Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,939 Article Results

Comparative analysis of wind speed prediction: enhancing accuracy using PCA and linear regression vs. GPR, SVR, and RNN

10.11591/ijpeds.v16.i1.pp538-545
Somasundaram Deepa , Jayanthi Arumugam , Raguraman Purushothaman , D. Nageswari , Lingisetty Rajasekhara Babu
For power systems with significant wind power integration to operate in an efficient and dependable manner, wind speed prediction accuracy is crucial. Factors such as temperature, humidity, air pressure, and wind intensity heavily influence wind speed, adding complexity to the prediction process. This paper introduces a method for wind speed forecasting that utilizes principal component analysis (PCA) to reduce dimensionality and linear regression for the prediction model. PCA is employed to identify key features from the extensive meteorological data, which are subsequently used as inputs for the Linear Regression model to estimate wind speed. The proposed approach is tested using publicly available meteorological data, focusing on variables such as temperature, air pressure, and humidity. Popular models like recurrent neural networks (RNN), support vector regression (SVR), and Gaussian process regression (GPR) are used to compare its performance. Evaluation metrics such as root mean square error (RMSE) and R² are used to measure effectiveness. Results show that the PCA combined with Linear Regression model yields more accurate predictions, with an RMSE of 94.11 and R² of 0.9755, surpassing the GPR, SVR, and RNN models.
Volume: 16
Issue: 1
Page: 538-545
Publish at: 2025-03-01

FPGA implementation of artificial neural network for PUF modeling

10.11591/ijres.v14.i1.pp200-207
Mohd Syafiq Mispan , Mohammad Haziq Ishak , Aiman Zakwan Jidin , Haslinah Mohd Nasir
Field-programmable gate array (FPGA) is a prominent device in developing the internet of things (IoT) application since it offers parallel computation, power efficiency, and scalability. The identification and authentication of these FPGAbased IoT applications are crucial to secure the user-sensitive data transmitted over IoT networks. Physical unclonable function (PUF) technology provides a great capability to be used as device identification and authentication for FPGAbased IoT applications. Nevertheless, conventional PUF-based authentication suffers a huge overhead in storing the challenge-response pairs (CRPs) in the verifier’s database. Therefore, in this paper, the FPGA implementation of the Arbiter-PUF model using an artificial neural network (ANN) is presented. The PUF model can generate the CRPs on-the-fly upon the authentication request (i.e., by a prover) to the verifier and eliminates huge storage of CRPs database in the verifier. The architecture of ANN (i.e., Arbiter-PUF model) is designed in Xilinx system generator and subsequently converted into intellectual property (IP). Further, the IP is programmed in Xilinx Artix-7 FPGA with other peripherals for CRPs generation and validation. The findings show that the Arbiter-PUF model implementation on FPGA using the ANN technique achieves approximately 98% accuracy. The model consumes 12,196 look-up tables (LUTs) and 67 mW power in FPGA.
Volume: 14
Issue: 1
Page: 200-207
Publish at: 2025-03-01

Metaheuristic algorithms for parameter estimation of DC servo motors with quantized sensor measurements

10.11591/ijape.v14.i1.pp101-108
Debani Prasad Mishra , Sandip Ranjan Behera , Arul Kumar Dash , Prajna Jeet Ojha , Surender Reddy Salkuti
Manufacturing, aviation, and robotics have increased servo motor use due to their precision, reliability, and adaptability in various applications. This study compares three metaheuristic techniques for servo motor model parameter estimation with sensor measurement quantization, focusing on their accuracy and efficiency. Armature resistance, back electromotive force (EMF) constant, torque constant, coil inductance, friction coefficient, and rotor-load inertia are crucial to servo motor behavior prediction, significantly impacting overall system performance. Each approach was rigorously tested and analyzed to evaluate its effectiveness in predicting servo motor characteristics. The results revealed that particle swarm optimization and the firefly algorithm delivered comparable performance, particularly excelling in scenarios where sensor measurement quantization introduced noise or imprecision in the data. These methods demonstrated strong resilience and accuracy under such challenging conditions. In contrast, the genetic algorithm did not perform as well, falling short when compared to the other two techniques in handling noisy or imprecise data, indicating its relative inefficiency in such environments. These findings give servo motor designers and engineers across industries a powerful tool for performance prediction.
Volume: 14
Issue: 1
Page: 101-108
Publish at: 2025-03-01

DTC analysis of DCMLI driven PMSM-SVM drive

10.11591/ijape.v14.i1.pp235-243
Rakesh G. Shriwastava , Pravin B. Pokle , Ajay M. Mendhe , Nitin Dhote , Rajendra M. Rewatkar , Rahul Mapari , Ranjit Dhunde , Hemant R. Bhagat Patil , Ramesh Pawase
The paper focuses on a comparative analysis of direct torque control (DTC) space vector modulation (SVM) based permanent magnet synchronous motor (PMSM) drive. This comparative analysis is based on a conventional inverter and a 3-level dual-cell modular multilevel inverter (DCMLI) using the SVM technique using MATLAB simulation. The present DTC-PMSM drive consists of flux and torque hysteresis comparators and has a problem of switching frequency and torque ripple. The problems are solved by using SVM to provide more inverter voltage and it compensates for torque and flux error in a DTC. A reference voltage space vector is calculated every time using the algorithm on the basic of torque error and stator flux angle. It was proposed to control torque, torque angle, and stator flux in DTC-PMSM. From the detailed comparison, the DTC-DCMLI PMSM drive has an exact solution of problem-solving of switching frequency and torque ripple due to less distorted output. Proposed drives can be applicable for hardware implementation in automotive applications.
Volume: 14
Issue: 1
Page: 235-243
Publish at: 2025-03-01

Optimizing standalone dual PV systems with four-port converter technology

10.11591/ijape.v14.i1.pp81-89
Sharma Sha , Rajambal Kalayanasundaram
This paper analyses the four-port converter (FPC) based PV system. The discussed FPC is developed for hybrid energy sources (HES) with the merits of a single converting stage, fewer switches, and simple topology. By tapping two source ports from the midway of its two switching legs, the FPC presented in this work is developed from the basic full bridge converter (FBC). The pulses are produced using the phase angle control with pulse width modulation (PPAS) technique. Different modes of operation of the FPC are analyzed elaborately to give an insight into its topology. To efficiently manage power distribution among the ports and regulate their voltage, two key control variables have been utilized: duty ratio and phase angle. An in-depth presentation is provided on the design and modeling of a four-port converter. It provides autonomous management of power allocation among terminals and regulation of load voltage. Finally, simulated key waveforms of the FPC and simulation results to demonstrate the decoupled regulation of power sharing and load voltage of a PV system under varying input and output conditions are presented. The experimental prototype of the four-port converter results is discussed and presented in detail.
Volume: 14
Issue: 1
Page: 81-89
Publish at: 2025-03-01

Machine learning model approach in cyber attack threat detection in security operation center

10.11591/csit.v6i1.p80-90
Muhammad Ajran Saputra , Deris Stiawan , Rahmat Budiarto
The evolution of technology roles attracted cyber security threats not only compromise stable technology but also cause significant financial loss for organizations and individuals. As a result, organizations must create and implement a comprehensive cybersecurity strategy to minimize further loss. The founding of a cybersecurity surveillance center is one of the optimal adopted strategies, known as security operation center (SOC). The strategy has become the forefront of digital systems protection. We propose strategy optimization to prevent or mitigate cyberattacks by analyzing and detecting log anomalies using machine learning models. This study employs two machine learning models: the naïve Bayes model with multinomial, Gaussian, and Bernoulli variants, and the support vector machine (SVM) model with radial basis function (RBF), linear, polynomial, and sigmoid kernel variants. The hyperparameters in both models are then optimized. The models with optimized hyperparameters are subsequently trained and tested. The experimental results indicate that the best performance is achieved by the RBF kernel SVM model, with an accuracy of 79.75%, precision of 80.8%, recall of 79.75%, and F1-score of 80.01%; and the Gaussian naïve Bayes model, with an accuracy of 70.0%, precision of 80.27%, recall of 70.0%, and F1-score of 70.66%. Overall, both models perform relatively well and are classified in the very good category (75%‒89%).
Volume: 6
Issue: 1
Page: 80-90
Publish at: 2025-03-01

Solar photovoltaic system fed water pumping system using BLDC motor with single input and multiple output converter

10.11591/ijape.v14.i1.pp74-80
Kommera Chaitanya , Arjyadhara Pradhan , Babita Panda
In recent times energy based on renewable energy sources is a good long-term alternative compared with traditional fossil fuel energy sources solar photovoltaic model-based irrigation water pump systems have gained more popularity. The one-input and multi-output converters are focused on BLDC motor drive-based solar photovoltaic with water pump. To model one input and multiple output converter components are connected viz it achieves tracking purpose and BLDC drive soft starting. The one-input and multiple-output converter exhibits the features of all converters and remarkably appears with the converter in the application of solar photovoltaic systems. It describes performance under varying environmental and inspects the BLDC motor effective with the suggested single input and multiple output converter for solar photovoltaic with a water pump with 95% efficacy and the price is USD 0.6/W. Test results have confirmed the BLDC motor suitability for solar photovoltaic with water pump employing MATLAB Toolbox followed by the test result verification. It is simply developed for rural areas because it is low cost, simple, and low maintenance.
Volume: 14
Issue: 1
Page: 74-80
Publish at: 2025-03-01

Analysis of the soft switching modes for energy loss measurement of high frequency closed-loop boost converter

10.11591/ijape.v14.i1.pp64-73
Ajoya Kumar Pradhan , Sarita Samal , Prasanta Kumar Barik , Smrutiranjan Nayak
This manuscript explains the analysis of the soft switching technology to measure the energy loss of high-frequency closed loop boost converter with zero-current switching (ZCS) and zero-voltage switching (ZVS) techniques. To get these attributes, the use of soft power converters that utilize soft switching techniques is essential. This paper examines the ZCS/ZVS AC/DC converter design, used in high-power systems for renewable energy and battery charging. This converter architecture ensures semiconductor switches turn on and off at zero voltage and current. It smooths rectifier diodes, reducing switching and reverse recovery losses. It has better power quality, efficiency, and input power factor. Practical study has been done to verify the converter's theoretical analysis. Empirical research shows gentle switching enhances system efficiency. Energy losses are reduced by 26% while turning on and 20% when turning off compared to the ZVS and ZCS. The prototype converter is built to corroborate simulation results. Compared to ZVS and ZCS, switching losses are lower and efficiency decline is modest across the operating range. This shows that the simulation and experimental results are consistent.
Volume: 14
Issue: 1
Page: 64-73
Publish at: 2025-03-01

Comparison of dual isolated converters with flyback converters for bidirectional energy transfer

10.11591/ijape.v14.i1.pp55-63
Rahul G. Mapari , Kishor Bhangale , Sunil Somnath Kadlag , Rakesh Shriwastava
This article demonstrates a proposed technique for improving single-stage rectifiers' power factor (PF) and controlling the load voltage in response to grid voltage and load changes. To alleviate the above problem, this article offers a novel bi-directional continuous switching pulse width modulation (CSPWM) and sinusoidal pulse width modulation (SPWM) based converter that can improve PF and reduce harmonics. This converter is evaluated based on two cases, Case I: CSPWM-based rectification and SPWM-based inversion scheme, and Case II: Rectification and inversion, both operations using the SPWM scheme. The proposed control scheme uses two Bi-directional IGBTs and two diodes, which are bridgeless, do not need a transformer, and are free from the output current sensor. The suggested scheme is simulated using MATLAB/Simulink and implemented on DSPic33FJ64mc802 platforms to validate the effectiveness of the proposed approach using two cases for a 1 KW system. The suggested control scheme provides improved PF, good voltage regulation, and depreciation in harmonics and total harmonic distortions (THD) compared to existing systems that enhance converter performance.
Volume: 14
Issue: 1
Page: 55-63
Publish at: 2025-03-01

Design and control of a grid-connected solar-wind hybrid sustainable energy generation systems using DFIG

10.11591/ijape.v14.i1.pp188-201
G. B. Arjun Kumar , M. Balamurugan , K. N. Sunil Kumar , Ravi Gatti
An optimal control of a grid-connected solar-wind hybrid scheme for the electricity generation system by utilizing both wind and solar renewable energy in a remote region that is inaccessible to the electricity grid. The control and assessment of a hybrid sustainable energy generation system power system that supplies three-phase, four-line loads as well as a battery array are presented in this research work. Wind energy conversion system (WECS) is comprised of a doubly-fed induction generator (DFIG) and two pulse width modulation (PWM) voltage source converters, namely the grid side converter (GSC) and the rotor side converter (RSC), which are linked together via a DC-link and are equipped with a technique for maximum power point tracking (MPPT). The grid voltage-oriented control strategy is employed to provide a consistent DC-bus voltage for the GSC and to regulate the reactive power on the power grid. Even the difference in voltage and frequency can be controlled with this novel strategy. The stator voltage-oriented vector technique is designed in the RSC control strategy, resulting in effective regulation of reactive and active power at the stator as well as an MPPT obtained by controlling the optimal torque. The hybrid sustainable energy generating system (HSEGS) simulation model is designed to have a capacity of 5 kW, and its efficiency is evaluated using the MATLAB/ Simulink platform and demonstrated in a variety of circumstances.
Volume: 14
Issue: 1
Page: 188-201
Publish at: 2025-03-01

Detection of android malware with deep learning method using convolutional neural network model

10.11591/csit.v6i1.p68-79
Reza Maulana , Deris Stiawan , Rahmat Budiarto
Android malware is an application that targets Android devices to steal crucial data, including money or confidential information from Android users. Recent years have seen a surge in research on Android malware, as its types continue to evolve, and cybersecurity requires periodic improvements. This research focuses on detecting Android malware attack patterns using deep learning and convolutional neural network (CNN) models, which classify and detect malware attack patterns on Android devices into two categories: malware and non-malware. This research contributes to understanding how effective the CNN models are by comparing the ratio of data used with several epochs. We effectively use CNN models to detect malware attack patterns. The results show that the deep learning method with the CNN model can manage unstructured data. The research results indicate that the CNN model demonstrates a minimal error rate during evaluation. The comparison of accuracy, precision, recall, F1 Score, and area under the curve (AUC) values demonstrates the recognition of malware attack patterns, reaching an average of 92% accuracy in data testing. This provides a holistic understanding of the model's performance and its practical utility in detecting Android malware.
Volume: 6
Issue: 1
Page: 68-79
Publish at: 2025-03-01

Power of analytic tools in Oxygen Forensic® Detective based on NIST cybersecurity framework

10.11591/csit.v6i1.p8-19
Tole Sutikno , Iqbal Busthomi
The National Institute of Standards and Technology (NIST) cybersecurity framework is a systematic approach for assessing and improving cybersecurity procedures in digital investigations. Oxygen Forensic® Detective is a digital forensic software that integrates multiple analytic tools to assist investigators in extracting valuable insights from digital evidence. The analytic tools, including timeline, social graph, image categorization, facial categorization, maps, data search, key evidence, optical character recognition, statistics, and translation, assist investigators in thoroughly analyzing digital artifacts, establishing connections, and accurately classifying images with precision and effectiveness. By incorporating these analytical resources into Oxygen Forensic® Detective, a comprehensive strategy is established to effectively combat cyber threats. The NIST cybersecurity framework is incorporated into the tool, offering a methodical approach to identifying and reducing cybersecurity risks. Law enforcement agencies can enhance the productivity and effectiveness of their forensic methodologies by implementing these advanced technologies. This can result in successful prosecutions and improved cybersecurity practices.  Overall, the utilization of analytical tools in criminological inquiries has experienced a substantial rise in the contemporary digital era.
Volume: 6
Issue: 1
Page: 8-19
Publish at: 2025-03-01

Optimal control of the UPFC for the stability of electrical networks

10.11591/ijape.v14.i1.pp180-187
Houria Ababsia , Djalel Dib , Abdelghani Djeddi
The unified power flow controller (UPFC) is a crucial element in contemporary power systems, specifically engineered to augment the manageability and adaptability of power transmission in electrical networks. UPFC provides instantaneous modifications to voltage magnitude, phase angle, and line impedance by using sophisticated power electronics and control algorithms. This research examines the function of the unified power flow controller (UPFC) in enhancing the power quality of electrical networks. The UPFC's capacity to dynamically regulate and optimize power flow assists in minimizing voltage fluctuations, decreasing transmission line losses, and improving system stability. In addition, UPFC effectively addresses problems such as voltage sags, swells, and flickers, hence enhancing the resilience and dependability of the power supply. This research highlights the importance of unified power flow control (UPFC) technology in improving system performance and power quality of electrical networks via a thorough examination of its applications. This article presents research on the performance of the unified power flow controller (UPFC) device in a network, specifically focusing on the use of PID and FO-PID controllers for regulating active and passive power.
Volume: 14
Issue: 1
Page: 180-187
Publish at: 2025-03-01

Performance analysis of conventional multilevel inverter driven PMSM drive in EV applications

10.11591/ijape.v14.i1.pp37-45
Rakesh G. Shriwastava , Pravin B. Pokle , Ajay M. Mendhe , Nitin Dhote , Rajendra M. Rewatkar , Rahul Mapari , Ranjit Dhunde , Hemant R. Bhagat Patil , Ramesh Pawase
This paper describes the simulation and hardware analysis of a two-level inverter-driven permanent magnet synchronous motor (PMSM) drive in EV applications. The design of various sections of PMSM Drive is discussed in detail. This proposed work is based on the voltage source converter (VSC) fed four-pole, 373 W. This paper highlights the design and implementation using a microcontroller of (PMSM) drive for various operating conditions. The experimental results show that the control and power circuit used in the design can achieve excellent and consistent speed performance. The performance along with test results of the speed and load variation of the PMSM drive is studied for steady-state conditions. The performance of the motor has been checked by increasing the inverter frequency with the speed of the motor and also keeping the frequency remains constant by varying the load and speed. Hardware analysis indicates the improved performance of the motor and the drive. It has good speed and torque responses and is suitable for EPS applications.
Volume: 14
Issue: 1
Page: 37-45
Publish at: 2025-03-01

Secure e-voting system using Schorr's zero-knowledge identification protocol

10.11591/csit.v6i1.p20-27
Indah Octaviani Laleb , Daniel M.D.U. Kasse
In today's era of technological progress, the electoral system has changed significantly with the introduction of electronic voting (e-voting). The traditional voting system poses many vulnerabilities to manipulation, potential human error, and problems with voter privacy. These limitations can lead to reduced trust and participation in elections. E-voting has emerged to address this issue, aiming to improve the convenience, security, and privacy of voters. E-voting systems are evaluated on accuracy, security, privacy, and transparency; however, ensuring voter privacy while maintaining these principles remains a significant challenge. A potential solution to improving privacy in e-voting is Schorr's zero-knowledge identification protocol. This protocol allows voters to confirm their identity without revealing personal information, maintaining voter privacy throughout the process. By implementing these protocols, the e-voting system can strengthen security and privacy, making elections more transparent and trustworthy. As technology evolves, adopting solutions like Schorr's zero-knowledge identification protocol can help e-voting systems meet the growing demand for safe, fair, and private elections.
Volume: 6
Issue: 1
Page: 20-27
Publish at: 2025-03-01
Show 247 of 1996

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration