Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Selective Harmonics Elimination Technique for Artificial Bee Colony Implementation

    T. DeepikaVinothini1,*, R. Karthigaivel2, J. BarsanaBanu3

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2721-2740, 2023, DOI:10.32604/csse.2023.028662 - 21 December 2022

    Abstract In this research, an Artificial Bee Colony (ABC) algorithm based Selective Harmonics Elimination (SHE) technique is used as a pulse generator in a reduced switch fifteen level inverter that receives input from a PV system. Pulse width modulation based on Selective Harmonics Elimination is mostly used to suppress lower-order harmonics. A high gain DC-DC-SEPIC converter keeps the photovoltaic (PV) panel’s output voltage constant. The Grey Wolf Optimization (GWO) filter removes far more Photovoltaic panel energy from the sunlight frame. To eliminate voltage harmonics, this unique inverter architecture employs a multi-carrier duty cycle, a high-frequency modulation More >

  • Open Access

    ARTICLE

    An Intelligent Intrusion Detection System in Smart Grid Using PRNN Classifier

    P. Ganesan1,*, S. Arockia Edwin Xavier2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2979-2996, 2023, DOI:10.32604/iasc.2023.029264 - 17 August 2022

    Abstract Typically, smart grid systems enhance the ability of conventional power system networks as it is vulnerable to several kinds of attacks. These vulnerabilities might cause the attackers or intruders to collapse the entire network system thus breaching the confidentiality and integrity of smart grid systems. Thus, for this purpose, Intrusion detection system (IDS) plays a pivotal part in offering a reliable and secured range of services in the smart grid framework. Several existing approaches are there to detect the intrusions in smart grid framework, however they are utilizing an old dataset to detect anomaly thus… More >

Displaying 1-10 on page 1 of 2. Per Page