Optimization, Power Management and Reliability Evaluation of Hybrid Wind-PV-Diesel-Battery System for Rural Electrification
Adel Yahiaoui,
Abdelhalim Tlemçani,
Abdellah Kouzou
Issue:
Volume 9, Issue 3, September 2021
Pages:
73-88
Received:
26 April 2021
Accepted:
11 May 2021
Published:
18 August 2021
Abstract: Photovoltaic and wind energy are the most promising as a future energy technology and can be classified as a clean sources of electric energy in the world. Size optimization of the hybrid renewable energy system play an important role in minimizing the total cost of the system (TCS) and suitable load supply. The main focus of this research is to develop the efficient approach for the optimization of hybrid renewable energy system composed by photovoltaic area, wind turbine (WT), diesel generator (DG) and battery bank (BB). For this purpose, this paper proposes a new metaheuristic technique called modified grey wolf optimizer (M-GWO) for minimize the TCS of the hybrid system considering power balanced between the components. The study of reliability with loss power supply probability (LPSP), the energy not supplied (ENS) and the reliability of the power supply (RPS) methods are demonstrated. For improving the high exploration and exploitation to find the global optimum and robustness of our new approach the obtained results by M-GWO are compared with Grey Wolf Optimizer (GWO) and particle swarm optimization (PSO) methods.
Abstract: Photovoltaic and wind energy are the most promising as a future energy technology and can be classified as a clean sources of electric energy in the world. Size optimization of the hybrid renewable energy system play an important role in minimizing the total cost of the system (TCS) and suitable load supply. The main focus of this research is to de...
Show More
Bio-metric Encryption of Data Using Voice Recognition
Alhassan Jamilu Ibrahim,
Usman Abubakar Jauro
Issue:
Volume 9, Issue 3, September 2021
Pages:
89-96
Received:
27 June 2021
Accepted:
19 July 2021
Published:
19 August 2021
Abstract: In symmetric cryptosystems, the protection of secret keys is based on the traditional user authentication and likewise the security of the cryptosystem depends on the secrecy of the secret keys. In the event of lost, theft or infection of these secrete keys; the security of the cryptosystems would be compromised hence exposing critical information. Biometrics has been commercially used to verify user’s identity. Voice biometrics has been proven to be even more effective because it cannot be stolen in some cases like face, fingerprint or even iris biometrics. The research proves that a well-designed system will prompt an authentication question and on verification user must provide both the desired answer as well as desired matching threshold or the system ignores the user features. This research proposes a software-based architecture solution for Biometric Encryption of data using Voice Recognition that employed the Dynamic Time Warping (DTW) technique to solve the problem of speech biometric duration varying with non-linear expansion and contraction. The approach then used database to store the monolithically bind cryptographic key with the equivalent biometric hardened template of the user in such manner that identity of the key will stay hidden unless there is a successful biometric authentication by intended party. The research used the MIT mobile device speaker verification corpus (MDB) and A data set in quiet environment (QDB) for training and verifying session. Finally using the Equal Error Rate (EER) the research evaluated performance or rate at which False Acceptance Rate (FAR) and a False Rejection Rate (FRR) are equal. Therefore, according to the result it offers a better substitute method of user authentication than traditional pre-shared keys for benefit of protecting secret keys.
Abstract: In symmetric cryptosystems, the protection of secret keys is based on the traditional user authentication and likewise the security of the cryptosystem depends on the secrecy of the secret keys. In the event of lost, theft or infection of these secrete keys; the security of the cryptosystems would be compromised hence exposing critical information....
Show More