{"title":"FPGA BASED SPACE VECTOR MODULATION FOR V/F CONTROL","authors":"Madhura Nasare, Yatish Salian, Ashish Ghoderao, Anjali Deshpande","doi":"10.1109/ICISC44355.2019.9036344","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036344","url":null,"abstract":"Voltage Source Inverter (VSI) is the most widely utilized power converter in Industrial Drive Systems. The voltage and frequency Control of the inverter output is achieved by using PWM techniques. Space Vector Pulse Width Modulation (SVPWM) provides better DC bus utilization and minimum switching losses as compared to other PWM techniques. These PWM signals are generated using DSP or FPGA. The FPGAs provide higher computational speed and flexibility due to their reconfigurable hardware. This work basically deals with implementation of SVPWM algorithm on FPGA. The 3-phase sine wave is first digitized and stored in the form of a lookup table. The reference vector is generated from 3-phase references (voltages) using d-q transform. Reference vector Vref is sampled with frequency 1 KHz. Width of pulse is modified by varying magnitude and rotating frequency of reference vector depending on applied inputs. The method has been presented to reduce complex timing equations to a simplified form which avoids trigonometric mathematical operations in the algorithm. An algorithm was implemented in such a way that the consecutive switching vectors undergo single bit state change which reduces switching losses.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127303704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traditional and 2-SMC Control Strategies for Coupled Tank System","authors":"B. A. Reddy, P. V. Krishna","doi":"10.1109/ICISC44355.2019.9036440","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036440","url":null,"abstract":"This paper focuses on maintaining the liquid level in tank two in the coupled tank control system with the help of the sliding mode control (SMC). SMC is the potent controller for coupled tank liquid level system under tracking conditions. Sliding mode controller (SMC) is nonlinear control it applies a discontinuous control signal. The main advantages of sliding mode are low sensitivity to plant parameter variations and disturbances. To maintain desired liquid levels in a nonlinear coupled tank is a great challenging task so this problem better handled by SMC. To control this liquid level process a SMC strategy is used we have first order SMC and second order SMC. Regulating this system in less time with proper control signal is not possible in first order SMC due to chattering is obtained which yields unwanted control signal. To fill tank-2 in less time with smooth control signal is possible in higher order SMC. Next, second order SMC is applied and stability is reached fast and no chattering phenomenon. These can be shown in the simulation results with the help of MATLAB. This application report describes how to develop SMC for liquid level control in coupled tank system.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124818765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA Based Implementation of Symmetrical Switching in SVPWM for Three Level NPC Converter","authors":"R. L. Naik, Kavita B. Hunasikatti","doi":"10.1109/ICISC44355.2019.9036409","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036409","url":null,"abstract":"This paper presents the FPGA based implementation of symmetrical switching strategy in SVPWM for three level NPC converter. A simplified switching strategy is proposed by exploiting the redundant states of switching vectors available in three level space vector resulting into symmetrical switching sequence. This switching strategy leads to generate switching sequence for all regions of every sector with each switch has to be turned “ON’ once in time period resulting into lower device stress and reduced switching loss. The proposed switching strategy is developed using FPGA based Xilinx block sets and tested on hardware test bench consists of Induction motor integrated to the three level Neutral Point Clamped (NPC) converter controlled by FPGA based wavect controller. It is observed from the results, that the complexity of SVPWM for three level inverter is reduced to that of two level inverter and address the problem of narrow pulse width at the midpoint of NPC converter","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124986898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reduction of Switches in Multilevel Inverter: Analysis for Low and High Voltage Applications","authors":"S. S., P. Dhal","doi":"10.1109/ICISC44355.2019.9036380","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036380","url":null,"abstract":"The paper focuses on the analysis of different configurations of multilevel inverters. The analysis is based on building a MATLAB model of the considered configurations along with the detailed description of the switching states. The switching states and the waveform is produced by considering a sinusoidal voltage waveform as reference. Same type of circuitry is expected to give an ideal characteristic, whatsoever the voltage level may be considered. Only the nominal voltage is to be considered for analysis, since its influence that spread across almost all sectors. Three different configurations producing an output of nine levels are described, compared and analysed using MATLAB.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125502311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Arunraj, A. Mathivadhani, D. Deepa, S. A. Kumar
{"title":"Design of F shaped MIMO antenna for WIMAX Applications","authors":"M. Arunraj, A. Mathivadhani, D. Deepa, S. A. Kumar","doi":"10.1109/ICISC44355.2019.9036364","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036364","url":null,"abstract":"The proposed antenna can be used for wi max applications. The length and width of the antenna is 80mm x 45mm with FR4 substrate. It is designed in such a way that an additional F slot is introduced in the radiating element, to reduce the antenna size in lower band. All the simulations are done by mentor graphics IE3D. MIMO antenna can achieve the required antenna necessity of wireless communication such as small size, lower return loss, high gain, better impedance matching, easy to design and low cost.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115434907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EMBER - Analysis of Malware Dataset Using Convolutional Neural Networks","authors":"Subhojeet Pramanik, Hemanth Teja","doi":"10.1109/ICISC44355.2019.9036424","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036424","url":null,"abstract":"The aim of this research is to implement Neural Network algorithms to achieve a model of precision (f1-score and recall) for investigating malevolent Windows portable execution files. The paper utilizes EMBER - a benchmark dataset that contains features extracted from 1.1M binary files. The dataset contains 900K training samples (malicious, benign and unlabeled samples) and 200K test samples and provides numerous cases to build models that enhance information security. So, in order to determine if a given file is a malware or not we implemented algorithms like Convolutional Neural Networks and Feed Forward Neural Networks and assembled the results in terms of accuracy.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"2021 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122678583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. F. Fiaboe, P. Gaurav, N. K. Pandey, Pranaw Kumar
{"title":"Ultra low confinement loss Photonic crystal fiber with flattened dispersion","authors":"K. F. Fiaboe, P. Gaurav, N. K. Pandey, Pranaw Kumar","doi":"10.1109/ICISC44355.2019.9036467","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036467","url":null,"abstract":"Propagation characteristics of a PCF structure with elliptical holes arranged in a rhombic fashion has been presented in this work. Designed fiber has both circular and elliptical air holes arranged in the cladding region. The three innermost ring has elliptical holes following rhombic arrangement. Rest all are circular holes. Designed PCF structure exhibits very low dispersion at higher communication wavelengths. But at lower optical wavelengths, almost zero dispersion has been reported. Besides this, obtained confinement loss is much lower and is in the order of 10−15.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121527681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Congestion Cost and Risk Assessment Cost Evaluation in Transmission Pricing Wheeling","authors":"Gaurav Jain, D. K. Palwalia, A. Mishra","doi":"10.1109/ICISC44355.2019.9036377","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036377","url":null,"abstract":"Alleviating transmission congestion is a complex task and can impose a barrier to the electricity trading. During congestion voltage security is one of the significant aspects. In this research paper, congestion cost evaluation has been made on the basis of fall of voltage due to heavy loading and components contingency (line, transformer etc). In case of contingency, quantification of risk made according to the severity of voltage deviations and attempted to quantify a risk index of voltage instability. The modified Amp method and MVA utility factors methods based approach are applying in congestion and risk assessment system. The proposed methods are tested on an IEEE 6 and IEEE 14 bus transmission network system. Allocation of congestion costs and risk assessment of respective wheeling transactions have been achieved. This research paper serves as an evaluation of the congestion and risk assessment methodology, which has been adopted and being practiced in the markets.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126404550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MD5 and ECC Encryption based framework for Cloud Computing Services","authors":"Preeti Goyal, Hemant Makwana, Nilima Karankar","doi":"10.1109/ICISC44355.2019.9036447","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036447","url":null,"abstract":"Cloud computing is emerging as a widely known paradigm in the field of computer science which initiates services like storing and accessing data over the internet instead of using computer's hard drives. There are also various services provided by cloud like Iaas, Paas and Saas. As the popularity of cloud increases, intruders have started to interrupt the process in order to access confidential file of various cloud users. There must exist a system to provide necessary features for security. To achieve security, cloud services uses various security principles like Confidentiality, access control, integrity, availability etc. In the current work all these principles are implemented in environment using algorithms like ECC to enhance the Confidentiality of data. In this scenario, MD5 maintains the Integrity of data at server side and access control is achieved by RBAC techniques. Hence the proposed architecture achieves the high level of security for the cloud environment.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132204820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Efficient Clustering-based Routing Protocol Adopting Enhanced Cluster Formation (EERRCUF) Protocol in Hybrid Wireless Sensor Networks*","authors":"Nirmala Hiremani, T. Basavaraju","doi":"10.1109/ICISC44355.2019.9036452","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036452","url":null,"abstract":"Wireless Sensor Networks is one such domains where lot of researches and development works have been carried out to enable powerful sensor nodes are available at low cost. Now a day, the Hybrid Wireless Sensor Networks have attracted the researchers to focus on communication difficulty between Static Sensor Networks (SSN) to Mobile Sensor Networks (MSN). In this paper energy efficient cluster based routing protocol adopting enhanced cluster formation (EERRCUF) protocol is introduced for the applications like HWSNs. Initially we perform the effective clustering process using Particle Swarm Optimization (PSO) for grouping the nodes according to the geolocation properties. By using PSO all the nodes will cluster without residual nodes, subsequently the cluster head (CH) and super CH based on the trusted valued of each node computed by the Differential Evolution based Trust Inference (DETI) model. Then, an inter-cluster routing is performed by Gravitational Search Algorithm (GSA). The simulation results showed effectiveness of our EERRCUF protocol in terms of Quality of Service (QoS) constraints such as throughput, delay, energy consumption; Quality of Experience (QoE) constraints such as Peak Signal-to-Noise Ratio (PSNR), Structural Similarity Index (SSIM), and Video Quality Measurement (VQM).","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132353183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}