Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 38
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

This article examines the reception of the féeries, French theatre productions known for their fantasy plots, lavish scenery and spectacular visuals, in the feuilletons by Zofia Węgierska, published in 1853–1869 by the magazine Biblioteka Warszawska. In her reviews of the plays and operas staged in the capital of the French Empire she tried to pinpoint those elements of the productions that were common to the Polish and the French early Romantic aesthetics. She highly appreciated the romantic fairytale magic, the clever juxtaposition of contrastive scenes and moods, historicism, metaphysics, and dazzling stage effects as long as they helped to impress upon the audience the didactic and moral message of a play. The unvarying reference points of her criticism are the plays of Alexandre Dumas père, the Polish Romantic drama, the reception of the Vien-nese romantic fairytale plays in Poland (until 1850) and the journalism of Théophile Gautier.
Go to article

Authors and Affiliations

Mirella Kryś
1
ORCID: ORCID

  1. Zakład Literatury Romantyzmu, Instytut Filolofii Polskiej, Wydział Filologii Polskiej i Klasycznej, Uniwersytet im. Adama Mickiewicza w Poznaniu
Download PDF Download RIS Download Bibtex

Abstract

This article discusses Grzegorz Uzdański’s verse novel Wypiór (2021, the title is a pun on the word ‘upiór’, Pol. spectre) which is multifaceted commentary on the Romantic tradition and the ‘Romantic paradigm’, epitomized in the figure of Adam Mickiewicz transformed into a vampire. The pop-cultural frame invites the reader to pursue all kinds of links between Wypiór and the gallery of the living dead, ghosts and spectres in Mickiewicz’s stories (conceived both as characters from the past and a metaphoric projections of the Romantic poet). The article compares the references and allusions in Uzdański’s novel to Mickiewicz’s own text as well as the text of another contemporary comic horror novel, Ale razem z naszymi umarłymi ( But Not Without Our Dead) by Jacek Dehnel. The analyses, which rely on a methodological toolkit inspired by Jacques Derrida’s hauntology, offer a more accurate reading of Wypiór and highlight its place in the contemporary reception of Romanticism with its predilection for haunting, ghosts or persistent spectral presence.
Go to article

Authors and Affiliations

Michał Gliński
1
ORCID: ORCID

  1. Szkoła Doktorska Nauk Humanistycznych UJ
Download PDF Download RIS Download Bibtex

Abstract

This is a comparative analysis of the key ideas regarding nation-building in the writ-ings of Adam Mickiewicz and Patrick Pearse, who have gone down to history as icons of the Polish and Irish national revival. In the case of Mickiewicz the article focuses on Dziady – Część III (Forefathers’ Eve – Part III), Konrad Wallenrod, Księgi narodu polskiego i pielgrzymstwa polskiego (Books of the Polish Nation and Poland’s Pilgrimage); the Irish materials include Pearce’s dramas The King and The Singer as well as Theobald Wolfe Tone’s ‘Speech from the Dock’. A trope common to all of them is the concept of ‘a beauti-ful, awesome voice’ / ‘a traitorous song’: literature as a mighty force that can create a community dedicated to the national cause. A comparison of passages that articulate the messianic idea indicates that, though understood by either writer in his own way, they both envision it as a catalyst turning nation-building literature into an apotheosis of martyrdom and death – a process which could be described as axiological metabolism. The article also examines the paradoxes of the projections of the myth of national unity in the work of both writers, especially in Mickiewicz’s Pan Tadeusz and Pearse’s short story ‘In My Garden’.
Go to article

Authors and Affiliations

Dobromiła Księska
1
ORCID: ORCID

  1. Szkoła Doktorska Nauk Humanistycznych UJ
Download PDF Download RIS Download Bibtex

Abstract

Tomasz Zan was one of the leaders of the Philomatic Association, a secret student organization that existed from 1817 to 1823 at the Imperial University of Wilno (Vilnius). This article deals with his autobiographical novel made up of letters he wrote between 1815 and 1823. As the assembled letters do not follow the author’s life in chronological order, the text has be read outside the formal categories of an autobiographical record, with due attention to the poetics of the fragment. Moreover, the textual narrator is not always a representative of the author. The occasional use of a persona suggests that the letters are not underpinned by a consistent and well-defined narrative “I”. It seems that in so far as Zan’s identity inscribed in the text appears fuzzy or disparate, its accurate reconstruction would not be possible without an analysis of the tropological system of his letters.
Go to article

Authors and Affiliations

Martyna Olejniczak
1
ORCID: ORCID

  1. Wydział Filologii Polskiej i Klasycznej, Uniwersytet im. Adama Mickiewicza w Poznaniu (Szkoła Doktorska Nauk o Języku i Literaturze)
Download PDF Download RIS Download Bibtex

Abstract

The aim of this article is to trace the relationship between time and dead bodies or human remains in selected works of the Romantic period featuring Poland’s legendary (pre)history, notably Józef Ignacy Kraszewski’s Stara baśń ( An Ancient Tale), ‘Lech’ from Deotyma’s Polska w pieśni ( Poland in Song), Cyprian Norwid’s Wanda and Krakus, and Juliusz Słowacki’s Balladyna, Lilla Weneda and Król-Duch ( The Spirit King). As Polish state was effaced from the political map of Europe (“laid in the grave”) the Romantics sought to affirm Poland’s indelible cultural and historical continuity by blurring the hard bound-ary between past and present. Hence a new interest in all kinds of burial sites – tombs, mounds and barrows – and the human remains interred there. Their continued presence undermines simple notions of life and death.
The article examines the poetic elaborations of the idea of temporality, especially the imagery used to challenge the official narrative of Poland’s history. If the dead (con-ceived realistically or symbolically) do not cease to exist, the historiography of the victors does not have the last word. Moreover, by reanimating the dead, investing them with a bodily form and giving each of them a voice to tell their story, the Romantic writers produced a new way of history writing based on a radical revision of the relationship between past, present and future.
Go to article

Authors and Affiliations

Agnieszka Pałucka
1
ORCID: ORCID

  1. Szkoła Doktorska Nauk Humanistycznych UJ
Download PDF Download RIS Download Bibtex

Abstract

The horror fiction of the Romantic Age differs considerably from its contemporary descendants. While generally associated with scary entertainment (‘playing with fear’), the Romantic Gothic often enough crossed the line to explore the depths of genuine epistemological, existential or political fears. This would not have been possible without developing its own poetics which drew its strength from a variety of sources. One of them was the speculative philosophy of history in its pessimistic and optimistic variants. They both fed the sense of horror and its literary transpositions. Moreover, they formed a positive feedback loop: anxiety over the course of history led to the use of the devices and registers of the poetics of horror, which in turn led to the amplification of the effects of the historical vision on the reader.
Go to article

Authors and Affiliations

Kamil Barski
1
ORCID: ORCID

  1. Wydział Filologii Polskiej i Klasycznej, Uniwersytet im. Adama Mickiewicza w Poznaniu (Szkoła Doktorska Nauk o Języku i Literaturze)
Download PDF Download RIS Download Bibtex

Abstract

This article takes stock of the prose and poetry of ‘the Warsaw bohemians’ – or ‘literary gypsies’ (‘cyganeria’), as they are called by historians of Polish literature – a non-conformist literary milieu of the early 1840s. For the contemporary radical activist and literary critic Edward Dembowski they represented ‘the young generation of Warsaw writers’. That description chimed in with their own programmatic statements extolling the virtues of youth. However, as our analyses show, in the overwhelming majority of their poems youth is addressed in unmistakably elegiac tones. Its energies are spent on pursuing morally dubious projects that are impossible to accomplish. If its glories are praised to the skies, the next moment it is pushed aside or negated. The enchanted worlds cannot but give way to the real world, i.e. the realities of social and political life.
Go to article

Authors and Affiliations

Patrycja Wojda
1
ORCID: ORCID

  1. Szkoła Doktorska Nauk Humanistycznych UW
Download PDF Download RIS Download Bibtex

Abstract

Phishing has been one of the most successful attacks in recent years. Criminals are motivated by increasing financial gain and constantly improving their email phishing methods. A key goal, therefore, is to develop effective detection methods to cope with huge volumes of email data. In this paper, a solution using BLSTM neural network and FastText word embeddings has been proposed. The solution uses preprocessing techniques like stop-word removal, tokenization, and padding. Two datasets were used in three experiments: balanced and imbalanced, whereas in the imbalanced dataset, the effect of maximum token size was investigated. Evaluation of the model indicated the best metrics: 99.12% accuracy, 98.43% precision, 99.49% recall, and 98.96% f1-score on the imbalanced dataset. It was compared to an existing solution that uses the DL model and word embeddings. Finally, the model and solution architecture were implemented as a browser plug-in.
Go to article

Authors and Affiliations

Rafał Wolert
1
Mariusz Rawski
1

  1. Institute of Telecommunications, Faculty of Electronics and Information Technology, Warsaw University of Technology, Poland
Download PDF Download RIS Download Bibtex

Abstract

A methodology for development for distributed computer network (DCN) information security system (IS) for an informatization object (OBI) was proposed. It was proposed to use mathematical modeling at the first stage of the methodology. In particular, a mathematical model was presented based on the use of the apparatus of probability theory to calculate the vulnerability coefficient. This coefficient allows one to assess the level of information security of the OBI network. Criteria for assessing the acceptable and critical level of risks for information security were proposed as well. At the second stage of the methodology development of the IS DCN system, methods of simulation and virtualization of the components of the IS DCN were used. In the course of experimental studies, a model of a protected DCN has been built. In the experimental model, network devices and DCN IS components were emulated on virtual machines (VMs). The DCN resources were reproduced using the Proxmox VE virtualization system. IPS Suricata was deployed on RCS hosts running PVE. Splunk was used as SIEM. It has been shown that the proposed methodology for the formation of the IS system for DCN and the model of the vulnerability coefficient makes it possible to obtain a quantitative assessment of the levels of vulnerability of DCN OBI.
Go to article

Authors and Affiliations

Valerii Lakhno
1
Zhuldyz Alimseitova
2
Yerbolat Kalaman
2
Olena Kryvoruchko
3
Alona Desiatko
3
Serhii Kaminskyi
3

  1. National University of Life and Environmental Sciences of Ukraine, Kyiv, Ukraine
  2. Satbayev University, Almaty, Kazakhtan
  3. Kyiv National University of Trade and Economics, Kyiv, Ukraine
Download PDF Download RIS Download Bibtex

Abstract

With rapid population increases, people are facing the challenge to maintain healthy conditions. One of the challenges is air pollution. Due to industrial development and vehicle usage air pollution is becoming a high threat to human life. This air pollution forms through various toxic contaminants. This toxic contamination levels increase and cause severe damage to the living things in the environment. To identify the toxic level present in the polluted air various methods were proposed by the authors, But failed to detect the tolerance level of toxic gases. This article discusses the methods to detect toxic gasses and classify the tolerance level of gasses present in polluted air. Various sensors and different algorithms are used for classifying the tolerance level. For this purpose “Artificial Sensing Methodology” (ASM), commonly known as e-nose, is a technique for detecting harmful gases. SO2-D4, NO2-D4, MQ-135, MQ136, MQ-7, and other sensors are used in artificial sensing methods (e-nose). “Carbon monoxide, Sulfur dioxide, nitrogen dioxide, and carbon dioxide” are all detected by these sensors. The data collected by sensors is sent to the data register from there it is sent to the Machine learning Training module (ML) and the comparison is done with real-time data and trained data. If the values increase beyond the tolerance level the system will give the alarm and release the oxygen.
Go to article

Authors and Affiliations

S. Deepan
1
M. Saravanan
1

  1. Department of Networking and Communications College of Engineering and Technology SRM Institute of Science and Technology, Kattankulathur, India
Download PDF Download RIS Download Bibtex

Abstract

Growing popularity of distributed generation is drawing special attention to communication technologies in smart power grids. This paper provides a detailed overview of the communication protocols utilized in the modern distributed grid laboratory. It describes both wired and wireless technologies used in Smart Grid and presents the remote operation of switching the subsystem from grid mode to island mode operating under nominal conditions. It shows the duration of power outages during a transfer to island mode with diesel generator running on idle - which simulates planned islanding and diesel generator stationary, which simulates unplanned islanding. Latency between registration of disturbance and executing control command is measured. The results obtained are compared with current legislation. The consequences to the power system that are possible in both scenarios are highlighted. Obtained results and description of the communication technologies can be useful for the design of distributed power grids, island-mode power grids, and Smart Grids, as well as for further research in the area of using combustion fuel generators as a primary power supply in the microgrid.
Go to article

Authors and Affiliations

Kamil Prokop
1
Andrzej Bień
1
Szymon Barczentewicz
1

  1. AGH University of Science and Technology, Kraków, Poland
Download PDF Download RIS Download Bibtex

Abstract

Fifth generation (5G) applications like Internet of Things (IoT), Enhanced Mobile Broadband (eMBB), Cognitive Radios (CR), Vehicle to Vehicle (V2V) and Machine to Machine (M2M) communication put new demands on the network in terms of low latency, ultra-reliable communication and efficiency when transmitting very small bursts. One new contender that makes its appearance recently is the Universal Filtered Multi- Carrier (UFMC). UFMC is a potential candidate to meet the requirements of 5G upcoming applications. This related waveform encounters the peak-to-average power ratio (PAPR) issue arising from the usage of multi-carrier transmission. In this investigation, two PAPR reduction techniques, called Per Subband Tone Reservation (PSTR) scheme to alleviate PAPR in UFMC systems are suggested. The first one is a pre-filtering PSTR scheme that uses the least squares approximation (LSA) algorithm to calculate the optimization factor(μ) and the second one is a post-filtering method. The concept of this proposal lies on the use of peaks reductions Tone to carry the correctional signal that reduces the high peaks of each sub-band individually. To shed light on UFMC as a potential waveform for 5G upcoming application, a comparison with OFDM modulation is done.
Go to article

Authors and Affiliations

Laabidi Mounira
1
Bouallegue Ridha
1

  1. Sup’Com, University of Carthage, Tunisia
Download PDF Download RIS Download Bibtex

Abstract

With improved technological successions, wireless communication applications have been incessantly evolving. Owing to the challenges posed by the multipath wireless channel, radio design prototypes have become elemental in all wireless systems before deployment. Further, different signal processing requirements of the applications, demand a highly versatile and reconfigurable radio such as Software Defined Radio (SDR) as a crucial device in the design phase. In this paper, two such SDR modules are used to develop an Orthogonal Frequency Division Multiplexing (OFDM) wireless link, the technology triumphant ever since 4G. In particular, a non-coherent end-to-end OFDM wireless link is developed in the Ultra High Frequency (UHF) band at a carrier frequency of 470 MHz. The transmitter includes Barker sequences as frame headers and pilot symbols for channel estimation. At the receiver, pulse alignment using Max energy method, frame synchronization using sliding correlator approach and carrier offset correction using Moose algorithm are incorporated. In addition, wireless channel is estimated using Least Square (LS) based pilot aided channel estimation approach with denoising threshold and link performance is analyzed using average Bit Error Rate (BER), in different pilot symbol scenarios. In a typical laboratory environment, the results of BER versus receiver gain show that with 4 pilot symbols out of 128 carriers, at a gain of 20 dB, BER is 0.160922, which is reduced to 0.136884 with 16 pilot symbols. The developed link helps OFDM researchers to mitigate different challenges posed by the wireless environment and thereby strengthen OFDM technology.
Go to article

Authors and Affiliations

Nandana Narayana
1
Pallaviram Sure
1

  1. Department of Electronics and Communication Engineering, MS Ramaiah University of Applied Sciences, Bangalore, India
Download PDF Download RIS Download Bibtex

Abstract

Non-orthogonal multiple access (NOMA) has received tremendous attention for the development of 5G and beyond wireless networks. Power-domain NOMA works on the concept of assigning varying power levels to users within the same frequency and time block. In this paper we propose a novel power allocation approach that uses the Zipf distribution law that satisfies the basic condition of a NOMA system. The Zipf PA is characterized by the simplicity and ease of implementation that allows to extend the capacity of the system to support a large number of users. The numerical results show that the system achieves high throughput and energy efficiency without any parameter optimization constraints as well as improved capacity by increasing the number of users compared to the NOMA system with existing power allocation techniques.
Go to article

Authors and Affiliations

Hanane Himeur
1
Sidi Mohammed Meriah
1
Fouad Derraz
1

  1. Faculty of Technology, University of Abou Bekr Belkaid, Tlemcen, Algeria
Download PDF Download RIS Download Bibtex

Abstract

Nowadays, the advancement and increased use of fifth-generation (5G) and sixth-generation (6G) systems have created a demand for more efficient and rapid transmission of information over wireless communication media. However, developing wireless communication systems that can meet these modern-day criteria for fast, reliable, and secure information exchange is a challenging task. To address this issue, this paper proposes a novel model for enhancing the 5G system. The proposed model utilizes polar code with rate matching and constitutional interleaving over the Suzuki fading channel. The combination of polar codes with rate matching and interleaving enables the communication system to achieve a lower error rate and better reliability over a Suzuki fading channel. Specifically, the polar code can correct a larger number of errors, while rate matching and interleaving can mitigate the effects of channel variations and reduce the probability of error bursts. These enhancements can lead to more robust and reliable communication in wireless networks.
Go to article

Authors and Affiliations

Muntadher Suhail Abed
1

  1. Ministry of Education - General Directorate of Education of Karbala, Karbala- Iraq
Download PDF Download RIS Download Bibtex

Abstract

The Elastic Optical Networks (EON) provide a solution to the massive demand for connections and extremely high data traffic with the Routing Modulation and Spectrum Assignment (RMSA) as a challenge. In previous RMSA research, there was a high blocking probability because the route to be passed by the K-SP method with a deep neural network approach used the First Fit policy, and the modulation problem was solved with Modulation Format Identification (MFI) or BPSK using Deep Reinforcement Learning. The issue might be apparent in spectrum assignment because of the influence of Advanced Reservation (AR) and Resource Periodic Arrangement (RPA), which is a decision block on a connection request path with both idle and active data traffic. The study’s limitation begins with determining the modulation of m = 1 and m = 4, followed by the placement of frequencies, namely 13 with a combination of standard block frequencies 41224–24412, so that the simulation results are less than 0.0199, due to the combination of block frequency slices with spectrum allocation rule techniques.
Go to article

Authors and Affiliations

R.J. Silaban
1
M. Alaydrus
1
U. Umaisaroh
1

  1. Department of Electrical Engineering, Universitas Mercu Buana, Jakarta, Indonesia
Download PDF Download RIS Download Bibtex

Abstract

A wireless sensor system is an essential aspect in many fields. It consists of a great deal of sensor nodes. These sensor networks carry out a number of tasks, including interaction, distribution, recognition, and power supply. Data is transmitted from source to destination and plays an important role. Congestion may occur during data transmission from one node to another and also at cluster head locations. Congestion will arise as a result of either traffic division or resource allocation. Energy will be wasted due to traffic division congestion, which causes packet loss and retransmission of removed packets. As a result, it must be simplified; hence there are a few Wireless sensor networks with various protocols that will handle Congestion Control. The Deterministic Energy Efficient Clustering (DEC) protocol, which is fully based on residual energy and the token bucket method, is being investigated as a way to increase the energy efficiency. In the event of congestion, our proposal provides a way to cope with it and solves it using this method to improve lifespan of the sensor networks. Experiments in simulation show that the proposed strategy can significantly enhance lifetime, energy, throughput, and packet loss.
Go to article

Authors and Affiliations

Habibulla Mohammad
1
K. Phani Rama Krishna
1
Ch Gangadhar
1
Riazuddin Mohammed
2

  1. PVP Siddhartha Institute of Technology, India
  2. University of Alberta, Edmonton, AB, Canada
Download PDF Download RIS Download Bibtex

Abstract

Since the digitalization of terrestrial television, many countries have discontinued television broadcasting in the UHF band. The freed-up frequencies are now available as digital dividends for mobile and fixed wireless access communication networks (MFCN), particularly for 4G/5G and public safety services in broadband called BBPPDR. Since cable TV still uses the UHF band, leakage from cable TV networks is the most common cause of interference in MFCN networks. Insufficient containment of the radio frequency signals transmitted through a cable system results in cable signal leakage. This article investigates the significance of controlling electromagnetic signal leaks from cable TV networks and how they impact authorized and standardized MFCN networks in the digital dividend bands. The periodic drivetest approach to detect and measure electromagnetic leakage from a cable TV system in the 700 MHz band at a site is detailed. The causes of the detected leaks and offered the appropriate procedure to repair them are also discussed. Additionally, the current measures taken in Hungary to address cable television signal leakage in the digital dividend bands are also discussed and alternative strategies for the adopted test drive approach are proposed.
Go to article

Authors and Affiliations

Hussein Taha
1
Péter Vári
2

  1. Doctoral School of Multidisciplinary Engineering Sciences, Széchenyi István University, Győr, Hungary
  2. Department of Telecommunications, Széchenyi István University, Győr, Hungary
Download PDF Download RIS Download Bibtex

Abstract

This article discusses whether iPerf can be used as an effective tool for wired and wireless LAN throughput estimation. The potential advantages of using iPerf in comparison to FTP are discussed. Finally, the article presents the throughput measurement results obtained with FTP, iPerf2 and iPerf3 in a simple experimental network.
Go to article

Authors and Affiliations

Bartłomiej Zieliński
1

  1. Silesian University of Technology, Poland
Download PDF Download RIS Download Bibtex

Abstract

The field programmable gate array (FPGA) is used to build an artificial neural network in hardware. Architecture for a digital system is devised to execute a feed-forward multilayer neural network. ANN and CNN are very commonly used architectures. Verilog is utilized to describe the designed architecture. For the computation of certain tasks, a neural network’s distributed architecture structure makes it potentially efficient. The same features make neural nets suitable for application in VLSI technology. For the hardware of a neural network, a single neuron must be effectively implemented (NN). Reprogrammable computer systems based on FPGAs are useful for hardware implementations of neural networks.
Go to article

Authors and Affiliations

B A Sujatha Kumari
1
Sudarshan Patil Kulkarni
1
C G Sinchana
1

  1. Sri Jayachamarajendra College of Engineering, JSS Science and Technology University, Mysore, India
Download PDF Download RIS Download Bibtex

Abstract

The contribution main from this research is modularity and better processing time in detecting community by using K-1 coloring. Testing performed on transaction datasets remittance on P2P platforms where the Louvain Coloring algorithm is better in comparison to Louvain Algorithm Data used is data transfer transactions made by customers on the P2P Online platform. The data is the User data that has information transfer transactions, Card data that has information card, IP data that has IP information, and Device data that has information device. Every user owns unique 128-bit identification, and other nodes representing card, device, and IP are assigned a random UUID. The Device node has the guide, and device properties. IP nodes only have property guide and node User has property fraud Money Transfer, guide, money Transfer Error Cancel Amount, first Charge back Date. Each node has a unique 128-bit guide, with the amount whole of as many as 789,856 nodes. Application technique K-1 staining on Louvain algorithm shows enhancement value modularity and better processing time for detecting community on the network large scale. Through a series of exercises and tests carried out in various scenarios, it shows that the experiments carried out in this paper, namely the Louvain Coloring algorithm, are more effective and efficient than the Louvain algorithm in scenario 1,3, and 5 meanwhile For Scenarios 2 and 4 Louvain Algorithm is better.
Go to article

Authors and Affiliations

Heru Mardiansyah
1
Saib Suwilo
2
Erna Budiarti Nababan
3
Syahril Efendi
1

  1. Department Computer Science, Faculty of Computer Science and Information Technology, Universitas Sumatera Utara, Medan, Indonesia
  2. Department Mathematics, Faculty of Mathematics and Natural Sciences, Universitas Sumatera Utara, Medan, Indonesia
  3. Department Data Science and Artificial Intelligence, Faculty of Computer Science and Information Technology, Universitas Sumatera Utara, Medan, Indonesia
Download PDF Download RIS Download Bibtex

Abstract

The operating modes of the automatic control system for electromechanical converters for synchronization of rotor speeds have been developed and investigated. The proposed automatic speed control system allows adjusting the slave engine to the master one in a wide range from 0 to 6000 rpm. To improve the synchronization accuracy an adaptive algorithm is proposed that allows to increase the synchronization accuracy by 3-4 times. The proposed model of an adaptive automatic control system with an observing identification tool makes it possible to minimize the error in the asynchrony of the rotation of the rotors of two electromechanical converters.
Go to article

Authors and Affiliations

Aidana Kalabayeva
1 2
Waldemar Wójcik
3
Gulzhan Kashaganova
4
Kulzhan Togzhanova
5
Zhaksygul Sarybayeva
1

  1. Academy of Logistics and Transport, Almaty, Kazakhstan
  2. Almaty University of Power Engineering and Telecommunications Almaty, Kazakhstan
  3. Lublin University of Technology, Lublin, Poland
  4. Turan University, Almaty, Kazakhstan
  5. Almaty Technological University, Almaty, Kazakhstan
Download PDF Download RIS Download Bibtex

Abstract

A Novel Intelligent control of a Unified Power Quality Conditioner (UPQC) coupled with Photovoltaic (PV) system is proposed in this work. The utilization of a Re-lift Luo converter in conjunction with a Cascaded Artificial Neural Network (ANN) Maximum Power Point Tracking (MPPT) method facilitates the optimization of power extraction from PV sources. UPQC is made up of a series and shunt Active Power Filter (APF), where the former compensates source side voltage quality issues and the latter compensates the load side current quality issues. The PV along with a series and shunt APFs of the UPQC are linked to a common dc-bus and for regulating a dc-bus voltage a fuzzy tuned Adaptive PI controller is employed. Moreover, a harmonics free reference current is generated with the aid of CNN assisted dq theory in case of the shunt APF. The results obtained from MATLAB simulation.
Go to article

Authors and Affiliations

Ramesh Rudraram
1
Sasi Chinnathambi
1
Manikandan Mani
2

  1. Electrical Engineering Department, Annamalai University, Annamalainagar, India
  2. Electrical and Electronics Engineering Department, Jyothishmathi Institute of Technology and Science, Karimnagr, Telangana, India

This page uses 'cookies'. Learn more