Search results

1 – 2 of 2
Article
Publication date: 15 October 2021

Paulthurai Rajesh, Francis H. Shajin and Kumar Cherukupalli

The purpose of this paper is to track the maximal power of wind energy conversion system (WECS) and enhance the search capability for WECS maximum power point tracking (MPPT).

Abstract

Purpose

The purpose of this paper is to track the maximal power of wind energy conversion system (WECS) and enhance the search capability for WECS maximum power point tracking (MPPT).

Design/methodology/approach

The hybrid technique is the combination of tunicate swarm algorithm (TSA) and radial basis function neural network.

Findings

TSA gets input parameters from the rectifier outputs such as rectifier direct current (DC) voltage, DC current and time. From the input parameters, it enhances the reduced fault power of rectifier and generates training data set based on the MPPT conditions. The training data set is used in radial basis function. During the execution time, it produces the rectifier reference DC side voltage that is converted to control pulses of inverter switches.

Originality/value

Finally, the proposed method is executed in MATLAB/Simulink site, and the performance is compared with different existing methods like particle swarm optimization algorithm and hill climb searching technique. Then the output illustrates the performance of the proposed method and confirms its capability to solve issues.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 28 December 2020

Francis H. Shajin and Paulthurai Rajesh

This study aims to evaluate the direct trust value for each node and calculate the trust value of all nodes satisfying the condition and update the trust value and value each…

Abstract

Purpose

This study aims to evaluate the direct trust value for each node and calculate the trust value of all nodes satisfying the condition and update the trust value and value each trust update interval for a secure and efficient communication between sender and destination node. Hence, a Trusted Secure Geographic Routing Protocol (TSGRP) has been proposed for detecting attackers (presence of the hacker), considering the trust value for a node produced by combining the location trusted information and the direct trusted information.

Design/methodology/approach

Amelioration in the research studies related to mobile ad hoc networks (MANETs) and wireless sensor networks has shown greater concern in the presence of malicious nodes, due to which the delivery percentage in any given network can degrade to a larger extent, and hence make the network less reliable and more vulnerable to security.

Findings

TSGRP has outperformed the conventional protocols for detecting attacks in MANET. TSGRP is establishing a trust-based secure communication between the sender and destination node. The evaluated direct trust value is used after the transmission of route-request and route-reply packets, to evaluate the direct trust value of each node and a secure path is established between the sender and the destination node. The effectiveness of the proposed TSGRP is evaluated through NS-2 simulation.

Originality/value

The simulation results show the delay of the proposed method is 92% less than PRISM approach and the overhead of the proposed TSGRP approach is 61% less than PRISM approach.

Details

International Journal of Pervasive Computing and Communications, vol. 18 no. 5
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 2 of 2