The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a new approach with muller method for solving profit based unit commitment (PBUC). In Deregulated environment, the generation companies (GENCOs) schedule their generators to maximize their profit rather than satisfying the power demand. The PBUC problem is solved by the proposed approach in two stages. Initially, the information of committed units is obtained by a simple approach...
In this paper we propose a combined MAC protocol for wireless ad hoc networks that overcome some of the limitations of basic IEEE 802.11b MAC protocol. The proposed protocol involves the concept of cooperation along with persistence to avoid the negative effects caused by multi rate modulation employed by the 802.11b. Unlike basic MAC protocol, the proposed MAC also provides service distinction to...
Multimedia applications are becoming even more demanding. Hence, the next generation codecs invariably should be floating point compliant. With the field programmable gate arrays (FPGAs) technology getting mature, more and more signal processing applications are finding their niche in FPGAs. Current generation FPGAs have got hardware multipliers. However, these are general purpose multipliers and...
Most of CDMA wireless networks require the use of orthogonal variable spreading factor (OVSF) codes. OVSF codes are the limited resources at the downlink of CDMA networks. Code blocking is the major limitation of the OVSF codes. The efficient single code assignment scheme named dynamic code assignment with region division is proposed to minimize the code blocking. In the proposed scheme, the OVSF...
Ordinary digital signatures have an inherent weakness: if the secret key is leaked, then all signatures, even the ones generated before the leak, are no longer trustworthy. Forward-secure digital signatures address this weakness, they ensure that the past signatures remain secure even if the current secret key is leaked. Following the notion of aggregate signatures introduced by Boneh et al, which...
A new object-oriented design (OOD) for unbalanced distribution system is proposed and employed for developing short circuit analysis software. The difficulty associated with the procedure-oriented implementation of short circuit analysis program is overcome with a new object-oriented implementation. The purpose of using object-oriented methodology (OOM) for unbalanced distribution system is to achieve...
This paper presents a multi-signature scheme based on elliptic curve cryptography. The scheme is suitable for a group of members who are connected to one of the k interconnected communicating servers. Main beauty of the scheme is that the identity of the servers are also included into the group signature. Every members and communicating servers prove their authentication to each other during signing...
BLDC motors have been gaining attention from various industrial and household appliance manufacturers, because of its high efficiency, high power density and low maintenance cost. After many research and developments in the fields of magnetic materials and power electronics, their applications to electric drives have increased to a significant extent. In this paper, the modeling of Brushless DC motor...
Partial discharge (PD) is one of the main causes for eventual equipment failure and it occurs where the electric field exceeds the local dielectric strength of the insulation. The PD signal captured at UHF has many advantages. The finite difference time domain (FDTD) technique, which is a widely used electromagnetic computational method, has been used to model propagation PD discharges generated in...
Todaypsilas voice and data communication is mostly through mobile handsets. It has become increasingly important to range them. Ranging of these mobile phones has applications in handset power management, security and interestingly in optimal resource management. Mobile phone and the base station are constantly in touch with each other during voice or data transfer. Capturing of Transmit (Tx) and...
In this paper, an efficient method for computation of the DFT of a 2N - point real sequence by using DIT FFT with CORDIC based butterflies is presented. Most of the real world applications use long real valued sequences. By using FFT with CORDIC based butterflies, the space required on ROM and also the time required to perform the operation can be reduced. Further, to calculate the 2N - point DFT,...
The voltage flicker, a phenomenon of annoying light intensity fluctuation, caused by rapid change in industrial and domestic load such as electric arc furnaces (EAF), rolling mills, welding equipments and pumps operating periodically has been a major concern for supply utilities, electricity regulatory agencies and costumers. The FACTS devices like SVCpsilas, STATCOM and Custom Power devices like...
This paper introduces a novel variant of PSO called accelerated exploration particle swarm optimizer (AEPSO). The AEPSO algorithm select the particles that are far away from the global solution and accelerates them towards global optima with an exploration power to avoid the premature convergence. The performance comparisons such as search efficiency, quality of solution and algorithmic complexity...
In this paper the nonlinear average current control for a DC to DC buck converter is presented in both continuous conduction mode (CCM) and discontinuous conduction mode (DCM). The outer voltage controller uses a PI controller. In this control scheme, switch current is being sensed instead of inductor current. Average of inductor current, output voltage with line and load regulation is being controlled...
This paper presents an approach to obtain the optimal load flow solution using three different intelligent techniques such as particle swarm optimization (PSO), crazy particle swarm optimization (CPSO) and hybrid differential evolution (HDE) subject to various system constraints. The above optimization techniques have a capability to provide global optimal solution in problem domains where a complete...
This paper presents a novel approach for designing of generator excitation controllers using Interconnection and Damping Assignment Passivity Based Control (IDA-PBC) technique for a Single Machine Infinite Bus (SMIB) system that can also be directly used in a multi-machine environment. The generator system equations are modified by referencing the rotor angle with respect to the secondary of the transformer...
A generalized two-pass key agreement method, extending the Diffie Hellman algorithm to a completely generalized version is presented using the functional equations approach for function selection. Two functions, which satisfy the given set of conditions, are used to generate a public key, which is a function of private keys from both users without exchanging private keys publicly. Only two passes...
This paper presents multi-objective optimization approach for determining optimal location of distributed generators in deregulated electricity market. Distributed generators optimal location have been obtained in a most suitable zone which has been identified based on the variation of real power flow sensitivity and real power loss sensitivity. The multi-objective function consist maximization of...
Stabilizing power angle oscillation and torsional oscillation on the turbine-generator shaft using a linear feedback controller is investigated in this paper. In order to analysis the effect of this controller, a single machine connected through two transmission lines (HVAC and HVDC), to an infinite bus is used. To damp and control the oscillations in this system, after any change, a linear feedback...
The paper presents hardware efficient design of digital signal processing (DSP) based bit synchronizer and lock detector circuit for bi-phase data. The system is developed for one of the payload of Chandrayaan-I mission, and tested for its performance. Apart from the implementation, paper describes the mathematical modeling of bit synchronizer. The whole design is accommodated in a single Actel-1280...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.