Archive Browsing VOLUME 4 ISSUE 02 SEPTEMBER 2015

A Study to Design and Implementation of an 11 Level Inverter with FACTS Capability for Distributed Renewable Energy systems
Abstract: This paper presents, a single phase wind energy inverter (WEI) system having multilevel features with flexible AC transmission capability. The goal of this paper is to design a type of inverter with distribution static synchronous compensator (D-STATCOM) option to provide utilities with more control the power factor (PF) of distribution lines. The proposed inverter is placed between the wind turbine and grid, as regular WEI in order to regulate active and reactive power transferred to the grid, regardless of wind speed. With the help of this proposed inverter for small to medium size wind applications will eliminate the use of condenser banks as well as FACT devices to control the power factor (PF) of grid at target value, by regulating active and reactive power required by the distribution lines. The purpose of this paper is to present an idea to extend the penetration of renewable energy systems into distribution systems. In this D-STATCOM inverter modular multilevel converter topology is used, and in order to control active and reactive power by regulating the power angle and modulation index as per the requirement of distribution lines. our motive is to reduce the overall cost of system and total harmonic distortion (THD) and significantly trying to increase the efficiency of system by reducing the number of switches during designing of system .The simulation for this multilevel inverter proposed to be done by using MATLAB /SIMULINK .

Authors: Mr. Ritesh Diwan, Divya Patel

File Name: 40200-15-001.pdf
 Download Abstract | Download Full Paper

Wearable Corduroy Textile Antenna
Abstract: n this paper the design ,fabrication and measurement of a wearable textile (Corduroy) patch antenna is presented. The substrate of the designed antenna was made by corduroy textile material while the radiating element and ground plane was made by thin film copper foil. The copper foil was pasted by using synthetic resin adhesive on the Textile (corduroy) material.

Authors: Bivas Roy

File Name: 40200-15-006.pdf
 Download Abstract | Download Full Paper

Abstract: This paper presents a survey on the different haze removal techniques. Haze is a trouble to many computer vision/graphics applications as it reduces the visibility of the scene in the images. Haze is formed due to the two fundamental phenomena such as attenuation and the air light. Attenuation decreases the contrast and air light increases the whiteness in the scene. Haze removal techniques will retain the color and brightness of the scene .These techniques are widely used in many applications such as underwater photography, satellite images etc. Haze removal is very difficult task because fog depends on the scenes depth information which are unknown. Fog effect is the function of distance between camera and object. There for the removal of fog requires the estimation of air light lamp the overall objective of this paper is to describe the various methods for efficiently removing the haze from remote sensing images .It also gives description of some filters used for dehazing.

Authors: Sajana M Iqbal, Muhammad Nizar B K

File Name: 40200-15-008.pdf
 Download Abstract | Download Full Paper

A Review on Phishing URL Detection using Machine Learning Systems

Authors: Gangeshwari Sharma

File Name: 31000-15-006.pdf
 Download Abstract | Download Full Paper

Leaker Detection In Open Network [LDION]
Abstract: nowadays leakage of data is common to Industries, academic and Government Offices. Data must be shared for social purpose, research purposes and for business purposes. Data is shared among different enterprises or agents. Once the private data is shared it is not guaranteed that the data will not leak. If leakage happens it will be loss to firms. So we can detect the leaker for avoiding the loss thus occurred and thus avoid business with that agent. Leakage of data happening nowadays also but some firms will not tell their loss because of fear of loss of respect and other matters. Some companies distribute their data to trusted third parties. When Data distributers (Companies) found their some of the data in the web or somebody’s laptop that is in unauthorized place. The distributor understands that the leaked data came from one or more agents. Our goal is to detect which agent leaks that data and provide the security to that data. When the distributor’s sensitive data have been leaked by agents, and to identify the agent that leaked the data. We propose data allocation strategies (across the agents) that improve the probability of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks).The Main Aim of the system can be given as follows:- Identify data leakages from distributed data using some data allocation strategies and find out the fake agent who leak that data. In this work, we present a generic data lineage framework for data flow across multiple entities that take two characteristic, principal roles (i.e., owner and consumer). We define the exact security guarantees required by such a data lineage mechanism toward identification of a guilty entity, and identify the simplifying non-repudiation and honesty assumptions. With this model we assign a clearly defined role to each involved party and define the inter-relationships between these roles. There are three different roles in LDION: data owner, data consumer and auditor. The data owner is responsible for the management of documents and the consumer receives documents and can carry out some task using them. The auditor is not involved in the transfer of documents, he is only invoked when a leakage occurs and then performs all steps that are necessary to identify the leaker thus provide confidentiality. Whenever a document is transferred to a consumer, the sender embeds information that uniquely identifies the recipient. We call this is as fingerprinting which is cryptographically stored in the document without altering any property of the document. If the consumer or agent leaks this document, it is possible to identify him with the help of the embedded information. A key position in LDION is taken by the auditor. He is invoked by an owner and provided with the leaked data. If the leaked data was transferred using our model, there is identifying information embedded for each consumer who received it. Using this information the auditor can create an ordered chain of consumers who received the document. We call this chain the lineage of the leaked document. The last consumer in the lineage is the leaker. In the process of creating the lineage each consumer can reveal new embedded information to the auditor to point to the next consumer – and to prove his own innocence.

Authors: Remya .G .Nair, Mrs. Jyothis Joseph

File Name: 40200-15-017.pdf
 Download Abstract | Download Full Paper

Computer Vision System for Automatic PCB Inspection & Quality Analysis with Auto Rejection
Abstract: In this paper, we present a Computer Vision system for printed circuit board (PCB) automated inspection. In the last years, PCB industry has been invested in manufacturing automation improvement. This is known, especially in measurement and inspection field. We can note that the tolerances on PCB assembly become more accurate. With computer hardware and cameras advances, new Computer Vision algorithms should be developed, and applied in industry with low cost. Besides, new visual inspection systems using computers should

Authors: Surendra Khushwaha, Dinesh Goyal, Rahul kumar

File Name: 40200-15-002.pdf
 Download Abstract | Download Full Paper

Radar Image Segmentation using Particle Swarm and Gravitational Search
Abstract: Image segmentation can recognizes the areas of interest in a scene. Due to the presence of speckle noise, segmentation of Synthetic Aperture Radar (SAR) images is still a challenging problem. In this research paper we presented a radar image segmentation using modified particle swarm and gravitational search algorithm (PSO-GSA). In this method, threshold assessment is observed as an exploration process that examines for a suitable value in a continuous grayscale interval. Hence, proposed modified PSO-GSA algorithm is familiar to explore the optimal threshold. In order to provide an efficient fitness function with our proposed modified PSO-GSA algorithm, we assimilate the concept of grey number in Grey theory, maximum provisional entropy to get an enhanced two-dimensional grey entropy. In core, the segmentation speed of our proposed method owes to PSO-GSA algorithm, which has an owing convergence performance. Moreover, the segmentation quality of our proposed method is benefitted from the enhanced two-dimensional grey entropy, which results in mitigation of noise. Experimental results indicate that our method is superior to conventional PSO-GSA, GA based, AFS based and ABC based methods in terms of segmentation time and thresholding.

Authors: Rubbaldeep Kaur, Er. Pooja

File Name: 40200-15-010.pdf
 Download Abstract | Download Full Paper

Mobile technology in the Library World: A Study
Abstract: Research and development in every sphere of human activity has led to bulk information. With the advancement in ICT technology, the scenario of information management and its access across the world has changed. Mobile technology has speeded up the information transfer and access in no time. The present paper is an attempt to study the mobile application in the library world. Wide range of mobile library applications is available now. These applications have made easy for libraries to deliver their services to their clientele sitting in remote or far off distance, within no time. Users just by clicking on library Apps can search their relevant information. These includes SMS services , MMS services , OPAC search, Online reference services, online search for databases, Library Notification and instruction services and many other library services deemed necessary by libraries to achieve its goal.

Authors: Vinod Gupta

File Name: 40200-15-014.pdf
 Download Abstract | Download Full Paper

Automatic Clustering of VMs by Their Availability
Abstract: In rapid growth of cloud usage it is necessary to study the failures virtual machines that turn the VM un-available or violate the SLA (Service Level Agreement). The VM Presence discover in the cloud infrastructure is help full to the service provider for designing SLA guided services. In this paper we propose a simple but effective model to discover the presence of a large scale cloud infrastructure, here the failures are analyzed with the migration of machines across clusters of four-states :Hot (running), Warm (turned-on, but not ready), Cold (turned-off) and Busy (over-loaded). The real time classification of VMs by their current state, can implicitly replace the corrupted and busy VMs in request-resource mapping. Since it is necessary to use the presence information of the VMs in request mapping by keeping the computational overhead stable for large systems, to reduce the complexity and delay i-Markov chain is used. The four clusters are designed with the sub-groups. The results show that our approach

Authors: K. Reshma, Mr.Suray Bahadur

File Name: 40200-15-016.pdf
 Download Abstract | Download Full Paper

Analysis of Vowels for Accent in Isolated Word in Speech Recognition for Oriya Language
Abstract: Since years, various intelligible speech parameters have been on the process of evaluation and some are implemented to solve these real time challenges such as speech recognition and speaker identification system. Accent in which the person speaks depends upon the speaker and the way in which it is spoken. Apart from geographical parameters, the acoustic parameters for speech recognition and the intonation parameters of how one speaks, play important roles in accent analysis. This paper discusses some of the parameters in word levels that may be used for accent analysis for Oriya, an official language of the Republic of India.

Authors: Sanjaya Kumar Dash, Prof. (Dr.) Sanghamitra Mohanty

File Name: 40200-15-020.pdf
 Download Abstract | Download Full Paper

Abstract: Induction appliances require power converters that with accurate power control and less switching losses. The modulation techniques play an important role in the designing of the power converters. The performance of different induction heating topologies is carried out with various switching strategies. The essential performances on the output power regulation and the output current are demonstrated through simulation studies. The topologies are designed for the same specifications and are compared in aspect of the different switching schemes.

Authors: Janet Teresa K. Cyriac, Sreekala P.

File Name: 40200-15-009.pdf
 Download Abstract | Download Full Paper

RF and Electromagnetic Field Effects on Body cells
Abstract: the general opinion that there is gradual hazardas effect at the cellular level related to human health. The study of the low frequency radio frequency wave reveled that different dimension of EM wave have not shown any DNA damage directly burt there is concern about evidance of cellular effect of EM.The static of very low frequncy EM field lead to biological effect associated with redistribution of ions. Extremely low frequency electromagnetic radiation has received considerable attention recently as a possible threat to the health of persons living near high tension electric power lines, distribution substations, and even in close proximity to common household electric appliances. Until now no satisfactory mechanism has been proposed to explain the biological effects of these fields. This study is to investigate effect of MW radiation on cell proliferation. Health risks associated with such fields include a wide variety of ills ranging from disruption of normal circadian rhythms to childhood cancers. Risk assessment has been particularly difficult to deter-mine in light of an ostensible lack of a dose-response relationship.

Authors: V. S. Nimbalkar

File Name: 40200-15-022.pdf
 Download Abstract | Download Full Paper

Estimation of speed in linear induction motor drive by MRAS using neural network and sliding mode control
Abstract: The paper proposes a speed observer for a linear induction motor drive, which uses artificial neural network model reference adaptive system (NN-MRAS) that uses sliding mode control. The basic mathematical equations of the motor governed by the voltages and currents from the equivalent circuit of the motor including the end effects are determined. The artificial neural network (ANN) model based adaptive system in MRAS for the secondary of the motor is developed. The sliding mode control is implemented with the NN-MRAS model. The dynamical response and speed observation is compared for the conventional MRAS using PI control and the NN-NRAS with sliding mode control model for the induction motor drive by simulation using Matlab/Simulink.

Authors: M. Anka Rao, M. Vijaya kumar, O. Yugeswar Reddy

File Name: 40200-15-023.pdf
 Download Abstract | Download Full Paper

Analysis of Total Harmonic Distortion and its Elimination by Multilevel Inverter
Abstract: As the conventional sources of energy are exhausting rapidly, the demand of renewable sources are increasing day by day. The major problems associated with these sources are voltage imbalance, harmonic content and switching losses due to the power electronics converter connected to these sources. The waveform of practical inverters are non-sinusoidal and contains certain harmonics, but for many applications such as high power application, various industries which involves use of machines and fans,sinusoidal supply with low distortion are required. This paper is aimed at investigating and analyzing effect of total harmonic distortion and its elimination using multilevel inverter. Simulation study of the output voltage waveform of 2-level, 3-level and 5-level three-phase diode clamped converters using sinusoidal pulse width modulation technique has been done and total harmonic distortion (THD) of all the levels are compared. The results obtained by varying the switching frequency of inverter is also compared.The record shows that as the number of level increases, total harmonic distortion decreases and quality of output voltage improves.

Authors: Nikhil Kumar Sharma, Naveen Kumar Sahu

File Name: 40200-15-025.pdf
 Download Abstract | Download Full Paper

A Novel Image Matching Technique using SIFT and SURF
Abstract: Keypoints-based image matching algorithms have proven very successful in recent years. However, their execution time makes them unsuitable for online applications. Indeed, identifying similar keypoints requires comparing a large number of high dimensional descriptor vectors. Previous work has shown that matching could be still accurately performed when only considering a few highly significant keypoints. In this paper an improved method for assessing the performance of popular image matching algorithms is presented. Specifically, the method assesses the type of images under which each of the algorithms reviewed herein perform to its maximum or highest efficiency. This paper addresses two texture based algorithms (SIFT and SURF).

Authors: Preeti Mandle, Vibha Shaligram

File Name: 40200-15-110.pdf
 Download Abstract | Download Full Paper

Design & Implementation of AHB Interface for SOC Application

Authors: Sangeeta Mangal, Nakul Mangal, Govind Singh

File Name: 40200-15-103.pdf
 Download Abstract | Download Full Paper

A Review on High-Performance Microcontroller Bus Architecture

Authors: Sandhya Sunpal, Prof. Mohammed Arif

File Name: 40200-15-102.pdf
 Download Abstract | Download Full Paper

© 2016 IJDACR Journal. All rights reserved.