Articles
9,199 Documents
The Method for Measuring Loop Resistance in Gas Insulated Substation
Li Zhou;
Tiecheng Lu;
Bo Zhang;
Guangkai Yu;
Jiawei Wan
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i10.pp7092-7098
This paper studies the method for measuring the loop resistance of GIS conductor pole basing on the super capacitor producing impulse current up to several thousand amperes. This method overcomes the limitations of conventional diagnostic method. Typical GIS conductor poles are chosen. Based on FEA and lab tests, the effect of different forms of current and contact condition, relationship between the temperature of contact and the loop resistance is researched. In full-scale testing under realistic operating conditions on the new 220 kV GIS using prototype instrumentation a very good sensitivity in an early stage was obtained.
Non-convex Economic Load Dispatch using Cuckoo Search Algorithm
N. Karthik;
A.K. Parvathy;
R. Arul
Indonesian Journal of Electrical Engineering and Computer Science Vol 5, No 1: January 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v5.i1.pp48-57
This paper presents cuckoo search algorithm (CSA) for solving non-convex economic load dispatch (ELD) problems of fossil fuel fired generators considering transmission losses and valve point loading effect. CSA is a new meta-heuristic optimisation technique inspired from the obligate brood parasitism of some cuckoo species by laying their eggs in the nests of other host birds of other species. The strength of the proposed meta-heuristic optimization technique CSA has been tested and validated on the standard IEEE 14-bus, 26-bus and 30-bus system with several heuristic load patterns. The results have indicated that the proposed approach is able to obtain significant economic load dispatch solutions than those of Firefly Algorithm (FFA) and other soft computing techniques reported in the literature.
Modified AES for Text and Image Encryption
Heidilyn V. Gamido;
Ariel M. Sison;
Ruji P. Medina
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i3.pp942-948
Advanced Encryption Standard (AES) is one of the most frequently used encryption algorithms. In the study, the Advanced Encryption Standard is modified to address its high computational requirement due to the complex mathematical operations in MixColumns Transformation making the encryption process slow. The modified AES used Bit Permutation to replace the MixColumns Transformation in AES since bit permutation is easy to implement and it does not have any complex mathematical computation. Results of the study show that the modified AES algorithm exhibited increased efficiency due to the faster encryption time and reduced CPU usage. The modified AES algorithm also yielded higher avalanche effect which improved the performance of the algorithm.
Risk assessment optimization for decision support using intelligent model based on fuzzy inference renewable rules
Abdulkareem Merhej Radhi
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 2: August 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v19.i2.pp1028-1035
Due to the unreliability of wired communications and the risks of controlling the process of transmitting data besides the complications that affecting data protection and the high costs of systems infrastructure, led to use wireless communications instead of wires media, but these networks are vulnerable towards illegal attacks. The side effects of these attacks are modifying data or penetrate the security system and discover its weaknesses, which leads to great material losses. These risks and difficulties led to the reluctance of wires communications and propose intelligent techniques and robust encryption algorithms for preventing data transmitted over wireless networks to keep it safe from cyber security attacks. So, there is a persistent need for providing intelligent techniques and robust algorithms to preserve conveyed information using wireless network. This paper introduces scenario for proposing intelligent technique to increase data reliability and provides a new way to improve high level of protection besides reduces infrastructure cost. The proposed system relies on two models, where the first model based on producing a knowledge base of risk rules while the aim of the second module is a risk assessment outcomes and encryption process according to attacks type. In this system, reducing risks levels based on renewable rules whereas a novel security system established on non-periodic keys with unsystematic operations using fuzzy system. We concluded that the proposed system has the ability to protect the transmitted data, increases its reliability and reduce the potential risks. MATLAB Toolkit 2014 then Weka open source package was used in encryption and data mining for the proposed system.
A novel three tier internet of things health monitoring system
Deepika N,;
M. Anand;
F. Jerald
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 2: August 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v15.i2.pp631-637
Internet of things is a technology where day to day devices, processing, and communication become smarter, intelligent and informative respectively. Health monitoring system is one the most important applications enabled by IOT. IOT health monitoring system comprises of sensors, network and a remote server (cloud). It provides multi-dimensional health monitoring and also suggests treatments. In this paper we have proposed a novel three tier health monitoring system , which stores and process the huge amount of sensor data outside the device using a technology called cloud computing. When the observed clinical sensor value exceeds the threshold clinical value, the system sends alert message to the doctor and caretakers. The history of data and observed data is stored in the cloud for a longer time and it can be viewed by logging into the website.
Technologies used in Smart Grid to implement Power Distribution System
Raja Masood Larik;
Mohd Wazir Mustafa
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v16.i2.pp232-237
Recently, the debate has been going on about the role of power plus distribution systems, its technologies for future smart grids in power systems. The emerging of new technologies in smart grid and power distribution systems provide a significant change in terms of reduction the commercial and technical losses, improve the rationalization of electricity tariff. The new technologies in smart grid systems have different capabilities to increase the technological efficiency in power distribution systems. These new technologies are the foreseeable solution to address the power system issues. This paper gives a brief detail of new technologies in smart grid systems for its power distribution systems, benefits and recent challenges. The paper provides a brief detail for new researchers and engineers about new technologies in smart grid systems and how to change traditional distribution systems into new smart systems.
A Resource Scheduling Strategy in Cloud Computing Based on Multi-agent Genetic Algorithm
Wuxue Jiang;
Jing Zhang;
Junhuai Li;
Hui Hu
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 11: November 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Resource scheduling strategies in cloud computing are used either to improve system operating efficiency, or to improve user satisfaction. This paper presents an integrated scheduling strategy considering both resources credibility and user satisfaction. It takes user satisfaction as objective function and resources credibility as a part of the user satisfaction, and realizes optimal scheduling by using genetic algorithm. We integrate this scheduling strategy into Agent subsequently and propose a cloud computing system architecture based on Multi-agent. The numerical results show that this scheduling strategy improves not only the system operating efficiency, but also the user satisfaction. DOI: http://dx.doi.org/10.11591/telkomnika.v11i11.3497
Unit Commitment with Battery Energy Storage Considering Wind Forecast Error
Cai Zhi;
Zeng Lili;
Zhao Kun;
Men Deyue;
Zhao Xu;
Xu Dan;
Dai Sai
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 5: May 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The integration of wind resource into the electric grid brings significant challenges due to the variable nature and anti-peak-regulation characteristic of wind power. Based on least square method, an improved normal distribution model is proposed to fit the actual wind power forcast error. Furthermore, considering wind power forecast error and the great potential of battery energy storage system (BESS) technology to mitigate the impact of volatile wind power, a unit commitment (UC) model with large capacity BESS has been estanbished in this study. Case studies with modified IEEE 39-bus system are employed to validate the proposed method. The role of BESS on economics, peak load shifting and accommodating wind power is discussed. DOI : http://dx.doi.org/10.11591/telkomnika.v12i5.4937
Memristor based ring oscillators true random number generator with different window functions for applications in cryptography
Noor Alia Nor Hashim;
Julius Teo Han Loong;
Azrul Ghazali;
Fazrena Azlee Hamid
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 1: April 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v14.i1.pp201-209
Cryptographic applications require numbers that are random and pseudorandom. Keys must be produced in a random manner in order to be used in common cryptosystems. Random or pseudorandom inputs at different terminals are also required in a lot of cryptographic protocols. For example, producing digital signatures using supporting quantities or in verification procedures that requires generating challenges. Random number generation is an important part of cryptography because there are flaws in random number generation that can be taken advantage by attackers that compromised encryption systems that are algorithmically secure. True random number generators (TRNGs) are the best in producing random numbers. This paper presents a True Random Number Generator that uses memristor based ring oscillators in the design. The designs are implemented in 0.18 µm complementary metal oxide semiconductor (CMOS) technology using LT SPICE IV. Different window functions for the memristor model was applied to the TRNG and compared. Statistical tests results of the output random numbers produced showed that the proposed TRNG design can produce random output regardless of the window function.
Sizing Optimization of Large-Scale Grid-Connected Photovoltaic System Using Cuckoo Search
Muhammad Zakyizzuddin Bin Rosselan;
Shahril Irwan Sulaiman;
Ismail Musirin
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 1: October 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v8.i1.pp169-176
This study presents the development of Cuckoo Search (CS)-based sizing algorithm for sizing optimization of 5MW large-scale Grid-Connected Photovoltaic (GCPV) systems. CS was used to select the optimal combination of the system components which are PV module and inverter such that the Performance Ratio (PR) is correspondingly optimized. The oversized and undersized of this large-scale GCPV system can give huge impact towards the performanceof this system. Before incorporating the optimization methods, a sizing algorithm for large-scale GCPV systems was developed. Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods.The results showed that the CS-based sizing algorithm was unable to found the optimal PR for the system if compared with ISA. However, CS was outperformed ISA in producing the lowest computation time in finding the optimal sizing solution.