Articles
28 Documents
Search results for
, issue
"Vol 4, No 1: October 2016"
:
28 Documents
clear
Design of MPC for Superheated Steam Temperature Control in a Coal-fired Thermal Power Plant
A. Yasmine Begum;
G. V. Marutheeswar
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 1: October 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v4.i1.pp73-82
A superheater is a vital part of the steam generation process in the boiler-turbine system. Reliable control of temperature in the superheated steam temperature system is essential to guarantee efficiency and high load-following capability in the operation of coal-fired Thermal power plant. The PI and PID controllers are extensively used in cascade control of secondary superheated steam temperature process.The design and implementation of a Model Predictive Control (MPC) strategy for the superheated steam temperature regulation in a thermal power plant is presented. A FOPTD model is derived from the dynamic model of the superheater. This model is required by the MPC algorithm to calculate the future control inputs. A new MPC controller is designed and its performance is tested through simulation studies. Compared with the superheater steam temperature control using a conventional PID controller, the steam temperature controlled by the MPC controller is found to be more stable. The stable steam temperature leads to energy saving and efficient plant operation, as verified by the simulation results.
Two Dimensional Tunable Optical-CDMA System
Rajesh Yadav Yadav;
Gurjit Kaur Kaur
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 1: October 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v4.i1.pp125-132
In this work an experimental demonstration is proposed to implement the synchronous optical code division multiple access system using two dimensional wavelength hopping and time spreading optical prime code is presented. An optical CDMA system is configured on latest version of optisystem by optiwave for the 20 users (Prime Number = 5) connected in a network operating at a bit rate 10 Gbps each. Tunability is achieved by using a MATLAB based delay selector which serves as the source of control signal for optical delay lines. The encoded optical signal of each user has been assigned a particular mode. The resulting optical signal is then transmitted over parabolic index multimode optical fiber. The received signal can successfully be retrieved at the decoder, when the encoder and decoder are configured for the same user. The performance of Optical CDMA system is evaluated in terms of the autocorrelation and cross correlation function, BER, Q factor, eye diagram and compared with 1D code for a given prime number.
SIP Authentication Protocols Based On Elliptic Curve Cryptography: Survey and comparison
Mourade Azrour;
Mohammed Ouanan;
Yousef Farhaoui
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 1: October 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v4.i1.pp231-239
Session Initiation Protocol (SIP) is the most popular signaling protocol using in order to establish, modify and terminate the session multimedia between different participants. It was selected by the Third Generation Project Partnership (3GPP) as a multimedia application protocol in 3G mobile networks. SIP is the protocol currently used for signaling ToIP calls. The security of SIP is becoming more and more important. Authentication is the most important security service required by SIP. To ensure a secured communication, many SIP authentication protocols have been proposed. This work provides an overview of the proposed schemes based on elliptic curve cryptography. Those proposed schemes are analyzed in security consideration and the computational cost.
The Peak of the PQRST and the Trajectory Path of Each Cycle of the ECG 12-Lead Wave
Sabar Setiawidayat;
Djanggan Sargowo;
Setyawan P. Sakti;
Sri Andarini
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 1: October 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v4.i1.pp169-175
The objective of this present article is to describe the record of the ECG 12-lead examination in order to obtain the peaks of the P, Q, R, S and T from each cycle and also to present the Peak of the PQRST and the trajectory path of each cycle of the ECG 12- lead wave. The duration of the peak R to another is used as the period of each cycle, while the Phytagoras theorem is employed to count the trajectory path of the wave in each step. The Peak PQRST is utilized to diagnose the heart condition, and the trajectory path is the distance taken up by the impulses in the heart muscles. The discrete data from the MIT-BIH and the results of the measurement itself are employed as the data to obtain the values of the peak PQRST and the trajectory path of the wave of each cycle.
Insulating Material Erosion in Atmospheric Non-Thermal Plasma Jet Device
K. M. Ahmed;
T. M. Allam;
M. A. Abouelatta;
S. A. Ward;
A. A. Lashin;
H. M. Soliman
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 1: October 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v4.i1.pp20-28
This paper reports on the selection of insulating material types in a developed atmospheric-pressure non-thermal plasma jet (ANPJ-II) device which was operated previously in our laboratory based on the minimum erosion area of the insulator’s nozzle. Three identical insulator groups used in our experiment include; Teflon insulator material with different thicknesses of 1.5 mm and 2 mm respectively, and Ceramic insulating material with thickness of 2 mm. ANPJ-II device is operated with each of the three insulator groups. These insulators are operated and analyzed with different operation times for compressed Air or Nitrogen gas with a flow rate of 12 L/min and input voltage of 6 kV. The erosion area of these insulator materials is measured as a function of the operation time. The Ceramic insulator was found to have the minimum erosion area. Also, the temperature of both the cathode and the insulating material (Teflon or Ceramic) are measured to study the effect of operation time and the gas type on the device components.
Efficiency of JSON approach for Data Extraction and Query Retrieval
Mohd Kamir Yusof;
Mustafa Man
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 1: October 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v4.i1.pp203-214
Students’ Information System (SIS) in Universiti Sultan Zainal Abidin (UniSZA) handles thousands of records on the information of students, subject registration, etc. Efficiency of storage and query retrieval of these records is the matter of database management especially involving with huge data. However, the execution time for storing and retrieving these data are still considerably inefficient due to several factors. In this contribution, two database approaches namely Extensible Markup Language (XML) and JavaScript Object Notation (JSON) were investigated to evaluate their suitability for handling thousands records in SIS. The results showed JSON is the best choice for storage and query speed. These are essential to cope with the characteristics of students’ data. Whilst, XML and JSON technologies are relatively new to date in comparison to the relational database. Indeed, JSON technology demonstrates greater potential to become a key database technology for handling huge data due to an increase of data annually.
An Improved Criterion for Induced Stability of Fixed-Point Digital Filters with Saturation Arithmetic
Priyanka Kokil;
Xavier Arockiaraj S
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 1: October 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v4.i1.pp65-72
This paper establishes a criterion for the induced stability of fixed-point state-space digital filters with saturation nonlinearities and external interference. The criterion is established in a linear matrix inequality (LMI) setting, and therefore, computationally tractable. The criterion turns out to be an improvement over a previously reported criterion. A comparison of the presented criterion with existing criterion is made. Numerical examples are given to demonstrate the usefulness of the proposed approach.
Quantitative Analysis and Comparison of Symmetric Cryptographic Security Algorithms
Mahaba Saad;
Khalid Youssef;
Hala Abdel-Kader
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 1: October 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v4.i1.pp116-124
Nowadays, the rapid evolution of communication systems offers, to a very large percentage of population, access to a huge amount of information and a variety of means to use in order to exchange personal data. Hence the search for the best solution to offer the necessary protection against the data intruders’ attacks along with providing these services in time is one of the most interesting subjects in the security related communities. Cryptography is usually referred to as “the study of secret”. Encryption is the process of converting normal text to unreadable form. There are a variety of encryption algorithms have been developed. This paper provides quantitative analysis and comparison of some symmetric key cryptographic ciphers (DES, 3DES, AES, Blowfish, RC5, and RC6). The quantitative analysis approach is a step towards optimizing the security operations for an efficient next generation family of network processors with enhanced speed and power performance. A framework will be proposed as a reference model for quantitative analysis of security algorithm mathematical and logical operations.