cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
,
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Arjuna Subject : -
Articles 627 Documents
Practical IBC using Hybrid-Mode Problems: Factoring and Discrete Logarithm Chandrashekhar Meshram
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v4i1.326

Abstract

Shamir proposed the concept of the ID-based cryptosystem (IBC) in 1984. Instead of generating and publishing a public key for each user, the ID-based scheme permits each user to choose his name or network address as his public key. This is advantageous to public-key cryptosystems because the public-key verification is so easy and direct. In such a way, a large public key file is not required. Since new cryptographic schemes always face security challenges and many integer factorization problem and discrete logarithm based cryptographic systems have been deployed, therefore, the purpose of this paper is to design practical IBC using hybrid mode problems factoring and discrete logarithm. We consider the security against a conspiracy of some entities in the proposed system and show the possibility of establishing a more secure system.
Numerical Investigation of Heat Transfer Enhancement in a Circular Tube with Rectangular Opened Rings Arkan Altaie; Moayed R. Hasan; Farhan Lafta Rashid
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v4i1.331

Abstract

Turbulent forced convection of coolant air flow (10 m/s velocity) in a steel tube of 50 cm long having outside diameter of 60 mm and inside diameter of 30 mm with constant outside surface temperature of 1000, 1200 and 1400 Ko is numerically analyzed. The renormalization group k-ε model is used to simulate turbulence in ANSYS - FLUENT 14.5. An opened ring of rectangular cross section (5x7 mm) is fitted in the tube and separated by 8cm pitch. Results of temperature and velocity distribution along the tube center line for the case of tube with internal ribs  were compared with that of plain tube  , these results show that the use of internal ribs enhance the heat transfer rate and found to possess the highest performance factors for turbulent flow.
Piezoelectric Nanowire toward Harvesting Energy from In-Vivo Environment Ali Ghareaghaji
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v4i1.327

Abstract

This paper discusses technologies used to harvest energies from in-vivo environment. The discussion mainly concentrated on  nanogenerators based on Piezoelectric nanowires which are employed for converting biomechanical energy (such as muscle stretching), vibration energy (such as heart rate sound, sound waves) and  biohydraulic energy (such as blood flow, contraction of blood vessel) into electric energy. At the end this paper studies an approach for harvesting biomechanical and biochemical energies from living organisms simultaneously. This system, by using aligned nanowire arrays, can power medical nanosystems and nanodevices through converting vibration, biomechanical and biohydrulic energies into electricity. On the other hand by using biofuel cell structure, this hybrid cell can convert biochemical (glucose/O2) energy in biofluid into electricity. This technology can provide adequate power required for feeding nanodevices and nanosystems or at least to indirectly charge battery of the device. This technology can provide a sound basis for designing wireless self-powered nanodevices with direct energy harvesting from in-vivo environment.
Reduction of Real Power Loss and Safeguarding of Voltage Constancy by Artificial Immune System Algorithm Kanagasabai Lenin; B.Ravindhranath Reddy; M. Suryakalavathi
Bulletin of Electrical Engineering and Informatics Vol 4, No 2: June 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v4i2.436

Abstract

In this paper, Artificial Immune System (AIS) algorithm is used for solving reactive power problem.  Artificial Immune System Algorithm, also termed as the machine learning approach to Artificial Intelligence, are powerful stochastic optimization techniques with potential features of random search, hill climbing, statistical sampling and competition. Artificial immune system algorithmic approach to power system optimization these ideas are embedded into proposed algorithm for solving reactive dispatch problem. In order to evaluate the proposed algorithm, it has been tested in standard IEEE 30,118 bus systems and compared to other specified algorithms. Simulation results show better performance of the proposed AIS algorithm in reducing the real power loss and preservation of voltage stability.
Analysis of the Transformerless Boost dc-dc Converter with High Voltage Gain in Different Operating Modes and Critical Inductance Calculations Ebrahim Babaei; Azadeh Mofidi; Sara Laali
Bulletin of Electrical Engineering and Informatics Vol 4, No 2: June 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v4i2.434

Abstract

In the high voltage dc-dc boost converters, the energy transmission modes are divided into continuous conduction mode (CCM) and discontinuous conduction mode (DCM). In addition, these modes are also divided into two different modes: complete inductor supply mode (CISM) and incomplete inductor supply mode (IISM). In this paper, the operation of the boost dc-dc converter with high voltage gain is analyzed. Firstly, the energy transmission process between CCM and DCM is analyzed. Then, this process is investigated between IISM and CISM. Moreover, the critical inductance between CCM and DCM in addition to CISM and IISM is calculated. Finally, in order to verify the presented theoretical issues, the simulation results in EMTDC/PSCAD software program are used.
Investigating the Effect of Demand Side Management on the Power System Reliability Habib Daryabad
Bulletin of Electrical Engineering and Informatics Vol 4, No 2: June 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v4i2.444

Abstract

In electric power systems, the generated power should be equal with the demand and power of network is mainly controlled through generation system. In such operation, the demand is satisfied through changing the generated power and afterward, the safe operation of power system is reached. But during recent years, a new concept has been developed in electric power systems namely demand side management (DSM). DSM is the modification of consumer demand for energy through various methods such as financial incentives and education. Usually, the goal of demand side management is to encourage the consumer to use less energy during peak hours, or to move the time of energy use to off-peak times such as nighttime and weekends. One of the important models of DSM is interruptible loads. Interruptible loads are the right for an electricity utility to interrupt supply to a customer, typically during a system emergency, to relieve short term network constraints up to a couple of hours. Interruptible loads can be deployed in one of two ways. The network operator gives notice of an interruptible load event to the customer, then relies on the customer to reduce their electricity usage; or unilaterally interrupts supply to the customer. In this paper, the effect of interruptible loads on the power system reliability is investigated. A multi machine power system is considered as cases study. Simulation results show the great effects of interruptible loads on the power system reliability.
A Highly Efficient and Linear Class AB Power Amplifier for RFID Application Sepideh Fazel; Javad Javidan
Bulletin of Electrical Engineering and Informatics Vol 4, No 2: June 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v4i2.443

Abstract

Power amplifiers (PAs) are usually the largest consumer of power in the transmitter. Therefore, designing a high efficiency RF power amplifier might be the best solution to cope with the problem of battery lifetime limitations in portable RFID code reader. In this paper, the designed circuit in Agilent ADS software is implemented using 0.18 μm RFCMOS technology at 3.3 v supply voltage. The measured results indicate that power added efficiency,out put power and power gain of the proposed class AB power amplifier at frequency of 2.4GHz are 35% , 30dBm and 28dBm.
Discrete Logarithm and Integer Factorization using ID-based Encryption Chandrashekhar Meshram
Bulletin of Electrical Engineering and Informatics Vol 4, No 2: June 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v4i2.437

Abstract

Shamir proposed the concept of the ID-based Encryption (IBE) in [1]. Instead of generating and publishing a public key for each user, the ID-based scheme permits each user to choose his name or network address as his public key. This is advantageous to public-key cryptosystems because the public-key verification is so easy and direct. In such a way, a large public key file is not required. Since new cryptographic schemes always face security challenges and many integer factorization and discrete logarithm based cryptographic systems have been deployed, therefore, the purpose of this paper is to design a transformation process that can transfer the entire discrete logarithm and integer factorization based cryptosystems into the ID-based systems rather than re-invent a new system. We consider the security against a conspiracy of some entities in the proposed system and show the possibility of establishing a more secure system.
A New Meta-heuristic Technique Based on Robust Power System Stabilizer with Wind Power Penetrations Vahid Sattarpoor; Homayoun Ebrahimian
Bulletin of Electrical Engineering and Informatics Vol 4, No 2: June 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v4i2.313

Abstract

In this paper a robust Power System Stabilizer (PSS) is proposed based on inverse additive perturbation in a power system with wind farms. The  proposed controller designed by new Improve Bacteria Foraging Algorithm (IBFA) to achieve robustness of this strategy where the optimization process is formulated based on an enhancement of system robust stability margin. The designed optimal PSS is based on Fuzzy Logic Controller (FLC). The effectiveness of the proposed technique is tested over ten macine 39 buses New England power system. Obtained results demonstrate the superiority of proposed technique over conventional PSS.
How Can We Identify Hijacked Journals? Mehdi Dadkhah; Marwan M. Obeidat; Mohammad Davarpanah Jazi; Tole Sutikno; Munawar A Riyadi
Bulletin of Electrical Engineering and Informatics Vol 4, No 2: June 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v4i2.449

Abstract

By developing research and academic centers, the number of performed research articles has also increased. On the other hand, publishing the results of these articles in scientific journals shall also grow. In the meantime, researchers are trying to publish the findings of their research in journals which have been approved by one or more international indices so that such findings can be seen. In order to enhance the academic standards of Universities, proper journal choice will be of interest to researchers, especially those that are indexed in websites such as Thomson Reuters. However, certain forgery frauds researchers by launching fake Web sites that have been named by academic journal titles. In this paper, we introduce an approach to identify this type of journals that will be applicable by researchers in various academic disciplines.