Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,939 Article Results

Generator Dynamic Response Analysis and Improvement Following Distribution Network Disturbance

10.11591/ijeecs.v7.i2.pp356-363
Mirza Saric
Use of renewable energy sources for the purposes of electricity generation is increasing throughout the world. Connection of new generators, however, introduces significant challenges to power network operators and managers. The power system transient stability is affected by the grid connection of new generation units. The objective of this paper is to investigate asynchronous generator dynamic response issues and capabilities under three phase symmetrical fault conditions and to propose a methodological approach to designing a generator transient stability solutions. Analysis and methodology are introduced through a realistic generator connection example. Simulations show that power system stability can be significantly affected by the connection of new generators and that this phenomena needs to be carefully considered during the connection planning process. This paper is a part of an ongoing research on the distributed generation impact on power network and its aim is to provide two main contributions to the existing body of knowledge. Firstly, it is expected that this paper will contribute toward a better understanding of the influence that generators have on the power system transient stability. Secondly, this paper is expected to contribute towards the practical understanding of fundamental power system transient stability improvement solutions.
Volume: 7
Issue: 2
Page: 356-363
Publish at: 2017-08-01

Distributed Cache with Utilizing Squid Proxy Server and LRU Algorithm

10.11591/ijeecs.v7.i2.pp474-482
Abdul Ghofir , Rikip Ginanjar
In relation to the dissemination of information, the Internet is one of the fastest media to do so. The internet’s presence is growing very swiftly and rapidly, so it has become recognized by people from all walks of life. For that, the people need the appropriate way to maintain effectiveness in the use of the Internet. The following paper describes a study of the distribution of the cache, which is performed by the squid proxy server by creating a storage network design on Linux. Cache documents that are stored in the proxy server will be distributed to another over a network storage server. The process of caching on the proxy server is using the Least Recently Used (LRU) Algorithm. This research was carried out by developing the existing method of caching server process, then it is to be added a unit as a backup storage device for the data that must be erased because of the replacement policy applied to the squid proxy server. This study is looking at how the hit ratio and byte hit ratio after adding the storage server compared to not having a storage server. At the end of this research, it is concluded that the distributed cache processes a hit ratio and byte hit ratio higher than the cache on the current proxy server.
Volume: 7
Issue: 2
Page: 474-482
Publish at: 2017-08-01

Quantum Key-Policy Attribute-based Encryption

10.11591/ijeecs.v7.i2.pp542-550
Gabriela Mogos
Attribute-Based Encryption is a relatively new concept in the field of cryptography, and it allows only the authorized entities to decrypt a message. This type of encryption is the mechanism by which the users may encrypt and decrypt data based on user attributes. This paper proposes the first quantum alternative of the scheme Key-Policy Attribute-Based Encryption, where the information, the encryption/decryption key, and the attributes are made of qutrits.
Volume: 7
Issue: 2
Page: 542-550
Publish at: 2017-08-01

Dynamic Cryptographic Algorithm to Provide Password Authentication using Cued Click Points

10.11591/ijict.v6i2.pp123-128
P. Ashok
Nowadays, password based authentication is one the most common way of authentication for most of the user logins. However, the advancement in technology also posing many threats for the password authentication systems. Everybody will be keen to know others password. But there exists a very few who is very keen to devise a new authentication. In this paper, we have proposed a more advanced password authentication method yet a simple one which gives a tough competition for the attacker to break the password. For this, we are providing a special key-display interface to assist the modified cued click point’s technique which helps in the more sophisticated dynamic authentication method. This interface helps to break the single password into a combination of 4 passwords and also adds three more password strings to the current password which is entered. It also uses a special one way encryption algorithm called Nesting 93 which is developed explicitly for this system. It helps to prevent almost any kind of attacks.
Volume: 6
Issue: 2
Page: 123-128
Publish at: 2017-08-01

Theoretical Analysis of Gap Coupled Microstrip Patch Antenna

10.11591/ijeecs.v7.i2.pp567-576
Akanksha Gupta , D K Srivastava , J.P. Saini
When a patch is placed close to the fed patch, get excited due to parasitic coupling between the two elements. This proposed work presents theoretical analysis of rectangular gap coupled microstrip patch antenna (R-GCMSA) using circuit concept model, and the effect of gap(g), feed width (Wf), and feed length on performance of the impedance bandwidth is also studied, it is observe as the gap between the parasitic element is increased resonant frequency shifted towards the parasitic patch resonant frequency for broadening the impedance bandwidth. The maximum impedance bandwidth for the proposed antenna design is 12.7% in the frequency range of 3.24-3.7GHz measured, with rectangular shape ground plane size 6030m.m2.the highest directivity achieved is 4dBi.The proposed design is simple in structure and compact in size, proposed design is simulated on IE3D Microwave simulator, the simulated result is in good agreement with obtained theoretical and measured results.
Volume: 7
Issue: 2
Page: 567-576
Publish at: 2017-08-01

Commonly Used Wind Generator Systems: A Comparison Note

10.11591/ijeecs.v7.i2.pp299-311
Prashanth N.A , P Sujatha
Amongst all renewable energy generation sources, wind power exhibits fastest growth rate. The increasing number of wind farm installations worldwide demand low maintenance, cost and failure rates with high efficiency. Determining the optimal drive train configuration amongst various configurations available for wind turbines is a challenge. In this paper commonly used, doubly fed induction generator with single stage gear box (GDFIG), doubly fed induction generator with multi stage gear box (DFIG) and the direct-drive permanent-magnet generator (DDPMG) are compared. Modelling of wind turbine with efficiency computations is presented. Considering common wind turbine parameters, performance of GDFIG, DFIG and DDPMG is compared through an experimental study. Considering a reference 5 MW variable speed wind turbine, efficiency of DDPMG is 96% when compared to 93.58%, 93.12% for DFIG and GDFIG. The experimental results presented prove that the DDPMG is a preferable solution considering low cost and high efficiency.
Volume: 7
Issue: 2
Page: 299-311
Publish at: 2017-08-01

Composite Nonlinear Feedback with Disturbance Observer for Active Front Steering

10.11591/ijeecs.v7.i2.pp434-441
Sarah 'Atifah Saruchi , Hairi Zamzuri , Noraishikin Zulkarnain , Norbaiti Wahid , Mohd Hatta Mohammed Ariff
One of the dominant virtue of Steer-By-Wire (SBW) vehicle is its capability to enhance handling performance by installing Active Front Steering (AFS) system without the driver’s interferences. Hence, this paper introduced an AFS control strategy using the combination of Composite Nonlinear Feedback (CNF) controller and Disturbance Observer (DOB) to achieve fast yaw rate tracking response which is also robust to the existence of disturbance. The proposed control strategy is simulated in J-curve and Lane change manoevres with the presence of side wind disturbance via Matlab/Simulink sotware. Futhermore, comparison with Proportional Integral Derivative (PID) and Linear Quadratic Regulator (LQR) controllers are also conducted to evaluate the effectiveness of the proposed controller. The results showed that the combined CNF and DOB strategy achieved the fastest yaw rate tracking capability with the least impact of disturbance in the AFS system installed in SBW vehicle.
Volume: 7
Issue: 2
Page: 434-441
Publish at: 2017-08-01

Design and Analysis of Lagrangian Algorithm for Power Flow System using Renewable Energy Resources

10.11591/ijeecs.v7.i2.pp348-355
Subramani Rajamanickam , Vijayalakshmi C
This paper mainly deals with the implementation of an Lagrangian Relaxation (LR) technique through a Supervisory Control and Data Acquisition (SCADA) system. Maintaining Power Station is not an easy task which to achieve its demand such as regulating inputs monitoring energy losses. In this paper we have introduced novel SCADA based decentralized approach to minimize the loss of the system and optimize the total generation cost. Due to the nonlinearities of Electricity demand and scheduling time, the problem is not solvable with the usual optimization techniques. For getting appropriate solution LR technique has been formulated as a nonlinear programming problem with respect to optimal energy constraints. Based on the numerical calculations and graphical representations the renewable energy sources are optimally allocated in individual and hybrid configurations, which leads to effective production.
Volume: 7
Issue: 2
Page: 348-355
Publish at: 2017-08-01

XMapDB-Sim: Performance Evalaution on Model-based XML to Relational Database Mapping Choices

10.11591/ijeecs.v7.i2.pp551-566
Haw Su-Cheng , Emyliana Song , Nur Amirah Azhar , Aisyah Amin
XML has emerged as the standard for information representation over the Internet. However, most enterprises today have long secured the use of relational databases. Thus, it is crucial to map XML data into relational data to provide seamless integration between these database infrastructures. Many mapping techniques have been proposed, yet, none has provides a unified view on these techniques. Ultimately, understanding how these techniques work is important especially if one needs to decide which technique to adopt in their organization. This paper (i) reviews on some existing model-based mapping schemes focusing on how the mapping technique works, the advantages and the disadvantages, (ii) present the simulation engine to evaluate the performance of selected mapping schemes, (iii) highlight the future direction of the related area.
Volume: 7
Issue: 2
Page: 551-566
Publish at: 2017-08-01

Distributed Generation Integration to Grid using Multi-Level CHB Inverter

10.11591/ijeecs.v7.i2.pp312-321
Velishala Ramu , P. Satish Kumar , G. N Sreenivas
Environmental conditions, electrical modeling and developments in industries led to new power generation epoch where fat section of power required for load section is fed through extensive induction of distributed resources generally known as distributed generation [DG]. Distributed generation reduces the risk of environmental pollution and distance criterion posed from conventional power generation. This paper presents grid integration scheme of distributed generation using five-level cascaded H-Bridge (CHB) inverter. Reference currents used to produce pulses for switches in CHB are generated using a simple control strategy. Performance of the system was evaluated when only active power is fed from distributed generation to grid and also when both active and reactive powers were fed to grid from distributed generation. Proposed system was developed using MATLAB/SIMULINK software and results are presented.
Volume: 7
Issue: 2
Page: 312-321
Publish at: 2017-08-01

Sign Detection Vision Based Mobile Robot Platform

10.11591/ijeecs.v7.i2.pp524-532
Hairol Nizam Mohd Shah , Mohd Zamzuri Ab Rashid , Zalina Kamis , Mohd Shahrieel Mohd Aras , Nursabillilah Mohd Ali , Faizil Wasbari , Tengku Muhammad Mahfuz Tengku Anuar
Vision system applied in electrical power generated mobile robot to provide a comfortable ride while providing comfort to tourist to interact with visitors. The camera is placed in front of the mobile robot to snap the images along in pathways. The system can recognized the sign which are right, left and up by using Harris corner algorithms and will be display in Graphical User Interface (GUI). A sign can be determined from the vertex coordinates according to the degree to distinguish the direction of the sign. The system will be tested in term of percentage of success in Harris point detection and availability to detect sign with different range. The result show the even though not all Harris point in an image can be detected but most of the images possible to recognise it sign direction.
Volume: 7
Issue: 2
Page: 524-532
Publish at: 2017-08-01

Qualitative Analysis of Recognition-based Graphical Password Authentication Schemes for Accessing the Cloud

10.11591/ijeecs.v7.i2.pp507-513
K Gangadhara Rao , Vijayakumari Rodda , B Basaveswara Rao
Cloud computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, a major barrier for cloud application is real and perceived lack of security. There are many security mechanisms exercised to utilize cloud services. Amongst them the prominent and primitive security mechanism is the Authentication System. Traditional text based passwords are susceptible to threats. Tough passwords are hard to recall and easily recalled passwords are simple and predictable. Graphical passwords are introduced as the better alternative. Two types of graphical passwords are there – recall based and recognition based. This research reviews several Recognition-Based Graphical Password methods and analyses their security based on the estimation criteria. Moreover, the research defines a metric called a 14-point scale that would make it possible for the qualitative analysis of the graphical passwords schemes. 
Volume: 7
Issue: 2
Page: 507-513
Publish at: 2017-08-01

An Efficient Environmental Channel Modelling in 802.11p MAC Protocol for V2I

10.11591/ijeecs.v7.i2.pp404-414
Neelambike S , Chandrika J
Recent development in communication of wireless communication for automobile industry have aided the growth of SITS (Smart Intelligent Transport System) which solves numerous vehicular based communication service concerns like traffic congestion, accidental mishap etc. VANET (Vehicular Ad-hoc Network) a characteristic class of MANET (Mobile ad-hoc Network) which is a fundamental element of SITS in which the moving vehicles inter connected and communicates with each other remotely. Wireless technologies play an important part in assisting both Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) correspondence in VANET. The existing scheduling technique does not consider the environmental factor which affects the throughput performance and increases packet drop rate which result in degradation of service quality. Here in this work the author propose a RHU (Rural, Highway and Urban) environment model considering the environmental factor. The efficient environmental model algorithm is incorporated into slotted aloha in IEEE 802.11p MAC protocols which aided as a spine for assisting both safety application and non-Safety applications. Experiments are conducted for collision and throughput efficiency for varied traffic load and speed of vehicle. The experimental result shows the proposed environmental model impact on collision and throughput efficiency for varied environment and thus helps improving QoS for VANET application.
Volume: 7
Issue: 2
Page: 404-414
Publish at: 2017-08-01

Energy Optimization of Routing Protocols in Wireless Sensor Networks

10.11591/ijict.v6i2.pp76-85
Fatima Es-sabery , Hicham Ouchitachen , Abdellatif Hair
The hierarchical routing of data in WSNs is a specific class of routing protocols it encompasses solutions that take a restructuring of the physical network in a logical hierarchy system for the optimization of the consum-ption of energy. Several hierarchical routing solutions proposed, namely: the protocol LEACH (Low Energy Adaptive Clustering Hierarchy) consist of dividing the network in distributed clusters at one pop in order of faster data delivery and PEGASIS protocol (Power-Efficient Gathering in Sensor Information Systems) which uses the principle of constructing a chain’s sensor node. Our contribution consists of a hierarchical routing protocol, which is the minimization of the energy consumption by reducing the transmission distance of data and reducing the data delivery time. Our solution combines the two hierarchical routing approaches: chain based approach and the cluster based approach. Our approach allows for multi-hop communications, intra- and intercluster, and a collaborative aggregation of data in each Cluster, and a collaborative aggregation of data at each sensor node.
Volume: 6
Issue: 2
Page: 76-85
Publish at: 2017-08-01

Mobile Ad Hoc Networks in Presence of Black Hole Attack

10.11591/ijeecs.v7.i2.pp577-582
Anshu Prakash Murdan , Anshuman Bhowon
This paper analyses three performance metrics namely average throughput, average network load and average video conferencing packet end-to-end delays under the influence of black hole attack in a Mobile Ad Hoc Network, using the ad hoc on-demand distance vector routing protocol. The simulation was carried out on Riverbed Modeler Academic Edition software. Simulation results show that the average throughput, average network load and average video conferencing packet end-to-end delay decreases as the number of black hole attack nodes is increased. Also, the effects of the influence of black hole attack nodes tend to decrease due to mobility of the nodes. It was observed that when the destination nodes move closer to the source nodes and get in to the latter’s transmission range, the effects of the black hole attack is greatly minimized.
Volume: 7
Issue: 2
Page: 577-582
Publish at: 2017-08-01
Show 1544 of 1996

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration