scispace - formally typeset
Search or ask a question
Conference

International Conference on Electrical Engineering 

About: International Conference on Electrical Engineering is an academic conference. The conference publishes majorly in the area(s): Control theory & Electric power system. Over the lifetime, 3038 publications have been published by the conference receiving 9806 citations.


Papers
More filters
Proceedings ArticleDOI
01 Aug 2017
TL;DR: This paper thoroughly review state-of-the-art blockchain-related applications emerged in the literature and a number of published works were carefully included based on their contributions to the blockchain's body of knowledge.
Abstract: Blockchain technology has been known as a digital currency platform since the emergence of Bitcoin, the first and the largest of the cryptocurrencies. Hitherto, it is used for the decentralization of markets more generally, not exclusively for the decentralization of money and payments. The decentralized transaction ledger of blockchain could be employed to register, confirm, and send all kinds of contracts to other parties in the network. In this paper, we thoroughly review state-of-the-art blockchain-related applications emerged in the literature. A number of published works were carefully included based on their contributions to the blockchain's body of knowledge. Several remarks are explored and discussed in the last section of the paper.

176 citations

Proceedings ArticleDOI
01 Oct 2017
TL;DR: This paper discusses several reasons on why there are many IoT system that does not implement adequate security mechanism in MQTT protocol and demonstrates and analyzes how to attack this protocol easily using several attack scenarios.
Abstract: Various communication protocols are currently used in the Internet of Things (IoT) devices. One of the protocols that are already standardized by ISO is MQTT protocol (ISO / IEC 20922: 2016). Many IoT developers use this protocol because of its minimal bandwidth requirement and low memory consumption. Sometimes, IoT device sends confidential data that should only be accessed by authorized people or devices. Unfortunately, the MQTT protocol only provides authentication for the security mechanism which, by default, does not encrypt the data in transit thus data privacy, authentication, and data integrity become problems in MQTT implementation. This paper discusses several reasons on why there are many IoT system that does not implement adequate security mechanism. Next, it also demonstrates and analyzes how we can attack this protocol easily using several attack scenarios. Finally, after the vulnerabilities of this protocol have been examined, we can improve our security awareness especially in MQTT protocol and then implement security mechanism in our MQTT system to prevent such attack.

117 citations

Proceedings ArticleDOI
11 Apr 2007
TL;DR: The encryption quality of RC6 block cipher is investigated among its several design parameters such as word size, number of rounds, and secret key length and the optimal choices for the best values of such design parameters are given.
Abstract: This paper investigates the encryption efficiency of RC6 block cipher application to digital images, introducing a mathematical measure for encryption efficiency, which we will call the encryption quality instead of visual inspection. The encryption quality of RC6 block cipher is investigated among its several design parameters such as word size, number of rounds, and secret key length and the optimal choices for the best values of such design parameters are given. Also, the security analysis of RC6 block cipher for digital images is investigated from strict cryptographic viewpoint. The security estimations of RC6 block cipher for digital images against brute-force, statistical, and differential attacks are explored. Experiments are made to test the security of RC6 block cipher for digital images against all aforementioned types of attacks. Experiments and results verify and prove that RC6 block cipher is highly secure for real-time image encryption from cryptographic viewpoint. Thorough experimental tests are carried out with detailed analysis, demonstrating the high security of RC6 block cipher algorithm. So, RC6 block cipher can be considered to be a real-time secure symmetric encryption for digital images.

65 citations

Proceedings ArticleDOI
11 Apr 2007
TL;DR: In this paper, a hybrid energy system consisting of wind, photovoltaic, biomass and small/micro hydro was designed to supply continuous power to the load and a diesel generator was added to ensure continuous power supply.
Abstract: This paper deals with the design of a hybrid energy system consisting of wind, photovoltaic, biomass and small/micro hydro to supply continuous power to the load. A diesel generator is added to ensure continuous power supply and to take care of intermittent nature of wind and photovoltaic. The paper reports the results of optimization of hybrid energy system model of a remote area of Jaunpur block of Uttaranchal state of India. The model has been developed with the objective of minimizing cost function based on demand and potential constraints and optimized using computer programme developed in C++. The economic analysis has resulted in the calculation of capital cost, cost of energy for different types of resources and optimized cost of hybrid energy system. To consider the fluctuation in the discharge and power generation from SHP, the EPDF has been varied from 1.0 to 0.0. The EPDF is Electric Power Delivery Factor (also called optimizing power factor) has maximum value equal tol.

53 citations

Proceedings ArticleDOI
01 Nov 2014
TL;DR: In this article, a battery management system (BMS) has been designed and tested for Liium Ferro Phosphate (LFP) battery cells, and the BMS cell monitoring function has been able to measure the battery parameters such as the voltage and current dynamics of each cell.
Abstract: Battery has an important role as energy storage in electricity system utilization such as in electric vehicle and in smart microgrid system Battery Management System (BMS) is needed to treat the dynamics of energy storage process in the battery in order to improve the performance and extend the life time of battery In this paper, BMS cell monitoring and protection has been designed and tested for Lithium Ferro Phosphate (LFP) battery cells The BMS cell monitoring function has been able to measure the battery parameters such as the voltage and current dynamics of each cell The data taken from the BMS cell monitoring experiment is used to estimate the state of charge (SOC) of battery which is based on coulomb counting with coulomb efficiency ratios The BMS cell monitoring function has successfully demonstrated the presence of unbalanced cell voltages during both processes of charging and discharging as well From the analysis, the existence of capacity and energy fades was also investigated for every discharging and charging cycles Based on the BMS cell protection experiment results, overcharged and over discharged protections have successfully been demonstrated for the battery cells The charging process is disabled when the voltage of the corresponding battery cell exceeds its high limit (HLIM) at 365V, and the battery will be available for charging when all of the cell voltages are below their boundary limits (CAVL) at 33V The discharging process will be disabled when the battery cell voltage is lower than the corresponding low limit (LLIM) at 25 V The battery will be available again when all battery cell voltages are above their discharge available (DAVL) voltage at 28V The proposed BMS cell monitoring and protection has shown its function as a data acquisition system, safety protection, ability to determine and predict the state of charge of the battery, and ability to control the battery charging and discharging

49 citations

Performance
Metrics
No. of papers from the Conference in previous years
YearPapers
2021156
2020338
2019383
2018403
2017538
201678