Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (136)
  • Open Access

    ARTICLE

    An Efficient MPPT Tracking in Solar PV System with Smart Grid Enhancement Using CMCMAC Protocol

    B. Jegajothi1,*, Sundaram Arumugam2, Neeraj Kumar Shukla3, I. Kathir4, P. Yamunaa5, Monia Digra6

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2417-2437, 2023, DOI:10.32604/csse.2023.038074

    Abstract Renewable energy sources like solar, wind, and hydro are becoming increasingly popular due to the fewer negative impacts they have on the environment. Because, Since the production of renewable energy sources is still in the process of being created, photovoltaic (PV) systems are commonly utilized for installation situations that are acceptable, clean, and simple. This study presents an adaptive artificial intelligence approach that can be used for maximum power point tracking (MPPT) in solar systems with the help of an embedded controller. The adaptive method incorporates both the Whale Optimization Algorithm (WOA) and the Artificial Neural Network (ANN). The WOA… More >

  • Open Access

    ARTICLE

    Computing and Implementation of a Controlled Telepresence Robot

    Ali A. Altalbe1,2,*, Aamir Shahzad3, Muhammad Nasir Khan4

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1569-1585, 2023, DOI:10.32604/iasc.2023.039124

    Abstract The development of human-robot interaction has been continuously increasing for the last decades. Through this development, it has become simpler and safe interactions using a remotely controlled telepresence robot in an insecure and hazardous environment. The audio-video communication connection or data transmission stability has already been well handled by fast-growing technologies such as 5G and 6G. However, the design of the physical parameters, e.g., maneuverability, controllability, and stability, still needs attention. Therefore, the paper aims to present a systematic, controlled design and implementation of a telepresence mobile robot. The primary focus of this paper is to perform the computational analysis… More >

  • Open Access

    ARTICLE

    Enhanced Perturb and Observe Control Algorithm for a Standalone Domestic Renewable Energy System

    N. Kanagaraj1,*, Obaid Aldosari1, M. Ramasamy2, M. Vijayakumar2

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2291-2306, 2023, DOI:10.32604/iasc.2023.039101

    Abstract The generation of electricity, considering environmental and economic factors is one of the most important challenges of recent years. In this article, a thermoelectric generator (TEG) is proposed to use the thermal energy of an electric water heater (EWH) to generate electricity independently. To improve the energy conversion efficiency of the TEG, a fuzzy logic controller (FLC)-based perturb & observe (P&O) type maximum power point tracking (MPPT) control algorithm is used in this study. An EWH is one of the major electricity consuming household appliances which causes a higher electricity price for consumers. Also, a significant amount of thermal energy… More >

  • Open Access

    ARTICLE

    Improved Control in Single Phase Inverter Grid-Tied PV System Using Modified PQ Theory

    Nur Fairuz Mohamed Yusof1, Dahaman Ishak2, Muhammad Ammirrul Atiqi Mohd Zainuri3,*, Muhammad Najwan Hamidi2, Zuhair Muhammed Alaas4, Mohamed Mostafa Ramadan Ahmed5

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2441-2457, 2023, DOI:10.32604/iasc.2023.037778

    Abstract Grid-connected reactive-load compensation and harmonic control are becoming a central topic as photovoltaic (PV) grid-connected systems diversified. This research aims to produce a high-performance inverter with a fast dynamic response for accurate reference tracking and a low total harmonic distortion (THD) even under nonlinear load applications by improving its control scheme. The proposed system is expected to operate in both stand-alone mode and grid-connected mode. In stand-alone mode, the proposed controller supplies power to critical loads, alternatively during grid-connected mode provide excess energy to the utility. A modified variable step incremental conductance (VS-InCond) algorithm is designed to extract maximum power… More >

  • Open Access

    ARTICLE

    Determination of AVR System PID Controller Parameters Using Improved Variants of Reptile Search Algorithm and a Novel Objective Function

    Baran Hekimoğlu*

    Energy Engineering, Vol.120, No.7, pp. 1515-1540, 2023, DOI:10.32604/ee.2023.029024

    Abstract Two novel improved variants of reptile search algorithm (RSA), RSA with opposition-based learning (ORSA) and hybrid ORSA with pattern search (ORSAPS), are proposed to determine the proportional, integral, and derivative (PID) controller parameters of an automatic voltage regulator (AVR) system using a novel objective function with augmented flexibility. In the proposed algorithms, the opposition-based learning technique improves the global search abilities of the original RSA algorithm, while the hybridization with the pattern search (PS) algorithm improves the local search abilities. Both algorithms are compared with the original RSA algorithm and have shown to be highly effective algorithms for tuning the… More > Graphic Abstract

    Determination of AVR System PID Controller Parameters Using Improved Variants of Reptile Search Algorithm and a Novel Objective Function

  • Open Access

    ARTICLE

    Machine Learning for Hybrid Line Stability Ranking Index in Polynomial Load Modeling under Contingency Conditions

    P. Venkatesh1,*, N. Visali2

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 1001-1012, 2023, DOI:10.32604/iasc.2023.036268

    Abstract In the conventional technique, in the evaluation of the severity index, clustering and loading suffer from more iteration leading to more computational delay. Hence this research article identifies, a novel progression for fast predicting the severity of the line and clustering by incorporating machine learning aspects. The polynomial load modelling or ZIP (constant impedances (Z), Constant Current (I) and Constant active power (P)) is developed in the IEEE-14 and Indian 118 bus systems considered for analysis of power system security. The process of finding the severity of the line using a Hybrid Line Stability Ranking Index (HLSRI) is used for… More >

  • Open Access

    ARTICLE

    Sea Turtle Foraging Optimization-Based Controller Placement with Blockchain-Assisted Intrusion Detection in Software-Defined Networks

    Sultan Alkhliwi*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4735-4752, 2023, DOI:10.32604/cmc.2023.037141

    Abstract Software-defined networking (SDN) algorithms are gaining increasing interest and are making networks flexible and agile. The basic idea of SDN is to move the control planes to more than one server’s named controllers and limit the data planes to numerous sending network components, enabling flexible and dynamic network management. A distinctive characteristic of SDN is that it can logically centralize the control plane by utilizing many physical controllers. The deployment of the controller—that is, the controller placement problem (CPP)—becomes a vital model challenge. Through the advancements of blockchain technology, data integrity between nodes can be enhanced with no requirement for… More >

  • Open Access

    ARTICLE

    High Efficient Reconfigurable and Self Testable Architecture for Sensor Node

    G. Venkatesan1,*, N. Ramadass2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3979-3991, 2023, DOI:10.32604/csse.2023.031627

    Abstract Sensor networks are regularly sent to monitor certain physical properties that run in length from divisions of a second to many months or indeed several years. Nodes must advance their energy use for expanding network lifetime. The fault detection of the network node is very significant for guaranteeing the correctness of monitoring results. Due to different network resource constraints and malicious attacks, security assurance in wireless sensor networks has been a difficult task. The implementation of these features requires larger space due to distributed module. This research work proposes new sensor node architecture integrated with a self-testing core and cryptoprocessor… More >

  • Open Access

    ARTICLE

    An Improvement in Power Quality and By-Product of the Run-Off River Micro Hydro Power Plant

    Ignatius Riyadi Mardiyanto1, Jangkung Raharjo2,*, Sri Utami1, Wahyu Budi Mursanto1, Agoeng Hardjatmo Rahardjo1

    Energy Engineering, Vol.120, No.6, pp. 1295-1305, 2023, DOI:10.32604/ee.2023.027756

    Abstract Utilization of Micro Hydro Power Plant at the Gunung Halu case study type run-off the river is a household use only in the afternoon, around 5 pm until bedtime at about 10 pm. Therefore, more than 75% of the energy is lost. This case study lost power which can be used as a by-product, such as for drying coffee beans. In this case study, a design was carried out to obtain by-products and improve power quality in the electrical system. In addition, they complain about the poor quality of power controlled by frequency using Triac-Based Electronic Dummy Load Control. The… More > Graphic Abstract

    An Improvement in Power Quality and By-Product of the Run-Off River Micro Hydro Power Plant

  • Open Access

    ARTICLE

    A Data Driven Security Correction Method for Power Systems with UPFC

    Qun Li, Ningyu Zhang*, Jianhua Zhou, Xinyao Zhu, Peng Li

    Energy Engineering, Vol.120, No.6, pp. 1485-1502, 2023, DOI:10.32604/ee.2023.022856

    Abstract The access of unified power flow controllers (UPFC) has changed the structure and operation mode of power grids all across the world, and it has brought severe challenges to the traditional real-time calculation of security correction based on traditional models. Considering the limitation of computational efficiency regarding complex, physical models, a data-driven power system security correction method with UPFC is, in this paper, proposed. Based on the complex mapping relationship between the operation state data and the security correction strategy, a two-stage deep neural network (DNN) learning framework is proposed, which divides the offline training task of security correction into… More >

Displaying 11-20 on page 2 of 136. Per Page