gives the output Fig. 5 and 6 shows the power output by the photovoltaic
time of the simulation at a given moment. The output of the system for days 24.01 and 16.02.2020 obtained from the
solar radiation is connected to one of the inputs of the module, oscilloscope.
and the consumption block dictates the operation of a three- The results obtained for the energy produced for the two
phase dynamic load, which represents the TFB. days are shown in Tables I and II.
If we compare the quantities of electrical energy produced
by the simulation with the actual read values, we get the
following:
On January 24, 2020, the photovoltaic system produced
71.47 kWh, and according to the simulation, we get produced
energy 67.52 kWh, which is 3.95 kWh, or 5.5% less value
than the real one. On February 16, 2020, the system produced
91.91 kWh, while the simulation results show a value of 86.76
kWh, or 5.15 kWh (5.6%) less than the real value.
In general, the model gives lower values for the produced
power than the real ones. This may be due to the short
simulation time, where transient phenomena occurring as a
problem that result in an error in the results. If this is the case,
the solution would be to increase the simulation time so that
Fig. 4. Diagram obtained for solar radiation on 24.01.2020 these oscillations have less effect. However, the bad side of
this would be the long duration of the simulation.

116
TABLE I TABLE II
SIMULATION RESULTS FOR THE DAY 24.01.2020 SIMULATION RESULTS FOR THE DAY 16.02.2020

Time Production Time Production Time Production Time Production


(kW) (kW) (kW) (kW)
00:15 0.000 12:15 11.342 00:15 0.000 12:15 13.359
00:30 0.000 12:30 11.217 00:30 0.000 12:30 13.368
00:45 0.000 12:45 11.013 00:45 0.000 12:45 13.274
01:00 0.000 13:00 10.713 01:00 0.000 13:00 13.082
01:15 0.000 13:15 10.331 01:15 0.000 13:15 12.772
01:30 0.000 13:30 9.921 01:30 0.000 13:30 12.316
01:45 0.000 13:45 9.498 01:45 0.000 13:45 11.724
02:00 0.000 14:00 9.072 02:00 0.000 14:00 11.079
02:15 0.000 14:15 8.596 02:15 0.000 14:15 10.423
02:30 0.000 14:30 7.948 02:30 0.000 14:30 9.730
02:45 0.000 14:45 7.046 02:45 0.000 14:45 8.989
03:00 0.000 15:00 5.935 03:00 0.000 15:00 8.176
03:15 0.000 15:15 4.733 03:15 0.000 15:15 7.241
03:30 0.000 15:30 3.530 03:30 0.000 15:30 6.180
03:45 0.000 15:45 2.401 03:45 0.000 15:45 5.014
04:00 0.000 16:00 1.422 04:00 0.000 16:00 3.782
04:15 0.000 16:15 0.654 04:15 0.000 16:15 2.575
04:30 0.000 16:30 0.154 04:30 0.000 16:30 1.248
04:45 0.000 16:45 0.000 04:45 0.000 16:45 0.000
05:00 0.000 17:00 0.000 05:00 0.000 17:00 0.000
05:15 0.000 17:15 0.000 05:15 0.000 17:15 0.000
05:30 0.000 17:30 0.000 05:30 0.000 17:30 0.000
05:45 0.000 17:45 0.000 05:45 0.000 17:45 0.000
06:00 0.000 18:00 0.000 06:00 0.000 18:00 0.000
06:15 0.000 18:15 0.000 06:15 0.000 18:15 0.000
06:30 0.000 18:30 0.000 06:30 0.000 18:30 0.000
06:45 0.000 18:45 0.000 06:45 0.000 18:45 0.000
07:00 0.089 19:00 0.000 07:00 0.089 19:00 0.000
07:15 0.106 19:15 0.000 07:15 0.464 19:15 0.000
07:30 0.478 19:30 0.000 07:30 1.709 19:30 0.000
07:45 1.219 19:45 0.000 07:45 3.039 19:45 0.000
08:00 1.977 20:00 0.000 08:00 4.304 20:00 0.000
08:15 3.060 20:15 0.000 08:15 5.699 20:15 0.000
08:30 4.295 20:30 0.000 08:30 7.070 20:30 0.000
08:45 5.568 20:45 0.000 08:45 8.162 20:45 0.000
09:00 6.801 21:00 0.000 09:00 8.846 21:00 0.000
09:15 7.845 21:15 0.000 09:15 9.333 21:15 0.000
09:30 8.561 21:30 0.000 09:30 9.853 21:30 0.000
09:45 8.997 21:45 0.000 09:45 10.443 21:45 0.000
10:00 9.331 22:00 0.000 10:00 11.086 22:00 0.000
10:15 9.651 22:15 0.000 10:15 11.748 22:15 0.000
10:30 9.986 22:30 0.000 10:30 12.349 22:30 0.000
10:45 10.360 22:45 0.000 10:45 12.791 22:45 0.000
11:00 10.784 23:00 0.000 11:00 13.030 23:00 0.000
11:15 11.169 23:15 0.000 11:15 13.111 23:15 0.000
11:30 11.406 23:30 0.000 11:30 13.137 23:30 0.000
11:45 11.464 23:45 0.000 11:45 13.184 23:45 0.000
12:00 11.415 00:00 0.000 12:00 13.273 00:00 0.000

117
Another cause could be the photovoltaic maximum power was made in the energy production is around 5.5%, which
monitoring (MPPT) algorithm. The Perturb and Observe although for one or two days is a relatively small error.
algorithm works by changing the voltage at the output of the However, as mentioned, it is possible for the model to be
photovoltaic, which measures the change in output power. improved and thus give more accurate results. Improving the
With this method, the time interval controller increases the model would be in the direction of how to increase the
voltage as long as the measurements show that the power also simulation time that Simulink will be able to do in a
increases. Working in this way can cause oscillations in reasonable amount of time, which will probably improve the
voltage and current, and thus in output power. The solution to results.
this would be to apply another more stable algorithm.
REFERENCES
IV. CONCLUSION
[1] E. Rakshani, K. Rouzbehi, A. J. Sánchez, A. C. Tobar, and E.
With the help of the Simulink software package, it is Pouresmaeil, “Integration of Large Scale PV-Based Generation
possible to create a very precise model of a photovoltaic into Power Systems: A Survey”, 13 April, 2019.
power system. Simulink offers the user a wide range of [2] R. Goić, J. Krstulović Opara, I. Penović, D. Jakus, and I.
Zlatunić, “Connection of Large PV Power Plant od
databases and elements, and gives them complete freedom in Disstribution Network”, Umag, 16-19 May, 2010.
analyzing such a model. For the same, it is possible to obtain [3] B. Stevanovski, “Renewable Energy Sources RES”, Subject
relatively accurate production data, where the accuracy lectures, TFB Bitola, 2017.
depends on the input data itself, as well as on how detailed the [4] M. Atanasovski, “New Methods for Distribution of Losses in
plant model is. Distribution Networks with Dispersed Electricity Production”,
From the developed model it can be concluded that such an PhD dissertation, FEIT Skopje, 2011.
approach would be quite useful in the initial stages, i.e. when [5] R. Orlovac, A. Tunjic, “Technical Requirements for Connection
a PV power plant is in the design process. In this case, results od PV Generators to the Public Low-Voltage Network”,
would be obtained with satisfactory accuracy, which would CIRED, Šibenik, 18-21 May, 2008.
[6] “Guidelines on the Procedures for the Development and
give an idea of how much production capacity the plant will Construction of Power Plants Utilising Renewable Energy
have. However, when it comes to more detailed analysis, such Sources – Photovoltaic Plants”, Project funded by EU, source:
accuracy would not be sufficient. An example of this is the http://www.economy.gov.mk/Upload/Documents/Guidelines_o
results of the simulation: for the days 24.01 and 16.02 an error n_photovoltaic_plants_B5_final_3.pdf

118
Influence of Reduction Factors on High Voltage Cables
on the Transfer of Potentials in the Network
Nikolche Acevski1, Аngela Micevska2, and Аna Manivilovska3
Abstract - The purpose of this paper is to calculate the The self and mutual impedances Zs and Zm on the three cores
reduction factors of 3 single-core HV cables, that is, to see the of the cables are calculated with Carson equations, [5], for
differences in the voltage at two HV 110 kV substations, ρ=300 Ωm. The cables are placed in a PVC pipe, d=0.16 m.
substation Central and transferred to substation South New,
when applying HV cables with various cross-sections placed in ρ 300
Dek = 658 = 658 = 1611.76m , (2)
triangle and plane configurations. f 50

Keywords - Reduction factor, HV cables, Plane, Triangle, D ek


Transfer of potential. Z s = ( 0 . 05 + re + j ⋅ 0 . 1445 ⋅ log )⋅l , (3)
de / 2

I. INTRODUCTION D ek
Z m = ( 0 .05 + j ⋅ 0 .1445 ⋅ log )⋅l . (4)
D
The reduction factor of the HV cable is defined as the ratio
between the residual current (IKV - Je), which continues to the So each cable with an insulated sheath observed along with its
end of the cable, and the error current IKV, (10), (21). It shows return path through the ground is represented by an I-
us how much of the fault current will be injected into the replacement circuit. The mutual impedances between the
grounding conductor at the end of the cable at the grounded phase conductor of phase f=A, B, C and the screens of the
connection at its end. three wires of the cable are calculated according to (5). For
phase A, (6).
Jem
D ek
M ij = 0 . 05 ⋅ l + j ⋅ 0 .1445 ⋅ log ⋅l , (5)
de / 2
p q
Zek v D ek
M 1 A = 0 .05 ⋅ l + j ⋅ 0 . 1445 ⋅ log ⋅l ≡ M s , (6)
Fig. 1. Single-phase equivalent of 3 single-core cables de / 2

When the three single-core cables are laid in a triangular Dek


M 2 A = M 3 A = 0.05 ⋅ l + j ⋅ 0.1445⋅ log ⋅ l ≡ M m . (7)
layout, as in Fig. 2, the followingapplies: D
 Z s Z m Z m Similarly, the remaining own and mutual impedances are
 
Z = Z m Z s Z m (1) calculated Mij = Mji, between the phase conductors of the
Z m Z m Z s  phases (i = B, C) and the three cable screens (j = 1,2,3). For
  Fig. 2, the single-phase equivalent of Fig. 1 [5] will be:
Z + 2⋅Zm
Ze = s , (8)
3
M + 2⋅M m
Je = s ⋅I , (9)
Z s + 2 ⋅ Z m KV

I KV − J e Je Ms + 2 ⋅ Mm
rf = = 1− = 1− . (10)
I KV I KV Zs + 2⋅ Zm
Fig. 2. Triangle configuration
When the strings are placed in a plane, it is valid [5]:
 Z s Z m1 Z m 2 
 
1Nikolce Acevski, Technical Faculty, St. Kliment Ohridski, Z =  Z m1 Z s Z m1  , (11)
Makedonska Falanga 37, Bitola, Republic of North Macedonia, E-  Z m 2 Z m1 Z s 
mail: nikola.acevski@uklo.edu.mk
 
2Angela Micevska, Technical Faculty, postgraduate, E-mail: D ek
micevska.angela@hotmail.com Z s = ( 0 . 05 + re + j ⋅ 0 . 1445 ⋅ log ) ⋅ l , (12)
3Ana Manivilovska, Technical Faculty, postgraduate, E-mail:
de / 2
ana_manivilovska@hotmail.com

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 119


TABLE I
CATALOG DATA FOR POLYETHYLENE CABLES OF THE TYPE NA2XS(FL)2Y UM=123 KV

D ek Z m2 ⋅ M m1 + Z s ⋅ (M s + M m1 + M m2)
Z m1 = ( 0 .05 + j ⋅ 0 .1445 ⋅ log )⋅l , (13) r f =1−
D Z 2s − 2 ⋅ Z 2m1 + Z s ⋅ Z m2
(M s + 2 ⋅ M m1 + M m2)
D ek + Z m1 ⋅ . (21)
Z m 2 = ( 0 .05 + j ⋅ 0 .1445 ⋅ log )⋅l , (14) Z 2s − 2 ⋅ Z m
2
2D 1 + Z s ⋅ Z m2

 M s M m1 M m 2 
  II. CALCULATION OF REDUCTION FACTORS FOR
M =  M m1 M s M m1  , (15)
DIFFERENT CABLE CROSS SECTIONS
 M m 2 M m1 M s 
 
D ek After the calculations made according to the above
M s = 0 . 05 ⋅ l + j ⋅ 0 . 1445 ⋅ log ⋅l . (16) formulas, the results shown in Table II are obtained. The
de / 2
reduction factor of a bundle of three single-core cables placed
D ek in a triangle is smaller than that in a plane from 3.7% to 12%
M m1 = 0 . 05 ⋅ l + j ⋅ 0 . 1445 ⋅ log ⋅l , (17) due to the obvious symmetry.
D
D ek TABLE II
M m2 = 0 . 05 ⋅ l + j ⋅ 0 . 1445 ⋅ log ⋅l , (18) REDUCTION FACTORS OF HV CABLES
2D
Cross section Triangle Plane
2 ⋅ ( Z s − Z m1 )2
Ze = Zs − , (19) 2000 0.066e -j81.25
0
0.074e-j76.72
0
3 ⋅ Z s − 4 ⋅ Z m1 + Z m 2
0 0
1600 0.082e-j80.88 0.088e-j75.49
Z m2 ⋅ M m1 + Z s ⋅ (M s + M m1 + M m2) 1400 0 0
J e = I KV ⋅ 0.103e-j79.35 0.109e-j75.71
Z s2 − 2 ⋅ Z m
2
1 + Z s ⋅ Z m2 0 0
1200 0.139e-j77.16 0.148e-j74.27
0 0
(M s + 2 ⋅ M m1 + M m2) 1000 0.191e-j74.22 0.198e-j74.77
− I KV ⋅ Z m1 ⋅ (20)
Z 2s − 2 ⋅ Z 2m1 + Z s ⋅ Z m2

120
- both thorough grounding with grounding resistance
RT1=4.42 Ω and RT2=3.74 Ω,
- the cables tunnel grounding resistance Rkt=6.81 Ω
- the first sections of two cables (their equivalent
impedances)
The values of the groundings are obtained by computer
Fig. 3. Configuration plane
simulation in Matlab. At the places where the phases of the
cables are transposed (nodes 3,4,5,6), groundings are
III. CALCULATION OF SHORT-CIRCUIT VOLTAGE simulated with which the surge arresters are grounded and
CONDITIONS IN SUBSTATION CENTRAL which are predicted to be at R=5 Ω.
The third sections of the two cables are connected to the
Central substation is connected to the South New grounding of the South New substation and the grounding of
substation by two 110 kV cables. The appearance of the the substation which is Z2 = 0.18 Ω. It should be emphasized
circuit is presented in Fig. 4, and in Fig. 5 it’s equivalent that the EVN services have obtained the data for Z1=0.25 Ω
scheme, taking into account the transposition of the phases. and Z2=0.18Ω which are the average values of the
measurements at several locations at these substations. At the
same time, they do not represent grounding resistance of
grounding conductors at substations, but input impedances
that take into account the input impedances of all MV cables
connected to the corresponding substations.
Fig. 5 shows that the network between the Central
substation (node 1) and the South New substation (node 2)is
composed of 6 nodes. After two additional nodes introduces
the transposition of cables to 1/3 of their lengths 2.7 km or
4.11 km respectively, 0.9 km or 1.37 km.It is a non-radial
network, so since the input impedance of the system at node 1
Fig. 4. View of the circuit between Central and South New
substation during a short circuit in Central substation substation Central cannot be calculated by simply summing
the admittances as in other cases in practice. The system can
be solved using the method of independent voltages
3 4
(potentials in the nodes). For this purpose, the matrix of
Zek v1 Zek v1 Zekv1 admits Y with dimensions 6x6 is formed first. Matlab
R R
calculates the impedance matrix Z = Y-1, and then calculates
1
ТС
Централна
the voltage vector in all 6 nodes of the network with the
2 ТС Југ Нова
relation (22)
Ik v − Iem Z1 RT 1 RT 2 Rmz Rk t
Z2 Iem U = Z ⋅I . (22)
5 6
From the power plant operator MEPSO, data were obtained
Zekv2
Zekv2 Zek v2
for three-way and single-circuit short-circuit currents of 110
R R
kV busbars in substation 110/35/10 (20) kV "Central".

TABLE III
Fig. 5. Equivalent circuit scheme between Centraland South New
substation during short circuit in Central substation

According to [4], first the currents that are injected into the
Fig. 6. Appearance of grounding of the Central substation grounding systems of the Central substation and South New
substation are calculated, and then the voltages of the
At 110 kV substation Central are tied, [4], Fig. 6: respective groundings, according to the relation (22).

- the old grounding of the building with an entrance


impedance Z1=0.25 Ω,
- the new mesh grounding with grounding resistance
Rmz=4.508 Ω,

121
1)
Triangle configuration, cross section 2000 mm2 U CN   247.05 e− j 66.2 
   j 4.45 
 5.309− j2.986

0 + j0 − 0.269+ j1.802 0 + j0 − 0.178+ j1.184 0 + j0 
U JN   2705.45 e 
− 0.178+ j1.184
 0 + j0 6.002− j2.986 0 + j0 − 0.269+ j1.802 0 + j0
 U 3   959.56 e− j12.28 
− 0.269+ j1.802  
Y =
0 + j0 0.737− j3.603 − 0.269+ j1.802 0 + j0 0 + j0

U = = − j 2.96
 0 + j0 − 0.269+ j1.802 − 0.269+ j1.802 0.737− j3.603 0 + j0 0 + j0   U 4  1798.14 e 
− 0.178+ j1.184

0 + j0 0 + j0 0 + j0 0.555− j2.386 − 0.178+ j1.184

 U   945.14 e − j16.29 
 0 + j0 − 0.178+ j1.184 0 + j0 0 + j0 − 0.178+ j1.184 0.555− j2.386   5
  
 U 6  1772.27 e − j 5.54 
0.180 + j 0.034 0.010 − j 0.028 0.121+ j 0.002 0.064 − j 0.016 0.118 − j 0.002 0.061− j0.020
0.010 − j 0.028 0.160 + j 0.026 0.057 − j0.018 0.108 − j0.004 0.055 − j 0.021 0.105 − j 0.006 4)

0.121+ j 0.002 0.057 − j0.018 0.181+ j 0.336 0.126 + j 0.111 0.093 − j 0.018 0.072 − j 0.023
Configuration plane, cross section 1600 mm2
Z= 
0.064 − j 0.016 0.108 − j 0.001 0.126 + j 0.151 0.174 + j0.342 0.072 − j0.023 0.087 − j 0.019  5.409− j3.098 0 + j0 − 0.332+ j1.871 0 + j0 − 0.214+ j1.227 0 + j0 
0.118 − j 0.002 0.055 − j 0.021 0.093 − j0.018 0.072 − j0.023 0.236 + 0.492 0.160 + j 0.219  
   0 + j0 6.102− j3.098 0 + j0 − 0.332+ j1.871 0 + j0 − 0.214+ j1.227
0.061 − j 0.020 0.105 − j 0.006 0.072 − j0.023 0.087 − j0.019 0.160 + j 0.219 0.230 + j0.491 − 0.332+ j1.871 0 + j0 0.865− j3.743 − 0.332+ j1.871 0 + j0 0 + j0 
Y = 
 0 + j0 − 0.332+ j1.871 − 0.332+ j1.871 0.865− j.3.743 0 + j0 0 + j0 
U CN   294.6 e − j 65  − 0.214+ j1.227 0 + j0 0 + j0 0 + j0 0.628− j2.454 − 0.214+ j1.227
   j 5.66 
 
U JN   2708.7 e
 0 + j0 − 0.214+ j1.227 0 + j0 0 + j0 −0.214+ j1.227 0.628− j2.454

 U 3   969 e − j13.01  0.178 + j0.034 0.011− j 0.028 0.120 + j0.003 0.064 − j0.016 0.118 − j0.003 0.062 − j0.020
U = = − j 2.32
  0.011− 0.028
j 0.159 + j 0.026 0.058 − j 0.018 0.100 − j0.001 0.056 − j 0.021 0.105 − j0.006
 U 4  1803.2 e  
0.120 + j0.003 0.058 − j0.018 0.185 + j 0.319 0.127 + j 0.143 0.094 − j0.017 0.073 − j0.023
 U   937.9 e − j16.83  Z = 
0.064 − j0.016 0.107 − j0.001 0.127 + j0.143 0.178 + j 0.318 0.073 − j 0.023 0.087 − j 0.019
 5
   0.118 − j 0.003 0.056 − j0.021 0.094 − j0.017 0.073 − j0.023 0.244 + j0.474 0.164 + j 0.210
 U 6  1756.2 e − j 4.62   
0.062 − j0.020 0.105 − j0.006 0.073 − j 0.023 0.087 − j 0.019 0.164 + j0.210 0.238 + j0.473

2)
Configuration plane, cross section 2000 mm2
 5.351− j3.12 0 + j0 − 0.295+ j1.884 0 + j0 − 0.194+ j1.235 0 + j0  U CN   262.1e − j 53.03 
     j 4.48 
U JN   2670.6 e
0 + j0 6.044− j3.12 0 + j0 − 0.295+ j1.884 0 + j0 − 0.194+ j1.235

− 0.295+ j1.184 0 + j0 0.789− j3.759 − 0.295+ j1.884 0 + j0 0 + j0 

Y =   U 3   972.5 e − j11.57 
 0 + j0 − 0.295+ j1.884 − 0.295+ j1.884 0.789− j3.769 0 + j0 0 + j0  U = = − j 2.73

− 0.194+ j1.235

0 + j0 0 + j0 0 + j0 0.588− j2.471 − 0.194+ j1.235
  U 4   1878 e 
 0 + j0 − 0.194+ j1.235 0 + j0 0 + j0 − 0.194+ j1.235 0.588− j2.471  U   958.4 e − j15.36 
0.178+ j0.034 0.111− j0.029 0.121+ j0.003 0.064− j0.016 0.119− j0.002 0.062− j0.020  5
  
0.011− j0.029
 0.159 + j0.027 0.058− j0.018 0.107 − j0.001 0.056 − j0.021 0.106 − j0.006  U 6  1763.7 e− j 5.18
0.120 + j0.003 0.058 − j0.018 0.178+ j0.321 0.124 + j0.144 0.094 − j0.017 0.073− j0.023
Z= 
0.064 + j0.016 0.107 − j0.001 0.124 + j0.144 0.171+ j0.319 0.073− j0.023 0.088 − j0.019
0.119 − j0.002

0.056 − j0.021 0.094 − j0.017 0.073− j0.023 0.236 + j0.475 0.161+ j0.212
 IV. CONCLUSION
0.062 − j0.020 0.106 − j0.006 0.073− j0.023 0.088 − j0.019 0.161+ j0.212 0.230 + j0.474

1. The reduction factor of a bundle of three single-core


U CN   299.2 e − j 59.49  cables placed in a triangle is smaller than that in a plane
U   j 5.4  from 3.7% to 12% due to the obvious symmetry.
 JN   2680.5 e 
 U 3   976.5 e − j12.54  2. On the one hand, smaller reduction factors contribute to
U = = − j 2.28
 reducing the voltage in the Central substation and thus
 U 4  1793.7 e 
relieving its grounding, but on the other hand they
 U   962.8 e− j16.4 
 5   contribute to increasing the transferred potential in the
 U 6   1768 e − j 4.77  South New substation and increasing the risks of
excessive touch and step voltages in and around the South
3)
Triangle configuration, cross section 1600 mm2 New substation.
 5.355− j2.971 0 + j0 − 0.297+ j1.792 0 + j0 − 0.195+ j1.178 0 + j0  3. When choosing a HV cable, it is necessary to choose the
 
 0 + j0 6.048− j2.97 0 + j0 − 0.297+ j1.792 0 + j0 − 0.195+ j1.178 optimal configuration in terms of meeting the criteria for
− 0.297+ j1.792 0 + j0 0.794− j3.585 − 0.297+ j1.792 0 + j0 0 + j0  safety in and around both substations.
Y = 
 0 + j0 − 0.297+ j1.792 − 0.297+ j1.792 0.794− j3.585 0 + j0 0 + j0 
− 0.195+ j1.178 0 + j0 0 + j0 0 + j0 0.59− j2.356 − 0.195+ j1.178
 
 0 + j0 − 0.195+ j1.178 0 + j0 0 + j0 − 0.195+ j1.178 0.59− j2.356 
REFERENCES
0.179 + j0.033 0.010 − j0.028 0.121 + j0.002 0.064 − j0.016 0.119 − j0.003 0.062 − j0.020
 
0.010 − j 0.028 0.160 + j0.026 0.057 − j0.018 0.107 − j0.002 0.055 − j0.021 0.105 − j 0.006 [1] HD637 S1: Power Instalations Exceeding 1 kV AC, 1999.
0.121 + j0.002 0.057 − j0.018 0.186 + j0.334 0.129 + j0.150 0.094 − j0.018 0.073 − j0.024
Z =  [2] J. Nahman, "Neutral Grounding in Power Distribution
0.064 − j0.016 0.107 − j 0.002 0.129 + j0.150 0.179 + j0.333 0.073 − j0.024 0.087 − j0.020
0.119 − j0.003 0.055 − j 0.021 0.094 − j0.018 0.073 − j0.024 0.249 + j0.494 0.168 + j0.220
Networks", Naucna kniga, Belgrade, 1980 (in Serbian).
  [3] J. Nahman, V. Mijailović, "High Voltage Power Stations",
0.062 − j0.020 0.105 − j0.006 0.073 − j0.024 0.087 − j0.020 0.168 + j0.220 0.243 + j0.493
Academic Mind, Belgrade, 2005 (in Serbian).
[4] New substation 110/35/10 (20) kV Central, book 5, grounding,
Basic project, TIMEL, Nikolce Acevski, 2019.
[5] R. Ackovski, M. Todorovski, Groundings and Grounding
Systems in Power Networks, Skopje, 2017.

122
Evaluation of Reliability of Power Substations
Considering the Uncertainty of the Distributed Generation
Atanas Iliev1, Dimitar Dimitrov2 and Natasha Dimishkovska3
Abstract – This paper presents an upgrade of an existing fuzzy parameters of a certain single line diagram of power
logic method for evaluation of the reliability of power substations substation [3]. However, it is more appropriate to assume that
with implemented distributed generation, considering the unavailability of the components and the uncertainty
uncertainty and imprecision of the input data. The method is belong to a certain range, rather than assuming that they have
presented on a 110/35 kV/kV substation and gives satisfactory
results from an engineering point of view and provides a high
fixed value [1]. Additionally, the dependency on weather
level of precision and model simplicity. conditions makes the stand-alone DERs systems quite
unreliable, and their implementation to the utility grid, has a
Keywords – Reliability, Power substation, Fuzzy logic, major impact on the frequency and power balancing.
Uncertain data, Distributed generation. Therefore, in this paper, the fuzzy logic theory is used for
estimation of the reliability of single line diagrams of power
substations with implemented DERs. This method, compared
I. INTRODUCTION to the conventional methods, offers wider range of scenario
analysis that can cause failure of the power substation. The
As the fossil fuels are approaching their expiration date, main characteristic is that the values of the unavailability of
introducing the Renewable Energy Sources (RES) to the the substation, the duration of energy not supplied, as well as
power system has been proven to be an acceptable alternative the energy not supplied due to component failure in the
solution. Using the RES for local power production can substation are also fuzzy numbers, defined with proper
benefit the environment, the community and one county’s membership function.
economy.
However, there are many technical challenges the
Distributed Energy Sources (DERs) are facing. The most II. MAIN CONCEPTS OF THE FUZZY LOGIC
important is providing an uninterrupted power supply to the THEORY
customers. Considering that the distributive networks are
more exposed to outages, the implementation of DERs may Fuzzy set theory and the fuzzy logic represent branches of
have a huge impact on their reliability [1]. Therefore, the the science and computer engineering, which belong to the
reliability of the power substation where the DERs are artificial intelligence field. Unlike the conventional Boolean
connected has to be properly evaluated in the designing logic, where each element belongs to the given set or not, in
process. Power substations are power facilities that are part of the fuzzy set theory, each element has its membership degree.
the power system and their main function is to distribute the The membership degree varies between 0 (the element does
electrical energy and/or transform it to certain voltage levels not belong to the set) and 1 (the element completely belong to
[2]. Power substations are supposed to perform reliably in a the set). Therefore, fuzzy logic is also known as multi-value
way that provides quality electrical energy supply, with lowest logic and represents an expansion of the classical bi-value
exploitation costs. Boolean logic [4].
The estimation of the reliability parameters of the The fuzzy set A in the universe of discourse U defines as
components in the power substations contains high level of set of ordered pairs:
insecurity and uncertainty, which are still given statistical
character. The statistical analysis starts with calculation of the = ( , ( ))| ∈ (1)
mean value of the reliability parameters of the components where, ( ) represents the membership function of the fuzzy
and further this data are used for estimation of the reliability set A. The membership function defines the degree of
membership of the variable x to the fuzzy set A.
It is obvious that the fuzzy set definition is an expansion of
the classical set theory. Respectively, if the range of the
1Atanas Iliev is with Faculty of Electrical Engineering and
membership function expands, the uncertainty and the
Information Technologies, Rugjer Boshkovikj 18, Skopje 1000, indeterminacy increase. Otherwise, if the range of the
North Macedonia,E-mail: ailiev@feit.ukim.edu.mk membership function reduces, the uncertainty and the
2Dimitar Dimitrov is with Faculty of Electrical Engineering and
indeterminacy decrease, and the fuzzy set turns into
Information Technologies, Rugjer Boshkovikj 18, Skopje 1000,
conventional set.
North Macedonia, E-mail: ddimitar@feit.ukim.edu.mk
3Natasha Dimishkovska is with Faculty of Electrical Engineering The design of the fuzzy sets depends on two factors:
and Information Technologies, Rugjer Boshkovikj 18, Skopje 1000, identifying the state space and the corresponding membership
North Macedonia, E-mail: dimishkovskan@feit.ukim.edu.mk function. The specification of the membership function is

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 123


subjective, which means that there is diversity of solution to ( )
one problem, since different expert take different approach.
The reason behind that are the individual differences of
human perspective to the world and abstract concepts.
If a real number contains certain level of uncertainty and
unreliability, or the analysed variable’s value can be estimated
in a certain range [ ; ], it is more suitable to model an −
interval number, with membership function defined as:
1 ≤ ≤
~( )= (2)
0 < ⋀ >
0
Fuzzy numbers are fuzzy subset that is normal and convex. 1 1 2 2 3
Fuzzy numbers are expansion of the ordinary real numbers Fig. 1. Triangular fuzzy number
∈ ℜ and interval numbers. They are used for modeling
unreliable data and information with convex membership
function defined with values in the range [0,1] (for instance, III. THE PROPOSED APPROACH
the value is approximately a). In Fig. 1, a fuzzy number A and
its alpha-cuts and ′ are shown, defined with proper interval The DERs depend highly on the weather conditions, and
number. Membership functions construction depends on two because of that, their power generation varies at any analysed
factors: moment. Therefore, analysing the total power generation can
- Identification of state variables and state space, and; be a problem if the analysis is limited to a certain power
- Determining the proper function of belonging, which capacity. Using fuzzy numbers can expend the analysis to a
is subjective, meaning that there are many different defined range of possible power generation, and using a
solutions of one problem triangular fuzzy numbers and membership functions for
reliability evaluation of power substations provides simpler
A. Uncertainty Modelling energy loss analysis [5].
DERs penetration into the power system can cause
Uncertainty defines as a feature of the real systems, caused destabilisation of the frequency, damages to the installed
by unpredicted events, which affects their reliability of proper equipment and decrease of reliability of supply. In this paper,
working. Uncertainty can be caused by many reasons, mostly the fuzzy numbers are used for estimation of reliability of
regarding the lack of information and knowledge to run the distributive substations with implemented DER.
systems [3]. Fuzzy logic describes uncertainty with In [6] a method for reliability estimation of based on fuzzy
probability of happening with numbers between 0 and 1. logic substations is presented. The paper justifies the usage of
Additionally, fuzzy logic provides analysis of uncertain events fuzzy logic for reliability estimation of power systems.
even if the probability is in a certain interval. Additionally, in [7] a fuzzy logic method is used for optimal
If the value of a variable is in a certain range, for instance distributed generation allocation in radial distribution system.
[ ; ], the membership function of the variable is defined In this paper the fuzzy logic method is applied for reliability
as: estimation of more complex substations with DERs
connected.
1 ≤ ≤ Assuming that the weather conditions of a certain location
( )= (3)
0 < ∧ > are known, the power production of the DER can be easily
That represents a fuzzy triangular number. Generally the calculated according the expressions for power production for
fuzzy triangular numbers are represented with two end points different RES. The reliability of supply of the whole
and , and a peak point . If there is an - cut, then the substation can be calculated using the expressions for serial
fuzzy interval is presented as in Eq. (5). Fuzzy numbers can and parallel connections of the components.
be treated as regular fuzzy numbers, regarding the If K denotes the number of components connected in a
mathematical operations applied. series, and if ( , ( )) describes the unavailability, then
the equivalent unavailability of a serial union of components
=[ ; ; ] (4) for a given - cut defines as [3]:
( ) ( ) ( )
=[ ; ; ] (5) ( )
=∑
( )
−∑
( )
∙∑
( )
+⋯≅
( )
Graphical representation of fuzzy triangular numbers is ∑ (6)
shown in Fig. 1.
The unavailability can be represented as triangular fuzzy
number = [ ; ; ] as well. In that case, the
equivalent unavailability will also be a fuzzy triangular
number Fig. 2.

=[ ; ; ] = [∑ ;∑ ;∑ ]. (7)

124
TABLE I
1 2
⋯ COMPONENTS’ UNAVAILABILITY RATES
Component Voltage Unavailability
Fig. 2. Serial connection of the components (kV)
Circuit breaker 110 [2.85; 3.00; 3.10] ∙ 10
1 Disconnector 110 [3.01; 3.05; 3.25] ∙ 10
Bus_HV 110 [5.18; 5.53; 5.75] ∙ 10
2
Circuit breaker 35 [4.21; 4.60; 4.90] ∙ 10
Disconnector 35 [3.06; 3.20; 3.33] ∙ 10
⋮ Bus_MV 35 [4.80; 4.97; 5.3] ∙ 10
Power transformer 110/35 [4.50; 4.67; 4.75] ∙ 10
DER 110 [3.58; 3.70; 3.85] ∙ 10
Fig. 3. Parallel connection of the components

3
7
1 2 A B
4 6

8
5

Fig. 4. Combination of the serial and parallel connection of the C


components 110 kV

If the components are connected in parallel, as shown in


Fig. 3, then the equivalent unavailability of the system is
defined in the following manner:
( ) ( )
=∏ . (8)
And when the unavailability of the components is given as D E F
a fuzzy set interval, then the equivalent unavailability is not a
50 MW
fuzzy number, but a fuzzy polynomial. 50 MW 50 MW

( ) ( ) ( )
= , =
= [∏ [ +( − ) ]; ∏ [ +( − ) ]]. (9)
Usually the components in the system are connected both in
series and in parallel connection (Fig. 4). Then, the equivalent G
unavailability of the systems is calculated with the 35 kV
combination of Eqs. (6)-(9).

Fig. 5. Single line diagram of 110/35 kV/kV substation


IV. TEST EXAMPLE
Since the DERs power production varies and it is time-
The test example analyses a 110/35 kV power substation dependant, the reliability of distributed generator cannot be
with 50 MW DER connected to the 110 kV bus. The DER represented with a single value [8]. The unavailability rate of
may represent a big RES power plant (wind farm, solar power the DER, which is considered to be a RES, includes the
plant) or a smaller power plant with diesel generator or a metrological data for the analysed location, as well as the
batteryas a back-up. The single line diagram of the test probability of failure of the generator. The fuzzy
example is given in Fig. 5. The unavailability rates of the representation of DER’s power production is shown in Fig. 6.
components are given in Table I. The probability of one branch failure is calculated by using
It is assumed that the DER can satisfy half of the load, and the expression (7). For more accurate and easier calculation,
that it can provide power in case of power lines’ outage.If one the substation is divided into parts. Each part represents a
of the transformer branches is in outage, the load will be branch with the appropriate switching equipment.
satisfied from the distributed generator connected to the 110 The probabilities of failure of each part of the substation,
kV bus. But, if both of the transformer branches are in outage, computed using the expressions (2)-(4), are given in Table .
or there is a fault on the 35 kV bus, then the power supply will
be interrupted.

125
Membership The results indicate a slight increase in reliability with
function DERs implementation, even without storage system.

V. CONCLUSION
The power system needs to maintain flexibility in order to
be able to respond quickly to the shifts in power load and
power supply. That is especially important when there are
DERs incorporated in the distributive networks.
Although DERs improve reliability of power supply of the
standard power systems, their dependency on the weather
a1 a2 a3 conditions may have an impact on the frequency stability.
Time
Fig. 6. Fuzzy triangular number representation of DER’s power Therefore, it is important to estimate the probability of failure
generation of the equipment installed in the power substations in the
design process.
TABLE II This paper shows that the fuzzy logic method can be used
UNAVAILABILITY OF SUBSTATION’S DIFFERENT PARTS for reliability estimation of power substations with DERs
implemented.
Part Unavilability
A [3,15; 3,31; 3,43] ∙ 10
B [3,15; 3,31; 3,43] ∙ 10 REFERENCES
C [2,04; 2,12; 2,21] ∙ 10
[1] M. B. Ndawula, S. Z. Djokic, and I. Hernando-Gil, ”Reliability
D [5,21; 5,38; 5,55] ∙ 10 Enhancement in Power Networks under Uncertainty from
E [5,21; 5,38; 5,55] ∙ 10 Distributed Energy Resources”, Energies, 2019.
F [3,61; 3,73; 3,88] ∙ 10 [2] Working Group A3.06. Final Report of the 2004-2007
G [1,09; 1,14; 1,20] ∙ 10 International Enquiry on Reliability of High Voltage Equipment.
CIGRE, 2012.
[3] J. Nahman, Fuzzy Logic Based Network Reliability Evaluation,
The probability of failure of the whole substation is Belgrade, Republic of Yugoslavia, Faculty of Electrical
calculated using Eqs. (6)-(9). The unavailability of the whole Engineering, 1997.
substations is: [4] H.-J. Zimmermann, Fuzzy Set Theory-and its Applications,
Fourth Edition, New York: Springer, Science+Business Media,
= [3,13; 3,26; 3,40] ∙ 10 (10) 2001.
[5] Y. Zhang, J. Wang, and Z. Li, Uncertainty Modeling of
The results indicate a highly reliable system, with a low Distributed Energy Resources: Techniques and Challenges,
probability of failure. The Energy Not Supplied (ENS) due to Springer, 2019.
substation failure with DERs implemented is a product of the [6] A. Iliev, M. Zlatanoski, “Reliability Evaluation of Electric
probability of failure of the substation and the energy Substations Considering Uncertainty of the Input Data”,
supplied. Conference Proceedings of the Fourth MakoCigre Conference,
Paper No. B3-01, Ohrid, 26-29 September, 2004.
= ∙ 100 ∙ 8760 = [7] A. Metia, S. Ghosh, “Fuzzy Based DG Allocation for Loss
Minimization in a Radial Distribution System”, Balkan Journal of
= [27,42; 28,56; 29,80]MWh (11)
Electrical &Compoter Engineering, pp. 115-123, 2015.
The unavailability of the whole substations without DER [8] B. M. Radhakrishnan, D. Srinivasan, and R. Mehta, “Fuzzy-
included, and the ENS in that case are: Based Multi-Agent System for Distributed Energy Management
in Smart Grid”, International Journal of Uncertainty, Fuzziness
= [3,16; 3,29; 3,43] ∙ 10 (12) and Knowledge-Based Systems, pp. 781-803, 2016.

= [27,66; 28,81; 30,07]MWh (13)

126
Reduction of Energy and Power Losses in Distribution
Network Using Energy Storage Systems
Nikola Krstić
Abstract – Energy storage systems (ESS) are most often used policies of charge/discharge process of ESS will be observed.
as a backup, or additional power supply in times of power Metaheuristic optimization methods of PSO and GA [8] will
shortage, but today, in addition, their role in regulating power be used to find optimal location and operating power of ESS.
flows is becoming more frequent. Therefore, this paper discusses Steady state will be determined by backward/forward sweep
the possibility of reducing energy and power losses and
method [9] for the calculation of power flows in radial
improving the efficiency of the distribution network using ESS.
Optimal charge and discharge power of ESS, as well as their distribution networks. Load in the network will be of the
location in the distribution network will be determined by constant power type, because that is the most critical type of
metaheuristic optimization methods of particle swarm load in terms of maintaining an acceptable voltage profile in
optimization (PSO) and genetic algorithm (GA). Standard the event of change in power flows in the network.Special
IEEE18 distribution network was used as a test network, and the contribution of this paper can be seen in measuring the impact
obtained results of computer simulations done in Matlab of efficiency of charge/discharge process, state of charge
software package, presented at the end of the paper, were used policies of ESS and the shape of load diagram onthe losses in
for verification. distribution network. To measure how many losses can be
Keywords – Energy storage system, Particle swarm
theoreticaly reduced using ESS, this paper does not consider
optimization, Genetic algorithm, Distribution network losses. the cost of instalation and size of ESS in finding the optimal
solution, as can most often be seen in literature. Also,
proposed methodology is simple and determines the locations
I. INTRODUCTION and operating powers of ESS in the same step, in relation to
the two-step procedure most often used.
One of the bigest problems of power system and
distribution network within, is the univen load diagram.
II. OPTIMIZATION PROBLEM DEFINITION
Adequate regulation of power consumption can be used to
align the load diagram, which results in the release of part of
Optimal location and power of charge and discharge of
network capacity and the reduction of network losses.
ESS, is nonlinear optimization problem with constraints.
Regulation of power consumption and thus the active power
Control variables in this optimization problem are the
flow in the distribution network can be done, among other
locationsof ESS in the network (network node) and their
things, by using ESS, that, depending on the mode of
powers during operation. Constraints of the control variables
operation, can be viewed as generators or as consumers.
are given by Eqs. (1) and (2):
General idea in this paper is to charge ESS in time of low
consumption, when it will act as a consumer, and to do their
< < , (1)
discharge in time of high consumption, when it will act as a
distributed generator. This would somewhat equalize the
where are: - power of ESS, - maximum charging
power across the network branches over time and relieve
power of ESS, - maximum discharging power of ESS.
certain branches, that would to some extent reduce losses. In
order for this to be possible, it is very important to determine
the optimal location of ESS [1-3] and its power over time, ∈ , ,... , (2)
whichwill be the primary goal of this paper. Level to which
power and energy losses in distributed network can be where are: - network node index in which ESS is placed,
reduced byconnectiong ESSwill largely depend on the , ,... - set of network node indexes in which
efficiency and type of policy of charge/discharge process, placement of ESS is possible.
maximum power of the ESS, as well as its total energy In this optimization problem, dependent variables are node
capacity [4-7]. Also, in this case, the shape of load diagram voltages, currents in network branches and the state of charge
plays a crucial role in the reduction of losses in distribution of ESS. Constraints of these variables are given by Eqs. (3),
network. In particular, the paper will consider two types of (4) and (5):
load diagrams, connection of one, twoandthree ESS, < < , (3)
wherefour different efficiency levels and four different
is the network node voltage,

N. Krstić is with the Department of Power Engineering, Faculty of < , (4)


Electronic Engineering, University of Niš, Aleksandra Medvedeva
is the network branch current,
14, 18000 Niš, Serbia, E-mail: nikola.krstic@elfak.ni.ac.rs

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 127


< < , (5) Based on Eq. (12), it can be concluded that if load diagrams
are with the same mean power (same energy consumption),
where SOC represents the state of charge of ESS.
the one with less variance and smaller differences in load
In this paper, load and ESS powers are constant in one-hour
power (flatter load diagram) will have lower energy losses.
time period (ΔT), based on what, state of charge of ESS at the
These theoretical considerations can be illustrated by a
endof i-th hour in a day is determined by Eq. (7) in the case of
simple example of a uniformly loaded power line which
charging, and by Eq. (8) in the case of discharging:
power changes in time.In this case, the power distributions
= , (6) along the power line during the maximum and minimum load
in the case of connection of ESS and without it, are given in
= + ⋅ ⋅ , (7) Figs. 1 and 2, respectively.

= + ⋅ ⋅ , (8)

where are: - state of charge of ESS at a begining,


- state of charge of ESS at the end of the i-th hour,
- power of ESS, - total energy capacity of ESS,
- efficiency of the charge/discharge process.
Based on Eqs. (7) and (8) it is clear that the charging power
of ESS is greater, and the discharging power is less than zero.
In addition to the constraints in the form of inequality, there
are also constraints in the form of equality, which applay to Fig. 1. Power distribution during the maximum load
power balance equations and determine the steady state. These
constraints can be expressed as:

= + , (9)

where are: - generated active power (comes from network,


or ESS that work in generation mode), - active power
consumed (used by allloads, counting ESS in charging mode),
- losses of active power.
= + , (10) Fig. 2. Power distribution during the minimum load
where are: - generated reactive power, - reactive power
consumed by loads, - losses of reactive power. In this Assuming that the maximum load is twice the minimum,
paper, connected ESS are presented as constant power loads, with the same duration times, and charging and discharging
whose power can be negative (generator mode) or positive processes are without losses, equalizing the first derivative of
(consumer mode). energy losses over location and power of ESS to zero, the
Two-parameter criterion function given by Eq. (11), that optimal location and power of ESS are obtained:
takes into account not only thetotal losses of energy, in a
certain period of time, but also the amount of maximum = , (13)
power losses in the network branches, will be used.
= . (14)
= ⋅ + ⋅∑ , (11)
Locating and using ESS acording tothe optimal values from
where are: - criterion function that needs to be minimized,
Eqs. (13) and (14), energy losses can be reduced by 8.89%, in
- energy losses in the distribution network, -
relation to the case without ESS.
maximum power losses in the i-th network branch, , -
weight coefficients.
IV. SIMULATION RESULTS AND DISCUSSION
III. THEORETICAL BASIS OF THE PROPOSED In order to check the efficiency and verification of the
SOLUTION mentioned optimization methods in finding the optimal
solution for the problem of reducing the losses in distribution
Based on characteristic parameters of the load diagram, network using ESS, computer simulations were performed in
energy losses can be calculated from Eq. (12) [10]: the Matlab software package.
= ⋅( + )⋅ , (12) Standard IEEE18 distribution network shown in Fig. 3, was
used asa test network. Paper considers two types of load
where are: - total time duration of power losses, - diagrams, both with the same average load power
average load power, - variance of load power, - (Pm=2679 kW), but with different load factors (m1 =0.788,
proportionality coefficient between the power losses and the m2=0.669), that are shown on the Figs. 4 and 5, respectively.
square of load power.

128
individuals were allowed to cross, with the probability linearly
decreasing from the first to the fourth. To obtained the
location of ESS, arithmetic crossing was used, while their
powers were inherited from one parent for the first half of the
day, and from the other for the second half. Mutation is
implemented, so that, with a probability of 10% it allows a
random change in a certain range for both the power and
location of ESS.
Values forweight coefficients of energy and power losses
Fig. 3. IEEE18 distribution network are determined in a way thatenergy losses have twice the
priority of the sum of maximum power losses in the network
( =0.05 $/kWh, =0.3 $/kW).
Table I contains the results related to the operation of the
distribution network without ESS.These results include, the
total energy losses during the day, sum ofmaximum power
losses in the network branches and the value of the criterion
function (cost function) for both load diagrams.

TABLE I
REPRESENTATIVESIZES OF NETWORK OPERATION WITHOUT ESS
Diagram 1 2
Wloss(kWh) 3520.797 3983.784
ΣPlossmax(kW) 238.648 350.007
Fig. 4. First load diagram a1⋅Wloss ($) 176.04 199.19
a2⋅ΣPlosmax($) 71.59 105.00
Criterion function ($) 247.63 304.19

Connection of one, two and three ESS is considered and


implemented, butit tourned out that for this test network the
best results are obtained in the case of two connected ESS,
and they will be shown.
Figs. 6 and 7 show the total power of connected ESS and
their average state of charge during the day, for the first and
second load diagram, respectively. In this case, the state of
charge at the beginning and end of the day is the same, with
the efficiency of the charge/discharge process of η=0.95.
Fig. 5. Second load diagram

Time dependence of active and reactive load power of each


node is the same, and follows the time dependence of the
consumption given on the load diagram.
Maximum charge/discharge power and total energy
capacity of ESS are selected in such a way that they do not
represent a limiting factor for achieving the optimal solution
in any of the observed cases.
As mentioned, paper will consider four different values
forthe efficiency of charge/discharge process of ESS, that
are: = 0.7, = 0.8, = 0.95 and = 1.
Four different policies related to the state of charge, will Fig. 6. Power and state of charge of ESS (first load diagram)
also be consider. According to the first, state of charge of ESS In Figs. 6 and 7 it can be seen that power of ESS in a large
remains the same at the end as it was at the beginning of the extent followed the patern in which it was positive (charging
day, in the second it decreases by 0.1, in third by 0.2 (ESS mode of ESS) when load was below average and negative
discharges), while in the fourth it increases by 0.1 (ESS when load was above average (discharging mode of ESS).This
charges). Total energy capacity of all connected ESS in every applies to both optimization methods, but in the case of GA it
case is 7000 kWh. is more pronounced, which can be seen in somewhat greater
Values of acceleration coefficients in PSO, are both equal operating powers of ESS and higher oscillations in the state of
to 0.8, while the coefficient of inertia decreases linearly drom charge of ESS compared to the those in the case of PSO.
1 to 0.25 depending on the ordinal number of the iteration.
Selection in GA was implemented so that only the best four

129
successfully solved. Based on the obtained results, it can be
concluded that GA proved to be more successful in finding a
solution to a given optimization problem than PSO. This
applies to both energy losses and maximum power losses
reduction. Better results were achieved in the case of
connection of more than one ESS and with more uneven load
diagram. Although applied on the passive distribution
network, methodology used is universal and can be also
applied in the presence of distributed generation, if their
generation powers like load powers are known in advance.
Disadvantage of used methodology in high dependency of its
efficiency on the accuracy of the forecast of injected powers,
Fig. 7. Power and state of chargeof ESS (second load diagram) could be greatly overcome by an additional degree of control
Table II shows the values of representative sizes of criterion that would generate adequate management actions of ESS in
function and the locations of ESS, for the case of two case of deviations of actual and forecasted values, which
connected ESS, obtained using both optimization methods. could be a topis for further research.

TABLE II REFERENCES
REPRESENTATIVE SIZES OF NETWORK OPERATION WITH TWO ESS
[1] R. Jin, J. Song, J. Liu, W. Li, and C. Lu, “Location and
diagram 1 2
Capacity Optimization of Distributed Energy Storage Systems
Optim. method PSO GA PSO GA in Peak-Shaving”, Energies, January 2020, vol. 13, no. 3, 513
Locations 1, 6 1, 5 6,21 6, 23 DOI: 10.3390/en13030513
Wloss(kWh) 3498.1 3476.3 3818.5 3713.2 [2] H. Zhu, F. Tian, Y. Li, K. Deng, Y. Feng, and X. Tang,
ΣPlossmax(kW) 217.32 195.09 290.74 226.25 “Distributed Energy Storage Optimization Location Method
a1⋅Wloss ($) 174.90 173.81 190.92 185.66 Based on Improved Voltage Distribution”, ICAESEE, 2019,
IOP Conf. Series: Earth and Environmental Science, vol. 446
a2⋅ΣPlosmax($) 65.20 58.53 87.22 67.87
042072, 2020.
Crit. function($) 240.10 232.34 278.14 253.53 [3] C. Kanti Das, O. Bass, G. Kothapalli, T. Mahmoud, and D.
Habibi, “Optimal Placement of Distributed Energy Storage
Although they are not shown in table, the results indicate a Systems in Distribution Networks Using Artificial Bee Colony
large dependence of energy losses and maximum power losses Algorithm”, Applied Energy, October 2018.
reduction on the efficiency of the charge/discharge process od [4] T. Mahmoud, C. K. Das, “An Optimal Allocation and Sizing
ESS. Value of the criterion function (cost) goes from $244.89 Strategy of Distributed Energy Storage Systems to Improve
to $221.77, for the first, and from $274.15 to $244.41, for the Performance of Distribution Networks”, Journal of Energy
second load diagram when the efficiency changes from 0.7 to Storage, vol. 26, December 2019, DOI:
10.1016/j.est.2019.100847
1.This goes to the point, that for efficiency below 0.8 it is no
[5] M. Nick, M. Hohmann, R. Cherkaoui, and M. Paolone,
longer possible to achieve a reduction in energy lossses “Optimal Location and Sizing of Distributed Storage Systems
compared to the mode without ESS.Also, network losses in Active Distribution Networks”, IEEE Grenoble Conference,
reduction has shown to be very sensitive to increasing or 2013, DOI: 10.1109/ptc.2013.6652514
decreasing the state of charge of ESS at end of the day [6] M. Stecca, L. Remirez-Elizondo, T. Soeiro, P. Bauer, and P.
compared to those at the beginning. Value of the criterion Palensky, “A Comprehensive Review of the Integration of
function (cost) ranges from $239.33 to $217.59 for the first Battery Energy Storage Systems into Distribution Networks”,
and from $267.69 to $240.35 for the second load diagram, at IEEE Open Journal of the Industrial Electronic Society, March
10 % recharge and 20% discharge relative to the full state of 2020, pp. 46-65, DOI: 10.1109/OJIES.2020.2981832
[7] X. Tang, K. Deng, Q. Wu, and Y. Feng, “Optimal Location and
charge. Locations of ESS in the distribution network were
Capacity of the Distributed Energy Storage System in a
most often nodes in the middle of the first and second major Distributed Network”, IEEE Access, January 2020, vol. 8, pp.
branch in the network (nodes 5, 6, 21, 23). Power of 15576-15585, DOI: 10.1109/ACCESS.2020.2967435
connected ESS followed theoretical predictions, it was [8] J. Radosavljević, Metaheuristic Optimization in Power
positive (load mode) during low loads, and negative Engineering, London, Institution of Engineering and
(generator mode) during high loads. Technology, 2018.
[9] J. A. Michline, S. Ganesh, “Power Flow Analysis for Radial
V. CONCLUSION Distribution System Using Backward/Forward Sweep Method”,
International Journal of Electrical and Computer Engineering,
vol. 8, no. 10, pp. 1628-1632, 2014.
In this paper, the optimization problem of optimal power [10] N. Rajaković, D. Tasić, and G. Savanović, Distribution and
and location of ESS in the standard IEEE18 distribution Industrial Networks, Belgrade, Academic Mind, 2004, pp. 152-
network, in order to reduce energy and power losses, is 164 (in Serbian).

130
ENERGY SYSTEMS AND EFFICIENCY II
Design and Regulation of the HF Inverter for Contactless
Power Transfer Systems
Nikolay Madzharov1 and Desislav Iliev2
Abstract – Resonant inverters with width regulation of the duration t0, i.e. its width regulation is realized by control pulse
power supply have been used many years and have been applied dephasing. The wave-forms of the inverter alternative current
in the High Frequency (HF) inverters in different applications. (AC) are shown in Fig. 2: f) natural commutation mode
Since they use the HF transistors (MOSFETs, IGBTs, SiC FETs (NCM); g) slave commutation mode (SCM). The working
and GaN) in their circuit the resonant inverters receive a new
sequence and the formation of AC in the two modes are
development, from an applied point of view. Their utilization in
regulable and contactless systems is perspective. The circuit explained by the marked symbols of the together working
realization of the Resonant Inverters is a half or full bridge with couple devices on the wave-forms Fig. 2.
free-wheeling diodes and specific switching algorithm of the
control system, which are natural or slave commutations. A
procedure for design and analysis of these inverters is proposed,
characterized by simplification, natural purity and reliability.
The procedure is a part of computerized educative-scientific
program. All kinds of resonant inverters are included in the case
of powering contactless power transfer systems (CPTS).

Keywords – Contactless power transfer systems, High


frequency inverter, Specific switching algorithm, Resonant
inverter.
Fig.1. HF resonant inverter powering contactless power transfer
system
I. INTRODUCTION

There are a number of principles for controlling the power


of HF (High Frequency) inverters [1-4]. One of them and
probably the oldest, is the method of unclear width regulation
of the DC input voltage in the inverters [1-2], [4-5]. It is based
on the control frequency half period divided into two intervals
- 0÷λ, λ÷π. The equivalent DC voltage is 0 or a part of its
rated value in the first part and in the second it is equal to the
total supply voltage. The usage of this principle gives definite
regulating possibilities of the inverters. At the same time some
important disadvantage are found. The most important of
them is the inverter insufficient commutation stability and
increased losses when the load has highly variable parameters,
such as contactless transmitters.
With the usage of the advanced HF transistors the principle
of width regulation of the power supply is applied in bridge
inverter with free-wheeling diodes (Fig. 1) [2], [4-5]. The
regulation power supply is made easier here by the dephasing
of control pulses of the together working devices as it is
shown in Fig. 2 a)-d). When there is a control delay t0 of the
switch VT3 toward the switch VT2 and of the switch VT4
toward the switch VT1 then to the inverter AC circuit
(between the points a and b) the transformed voltage Eab is
fed, as it is shown Fig. 2 e). It is with cut heard front with

1Nikolay Madzharov is with Technical University of Gabrovo,

BG, Faculty of Electrical Engineering, H. Dimitar Str. 4,


5300Gabrovo, Bulgaria, E-mail: madjarov@tugab.bg Fig. 2. The HF inverter basic wave-forms a)-d) control pulses wave-
2Desislav Iliev is with Technical University of Gabrovo, BG, forms; e) wave-forms of the transformed voltage; f) current wave-
Faculty of Electrical Engineering, H. Dimitar Str. 4, 5300 Gabrovo, forms with natural commutation mode (NCM); g) current wave-
Bulgaria, E-mail: deso_1975@abv.bg forms with slave commutation mode (SCM)

978-1-7281-7142-5/20/$31.00 ©2020 European Union 133


In order for the treated inverters to work normally, here it is does not give clear notion of the general parameters of the
mandatory that the current of the respective couple devices inverter, determining its actual properties. It has been proven
have a resonant character with fixed frequency ωn of the that the phase angle δ of the AC circuit is the main parameter
natural oscillations. It must be underlined that in base of the for these inverters regardless of their circuit, operating mode
procedure for analysis and design suggested here is the and CPTS parameters. The same value and waveforms of the
determination of that frequency ωn and the values of the alternative voltage Ug are obtained at a constant angle δ and a
inverter circuit elements to guarantee it. constant value of the inductance Lc is obtained. This confirms
the connection between the parameters of alternating current
and direct current, regardless of the differences in the circuit
II. EXPOSITION and the algorithm.
In order to show the complete procedure of the analysis and
design, some main parameters will be presented here, because C. Natural Oscillation Frequency ωn in Inverter
they are important parts of its construction.
The correct answer of the question – what is the meaning of
“natural oscillation frequency” can be given on the base of the
A. Equivalent Circuit of the Inverter and Contactless Power accurate analysis of the inverter. Because of the different
Transfer Systems. natural oscillation frequencies, the characteristics equations
and their roots can be calculated.
For analysis and design of whole system it is equally In the more common case the natural oscillation,
correct to use a parallel or serial equivalent circuit (EC) [6-8]. summarizing geometrically independence on their number,
Of course, this refers to Contactless Power Transfer System amplitudes, phases and commutation frequency of the devices,
(CPTS) with well-defined parameters (geometric dimensions, determine the consequential oscillation. The characteristics
air gap, electrical parameters and etc.) [8-10]. It should be and evaluation for this general oscillation in [2,5] are made for
emphasized that both cases compromise with the accuracy of the input current of the inverter.
the description of electrical magnetic processes, but the The frequency of natural oscillation of the inverter ωn can
resulting inaccuracy is acceptable. Nevertheless, the question be determined by its waveforms located in the half-cycle of
remains whether the two ECs are equal? The theoretical the control frequency. The ratio between this ωn and the
results of the mode, quantities and values of the natural commutation frequency ω (ωn/ω) can be found and can be
oscillation frequency and the elements don't coincide with the used as a basis for characterizing the different modes of the
practical ones in parallel EC. There is no difference when inverter, as well as for determining its general and specific
using the EC series [9]. The investigations show that these circuit parameters. For this ratio ωn/ω the main correlations
problems will disappear completely if the value of the are correct [2]:
inductance of CPTS - Lc is calculated in the EC series, instead
of the one calculated for the parallel EC. The conclusion made - for the advisable mode; (1)
in [2,5,11] is that in the same inverter alternating current
circuit, only the obtained value of the CPTS inductance Lc in for the unsuitable mode. (2)
the EC series provide the set operating mode and the inverter
parameters. This means that only the calculations made by the Therefore, the frequency ωn must be determined by the
EC series correctly represent the processes occurring in the wave-form of the input current during the operating period of
inverter. In accordance with the above, the EC of the inverter the switching devices. It does not depend on the inverter
between two switching transistors should be considered as a circuit and the number of integral differential equations
series circuit Lc-Ce-Re, independently of the type of describing the electrical magnetic processes in the inverter.
alternating current circuit. A supply voltage Ea is applied to
the equivalent circuit (Fig. 3). D. Calculation Procedure of RI (Resonant Inverter) width
Adjustment

In accordance with the forms in Fig. 2 e) and f) for the


natural oscillation half period Tn/2 and the frequency ratio
ωn/ω the equations are obtained:
Fig. 3. Equivalent circuit in the operating range of the transistors  ;

B. The Phase Angle δ in the AC Circuit - The Angle of NCM , (3)


Deviation of the Alternative Voltage Ug and the First
Harmonic of the AC Circuit of the Inverter

It is accepted that the analysis and design of the inverter can  2 2 ;


be done separately for each individual case. However, this
complicates their research and comparative evaluation and SCM . (4)

134
The half-period Tn/2 and the ratio ωn/ω can be determined if Table I is made with the following input data: P = 1000W;
the values of τ1 and τ2 are given depending on the known f = 20kHz; E = 300V; cosφLOAD = 0.25. The computer
deviation from the control pulses, for example simulations are made using LTSPICE software. The wave-
τ1=0.5t0/2≈ 0.25t0 and τ1=0.5t0. forms obtained by simulations are shown in Fig. 4 - AC
According to the harmonic analysis variant used, the alternative inverter output current for NCM and in Fig. 5 - the
alternative voltage of the inverter is assumed to be a pure sine same quantity for SCM. The values of the HF inverter
wave. The AC is not perfect, i.e. the current pulse is received elements and some characterizing quantities for the work of
with its real waveform. In accordance with these assumptions, the inverter are obtained by calculations and shown in
it is easy to prove that the inverter current is described by the Table I.
equation:
TABLE I
THE INVERTER ELEMENTS VALUES AND SOME QUANTITIES
(5) C, Lc, Vgm, Io,
Elements RI,Ω L1,μH
nF μH V A
and the amplitude of the alternative voltage is:
644 3,3
, (6) SCM 12,9 398 201 578
600 3,7
644 3,3
where and φ1 - phase of the first harmonic of NCM 13 401 207 450
the inverter AC. 600 3,8
In [2,4] for the border operation mode of the inverter an
equation is worked out: When determining the intervals τ1 and τ2, in practice, the
absolute reliability of the quantities is obtained from the
0,406 0,165 0,188 . (7) calculations (up line, Table I) and from a computer simulation
The design is made when the fundamental equation kept: (under line, Table I). Accepted with minimal or no repetitions.
When changing the input data of the inverter, the contactless
; 1,2 1,5 . (8) power supply system and the load parameters, similar data
and experimental results are obtained.
As a result, the following sequence of the calculations can
be proposed:
1) For the relevant mode next is determined: half period
Tn/2 and frequency ratio ωn/ω from Eq. (3) or (4);
2) Angle δ from Eq. (8);
3) Angle φ1 from Eq. (7);
4) Voltage UGm from Eq. (6).
5) The known parameters of power, frequency and load
determine the capacitance C of the primary coil CPTS. The
condition here is to guarantee the calculated angle δ.
6) The equivalent real Re and reactive (capacitance) Xce
resistances of the tank load are determined in the series
equivalent circuit (Fig. 3). Fig. 4. AC alternative inverter output current for NCM
7) The value of the inductance Lc is determined by the
known formula for the natural oscillation frequency of the
equivalent LC–CE–RE circuit (Fig. 3) of the inverter in the
operating range of SD:
8) The currents of transistors and free-wheeling diodes and
average value of the input current of the inverter I0 are
calculated.
The criterion for the accuracy of the calculations is the
equation between the current I0 and its theoretical value
determined by: I0 T = P/E.
Fig. 5. AC alternative inverter output current for SCM
III. COMPUTER SIMULATIONS
The reliable and efficient operation of the prototype unit
The described procedure can be used with small used in contactless power supply was ensured by exhaustive
modifications for the design of all high frequency AC circuit theoretical study and compliance with the requirements for
and the matching method. The calculating example shown in control pulses and element using SiC MOSFET or GaN.

135
IV. CONCLUSIONS [2] T. S. Todorov, N. D. Madzharov, D. T. Alexiev, and P. T.
Ivanov, Autonomous Inverters, Gabrovo, 1996.
[3] I. Nedyalkov, D. Arnaudov, and N. Hinov,"Modelling of a Bi-
An integrated classification of the RI (Resonant Inverters) Directional Converter from a Power Supplying System with
switching mode is proposed using the ratio ωn/ω between the Application", PCIM Europe 2018; International Exhibition and
frequency of natural oscillation of the inverter ωn and the Conference for Power Electronics, Intelligent Motion,
control frequency ω. Renewable Energy and Energy Management.
The procedure for analysis and design of the resonant [4] A. Vuchev, T. Grigorova, and Y. Madankov, "Static
inverter, where it is mainly ensured that the natural frequency Characteristics of a Phase-Shift Controlled Series Resonant DC-
has approximate accuracy, is presented. This has been DC Converter", XXVII International Scientific Conference
confirmed by computer simulations and real experiments. Electronics – ET2018, 13-15 September 2018, Sozopol,
Bulgaria, pp. 253-256.
It has been proven that RI with free-wheeling diodes
[5] G. Kraev, N. Hinov, N. Gradinarov, and D. Arnaudov, "Study
operates in the "quasi-boundary" mode, and the difference of of Parallel Single Transistor ZVS Resonant Inverter with Direct
RI without such diodes is the frequency ratio of ωn/ω>1 and Settle of Steady Mode", International Exhibition
ωn/ω< 1. and Conference for Power Electronics, Intelligent Motion,
For RI analysis and design with supply voltage width Renewable Energy and Energy Management, PCIM Europe
regulation, it is sufficient to define the circuit elements to 2013, Nuremberg, Germany.
create the necessary conditions for the oscillating process. It [6] G. Covic, J. Boys, "Inductive Power Transfer", Proceedings of
has a fixed frequency ωn and a frequency ratio ωn/ω during the the IEEE, vol. 101, no. 6, pp. 1276-1289, June 2013.
operating period of switching devices. [7] D. Arnaudov, N. Madzharov, and N. Hinov, "Rotary Wireless
Inductive Transmitter Powered by ZVS Resonant Convertor",
Elektronika Ir Elektrotechnika, vol. 25, no. 4, 2019.
ACKNOWLEDGEMENT [8] H. Daskalova, "On the Choice of Wireless Data Transmission
Systems", Compendium Modeling and Management of
Information Processes, Sofia, Bulgaria, 2009, pp. 18-29.
The carried out research is realized in the frame of the OP
[9] V. Rankovska, "Using Wireless Interfaces in a Smart Home
“Scienceand Education for Smart Growth 2014–2020”, Model", ICEST 2016 Conference Proceedings, Ohrid,
Project CoC “Smart Mechatronic, Eco- and Energy Saving Macedonia, pp. 325-328.
Systems And Technologies“, №BG05M2OP001-1.002-0023. [10] A. Van den Bossche, V. Valchev, D. Van de Sype, and L.
Vandenbossche, "Ferrite Losses of Cores with Square Wave
Voltage and DC Bias", Journal of Applied Physics, vol. 99, no.
REFERENCES 8, 15 April, 2006.
[11] W. Choi, W. Ho, X. Liu, and S. Hui, "Bidirectional
[1] G. Kraev, N. Hinov, and D. Arnaudov, "Multiphase DC-DC Communication Techniques for Wireless Battery Charging
Converter with Improved Characteristics for Charging Systems and Portable Consumer Electronics", IEEE Conf.
Supercapacitors and Capacitors with Large Capacitance", Applied Power Electron., Palm Springs, CA, 2010, pp. 2251-
Annual Journal of Electronics, V6, B1, pp.128-131, 2012. 2257.

136
Analysis of Electromagnetic Characteristics
of Asynchronous Induction Machine
Igor Sterjovski, Blagoja Arapinoski, Metodija Atanasovski, Vesna Ceselkovska
Abstract – Electromagnetic field analysis is important for the TABLE I
design and operation of induction machines. The electromagnetic GENERAL DATA FOR INDUCTION MACHINE
field of waves contains information about the position of the
General data Value
stator, rotor and the mechanical parameters of IM. The aim of
Rated Output Power (kW) 0.550
this research is to show the type of electromagnetic analysis of a
three-phase asynchronous generator with a wound rotor through Rated Power Factor 1
a concrete example. The example is contained in the ANSYS Frequency (Hz) 50
Maxwell Finite Element Analysis software tool. The results of the Rated Voltage (V) 380
analysis including their graphical representations are presented Rated Speed (rpm) 1500
in the paper. Operating Temperature (C) 75
Number of poles (p) 4
Keywords – Аsynchronous induction machine, ANSYS Winding Connection Y
Maxwell, Electromagnetic analysis, Finite element method.

I. INTRODUCTION

Although synchronous generators with permanent magnets


occupy a significant place in wind power conversion,
asynchronous wound rotor generators have an even more
significant place than previous generators. If an asynchronous
generator is used with a wound rotor then the ability to control
the generator through the rotor circuit is opened. The main
advantage of an asynchronous generator with a wound rotor is
the possibility to obtain it from output power greater than the
nominal, without overheating the machine. These generators Fig. 1. Geometry of asynchronous wound rotor generator
have the ability to produce maximum power over a wide
range of speed variations. Asynchronous generators with a The paper is organized as follows. After the introduction,
wound rotor together with asynchronous cage generators rotor the basic definitions of 3D transient (time domain) are given
find special application in wind turbines whose power is in Section II. Section III gives data overview and presents the
within the frame of MW. electromagnetic field analysis. Section IV concludes the
For the purpose of the research, the asynchronous wound paper.
rotor generator is chosen from the software’s library presented
in Fig. 1. The value of the rated output power and the
frequency are fixed, therefore the input data for the analysis II. ANSOFT MAXWELL’S FORMULATION FOR
are power factor, voltage and speed. The nominal data of the 3D ELECTROMAGNETIC TRANSIENT ANALYSIS
induction machine is shown in the Table I.
This example shows how electromagnetic analysis can be Maxwell's equations in the moving and the stationary part
performed in a relatively fast and accurate manner in a 3D include fixed coordinate system and particular convention for
transient mode. The commissioning of the asynchronous simpler formulation where motion is involved [1]. For the
generator powered by a wind turbine has been analyzed. The rotational type of motion, cylindrical coordinate system is
results for magnetic induction, flux, torque and current values used. This coordinate system has z-axis aligned with the
in stator windings for analyzed time of 75 ms are given. actual rotation axis. Thus, the motion term is eliminated for
the translational type of motion [1].
The formulation used by the Maxwell transient module is
strongly coupled with the finite element part and also coupled
Igor Sterjovski, Blagoja Arapinoski and Metodija Atanasovski with the mechanical elements [1]. In this case, the
are with the Faculty of Technical Sciences-Bitola, St. Kliment electromagnetic force/torque is calculated using the virtual
Ohridski University, Republic of Macedonia, E-mail: work approach.
sterjovskiigor@gmail.com; blagoja.arapinoski@tfb.uklo.edu.mk; The following three Maxwell's equations are relevant for
metodija.atanasovski@tfb.uklo.edu.mk;
vesna.ceselkoska@uklo.edu.mk
transient (low frequency) applications [1]:

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 137


∇xH = σ ( E ) , (1) Therefore, for the 3D transient solver, many quantities will
be automatically calculated and displayed as a 2D graph (a
∂( E ) function of time): voltage (current), flux linkage, back emf.
∇xE = , (2)
∂t Other global variables can also be calculated by the 3D
transient solver and displayed as 2D graphs, such as power
∇xB = 0 , (3) loss, core loss, stranding loss, mechanical power such as
where H represents magnetic field, E represents electric field force/torque, speed and displacement [1].
and B stands for the magnetic induction.
The following two equations directly result from the above III. 3D ELECTROMAGNETIC TRANSIENT ANALYSIS
equations: OF АSYNCHRONOUS INDUCTION MACHINE
1 ∂B
∇x ∇xH + = 0, (4)
σ ∂t

∇xB = 0 . (5)

The final result is a formulation where vector fields are


represented by first order edge elements and scalar fields are
represented by second order nodal unknowns.
Field equations are coupled with circuit equations for both
solid and stranded conductors because, in the case of applied
voltage supplies, the currents are unknown. For the case of
voltage driven solid conductors, the following equation is
used to account for theohmic drop across the i-th conductor Fig. 2. Mesh of finite elements of asynchronous machine with
loop [1]: wound rotor in 3D geometry

VRi =  J
RC ( i )
0i ( E + v x B) dR , (6) As mentioned above, the tool used in designing and
obtaining the results in this research is method. Finite element
method is a powerful method that allows difficult to solve
where J0i represents the current density. The current density
complex differential equations that describe Ansoft - Maxwell
J0i corresponds to 1A of net current in loop i and vanishes
software that has the well-known finite element electrical
outside loop i. The induced voltage can be derived from the
machines in such analysis to be reduced to a large number of
following equation [1]:
easily solvable equations, and the processing speed of modern
computers allows them to be solved relatively quickly. The
ei = −  H i ⋅ BdR . (7)
RC ( i )
applied software allows entering the geometry of the problem
under consideration, both in terms of dimensions and in terms
Here, integration is performed on the entire conductor area. of the construction materials of individual engine elements
Stranded conductors are considered not to induce eddy [2-3], [5]. Depending on the requirements for the accuracy of
currents therefore they are placed in non-conductive areas. the calculations themselves, the same software offers the
This means that in order to calculate the ohmic voltage drop, option to perform the calculations in a plane in 2D, or in 3D
we cannot use the same process as a solid conductor. Instead, space. In the research all simulation analyzes are made in
we use lumped parameters to represent the DC resistance of three dimensions.
the windings. We obtained the induced voltage due to the total All complex equations are solved by the finite element
flux linkage in a similar way to the solid conductor. In both method. The software tool creates a mesh of finite elements
cases, an external inductor and capacitor can be added. For that for the corresponding example is shown in Fig. 2 [2].
time discretization, use the backward time stepping scheme The accuracy of the result depends on the mesh density. Of
[1]: course, this is given by the user and depending on the goal we
want to achieve, the mesh density is adjusted. Thus, after
 dx 
t + Δt

=
{ x } − { x}
t + Δt t

. (8)
creating the mesh of final elements, the solutions are obtained.
The next step after drawing the mesh of finite elements is
 
 dt  Δt the decisive part in which the value of the magnetic vector
potential is calculated at each point of the considered model
For the non-linearity allowed in 3D transient applications, according to the following expression given below [4-5]:
the classic Newton-Raphson algorithm is used. The transient
solver in Maxwell supports coil terminals and winding А = { Аx , Аy , Аz } . (9)
definitions. Therefore, the number of coil turns can be
specified in the model, which is necessary for calculating Determining the distribution of the magnetic field gives
global quantities with high engineering value such as flux values for the magnetic vector potential that move within the
linkage and coil back emf [1]. corresponding limits. When the magnetic vector potential is

138
determined, the densities of the equivalent potential magnetic stator slots and in the air gap, because here is the smallest area
force lines are defined, which connect points with equal through which the magnetic force lines close.
potential. The results obtained from the specific solutions can An analysis of the torque can also be performed. For that
be displayed in tabular or graphic format. purpose, i.e. to determine this characteristic it is necessary to
The distribution of the magnetic induction vector in all set the time of analysis of the transient mode. In the
parts of the motor is related to the value of the magnetic example,it is analyzed up to a time of 75 ms, because it is
vector potential with the following equation [4-5]: approximately the time required to clearly see the stabilization
of the generator. This is shown in Fig. 4, where it is clear that
B = rotA . (10) at the beginning the currents are several times higher, and
after 50 ms, the stabilization process starts and the current in
All of this is shown in Fig. 3, from which it can be seen to
the stator of the generator gets its nominal value.
what extent the magnetic induction moves in the
Fig. 5 shows a graphic of the torque from the start of the
asynchronous induction machine with a wound rotor that is
asynchronous machine up to 75 ms. The picture shows that the
subject to analysis. The analyzed part refers to when the
moment has a negative value, which explains that the
machine is powered by a wind turbine. The generator speed is
asynchronous induction machine is operating in generator
1659.95 rpm, the time is 0 seconds, and the position of the
mode.
rotor in relation to the old position is 7.5 degrees.
From the characteristic of Fig. 5 it can be noticed that the
If we analyze it well, from Fig. 3 it can be concluded that
value of the torque is the largest around the 6th ms from the
magnetic induction has the highest values in the rotor and
start of the generator, and that value is a critical moment.
Because then the critical slip has the greatest value and is
proportional to the active resistance of the rotor winding, and
completely depends on impedance of rotor winding. From the
characteristic of Fig. 5 it can be seen that in a time of 50 ms
the so-called stationary mode begin, at that moment the torque
generated by the induction machine is balanced with the static
resistance moment of the drive machine.
Fig. 4 shows that when starting the generator, the initial
values of the currents are significantly higher and behave
unstable until the torque is equal to the static moment of the
drive machine in the case of the wind turbine. Due to the
small value of the rated power of the machine that is 550 W,
the initial values of the currents do not have large values the
ratio is around 2.5In. The rated current of the asynchronous
generator with a wound rotor is 0.85 A. Fig. 6 shows the
distribution of the flux at an arbitrarily selected point in the air
gap, for a different position of the rotor circuit in relation to
the stationary magnetic axis of the stator. The torque in the
asynchronous machine is created because of the rotating
Fig. 3. Distribution of magnetic induction in 3D domain of magnetic field with flux Φ and the current in the winding of
asynchronous machine in generator mode driven by wind turbine the rotor I2 . If the machine is connected to a constant voltage

Fig. 4. Values of the currents in the stator in the considered period

139
Fig. 5. Characteristic of the rotating torque in function of time

Fig. 6. Distribution of the flux in the air gap at an arbitrarily selected point in function of time

network, the flux can be considered constant, and this can be motor with wound rotor and analyze its performance
confirmed from the diagram in Fig. 6 because it is clear that through them. In addition, the data can be used to calculate
the flux is moving in a very narrow range. From Fig. 7 it can and plot the electromechanical characteristics of the motor,
be concluded that the torque depends proportionally to the or to optimize the analysis of the motor to find more
value of the speed. effective and improved motors.

REFERENCES
[1] ANSYS/ANSOFT Maxwell 2D, 3D User’s Guide V.14
[2] B. Arapinoski, M. P. Radevska, V. Ceselkoska, and M. Cundev,
"Modeling of Three Dimensional Magnetic Field in Three-
Phase Induction Motor with Double Squirrel Cage", TEM
Journal, vol. 2, no. 1, 2013, pp. 80-82.
[3] B. Arapinoski, M. Cundev, M. P. Radevska, and V. Ceselkoska,
"Electromagnetic Analysis of Three-Phase Asynchronous Motor
with Double Cage Rotor with Finite Element Method in 3D",
Еighth Counseling of the Macedonian National Committee in
Fig. 7. Characteristic of the torque in function of speed Cigre, Ohrid, 2013.
[4] B. Arapinoski, M. P. Radevska, M. Atanasovski, and M.
IV. CONCLUSION Spirovski, "Mathematical Model and Calculation of Operating
Characteristics of Three – Phase Asynchronous Motor with
Double Squirrel Cage", 53rd International Scientific Conference
The methodology of using the finite element method to on Information, Communication and Energy Systems and
model the three-dimensional magnetic field proposed in this Technologies, Sozopol, Bulgaria, June 2018, pp. 301-304.
paper is the basic concept of determining the magnetic field [5] B. Arapinoski, M. P. Radevska, V. Ceselkoska, M. Spirovski,
distribution in the three-phase asynchronous induction and M. Atanasovski, "Calculation of parameters of Three-Phase
motor. It can be concluded from an analysis that the three- Induction Motor with Double Squirel Cage with FEM 3D", 51st
dimensional calculation of the magnetic field can provide International Scientific Conference on Information,
us with enough data to calculate the electromagnetic Communication and Energy Systems and Technologies, Ohrid,
characteristics of the three-phase asynchronous induction Republic of Macedonia, 2016, pp. 355-358.

140
Comparison of Methods for Control of
Linear Induction Motors
Bojidar G. Markov1 and Diana G. Markova2
Abstract – This article makes a comparative analysis between reduces the controlled parameters [3]. In the method for direct
the vector control, and the method of direct electromagnetic control of the electromagnetic torque, the hysteresis zones
force control of linear induction motors. The dynamic models of change the magnetic flux and the torque of the motor. If the
linear induction motors applying the two control methods are stator current, or torque goes out of the set hysteresis zones,
presented. For verification of the effective control of linear
induction motors comparative simulations are made.
the signal is sent to the inverter, which, by changing its output
voltage, brings the flux coupling and the electromagnetic
Keywords – Linear induction motor, Direct force control, Field torque to the desired values.
orientated control, Dynamic model. Lately in different sectors of industry, as well as in
everyday life, linear motors are used ever more frequently.
Control of these motors is carried out through methods for
I. INTRODUCTION control of alternative current motors. It is therefore reasonable
to research and compare the different contemporary methods
Asynchronous electric drives are the most common type of for control of linear induction motors.
electric drive in the industry. For optimal results, different The purpose of this article is to create and make the
control methods for induction motors are used. In the end of simulation verification control of linear induction motor with
the 20th century and the beginning of the 21st century, various systems for vector controls and direct force control of the
methods for control of machines with alternative currents electromagnetic force.
have been developed.
In practice, there are two general types for control of
induction motors - open and closed control systems. II. DYNAMIC MODEL OF LINEAR INDUCTION
The modern open control systems are built on the principle MOTOR
of U/f speed control, also known scalar control. The closed
control systems are built on the principle of vector control or When we compose the dynamic model of a linear induction
direct control of the electromagnetic moment force. motor, it is necessary to make the following assumptions:
The vector control methods are controlling the flux of the Only the values of the inductor can be measured;
rotor, and electromagnetic torque of the motor. The - The influence of end effects is ignored;
measurement of controlled quantities can be direct and - The additional friction forces of the secondary element
performed by measuring controlled quantities, or indirectly, are not taken into account;
by additional calculations [1]. - The power supply of the inductor of the linear induction
An alternative method of controlling an induction motor is motor is three-phase, symmetrical and balanced;
the so-called direct torque control. A scheme for direct torque - The magnetic system of the linear induction motor is not
control is shown in [2]. This method of control significantly saturated.
reduces the controlled parameters [3]. In the method for direct The dynamic model of a linear induction motor is
control of the electromagnetic moment, hysteresis zones of performed in a d-q system. In [4] and [5] a d-q electric model
change of the magnetic flux and the moment of the motor (Fig. 1) of a linear induction motor is shown, without taking
shaft are introduced. If the stator current coupling or torque account the end effects.
goes out of the set hysteresis zones, a signal is sent to the Rs ωeλsq Lls L lr (ωe − ω)λrq
inverter, which, by changing its output voltage, brings the flux +

coupling and the electromagnetic moment to the desired ird


isd
values. Usd Lm Rr
An alternative method of controlling an induction motor is
the so-called direct torque control. A scheme for direct torque

control is shown in [2]. This method of control significantly
Rs ωeλsq Lls L lr (ωe − ω)λrq
+
1Bojidar G. Markov, University of Food Technologies, Technical ird
isd
Department, 26 Maritca Blvd., 4002 Plovdiv, Bulgaria, E-mail: Usq Lm Rr
bojmarkov@abv.bg
2Diana G. Markova, IT Academy, 14 Valko Shopov Str., 4023 −
Fig. 1. Dynamic model of a linear induction motor in d,q system
South Industry zone, Plovdiv, Bulgaria, E-mail: didkata1@abv.bg

978-1-7281-7142-5/20/$31.00©2020 European Union 141


In Fig. 1 we have the following designations: The electromagnetic force in the vector control is:
Rs - the active resistance of the inductor;
2 π Lm P
Rr - the active resistance of the slider; Fe =
3 τ Lr 2
(
λrd isq . ) (4)
Lm - the magnetizing inductance;
Lls =Ls -Lm - the leakage inductance in the inductor, where The equation of the electric drive of the LIM is:
Ls - inductance of the inductor; 1 dvr
Fe = + FL , (5)
Llr =Lr -Lm - the leakage inductance of the slider, where M dt
Lr - the inductance of the slider; where: FL - the external resistance force; M - mass of the
isd , isq - the inductor currents in d , q axes; motor; P - pole pairs.
u sd , usq - the induction voltages in d , q axes
ω = ( π / τ ) ⋅ vr - angular speed of the slider, where vr are III. DIRECT FORCE CONTROL
linear speed of the slider; τ is the pole pitch; ωe = 2τ f1 -
The scheme according to which the direct force control is to
angular speed of the magnetic field of the inductor, where f1 be carried out is shown in Fig. 2 [6].
is the frequency the power supply of the inductor; λsd , λsq -
fluxes of the inductor in d , q quantities; λrd , λrq - fluxes of λ *s
the slider on d , q quantities; and λm air gap flux. SWITCH
Fe* λ
The dynamic equations describing the electromagnetic TABLE
processes of the LIM in d,q consist of the substitute schemes Fe
shown on fig.1 are as follows:
FLUX AND FORCE
disq 1  R 1−σ  π Lπ L ESTIMATOR
= usq −  s + isq − veisd − m vλrd + m λrq;
dt σLs σLs σTr  τ σLs Lr h σLs LrTr
disd 1  R 1−σ  π Lπ L Fig. 2. Schematic diagram of DFC
= usd −  s + isd + veisq + m vr λrq + m λrd ;(1)
dt σLs σ
 s L σ Tr  τ σ L L
s r h σLs LrTr

dλ rq Lm π 1 Flux and Force Estimator


= i sq − (v e − v r )λ rd − λ rq ; The values for estimating the space vectors of voltages and
dt Tr τ Tr currents in the inductor in the d-q coordinate system for DFC
dλ rd Lm π 1 are as follows:
= i sd + (v e − v r )λ rq − λ rd ,
dt Tr τ Tr 
e  di e
U ds = Rs ise + Ls ds ,
where: Tr =Lr / Rr and σ = 1 − L2m / Ls Lr . dt

The electromagnetic force is expressed by: e e diqse
U qs = Rs iqs + Ls , (6)
2 π Lm P dt
Fe =
3 τ Lr 2
(
λrd isq − λrq isd .) (2)
 
di e diqse
where Ls ds and Ls is the variation of the inductor
The basis of vector control is to keep the flux vector of the dt dt

slider constant, i.e. λr = λrd , and λrq = 0 . In this case the fluxes in d,q. The estimation fluxes for the inductor are
obtained form equations (6), as follows:
dynamic equations of the LIM are:
e e 
λds =  (U ds − Rs ise ) dt ,
di sq 1  R 1−σ  π Lπ
=u sq −  s + isq − v e i sd − m vλrd e e  (7)
dt σLs σ
 sL σT r  τ σL s Lr h λqs =  (U qs − Rs ise ) dt .
disd 1  R 1−σ  π Lm
= u sd −  s + isd + ve isq + λ rd ; Eqs. (6) and (7) show that the fluxes of the inductor can be
dt σLs σ
 sL σT r 
τ σL L T (3)
s r r
estimated by measuring the currents in the inductor along the
Lm π d-q axes.
0= isq − (ve − vr )λrd ; When the values of the stator fluxes and currents are
Tr τ known, the value of the electromagnetic force can be
dλrd Lm 1 calculated by the formula:
= isd − λrd .
dt Tr Tr
Fee =
2τ 2
(
3π P e e e e
iqs λds − ids λqs . ) (8)

142
Switch Table and Controllers IV. VECTOR CONTROL
Тo obtain the reference current in the inductor, the vector (FOC-FIELD ORIENTATED CONTROL)
modulation of a three-arm inverter, consisting of 6 IGBT
transistors shall be applied. The switching position of the
The FOC in the linear induction motor is realized
IGBT transistors is shown in Fig. 3. In Fig. 3 it is evident that
analogously to the FOC of a rotary induction motor according
there are eight switching positions. Two of them have zero
to the scheme shown in Fig. 4 [7].
voltage and therefore zero current.

ω ref i qs* u ds ua
ub
λ *dr ωr ids* uqs
uc
λ dr

i qs
i ds

1
s

ω sl ωsl ωr π
τ
v

Fig. 3. Inverter output voltage

The presence of voltage at the output of the inverter is


marked with 1, and its absence with 0. If the combinations of Fig. 4. Schematic diagram of LIM with FOC
on and off are marked with S A , S B , and SC , the vector of the
In Fig. 4 the designation ωsl , is the slip frequency, with
inductor voltage can be expressed as follows:
value:
  j

j
4π  1 iqs
2
U s = U dc  S A + S B e 3 + SC e 3 . (9) ωsl = . (10)
3   Tr ids
 
Analyzing the six sectors of the voltage and fluxes shown V. SIMULATION AND VERIFICATION
in Fig. 3, the limits of change of the angles between the
sectors are estimated by the following limits:
For verification of the proposed models for LIM control
−30 < θs1 < 30 ; 30 < θs2 < 90 ; 90 < θs3 < 150 ; systems, LIM with the following technical data is used:
150 < θs4 < 210 ; 210 < θ s1 < 270 ; 270 < θs1 < 330 . U H = 380 V; I H = 400A; f H = 50 Hz; Rs = 0,016 Ω;
The stator fluxes angle in addition to the linear Rr = 0,09 Ω; Lr = 3,2 mH; Ls = 3,5 mH; Lm = 11mH;
electromagnetic force hysteresis has the optimal value of the P = 2; τ = 0,015m; M = 165kg.
state vector when directly controlling the electromagnetic
force of a linear induction motor. Table I shows the possible As a result of the simulation the following results have been
commutations of the vectors of voltage, fluxes and obtained, Figs. 5 and 6.
electromagnetic force in a linear induction motor.
For stator currents
TABLE I DTC: Starting current 1267 A, transient current 538 A at a
POSSIBLE COMMUTATION OF THE VECTORS OF VOLTAGE AND load of 792 kg, Fig. 5. Duration of transient current time
FLUXES 0.05 second, current 400 A. The first peak current is
Position Sector instantaneous at 0.001 second.
λs Fe 1 2 3 4 5 6
FOC: Starting current 1359 A, transient current 543 A at a
θs1 θ s 2 θ s 3 θ s 4 θ s5 θ s6 load of 792 kg, Fig. 6. Transient current time of 0.05 seconds,
set current 400 A. It is noteworthy that the peak current at
0 1 110 010 011 001 101 100 FOC occurs with a delay of 0.05 seconds compared to the
0 111 000 111 000 111 000 DTC.
-1 011 001 101 100 110 010
1 1 100 110 010 011 001 101
0 000 111 000 111 000 111
1 001 101 100 110 010 011

143
144

1400
Stator Current DFC
It can be seen that in FOC the processing of the speed
1200 reference is more accurate than in DFC, where there is a
1000
deviation from the reference, Fig. 6.
800

600

VI. CONCLUSIONS
Is [A]

400

200

-200
From an energy point of view, the DFC method has better
-400 indicators, which can be seen from the obtained results of the
-600
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
measured stator current.
t [s]
From the point of view of slider movement accuracy, the
Stator Current FOC
1400 method of LIM control via FOC gives better indicators.
1200
The research shows that in the system in direct control of
1000
the electromagnetic force, the speed of the slider follows the
800

600
set speed to the system, and the electromagnetic force follows
X: 0.6648
the set load of the electric drive.
Is [A]

Y: 398.8

400

200 Both models for LIM control are equally applicable in


0 terms of the technical degree of complexity.
-200
In the system in direct control of the electromagnetic force,
-400
the speed of the slider follows the set speed to the system, and
-600
0 0.1 0.2 0.3 0.4 0.5
t [s]
0.6 0.7 0.8 0.9 1
the electromagnetic force follows the set load of the electric
Fig. 5. Stator current drive. Both models for LIM control are equally applicable in
terms of the technical degree of complexity.
Speed DFC
1.6

1.4
REFERENCES
1.2

1
[1] S. N. Manias, "Power Electronic and Motor Drive Systems",
0.8
Elsever Inc., 2017.
v [m/s]

0.6
[2] R. P. Aguilera, P. Acuna, G. Konstantinou, S. Vazquez, and J. I.
0.4
Leon, "Control of Power Electronic Converters and Systems",
0.2
Academic press, Elsevier Inc., 2018.
0
[3] S. Gdaim, M. Abdelatiff, and M. Mimouni, "Direct Torque
-0.2
0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 Control of Induction Machine Based on Intelligent Techniques",
t [s]
International Journal of Computer Applications, vol. 10, no. 8,
Speed FOC
1.6 November 2010.
1.4 [4] E. F. da Silva, E. B. dos Santos, P. C.M. Machado, and M. A.A.
1.2
de Oliveira, "Dynamic Model for Linear Induction Motor", IEEE
International Conference on Industrial Technology, 2003.
1
[5] M. N. Raju, M. S. Rani, "Mathematical Modeling of Linear
v [m/s]

0.8
Induction Motor", International Journal of Engineering &
0.6 Technology, vol. 7 (4.24), pp. 111-114, November 2018.
0.4 [6] M. Cirrincione, M. Pucci, “An MRAS-Based Sensorless High
0.2
Performance Induction Motor Drive with a Predictive Adaptive
Model”, IEEE Transaction on Industrial Electronics, vol. 52, no.
0
0 0.2 0.4 0.6 0.8 1
t [s]
1.2 1.4 1.6 1.8 2
2, pp. 532-551, April 2005.
Fig. 6. Slider speed [7] A. Yousef, A. M. Samir, "Review of Field Orientated Control of
Induction Motor", International Journal for Research in
Emerging Science and Technology, vol. 2, no. 7, pp. 5-16, July
2015.

144
The Cost of Indecision in Energy Efficiency. A Cost of
Opportunity Analysis for an Industrial Consumer
Ioan-Sevastian Bitir Istrate1, Cristian Gheorghiu2 and Miruna Castravete3
Abstract – Organisations are not always taking the In the 2012 and 2016 Energy Audits, the ESCO identified
recommendations of ISO 50001 group of standards into account and proposed for implementation six EPIAs, summarily
when establishing their internal operational Guidelines and, by presented in Table I.
doing so, they end up neglecting some rather significant Energy
Performance Improvement Actions (EPIAs). In this paper, the
TABLE I
Cost of Indecision generated by a poor Energy Management
PREVIOUS EPIAS IMPLEMENTATION HISTORY
Procedure will be analysed for an industrial consumer. The Cost
of Opportunity Analysis will reveal the financial losses generated Identified Implemented
by not implementing the already identified EPIAs as soon as EPIA
in in
financially possible. Replacement of CFL lighting with
2012 2012-2016
LED lighting
Keywords – Energy efficiency, Energy performance indicators, Energy Measurement System
2012 2014-2018
Energy performance improvement actions, Energy services, development
Energy management. Heat Recovery from the Brick
2012 N/A
Treatment Oven
Water Pumps redesign and
2012 N/A
I. INTRODUCTION Variable Speed Drive Installation
Variable Speed Drive installation
2016 2016-2017
on the ventilation system
Energy efficiency and, implicitly, the environmental impact Refurbishing of the Brick
reduction became a top priority for the European Union, thus 2016 2018
Treatment Oven insulation
engaging every energy sector in a continuous effort to Heat Recovery from the Brick
2016 N/A
improve its specific Energy Performance Indicators (EPIs). Treatment Oven
Water Pumps redesign and
Furthermore, as energy prices continue to rise, the 2016 N/A
Variable Speed Drive Installation
improvement of the aforementioned EPIs can and will lead to
an improvement of the overall profitability of the
As it can be observed, the Organization did not implement
Organization, regardless of the energy sector that it operates
the Heat Recovery EPIA or the Water Pumping System EPIA
in. The importance of developing an Energy Management
as of 2020, as it considered the Capital Expenditures
System, in accordance with ISO 50001 group of standards
(CAPEX) and the Simple Payback Period to be too high.
guidelines should thus be a priority.
The Top Management of the Organization did not approve
In accordance with the en-force legislation [1]-[3], every
the expenditures throughout the analysis period of 12 years.
Organization with an annual equivalent energy consumption
The internal regulations of the Organization state that the
of over 1,000 t.o.e. (tons of oil equivalent) must undergo an
Simple Payback Period required of an EPIA must be lower
Energy Auditing process by an authorized Energy Services
than 1.5 years in order to be deemed viable from an
Company (ESCO) every four years.
economical point of view.
In this paper, the Case Study of an industrial consumer
This paper will continue to analyze the Cost of Indecision
which operates in the bricks manufacturing sub-sector will be
for these two EPIAs by an Opportunity Cost Analysis, in
presented. The analyzed Organization underwent the previous
order to evaluate the real economic impact of the Top
Energy Auditing Process in 2012 and 2016. The main goal of
Management decision making policy. In Sections II and III a
the proposed methodology is to reduce the “efficiency gap”,
brief description of the Water Pumping system redesigning
as defined in [4] and to increase the implementation rate of
EPIA, respectively the Heat Recovery EPIA will be presented.
EPIAs in the industrial sector, in which energy efficiency isn’t
In Section IV the authors will present the Opportunity Cost
usually a top priority [5].
Analysis. Section V will summarize conclusions of the paper.

1Ioan-Sevastian Bitir Istrate is with University POLITEHNICA of II. WATER PUMPING SYSTEM EPIA
Bucharest, Faculty of Power Engineering, Splaiul Independenței 313,
060042 Bucharest, Romania, E-mail: ioanistrate2005@yahoo.com
2Cristian Gheorghiu is with University POLITEHNICA of A. Reference Case
Bucharest, Faculty of Power Engineering, Splaiul Independenței 313,
060042 Bucharest, Romania, E-mail: cristian.gheorghiu@upb.ro The Water Pumping System (WPS), briefly described in
3Miruna Castravete is with University POLITEHNICA of
Table II, is made up of thirteen electrically driven pumps of
Bucharest, Faculty of Power Engineering, Splaiul Independenței 313,
various rated voltages and powers.
060042 Bucharest, Romania, E-mail: mirunacastravete@gmail.com

978-1-7281-7142-5/20/$31.00 ©2020 European Union 145


Due to a decrease in the water consumption as a result of Pump with a smaller, more efficient one equipped with a
various technological process improvements, the WPS VSD, two sets of calculations were done.
operates at a maximum of 71% of it’s designed, rated load. Firstly, the contribution of the VSD (∆ ) was taken into
As it can be observed from Table II, the Significant Energy account by considering an electricity consumption reduction
Use in the WPS is represented by the MV 403 cold water of 25% of the proposed scenario:
pumps, which have a rated voltage of 6 kV and a rated power 1 ℎ
of 315 kW. Out of the five MV 403 pumps only one is ∆ = , ∙ ∙ ∙( , − , ) (1)
currently in use, and working at an average load of 30% with
an actual average flow of 500 m3/h. 1 ℎ
∆ = 200 ∙ 1,440 ∙ ∙ (1 − 0.7)
TABLE II
WATER PUMPING SYSTEM ℎ ℎ
∆ = 92,407 = 92.41
Electrically Total In Average
Rated
Driven Quantity Installed Operatio load
Power Secondly, the energy economy (∆ ) obtainable by
Pump Power n
[-] [kW] [pcs.] [kW] [pcs.] [%] replacing the old electrically driven pump with a new,
(4)=(2)*(3 (5) (6) efficient, electrically driven pump equipped with a VSD was
(1) (2) (3)
)
determined by applying the following equation:
MV 403 315 5 1,575 1 30
MV 253 110 1 110 1 80
1 1 ℎ
∆ = , ∙ ∙ − , ∙ ∙ ∙ , (2)
VDF 300 75 3 225 1 75
MV 403 110 2 220 1 90
MV 403 90 2 180 1 80 1 1 ℎ
TOTAL 13 2,310 5 71 ∆ = 315 ∙ 1,440 ∙ − 200 ∙ 1,440 ∙ ∙ 0.7
0.84 0.935

B. Proposed EPIA ℎ ℎ
∆ = 324,385 = 324.39
The EPIA proposed in the 2012 Energy Audit consisted in From a financial point of view, the CAPEX required to
replacing the MV 403 cold water pump with a smaller, more implement the Water Pumping System EPIA is presented in
efficient MV253x3 cold water pump with a rated power of Table IV.
200 kW and a rated voltage of 0.4 kV, powered by a three-
phase asynchronous motor equipped with a Variable Speed TABLE IV
Drive (VSD). CAPEX OF THE WATER PUMPING SYSTEM EPIA
As proven by [6]-[8], the installation of a VSD can lead to a
Cost Value M.U.
reduction of the electricity consumption of up to 38,9% at a MEC-MV253x3 Acquisition Cost 46,200 EUR
rotation speed reduction of only 20%. For this case, based on Toshiba VFAS3-4200 KPC VSD
9,400 EUR
the average load of the electrically driven pump and the VSD Acquisition Cost
capabilities, an electricity consumption reduction of 25% will Hydraulic System modification procedure 4,500 EUR
be considered. Removal of the existing electrically driven
2,400 EUR
pump
The main technical and operational inputs used in the Installation of new electrically driven pump 2,600 EUR
energy economy forecast are presented in Table III. Additional costs required to power the new
4,300 EUR
pump
TABLE III CAPEX 72,400 EUR
MAIN TECHNICAL AND OPERATIONAL INPUTS USED IN THE ENERGY
ECONOMY FORECAST – WATER PUMPING SYSTEM EPIA The Operational and Maintenance Costs (OPEX) are
Input Notation Value M.U. considered constant in both scenarios, thus it can be ignored
Average technological process -
8,160 h/year from the technic and economic analysis presented in Section
functioning time IV.
Average Cold-Water Pump functioning
1,440 h/year
time
Actual Rated Power , 315 kW III. HEAT RECOVERY EPIA
Actual Average Load 30 %
Rated Motor Efficiency 84 %
A. Reference Case
Proposed Scenario Rated Power , 200 kW
Proposed Scenario Average Load , 70 %
Proposed Scenario Rated Motor The Heat Treatment Oven (HTO) is the Significant Energy
93.5 % Use when it comes to Natural Gas consumption, being
Efficiency
Total Installed Power Reduction 115 kW responsible for up to 51% of the entire equivalent energy
VSD energy usage reduction 25 % consumption of the Organization.
At the time of the Energy Audit, in 2012, the Waste Gasses
In order to properly quantify the electricity consumption were not used at their full energy potential and were simply
reduction obtainable by replacing the existing Cold-Water cooled down from their average temperature of 827 degrees
Celsius to about 400 degrees Celsius and then dispersed into

146
the atmosphere. The average annual operation time of the ℎ
= 0.9 ∙ 2,000 ∙ 1.61 = 2,898
HTO is THTO=2,000 hours/year and it is fueled by natural gas
with LHV=42 MJ/ . The average characteristics of the
HTO exhaust gasses are presented in Table V. Considering an average efficiency of the oven of 95%, the
annual fuel saving ( ) will be:
TABLE V 2,989 ℎ
EXHAUST GASSES CHARACTERISTICS = = = 3,050 (7)
0.95
Characteristic Notation Value M.U.
Waste Gas Temperature = 827 ˚C From a financial point of view, the CAPEX required to
Excess air coefficient 1.2 - implement the Heat Recovery System EPIA is presented in
9.54 % Table VI.
Volumetric Composition 19.03 %
71.43 % TABLE VI
Combustion air temperature 25.7 ˚C CAPEX OF THE HEAT RECOVERY SYSTEM EPIA
Maximal fuel consumption 427
Cost Value M.U.
B. Proposed EPIA Piping 42,000 EUR
Heat Exchanger 93,000 EUR
Electrically Driven Fan used for Air Intake 12,000 EUR
The EPIA proposed in the 2012 and 2016 Energy Audits
Installation of the HRS 16,000 EUR
consisted in implementing a Heat Recovery System (HRS) in CAPEX 163,000 EUR
order to efficiently use the exhaust gasses temperature to
optimize the Natural Gas consumption by preheating the The Operational and Maintenance Costs (OPEX) are
combustion air (see Fig. 1) [9]. estimated at approximatively 12,900 EUR/year and are
generated by the periodic cleaning and maintenance procedure
of the pipe system and the electricity consumption of the air
intake fan.

IV. COST OF OPPORTUNITY ANALYSIS

A. Input Data and General Hypothesis


Fig. 1. Simplified HRS flow diagram
The main criterions used in the technic and economic
analysis of the EPIAs were the Net Present Value – NPV (8),
In order to evaluate the energy consumption reduction
the Internal Rate of Return – IRR (9), the Simple Payback
obtainable by implementing this EPIA, the specific heat of the
Period (10), determined by considering a variable annual net
exhausted gasses was determined by using the following
income and the Benefit – Cost Analysis – BCA (11).
equation:

= ∙ , = 1.506 (3) = − [ ] (8)
∙ ∙ (1 + )
The volume of exhausted gasses is considered for an excess
where ttst is the analysis time-frame, in years, which is
air coefficient of = 1,2 and an absolute humidity of =
considered to be 12 years in this case [11], It is the yearly
10 , by applying the equation: income in the tth year, in EUR/year, Ct are the yearly
,
expenditures in the tth year, in EUR/year, a is the discount
=1+ =1+ ∙ ∙ (1 + 0.00161 ∙ ) (4) rate, in %/year and IC is the investment cost, in EUR.
,
, −
= 12.72 = = 0[ ] (9)
, (1 + )
The energy content of the exhausted gasses ( ) is where the CAPEX can be included in the yearly expenditures
determined considering the maximum air temperature after the as a depreciation cost.
heat recovery process:
= [ ] (10)
= ∙ ∙ ∙ − = 1.61 [ ] (5) ∑

Considering a HRS efficiency of 90% and an average


= [−] (11)
annual operation time of 2,000 hours/year, the estimated
energy economy ( ) will be: In order to quantify the yearly income that the Organization
missed out on, a historical evolution of the electricity and the

= ∙ ∙ (6) natural gas prices, as average national values, is presented in
Table VII.

147
TABLE VII proper periodical Energy Audits and a continuous
ELECTRICITY AND NATURAL GAS PRICES EVOLUTION quantification of the cost of energy reduction [12].Further
Year Electricity Price Natural Gas Price research is needed to evaluate how the Cost of Indecision can
[-] [EUR/MWh] [EUR/MWh] be used as a hierarchy setting criterion when comparing
2012 92.9 20.25 multiple EPIAs.
2013 94.4 23.4
2014 92.9 23.9
2015 96.1 23.85
2016 84.4 22.85
2017 77.9 30.2
2018 85.1 30.35
2019 95.7 33
2020 108 34.5
2021 110.2 37.54
2022 112.43 40.84
2023 114.,72 44.29

Fig. 2. Cumulative Cashflows for the EPIA implementation scenario


As it can be observed, both prices increased from 2012 until (blue) and the reference scenario (orange)
now, with electricity prices increasing with an average of
16.24% from 2012 to 2020 and natural gas prices increasing
with an average of 70.37% from 2012 to 2020. Based on the REFERENCES
average price growth rate of 2.03%/year for electricity and
8.80%/year for natural gas, the prices for 2021, 2022 and 2023 [1] The European Parliament and the Council, “Directive (EU)
2018/844 Amending Directive 2010/31/EU on the Energy
were forecasted.
Performance of Buildings and Directive 2012/27/EU on Energy
Efficiency,” PE/4/2018/REV/1, Official Journal of the European
B. Technic and Economic Analysis Results Union, L156/75, 19.06.2018.
[2] The Romanian Parliament, “The Energy Efficiency Law no.
As it can be observed in Table VIII, both EPIAs would’ve 121/2014,” Official Gazette, Part I, No. 574 from 01.08.2014.
led to extremely attractive Economic Indicators. However, [3] The Romanian Parliament, “Law no. 160/2016 for modifying
due to the indecision of the Top Management of the and updating the Energy Efficiency Law no. 121/2014”, Official
Organization, those Indicators were not achieved. In order to Gazette, Part I, No. 562 from 26.07.2016.
evaluate the accurate amount of capital that the Organization [4] A. Hasanbeigi, L. Price, H. Lu and W. Lan, “Analysis of
Energy-Efficiency Opportunities for the Cement Industry in
lost as a result of its inaction, the annual income generated by
Shandong Province, China: A Case Study of 16 Cement Plants”,
depositing the not-invested capital is considered. Energy, vol. 35, no. 8, pp. 3461-3473, 2010.
[5] J. Harris, P. Bostrom and R. B. Lung, ”Crossing the Valley of
TABLE VIII Death: Policy Options to advance the Uptake of Energy-
TECHNIC AND ECONOMIC ANALYSIS RESULTS Efficient Emerging Technologies in US Industry”, Industrial
Economic Energy Technology Conference, pp. 17-19, 2011.
WPS EPIA HRS EPIA [6] P. Bhase, M. Lathkar, ”Energy Conservation using VFD”, 2015
Indicator
NPV [EUR] 148,238 366,801 International Conference on Energy Systems and Applications
IRR [%/year] 41 38 (ICESA), DOI: 10.1109/ICESA.2015.7503406, 2015.
SPP [years] 2.30 1.72 [7] E. Morris, D. Armitage, ”A Guide to Standard Medium Voltage
BCA [-] 2.05 1.45 Variable Speed Drives, Part 2”, pp. 7-13, 2012.
[8] R. Paes, ”An Overview of Medium Voltage AC Adjustable
Speed Drives and IEEE Std. 1566 – Standard for Performance
V. CONCLUSION of Adjustable Speed AC Drives Rated 375 kW and Larger”,
Joint Power Engineering Society – Industrial Society Technical
The total CAPEX of the unimplemented EPIAs amount to Seminar, IEEE Southern Alberta Chapter 1-78, 2011.
[9] E. Cagno, D. Accordini and A. Trianni, ”A Framework to
232,400 EUR. Considering an average interest rate of
Characterize Factors Affecting the Adoption of Energy
2,5%/year for a 12 years deposit, the total NPV obtained by Efficiency Measures within Electric Motors Systems”, 10th
not investing in the EPIAs is approximatively 312,553 EUR. International Conference on Applied Energy (ICAE), Energy
This means that after nine years the Organization lost 153,305 Procedia, vol. 158, pp. 3352-3357, 2018.
EUR by not implementing the two analyzed EPIAs (Fig. 2). [10] B. Delpech, B. P. Axcell and H. Jouhara, “A Review on Waste
In conclusion, the Cost of Indecision – “Inaction Loss” – Heat Recovery from Exhaust in the Ceramics Industry”, E3S
can be used as a next-level incentive for Organizations, Web of Conferences 22:00034, 2017, DOI:
Energy Services Companies and Energy Management 10.1051/e3sconf/20172200034
Personnel when analyzing EPIA which lead to a negative set [11] The Romanian Government, “Decision no. 2139/30.10.2004 for
approving the normal period of use for capital goods,” Official
of financial indicators, in order to make them more attractive
Gazette, Part I, No. 46/13.01.2005.
to the decision makers. This paper proved that presenting the [12] K. Abubakar, A. Haneef, J. G. Ringim and A. Musa, “An
Cost of Indecision to the top management of an industrial Approach to Energy Saving and Cost of Energy Reduction
company can lead to a significant increase in the approval and using an Improvement Efficient Technology”, Open Journal of
implementation of EPIAs, especially when combined with Energy Efficiency, vol. 4, pp. 61-68, 2015.

148
SIGNAL PROCESSING I
The Effects of Coefficient Quantization
on New CIC FIR Filters
Biljana P. Stošić
Abstract — Novel selective, highly effective and low complexity quantization of filter coefficients to the word size of registers.
CIC (Cascaded-Integrator-Comb) FIR (Finite Impulse Response) The goal is to obtained quantized frequency characteristic that
filters, for applications in communication systems, are described has more similarity to frequency characteristic of infinite
here. The paper proposes the use of classical CIC filters as precision FIR filter.
functions in generating new filters, by spreading the delays in the
The novelty presented in this paper are novel selective,
CIC filter comb stages. To verify the frequency response
characteristic improvements of the suggested CIC FIR filters, highly effective and low complexity CIC FIR filters, designed
comparative study of the frequency responses of the generated as several cascaded non-identical CIC filter section. They are
filters with classical CIC filters is provided. given in a closed form providing the filter coefficients
Quantization has a great influence on digital signal processing analytically. Some characteristics of them are shown here to
applications. The effects of coefficient quantization as one type of demonstrate their usefulness in communication systems. After
quantization that influences a filter characteristic are designing a digital filter, the effects of the coefficient
investigated here. quantization on its frequency characteristic have to be
examined and studied. If the quantized filter does not meet the
Keywords — Digital filters, CIC filters, FIR filters, Linear target specifications, the designer needs to redesign the filter.
phase characteristic, Coefficient quantization.
This paper analyzes the effects of coefficient quantization in a
new designed CIC FIR filter. In particular, it will be study
I. INTRODUCTION how magnitude response of the filter is affected by coefficient
quantization.
In 1981, Hogenauer presented with hardware-efficient This work is unscrewed into two parts: a filter design and a
linear phase FIR (Finite Impulse Response) filter class so coefficient quantization. The design procedure of the novel
called CIC (Cascaded-Integrator-Comb) filters [1]. They are CIC FIR filters is discussed in Sections II to IV. Then, Section
very efficient in terms of computational complexity due to V is dedicated to verification of the designed filter. Section VI
their properties such as no required multipliers and no gives a review of coefficient quantization’s effects on filter
required memory for the storage of filter coefficients. A CIC frequency characteristic. The summary is given in Section VII.
filter that uses only additions/subtractions reduces the
computational demands.
II. MULTIPLIERLESS LINEAR-PHASE CIC FILTERS
It is well known that the classical CIC filters themselves
suffers from a passband droop which is unacceptable in many
The normalized CIC FIR filter function of one section (i.e.
applications. The improvement of the CIC filter frequency
CIC section) in z -domain is defined as a cascade of simple
response attracted much attention during the last several years.
integrator and comb filter stages
Hence, it is of great interest to get a flat passband using a
1− z−N
compensation filter [2-5].
CIC filter is what the name indicates: a cascade of simple
H (N , z) =
1
N
( )
⋅ 1 + z −1 + z −2 +  + z −( N −1) =
N ⋅ (1 − z −1 )
(1)
integrator and comb filter stages. A new selective low-pass
CIC filters based on the classical CIC filters and obtained by The filter function of a comb is H c ( N , z ) = (1 − z − N ) , and its
spreading the delays in the comb stages, are designed by time domain representation is yc (n) = x(n) − x(n − N ) .
author and presented in [6-12]. Compact forms of new Function H i ( z ) = 1 / (1 − z −1 ) represents the filter function of
functions, their characteristics in the frequency domain as well
as the performance achievements over the classical CIC filters an integrator and yi (n) = x(n) + y (n − 1) is its difference
and different solutions presented earlier, are described. equation in time domain.
Digital filters are very important type of filters in many The classical CIC FIR filter function of normalized
digital signal processing (DSP) applications. Quantization has amplitude response characteristic is defined as
a great influence in DSP. Coefficients quantization represents  1 − z−N 
K
a type of quantization that influences a frequency response of H (N , K , z) =   , (2)
digital filter. Hardware implementation of FIR filters requires  N ⋅ (1 − z −1 ) 
 
where N is the decimation factor, and K is the number of
Biljana P. Stošić is with University of Niš, Faculty of Electronic sections [1].
Engineering, Aleksandra Medvedeva 14, 18000 Niš, Serbia, E-mail:
biljana.stosic@elfak.ni.ac.rs

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 151


III. NON-RECURSIVE FORMS OF DESIGNED CIC FIR between the stopband attenuation and the parameter L . For
FILTERS chosen parameter N , the minimum attenuation increase
rapidly by increasing it. Data show that the new filters have
The new designed CIC FIR filters having normalized much better performances especially for filter order from 5 to
response can be written in non-recursive form 10.
60
L L=3
  1 N −3   1 N −2 −r   50 L=2

Stopband attenuation
   N −1 

improvement [dB]
H ( N , K , L, z ) =  z −r  ⋅  z  40
 N − 2 r =0   r =0

  (3) 30

L 20
 1 N −1   1 N −r   1 N +1 −r  
z −r
  N +1    N +2 
10
⋅  ⋅ z ⋅ z  L=1
N 

0
r =0   r =0   r =0  5 10 15 20
where N and L are freely selected integer parameters, and N
parameter K takes value of K = 5L . This function represents Fig. 1. Improvements of the stopband attenuation of new CIC FIR
five cascade-connected non-identic CIC sections ( H(N − 2, z) , filters over classical CIC filters

H(N −1, z) , H(N, z) , H(N +1, z) , and H(N + 2, z) of the form The frequency characteristics of suggested filters are
given by Eq. (1)) which are repeated L times. calculated in MATLAB by evaluating the function at the
In general, the non-recursive implementation is
sample points defined by setting z = e jω , where ω = 2π ⋅ f
( N −1)⋅ K
1
H ( N , K , L, z ) =
H 0 ( N , K , L)
⋅  h( N , r ) ⋅ z − r , (4) reprents angular frequency in rad/s. By use of Euler’s identity,
the frequency characteristic is obtained
r =0
where H 0 ( N , K , L) presents the normalized constant for the L
 ( N − 2)ω ( N − 1)ω Nω 
unit magnitude response at f = 0 , and h ( N , r ) represents the jω  sin 2
sin
2
sin
2 
H ( N , K , L, e ) =  ⋅ ⋅  ⋅
coefficients of the impulse response. Vector h( N , K , L) has a  ( N − 2) ⋅ sin ω ω ω 
( N − 1) ⋅ sin N ⋅ sin
total of M = ( N − 1) ⋅ K + 1 impulse response coefficients  2 2 2 
L
satisfying h ( N , r ) = h ( N , M − r ) relation.  ( N + 1)ω ( N + 2)ω  K ( N −1)ω
 sin 2
sin
2  −j
As examples of non-recursive implementation, filter ⋅ ⋅  ⋅ e 2
functions calculated for even and odd values of parameter N  ( N + 1) ⋅ sin ω ( N + 2) ⋅ sin ω 
(e.g. 4 and 5) and K = 5 (calculated for L = 1 ), are observed.  2 2
For classical CIC filter functions H ( N , K , z ) , satisfying Eq. and K = 5L . (9)
(4), the normalized constants are 1024 for N = 4 , and 3125 The normalized amplitude characteristics of the suggested
for N = 5 . The impulse response coefficient vectors are given filters are defined as the magnitudes of the complex filter
in Eqs. (5) and (6), respectively: frequency responses H ( N , K , L, e jω ) . Then, the magnitude
hCIC (4,5) = {1,5,15,35, 65,101,135,155, characteristics represent the absolute values of them.
(5) The linear phase characteristic of new filter functions is
155,135,101, 65,35,15,5,1}
φ ( N , K , L, ω) = − ( N − 1) ⋅ K ⋅ ω / 2 , K = 5L . (10)
hCIC (5,5) = {1,5,15,35, 70,121,185, 255,320,365, The constant group delay characteristic is
(6)
381,365,320, 255,185,121, 70,35,15,5,1} τ ( N , K , L, ω) = − dφ ( N , K , L, ω) / dω = ( N − 1) ⋅ K / 2 ,
For new CIC filter functions, H ( N , K , L, z ) , the impulse K = 5L . (11)
response coefficient vectors are given in Eqs. (7) and (8),
respectively: IV. DESIGNED EXAMPLE AND COMPARISON
h(4,5,1) = {1,5,14, 29, 49, 71,90,101,101,90, 71, 49, 29,14,5,1} (7)
In this part, an example is given in order to show
h(5,5,1) = {1,5,15,34, 64,105,154, 205, 250, 281, 292, effectiveness of the frequency response of the designed
(8)
281, 250, 205,154,105,64,34,15,5,1} selective CIC filters in comparison to the classical CIC filters.
In order to fairly compare these filters in Fig. 2, the
The constants H 0 ( N , K , L) are 720 for N = 4 , and 2520 for normalized magnitudes are calculated for the same group
N =5. delay and the same number of delay elements. The designed
As stated before, one can see the coefficient symmetry of filters have an equal number of cascaded sections K .
proposed FIR filter functions from Eqs. (7) and (8). Also, the However, the classical CIC filters have an identic form in all
calculated constants and impulse response coefficients are cascades, and the new designed filters have cascade of non-
smaller compared to those calculated for classical CIC filters. identic CIC filter sections. The novel CIC filter functions
The stopband attenuation improvements of new filters over show higher selectivity and higher insertion losses in
the classical CIC filters, calculated for several values of stopband.
parameter L are depicted in Fig. 1. Notice close relation

152
filters are smaller than 1. Because of that, B + 1 -bit format
which reserve 1 bit for sign, 1 bit for integer part and B − 1
bits for the fractional part has been chosen for coefficient
representation.
As examples of affecting the magnitude response of a filter
by coefficient quantization, classical CIC filters and new CIC
FIR low-pass filters with different orders are designed and
different number of bits are considered. Normalized curves are
pictured in Figs. 4-7.

Fig. 2. Comparison of normalized magnitudes in dB:


N = 4 and K = 5 .

The zero locations and their multiplicities are shown in Fig.


3, for case of classical and proposed filters and chosen
parameters N = 6 and K = 10 . CIC filters have N − 1
different zeros with multiplicity K, zr = e j⋅2π ⋅r / N ,
r = 1, 2,..., N − 1 . The number of zeros is ( N − 1) ⋅ K . All zeros
lied on the unit circle, Fig. 3a. New filters have zeros more
evenly distributed as well as their multiplicities reduced, Fig. Fig. 4. Classical CIC filter curves in dB: N = 4
3b.

(a) (b)
Fig. 3. z -plane zero locations with multiplicities: (a) classical filter
and (b) new filter; case N = 6 and K = 10 .

V. COEFFICIENT QUANTIZATION EFFECTS


Fig. 5. Classical CIC filter curves in dB: N = 5
A design of digital filters involves finding the coefficients
of the filter. For computing the coefficients of digital filter,
infinite precision arithmetic is used (the number of digits is
only limited by available memory of the system).
In DSP system, the number of bits in designing a filter is
limited by word length of the register used to store them
(registers have a fixed number of bits). Quantization methods
like rounding and truncating are used to quantize the filter
coefficients to the word size of the register [13], [14].
As it is known, a common filter design tool like MATLAB,
can run the design algorithm and return the filter coefficients.
The designed coefficients have to be converted or quantized to
a fixed-point representation [13]. A signed fixed-point
representation with B + 1 total bits including sign is used here.
Notice that filter coefficients of the novel designed CIC FIR
Fig. 6. New CIC filter curves in dB: N = 4

153
REFERENCES
[1] E. B. Hogenauer, “An Economical Class of Digital Filters for
Decimation and Interpolation”, IEEE Transactions on
Acoustics, Speech and Signal Processing, April 1981, pp. 155-
162.
[2] G. Jovanović Doleček, S. K. Mitra, “A Simple Method for the
Compensation of CIC Decimation Filter”, Electronics Letters,
2008, vol. 44, no. 19, pp. 1162-1163.
[3] J. O. Coleman, “Chebyshev Stopbands for CIC decimation
Filters and CIC-Implemented Array Tapers in 1D and 2D”,
IEEE Trans. on Circuits and Systems I, 2012, vol. 59, no. 12,
pp. 2956-2968.
[4] G. Jovanović Doleček, A. Fernandez-Vazquez, “Novel Droop-
Compensated Comb Decimation Filter with Improved Alias
Fig. 7. New CIC filter curvess in dB: N = 5 Rejections”, Intern. Journal of Electronics and Communications
(AEU), May 2013, vol. 67, no. 5, pp. 387-396.
[5] G. Jovanović Doleček, M. Laddomada, “An Improved Class of
It can be concluded that the quantization of filter Multiplerless Decimation Filters: Analysis and Design”, Digital
coefficients creates a deviation in the frequency response of Signal Processing, 2013, vol. 23, no. 5, pp. 1773-1782.
the filter as seen in Figs. 4-7. Note that if the wordlength B is [6] B. P. Stošić, V. D. Pavlović, “On Design of a Novel Class of
not large enough, there will be undesirable effects. In Selective CIC FIR Filter Functions with Improved Response”,
summary, after coefficient quantization, a filter having a Intern. Journal of Electronics and Communications (AEU),
frequency response diverge from the frequency response of a August 2014, vol. 68, no. 8, pp. 720-729.
filter with unquantized coefficients is obtained. The [7] B. P. Stošić, V. D. Pavlović, “Design of Selective CIC Filter
Functions”, Intern. Journal of Electronics and Communications
quantization effect is more visible and more significant in the
(AEU), December 2014, vol. 68, no. 12, pp. 1231-1233.
stopband area. [8] B. P. Stošić, D. N. Milić, and V. D. Pavlović, “New CIC Filter
Architecture: Design, Parametric Analysis and Some
VIII. CONCLUDING REMARKS Comparisons”, IETE Journal of Research/Institution of
Electronics and Telecommunication Engineers, Taylor &
Francis, vol. 61, no. 3, May-June 2015, pp. 244-250.
In this paper, novel selective CIC filter functions are
[9] B. P. Stošić, V. D. Pavlović, “Using Cascaded Non-Identical
designed based on cascade connection of five successive CIC CIC Sections to Improve Insertion Loss”, Journal of Circuits,
filter sections duplicated an integer number of times. All Systems, and Computers, World Scientific, vol. 24, no. 6, July
designed filters have zeros more evenly distributed and 2015, 19 pages.
located on the unit circle. [10] B. P. Stošić, D. N. Milić, and V. D. Pavlović, "Design and
Closed-forms for the designed filter coefficient computation Properties of New CIC FIR Filter Functions", Proceedings of
are presented. The calculated coefficients have integer values the Romanian Academy, Series A: Mathematics, Physics,
smaller than those of classical CIC filters which are important Technical Sciences, Information Science, vol. 16, no. 4, 2015,
during the hardware realization because of the finite pp. 539-546.
[11] B. P. Stošić, V. D. Pavlović, "Design of New Selective CIC
wordlength effects. In practice, it is reasonable to do
Filter Functions with Passband-Droop Compensation",
coefficient quantization of a single filter and measure the Electronics Letters, 2016, vol. 52, no. 2, January 2016, pp. 115-
effect on its frequency response. Implementing a higher-order 117.
filter requires a higher number of bits for coefficient [12] B. P. Stošić, V. D. Pavlović, “Closed-form Design of New Class
representation. of Selective CIC FIR Filter Functions“, LII International
A classical CIC filter which is a very often used in many Scientific Conference on Information, Communication and
DSP applications can be replaced most directly by suggested Energy Systems and Technologies - ICEST 2017, Serbia, Niš,
CIC filters which still remains the most effective FIR filter June 28-30, 2017, pp. 31-35.
characteristics but have better frequency characteristics. [13] A. V. Oppenheim, R. W. Schafer, Discrete-Time Signal
Processing. Vol. 3, Prentice Hall Englewood Cliffs, NJ, 2010.
[14] B. P. Lathi, R. A. Green, Essentials of Digital Signal
ACKNOWLEDGMENT Processing, Cambridge University Press, 2014.

The Ministry of Education, Science and Technological


Development of the Republic of Serbia has supported this
research.

154
Improvement of Energy Efficiency of PAM Constellation
by Applying Optimal Companding Quantization in
Constellation Designing
Slobodan A. Vlajkov1, Aleksandra Ž. Jovanović2 and Zoran H. Perić3
Abstract – In this paper improvement of energy efficiency for constellation points have the same probability, while
pulse amplitude modulation (PAM) constellation in additive probabilities of constellation points from different subset are
white Gaussian noise (AWGN) channel is considered. different. These requirements we meet by establishing
Conventional PAM constellation with equidistant and analogy between constellation points and representation levels
equiprobable constellation points does not achieve satisfactory
of piecewise uniform scalar quantization. Also, since the
energy efficiency. Considering this fact, it is clear there is a need
to design new PAM constellations with goal to increase energy maximization of energy efficiency comes from Gaussian
efficiency compared to conventional PAM. In order to meet distribution of constellation point probabilities, we suppose
proposed requirement we design PAM constellation by that amplitudes being quantized have Gaussian probability
establishing an analogy with scalar quantization. In particular, density function (pdf). Application of quantization theory in
we perform geometric and probabilistic constellation shaping by constellation design has been also exploited in [6-10]. Unlike
establishing an analogy with piecewise uniform scalar those analyzes, in analysis performed in this paper we paid
quantization obtained through linearization of optimal special attention to quantizer support limit optimization with
compression characteristic. goal to increase energy efficiency of constellation designed by
Keywords – PAM constellation, Energy efficiency, Optimal
establishing analogy with quantization.
companding quantization, Gaussian source.
II. SYMBOL ERROR PROBABILITY OF PIECEWISE
I. INTRODUCTION UNIFORM PAM CONSTELLATION

One of the actual problems in digital communication is Design of PAM constellation is based on definition of two
improvement of constellation energy efficiency [1-5]. The basic elements, the amplitudes and probabilities of
pulse amplitude modulation (PAM) constellation with constellation points. In this paper, we are interested in
equidistant and equiprobable constellation points does not designing PAM constellation consisting of subsets, whereby
achieve satisfactory energy efficiency. On the other side, the probabilities of constellation points within one subset is
energy efficient PAM constellation with non-uniform the same, while the probabilities of the points from different
Gaussian-like distribution of constellation points is too subsets are different. Similar rule holds for amplitudes of
complex. In order to define constellation having higher energy constellation points. Thus, distance between adjacent
efficient than conventional PAM constellation and lower constellation points within subset is constant, while distances
complexity than PAM constellation with non-uniform between adjacent constellation points from different subsets
probabilities of constellation points, in this paper we design are different. In hence, we introduce two indexes i, j. First
PAM constellations by employing both the geometrical and index i is used to define subset of constellation points, while
probabilistic constellation shaping. In particular, we establish second index j is used to define a certain point in subset. Let
an analogy between constellation points and representation the numbers of constellation points in subsets be equal M/L,
levels of scalar quantization to perform geometrical and where M represents the total number of constellation points
probabilistic constellation shaping. and L the number of subsets. Now, we can define
In order to reduce complexity caused by totally different constellation by means of the ordered pairs of values
probabilities of constellation points, we get idea to divide a set {ai,j, Pi = P(ai,j)}, i = 1,...,L, j = −M/(2L)+1,...,0,1,...,M/(2L),
of constellation points into smaller subsets within which where ai,j is the amplitude of constellation point and P(ai,j) is
the probability of occurrence of constellation point. Due to
PAM constellation symmetry, in further investigating we
1Slobodan A. Vlajkov is with University of Niš, Faculty of consider constellation points from positive part of real axis
Electronic Engineering, Aleksandra Medvedeva 14, 18000 Niš, specified with indexes i = 1,...,L, j = 1,...,M/(2L). One can
Serbia, E-mail: vlajkov.slobodan@gmail.com emphasize that there are two special cases of PAM
2Aleksandra Z. Jovanović is with University of Niš, Faculty of
constellation defined above. For L = 1, constellation
Electronic Engineering, Aleksandra Medvedeva 14, 18000 Niš,
represents constellation with equiprobable and equidistant
Serbia, E-mail: aleksandra.jovanovic@elfak.ni.ac.rs
3Zoran H. Perić is with University of Niš, Faculty of Electronic constellation points. For L = M/2, constellation is consisted of
Engineering, Aleksandra Medvedeva 14, 18000 Niš, Serbia, E-mail: non-equprobable and non-equidistant constellation points.
zoran.peric@elfak.ni.ac.rs

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 155


The average power per symbol for piecewise-uniform III. PAM CONSTELLATION DESIGN INSPIRED WITH
constellation is: OPTIMAL COMPANDING SCALAR QUANTIZATION
L M (2 L )

i =1 j =1
( )
a 2 = 2  P a i , j ai2, j , (1) We design PAM constellation by establishing analogy
between PAM constellation and scalar quantization, precisely,
while signal to noise ratio per bit (SNR) in additive white between constellation points and representation levels of
Gaussian noise (AWGN) channel is [1]: piecewise linear companding scalar quantization of
amplitudes having Gaussian pdf with zero mean value and
SNR = 10 log 10
a2
. (2) unit variance [9], [10]:
2
σ log 2 M
n
1  x2 
p (x ) = exp − , − ∞ < x < ∞ . (8)
In channel signal is degraded by adding AWGN sample n, 2π  2
with zero mean value and variance σn2 = N0/2, to useful signal
sample. Then, the sample at the receiver input is r = ai,j + n, We assume that piecewise linear companding scalar
causing that the received sample r has the conditional quantization is obtained by performing linearization of
Gaussian pdf, with the same variance as noise but with mean optimal compression characteristic for Gaussian source. Let
value equal to ai,j.[1]: define piecewise linear compression characteristic on interval
c(x): [−xmax, xmax] →[−xmax, xmax], where xmax is already
( ) 1  r − a i , j ( )2
 mentioned quantizer support limit.
p r ai, j = exp − , − ∞ < r < ∞ . (3) Quantization symmetry gives us opportunity to consider
2π σ n  2σ 2n 
only positive arguments of compression characteristic. If we
As MAP criteria is superior compared to ML criteria [1], [11], declare L as the number of segments of the piecewise linear
we adopt decision rule according to MAP rule: compression characteristic, and ti, i = 1, 2,...,L+1, t1 = 0 and
tL+1 = +∞ as the segment thresholds for positive range of
value, then the i-th segment is defined on [−ti+1, −ti)∪ [ti, ti+1).
( ) ( )
D (r ) = ai , j , if p ai , j r ≥ p a p ,q r , p = 1, L, q = 1,
M
2L
. (4) The linearization of compression characteristic is done in
manner that the linearized characteristic and nonlinear
Due to the symmetry of PAM constellation, we consider compression characteristic have equal values at the segment
thresholds of decision regions noted as: mi,j, i = 1,...,L, thresholds. Since the numbers of representation levels within
j = 1,...,M/(2L)+1, where m1,1 = 0, mL,N/(2L)+1 = +∞, segments are equal, we can define segment thresholds as
mi,N/(2L)+1 = mi+1,1 and from Eq. (4): follows:

a i , j + a i , j −1 xmax
mi , j = , i = 1, , L, j = 2, ,
M c (ti ) = (i − 1) , i = 1,  , L + 1 . (9)
2 2L L

ai ,1 + ai −1,M (2 L ) σ n2 P By solving Eq. (9) per ti we derive an expression for segment


mi ,1 = + ln i −1 , i = 2,, L . (5) thresholds:
2 ai ,1 − ai −1,M (2 L ) Pi
 x 
That led us to following formulation for decision rule: ti = c −1  (i − 1) max , i = 1,  , L + 1 , (10)
 L 
D(r) = ai,j, if mi,j ≤ r < mi,j+1. Now, we have all the necessary
elements to estimate constellation energy efficiency by and after that the expression for the segment width in the
deriving formula for symbol error probability. To do that, we positive part wdi = ti+1 − ti. By taking into consideration that
utilize general expression for error probability [1], [6-11]:
the number of levels within segments is M/L, the
representation levels can be determined by:
L M (2 L )
( [
Pe = 2  P r ∉ mi , j , mi , j +1 y i , j P ai , j
i =1 j =1
) )( )
 1 M
ai , j = t i +  j −  d i , i = 1,, L, j = 1,, (11)
 2  2 L
L M (2 L )
( )
mi , j +1

i =1 j =1
( )
= 1 − 2  P a i , j  p r ai , j dr , (6)
mi , j
where:
wherein we substitute pdf with Eq. (3) to derive expression for wd i 2L
symbol error probability: di = = (ti +1 − ti ), i = 1,, L (12)
M (2 L ) M

L M (2 L )   a i , j − mi , j  m − ai, j 
( )
Pe =   P ai , j erfc

 + erfc i , j +1
 
 , . (7)

Owing to established analogy between representation levels of
i =1 j =1   2σ n   2 σ n  piecewise linear companding scalar quantization and
constellation points of piecewise uniform PAM constellation,
In Eq. (7), erfc( ) represents complementary error function [1]: we actually determine the amplitudes of constellation points
by means of Eqs. (11) and (12). Now, we have to define the
{ }
+∞
erfc(z ) = 2 π  exp − t 2 dt . second key parameter of constellation, the probability of
z

156
occurrence of constellation points. We achieve this by
defining probability of representation levels. We firstly define
the probability that the amplitude with Gaussian pdf belongs
to a certain segment [12]:
t i +1
P (t i ≤ x < t i +1 ) =  p (x )dx =
ti

1  t   t 
= erfc i  − erfc i +1 , i = 1, , L (13)
2   2  2 

After that, by following analogy and assumption of equal


probabilities of constellation points in the subset, we
determine the probabilities of constellation points

P (t i ≤ x < ti +1 ) L   t  t 
( )
P ai , j =
M (2 L )
= erfc i  − erfc i +1
M 
 .
 (14) Fig. 1. For M = 16, SNR = 18 dB and for different numbers of
 2  2  segments, symbol error probability in function of xmax

Now, we specify optimal compression characteristic for TABLE I


amplitudes having Gaussian pdf with zero mean value and OPTIMAL VALUES OF XMAX FOR 16-PAM, 32-PAM, 64-PAM AND
unit variance [12]: DIFFERENT NUMBERS OF SEGMENTS
 x 
1 − erfc  xmaxopt
 6
c(x ) = x max   sgn (x ) (15) M L=2 L=4 L=8 L=16 L=32
 x max  16 2.7 3.7 5 × ×
1 − erfc 

 6  32 2 3.7 5 6 ×
64 2 3.7 5 6 7
Then, linearization of this optimal compression characteristic
we perform by determining segment thresholds from Eq. (10): We also investigate 32-PAM constellation (see Fig. 2) in
the same manner as we investigate 16-PAM. From Fig. 2 we
 1   x  
t i = 6 erfc −1 1 − (i − 1)1 − erfc max  , can conclude that the relations among constellations having
 L   6   (16) L=2, 4, 8, 16 and referent conventional 32-PAM are similar to
i = 1,  , L + 1 above explained observations for 16-PAM. Constellation with
16 subsets has the lowest error probability and thus the
highest energy efficiency, but the complexity of constellation
IV. NUMERICAL RESULTS is also the highest. Thereby the achieved gain in terms of
energy efficiency over constellation with L=8 is far smaller
In this section we describe and explain the obtained than the achieved gains between constellations having L=4
numerical results. We start elaboration with Fig. 1 where for and L=2, L=8 and L=4.
16-PAM constellation and different numbers of subsets L we
present symbol error probability dependence on xmax. We also
present this dependence for referent constellation,
conventional 16-PAM constellation. We can notice that in
comparison with conventional PAM, for xmax values around 1,
all proposed constellations have lower energy efficiency
viewed as achieved symbol error probability for a given SNR.
On the other hand, for values of xmax between 2 and 3
constellation with L=2 has higher energy efficiency than the
conventional PAM, but lower than efficiency of constellations
with L equals to 4 and 8. For xmax values greater than 4,
constellation with L=2 has very poor performances comparing
to other presented constellations in Fig. 1. PAM with L=4 has
wider range of xmax, 2 ≤ xmax ≤,7, wherein error probability is
lower than that of referent constellation. For xmax greater than
Fig. 2. For M = 32, SNR = 25 dB and for different numbers of
2, the most complex constellation having L=8 has the highest
segments, symbol error probability in function of xmax
energy efficiency in comparing with all other constellations.
In Table I we summarize the optimal values of xmax noted in
We perform additional analysis and conclude the optimal
Fig. 1. We also find that the same optimal values for xmax are
values for xmax do not depend on SNR. In Table I, we tabulate
obtained for other values of SNR as well.
the obtained optimal values of xmax for 32-PAM.

157
The results obtained for 64-PAM are presented in Fig. 3. the complexity of constellation having non-equiprobable
The Pe dependence on xmax has the similar behaviour as in constellation points, in this paper we design piecewise
Figs. 1 and 2. As we expet 64-PAM with L=32 has the lowest uniform PAM constellations in terms of distance between
value of Pe, but very closely to Pe value for L=16. In order adjacent constellation points and the probabilities of
words, for L equals 32 the achieved gain in terms of symbol constellation points. One issue of our research is to determine
error probability over constellation having L=16 is the optimal value for xmax subject to symbol error probability, i.e
smallest, wherby the constellation complexity is the highest. subject to energy efficiency. We demonstrate that optimal
Optimal values of xmax for 64-PAM constellation are also values of xmax depend on the number of subsets L, but do not
presented in Table I. It is interesting that in Table I, for L depend on the signal to noise ratio SNR and the total number
equals 4, 8 or 16 the values of xmaxopt are the same for all M. of constellation points M. The obtained results also show that
This points out that xmaxopt depends on the number of subsets, as the number of subsets increases, the symbol error
but does not depend on the total number of constellation probability decreases. On the other hand, by increasing the
points. number of subsets the constellation complexity grows. Beside
this, the gain in energy efficiency obtained by doubling L
decreases as L increases. These findings point out that we
have to be very careful with selection of PAM constellation
parameters.

ACKNOWLEDGEMENT
This research was supported by the Science Fund of the
Republic of Serbia, 6527104, AI- Com-in-AI.

REFERENCES

Fig. 3. For M = 64, SNR = 30 dB and for different numbers of [1] J. G. Proakis, M. Salehi, Digital Communication, McGraw-Hill,
segments, symbol error probability in function of xmax 2008.
[2] L. Jiang et al, “A Novel Multi-level Constellation Compression
Modulation for GFDM-PON”, IEEE Photonics Journal, vol. 11,
For different 16-PAM constelations and corresponding no. 2, pp. 1-11, Art no. 7901611, 2019.
optimal values of xmax, the symbol error probability in [3] X. Wu et al, “A Probabilistic Shaping Method Based on
function of SNR is presented in Fig. 4. From Fig. 4 we can Intrinsic Bit-level Labeling and Asymmetric Polygon
conclude that apart from 16-PAM having L = 2, constellations Modulation for Optical Interconnects”, Optics Communications,
having L=4 and L = 8 are superior in terms of energy vol. 444, pp. 68-73, 2019.
efficiency over convetional 16-PAM. The energy efficiency of [4] Z. Qu, I. Djordjevic, and J. Anderson, “Two-dimensional
16-PAM having L = 2 can be improved by adjusting number Constellation Shaping in Fiber-Optic Communications”,
of constellation points within subsets as it was done in [10]. Applied Sciences, vol. 9, no. 9, Art no. 1889, 2019.
[5] J. Cho, P. Winzer, “Probabilistic Constellation Shaping for
Optical Fiber Communications”, Journal of Lightwave
Technology, vol. 37, no. 6, pp. 1590-1607, 2019.
[6] Z. H. Perić, “Nonlinear Transformation of One-dimensional
Constellation Points in order to Error Probability Decreasing”,
Facta Universitatis, Series: Electronics and Energetics, vol. 11,
no. 3, pp. 291-299, 1998.
[7] Z. H. Perić, S. M. Bogosavljević, “Performance of Nonuniform
PAM Constellations for Gaussian Channel”, Electronics and
Electrical Engineering, vol. 53, no. 3, pp. 27-30, 2004.
[8] Z. H. Perić, N. Milošević, A. Ž. Jovanović, and Z. Nikolić,
“Design of Piecewise Uniform PAM Constellation”, SAUM
2014, Conference Proceedings, pp. 109-111, Niš, Serbia, 2014.
[9] Z. H. Perić, A. Ž. Jovanović, and S. A. Vlajkov, “Comparative
Analysis of Various PAM Constellations”, SAUM 2016,
Conference Proceedings, pp. 27-30, Niš, Serbia, 2016.
Fig. 4. Symbol error probability versus SNR for different [10] S. A. Vlajkov, A. Ž. Jovanović, and Z. H. Perić, “Approach in
16-PAM constellations Companding-Quantization-Inspired PAM Constellation
Design”, IET Communications, vol. 12, no. 18, 2018.
[11] S. A. Vlajkov, A. Ž. Jovanović, and Z. H. Perić, “Comparative
V. CONCLUSION Analysis of ML and MAP Detectors for PAM Constellation in
AWGN Channel”, Facta Universitatis, Series: Electronics and
In order to achieve better energy efficiency of PAM Energetics, vol. 33, no. 2, pp. 217-226, 2020.
constellation than it is the efficiency of conventional PAM [12] N. S. Jayant, P. Noll, Digital Coding of Waveforms, Englewood
constellation and smaller constellation complexity than it is Cliffs, NJ: Prentice-Hall, 1984.

158
The Influence of Compression Parameter μ on the Energy
Efficiency of PAM Constellation Based on μ-law
Companding Quantization
Slobodan A. Vlajkov1, Aleksandra Ž. Jovanović2 and Zoran H. Perić3
Abstract – In literature, design of pulse amplitude modulation companding quantization. In this paper, with the same aim,
(PAM) constellation by establishing an analogy between we investigate PAM constellation design based on
constellation points and representation levels of piecewise establishing an analogy between constellation points and
uniform scalar companding quantizer has been considered with representation levels of piecewise uniform μ-law companding
the aim to outperform the energy efficiency of the conventional
quantization. Similar as in [4], we perform geometric and
PAM constellation with equidistant and equiprobable
constellation points and also with the aim to achieve complexity probabilistic shaping of PAM constellation by using method
lower than the complexity of energy efficient PAM constellation from quantization designing to arrange constellation points.
with non- equidistant and Gaussian-like probability distributed The methods from quantization designing were also used in
constellation points. In this paper a focus is placed on application constellation designing in numerous papers [5-10], where it
of μ-law companding quantization in PAM constellation was shown that quantization designing methods can be
designing. It is noted that the existence of compression efficient tools in constellation designing.
parameter μ provides more sophistic geometric and probabilistic In comparison to PAM constellation designing in [4], PAM
constellation shaping. In particular, a thorough analysis of constellation design based on μ-law companding quantization
influence of compression parameter μ on the energy efficiency of
offers more freedom in constellation designing. Actually, the
PAM constellation is performed with the aim to specify μ that
provides desirable energy efficiency. existence of compression parameter μ provides more sophistic
geometric and probabilistic constellation shaping. Thus in this
Keywords – PAM constellation, Symbol error probability, paper our research is aimed to determine how compression
Energy efficiency, μ-law companding quantization. parameter μ influences performances of PAM constellation.
The constellation performances we measure through
I. INTRODUCTION constellation complexity and energy efficiency i.e. error
probability dependence on signal to noise ratio in additive
Although pulse amplitude modulation (PAM) is the earliest white Gaussian noise (AWGN) channel.
kind of modulation, it still has the wide area of usage.
Namely, PAM is used in Ethernet communication, in photo-
II. PAM CONSTELLATION BASED ON PIECEWISE
biology, in transmission over optical networks [1-3].
However, communication systems increasingly demand better UNIFORM μ-LAW COMPANDING QUANTIZATION
spectral and energy efficiency of transmission techniques.
This motivates us to direct our research on upgrading and Design of our PAM constellation is realized by dividing set
improving PAM constellation. of constellation points into subsets where within one subset
PAM constellation with equidistant and equiprobable distances between adjacent constellation points are same,
constellation points does not satisfy energy efficiency while they are different for different subsets. The similar rule
requirements. On the other side, PAM constellation with non- is adopted for probabilities of occurrence of constellation
equidistant and Gaussian-like probability distributed points. Within one subset the probabilities are the same, while
constellation points is energy efficient but too complex. There the probabilities of constellation points from different subsets
is a need for PAM constellation that outperforms non-uniform are different. Then, the indexes i and j are introduced to
PAM constellation in terms of complexity and conventional denote subset (index i) and to denote constellation point
PAM constellation in terms of energy efficiency. In order to within certain subset (index j). In accordance with this, the
meet these requirements, in [4] we presented PAM constellation point is defined with {ai,j, Pi = P(ai,j)}, i = 1,...,L,
constellation design inspired by piecewise uniform optimal j = −M/(2L)+1,...,0,1,...,M/(2L), where ai,j represents the
amplitude or coordinate of constellation point in one
dimensional space, Pi = P(ai,j) is the probability of occurrence
1Slobodan A. Vlajkov is with University of Niš, Faculty of
of constellation point, M is total number of constellation
Electronic Engineering, Aleksandra Medvedeva 14, 18000 Niš, points and L is total number of subsets. Beside this, equal
Serbia, E-mail: vlajkov.slobodan@gmail.com
2Aleksandra Z. Jovanović is with University of Niš, Faculty of number of constellation points within subsets M/L is assumed.
Electronic Engineering, Aleksandra Medvedeva 14, 18000 Niš, The existence of symmetry in distribution of constellation
Serbia, E-mail: aleksandra.jovanovic@elfak.ni.ac.rs points enable us to focus on the determination of constellation
3Zoran H. Perić is with University of Niš, Faculty of Electronic points on positive part of real axis, i = 1,...,L, j = 1,...,M/(2L)
Engineering, Aleksandra Medvedeva 14, 18000 Niš, Serbia, E-mail: [4].
zoran.peric@elfak.ni.ac.rs

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 159


Now, we can start PAM constellation designing by For symmetric pricewise-uniform PAM constellation, the
establishing analogy between constellation points of PAM average power per symbol is:
constellation and representation levels of piecewise uniform
L M (2 L )
companding scalar quantization. As the main gain in energy
efficiency comes from Maxwell-Boltzmann distribution,
a 2 = 2
i =1
 P (a )a
j =1
i, j
2
i, j . (5)
which is a Gaussian distribution sampled at discrete
amplitudes across a finite amplitude range [11], we presume Then, signal to noise ratio per bit (SNR) in additive white
that amplitudes at the input of scalar companding quantizer Gaussian noise (AWGN) channel is [13]:
used in constellation designing have Gaussian probability
density function (pdf) with zero mean value and unit variance 2a 2
[4-10]. SNR = 10 log10 , (6)
N 0 log2 M
The piecewise uniform companding quantization used in
constellation designing we obtain by performing linearization where N0/2 is AWGN power spectral density.
of μ-law compression characteristic [12]:
Since maximum a posteriori probability (MAP) criteria is
xmax  x  recognized as the best criteria for error probability
c(x ) = ln1 + μ  sgn (x ), x ≤ xmax . (1)
ln (1 + μ )  xmax  minimization [13-15], we consider MAP detection of signal
transmitted through AWGN channel. According to derivation
In Eq. (1) μ is compression parameter and xmax is quantizer conducted in [4], thresholds for decision regions on positive
support limit. If we declare L as the number of segments of
part of real axis are: mi,j, i = 1,...,L, j = 1,...,M/(2L)+1, where
the piecewise linear compression characteristic, and ti, i = 1,
m1,1 = 0, mL,N/(2L)+1 = +∞, mi,N/(2L)+1 = mi+1,1 and
2,...,L+1 as the segment thresholds for positive range of value,
then the i-th segment is defined on [−ti+1, −ti)∪ [ti, ti+1). The ai , j + ai , j −1 M
linearization of compression characteristic is performed in mi , j = , i = 1,  , L, j = 2,  ,
2 2L
such way that nonlinear and linearized compression (7)
characteristics are matched in segment thresholds [4], [8]. ai ,1 + ai −1,M (2 L ) N0 P
mi ,1 = + ln i −1 , i = 2,  , L
Since the numbers of representation levels within segments 2 (
2 ai ,1 − ai −1,M (2 L ) Pi )
are equal, the segment thresholds are:
With Eqs. (3), (4) and (7) all needed elements for estimating
 x  x  1
 symbol error probability of PAM constellation in AWGN
ti = c  (i − 1) max  = max (1 + μ )
−1 (i −1)
L − 1, i = 1,  , L + 1 . (2)
 L  μ  channel are specified. Then, by referring to expressions
derived in [4], the following expression for symbol error
Then, the representation levels uniformly distributed within probability can be formulated:
segments can be determined by:
L M (2 L ) a   − mi , j   mi , j +1 − ai , j 
ai , j =
2 L  1  3 
 j − ti +1 −  j − ti  , i = 1,  , L, j = 1,  ,
M Pe =   P(a )erfc i, j
i, j

N 0 
+ erfc
 N0
  , (8)

M  2 2  2L
i =1 j =1
   

(3)
III. NUMERICAL RESULTS
Based on established analogy between representation levels
and constellation points we actually determinate amplitudes of
In this section, we analyze the influence of compression
constellation points by specifying representation levels of
parameter μ on performances of PAM constellations designed
piecewise uniform companding quantizer with Eqs. (3) and
by establishing analogy with linearized μ-law companding
(2). The second key parameter of constellation, the
quantization. We start our analysis with Fig. 1 where for 16-
probabilities of occurrence of constellation points we
PAM constellation (M = 16) and different numbers of subsets
determine by specifying the probability of representation
L and different values of μ we present symbol error
levels. The probability that the amplitude with Gaussian pdf
probability dependence on xmax. We also present this
belongs to a certain segment is covered in [4], [8]. By
dependence for referent constellation, conventional 16-PAM
following analogy and assumption of equal probabilities of
constellation. From Fig. 1 we can conclude that for all L all
constellation points within the subset, we determine the
PAM constellations having μ values in range from 50 to 255
probabilities of constellation points:
have very poor performances comparing to conventional PAM
constellation. For xmax values ranging from 1 to 4, 16-PAM
P(ti ≤ x < ti +1 ) L   ti   t 
( )
P ai , j =
M (2 L )
= erfc
M 
 − erfc i +1  , (4) constellations having μ=5 also underperforms referent PAM
 2  2  constellation. However, on xmax interval 4≤ xmax ≤10, symbol
error probability decreases as value of xmax increases, whereby
where erfc( ) represents complementary error function constellation performances considerably exceed the
{ }
+∞
erfc(z ) = 2 π  exp − t 2 dt . performances of conventional 16-PAM constellation.
z

160
considerably increases with xmax. The disadvantage which
follows with xmax augmentation is very low values of
probabilities of constellation points for such PAM
constellations. In order to constraint probability of occurrence
of constellation point on value relevant for transmission
through the channel, the appropriate xmax value should be
determined.
In Fig. 3 we show the Pe dependence on SNR for 16-PAM
constellations specified in Table I. As we have previously
stated, from Fig. 3 is evident that the symbol error probability
and thus the energy efficiency can be improved by decreasing
μ and by increasing L. Also, we can see that PAM
constellations having μ = 1 outperform conventional PAM as
well as all other constellations in whole range of SNR and for
all L values. In order to quantify the achieved gain in energy
efficiency, in Table I, for conventional and our PAM
constellations, we tabulate the required SNR values for a
Fig. 1. For M = 16, μ = 5, 50, 255, SNR = 20 dB and for different given symbol error probability. It is seen that to achieve the
numbers of subsets L, symbol error probability in function of xmax symbol error probability equal to 10-6, 16-PAM constellation
having μ = 1 and L = 8 requests the lowest SNR value equal to
We continue our analysis by considering behaviour of 19.8 dB, while conventional PAM constellation needs higher
symbol error probability in function of μ for a given xmax and SNR value (24 dB). In order word, we can state that in
different L (see Fig. 2). From Fig. 2 we can notice that in comparison to conventional PAM constellation our PAM
comparison with conventional PAM, for xmax = 4.2 our constellation specified with μ = 1 and L = 8 achieves gain in
constellations having μ values lower than 5 are superior in energy efficiency equal to ΔSNR = 24 dB − 19.8 dB = 4.2 dB
terms of symbol error probability. It is important to point out for symbol error probability 10-6. This means that by
that constellation with μ = 1 achieves the best results among employing our PAM constellation specified with μ = 1 and
others. From Fig. 2 we can also notice that the symbol error L = 8 the considerably energy saving can be achieved. More
probability decreases with the increase of number of subsets, precisely, if the desired level of symbol error probability
whereby the rate of gain decreases with the increase of L. is 10-6, the useful signal power can be reduced by more than
Since the increase of number of subsets increases double, i.e. by 104.2/10 = 2.63 times.
constellation complexity, the compromise should be made
when the choice of L is in question.

Fig. 3. For M = 16 and different μ and L, symbol error probability


in function of SNR

Fig. 2. For M = 16, xmax = 4.2, SNR = 20 dB and for different From Fig. 3 and Table I we can also draw the following
numbers of subsets L, symbol error probability in function of μ conclusion. For a given μ, it can be noted that for ΔSNR
obtained by doubling L holds: ΔSNRL = 1−ΔSNRL = 2 >
In Fig. 1 the Pe dependence on xmax for 16-PAM ΔSNRL = 2−ΔSNRL = 4 > ΔSNRL = 4−ΔSNRL = 8. For example, for
constellations having μ = 5 and different number of subsets μ=1 holds: ΔSNRL = 1−ΔSNRL = 2 = 3 dB,
shows that gain in decrease of symbol error probability ΔSNRL = 2−ΔSNRL = 4 = 0.9, ΔSNRL = 4−ΔSNRL = 8 = 0.3dB.

161
Actually, benefit achieved by doubling L decreases with ACKNOWLEDGEMENT
increasing L. Besides this, we should have in mind that the
increase of L leads to more complex constellation. All these This research was supported by the Science Fund of the
points out that it should be careful with increasing L. Finally, Republic of Serbia, 6527104, AI- Com-in-AI.
we compare PAM constellation proposed in this paper with
PAM constellation from [4]. The best 16-PAM constellation
from [4] achives symbol error probability equal to 10-6 for REFERENCES
SNR[4] = 22 dB, which means that the gain achieved in energy
efiiciency ΔSNR[4] = 24 dB − 22 dB = 2 dB is smaller than the [1] R. van der Linden, N. C. Tran, E. Tangdiongga, and T. Koonen,
“Optimization of Flexible Non-uniform Multilevel PAM for
gain achieved with PAM constellation based on piecewise
Maximizing the Aggregated Capacity in PON Deployments”,
uniform μ-law companding quantization having μ = 1 and Journal of Lightwave Technology, vol. 36, no. 12, pp. 2328-
L = 8. The achieved gain with PAM constellation specified 2336, 2018.
with μ = 1 and L = 8 is for ΔSNR − ΔSNR[4] = 4.2−2 = 2.2 dB [2] I. N. Osahon, M. Safari, and W. O. Popoola, “10-Gb/s
greater. Transmission over 10-m SI-POF with M -PAM and Multilayer
Perceptron Equalizer”, IEEE Photonics Technology Letters, vol.
TABLE I 30, no. 10, pp. 911-914, 2018.
FOR A GIVEN PE THE REQUIRED SNR OF 16-PAM CONSTELLATIONS [3] Y. Hsu, et all, “2.6 Tbit/s On-chip Optical Interconnect
SPECIFIED FOR DIFFERENT μ AND DIFFERENT L (SNR* IS THE Supporting Mode-division-multiplexing and PAM-4 Signal”,
REQUIRED SNR OF CONVENTIONAL 16-PAM CONSTELLATION, IEEE Photonics Technology Letters, vol. 30, no. 11, pp. 1052-
ΔSNR = SNR* − SNR) 1055, 2018.
[4] S. A. Vlajkov, A. Ž. Jovanović, and Z. H. Perić, “Improvement
of Energy Efficiency of PAM Constellation by Applying
μ L xmax Pe SNR [dB] SNR* [dB] ΔSNR [dB]
Optimal Companding Quantization in Constellation Designing”,
2 21 3 ICEST 2020, Niš, Serbia, 2020.
1 4 20.1 3.9 [5] Z. H. Perić, “Nonlinear Transformation of One-dimensional
8 19.8 4.2 Constellation Points in order to Error Probability Decreasing”,
2 23.4 0.6 Facta Universitatis, Series: Electronics and Energetics, vol. 11,
3.7 10-6 24 no. 3, pp. 291-299, 1998.
3 4 22.8 1.2
[6] Z. H. Perić, S. M. Bogosavljević, “Performance of Nonuniform
8 22.7 1.3 PAM Constellations for Gaussian Channel”, Electronics and
2 25.1 −1.1 Electrical Engineering, vol. 52, no. 3, pp. 27-30, 2004.
5 4 24.6 −0.6 [7] Z. H. Perić, A. Ž. Jovanović, S. A. Vlajkov, “Comparative
8 24.6 −0.6 Analysis of Various PAM Constellations”, SAUM 2016,
Conference Proceedings, pp. 27-30, Niš, Serbia, 2016.
[8] S. A. Vlajkov, A. Ž. Jovanović, and Z. H. Perić, “Approach in
IV. CONCLUSION Companding-quantization-inspired PAM Constellation Design”,
IET Communications, vol. 12, no. 18, pp. 2305-2314, 2018.
[9] I. B. Đorđević, A. Ž. Jovanović, M. Cvijetić, and Z. H. Perić,
In order to outperform conventional PAM constellation in “Multidimensional Vector Quantization-based Signal
terms of energy efficiency and to achieve lower constellation Constellation Design Enabling Beyond 1 Pb/s Serial Optical
complexity than it is complexity of constellation with non- Transport Networks”, IEEE Photonics Journal, vol. 5, no. 4,
equidistant and non-equiprobable constellation points, we 2013.
proposed method for designing piecewise uniform PAM [10] I. B. Đorđević, A. Ž. Jovanović, Z. H. Perić, and T. Wang,
constellation based on piecewise uniform μ-law companding “Multidimensional Optical Transport Based on Optimized
quantization. The main issue of this paper is to determinate μ Vector-quantization-inspired Signal Constellation Design”,
IEEE Transactions on Communications, vol. 62, no. 9, pp.
value that provides desirable energy efficiency. We
3262-3273, 2014.
demonstrate that the PAM constellations with values for μ [11] F. R. Kschischang, S. Pasupathy, “Optimal Nonuniform
greater than 5 are not suitable solutions. On the other hand, Signaling for Gaussian Channels”, IEEE Transaction on
PAM constellation with values for μ smaller than 5 Information Theory, vol. 39, no. 3, pp. 913–929, 1993.
outperforms conventional PAM constellation in terms of [12] N. S. Jayant, P. Noll, Digital Coding of Waveforms, Englewood
energy efficiency. In comparison to conventional PAM Cliffs, NJ: Prentice-Hall, 1984.
constellation, the energy efficiency gain is up to 4.2 dB for the [13] J. G. Proakis, M. Salehi, Digital Communications, McGraw-
symbol error probability equal to 10-6. This means that it is Hill, 2008.
possible to reduce the signal power by more than half [14] S. A. Vlajkov, A. Ž. Jovanović, and Z. H. Perić, “Comparative
Analysis of ML and MAP Detectors for PAM Constellation in
simultaneously retaining symbol error probability. If we
AWGN Channel”, Facta Universitatis, Series: Electronics and
constraint constellation complexity on two subsets, the energy Energetics, vol. 33, no. 2, pp. 217-226, 2020.
efficiency gain is also considerable and amounts up to 3dB. [15] A. Alvarado, E. Agrell, and F. Brannstrom, “Asymptotic
Comparison of ML and MAP Detectors for Multidimensional
Constellations”, IEEE Transactions on Information Theory, vol.
64, no. 2, pp. 1231-1240, 2018.

162
How Initialization is Related to Deep Neural Networks
Generalization Capability: Experimental Study
Ljubinka Sandjakoska1 and Frosina Stojanovska2
Abstract – Deep learning has lately received significant and pooling, full connection operations, batch normalization,
research effort, considering its capabilities followed by the etc. The chain of transformations of inputs to outputs forms a
advantages in many domains. The focus of this paper is on credit assignment path (CAP) depth. If the CAP is bigger than
improving the generalization ability, which is a key for successful 2 than we have deep processing which allows deep learning.
implementation of deep neural networks. In order to answer the
A very important aspect of deep learning is that the layers of
question how initialization is related to the deep neural networks'
generalization capability, an experimental study is done. The features are not designed by human engineers; they are
study consists of several experiments, which belong to the data- learned from data using a general-purpose learning procedure.
independent initialization techniques. Using different The key concept is the depth of the model, which allows the
approaches, the change of generalization gap is presented. model to learn data representations with multiple levels of
abstraction.
Keywords – Deep learning, Initialization, Regularization, The remainder of this paper is organized as follows. Section
Generalization. II presents the theoretical insights of initialization and
regularization, with its state-of-the-art methods. Experimental
I. INTRODUCTION design of this study is presented in Section III, where the
description of the dataset, the experimental setup and
Deep learning has lately received significant research evaluation measures are included. The obtained results from
effort, since its capabilities, followed by its application the experimentation and discussion are in the next section. In
advantages in many domains. The concept of deep learning the end, the concluding remarks are given.
realized in neural networks, is implemented in a variety of
domains, such as: image [1-3], audio [7-8] and video II. THEORETICAL INSIGHTS
processing [9-10], natural language processing [4], [6],
automatic machine translation [5], [11], fraud detection [12-
13], in healthcare - personalized medicine, advanced A. Initialization
diagnosis, drug discovery [14-19], advertising [20] and
finance [21], social media [22-23], cybersecurity [24-26], etc. Initialization of Deep Neural Networks (DNNs) is a starting
The paradigm of deep learning usually is defined as point of the learning process. The mechanism which
hierarchical learning, where complex nonlinear functions are determines the basic network parameters’ behavior is known
used. Learning distributed and hierarchical representation of as initialization. Initialization is based on creating a pattern for
distinctive data features is allowed by the ability of knowledge assigning values for the basic deep networks parameters –
extraction from row data. The in-depth processing does not weights and biases. The learning process and the numerical
indicate the data size, but the model (neural network) size, in stability of the network depend on the values of these
terms of the number of hidden layers of neurons - processing parameters. Hence, initialization gives the difference between
units. Theoretically, deep learning follows connectionism the network that converge in reasonable time and the network
philosophy. According to that, the individual biological whose loss function does not change even with hundreds of
neuron or the individual feature in the machine learning model thousands of iterations. Finding an appropriate range for the
is not intelligent by itself, but a large population of neurons or weights protects the deep network from training with too
features acting together can exhibit intelligent behavior. small or too high values. Both situations cause a problem, and
The intelligent behavior of deep neural networks relies on the signal is not allowed to reach the deep layers. If the
the sequential operations on input data, that are realized in the weights are too small, then the signal decreases as it passes
hidden layers of neurons. Standard machine learning through each layer of the network, until it is too small to be
operations: initialization, activation, training, testing, error useful. This means that the network will learn slowly. If the
calculation and back-propagation are included, followed by weights in the network start too high, then the signal grows as
more advanced such as recursive application of convolution it passes through each layer until it is too large to be useful for
the divergence of the network.
Generally, the initialization strategies can be group into
1Ljubinka Sandjakoska is with Faculty of Computer Science and initialization with zeros or other constant, and initialization
Engineering, UIST “St. Paul the Apostle”, Ohrid, Republic of North with random numbers. First, by eliminating weights the deep
Macedonia, E-mail: ljubinka.gjergjeska@uist.edu.mk
2Frosina Stojanovska is with Faculty of Computer Science and model is reduced to a linear model since the derivative of the
Engineering, UKIM, Skopje, Republic of North Macedonia, E-mail: loss function is the same for all weights in each subsequent
frosina.stojanovska@finki.ukim.mk iteration. It is important to note that, unlike weights, if the

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 163


biases are 0, there will be no problem and the values for each loss function. The regularization term is independent of
neuron will be different, but the symmetry will also be the targets and does encoding of other properties to
disturbed. Initialization of random numbers leads to the two provide assumptions about the mapping other than the
consistency of outputs with targets.
previously mentioned problems of too low or high weights
known as the vanishing gradients of the activation function
and the exploding gradients. These, in turn, are often III. EXPERIMENTAL DESIGN
associated with deep network optimization. Although the
differences between the optimization and regularization are To answer the question How the initialization is related to
out of the scope of this paper, we will emphasize that Deep Neural Networks Generalization capability experimental
initialization is one of its junctions’ points. study is done. The study consists of several experiments, that
Depending on the amount of information derived from belong to the data-independent initialization techniques. For
available data, weight initialization techniques are divided the purpose of this research we have tested DNNs initialized
into three main groups: Data Independent, Data Dependent, by: Uniform, Normal, Lecun Uniform and Lecun Normal
and Pre-Training approaches. According to this classification, [31], [32], Xavier Uniform and Xavier Normal [33], Kaming
for this paper, we work with data independent techniques. Uniform and Kaming Normal [37].
Namely, we do not make use of any training data to determine The main task of this experimental study is a quantum
the initial parameter values of a network, but we work by chemistry problem - prediction of potential energy surfaces
sampling numbers from different distributions and using such experiments. For that purpose, SchNet model is applied.
numbers as the initial values. SchNet is a convolutional network with continuous
In this experimental study are used the following convolutional filters designed to model the quantum
initialization strategies: Uniform, Normal, Lecun Uniform and interactions in molecules [27]. The network architecture is
Lecun Normal [31], [32], Xavier Uniform and Xavier Normal consisting of input module that includes molecular descriptors
[33], Kaming Uniform and Kaming Normal [34]. The uniform - vector of nuclear charges and an inter-atomic distance
method is an initialization technique where the weights are matrix, which forms 128 embedding, for every feature. The
derived from uniform distribution with -0.05 and 0.05 as number of features is 128. The input module is followed by 6
bounds. The normal strategy sets the weights from normal interaction modules. The interactions depend on the current
distribution with mean and standard deviation. The Lecun, atom representation, and according that - convolutional filters
Xavier and Kaiming methods use a scale factor defined as: are created. Actually this block consists of continuous-filter
= , (1) convolution with filter-generating network with dimension
64x. The shifted softplus activation, defined as ln(0.5ex + 0.5),
= , (2) is also part of this module. Specifically, this architecture is not
( )/
= , (3) using weight sharing across multiple interaction blocks, but
residual connection. The total number of trained weighs is
where fanin is the number of input units and fanout is the 447488. The output module is formed by neurons for the
number of output units in the weight tensor. property U0. This deep learning model is used in the
experiments for testing the importance of different
B. Generalization Ability of the Network initialization techniques for the learning process and
generalization capability. The problem is to predict the total
The regularization of DNNs is one of the key concepts that energy of a molecule U0, which represents the sum of atomic
determine the success in terms of its’ effectiveness and energy contributions of the atoms in the molecule [28].
efficiency. Regularization techniques arise as solutions to the
problem of overfitting. This problem occurs in cases such as: A. Dataset Benchmark
over parameterization of the DNN or small training set.
Overfitting results in decreasing the generalization ability The benchmark dataset is the QM9 dataset [29]. This
of the network. If the DNN can give good performance not dataset contains 133,885 organic molecules with chemical
only on training data but also on new, previously unseen data, potentials and energies. The total energy of the molecules is
then we can say that the DNN has good generalization ability. defined as the property U0. The dataset is randomly separated
Improving the generalization capability can be done using into a train set with 70% of the molecules (94,000 molecules),
different regularization strategies. According to Kukavckas’ et validation set with 15% (20,000 molecules) and test set with
al. taxonomy [30], the regularization strategy can be via: data, the remaining 15% (19,885 molecules).
the network architecture, the error function, the regularization
term and via optimization. In the research scope of this paper
the regularization is done implicitly, by working with the data. B. Experimental Setup and Evaluation Measures
The main idea is to see what will be the effect of initialization
on error function and loss function, without using some Training and testing of the model was done with the Google
explicit regularization method. The error function Colab, the product by Google Research, specifically with
expresses consistency of outputs with targets. Classical Python 3 Google Compute Engine (Tesla P4 GPU, Intel Xeon
approaches of regularization strategies work with CPU 2.00GHz, 13GB memory). Each experiment was
regularization term or adding a regularizer into the executed for 50 epochs, which lasted about 2 hours. The

164
SchNet model was trained with 0.0001 learning rate, and an TABLE I
exponential learning rate decay with ratio 0.96. As optimizer MAE AND RMSE OF THE ENERGY U0 PREDICTIONS IN KCAL/MOL FOR
ADAM is used. The loss function for training is the mean THE TRAIN SET (TRAIN), VALIDATIONS SET (VAL) AND TEST SET (TEST)
WITH ALL OF THE INITIALIZATION TECHNIQUES
squared error (MSE) in kcal/mol. The batch size is 100, the
both beta arguments are 0.5, and the cut off function is cosine.
To evaluate the accuracy of predicted total energy of the
model, mean absolute error (MAE) and root mean squared
error (RMSE) in kcal/mol were used.

IV. RESULTS AND DISCUSSION


The results from the experiments show that the
initialization technique can be critical for the model’s ultimate
performance. Table I holds the values of MSE and RMSE
values in kcal/mol for testing of each model on the train set,
validation set and test set. From these results, it is notable that
the generalization of the models is preserved for all models,
i.e. the validation set, and test set have values that do not
differ for big difference rate from the performance of the train
set. The uniform and normal distributions with the Lecun and
Xavier settings stand out as better initialization techniques.
Figure 1 depicts the impact on the learning process of the
models with different initializations, by showing the training
loss and validation loss curves, as well as the curve of MAE
values. From these curves, it is notable that the Kaiming and
Kaiming normal techniques are the worst initializations. For
these models, it takes more time to reach the standard values
set by the other models. Lecun and Xavier have a similar
learning process with both uniform and normal variants.
The standard normal and uniform initializations have an
average performance compared to the other initializations. In
the epochs close to 50, the differences become very small, this
drives the conclusion that the number of epochs also depends
on the initialization technique. Hence, if the model is trained
for only 20 epochs, then the Xavier and Lecun initializations
terminate with a model with more prominent generalization
and learning capability than the other methods. Here should
be mentioned that, our aim is to obtain loss less than 0.1 for
not more than the half of the total number of epochs, or 25.

V. CONCLUSION

Using experimental study, we try to depict the influence of


the initialization techniques on regularization. The main
contribution of this paper is the experimentation in atomistic
simulations. Best to our knowledge, a lot of research effort in
developing DNNs is put in domains such as computer vision
or text processing but is missing developing deep learning
methods specified for chemo-informatics. Usually in this kind
of applications, general purpose procedures for initialization
and regularization are used. We believe that more domain-
specialized deep learning approaches will give better results.

REFERENCES
[1] A. Karpathy, L. Fei-Fei, “Deep Visual-Semantic Alignments for
Generating Image Descriptions”, Proceedings of the IEEE Fig. 1. a) Train loss, b) Validation loss,
c) RMSE for predicting Energy U0 in kcal/mol

165
Conference on Computer Vision and Pattern Recognition, pp. [17] C. Angermueller, H. J. Lee, W. Reik, and O. Stegle, “DeepCpG:
3128-3137, 2015. Accurate Prediction of Single-Cell DNA Methylation States
[2] J. Donahue, L. A. Hendricks, S. Guadarrama, M. Rohrbach, Using Deep Learning”, Genome Biology, vol. 18, no. 1, pp.
S. Venugopalan, K. Saenko, and T. Darrell, “Long-Term 1-13, 2017.
Recurrent Convolutional Networks for Visual Recognition and [18] B. Ramsundar, S. Kearnes, P. Riley, D. Webster, D. Konerding,
Description”, Proceedings of the IEEE Conference on Computer and V. Pande, “Massively Multitask Networks for Drug
Vision and Pattern Recognition, pp. 2625-2634, 2015. Discovery”, arXiv preprint arXiv:1502.02072, 2015.
[3] J. Hwang, Y. Zhou, “Image Colorization with Deep [19] D. Quang, Y. Chen, and X. Xie, “DANN: A Deep Learning
Convolutional Neural Networks”,Stanford University, Tech. Approach for Annotating the Pathogenicity of Genetic
Rep. 2016. Variants”, Bioinformatics, vol. 31, no. 5, pp. 761-763, 2015.
[4] T. Young, D. Hazarika, S. Poria, and E. Cambria, “Recent [20] H. Zhang, Y. Ji, W. Huang, and L. Liu, “Sitcom-Star-Based
Trends in Deep Learning Based Natural Language Clothing Retrieval for Video Advertising: A Deep Learning
Processing”, IEEE Computational Intelligence Magazine, vol. Framework”, Neural Computing and Applications, vol. 31, no.
13, no. 3, pp. 55-75, 2018. 11, pp. 7361-7380, 2019.
[5] J. Zhang, C. Zong, “Deep Neural Networks in Machine [21] J. B. Heaton, N. G. Polson, and J. H. Witte, “Deep Learning in
Translation: An Overview”, IEEE Intelligent Systems, no. 5, pp. Finance”, arXiv preprint arXiv:1602.06561, 2016.
16-25, 2015. [22] Z. Zhang, Q. He, J. Gao, and M. Ni, “A Deep Learning
[6] A. R. Sharma, P. Kaushik, “Literature Survey of Statistical, Approach for Detecting Traffic Accidents from Social Media
Deep and Reinforcement Learning in Natural Language Data”, Transportation Research Part C: Emerging Technologies,
Processing”, Proceedings of IEEE International Conference on vol. 86, pp. 580-596, 2018.
Computing, Communication and Automation, pp. 350-354, [23] M. K. Hayat, A. Daud, A. A. Alshdadi, A. Banjar, R. A. Abbasi,
2017. Y. Bao, and H. Dawood, “Towards Deep Learning Prospects:
[7] H. Purwins, B. Li, T. Virtanen, J. Schlüter, S. Y. Chang, and T. Insights for Social Media Analytics”, IEEE Access, vol. 7, pp.
Sainath, “Deep Learning for Audio Signal Processing”, IEEE 36958-36979, 2019.
Journal of Selected Topics in Signal Processing, vol. 13, no. 2, [24] S. Mahdavifar, A. A. Ghorbani, “Application of Deep Learning
pp. 206-219, 2019. to Cybersecurity: A Survey”, Neurocomputing, vol. 347, pp.
[8] B. Chen, W. Luo, and D. Luo, “Identification of Audio 149-176, 2019.
Processing Operations Based on Convolutional Neural [25] P. Viswanath, “A Study on Deep Learning in Cyber Security”,
Network”, Proceedings of the 6th ACM Workshop on International Journal of Engineering Science, vol. 9, no. 4, pp.
Information Hiding and Multimedia Security, pp. 73-77, 2018. 21482-21483, 2019.
[9] W. Zhang, L. Xu, Z. Li, Q Lu, and Y. Liu, “A Deep-Intelligence [26] A. A. Diro, N. Chilamkurti “Distributed Attack Detection
Framework for Online Video Processing”, IEEE Software, vol. Scheme Using Deep Learning Approach for Internet of Things”,
33, no. 2, pp. 44-51, 2016. Future Generation Computer Systems, vol. 82, pp. 761-768,
[10] S. Zhang, X. Pan, Y. Cui, X. Zhao, and L. Liu, “Learning 2018.
Affective Video Features for Facial Expression Recognition via [27] K. Schütt, P. J. Kindermans, H. E. S. Felix, S. Chmiela, A.
Hybrid Deep Learning”, IEEE Access, vol. 7, pp. 32297-32304, Tkatchenko, and K. R. Müller, “Schnet: A Continuous-Filter
2019. Convolutional Neural Network for Modeling Quantum
[11] M. R. Costa-Jussà, A. Allauzen, L. Barrault, K. Cho, and H. Interactions”, Advances in Neural Information Processing
Schwenk, “Introduction to the Special Issue on Deep Learning Systems, pp. 991-1001, California, USA, 2017.
Approaches for Machine Translation”, Computer Speech & [28] K. T. Schütt, F. Arbabzadah, S. Chmiela, K. R. Müller, and A.
Language, vol. 46, pp. 367-373, 2017. Tkatchenko, “Quantum-Chemical Insights from Deep Tensor
[12] X. Zhang, Y. Han, W. Xu, and Q. Wang, “HOBA: A Novel Neural Networks”, Nature Communications, vol. 8, no. 1, pp. 1-
Feature Engineering Methodology for Credit Card Fraud 8, 2017.
Detection with a Deep Learning Architecture”, Information [29] R. Ramakrishnan, P. O. Dral, M. Rupp, and O. A. Von
Sciences, 2019. Lilienfeld, “Quantum Chemistry Structures and Properties of
[13] A. Roy, J. Sun, R. Mahoney, L. Alonzi, S. Adams, and P. 134 Kilo Molecules”, Scientific Data, vol. 1, no. 1, pp.1-7,
Beling, “Deep Learning Detecting Fraud in Credit Card 2014.
Transactions”, Proceedings of Systems and Information [30] J. Kukačka, V. Golkov and D. Cremers, “Regularization for
Engineering Design IEEE Symposium (SIEDS), pp. 129-134, Deep Learning: A Taxonomy”, arXiv preprint
2018. arXiv:1710.10686, 2017.
[14] R. Fakoor, F. Ladhak, A. Nazi, and M. Huber, “Using Deep [31] Y. A. LeCun, L. Bottou, G. B. Orr, and K. R. Müller, “Efficient
Learning to Enhance Cancer Diagnosis and Backprop”, Neural Networks: Tricks of the Trade, pp. 9-48,
Classification”, Proceedings of the International ACM Berlin, Heidelberg, 2012.
Conference on Machine Learning, vol. 28, New York, USA, [32] G. Klambauer, T. Unterthiner, A. Mayr, and S. Hochreiter,
2013. “Self-Normalizing Neural Networks”, Advances in Neural
[15] A. Mansoor, J.J. Cerrolaza, R. Idrees, E. Biggs, M. A. Alsharid, Information Processing Systems, pp. 971-980, California, USA,
R. A. Avery, and M. G. Linguraru, “Deep Learning Guided 2017.
Partitioned Shape Model for Anterior Visual Pathway [33] X. Glorot, Y. Bengio, “Understanding the Difficulty of Training
Segmentation”, IEEE Transactions on Medical Imaging, vol. 35, Deep Feedforward Neural Networks”, Proceedings of the
no. 8, pp.1856-1865, 2016. Thirteenth International Conference on Artificial Intelligence
[16] D. Nie, H. Zhang, E. Adeli, L. Liu, and D. Shen, “3D Deep and Statistics, pp. 249-256, Sardinia, Italy, 2010.
Learning for Multi-Modal Imaging-Guided Survival Time [34] K. He, X. Zhang, S. Ren, and J. Sun, “Delving Deep into
Prediction of Brain Tumor Patients”, Proceedings of Rectifiers: Surpassing Human-Level Performance on Imagenet
International Conference on Medical Image Computing and Classification”, Proceedings of the IEEE International
Computer-Assisted Intervention, Springer, Cham, pp. 212-220, Conference on Computer Vision, pp. 1026-1034, Santiago,
2016. Chile, 2015.

166
Using Neural Networks Application for the Font
Recognition Task Solution
Oleksii Bychkov1, Kateryna Merkulova2, Georgi Dimitrov3, Yelyzaveta Zhabska4,
Iva Kostadinova5, Pepa Petrova6, Pavel Petrov7, Iglika Getova8 and Galina Panayotova9
Abstract – The purpose of the paper is research and set, designed for displaying these characters (the text in
development of font visual classification system, that will allow particular) by the operating system or the program. Every font
users to work with fonts more effectively, specifically with the has its slope, weight (100-900), and one of the basic
use of the required font fetching on pre-screening, employment typefaces: Serif, Sans-Serif, Decorative, Script. There is an
of the wide range of filters and font management tools
enormous number of fonts, but the standard of their
application.
There were reviewed basic fonts classification approaches with classification still wasn’t developed. Fonts with a common
the definition of pivot advantages and disadvantages. After subfamily name often considerably distinct from each other
assessing these approaches, it was decided to deploy neural by slope as much as by weight. In cases when development of
network with the font symbols images as an input. all weight types is not needed, the authors of the font families
As a result, neural networks driven computer fonts create what is known as “shifts” - when actual font weight
classification system, that allows to classify fonts by slope, basic corresponds to another weight. Also, author often names the
style and weight according to their graphical representation, was font as Regular after developing the single font in the sub-
developed and integrated into the font organizer. High family regardless of the font type. The lack of the
classification accuracy of the developed neural network model
classification standard causes the problem of font search and
was confirmed by control tests. Percentage of correctly classified
fonts during the system testing reaches 91% in determining selection.
weight, 92% in determining basic style, 96% in determining
slope. The developed system can be applied to tasks of fonts II. PROBLEM DEFINITION AND SOLUTION
classification solution as supplement for digital documents METHODS
structure determination, and as system of font selection for
design creation. Classification task consists of 3 sub-problems: recognition
Keywords – Convolutional neural network, Machine learning, of “basic” slope, classification by weight, classification by
Image classification, Font classification. style.
It is possible to apply a simple approach to determine the
I. INTRODUCTION font’s weight: there can be calculated the number of black
pixels in the image and font can be assigned to the closest
The computer font is a file that contains description of class by this sum (the average value).
alphabetical, digital, reserved or pseudo-graphic characters However, in the process of analyzing the fonts it was found
that font weight more depends on image edges rather than
1Oleksii Bychkov is with Taras Shevchenko National University number of black pixels. Those are outlined fonts with inside
of Kyiv, Kyiv, Ukraine, E-mail: bos.knu@gmail.com hollow edges. This issue can be resolved using the Edge
2Kateryna Merkulova is with Taras Shevchenko National
Detection methods. An attempt to apply them was made. The
University of Kyiv, Kyiv, Ukraine. E-mail: kate.don11@gmail.com result of symbol image processing with the use of
3Georgi Dimitrov is with University of Library Studies and
convolutional matrix is shown in Fig. 1.
Information Technologies, Sofia, Bulgaria, E-mail:
geo.p.dimitrov@gmail.com
4Yelyzaveta Zhabska is with Taras Shevchenko National

University of Kyiv, Kyiv, Ukraine, E-mail: y.zhabska@gmail.com


5Iva Kostadinova is with University of Library Studies and

Information Technologies, Sofia, Bulgaria, E-mail:


i.kostadinova@unibit.bg
6Pepa Petrova is with University of Library Studies and

Information Technologies, Sofia, Bulgaria, E-mail:


p.petrova@unitbit.bg
7Pavel Petrov is with University of Economics, Varna, Bulgaria, Fig. 1. The result of symbol image processing with the use of
Edge Detection and convolutional matrix methods
E-mail: petrov@ue-varna.bg
8Iglika Getova is with University of Library Studies and

Information Technologies, Sofia, Bulgaria, E-mail:


i.getova@unibit.bg Fig. 2. Variations of an “a” symbol
9Galina Panayotova is with University of Library Studies and

Information Technologies, Sofia, Bulgaria, E-mail:


g.panayotova@unibit.gb

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 167


Used methods are not sufficient since they don’t consider formula: f(x)=max(0,x). In the research [7], [8] described that
the width of the symbol, as the study results show. Some fonts ReLU activation function can increase the stochastic descent
have combined edges that are difficult to interpret as well, so gradient convergence speed by factor 6 in comparison to
these fonts can be classified only based on patterns of human hyperbolic tangent and sigmoid function.
symbol perception. Softmax function was used for the last layer, that is
The most difficult of the sub-problems is the task of style confidence of belonging to one of the classes depends on
classification. Because of the reason, that the vast number of confidence in other classes. It can be described by the formula
different fonts are complicated to describe by basic distinct with the following:
features, the font can be classified to a certain style (Fig. 2).
It was decided to apply machine learning methods, =∑ , (1)
specifically neural networks, considering the tasks complexity
where zi is i-th neuron input value; yi is output i-th neuron
and the problem of the unassisted various font classes features
value.
description. Neural networks are the most frequently exploited
The function categorical_crossentropy was used for the
image classification problems algorithm, because it
error determination. It is used for Multi Class classification,
demonstrates the best pattern recognition and classification
when the only one class can belong to the font. The following
results among other algorithms [1], [2].
formula defines this function:
After analyzing of how various font styles design differs, it
was decided to use Convolutional Neural Network. This , = −∑ , (2)
network provides an opportunity to recognize fonts features where p and q are values of expected and received results.
irrespective of position and deformation – it selects important Weight update was performed with the adaptive learning
classification patterns, such as feature maps and filters, taking rate method, that is Adadelta algorithm. It considers weight
into account correct supervisor responses [3], [4]. update and gradient values history. During the training on
For the reason of the wide range of symbol variations by simplified data sample, it demonstrates faster convergence in
size and design, the use of typical Multi Layer Perceptron comparison with the regular SGD. In Fig. 4 neural network
(MLP) network would lead difficultness in high accuracy model is presented.
classification. Also, it requires big neurons number
construction, and, as a result, power efficiency.
Slope classification task, that is the case of font belonging
to Italic type, firstly was tried to decide with the application of
MLP network, that solved the problem with the high accuracy.
Nevertheless, under continued data increasing with more
complex Script style fonts, network was reducing its accuracy. Fig. 4. Neural network model for style classification
It was resolved with the including the CNN network as well
(Fig. 3). TABLE I
IMAGE OPERATIONS

Operation Allowability of applying

Allowable for all sub-tasks, except


Rotate
for slope determination
Fig. 3. Loss function values during MLP network training before and Allowable for all sub-tasks, except
after Script type fonts inclusion Scale
for weight determination

III. EXPERIMENTAL RESEARCH RESULTS AND Horizontal flip Allowable for all sub-tasks
ANALYSIS Vertical flip Allowable for all sub-tasks
Designing and training of the network were performed with Vertical and Horizontal
the use of Keras Python library. It was decided to apply the Allowable for all sub-tasks
flip at the same time
sequential layer combinations method: Conv > Conv >
Shift, Wrap Non-allowable for all sub-tasks
MaxPooling; it is inspired by “VGG NET” architecture, that is
one of the most accurate networks for the present [5], [6]. Size
and number of kernels were defined for every task Font classification by slope was performed with the use of
individually with priority given to classification accuracy, that “IW” symbols, and font classification by weight and style –
must consist over 90%. It was established, during the testing with the use of “RoWGa”. These symbols appropriately
stage, that slope classification with the 5x5 sized Conv layers represent the typical features of corresponding classes, as was
8 kernels and 3x3 sized 16 kernels for classification by weight established during analytical research. Corresponding image
and style demonstrates the highest results. sizes are 90х36 and 350х36.
For all layers, except for the last one, ReLU activation During the research, the basic image operations were
function was used. This function can be defined by following studied and their applying possibilities for data augmentation
were determined [9], [10].

168
Rotate and Scale operations are applicable for several data TABLE III
samples, however the usage of these operations assumes SAMPLES DATA AMOUNT AND THE NETWORK TRAINING RESULT
image palette enlargement to prevent the loss of fonts
features. This will cause the required power supply increasing, Neural network
Style Confidence
that is not appropriate for tasks with limited computer activation
resources.
In the process of testing there were prepared and classified
the following number of fonts: 826 fonts were classified by Script 0.54
style, 664 – by weight, 1128 – by slope. Image generation and
execution of operations for image number augmentation and
data balancing provided the following results: 12754 images Decorative 0.46
were classified by style with the use of 3 mirroring and letter
reordering types; 12074 images were classified by weight the
same way; 4628 images were classified by slope with the use Serif or Sans-
0.0
of size modification and letter reordering. serif
Neural network training example is depicted in Fig. 5.
Figure demonstrates that network was trained correctly, TABLE IV
validation loss value and training loss value are close, that WIREONE SANS-SERIF FONT ANALYZING WITHOUT GUIDED
means retraining effect wasn’t revealed. Also, the stochastic BACKPROPAGATION
gradient descent appliance can be seen on the graph. Because
of validation loss curve, that roll down in the figure, it can be Confid
concluded that configuration is advantageous. Table 2 Style Neural network activation
ence
contains the Loss and Accuracy functions values for every
data sample.
Serif 0.02

Sans-serif 0.44

Decorative 0.22

Fig. 5. Loss and Accuracy functions graph during the training of Script 0.33
classification by style

TABLE II TABLE V
SAMPLES DATA AMOUNT AND THE NETWORK TRAINING RESULT OVERPASS THIN ITALIC FONT ANALYZING WITHOUT GUIDED
BACKPROPAGATION
Traini
Test
Trainin ng loss_t acc_t loss_te acc_t
g type image
image
rain rain st est Neural network
s Style Confidence
s activation
By style 12274 480 0.09 0.924 0.12 0.909
By
11594 480 0.1 0.937 0.13 0.91
weight Italic 0.85
By
4168 460 0.08 0.946 0.1 0.938
slope

During the analytical research of the neural network


Non-italic 0.15
principle of association establishment between the classes, the
Gradient-weighted Class Activation Mapping visualization
method was used [11-13]. It presents the heat map, that
depicts areas that attract neural network attention and intensity The neural network attention focus on unusual FasterOne
of the attention. font lines demonstrated in Fig. 6. It means that the font can be
classified as Decorative style. In Fig. 7 is depicted activation
in serif location areas that is typical for Serif class.
Fig. 6. Activation heat map of Decorative style recognition class Used method can provide activation areas of each class.
Table 3 contains the examples of controversial points, when
the neural network wasn’t confident of the class the font
Fig. 7. Activation heat map of Serif style recognition class belongs to.

169
The AccuracyChecker module, that can be used for the external devices" and National Science Program "Information
assessment of the correctly classified fonts percentage was and Communication Technologies for Unified Digital Market
developed to check the classification accuracy. For each in Science, Education and Security". Part of the research
classification by style, weight and slope 100 fonts were equipment was donated by a company FADATA.
prepared. With the use of neural network module performed
the font classification and comparation of the classification REFERENCES
with the correct answer. After that percentage of the right
answers were counted and displayed. Module performing [1] M. Matusugu, K. Mori, Y. Mitari, and Y. Kaneda, “Subject
results is presented in Table 3.5. Network training metric Independent Facial Expression Recognition with Robust Face
comparation with performed accuracy check is presented in Detection Using a Convolutional Neural Network”, Neural
Fig. 8. Networks, 2013, vol. 16, no. 5-6, pp. 555-559.
[2] Y. Zhu, T. Tan, and Y. Wang, “Font Recognition Based on
TABLE VI Global Texture Analysis”, IEEE Transactions on Pattern
CLASSIFICATION ACCURACY CHECK RESULTS Analysis and Machine Intelligence, 2001, vol. 23, no. 10, pp.
Class Accur 1192-1200.
Classification Test fonts [3] C. Сhapman, “Understanding the Nuances of Typeface
es acy
Classification”, Retrieved from https://www.toptal.com/
By slope 100 2 96%
designers/typography/typeface-classification
By weight 100 9 91% [4] D. Soni, “Dealing with Imbalanced Classes in Machine”,
By style 100 4 92% Retrieved from https://towardsdatascience.com/dealing-with-
imbalanced-classes-in-machine-learning-d43d6fa19d2
[5] D. Tao, X. Lin, L. Jin, and X. Li, “Principal Component 2-D
loss_train acc_train loss_test Long Short-Term Memory for Font Recognition on Single
Chinese Characters”, IEEE Transactions on Cybernetics, 2015,
acc_test Accuracy vol. 46, no. 3, pp. 756-765.
0.937

0.946

0.938
0.924

0.909

[6] Z. R. Königsberg, “A Mixed Lyapunov-Max-Plus Algebra


0.96
0.92

0.91
0.91
0.13
0.12

Approach to the Stability Problem for Discrete Event


0.09

0.08
0.1

0.1

Dynamical Systems Modeled with Timed Petri Nets”, Neural


Parallel & Scientific Computations, 2011, vol. 19, no. 1-2, pp.
BY STYLE BY WEIGHT BY SLOPE
35-50.
[7] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “ImageNet
Fig. 8. Networks training metric and classification accuracy
Classification with Deep Convolutional Neural Networks”,
comparation
Retrieved from http://papers.nips.cc/paper/4824-imagenet-
classification-with-deep-convolutional-neural-networks.pdf.
IV. DISCUSSION AND CONCLUSION [8] O. Bychkov, K. Merkulova, and Y. Zhabska, “Software
Application for Biometrical Person’s Identification by Portrait
The main problem of fonts classification consists in features Photograph Based on Wavelet Transform”, 2019 IEEE
indistinctness and strong variation that complicates the International Conference on Advanced Trends in Information
process of classification. In this paper the basic fonts Theory (ATIT), pp. 253-256.
classification approaches of fonts classification were reviewed [9] C. Tensmeyer, D. Saunders, and T. Martinez, “Convolutional
with the definition of pivot advantages and disadvantages. Neural Networks for Font Classification”, 2017 14th IAPR
After assessing these approaches, it was decided to deploy International Conference on Document Analysis and
neural network with the font symbols images as an input. Recognition (ICDAR), 9-15 November 2017, DOI:
10.1109/ICDAR.2017.164
Neural network selects patterns, such as features maps, filters,
[10] J.-P. Aumasson, Ç. Çalık, W. Meier, O. Özen, R. C.-W. Phan,
that it can be considered in classification process based on the and K. Varıcı, “Improved Cryptanalysis of Skein”, International
correct answers of the supervisor. Conference on the Theory and Application of Cryptology and
Neural networks driven computer fonts classification Information Security ASIACRYPT, December 6-10, 2009,
system, that allows to classify fonts by slope, basic style and Tokyo, Japan, pp. 542-559.
weight according to their graphical representation, was [11] X. Glorot, Y. Bengio, “Understanding the Difficulty of Training
developed. Percentage of correctly classified fonts during the Deep Feedforward Neural Networks”, Proceedings of the
system testing reaches 91% in determining weight, 92% in Thirteenth International Conference on Artificial Intelligence
determining basic style, 96% in determining slope. The and Statistics (AISTATS) 2010, Chia Laguna Resort, Sardinia,
Italy, vol. 9 of JMLR: W&CP 9, pp. 249-256.
developed system can be applied to tasks of fonts
[12] S. Ruder, “An Overview of Gradient Descent Optimization
classification solution as supplement for digital documents Algorithms”, Retrieved from http://ruder.io/optimizing-
structure determination, and as system of font selection for gradient-descent/index.html
design creation. [13] N. Samadiani, H. Hassanpour, “A Neural Network-Based
It can be concluded, based on results, that neural networks Approach for Recognizing Multi-Font Printed English
successfully solved the fonts classification problem. Characters”, Journal of Electrical Systems and Information
Technology, vol. 2, no. 2, September 2015, pp. 207-218,
ACKNOWLEDGEMENT https://doi.org/10.1016/j.jesit.2015.06.003

This work is supported by the PPNIP-2020-03/09.03.2020


"Extraction, processing and analysis of parametric data from

170
SIGNAL PROCESSING II
Adaptive 3D Interpolation of Images
Rumen P. Mironov

Abstract - In this paper a scheme of adaptive 3D interpolator, II. MATHEMATICAL DESCRIPTION


suitable with the structure of neighborhood picture elements in
local area 2x2x2 is developed. The type of the interpolation The input reference frames A and B of size MxN from
changes adaptively depending on the presence or absence of m-level halftone image sequences and the output interpolated
contours in the 3D area of the studied fragment, which improves frames A* and B* of size pMxqN can be represented by the
the visual quality. On this base an algorithm for adaptive 3D matrices as described in Eq. (1) and Eq. (2):
interpolation of halftone images, worked in Matlab environment
for operating system Windows 7 is developed. The given A MxN = {a(i, j ) / i = 0,M − 1; j = 0, N − 1 },
experimental results from working of developed interpolator in (1)
different directions, based on a set of real test video sequences B MxN = {b(i, j ) / i = 0,M − 1; j = 0, N − 1 },
are obtained.
Keywords - Digital image processing, 3D adaptive image A *pMxqN = {a* (k, l) / k = 0, pM − 1; l = 0, q N − 1} ,
(2)
sequences interpolation, Tensor processing. B *pMxqN = {b* (k, l) / k = 0, pM − 1; l = 0, q N − 1} ,

I. INTRODUCTION where p and q are the interpolation coefficients in horizontal


and vertical directions respectively [7].
The basic methods for 3D interpolation of halftone image The interpolated image elements a*(k,l) and b*(k,l) in these
sequences can be separated on non-adaptive (nearest, tri- frames can be presented as linear convolution of the 4
linear, 3D cubic, spline or tri-cubic interpolation) and adaptive neighbor elements a(i,j) and b(i,j):
interpolations [1-4]. There is also a large set of methods for 1 1
a * (k, l) =   w m,n (r, t)a(i + m, j + n ),
interpolating of video sequences that use in one form or m =0 n =0
another the motion vector between the individual key frames 1 1
, (3)
[5-6].The basic idea of all of them is 2D interpolation of the b (k, l) =   w m,n (r, t)b(i + m, j + n ),
*

m =0 n =0
two key frames of the sequence and then restoration of the
intermediate frames. where: r = 0, p ; t = 0, q . The interpolation coefficients given
With the increasing of interpolation order of the images the in the following expression:
non-adaptive methods decreases the sharp of the transitions.
At the same time, as the interpolation order increases, false w m,n (r, t) = F.Zrm,n (r, t) + F.Bl m,n (r, t) , (4)
contours appear in the homogeneous areas of the images. [3],
[5]. To reduce them different adaptive methods for 3D are dependent from the logical function F which give the type
interpolation of image sequences are developed [5-6] and etc. of the interpolation (zero or bi-linear). The dependence of the
Based on developed in [7] method for 2D interpolation of logical function F from the kind of brightness transitions in
halftone images the new adaptive 3D interpolation method is current local area is given in [7].
developed. The adaptation is performed on the base of The 3D interpolation can by represented as a generalized
analysis of local characteristics of brightness of 8 3D tensor of rank 3 with size 2x2x2 using the scheme shown
neighborhood picture elements in two reference frames. On on Fig. 1.
the other hand, these points represent a tensor of rank 3. The The First Step is calculation of interpolated points a*(k,l)
interpolation order is changed adaptively (zero or bilinear) in and b*(k,l) in referenced frames by the adaptive 2D
the local area of the reference frames and after then the points interpolation algorithm.
of the intermediate frames are calculated in the same way. In The Second Step is calculation of point c*(k,l) in the frame
this paper the new adaptive 3D interpolation method for C, using the points a*(k,l) and b*(k,l) with the same adaptive
image slices is presented and estimation of mean-square errors interpolation algorithm in 1D direction.
and signal to noise ratios for the developed method and The presented algorithm is compared with well known
trilinear interpolation are described. trilinear interpolation algorithm [4], which is realized by
following three steps:
First Step: Calculates the points a00, a01 in frame A and b00,
b01 in frame B by bilinear interpolation in horizontal direction.
Second Step: Calculates the points c00, c01 in frame C by
Rumen P. Mironov is with the Faculty of Telecommunications, bilinear interpolation in depth direction.
Technical University of Sofia, Boulv. Kl. Ohridsky 8, 1000 Sofia, Third Step: Calculate the point c(k,l) in frame C by bilinear
Bulgaria, E-mail: rmironov@tu-sofia.bg interpolation in vertical direction.

978-1-7281-7142-5/20/$31.00 ©2020 European Union 173


b(i,j) b00 b(i,j+1)

c00

a(i,j+1)
a(i,j)
a00 b*(k,l)
B

c*(k,l)
C 12TH
A a*(k,l)
b(i+1,j)
b01
b(i+1,j+1)
c00

a(i+1,j) a01 a(i+1,j+1)


Fig. 1. Generalized tensor presentation of 3D interpolation

III. EXPERIMENTAL RESULTS

On the base of presented method an algorithm for adaptive 13TH


3D interpolation of halftone image sequences, worked in
Matlab environment for operating system Windows 7 is
developed.
The test movie “XYLOPHONE.MPG” with size 320x240
and 256 brightness levels is used for the experiments.
In Fig. 2 four frames from this movie – the 12th, 13th, 14th
and 15th frames with size 320x240 and 256 brightness levels
are presented. The 12th and 15th frames are referenced and 13th
and 14th are calculated.
In Fig. 3 the 12th and 15th frames with size 160x120 and
256 brightness levels after 3D decimation with factor ½: ½:
⅓are presented. The 13th and 14th fames are removed. 14TH
In Fig. 4 the same reconstructed frames – 12th, 13th, 14th and
15th frames with size 320x240 and 256 brightness levels after
trilinear interpolation algorithm with factor 2:2:3 are
presented. In Fig. 5 are presented the same reconstructed
frames – 12th, 13th, 14th and 15th frames with size 320x240 and
256 brightness levels after adaptive 3D interpolation
algorithm with factor 2:2:3.
For quality measurement the following metrics ware used -
Mean Square Error (MSE), Normalized Mean Square Error
(NMSE), Signal to Noise Ratio (SNR) and Peak Signal to
Noise Ratio (PSNR), equations are given below. The MSE,
NMSE, SNR and PSNR gives the objective representation of 15TH
the restored image quality [8]. Fig. 2. Input four frames (12th, 13th, 14th, 15th) of movie
1 M −1N −1 “XYLOPHONE.MPG”
MSE =   ( X i , j − X̂ i , j ) 2 ;
M × N i = 0 j =0
M −1N −1 ( X i , j − X̂ i , j ) 2
NMSE =  ;
i = 0 j =0 ( X i , j )2 (5)
1
SNR = 10 lg , dB;
NMSE
255 2 Fig. 3. The basic two frames (12th and 15th) of movie
PSNR = 10lq , dB . “XYLOPHONE” after 3D decimation by factor ½: ½: ⅓
MSE

174
12th 12th

13th 13th

14th 14th

15th 15th
Fig. 4. Reconstructed frames of movie “XYLOPHONE” after Fig. 5. Reconstructed frames of movie “XYLOPHONE” after
trilinear interpolation by factor 2:2:3 adaptive 3D interpolation by factor 2:2:3
In Table I the results obtained from calculation of MSE,
NMSE, SNR and PSNR for 12th, 13th, 14th and 15th frames for In comparing with other high order 3D interpolations – 3D
trilinear interpolation and the adaptive 3D interpolation spline, tri-cubic and approaches with using neural networks
algorithms are shown. [3-6], the presented algorithm owns lower calculation
complexity and better visual quality (see Figs. 2, 4 and 5).

175
TABLE I video sequences but for reconstruction of 3D graphic objects
in medicine, digital image processing and visualization
Frame 12 Frame 13 Frame 14 Frame 15
systems as: digital photography, videoconference systems,
Trilinear Interpolation
security systems and etc.
MSE 142.4325 128.3140 129.5764 141.5571
NMSE 0.0094 0.0085 0.0085 0.0092
SNR ,dB 20.2865 20.6958 20.6912 20.3555 ACKNOWLEDGEMENT
PSNR, 26.5947 27.0481 27.0055 26.6215
dB
The author thanks the National Research Fund of the
Adaptive 3D Interpolation Bulgarian Ministry of Education and Science for the financial
MSE 96.4109 86.2590 87.3387 96.0127 support by the contract KP-06-H27/16.
NMSE 0.0063 0.0057 0.0057 0.0062
SNR ,dB 21.9814 22.4205 22.4044 22.0416
PSNR, 28.2895 28.7728 28.7187 28.3075 REFERENCES
dB
[1] D. V. Pham, V. C. Phan, "Proposing Storage Structures and
Interpolation Algorithms of 3D Spatial Data", Proc. on 4th EAI
IV. CONCLUSION International Conference on Nature of Computation and
Communication, ICTCC 2018, pp 81-97, Context-Aware
On the base of presented experimental results for error Systems and Applications, and Nature of Computation and
estimation of adaptive 3D interpolation on halftone image Communication, Eds. Phan Cong Vinh, Vangalur Alagar,
Springer, 2018.
sequences the following conclusions can be made:
[2] Z. Jia, Y.-J. Chang, T.-H. Lin, and T. Chen, "Dense
- the given results from comparing of trilinear and Interpolation of 3D Points based on Surface and Color", Proc.
adaptive 3D interpolations shows increasing of SNR on 18th IEEE International Conference on Image Processing,
and PSNR with about 2 dB; pp. 885-888, 2011.
- the developed 3D interpolation filter doesn't include [3] B. Sun, S. Zhou, "Study on the 3D Interpolation Models Used
phase distortions in the processing images; in Color Conversion", IACSIT International Journal of
- the use of optimal thresholds for selection of Engineering and Technology, vol. 4, no. 1, February 2012, pp.
homogenous and contour blocks lead to decreasing of 57-60.
mean-square error, normalized mean-square error and [4] C. Q.T. Thanh, N. T. Hai, "Trilinear Interpolation Algorithm
for Reconstruction of 3D MRI Brain Image", American Journal
increasing of signal to noise ratio and peak signal to
of Signal Processing, vol. 7, no. 1, pp. 1-11, 2017.
noise ratio with about 7-10%; [5] A. P. Mahmoudzadeh, N. H. Kashou, "Evaluation of
- to minimize mean-square error in horizontal and Interpolation Effects on Upsampling and Accuracy of Cost
vertical directions for p and q must be used variables in Functions-Based Optimized Automatic Image Registration",
the space from 2 to 5; International Journal of Biomedical Imaging, vol. 2013, Article
- the maximal effective interpolation for the local ID 395915, 19 pages, Hindawi Publishing Corporation, 2013.
characteristic of images can be achieved by using [6] S. Niklaus, L. Mai, and F. Liu, "Video Frame Interpolation via
coefficients p, q between 2 and 4. Adaptive Convolution", arXiv:1703.07514, 2017.
[7] R. Mironov, Local Adaptive Interpolation of Halftone Images,
The developed method leads to significant reduction of New Approaches in Intelligent Image Processing, Ed. R.
image distortions in the reference frames and in the Kountchev, Publ. by WSEAS Press., Chapter 13, pp. 195-212,
intermediate frames of the interpolated sequences and can also 2013.
be generalized to higher dimensions and can replace the much [8] W. Pratt, Digital Image Processing, Wiley Interscience, New
more complex multidimensional tensor representations. The York, 2007.
described interpolation algorithm can be used not only for

176
Noise Adaptive Wiener Filtering of Images
Lora Petkova1 and Ivo Draganov2
Abstract – In this paper we propose a technique for application Anam et al. [6] combine Wiener filter with edge detection
of the Wiener filter over images with unknown level of present and dilation in order to filter computed tomography images
Gaussian noise. The variance of the noise is predicted by using wire phantoms. They make it possible to estimate the
exploring the intensity distribution of relatively homogenous inherent noise from a multislice scanner. All three parameters
areas from the image and then passed to the Wiener filter as an
– the kernel size of the filter, the edge detector activation level
input argument prior to applying it in contrast to its traditional
implementation. Also, extensive study has been made on the and the dimensions of the morphological operator were varied
influence of the filter mask size over the quality of processed in order to achieve optimal results of the filtering which prove
images given this approach. Promising results are gathered with better than the base implementation of the Wiener filter.
comparison to the original implementation of the Wiener filter. All discussed techniques lead to significant increase of the
noise removal from digital images but they either demand
Keywords – Image denoising, Gaussian noise, Wiener filter, considerable computational and memory resource or are too
Adaptive filtration. specific to the type of filtered images. In this study we
propose a much simpler technique of applying the Wiener
I. INTRODUCTION filter with the approximated noise variance as input argument
estimated from input image with AWGN. Additionally, we
Image filtering is important process [1] as a preliminary test various filter masks in size and try to find a dependence of
stage in various detection, recognition and analysis systems, the output image quality to the noise variance. As a result a
which take visual input. Camera sensors, optics, compression flexible scheme for the selection of the mask dimensions is
algorithms and the surrounding environment all affect proposed. In Section II follows a description of the proposed
resulting images with various types of noises at different algorithm with experimental results in Section III and finally a
levels. These noises directly render influence over the conclusion is made in Section IV.
accuracy of the algorithms used for further processing of the
images. One of the popular and widely used filters against II. PROPOSED ALGORITHM
image noise is the Wiener filter [2].
Larhmiri [3] propose denoising system for medical images,
in particular such produced by magnetic resonance imaging A. Original Wiener Filter Implementation
(MRI), X-rays and computed tomography, employing Wiener
filtering. It is applied in iterative fashion with stop criterion Wiener filter [7] works over digital images suppressing
based on energy decrease. Improved quality of the images is effectively Additive White Gaussian Noise (AWGN)
reported with comparison to other algorithms like wavelet according to the following expression:
packet, nonlocal Euclidean means and the original Wiener (, )= + ( ( , )− ), (1)
implementation.
Hasan and El-Sakka [4] propose the structural similarity where I is the intensity of a pixel locating in the i-th row and
index (SSIM) as a measure for optimization of the work of the the j-th column of the input image, J – the intensity of a pixel
Wiener filter which in turn is the core of the Block matching from the output image, and σ2 – variance of the present in the
and 3D filtering (BM3D). Additionally, 3D thresholding has input image noise. The average brightness or also the local
been introduced which further improves the efficiency of the mean from the mask κ of the filter with size P x Q pixels is
algorithm beyond the capabilities of the BM3D alone. denoted with m and it equals:
Suresh et al. [5] propose two-dimensional Wiener filter = ∑, ( , ). (2)

with finite impulse response which incorporated the adaptive
cuckoo search. It was specifically designed for multispectral The variance is found from:
satellite images in which noise with normal distribution could = ∑, ( , )− . (3)

be detected with variances of different level. Convergence
studies reveal the algorithm to be stable and comparable in If σ2 is not known, then the filter takes the mean of local
performance to 10 other popular algorithms. variances for all positions of the mask. This is significant
limitation in the processing principle of the Wiener filter both
1Lora
from computational point of view and with regards of the
Petkova is with Technical University of Sofia, Faculty of quality of filtered images. Below, we propose a way to
Telecommunications, 8 Kliment Ohridski Blvd., 1756 Sofia,
Bulgaria, E-mail: lora.petkoovaa@gmail.com
overcome this limitation.
2Ivo Draganov is with Technical University of Sofia, Faculty of

Telecommunications, 8 Kliment Ohridski Blvd., 1756 Sofia,


Bulgaria, E-mail: idraganov@tu-sofia.bg

978-1-7281-7142-5/20/$31.00 ©2020 European Union 177


B. Approximation of the Noise Variance dimensions 256x256 pixels, all in 8-bit grayscale form the
image database. They were consecutively and homogenously
According to the approach of Liu et al. [8] the noise filled three times with Additive White Gaussian Noise with
variance from unknown image could be approximated in the zero mean and variance of 0.001, 0.01 and 0.1.
following way. Considering the noise as additive, for a given At first, the variance of present noise was approximated.
square area of the image the following equation in vector form Results are shown in Table I.
holds [8]:
( , ) = ( , ) + ( , ), (4)
where I is the noisy image area with its centre located at the
(i0, j0)-th pixel, I0 – original area content and n – only the
noise over the same zone. Along arbitrary direction
represented by its unit vector v, it then follows that [8]:
( )= ( )+ , (5)
where var{.} means variance estimation. Minimal variance
could be found from set of tested directions using the
Principal Component Analysis (PCA) [8] corresponding to the
direction vmin which is also the eigenvector of the minimal
eigenvalue of the covariance matrix [8]:
= ∑ ( − )( − ) , (6)
where N is the number of analysed areas over horizontal and
vertical direction. From (6) it could easily be derived that [8]:
( )= + , (7)
where λmin is the minimal eigenvalue of the related covariance
matrix. Applying (7) over relatively homogenous part of the
Fig. 1. Proposed algorithm
image will return λmin(KI0) ≈ 0 and then the approximated
variance will be [8]:
It seems that the noise variance is most accurately estimated
= ( ). (8) for mid-levels around 0.01 and approximation error increases
The selection of flat enough areas from the noisy image for lower and higher levels. Variance of about 0.1 and bigger
based on intensity change [8] is done by finding the is not typical for most practical cases in daily-based mass user
covariance matrix of the gradient map [9] from each tested photography. At these magnitudes enhancement of the
zone. Then, the eigenvectors and eigenvalues of it are incorporated algorithm needs to be developed. Approximation
calculated and the maximal eigenvalue selected. If it goes time is found as 0.4067 sec on average for all images.
under a certain threshold, found by iterative testing, the area is The influence of the original Wiener filter mask size on the
considered flat and the approximate noise variance is quality of processed images at the same 3 noise variances is
estimated. given in Fig. 2 for PSNR and in Fig. 3 for SSIM.

C. Proposed Algorithm Flowchart TABLE I


NOISE VARIANCE APPROXIMATION ACCURACY
Once the approximated noise variance is found the Wiener
filter (1)-(3) could be applied with it but still its second Original
0.0010 0.0100 0.1000
parameter – the mask size could take and arbitrary integer variance
value, greater than 2. Within our study we test wide range of Approximated
0.0011 0.0098 0.0701
mask sizes w using the approximated noise variance and try to variance
find optimal wopt depending on it. Exemplary values are given Relative error,
10.00 2.00 29.90
in Section III – Experimental results. The complete set of %
steps of the proposed here algorithm is presented by the
flowchart in Fig. 1. Most efficient the original Wiener filter tends to be for
images with noise variance 0.001 where the highest values
emerge for both PSNR and SSIM. In particular, the filtration
III. EXPERIMENTAL RESULTS with a 3x3 mask is the most successful, as we observe how by
reducing the size of the mask, the filtration efficiency
The testing platform consists of IBM PC compatible decreases, the same is observed for SSIM, where the
Lenovo computer with 64-bit Intel Celeron CPU B830 difference between the best and the least performing
operating at 1.80 GHz, 4 GB of RAM, and OS Windows 10 realization is only 0.023.
Pro. All tests were performed in Matlab R2014A For Gaussian noise, with increasing variance, the filtration
environment. Six, non-compressed, popular images, namely efficiency decreases. At σ2 = 0.01 the best result is observed
Boat, Barbara, Clown, Lena, Peppers, and House with

178
for PSNR when applying a mask 5x5 - 26.22 dB and the worst
for 11x11 - 24.8 dB. For SSIM the greatest efficiency is for a
mask 7x7 - 0.735.
At σ2 = 0.1 there is a peak for the medium-sized mask of
9x9 in PSNR, and for SSIM the results are equally satisfactory
for a mask from 7x7 to 11x11 with a value for all of them
equal to 0.436.

Fig. 4. Resulting PSNR from both filters

The average filtering time of the proposed filter is less and


works better for all masks with an exception of the case for
5x5 pixels.
Fig. 2. Achieved PSNR by Wiener filter at various mask sizes

The average PSNR after processing all test images,


containing noise with σ2 = 0.1, 0.01 and 0.001, with the
Wiener filter (W) and the proposed (P) one when mask size
varies between 3 and 11 is given in Fig. 4. Peak value appears,
most like spikes, for w = 3 being 30.79 dB for the W and
33.02 dB - for the P at σ2 = 0.001. These are the global
maximums. Another spikes could be observed for w = 5 at σ2
= 0.01, and w = 7 at σ2 = 0.1 where both filters produce almost
identical resulting images with PSNR around 25.8 dB and 20
dB, respectively.

Fig. 5. Preservation level of the image structure after filtering

We can also conclude that compared to the Wiener filter for


which there is a PSNR varying 0.07 to 0.4 dB higher than the
proposed implementation, they come to be almost equally
effective. In SSIM, minimal differences of 0.005 to 0.05 in
favour of the Wiener filter are again observed. On the other
hand, the execution time of the proposed filter is less for all
mask sizes.
Visual comparison between the resulting image of Lena
obtained from the original Wiener filter and the proposed here
Fig. 3. Mask size influence over SSIM for Wiener filter
implementation could be seen in Fig. 7. Edges in the Wiener
filtered image are somewhat more deteriorated and the overall
The increase in filtering efficiency with respect to SSIM
presence of artefacts in homogenous areas is higher. In the
(Fig. 5) is most pronounced at 5x5 pixels with a difference of
image processed with the proposed realization the same zones
just over 0.1. For the other sizes of the mask the difference
are smoother and look more natural.
decreases to 0.5. The average difference in execution time
Based on average quality results for all tested images
(Fig. 6) of the filtration in the proposed variant with the most
experimenting with wide range of mask sizes and at various
effective noise suppression is about 1 ms. From the obtained
variances of induced noise, the following flowchart for
results we can estimate that the filter is most effective with a
selecting optimal parameters could be proposed (Fig. 8).
5x5 mask.

179
Fig. 6. Processing time at various noise levels and mask size

Fig. 8. Adaptive selection of proposed filter mask size

REFERENCES
a) Original b) Noisy
[1] R. Gonzalez, R. Woods, Digital Image Processing, 4 ed.,
Pearson, 2017.
[2] W. Pratt, Introduction to Digital Image Processing, CRC Press,
2013.
[3] S. Lahmiri, “An Iterative Denoising System based on Wiener
Filtering with Application to Biomedical Images”, Optics &
Laser Technology, vol. 90, pp. 128-132, 2017.
[4] M. Hasan, M. El-Sakka, “Improved BM3D image Denoising
using SSIM-optimized Wiener Filter”, EURASIP Journal on
Image and Video Processing, Paper No. 25, 2018.
[5] S. Suresh, S. Lal, C. Chen, and T. Celik, “Multispectral Satellite
c) Wiener filtered d) Proposed filter result Image Denoising via Adaptive Cuckoo Search-based Wiener
wilter”, IEEE Transactions on Geoscience and Remote
Fig. 7. Image of Lena at various processing stages Sensing, vol. 56, no. 8, pp. 4334-4345, 2018.
[6] C. Anam, T. Fujibuchi, T. Toyoda, N. Sato, F. Haryanto, R.
Widita, F. Haryanto, R. Widita, I. Arifand, and G. Dougherty,
IV. CONCLUSION “An Investigation of a CT Noise Reduction using a Modified of
Wiener Filtering-edge Detection”, Journal of Physics:
The presented algorithm for digital image adaptive filtration Conference Series, IOP Publishing, vol. 1217, no. 1, p. 012022,
suppress additive white Gaussian noise in natural images May 2019.
leading to PSNR up to 33 dB. Its efficiency in terms of overall [7] J. Lim, Two-Dimensional Signal and Image Processing,
(PSNR) and structural (SSIM) preservation of the original Englewood Cliffs, NJ, Prentice Hall, 1990.
image content is higher than that of the Wiener filter on which [8] X. Liu, M. Tanaka, and M. Okutomi, “Noise Level Estimation
using Weak Textured Patches of a Single Noisy Image”, 19th
it is based. The mask size of the proposed implementation IEEE International Conference on Image Processing, pp. 665-
could be adapted to various noise levels in stepwise fashion. 668, Orlando, FL, USA, Sept. 30 – Oct. 3, 2012.
Image category classification based on content and source [9] X. Zhu, P. Milanfar, “Automatic Parameter Selection for
origin with their naturally induced noises could also be Denoising Algorithms using a No-reference Measure of Image
employed in further development of the proposed filter. Content”, IEEE Transactions on Image Processing, vol. 19, no.
Additional testing over larger sets of images would extend the 12, pp. 3116-3132, 2010.
scheme for adaptive selection of the mask size.

180
Along-Track and Cross-Track Noise Analysis of Minimal
Curvature on Mars Orbiter Laser Altimeter Data
Nicole Christoff1 and Agata Manolova2
Abstract – The planetary surfaces are explored by ground
samples or by indirect observations such as images and
topographic data. This article examines the topography data
from the Mars orbiter laser altimeter (MOLA). The analysis is
based on the noise variance of the minimal curvature. A
histogram approach to assessing longitudinal and transverse
lines laying on geographical features (such as craters) in
altimeter data is suggested.

Keywords – Histogram analyse, Along-track, Cross-track,


Altimeter data.

I. INTRODUCTION
The Mars surface is explored from numerous space Fig. 1.Representation of the maximum curvature k1 and the
missions, such as NASA’s Mars Global Surveyor (MGS) [1]. minimum curvature k2 lying on a surface
The information for the surface relief is acquired with the
altimeter on the board on the spacecraft. Typically, a band at
the surface along the trajectory of the satellite’s orbit is III. METHOD
recorded [2]. They are two types of traces: along-tracks and
cross-tracks. The first ones follow the longitudinal direction Consider the plane, defined by , , (see Fig. 1
and the second ones follow the orthogonal direction along the (courtesy Polette et al. [6])), a triangulated surface to an
trajectory of the satellite (the transverse direction) [3]. intersection point of two osculating circles, with a normal
On MOLA data, Jarmołowski and Łukasiak [4] focuses on and tangent vector . The maximum curvature (k1) and the
the assumption of the presence of white noise in the data. In minimum curvature (k2), where , are shown in red
two perpendicular directions they performed maximum and blue. The main directions are orthogonal and associated
likelihood (ML) estimation on the covariance model. It is used with the values of k1 and k2, with:
to identified the correlation lengths and the result matrix is
1
fitted into the empirical estimation function. k1 = , (1)
r1
II. DATASET 1
k2 = . (2)
For this research, we use MOLA data [5] on a scale of 128 r2
pixels per degree, where the resolution is ∼500 m per pixel.
There is another method for calculating curvatures and
The sample represents the equidistant cylindrical projection
principal directions. The normal curvature , for all directions
and has the following geographic coordinates: Longitude:
at any point on the surface, is defined by the ratio:
88.87◦W ∼ 61.26◦W Latitude: 14.85◦S ∼ 25.69◦S and cover an
area of 1 050 006 km2. II
The input data is a point cloud stored in a polygon file k= , (3)
I
format. For the discrete curvature computation and analyses,
in which is based the following article, we create a 3D mesh where and are respectively the first and second
from the point cloud. fundamental forms. The differential vector is the tangent
to the surface in a direction defined by and . Mynatt et
al. [7] describe the first fundamental form (I), according to
1Nicole Christoff is with Technical University of Sofia, Faculty of Lipschultz [8], as the inner product of with itself:
Telecommunications, blvd. Kliment Ohridski 8, 1796 Sofia, ∙ ∙
Bulgaria, E-mail: nicole.christoff@tu-sofia.bg
2Agata Manolova is with Technical University of Sofia, Faculty of ∙ 2 ∙ ∙ (4)
Telecommunications, blvd. Kliment Ohridski 8, 1796 Sofia, 2
Bulgaria, E-mail: amanolova@tu-sofia.bg

978-1-7281-7142-5/20/$31.00 ©2020 European Union 181


Fig. 2.Results on MOLA sample: b) representation of k2, the minimal curvature lying on a surface a)

For the calculation of angles, distances and surfaces on the For local characterization of the surface (i.e. elliptical,
surface, Mynatt et al. [7] uses the first fundamental parabolic or hyperbolic) Mynatt et al. [7] uses the second
coefficients ( , and ). From the partial derivatives, the fundamental coefficients ( , and ). Likewise, the matrix
matrix of the first fundamental form is obtained: is characterized by:
E F
I = . (5) . (7)
F G
The second fundamental form quantifies the spatial velocity From the first and second fundamental forms, we can
of change of in each direction, determined by at a point calculate the Weingarten endomorphism :
on the surface, taking the internal product of the two
differential vectors: , (8)
where is the inverse of the matrix I.

It should be noted that the eigenvalues of L define the

magnitudes of the principal curvatures at the given point and
∙ 2 ∙ ∙ (6) the eigenvectors of L characterize the orientations of the
∙ principal curvatures in the plane.
2

182
An assessment at a point on the surface, about the shape IV. RESULTS AND DISCUSSION
and the orientation, can be succeeded by the Gaussian
curvature and the mean curvature . They are affected by The proposed approach of assessing was tested with Matlab
the minimum curvature and the maximum curvature by 2017.
the following relations: We choose a small area of our MOLA sample, which
contains one huge impact crater in the middle and several
, (9) small ones (see Fig. 2 small panel A). One of the challenges is
. . (10) the detection of the small craters (with diameter ≤ 5 km). We
can observe on the computed minimal curvature , lying on
The mesh sample used in our research is presented in Fig. 2 the same area (see Fig. 2 small panel B).
(theupperpicture). We computed the differential descriptor the The results of four cases of outliers are shown in Fig. 4.
minimal curvature k2 on it (see Fig. 2 the lower one). In Outliers lying in the interval ]−∞, ] contain the craters. That
general, curvatures attempts information on the concavity or is the significant information about the topology that we want
convexity of a surface along its principal directions [9]. This to keep (Fig. 4 1a), 2a), 3a) and 4a)). The outliers in the
information is characterised by the sign of H. In case of H< 0, interval [ ,+∞[ represent actually the along-track and cross-
the convex areas are shown and presented in blue. The track information (Fig. 4 1b), 2b), 3b) and 4b)). The solutions
concave areas are yellow (H> 0). The relatively flat areas are of Eq. 11, when p = 1% represent all values that enter into the
green (H ≈ 0 and K ≈ 0). We proposed k2 as a good descriptor set of values marked in blue (Fig. 4 1a) and 1b)). The rest of
of the Mars topography [10]. the solutions and their respective colours are as follow:
Using different distributions of k2 and their respective p = 5% in orange (Fig. 4 2a) and 2b)), p = 10% in purple
covariance matrix, we describe how the assessment of (Fig. 4 3a) and 3b)) and p = 20% in green (Fig. 4 4a) and 4b)).
transverse and longitudinal lines changes. As we can observe, increasing the percentage of values in
We denote both types of lines, by the quantile of the the positive range, the noise becomes more visible, while the
distribution of values, represented by and (the solutions craters are clearer when the percentage is smaller. We must
of Eq.(11)), which lies outside the interval , (Rees keep in mind that the more we try to separate the noise, the
[11]): topology itself.
, μ ∗ . (11)
The variables
V. CONCLUSION
, are calculated by the percentage of
outliers % and the product of the mean value µ and the
The present analysis aims to examine the distribution of
standard deviation σ. The outlier values are considered in the
longitudinal and transverse lines added over different
intervals ]−∞, ] and [ ,+∞[.
geographical features (such as craters). That will help the
One sample of a histogram (see Fig. 3) gives the density of
delimitation of added points in the topology for their further
the distribution of the k2 data. In Fig. 3 (on the left) is the 2D
removal and reconstruction of the mesh. This is crucial in the
representation of the histogram and (on the left), a bivariate
detection of craters based on a minimal curvature approach, as
histogram is created, showing the distribution of the k2 values
adding additional, incorrect information to the topography
of the sample from Fig. 2 (the lower one). It represents a right
would mislead the recognition system and, accordingly, the
skewed distribution, with µ = −0.0124, σ = 0.0142, the median
number of false positives results, concerning small craters,
is −0.0043 and the mode −1.1848.
would be very high.

Fig. 3.A histogram of k2, the minimal curvature lying on a surface of Mars

183
Fig. 4. Visualization of the quantile of the distribution for values lying outside intervals (a) ]−∞, ] and (b) [ ,+∞[

ACKNOWLEDGEMENT Geophysical Research: Planets, vol. 97, no. E5, pp. 7781-7797,
1992.
[6] A. Polette, J. Meunier, and J.-L. Mari, “Shape-Curvature-
This work was supported by the National Program ”Young Graph”: Towards a New Model of Representation for the
Scientists and Postdoctoral Students”, PMC No 577, Description of 3D Meshes”, in Augmented Reality, Virtual
17.08.2018, of Ministry of Education and Science of Bulgaria. Reality, and Computer Graphics - 4th International Conference,
AVR 2017, Ugento, Italy, June 12-15, 2017, Proceedings, Part
II, In Lecture Notes in Computer Science, LNCS 10325,
REFERENCES Springer, 2017, pp. 369-384.
[7] I. Mynatt, S. Bergbauer, and D. D. Pollard, “Using Differential
[1] A. Albee, R. Arvidson, F. Palluconi, and T. Thorpe, “Overview Geometry to Describe 3-D Folds”, Journal of Structural
of the Mars Global Surveyor Mission”, Journal of Geophysical Geology, vol. 29, no. 7, pp. 1256-1266, 2007.[Online].
Research: Planets, vol. 106, no. E10, pp. 23291-23316, 2001. Available: http://www.sciencedirect.com/science/article/pii/
[2] M. C. Malin, K. S. Edgett, B. A. Cantor, M. A. Caplinger, G. E. S0191814107000193
Danielson, E. H. Jensen, M. A. Ravine, J. L. Sandoval, and K. [8] M. M. Lipschultz, Theory and Problems of Differential
D. Supulver, “An Overview of the 1985-2006 Mars Orbiter Geometry,Schaum’s Outline,New York: McGraw-Hill, 1969.
Camera Science Investigation”, International Journal of Mars [9] N. Christoff, A. Manolova, L. Jorda, and J.-L. Mari, “Feature
Science and Exploration, vol. 5, pp. 1-60, 2010. Extraction and Automatic Detection of Martian Impact Craters
[3] J. van Zyl, “Introduction to the Physics of Remote Sensing: from 3D Meshes”, 2017 13th International Conference on
Imaging geometries,” 2006. [Online].Available: Advanced Technologies, Systems and Services in
http://www.its.caltech.edu/ee157/lecture Telecommunications (TELSIKS), 2017, pp. 211-214.
note/Imaging%20geometries.pdf [10] N. Christoff, A. Manolova, L. Jorda, S. Viseur, S. Bouley, and
[4] W. Jarmołowski, J. Łukasiak, “A Study on Along-Track and J.-L. Mari, “Level-Set Based Algorithm for Automatic Feature
Cross-Track Noise of Altimetry Data by Maximum Likelihood: Extraction on 3D Meshes: Application to Crater Detection on
Mars Orbiter Laser Altimetry (Mola) Example”, Artificial Mars”, Computer Vision and Graphics, Cham: Springer
Satellites, vol. 50, pp. 143-155, 2015. International Publishing, 2018, pp. 103-114.
[5] M. T. Zuber, D. E. Smith, S. C. Solomon, D. O. Muhleman, J. [11] D. G. Rees, “Foundations of Statistics,” CRC Press, pp. 244-
W. Head, J. B. Garvin, J. B. Abshire, and J. L. Bufton, “The 249, 1987.
Mars Observer laser altimeter investigation”, Journal of

184
Analysis for Watermark in Medical Image using
Watermarking with Wavelet Transform and DCT
Stoyan Kushlev1 and Rumen P. Mironov2
Abstract – An analysis for increasing the transparency of classified based on domains, in which the watermarking is
digital watermarking of medical images, using discrete Wavelet done, the watermark preprocessing, the transparency on the
transform and DCT is presented. The analysis ensures watermark. Watermark robustness can be simulated using
watermarking with high resistant of the watermark, to unauthorized attacks directed to the integrity of the
commonly used types of malicious image processing. The results
watermark. Such attacks are unauthorized removal, adding or
for the analysis of the transparency on the watermark image is
based on the signal to noise ration and mean-square error after detection of watermark. The removal and adding of
watermarking the image. watermarks are active attacks while the detections of
watermarks are passive attacks.
Keywords – Medical Image Watermarking, Discrete Wavelet An outline of the medical image watermarking field that
transform, Discrete Cosine transform. uses various techniques to embed watermark data and utilize
various functions to detect tampered regions is given below in
the paper [9].
I. INTRODUCTION
In the present work an analysis of the watermark for digital
watermarking of medical images using Wavelet transform and
Advances in telecommunications and computer science
DCT is described.
have introduced drastic changes to the modern health care
The presented watermarks characteristics, together with a
organization, including services as: Picture Archiving and
DWT and DCT watermarking algorithm, ensures high
Communications System (PACS), information management
resistance of the watermark to various types of malicious
systems in hospitals which forms the information technology
attacks. The obtained experimental results, for some simulated
infrastructure for a hospital based on the DICOM (Digital
attacks over the test medical images are, made on the base of
Imaging and Communication in Medicine) standard, medical
mean-squared error and signal to noise ratio of the
imaging facilities. Such services allow for the medical
reconstructed images. The robustness of the watermark
personnel, as well as for the patients to have access to:
against some attacks are tested with the post processing of
transmission and interpretation of medical images for
watermarked images by adding of Salt and Pepper noise,
diagnostic purposes, remote access to personal medical
Gaussian noise, filtration whit median filters and average
information [1-3].
filters.
Digital watermarking has showed that it have properties for
enhancing security measures for various multimedia
applications. Applications of the digital watermarking for II. MATHEMATICAL DESCRIPTION
medical imaging are discussed in [4]. The applicability of
watermarking for security applications is studied in [2]. The algorithms for embedding and extracting the
The new medical systems required medical images to have watermark using DWT and DCT, on which is based the
unauthorized modifications protection and copyright developed watermark preprocessing, are described in details
protection. The unauthorized modifications protection, as in article [5]. In the current work we are analyzing how the
discussed in [5], is of protection from unrestricted image used for the watermark is affecting the result.
modification of the information. Copyright protection, as Embedding of the watermark is based on the following
discussed in [4], is of protection from disseminated medical formula [5]:
information over Internet..
Watermarking systems are characterized whit the , 1, 2, … , , 1
watermark invisibility, security of the watermark, robustness where Ck are the coefficients of the transformed insertion
of the watermark and the ability for reversible watermarking. block, Vk are the coefficients of the transformed watermark, k
The importance of each is determined on the application and is the consecutive number of the coefficients and a is
how it is used [6-7]. parameter which determines the depth of the watermarking.
As discussed in [5], [8] the watermarking techniques can be This shows that the transparency of the watermark after
embedding is based on two factors: the values of the
1Stoyan Kushlev is with the Faculty of Telecommunications, watermark itself (Vk), and the depth of the watermarking
Technical University of Sofia, Boul. Kl. Ohridsky, 8, Sofia 1000, coefficient (a).
Bulgaria, E-mail: skushlev@mail.bg The watermark is obtained using the following formula [5]:
2Rumen P. Mironov is with the Faculty of Telecommunications,

Technical University of Sofia, Boul. Kl. Ohridsky 8, Sofia 1000, ⁄ , 1, 2, … , , 2


Bulgaria, E-mail: rmironov@tu-sofia.bg

978-1-7281-7142-5/20/$31.00 ©2020 European Union 185


where Ck' are the coefficients of the transformed insertion
block of the watermarked image, Ck are the coefficients of the
transformed correspondent block of the original image, Vk' are
the coefficients of the transformed watermark. The extracted
watermark is in discrete cosine space. Over Vk' we are
applying inverse discrete cosine transform to receive the
image used for watermarking.

III. EXPERIMENTAL RESULTS


For analyzing the connection between the image used as the
watermark and the transparency on the watermarked image,
three test images are used. The images have size 512x512
pixels, 256 gray levels and are shown in Fig. 1a, b, c.
Fig. 1c. Input X-ray test image “Right rib cage”

The images used as watermarks are the letter “K” with and
without histogram correction, based on the image used for
watermarking. Those image are shown in Fig. 2a, b.

Fig. 2a. Watermark without histogram correction

Fig. 1a. Input X-ray test image “Spine”

Fig. 2b. Watermark with histogram correction

Based on the described effect of the watermark in Section


II, algorithms for embedding and extracting of watermarks
have been developed and have been simulated with MATLAB
programs.
The test images show in Fig. 1 are transformed by 3 level
Discrete Wavelet transform. The transformed block with the
maximum entropy is used for embedding the input watermark
[5].
The robustness on the watermark is tested against some
popular attacks as:
• Adding of Gaussian noise with mean 0 and variance
Fig. 1b. Input X-ray test image “Left rib cage” 0.01;
• Adding of Salt and Pepper noise;
• Median filter filtration with kernel size 3x3;
• Filtration of Gaussian noisy image with average filter;
• Filtration of Salt and Pepper noisy image with median
filter.
Efficiency of the watermark is estimated with the
following metrics [5], [10-11]:

186
• The peek signal to noise ratio (PSNR) estimates the
transparency of the embedded watermark to the human TABLE II
eyes; Test Images “Spine” “Left rib “Right rib
• The normalize cross-correlation (NC) is used for cage” cage”
determining how close the extracted watermark is Watermarked test image
SNR, dB 34.01 14.72 35.02
compared to the original; PSNR, dB 59.95 39.27 59.80
• The mean square error (MSE) and the normalized mean MSE 6.58E-02 7.68 E+00 6.81E-02
square error (NMSE) estimate the change between the NMSE 3.97E-04 3.37E-02 3.15E-04
original and the watermark images. NMSE, % 3.97E-02 3.37E+00 3.15E-04
The obtained results for the test images when using the NC 0.98 0.97 0.99
NC, % 98.5 97.1 99.23
image from figure Fig. 2a as a watermark are summarized in Watermarked test image with added of Gaussian noise
Table I [5]. The results when using the Watermark with SNR, dB 4.67 4.66 4.68
histogram correction (Fig. 2b) are summarized in Table II. PSNR, dB 30.61 29.21 29.46
MSE 5.65E+01 7.79E+01 7.36E+01
TABLE I NMSE 3.41E-01 3.42E-01 3.40E-01
Test Images “Spine” “Left rib “Right rib NMSE, % 3.41E+01 3.42E+01 3.40E+01
cage” cage” NC 0.8451 0.8865 0.8253
Watermarked test image NC, % 84.51 88.65 82.53
SNR, dB 19.86 18.16 18.71 Watermarked test image with added of Salt and Pepper noise
PSNR, dB 45.8 42.72 43.49 SNR, dB 15.99 12.42 16.01
MSE 1.71E+00 3.48E+00 2.91E+00 PSNR, dB 41.93 36.97 40.79
NMSE 0.1E-01 0.15E-01 0.1E-01 MSE 4.17E+00 1.31E+01 5.42E+00
NMSE, % 0.1E+01 0.15E+01 0.1E+01 NMSE 2.52E-02 5.73E-02 2.51E-02
NC 0.57 0.53 0.55 NMSE, % 2.52E+00 5.73E+00 2.51E+00
NC, % 57 53 55 NC 0.85 0.88 0.83
Watermarked test image with added of Gaussian noise NC, % 85.49 87.58 82.57
SNR, dB 4.66 4.67 4.69 Watermarked test image with median filtration
PSNR, dB 30.6 29.22 29.47 SNR, dB 20.14 14.22 19.20
MSE 5.67E+01 7.78E+01 7.35E+01 PSNR, dB 46.08 38.77 43.98
NMSE 3.4E+01 3.4E-01 3.4E-01 MSE 1.61E+00 8.63E+00 2.60E+00
NMSE, % 3.4E+01 3.4E+01 3.4E+01 NMSE 9.70E-03 3.78E-02 1.20E-02
NC 0.34 0.46 0.42 NMSE, % 9.70E-01 3.78E+00 1.20E+00
NC, % 34 46 42 NC 0.93 0.92 0.92
Watermarked test image with added of Salt and Pepper noise NC, % 93.42 91.94 91.92
SNR, dB 15.54 14.02 14.27 Watermarked test image with added of Salt and Pepper noise and
PSNR, dB 40.48 38.57 39.05 filtration with median filter
MSE 0.58E+01 0.9E+01 0.8E+01 SNR, dB 10.14 8.09 8.64
NMSE 3.5E-02 4E-02 3.8E-02 PSNR, dB 36.08 32.64 33.42
NMSE, % 3.5E+00 4E+00 3.8E+00 MSE 1.60E+01 3.54E+01 2.96E+01
NC 0.36 0.41 0.39 NMSE 9.68E-02 1.55E-01 1.37E-01
NC, % 36 41 39 NMSE, % 9.68E+00 1.55E+01 1.37E+01
Watermarked test image with median filtration NC 0.85 0.86 0.83
SNR, dB 16.13 17.4 17.99 NC, % 85.05 86.48 83.12
PSNR, dB 45.07 41.95 42.77 Watermarked test image with added of Gaussian noise and filtering with
MSE 0.2E+01 0.41E+01 0.34E+01 average filter
NMSE 0.12E-01 0.18E-01 0.16E-01 SNR, dB 19.38 14.00 18.60
NMSE, % 0.12E+01 0.18E+01 0.16E+01 PSNR, dB 45.32 38.55 43.38
NC 0.57 0.52 0.55 MSE 1.91E+00 9.08E+00 2.98E+00
NC, % 57.0 52.0 55.0 NMSE 1.15E-02 3.98E-02 1.38E-02
Watermarked test image with added of Salt and Pepper noise and NMSE, % 1.15E+00 3.98E+00 1.38E+00
filtration with median filter NC 0.93 0.93 0.84
SNR, dB 18.55 16.99 17.6 NC, % 92.85 92.50 84.19
PSNR, dB 44.49 41.54 42.38
MSE 0.23E+01 0.46E+01 0.38E+01
NMSE 0.1E-01 0.2E-01 0.17E-01
IV. CONCLUSION
NMSE, % 0.1E+01 0.2E+01 0.17E+01
NC 0.56 0.52 0.55 An analysis for increasing the transparency of digital
NC, % 56 52 55 watermarked medical images, using Discrete Wavelet
Watermarked test image with added of Gaussian noise and filtering with
transform and Discrete Cosine transform, is presented. The
average filter
SNR, dB 8.86 8.6 8.6 analysis result are based on the signal to noise ratio, mean-
PSNR, dB 34.8 33.15 33.38 squared error and normalized cross-correlation, of the
MSE 2.15E+01 3.15E+01 2.99E+01 reconstructed images between the original and the
NMSE 1.3E-01 1.4E-01 1.4E-01 reconstructed images, when adding malicious attacks.
NMSE, % 1.3E+01 1.4E+01 1.4E+01 Compared to the result in [5], when is used watermark without
NC 0.34 0.43 0.41
NC, % 34 43 41 histogram correction, we see that the signal to nose ratio is
higher when using the watermark with histogram correction,

187
while achieving high robustness for the watermark. This will Information Technology Applications in Biomedicine, 2000,
allow to a great extent to verify the reliability of the medical pp. 250-255.
data, transmitted and recorded as images, while reducing [5] R. Mironov, St. Kushlev, “Medical Images Watermarking using
artifacts from the watermarking. All this leads to the Wavelet Transform and DCT”, LIII International Scientific
Conference on Information, Communication and Energy
conclusion that, the presented analysis can be used for Systems and Technologies (ICEST 2018), June 28-30 2018,
developing algorithm for histogram correction, based on the Sozopol, Bulgaria, pp. 119-122.
input image. [6] W. K. Pratt, Digital Image Processing, 4th Ed., John Wiley &
Sons. Inc., Hoboken, New Jersey, 2007.
[7] R. C. Gonzalez, R. E. Woods, Digital Image Processing, Third
V. REFERENCES Ed., Pearson Education Inc., 2008.
[8] N. Singh, M. Jain, and S. Sharma, “A Survey of Digital
[1] P. Koushik, G. Ghosh, and M. Bhattacharya, “Biomedical Watermarking Techniques”, International Journal of Modern
Image Watermarking in Wavelet Domain for Data Integrity Communication Technologies & Research, August 2013.
Using Bit Majority Algorithm and Multiple Copies of Hidden [9] Mahasweta, J. Joshi et al. “Watermarking in DCT-DWT
Information”, American Journal of Biomedical Engineering, Domain”, International Journal of Computer Science and
2012, vol. 2, no. 2, pp. 29-37. Information Technologies (IJCSIT), vol. 2, no. 2, 2011, pp.
[2] H. Nyeem, W. Boles, and C. Boyd, “A Review of Medical 717-720.
Image Watermarking Requirements for Teleradiology”, Journal [10] I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital
Digital Imaging, 2013, vol. 26, pp. 326-343. Watermarking and Steganography, 2nd Edition, Elsevier,
[3] L. Siau-Chuin, J. M. Zain, “Reversible Medical Image Burlington, 2007.
Watermarking for Tamper Detection and Recovery”, 3rd IEEE [11] A. Ustubioglu, G. Ulutas. “A New Medical Image
International Conference on Computer Science and Information Watermarking Technique with Finer Tamper Localization”.
Technology, 2010, vol. 5, pp. 417-420. Journal of Digital Imaging. Springer International Publishing,
[4] G. Coatrieux, H. Maitre, B. Sankur, Y. Rolland, and R. 2017, pp. 1-17.
Collorec, “Relevance of Watermarking in Medical Imaging”,
Proceeding of IEEE EMBS International Conference on

188
MICROWAVES, ANTENNAS AND
PROPAGATION
On the Gas Sensing Properties of Microwave Transducers
Giovanni Gugliandolo1, Mariangela Latino2, Giuseppe Campobello3, Zlatica Marinkovic4,
Giovanni Crupi5and Nicola Donato3
Abstract – In this work it is reported about the development layer, a microwave gas sensor needs of a propagative structure
and characterization of a microwave interdigital capacitor (IDC). for the electromagnetic wave. Several geometries have been
The IDC structure was realized in microstrip line technology and explored as propagative structures in gas sensing, in most
its surface was functionalized by screen printing a titanium- cases, the microstrip technology is employed. For instance, in
dioxide (TiO2) layer on the electrodes and the sensing properties
[11]–[13] a sensitive layer was combined with a rectangular
towards O2 have been evaluated. Electrical characterization was
carried out in a frequency range spanning from 1.5 GHz to 3.5 patch antenna and the sensing performance towards a gas
GHz. The sensor response was evaluated at different binary gas target has been evaluated. The combination of a sensing layer
mixtures O2/N2by means of an Agilent 8753ES Vector Network with an antenna allows development of wireless sensor nodes
Analyzer (VNA). [15]. Moreover, in [1], [4], [16]–[21] different geometries of
microwave resonators have been explored for gas sensing
Keywords – Microwave characterization, Microstrip resonator, with interesting results in terms of response time and
S-parameter measurements, Oxygen sensor. measurement accuracy. Among the various structures
proposed over the years, in [5], [22]interdigital capacitors
I. INTRODUCTION (IDCs)covered by a sensing layer have been employed as gas
sensors.
In recent years, microwave technique provided a new route In this paper, an IDC, used as propagative structure, is
for the development of gas sensors. Traditional gas sensors covered by a thick layer of titania (TiO2), that acts as a
are based on resistive, capacitive and amperometric effects sensitive material. The developed prototype is used as probe
[1], [2] and, most of the time, they operate at high temperature for oxygen (O2) sensing. It is fabricated using the microstrip
(400°C). Despite conventional gas sensors, device based on technology and its electrical response towards different
microwave transducers are attracting considerable attention concentrations of O2 is measured in the frequency range
because of their interesting properties in terms of power spanning from 1.5 GHz up to 3.5 GHz. According to the
consumption, response time and operating temperature [1], literature, the TiO2 metal oxide is suitable for this purpose
[3]–[7]. A low-cost electronic interface can be developed for since the O2 molecules absorbed on its surface can be easily
such sensors with an accurate resonance frequency estimation desorbed even at room temperature [23]. This reduces the
[8]–[10]. Moreover, they are fully compatible with the sensor power consumption and makes the measurement
wireless technology so that they can be easily integrated into process more practical. Furthermore, the nanostructured TiO2
antennas [11]–[14]. employed allows increasing the number of O2 molecules
The working principle of a microwave transducer is based adsorbed on the surface, thereby improving the device
on the propagation and reflection of an electromagnetic wave sensitivity.
into a sensing material. When exposed to the gas target, the The main goal of this work is to employ an IDC as
sensing layer interacts with the gas molecules modifying its microwave transducer for O2 monitoring at room temperature
dielectric properties and its characteristic electrical response. and at concentrations between 0% and 100% v/v. A possible
As a consequence, the velocity of the electromagnetic wave is application for this device is in oxygen therapy, where the O2
affected. Beside the sensing material, that acts as an active concentration is usually greater than 85%. The device could
be also useful in spacecraft oxygen level detection, in these
cases the O2 concentration is above 60% [24].
1Giovanni Gugliandolo is with Istituto Nazionale di Ricerca This paper is organized as follows. In Section II, a
Metrologica, Strada delle Cacce, Torino, Italy, and with Politecnico description of the fabricated prototype is reported and details
di Torino, Corso Duca degli Abruzzi, 24, Torino, Italy, E-mail: about the experimental setup are given. In Section III the
g.gugliandolo@inrim.it sensor response at different O2 concentrations is evaluated in
2Mariangela Latino is with the MIFT Department, University of
terms of the input admittance parameter (Y11), focusing on the
Messina, Italy, E-mail: mlatino@unime.it
3Giuseppe Campobello and Nicola Donato are with the frequency range from 2 GHz to 2.5 GHz. Finally, conclusions
Department of Engineering, University of Messina, Contrada di Dio,
are givenin Section IV.
S. Agata, Messina, Italy, E-mails: gcampobello@unime.it,
ndonato@unime.it II. EXPERIMENTS
4Zlatica Marinkovic is with University of Niš, Faculty of

Electronic Engineering, Aleksandra medvedeva 14, 18000 Niš,


Serbia, E-mail: zlatica.marinkovic@elfak.ni.ac.rs The device presented in this work is a two-port IDC
5Giovanni Crupi is with the BIOMORF Department, University of employed as a microwave transducer for oxygen sensing. It is
Messina, Via Consolare Valeria, 98100 Messina, Italy, E-mail: fabricated on a 1.6-mm FR4 substrate by using the LPKF
crupig@unime.it Protomat S103 PCB milling machine. The substrate is

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 191


200
characterized by a dielectric constant εr = 4.2 and a loss
tangent tanδ = 0.015. Two microstrip lines with an input
100
impedance of 50 Ωare connected to two SMA connectors that
act as input and output ports for the microwave device. A

Real part (Ω)


0
picture of the device is reported in Fig. 1. The IDC is made by
six fingers with a length of 15 mm, width of 0.36 mm and a
-100
spacing of 0.36 mm. The board dimensions are relatively
small (20 mm x 30 mm x 1.6mm).A thick layer of TiO2 is a) Re(Z11) @ 0% O2
-200 Re(Z21) @ 0% O2
deposited by screen printing at the top of the IDC structure as Re(Z22) @ 0% O2
sensitive layer. After deposition, the sample is placed inside -300
Re(Z12) @ 0% O2

oven at 60°C for two hours in order to reduce the humidity 1500 2000 2500 3000 3500
content. The employed TiO2 is composed of 56.5% anatase, Frequency (MHz)
19.8% rutile and 23.6% brookite. Further information about
100
synthesis and characterization of this sensing material is
reported in [25]. 50

Imaginary part (Ω)


0

-50

-100 Im(Z11) @ 0% O2
b) Im(Z21) @ 0% O2
-150 Im(Z22) @ 0% O2
a) b) Im(Z12) @ 0% O2
Fig. 1. (a) Geometry of the developed prototype (W = 20 mm, -200
1500 2000 2500 3000 3500
L = 30 mm, Ws = 4 mm, Lf = 15 mm, Wf = S = 0.36 mm), Frequency (MHz)
(b) Fabricated IDC structure after the sensing material deposition
Fig. 2. Comparison between the real (a) and imaginary part (b)
The device is tested upon a controlled atmosphere by means of the Z-parameters
1.0
of a fully automated gas control system. This apparatus is
equipped with certified gas bottles and mass flow controllers 0.5
in order to set the preferred gas mixture inside the testing
chamber. The control system allows the operator to select the 0.0
Real part (S)

gas mixture, set the concentration value for each gas and
control/monitor the gas flow. The device under test (DUT) is -0.5

placed inside a Polytetrafluoroethylene (PTFE) test chamber Re(Y11) @ 0% O2


-1.0
for the electrical characterization. Because of the relatively Re(Y22) @ 0% O2

small chamber volume (5 cm3), it is possible to set or purge a) Re(Y11) @ 100% O2


-1.5 Re(Y22) @ 100% O2
the gas content in short time. The fabricated prototype, placed
inside the testing chamber, is connected to the Agilent 2000 2100 2200 2300 2400 2500
Frequency (MHz)
8753ES VNA for test. Before acquisition, the VNA is
1.0
calibrated using the Short-Open-Load-Through (SOLT)
standards. The microwave response, in terms of the scattering 0.5
(S-) parameters, is recorded for each O2 concentration set-
Imaginary part (S)

point. Measurements performed on the DUT are reported in 0.0


the next section.
-0.5

III. RESULTS -1.0


Im(Y11) @ 0% O2
Im(Y22) @ 0% O2
b) Im(Y11) @ 100% O2
The TiO2-IDC device is tested inside the test chamber with -1.5 Im(Y22) @ 100% O2
a binary gas mixture composed by oxygen and nitrogen (N2).
2000 2100 2200 2300 2400 2500
The O2 concentration is varied from 0% (pure N2 inside
Frequency (MHz)
chamber) to 100% (no N2 inside chamber). The gas flow is set
to 100 cm3/min and this value is maintained constant for the Fig. 3. Comparison between the real (a) and imaginary part (b)
whole measurement session. The DUT behavior at O2 of Y11 and Y22 parameters
concentration variation is studied in terms of admittance (Y-) As illustrated in Fig. 2, the measured data show that the
parameters, which are achieved from the measured S- impedance (Z-) parameters of the DUT are quite close to the
parameters. Measurements are carried out considering the condition Z11 = Z22 = − Z12 = − Z21 and, analogously, the Y-
frequency range from 1.5 GHz to 3.5 GHz. However, since a
parameters are quite close to the condition
substantial variation on the admittance parameters is recorded
between 2.0 GHz and 2.5 GHz, this band is considered in the Y11 = Y22 = Y12 = Y21 . This is valid for any O2 concentration
study. value, however, for brevity, the Y-parameters are plotted only

192
for the lowest and highest concentration of O2: 0% and 100% In Fig. 5, the real and imaginary parts of Y11 are plotted at
of O2 (see Figs. 3 and 4). Therefore, the attention has been different O2 concentrations. As shown, the O2 concentration
restricted to the analysis of the frequency-dependent behavior changes are transduced by the microwave device into
of Y11. variations of Y11. Peaks and dips in the spectrum are shifted in
1.0 frequency and their amplitude is affected as well. In this work,
the frequency shifts in Y11 are used as markers for O2
0.5 detection.
At certain frequencies, the imaginary part of Y11 becomes
0.0
null and the parameter is purely real. At these frequencies the
Real part (S)

device resonates and it is possible to relate the change in the


-0.5
resonant frequency to a change in the O2 concentration. In the
-1.0
Re(Y21) @ 0% O2
investigated bandwidth, three resonant frequencies can be
Re(Y12) @ 0% O2
a) Re(Y21) @ 100% O2
found: f1 = 2.21 GHz, f2 = 2.33 GHz, f3 = 2.38 GHz (at 0%
-1.5 Re(Y12) @ 100% O2 O2).
In Fig. 6the three resonant frequencies are reported as a
2000 2100 2200 2300 2400 2500
function of O2. The frequency dependence on O2
Frequency (MHz)
1.0
concentration seems to be almost linear for all the resonances.
The sensitivity (S) of each resonant frequency to changes in
0.5 the concentration of O2is evaluated as:

f rx − f r 0
Imaginary part (S)

0.0
S= , (1)
-0.5
%O2

-1.0
Im(Y21) @ 0% O2 Where frx is the resonance frequency at the generic %O2
Im(Y12) @ 0% O2
oxygen concentration and fr0 is the resonant frequency when
b) Im(Y21) @ 100% O2
-1.5 Im(Y12) @ 100% O2
there is no oxygen inside the test chamber.
The sensitivity is plotted in Fig. 7. As regards f1 and f3, it
2000 2100 2200 2300 2400 2500
varies from -2 MHz/% to 56 kHz/%. On the other hand, the
Frequency (MHz)
sensitivity for f2 is almost constant and equal to -330 kHz/%.
Fig. 4. Comparison between the real (a) and imaginary part (b)
2400
of Y21 and Y12 parameters
0.5
2350
Frequency (MHz)

0.0
2300
0% O2
f1
Re[Y11] (S)

-0.5 5% O2
f2
10% O2 2250 f3
15% O2
-1.0 20% O2
40% O2 a) 2200
70% O2 0 20 40 60 80 100
-1.5
100% O2
O2 concentration (%)
2000 2100 2200 2300 2400 2500
Fig. 6. Resonant frequencies vs. oxygen concentration: frequencies at
Frequency (MHz) which the Y11 parameter becomes purely real
1.0
0.5
0.5
0.0
0.0
0% O2
Sensitivity (MHz / %)
Im[Y11] (S)

5% O2 -0.5
-0.5
10% O2
15% O2 -1.0
-1.0
20% O2
40% O2 -1.5
-1.5 70% O2 b) f1
f2
100% O2 -2.0
-2.0 f3
2000 2100 2200 2300 2400 2500
-2.5
Frequency (MHz) 0 20 40 60 80 100
Fig. 5. Frequency dependence of the real (a) and imaginary part (b) O2 concentration (%)
of Y11 at different oxygen concentrations. At three resonant Fig. 7. Sensitivity of each resonant frequency. For f1 and f3 the
frequencies, the imaginary part is null and the Y11 parameter sensitivity is high for O2 concentrations less than 20%. The
becomes purely real sensitivity of f2 is almost constant in the entire range explored

193
IV. CONCLUSION Croatia, 2020, pp. 1-5, doi:
10.1109/I2MTC43012.2020.9128364
[11] B. Wu, X. Zhang, B. Huang, Y. Zhao, C. Cheng, and H. Chen,
An interdigitated capacitor was designed and realized in “High-Performance Wireless Ammonia Gas Sensors Based on
FR4 substrate, the interdigitated fingers were covered by a Reduced Graphene Oxide and Nano-Silver Ink Hybrid Material
titania layer in order to test the sensing properties towards Loaded on a Patch Antenna”, Sensors, vol. 17, no. 9, p. 2070,
oxygen. The device was exposed in a controlled atmosphere Sep. 2017, doi: 10.3390/s17092070
with an oxygen concentration range spanning from 0% to [12] H. Lee et al., “Carbon-Nanotube Loaded Antenna-Based
100%. The sensing performance was evaluated by measuring Ammonia Gas Sensor”, IEEE Trans. Microw. Theory Techn.,
S-parameters and converting as Y-ones. The attention has vol. 59, no. 10, pp. 2665-2673, Oct. 2011, doi:
been focused on the shift of the resonant frequencies in the 10.1109/TMTT.2011.2164093
[13] G. Gugliandolo, K. Naishadham, N. Donato, G. Neri, and V.
input admittance parameter. The reported data can be
Fernicola, “Sensor-Integrated Aperture Coupled Patch
considering a promising solution in order to develop oxygen Antenna”, 2019 IEEE International Symposium on
low power sensing devices. Measurements & Networking (M&N), Jul 2019, pp. 1-5, doi:
10.1109/IWMN.2019.8805023
[14] H. Torun, F. Cagri Top, G. Dundar, and A. D. Yalcinkaya, “An
REFERENCES antenna-coupled split-ring resonator for biosensing,” J. Appl.
Phys., vol. 116, no. 12, p. 124701, Sep. 2014, doi:
[1] A. Bogner, C. Steiner, S. Walter, J. Kita, G. Hagen, and R. 10.1063/1.4896261
Moos, “Planar Microstrip Ring Resonators for Microwave- [15] G. Campobello, M. Castano, A. Fucile, and A. Segreto, WEVA:
Based Gas Sensing: Design Aspects and Initial Transducers for A Complete Solution for Industrial Internet of Things. Ad-hoc,
Humidity and Ammonia Sensing”, Sens. Switz., 2017, doi: Mobile, and Wireless Networks, ADHOC-NOW 2017, Lecture
10.3390/s17102422 Notes in Computer Science, vol. 10517, Springer.
[2] E. Comini, G. Faglia, and G. Sberveglieri, Eds., Solid State Gas [16] S. Chopra, S. Natarajan, and A. M. Rao, “Gas Sensing Using
Sensing. Boston, MA, Springer US, 2009. Carbon Nanotube-Based Resonator”, Proceedings of IEEE
[3] G. Barochi, J. Rossignol, and M. Bouvet, “Development of Sensors, pp. 399-402, doi: 10.1109/ICSENS.2004.1426183,
Microwave Gas Sensors”, Sens. Actuators B Chem., vol. 157, 2004.
no. 2, pp. 374-379, Oct. 2011, doi: 10.1016/j.snb.2011.04.059 [17] D. Aloisio, N. Donato, “Development of Gas Sensors on
[4] J. Rossignol et al., “Microwave-Based Gas Sensor with Microstrip Disk Resonators”, Procedia Eng., vol. 87, pp. 1083-
Phthalocyanine Film at Room Temperature”, Sens. Actuators B 1086, 2014, doi: 10.1016/j.proeng.2014.11.351
Chem., vol. 189, pp. 213-216, Dec. 2013, doi: [18] G. Bailly, A. Harrabi, J. Rossignol, M. Michel, D. Stuerga, and
10.1016/j.snb.2013.03.092 P. Pribetich, “Microstrip Spiral Resonator for Microwave-Based
[5] A. Rydosz, E. Maciak, K. Wincza, and S. Gruszczynski, Gas Sensing”, IEEE Sens. Lett., vol. 1, no. 4, pp. 1-4, Aug.
“Microwave-Based Sensors with Phthalocyanine Films for 2017, doi: 10.1109/LSENS.2017.2716413
Acetone, Ethanol and Methanol Detection”, Sens. Actuators B [19] G. Bailly et al., “Influence of the Design in Microwave-based
Chem., vol. 237, pp. 876-886, Dec. 2016, doi: Gas Sensors: Ammonia Detection with Titania Nanoparticles”,
10.1016/j.snb.2016.06.168 Procedia Eng., vol. 168, pp. 264-267, 2016, doi:
[6] B.-H. Kim et al., “A Gas Sensor Using Double Split-Ring 10.1016/j.proeng.2016.11.185
Resonator Coated with Conducting Polymer at Microwave [20] G. Gugliandolo, A. Mirzaei, M. Bonyani, G. Neri, M. Latino,
Frequencies”, IEEE SENSORS 2014, Nov. 2014, pp. 1815- and N. Donato, “Electrical Characterization of Microstrip
1818, doi: 10.1109/ICSENS.2014.6985379 Resonators Based on Nanostructured Sensing Materials”,
[7] G. Gugliandolo, D. Aloisio, S. G. Leonardi, G. Campobello, and Sensors and Microsystems, LNEE, vol. 457, 2018, pp. 29-34.
N. Donato, “Resonant Devices and Gas Sensing: from Low [21] S. Walter, A. Bogner, G. Hagen, and R. Moos, “Novel Radio-
Frequencies to Microwave Range”, 2019 14th International Frequency-Based Gas Sensor with Integrated Heater”, J. Sens.
Conference on Advanced Technologies, Systems and Services Sens. Syst., vol. 8, no. 1, pp. 49-56, Jan. 2019, doi:
in Telecommunications (TELSIKS), Oct. 2019, pp. 21-28, doi: 10.5194/jsss-8-49-2019
10.1109/TELSIKS46999.2019.9002368 [22] G. Bailly, A. Harrabi, J. Rossignol, D. Stuerga, and P. Pribetich,
[8] G. Campobello, G. Cannatà, N. Donato, A. Famulari, and S. “Microwave Gas Sensing with a Microstrip Interdigital
Serrano, “A Novel Low-Complex and Low-Memory Method for Capacitor: Detection of NH3 with TiO2 Nanoparticles”, Sens.
Accurate Single-Tone Frequency Estimation”, 4th International Actuators B Chem., vol. 236, pp. 554-564, Nov. 2016, doi:
Symposium on Communications, Control and Signal 10.1016/j.snb.2016.06.048
Processing, ISCCSP 2010, Limassol, Cyprus, 3-5 March 2010, [23] H. Wang et al., “A Room Temperature Oxygen Gas Sensor
Article number 5463459. Based on Hierarchical TiO2”, 2016 IEEE International
[9] G. Campobello, G. Cannatà, N. Donato, M. Galeano, and S. Conference on Manipulation, Manufacturing and Measurement
Serrano, “An Accurate and Simple Frequency Estimation on the Nanoscale (3M-NANO), Jul. 2016, pp. 199-202, doi:
Method for SensorApplications”, D’Amico A., Di Natale C., 10.1109/3M-NANO.2016.7824936
Mosiello L., Zappa G. (eds) Sensors and Microsystems. Lecture [24] E. M. Cortright, Apollo Expeditions to the Moon, Washington,
Notes in Electrical Engineering, vol. 109. Springer, Boston, DC: U.S. Government Printing Office, 1975.
MA, 2012. [25] D. M. Tobaldi, S. G. Leonardi, R. C. Pullar, M. P. Seabra, G.
[10] G. Campobello, A. Segreto, and N. Donato, “A New Frequency Neri, and J. A. Labrincha, “Sensing Properties and
Estimation Algorithm for IoT Applications and Low-Cost Photochromismof Ag–TiO 2 Nano-Heterostructures”, J. Mater.
Instrumentation”, 2020 IEEE International Instrumentation and Chem. A, vol. 4, no. 24, pp. 9600-9613, 2016, doi:
Measurement Technology Conference (I2MTC), Dubrovnik, 10.1039/C6TA03760G

194
Artificial Neural Network Modeling of Interdigital
Capacitor Sensor for Oxygen Detection
Zlatica Marinković, Giovanni Gugliandolo2, Mariangela Latino3, Giuseppe Campobello4,
Giovanni Crupi5 and Nicola Donato4
Abstract – Microwave interdigital capacitors (IDCs) realized in layers, the IDC characteristics change when exposed to
standard microstrip technology whose electrodes are covered by different concentration of the gas to be detected [6]-[10]. This
a titanium-dioxide (TiO2) layer can be used for sensing oxygen, is one of the approaches followed to develop microwave gas
as their RF behaviour change when exposed to different oxygen sensors, a second one consists in the design of resonators,
concentrations. In order to model the variation of the frequency
equipped with sensing layers able to change the resonance
dependent behaviour of an IDC with oxygen concentration, in
this paper, artificial neural networks (ANNs) are exploited. The frequency value when exposed to gas targets [9]-[10].
modelling results match very well the corresponding measured Therefore, it is useful to have a model of the IDC which
values over the whole range of oxygen concentration from 0 to includes the dependence of its frequency-dependent
100%. characteristics on the gas concentration. In the particular case,
the studied IDC, realized in microstrip technology, is covered
Keywords – Admittance (Y-) parameters, Artificial neural with a tick layer of titanium-dioxide (TiO2), which is able to
networks, Interdigital capacitors, Oxygen sensing. absorb the oxygen (O2) molecules, thereby making the IDC
suitable for O2 sensing applications [5]. Therefore, the
I. INTRODUCTION dependence of the device characteristics in terms of
admittance (Y-) parameters versus O2 concentration and
Artificial neural networks (ANNs) have been efficiently frequency are modeled by means of ANNs.
applied to build behavioral models of the RF characteristics of The paper is structured as follows. In Section II, a
different microwave devices, such as microwave transistors, description of the proposed neural model is given. Section III
RF MEMS switches, microstrip antennas, etc. [1]-[6]. The contains details of the modeled device and the developed
models include the dependence on frequency and on different model, as well as the comparison of the obtained results with
parameters such as device dimensions or operating conditions, measured reference values. The concluding remarks are given
e.g. temperature or bias conditions. The models can be in Section IV.
developed from the measured data or from the data simulated
in accurate electromagnetic (EM) simulators. In any case, II. PROPOSED ANN MODEL
once developed an ANN based model provide fast and
accurate response for any input value from the input As mentioned above in Introduction, the IDC characteristics
parameter space, without need for additional measurements or modeled for sensing purposes are the admittance (Y-)
simulations. Therefore, ANN based models are suitable for parameters. The measured Y-parameters of the interdigital
efficient analysis of the device behavior with the changes of capacitor considered in this work roughly satisfy the condition
input parameters or for optimization of the device behavior. Y11 = Y22 = Y21 = Y12, as discussed in [11]. Therefore, it is
In this paper the neural based admittance (Y-) parameter enough to model only one of the four measured Y-parameters,
modeling is applied to an interdigital capacitor (IDC) aimed let it be Y11. Having in mind that the characteristics vary when
for gas sensing. Namely, if covered by appropriate gas sensing the oxygen concentration varies from the reference
concentration and the frequency behavior under any
1Zlatica Marinković is with the University of Niš, Faculty of concentration value follows a pretty much similar trend, to
Electronic Engineering, Aleksandra Medvedeva 14, 18000 Niš, ensure the modeling accuracy, the proposed model accounts
Serbia, E-mail: zlatica.marinkovic@elfak.ni.ac.rs
2Giovanni Gugliandolo is with Istituto Nazionale di Ricerca for the values of Y11 at a chosen reference oxygen
Metrologica, Strada delle Cacce, Torino, Italy, and with Politecnico concentration, i.e., the model is realized by applying the so-
di Torino, Corso Duca degli Abruzzi, 24, Torino, Italy, E-mail: called prior knowledge input (PKI) neural modeling approach
g.gugliandolo@inrim.it [1].
3Mariangela Latino is with the MIFT Department, University of Namely, PKI ANN models have, besides original inputs,
Messina, Italy, E-mail: mlatino@unime.it additional inputs correlated with the output parameters. The
4Giuseppe Campobello and Nicola Donato are with the
proposed model is shown in Fig. 1.
Department of Engineering, University of Messina, Contrada di Dio,
S. Agata, Messina, Italy, E-mails: gcampobello@unime.it,
ndonato@unime.it
5Giovanni Crupi is with the BIOMORF Department, University of

Messina, Via Consolare Valeria, 98100 Messina, Italy, E-mail:


crupig@unime.it

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 195


Fig. 2. Photo of the investigated IDC structure after the sensing
material deposition
Fig. 1. Proposed ANN model for the studied sensor
The model is composed of two ANNs. The first one, The data used for the ANN model development were
ANN1, is trained to model the frequency dependence of the obtained by measuring the device scattering (S-) parameters
real and imaginary parts of Y11 at the reference oxygen for different oxygen concentrations from 0% (no presence of
concentration. The main ANN, ANN2, relates the real and oxygen) and 100% (only oxygen present) in the frequency
imaginary parts of Y11 with the oxygen concentration and range from 1.5 GHz to 2.925 GHz (step of 1.25 MHz) using
frequency, having the information about Y11 at the considered the measurement setup described in [11]. The S-parameters
frequency at the reference concentration. were converted into the Y-parameters, which are further used
Therefore, both ANNs have two outputs, corresponding to for the ANN model training and verification. The
the real and imaginary parts of Y11. ANN1 have one input measurements were performed for the following values of
corresponding to the frequency, whereas ANN2 have four oxygen concentrations: 0%, 5%, 10%, 15%, 20%, 40%, 70%,
inputs corresponding to the oxygen concentration, frequency and 100%.
and Y11 parameter at the reference oxygen concentration. Having in mind a non-uniform sampling of the oxygen
The ANNs used in this work are multilayered perceptron concentration levels, the concentration of 70% was chosen as
networks (MLP), having neurons grouped into layers: input the reference one, as it is in the part of the input space where
layer, output layer and one or more hidden layers [1]. The the values are sampled with a bigger step. All available data
number of neurons in input layer is equal to the number of referring to the concentration of 70% (1141 samples) were
input parameters and the number of output layer is equal to used to train the ANN1, giving the frequency dependence of
the number of output parameters. The number of hidden Y11 for the reference concentration. The best ANN has six
neurons is determined in the ANN training phase. The neurons in the first hidden layer and four neurons in the
neurons are characterized by a transfer function, which is the second hidden layer. The real and imaginary part simulated by
unity function for the input layers, sigmoid function for the model (lines) compared with the reference values are
hidden layers and linear for the output layer. The neurons shown in Fig. 3.
from one layer are connected to all neurons from the
0.8
following layer and each connection is weighted. During the Re(Y 11 ) - reference values
training the ANN parameters, i.e., connection weights and 0.6 Re(Y 11 ) - ANN model
thresholds of the neuron transfer functions, are adjusted to Im(Y 11 ) - reference values
obtain the ANN response matching the target values with the 0.4 Im(Y 11 ) - ANN model
defined accuracy. In this work, The ANNs were trained by
applying the Levenberg-Marquardt training algorithm [1], 0.2
which belongs to the backpropagation type of training
0
algorithms. For both ANNs, during the training the ANNs
with different number of hidden neurons in two hidden layers -0.2
were trained with the aim to find an ANN structure providing
the best accuracy. The ANNs with two hidden layers were -0.4
chosen as two-hidden layer ANNs have better generalization
ability than one-hidden layer ANNs. Generalization ability is -0.6
a measure of the capability of an ANN to give accurate output
also for the input values not used for the ANN training. The -0.8
1.5 2 2.5 3
accuracy of the trained ANNs was estimated through average f [GHz]
test error, worst case error (WTE) and correlation coefficient
r, defined as in [1]. After the ANNs are trained, the model can Fig. 3. Y11 parameter at 70% of the O2 concentration: (symbols)
be used for fast estimation of the IDC characteristics for measurements and (lines) ANN simulations
different values of oxygen concentration without need for any
additional measurement. ANN2 was trained using the data referring to the following
values of concentrations: 0%, 10%, 20%, 40%, 70%, and
III. RESULTS AND DISCUSSION 100%, whereas the data referring to 5% and 15% were used
for the ANN test purpose. To build the training set, for each
A picture of the modeled IDC after the sensing material frequency appearing in the training set, the Y11 parameter real
deposition is shown in Fig. 2 [6]. and imaginary parts referring to the concentration of 70%
were calculated by using ANN1. As there were 1141 samples

196
available per a concentration, the training set consisted of concentrations of 5% and 15% not used for the ANN training
6846 samples, and the test set consisted of 2282 samples. The are reported.
best ANN has 15 neurons in the first hidden layer and 12 The developed model can be used further to analyze the
neurons in the second hidden layer. This ANN predicts well frequency behaviour of Y11 at an arbitrary value of oxygen
the Y11 parameter with good accuracy not only for the oxygen concentration. To illustrate this, in Fig. 6, the real and
concentrations used for the training purpose, as well as for the imaginary parts of Y11 generated by the developed model for
test values of the concentration. For illustration, in Fig. 4, a the oxygen concentrations for 0% to 100% with the step of
comparison of the simulated values with the target reference 10% were shown in the frequency range from 2 GHz to
values for two values of the oxygen concentration is shown. 2.5 GHz.
The values referring to these concentrations (40% and 100%) As it can be noticed from Figs. 4 and 5, in some cases there
belong to the training set. A good agreement of the simulated are certain deviations from the reference values for the
and reference values indicate that the ANN learnt the training frequencies where the peaks and deeps appear. However, as in
data very well. The ANN achieved also satisfactory this type of sensors the resonat frequency shifts are more of
generalization accuracy, i.e., it gives accurate responses also interest for sensing purpose, these deviations in the areas of
for the values not used in the training set. This is illustrated in peaks and deeps can be considered as acceptable.
Fig. 5 where the simulated and reference values for the
0.6 0.5
Re(Y 11 ) - reference values Re(Y 11 ) - reference values
Re(Y 11 ) - ANN model 0.4 Re(Y 11 ) - ANN model
0.4 Im(Y 11 ) - reference values Im(Y 11 ) - reference values
0.3 Im(Y 11 ) - ANN model
Im(Y 11 ) - ANN model
0.2 0.2

0.1
Y11 [S]

0
0

-0.2 -0.1

-0.2
-0.4
-0.3

-0.6 -0.4
1.5 2 2.5 3 1.5 2 2.5 3
f [GHz] f [GHz]

(a) (a)

0.8 0.5
Re(Y 11 ) - reference values
0.6 0.4 Re(Y 11 ) - ANN model
Im(Y 11 ) - reference values
0.4 0.3 Im(Y 11 ) - ANN model
0.2 0.2
0
0.1
Y11 [S]

-0.2
0
-0.4
-0.1
-0.6
Re(Y 11 ) - reference values
-0.2
-0.8 Re(Y 11 ) - ANN model
Im(Y 11 ) - reference values -0.3
-1
Im(Y 11 ) - ANN model
-1.2 -0.4
1.5 2 2.5 3 1.5 2 2.5 3
f [GHz] f [GHz]

(b) (b)

Fig. 4. Y11 at two training values of the O2 concentration (symbols – Fig. 5. Y11 at two test values of the O2 concentration (symbols –
measurements, lines - ANN simulations): (a) 40%, (b) 100% measurements, lines - ANN simulations): (a) 5%, (b) 15%

197
0.4 in the present case) as the additional ANN inputs. The
developed model exhibs good learning and genralization
0.2 accuracy. Such a model can be further used for the analysis of
the shift in the resonant frequencies i, which can be used as
0 markers for the oxygen detection.
0% O2
-0.2 10% O
2 ACKNOWLEDGEMENT
20% O2
-0.4 30% O2
40% O2
The work presented in this paper has been supported by the
-0.6 50% O Ministry for Education, Science and Technological
2
60% O2 Development of Serbia.
-0.8 70% O2
80% O2
-1 90% O2
REFERENCES
100% O2
-1.2 [1] Q. J. Zhang and K. C. Gupta, Neural Networks for RF and
2 2.1 2.2 2.3 2.4 2.5 Microwave Design, Boston, MA: Artech House, 2000.
f [GHz] [2] H. Kabir, L. Zhang, M. Yu, P. Aaen, J. Wood, and Q. J. Zhang,
“Smart Modeling of Microwave Devices”, IEEE Microw. Mag.,
(a) vol. 11, no. 3, pp. 105-118, May 2010.
0.8 [3] Z. Marinković, G. Crupi, A. Caddemi, V. Marković, and D. M.
M.-P. Schreurs, “A Review on the Artificial Neural Network
0.6 Applications for Small-Signal Modeling of Microwave FETs,”
Int. J. Numer. Model. Electron. Netw. Dev. Field, vol. 33, no. 3,
0.4 May/June 2020, e2668.
0.2
[4] Z. Marinković, T. Kim, V. Marković, M. Milijić, O. Pronić-
0% O2 Rančić, T. Ćirić, L. Vietzorreck, “Artificial Neural Network
0 10% O2 Based Design of RF MEMS Capacitive Shunt Switches”,
20% O
2
Applied Computational Electromagnetics Society Journal, vol.
-0.2 30% O2 31 no. 7, pp. 756-764, July 2016.
40% O2 [5] J. Jin, F. Feng, W. Na et al. “Recent Advances in Neural
-0.4
50% O2 Network Based Inverse Modeling Techniques for Microwave
-0.6 60% O2 Applications”, Int. J. Numer. Model. Electron. Netw. Dev.
70% O2 Field, e2732, 2020.
-0.8 80% O2 [6] G. Gugliandolo, D. Aloisio, S. G. Leonardi, G. Campobello, and
90% O2 N. Donato, “Resonant Devices and Gas Sensing: from Low
-1
100% O2 Frequencies to Microwave Range”, 14th International
-1.2 Conference on Advanced Technologies, Systems and Services
2 2.1 2.2 2.3 2.4 2.5 in Telecommunications (TELSIKS 2019), Oct. 2019, pp. 21-28.
f [GHz] [7] G. Bailly, A. Harrabi, J. Rossignol, D. Stuerga, and P. Pribetich,
(b) “Microwave Gas Sensing with a Microstrip InterDigital
Capacitor: Detection of NH3 with TiO2 nanoparticles”, Sensors
Fig. 6. Y11 for the oxygen concentrations from 0% to 100%: and Actuators, B: Chemical, 236, pp. 554-564, 2016.
(a) real parts, (b) imaginary parts [8] A. Rydosz, E. Maciak, K. Wincza, and S. Gruszczynski,
“Microwave-Based Sensors with Phthalocyanine Films for
Namely, with a change of the oxygen concentration the Acetone, Ethanol and Methanol Detection”, Sensors and
resonant frequency (when Y11 becomes real, i.e., having the Actuators B: Chemical, 237, pp. 876-886, 2016.
imaginary part equal to zero) is shifted. As the model gives [9] D. Aloisio and N. Donato, “Development of Gas Sensors on
very good accuracy in the areas where the imaginary part of Microstrip Disk Resonators”, Procedia Eng., vol. 87, pp. 1083-
Y11 crosses the zero, the model can be efficiently used for the 1086, 2014, doi: 10.1016/j.proeng.2014.11.351
analysis of the device as an oxygen sensor. [10] G. Gugliandolo, A. Mirzaei, M. Bonyani, G. Neri, M. Latino,
and N. Donato, “Electrical Characterization of Microstrip
Resonators Based on Nanostructured Sensing Materials”,
IV. CONCLUSION Sensors and Microsystems, LNEE, vol. 457, 2018, pp. 29-34.
[11] G. Gugliandolo, M. Latino, G. Campobello, Z. Marinkovic, G.
Crupi, and N. Donato, “On the Gas Sensing Properties of
In this paper an ANN based model for modeling of the Microwave Transducers”, 55th Scientific Conference on
admittance parameters of an interdigital capacitor versus Information, Communication and Energy Systems and
frequency and oxygen concentration was proposed. As for the Technologies – ICEST 2020, September 10-20, 2020, Niš,
considered device all four Y-parameters are roughly equal, it Serbia.
was enough to develop a model for only one parameter, Y11.
The PKI approach was applied, having the values of the real
and imaginary parts of Y11 at a reference concentration (70%

198
Analysis of Dual Band PA Nonlinear Performances by
Application of Digital Linearisation Model
Aleksandar Atanasković1, Aleksandra Đorić1, Nataša Maleš-Ilić1
Abstract – A dual band power amplifier designed to sustain The estimation of the proposed technique effects was
high efficiency at two diverse working frequencies, 2.1 GHz and performed through the simulation analysis and experimentally
5 GHz, is linearised by the technique that uses baseband signal on several single stage PA [4-6] and two-way Doherty PA
processing in the digital domain. Generation of the dual band PA topologies [7-9], as well for the mixer [10].
matching circuits consist of two individual steps. Firstly,
In the research of this paper, we extend the application of
transformation of the selected complex impedances at the two
operating frequencies into the real impedance identical for the the formerly developed digital linearisation model to the
both observed frequencies is performed. Secondly, synthesis of designed PA which operates at two different frequency bands
the dual band filter in order to provide matching of the real with satisfying accomplishment of the main operating
impedance with the termination impedances is carried out. The requirements, such as efficiency, gain and linearity.
linearisation of the dual band amplifier is accomplished by the Hitherto, the modeled dual band PA was successfully
2nd order nonlinear baseband signals, which modulate the carrier linearised by the formerly deployed analogue linearisation
2nd harmonic. The generated signals in this manner are then approach [11] that uses the 2nd order distortions of the
induced at the gate and drain of the dual band PA transistor. fundamental signals (IM2) around the 2h frequencies.
The assessment of the linearisation influence was performed for
In this paper, for the first time, the digital linearisation
the two baseband signals spaced in frequency by diversified
intervals up to 80 MHz for output levels-Pout from 25 dBm to approach that uses the digitally processed baseband signals
35 dBm for both considered frequencies. was applied on the dual band PA designed to operate at two
divers frequencies, f1 (2.1 GHz) and f2 (5 GHz). Basic steps of
Keywords – Dual band PA, dual band filter, digitally processed the dual band MN designing method [12-15] are shortly
baseband signals, 2nd harmonic, IM products. described in this paper. The effect of the linearisation
application is inspected by simulation for the QAM baseband
source, which spectrum has two frequency components
I. INTRODUCTION spaced by different values starting from 20 MHz and going to
80 MHz, as also for the different Pout levels 25 dBm, 30 dBm
Recently, in the modern communication systems, necessity and 35 dBm.
of implementation of electronic equipment that can
concurrently operate over several frequency bands is rapidly
growing. Consequently, deployment of multiband PA has II. APPLICATION OF THE DIGITAL LINEARISATION
become an attractive research theme in the area of wireless MODEL ON THE DUAL BAND PA
microwave systems. The literature includes various reports for
different multistandard PA solutions [1-3]. The applied linearisation model uses the baseband signal
In the former study phases, the linearisation technique that transformation DSP system (Fig. 1) to generate adequate in-
utilizes the digital processing of the baseband signals was phase IIM2 and quadrature-phase QIM2 components of the 2nd
deployed in order to reduce the PA nonlinearity. The adequate order nonlinear signals. The IIM2 and QIM2 signals are properly
linearisation signals of the 2nd order, that modulate the 2h (2nd
tuned in magnitude by coefficients a{i2h|o2h} and phase by
harmonic) of the fundamental carrier, were formed by this
approach and the modulated signals at the 2h are then fed to θ{i2h|o2h} and modulate the fundamental carrier 2h. The
the amplifier transistor gate and drain. In accordance with the
analysis carried out in [4-10], due to the 2nd order transistor modulated linearisation signals shaped in this way are then
nonlinearity, the interference between the modulated 2h and conducted into an IQ modulator with a central frequencies of
the basic useful signals creates the additional IM products of the fundamental carrier 2h. The signals are then lead at the
the 3rd order. These additional IM products may lessen the input and at output of the dual band PA transistor by the BPF
primary nonlinear products resulting from transistor with central frequencies 2f1 and 2f2. Indices i2h and o2h mark
nonlinearity by suitable selection of the phases and amplitudes the signals that are supplied at the amplifier transistor gate and
of the linearisation signals. drain, respectively.

Aleksandar Atanaskovic, Aleksandra Đorić and Nataša Maleš-


Ilić are with University of Niš, Faculty of Electronic Engineering,
aleksandar.atanaskovic;
Aleksandra Medvedeva aleksandra.djoric;
14, 18000 Niš, Serbia, E-mails:
aleksandar.atanaskovic@elfak.ni.ac.rs;
natasa.males.ilic)@elfak.ni.ac.rs.
aleksandra.djoric@elfak.ni.ac.rs; natasa.males.ilic@elfak.ni.ac.rs

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 199


Fig. 1. Scheme of dual band PA linerisation model which uses the digital processing of the baseband signals

A. Dual Band PA Model to the central frequencies 2.1 GHz or 5 GHz. These signals are
conducted simultaneously at the PA input for several Pout
The tool used for the synthesis of the PA source and load levels of the fundamental signals: 25 dBm, 30 dBm and
dual band MN (matching network) was software ADS 35 dBm.
(Advanced Design System). The IM products of the 3rd (IM3) and 5th (IM5) order are
The dual band PA was modeled in configuration with represented in the Fig. 2 to Fig. 5, for both considered
distributed elements with aim to perform concurrently at two frequency bands, with and without application of the
broadly spaced frequencies, f1 = 2.1 GHz and f2 = 5 GHz, and linearisation model for various Pout levels and diverse
the Cree transistor model CGH40025F GaN was used in the frequency span between the tones.
dual band PA design. It should be pointed out that represented results for all
The dual band matching was realized through two major analyzed Pout were obtained in case when the optimization of
stages [11-15]. In the first stage, selection of the optimum the linearisation parameters (phase and amplitude of the
impedances at the two operative frequencies, 2.1 GHz and baseband linearisation signals) was carried out for 40 MHz
5 GHz, was made based on the ADS load-pull/source-pull input signal differences regarding frequency.
method with the aim to accomplish high efficiency at both In the lower band, around the 2.1 GHz frequencies, the
observed frequencies. The obtained matching source and load highest suppressing of the IM3 products is achieved for the
normalized impedances in the case of the 2.1 GHz are 20 MHz signals separation for all observed Pout levels. In the
Zsf1 = (0.124 + j0.096) Ω and Zlf1 = (0.188 + j0.114) Ω, case of the 25 dBm Pout, satisfactory reduction of the IM3
respectively, while for the 5 GHz they are products was accomplished until the 50 MHz tones spacing.
Zsf2 = (0.174 – j0.086) Ω and Zlf2 = (0.166 – j0.088) Ω. The The IM3 levels are lessened 16 dB for the 20 MHz span and
dual band PA is powered by VD = 28 V, IDQ = 350 mA. These with the increase of the frequency separation between the
selected complex impedances at two working frequencies f1 tones their reduction decrease to 3 dB at the 80 MHz
and f2 are converted into the real impedance (R) that has the separation in the case of the 30 dBm Pout. Also, the IM3
same value for the both frequencies. In the second stage, the levels are decreased by 15 dB for the 35 dBm Pout and the
dual band filter theory was used to convert previously gained 20 MHz signals spacing, whereas at the 80 MHz spacing their
real impedance R to 50 Ω terminations at two targeted reduction level falls to 9 dB.
frequencies. Very symmetrical suppression grade is achieved, regarding
the IM5 products, for the 25 dBm and 30 dBm Pout. The IM5
B. Results levels descending around 3 dB for the 25 dBm Pout for all
considered tone spans while for the 30 dBm Pout their
reduction values goes from 15 dB for the 20 MHz span to
The evaluation of the applied linearisation model on the
12 dB for the 80 MHz signal separation. For the highest
modeled dual band PA was executed through the ADS QAM
considered Pout of 35 dBm, the IM5 levels descend by 10 dB
source baseband test. The frequency separation of the
in the case of the 20 MHz spacing until 2 dB at the 80 MHz
baseband signal pairs goes from 20 MHz to 80 MHz in regard
tones separation.

200
In the higher band, around the 5 GHz frequencies, when the signals are formed in the baseband by using DSP and
Pout is 25 dBm, the IM3 products are descended by 12 dB for appropriate hardware, which energy consumption is more
the 20 MHz tones separation whereas their suppression value optimal than the linearisation circuit devices needed in the
for the 80 MHz drops to 1 dB. For the 30 dBm Pout, the IM3 analogue method.
levels decline for 15 dB for the 20 MHz spacing until the
value of 10 dB at the 80 MHz interval between the tones. In
the case of the Pout 35 dBm, the reduction level of the IM3
distortions drops from 9 dB at 20 MHz spacing until 3 dB for
the 80 MHz tones shifting.
The IM5 products reduction level for the 25 dBm Pout is
around 8 dB and for the 30 dBm Pout is around 12 dB for all
observed frequency intervals while for the 35 dBm Pout
satisfactory suppression is accomplished only for the smallest
tone spacing. a) b)

a) b) c)
Fig. 3. 5th order IM products of the dual band amplifier at 2.1 GHz
before and after linearisation: a) Pout =25 dBm, b) Pout =30 dBm,
c) Pout =35 dBm

c)
rd
Fig. 2. 3 order IM products of the dual band amplifier at 2.1 GHz
before and after linearisation: a) Pout =25 dBm, b) Pout =30 dBm,
c) Pout =35 dBm a) b)

Furthermore, the linearisation results of the dual band PA


achieved in this paper by application of the digital
linearisation model are compared with the acquired results
with application of the analogue linearisation approach
executed previously [11]. Observing the analogue
linearisation method results of dual band PA presented in [11]
we can spot firstly divers IM3 and IM5 signal power levels
before linearisation in comparison with the digital
linearisation method. Explanation for this was found in
different analysis performed in ADS during simulation of the c)
analogue and digital approaches, in the first case it was Fig. 4.3rdorder IM products of the dual band amplifier at 5 GHz
Harmonic Balance and in the digital we used Data flow. before and after linearisation: a) Pout =25 dBm, b) Pout =30 dBm,
Secondly, even though the IM3 products were lessened by c) Pout =35 dBm
greater rate in the analogue than in the digital linearisation, Also, the digital linearisation model was applied on the dual
especially for 2.1 GHz signal frequency, the IM5 products band PA for both targeted frequencies simultaneously, and
were lower approximately the same. results gave a certain number of additional mixed cross IM
Moreover, the digital linearisation model applied in this distortions between the each two signals from different bands.
paper does not require additional sources of 2h signal for The research showed the same results as for the case when the
linearisation and amplifiers in the linearisation circuits as it is analogue linearisation method is performed, that these mixed
in the analogue approach, [11]. The baseband linearisation IM products cannot be descended simultaneously. In the

201
future study, focus will be directed on discovering a solution REFERENCES
for concurrent reduction of all IM distortions which spectrum
contains. One of the ideas is to include circuits at the PA [1] K. Rawat, F. M. Ghannouchi, “Dual-Band Matching Technique
transistor gate and drain that should short the signals at the based on Dual-Characteristic Impedance Transformers for Dual-
difference frequency components between the two operational Band Power Amplifiers Design”, IET Microw. Antennas &
bands of the PA. Propag., vol. 5, no. 14, pp. 1720-1729, 2011.
[2] Y. Ding, Y. X. Guo and F. L. Liu, “High-Efficiency Concurrent
Dual-Band Class-F and Inverse Class-F Power Amplifier”,
Electronics Letters, vol. 47, no. 15, pp. 847-849, July 2011.
[3] P. Wright, J. Lees, J. Benedikt, P. J. Tasker and S. C. Cripps, “A
Methodology for Realizing High Efficiency Class-J in a Linear
and Broadband PA”, IEEE Trans. Microw. Theory Tech., vol.
57, no. 12, pp. 3196-3204, December 2009.
[4] A. Atanasković, N. Males-Ilić, K. Blau, A. Đorić and B.
Milovanović, “A Novel Linearization Technique based on
Modified Baseband Signal that Modulates Carrier Second
Harmonic”, TELSIKS 2013, Conference Proceedings, pp. 192-
a) b) 195, Niš, Serbia, 16-19 October, 2013.
[5] A. Atanasković, N. Males-Ilić, K. Blau, A. Đorić and B.
Milovanović, “RF PA Linearization using Modified Baseband
Signal that Modulates Carrier Second Harmonic”, Microwave
Review, vol. 19, no.2, pp. 119-124, December 2013.
[6] A. Đorić, N. Maleš-Ilić and A. Atanasković, “RF PA
Linearization by Signals Modified in Baseband Digital
Domain”, Facta Universitatis, Series: Electronics and
Energetics, vol. 30, no. 2, pp. 209-221, June 2017.
[7] A. Đorić, N. Maleš-Ilić, A. Atanasković and V. Marković,
“Linearization of Broadband Doherty Amplifier by Baseband
Signal that Modulates Second Harmonic”, IEEE EUROCON
c) 2017, Conference Proceedings, pp. 206-211, Ohrid, Macedonia,
Fig. 5. 5th order IM products of the dual band amplifier at 5 GHz 6-8 July, 2017.
before and after linearisation: a) Pout =25 dBm, b) Pout =30 dBm, [8] A. Đorić, A. Atanasković, N. Maleš-Ilić and M. Živanović,
c) Pout =35 dBm “Linearisation of RF PA by Even-Order Nonlinear Baseband
Signal Processed in Digital Domain”, International Journal of
Electronics, Published online: vol. 106, Issue 12, pp. 1904-
III. CONCLUSION 1918, 27 June 2019.
[9] A. Đorić, A. Atanasković, B. Alorda, and N. Maleš-Ilić,
This paper offers results of the digital linearisation “Linearization of Doherty Amplifier by Injection of Digitally
procedure applied on the formerly designed dual band PA. Processed Baseband Signals at the Output of the Main and
Auxiliary Cell”, TELSIKS 2019, Conference Proceedings, pp.
The suggested linerisation model uses the 2nd order signals
339-342, Niš, Serbia, 23-25 October, 2019.
that modulate the 2h of the fundamental carrier for the 3rd and [10] A. Đorić, N. Maleš-Ilić, A. Atanasković and B. Milovanović,
5th order IM products reduction. The dual band PA was “Mixer Linearization by Modified Baseband Signals”, Sinteza
designed to operate concurrently at two frequency bands 2016, Conference Proceedings, pp. 299-303, Belgrade, Serbia,
around 2.1 GHz and 5 GHz. The dual band PA linearisation 22 April 2016.
effects were demonstrated through the QAM baseband test at [11] A. Atanasković, A. Đorić, B. Alorda, N. Maleš-Ilić, “Dual Band
both working bands. The digital linearisation model attains Power Amplifier Linearization”, TELSIKS 2019, Conference
satisfactory results concerning the repression of the IM Proceedings, pp. 37-40, Niš, Serbia, 23-25 October 2019.
products of the 3rd and 5th order in case when it is applied to [12] X. Fu, D. T. Bespalko and S. Boumaiza, “Novel Dual-Band
Matching Network for Effective Design of Concurrent Dual-
each band separately. It should stress that the digital
Band Power Amplifiers”, IEEE Trans on Circuits and Systems
linearisation performed in this paper achieves good I-Regular paper, vol. 61, no. 1, pp. 293-301, January 2014.
linearisation results with the linearisation circuit topology that [13] X. Fu, Dual-band Power Amplifier for Wireless Communication
is less demanding regarding the power supply and complexity Base Stations, Master Thesis, Waterloo, Ontario, Canada, 2012.
in comparison with the analogue linearisation method [14] X. Fu, D. T. Bespalko and S. Boumaiza, “Novel Dual-Band
demonstrated in our earlier papers. Matching Network Topology and its Application for the Design
of Dual-Band Class J Power Amplifiers”, IEEE MTT-S
International Microwave Symposium Digest, Conference
ACKNOWLEDGMENT Proceedings, Montreal, 2012.
[15] H.-Y. A. Yim, K.-K. M. Cheng, “Novel Dual-Band Planar
This work has been supported by the Ministry of Education, Resonator and Admittance Inverter for Filter Design and
Science and Technological Development of the Republic of Applications”, IEEE MTT-S Int. Microwave Symp. Dig.,
Serbia. Conference Proceedings, October 2005.

202
Design of Asymmetrical Slot Antenna Array in
Corner Reflector
Marija Milijic1 and Branka Jokanovic2
Abstract – In this letter, a design procedure of the K-band slot of single element antenna. Therefore, to improve and optimize
antenna array in corner reflector is described. The array consists the antenna performance in the millimeter-wave frequencies
of eight slots as radiating elements with parallel-series feeding by communication systems, dealing with a problem of mentioned
coplanar waveguide (CPW) transmission line. The uniform
rectangular slots stand asymmetrically in relation to the CPW
losses, the use of high gain antenna arrays should be
feeding line. The apex of the corner reflector is at the distance fundamental.
around 1.4λ0 in respect to the center frequency fc=25.875 GHz Lately, CPW-fed slot antennas have been popular and used
from the antenna array. The corner reflector increases antenna as radar sensors and for mobile communication applications
gain and improves control of radiation pattern that is desirable [7-9]. This type of antennas is characterized by its wideband
for many modern wireless applications. The proposed antenna operation, compact size, planar structure and cheap and
array features gain of 21.6 dBi and side lobe suppression of
14.2 dB at the center frequency, while it keeps satisfied radiation
uncomplicated fabrication. Still, since the radiator and the
properties in a wide frequency range between 24.8 GHz and ground plane are etched onto one side of the substrate, the
27.1 GHz. energy will be radiated bidirectionally, which results in a low
Keywords – Antenna array, Corner reflector, Asymmetrical antenna gain. The antenna should radiate only in a half the
slot antenna, CPW-fed antenna, Parallel-Series feeding, CPW T- atmosphere to satisfy the requirements of wide-band
junction. applications, where high-gain and unidirectional radiation are
crucial requirements.
I. INTRODUCTION This paper presents a centrally offset fed antenna array of
identical rectangular slots positioned asymmetrically relative
With the rapid growth in wireless communications across to the CPW line. In our papers [10-11] we demonstrated
the world, the demands for fast transmission speeds and great advantages of using asymmetrical slots in the design of
broadband capacities have risen exponentially to enable easy centrally and serially fed antenna arrays. Here we proposed
access the internet, IoT and M2M applications [1]. In order to the linear slot antenna array placed in a corner reflector in
cater the high data transmission rate, the spectrum efficiency order to increase the gain and side lobe suppression. Presented
and smarter and reliable service for connection lots of people simulated results show very satisfying radiation properties in a
and objects, the millimeter wave frequency region is being wide frequency range making proposed antenna as good
proposed as promising solution to the bandwidth and capacity choice for 5G and radar applications. Asymmetrical slot
issues [1]. The International Telecommunication Union (ITU) antenna array with corner reflector exhibits 5 dBi greater gain,
has announced that 5G wireless communication systems can 0.55 GHz wider frequency range with appropriate radiation
operate in millimeter-wave bands where the most promising pattern and almost two times wider impedance bandwidth for
frequency ranges are 24.25 to 27.5 GHz, 37–40.5 GHz, the criterion S11<-10 dB than the version with parallel
66–76 GHz [2]. Meantime, the Federal Communications reflector plate.
Commission (FCC) has estimated the spectrum of around
11 GHz above 24 GHz for the latest fifth generation wireless
II. THE ARRAY OF CPW-FED ASYMMETRICAL
technology systems in the United States [3].
However, investigation and development of millimeter-
SLOTS IN CORNER REFLECTOR
band antennas have been started to meet the needs of modern
The antenna array of eight identical asymmetrical slots,
5G wireless communication system. Firstly, atmospheric
CPW feeding line and CPW T-junction on the dielectric
attenuation and path losses become critically higher at these
substrate having relative permittivity of εr=2.54 and height of
frequencies [4-6]. Furthermore, the received signal power
0.508 mm is depicted in Fig. 1. The array is placed parallel to
weakens at millimeter-wave frequencies as compared to lower
the apex of corner reflector with an angle α=90° at the
frequency bands as a result of smaller effective aperture size
distance h=16 mm away, that is around 1.4λ0 (at the center
frequency fc=25.875 GHz). The center frequency
1Marija Milijic is with the Faculty of Electronic Engineering, University of fc=25.875 GHz is determined as the median of range
Niš, 18000 Nis, Serbia, E-mail: marija.milijic@elfak.ni.ac.rs 24.25–27.5 GHz, proposed by ITU [2]. The array is formed of
2Branka Jokanovic is with the Institute of Physics, University of Belgrade,
two equal four-slot subarrays set at the different distances
Pregrevica 118, 11080 Pregrevica, Serbia, and The Academy of Engineering
Sciences of Serbia, Kraljice Marije 16, Belgrade, Serbia, E-mail: from the CPW T-junction. To ensure in-phase feeding of both
brankaj@ipb.ac.rs subarrays, the CPW T-junction is moved off the symmetry

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 203


Fig. 1. Asymmetrical slot antenna array in corner reflector

a)

a) b)
Fig. 2. Feeding of antenna subarrays by:
a) 2 generators b) CPW T-junction

axes for λg/4, where λg=9 mm is CPW line wavelength at the


center frequency fc [10]. The 60 Ω CPW line (featuring the
strip w1=0.9 mm and gap g1=0.1 mm) is used to enable
feeding for both sub - arrays dividing power into two 120 Ω
CPW feed lines featuring the strip w2=0.3 mm and gap
g2=0.375 mm for feeding every four slots sub - array.
The antenna substrate has the geometry of 77 mm x
34.2 mm x 0.508 mm. The substrate is placed between two
metal panels, set under α=90° angle, that form a corner
reflector. The dimensions of each reflector panel are 77 mm x
45 mm. CPW feeding line penetrates the connection of two
reflector panels through a hole with the sufficient holes’
b)
diameter (2 mm) to minimize the undesirable influence of the
metallic panels. Each slot has a rectangular shape with width a
and arms of different length b1 and b2 resulting in entire slot
length l=b1+b2+w2+2g2. Also, the mutual distance between
neighboring slots is d=9 mm. The commercial software tool
WIPL-D [12] is used to obtain the simulated results of
proposed antenna array.
The process of antenna design has two steps. Firstly, both
antenna subarrays are fed by two independent generators in
the beginning of their CPW feeding lines (Fig. 2a) to obtain
optimized slots dimensions at the center frequency fc.
Afterwards, the subarrays of slots with optimal dimensions are
connected via CPW T-junction (Fig. 2b). The Fig. 3. shows
the simulated radiation patterns through two steps of antenna
optimization for the different slots width a values ranging
from a∈[0.5 mm, 1.5 mm]. The length of arms b1 and b2 are
adjusted in order to have center frequency at fc=25.875 GHz
while total slot length l is about 9 mm. It can be seen that c)
when antenna subarrays are fed by two generators (dash Fig. 3. Radiation pattern in xOz plane (φ=0°) of the slot array fed by
lines), the gain is above 21.5 dBi: 21.6 dBi for a=0.5 mm, two generators (dashed) and by CPW T-junction (solid) at 25.875
GHz for different slot widths a: (a) a=0.5mm, (b) a=1mm, (c)
a=1.5mm. Antenna array is in the corner reflector with angle α=90°

204
a) the xOz plane (φ=0°)

Fig. 4. S11 parameter versus frequency of the eight asymmetrical slot


array fed by CPW T-junction for different slots width a. S11 is
normalized to the impedance of CPW feeding line (60 Ω)

22.2 dBi for a=1 mm and 22.6 dBi for a=1.5 mm. Side lobe
suppression is 14.3 dB for a=0.5 mm, 13.7 dB for a=1 mm
and 15.2 dB for a=1.5 mm. Furthermore, the both subarrays
are joined through the CPW T – junction (solid lines)
resulting in a bit reduced gain: 19.7 dBi for a=0.5 mm, 20.2
dBi for a=1 mm and 21.6 dBi for a=1.5 mm. Similarly, side
lobe suppression has also decreased and it is 12.3 dB for
a=0.5 mm, 13.2 dB for a=1 mm and 14.2 dB for a=1.5 mm.
The decrease in gain and side lobe suppression when the array
is excited by CPW T – junction with reference to separated
feeding for two sub-arrays, can be a consequence of the b) the yOz plane (φ=90°)
reflected power from the neighboring sub – array through the
CPW T – junction. Although, the least deviation between Fig. 5. Radiation patterns of the slot array fed by CPW T-junction
simulated radiation patterns for two different way of feeding in the corner reflector at 24.8 GHz, 25.875 GHz and 27.1 GHz
is when slot has width a=1.5 mm.
Moreover, the S11 parameters of considered antenna array TABLE I
fed by CPW T-junction for different slots width a values from MAIN CHARACTERISTICS OF THE A SLOT ARRAY FED BY CPW T-
JUNCTION IN THE CORNER REFLECTOR AT THE CENTER FREQUENCY
range from a∈[0.5 mm, 1.5 mm] are presented in Fig. 4. The
fc=25.875 GHZ AND AT THE EDGE FREQUENCIES flef=24.8 GHZ AND
reflection coefficient S11 is normalized to the impedance of
fuef=27.1 GHZ
CPW feeding line (60 Ω) where generator is attached. It is less
Frequency [GHz] Feeding Gain [dBi] SLS [dB]
than -10 dB for the frequency range between 24.5-26.3 GHz
2 generators 22.6 15.2
(dash line) for the slot width a=0.5 mm, 24.4-26.6 GHz (dot fc=25.875
CPW –T junction 21.6 14.2
line) for slot width a=1 mm and 24.8-27.1 GHz (solid line) for
2 generators 21.95 10.6
slot width a=1.5 mm. Based on the presented simulated results flef=24.8
CPW –T junction 19.7 10
in Figs. 3-4, it can be concluded that array of eight
2 generators 22.5 11
asymmetrical slots (with width a=1.5 mm) positioned in the fuef=27.1
CPW –T junction 19.7 10.3
corner reflector with an angle α=90° has the best simulated
results considering gain, side lobe suppression and S11
center frequency. Furthermore, it is observed in the yOz plane
parameters. Its maximum gain, when CPW T-junction is used
Fig. 5b that antenna gain stays almost unchanged at the
for feeding, is 21.6i dB at the center frequency
(center and edge frequencies while the side lobe suppression
fc=25.875 GHz. If maximum allowed gain deviation is set to
drops to 8-9 dB. Table I gives the comparison between the
be 2 dB, the frequencies between 24.8 GHz to 27.1 GHz
main parameters of the asymmetrical slot array in the corner
satisfy this criterion because gain is 19.7 dBi (Fig. 5) at the
reflector through the design steps at center and edge
specified edge frequencies. Side lobe suppression is 10-10.5
frequencies. 3D radiation pattern at the center frequency fc, for
dB at the edge frequencies, which is 3.5-4 dB less than at the
both the xOz and yOz plane is displayed in Fig. 6.

205
mobile phones and smart devices because of their planar
structures and inexpensive fabrication of feeding lines and
radiating elements on the same side of substrate. Unlike the
microstrip antennas with a backside ground plane, the CPW
fed slot antennas need the reflector to establish a radiation in
half of the atmosphere. There are previous published results of
CPW fed asymmetrical slot array with parallel reflector plane
that feature acceptable gain and bandwidth characteristics.
Although, in order to compensate losses that cause the
received signal power reduction, the mm-wave
communication systems are required high gain antennas.
The proposed CPW-fed asymmetrical slot array is with
corner reflector of 90° angle that significantly improve its gain
a) the xOz plane (φ=0°)
and bandwidth characteristics. Its gain is 21.6 dBi at the
center frequency of 25.875 GHz while it is around 20 dBi in
the range from 24.8 GHz to 27.1 GHz. Although, the corner
reflector antenna is 3D structure, it is still light weight and
simple for fabrication which together with greater gain and
increased impedance bandwidth makes it very suitable for
mm-wave applications.

REFERENCES
[1] V. Milosevic, B. Jokanovic, O. Boric-Lubecke, and V. M. Lubecke,
“Key Microwave and Millimeter Wave Technologies for 5G
Radio”, in Powering the Internet of Things with 5G Networks, V.
Mohanan, R. Budiatru, I. Aldmour, Eds. IGI Global, July 2017,
DOI: 10.4018/978-1-5225-2799-2.
[2] W. Hong, K. Baek, and S. Ko, “Millimeter-Wave 5G Antennas for
b) the yOz plane (φ=90°)
Smartphones: Overview and Experimental Demonstration”, IEEE
Fig. 6. 3D Radiation patterns of the asymmetrical slots array fed Trans. Antennas Propag., December 2017, vol. 65, no. 12, pp. 6250-
by CPW T-junction in corner reflector at 25.875 GHz 6261.
[3] M. J. Marcus, “5G and "IMT for 2020 and Beyond"“, IEEE
Wireless Commun., Aug. 2015, vol. 22, no. 4, pp. 2-3.
Considering all simulated radiation patterns and the results [4] L. Wei, R. Q. Hu, Y. Qian, and G. Wu, “Key Elements to Enable
shown in Figs. 3-6, it can conclude that the proposed antenna Millimeter Wave Communications for 5G Wireless Systems”, IEEE
array exhibits operating frequency range from 24.8 GHz to Wireless Commun, vol. 21, no. 6, pp. 136-143, Dec. 2014.
27.1 GHz that is about 9% of the central frequency. [5] T. S. Rappaport et al., “Millimeter-wave mobile Communications
In respect to previous results [10] of eight asymmetrical slot for 5G Cellular: It will Work!”, IEEE Access, pp. 335-349, 2013.
array with parallel reflector plane, the proposed antenna array [6] Q. Zhao, J. Li, “Rain Attenuation in Millimeter Wave Ranges”, 7th
Int. Symp. Antennas Propag. & EM Theory, pp. 1-4, Oct. 2006.
with corner reflector with the same feeding structure of CPW [7] M. E. de Cos Gómez, H. Fernández Álvarez, C. García González,
T-junction, has 5 dBi greater gain, 0.55 GHz wider frequency B. Puerto Valcarce, J. Olenick, and F. Las-Heras, "Ultra-Thin
range with appropriate radiation pattern and almost two times Compact Flexible Antenna for IoT Applications”, 2019 13th Eur.
bigger impedance range with satisfied criterion S11<-10 dB. Conf. Antennas Propag. (EuCAP), Krakow, Poland, 2019, pp. 1-4.
Side lobe suppression is the same for both antenna arrays [8] A. I. Afifi, D. M. Elsheakh, A. B. Abdel-Rahman, A. Allam, and S.
M. Ahmed, “Dual Broadband Coplanar Waveguide-Fed Slot
(13-14 dB) as it is expected for the uniform power
Antenna for 5G Applications”, 2019 13th Eur. Conf. Antennas
distribution. Propag. (EuCAP), Krakow, Poland, 2019, pp. 1-3.
Due to strict requirements to be met by the 5G network, [9] A. Zaidi, A. Baghdad, W. A. Awan, Halima, A. Ballouk, and A.
which relate to the high gain and wide operating bandwidth, Badri, “CPW Fed Wide to Dual Band Frequency Reconfigurable
the obtained results show that CPW-fed asymmetrical slot Antenna for 5G Applications”, 2019 Int. Conf. Wireless Tech.,
array in corner reflector is a very promising solution. Emb. and Intel. Sys. (WITS), Fez, Morocco, 2019, pp. 1-3.
[10] M. Milijić, B. Jokanović, “Design of CPW-fed Asymmetrical Slot
Array for K Band Applications”, 54rd Int. Scientific Conference
III. CONCLUSION ICEST 2019, pp. 19-22, Ohrid, North Macedonia, June 27-29.
[11] M. Milijić, B. Jokanović, “Uniplanar Series Fed Antenna Array
with Asymmetrical Slots for K-band Applications“, 14th Int. Conf.
Design of millimeter-band antennas is probably the most TELSIKS 2019, pp. 144-147, Niš, Serbia, 23-25 October.
challenging feature in fifth generation communications. CPW [12] WIPL-D Pro v15.0, WIPL-D Team
fed antennas have been regarded as the most optimal choice in

206
Radar Antenna Array Designing for
Unmanned Aerial Vehicles (UAV)
Ivaylo Nachev1 and Peter Z. Petkov2
Abstract – In this paper, an application of a simple phased the air gap between ground plane and antenna is Δ=3mm. The
antenna array intended to increase the range of a radar module operating frequency is chosen to be ƒс=10.525GHz (a
is presented. The radar with improved range can find an frequency preferred in the production of small size radar
application in control of unmanned vehicles – mainly drones, but modules).
also cars and robots for civil and special purposes. The first part
Taking into account the abovementioned design method [4],
of this paper describes design of a patch antenna with operating
frequency of 10.5 GHz (Amateur radio X-band). Comparison of the antenna dimensions are calculated and presented in Table
the simulation results with measured parameters of fabricated I. In Fig. 2 are photographs of the fabricated prototypes. Fig. 3
antenna is made. The second part of the paper describes shows the construction of the suspended substrate and the air
simulation results for how these models could be multiplied and gap.
incorporated into a series or corporate feed array. The delay
lines technique used for beam steering, along with for beam
management algorithm are presented.

Keywords – Autonomous vehicles, Drones, Radar, Antenna,


Phased antenna array, Beam scanning, Delay line phase shifting.

I. INTRODUCTION
Fig. 1. The HB-100 radar module
In the last years, cost-effective radar systems and modules
find their wide application in many end-user products. TABLE I
Deployment of new radar modules can be combined with DIMENSION OF PATCH ANTENNA
patch antennas and antennas arrays. In this way, the radar
range and accuracy will increase. Given the low price of patch W L w MS Line Feed Line
antennas and cheap manufacturing process, these modules are [mm] [mm] [mm] [mm] [mm]
suitable for large–scale production. The antenna arrays with a Calculated 12.2 12.96 5.3 12.4 6.2
scanning antenna beam finds special application in radar Adjusted 13.1 11.00 5.3 12.4 6.2
systems because the beam can crawl the space in front of the after
antenna. In this way, different objects ahead of the vehicle can simulation
be detected. This can integrate for vital application in
difference autonomous vehicles – cars [1], drones [2] and
robots [3]. There are many published developments with
various complexity and manufacturing cost. The present paper
examines the application of one of the most inexpensive ones.

II. PATCH ANTENNA


The patch antenna as radiating elements is used, as
dimensions are determined by a standard design method, well Fig. 2. Fabricated patches for antenna array
explained in [4]. The employed dielectric substrate for this
design is Rogers RO4003 [5]. In order to improve the
bandwidth and efficiency of antennas, a design approach
called “suspended substrate” is chosen, where the thickness of

1Ivaylo Nachev is PhD student with the Faculty of


Telecommunications at Technical University of Sofia, 8 Kl. Ohridski
Bvld., Sofia 1000, Bulgaria E-mail: ivaylonachev@yahoo.com
2Peter Z. Petkov is Associate Professor with the Faculty of

Telecommunications at Technical University of Sofia, 8 Kl. Ohridski Fig. 3. The realization suspended substrate
Bvld., Sofia 1000, Bulgaria E-mail: pjpetkov@tu-sofia.bg

978-1-7281-7142-5/20/$31.00 ©2020 European Union 207


In Fig. 4 are given S11 parameters of the simulated and The feed network includes implementation of Butler matrix
manufactured patch antenna. The figures are quite similar, for realization of beamforming. The Butler matrix consists N
therefore regardless the handmade process imperfection, the input with N output port. The design of Butler matrix
prototyped model is quite functional. The difference in the constructed by combined of hybrid coupler, phase shifter and
bandwidth between the simulated and the fabricated antennas crossover [8]. The values of the typical Butler matrix are
is mainly due to imperfections of the air gap, constructed with presented in Table II.
simple spacers. In Fig. 5 the measured data of the radiation
pattern of the patch for E and H plane is displayed. TABLE II
VALUES OF BUTLER MATRIX

Patch element I II III IV


port I II III IV
electrical length 45o 90 o 135 o 190 o
extensions
electrical length 135 o 0o 225 o 90 o
extensions
electrical length 190 o 135 o 90 o 45 o
extensions
electrical length 90 o 225 o 0o 135 o
extensions

TABLE III
Fig. 4. S parameters of simulated and fabricated patches RELATION BETWEEN BEAM STEERING AND PATCHES PHASES

Beam Patch 1 Patch 2 Patch 3 Patch 4


sreeting
0o 0o 0o 0o 0o
-10o 0o 45o 90o 180o
+10 180o 90o 45o 0o

Below are described the scan angles of the beamforming.


The original goal is beam steering of +-10deg, therefore the
abovementioned Butler matrix can satisfy this requirement. In
Fig. 5. Radiation pattern of patch antenna (measured) Fig. 7 is shown realization of delay line, fooled Eq. (1)
, (1)
III. THE SCANNING RADAR ANTENNA where θ is the increased electrical length of microstrip line
and L is the length of the line without extension.
This method of designing patch antennas array can be
considered as an advanced version of the series feed antenna
array methods. It is important to keep distance [0.4λ ÷ 0.7λ]
between the centres of radiating elements. In Fig. 6 is shown
the simulated antenna array model. The feed networks for this
kind of antenna include microstrip lines, quarter wave
transformers and hybrid T-junctions [6-7].

Fig. 7. Delay line realization

In Fig. 8 a graphical relation between patches, antenna feed


network and phase shifter delay lines is shown. Building such
a system requires input power to be divided in four equal
parts. Beam steering is accomplished by switching between
microstrip lines with different lengths, different models RF
switches or PIN - to do this, it is necessary to use two diodes
Fig. 6. Simulated model of antenna array connected in series to increase the coupling factors due to the
high frequency. This leads to required beam scanning (Table
IV) [9-12].

208
Fig. 11. Radiation Pattern in scanning modes
Fig. 8. The corporate feed network model on H plane (Azimuth)

IV. SIMULATION RESULTS TABLE IV


COMPARISON OF GAINS ON BEAM DIFFERENT STATE

The patches and antenna array are simulation with Gain [dB]
openEMS (open source electromagnetic simulator). In Fig. 9
is displayed the return loss of the array elements and S11 on Patch array 0o 15.3
the input of antenna system. Fig. 10 shows azimuth and
Patch array -10o 14.95
elevation radiation pattern on normal mode. Fig. 11 shows the
beam in different scanning cases – using phases from Table Patch array + 10o 14.89
III and implementation of beamforming using 2-nd and 4-th
row of Butler matrix. Table IV presents a comparison of gains Patch array -24o 12.85
in beam`s different state. Patch array + 24o 12.55

From Fig. 11 and Table IV is evident that the level of side


lobes in 24O case is too high. Which would lead to incorrect
information in scanning mode. The advantage of using the 2-
nd and 4-th order of Butler matrix is bigger scanning angles
than using 1-st and 3-rd order of the same matrix or
implementation from Table III. The disadvantages in this case
are creation of grating lobes with high gain, which makes this
method inapplicable for radar applications like in the
presented case. With a more complex feed network and
employment of advanced scanning software, it is possible to
make a radar antenna with all four states presented in Fig. 11.
Antennas with similar radiation patterns may find application
Fig. 9. S11 parameters
MIMO [13] and 5G [14] systems where multi beams
propagation is a desirable t.

V. SAMPLE ALGORITHM FOR BEAM FORMING


CONTROL CODE AND CONTROL
OF AUTONOMOUS VEHICLES

As addition to the beam steering antenna array, authors


propose a simple algorithm for programmable controllers to
perform scanning for targets. Fig. 12 shows an algorithm
block diagram of the code for beam forming control. The
Fig. 10. Radiation Pattern 0 deg work mode
algorithm is fundamental in the movement of Autonomous
Vehicles when moving along preset coordinates without
human intervention. The main thing in the proposed algorithm
is that the scanning beam detects an object in front of it. When
detecting an object in front of one of the states of the radiation
diagram, the moving structure moves in the opposite direction
in order to avoid a collision.

209
ACKNOWLEDGEMENT

This work is supported by the National Scientific Program


"Young Scientists and Postdoctoral Students" (2018-2020)
and is approved by the Council of Ministers of the Republic of
Bulgaria № 577 / 17.08.2018 (Annex № 11).

REFERENCES
[1] S. Chatterjee, "A 77 GHz BCB Based High Performance
Antenna Array for Autonomous Vehicle Radars", 2018,
Electronic Theses and Dissertations,
https://scholar.uwindsor.ca/etd/7505
[2] S. Tonetti et al., "Distributed Control of Antenna Array with
Formation of UAVs", IFAC Proceedings Volumes, vol. 44, no.
1, 2011, pp. 7848-7853.
[3] Y. Kanayama et al., "A Stable Tracking Control Method for an
Autonomous Mobile Robot", IEEE International Conference on
Robotics and Automation Proceedings, 1990.
[4] B. A. Constantine, Antenna Theory: Analysis and Design, 3rd
Edition.
[5] Rogers RO4003 specification: https://www.mirrorsemi.com/pdf/
Rogers_RO4003C_Data_Sheet.pdf
[6] J. R. James, P. S. Hall, Handbook of Microstrip Antennas, 1993.
[7] M. Gachev, Microstrip Schemes.
[8] C.-C. Chang, R.-H. Lee, and T.-Y. Shih, "Design of a Beam
Switching/Steering Butler Matrix for Phased Array System",
Fig. 12. Algorithm block diagram of the code for radar scanning IEEE Transactions on Antennas and Propagation, vol. 58, no. 2,
process 2009, pp. 367-374.
[9] I. Iliev, S. Kolev, and S. Manev, "Reduction of the Frequency
VI. CONCLUSION Offset Influence in OFDM using an Optimal PRS Coding and
MLSD", Internat. Journal of Research in Computer and
Communication Technology, vol. 3, no. 1.
Simulated, designed and analyzed patch antenna integrated [10] E. Carrasco, M. Barba, and J. A. Encinar, "X-band Reflectarray
into an electronic scanning antenna array presented in this Antenna with Switching-Beam Using PIN Diodes and Gathered
article. The used methodology can be used for design of a Elements", IEEE Transactions on Antennas and Propagation,
patch antenna arrays for different radar applications. Designed vol. 60, no. 12, 2012, pp. 5700-5708.
antennas are suitable for modifying and increase scopes of [11] A. Akhtar, H. M. Alahi, M. Sehnan, "Simulation of Phased
some existing radar modules operating at that frequency. An Arrays with Rectangular Microstrip Patches on Photonic Crystal
example of such radar is a HB100 radar module [15]. Substrates", 2012.10.12
[12] J. Ehmouda, Z. Briqech, and A. Amer, "Steered Microstrip
Advantage of design antenna in this paper under the stock Phased Array Antennas", World Academy of Science,
radar antenna is a beam scanning. The radar antenna array Engineering and Technology, vol. 49, 2009, pp. 321-323.
disadvantages are the high cost, complicated feed network and [13] I. Iliev, I. Georgiev, and M. Budzevski. "Concatenated “MMSE-
limited beam tilt. Modified radars with antenna array can be Sequential Search”, Algorithm for Multi User Detection in
implemented in different autonomous vehicles like small SDMA Uplink", ICEST 2011, vol. 3, 2011, pp. 591-594.
robots, drones and various radar systems for civil and [14] M. S. Sharawi, M. Ikram, and A. Shamim, "A Two Concentric
specialized application. Slot Loop Based Connected Array MIMO Antenna System for
4G/5G Terminals", IEEE Transactions on Antennas and
Propagation, vol. 65, no. 12, 2017, pp. 6679-6686.
[15] HB 100 radar module datasheet
https://www.limpkin.fr/public/HB100/HB100_Microwave_Sens
or_Module_Datasheet.pdf

210
Design of well-matched Microwave Slot Antenna on a
Flat Metal Grounded Plate using Neural Model
Zoran Stanković1, Nebojša Dončov1, Biljana Stošić1, Maja Sarevska2,
Ivan Milovanović3
Abstract – A neural model of microwave slot antenna on a flat observation of these changes influence on EM antenna
metal grounded plate based on MultiLayer Perceptron network characteristics. An alternative approach in design of printed
(MLP) is described here. The presented model is a part of the antenna represents the usage of ANN (Artificial Neural
software package called PMWA ANN Design which is developed Network) based models [6-7]. Antenna neural model can
for design of a well-matched planar microwave antenna. This
perform much faster than the model developed in some of EM
software allows for fast estimation of the flat metal grounded
plate and slot dimensions for desired central frequency of the simulators, but at the same time it has accuracy that is close to
microwave slot antenna to make the antenna well-matched to the that of EM simulators which motivates increased usage of
feed line. The current version of this software allows for design ANN for realization of the efficient models of printed
of antenna matched to 50 Ω feed line in S and C frequency antennas [8-12]. This is a result of very fast propagation of
bands. signal through neural network from its input to output, as well
as fast signal processing in the network’s neurons.
Keywords – Slot antenna, Neural networks, Neural model, In this paper, a neural model of slot antenna on a flat metal
Antenna optimization. grounded plate, as well as software for estimation of this
antenna dimensions for working frequency of well-matched
I. INTRODUCTION antenna to feed line are presented. This type of printed
antenna possess all previously presented properties of printed
Thanks to being small, relatively simple and cheap for antennas and for that reason large attention is paid for its
production, with compact architecture that is adjustable on the usage in RFID systems [13-15].
housing of small communication devices, small This paper represents modification and upgraded results of
electromagnetic coupling with human body and ability to the software for neural modeling of the planar bowtie antenna
work in multiple frequency bands, printed antennas are more presented in [16]. In that software, a neural model of slot
and more used in modern communications [1-2]. antenna presented here is added with a goal to further develop
Classical approach in printed antenna design is use of software tool for neural modeling of different types of printed
detailed electromagnetic (EM) model gained from EM antennas in microwave band.
simulators based on one of the following methods: MoM
(Method of Moments) [3-4], FEM (Finite Element Method) II. MICROWAVE SLOT ANTENNA: EM MODEL
[3], SSPE (Split-Step Parabolic Equation) [4], FDTD (Finite
Difference Time-Domain) [3-4] and TLM (Transmission Line The architecture of rectangle slot antenna that is realized on
Matrix) [3,5]. These methods are based on numerical solving a flat rectangle metal plate is presented in Fig. 1.The basic
of Maxwell’s equations in frequency or time domain. Because geomtrical parameters that have an impact on the
of that EM simulators require strong hardware platform and electromagnetic properties of the antenna are length of metal
their simulations may take very long time depending on plate (l), width of the metal plate (w), slot length (ls), slot
antenna geometry complexity and available hardware width (ws) and displacement of feeding point relative to the
resources. These disadvantages of EM simulators may geometrical slot center (f). In the case when the antenna is
seriously slow down the antenna development especially in realized on a plate with large dimensions (l, w >> ls, ws) then
the case when in the design process there are very large by using the Babinet's principle [1] the input impedance of
number of changes of physical parameter values and slot antenna is determined by the relation
1Zoran Stanković, Nebojša Dončov and Biljana Stošić are with η2 , (1)
zS =
University of Niš, Faculty of Electronic Engineering, Aleksandra 4zD
Medvedeva 14, 18000 Niš, Serbia, E-
mails:zoran.stankovic@elfak.ni.ac.rs, nebojsa.doncov@elfak.ni.ac.rs, W here η represents an intrinsic impedance of free space, and
biljana.stosic@elfak.ni.ac.rs zD an input impedance of complementary planar dipole in dual
2Maja Sarevska is with AUE-FON University Skopje, Str. Kiro
electromagnetic system (dual dipole) (Fig. 2). In similar way,
Gligorov b.b. 1000 Skopje, North Macedonia, E-mail: using the Babinet's principle and the dual electromagnetic
maja.sarevska@fon.edu.mk
3Ivan Milovanović is with Singidunum University, Educational system, the components of electrical and magnetic fields of
Center Niš, Danijelova 32, 11000 Belgrade, Serbia, E-mail: the slot antenna in a far field are determined if we know the
imilovanovic@singidunum.ac.rs

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 211


parameters of EM model are slot length (ls) and slot width
(ws). EM model of the realized slot antenna is used for
generation of training and testing samples for the neural
model and also for presentation of EM characteristics of the
antenna for values of geometrical parameters that are derived
with optimization using the neural model.

III. MICROWAVE SLOT ANTENNA:NEURAL MODEL


Architecture of the neural model of the microwave slot
antenna on a flat metal grounded plate (MLP_SL) that is
developed using the Multilayer Perceptron (MLP) network [6-
Fig. 1. Architecture of the microwave slot antenna on a flat metal 7] is depicted in Fig. 3. Unlike the EM model, instead of the
grounded plate slot width, the neural model takes the relative ratio of the slot
width and slot length represented as k = ws/ls. The model has
the main purpose to map the space of physical parameters of
the slot antenna (slot length ls and relative ratio of the slot
width and slot length k) to a space of the antenna operating
characteristics,such as the resonant frequency fr and the
minimum s11 parameter value (value of s11 parameters at
antenna resonant frequency - s11min), at the given feed line
impedance (zf =const)
[ f r , s11 min ] = f MLP (l s , k ) . (3)

Fig. 2. Slotantenna analysis using a dualplanar dipole based In matrix representation, the neural model has the vectors of
onBabinet's principle input variables x=[ls k]T, and output variables y= [fr s11min].
For the model realization, MLP neural network, described by
components of electrical and magnetic fields of dual planar function y=y(x,W,B), is used, where y is a network processing
dipole function, W = {w1, w2,…wH+1} is a set of connection
EθS = H θD weighting matrices and B = {b1, b2,…bH+1} is a set of bias
EϕS = H ϕD matrices (H is the total number of hidden layers in the
E (2) network). Based on these definitions, the MLP_SL neural
H θS = − θ2D model is described as:
η
H ϕS = − 2
EϕD [ fr s11min ] = y([l s k ]T ,W , B) . (4)
η
Output of MLP layers can be described by function:
However in the practical cases of the slot antenna usage where
y l = F ( w l y l −1 + b l ) l = 1, 2,.., H + 1 , (5)
it is built in the compact housing of a communication device,
the antenna should be of small dimensions. Also the metal where the vector yl-1 represents the output of (l-1)th layer, wl
plate used for the slot antenna realization has reduced represents a connection weight matrix between (l-1)th and lth
dimensions that are comparable with slot antenna dimensions. layer neurons, and bl is a vector containing biases of lth layer
In this case, the analyses of input impedance and neurons. The activation function of neurons in hidden layers is
electromagnetic radiation of the slot antenna are much more the hyperbolic tangent sigmoid transfer function:
complex and Eqs. (1) and (2) cannot be applied directly, that
is the reason why we use EM simulators. In our case, the EM e u − e −u . (6)
F (u ) =
model of slot antenna is realized by use of functions given in eu + e − u
Antenna Toolbox of MATLAB [17-18]. Antenna Toolbox
uses MoM to calculate antenna properties (like input The activation function of neurons in the output layer is linear
impedance), surface properties (like current and charge which indicates the MLP network output in the following
distribution), and field properties (like near-field and far-field form:
radiation pattern) [17-18]. Here, a case of slot realized on y = w H +1y H + b H +1 , (7)
square plate with dimensions a = l = w, where a is 50% longer
than the slot length (a = 1.5⋅ls), is observed. Also, the standard where wH+1 is the connection weighing matrix between
antenna excitation where the feeding point is on half-length of neurons in Hth hidden and output layers.
slot length (f = 0) is considered. Based on this the variable

212
Fig. 3. The neural model of the microwave slot antenna on a flat
metal grounded plate

The MLP model described above is notated as


MLPH-N1-…-Ni-…-NH where H is the total number of hidden
layers, and Ni is the number of neurons in the ith hidden layer.
For example, notation MLP2-12-10 denotes the MLP model
whose neural network has 2 hidden layers with 12 and 10
neurons in layers, respectively. In total, the neural network
has 4 layers (input, output and two hidden layers).
MATLAB environment is used for implementation of
MLP_SL neural model. Training and test sample sets for
training and testing the network are generated by EM model
Fig. 4. Scattering diagrams of MLP2-13-13 neural model on the test
of the microwave slot antenna presented in Section II. These
set for frand s11min outputs
data sets are given in one of the following formats {(xt,yt)} or
{([lstkt]T,[frt st11min])}, with xt representing the vector of input
trained. During the network testing, average test error (ATE)
combinations of the variables lst and kt, and yt the vector
for both network outputs and correlation coefficient (rPPM) so-
containing desired outputs of the neural network frtandst11min
called testing metrics are observed in order to discover a
for given input. The superscript t indicates that these samples
neural network with good generalization properties. This leads
belong to training and testing sets. The input parameter ranges
to highly accurate neural model for determination of the
defined as l [m]∈[0.025, 0.1] and k∈[0.05, 0.12] are used to
resonant frequency and the minimum s11 value. Table I
train neural network. The chosen parameter ranges provide the
contains the results for several MLP_SL neural networks
resonant frequency in the range frt∈[2.16, 9.12] GHz covering showing the best test statistics.
the S and C microwave bands.
By using microwave slot antenna EM model for the case of TABLE I
impedance zf = 50 Ω and the uniform distribution of samples, TESTING RESULTS OF MLP_SL NETWORKS WITH
THE BEST TEST STATISTICS
the following training and testing sets are generated:
MLP_SL network ATE(fr) [%] ATE(s11min) [%] rPPM
([l st k t ]T , [ f rt , s11
t
min ]) |
 (8) MLP2-13-13 1.50 6.30 0.9438
t  MLP2-12-5 1.48 6.44 0.9435
l s ∈ [0.025 : s1 : 0.1], k t ∈ [0.05 : s2 : 0.12] MLP2-16-11 1.41 6.54 0.9434
MLP2-9-7 1.41 6.26 0.9424
where the parameter values s1 = 0.005 and s2 = 0.01 are used MLP2-11-4 1.57 7.22 0.9422
to generate the training set, as well as values s1 = 0.007 and MLP2-15-11 1.35 5.97 0.9418
s2 = 0.013 are used for the test set. As a result, the training and
test sets with 127 and 66 samples, respectively, are obtained. For the realization of the MLP_SL neural model, the
During the model training, Levenberg–Marquardt training MLP2-13-13 neural network, that has the highest value of
method, with a given maximum root mean square error on test correlation coefficient (rPPM), is chosen. The scattering
samples of 10-4,is used. In order to define the best possible diagrams of MLP2-13-13 neural model on the test set for fr
MLP_SL model, a number of MLP neural networks with two and s11min outputs are shown in Fig. 4. Similarly like in the
hidden layers and different number of neurons in them, is model presented in [16] the output of neural model fr has very

213
small scattering relatively to the referent values. In the are: Δfr = 5 MHz, lsmin = 2.5 cm, lsmax= 10 cm, dl = 0.1 mm,
scattering diagram for s11min output it can be noticed an area of kmin =0.05, kmax= 0.12, dk=0.001.
moderate scattering (SA1) with s11min ≥ -20 dB and an area of
larger scattering (SA2) with s11min < -20 dB where the neural
model shows smaller accuracy.

IV. SOFTWARE PMWA ANN DESIGN


Software PMWA ANN Design represents modification and
expansion of BT ANN Design ZM software presented in [16].
Part of this software that relates to slot antenna design consists
of slot antenna EM model represented in Section II and
MLP_SL model described in Section III. In the first step of
this tool MLP_SL model is used in order to determine
geometrical parameters (antenna length and width) for desired
antenna resonant frequency that will give minimal value of
s11parameter, or will provide best matching to the chosen feed
line. In the next step, the EM model of slot antenna allows to
estimate the dependence of the s11 parameter versus the
frequency, bandwidth, gain, and radiation pattern in order to
(a)
check whether the proposed antenna architecture meets the
design specifications.
The algorithm presented in the first step is taken from [16]
and is:
1. Combinations of the input variables defined with the set
X = {(ls, k), ls= lsmin:dl:lsmax, k= k min:dk:k max} are applied at
the input of MLP_SL neural model. Then for these
combinations the output sets YSA1 = {(fr, s11min)} for
s11min≥ -20 dB and YSA2 = {(fr, s11min)} for s11min< -20 dB are
generated. In this notation lsmin, dl, lsmax and kmin, dk, kmax
present minimal value, step and maximal value for slot
length (l) and slot width/length ratio (k),respectively.
2. In the output set YSA1, the couple-winner (fr(w1),s11min(w1))
whose value for s11min is minimal in all set Y is found, while
the resonant frequency fr(w1) meets the requirement
|fr(t) - fr(w1)| ≤Δfr, where fr(t) is desired resonant frequency and
Δfr is largest permitted deviation from it.
(b)
3. In the output set YSA2, the couple-winner (fr(w2), s11min(w2))
whose value for s11min is closest to the mean value to that
parameter in the set YSA2 is found, while the resonant
frequency fr(w2) meets the requirement |fr(t) - fr(w2)| ≤ Δfr. If
YSA2 is empty set then the coupler-winner is defined as
(fr(w2), s11min(w2)) = (0,0).
4. If s11min(w2)<s11min(w1) is limited, the couple-winner is
(fr(w), s11min(w)) = (fr(w2), s11min(w2)), in contrary it is
(fr(w), s11min(w)) = (fr(w1), s11min(w1)). For optimal values of l
and k the values that match couple-winner (fr(w), s11min(w)) (c) (d)
are gotten. Fig. 5. PMWA ANN Design outputs for 2.45 GHz slot antenna:
(a) Optimized ls, ws and a parameters, (b) s11 parameter vs.
V. EXAMPLESOF ANTENNA DESIGN USING frequency, resonant frequency, antenna bandwidth, (c) directivity in
the azimuthal plane (-4.84 dBi) and (d) in elevation plane (6.37 dBi)
SOFTWARE PMWA ANN DESIGN

Different slot antennas are designed by use of PMWA ANN


Design software: one for RFID application in 2.45 GHz ISM
band and one that may be used in ultra-wideband real-time
location systems (UWB-RTLS) in band [7-9] GHz with
8 GHz central frequency (Figs. 5 and 6). The parameter values

214
ACKNOWLEDGEMENT
The paper is supported by the Ministry of Education,
Science and Technological Development of Serbia.

REFERENCES
[1] C. A. Balanis, Antenna Theory: Analysis and Design, Wiley,
New York, 2005.
[2] R. Waterhouse, Printed Antennas for Wireless Communications,
John Wiley & Sons, Ltd, 2007.
[3] M. N.O. Sadiku, Numerical Techniques in Electromagnetics,
2nd edition, CRC Press LLC, 2001.
[4] L. Sevgi, Electromagnetic Modeling and Simulation, First
Edition, The Institute of Electrical and Electronics Engineers,
John Wiley & Sons, Inc., 2014.
[5] N. Doncov, B. Milovanovic, and Z. Stankovic, ”Extension of
Compact TLM Air-vent Model on Rectangular and Hexagonal
Apertures”, Applied Computational Electromagnetics Society
(a) (ACES) Journal, vol. 26, no. 1, pp.64-72, 2011.
[6] S. Haykin, Neural Networks, New York, IEEE, 1994.
[7] Q. J. Zhang, K. C. Gupta, Neural Networks for RF and
Microwave, Artech House, 2000.
[8] M. Milijić, Z. Stanković and B. Milovanović, “Efficient Model
of Slotted Patch Antenna based on Neural Networks”,2009 9th
International Conf. on Telecommunication in Modern Satellite,
Cable, and Broadcasting Services, Niš, 2009, pp. 384-387.
[9] M. Pandit, T. Bose, “Application of Neural Network Model for
Designing Circular Monopole Antenna”, International
Symposium on Devices MEMS, Intelligent Systems &
Communication (ISDMISC) - Proceedings published by
International Journal of Computer Applications (IJCA), April
2011, Gangtok, Sikkim, India, pp. 18-21.
[10] M. Chetioui, A. Boudkhil, N. Benabdallah and N. Benahmed,
“Design and Optimization of SIW Patch Antenna for Ku Band
Applications using ANN Algorithms”,2018 4th International
Conference on Optimization and Applications
(ICOA),Mohammedia, 2018, pp. 1-4.
[11] U. Ozkayaa, L.Seyfia, “Dimension Optimization of Microstrip
(b) Patch Antennain X/Ku Band via Artificial Neural Network”,
Procedia - Social and Behavioral Sciences, 2015, vol. 195, pp.
2520-2526.
[12] R. Ghayoula, A. Gharsallah, N. Fadlallah and M. Rammal,
“Artificial Neural Networks ANN Approach for the Synthesis of
Patch Antennas”, 2007 IEEE Radar Conference, Boston, MA,
2007, pp. 285-290,DOI: 10.1109/RADAR.2007.374229
[13] Y. Zhou, “A Novel Slot Antenna for UHF RFID Tag”, IET 3rd
International Conference on Wireless, Mobile and Multimedia
Networks (ICWMNN 2010), Beijing, 2010, pp. 254-257, DOI:
10.1049/cp.2010.0664
(c) (d) [14] M. Ramírez, J. Parrón, “Slot Antenna for RFID Readers”, 2013
Fig. 6.PMWA ANN Designoutputs for 8 GHz slot antenna: 7th European Conference on Antennas and Propagation
(a) Optimized ls, wsandaparameters, (b) s11 parameter vs. frequency, (EuCAP), Gothenburg, 2013, pp. 1726-1729.
resonant frequency, antenna bandwidth, (c) directivity in the [15] W. Abdelrahim, Q. Feng, ”A Compact Wideband Slot Antenna
azimuthal plane (-4.33 dBi) and (d) in elevation plane (5.81 dBi) for Universal UHF RFID Reader”, Progress In Electromagnetics
Research Letters, vol. 73, pp. 137-144, 2018.
VI. CONCLUSION [16] M. Sarevska, Z. Stankovic, N. Doncov, I. Milovanovic and B.
Milovanovic, “Design of well-matched UHF Planar Bowtie
Using neural models, which avoid complex numerical Dipole Antenna using Neural Model”, 2019 14th International
Maxwell’scalculations of equations, the PMWA ANN Design Conference on Advanced Technologies, Systems and Services
software facilitates and speeds up the design of microwave in Telecommunications (TELSIKS), Nis, Serbia, 2019, pp. 331-
antennas. Further development of this software will be aimed 334, doi: 10.1109/TELSIKS46999.2019.9002319
at expanding the library of its models with new types of [17] https://www.mathworks.com
antennas. [18] http://ece.wpi.edu/mom/

215
An Automatic System for Antenna Radiation Pattern
Measurement
Ilia Iliev1 and Ivaylo Nachev2
Abstract – In this paper is presented automatic antenna of a classical set. The distance between both antennas must be
pattern measurement system. The system provides the L > (2D)/λ, which is larger than near field antenna areas for
opportunity to measure different types of antennas in different the operation frequency [7-9].
frequency ranges. The measured pattern can be presented in
Cartesian, polar or 3D spherical coordinate system.

Keywords – Antenna measurement, 3D radiation pattern,


Automatic system, Measurement algorithm, DSS BPSK.

I. INTRODUCTION

With the developing of the wireless technologies, it is


required widespread use of antennas and, at the same time, Fig. 1. Block diagram of the both antennas RP measurement
inexpensive and efficient methods for measuring their method
parameters. The market offers various automatic measurement
systems - from fully professional to hobby applications. The The block diagram of the automatic system transmitting
professional systems are usually part of a measurement part is shown in Fig. 2. The transmitting part in this work
equipment of an anechoic chamber [1-4] and they are very consists SDR Adalm Pluto [10] and it is possible to use
expensive. The semi-professionals systems are cheaper but another type of transmitter. This SDR can emit radio signal in
with limited features and performance [5-6], i.e. work frequency range between 325MHz÷3800MHz. The
frequency, weight of the measured antenna, only 2D pattern transmitted signal bandwidth is wide enough to perform the
diagram and etc. measurement and can be achieved by an appropriate
In this work an automatic system for antenna radiation modulation method. Here Direct Spread Spectrum technique
pattern measurement is demonstrated. The main features are: and BPSK is applied. The transmission of a suitable signal is
low cost, easy to assemble with wide availability components, carried out with specialized software included in the Adalm
possibility to measure 3D radiation pattern diagram with Pluto package. For optimal system performance the SDRs
sufficient accuracy. This article presents different segments software is loaded on USB flash drive and the power supply
and applications of the proposed system. The radiation can be accomplished by using a power bank. The SDR
diagram measurements are performed with a small angle step transmitter is connected to an antenna with predefined
using a method of the both antennas. The measured antenna is parameters.
mounted on 3D rotated stand. An algorithm has been
developed to synchronize the rotation control of the stand and ANTTX
measurement process, which further increases the accuracy of
the measurement.

SDR transmitter DSS, BPSK


II. AUTOMATIC MEASUREMENT SYSTEM Power
supply
The designed system automatically measures antenna’s 3D Program in USB flash drive
radiation pattern. The measurement is based on the method of
both antennas. The receiving and transmitting parts of the
staging are made with innovative devices and modules used in Fig. 2. Block diagram of an automatic system transmitting part
radio communication equipment. Fig. 1 shows block diagram
The receiving part of the measurement settings is more
1Ilia Iliev, Professor at the Faculty of Telecommunications at the
complex – Fig. 3. In the design production, this is the
measuring side of the antenna with unknown parameters. The
Technical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000,
Bulgaria, E-mail: igiliev@tu-sofia.com
blocks are:
2Ivaylo Nachev is a PhD student at the Faculty of • Band Pass Filter – for filtering the received signal from
Telecommunications at the Technical University of Sofia, 8 Kl. measured antenna. This is in order to mitigate the
Ohridski Blvd, Sofia 1000, Bulgaria, E-mail: interferences and to increase the sensitivity of the
ivaylonachev@yahoo.com receiver. The band pass must be approximately equal to

978-1-7281-7142-5/20/$31.00 ©2020 European Union 216


the bandwidth of the transmitting signal. For the and VADC is ESP32 ADC measured value, Pdbm is calculated
multifunctionality of the system, there has to be multiple power in [dBm]. Fig. 4 shows the transfer function in
filters for different frequency bands; graphical manner.
• RF low noise amplifier – increases the sensitivity of the
measurement. This is necessary when measured antennas
are with low gain. However, this part can be neglected;
• AD8318 RF logarithmic detector [11] measures the
power of the received signal from the antenna. The
module must be used in a shielded box in order to
eliminate side effects. The RF logarithmic detector and

Pout [dBm]
transmitter frequency ranges determine the operational
frequencies of the automatic measurement system;
• Lora WiFi (ver2) [12]. The build-in ESP32 is used for
the analog to digital conversion (ADC) of the signal
from AD8318 RF logarithmic detector and data post
processing. This module exchanges data with the PC via
USB interface;
• PC with software for synchronization between the
measurement block and the mechanical rotating units, as
well as for data processing. The software processes the
measured results in an appropriate format;
• Arduino uno – controls the stepper motors. The module Fig. 4. AD8318 RF logarithmic detector transfer function
communicates with PC via USB port and uses special
written driver based on CNC protocol;
Begin
Nema 17 Stepper
Motor Y axis
Arduino A4988 Stepper (elevation)
Stand
UNO Motor Driver Setup of the initial variables:
Nema 17 Stepper
Motor X axis
- scan step and time delay;
USB
(azimuth) - min and max Azimuth angles AZ_scan;
Power - min and max Elevation angles EL_scan;
PC ANTrx
supply
USB

AD8318 RF
Setting the initial position of the motors
Lora RF LNA
Logarithmic BPF
WIFI(V2) Module
Detector
Measurement:
for angle az in (AZ_scan);
Fig. 3. Block diagram of Rx part of the automatic system for angle el in (EL_scan);
set motors position on (az,el);
To simplify the receiving part, instead of the logarithmic Power measurement Pdbm(az,el);
detector and ESP32, a SDR (with the appropriate software) in Time delay;
reception mode can be used. end { for angle el};
In this work the measured receiving power is obtained and end { for angle az};
calculated by approximated pre-determined AD8318 RF
logarithmic detector transfer function. A signal with a certain
voltage depends on the input power is received from the Save data, Plot pattern diagrams,
logarithmic detector. It is measured by a 12-bit ADC of Go to motors to start position
ESP32. For practical purposes and ESP32 RAM limits the
logarithmic detector transmission function can be determined End
by measurement and after an approximation process can be
included in the software. In Eq. (1) is given such polynomial Fig. 5. Block diagram of automatic system software algorithm
approximated characteristic:
The TX RF signal has a constant envelope and this allows
= −38.3 + 256 − 669 + (1) the ADC measurement rate to be 6000 samples per second
+849 − 562 + 150, (sps). One measured value is obtained after averaging 3000
ADC samples. The speed at which a measurement is
where = /1000, performed is 2 values per second.

217
To minimize inaccuracy, the measured values are
processed with a 5th order low pass linear interpolation FIR
filter and it is programmed in ESP32. The filter sample
frequency is also 2 sps.
The measuring unit is placed on a stand that allows
rotation in X and Y planes. The rotations during the
measurement are performed with the help of stepper motors
NEMA 17.
The synchronization between the rotation of the motors
and the measurement process is done by PC software. A block
diagram of automatic system software algorithm is presented
in Fig. 5. The angles and steps for azimuth and elevation are
set in advance. In the measurement process, all angles values
are setup sequentially. After rotating to given position, the
system measures the received power. In this way, the Fig. 7. S11 parameters
synchronization between measurement and rotation is
achieved.
IV. MEASURED RESULTS
The angular velocity of movement depends on the
measuring speed and the angle step. The stepper motor control
Measured patterns are presented in different coordinate
algorithm provides the ability to limit the speed and
systems. For comparison, the Figs. 8 and 9 give measured and
acceleration of rotation. This is necessary so as not to destroy
simulated radiation pattern of the patch antenna in polar and
the mechanical part or mechanically damage the measured
Cartesian coordinate system. Fig. 10 shows radiation pattern
antenna.
in 3D spherical coordinate system. The transmitting antenna is
The measured information can be presented in Cartesian,
TP-Link ANT2409A [15].
polar or 3D spherical coordinate system.

III. TEST PATCH ANTENNA


To test the functionality of the proposed measurement
system (Fig. 6b) a simple patch antenna is designed for
operating frequency =2.4 GHz. The radiated element of the
designed patch has circular form and a subtended substrate
method has been chosen [13]. For additional simplification the
substrate has =1 (dielectric constant of air) and height
h=5 mm - this simplifies the fabrication of the antenna. The
diameter of the antenna in this case [14] is:

= . (2)

The fabricated antenna is presented in Fig. 6a.


The reflection S11 parameter is simulated with openEMS
software. The simulated and the measured results are shown
in Fig. 7.
Fig. 8. Measured RP in polar coordinate system

From the results can be concluded that the proposed


measuring system has the necessary efficiency and accuracy -
measured results are similar to the simulated ones. The stand’s
metal construction and the influence of the reflected waves are
a major disadvantage in the automatic measurement system.
This is one of the reasons for the difference between the
simulated and measured results. To eliminate reflected waves,
the stand can be fabricated of plastic or wave-absorbent
materials.

Fig. 6. (a) Tested patch Fig. 6 (b) Automatic


antenna measurement systems

218
other radio communication measurement equipments. The
mechanical stand with a control device, stepper motors and
receiver measurement part is also suitable for a radio location
or navigation applications.

ACKNOWLEDGEMENT

This work is supported by the National Scientific Program


"Young Scientists and Postdoctoral Students" (2018-2020)
and is approved by the Council of Ministers of the Republic of
Bulgaria № 577 / 17.08.2018 (Annex № 11).

REFERENCES
[1] Antenna Tripods, Masts and positIoners - EUTmanipulators –
Horn positioners (c2001-2016),
http://www.ramayes.com/tripods_masts_positioners.htm
[2] Sunol Sciences Corporate Website (2015),
Fig. 9. Measured RP in Cartesian coordinate system http://www.sunolsciences.com
[3] 2120cr multi-axis positioner (maps) all info (2014),
Another disadvantage is the incorrect positioning of Rx part http://www.ets-lindgren.com/all/2120CR
and the possibility of entering an incorrect value from the [4] 8-Axis Robotic Antenna Measurement System,
measurement. In the software data processing with FIR low https://www.nsi-mi.com
pass filter is used for correcting this shortcoming. [5] Wave and Antenna Training Kit WATS-2002 – manual
The autonomic radiation pattern measurement system has available on http://www.manntel.com/edue/p2_2.html
advantages over a classical method of the both antennas. This [6] J. T. Foley, V. Omelianov, S. Koziel, and A. Bekasiewicz,
“Low-cost Antenna Positioning System Designed with
system has the possibility to present radiation pattern in 3D
Axiomatic Design“, MATEC Web of Conferences, vol. 127,
spherical coordinate system. The error from the rotation of the article number 01015, 2017, The 11th International Conference
antenna is equal to the motor’s step error. on Axiomatic Design (ICAD 2017), DOI:
10.1051/matecconf/201712701015
[7] R. C. Johnson, H. Jasik, Antenna Engineering Handbook, New
York, McGraw-Hill Book Company, 1984.
[8] T. Fukasawa et al., “Extended S-parameter Method Including
Radiation Pattern Measurements of an Antenna”, IEEE
Transactions on Antennas and Propagation, 2012, vol. 60, no.
12, pp. 5645-5653.
[9] Z. Živković, A. Šarolić, Measurements of Antenna Parameters
in GTEM Cell, 2010.
[10] Adalm Pluto datasheet available on
https://www.analog.com/media/en/news-marketing-
collateral/product-highlight/ADALM-PLUTO-Product-
Highlight.pdf
[11] AD8318 RF Logarithmic Detector datasheet
https://www.analog.com/media/en/technical-
documentation/data-sheets/AD8318.pdf
[12] Lora WiFi v2 datasheet available on
Fig. 10. Measured RP in 3D spherical coordinate system https://heltec.org/project/wifi-lora-32/
[13] N.-W. Liu, L. Zhu, W.-W. Choi, “Low-Profile Wide-
Beamwidth Circularly-Polarised Patch Antenna on a Suspended
V. CONCLUSION Substrate”, IET Microwaves, Antennas & Propagation, 2016,
vol. 10, no. 8, pp. 885-890.
The discussed system is relatively cheap and easy to [14] C. A. Balanis, Antenna Theory: Analysis and Design, John
assemble, with accuracy close to professional measurement Wiley & Sons, 2016.
systems. For transmitting and receiving blocks described in [15] TP-Link ANT2409A datasheet available on https://images-
the article can be used SDR integrated into anechoic chamber. eu.ssl-images-amazon.com/images/I/9196zJReTVS.pdf
The components of the proposed system can be applied to

219
Inverse Reading of ITU-R P.1546 Propagation Curves for
the Broadcast Transmitter EM Field Level
Milos Radojković1, Olivera Pronić-Rančić2 and Zlatica Marinković2
Abstract – In this paper, a method for inverse reading of an extension of the method described in [2]. Namely, the
curves for the expected level of electromagnetic field originating ANNs have ability to learn the relationship between the input
from broadcast transmitters, given in Recommendation ITU-R and output data and the learned relationship can be
P.1546, is proposed. The proposed method is based on the subsequently used to generate an accurate response for the
application of artificial neural networks and enables efficient
new input values. ANNs have been widely used in the field of
determination of distances for given field levels for the
frequencies up to 4000 MHz. Accuracy of the method is RF and microwaves [3]-[10]. They have been applied for the
illustrated by an example of curves related to the frequency automated reading of the empirical propagation curves from
3050 MHz and several values of height h1 not used for the neural the ITU recommendation, [5], [7]. As mentioned, in [2] the
model development. ANNs were applied for the inverse reading of the propagation
curves for the frequency of 600 MHz. In this paper, the
Keywords – Broadcast transmitter, Electromagnetic field level, approach is extended to be valid for the entire frequency range
ITU-R P.1546. from 100 to 4000 MHz as defined in Recommendation ITU-R
P.1546.
I. INTRODUCTION The paper is organized as follows: in Section II a brief
introduction to ITU-R P.1546 Recommendation is given. The
Broadcast communications are point-to-area proposed ANN method is explained in Section III. Section IV
communications and their application is very common contains the most illustrative results generated by using the
nowadays (broadcasting of radio and television signals, developed ANN model for inverse reading of the ITU-R
broadcasting of signals from mobile communication base P.1546 EM field level curves. Finally, the concluding remarks
stations, etc.). One of the most important steps in design a are given is Section V.
broadcasting system is determining the coverage area. The
coverage area represents the zone in which the offered service II. ITU-R P.1546 RECOMMENDATION
has the appropriate signal strength, necessary for the provision
of quality services and is determined by the maximum ITU-R P.1546 Recommendation is based on a family of
distances from the transmitter for the given electromagnetic curves representing the field strength radiated by a transmitter
(EM) field strength level. having 1kW effective radiated power (e.r.p). The curves are
The coverage area is determined in several directions in given for frequencies of 100, 600 and 2000 MHz for
azimuth (usually, 36 directions i.e., every 10° or 120 transmitter antenna heights (h1) of 10, 20, 37.5, 75, 150, 300,
directions, i.e., every 3°, depending on the transmitted power). 600 and 1200 m. The curves are given for the propagation of
There are different methods for determining the maximum radio waves over land for 50%, 10% and 1% of the time and
distance at which the appropriate field level is achieved, but 50% of the locations in the area 500 m by 500 m as well as for
the statistical method defined in ITU-R P.1546 50%, 10% and 1% of the times for 50% of the locations for
recommendation is the most frequently used method [1]. radio propagation waves above cold and warm sea surfaces.
According to the recommendation, the determination of the Fig. 1 shows the expected field level for a radio wave of
EM field level is based on interpolations of the values given 2000 MHz frequency propagated over land, for 50% of the
by the empirically derived propagation curves as the function time. According to ITU-R P.1546 Recommendation, each
of distance, transmitting antenna height, h1, frequency and curve represents a signal strength in dB(µV/m) for distances
percentage of time. As such, Recommendation ITU-R P.1546 up to 1000 km and discrete values of height h1.
requires a large number of interpolation calculations for For the propagation of radio waves over the sea, the height
transmitter coverage range determination. h1 represents the height of the antenna above sea level. For the
The aim of this paper is to present a method for inverse propagation of radio waves over land, h1 depends on the
reading of propagation curves from ITU-R P.1546 available information about terrain when propagation
recommendation using artificial neural networks (ANNs), as predictions are being made.
1Miloš Radojković is with Energoprojekt Entel, Bulevar Mihajla In cases when detailed information about terrain is not
Pupina 12, Belgrade 11070, Serbia, E-mail: available, h1 is equal to the antenna height if distance d is less
mradojkovic@ep-entel.com or equal of 3 km. If d is greater than 3 km and less than
2Zlatica Marinković and Olivera Pronić-Rančić are with the
15 km, h1 is calculated according to below equation:
University of Niš, Faculty of Electronic Engineering, Aleksandra
Medvedeva 14, 18000 Niš, Serbia, E-mails: h1 = ha + (heff − ha )(d − 3) / 12 . (1)
zlatica.marinkovic@elfak.ni.ac.rs, olivera.pronic@elfak.ni.ac.rs

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 220


where Einf is signal level read from the h1 curve for the nearest
distance less than distance d (dinf) while Esup is signal level is
read from the h1 curve for the nearest distance greater than
distance d (dsup).
If the frequency of the system differs from one of the
discrete values of the frequencies given in ITU-R P.1546
recommendation, the interpolation is performed according to
the following equation:
log( f / f inf )
Eo = Einf + ( E sup − Einf ) , (4)
log( f sup / f inf )

where Einf is signal level read from the h1 curve for distance d
for the nearest frequency less than frequency f (finf), while Esup
is signal level read form the h1 curve for distance d for the
nearest frequency greater than frequency f (fsup). If f is less
than 600 MHz finf is equal to 100 MHz while in all other cases
f is equal to the 2000 MHz.
Recommendation ITU-R P.1546 can be used for systems
operating in the range 30 MHz to 4000 MHz and for systems
where h1 does not exceed 3000 m.
Radio frequency band is a resource whose distribution is
defined by multiple different official documents and is
divided among a large number of users. Most of the
broadcasting systems contain operating parameters that do not
match the discrete values of ITU-R P.1546 Recommendation,
therefore in design of a broadcasting system, a large number
Fig. 1. Curves for expected field strength level at 2000 MHz for
propagation over land according to ITU-R P.1546 Rec. [1]
of interpolations have to be performed according to
expressions (2), (3) and (4) to determine the EM field level in
where ha is antenna height above the ground level and heff is the coverage area. As already mentioned, one of the most
antenna height over the average level of the ground between important steps in the design of broadcasting systems is to
distances of 3 to 15 km. determine the coverage range of the system, i.e.,
In cases when detailed information about terrain is determination of the maximum distance for the requested
available, h1 is equal to the antenna height over the average field level, which creates a need for inverse reading of the EM
level of the ground between distances of 0.2d to d. If d is field level curves. As mentioned in Introduction, one of the
greater than 15 km, h1 is equal to the heff. efficient methods for inverse reading of the curves from the
The curves in Recommendation ITU-R P.1546 are given for ITU-R P.1546 Recommendation is based on artificial neural
discrete values of frequency, parameter h1 and distance d. networks [2]. In the next section an extension of the method,
Accordingly, if at least one of the above three parameters with extended validity against the frequency is proposed.
differs from the values in the tables of ITU-R P.1546
Recommendation, it is necessary to perform interpolations for III. PROPOSED METHOD
the specific required values.
If interpolation is performed for h1 according to ITU-R The proposed method is based on the use of multi-layered
Recommendation P.1546, the following equation is used: artificial neural networks for inverse curve reading. A multi-
log(h1 / hinf ) layered neural network consists of basic units, neurons,
Eo = Einf + ( E sup − Einf ) , (2) grouped in layers; input layer, one or more hidden layers and
log(hsup /hinf ) the output layer. The number of neurons in the input layer
depends on the number of input parameters, while the number
where Einf is the signal level for the required distance read
of neurons in the output layer corresponds to the number of
from the curve of the nearest height less than h1 (hinf) while
output parameters. The number of hidden layers and the
Esup is level of the field for the required distance read from the
number of neurons in each hidden layer is determined during
curve of the nearest height greater than h1 (hsup). If h1 is
network training. The neural network learns the dependence
greater than 1200 m the hinf is 600 m, while hsup is 1200 m.
between input-output parameters through optimization
If interpolation is performed for distance d, where d can be
procedures, which optimize the network parameters (weights
any distance in the range 1 km to 1000 km from transmitter,
of connections between neurons and thresholds of activation
the following expression is used:
functions of neurons), in order to make the network response
log(d / dinf ) as close as possible to the desired dependence between input-
Eo = Einf + ( Esup − Einf ) , (3) output parameters.
log(d /d )
sup inf

221
special care was taken to avoid network over-learning for the
inputs different than the training data to assure that the
network has good generalization. Generalization was checked
by testing the network for input values that were not used
during learning. The test of the ANN model accuracy is done
Fig. 2. ANN model proposed in [2] calculating average test error (ATE - Average Test Error),
maximum error (WCE - Worst Case Error) and correlation
coefficient [3]. Moreover, as an additional check whether the
network exhibits over-learning was done visually, by
checking the network response plotted versus different input
values other than those used in network training.
After testing the developed models, the network with three
Fig. 3. ANN model proposed in this paper hidden layers with 10, 12 and 14 neurons in the first, second
and third hidden layers, respectively, was chosen as the best
Fig. 2 shows the method proposed in [2]. It is an ANN
model for determining the distance for a given level of EM
trained to calculate the distance for the given EM field level
field.
and height h1.
To illustrate the training accuracy, Fig. 4 shows the
The ANN is trained with the values of the EM field level
reference curves for the frequency 1300 MHz (one of the 39
corresponding to one chosen values of frequency. In [2]
frequencies used during the training) and the heights of 10,
results for frequency of 600 MHz were given.
20, 37.5, 75, 110, 150, 200, 250, 300, 400, 500, 600, 750, 900,
In order to avoid the development of a separate neural
1050 and 1200 m and curves generated by the neural network
network for each frequency defined by the ITU-R P.1546
for the same input parameters. It can be observed that the
Recommendation, or for an operating frequency of the
reference values generated by the neural model follow very
transmitter the model is extended to enable calculation in
well the reference values, which confirms good performance
entire frequency range without using individual interpolation
and good modeling accuracy.
calculations, as shown in Fig. 3.
As can be seen from Fig. 3, the training is performed with
three input parameters, frequency, f, height, h1, requested EM
field level, E and the logarithmic values of the distance, log d,
giving the relation log(d) = f (f, h1, E). Therefore, ANN
consists of three neurons in the input layer and one neuron in
the output layer. It should be mentioned that logarithmic
representation of the distance gave better results than the
linear representation.

IV. RESULTS

The first ANNs trained with the data given in the


Recommendation (discrete values of the frequencies 100
MHz, 600 MHz and 2000 MHz and the discrete values of the
heights 10, 20, 37.5, 75, 150, 300, 600 and 1200 m) did not
provide satisfactory accuracy of the model for any value of
frequency and height. Therefore, a larger training set was
formed, with frequencies from 100 to 4000 MHz with a step
of 100 MHz and heights of 10, 20, 37.5, 75, 110, 150, 200,
250, 300, 400, 500, 600, 750, 900, 1050 and 1200 m. The Fig. 4. Comparison of distance values generated by using the
preparation of the data used for the training was performed developed neural model and the reference values for the training
using expressions (2) and (4). During the development of the frequency 1300 MHz
most accurate model, several networks with one input layer,
two and three hidden layers and with one output layer were Fig. 5 shows the test results for the values different from
tested. Different combinations of the number of neurons in those used during training. From Fig. 5 it can be noticed that
each hidden layer were used, in order to obtain the ANN the values generated by neural network model are very close
giving the most accurate results. As input neurons have a to the reference values. To illustrate better the modeling
buffer function, their function is a unit linear function; accuracy for smaller distances, in Fig. 6 the distance values up
neurons in the hidden layers have a sigmoid transfer function to 20 km were given for the same input parameters as in Fig.
and neurons in the output layer have a linear transfer function. 5. Values from Fig. 5 are shown in higher resolution for
The Levenberg-Maquardt algorithm [3] was applied for distances up to 20 km. In addition, the error calculation results
network training. ANN training and testing was performed in for mentioned test set referring to 3050 MHz are presented in
the Matlab software package. Model accuracy was tested by Table I.
comparing network response and reference values. Also, a

222
As it is shown in Table I the maximum average error is
slightly greater than 0.1% while the maximum error is slightly
greater than 1.5%. The correlation coefficient is very close to
one, which also confirms the high accuracy of the modeling.

V. CONCLUSION
Recommendation ITU-R P.1546 gives the EM field level
for discrete values of frequency and antena height. Therefore
to determine the field strength level or the distance for the
given field strength level it would be necessary to perform a
series of interpolations, the caluculations of the coverage area
complex. The method proposed in this paper provides the
ability to instantly calculate the distance by finding the
response of the neural network for any value of the frequency
and antenna height. As each neural network can be described
using a set of equations based on linear and exponential
functions, the calculation of distances using a developed
neural network is simple and can be performed in any
software environment.
Fig. 5. Comparison of distance values generated by the developed The presented method of determining the distance for a
neural model and the test values not used for training (height h1 of given field level of a broadcast transmitter can be used as an
28, 65, 90, 130, 350, 550 and 700 m and frequency of 3050 MHz)
efficient tool for determining the coverage area of the
transmitter using the statistical method defined by
Recommendation ITU-R P.1546. The aim of future research is
to improve the methods for application in special cases, when
h1 is less than 10 m, as the field strength level for the
mentioned values is not given in the curves.

REFERENCES
[1] P.1546-6, „Method for Point-to-Area Predictions for Terrestrial
Services in the Frequency range 30 MHz to 3 000 MHz“, ITU,
08/2019.
[2] M. Radojković, Z. Marinković, and A. Atanasković, „Inverse
Reading of the ITU-R P.1546 Curves for the EM Field Level
Originating from Broadcast Transmitters”, 63th International
ETRAN Conference, Palić, Serbia, June 11-14, 2018, pp. 334-
337 (in Serbian).
[3] Q. J. Zhang, K. C. Gupta, Neural Networks for RF and
Microwave Design, Boston, MA, Artech House, 2000.
[4] C. Christodoulou, M. Georgiopoulos, Applications of Neural
Networks in Electromagnetics, Artech House, Inc. Norwood,
Fig. 6. Comparison of distance values generated by the developed MA, USA, 2000.
neural model and the test values not used for training (height h1 of [5] Z. Stanković, N. Vasić, “Neural Approach in Modeling of the
28, 65, 90, 130, 350, 550 and 700 m and frequency of 3050 MHz for Propagation Curves from Recommendation ITU-R P.370-7”,
the distances up to 20 km) XLVII ETRAN Conference, Herceg Novi, Serbia and
Montenegro, June 8-13, 2003, pp. 269-272.
TABLE I [6] J. E. Rayas-Sanchez, “EM-based Optimization of Microwave
TEST STATISTICS FOR TRAINING AND TEST DATA Circuits Using Artificial Neural Networks: The State-of-the-
Art”, IEEE Trans. Microw. Theory Tech., vol. 52, no. 1, pp.
ATE [%] WCE [%] r 420-435, Jan. 2004.
training set 0.1083460 1.55836 0.999981 [7] B. Milovanović, Z. Stanković, M. Ostojić, and M. Milijić,
“Prediction of Electromagnetic Field Levels Using a Neural
test set, h1=28m 0.0670648 0.281798 0.999994 Model Based on ITU-R P.1546 Recommendation“, 51st ETRAN
test set, h1=65m 0.1021850 0.305793 0.999998 Conference, Herceg Novi - Igalo, Montenegro, June 4-8, 2007,
test set, h1=90m 0.0606628 0.291294 0.999998 pp. MT1.3.1-4 (in Serbian).
test set, h1=130m 0.0564776 0.224658 0.999997 [8] Z. Marinković, G. Crupi, A. Caddemi, V. Marković, and D.
test set, h1=350m 0.0751861 0.32886 0.999995 M.M.‐P. Schreurs, “A Review on the Artificial Neural Network
test set, h1=550m 0.0792733 0.321617 0.999992 Applications for Small‐Signal Modeling of Microwave FETs”,
Intern. Journal of Numerical Modeling: Electronic Networks,
test set, h1=700m 0.0736781 0.353862 0.999992 Devices and Fields, vol. 33, no. 3, e2668, May/June 2020.

223
GPU-Enabled Simulation of a Combined Macrodiversity
System in Gamma-Shadowed Nakagami-m Fading
Channel
Nenad Petrović, Dejan Milić, Suad Suljović, Samir Koničanin, Selena Vasić
Abstract – We propose the combined diversity receiver [1], a macro-diversity (MD) receiver is utilized. MD receiver
consisting of macro-diversity (MD) selection combining (SC) has been proved to improve the performances as it is almost
receiver and two micro-diversity (µD) maximum ratio combining impossible that independent signals in a diversity system all
(MRC) receivers, as a solution to the impediments a mobile experience deep fading at the same time. µD systems can
signal undergoes in a cellular mobile radio Gamma-shadowed reduce the impact of fast fading, while the MD system reduces
channel with a short-term Nakagami-m fading. The closed-form
shadowing effects. In the scientific testing of signal
expressions for the moment generating function (MGF) for both
µD MRC receivers’ output signal and macro-diversity SC transmission so far, using diversion techniques that reduce the
receiver’s output signal envelopes are derived. By varying impact of fading and increase channel capacity, MRC and
Nakagami-m short term fading severity parameter m and the EGC combining techniques, followed by SC and SSC
order of Gamma distribution c we have considered and discussed techniques have shown the best results [2]. Considering the
the change in system performances and graphically presented complexity of receiver tuning with MRC and EGC combiners,
numerical results. Moreover, we integrate the obtained formulas in practice a more realistic solution is to use SC combiners,
within the simulation environment for optimal network planning that picks the branch with the greatest signal-to-noise ratio
leveraging general-purpose computation on GPU for faster (SNR), especially when the correlation between channels is
execution.
minimal [3]. For MRC combiners, if the noise power is the
same at all the inputs, then the square of the signal at the
Keywords – Gamma shadowing, Nakagami-m fading, GPGPU,
Maximal Ratio Combining (MRC), Selection Combining (SC), output will be equal to the sum of the squares of input signals.
Moment Generating Function (MGF), GPU-enabled simulation. The distribution of the signal at the input to the MRC receiver,
as well as at the output of the MRC receiver, increases the
mean power in direct proportion to the number of inputs [4].
I. INTRODUCTION In wireless channels where there is no optical visibility
between transmitter and receiver (no LOS-line of sight), and
In a Gamma-shadowed, Nakagami-m fading wireless the signal is affected by fading, there are no conditions for
channel, on its way between a transmitter and a receiver, the formation of a dominant component. Then, Nakagami-m
signal is spread out into multiple components that travel along distribution is successfully used to describe the signal
different paths. This causes a substantial signal degrading propagation [5]. Nakagami-m distribution is generalized
effect commonly known as fading. Both short- and long-term distribution characterized by two non-negative parameters: m
fading degrade channel performances and limit capacity of a that controls the shape of distribution and Ω which represents
wireless communication system. The short-term fading the mean power (it affects the spread) [6]. Larger values of m
(multipath fading) causes a signal envelope variation. A long- indicate less-degrading fading conditions. When m approaches
term fading can be modelled with Gamma distribution or to infinity, Nakagami-m fading channel becomes no-fading
long-normal distribution. When long-term fading is described channel. When parameter m equals to one, Nakagami-m
using Gamma distribution, the expressions for outage distribution is reduced to a Rayleigh distribution. If m is 0.5,
probability (OP) and bit error probability (BER) are in closed Nakagami-m distribution becomes a single-sided Gaussian
form. Another degrading effect, known as shadowing causes distribution representing the most severe fading environment
power variation in a signal envelope. All these effects should that can be described by Nakagami-m distribution [7].
be considered when it comes to impact on performance. The analysis of average fade duration (AFD) and average
To mitigate the effects of both long-term and short-term level crossing rate (LCR) of MD system with two µD
fading on the performances in cellular mobile radio systems receivers in Gamma-shadowed Rician fading channel has
been conducted [8]. Similar statistical analysis of MD system
with two µD MRC receivers in a channel undergoing Gamma
Nenad Petrović, Dejan Milić, Suad Suljović and Samir Koničanin
long-term fading and Nakagami-m short-term fading has been
are with University of Niš, Faculty of Electronic Engineering,
Aleksandra Medvedeva 14, 18000 Niš, Serbia, E-mails: performed in [9]. Another work applies moments-based
nenad.petrovic@elfak.ni.ac.rs, dejan.milic@elfak.ni.ac.rs, approach to performance analysis of an L-branch redetections
suadsara@gmail.com, samirk@telekom.rs EGC combiner over independent or correlated Nakagami-m
Selena Vasić is with the Faculty of Information Technology, fading channels [10]. MGF is successfully approximated with
Metropolitan University, Tadeuša Košćuška 63,11000 Belgrade, the aid of Padé approximants theory. Based on MGF-
Serbia, E-mail: selena.vasic@metropolitan.ac.rs approach, the first order statistics such as average output SNR,

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 224


the average symbol-error probability (SEP) and the outage MGF of yi in case of = 2 branches at the output of the µD
probability (OP) are accurately estimated. MRC receiver will be:
Based on the encouraging results reported in terms of
positive effects on wireless system performances when MD M yi (s ) = e − yi s = e − ( yi1 + yi 2 )s = e − yi1s e − yi 2 s =
system is applied, in this paper we will consider the combined
receiver with one MD SC and two µD MRC receivers in a
4m 2mΩi Γ 2 (m + 1 / 2)
Gamma-shadowed Nakagami-m multipath fading channel. = M y1 (s )M y 2 (s ) = . (4)
MGF of the signals at the output of µD MRC receivers will be Γ 2 (m)(m + sΩi )2m +1
calculated and the results used to further evaluate the MGF of
the signal at the output of MD SC receiver. The analysis of In a Gamma-shadowed channel, the random variables Ω1
MGF is needed to calculate the first-order statistics of the and Ω2are Gamma-distributed [13]:
considered MD system such as outage probability (OP) and −(Ω1+Ω2 ) / Ω0  1− ρ 2 
e   ∞ ρ 2i
bit error probability (BEP). To the best of authors’ knowledge
such a combined receiver has not been analyzed in related
pΩ1Ω 2 (Ω1Ω 2 ) =
Γ(c )
⋅ 
i =0 i!
technical literature. The analytical and simulation results of
this study can be applied in design and performance
evaluation of MD wireless communication systems.
(Ω1Ω 2 )i +c−1
⋅ ; Ω1 ≥ 0, Ω 2 ≥ 0. (5)
Γ(i + c )Ω 02i +2c (1 − ρ 2 )
2i +c

II. MOMENT GENERATING FUNCTION


where c is order of Gamma distribution, Ω0 denotes the mean
value of Ω1 and Ω2 while ρ represents the correlation
Fig. 1 presents the model of the proposed MD system.
coefficient.
At the output of the MD SC receiver the moment-
generating function (MGF) of the signal is given by [4]:
∞ Ω1 ∞
M y (s ) = dΩ1 dΩ 2 M y1 (s ) pΩ1Ω 2 (Ω1Ω 2 ) + dΩ 2
  
0 0 0

Ω2 ∞ Ω1

 dΩ1M y2 (s ) = 2 dΩ1 dΩ 2 M y1 (s ) pΩ1Ω 2 (Ω1Ω 2 ). (6)


 
0 0 0

By substituting terms (4) and (5) into expression (6), we


Fig. 1. MD system with MD SC receiver and two µD MRC receivers
obtain the expression for MGF:
Signal envelopes xij have Nakagami-m distribution [11]:
8m2mΓ 2 (m + 1/ 2) ∞ ρ 2i1
M y (s ) =  ⋅
( )
p x x ij =
2  m  2 m−1 − Ω
  xij e
m m
i
xij2
; x ij ≥ 0, i, j = 1,2. (1)
Γ(c)Γ 2 (m) i1=0 i !Γ(i + c )Ω2i1+2c 1 − ρ 2
1 1 0 ( ) 2i1+c

ij
Γ (m )  Ω 
Ω1 Ω2
− −
where Γ(m) is gamma function, m is Nakagami-m short-term ∞
Ω1i1+c  Ω
Ω0  1− ρ 2  1 Ω0  1− ρ 2 

 
  dΩ i1+c −1  
fading severity parameter and Ω i = xij2 is a power of desired
⋅ dΩ1 e 2Ω 2 e (7)
0 (m + sΩ1 ) 2 m+1
0
signal, respectively. After transformation yij=xij2, PDF of the
signal xij becomes: The integral I1 in the expression (7) is:
m 1 − m y
( ) Γ(2m)  Ωm 
m− ij Ω1
p yij yij = yij 2 e Ω i ; yij ≥ 0, i, j = 1,2. (2) − Ω 2 / Ω 0 1− ρ 2 
  I1 =  dΩ2Ωi21 + c −1e   =
0
MGF of random variable yij>0 is [12]:
e −Ω / Ω (1−ρ )
∞ 2 i1 + i2 + c
( ) Ω1

M yij (s ) = e
− y ij s − y ij s 1 0

=  dyij e p yij yij = =  . (8)


0 (i1 + c ) i2 = 0 (Ω (1 − ρ )) (i
0
2 i2
1 + c + 1)i 2

2m m Ω1i / 2
= Γ(m + 1 / 2). (3)
Γ(m)(m + sΩ i )m+1 / 2 After inserting the expression (8) in the expression (7), we
can rewrite the MGF in the following form:

225
8Γ 2 (m + 1 / 2 ) ∞ ∞
ρ 2i1 Ω 0− ( 2i1 +i2 + 2c ) performance deteriorates. As a result of the combined effects
M y (s ) =
mΓ(c )Γ 2 (m )
 ( + c )(i1 + c )(i1 + c + 1)i2
⋅ of the observed parameters, it is noted that the correlation
i1 = 0 i2 = 0 i1 ! Γ i1 coefficient ρ exhibits higher influence on MGF for higher
values of Nakagami-m severity parameter m and higher values
− 2Ω1 / Ω0 1− ρ 2  of Gamma long-term fading severity parameter.

1 Ω12i1 +i2 + 2c +1−1e  

(1 − ρ )
2 2i1 +i2 + c  dΩ1 (1 + (s / m)Ω1 )2m+1
. (9)
0 10
m=1, c=1, ρ=0.2, Ω0=1
m=2, c=1, ρ=0.2, Ω0=1
Using the following identity [14; 3.383]: m=3, c=1, ρ=0.2, Ω0=1
1
m=1, c=2, ρ=0.2, Ω0=1
∞ q −1 − px
x e  p
dx = a Γ(q )Ψ q, q + 1 − v, 
m=1, c=3, ρ=0.2, Ω0=1
 (1 + ax )v
−q
(10) m=1, c=1, ρ=0.4, Ω0=1
0  a 0,1
m=1, c=1, ρ=0.6, Ω0=1

My[s]
m=1, c=1, ρ=0.8, Ω0=1
In the above expression the factor ψ (s, d, t) refers to a 0,01
confluent hypergeometric function. Hence, the last integral in
expression (9) can be denoted by I2 and written in the
1E-3
following form:
2Ω1


Ω12i1 + i2 + 2c +1−1 Ω 0  1− ρ 2  1E-4

I2 =  dΩ1
( (
1 + s / m Ω1 2m +1) )
e   = -5 0 5
s[dB] 10 15 20

2 i1 + i 2 + 2 c +1
Fig. 2. MGF of MD SC receiver output signal, when m, c and ρ
m changed
=  Γ(2i1 + i2 + 2c + 1) ⋅
s
IV. MODELLING AND SIMULATION ENVIRONMENT
 2m 
⋅ Ψ  2i1 + i2 + 2c + 1,2i1 + i2 + 2c − 2m + 1, . (11)
 sΩ 0 1 − ρ 2 ( ) 
 Using the calculations of fading effect and our previous
work presented in [15] and [16], the simulation environment
By substituting the (11) in the expression (9) we can obtain is built that use the general-purpose GPU (GPGPU)
the formula for MGF of the MD SC receiver’s output signal: programming paradigm. This enables substantionally faster
calculations of huge data streams in non-graphic applications
8Γ 2 (m + 1 / 2) ∞ ∞ ρ 2i1 (m / Ω 0 )2i1 + i 2 + 2c on GPU. It has been approved as an effective approach to
M y (s ) = 
Γ(c )Γ 2 (m ) i1 = 0i 2 = 0 i1!Γ(i1 + c )(i1 + c ) performance improvement in fading channel simulations [17].
First, user draws a model of base station and antenna
configuration using the graphical modelling environment with
Γ(2i1 + i2 + 2c + 1)
⋅ ⋅ domain-specific notation introduced in [15]. Then, via
(i1 + c + 1)i2 (1 − ρ 2 )
2i1 + i 2 + c 2i + i + 2 c +1
s 1 2 graphical interface, the parameters about both the network
configuration related to transmitter, interference, channel,
  receiver and service consumers can be set. The modelling
2m
⋅ Ψ  2i1 + i2 + 2c + 1,2i1 + i2 + 2c − 2m + 1,  (12) environment is run in web browser and implemented relying
 sΩ 0 1 − ρ 2 ( ) 
 on JavaScript, Three.js, HTML and CSS. In Fig. 3, a
screenshot of mobile network modelling and simulation
III. NUMERICAL RESULTS environment aiming smart cities run in web browser is given.
Fig. 2 depicts the MGF derived in (12) for different values
of parameters m, c and ρ. It represents the way the MGF of
MD SC receiver output changes in terms of instantaneous
signal-to-noise ratio s for several values of Nakagami-m short-
term fading severity parameter m, Gamma long-term fading
correlation coefficient ρ and average signal power Ω.
It can be observed that the increase in fading parameter m
and parameter c causes the decrease of MGF, which has a
positive effect on the system performances. Another effect is
that higher values of the fading parameter m affect the MGF
more intensively. Also, if the correlation coefficient ρ drops to
zero, the outage probability of the system decreases, causing
therefore the improvement of the system performances. On
Fig. 3. Mobile network modelling and simulation environment run in
the other hand, if the correlation is very strong and approaches web browser: autonomous cars (consumers) and antenna (service
to one, the outage probability is higher and the system provider)

226
After that, the model parameters are sent to the backend REFERENCES
which is responsible for calculation of quality of service
(QoS)-related parameters considering the effect of fading and [1] M. K. Simon, M. S. Alouini, Digital Communication over
leveraging CUDA1-enabled C code for execution on GPU. A Fading Channels, Wiley: New York, 2000.
kernel for MGF calculation in CUDA-enabled C program is [2] G. L. Stüber, Principles of Mobile Communication: 2nd ed.,
shown in Fig. 4. It provided around 25 times faster execution Technology & Engineering, Kluwer Academic Publisher, 2000.
than our previous work from [15] and 38 times speed-up in [3] E. A. Neasmith, N. C. Beaulieu, "New Results in Selection
case of similar system with three µD MRC receivers [18]. Diversity", IEEE Transaction on Communications, vol. 46, pp.
695-704, 1998.
__global__ void calculate(float* x, float* y)
[4] S.Panic et al.,Fading and Interference Mitigation in Wireless
{
int tid = threadIdx.x + blockIdx.x * blockDim.x;
Communications, CRC Press: USA, 2013.
while (tid < N) [5] C. W. Jakes, Microwave Mobile Communications, Piscataway,
{ IEEE Press, New York, USA, 1994.
y[tid] = my(x[tid]); [6] N. Wang, X. Song, and J. Cheng, "Generalized Method of
tid += blockDim.x * gridDim.x; Moments Estimation of the Nakagami-m fading Parameter",
} IEEE Transactions on Wireless Communications, vol. 11, no. 9,
} pp. 3316-3325, 2012.
Fig. 4. CUDA kernel for GPU-enabled MGF calculation [7] P. Shankar, Fading and Shadowing in Wireless Systems, New
York: Springer, 2012.
The calculated values, together with user-defined model [8] N. Sekulovic et al.,"Second Order Statistics of System with N-
parameters are used to construct input for linear optimization Branch Micro Diversity Operating over Gamma Shadowed
process with respect to linear program from [15]. Finally, the Rician Fading Channel", International Journal of
process of linear optimization is performed resulting with Communication systems, vol. 27, no. 2, pp. 390-400, 2014.
[9] B. Jaksic et al.,"Level Crossing Rate of Macro diversity System
optimal base station configuration. Moreover, the obtained
in the Presence of Multipath Fading and Shadowing", Radio
optimization results can be further transformed to software- engineering, vol. 24, no. 1, pp. 185-191, 2015.
defined radio or base station hardware-specific commands for [10] I. Temelkovski et al., "Moments of Macrodiversity SC Receiver
adaptive improvement of QoS in real scenarios. In Fig. 5, an with two Microdiversity EGC Receivers over Gamma
overview of the modelling and simulation environment for Shadowed Rician Multipath Fading Channel", TEM Journal,
network planning is given. vol. 4, no 3, pp. 292-296, 2015.
[11] M. Nakagami, "The m-distribution, a General Formula of
Intensity Distribution of Rapid Fading", Statistical Methods in
Modelling Fading Linear Command
1
tool 2
calculation 3
optimization 4
generator
5
Radio Wave Propagation, Oxford, U.K., Pergamon, 1960.
User
Optimal network
[12] J. Malhotra, "Performance Analysis of Diversity Combining
configuration Multichannel Receivers in Generic-Gamma Fading Channels",
Fig. 5. Overview of web-based tool for modelling and simulation: Tamkang Journal of Science and Engineering, vol. 14, no. 4, pp.
1- Drawing a diagram; 2-Model; 3-Calculated QoSvalues; 333-340, 2011.
4-Optimization results; 5-Hardware-specific commands [13] S. Suljović et al.,"Level Crossing Rate of Macro-diversity
System in the Presence of Fading and Co-channel Interference",
V. CONCLUSION AND FUTURE WORK Revue Roumaine des Sciences Techniques-Serie El. et
Energetique, vol. 64, no. 1, pp. 63-68, 2019.
The analyses presented above refers tothe scenario of a [14] I. Gradshteyn, I. Ryzhik, Tables of Integrals, Series, and
cellular mobile radio system where the signal undergoes products. Academic Press, New York 1994.
Gamma long-term fading and Nakagami-m short-term fading. [15] N. Petrović, S. Koničanin, D. Milić, S. Suljović, and S. Panić,
Combined MD system with one MDSC receiver and two µD "GPU-enabled Framework for Modelling, Simulation and
MRC receivers has been proposed to minimize deteriorating Planning of Mobile Networks in Smart Cities", ZINC 2020, pp.
effects in the channel. The higher values of Nakagami 1-6, 2020, https://doi.org/10.1109/ZINC50678.2020.9161773
parameter m induce the decrease of MGF and therefore the [16] D. Milić, S. Suljović, N. Petrović, S. Koničanin, and S. Panić,
enhancement of the bit error probability. The value of "Software Environment for Performance of Relay Signal by DF
Technique Influenced by k-µ Fading", INFOTEH 2020, pp. 1-4,
correlation coefficient is inversely related to system
2020, https://doi.org/10.1109/INFOTEH48170.2020.9066304
performances. The higher the ρ the worse system [17] A. F. Abdelrazek et al., "A Novel Architecture using NVIDIA
performance. The derived formulas are integrated within the CUDA Tospeed up Simulation of Multi-Path Fast Fading
softwaresimulation for purpose of QoS parameter calculation Channels", pp. 1-5, 2009.
aiming optimal network resource planning. GPGPU approach [18] D. Krstić et al., "Moment Generating Function of
is used to speed up the calculations of fading effect and has Macrodiversity System with Three Microdiversity MRC
proven to be a powerful tool in this kind of analysis. Receivers in Gamma Shadowed Nakagami-m Fading Channel",
CSNDSP 2016, pp. 1-6, 2016,
https://doi.org/10.1109/CSNDSP.2016.7573984
ACKNOWLEDGEMENT
This work has been supported by the Ministry of Education,
Science and Technological Development of the Republic of
Serbia.

1
https://developer.nvidia.com/cuda-zone

227
MEASUREMENT,
CONTROL SYSTEMS AND ICT
Measurement and Analysis of PM Particles
Emitted by Automotive Brakes
Emil Iontchev1, Rosen Miletiev2, Rumen Yordanov3 and Ilian Damyanov4
Abstract – All vehicles emit fine particles into the air during while the emission of fine and ultrafine particles are still
the braking due to the tyres and brakes friction. The brakes may poorly studied.
be the most significant particulate matter (PM) contributor, The current paper discusses the measurement and the
especiallyin places with a high traffic density and braking analysis of the brake particle emissions during the slow down
frequency. As the PM particles are associated with different
processes with diameter from 0.3µm to 10µm. In the same
respiratory symptoms even sometimes with a premature death it
is important to analysed the PM emitted by the automotive time a temperature monitoring of the rotation disk is
brakes and their distribution from PM0.3 to PM10. The current accomplished to measure the thermal heating using the
paper discusses the measurement and analysis of the PM particle thermal imaging estimation method [9]. The analysis shows
sizes from 0.3µm to 10µm during the slow down process, their the particle concentration of all three PM categories and
time and size distribution according to the brake intensity. particle count @ 0.1L air for six different particle sizes – from
0.3µm to 10µm.
Keywords – Brakes, Fine particles, Particle distribution.

II. PM MEASUREMENT METHOD


I. INTRODUCTION
The particulate matter emission measurements are
The particulate matters (PM) are divided into three implemented on the front disc brakesof passenger vehicleas
categories– coarse (diameter of between 2.5µm and 10µm), the braking force is greater than the rear wheels.As the brake
fine (0.1 to 2.5µm in diameter) and ultrafine (<0.1µm in particles are evolved during the braking process, the particle
diameter) particles [1]. The particles over 10µm in diameter movement direction is expected to lieinto the coarse size
are efficiently filtered in the nose while the particles below fraction [8], the PM sensor input is positioned under the brake
<0.1µm in diameter directly pass to the blood steam through shoes to collect the maximum portion of the emitted particles
the alveoli. The particles less than 2.5μm in diameter are (Fig. 1). The tire is also removed as the air ventilation during
associated with respiratory problems while the particulate the disk rotation scatters the brake wear particles.
matter particles with diameter between 2.5 and 10 µm are
responsible for asthma symptoms, eye and lung problems and
premature death [2]. At presentthe real-time PM counting
methods are based on light scattering or absorption processes.
The most of the commercial low-cost PM counting sensors
have the typical accuracy from 10 to 15% [3-5] and may
separate the above mentioned PM groups. The comparison
study of some PM sensor performance was established at [6].
The vehicles are one of the major source of PM particles
due to the tyres and brakes friction [7]. A recent review shows
that brake-wear emissions are more than50% by mass of total
non-exhaust traffic-related PM10 emissions and up to 21% by
mass to total traffic-related PM10 emissions [8]. But most of
the studies concern the particles with diameter over 2.5µm

1Emil Iontchev is with the Higher School of Transport “T.


Kableshkov” 158 Geo Milev Street,Sofia 1574, Bulgaria, E-mail:
e_iontchev@yahoo.com
2RosenMiletiev is with the Faculty of Telecommunications at

Technical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000,


Bulgaria,E-mail: miletiev@tu-sofia.bg
3Rumen Yordanov is with the Faculty of Telecommunications at

Technical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000,


Bulgaria,E-mail: rsyordanov@tyahoo.com
4Ilian Damyanov is with the Faculty of Telecommunications at

Technical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000,


Bulgaria,E-mail: idamyanov@tu-sofia.bg Fig. 1. Particulate measurement method and assembly

978-1-7281-7142-5/20/$31.00 ©2020 European Union 


The particulate matter are measured using a low-cost sensor
type CP-15-A4-CG, which is commercial grade laser-based
sensor with digital outputs (UART and PWM) (Fig. 2). The
measurement range is defined as 0.3-10μm, TTL 3.3V level
outputs, 3s response time and PM2.5 consistency of ±10μg/m3
or ±10% [10]. The declared degree of the approximation to
the professional instrument is equal to 98%.

Fig. 2. PM sensor type CP-15-A4-CG

The PM sensor is connected to USB port via TTL to USB


converter and the sensor is powered from USB port as the
maximum sensor power consumption not exceeded 100mA.
The sensor measurement packets are captured, recorded and
analyzed by PM measurement tool (Fig. 3) specially designed
tool at MATLAB environment on virtual COM port, which is
created by the TTL/USB converter.
Each measurement data are saved as HEX values (RAW .
format) and stored in a TXT file (decoded format) using CSV Fig. 3. Measurement and recording tool
format:
• Time (seconds from start recording) III. EXPERIMENTAL RESULTS AND ANALYSIS
• PM1.0 (µg/m3)
• PM2.5 (µg/ m3) The PM measurements are accomplished using different
situations:
• PM10 (µg/ m3)
• Test 0 - no brakes
• particles 0.3µm @ 0.1L air
• Test 1 – speed 40km/h, 3-th gear, no blocking
• particles 0.5µm @ 0.1L air
brakes, low load slow down
• particles 1.0µm @ 0.1L air • Test 2 – speed 40km/h, 3-th gear, blocking + no
• particles 2.5µm @ 0.1L air blocking brakes
• particles 5.0µm @ 0.1L air • Test 3 – speed 30km/h, continuous brake, slow
• particles 10µm @ 0.1L air stop
• Test 4 – speed 50km/h, high load slow down
The measurement process is initiated by selecting the real • Test 5 – speed 60km/h, extremely high load slow
or virtual COM port from “Serial port:” menu and open it by down
clicking on OPEN button. As the connections is established, The first test (Test 0 – no brakes) is performed to measure
the recording process is started when the START button is the PM levels in the test environment and compare the levels
pressed the system shows the recording time in “Scan time” with the other experimental results. The measured PM
field. The recording process is finished when the STOP button concentrations are as follows PM1.0 = 34 (µg/m3),
is pressed and the PM graphics may be generated by clicking PM2.5 = 38(µg/m3), PM10 = 53 (µg/m3), while the particle
on “Data analysis” button. During the measurement the real- numbers @ 0.1L air are equal to 5500 (0.3µM), 1925
time values of the PM concentrations and particle numbers are (0.5µM), 165 (1.0µM), 13 (2.5µM), 1 (5.0µM), 2 (10µM).
shown in the corresponding field in the tool. Fig. 4 represents the PM concentrations during the tests
As the recording process is accomplished the disk thermal from Test 1 (case a) to Test 5 (case e), while Figure 5
image is made by FLIR camera installed laterally to the represents the particle count @ 0.1L air during the tests from
rotation disk. Test 1 (case a) to Test 5 (case e).


(a)
(a)

(b)
(b)

(c) (c)

(d)
(d)

(e)
(e)
Fig. 4. PM concentration for Test 1÷5
Fig. 5. Particle count @0.1L air for Test 1÷5


The PM measurements shows that during the slow down Therefore the emitted PM particles, particularly in urban
process the particle concentrations rise significantly from environments and major cities, may cause several lung
50µg/m3 (Test 0 levels) to approximately 1500µg/m3 and problems and their emissions have to be reduced significantly
remain at the constant levels during the slow down duration by adding the particle collecting system to the automotive
(Fig. 4c) for all particle sizes. The PM10 particles are construction.
dominant but PM1.0 and PM2.5 concentrations exceeded 15-
20 times the Test 0 levels.
The particle count analysis shows that the particle numbers
ACKNOWLEDGEMENT
are also changed dramatically during the slow down process.
The number of the smallest size particles (below 0.5µm) The authors would like to thank the Faculty of
exceeded the sensor measuring range of 65535 particles (the Telecommunications at the Technical University of Sofia for
particle number is sent as a 16bit value) in all cases especially the financial support.
during the continuous time braking (Fig. 5c).
REFERENCES
[1] J. Thongplang, “Particulate Matters: Why Monitor PM10 and
PM2.5?”, Last Updated: Dec 19, 2018.
[2] M. Morais-Almeida, N. Santos, A. M. Pereira, M. Branco-
Ferreira, C. Nunes, J. Bousquet, and J. A. Fonseca, “Prevalence
and Classification of Rhinitis in Preschool Children in Portugal:
a Nationwide Study”, Allergy, vol. 68, no. 10, 1278-1288, 2013.
[3] P. Kumar, L. Morawska, C. Martani et al., “The Rise of Low-
Cost Sensing for Managing Air Pollution in Cities”,
Environment International, vol. 75, pp. 199-205, 2015.
[4] E. G. Snyder, T. H. Watkins, P. A. Solomon et al., “The
Changing Paradigm of Air Pollution Monitoring”,
Environmental Science & Technology, vol. 47, no. 20, pp.
11369-11377, 2013.
[5] N. Castell, F. R. Dauge, P. Schneider et al., “Can Commercial
Low-Cost Sensor Platforms Contribute to Air Quality
Monitoring and Exposure Estimates?”, Environment
Fig. 6. FLIR thermal image of the rotating disk International, vol. 99, pp. 293-302, 2017.
[6] M. Badura, P. Batog, A. Drzeniecka-Osiadacz, and P. Modzel,
The FLIR thermal image of the rotation disk at the end of ”Optical Particulate Matter Sensors in PM2.5 Measurements in
the experiments shows significant rise of the disk surface Atmospheric Air”, 10th Conference on Interdisciplinary
temperature to 216oC due to the friction. Therefore the Problems in Environmental Protection and Engineering EKO-
DOK, vol. 44, 2018.
complete particle analysis also requires to take into account [7] A. Thorpe, R. M. Harrison, “Sources and Properties of Non-
not only the distribution of the particles according to their size Exhaust Particulate Matter from Road Traffic: A Review”, Sci.
but also the high process temperature and possible chemical Total Environ., vol. 400, Issues 1-3, August 2008, pp. 270-282.
compounds used in the rotation disk and brake shoes [8] T. Grigoratos, G. Martini, “Brake Wear Particle Emissions: A
production process as the metal and fiber particles may have Review”, Environ Sci Pollut Res, vol. 22, 2015, pp. 2491-2504.
different influence on the human health. [9] S. Pleshkova, A. Bekiarski, and K. Peeva, “Testing Thermal
Images Characteristics for Thermal Images Quality Estimation”,
Latest Trends on Systems – Volumes I & II, Proceedings of the
IV. CONCLUSION 18th International Conference on Systems, (part of CSCC '14),
Santorini Island, Greece, July 17-21, 2014, pp. 251-256.
The experiment results represent that the braking process [10] http://yeetcen.youhaovip.com/products/p000006 - A4 CG Laser
emits significant number of particulate matters of all sizes PM2.5 Sensor description, accessed 10.2019
which are associated with asthma and respiratory symptoms.


Investigation of the Method of RMS Measurement Based
on Moving Averaging
Anna A. Kostina1, Plamen M. Tzvetkov 2 and Andrey N. Serov3
Abstract – Currently, the measurement method of root mean For a polyharmonic input signal,
square value (RMS), based on samples accumulation, is the most
popular. The advantages of this method include ease of M
implementation, high accuracy and additional opportunities to
reduce the methodological component of the total measurement
x (t ) = X
i =1
i 2 sin(ω i t + α i ), (2)

error. Studies show that increasing measurement time also


contributes to a reduction in error. However, in a number of expression (1) can be represented as follows [1]:
measurement and automatic control problems, one of the main
requirements is to reduce the measurement time. This problem M
can be solved by a method based on moving averaging, that
includes the advantages of the “classical” method, but is largely
X id = X
i =1
2
i , (3)
devoid of its shortcomings. An algorithm of RMS measurement
for implementation on the basis of recursive and non-recursive where Xi – RMS of the i-th spectral component of the input
moving average filters is proposed. The influence of the
signal; ωi – angular frequency of the i-th spectral component;
sinusoidal signal parameters on the RMS measurement error is
analyzed. An analytical expression is obtained that allows to
αi – initial phase of the i-th spectral component; M – number
estimate the RMS measurement error from the signal of considered spectral components.
parameters and the number of samples. Approaches are For digital measuring devices, the instantaneous values of
proposed for reducing the RMS measurement error when the input signal come in the form of discrete samples by using
applying the measurement method under consideration. It is an analog-to-digital converter (ADC). For this reason, the
shown that the application of post-filtration of RMS direct implementation of the definition of RMS (see formula
measurement results can reduce the final RMS measurement (1)) is impossible. There are a large number of digital methods
error. The veracity of the analytical expressions obtained in the for RMS measurement, which are based on the analysis of the
paper is confirmed by the results of simulation at check points. signal in the time [2]-[8] or frequency domain [9]-[10]. Some
Keywords – Root mean square, Simulation, Digital filtration, digital RMS measurement methods are designed to measure
Measurement accuracy, Frequency deviation. sinusoidal input signals. These methods include the three-
sample method [8] and the method based on the application of
the second derivative of the signal [2]. The application of
I. INTRODUCTION these methods in conditions of nonsinusoidal signals results to
significant measurement errors. Currently, the operation
The root mean square (RMS) of a periodic signal is the algorithms of most digital measuring instruments for RMS
parameter, which is determined by the expression [1]: measurement are based on the application of a samples
accumulation method (ASS) of the input signal [7].
TA
1 The investigated method has several advantages. First of
x
2
X id = (t ) dt , (1) all, this method is applicable for measurement sinusoidal and
TA 0
polyharmonic signals. The small number of required
where TA – total observation (measurement) time, which is arithmetic operations ensures the simplicity of its practical
selected proportional (multiple) of the real value of the input implementation. Due to the additional measurement of the
signal period; x(t) – input periodical signal. signal frequency [11]-[16] and the adjustment of the number
of accumulated samples (or the initial phase of the signal), it
is possible to significantly reduce the methodological error.
1Anna A. Kostina is with National Research University “Moscow One of the parameters that influence the measurement error is
Power Engineering Institute”, Diagnostic Information Technologies the measurement time. With increasing measurement time, the
Department, Krasnokazarmennaya st. 14, 111250 Moscow, Russia, methodological error tends to decrease. However, in a number
E-mail: Kostina.AA.mpei@yandex.ru of problems of measurement and control theory, measurement
2 Plamen M. Tzvetkov is with Technical University of Sofia,
time is a critical parameter, which imposes serious limitations
Department of Electrical Measurements at Faculty of Automatics,
Bulgaria, Sofia 1000, 8 Kliment Ohridski blvd, E-mail: on this measurement method.
Tzvetkov@tu-soia.bg Thus, the problem arises of finding high accuracy RMS
3 Andrey N. Serov is with National Research University “Moscow measurement methods, that requires a short measurement time
Power Engineering Institute”, Diagnostic Information Technologies for the case of the real electrical networks. In the paper, a
Department, Krasnokazarmennaya st. 14, 111250 Moscow, Russia, samples accumulation method is analyzed. This method
E-mail: SerovAN@mpei.ru satisfies the properties, which are describe above.

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 


II. THE RMS SAMPLES ACCUMULATION
MEASUREMENT METHOD

A. General Description

This method is based on the application of a zero-order


polynomial as a restoring function and the subsequent
implementation of the RMS determination for the
reconstructed signal (see expression (1)). Moreover, RMS can
be obtained by using the following formula [5]-[6]:

N −1
1
X=
N  x [i ] ,
i =0
2
(4)

where N – number of averaged samples; x[i] – signal samples. Fig. 1. The dependence of the RMS measurement error (moving
The number of averaged samples is related to the averaging method) on the input signal frequency
measurement time by the following relation:
where Tnom – nominal or measured value of the input signal
N period.
TA = NTS = = mT , (5) The second approach to reducing the error is to ensure that
fS
the lower equation of condition (7) is satisfied. If the initial
where m – number of averaged input signal periods; T – input phase of the signal satisfies the condition:
period value; TS – sampling time; fS – sampling frequency.
α = 0.25π − 0.5( N − 1)ωTS ± 0.5πk , (10)

B. Measurement Error then the RMS measurement error for the case of a sinusoidal
signal is equal to zero.
In [5]-[6], a relation was obtained for calculation the RMS As in the previous case, since the frequency of the signal is
measurement error for the case of a sinusoidal input signal: unstable, and the initial phase of the signal is discrete (due to
the discrete nature of the signal samples), condition (10)
cos(( N − 1)ωTS + 2α ) sin(ωNTS ) cannot be fulfilled absolutely precisely. This results to the
δX = − , (6)
2 N sin(ωTS ) RMS measurement error.

where ω – input signal angular frequency (true value); α –


initial phase of the input signal. III. THE RMS MOVING AVERAGING
The dependence of the error on the input signal frequency is MEASUREMENT METHOD
shown in Fig. 1. The figure shows that there are singular
points where the dependence takes on a zero. A. General Description
Special points where the error takes zero values are
achieved when the following conditions are met: As already described above, one of the drawbacks of the
samples accumulation method is a large measurement time.
 sin(ωNTS ) = 0,
 (7) Since N samples are required to obtain a measurement result,
cos(( N − 1)ωTS + 2α ) = 0. the measurement time is equal to NTS = TA. That is, the
sampling time of the RMS measurement result is TA. The
The fulfillment of the upper condition of expression (7) can update rate of the RMS measurement result can be increased.
be ensured by adjusting the number of averaged samples: It is achieved if for the calculating of the next measurement
result, the signal samples, which are used for the previous
k kT T A RMS result. The sampling time of the RMS measurement
N= = = , (8)
fTS TS TS results is equal to the sampling time of the input signal if the
RMS measurement is performed for the N-1 previous samples
where k – integer value (in expression (8) is accepted k = m). of the input signal relative to the current n-th sample. In this
Since the number of processed samples is a discrete, and case, the formula for RMS calculating takes the following
the frequency of the input signal is unstable in time, relation form:
(8) is not absolutely accurate. This results to the appearance of
a methodological error. In practice, the following formula can N −1
1
be used to determine the number of measured samples: X [n] =
N  x [n − i] .
i =0
2
(11)

N = round (TA ⋅ f S ) = round (m ⋅ Tnom ⋅ f S ), (9)


As for the previous method, the number of averaged 1
samples can be obtained by expression (5). Expression (11)
δ X ( n) ≤ − . (14)
2 N sin(ωTS )
can be implemented on the basis of a moving average non-
recursive filter of the N-th order. The RMS measurement However, an increase in the measurement time results to a
transducer can also be implemented by applying a recursive deterioration in the dynamic characteristics of the method.
structure: Since the result of the RMS measurement with the use of this
method is the average value of the RMS for the considerate
x 2 [ n] x 2 [n − N ] measurement interval, changes in the RMS of the input signal
X [ n] = + X [ n − 1] − . (12)
N N will more slowly manifest themselves on the measurement
result. For this reason, the application of this approach in the
considerate measurement method is ineffective, since it
B. Measurement Error neutralizes the advantages of this method compared to the
samples accumulation measurement method.
The error of the n-th measured RMS sample of the Using the adjustment of the number of samples allows to
considered method can be calculated by using expression (6) reduce the value of the factor sin(ωNTS) in expression (13).
(provided that the initial phase of expression (6) is corrected, The finite error of frequency measurement and the discrete
the input signal is sinusoidal): nature of the number of averaged samples (parameter N)
interfere with ensuring the equality of this factor to zero. In
cos(( N − 1)ωTS + 2(α + nωTS )) sin(ωNTS )
δ X (n) = − , (13) the case of using this approach, the relative RMS
2 N sin(ωTS ) measurement error can be represented as:
where α – initial phase of the input sinusoidal signal at the  1 
first sample for the total measurement time. δ f + ω cos(( N − 1)ωTS + 2(α + nωTS ))
 2 N
Fig. 2 shows the time dependence of the RMS measurement δ X (n) = − . (15)
2 f S sin(ω TS )
error with the application of expression (11). It can be seen
from Fig. 2 and expression (13) that the measurement error in
where δf – frequency relative measurement error.
time domain characterized by a sinusoidal behavior with a
The application of adjustment of the initial phase for this
frequency equal to the real value of the signal frequency ω.
measurement method is not justified, since such adjustment
To reduce the measurement error, as well as for the samples
violates the measurement algorithm represented by
accumulation method, the following approaches can be
expressions (11) and (12).
applied:
The application of low-pass filtration of the RMS
– increase of the total measurement time;
measurement results makes it possible to reduce the influence
– adjustment of the number of averaged samples according
of a time-variable factor of expression (13) –
to the dependence (9);
cos((N–1)ωTS+2(α+nωTS)). In this case, the applied low-pass
– adjustment of the initial phase of the signal according to
filter should be designed to suppress the non-dc spectral
the relation (10);
components with the frequency of the input signal (frequency
– application of additional low-pass filtration.
of the variable component of expression (13)). In addition, the
As can be seen from dependence (13), an increase in the
constant (DC) component of the RMS measurement result
measurement time results to a decrease of the RMS relative
(useful signal) should be transmitted to the filter output
measurement error. For large measurement time values, the
unchanged. The RMS relative measurement error for this
maximum RMS error can be represented as:
approach takes the form:

H (ω ) cos(( N − 1)ωTS + 2(α + nωTS ) + ϕ (ω ))


δ X (n) = − , (16)
2 N sin(ωTS ) sin −1 (ωNTS )

where H(ω) – magnitude response of the applied low-pass


filter for the frequency (true value) of the input signal ω; φ(ω)
– phase response of the applied low-pass filter for the
frequency (true value) of the input signal ω.

IV. SIMULATION MODELING


Simulation mathematical modeling was performed in
Simulink software package. By Simulink a simulation model
of the RMS measurement transducer was developed based on
the method of moving averaging of samples (MA) and based
Fig. 2. The dependence of the RMS measurement error for the on the samples accumulation measurement method (ASS). At
method of moving averaging on the number of measurement result
the output of the measurement converter, a digital IIR filter is


TABLE 1. REFERENCES
SIMULATION RESULTS FOR RMS MEASUREMENT TRANSDUCERS OF
DIFFERENT TYPES (ERROR IS REPRESENTED IN PERCENT)
[1] A. E. Emanuel “Powers in nonsinusoidal situations - a review of
RMS MC Frequency relative deviation, δf , % definitions and physical meaning,” IEEE Trans. on Power
type -5.0 -1.0 0.0 1.0 5.0 Delivery, vol.: 5, issue: 3, 1990, pp. 1377–1389.
ASS 2.6 0.51 0.0 0.50 2.4 [2] A.M. Zayezdny; Y. Adler; I. Druckmann “Short time
measurement of frequency and amplitude in the presence of
MA 2.6 0.51 0.0 0.50 2.4
noise,” IEEE Transactions on Instrumentation and
MA+BF 1.8 10-2 9.2 10-4 8.0 10-5 8.8 10-4 1.5 10-2 Measurement, vol.: 41, issue: 3, 1992.
MA+CF 8.7 10-2 0.10 0.10 0.10 9.0 10-2 [3] G. E. Mog; E. P. Ribeiro. “One cycle AC RMS calculations for
ASS+SA 0.11 5.0 10 -3
0.0 5.0 10 -3
0.13 power quality monitoring under frequency deviation,” 11th
International Conference on Harmonics and Quality of Power,
MA+SA 0.11 5.0 10-3 0.0 5.0 10-3 0.13
2004, pp. 700-705.
MA+BF+SA 1.6 10-4 8.0 10-5 8.0 10-5 8.2 10-5 1.6 10-4 [4] Predrag B. Petrovic “Root-mean-square measurement of
MA+CF+SA 0.10 0.10 0.10 0.10 0.10 periodic, band-limited signals”, IEEE International
Instrumentation and Measurement Technology Conference
applied, constructed according to the analog prototype of 4-th Proceedings, 2012, pp. 323-327.
[5] Fan Wang; M. H. J. Bollen “Frequency-response characteristics
order Butterworth filter (BF) or 3-rd order Chebyshev filter
and error estimation in RMS measurement,” IEEE Transactions
(CF). The developed model provides for the possibility of on Power Delivery, vol.: 19, issue: 4, 2004, pp. 1569-1578.
additional adjustment of the number of averaged samples [6] Andrey N. Serov, Nikolay A. Serov, Petr K. Makarychev.
(SA) according to the frequency measurement result. The "Comparative Analysis of the RMS Measurement Methods
simulation results are shown in Table 1. When performing the Based On the Averaging of the Squares of Samples", 2020 30th
simulation, a sinusoidal signal with a unit amplitude and a International Conference Radioelektronika
zero initial phase was applied. The sampling frequency is (RADIOELEKTRONIKA), 2020.
equal to 10 kHz, the measurement time of one frame is equal [7] A. Serov, A. Shatokhin, A. Novitskiy, D. Westermann
to 0.02 seconds. The total simulation time is 2 seconds. When “Investigation of the method of RMS measuring based on the
digital filtration of the square of samples,” 2018 18th
designing the output post-filters, the following characteristics
International Conference on Harmonics and Quality of Power
was applied: passband limit – 10 Hz; stopband limit is 45 Hz; (ICHQP), 2018, pp. 1-6.
maximum passband deviation – 0.1 %; minimum stopband [8] V.S. Melentiev; V.I. Batishchev; A.N. Kamyshnikova; D.V.
rejection is 0.01. Rudakov “An improvement in the methods used for the
measurement of the integrated characteristics of harmonic
signals,” Measurement Techniques, vol.: 54, no.: 4, 2011, pp.:
V. CONCLUSION 407-411.
[9] S.N. Mikhalin, V.M. Gevorkyan “The problems of digital
As a result of the research done, the following results were processing of signals in the system of automated power quality
obtained: control and accounting quantity of electricity (ASQAE),” MPEI
1. The method of moving averaging of samples allows to Vestnik, no.: 1, 2005, pp. 86-92.
get the RMS measurement result in less time compared to the [10] Andrzej Konstanty Muciek “A Method for Precise RMS
"classical approach". Measurements of Periodic Signals by Reconstruction Technique
With Correction,” IEEE Transactions on Instrumentation
2. An analytical expressions (13)-(16) has been obtained to
and Measurement, vol.: 56, issue: 2, pp. 513-516.
take into account the measurement error of the proposed [11] B. Boashash “Estimating and interpreting the instantaneous
method. The application of these expressions makes it frequency of a signal. I. Fundamentals,” Proceedings of the
possible to calculate the maximum value of the RMS IEEE, vol.: 80, issue: 4, 1992.
measurement error for the given parameters of the input signal [12] B. Boashash “Estimating and interpreting the instantaneous
and RMS measurement transducer. In addition, the inverse frequency of a signal. II. Algorithms and applications,”
problem can be solved: for a given maximum value of the Proceedings of the IEEE, vol.: 80, issue: 4, 1992.
RMS measurement error, the maximum deviation of the signal [13] M.M. Begovic, P.M. Djuric, S. Dunlap and A.G. Phadke,
frequency can be estimated (which is equal to the maximum “Frequency tracking in power networks in the presence of
harmonics,” IEEE Transactions on Power Delivery, vol.:
frequency measurement error in the case of adjusting the
8, issue: 2, 1993, pp. 480-486.
number of samples). [14] A. Serov “Frequency estimation methods for stationary signals,”
3. The approaches to reduce the RMS measurement error by 2017 International Conference on Industrial Engineering,
the proposed method are developed. The approaches consist in Applications and Manufacturing (ICIEAM), 2017, pp. 1-6.
adjusting the number of averaged input signal samples and [15] D. Agrez, “Power system frequency estimation in the shortened
post-filtration of the RMS measurement results. It was shown measurement time,” Proceedings of the 18th IEEE
that adjusting the number of averaged samples and low-pass Instrumentation and Measurement Technology Conference,
post-filtration can significantly (up to 103 times) reduce the vol.: 2, 2001, pp. 1094-1098.
RMS measurement error. [16] P. Petrovic, S. Marjanovic and M.R. Stevanovic, “New
algorithm for measuring 50160 Hz AC values based on the
4. By application of Simulink, a simulation model of RMS
usage of slow A/D converters,” IEEE Transactions on
measurement transducer is developed. Instrumentation and Measurement, vol.: 49, issue: 1, 2000, pp.
166-171.


Monitoring of Air Pollution in Skopje in order to
Determine Possible Causes
Vladimir Mijakovski1 and Monika Lutovska2
Abstract – Brief review of few major air pollutants of Skopje is Considering that electricity production is the main source for
presented in this article. State automatic monitoring system for SO2 emissions, its emissions trends vary and depend highly on
ambient air quality measures up to 7 air pollutants is presented. coal consumption. There are many industries that emit
It consists of network of 17 fixed and 1 mobile monitoring significant quantities of SO2 in the ambient air: the oil
stations installed throughout the country. Performed analysis of
industry emits SO2 or H2S during refining of petroleum
pollutants’ inventory reveals that suspended particles (PM10 and
PM2.5) are the most critical air pollutants in Skopje in the last products, electricity production plants that use coal with high
couple of years. concentrations of sulphur, sulphide smelters, installations for
production of paper and pulp. In 2014, the estimated national
Keywords – Monitoring, Causes, Air pollution, Skopje. SOx emissions amounted to 83.141 kilotons, where a key and
dominant source with 92%, are the combustion processes
from fuels (coal and oil) in power generation.
I. INTRODUCTION Suspended particles or particular matter (PM), as one of the
most common pollutants in the air is a mixture of solid and
The use of oil and oil derivatives, traffic, increasing liquid particles, suspended in the air with wide range of sizes
industrialization and intensification of production inevitably and chemical structure. They can originate from natural
lead to an increase in the concentration of harmful substances sources (sea salt, desert areas dust, wildfires, volcanic ash
in the air. Although in traces, their presence has been shown pollen) and anthropogenic sources (industrial processes,
to have a significant detrimental effect on human health, combustion of fossil and biofuels - vehicles, power plants and
biosphere and other material goods. There are substances in households, transport and waste incineration). The most
the air, such as: nitrogen oxides (NOx), sulphur dioxide (SO2), significant share in particles emission (PM2.5 – 51%, PM10 –
ammonia (NH3), carbon monoxide, particulate matters, heavy 35%), according to the conducted inventory of suspended
metals, hard degradable organic compounds, etc., that have a particles, belongs to domestic heating, especially due to
direct or indirect negative impact if their presence is in incomplete burning wood in old stoves. Recent studies, [1]
concentrations higher than normal. have shown that key sources of suspended particles emission
Nitrogen monoxide (NO) and nitrogen dioxide (NO2), or are heat and electricity production processes (PM2.5 -25%,
general NОx, are the most important nitrogen oxides, that PM10 - 22%), as well as production processes especially in
occur as an air pollutant. NO2 reactive gas is formed by the area of metallurgy. The reduction in emissions in the
oxidation of nitrogen monoxide (NO). A major source of NO recent years, is due to lower consumption of firewood in
and NO2 is high temperature combustion process (processes winter period.
that are carried out in motor vehicles and power plants). The
amount of NOx is increased in winter due to intensive use of
fossil fuels. The largest amounts of nitrogen oxide emissions II. EMISSION MEASUREMENTS, LIMIT VALUES AND
in Republic of North Macedonia are emitted during the STANDARDS IN USE
production of electricity and thermal energy (48%), due to the
dominant electricity production with coal as a fuel. Traffic Republic of North Macedonia has an emission inventory
emissions, also, have large share (38%) of total emissions of reporting obligation, [2], towards the Convention on
this pollutant. transboundary air pollution and its eight protocols as well as
Sulphur dioxide, SO2, is a colourless, toxic gas with sharp the European Environmental Agency (EEA). In accordance
and irritant odour, and acidic properties. Its toxic impact on with the Convention and its protocols, our country is required
humans occurs at mass concentration in the air of about 6 to annually report data on emissions of the main air pollutants
mg/m3 or more, causing serious health problems. Today, covered by the Convention. According to EU legislation, limit
sulphur dioxide, SO2, is considered as one of the main values of air pollution levels are the strictest rules. In a case of
pollutants in the atmosphere from anthropogenic sources, and exceeding the limit values, measures to reduce the levels of
thus intensive measures are taken to reduce its emissions. pollutant concentrations must be defined and enforced by the
authorities. In addition, for the protection of human health and
1Vladimir Mijakovski is with the University “St. Kliment vegetation, critical levels have been defined, Table I.
Ohridski”, Faculty of Technical Sciences- Bitola 7000, N. In the Republic of North Macedonia, the monitoring of
Macedonia, E-mail: vladimir.mijakovski@tfb.uklo.edu.mk ambient air quality is performed by the Ministry of
2Monika Lutovska is with the University “Mother Theresa”,
Environment and Physical Planning, which manages the State
Faculty of Technical Sciences - Skopje1000, N. Macedonia, E-mail:
Automatic Air Quality System, as well as the Institute of
monika.lutovska@unt.edu.mk

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 


TABLE I
LIMIT VALUES OF AIR POLLUTANTS
Allowed
Averaging Limit number of
Pollutant
period values exceedances in
a year
Sulphur dioxide, 1 hour 350 μg/m3 24
SO2 24 hours 125 μg/m3 3
Nitrogen dioxide 1 hour 200 μg/m3 18
NO2 1 year 40 μg/m3 - Fig. 2. Total national SO2 emissions for the period 1990-2015
PM10 suspended 24 hours 50 μg/m3 35
particles 1 year 40 μg/m3 - In the period from 2013 to 2014 emissions remained quite
stable (-1%), and after 2014 remained at the same level due to
Public Health (IPH) with the Centres for Public Health in the fact that no major changes were carried out. In 2016, SO2
Skopje and Veles.Additionally, the air quality monitoring is emissions in Skopje are also the highest in the month of
performed by certain installations that have an obligation in December. Maximal hourly concentrations of SO2 reaching up
accordance with the requirements of the IPPC permit. to 52 μg/m3, were registered at monitoring stations in
The Ministry of Environment and Physical Planning Miladinovci at the end of the second half of December. Fig. 3
manages the State Automatic Monitoring System for Ambient shows the hourly SO2 concentrations for Skopje
Air Quality, which consists of 17 fixed and 1 mobile agglomeration region in December 2016 [4, 5].
monitoring station throughout the country, located on
following places: 5 measuring stations in Skopje, 2 measuring
stations in Bitola, and one measuring station in Veles,
Municipality of Ilinden, Kichevo, Kumanovo, Kochani,
Tetovo, Kavadarci, Gostivar, Strumica and in the village of
Lazaropole, Fig. 1 [3].

Fig. 3. Hourly concentrations of SO2 for Skopje agglomeration


region in December 2016

PM10 emissions
Main emission sources of PM10 in Macedonia for 2014 were
Fig. 1. State automatic ambient air quality monitoring system residential heating with a share of 36% in total PM10
emissions, industrial processes and product use - ferroalloys
Automatic air quality monitoring stations monitor the production with 33%, energy sector with 20% and agriculture
following pollutants: SO2, NO2, CO, ozone (O3), PM10, with 7%. Fugitive emissions and waste are minor sources of
PM2.5, Benzene, toluene, ethylbenzene, and xylenes (as PM10 emissions. Total national PM10 emissions in 1990
BTEX). amounted to 48 kt, and in 2014 emissions decreased by 32%
Within this paper, a comparison of the emissions of SO2 reaching 33 kt. Declining emissions from industrial processes
and PM10 at the level of the entire country and especially for are the main reason for this decrease. Low emissions for the
Skopje was made. years 2001, 2002 and 2009 compared to the other years are
related to low emissions from ferroalloys production due to
SO2 emissions shorter operating hours and produced quantity of ferrosilicon
Total national SO2 emissions amounted to 110 kt in 1990. (80-90% decrease compared to 2014). Emissions reduction of
In 2014, emissions decreased for 24% due to decreasing 24% was recorded from 2013 to 2014, as a result of a decline
emissions from public electricity and heat production, and in ferroalloys production and decrease in biomass
amounted to total of 83 kt. In the years 2009 and 2011 consumption from residential heating. Total national PM10
emission peaked compared to 2010, due to higher emissions for the period 1990-2015 are shown in Fig. 4.
consumption of coal by the major thermal power plant REK Measurements in Skopje showed that the average annual
Bitola. Shorter operation periods of the second by installed concentration of PM10 was 72,82 μg/m3 in the municipality of
capacity thermal power plant REK Oslomej in the period 2012 Centar and 57,06 μg/m3 in the municipality of Karposh. It is
– 2013 decreased coal consumption up to 60%, thus reducing noted that the highest measured concentrations of PM10 in
SO2 emissions. Skopje were recorded in winter, [4, 5].


According to measurements for 2016 in Skopje, highest
PM10 emissions were observed in the month of December.
Enormous hourly concentrations of PM10 that reached over
1000 μg/m3, are registered at monitoring stations Rectorate
and Lisiche, during the second half of December. Fig. 5 shows
the hourly concentrations of PM10 for December 2016.
A detailed description of the methods for measuring air
pollutants as well as quality control of measurements are
given in the European CEN standards, which are accepted in
the Republic of North Macedonia. The following table shows
Fig. 4. Total national PM10 emissions for the period 1990-2015
the MKC EN standards for measuring the concentrations of
pollutants in the air, Table II.

III. STATE AUTOMATIC MONITORING SYSTEM FOR


AMBIENT AIR QUALITY (SAMSAAQ)

SAMSAAQ consists of: Air quality calibration laboratory,


state air quality monitoring network and air quality data
management system [3].
Air quality calibration laboratory maintains the traceability
of the reference gas standards towards conducted
measurements through calibration of the measuring
instruments; Participates in inter laboratory comparison
exercises organized by EC/Joint Research Center and the
WHO; Approves measurement systems (methods, equipment,
networks and laboratories); Ensures the accuracy of
Fig. 5. Hourly concentrations of PM10 for Skopje agglomeration
measurements; Maintains accreditation according to ISO/IEC
region in December 2016
17025 for the reference methods and Keeps good contacts and
passes the information from the EC, AQUILA, EC-working
TABLE II groups to the personnel at the local networks.
REVIEW OF МКС STANDARDS FOR MEASUREMENT OF POLLUTING As mentioned earlier in the article, the air quality
SUBSTANCES IN THE AIR monitoring system consists of 17 automatic monitoring
stations, 6 low volume samplers and 4 high volume samplers.
Substa Measuring method Each automatic measuring station measures environmental
nce
and meteorological parameters with installed data acquisition
МКС EN 14212:2013 - Ambient air - Standard
SO2 method for the measurement of the concentration of set. The following measurement instruments are used:
sulphur dioxide by ultraviolet fluorescence
МКС EN 14211:2013 - Ambient air - Standard For the measurement of SO2:
NO,
method for the measurement of the concentration of • TEI 43C SO2 analyzer, from manufacturer Thermo
NO2,
NOx
nitrogen dioxide and nitrogen monoxide by Environmental Instruments;
chemiluminescence • TI 100SO2 analyzer, from manufacturer Teledyne API;
МКС EN 12341:2014 - Ambient air - Standard • ML2050 SO2analyzer, from manufacturer Casella
gravimetric measurement method for the
PM10 monitor.
determination of the PM10 or PM2.5 mass
concentration of suspended particulate matter
МКС EN 12341:2014 - Ambient air - Standard For the measurement of NO, NO2 and NOx:
gravimetric measurement method for the • TEI 42C NO-NO2-NOx analyzer, from Thermo
PM2.5
determination of the PM10 or PM2.5 mass Environmental Instruments;
concentration of suspended particulate matter • T200 NO-NO2-NOx analyzer, manufactured by
МКС EN 14626:2013 - Ambient air - Standard Teledyne API;
method for the measurement of the concentration of • ML2041 NO-NO2-NOx analyzer, from manufacturer
CO
carbon monoxide by non-dispersive infrared
Casella monitor.
spectroscopy
МКС EN 14625:2013 - Ambient air - Standard
O3 method for the measurement of the concentration of For the measurement of CO:
ozone by ultraviolet photometry • TEI 48C CO analyzer, from manufacturer Thermo
МКС EN 14662-3:2016 - Ambient air - Standard Environmental Instruments;
BTEX
method for the measurement of benzene • T300 CO analyzer, manufactured by Teledyne API;
concentrations - Part 3: Automated pumped sampling • ML 2030 CO analyzer, manufactured by Casella
with in situ gas chromatography monitor.


For the measurement of O3: IV. MEASURES FOR REDUCTION OF POLLUTANTS
• TEI 49C O3 analyzer, from manufacturer Thermo
Environmental Instruments; Having in mind that the Earth is becoming an urban planet
• T400 O3 analyzer, manufactured by Teledyne API; and more than 60% of the global population now lives in
• ML 2010 O3 analyzer, manufactured by Casella cities, it is expected that most people will suffer the most
monitor. severe consequences from pollution in urban areas. In the city
of Skopje lives approximately one third of the total population
For the measurement of PM10/PM2.5: of Republic of Macedonia and the influx of people from the
• FH 62 I-R, PM2.5 and PM10 Automated Particulate region create substantial daily migrations. Some activities
Monitor analyzer, manufactured by Thermo ESM have been undertaken to implement medium and long-term
Andersen; measures outlined in the National Plan for the ambient air
• Sharp 5030, PM2.5 and PM10 Automated Particulate protection, [6]. To improve air quality at the level of Skopje
Monitor Analyzer, by Thermo Fisher Scientific; region agglomeration, draft versions of improvement plans are
• BAM-1020 Continuous Particulate Monitor Analyzer, prepared during 2015 and in the first half of 2016. Increasing
from Met One Instruments, Inc.; the share of renewable energy sources in total energy
• Grimm 180, PM10 / PM2.5 Environmental Dust consumption has led to reduction of pollutants emission. In
Monitor Analyzer, by Grimm Aerosol Technik; this regard, activities listed in adjustment permits with
• MicroPNS LVS 16 Sequential Low Volume Sampler operational plans of heat production installations are
sequential low volume sampler, from manufacturer implemented. A study for the gasification of the Skopje region
Umwelttechnik MCZ GmbH; was also prepared. At local level, gasification network is
• Low Volume Sampler LVS 3.1 low volume sampler, extended with introducing gasification facilities in housing
from ComdeDerenda; and schools in Skopje. Most of the measures are implemented
• LVS3 / MVS6 low volume sampler, from in the capital because of the highest traffic frequency. Out of
manufacturer Sven LeckelIngenieurbüro GmbH. this reason, from 1 January 2015, import of vehicles with at
least Euro 3 standard is permitted. In the municipality Centar,
The schematics of the air quality data management system a measure for speed limit in certain streets even up to 30 km/h
is shown in Fig. 6. is conducted. Namely, a special traffic regime (using the ring
road) for trucks whose final destination is not the city of
Skopje, is introduced during the winter period. Also, as an
experience taken from world capitals such as London, Vienna,
Klagenfurt, Linz, Helsinki, Brunek, Stuttgart, Stockholm,
Gothenburg and al., application of CaMg (CH3COO)4
(calcium magnesium acetate) on the roads in the city during
the winter season has started. It is used to control and reduce
concentrations of PM10 and PM2.5 suspended particles.

V. CONCLUSION
According to Eurostat data, urban areas in the EU are
Fig. 6. Schematic diagram of the State Automatic Monitoring System
for Air Quality
responsible for 80% of energy consumption [6]. Given the
current performed inventory of pollutants in individual
AIRVIRO is a web-based system for Air Quality sectors/activities in Skopje, it is evident that electricity and
Management developed by SMHI and Apertum IT AB. It is heat production, burning firewood for households heating,
the core of the SAMSAAQ. AIRVIRO is an integrated system transport and industrial processes have the greatest
for time series data handling, emission inventories and contribution to the air pollution. Namely, suspended particles
dispersion modelling. It is a client / server web integrated are the most critical pollutant in all previous years. Thus,
system for Air Quality Management, including time series exceedances above the limit values of suspended particles of
data handling, emission inventories and dispersion modelling. size up to 10 μm repeatedly higher than the daily average limit
Validation and verification of the measured data in the value at all measurement locations especially in winter period
system is done on a daily basis. Based on the validated data, a are recorded. The national government, together with local
daily, monthly and annual report is prepared and published on and regional authorities, shares responsibility for combating
the web portal for air quality: http://air.moepp.gov.mk. The global warming and enormous greenhouse gas emissions,
current situation with the ambient air quality in the Republic through efficient energy consumption and the use of
of North Macedonia can be monitored in real time on the renewable energy sources [6]. In this regards, certain
same website. measures for reduction of pollutants emission have already
By collecting, processing and utilizing meteorological been introduced in the last few years, [7]. Although the effects
data, AIRVIRO has possibility to display wind rose needed from implementation of these measures are difficult to be
for dispersion modeling. analysed since their utilization lasted for several days during
the entire winter period, it is especially important that their


implementation is carried out by cooperation among all the [2] Republic of Macedonia/Informative Inventory Report 1990 –
relevant factors between the city and the municipalities. 2015 (under the Convention on Long Range Transboundary Air
Therefore, it seems that the primary activity to which the most Pollution-CLRTAP), Ministry of Environment and Physical
attention should be paid is to raise public awareness, Planning of the Republic of Macedonia, Skopje, 2017.
[3] Website: http://airquality.moepp.gov.mk/.
education and change the behaviour/habits of citizens. In [4] Strategy on Climate Changes - Resistant Skopje 2017,
addition, increasing of green areas, modernizing and Department of environmental protection and the nature of the
improving efficiency in energy infrastructure, increasing the city of Skopje
use of renewable in electricity production, increasing the use [5] Website: http://www.skopjecentar.ekoinformatika.mk/
of natural gas [8], as well as the development of a better [6] Sustainable Energy Action Plan for development of the City of
traffic management plan, are actions that should be the Skopje, April 2011
primary goals on the agenda for tackling air pollution [4]. [7] National Plan for the Protection of the Ambient Air in the
Republic of Macedonia for the Period 2013 – 2018, Government
of the Republic of Macedonia, Skopje, December 2012
REFERENCES [8] Strategy for Energy Development in the Republic of Macedonia
until 2030, Ministry of economy, 2010.
[1] Report of Processed Data on Environmental Quality in 2015,
Ministry of Environment and Physical Planning of Republic of
Macedonia.


Load Disturbance Rejection in Hydro Turbine Control
Based on Wiener Filtering
Teofana Puleva1 and Elena Haralanova2
Abstract – In this paper the task of load disturbance rejection modeled as a stochastic process [1] with an exponential
in a hydro generator speed and power control is considered. The distribution described by the PDF function
load change is described as a stochastic process. It is shown that
the problem of random load disturbance rejection can be pv ( x ) = μ e − μ τ . (1)
formulated as an optimal controller design in sense of minimum
mean-square error (Wiener filter design). Controller structure The reciprocal value of µ has a sense of a mean value of
based on dynamic compensation as well as on direct design with time intervals between successive load rate changes. The
rational transfer function by taking into account the plant non- covariance and the spectral density function of this stochastic
minimal phase characteristics is obtained.
process are
Keywords – Load rejection, Water turbine speed control, 2σ v2 μ
Wiener filter design. Kv (τ ) = σ 2 e
−μ τ
, Sv (ω ) = , (2)
ω2 + μ 2
I. INTRODUCTION where σ v2 is the load standard deviation. The load spectral
density function can be presented by the following expression
The problem of random load disturbance rejection in a
hydro generator operation in power limited energy system can 2σ v2 μ
be based on the stochastic approach to the control system. The Sv (ω ) = .
task of load disturbance rejection is formulated as an optimal ω 2 (ω 2 + μ 2 )
controller design problem in sense of minimum mean-square The turbine-generator system dynamic behavior in presence
error (Wiener filter design) [1-2]. In [3] a robust technique of load disturbance can be presented by the equation
based on weighted multichannel Wiener filter for speech
processing is considered. It takes into account the speech y ( s ) = Wuy ( s )u ( s ) + Wvy ( s )v( s ) . (3)
distortion due to signal model errors explicitly in its design
criterion. The investigations in this paper can be considered as The transfer functions with respect to the control signal u and
a continuation of previous research works related to multiple to the load disturbance v in (3) are:
model adaptive controller design based on Wiener filtering
[4]. The efforts are focused on the determination of the k (−Tw s + 1)
simplified single controller structure by more precise Wuy ( s ) = , Wvy (s) = kv , (4)
(Tm s + 1)(0.5Tw s + 1) Tm s + 1
modelling of the stochastic load variation. This approach can
be applied to other control design problems describing the
where Tw is the water column time constant; Tm - mechanical
local network operation of renewable energy sources.
time constant; k and kv - proportional coefficients with
II. CONTROLLER DESIGN BASED ON WIENER respect to the control signal and to the disturbance
FILTER respectively.
In Fig. 1 the block diagram of the turbine speed control
system in presence of load disturbance and measurement
The dynamic behavior of a system in which a hydro turbine
noise is shown. The system output is compared to the desired
unit is connected to a power limited energy system is
reference transformation W0 ( s ) .
investigated. The main function of the hydro turbine governor
in this operation mode is to compensate the unpredictable load
variation in order to keep the frequency on its nominal value. Wvy ( s )
The load rate change can be described as a stochastic process
that takes random values in particular time intervals. The time
Wc (s ) Wuy ( s)
intervals between successive load rate changes can be

Teofana Puleva is with Technical University of Sofia, Faculty of


Automatics, Kl. Ohridski St. 8, 1000 Sofia, Bulgaria, E-mail:
tpuleva@tu-sofia.bg W0 (s )
Elena Haralanova is with Technical University of Sofia, Faculty of
Automatics, Kl. Ohridski St. 8, 1000 Sofia, Bulgaria, E-mail: Fig. 1. Load disturbance in speed control of the hydro generator
tpuleva@tu-sofia.bg local network operation

978-1-7281-7142-5/20/$31.00 ©2020 European Union 


The spectral density function of the random signal s is where Sη = N 2 , Ds = 2Tl kv2σ v2 .
For a given spectral density function of the random signal s,
2 2Tl kv2σ v2
Ss (ω ) = Wvy ( jω ) Sv (ω ) = 2 , (5) the optimal system transfer function is
ω (1 + Tm2ω 2 )(1 + Tl 2ω 2 )
c1 s 2 + c2 s + c3
Wopt ( s) = , (11)
where Tl = μ .−1
b0 s + b1 s 2 + b2 s + b3
3

After block diagram algebra in Fig. 1 the topology of the


diagram shown in Fig. 2 can be obtained. The controller will c1 = b1 − N (Tm + Tl ) , c2 = b2 − N , c3 = kσ v 2Tl . (12)
be designed for small perturbations around the equilibrium
point r=0. If the optimal system transfer function is already determined
W = Wopt , the controller transfer function can be obtained:
WWvyvy( s( )s )
W
Wc ( s) = , (13)
Wuy ( s )
Wpl (1 − W )
Wvy ( s ) Wc ( s )
where W pl is the plant transfer function ( Wpl = Wuy ). The
turbine speed and power controller design takes into account
Fig. 2. Modified block diagram
special features of the plant related to its non-minimal phase
characteristic. The Eq. (13) can not be applied to controller
The error spectral density function from the general Wiener
design when the plant exhibits non-minimal phase behaviour.
problem is
In this case another controller structure and design algorithm
2
Sε = 1 − W Ss + W Sη ,
2
(6) can be developed. One approach for solving this problem is to
apply direct design method based on rational transfer
where W is the closed loop transfer function. Therefore the functions description by taking into account plant non-
problem of random load disturbance rejection in a hydro minimal phase characteristics [8-9] when the desired closed
generator operation in power limited energy system can be loop trasfer function is already obtained. The control signal u
formulated as an optimal controller design problem in sense of is formed by the following polynomial expression:
minimum mean-square error (Wiener filter design). The linear
Ru = Sr − Ty , (14)
least-squares filter performs optimal separation of the
measured signal and additive noise, based on their spectral where R, S и T are polinomials of s satisfying the
characteristics. The optimal control system transfer function corresponding degree requirements, r and y are the reference
in sense of minimum mean-square error is [2, 5-7]. and the output signal respectively. The polinomials R, S and T
1  W0 S s  can be determined by solving the Diophantine equation
Wopt ( s ) = , ϕϕ = S s + Sη , Ssη = 0 , (7)
ϕ  ϕ  + ( AR + BT ) y ( s ) = BSr ( s ) , (15)
where operations of factorization and separation have to be where the polynomials B and A are the plant transfer function
carried out in order to obtain a causal solution. In case numerator and denominator, and the ratio y ( s ) / r ( s ) is the
W0 ( s ) = 1 and in presence of measurement noise modeled as a
desired transfer function Wopt . In presence of non-minimal
white noise, the separation in Eq. (7) may be avoided. Hence
the Wiener filter design can be carried out by the formula phase characteristics, the numerator is presented as a product
of two components B( s ) = B + ( s ) B − ( s ) , where the non-
1
Wopt ( s ) =
ϕ
(ϕ − )
Sη , Sη = N 2 . (8) minimal phase term is B − ( s ) . The optimal transfer function
in case of functional constraints is [1-2, 7]
The factorization of Eq. (8) leads to the following
expression: E W0 ES s 
Wopt ( s) =   , (16)
Eϕ  Eϕ  +
b s3 + b1 s 2 + b2 s + b3
ϕ= 0 . (9)
s(Tl s + 1)(Tm s + 1) E = −Tw s + 1 , E = Tw s + 1 , (17)
The coefficients bi , i = 0,3 are calculated from the where the non-minimal fraction E is analytical function in the
following relationships: left half-plane and E is analytical in the right half-plane.
The factorization of the input signal spectral density
2 2 2 2
(
b0 = NTmTl , b1 = N Tm + Tl + 2 NTmTl b2 , ) (10) function is ϕϕ = S s + Sη , where ϕ is given by Eq. (9).
The separation determines the causal term which can be
b22 = N 2 + 2 Ds , b3 = kσ v 2Tl , written as:


W0 ESs  m1 s 2 + m2 s + m3
  = , (18) 10
Bode Diagram

 Eϕ  + s(Tl s + 1)(Tm s + 1) 0

Magnitude (dB)
-10

m1 = d 0TmTl + d1Tl + d 2Tm , m2 = d 0 (Tm + Tl ) + d1 + d 2 , m3 = d 0 ,


-20

-30

where the coefficients d i , i = 0,3 depend on the plant and the -40

-50

load parameters 45

 1  0

Phase (deg)
jω ESs  jω +  ES s
Tm 
d0 = lim , d1 = lim 
-45
,
jω = 0 Eϕ jω =−
1 Eϕ -90
Tm 10
-4 -3
10 10
-2
10
-1
10
0
10
1
10
2

Frequency (rad/sec)
 1
 jω +  ES s (a)
T
d 2 = lim  l  . Bode Diagram

jω =−
1 Eϕ 10

Tl 0

The optimal transfer function with functional constraints is

Magnitude (dB)
-10

-20

(m1 s 2 + m2 s + m3 )(−Tw s + 1)
-30

Wopt ( s) = . (19) -40

(b0 s 3 + b1 s 2 + b2 s + b3 )(Tw s + 1) -50


45

If the transfer function of the optimal system is already 0

Phase (deg)
determined W = Wopt , the controller transfer function can be -45

obtained in accordance with Eq. (13) and can be described by -90


10
-4
10
-3
10
-2
10
-1
10
0
10
1 2
10

the following general expression Frequency (rad/sec)

(b)
p s 3 + p1 s 2 + p2 s + p3 Fig. 3. Optimal system frequency response under (a) variable load
Wc ( s) = 0 . (20) variance; (b) variable load time constant
s(Tl s + 1)(Tm s + 1)
Bode Diagram
10

In general the controller coefficients pi , i = 0,3 depend on 0


Magnitude (dB)

the variable load characteristics descibed by load variance σ v2


-10

-20

and load time constant Tl . -30

-40

-50
90

III. EXPERIMENTAL RESULTS 0


Phase (deg)

-90

The hydro turbine model is described by the transfer -180

function Eq. (4) with k = 1.25 , Tm = 12.8 s and Tw = 1.18 s . -270


10
-4
10
-3
10
-2
10
-1
10
0
10
1
10
2

Frequency (rad/sec)
The shaping filter parameters are: load time constant (a)
Tl = 30 s and coefficient k v = 1.25 . The variance fluctuation
Bode Diagram
interval is σ v2 = [0.1,1.1] and the load time constant interval is 10

0
Tl = [20, 65] s .
Magnitude (dB)

-10

The optimal transfer functions are determined in both cases: -20

without functional constraints defined by Eq. (11) and by -30

taking into account non-minimal phase plant characteristics -40


90
(Eq. 19). The experiment consists of random varying load
conditions. The idea is to present the system performance in 0
Phase (deg)

the whole operational range. Although, hydro turbine -90

generators typically work long time intervals under almost -180

constant load conditions, such sudden changes in the load -270


10
-4
10
-3
10
-2
10
-1
10
0
10
1 2
10

conditions can accrue. The frequency responses under Frequency (rad/sec)

variable load characteristics are obtained. In Figs. 3 and 4 the (b)


optimal system frequency responses under variable load Fig. 4. Optimal system frequency response with functional
variance and variable load time constant are shown. constraints under (a) variable load variance; (b) variable load time
constant
It can be noticed the optimal system frequency response
ensures a zero steady-state error in the low frequency range up
The load characteristics variation reflects on the natural
to 0.1 rad/s that corresponds to the load signal frequency
frequency in a relatively small range less than half of decade.
band.


Load variation tracking Frequency deviation
25 50.5
Bode Diagram
100
20 Load 50.4
80 System output
15
Magnitude (dB) 50.3
60
10

50.2

O u tp u t [ % ]
40 5

F re q u e n c y [ H z ]
20 0 50.1

0 -5
45 50

-10
0 49.9
Phase (deg)

-15

-45 49.8
-20

-90
-25 49.7
0 200 400 600 800 1000 1200 1400 1600 1800 0 200 400 600 800 1000 1200
Time [s] Time [s]
-135
-4 -3 -2 -1 0 1 2
10 10 10 10 10 10 10
Frequency (rad/sec) Fig. 6. Load variation tracking Fig. 7. Frequency deviation
(a)

120
Bode Diagram IV. CONCLUSION
100
The problem of random load disturbance rejection in a
Magnitude (dB)

80

60 hydro generator operation in power limited energy system is


40
formulated as an optimal controller design problem in sense of
minimum mean-square error (Wiener filter design). The
20

0
45

0
turbine speed and power controller design in case of
functional constraints is investigated. The controller structure
Phase (deg)

-45

-90
based on dynamic compensation as well as on direct design
-135

-180
with rational transfer function is determined. Simulations with
10
-4 -3
10
-2
10 10
-1

Frequency (rad/sec)
10
0
10
1
10
2
proposed algorithms are carried out in order to explore the
(b) systems performance. This approach can be applied to other
Fig. 5. Controller frequency response under (a) variable load variance control design problems describing the renewable energy
(b) variable load time constant sources (RES) operation in electric power system where the
both generated power from RES as well as the load have a
The both control algorithms use the optimal system random nature. In case of stochastic characteristics varying in
transfer function (Wiener filter) that requires a factorization of a wide range an appropriate adaptation procedure applied to
the spectral density function. The direct design with rational the controller parameters can be carried out [10].
transfer function method avoids the separation Eq. (18) that
makes easily to design the control algorithm. ACKNOWLEDGEMENT
In Table I some results from the design procedure based The authors would like to thank the Research and
on minimum mean square error method (Wiener filter design) Development Sector at the Technical University of Sofia for
are shown. It can be noticed the mean square error increases the financial support.
significantly in case of functional constraints. The controller
structure based on dynamic compensation as well as on direct REFERENCES
design with rational transfer function method is determined.
[1] A. Pervozwanski, Automatic Control Theory, Nauka, Moskva,
The both controllers have the same order and an integral term. 1996 (in Russian).
TABLE I [2] R. Gray, An Introduction to Statistical Signal Processing,
OPTIMAL TRANSFER FUNCTION Cambridge University Press, 2004.
[3] S. Doclo, A. Spriel, J. Wouters and M. Moonen, “Frequency-
Without functional constraints With functional constraints Domain Criterion for the Speed Distortion Weighted
Dv = 2 , Tl = 30 s Multichannel Wiener Filter for Robust Noise Reduction”,
Speech Communication, vol. 49, 2007, pp. 636-656.
0.72s 2 + 0.34s + 0.07 −1.70s3 + 0.84s2 + 0.42s + 0.07
Wopt ( s) = Wopt (s) = [4] T. Puleva, “Multiple Model Wiener Filter for Load Disturbance
3
s + 0.84s + 0.35s + 0.072 1.18s4 +1.99s3 +1.24s2 + 0.43s + 0.07
Rejection in Hydro Generator Local Network Operation”,
min mean-square error 0.72 10 −2 min mean-square error 3.5 10 −2 Proceedings of the Technical University of Sofia, vol. 58, Book
1, pp. 33-43, 2008.
In case without functional constraints the controller structure [5] R. Brown, P. Hwang, Introduction to Random Signal and
following the design procedures given by Eqs. (13) and (14) is: Applied Kalman Filtering, John Wiley & Sons, Inc., 1992.
[6] P. Diniz, Adaptive Filtering: Algorithms and Practical
7.37 s 3 + 15.07 s 2 + 4.74s + 0.62 Implementation, Springer, 2008.
Wc ( s ) =
s 3 + 3.04s 2 + 0.1s [7] M. Kolos, I. Kolos. Methods of Linear Optimal Filtration,
Lomonosov Moskow State University Press, 2000.
R ( s ) = 0.1s 3 + 1.13s 2 + 1.39 s , S ( s ) = 1.72 s 2 + 4.5s + 0.86 [8] K. Astrom, B. Wittenmark, Computer Controlled Systems:
T ( s ) = 4.37 s 3 + 10.81s 2 + 4.57 s + 0.86 Theory and Design, 3th edition, Prentice Hall, 1997.
The simulation results shown in Fig. 6 show a very good [9] M. Lund, Pole Placement Design, Toolbox for MATLAB.
[10] R. Horowitz, B. Li, and J.W. McCormick, “Wiener-filter-based
system performance in tracking the load signal and keeping the Minimum Variance Self-tuning Regulation”, Automatica, vol.
frequency about its nominal value in Fig. 7. 34, no. 5, pp. 531-545, 1998.


Multi-Objective LMI based Robust State-feedback Design
of a Hydro Generator Speed Controller
Andrey Yonchev1 and Teofana Puleva2
Abstract – This paper describes the dynamic behaviour of a performance specifications have to be transformed in terms of
hydro generator speed control in case of parametric uncertainty. LMIs. The efficiency of LMI method remains important due
The investigations are focused on the multi-objective LMI based to some reasons. First it is applicable to many systems without
H 2 / H ∞ state-feedback controllers design. The system restrictions on infinite or pure imaginary invariant zeros.
performance is investigated for both conventional lead lag Additionally LMI based approach is valuable and remarkable
controller and PI state space controller. A modern design due to the existence of effective convex optimization
technique based on LMI H 2 / H ∞ controller synthesis is algorithms [4] and software [5] plus the MATLAB package
considered. The simulation results obtained from the both Yalmip and SeDuMi solver.
conventional and proposed controllersare given. They show the
advantages of the designed robust control system.
II. HYDRO GENERATOR LINEARIZED MODEL
Keywords – Hydro generator, Speed control, LMI based
robust control. The linearized model of a hydro turbine dynamics in per
units form (p.u.) can be presented by the equations:
I. INTRODUCTION ΔU = 0.5ΔH + ΔG , (1)

The linearized hydro turbine generator model parameters Δ Pm = ΔH + ΔU , (2)


vary significantly with the unpredictable load variations. This
fact leads to the adaptive and robust control algorithms. They d ΔU
Tw = −ΔH , (3)
are appropriate for control systems characterized with dt
significant dynamics variation depending on real time
measured variables [1]. Malik et al. have presented a self- where Tw is the water column time constant at any load. After
tuning controller tracking the plant parameters change in order some algebraic manipulations in Eqs. (1)-(3), the transfer
to provide an optimal performance over the wide operating function between the turbine opening position and the turbine
range. The simulation study includes both fixed plant and mechanical power can be obtained:
variable plant parameters that depend on the gate position
varying from the load conditions. Jiang considers the analysis −Tw s + 1
ΔPm = ΔG , (4)
and design of a hydraulic turbine governor using optimal 0.5Tw s + 1
robust control theory [2]. The advantage of this approach is
that the designed governor will guarantee the stability and The linearized model transfer function depends on the time
performance of the speed control for the entire turbine. Recent constant Tw which can be expressed as
works of robust control application are presented in [3]. Eker
considered a single-input multi-output (SIMO) governor LU 0
Tw = , (5)
design based on nonlinear plant model and polynomial H ∞ ag H 0
optimization. The system performance based on the multi-
loop cascade robust controller in the presence of load where L is length of the penstock [m] and ag is the
disturbances is investigated in the time and frequency acceleration due to gravity [ m / s 2 ] . The water column time
domains. The robust governor ensures that the overall system
remains asymptotically stable for all norm bounded constant at rated power TW is
uncertainties and permanent system oscillations.
LQr
The goal of this paper is to derive stabilizing multi- TW = , (6)
objective H 2 / H ∞ state-feedback controllers. Stability and ag AH r

where H r and Qr are the hydraulic head and the turbine flow
1Andrey Yonchev is with the Technical University of Sofia, rate at rated power and A is the pipe area [ m 2 ] . It can be seen
Faculty of Automatics, Kliment Ohridski 8, 1000 Sofia, Bulgaria, the water column dynamics exhibits a non-stationary behavior
E-mail: ayonchev@tu-sofia.bg depending on the variable water flow at wide range load
2Teofana Puleva is with the Technical University of Sofia, Faculty
variation [6-7].
of Automatics, Kliment Ohridski 8, 1000 Sofia, Bulgaria, E-mail:
tpuleva@tu-sofia.bg

978-1-7281-7142-5/20/$31.00 ©2020 European Union 


Hydro Generator (HG) Speed and Power Control The input signal u = [uc w]T implies the control signal and
The frequency of the power system is dependent on the
the disturbance, and the output is y = [ Δω ΔG ]T . The
active power balance. The load change reflects
instantaneously as a change in the electrical torque output Te matrices in Eq. (12) have the following form:
of the generator. This causes an interaction between the  Kd 1   1
mechanical torque Tm and the electrical torque Te which − 0   0 Tm 
results in speed variation as determined by the equation of  Tm Tm   
 2 2 2  2 
motion: A= 0 − +  , B = − 0 , (13)
 Tw Tw Ts   Ts 
1 
Δω r = (ΔPm − ΔPe ) , (7) 1   1 
Tm s  0 0 −   0
 Ts   Ts 
where ΔPm and ΔPe are the mechanical and the electrical
1 0 0  0 0
power deviations from their initial values in p.u., Tm is the C=  , D= .
mechanical starting time. The frequency dependent 0 0 1  0 0
characteristic of a composite load may be expressed as To ensure the integral control action the model (12) is
extended by extra integral state:
ΔPe = ΔPL + K d Δωr , (8)
xi (t ) = Δω ref − Δω (t )
where ΔPL is a non-frequency sensitive load change, and K d
The augmented state space description is:
is a load-damping constant in the frequency sensitive load.
In accordance with the principles of the primary frequency x = Ax (t ) + Buc (t ) + ΓΔωref , (14)
control the generators operating in parallel with the electric
power system have to share the load when a sudden change in
system load occurs. This is accomplished by the governor  A 0  B1  0 
A= 1  , B =   , Γ =   , C = C 1 0 , (15)
speed-load characteristic  −C 0 0 1 
1
ΔP = − Δω , (9)  2 1
T

Rp C1 = [1 0 0] , B1 = 0 −  ,
 Ts Ts 
where R p is the speed regulation (droop factor). The T
and x =  xT xi  .
permanent droop determines the speed regulation under steady
state conditions. The transient droop compensation is given by The control signal can be expressed as:

1 + sTR u (t ) = − K c x (t ) + K i xi (t ) + u w (t ) = − Kx + u w (t ) , (16)
Wc ( s ) = , (10)
1 + ( RT / R p ) sTR
where K = [ Kc − Ki ] , Ki is the integral term gain, K c is
where TR is the reset time and RT is the temporally droop the proportional term gain and uw (t ) is the control signal term
factor. For stable operation the optimal values of the which is used to compensate the load change. To obtain the PI
controller parameters are given by [6-7]. The block diagram of state space controller parameter K the LQR or pole placement
the conventional turbine governor is shown in Fig. 1. design technique can be used.
Tw
RT = [2.3 − (Tw − 1)0.15]
, TR = [5 − (Tw − 1)0.5]Tw . (11)
Tm III. POLYTOPIC MODEL OF A HYDRO GENERATOR
The state space description of the linearized hydro
generator model is The considered hydro-generator system can be described
using the following polytopic model:
x (t ) = Ax(t ) + Bu(t )
, (12) x = A(t ) x + B1 (t ) w + B2 (t )u
y(t ) = Cx(t )
z∞ = C1 (t ) x + D11 (t ) w + D12 (t )u , (17)
here x = [ Δω ΔPm ΔG ]T is the state vector (see Fig.1). z2 = C2 (t ) x + D22 (t )u
where the state-space matrices range in a polytope is
1
Rp
 A(t ) B1 (t ) B2 (t )    Ak B1k B2 k  
 C (t ) D (t ) D (t )  ∈ Co :   C D11k

D12 k   ,
Δωr  1 11 12    1k
1 − sTw 1
 C (18)
D22 k  
Load Ref 1
Ts s + 1
Wc ( s )
1 + 0.5Tws Tm s + D C2 (t ) 0 D22 (t )   2k 0
Turbine ΔPL Rotor k = 1, K
Governor
Fig. 1. Block diagram of hydro turbine governor system

and with w is denoted the disturbance signal. Such polytopic IV. MULTI-OBJECTIVE LMI BASED ROBUST
models can be used to describe plants with uncertain and/or STATE-FEEDBACK DESIGN
time-varying parameters [8]. The system matrix

 A(t ) B1 (t ) B2 (t )  In this paper we will perform multi-model H 2 / H ∞ state-


S (t ) =  C1 (t ) D11 (t ) D12 (t )  feedback design with pole placement constraints using the
LMI technique. We consider the situation that the state vector
C2 (t ) 0 D22 (t ) 
can be measured. Let T∞ ( s ) and T2 ( s ) be the closed-loop
varies within a fixed polytope of matrices, transfer functions from w to z∞ and z 2 , respectively. We aim
to design a state-feedback law u = Kx in order to
 k k

S (t ) ∈ Co {S1 ,  , S k } :=   α i Si : α i ≥ 0,  α i = 1 , (19) • keep the H ∞ norm of T∞ under a given value γ 0 > 0 ;
 i =1 i =1 
• keep the H 2 norm of T2 (LQG) under a given value
where S1 , , Sk are called vertex systems: ν 0 > 0 [9].
In order to perform multi-model H 2 / H ∞ state-feedback
 A1 B11 B21   Ak B1k B2 k 
design with pole placement constraints using the LMI
S1 (t ) =  C11 D111 D121  , Sk =  C1k
 D11k D12 k  . (20) technique we seek an unique quadratic Lyapunov function
C21 0 D221  C2 k 0 D22 k  X = X 2 = X ∞ that makes the desired control objectives in the
polytope and the presented LMI system has to be solved [10].
Taking all the above in mind, S (t ) represents a convex Minimize αγ 2 + β Trace(Q ) over Y, X, Q and γ 2 subject to
combination of system matrices S1 , , Sk . The
the
nonnegative elements 1 , , ak are denoted as polytopic
a  Ak X + XAkT + B2 k Y + Y T B2Tk B1k XC1Tk + YD12T k 
 
coordinates of S. For the hydro-generator system described by  B1Tk −I D11T k  < 0 , (21)
Eqs. (12)-(13), we have the following four vertex systems:  C1k X + D12 k Y D11k −γ I 2 
 
 − K d / Tml 1 / Tml 0   0 1 / Tml 
A1 =  0 −2 / Twl 2 / Twl + 2 / Ts  , B1 =  −2 / Ts 0   Q C2 k X + D22 k Y 
 XC T + YDT X >0
 0 0 −1 / Ts   1 / Ts 0   2k 22 k 
Trace(Q) < ν 02 .
 − K d / Tml 1 / Tml 0   0 1 / Tml 
γ <γ
2 2
A2 =  0 −2 / Twu 2 / Twu + 2 / Ts  , B2 =  −2 / Ts
 0  0

 0 0 −1 / Ts   1 / Ts 0  Denote the best solution by ( X * , Y * , Q * , γ * ) , the obtained


state-feedback gain is expressed by K * = Y * ( X * ) −1 . This gain
 − K d / Tmu 1 / Tmu 0   0 1 / Tmu  satisfies the worst case quality specification.

A3 =  0 −2 / Twl  
2 / Twl + 2 / Ts  , B3 =  −2 / Ts 0  T∞ ( s ) ∞
≤γ* T2 ( s ) 2 ≤ Trace(Q* ) .
 0 0 −1 / Ts   1 / Ts 0 

 − K d / Tmu 1 / Tmu 0   0 1 / Tmu  V. SIMULATION RESULTS


A4 =  0 −2 / Twu  
2 / Twu + 2 / Ts  , B4 =  −2 / Ts 0 
   1 / Ts
The control system performance is investigated by
0 0 −1 / Ts 0 
comparing the control system based on the conventional
controller described by (10), state space PI controller (14)-
1 0 0  0 0
C=  , D= , (15) with the designed system based on the investigated multi-
 0 0 1 0 0 objective LMI based robust controller. The following plant
where the hydro generator rotor time constant Tm and the parameters are assumed: servo system time constant
water column time constant Tw take values in the interval: Ts = 0.4 S; water column time constant Tw = 3 S; rotor time
11 ≤ Tm ≤ 13 , 2 ≤ Tw ≤ 4.5 , K d = 1 and the servo system time constant Tm = 12 S, load-damping constant K d = 1 ; speed-
constant is Ts = 0.4 s .The notation Tl and Tu refers the lower power droop factor R p = 0.04 . A conventional lead-lag
and the upper bound of the interval for corresponding time controller in accordance with Eqs. (10)-(11) is designed. In
constants. Fig. 2 the turbine generator speed under variable water
We use Robust Control Toolbox of Matlab® to define the column time constant in the range of [2, 4.5] is shown. It can
polytopic model (17) of the hydro generator system and to be seen the overshoot increases significantly. The load
perform the multi-objective robust state-feedback design. disturbance of 20% in t=100 s involves an overshoot increase
from 3.9% to 7.8% when the water column time constant
increases from the nominal value of 3s to 4.5s.


A state-space controller augmented with an integral state is robust H ∞ LMI based controller ensures H ∞ performance
explored. The matrices of the performance index are: γ=7.99e-004. The simulation results obtained with H 2 LMI
 I4 O(4,1)  based controller are similar to those determined by the H ∞
Q= , R = 10
O(4,1) 10  controller.

The integral gain and the state space controller are: VI. CONCLUSION
Ki = 1, K p = [ 6.25 0.45 1.23] .
The simulation results obtained with H 2 LMI based This paper considered the dynamic behaviour of a hydro
generator speed control in presence of parametric uncertainty.
controller are similar to those determined by the H ∞ The polytopic model with two parameters was obtained. The
controller. investigations were focused on the multi-objective LMI based
Turbine - Generator speed [p.u.] H 2 / H ∞ state-feedback controllers design. The system
2

Tw=2
performance was investigated for both conventional lead-lag
1.5
Tw=2.5
Tw=3
Tw=3.5
controller and PI state space controller. The time domain
Tw=4
Tw=4.5 specifications of these systems are very sensitive to the
1 parametric uncertainty. A modern design technique based on
LMI H 2 / H ∞ controller design was considered. The results
0.5

based on simulation for the two conventional and proposed


0
controllers were presented. They point the efficiency of the
designed robust control system. Using this approach the time
-0.5
0 20 40 60 80 100 120 140 160 180 200
domain specifications satisfy the technological requirements
of the hydro generator speed control.
Time [s]

Fig. 2. System response with conventional controller and variable


water column time constant
1.4
Turbine generator speed [p.u.] ACKNOWLEDGEMENT
1.2

1 The authors would like to thank the Research and


0.8 Development Sector at the Technical University of Sofia for
0.6
Tw=2 s the financial support.
0.4 Tw=2.5 s
Tw=3 s

REFERENCES
0.2 Tw=3.5 s
Tw=4 s
0 Tw=4.5 s

-0.2

-0.4
[1] O. Malik, Y. Zeng, “Design of a Robust Adaptive Controller for
0 20 40 60 80 100
Time [s]
120 140 160 180 200
a Water Turbine Governing System”, IEEE Trans. on EC, vol.
Fig. 3. System response with state space PI controller and variable 10, no. 2, pp. 354-359, 1995.
water column time constant [2] J. Jiang, “Design an Optimal Robust Governor for Hydraulic
Turbine Generating Units”, IEEE Trans. on EC, vol. 10, no. 1,
In Fig. 4 we show a set of time responses of the four pp. 188-194, 1995.
polytopic systems with the H ∞ LMI based robust optimal [3] I. Eker, “Governors for Hydro Turbine Speed Control in Power
Generation: a SIMO Robust Design Approach”, Energy
controller. The time domain specifications satisfy the Conversion and Management, vol. 45, Issues 13-14, pp. 2207-
technological requirements of the HG speed control. 2221, 2004.
1.5
Polytopic systems - time responses
[4] Y. Nestorov, P. Gahinet, Interior-Point Polynomial Algorithms
in Convex Programming, SIAM, Philadelphia, PA, 1994.
1 [5] P. Gahinet, A. Nemirovski, A. Laub, and M. Chilali, LMI
states 3 Control Toolbox for Use with MATLAB, The MathWorks, Inc.,
0.5 states 2
2000.
states 1
[6] IEEE Working Group, “Hydraulic Turbine and Turbine Control
0
Models for System Dynamic Studies”, Transactions on Power
System, vol. 7, no. 1, pp. 167-179, 1992.
-0.5
[7] P. Kundur, Power System Stability and Control, McGraw-Hill,
-1
Inc., 1994.
[8] S. Boyd, L. El Ghaoui, E. Feron, and V. Balakrishnan, Linear
-1.5 Matrix Inequalities in Systems and Control Theory, SIAM
0 10 20 30 40 50 60 70 80 90
time [s] books, Philadelphia, 1994.
[9] P. Khargonekar, M. A. Rotea, “Mixed H2/H∞ Control: a Convex
Fig. 4. All polytopic systems responses with H ∞ controller
Approach”, IEEE Trans. on AC, 39, pp. 824-837, 1991.
Note that the polytopic systems have two parameters, which [10] A. Yonchev, M. Konstantinov, and P. Petkov, Linear Matrix
vary in the considered intervals. The corresponding time Inequalities in Control Theory, Demetra, Sofia, 2005, (in
responses vary in a relatively small range in comparison to the Bulgarian).
corresponding responses shown in Figs. 2 and 3. The designed


Impact of Microclimate Changes and Noise to Workers as
a part of an Implemented Health and Safety System
Ivo Kuzmanov1 and Roberto Pasic2
Abstract – Impact of microclimate changes to workers has But first of all some small things about the entity – it’s a
always been a special health and safety issue to each business production company with several capacities (work stations) in
entity who obligatory fulfil the national laws regarding health different parts of Republic North Macedonia, and considering
and safety. Especially if the microclimate changes are related to the year fluctuation of workers, with more than 100 up to 300
worker circulations among processes where they have to do
business activities in cold and hot chambers as a part of a daily
employees. The focus during the first contact with the
routine several times a day. On the other hand if the daily company was on several key problems regarding health and
routine has production activities in a room where the noise is a safety issues on different micro locations and different spots
special problem as well then we have a special situation. These into the capacities. But one of the main problems was the
two main concerns are “must do” problems to solve by health and safety issue regarding the workers which during
themselves, but combined with a situation where some accidents day activities had the mentioned problems – transition from
happened, we certainly have a situation to show and to deal with. cold to hot rooms and vice versa.
This paper presents only a small part from the research (real From all of the presented problems by the company, the one
activity in real business entity) and some of the equipment and presented here is the most interesting because starts with one
measures (especially made for the purpose) used to deal with the
problem – circulation from cold to hot chambers and then to
same one.
normal work conditions several times a day (even in one stage
Keywords – Health and Safety, Production system, in every 15 minutes).
Measurement, Negative impact to workers, Noise. This problem during the process of observation evolved
with multiple problems regarding health and safety. At first
the real problem was the circulation of workers who were
I. INTRODUCTION exposed to so called ‘temperature shocks’ from -3°C or in
some cases even -5°C to normal conditions (19 - 23°C) and
The paper presents only a part from an extensive research, then to extremely hot conditions where temperatures were
as still ongoing applicative activity, with several key activities even +45°C. Also one of the problems was the circulation
such as: creating a measurement unit (specially made and directly from hot to cold or otherwise several times during the
even improved one) [1-8] as one of the equipments used daily period of work 8 and even more working hours per day.
during the processes, measurements on different parameters This problem occurred and concerned 8-12 people at any
(temperature, humidity, noise) into production capacity in time, or in some cases 15-25 people during shifts. Other thing
Republic North Macedonia, but also dealing with the occurred that was a real concern was the HTZ equipment (HTZ is a
problems one by one in short notice and finally continuous short notice used in Macedonia, given for health and safety
monitoring on defined measurement spots. In addition to equipment) given to the workers and the conditions that they
results published in [9], in this research we are presenting only work in – wet floors, wet surfaces, lot of equipment into the
the situation at first – specially created unit and some of the room and finally lot and lot of electricity wires (although all
additional measurements regarding temperature and humidity of them were in a good condition, even some of them brand
[9], and we are focusing on some problems which occurred new instalation).
during the process. Also we are presenting some of the At that stage, that was the starting point why we created
solutions made which are in a stage of so called real also a portable unit (2 units) presented in detail in the previous
applicative testing mode or approved mode (used on a daily publication [9], so we could conduct multiple measurements
base) into the business entity previously mentioned. Also, we in several occasions and even during the hole day. As starting
are presenting some additional problems on the spot which point even we conducted a real calibration with equipment
occurred during the processes of dealing with the first defined which is quite expensive, so we could get precise
problem. measurement data from a portable unit. That was the maybe
the only way to get a real picture during various
measurements in multiple days (even is some cases 8 hours
per day), about what is happening and things could be seen
1Ivo Kuzmanov is with the Faculty of Technical Science at the
from a different angle.
University St. Kliment Ohridski Bitola - UKLO, Bitola 7000, But during the processes and monitoring of the whole thing,
Republic Noрth Macedonia, e-mail: ivo.kuzmanov@tfb.uklo.edu.mk other problems occurred: noise at one of the spots with a daily
2Roberto Pasic is with the Faculty of Technical Science at the
activity with 4-8 people at spot (with circulation into hot and
University Kliment Ohridski Bitola - UKLO, Bitola 7000, Republic
cold chambers of the same ones), and a thing that was not said
North Macedonia
at first (documents were there) – previous injuries and

978-1-7281-7142-5/20/$31.00 ©2020 IEEE 


multiple and common illnesses. Especially injuries and the TABLE I
noise (86-89 dB) was a new thing at that stage, even for the PRESENTING SMALL PART FROM A 60 MINUTE MEASUREMENT
company. And finally the paper presents only a small part IN ONE DAY

from the processes of monitoring, processes of creating Temperature (°C) Humidity (%RH)
solutions on spot (by fulfilling legal obligations) and finally 1 17.2 47
the process of monitoring the created solutions in practice and
2 16.3 51.2
setting them as a daily routine (must do thing).
3 16.7 51.3
4 23.1 56.3
II. THE MEASUREMENT UNIT AND THE RESULTS 5 25.7 57.8
6 10.0 61.1
The measurement unit used as a portable one was in-house 7 6.9 70.1
created [1-8] and tested in various different cases. We are 8 3.2 67.8
using 8 additional pieces of the same one – not only here, but 9 1.8 48.5
also in different locations. During the processes of comparison 10 -2.0 54.7
to other equipment we have concluded that the measurement 11 -2.1 57.7
unit brought us real and secure results. 12 -2.8 68.0
The same one during the process of creation till now, was 13 7.8 51.8
compared to several other equipments (more than 7 14 9.5 51.2
producers) even in real measurements on spot and gave us 15 13.5 51.6
results with a slight variation (in some cases ±0.1 to 16 28.7 52.3
maximum variation of ±0.2).The equipment is in detail 17 34.5 50.8
presented into [9], using previous knowledge from [1-8], and
18 36.9 47.8
real knowledge, but here inside of the same one given in Figs.
19 41.3 46.7
1 and 2 is presented. Additionally, the measurements
20 16.7 51.8
(temperature and humidity) from the same one – measured in
different time and data relative to [9] – are given in Table I.
The data presented into Table I, are in one day in a time
frame since 9.05 till 10.00 o’clock by local time. At this stage
we only get a segment from the whole picture in what kind of
conditions workers do their everyday routine activities. That
day, the outside measurements (as key factor for comparison)
during the processes of inside measurements were 10.1 till
15.3 Celsius degrees and humidity of 40.7% at the starting
point at 9.00 o’clock. That was a starting point which brought
us to another problem at that stage. The problem was that in
Republic North Macedonia although there is a health and
safety law and multiple regulations regarding the same one,
there are only some recommendations considering the
temperatures and humidity (not obligatory - only
recommendations). And considering all of the
Fig.1.Sensor node structure – Arduino NANO recommendations, they brought us to data about the
temperature in work conditions for winter from 18 to 21
Celsius degree and for summer from 22 till 25 Celsius
degrees, once more as a recommendation.
At this stage, we have workers in hot and cold chambers
with variations of temperatures. So considering the data and
the regulations, we started a survey and considering the facts
available on web, we found several information’s regarding
this thing from Balkan countries and some even from EU, but
the most real ones were the Slovenian regulations and the
Serbian ones [10-11].
According to the same ones, the Serbian regulations and the
Slovenian ones, regarding preventive measures for health and
safe work were quite good ones and quite similar. During the
process of research we found tabulated results into the spot
6.4 from the Serbian regulations [11] that were one of our
leads in which way should we go. That was a good lead
because the given results show even the outside temperature
Fig. 2. Temperature and humiditysensor – inside the box and the defined way of working. Regarding the outside


conditions (about + 15 Celsius degrees) the humidity using FMEA). And FMEA is abbreviation for Failure Mode
maximum value should be 75 (we were even better) and the Effects Analysis.
temperature at maximum + 28 Celsius degrees. It’s quite important to notice that the Macedonian
Another thing which was interesting was the situation that regulations [12] regarding noise – defined in special
we used quite a large period of time reconsidering and re- regulation, defines the low and upper limits of noise which are
reading the Macedonian law and regulations and we found from 80 – 87 dB. Considering this fact we had a situation with
that the work conditions should not harm or in any case the spots really on upper limit or even more, and a different
influence the workers (still not regulated the temperatures or problem to solve. Finally, we are still solving problems in the
humidity with numbers). During this process we had also process that occurs. Also, the handy transportation of weight
some communication with health and safety inspectors as is a problem which has to be solved.
well.
Seeing the real situation and being on spot, as previously
said that this is only a part of extensive research we found two
III. THE SOLUTIONS AND FUTURE STEPS
other problems. The first one, were the documents about
previous injuries (business entity secret – so this will not be a Seeing the previous presented, some steps were made and
thing to mention into this or other papers) and illness (colds, some still are in a move so we could get a better environment
frequent flues, sneezing as a frequent thing among workers on for the workers. Several conducted activities made it possible
spot etc.). But the second one considering previous to create better conditions for workers. First regarding the
measurement and actions to deal with the problem situation with the HTZ equipment – although there was quite
(temperature shocks) was a real surprise. It was the noise in a a good one when we came the same one was not appropriate
room where most of the time spends several workers at any for the situation. So dealing whit the fact that there were some
time of the day. It even seems weird because it was spotted comes and goes from workers to hot or cold chambers, first of
after some inventory change and maintainer activities. This all we solve the thing by using a line in which most of the
was unexpected because all of the activities were done to products are transported not by human hand. But for the
reduce even more the noise and to create a better production processes where we have to have a human hand we created a
process. We got the same notice from the workers as well – cycle activity in which each worker is on spot only using the
the noise was larger since the new equipment was installed cold chamber but no more than 15 minutes a day with a
and since preventive maintain activities on the actual special HTZ equipment for cold conditions on it. Hot
equipment were done. chambers are not used by humans at this stage – the transport
Having in mind the previously mentioned things, a series of is on track. This is specially solved also by the real focus from
measurements of the noise were conducted using Testo the management. So, as previously said the HTZ equipment
equipment (quite professional one) in order to get a better (updated version of the same one with some significant
overview of the main problem that occurred. efficiency to health and safety but also with some financial
Table II presents only a small part of the measurements in a savings for the company) now is only appropriate for the
room of 200 meters with more than 15 machines inside. But, room where the noise was in some parts. The situation with
we focus on only 5 of them. the noise is also a thing that is solved with some changes but it
will be presented in the future work. Now, we are only dealing
TABLE II with a new thing in two spots where a hand weight is
PRESENTING SMALL PART FROM NOISE MEASUREMENTS transported, but on small distances. We would like to solve it
NOISE (dB) as well.
1 80 Further, Table III presents the momentarily measured
2 79.9 values of the noise, from which one could get a real picture
what happened. The problem solution will be presented in
3 86.8
some other publication.
4 87.1
5 89.0 TABLE III
6 88.7 PRESENTING SMALL PART FROM NOISE MEASUREMENTS AT THE
7 78 MOMENT ON THE SAME SPOTS AS PREVIOUS
8 78.1
9 76.7 NOISE (dB)
10 76.5 1 73.2
2 73.1
Table II presents 10 measurements on 5 different spots, 3 78.8
taking the principle 2 measurements on spot. Especially 4 78.7
surprising where the data conducted regarding spot 2 5 83.8
(measurements 3 and 4) and 3 (measurements 5 and 6) which 6 83.8
had some different measurement data after some changes to 7 77.9
the equipment and after maintainer activities. That was maybe 8 78.0
the bigger surprise, but that will be discussed in the future 9 76.4
work (we had conducted a whole monitoring what happened 10 76.5


IV. CONCLUSION REFERENCES

Finally, we could conclude that this paper presents not only [1] M. McRoberts, Beginning Arduino, Technology in Action,
previously created measurement unit, shown in detail in [9] APress.
and based on Arduino NANO MCU, but also whole problem [2] C. Amariei, Arduino Development Cookbook, Packt Publishing,
on spot in a real business entity. The same one presents the 2015.
[3] S. Hussain, N. Schofield, and A.W. Matin, “Design of a Web-
starting point – daily routine in humidity and hot and cold based Application for Wireless Sensor Networks”, The 17th
chambers, but also the process of monitoring in which several International Workshop on Database and Expert Systems
new problems occurred. Occurred problems as new ones were Applications, pp. 319-326, 2006.
the noise after the maintainer activity and the new equipment [4] Arduino Nano, https://store.arduino.cc/arduino-nano.
installed which brought us to additional measurements and [5] Sensirion SHT71,
additional activities, and also the illnesses and injuries which [6] https://www.sensirion.com/en/environmental-sensors/humidity-
were a part of that process as well. So from one problem we sensors/pintype-digital-humidity-sensors/
got several different ones. Some of the activities and [7] MicroSD Card Spec.
measurements done are presented into the paper. The https://www.sdcard.org/developers/overview/index.html
[8] S. M. Ferdoush, A Low-cost Wireless Sensor Network System
important thing to mention is that the created unit is used in using Raspberry Pi and Arduino for Environmental Monitoring
more than 8 different spots at this stage, even in different Applications, Master of Science Thesis, University of North
business entity at the moment so we could get a real data, but Texas, 2014.
we are also considering to improve the same one with adding [9] Ivo Kuzmanov, Roberto Pasic, “Real Impact of the Microclima
a noise sensor to the same one (small one – we are in a search Changes to Workers who Circulate from Hot to Cold Chambers
for appropriate and good one at the moment). – A Part from an Extensive Research into Industrial Entity”,
Finally seeing the data aimed and the amount of the same TEMEL International Journal, vol. 3, issue 2, pp. 1-5, December
ones at this stage we could say that some future publications 2019.
will be made as well. [10] https://www.informiran.si/portal.aspx?content=temperatura-na-
delovnem-mestu&showMenu=1&showRightFrame=1
At the end we are also considering to create a sensor node [11] https://www.paragraf.rs/propisi/pravilnik_o_preventivnim_mera
with web based application for online collection of data in real ma_za_bezbedan_i_zdrav_rad_na_radnom_mestu.html
time as soon as we solve the ad – in to the measurement units [12] http://www.mtsp.gov.mk/WBStorage/Files/pravilnik_bucava.
with a noise sensor, but with some financial support from pdf
sponsors.


Hardware Implementation and Comparison of CRA and
TRA when Trying to Recover the AES-128 Key
Ivaylo Vladimirov1, Desislava Nikolova2 and Zornica Terneva3
Abstract – In this scientific paper, a comparison of two side- network, and is efficient in both software and hardware
channel radio attacks is made: CRA – Correlation Radio Attack implementations. The key size used for an AES cipher
and TRA – Template Radio Attack. Both attacks are tested on specifies the number of transformation rounds that convert the
mixed-signal chips that include both the radio transceiver and input, called the plain-text, into the final output, called the
the digital logic on the same integrated circuit. In systems like
this, the analog transmitter unintentionally leaks sensitive data,
cipher-text. The numbers of rounds are as follows: 10 rounds
related to the cryptographic hardware components and the for 128-bit keys; 12 rounds for 192-bit keys; 14 rounds for
software being run on the CPU, by broadcasting it on a shifted 256-bit keys [4].
frequency. The basic conception is that information from the The two types of side-channel power analysis techniques
electromagnetic leakage is gathered and then exploited by utilized in the completion of a full key recovery attack against
analyzing it via the side-channel attacks in order to crack the AES-128 compared in this paper are:
AES-128 algorithm. The system needed for the experiment The Correlation Radio Attack (CRA) is a model based
consists of: a PCA10040 chip by Nordic Semiconductor, an analysis. It is generally assumed that the data leakage through
USRP n210 by СР-Ettus Research and a Linux-based computer. the power side-channel depends on the energy required to flip
Keywords – Side-channel attacks – Correlation Radio Attack,
the bits from one state to the next at a given time. When used
Template Radio Attack, AES-128, Bluethooth, PCA10040, in combination with the Hamming weight model it can be
USRP. applied to provide a probability value for the likelihood of a
given AES-128 sub-key to be the one used in the encryption
[5].
I. INTRODUCTION The Template Radio Attack (TRA) exploits the power
consumption measured during the operation, expressed as a
The mixed-signal chips, also known as Radio Frequency discrete function of time to reconstruct the sequence of
Integrated Circuits (RFICs), have become increasingly operations during the secret computation and derive
popular thanks to the drive for ever smaller and cheaper information about the AES-128 key. It proceeds in two
components in microelectronics. They are used in the phases: training (Consisting in measuring the electrical
construction of widespread wireless communication systems, activity of a clone system during numerous encipherments and
such as mobile phone, tablet, Bluetooth, Wi-Fi and IoT creating “templates” based on the collected information called
devices. Structurally their analog and digital circuitry reside “traces”) and attacking (Consisting of collecting a few traces
on the same piece of a die. This physical proximity naturally and matching them with the existent templates) [6].
leads to noise issues and novel side-channel attacks that can
break the implemented cryptography algorithm [1-2].
The BLE Bluetooth protocol is a wireless standard used for II. CONCEPT
exchanging data between different devices over short
distances using radio waves in the 2.4 GHz to 2.48 GHz band. The key observation of this research is to make a
It is used in a combination with AES-128 in these kinds of comparison between and implement in hardware the two
circuits for secured package based device-to-device power analysis techniques. They are based on the idea that
communication [3]. noise coupling propagates sensitive information from the
The Advanced Encryption Standard (AES) is a digital domain to the radio transmission chain, which
specification for the encryption of electronic data. It is based broadcasts it at a much larger distance than normal EM leaks
on a design principle known as a substitution–permutation [1].

1Ivaylo Vladimirov is with the Faculty of Telecommunications at

Technical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000,


Bulgaria, E-mail: ivaylo.h.vladimirov@gmail.com
2Desislava Nikolova is with the Faculty of Telecommunications at

Technical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000,


Bulgaria, E-mail: desislava.v.nikolova@gmail.com
3Zornitza Terneva is with the Faculty of Telecommunications at

Technical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000,


Bulgaria, E-mail: z.terneva@abv.bg Fig. 1. Steps that lead to the radio transmission of the leak

978-1-7281-7142-5/20/$31.00 ©2020 European Union 


Information related to the digital processor’s activity leaks After the performance of an attack a table containing the
into other parts of the chip. Components of that leak are likely numerical results is displayed in the Linux terminal window,
to reach the transmisive analog portion, in particular the radio an example result can be seen in Fig. 3. The first two lines
transmission chain. They contain frequencies in the range of show the bytes of the best guess and of the known key. The
the radio’s baseband signal. The leaked information then PGE is the Partial Guessing Entropy - the "distance" of the
couples with the baseband signal via the mixer, amplifier or best guess from the known byte (0 when the guess is correct).
the Voltage Controlled Oscillator (VCO) that is part of the At the end the number of correct bytes is shown.
carrier-frequency synthesizer. In any of the cases the result is
unintended amplitude/frequency modulation of the carrier [7].
The capacitive coupling with the VCO leads to an
amplitude modulation of its output signal. Then the
parasitically modulated carrier is amplified by the power
amplifier and radiated by the analog antenna over a potentially
very long distance. These steps also shown in Fig. 1 are as Fig. 3. The terminal window results after performing an attack
follows: the generation of digital noise, its frequency
characteristics, its propagation into other parts of the circuit, IV. COMPARISON AND CONCLUSION
and finally its emanation via the radio [8].
This leakage used and described in this scientific paper is
III. EXPERIMENTAL SETUP AND EXECUTION not due to the design error of an individual vendor, but to a
fundamental difficulty in designing mixed-signal chips.
The general setup idea is that one side (See Fig. 2 B-left When making a comparison between the two attacks we
side) there is a computer controlling the RFI circuit, which can see that the CRA is a simpler technique needing less
repeatedly transmits data via Bluetooth BLE using the same preparation but using more traces collected at the moment to
AES-128 key, on the other (See Fig. 2 B-right side) there is return a better result. Its computational speed is fairly good
another system, functioning as a software defined radio depending on the power of the computer and the number of
(SDR), tuned at the specific frequency of the leak. The SDR traces provided (the lesser traces the fasted the attack, but also
system consists of a USRP device and a PC connected via an the lower the chance for a full recovery of the key). It also
Ethernet cable and stores the traces, used for the performance uses all given traces before making a decision on which is the
of the two power analysis, on the hard drive of the computer. best guess for a certain sub-key, which additionally slows the
Fig. 2 shows both the preliminary idea and the realized setup. attack. The full execution took about 11 minutes.
In comparison, the TRA’s algorithm is more complex and
needs more computation power. It requires a lot of preparation
– a copy of the system that will be attacked and its excessive
pre evaluation. Its computational speed is very fast and makes
a decision on which is the best guessed sub-key after a certain
value for the probability is reached. The full execution took
about 1 minute and 30 seconds, which is 10 times faster and
needed a only a little over 100 traces to recover the full key,
which is 30 times the traces less than collected.

ACKNOWLEDGEMENT
Fig. 2. The experimental setup: A) The physically realized one,
B) The preliminary scheme The research described in this paper is partially realized
within the Erasmus+ mobility program with the help of the
In order to use the template attack the attacker needs to professors at SUPELEC University in Rennes, France.
have a copy of the whole system, which is needed for the The implementation of the codes for the two side-channel
creation of the templates used for its execution. This step may power analysis techniques used in this paper are described in a
take days even weeks, because for generation of one high scientific document: “Software implementation of CRA and
quality template a 20 to 30 thousand traces need to be TRA to recover the AES-128 key using side-channel signals
collected. This is equivalent to two to three hours of with Python3” [9] that will also be presented at the ICEST
collection. 2020 conference.
After a good set of templates is acquired, the experiment
continues with a real time key recovery. First we collect about REFERENCES
3000 traces (about 12 minutes) using the setup shown in
Fig. 2. Then using only PC containing all required software [1] G. Camurati, S. Poeplau, M. Muench, T. Hayes, and A.
the two attack techniques are run. An example and full Francillon, “Screaming Channels: When Electromagnetic Side
description of the attacks and how they run can be found in Channels Meet Radio Transceivers”, CCS'18: Proceedings of
[9]. the 2018 ACM SIGSAC Conference on Computer and
Communications Security, January 2018, pp. 163-177.


[2] A. Afzali-Kusha, M. Nagata, N. K. Verghese, and D. J. Allstot, [6] M. A. El Aabid, S. Guilley, and P. Hoogvorst, “Template
”Substrate Noise Coupling in SoC Design: Modeling, Attacks with a Power Model“, 2007.
Avoidance, and Validation“, Proceedings of the IEEE, vol. 94, [7] S. Bronckers, G. Van der Plas, G. Vandersteen, and Y. Rolain,
no. 12, pp. 2109-2138, Dec. 2006. Substrate Noise Coupling in Analog/RF Circuits, 2009.
[3] I. Hibbert, "Bluetooth.4 - Bluetooth Protocol Family", Itronix [8] H. Li, A. T. Markettos, and S. Moore, “Security Evaluation
Inc, 2006. Against Electromagnetic Analysis at Design Time”, Tenth IEEE
[4] D. J. Bernstein, “Cache-Timing Attacks on AES”, Report, 2005. International High-Level Design Validation and Test Workshop,
[5] V. K. Rai, B. V. Reddy, S. Tripathy, and J. Mathew, Napa Valley, CA, 2005, pp. 211-218.
“Correlation Power Analysis and Effective Defense Approach [9] D. Nikolova, I. Vladimirov, and Z. Terneva, “Software
on Light Encryption Device Block Cipher”, Security and Implementation of CRA and TRA to Recover the AES-128 Key
Privacy, vol. 2, no. 5, September/October 2019. Using Side-Channel Signals with Python3”, ICEST 2020.


Software Implementation of CRA and TRA to
Recover the AES-128 Key using
Side-Channel Signals with Python3
Desislava Nikolova1, Ivaylo Vladimirov2 and Zornica Terneva3
Abstract – In this scientific paper is presented a software In this paper we are presenting a few python libraries,
implementation of two side-channel radio attacks: CRA – which are going to be used in the software implementation.
Correlation Radio Attack and TRA – Template Radio Attack. The name of the package click comes from Command Line
The main goal is to recover the AES-128 key from an unknown Interface Creation Kit. It gives the opportunity the command
system. Both attacks are developed in Python3 using a Linux-
line interfaces to be written with as little code as possible in
based computer. The algorithm uses Probability Density
Functions and the Hamming-weight model. The results are order to function correctly.
calculated by the Partial Guessing Entropy. The software is run Numpy, usually referred as np is the most common library
on the CPU. for dealing with arrays and computing them fast in python.
Pyplot from matplotlib is used mainly for visualization of the
Keywords – Side-channel attacks – Correlation Radio Attack, results. The package os in this approach is used only for
Template Radio Attack, AES-128, Python3, Hamming-weight finding the correct path and managing the files in the
model, Partial Guessing Entropy. directory.

I. INTRODUCTION

Every type of system has sound, heat, light or other


electromagnetic radiation while operating. They can be
correlated with what is happening inside the system. These
physical sources can be used as side channels if they leak out
information (Fig. 1). Side channel attacks are used to derive
the key of a cryptosystem and use its weakness in the physical
implementation [1].
In this paper, we are going to analyze two types of attacks -
TRA and CRA. Template radio analysis relies on a
multivariate model of the side-channel traces. Here we present
a practical and efficient implementation. CRA correlation
radio analysis is used to identify the parameters of the leakage
model. Fig. 1. Steps that lead to the radio transmission of the leak
All systems used in these experiments are using AES-128
(Advanced Encryption Standard). AES is a specification for The function multivariate_normal from scipy.stats is used
the encryption of different electronic systems and its data. for the normalization process in CRA. Pickle implements
One of the leading programming languages in data science binary protocols for serializing and de-serializing a structure
is Python. Although it might be a little bit slow, it gives a lot just like our configuration. The library itertools is used
of solutions to the most common problems. The best because it implements a number of iterator building blocks
advantage of the language is the wide variety of libraries and similar to Haskell. And finally binascii contains methods to
already developed tools in it. convert from binary to various ASCII-encoded binary
representations.

1Desislava
II. MATH MODEL OF THE ATTACKS
Nikolova is with the Faculty of Telecommunications at
Technical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000,
A. Correlation Radio Attack (CRA)
Bulgaria. E-mail: desislava.v.nikolova@gmail.com
2Ivaylo Vladimirov is with the Faculty of Telecommunications at

Technical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000, The first step of the CRA is to generate an intermediate
Bulgaria, E-mail: ivaylo.h.vladimirov@gmail.com value during the cryptographic operation, encryption or
3Zornitza Terneva is with the Faculty of Telecommunications at decryption. The selection function must be chosen. This is a
Technical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000, function of a variable data value and part of the key. In the
Bulgaria. E-mail: z.terneva@abv.bg equation below I is the intermediate value. The variable data

978-1-7281-7142-5/20/$31.00 ©2020 European Union 


sample which is generally plain text or cipher text is d and k is | | | |
parameters: , - the average value of the signal, noise
a part of the key which will be called the subkey from this
distribution also known as the covariance matrix of noise.
point on [2]:
They are calculated using statistical formulas (4), (5) and (6)
on all collected data for a given key. The final equation is (7).
I = f(d, k) (1)
| |
μ = ∑ χ (t) (4)
Then measurements must be done while the device is doing | |
the cryptographic operation. χ (t) − μ
In addition, the intermediate values for each of the used Θ i, : = ⋮ ⋮ ⋮ (5)
variable data samples and the power consumption for those | |
intermediate values must be calculated using a power model χ (t) − μ
such as the Hamming Distance Model. This calculation must | |
Ω = Θ Θ (6)
be repeated for all possible values of the subkey.
These calculated data values are the hypothetical power
consumption values.
The Hamming distance between D and R, also described by K ∗ = argmax exp − χ ∗ (t) −
| |
H(D ⊕ R), encloses the Hamming weight model which ( )
assumes that R = 0. The independent variable b encloses
offsets, time dependent components and noise and a is a scalar
gain between the Hamming distance and W the power | | | | | |
consumed (2): μ . Ω . χ ∗ (t) − μ (7)

W = aH(D ⊕ R) + b (2)

The last step is a comparison between the real and the III. PYTHON MODEL OF THE ATTACKS
theoretical power consumption for each subkey in order to
find the one that is most likely to be used in encryption, based A. Correlation Radio Attack (CRA)
on the highest correlation coefficient [3].
The variance dependencies are: σ = a σ + σ . Тhe Correlation Radio Analysis runs a standard correlation
correlation factor between the Hamming distance and the attack against a data set, trying to recover the key used for the
measured power to assess the linear model-fitting rate is . observed AES operations. The attack works by correlating the
The covariance between both random variables is normalized amplitude-modulated signal of the screaming channel with the
by the product of their standard deviations. The dependences power consumption of the SubBytes step in the first round of
can be observed on equation (3). AES, using a Hamming-weight model.
Firstly we load the known key, the number of traces and the
( , ) √ number of points. Then we create lists to store the information
ρ = = = = (3)
for the best guess, the PGE and the stored_cpas from maxcpa.
The following steps are for each and every one of the key
bytes:
B. Template Radio Attack (TRA)
The output of the CRA and its maximum value are creates
as empty lists.
Many models can be inferred using a template attack. The
For every guessed subkey, its value is printed. Then we
first step is to make a calculation about the distance between
initialize arrays and variables to zero. We create a hypothesis
the template probability density functions (PDFs). A template
using the HW model. The mean of the hypothesis and the
attack will give better results if the PDFs are far one from
mean of all points in the trace are performed for every subkey.
each other. As first order, it is proportional to the number of
And for every one trace of the guessed subkey, we are
commutations of the gates. The energy dissipated by a portion
calculating the difference between the hypothesis and the
of the hardware is thus measured by a Hamming distance.
difference in the traces. After this we calculate the output of
However, the best way to distinguish the templates is to build
the CRA and print the maximum value.
them in such a way that their dissipations are as different from
We find and print the PGE for every key byte in order to
each other as can be. As the dissipation is correlated to the
compare them easily.
Hamming distance, the best mapping is the Hamming distance
At the end we present the final results for the best achieved
between two successive values of the keys [4].
guess for every key and the PGE.
On average, it requires a lot of preparation and retrieval of
many power traces, but the advantage of the SRA is that it is
B. Template Radio Attack (TRA) - Learning
then necessary to collect very few traces of the attacked
system to completely break the encrypted communication. It
The data set should have a considerable size in order to
is even possible to extract the key from only one trace. The
allow the construction of an accurate model. In general, the
construction of a template consists in calculating the pair of


more data is used for template creation the less is needed to ring buffer for keeping track of the last N best guesses using a
apply the template. window with start index 0 and 10 dimensions
Creating the template is the so-called training phase The result of the total average values of the signal is the
consisting of measuring the electrical activity of a clone of the covariance matrix.
system that will be attacked during a large number of For each trace, we take the key points and put them in a
encryptions executed with K number of different keys on new matrix. In addition, after this, each and every key is being
random data sets. To perform it, the attacker must have access tested. A Hamming-weight (HW) model is made of the S-
to and full control over a copy of the system that will be Box. The HW is normalized and is transformed into a
attacked. probability density function. The logarithm of this one is
This is necessary because you need to create models - stored in a list together will all of the keys for a given trace.
"templates" for each possible key that can be used. In practice, The last list is sorted and sored into the main matrix. If a
it requires a lot of preparation and retrieval of many power proper key is found, we display the subkey and the number of
"traces", but the advantage of the TRA is that it is then traces in which it was found.
necessary to collect very few "traces" of the attacked system The best guess for every key and the PGE are displayed at
to completely break the encrypted communication. It is the end.
possible to extract the key from only one "trace".
In the code for every byte in the key we are using a
template S-Box from the S-Box, which is used as a lookup
IV. RESULTS
table in AES. Then we sort the traces by the Hamming-weigh
(HW) model. A. Running an Attack Command
Make blank lists - one for each Hamming weight and fill
them up with the traces. Then we have to check if there is at In order to run the two analysis in the Linux terminal there
least a trace for each HW. They are switched to numpy arrays, are a few parameters that you need to know. The most
where we find the average values and the sum of their important for the attacks are the number of traces --num-traces
differences. (the maximum available if you pass 0), and the attack window
The next step is to locate the points of interest, which is defined by --start-point and --end-point (or the entire trace if
done by finding the maximum sum of their differences. In you do not specify them) [5].
order to finish the training phase, we create the mean matrix In order to choose the window one should plot (--plot) the
and the covariance matrix for each HW. traces. Use the two shown plots to manually identify the first
We display the points of interest and the two matrixes for round of AES, at the output of the S-Box. The attack works
better understanding of the results. better this way, because we eliminate a lot of points which
slow down the processing and add noise. The tool will first
C. Template Radio Attack (TRA) - Attacking show all the traces aligned on the same plot (careful if there
are many of them) and then the Sum of Absolute Differences
Template Radio Analysis applies the already prepared (SOAD) - which should be higher where the traces differ [6].
template to a new system with the intention to attack the key
in a new data set. The template’s directory must be the $ sc-attack --plot --data-path=../traces/mbedtls_1m_home –
location of a previously created template with compatible name =mbed_villa_500 --start-point=0 --end-point=0 --num-
settings as same trace length. traces=1000 cra
Fig. 2. Example command
The real attack starts first with creating the lists for the
scores, the best guess and the Partial Guessing Entropy (PGE)
B. Running a template creation command
this saves a byte which indicates the distance between real and
best guess. The closer it is to 0, the closer it is to the real
value. It can have a value of 255 if it is completely wrong First, we use the template set to create a template. We first
For each and every one of the bytes in the key, we are doing create a folder where we can store the template. Again, we
the following steps: could set the window, but we do not need it. The template
attack first uses the SOAD to detect the points of interest that
In order to de-serialize the data stream of the point of
is the point of the trace that "leak". They are simply the peaks
interest, covariance matrix and mean matrix, we use the
of the SOAD. One can configure how many peaks you want
loads() option of the library pickle. To simplify and speed up
the calculations, the number of reports is reduced, leaving with --num-pois and the minimum distance between adjacent
only the points of interest. peaks with --poi-spacing. Note that the number of traces is
Principal Component Analysis (PCA) is used for their very large, so it is better to use the plot option on a smaller
subset.
selection. This is a statistical approach allowing the
identification of patterns/trends/patterns in the data. In it, with
the help of a covariance matrix, only the most significant $ sc-attack --data-path=../traces/tinyaes_anechoic_10m --
values are selected. Creating these templates requires taking start-point=0 --end-point=0 --num-traces=129661 tra_create
measurements in about 20 hours, while collecting attack data, tra_templates/example_template --num-pois=10 --poi-
with less than 1,000 traces, takes only 15 minutes. We create a spacing=1
Fig. 3. Example command


C. Numerical Results V. CONCLUSION
The numerical results that appear after using the attack In this paper we presented an approach for software
command consist of a table with five lines. The first two lines implementation of two side-channels attacks with the main
show the bytes of the best guess and of the known key, goal of recovering the AES-128 key from an unknown
respectively. The PGE is the Partial Guessing Entropy, which system. CRA and TRA can be used in the field of security
is the "distance" of our best guess from the known byte, and depending on the given model and its encryptions.
therefore it is 0 when the guess is correct. Our tool ranks the Although the opportunities for those systems are a lot, the
guesses, with the most likely at 0 and the least likely at 255, programming realization is fairly similar and can be optimized
and the PGE is the rank of the known key. in order to meet the required results. In our approach we are
using the Probability Density Functions and the Hamming-
weight model to calculate the Partial Guessing Entropy. The
results are plotted in order to be easily understandable and
analyzed. Because of its simplicity and variety of built-in
functions Python3 was used as the main programming
language.
Fig. 4. The result given in the terminal
The future of the field of security systems is not clear but
D. Graphic Results can have different directions depending on our focus and
research.

ACKNOWLEDGEMENT
The research described in this paper is partially realized
within the Erasmus+ mobility program with the help of the
profesors at SUPELEC University in Rennes, France.
The hardware implementation of the codes for the two side-
channel power analysis techniques used in this paper are
described in a scientific document: “Hardware
implementation and comparison of CRA and TRA when
trying to recover the AES-128 key” [7] that will also be
presented at the ICEST 2020 conference.

REFERENCES
Fig. 5. Plot of all used traces aligned
[1] G. Camurati, S. Poeplau, M. Muench, T. Hayes, and A.
The –plot tool of the sc-attack command will first show all Francillon, “Screaming Channels: When Electromagnetic Side
the traces aligned (see Fig. 5) on the same plot and then the Channels Meet Radio Transceivers”, CCS'18: Proceedings of
Sum of Absolute Differences (see Fig. 6) (which should be the 2018 ACM SIGSAC Conference on Computer and
higher where the traces differ, e.g. because of the key). Communications Security, January 2018, pp. 163-177.
[2] V. K. Rai, B. V. Reddy, S. Tripathy, and J. Mathew,
“Correlation Power Analysis and Effective Defense Approach
on Light Encryption Device Block Cipher”, Security and
Privacy, vol. 2, no. 5, September/October 2019.
[3] E. Brier, C. Clavier, and F. Olivier, “Correlation Power
Analysis with a Leakage Model“, Cryptographic Hardware and
Embedded Systems - CHES 2004: 6th International Workshop
Cambridge, MA, USA, August 11-13, 2004.
[4] M. A. El Aabid, S. Guilley, and P. Hoogvorst, “Template
Attacks with a Power Model“, 2007.
[5] H. Li, A. T. Markettos, and S. Moore, “Security Evaluation
Against Electromagnetic Analysis at Design Time”, Tenth IEEE
International High-Level Design Validation and Test Workshop,
Napa Valley, CA, 2005, pp. 211-218.
[6] G. Camurati, “Screaming_channels”,
https://github.com/eurecom-s3/screaming_channels;
[7] I. Vladimirov, D. Nikolova, and Z. Terneva, “Hardware
Implementation and Comparison of CRA and TRA when Trying
Fig. 6. Plot of the Sum of Absolute Differences graph to Recover the AES-128 Key”, 2020.


AUTHOR INDEX

A H
Acevski, Nikolce 119 Haralanova, Elena 244
Andonov, Aleksandar 37
Arapinoski, Blagoja 110, 137 I
Atanasković, Aleksandar 199 Iliev, Atanas 123
Atanasovski, Metodija 99, 106, 110, 137 Iliev, Desislav 133
Atanasovski, Vladimir 54 Iliev, Ilia 211
Avdić, Aldina 46 Iontchev, Emil 231

B J
Bitir Istrate, Ioan-Sevastian 145 Janakieska, Martina 54
Bychkov, Oleksii 167 Janjić, Aleksandar 102
Janković, Dragan 42, 46
C Jokanović, Branka 203
Campobello, Giuseppe 191, 195 Jovanović, Aleksandra 155, 159
Castravete, Miruna 145
Ceselkovska, Vesna 137 K
Chikov, Ognyan 73 Koničanin, Samir 224
Chikurtev, Denis 81 Kostadinova, Iva 167
Chikurteva, Ava 81 Kostina, Anna 235
Christoff, Nicole 181 Kostov, Mitko 99, 106, 110
Crupi, Giovanni 191, 195 Krstić, Nikola 127
Kushlev, Stoyan 185
D Kuzmanov, Ivo 252
Damyanov, Ilian 231
Dimishkovska, Natasha 123 L
Dimitrijević, Aleksandar 19 Laskov, Lyubomir 77
Dimitrov, Dimitar 123 Latino, Mariangela 191, 195
Dimitrov, George 167 Latkoski, Pero 54
Dimitrov, Kalin 65, 77 Lutovska, Monica 239
Djordjević, Andjelija 42
Djordjević, Miloš 58 M
Djordjević, Snežana 89 Madzharov, Nikolay 133
Djordjević, Teodora 50 Maleš-Ilić, Nataša 199
Djorić, Aleksandra 199 Malinović, Nemanja 11
Donato, Nicola 191, 195 Manivilovska, Ana 119
Dončov, Nebojša 211 Manolova, Agata 181
Draganov, Ivo 177 Marinković, Zlatica 191, 195, 220
Marinova, Galia 69, 73
F Markov, Bojidar 141
Filipović, Marija 89 Markova, Diana 141
Marovac, Ulfeta 46
G Merkulova, Kateryna 167
Georgieva, Veska 77 Micevska, Angela 119
Getova, Iglika 167
Gheorghiu, Cristian 145
Goranov, Goran 3
Gugliandolo, Giovanni 191, 195
Mijakovski, Vladimir 239 S
Milenković, Aleksandar 42 Sandjakoska, Ljubinka 163
Miletiev, Rosen 231 Sarevska, Maja 211
Milić, Dejan 224 Serov, Andrey 235
Milijić, Marija 203 Spirovski, Mile 110
Milovanović, Ivan 211 Stanković, Zoran 211
Mironov, Rumen 173, 185 Sterjovski, Igor 137
Mitić, Vladimir 89 Stevanovski, Blagoja 114
Mitrović, Nikola 85 Stojanović, Milan 85
Mojsoska, Natasa 114 Stojanovska, Frosina 163
Stojković, Aleksandra 58
N Stojković, Suzana 50
Nachev, Ivaylo 207, 216 Stošić, Biljana 151, 211
Nikolova, Desislava 256, 259 Strobl, Peter 19
Suljović, Suad 224
P
Panayotova, Galina 167 T
Pašić, Roberto 252 Terneva, Zornitsa 256, 259
Perić, Zoran 155, 159 Tola, Krisel 69
Petkov, Peter 207 Tzvetkov, Plamen 235
Petkova, Lora 177
Petković, Ivan 15 V
Petrov, Pavel 167 Valkovski, Tsvetan 65, 93
Petrova, Pepa 167 Vasić, Selena 224
Petrović, Nenad 23, 27, 33, 224 Veljanovski, Goran 99, 106
Petrušić, Andrija 102 Veselić, Boban 89
Popovski, Pande 99, 106, 114 Vladimirov, Ivaylo 256, 259
Predić, Bratislav 11 Vlajkov, Slobodan 155, 159
Pronić Rančić, Olivera 220 Vračar, Jana 58
Puleva, Teofana 244, 248
Y
R Yonchev, Andrey 248
Radojković, Miloš 220 Yordanov, Rumen 231
Radmanović, Miloš 7
Rajković, Petar 15 Z
Rankovska, Valentina 3 Zhabska, Yelyzaveta 167
Roganović, Miloš 11

You might also like