Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,451 Article Results

Loss Minimization of Power Distribution Network using Different Types of Distributed Generation Unit

10.11591/ijece.v5i5.pp918-928
Su Hlaing Win , Pyone Lai Swe
A Radial Distribution network is important in power system area because of its simple design and reduced cost. Reduction of system losses and improvement of voltage profile is one of the key aspects in power system operation. Distributed generators are beneficial in reducing losses effectively in distribution systems as compared to other methods of loss reduction. Sizing and location of DG sources places an important role in reducing losses in distribution network. Four types of DG are considered in this paper with one DG installed for minimize the total real and reactive power losses. The objective of this methodology is to calculate size and to identify the corresponding optimum location for DG placement for minimizing the total real and reactive power losses and to improve voltage profile   in primary distribution system. It can obtain maximum loss reduction for each of four types of optimally placed DGs. Optimal sizing of Distributed Generation can be calculated using exact loss formula and an efficient approach is used to determine the optimum location for Distributed Generation Placement.  To demonstrate the performance of the proposed approach 36-bus radial distribution system in Belin Substation in Myanmar was tested and validated with different sizes and the result was discussed.
Volume: 5
Issue: 5
Page: 918-928
Publish at: 2015-10-01

Remote Control of Mobile Robot using the Virtual Reality

10.11591/ijece.v5i5.pp1062-1074
Ibari Benaoumeur , Ahmed-Foitih Zoubir , Hanifi Elhachimi Amar Reda
In this paper we present the simulation and manipulation of  teleoperation system for remote control of mobile robot using the Virtual Reality (VR). The objective of this work is to allow the operator to control and supervise a unicycle type mobile robot. In this research we followed three ways: The use of articulated robotic mobile on the Web, the design of remote environment for the experimentation using the network for the mobile robot and the  architecture of control is proposed to facilitate the piloting of the robot. This work proposes a hardware and software architecture based on communication and information technologies to control the virtual robot to improve the control towards the remote robot. A path planning method is integrated to the remote control system. Results show the real possibilities offered by this manipulation, in order to follow a trajectory of the robot and to create applications with a distance access to facilities through networks like the Internet and wireless.
Volume: 5
Issue: 5
Page: 1062-1074
Publish at: 2015-10-01

XML and Semantics

10.11591/ijece.v5i5.pp1174-1179
Mohammad Moradi , MohammadReza Keyvanpour
Since the early days of introducing eXtensible Markup Language (XML), owing to its expressive capabilities and flexibilities, it became the defacto standard for representing, storing, and interchanging data on the Web. Such features have made XML one of the building blocks of the Semantic Web. From another viewpoint, since XML documents could be considered from content, structural, and semantic aspects, leveraging their semantics is very useful and applicable in different domains. However, XML does not by itself introduce any built-in mechanisms for governing semantics. For this reason, many studies have been conducted on the representation of semantics within/from XML documents. This paper studies and discusses different aspects of the mentioned topic in the form of an overview with an emphasis on the state of semantics in XML and its presentation methods.
Volume: 5
Issue: 5
Page: 1174-1179
Publish at: 2015-10-01

Wavelet and FFT Based Image Denoising Using Non-linear Filters

10.11591/ijece.v5i5.pp1018-1026
S Gopinathan , Radhakrishnan Kokila , P Thangavel
We propose a stationary and discrete wavelet based image denoising scheme and an FFTbased image denoising scheme to remove Gaussian noise. In the first approach, high subbands are added with each other and then soft thresholding is performed. The sum of low subbands is filtered with either piecewise linear (PWL) or Lagrange or spline interpolated PWL filter. In the second approach, FFT is employed on the noisy image and then low frequency and high frequency coefficients are separated with a specified cutoff frequency.Then the inverse of low frequency components is filtered with one of the PWL filters and the inverse of high frequency components is filtered with soft thresholding. The experimental results are compared with Liu and Liu's tensor-based diffusion model (TDM) approach.
Volume: 5
Issue: 5
Page: 1018-1026
Publish at: 2015-10-01

Investigation of Rectifier Circuit Configurations for Microwave Power Transmission System Operating at S Band

10.11591/ijece.v5i5.pp967-974
Chuc Huu Doan , Duong Gia Bach
The purpose of this work is to propose rectifier circuit topologies for microwave power transmission system operating at ISM band. This paper particularly presents in detail the proposed rectifier circuit configurations including series diode half wave rectifier and voltage doubler rectifier. The maximum conversion efficiency of rectifier using series diode half wave rectifier is 40.17 % with 220 W load resistance whereas it is 70.06 % with 330 W load resistance for voltage doubler rectifier. Compared to the series rectifier circuit, it is significant to note that the voltage doubler rectifier circuit has higher efficiency. The circuits presented are tuned for a center frequency of 2.45 GHz. The rectifiers were fabricated using microstrip technology. The design, fabrication and measurement results were obtained using a well-known professional design software for microwave engineering, Advanced Design System 2009 (ADS 2009). All design and measurement results will be reported.
Volume: 5
Issue: 5
Page: 967-974
Publish at: 2015-10-01

Designing an Adversarial Model Against Reactive and Proactive Routing Protocols in MANETS: A Comparative Performance Study

10.11591/ijece.v5i5.pp1111-1118
A. Peda Gopi , E. Suresh Babu , C. Naga Raju , S. Ashok Kumar
Mobile ad-hoc networks are self-organized infrastructure less networks that consists of mobile nodes, which are capable of maintaining and forming the network by themselves. Recently, researchers are designed several routing protocols on these networks. However, these routing protocols are more vulnerable to attacks from the intruders, which can easily paralyze the operation of the network due to its inherited characteristics of MANETS. One such type of attack is wormhole attack. Because of its severity, the wormhole attack has attracted a great deal of attention in the research community. This paper compares reactive and proactive routing protocols in adversarial environment. Specifically, wormhole attack is applied to these routing protocols to evaluate its performance through simulation. Comprehensively the results shows the comparative performance of these protocols against wormhole attack is hard to detect and easy to implement.
Volume: 5
Issue: 5
Page: 1111-1118
Publish at: 2015-10-01

A Novel Transient Current Limiter Based on Three-Phase Thyristor Bridge for Y-yg Transformers

10.11591/ijpeds.v6.i4.pp747-758
Alok Kumar Shrivastav , Pradip Kumar Sadhu , Ankur Ganguly , Nitai Pal
The transformer in flux current may be a transient current that happens in electrical devices has been charged. This current depends on completely different parameters probably the voltage magnitude, the switching on angle the permanent flux, the core physical phemeon characteristics, the primary circuit resistance, etc. To beat the issues arising owing to transients, these are required to be suppressed.In this paper, an easy and economical techniquie is conferred to limit the transient current of the Y-yg transformers. One amongst the most benefit of this technique is it doesn’t would like any negative feedback circuit or activity unit. The tactic relies on a three-phase thyristors bridge single LC reactor with the individual phases of electrical device. Since the amount of thyristors is reduced, the voltage ripple, electrical losses and therefore the malfunction likelihood due to device failure is reduced significantly. The projected technique has been simulated by MATLAB simulation. It’s shown that the projected style is a lot of economical for the transient current limitation of Y-yg transformers.
Volume: 6
Issue: 4
Page: 747-758
Publish at: 2015-09-21

Novel Approach for Control Data Theft Attack in Cloud Computing

10.11591/ijece.v5i6.pp1545-1552
K. Narasimha Sastry , B. Thirumala Rao , T Gunasekhar
Information security is a major problem faced by cloud computing around the world. Because of their adverse effects on organizational information systems, viruses, hackers, and attackers insiders can jeopardize organizations capabilities to pursue their undertaken effectively. Although technology based solutions help to mitigate some of the many problems of information security, even the preeminent technology can’t work successfully unless effective human computer communication occurs.IT experts, users and administrators all play crucial role to determine the behavior that occurs as people interact with information technology will support the maintenance of effective security or threaten it. In the present paper we try to apply behavioral science concepts and techniques to understanding problems of information security in organizations.
Volume: 5
Issue: 6
Page: 1545-1552
Publish at: 2015-09-11

Security in Wireless sensor network: Approaches and Issues

10.11591/ijeecs.v15.i3.pp584-590
Raja Waseem Anwar , Majid Bakhtiari , Anazida Zainal , Kashif Naseer Qureshi
Wireless sensor network is a tremendous emerging technology provides communication services for environmental monitoring and target tracking for mass public and military. With increasing of this smart network popularity sensor network faced various challenges and threats. The inclusion of wireless sensor nodes also incurs different types of security threats in network. Mostly networks are using shared key approaches to make less communication overhead, but still network compromise with replay impersonation and compromise attacks. The existing proposed schemes are not fully addressed other network resources such as energy and speed, etc.  The intent of this paper is to provide a comprehensive security requirement, detail about security attacks in network and discuss the existing security schemes.
Volume: 15
Issue: 3
Page: 584-590
Publish at: 2015-09-04

Comparison between an Interleaved Boost Converter and CUK Converter Fed BLDC Motor

10.11591/ijpeds.v6.i3.pp594-602
V. Ramesh , Y. Kusuma Latha
There is a great concern of torque ripple and power quality of three phase voltage source converter fed Permanent Magnet Brushless DC Motor (PMBLDCM). In this paper, two control strategies for BLDC motor drive has been investigated. One of the control strategies is based on PFC - CUK converter fed PMBLDCM drive and another one is PFC- interleaved boost converter fed BLDC motor drive. Comparison has been made between the two control stragies in terms of Torque ripple, Total harmonic distortion (THD) and power factor for different operating speeds. The proposed work as been implemented under MATLAB/simulink environment. Simulation results are presented to validate proposed work. From the results, it is observed that PFC interleaved Boost converter fed BLDC motor drive is more effective compared to CUK converter fed BLDC motor drive.
Volume: 6
Issue: 3
Page: 594-602
Publish at: 2015-09-01

Modeling and Simulation of Superconducting Magnetic Energy Storage Systems

10.11591/ijpeds.v6.i3.pp524-537
Ashwin Kumar Sahoo , Nalinikanta Mohanty , Anupriya M
This paper aims to model the Superconducting Magnetic Energy Storage System (SMES) using various Power Conditioning Systems (PCS) such as, Thyristor based PCS (Six-pulse converter and Twelve-pulse converter) and Voltage Source Converter (VSC) based PCS. Modeling and Simulation of Thyristor based PCS and VSC based PCS has been carried out. Comparison has also been carried out based on various criteria such as Total Harmonic Distortion (THD), active and reactive power control ability, control structure and power handling capacity. MATLAB/Simulink is used to simulate the various Power Conditioning Systems of SMES.
Volume: 6
Issue: 3
Page: 524-537
Publish at: 2015-09-01

Influence Of Sensorless Control On The Noise Of Switched Reluctance Motor Drive

10.11591/ijpeds.v6.i3.pp433-438
Alexander Petrushin , Maxim Tchavychalov
The influence of the switched reluctance motor drive sensorless control on the level of its noise is considered. Theoretically justified the increase of noise level while sensorless SRM control. The results of switched reluctance motor noise measurement with sensorless control and control using the physical position sensor are given.
Volume: 6
Issue: 3
Page: 433-438
Publish at: 2015-09-01

Toward an Effective Combination of multiple Visual Features for Semantic Image Annotation

10.11591/ijeecs.v15.i3.pp533-543
B. Minaoui , M. Oujaoura , M. Fakir , M. Sajieddine
In this paper we study the problem of combining low-level visual features for semantic image annotation. The problem is tackled with a two different approaches that combines texture, color and shape features via a Bayesian network classifier. In first approach, vector concatenation has been applied to combine the three low-level visual features. All three descriptors are normalized and merged into a unique vector used with single classifier. In the second approach, the three types of visual features are combined in parallel scheme via three classifiers. Each type of descriptors is used separately with single classifier. The experimental results show that the semantic image annotation accuracy is higher when the second approach is used.
Volume: 15
Issue: 3
Page: 533-543
Publish at: 2015-09-01

Experimental Study of the Boost Converter under Current Mode Control

10.11591/ijpeds.v6.i3.pp586-593
Djamal Gozim , Kamel Guesmi , Djilali Mahi
This paper presents the practical analysis of Boost converter operating in continuous conduction mode under current control. We start by theconverter modeling, then experimental results will be exposed where we propose an experimental circuit, to study the influence of the variation of different circuit parameters such as reference current, input voltage and load. We also analyze the control technique performances. The experimental results are given and interpreted in each case.
Volume: 6
Issue: 3
Page: 586-593
Publish at: 2015-09-01

Energy Efficient Clustering for Wireless Sensor Networks using EASSR

10.11591/ijeecs.v15.i3.pp554-568
Y. Chalapathi Rao , Ch. Santhi Rani
Wireless Sensor Networks (WSNs) consist of a large quantity of small and low cost sensor nodes powered by small non rechargeable batteries and furnish with various sensing devices. The cluster-based technique is one of the good perspectives to reduce energy consumption in WSNs. The lifetime of WSNs is maximized by using the uniform cluster location and balancing the network loading between the clusters. We have reviewed various energy efficient schemes apply in WSNs of which we concerted on clustering approach. So, in this paper we have discussed about few existing energy efficient clustering techniques and proposed an Energy Aware Sleep Scheduling Routing (EASSR) scheme for WSN in which some nodes are usually put to sleep to conserve energy, and this helps to prolong the network lifetime. EASSR selects a node as a cluster head if its residual energy is more than system average energy and have low energy consumption rate in existing round. The efforts of this scheme are, increase of network stability period, and minimize loss of sensed data. Performance analysis and compared statistic results show that EASSR has significant improvement over existing methods in terms of energy consumption, network lifetime and data units gathered at BS.
Volume: 15
Issue: 3
Page: 554-568
Publish at: 2015-09-01
Show 1602 of 1897

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration