2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]最新文献

筛选
英文 中文
Load frequency control of a single area system: An experimental approach: Part-1 单区系统负载频率控制:实验方法:第1部分
Anoop Kumar Mohanta, Ritesh Dash, C. Behera, Priyabrata Behera
{"title":"Load frequency control of a single area system: An experimental approach: Part-1","authors":"Anoop Kumar Mohanta, Ritesh Dash, C. Behera, Priyabrata Behera","doi":"10.1109/ICCPCT.2015.7159522","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159522","url":null,"abstract":"Transmission and distribution of power over the tie line depends upon the amount of load connected to it. As the entire power system is a completely non linear network so steady state analysis of the power system is a very difficult task. In order to maintain the system voltage and frequency with that of the change in the loads demand it is require to modify the system suitable controller. If the generation system is considering only one generation unit and one load area it can be treated as a one area network. So for one area network the system frequency can be controlled through the either P or PI controller. This paper tries to identifies the different types of problem occurring in the single area network with their behavior to active and reactive power system.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"3 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80202520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A case study for solarification project of different places in India 印度不同地区太阳能项目的案例研究
Ravi Kumar, N. Pal, Abishek Naithani
{"title":"A case study for solarification project of different places in India","authors":"Ravi Kumar, N. Pal, Abishek Naithani","doi":"10.1109/ICCPCT.2015.7159393","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159393","url":null,"abstract":"As the population is increasing day by day, so the energy demands are bound to increase. In recent years India has seen several blackouts. To meet the future demand of power we should start investing in renewable energy. India has great potential for solar energy which is still untapped. Solar energy is residential friendly and can be installed easily in residential areas. This paper presents the Modeling and Cost analysis of solar photovoltaic (PV) systems and the energy saved in a domestic household from its use. The study is conducted in five different places of INDIA using RETSCREEN software. The role of solar radiation on size of PV system and their economic influence of different location is analyzed for equal load demand. The parameters used for economic analysis of modeling work are Net Present value (NPV), payback period, Internal Rate of Return (IRR) etc. Different parameters were compared for different selected locations. Finally, it is found in the analysis that solar irradiation level has great influence on the PV array size, its efficiency, capital cost, IRR, payback period and levelised cost of energy, etc. Also electricity generated by the solar PV system reduces greenhouse gas (GHG) emission and makes the environment more eco friendly. The weather information was taken from the NASA website.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"27 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81513956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modernization of lignite feeder control system using microcontroller with multidrop mode 褐煤给料机控制系统的多滴式单片机现代化设计
R. Manochitra, S. Raja
{"title":"Modernization of lignite feeder control system using microcontroller with multidrop mode","authors":"R. Manochitra, S. Raja","doi":"10.1109/ICCPCT.2015.7159369","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159369","url":null,"abstract":"Lignite handling plants are having number of conveyors and they are seen virtually. The control systems used for these conveyors are important for operating safe plant. In the existing control system, there are different modules and number of relays in control panel which makes the circuit very complex. There are four main feeder sets in each corner of a boiler. Each main feeder consists of four sub feeders and each sub-feeder consists of different modules. The different modules are Zero speed module, Chain positioned module, Coal flow/no flow module and Speed transmitter module. So, they occupy more space and needs more cables to communicate field and control panels. In this paper, a universal control panel is designed and simulated based on microcontroller. A simple cable communication interface is used between field and control panels with RS485 multi-drop mode facility.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"28 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81551693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Coin detection and recognition using neural networks 使用神经网络的硬币检测和识别
S. Mohamed, M. Roomi, R. B. Jayanthi
{"title":"Coin detection and recognition using neural networks","authors":"S. Mohamed, M. Roomi, R. B. Jayanthi","doi":"10.1109/ICCPCT.2015.7159434","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159434","url":null,"abstract":"Coin identification and recognition and is important to enhance the extended operation of Vending machines, Pay phone system and coin counting machines. Coin recognition is a difficult task in machine intelligence and computer vision problems because of its various rotations and widely changed patterns. Therefore, an efficient algorithm is designed to be robust and invariant to rotation, translation and scaling. The objective of this work is to find whether the object is coin or not if so denomination of the coin is found. The Fourier approximation of the coin image is used to reduce the variations on surface of coin such as light reflection effect. Then coins can be distinguished by feeding those features into a multi-layered BP neural network.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"9 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84357215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design of an improved energy efficient clustering in M2M communication M2M通信中改进的能效集群设计
K. Deshpande, A. Rajesh
{"title":"Design of an improved energy efficient clustering in M2M communication","authors":"K. Deshpande, A. Rajesh","doi":"10.1109/ICCPCT.2015.7159254","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159254","url":null,"abstract":"In this paper, we analyse machine to machine (M2M) communication in long term evolution for machine type communication(LTE-M) network. It provides interface for M2M devices to send data to M2M gateways or evolved Node B (eNB). Clustering is an efficient way of gathering data and energy conservation. Here, two existing clustering methods, namely, Low energy adaptive clustering hierarchy (LEACH) and energy aware multi-hop multipath hierarchy (EAMMH)are compared with improved M2M clustering process (IMCP) method. Results show that IMCP performs better than the existing techniques in terms of energy consumption, network life time and number of dead nodes. Assumption is made to use smart metering as one of measuring application in M2M communication.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"11 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84529379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A novel method of using symbiotic organism search algorithm in solving security-constrained economic dispatch 利用共生生物搜索算法求解安全约束下的经济调度问题
R. Rajathy, B. Taraswinee, S. Suganya
{"title":"A novel method of using symbiotic organism search algorithm in solving security-constrained economic dispatch","authors":"R. Rajathy, B. Taraswinee, S. Suganya","doi":"10.1109/ICCPCT.2015.7159389","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159389","url":null,"abstract":"This paper presents an efficient and reliable Symbiotic Organism Search algorithm for solving Economic Load Dispatch problem. The superiority of Symbiotic Organism Search is demonstrated for 6 bus system including the transmission constraint. It has been observed that Symbiotic Organism Search method gives appreciable results for Security Constrained Economic Dispatch problem.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"85 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84010231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Understanding insider attack problem and scope in cloud 了解云中的内部攻击问题和范围
T. Gunasekhar, K. Rao, M. Basu
{"title":"Understanding insider attack problem and scope in cloud","authors":"T. Gunasekhar, K. Rao, M. Basu","doi":"10.1109/ICCPCT.2015.7159380","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159380","url":null,"abstract":"The malicious insider can be an employees, user and/or third party business partner. The insiders can have legitimate access to their organization data centers. In organizations, the security related aspects are based on insider's behaviors, the malicious insiders may theft sensitive data and no protection mechanisms are addressed till now to completely defend against the attacks. Such that organizational data could be so vulnerable from insider threat attacks. The malicious insiders of an organization can perform stealing on sensitive data at cloud storage as well as at organizational level. The insiders can misuse their credentials in order to perform malicious tasks on sensitive information as they agreed with the competitors of that organization. By doing this, the insiders may get financial benefits from the competitors. The damages of insider threat are: IT sabotages, theft of confidential information, trade secrets and Intellectual properties (IP). It is very important for the nation to start upgrading it's IT infrastructure and keep up with the latest security guidelines and practices.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"4 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72751574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
New hybrid DRA for upper S-band and lower C-band applications 新型混合DRA用于上s波段和下c波段应用
S. K. K. Dash, D. Behera, S. Sahu
{"title":"New hybrid DRA for upper S-band and lower C-band applications","authors":"S. K. K. Dash, D. Behera, S. Sahu","doi":"10.1109/ICCPCT.2015.7159394","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159394","url":null,"abstract":"A new hybrid T-Shaped monopole dielectric resonator antenna using conical cum hemispherical shaped dielectric ring resonator has been investigated. The newly introduced structure provides much better multipurpose application performances as compared to the published papers available in open literature. S11<; -10dB ranging 3.78-4.38 GHz has been experimented by simulation, showing 1.15:1 ratio bandwidth, i.e., greater than 14.7% impedance bandwidth at the centre of the band with 2.34 dBi gain. Such useful characteristics could be suitably utilized in designing monopole antennas for narrow band applications.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"94 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80353090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Soft switched flyback DC-DC converter for wide input voltage and full load range applications 软开关反激DC-DC变换器宽输入电压和全负载范围的应用
Rincy Lonappan, Della David
{"title":"Soft switched flyback DC-DC converter for wide input voltage and full load range applications","authors":"Rincy Lonappan, Della David","doi":"10.1109/ICCPCT.2015.7159329","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159329","url":null,"abstract":"Soft switching techniques have a very important role in reducing the size, cost and also in improving average efficiency and power density of dc-dc converter. This paper introduces a soft switched flyback dc-dc converter with zero-voltage switching during both turn on and off. The soft switching is obtained over wide load and line ranges by placing two small ac capacitors in both side of flyback transformer. The triggering for switches is given by measuring the magnetizing voltage and current. This method provides zero-voltage switching during turn on and turns off independent of line voltage and load resistance. The new converter has four modes of operation which is described in this paper. The overall size of the system is reduced by increasing the switching frequency. In order to provide constant output voltage, current reference control is employed. The simulation results under different load and line conditions are provided to verify the performance of the new converter.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"104 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87033955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An application of image change detection-urbanization 图像变化检测的应用——城市化
A. Reno, D. David
{"title":"An application of image change detection-urbanization","authors":"A. Reno, D. David","doi":"10.1109/ICCPCT.2015.7159368","DOIUrl":"https://doi.org/10.1109/ICCPCT.2015.7159368","url":null,"abstract":"The goal of this paper is to develop an efficient method for finding changes in land areas that undergone changes over a period of time. Land monitoring and observation is such an area that is both important and time consuming task of remote sensing applications. Land changes often occur due to the seasonal changes of land covers, deforestation, natural disasters and many other factors. Existing methodologies do the change detection procedure only between two images taken at same area at two different time instances. A method is proposed for finding changes between images of same set occurred at various time intervals may be between years or various dates. The image is allowed for pre-processing using multiple steps to obtain a clear and an efficient pre-processed image. The spatial domain Image registration methods say transformations are supported in the proposed method. Unsharp Filters are used to remove the noise and to highlight the low intensity regions. Selections of Control Points are included in the Pre-processing step itself to choose a particular region from those input images. The histogram of the input image is used for selection of threshold and the objects in the image are detected. The objects in the detected image are compared with the base image objects to obtain a difference image. Image segmentation is done on edges by Canny edge detector as this is known for its popularity. The selected regions are fed up into neural network tool where Classification training and validation of the data is performed and mean square error is considered as a performance measure. The performance parameters like true positive, false positive, true negative and false negative are obtained by comparing the change detected image with the ground truth image. Graphical representation of training state such as gradient and validation check is also performed. ROC is plotted against false positive and true positive values. The experimental results determine the efficiency of the proposed method by testing it with different data sets.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"32 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89053269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信