scispace - formally typeset
Search or ask a question

Showing papers presented at "International Conference on Electrical Engineering in 2012"


Journal ArticleDOI
01 May 2012
TL;DR: A comparison study of using two algorithms for the tuning of PID-controllers for speed control of a Permanent Magnet Brushless DC (BLDC) Motor proves that the PSO was more efficient in improving the step response characteristics.
Abstract: The proportional-integral-derivative (PID) controllers were the most popular controllers of this century because of their remarkable effectiveness, simplicity of implementation and broad applicability. However, PID controllers are poorly tuned in practice with most of the tuning done manually which is difficult and time consuming. The computational intelligence has purposed genetic algorithms (GA) and particle swarm optimization (PSO) as opened paths to a new generation of advanced process control. The main objective of these techniques is to design an industrial control system able to achieve optimal performance when facing variable types of disturbances which are unknown in most practical applications. This paper presents a comparison study of using two algorithms for the tuning of PID-controllers for speed control of a Permanent Magnet Brushless DC (BLDC) Motor. The PSO has superior features, including easy implementation, stable convergence characteristic and good computational efficiency. The BLDC Motor is modelled using system identification toolbox. Comparing GA with PSO method proves that the PSO was more efficient in improving the step response characteristics. Experimental results have been investigated to show their agreement with simulation one.

15 citations


Journal ArticleDOI
01 May 2012
TL;DR: The multi-sensor data fusion technique based on fuzzy clustering is used to fuse the data from low cost MEMS IMUs to build an INS model and can achieve higher accuracy solutions with low cost IMU sensors and improve the performance of integrated navigation system.
Abstract: In this paper, the multi-sensor data fusion technique based on fuzzy clustering is used to fuse the data from low cost MEMS IMUs to build an INS model. Using this model, the inertial navigation data PVA is extracted. The navigation data PVA is integrated with the GPS data using Kalman filters to build an accurate navigation system of an UAV. Simulation results show that the method can achieve higher accuracy solutions with low cost IMU sensors and improve the performance ofintegrated navigation system.

9 citations


Journal ArticleDOI
01 May 2012
TL;DR: A comparative study of performance for three techniques of feature extraction is presented in order to classify the sleep stages using EEG signals to develop classifiers with a high identification performance rate.
Abstract: In the present paper, a comparative study of performance for three techniques of feature extraction is presented in order to classify the sleep stages using EEG signals. A multilayer feed forward neural network was used for classification. Six sleep EEG records for each of ten patients were selected from Cairo Center of Sleep Disorder. Three methodologies of analysis were utilized for feature extraction. These include: autoregressive modeling (AR), bispectral analysis, and discrete wavelet transform (DWT), where principle component analysis (PCA) was used to reduce feature dimensionality. The features derived from the three methodologies of signal analysis were used as input feature vectors to the classifier. Information fusion is very important task in pattern recognition as it is difficult to develop classifiers with a high identification performance rate. The multilayer feed forward neural network gives higher classification rate using the data fusion at the feature extraction level. It reaches 83.4%.

7 citations


Journal ArticleDOI
01 May 2012
TL;DR: A virtual lab based on MATLAB and FlightGear flight simulator is developed to design a stability augmentation system for C310 aircraft model according to known flying qualities then implement a hold autopilot for the aircraft.
Abstract: In this paper, a virtual lab based on MATLAB and FlightGear flight simulator is discussed and developed. The virtual lab consists of number of experiments that enhances the understanding of fundamental concepts of classical control forundergraduate students. The objective of the virtual lab is to design a stability augmentation system for C310 aircraft model according to known flying qualities then implement a hold autopilot for the aircraft. This objective is achieved through a series of experiments, animation and simulation to illustrate main concepts of classical control like modeling, time domain analysis, frequency domain Analysis, non-minimum phase systems, root locus, feedback design and PID compensation. These concepts are demonstrated in four experiments through the analysis and design of a flight controlsystem for Cessna 310 aircraft on FlightGear flight simulator. The developed virtual lab can be used easily by students to study and visualize classical control principles using FlightGear and MATLAB GUI with an attractive case study of a flight control system.

7 citations


Journal ArticleDOI
01 May 2012
TL;DR: In this article, the authors proposed modeling and simulation of PV Micro-Grid Distribution Generation System for Smart Grid Applications, which is based on Schott ASE-300-DGF PV panel with the aid of MATLAB environment.
Abstract: This paper proposes modeling and simulation of PV Micro – Grid Distribution Generation System for Smart Grid Applications. Because, Distributed Generation (DG) offers great potential in meeting future global energy needs. PV module modeling and inverter technique reviews are presented in this paper. The mathematical PV module modeling depends on Schott ASE-300-DGF PV panel with the aid of MATLAB environment. DC / AC Inverter, Three – phase Inverters, Basic Operation of PWM Inverter, Square – wave operations of DC/AC inverter, Single – phase and Full – BridgeConverters, Three – phase Converters and some MATLAB Inverters Results are introduced. Then, it proposes a PV module when coupled to a load through DC-DC Converter to supply this resistive load with the maximum power from the PV module. Some of DC-DC converters topologies are discussed in brief with concentration on Cuk and SEPIC Converters operations. After that, the mechanism of load matching is described to give the required converter duty cycle at maximum power point (MPP). Relations in 3D figures are introduced for the most probable situations for irradiance and temperature with the corresponding PV voltage and current. Also, 3D figures for the desired duty cycle, output voltage and current of DC-DC converter to gain the maximum power to the resistive load at various irradiance and temperature values.

5 citations


Journal ArticleDOI
01 May 2012
TL;DR: This paper suggests a new encryption method based on using the form and the properties of an orthogonal Hadamard array called the Kharaghani array of order 8 to be presented in the form of the 8-bit binary representation.
Abstract: This paper suggests a new encryption method based on using the form and the properties of an orthogonal Hadamard array called the Kharaghani array of order 8. In this method; the used encryption key, the plaintext and the ciphertext values should be integers less than 256 to be presented in the form of the 8-bit binary representation. There are some constrains that restrict the chosen value for the encryption key, these constrains lead to have only 126 available values for the encryption key. The 126 encryption keys were checked on the available plaintext values and some concluded notes and results were presented. The suggested encryption method has the advantage of being easy to implement because the construction of the Hadamard array is easy.

4 citations


Journal ArticleDOI
01 May 2012
TL;DR: This paper proposes an adaptive transmission in doubly selective fading channels using multimode transmission of FrFT-OFDM and FT- OFDM, and evaluates its performances through computer simulations.
Abstract: The popularity of multicarrier systems such as orthogonal frequency division multiplexing (OFDM) is based on the ability to cancel inter-symbol-interference (ISI) and channel distortion using a single tap equalizer in the case of a stationary channel. In doubly selective fading channels OFDM transceivers are unable to diagonalize the channel matrix and consequently inter carrier interference (ICI) appears. The discrete fractional Fourier transform (FrFT) has been suggested to enhance performance over traditional OFDM systems when transmitting over doubly-dispersive channels. In this paper a novel hybrid multicarrier system based on the Fractional Fourier transform and Fourier transform is presented. Taking advantage of these properties, we propose an adaptive transmission in those channels using multimode transmission of FrFT-OFDM and FT-OFDM, and evaluate its performances through computer simulations.

4 citations


Journal ArticleDOI
01 May 2012
TL;DR: In this article, three renewable energy power systems are presented in order to select the most optimal one of them to feed the required electric load of a small scale brackish reverse osmosis desalination unit and a tourism motel.
Abstract: The main objective of this work is to design an optimal – efficient economic power renewable energy system that feeds the required electric load of a small scale brackish reverse osmosis desalination unit and a tourism motel located in Hurghada, Egypt. Three renewable energy power systems are presented in this paper to select the most optimum one of them. Theses suggested renewable energy systems are stand-alone photovoltaic system, PV- wind-fuel cell hybrid system and PV- wind hybrid system. The sizing, optimization and economic estimation of the proposed systems were performed using HOMER software. HOMER solves the optimization problem to minimize the global cost and provides the optimum wind turbine, PV, battery and fuel cell ratings. In addition, a comparison between the three different suggested powersystem configurations is illustrated in details. PV- wind hybrid system realized the lowest net present cost and leverized cost of energy. Also, this system was able to provide energy approximately all the day. The battery state of charge variesbetween 77% to100% and it was found that, the PV- wind hybrid system is more suitable than the others for the selected site and the suggested electrical load.

4 citations


Journal ArticleDOI
01 May 2012
TL;DR: To provide more confidentiality to the hidden data in the IP ID field; the paper suggests implementing the IPsec encryption in the tunnel mode between the steganogram sending and receiving gateways.
Abstract: The method may be applied with either IPv4 or IPv6 packets. With IPv6; IP packet fragmentation is required by the packet source. In this method; the packet source should be the steganogram sender. The method has the advantages of being resistant to packet filtering and stateful inspection firewalls and it could be applied through different network scales and characteristics. To provide more confidentiality to the hidden data in the IP ID field; the paper suggests implementing the IPsec encryption in the tunnel mode between the steganogram sending and receiving gateways.

4 citations


Journal ArticleDOI
01 May 2012
TL;DR: An efficient method to predict and solve abnormal conditions in all types of electrical cables using Matlab Graphic User Interface “GUI” with thermal imaging infrared “IR” camera is proposed.
Abstract: This paper proposes an efficient method to predict and solve abnormal conditions in all types of electrical cables using Matlab Graphic User Interface “GUI” with thermal imaging infrared “IR” camera. Traditional techniques can not easily predict faults and cannot give a complete diagnose about them. Using any type of thermal cameras enables detecting abnormal conditions of cables by the technical operator (thermographer) depending on their thermal state. Then, thermal images can be sent to the advanced program (GUI) according to the proposed technique. Based on cables database, theproposed interface program and the projected technique are able to: 1) obtain the thermal profile of the system; 2) process and analyze collected thermal data, and 3) apply a simulated artificial technique to define the particular condition or fault corresponding to the thermal signature. The final performed report can contain: 1) problems that are found in the components and the system itself, 2) suggest remedy and any necessary corrective action with time schedule, and 3) give the priority of solving these problems with respect to repair maintenance time, 4) proper selections of cables types and size.

3 citations


Journal ArticleDOI
01 May 2012
TL;DR: In this article, the performance of Kalman Filter, modified Kalman filter, and Probability Hypothesis Density (PHD) filter for tracking a highly maneuverable target is shown.
Abstract: Tracking a maneuvering target weakens the performance of predictive-model-based Bayesian state estimators (Kalman Filter). Therefore, the Probability Hypothesis Density (PHD) filter was proposed to overcome this problem. In this paper, the performance of Kalman filter, modified Kalman filter, and PHD filter in tracking a highly maneuverable target is shown. All three algorithms to track a maneuverable target are applied. Monte Carlo simulation showed that the PHD filter provides promising performance compared to Kalman filter. In particular, the algorithm is capable of tracking multiple crossing maneuvering targets.

Journal ArticleDOI
01 May 2012
TL;DR: In this article, a transmission line protection scheme based on synchronized phasor measurement units is proposed to detect (predict) out of step condition using equal-area criterion which is consistent with transient energy function method for single machine-infinite bus system or two machines system.
Abstract: Synchronized phasor measurements have become an important technology with several international manufacturers offering commercial phasor measurement units (PMUs) which meet the prevailing industry standard for synchrophasors. With the occurrence of major blackouts in many power systems around the world, the value of data provided by PMUs has been recognized, and installation of PMUs on power transmission networks of most major power systems has become an important current activity . This paper presents a transmission line protection scheme based on synchronized phasor measurement units to detect (predict) out of step condition using equal-area criterion which is consistent with transient energy function method for single machineinfinite bus system or two machines system. This scheme uses the measured values of voltages and currents, as complex values, at the generator bus and at the infinite bus. These values of voltage and current are measured in time domain and transformed into phasor domain by using Discrete Fourier Transform to calculate the required areas. The proposed scheme can be used for the detection of out of step condition using equal area criterion with different types of faults at different locations and different models of transmission lines.


Journal ArticleDOI
01 May 2012
TL;DR: This comprehensive study showed general improvement in the throughput, jitter and delay particularly of voice and video transmission when using DiffServ-aware MPLS network as compared to pure IP only or MPLS only.
Abstract: The new emerging QoS architectures are motivated by the desire to improve the overall performance of an IP network. Differentiated Services (Diffserv) define a model for implementing scalable differentiation of QoS in the Internet. Multiprotocol Label Switching (MPLS) is a fast label-based switching technique that offers new QoS capabilities for large scale IP networks. When an MPLS network supports DiffServ, traffic flows can receive class-based network treatment that provides bases for QoS guarantees. The objective of this work is to study the influence of the QoS mechanism via DiffServ-MPLS on network parameters such as jitter, delay and throughput. The comprehensive study showed general improvement in the throughput, jitter and delay particularly of voice and video transmission when using DiffServ-aware MPLS network as compared to pure IP only or MPLS only. Keywords: VOIP, MPLS, Diffserv QoS, OPNET 1. Introduction Various multimedia applications such as video streaming, VOIP and video conference are gaining demand bringing with it a massive congestion to the IP networks. With the emergences of multimedia applications in IP networks, bandwidth consumption has become a critical issue among the Internet community and Internet providers. Also a lot of the recent multimedia applications and services not only have bandwidth requirements, but also require other QoS assurances, like end-to-end delay, jitter or packet loss likelihood. These QoS requirements put new challenges on Internet service providers [1].


Journal ArticleDOI
01 May 2012
TL;DR: The design, implementation and verification of a digital trajectory generator (DTG) and its application for guided vehicles is discussed and promising results showed potential for an on-going research and development for the system of concern.
Abstract: The missile mission success depends on robust guidance techniques in which the missile is to be guided to fulfill a correct trajectory up to hit point. This paper is devoted to discuss the design, implementation and verification of a digital trajectory generator (DTG) and its application for guided vehicles. The DTG is fed with target position and environmental parameters. The suitable trajectory missile attitude angles are generated as a function of time and are transmitted from the launcher to the missile via the four standard control wire dispended from the missile during flight. For the simulation purposes, an adaptation is developed to interface the DTG with the software based missile simulator through the standard USB port. A synchronizer is embedded in the DTG hardware design to synchronize and simulate the missile leave launch event. The design is verified by comparing the results of the basic stand alone flight simulator and those with the DTG hardware in the loop simulations in various operating points. Promising results showed potential for an on-going research and development for the system of concern. Developed DTG is a must step on upgrading the guided vehicles via using a goniometer in the launcher or via integrated onboard with homing head.

Journal ArticleDOI
01 May 2012
TL;DR: A novel indicator from a parallel algorithm will be presented to predict the voltage instability or the proximity of a collapse, which uses the obtained data of a normal load flow to identify the weak buses in the power system.
Abstract: The voltage stability is the ability of the power system to provide adequate reactive power under all operating conditions and to maintain stable load voltage magnitude within specified operating limits. The voltage instability leading to collapse appears to be due to the inability of networks to meet a demand for reactive power at certain critical or weak buses. It can be recognized by noting excessive fall in voltage for small increase in load and increasing difficulty in controlling system voltage. Therefore voltage collapse prediction must take in consideration in power system planning and operation. In this paper a novel indicator from a parallel algorithm will be presented to predict the voltage instability or the proximity of a collapse. The indicator uses the obtained data of a normal load flow to identify the weak buses in the power system. This method has carried out over changing the load power factor. Obtained results for the IEEE 5 bus system considering the effects of STATCOM on voltage stability are presented and discussed.

Journal ArticleDOI
01 May 2012
TL;DR: A hybrid testing methodology that combines both SBST and hardware-based self-test (HBST) for microcontroller testing as an efficient DFT methodology is introduced and Experimental results indicate that the presented methodology is superior in memory utilization, test time and can test all microcontroller modules for both 18F4X2 and 16F87X families.
Abstract: Testing of embedded system including microcontroller is difficult task with external Automatic Test Equipment (ATE). Therefore, empowering the microcontroller to test itself as software-based self-testing (SBST) looks the suitable solution like the microprocessor testing. Practically, the SBST is not suitable for microcontroller testing. It utilizes large space area in the program memory inside the microcontroller that has limited space area in the available memory. Also, it cannot test all microcontroller internal modules and when it test internal modules it cannot make sure that the General Purpose Input Output (GPIO) of the microcontroller work probably without using external ATE. So the Design for Testability (DFT)methodology that uses Instruction Set Architecture (ISA) of the microcontroller family to generate test subroutines and for the Test Pattern Generator (TPG) and part of the Built-In Self-Test (BIST) control unit and uses the external ATE for the other part of the BIST control unit and for the test response compaction (TRC) and evaluation. This paper introduces a hybrid testing methodology that combines both SBST and hardware-based self-test (HBST) for microcontroller testing as an efficient DFT methodology. It introduces for either in the field or as part of a production test of a microcontroller as an example of the system of chip (SoC). This DFT methodology is based on divide and conquer algorithm and requires knowledge of the ISA of the microcontroller to test not only the embedded processor found in microcontroller but also test other peripherals found in it using brute force technique. The comparison between the SBST and the presented hybrid methodology is based on memory utilization, number of clock cycles that was taken to complete each test and the number of modules that can be tested using each of them. Experimental results indicate that the presented methodology is superior in memory utilization, test time and can test all microcontroller modules for both 18F4X2 and 16F87X families.

Journal ArticleDOI
01 May 2012
TL;DR: This paper suggests two steganographic methods for data hiding in the payloads of marked IP datagrams, one of which uses an appropriate encryption algorithm and key to encrypt the plaintext blocks, then embeds the resulted ciphertext blocks in the Payload of markedIP packets' fragments sets.
Abstract: The payload of a datagram carries the user data which is required to be transmitted from the source to the destination. So to hide sensitive data in a datagram payload; the data should be first encrypted or hashed then embedded in the payload. Furthermore; the datagram source needs to mark the stego datagrams and mix them with normal ones, and the datagram receiver needs to check for the mark to identify the stego datagrams and excludes them away from the received stream, and then decodes the hidden data. This paper suggests two steganographic methods for data hiding in the payloads of marked IP datagrams. The first suggested method uses an appropriate encryption algorithm and key to encrypt the plaintext blocks, then embeds the resulted ciphertext blocks in the payloads of marked IP packets. The second method hides data in the payloads of marked IP packets' fragments sets. In the second method; IP packet fragmentation is required as the fragment offset field of the fragment (except the first fragment) is used by an intelligent way to hash data blocks before embedding them in its corresponding fragment payload, encryption could be used as an option to encrypt the data before or after hashing it, the matter which provides different available scenarios for this method. The paper also briefly discusses the confidentiality effect of using the IPsec encryption with its different modes with each suggested steganographic method.

Journal ArticleDOI
01 May 2012
TL;DR: The results showed that the localization plan which adopts the Systematic or Stratified Resampling scheme achieves higher accuracy localization while decreasing consumed computational time.
Abstract: This paper considers the effect of the Resampling schemes in the behavior of Particle Filter (PF) based robot localizer. The investigated schemes are Multinomial Resampling, Residual Resampling, Residual Systematic Resampling, Stratified Resampling and Systematic Resampling. An algorithm is built in Matlab environment to host these schemes. The performances are evaluated in terms of computational complexity and error from ground truth and the results are reported. The results showed that the localization plan which adopts the Systematic or Stratified Resampling scheme achieves higher accuracy localization while decreasing consumed computational time. However, the difference is not significant. Moreover, a particle excitation strategy is proposed. This strategy achieved significant improvement in the behavior of PF based robot localization.

Journal ArticleDOI
01 May 2012
TL;DR: A new block cipher algorithm that can be used for data security over devices with limited resources,e.g. smart cards, wireless sensors etc .
Abstract: In this paper we present a new block cipher algorithm that can be used for data security over devices with limited resources ,e.g. smart cards, wireless sensors etc .The algorithm is 128-bit balanced Feistel structure cipher algorithm working in cipher block chaining mode of operation. The building components of the algorithm have good cryptographic properties in comparison with other standard cipher algorithms and it has passed the NIST statistical test with very good results. The algorithm has been implemented on Microblaze microprocessor (as an emulator) to evaluate its efficiency and suitability to work on constrained devices.


Journal ArticleDOI
01 May 2012
TL;DR: It is found that the curvelet proposed implementation performs better in detecting larger and elongated structures compared to the Canny and the wavelet transforms.
Abstract: In this research paper, a new implementation on the second generation curvelet transform in the edge detection of coastline is presented and applied on WorldView-2 imagery, together with a comparison with the classical edge detection methods such as Canny operator and the traditional wavelet transforms. This implementation is aiming to compare this new approach to the traditional edge detection techniques. It is found that the curvelet proposed implementation performs better in detecting larger and elongated structures compared to the Canny and the wavelet transforms. However, Although this method is promising and efficient for edge detection, the quality of the edge detection is still a function of the pre-processing steps (the classification step in this research paper) , as any edge detector will suffer from the heterogeneity of the images especially when using very high resolution imagery.

Journal ArticleDOI
01 May 2012
TL;DR: Optimal PID Controller for AVR System Using Particle Swarm Optimization H. Abu-Seada W. M. Bendary A. A. Moustafa Hassan.
Abstract: This paper presents a method to get the optimal tuning of Proportional Integral Derivative (PID) controller parameters for an AVR system of a synchronous generator using Particle Swarm Optimization (PSO) algorithm. The AVR is not initially robust to variations of the power system parameters. Therefore, it was necessary to use PID controller to increase the stability margin and to improve performance of the system. Tuning of optimum (PID) controller parameter yield highquality solution. A new criterion for time domain performance evaluation was defined. Simulation for comparison between the proposed method and Ziegler-Nichols method is done. The proposed method was indeed more efficient also. Theterminal voltage step response for AVR model will be discussed in different cases and the effect of adding rate feed back stabilizer to the model on the terminal voltage response. Then the rate feedback will be compared with the proposed PID controller based on use of (PSO) method to find its coefficients. Different simulation results are presented and discussed.


Journal ArticleDOI
01 May 2012
TL;DR: This paper provides a survey and analysis on ongoing researches as well as evaluation summery of those approaches on this specific area of grid computing.
Abstract: Grid computing is a wide spread technology in recent years. It offers an effective way to build high-performance or high-throughput computing systems, allowing users to efficiently access and integrate geographically distributed computers, data, and applications. Searching and locating the resource which match the user's requirements in an efficient and timely manner is the important phase in grid computing which called resource discovery. Discovering resources in grid environment is complex due to the heterogeneous nature, dynamic availability of resources, resources are owned by different individuals and organizations and each having their own resource management policies i.e. different access and cost models. There are many different approaches in literature for solving this problem (e.g. Centralized-based, Hierarchical-based, Agentbased and P2P-based). This paper provides a survey and analysis on ongoing researches as well as evaluation summery of those approaches on this specific area. We believe that this survey would be useful for academic and industry based researchers who are engaged in the design of scalable computational Grid.

Journal ArticleDOI
01 May 2012
TL;DR: A biometric key dependent cryptosystem is proposed, to ensure the security of the whole system by using iris pattern as a key in a cryptos System like, Key-dependent Advanced Encryption Standard (KAES).
Abstract: With the increasing reliance on electronic information, which needs to be exchanged across the internet or stored on open networks, cryptography is becoming an increasingly important feature of computer security. A biometric key dependent cryptosystem is proposed, to ensure the security of the whole system by using iris pattern as a key in a cryptosystem, like, Key-dependent Advanced Encryption Standard (KAES). KAES is used to ensure that no trapdoor is present in cipher and to expand the key-space to slow down attacks. The proposed system gave significant results under various tests for the key uniqueness and the system randomness.

Journal ArticleDOI
01 May 2012
TL;DR: This paper presents a new approach using Particle Swarm Optimization (PSO) for solving the ELD problem with considering the generator constraints, ramp rate limits and transmission line losses and shows that the proposed approach is feasible and efficient.
Abstract: Economic load dispatch (ELD) problem is one of the most important problems to be solved in the operation and planning of a power system. The main objective of the ELD problem is to determine the optimal schedule of output powers of all generating units so as to meet the required load demand at minimum operating cost while satisfying system equality and inequality constraints. This paper presents a new approach using Particle Swarm Optimization (PSO) for solving the ELD problem with considering the generator constraints, ramp rate limits and transmission line losses. The proposed approach has been evaluated on 26-bus, 6unit system. The obtained results of the proposed method are compared with those obtained from the conventional lambda iteration method. The results show that the proposed approach is feasible and efficient.

Journal ArticleDOI
01 May 2012
TL;DR: A proposed procedure depends on the multi-objective fuzzy linear programming (MFLP) technique to obtain the optimal reactive power reserve for generators and static switchable VAr sources, as a preventive control action to overcome any emergency condition.
Abstract: This paper presents a proposed procedure depends on the multi-objective fuzzy linear programming (MFLP) technique to obtain the optimal reactive power reserve for generators and static switchable VAr sources, as a preventive control action to overcome any emergency condition. The proposed procedure is very significant to eliminate violation constraints and give an optimal reactive power reserve for multioperating conditions. The proposed multi-objective functions are: minimizing the real transmission losses, maximizing the reactive power reserve at certain generator, maximizing the reactive power reserve at all generation system and/or switchable VAr devices. The proposed MFLP is applied to a 5-bus test system and the West Delta region system as a part of the Egyptian Unified network. The numerical results showthat the proposed MFLP technique achieves a feasible real power loss with maximal reactive reserve for power systems.

Journal ArticleDOI
01 May 2012
TL;DR: In this article, the problem with existing standards limits for electromagnetic field exposure and showed that these limits are not safety for public health risks for power frequency electromagnetic fields are investigated and evaluated to assess the exposure from electrical equipments, transmission lines and LED display in commercial building according to the suggested healthy limits.
Abstract: Power frequency electromagnetic fields are receiving growing attention in recent years because of concerns that exposure to such fields might cause or contribute to adverse health effects. This paper reviewed the international limits for electromagnetic field exposure. Also this paper presented the problem with existing standards limits for electromagnetic field exposure and showed that these limits are not safety for public health risks. As a case study was investigated and evaluated to assess the power frequency electromagnetic fields exposure from electrical equipments, transmission lines and LED display in commercial building according to existing and the suggested healthy limits.