IAES journal
Not a member yet
    5584 research outputs found

    The Use of Markov Chain Method to Determine Spare Transformer Number and Location

    No full text
    The purpose of this study is to develop a method to determine spare transformer number and location. Using Markov Chain method, state transition model and steady state probability was used on each 500-kV substation in order to analyze the effect of spare number and location variation with the reliability changes.  To give an actual result of the case study, calculation of spare transformer number and location on 500/150 kV transformers in Java Bali System was analyzed. The steady state probability results will vary depending on the number of spare transformer, these results can then be used to assess the spare transformer needed. The variation of spare transformer location can be used to analyze the best possible location of the spare in order to satisfy the reliability required. The methodology presented shows an integrated calculation for determining the spare transformer number and location

    Data in Transit Validation for Cloud Computing Using Cloud-Based Algorithm Detection of Injected Objects

    No full text
    The recent paradigm shift in the IT sector leading to cloud computing however innovative had brought along numerous data security concerns. One major such security laps is that referred to as the Man in the Middle (MITM) attack where external data are injected to either hijack a data in transit or to manipulate the files and object by posing as a floating cloud base. Fresh algorithms’ for cloud data protection do exist however, they are still prone to attack especially in real-time data transmissions due to employed mechanism. Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. The labelling header technique allows for a two-way data binding; DOM based communication between local and cloud computing that triggers automated acknowledgment immediately after file modification. A two layer encryption functions in PHP was designed for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. A sum total of 1600 different file types were used during training then evaluation of the proposed algorithm, where 87% of the injected objects were correctly detected

    Schedulability analysis of Rate Monotonic Algorithm using Improved Time Demand Analysis for Multiprocessor Environment

    No full text
    Real -Time Monotonic algorithm (RMA) is a widely used static priority scheduling algo-rithm. For application of RMA at various systems, it is essential to determine it’s feasibil-ity first. Though there are a lot of feasibility analysis test present, most of them reduce the scheduling points in an attempt to decrease the complexity. In this paper we state and de-velop an exact schedulablity test algorithm named as improved time demand analysis, which reduces the number of tasks to be analyzed instead of reducing the scheduling points of a given task. This significantly reduces the number of iterations taken to compute feasibility. This algorithm can be used along with the previous tests to effectively reduce the high complexities encountered in processing large task sets. We also extend our algorithm to multiprocessor environment and compare number of iterations with different number of processors

    Data Transmission Analysis using MW-5000 at 5.8 GHz Frequency

    No full text
    In the recent years, the data communication system become the main type of communication in the world. The FSK modulator and FSK demodulator is one of the part that becomes the most important part and extremely advanced with the involvement of microwave active and passive circuits. This paper presents the data transmission analysis using MW-5000 at 5.8 GHz frequency. This experiment use the microwave communication module MW-5000 that is available in electronic laboratory. From this experiment the duration taken for the transmission of data is depend on the length of sentence and the value of baud rate

    Computationally Efficient Multi-Antenna Techniques for Multi-User Two-Way Wireless Relay Networks

    No full text
    In this work, we are interested in implementing, developing and evaluating multi-antenna techniques used for multi-user two-way wireless relay networks that provide a good tradeoff between the computational complexity and performance in terms of symbol error rate and achievable data rate. In particular, a variety of newly multi-antenna techniques is proposed and studied. Some techniques based on orthogonal projection enjoy low computational complexity. However, the performance penalty associated with them is high. Other techniques based on maximum likelihood strategy enjoy high performance, however, they suffer from very high computational complexity. The Other techniques based on randomization strategy provide a good trade-off between the computational complexity and performance where they enjoy low computational complexity with almost the same performance as compared to the techniques based on maximum likelihood strategy

    Review of the most applicable regulator collections to control the Parallel Active Power Filter

    No full text
    This work presents a study of the three-phase parallel active power filter and the various controllers used in its control. Moreover, in order to improve the quality of electrical energy, by making it conform to the new normative constraints, we have also been led to develop and apply advanced automation methods. In this framework, this paper reports of several regulatory structures : fuzzy logic, PWM, new space vector PWM (NSVPWM), space vector PWM (SVPWM), HYSTERESIS moreover, in order to produce a parallel active filter, a thorough study of experimental feasibility was carried out, taking into account the industrial constraints of the product both in its design and its application

    Joint Routing and Congestion Control in Multipath Channel Based on Signal to Noise Ratio with Cross Layer Scheme

    No full text
    Routing protocol and congestion control in Transmission Control Protocol (TCP) have important roles in wireless mobile network performance. In wireless communication, the stability of the path and successful data transmission will be influenced by the channel condition. This channel condition constraints come from path loss and the multipath channel fading. With these constraints, the algorithm in the routing protocol and congestion control is confronted with the uncertainty of connection quality and probability of successful packet transmission, respectively. It is important to investigate the reliability and robustness of routing protocol and congestion control algorithms in dealing with such situation.  In this paper, we develop a detailed approach and analytical throughput performance with a cross layer scheme (CLS) between routing and congestion control mechanism based on signal to noise ratio (SNR) in Rician and Rayleigh as multipath fading channel. We proposed joint routing and congestion control TCP with a cross layer scheme model based on SNR (RTCP-SNR). We compare the performance of RTCP-SNR with conventional routing-TCP and routing-TCP that used CLS with routing aware (RTCP-RA) model.  The analyses and the simulation results showed that RTCP-SNR in a multipath channel outperforms conventional routing-TCP and RTCP-RA

    SIW Circular Cavity Single Mode Filter With Triangle Probe

    No full text
    A novel substrate integrated waveguide (SIW) circular cavity using triangle probe are proposed in this paper. Prior to this research work, circular cavity resonator was used to achieve a miniaturization for the overall circuit size. The proposed filter provides single resonant mode, TE110. The resonant frequency of TE110 can be adjusted by varying the length and width of the SIW cavity. The proposed filter are designed to operate at frequency 3.75 GHz and implemented on Rogers 3210 substrate with thickness of 0.64 mm. The insertion loss in operating band is less than 0.6 dB and the return loss is better than 24 dB. Simulated result obtained using Ansoft HFSS software

    A Comparative Review on Data Hiding Schemes

    No full text
    Data hiding is a technique used to protect confidential information. The aim of a particular data hiding scheme is to make a more secure and robust method of information exchange so that confidential and private data can be protected against attacks and illegal access. The aim of this paper is to review on different data hiding schemes, covering the decoding, decrypting and extracting schemes. This paper also highlighted three major schemes that are widely used in research and real practice. The discussion include findings on the most recent work on decryption schemes

    Symmetrical and Asymmetrical Multilevel Inverter Structures with Reduced Number of Switching Devices

    No full text
    The purpose of this study is to analyze the operation and design of symmetrical and asymmetrical multilevel inverter structures with reduced number of switching devices. In this study, the term of conventional inverter is defined as a single cascaded inverter. Specifically, the inverter operates in three complete loops and only produces 2-level and 3-level of output voltages. Usually, cascaded structure suffers from the high total harmonic distortion. Thus, by considering multilevel structure of inverter, low total harmonic distortion reduction and voltage stress reduction on switching devices can be archived. Sinusoidal pulse width modulation and modified square pulse width modulation are used as modulation techniques in switching schemes of the designed multilevel inverters. The findings indicate that, the designed multilevel structure cause low total harmonics distortion at the output voltage. Furthermore, the asymmetrical structure is producing the same output voltage levels with reduced number of switching devices compared to the symmetrical structure is experimentally confirmed. The findings show that the total harmonic distortion for 7-level (symmetrical) and 9-level (asymmetrical) are 16.45% and 15.22%, respectively

    0

    full texts

    5,584

    metadata records
    Updated in last 30 days.
    IAES journal is based in Indonesia
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇