Nothing Special   »   [go: up one dir, main page]

Next Issue
Volume 71, ASWEC 2024
Previous Issue
Volume 69, WDSA/CCWI 2024
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
engproc-logo

Journal Browser

Journal Browser

Eng. Proc., 2024, EEPES 2024

The International Conference on Electronics, Engineering Physics and Earth Science (EEPES 2024)

Kavala, Greece | 19–21 June 2024

Volume Editors:
Teodor Iliev, University of Ruse, Bulgaria
Ivaylo Stoyanov, University of Ruse, Bulgaria
Grigor Mihaylov, University of Telecommunications and Post, Bulgaria
Panagiotis Kogias, Democritus University of Thrace, Greece
Jacob Fantidis, Democritus University of Thrace, Greece

Number of Papers: 59

Printed Edition Available!

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Cover Story (view full-size image): The third edition of the International Conference on Electronics, Engineering Physics and Earth Science (EEPES 2024) was held in hybrid mode in Kavala, Greece, from 19 to 21 June, 2024. The EEPES [...] Read more.
Order results
Result details
Select all
Export citation of selected articles as:

Editorial

Jump to: Other

4 pages, 180 KiB  
Editorial
Preface: The International Conference on Electronics, Engineering Physics and Earth Science (EEPES 2024)
by Teodor Iliev, Ivaylo Stoyanov, Grigor Mihaylov, Panagiotis Kogias and Jacob Fantidis
Eng. Proc. 2024, 70(1), 59; https://doi.org/10.3390/engproc2024070059 - 12 Sep 2024
Viewed by 419
Abstract
The third edition of the International Conference on Electronics, Engineering Physics and Earth Science (EEPES 2024) was held in hybrid mode in Kavala, Greece, from 19 to 21 June 2024 [...] Full article

Other

Jump to: Editorial

6 pages, 3115 KiB  
Proceeding Paper
Medium Access Control Layer for Internet of Things Edge-Side Network Using Carrier-Sense Multiple Access Protocol
by Selahattin Kosunalp and Sami Acik
Eng. Proc. 2024, 70(1), 1; https://doi.org/10.3390/engproc2024070001 - 23 Jul 2024
Viewed by 487
Abstract
The Internet of Things (IoT) has recently received a great deal of research interest due to its broad range of applications. One of the important layers in IoT applications is known as edge computing where resource-constrained devices at the edge form a simple [...] Read more.
The Internet of Things (IoT) has recently received a great deal of research interest due to its broad range of applications. One of the important layers in IoT applications is known as edge computing where resource-constrained devices at the edge form a simple type of network to sense required data. A more powerful edge device is responsible for collecting all sensed data to be transferred to the upper layers. A critical focus is therefore placed on maximum rate of data collection, requiring effective and intelligent solutions to coordinate the channel access of the devices. Medium access control (MAC) protocols take this responsibility as their design mission. Carrier-sense multiple access (CSMA) has been a baseline MAC scheme and many previous traditional networks utilized a CSMA-based solution. The motivation of this paper is to study the performance of a typical network at the edge through the CSMA theme. A practical network is constructed to assess the channel throughput performance via a commercially available radio transceiver. The practical performance observations indicate the suitability of the proposed CSMA-based solution. Full article
Show Figures

Figure 1

Figure 1
<p>IoT architecture with common layers.</p>
Full article ">Figure 2
<p>ALOHA throughput with an infinite number of objects.</p>
Full article ">Figure 3
<p>CSMA throughput with respect to varying parameter α.</p>
Full article ">Figure 4
<p>A view of the transceiver module.</p>
Full article ">Figure 5
<p>The deployed single-hop topology.</p>
Full article ">Figure 6
<p>Throughput of ALOHA and CSMA on realistic topology.</p>
Full article ">
13 pages, 3978 KiB  
Proceeding Paper
Analysis of Data Sharing Systems in the Context of Industry 4.0 via Blockchain in 5G Mobile Networks
by Teodora Hristova, Grigor Mihaylov, Peyo Hristov and Albena Taneva
Eng. Proc. 2024, 70(1), 2; https://doi.org/10.3390/engproc2024070002 - 23 Jul 2024
Viewed by 582
Abstract
The article discusses the advantages and disadvantages of Blockchain technologies. The types of distributed networks are defined and established as open, closed, consortium, and hybrid. Due to the variety of platforms in the Industry 4.0 society, which cannot be distinguished exactly as one [...] Read more.
The article discusses the advantages and disadvantages of Blockchain technologies. The types of distributed networks are defined and established as open, closed, consortium, and hybrid. Due to the variety of platforms in the Industry 4.0 society, which cannot be distinguished exactly as one type among those listed, the advantages and disadvantages of public and private networks are analyzed. Creating a real project requires compliance with various criteria. The synergism of standard and specialized environmental factors suggests difficulty in developing a techno-economic analysis for a specific task. Therefore, a SWOT analysis is proposed through which strengths and weaknesses, threats, and challenges are determined. To reduce the impact of threats and weaknesses when implementing technology in the industry, a combination of an Enterprise Resource Planning (shortly ERP) software platform and a fast data-transfer environment (such as 5G) is proposed. For this purpose, the features of the latter, which overcome threats and weaknesses, are established. It is established that the collaborative integration of technologies fosters business growth enhances economic impact, and serves as a strong foundation for long-term development across various fronts, positioning ahead of competitors. Full article
Show Figures

Figure 1

Figure 1
<p>Mutual influence of the three areas of sustainable development during digitization in the industry with Blockchain—ecological, social, and economic.</p>
Full article ">Figure 2
<p>Private or public Blockchain in the industry.</p>
Full article ">Figure 3
<p>Compact representation of the ERP element modules.</p>
Full article ">Figure 4
<p>Blockchain technology and ERP system.</p>
Full article ">Figure 5
<p>Blockchain integrated with 5G networks.</p>
Full article ">Figure 6
<p>Mutual influence of Blockchain, ERP, and 5G.</p>
Full article ">
5 pages, 961 KiB  
Proceeding Paper
Bidirectional Resonant Power Converter for Hybrid Energy Systems
by Angel Lichev, Yasen Madankov, Vasil Mihov and Dimitar Spirov
Eng. Proc. 2024, 70(1), 3; https://doi.org/10.3390/engproc2024070003 - 23 Jul 2024
Cited by 1 | Viewed by 345
Abstract
A bidirectional series DC-DC power converter with two resonant tank components is presented. A survey of a two-bridge inverter laboratory model of the device operating above resonant frequency is realized. A control technique with frequency variation at a defined range is used and [...] Read more.
A bidirectional series DC-DC power converter with two resonant tank components is presented. A survey of a two-bridge inverter laboratory model of the device operating above resonant frequency is realized. A control technique with frequency variation at a defined range is used and by which a control characteristics linearization is achieved and the efficiency of the device is improved. The behavior of the relevant converter operating at different frequency ratios is demonstrated, and the dependencies of the current through the resonant components and the output voltage are obtained. The possibility of the converter to transfer the energy in both forward and reverse directions at different input and output loads is demonstrated, which proves the applicability of the device in the area of hybrid energy systems. Full article
Show Figures

Figure 1

Figure 1
<p>Circuit of the studied resonant power converter.</p>
Full article ">Figure 2
<p>Converter main voltages and currents.</p>
Full article ">Figure 3
<p>Dependencies of converter voltages and currents: (<b>a</b>) <span class="html-italic">u<sub>CD</sub></span> and <span class="html-italic">i<sub>RMS</sub></span>; <span class="html-italic">U’</span><sub>0</sub> = 0.25; ν (1.1–1.16); (<b>b</b>) <span class="html-italic">u<sub>CD</sub></span> and <span class="html-italic">i<sub>RMS</sub></span>; <span class="html-italic">U’</span><sub>0</sub> = 1; ν (1.1–1.16); (<b>c</b>) <span class="html-italic">u<sub>CD</sub></span> and <span class="html-italic">i<sub>RMS</sub></span>; <span class="html-italic">U’<sub>0</sub></span> = 4; ν (1.1–1.16); (<b>d</b>) <span class="html-italic">U’</span><sub>0</sub> and <span class="html-italic">i<sub>RMS</sub></span> at different frequency ratio variation.</p>
Full article ">
8 pages, 3186 KiB  
Proceeding Paper
Water Tower Base Method for the Optimization of Expansion and Shear during Construction
by Aleksandrina Bankova, Stefan Tenev, Zoya Tsoneva and Ismail Mehmedov
Eng. Proc. 2024, 70(1), 4; https://doi.org/10.3390/engproc2024070004 - 23 Jul 2024
Viewed by 926
Abstract
The primary purpose of the present research is to analyze and determine the impact that expansion and shear exert on the production time, expenditures on materials and consumable items, i.e., production costs, and the cost of the manufactured sheet material details. An applied [...] Read more.
The primary purpose of the present research is to analyze and determine the impact that expansion and shear exert on the production time, expenditures on materials and consumable items, i.e., production costs, and the cost of the manufactured sheet material details. An applied study was, accordingly, conducted to investigate the implications of different design features and shear on a sheet material workpiece, i.e., the base of a water tower, with respect to the shear line produced during surface segmentation. In order to determine in which direction and to what extent the dimensions of the constituent elements influence the expansion, a graphical experiment was performed with a smaller width of the elements than the surrounding surface, as well as with two different steps. Cases are presented and analyzed in which the surrounding surface is considered as composed of several composite belts in horizontal and vertical arrangements of the metal sheets. The research findings refer to the sheet material parameters (thickness, dimensions), production technology principles, and their effects on the technological process to optimize material costs and reduce waste in manufacturing. The study revealed that in order to achieve optimal shear outcomes, it is recommended to manufacture all the segments concurrently, and shorten the time of production by programming the process of shear to minimize the length of the shearing lines while segmenting the surfaces of the relevant details. This will be more suitable in the case of constructions executed along helical lines, applied with a small step, where the residual material is of more compact dimensions with a suitable cut. Full article
Show Figures

Figure 1

Figure 1
<p>Water tower with specific dimensions in meters without approximation.</p>
Full article ">Figure 2
<p>Development of the conical surface of two vines with different pitches in Magenta and Cyan.</p>
Full article ">Figure 3
<p>Expansion of a conical surface and shearing of sheet material located along the spiral line with two different pitches and cuts.</p>
Full article ">Figure 4
<p>Conical surface design and sheet material cut with a small step width of 1250 mm.</p>
Full article ">Figure 5
<p>Unfolding and cutting with horizontal placement of the sheet material on the unfolding belts.</p>
Full article ">Figure 6
<p>Expansion with shearing and a vertical positioning of the sheet material on the flanges of expansion.</p>
Full article ">Figure 7
<p>Expansion with shearing and horizontal positioning of the sheet material on the flanges of expansion.</p>
Full article ">
9 pages, 1916 KiB  
Proceeding Paper
Problems in Designing Robots with Parallel Kinematics
by Stanislav Tsolov, Reneta Dimitrova and Stiliyan Nikolov
Eng. Proc. 2024, 70(1), 5; https://doi.org/10.3390/engproc2024070005 - 23 Jul 2024
Viewed by 401
Abstract
In this article, the problems arising in the design of robots with parallel kinematics are defined. An analysis of the causes of these problems was made. Methods for solving the defined problems applied in modern robots with parallel kinematics are indicated. This article [...] Read more.
In this article, the problems arising in the design of robots with parallel kinematics are defined. An analysis of the causes of these problems was made. Methods for solving the defined problems applied in modern robots with parallel kinematics are indicated. This article summarizes and presents all these problems and analyzes each of them, with the goal of serving as an initial guide for engineers in designing new cost-effective parallel robots that meet the needs of discrete manufacturing. There are many scientific works on this topic, but they are focused only on a specific problem, presenting a method for its solution. In most cases, these methods are not generalized and only apply to a specific type of construction. Therefore, when designing, engineers must study all these methods and carefully select the appropriate ones that give maximum performance, a process that is significantly time-consuming. That is why this article can help the design process by giving an initial view of all possible problems, and for some of them, specific solutions from different authors and companies are presented. Thus, the design time for engineers who have not encountered the features of parallel robots can be drastically reduced, something that is of great importance for today’s automation. Full article
Show Figures

Figure 1

Figure 1
<p>Solving a direct kinematic problem for a Delta robot.</p>
Full article ">Figure 2
<p>Neutralizing kinematic singularities by relative repositioning in robots with sequential kinematics.</p>
Full article ">Figure 3
<p>Delta robot singular poses: (<b>a</b>) Horizontal; (<b>b</b>) vertical.</p>
Full article ">Figure 4
<p>Delta robot with orientation module.</p>
Full article ">Figure 5
<p>Orientation module for Delta robot.</p>
Full article ">
10 pages, 1757 KiB  
Proceeding Paper
Analysis and Synthesis of Single-Bit Adders for Multi-Bit Adders with Sequential Transfers
by Sakhybay Tynymbayev, Assel Mukasheva, Kuanyshbek Ibragimov, Adil Mukhamedgali, Gani Sergazin and Teodor Iliev
Eng. Proc. 2024, 70(1), 6; https://doi.org/10.3390/engproc2024070006 - 24 Jul 2024
Viewed by 432
Abstract
This paper provides an analysis of existing single-digit binary adders from the point of view of their implementation on fans built based on metal-oxide-semiconductor field-effect transistor—MOSFETs. The synthesis of a single-digit adder with a conditional sum is carried out. The considered adders are [...] Read more.
This paper provides an analysis of existing single-digit binary adders from the point of view of their implementation on fans built based on metal-oxide-semiconductor field-effect transistor—MOSFETs. The synthesis of a single-digit adder with a conditional sum is carried out. The considered adders are compared in terms of speed and hardware complexity (by the number of MOSFETs). Adders perform arithmetic operations on numbers. In combination with other logical operations, adders are the core of the circuits of arithmetic logic devices that implement several different operations; they are an integral part of different processors. The most important parameters of adders are their hardware complexity and performance; therefore, many options for single-bit and multi-bit connectors with serial, parallel and combined transmissions have been developed. In the final part, a scheme of a multi-bit adder with consecutive transfers on adders with a conditional sum is given. An example of performing addition operations is given. Full article
Show Figures

Figure 1

Figure 1
<p>Functional diagram of the adder.</p>
Full article ">Figure 2
<p>Logic circuit of the adder on a MOSFET.</p>
Full article ">Figure 3
<p>Functional scheme of Ci transfer.</p>
Full article ">Figure 4
<p>Functional diagram of the S<sub>i</sub> calculator based on two addition schemes modulo two.</p>
Full article ">Figure 5
<p>Functional diagram of the S<sub>i</sub> calculator based on two addition schemes modulo two.</p>
Full article ">Figure 6
<p>Functional diagram of the conditional sum adder.</p>
Full article ">Figure 7
<p>Functional diagram of MUX<sub>1</sub> multiplexer on the MOSFET.</p>
Full article ">Figure 8
<p>MUX<sub>2</sub> multiplexer function diagram.</p>
Full article ">Figure 9
<p>Functional diagram of a multi–bit adder based on a single-bit conditional sum adder.</p>
Full article ">
7 pages, 2102 KiB  
Proceeding Paper
Concept for the Construction of a Universal Mobile Robot
by Vanya Georgieva and Ivailo Petrov
Eng. Proc. 2024, 70(1), 7; https://doi.org/10.3390/engproc2024070007 - 25 Jul 2024
Viewed by 425
Abstract
This paper presents a mobile robot concept. To understand what has led to the choice of this particular design, one must first understand mobile robots in general: what are the trends, where are they used, etc. Then, some of the necessary elements for [...] Read more.
This paper presents a mobile robot concept. To understand what has led to the choice of this particular design, one must first understand mobile robots in general: what are the trends, where are they used, etc. Then, some of the necessary elements for robot propulsion and navigation were considered, looking at their principle of operation, as well as their application. A description of the robot structure follows. Thanks to the software, the approximate value of the various parameters can be calculated, and an initial three-dimensional model can be built. First, the idea of the robot will be introduced in the abstract and then be outlined in detail, showing how the various components work. It will conclude by looking at the most important elements of a mobile robot, as well as what makes a robot successful. Full article
Show Figures

Figure 1

Figure 1
<p>Mecanum wheel.</p>
Full article ">Figure 2
<p>Configuration with four mecanum wheels.</p>
Full article ">Figure 3
<p>Calculation of the distance to the object.</p>
Full article ">Figure 4
<p>Ultrasonic sensor.</p>
Full article ">Figure 5
<p>Work principle of ultrasonic sensors.</p>
Full article ">Figure 6
<p>Structure of the robot.</p>
Full article ">
6 pages, 1112 KiB  
Proceeding Paper
Examination of Two-Quadrant DC–DC Converter with Single-Ended LC Output Filter
by Vasil Mihov, Angel Lichev, Yasen Madankov and Dimitar Spirov
Eng. Proc. 2024, 70(1), 8; https://doi.org/10.3390/engproc2024070008 - 26 Jul 2024
Cited by 1 | Viewed by 389
Abstract
This paper presents an examination regarding the DC–DC converter output behavior at variable loads. An example of a circuit with two-quadrant operation with different control methods is shown. The presented mathematical approach is used to determine the main output values and could have [...] Read more.
This paper presents an examination regarding the DC–DC converter output behavior at variable loads. An example of a circuit with two-quadrant operation with different control methods is shown. The presented mathematical approach is used to determine the main output values and could have an enclosure as the calculation methodology. The examination data for the step-down circuit configuration with a single-ended output LC filter are provided. A modified excel model is used to extract the parameters for the circuit output gain at the rated frequency. The simulations of the load factor variation are shown in four different plots, where the area of the steady operation is presented. The results are derived to estimate the relationship between the circuit output and load characteristics’ deviation. The converter dynamic range of the operation is determined by the presented graphics. A proper LC output filter design is essential for reducing the ripple currents and increasing the overall circuit effectivity. Full article
Show Figures

Figure 1

Figure 1
<p>DC–DC converter (chopper) primary circuit.</p>
Full article ">Figure 2
<p>Pulse sequences at (<b>a</b>) PWM control and (<b>b</b>) VF control.</p>
Full article ">Figure 3
<p>Equivalent circuit states at (<b>a</b>) period ON and (<b>b</b>) period OFF.</p>
Full article ">Figure 4
<p>Circuit output gain at rated frequency and load factor variation: (<b>a</b>) at load factor 0.5, (<b>b</b>) at load factor 0.75, (<b>c</b>) at load factor 0.9 and (<b>d</b>) at load factor 1.</p>
Full article ">
9 pages, 3456 KiB  
Proceeding Paper
Automation of the Process of Attestation of Metrics for Industrial Robots Using Software Products CoppeliaSim and MATLAB
by Valerii Kyrylovych, Anton Kravchuk, Oleksandr Dobrzhanskyi, Ilona Kryzhanivska and Lubomir Dimitrov
Eng. Proc. 2024, 70(1), 9; https://doi.org/10.3390/engproc2024070009 - 23 Jul 2024
Viewed by 322
Abstract
This article presents a practical implementation of an approach for the automated attestation of the indicators of manipulation for systems of stationary industrial robots with one arm and one clamping device. A developed mathematical model of systems for the manipulation of the metric [...] Read more.
This article presents a practical implementation of an approach for the automated attestation of the indicators of manipulation for systems of stationary industrial robots with one arm and one clamping device. A developed mathematical model of systems for the manipulation of the metric attestation process for industrial robots is presented. Attestation is performed by properly performing the relevant calculation procedures using the CoppeliaSim and MATLAB software products. A certification example of a real robotic handling system model ABB IRB 140 and clamping device model RG2 is shown, illustrating the effectiveness of the proposed approach to improvement. Full article
Show Figures

Figure 1

Figure 1
<p>A generalized scheme of the proposed methodology for automated attestation of the MS of IR metrics, performed with the help of CoppeliaSim and MATLAB software products.</p>
Full article ">Figure 2
<p>Fragments of the illustration of the automated attestation of the IR MS: model ABB IRB 140 and the CD model RG2 with the MO (<b>a</b>); a frame (thread) model of the kinematic structure of the ABB IRB 140 robot (<b>b</b>); back (<b>c</b>), front (<b>d</b>) and combined (<b>e</b>) working area of the given orientation <math display="inline"><semantics> <mrow> <msubsup> <mrow> <mi>T</mi> <mi>R</mi> <mi>K</mi> </mrow> <mrow> <mi mathvariant="normal">C</mi> <mn>5</mn> <mo> </mo> <mo>=</mo> <mo> </mo> <mo>+</mo> <mo> </mo> <mn>40</mn> </mrow> <mrow> <mi>A</mi> <mi>B</mi> <mi>B</mi> <mo> </mo> <mi>I</mi> <mi>R</mi> <mi>B</mi> <mo> </mo> <mn>140</mn> </mrow> </msubsup> </mrow> </semantics></math>; 3D form of the combined (<b>f</b>) working area.</p>
Full article ">Figure 3
<p>Visualization (isometry) of the final result of the automated attestation process of the IR MS metric of the ABB IRB 140 model and the CD model RG2 with a prismatic MO, the dimensions of which are 0.04 × 0.04 × 0.11 m at A = 0°, B = 0°, and C5 = + 40°.</p>
Full article ">
8 pages, 2538 KiB  
Proceeding Paper
Shape-Memory Alloys—Application in Shrink-Fit Joints
by Elitsa Tomova-Damyanova, Vladislav Ivanov, Georgi Tonkov, Veselin Tsonev and Nikola Kuzmanov
Eng. Proc. 2024, 70(1), 10; https://doi.org/10.3390/engproc2024070010 - 26 Jul 2024
Viewed by 419
Abstract
Shape-memory alloys have various applications in different fields including medicine, robotics, aeronautics, and micro-electromechanical systems. This paper discusses shrink-fit joints formed by shape-memory alloy elements and their application for the axial fixation of mechanical components. The use of shape-memory alloys gives the shrink-fits [...] Read more.
Shape-memory alloys have various applications in different fields including medicine, robotics, aeronautics, and micro-electromechanical systems. This paper discusses shrink-fit joints formed by shape-memory alloy elements and their application for the axial fixation of mechanical components. The use of shape-memory alloys gives the shrink-fits some specific features: ease of assembly, insensitivity to tooling and human error, chemical resistance, low cost, etc. The friction force created between the components is experimentally investigated as a function of two parameters—the substrate diameter and the surface roughness (Ra) of one of the joined elements. The results of the experiments are presented analytically and graphically. Conclusions are drawn regarding the behavior of the studied shrink-fits. They can be beneficial to any engineering project making it less sensitive to manufacturing variations. Full article
Show Figures

Figure 1

Figure 1
<p>The friction force between two objects.</p>
Full article ">Figure 2
<p>Martensite–austenite transformation at SPF.</p>
Full article ">Figure 3
<p>Shrink ring made of NiTiNb shape-memory alloy.</p>
Full article ">Figure 4
<p>Testing machine.</p>
Full article ">Figure 5
<p>Clamping device.</p>
Full article ">Figure 6
<p>The lower clamps together with the rings inserted in the heating module.</p>
Full article ">Figure 7
<p>Mounted clamping device.</p>
Full article ">Figure 8
<p>Graphical representation of the dependence of the friction force created in the shrink-fit joint on the shaft diameter (Substrate Diameter) and the surface roughness.</p>
Full article ">
15 pages, 4640 KiB  
Proceeding Paper
Time Series-Based Load Flow Simulation Algorithm for Distributed Generation in Distribution Networks
by Swathi Tangi, D. N. Gaonkar, A. S. Veerendra and R. Shivarudraswamy
Eng. Proc. 2024, 70(1), 11; https://doi.org/10.3390/engproc2024070011 - 26 Jul 2024
Viewed by 562
Abstract
This paper proposes a load flow model to estimate the actual power output by incorporating time series data for solar irradiance and wind speed at a specific location. The integration of this time series data into the network is carried out in three [...] Read more.
This paper proposes a load flow model to estimate the actual power output by incorporating time series data for solar irradiance and wind speed at a specific location. The integration of this time series data into the network is carried out in three distinct scenarios: considering only solar output, only wind output, and the combined contribution of solar and wind. These data integration processes are followed by load flow analysis conducted on the standard IEEE 33Bus radial distribution system. The time series simulations are executed using OpenDSS (Open Distribution System Simulator) software, which utilizes a COM (Common Object Model) interface to display results in MATLAB. Full article
Show Figures

Figure 1

Figure 1
<p>Concept of a searching point by PSO.</p>
Full article ">Figure 2
<p>COM interface with MATLAB and OpenDss.</p>
Full article ">Figure 3
<p>PV System model conceptual diagram.</p>
Full article ">Figure 4
<p>Wind system model.</p>
Full article ">Figure 5
<p>Circuit connection of both PV and wind.</p>
Full article ">Figure 6
<p>SLD of 33Bus distribution test system.</p>
Full article ">Figure 7
<p>33 BUS system Voltage profile without DG.</p>
Full article ">Figure 8
<p>33Bus system voltage profile with DG.</p>
Full article ">Figure 9
<p>PV power output.</p>
Full article ">Figure 10
<p>System voltage profile with PV.</p>
Full article ">Figure 11
<p>Wind speed vs. time.</p>
Full article ">Figure 12
<p>Wind power output.</p>
Full article ">Figure 13
<p>Wind power output vs. wind speed.</p>
Full article ">Figure 14
<p>System voltage profile with wind power.</p>
Full article ">Figure 15
<p>PV output power.</p>
Full article ">Figure 16
<p>Wind speed vs. time.</p>
Full article ">Figure 17
<p>Wind power output.</p>
Full article ">Figure 18
<p>Wind power output vs. wind speed.</p>
Full article ">Figure 19
<p>System voltage profile when total output power is minimum.</p>
Full article ">Figure 20
<p>System voltage profile when solar output power is maximum.</p>
Full article ">Figure 21
<p>System voltage profile when wind output power is maximum.</p>
Full article ">Figure 22
<p>System voltage profile when total output power is maximum.</p>
Full article ">
10 pages, 2971 KiB  
Proceeding Paper
Design and Implementation of Educational Game Using Crossword Principles
by Atanaska Bosakova-Ardenska and Dimitar Andreev
Eng. Proc. 2024, 70(1), 12; https://doi.org/10.3390/engproc2024070012 - 29 Jul 2024
Viewed by 456
Abstract
In this paper, we developed an educational game with a graphical user interface that uses crossword principles. The architecture of the game is designed using a three-layer software architecture. We developed algorithms for dynamic words’ selection for crossword building. The game is implemented [...] Read more.
In this paper, we developed an educational game with a graphical user interface that uses crossword principles. The architecture of the game is designed using a three-layer software architecture. We developed algorithms for dynamic words’ selection for crossword building. The game is implemented using C#, and it consists of two main modules: one for teachers and the other for students. The developed game is applied in the education of computer engineers in order to assess students’ perceptions of basic terms in C/C++ programming. A survey of students’ interaction with the developed game is conducted in order to evaluate their perception of the gamification the education processes in the field of computer programming. The results indicate that usage of the computer-based crossword accelerates the educational process during the semester, and the game is a useful tool for motivating study throughout the whole academic year. Full article
Show Figures

Figure 1

Figure 1
<p>Crossword game architecture.</p>
Full article ">Figure 2
<p>Algorithm for long word choice and unique letters definition.</p>
Full article ">Figure 3
<p>Algorithm for short words preparation.</p>
Full article ">Figure 4
<p>Graphical user interface (GUI) of DACrossword game: (<b>a</b>) students mode; (<b>b</b>) teachers mode.</p>
Full article ">Figure 5
<p>Participants in educational game testing.</p>
Full article ">Figure 6
<p>Survey results.</p>
Full article ">
9 pages, 3086 KiB  
Proceeding Paper
Experimental Study of the Pin Loads in a Full Pinion Engagement Planetary Gear Train
by Vladislav Ivanov, Angel Alexandrov, Dragomir Vrazhilski, Elitsa Tomova-Damyanova, Veselin Tsonev, Nikola Kuzmanov and Aleksandar Popov
Eng. Proc. 2024, 70(1), 13; https://doi.org/10.3390/engproc2024070013 - 31 Jul 2024
Viewed by 382
Abstract
Very few experimental studies of full pinion engagement planetary gear trains have been published; therefore, their behavior under load is little known. In this paper, the results from the experimental studies of the above-mentioned gear trains are presented, whereby the bending stresses in [...] Read more.
Very few experimental studies of full pinion engagement planetary gear trains have been published; therefore, their behavior under load is little known. In this paper, the results from the experimental studies of the above-mentioned gear trains are presented, whereby the bending stresses in the planet pins are displayed both in time and frequency domains by means of fast Fourier transform (FFT). The experiments are conducted on a mechanical closed-loop test rig, which was designed especially for the experiments. The bending stresses in the pins are measured by strain gauges, which are mounted in a double half-bridge configuration, thus showing the stresses in two perpendicular planes. The torque applied is 200 Nm. The radial run-out errors of the planets are measured and their relation to the pin loads are analyzed. Full article
Show Figures

Figure 1

Figure 1
<p>Full pinion engagement planetary gear train with 12 planets.</p>
Full article ">Figure 2
<p>Mechanical closed-loop test rig.</p>
Full article ">Figure 3
<p>Strain gauges mounted in a double half-bridge configuration.</p>
Full article ">Figure 4
<p>Experimental results in time and frequency domain for planet 1: (<b>a</b>) in radial direction; (<b>b</b>) in tangential direction.</p>
Full article ">Figure 5
<p>Experimental results in time and frequency domain for planet 2: (<b>a</b>) in radial direction; (<b>b</b>) in tangential direction.</p>
Full article ">Figure 6
<p>Experimental results in time and frequency domain for planet 12: (<b>a</b>) in radial direction; (<b>b</b>) in tangential direction.</p>
Full article ">Figure 7
<p>Torque applied to the test rig.</p>
Full article ">
14 pages, 5469 KiB  
Proceeding Paper
Forecasting Traffic Flow Using Machine Learning Algorithms
by Makhamadaziz Rasulmukhamedov, Timur Tashmetov and Komoliddin Tashmetov
Eng. Proc. 2024, 70(1), 14; https://doi.org/10.3390/engproc2024070014 - 31 Jul 2024
Viewed by 594
Abstract
This article is dedicated to the study of traffic flow forecasting at the intersection of Bogishamol Street in Tashkent, Uzbekistan. In the context of the rapid growth of vehicular traffic and frequent congestion, developing effective forecasting models is a pressing task that will [...] Read more.
This article is dedicated to the study of traffic flow forecasting at the intersection of Bogishamol Street in Tashkent, Uzbekistan. In the context of the rapid growth of vehicular traffic and frequent congestion, developing effective forecasting models is a pressing task that will help optimize traffic flow management. The research examines and analyzes various machine learning methods, such as decision trees, random forests, and gradient boosting, for predicting traffic intensity. The data for the models was collected using video cameras installed at the intersection which provided accurate and up-to-date traffic flow information. The main focus of the study is on the comparative analysis of the performance of these methods. The comparison was made using various evaluation metrics, such as the coefficient of determination (R2), mean squared error (MSE), and mean absolute error (MAE). These metrics allowed for an objective assessment of the accuracy and effectiveness of each method in the context of traffic flow prediction. The results of the study showed that the gradient boosting model demonstrated the best performance among the methods considered. It achieved the highest R2 values and the lowest MSE and MAE values, indicating its high accuracy and ability to adequately predict changes in traffic flows. The decision tree and random forest models also showed good results but were outperformed by gradient boosting in key indicators. The findings have significant practical implications. They can be used to develop intelligent traffic management systems aimed at increasing the capacity of roads and intersections. This, in turn, can help reduce congestion, lower emissions of harmful substances into the atmosphere, and decrease economic costs associated with traffic delays. Full article
Show Figures

Figure 1

Figure 1
<p>Structural representation of the decision tree. This decision tree represents a regression model used to predict some target variable based on two features: hour and week.</p>
Full article ">Figure 2
<p>Average and median values of daily traffic intensity (<b>a</b>); average traffic volume on weekdays and weekends (<b>b</b>).</p>
Full article ">Figure 3
<p>Correlation matrix showing the relationships between various features: vehicles, day, week, month, and time.</p>
Full article ">Figure 4
<p>Prediction results using the decision tree algorithm (<b>a</b>) test dataset with max_depth = 5; (<b>b</b>) validation dataset with max_depth = 5; (<b>c</b>) test dataset with max_depth = 50; (<b>d</b>) validation dataset with max_depth = 50; (<b>e</b>) test dataset with max_depth = 100; (<b>f</b>) validation dataset with max_depth = 100.</p>
Full article ">Figure 5
<p>Prediction results using the random forest algorithm. (<b>a</b>,<b>c</b>,<b>e</b>,<b>g</b>): Predictions on the test dataset with max_depth = 50 and n_estimators = 10, 100, 500, 1000; (<b>b</b>,<b>d</b>,<b>f</b>,<b>h</b>): Predictions on the validation dataset with max_depth = 50 and n_estimators = 10, 100, 500, 1000.</p>
Full article ">Figure 6
<p>Prediction results using the gradient boosting algorithm. (<b>a</b>,<b>c</b>,<b>e</b>,<b>g</b>): Predictions on the test dataset with max_depth = 5 and n_estimators = 10, 100, 500, 1000; (<b>b</b>,<b>d</b>,<b>f</b>,<b>h</b>): Predictions on the validation dataset with max_depth = 5 and n_estimators = 10, 100, 500, 1000.</p>
Full article ">Figure 6 Cont.
<p>Prediction results using the gradient boosting algorithm. (<b>a</b>,<b>c</b>,<b>e</b>,<b>g</b>): Predictions on the test dataset with max_depth = 5 and n_estimators = 10, 100, 500, 1000; (<b>b</b>,<b>d</b>,<b>f</b>,<b>h</b>): Predictions on the validation dataset with max_depth = 5 and n_estimators = 10, 100, 500, 1000.</p>
Full article ">
11 pages, 494 KiB  
Proceeding Paper
Blockchain-Integrated Chatbots and IoT: Transforming Food Delivery
by Daniela Mechkaroska and Ervin Domazet
Eng. Proc. 2024, 70(1), 15; https://doi.org/10.3390/engproc2024070015 - 31 Jul 2024
Viewed by 971
Abstract
Changing customer experiences and conventional business models, the convergence of cutting-edge technologies like blockchain, chatbots, and the Internet of Things (IoT) has triggered revolutions across industries. Customers want personalized, easy, and meaningful interactions in today’s digital world, so traditional retail and service models [...] Read more.
Changing customer experiences and conventional business models, the convergence of cutting-edge technologies like blockchain, chatbots, and the Internet of Things (IoT) has triggered revolutions across industries. Customers want personalized, easy, and meaningful interactions in today’s digital world, so traditional retail and service models are changing to online platforms and round-the-clock digital support. Blockchain-integrated chatbots give users a reliable platform for communication and transactions by utilizing the security and transparency of blockchain technology. These artificial intelligence (AI)-driven chatbots are revolutionizing digital interactions by conversing with users in natural language, managing transactions, and providing tailored support. IoT devices, on the other hand, bring in a new era of connectedness by giving commonplace things the ability to sense, process, and communicate. IoT devices optimize delivery processes and guarantee that the quality and safety criteria are satisfied in the food delivery industry. Blockchain-integrated chatbots are a disruptive force that improves delivery process efficiency, transparency, and trust when integrated with IoT devices. This study examines how blockchain, chatbots, and IoT technologies might be integrated into the food delivery sector, emphasizing the advantages and potential ramifications of doing so. Full article
Show Figures

Figure 1

Figure 1
<p>The flowchart of the integration of IoT devices in blockchain-based food delivery chatbots.</p>
Full article ">
10 pages, 4336 KiB  
Proceeding Paper
Modification of U-Net with Pre-Trained ResNet-50 and Atrous Block for Polyp Segmentation: Model TASPP-UNet
by Assel Mukasheva, Dina Koishiyeva, Gani Sergazin, Madina Sydybayeva, Dinargul Mukhammejanova and Syrym Seidazimov
Eng. Proc. 2024, 70(1), 16; https://doi.org/10.3390/engproc2024070016 - 31 Jul 2024
Viewed by 705
Abstract
Colorectal cancer is the third most prevalent type of cancer globally, and it typically progresses unnoticed, making early detection via effective screening methods crucial. This study presents the TASPP-UNet, an advanced deep learning model that integrates Atrous Spatial Pyramid Pooling (ASPP) blocks and [...] Read more.
Colorectal cancer is the third most prevalent type of cancer globally, and it typically progresses unnoticed, making early detection via effective screening methods crucial. This study presents the TASPP-UNet, an advanced deep learning model that integrates Atrous Spatial Pyramid Pooling (ASPP) blocks and a ResNet-50 encoder to enhance polyp boundary delineation accuracy in colonoscopy images. We utilized augmented datasets from Kvasir-SEG and CVC Clinic-DB, which included up to 2000 images, to enrich the training examples’ variability. The TASPP-UNet achieved a superior IOU of 0.9276, compared to 0.9128 by the ResNet50-UNet and 0.8607 by the standard U-Net, demonstrating its efficacy in precise segmentation tasks. Notably, this model exhibited impressive computational efficiency with a processing speed of 151.1 frames per second (FPS), underscoring its potential for real-time clinical applications aimed at early and accurate colorectal cancer detection. This performance highlights the model’s capability not only to improve diagnostic accuracy but also to enhance clinical workflows, potentially leading to better patient outcomes. Full article
Show Figures

Figure 1

Figure 1
<p>Residual block.</p>
Full article ">Figure 2
<p>ASPP block.</p>
Full article ">Figure 3
<p>TASPP-UNet model architecture.</p>
Full article ">Figure 4
<p>Comparative performance metrics on a training set of colon polyp segmentation methods, where (<b>a</b>) Loss, (<b>b</b>) Dice score, (<b>c</b>) Accuracy score estimation, and (<b>d</b>) Mean IOU estimation by epoch.</p>
Full article ">Figure 5
<p>Comparative analysis on the validation data of colon polyp segmentation methods, where (<b>a</b>) Loss, (<b>b</b>) Dice score, (<b>c</b>) Accuracy score estimation, and (<b>d</b>) Mean IOU estimation by epoch.</p>
Full article ">Figure 6
<p>Comparison of polyp segmentation methods (overlaying predicted results are presented on images and areas with segmentation errors are highlighted in blue).</p>
Full article ">Figure 7
<p>Three samples from the test set to compare methods for predicting polyp segmentation (color segmentation is presented on a dark blue background).</p>
Full article ">
13 pages, 5221 KiB  
Proceeding Paper
Deterministic Design Procedures on Limited Field-of-View Planar Arrays for Satellite Communications Employing Aperture Scaling
by Theodoros N. F. Kaifas
Eng. Proc. 2024, 70(1), 17; https://doi.org/10.3390/engproc2024070017 - 31 Jul 2024
Viewed by 376
Abstract
The antenna field of view, the angle range that can be accessed by scanning the main beam of a phased array, is one of the key performance prescriptions especially for space-borne aerials. The classical example of the full Earth, continental and subcontinental field [...] Read more.
The antenna field of view, the angle range that can be accessed by scanning the main beam of a phased array, is one of the key performance prescriptions especially for space-borne aerials. The classical example of the full Earth, continental and subcontinental field of view of the geosynchronous satellite is indicative, and it extends to the medium and lower orbit multibeam telecommunication systems. There, a high-gain, very small beamwidth pencil beam should scan a given service area. At the same time, it should exhibit extremely low sidelobes in order not to present interference to adjacent geographical areas, served by neighboring beams, and keep its grating lobes out of the Earth’s surface. High-throughput telecommunication satellites should comply with those prescriptions to be given permission for placement in orbit. Thus, the motivation for delivering solid methods for the design of limited-field-of-view array antennas is high. A proposal in this direction is presented in the work at hand. Indeed, in the present study a scaling transformation is used to map a wide-angle scanning array to a limited-field-of-view one. We start the design from a Full-Field-of-View array with the appropriate half-power beamwidth, sidelobe level, and directivity index, and then we enlarge it to attain the desired one with the limited-field-of-view pattern characteristics. The potential of the method is solid since it augments the limited-field-of-view design methods using the excellent performance of the respective full-field-of-view ones. As a result, the synthesis of a limited-field-of-view array can use any of the well-known array synthesis methods in conjunction with the right scaling. Additionally, one can employ design methods that rely on sampling of planar aperture distributions. Various design examples, employing both sampling of continuous apertures and utilizing classical full-field-of-view array synthesis methods, are included and presented in detail, verifying the merit of our approach. Full article
Show Figures

Figure 1

Figure 1
<p>The initial full-field-of-view (red) and the resulting limited-field-of-view (green) array patterns after the scaling procedure.</p>
Full article ">Figure 2
<p>cos<span class="html-italic">θ</span>/cos<span class="html-italic">θ</span>′ = cos<span class="html-italic">θ<sub>F</sub></span>/cos<span class="html-italic">θ<sub>L</sub></span> as a function of FFoV range.</p>
Full article ">Figure 3
<p>The flowchart of the design procedure.</p>
Full article ">Figure 4
<p>Power pattern: (<b>a</b>) red: without element pattern, green: with element pattern, and (<b>b</b>) layout of the final array.</p>
Full article ">Figure 5
<p>Power pattern: (<b>a</b>) red: without element pattern, green: with element pattern, and (<b>b</b>) layout of the final array.</p>
Full article ">Figure 6
<p>The power pattern of the designed array for various φ cuts (red: without element pattern, green: with element pattern).</p>
Full article ">Figure 7
<p>The power pattern of the designed array for various φ cuts (red: without element pattern, green: with element pattern).</p>
Full article ">
10 pages, 2393 KiB  
Proceeding Paper
Opportunities for Application of Artificial Intelligence in Telecommunication Projects
by Gergana Dimcheva
Eng. Proc. 2024, 70(1), 18; https://doi.org/10.3390/engproc2024070018 - 1 Aug 2024
Viewed by 728
Abstract
Undoubtedly, artificial intelligence (AI) is entering at a very fast pace into all spheres of activity. More and more organizations are using artificial intelligence, which leads to the optimization of business processes, increased productivity, improved customer experience and more. The applications of AI [...] Read more.
Undoubtedly, artificial intelligence (AI) is entering at a very fast pace into all spheres of activity. More and more organizations are using artificial intelligence, which leads to the optimization of business processes, increased productivity, improved customer experience and more. The applications of AI are numerous. The use of artificial intelligence in project management represents an innovative approach that has the potential to transform traditional methods and lead to significant improvements in project efficiency and success. This paper examines some opportunities for applying AI in project management. Based on a literature review, the main benefits of using AI in project management as well as the challenges faced by project managers are highlighted. An empirical study was conducted among project managers and members of project teams in Bulgarian organizations in the telecommunications sector. Rapid technological development and growing user demands highlight the need to integrate artificial intelligence into telecommunications projects. This, in turn, enables telecommunications companies to manage large-scale and complex projects with greater efficiency, flexibility and innovation. Full article
Show Figures

Figure 1

Figure 1
<p>Artificial intelligence in telecommunication.</p>
Full article ">Figure 2
<p>Artificial intelligence in project management phases.</p>
Full article ">Figure 3
<p>Answers to the question “In which of the following methodologies do you use/would you use AI? (More than one answer is possible)”.</p>
Full article ">Figure 4
<p>Answers to the question “In which of the following areas in project management do you use/would you use AI?”.</p>
Full article ">Figure 5
<p>Answers to the question “How important is it for project managers to be knowledgeable about the capabilities of AI in project management?”.</p>
Full article ">Figure 6
<p>Answers to the question “Would you invest time and resources in improving your AI skills?”.</p>
Full article ">
8 pages, 1254 KiB  
Proceeding Paper
Performance Aspects of Retrodirective RFID Tags
by Theodoros N. F. Kaifas
Eng. Proc. 2024, 70(1), 19; https://doi.org/10.3390/engproc2024070019 - 1 Aug 2024
Viewed by 404
Abstract
Although RFID(radio frequency identification) tags do not require a direct line of sight, their operational range is often characterized as being limited. Indeed, in the case of passive RFID tags, the interrogating signal from the transmitter needs to reach the tag’s radio transponder [...] Read more.
Although RFID(radio frequency identification) tags do not require a direct line of sight, their operational range is often characterized as being limited. Indeed, in the case of passive RFID tags, the interrogating signal from the transmitter needs to reach the tag’s radio transponder and trigger a nearly omnidirectional scattered signal to be harvested by the receiver. This two-way (from Tx to the tag and back to Rx) channel exhibits increased attenuation not only due to the doubled distance (in case Tx and Rx are collocated) but also to the uncontrolled (i.e., unfocused) backscattering. In the work at hand, we propose a way to control the backscattered radiation and focus the produced beam towards the direction of the reader (the Tx-Rx device). Indeed, one can utilize the concept of retrodirective arrays to immediately control the direction of departure of the backscatter link, maximizing the scattered power towards the reader and thus delivering an increase in the operational range of the tag. This of course means that in this case, the tag should be equipped with a minimum of two element radiators. Thus, retrodirective RFID array tags are introduced in the current work to increase the operating range with minimal costs and levels of complexity since 90° hybrids are used to achieve proper backscattering. To evaluate the proposed passive tag array, performance aspects are addressed. Specifically, we examine the Bit Error Rate with respect to the Signal to Noise Ratio for the retrodirective tag, the one antenna, the broadside, and the spatial diversity array. The results prove that the proposed tag allows for a significant increase in the operational range. Full article
Show Figures

Figure 1

Figure 1
<p>Active tags a large distance away from the reader (bridge safety monitoring).</p>
Full article ">Figure 2
<p>Comparison of omnidirectional and retrodirectional answers of the interrogated tag arrays: (<b>a</b>) the tag array response to omnidirectional radiation; (<b>b</b>) the tag array response to retrodirectional radiation.</p>
Full article ">Figure 3
<p>The 1x NTAG x1 backscatter channel is examined in the current work. Note that this is the well-known pin- (key-)hole two-way channel model, with the added information that the signal’s direction of departure is the same as the signal’s arrival due to the use of the retrodirective concept, embodied as the scattering matrix of the array antenna’s passive (self-)feeding network.</p>
Full article ">Figure 4
<p>Average BER versus SNR.</p>
Full article ">
13 pages, 34041 KiB  
Proceeding Paper
Programming Industrial Robots in the Fanuc ROBOGUIDE Environment
by Boryan Vladimirov, Stiliyan Nikolov and Stanislav Tsolov
Eng. Proc. 2024, 70(1), 20; https://doi.org/10.3390/engproc2024070020 - 1 Aug 2024
Viewed by 1040
Abstract
Descriptions of the main CARC environments for programming industrial robots are given, describing the main used programming environments for various robot manufacturers such as ROBOGUIDE developed by FANUC Robotics, KUKA Sim and Kuka Work Visual developed by KUKA ROBOTICS, Robot Studio developed by [...] Read more.
Descriptions of the main CARC environments for programming industrial robots are given, describing the main used programming environments for various robot manufacturers such as ROBOGUIDE developed by FANUC Robotics, KUKA Sim and Kuka Work Visual developed by KUKA ROBOTICS, Robot Studio developed by ABB Robotics, K-ROSET and K-ROSET LITE developed by Kawasaki Robotics, Visual Component, DELMIA ROBOTICS of Dassault Systems, Tecnomatix Robotics & Automation Simulation of SIEMENS PLM Software/Simatic Robot Integrator, Visual Components, etc. A methodology describing the main stages, when working with computer systems, of off-line programming of industrial robots is proposed. The features characterizing the implementation of the stages defined in the methodology have been specified. The created methodology has been applied when working with the Fanuc ROBOGUIDE computer system. When using the given example of the Fanuc ROBOGUIDE, the emphasis is also on expanding the working space of the robot (Robot Envelope) by adding a 7th axis. The general software options that are added when performing this task are described, and two sample programs are given for the implementation of the given example—and a 3D simulation is made for moving a part (box). A control program has been generated for an industrial robot Fanuc LR Mate 200 iD/7L that shall perform “Pick and Place” operations and shall service a conveyor for the transportation of cartons and their arrangement on pallets. Full article
Show Figures

Figure 1

Figure 1
<p>Data processing in Fanuc ROBOGUIDE.</p>
Full article ">Figure 2
<p>Robo guide—robot selection menu.</p>
Full article ">Figure 3
<p>Fanuc LR Mate 200 iD/7L [<a href="#B11-engproc-70-00020" class="html-bibr">11</a>]: (<b>a</b>) actual robot; (<b>b</b>) 3D model provided by ROBOGUIDE.</p>
Full article ">Figure 4
<p>Vacuum gripper: (<b>a</b>) 3D model provided by ROBOGUIDE; (<b>b</b>) dialog for the selection of gripper’s parameters.</p>
Full article ">Figure 5
<p>Setting the gripper’s end point.</p>
Full article ">Figure 6
<p>Dialog for the generation of a 3D model of the manipulated workpiece.</p>
Full article ">Figure 7
<p>Three-dimensional models embedded in the robotic cell: (<b>a</b>) pallet; (<b>b</b>) conveyor.</p>
Full article ">Figure 8
<p>Dialog generating the mobile platform’s 3D model with a length of 4 m.</p>
Full article ">Figure 9
<p>Three-dimensional model of the robotic cell.</p>
Full article ">Figure 10
<p>Tools for the development of a control program: (<b>a</b>) setting coordinates in program simulation editor; (<b>b</b>) Teach pendant virtual console—including 7th (−J7/+j7) and 8th (J8/+J8) axes in the controller.</p>
Full article ">Figure 11
<p>First left box on pallet with example coordinates.</p>
Full article ">Figure 12
<p>First right box on pallet with example coordinates.</p>
Full article ">Figure 13
<p>Third left box on pallet with example coordinates.</p>
Full article ">Figure 14
<p>Third right box on pallet with example coordinates.</p>
Full article ">
14 pages, 9536 KiB  
Proceeding Paper
A Simulation Tool for Security in ZigBee-Based IoT Networks
by Marieta Yordanova, Aydan Haka, Veneta Aleksieva and Hristo Valchanov
Eng. Proc. 2024, 70(1), 21; https://doi.org/10.3390/engproc2024070021 - 1 Aug 2024
Viewed by 591
Abstract
The rapid development of IoT technologies leads to their wide use in various spheres of life such as healthcare, agriculture, automotive, etc. IoT devices generate a large amount of data, which, if accessed without authorization, can lead to problems for both organizations and [...] Read more.
The rapid development of IoT technologies leads to their wide use in various spheres of life such as healthcare, agriculture, automotive, etc. IoT devices generate a large amount of data, which, if accessed without authorization, can lead to problems for both organizations and individuals. Therefore, security in IoT networks is a critical aspect. Due to the limited computing resources and memory of IoT devices, cryptographic algorithms are often used for their efficiency. One of the widely used cryptographic algorithms in IoT is the symmetric AES algorithm. It is the main encryption algorithm in ZigBee IoT networks. This paper presents the realization of a simulation environment that enables the investigation of the secure connection process of end nodes in a ZigBee wireless IoT network. The developed environment makes it possible to simulate the process of the secure connection of an end device in a ZigBee network. The simulation makes it possible to trace the process of obtaining an encrypted network key from the trust center based on ZigBee specifications. It is also possible to simulate the process of denying access of an end device to the network. The simulation environment implements network key encryption using the install code or a well-known key defined by the ZigBee Alliance. The encryption functionality in the simulator is realized through the implementation of the AES cryptographic algorithm. Full article
Show Figures

Figure 1

Figure 1
<p>IoT security solutions using cryptographic methods [<a href="#B7-engproc-70-00021" class="html-bibr">7</a>,<a href="#B8-engproc-70-00021" class="html-bibr">8</a>,<a href="#B9-engproc-70-00021" class="html-bibr">9</a>,<a href="#B10-engproc-70-00021" class="html-bibr">10</a>,<a href="#B11-engproc-70-00021" class="html-bibr">11</a>,<a href="#B12-engproc-70-00021" class="html-bibr">12</a>,<a href="#B13-engproc-70-00021" class="html-bibr">13</a>,<a href="#B14-engproc-70-00021" class="html-bibr">14</a>,<a href="#B15-engproc-70-00021" class="html-bibr">15</a>,<a href="#B16-engproc-70-00021" class="html-bibr">16</a>,<a href="#B17-engproc-70-00021" class="html-bibr">17</a>,<a href="#B18-engproc-70-00021" class="html-bibr">18</a>,<a href="#B19-engproc-70-00021" class="html-bibr">19</a>,<a href="#B20-engproc-70-00021" class="html-bibr">20</a>,<a href="#B21-engproc-70-00021" class="html-bibr">21</a>,<a href="#B22-engproc-70-00021" class="html-bibr">22</a>,<a href="#B23-engproc-70-00021" class="html-bibr">23</a>,<a href="#B24-engproc-70-00021" class="html-bibr">24</a>].</p>
Full article ">Figure 2
<p>Denied access to join the network.</p>
Full article ">Figure 3
<p>Joining using a preconfigured trust center link key.</p>
Full article ">Figure 4
<p>Installation code assignment to the end device.</p>
Full article ">Figure 5
<p>Network initialization.</p>
Full article ">Figure 6
<p>Depiction of the connection process.</p>
Full article ">Figure 7
<p>Endpoint configurations.</p>
Full article ">Figure 8
<p>Network initialization waiting for incoming connection requests.</p>
Full article ">Figure 9
<p>The process of denying access to the network.</p>
Full article ">Figure 10
<p>The process of establishing a secure connection.</p>
Full article ">Figure 11
<p>Authenticated devices on the network.</p>
Full article ">Figure 12
<p>Receiving the network key and its encryption.</p>
Full article ">
6 pages, 2764 KiB  
Proceeding Paper
CAD Representation of the Mullins Effect from the SEGE 80 Flexible Coupling Model
by Stefan Tenev, Ismail Mehmedov, Aleksandrina Bankova, Nina Nedeva, Stefan Stefanov, Rosen Hristov, Asparuh Atanasov, Plamen Nikolov and Svetoslav Petrov
Eng. Proc. 2024, 70(1), 22; https://doi.org/10.3390/engproc2024070022 - 2 Aug 2024
Viewed by 447
Abstract
A Mullins simulation was conducted to analyze the effects of loading and unloading of a flexible-type SEGE coupling with a nominal torque of Tnom=80 Nm and maximum torque of [...] Read more.
A Mullins simulation was conducted to analyze the effects of loading and unloading of a flexible-type SEGE coupling with a nominal torque of Tnom=80 Nm and maximum torque of Tmax=120 Nm. The coupling’s properties were determined by examining its moment characteristics at T=120, 100, 80, 60, 40, and 20 Nm. The correlation between the Mullins effect results obtained from the SEGE coupling load simulation via SolidWorks 2022 software and the actual experimental data was examined. Full article
Show Figures

Figure 1

Figure 1
<p>Flexible-type SEGE 80 coupling.</p>
Full article ">Figure 2
<p>Experimental study of the SEGE 80 coupling in terms of the damping capability of the Mullins effect.</p>
Full article ">Figure 3
<p>Elastic-type SEGE 80 coupling.</p>
Full article ">Figure 4
<p>Contact surface on the working cylindrical surfaces.</p>
Full article ">Figure 5
<p>Rubber element deformation of SEGE 80 coupling with <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>T</mi> </mrow> <mrow> <mi>m</mi> <mi>a</mi> <mi>x</mi> </mrow> </msub> <mo>=</mo> <mn>120</mn> <mtext> </mtext> <mi mathvariant="normal">N</mi> <mi mathvariant="normal">m</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>Simulation study of the SEGE 80 coupling in terms of the damping capability of the Mullins effect.</p>
Full article ">
11 pages, 3041 KiB  
Proceeding Paper
Water Flow Management System with Equipment Protection
by Todor Todorov and Valentin Tonkov
Eng. Proc. 2024, 70(1), 23; https://doi.org/10.3390/engproc2024070023 - 2 Aug 2024
Viewed by 531
Abstract
Water scarcity is a growing problem in many regions. Therefore, intelligent management of the available water is needed. Aside from using water mains directly in households and farms, hydrophores are often used for local water system creation. Water tanks are filled with water [...] Read more.
Water scarcity is a growing problem in many regions. Therefore, intelligent management of the available water is needed. Aside from using water mains directly in households and farms, hydrophores are often used for local water system creation. Water tanks are filled with water when available in the water mains, and then the water is extracted with a hydrophore. Wells are also used as alternative water sources. Filling the tank manually requires human presence and can lead to water overflow. It is also better if the hydrophore is protected by switching it on or off depending on the water level measured, current, and pressure in its balloon. This paper presents a water management system designed to address these issues. The system utilizes various sensors to monitor water levels, pressure, and current. Microcontrollers analyze sensor data and control hydrophores and valves based on user-defined parameters. The system offers remote monitoring capabilities and can be configured for different water source scenarios (tanks vs. wells). The system was successfully implemented in real-world settings, including a factory. The benefits of the water management system include hydrophore protection, autonomous water management, and valuable data on well recovery rates and hydrophore operation cycles. Full article
Show Figures

Figure 1

Figure 1
<p>System illustration of the WTHC device.</p>
Full article ">Figure 2
<p>Simplified workflow of water management tasks.</p>
Full article ">Figure 3
<p>Design for pseudo-multitasking.</p>
Full article ">Figure 4
<p>System application.</p>
Full article ">Figure 5
<p>Monitoring of the water level of a well.</p>
Full article ">Figure 6
<p>Replenishment rate of a well at the beginning of summer.</p>
Full article ">Figure 7
<p>Replenishment rate of a well in autumn.</p>
Full article ">Figure 8
<p>Data from a PHC device.</p>
Full article ">
12 pages, 5067 KiB  
Proceeding Paper
Indirect Determination of Basic Tomato Quality Parameters Using Color Digital Images
by Tsvetelina Georgieva, Petya Veleva, Stefka Atanassova and Plamen Daskalov
Eng. Proc. 2024, 70(1), 24; https://doi.org/10.3390/engproc2024070024 - 6 Aug 2024
Viewed by 428
Abstract
The indirect determination of basic tomato quality parameters using color digital images is presented in the paper. A database of images of tomatoes of the Clarosa variety was formed. The six main chemical parameters, dry matter, ascorbic acid, titratable organic acids, total dyes, [...] Read more.
The indirect determination of basic tomato quality parameters using color digital images is presented in the paper. A database of images of tomatoes of the Clarosa variety was formed. The six main chemical parameters, dry matter, ascorbic acid, titratable organic acids, total dyes, lycopene, and beta-carotene, were measured as referent values. Image processing techniques were used for the extraction of the color components, to remove the background, and for color spaces transformation. The values of the color components of four color models, RGB, HSV, XYZ, and Lab, were obtained in the MATLAB environment. Statistical approaches were used for assessing the relation between the main chemical parameters of tomatoes and the color components. The results of the correlation analysis showed that there were the following relationships between the color components and the chemical indicators: the dry substance had a moderate dependence with R(RGB), S(HSV), and b(Lab) and a significant dependence with H(HSV) and a(Lab); the ascorbic acid substance had a moderate dependence with H(HSV), S(HSV), and a(Lab); the titratable organic acids had a moderate dependence with S(HSV) and b(Lab); a significant dependence was found with R(RGB), and a strong dependence was found with V(HSV), L(Lab), a(Lab), X(XYZ), and Y(XYZ); the general dyes had a significant dependence with H(HSV), S(HSV), and a(Lab); the lycopene had a significant dependence with H(HSV), S(HSV),a and a(Lab); the beta-carotene had a significant dependence with R(RGB), G(RGB), B(RGB), V(HSV), L(Lab), X(XYZ), Y(XYZ), and Z(XYZ). The obtained results showed that the chemical composition values of tomatoes could be predicted with polynomial regression models that use color components from the HSV and Lab models: dry matter-H(HSV); ascorbic acid-H(HSV); titratable organic acids-a(Lab); general dyes-H(HSV), S(HSV), and a(Lab); lycopene-H(HSV), S(HSV), and a(Lab). For the determination of beta-carotene, it is necessary to use more than one color component to obtain mathematical models with a higher coefficient of determination. The obtained results are a prerequisite for this approach to be used in the automated systems for evaluating the quality of tomatoes in the harvesting process. Full article
Show Figures

Figure 1

Figure 1
<p>Color digital images of a tomato fruit: (<b>a</b>) Lab; (<b>b</b>) HSV; and (<b>c)</b> XYZ.</p>
Full article ">Figure 2
<p>Three color models integrated into this tool: (<b>a</b>) RGB; (<b>b</b>) HSV; and (<b>c</b>) Lab.</p>
Full article ">Figure 3
<p>Regression models of the dependence of dry matter: (<b>a</b>) H and a color components (<b>b</b>).</p>
Full article ">Figure 4
<p>Regression models of the dependence of ascorbic acid: (<b>a</b>) H and S color components (<b>b</b>).</p>
Full article ">Figure 5
<p>Regression models of the dependence of titratable organic acids: (<b>a</b>) V color component and (<b>b</b>) L color component.</p>
Full article ">Figure 6
<p>Regression models of the dependence of common dyes: (<b>a</b>) H and (<b>b</b>) S color components.</p>
Full article ">Figure 7
<p>Regression models of the dependence of lycopene: (<b>a</b>) H and (<b>b</b>) S color components.</p>
Full article ">Figure 8
<p>Regression models of the dependence beta-carotene: (<b>a</b>) R and (<b>b</b>) G color components.</p>
Full article ">
9 pages, 544 KiB  
Proceeding Paper
Machine Learning for Anomaly Detection in Industrial Environments
by Denitsa Grunova, Vasiliki Bakratsi, Eleni Vrochidou and George A. Papakostas
Eng. Proc. 2024, 70(1), 25; https://doi.org/10.3390/engproc2024070025 - 7 Aug 2024
Viewed by 1858
Abstract
In modern industry, anomaly detection is an important part of safety and productivity management. Early anomaly detection could allow for timely interventions, preventing malfunctions and reducing risks for human workers and machines. This work aims to deliver an overview of the use of [...] Read more.
In modern industry, anomaly detection is an important part of safety and productivity management. Early anomaly detection could allow for timely interventions, preventing malfunctions and reducing risks for human workers and machines. This work aims to deliver an overview of the use of machine learning for anomaly detection in industrial environments, highlight the state-of-the-art, and discuss challenges and prospects for future research. Existing approaches, methodologies, and results related to anomaly detection are summarized, focusing on the application of machine learning for different types of industrial anomalies. Research findings indicate that, despite the current advances, there is still room for improvements and developments in machine learning-based anomaly detection in industrial environments, designating an important future field of research. Full article
Show Figures

Figure 1

Figure 1
<p>Research methodology.</p>
Full article ">
9 pages, 945 KiB  
Proceeding Paper
Experimental Determination of Bicycles and Electric Bicycle Stopping Distance
by Daniel Lyubenov, Seher Kadirova, Georgi Kadikyanov, Zhivko Kolev and Dzhemal Topchu
Eng. Proc. 2024, 70(1), 26; https://doi.org/10.3390/engproc2024070026 - 7 Aug 2024
Viewed by 379
Abstract
This work presents the results of an experimental study of the braking properties of bicycles and an e-bicycle. Data on braking decelerations and braking distance under different braking conditions were obtained for different bicycles including an e-bicycle. A satellite receiver was used to [...] Read more.
This work presents the results of an experimental study of the braking properties of bicycles and an e-bicycle. Data on braking decelerations and braking distance under different braking conditions were obtained for different bicycles including an e-bicycle. A satellite receiver was used to receive the data and specialized software was used for their processing. The specialized literature lacks data on the braking properties of bicycles for Bulgarian road conditions, which are necessary for any expert investigations of accidents involving cyclists. An initial database of bicycle braking decelerations for various braking conditions was compiled. The obtained results on the braking properties should be very useful in the preparation of auto-technical examinations for the court and the police, as well as for improvements in road traffic safety. Full article
Show Figures

Figure 1

Figure 1
<p>Acceleration (blue line) and velocity (red line) records.</p>
Full article ">Figure 2
<p>Braking distance of a Cross Fusion bike.</p>
Full article ">Figure 3
<p>Braking distance of Probike Melody Bike.</p>
Full article ">Figure 4
<p>Braking distance of an Ultra Explorer e-bike.</p>
Full article ">
11 pages, 2551 KiB  
Proceeding Paper
Design and Development of a Medical Clinic Service System
by Kristian Ivanov, Milena Karova and Gergana Spasova
Eng. Proc. 2024, 70(1), 27; https://doi.org/10.3390/engproc2024070027 - 7 Aug 2024
Viewed by 403
Abstract
This article describes a system for servicing and enhancing the efficiency of medical clinic operations. The developed system facilitates the patients of the medical clinic by providing rapid and convenient access to their comprehensive medical records. Leveraging advanced technology, this system is poised [...] Read more.
This article describes a system for servicing and enhancing the efficiency of medical clinic operations. The developed system facilitates the patients of the medical clinic by providing rapid and convenient access to their comprehensive medical records. Leveraging advanced technology, this system is poised to significantly improve patient health outcomes. The experiments are made as average time for response from web service and application testing with patient feedback. The quality of patients’ health is expected to improve significantly with the smart system using advanced technology. Full article
Show Figures

Figure 1

Figure 1
<p>Conceptual scheme of database model.</p>
Full article ">Figure 2
<p>Communication between mobile device and server via API.</p>
Full article ">Figure 3
<p>Structure of algorithm for API.</p>
Full article ">Figure 4
<p>Communication between a mobile device and the server using an API to access the AI modules.</p>
Full article ">Figure 5
<p>Artificial Intelligence module learning process.</p>
Full article ">
8 pages, 4966 KiB  
Proceeding Paper
Development of a Software System for Controlling Dosing Machines
by Gergana Spasova, Milena Karova and Ivaylo Penev
Eng. Proc. 2024, 70(1), 28; https://doi.org/10.3390/engproc2024070028 - 7 Aug 2024
Viewed by 396
Abstract
The liquid dosing system consists of machines and a computer (PC). The machines and the computer are connected to each other and communicate via the RS485 interface. The software installed on a computer (PC) consists of two separate modules (applications)—“server” and “operator”. The [...] Read more.
The liquid dosing system consists of machines and a computer (PC). The machines and the computer are connected to each other and communicate via the RS485 interface. The software installed on a computer (PC) consists of two separate modules (applications)—“server” and “operator”. The server runs continuously and communicates to and from the machines. Through the operator module, the nomenclature of customers, liquids, and cards can be created and edited. The operator module makes it possible to perform various operations such as loading credit on a card, blocking and unblocking cards, editing customer or card data, and others. Various reports can be made, such as a report on the consumption of a given customer, a report on the use of the customer card, a report on the liquid consumed, etc. The goal of the system is to perform automated dosing of liquid at the customer’s request, without the involvement of another person (operator). The choice of liquid, the amount, and the payment of the choice made is fully automatic. Payment is only by card, as in case of an attempt to make a dosage and insufficient availability for payment, the dosage is not carried out. The customer is informed of a small credit on the card. The connection between the machine and the operator display is based on a query from the display. The operator’s job involves replacing empty bottles in the machine and monitoring and following up on system irregularities. Full article
Show Figures

Figure 1

Figure 1
<p>Conceptual model.</p>
Full article ">Figure 2
<p>UML diagram of the server application.</p>
Full article ">Figure 3
<p>Algorithm of operation of the “server” application.</p>
Full article ">Figure 4
<p>UML diagram of the operator application.</p>
Full article ">Figure 5
<p>Algorithm of operation of the “operator” application.</p>
Full article ">Figure 6
<p>Visualization of the machines.</p>
Full article ">Figure 7
<p>Data on the bottles in the machine.</p>
Full article ">Figure 8
<p>Bottle data in the database.</p>
Full article ">
7 pages, 1854 KiB  
Proceeding Paper
Beyond the Physical Environment: Integrating Individual Perception for Context-Related Adaptation
by Yasen Kalinin and Miroslav Markov
Eng. Proc. 2024, 70(1), 29; https://doi.org/10.3390/engproc2024070029 - 7 Aug 2024
Viewed by 343
Abstract
Current approaches to context-related studies primarily emphasize monitoring temporal changes in the physical environment to achieve context awareness. However, these approaches often overlook the individual’s subjective perception of these contextual changes. Even psychological studies tend to attribute contextual influences solely to external parameters, [...] Read more.
Current approaches to context-related studies primarily emphasize monitoring temporal changes in the physical environment to achieve context awareness. However, these approaches often overlook the individual’s subjective perception of these contextual changes. Even psychological studies tend to attribute contextual influences solely to external parameters, neglecting the nuanced human perception of such changes. In this paper, we propose a novel concept for context-related adaptation rooted in the individual’s perception of contextual changes. To address this question, we conducted an experiment involving 18 volunteers to assess the contextual influence of controlled stimuli on each participant individually. Through the collection of both objective data and self-reported subjective assessments, we present initial results indicating the potential for integrating individual perception into context-related adaptation. These findings strongly suggest that contextual changes influence each person in correspondence with their own personal traits, underscoring the relevance of the proposed concept and the need for future research in this direction. Moreover, several challenges remain, particularly in developing a reliable model for assessing human subjective perception. These challenges include obtaining sufficient data from multiple modalities and implementing real domain-specific context scenarios. Full article
Show Figures

Figure 1

Figure 1
<p>Conceptual architecture of an individualized context-related adaptation for collaborative human–machine interaction systems.</p>
Full article ">Figure 2
<p>Workflow of decisions for adaptation based on the iHMIfr. The experimental validation focus is depicted in green.</p>
Full article ">Figure 3
<p>Personal reactions to the context changes from different participants. The sequence of the distractors is as follows: LIGHT; NOISE; and BOTH.</p>
Full article ">Figure 3 Cont.
<p>Personal reactions to the context changes from different participants. The sequence of the distractors is as follows: LIGHT; NOISE; and BOTH.</p>
Full article ">Figure 4
<p>Subjective assessment of the context state impact reported by the participants.</p>
Full article ">
9 pages, 4813 KiB  
Proceeding Paper
Harvesting Human Energy to Power Head Torches Using a Thermoelectric Generator
by Elaf J. Majeed and Amani J. Majeed
Eng. Proc. 2024, 70(1), 30; https://doi.org/10.3390/engproc2024070030 - 7 Aug 2024
Cited by 1 | Viewed by 514
Abstract
People dissipate energy constantly, from their heartbeat to their footsteps. However, scientists are developing a technique for capturing power from human beings and converting it electricity that can power electronic medical devices or other devices that need low voltage. Energy harvesting and bioelectronics [...] Read more.
People dissipate energy constantly, from their heartbeat to their footsteps. However, scientists are developing a technique for capturing power from human beings and converting it electricity that can power electronic medical devices or other devices that need low voltage. Energy harvesting and bioelectronics researchers are currently exploring this form of energy recycling. Mechanical, chemical, and thermal energy are the three primary forms of energy in the human body. This paper focuses on thermal energy sources only, showing that the energy harvested from a person’s head can be used to power a headlamp. A total of seven thermoelectric generators (TEGs) were used, each comprising thirty-five thermocouples. An output voltage of 1.5 volts was obtained from the TEG systems. In addition, an electrical circuit was designed to convert the obtained TEG voltage into another voltage suitable for the headlamp model. Full article
Show Figures

Figure 1

Figure 1
<p>Principle of thermoelectric power generation.</p>
Full article ">Figure 2
<p>The current work’s thermoelectric generator system design.</p>
Full article ">Figure 3
<p>Boost converter.</p>
Full article ">Figure 4
<p>Asynchronous boost converter.</p>
Full article ">Figure 5
<p>Control signal.</p>
Full article ">Figure 6
<p>Boost converter waveforms.</p>
Full article ">Figure 7
<p>Overall system diagram.</p>
Full article ">Figure 8
<p>Temperature distribution of seven thermoelectric generator systems.</p>
Full article ">Figure 9
<p>The voltage distribution in the TEG system.</p>
Full article ">Figure 10
<p>MATLAB Simulink of the step-up converter.</p>
Full article ">Figure 11
<p>Output voltage waveform of the step-up circuit.</p>
Full article ">Figure 12
<p>Output current waveform boost convertor.</p>
Full article ">Figure 13
<p>Output power waveform of the step-up circuit.</p>
Full article ">
9 pages, 4638 KiB  
Proceeding Paper
Comparison of Functionality and Evaluation of Results in Different Prediction Models
by Dimitrios Kazolis, Christos Dionyshs Fotakis and Konstantinos Tramantzas
Eng. Proc. 2024, 70(1), 31; https://doi.org/10.3390/engproc2024070031 - 7 Aug 2024
Viewed by 368
Abstract
This article represents a further step in the continuously developing process of improving the prediction capabilities using databases. Its aim is to compare and evaluate the operation, performance and validity of knowledge extraction techniques related to prediction. The innovative part of this study [...] Read more.
This article represents a further step in the continuously developing process of improving the prediction capabilities using databases. Its aim is to compare and evaluate the operation, performance and validity of knowledge extraction techniques related to prediction. The innovative part of this study concerns the selection, enrichment and processing of the database used. In particular, the database contains consumption data for an entire city over the course of a year. These data were then enriched with elements concerning the determination of the time and the environmental conditions, in order to take into consideration the correlation of the data with these parameters. Subsequently, after being converted into an editable format, they were processed using techniques such as normalization and factor analysis, which finally led to the prediction process. At this stage, different methods, such as decision trees, deep learning and generalized linear models, were applied and thoroughly analyzed, and both their operation and their effectiveness were compared and evaluated. The present effort, therefore, intends to provide a useful tool that will contribute to future efforts to improve predictions from existing data. Full article
Show Figures

Figure 1

Figure 1
<p>Scree plot.</p>
Full article ">Figure 2
<p>Final prediction column.</p>
Full article ">Figure 3
<p>General graph of the performance of each method.</p>
Full article ">Figure 4
<p>Graph of the generalized linear method with the prediction values.</p>
Full article ">Figure 5
<p>General linear model final prediction.</p>
Full article ">Figure 6
<p>Part of the decision tree model.</p>
Full article ">Figure 7
<p>Graph of the decision tree method with the prediction values.</p>
Full article ">Figure 8
<p>Decision tree final prediction.</p>
Full article ">Figure 9
<p>Graph of the deep learning method with the prediction values.</p>
Full article ">Figure 10
<p>Deep learning final prediction.</p>
Full article ">
7 pages, 2993 KiB  
Proceeding Paper
Automatic Detection and Removal of Spiked Points in Hyperspectral Images
by Georgi Manchev, Stanislav Penchev, Tsvetelina Georgieva, Eleonora Kirilova and Plamen Daskalov
Eng. Proc. 2024, 70(1), 32; https://doi.org/10.3390/engproc2024070032 - 8 Aug 2024
Viewed by 422
Abstract
This paper presents an approach to eliminate one of the most common defects in hyperspectral images—the appearance of spiked points at some wavelengths. The elimination of this defect was carried out by means of polynomial regression. The Bayes Information Criterion (BIC) was used [...] Read more.
This paper presents an approach to eliminate one of the most common defects in hyperspectral images—the appearance of spiked points at some wavelengths. The elimination of this defect was carried out by means of polynomial regression. The Bayes Information Criterion (BIC) was used to determine the correct order of the polynomial. Comparison between polynomial regression and classical filtration with the Savitsky–Golay method shows the advantage of the proposed approach, from the point of view of eliminating the defect in a local area, without changing the typical behavior of the spectral feature in the affected image pixels. Full article
Show Figures

Figure 1

Figure 1
<p>Hyperspectral imaging system (<b>a</b>); An example of a pixel spectrum with spike (<b>b</b>).</p>
Full article ">Figure 2
<p>Image with dead pixels (the white vertical line) at 1241 nm (<b>a</b>); The absolute value of the first derivative of a corrupt spectral characteristic and a threshold value (the red line) (<b>b</b>).</p>
Full article ">Figure 3
<p>BIC values for fitting polynomials of order 1 to 5. The smallest value of BIC (presented by the red half circle) corresponds to a 3rd-order polynomial.</p>
Full article ">Figure 4
<p>Fixed image (without dead pixels) at 1241 nm.</p>
Full article ">Figure 5
<p>Representation of the Savitsky–Golay filtering and polynomial interpolation.</p>
Full article ">Figure 6
<p>The local spike area with Savitsky–Golay filtering and polynomial interpolation.</p>
Full article ">
13 pages, 3590 KiB  
Proceeding Paper
Performance Evaluation of Recursive Mean Filter Using Scilab, MATLAB, and MPI (Message Passing Interface)
by Hristina Andreeva and Atanaska Bosakova-Ardenska
Eng. Proc. 2024, 70(1), 33; https://doi.org/10.3390/engproc2024070033 - 8 Aug 2024
Viewed by 445
Abstract
As a popular linear filter, the mean filter is widely used in different applications as a basic tool for image enhancement. Its main purpose is to reduce the noise in an image and thus to prepare the picture for other image-processing operations depending [...] Read more.
As a popular linear filter, the mean filter is widely used in different applications as a basic tool for image enhancement. Its main purpose is to reduce the noise in an image and thus to prepare the picture for other image-processing operations depending on the current task. In the last decade, the amount of data, particularly images, that has to be processed in a variety of applications has increased significantly, and thus the usage of effective and fast filtering algorithms has become crucial. The aim of the present research is to identify what type of software (MATLAB, Scilab, or MPI-based) is preferred for reducing the filtering time and consequently save energy. Thus, the aim of the present research corresponds to actual trends in information processing and corresponds to green computing concepts. A set of experimental images divided into two groups—one for small images and a second one for big images—is used for performance evaluation of the recursive mean filter. This type of linear filter was chosen due to its very good denoising characteristics. The filter is implemented in MATLAB and Scilab environments using their specific commands and it is also implemented using the C language with the MPI library to provide the opportunity for parallel execution. Two mobile computer systems are used for experimental performance evaluation and the results indicate that the slowest filtering execution is registered when Scilab is used and the fastest execution is achieved when MPI is used with the C implementation. Depending on the amount and size of the images that have to be filtered, this study formulates advice for achieving effective performance throughout the whole process of working with images. Full article
Show Figures

Figure 1

Figure 1
<p>Code implementing the RMF in Scilab.</p>
Full article ">Figure 2
<p>Code implementing the RMF in MATLAB.</p>
Full article ">Figure 3
<p>“Conveyer processing” parallel algorithm.</p>
Full article ">Figure 4
<p>Time t1 for the set “Small images” with (<b>a</b>) a mask size of 3; (<b>b</b>) a mask size of 5; (<b>c</b>) a mask size of 7.</p>
Full article ">Figure 5
<p>Time t2 for the set “Small images”: (<b>a</b>) mask size 3; (<b>b</b>) mask size 5; (<b>c</b>) mask size 7.</p>
Full article ">Figure 6
<p>Time t1 for the set “Big images”: (<b>a</b>) mask size 3; (<b>b</b>) mask size 5; (<b>c</b>) mask size 7.</p>
Full article ">Figure 7
<p>Time t2 for the set “Big images”: (<b>a</b>) mask size 3; (<b>b</b>) mask size 5; (<b>c</b>) mask size 7.</p>
Full article ">Figure 8
<p>Speed-up factor for the set “Small images”: (<b>a</b>) mask size 3; (<b>b</b>) mask size 5; (<b>c</b>) mask size 7.</p>
Full article ">Figure 9
<p>Speed-up factor for the set “Big images”: (<b>a</b>) mask size 3; (<b>b</b>) mask size 5; (<b>c</b>) mask size 7.</p>
Full article ">
12 pages, 1755 KiB  
Proceeding Paper
Assessment of Tomato Quality through Near-Infrared Spectroscopy—Advantages, Limitations, and Integration with Multivariate Analysis Techniques
by Mima Todorova, Petya Veleva, Stefka Atanassova, Tsvetelina Georgieva, Miroslav Vasilev and Zlatin Zlatev
Eng. Proc. 2024, 70(1), 34; https://doi.org/10.3390/engproc2024070034 - 8 Aug 2024
Viewed by 510
Abstract
This study conducted a systematic analysis and investigation of near-infrared (NIR) spectroscopy for assessing tomato fruits’ quality. This was combined with the integration of multivariate techniques for analysis to improve existing methods for nondestructive quality assessment of tomato fruits. Variations in tomato characteristics [...] Read more.
This study conducted a systematic analysis and investigation of near-infrared (NIR) spectroscopy for assessing tomato fruits’ quality. This was combined with the integration of multivariate techniques for analysis to improve existing methods for nondestructive quality assessment of tomato fruits. Variations in tomato characteristics were revealed by selecting spectral indices, leading to changes in reflection spectra at different wavelengths. To achieve more accurate predictions, the use of vectors containing various spectral indices became necessary. This study found that predicting key tomato characteristics relies more on the informativeness and predictive ability of vectors derived from spectral indices than on the method used to reduce data volume. Regression models were developed to automate the prediction of six tomato characteristics based on the spectral data. The developed models for vitamin C content, titratable organic acids, and lycopene showed the highest predictive efficiency (over 90%) among the investigated features. These results highlight the potential of regression models to be integrated into automated systems for assessing the quality of tomato fruits, providing sufficiently accurate information to enhance quality control processes. Full article
Show Figures

Figure 1

Figure 1
<p>Spectral characteristics of tomatoes from three varieties, as follows: (<b>a</b>) Manusa, (<b>b</b>) Mirsini, and (<b>c</b>) Red Bounty 27 5a.</p>
Full article ">Figure 2
<p>Selection of informative spectral wavelengths.</p>
Full article ">Figure 3
<p>Regression models—general view for (<b>a</b>) C2 = f(PC<sub>1</sub>,PC<sub>2</sub>); (<b>b</b>) C4 = f(PC<sub>1</sub>,PC<sub>2</sub>); (<b>c</b>) C5 = f(PC<sub>1</sub>,PC<sub>2</sub>).</p>
Full article ">Figure 4
<p>Residual analysis of regression models for (<b>a</b>) C2 = f(PC<sub>1</sub>,PC<sub>2</sub>); (<b>b</b>) C4 = f(PC<sub>1</sub>,PC<sub>2</sub>); (<b>c</b>) C5 = f(PC<sub>1</sub>,PC<sub>2</sub>).</p>
Full article ">Figure 5
<p>Validation of regression models for (<b>a</b>) C2 = f(PC<sub>1</sub>,PC<sub>2</sub>); (<b>b</b>) C4 = f(PC<sub>1</sub>,PC<sub>2</sub>); (<b>c</b>) C5 = f(PC<sub>1</sub>,PC<sub>2</sub>).</p>
Full article ">
11 pages, 2403 KiB  
Proceeding Paper
An Approach to Building a Smart Decision-Making Process in a Manufacturing Organization in Terms of Profitability
by Gang Bao and Pavel Vitliemov
Eng. Proc. 2024, 70(1), 35; https://doi.org/10.3390/engproc2024070035 - 8 Aug 2024
Viewed by 439
Abstract
The manufacturing industry, with globalization and information technology, is facing cost pressure, low profits, technology difficulties and many other challenges. Enterprises need to strengthen cost management, improve production efficiency, and meet customer demand to cope with the increasingly complex competitive market. Here, our [...] Read more.
The manufacturing industry, with globalization and information technology, is facing cost pressure, low profits, technology difficulties and many other challenges. Enterprises need to strengthen cost management, improve production efficiency, and meet customer demand to cope with the increasingly complex competitive market. Here, our research in this area becomes important. This paper presents a new approach for building a smart decision-making process specifically in manufacturing organizations in terms of profitability. It emphasizes the importance of profitability-based decision making. The basic steps and modules required to build a profitability-based decision process are described. The advantages of this decision-making system are that it can help companies maximize profits, increase productivity, and meet customer demand for order adjustments. Full article
Show Figures

Figure 1

Figure 1
<p>The analytic hierarchy process and the queuing theory model in series.</p>
Full article ">Figure 2
<p>The whole work flow chart.</p>
Full article ">Figure 3
<p>The linear programming model and the analytic hierarchy process in series.</p>
Full article ">Figure 4
<p>The analytic hierarchy process and the queuing theory model in series.</p>
Full article ">Figure 5
<p>Hierarchical analysis process flowchart.</p>
Full article ">Figure 6
<p>Constructed model of hierarchical analysis.</p>
Full article ">Figure 7
<p>Queuing process.</p>
Full article ">Figure 8
<p>Equilibrium equation of state.</p>
Full article ">
8 pages, 4442 KiB  
Proceeding Paper
Development of a Simulator for Testing Software Systems Working with a Binary Protocol
by Iliyan Boychev and Gergana Spasova
Eng. Proc. 2024, 70(1), 36; https://doi.org/10.3390/engproc2024070036 - 8 Aug 2024
Viewed by 378
Abstract
In this article, the development of a software system—a simulator for testing software systems using a binary protocol—is proposed. The purpose of the development is to achieve full testing of a wide class of software systems. They are directly related to the management [...] Read more.
In this article, the development of a software system—a simulator for testing software systems using a binary protocol—is proposed. The purpose of the development is to achieve full testing of a wide class of software systems. They are directly related to the management of hardware systems, with which communication is based on a binary protocol. The developed simulator allows different types of messages to be simulated during real communication. In this way, it is possible to check how a given program system would react to correct and incorrect messages in the communication stage. This article presents a GUI system developed in the standard C++ programming language and the Qt platform, which makes it platform-independent. The system provides the ability to select preset commands via an external file or enter/correct commands in real-time. The commands may be different depending on the integration scope of the binary protocol. The connection between the developed simulator and the tested system is through RS 232 interface. Configuring settings and testing binary protocols through the developed application becomes fast and intuitive. Full article
Show Figures

Figure 1

Figure 1
<p>Message-checking levels.</p>
Full article ">Figure 2
<p>Simulator home screen.</p>
Full article ">Figure 3
<p>State machine.</p>
Full article ">Figure 4
<p>The simulator command format for a correct message.</p>
Full article ">Figure 5
<p>Sever console application response.</p>
Full article ">Figure 6
<p>Server application status for one machine.</p>
Full article ">Figure 7
<p>Simulator command format with a bad CRC.</p>
Full article ">Figure 8
<p>Server console application response.</p>
Full article ">Figure 9
<p>Simulator command format for a short message.</p>
Full article ">Figure 10
<p>Server console application response.</p>
Full article ">
9 pages, 4383 KiB  
Proceeding Paper
Voice Profile Authentication Using Machine Learning
by Ivelina Balabanova, Kristina Sidorova and Georgi Georgiev
Eng. Proc. 2024, 70(1), 37; https://doi.org/10.3390/engproc2024070037 - 8 Aug 2024
Viewed by 482
Abstract
In the paper, personalized results are presented in the methodology for monitoring information security based on voice authentication. Integration of sound preprocessing and Machine Learning techniques for feature extraction, training, and validation of classification models has been implemented. The objects of research are [...] Read more.
In the paper, personalized results are presented in the methodology for monitoring information security based on voice authentication. Integration of sound preprocessing and Machine Learning techniques for feature extraction, training, and validation of classification models has been implemented. The objects of research are staked mixed-test voice profiles. Classifies were selected with quantitative evaluation under a threshold of 90.00% by Naive Bayes and Discriminant Analysis. Significantly improved accuracy to approximate levels of 96.0% was established at Decision Tree synthesis. Strongly satisfactory performance indices were reached at the diagnosis of voice profiles using Feed-Forward and Probabilistic Neural Networks, respectively, 98.00% and 100.00%. Full article
Show Figures

Figure 1

Figure 1
<p>Variables in selection of Pseudo-Quadratic Discriminant classifier.</p>
Full article ">Figure 2
<p>Confusion matrices at Diagonal Linear (<b>a</b>) and Pseudo-Quadratic (<b>b</b>) classifiers.</p>
Full article ">Figure 3
<p>Synthesized Feed-Forward (<b>a</b>) and Probabilistic (<b>b</b>) models for voice profile identification.</p>
Full article ">Figure 4
<p>Matrices of correct (green color) and incorrect (red color) classifications for selected Feed-Forward (<b>a</b>) and Probabilistic (<b>b</b>) neural models for voice profile personalization.</p>
Full article ">Figure 5
<p>Error diagrams at application procedures of selected FFNN (<b>a</b>) and PNN (<b>b</b>) models.</p>
Full article ">Figure 6
<p>Variables in synthesis procedures of Decision Tree structures for voice authentication.</p>
Full article ">Figure 7
<p>Confusion matrices for Optimal (<b>a</b>) and Worst case (<b>b</b>) Decision Tree classification models.</p>
Full article ">Figure 8
<p>Examine the quality of Naïve Bayes voice profile classification models at Gaussian (<b>a</b>) and Kernel (<b>b</b>) input data distribution.</p>
Full article ">Figure 9
<p>Confusion matrices at voice profile identification models for NB classifiers with Gaussian (<b>a</b>) and Kernel (<b>b</b>) input data distribution.</p>
Full article ">
11 pages, 2784 KiB  
Proceeding Paper
Automation of Library Services—Turning Point in Development of Academic Libraries
by Viktoriya Ivanova
Eng. Proc. 2024, 70(1), 38; https://doi.org/10.3390/engproc2024070038 - 8 Aug 2024
Viewed by 563
Abstract
Automation and the use of information technology and are the first steps towards fast and huge change in every organization; they lead to the development of new services, the restructuring of units, and the implementation of different management strategies according to specific characteristics. [...] Read more.
Automation and the use of information technology and are the first steps towards fast and huge change in every organization; they lead to the development of new services, the restructuring of units, and the implementation of different management strategies according to specific characteristics. Universities and their libraries have taken an active role in this transformation. Automation and innovations serve as turning points in the development of academic libraries, as they improve the process of acquiring, storing, processing, retrieving, and delivering information. Full article
Show Figures

Figure 1

Figure 1
<p>Purposes of automation.</p>
Full article ">Figure 2
<p>Chronology of automation in Bulgarian academic libraries.</p>
Full article ">Figure 3
<p>Chronology of automation in “Angel Kanchev” University of Ruse.</p>
Full article ">Figure 4
<p>The number of books processed with the automated system in the period 1995–2015.</p>
Full article ">Figure 5
<p>Physical visits and electronic searches during the period 2004–2023.</p>
Full article ">Figure 6
<p>International partners of “Angel Kanchev” University of Ruse.</p>
Full article ">
9 pages, 3006 KiB  
Proceeding Paper
Blockchain-Based Model for Warehouse Management Systems for Artworks and Collectibles
by Venelin Maleshkov, Hristo Valchanov and Veneta Aleksieva
Eng. Proc. 2024, 70(1), 39; https://doi.org/10.3390/engproc2024070039 - 8 Aug 2024
Cited by 1 | Viewed by 702
Abstract
In the area of artworks and collectibles, secure storage and accurate management play crucial roles. Increased attention to the provenance, condition, and authenticity of items challenges traditional warehouse management systems (WMS). This paper introduces a novel blockchain model combined with internet of things [...] Read more.
In the area of artworks and collectibles, secure storage and accurate management play crucial roles. Increased attention to the provenance, condition, and authenticity of items challenges traditional warehouse management systems (WMS). This paper introduces a novel blockchain model combined with internet of things (IoT) devices and radio-frequency identification (RFID) tags, all dedicated to the management of warehouses. It proposes a secure and accountable way to track art pieces with an immutable ledger for transaction records and real-time monitoring of IoT environmental conditions. The model addresses key challenges in the art sector, such as the security and provenance verification of the artworks, enhances inventory accuracy, reduces human error and provides a solution in terms of tracking valuable items. Full article
Show Figures

Figure 1

Figure 1
<p>Traditional model.</p>
Full article ">Figure 2
<p>Blockchain-based model.</p>
Full article ">Figure 3
<p>Blockchain implementation of the proposed model.</p>
Full article ">Figure 4
<p>Fabric network with docker containers.</p>
Full article ">Figure 5
<p>Writing into blockchain.</p>
Full article ">Figure 6
<p>Reading from blockchain.</p>
Full article ">
8 pages, 3178 KiB  
Proceeding Paper
IMPACT: A Dataset for Integrated Measurement of Performance and Contextual Task-Related Effects
by Miroslav Markov, Yasen Kalinin and Valentina Markova
Eng. Proc. 2024, 70(1), 40; https://doi.org/10.3390/engproc2024070040 - 8 Aug 2024
Viewed by 362
Abstract
The paper introduces the Integrated Measurement of Performance and Contextual Task-related effects (IMPACT) dataset, designed to facilitate comprehensive investigations into contextual dynamics within human–machine collaboration (HMC) systems. Unlike traditional approaches focusing solely on monitoring physical contextual aspects, IMPACT uniquely incorporates the individual perception [...] Read more.
The paper introduces the Integrated Measurement of Performance and Contextual Task-related effects (IMPACT) dataset, designed to facilitate comprehensive investigations into contextual dynamics within human–machine collaboration (HMC) systems. Unlike traditional approaches focusing solely on monitoring physical contextual aspects, IMPACT uniquely incorporates the individual perception of human participants within these systems. Data sources include temporal records of task performance, user models derived from real-time video processing as well as contextual factors such as different light and noise conditions. Key features include task stimuli, user responses, reaction times, emotional states, and attention levels, all synchronized via timestamps and recorded in .csv and .mp4 formats. Our analysis highlights variations in user perceptions and performance under different contextual states, both in person-independent and person-specific scenarios. Pre-test and post-test questionnaire data reveal shifts in user perceptions of light and noise as distractors. Performance data indicate that task-related adaptations maintain consistent performance levels despite contextual changes, while attention and arousal levels vary significantly. Person-specific analysis underscores the importance of individualized context adaptation, as users exhibit unique responses to environmental changes. The IMPACT dataset supports the development of adaptive human–machine collaboration systems by integrating individual user perceptions with objective context monitoring. Future research will focus on refining context-adaptive models to enhance the robustness and accuracy of individualized context-related performance predictions. Full article
Show Figures

Figure 1

Figure 1
<p>The experimental setup for collection of the IMPACT dataset with LIGHT stimuli on (<b>a</b>) and off during the test session (<b>b</b>).</p>
Full article ">Figure 2
<p>Data acquisition workflow during the IMPACT dataset collection sessions.</p>
Full article ">Figure 3
<p>A pre-test self-assessment of the influence of light and noise as parameters of the working environment.</p>
Full article ">Figure 4
<p>A post-test ranking of the impact of three context-related distractors.</p>
Full article ">Figure 5
<p>A post-test self-assessment of the degree of influence of the distractors.</p>
Full article ">Figure 6
<p>Comparison of arousal, valence, attention, and performance of context-related states.</p>
Full article ">Figure 7
<p>Reaction times presented by context-related states.</p>
Full article ">Figure 8
<p>Individual attention dependency on the context state.</p>
Full article ">
15 pages, 10872 KiB  
Proceeding Paper
Synthesis and Testing of an Algorithm for Autonomous Landing of a UAV under Turbulence, Wind Disturbance and Sensor Noise
by Stefan Biliderov, Krasimir Kamenov, Radostina Calovska and Georgi Georgiev
Eng. Proc. 2024, 70(1), 41; https://doi.org/10.3390/engproc2024070041 - 8 Aug 2024
Viewed by 579
Abstract
Unmanned aerial vehicles (UAVs) are a new, adaptable technology that has found its way into both military and civilian applications. Preserving the integrity of the UAV and its security during flight and, in particular, during the landing stage is essential for the performance [...] Read more.
Unmanned aerial vehicles (UAVs) are a new, adaptable technology that has found its way into both military and civilian applications. Preserving the integrity of the UAV and its security during flight and, in particular, during the landing stage is essential for the performance of the assigned mission of the aircraft. This research examines a developed aircraft scheme. It was tested for static and dynamic stability in an XFLR5 virtual aerodynamic environment. The obtained results were transferred to MATLAB-Simulink, where the flight control algorithm was synthesized, the landing mode was set using an engineering flight plan, and an autonomous landing was simulated in the presence of wind disturbances with turbulence and noisy operation of the information measurement complex of the UAV. The algorithm for controlling the landing during the execution of the set flight trajectory, which contains a Kalman estimator and an optimal LQR controller combined in a general LQG control algorithm, is studied. Full article
Show Figures

Figure 1

Figure 1
<p>Schematic of the developed UAV survey in the XFLR5 virtual tunnel environment.</p>
Full article ">Figure 2
<p>The aerodynamic coefficients of the forces and moments in the UAV’s longitudinal direction: (<b>a</b>) CD—drag coefficient; (<b>b</b>) CL—lift coefficient; (<b>c</b>) Cm—pitch moment coefficient; and (<b>d</b>) 3D coefficients.</p>
Full article ">Figure 3
<p>Graphs of wing polar, lift coefficient, lateral pitch moment and UAV wing quality in the XFLR5 environment.</p>
Full article ">Figure 4
<p>State vectors of the UAV in the long periodic motion response of the open loop system to a set input in the MATLAB environment.</p>
Full article ">Figure 5
<p>Modeling the closed loop system in the MATLAB-Simulink environment: model simulation results.</p>
Full article ">Figure 6
<p>System modeling with measurement sensor noise and wind disturbances: operation of the control algorithm under complex disturbance action.</p>
Full article ">Figure 7
<p>System model with LQG control algorithm: estimation of the state vector for given input effects.</p>
Full article ">Figure 8
<p>Construction of the engineering flight plan in the landing stage of the UAV: (<b>a</b>) flight profile, (<b>b</b>) track and glide path, and (<b>c</b>) 3D space trajectory of the UAV in the landing stage.</p>
Full article ">Figure 9
<p>Playback of the engineering navigation plan on a digital aeronautical map (<b>a</b>); visualization of the landing plan (<b>b</b>).</p>
Full article ">Figure 10
<p>Complete system model performance under noise impacts.</p>
Full article ">Figure 11
<p>Difference between measured and estimated state vectors.</p>
Full article ">Figure 12
<p>Set input impact by pitch angle <span class="html-italic">θ</span> and linear velocity.</p>
Full article ">Figure 13
<p>Flight speeds relative to the Earth’s surface: vertical speed and linear airspeed.</p>
Full article ">Figure 14
<p>Estimation of the UAV state vectors in the landing stage according to the disturbance environment and measurement noise.</p>
Full article ">Figure 15
<p>Flight height and distance traveled by the UAV.</p>
Full article ">
8 pages, 573 KiB  
Proceeding Paper
Desulfurization Technology for Industrial Fuel Gases Using Natural Adsorption Materials
by Iliya Iliev, Antonina Filimonova, Alena Vlasova, Ruzina Kamalieva and Hristo Beloev
Eng. Proc. 2024, 70(1), 42; https://doi.org/10.3390/engproc2024070042 - 9 Aug 2024
Viewed by 873
Abstract
Fuel gas desulfurization is an important technological step toward achieving environmental neutrality in industrial production. The presence of sulfur compounds in fuel not only significantly increases the rate of corrosion processes, but also increases the amount of sulfur oxides in flue gases. Adsorption [...] Read more.
Fuel gas desulfurization is an important technological step toward achieving environmental neutrality in industrial production. The presence of sulfur compounds in fuel not only significantly increases the rate of corrosion processes, but also increases the amount of sulfur oxides in flue gases. Adsorption technologies are actively used to purify fuel. Materials that are mainly chosen as sorbents are determined by economic feasibility. These materials include bentonite clays. The paper presents an analysis of scientific works on the possible methods of using bentonite clays in industry. Due to its natural properties, this material has high adsorption properties. The authors present experimental laboratory studies to determine the adsorption efficiency of bentonite clay with a carbon substrate. Results on the adsorption capacity after regeneration of the composition are also presented. Based on the data obtained, the adsorption unit was calculated, and the process flow diagram was designed. Full article
Show Figures

Figure 1

Figure 1
<p>Laboratory experimental setup: 1—air supply compressor; 2—three-neck flask; 3—container with hydrochloric acid solution; 4—dispenser; 5—magnetic stirrer; 6—adsorber; 7—receiver flask with adsorbing solution.</p>
Full article ">Figure 2
<p>Adsorption unit: 1—supply of purified gas; 2—adsorber; 3—output of purified gas; 4—gas supply to the power plant; 5—gas supply for adsorbent regeneration; 6—heat exchanger; 7—adsorber for regeneration.</p>
Full article ">
10 pages, 10201 KiB  
Proceeding Paper
Planning and Research of Long-Range LoRaWAN Radio Coverage for Large Areas with Complex Terrain
by Nikolay Manchev, Krasen Angelov, Stanimir Sadinov and Panagiotis Kogias
Eng. Proc. 2024, 70(1), 43; https://doi.org/10.3390/engproc2024070043 - 9 Aug 2024
Viewed by 520
Abstract
When building energy-efficient communication platforms for IoT, it is necessary to plan in advance a number of actions related to radio coverage and to anticipate possible problems to be solved before building the platform. Since all data traffic is transmitted wirelessly, it should [...] Read more.
When building energy-efficient communication platforms for IoT, it is necessary to plan in advance a number of actions related to radio coverage and to anticipate possible problems to be solved before building the platform. Since all data traffic is transmitted wirelessly, it should provide reliable and quality radio coverage. Designing long-range LoRaWAN communications in outdoor environments with complex terrain is a challenging task that involves determining the correct location and height of the gateway to provide the necessary line-of-sight and minimize communication with reflected signals, as well as the appropriate equipment (e.g., transceiver antennas and radio modules). This article discusses the planning and research of such a type of radio coverage. For evaluation, the following were used: determining the coverage range and measuring the signal parameters, taking into account the receiver sensitivity; control of communication parameters; measurements and analysis in order to detect and eliminate existing disturbances and issues; and assessment of the quality of the service through survey and continuous monitoring in the coverage area. Full article
Show Figures

Figure 1

Figure 1
<p>Block diagram of LoRaWAN network experimental setup.</p>
Full article ">Figure 2
<p>LoRaWAN gateway power supply implementation.</p>
Full article ">Figure 3
<p>Component modules of the LoRaWAN gateway.</p>
Full article ">Figure 4
<p>Methodology algorithm for experimental setup design.</p>
Full article ">Figure 5
<p>Control points in the test area of University Campus 2.</p>
Full article ">Figure 6
<p>Graphical representation of the measured RSSI and LoRaSNR values at the given control points.</p>
Full article ">Figure 7
<p>Installation site of the experimental LoRaWAN gateway.</p>
Full article ">Figure 8
<p>Signal strength at different control points inside and outside the populated area of the town of Pavel Banya and near the Koprinka dam: (<b>a</b>) satellite image, (<b>b</b>) simple mapping processed by TTN Mapper Tool.</p>
Full article ">Figure 8 Cont.
<p>Signal strength at different control points inside and outside the populated area of the town of Pavel Banya and near the Koprinka dam: (<b>a</b>) satellite image, (<b>b</b>) simple mapping processed by TTN Mapper Tool.</p>
Full article ">Figure 9
<p>Monitoring the spectrum of the LoRa signal for one transmitted message.</p>
Full article ">
8 pages, 1376 KiB  
Proceeding Paper
Impact of Isopropanol Addition on Engine Performance and Emissions
by Elitsa Nakova, Simeon Iliev and Kiril Hadjiev
Eng. Proc. 2024, 70(1), 44; https://doi.org/10.3390/engproc2024070044 - 9 Aug 2024
Viewed by 509
Abstract
As global energy consumption grows and environmental concerns intensify, the demand for alternative fuels is becoming increasingly significant. This study investigates the properties and effects of isopropanol when added to gasoline as an alternative fuel. The overall analysis focusing on engine performance and [...] Read more.
As global energy consumption grows and environmental concerns intensify, the demand for alternative fuels is becoming increasingly significant. This study investigates the properties and effects of isopropanol when added to gasoline as an alternative fuel. The overall analysis focusing on engine performance and emissions shows the impact of isopropanol as a fuel additive. From the results, an improvement in engine efficiency was observed due to isopropanol’s high-octane number and improved combustion characteristics when added. There are also disadvantages associated with increased fuel consumption due to the lower energy density. Emissions analysis shows that there is a reduction in hydrocarbon and nitrogen oxide emissions with the addition of isopropanol, although with different trends depending on the concentration. The results of the study present the complex relationship between fuel composition and engine performance, offering insights into the possibility of using isopropanol as an alternative fuel in the search for sustainable energy solutions. The results showed that for this engine, it is most effective to add isopropanol in the range of 5–15%, relative to which emissions are prioritized to be reduced. The lower energy density of isopropanol reduces the overall energy density, which increases fuel consumption to achieve efficiency over gasoline-only operation. Full article
Show Figures

Figure 1

Figure 1
<p>Laboratory equipment.</p>
Full article ">Figure 2
<p>Change in brake-specific fuel consumption addition of isopropanol.</p>
Full article ">Figure 3
<p>Change in Brake thermal efficiency addition of isopropanol.</p>
Full article ">Figure 4
<p>Change in the amount of hydrocarbons evolved during engine operation with isopropanol additives.</p>
Full article ">Figure 5
<p>Variation of the amount of nitrogen oxides emitted during engine operation with isopropanol additives.</p>
Full article ">Figure 6
<p>Change in the amount of carbon monoxide evolved during engine operation with isopropanol additives.</p>
Full article ">
12 pages, 3148 KiB  
Proceeding Paper
Evaluation of Cloud-Based Dynamic Network Scaling and Slicing for Next-Generation Wireless Networks
by Aykut Cubukcu, Ozlem Cubukcu, Adnan Kavak and Kerem Kucuk
Eng. Proc. 2024, 70(1), 45; https://doi.org/10.3390/engproc2024070045 - 12 Aug 2024
Viewed by 473
Abstract
The relentless growth of wireless networks coupled with the burgeoning demand for dynamic resource allocation has spurred research into innovative solutions. This paper presents an evaluation of Cloud-based Dynamic Network Scaling and Slicing (CDNSS) as a promising approach to meet the evolving demands [...] Read more.
The relentless growth of wireless networks coupled with the burgeoning demand for dynamic resource allocation has spurred research into innovative solutions. This paper presents an evaluation of Cloud-based Dynamic Network Scaling and Slicing (CDNSS) as a promising approach to meet the evolving demands of wireless networks. By leveraging cloud infrastructure and slicing techniques, CDNSS offers the flexibility to dynamically scale resources and allocate network slices tailored to diverse service requirements. The evaluation encompasses the performance of CDNSS in terms of scalability, resource utilisation and Quality of Service (QoS) provisioning. Through extensive simulations and analyses, the efficacy of CDNSS in addressing the challenges of resource management and service differentiation in wireless networks is demonstrated. The findings underscore the potential of CDNSS as a pivotal technology to enhance the efficiency and adaptability of wireless network architectures in the era of dynamic connectivity demands. Full article
Show Figures

Figure 1

Figure 1
<p>End-to-end 5G network slicing architecture.</p>
Full article ">Figure 2
<p>End-to-End SDN- and NFV-based 5G Network Architecture.</p>
Full article ">Figure 3
<p>Physical resource block by network slices.</p>
Full article ">Figure 4
<p>Effect of QoS types on throughput.</p>
Full article ">Figure 5
<p>Bandwidth usage of applications.</p>
Full article ">Figure 6
<p>Impact of number of users on throughput and latency.</p>
Full article ">Figure 7
<p>Impact of numerology change on throughput.</p>
Full article ">Figure 8
<p>SDN network topology.</p>
Full article ">Figure 9
<p>Developed SDN–NFV algorithm activity diagram.</p>
Full article ">Figure 10
<p>New SDN–NFV network topology.</p>
Full article ">Figure 11
<p>Comparison of system performance based on average data rate.</p>
Full article ">
8 pages, 1953 KiB  
Proceeding Paper
Impedance Matching Optimization of RF Networks
by Miroslav Tomov, Stanimir Sadinov and Boris Arsov
Eng. Proc. 2024, 70(1), 46; https://doi.org/10.3390/engproc2024070046 - 12 Aug 2024
Viewed by 439
Abstract
The subject of this publication is a synthesized description of an S-parameter linear analysis for the improvement of a particular RF amplifier. The model is applied in a simulation environment as a 100–500 MHz two-port device under test with control of the input [...] Read more.
The subject of this publication is a synthesized description of an S-parameter linear analysis for the improvement of a particular RF amplifier. The model is applied in a simulation environment as a 100–500 MHz two-port device under test with control of the input and output impedance of the RF amplifier. The main goal of the exploration is to achieve a near-perfect impedance match in the input and output stages of a particular RF amplifying schematic. For that purpose, a computing sub-application was created and used in the simulation environment of Keysight Genesys. An appropriate sweep of the parameters’ values of the respective elements of the schematic allows simultaneous changes of the working point position on the diagrams corresponding to the maximum efficient operating mode of the amplifier for the operating frequency range. The upgrade of the initial schematic design usually achieves much better performance and overall behavior of the RF amplifiers from the perspective of the optimum gain and efficiency. Full article
Show Figures

Figure 1

Figure 1
<p>Initial schematic of the designed RF amplifier for the range 100–500 MHz.</p>
Full article ">Figure 2
<p>(<b>a</b>) RLC structure matching the impedance; (<b>b</b>) Equivalent parallel to serial RLC structure to convert impedance accordingly; (<b>c</b>) Equivalent serial to parallel RLC structure to convert impedance in a proper way.</p>
Full article ">Figure 3
<p>Vector analyzer calibration procedure “through” schematic.</p>
Full article ">Figure 4
<p>Optimized amplifier’s S-parameters before impedance match.</p>
Full article ">Figure 5
<p>Added microstrip structures convert according to the impedance of the input and output.</p>
Full article ">Figure 6
<p>Simulated performance of the amplifier with the impedance matching upgrade.</p>
Full article ">Figure 7
<p>The optimized schematic design of the amplifier after the impedance matching upgrade.</p>
Full article ">Figure 8
<p>Simulated and measured transmission coefficients S<sub>21</sub> and S<sub>12</sub>.</p>
Full article ">Figure 9
<p>Simulated and measured reflection coefficients S<sub>11</sub> and S<sub>22</sub>.</p>
Full article ">
8 pages, 3225 KiB  
Proceeding Paper
Experimental Investigation of Air Turbine for Utilization of Wave Energy
by Martin Pushkarov, Iskra Simova, Rositsa Velichkova, Violeta Ivanova and Angel Alexandrov
Eng. Proc. 2024, 70(1), 47; https://doi.org/10.3390/engproc2024070047 - 12 Aug 2024
Viewed by 393
Abstract
Working toward replacing conventional fossil fuels with alternative renewable energy, offshore renewable energy technologies give promising solutions, even though each of the types (wind, wave, tidal and thermal) is at a different stage of development and with its own unique challenges and opportunities. [...] Read more.
Working toward replacing conventional fossil fuels with alternative renewable energy, offshore renewable energy technologies give promising solutions, even though each of the types (wind, wave, tidal and thermal) is at a different stage of development and with its own unique challenges and opportunities. This paper is focused on sea wind wave energy harvesting through a hybrid system that combines both a water turbine with oscillating blades and “Wells”-type air turbine. A test bench was designed and tested at different flow rates to study the performance of the hybrid system and more precisely the “Wells”-type turbine. Experimental studies of the main parameters of a turbine were conducted, which demonstrated the efficiency of the turbine and its good practical application. The experimental results show good agreement with the preliminary performed numerical simulations, as well as with the published data. Full article
Show Figures

Figure 1

Figure 1
<p>Hybrid system of the sea wave energy harvesting test bench.</p>
Full article ">Figure 2
<p>Hybrid system of the sea wave energy harvesting test bench; detailed view of the Wells-type turbine.</p>
Full article ">Figure 3
<p>View facing the blades of the “Wells”-type turbine.</p>
Full article ">Figure 4
<p>Isometric view of the “Wells”-type turbine.</p>
Full article ">Figure 5
<p>Principal scheme of the “Wells”-type turbine installed in a duct as part of the test bench.</p>
Full article ">Figure 6
<p>Key dimensions of the “Wells”-type turbine.</p>
Full article ">Figure 7
<p>Working blade of the “Wells”-type turbine.</p>
Full article ">Figure 8
<p>Velocity triangles at the inlet and outlet of the working wheel depending on the flow rate.</p>
Full article ">Figure 9
<p>Pressure–revolution change at the studied flow rates.</p>
Full article ">Figure 10
<p>Revolution–power change at the studied flow rates.</p>
Full article ">Figure 11
<p>Power–efficiency change at the studied flow rates.</p>
Full article ">
11 pages, 1926 KiB  
Proceeding Paper
Cybersecurity and Prevention against Cyberbullying on Human Factors in Small- and Medium-Sized Telecommunications Enterprises in the Republic of Bulgaria
by Ivaylo Ts. Stoyanov
Eng. Proc. 2024, 70(1), 48; https://doi.org/10.3390/engproc2024070048 - 13 Aug 2024
Viewed by 381
Abstract
The publication addresses a current issue related to cyberbullying in the workplace, as much of today’s business activity is conducted online. The research is aimed at the typology and manifestation of cyberbullying in a practical environment, and a number of small- and medium-sized [...] Read more.
The publication addresses a current issue related to cyberbullying in the workplace, as much of today’s business activity is conducted online. The research is aimed at the typology and manifestation of cyberbullying in a practical environment, and a number of small- and medium-sized telecommunications enterprises have been studied. The research was conducted in the territory of three large cities in the Republic of Bulgaria, and a quantitative approach was used in the development of an online survey, through which empirical data were generated in the business of small- and medium-sized telecommunications enterprises. Based on the results, an analysis was made of the typology and manifestation of cyberbullying, in order to study how it affects the human factors and what its causes are. It has been established that cyberbullying causes negative effects, both in people’s professional activity and in their emotional state in the absence of adequate cybersecurity and prevention mechanisms on the part of the investigated enterprises. Based on the information obtained, methodological guidelines are proposed for improving cybersecurity and prevention against malicious cyberbullying attacks in the technological infrastructure of the telecommunications enterprise. Full article
Show Figures

Figure 1

Figure 1
<p>Manifestation of workplace cyberbullying in human factors in professional terms.</p>
Full article ">Figure 2
<p>Manifestation of workplace cyberbullying in human factors in emotional terms.</p>
Full article ">Figure 3
<p>Impact of cyberbullying on human factors’ productivity in the workplace.</p>
Full article ">Figure 4
<p>Reasons for the appearance of cyberbullying and malicious cyberattacks in the technological infrastructure of the telecommunications enterprise.</p>
Full article ">Figure 5
<p>Methodological guidelines for improving cybersecurity against malicious cyberbullying attacks in the technological infrastructure of telecommunications enterprises.</p>
Full article ">
16 pages, 12537 KiB  
Proceeding Paper
Advancements in PMSM-Based Commercial Fan Control: Hardware, FOC Implementation, and Performance Evaluation
by R. Shivarudraswamy, Swathi Tangi and Akshath Kaup
Eng. Proc. 2024, 70(1), 49; https://doi.org/10.3390/engproc2024070049 - 13 Aug 2024
Viewed by 595
Abstract
This work explores permanent-magnet synchronous motor (PMSM) technology and its control methods, focusing on field-oriented control (FOC) for precise motor control. It discusses hardware development using ORCAD and MATLAB/Simulink for modeling, analysis, and code generation. Recent technological trends in PMSM drive applications, including [...] Read more.
This work explores permanent-magnet synchronous motor (PMSM) technology and its control methods, focusing on field-oriented control (FOC) for precise motor control. It discusses hardware development using ORCAD and MATLAB/Simulink for modeling, analysis, and code generation. Recent technological trends in PMSM drive applications, including variable-frequency drive (VFD) control, are highlighted alongside performance evaluations. The use of the Embedded Coder toolbox in Simulink is emphasized for efficient C code generation for embedded targets like DSP controllers. Overall, this paper presents a comprehensive overview of PMSM control methodologies and their practical implementations.Rudra Full article
Show Figures

Figure 1

Figure 1
<p>Hall signal MATLAB model.</p>
Full article ">Figure 2
<p>Inverter with PMSM.</p>
Full article ">Figure 3
<p>Phase currents into <span class="html-italic">Id</span> and <span class="html-italic">Iq</span>.</p>
Full article ">Figure 4
<p>Current loop.</p>
Full article ">Figure 5
<p>Speed loop.</p>
Full article ">Figure 6
<p>PWM generation.</p>
Full article ">Figure 7
<p>Open loop block diagram.</p>
Full article ">Figure 8
<p>Hall signal circuit.</p>
Full article ">Figure 9
<p>Battery bus monitoring.</p>
Full article ">Figure 10
<p>Decoupling capacitor schematic.</p>
Full article ">Figure 11
<p>Hall sensor waveform.</p>
Full article ">Figure 12
<p>Position of rotor and direction of rotation.</p>
Full article ">Figure 13
<p>HA and HB in the clockwise direction with 50 RPM.</p>
Full article ">Figure 14
<p>HB and HC in the clockwise direction with 50 RPM.</p>
Full article ">Figure 15
<p>HA and HC in the clockwise direction with 50 RPM.</p>
Full article ">Figure 16
<p>Waveform of Back-EMF at 200 rpm.</p>
Full article ">Figure 17
<p>Waveform of Back-EMF at 150 RPM.</p>
Full article ">Figure 18
<p>Waveform of Back-EMF at 100 RPM.</p>
Full article ">Figure 19
<p>Waveform of Back-EMF at 50 RPM.</p>
Full article ">Figure 20
<p>Phase AB.</p>
Full article ">Figure 21
<p>Phase BC.</p>
Full article ">Figure 22
<p>Phase AC.</p>
Full article ">
12 pages, 3422 KiB  
Proceeding Paper
Insights into Applying Artificial Intelligence Methods in Action Video Games for Enhancement of Psychomotor Skills
by Georgi Tsochev, Teodor Ukov, Alexander Rusev and Maksim Sharabov
Eng. Proc. 2024, 70(1), 50; https://doi.org/10.3390/engproc2024070050 - 13 Aug 2024
Viewed by 499
Abstract
A new view on action video games has been evolving in the sphere of experimental psychology. Providing hand–eye coordination challenges, training with such types of games might allow the enhancement of different cognitive skills. Defining the specific game features that may be beneficial [...] Read more.
A new view on action video games has been evolving in the sphere of experimental psychology. Providing hand–eye coordination challenges, training with such types of games might allow the enhancement of different cognitive skills. Defining the specific game features that may be beneficial to specific enhancements is yet another challenge. This article presents an analysis on an experiment of a cooperative training session with bots. A method for online learning with a genetic algorithm is used to produce different ways of playing with the bots depending on the players’ achievements. This work also links related studies that provide insights into the beneficial implementation of game features for the training process. It additionally analyzes artificial intelligence methods that might be useful for personal development via a serious game or an action video game. Full article
Show Figures

Figure 1

Figure 1
<p>Latest version of the machine learning loop.</p>
Full article ">Figure 2
<p>Corresponding directions example of reacting to a projectile generation event.</p>
Full article ">Figure 3
<p>Example of reacting to a projectile generation event.</p>
Full article ">Figure 4
<p>Produced game results for each game match. DD is damage done, DT is damage taken, HS is hit streaks, T is takedowns, and F is falls.</p>
Full article ">Figure 5
<p>Damage done/taken—day 2.</p>
Full article ">Figure 6
<p>Damage done/taken—day 3.</p>
Full article ">Figure 7
<p>Damage done/taken—day 4.</p>
Full article ">Figure 8
<p>Damage done/taken—day 5.</p>
Full article ">
13 pages, 1850 KiB  
Proceeding Paper
Multi-Criteria Choosing of Material for Manufacturing a Pressure Relief Valve
by Velizar Zaharinov, Ivo Malakov, Oguzhan Cankaya and Lubomir Dimitrov
Eng. Proc. 2024, 70(1), 51; https://doi.org/10.3390/engproc2024070051 - 16 Aug 2024
Viewed by 300
Abstract
The paper is dedicated to the multi-criteria choice of an optimal variant of a pressure relief valve with a nominal pressure of 3 bar, manufactured from four different materials. The paper includes the usage of a number of existing methods that are combined [...] Read more.
The paper is dedicated to the multi-criteria choice of an optimal variant of a pressure relief valve with a nominal pressure of 3 bar, manufactured from four different materials. The paper includes the usage of a number of existing methods that are combined in an appropriate way to solve a specific practical problem, and a sequence of steps for their effective application is formulated. The optimization is defined and analyzed, and a seven-stage solution approach is developed. A list of requirements for the product is composed. The requirements are organized into objective groups, and an objective tree is developed. Metrics for measuring the requirements are defined. The “House of Quality” tool is used for correlating the metrics and requirements. Based on these correlations, criteria are selected for the evaluation of alternative variants. A mathematical model of the problem is built, and the evaluation criteria are defined in terms of concrete values for the variants, transforming the criteria into objective functions. A normalization method for the objective functions is selected and a principle of optimality is chosen. Using a known method for defining objective functions’ priorities, the weighting factors for different priority scenarios are obtained. The results of the optimization are shown for the different scenarios in relation to the different priorities (importances) of the selected criteria. Seven optimization problems are solved, and three different solutions are found. The solutions are graphically represented on a radar chart. All solutions found are optimal according to the selected criterion for optimality and calculated weight vectors. The final solution, chosen among the optimal ones found, is selected on the basis of additional decision makers’ considerations. Full article
Show Figures

Figure 1

Figure 1
<p>Pressure relief valve.</p>
Full article ">Figure 2
<p>Objective tree for the product “pressure relief valve”.</p>
Full article ">Figure 3
<p>Graphical representation of the obtained solutions.</p>
Full article ">Figure 4
<p>Graphical representation of the obtained solutions.</p>
Full article ">
10 pages, 6493 KiB  
Proceeding Paper
Descriptive Geometry and Computer Modelling in Support of Planning the Restoration of the Roof Covering of the “Dormition of the Mother of God” Cathedral in Varna
by Zoya Tsoneva, Momchil Tachev, Aleksandrina Bankova, Plamen Parushev, Stefan Tenev, Ismail Mehmedov and Prolet Deneva
Eng. Proc. 2024, 70(1), 52; https://doi.org/10.3390/engproc2024070052 - 16 Aug 2024
Viewed by 328
Abstract
Preserving and restoring architectural monuments of symbolic national significance stand as an unequivocal priority for both local and state authorities. Indeed, with advancements in the technology, materials, and methods of work, there are some specific stages involved in the process of restoring historical [...] Read more.
Preserving and restoring architectural monuments of symbolic national significance stand as an unequivocal priority for both local and state authorities. Indeed, with advancements in the technology, materials, and methods of work, there are some specific stages involved in the process of restoring historical buildings; however, maintaining their authentic form and impact poses a serious challenge, necessitating the development of innovative, non-standard technologies and the adaptation of a multifunctional methodology to achieve the desired outcome. The present study focuses on the restoration of the roof covering of the historical building of the “Dormition of the Mother of God” Cathedral in Varna, in terms of technological feasibility and cost-effectiveness. Proposed in this paper is a solution that strives to restore the magnificent roof in adherence to the heritage conservation principles by applying a genuine gold coating instead of retaining the previous dull goldish coating made from alkyd paint, yellow pigment, and gold dust. Through the implementation of descriptive geometry techniques and AutoCAD, followed by verification using Inventor, the study presents a feasible solution for accurately determining the surface area of the domes to be gilded. Full article
Show Figures

Figure 1

Figure 1
<p>Pictures of the Cathedral: (<b>a</b>) at the middle of 20th century; (<b>b</b>) before the restoration.</p>
Full article ">Figure 2
<p>Drawing of the bell tower.</p>
Full article ">Figure 3
<p>Dividing the surface of the dome into equal parts.</p>
Full article ">Figure 4
<p>Development (unfolding) of the dome surface.</p>
Full article ">Figure 5
<p>Full development of the surrounding surface of the bell tower.</p>
Full article ">Figure 6
<p>Measuring the length of the former.</p>
Full article ">Figure 7
<p>Measuring the lengths of the parallels.</p>
Full article ">Figure 8
<p>Automatic measurement of the face of the surface of one of the elements.</p>
Full article ">Figure 9
<p>Structure of the rebate connection.</p>
Full article ">Figure 10
<p>The gilding of the dome and its seams.</p>
Full article ">Figure 11
<p>Autodesk Invertor dome 3D simulation.</p>
Full article ">
9 pages, 2718 KiB  
Proceeding Paper
The Temperature Effect on Electric Vehicle’s Lithium-Ion Battery Aging Using Machine Learning Algorithm
by Mohamed Zearban, Mohamed Abdelaziz and Mohamed Abdelwahab
Eng. Proc. 2024, 70(1), 53; https://doi.org/10.3390/engproc2024070053 - 20 Aug 2024
Cited by 1 | Viewed by 817
Abstract
This paper offers a brief insight into predicting the State of Health (SOH) of lithium-ion batteries in EVs using machine learning. Accurate SOH assessment is crucial for optimizing electric vehicles (EVs’) performance and longevity. Employing supervised machine learning on a diverse battery dataset, [...] Read more.
This paper offers a brief insight into predicting the State of Health (SOH) of lithium-ion batteries in EVs using machine learning. Accurate SOH assessment is crucial for optimizing electric vehicles (EVs’) performance and longevity. Employing supervised machine learning on a diverse battery dataset, the research develops a robust SOH estimation method. Various algorithms are compared for efficacy, considering factors like temperature and charging patterns. Feature selection enhances model accuracy and efficiency. The proposed methodology offers promising real-world results, indicating high SOH prediction accuracy. This research contributes to EV battery management, applying machine learning for SOH estimation, which is vital for intelligent battery management systems, and enhancing EVs’ sustainability and efficiency. Full article
Show Figures

Figure 1

Figure 1
<p>SOH estimation architecture.</p>
Full article ">Figure 2
<p>Experimental setup for data acquisition from lithium-ion batteries.</p>
Full article ">Figure 3
<p>Experimental setup for data acquisition from lithium-ion batteries with current sensor.</p>
Full article ">Figure 4
<p>Graph showing the discharge capacity with the number of cycles.</p>
Full article ">Figure 5
<p>A comparison of the SOH of the same battery under different temperature conditions: (<b>a</b>) at 0 degrees Celsius; (<b>b</b>) at 50 degrees Celsius.</p>
Full article ">
13 pages, 1560 KiB  
Proceeding Paper
Integrating AI Technologies into Remote Monitoring Patient Systems
by Filip Tsvetanov
Eng. Proc. 2024, 70(1), 54; https://doi.org/10.3390/engproc2024070054 - 20 Aug 2024
Viewed by 1559
Abstract
Improving RPM through AI includes various aspects of healthcare delivery that make systems more efficient, accurate and patient-centric. In this work, the impact and role of AI is explored with a focus on RPM. As a result of the research, it was found [...] Read more.
Improving RPM through AI includes various aspects of healthcare delivery that make systems more efficient, accurate and patient-centric. In this work, the impact and role of AI is explored with a focus on RPM. As a result of the research, it was found that the AI-supported architectures in building RPM have transformed, augmented, and revealed new possibilities of applications and benefits in remote health monitoring. Nine groups of significant AI applications leading to the transformation of remote patient care are identified, analyzed, and discussed. Challenges facing RPM are also discussed. Addressing these challenges requires collaboration among healthcare providers, technology developers, policymakers, and patients to ensure the successful implementation and widespread adoption of remote patient monitoring. The results of this research will allow for an informed decision about the need, benefits, and effectiveness of building a specific AI-based RPM and developing such an architecture with the necessary applications for the specific medical organization. Full article
Show Figures

Figure 1

Figure 1
<p>The main components of RPM.</p>
Full article ">Figure 2
<p>Remote monitoring of patients based on AI.</p>
Full article ">Figure 3
<p>Result of AI integration in RPM.</p>
Full article ">
6 pages, 754 KiB  
Proceeding Paper
Development of a System for the Active Orientation of Small Screws
by Penko Mitev
Eng. Proc. 2024, 70(1), 55; https://doi.org/10.3390/engproc2024070055 - 26 Aug 2024
Viewed by 346
Abstract
This paper reviews the process of research, development and production of a system for the active orientation of small screws. The parts feature two different shapes on each side, which is suitable for machine vision inspection and not for classical vibratory bowl traps. [...] Read more.
This paper reviews the process of research, development and production of a system for the active orientation of small screws. The parts feature two different shapes on each side, which is suitable for machine vision inspection and not for classical vibratory bowl traps. When a part enters the jig, it is rotated at an angle of 90° for inspection. Based on the orientation, it may stay in this position or be rotated at 180°. This allows for active orientation; regardless of how the screw is presented to the camera, it is always positioned in the correct orientation by a servo mechanism. The main challenges are related to the small dimensions of the part. First of all, it has a diameter of only 3 mm and a length of 7 mm. A vibratory bowl feeder is used only for feeding and there is no orientation functionality in it. Afterwards, a vibratory linear feeder is placed so the ready parts are stacked and, thus, some buffer is created. This is important because vibratory bowl feeders are known for having unequal productivity in time and this could be solved by the linear feeder. Another key difficulty is the quality of the source parts. They are produced by several suppliers and sometimes there are chips and other remnants alongside the packages with screws. This imposes the need for a cleaning system as part of the servo actuator’s mechanism. Cleaning does not occur on every cycle; it is based on a timer that is predefined. Full article
Show Figures

Figure 1

Figure 1
<p>Part picture.</p>
Full article ">Figure 2
<p>Possible orientations of the screw: (<b>a</b>) orientation with the star forward; (<b>b</b>) orientation with the conical side forward.</p>
Full article ">Figure 3
<p>Three-dimensional (3D) model of the system.</p>
Full article ">Figure 4
<p>Real photo of the developed system.</p>
Full article ">Figure 5
<p>Gripper system for screws.</p>
Full article ">
6 pages, 1790 KiB  
Proceeding Paper
Station Passenger Barrier Systems and Their Impact on Metro Transport Services
by Svetoslav Tomov and Emiliya Dimitrova
Eng. Proc. 2024, 70(1), 56; https://doi.org/10.3390/engproc2024070056 - 28 Aug 2024
Viewed by 478
Abstract
The prevention of passengers’ access to the tracks is crucial for current urban railway transport. The “Safety first” principal led to the need to separate the platform from the train tracks as a measure of passengers’ protection. Due to this, many train stations [...] Read more.
The prevention of passengers’ access to the tracks is crucial for current urban railway transport. The “Safety first” principal led to the need to separate the platform from the train tracks as a measure of passengers’ protection. Due to this, many train stations around the world are equipped with barrier (screen) security systems. However, the requirements for passengers’ comfort are high as well. Automated transport should ensure the trains are on time and passengers’ exchange at stations is smooth. Therefore, it is necessary that station passenger barrier systems comply with the line signalling systems. Preventing or reducing additional delays is essential to provide efficient transport services and maximum line capacity while ensuring passenger safety. This report provides the operation outcomes for different train lines with implemented advanced station barrier systems for passengers—automatic platform doors (vertical or horizontal) and beam barriers—and indicates the strong and weak points of the given solutions. Full article
Show Figures

Figure 1

Figure 1
<p>Half-height platform screen doors: (<b>a</b>) 3D model (Photo: Knorr Bremse); (<b>b</b>) Krasno Selo Station, Sofia M3 Line.</p>
Full article ">Figure 2
<p>Rope-type screen doors: (<b>a</b>) 3D drawing (Photo: Knorr Bremse); (<b>b</b>) Opalchenska Station, Sofia M1 Line.</p>
Full article ">Figure 3
<p>Zákóczi tér Station, Budapest, M4 Line (Photo: <span class="html-italic">Railway Gazette International</span>).</p>
Full article ">
8 pages, 1176 KiB  
Proceeding Paper
Development of a Training Station for the Orientation of Dice Parts with Machine Vision
by Penko Mitev
Eng. Proc. 2024, 70(1), 57; https://doi.org/10.3390/engproc2024070057 - 6 Sep 2024
Viewed by 220
Abstract
This paper reviews the process of research, development and production of a training station for the optical recognition of dice parts with machine vision. This approach is chosen due to the lack of mechanical features to allow for classical orientation approaches. The embossed [...] Read more.
This paper reviews the process of research, development and production of a training station for the optical recognition of dice parts with machine vision. This approach is chosen due to the lack of mechanical features to allow for classical orientation approaches. The embossed dots are about 0.1–0.2 mm deep so it is impossible to design classical traps. The orientation occurs purely by visual comparison to a reference image, part of the current camera job. The sequence of parts is controlled by the programmable logic controller(PLC)program, which manages the camera job-changing process via I/O signals, thus ensuring the right face of the die is captured by the camera and achieving the right predefined order of the sequence. When the preset number of dice in the sequence is reached, they are released back to the vibratory bowl feeder by a pneumatic separator. This way, all dice parts circulate until they are recognized by the camera. There are jobs for each possible orientation of the dice and also a small HMI where the dice sequences could be adjusted by the operator(generally students). The main benefit for the students is the opportunity to program the PLC and to adjust the camera jobs for the detection of each possible orientation. This relies upon the fact that during the fall from the return conveyor to the bowl feeder, the parts flip and, thus, change their previous orientation to another side. Experiments are conducted regarding the probability of obtaining orientation “5” and all the other possible states in order to statistically express the probability. Full article
Show Figures

Figure 1

Figure 1
<p>Part picture.</p>
Full article ">Figure 2
<p>A matrix of variants.</p>
Full article ">Figure 3
<p>The 3D layout of the designed system.</p>
Full article ">Figure 4
<p>Inspection of the dice. The following variants are shown: (<b>a</b>) Face 5; (<b>b</b>) Face 6; (<b>c</b>) Face 1; (<b>d</b>) Face 2; (<b>e</b>) Face 3; (<b>f</b>) Face 4.</p>
Full article ">Figure 5
<p>PLC XD3-16RT-E.</p>
Full article ">Figure 6
<p>Real system.</p>
Full article ">
8 pages, 1693 KiB  
Proceeding Paper
Advanced Lime Mortars for Historical Architectural Structures
by Theodoros A. Pringopoulos, Athanasia K. Thomoglou, Jacob G. Fantidis, Anna A. Thysiadou and Zoi S. Metaxa
Eng. Proc. 2024, 70(1), 58; https://doi.org/10.3390/engproc2024070058 - 12 Sep 2024
Viewed by 326
Abstract
The utilization of lime mortar to connect the masonry wall elements of historical architectural structures, to overlap and protect these structures, is an ancient technique that has prevailed until today as a compatible solution based on the principles of restoration. In recent years, [...] Read more.
The utilization of lime mortar to connect the masonry wall elements of historical architectural structures, to overlap and protect these structures, is an ancient technique that has prevailed until today as a compatible solution based on the principles of restoration. In recent years, scientists have studied the modification of lime mortars with new, sustainable and environmentally friendly materials that respect the value of monuments and are aligned with the principles of restoration. In the present study, the existing international literature on advanced lime mortars with improved mechanical and physicochemical properties is presented, and the knowledge gap is identified. Finally, new materials for improving lime mortars are proposed as a basis for successful restoration and further protection of architectural heritage. Full article
Show Figures

Figure 1

Figure 1
<p>Scanning electron microscopy micrographs of unmodified (<b>a</b>) lime mortar [<a href="#B11-engproc-70-00058" class="html-bibr">11</a>], (<b>b</b>) the modified with nano [<a href="#B12-engproc-70-00058" class="html-bibr">12</a>], (<b>c</b>) nano-metakaoline [<a href="#B13-engproc-70-00058" class="html-bibr">13</a>], (<b>d</b>) bio-additives [<a href="#B11-engproc-70-00058" class="html-bibr">11</a>], (<b>e</b>) pozzolane [<a href="#B1-engproc-70-00058" class="html-bibr">1</a>], and (<b>f</b>) nano-fibril additives [<a href="#B14-engproc-70-00058" class="html-bibr">14</a>].</p>
Full article ">Figure 2
<p>Classification of additives used in lime mortar for historical architectural heritage.</p>
Full article ">Figure 3
<p>Mechanical, physical and chemical properties of advanced lime mortar.</p>
Full article ">
Back to TopTop