Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Source current harmonic mitigation of distorted voltage source by using shunt active power filter

10.11591/ijece.v10i4.pp3967-3977
Muhammad Ossama Mahmoud , Wael Mamdouh , Hamdy Khalil
In this paper, three-phase, four-wire shunt active power filter (SAPF) is utilized to mitigate system harmonics of distorted voltage source for unbalanced and nonlinear loads. Basically, the source voltage should be pure sinusoidal waveform to get a good mitigation of source current harmonics. In this under study system, the source voltage is assumed to be harmonic distortion non-sinusoidal voltage source. The phase locked loop (PLL) control circuit is wielded for extracting the fundamental component of the distorted source voltage to use it as an input signal to the SAPF control. Another input signal to the SAPF is the distorted load current. The SAPF control system uses (p-q) theory to calculate the optimum instantaneous current to be injected by the SAPF to mitigate the source current harmonics even the source voltage is harmonic distorted. MATLAB/SIMULINK software package is utilized to simulate the system under study. The effect of SAPF is tested when it’s used with and without the PLL control circuit. The simulation results show that, the THD of source current when using the PLL control circuit is improved to comply with the harmonic limits given in the IEEE 519-1992 and IEC 61000-4-7 standards.
Volume: 10
Issue: 4
Page: 3967-3977
Publish at: 2020-08-01

Fuzzy logic applications for data acquisition systems of practical measurement

10.11591/ijece.v10i4.pp3441-3450
Muhammad Haddin , Arief Marwanto , Agus Suprajitno , Munaf Ismail
In laboratory works, the error in measurement, reading the measurring devices, similarity of experimental data and lack of understanding of practicum materials are often found. These will lead to the inacurracy and invalid in data obtanined. As an alternative solution, application of fuzzy logic to the data acquisition system using a web server can used. This research focuses on the design of data acquisition systems with the target of reducing the error rate in measuring experimental data on the laboratory. Data measurement on laboratory practice module is done by taking the analog data resulted from the measurement. Furthermore, the data are converted into digital data via arduino and stored on the server. To get valid data, the server will process the data by using fuzzy logic method. The valid data are integrated into a web server so that it can be accessed as needed. The results showed that the data acquisition system based on fuzzy logic is able to provide recommendation of measurement result on the lab works based on the degree value of membership and truth value. Fuzzy logic will select the measured data with a maximum error percentage of 5% and select the measurement result which has minimum error rate.
Volume: 10
Issue: 4
Page: 3441-3450
Publish at: 2020-08-01

Hybrid control strategies of SVC for reactive power compensation

10.11591/ijeecs.v19.i2.pp563-571
Mothanna Sh. Aziz , Ahmed G. Abdullah
This article shows a prospective utilizations of flexible AC transmission system (FACTS) controls, like the static VAR compensator (SVC). One of the major motives for setting up an SVC is to recover dynamic voltage controller and thus increase system load aptitude. Static VAR compensator system proposed in this work consists of thyristor switched capacitor and thyristor controlled reactor sets, this style of SVC modelled using MATLAB simulink toolbox. A hybrid genetic algorithm with PI and fuzzy logic controls that used to control and expand the grid performance of the power system. The model results reveal that the Static Var Compensation contribute a decent result in upholding bus voltage after the power network is in an active and steady moment, besides it has a capability of the constancy control. It can totally work as a significant plan of reactive power recompense in power networks. 
Volume: 19
Issue: 2
Page: 563-571
Publish at: 2020-08-01

A principal component analysis-based feature dimensionality reduction scheme for content-based image retrieval system

10.12928/telkomnika.v18i4.11176
Oluwole A; Ladoke Akintola University of Technology Adegbola , Ismail A; Ladoke Akintola University of Technology Adeyemo , Folasade A; Ladoke Akintola University of Technology Semire , Segun I.; Covenant University Popoola , Aderemi A; Covenant University Atayero
In Content-Based Image Retrieval (CBIR) system, one approach of image representation is to employ combination of low-level visual features cascaded together into a flat vector. While this presents more descriptive information, it however poses serious challenges in terms of high dimensionality and high computational cost of feature extraction algorithms to deployment of CBIR on platforms (devices) with limited computational and storage resources. Hence, in this work a feature dimensionality reduction technique based on Principal Component Analysis (PCA) is implemented. Each image in a database is indexed using 174 dimensional feature vector comprising of 54-dimensional Colour Moments (CM54), 32-bin HSV-histogram (HIST32), 48-dimensional Gabor Wavelet (GW48) and 40-dimensional Wavelet Moments (MW40). The PCA scheme was incorporated into a CBIR system that utilized the entire feature vector space. The k-largest Eigenvalues that yielded a not more than 5% degradation in mean precision were retained for dimensionality reduction. Three image databases (DB10, DB20 and DB100) were used for testing. The result obtained showed that with 80% reduction in feature dimensions, tolerable loss of 3.45, 4.39 and 7.40% in mean precision value were achieved on DB10, DB20 and DB100.
Volume: 18
Issue: 4
Page: 1892-1896
Publish at: 2020-08-01

Real power loss reduction by tundra wolf algorithm

10.11591/ijict.v9i2.pp100-104
Kanagasabai Lenin
In this work Tundra wolf algorithm (TWA) is proposed to solve the optimal reactive power problem. In the projected Tundra wolf algorithm (TWA) in order to avoid the searching agents from trapping into the local optimal the converging towards global optimal is divided based on two different conditions. In the proposed Tundra wolf algorithm (TWA) omega tundra wolf has been taken as searching agent as an alternative of indebted to pursue the first three most excellent candidates. Escalating the searching agents numbers will perk up the exploration capability of the Tundra wolf wolves in an extensive range.  Proposed Tundra wolf algorithm (TWA) has been tested in standard IEEE 14, 30 bus test systems and simulation results show the proposed algorithm reduced the real power loss effectively.
Volume: 9
Issue: 2
Page: 100-104
Publish at: 2020-08-01

Energy efficient power control for device to device communication in 5G networks

10.11591/ijece.v10i4.pp4118-4135
Mohamed Amine Charar , Zouhair Guennoun
Next generation cellular networks require high capacity, enhanced energy efficiency and guaranteed quality of service (QoS). In order to meet these targets, device-to device (D2D) communication is being considered for future 5th generation especially for certain applications that require the proximity gain, the reuse gain, and the hop gain. In this paper, we investigate energy efficient power control for the uplink of an OFDMA (orthogonal frequency-division multiple access) single-cell communication system composed of both regular cellular users and device to device (D2D) pairs. Firstly, we analyze and mathematically model the actual requirements forD2D communications and traditional cellular links in terms of minimum rate and maximum power requirement. Secondly, we use fractional programming in order to transform the original problem into an equivalent concave one and we use the non-cooperative Game theory in order to characterize the equilibrium. Then, the solution of the game is given as a water-filling power allocation. Furthermore, we implement a distributed power allocation scheme using three ways: a) Fractional programming techniques b) Closed form expression (the novelty is the use of wright omega function). c) Inverse water filling. Finally, simulations in both static and dynamic channel setting are presented to illustrate the improved performance in term of EE, SE (spectral efficiency) and time of execution of the iterative algorithm (Dinkelbach) than the closed form algorithms.
Volume: 10
Issue: 4
Page: 4118-4135
Publish at: 2020-08-01

Voltage sag compensation using direct converter based DVR by modulating the error signal

10.11591/ijeecs.v19.i2.pp608-616
S. Abdul Rahman , Estifanos Dagnew
The aim of this paper is to present a modulation technique to achieve highest voltage sag compensation using direct converter based dynamic voltage restorer (DVR). The DVR topology proposed in this paper, has a direct converter and a series transformer. The direct converter is fabricated using only two bi-directional switches. The DVR is designed to compensate the sag in a phase by taking power from the same phase. The direct converter is connected between the series transformer and the line in which sag compensation is to be achieved. Conventionally, the PWM pulses for the direct converters are produced by comparing the error signal with the carrier signal. The error signal is obtained by comparing the amplitude of voltage in the line with the amplitude of the reference voltage. If the amplitude of the carrier signal is kept constant and the actual amplitude of error signal is used for PWM generation, it is possible to achieve only 22% of voltage sag compensation. But if the error signal amplitude is modulated according to the amplitude of existing voltage sag in the line, 52% of the voltage sag can be compensated with the THD less than 5%. Simulation results are presented for validating the analysis. 
Volume: 19
Issue: 2
Page: 608-616
Publish at: 2020-08-01

Identification of paddy leaf diseases based on texture analysis of Blobs and color segmentation

10.12928/telkomnika.v18i4.14614
Alex; State Islamic University of Sultan Syarif Kasim Riau Wenda , Inggih; State Islamic University of Sultan Syarif Kasim Riau Permana , Yusmar; State Islamic University of Sultan Syarif Kasim Riau Yusmar , Nunik Noviana; Educational Quality Assurance Institutions of Riau Province Kurniawati
There are three types of paddy leaf diseases that have similar symptoms, making it difficult for farmers to identify them, namely blast, brown-spot, and narrow brown-spot. This study aims to identification paddy plant diseases based on texture analysis of Blobs and color segmentation. Blobs analysis is used to get the number of objects, area and perimeter. Color segmentation is used to find out some color parameters of paddy leaf disease such as the color of the lesion boundary, the color of the spot of the lesion, and the color of the paddy leaf lesion. To get the best results, four methods have been chosen to obtained the threshold value, Otsu threshold value, variable threshold value, local threshold value and global threshold value. The best accuracy of the four methods using threshold variables is 90.7%. The results of this study indicate that the method used has been very satisfactory in identifying paddy plant disease.
Volume: 18
Issue: 4
Page: 2018-2026
Publish at: 2020-08-01

The study of reducing the cost of investment in wind energy based on the cat swarm optimization with high reliability

10.12928/telkomnika.v18i4.15046
Hamzi; Dr. Moulay Taher University of SAIDA Amar , Meziane; Dr. Moulay Taher University of SAIDA Rachid , Bouanane; Dr. Moulay Taher University of SAIDA Abdelkrim
Wind and solar are the most important source of renewable energy for power supply in remote locations involves serious consideration of the reliability of these unconventional energy sources. We apply the cat swarm meta-heuristic optimization method to solve the problem of wind power system design optimization. The electrical power components of the system are characterized by their cost, capacity and reliability. This study seeks to optimize the design of parallel power systems in which multiple choices of generators wind, transformers and lines. Our plan has the advantage of allowing electrical components with different parameters to be customized in electrical power systems. The UMGF method is applied to allow rapid reliability estimation. A computer program is developed for the UMGF application and CS algorithm. An example is provided to explain.
Volume: 18
Issue: 4
Page: 2245-2250
Publish at: 2020-08-01

Offset effect on the S-Bend structure losses and optimization of its size for integrated optics

10.11591/ijece.v10i4.pp4162-4167
Fatima Brik , S. Harize , A. Fares , K. Saouchi
The S-Bend structures are heavily exploited to join optical components. Reducing the power loss caused by the curve is the main objective in the design step of these components. However integrated optical circuits require S-Bend waveguide to be low loss and compact sized. In this paper, we present a contribution to link the curved structure to the straight waveguide by using the simulated bend function available in the Beam propagation tool of the Rsoft commercial software package. Simulation results confirm that this approach allows a reduction of the size of the curved structure with offset with relatively minimum of losses for photonic field.
Volume: 10
Issue: 4
Page: 4162-4167
Publish at: 2020-08-01

Bullying behavior among students

10.11591/ijere.v9i3.20437
Maria Ulfah , Erni Gustina
This study aimed to investigate whether communication patterns, peers’ involvement and gender different can be the predictors of adolescent bullying behavior. This study involved 193 adolescents of grade 8 and 9 with the most adolescents of 14 years old who had filled in questionnaires. The results showed the prevalence of adolescent involvement in bullying which was 62.69%. Parental communication patterns have an OR = 1.64 (95% CI=0.87-3.09). Peers involvement in bullying behavior (OR=1.92; 95% CI=1.01-3.66). Adolescent girls were more involved in bullying behavior (59.59%) compared to adolescent boys (OR=3.32; 95% CI=1.69-6.54). Poor parental communication patterns, peers influence negatively predict to the bullying behavior in adolescent. Bullying is higher in boys than girls where as boys has a greater chance of bullying than girls. Therefore, bullying intervention programs are needed in schools.
Volume: 9
Issue: 3
Page: 644-649
Publish at: 2020-08-01

Methodology for detection of paroxysmal atrial fibrillation based on P-Wave, HRV and QR electrical alternans features

10.11591/ijece.v10i4.pp4023-4034
Henry Castro , Juan David Garcia-Racines , Alvaro Bernal-Noreña
The detection of Paroxysmal Atrial Fibrillation (PAF) is a fairly complex process performed manually by cardiologists or electrophysiologists by reading an electrocardiogram (ECG). Currently, computational techniques for automatic detection based on fast Fourier transform (FFT), Bayes optimal classifier (BOC), k-nearest neighbors (K-NNs), and artificial neural network (ANN) have been proposed. In this study, six features were obtained based on the morphology of the P-Wave, the QRS complex and the heart rate variability (HRV) of the ECG. The performance of this methodology was validated using clinical ECG signals from the Physionet arrhythmia database MIT-BIH. A feedforward neural network was used to detect the presence of PAF reaching a general accuracy of 97.4%. The results obtained show that the inclusion of the information of the P-Wave, HRV and QR Electrical alternans increases the accuracy to identify the PAF event compared to other works that use the information of only one or at most two of them.
Volume: 10
Issue: 4
Page: 4023-4034
Publish at: 2020-08-01

Outage probability analysis in DF power-splitting full-duplex relaying network with impact of Co-channel interference at the destination

10.12928/telkomnika.v18i4.13716
Phu Tran; Industrial University of Ho Chi Minh City Tin , Duy Hung; Ton Duc Thang University Ha , Minh; Ton Duc Thang University Tran
Nowadays, improving the WPCN efficiency problem is the leading research direction in the communication network. In this research, the outage probability (OP) analysis in DF power-splitting (PS) full-duplex (FD) relaying network with impact of co-channel interference at the destination is proposed and investigated. In the system model section, we present the DF PS FD Relaying Network with Impact of Co-channel interference at the destination. Then in the system performance section, we analyze and derive the closed-form expression of the OP and investigate the effect of the main system parameters on the system network performance. Then, we perform the Monte Carlo simulation to verify the analytical section. This research can provide a new recommendation for the communication network.
Volume: 18
Issue: 4
Page: 1828-1833
Publish at: 2020-08-01

Handwriting identification using deep convolutional neural network method

10.12928/telkomnika.v18i4.14864
Oka; Udayana University Sudana , I Wayan; Udayana University Gunaya , I Ketut Gede; Udayana University Darma Putra
Handwriting is a unique thing that produced differently for each person. Handwriting has a characteristic that remain the same with single writer, so a handwriting can be used as a variable in biometric systems. Each person have a different form of handwriting style but with a small possibility that same characters have something commons. This paper proposes a handwriting identification method using sentence segmented handwriting forms. Sentence form is used to get more complete handwriting characteristics than using a single characters or words. Dataset used is divided into three categories of images, binary, grayscale, and inverted binary. All datasets have same image with different in color and consist of 100 class. Transfer learning used in this paper are pre-trained model VGG19. Training was conducted in 100 epochs. Highest result is grayscale images with genuince acceptance rate of 92.3% and equal error rate of 7.7%.
Volume: 18
Issue: 4
Page: 1934-1941
Publish at: 2020-08-01

Enhancenig OLSR routing protocol using K-means clustering in MANETs

10.11591/ijece.v10i4.pp3715-3724
Y. Hamzaoui , M. Amnai , A. Choukri , Y. Fakhri
The design of robust routing protocol schemes for MANETs is quite complex, due to the characteristics and structural constraints of this network. A numerous variety of protocol schemes have been proposed in literature. Most of them are based on traditional method of routing, which doesn’t guarantee basic levels of Qos, when the network becomes larger, denser and dynamic. To solve this problem we use one of the most popular methods named clustering. In this work we try to improve the Qos in MANETs. We propose an algorithm of clustering based in the new mobility metric and K-Means method to distribute the nodes into several clusters; it is implemented to standard OLSR protocol giving birth a new protocol named OLSR Kmeans-SDE. The simulations showed that the results obtained by OLSR Kmeans-SDE exceed those obtained by standard OLSR Kmeans and OLSR Kmed+ in terms of, traffic Control, delay and packet delivery ratio.
Volume: 10
Issue: 4
Page: 3715-3724
Publish at: 2020-08-01
Show 1100 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration