Articles
25 Documents
Search results for
, issue
"Vol 15, No 3: September 2015"
:
25 Documents
clear
Hybrid Encryption Algorithm Based on Spatial and Gray Level Information
Suolan Liu;
Chen Chen;
Yue Chen;
Hongyuan Wang
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 3: September 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v15.i3.pp569-575
Based on the analysis of the defect of traditional image scrambling methods, a new hybrid scrambling algorithm is proposed. It uses image’s spatial and gray level information. Comparative experiments show it has the advantages of easy implementation, large key space, and good scrambling effect by only one time scrambling instead of many times processing.
PSO_PI Controller of Robotic Grinding Force Servo System
Adnan Jabbar Attiya;
Yang Wenyu;
Salam Waley Shneen
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 3: September 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v15.i3.pp515-525
When an industrial robot is used to grind a curved surface ,as marine propeller surface, contact force and feed movement must controlled together at the similar time in order that the grinding tool would machine the work-piece, with required force, at the right position in right posture. A passive wrist system is advanced, in this paper, to conform the shape of the machining propeller by altering its posture along with the surface. Grinding force is controlled under a simple new PSO-PI controller at a steady value in the normal direction of the mentioned machining point by multi-point machining, while the grinding tool moving along the curved surface of the propeller. It means that the model of the passive wrist system and the surroundings could be used in force controlling when robots grind marine propeller surface by a grinding tool with multi-point machining. PSO_PI controller policy is being assembled and compared with a PI controller to obtain a controller that provides grinding with higher quality. The compared controllers have been optimized together with the parameters of the Two-Phase Hybrid Stepping Motor. The particle swarm optimization (PSO) method was selected from several methods to optimize of Proportional-Integral controller parameters in order to give better performance with improved step response for robotic grinding force servo system and overshoot are reduced. This control method was simulated using MATLAB/SIMULINK.
Modeling and Control Analysis of Wind Turbine of Two Bladed and Three Bladed Wind Turbine Systems
L V Suresh Kumar;
Chintu Jaganmohanarao;
Sai Lakshmi B
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 3: September 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v15.i3.pp478-485
The wind power industry is currently the fastest growing renewable energy sector throughout the world. the aim of this paper is to implement the mathematical model and simulations torque control of two bladed and three bladed wind turbine systems by changing power coefficient, tip speed ratio and pitch angle values for different wind speeds.To ensure an economically competitive wind power production, the trend is to increase the turbine size while at the same time minimize material usage. In this paper we have two cases are developed one for two bladed and another for the three bladed wind turbines and compare the simulation results of both cases. The two balade and three blade systems are mathmatically developed and implemented in matlab simulink.
Cyber Security Threats in Synchrophasor System in Wide Area Monitoring System
Surender Kumar;
M K Soni;
D K Jain
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 3: September 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v15.i3.pp436-444
Cyber security has become a critical priority for electric utilities. With the increase in the use of intelligent measuring devices like PMUs and more advanced communications and information technology in smart grid, the overall attack surface has increased. Cyber attacks against synchrophasor system critical infrastructure are detrimental to the functioning of the society as a whole. This paper presents the latest on cyber security of synchrophasor system in smart grid, specifically; it focuses on the deep understanding of the risk in terms of threats, vulnerabilities and consequences that arise from cyber attacks. Since the research on cyber security for the smart grid is still in its early stage, our objective is to provide an overview, analyze potential cyber security threats, and review existing security solutions in the Wide Area Monitoring System.
Performance Analysis of ZigBee Mesh WSN in Carbon Monoxide Gas Monitoring System
Muhammad Fuad;
Muhammad Iqbal;
Mamat Rahmat;
Heru Sukoco;
Husin Alatas
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 3: September 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v15.i3.pp576-583
The need for air pollutant monitoring system is very substantial especially in the developing countries such as Indonesia. In this research, we have performed a test of such system for carbon monoxide gas based on wireless sensor network (WSN) using ZigBee. This system is working with a mesh topology where each sensor node can communicate with one another. There are seven nodes that serve as sensor nodes and one node serving as Coordinator. Each sensor node has five components that represent of gas sensors. We measure three performance metrics during the test, i.e. throughput, delay, and packet loss. The system has been successfully implemented which is capable of displaying information in real time. The experiment resulted in an average carbon monoxide value of 25.1 ppm and showed a good performance. It showed a throughput more than 1.017 kbps, delay and packet loss ratio less than 409 ms and 5 %, respectively.
Dual Proportional Integral Controller OF Two-Area Load Frequency Control Based Gravitational Search Algorithm
M. Elsisi;
M. Soliman;
M. A. S. Aboelela;
W. Mansour
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 3: September 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Gravitational Search Algorithm (GSA) has recently been explored to develop a novel algorithm for distributed optimization and control. This paper proposes a dual Proportional Integral (PI) controller of Load Frequency Control (LFC) based GSA to enhance the damping of oscillations in a two-area power system. A two-area non-reheat thermal system is considered to be equipped with dual PI controller. GSA is utilized to search for optimal controller parameters by minimizing a time-domain based objective function. The performance of the proposed controller has been evaluated with the performance of the conventional PI controller, and PI controller tuned by GSA in order to demonstrate the superior efficiency of the proposed dual PI controller tuned by GSA. Simulation results emphasis on the better performance of the optimized dual PI controller based on GSA in compare to optimized PI controller based on GSA and conventional one over wide range of operating conditions, and system parameters variations. DOI: http://dx.doi.org/10.11591/telkomnika.v15i3.8454
Secured Communication Among HMI and Controller using RC-4 Algorithmand Raspberry Pi
Albert Sagala;
Deni Parlindungan Lumbantoruan;
Epelin Manurung;
Iroma Situmorang;
Adi Gunawan
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 3: September 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v15.i3.pp526-532
In the beginning the implementation of a plant with SCADA technology, the network is formed isolated from the outside network (LAN or Internet). So it can be ascertained that the communication that occurs on the SCADA network is safe from the threat of crackers. In fact, SCADA network allows it to be connected to the Internet, so that the data of the plant can be monitored via the Internet, so the information about the state of the plant can be monitored in realtime and can be taken quickly if it is known there are anomalies on the control system. In the research we designed a method of encryption and decryption against the lines of communication between the HMI (Human Machine Interface) and the Controller on an industrial minipant contained in Lab CSRC IT Del. Raspberry Pi is used as a gateway between the HMI and the Controller. While Algorithm RC 4 are used as the algorithm for encrypting data between the HMI and the Controller. In the results, we can use the Rapsberry Pi to secure the communication between the HMI and Controller.
A Novel Approach for Design and Analysis of Voltage-Controlled DSTATCOM for Power Quality Enhancement
Syed Ruman;
Shaik Hameed
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 3: September 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v15.i3.pp486-496
The Power quality fluctuations of the distributed power system show a serious impact on the robust and sustainable operation of the distributed power system. These power quality fluctuations may be caused due to several reasons like leakage, faults and ageing of the lines. This project proposes a new algorithm to generate reference voltage for a controlled mode distribution static compensator (DSTATCOM) operating in voltage-control mode. The proposed scheme exhibits several advantages compared to traditional voltage-controlled DSTATCOM where the reference voltage is arbitrarily taken as 1.0 p.u. The proposed scheme ensures that unity power factor (UPF) is achieved, while regulating the voltage at the load terminal, during load change, which is not possible in the traditional method. Also, the compensator injects lower currents and, therefore, reduces losses in the feeder and voltage-source inverter. This scheme allows DSTATCOM to tackle power-quality issues by providing power factor correction, harmonic elimination, load balancing, and voltage regulation based on the load requirement. Simulation and experimental results are presented to demonstrate the efficacy of the proposed algorithm.
Using Particle Swarm Optimization, Genetic Algorithm, Honey Bee mating Optimization and Shuffle Frog Leaping Algorithm for solving OPF Problem with their Comparison
Sajjad Ahmadnia;
Ehsan Tafehi
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 3: September 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v15.i3.pp445-451
Today using evolutionary programing for solving complex, nonlinear mathematical problems like optimum power flow is commonly in use. These types of problems are naturally nonlinear and the conventional mathematical methods aren’t powerful enough for achieving the desirable results. In this study an Optimum Power Flow problem solved by means of minimization of fuel costs for IEEE 30 buses test system by Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Honey Bee Mating Optimization (HBMO) and Shuffle Frog Leaping Algorithm (SFLA), these algorithms has been used in MATLAB medium with help of MATHPOWER to achieving more precise results and comparing these results with the other proposed results in other published papers.
Security in Wireless sensor network: Approaches and Issues
Raja Waseem Anwar;
Majid Bakhtiari;
Anazida Zainal;
Kashif Naseer Qureshi
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 3: September 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v15.i3.pp584-590
Wireless sensor network is a tremendous emerging technology provides communication services for environmental monitoring and target tracking for mass public and military. With increasing of this smart network popularity sensor network faced various challenges and threats. The inclusion of wireless sensor nodes also incurs different types of security threats in network. Mostly networks are using shared key approaches to make less communication overhead, but still network compromise with replay impersonation and compromise attacks. The existing proposed schemes are not fully addressed other network resources such as energy and speed, etc. The intent of this paper is to provide a comprehensive security requirement, detail about security attacks in network and discuss the existing security schemes.