Digital technology and artificial intelligence technologies have been progressing rapidly, thus giving rise to intelligent chatbots such as chat generative pre-trained transformer (ChatGPT). These chatbots make searching for information more efficient and provide higher education institutions with assistance in decision-making. The goal of this research is to explore the capabilities of ChatGPT technology and its role in enhancing the e-learning process. Moreover, it seeks to determine whether ChatGPT can provide useful suggestions to improve the decision-making process in higher education. ChatGPT is effective in an e-learning environment for the following reasons: it facilitates personalized learning experiences, offers real-time support, and enhances decision-making by leveraging natural language processing capabilities. As suggested by the findings, ChatGPT has significant potential in higher education, as demonstrated by its ability to improve interactive participation, educational strategies, and educational outcomes. This study highlights the importance of incorporating ChatGPT into higher education settings to improve e-learning and decision-making.
{"title":"The role of chat generative pre-trained transformer in facilitating decision-making and the e-learning process in higher education","authors":"Khaldun G. Al-Moghrabi, Ali M. Al-Ghonmein","doi":"10.11591/eei.v13i3.7237","DOIUrl":"https://doi.org/10.11591/eei.v13i3.7237","url":null,"abstract":"Digital technology and artificial intelligence technologies have been progressing rapidly, thus giving rise to intelligent chatbots such as chat generative pre-trained transformer (ChatGPT). These chatbots make searching for information more efficient and provide higher education institutions with assistance in decision-making. The goal of this research is to explore the capabilities of ChatGPT technology and its role in enhancing the e-learning process. Moreover, it seeks to determine whether ChatGPT can provide useful suggestions to improve the decision-making process in higher education. ChatGPT is effective in an e-learning environment for the following reasons: it facilitates personalized learning experiences, offers real-time support, and enhances decision-making by leveraging natural language processing capabilities. As suggested by the findings, ChatGPT has significant potential in higher education, as demonstrated by its ability to improve interactive participation, educational strategies, and educational outcomes. This study highlights the importance of incorporating ChatGPT into higher education settings to improve e-learning and decision-making.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"63 38","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141277193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Angel Namo-Ochoa, Eduardo Portilla-Cosar, Fernando Sierra-Liñan, M. Cabanillas-Carbonell
In recent years, computer attacks on the server infrastructure in organizations have been increasing, and the pandemic of covid-19 and remote work have been the main causes for this massive wave of large-scale attacks, small businesses are especially vulnerable because to optimizing resources they leave aside the cyber security in their network infrastructure. The present research is a systematic review that compiles 58 articles where policies, techniques, and infrastructure for the prevention of threats in enterprise servers have been implemented and raised, these articles have been collected from major databases such as IEEE Xplore, SAGE, Science Direct, Scopus, and IOP Publishing. The results show that one of the most effective methods in preventing communications between institutional servers is public key infrastructure/SSL-TLS encryption. Most research claims that it is the most effective method as it provides a central certifier and manages the certificates for the servers allowing each of the modules or attachments within the infrastructure to identify and validate other members and to proceed with the encryption of network traffic, Finally, a security implementation model is proposed.
{"title":"Risk analysis and prevention in computer security in institutional servers, a systematic review of the literature","authors":"Angel Namo-Ochoa, Eduardo Portilla-Cosar, Fernando Sierra-Liñan, M. Cabanillas-Carbonell","doi":"10.11591/eei.v13i3.6093","DOIUrl":"https://doi.org/10.11591/eei.v13i3.6093","url":null,"abstract":"In recent years, computer attacks on the server infrastructure in organizations have been increasing, and the pandemic of covid-19 and remote work have been the main causes for this massive wave of large-scale attacks, small businesses are especially vulnerable because to optimizing resources they leave aside the cyber security in their network infrastructure. The present research is a systematic review that compiles 58 articles where policies, techniques, and infrastructure for the prevention of threats in enterprise servers have been implemented and raised, these articles have been collected from major databases such as IEEE Xplore, SAGE, Science Direct, Scopus, and IOP Publishing. The results show that one of the most effective methods in preventing communications between institutional servers is public key infrastructure/SSL-TLS encryption. Most research claims that it is the most effective method as it provides a central certifier and manages the certificates for the servers allowing each of the modules or attachments within the infrastructure to identify and validate other members and to proceed with the encryption of network traffic, Finally, a security implementation model is proposed.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141235553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The harmful code application known as a rootkit is designed to be loaded and run directly from the operating system's (OSs') Kernel. Rootkits deployed in the Kernel, called Kernel-mode rootkits, can alter the OS. The intention behind these Kernel changes is to conceal the hack. Detecting a Kernel rootkit in a target machine is found to be quite challenging. Numerous techniques can be employed to modify the Kernel of a system. Kernel rootkits also create hidden access for attacks, enabling unauthorized entry to be gained by attackers on the machine. The ultimate consequence is that essential computer data can be modified, personal information can be gathered, and hackers can observe behavior. Synthetic neural networks support artificial intelligence, a branch of deep learning that models the human brain and operates on large datasets. This study proposed the Kernel rootkit detection multi-class deep learning techniques (KRDMCDLT). Deep learning algorithms are utilized to recognize the Kernel rootkit from a batch of data by selecting essential properties for learning tracking models. Thus, by identifying the OS malware, trojan assaults can be stopped before they can access infected data. This Kernel rootkit detection was tested in a Google Cloud Platform (GCP) computing system.
{"title":"Kernel rootkit detection multi class on deep learning techniques","authors":"Suresh Kumar Srinivasan, Sudalaimuthu Thalavaipillai","doi":"10.11591/eei.v13i3.6802","DOIUrl":"https://doi.org/10.11591/eei.v13i3.6802","url":null,"abstract":"The harmful code application known as a rootkit is designed to be loaded and run directly from the operating system's (OSs') Kernel. Rootkits deployed in the Kernel, called Kernel-mode rootkits, can alter the OS. The intention behind these Kernel changes is to conceal the hack. Detecting a Kernel rootkit in a target machine is found to be quite challenging. Numerous techniques can be employed to modify the Kernel of a system. Kernel rootkits also create hidden access for attacks, enabling unauthorized entry to be gained by attackers on the machine. The ultimate consequence is that essential computer data can be modified, personal information can be gathered, and hackers can observe behavior. Synthetic neural networks support artificial intelligence, a branch of deep learning that models the human brain and operates on large datasets. This study proposed the Kernel rootkit detection multi-class deep learning techniques (KRDMCDLT). Deep learning algorithms are utilized to recognize the Kernel rootkit from a batch of data by selecting essential properties for learning tracking models. Thus, by identifying the OS malware, trojan assaults can be stopped before they can access infected data. This Kernel rootkit detection was tested in a Google Cloud Platform (GCP) computing system.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"7 38","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141229336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Technological advancement and economic progress have made power consumption a big issue. Concern is growing as traditional energy sources dwindle. In the future, numerous fossil fuels will be insufficient to satisfy human requirements. This motivates research into the feasibility of using renewable energy sources. Renewable energy sources offer a multitude of advantages, including their cost-effectiveness, lack of environmental impact, and sustainable nature. Sunlight is currently the most prevalent source of energy because it is both free and readily accessible. Consequently, photovoltaic (PV) energy is gaining importance in the field of electricity generation. Tracking the maximum power point (MPP) in a solar PV system is challenging due to varying meteorological conditions (irradiance and temperature). To maximise the efficiency of a solar power installation, it is essential to monitor the PV array's optimum power point. This analysis compares the perturb and observe (PO), fuzzy logic (FL), and suggested artificial neural network (ANN)-fuzzy strategy for determining the MPP of a PV system with minimal radiation exposure. Simulation results show that at low irradiation levels, the proposed ANN-fuzzy maximum power point tracking (MPPT) unit controller is superior to the FL and PO MPPT controllers in terms of tracking maximum power.
{"title":"The effectiveness of a hybrid MPPT controller based on an artificial neural network and fuzzy logic in low-light conditions","authors":"Louki Hichem, Merabet Leila, Omeiri Amar","doi":"10.11591/eei.v13i3.6416","DOIUrl":"https://doi.org/10.11591/eei.v13i3.6416","url":null,"abstract":"Technological advancement and economic progress have made power consumption a big issue. Concern is growing as traditional energy sources dwindle. In the future, numerous fossil fuels will be insufficient to satisfy human requirements. This motivates research into the feasibility of using renewable energy sources. Renewable energy sources offer a multitude of advantages, including their cost-effectiveness, lack of environmental impact, and sustainable nature. Sunlight is currently the most prevalent source of energy because it is both free and readily accessible. Consequently, photovoltaic (PV) energy is gaining importance in the field of electricity generation. Tracking the maximum power point (MPP) in a solar PV system is challenging due to varying meteorological conditions (irradiance and temperature). To maximise the efficiency of a solar power installation, it is essential to monitor the PV array's optimum power point. This analysis compares the perturb and observe (PO), fuzzy logic (FL), and suggested artificial neural network (ANN)-fuzzy strategy for determining the MPP of a PV system with minimal radiation exposure. Simulation results show that at low irradiation levels, the proposed ANN-fuzzy maximum power point tracking (MPPT) unit controller is superior to the FL and PO MPPT controllers in terms of tracking maximum power.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"21 17","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141233229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ebenhaiser Jonathan Caprisiano, Muhammad Hafizh Ramadhansyah, Amalia Zahra
Hate speech can be defined as the use of language to express hatred towards another party. Twitter is one of the most widely used social media platforms in the community. In addition to submitting user-generated content, other users can provide feedback through comments. There are several users who intentionally or unintentionally provide negative comments. Even though there are regulations regarding the prohibition of hate speech, there are still those who make negative comments. Using the deep learning method with the long short-term memory (LSTM) model, a classifier of possible hate speech from messages on Twitter is carried out. With the ensemble method, term frequency times inverse document frequency (TF-IDF) and global vector (GloVe) get 86% accuracy, better than the stand-alone word to vector (Word2Vec) method, which only gets 80%. From these results, it can be concluded that the ensemble method can improve accuracy compared to only using the stand-alone method. Ensemble methods can also improve the performance of deep learning systems and produce better results than using only one method.
{"title":"Classifying possible hate speech from text with deep learning and ensemble on embedding method","authors":"Ebenhaiser Jonathan Caprisiano, Muhammad Hafizh Ramadhansyah, Amalia Zahra","doi":"10.11591/eei.v13i3.6041","DOIUrl":"https://doi.org/10.11591/eei.v13i3.6041","url":null,"abstract":"Hate speech can be defined as the use of language to express hatred towards another party. Twitter is one of the most widely used social media platforms in the community. In addition to submitting user-generated content, other users can provide feedback through comments. There are several users who intentionally or unintentionally provide negative comments. Even though there are regulations regarding the prohibition of hate speech, there are still those who make negative comments. Using the deep learning method with the long short-term memory (LSTM) model, a classifier of possible hate speech from messages on Twitter is carried out. With the ensemble method, term frequency times inverse document frequency (TF-IDF) and global vector (GloVe) get 86% accuracy, better than the stand-alone word to vector (Word2Vec) method, which only gets 80%. From these results, it can be concluded that the ensemble method can improve accuracy compared to only using the stand-alone method. Ensemble methods can also improve the performance of deep learning systems and produce better results than using only one method.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"61 14","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141231502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdelilah Mbarek, Mouna Jiber, Ali Yahyaouy, Abdelouahed Sabri
This paper presents an analytical approach to identifying the important characteristics of accident black spots on Moroccan rural roads. An association rule mining method is applied to extract road spatial characteristics associated with fatal accidents. The weighted severity index was calculated for each section, which was then used to determine the severity levels of black spots. The apriori algorithm is applied to find the correlation between road characteristics and the severity levels of black spots. Then, a general rule selection method is proposed to identify the rules strongly associated with each severity level. The results show that the proposed approach is effective in identifying the most important factors contributing to accidents. Furthermore, it shows that the combination of several road characteristics, such as road width, road surface, and bridge presence, may contribute to fatal accidents. The general rule selection found that wet, bad surfaces, and narrow shoulders were significantly associated with accidents on rural roads. The findings of the present study can help develop effective strategies to reduce road accidents and thus improve road safety in the country.
{"title":"Accident black spots identification based on association rule mining","authors":"Abdelilah Mbarek, Mouna Jiber, Ali Yahyaouy, Abdelouahed Sabri","doi":"10.11591/eei.v13i3.6135","DOIUrl":"https://doi.org/10.11591/eei.v13i3.6135","url":null,"abstract":"This paper presents an analytical approach to identifying the important characteristics of accident black spots on Moroccan rural roads. An association rule mining method is applied to extract road spatial characteristics associated with fatal accidents. The weighted severity index was calculated for each section, which was then used to determine the severity levels of black spots. The apriori algorithm is applied to find the correlation between road characteristics and the severity levels of black spots. Then, a general rule selection method is proposed to identify the rules strongly associated with each severity level. The results show that the proposed approach is effective in identifying the most important factors contributing to accidents. Furthermore, it shows that the combination of several road characteristics, such as road width, road surface, and bridge presence, may contribute to fatal accidents. The general rule selection found that wet, bad surfaces, and narrow shoulders were significantly associated with accidents on rural roads. The findings of the present study can help develop effective strategies to reduce road accidents and thus improve road safety in the country.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"57 51","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141232246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shamsul Fakhar Abd Gani, M. F. Miskon, R. A. Hamzah, M. Hamid, A. F. Kadmin, A. I. Herman
Machine vision research began with a single-camera system, but these systems had various limitations from having just one point-of-view of the environment and no depth information, therefore stereo cameras were invented. This paper proposes a hybrid method of a stereo matching algorithm with the goal of generating an accurate disparity map critical for applications such as 3D surface reconstruction and robot navigation to name a few. Convolutional neural network (CNN) is utilised to generate the matching cost, which is then input into cost aggregation to increase accuracy with the help of a bilateral filter (BF). Winner-take-all (WTA) is used to generate the preliminary disparity map. An edge-preserving filter (EPF) is applied to that output based on a transform that defines an isometry between curves on the 2D image manifold in 5D and the real line to eliminate these artefacts. The transform warps the input signal adaptively to allow linear 1D filtering. Due to the filter's resistance to high contrast and brightness, it is effective in refining and removing noise from the output image. Based on experimental research employing a Middlebury standard validation benchmark, this approach gives high accuracy with an average non-occluded error of 6.71% comparable to other published methods.
{"title":"Stereo matching algorithm using deep learning and edge-preserving filter for machine vision","authors":"Shamsul Fakhar Abd Gani, M. F. Miskon, R. A. Hamzah, M. Hamid, A. F. Kadmin, A. I. Herman","doi":"10.11591/eei.v13i3.5708","DOIUrl":"https://doi.org/10.11591/eei.v13i3.5708","url":null,"abstract":"Machine vision research began with a single-camera system, but these systems had various limitations from having just one point-of-view of the environment and no depth information, therefore stereo cameras were invented. This paper proposes a hybrid method of a stereo matching algorithm with the goal of generating an accurate disparity map critical for applications such as 3D surface reconstruction and robot navigation to name a few. Convolutional neural network (CNN) is utilised to generate the matching cost, which is then input into cost aggregation to increase accuracy with the help of a bilateral filter (BF). Winner-take-all (WTA) is used to generate the preliminary disparity map. An edge-preserving filter (EPF) is applied to that output based on a transform that defines an isometry between curves on the 2D image manifold in 5D and the real line to eliminate these artefacts. The transform warps the input signal adaptively to allow linear 1D filtering. Due to the filter's resistance to high contrast and brightness, it is effective in refining and removing noise from the output image. Based on experimental research employing a Middlebury standard validation benchmark, this approach gives high accuracy with an average non-occluded error of 6.71% comparable to other published methods.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"110 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141234333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rania Hamdy Elabd, Ahmed Jamal Abdullah Al-Gburi, Khaled Alhassoon, Mohd Muzafar Ismail, Zahriladha Zakaria
This paper presents a low-insertion-loss open-loop resonator (OLR)-based microstrip diplexer with high-selective for wireless applications. We used two series capacitive gaps in the microstrip transmission line, loaded with rectangular-shaped half-wavelength OLRs, to create a high-selectivity bandpass filter (BPF). The planned BPFs are linked through a T-junction combiner, precisely tuned to align with both filters and the antenna port in order to produce the proposed diplexer. The system is implemented on a rogers TMM4 substrate with a loss tangent of 0.002, a dielectric constant of 4.7, and a thickness of 1.52 mm. The suggested diplexer has dimensions of (90×70) mm². It achieves a modest frequency space ratio of R=0.1646 in both transmit and receive modes by having two resonance frequencies of ft=2.191 GHz and fr=2.584 GHz, respectively. The simulated structure displays good insertion losses of approximately 1.2 dB and 1.79 dB for the two channels, respectively, at fractional bandwidths of 1.24% at 2.191 GHz and 0.636% at 2.584 GHz. The simulated isolation values for 2.191 GHz and 2.584 GHz are 53.3 dB and 66.5 dB, respectively.
{"title":"Low insertion loss open-loop resonator–based microstrip diplexer with high selective for wireless applications","authors":"Rania Hamdy Elabd, Ahmed Jamal Abdullah Al-Gburi, Khaled Alhassoon, Mohd Muzafar Ismail, Zahriladha Zakaria","doi":"10.11591/eei.v13i3.6789","DOIUrl":"https://doi.org/10.11591/eei.v13i3.6789","url":null,"abstract":"This paper presents a low-insertion-loss open-loop resonator (OLR)-based microstrip diplexer with high-selective for wireless applications. We used two series capacitive gaps in the microstrip transmission line, loaded with rectangular-shaped half-wavelength OLRs, to create a high-selectivity bandpass filter (BPF). The planned BPFs are linked through a T-junction combiner, precisely tuned to align with both filters and the antenna port in order to produce the proposed diplexer. The system is implemented on a rogers TMM4 substrate with a loss tangent of 0.002, a dielectric constant of 4.7, and a thickness of 1.52 mm. The suggested diplexer has dimensions of (90×70) mm². It achieves a modest frequency space ratio of R=0.1646 in both transmit and receive modes by having two resonance frequencies of ft=2.191 GHz and fr=2.584 GHz, respectively. The simulated structure displays good insertion losses of approximately 1.2 dB and 1.79 dB for the two channels, respectively, at fractional bandwidths of 1.24% at 2.191 GHz and 0.636% at 2.584 GHz. The simulated isolation values for 2.191 GHz and 2.584 GHz are 53.3 dB and 66.5 dB, respectively.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"3 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141229198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Tapre, Mohan P. Thakre, Ramesh Pawase, Jaywant S. Thorat, Dipak J. Dahigaonkar, Rahul G. Mapari, S. Kadlag, S. Khule
Repetitive controller and selective harmonic injection technique (SHI) in medium and low voltage distribution networks improve dynamic voltage restorer (DVR) DC bus voltages as well as nullify power quality (PQ) problems. DVRs use sinusoidal pulse width modulation (SPWM) firing control, but DC bus use seems to be limited, affecting density, cost, and power packaging. By adding 1/6th of the 3rd harmonic waveform to the basic waveform, SPWM yields the developed model. According to the findings, 15% of DC bus usage improves and produces high voltage AC. Nevertheless, just control systems perturb PQ. The proposed controller uses feed forward and feedback to enhance transient response and justify stable zero error. 3rd third harmonic injection pulse width modulation (THIPWM) improves total harmonic distortion (THD) in the proposed scheme. Power system computer aided design (PSCAD) simulation produced high accuracy for THIPWM and repetitive controllers.
{"title":"New control scheme for a dynamic voltage restorer based on selective harmonic injection technique with repetitive controller","authors":"P. Tapre, Mohan P. Thakre, Ramesh Pawase, Jaywant S. Thorat, Dipak J. Dahigaonkar, Rahul G. Mapari, S. Kadlag, S. Khule","doi":"10.11591/eei.v13i3.5312","DOIUrl":"https://doi.org/10.11591/eei.v13i3.5312","url":null,"abstract":"Repetitive controller and selective harmonic injection technique (SHI) in medium and low voltage distribution networks improve dynamic voltage restorer (DVR) DC bus voltages as well as nullify power quality (PQ) problems. DVRs use sinusoidal pulse width modulation (SPWM) firing control, but DC bus use seems to be limited, affecting density, cost, and power packaging. By adding 1/6th of the 3rd harmonic waveform to the basic waveform, SPWM yields the developed model. According to the findings, 15% of DC bus usage improves and produces high voltage AC. Nevertheless, just control systems perturb PQ. The proposed controller uses feed forward and feedback to enhance transient response and justify stable zero error. 3rd third harmonic injection pulse width modulation (THIPWM) improves total harmonic distortion (THD) in the proposed scheme. Power system computer aided design (PSCAD) simulation produced high accuracy for THIPWM and repetitive controllers.","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"20 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141229826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Youness Atifi, A. Raihani, M. Kissaoui, R. Lajouad, Khalid Errakkas
With the passage of time, the importance of using renewable energy systems to overcome energy consumption and improve the quality of the grid has emerged through the use of nonlinear control techniques and reliance on advanced types of inverters such as multi-level inverters. This research is focused on comparing two grid-connected converter topologies in a photovoltaic (PV) generation system connected to a three-phase grid that serves a non-linear load. Additionally, the study explores two different control techniques applied to this converter, evaluating their effects on the total harmonic distortion coefficient. A comparison has been made between the traditional inverter and the three-level inverter type neutral point clamped (NPC) inverter, with the use of integral backstepping (IBS) technique which was also compared with the proportional integral (PI) controller. The simulation results in MATLAB/Simulink are presented illustrating the performances and the strong effectiveness of the three-level NPC inverter controlled by the proposed technique (IBS).
{"title":"Nonlinear control of three level NPC inverter used in PV/grid system: comparison of topologies and control methods","authors":"Youness Atifi, A. Raihani, M. Kissaoui, R. Lajouad, Khalid Errakkas","doi":"10.11591/eei.v13i3.7122","DOIUrl":"https://doi.org/10.11591/eei.v13i3.7122","url":null,"abstract":"With the passage of time, the importance of using renewable energy systems to overcome energy consumption and improve the quality of the grid has emerged through the use of nonlinear control techniques and reliance on advanced types of inverters such as multi-level inverters. This research is focused on comparing two grid-connected converter topologies in a photovoltaic (PV) generation system connected to a three-phase grid that serves a non-linear load. Additionally, the study explores two different control techniques applied to this converter, evaluating their effects on the total harmonic distortion coefficient. A comparison has been made between the traditional inverter and the three-level inverter type neutral point clamped (NPC) inverter, with the use of integral backstepping (IBS) technique which was also compared with the proportional integral (PI) controller. The simulation results in MATLAB/Simulink are presented illustrating the performances and the strong effectiveness of the three-level NPC inverter controlled by the proposed technique (IBS).","PeriodicalId":502860,"journal":{"name":"Bulletin of Electrical Engineering and Informatics","volume":"10 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141230172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}