International Conference on Innovative and Advanced Technologies in Engineering
(Volume-9)

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Internet of Things in Education
Country
::
India
Authors
::
Prof.Payal Varangaonkar || Prof.Dhanashree Pannase || Prof.Supriya Dicholkar || Prof.Payal Mohadikar || Prof.Deepthi Sekhar
Page
::
01-04

Today we found technology everywhere. It has changed the way we work.. The large amount of data available on education and new technologies has made us to think how students are taught and educational institutions . The way IoT in educational environments supports educators can influence how we as a society collaborate, communicate and operate. There are two aspects to look into here, firstly how students are taught and finally how educational institutions can bring in IoT to improve system. Because of Internet of things in education we can easily coonect to the physical world and environment. A smart school has the facilities to function smoothly that provides higher level of personalized learning. The smart devices that are used in the campus make us to use Wi-Fi network to send data and..........

 

Keywords: - IOT,Wireless door lock,Attendance tracking system,WiFi,Digital Boards

[1]. M. Cata, "Smart university, a new concept in the Internet of Things," in 2015 14th RoEduNet International Conference - Networking in Education and Research (RoEduNet NER), 2015, pp. 195–197. [2]. S. Husnjak, D. Perakovic, and I. Jovovic, "Possibilities of Using Speech Recognition Systems of Smart Terminal Devices in Traffic Environment," Procedia Eng., vol. 69, pp. 778–787, 2014. [3]. X. Nie, "Constructing Smart Campus Based on the Cloud Computing Platform and the Internet of Things," Proc. 2nd Int. Conf. Comput. Sci. Electron. Eng. (ICCSEE 2013), no. Iccsee, pp. 1576–1578, 2013. [4]. Y. Chen and X. Dong, "The Development and Prospect of New Technology in Modern distance education," Int. Conf. Inf. Sci. Comput. Appl., pp. 40–44, 2013. [5]. J. Marquez, J. Villanueva, Z. Solarte, and A. Garcia, "IoT in Education : Integration of Objects with Virtual Academic Communities," in New Advances in Information Systems and Technologies, no. 115, Springer International Publishing, 2016, pp. 201–212

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Minimizing Penalty in Industrial Power Consumption by Engaging APFC Unit
Country
::
india
Authors
::
Yash Shinge || Nikhil Shetty || Satyansh Tiwari || Pushpak Patil || Priyanka Tripathi
Page
::
05-08

In the industrial division, the numerous motoring loads are continuously running and generating the inductive load. Power consumption is increasing day by day at a very high rate. So the power factor in this operation gets lessened due to the inductive reactive power. The electricity company charges the penalty to the industrial consumers if the power factor goes below the specified limit;. By using power capacitors the required compensation can be achieved to overcome inductive reactance with the help of APFC panel. The current transformer sends a current signal which is received by the microcontroller 8051 and simultaneously the signals are fed to the various contactors to connect the capacitors in the line. Thus due to addition of the capacitor to the line, it will help in compensating the reactive power and thus maintain the power factor near to unity. This will avoid the penalty to the industrial consumers. In the conventional methods, we were using the fixed capacitor for compensation. But these led to excessive charging of the capacitors, which in turn caused the voltage surges. Thus it becomes complicated to maintain power factor near unity by on and off operation of the fixed capacitor. The contactor switched capacitors are connected and disconnected automatically eliminating the previous predicament..


Keywords: - microcontroller 8051, capacitor bank, embedded technology.

[1]. Keith Harker (1998). "Power System Commissioning and Maintenance practice." London: Institution of Electrical Engineers. [2]. Barsoum, Nader (2007) "Programming of PIC Micro-Controller for Power Factor Correction" IEEE Conference on Modeling & Simulation, Pages:19-25. [3]. Rakendu Mandal; Sanjoy Kumar Basu; Asim Kar; Shyama Pada Chowdhury (1994) "A Microcomputer – Based Power Factor Controller", IEEE Transactions on Industrial Electronics, Volume: 41, Issue: 3, Pages: 361–371. [4]. Jos Arrillaga, Neville R. Watson (2003). "Power System Harmonics" 2nd.ed. Chichester: John Wiley. [5]. JBV Subrahmanyam, S.Radha Krishna Reddy, P.K. Sahoo, N.Madhukar Reddy, C.Sashidhar, "A Novel Method for Improvement of

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Solar Hybrid Inverter System Using PIC18 Microcontroller
Country
::
India
Authors
::
Abhiraj Tawde || Rashmi Chaugule || Rohit Yadav || Pankaj Sabne || Rishabh Sawant
Page
::
09-11

It has become clear that the basic architecture of today's electricity grid, which revolves around the idea of a top down radial transmission system dependent on unidirectional electrical energy flows from large centralized power plants, is obsolete, then aggregation platforms, such as the hybrid inverter, will become vital. Solar Hybrid Inverter are modern, small-scale versions of the centralized electricity system, having specific local aims, such as reliability, carbon emission reduction, diversification of energy sources, cost reduction ,and improved efficiency established by the community of users being the beneficiaries. This paper presents an intelligent solar hybrid inverter system that is installable in small or mostly rural localities and consists of sources like grid power, solar power etc. By efficient use of sources the overall cost for the users can be reduced. Smart switching is done.....

 

Keywords: - Battery Charging, Hybrid System, UPS, Switching, Converters.

[1]. CHEN HONG, LENG Hua , TANG Haiguo, ZHU Jiran, GONG Hanyang, Research On Model Management Method For Micro- Grid. [2]. Oo Abdul Rosyid, Comparative Performance Testing Of Solar Panels For Smart City Micro-Grids. [3]. Saiket Barua, H. Shahadat, B. Sujoy, H. J. Mashrukh, H.Ziaul, Demand Side Load Management System For End User In Micro Grid. [4]. Kannan Thirugnanam, See Kim Kerk, Chau Yuen, Nian Liu, Meng Zhang Energy Management For Renewable Micro Grid In Reducing Diesel Generators Usage. [5]. M.Wissener,The Smart Grid-A Successful Of Series. Applied Energy., Vol88, P.2509-2518, 2011

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Numerical Protection Of Transformer
Country
::
India
Authors
::
Namita Gawas || Darshna Jain || Soham Patil || Rudal Shengale || Rajeev Valunjkar || Priti Singh
Page
::
12-14

Single phase transformer are one of the most important equipment in power system network. The data acquisition, condition monitoring, automatic controlling are the important issues. This paper describes the design and implementation of the micro controller-based system for protecting single phase transformer. The proposed system discriminates between internal fault and external faults, differential protection, over current protection, over voltage protection. In this paper, software and hardware of micro controller based system have been explained and designed. The design implementation and testing of the system are also presented.

 

Keywords -Power Transformer,PIC Microcontroller automation,Numerical Monitoring and Control..

[1]. Bajjuri Praneeth Kumar & Boda Vamsee Krishna Babu, "SMS Remote Controller" paper presented in Embedded System –Fall 2005 [2]. Ali Kazemi & Casper Labuschagne ,"Protecting Power Transformers From Common Adverse Conditions", paper presented at the Ga-Tech and the Western Protective Relay Conferences, New Berlin" in 2005 [3]. T.S.Madhavrao, "Power System Protection- Static Relays". TMH Publication. [4]. National Semiconductor Corporation, "ADC 0808", journal published, America, October 1999. [5]. Atmel Corporation, " AT 89S51", literature journal published, CA, December 2003 3. National Semiconductor Corporation, " Voltage Regulator LM 7805" journal published, America, May 2003

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Border Surveillance Using Ip Camera
Country
::
India
Authors
::
Gaurav Golatkar || Prathmesh Ambekar || Prashant Jadhav || Rohan Jadhav || Prajakta Borole
Page
::
15-19

Military people have huge risk on their lives while entering an unknown territory. This Paper demonstrates problem and effects of landmines in defense field.The proposing system is consisting of a robot that will serve as an appropriate machine for the defense sector to reduce the loss of human life and will also prevent from illegal activities. The main objective behind developing this robot is for the surveillance of human activities in the war field or border regions in order to reduce infiltrations from the enemy side. It will help all the military people and armed forces to know the condition of territory before entering in it. The system is consisting of night vision wireless camera, PIR sensor for human detection and mine detection unit which are interfaced with Arduino Uno can transmit the information through NRF module..

 

Keywords - Mine detection, Robot, Spy camera, Wi-Fi network, Wireless control.

[1] Habib M.K., "Mine detection and sensing technologies-new development potentials in the context of humanitarian demining," in Industrial Electronics Society, The 27th Annual Conference of the IEEE, Vol. 32001. [2] Brown, C..; Zoubir, A.M.; Chant, I.J.; Abeynayake, C., "Landmine detection using single sensor metal detectors," in Acoustics, Speech, and Signal Processing (ICASSP), 2002 IEEE International Conference on, vol.4, no., pp.IV-3948-IV-3951, 13-17 May 2002. [3] Christ, P.; Neuwinger, B.; Werner, F.; Ruckert, U., "Performance analysis of the nRF24L01 ultra-low-power transceiver in a multitransmitter and multi-receiver scenario," in Sensors, 2011 IEEE , vol.no, pp.1205-1208, 28-31 Oct. 2011. [4] Borker, Kunal,Rohan Gaikwad, and Ajaysingh Rajput. "Wireless Controlled Surveillance Robot."International Journal 2.2 (2014). [5] Ying-Wen Bai, Chen-Chien Cheng and Zi-Li XieDepartment of Electrical Engineering,Fu Jen Catholic University, IEEE 2013 "Use of Ultrasonic Signal Coding and PIR Sensors to Enhance the Sensing Reliability of an Embedded Surveillance System".

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Simulation Of Rectangular Waveguide In Ku Band For Varying Magnetic Field
Country
::
India
Authors
::
Vinayak Kanade || Abhishek Kanerkar || Mayur Khatavkar || Yogesh Mergu
Page
::
20-25

Rectangular waveguide is a very promising structure for different applications. It has some unique characteristics that allow for wide range of application including slow and fast light, meta-material, low loss energy transmission, and sensing. The resemblances and differences between this waveguide configuration and metal-insulator-metal (MIM) are discussed in this paper.A Description of the guided modes and their operating band is also given. We also studied the characteristics of the fundamental TM-like mode of this structure for the first time. Its potential application in sensing and low loss energy transporting is also demonstrated. The effect of the design parameters on the performance of the rectangular waveguide is illustrated for different application. Slow light and negative refraction effects using this waveguide design using TE-like mode is also demonstrated. Different designs are proposed using this structure for these different applications. Square shape design allow for polarization....... .


Key words: - Rectangular Waveguide,Ku Band, MIM, TE and TM mode, EM field,SWS,BWO.

[1]. Understanding the focusing of charged particle for 2D sheet beam in a cusped magnetic field Tusharika S Banerjee 1* ,ArtiHadap, Reserach 2 , K.T.V [2]. Electromagnetic Wave Theory for Calculation of Exact Magnetic Field in Case of BWOHadap A1, Reddy KTV2 and Banerjee TS3 [3]. Review on microwave generation using backward wave oscillatorTusharika Sinha Banerjee1, K. T. V. Reddy2and Arti Hadap3 [4]. High-Power Millimeter-Wave BWO Driven by Sheet Electron BeamZhanliang Wang, Yubin Gong, Member, IEEE, Yanyu Wei, ZhaoyunDuan, Yabin Zhang, Linna Yue,Huarong Gong, Hairong Yin, Zhigang Lu, Jin Xu, and Jinjun Feng, Senior Member, IEEE..

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Smart Hospital Using Iot
Country
::
India
Authors
::
Jinal Shah || Sahil Soni || Falguni Darji || Prof: Sumita Chandak || Prof: Ashmita Shetty
Page
::
26-32

The rapid development of Internet of things (IoT) technology makes it possible for connecting various smart objects together through the Internet and providing more data interoperability methods for application purpose. The use of IoT technology in applications has spurred the increase of real-time data, which makes the information storage and accessing more difficult and challenging. Most of the time, due to negligence of hospital staff, excessive number of patients or inattentiveness of relatives some abnormality can go unnoticed which can result in patient's health issues. Thus, in this paper we have proposed a system which include combination of sensor technology and Internet of Things(IoT).Using this system one can monitor health of a patient, level of the saline bottle, heartbeat, blood pressure, temperature and control electricity from distant position.

 

Keywords - Internet of Things(IoT), smart hospital, Temperature sensors(LM35),Heartbeat Sensor,LDR(Light Dependent Registor) wifi module, microcontroller, 2-way communication, Arduino UNO, water level sensors

[1]. Department of Economic and Social Affairs of the United Nations. 2009. World Population Ageing 2009, New York: United Nations. [2]. Z. Pang, "Technologies and Architectures of the Internet-of-Things (IoT) for Health and Well-being," PhD Thesis, Royal Institute of Technology (KTH), Stockholm, Sweden, 2013. [3]. C.E.Koop,et al., "Future delivery of health care: Cybercare," IEEE Engineering in Medicine and Biology Magazine, vol.27, no.6, pp.29-38, Nov. 2008. [4]. B. Schuz, et al., "Medication beliefs predict medication adherence in older adults with multiple illnesses," Journal of Psychosomatic Research, vol. 70, no. 2, pp. 179-187. 2011. [5]. K. Ashton "That 'Internet of Things' Thing," RFID Journal, June 2009..

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Secure Storage For Ad Hoc Cloud
Country
::
India
Authors
::
Vijay Singh || Nitin Yelwande || Swapnil Kokani || Dr. Mamta Meena
Page
::
33-39

The rapidly increasing growth of technology has seen the rise of technologies like cloud systems among others. The use of these cloud systems enables people to back up their data and access it whenever needed. However, an internet connection is required. There are some instances, for mobile clients, where a continuous network connection is not available and in such cases the cloud cannot be accessed. We may make use of an ad hoc cloud system but the major issue with these is the lack of security and lack of a centralized authority. In this paper, we will be analyzing the SAS Cloud: ad hoc cloud for secure storage. The SAS (Storage as service) cloud provides a centralized authority for data storage even in network disconnected areas and provides a high level of security. We will focus on simulating the various conditions and situations that may be encountered using a simulation software. The results can then be analyzed to see the feasibility of such systems and their overall utility.


Keywords – Ad hoc cloud, distributed storage, mobile cloud

[1] S. Al Noor, M. M. Hossain, R. Hasan, "Sascloud: Ad hoc cloud as secure storage", Proc. of the BDCloud, 2016 [2] Ari Keränen, Jörg Ott, Teemu Kärkkäinen, The ONE simulator for DTN protocol evaluation, Proceedings of the 2nd International Conference on Simulation Tools and Techniques, March 02-06, 2009, Rome, Italy [3] G. McGilvary, A. Barker, M. Atkinson, "Ad hoc cloud computing", CoRR,2015 [4] H. T. Dinh, C. Lee, D. Niyato, and P. Wang, "A survey of mobile cloud computing: architecture, applications, and approaches," Wireless Communications and Mobile Computing, vol. 13, no. 18, 2013 [5] H. Alshareef, D. Grigoras, "Mobile Ad-hoc Network Management in the Cloud", Parallel and Distributed Computing (ISPDC) 2014 IEEE 13th International Symposium, pp. 140-147, 2014.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Iot Based IMU For Home Automation
Country
::
India
Authors
::
Suveena Save || Vidhi Suvarna || Nikita Singh || Devednya Vyas || Samuel Jacob
Page
::
40-42

Infrared remote controls for controlling the home appliances and electronics gadgets are very general. The complexity of buttons in these types of remote controls make its handling tough, they are not easy to understand and also to use. In this paper we propose an IOT based inertial measuring unit system for home automation which can provide an easy solution to this problem using gestures in a remote control for handling home appliances..

 

Keywords - Embedded, Gestures, Home automation, IoT.

[1] P. N. Arathi , S. Arthika, S. Ponmithra , K. Srinivasan, V. Rukkumani "Gesture Based Home Automation System" 2017 International Conference on Nextgen Electronic Technologies [2] Byeongkwan Kang,Sunghoi Park,Tacklim Lee andSehyun Park, "loTbasedMonitoring System using Tri-level Context Making Model forSmart Home Services", 2015 IEEE International Conference on ConsumerElectronics (ICCE), 2015 [3] Robert Mahony, Tarek Hamel , Jean-Michel Pflimlin "Complementary filter design on the special orthogonal group" Proc of the 44th IEEE Conference on Decision and Control, and the European Control Conference 2005 Seville, Spain, December 12-15, 2005 [4] JeyaPadmini, K.R.Kashwan, "Effective Power Utilization and Conservation in Smart Homes Using loT", 2015 International Conference on Computation of Power, Information and Communication [5] Zeinab Kamal Aldein Mohammeda, Elmustafa Sayed Ali Ahmed "Internet of Things Applications, Challenges and Related Future Technologies" Electrical and Electronic Engineering Department, Red Sea University, Sudan

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Recent Issues Review In Project Management
Country
::
India
Authors
::
Priyanka Tripathi || Suvarna More
Page
::
43-47

This paper examines project management research from the perspective of its relationship in the management field. Delays have been frequently reported as the cause of several conflicts that affect the project. Project management now a day is regarded as a very high priority as all companies or organizations. The development of project management has always been in parallel to the development of general trends in worldwide economics, research has substantial elements of creativity, innovation and predicting the outcome of research the analysis of project management disciplines reveals an explosion of popularity and strong interest in the last 50 years are i) strategy / portfolio management ii) operations research iii_ organizational behavior iv) information technology v) technology application / innovation vi) performance management vii) engineering and construction and viii) quality management / six sigma. Result of this study help us to better understand the evolution of project management as a in the field of practice and an academic discipline and also us our suggestions for future project management research opportunities.

 

Keywords - Project Management, Planning, Clauses, life cycle..

[1]. Rajeev M. Gupta, " ProjectManagement" Second edition. [2]. K. Nagarajan, "Elements of Project management" New Age International Limited, Publishers. [3]. International Journal of Digital Content Technology and its Applications Volume 4, Number 1, February 2010" A Review on Project Management and Issues Surrounding Dynamic Development Environment of ICT project: Formation of Research Area" Marini Othman*1, Abdullah Mohd Zain*2, Abdul Razak Hamda*3. Journal Papers: [4]. ICCIEE 2017 IOP Publishing, IOP Conf. Series: Earth and Environmental Science 80 (2017) 012044 do i :10.1088/1755- 1315/80/1/012044"Ranking the Project Management Success Factors for Construction Project in South India" K Aneesha and M K Haridharan*. [5]. Issues in Informing Science and Information Technology Volume 10, 2013. Project Management Principles Applied inAcademic Research Projects.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Rivulet water treatment of western Mumbai by Coconut Charcoal
Country
::
India
Authors
::
Dr.Bhushan Sonawane || Dr.P.N.Nemade
Page
::
48-51

Water scarcity is a critical problem throughout the world, so it is need to purify the waste water .The sources of waste water are kitchen waste, Industrial waste, washing of different types. By using certain important membranes that waste water can be purified and reused. Present work is based on easy method of coconut charcoal, which is made by simple heating and powdered form is used to filter water from different sources from western Mumbai. The important advantage is it purifies water, traps bacteria, pigments from waste water sample and that water used for gardening, for concrete work, for washing clothes or for street, railway Platform clearing..

 

Keywords - COD,BOD, Stations, Turbidity.

[[1]. Apak,R,Tutean E,Hugul,M,Hizal,J 1998,Heavy metal cation retention by conventional sorbents. Water Res 32 430-440 Red mud sand fly ashes. [2]. Azab, M.S., Peterson, P.J., 1989. The removal of cadmiumfrom water by use of biological sorbents. Water Sci. Technol.21, 1705– 1706. [3]. Bareket, G., Aroguz, A-Z Ozel, M.Z., 1997. Removal of Pb(II), Cd(II) and Zn(II) from aqueous solution by adsorptionon bentonite. J. Colloid Interface Sci. 187, 338–343.Buchaver, M., 1973. Contamination of soil and vegetation near zinc smelter by zinc, cadmium, copper and lead. Environ. Sci. Technol. 7, 131–135. [4]. Chaney, R.L., Hundemann, R.T., 1979. Use of peat moss columns to remove cadmium from wastewaters. J. Water Pollut. Control Fed. 21, 105–114. [5]. Xiaoyan Y. Ma, Xiao hang C. Wang, Yongjun J. Liu "Study of the variation of eco toxicity at different stages of domestic wastewater treatment using Vibrioqinghaiensis p.Q67",Journal of Hazardous Materials, Volume 190, Issues 1–3, Pages 100-105, June 2011.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Hybrid Approach For Securing Data
Country
::
India
Authors
::
Amit Singh || Nayan Solanki || Prof. Foram Shah
Page
::
52-58

During data transmission over the internet, it is important to transfer data in high security and high confidentiality, information security is the most important issue of data communication in networks and internet. To secure transferred information from intruders, it is important to convert information into the cryptic format. Different methods are used to ensure data security and confidentiality during transmissions like Steganography and cryptography. Proposed work improves information security through developing efficient compression of texts and encryption of texts by cryptography with steganography. The Proposed algorithm ensures the encryption and decryption using AES, compression and decompression by using LZW and RGB pixel shuffling with steganography. LSB method is used to insert data bits in LSB of RGB pixels of the cover image. In this Multi-threading use to retrieve information from image rapidly. Hence proposed system can reduce the data transmission time and cost. These algorithms are performed by using JAVA program..

 

Keywords -AES, Cryptography, LSB, LZW, RGB, Steganography.

[1] Aishwarya Baby, Hema Krishnan, "Combined Strength of Steganography and Cryptography- A literature survey", International Journal of Advanced Research in Computer Science, Volume 8, No. 3, March-April 2017, Kerala, India. [2] Richard Apau,Clement Adomako,"Design of Image Steganography based on RSA Algorithm and LSB Insertion for Android Smartphones", International Journal of Advanced Research in Computer Science,Vol.164,No.1,April 2017,Kumasi-Ghana. [3] Assist.lec. May H.Abood, "An efficient Cryptography using Hash-LSB Steganography with RC4 and pixel shuffling encryption algorithms", in Proc. Annual Conference on new trends in information and communications technology applications(NTICT 2017), 7-9 March 2017, Baghdad, Iraq. [4] M. Mary Shanthi Rani, K. Rosemary Euphrasia, "Data Security through QR code encryption and steganography". Advanced Computing: An International Journal (ACIJ), Vol.7, No.1/2, March 2016, Tamil Nadu, India. [5] Mr. A. Balasubramani, Dr. Chdv. Subba Rao, "Sliced images and encryption techniques in steganography using multi-threading for fast retrieval", International Journal of Applied Engineering Research ISSN 0973-4562 Volume 11, Number 9 (2016) pp 6504- 6509, Andhra Pradesh, India.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Bottle Sorting in Production Line
Country
::
India
Authors
::
Niranjan More || Kalpesh Koli || Saifali Khan || Jatin Mangela
Page
::
59-64

The project is based on the field of Image Processing and mainly used in manufacturing plants and industries.It finds it extensive use in automation process due to its reliability, lack of manpower required.The main objective of this project is to highlight how Image Processing can be effeciently used for Automation and Inspection without the need of human supervision.The main concept or element of this project is the ―VISUAL INSPECTION SYSTEM‖. The VIS is an important element which carries out the primary function of capturng the images of the product and inspecting it to determine if any fault is present.In presence of any fault the VIS will in form the processing section to intercept and remove the bottle from the production line. The image processing is done by the use of morphological operators and use of algorithms. The image is processed through MATLAB software

 

Keywords - Automation , Conveyor Belt , Image Processing , Morphological Operators , Visual Inspection system.

[1]. Slim Abdelhedi, Khaled Taouil, Bassem Hadjkacem, "Design Of Automatic Vision-Based Inspection System For Monitoring In An Olive Oil Bottling Line", International Journal Of Computer Applications (0975 – 8887), Volume 51– No.21, August 2012. [10] [2]. Leila Yazdi, Ant [3]. IEEE Transactions On Systems, Man, And Cybernetics—Part C: Applications And Reviews, Vol. 35, No. 4, November 2010.

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
5 Stage, 50 V, 500 Hz, 50 μs MOSFET Based Design Of Unipolar Pulse Power Marx Generator
Country
::
India
Authors
::
Ashish Sojitra || Hardik Rana || Sandesh Govari || Shubham More || Shreyashi De
Page
::
66-70

The Marx Generator is a multistage pulse generator which is a prime source for generation of high voltage pulse by connecting number of stage capacitors in parallel and series for charging and discharging during ON and OFF period respectively. Marx Generator has wide applications in various field with different characteristics of high voltage output pulse for different requirements. This paper deals with design and simulation in Multisim software of five stage Unipolar solid state Marx Generator having 50 V of output pulse with 10% voltage droop with repetition frequency of 500 Hz and 50 μs maximum pulse width using MOSFET switch. The diodes are used to charge the capacitor at each stage. A 555 timer generates control pulses for the capacitors to charge in parallel during ON time. During OFF time of the pulses the capacitors are brought in series with the help of MOSFET switches. Hence the simulation results confirms the validity of simple multistage Marx Generator topology to generate pulses....

 

Keywords - Marx Generators, Unipolar, High Voltage Pulse, Inductor, MOSFET , IC 555timer.

[1] Gaytri Saraf, Amrapal Bansode, Akshada Khule, Shruti Rangari, Prof. S.U. Shinde, Bachelor of Engineering, Electrical Engineering, ZCOER, Pune, India , High voltage dc generation using marx generator. [2] Shreyashi De, Bindu. S, Department of Electrical Engineering, Fr.C.Rodrigues Institute of Technology, Design and Simulation of Unipolar Solid-State Marx Generator, IJAEEE, ISSN (Print): 2278-8948, Volume-4, Issue 2, 2015. [3] Harshada C. Bhosale, Bindu S., Sincy G., P.C. Saroj, Archana S, Design and Simulation of 50 kV, 50 A Solid State Marx Generator, IEEE International Conference on Magnetics, Machines and Drives ( AICERA-2014 iCMMD). [4] Yifan Wu, Kefu Liu, JianQiu , XiaoXu Liu and Houxiu Xiao Huazhong, University of Science and Technology College of Electrical and Electronic Engineering Wuhan, 430074, China, Repetitive and High Voltage Marx Generator Using Solid-state Devices, IEEE Trans. on Dielectrics and Electrical Insulation, Vol.14, No.4, August 2007. [5] Kefu Liu, Yan Luo and Jian Qiu, A Repetitive High Voltage Pulse Adder Based on Solid State Switches, IEEE Trans. On Dielectrics and Electrical Insulation Vol. 16, No. 4, August 2009./

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
Impedance Calculation Algorithm For Microprocessor Based Digital Protective Relay
Country
::
India
Authors
::
Neel Pawar || Saniya Vichare || Shikha Singh || Vedant Bhatkar || Rajeev Valunjkar
Page
::
71-76

Earlier, line relaying algorithms represented most of the activity in computer relaying. This paper presents an algorithm to calculate the impedance of a transmission line fault. The impedance is calculated using differential equation algorithm (DEA) from sampled data. DEA, which is a parameter estimation method, is model-based and is independent of any form of input signal (voltage/current). The intended algorithm requires 3 samples at successive intervals of time. In this, examination of differential equation algorithm is done and attempts are made to draw a conclusion about the characteristics of this algorithm. DEA is an alternative method to Fourier Transform and similar algorithms and it shows that it can be used effectively in digital relays to find the distance of a fault from the relaying point in a transmission line..

 

Keywords - Differential equation algorithm, Digital protection, Impedance relay..

[1] Jeyasurya, B. and W.J. Smolinski, "Identification of a best algorithm for digital distance protection of transmission lines," Power Apparatus and Systems, IEEE Transactions on 10, 1983: 3358–3369. [2] Ranjbar, A.M. and B.J. Cory, "An improved method for the digital protection of high voltage transmission lines," Power Apparatus and Systems, IEEE Transaction son 94.2, 1975: 544–550. [3] Smolinski, W.J., "An algorithm for digital impedance calculation using a single PI section transmission line model," Power Apparatus and Systems, IEEE Transaction son 5, 1979: 1546–1551. [4] McInnes, A.D. and Morrison, I.F. Real time calculations of resistance and reactance for transmission line protection by digital computer (1970) Elec. Eng. Trans. IE, Australia vol. EE7, no. 1, pp. 16–23. [5] Hui-Yung Chu, Shi-Lin Chen and Ching-Lien Huang, "Fault Impedance Calculation Algorithms for Transmission Line Distance Protection

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
A Comparative Study of Data Migration Techniques
Country
::
India
Authors
::
Ajeet Ghodeswar || Trupti Shah || Amruta Mhatre || Santosh Dodamani
Page
::
77-82

This Paper Gives The Overview Of The Data Migration And Its Basic Concepts. The Need For The Data Migration In Terms Of Business Needs, Different Environments And The Criticality Of The Legacy Databases Are Discussed. The Data Migration Process Generally Carried Out In Three Steps: Plan, Migrate, And Validation. An Automated ETL (Extract-Transform-Load) Process/Tools Is Use To Move The Data From Source To Target Database. ETL Is The Process Of Data Cleaning, Transforming And Finally Loading It Into A New Target Database. Existing Methodologies Like Line Of Code, Sampling Techniques And MINUS Queries Are Briefly Discussed In The Paper. During The Process Of The Data Migration (DM), Too Much Data Is Extracted, Transformed, Structured, And Loaded (ETL) From Legacy/Source Database Into A Newer Structure That Is The Target Database. This Process Leads To Various Types Of Changes In Data, Known As Data Inconsistencies /Quality Issues

 

Keywords - Data Migration, ETL, Data Mapping, Data Sampling.

[1]. "Sentry Gun ","[2] P. Howard And C. Potter, "Data Migration In The Global 2000 - Research, Forecasts And Survey Results," London, United Kingdom, P. 29, 2007. [3] Sagar Khandelwal, Kannan Subramanian And Rohit Garg, "Next Generation Cross Technology Test Data Solution For M&A", 2011 27th IEEE International Conference On Software Maintenance (ICSM). [4] Endava, "Data Migration - The Endava Approach," London, United Kingdom, P. 11, 2007. [5] G. Schroder,¨ "Automatisierte Migration Von Legacy Daten," Diplomar-Beit, Fakultat¨ Fur¨ Informatik, Technischeuniversitat¨ Munchen,¨ Garchingbeimunchen,¨ Germany, 2006. R. E. Sorace, V. S. Reinhardt, And S. A. Vaughn, "High-Speed Digital-To-RF Converter," U.S. Patent 5 668 842, Sept. 16, 1997. [6] C. Burry And D. Mancusi, "How To Plan For Data Migration," 2004

 

  • Citation
  • Abstract
  • Refrences
  • View
Title
::
RF Based Secure Coded Communication System
Country
::
India
Authors
::
Aditya Shah || Shahbaz Shaikh || Divyesh Parmar || Sarang Kulkarni
Page
::
83-86

The project is designed to send secured messages by using an encryption from a computer keyboard connected to the transmitting unit via RF technology. The message is retrieved at the receiver end only upon entering the secret code used by the transmitter. Thus, complete secrecy is maintained in this communication process. This system has a secret code attached to the transmission. The message typed in by the user is transmitted to the receiving end through RF transmitter. At the receiving end the RF receiver is integrated with a code and display system. User at receiving end can only view the message if he enters the right code.

 

Keywords - Encryption, Decryption, Keil compiler, Microcontroller, Secrecy.

[1] D. P. Agarwal and Q-A. Zeng, Introduction to Wireless and Mobile Systems (2nd Edition, published by Thomson, April 2005) ISBN 978-0-534-49303-5. [2] J.K. and K. Ross, Computer Networking (2nd Ed, Addison Wesley, 2003) ISBN 978-0- 321-17644-8. [3] Soltani, R.; Bash, B.; Goeckel, D.; Guha, S.; Towsley, D. (September 2014). "Covert single-hop communication in a wireless network with distributed artificial noise generation". 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton): 1078–1085. doi:10.1109/ALLERTON.2014.7028575. [4] The schematics are illustrated in U.S. Patent 613,809 and describes "rotating coherers". [5] Bash, Boulat A.; Goeckel, Dennis; Towsley, Don (September 2013). "Limits of Reliable.