Contact Email

beei@iaescore.com

Bulletin of Electrical Engineering and Informatics

Website

ISSN:2089-3191/E-ISSN:2302-9285

Bulletin of Electrical Engineering and Informatics (BEEI) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, robotics, telecommunication, computer engineering, computer science, information system, information technology and informatics from the global world. The BEEI is an open access peer-reviewed journal published by Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU). This journal is indexed by Scopus (Elsevier)/ScimagoJR, SNIP 2020: 0.954, CiteScore 2020: 1.7, SJR 2020: 0.251; and ACCREDITED (recognised) by the Ministry of Research and Technology/National Agency for Research and Innovation, Republic of Indonesia (Decree No: 60/E/KPT/2016). Beginning with issue 1 of volume 9 (2020), BEEI is published as a bimonthly journal (6 issues/year).

Rinal Harshadkumar Doshi, Rajkumar A. Soni, Bijendra Agrawal, Ravindra L. Naik,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 1: March 2012 , pp. 1-6

This paper is a literature review on practical techniques and rules using PowerPoint, animation, and video effectively for instruction. Instruction may be teaching, training, coaching, tutoring, schooling etc. This paper must be of awareness to mentors and instructional technology staff who support faculty members in the development of instructional media. Main objective of this paper is to identify and select the proper technologies for enhancing a particular pedagogy or learning goal. Choose media that support instructor’s activity.

Victor N. Papilaya,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 1: March 2012 , pp. 29-36

Error Correcting codes are normally used for protecting transmitted information bits in a noisy channel. The information bits are encoded into error correcting codes which will be transmitted into the channel and on the receiver side, the received codes will be decoded back into the transmitted information bits. In this paper, a technique of generating binary error correcting codes that meet the Gilbert-bound and a simple encoding-decoding mechanism will be presented. To show the performance of the error correcting codes, a Binary Symmetric Channel is considered for transmission.

Varsha Hemant Patil, Kharate G K, Kamlapur Snehal Mohan,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 1: March 2012 , pp. 43-50

In this paper, trade-off between effect of registration error and number of images used in the process of super resolution image reconstruction is studied. Super Resolution image reconstruction is three phase process, of which registration is of at most importance. Super resolution image reconstruction uses set of low resolution images to reconstruct high resolution image during registration. The study demonstrates the effects of registration error and benefit of more number of low resolution images on the quality of reconstructed image. Study reveals that the registration error degrades the reconstructed image and without better registration methodology, a better super resolution method is still not of any use. It is noticed that without further improvement in the registration technique, not much improvement can be achieved by increasing number of input low resolution images.

Rakesh Ghanshyamlal Shriwastava, M.B. Diagavane, S.R. Vaishnav,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 1: March 2012 , pp. 7-14

Permanent Magnet Synchronous Motor (PMSM’s) are used in many applications that require rapid torque response and high – performance operation. New developed materials such as magnetic materials, conducting materials and insulating materials as well as several new applications have greatly contributed to development of small and special purpose machines. Using such materials the size of the motor would considerably reduce and high performance motors can be built. Due to several new applications these motors are quite popular and use in a developing country such as India for Automotive application.In a permanent magnet synchronous motor, the dc field winding of the rotor is replaced by a permanent magnet. The advantages are elimination of field copper loss, higher power density, lower rotor inertia and more robust construction of the rotor. The demerits are loss of flexibility of field flux control and possible demagnetization effect. The PMSM has higher efficiency than an induction motor, but generally its cost is higher, which makes the life cycle cost of the drive somewhat lower. PMSM particularly at low power range are widely used in industry. Recently, the interest in their application is growing, particularly up to 100 KW, only reluctance motor are simpler in construction and in assembly procedure then PMSM, but reluctance motor generally developed less torque per unit of current and per unit of weight. Therefore, on a basis of power output per unit weight (and general, per unit volume) the PMSM is superior to all other brushless synchronous motor especially with the commercial feasibility of rare earth magnets. Section 1. describes the introduction section 2.describes Classification  of permanent magnet AC motor section 3. describes the conclusion.

Raju Basak, Arabinda Das, Ajay Sensarma, Amar Nath Sanyal,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 1: March 2012 , pp. 37-42

Transformers of small ratings have a wide field of application. They are generally designed and fabricated using standard stampings available in the market. The design is made according to guidelines given in text-books. But such guidelines do not yield a cost-optimal solution. It may even fail to give a feasible solution if design variables are not properly chosen. This paper presents a method to get the cost-optimal solution subject to usual design constraints. The line of approach is completely different from that given in the standard text-books. Computer programs have been developed for finding out the cost-optimal design using standard stampings and case studies have been made on its basis.

S.K. Muttoo, Deepika Aggarwal, Bhavya Ahuja,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 1: March 2012 , pp. 51-60

We present a technique of image encryption based on Hill cipher system that provides better security than existing approach of Bibhudendra Acharya et al. by rendering the image content completely scrambled using multiple self-invertible keys, block shuffling and a new developed pel transformation. The Hill cipher algorithm is one of the symmetric key algorithms having several advantages in encryption. However, the inverse of the matrix used for encrypting the plain text in this algorithm may not always exist. Moreover this algorithm is susceptible to known plain text attack. Our proposed algorithm is aimed at better encryption of all types of images even ones with uniform background and makes the image encryption scheme more secure.

SANTOSH K PANDEY,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 2: June 2012 , pp. 111-122

In todays dynamic and changing economic environment, businesses are subjected to greater risks than ever before. As a result of this, IT Project Leaders/Managers/Director/Senior Technical Staff should be in a position to identify the business risks that an organization faces and the risk management policies that an organization has to effectively manage those risks. These risks may be related with the Finance, Accounting, Information Systems and their security etc. Here, in this paper, we are emphasizing on Information Systems Security risks. Risk assessment is currently used as a key technique for managing Information Systems Security. Every organization is implementing the risk management methods. Risk assessment is a part of this superset, Risk Management. There are various information security risk assessment methods available that can be implemented by the organization, and each has different approaches to assess the information security risks. Organizations find it difficult to select an information security risk assessment method; therefore there is a need for a critical review of existing risk assessment methodologies. This paper presents a brief discussion on the top risk assessment methodologies, particularly COBRA, CORAS, CRAMM, OCTAVE, SOMAP, and NIST Guide, along with strengths and weaknesses of each one. After that a comparative study is also done on the basis of the review results. Further research directions may also be taken by the weaknesses section. This work provides an evaluation to determine whether an information security risk assessment method is in line with information technology governance or not. The research paper will help the Senior IT Personnel to provide their recommendations for using a risk assessment methodology based on the specific requirements of an organization.

V Balaji, E. Maheswari,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 3: September 2012 , pp. 191-198

Model Predictive control (MPC) is shown to be particularly effective for the self-tuning control of industrial processes. It makes use of a truncated step response of the process and provides a simple explicit solution in the absence of constraints. Here we use Dynamic Matrix Control (DMC). DMC uses a set of basis functions to form the future control sequence. The industrial success of DMC has mainly come from its application to high dimension multivariable system without constraints. Here main objective of DMC controller is to drive the output as close to the set point as possible in a least square sense with the possibility of the inclusion of a penalty term on the input moves. Therefore, the manipulated variables are selected to minimize a quadratic objective that can consider the minimization of future error. Implementation of the internal model control is also shown here. The control strategy is to determine the best model for the current operating condition and activate the corresponding controller. Internal model control (IMC) continues to be a powerful strategy in complex, industrial processes control application. This structure provides a practical tool to influence dynamic performance and robustness to modeling error transparently in the design. It is particularly appropriate for the design and implementation of controllers for linear open loop stable system. A simulated example of the control of nonlinear chemical process is shown. The nonlinear chemical process study in this work is the exothermic stirred tank reactors system with the first order reaction. The reaction is assumed to be perfectly mixed and no heat loss occurs within the system. Using internal model control and dynamic matrix control has simulated control of the total process in CSTR. Simulation example provided to show the effectiveness of the proposed control strategy.

Saad Zaman Asif,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 2: June 2012 , pp. 97-110

The article looked into the possible future of 3GPP2s CDMA2000 1X and CDMA2000 1xEV-DO networks. The 3G CDMA2000 family of standards including EV-DO (Evolution Data Optimized) is in the daily use of more than 600 million customers across the globe. During the last few years the development efforts around CDMA2000 had been declined and its importance had been overshadowed by more advanced 3GPP LTE and IEEE WiMAX mobile broadband technologies. Due to these reasons, CDMA2000 operators are looking for alternative migration paths. The article investigated multiple facets for the future of CDMA2000 industry and these aspects were covered both from research and operational perspectives. The article first focused on the short term interoperability challenges to LTE and WiMAX and provided some antidotes for addressing these hurdles. The key challenges that were investigated include spectrum planning, authentication and security, end-to-end QoS (Quality of Service), voice enablement and data service continuity. The investigation revealed that a new QoS mapping mechanism between EV-DO and WiMAX similar to the one shown in the article is required for smooth operation. The analysis further indicated that CSFB (Circuit Switched Fallback) and SVLTE (Simultaneous Voice and LTE) were two techniques which could be used to support CS voice on an LTE/CDMA network; however they had different inter-radio access technology interworking requirements. In the following section performance aspects of both WiMAX and EV-DO were highlighted indicating a deep dip in throughput values once the users switches from WiMAX to EV-DO. The article concluded by discussing the future roadmap of CDMA2000 from 1X Advanced and DO Advanced perspectives. A performance comparison between 1X and 1X Advanced and EV-DO and DO Advanced was also presented.

B. Jaganathan,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 2: June 2012 , pp. 151-164

Renewable Energy Sources are the upcoming energy sources, for they are readily available. The performance of these sources depends upon the available input. A continuous monitoring of the output which is also dependent upon the state variables of the source model (state model) is necessary. It thus, necessitates the incorporation of an observer in the existing system which estimates the state variables continuously. This paper proposes a novel method of design at the design of a minimum order observer for a wind turbine, which further feeds a PMSG. This observer estimates the state variables of the wind turbine and compares this with the state variables of the actual plant model. This in turn generates a control vector which further provides the necessary control actions so that the output of the wind turbine is optimized to an acceptable extent. Three different configurations are made use for the simulation. The plant model with a PI controller in series with it, under open loop,the plant model in its closed loop form with negative feedback and finally the plant with the designed minimum order observer are simulated. It has been observed that the response of the overall system is improved with the implementation of the observer and so does the stability.Matlab/Simulink is used for validating the proposed idea.

Sampada A. Dhole, V H Patil,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 3: September 2012 , pp. 179-184

In the era of Information Technology, openness of the information is a major concern. As the confidentiality and integrity of the information is critically important, it has to be secured from unauthorized access. Security refers to prohibit some unauthorized persons from some important data or from some precious assets. So we need accurateness on automatic personal identification in various applications such as ATM, driving license, passports, citizen’s card, cellular telephones, voter’s ID card etc. Unimodal system carries some problems such as Noise in sensed data, Intra-class variations, Inter-class similarities, Non-universality and Spoof attacks. The accuracy of system is improved by combining different biometric traits which are called multimodal. This system gives more accuracy as it would be difficult for imposter to spoof multiple biometric traits simultaneously. This paper reviews different methods for fusion of biometric traits.

Prakash Burade,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 2: June 2012 , pp. 139-150

This paper presents Ant Colony Algorithm (ACA) based approach for the allocation of FACTS (Flexible AC Transmission System) devices for the improvement of Power transfer capacity in an interconnected Power System. The ACA based approach is applied on IEEE 30 BUS System. The system is reactively loaded starting from base to 200% of base load. FACTS devices are installed in the different locations of the power system and system performance is noticed with and without FACTS devices. First, the locations, where the FACTS devices to be placed is determined by calculating active and reactive power flows in the lines. Ant Colony Algorithm is then applied to find the amount of magnitudes of the FACTS devices. This approach of ACA based placement of FACTS devices is tremendous beneficial both in terms of performance and economy is clearly observed from the result obtained.

Junaid Zafar,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 2: June 2012 , pp. 89-96

The geometrical relationship between the cut-off and propagating planes of any waveguide system is a prerequisite for any design process. The characterization of cut-off planes and optimisation are challenging for numerical methods, closed-form solutions are always preferred. In this paper Maxwells coupled field equations are used to characterise twin E-plane and H-plane slab loaded boundary value problems. The single mode bandwidths and dispersion characteristics of these structures are presented and critically compared. The impact of slab mobility upon cut-off and propagations planes has been envisaged. The presented formulation has been extended further to derive a vectorized Green function expression linking electric and magnetic fields for the characterization of planar waveguide structures.

Dhiren P Mistry, Kiran R Trivedi,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 2: June 2012 , pp. 123-130

Despite the economic downturn, there have been quite a few new developments in the world of remote measurements lately. This Paper introduced the concept of OEMS where sensors connected to the microcontroller based system and which is the part of enterprises, retail outlets, factories, and warehouse or any remote place. The system sends the data to the Internet where specialized web applications receive the information for processing and display. One of these specialized web applications is Pachube, (http://www.pachube.com) which bills itself as a real-time data brokerage platform. Pachube enables people to tag and share real time sensor data from objects, devices and spaces around the world. The system basically sense the Environmental parameter like temperature, humidity, Carbon Monoxide Level, level of Alcohol Gases, of the Area in which system is located. By using a GPS technology, track the location of the area in terms of latitude and longitude. All the data of Sensors and GPS data uploaded to the Pachube using a GPRS with the help of GSM Modem.

Mohammad Saad Alam, Rakan C Chabaan,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 2: June 2012 , pp. 131-138

In this paper, the mechanical powertrain of a conventional three wheeler auto taxi was first analyzed and converted into a hybrid electric power train for similar vehicle requirements. Packaging design strategy of key power train components have been calculated and proposed. The preliminary design is simulated as a series hybrid fuel cell Ni-MH battery vehicle model in PSAT software for a typical city driving cycle. Further an environmental and economic study has been prepared for the proposed vehicle by calculating the emission levels and payback period. This design can be implemented in the longer run on wide range of vehicles; thus creating independence from fossil fuels.

Ravindra Kumar, Surya Prakash Singh, Bindeshwar Singh, Ravi Prakash Vishvakarma,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 2: June 2012 , pp. 69-88

Voltage sags are short duration reductions in RMS voltage caused by short circuits, overloads and starting of large motors. Voltage sag is much more of a global problem. For proper analysis and mitigation of voltage sag, their characterization is important. The magnitude and durations are main characteristics of voltage sag. In this paper voltage sag and their characteristics have been presented in a comprehensive way. How voltage sags occur, what are their characteristics and impact on equipments behavior for different conditions. Through voltage source converters, it is possible to compensate for the drop in system voltage or even to temporarily take over the supply completely. The shunt and series controllers are based on power-electronic voltage source converters. For a full compensation both reactive and active power are needed. Only not for deep voltage sags but it is possible to compensate the drop in voltage magnitude by injecting reactive power only.

Goutham Govind Raju, S. Mohamed Ali,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 3: September 2012 , pp. 213-224

Electrical power is the vital input for the economic development of any developing country. At their zenith, many excellent methods for the generation of power have been developed. The cost of supplying electrical power through grid to rural areas is becoming excessively high due to large investments in transmission and distribution lines, centralized power generating stations and line losses. For these reasons, the stand alone decentralized power generating stations with non– conventional energy sources like wind, biomass, solar energy, micro and mini hydel sources are being considered for electrifying remote rural areas. Hence in this paper an isolated wind–diesel hybrid power system with superconducting magnetic energy storage unit is considered. The hybrid power system is normally equipped with a control system, which functions to reduce the system frequency oscillations and makes the wind turbine generator power output follow the performance curve when the system is subjected to wind/load disturbances. Usually PI controllers are employed in these systems. Unfortunately, since the operating point continuously changes depending on the demand of consumers, this constant gain PI controller are unsuitable to other operating points. Therefore, this paper describes the application of the fuzzy gain scheduling on the PI controller for an isolated wind – diesel hybrid power system with superconducting magnetic energy storage unit.

H. K. Pathak, Manju Sanghi,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 3: September 2012 , pp. 233-244

Key exchange protocols allow two or more parties communicating over a public network to establish a common secret key called a session key. In 1976, Diffie and Hellman proposed the first practical key exchange (DH key exchange) protocol.  In 2005, Abdalla and  Pointcheval suggested  a new variation  of the computational   DH assumption  called chosen based computational Diffie Hellman (CCDH)  and presented  simple password based authenticated  key exchange protocols.  Since then several three party password  authenticated key agreement  protocols  have  been proposed  In 2007, Lu and  Cao proposed  a simple 3 party authenticated  key exchange  (S-3PAKE)  protocol.  Kim   and  Koi found  that this protocol cannot  resist  undetectable   online password  guessing attack  and gave fixed STPKE’ protocol as a countermeasure  using exclusive-or operation.  Recently,   Tallapally and Padmavathy found that STPKE’ is still vulnerable to undetectable online password guessing attack and gave a modified STPKE’ protocol.  Unfortunately,   we find that, although  modified STPKE’ protocol  can  resist  undetectable   online  password  guessing  attack   but it is vulnerable  to man  in the middle  attack.  Also, we propose and analyze an efficient protocol against all the known attacks.

Swati Verma, Birendra Kumar Sharma,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 3: September 2012 , pp. 185-190

Digital proxy multi-signature and blind signature scheme are found very useful for the purpose of electronic voting and electronic cash transaction. In proxy multi-signature, many original signers can delegate their signing power to a proxy signer in such a way that the proxy signer can sign any message on behalf of original signers. In blind signature, the signer cannot make a linkage between the blind signature and the identity of the requester. Proxy blind multi-signature is the combination of proxy multi-signature and blind signature. In this paper, we propose a new proxy blind multi-signature scheme based on integer factorization problem (IFP) and discrete logarithm problem (DLP) to improve the security aspect. It satisfies the security properties of both the blind signature and the proxy multi-signature scheme.

R L Chakrasali, H.N. Nagaraja, B.S. Shavaladi, V.R. Sheelavant,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 3: September 2012 , pp. 199-202

The mismatch between the generation and demand for electrical power is increasing at an alarming rate. This is mainly due shortage of conventional resources, use of appropriate technology for alternate energy sources and lack of awareness about energy conservation. Power supply to domestic, commercial and industrial consumers is a difficult task to the utilities controlled by the government. In rural India, irrigation pump sets are the major loads. The technical aptitude, attitude and co operation of the consumers helps a lot in energy management. The strategic power supply is affected if the consumers are not complying with the norms. A strategy is framed to provide power to domestic appliances around the clock and agricultural consumers on time division basis. But the local technicians play a corruptive role to violate this which is leading to overloading/failure of the distribution transformers frequently. Here, an attempt is made to devise a method to overcome the problem of agricultural consumers who are getting power on time division basis.  A control unit is installed at each distribution station to automatically monitor and control the power supply to domestic and agricultural consumers as per the pre defined schedule.  This paper explains the use of electronics and information technology in rural areas for better management of the power supply and consumption. The unauthorized connection leading to failure of distribution transformers is also taken care.

Ibraheem Kateeb,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 4: December 2012 , pp. 245-250

It is commonly held by industry and government that copper cable should be phased out in favor of an all fiber network or wireless. Conversely, fiber optics has been in use for decades without displacing copper based networks. Additionally, copper is still being deployed for broadband services. This raises the following fundamental question: Is there a place for copper cabling in providing broadband solutions in the near and far term?this paper develop comprehensive distinctions between twisted pair copper and alternatives for current and future broadband solutions while rebutting arguments for transitioning to all fiber networks. It also compares fixed solutions against wireless alternatives, and present new technologies that drive continued value of copper conductors in the outside plant. Present personal experiences as well as those from industry professionals on the unique benefits that copper solution has which cannot be replicated by fiber will be shared for the benefit of educating the audiences.The results will show great potential for continued use of twisted pair copper in broadband networks. In the process, it will prove that current socio-political thinking promoting all-fiber broadband networks is flawed.Finally, it will be showed how copper will maintain a complementary role to fiber and wireless technologies as world-wide broadband networks continue to be built out.

Radita Arindya,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 4: December 2012 , pp. 295-304

The application of sliding mode techniques the position control of a brushless servo motor is discussed. Such control laws are well suited for electric power inverter. However, high frequency commutations are avoided due to the mechanical systems. Various recent schemes are studied and operated to derive control solutions which are technically feasible. In spite of straightforward applications the resulting systems show robust performances to parametric variations and disturbances. Robustness studied with respect to rotor flux uncertainties and to stator resistance which varies with the temperature of the motor.

Muhammad Usman Rashid, Zeashan Hameed Khan,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 4: December 2012 , pp. 263-278

USB devices and flash disks are the most common storage device being used but very little work has been done on it at university project level. Considering the increasing capacity and popularity of USB flash disks, it is believed that in the near future they will replace CDs/DVDs and will be used as a primary storage medium. For this purpose, a USB flash disk duplicator will also be required just as a CD/DVD duplicator is required today. The aim of the present work is to develop a portable and stand-alone device capable of copying the contents of one USB flash disk/mass storage device to another USB flash drive without the use of an intermediary computer.

Rahul Dubey,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 4: December 2012 , pp. 285-294

This paper proposes a novel technique for asymmetrical fault detection (LLL-G) in DFIG based wind form using wavelet based energy function. In this study, there are six wind turbine driven DFIG are grouping together to make wind farm and 9 MW power is feeding to the grid. Further, the rotor is supplied by a bidirectional PWM converter for the control of active and reactive power flows from DFIG to the grid. In the case study, the three-phase fault is created in the grid and proposed algorithm detects the fault with in one and half cycles for 60 Hz system. A new diagnostic method based on the grid modulating signals pre-processing by Discrete Wavelet Transform (DWT) is here proposed to detect grid faults dynamically over time. Simulation results demonstrate the effectiveness of the proposed approach under time-varying conditions.

Shengjun Su, Shuozhong Wang,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 4: December 2012 , pp. 251-254

A SSNS (simple sensor network sniffer) is used to analyze and evaluate the Wireless Sensor Networks (WSN) effectively. SSNS is designed to monitor IEEE 802.15.4 protocol frame, which based on the Ethernet. Unlike the existed monitoring system, our design is much simpler and needs less resource. It is analyzed in this paper that the monitor network framework, time synchronization, and analysis program design. The results show that SSNS works stably, and can real-time display the frame monitored and reflect the dynamic change of WSN.

Fu Qiao, Guoyin Zhang,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 4: December 2012 , pp. 279-284

Aim at the problem of tasks scheduling problem for grid computing based on fuzzy constraints, propose tasks scheduling model of grid computing about tasks scheduling problem. Using fuzzy AHP(analytic hierarchy process) processes fuzzy constraints weight value. Utilize the merit of differential evolutionary algorithm, that is, the algorithm don’t need objective function is continuous and differentiable. Propose fuzzy differential evolutionary algorithm, the algorithm can process tasks scheduling for grid computing based on fuzzy constraint. In the experiments, compare the proposed algorithm with the existing algorithms. the proposed algorithm is more favorable than the existing algorithm in term of reliability, security and drooped task numbers.

Rabinder Singh, Akash Deep, Jyoti Bharj, Nishtha Arya,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 4: December 2012 , pp. 305-312

A statistical designed experimental approach was followed to investigate the various diffusion flame conditions for the synthesis of carbon nanotubed structures utilizing domestic Liquefied petroleum gas (IS – 4576) as the fuel carbon source. LPG flow rate, Oxygen flow rate, Height above burner (HAB) and Exposure time have been identified to generate different flame conditions based on varying One factor at a time (OFAT) approach. Two–level ‘full factorial’ design model in “Minitab12” software has been used for design of experiments. The 16 samples of soot with different flame conditions were collected on the surface of stainless steel plate. The output parameters i.e. weight of soot and substrate surface temperature were analyzed by Analysis of variance (ANOVA) to ensure that the experimentation is following the physics of the diffusion flame.Transmission electron microscope (TEM) images showed the growth of well aligned single walled carbon nanotubed structures with high aspect ratio as 220nm – 650nm diameter and 534nm – 1803nm length. In the present studythe parametric range for producing the single walled carbon–nanotubed structures through LPG diffusion flame have been found for optimization.

Krishan Arora, Baljinder Singh,

Bulletin of Electrical Engineering and Informatics, Vol 1, No 4: December 2012 , pp. 255-262

Load-frequency control (LFC) is a part of the Automatic Generation Control (AGC) in power systems, the aim of which is to maintain the system frequency and tie line flow at their scheduled values during normal period in an interconnected system. This research paper is devoted to explore the interconnection of the load frequency control of  hydro power system and the thermal system. The thermal system is comprised with governor dead band, generation rate constraint and boiler dynamics where as the hydro system is comprised with generation rate constraint. The conventional PID controller does not have adequate control performance with the consideration of nonlinearities and boiler dynamics. To overcome this drawback, Genetic Algorithm helps in solving optimization problems by exploitation of random search. The aim of the proposed expert controller is to restore the frequency to its nominal value in the smallest possible time whenever there is any change in the load demand etc.

E. Jensimiriam, P. Seenichamy, S. Ambalavanan,

Bulletin of Electrical Engineering and Informatics, Vol 2, No 1: March 2013 , pp. 65-74

In real-time applications life of lead-acid battery are affected by many factors such as state of charge, rate of charging /discharging, temperature and aging. If these factors of battery are frequently encountered thought-out the lifecycle, battery performance degradation is identified. Hence, in this communication a valve regulated lead-acid batteries (VRLA) electrical behavior are  modeled using MATLAB/SIMULINK and the performance parameters related to the  battery such as  internal resistance (R), state of charge (SOC), and capacity under various operating conditions are predicted using artificial neural network (ANN). The relevant simulation results are compared with experimental results. A validation result shows that this model can accurately simulate the dynamic behavior of the lead-acid battery for any different experimental data sets. This paper describes initial feasibility studies as well as current models and makes comparisons between predicted and actual performance.

WANG Xin-wei, ZHANG Jian-hua, JIANG Cheng, YU Lei, SHANG Jingfu,

Bulletin of Electrical Engineering and Informatics, Vol 2, No 1: March 2013 , pp. 35-44

The reliability of power generation system with wind farm is evaluated based on Monte-Carlosimulation, and in the reliability assessment the randomness of wind speed and power load, failure rate ofwind turbine generator(WTG) and conventional generator are take into account. Monte-Carlo simulationused in power generation system with wind power need large sample size and has low efficiency. So thispaper proposes an improved Monte Carlo method (IMC) based on the combination of Latin HypercubeSampling and Cholesky decomposition, this IMC method is effective to improve sample values coverage ofrandom variables input spaces and the sampling efficiency. The calculation and analysis of improvedIEEE-RTS 79 reliability test systems show that the proposed Assessment algorithm is effective.

Somayeh Kalantari, Mohamad SanieeAbadeh,

Bulletin of Electrical Engineering and Informatics, Vol 2, No 1: March 2013 , pp. 59-64

The job shop scheduling problem is a well known practical planning problem in the manufacturing sector. We have considered the JSSP with an objective of minimizing makespan. In this paper, a multi-population based hybrid genetic algorithm is developed for solving the JSSP. The population is divided in several groups at first and the hybrid algorithm is applied to the disjoint groups. Then the migration operator is used. The proposed approach, MP-HGA, have been compared with other algorithms for job-shop scheduling and evaluated with satisfactory results on a set of JSSPs derived from classical job-shop scheduling benchmarks. We have solved 15 benchmark problems and compared results obtained with a number of algorithms established in the literature. The experimental results show that MP-HGA could gain the best known makespan in 13 out of 15 problems.

Sumit Goyal, Gyanendra Kumar Goyal,

Bulletin of Electrical Engineering and Informatics, Vol 2, No 1: March 2013 , pp. 23-28

The aim of this work was to investigate the prediction ability of Cascade artificial neural network (ANN) models for solubility index of roller dried goat whole milk powder. The input variables for ANN model were: loose bulk density, packed bulk density, wettability and dispersibility, while solubility index was the output variable. Mean square error, root mean square error, coefficient of determination and Nash - sutcliffo coefficient were used as performance measures. Modelling results indicated very good agreement between the actual and the predicted data, thus confirming that ANN could be used to predict solubility index of roller dried goat whole milk powder.

Joni Welman Simatupang,

Bulletin of Electrical Engineering and Informatics, Vol 2, No 1: March 2013 , pp. 45-52

In this paper, theoretical analysis on interferometric noise caused by RB and FR in bidirectional single-fiber single-wavelength transmission over the conventional and long-reach WDM-PON is presented. Conventional WDM-PON takes place in access networks, usually for 20 km transmission distance without node amplification. However, for long-reach WDM-PON which is deployed for 100 km or beyond, optical amplification is an indispensable solution to enhance the power budget and prevent fiber nonlinearities that happening in the high power level. However, optical amplifier in long-reach WDM-PON might cause the RB and FR effects worse compare with their effects in conventional ones. It is due to the nature of re-amplification and re-modulation feedback of backscatter and back-reflection lights which existed at the preceding and following of optical amplifier or remote node gain.

Imants Vilks,

Bulletin of Electrical Engineering and Informatics, Vol 2, No 1: March 2013 , pp. 53-58

The article is a short rewiev about one particular but important and essential question in the field of AI: the consciousness. The main idea is to cast away non-scientific pronouncements about mystics and impossibility in the field. To clear up the basic notions (emergence) and define the main theme - consciousness. The article proposes temporary definition of consciousness, consciousness emergence conditions and how to recognize and test the consciousness.

Fitri Yakub, Akira Kojima, Yasuchika Mori,

Bulletin of Electrical Engineering and Informatics, Vol 2, No 1: March 2013 , pp. 75-82

The analysis of linear time-delay systems has attracted much interest in the literature over last five decade. Two types of stability conditions, namely delay-independent which results guarantee stability for arbitrarily large delays and delay-dependent, results take into account the maximum delay that can be tolerated by the system and, thus, are more useful in applications. The stability in general for linear time-delay systems, can be checked exactly only by eigenvalue considerations. When reasonable chosen with intentional delays, case study effects on time-delay of ankle torque on the stability of quiet standing, it can be used to stabilize and improve the close-loop response of these systems.

Ragavan Saravanan, P.S. Manoharan,

Bulletin of Electrical Engineering and Informatics, Vol 2, No 1: March 2013 , pp. 29-34

A unified power quality conditioner (UPQC)to compensate current and voltage power quality problems ofsensitive loads. The UPQC consists of a shunt and series inverter having a common dc link. The shunt inverter eliminates current harmonics originating from the nonlinear load side and the series inverter mitigates voltage sag/swell originating from the supply side. The developed controllers for shunt and series inverters are based on an enhanced phase-locked loop and nonlinear adaptive filter. The proposed UPQC achieves superior capacity of mitigating the effects of voltage sag/swell and suppressing the load current harmonics under distorted supply conditions.Particle swarm optimization is discussed for its character of simple computation and high measurement accuracy. Simulation results are shown to verify the effectiveness and superiority of thealgorithm.

Sarhan Musa, Matthew N.O. Sadiku,

Bulletin of Electrical Engineering and Informatics, Vol 2, No 1: March 2013 , pp. 1-10

In this paper, we present finite element method (FEM) to investigate the electromagnetic analysis of two-dimensional (2D) shielded, suspended and inverted microstrip lines for microwave applications.  In the proposed method, we specifically determine the values of capacitance per unit length, inductance per unit length, and characteristic impedance of the microstrip lines. Extensive simulation results are presented and some comparative results are given with other methods and found them to be in excellent agreement. We extend the analysis by designing our new model of shielded, inverted microstrip lines and compared it with shielded, suspended microstrip lines; we found them to be very close. Also, we determine the quasi-TEM spectral for the potential distribution of these microstrip lines.

Somayeh Kalantari, Mohamad Saniee Abadeh,

Bulletin of Electrical Engineering and Informatics, Vol 2, No 2: June 2013 , pp. 132-140

The job-shop scheduling problem is well known for its complexity as an NP-hard problem. We have considered JSSPs with an objective of minimizing makespan. In this paper, we develope a hybrid approach for solving JSSPs called GASA-JOSH. In GASA-JOSH, the population is divided in non-cooperative groups. Each group must refer to a method pool and choose genetic algorithm or simulated annealing to solve the problem. The best result of each group is maintained in a solution set, and then the best solution to the whole population is chosen among the elements of the solution set and reported as outcome. The proposed approach have been compared with other algorithms for job-shop scheduling and evaluated with satisfactory results on a large set of JSSPs derived from classical job-shop scheduling benchmarks. We have solved 23 benchmark problems and compared results obtained with a number of algorithms established in the literature.

Ahmed A. Saleh, Hazem M. El-Bakry,

Bulletin of Electrical Engineering and Informatics, Vol 2, No 2: June 2013 , pp. 141-157

Over the last decade, the concept of e-learning has become an important topic. E-Learning today gives the student a central role in his/her own learning process. It allows students to try things out, participate in courses, tests and simulations like never before, and get more out of learning than before. On the other hand, mobile E-learning has many advantages that contribute in enhancing and facilitating the learning process. In this paper, an adaptive mobile E-Learning (AME-Learning) environment for logic gates, simplification of Boolean functions and related fields is presented. The presented model generates suitable courses for each student in a dynamic form. The proposed environment is designed by integrating visual basic, flash and other effective tools. The contributions of this paper are supporting AME-Learning environment to improve learning and an evaluation of its use in context. 

Ritu Chourasiya, Ajit Shrivastava,

Bulletin of Electrical Engineering and Informatics, Vol 2, No 2: June 2013 , pp. 117-122

Image compression is internationally recognized up to the minute tools for decrease the communication bandwidth and save the transmitting power. It should reproduce a good quality image after compression at low bit rates. Set partitioning in hierarchical trees (SPIHT) is wavelet based computationally very fast and among the best image compression based transmission algorithm that offers good compression ratios, fast execution time and good image quality. Precise Rate Control (PRC) is the distinct characteristic of SPIHT. Image compression-based on Precise Rate Control and fast coding time are principally analyzed in this paper. Experimental result shows that, in the case of low bit-rate, the modified algorithm with fast Coding Time and Precise Rate Control can reduce the execution time and improves the quality of reconstructed image in both PSNR and perceptual when compare to at the same low bit rate.

Ch. Varaha Narasimha Raja,

Bulletin of Electrical Engineering and Informatics, Vol 2, No 2: June 2013 , pp. 105-110

This paper presents a load frequency control in fourarea power systems using fuzzy gain scheduling of PI controlleris realized. The system simulation is realized by using Matlab/Simulink software. System dynamic performance is observed forconventional PI, fuzzy PI and fuzzy logic controllers.

Waleed Khalil Ahmed,

Bulletin of Electrical Engineering and Informatics, Vol 2, No 2: June 2013 , pp. 88-94

The present paper explores the mathematical molding of the wind turbine and its influence on the subsequent stages. Specifically, the paper investigate the modeling of gear train of the wind turbine and distinguishes the difference in the approaches usually used to establish the mathematical model which is later has a significant impact on the design, characteristic and performance of the modeled system. Mainly two commonly used approached for the gear train systems are analyzed and discussed. The main well know mechanisms are investigated in term of the most proposed assumptions to deal with the damping, shaft stiffness and inertia effect of the gear. This paper elucidates these concerns.

Ahmad Parvaresh, Seyed Mohammad Ali Mohammadi,

Bulletin of Electrical Engineering and Informatics, Vol 2, No 2: June 2013 , pp. 83-87

Matlab/Simulink is known in a large number of fields as a powerful and modern simulation tool. In the field of building and HVAC simulation its use is also increasing. However, it is still believed to be a tool for small applications due to its graphical structure and not to fit well for the simulation of multi-zone buildings. This paper presents the development of a new multi-zone building model for Matlab/Simulink platform.

Michael Gr. Voskoglou,

Bulletin of Electrical Engineering and Informatics, Vol 2, No 2: June 2013 , pp. 158-168

Reasoning, the most important human brain operation, is characterized by a degree of fuzziness and uncertainty. In this paper we construct a fuzzy model for the reasoning process giving, through the calculation of probabilities and possibilities of all possible individuals’ profiles, a quantitative/qualitative view of their behaviour during the process. In this model the main stages of human reasoning (imagination, visualisation and generation of ideas) are represented as fuzzy subsets of   set of linguistic labels characterizing a person’s performance in each stage. Further, using the coordinates of the centre of mass of the graph of the corresponding membership function we develop a method of measuring the reasoning skills of a group of individuals. We also present a number of classroom experiments with student groups’ of our institution (T. E. I. of Patras, Greece) illustrating our results in practice.

Bekti Maryuni Susanto,

Bulletin of Electrical Engineering and Informatics, Vol 2, No 3: September 2013 , pp. 225-232

Internet is also increasing exponentially increasing intrusion or attacks by crackers exploit vulnerabilities in Internet protocols, operating systems and software applications. Intrusion or attacks against computer networks, especially the Internet has increased from year to year. Intrusion detection systems into the main stream in the information security. The main purpose of intrusion detection system is a computer system to help deal with the attack. This study presents a hybrid approach to decision tree algorithm and naïve Bayes to detect computer network intrusions. Performance is measured based on the level of accuracy, sensitivity, precision and spesificity. Dataset used in this study is a dataset KDD 99 intrusion detection system. Dataset is composed of two training data and testing data. The selection of attributes is done using the chi-square, selected the top ten attributes based on the calculation of chi-square. From the experimental results obtained by the accuracy of naïve Bayes decision tree algorithm was 99.82%.

Abderrezak Marzaki, V. Bidal, R. Laffont, W. Rahajandraibe, J-M. Portal, E. Bergeret, R. Bouchakour,

Bulletin of Electrical Engineering and Informatics, Vol 2, No 3: September 2013 , pp. 212-217

A new MOS device called Dual-Control Gate Floating Gate Transistor (DCG-FGT) is used as a building block in analog design. This device offers new approaches in circuit design and allows developing new functionalities through two operating modes: Threshold Voltage Adjustable Mode, where the DCG-FGT behaves like a MOS transistor with an electrically adjustable threshold voltage. Mixer Signal Mode where the DCG-FGT can mix two independent signals on its floating gate. This device is developed to be fully compliant with CMOS Non Volatile Memory (NVM) process. An electrical model of the DCG-FGT has been implemented in an electrical simulator to be available for analog design. A DCG-FGT based ring oscillator is studied in this paper.

Naw Naw,

Bulletin of Electrical Engineering and Informatics, Vol 2, No 3: September 2013 , pp. 177-181

Nowadays, E-commerce is very popular because of information explosion. Text mining is also important for information extraction.  Users are more preferable to use the convenience system from many sources such as through web pages, email, social network and so on. This system proposed the relevant words extraction method for car recommendation system from user email. In relevant words extraction, this system proposed the Rule-based Technique based on Compiling Technique. Context- free grammar is very suitable for relevant words extraction. The extracted keys will be used in recommendation system. Recommendation System (RS) is a most popular tool that helps users to recommend according to their interests. In recommendation, this system proposed Content-based Filtering approach with Jaccard Coefficient that will help the users who want to buy the car by providing relevant car information.

Seyed Hosein Hoseini, Meisam Pourahmadi-Nakhli, Ali Soltani,

Bulletin of Electrical Engineering and Informatics, Vol 2, No 3: September 2013 , pp. 218-224

A well-prepared One of the main concerns of people in developing and developed societies is increasing the Body Mass Index (BMI) level. BMI, in fact can be considered as an indicator of overall health condition. Genetic aspects aside, the BMI level is affected by different factors, such as socio-economic, environmental, and physical activity level. This study investigated the effect of different factors on the BMI level of a sample population of 470 adults of three residential neighborhoods in Shiraz, Iran. The Pearson correlation coefficient, independent sample T-test and One Way ANOVA were used to extract the variables which significantly influenced the BMI. The statistical analysis showed that despite the apparent association of BMI with physical activity level, it is influenced by several factors such as age, residence record, number of children, distance to bus or taxi stop, indoor or sport exercise. Then, an Artificial Neural Network (ANN) was applied to predict the level of personal BMI. Artificial Neural Network-based methodology results showed that the generalized estimating ANN model was satisfactory in estimating the BMI based on the introduced pattern.

Naw Naw, Ei Ei Hlaing,

Bulletin of Electrical Engineering and Informatics, Vol 2, No 3: September 2013 , pp. 169-176

Nowadays, E-commerce is very popular because of information explosion. Text mining is also important for information extraction.  Users are more preferable to use the convenience system from many sources such as through web pages, email, social network and so on. This system proposed the relevant words extraction method for car recommendation system from user email. In relevant words extraction, this system proposed the Rule-based approach in Compiling Technique. Context- free grammar is the most suitable for relevant words extraction. Recommendation System (RS) is a most popular tool that helps users to recommend according to their interests. This system implements efficient recommendation system by using proposed key extraction algorithm, Content-based Filtering (CBF) method and Jaccard Coefficient that will help the users who want to buy the car by providing relevant car information.

Amin Safari,

Bulletin of Electrical Engineering and Informatics, Vol 2, No 3: September 2013 , pp. 194-203

This paper presents the simultaneous coordinated designing of the UPFC robust power oscillation damping controller and the conventional power system stabilizer. On the basis of the linearized Phillips-Herffron model, the coordinated design problem of PSS and UPFC damping controllers over a wide range of loading conditions and system configurations is formulated as an optimization problem with the eigenvalue-based multiobjective function which is solved by a particle swarm optimization algorithm (PSO) that has a strong ability to find the most optimistic results. The stabilizers are tuned to simultaneously shift the undamped electromechanical modes to a prescribed zone in the s-plane. To ensure the robustness of the proposed simultaneous coordinated controllers tuning, the design process takes into account a wide range of operating conditions and system configurations. The effectiveness of the proposed method is demonstrated through eigenvalue analysis, nonlinear time-domain simulation and some performance indices studies under various disturbance conditions of over a wide range of loading conditions. The results of these studies show that the PSO based simultaneous coordinated controller has an excellent capability in damping power system oscillations and enhance greatly the dynamic stability of the power system.

Years

Issues

ipmuGoDigital Library

Copyright © 2021 IpmuGo Digital Library.

All Right Reserved

Support

Help Center

Privacy Policy

Terms of Service