Multi-Line power Flow Control Using Interline Power Flow Controller (IPFC) in Power Transmission system
Devesh Raj , Saxena
The interline power flow controller (IPFC) is one of the latest generation flexible AC transmission systems (FACTS) controller used to control power flows of multiple transmission lines. This paper presents a mathematical model of IPFC, termed as power injection model (PIM). This model is incorporated in NewtonRaphson (NR) power flow algorithm to study the power flow control in transmission lines in which IPFC is placed. A program in MATLAB has been written in order to extend conventional NR algorithm based on this model. Numerical results are carried out on a standard 2 machine 5 bus system. The results without and with IPFC are compared in terms of voltages, active and reactive power flows to demonstrate the performance of the IPFC model. This paper also calculate the L-index and the maximum loading condition , and the critical bus system , which helps in determining the limit of stability of the system.
DEVELOPMENT ON UTILISING EMPLOYEE PERFORMANCE REPORT FOR APPRAISALS
Ankita Vm, Mrs.K.Bhargavi,
Performance Management began around 60 years ago as a source of income justification and was used to determine an employee’s wage based on performance. Organizations used Performance Management to drive behaviors from the employees to get specific outcomes. In practice this worked well for certain employees who were solely driven by financial rewards. However, where employees were driven by learning and development of their skills, it failed miserably. The gap between justification of pay and the development of skills and knowledge became a huge problem in the use of Performance Management. We are developing a system that maintains various positions like employee, supervisor and review manager for each department and competencies of each position, for the organization. These positions and competencies are classified and only are accessible or maintained by the Human Resource Department. Employees are supposed to fill a self-assessment on the competencies required for his or her position. Upon completion the form is sent to the review manager and his score for each employee with some comments is also taken. And the final score of the employee is calculated by taking the average of 3. Reports are generated in various levels likedepartment, position, and competency.
Identification of level of resemblance between web based documents
Surbhi, Kakar,, Surbhi, Kakar,
One of the biggest challenges today on web is to deal with the “Big data” problem. Finding documents which are near duplicates of each other is another challenge which is in turn brought up by Big data. In this paper the author focuses on finding out the near duplicate documents using a technique called shingling. This paper also presents the different types of shingling that can be used. Further, a measure called the Jaccard coefficient is discussed which can be used to judge the degree of similarity between the documents
Design Pattern Detection by Sub Graph Isomorphism Technique
Rajwant Singh Rao, Manjari Gupta,
Design Patterns are proven solution to common recurring design problems. Design Pattern Detection is most important activity that may support a lot to re-engineering process and thus gives significant information to the designer. Knowledge of design pattern exists in the system design improves the program understanding and software maintenance. Therefore, an automatic and reliable design pattern discovery is required. Graph theoretic approaches have been used for design pattern detection in past. Here we are applying an algorithm for graph matching which is based on the sub graph isomorphism. The same algorithm we are here using for design pattern detection from the system design.
Implementation of CMOS circuits In Logic optimization using logical effort technique
Akansha Rajput, Satyendra Sharma,
The method of logical effort is an easy way to estimate delay and dynamic power in a CMOS circuit. We can select the fastest candidate by comparing delay estimates of different logic structures. The method also specifies the proper number of logic gates on a path and the best transistor sizes for the logic gates. Because the method is easy to use, it is ideal for evaluating alternatives in the early stages of a design and provides a good starting point for more intricate optimizations. In proposed work, the implementation of logical effort technique in static CMOS circuits like conventional adder, array multiplier, decoder and multiplexer occurred. So if its transistors sizing changed or adjusted such that its delay and PDP reduce then as a result of this bigger circuits also get the benefit of this changes
In todays modern world, social networking has became an inseparable part of human life. Indeed, social networking has been the story of this decade. NFC is a complementary technology that facilitates social networking in a secure way. Social networking is evolving beyond just interactions between individuals to include commercial nodes. A business can be enhanced or can even thrive solely through social networks. The popularity of social networking as a de facto medium of communication among the thinking public is dampened only by privacy and security concerns. In this paper we will discuss how NFC technology helps in social networking and bring people closer and also the advent of mobile devices (and their embracing of NFC technology) in social networking. By using NFC technology, social networking is no longer restricted to the PC only.
Non Blind Watermarking Scheme for Image and Video using DWT-SVD
T.Naga Jyothi, K.Hari Babu
Recent developments in digital image and Internet technology help the common users to easily produce illegal copies of the images. In order to solve the copyright protection problems of the image, several watermarking schemes have been widely used. Very few watermarking schemes have been proposed for defining the copyrights of color image. To resolve the copyright protection problem of color image, we propose an effective, robust and imperceptible color image watermarking scheme. This scheme embeds the watermark into cover image in (Red, Green, Blue) RGB space. The combinations of Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) are used to embed the watermark. In the combination of Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD), the singular values of different sub band coefficients are modified using different scaling factors to embed the singular values of the watermark. The copy of the watermark is embedded into four sub band coefficients which is very difficult to remove or destroy. The combination of DWT and SVD increases the security, robustness and imperceptibility of the scheme. In this project, we employ watermarking for video also
Ms.P.Leela, Ms.M.V.S Ambika, Ms.K.Manichandana, Ms.P.Mounika, Mr. K.YashodharYadav,
A New Approach to Minimise Network Blocking In 4g for Better Accessibility
Ms.P.Leela, Ms.M.V.S Ambika, Ms.K.Manichandana, Ms.P.Mounika, Mr. K.YashodharYadav,
Mobile communications systems revolutionized the way people communicate, joining together communications and mobility. Along way in a remarkably short time has been achieved in the history of wireless. Evolution of wireless access technologies is about to reach its fourth generation (4G).The first generation (1G) has fulfilled the basic mobile voice, while the second generation (2G) has introduced capacity and coverage. This is followed by the third generation (3G), which has quest for data at higher speeds to open the gates for truly “mobile broadband” experience, which will be further realized by the fourth generation (4G).The Fourth generation (4G) will provide access to wide range of telecommunication services, including advanced mobile services, supported by mobile and fixed networks. In today’s Internet these applications are not subject to blocking, therefore the growth of popularity of these applications may endanger the stability of the Internet. In this paper, we propose a novel model to have more accessibility to network through duplication strategy.
In recent years people go for online social networks (OSNs) to share their personal information using popular social networking sites like Facebook, MySpace and Mylife. These OSNs allow user to enforce privacy concerns over shared data with single user only without providing any model and mechanism to enforce privacy concerns over data associated with multiple users. To overcome this we come across an approach [1] to enable the protection of shared data associated with multiple users by proposing a multiparty authorization framework that allows collaborative management of shared data in OSNs. Multiparty Access Control (MPAC) model is also formulated in order to capture the essence of multiparty authorization requirements. In this MPAC model some users collude with one another so as to manipulate the final access control. This MPAC gave raise to three issues (1) There is no fake identity in OSNs.(2) All users tagged are real users appeared in the photo. (3) All controllers of the photo are honest to specify their privacy preferences [1]. To overcome these issues we utilize a collaborative Face Recognition (FR) framework [9].in to OSNs. We also demonstrate a proof-of-concept prototype as part of an application in Facebook.
The dependence of numerous systems on electronic devices is causing rapidly increasing concern over fault tolerance. At the system level. Redundancy is a technique that has been used to improve space electronic systems reliability. The traditional implementation has been to incorporate redundancy by having the passive or active availability of two separate boxes that perform the same function. This paper argues that redundancy in engineering, should be understood as a ‘design paradigm’ that frames regulatory assessments and interpretations of all complex technical systems, profoundly shaping decisions and judgments about modern technologies. The purpose of this paper is to provide a brief overview of redundancy
Java Remote Method Invocation (RMI) allows programmer to execute remote methods using the same semantics as local functions calls. RMI is Java’s version is Remote Procedure Call (RPC). RMI internal implementation is out of client scope and only deals with exposed interface of remote server object. The aim of RMI is to allow the programmers to invoke remote services from remote objects. The paper explains the RMI architectural layers and its mechanism. The paper deals with the working of all the layers of RMI and how they are implemented. This paper has taken into account an example to explain the proper working of RMI.
Tremplin C# Database Application Development Compressed
Prasanta Kumar, Paul,
Over the time developers have been trying to develop an Automated System which generates all required codes automatically. Many projects have attempted to achieve a concept called the Zero Code which is almost impossible.Tremplin is software which generates partial code automatically based on developers input for projects involving data entry screens. This software saves considerable amount of time spent for the developing code, testing and maintaining uniformity. Hence it is rightly described as Save Time in Every Project. Tremplin can auto generate code for data entry screen containing New, Save, Delete, Import Export and Search functionalities. Developing applications in Tremplin is simple. It does not require any special skills and only skill that is expected as a user is database design and SQL writing Skills.
Optimal Location of Base Station in a Wireless Sensor Network Using Gravity Location Model
P.Parthiban, G.Sundararaj,
Base station location has a major impact on the network’s lifetime performance for a wireless sensor network. Due to energy constraints in individual sensor nodes, extending the lifetime is an essential objective in Wireless Sensor Networks (WSNs). Energy efficiency is a critical issue in designing the sensor networks as the nodes have limited battery power. An important characteristic for wireless sensor networks is so-called network lifetime performance, which is highly dependent upon the physical topology of the network. This is because energy expenditure at a node, to transmit data from one node another not only depends on the data bit rate but also on the physical distance between the nodes. Consequently, it is important to understand the impact of location related issues on the network lifetime performance and to optimize the topology during network deployment stage. This work considers the importance of base station placement problem for a given sensor networks such that network lifetime can be maximized. Specifically, the gravity location model is considered to identify the optimal location of the new base station, increase the life time of the sensor networks has been proposed
Peer to Peer (P2P) systems are typically decentralized, distributed and anonymous systems. Some examples of P2P systems are Napster, KaZaA, SETI@HOME, Gnutella and MojoNation. One common protocol for file-sharing P2P applications is Gnutella The Gnutella protocol requires peers to broadcast messages to their neighbors when they search files. The message passing generates a lot of traffic in the network, which degrades the quality of service. We propose the new method to optimize the speed of search and to improve the quality of service in a Gnutella based peer-to-peer environment with using semantic routing and priority of nodes. Once peers generate their “friends lists”, they use these lists to route queries in the network.In our approch peers can show interest in different categories This helps to reduce the search time and to decrease the network traffic by minimizing the number of messages circulating in the system as compared to standard Gnutella.
Using the web usage mining effectively as an underlying mechanism for web personalization and recommender system can enable us to achieve efficient web navigation system. Using the user usage patterns as a tool of prior information we can very well keep an intelligent base of most common user choices. Also by using the effective web structuring methods and web usage mining we will have a system that will ensure a completely different web navigation experience. Specifically, the proposed changes to the existing website will improve the user navigation on a website while minimizing alterations to its current structure. The users who are more affected by inefficiency of website are likely to benefit more from the improved structure.
Adulapuram Vinay Kumar, Anand Pithani, K Girinath Babu,
Optimization of grid connected conventional energy resources by using single phase micro inverter with LCL filter
Adulapuram Vinay Kumar, Anand Pithani, K Girinath Babu,
A Photovoltaic (PV) system’s power output is not constant and fluctuates depending on weather conditions. Fluctuating power causes frequency deviations in the power utilities when PV power penetration is large.Using a battery is the common practice to smooth PV output power fluctuations. In this paper, we propose and simple fuzzy based control method for PV-diesel hybrid system to reduce frequency deviations without smoothing PV output power fluctuations. By means of the proposed method, output power control of PV system considering the conditions of power utilities and maximizing energy capture are achieved.This paper presents a low cost high efficiency transformer isolated micro-inverter for single-phase grid connected photovoltaic (PV) system. The proposed micro inverter is composed of two stages, an isolated dcdc converter stage and an inverter stage with a dc link. A high frequency transformer isolated high voltage gain boost half-bridge dc-dc converter is used at the first stage to achieve maximum power point tracking (MPPT) and to step up the PV voltage to the high voltage dc-link. A pulse width modulated (PWM) full-bridge inverter with LCL filter is used at the second stage to output the synchronized sinusoid current with unity power factor to the grid. By utilizing the transformer leakage inductance, two primary side switches can achieve zero voltage switching (ZVS). A 210 W prototype of the proposed micro-inverter has been built and tested. The efficiency of the proposed boost half-bridge dc-dc converter has been measured according to the PV curve, which is up to 98.2%. Experimental results are provided to demonstrate the validity and features of the proposed circuit.
Convergence of pv system with Buck-Boost Converter using MPPT Techniques.
Lipika Nanda, Sushree Sibani Das,
Energy , especially alternative source of energy is vital for the development of a country. In future, the world anticipates to develop more of its solar resource potential as an alternative energy source to overcome the persistent shortages and unreliability of power supply. In order to maximize the power output the system components of the photovoltaic system should be optimized. For the optimization maximum power point tracking (MPPT) is a promising technique that grid tie inverters , solar battery chargers and similar devices use to get the maximum possible power from one or more solar panels. Among the different methods used to track the maximum power point, Perturb and Observe method is a type of strategy to optimize the power output of an array. In this method, the controller adjusts the voltage by a small amount from the array and measures power, if the power increases, further adjustments in that direction are tried until power no longer increases. In this research paper the system performance is optimized by perturb and observe method using buck boost converter. By varying the duty cycle of the buck boost converter, the source impedance can be matched to adjust the load impedance to improve the efficiency of the system. The Performance has been studied by the MATLAB/Simulink. A solar module can’t transfer maximum power to the load itself due to impedance mismatch. A maximum power point tracking (MPPT) system could be employed to have the maximum power. A new MPPT system has been developed using Buck-Boost type DC-DC converter. The system is highly efficient and robust. PIC16F73 microcontroller has been used to control the DC-DC converter output. PV module output power is measured using microcontroller. The output power is compared with the previous module output power and the duty cycle of the converter is adjusted continuously to track MPP. This process repeats until the output power reaches near to the maximum power point. In this paper, a maximum power point tracking (MPPT) system is developed using two-switch non-inverting buck-boost converter. Perturb and observe (P & O) MPPT algorithm is used to transfer maximum power from the PV panel which is executed using a microcontrolle
Tcp performance in coded wireless mesh networks with cope implementation: An overview
Nikumani , Choudhury,
This paper investigates the benefit of network coding for TCP traffic in a wireless mesh network. COPE, a new architecture for wireless mesh networks is also introduced. Packets are mixed (i.e., coded) by routers from different source nodes to increase the information content during every transmission. Intelligently mixing the packets increase network throughput. The results show that COPE largely increases network throughput. Depending on the traffic pattern, congestion level, and transport protocol used, gains in throughput vary. Network coding not only reduces the number of transmissions by sending multiple packets via a single transmission but also results in a smaller loss probability due to reduced contention on the wireless medium. Coding opportunity can be increased by inducing small delays at intermediate nodes. However, this extra delay at intermediate nodes results in longer round-trip-times that adversely affect TCP throughput.
Deepak , DhaynendraParashar Dr.Vinod K.Singh, Rajeev S. Pathak,
A study on inverted Tshaped micro strip antenna at different frequencies
Deepak , DhaynendraParashar Dr.Vinod K.Singh, Rajeev S. Pathak,
This is the era of communication, where any information can be globalised in very short time around the world. Today we are having a lot of advanced technology where any information can be convey in just a click and this all things are possible due to compact size of the devices, and microstrip patch antenna play a very important role to reduce the size of communicating devices. In this paper we are study about the bandwidth and return loss at frequency 4GHz, 5GHz and 6GHz. In here we are taking a inverted T shaped [1] patch and find the results at different frequency but the important point on this paper is,the feed point location is approximately is same for each frequency.
A Review: Different methods of segmenting a continuous speech signal into basic units
Manpreet Kaur, Amanpreet Kaur
Speech is the medium through which human beings can communicate. Segmentation of speech is required for better speech recognition. Segmentation of speech can be done into basic units like words, phonemes or syllables. The two main methods used for segmentation of speech signals are manual segmentation and automatic segmentation. But manual segmentation is not favoured as it is tedious, time consuming and results are not reproducible. So, automatic segmentation is used for segmentation of speech. This paper describes a number of methods for automatic segmentation of speech into units like phonemes or Syllables.
A Study on Scalable Internet Traffic Measurement and Analysis with Hadoop
Yogesh V. Kadam, Prof. Vaibhav Dhore,
As the number of Internet users is growing rapidly worldwide, Internet traffic data also increases. To analyze this traffic, multiple tools are available. But they do not perform well when the traffic data size increases. This traffic measurement and analysis is used to observe network usage behavior and perform different types of analysis. As the data grows it is necessary to increase the necessary infrastructure to process it. The Distributed File System can be used for this purpose, but it has certain limitations such as scalability, availability, and fault-tolerance. Hadoop is an open source distributed computing platform having MapReduce for distributed processing and HDFS to store huge amount of data. This study presents a Hadoop-based traffic monitoring system that performs a multiple types of analysis on huge amount of Internet traffic in a scalable manner.
This paper proposes a high capacity reversible image watermarking scheme based on integer wavelet transforms. The proposed scheme divides an input image into non-overlapping blocks and embeds a watermark into the high frequency wavelet coefficients of each block. The conditions to avoid both underflow and overflow in the spatial domain are derived for an arbitrary wavelet and block size. The payload to be embedded includes not only messages but also side information used to reconstruct the exact original image. To minimize the mean-squared distortion between the original and the watermarked images given a payload, the watermark is adaptively embedded into the image. The experimental results show that the proposed scheme achieves higher embedding capacity while maintaining distortion at a lower level than the existing reversible watermarking schemes.
Key management schemes in sensor networks can be classified broadly into dynamic or static solutions based on whether rekeying (update) of administrative keys is enabled post network deployment.. The objective of key management is to dynamically establish and maintain secure channels among communicating nodes. Many schemes, referred to as static schemes, have adopted the principle of key predistribution with the underlying assumption of a relatively static short-lived network (node replenishments are rare, and keys outlive the network). An emerging class of schemes, dynamic key management schemes, assumes long-lived networks with more frequent addition of new nodes, thus requiring network rekeying for sustained security and survivability. This paper proposes a dynamic key management scheme by combining the advantages of simple cryptography and random key distribution schemes. When the hamming distance between the two nodes is found high, the unique key is changed instead of changing the set of keys and the communication takes place by using any one of the set of key x-oring with the new unique key. The security and performance of the proposed algorithm is compared with the existing dynamic key management scheme based on Exclusion Basis System and prove that the proposed scheme performs better when compared to existing Scheme by considering the number of nodes colluded with time. The result obtained by simulation also shows that the proposed scheme provides security solution and performs better than the existing scheme.
Overview of Fifth Generation Mobile Communications
Kavita Sogale, Dr.D.J.Pete,
This paper explores future mobile systems with emphasis on re -configurability based on cognitive and software defined radios, 5G (fifth generation) Network architecture consisting of reconfigurable terminal able to autonomously operate in different heterogeneous access network is proposed. The proposed network is enforced by nanotechnology, cloud computing and based on all IP Platform. The paper highlights 5G main development challenges and illustrates why there is a need for 5G. New standard releases beyond 4G are in progress by standardisation bodies , but at this time are not considered as new mobile generations since implementation and rollout of systems complaint with 4G is still on the way; the goals of a 5G based telecommunications network would ideally answer the challenges that a 4G model would present once it has entered widespread use
Analysis Tool for Radar Data Using C‘ Oriented Approach
S.Manasseh, G. Rama Krishna, J.Madan Kumar,
The main objective of our project Radar Data Analysis Tool an ‘C’ oriented approach scan the tracking data sent to mission computers by Radars like PCMC’S and RADAR’S. The Radar emits signals continuously towards the target. These signals strike the target and echoes (reflects) back towards the radar. The Radar generally equipped with Data System. This system gathers tracking information of the target such as Range, Elevation, and Azimuth individually from various sub systems of radar. This data is transmitted at 10 Hz rate to the mission computers for processing. Check for the validity of scanned tracking data. Arranged data into various data formats such as 22-Bytes, 18-Bytes etc according to various radars. Display the data formats in Hexadecimal form. Plot the graph for prime parameters acquired through data packers.
Recognizing Spam Zombies by Monitoring leaving Messages
R.Vasantha kumar, Mr.K.Ravi Kumar,
Compromised machines are one of the input security threats on the Internet; they are frequently used to launch various security attacks such as spamming and spreading malware, DDoS, and identity theft. Given that spamming provides a key economic incentive for attackers to recruit the large number of compromised machines, we focus on the detection of the compromised machines in a network that are involved in the spamming activities, commonly known as spam zombies. We develop an effective spam zombie detection system named SPOT by monitoring outgoing messages of a network. SPOT is designed based on a powerful statistical tool called Sequential Probability Ratio Test, which has bounded false positive and false negative error rates
Sampath Korra, Dr S.Viswanadha Raju , Dr A.Vinaya Babu,
A Realistic Approach to Systematic Reuse
Sampath Korra, Dr S.Viswanadha Raju , Dr A.Vinaya Babu,
Every software project practices some kind of reuse as a common sense practice. Very often, practitioners use parts of code, documents and experiences from previous projects as a personal initiative. Of course, this kind of reuse brings some benefits to the company. However, it is generally performed in isolation from other projects, depends on the individual’s initiative and has very limited impact. Systematic Software Reuse is the capability of an organization to obtain maximum profit from the experiences acquired in former projects by identifying the reuse opportunities a priori and establishing the appropriate organizational, managerial and budgetary support. Software Reuse reduces development costs and time by avoiding the duplication of work.
Implementation of Discrete Wavelet Transform on FPGA to Detect Electrical Power System Disturbances
P.Ramesh , A.Deepthi, K.Sowjanya,
Wavelet Transform is a time-frequency representation of the input signal. Realization of wavelet transform on field-programmable gate array (FPGA) device for the detection of power system disturbances is proposed in this thesis. This approach provides an integral signal-processing paradigm, where its embedded wavelet basis serves as a window function to monitor the signal variations very efficiently. By using this technique, the time information and frequency information can be unified as a visualization scheme, facilitating the supervision of electrical power signals. To improve its computation performance, the proposed method starts with the software simulation of wavelet transform in order to formulate the mathematical model. This is followed by the circuit synthesis and timing analysis for the validation of the designated circuit. Then, the designated portfolio is programmed into the FPGA chip through the download cable. And the completed prototype is tested through softwaregenerated signals, in which test scenarios covering several kinds of electrical power quality disturbances are examined thoroughly.
Low Quality Image Information Enhancement Using SVD Fusion Technique
Gagandeep Kour, Sharad P. Singh,
Images fusion technique based on Singular Value Decomposition (SVD) has been done on the blurred images with different level of blurring. The blurring of the image was done using circular averaging technique. Five different set of images were taken and on these images SVD based fusion implemented on the images. The content of the image were calculated with respect to reference image on the blurred image and fused image. PSNR value for highest blurred image come out to be for blurred and fused image 13.27 dB and 12.61 dB respectively. SNR value for blurred image is -10.85 and fused image -11.51. Image quality is enhanced by SVD fusion technique.
Flexible ac Transmission Systems (FACTS) devices are used to control power flow in the transmission grid to relieve congestion and limit loop flows. High cost and reliability concerns have limited the widespread deployment of FACTS solutions. This paper introduces the concept of Distributed FACTS (D-FACTS) as an alternative approach to realizing cost-effective power flow control. By way of example, a distributed series impedance (DSI) and a distributed static series compensator (DSSC) are shown that can be clipped on to an existing power line and can, dynamically and statically, change the impedance of the line so as to control power flow. Details of implementation and system impact are presented in the paper, along with experimental results
The IP packets prepared to sent across the network have a digital signature and public key attached to it which allow to check on each hop along the route to verify the authenticity of packets. For this we use ECC (Elliptic Curve Cryptography). In this paper, we present a software solution of cryptography for PLA (Packet Level Authentication) using the combination of koblitz curves to increase throughput and implicit certificates to decrease storage and computation overhead. A software is developed on open SSL libraries and extending the Open SSL API to support not only fast ECC using Koblitz curves, but implicit certificates and fast signature verifications using implicit certificates as well. Software implementation results of these API extensions are provided, yielding significant speedup of elliptic curve operations.
A multi-agent system (MAS) is an automated system which consists of multiple agents. MAS can be used to solve the problems that are difficult to solve by human. Agents are connected with each other; they have access to other agent via connection. The problems and functions are not stored automatically in agent, agents uses their connections for storage. High storage in connections may leads to occur memory insufficient. This memory insufficient also creates the changeability of apparent input. This memory insufficient has allowed us to define the model of MAS by using markov property. Here we use markov chain model to define strength of MAS. The number of states varies according to the capability of original agents. We then explore the strength of evolving agent growth through simulation and compare the results with non-derive MAS. We can implement classified agents in data extraction from cloud data server.
DC/DC Boost Converter Functionality in a Three-Phase IMC
Sree Vardhan, S.V. Panidhar ,
An indirect matrix converter (IMC) connected with two input power sources is proposed: a gasoline generator as themain ac power supply and batteries as the secondary power source. The IMC is small in size because of having a dclink part without an electrolytic capacitor. The dc-link part is utilized by connection with a boost-up chopper with batteries as a secondary input power source. Furthermore, the chopper connects to the neutral point of the motor and utilizes the leakage inductance of the motor as a reactor component. The proposed technique successfully further reduce the size of the converter by removing the boost reactor in the boost converter stage. The proposed converter is simulated and experimentally validated using a 750-W prototype and an induction motor driven with V/f control. The total harmonic distortion of the input and output currents are 4% and 3.7%, respectively,and the efficiency is 96%
An Intelligent System for Minerals Detection using Supervised Learning Approach
Olanloye, Dauda Odunayo
Supervised learning using ANFIS is proposed to identify classes of minerals potential in a satellite based hyperspectral data set. Spectral data for each pixel in a data set are extracted and processed to obtain a characterization map through a novel method. The characterization map is then clustered using c-means fuzzy clustering to obtain characteristic cluster center data. An ANFIS network with three membership function is trained with the cluster center data as input, and a numerical coding of the mineral map of the area as training output. The network satisfactorily learns to identify different classes of mineral and can also indicate the presence of new minerals for which it has not been trained. Such novel mineral can thus be identified and encoded for learning by the network.
TV AND RADIO BROADCAST ELECTROMAGNETIC RADIATIONS ANALYSIS ON THE MALE SPERM INFERTILITY
Lusekelo Kibona,
A hazardous effect on male fertility may be manifested by a decrease in the amount of sperm cells, disorders in their mobility, as well as structure. In this study; the analysis has been done on the impact of electromagnetic radiations on the male sperm infertility by considering the radiations from broadcasting antenna to the testis by variations of electromagnetic field with the distance from the broadcasting towers. It was found that; there is significant effects brought by radiations for those who are living close to the broadcasting towers due to the fact that electromagnetic energy from towers are being converted into thermal (heat) energy which is absorbed by the testis issues and hence cause the sperm infertility in terms of sperm count, sperm motility and any other associated effects. The SAR values was observed to decrease as one moves far away from the towers. So regulatory authorities should set safe distance before broadcasting operators erect/build their broadcasting infrastructures.
A Comparative Survey on Various Coin Recognition Systems Based on Image Processing
Yamini Yadav, Apoorvi Sood,
Coins are a fundamental need of human life. They are used in everyone’s daily routine, like banks, transport, market and these spare change also has some other uses than getting traded in for cash like for measurement purpose, in games (toss), in organizations for research purpose, etc. So, it holds a great importance that coins can be detected with high accuracy. The Aim of a coin recognition system is to classify high volumes of coins with high accuracy within a short time span. In this paper we present a comparison between various coin recognition systems in terms of their accuracy. Different coin recognition approaches have been proposed by various researchers based on image recognition method. One can easily detect and recognizes coins with the help of these systems. Classification is based on images from both sides and a radius of the coin. On the basis of this literature survey we can say that image processing is the most effective method for coin recognition.
Adaptation is the neural networks property that a neural network system should provide. Due to the challenge of high complexity and poor generalization of different models of neural network, many researchers were motivated to work in the field of adaptation in neural networks. Adaptation helps neural networks to generalize and adapt the data easily. Adaptive neural network framework is a collection of techniques in which structure of the network is adapted during the training according to a given problem. In this paper, we review the different adaptation technique of the neural network. These adaptation techniques include- structural adaptation, functional adaptation and training parameters or weight adaptation. To achieve architectural and functional adaptation many pruning, constructive and cascading algorithm were proposed in the literature by many researchers. To attain the functional adaptation the slope of the sigmoidal function is adapted during training and to satisfy the adaptive property of neural network weight adaptation is performed by every neural network model that results in better convergence and good generalization
Applications of Video Data Base Management System (Vdbms) For Video Query Processing
Dr. D.S.Kushwaha , Ayushi Kushwaha,
With the increase use of video data sets for multimedia-based applications has created a demand for database technology that is capable of storing digital video in the form of video databases and providing efficient methods for handling the content based query and retrieval of video data. Traditional methods for handling data storage, query processing and retrieval cannot be extended to provide this functionality for video. In this paper, we have described the VDBMS which is a research platform for video database, a system that supports comprehensive and efficient database management for digital video. Video query processing presents significant research challenges, mainly associated with the size, complexity and unstructured nature of video data. This paper also presents the video query processing functionality of VDBMS using several query processing algorithms. It also focuses on how VDBMS supports query processing for content-based query, search and retrieval of video data. In this paper, we have addressed query processing issues in two contexts, first as applied to the video data type and second as applied to the stream data type. Our paper also describes two query operators for the video data type which implement the rank-join and stop-after algorithms. Lastly this paper also presents the stream query processing framework of VDBMS.
H.T. Rathoda, A. S. Hariprasad , K.V.Vijayakumarb, Bharath Rathod, C.S.Nagabhushana,
Numerical Integration over Curved Domains Using Convex Quadrangulations And Gauss Legendre Quadrature Rules
H.T. Rathoda, A. S. Hariprasad , K.V.Vijayakumarb, Bharath Rathod, C.S.Nagabhushana,
This paper presents a numerical integration formula for the evaluation of where and is any curved domain in . That is a closed domain with boundary composed of N oriented piecewise curved segments with end points , and . We Join each of these curved segments to a reference point interior to the domain . This creates N triangles ) in and each of these triangles have one curved side and two straight sides. We transform each into a standard triangle T which also transforms the integrand to = . We then divide T into right isosceles triangles of side lengths 1/m units. These triangles will be finally divided into three special quadrilaterals . This process can be expressed as where represent the transformed forms of the integrand over the domains T, and . We approximate the curved segments by a parabolic arc which passes through the four points of the curved segment, the two end points , and the two intermediate points of . Proposed numerical integration formula is applied to integrate over a curved domain in the shape of lunar model for complicated integrands..
Performance Analysis of ANODR and ZRP protocol against Wormhole attack in Wireless Sensor Network
Er. Gurjot Singh
Wireless sensor network consist of spatial distributed sensor nodes deployed in a hostile and dense environment to gather information and propagate it to the base station for further processing. In the insecure wireless transmission medium, the enemies can analysis the data traffic against intercept-able routing information embedded in routing data packets. Allowing adversaries to trace network routing information and other critical information at the end of those routes may pose a serious threat to covert operations. Wireless sensor network has limited resources like bounded storage space, energy and computation power. In this paper, to prevent the network from wormhole attack, the ANODR, an anonymous on-demand routing protocol is implemented. The wormhole attack is one of the severe attack on WSN that can effect the networks performance. In this, attackers create a low-latency link between two points in the network. The wormhole attack tunnels the packets from one end to another end by modifying or altering its content. For route anonymity problem, the ANODR prevents strong adversaries from tracing a packet flow back to its originator and for location privacy problem, ANODR ensures that adversaries cannot discover the real identities of authenticated transmitters. The architecture of ANODR is based on technique named "broadcast with trapdoor information". The qualnet 4.5.1 simulator is opted to analyze the performance of ANODR on the basis of metrics like frame tunneled, frame dropped and intercepted.