SlideShare a Scribd company logo
1 of 6
Download to read offline
Indonesian Journal of Electrical Engineering and Computer Science
Vol. 5, No. 3, March 2017, pp. 502 ~ 507
DOI: 10.11591/ijeecs.v5.i3.pp502-507  502
Received September 2, 2016; Revised January 25, 2017; Accepted February 11, 2017
Active Node Detection in A Reconfigurable Microgrid
Using Minimum Spanning Tree Algorithms
Anay Majee*, Souradeep Nanda, Gnana Swathika O.V
VIT University Chennai Campus, India, School of Electrical Engineering (SELECT)
*Corresponding author, e-mail: anay.majee2014@vit.ac.in
Abstract
Microgrids are the solution to the growing demand for energy in the recent times. It has the
potential to improve local reliability, reduce cost and increase penetration rates for distributed renewable
energy generation. Inclusion of Renewable Energy Systems(RES) which have become the topic of
discussion in the recent times due to acute energy crisis, causes the power flow in the microgrid to be bi-
directional in nature. The presence of the RES in the microgrid system causes the grid to be
reconfigurable. This reconfiguration might also occur due to load or utility grid connection and
disconnection. Thus conventional protection strategies are not applicable to micro-grids and is hence
challenging for engineers to protect the grid in a fault condition. In this paper various Minimum Spanning
Tree(MST) algorithms are applied in microgrids to identify the active nodes of the current topology of the
network in a heuristic approach and thereby generating a tree from the given network so that minimum
number of nodes have to be disconnected from the network during fault clearance. In the paper we have
chosen the IEEE-39 and IEEE-69 bus networks as our sample test systems.
Keywords: minimum spanning tree, microgrid protection
Copyright © 2017 Institute of Advanced Engineering and Science. All rights reserved.
1. Introduction
Microgrid is defined as a cluster of small sources, storage systems, and loads, which
presents itself to the main grid as a single, flexible, and controllable entity [1], [2]. IEEE Std
1547.4-2011 states Distributed Resource (DR) island systems or micro-grids as electric power
systems (EPS) that include:
a. DR and load,
b. The ability to disconnect from and parallel with the area EPS,
c. The local EPS and may include portions of the area EPS, and
d. Intentionally planned.
Microgrid structure is a more independent form than the grid network by using the
concept of bi-directional power flow, on-site generation and storage. They are capable of acting
in two modes, the grid connected mode and islanded mode [3].
The microgrid when operated in grid connected mode supplies or draws power to the
utility grid depending on the generation and demand from the load side. But the microgrid can
shift to an islanded mode in emergency situations or in situation of a power shortage [4]. In such
a situation the DGs in the network supply power to the loads. The bi-directional power flow in a
microgrid forbids the existence of any specified protocol for fault rectification due to continuously
changing configuration of the microgrid.
The Central Protection Centre (CPC) monitors the status of the DGs, loads and the
utility grid in a microgrid system. In view of creating a protection system for the microgrid various
constraints have been considered. At first, if fault exists within a micro-grid the utility side
consumers should remain unaffected. Secondly, backup protection has been enabled for both
grid connected and islanded modes of operation. Lastly, the selectivity and speed should be in
an acceptable level. Communication assisted protection strategies are a common solution to
protect the microgrid [5-9]. Common issues like sympathetic tripping, false tripping, blind zone,
variation in fault levels and unwanted islanding are caused due to the impact of distributed
generations [10].
Since the microgrid changes its configuration at every instant of time based on the load
condition, there has to be an automatic system to detect the active nodes present in the grid at
IJEECS ISSN: 2502-4752 
Active Node Detection in A Reconfigurable Microgrid Using Minimum… (Anay Majee)
503
that instant of time. This is done by graph theory algorithms, namely the Minimal Spanning Tree
algorithm (MST). The MST converts a complex grid into its simpler derivative- a tree, which can
be analysed to find out the shortest path between a particular node and the root node. This is
particularly important in case of microgrids as because in case of a fault the current has to flow
back to the main grid by disconnecting the minimum number of nodes in the network.
In this paper the performance of multiple MST algorithms are analysed by applying
them to the standard microgrid networks (IEEE-39, IEEE-69), and thereby identifying the best
suited algorithm for the purpose of fault detection and rectification.
2. Research Method
2.1. The Active Node Detection Problem
In a microgrid system which consists of renewable energy systems(RES) not all nodes
are active at the same time. In such a reconfigurable structure the size and number of nodes in
the grid does not remain constant. To cope up with such a problem, the minimum spanning tree
algorithm is employed on microgrids [18].
A graph may contain a number of trees formed but this algorithm generates a tree in
which the distance between the source and the nodes are minimum. Thus the MST converts a
cyclic graph to an acyclic tree and also aids in finding the shortest distance between the fault
node and the source (main grid). If a node with a fault is identified, then the traversal from the
fault node to the source up the MST will be the shortest path to be followed.
This paper applies Boruvka’s, Prim’s and Kruskal’s algorithms to identify the active
nodes of the network. The performance of the algorithms are analysed and the best suited
algorithm is selected for fault clearance in microgrid systems.
2.2. Boruvka's algorithm
Boruvka's algorithm was first introduced to construct an efficient electricity network for
Moravia [19]. Boruvka's algorithm takes a graph G = (V,E). For each vertex v, the algorithm
adds the edge with the smallest edge into the tree. If the edge is already added, the algorithm
moves on to the next vertex. The algorithm then joins these islands to form the minimum
spanning tree.
Pseudocode:
function borovka(G):
T = forest of one-vertex trees (one for each vertex)
while size of T > 1:
for each tree t in T:
S = {} (Empty set of edges)
for each vertex in t:
for each vertex v in t:
S union the cheapest edge originating from v which does not connect to any
vertex in the tree t
insert the cheapest edge of S in T
Merge all trees in T which are connected
return T
Complexity: The outer loop of the algorithm runs O(log V) times. The inner loop runs at most
once for each edge E. Therefore the algorithm runs in O(E log V). The algorithm however can
be made to run in linear time for planar graphs by removing all but the cheapest edge between
each pair of components after each stage of algorithm [20].
2.3 Prim’s Algorithm
Prim’s Algorithm is a greedy algorithm which starts with an empty spanning tree with an
idea to maintain two sets of vertices. The first set contains the vertices already included in the
MST, while the vertices not contained are included in the second set. At each step, the
algorithm picks up the edges that connect the two sets and the minimum weight edge from
these edges are picked. The end point of the edge picked is then moved to the set containing
the MST.
 ISSN: 2502-4752
IJEECS Vol. 5, No. 3, March 2017 : 502 – 507
504
Pseudocode:
function primMst(G)
s = select a random node
closed_set = {s}
open_set = nodes adjacent to s
n = number of vertices of G
repeat n - 1 times
u = node with least weight in open set
remove u from open set
add u to closed set
add all neighbours of u to open set
end
end
Complexity: Time Complexity of the above algorithm is O(V^2), where V is the number of
vertices. If the input graph is represented using adjacency list, then the time complexity can be
reduced to O(E log V).
2.4. Kruskal’s Algorithm
Kruskal’s Algorithm finds a safe edge to add to the growing forest by finding, of all the
edges that connect any two trees in the forest, an edge (U,V), of least weight. It is a greedy
algorithm as at each step it adds to the forest an edge of least possible weight [18]. Determining
whether adding an edge is safe or not is done by checking whether it would form any cycles.
This is done my recording the parent of each node in a tree of the forest. If the two nodes of the
edge have the same root, then a cycle is formed.
Pseudocode:
function kruskalMst(G)
E = set of all edges in G sorted according to weight
n = number of vertices in G
T = empty tree
for each egde e in E
if adding e does not cause a cycle in T then
add e to T
end
end
end
Complexity: O(ElogE) or O(ElogV).
3. Results and Analysis
3.1. Simulation Results
The Boruvka’s, Prim’s and Kruskal’s algorithms are tested on a IEEE-39 bus and IEEE-
69 bus distributed system. According to the concept of minimum spanning tree there can exist
only one path from a particular node to the source [11-17]. This is possible only if the graph is
converted to a tree. In the simulation result the shortest path is obtained by finding out only the
predecessors of the fault node till the source node (1 in our case) is reached.
3.2. Experimental Results
Consider the IEEE 39 and 69 bus networks in Figure 1 and Figure 2. Let node 1 be the
base node. Assume the fault occurs close to node 22 in both the networks. In the 39 bus
network, the path length includes 11 edges, whereas in the 69 bus network it includes 20
edges. Table 1 shows the results for 100 iterations(in seconds) of the time taken to find the
active nodes in the microgrid test systems.
In Figure 1 (the 69- bus system), the shortest path obtained after forming the MST is as
shown in Figure 3. For a fault occurring close to node 22 the path is:
22->23->24->25->26->27->65->64->63->62->61->60->59->50->49->48->47->4->3->2->1
IJEECS ISSN: 2502-4752 
Active Node Detection in A Reconfigurable Microgrid Using Minimum… (Anay Majee)
505
Weights :20 (assuming equal weights)
In Figure 2 (the 39- bus system), the shortest path obtained after forming the MST is as shown
in Fig 4. For a fault occurring close to node 22 the path is:
22->23->24->16->15->14->4->5->8->9->39->1
Weights :11 (assuming equal weights)
Table 1. Empirical analysis of the various algorithms on 39 and 69 bus systems.
Algorithm 39 Bus Network 69 Bus Network
Time taken(ms) Std. deviation(sec) Time taken(ms) Std. deviation(sec)
Prim 1.2 3.9936e-04 1.5 5.2912e-04
Kruskal 1.1 3.8664e-04 1.2 5.0328e-04
Boruvka 1.2 3.9566e-04 1.3 5.1299e-04
Figure 1. IEEE 69 bus distributed network Figure 3. Simulation Result for shortest
path identification on 69 bus network
The application of algorithms to microgrids thereby aids in identifying the active
nodes of the reconfigurable network at that instant of time. From the results in Table 1 it is
identified that application of Kruskal’s algorithm takes minimum time to find the MST and in turn
identifies the shortest path for fault clearance which may cause minimum load disconnections in
 ISSN: 2502-4752
IJEECS Vol. 5, No. 3, March 2017 : 502 – 507
506
Figure 2. IEEE 39 bus distributed network
Figure 4. Simulation Result on the 39 bus network with fault at node 22
IJEECS ISSN: 2502-4752 
Active Node Detection in A Reconfigurable Microgrid Using Minimum… (Anay Majee)
507
4. Conclusion
Fault clearance in a hybrid microgrid is quite a challenging task for protection engineers
due to continuous reconfiguration of the grid. Thus it is necessary to rely on automatic
computerised systems to solve such issues. This paper employs minimum spanning tree
algorithms on IEEE-39 and IEEE-69 bus microgrid networks conveniently to identify the active
nodes of the network which eventually generates the shortest path from the faulted point to the
nearest operating source. The validations prove that the algorithms can be employed on any
microgrid network and may cause minimum load centre disconnection. Based on the
experimental results that have been employed it is confirmed that even microseconds of delay
in disconnection of a faulted portion from the main grid can cause severe damage to
appliances. Keeping this in mind Kruskal’s algorithm can be suggested as a suitable algorithm
for finding out the minimum spanning tree in a connected graph.
References
[1] B Lasseter, Microgrids [distributed power generation], Power Eng. Soc. Winter Meet. 2001. IEEE, 1C:
146-149.
[2] C Marnay, FJ Robio, AS Siddiqui, Shape of the microgrid, Power Eng. Soc. Winter Meet. 2001. IEEE,
1(c): 150–153.
[3] Hannu Laaksonen, Dmitry Ishchenko, Alexandre Oudalov. Adaptive Protection and Microgrid Control
Design for Hailuoto Island. IEEE Transactions on Smart Grid. 2014; 5(3).
[4] Kalpesh C Soni, Firdaus F Belim. MicroGrid during Grid- connected mode and Islanded mode- A
review. International Journal of Advance Engineering and Research Development. 2015: sl no-57.
[5] Wen Lu, Yangdong Zhao, Weixing Li, Hongwei Du. Design and application of microgrid operation
control system based on IEC 61850. Springer: Journal of Mod. Power Syst. Clean Energy. 2014;
2(3): 256-63.
[6] Liang Che, E. Mohammad Khodayar, Mohammad Shahidehpour. Adaptive Protection System for
Microgrids. IEEE Electrification Magazine. 2014.
[7] C Vassilis Nikolaidis, Evangelos Papanikolaou, S Anastasia Safigianni. A Communication-Assisted
Overcurrent Protection Scheme for Radial Distribution Systems with Distributed Generation. IEEE
Transaction on Smart Grid. Article in Press. 2015.
[8] Hashem Mortazavi, Hasan Mehrjerdi, MaaroufSaad, Serge Lefebvre, DalalAsber, Laurent Lenoir. A
Monitoring Technique for Reversed Power Flow Detection with High PV Penetration Level, IEEE
Transactions on Smart Grid. 2015; 6(5): 2221–2232.
[9] Taha Selim Ustun, H Reduan Khan. Multiterminal Hybrid Protection of Microgrids Over Wireless
Communications Network. IEEE Transactions on Smart Grid. 2015; 6(5): 2493-2500.
[10] AHA Bakar, Ban Juan Ooi, P Govindasamy, Chia Kwang Tan, HA Illias AH. Mokhlis. Directional
overcurrent and earth-fault protections for a biomass microgrid system in Malaysia. Electrical Power
and Energy Systems. 2015; (55): 581–591.
[11] Swathika OG, Hemamalini S. Prims Aided Dijkstra Algorithm for Adaptive Protection in Microgrids.
IEEE Journal of Emerging and Selected Topics in Power Electronics. 2015; 4(4): 1279-1286.
[12] Swathika OG, Hemamalini S. Kruskal Aided Floyd Warshall Algorithm for shortest path identification
in microgrids. ARPN Journal of Engineering and Applied Sciences. 2015; 10(15): 6614-6618.
[13] Swathika OG, Hemamalini S. PLC Based LV-DG Synchronization in Real-Time Microgrid Network.
ARPN Journal of Engineering and Applied Sciences. 2016; 11(5): 3193-3197.
[14] Swathika OG, Hemamalini S. Relay Coordination in Real-Time Microgrid for varying load demands.
ARPN Journal of Engineering and Applied Sciences. 2016;11(5):.3222-3227.
[15] Swathika OG, Hemamalini S. Communication Assisted Overcurrent Protection of Microgrid.
International Conference on Computational Intelligence and Communication Networks (CICN). 2015:
1472-1475.
[16] Swathika OG, Karthikeyan, K Hemamalini S. Multiple DG Synchronization and Desynchronization in
a Microgrid Using PLC. In Advanced Computing and Communication Technologies. Springer
Singapore. 2016: 565-572.
[17] Swathika OG, Hemamalini S. Adaptive and Intelligent Controller for Protection in Radial Distribution
System. In Advanced Computer and Communication Engineering Technology. Springer International
Publishing. 2016: 195-209.
[18] Thomas H Cormen, Charles E Leiserson, Ronald L. Rivest and Clifford Stein, Introduction to
Algorithms,3rd ed,PHL Learning Pvt. Ltd, 2014.
[19] Boruvka, Otakar. O jistém problému minimálním [About a certain minimal problem]. Práce mor.
prírodoved. spol. v Brne III (in Czech and German). 3: 37–58.
[20] Boruvka, Otakar. Príspevek k rešení otázky ekonomické stavby elektrovodních sítí (Contribution to
the solution of a problem of economical construction of electrical networks). Elektronický Obzor (in
Czech). 1926; 15: 153–154.

More Related Content

What's hot

Energy-Efficient Hybrid K-Means Algorithm for Clustered Wireless Sensor Netw...
Energy-Efficient Hybrid K-Means Algorithm for Clustered  Wireless Sensor Netw...Energy-Efficient Hybrid K-Means Algorithm for Clustered  Wireless Sensor Netw...
Energy-Efficient Hybrid K-Means Algorithm for Clustered Wireless Sensor Netw...IJECEIAES
 
Precision based data aggregation to extend life of wsn
Precision based data aggregation to extend life of wsnPrecision based data aggregation to extend life of wsn
Precision based data aggregation to extend life of wsnGaurang Rathod
 
3.a heuristic based_multi-22-33
3.a heuristic based_multi-22-333.a heuristic based_multi-22-33
3.a heuristic based_multi-22-33Alexander Decker
 
Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...
Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...
Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...IJERA Editor
 
Numerical simulation of electromagnetic radiation using high-order discontinu...
Numerical simulation of electromagnetic radiation using high-order discontinu...Numerical simulation of electromagnetic radiation using high-order discontinu...
Numerical simulation of electromagnetic radiation using high-order discontinu...IJECEIAES
 
Novel_antenna_concepts_via_coordinate_tr
Novel_antenna_concepts_via_coordinate_trNovel_antenna_concepts_via_coordinate_tr
Novel_antenna_concepts_via_coordinate_trXinying Wu
 
Simulation of Single and Multilayer of Artificial Neural Network using Verilog
Simulation of Single and Multilayer of Artificial Neural Network using VerilogSimulation of Single and Multilayer of Artificial Neural Network using Verilog
Simulation of Single and Multilayer of Artificial Neural Network using Verilogijsrd.com
 
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...IDES Editor
 
Multistage interconnection networks a transition to optical
Multistage interconnection networks a transition to opticalMultistage interconnection networks a transition to optical
Multistage interconnection networks a transition to opticaleSAT Publishing House
 
Using spectral radius ratio for node degree
Using spectral radius ratio for node degreeUsing spectral radius ratio for node degree
Using spectral radius ratio for node degreeIJCNCJournal
 
Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...
Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...
Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...csandit
 
Assignment of cells to switches using firefly algorithm
Assignment of cells to switches using firefly algorithmAssignment of cells to switches using firefly algorithm
Assignment of cells to switches using firefly algorithmiaemedu
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Efficient Design of 64:1 Hybridized MUX for Low Area and Power VLSI
Efficient Design of 64:1 Hybridized MUX  for Low Area and Power VLSIEfficient Design of 64:1 Hybridized MUX  for Low Area and Power VLSI
Efficient Design of 64:1 Hybridized MUX for Low Area and Power VLSIIJEEE
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manetgraphhoc
 
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)ijcseit
 

What's hot (18)

Energy-Efficient Hybrid K-Means Algorithm for Clustered Wireless Sensor Netw...
Energy-Efficient Hybrid K-Means Algorithm for Clustered  Wireless Sensor Netw...Energy-Efficient Hybrid K-Means Algorithm for Clustered  Wireless Sensor Netw...
Energy-Efficient Hybrid K-Means Algorithm for Clustered Wireless Sensor Netw...
 
La3518941898
La3518941898La3518941898
La3518941898
 
Precision based data aggregation to extend life of wsn
Precision based data aggregation to extend life of wsnPrecision based data aggregation to extend life of wsn
Precision based data aggregation to extend life of wsn
 
3.a heuristic based_multi-22-33
3.a heuristic based_multi-22-333.a heuristic based_multi-22-33
3.a heuristic based_multi-22-33
 
Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...
Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...
Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...
 
Numerical simulation of electromagnetic radiation using high-order discontinu...
Numerical simulation of electromagnetic radiation using high-order discontinu...Numerical simulation of electromagnetic radiation using high-order discontinu...
Numerical simulation of electromagnetic radiation using high-order discontinu...
 
Novel_antenna_concepts_via_coordinate_tr
Novel_antenna_concepts_via_coordinate_trNovel_antenna_concepts_via_coordinate_tr
Novel_antenna_concepts_via_coordinate_tr
 
Simulation of Single and Multilayer of Artificial Neural Network using Verilog
Simulation of Single and Multilayer of Artificial Neural Network using VerilogSimulation of Single and Multilayer of Artificial Neural Network using Verilog
Simulation of Single and Multilayer of Artificial Neural Network using Verilog
 
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...
 
Multistage interconnection networks a transition to optical
Multistage interconnection networks a transition to opticalMultistage interconnection networks a transition to optical
Multistage interconnection networks a transition to optical
 
Using spectral radius ratio for node degree
Using spectral radius ratio for node degreeUsing spectral radius ratio for node degree
Using spectral radius ratio for node degree
 
Static Networks
Static NetworksStatic Networks
Static Networks
 
Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...
Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...
Effect of Rigidity on Trilateration Technique for Localization in Wireless Se...
 
Assignment of cells to switches using firefly algorithm
Assignment of cells to switches using firefly algorithmAssignment of cells to switches using firefly algorithm
Assignment of cells to switches using firefly algorithm
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Efficient Design of 64:1 Hybridized MUX for Low Area and Power VLSI
Efficient Design of 64:1 Hybridized MUX  for Low Area and Power VLSIEfficient Design of 64:1 Hybridized MUX  for Low Area and Power VLSI
Efficient Design of 64:1 Hybridized MUX for Low Area and Power VLSI
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manet
 
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
 

Similar to 04 15029 active node ijeecs 1570310145(edit)

Analysis of Genetic Algorithm for Effective power Delivery and with Best Upsurge
Analysis of Genetic Algorithm for Effective power Delivery and with Best UpsurgeAnalysis of Genetic Algorithm for Effective power Delivery and with Best Upsurge
Analysis of Genetic Algorithm for Effective power Delivery and with Best Upsurgeijeei-iaes
 
Design Optimization of Energy and Delay Efficient Wireless Sensor Network wit...
Design Optimization of Energy and Delay Efficient Wireless Sensor Network wit...Design Optimization of Energy and Delay Efficient Wireless Sensor Network wit...
Design Optimization of Energy and Delay Efficient Wireless Sensor Network wit...IOSR Journals
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ijasuc
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ijasuc
 
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...pijans
 
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...ijasuc
 
Energy Efficient Clustering and Routing in Mobile Wireless Sensor Network
Energy Efficient Clustering and Routing in Mobile Wireless Sensor NetworkEnergy Efficient Clustering and Routing in Mobile Wireless Sensor Network
Energy Efficient Clustering and Routing in Mobile Wireless Sensor Networkijwmn
 
Routing management for mobile ad hoc networks
Routing management for mobile ad hoc networksRouting management for mobile ad hoc networks
Routing management for mobile ad hoc networksIAEME Publication
 
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKSOPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKSZac Darcy
 
Optimum Network Reconfiguration using Grey Wolf Optimizer
Optimum Network Reconfiguration using Grey Wolf OptimizerOptimum Network Reconfiguration using Grey Wolf Optimizer
Optimum Network Reconfiguration using Grey Wolf OptimizerTELKOMNIKA JOURNAL
 
NODE FAILURE TIME ANALYSIS FOR MAXIMUM STABILITY VS MINIMUM DISTANCE SPANNING...
NODE FAILURE TIME ANALYSIS FOR MAXIMUM STABILITY VS MINIMUM DISTANCE SPANNING...NODE FAILURE TIME ANALYSIS FOR MAXIMUM STABILITY VS MINIMUM DISTANCE SPANNING...
NODE FAILURE TIME ANALYSIS FOR MAXIMUM STABILITY VS MINIMUM DISTANCE SPANNING...cscpconf
 
Node failure time analysis for maximum stability vs minimum distance spanning...
Node failure time analysis for maximum stability vs minimum distance spanning...Node failure time analysis for maximum stability vs minimum distance spanning...
Node failure time analysis for maximum stability vs minimum distance spanning...csandit
 
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...ijmnct
 
Sensor Energy Optimization Using Fuzzy Logic in Wireless Sensor Networking
Sensor Energy Optimization Using Fuzzy Logic in Wireless Sensor NetworkingSensor Energy Optimization Using Fuzzy Logic in Wireless Sensor Networking
Sensor Energy Optimization Using Fuzzy Logic in Wireless Sensor NetworkingVIT-AP University
 
A survey on weighted clustering techniques in manets
A survey on weighted clustering techniques in manetsA survey on weighted clustering techniques in manets
A survey on weighted clustering techniques in manetsIAEME Publication
 
Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...prjpublications
 
Enhanced Threshold Sensitive Stable Election Protocol
Enhanced Threshold Sensitive Stable Election ProtocolEnhanced Threshold Sensitive Stable Election Protocol
Enhanced Threshold Sensitive Stable Election Protocoliosrjce
 

Similar to 04 15029 active node ijeecs 1570310145(edit) (20)

Analysis of Genetic Algorithm for Effective power Delivery and with Best Upsurge
Analysis of Genetic Algorithm for Effective power Delivery and with Best UpsurgeAnalysis of Genetic Algorithm for Effective power Delivery and with Best Upsurge
Analysis of Genetic Algorithm for Effective power Delivery and with Best Upsurge
 
Design Optimization of Energy and Delay Efficient Wireless Sensor Network wit...
Design Optimization of Energy and Delay Efficient Wireless Sensor Network wit...Design Optimization of Energy and Delay Efficient Wireless Sensor Network wit...
Design Optimization of Energy and Delay Efficient Wireless Sensor Network wit...
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
 
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...
An Optimal RPC Based Approach to Increase Fault Tolerance in Wireless AD-HOC ...
 
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
 
Energy Efficient Clustering and Routing in Mobile Wireless Sensor Network
Energy Efficient Clustering and Routing in Mobile Wireless Sensor NetworkEnergy Efficient Clustering and Routing in Mobile Wireless Sensor Network
Energy Efficient Clustering and Routing in Mobile Wireless Sensor Network
 
Routing management for mobile ad hoc networks
Routing management for mobile ad hoc networksRouting management for mobile ad hoc networks
Routing management for mobile ad hoc networks
 
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKSOPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
 
Optimum Network Reconfiguration using Grey Wolf Optimizer
Optimum Network Reconfiguration using Grey Wolf OptimizerOptimum Network Reconfiguration using Grey Wolf Optimizer
Optimum Network Reconfiguration using Grey Wolf Optimizer
 
NODE FAILURE TIME ANALYSIS FOR MAXIMUM STABILITY VS MINIMUM DISTANCE SPANNING...
NODE FAILURE TIME ANALYSIS FOR MAXIMUM STABILITY VS MINIMUM DISTANCE SPANNING...NODE FAILURE TIME ANALYSIS FOR MAXIMUM STABILITY VS MINIMUM DISTANCE SPANNING...
NODE FAILURE TIME ANALYSIS FOR MAXIMUM STABILITY VS MINIMUM DISTANCE SPANNING...
 
Node failure time analysis for maximum stability vs minimum distance spanning...
Node failure time analysis for maximum stability vs minimum distance spanning...Node failure time analysis for maximum stability vs minimum distance spanning...
Node failure time analysis for maximum stability vs minimum distance spanning...
 
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
A CLUSTER BASED STABLE ROUTING PROTOCOL USING BINARY PARTICLE SWARM OPTIMIZAT...
 
Sensor Energy Optimization Using Fuzzy Logic in Wireless Sensor Networking
Sensor Energy Optimization Using Fuzzy Logic in Wireless Sensor NetworkingSensor Energy Optimization Using Fuzzy Logic in Wireless Sensor Networking
Sensor Energy Optimization Using Fuzzy Logic in Wireless Sensor Networking
 
Network analysis
Network analysisNetwork analysis
Network analysis
 
A survey on weighted clustering techniques in manets
A survey on weighted clustering techniques in manetsA survey on weighted clustering techniques in manets
A survey on weighted clustering techniques in manets
 
Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...
 
E017332733
E017332733E017332733
E017332733
 
Enhanced Threshold Sensitive Stable Election Protocol
Enhanced Threshold Sensitive Stable Election ProtocolEnhanced Threshold Sensitive Stable Election Protocol
Enhanced Threshold Sensitive Stable Election Protocol
 
D031202018023
D031202018023D031202018023
D031202018023
 

More from nooriasukmaningtyas

A deep learning approach based on stochastic gradient descent and least absol...
A deep learning approach based on stochastic gradient descent and least absol...A deep learning approach based on stochastic gradient descent and least absol...
A deep learning approach based on stochastic gradient descent and least absol...nooriasukmaningtyas
 
Automated breast cancer detection system from breast mammogram using deep neu...
Automated breast cancer detection system from breast mammogram using deep neu...Automated breast cancer detection system from breast mammogram using deep neu...
Automated breast cancer detection system from breast mammogram using deep neu...nooriasukmaningtyas
 
Max stable set problem to found the initial centroids in clustering problem
Max stable set problem to found the initial centroids in clustering problemMax stable set problem to found the initial centroids in clustering problem
Max stable set problem to found the initial centroids in clustering problemnooriasukmaningtyas
 
Intelligent aquaculture system for pisciculture simulation using deep learnin...
Intelligent aquaculture system for pisciculture simulation using deep learnin...Intelligent aquaculture system for pisciculture simulation using deep learnin...
Intelligent aquaculture system for pisciculture simulation using deep learnin...nooriasukmaningtyas
 
Effective task scheduling algorithm in cloud computing with quality of servic...
Effective task scheduling algorithm in cloud computing with quality of servic...Effective task scheduling algorithm in cloud computing with quality of servic...
Effective task scheduling algorithm in cloud computing with quality of servic...nooriasukmaningtyas
 
Fixed point theorem between cone metric space and quasi-cone metric space
Fixed point theorem between cone metric space and quasi-cone metric spaceFixed point theorem between cone metric space and quasi-cone metric space
Fixed point theorem between cone metric space and quasi-cone metric spacenooriasukmaningtyas
 
Design of an environmental management information system for the Universidad ...
Design of an environmental management information system for the Universidad ...Design of an environmental management information system for the Universidad ...
Design of an environmental management information system for the Universidad ...nooriasukmaningtyas
 
K-NN supervised learning algorithm in the predictive analysis of the quality ...
K-NN supervised learning algorithm in the predictive analysis of the quality ...K-NN supervised learning algorithm in the predictive analysis of the quality ...
K-NN supervised learning algorithm in the predictive analysis of the quality ...nooriasukmaningtyas
 
Systematic literature review on university website quality
Systematic literature review on university website qualitySystematic literature review on university website quality
Systematic literature review on university website qualitynooriasukmaningtyas
 
An intelligent irrigation system based on internet of things (IoT) to minimiz...
An intelligent irrigation system based on internet of things (IoT) to minimiz...An intelligent irrigation system based on internet of things (IoT) to minimiz...
An intelligent irrigation system based on internet of things (IoT) to minimiz...nooriasukmaningtyas
 
Enhancement of observability using Kubernetes operator
Enhancement of observability using Kubernetes operatorEnhancement of observability using Kubernetes operator
Enhancement of observability using Kubernetes operatornooriasukmaningtyas
 
Customer churn analysis using XGBoosted decision trees
Customer churn analysis using XGBoosted decision treesCustomer churn analysis using XGBoosted decision trees
Customer churn analysis using XGBoosted decision treesnooriasukmaningtyas
 
Smart solution for reducing COVID-19 risk using internet of things
Smart solution for reducing COVID-19 risk using internet of thingsSmart solution for reducing COVID-19 risk using internet of things
Smart solution for reducing COVID-19 risk using internet of thingsnooriasukmaningtyas
 
Development of computer-based learning system for learning behavior analytics
Development of computer-based learning system for learning behavior analyticsDevelopment of computer-based learning system for learning behavior analytics
Development of computer-based learning system for learning behavior analyticsnooriasukmaningtyas
 
Efficiency of hybrid algorithm for COVID-19 online screening test based on it...
Efficiency of hybrid algorithm for COVID-19 online screening test based on it...Efficiency of hybrid algorithm for COVID-19 online screening test based on it...
Efficiency of hybrid algorithm for COVID-19 online screening test based on it...nooriasukmaningtyas
 
Comparative study of low power wide area network based on internet of things ...
Comparative study of low power wide area network based on internet of things ...Comparative study of low power wide area network based on internet of things ...
Comparative study of low power wide area network based on internet of things ...nooriasukmaningtyas
 
Fog attenuation penalty analysis in terrestrial optical wireless communicatio...
Fog attenuation penalty analysis in terrestrial optical wireless communicatio...Fog attenuation penalty analysis in terrestrial optical wireless communicatio...
Fog attenuation penalty analysis in terrestrial optical wireless communicatio...nooriasukmaningtyas
 
An approach for slow distributed denial of service attack detection and allev...
An approach for slow distributed denial of service attack detection and allev...An approach for slow distributed denial of service attack detection and allev...
An approach for slow distributed denial of service attack detection and allev...nooriasukmaningtyas
 
Design and simulation double Ku-band Vivaldi antenna
Design and simulation double Ku-band Vivaldi antennaDesign and simulation double Ku-band Vivaldi antenna
Design and simulation double Ku-band Vivaldi antennanooriasukmaningtyas
 
Coverage enhancements of vehicles users using mobile stations at 5G cellular ...
Coverage enhancements of vehicles users using mobile stations at 5G cellular ...Coverage enhancements of vehicles users using mobile stations at 5G cellular ...
Coverage enhancements of vehicles users using mobile stations at 5G cellular ...nooriasukmaningtyas
 

More from nooriasukmaningtyas (20)

A deep learning approach based on stochastic gradient descent and least absol...
A deep learning approach based on stochastic gradient descent and least absol...A deep learning approach based on stochastic gradient descent and least absol...
A deep learning approach based on stochastic gradient descent and least absol...
 
Automated breast cancer detection system from breast mammogram using deep neu...
Automated breast cancer detection system from breast mammogram using deep neu...Automated breast cancer detection system from breast mammogram using deep neu...
Automated breast cancer detection system from breast mammogram using deep neu...
 
Max stable set problem to found the initial centroids in clustering problem
Max stable set problem to found the initial centroids in clustering problemMax stable set problem to found the initial centroids in clustering problem
Max stable set problem to found the initial centroids in clustering problem
 
Intelligent aquaculture system for pisciculture simulation using deep learnin...
Intelligent aquaculture system for pisciculture simulation using deep learnin...Intelligent aquaculture system for pisciculture simulation using deep learnin...
Intelligent aquaculture system for pisciculture simulation using deep learnin...
 
Effective task scheduling algorithm in cloud computing with quality of servic...
Effective task scheduling algorithm in cloud computing with quality of servic...Effective task scheduling algorithm in cloud computing with quality of servic...
Effective task scheduling algorithm in cloud computing with quality of servic...
 
Fixed point theorem between cone metric space and quasi-cone metric space
Fixed point theorem between cone metric space and quasi-cone metric spaceFixed point theorem between cone metric space and quasi-cone metric space
Fixed point theorem between cone metric space and quasi-cone metric space
 
Design of an environmental management information system for the Universidad ...
Design of an environmental management information system for the Universidad ...Design of an environmental management information system for the Universidad ...
Design of an environmental management information system for the Universidad ...
 
K-NN supervised learning algorithm in the predictive analysis of the quality ...
K-NN supervised learning algorithm in the predictive analysis of the quality ...K-NN supervised learning algorithm in the predictive analysis of the quality ...
K-NN supervised learning algorithm in the predictive analysis of the quality ...
 
Systematic literature review on university website quality
Systematic literature review on university website qualitySystematic literature review on university website quality
Systematic literature review on university website quality
 
An intelligent irrigation system based on internet of things (IoT) to minimiz...
An intelligent irrigation system based on internet of things (IoT) to minimiz...An intelligent irrigation system based on internet of things (IoT) to minimiz...
An intelligent irrigation system based on internet of things (IoT) to minimiz...
 
Enhancement of observability using Kubernetes operator
Enhancement of observability using Kubernetes operatorEnhancement of observability using Kubernetes operator
Enhancement of observability using Kubernetes operator
 
Customer churn analysis using XGBoosted decision trees
Customer churn analysis using XGBoosted decision treesCustomer churn analysis using XGBoosted decision trees
Customer churn analysis using XGBoosted decision trees
 
Smart solution for reducing COVID-19 risk using internet of things
Smart solution for reducing COVID-19 risk using internet of thingsSmart solution for reducing COVID-19 risk using internet of things
Smart solution for reducing COVID-19 risk using internet of things
 
Development of computer-based learning system for learning behavior analytics
Development of computer-based learning system for learning behavior analyticsDevelopment of computer-based learning system for learning behavior analytics
Development of computer-based learning system for learning behavior analytics
 
Efficiency of hybrid algorithm for COVID-19 online screening test based on it...
Efficiency of hybrid algorithm for COVID-19 online screening test based on it...Efficiency of hybrid algorithm for COVID-19 online screening test based on it...
Efficiency of hybrid algorithm for COVID-19 online screening test based on it...
 
Comparative study of low power wide area network based on internet of things ...
Comparative study of low power wide area network based on internet of things ...Comparative study of low power wide area network based on internet of things ...
Comparative study of low power wide area network based on internet of things ...
 
Fog attenuation penalty analysis in terrestrial optical wireless communicatio...
Fog attenuation penalty analysis in terrestrial optical wireless communicatio...Fog attenuation penalty analysis in terrestrial optical wireless communicatio...
Fog attenuation penalty analysis in terrestrial optical wireless communicatio...
 
An approach for slow distributed denial of service attack detection and allev...
An approach for slow distributed denial of service attack detection and allev...An approach for slow distributed denial of service attack detection and allev...
An approach for slow distributed denial of service attack detection and allev...
 
Design and simulation double Ku-band Vivaldi antenna
Design and simulation double Ku-band Vivaldi antennaDesign and simulation double Ku-band Vivaldi antenna
Design and simulation double Ku-band Vivaldi antenna
 
Coverage enhancements of vehicles users using mobile stations at 5G cellular ...
Coverage enhancements of vehicles users using mobile stations at 5G cellular ...Coverage enhancements of vehicles users using mobile stations at 5G cellular ...
Coverage enhancements of vehicles users using mobile stations at 5G cellular ...
 

Recently uploaded

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 

Recently uploaded (20)

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 

04 15029 active node ijeecs 1570310145(edit)

  • 1. Indonesian Journal of Electrical Engineering and Computer Science Vol. 5, No. 3, March 2017, pp. 502 ~ 507 DOI: 10.11591/ijeecs.v5.i3.pp502-507  502 Received September 2, 2016; Revised January 25, 2017; Accepted February 11, 2017 Active Node Detection in A Reconfigurable Microgrid Using Minimum Spanning Tree Algorithms Anay Majee*, Souradeep Nanda, Gnana Swathika O.V VIT University Chennai Campus, India, School of Electrical Engineering (SELECT) *Corresponding author, e-mail: anay.majee2014@vit.ac.in Abstract Microgrids are the solution to the growing demand for energy in the recent times. It has the potential to improve local reliability, reduce cost and increase penetration rates for distributed renewable energy generation. Inclusion of Renewable Energy Systems(RES) which have become the topic of discussion in the recent times due to acute energy crisis, causes the power flow in the microgrid to be bi- directional in nature. The presence of the RES in the microgrid system causes the grid to be reconfigurable. This reconfiguration might also occur due to load or utility grid connection and disconnection. Thus conventional protection strategies are not applicable to micro-grids and is hence challenging for engineers to protect the grid in a fault condition. In this paper various Minimum Spanning Tree(MST) algorithms are applied in microgrids to identify the active nodes of the current topology of the network in a heuristic approach and thereby generating a tree from the given network so that minimum number of nodes have to be disconnected from the network during fault clearance. In the paper we have chosen the IEEE-39 and IEEE-69 bus networks as our sample test systems. Keywords: minimum spanning tree, microgrid protection Copyright © 2017 Institute of Advanced Engineering and Science. All rights reserved. 1. Introduction Microgrid is defined as a cluster of small sources, storage systems, and loads, which presents itself to the main grid as a single, flexible, and controllable entity [1], [2]. IEEE Std 1547.4-2011 states Distributed Resource (DR) island systems or micro-grids as electric power systems (EPS) that include: a. DR and load, b. The ability to disconnect from and parallel with the area EPS, c. The local EPS and may include portions of the area EPS, and d. Intentionally planned. Microgrid structure is a more independent form than the grid network by using the concept of bi-directional power flow, on-site generation and storage. They are capable of acting in two modes, the grid connected mode and islanded mode [3]. The microgrid when operated in grid connected mode supplies or draws power to the utility grid depending on the generation and demand from the load side. But the microgrid can shift to an islanded mode in emergency situations or in situation of a power shortage [4]. In such a situation the DGs in the network supply power to the loads. The bi-directional power flow in a microgrid forbids the existence of any specified protocol for fault rectification due to continuously changing configuration of the microgrid. The Central Protection Centre (CPC) monitors the status of the DGs, loads and the utility grid in a microgrid system. In view of creating a protection system for the microgrid various constraints have been considered. At first, if fault exists within a micro-grid the utility side consumers should remain unaffected. Secondly, backup protection has been enabled for both grid connected and islanded modes of operation. Lastly, the selectivity and speed should be in an acceptable level. Communication assisted protection strategies are a common solution to protect the microgrid [5-9]. Common issues like sympathetic tripping, false tripping, blind zone, variation in fault levels and unwanted islanding are caused due to the impact of distributed generations [10]. Since the microgrid changes its configuration at every instant of time based on the load condition, there has to be an automatic system to detect the active nodes present in the grid at
  • 2. IJEECS ISSN: 2502-4752  Active Node Detection in A Reconfigurable Microgrid Using Minimum… (Anay Majee) 503 that instant of time. This is done by graph theory algorithms, namely the Minimal Spanning Tree algorithm (MST). The MST converts a complex grid into its simpler derivative- a tree, which can be analysed to find out the shortest path between a particular node and the root node. This is particularly important in case of microgrids as because in case of a fault the current has to flow back to the main grid by disconnecting the minimum number of nodes in the network. In this paper the performance of multiple MST algorithms are analysed by applying them to the standard microgrid networks (IEEE-39, IEEE-69), and thereby identifying the best suited algorithm for the purpose of fault detection and rectification. 2. Research Method 2.1. The Active Node Detection Problem In a microgrid system which consists of renewable energy systems(RES) not all nodes are active at the same time. In such a reconfigurable structure the size and number of nodes in the grid does not remain constant. To cope up with such a problem, the minimum spanning tree algorithm is employed on microgrids [18]. A graph may contain a number of trees formed but this algorithm generates a tree in which the distance between the source and the nodes are minimum. Thus the MST converts a cyclic graph to an acyclic tree and also aids in finding the shortest distance between the fault node and the source (main grid). If a node with a fault is identified, then the traversal from the fault node to the source up the MST will be the shortest path to be followed. This paper applies Boruvka’s, Prim’s and Kruskal’s algorithms to identify the active nodes of the network. The performance of the algorithms are analysed and the best suited algorithm is selected for fault clearance in microgrid systems. 2.2. Boruvka's algorithm Boruvka's algorithm was first introduced to construct an efficient electricity network for Moravia [19]. Boruvka's algorithm takes a graph G = (V,E). For each vertex v, the algorithm adds the edge with the smallest edge into the tree. If the edge is already added, the algorithm moves on to the next vertex. The algorithm then joins these islands to form the minimum spanning tree. Pseudocode: function borovka(G): T = forest of one-vertex trees (one for each vertex) while size of T > 1: for each tree t in T: S = {} (Empty set of edges) for each vertex in t: for each vertex v in t: S union the cheapest edge originating from v which does not connect to any vertex in the tree t insert the cheapest edge of S in T Merge all trees in T which are connected return T Complexity: The outer loop of the algorithm runs O(log V) times. The inner loop runs at most once for each edge E. Therefore the algorithm runs in O(E log V). The algorithm however can be made to run in linear time for planar graphs by removing all but the cheapest edge between each pair of components after each stage of algorithm [20]. 2.3 Prim’s Algorithm Prim’s Algorithm is a greedy algorithm which starts with an empty spanning tree with an idea to maintain two sets of vertices. The first set contains the vertices already included in the MST, while the vertices not contained are included in the second set. At each step, the algorithm picks up the edges that connect the two sets and the minimum weight edge from these edges are picked. The end point of the edge picked is then moved to the set containing the MST.
  • 3.  ISSN: 2502-4752 IJEECS Vol. 5, No. 3, March 2017 : 502 – 507 504 Pseudocode: function primMst(G) s = select a random node closed_set = {s} open_set = nodes adjacent to s n = number of vertices of G repeat n - 1 times u = node with least weight in open set remove u from open set add u to closed set add all neighbours of u to open set end end Complexity: Time Complexity of the above algorithm is O(V^2), where V is the number of vertices. If the input graph is represented using adjacency list, then the time complexity can be reduced to O(E log V). 2.4. Kruskal’s Algorithm Kruskal’s Algorithm finds a safe edge to add to the growing forest by finding, of all the edges that connect any two trees in the forest, an edge (U,V), of least weight. It is a greedy algorithm as at each step it adds to the forest an edge of least possible weight [18]. Determining whether adding an edge is safe or not is done by checking whether it would form any cycles. This is done my recording the parent of each node in a tree of the forest. If the two nodes of the edge have the same root, then a cycle is formed. Pseudocode: function kruskalMst(G) E = set of all edges in G sorted according to weight n = number of vertices in G T = empty tree for each egde e in E if adding e does not cause a cycle in T then add e to T end end end Complexity: O(ElogE) or O(ElogV). 3. Results and Analysis 3.1. Simulation Results The Boruvka’s, Prim’s and Kruskal’s algorithms are tested on a IEEE-39 bus and IEEE- 69 bus distributed system. According to the concept of minimum spanning tree there can exist only one path from a particular node to the source [11-17]. This is possible only if the graph is converted to a tree. In the simulation result the shortest path is obtained by finding out only the predecessors of the fault node till the source node (1 in our case) is reached. 3.2. Experimental Results Consider the IEEE 39 and 69 bus networks in Figure 1 and Figure 2. Let node 1 be the base node. Assume the fault occurs close to node 22 in both the networks. In the 39 bus network, the path length includes 11 edges, whereas in the 69 bus network it includes 20 edges. Table 1 shows the results for 100 iterations(in seconds) of the time taken to find the active nodes in the microgrid test systems. In Figure 1 (the 69- bus system), the shortest path obtained after forming the MST is as shown in Figure 3. For a fault occurring close to node 22 the path is: 22->23->24->25->26->27->65->64->63->62->61->60->59->50->49->48->47->4->3->2->1
  • 4. IJEECS ISSN: 2502-4752  Active Node Detection in A Reconfigurable Microgrid Using Minimum… (Anay Majee) 505 Weights :20 (assuming equal weights) In Figure 2 (the 39- bus system), the shortest path obtained after forming the MST is as shown in Fig 4. For a fault occurring close to node 22 the path is: 22->23->24->16->15->14->4->5->8->9->39->1 Weights :11 (assuming equal weights) Table 1. Empirical analysis of the various algorithms on 39 and 69 bus systems. Algorithm 39 Bus Network 69 Bus Network Time taken(ms) Std. deviation(sec) Time taken(ms) Std. deviation(sec) Prim 1.2 3.9936e-04 1.5 5.2912e-04 Kruskal 1.1 3.8664e-04 1.2 5.0328e-04 Boruvka 1.2 3.9566e-04 1.3 5.1299e-04 Figure 1. IEEE 69 bus distributed network Figure 3. Simulation Result for shortest path identification on 69 bus network The application of algorithms to microgrids thereby aids in identifying the active nodes of the reconfigurable network at that instant of time. From the results in Table 1 it is identified that application of Kruskal’s algorithm takes minimum time to find the MST and in turn identifies the shortest path for fault clearance which may cause minimum load disconnections in
  • 5.  ISSN: 2502-4752 IJEECS Vol. 5, No. 3, March 2017 : 502 – 507 506 Figure 2. IEEE 39 bus distributed network Figure 4. Simulation Result on the 39 bus network with fault at node 22
  • 6. IJEECS ISSN: 2502-4752  Active Node Detection in A Reconfigurable Microgrid Using Minimum… (Anay Majee) 507 4. Conclusion Fault clearance in a hybrid microgrid is quite a challenging task for protection engineers due to continuous reconfiguration of the grid. Thus it is necessary to rely on automatic computerised systems to solve such issues. This paper employs minimum spanning tree algorithms on IEEE-39 and IEEE-69 bus microgrid networks conveniently to identify the active nodes of the network which eventually generates the shortest path from the faulted point to the nearest operating source. The validations prove that the algorithms can be employed on any microgrid network and may cause minimum load centre disconnection. Based on the experimental results that have been employed it is confirmed that even microseconds of delay in disconnection of a faulted portion from the main grid can cause severe damage to appliances. Keeping this in mind Kruskal’s algorithm can be suggested as a suitable algorithm for finding out the minimum spanning tree in a connected graph. References [1] B Lasseter, Microgrids [distributed power generation], Power Eng. Soc. Winter Meet. 2001. IEEE, 1C: 146-149. [2] C Marnay, FJ Robio, AS Siddiqui, Shape of the microgrid, Power Eng. Soc. Winter Meet. 2001. IEEE, 1(c): 150–153. [3] Hannu Laaksonen, Dmitry Ishchenko, Alexandre Oudalov. Adaptive Protection and Microgrid Control Design for Hailuoto Island. IEEE Transactions on Smart Grid. 2014; 5(3). [4] Kalpesh C Soni, Firdaus F Belim. MicroGrid during Grid- connected mode and Islanded mode- A review. International Journal of Advance Engineering and Research Development. 2015: sl no-57. [5] Wen Lu, Yangdong Zhao, Weixing Li, Hongwei Du. Design and application of microgrid operation control system based on IEC 61850. Springer: Journal of Mod. Power Syst. Clean Energy. 2014; 2(3): 256-63. [6] Liang Che, E. Mohammad Khodayar, Mohammad Shahidehpour. Adaptive Protection System for Microgrids. IEEE Electrification Magazine. 2014. [7] C Vassilis Nikolaidis, Evangelos Papanikolaou, S Anastasia Safigianni. A Communication-Assisted Overcurrent Protection Scheme for Radial Distribution Systems with Distributed Generation. IEEE Transaction on Smart Grid. Article in Press. 2015. [8] Hashem Mortazavi, Hasan Mehrjerdi, MaaroufSaad, Serge Lefebvre, DalalAsber, Laurent Lenoir. A Monitoring Technique for Reversed Power Flow Detection with High PV Penetration Level, IEEE Transactions on Smart Grid. 2015; 6(5): 2221–2232. [9] Taha Selim Ustun, H Reduan Khan. Multiterminal Hybrid Protection of Microgrids Over Wireless Communications Network. IEEE Transactions on Smart Grid. 2015; 6(5): 2493-2500. [10] AHA Bakar, Ban Juan Ooi, P Govindasamy, Chia Kwang Tan, HA Illias AH. Mokhlis. Directional overcurrent and earth-fault protections for a biomass microgrid system in Malaysia. Electrical Power and Energy Systems. 2015; (55): 581–591. [11] Swathika OG, Hemamalini S. Prims Aided Dijkstra Algorithm for Adaptive Protection in Microgrids. IEEE Journal of Emerging and Selected Topics in Power Electronics. 2015; 4(4): 1279-1286. [12] Swathika OG, Hemamalini S. Kruskal Aided Floyd Warshall Algorithm for shortest path identification in microgrids. ARPN Journal of Engineering and Applied Sciences. 2015; 10(15): 6614-6618. [13] Swathika OG, Hemamalini S. PLC Based LV-DG Synchronization in Real-Time Microgrid Network. ARPN Journal of Engineering and Applied Sciences. 2016; 11(5): 3193-3197. [14] Swathika OG, Hemamalini S. Relay Coordination in Real-Time Microgrid for varying load demands. ARPN Journal of Engineering and Applied Sciences. 2016;11(5):.3222-3227. [15] Swathika OG, Hemamalini S. Communication Assisted Overcurrent Protection of Microgrid. International Conference on Computational Intelligence and Communication Networks (CICN). 2015: 1472-1475. [16] Swathika OG, Karthikeyan, K Hemamalini S. Multiple DG Synchronization and Desynchronization in a Microgrid Using PLC. In Advanced Computing and Communication Technologies. Springer Singapore. 2016: 565-572. [17] Swathika OG, Hemamalini S. Adaptive and Intelligent Controller for Protection in Radial Distribution System. In Advanced Computer and Communication Engineering Technology. Springer International Publishing. 2016: 195-209. [18] Thomas H Cormen, Charles E Leiserson, Ronald L. Rivest and Clifford Stein, Introduction to Algorithms,3rd ed,PHL Learning Pvt. Ltd, 2014. [19] Boruvka, Otakar. O jistém problému minimálním [About a certain minimal problem]. Práce mor. prírodoved. spol. v Brne III (in Czech and German). 3: 37–58. [20] Boruvka, Otakar. Príspevek k rešení otázky ekonomické stavby elektrovodních sítí (Contribution to the solution of a problem of economical construction of electrical networks). Elektronický Obzor (in Czech). 1926; 15: 153–154.