首页 > 最新文献

International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy最新文献

英文 中文
Performance Analysis of DSR,LAR and STARof MANETs for CBR traffic 基于CBR通信量的DSR、LAR和STARof网络性能分析
Liji Merin, Vimlesh Kumar
Mobile nodes have limited battery energy and in MANETs it is usually impossible to replace these batteries during emergency. So, energy efficient routing in MANETs is a very critical task. In this paper a comparative performance analysis of routing protocols (DSR ,STAR and LAR) has been done on the basis of energy consumption ,packet delivery ratio, jitter and end to end delay using QualNet 5.0.2. The obtained results indicate that STAR is more energy efficient than other two protocols.
移动节点的电池能量有限,在manet中,在紧急情况下通常不可能更换这些电池。因此,在manet中实现高效节能路由是一项非常关键的任务。本文在QualNet 5.0.2的基础上,对DSR、STAR和LAR三种路由协议的能耗、分组传送率、抖动和端到端延迟进行了性能对比分析。结果表明,STAR协议比其他两种协议更节能。
{"title":"Performance Analysis of DSR,LAR and STARof MANETs for CBR traffic","authors":"Liji Merin, Vimlesh Kumar","doi":"10.15662/IJAREEIE.2015.0405034","DOIUrl":"https://doi.org/10.15662/IJAREEIE.2015.0405034","url":null,"abstract":"Mobile nodes have limited battery energy and in MANETs it is usually impossible to replace these batteries during emergency. So, energy efficient routing in MANETs is a very critical task. In this paper a comparative performance analysis of routing protocols (DSR ,STAR and LAR) has been done on the basis of energy consumption ,packet delivery ratio, jitter and end to end delay using QualNet 5.0.2. The obtained results indicate that STAR is more energy efficient than other two protocols.","PeriodicalId":13702,"journal":{"name":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","volume":"9 1","pages":"4032-4038"},"PeriodicalIF":0.0,"publicationDate":"2015-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82244073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Cost Effective Phase Selector 自动成本有效的相位选择器
Ashish Gupta, A. Singh, Gurpreet Singh, Arun Kumar
Electricity is lifeline of any country and its continuous availability at minimum cost ensure the country’s growth. Reducing the burden over the energy resources leads to the use of alternative sources of energy like Solar, Wind etc. also they are available free of cost. So modern industries and homes, to ensure regular power supply incorporates mainly three sources of energy i.e. Solar, Mains(Utility grid), Diesel generator sets. So an automatic phase selector circuit is required for the switching between these supplies with the Solar having the highest priority followed by Mains for having access of cheapest electricity. The circuit make use of Transformer, Rectifier, Regulator, Comparator and Relays. The switching time is reduced considerably due to the use of high speed electronics devices.
电力是任何国家的生命线,它以最低的成本持续供应确保了国家的增长。减少能源资源的负担导致使用替代能源,如太阳能,风能等,而且它们是免费的。所以现代工业和家庭,为了确保正常的电力供应,主要包括三种能源,即太阳能,市电(公用电网),柴油发电机组。因此,需要一个自动相位选择电路来在这些电源之间切换,其中太阳能具有最高的优先级,其次是获得最便宜的电力的主电源。该电路由变压器、整流器、稳压器、比较器和继电器组成。由于使用高速电子器件,开关时间大大减少。
{"title":"Automatic Cost Effective Phase Selector","authors":"Ashish Gupta, A. Singh, Gurpreet Singh, Arun Kumar","doi":"10.15662/IJAREEIE.2015.0405019","DOIUrl":"https://doi.org/10.15662/IJAREEIE.2015.0405019","url":null,"abstract":"Electricity is lifeline of any country and its continuous availability at minimum cost ensure the country’s growth. Reducing the burden over the energy resources leads to the use of alternative sources of energy like Solar, Wind etc. also they are available free of cost. So modern industries and homes, to ensure regular power supply incorporates mainly three sources of energy i.e. Solar, Mains(Utility grid), Diesel generator sets. So an automatic phase selector circuit is required for the switching between these supplies with the Solar having the highest priority followed by Mains for having access of cheapest electricity. The circuit make use of Transformer, Rectifier, Regulator, Comparator and Relays. The switching time is reduced considerably due to the use of high speed electronics devices.","PeriodicalId":13702,"journal":{"name":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","volume":"2015 1","pages":"3919-3925"},"PeriodicalIF":0.0,"publicationDate":"2015-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78353226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Unique Cipher Mechanism for EnsuringSecure Data Flow over Network 确保网络数据流安全的独特密码机制
Pankaj Rakheja, R. Saini, Nankita Asija, Diwakar Kamboj
Cryptography is the art of making text non readable from human readable to ensure secure communication over the network. It is classified basically into two types one is symmetric cryptography and the other is asymmetric cryptography. In the symmetric cryptography we use single key for encryption and decryption process which creates trouble of key sharing whereas in asymmetric cryptography two different keys are used for one for encryption and other for decryption which solves dependence on key sharing to large extent. But now traditional cryptographic ciphers are more prone to attacks and problem of authentication also exists as users have increased and few of them try to have unauthorized access. In order to solve this issue we have integrated biometric and visual cryptographic modules in the basic RSA module to make it more secure. The RSA encrypted text or message is hidden through LSB insertion in an image which also has shares of the fingerprint of the desired recipient. Along with that we have used the Caesar and mix columnar operation which protects RSA from man in middle attack as to decode the encoded text, attacker needs to know key used in mix columnar operation too. And as the size of text increases mix columnar becomes more effective. Moreover the receiver would be able to get the message only if his fingerprint matches to that of the desired one else he would just be able to see image only that is we have hidden the existence of secret message so as to make it even more secure. Matlab simulation has been carried out to validate the proposed technique
密码学是一门使文本从人类可读变为不可读的艺术,以确保网络上的安全通信。它基本上分为两种类型,一种是对称密码术,另一种是非对称密码术。在对称密码学中,我们使用单个密钥进行加密和解密过程,这造成了密钥共享的麻烦,而在非对称密码学中,我们使用两个不同的密钥进行加密和解密,这在很大程度上解决了对密钥共享的依赖。但是随着用户数量的增加,越来越少的用户尝试进行未经授权的访问,传统的加密方式更容易受到攻击,并且存在认证问题。为了解决这个问题,我们在基本的RSA模块中集成了生物识别和视觉加密模块,使其更加安全。RSA加密的文本或消息通过LSB插入隐藏在图像中,该图像也具有所需接收者的指纹共享。除此之外,我们还使用了凯撒和混合列操作来保护RSA免受中间人攻击,因为要解码编码的文本,攻击者还需要知道混合列操作中使用的密钥。随着文本大小的增加,混合柱状结构变得更加有效。此外,接收者只有在他的指纹与想要的指纹匹配的情况下才能获得信息,否则他只能看到图像,也就是说我们隐藏了秘密信息的存在,从而使其更加安全。通过Matlab仿真验证了该方法的有效性
{"title":"Unique Cipher Mechanism for EnsuringSecure Data Flow over Network","authors":"Pankaj Rakheja, R. Saini, Nankita Asija, Diwakar Kamboj","doi":"10.15662/ijareeie.2015.0405033","DOIUrl":"https://doi.org/10.15662/ijareeie.2015.0405033","url":null,"abstract":"Cryptography is the art of making text non readable from human readable to ensure secure communication over the network. It is classified basically into two types one is symmetric cryptography and the other is asymmetric cryptography. In the symmetric cryptography we use single key for encryption and decryption process which creates trouble of key sharing whereas in asymmetric cryptography two different keys are used for one for encryption and other for decryption which solves dependence on key sharing to large extent. But now traditional cryptographic ciphers are more prone to attacks and problem of authentication also exists as users have increased and few of them try to have unauthorized access. In order to solve this issue we have integrated biometric and visual cryptographic modules in the basic RSA module to make it more secure. The RSA encrypted text or message is hidden through LSB insertion in an image which also has shares of the fingerprint of the desired recipient. Along with that we have used the Caesar and mix columnar operation which protects RSA from man in middle attack as to decode the encoded text, attacker needs to know key used in mix columnar operation too. And as the size of text increases mix columnar becomes more effective. Moreover the receiver would be able to get the message only if his fingerprint matches to that of the desired one else he would just be able to see image only that is we have hidden the existence of secret message so as to make it even more secure. Matlab simulation has been carried out to validate the proposed technique","PeriodicalId":13702,"journal":{"name":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","volume":"28 1","pages":"4023-4031"},"PeriodicalIF":0.0,"publicationDate":"2015-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81445806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Split Metering to Prevent Energy Theft 分式计量防止能源盗窃
Jayashri Joshi, Sachin Pathare, N. Pardeshi, Ubed Momin
“Power theft” is a non-ignorable crime that is highly prevalent and at the same time it directly affects the economy of the nation. Electricity is the modern man’s most convenient and useful form of energy without which the present social infrastructure would not be feasible. When importance of electricity is on the increasing side, then why theft of this energy or illegal consumption of power should be ignored. Hence this Paper “Split metering to prevent energy theft” is proposed. Electric Energy Meter (kWh) for domestic and industrial use are provided with anti-tampering features, in spite of these features, people try to steal electric energy by totally bypassing the meter and utility companies are incurring heavy losses in revenue. To stop these unethical practices – utilities have come up with the idea to install the meter in nearest electric mast of the consumer’s house and install a remote display unit in the consumer’s premises. Also the module for automatic meter reading is to be design.
“窃电”是一种不可忽视的犯罪,是高度普遍的,同时它直接影响到国家的经济。电是现代人最方便、最有用的能源形式,没有它,目前的社会基础设施就不可能存在。当电力的重要性越来越高的时候,为什么这种能源的盗窃或非法用电应该被忽视。为此,本文提出了“分路计量防止盗电”的方案。家用和工业用的电能表(kWh)具有防篡改功能,尽管有这些功能,人们试图完全绕过电能表窃取电能,公用事业公司正在遭受严重的收入损失。为了制止这些不道德的做法,公用事业公司想出了一个主意,把电表安装在离消费者家最近的电线杆上,并在消费者家里安装一个远程显示装置。并设计了自动抄表模块。
{"title":"Split Metering to Prevent Energy Theft","authors":"Jayashri Joshi, Sachin Pathare, N. Pardeshi, Ubed Momin","doi":"10.15662/IJAREEIE.2015.0405014","DOIUrl":"https://doi.org/10.15662/IJAREEIE.2015.0405014","url":null,"abstract":"“Power theft” is a non-ignorable crime that is highly prevalent and at the same time it directly affects the economy of the nation. Electricity is the modern man’s most convenient and useful form of energy without which the present social infrastructure would not be feasible. When importance of electricity is on the increasing side, then why theft of this energy or illegal consumption of power should be ignored. Hence this Paper “Split metering to prevent energy theft” is proposed. Electric Energy Meter (kWh) for domestic and industrial use are provided with anti-tampering features, in spite of these features, people try to steal electric energy by totally bypassing the meter and utility companies are incurring heavy losses in revenue. To stop these unethical practices – utilities have come up with the idea to install the meter in nearest electric mast of the consumer’s house and install a remote display unit in the consumer’s premises. Also the module for automatic meter reading is to be design.","PeriodicalId":13702,"journal":{"name":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","volume":"77 1","pages":"3887-3891"},"PeriodicalIF":0.0,"publicationDate":"2015-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78087996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Navigation andCombat Ship 导航与作战舰艇的设计与实现
Priyanka Gaikwad, P. Jambhule, Sheetal Kekan, S.K.Gaikwad
The pattern of this paper comprises of a self-navigating robotic ship(ship spy)as a base on which guided by the computer in the control room and the remote triggered for a weapon is fitted in the ship vehicle. The PIC Controller acts as a crucial scheming element for the ritual built vehicle. The PIC architecture describes a family of RISC-based COMPUTER PROCESSOR. The reduced complexity and simpler design build a low-energy system on chip for an embedded system incorporating memory, interfaces, radios, etc. The ship contains single board embedded system that is equipped with GPS and RF modems along with PIC processor, which in turns the GPS receiver has been interfaced with the vehicle which is capable of receiving information from the GPS satellites and this technology allows the system in finding out the location of the ship in terms of Latitude and longitude coordinates, anywhere on earth and provides most up to date information about ongoing trips. The control room can transmit the targeted location by RF modem technology to the ship in terms of Latitude and longitude data. Once the ship receives this data, the microcontroller unit compares the targeted location with the present location and separately moves to the desired location. Additionally the camera is mounted on the robotic ship, which is in a scanning pattern to capture all the visible details around the ship.The video is transmitted to a control room through RF module, if the presence on enemy is detected the mounted weapon on the vehicle is triggered based on the commands from the control room. The main purpose of this project is to provide following features a)Location information b)Real time tracking c)Communication is instantaneous therefore we can receive running report d)Completely integrated controlled and monitored by control room
本文提出了一种以自主导航的机器人船(船间谍)为基础,由控制室的计算机引导,并在船载器上安装武器遥控触发装置。PIC控制器作为仪式建造车辆的关键规划元素。PIC架构描述了一类基于risc的计算机处理器。降低的复杂性和更简单的设计为集成存储器、接口、无线电等的嵌入式系统构建了低能耗的片上系统。该船包含单板嵌入式系统,配备GPS和RF调制解调器以及PIC处理器,GPS接收器已与能够接收来自GPS卫星的信息的车辆接口,该技术允许系统根据纬度和经度坐标找出船舶的位置,在地球上的任何地方,并提供有关正在进行的旅行的最新信息。控制室可以通过射频调制解调器技术将目标位置以经纬度数据传输给船舶。一旦船舶接收到这些数据,微控制器单元将目标位置与当前位置进行比较,并分别移动到所需位置。此外,摄像机安装在机器人船上,以扫描模式捕捉船舶周围所有可见细节。视频通过射频模块传输到控制室,如果检测到敌人的存在,则根据控制室的命令触发车辆上安装的武器。该项目的主要目的是提供以下功能:a)位置信息b)实时跟踪c)通信是即时的,因此我们可以收到运行报告d)完全集成的控制室控制和监控
{"title":"Design and Implementation of Navigation andCombat Ship","authors":"Priyanka Gaikwad, P. Jambhule, Sheetal Kekan, S.K.Gaikwad","doi":"10.15662/IJAREEIE.2015.0405002","DOIUrl":"https://doi.org/10.15662/IJAREEIE.2015.0405002","url":null,"abstract":"The pattern of this paper comprises of a self-navigating robotic ship(ship spy)as a base on which guided by the computer in the control room and the remote triggered for a weapon is fitted in the ship vehicle. The PIC Controller acts as a crucial scheming element for the ritual built vehicle. The PIC architecture describes a family of RISC-based COMPUTER PROCESSOR. The reduced complexity and simpler design build a low-energy system on chip for an embedded system incorporating memory, interfaces, radios, etc. The ship contains single board embedded system that is equipped with GPS and RF modems along with PIC processor, which in turns the GPS receiver has been interfaced with the vehicle which is capable of receiving information from the GPS satellites and this technology allows the system in finding out the location of the ship in terms of Latitude and longitude coordinates, anywhere on earth and provides most up to date information about ongoing trips. The control room can transmit the targeted location by RF modem technology to the ship in terms of Latitude and longitude data. Once the ship receives this data, the microcontroller unit compares the targeted location with the present location and separately moves to the desired location. Additionally the camera is mounted on the robotic ship, which is in a scanning pattern to capture all the visible details around the ship.The video is transmitted to a control room through RF module, if the presence on enemy is detected the mounted weapon on the vehicle is triggered based on the commands from the control room. The main purpose of this project is to provide following features a)Location information b)Real time tracking c)Communication is instantaneous therefore we can receive running report d)Completely integrated controlled and monitored by control room","PeriodicalId":13702,"journal":{"name":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","volume":"76 5 1","pages":"3807-3812"},"PeriodicalIF":0.0,"publicationDate":"2015-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89229473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Current Transformer Sizing & SaturationCalculation with Transient PerformanceAnalysis of CT Using ATP Software 电流互感器的尺寸和饱和计算及瞬态性能分析
S. Tiwari, Aditya Pandey
The main purpose of a current transformer is to translate the primary current in a high voltage power system to single level that can be handled by delicate electromechanical or electronic device. Current transformers are the very important aspect of the power system protection. So for the correct CT operation the accuracy class of CT sizing&should be Adequate with the system current & related burden and effective transient condition. In this paper, it proposes advance CT sizing concept with KTD and X/R ratio factor with CT performance analysis at different -2 CT Burden and CT saturation analysis at Asymmetrical Current condition with the Alternating Transient Programming (ATP) software.
电流互感器的主要目的是将高压电力系统中的一次电流转换为可由精密的机电或电子设备处理的单电平。电流互感器是电力系统保护的重要组成部分。因此,为了保证电流互感器的正确运行,电流互感器的尺寸和精度等级应与系统电流及相关负荷和有效暂态条件相适应。本文提出了基于KTD和X/R比值因子的CT分级概念,并利用交变暂态编程(ATP)软件对不同-2 CT负荷下的CT性能和不对称电流下的CT饱和度进行了分析。
{"title":"Current Transformer Sizing & SaturationCalculation with Transient PerformanceAnalysis of CT Using ATP Software","authors":"S. Tiwari, Aditya Pandey","doi":"10.15662/IJAREEIE.2015.0405009","DOIUrl":"https://doi.org/10.15662/IJAREEIE.2015.0405009","url":null,"abstract":"The main purpose of a current transformer is to translate the primary current in a high voltage power system to single level that can be handled by delicate electromechanical or electronic device. Current transformers are the very important aspect of the power system protection. So for the correct CT operation the accuracy class of CT sizing&should be Adequate with the system current & related burden and effective transient condition. In this paper, it proposes advance CT sizing concept with KTD and X/R ratio factor with CT performance analysis at different -2 CT Burden and CT saturation analysis at Asymmetrical Current condition with the Alternating Transient Programming (ATP) software.","PeriodicalId":13702,"journal":{"name":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","volume":"21 1","pages":"3853-3860"},"PeriodicalIF":0.0,"publicationDate":"2015-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86802621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Linguistic Sign Language Recognition ThoughImage Based Approach 基于图像的语言手语识别方法
K.Sangeetha, K.R.Renugadevi
Sign language recognition is a very challenging research area. In this proposed system, a well trained computer system is used to recognize static hand gestures representing linguistic words. The main aim of the paper is conversion of linguistic sign languages into text and speech form. Recognized sign are also translated into Tamil and Hindi languages. It contains three processes of work. First process is pre-processing, in which the obtained images are processed through the steps like segmentation, resize, and gray conversion. Second process is region-based analysis which exploits both boundary and interior pixels of an object. Solidity, perimeter, convex hull, area, major axis length, minor axis length, eccentricity, orientation are some of the shape descriptors used as features in this process. The features derived are used to train the binary classifier first; secondly the testing images are given for classification. Knn classifiers are used for classification which provides a good result with less computation time for larger datasets. Since, the system handled a binary classifier it performed a one-versus-all kind of classification. PCNN (Pulse Coupled Neural Network) is used for pattern recognition. Third process is the hand gesture recognition.
手语识别是一个非常具有挑战性的研究领域。在这个系统中,一个训练有素的计算机系统被用来识别代表语言单词的静态手势。本文的主要目的是将语言手语转化为文本和语音形式。公认的标志也被翻译成泰米尔语和印地语。它包含三个工作过程。首先是预处理,对得到的图像进行分割、调整大小、灰度转换等步骤的处理。第二个过程是基于区域的分析,它利用对象的边界和内部像素。实心度、周长、凸壳、面积、长轴长度、短轴长度、偏心率、方向是在此过程中用作特征的一些形状描述符。首先用得到的特征对二值分类器进行训练;然后给出测试图像进行分类;使用Knn分类器进行分类,对于较大的数据集计算时间更少,结果更好。由于系统处理的是一个二元分类器,所以它执行的是一对全的分类。PCNN(脉冲耦合神经网络)用于模式识别。第三个过程是手势识别。
{"title":"Linguistic Sign Language Recognition ThoughImage Based Approach","authors":"K.Sangeetha, K.R.Renugadevi","doi":"10.15662/IJAREEIE.2015.0404106","DOIUrl":"https://doi.org/10.15662/IJAREEIE.2015.0404106","url":null,"abstract":"Sign language recognition is a very challenging research area. In this proposed system, a well trained computer system is used to recognize static hand gestures representing linguistic words. The main aim of the paper is conversion of linguistic sign languages into text and speech form. Recognized sign are also translated into Tamil and Hindi languages. It contains three processes of work. First process is pre-processing, in which the obtained images are processed through the steps like segmentation, resize, and gray conversion. Second process is region-based analysis which exploits both boundary and interior pixels of an object. Solidity, perimeter, convex hull, area, major axis length, minor axis length, eccentricity, orientation are some of the shape descriptors used as features in this process. The features derived are used to train the binary classifier first; secondly the testing images are given for classification. Knn classifiers are used for classification which provides a good result with less computation time for larger datasets. Since, the system handled a binary classifier it performed a one-versus-all kind of classification. PCNN (Pulse Coupled Neural Network) is used for pattern recognition. Third process is the hand gesture recognition.","PeriodicalId":13702,"journal":{"name":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","volume":"8 1","pages":"2498-2504"},"PeriodicalIF":0.0,"publicationDate":"2015-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79488132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Eye Controlled Electric Wheel Chair 眼控电动轮椅
N. Mani, A. Sebastian, A. Paul, Alex Chacko, Anupa Raghunath
This paper delivers a method to guide and control the wheelchair for disabled people based on movement of eye. This concept can be used for people with loco-motor disabilities. The proposed system involves three stages: image detection, image processing and sending of control signals wheelchair. The eye movement is detected using a head mounted camera. The images of the eye will be sent to the laptop where the images will be processed using Python software. The corresponding output signals are then send to the motor driving circuit which control the motors.
本文提出了一种基于眼球运动的残疾人轮椅引导控制方法。这个概念可以用于局部运动障碍的人。该系统包括图像检测、图像处理和轮椅控制信号的发送三个阶段。眼球运动是通过头戴式摄像头检测到的。眼睛的图像将被发送到笔记本电脑,在那里图像将使用Python软件进行处理。然后将相应的输出信号发送到控制电机的电机驱动电路。
{"title":"Eye Controlled Electric Wheel Chair","authors":"N. Mani, A. Sebastian, A. Paul, Alex Chacko, Anupa Raghunath","doi":"10.15662/IJAREEIE.2015.0404105","DOIUrl":"https://doi.org/10.15662/IJAREEIE.2015.0404105","url":null,"abstract":"This paper delivers a method to guide and control the wheelchair for disabled people based on movement of eye. This concept can be used for people with loco-motor disabilities. The proposed system involves three stages: image detection, image processing and sending of control signals wheelchair. The eye movement is detected using a head mounted camera. The images of the eye will be sent to the laptop where the images will be processed using Python software. The corresponding output signals are then send to the motor driving circuit which control the motors.","PeriodicalId":13702,"journal":{"name":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","volume":"1 1","pages":"2494-2497"},"PeriodicalIF":0.0,"publicationDate":"2015-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89757952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Performance Analysis and Comparison ofConventional and Interleaved DC/DC BoostConverter Using MULTISIM 基于MULTISIM的传统与交错DC/DC升压变换器性能分析与比较
eep K Waghmare, Amruta S Deshp
Step up conversion is widely used in many applications such as Electric vehicles, Photovoltaic (PV) system, Uninterruptible power supplies (UPS) and fuel cell system. This paper shows simulation of conventionaland interleaveddc-dc boost converter using NI MULTISIM software. Theseconvertersare tested by varying the input voltage with constant duty cycle in Continuous Conduction Mode (CCM). The performance parameters of both the converters are compared. Control of these converters is done by switching signals having fixed switching frequency.Using interleaved converter we can reduced ripple at output voltageand output current.
升压转换广泛应用于电动汽车、光伏(PV)系统、不间断电源(UPS)和燃料电池系统等领域。本文利用NI MULTISIM软件对传统的交错直流升压变换器进行了仿真。这些变换器在连续传导模式(CCM)下通过恒定占空比改变输入电压进行测试。对两种变换器的性能参数进行了比较。这些变换器的控制是通过具有固定开关频率的开关信号来完成的。采用交错变换器可以减小输出电压和输出电流的纹波。
{"title":"Performance Analysis and Comparison ofConventional and Interleaved DC/DC BoostConverter Using MULTISIM","authors":"eep K Waghmare, Amruta S Deshp","doi":"10.15662/IJAREEIE.2015.0404104","DOIUrl":"https://doi.org/10.15662/IJAREEIE.2015.0404104","url":null,"abstract":"Step up conversion is widely used in many applications such as Electric vehicles, Photovoltaic (PV) system, Uninterruptible power supplies (UPS) and fuel cell system. This paper shows simulation of conventionaland interleaveddc-dc boost converter using NI MULTISIM software. Theseconvertersare tested by varying the input voltage with constant duty cycle in Continuous Conduction Mode (CCM). The performance parameters of both the converters are compared. Control of these converters is done by switching signals having fixed switching frequency.Using interleaved converter we can reduced ripple at output voltageand output current.","PeriodicalId":13702,"journal":{"name":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","volume":"137 1","pages":"2297-2303"},"PeriodicalIF":0.0,"publicationDate":"2015-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75994915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of LEACH protocol withWormhole Attack and without WormholeAttack in Wireless Sensor Networks 无线传感器网络中有和无虫洞攻击的LEACH协议比较
P.Mahalakshmi
In Wireless Sensor Networks, routing is the major concern. It comprises of small sensor nodes with limited resources. It is necessary to introduce a routing protocol to extend network life time and to reduce the power consumption in sensor nodes. LEACH is one of the most interested techniques that offer an efficient way to minimize the power consumption in sensor networks. It uses self organizing and dynamic cluster formation which makes it attractive to various routing attacks, such as Denial of Service (DoS), Black hole, Wormhole and Sybil attacks. Wormhole attack is a Denial of Service attack launched by malicious nodes. It records packets at one location and tunnels them into another location. To check the reliable operation of LEACH, implement wormhole attack and evaluated the LEACH protocol in terms of metrics like throughput, average end-to-end delay, Packet Delivery Ratio (PDR). The evaluation of LEACH with wormhole attack has been done with the help of NS2 simulator. Watchdog is a monitoring technique which detects the misbehaving nodes in the network. It can be implemented in LEACH. In Watchdog-LEACH, some nodes are considered as watchdogs and some changes are applied on LEACH protocol for intrusion detection. Watchdog-LEACH is able to protect against a wide range of attacks and it provides security, energy efficiency and memory efficiency. Comparison made on LEACH with wormhole attack and LEACH with watchdog shows that LEACH with watchdog achieves high throughput, Packet Delivery Ratio and low End to End Delay.
在无线传感器网络中,路由是主要问题。它由资源有限的小传感器节点组成。为了延长网络的生存时间和降低传感器节点的功耗,引入路由协议是必要的。LEACH是目前最受关注的技术之一,它提供了一种有效的方法来最小化传感器网络的功耗。它使用自组织和动态集群形成,这使得它对各种路由攻击具有吸引力,例如拒绝服务(DoS),黑洞,虫洞和Sybil攻击。虫洞攻击是一种由恶意节点发起的拒绝服务攻击。它在一个位置记录数据包并将其传输到另一个位置。为了验证LEACH的可靠运行,实现了虫洞攻击,并从吞吐量、端到端平均延迟、包传输比(PDR)等指标对LEACH协议进行了评估。利用NS2仿真器对具有虫洞攻击的LEACH进行了评估。看门狗是一种检测网络中行为不端的监控技术。它可以在LEACH中实现。在Watchdog-LEACH协议中,将一些节点作为看门狗,并对LEACH协议进行一些修改以进行入侵检测。Watchdog-LEACH能够抵御各种攻击,并提供安全性、能效和内存效率。对采用虫洞攻击的LEACH和采用看门狗攻击的LEACH进行了比较,结果表明,采用看门狗攻击的LEACH具有较高的吞吐量、较高的报文传送率和较低的端到端时延。
{"title":"Comparison of LEACH protocol withWormhole Attack and without WormholeAttack in Wireless Sensor Networks","authors":"P.Mahalakshmi","doi":"10.15662/IJAREEIE.2015.0404028","DOIUrl":"https://doi.org/10.15662/IJAREEIE.2015.0404028","url":null,"abstract":"In Wireless Sensor Networks, routing is the major concern. It comprises of small sensor nodes with limited resources. It is necessary to introduce a routing protocol to extend network life time and to reduce the power consumption in sensor nodes. LEACH is one of the most interested techniques that offer an efficient way to minimize the power consumption in sensor networks. It uses self organizing and dynamic cluster formation which makes it attractive to various routing attacks, such as Denial of Service (DoS), Black hole, Wormhole and Sybil attacks. Wormhole attack is a Denial of Service attack launched by malicious nodes. It records packets at one location and tunnels them into another location. To check the reliable operation of LEACH, implement wormhole attack and evaluated the LEACH protocol in terms of metrics like throughput, average end-to-end delay, Packet Delivery Ratio (PDR). The evaluation of LEACH with wormhole attack has been done with the help of NS2 simulator. Watchdog is a monitoring technique which detects the misbehaving nodes in the network. It can be implemented in LEACH. In Watchdog-LEACH, some nodes are considered as watchdogs and some changes are applied on LEACH protocol for intrusion detection. Watchdog-LEACH is able to protect against a wide range of attacks and it provides security, energy efficiency and memory efficiency. Comparison made on LEACH with wormhole attack and LEACH with watchdog shows that LEACH with watchdog achieves high throughput, Packet Delivery Ratio and low End to End Delay.","PeriodicalId":13702,"journal":{"name":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","volume":"22 1","pages":"2053-2059"},"PeriodicalIF":0.0,"publicationDate":"2015-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80200858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1