Articles
9,226 Documents
Robust operation of microgrid energy system under uncertainties and demand response program
Sahar Seyyedeh Barhagh;
Amin Mohammadpour Shotorbani;
Behnam Mohammadi-Ivatloo;
Kazem Zare;
Ali Farzamnia
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 2: February 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v17.i2.pp1005-1013
Microgrid energy systems are one of suitable solutions to the available problems in power systems such as energy losses, and resiliency issues. Local generation by these energy systems can reduce the role of the upstream network, which is a challenge in risky conditions. Also, uncertain behavior of electricity consumers and generating units can make the optimization problems sophisticated. So, uncertainty modeling seems to be necessary. In this paper, in order to model the uncertainty of generation of photovoltaic systems, a scenario-based model is used, while the robust optimization method is used to study the uncertainty of load. Moreover, the stochastic scheduling is performed to model the uncertain nature of renewable generation units. Time-of–use rates of demand response program (DRP) is also utilized to improve the system economic performance in different operating conditions. Studied problem is modeled using a mixed-integer linear programming (MILP). The general algebraic modeling system (GAMS) package is used to solve the proposed problem. A sample microgrid is studied and the results with DRP and without DRP are compared. It is shown that same robustness is achieved with a lower increase in the operation cost using DRP.
A Formal Model of Trust Chain based on Multi-level Security Policy
Kong Xiangying;
Zhuang Yi;
Wang Xiaoxing
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Trust chain is the core technology of trusted computing. A formal model of trust chain based on finite state automata theory is proposed. We use communicating sequential processes to describe the system state transition in trust chain and by combining with multi-level security strategy give the definition of trust system and trust decision theorem of trust chain transfer which is proved meantime. Finally, a prototype system is given to show the efficiency of the model. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3192
Theory of the Solution of Inventive Problems for Flexure Design in Micro-Electro-Mechanical Systems
Huiling Yu;
Shanshan Cui
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i10.pp7202-7208
In this paper detail of the optimization of a flexure design which is used in many MEMS devices will be presented. Due to a difference in thermal expansion coefficients between the flip-chip bonded MEMS device and the substrate, cooling after bonding can cause the MEMS to buckle; It is necessary to decrease the influence of distortion by using the correct material selection, welding method, weld design, fixture design, temperature control and TRIZ. We can seek out principles that can solve the problem. It can be concluded that an optimal flexure design will include the longest fold length and smallest fold spacing possible. By solving the deformation problem of MEMS devices can promote the development of flip chip technology, and make for the further application of the TRIZ theory in the study of forestry equipment.
New Binary Code Combined with New Chaotic Map and Gold Code to Ameliorate the Quality of the Transmission
Mohamed Krim;
Adda Ali-Pacha;
Naima Hadj-Said
Indonesian Journal of Electrical Engineering and Computer Science Vol 5, No 1: January 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v5.i1.pp166-180
While the private radio communications field has grown in recent years, the communication method known as spread spectrum name has gained much prominence. A spread spectrum method can be combined with multiple access method CDMA for dividing sequences to create multi-user communication systems with very good performance of interference between symbols.The production of the chaotic sequence in scanning system and the information system according to DS-CDMA remains a hot research problem in this study to supervise in the knowledge wireless communication. This fact is still a question in establishing the secret code random spread sequence between the transmitter and the receiver.In DS-SS’s spreading is important to embed security information.It can avoid many problems in the complex calculation of the true circle. Furthermore the pseudo chaotic is reconstructed in the conventional gold to change shape with the logical operator “XOR” the results in simulation result shows in progress.It improves also the computing speed as this can solve the new equation of the problem in the original logistic map.There certainly has a kind in design: spreading chaotic sequence, chaos with gold code; including the number of users.So these are less in number and also limit the security and to can improve the ameliorate the quality of the transmissionand performance in terms of allowable number of users.The Bit error rate (BER) performance of the system is evaluated in multi-user environment under AWGN and reveals that the DS-SS system using new binary code combined with new logistic mapand gold code to ameliorate the quality of the transmission.
Kinect-Based Physiotherapy and Assessment: A Comprehensive Review
Fadilla ‘Atyka Nor Rashid;
Nor Surayahani Suriani;
Ain Nazari
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v11.i3.pp1176-1187
Kinect-based physical rehabilitation grows significantly as a mechanism for clinical assessment and rehabilitation due to its flexibility, low-cost and markerless system for human action capture. It is also an approach to provide convenience for for patients’ exercises continuation at home. In this paper, we discuss a review of the present Kinect-based physiotherapy and assessment for rehabilitation patients to provide an outline of the state of art, limitation and issues of concern as well as suggestion for future work in this approach. The paper is constructed into three main parts. The introduction was discussed on physiotherapy exercises and the limitation of current Kinect-based applications. Next, we also discuss on Kinect Skeleton Joint and Kinect Depth Map features that being used widely nowadays. A concise summary with significant findings of each paper had been tabulate for each feature; Skeleton Joints and Depth Map. Afterwards, we assemble a quite number of classification method that being implemented for activity recognition in past few years.
Voltage sag compensation using direct converter based DVR by modulating the error signal
S. Abdul Rahman;
Estifanos Dagnew
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 2: August 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v19.i2.pp608-616
The aim of this paper is to present a modulation technique to achieve highest voltage sag compensation using direct converter based dynamic voltage restorer (DVR). The DVR topology proposed in this paper, has a direct converter and a series transformer. The direct converter is fabricated using only two bi-directional switches. The DVR is designed to compensate the sag in a phase by taking power from the same phase. The direct converter is connected between the series transformer and the line in which sag compensation is to be achieved. Conventionally, the PWM pulses for the direct converters are produced by comparing the error signal with the carrier signal. The error signal is obtained by comparing the amplitude of voltage in the line with the amplitude of the reference voltage. If the amplitude of the carrier signal is kept constant and the actual amplitude of error signal is used for PWM generation, it is possible to achieve only 22% of voltage sag compensation. But if the error signal amplitude is modulated according to the amplitude of existing voltage sag in the line, 52% of the voltage sag can be compensated with the THD less than 5%. Simulation results are presented for validating the analysis.
K-means algorithm with level set for brain tumor segmentation
Samah Abdelaziz;
Songfeng Lu
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 2: August 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v15.i2.pp991-1000
Brain is a complicated structure consisting of millions of millions cells so that, it’s difficult to identify any diseases without using any computerized technology. Magnetic resonance imaging (mri) is one of the main assessments of brain tumors. One of the most important steps on medical image processing is segmentation. Segmenting brain mri images, which provide accurate information for the diagnosis and therapy decisions of brain tumors. We proposed to segment brain tumor mri images into three parts (wm (white matter), gm (gray matter), and background). The first algorithm is for applying median filtering on brain mri image for removing the noise from the image for achieving accurate results. The second algorithm is for applying k-means algorithm for accuracy in time consuming and for clustering into regions and the third algorithm indicate the detecting the boundary of the image with the use of level set. By comparison, our proposed method, its efficiency to segment perfectly more than other previous used algorithms especially on time consuming.
Sufficient Authentication for Energy Consumption in Wireless Sensor Networks
SK. Riaz;
V. Srirammanoj
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v16.i2.pp316-322
Given the understanding of the prospective WSN programs and because of source restrictions, key management emerges as a complicated problem for WSNs. One of the main issues when developing a key management scheme is the system scalability. Indeed, the method should assistance a huge number of nodes to allow a large range implementation of the system. In this paper we implemented a performance trade-off research of power intake vs. We urbanized a novel probability style to evaluate the best redundancy stage in terms of direction redundancy (mp) and resource redundancy (ms), as well as the best attack identification configurations with regards to the number of voters (m) and the attack incantation interval under which the life-time of a heterogeneous wireless sensor network is optimized while fulfilling the stability, timeliness and protection specifications of question processing applications in the existence of untrustworthy wireless communication and harmful nodes. Lastly, we used our analysis outcomes to the style of powerful redundancy management criteria to recognize and implement the best design parameter configurations at playback in reaction to environment changes to extend the program life-time.
Mechanical Performance of Cup-spherical-shaped and Straight Form Braided Esophageal Stent
Haixia Zhao;
Ying Liu;
Xiaoyu Ni;
Fengming Xia;
Xiao Zhang
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 11: November 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
This article introduces the application background and research overview of esophageal stent. The finite element models of two different forms of braided esophageal stent, such as cup-spherical-shaped and straight shaped, are created. Based on the configuration of material model selection and boundary condition, the stress and axial elongation of the stent with different wire numbers, different wire diameters and different leads are compared. The analysis results show that the maximum stress increases with the increase of the wire diameter and head, but decreases with the increase of the lead in straight stent while the maximal stress has a positive relationship with the wire diameter in cup-spherical-shaped stent. In the case the other parameters are the same, it is shown that the cup-spherical-shaped stent has the minimal stress when the crown number is 24. Meanwhile, the analysis results show that the lead has a great impact on the axial elongation of braided stent. In the case all parameters are the same, the axial elongation of cup-spherical-shaped stent is less than that of straight stent, which conclusively proves that the performance of cup-spherical-shaped stent is superior to that of the straight stent. DOI: http://dx.doi.org/10.11591/telkomnika.v11i11.3512
Demand Forecasting Model of Port Critical Spare Parts
Zhijie Song;
Zan Fu;
Han Wang;
Guibin Hou
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 5: May 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Demand forecasting for port critical spare parts (CSP) is notoriously difficult as it is expensive, lumpy and intermittent with high variability. In this paper, some influential factors which have an effect on CSP consumption were proposed according to port CSP characteristics and historical data. And analytic hierarchy process (AHP) is used to sieve out the more influential factors. Combined with the influential factors, a least squares support vector machines (LS-SVM) model optimized by particle swarm optimization (PSO) was developed to forecast the demand. And the effectiveness of the model is demonstrated through a real case study, which shows that the proposed model can forecast the demand of port CSP more accurately, and effectively reduce inventory backlog. DOI : http://dx.doi.org/10.11591/telkomnika.v12i5.3238