cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
,
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Arjuna Subject : -
Articles 11 Documents
Search results for , issue "Vol 4, No 1: March 2015" : 11 Documents clear
Evaluating the Radiation and Temperature Effect on Photovoltaic Systems Sobhan Dorahaki
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v4i1.305

Abstract

One of the best ways to identify and design a system is simulating and to achieve this goal, we use simulation software such as MATLAB Simulink. In this study, the relations ruling photovoltaic is described. Then, on the relations basis, a photovoltaic system is simulated in MATLAB software. After photovoltaic system simulation, regardless the specific geographic area, radiation and temperature effect on photovoltaic system is generally simulated. Finally, with regard to radiation and temperature values effect on, it was concluded that we overlook the temperature effect than radiation effect on photovoltaic system designing. It certainly does not mean overlooking the temperature effect. It means a low-effect power changes per temperature changes against radiation.
Machine model based Speed Estimation Schemes for Speed Encoderless Induction Motor Drives: A Survey Mohan Krishna.S; Febin Daya.J.L
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v4i1.303

Abstract

Speed Estimation without speed sensors is a complex phenomenon and is overly dependent on the machine parameters. It is all the more significant during low speed or near zero speed operation. There are several approaches to speed estimation of an induction motor. Eventually, they can be classified into two types, namely, estimation based on the machine model and estimation based on magnetic saliency and air gap space harmonics. This paper, through a brief literature survey, attempts to give an overview of the fundamentals and the current trends in various machine model based speed estimation techniques which have occupied and continue to occupy a great amount of research space.
Control of Indirect Matrix Converter by Using Improved SVM Method Lavanya Nannapaneni; M Venu Gopala Rao
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v4i1.311

Abstract

A novel space vector modulation (SVM) method for an indirect matrix converter (IMC) is used to reduce the common -mode voltage (CMV) in the output. The process of selecting required active vectors and to describe the switching sequence in the inverter stage of the IMC is explained in this paper. This novel SVM method used to decrease the peak -to-peak amplitude voltage of CMV without using any external hardware. The other advantage of this SVM method is to reduce the total harmonic distortion of line-to-line output voltage. This new modulation technique is easily implemented through simulation and its results are used to demonstrate the improved performance of the input/output waveforms.
A Bio-Crypto Protocol for Password Protection Using ECC Srinivasan Nagaraj; G.V.S.P. Raju; G Apparao; B. Kishore
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v4i1.318

Abstract

In  information  security the  following security parameters like, integrity , non repudiation and confidentiality , authentication   must be satisfied.  To avoid thievery of organization resources  it needs be secured in more efficient way  and there is always demand  for different levels of security attacks include virus , brute force and Eveadroper  in business that  organizations make use of voice biometrics an attractive low-cost. Voice biometrics is the  cheapest  among the  other biometrics and used all levels for management to buy readily available metric and it is the way of  identifying individuals remotely  with high level of accuracy . In this work, we have been designed a  new  password- authentication approach  that provides security  using voice biometrics for authentication and uses the device  itself into an authenticator which uses  voice itself as its passwords and we are primarily interested in keys that can be temporally reproduced on the same device from the same user’s voice. Public and private keys are generated  randomly from the user's voice  and stored in the voice file(.wav).This Method uses voice recognition , include the operation of  register( recording feature ) or voice prints  and  storing of one or more voice passwords into the  database. It uses ECDSA to perform the authentication process that matching the  voice sample  with the database. The recognition, entity makes the database  to decide that  the sample is matched to perform an operation or not. Our proposed approach  generates cryptographic keys from voice input itself and this algorithm developed an adhoc basis. It can effectively defend  attacks specially brute force attack in system networks.
H-GA-PSO Method for Tuning of a PID Controller for a Buck-Boost Converter Modeled with a New Method of Signal Flow Graph Technique Leila Mohammadian; Ebrahim Babaei; Mohammad Bagher Bannae Sharifian
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v4i1.310

Abstract

In this paper, a new method of signal flow graph technique and Mason’s gain formula are applied for extracting the model and transfer functions from control to output and from input to output of a buck-boost converter. In order to investigate necessity of a controller for the converter with assumed parameters, the frequency and time domain analysis is done and the open loop system characteristics are verified. In addition, the needed closed loop controlled system specifications are determined. Moreover, designing a controller for the mentioned converter system based on the extracted model is discussed. For this purpose, a proportional-integral-derivative (PID) controller is designed and the hybrid of genetic algorithm (GA) and particle swarm optimization (PSO), called H-GA-PSO method is used for tuning of the PID controller. Finally, the simulation results are used to show the performance of the proposed modeling and regulation methods.
A Novel Inter Connection of DFIG with Grid in Separate Excitation SMES System with Fuzzy Logic Control A. Kavitha; A. V. Suresh
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v4i1.312

Abstract

The use of doubly fed induction generators (DFIGs) in wind turbines has become quite common over the last few years. DFIG wind turbine is an integrated part of distributed generation system. This paper presents a Fuzzy based controller SMES unit in DFIG for improving the ac output on grid side. The excitation system is composed of the rotor-side converter, the grid-side converter, the dc chopper and the superconducting magnet. The superconducting magnet is connected with the dc side of the two converters, which can handle the active power transfer with the rotor of DFIG and the power grid independently, even thou Sutton small fluctuations are occur in active power on AC side. For smoothening the AC output power waveform a Fuzzy based controller is introduced in SMES controller unit, which implemented using simulation developed in MATLAB/ SIMULINK 7.2 version. The model of the FUZZY controlled SMES based excitation system for DFIG is established, and the simulation tests are performed to evaluate the system performance.
Data Encryption and Authetication Using Public Key Approach Nagaraj, Srinivasan; Raju, G.V.S.P.
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/eei.v4i1.319

Abstract

Today various numbers of   diverse applications that include e- payments in secure commerce and payment applications to provide security  for their communications and transactions by protecting passwords. Encryption is a fundamental tool for the protection of sensitive information. The purpose is to use encryption is privacy for preventing disclosure or confidentiality in during communications. In this paper, we proposed a new method which is based on  the Euler’s Totient  theorem  to produce a set of numbers  that  encrypt the data stream and then we used our proposed method  using  an ECC approach to generate the  signature key  which is added to encrypt data before transmission and decryption operation and  a signature  can verify at the receiver site.
Comparative Study of PWM Control and PI Control of Induction Motor Rohitash Singh; Saurabh Kr. Bajpai; Harinder Singh Sandhu
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v4i1.322

Abstract

The induction motor is without doubt the most used electrical motor because of its unique characteristics.  Most of its applications need fast and intelligent speed control system. This paper presents comparison of the intelligent and advanced speed control methods based on PWM technique and PI controller to achieve maximum torque and efficiency.  Simulation is carried out in MATLAB environment and results are investigated for speed control of induction motor without any controller and with PI controller on full load condition.
Practical IBC using Hybrid-Mode Problems: Factoring and Discrete Logarithm Chandrashekhar Meshram
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v4i1.326

Abstract

Shamir proposed the concept of the ID-based cryptosystem (IBC) in 1984. Instead of generating and publishing a public key for each user, the ID-based scheme permits each user to choose his name or network address as his public key. This is advantageous to public-key cryptosystems because the public-key verification is so easy and direct. In such a way, a large public key file is not required. Since new cryptographic schemes always face security challenges and many integer factorization problem and discrete logarithm based cryptographic systems have been deployed, therefore, the purpose of this paper is to design practical IBC using hybrid mode problems factoring and discrete logarithm. We consider the security against a conspiracy of some entities in the proposed system and show the possibility of establishing a more secure system.
Numerical Investigation of Heat Transfer Enhancement in a Circular Tube with Rectangular Opened Rings Arkan Altaie; Moayed R. Hasan; Farhan Lafta Rashid
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v4i1.331

Abstract

Turbulent forced convection of coolant air flow (10 m/s velocity) in a steel tube of 50 cm long having outside diameter of 60 mm and inside diameter of 30 mm with constant outside surface temperature of 1000, 1200 and 1400 Ko is numerically analyzed. The renormalization group k-ε model is used to simulate turbulence in ANSYS - FLUENT 14.5. An opened ring of rectangular cross section (5x7 mm) is fitted in the tube and separated by 8cm pitch. Results of temperature and velocity distribution along the tube center line for the case of tube with internal ribs  were compared with that of plain tube  , these results show that the use of internal ribs enhance the heat transfer rate and found to possess the highest performance factors for turbulent flow.

Page 1 of 2 | Total Record : 11