N. Amutha Priya, M. Aswin, S. J. Azis Shane, Y. Blessing Dino, D. Dagul
{"title":"Performance Analysis of a High Gain LUO Converter-Based Hybrid PV-Wind System","authors":"N. Amutha Priya, M. Aswin, S. J. Azis Shane, Y. Blessing Dino, D. Dagul","doi":"10.51983/ajes-2021.10.1.2794","DOIUrl":"https://doi.org/10.51983/ajes-2021.10.1.2794","url":null,"abstract":"This project is aimed at the implementation of a fuzzy logic algorithm based maximum power point tracking in transformer less grid connected PV system along with reactive power compensation. A single diode model is used for PV array and its simulation is performed using MATLAB. In fuzzy logic controller, voltage and current are taken as inputs and the effective value of A.C current corresponding to the maximum power point is obtained as output. Thus, in addition to supplying voltage by the inverter without transformer for compensating the reactive power not exceeding its power rating. This results in utilization of PV system at night and at periods of low irradiation. Rules relating the input and output of fuzzy logic controller are written and simulation is performed. A LUO Converter is used for maintaining DC input to the inverter at various conditions of irradiation and temperature. Gating pulses to the inverter are generated by proportional-integral controller. Hardware model of a10W solar panel is developed and results are obtained with fuzzy logic controller for different irradiation and temperature conditions. Results show the effectiveness of the proposed method in utilizing the PV system. This project is implemented using DSPIC30F2010 controller.","PeriodicalId":365290,"journal":{"name":"Asian Journal of Electrical Sciences","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115951707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IT Risk Management based on ISO 31000 for BRImo Application (BRI Mobile) as a Transaction Processing Information System","authors":"F. Wati, Sarmila Sari, Joy Nashar Utamajaya","doi":"10.51983/ajes-2021.10.1.2865","DOIUrl":"https://doi.org/10.51983/ajes-2021.10.1.2865","url":null,"abstract":"BRImo application is a software support system owned by Bank BRI in order to increase profits and provide maximum service to customers. With the BRImo application, it can make it easier for customers to register for new account openings and e-banking transactions anywhere without being limited by space and time. However, implementing information technology is not without risk, because banks are a highly regulated industry and must be carried out prudently. With the growing complexity of BRI's business activities and operations, the risks faced are also getting bigger. Threats that arise to operational activities can be triggered by various factors, both internal and external. Therefore, there is a need for risk management analysis on the BRImo Application using the ISO 31000 framework so that the possible risks that will occur can be minimized or eliminated by carrying out Risk Assessment and Risk Treatment. The results of this study are various possible risks in the identified application using a probability and impact matrix as well as the handling of the possible risks that exist. So that the results of this risk analysis can be used to help companies prevent, minimize risks, and treat these risks according to their priorities before the possibility of these risks hampering the company's performance.","PeriodicalId":365290,"journal":{"name":"Asian Journal of Electrical Sciences","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125356967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COVID-19: Confronts Covers Detection on Face through Python with Computer Vision, Tensor Flow and Keras","authors":"Sonali Mathur, Sohit Agarwal","doi":"10.51983/ajes-2021.10.1.2866","DOIUrl":"https://doi.org/10.51983/ajes-2021.10.1.2866","url":null,"abstract":"The corona virus COVID-19 widespread is causing an around the world wellness calamity so the effective safety techniques are wearing confronts covers in open locales agreeing to the field Wellbeing Organization The COVID-19 widespread constrained governments globally to force lockdowns to anticipate infection transmissions. Reports show that carrying a confront veil while at work essentially diminishes the danger of transmission. A proficient and financial method of utilizing AI to create a secure encompassing within the course of a production setup. Utilizing this recently discharged procedure, we are ready to help numerous to hit upon and pass on security safeguards, by implies of the utilization of this strategy numerous wellness and social workers will be able to find the COVID-19 influenced patients. In arranging that they may be privy to this and hold a remove from the person to diminish the unfurl of corona virus infection. This machine no longer as working on web locales be that as it may, this approach can more over be supportive of the domestic venture to find the influenced clients. A crossover adaptation utilizing profound and classical frameworks considering for mask discovery is getting to be given. A veil location dataset comprises of with covers and without cover pictures, we have gotten to be to apply OpenCV to undertake to real-time confront location from remain circulate thru our webcam. We are going to utilize the dataset to form a COVID-19 covers locator with PC vision with the use of Python, OpenCV, and Tensor flow, and Keras. Our purpose is to distinguish whether the character of photograph/video development is wearing a cover or not with the assistance of computer vision and profound picking up information.","PeriodicalId":365290,"journal":{"name":"Asian Journal of Electrical Sciences","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128175943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modified Artificial Bee Colony (ABC) Algorithm using Dynamic Technique","authors":"Mirza Samiulla Beg, Dr. Akhilesh A. Waoo","doi":"10.51983/ajes-2021.10.1.2863","DOIUrl":"https://doi.org/10.51983/ajes-2021.10.1.2863","url":null,"abstract":"The artificial Bee Colony Algorithm is a maximum optimization technique. It has been used in various research papers. In this paper, the dynamic technique has been used in Artificial Bee Colony Algorithm, before this algorithm used the greedy technology of the algorithm. But due to some deficiency in the greedy technique, it has been replaced by the dynamic technique. Here in the Artificial Bee Colony Algorithm, an attempt has been made to overcome the lack of hygiene by using the dynamic technique. The methodology is depicted in this paper. Using this methodology, you can smooth access to data in network communication, reduce data access time, and also reduce energy consumption.","PeriodicalId":365290,"journal":{"name":"Asian Journal of Electrical Sciences","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123236454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Qualitative Assessment of Digital Forensic Tools","authors":"Sakshi Singh, Suresh Kumar","doi":"10.51983/ajes-2020.9.1.2372","DOIUrl":"https://doi.org/10.51983/ajes-2020.9.1.2372","url":null,"abstract":"Forensic science is a study of science to criminals and civil laws. Digital forensics is the part of forensic science relating to proof found in computers and advanced storage media. Forensic examiners gather, protect and break down logical confirmations over the span of examination. Digital information contains data as content, pictures, sound, video and so on. These days numerous cybercrime cases, for example, hacking, banking cheats, phishing, email spamming, etc., have developed which are connected with a computerized information. Since the digital investigation is turning into an expanding concern, numerous digital forensic tools have been created to manage the difficulties of exploring computerized wrongdoings. The motivation behind digital forensics strategies is to look, protect and extract data on advanced frameworks to discover potential confirmations to exhibit them in the courtroom. In this paper, we have discussed five kinds of forensics namely Network Forensics, Live Forensics, Cyber Forensics, Database Forensics, and Mobile Forensics. The paper depicts a list of digital forensic tools in detail and looks at them based on the characterized parameters to figure out which tool suits better for any investigation. The paper looks at network, database and mobile forensic tools and examines the silent features and uniqueness of each of the tools along with their functionalities.","PeriodicalId":365290,"journal":{"name":"Asian Journal of Electrical Sciences","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125680752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Innovative Scheme of Reconciling IDEs Energetic Evidence to Provide Software Missions","authors":"S. Ravichandran","doi":"10.51983/ajes-2020.9.1.2371","DOIUrl":"https://doi.org/10.51983/ajes-2020.9.1.2371","url":null,"abstract":"An Integrated Development Environment (IDE) is the essential apparatus utilized by engineers to keep up programming framework. Current IDEs such an Eclipse IDE present static perspective on source code, yet such view ignoring data about runtime conduct of programming frameworks. Since common item arranged frameworks make significant utilization of polymorphism and dynamic official, static perspectives will miss the key data about runtime. An approach Senses used to collect and integrate dynamic information with static view of source code. Dynamic data race and memory leak is hard to detect in IDEs. A memory spill is capacity is distributed anyway that the program not wants. the premier normal mechanical criteria wont to affirm if a program still wants some tad of capacity is whether that memory will be come to from the present choice stack or world factors, that is whether that memory is root open. Capacity that is designated anyway not root available is unmistakably a break: there is no feasible way for the program to utilize that capacity again. This work exhibits a location of information races and memory spills are precisely and proficiently. The software tasks are maintained by improving the Correctness This paper present detection of data race and memory leak is accurately, effectively and efficiently.","PeriodicalId":365290,"journal":{"name":"Asian Journal of Electrical Sciences","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124015281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of Musical Instruments Sound Using Pre-Trained Model with Machine Learning Techniques","authors":"S. Prabavathy","doi":"10.51983/ajes-2020.9.1.2369","DOIUrl":"https://doi.org/10.51983/ajes-2020.9.1.2369","url":null,"abstract":"Classify the musical instruments by machine is a challenging task. Musical data classification becomes very popular in research field. A huge manual process required to classify the musical instrument. This proposed system classifies the musical instruments using GoogleNet which is a pretrained network model; SVM and kNN are the two techniques which is used to classify the features. In this paper, to simply musical instruments classifications based on its features which are extracted from various instruments using recent algorithms. The performance of kNN with SVM compares in this proposed work. The musical instruments are identified and its accuracy is computed with the classifiers SVM and kNN, using the SVM with GoogleNet 99% achieve as a high accuracy rate in classifying the musical instruments. In this system sixteen musical instruments used to find the accuracy using SVM and kNN.","PeriodicalId":365290,"journal":{"name":"Asian Journal of Electrical Sciences","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133825705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Citizens’ Readiness to Use Electronic Voting System in Oyo State, Nigeria","authors":"F. Omotayo","doi":"10.51983/ajes-2020.9.1.2373","DOIUrl":"https://doi.org/10.51983/ajes-2020.9.1.2373","url":null,"abstract":"The right to vote, which is identified as one of the fundamental human rights, encourages civic consciousness through political participation. Elections in Nigeria have been found to record low turnout, which has been partly attributed to problems identified with the traditional voting system used in the county. This study investigated the perception of Oyo state citizens about e-voting system, as well as their readiness to use the system. Descriptive survey research design was adopted. Questionnaire data was collected from 390 respondents, while 20 respondents were also interviewed. Questionnaire data were analysed using the Statistical Package for Social Sciences and presented using descriptive statistics in form of frequency, percentage, mean and standard deviation. The interview data was analysed using Nvivo software, version 10. Findings reveal that citizens perceived the current voting system as stressful and not transparent, and that e-voting system would be better than the present voting system because of the advantages associated with technology use. The citizens are ready to use e-voting system, if adopted by Nigerian government. The study recommends that Nigerian government could adopt and implement e-voting system to reduce the huge financial expenses associated with conduct of elections, as well as some other challenges that have been associated with elections in Nigeria.","PeriodicalId":365290,"journal":{"name":"Asian Journal of Electrical Sciences","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121302025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Things (IoT) and Smart Agriculture: With Reference to Applications and Emerging Concern","authors":"P. Paul, R. R. Sinha","doi":"10.51983/ajes-2020.9.1.2370","DOIUrl":"https://doi.org/10.51983/ajes-2020.9.1.2370","url":null,"abstract":"Agricultural Informatics is one of the important emerging domains gaining popularity in recent years. This is simply the application of Information Technology and Computing in Agriculture and allied activities. This is also the combination of ‘Agricultural Science’ and ‘Informatics or Information Science’. This emerging as an interdisciplinary subject and provides solutions for the smarter agriculture and advancement of the agricultural sectors. It is connected with various kinds of information and technological tools. In the recent past, various IT components have emerged and all these are responsible for the agricultural activities leading to cultivation; its enhancement, productivity, quality, cleanliness, efficiency, post agricultural activities. The Agricultural Informatics is responsible for the design, development, management and implementation of the advanced and intelligent agricultural systems, that may call as ‘Smart Agriculture’ or it may be called as ‘Digital Agriculture’. For the creation of such agricultural systems, various emerging Information Technological tools and technologies are emerging and among these important are Cloud Computing, Big Data, Internet of Things (IoT), Robotics & Artificial Intelligence, Human Computer Interaction, etc. Internet of Things (IoT) is applicable in designing and development of healthy and intelligent information systems that are connected with the internet and similar systems. IoT is responsible for various kinds of Agricultural development activities. This paper is conceptual in nature and deals with a brief overview on Agricultural Informatics including evolution, features and role and importance in the concentration of its applications in the creation of ‘Smart Agriculture’ and also emphasized how IoT and similar systems are helpful in promotion of Agricultural activities, intelligent and smarter way. Paper also highlighted about the issues, challenges and concerns on Agricultural Informatics with special reference to its IoT applications in Agriculture towards the promotion of Smart Agriculture.","PeriodicalId":365290,"journal":{"name":"Asian Journal of Electrical Sciences","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125181878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Optimal Design Feasibility of Microgrid Power System for Rural Electrification: Amhara Region in Ethiopia","authors":"A. Abebe, A. Pushparaghavan, Edmealem Gedefaye","doi":"10.51983/ajes-2019.8.3.2064","DOIUrl":"https://doi.org/10.51983/ajes-2019.8.3.2064","url":null,"abstract":"Power system is an essential energy domain in recent years which helps to converts non-electrical energy resources, such as hydraulic, thermal, solar, wind and other natural resources to electrical energy. It conveys the generated power to the consumers via transmission and distribution networks. The conventional power system has many problems, which are significant power loss at the transmission and distribution networks, poor power quality and reliability, and ultimately it is not an environmental friendly. These problems are resolved by using a microgrid which will provide electricity to the consumer economically with improved power quality, reliability, and minimum loss by integrating and optimizing different renewable energy sources. The main objective of this research study is to enable the optimal power provision and feasibility to design a microgrid. Based on this objective of Micro grid power system, the study has extended to deliver electricity to satisfy the location of Ethiopia, Bahir Dar Town, specifically the rural electrification as a model for the interior village Abay Mado-Gedro kebele primary school, health post and local communities demand by enhancing the power quality, reliability and minimum transmission / distribution line losses. The microgrid consists of solar, wind and battery storage sources. It is designed to operate in stand-alone mode of operation. Optimum designing and sizing of different components of the microgrid is taken as major contributions of this research work to the study for the Village Gedro as a rural electrification model. Hence it is observed through the analysis and design using HOMER Optimization tool, the total power consumptions for the site of optimal power is 25 kWh / day and 6 kW peak with the consideration of various environmental parameters like solar radiation, temperature and wind speed. Based on the optimal power energy consumption resulted out that the required various power resources are 7 kW Photo-Voltaic (PV), 3 kW Wind turbine, 104 kWh storage battery and 6 kW converter with the total investment cost $ 75993.","PeriodicalId":365290,"journal":{"name":"Asian Journal of Electrical Sciences","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134456637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}