Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043260
Rahimatu Hayatu Yahaya, Faruku Umar Ambursa
Over the years, Cloud Computing has offered many benefits such as providing services to end-users on demand. However, infrastructure as service providers is faced with the challenge of handling many end-users’ requests for virtual resources. In this regard, one of the key challenges of resource allocation is Virtual Machine Placement (VMP) problem. However, the dynamicity and uncertainty of Cloud platform and the unpredictable nature of the end-users’ requests have rendered the VMP problem more interesting. Recently, a two-phase Virtual Machine Placement scheme, combining the benefits of both online (dynamic) and offline (static) formulations were presented. The proposed scheme is based on a prediction-based triggering method used to determine when to trigger the VMP reconfiguration phase. However, the existing method leads to a less accurate prediction outcome, therefore, results in less optimal solution from the reconfiguration phase. This work proposes an enhanced two-phase Virtual Machine Placement strategy based on novel triggering method. The proposed triggering method considers Damped trend exponential smoothing method. An experimental evaluation is performed against the previous approach, considering 160 scenarios. The experimental results show that the proposed work achieved a minimum cost function when compared with the benchmark approach.
{"title":"Enhanced Two-Phase Virtual Machine Placement Scheme for Cloud Computing Datacenters","authors":"Rahimatu Hayatu Yahaya, Faruku Umar Ambursa","doi":"10.1109/ICECCO48375.2019.9043260","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043260","url":null,"abstract":"Over the years, Cloud Computing has offered many benefits such as providing services to end-users on demand. However, infrastructure as service providers is faced with the challenge of handling many end-users’ requests for virtual resources. In this regard, one of the key challenges of resource allocation is Virtual Machine Placement (VMP) problem. However, the dynamicity and uncertainty of Cloud platform and the unpredictable nature of the end-users’ requests have rendered the VMP problem more interesting. Recently, a two-phase Virtual Machine Placement scheme, combining the benefits of both online (dynamic) and offline (static) formulations were presented. The proposed scheme is based on a prediction-based triggering method used to determine when to trigger the VMP reconfiguration phase. However, the existing method leads to a less accurate prediction outcome, therefore, results in less optimal solution from the reconfiguration phase. This work proposes an enhanced two-phase Virtual Machine Placement strategy based on novel triggering method. The proposed triggering method considers Damped trend exponential smoothing method. An experimental evaluation is performed against the previous approach, considering 160 scenarios. The experimental results show that the proposed work achieved a minimum cost function when compared with the benchmark approach.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125857458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043287
Asim Balarabe Yazid, Moussa Mahamat Boukar, Salisu Ibrahim, Isa Muslu
Taking attendance is a day-to-day chore for every organization, human resources, and class teachers, traditionally people take attendance manually either by calling out names or allowing the user to sign the attendance sheets or clock in and out. The problem, however, people most likely sign the attendance on behalf of their colleagues that are absent. This makes the traditional method very vulnerable and may affect the integrity of the system. Researchers come up with different ideas and methods of minimizing fake attendance to improve efficiency in terms of integrity, time and cost. After reviewing the existing system’s strength and vulnerabilities, we are proposing a multi-factor authentication algorithm which makes use of QR code, GPS, and Facial recognition. The user will make use of their personal mobile phone. The research of this proposed is still ongoing, we are hoping the proposed technique can be applied to various attendance systems such as schools, universities, and organizations.
{"title":"Four-Factors Authentication Algorithm For Preventing Fake Attendance","authors":"Asim Balarabe Yazid, Moussa Mahamat Boukar, Salisu Ibrahim, Isa Muslu","doi":"10.1109/ICECCO48375.2019.9043287","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043287","url":null,"abstract":"Taking attendance is a day-to-day chore for every organization, human resources, and class teachers, traditionally people take attendance manually either by calling out names or allowing the user to sign the attendance sheets or clock in and out. The problem, however, people most likely sign the attendance on behalf of their colleagues that are absent. This makes the traditional method very vulnerable and may affect the integrity of the system. Researchers come up with different ideas and methods of minimizing fake attendance to improve efficiency in terms of integrity, time and cost. After reviewing the existing system’s strength and vulnerabilities, we are proposing a multi-factor authentication algorithm which makes use of QR code, GPS, and Facial recognition. The user will make use of their personal mobile phone. The research of this proposed is still ongoing, we are hoping the proposed technique can be applied to various attendance systems such as schools, universities, and organizations.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122232740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043212
Madina U.Alimanova, Nazym R.Akhmetova, Bek Bazatbekov, S. Yurchenko
Additive technology is a fast-growing industry that is currently available to everyone. While in developed countries they enjoy the full benefits of 3D printing, in Kazakhstan, not many people know about the charm of its use. 3D printing in the world has developed in various fields of use, from furniture in your home to a heart made of biomaterials. Interest in 3D printing in Kazakhstan is also growing, and based on the development scenario in the world, you can make an assumption of how it will develop. Reading this analysis will help to make a summarize what stage relative to other countries is a developing country like Kazakhstan is located.
{"title":"Comparison of the development of 3D printing in Kazakhstan relative to the world level","authors":"Madina U.Alimanova, Nazym R.Akhmetova, Bek Bazatbekov, S. Yurchenko","doi":"10.1109/ICECCO48375.2019.9043212","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043212","url":null,"abstract":"Additive technology is a fast-growing industry that is currently available to everyone. While in developed countries they enjoy the full benefits of 3D printing, in Kazakhstan, not many people know about the charm of its use. 3D printing in the world has developed in various fields of use, from furniture in your home to a heart made of biomaterials. Interest in 3D printing in Kazakhstan is also growing, and based on the development scenario in the world, you can make an assumption of how it will develop. Reading this analysis will help to make a summarize what stage relative to other countries is a developing country like Kazakhstan is located.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134441130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043208
Halima S. Yakubu, Sadiq Thomas, S. Hussein, V. Anye, Gokhan Koyunlu, Omotayo Oshiga
The Deep Space Antennas are essential in achieving communication over very large distances. However, the pointing accuracy of this antenna needs to be as precise as possible to enable effective communication with the satellite. Therefore, in this research, the pointing accuracy for a Deep Space Antenna using Fuzzy logic control technique is addressed. In this work, a fuzzy logic controller for the azimuth position control for deep space antenna was designed and simulated using Simulink and MATLAB. Furthermore, the result was compared to that of a PID controller for the same system and it shows that the fuzzy controller has a relatively better performance with 0 percent overshoot, a settling time of 7. 4146s, and a steady-state error of 0.004358. Therefore, the antenna will be able to track the satellite with ±0.004358 pointing accuracy.
{"title":"Azimuth Position Control for Deep Space Antenna using Fuzzy Logic Controller","authors":"Halima S. Yakubu, Sadiq Thomas, S. Hussein, V. Anye, Gokhan Koyunlu, Omotayo Oshiga","doi":"10.1109/ICECCO48375.2019.9043208","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043208","url":null,"abstract":"The Deep Space Antennas are essential in achieving communication over very large distances. However, the pointing accuracy of this antenna needs to be as precise as possible to enable effective communication with the satellite. Therefore, in this research, the pointing accuracy for a Deep Space Antenna using Fuzzy logic control technique is addressed. In this work, a fuzzy logic controller for the azimuth position control for deep space antenna was designed and simulated using Simulink and MATLAB. Furthermore, the result was compared to that of a PID controller for the same system and it shows that the fuzzy controller has a relatively better performance with 0 percent overshoot, a settling time of 7. 4146s, and a steady-state error of 0.004358. Therefore, the antenna will be able to track the satellite with ±0.004358 pointing accuracy.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116241479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043251
Jaafaru Sanusi, S. Idris, A. Aibinu, Steve A. Adeshina, A. Obadiah
Light Fidelity (LiFi) is a form of Visible Light Communication (VLC) that provides high-speed, bidirectional and fully networked wireless communication systems using low power Light Emitting Diodes (LEDs) light bulbs. As a reliable, license-free, high-speed and fully bi-directional wireless networked, LiFi is a potential technology to the Radio Frequency (RF) based systems and beyond mobile networks. As the spectrum utilized by Li-Fi does not overlap with that of used by the RF, a hybrid LiFi and wireless fidelity (WiFi) networks can provide high-speed data transmission that will improve the Quality of Service (QoS) and Quality Experience (Qoe) of the internet users. However, in such hybrid network systems, intermittent light-path blockages and user mobility may degrade the system throughput due to frequent handover among the networks. Different mechanisms to mitigate the frequent handover issue in hybrid LiFi and WiFi networks have been proposed in the literature. This paper provides an overview concept of hybrid handover in LiFi/WiFi networks. Furthermore, related works done in this field are also discussed. Finally, comparison between LiFi and WiFi technologies is also provided.
{"title":"Handover in Hybrid LiFi and WiFi Networks","authors":"Jaafaru Sanusi, S. Idris, A. Aibinu, Steve A. Adeshina, A. Obadiah","doi":"10.1109/ICECCO48375.2019.9043251","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043251","url":null,"abstract":"Light Fidelity (LiFi) is a form of Visible Light Communication (VLC) that provides high-speed, bidirectional and fully networked wireless communication systems using low power Light Emitting Diodes (LEDs) light bulbs. As a reliable, license-free, high-speed and fully bi-directional wireless networked, LiFi is a potential technology to the Radio Frequency (RF) based systems and beyond mobile networks. As the spectrum utilized by Li-Fi does not overlap with that of used by the RF, a hybrid LiFi and wireless fidelity (WiFi) networks can provide high-speed data transmission that will improve the Quality of Service (QoS) and Quality Experience (Qoe) of the internet users. However, in such hybrid network systems, intermittent light-path blockages and user mobility may degrade the system throughput due to frequent handover among the networks. Different mechanisms to mitigate the frequent handover issue in hybrid LiFi and WiFi networks have been proposed in the literature. This paper provides an overview concept of hybrid handover in LiFi/WiFi networks. Furthermore, related works done in this field are also discussed. Finally, comparison between LiFi and WiFi technologies is also provided.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116583512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043231
Mustapha Hafiz Bola, E. N. Onwuka, S. Zubair
Despite so many efforts made to forestall energy crisis in the past, the present-day energy problem is getting worse by day particularly in Africa. To overcome this situation, researchers are developing various energy efficient methods, among these methods, efficient power consumption is imperative. With the rise in power consumption in every part of the world and the subsequent amount of power theft, over usage of power, and unnecessary power wastage, it becomes obvious that electric power consumption in buildings need to be monitored and controlled. Efficient energy management will go a long way to help both the consumers and the power utility company and will positively impact the looming global energy crisis. The advent of Internet of Things (IoT) technology is advancing automation of systems by infusing intelligence into many processes. In this paper, a critical survey of IoT based automated energy management in buildings is presented. The paper reviewed various IoT applications in the area of building energy management and the recording of energy consumption data, which we consider very important in system planning and rehabilitation.
{"title":"An Efficient Energy Management in Buildings Using IoT – A Survey","authors":"Mustapha Hafiz Bola, E. N. Onwuka, S. Zubair","doi":"10.1109/ICECCO48375.2019.9043231","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043231","url":null,"abstract":"Despite so many efforts made to forestall energy crisis in the past, the present-day energy problem is getting worse by day particularly in Africa. To overcome this situation, researchers are developing various energy efficient methods, among these methods, efficient power consumption is imperative. With the rise in power consumption in every part of the world and the subsequent amount of power theft, over usage of power, and unnecessary power wastage, it becomes obvious that electric power consumption in buildings need to be monitored and controlled. Efficient energy management will go a long way to help both the consumers and the power utility company and will positively impact the looming global energy crisis. The advent of Internet of Things (IoT) technology is advancing automation of systems by infusing intelligence into many processes. In this paper, a critical survey of IoT based automated energy management in buildings is presented. The paper reviewed various IoT applications in the area of building energy management and the recording of energy consumption data, which we consider very important in system planning and rehabilitation.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123620803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043254
Sadiq Ahmad, A. Garko
it’s observed that most people and firms are migrating to the cloud, because the cloud is much cheaper and convenient. For some computer owners, finding enough storage space to hold all the data they acquired is a real challenge. Because of this people tend to buy a large quantity of data or larger space hard drives and still faced with storage space challenges. With this new technology of cloud computing, people are finding it much easier to buy a huge amount of space on the cloud, this cloud refers to saving data to an off-site storage system maintained by a third party. Because of all these the cloud users start thinking of the safety of their data stored on these servers managed by the third party in fear of Data Breach. In order to curtail this data breach and many data threats, information security is needed. Cryptography plays a major role in information security. To provide security to cloud storage user uses hybrid encryption instead of a single encryption algorithm. In this paper, a study of hybrid cryptography has been performed from 2015 to early 2019. Papers related to the problem were searched and about 20 were considered on the basis of filtering in this study. Of these, eight (8) are based on a user-friendly tabular survey and 12 are in-depth surveys. The main aim of this review paper is to provide more and more information to the new researchers, students in this field and also inexperienced in cryptography. The research gap identified are neglecting of user authentication and improper implementation of the hybrid algorithms.
{"title":"Hybrid Cryptography Algorithms in Cloud Computing: A Review","authors":"Sadiq Ahmad, A. Garko","doi":"10.1109/ICECCO48375.2019.9043254","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043254","url":null,"abstract":"it’s observed that most people and firms are migrating to the cloud, because the cloud is much cheaper and convenient. For some computer owners, finding enough storage space to hold all the data they acquired is a real challenge. Because of this people tend to buy a large quantity of data or larger space hard drives and still faced with storage space challenges. With this new technology of cloud computing, people are finding it much easier to buy a huge amount of space on the cloud, this cloud refers to saving data to an off-site storage system maintained by a third party. Because of all these the cloud users start thinking of the safety of their data stored on these servers managed by the third party in fear of Data Breach. In order to curtail this data breach and many data threats, information security is needed. Cryptography plays a major role in information security. To provide security to cloud storage user uses hybrid encryption instead of a single encryption algorithm. In this paper, a study of hybrid cryptography has been performed from 2015 to early 2019. Papers related to the problem were searched and about 20 were considered on the basis of filtering in this study. Of these, eight (8) are based on a user-friendly tabular survey and 12 are in-depth surveys. The main aim of this review paper is to provide more and more information to the new researchers, students in this field and also inexperienced in cryptography. The research gap identified are neglecting of user authentication and improper implementation of the hybrid algorithms.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126406846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this study, normal (healthy), pre-seizure and seizure states were analyzed using EEG data from BONN database. In this paper, we propose a new method of using SVM, KNN and Decision Tree for classification analysis in order to improve the detection accuracy of seizure. First, due to the presence of significant noise in the EEG signals, for signal pre-processing we performed noise removal. Second, two methods of frequency space transformation were used such as Discrete Wavelet Transform (DWT), separating signal into sub-bands and Empirical Mode Decomposition (EMD) technique to decompose signal into the Intrinsic Mode Functions (IMFs). Before the classification, the statistical moments of the signals in the frequency domain were obtained for feature extraction. Using these features, the performances of Support Vector Machines (SVM), Decision Tree, K-nearest Neighborhood (KNN) classifiers were analyzed. The experiment results show that the most accurate detection of epilepsy was obtained by applying EMD method with classifiers SVM, KNN and Decision Tree, and such algorithm with EMD can achieve accuracy for normal, pre-seizure, and seizure equal to 100%, 100% and 96.67%, respectively.
{"title":"Epileptic Seizure Prediction in EEG Signals using EMD and DWT","authors":"Marzhan Bekbalanova, Aliya Zhunis, Zhasdauren Duisebekov","doi":"10.1109/ICECCO48375.2019.9043270","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043270","url":null,"abstract":"In this study, normal (healthy), pre-seizure and seizure states were analyzed using EEG data from BONN database. In this paper, we propose a new method of using SVM, KNN and Decision Tree for classification analysis in order to improve the detection accuracy of seizure. First, due to the presence of significant noise in the EEG signals, for signal pre-processing we performed noise removal. Second, two methods of frequency space transformation were used such as Discrete Wavelet Transform (DWT), separating signal into sub-bands and Empirical Mode Decomposition (EMD) technique to decompose signal into the Intrinsic Mode Functions (IMFs). Before the classification, the statistical moments of the signals in the frequency domain were obtained for feature extraction. Using these features, the performances of Support Vector Machines (SVM), Decision Tree, K-nearest Neighborhood (KNN) classifiers were analyzed. The experiment results show that the most accurate detection of epilepsy was obtained by applying EMD method with classifiers SVM, KNN and Decision Tree, and such algorithm with EMD can achieve accuracy for normal, pre-seizure, and seizure equal to 100%, 100% and 96.67%, respectively.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126841951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9043269
B. Saka, Sadiq Thomas, Y. S. Mohammed, I. D. Inuwa, E. A. Aja, S. Hussein
This paper presents the contingency analysis for the Abuja transmission network using DIgSILENT Power Factory software. The contingency analysis showed the results for the worst loading violations from the most severe to the least severe case for both the base case and the case study contingencies. For the base case condition, the most severe continuous loading condition was 200.2% while the least severe continuous loading condition was 93.7%. After the reinforcement of the identified weak section of the network, the security and the stability of the network improved greatly with the most severe continuous loading condition of 138.9% and the least severe continuous loading condition of 80.4%. Contingency analysis for Abuja transmission network was conducted to identify the weakest part of the network and then take measures to ensure the stability of the network.
本文利用DIgSILENT Power Factory软件对阿布贾输电网进行了事故分析。偶然性分析显示了在基本情况和案例研究的偶然性中,从最严重到最不严重的最严重加载违反情况的结果。在基准工况下,最严重连续加载工况为200.2%,最不严重连续加载工况为93.7%。对识别出的网络薄弱段进行加固后,网络的安全性和稳定性有了较大的提高,最严重连续加载条件为138.9%,最轻微连续加载条件为80.4%。对阿布贾输电网进行了权变分析,找出电网的最薄弱环节,采取措施保证电网的稳定运行。
{"title":"Contingency Analysis of Abuja Transmission Network","authors":"B. Saka, Sadiq Thomas, Y. S. Mohammed, I. D. Inuwa, E. A. Aja, S. Hussein","doi":"10.1109/ICECCO48375.2019.9043269","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9043269","url":null,"abstract":"This paper presents the contingency analysis for the Abuja transmission network using DIgSILENT Power Factory software. The contingency analysis showed the results for the worst loading violations from the most severe to the least severe case for both the base case and the case study contingencies. For the base case condition, the most severe continuous loading condition was 200.2% while the least severe continuous loading condition was 93.7%. After the reinforcement of the identified weak section of the network, the security and the stability of the network improved greatly with the most severe continuous loading condition of 138.9% and the least severe continuous loading condition of 80.4%. Contingency analysis for Abuja transmission network was conducted to identify the weakest part of the network and then take measures to ensure the stability of the network.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126686500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICECCO48375.2019.9247074
V. Kiray
In this study, within the scope of the more efficient use of solar energy in settlement areas, the benefits and potential barriers to be generated in the place where electricity is consumed are discussed and a system developed to overcome some of these barriers is introduced. In this system, which is called as Rotating Roof Gazebo System (RRGS), PV panels are placed on the roof of the Gazebo and it is ensured that this roof turns and follows the Sun. In this study, electro-mechanical structure of RRGS was introduced, efficiency and cost were discussed and also the different benefits and aesthetic factor of the system in addition to energy production were mentioned.
{"title":"Introduction of a System Developed for Increasing the Use of Solar Energy in the Residential Areas \"A Rotating Roof Gazebo System\"","authors":"V. Kiray","doi":"10.1109/ICECCO48375.2019.9247074","DOIUrl":"https://doi.org/10.1109/ICECCO48375.2019.9247074","url":null,"abstract":"In this study, within the scope of the more efficient use of solar energy in settlement areas, the benefits and potential barriers to be generated in the place where electricity is consumed are discussed and a system developed to overcome some of these barriers is introduced. In this system, which is called as Rotating Roof Gazebo System (RRGS), PV panels are placed on the roof of the Gazebo and it is ensured that this roof turns and follows the Sun. In this study, electro-mechanical structure of RRGS was introduced, efficiency and cost were discussed and also the different benefits and aesthetic factor of the system in addition to energy production were mentioned.","PeriodicalId":166322,"journal":{"name":"2019 15th International Conference on Electronics, Computer and Computation (ICECCO)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127915310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}