Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,404 Article Results

Sliding Mode Control of Three Levels Back-To-Back VSC-HVDC System Using Space Vector Modulation

https://ijpeds.iaescore.com/index.php/IJPEDS/article/view/4998
Bouafia Saber , Benaissa Abdelkader , Bouzidi Mansour , Barkat Said
In this study, a sliding mode strategy proposed to control a three levels Back-to-Back High Voltage Direct Current (HVDC) system based on the three-level voltage source converter (VSC). The voltage-balancing control of two split DC capacitors of the VSC-HVDC system is achieved using three-level space vector modulation with balancing strategy based on the effective use of the redundant switching states of the inverter voltage vectors. Finally, a complete simulation of the VSC-HVDC system validates the efficiency of the proposed strategy law. Compared to the conventional control, Sliding Mode Control scheme for the VSC-HVDC system shows the attractive advantages such as offering high tracking accuracy, fast dynamic response and good robustness.DOI: http://dx.doi.org/10.11591/ijpeds.v4i2.5575
Volume: 4
Issue: 2
Page: 265-273
Publish at: 2014-06-01

Security Evaluation for RFID System: Security Evaluation Index Architecture and Evaluation Model

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3540
Hengfeng Luo , Ruiqi Liu , Yingkai Wang , Jinghao Chen
With the rapid development and application of RFID system, people would pay more attention to the security of RFID, which is the essential issue and key technology in RFID system. This paper establishes the evaluation index architecture of RFID security, then according to these indexes for the evaluation of the RFID system security which based on fuzzy synthetic evaluation model, this paper proposes a AHP (The Analytic Hierarchy Process) for weighs, and then applies fuzzy comprehensive evaluation method for more accurate and effective evaluation results, which is used to evaluate the security of RFID system. Our security evaluation index architecture and evaluation model with RFID system is very practical and effective in the real life. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5401
Volume: 12
Issue: 6
Page: 4557-4562
Publish at: 2014-06-01

Guided Navigation Control of an Unmanned Ground Vehicle using Global Positioning Systems and Inertial Navigation Systems

https://ijece.iaescore.com/index.php/IJECE/article/view/5578
Pooja Velaskar , Alvaro Vargas-Clara , Osama Jameel , Sangram Redkar
This paper demonstrates the use of Global Positioning System (GPS) and Inertial Navigation System (INS) in order to develop an Unmanned Ground Vehicle (UGV) devised to perform a wide variety of outdoor tasks. There are many applications for autonomous UGVs such as tactical and surveillance applications, exploration of areas inaccessible by humans. Capable to navigate to a specific location, and control their motion depending on their surroundings without human intervention. The inertial navigation system makes use of Inertial Measurement Units (IMUs) to measure the change to the UGV's positional parameters, orientation and speed which are continuously monitored and updated. With the advent of GPS, and the positional data from the inertial system the positional information is computed leading to a more accurate control of the UGV; which otherwise suffers from integration drift that occurs with the implementation of inertial systems alone. Autonomous control of the UGV is implemented by coupling GPS sensor and Mission Planner, a tool to map waypoints from Google Maps. Furthermore, system stability and ideal PID (Proportional, Integral and Derivative) values are determined using bicycle modeling analysis to achieve better estimates and control of the UGV.DOI:http://dx.doi.org/10.11591/ijece.v4i3.5183
Volume: 4
Issue: 3
Page: 329-342
Publish at: 2014-06-01

The prediction of Granulating Effect Based on BP Neural Network

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3525
Fang Li , Kaigui Wu , Guanyin Zhao
During the granulation process of Iron ore sinter mixture, there are many factors affect the granulating effect, such as chemical composition, size distribution, surface feature of particle, and so on. Some researchers use traditional fitting calculation methods like least square method and regression analysis method to predict granulation effects, which exists big error. In order to predict it better, we build improved BP (Back propagation) neural network model to carry out data analysis and processing, and then obtain better effect than traditional fitting calculation methods. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5481
Volume: 12
Issue: 6
Page: 4451-4456
Publish at: 2014-06-01

Low Complexity Adaptive Noise Canceller for Mobile Phones Based Remote Health Monitoring

https://ijece.iaescore.com/index.php/IJECE/article/view/5594
Jafar Ramadhan Mohammed
Mobile phones are gaining acceptance to become an effective tool for remote health monitoring. On one hand, during electrocardiographic (ECG) recording, the presence of various forms of noise is inevitable. On the other hand, algorithms for adaptive noise cancellation must be shared by limited computational power offered by the mobile phones. This paper describes a new adaptive noise canceller scheme, with low computational complexity, for simultaneous cancellation of various forms of noise in ECG signal. The proposed scheme is comprised of two stages. The first stage uses an adaptive notch filters, which are used to eliminate power-line interference from the primary and reference input signals, whereas the other noises are reduced using modified LMS algorithm in the second stage. Low power consumption and lower silicon area are key issues in mobile phones based adaptive noise cancellation. The reduction in complexity is obtained by using log-log LMS algorithm for updating adaptive filters in the proposed scheme. A comprehensive complexity and performance analysis between the proposed and traditional schemes are provided.DOI:http://dx.doi.org/10.11591/ijece.v4i3.5534
Volume: 4
Issue: 3
Page: 422-432
Publish at: 2014-06-01

A Novel Hybrid Negative Half Cycle Biased Modulation Scheme for Cascaded Multilevel Inverter

https://ijpeds.iaescore.com/index.php/IJPEDS/article/view/4992
R. Hemanthakumar , V. RaghavendraRajan , C.S. Ajin Sekhar , M. Sasikumar
This paper proposes a new Modified hybrid modulation scheme for cascaded multilevel inverter. The proposed method employs novel single carrier sinusoidal pulse width modulation with its negative cycle biased (HNHCBM) for reducing switching losses when compared to other sinusoidal modulation methods using a hybrid scheme. This scheme is a derivative of various single carrier sinusoidal pulse width modulation scheme and main advantages are reduced harmonics, enhanced output voltage, reduced power loss in the series cells and ease of implementation. The simulation results are analysed with matlab/simulink and compared with experimental results obtained using DSP processor TMS320F2407 by applying it to 5-level inverter and the results are summarized.DOI: http://dx.doi.org/10.11591/ijpeds.v4i2.5696
Volume: 4
Issue: 2
Page: 204-211
Publish at: 2014-06-01

A New Statistical Model to Estimate Information System Contingency Budget

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3548
Junwei Zeng , Fajie Wei , Haitao Xiong , Anying Liu
Development of an information system is a complex process, which expose to a great number of risks.Hence, the high failure rates long associated with information system projects, despite advances in techniques for information technology development, suggest that organizations need to improve their ability to identify and to manage associated risks. To improve the risk management in information system development projects, a pragmatic procedure is suggested to determine the size of a project's contingency plan budget at any specified level of certainty. Considering the interaction among risk factors, a method based on common risk factors and copula functions is used to model and quantify positive dependence between risks. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5438
Volume: 12
Issue: 6
Page: 4617-4623
Publish at: 2014-06-01

On the Analogy of Non-Euclidean Geometry of Human Body With Electrical Networks

https://ijece.iaescore.com/index.php/IJECE/article/view/5588
Alexander Penin , Anatoli Sidorenko , Ashok K Vaseashta
A review of application of non-Euclidean geometries for interpreting the process of the growth in the human body is presented and features employing non-Euclidean geometries in the electric circuit theory are modeled. Growth of the human body and changes of parameters of an operating regime of an electronic network correspond to projective and conformal transformations which possess an invariant being the cross-ratio of four points. The common mathematical apparatus represents interdisciplinary approach in view of analogy of processes of a different physical nature. The results obtained here demonstrate development of a methodology of application of non-Euclidean geometries and its biological correlation to the growth of human body.DOI:http://dx.doi.org/10.11591/ijece.v4i3.5630 
Volume: 4
Issue: 3
Page: 378-388
Publish at: 2014-06-01

A Low Cost Single-Switch Bridgeless Boost PFC Converter

https://ijpeds.iaescore.com/index.php/IJPEDS/article/view/4997
Younghoon Cho
This paper proposes the single-switch bridgeless boost power factor correction (PFC) converter to achieve high efficiency in low cost. The proposed converter utilizes only one active switching device for PFC operation as well as expecting higher efficiency than typical boost PFC converters. On the other hand, the implementation cost is less than traditional bridgeless boost PFC converters, in where two active switching deivces are necessary. The operational principle, the modeling, and the control scheme of the proposed converter are discussed in detail. In order to verify the operation of the proposed converter, a 500W switching model is built in PSIM software package. The simulation results show that the proposed converter perfectly achieves PFC operation with only a single active switch.DOI: http://dx.doi.org/10.11591/ijpeds.v4i2.5558
Volume: 4
Issue: 2
Page: 256-264
Publish at: 2014-06-01

Improved Fuzzy Evaluation Model Analysis of Nuclear Power Plant Operational Safety Performance

10.11591/ijeecs.v12.i6.pp4505-4511
Dongxiao Niu , Zongyun Song , Jinpeng Liu
The evaluation on nuclear power plant operational safety performance had great significance on whether the nuclear power plant operated safely or not. Currently the academic literatures on nuclear power plant operational safety performance are rare. Improved Fuzzy evaluation model which introduce confidence level had been used into the evaluation of nuclear power plant operational safety performance. The article built safety performance indicator system and further established importance level evaluation matrix which showed the indexes relative importance, and established performance evaluation matrix which represented indicators impact on operational effect. From the importance level evaluation matrix the weigh and confidence of indicators can be gained and from the performance evaluation matrix the evaluation matrix can be gained. The preliminary evaluation result and synthetic confidence can be obtained by multiplying evaluation matrix by indicator weigh and confidence, and then the final evaluation result can be achieved. DOI: http://dx.doi.org/10.11591/telkomnika.v12i6.5389
Volume: 12
Issue: 6
Page: 4505-4511
Publish at: 2014-06-01

A Heuristic Greedy Algorithm for Scheduling Out-Tree Task Graphs

10.11591/ijeecs.v12.i6.pp4868-4875
Jian Jun Zhang , Wei Wen Hu , Mei Ni Yang
The scheduling of Out-Tree task graphs is one of the critical factors in implementing the compilers of parallel languages and improving the performance of parallel computing. Although there are a few heterogeneity based algorithms in the literature suitable for scheduling Out-Tree task graphs, they usually require significantly high scheduling costs and may not deliver good quality schedules with lower costs. This paper presents a heuristic greedy scheduling algorithm for Out-Tree task graphs with an objective to simultaneously meet high performance and fast scheduling time, which is based on list and task duplication, tries to find the best point between balancing loads and shortening the schedule length and improves the schedule performance without increasing the time complexity of the algorithm. The comparative study shows that the proposed algorithm surpasses previous approaches in terms of schedule length ratio, speedup and efficiency metrics.
Volume: 12
Issue: 6
Page: 4868-4875
Publish at: 2014-06-01

A Modified Fractal Bow Tie Antenna for an RFID Reader

https://ijece.iaescore.com/index.php/IJECE/article/view/5598
Chaouki Guesmi , Abdelhak Ferchichi , Ali Gharsallah
In this paper, fractal Bowtie antennas are proposed. To validate our structure and to develop an analytic method to determine the geometry parameters, the Lumped theory is used. The proposed structure is simulated using CST Microwave Studio and then Compared to the electrical Model. The proposed circuit has the same resonant aspect when comparing to the Bowtie antenna with a much reduced simulation time. The Bowtie antenna has a box with a size of   44 *80 *1.5 mm3. This antenna will be designed to an RFID Reader that resonates on 2.45 GHz.DOI:http://dx.doi.org/10.11591/ijece.v4i3.5656
Volume: 4
Issue: 3
Page: 441-446
Publish at: 2014-06-01

Water Level Intelligent System of Data Acquisition and Early Warning

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3555
Lei Li , Fenglian Cao , Zheng Li
In order to improve work efficiency of hydrometric station, guarantee the accuracy and timeliness of water level data acquisition, process water level data in a timely manner and make early warning of risk, mobile devices are proposed as collection, sending and early warning terminal of water level data, and the upper computer as the receiving and processing terminal of water level data. The water level access algorithm is studied, and the stripping method is used to obtain the high-accuracy water level information. The image thinning algorithm is applied to optimize, so as to reduce the complexity of the algorithm. The programming is able to control real-time data sending, which realizes the data exchange between server terminal and communication module. Microsoft Access database is applied to the operation of water level information and the design of man-machine interface. Experimental study shows that this system can accurately acquire information in real time, undertake statistical analysis of data with many functions such as early warning, effectively improve the work efficiency of water level monitoring and improve the management level of hydrological industry. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.5450
Volume: 12
Issue: 6
Page: 4671-4678
Publish at: 2014-06-01

Single stage single phase active power factor corrected Ĉuk Topology Based AC-DC Converter

https://ijpeds.iaescore.com/index.php/IJPEDS/article/view/4988
Md. Ismail Hossain , Mohammad Jahangir Alam
This paper focuses on the analysis of a power factor correction (PFC) converter using close loop Ĉuk topology. Regardless of the input line voltage and output load variations, input current drawn by the buck or buck-boost converter is always discontinuous. The Boost converter suffers from high voltage stresses across the power electronic devices. The input current in Ĉuk converter is comparable to boost converter’s input current. In this paper output voltage is controlled by inner current and outer voltage control loop along with power factor correction (PFC). It shows less input current THD, nearly unity power factor and better output voltage regulation of AC-DC converter under variable input voltage and output load. In this paper the relative performance between normal diode rectifier, open loop Ĉuk rectifier and close loop Ĉuk rectifier is presented. An algorithm for implementing close loop Ĉuk rectifier in digital domain is developed and simulated.DOI: http://dx.doi.org/10.11591/ijpeds.v4i2.5574
Volume: 4
Issue: 2
Page: 156-164
Publish at: 2014-06-01

On-line Monitoring System of Capacitive Equipment Dielectric Loss

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3484
Xin-bo Huang , Tu Deng , Jie Shi
To ensure capacitive equipment working safely and reliably, an on-line monitoring system of capacitive equipment dielectric loss was developed. The insulation situation was estimated accurately through long-distance synchronous sampling (using IRIG-B code synchronous clock), seamless connection of data between devices using Intelligent Electronic Device (IED), communication following IEC61850 protocol, and data analysis (using fault diagnosis algorithm). Running results showed that the system not only can accurately monitor the information, such as leakage current, dielectric loss, and equivalent capacitance, which reflect the working condition of capacitive equipment, but also can transmit data to the on-line monitoring data center through the IEC61850 protocol. The operating data, monitoring on CVTs in 330kV substation, showed the great improvement of this system on credibility, accuracy, and stability. What’s more, it also proved the great value of using and promoting this system. DOI : http://dx.doi.org/10.11591/telkomnika.v12i6.4866
Volume: 12
Issue: 6
Page: 4134-4141
Publish at: 2014-06-01
Show 1630 of 1827

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration