The document describes algorithms for grouping electrical network components into zones based on topological analysis using depth-first search (DFS) and breadth-first search (BFS). The algorithms were developed using Visual FORTRAN and tested on the IEEE37 bus test case. DFS and BFS techniques are applied to identify components fed by transformers and organize them into electrical zones. This zoning allows operators to identify loads, losses, and resources in each zone to improve network monitoring and control.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...ijwmn
The paper describes how to improve channel estimation in Single Carrier Frequency Division Multiple
Access (SC-FDMA) system, using a Hybrid Artificial Neural Networks (HANN). The 3rd Generation
Partnership Project (3GPP) standards for uplink Long Term Evolution Advanced (LTE-A) uses pilot based
channel estimation technique. This kind of channel estimation method suffers from a considerable loss
ofbitrate due to pilot insertion; all data frame sent contains reference signal. The HANN converts data
aided channel estimator to semi blind channel estimator. To increase convergence speed, HANN uses some
channel propagation Fuzzy Rules to initialize Neural Network parameters before learning instead of a
random initialization, so its learning phase ismore rapidly compared to classic ANN.HANN allows more
bandwidth efficient and less complexity. Simulation results show that HANN has better computational
efficiency than the Minimum Mean Square Error (MMSE) estimator and has faster convergence than
classic Neural Networks estimators.
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTIONijwmn
Multiple-input multiple-output (MIMO) systems are playing an important role in the recent wireless
communication. The complexity of the different systems models challenge different researches to get a good
complexity to performance balance. Lattices Reduction Techniques and Lenstra-Lenstra-Lovàsz (LLL)
algorithm bring more resources to investigate and can contribute to the complexity reduction purposes.
In this paper, we are looking to modify the LLL algorithm to reduce the computation operations by
exploiting the structure of the upper triangular matrix without “big” performance degradation. Basically,
the first columns of the upper triangular matrix contain many zeroes, so the algorithm will perform several
operations with very limited income. We are presenting a performance and complexity study and our
proposal show that we can gain in term of complexity while the performance results remains almost the
same.
Macromodel of High Speed Interconnect using Vector Fitting Algorithmijsrd.com
At high frequency efficient macromodeling of high speed interconnects is all time challenging task. We have presented systematic methodologies to generate rational function approximations of high-speed interconnects using vector fitting technique for any type of termination conditions and construct efficient multiport model, which is easily and directly compatible with circuit simulators.
The Effects of Mutual Coupling and Transformer Connection Type on Frequency R...ijsrd.com
in this paper, a novel harmonic modeling technique by utilizing the concept of multi -terminal components is presented and applied to frequency scan analysis in multiphase distribution system. The proposed modeling technique is based on gathering the same phase busses and elements as a separate group (phase grouping technique, PGT) and uses multi-terminal components to model three-phase distribution system. Using multi-terminal component and PGT, distribution system elements, particularly, lines and transformers can effectively be modeled even in harmonic domain. The proposed modeling technique is applied to a test system for frequency scan analysis in order to show the frequency response of the test system in single and three-phase conditions. Consequently, the effects of mutual coupling and transformer connection types on three-phase frequency scan responses are analyzed for symmetrical and asymmetrical line configurations.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...ijwmn
The paper describes how to improve channel estimation in Single Carrier Frequency Division Multiple
Access (SC-FDMA) system, using a Hybrid Artificial Neural Networks (HANN). The 3rd Generation
Partnership Project (3GPP) standards for uplink Long Term Evolution Advanced (LTE-A) uses pilot based
channel estimation technique. This kind of channel estimation method suffers from a considerable loss
ofbitrate due to pilot insertion; all data frame sent contains reference signal. The HANN converts data
aided channel estimator to semi blind channel estimator. To increase convergence speed, HANN uses some
channel propagation Fuzzy Rules to initialize Neural Network parameters before learning instead of a
random initialization, so its learning phase ismore rapidly compared to classic ANN.HANN allows more
bandwidth efficient and less complexity. Simulation results show that HANN has better computational
efficiency than the Minimum Mean Square Error (MMSE) estimator and has faster convergence than
classic Neural Networks estimators.
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTIONijwmn
Multiple-input multiple-output (MIMO) systems are playing an important role in the recent wireless
communication. The complexity of the different systems models challenge different researches to get a good
complexity to performance balance. Lattices Reduction Techniques and Lenstra-Lenstra-Lovàsz (LLL)
algorithm bring more resources to investigate and can contribute to the complexity reduction purposes.
In this paper, we are looking to modify the LLL algorithm to reduce the computation operations by
exploiting the structure of the upper triangular matrix without “big” performance degradation. Basically,
the first columns of the upper triangular matrix contain many zeroes, so the algorithm will perform several
operations with very limited income. We are presenting a performance and complexity study and our
proposal show that we can gain in term of complexity while the performance results remains almost the
same.
Macromodel of High Speed Interconnect using Vector Fitting Algorithmijsrd.com
At high frequency efficient macromodeling of high speed interconnects is all time challenging task. We have presented systematic methodologies to generate rational function approximations of high-speed interconnects using vector fitting technique for any type of termination conditions and construct efficient multiport model, which is easily and directly compatible with circuit simulators.
The Effects of Mutual Coupling and Transformer Connection Type on Frequency R...ijsrd.com
in this paper, a novel harmonic modeling technique by utilizing the concept of multi -terminal components is presented and applied to frequency scan analysis in multiphase distribution system. The proposed modeling technique is based on gathering the same phase busses and elements as a separate group (phase grouping technique, PGT) and uses multi-terminal components to model three-phase distribution system. Using multi-terminal component and PGT, distribution system elements, particularly, lines and transformers can effectively be modeled even in harmonic domain. The proposed modeling technique is applied to a test system for frequency scan analysis in order to show the frequency response of the test system in single and three-phase conditions. Consequently, the effects of mutual coupling and transformer connection types on three-phase frequency scan responses are analyzed for symmetrical and asymmetrical line configurations.
We present this work by two steps. In the first one, the new structure proposed of the FP-HEMTs device (Field plate High Electron Mobility Transistor) with a T-gate on an 4H-SIC substrate to optimize these electrical performances, multiple field-plates were used with aluminum oxide to split the single electric field peak into several smaller peaks, and as passivation works to reduce scaling leakage current. In the next, we include a modeling of a simulation in the Tcad-Silvaco Software for realizing the study of the influence of negative voltage applied to gate T-shaped in OFF state time and high power with ambient temperature, the performance differences between the 3FP and the SFP devices are discussed in detail.
High Speed Low Power Veterbi Decoder Design for TCM Decodersijsrd.com
It is well known that the Viterbi decoder (VD) is the dominant module determining the overall power consumption of TCM decoders. High-speed, low-power design of Viterbi decoders for trellis coded modulation (TCM) systems is presented in this paper. We propose a pre-computation architecture incorporated with -algorithm for VD, which can effectively reduce the power consumption without degrading the decoding speed much. A general solution to derive the optimal pre-computation steps is also given in the paper. Implementation result of a VD for a rate-3/4 convolutional code used in a TCM system shows that compared with the full trellis VD, the precomputation architecture reduces the power consumption by as much as 70% without performance loss, while the degradation in clock speed is negligible.
Design of High Speed and Low Power Veterbi Decoder for Trellis Coded Modulati...ijsrd.com
It is well known that the Viterbi decoder (VD) is the dominant module determining the overall power consumption of TCM decoders. High-speed, low-power design of Viterbi decoders for trellis coded modulation (TCM) systems is presented in this paper. We propose a pre-computation architecture incorporated with -algorithm for VD, which can effectively reduce the power consumption without degrading the decoding speed much. A general solution to derive the optimal pre-computation steps is also given in the paper. Implementation result of a VD for a rate-3/4 convolutional code used in a TCM system shows that compared with the full trellis VD, the precomputation architecture reduces the power consumption by as much as 70% without performance loss, while the degradation in clock speed is negligible.
Flexible dsp accelerator architecture exploiting carry save arithmeticNexgen Technology
2016 ieee project ,2016-2017 ieee projects, application projects, best ieee projects, bulk final year projects, bulk ieee projects ,diploma projects electrical engineering electrical engineering projects ,final year application projects, final year csc projects, final year cse project, final year it projects ,final year project, final year projects, final year projects in chennai ,final year projects in coimabtore, final year projects in hyderabad, final year projects in pondicherry final year projects in rajasthan ,ieee based projects for ece, ieee final year projects, ieee master, ieee project, ieee project 2015 ,ieee project 2016, ieee project centers in pondicherry ,ieee project for eee, ieee projects, ieee projects ,2015-2016 ieee projects, 2016-2017 ieee projects, cse ieee projects, cse 2015 ieee projects, cse 2016 ieee projects for cse ,ieee projects for it, ieee projects in bangalore, ieee projects in chennai, ieee projects in coimbatore, ieee projects in hyderabad ,ieee projects in madurai ,ieee projects in maharashtra ,ieee projects in mumbai, ieee projects in odisha, ieee projects in orissa, ieee projects in pondicherry, ieee projects in pondy ,ieee projects in pune, ieee projects in uttarakhand, ieee projects titles, 2015-2016 latest projects for eee, NEXGEN TECHNOLOGY mtech ieee projects mtech projects 2016-2017 mtech projects in chennai mtech, projects in cuddalore ,mtech projects in neyveli, mtech projects in panruti, mtech projects in pondicherry, mtech projects in tindivanam, mtech projects in villupuram, online ieee projects ,phd guidance, project for engineering ,project titles for ece
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The rapid growths of portable electronic devices are increased and they are designing with low power and high speed is critical. To design a three input XOR and XNOR gates using the systematic cell design methodology can be achieved by implementing transmission gate. By this type of designing the low power and high speed can achieved. This architecture is used to maintain summation results for after completing addition process. XOR/XNOR circuits are proposed with high driving capability, full-balanced full-swing outputs and low number transistors of basic structure, high performance and operating at low voltages. This simulation is carried out using TSMC 90nmCMOS technology in Tanner EDA Tool.
Automated Piecewise-Linear Fitting of S-Parameters step-response (PWLFIT) for...Piero Belforte
An innovative full time-domain macromodeling
technique for general, linear multiport systems is described. The
methodology is defined in a digital wave framework and timedomain
simulations are performed via an efficient method called
Segment Fast Convolution (SFC). It is based on a piecewiseconstant
(PWC) model of the impulse response of scattering
parameters, computed starting from a piecewise-linear fitting
of their step response (PWLFIT). Such step response is directly
available from time-domain reflectometer measurements
(TDR/TDT) or equivalent simulations. The model-building phase
is performed in a fast automated framework and an analytic
formulation of computational efficiency of the SFC with respect to
the standard time-domain convolution is given. Two application
examples are used to verify the PWLFIT performance and to
perform a comparison with macromodeling methods defined in
the frequency-domain, such as Vector Fitting (VF).
Index Terms—Digital wave models, time-domain macromodeling,
S-parameters, step response.
A New Approach to Linear Estimation Problem in Multiuser Massive MIMO SystemsRadita Apriana
A novel approach for solving linear estimation problem in multi-user massive MIMO systems is
proposed. In this approach, the difficulty of matrix inversion is attributed to the incomplete definition of the
dot product. The general definition of dot product implies that the columns of channel matrix are always
orthogonal whereas, in practice, they may be not. If the latter information can be incorporated into dot
product, then the unknowns can be directly computed from projections without inverting the channel
matrix. By doing so, the proposed method is able to achieve an exact solution with a 25% reduction in
computational complexity as compared to the QR method. Proposed method is stable, offers an extra
flexibility of computing any single unknown, and can be implemented in just twelve lines of code.
In this paper, we propose a new technique for implementing a low power high speed multiplier based on Sleepy Stack Technique and consisting of
minimum number of transistors. Multiplier circuits are used comprehensively in Application Specific Integrated Circuits (ASICs). An 4 bit x 4 bit
multiplier has also been implemented using the design of only using basic combinational circuits and its performance has been analyzed and
compared with similar multipliers designed with peer combinational design available in literature. The explored method of implementation achieves
a high speed low power design for the multiplier. Simulated results indicate the superior performance of the proposed technique over conventional
CMOS multiplier. Detailed comparison of simulated results for the conventional and present method of implementation is presented.
We present this work by two steps. In the first one, the new structure proposed of the FP-HEMTs device (Field plate High Electron Mobility Transistor) with a T-gate on an 4H-SIC substrate to optimize these electrical performances, multiple field-plates were used with aluminum oxide to split the single electric field peak into several smaller peaks, and as passivation works to reduce scaling leakage current. In the next, we include a modeling of a simulation in the Tcad-Silvaco Software for realizing the study of the influence of negative voltage applied to gate T-shaped in OFF state time and high power with ambient temperature, the performance differences between the 3FP and the SFP devices are discussed in detail.
High Speed Low Power Veterbi Decoder Design for TCM Decodersijsrd.com
It is well known that the Viterbi decoder (VD) is the dominant module determining the overall power consumption of TCM decoders. High-speed, low-power design of Viterbi decoders for trellis coded modulation (TCM) systems is presented in this paper. We propose a pre-computation architecture incorporated with -algorithm for VD, which can effectively reduce the power consumption without degrading the decoding speed much. A general solution to derive the optimal pre-computation steps is also given in the paper. Implementation result of a VD for a rate-3/4 convolutional code used in a TCM system shows that compared with the full trellis VD, the precomputation architecture reduces the power consumption by as much as 70% without performance loss, while the degradation in clock speed is negligible.
Design of High Speed and Low Power Veterbi Decoder for Trellis Coded Modulati...ijsrd.com
It is well known that the Viterbi decoder (VD) is the dominant module determining the overall power consumption of TCM decoders. High-speed, low-power design of Viterbi decoders for trellis coded modulation (TCM) systems is presented in this paper. We propose a pre-computation architecture incorporated with -algorithm for VD, which can effectively reduce the power consumption without degrading the decoding speed much. A general solution to derive the optimal pre-computation steps is also given in the paper. Implementation result of a VD for a rate-3/4 convolutional code used in a TCM system shows that compared with the full trellis VD, the precomputation architecture reduces the power consumption by as much as 70% without performance loss, while the degradation in clock speed is negligible.
Flexible dsp accelerator architecture exploiting carry save arithmeticNexgen Technology
2016 ieee project ,2016-2017 ieee projects, application projects, best ieee projects, bulk final year projects, bulk ieee projects ,diploma projects electrical engineering electrical engineering projects ,final year application projects, final year csc projects, final year cse project, final year it projects ,final year project, final year projects, final year projects in chennai ,final year projects in coimabtore, final year projects in hyderabad, final year projects in pondicherry final year projects in rajasthan ,ieee based projects for ece, ieee final year projects, ieee master, ieee project, ieee project 2015 ,ieee project 2016, ieee project centers in pondicherry ,ieee project for eee, ieee projects, ieee projects ,2015-2016 ieee projects, 2016-2017 ieee projects, cse ieee projects, cse 2015 ieee projects, cse 2016 ieee projects for cse ,ieee projects for it, ieee projects in bangalore, ieee projects in chennai, ieee projects in coimbatore, ieee projects in hyderabad ,ieee projects in madurai ,ieee projects in maharashtra ,ieee projects in mumbai, ieee projects in odisha, ieee projects in orissa, ieee projects in pondicherry, ieee projects in pondy ,ieee projects in pune, ieee projects in uttarakhand, ieee projects titles, 2015-2016 latest projects for eee, NEXGEN TECHNOLOGY mtech ieee projects mtech projects 2016-2017 mtech projects in chennai mtech, projects in cuddalore ,mtech projects in neyveli, mtech projects in panruti, mtech projects in pondicherry, mtech projects in tindivanam, mtech projects in villupuram, online ieee projects ,phd guidance, project for engineering ,project titles for ece
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The rapid growths of portable electronic devices are increased and they are designing with low power and high speed is critical. To design a three input XOR and XNOR gates using the systematic cell design methodology can be achieved by implementing transmission gate. By this type of designing the low power and high speed can achieved. This architecture is used to maintain summation results for after completing addition process. XOR/XNOR circuits are proposed with high driving capability, full-balanced full-swing outputs and low number transistors of basic structure, high performance and operating at low voltages. This simulation is carried out using TSMC 90nmCMOS technology in Tanner EDA Tool.
Automated Piecewise-Linear Fitting of S-Parameters step-response (PWLFIT) for...Piero Belforte
An innovative full time-domain macromodeling
technique for general, linear multiport systems is described. The
methodology is defined in a digital wave framework and timedomain
simulations are performed via an efficient method called
Segment Fast Convolution (SFC). It is based on a piecewiseconstant
(PWC) model of the impulse response of scattering
parameters, computed starting from a piecewise-linear fitting
of their step response (PWLFIT). Such step response is directly
available from time-domain reflectometer measurements
(TDR/TDT) or equivalent simulations. The model-building phase
is performed in a fast automated framework and an analytic
formulation of computational efficiency of the SFC with respect to
the standard time-domain convolution is given. Two application
examples are used to verify the PWLFIT performance and to
perform a comparison with macromodeling methods defined in
the frequency-domain, such as Vector Fitting (VF).
Index Terms—Digital wave models, time-domain macromodeling,
S-parameters, step response.
A New Approach to Linear Estimation Problem in Multiuser Massive MIMO SystemsRadita Apriana
A novel approach for solving linear estimation problem in multi-user massive MIMO systems is
proposed. In this approach, the difficulty of matrix inversion is attributed to the incomplete definition of the
dot product. The general definition of dot product implies that the columns of channel matrix are always
orthogonal whereas, in practice, they may be not. If the latter information can be incorporated into dot
product, then the unknowns can be directly computed from projections without inverting the channel
matrix. By doing so, the proposed method is able to achieve an exact solution with a 25% reduction in
computational complexity as compared to the QR method. Proposed method is stable, offers an extra
flexibility of computing any single unknown, and can be implemented in just twelve lines of code.
In this paper, we propose a new technique for implementing a low power high speed multiplier based on Sleepy Stack Technique and consisting of
minimum number of transistors. Multiplier circuits are used comprehensively in Application Specific Integrated Circuits (ASICs). An 4 bit x 4 bit
multiplier has also been implemented using the design of only using basic combinational circuits and its performance has been analyzed and
compared with similar multipliers designed with peer combinational design available in literature. The explored method of implementation achieves
a high speed low power design for the multiplier. Simulated results indicate the superior performance of the proposed technique over conventional
CMOS multiplier. Detailed comparison of simulated results for the conventional and present method of implementation is presented.
A Novel Distribution System Power Flow Algorithm using Forward Backward Matri...iosrjce
IOSR Journal of Electrical and Electronics Engineering(IOSR-JEEE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electrical and electronics engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electrical and electronics engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
An Approach for Power Flow Analysis of Radial Distribution Networksresearchinventy
This paper provides an easy and effective approach to the load flow solution of Radial distribution networks. As compared to the various methods proposed in the past, this work presents a new technique consisting of load flow solution of the network, facilitated by the identification of all the nodes beyond a particular branch. The proposed method is quite accurate and reliable for the system having any number of nodes. The primary target of this work is to evaluate the results with high precision and convergence.
Impact of Electric Vehicle Integration on Gridvivatechijri
Load flow analysis is most essential and important approach to investigate problems in power system. It can provide balance steady state operation of power system without considering transients in it. This project presents a new and efficient method for solving the Load flow problem of a distribution network. By using Backward/Forward sweep method parameters like voltage profile, total power losses, load on each bus of the Distribution Network will be known. By using Load Flow load balancing of the Distribution system can be achieved. For load balancing we will use the power stored in the Electric vehicle. As Electric vehicle has large battery pack for storage. The impact of Electric Vehicle and load flow of distribution network is computer programed to implement the power flow solution scheme in MATLAB software.
An Adaptive Neuro-Fuzzy Inference Distributed Power Flow Controller (DPFC) in...IAES-IJPEDS
A well-prepared abstract enables the reader to identify the basic content of a document quickly and accurately, to determine its relevance to their interests, and thus to decide whether to read the document in its entirety. The Abstract should be informative and completely self-explanatory, provide a clear statement of the problem, the proposed approach or solution, and point out major findings and conclusions. The Abstract should be 100 to 200 words in length. The abstract should be written in the past tense. Standard nomenclature should be used and abbreviations should be avoided. No literature should be cited. The keyword list provides the opportunity to add keywords, used by the indexing and abstracting services, in addition to those already present in the title. Judicious use of keywords may increase the ease with which interested parties can locate our article.
Analysis of the Use of Universal Distribution Factors in SEC Power Gridresearchinventy
Distribution factors have been extensively used in many power system analysis and planning studies. In recent power system studies, the AC distribution factors are insensitive to the operating point and relatively sensitive at certain degree to changes in network topology. These factors are linear approximations of sensitivities of variables with various inputs. This paper presents the calculation of the universal distribution factors (UDF’s) applies them on several practical scenarios of Saudi Electricity Company (SEC) power grid. The results are analyzed and evaluated considering various system conditions of SEC load. The results show that the accuracy of the used approach is acceptable compared with exact method. This is practically beneficial to SEC in computing its grid complex power flows using UDF's at the base case without the need to recalculate UDF’s which save efforts and time.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Particle Swarm Optimization based Network Reconfiguration in Distribution Sys...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
Metric Projections to Identify Critical Points in Electric Power Systemstheijes
The identification of weak nodes and branches involved have been analyzed with different technical of analysis as: sensitivities, modal and of the singular minimum value, applying the Jacobian matrix of load flows. We show up a metric projections application to identify weak nodes and branches with more participation in the electric power system.
ESDEMC_PB2009.08 A Measurement Technique for ESD Current Spreading on A PCB u...ESDEMC Technology LLC
Abstract—Electrostatic discharge (ESD) can cause interference or damage in circuits in many ways e.g., by E- or Hfield coupling or via conduction paths. Although we can roughly estimate the voltage and current at the injection point during an ESD event, the real offending parameter is mostly the ESD current spreading throughout the system. Those currents can be simulated if great simplifications of the system are accepted.
However, even in moderately complex systems the ability to simulate is limited by lack of models and computational resources. Independent of the complexity, but obviously not free of its own limitations is a measurement technique that captures the current as a function of time and location through the system.
This article describes the proof on concept of ESD such a measurement technique that allows reconstructing the spreading current as a movie from magnetic field measurements. It details the technique, question of probe selection and how to process the data to present the current spread as a movie.
A new method for controlling and maintainingIJCNCJournal
Topology Control is an essential technique in a wireless sensor network to extend the operational time of
the sensor nodes. The goal of this technique is to maintain network connectivity and optimize performance
metrics such as network lifetime and throughput. In this paper we presented a new method for controlling
and maintaining topology in wireless sensor networks that show some improvement over the state of art
methods. The results are analyzed based on objective criteria.
Effect of Mobility on (I-V) Characteristics of Gaas MESFET Yayah Zakaria
We present in this paper an analytical model of the current–voltage (I-V) characteristics for submicron GaAs MESFET transistors. This model takes into account the analysis of the charge distribution in the active region and incorporate a field depended electron mobility, velocity saturation and charge
build-up in the channel. We propose in this frame work an algorithm of simulation based on mathematical expressions obtained previously. We propose a new mobility model describing the electric field-dependent. predictions of the simulator are compared with the experimental data [1] and
have been shown to be good.
Effect of Mobility on (I-V) Characteristics of Gaas MESFET IJECEIAES
We present in this paper an analytical model of the current–voltage (I-V) characteristics for submicron GaAs MESFET transistors. This model takes into account the analysis of the charge distribution in the active region and incorporate a field depended electron mobility, velocity saturation and charge build-up in the channel. We propose in this frame work an algorithm of simulation based on mathematical expressions obtained previously. We propose a new mobility model describing the electric field-dependent. The predictions of the simulator are compared with the experimental data [1] and have been shown to be good.
Similar to Welcome to International Journal of Engineering Research and Development (IJERD) (20)
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
The paper addresses the importance of welding design to prevent corrosion at steel. Welding is
used to join pipe, profiles at bridges, spindle, and a lot more part of engineering construction. The
problems happened associated with welding are common issues in these fields, especially corrosion.
Corrosion can be reduced with many methods, they are painting, controlling humidity, and also good
welding design. In the research, it can be found that reducing residual stress on the welding can be
solved in corrosion rate reduction problem.
Preheating on 500oC and 600oC give better condition to reduce corosion rate than condition after
preheating 400oC. For all welding groove type, material with 500oC and 600oC preheating after 14 days
corrosion test is 0,5%-0,69% lost. Material with 400oC preheating after 14 days corrosion test is 0,57%-0,76%
lost.
Welding groove also influence corrosion rate. X and V type welding groove give better condition to reduce
corrosion rate than use 1/2V and 1/2 X welding groove. After 14 days corrosion test, the samples with
X welding groove type is 0,5%-0,57% lost. The samples with V welding groove after 14 days corrosion test is
0,51%-0,59% lost. The samples with 1/2V and 1/2X welding groove after 14 days corrosion test is 0,58%-
0,71% lost.
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
One of the major environmental concerns is the disposal of the waste materials and utilization of
industrial by products. Lime stone quarries will produce millions of tons waste dust powder every year. Having
considerable high degree of fineness in comparision to cement this material may be utilized as a partial
replacement to cement. For this purpose an experiment is conducted to investigate the possibility of using lime
stone powder in the production of SCC with combined use GGBS and how it affects the fresh and mechanical
properties of SCC. First SCC is made by replacing cement with GGBS in percentages like 10, 20, 30, 40, 50 and
by taking the optimum mix with GGBS lime stone powder is blended to mix in percentages like 5, 10, 15, 20 as
a partial replacement to cement. Test results shows that the SCC mix with combination of 30% GGBS and 15%
limestone powder gives maximum compressive strength and fresh properties are also in the limits prescribed by
the EFNARC.
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Welcome to International Journal of Engineering Research and Development (IJERD)
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN : 2278-800X, www.ijerd.com
Volume 5, Issue 1 (November 2012), PP. 29-37
Grouping Of Components in an Electrical Network by
Zones Using Topological Analysis by DFS and BFS
Techniques
Saraín Montero Corzo 1, Nayeli Ramón Lara 2,
Sergio BaruchBarragán Gómez 3
123
Instituto Politécnico Nacional, México.
Abstract:- Components and loads grouping in an electrical system has a large range of application in electrical
studies and supervised control centers that are used to complete tasks in real time. Locating electrical zones can be
useful to get some kind of information such as the amount of load that exists in each zone, energy losses, the
identification of electrical resources, faulted zones, and so on. In this work, two kind of topological analyzers are
presented, one of them uses DFS (Depth-First-Search) and the other, BFS (Breath-First-Search) in order to detect
and create electrical zones for components and loads that are feeded by distribution transformers. The algorithms
presented were proved using the case IEEE37 bus test case modified to be able to notice the functionality of these
programs.
Keywords:- electrical network, DFS(Depth-First-Search), BFS (Breath-First-Search), topological analysis,
electrical zones, graph, digraph, vertex, limit, buses, stack, queue, zone identifier.
I. INTRODUCTION
Areas definition or grouping components in electrical networks has become to be essential in the development of
applications. The criteria to generate the area or zone of interest will depend of the kind of application to be needed, for
example in [1] electrical zones are determined due to the function of switching devices to evaluate the reliability in an
electrical network. To be able to do this task, the use of topological analyzers in electrical networks is essential. A
topological analyzer utilizes a network representation that is basically a diagram constructed by a set of points which are
joined by lines. This representation is known in mathematics and computer science as graph or digraph. There are two types
of methodology to carry out a topological analysis; these methods are Breath-First-Search (BFS) and Depth-First-Search
(DFS). Both algorithms are widely used and they have special features that differ one from another, and the choice of which
one is going to be used depends on the task of interest. Some applications that employ these algorithms in electrical
Engineering are, the identification of faulted devices and sections in the presence of electrical faults [2], [3], and the
establishment of optimal paths of energy due to restoration studies [4]. The use given to the topological analyzers in this
work is to identify electrical components, which are feeded by transformers, and to group them by electrical zones. Trough
Components identification by zones it is possible to get various benefits, such as: Coloring the electrical zones in electrical
diagrams on control centers to known the installed load in each zone, to do energy losses countings, to have better control of
identification of special loads in the network.
The criterion to make this arrangement is to declare the transformers as elements which isolate electrically by one
attribute of logical state. This feature can be employed in planning to know the amount of load lost due to electrical faults,
and with these scenarios locate switching devices which satisfy a cost-benefits condition. The only modification would be to
change the attribute condition of lines as if they were transformers, and finally to apply the topological analyzer to know the
lost load.
In this work are applied BFS and DFS algorithms to show the ability that they have to solve problems in electrical
engineering. These algorithms were developed with Visual FORTRAN 2008 program, and were tested with IEEE37 bus test
case.
II. TOPOLOGICAL ANALYSIS
In the mathematical-computational language, a Graph is a finite series of points where some of them are joined by
lines, and a digraph is a finite series of points where some of them are joined by arrows, creating this what is known as a data
tree. Graphs and digraphs are extensively used to represent in an abstract way numerous problems and structures in
operations research, computer science, electrical engineering, economics, mathematics, physics, chemistry, communications,
game theory, and many other areas. In the Fig. 1 it is shown a digraph example.
Formally, a graph G is a pair V , E where V is a finite set whose elements are called vertices and E is a set of
subsets of V of order two which represent a combination pair of adjacent vertices [5].The elements of E are called limits.
Almost any algorithm that solves a graph problem requires the exploration or processing of each vertex or limit. The way
that these algorithms travel trough each vertex gives the name of the method.
29
2. Grouping Of Components in an Electrical Network by Zones Using Topological…
Fig. 1 Digraph example including trajectories made by DFS algorithm
A. Depth-First-Search
The DFS algorithm starts at the beginning of a vertex (which can be selected for a specific problem or in an
arbitrary form), and after this point, the analyzer traverses a path as far as possible, visiting and evaluating all the vertices on
it, until it reaches a final point. A final point is a vertex such that all the adjacent vertices have already been visited. Once the
final point has been reached the return begins and, in every preceding vertex the algorithm makes an analysis of adjacent
points that have not been analyzed and if they exist, the analyzer goes through this new path. The process ends when all the
vertices trough the graph or digraph have been visited or processed.
The last description can be ambiguous in a way when the analyzer tries to visit two vertices (even more) adjacent
to v , which depends of the searching criteria. To assure the nearest vertices to v are visited at first, it must be constructed a
queue Q .
Applying the BFS algorithm on the Fig. 1 digraph, the vertex visited sequence is ABCHGIEF. None priority
criterion searching was taken so the visiting of each vertex was done in an arbitrary way, but any criterion to prioritize the
path selection can be used.
The DFS algorithm is shown next:
Being G V , E a graph or digraph, where v V is the vertex where the search starts.
Where:
Q is a stack initially empty. The vertex on the top of Q is referred as the top.
1. Visit and mark v . Insert v in Q .
2. While Q is not zero, do:
a. While exists a vertex without visiting w adjacent to the top
b. Visit, mark w and store w (now w i son top of the stack)
3. Jump to Q (point 2)
B. Breath-First-Search
The BFS algorithm consists in the exploration of each vertex on the same level before changing to another one.
The vertices are visited in order according to the increasing distance from the initial vertex, where the distance represents the
number of limits in the shortest route.
The main step of BFS is to consider each vertex x of distance d from the initial vertex v and traverse trough all
vertices adjacent to x , find an evaluate all the vertices of d 1 distance from v . This starts with d 0 and is repeated
until there are no new vertices.
The BFS algorithm is shown next:
Being G V , E a graph or digraph where v V is the vertex from the search starts
Where:
Q is a queue initially empty. " x Q" means to remove from Q the item on the front and store it in x .
Visit and mark v . Insert v in Q
While Q is not zero, do:
" x Q"
For each vertex without a mark w adjacent to x do the next:
Visit and mark w
Insert w in Q
Applying the BFS algorithm on the digraph of the Fig. 3, the sequence of visited vertices is ABFCGEIH. The
searching sequence on the same level was done in an arbitrary way, but it can be used some criterion to prioritize the store of
each vertex visited in Q .
30
3. Grouping Of Components in an Electrical Network by Zones Using Topological…
Fig. 2 Digraph example showing the paths chosen by BFS algorithm
III. METHODOLOGY
The proposed algorithm for the identification of zones in an electrical network is shown en the Fig. 3. Following
subsections explain the purpose of each block.
Data reading of the electrical network:
buses
Components
Sending bus (component)
Receiving bus (component)
Switches
Sending bus (switches)
Receiving bus (switches)
Generation or reading of atributtes for components
of the electrical network:
Source
Energized component in both buses (Receiving-
Sending)
Isolating component
Generation or reading of atributtes for switches of
the electrical network:
State of the switches
Real or fictitious switches
Normal operation state (Normally Closed or
Normally Open)
Close N.C switches and open N.O switches
Renumber the buses due to the opening and/or
closing of switches
Generation of sending buses vector
(vecnodosele) and adjacency list matrix
(vinculoordele)
Grouping components by electrical zones
Fig. 3 Flow general diagram algorithm
A. Data Reading of the electrical network
This section reads the data of the electrical network. The data are integrated in two files. The first one includes the
information of buses, components, sending bus (for components), receiving bus (for components), switches, sending bus
(switches) and receiving bus (switches). This information is declared as character type variables. The component notation
refers to all components interconnected in an electrical network (transformers, capacitor banks, sources, lines, and so on)
excluding disconnection devices. Switches notation refers to all disconnection devices in the network (fuses, restorers,
blades, and so forth).
The second file includes the attributes of components vector ( l x 1 dimension) and switches ( k x 1 dimension),
the variable type for these data is logical (0 and 1). The attributes are mentioned next:
Source
Energized component in both sides (sending bus and receiving bus)
Component that isolates electrically
Switch state (is close or open)
Real or fictitious
Normal operation state (N.C or N.O)
B. Close N.C switches and open N.O switches
31
4. Grouping Of Components in an Electrical Network by Zones Using Topological…
This program portion closes the switches which have a normally closed operation state, and opens the switches
declared as normally opened (load transfer). To do the task previously described it is used the “state of the switches”
attribute vector. The objective of this task is to leave the electrical network in the normal operation state.
C. Renumber of the buses
This program block is formed by two tasks; the first one renumbers the buses of the electrical network on the
switches due the maneuvers over disconnection devices (real or fictitious). The second one uses the gathered information
from the first one and renumbers the components buses.
D. Adjacency list generation
This section generates a components sending buses vector with dimension n x 1 (it does not include switches).
This vector has the name of vecnodosele (for reference porpoises). In a parallel form, an adjacent matrix is generated with a
n x m dimension; this matrix is called vinculoordele (for reference porpoises). The adjacent matrix objective is to link each
i row of vecnodosele vector with the i row of the vinculoordele matrix, where each column will have the information of the
components which are connected in the same bus. The data stored in a column of vinculoordele is the element position inside
the component vector.
E. Grouping components by electric zones
This program block has the task to group the electrical components through transformers electrical supply zones.
The topological analyzers chosen were DFS and BFS. An explanation of each method used is detailed below.
1) Components grouping using DFS,
In the Fig. 4 it is shown the flow diagram of the algorithm employed in the topological analyzer using the DFS technique.
start
Store the source bus in stack
and assign to it the number
one zone identificator
Store in seccbusaislad the bus number. Store
the actual zone number in the isla vector
Detect components connected
to the bus under analysis
No
Did it found components connected to
the bus under analysis?
Yes
Number of components connected to
the bus under analysis
Refresh the zone
number
Was the component visited
and does exist a new path?
Yes
No
No Store in the stack the
Is it a component that
receiving bus
isolates the net?
Yes
Store in the stack the
No receiving bus, and
Does exist a component connected
generate another
on the receiving bus?
zone
Yes
Yes
Are there items
in the stack?
Extract the item from stack
No
No
Were all buses analyzed?
Store in the stack the bus not
Yes analyzed and generates
another zone
end
Fig. 4 DFS modified algorithm flow diagram
The traverse starts from the sending bus of the supply source. To carry out this, it is important to store in the row
1 x 1 of vecnodosele the sending bus of the supply source, since the first vertex that is stored in the stack Q is the element
1 x 1 of vecnodosele.
The first element of Q is stored in a vector of visited vertices (seccbusaislad), after this, it is included a zone
identifier that starts with a number one and it is assigned to the source and is store un a vector named isla.
The searching vertex is analyzed and it is located the row in vinculoordele where the items different of zero in
each column are extracted (vertices adjacent to the searching vertex). After that, each extracted item is evaluated until it
founds one that has not been visited. If the sending bus of one of the components connected to a searching vertex has been
visited and it is a new traverse (a final point was reached and the stack Q has been left empty) it is done a refresh of the
32
5. Grouping Of Components in an Electrical Network by Zones Using Topological…
zone identifier of the current traverse to the incident zone identifier. If the current analyzed component has not been visited,
it is compared with a step criterion (“isolate component” of the vector components) in the traverse. If the component doesn’t
match the step criterion, it doesn’t get a new zone identifier but the receiving bus is stored in the stack Q and the process is
done again.
If the analyzed element matches with the step criterion and it doesn’t have components connected to the reception
bus, it gets a new zone number, this is the new searching vertex and it is stored in Q and the process is repeated. The
algorithm is designed to consider this behavior like the final point of the actual traverse.
All sending buses evaluated are stored in the stack Q only if there are no components that match the step criterion
and the component that isolates does not have connected components in its reception bus. When the traverse reaches a final
point, it is extracted from the stack Q a vertex, and it is analyzed to find components connected to it and the process is
repeated.
When the stack Q is empty, all electrical network buses are evaluated to check if all of them have been
considered. If exists one that has not been considered, it is inserted in the stack Q and it gets a new zone identifier and a
new study is carried out.
The search ends when all buses of the electrical network have been visited. The output of the topological analysis
the generation of the vector seccbusaislad (buses analyzed) and isla (zone identifier of each bus).
The algorithm proposed does not include a stack for zone identifiers.
2) Components arrangement using BFS,
In the Fig. 5 it is shown the algorithm flow diagram using the BFS topological analyzer
start
Store in the queue the
source bus and asigns to it
the number one zone
identificator
Extract from the queue a bus number and
zone identifier, and they are stored in two
vector (seccbusaislad,isla)
Detect and store the
connected components from
the searching bus
No Are there components
connected?
Yes
Number of components connected to
the searching bus
Yes
Refresh the zone
Is this a visited element?
number
No
Store in the queue
No the receiving node
Does it isolate the network?
and the actual zone
number
Yes
Store in the queue the
receiving node and generates
another zone number
Yes
Does the stack have elements?
Store in the stack the bus not
No visited and generates another
zone number
Were all buses analyzed?
No
Yes
end
Fig. 5 BFS modified algorith flow diagram
The search begins from the bus source. To carry out this, it must be stored the bus source in the 1 x 1 row of
vecnodosele, since the first stored vertex in the queue Q is the 1 x 1 element of vecnodosele.
The actual element of Q is extracted and stored in a visited vertices vector (seccbusaislad). After this, it is created
an identifier zone which starts with the number one and it is assigned to the source component and stored in a vector named
isla. The searching vertex (the extracted element from Q ) is used to find the row of vinculoordele that includes the
components that are connected to that searching vertex and stored in the columns of the vinculoordele matrix. Next, each
item is extracted from each column of vinculoordele matrix and those that are different from zero are analyzed and then
compared with a step criterion (“isolate component” of the vector components) in the search. If the component matches the
step criterion, it gets a new zone identifier and the receiving bus and the new zone identifier are stored in queues, one for
33
6. Grouping Of Components in an Electrical Network by Zones Using Topological…
zone numbers and another for receiving bus and the process is done again for the components extracted. If not, the receiving
bus is stored in the queue and it maintains the actual zone identifier that is store in the zone identifier queue.
At the end of the analysis of each bus adjacent to the searching bus, the process is repeated by extracting another
vertex stored in the queue. The process ends when all buses of the electrical network are considered. The output of the
topological analysis is the generation of seccbusaislad vector (visited buses) and isla vector (zone identifier vector of each
bus).
The algorithms presented here include an additional function which is the consideration of components in the
electrical network which its sending bus is not linked to a receiving bus of another component. This case can be seen in the
Fig. 1 in the vertex D (for the case of the DFS analyzer). In this situation it can be appreciate that the vertices H, E and C are
adjacent to D vertex, but their paths do not point out to vertex D, on the contrary, vertex D point out to them. Due this
problem, the searching sequence of DFS traditional algorithm does not consider D vertex as it can be seen by the presented
sequence ABCHGIEF.
For the BFS case, it can be seen in the Fig. 2 that the same problem as described for DFS exists. Due to the
searching sequence the traditional BFS algorithm does not consider the vertex D, as it can be seen in the given sequence
ABFGCEIH. The solution for the incidences to the same vertex was performed by doing comparative tasks about
components of the vecnodosele against the items of seccbusaislad (visited buses). If any bus has not been considered, it is
stored in the queue Q and it gets a new zone identifier (a new number that has not been assigned to another electrical zone)
and y the searching process is done again.
Another implemented function over the traditional DFS and BFS is the verification of whether the analyzed vertex
has been visited yet. This is a fundamental task for the case of incident paths to the same vertex (it has another zone
identifier). If the searching vertex is already contained in the seccbusaislad vector, it is done a replacement of the zone
identifiers (isla vector ) that have the same number on the actual traverse to the zone identifier that has the found vertex
inside the seccbusaislad vector. Finally, it is performed a comparative analysis on sending and receiving buses of electrical
network components with the items stored in the seccbusaislad vector. When matches occur the component gets the zone
identifier of the coincidence of the isla vector.
IV. RESULTS
The algorithms presented were tested with IEEE37 bus test case with modifications for this application. In the Fig.
6 this network is shown. The electrical network was modified to include transformers in some sections; this was done with
the purpose to see the arrangement of the components which are supplied for transformers in the distribution network. The
output of DFS and BFS algorithms are two vectors called seccbusaislad and isla. In the first vector the buses analyzed are
stored with an appearing order according to the algorithm employed. The second vector (isla) keeps the identifier number of
each bus stored in the seccbusaislad vector. The table I shows the searching sequence of each analyzer and the zone
identifier of each bus.
Fig. 6 IEEE 37 bus test case modified
34
8. Grouping Of Components in an Electrical Network by Zones Using Topological…
In Table I it can be seen the searching sequences of each algorithm. In BFS, the searching is spreading trough the
network buses from the source bus. For example, from bus 1 to bus 7 (after S2) there are not more than two components
connected. From the bus after S2 the receiving buses of three components connected to it are stored in the queue. These
components are: LDS3IN (line before TR2, bus 8 to agree with Table II), LDS9IN (line before S9, bus 26 to agree with
Table II), and LDS12IN (line before S12, bus 35 to agree with Table II). The buses described are visited and stored in the
component visited vector (seccbusaislad) in an expansive form, to agree with the BFS. The next step is to consider the buses
stored in the queue as sending buses to do the next search which are shown in the Table II, bus 8 for TR2, bus 26 for
LDS9IN, and bus 35 for LDS12IN. When the bus 8 analysis is done, it is identified that it has the TR2 connected to it, this
component has the isolate component attribute (step criterion to assign a new zone identifier) a logical true state, therefore, it
can be seen in the Table I and Table II that the receiving bus (bus 9) has assigned another zone identifier.
The next buses that appear in the visited bus vector are 18 and 37 which come from bus 26 for LDS9OUT and bus 35 for
LDS12OUT. The sequence is repeated until all buses are analyzed.
The DFS algorithm differs from BFS that it has not a spreading behavior, but it searches into the deepest part of
the network until it gets a final vertex. When this point is reached, it comes back by the same path and searches in
connection points if there are components not taken into account and in this way the travel trough this new path until it
reaches another end point, in this way the process is repeated until there are no more vertices to be visited. This logic can be
appreciated in the Table I with the support of the Fig. 6. Where for example, all visited buses after the transformer 2 (TR2)
are stored in a sequence (they have the same zone identifier, for this case number 3).
Table II zone assignment for components of the electrical network
component N.S N.R Zone component N.S N.R Zone
NODTR1IN 1 0 1 LDS22IN 40 64 3
LDS1OUT 3 4 2 LDS22OUT 64 66 3
LDS2IN 4 5 2 LDS23IN 43 67 3
LDS2OUT 5 7 2 LDS23OUT 68 69 4
LDS3IN 7 8 2 LDS24IN 60 70 4
LDS3OUT 9 10 3 LDS24OUT 70 72 4
LDS4IN 10 11 3 LDS25IN 72 73 4
LDS4OUT 12 25 3 LDS25OUT 73 75 4
LDS5IN 10 13 3 LDS26IN 75 76 4
LDS5OUT 13 15 3 LDS26OUT 76 69 4
LDS6IN 15 16 3 LDS27IN 72 78 4
LDS6OUT 16 18 3 LDS27OUT 78 63 4
LDS7IN 18 19 3 LDS28IN 63 80 4
LDS7OUT 19 21 3 LDS28OUT 80 82 4
LDS7OUTA 21 22 3 LDS29IN 63 84 4
LDS8IN 21 23 3 LDS29OUT 84 86 4
LDS8OUT 23 25 3 LDS30IN 115 87 4
LDS9IN 7 26 2 LDS30OUT 88 75 4
LDS9OUT 26 28 2 LDS31IN 102 89 4
LDS10IN 28 29 2 LDS31OUT 90 57 2
LDS10OUT 29 31 2 LDS32IN 86 91 4
LDS11IN 28 32 2 LDS32OUT 91 93 4
LDS11OUT 33 34 2 LDS33IN 93 94 4
LDS12IN 7 35 2 LDS33OUT 94 96 4
LDS12OUT 35 37 2 LDS34IN 96 97 4
LDS13IN 15 38 3 LDS34OUT 97 99 4
LDS13OUT 38 40 3 LDS35IN 96 100 4
LDS14IN 18 41 3 LDS35OUT 100 102 4
LDS14OUT 41 43 3 LDS36IN 93 103 4
LDS15IN 37 44 2 LDS36OUT 103 105 4
LDS15OUT 44 46 2 LDS36OUTA 105 106 4
LDS16IN 46 47 2 LDS37IN 106 107 4
LDS16OUT 47 49 2 LDS37OUT 107 109 4
LDS17IN 49 50 2 LDS38IN 109 110 4
LDS17OUT 50 34 2 LDS38OUT 110 112 4
LDS18IN 49 52 2 LDS39IN 109 113 4
LDS18OUT 52 54 2 LDS39OUT 113 115 4
LDS19IN 49 55 2 TR1 2 3 1,2
LDS19OUT 55 57 2 TR2 8 9 2,3
LDS20IN 37 58 2 TR3 58 59 2,4
LDS20OUT 59 60 4 TR4 72 83 4,5
LDS21IN 66 61 3 LDS1IN 1 2 1
LDS21OUT 62 63 4
36
9. Grouping Of Components in an Electrical Network by Zones Using Topological…
It can be seen in the Table I that the buses 33 and 90 (with a zone identifier 2) do not appear in the searching
sequence when the zone 2 is examined. This is because the distribution lines LDS11OUT (connected to bus receiving of
S11) and LDS31OUT (connected to bus receiving of S31), are used to do load transfer, therefore when the analyzer reaches
these components it does not find the sending bus, but the receiving bus, and in this way, the analyzer cannot continue with
the analysis. The mentioned buses appear when the analysis of a path has been done and the sending bus vector named
vecnodosele has been analyzed to assure that all buses has been taken into account in the study. Once the zone identifiers for
all buses were gotten, it was carried out an assignment of zones for electrical components. This assignment can be seen in
the Table II. In the Fig. 6 each component is colored according to the zone identifier assigned.
V. CONCLUSIONS
The utilized analyzers to arrange electrical components feeded by specific transformers trough zone identifiers gave
satisfactory results at testing them with the IEEE37 bus test case modified. These tools offer the possibility to identify
electrical components and loads in a graphic form. With the zone identifier it can be done the account of load that a
transformer provides, as well as the electrical losses of each zone. Another application that can be done with these tools is to
change the step criterion for some lines to be driven as transformers, with this attribute change, it could be analyzed the
benefit-cost that would be expected when switching devices are inserted in the network to isolate electrical faults.
REFERENCES
[1]. Yufeng Huang, Zongqi Liu, Wenxia Liu, Jianhua Zhang, “Design and Implementation of Reliability Evaluation
Module for Medium Voltage Distribution Networks by Objectarx Technology”, Advances in Power System
Control, Operation and Management (APSCOM 2009), 8th International Conference on.
[2]. ZHANG Yagang, ZHANG Jinfang, MA Jing, WANG Zengping, “Fault Diagnosis Based on BFS in Electric
Power Syste”, Measuring Technology and Mechatronics Automation, 2009. ICMTMA '09. International
Conference on
[3]. QIN Lijun, HAO Cuijuan, JIN Huawei, LI Meng, WANG Ying, “CIM-Based Fault Detection Analysis of
Distribution System”, 2011 The International Conference on Advanced Power System Automation and Protection.
[4]. P. Ravi Babu, K.Vamshi Krishna, W.Shirisha, P. Naga Yasasvi,”Heuristic Search Strategy for Service Restoration
Using DFS and BFS Techniques”, Power Electronics (IICPE), 2010 India International Conference on.
[5]. Sara Baase, Computer Algorithms: Introduction to Design and Analysis, Addison-Wesley Publishing Company,
1978,ch.3.
Authors:
Saraín Montero Corzo. M.Sc. in Electrical Engineering from SEPI-ESIME-IPN, México in 2006.
Electrical Engineer graduated from Instituto Tecnológico de Tuxtla Gutiérrez, México in 1998. Nowadays is an associated
professor at ESIME-Zacatenco. The interest areas for him are Electrical System analysis for Power and Distribution, Power
Electronics and Energy Quality.
Nayeli Ramón Lara. Is an associated professor at the ESIME-IPN. M.Sc. in Electrical Engineering at SEPI-
ESIME-IPN in 2006. Electronics and Communications engineer graduated from Instituto Tecnológico y de Estudios
Superiores de Monterrey en 2002. The interest areas for her are, Electrical Machines Control, Power Electronics and
Education.
Sergio Baruch Barragán Gómez. Titular professor level A from ESIME-IPN. M.Sc. in Electrical
Engineering from SEPI-ESIME-IPN in 2004. Electrical Engineering from ESIME-IPN en 2001. The Interested areas for him
are free Software, Analysis and Economic Operation of Electrical Systems.
37