Pub Date : 2015-09-01DOI: 10.11591/IJEECS.V15.I3.PP509-514
Caiqi Hu
In this paper, the application layer communication protocol of CAN bus and the monitoring system for subway platform screen doors are proposed.The system framework is built, hardware of every function module for this system is selected, and the monitoring platform of epigynous machine is designed. On the basis of the above work the communication function of the monitoring system is realized, and specific flow chart s given. This system has been tested at a subway line in Shanghai. And the results prove that the system is in full compliance with industry standards and can completely meet the application requirements. The architecture plan of the system is practically proven to be valid and feasible.
{"title":"Design of the Monitoring System for Subway Platform Screen Doors Based on CAN Bus","authors":"Caiqi Hu","doi":"10.11591/IJEECS.V15.I3.PP509-514","DOIUrl":"https://doi.org/10.11591/IJEECS.V15.I3.PP509-514","url":null,"abstract":"In this paper, the application layer communication protocol of CAN bus and the monitoring system for subway platform screen doors are proposed.The system framework is built, hardware of every function module for this system is selected, and the monitoring platform of epigynous machine is designed. On the basis of the above work the communication function of the monitoring system is realized, and specific flow chart s given. This system has been tested at a subway line in Shanghai. And the results prove that the system is in full compliance with industry standards and can completely meet the application requirements. The architecture plan of the system is practically proven to be valid and feasible.","PeriodicalId":247642,"journal":{"name":"TELKOMNIKA Indonesian Journal of Electrical Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130427254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-01DOI: 10.11591/IJEECS.V15.I3.PP526-532
Albert Sagala, Deni Lumbantoruan, E. Manurung, Iroma Situmorang, Adi Gunawan
In the beginning the implementation of a plant with SCADA technology, the network is formed isolated from the outside network (LAN or Internet). So it can be ascertained that the communication that occurs on the SCADA network is safe from the threat of crackers. In fact, SCADA network allows it to be connected to the Internet, so that the data of the plant can be monitored via the Internet, so the information about the state of the plant can be monitored in realtime and can be taken quickly if it is known there are anomalies on the control system. In the research we designed a method of encryption and decryption against the lines of communication between the HMI (Human Machine Interface) and the Controller on an industrial minipant contained in Lab CSRC IT Del. Raspberry Pi is used as a gateway between the HMI and the Controller. While Algorithm RC 4 are used as the algorithm for encrypting data between the HMI and the Controller. In the results, we can use the Rapsberry Pi to secure the communication between the HMI and Controller.
{"title":"Secured Communication Among HMI and Controller using RC-4 Algorithmand Raspberry Pi","authors":"Albert Sagala, Deni Lumbantoruan, E. Manurung, Iroma Situmorang, Adi Gunawan","doi":"10.11591/IJEECS.V15.I3.PP526-532","DOIUrl":"https://doi.org/10.11591/IJEECS.V15.I3.PP526-532","url":null,"abstract":"In the beginning the implementation of a plant with SCADA technology, the network is formed isolated from the outside network (LAN or Internet). So it can be ascertained that the communication that occurs on the SCADA network is safe from the threat of crackers. In fact, SCADA network allows it to be connected to the Internet, so that the data of the plant can be monitored via the Internet, so the information about the state of the plant can be monitored in realtime and can be taken quickly if it is known there are anomalies on the control system. In the research we designed a method of encryption and decryption against the lines of communication between the HMI (Human Machine Interface) and the Controller on an industrial minipant contained in Lab CSRC IT Del. Raspberry Pi is used as a gateway between the HMI and the Controller. While Algorithm RC 4 are used as the algorithm for encrypting data between the HMI and the Controller. In the results, we can use the Rapsberry Pi to secure the communication between the HMI and Controller.","PeriodicalId":247642,"journal":{"name":"TELKOMNIKA Indonesian Journal of Electrical Engineering","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126000996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-02DOI: 10.11591/IJEECS.V16.I2.PP323-332
R. Khadim, M. Erritali, A. Maaden
Localization of nodes is one of the key issues of wireless sensor network (WSN) that gained a wide attention in recent years. The existing localization techniques can be generally categorized into two types: range-based and range-free. Compared with rang-based schemes, the range-free schemes are more cost-effective, because no additional ranging devices are needed. As a result, we focus our research on the range-free schemes. In this paper we study three types of range-free location algorithms to compare the localization error and energy consumption of each one. Centroid algorithm requires a normal node has at least three neighbor anchors, while DV-hop algorithm doesn’t have this requirement. The third studied algorithm is the amorphous algorithm similar to DV-Hop algorithm, and the idea is to calculate the hop distance between two nodes instead of the linear distance between them .The simulation results show that the localization accuracy of the amorphous algorithm is higher than that of other algorithms and the energy consumption does not increase too much.
{"title":"Range-Free Localization Schemes for Wireless Sensor Networks","authors":"R. Khadim, M. Erritali, A. Maaden","doi":"10.11591/IJEECS.V16.I2.PP323-332","DOIUrl":"https://doi.org/10.11591/IJEECS.V16.I2.PP323-332","url":null,"abstract":"Localization of nodes is one of the key issues of wireless sensor network (WSN) that gained a wide attention in recent years. The existing localization techniques can be generally categorized into two types: range-based and range-free. Compared with rang-based schemes, the range-free schemes are more cost-effective, because no additional ranging devices are needed. As a result, we focus our research on the range-free schemes. In this paper we study three types of range-free location algorithms to compare the localization error and energy consumption of each one. Centroid algorithm requires a normal node has at least three neighbor anchors, while DV-hop algorithm doesn’t have this requirement. The third studied algorithm is the amorphous algorithm similar to DV-Hop algorithm, and the idea is to calculate the hop distance between two nodes instead of the linear distance between them .The simulation results show that the localization accuracy of the amorphous algorithm is higher than that of other algorithms and the energy consumption does not increase too much.","PeriodicalId":247642,"journal":{"name":"TELKOMNIKA Indonesian Journal of Electrical Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126057432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.11591/IJEECS.V15.I2.PP331-335
H. Ouanan, M. Ouanan, B. Aksasse
Extraction of invariant features is the core of Face RecognitionSystems (FRS). This work proposes a novel feature extractor-fusion scheme using two powerful feature descriptor known as Gabor Filters (GFs) and Histogram of Oriented Gradient (HOG), which the face image is filtered with the multiscale multiresolution Gabor filter bank to generate multiple Gabor magnitude images (GMIs), then the down-sampled GMIs and apply Histogram of Oriented Gradient to form the features. The experimental results on the FERET face database show the effectiveness of our methods.
{"title":"Gabor-HOG Features based Face Recognition Scheme","authors":"H. Ouanan, M. Ouanan, B. Aksasse","doi":"10.11591/IJEECS.V15.I2.PP331-335","DOIUrl":"https://doi.org/10.11591/IJEECS.V15.I2.PP331-335","url":null,"abstract":"Extraction of invariant features is the core of Face RecognitionSystems (FRS). This work proposes a novel feature extractor-fusion scheme using two powerful feature descriptor known as Gabor Filters (GFs) and Histogram of Oriented Gradient (HOG), which the face image is filtered with the multiscale multiresolution Gabor filter bank to generate multiple Gabor magnitude images (GMIs), then the down-sampled GMIs and apply Histogram of Oriented Gradient to form the features. The experimental results on the FERET face database show the effectiveness of our methods.","PeriodicalId":247642,"journal":{"name":"TELKOMNIKA Indonesian Journal of Electrical Engineering","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121557792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.11591/IJEECS.V15.I2.PP229-236
P. Sureshpandiarajan, S. P. Natarajan, C. Balamurugan, K. Ramasamy
This work presents the comparison of various Pulse Width Modulation (PWM) techniques for the chosen single phase half bridge FCMLI (Flying Capacitor Multi Level Inverter). In this paper, a single phase half bridge flying capacitor multilevel inverter is controlled with sinusoidal, THI (Third Harmonic Injection), Trapezoidal and TAR (Trapezoidal Amalgamated Reference)reference with Equal Amplitude Carriers (EAC) and UEAC (Un Equal Amplitude Carriers). The proposed EAC and UEAC is applied for various PWM strategies. The PWM methods used for the analysis are PD (Phase Disposition) PWM, POD (Phase Opposition and Disposition) PWM, APOD (Alternative Phase Opposition and Disposition) PWM and CO (Carrier Overlapping) PWM with EAC and UEAC. For all the PWM methods and references the UEAC produces less THD and higher fundamental RMS (Root Mean Square) values except for ma =1. For ma =1 the EAC provides less THD (Total Harmonic Distortion) and higher fundamental RMS (Root Mean Square) values for all the PWM methods and references. To validate the developed technique, simulations are carried out through Power System Block Set.
{"title":"Assessment of Equal and Unequal Amplitude Carriers for a 1Φ Five Level Flying Capacitor Multilevel Inverter","authors":"P. Sureshpandiarajan, S. P. Natarajan, C. Balamurugan, K. Ramasamy","doi":"10.11591/IJEECS.V15.I2.PP229-236","DOIUrl":"https://doi.org/10.11591/IJEECS.V15.I2.PP229-236","url":null,"abstract":"This work presents the comparison of various Pulse Width Modulation (PWM) techniques for the chosen single phase half bridge FCMLI (Flying Capacitor Multi Level Inverter). In this paper, a single phase half bridge flying capacitor multilevel inverter is controlled with sinusoidal, THI (Third Harmonic Injection), Trapezoidal and TAR (Trapezoidal Amalgamated Reference)reference with Equal Amplitude Carriers (EAC) and UEAC (Un Equal Amplitude Carriers). The proposed EAC and UEAC is applied for various PWM strategies. The PWM methods used for the analysis are PD (Phase Disposition) PWM, POD (Phase Opposition and Disposition) PWM, APOD (Alternative Phase Opposition and Disposition) PWM and CO (Carrier Overlapping) PWM with EAC and UEAC. For all the PWM methods and references the UEAC produces less THD and higher fundamental RMS (Root Mean Square) values except for ma =1. For ma =1 the EAC provides less THD (Total Harmonic Distortion) and higher fundamental RMS (Root Mean Square) values for all the PWM methods and references. To validate the developed technique, simulations are carried out through Power System Block Set.","PeriodicalId":247642,"journal":{"name":"TELKOMNIKA Indonesian Journal of Electrical Engineering","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115430744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.11591/IJEECS.V15.I2.PP277-283
Bibi Rawiyah Mulung, A. Maseleno
This paper presents proposed SMART (Systematic Monitoring of Arterial Road Traffic Signals) traffic control signal in Brunei Darussalam. Traffic congestion due to stops and delays at traffic light signals has much been complained about in Brunei Darussalam as well as across the world during the recent years. There are primarily two types of traffic signal controls in Brunei Darussalam. The most common one is the fixed or pre-timed signal operation traffic light and the other one is the actuated signal operation traffic light. Although the actuated signal control is more efficient than the fixed or pre-fixed signal control in the sense that it provides fewer stops and delays to traffic on the major arteries, the best option for Brunei Darussalam would be to introduce smart traffic control signal. This type of traffic signal uses artificial intelligence to take the appropriate action by adjusting the times in real time to minimise the delay in the intersection while also coordinating with intersections in the neighbourhood. SMART Signal simultaneously collects event-based high-resolution traffic data from multiple intersections and generates real-time signal performance measures, including arterial travel time, number of stops, queue length, intersection delay, and level of service. In Brunei Darussalam, where we have numerous intersections where several arterial roads are linked to one another, The SMART signal traffic control method should be implemented.
{"title":"Proposed SMART Traffic Control Signal in Brunei Darussalam","authors":"Bibi Rawiyah Mulung, A. Maseleno","doi":"10.11591/IJEECS.V15.I2.PP277-283","DOIUrl":"https://doi.org/10.11591/IJEECS.V15.I2.PP277-283","url":null,"abstract":"This paper presents proposed SMART (Systematic Monitoring of Arterial Road Traffic Signals) traffic control signal in Brunei Darussalam. Traffic congestion due to stops and delays at traffic light signals has much been complained about in Brunei Darussalam as well as across the world during the recent years. There are primarily two types of traffic signal controls in Brunei Darussalam. The most common one is the fixed or pre-timed signal operation traffic light and the other one is the actuated signal operation traffic light. Although the actuated signal control is more efficient than the fixed or pre-fixed signal control in the sense that it provides fewer stops and delays to traffic on the major arteries, the best option for Brunei Darussalam would be to introduce smart traffic control signal. This type of traffic signal uses artificial intelligence to take the appropriate action by adjusting the times in real time to minimise the delay in the intersection while also coordinating with intersections in the neighbourhood. SMART Signal simultaneously collects event-based high-resolution traffic data from multiple intersections and generates real-time signal performance measures, including arterial travel time, number of stops, queue length, intersection delay, and level of service. In Brunei Darussalam, where we have numerous intersections where several arterial roads are linked to one another, The SMART signal traffic control method should be implemented.","PeriodicalId":247642,"journal":{"name":"TELKOMNIKA Indonesian Journal of Electrical Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122608784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.11591/IJEECS.V15.I2.PP381-389
Razouki Hassan, Hair Abdellatif
The mobile agent has been seen as a promising distributed computing technology. The mobility characteristic of mobile agent makes it to travel often in open network. In this scenario, it is obvious that the mobile agents are vulnerable to various security threats. Protecting free-roaming mobile agents from malicious host and from other mobile agents has drawn much attention in recent years. The protection of mobile agents is considered as one of the greatest challenges of security, because the platform of execution has access to all the components of the mobile agent. In this paper, we present a new architecture paradigm of mobile agents, which allows the separation of the implementation tasks of the agent and its security mechanisms. Our approach is based on using two strategies of adaptation to adapt the mobile agent security at runtime, depending on the sensitivity of the services required to perform the duties of the agent and the degree of confidence of the visited platforms.
{"title":"Security for Mobile Agents: Trust Estimate for Platforms","authors":"Razouki Hassan, Hair Abdellatif","doi":"10.11591/IJEECS.V15.I2.PP381-389","DOIUrl":"https://doi.org/10.11591/IJEECS.V15.I2.PP381-389","url":null,"abstract":"The mobile agent has been seen as a promising distributed computing technology. The mobility characteristic of mobile agent makes it to travel often in open network. In this scenario, it is obvious that the mobile agents are vulnerable to various security threats. Protecting free-roaming mobile agents from malicious host and from other mobile agents has drawn much attention in recent years. The protection of mobile agents is considered as one of the greatest challenges of security, because the platform of execution has access to all the components of the mobile agent. In this paper, we present a new architecture paradigm of mobile agents, which allows the separation of the implementation tasks of the agent and its security mechanisms. Our approach is based on using two strategies of adaptation to adapt the mobile agent security at runtime, depending on the sensitivity of the services required to perform the duties of the agent and the degree of confidence of the visited platforms.","PeriodicalId":247642,"journal":{"name":"TELKOMNIKA Indonesian Journal of Electrical Engineering","volume":"448 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121834964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.11591/IJEECS.V15.I2.PP301-312
Lhoussaine Bouhou, R. Ayachi, M. Fakir, M. Oukessou
Face recognition is the field of great interest in the domaine of research for several applications such as biometry identification, surveillance, and human-machine interaction…This paper exposes a system of face recognition. This system exploits an image document text embedding a color human face image. Initially, the system, in its phase of extraction, exploitis the horizontal and vertical histogram of the document, detects the image which contains the human face. The second task of the system consists of detecting the included face in other to determine, with the help of invariants moments, the characteristics of the face. The third and last task of the system is to determine, via the same invariants moments, the characteristics of each face stored in a database in order to compare them by means of a classification tool (Neural Networks and K nearest neighbors) with the one determined in the second task for the purpose of taking the decision of identification in that database, of the most similar face to the one detected in the input image.
{"title":"Recognition of a Face in a Mixed Document","authors":"Lhoussaine Bouhou, R. Ayachi, M. Fakir, M. Oukessou","doi":"10.11591/IJEECS.V15.I2.PP301-312","DOIUrl":"https://doi.org/10.11591/IJEECS.V15.I2.PP301-312","url":null,"abstract":"Face recognition is the field of great interest in the domaine of research for several applications such as biometry identification, surveillance, and human-machine interaction…This paper exposes a system of face recognition. This system exploits an image document text embedding a color human face image. Initially, the system, in its phase of extraction, exploitis the horizontal and vertical histogram of the document, detects the image which contains the human face. The second task of the system consists of detecting the included face in other to determine, with the help of invariants moments, the characteristics of the face. The third and last task of the system is to determine, via the same invariants moments, the characteristics of each face stored in a database in order to compare them by means of a classification tool (Neural Networks and K nearest neighbors) with the one determined in the second task for the purpose of taking the decision of identification in that database, of the most similar face to the one detected in the input image.","PeriodicalId":247642,"journal":{"name":"TELKOMNIKA Indonesian Journal of Electrical Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121942567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.11591/IJEECS.V15.I2.PP368-372
A. E. Ghazi, C. Daoui
In this work, we present an automatic speech classification system for the Tamazight phonemes. We based on the spectrum presentation of the speech signal to model these phonemes. We have used an oral database of Tamazight phonemes. To test the system’s performances, we calculate the classification rate. The obtained results are satisfactory in comparison with the reference database and the quality of speech files.
{"title":"Phonemes Classification Using the Spectrum","authors":"A. E. Ghazi, C. Daoui","doi":"10.11591/IJEECS.V15.I2.PP368-372","DOIUrl":"https://doi.org/10.11591/IJEECS.V15.I2.PP368-372","url":null,"abstract":"In this work, we present an automatic speech classification system for the Tamazight phonemes. We based on the spectrum presentation of the speech signal to model these phonemes. We have used an oral database of Tamazight phonemes. To test the system’s performances, we calculate the classification rate. The obtained results are satisfactory in comparison with the reference database and the quality of speech files.","PeriodicalId":247642,"journal":{"name":"TELKOMNIKA Indonesian Journal of Electrical Engineering","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124842213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-01DOI: 10.11591/IJEECS.V15.I2.PP197-208
Chandani Sharma, Anamika Jain
Photovoltaics (PV) are the most abundant, perennial, environment friendly and distributed source of energy all over the globe. In this paper, the method to increase PV extraction efficiency for 60W panel with improved DMPP (Distributed Maximum Power Point) even on changing temperature and irradiance have been mapped and discussed. In order to achieve this, the components and subsystems have been analyzed and validated. The validated models are used to maximize the power output using two different models of DC-DC Converters in MATLAB/SIMULINK environment. Closed loop Buck converter using state space nonlinear differential equations and direct component model are compared to reveal best results at Standard Test Conditions (STC). MPPT model developed can be used for obtaining maximum power output from PV even in partial presence of sun using Fuzzy Logic Controller. The Controller designed tracks highest power output for the buck converter. The model developed, using tested membership functions in FLC, can serve a platform for various real time applications using PV.
{"title":"Distributed MPP Tracking of PV through Buck Converter Using Fuzzy","authors":"Chandani Sharma, Anamika Jain","doi":"10.11591/IJEECS.V15.I2.PP197-208","DOIUrl":"https://doi.org/10.11591/IJEECS.V15.I2.PP197-208","url":null,"abstract":"Photovoltaics (PV) are the most abundant, perennial, environment friendly and distributed source of energy all over the globe. In this paper, the method to increase PV extraction efficiency for 60W panel with improved DMPP (Distributed Maximum Power Point) even on changing temperature and irradiance have been mapped and discussed. In order to achieve this, the components and subsystems have been analyzed and validated. The validated models are used to maximize the power output using two different models of DC-DC Converters in MATLAB/SIMULINK environment. Closed loop Buck converter using state space nonlinear differential equations and direct component model are compared to reveal best results at Standard Test Conditions (STC). MPPT model developed can be used for obtaining maximum power output from PV even in partial presence of sun using Fuzzy Logic Controller. The Controller designed tracks highest power output for the buck converter. The model developed, using tested membership functions in FLC, can serve a platform for various real time applications using PV.","PeriodicalId":247642,"journal":{"name":"TELKOMNIKA Indonesian Journal of Electrical Engineering","volume":"os-50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127789371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}