Articles
9,199 Documents
An Efficient Power Management Algorithm for a Micro Grid
B. Sireesha;
Y. Nagaraja
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 1: July 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
This paper displays a micro grid comprising of distributed generation (DG) units (DG) units that are joined with the conveyance framework. A vitality administration calculation is actualized to arrange the operations of the various DG units in the micro grid for framework joined during grid connected and islanded operations. The proposed micro grid comprises of a photovoltaic (PV) cluster which works as the essential era unit of the micro grid furthermore a proton-trade layer energy component to supplement the variability in the force produced by the PV show. A lithium-particle capacity battery is joined into the micro grid to alleviate top requests amid lattice associated operation and to adjust for any lack in the created force amid islanded operation.The outline idea is checked through different test situations to exhibit the operational capacity of the proposed micro grid, and the acquired results are talked about. DOI: http://dx.doi.org/10.11591/telkomnika.v15i1.7912
Application of Fault Detection based on Hybrid Intelligent Methods
Na Chen;
Shaopu Yang;
Cunzhi Pan
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 8: December 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
How to collect information optimally by scheduling a limited number of sensors is one of the key technologies of safety monitoring for large mechanical equipment systems. In this paper, an improved model of Pulse Coupled Neural Network is used for the discretization algorithm of continuous features. And based on classificatory error parameter and approximate dependence degree in Variable Precision Rough Sets theory, a VPRS data model is created by utilizing the measured signals from the multi-sensor Bridge Erecting Machine Safety Monitoring System. Then the corresponding relations between time-frequency characteristics and operating condition classifications are analyzed. Finally, while the determinability of decision making analysis is enhanced, the validity order of safety monitoring information of the multi-sensor sampling points is gained, which can direct optimal scheduling of position of sensors in large-scale mechanical equipment systems. DOI: http://dx.doi.org/10.11591/telkomnika.v10i8.1634
A Review on Back-to-Back Converters in Permanent Magnet Synchronous Generator based Wind Energy Conversion System
Karthikrajan Senthilnathan;
K. Iyswarya Annapoorani
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 3: June 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v2.i3.pp583-591
This paper presents a review on the application of back-to-back converters in the field of Permanent Magnet Synchronous Generator (PMSG) based Wind Energy Conversion Systems (WECS). The wide applications of the back-to-back converters are power conditioning devices, micro grid, High Voltage Direct Current (HVDC), Renewable energy systems. The intention is to present an overview about the design considerations taken by various researchers in back-to-back converters in the field of Wind Energy Conversion Systems (WECS) and recent developments on it. Generally the configuration of back-to-back converters used are 12 pulse Voltage Source Converters (VSC), 12 pulse Current Source Converter (CSC), 9 Pulse Voltage Source Converter.
The design of the MISO Model Predictive Controller for Bioreactor
FAN Liping;
ZHANG Jun;
HUANG Xing;
HUANG Dong
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 6: October 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Bioprocesses have the inherent characteristics of high nonlinearity, parameter uncertainty and information imperfection. These specific natures may cause some difficulties in control. Jacobian linearization method was used in this paper to linearize the bioreactor model firstly, and then a Multiple-input and single output (MISO) model predictive controller was designed for the reactor. PID controller and fuzzy-PID controller was also introduced to compare with the MPC controller. Simulation results prove that the model predictive control has several advantages over the other controls for bioreactors. DOI: http://dx.doi.org/10.11591/telkomnika.v10i6.1444
Implementation of space vector modulation for two level three-phase inverter using dSPACE DS1104
Ismail Bouyakoub;
Rachid Taleb;
Hacene Mellah;
Abdelaziz Zerglaine
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 2: November 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i2.pp744-751
With increasing research and advancement in solid-state power electronic devices and microprocessors, various inverter control techniques employing pulse width modulation (PWM) are becoming popular especially in AC motor drive applications. The most commonly used techniques are sinusoidal PWM (SPWM) and space vector modulation PWM (SVPWM). SVPWM is considered to be superior to the SPWM because of better DC bus utilization. In this paper, a real-time digital implementation of SVPWM algorithm for three-phase two level inverter using dSPACE DS1104. The results obtained from the experimentation are closer to that of simulation, which confirms the validity of the implemented algorithm.
Energy Efficient Intrusion Detection Scheme with Clustering for Wireless Sensor Networks
Mohammed Ali Hussain
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 1: July 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Wireless sensor network (WSN) consists of a small size sensor nodes depends on battery power. Applications of sensor networks are street lighting, home automation, industrial plant, environmental parameters, health care and military. Security is becoming a major concept in the design of wireless sensor networks. Attacks on sensor networks include attack on confidentiality, integrity and availability. Lack of confidentiality means that the secret information is revealed to attackers. Lack of integrity means that the attacker modifies the contents (data) communicated in the sensor network. Lack of availability means the resources in the network is not available to authorized users. So to avoid these problems we need better security measures. In this paper we are dealing with intrusion detection. Intrusion detection plays an important role in the design of wireless sensor networks. An intruder can perform various attacks like replay, interception, worm hole, sink hole attacks. So our aim in this paper is to find such intrusions as early as possible, when they occurred and to enhance the life tome of the sensor network. This is because sensors nodes depend only on battery power. Our intrusion detection is based on clustering of the sensor network. This makes routing process, medium control and intrusion detection simple. DOI: http://dx.doi.org/10.11591/telkomnika.v15i1.8072
Experimental Study on Pedestal’s dynamic amplifying in UHV Electrical Equipment
LU Zhi-cheng;
CUI Cheng-chen;
ZHU Zhu-bing
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 8: December 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Simulation earthquake shaking table tests on the system of ultra high-voltage electrical equipment mounted on pedestals are carried out in order to study the dynamic amplifying effect of the pedestal in the system. The relationship between the dynamic responses of the system and main influence factors is studied by means of changing frequencies or stiffness and masses of the system under the driving function of several different earthquake waves. The studied results show that the dynamic amplifying effect of the pedestal in the system or the pedestal amplifying coefficient has close relationship with the stiffness and masses distributing or the frequencies of the system. Some regular and universal conclusions are obtained, and the suggested scale on the dynamic amplifying coefficient of the pedestal in the system is put forward, which provides reference for future design and engineering application on the ultra high-voltage electrical equipment with pedestal. DOI: http://dx.doi.org/10.11591/telkomnika.v10i8.1647
Making a Cloud Data Secure and Effective for Better Performance of Services
Sangeet Mishra;
Asis Kumar Tripathy;
Pallavi Joshi
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 3: June 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v2.i3.pp695-702
Cloud data security is one of the major and crucial concern in everyday life. Now a days cloud computing is emerging as vast and fastest growing technology depending on the usage. Cloud computing does not allow to keep data at user site and thus a data security is concerned to be a major challenging task regarding data storage. This paper overall describes the monitoring of the cloud data concerning data storage. In this paper we proposed a new methodology that can efficiently managed the security to the data and provide privacy to the consumer using the services of the cloud. Our proposed technique provides data security by using the third party monitoring system which acts as an interface between the cloud consumer and cloud owner. Basically third party monitors the each and every activity of the cloud consumer and based upon his performance he respond to the cloud owner for taking decision. Our proposed concept provides the security from consumer point of view and owner side of view making the flexibility to the cloud infrastructure. Existing work focus mainly on security from owner side of view that not well fitted into the lifecycle of data security.
Plaintext Related Two-level Secret Key Image Encryption Scheme
Yong Zhang;
Jiali Xia;
Peng Cai;
Bin Chen
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 6: October 2012
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Some chaos-based image encryption schemes using plain-images independent secret code streams have weak encryption security and are vulnerable to chosen plaintext and chosen cipher-text attacks. This paper proposed a two-level secret key image encryption scheme, where the first-level secret key is the private symmetric secret key, and the second-level secret key is derived from both the first-level secret key and the plain image by iterating piecewise linear map and Logistic map. Even though the first-level key is identical, the different plain images will produce different second-level secret keys and different secret code streams. The results show that the proposed has high encryption speed, and also can effectively resist the existing cryptanalytic attacks. DOI: http://dx.doi.org/10.11591/telkomnika.v10i6.1599
An efficient traffic contention and control mechanism to improve QoS in heterogeneous wireless sensor networks
Kavitha Ganesh;
P. Latchoumy;
A. Sonya
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 2: November 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i2.pp968-975
Heterogeneous wireless sensor networks (HWSN) gathers information from a cooperative network. In HWSN, the sensor nodes are scattered and the major challenges are topology control, battery optimization, packet loss and link lifetime. The existing techniques do not concentrate on all the mentioned issues. The objective of this work is to provide congestion-free data transfer with higher throughput and increased packet delivery ratio. In the proposed methodology, three protocols are designed and developed, namely, hop by hop rate adjustment protocol (HHRA), energy efficient data transfer protocol (EEDT) and alternative routing congestion control protocol (ARCC). The HHRA protocol senses the traffic in the channel and adjusts the transmission rate accordingly to avoid congestion. Secondly, the EEDT protocol is used to find specific nodes that are more efficient and transfer packets through those nodes to improve throughput. The ARCC protocol is used to redirect the path of transmission during the occurrence of congestion. Thus, the proposed traffic contention and control mechanisms ensures congestion free transmission and increases the packet delivery ratio by 23% and average throughput by 20% compared to the dynamic contention window based congestion control (DCWCC) algorithm.