Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768510
P. A, S. T., M. B, R. Krishnakumar
The combination of fuel cost and emission dispatch minimizes fuel cost factors and gas emissions to provide optimal performance for the generation units located in a power plant, ensuring demand supply. The former variable is absolute to maintain business permanence, and the latter to assure compliance with ecological regulation and no environmental harm. This work investigates the application of a new optimization technique known as the Search and Rescue Optimization Algorithm (SAR), which improves searching capability by employing specified parameters. This algorithm has three effective parameters and works with all generators to minimize the cost and emission while satisfying the defined demand. Simulations were run on multiple IEEE test systems with varying demand values. The obtained findings were compared to each other as well as to the results of other procedures mentioned in the literature. The acquired results appear to be superior to those achieved by other metaheuristics algorithms.
{"title":"Search and Rescue Optimization to solve Economic Emission Dispatch","authors":"P. A, S. T., M. B, R. Krishnakumar","doi":"10.1109/ICEEICT53079.2022.9768510","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768510","url":null,"abstract":"The combination of fuel cost and emission dispatch minimizes fuel cost factors and gas emissions to provide optimal performance for the generation units located in a power plant, ensuring demand supply. The former variable is absolute to maintain business permanence, and the latter to assure compliance with ecological regulation and no environmental harm. This work investigates the application of a new optimization technique known as the Search and Rescue Optimization Algorithm (SAR), which improves searching capability by employing specified parameters. This algorithm has three effective parameters and works with all generators to minimize the cost and emission while satisfying the defined demand. Simulations were run on multiple IEEE test systems with varying demand values. The obtained findings were compared to each other as well as to the results of other procedures mentioned in the literature. The acquired results appear to be superior to those achieved by other metaheuristics algorithms.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128264355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768426
Srinivas Jagirdar, K. Reddy
Five novel Local Binary Pattern (LBP) based descriptors are presented in this paper for performing texture analysis of an image. The performance of any texture classification method depends upon its dimensionality. As existing lo-cal based extractor methods generate descriptors with huge dimensions, the classifiers using them will suffer. In order to deal with this problem Uniform Weighted LBP (UWLBP), Strong and Uniform Weighted -LBP (SUWLBP), Uni-form Circular and Elliptical Weighted Texture Matrix (UCEWTM), Strong and Uniform CEWTM (SUCEWTM) and Strong and Uniform Twofold Spatial Weighted Complex Patterns (SUTSWCP) are proposed in this paper. The out-puts of these descriptors are fed into machine learning algorithms like NavieBayes (NB), Multilayer-perceptron (MLP), Ibk and J48. Image datasets like Brodtaz, UIUC, Outex-TC-12, KTH-TIPS, ALOT were used to train and test the models. The five descriptors were combined with MLP and compared. The CEWSTM coupled with MLP attained has attained a classification rate of 93.11 % which is the best out of the proposed five descriptors.
{"title":"Feature Descriptors based on Circular Forms of Local Patterns for Texture Classification","authors":"Srinivas Jagirdar, K. Reddy","doi":"10.1109/ICEEICT53079.2022.9768426","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768426","url":null,"abstract":"Five novel Local Binary Pattern (LBP) based descriptors are presented in this paper for performing texture analysis of an image. The performance of any texture classification method depends upon its dimensionality. As existing lo-cal based extractor methods generate descriptors with huge dimensions, the classifiers using them will suffer. In order to deal with this problem Uniform Weighted LBP (UWLBP), Strong and Uniform Weighted -LBP (SUWLBP), Uni-form Circular and Elliptical Weighted Texture Matrix (UCEWTM), Strong and Uniform CEWTM (SUCEWTM) and Strong and Uniform Twofold Spatial Weighted Complex Patterns (SUTSWCP) are proposed in this paper. The out-puts of these descriptors are fed into machine learning algorithms like NavieBayes (NB), Multilayer-perceptron (MLP), Ibk and J48. Image datasets like Brodtaz, UIUC, Outex-TC-12, KTH-TIPS, ALOT were used to train and test the models. The five descriptors were combined with MLP and compared. The CEWSTM coupled with MLP attained has attained a classification rate of 93.11 % which is the best out of the proposed five descriptors.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127252271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768604
B. N. V. V. P. Chimakurthi, K. Prakash
Personal authentication is the procedure which is used numeral times around world by way of utilizing various methods and procedures. The best method for confirming an alphanumerical secret phrase is used for many years. Additionally, alphabet and passwords have enormous security issues like people forgetting key combinations due to difficult key combination selection. Additionally, when choosing a simple key aggregate, facilitates cybercriminals to decrypt their passwords more without problems. Regular passwords are susceptible to several sorts of attacks, for example, dictionary attacks, aggressive attacks, and malware. To offer a more secure and relaxed authentication method, a photographic authentication is presented on this page. Here we provide user protection and authentication. This paper includes parts, picture processing the usage of the selected click on vicinity and video processing the usage of click on durations, wherein your mixture of each will generate a password for the person to sign in. To log in, both combos have to be same. The user is allowed to pick his or her photograph and video alternatives and is saved on a notably non-public web site so that it isn't always accessible to different clients. The secret key produced for both previews and video is stowed away from the two clients and developers. This method is to be needed to save you unapproved get admission to large and selective information and to ensure it.
{"title":"Image and Video-based Graphical Password Authentication","authors":"B. N. V. V. P. Chimakurthi, K. Prakash","doi":"10.1109/ICEEICT53079.2022.9768604","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768604","url":null,"abstract":"Personal authentication is the procedure which is used numeral times around world by way of utilizing various methods and procedures. The best method for confirming an alphanumerical secret phrase is used for many years. Additionally, alphabet and passwords have enormous security issues like people forgetting key combinations due to difficult key combination selection. Additionally, when choosing a simple key aggregate, facilitates cybercriminals to decrypt their passwords more without problems. Regular passwords are susceptible to several sorts of attacks, for example, dictionary attacks, aggressive attacks, and malware. To offer a more secure and relaxed authentication method, a photographic authentication is presented on this page. Here we provide user protection and authentication. This paper includes parts, picture processing the usage of the selected click on vicinity and video processing the usage of click on durations, wherein your mixture of each will generate a password for the person to sign in. To log in, both combos have to be same. The user is allowed to pick his or her photograph and video alternatives and is saved on a notably non-public web site so that it isn't always accessible to different clients. The secret key produced for both previews and video is stowed away from the two clients and developers. This method is to be needed to save you unapproved get admission to large and selective information and to ensure it.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127343479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768464
Sumalatha A, A. B. Rao, Kandru Sudha Rani
An increasing dissemination of renewable energy is posing significant challenges to a power system due to characteristic sporadicity. Obtaining the rapid grid balance through the management of power output by conventional power plant is of highest priority to make renewable energy sustainable. These rapid changes in power demand cause severe changes especially in the operation of steam boiler in thermal power generation. This paper presents design of boiler level control schemes to improve control performance through system identification techniques. Different operating conditions are considered to improve the performance of the control system. Different controller tuning methods are simulated to check the performance of different controller modes with different estimated models. The data driven modeling and design of model based control is found to be a suitable solution to assimilate more advanced control schemes.
{"title":"An Experimental study of Boiler Drum Level Controller performance through System Identification Models","authors":"Sumalatha A, A. B. Rao, Kandru Sudha Rani","doi":"10.1109/ICEEICT53079.2022.9768464","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768464","url":null,"abstract":"An increasing dissemination of renewable energy is posing significant challenges to a power system due to characteristic sporadicity. Obtaining the rapid grid balance through the management of power output by conventional power plant is of highest priority to make renewable energy sustainable. These rapid changes in power demand cause severe changes especially in the operation of steam boiler in thermal power generation. This paper presents design of boiler level control schemes to improve control performance through system identification techniques. Different operating conditions are considered to improve the performance of the control system. Different controller tuning methods are simulated to check the performance of different controller modes with different estimated models. The data driven modeling and design of model based control is found to be a suitable solution to assimilate more advanced control schemes.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130516590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768600
B. Pitchaimanickam
Wireless sensor networks provide an emerging technology for developing time-sensitive applications. Resource handling is an important process for data communication. Topology control is a significant feature in the sensors for effectively handling the resources in an effective manner. Multiple sink placements are the effective solution for planning and controlling the topology. In this paper, Grey Wolf Optimization (GWO) is proposed for placing an optimal position of the multiple sinks. This algorithm is developed by using the hunting mechanism and leadership hierarchy of the grey wolf. Hop count and distance from nodes to sinks are considered to achieve energy efficiency in WSN. The simulation results provide superior results when compared to DPSO and BFA algorithms. The proposed methodology minimizes the delay and energy usage and also enhances the lifetime of the network.
{"title":"Grey Wolf Optimization for Effective Sink Placement in Wireless Sensor Networks","authors":"B. Pitchaimanickam","doi":"10.1109/ICEEICT53079.2022.9768600","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768600","url":null,"abstract":"Wireless sensor networks provide an emerging technology for developing time-sensitive applications. Resource handling is an important process for data communication. Topology control is a significant feature in the sensors for effectively handling the resources in an effective manner. Multiple sink placements are the effective solution for planning and controlling the topology. In this paper, Grey Wolf Optimization (GWO) is proposed for placing an optimal position of the multiple sinks. This algorithm is developed by using the hunting mechanism and leadership hierarchy of the grey wolf. Hop count and distance from nodes to sinks are considered to achieve energy efficiency in WSN. The simulation results provide superior results when compared to DPSO and BFA algorithms. The proposed methodology minimizes the delay and energy usage and also enhances the lifetime of the network.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131351185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768451
R. Sasikumar, D. Vaman, S. Poulose
Mobile Ad hoc Network (MANET) is designed to support flexible and seamless deployment for military and homeland security theatres, where every resource is mobile. The resources include radios and base stations. In this paper, we have considered the MANET architecture in terms of multiple clusters with each cluster containing a set of radios and a base station or a Cluster Head (CH). The number of radios in each cluster is selected based on the tactical operation of MANET for different applications. A radio in one cluster can communicate with a radio in a different cluster. For this to occur, radio in source cluster sends data to its own Cluster Head (intra-cluster communication) and the Cluster Head sends this data to a remote Cluster Head (inter-cluster communication) and ultimately to a remote radio (intra-cluster communication). In this paper, only intra-cluster communication is considered at the IP layer and the Physical Layer, where each radio communicates with the CH. When multiple radios are communicating with the CH, there is a need to support an organized method of sending packets without any contention. This paper presents a novel Radio Access Protocol (RAP) for packet exchanges between radios and the CH. The cluster performance is derived in terms of “effective packet transmission time” from any radio to CH while executing the access protocol. The performance in terms of delay and throughput are presented for different packet sizes. The results show that for a reasonable size of cluster, RAP achieves the throughput greater than 55 percent with minimal delay of transmission of a packet from the radio to the CH. The performance of RAP considers both the IP layer and the Physical layer and the real time system implementation of RAP is done using MATLAB / Simulink and the results are presented.
{"title":"Packet Transmission using Radio Access Protocol for Intra-Cluster Communications in Mobile Ad hoc Networks","authors":"R. Sasikumar, D. Vaman, S. Poulose","doi":"10.1109/ICEEICT53079.2022.9768451","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768451","url":null,"abstract":"Mobile Ad hoc Network (MANET) is designed to support flexible and seamless deployment for military and homeland security theatres, where every resource is mobile. The resources include radios and base stations. In this paper, we have considered the MANET architecture in terms of multiple clusters with each cluster containing a set of radios and a base station or a Cluster Head (CH). The number of radios in each cluster is selected based on the tactical operation of MANET for different applications. A radio in one cluster can communicate with a radio in a different cluster. For this to occur, radio in source cluster sends data to its own Cluster Head (intra-cluster communication) and the Cluster Head sends this data to a remote Cluster Head (inter-cluster communication) and ultimately to a remote radio (intra-cluster communication). In this paper, only intra-cluster communication is considered at the IP layer and the Physical Layer, where each radio communicates with the CH. When multiple radios are communicating with the CH, there is a need to support an organized method of sending packets without any contention. This paper presents a novel Radio Access Protocol (RAP) for packet exchanges between radios and the CH. The cluster performance is derived in terms of “effective packet transmission time” from any radio to CH while executing the access protocol. The performance in terms of delay and throughput are presented for different packet sizes. The results show that for a reasonable size of cluster, RAP achieves the throughput greater than 55 percent with minimal delay of transmission of a packet from the radio to the CH. The performance of RAP considers both the IP layer and the Physical layer and the real time system implementation of RAP is done using MATLAB / Simulink and the results are presented.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"261 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113965539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768492
Inba Rexy, N. Mary, Jino Starlin, Raymoniya Elizabeth
This paper presents a design technique to construct a fuzzy logic controller (FLC) for interleaved Boost Converter. Control of the interleaved boost converter is a difficult task due to the nonlinearity. Rigorous research is made in improving innovative control strategies which makes sure of the stability of output voltage even under changing load, input voltage and parameters variations. The purpose is to aim for possibilities of using a fuzzy logic controller to control the output. Interleaved boost converter is mainly employed for renewable applications as it has less power losses and fewer ripples. Performance of the proposed converter is also analyzed. The desirable output is obtained when the converter is controlled using the fuzzy logic. Converter exhibits better performance under FLC by providing an output with very minimal error and zero ripples. This paper provides complete Simulink models along with their respective simulation results using MATLAB.
{"title":"Interleaved Boost Converter with Fuzzy Logic Controller","authors":"Inba Rexy, N. Mary, Jino Starlin, Raymoniya Elizabeth","doi":"10.1109/ICEEICT53079.2022.9768492","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768492","url":null,"abstract":"This paper presents a design technique to construct a fuzzy logic controller (FLC) for interleaved Boost Converter. Control of the interleaved boost converter is a difficult task due to the nonlinearity. Rigorous research is made in improving innovative control strategies which makes sure of the stability of output voltage even under changing load, input voltage and parameters variations. The purpose is to aim for possibilities of using a fuzzy logic controller to control the output. Interleaved boost converter is mainly employed for renewable applications as it has less power losses and fewer ripples. Performance of the proposed converter is also analyzed. The desirable output is obtained when the converter is controlled using the fuzzy logic. Converter exhibits better performance under FLC by providing an output with very minimal error and zero ripples. This paper provides complete Simulink models along with their respective simulation results using MATLAB.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124955377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768605
C. Rao, M. Sankaraiah, P.Siva Prasad
This work presents genetic algorithm-based power system stabilizers for conventional generators and genetic algorithm-based PI controllers for double fed induction generators (DFIGs) for enhancing dynamic stability of inter connected power system. This methodology is to inspect the vigorous dependability examination of various power frameworks, for example, wind power penetrations and fault conditions. The approach enjoys a few benefits compared with our past work. In the this method the parameters of DFIG controllers and power system stabilizers are tuned using genetic algorithm by maximizing fitness function, this function is formulated as a reciprocal of integral time area error (ITAE) of speed deviations of generators. In this paper the controller is examined on a classical “4 generator 11-bus” assessed energy framework, performance is compared with new set approach (Km theory). Results demonstrated that the controller is effectively damping the oscillations compared with new set approach.
{"title":"Genetic Algorithm based controllers for Robust Stability Enhancement of interconnected Power System with wind power penetration","authors":"C. Rao, M. Sankaraiah, P.Siva Prasad","doi":"10.1109/ICEEICT53079.2022.9768605","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768605","url":null,"abstract":"This work presents genetic algorithm-based power system stabilizers for conventional generators and genetic algorithm-based PI controllers for double fed induction generators (DFIGs) for enhancing dynamic stability of inter connected power system. This methodology is to inspect the vigorous dependability examination of various power frameworks, for example, wind power penetrations and fault conditions. The approach enjoys a few benefits compared with our past work. In the this method the parameters of DFIG controllers and power system stabilizers are tuned using genetic algorithm by maximizing fitness function, this function is formulated as a reciprocal of integral time area error (ITAE) of speed deviations of generators. In this paper the controller is examined on a classical “4 generator 11-bus” assessed energy framework, performance is compared with new set approach (Km theory). Results demonstrated that the controller is effectively damping the oscillations compared with new set approach.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132183380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768506
Jose Cornejo, Victor Cruz, Fernando Carrillo, Roger Cerda, Edward Russel Sanchez Penadillo
Since the beginning of 2020, Peru has been exposed to the inevitable spread of Covid-19, a highly contagious disease that is increasing around the world rapidly. Scientists and researchers propose various solutions to mitigate its effects or reduce infections, from simple procedures to complex systems such as robots or vaccines. For this reason, innovative research was carried out from 2020 to 2021 under the supervision of the school of Mechatronics Engineering at U niversidad Tecnologica del Peru, so, this article, presents a SCARA robot prototype capable of performing rapid tests with blood samples to detect Covid-19. In addition, the robot has 4 servomotors and impactive end effector. In addition, this robot has 4 degrees of freedom, and this type was chosen for its speed and flexibility. This study develops a mechatronics conceptual design and kinematic analysis using the Denavit Hartenberg method using Matlab and, CAD in SolidWorks 2021. In conclusion, the purpose is to decrease the workload and protect the lives of people who perform the lab tests, being able to process them with greater precision.
{"title":"Mechatronics Design and Kinematic Simulation of SCARA Robot to improve Safety and Time Processing of Covid-19 Rapid Test","authors":"Jose Cornejo, Victor Cruz, Fernando Carrillo, Roger Cerda, Edward Russel Sanchez Penadillo","doi":"10.1109/ICEEICT53079.2022.9768506","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768506","url":null,"abstract":"Since the beginning of 2020, Peru has been exposed to the inevitable spread of Covid-19, a highly contagious disease that is increasing around the world rapidly. Scientists and researchers propose various solutions to mitigate its effects or reduce infections, from simple procedures to complex systems such as robots or vaccines. For this reason, innovative research was carried out from 2020 to 2021 under the supervision of the school of Mechatronics Engineering at U niversidad Tecnologica del Peru, so, this article, presents a SCARA robot prototype capable of performing rapid tests with blood samples to detect Covid-19. In addition, the robot has 4 servomotors and impactive end effector. In addition, this robot has 4 degrees of freedom, and this type was chosen for its speed and flexibility. This study develops a mechatronics conceptual design and kinematic analysis using the Denavit Hartenberg method using Matlab and, CAD in SolidWorks 2021. In conclusion, the purpose is to decrease the workload and protect the lives of people who perform the lab tests, being able to process them with greater precision.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130321076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768413
P. Rahul Lal, A. Purushothaman
The antenna under study is an extended version of a cylindrical waveguide-based leaky-wave antenna. A cylindrical waveguide is attached to a spherical cavity on one end. The radiating slot in the form of a cylindrical disk is placed at the center of the cavity to achieve the leaky wave characteristics. The combined structure resembles the shape of a mic. The unique characteristics of this shape enable the antenna to radiate in four different directions there by producing a cross-shaped radiation pattern. Novel design exploits the advantages offered by the material body through analysis to maximize the antenna features such as gain, return loss and polarization. The antenna presented in the current literature operates at 90GHz with a moderate gain of 8.7dB in the downward direction, 4.9dB in the upward direction and 3.45dB towards the sides.
{"title":"Design of a Leaky Wave Multi-Beam Antenna with a Cross Shaped Pattern","authors":"P. Rahul Lal, A. Purushothaman","doi":"10.1109/ICEEICT53079.2022.9768413","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768413","url":null,"abstract":"The antenna under study is an extended version of a cylindrical waveguide-based leaky-wave antenna. A cylindrical waveguide is attached to a spherical cavity on one end. The radiating slot in the form of a cylindrical disk is placed at the center of the cavity to achieve the leaky wave characteristics. The combined structure resembles the shape of a mic. The unique characteristics of this shape enable the antenna to radiate in four different directions there by producing a cross-shaped radiation pattern. Novel design exploits the advantages offered by the material body through analysis to maximize the antenna features such as gain, return loss and polarization. The antenna presented in the current literature operates at 90GHz with a moderate gain of 8.7dB in the downward direction, 4.9dB in the upward direction and 3.45dB towards the sides.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117147488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}