Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,451 Article Results

Tip Speed Ratio Based MPPT Algorithm and Improved Field Oriented Control for Extracting Optimal Real power and Independent Reactive Power Control for Grid Connected Doubly Fed Induction Generator

10.11591/ijece.v6i3.pp1319-1331
D.V.N. Ananth , Gundavarapu Venkata Nagesh Kumar
Doubly Fed Induction Generator (DFIG) needs to get adopted to change in wind speeds with sudden change in reactive power or grid terminal voltage as it is required for maintaining synchronism and stability as per modern grid rules. This paper proposes a controller for DFIG converters and optimal tip speed ratio based maximum power point tracking (MPPT) for turbine to maintain equilibrium in rotor speed, generator torque, and stator and rotor voltages and also to meet desired reference real power during the turbulences like sudden change in reactive power or voltage with concurrently changing wind speed. The performance of DFIG is compared when there is change in wind speed only, changes in reactive power and variation in grid voltage along with variation in wind speed.
Volume: 6
Issue: 3
Page: 1319-1331
Publish at: 2016-06-01

Efficient D2D Discovery Scheme for Channel Measurement of Interference Alignment

10.12928/telkomnika.v14i2.3148
Zhanjun; Chongqing University of Posts and Telecommunications Liu , Yunpeng; Chongqing University of Posts and Telecommunications Li , Zhonghua; Chongqing University of Posts and Telecommunications Yu , Yue; Chongqing University of Posts and Telecommunications Shen
Device-to-device (D2D) communications have the potential to improve spectrum efficiency and link capacity by allowing nearby devices to communicate directly with each other on the licensed frequency bands. Hence, co-channel interference (CCI) among D2D users are major issues to be solved when they are utilizing the same frequency bands. Consequently, interference alignment (IA) as an effective interference management approach has been implemented to the D2D communications for the frequency sharing. However, the measurement of channel state information (CSI) between transmitter and receiver of a D2D pair and cross-channel state information (C-CSI) among D2D pairs are the major issues that need to be resolved for the implementation of IA from theory to practical. Therefore, in this paper, we propose an effective D2D discovery scheme to overcome this problem, which can measure the CSI and C-CSI based on the transmission of discovery messages. Simulation results show that, under perfect conditions, even though the proposed D2D discovery scheme increases the needed time slots to establish D2D communications compared with the conventional D2D discovery without considering IA by 6.2%, it increases the throughput up to 50% than the conventional D2D communications without considering IA, i.e., it improves the spectrum efficiency. 
Volume: 14
Issue: 2
Page: 548-554
Publish at: 2016-06-01

Dithering Analysis in an Orthogonal Frequency Division Multiplexing-Radio over Fiber Link

10.11591/ijece.v6i3.pp1112-1121
Fakhriy Hario P , Adhi Susanto , I Wayan Mustika , Sevia M Idrus , Sholeh Hadi P
Nonlinearity is one major problem broadband communication faced on utilizing the high capacity of optical fibers. That is due to scattering  phenomenon, which results in the deviations of wavelengths and energies. The dithering method is applied in the attempt to reduce those scatterings. In this paper, we propose the performance of a dithering technique based new system OFDM-RoF using two modulator scheme and coherent detection to alleviate the characteristics nonlinearity applied on the system. The dithering technique inputs signal externally to the signal processing systems to eliminate the effects of nonlinearity. Here, we report the performance of a dithering technique based on the OFDM-RoF, the results our experiment showed that the applied dithering with 16 QAM modulation can make the system more reliable and increases  the power level 1.55% with 193.1 THz, 2% with  100 THz and 1.99% ~ 200 THz, the best condition are with fd < fc. However, all condition close proximity in the parameters OLP (optical launch power), BER and SER measurement. The result demonstrated a high efficiency and good power in which the OLP operated 6.396 dBm / 4.361 E-3 W~fd 200 THz, 3.578 dBm / 2.279 E-3 W~fd 193.1 THz and 6.420 dBm / 4.3384 E-3 W~100 THz. The best BER value is achieved at 0.33 and SER 0.78 at 5 km~fd 100 THz, 0.33 and 0.768 for 10 km~fd 193.1 THz, 0.478 and 0.92 for 50 km~fd 193.1 THz.
Volume: 6
Issue: 3
Page: 1112-1121
Publish at: 2016-06-01

Breakdowns' Diagnosis of A New Character Three-Phase High Voltage Power Supply for Industrial Microwave Generators with N=2 Magnetrons per Phase

10.11591/ijece.v6i3.pp1248-1259
R. Batit , M. Chraygane , M. Ferfra , M. Fadel , A. Dsoul , B. Bahani
This paper treats the modelisation of a new three phase character high voltage supply (HV) for industrial microwave generators with N=2 magnetrons per phase. This alimentation is based on the presentation of an equivalent p circuit model of a newly dimensioned high voltage transformer. Each phase of the three phase system supplies two parallel cell voltage doublers and current stabilizer. Each of these cells in turn supplies one magnetron 800Watts / 2.45GHz. This power supply is a star connection of three identical models of the single-phase power for N=2 magnetrons. The simulation under EMTP (Electro Magnetic Transients Program) in nominal conditions allows concluding that theoretical results are adjacent to the experimental measurements. Furthermore, a failure study of six magnetron of the microwave generator is also processed. The results permit to observe that the interaction between magnetrons dosn’t influence the nominal operation of the system.
Volume: 6
Issue: 3
Page: 1248-1259
Publish at: 2016-06-01

Cloud Security in Crypt Database Server Using Fine Grained Access Control

10.11591/ijece.v6i3.pp915-924
Krishna Keerthi Chennam , M. Akka Lakshmi
Information sharing in the cloud, powered by good patterns in cloud technology, is rising as a guaranteeing procedure for permitting users to advantageously access information. However, the growing number of enterprises and customers who stores their information in cloud servers is progressively challenging users’ privacy and the security of information. This paper concentrates on providing a dependable and secure cloud information sharing services that permits users dynamic access to their information. In order to achieve this, propose an effective, adaptable and flexible privacy preserving information policy with semantic security, by using Cipher text Policy Element Based Encryption (CP-EBE) consolidated with Character Based Encryption (CBE) systems. To ensure strong information sharing security, the policy succeeds in protecting the privacy of cloud users and supports efficient and secure dynamic operations, but not constrained to, file creation, user revocation. Security analysis demonstrates that the proposed policy is secure under the generic bi- linear group model in the random oracle model and enforces fine-grained access control, full collusion resistance and retrogressive secrecy. Furthermore, performance analysis and experimental results demonstrate that the overheads are as light as possible.
Volume: 6
Issue: 3
Page: 915-924
Publish at: 2016-06-01

Exploration of Corpus Augmentation Approach for English-Hindi Bidirectional Statistical Machine Translation System

10.11591/ijece.v6i3.pp1059-1071
K. Jaya , Deepa Gupta
Even though lot of Statistical Machine Translation(SMT) research work is happening for English-Hindi language pair, there is no effort done to standardize the dataset. Each of the research work uses different dataset, different parameters and different number of sentences during various phases of translation resulting in varied translation output. So comparing  these models, understand the result of these models, to get insight into corpus behavior for these models, regenerating the result of these research work  becomes tedious. This necessitates the need for standardization of dataset and to identify the common parameter for the development of model.  The main contribution of this paper is to discuss an approach to standardize the dataset and to identify the best parameter which in combination gives best performance. It also investigates a novel corpus augmentation approach to improve the translation quality of English-Hindi bidirectional statistical machine translation system. This model works well for the scarce resource without incorporating the external parallel data corpus of the underlying language.  This experiment is carried out using Open Source phrase-based toolkit Moses. Indian Languages Corpora Initiative (ILCI) Hindi-English tourism corpus is used.  With limited dataset, considerable improvement is achieved using the corpus augmentation approach for the English-Hindi bidirectional SMT system.
Volume: 6
Issue: 3
Page: 1059-1071
Publish at: 2016-06-01

FPF: Fraud Proof Framework for Electronic Voting System

10.11591/ijece.v6i3.pp1197-1204
Innocent Kabandana , A.N. Nanda Kumar
In a democratic process voting plays a vital role in selection of policy as well as candidates. Voting though gives the freedom to voter to cast his opinion it is not free fraudulent. In order to have secure voting and convey the opinion of authorized voter in this paper we have presented a java based framework for fraud proof electronic voting system. In this framework we ensure that only the authorized voter is permitted to cast his vote and mitigate illegal voters cast votes on faking or pretending to be someone else. Proposed FPF provides a multi-level of authentication mechanism to validate the voter. The proposed system is tested for efficiency and robustness in comparing it with the existing system and is found to be efficient through comparative analysis. At present FPF is successful in mitigating the unauthorized voting further enhancement in the electronic voting system is being carried out as future work.
Volume: 6
Issue: 3
Page: 1197-1204
Publish at: 2016-06-01

Leaf Morphological Feature Extraction of Digital Image Anthocephalus Cadamba

10.12928/telkomnika.v14i2.2675
Fuzy Yustika; Bogor Agricultural University Manik , Yeni; Bogor Agricultural University Herdiyeni , Elis Nina; Bogor Agricultural University Herliyana
This research implemented an image feature extraction method using morphological techniques. The goal of this proccess is detecting objects that exist in the image. The image is converted into a grayscale image format. Then, grayscale image is processed with tresholding method to get initial segmentation. Furthermore, image from segmentation results are calculated using morphological methods to find the mapping of the original features into the new features. This process is done to get better class separation. Research conducted on two Antocephalus cadamba (Jabon) leaf diseased seedlings data set image that contained leaf spot disease and leaf blight. The results obtained morphological features such as rectangularity, roundness, compactness, solidity, convexity, elongation, and eccentricity able to represent the characteristic shape of the symptoms of the disease. All properties form the symptoms can be quantitatively explained by the features form. So it can be used to represent type of symptoms of two diseases in Antocephalus cadamba (Jabon).
Volume: 14
Issue: 2
Page: 630-637
Publish at: 2016-06-01

Study of the Trilinear Neighborhood Model of Process of Formation of Temperature’s Coiling Hot-rolled Strip

10.11591/ijece.v6i3.pp1371-1374
A.M. Shmyrin , A.G. Yurtsev , A.M. Korneev , L.S. Abdullakh
The paper considers trilinear neighborhood model of process of formation of temperature’s coiling hot-rolled strip, where the parameters are the state, control and information. The methods of determining the composition of extremums of the general parametric operation are presented. Extremums’ condition for the existence, which has been tested on a concrete example, is obtained. The assumption about the area in which it is impossible to say with certainty about the system’s stability is stated. The hypothesis about the condition of the loss of the position of stable equilibrium of the system and the transition to a new state.
Volume: 6
Issue: 3
Page: 1371-1374
Publish at: 2016-06-01

Telemonitoring Temperature and Humidity at Bio-energy Process using Smart Phones

10.12928/telkomnika.v14i2.3498
Seno Darmawan; Department of Electrical Engineering, Tanjungpura University Panjaitan , Novianda; PT. Well Harvest Winning Alumina Refinery Fratama , Aryanto; Department of Electrical Engineering, Tanjungpura University Hartoyo , Rudi; Department of Electrical Engineering, Tanjungpura University Kurnianto
Bio-energy from biogas can be produced through anaerobic digestion of either organic solid waste or wastewater. Energy production process in the digester is however sometimes hard to be monitored due to manual measurement, otherwise it needs a high technology requiring a high cost budget. This paper presents a low cost technology to monitor the process by using Android based smart phones which can easily be integrated in human daily activity. A program was built by using Eclipse in order to give send/receive command to/from the hardware and display the measurement data on the registered smart phones. The measurement controller was put at the anaerobic digester to record temperature and Relative Humidity (RH) data to memory card and to transmit the data to smart phones. In the experiment with 20 data samples, mean errors were repectively -0.317 oC, 0.932 oC, and 1,378 % for temperature sensor LM35, and temperature and RH sensor using SHT11. Mean squared error for LM35 was 0.373 oC and for SHT11 was 1.117 oC and 2.629 % for temperature and RH respectively. The system has been also implemented in the real anaerobic digester. Electrical energy consumption was 0.623 Wh with 30 minutes cycle time and one minute sampling time.
Volume: 14
Issue: 2
Page: 762-771
Publish at: 2016-06-01

Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things

10.11591/ijece.v6i3.pp1002-1010
Sumanth Koppula , Jayabhaskar Muthukuru
Advances in the info and communication knowledge have led to the emergence of Internet of things (IoT). Internet of things (loT) is worthwhile to members, trade, and society seeing that it generates a broad range of services by interconnecting numerous devices and information objects. Throughout the interactions among the many ubiquitous things, security problems emerge as noteworthy, and it is significant to set up more suitable solution for security protection. Nonetheless, as loT devices have limited resource constraints to appoint strong protection mechanisms, they are vulnerable to sophisticated security attacks. For this reason, a sensible authentication mechanism that considers each useful resource constraints and safety is required. Our proposed scheme uses the standards of Elliptic Curve digital signature scheme and evaluates systematically the efficiency of our scheme and observes that our scheme with a smaller key size and lesser infrastructure performs on par with the prevailing schemes without compromising the security level.
Volume: 6
Issue: 3
Page: 1002-1010
Publish at: 2016-06-01

Stone Image Classification Based on Overlapped 5-bit T-Patterns occurrence on 5-by-5 Sub Images

10.11591/ijece.v6i3.pp1152-1160
Palnati Vijay Kumar , Pullela S V V S R Kumar , Nakkella Madhuri , M Uma Devi
Texture classification is widely used in understanding the visual patterns and has wide range of applications. The present paper derived a novel approach to classify the stone textures based on the patterns occurrence on each sub window. The present approach identifies overlapped nine 5 bit T-patterns (O5TP) on each 5×5 sub window stone image. Based the number of occurrence of T-patterns count the present paper classify the stone images into any of the four classes i.e. brick, granite, marble and mosaic stone images.  The novelty of the present approach is that no standard classification algorithm is used for the classification of stone images. The proposed method is experimented on Mayang texture images, Brodatz textures, Paul Bourke color images, VisTex database, Google color stone texture images and also original photo images taken by digital camera. The outcome of the results indicates that the proposed approach percentage of grouping performance is higher to that of many existing approaches.
Volume: 6
Issue: 3
Page: 1152-1160
Publish at: 2016-06-01

Voltage Instability of Initiation Fault Duration as Influenced by Nodes Short Circuit Levels NSCL with Different Types of Loads

10.11591/ijece.v6i3.pp1305-1318
Youssef Ahmed Mobarak , Mahmoud M. Hussein
The occurrence of voltage instabilities or voltage collapses depend on the duration of the persistence of the fault and on the type of fault, some faults lead to voltage instabilities, others lead to voltage collapse. Evaluation of fault durations causing occurrence of voltage instabilities is the main goal of this paper. This paper searches for the effect of nodes short circuit levels NSCL and its duration periods initiation of voltage instability, with lagging and leading load power factors at certain loads buses. In this paper, the power system dynamic simulation program is developed for dynamic analysis of voltage stability. This paper is concerned with the fault duration which lead to the occurrence of voltage instability phenomena due to NSCL. The fault which lead to voltage instability is found to be short circuits at certain nodes cleared without any variation in the transmission system elements, i.e. the post-fault conditions will be the same as the pre-fault conditions. Models for loads considered in this study are induction motors with three different shaft mechanical loads, constant impedance CZ loads, constant current CI loads and constant power CP loads are used, as they depict the behavior of most power system loads. The influence of the transmission network impedances, which are nearly the inverse of the NSCL, on the fault duration which lead to the occurrence of voltage instabilities are studied and evaluated using various load representations.
Volume: 6
Issue: 3
Page: 1305-1318
Publish at: 2016-06-01

Using STATCOM with Energy Storage to Enhance the Stability of AC-DC Hybrid System

10.12928/telkomnika.v14i2.2372
Zheng; Wuhan University Xu , Ding; Wuhan University Jianyong , Li; Huazhong University of Science and Technology Mei , Zhao; Huazhong University of Science and Technology Shuang , Zeng; Huazhong University of Science and Technology Ni , Zhu; Huazhong University of Science and Technology Ruoxi , Zhang; Huazhong University of Science and Technology Buhan , Mao; Huazhong University of Science and Technology Chengxiong
UHVDC has been rapidly developed for its large conveying capacity, small net loss and easy power control, which can solve the problem of the uneven distribution of load and energy with great economy. However, with DC transmission access, the power system must have a strong ability of reactive power support to cope with the possibility of transient voltage problem. At the same time, regional power oscillation issue also can’t be ignored. Considering that the STATCOM device, as a type of parallel FACTS, can only provide dynamic reactive power to support the system voltage and cannot undertake active regulation and control to damp system power oscillation problem, STATCOM with energy storage is presented in this paper to solve both problem of transient voltage and power oscillation in AC-DC hybrid system. In view of the central China province power grid planning, possible serious faults of the system were analyzed. The simulation results show that STATCOM with energy storage cannot only effectively support the system transient voltage and promote voltage of dc inverter station to avoid DC block caused by commutation failure, but also can significantly enhance the system damping and restrain regional power oscillation in case of system failure.
Volume: 14
Issue: 2
Page: 423-430
Publish at: 2016-06-01

A Self-adaptive Multipeak Artificial Immune Genetic Algorithm

10.12928/telkomnika.v14i2.2753
Qingzhao; Suzhou University Li , Fei; Suzhou University Jiang
Genetic algorithm is a global probability search algorithm developed by simulating the biological natural selection and genetic evolution mechanism and it has excellent global search ability, however, in practical applications, premature convergence occurs easily in the genetic algorithm. This paper proposes an self-adaptive multi-peak immune genetic algorithm (SMIGA) and this algorithm integrates immunity thought in the biology immune system into the evolutionary process of genetic algorithm, uses self-adaptive dynamic vaccination and provides a downtime criterion, the selection strategy of immune vaccine and the construction method of immune operators so as to promote the population develop towards the optimization trend and suppress the degeneracy phenomenon in the optimization by using the feature information in a selective and purposive manner. The simulation experiment shows that the method of this paper can better solve the optimization problem of multi-peak functions, realize global optimum search, overcome the prematurity problem of the antibody population and improve the effectiveness and robustness of optimization.
Volume: 14
Issue: 2
Page: 647-654
Publish at: 2016-06-01
Show 1552 of 1897

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration