Volume 17, number 1, 2023. Print version and published papers:

Regular papers:

OPTIMAL PID CONTROLLER BASED ON AN IMPROVED SPARROW SEARCH ALGORITHM FOR MULTI-AREA FREQUENCY CONTROL

Copy citation: A. E. Okolo, E. Twumasi, E. A. Frimpong, Optimal PID Controller Based on an Improved Sparrow Search Algorithm for Multi-Area Frequency Control, Carpathian Journal of Electrical Engineering, vol. 17, no. 1, pp. 7-20, 2023.

Amobi Edward OKOLO, Elvis TWUMASI, Emmanuel Asuming FRIMPONG, Department of Electrical and Electronic Engineering, Kwame Nkrumah University of Science and Technology Kumasi, Ghana, Okoloedward19@gmail.com, etwumasi.coe@knust.edu.gh, eafrimpong.soe@knust.edu.gh

Keywords: Area control error, automatic generation control, load frequency control, sparrow search algorithm, PID controller

Abstract: To boost power system reliability there must be a good scheme for the automatic generation control to maintain the generation-load balance. The development of this scheme started with the enhancement of the sparrow search algorithm, where the initial population and producer selection was targeted to improve the search quality. The enhancement made was used to optimize the gain parameters of the PID controller increasing the overall system performance. The proposed scheme was tested on the two-area power system in the MATLAB/Simulink environment and comparisons were made with recent publications. Integral time absolute error (ITAE) was used as the performance index. The proposed method shows improved performance with minimum settling time. This work presents the enhancement of the sparrow search algorithm for the automatic generation control of a two-area non-reheat thermal power system.

EXTENDED APPLIED DATA CLEANING METHODS IN OUTLIER DETECTION FOR RESIDENTIAL CONSUMER

Copy citation: D. I. Jurj, D. D. Micu, A. G. Berciu, M. Lancrajan, L. Czumbil, A. Bende, B. A. Mitrache, A. Mureșan, Extended Applied Data Cleaning Methods in Outlier Detection for Residential Consumer, Carpathian Journal of Electrical Engineering, vol. 17, no. 1, pp. 21-31, 2023.

Dacian I. JURJ, Dan D. MICU, Alexandru G. BERCIU, Mircea LANCRAJAN, Levente CZUMBIL, Andrei BENDE, Bogdan A. MITRACHE, Alexandru MUREȘAN, Technical University of Cluj-Napoca, dacian.jurj@ethm.utcluj.ro, Dan.Micu@ethm.utcluj.ro, Alexandru.Berciu@campus.utcluj.ro, lancranjanmircea98@gmail.com, Levente.CZUMBIL@ethm.utcluj.ro, andrei.bende28@gmail.com, bogdan.mitrache99@gmail.com, Alexandru.Muresan@ethm.utcluj.ro

Keywords: Energy measurement, Artificial intelligence, Statistics, Probabilistic computing, Data science, Data aggregation, Algorithms, Energy efficiency

Abstract: This paper delves into the subject of outlier detection techniques tailored for unique datasets related to residential energy consumption. Building upon the current state of research we introduce the Grubbs and Z-score methods and investigate a range of outlier detection strategies encompassing statistical, probabilistic, and machine learning algorithms. The findings underscore the importance of outlier detection in the Romanian residential energy sector.

ANALYSIS OF DIFFERENT DEEP LEARNING APPROACHES BASED ON DEEP NEURAL NETWORKS FOR PERSON RE-IDENTIFICATION

Copy citation: A. Ramakić, Z. Bundalo, D. Bundalo, Analysis of Different Deep Learning Approaches Based on Deep Neural Networks for Person Re-Identification, Carpathian Journal of Electrical Engineering, vol. 17, no. 1, pp. 32-41, 2023.

Adnan RAMAKIC1, Zlatko BUNDALO2, Dušanka BUNDALO3, 1Technical Faculty, University of Bihać, Bihać, Bosnia and Herzegovina, 2Faculty of Electrical Engineering, University of Banja Luka, Banja Luka, Bosnia and Herzegovina, 3Faculty of Philosophy, University of Banja Luka, Banja Luka, Bosnia and Herzegovina, adnan.ramakic@unbi.ba, zlatbun2007@gmail.com, dusbun@gmail.com

Keywords: Deep Neural Network (DNN), Person Identification, Person Re-Identification, Convolutional Neural Network (CNN)

Abstract: In this work, different deep learning approaches based on deep neural networks for person re-identification were analyzed. Both identification and re-identification of people are frequently required in various fields of human life. Some of the most common applications are in various security systems where it is necessary to identify and track a particular person. In the case of person identification, the identity of a particular person needs to be established. In the case of re-identification, the main task is to match the identity of a particular person across different, non-overlapping cameras or even with the same camera at different times. In this work, three different deep neural networks were used for the purpose of person re-identification. Two of them were user-defined, while one of them is a pre-trained neural network adapted to work with a specific dataset. Two neural networks used were Convolutional Neural Networks (CNN). For the defined experiment, it was used own dataset with 13 subjects in gait.

THE ELECTRICAL RESISTANCE OF THE LUBRICANT FILM IN THE CASE OF THE HYDRODYNAMIC SLIDING BEARING SUBJECTED TO SHOCKS

Copy citation: I. M. Alexandrescu, R. Cotetiu, A. Cotetiu, D. Daraba, I. L. Alexandrescu, The Electrical Resistance of the Lubricant Film in the Case of the Hydrodynamic Sliding Bearing Subjected to Shocks, Carpathian Journal of Electrical Engineering, vol. 17, no. 1, pp. 42-48, 2023.

Ioan Marius ALEXANDRESCU, Radu COTETIU, Adriana COTETIU, Dinu DARABA, Ioana Laura ALEXANDRESCU,Technical University of Cluj-Napoca, Ioan.Alexandrescu@imtech.utcluj.ro

Keywords: minimal lubricating film, electrical resistance, radial sliding bearing

Abstract: This paper presents experimental research on electrical resistance of the lubricant film, shock absorption in the lubricating film, under different static and dynamic load conditions. We focus on determination of the minimal lubricating film which estimates the minimum lubricating thickness between spindle and bushing in the case of the hydrodynamic sliding bearing subjected to shocks.

ALTERNATIVE LOW-COMPLEXITY APPROACHES FOR PAPR REDUCTION IN FBMC-OQAM SYSTEMS

Copy citation: S. Senhadji, F. T. Bendimerad, Alternative Low-Complexity Approaches for PAPR Reduction in FBMC-OQAM Systems, Carpathian Journal of Electrical Engineering, vol. 17, no. 1, pp. 49-62, 2023.

Salima SENHADJI, Fethi Tarik BENDIMERAD, LTT Laboratory, Department of telecommunications, Abou Bakr Belkaid University, Tlemcen, Algeria, salima.senhadji@univ-tlemcen.dz

Keywords: FBMC-OQAM, PAPR, TR, TD, TC

Abstract: Recently, the Filter Bank Multi-Carrier with Offset-QAM modulation (FBMC-OQAM) system proved to be a strong candidate wave that can replace the conventional OFDM (Orthogonal Frequency Division Multiplexing) through several properties in future mobile generations (5G and 5G+). However, it faces a significant issue, which is high Peak-to-Average-Power-Ratio (PAPR) as all advanced waveforms. Many researchers have proposed either hybrid or non-hybrid techniques adapted to the FBMC-OQAM structure to minimize the PAPR parameter. Nevertheless, all of these techniques suffer from high complexity, which is a significant challenge in practical implementations. Therefore, in this paper, we propose two alternative low-complexity approaches, TD and TC, to effectively mitigate the PAPR problem in FBMC-OQAM systems. Both proposed hybrid schemes achieve superior PAPR performance compared to the conventional TR and very competitive results in comparison to the existing literature algorithms while requiring less computational complexity.

DECENTRALIZED ARCHITECTURES IN IOT DATA SHARING USING BLOCKCHAIN TECHNOLOGY

Copy citation: C. Costea, Decentralized Architectures in IOT Data Sharing Using Blockchain Technology, Carpathian Journal of Electrical Engineering, vol. 17, no. 1, pp. 63-71, 2023.

Cristinel COSTEA, Technical University of Cluj-Napoca, North University Centre of Baia Mare, cristinel.costea@ieec.utcluj.ro

Keywords: Content addressable storage, Blockchains, Distributed systems

Abstract: The development of IoT applications generally relies on centralized architectures, whether they use solutions based on cloud or on premises environments, usually operated by a single entity. However, recent technologies and the increasing number of interconnected intelligent devices are driving new approaches, the essential requirements being scalability and fault-tolerance. This work studies an alternative concept based on a decentralized architecture useful in several scenarios and focuses on available technologies for potential practical implementations.

OPTIMIZING DUTY RATIOS IN A GRID-INTERACTIVE INVERTER: A FIVE-LEVEL, THREE-LEG, THREE-PHASE CASCADED H-BRIDGE APPROACH EMPLOYING MPCC WITH AN EXPLICIT INTEGRATION ALGORITHM

Copy citation: E. K. Adjei-Saforo, F. B. Effah, M. Adam, E. Shahrouz, E. A. Frimpong, Optimizing Duty Ratios in a Grid-Interactive Inverter: A Five-Level, Three-Leg, Three-Phase Cascaded H-Bridge Approach Employing MPCC with an Explicit Integration Algorithm, Carpathian Journal of Electrical Engineering, vol. 17, no. 1, pp. 72-92, 2023.

Edmund Kwafo ADJEI-SAFORO1,2, Francis Boafo EFFAH1, Misbawu ADAM2, Ebrahimpanah SHAHROUZ3,Emmanuel Asuming FRIMPONG1, 1Kwame Nkrumah Unversity of Science and Technology, 2Kumasi Technical University, 3Wuhan University of Technology, ekadjeisaforo@st.knust.edu.gh, kingacid17@gmail.com, adam.misbawu@kstu.edu.gh

Keywords: Total harmonic distortion, three level three-leg, model predictive current control

Abstract: The model predictive current control stands out as a robust control strategy extensively applied in the enhancement of various industrial applications. Renowned for its capacity to handle multiple inputs and generate multiple outputs (MIMO), it is recognized for its consistently excellent performance and unique stable control techniques. However, the computational intensity required to remedy an optimization task at each time step poses a potential drawback, impacting its suitability for real-time control applications and potentially affecting system performance. This study introduces the concept of duty cycle optimization, leveraging the explicit integration approximation. This involves the application of rectangular voltage for both non-zero as well as zero within one control period to minimize current ripples in the grid-interactive system. Additionally, error minimization is achieved through the selection of the duration for the two-rectangular voltage. Experimental and simulation results validate the substantial reductions in ripple current as well as total harmonic distortion achieved through this approach.

STUDY ON THE EFFECTS OF MICROWAVES ON WATER HEATING AND THEIR INFLUENCE UPON THE GERMINATION PROCESS

Copy citation: R. Joian, D. Manciula, Study on the Effects of Microwaves on Water Heating and their Influence upon the Germination Process, Carpathian Journal of Electrical Engineering, vol. 17, no. 1, pp. 93-99, 2023.

Radu JOIAN1, Dorin MANCIULA2, Technical University of Cluj-Napoca, Romania, Babes Bolyai University of Cluj-Napoca, Romania, yo5pcw@yahoo.com, iosif.manciula@ubbcluj.ro

Keywords: Microwave, harmful effect, bean germination experiment

Abstract: This paper considers an experimental study that considers the effects of heating water in a microwave oven. Thus, we wanted to check how harmful microwave-heated water is, and by extrapolation, how harmful microwave-heated food can be.

INVESTIGATING MAGNETIC CONTROLLED REACTOR PRINCIPLES AND CHARACTERISTICS UTILIZING ANSYS IN AN IN-DEPTH STUDY

Copy citation: S. A. Darko, E. K. Adjei-Saforo, M. Adam, S. N. Akansake, Investigating Magnetic Controlled Reactor Principles and Characteristics Utilizing ANSYS in an in-Depth Study, Carpathian Journal of Electrical Engineering, vol. 17, no. 1, pp. 100-127, 2023.

Samuel Addo DARKO1, Edmund Kwafo ADJEI-SAFORO 1,2, Misbawu ADAM1, Solomon Nchor AKANSAKE2, 1 Kumasi Technical University, 2Kwame Nkrumah University of Science and Technology, kingacid17@gmail.com, adam.misbawu@kstu.edu.gh

Keywords: Magnetic controlled reactor (MCR), core structure, magnetic field distribution, magnetic saturation

Abstract: The inherent complexity leads to intricate equations, making it challenging for design engineers and researchers to model and analyze MCRs effectively. Despite the increasing attention given to MCRs in power systems, the need for simplified theoretical foundations and design models persists. This paper addresses the challenges posed by the complex excitation conditions of magnetic controlled reactors (MCRs), which are subject to both alternating current and direct current excitations by presenting the theoretical basis, ontological structure, working principle, and design model of MCRs in a systematic manner for enhanced comprehension. Graphical and equivalent electric circuit approaches are employed to derive mathematical expressions, while ANSYS simulation is utilized to create a 3D structure model of the MCR. The simulation results, compared with theoretical analyses, demonstrate that the MCR exhibits alternate magnetization and demagnetization between its two core limbs in a cycle. This suggests that the magnetic valves on both sides alternate between saturation and unsaturation in each cycle. Furthermore, the research reveals that the MCR’s entire capacity can be smoothly adjusted by varying the saturation degree of the magnetic valve core. Overall, this research contributes to a deeper understanding of MCRs under actual operating conditions and serves as a crucial foundation for further investigations into their performance design.

9th International Conference INNOVATIVE IDEAS IN SCIENCE 2023, 21-22th September 2023,
Banja Luka, Bosnia and Herzegovina – Selected papers by the IIS Scientific Committee:

INTRODUCTION

SIMULATION-BASED APPLICATION OF SAFETY OF THE INTENDED FUNCTIONALITY TO MITIGATE FORESEEABLE MISUSE IN AUTOMATED DRIVING SYSTEMS

Copy citation: M. Patel, R. Jung, Simulation-Based Application of Safety of the Intended Functionality to Mitigate Foreseeable Misuse in Automated Driving Systems, Carpathian Journal of Electrical Engineering, vol. 16, no. 1, pp. 135-149, 2023.

Milin PATEL1, Rolf JUNG2, 1Institute for Advanced Driver Assistance Systems and Connected Mobility, Germany, 2Kempten University of Applied Sciences, Germany, milin.patel@hs-kempten.de , rolf.jung@hs-kempten.de

Keywords: ADS, FM, Simulation-based testing, SOTIF

Abstract: The development of Automated Driving Systems (ADS) has the potential to revolutionize the transportation industry, but it also presents significant safety challenges. One of the key challenges is ensuring that the ADS is safe in the event of Foreseeable Misuse (FM) by the human driver. To address this challenge, a case study on simulation-based testing to mitigate FM by the driver using the driving simulator is presented. FM by the human driver refers to potential driving scenarios where the driver misinterprets the intended functionality of ADS, leading to hazardous behavior. Safety of the Intended Functionality (SOTIF) focuses on ensuring the absence of unreasonable risk resulting from hazardous behaviors related to functional insufficiencies caused by FM and performance limitations of sensors and machine learning-based algorithms for ADS. The simulation-based application of SOTIF to mitigate FM in ADS entails determining potential misuse scenarios, conducting simulation-based testing, and evaluating the effectiveness of measures dedicated to preventing or mitigating FM. The major contribution includes defining (i) test requirements for performing simulation-based testing of a potential misuse scenario, (ii) evaluation criteria in accordance with SOTIF requirements for implementing measures dedicated to preventing or mitigating FM, and (iii) approach to evaluate the effectiveness of the measures dedicated to preventing or mitigating FM. In conclusion, an exemplary case study incorporating driver-vehicle interface and driver interactions with ADS forming the basis for understanding the factors and causes contributing to FM is investigated. Furthermore, the test procedure for evaluating the effectiveness of the measures dedicated to preventing or mitigating FM by the driver is developed in this work.

COMPUTER NETWORK SECURITY

Copy citation: M. Mijatović, M. Mijatović, Computer Network Security, Carpathian Journal of Electrical Engineering, vol. 16, no. 1, pp. 150-157, 2023.

Marijan MIJATOVIĆ1, Marko MIJATOVIĆ2, 1Nezavisni Univerzitet Banja Luka, 2Sveučilište Hercegovina, photo.by.mile@gmail.com, marko.mijatovic@hercegovina.edu.ba

Keywords: networks, protocols, packets, LAN, cryptography

Abstract: Computers that we connect to a network serve to exchange data, which is located in the computer’s working memory. Data transmission can also be done through electronic signals, and these connections can be wireless networks or wired networks. The bits that are sent one after another simultaneously correspond at an appropriate speed, converting digital signals into analog signals and vice versa, which is a modern process. Computers can also be connected to a local network and a branched network. Each computer connected to the network has its own unique number (address) from which it can be recognized on which continent it is, in which country, and to which server address it is connected. Data is sent according to a pre-agreed protocol, in the form of packets. Security measures for protecting sensitive data and documents have existed for a long time in the world. Throughout history, many methods have been developed regarding data protection and internet security. Methods of providing protection on the internet were sometimes not effective and did not provide the necessary level of protection. With the development of cryptography and technology, very good methods of encryption and document protection have been discovered. Information systems are the foundation of basic and modern business operations. Their fundamental task is to be based on network systems, as well as their operation and security. That’s why it’s extremely important to familiarize ourselves with the security issues of computer networks and the ways in which these problems are resolved.

WATERFALL OR SCRUM METHODOLOGY – HOW TO CHOOSE ACCORDING TO THE SPECIFIC PROJECT?

Copy citation: M. Sajić, S. Čekrlija, M. Bubonjić, G. Kalinić, R. Bojanić, S. Babić, Waterfall or Scrum Methodology – How to Choose According to the Specific Project?, Carpathian Journal of Electrical Engineering, vol. 16, no. 1, pp. 158-171, 2023.

Mirko SAJIĆ1, Saša ČEKRLIJA1, Mladen BUBONJIĆ1, Goran KALINIĆ1, Radmila BOJANIĆ1, Slađana BABIĆ2,1Independent University of Banja Luka, 2Blicnet

Keywords: Waterfall, Agile, Scrum, CBS, Product Owner, Gantt chart, Project Chart

Abstract: This paper aims to perform a comparison of two methodologies used in project management and project work. It first describes the basic characteristics, strengths, and weaknesses of both methodologies to facilitate reaching certain conclusions. Then, it derives specific conclusions through a cross-comparison.