Pub Date : 2018-08-01DOI: 10.1109/ICCCEEE.2018.8515804
M. Dahab
A proposed mathematical model for calculating the locational marginal pricing (LMP) of reactive power at the load buses was developed and tested on an IEEE 30 bus test system with the framework of the full AC optimal power flow (OPF). The trust region incremental linear programming method was utilized to solve the OPF problem. The power factor pricing approach based on the generator capability curve was used to develop the reactive power cost function. Considering the existence of fixed shunt capacitor banks on the network, the proposed formulation was tested and provided an accurate result.
{"title":"Reactive Power Locational Marginal Pricing","authors":"M. Dahab","doi":"10.1109/ICCCEEE.2018.8515804","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515804","url":null,"abstract":"A proposed mathematical model for calculating the locational marginal pricing (LMP) of reactive power at the load buses was developed and tested on an IEEE 30 bus test system with the framework of the full AC optimal power flow (OPF). The trust region incremental linear programming method was utilized to solve the OPF problem. The power factor pricing approach based on the generator capability curve was used to develop the reactive power cost function. Considering the existence of fixed shunt capacitor banks on the network, the proposed formulation was tested and provided an accurate result.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"25 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76729379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCCEEE.2018.8515874
Zeinab mahmoud Omer, Osman Ibrahim Al-Agha, Aatif osman altahir bakr, K. Bilal
The main objective of this study is to design an Adaptive Neuro Fuzzy Inference System (ANFIS) algorithm to solve the problem of finding the inverse kinematics to control the movement of the modified PUMA 560 arm in robotic system.Accuracy and stability are two major issues that face designers when control system design is intended. Tuning the system to coup with the variations and changes in the environment where the system is expected to work. In this paper the mechanical design of modified PUMA 560 robotic arm with 6 DoF was revisited and implemented with new powerful features and the experimental results were tracked. The main problem is the dynamic equations which are nonlinear and time-varying in the extreme. The challenge was how to manipulate these equations in such a way leading to a better performance regarding accuracy and stability of the system. The method used to control the base of robot arm which consists of 3-wheels with 120 degrees apart was designed and implemented. After that accurate trajectory control methods which use Adaptive Neuro Fuzzy Inference System of 3-wheels omni-directional mobile robot were implemented. Thus the design of full new robot system structure was used in the validation and testing the performance of proposed methods. This included modification of the PUMA 560 arm by the addition of an omini-directinal wheeled mobile robot (OWMR) base structure to the robotic arm. This base consisted of three motors for 3-wheels which are positioned 120 degrees apart. The resulting robot was a modified PUMA 560 robotic arm with 6 axes. The results obtained showed a significant improvement in both accuracy and stability of the system proposed. Hence, objectives were met to a great extent.
{"title":"Performance Analysis of OWMR Directional Wheels Robot Arm based on (ANFIS+PID) controller","authors":"Zeinab mahmoud Omer, Osman Ibrahim Al-Agha, Aatif osman altahir bakr, K. Bilal","doi":"10.1109/ICCCEEE.2018.8515874","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515874","url":null,"abstract":"The main objective of this study is to design an Adaptive Neuro Fuzzy Inference System (ANFIS) algorithm to solve the problem of finding the inverse kinematics to control the movement of the modified PUMA 560 arm in robotic system.Accuracy and stability are two major issues that face designers when control system design is intended. Tuning the system to coup with the variations and changes in the environment where the system is expected to work. In this paper the mechanical design of modified PUMA 560 robotic arm with 6 DoF was revisited and implemented with new powerful features and the experimental results were tracked. The main problem is the dynamic equations which are nonlinear and time-varying in the extreme. The challenge was how to manipulate these equations in such a way leading to a better performance regarding accuracy and stability of the system. The method used to control the base of robot arm which consists of 3-wheels with 120 degrees apart was designed and implemented. After that accurate trajectory control methods which use Adaptive Neuro Fuzzy Inference System of 3-wheels omni-directional mobile robot were implemented. Thus the design of full new robot system structure was used in the validation and testing the performance of proposed methods. This included modification of the PUMA 560 arm by the addition of an omini-directinal wheeled mobile robot (OWMR) base structure to the robotic arm. This base consisted of three motors for 3-wheels which are positioned 120 degrees apart. The resulting robot was a modified PUMA 560 robotic arm with 6 axes. The results obtained showed a significant improvement in both accuracy and stability of the system proposed. Hence, objectives were met to a great extent.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"20 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77110391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCCEEE.2018.8515883
M. M. Ahmed, A. Mohamed, K. Bilal, Zeinab mahmoud Omer
Cognitive radio technology provides high bandwidth to mobile users through exploiting the spectrum effectively by allowing unlicensed users to use wireless architectures for license user In addition to use dynamic spectrum access techniques. Also, there are many challenges facing the cognitive radio technology such as the quality of service for the unlicensed user, changes in the surrounding environment and mobility from frequency to frequency with the requirement not to lose connection. However, cognitive radio technology remains promising and will change the concept of communications very much. In this paper, cognitive radio was applied in the WCDMA system to allow the new user to exploit the licensed spectrum without interference between them, depending on the energy detection technique to detect holes in Spectrum licensed. The performance of secondary users in WCDMA system was evaluated using the MATLAB simulation program and compared with theoretical BER of narrowband BPSK then obtained results in form of tables and error rate curves against signal to noise ratio.
{"title":"Implementation of Cognitive Radio Technology in WCDMA System","authors":"M. M. Ahmed, A. Mohamed, K. Bilal, Zeinab mahmoud Omer","doi":"10.1109/ICCCEEE.2018.8515883","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515883","url":null,"abstract":"Cognitive radio technology provides high bandwidth to mobile users through exploiting the spectrum effectively by allowing unlicensed users to use wireless architectures for license user In addition to use dynamic spectrum access techniques. Also, there are many challenges facing the cognitive radio technology such as the quality of service for the unlicensed user, changes in the surrounding environment and mobility from frequency to frequency with the requirement not to lose connection. However, cognitive radio technology remains promising and will change the concept of communications very much. In this paper, cognitive radio was applied in the WCDMA system to allow the new user to exploit the licensed spectrum without interference between them, depending on the energy detection technique to detect holes in Spectrum licensed. The performance of secondary users in WCDMA system was evaluated using the MATLAB simulation program and compared with theoretical BER of narrowband BPSK then obtained results in form of tables and error rate curves against signal to noise ratio.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"16 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80931261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCCEEE.2018.8515864
SalahAddin A. Almogahed, I. Abuel Maaly
Wireless Sensor Networks (WSNs) have become one of the most motivating research areas. In this paper we have proposed an Optimized Distributed Energy Efficient Clustering scheme for Heterogeneous WSNs (ODEEC) to prolong the network lifetime and stability period. This protocol proposes an optimization of the Cluster Head (CH) selection by modifying the probability function of heterogeneity. The network field is classified into two parts inner region and outer region. The sensor nodes decide to become cluster head nodes or not based on their positions from Base Station (BS) as well as the probabilities of heterogeneity model. Simulation results show that ODEEC achieves better performance among the relevant protocols in terms of throughput as well as network lifetime and stability period.
{"title":"Optimized Distributed Energy Efftcient Clustering Scheme for Heterogeneous WSNs","authors":"SalahAddin A. Almogahed, I. Abuel Maaly","doi":"10.1109/ICCCEEE.2018.8515864","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515864","url":null,"abstract":"Wireless Sensor Networks (WSNs) have become one of the most motivating research areas. In this paper we have proposed an Optimized Distributed Energy Efficient Clustering scheme for Heterogeneous WSNs (ODEEC) to prolong the network lifetime and stability period. This protocol proposes an optimization of the Cluster Head (CH) selection by modifying the probability function of heterogeneity. The network field is classified into two parts inner region and outer region. The sensor nodes decide to become cluster head nodes or not based on their positions from Base Station (BS) as well as the probabilities of heterogeneity model. Simulation results show that ODEEC achieves better performance among the relevant protocols in terms of throughput as well as network lifetime and stability period.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"30 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87416101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCCEEE.2018.8515859
Khadiga Omer, G. Abdalla
Data grid is one of the most popular grid computing implementations concerning data management system and data replication technologies. The aim of data replication is to increase availability, fault tolerance, load balancing and scalability while reducing bandwidth consumption, and job execution time. In this paper we investigate Data grid as a solution for the internal network traffic bottleneck at the University of Khartoum due to high numbers of users by replicating the internal systems of the University closer to the users. OptorSim Grid simulator was used to study the behavior of the various dynamic replication algorithms and to evaluate their performance metrics. The results showed that the predictive algorithms are the most effective at optimizing computing and storage resources and they offer the best effective network usage. Other metrics such as the thread numbers at each computing element and the bandwidth range to particular site in comparison to the number of executed jobs were also evaluated. It was found that the thread number was inversely related to the mean job time while the link bandwidth of a particular site was proportionally related to the number of jobs been executed on that site.
{"title":"Dynamic Algorithms Replication Using Grid Computing","authors":"Khadiga Omer, G. Abdalla","doi":"10.1109/ICCCEEE.2018.8515859","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515859","url":null,"abstract":"Data grid is one of the most popular grid computing implementations concerning data management system and data replication technologies. The aim of data replication is to increase availability, fault tolerance, load balancing and scalability while reducing bandwidth consumption, and job execution time. In this paper we investigate Data grid as a solution for the internal network traffic bottleneck at the University of Khartoum due to high numbers of users by replicating the internal systems of the University closer to the users. OptorSim Grid simulator was used to study the behavior of the various dynamic replication algorithms and to evaluate their performance metrics. The results showed that the predictive algorithms are the most effective at optimizing computing and storage resources and they offer the best effective network usage. Other metrics such as the thread numbers at each computing element and the bandwidth range to particular site in comparison to the number of executed jobs were also evaluated. It was found that the thread number was inversely related to the mean job time while the link bandwidth of a particular site was proportionally related to the number of jobs been executed on that site.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"8 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85957215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCCEEE.2018.8515868
Gaafar E. G. Mustafa, Y. Y. Ahmed, M. Nawari
Modelling of economy systems is critical as it provides means of addressing and future forecasting of economic outcomes, hence accurate models should be developed. The purpose of this research is to show the effectiveness of Machine Learning approaches in modelling of economy systems. The economy of Sudan is used to reflect this objective, taking the Gross Domestic Product (GDP) as a monetary measure of economy. It was found that Agriculture, Industry and Service are the main contributors of Sudan’s GDP in accordance to the GDP data of Sudan from 1960 to 2016. In this research, Regression and Support Vector Machine algorithms were used to develop two different models of Sudan’s economy. Both models have produced satisfying results in predicting, however the SVM model has out-performed the Polynomial Regression model.
{"title":"Modelling of Sudan’s Economy Composition using Machine Leaming Approaches","authors":"Gaafar E. G. Mustafa, Y. Y. Ahmed, M. Nawari","doi":"10.1109/ICCCEEE.2018.8515868","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515868","url":null,"abstract":"Modelling of economy systems is critical as it provides means of addressing and future forecasting of economic outcomes, hence accurate models should be developed. The purpose of this research is to show the effectiveness of Machine Learning approaches in modelling of economy systems. The economy of Sudan is used to reflect this objective, taking the Gross Domestic Product (GDP) as a monetary measure of economy. It was found that Agriculture, Industry and Service are the main contributors of Sudan’s GDP in accordance to the GDP data of Sudan from 1960 to 2016. In this research, Regression and Support Vector Machine algorithms were used to develop two different models of Sudan’s economy. Both models have produced satisfying results in predicting, however the SVM model has out-performed the Polynomial Regression model.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"1 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89751699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCCEEE.2018.8515848
Ahmed A. Ghanem, K. Bilal
Due to of the fast growth in network technology structure and spread uses in all our life, in the same time the networks threated are rapidly increased. This paper presents an edge to edge model. The aim is to detect intrusion in the networks with little effort on the network resources. by monitoring and detecting the Denial of Service / Distributed Denial of Service (DoS/DDoS) attacks in case of network congestion and their impact on priority level of users. Hybrid threshold used to know if users are violating the network services or not. Random Early Detection (RED) threshold is an adaptive threshold moves between minimum and maximum values, Service Level Agreement (SLA) threshold is a predefined values determined between customer and service provider (SP). RED algorithm used in Quality of Service (QoS) DiffServ environment to monitor the network, when notice the suspicious users exceed the Hybrid threshold, the Detecting Violation in DiffServ Priority (DVDP) model moves to other phase and computes the throughput for suspicious users. This model used Network Simulator 2 (NS2) to simulate the proposed network, this network has users with low level priority triggered a lot of traffic and effected on the high level priority users and consume their bandwidth. This model detect the malicious users affected on the users have high priority, and differentiate with legal users. The accuracy on detected the malicious users estimates about 94%, and a very high sensitivity to the abnormal traffic.
由于网络技术结构的快速发展和在我们生活中的广泛应用,与此同时,网络所面临的威胁也迅速增加。本文提出了一种边缘到边缘模型。其目的是在网络资源消耗很小的情况下检测网络中的入侵。通过监控和检测网络拥塞情况下的拒绝服务/分布式拒绝服务(DoS/DDoS)攻击及其对用户优先级的影响。混合阈值用于判断用户是否违反网络服务。RED (Random Early Detection)阈值是在最大值和最小值之间移动的自适应阈值,SLA (Service Level Agreement)阈值是客户和服务提供商(SP)之间确定的预定义值。RED算法用于QoS (Quality of Service) DiffServ环境下对网络进行监控,当注意到可疑用户超过混合阈值时,DiffServ优先级(DVDP)模型中的检测违规转移到其他阶段,计算可疑用户的吞吐量。该模型使用网络模拟器2 (NS2)来模拟所提出的网络,该网络中具有低优先级的用户触发了大量的流量并影响了高优先级的用户并消耗了他们的带宽。该模型对受影响的恶意用户进行检测,对用户具有高优先级,并与合法用户进行区分。检测到恶意用户的准确率估计在94%左右,对异常流量具有很高的敏感性。
{"title":"Detecting Violation in DiffServ Priority","authors":"Ahmed A. Ghanem, K. Bilal","doi":"10.1109/ICCCEEE.2018.8515848","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515848","url":null,"abstract":"Due to of the fast growth in network technology structure and spread uses in all our life, in the same time the networks threated are rapidly increased. This paper presents an edge to edge model. The aim is to detect intrusion in the networks with little effort on the network resources. by monitoring and detecting the Denial of Service / Distributed Denial of Service (DoS/DDoS) attacks in case of network congestion and their impact on priority level of users. Hybrid threshold used to know if users are violating the network services or not. Random Early Detection (RED) threshold is an adaptive threshold moves between minimum and maximum values, Service Level Agreement (SLA) threshold is a predefined values determined between customer and service provider (SP). RED algorithm used in Quality of Service (QoS) DiffServ environment to monitor the network, when notice the suspicious users exceed the Hybrid threshold, the Detecting Violation in DiffServ Priority (DVDP) model moves to other phase and computes the throughput for suspicious users. This model used Network Simulator 2 (NS2) to simulate the proposed network, this network has users with low level priority triggered a lot of traffic and effected on the high level priority users and consume their bandwidth. This model detect the malicious users affected on the users have high priority, and differentiate with legal users. The accuracy on detected the malicious users estimates about 94%, and a very high sensitivity to the abnormal traffic.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"7 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89111595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCCEEE.2018.8515761
Abdelrahman Altigani, S. Hasan, Bazara I. A. Barry, S. Shamsuddin
Rijndael has been selected by the National Institute for Standards and Technology (NIST) as the Advanced Encryption Standard (AES). In compliance with Kerckhoffs's principle, and to preserve and promote interoperability, the design and internal operation of AES must remain open. However, we suggest that there is no need to retain the static nature of the design. Consequently, this research paper main objective is to introduce a dynamic algorithm, that determines the exact steps used for encrypting or decrypting payloads during execution time. This has been achieved by making AES parameters key dependent, rather than reuse fixed, pre-determined values.The result is an armored version of the AES that changes its internal design with almost every new encryption key. The proposed design is provided and analyzed in terms of security, implementation cost and possibility for further improvements.
{"title":"Key-dependent Advanced Encryption Standard","authors":"Abdelrahman Altigani, S. Hasan, Bazara I. A. Barry, S. Shamsuddin","doi":"10.1109/ICCCEEE.2018.8515761","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515761","url":null,"abstract":"Rijndael has been selected by the National Institute for Standards and Technology (NIST) as the Advanced Encryption Standard (AES). In compliance with Kerckhoffs's principle, and to preserve and promote interoperability, the design and internal operation of AES must remain open. However, we suggest that there is no need to retain the static nature of the design. Consequently, this research paper main objective is to introduce a dynamic algorithm, that determines the exact steps used for encrypting or decrypting payloads during execution time. This has been achieved by making AES parameters key dependent, rather than reuse fixed, pre-determined values.The result is an armored version of the AES that changes its internal design with almost every new encryption key. The proposed design is provided and analyzed in terms of security, implementation cost and possibility for further improvements.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"12 5","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91421086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCCEEE.2018.8515797
G. Kalcon, Mazen Khaled
Due to the ever increasing demand of power, economic and environmental constraints that limit the expansion and restructuring transmission networks, the transmission lines are prone to be operated under heavily stress conditions, and power systems to operate near critical limits. This paper investigates the problem and different scenarios to improve the power transfer capability of Atbara-Portsudan single circuit 220kV radial transmission line as one of the Sudan Grid problems. This line was selected depending on line indices such as Fast Voltage Stability Index (FVSI), Line Stability Index (Lmn), U-Q sensitivities. Simulation was carried out using NEPLAN software, based on real data given from National Load Dispatch Center (NLDC) in Sudan. All the results presented in comparison form to find the best scenario.
{"title":"Performance Enhancement of Atbara-Portsudan Radial Transmission Line Using NEPLAN Simulator","authors":"G. Kalcon, Mazen Khaled","doi":"10.1109/ICCCEEE.2018.8515797","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515797","url":null,"abstract":"Due to the ever increasing demand of power, economic and environmental constraints that limit the expansion and restructuring transmission networks, the transmission lines are prone to be operated under heavily stress conditions, and power systems to operate near critical limits. This paper investigates the problem and different scenarios to improve the power transfer capability of Atbara-Portsudan single circuit 220kV radial transmission line as one of the Sudan Grid problems. This line was selected depending on line indices such as Fast Voltage Stability Index (FVSI), Line Stability Index (Lmn), U-Q sensitivities. Simulation was carried out using NEPLAN software, based on real data given from National Load Dispatch Center (NLDC) in Sudan. All the results presented in comparison form to find the best scenario.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"34 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91546228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCCEEE.2018.8515793
S. M. Ibrahim, Magdi A. O. Mohammed, Y. E. Ahmed
Computer and its applications have entered various fields of applied sciences and engineering, for instance, Computer Aided Design (CAD) is being efficiently used for devices and equipment design, reducing the design calculations complexity in reliable manner. Regarding to food engineering, which deals with devices, equipment and food substances together, it uses in order to facilitate and accelerate the process of conducting engineering calculations. This study aimed to use specific computer programs, namely MatLab and Visual Basic, to develop a software system to audit the complex design calculations of single screw extruder. Extrusion is defined simply as the act of forcing something through an orifice, it is finding ever-increasing application in the food industry, such as the production of ready-to-eat cereals, pasta, snacks, pet food, fish foods, and confectionary products, apart from its obvious applications in the plastics industry. The results of this study might be later used in unit operation laboratories, or in food processing equipment manufacturing plants in general. For this purpose, using engineering equations of this extruder, the necessary algorithm was created and then the codes were written for each program. After that, interfaces were opened, and then they were supplied with all necessary components to perform calculations as required. To verify and estimate the proposed system, the traditional manual calculation methods were used to obtain reliable results first, and then MATLAB and Visual Basic programs were used to generate these calculations. The experimental results have expressed that the required engineering computational results, that required to design of single screw extruder, according to the input data were found. A comparison study was carried out between the results obtained traditionally and those obtained using the MATLAB and Visual Basic programs; also engineering calculations for other extruders were performed with different data in the same manner. It was found that the accuracy and speedily results of these operations were confirmed.
{"title":"Single Screw Extruder Design Calculations using MatLab and Visual Basic","authors":"S. M. Ibrahim, Magdi A. O. Mohammed, Y. E. Ahmed","doi":"10.1109/ICCCEEE.2018.8515793","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515793","url":null,"abstract":"Computer and its applications have entered various fields of applied sciences and engineering, for instance, Computer Aided Design (CAD) is being efficiently used for devices and equipment design, reducing the design calculations complexity in reliable manner. Regarding to food engineering, which deals with devices, equipment and food substances together, it uses in order to facilitate and accelerate the process of conducting engineering calculations. This study aimed to use specific computer programs, namely MatLab and Visual Basic, to develop a software system to audit the complex design calculations of single screw extruder. Extrusion is defined simply as the act of forcing something through an orifice, it is finding ever-increasing application in the food industry, such as the production of ready-to-eat cereals, pasta, snacks, pet food, fish foods, and confectionary products, apart from its obvious applications in the plastics industry. The results of this study might be later used in unit operation laboratories, or in food processing equipment manufacturing plants in general. For this purpose, using engineering equations of this extruder, the necessary algorithm was created and then the codes were written for each program. After that, interfaces were opened, and then they were supplied with all necessary components to perform calculations as required. To verify and estimate the proposed system, the traditional manual calculation methods were used to obtain reliable results first, and then MATLAB and Visual Basic programs were used to generate these calculations. The experimental results have expressed that the required engineering computational results, that required to design of single screw extruder, according to the input data were found. A comparison study was carried out between the results obtained traditionally and those obtained using the MATLAB and Visual Basic programs; also engineering calculations for other extruders were performed with different data in the same manner. It was found that the accuracy and speedily results of these operations were confirmed.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"57 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90998925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}