Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,905 Article Results

New Blind Muti-signature Schemes based on ECDLP

10.11591/ijece.v8i2.pp1074-1083
Duc Nguyen Tan , Hai Nguyen Nam , Minh Nguyen Hieu , Hiep Nguyen Van
In various types of electronic transactions, including election systems and digital cash schemes, user anonymity and authentication are always required. Blind signatures are considered the most important solutions to meeting these requirements. Many studies have focused on blind signature schemes; however, most of the studied schemes are single blind signature schemes. Although blind multi-signature schemes are available, few studies have focused on these schemes. In this article, blind multi-signature schemes are proposed based on the Elliptic Curve Discrete Logarithm Problem (ECDLP). The proposed schemes are based on the GOST R34.10-2012 digital signature standard and the EC-Schnorr digital signature scheme, and they satisfy blind multi-signature security requirements and have better computational performance than previously proposed schemes. The proposed schemes can be applied in election systems and digital cash schemes.
Volume: 8
Issue: 2
Page: 1074-1083
Publish at: 2018-04-01

A Fault Detection Technique for Series-compensated Lines by TCSC during Power Swing

10.11591/ijape.v7.i1.pp40-51
Saeed Rezaei , Mojtaba Khederzadeh , Majid Gandomkar
The performance of a distance relay is very susceptible to power swing. In order to avoid generating unwanted trip in such condition, a power swing block function (PSB) is used in distance relays. However, if a fault occurs in power swing condition, the relay should distinguish the fault from power swing and generate trip rapidly. Detection a fault in a series-compensated line by Series Capacitor (SC) during the power swing is more complicated than in an uncompensated line due to complex transients generated by series capacitor and the Metal–Oxide Varistor (MOV) operation. In a series-compensated line by TCSC, it is further complicated due to nonlinear variation of compensation level during power swing and fault, moreover, non-unique application mode of TCSC for different faults which is dependent on fault current. This paper examines a method based on negative sequence current to detecting all types of fault during power swing in a series-compensated line by TCSC. The method is tested for different TCSC-compensated power systems include SMIB and 9-bus 3-machine systems. Different types of faults, i.e., symmetrical, asymmetrical and high resistance faults occurring during a power swing are simulated by MATLAB/SIMULINK to examine the algorithm.
Volume: 7
Issue: 1
Page: 40-51
Publish at: 2018-04-01

Localized Transient Stability (LTS) Method for Real-time Localized Control

10.11591/ijape.v7.i1.pp73-86
Abdul Malek Miah
Very recently, a new methodology was introduced solely for the purpose of real-time localized control of transient stability. The proposed new method is based on the localized transient stability of a power system. This is completely a new idea in transient stability. In this method, the post-fault power system is represented by a two-generator localized power system at the site of each individual generator. If each of these localized power systems reaches its respective stable equilibrium, then the full power system also reaches its stable equilibrium. Therefore, in terms of real-time localized control of transient stability, if each of the localized power systems is driven to its respective stable equilibrium by local control actions with local computations using the locally measured data, then the full power system is driven to its stable equilibrium. Thus the method can be easily implemented for real-time localized control of transient stability. In this paper, the details of the mathematical formulations are presented. Some interesting test results on the well-known New England 39-bus 10-generator system are also presented in this paper to demonstrate the potential of the proposed method for use in real-time localized control of transient stability. 
Volume: 7
Issue: 1
Page: 73-86
Publish at: 2018-04-01

A New Design of a CPW-Fed Dual-Band Monopole Antenna for RFID Readers

10.11591/ijece.v8i2.pp1040-1047
Ahmed El Hamraoui , EL Hassane Abdelmounim , Jamal Zbitou , Hamid Bennis , Mohamed Latrach
This paper comes with a new dual-band planar monopole antenna fed by Coplanar Waveguide (CPW) line designed for RFID readers and it operates at 2.45 GHz, 5.80 GHz. This antenna is designed with reasonable gain, low profile and low cost production. The designed antenna based on theoretical equations is simulated and validated by using ADS from Agilent technologies and CST Microwave Studio electromagnetic solvers. A parametric study of the proposed antenna has been carried out by optimizing some critical parameters. The antenna has a total area of 35×38 mm2 and mounted on an FR4 substrate with dielectric permittivity constant 4.4 and thickness of 1.6 mm and loss tangent 0.025. The comparison between simulation and measurement results permits to validate the final achieved antenna structure in the desired RFID frequencies bands. Details of the proposed antenna design and both simulated and experimental results are described and discussed
Volume: 8
Issue: 2
Page: 1040-1047
Publish at: 2018-04-01

Balancing Trade-off between Data Security and Energy Model for Wireless Sensor Network

10.11591/ijece.v8i2.pp1048-1055
Manjunath B. E. , P. V. Rao
An extensive effort to evolve various routing protocol to ensure optimal data delivery in energy efficient way is beneficial only if there is additional means of security process is synchronized. However, the security process consideration introduces additional overhead thus a security mechanism is needed to accomplish an optimal trade-off that exists in-between security as well as resource utilization especially energy. The prime purpose of this paper is to develop a process of security in the context of wireless sensor networks (WSN) by introducing two types of sensor node deployed with different capabilities. The proposed algorithm Novel Model of Secure Paradigm (N-MSP) which is further integrated with WSN. However, this algorithm uses a Hash-based Message Authentication Code (HMAC) authentication followed by pairwise key establishment during data aggregation process in a WSN. The extensive simulation carried out in a numerical platform called MATLAB that depicts that the proposed N-MSP achieves optimal processing time along with energy efficient pairwise key establishment during data aggregation process
Volume: 8
Issue: 2
Page: 1048-1055
Publish at: 2018-04-01

Novel Technique for Comprehensive Noise Identification and Cancellation in GSM Signal

10.11591/ijece.v8i2.pp1222-1229
Rekha N , Fathima Jabeen
Presence of noise significantly degrades the contents being transmitted over GSM channel. With the evolution of next generation of communication system, the challenges in noise cancellation in voice along with data transmission are not being addressed effectively by existing filters. Therefore, the proposed system offers a mechanism where emphasis is laid on identification of superior and inferior forms of GSM transient signal followed by cancellation of its noise level. Designed using analytical methodology, the proposed system harness the potential of probability theory to perform a modeling that associates allocated power of the transmitting device with the level of noise. The outcome of the study is found to offer a comprehensive identification of different forms of noise and can precisely determine the level of superior and inferior quality of signal. The outcome significantly assists in designing an accurate filter for noise cancellation in GSM signal.
Volume: 8
Issue: 2
Page: 1222-1229
Publish at: 2018-04-01

Improve The Performance of K-means by using Genetic Algorithm for Classification Heart Attack

10.11591/ijece.v8i2.pp1256-1261
Asraa Abdullah Hussein
In this research the k-means method was used for classification purposes after it was improved using genetic algorithms. An automated classification system for heart attack was implemented based on the intelligent recruitment of computer capabilities at the same time characterized by high performance based on (270) real cases stored within a globally database known (Statlog). The proposed system aims to support the efforts of staff in medical felid to reduce the diagnostic errors committed by doctors who do not have sufficient experience or because of the fatigue that the doctor suffers as a result of work pressure. The proposed system goes through two stages: in the first-stage genetic algorithm is used to select important features that have a strong influence in the classification process. These features forms the inputs to the K-means method in the second-stage which uses the selected features to divide the database into two groups one of them contain cases infected with the disease while the other group contains the correct cases depending on the distance Euclidean. The comparison of performance for the method (K-means) before and after addition genetic algorithm shows that the accuracy of the classification improves remarkably where the accuracy of classification was raised from (68..1481) in the case of use (k- means only) to (84.741) when improved the method by using genetic algorithm.
Volume: 8
Issue: 2
Page: 1256-1261
Publish at: 2018-04-01

A Novel on Stability and Fault Ride through Analysis of Type-4 Wind Generation System Integrated to VSC-HVDC Link

10.11591/ijape.v7.i1.pp52-58
Ch. S. V. S. Phani Kumar , T. Vinay Kumar
Now-a-days pollution is increasing due to “Non Renewable Energy Sources”. In order to enhance the efficiency of conventional grid and to generate the electrical power in eco-friendly way, the renewable energy sources are employed. In this paper a type 4 wind generation system is implemented to analyse the system under fault conditions and to analyse the grid stability. In the proposed system type-4 wind generation system integrated to grid through VSC-HVDC link analysis is done by considering a fault on the grid side by the system gets isolated and wind generation system transfers voltage to local load and remote load. When a DC fault is occurred on the VSC-HVDC link then the grid side breaker and wind side breaker gets open, then system gets isolated. This is implemented by considering “Low Voltage Ride Through” (LVRT) conditions, According to the Indian grid code of contact wind generation maintain constant even the voltage collapse is occurred on the grid side. The proposed VSC-HVDC based Type-4 Wind Generation System give more reliable to operate in LVRT condition and can meet the Load demand when the system is under fault condition to some extent; The proposed method is Type –4 Wind generator is of 4.4MW/2.2kV each with a total plant capacity of 110MW operated with VSC based HVDC transmission system with 110kV DC bus voltage connected to 220kV grid. The results obtained shows the Grid is operates under fault ride through conditions stability.
Volume: 7
Issue: 1
Page: 52-58
Publish at: 2018-04-01

Netload-constrained Unit Commitment Considering Increasing Renewable Energy Penetration Levels: Impact of Generation Schedules and Operational Cost

10.11591/ijape.v7.i1.pp87-98
Saleh Y. Abujarad , M. W. Mustafa , J. J. Jamian , Abdirahman M. Abdilahi , N. Zareen
In the context of low carbon power systems, the penetration levels of Renewable Energy Sources (RES) are expected to increase dramatically. In this regard, this paper investigates the maximum RES penetration level constrained by net load while considering an inflexible Unit Commitment (UC) model. To solve the UC problem, an enhanced priority list (EPL) based method is developed. In the proposed method, the plants were activated sequentially based on the operational price. The system constraint violations were repeatedly corrected until all system constraints (such as net load and spinning reserves) were satisfied. The proposed EPL method was efficient to achieve a near optimal solution under high shares of RES. Furthermore, the research work investigates three different scenarios representing penetration levels of 10% solar-only, 14.5% wind-only and 27.5% mixture of both solar and wind. The impact of each penetration level on the system scheduling and operational cost were analyzed in detail. The analysis presented shows that a potential operational cost savings of 21.6 $/MW, 20 $/MW and 11.1 $/MW is feasible under each of the represented scenarios, respectively.
Volume: 7
Issue: 1
Page: 87-98
Publish at: 2018-04-01

Ecological and Economical Friendly Analysis of A Hybrid Solar-Grid-Diesel Connected Power Generation System

10.11591/ijape.v7.i1.pp1-9
Rafat Qonain , Malik Rafi , Imran Khan , Shivley Sageer
This paper presents Importance of hybrid power system. This paper depicts model and simulation of a renewable energy based hybrid power system for improving power quality because optimal utilization of primary energy sources will increase the level of supply reliability. The combination of Grid, Photo Voltaic (PV) Array System, and Diesel generator systems are used for power generation. Due to variation in output power of solar panel, Diesel engine is also coupled to ensure reliable supply under all conditions. The results shows that the proposed hybrid power system can effectively manage the optimal utilization of primary energy sources and improves the power quality in an islanding as well as grid connected mode.
Volume: 7
Issue: 1
Page: 1-9
Publish at: 2018-04-01

Vector Control of VSC HVDC System under Single Line to Ground Fault Condition

10.11591/ijape.v7.i1.pp59-64
Prabodha Kumar Rath , Kanhu Charan Bhuyan
This paper proposes a model of a VSC (voltage source converter) based Back to Back HVDC system and its control technique under fault condition. From the mathematical model of the system relationship between the controlling and the controlled variables is determined to control the system parameters. An appropriate vector control technique is used to control active and reactive power and to maintain DC link voltage. The proposed controlling unit consists of outer control loop and inner control loop which effectively damped out the system oscillation and maintains the system stability. The validity of the model and the feasibility of the control method have been proved by the simulation results. In this paper the system performance is studied under fault condition is studied.
Volume: 7
Issue: 1
Page: 59-64
Publish at: 2018-04-01

Three Area Power System Load Frequency Control Using Fuzzy Logic Controller

10.11591/ijape.v7.i1.pp18-26
C. R. Balamurugan
System frequency is one of the most important parameters of a power system. Du to generation-load mismatches, the system frequency can vary over a small range. When the power consumed by loads and overall losses is greater than the generated power, the operating frequency of the system will decrease, resulting in a situation known as the under frequency condition. In some other case, if some of the loads in a system are disconnected from the system suddenly, or lost, it leads to a condition called as the over frequency condition. This condition is char acterized by greater input power than the consumed power by the loads. The rest of the loads in the system will absorb the extra power and the generator inertia, leading to an increase in the system frequency. In both the cases, the system frequency fluctuates from the power system’s limited frequency range, further leading to tripping off of the substation and further collapsing of the entire system. The paper describes a new method employing a smart meter to monitor and control the power system frequency which changes according to the loading conditions in the system, whether under load condition or overload condition. 
Volume: 7
Issue: 1
Page: 18-26
Publish at: 2018-04-01

The Effects of Segmentation Techniques in Digital Image Based Identification of Ethiopian Coffee Variety

10.12928/telkomnika.v16i2.8419
Abrham Debasu; Bahir Dar University Mengistu
This paper presents the effects of segmentation techniques in the identification of Ethiopian coffee variety. In Ethiopia, coffee varieties are classified based on their growing region. The most widely coffee growing regions in Ethiopia are Bale, Harar, Jimma, Limu, Sidamo and Welega. Coffee beans of these regions very in color shape and texture. We investigated various segmentation techniques for efficient coffee beans variety identification system. Images of six different coffee beans varieties in Oromia and Southern Ethiopia were acquired and analyzed. For this study Otsu, Fuzzy-C-Means (FCM) and Kmeans segmentation techniques are considered. For classification of the varieties of Ethiopian coffee beans back propagation neural network (BPNN) is used. From the experiment 94.54% accuracy is achieved when BPNN is used on FCM segmentation technique.
Volume: 16
Issue: 2
Page: 713-717
Publish at: 2018-04-01

Research on 4-dimensional Systems without Equilibria with Application

10.12928/telkomnika.v16i2.8507
Ruibin; University of Science and Technology Beijing Hao , Lequan; University of Science and Technology Beijing Min , Hongyan; University of Science and Technology Beijing Zang
Recently chaos-based encryption has been obtained more and more attention. Chaotic systems without equilibria may be suitable to be used to design pseudorandom number generators (PRNGs) because there does not exist corresponding chaos criterion theorem on such systems. This paper proposes two propositions on 4-dimensional systems without equilibria. Using one of the propositions introduces a chaotic system without equilibria. Using this system and the generalized chaos synchronization (GCS) theorem constructs an 8-dimensional discrete generalized chaos synchronization (8DBDGCS) system. Using the 8DBDGCS system designs a 216-word chaotic PRNG. Simulation results show that there are no significant correlations between the key stream and the perturbed key streams generated via the 216-word chaotic PRNG. The key space of the chaotic PRNG is larger than 21275. As an application, the chaotic PRNG is used with an avalanche-encryption scheme to encrypt an RGB image. The results demonstrate that the chaotic PRNG is able to generate the avalanche effects which are similar to those generated via ideal chaotic PRNGs.
Volume: 16
Issue: 2
Page: 811-826
Publish at: 2018-04-01

Street Mark Detection Using Raspberry PI for Self-Driving System

10.12928/telkomnika.v16i2.4509
Sumardi; Diponegoro University Sumardi , Muhammad; Diponegoro University Taufiqurrahman , Munawar A; Diponegoro University Riyadi
Self driving is an autonomous vehicle that can follow the road with less human intervention. The development of self driving utilizes various methods such as radar, lidar, GPS, camera, or combination of them. In this research, street mark detection system was designed using webcam and raspberry-pi mini computer for processing the image. The image was processed by HSV color filtering method. The processing rate of this algorithm was 137.98 ms correspondinig to 7.2 FPS. The self-driving prototype was found to be working optimally for “hue” threshold of 0-179, “saturation” threshold of 0-30, and “value” threshold of 200-255. Street mark detection has been obtained from the coordinates of street mark object which had range 4-167 on x axis and 4-139 on y axis. As a result, we have successfully built the street mark detection by COG method more effectively and smoothly in detection in comparison with Hough transform method.
Volume: 16
Issue: 2
Page: 629-634
Publish at: 2018-04-01
Show 1461 of 1994

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration