Most of the current systems in the world work under centralized architecture, blockchain provides a decentralized solution for software development. Though centralization has many benefits such as regulation, control, privacy, quick decision making and implementation [1] it no longer is a viable solution for the ever-growing technology industry. Though systems that are decentralized exist such as torrent they have not been able to replace the centralized system due to the lack of authentication and security. Blockchain is a solution that mitigates those risks as it provides security and authentication for all the participants of the network.[2] The current property registration for residential and commercial developments is a centralized system where majority of the work is done on a pen and paper-based system. The current system involves a lot of vulnerabilities and people use it to cheat others and the government. Blockchain is used to provide a potential solution for many challenges of land registration. The system involves noting down transactions into a hard copy ledger which is the only record that a transaction has occurred. We aim to evaluate the current registration system and assess the suitability of blockchain to replace the current centralized system. Most developing countries don't have a proper working system of tracking the property rights, the one they have is too fragile. For instance, a large earthquake can destroy the municipal buildings that store documents regarding the ownership of the properties.
{"title":"The Application of Blockchain as a Distributed Ledger and Smart Contract for Property Registration","authors":"Dhruv Goragandhi, Jash Shah, Vallabhi Doshi, Archana Nanade","doi":"10.1109/CENTCON52345.2021.9687997","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9687997","url":null,"abstract":"Most of the current systems in the world work under centralized architecture, blockchain provides a decentralized solution for software development. Though centralization has many benefits such as regulation, control, privacy, quick decision making and implementation [1] it no longer is a viable solution for the ever-growing technology industry. Though systems that are decentralized exist such as torrent they have not been able to replace the centralized system due to the lack of authentication and security. Blockchain is a solution that mitigates those risks as it provides security and authentication for all the participants of the network.[2] The current property registration for residential and commercial developments is a centralized system where majority of the work is done on a pen and paper-based system. The current system involves a lot of vulnerabilities and people use it to cheat others and the government. Blockchain is used to provide a potential solution for many challenges of land registration. The system involves noting down transactions into a hard copy ledger which is the only record that a transaction has occurred. We aim to evaluate the current registration system and assess the suitability of blockchain to replace the current centralized system. Most developing countries don't have a proper working system of tracking the property rights, the one they have is too fragile. For instance, a large earthquake can destroy the municipal buildings that store documents regarding the ownership of the properties.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131356575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/CENTCON52345.2021.9688127
S. R, Rajesh Kumar, B. Jaint
Nitration reactions are those where an organic agent gets mixed with nitric acid. They are considered highly exothermic as the heat generated is enormously high. These reactions generally occur as a batch process. Heat and mass transfer must be closely monitored to maintain the process steadily and avoid an explosion. The thermal loss of control of the system can be avoided by maintaining the temperature below the critical point. Generally fast and highly exothermic reactions are commonly carried out in batch reactors to have better control of the heat. This paper is an extension of previous work [1]. In this Paper, a runaway reaction is considered to take place in a continuous stirred tank reactor (CSTR) and mass and heat balance equations are designed to analyze the behavior of CSTR. Fuzzy logic-based control is designed to control the temperature of the runaway reaction below the critical point in the MATLAB software environment. The designed fuzzy control is compared with other intelligent controllers to evaluate its performance on a nonlinear system.
{"title":"Fuzzy Logic Control of Temperature in Nitration Process","authors":"S. R, Rajesh Kumar, B. Jaint","doi":"10.1109/CENTCON52345.2021.9688127","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9688127","url":null,"abstract":"Nitration reactions are those where an organic agent gets mixed with nitric acid. They are considered highly exothermic as the heat generated is enormously high. These reactions generally occur as a batch process. Heat and mass transfer must be closely monitored to maintain the process steadily and avoid an explosion. The thermal loss of control of the system can be avoided by maintaining the temperature below the critical point. Generally fast and highly exothermic reactions are commonly carried out in batch reactors to have better control of the heat. This paper is an extension of previous work [1]. In this Paper, a runaway reaction is considered to take place in a continuous stirred tank reactor (CSTR) and mass and heat balance equations are designed to analyze the behavior of CSTR. Fuzzy logic-based control is designed to control the temperature of the runaway reaction below the critical point in the MATLAB software environment. The designed fuzzy control is compared with other intelligent controllers to evaluate its performance on a nonlinear system.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122440957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/CENTCON52345.2021.9687985
Dhritiman Roy Ghatak
The present review attempts to sum up the advancements in circuit quantum electrodynamics (CQED) that has raised our hope for realizing scalable quantum information processing (QIP). Research reveals the advantages of (QIP) over classical information processing in terms of information storage capacity and speed of processing. In this context, the mathematical framework for QIP, like Quantum Fisher Information and computations based on Hilbert space is reviewed. CQED architectures of ever improving configuration are being reported in technical literature. Further, improvements are noticed in coupling strengths between the qubit and the resonator by application of robust protocols. The review highlights the Research efforts and the advancements achieved through faithful quantum state transfer between spatially separated qubits. The important phenomenon of entanglement, deterministic and multipartite, as the cornerstone for scalable QIP is discussed to bring forth the advancements achieved in reducing decoherence and decay. The author sums up the review with a discussion of selected patents and commercial endeavours in the field.
{"title":"Circuit Quantum Electrodynamics: Towards Realizing Scalable Quantum Information Processing","authors":"Dhritiman Roy Ghatak","doi":"10.1109/CENTCON52345.2021.9687985","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9687985","url":null,"abstract":"The present review attempts to sum up the advancements in circuit quantum electrodynamics (CQED) that has raised our hope for realizing scalable quantum information processing (QIP). Research reveals the advantages of (QIP) over classical information processing in terms of information storage capacity and speed of processing. In this context, the mathematical framework for QIP, like Quantum Fisher Information and computations based on Hilbert space is reviewed. CQED architectures of ever improving configuration are being reported in technical literature. Further, improvements are noticed in coupling strengths between the qubit and the resonator by application of robust protocols. The review highlights the Research efforts and the advancements achieved through faithful quantum state transfer between spatially separated qubits. The important phenomenon of entanglement, deterministic and multipartite, as the cornerstone for scalable QIP is discussed to bring forth the advancements achieved in reducing decoherence and decay. The author sums up the review with a discussion of selected patents and commercial endeavours in the field.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133774186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/CENTCON52345.2021.9687916
Venkatesham Maddela, S. K. Sinha, Parvathi Muddapu
As technology advances from micron to submicron, then submicron to deep submicron, the device density increases and the device becomes more complex, resulting in unwanted interconnections or disjunctions. Many existing fault models does not consider the parasitic effects, which causes undetectable faults. In this paper, we propose a new fault model that takes parasitic effects into account in order to detect and locate faults. In the proposed method, we consider node to node open defect, few multi node open defects for 45nm technology. Test results observed with few existing faults like No Access Faults, Undefined Read Faults, Undefined Write Faults and transition Faults, in addition these fault we observe few new faults named as Undefined Write Fault-1 (UWF1), Undefined Write Fault-0(UWF0) and Undefined Read Fault-1(URF1).
{"title":"Analysis of Open Defect Faults in Single 6T SRAM Cell Using R and C Parasitic Extraction Method","authors":"Venkatesham Maddela, S. K. Sinha, Parvathi Muddapu","doi":"10.1109/CENTCON52345.2021.9687916","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9687916","url":null,"abstract":"As technology advances from micron to submicron, then submicron to deep submicron, the device density increases and the device becomes more complex, resulting in unwanted interconnections or disjunctions. Many existing fault models does not consider the parasitic effects, which causes undetectable faults. In this paper, we propose a new fault model that takes parasitic effects into account in order to detect and locate faults. In the proposed method, we consider node to node open defect, few multi node open defects for 45nm technology. Test results observed with few existing faults like No Access Faults, Undefined Read Faults, Undefined Write Faults and transition Faults, in addition these fault we observe few new faults named as Undefined Write Fault-1 (UWF1), Undefined Write Fault-0(UWF0) and Undefined Read Fault-1(URF1).","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"136 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113982913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/CENTCON52345.2021.9688059
Sapparapu Rahul, ChinmayeeSai Vajrala, B. Thangaraju
In todays world, there are billions of applications on the internet holding a lot of user data which automatically increases the threat of being attacked by hackers. Often User privacy and data are Susceptible to being compromised. To prevent this situation, Web Application Firewalls (WAF) would play an important role. In this research work, we will be exploring on preventing SQL Injection and Cross-Site Scripting (XSS) with a few machine learning models. We will also be suggesting a method to improvise security by introducing a honeypot in the Network architecture. This unique approach will notify the owner of the application to take necessary actions while giving a fake response to the attackers.
{"title":"A Novel Method of Honeypot Inclusive WAF to Protect from SQL Injection and XSS","authors":"Sapparapu Rahul, ChinmayeeSai Vajrala, B. Thangaraju","doi":"10.1109/CENTCON52345.2021.9688059","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9688059","url":null,"abstract":"In todays world, there are billions of applications on the internet holding a lot of user data which automatically increases the threat of being attacked by hackers. Often User privacy and data are Susceptible to being compromised. To prevent this situation, Web Application Firewalls (WAF) would play an important role. In this research work, we will be exploring on preventing SQL Injection and Cross-Site Scripting (XSS) with a few machine learning models. We will also be suggesting a method to improvise security by introducing a honeypot in the Network architecture. This unique approach will notify the owner of the application to take necessary actions while giving a fake response to the attackers.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123092729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/CENTCON52345.2021.9688094
Sudeep D. Thepade, Sanket Bhandari, C. Bagde, Rutuja Chaware, Krutik Lodha
Image forgery is manipulating digital images to hide or change some useful information contained in the images. Images are considered the most effective way to convey information, and manipulating this information sometimes creates havoc. The action of tampering with images that are done either for fun or to give false evidence has resulted in a disaster in some cases. It is done in such a way that it cannot be determined by the naked human eye, so many people have implemented various types of machine learning algorithms, which they have implemented with handcrafted features to determine different types of forgery and whether an image is forged or not. These algorithms are used to extract the digital signature differentiating whether an image has been tampered with or not. Various techniques have been implemented for either fine or coarse image splicing, whereas a technique dealing with both needs to be devised. For this, our proposed work focuses on different types of machine learning classifiers and 10-fold classification. The attempted values of n for the machine learning classifier include 2,3,4. The different types of classifiers include Random Forest, Random tree, support vector machine, Logistic Regression, Naive Bayes. These classifier models are trained on comofod, casia v2.0 datasets. Accuracy increase is observed when a fusion of Thepade's Sorted Block Truncation Coding (i.e., Thepade's SBTC) local and Thepade's SBTC global feature tables.
{"title":"Image Forgery Detection using Machine Learning with Fusion of Global and Local Thepade's SBTC Features","authors":"Sudeep D. Thepade, Sanket Bhandari, C. Bagde, Rutuja Chaware, Krutik Lodha","doi":"10.1109/CENTCON52345.2021.9688094","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9688094","url":null,"abstract":"Image forgery is manipulating digital images to hide or change some useful information contained in the images. Images are considered the most effective way to convey information, and manipulating this information sometimes creates havoc. The action of tampering with images that are done either for fun or to give false evidence has resulted in a disaster in some cases. It is done in such a way that it cannot be determined by the naked human eye, so many people have implemented various types of machine learning algorithms, which they have implemented with handcrafted features to determine different types of forgery and whether an image is forged or not. These algorithms are used to extract the digital signature differentiating whether an image has been tampered with or not. Various techniques have been implemented for either fine or coarse image splicing, whereas a technique dealing with both needs to be devised. For this, our proposed work focuses on different types of machine learning classifiers and 10-fold classification. The attempted values of n for the machine learning classifier include 2,3,4. The different types of classifiers include Random Forest, Random tree, support vector machine, Logistic Regression, Naive Bayes. These classifier models are trained on comofod, casia v2.0 datasets. Accuracy increase is observed when a fusion of Thepade's Sorted Block Truncation Coding (i.e., Thepade's SBTC) local and Thepade's SBTC global feature tables.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121589296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Image contrast is the difference between the brightness and colors of a part of an image compared to its objects around. The contrast enhancement means increasing the original input brightness values. Images captured in low-light environments suffer from inferior visibility caused by low contrast. It is said that Histogram equalization is the foundation of image contrast enhancement and is used even in new contrast enhancement methods. Even though Histogram Equalization (HE) is primitive, it is effective. HE increases the brightness of the output image significantly, which is often undesirable. There are various enhanced versions of histogram equalization methods to improve image contrast are proposed to overcome the brightness preservation and image details preservation challenge. This paper focuses on studying different popular and approved HE methods and experimental studies based on the image, PSNR - peak signal to noise ratio, BRISQUE - Blind / Reference less Image Spatial Quality Evaluator, and Entropy. Results from the above study direct the goal towards the Image fusion of the two selected methods, which gives improved results on the preservation of brightness and contrast enhancement of the original image.
{"title":"Low Light Image Contrast Enhancement using Blending of Histogram Equalization Based Methods BBHE and BPHEME","authors":"Sudeep D. Thepade, Mallikarjun Ople, Vaibhav Mahindra, Vrushabh Kulye, Sudarshan Jamdar","doi":"10.1109/CENTCON52345.2021.9687862","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9687862","url":null,"abstract":"Image contrast is the difference between the brightness and colors of a part of an image compared to its objects around. The contrast enhancement means increasing the original input brightness values. Images captured in low-light environments suffer from inferior visibility caused by low contrast. It is said that Histogram equalization is the foundation of image contrast enhancement and is used even in new contrast enhancement methods. Even though Histogram Equalization (HE) is primitive, it is effective. HE increases the brightness of the output image significantly, which is often undesirable. There are various enhanced versions of histogram equalization methods to improve image contrast are proposed to overcome the brightness preservation and image details preservation challenge. This paper focuses on studying different popular and approved HE methods and experimental studies based on the image, PSNR - peak signal to noise ratio, BRISQUE - Blind / Reference less Image Spatial Quality Evaluator, and Entropy. Results from the above study direct the goal towards the Image fusion of the two selected methods, which gives improved results on the preservation of brightness and contrast enhancement of the original image.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128392164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/CENTCON52345.2021.9687917
Amarpreet Singh, Sandeep Singh, A. Aggarwal
Transportation system in any urban area is a non linear system comprises of mixture of two wheeler, cars and heavy vehicles such as trucks, buses etc. Also, due to rise in count of vehicles traffic congestion being the very severe problem arises frequently in the real scenario. This problem not only affect people safety, excessive delays in travelling of an individual but also pose serious threats towards environment i.e. excess fuel consumption and emission of gases such as carbon dioxide (CO2), carbon monoxide (CO) etc. The traditional traffic light system with a fixed traffic signal cycle of constant phase of green/red/yellow lights is not sufficient enough to tackle the traffic congestion problem in an optimum way. Optimizations based on Fuzzy modeling is all about getting those values of input parameters which gives desired output in complex simulated system. Researchers have used different controlling parameters in their study. Therefore, a single parameter such as queue length is not sufficient enough to meet with dynamics of traffic flow. This paper proposes a fuzzy model for traffic congestion control at the intersections by adapting the timings of traffic lights according to the parameters like queue length and arrival rate of the vehicles. The average percentage performance observed of the proposed model is 18.8%.
{"title":"Traffic Congestion Controller: A Fuzzy Based Approach","authors":"Amarpreet Singh, Sandeep Singh, A. Aggarwal","doi":"10.1109/CENTCON52345.2021.9687917","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9687917","url":null,"abstract":"Transportation system in any urban area is a non linear system comprises of mixture of two wheeler, cars and heavy vehicles such as trucks, buses etc. Also, due to rise in count of vehicles traffic congestion being the very severe problem arises frequently in the real scenario. This problem not only affect people safety, excessive delays in travelling of an individual but also pose serious threats towards environment i.e. excess fuel consumption and emission of gases such as carbon dioxide (CO2), carbon monoxide (CO) etc. The traditional traffic light system with a fixed traffic signal cycle of constant phase of green/red/yellow lights is not sufficient enough to tackle the traffic congestion problem in an optimum way. Optimizations based on Fuzzy modeling is all about getting those values of input parameters which gives desired output in complex simulated system. Researchers have used different controlling parameters in their study. Therefore, a single parameter such as queue length is not sufficient enough to meet with dynamics of traffic flow. This paper proposes a fuzzy model for traffic congestion control at the intersections by adapting the timings of traffic lights according to the parameters like queue length and arrival rate of the vehicles. The average percentage performance observed of the proposed model is 18.8%.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121160409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/CENTCON52345.2021.9688294
Supreetha M A, Sree Vaishnavi R, Soujanya Hurakadli, Vikash Kumar
A novel design of tunable & balanced voltage differencing inverting buffered amplifier (VDIBA) is presented in this paper. The presented design is symmetric and employ dual current sources to develop a balanced circuit instead of a single current source used in conventional VDIBA designs. The operation of the presented VDIBA is exhibited through detailed analyses. To illustrate the application of the presented VDIBA circuit, a high-pass filter configuration is designed. The power consumption and transconductance of the presented VDIBA design are 17.4 mW and 614 mS respectively. The presented VDIBA is designed and simulated using 45 nanometer CMOS process in Cadence at ±1 V supply voltage.
{"title":"A Novel Design of Tunable and Balanced VDIBA","authors":"Supreetha M A, Sree Vaishnavi R, Soujanya Hurakadli, Vikash Kumar","doi":"10.1109/CENTCON52345.2021.9688294","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9688294","url":null,"abstract":"A novel design of tunable & balanced voltage differencing inverting buffered amplifier (VDIBA) is presented in this paper. The presented design is symmetric and employ dual current sources to develop a balanced circuit instead of a single current source used in conventional VDIBA designs. The operation of the presented VDIBA is exhibited through detailed analyses. To illustrate the application of the presented VDIBA circuit, a high-pass filter configuration is designed. The power consumption and transconductance of the presented VDIBA design are 17.4 mW and 614 mS respectively. The presented VDIBA is designed and simulated using 45 nanometer CMOS process in Cadence at ±1 V supply voltage.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122383436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/CENTCON52345.2021.9688054
Shaikh Firdous Tarannum, S. Kamble
Power electronic devices are inherently non-linear and draws reactive power and related harmonics from the supply source. For three phase system, these PE devices drains excessive neutral current and may also unbalance the system. The excessive neutral current, imbalance, reactive power burden, harmonics injection etc, are the major causes of lowering system efficiency and power factor thereby affecting the efficient power quality. One of the most striving issue in electrical industry today is power quality and with the development of contemporary and complex gadgets, whose performance is dependent on quality of supply, it becomes even more vital. The majority of industrial loads are driven by electronic switches/equipment those are sensitive to disturbances. The power quality concerns namely, voltage flickers, sags, swells, imbalance load, harmonics etc. causes intolerance to industrial loads. The FACTS control topologies have adorable importance in maintaining the power quality as they play very crucial role in reactive power compensation. These controllers are available in wide range and flexible in operation so as to cope with disturbances caused. This paper focuses on development and implementation of fuzzy based STATCOM in three phase transmission system. The proposed model encourages fuzzy based STATCOM's high dynamic performance and compensation range. The purpose of the paper is to create a fuzzy logic controller and compare its performance to that of a traditional controller. This is used to correct for current and voltage quality concerns in sensitive loads. The data are analyzed and reported using the MATLAB/Simulink software.
{"title":"Modelling of a Fuzzy-Based STATCOM to Ensure Power Quality","authors":"Shaikh Firdous Tarannum, S. Kamble","doi":"10.1109/CENTCON52345.2021.9688054","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9688054","url":null,"abstract":"Power electronic devices are inherently non-linear and draws reactive power and related harmonics from the supply source. For three phase system, these PE devices drains excessive neutral current and may also unbalance the system. The excessive neutral current, imbalance, reactive power burden, harmonics injection etc, are the major causes of lowering system efficiency and power factor thereby affecting the efficient power quality. One of the most striving issue in electrical industry today is power quality and with the development of contemporary and complex gadgets, whose performance is dependent on quality of supply, it becomes even more vital. The majority of industrial loads are driven by electronic switches/equipment those are sensitive to disturbances. The power quality concerns namely, voltage flickers, sags, swells, imbalance load, harmonics etc. causes intolerance to industrial loads. The FACTS control topologies have adorable importance in maintaining the power quality as they play very crucial role in reactive power compensation. These controllers are available in wide range and flexible in operation so as to cope with disturbances caused. This paper focuses on development and implementation of fuzzy based STATCOM in three phase transmission system. The proposed model encourages fuzzy based STATCOM's high dynamic performance and compensation range. The purpose of the paper is to create a fuzzy logic controller and compare its performance to that of a traditional controller. This is used to correct for current and voltage quality concerns in sensitive loads. The data are analyzed and reported using the MATLAB/Simulink software.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125119682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}