{"title":"Module integrated isolated solar microinverter by using current unfolding topology","authors":"A. Gopalakrishnan, Arun Rajenedren","doi":"10.1109/ICCPEIC.2014.6915393","DOIUrl":"https://doi.org/10.1109/ICCPEIC.2014.6915393","url":null,"abstract":"With the growing demand of energy in the present situation, the world is moving towards renewable energy sources. Due to inexhaustible nature and high energy density solar energy is most preferred out of the lot. Due to different panel orientation and mismatching conditions solar panel may not work efficiently. To overcome this problem a solar microinverter is placed under each panel. The maximum power is extracted from solar panel by maximum power point tracking (MPPT). In this paper the topology employed for solar microinverter is flyback converter with a current unfolding inverter. The topology has got altogether three switches both in the converter and inverter section. As the number of switches are less switching loss will also be less and also the control will be easier. A closed loop voltage control technique is employed along with MPPT to control the switch at the converter side. Converter is operated under discontinuous conduction mode (DCM) for better control over the output voltage. Design and analysis of flyback converter with a current unfolding inverter has been carried out in Matlab/Simulink model.","PeriodicalId":176197,"journal":{"name":"2014 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC)","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114242706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An alternative distributed control using Labview","authors":"M. Prabhavathy, B. Ramesh, T. Kalpalatha Reddy","doi":"10.1109/ICCPEIC.2014.6915361","DOIUrl":"https://doi.org/10.1109/ICCPEIC.2014.6915361","url":null,"abstract":"The distributed process control is done through Distributed control system (DCS). DCS is a computerized control employed in the industry to monitor and control the production line. These industries include Petrochemical industries, Fertilizers manufacturing industries, oil industries, where it requires continuous monitoring and controlling. DCS is one among the Industrial Control System Technique(ICS), the other ICS techniques includes supervisory control and data acquisition (SCADA) system, distributed control system (DCS) and programmable logic controllers (PLC). The aim of the proposed project is to analyze process of Reverse osmosis plant DCS using LabVIEW. The leading companies in DCS business today are Honeywell, Rockwell, Yokogawa and Siemens. The proposed approach is the distributed control for an industrial plant using LabVIEW. The mode of operation employed in the designed VI includes AUTO MODE and MANUAL MODE. Auto mode are not user interfaced and the process takes place automatically with the assigned Manual operation. In addition to that the other two proposed approach involves the creation of Database management and Alarm management.","PeriodicalId":176197,"journal":{"name":"2014 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125809975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Copy frame detection in video using data mining techniques","authors":"K. Girija, R. Maheswaran, P. Sabarinathan","doi":"10.1109/ICCPEIC.2014.6915398","DOIUrl":"https://doi.org/10.1109/ICCPEIC.2014.6915398","url":null,"abstract":"There are a number of methods available for video copy detection. Some of the methods were employing the application of local and global descriptors which were found to be ineffective in detections involving complex transformations. In order to overcome the above specified inefficiency, Scale Invariant Feature Transform (SIFT) descriptor came into picture but was found to have a high computational cost. The method proposed in this paper involving five different types of MPEG-7 descriptors namely Color and Edge Directivity Descriptor (CEDD), Fuzzy Color and Texture Histogram (FCTH), Scalable Color Descriptor (SCD), Edge Histogram Descriptor (EHD), Color Layout Descriptor (CLD) for extracting the features of the frames in the selected video is found to be cost effective and efficient even in case of high level of transformations. This paper also throws light on certain improvements in graph-based video sequence matching method which is used to overcome the level of noise, to detect videos with different frame rates and optimal sequence matching is found automatically from the disordered video sequences by applying spatial features during copy detection. Experimental results have showed that the proposed method is far effective than the previously existing video detection scenarios.","PeriodicalId":176197,"journal":{"name":"2014 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124959077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient solar power converter with high MPP tracking accuracy for rural electrification","authors":"Vineeth Kumar, P. K. M. Tech","doi":"10.1109/ICCPEIC.2014.6915394","DOIUrl":"https://doi.org/10.1109/ICCPEIC.2014.6915394","url":null,"abstract":"This paper introduces a high step up voltage gain DC-DC converter for dc microgrid applications. The dc microgrid can be utilized for rural electrification. The whole system includes a Photovoltaic panel (PV), High step up DC-DC converter with Maximum Power Point Tracking (MPPT) and a dc microgrid. The MPP can be tracked by Incremental Conductance (IC) MPPT technique modified with D-Sweep (Duty ratio Sweep). D-sweep technique reduces the problem of multiple local maxima. In this paper a high step up DC-DC converter which comprises of both coupled inductor and switched capacitors is used. This increases the gain up to twenty times with high efficiency. The Simulink model of the system has input voltage range of 30V to 40V and maximum PV output power of 250Watts/400V. The maximum power conversion efficiency of the system is 95.85%.","PeriodicalId":176197,"journal":{"name":"2014 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131364791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigation of supply current harmonics in PMBLDCM drive using Cuk converter","authors":"R. Chandran, A. Rajan","doi":"10.1109/ICCPEIC.2014.6915362","DOIUrl":"https://doi.org/10.1109/ICCPEIC.2014.6915362","url":null,"abstract":"This paper deals with the performance enhancement in a PMBLDC motor drive by the mitigation of current harmonics in the input side using the Cuk converter as power factor correction converter. The PMBLDC motor drive is fed from single phase AC mains through a diode bridge rectifier. A three phase voltage source inverter is used as the electronic commutator of the PMBLDC motor drive. The speed of the drive is controlled by regulating the voltage at DC link and the reference DC link voltage taken is equivalent to the reference speed. The performance of the drive without the DC-DC converter is included in this paper and also the performance is tested with the speed feedback. A comparison is made with different conditions. The proposed PMBLDC motor drive is simulated using MATLAB-SIMULINK. Simulated results are presented to analyze the improvement in power quality at AC mains and the performance of the drive.","PeriodicalId":176197,"journal":{"name":"2014 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133364315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reversible watermarking with embedded digital signature","authors":"S. Singh, Nilanjan Poria, P. Palanisamy","doi":"10.1109/ICCPEIC.2014.6915411","DOIUrl":"https://doi.org/10.1109/ICCPEIC.2014.6915411","url":null,"abstract":"With the advancement of technology on the internet, image authentication has drawn a good attention in both storage as well as communication. In this paper, we present a technique for watermarking of digital images based on the singular value decomposition a reversible watermarking technique with an additional embedded Digital Signature. Initially, the original image is watermarked using a pattern matrix, then a unique digital signature is created with the above watermarked pixel value and Accession Number and hence, embedded in the original image. Decryption is done in reverse order.","PeriodicalId":176197,"journal":{"name":"2014 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133530343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Load Balancing with Optimal Cost Scheduling Algorithm","authors":"Nagamani H. Shahapure, P. Jayarekha","doi":"10.1109/ICCPEIC.2014.6915334","DOIUrl":"https://doi.org/10.1109/ICCPEIC.2014.6915334","url":null,"abstract":"In a cloud computing environment a proper load balancing technique is required to execute a process and manage the resource. In a distributed environment it is difficult to achieve this, as different resources have different configuration and capacity. Generally, load balancers generate the mapping of tasks to resources, based on some particular objectives. Load balancers employ a function that takes into account the necessary objectives to optimize a specific outcome. The commonly used load balancing objectives in a cloud computing environment are related to the tasks completion time and resource utilization. They use a specific approach for mapping the tasks to suitable cloud resources in order to satisfy user requirements. However, the majority of these strategies are static in nature. They produce a good schedule given the current state of cloud resources and do not take into account changes in resource availability. On the other hand, dynamic scheduled load balancer considers the current state of the system. It is adaptive in nature and able to generate efficient schedules. This improves the overall performance of the system. In this paper we have proposed a new technique to achieve load balancing called Load Balancing with Optimal Cost Scheduling Algorithm. The user selects a list of services available from the service pack. The scheduler processes these tasks to the virtual machine (VM) based on the configuration and computing power of the VM. This task is achieved with minimum execution cost which is a profit for the service provider and minimum execution time which is an advantage for both service provider and the user.","PeriodicalId":176197,"journal":{"name":"2014 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130204031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anusha Pillay, K. Sharma, S. Karthikeyan, S. Rangarajan
{"title":"Analysis on power distribution system in India-Patna city- A case study","authors":"Anusha Pillay, K. Sharma, S. Karthikeyan, S. Rangarajan","doi":"10.1109/ICCPEIC.2014.6915381","DOIUrl":"https://doi.org/10.1109/ICCPEIC.2014.6915381","url":null,"abstract":"Distribution system is one of the major sectors of the power system in a country. In this system, the maximum amount of loss occurs on the distribution side thus a complete analysis of the amounts of losses that each component has in the distribution system has to be made. Loss reduction initiatives in distribution systems have been activated due to the increasing cost of supplying electricity, the shortage in fuel with ever-increasing cost to produce more power. In this paper, various ways to reduce the losses have been shown for the BSP (H) CL (Bihar State Power (Holding) Company Ltd.). The whole Patna city's distribution system is modeled using ETAP software. The model has been extended to implement the proposed work and to examine their effects on loss reduction. Simulation results have shown that the implementation of these projects leads to a significant improvement in voltage profile, and reduction in the active and the reactive power losses.","PeriodicalId":176197,"journal":{"name":"2014 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC)","volume":"680 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115122980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Apeksha. B. Dhakde, Dr.Sonali Nimbhorkar(Ridhorkar)
{"title":"Survey on distributed detection mechanism for Byzantine attack in tree-based topology","authors":"Apeksha. B. Dhakde, Dr.Sonali Nimbhorkar(Ridhorkar)","doi":"10.1109/ICCPEIC.2014.6915338","DOIUrl":"https://doi.org/10.1109/ICCPEIC.2014.6915338","url":null,"abstract":"In tree based topology each and every nodes are participating on communication with other nodes. So it is major challenge to secure the data transmission between the nodes in the network as many types of attacks are generated in between the communication. Byzantine attack is one of the most important security thread as it interrupt the communication of nodes in the network and behave like a innocent nodes while participating normally. In Byzantine attack compromisation of nodes takes place in that condition it is very difficult to detect the innocent and malicious nodes, with the byzantine nodes many other attacks are deployed as Blackhole attack, wormhole attack, gray-hole attack, flood rushing attack, sinkhole attack etc. Routing protocols helps to provide the way through which the nodes can be able to communicate with each other. Also provide the cost associated with each node so as to differentiate investment of resources from each node as communication takes place. For securing the data transmission in a network algorithms proposed which will bound the faulty data transmission and also limits the resources usage by decreasing the investment of resources which takes part in communication. Performance will be measures in terms of parameter as packet delivery fraction, energy consumption, and End-to-end delays.","PeriodicalId":176197,"journal":{"name":"2014 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114775730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pattern discovery for text mining","authors":"V. Aswini, S. Lavanya","doi":"10.1109/ICCPEIC.2014.6915399","DOIUrl":"https://doi.org/10.1109/ICCPEIC.2014.6915399","url":null,"abstract":"Text mining can be defined as the art of extracting data from large amount of texts. It allows to structure and categorize the text contents which are initially non organized and heterogeneous. Text mining is an important data mining technique which includes the most successful technique to extract the effective patterns. The paper focuses on developing an efficient method for discovering patterns from the document. In text mining field, pattern mining techniques are used to find text patterns, such as frequent item sets, closed frequent item sets, co-occurring terms. This paper presents an innovative and effective pattern discovery technique which includes the process of pattern evolving and pattern deploying, to improve the effectiveness of using and updating discovered patterns for finding relevant and interesting information.","PeriodicalId":176197,"journal":{"name":"2014 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC)","volume":"306 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131769688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}