cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Bulletin of Electrical Engineering and Informatics
ISSN : -     EISSN : -     DOI : -
Core Subject : Engineering,
Bulletin of Electrical Engineering and Informatics (Buletin Teknik Elektro dan Informatika) ISSN: 2089-3191, e-ISSN: 2302-9285 is open to submission from scholars and experts in the wide areas of electrical, electronics, instrumentation, control, telecommunication and computer engineering from the global world. The journal publishes original papers in the field of electrical, computer and informatics engineering.
Arjuna Subject : -
Articles 10 Documents
Search results for , issue "Vol 4, No 1: March 2015" : 10 Documents clear
Piezoelectric Nanowire toward Harvesting Energy from In-Vivo Environment Ali Ghareaghaji
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1007.778 KB) | DOI: 10.11591/eei.v4i1.327

Abstract

This paper discusses technologies used to harvest energies from in-vivo environment. The discussion mainly concentrated on  nanogenerators based on Piezoelectric nanowires which are employed for converting biomechanical energy (such as muscle stretching), vibration energy (such as heart rate sound, sound waves) and  biohydraulic energy (such as blood flow, contraction of blood vessel) into electric energy. At the end this paper studies an approach for harvesting biomechanical and biochemical energies from living organisms simultaneously. This system, by using aligned nanowire arrays, can power medical nanosystems and nanodevices through converting vibration, biomechanical and biohydrulic energies into electricity. On the other hand by using biofuel cell structure, this hybrid cell can convert biochemical (glucose/O2) energy in biofluid into electricity. This technology can provide adequate power required for feeding nanodevices and nanosystems or at least to indirectly charge battery of the device. This technology can provide a sound basis for designing wireless self-powered nanodevices with direct energy harvesting from in-vivo environment.
Numerical Investigation of Heat Transfer Enhancement in a Circular Tube with Rectangular Opened Rings Arkan Altaie; Moayed R. Hasan; Farhan Lafta Rashid
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (252.451 KB) | DOI: 10.11591/eei.v4i1.331

Abstract

Turbulent forced convection of coolant air flow (10 m/s velocity) in a steel tube of 50 cm long having outside diameter of 60 mm and inside diameter of 30 mm with constant outside surface temperature of 1000, 1200 and 1400 Ko is numerically analyzed. The renormalization group k-ε model is used to simulate turbulence in ANSYS - FLUENT 14.5. An opened ring of rectangular cross section (5x7 mm) is fitted in the tube and separated by 8cm pitch. Results of temperature and velocity distribution along the tube center line for the case of tube with internal ribs  were compared with that of plain tube  , these results show that the use of internal ribs enhance the heat transfer rate and found to possess the highest performance factors for turbulent flow.
Practical IBC using Hybrid-Mode Problems: Factoring and Discrete Logarithm Chandrashekhar Meshram
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (143.451 KB) | DOI: 10.11591/eei.v4i1.326

Abstract

Shamir proposed the concept of the ID-based cryptosystem (IBC) in 1984. Instead of generating and publishing a public key for each user, the ID-based scheme permits each user to choose his name or network address as his public key. This is advantageous to public-key cryptosystems because the public-key verification is so easy and direct. In such a way, a large public key file is not required. Since new cryptographic schemes always face security challenges and many integer factorization problem and discrete logarithm based cryptographic systems have been deployed, therefore, the purpose of this paper is to design practical IBC using hybrid mode problems factoring and discrete logarithm. We consider the security against a conspiracy of some entities in the proposed system and show the possibility of establishing a more secure system.
Comparative Study of PWM Control and PI Control of Induction Motor Rohitash Singh; Saurabh Kr. Bajpai; Harinder Singh Sandhu
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (317.088 KB) | DOI: 10.11591/eei.v4i1.322

Abstract

The induction motor is without doubt the most used electrical motor because of its unique characteristics.  Most of its applications need fast and intelligent speed control system. This paper presents comparison of the intelligent and advanced speed control methods based on PWM technique and PI controller to achieve maximum torque and efficiency.  Simulation is carried out in MATLAB environment and results are investigated for speed control of induction motor without any controller and with PI controller on full load condition.
A Novel Inter Connection of DFIG with Grid in Separate Excitation SMES System with Fuzzy Logic Control A. Kavitha; A. V. Suresh
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (920.348 KB) | DOI: 10.11591/eei.v4i1.312

Abstract

The use of doubly fed induction generators (DFIGs) in wind turbines has become quite common over the last few years. DFIG wind turbine is an integrated part of distributed generation system. This paper presents a Fuzzy based controller SMES unit in DFIG for improving the ac output on grid side. The excitation system is composed of the rotor-side converter, the grid-side converter, the dc chopper and the superconducting magnet. The superconducting magnet is connected with the dc side of the two converters, which can handle the active power transfer with the rotor of DFIG and the power grid independently, even thou Sutton small fluctuations are occur in active power on AC side. For smoothening the AC output power waveform a Fuzzy based controller is introduced in SMES controller unit, which implemented using simulation developed in MATLAB/ SIMULINK 7.2 version. The model of the FUZZY controlled SMES based excitation system for DFIG is established, and the simulation tests are performed to evaluate the system performance.
H-GA-PSO Method for Tuning of a PID Controller for a Buck-Boost Converter Modeled with a New Method of Signal Flow Graph Technique Leila Mohammadian; Ebrahim Babaei; Mohammad Bagher Bannae Sharifian
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (125.652 KB) | DOI: 10.11591/eei.v4i1.310

Abstract

In this paper, a new method of signal flow graph technique and Mason’s gain formula are applied for extracting the model and transfer functions from control to output and from input to output of a buck-boost converter. In order to investigate necessity of a controller for the converter with assumed parameters, the frequency and time domain analysis is done and the open loop system characteristics are verified. In addition, the needed closed loop controlled system specifications are determined. Moreover, designing a controller for the mentioned converter system based on the extracted model is discussed. For this purpose, a proportional-integral-derivative (PID) controller is designed and the hybrid of genetic algorithm (GA) and particle swarm optimization (PSO), called H-GA-PSO method is used for tuning of the PID controller. Finally, the simulation results are used to show the performance of the proposed modeling and regulation methods.
A Bio-Crypto Protocol for Password Protection Using ECC Srinivasan Nagaraj; G.V.S.P. Raju; G Apparao; B. Kishore
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (363.35 KB) | DOI: 10.11591/eei.v4i1.318

Abstract

In  information  security the  following security parameters like, integrity , non repudiation and confidentiality , authentication   must be satisfied.  To avoid thievery of organization resources  it needs be secured in more efficient way  and there is always demand  for different levels of security attacks include virus , brute force and Eveadroper  in business that  organizations make use of voice biometrics an attractive low-cost. Voice biometrics is the  cheapest  among the  other biometrics and used all levels for management to buy readily available metric and it is the way of  identifying individuals remotely  with high level of accuracy . In this work, we have been designed a  new  password- authentication approach  that provides security  using voice biometrics for authentication and uses the device  itself into an authenticator which uses  voice itself as its passwords and we are primarily interested in keys that can be temporally reproduced on the same device from the same user’s voice. Public and private keys are generated  randomly from the user's voice  and stored in the voice file(.wav).This Method uses voice recognition , include the operation of  register( recording feature ) or voice prints  and  storing of one or more voice passwords into the  database. It uses ECDSA to perform the authentication process that matching the  voice sample  with the database. The recognition, entity makes the database  to decide that  the sample is matched to perform an operation or not. Our proposed approach  generates cryptographic keys from voice input itself and this algorithm developed an adhoc basis. It can effectively defend  attacks specially brute force attack in system networks.
Control of Indirect Matrix Converter by Using Improved SVM Method Lavanya Nannapaneni; M Venu Gopala Rao
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (312.144 KB) | DOI: 10.11591/eei.v4i1.311

Abstract

A novel space vector modulation (SVM) method for an indirect matrix converter (IMC) is used to reduce the common -mode voltage (CMV) in the output. The process of selecting required active vectors and to describe the switching sequence in the inverter stage of the IMC is explained in this paper. This novel SVM method used to decrease the peak -to-peak amplitude voltage of CMV without using any external hardware. The other advantage of this SVM method is to reduce the total harmonic distortion of line-to-line output voltage. This new modulation technique is easily implemented through simulation and its results are used to demonstrate the improved performance of the input/output waveforms.
Machine model based Speed Estimation Schemes for Speed Encoderless Induction Motor Drives: A Survey Mohan Krishna.S; Febin Daya.J.L
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (245.615 KB) | DOI: 10.11591/eei.v4i1.303

Abstract

Speed Estimation without speed sensors is a complex phenomenon and is overly dependent on the machine parameters. It is all the more significant during low speed or near zero speed operation. There are several approaches to speed estimation of an induction motor. Eventually, they can be classified into two types, namely, estimation based on the machine model and estimation based on magnetic saliency and air gap space harmonics. This paper, through a brief literature survey, attempts to give an overview of the fundamentals and the current trends in various machine model based speed estimation techniques which have occupied and continue to occupy a great amount of research space.
Evaluating the Radiation and Temperature Effect on Photovoltaic Systems Sobhan Dorahaki
Bulletin of Electrical Engineering and Informatics Vol 4, No 1: March 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (243.913 KB) | DOI: 10.11591/eei.v4i1.305

Abstract

One of the best ways to identify and design a system is simulating and to achieve this goal, we use simulation software such as MATLAB Simulink. In this study, the relations ruling photovoltaic is described. Then, on the relations basis, a photovoltaic system is simulated in MATLAB software. After photovoltaic system simulation, regardless the specific geographic area, radiation and temperature effect on photovoltaic system is generally simulated. Finally, with regard to radiation and temperature values effect on, it was concluded that we overlook the temperature effect than radiation effect on photovoltaic system designing. It certainly does not mean overlooking the temperature effect. It means a low-effect power changes per temperature changes against radiation.

Page 1 of 1 | Total Record : 10