No. |
Title and Author |
Area |
Country |
Page |
151 |
Modeling and Simulation of SRF Control Based Shunt Active Power Filter and Application to BLDC Drive
-P.Hemasundar Rao ; B. B. Dash
With the widespread use of harmonic generating devices, the control of harmonic currents to maintain a high level of power quality is becoming increasingly important. An effective way for harmonic suppression is the harmonic compensation by using active power filter. This paper presents a comprehensive survey of active power filter (APF) control strategies put forward recently. It is aimed at providing a broad perspective on the status of APF control methods to researchers and application engineers dealing with harmonic suppression issues. Many control techniques have been designed, developed, and realized for active filters in recent years. This paper presents different types of Synchronous reference frame methods for real time generation of compensating current for harmonic mitigation and reactive power compensation. All the techniques are analyzed mathematically and simulation results are obtained which are being compared in terms of its compensation performance with different parameters under steady state condition. The three techniques analyzed are the Synchronous Reference Frame Theory (SRF), SRF theory without synchronizing circuit like phase lock loop (PLL) also called instantaneous current component theory and finally modified SRF theory. Simulation results are obtained under sinusoidal balanced voltage source balanced load condition. The comparison and effectiveness of all the methods is based on the theoretical analysis and simulation results obtained with MATLAB employing a three phase three wire shunt active filter test system. Finally shunt active power filter is applied to BLDC drive application. THD plots with and without APF is presented. Read More...
|
Electrical Engineering |
India |
692-697 |
152 |
Landslides and its Remedial Measures: An Overview
-Rajneesh Yadav ; Dr.SriRam; Amit Singh; Sandeep Sushil Srivastav
Landslides constitute one of the major natural disasters in the ecosystem. The fragile terrain often faces significant problems of geo-environmental imbalance due to landslides. The term' landslide' includes all varieties of mass movements of hill slopes and can be defined as the downward and outward movement of slope forming materials composed of rocks, soils, artificial fills or combination of all these materials along surfaces of separation by falling, sliding and flowing, either slowly or quickly from one place to another. Although the landslides are primarily associated with mountainous terrains, these can also occur in areas where an activity such as surface excavations for highways, buildings and open pit mines takes place. Read More...
|
civil enginerring |
India |
698-702 |
153 |
Active Inspection Services with Log Maintenance Scheme for Cloud Storage
-Karthikkeyan.S
In present days, the up-and-coming cloud-computing model is rapidly in advance force as an unconventional to traditional information technology. Cloud computing make available a scalability environment for emergent amounts of data and processes that work on a variety of services and applications by means of on-demand self-services. One fundamental aspect of this model shifting is that data are being centralized and outsourced into clouds. This category of outsourced storage space services in clouds have turn out to be a new profit growth point by given that a comparably low-cost, scalable, location-independent policy for managing clients' data. The cloud storage service (CSS) mitigates the load of maintenance and storage management. However, if such a significant service is weak to attacks or failures, it would take permanent losses to users since their data or records are stored into an unsure storage space pool outside the enterprises. These security risks move about in the direction of from the following reasons: the cloud infrastructures are much more authoritative and reliable than personal computing devices. If they are still susceptible to security threats both from inside and outside the cloud for the benefits of their control, there exist various motivations for cloud service providers (CSP) to behave falsely toward the cloud users in addition, the dispute infrequently suffers from the lack of trust on cloud service provider. As a result, their behaviors may not be known by the cloud users. Therefore, it is necessary for cloud service providers to offer a scalable audit service to check the integrity and accessibility of the stored data. While Cloud Computing makes these advantages more appealing than ever, it also brings new challenging security threats towards users' outsourced data. Since cloud service provider is separate administrative units, data outsourcing is actually resigning user's control over the destiny of their data. The correctness of the data in the cloud is being put at risk due to the subsequent reasons. First of all, although the infrastructures beneath the cloud are much more powerful and reliable than private computing devices, they are silent facing the broad range of both internal and external threats for data integrity. Read More...
|
Networking |
India |
703-708 |
154 |
Nano Technology Treatment of Cancer- A Future Vision in The usage of Chemotheraphy Drug
-K.Ganesh Kumar ; R.Aravind ; N.Hari Prasad; T.Arun Kumar; Mr.A.Deepak
This paperdescribes the theoretical application of nanodevices in the treatment of cancer. The advanced technology for the treatment of cancer is the chemotherapic treatment .In chemotherapic method,drugs of specific composition is given to the patients depending on the biopsy of the tumor from the patient. The main disadvantage of using chemotherapy is that the drug used is not so specific. Hence it causes damage to the surrounding healthy cells. To make the treatment more specific, we use the nanodevices that use nanosensors to sense the cancer cells with biomotors to decrease hypoxia enviroinment and some specific compounds that control the telomerase production, which could serve as a means of controlling cell division. Read More...
|
Electrical Engineering |
India |
709-712 |
155 |
Analyzing the Health of Engineering Student's using Feature Selection Algorithms - A Comparative Study
-G. Ramya ; S. kavitha
In this paper, data mining study about the Health of Undergraduate Engineering Students. This dissertation use the feature selection algorithm based on clustering methods to analyze the importance of health and well-being in students is exemplified by the large number of studies on this topic. Past research has focused on using surveys to identify factors that affect the health, but applying machine learning tools to such data has not received much attention. Moreover this dissertation presents the comparative study between the Correlation based feature selection algorithm and the Minimum Redundancy and Maximum Relevance feature selection (mRmR), these two algorithms can be applied to the engineering students based data, for analysis the health. Read More...
|
Computer Science |
India |
713-716 |
156 |
Applications of Data Mining Techniques in Prediction of Heart Attacks Using Naive Bayes and Rule Based Classification Algorithm
-S. Kavitha ; G. Ramya
Knowledge discovery and data mining have found numerous applications in business and scientific domain. Valuable knowledge can be discovered from application of data mining techniques in healthcare system. In this study, we briefly examine the potential use of classification based data mining techniques such as Rule based, Decision tree, Naive Bayes and Artificial Neural Network to massive volume of healthcare data. This is an extension of naive Bayes to imprecise probabilities that aims at delivering robust classifications also when dealing with small or incomplete data sets. Discovery of hidden patterns and relationships often goes unexploited. Using medical profiles such as age, sex, blood pressure and blood sugar it can predict the likelihood of patients getting a heart disease. Read More...
|
Computer Science |
India |
717-719 |
157 |
IDS using Classification Techniques in Weka Environment with Feature Reduction
-Jyoti Deshwal ; Savita Gupta
In this paper, Intrusion Detection System (IDS) based on combining data mining is presented and implemented in WEKA. this exposure, in our works, we use a wired data base Knowledge Discovery Data Mining (KDD) CUP 10Percent and a Data Mining Tools Waikato Environment for Knowledge Analysis (WEKA) we check the results by using a several evaluations parameters. The results illustrate that a very high detection rate for certain attacks types. we proposed to calculate the mean value via sampling different ratios of normal data for each measurement, which lead us to reach a better accuracy rate for observation data in real world This presents useful information in intrusion detection. Read More...
|
Computer Engineering |
India |
720-724 |
158 |
Finite Element Analysis of Excavator Arm
-Patel Dhruv Nalinbhai
Excavators are heavy duty earthmoving machines and normally used for excavation task, mechanical analysis was carried out in three typical work condition of the working device by using the mechanical theory and method. The static strength finite element analysis of excavator arm was carried through by using ANSYS, from which, the stress and strain deformation contour diagrams of three typical work condition were obtained so that the hardness can be checked The results of finite element analysis showed that the static intensity of the boom is enough. The maximum stress mainly occurred in the hinge point connected the boom cylinder with the boom and the hinge point connected the boom with the base which played an important part in controlling the strength of the excavator working device The study results are of certain guiding significance for working device's optimization design. Read More...
|
MECHANICAL ENGINEERING |
India |
725-727 |
159 |
Virtual Reality - Concept and Modes of Implementation
-Akash Agte ; Sweeney Pandit; Seshagopalan N.
Virtual Reality-A computer simulated environment which enables a person to experience a physical places and objects in imagined world. Virtual Reality enables to recreate virtual sensory experience like virtual taste, smell, touch or sound etc. This paper shall address virtual reality along with its various types and give brief idea on the implementation of it. Read More...
|
COMPUTER ENGINEERING |
India |
728-731 |
160 |
Comparative Study of Analysis of Black Hole Attack in MANET
-Jemimma Ilakia Nancy.C ; Dr. Hariganesh S.
Mobile ad-hoc network (MANET) is a collection of wireless mobile nodes dynamically forming a temporary network without any standard infrastructure. The network topology changes in MANET. manet cannot prevent itself from the attack. one of the attack is black hole attack. It creates the malicious node to get the packet itself. This survey paper says about attack on ad-hoc network using aodv protocol. Read More...
|
computer science |
India |
732-735 |
161 |
LDR based Power Switching System
-Govinda K. ; Pranjal Biswas
this paper proposes a power switching system based on op-amp and flip flop. The main objective is to design a shockproof power switching system for controlling power supply to electrical appliances via Light Dependent Resistor (LDR). This system consists of an op-amp, JK flip-flop, relay, Bi-polar Junction Transistor (BJT), Light Dependent Resistor (LDR). The system is designed to detect the change in the intensity of the light in the surroundings to perform the switching action. Several tests have been conducted to test and validate the proposed prototype in different environment. As conclusion, a shockproof switching system can be achieved reducing the chances of hazardous electrical shocks because of no physical contact with the switch. Read More...
|
Electronics and Communication |
India |
736-739 |