Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

24,092 Article Results

Coordination of Distributed Generators and Energy Storage Systems

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3375
Yu Wenpeng , Liu Dong , Huang Yuhui
As the interconnection of distributed generation (DG) and energy storage system (ESS), the operation of DG/ESS should be optimized and coordinated. The intermittence of renewable energy and the error of the load forecasting, which is usually taken as the raw data of the global optimization algorithm, cause difference between the actual and the optimal operating status of the network. Feeder Control Error (FCE) is proposed based on the difference between the actual and the optimal net load of the network, and quantifies the operating error of the network. A coordinating control system of all the DG/ESS is proposed based on FCE, and 3 different control modes are put forwards. With the coordination system, the difference between the actual and the optimal net load are balanced by all the DG/ESS proportionally, and this reduces the operating error relative to the optimal operation status. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4941
Volume: 12
Issue: 4
Page: 3230-3239
Publish at: 2014-04-01

Design of Structural Parameters of Centrifugal Elevator Overspeed Governors

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3283
Yunpu Song , Cheng Chen
As an important part of overs-peed and fail-safe protection for elevators, the centrifugal elevator overspeed governor is a device for limiting overspeed of elevator cars. This paper researches on the impact of the spring stiffness of the centrifugal block, which plays a key role in the performance of this overspeed governor, on the operation of the over-speed governor. By setting up a mathematical model and further carrying out simulation analysis, this paper researches on the influence of systematic parameters, such as the mass of centrifugal block, the turning radius of the centrifugal block, the amount of spring compression of the centrifugal block, on the spring stiffness of the centrifugal block, and obtains their specific influence relationship. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4839
Volume: 12
Issue: 4
Page: 2480-2488
Publish at: 2014-04-01

Improvement of Voltage Profile through the Optimal Placement of FACTS Using L-Index Method

https://ijece.iaescore.com/index.php/IJECE/article/view/5562
K. Venkata Ramana Reddy , M. Padma Lalitha , PB Chennaiah
In this paper an IEEE standard test system is considered and it is tested using Newton-Raphson method with the help of MATLAB. The voltage magnitudes of each bus are examined and the corresponding weak bus is incorporated with FACTS such as SVC and TCSC. The optimal placement of FACTS can be identified using L-Index method. The value of L-index which approach unity implies that it reaches to instability. From this instability point the system stability is improved during steady state and Fault conditions. The disturbance is created in the system by changing the Load Reactive Power at a particular Bus.DOI:http://dx.doi.org/10.11591/ijece.v4i2.5136
Volume: 4
Issue: 2
Page: 207-211
Publish at: 2014-04-01

Algorithms for Lorenz System Manifold Computation

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3290
Meng Jia , Bing Wu
A new algorithm is presented to compute both one dimensional stable and unstable manifolds of planar maps. It is proved that the gradient of the global manifold can be predicted by the known points on the manifold with a gradient prediction scheme and it can be used to locate the image or preimage of the new point quickly. The performance of the algorithm is demonstrated with hyper chaotic Lorenz system. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4740
Volume: 12
Issue: 4
Page: 2543-2547
Publish at: 2014-04-01

Multi-Agent Approach for facing challenges in Ultra-Large Scale systems

https://ijece.iaescore.com/index.php/IJECE/article/view/5572
Hamid Bagheri , Mohammad Ali Torkamani , Zhaleh Ghaffari
The primary characteristics of ULS systems are ultra-large size, number of lines of code (LOC); number of people employing the systems; amount of data stored, accessed, manipulated, and refined; number of connections and interdependencies among software components; number of hardware elements. These characteristics of ULS systems make it impossible to rely on our current knowledge and techniques of software development. We will face fundamental challenges in the design and evolution, orchestration and control, and monitoring and assessment of ULS systems. In this paper we try to make a combination between ULS systems and Multi Agent Systems and to use Multi Agent System strengths to help tackling some challenges found in ultra-large scale systems. Banking system is an instance of ULS systems. As a case study, in a real project we have designed Automated Teller Machine (ATM) combination with biometric sensors based on multi-agent architecture.DOI:http://dx.doi.org/10.11591/ijece.v4i2.4102 
Volume: 4
Issue: 2
Page: 151-154
Publish at: 2014-04-01

An improved RBF neural network method for information security evaluation

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3338
Yinfeng Liu
Itis well-known that information security means the protection of information,and ensuring the availability, confidentiality and integrity of information. The purposeof this paper is to present an improved RBF neural network method forinformation evaluation. Ant colony optimization is a multi-agent approach fordifficult combinatorial optimization problems, which has been applied tovarious NP hard problems. Here, ant colony optimization algorithm is applied tooptimize the parameters of RBF neural network. In this paper, we employ  “unauthorized access”, “unauthorized accessto a system resource”, “data leakage”, “denial of service”, “unauthorizedmodification data and software”, “system crash” as the features of informationsecurity evaluation. It is indicated that the information security evaluation error of the improvedRBF neural network is smaller than that of the RBF neural network. Thus, theimproved RBF neural network is very suitable for information security evaluation. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4806
Volume: 12
Issue: 4
Page: 2936-2940
Publish at: 2014-04-01

License Plate Recognition Model Research Based on the Multi-Feature Technology

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3313
Li Ju-xia
Due to the impact of pollution, environment and so on in actual scene, it is difficult for the traditional single feature recognition model to obtain a higher accuracy of the license plate recognition. The paper proposed a new license plate image recognition model. First, the structural features and gray level features of the license plate, such as the contour and stroke order are extracted. Then, the principal component analysis is used to carry out the fusion, dimensionality reduction and redundancy removal processing for the two kinds of features, and a fuzzy fusion model for differentiated features is introduced to ensure minimal loss for the feature in fusion. Finally, the final result of the license plate image recognition is achieved in accordance with high degree of confidence criterion when the slope interference of the license plate is considered fully. Simulation results show that the license plate image recognition model based on multi-feature combination can solve the problem of the single feature recognition model, improve the accuracy of license plate recognition which is up to 99%. Moreover, the model has a faster recognition speed and can be applied to the actual license plate recognition. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4307
Volume: 12
Issue: 4
Page: 2724-2734
Publish at: 2014-04-01

Beamforming Techniques for Smart Antenna using Rectangular Array Structure

https://ijece.iaescore.com/index.php/IJECE/article/view/5567
S.K. Bodhe , B.G. Hogade , Shailesh Dharma Nandgaonkar
In this paper, array theory in general has been discussed. Basic fundamentals of smart antenna and beamforming techniques using rectangular array theory is discussed. Two techniques, Matrix inversion and IDFT method , for their pros and cons were described which were used for beamforming. Both the techniques found to be useful as their areas of application differs on hardware background. The design of a fully spatial signal processor using rectangular array configuration is presented in this paper. It has wideband properties and,hence eliminates the requirement of different antenna spacing. Furthermore,frequency selectivity and rejecting unwanted signals gives the satisfactory performance for practical implementation.DOI:http://dx.doi.org/10.11591/ijece.v4i2.5860
Volume: 4
Issue: 2
Page: 257-264
Publish at: 2014-04-01

A Kind of Discrete Variable Frequency Heavy-Load Soft Start System

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3370
Xiao Yi-ping
A kind of discrete variable frequency heavy-load soft start system was designed in order to realize heavy-load soft starting of motor. It consisted of variable reactance converter, discrete variable frequency converter and controller. The system structure was described in detail and the principle of discrete variable frequency heavy-load soft starting was analyzed. Also the model of the system was made and simulation of the system was done. The simulation results proved that the system can not only start motor smoothly, but also increase the motor start torque greatly, thus heavy load soft-starting of motor can be realized perfectly. In addition, the experiment of the system was done. The experiment results proved that the simulation was   correct and the designed discrete variable frequency heavy-load soft start system can realize heavy-load soft start of motor. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4930
Volume: 12
Issue: 4
Page: 3193-3199
Publish at: 2014-04-01

Genetic Algorithm Based Reactive Power Management by SVC

https://ijece.iaescore.com/index.php/IJECE/article/view/5561
Md. Imran Azim , Md. Fayzur Rahman
This paper contains an approach of a generalized optimization formulation regarded as genetic algorithm with a view to determining the optimal location of distributed generators in 10-bus network offering reactive power capability. It is certainly the case that the reactive power management plays a noteworthy role, when it is required to improve not just the voltage profile but the voltage stability as well. In this paper, the requisite reactive power planning has been precisely solved by the evolutionary genetic algorithm, which is based on biological metaphor, in which best individuals are selected among parents and offspring generation. In addition, genetic algorithm does not need initial information about the system to begin the searching process since it works only with the chromosomes which will be optimized according to the objective functions and the proper constraints. As far as this paper goes, the injection of 228.5469553MVAR reactive power by Static Var Compensator (SVC) is enough to maintain voltage stability throughout the system.DOI:http://dx.doi.org/10.11591/ijece.v4i2.5879
Volume: 4
Issue: 2
Page: 200-206
Publish at: 2014-04-01

Security Interaction of Web Services in Heterogeneous Platforms

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3330
Tao Xu , Xin Hu , Jiwen Xie , Shujuan Sun
Currently, there are a large number of heterogeneous platforms. The standards of Web Services in different platforms are different and complex. Therefore, security interaction of Web services based on heterogeneous platform has become increasingly prominent. In order to realize security interaction of heterogeneous platforms, a security interactive model of Web Service based on WebSphere and .NET is proposed in this paper. The model adopts an approach based on predicate logic to integrate the security policies of heterogeneous platforms and uses the integrated policy to sign the SOAP message. The experimental results show that the model can ensure the safety of SOAP message transmission and realize the security session between these two heterogeneous platforms. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4734
Volume: 12
Issue: 4
Page: 2868-2874
Publish at: 2014-04-01

The Improved Key Exchange Protocol Based on Public Key Certificates

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3349
Cuijie Zhao , Guozhen Wang
We propose mutual authentication and session key exchange protocols based on certificates for the Internet of Things. We also propose an improved version for the conventional certificate-based systems. Our protocol is efficient, it requires fewer messages and only one session key. It gives use a new method to deal with such as preventing tampering and preventing interference security problems. In designing the security protocol proposed here, the low computational power of the wireless sensors nodes and the low bandwidth of the wireless networks are considered. It is good as low computational complexity and cannot be forged. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4775
Volume: 12
Issue: 4
Page: 3021-3029
Publish at: 2014-04-01

Analysis of Multiple-Bit Shift-Left Operations on Complex Numbers in (−1+j)-Base Binary Format

https://ijece.iaescore.com/index.php/IJECE/article/view/5571
Tariq Jamil , Usman Ali
Complex numbers find various applications in the field of engineering. To avoid excessive delays in production of results obtained by implementing divide-and-conquer technique in dealing with arithmetic operations involving this type of numbers in today’s computer systems, Complex Binary Number System with base(−1+j) has been proposed in scientific literature. In this paper, we have investigated the effects of bit-wise shift left operations (from 1-8 bits) on the complex binary representation of complex numbers and analyzed these results using mathematical equations.DOI:http://dx.doi.org/10.11591/ijece.v4i2.5283
Volume: 4
Issue: 2
Page: 295-302
Publish at: 2014-04-01

Research on Control Strategy of Improved Single-phase Active Power Filter

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3306
Gang Hu , Chuan Zang , Ya-jie Ma , Zhi-guo Xiao , Wei-li Dai
Unipolar single-phase active power filter control strategies need to the transformers and adders. Moreover, the circuits to fulfill the control strategy are more complicated. In order to solve above problems, an improved unipolar modulation control strategy has been performed in this paper. The principle of control strategy was analyzed in detail in this paper and related simulation has been finished. The results of simulation show that this improved control strategy can simplify the structure of circuit without affecting the system performance index. DOI : http://dx.doi.org/10.11591/telkomnika.v12i4.4817
Volume: 12
Issue: 4
Page: 2677-2682
Publish at: 2014-04-01

Achieving Pull-in Avoiding Cycle Slip Using Second-order PLLs

https://ijece.iaescore.com/index.php/IJECE/article/view/5566
Abu Sayeed Ahsanul Huque
Synchronization is an essential process and one of the first tasks of the receiver in case of coherent communications as well synchronous digital data transfer. The phase lock loop (PLL), which employs the error tracking technique, has been a very popular way to implement this synchronizer since the early 1930s. A phenomenon called cycle slip occurs when the number of cycles present in the transmitted carrier (clock) differs from that of the recovered carrier (clock) at the receiver. The cycle slip can be very detrimental to some applications such as frequency modulated communications systems (FSK, multi-carrier etc.), burst digital data transfer, training pulse retrieval, and so on. This paper presents a remedy to avoid the cycle slip by using properly designed second-order Type II PLL.DOI:http://dx.doi.org/10.11591/ijece.v4i2.5048
Volume: 4
Issue: 2
Page: 243-256
Publish at: 2014-04-01
Show 1436 of 1607

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration