Articles
9,199 Documents
A new modification of LEACH for efficient energy in WSN
Taous Lechani;
Victor Tourtchine;
Said Amari
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v20.i3.pp1495-1506
The limited energy of nodes in wireless sensor networks and the impossibility of replacing their batteries, have lead to protocols development which optimize and balance the energy consumption over the network. LEACH is the most used hierarchical protocol. However, one major weakness of the LEACH protocol lies in both of its random cluster formation and cluster head election. In this paper, we present two new protocols based virtual grid clustering on coverage area. In the first one, sensing area is devided into grids as squares named as VSG-LEACH and in the second one into grids as hexagons named as VHG-LEACH. In each zone, one cluster head is elected according to its residual energy and its distance from the cell center. The simulation results show that the network lifetime is prolonged by 169.67% and the energy consumption is improved by 80.97% compared to LEACH protocol.
A Safety Algorithm of P2P Routing based on Multiple-Encryption Detecting Technology
Chuiwei Lu;
Xianhao Miao;
Zhiyuan Liu
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 10: October 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The nodes can freely join or leave the P2P network, which will lead to much false routing information that can cripple the performance of P2P network. Many hackers also utilize the weaken point to attack the P2P network. We propose a safety routing algorithm for P2P network to resist the routing attack. The algorithm adopts the multiple-encryption detecting technology. The node which launches the communicating connection will periodically detect every node in its routing path by sending some multiple-encryption detecting packets. By the responding message of the detected nodes, the malicious or disable nodes in its routing path will be accurately located and kicked out of the routing table. Simulation experiments demonstrate the algorithm can effectively improve the safety of the P2P routing and topology stability of the P2P network. DOI: http://dx.doi.org/10.11591/telkomnika.v11i10.3411
Transient stability enhancement of statcom integration in power grid
I. A Ethmane;
A.K. Mahmoud;
M. Maaroufi;
A. Yahfdhou
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v16.i2.pp553-561
To solve load growth of a hybrid existing electrical system, we at first build generation stations (wind, solar or thermical). And secondly in 2025 year, when the system is so meshed, some buses will be very far from production energy, the transits power will be lower than the transmission capacity, and the voltage drop out margin limit of stability. Therefore it is proposed to install Flexible AC Transmission System (FACTS) devices to enhance the transient power stability and quality in the power system. The power flow analysis of Newton Raphson method is performed on a seven (7) bus system with and without static synchronous compensator (STATCOM). The STATCOM is a shunt connected FACTS devices that are useful for reactive power compensation and mitigation of power quality problems in transmission and distribution systems. These investigations indicate the need of power flow analysis and determine best locations of STATCOM on the proposed system. The results of simulation have been programmed in MATLAB and PSS/E Simulator. In the end the expected disturbances and the power quality enhancement of the network in the horizon 2025 were attenuated by integration of STATCOM that is able to supply or absorb reactive power and to maintain the voltage at 1pu.
Clustering and Hybrid Genetic Algorithm based Intrusion Detection Strategy
Li Liu;
Pengyuan Wan;
Yingmei Wang;
Songtao Liu
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: January 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Ad hoc networks face serious security threat due to its inherent weaknesses. Intrusion detection is crucial technology in protecting the security of Ad hoc networks. Recently, Intrusion Detection Systems (IDS) face open issues, such as how to make use of intrusion detection technologies to excavate normal/abnormal behaviors from a lot of initialized data and dig out invasion models later for intrusion detection automatically and effectively. In this paper, we propose an enhanced algorithm combined improved clustering algorithm with Hybrid Genetic Algorithm (HGA), called Enhanced Intrusion Detection Algorithm (EIDA) for intrusion detection in Ad hoc networks. Clustering Algorithm is used to divide the normal/anomalous data from network and system behaviors. Then HGA is used to dig out the invasion rules. Our EIDA is an unsupervised anomaly detection algorithm. The experiment result shows that it is extensible and not sensitive to the sequence of the input data sets. It has the capacity to deal with different types of data and detection rate and false positive rate of intrusion detection has been improved effectively. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3353
Comparison of feature extraction and normalization methods for speaker recognition using grid-audiovisual database
Musab T. S. Al-Kaltakchi;
Haithem Abd Al-Raheem Taha;
Mohanad Abd Shehab;
Mohamed A.M. Abdullah
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 2: May 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v18.i2.pp782-789
In this paper, different feature extraction and feature normalization methods are investigated for speaker recognition. With a view to give a good representation of acoustic speech signals, Power Normalized Cepstral Coefficients (PNCCs) and Mel Frequency Cepstral Coefficients (MFCCs) are employed for feature extraction. Then, to mitigate the effect of linear channel, Cepstral Mean-Variance Normalization (CMVN) and feature warping are utilized. The current paper investigates Text-independent speaker identification system by using 16 coefficients from both the MFCCs and PNCCs features. Eight different speakers are selected from the GRID-Audiovisual database with two females and six males. The speakers are modeled using the coupling between the Universal Background Model and Gaussian Mixture Models (GMM-UBM) in order to get a fast scoring technique and better performance. The system shows 100% in terms of speaker identification accuracy. The results illustrated that PNCCs features have better performance compared to the MFCCs features to identify females compared to male speakers. Furthermore, feature wrapping reported better performance compared to the CMVN method.
Novel Design for Direct Torque Control System of PMSM
HUANG Xu-chao;
LIN Rong-wen
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 4: April 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Nowadays, with the rapid development of high-performance servo system, The conventional permanent magnet synchronous motor (PMSM) Direct Torque Control (DTC) system has large torque ripple in low speed which cannot be well adapted to today`s development. The main reason is because the number of voltage vectors provided by the two-level inverter is only six and the relationship between voltage vector and torque is not clear[1-5.10-12]. In this paper, the basic concept of direct torque control of permanent magnet synchronous motor is investigated in order to emphasize the effects produced by a given voltage vector on stator and torque variations in this paper. Modified the voltage sector switching table, a novel DTC scheme for the permanent magnet synchronous motor is proposed which is using a novel three-level inverter. An improvement of the drive performance can be obtained by using the novel DTC scheme. The simulation results showed that the scheme could reduce the torque ripple in low speed and improved the stability of the motor under the condition of keeping the system dynamic performance. DOI: http://dx.doi.org/10.11591/telkomnika.v11i4.2391
Generation & Analysis of Harmonic for Various Combinations of Non-linear Load
Subhabrata Mukherjee;
Kunal Chakraborty;
Dipak Kumar Datta
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 10: October 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v12.i10.pp7249-7252
This paper refers to a comparative study of the harmonics generated by non-linear loads like compact fluorescent lamps (CFL). This work is carried out by measuring the frequency across the supply line by using CFL along with a resistive load. Here CF lamps are used as they are non-linear loads and generate frequencies of very high value. We have used three cfl lamps of different ratings such as 5, 14t and 20watt.
Pulse Clean and Regeneration Control Device in Ceramic Filter
Xilian DIAO;
Haiming LIU;
Yang LIU
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 9: September 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
This article developed a 6120-type diesel particulate filter pulse clean and regeneration control system with a high efficiency, simple reliable use. And it has determined the spray nozzle diameter, the injection distance, the injection pressure, the pulse width, the injection time of five factor optimal fit experiment parameter. This control system can flow the type honeycomb ceramics filter to the wall to carry on the test and the research of the filtration and the regeneration; It can realize the filter filtration and the regeneration change work. DOI: http://dx.doi.org/10.11591/telkomnika.v11i9.3232
Detection of fault during power swing in test system interconnected with DG
Nor Zulaily Mohamad;
Ahmad Farid Abidin;
Ismail Musirin
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/ijeecs.v16.i2.pp577-585
Distance relay is prone to mal-operate during power swing, thus most of modern distance relay design is equipped with power swing blocking scheme to block the operation during power swing and reset the blocking operation whenever a fault occurs during power swing. However, the detection of fault during power swing especially for high resistance fault possess a challenging task, therefore it may cause the unblocking function to vulnerable to operate. This paper presents the development of a detection scheme for detecting fault during power swing in test system interconnected with Distributed Generation (DG). In this study, the detection scheme is proposed based on S-Transform analysis on the distance relay input voltage signal. It is demonstrated that the proposed S-Transform detection based scheme can effectively detect various type of fault during power swing includes high resistance fault, as well as able to operate correctly even with the presence of DG in the test system.
Application of Intelligent Three-state Pang-Pang Control to Heat Exchange Station
Wen Biao Wang;
Yong Sun;
Si Yuan Wang;
Han Wen
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 5: May 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The heat exchange station of central heating system has been increasingly widely used as the intermediate hub connecting the heat source and heat users. If the specific temperature control requirements are not satisfied effectively and specifically, the security and stability of the primary network and quality of the secondary network will be affected directly. A temperature control scheme of the heat exchange station is presented based on intelligent three-states Pang-Pang. On the basis of mechanism analysis, we choose the average of supply and return water temperatures of secondary network as the controlled variable in presented temperature control scheme, which is equivalent to inducing the supply water temperature as the feedforward signal. The advantages of the intelligent three-state Pang-Pang control algorithm lie in improving the stability of the primary network, reducing the overshoot and accelerating the response of the secondary network. The application of the presented control scheme to the practical engineering shows that it not only implements the automatic control of the temperature of heat exchange station hence improves its control performance but also enhances and improves the controllability of the system effectively and especially has the referential and extending significance for heat exchange station transforming open-loop to closed-loop control. DOI : http://dx.doi.org/10.11591/telkomnika.v12i5.3538