{"title":"A novel design of 4-bit distributed MEMS transmission line (DMTL) phase shifter using an RF shunt capacitive MEMS switch for phased array antenna","authors":"T. R. Devi, S. Maity, A. Datta","doi":"10.1109/I2CT.2014.7092055","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092055","url":null,"abstract":"In this paper, coplanar waveguide (CPW) of dimension (0.2/1.6/0.2) mm has been used as the transmission line on which a ten number of Capacitive Shunt RF MEMS Switches are periodically spaced in order to achieve appreciable phase shift. The dimensions of the transmission line may be designed to provide a transmission line of 50Ω characteristic impedance periodically. A 4-bit Distributed MEMS transmission line (DMTL) phase shifter has been designed and provides the phase shifts of 900/3540/3360 depending on the combination of bits being used. The frequency of the complete designed is taken as 3-4 GHz of S-band and resonant frequency of around 3.55 GHz. A highly integrated complete structure has been designed on FR4-epoxy substrate having relative permittivity of 4.4 and has the area of 164.17 × 85.49 mm2 only. The designed and analysis is performed by using High Frequency Structural Simulator (HFSS version 13.0) software.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"261 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121349877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal capacitor placement and sizing for enhancement of distribution system reliability and power quality using PSO","authors":"P. Sonwane, B. E. Kushare","doi":"10.1109/I2CT.2014.7092338","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092338","url":null,"abstract":"This paper presents optimal capacitor placement and its sizing using Particle Swarm Optimization. Reactive power management and planning is one of the crucial issues in front of researcher from last four decades in addition to voltage profile, line losses and power factor problem in transmission and distribution system. Capacitor is a device which is a solution to above problem if utilized in proper way. IEEE 30 bus system is introduced in this paper for optimal configuration of capacitor with broader multi-objective function. Reliability and its indices as discussed in IEEE std 493 and 1366 are benchmark studies followed by all researchers. Placement of capacitor in proper way will Enhance the distribution system reliability is discussed in this paper. Particle Swarm Optimization technique is used to evaluate objective function for capacitor placement and sizing in IEEE bus system.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131556776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Currency detection using similarity indices method","authors":"R. Vishnu, Bini Omman","doi":"10.1109/I2CT.2014.7092214","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092214","url":null,"abstract":"The determination of the currency denomination is an issue in paper currency recognition system. This paper proposes a robust method to recognize the paper currency using the pattern matching. In the proposed algorithm a similarity measure is used to classify the currency based on the similarity of the extracted features. To evaluate the performance of the proposed method experiments were conducted over 200 of currencies of different denominations. On performing the experiment the proposed method gives 97% accuracy.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130691667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of an alert scheme using RF technology for ensuring safety of individuals in wireless Ad-hoc Network","authors":"S. Paliwal, V. Katkar","doi":"10.1109/I2CT.2014.7092307","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092307","url":null,"abstract":"Vehicular Ad hoc Network (VANET) and Mobile Ad hoc Network (MANET) provide a distinguish approach for Intelligent Transport System (ITS). There are many applications in VANET which provide secure message passing and circulating of data within the range. But there are very few applications where human security is taken into consideration. In new applications we can make a one which provides safety for human beings on road or indirectly related to roads or vehicles, can be solved using VANET principles and technologies. Instead of using mobile phones to connect humans and vehicles we can use a gadget which produces a panic alarm through the vehicles, using Radio Frequency (RF) technology and also send these messages to the helping people using GSM technique. When panic switch is triggered, the car help system gets activated which is in the close vicinity of victim, so that a temporary help is made by creating a mob.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126599777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of D-STATCOM for load compensation with non-stiff sources","authors":"Sunil S. Gurav, H. T. Jadhav","doi":"10.1109/I2CT.2014.7092303","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092303","url":null,"abstract":"Now a day's power quality is serious problem in power network. To overcome this problem an innovative device D-STATCOM is used. D-STATCOM (distribution static compensator) is FACTS device used to solve all power quality problems which connected in parallel with system. The main function of D-STATCOM is, it generates or absorbs the reactive power at point of common coupling (PCC), so that power quality can be maintained. Power quality problems are important issue in distribution system. In this paper new method for D-STATCOM with non-stiff sources is proposed for the load compensation it also considers linear and non linear loads. Load flows from distribution system in presence of feeder impedance due to this distort voltage and current at the PCC in this situation source called as non-stiff source. D-STATCOM also used for compensation of reactive power and unbalance caused by various loads in distribution systems. This method uses the series and shunt filter, one of advantages of this method is losses in inverter are reduced. The switching command of voltage source inverter (VSI) is generated using hysteresis band current control method. The simulation of proposed method is carried out using Matlab Simulink.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126680226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing the QoS using CSMA and TDMA protocols for wireless sensor networks","authors":"Dattatray S. Waghole, V. Deshpande","doi":"10.1109/I2CT.2014.7092167","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092167","url":null,"abstract":"A sensor network is a collection of different nodes which are randomly deployed in sensor area to measure environmental changes like humidity, pressure and temperature. This paper proposes the performance of CSMA and TDMA Protocols for various Quality of Services of the sensor network. End to End Delay, Throughput, Energy consumption, Packet delivery ratio are the some Quality of Services of the sensor network. In this paper analyze QoS is proposed against Size and Rate. The results are taken for CSMA and TDMA using NS2 simulator. Results are compared for average end to end delay, packet delivery ratio, energy consumption and throughput.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124367039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kaliprasad A. Mahapatro, Prasheel V. Suryawanshi, Ashitosh D. Chavan, M. Rane
{"title":"Comparative analysis of linear and non-linear extended state observer with application to motion control","authors":"Kaliprasad A. Mahapatro, Prasheel V. Suryawanshi, Ashitosh D. Chavan, M. Rane","doi":"10.1109/I2CT.2014.7092327","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092327","url":null,"abstract":"The design of observer for estimating states, disturbances, and uncertainty in plant dynamics is an important step for achieving high performance model based control schemes. This paper gives the estimation of states and lumped uncertainty by using extended state observer (ESO) and feedback linearization technique; moreover the question raised in this paper is which ESO stands effectively when maximum information of plant is not known? And can we achieve robust control if sensor calibration fails in real time? Simulation results says that nonlinear extended state observer (ESO) actively estimate the states, uncertainty and unknown disturbances when maximum information of the plant is not known as compared to linear extended state observer (LESO). The beauty of estimating lumped uncertainty by extended state of ESO adds an advantage that, dependency of sensor is no more required.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115987941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontological user profiling for adaptive re-ranking in mobile web search","authors":"Disha Gupta, N. Chavhan","doi":"10.1109/I2CT.2014.7092058","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092058","url":null,"abstract":"Due to the explosion of digital information on the web, web search has become common activity for everyone. Search engine is the most widely used online application for this purpose. With the advancement of mobile technology and networking, mobile web search has gained its own importance in a short span of time. Mobile being a portable, but also a constrained device, it has its own characteristics and limitations in addition to the web search. This paper discusses the issues of personalization in mobile search. A study of different user profiling techniques has been presented, and an ontological approach is proposed. The paper also suggests how the proposed approach can be incorporated in re-ranking process to provide personalized results to each user.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115233342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compressive sensing based microarray image acquisition","authors":"Usham V. Dias, S. Patil","doi":"10.1109/I2CT.2014.7092273","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092273","url":null,"abstract":"This paper implements Orthogonal Matching Pursuit (OMP) algorithm for reconstruction of Microarray Images based on the compressive sensing paradigm. Gaussian and Bernoulli random patterns are used to capture the scene. A Monte Carlo simulation is performed to calculate the peak signal to noise ratio, relative error and universal quality index of the red and green channels of the image independently. Since images are not sparse but rather compressible, the paper seeks to reconstruct approximately 90 percent of the energy using Discrete Cosine Transform (DCT) as the basis. This paper successfully proposes the use of post processing for quality improvement rather than increase in measurements. Post processing using median filter can account for a reduction of 200 samples per block. The results obtained show that, both the sensing matrices tested are equally good with Bernoulli pattern having the advantage of being sparse.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115372409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unsupervised outlier detection technique for intrusion detection in cloud computing","authors":"M. Kumar, R. Mathur","doi":"10.1109/I2CT.2014.7092027","DOIUrl":"https://doi.org/10.1109/I2CT.2014.7092027","url":null,"abstract":"Outlier detection is becoming a recent area of research focus in data mining. Here we are proposing an efficient outlier detection concept DenOD (Density Based Outlier Detection) based on unsupervised method for intrusion detection in cloud computing environment. Unsupervised outlier detection techniques are playing big role in a various application domains such as network intrusion detection, fault detection and fraud detection. The beauty of unsupervised method is that, it does not require any training data set or any kind of previous knowledge. This technique can help to detect accurate and novel attacks without any previous knowledge. DenOD will implement on IDCC (Intrusion Detection in Cloud Computing) framework that has three components- Cloud nodes, IDS (Intrusion Detection System) and End User. This technique is capable to detect all kind of attacks as well as detect faulty services in cloud environment.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115700622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}