Pub Date : 2011-12-01DOI: 10.1109/NUICONE.2011.6153313
Sunit S. Shah, D. Adhyaru
Real-time data of boiler thermal efficiency can really reflect the boiler operation condition, heat generation and heat loss. Performance of the boiler, like efficiency and evaporation ratio reduces with time, due to poor combustion, heat transfer fouling and poor operation and maintenance. Boiler efficiency can be also useful in analysis of boiler and can also be used in predictive maintenance of the boiler. How to reduce problems of the boiler efficiency real-time computations and be successful in calculating the boiler thermal efficiency on line are the main concern of operation departments of power systems. Using Heat Input-Output method plant people can evaluate quickly the efficiency of boilers using few parameters
{"title":"Boiler efficiency analysis using direct method","authors":"Sunit S. Shah, D. Adhyaru","doi":"10.1109/NUICONE.2011.6153313","DOIUrl":"https://doi.org/10.1109/NUICONE.2011.6153313","url":null,"abstract":"Real-time data of boiler thermal efficiency can really reflect the boiler operation condition, heat generation and heat loss. Performance of the boiler, like efficiency and evaporation ratio reduces with time, due to poor combustion, heat transfer fouling and poor operation and maintenance. Boiler efficiency can be also useful in analysis of boiler and can also be used in predictive maintenance of the boiler. How to reduce problems of the boiler efficiency real-time computations and be successful in calculating the boiler thermal efficiency on line are the main concern of operation departments of power systems. Using Heat Input-Output method plant people can evaluate quickly the efficiency of boilers using few parameters","PeriodicalId":206392,"journal":{"name":"2011 Nirma University International Conference on Engineering","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125578455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/NUICONE.2011.6153298
Bhushan A. Ugale, P. Soni, Tsering Pema, Anirudha Patil
A secure, reliable and economic power supply is closely linked to a fast, efficient and dependable communications infrastructure. The appliance of the cloud computing model meets the requirements of data and computing intensive smart grid applications. Using internal network improves the calculation, storage capacity, data security of the overall system, reducing the system expansion investment, thus providing ideas and strong technical support in smart grid and large scale computing can be achieved over existing network. In this paper, we have focused to distributed verification protocol to guaranty the data storage security in cloud computing. This article also introduces the application field the merit of cloud computing, such as to reduce the users' cost. It provide secure and dependable data storage center. The intelligent control techniques lift the level of energy efficient and security lowering the level of the pollution and greenhouse gas emission. In this paper, we have proposed a internet connectivity device model instead of having C.P.U. and discs, for cloud computing.
{"title":"Role of cloud computing for smart grid of India and its cyber security","authors":"Bhushan A. Ugale, P. Soni, Tsering Pema, Anirudha Patil","doi":"10.1109/NUICONE.2011.6153298","DOIUrl":"https://doi.org/10.1109/NUICONE.2011.6153298","url":null,"abstract":"A secure, reliable and economic power supply is closely linked to a fast, efficient and dependable communications infrastructure. The appliance of the cloud computing model meets the requirements of data and computing intensive smart grid applications. Using internal network improves the calculation, storage capacity, data security of the overall system, reducing the system expansion investment, thus providing ideas and strong technical support in smart grid and large scale computing can be achieved over existing network. In this paper, we have focused to distributed verification protocol to guaranty the data storage security in cloud computing. This article also introduces the application field the merit of cloud computing, such as to reduce the users' cost. It provide secure and dependable data storage center. The intelligent control techniques lift the level of energy efficient and security lowering the level of the pollution and greenhouse gas emission. In this paper, we have proposed a internet connectivity device model instead of having C.P.U. and discs, for cloud computing.","PeriodicalId":206392,"journal":{"name":"2011 Nirma University International Conference on Engineering","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122966844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/NUICONE.2011.6153283
P. K. Singhal
This paper presents a lagrangian Relaxation based technique for solving the power system thermal unit commitment problem without time constraints (i.e. minimum-up and down time constraints are neglected). The specific technique described in this paper focuses on finding a feasible commitment and then attempting to improve on the optimality of the solution. A simplification of the possible paths to reach solution optimality is presented along with policy of updating the lagrange multipliers with minimum computational time. The feasibility of the method is demonstrated for 4-unit, 5-unit and 10-unit systems.
{"title":"Generation scheduling methodology for thermal units using lagrangian Relaxation","authors":"P. K. Singhal","doi":"10.1109/NUICONE.2011.6153283","DOIUrl":"https://doi.org/10.1109/NUICONE.2011.6153283","url":null,"abstract":"This paper presents a lagrangian Relaxation based technique for solving the power system thermal unit commitment problem without time constraints (i.e. minimum-up and down time constraints are neglected). The specific technique described in this paper focuses on finding a feasible commitment and then attempting to improve on the optimality of the solution. A simplification of the possible paths to reach solution optimality is presented along with policy of updating the lagrange multipliers with minimum computational time. The feasibility of the method is demonstrated for 4-unit, 5-unit and 10-unit systems.","PeriodicalId":206392,"journal":{"name":"2011 Nirma University International Conference on Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128634757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/NUICONE.2011.6153300
Parita G Dalwadi, V. Shrinet, C. R. Mehta, Pankit Shah
A wind-solar hybrid system is a reliable alternative energy source because it uses solar energy combined with wind energy to create a stand-alone energy source that is both dependable and consistent. Solar power or wind power alone can fluctuate, when used together they provide a reliable source of energy. The perfect solution is to combine these two forms of energy sources to create a constant energy flow. Main objective of this paper is to optimize stand-alone solar-wind hybrid power system and to maximize use of renewable energy generation system while minimizing the total system cost.
{"title":"Optimization of solar-wind hybrid system for distributed generation","authors":"Parita G Dalwadi, V. Shrinet, C. R. Mehta, Pankit Shah","doi":"10.1109/NUICONE.2011.6153300","DOIUrl":"https://doi.org/10.1109/NUICONE.2011.6153300","url":null,"abstract":"A wind-solar hybrid system is a reliable alternative energy source because it uses solar energy combined with wind energy to create a stand-alone energy source that is both dependable and consistent. Solar power or wind power alone can fluctuate, when used together they provide a reliable source of energy. The perfect solution is to combine these two forms of energy sources to create a constant energy flow. Main objective of this paper is to optimize stand-alone solar-wind hybrid power system and to maximize use of renewable energy generation system while minimizing the total system cost.","PeriodicalId":206392,"journal":{"name":"2011 Nirma University International Conference on Engineering","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123928578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/NUICONE.2011.6153255
N. Joshi, R. Lamba, D. Shah, Bhargav V. Ghadia
A biometric system provides automatic identification of an individual, based on a unique feature or characteristic possessed by the individual. Iris recognition is regarded as the most reliable and accurate biometric identification system available. Here, the segmented iris region is processed to allow comparisons with existing database (Normalization and Enhancement). The normalization process will produce iris regions, which have the same constant dimensions, so that two photographs of the same iris under different conditions will have characteristic features at the same spatial location. To convert iris into dimensionally compatible form, normalization technique was studied and various approaches of normalization are implemented. When needed, these approaches have been modified to achieve better performance. This electronic document represents implementation of various techniques for validation of this work.
{"title":"Implementation of various approaches for iris image normalization","authors":"N. Joshi, R. Lamba, D. Shah, Bhargav V. Ghadia","doi":"10.1109/NUICONE.2011.6153255","DOIUrl":"https://doi.org/10.1109/NUICONE.2011.6153255","url":null,"abstract":"A biometric system provides automatic identification of an individual, based on a unique feature or characteristic possessed by the individual. Iris recognition is regarded as the most reliable and accurate biometric identification system available. Here, the segmented iris region is processed to allow comparisons with existing database (Normalization and Enhancement). The normalization process will produce iris regions, which have the same constant dimensions, so that two photographs of the same iris under different conditions will have characteristic features at the same spatial location. To convert iris into dimensionally compatible form, normalization technique was studied and various approaches of normalization are implemented. When needed, these approaches have been modified to achieve better performance. This electronic document represents implementation of various techniques for validation of this work.","PeriodicalId":206392,"journal":{"name":"2011 Nirma University International Conference on Engineering","volume":"34 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124253531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/NUICONE.2011.6153262
J. Kene, K. Kulat
The recent trends in broadband wireless communication systems are demand for high data rates, large transmission range and minimum end to end delay. This is necessary to access the services such as Internet, Video conferences, and Multimedia applications. WiMax (Worldwide Interoprability for Microwave Access) technology provides Broadband Wireless Access (BWA) in metropolitan areas with a simpler installation and lower cost compare to wired networks. To understand the working of WiMax system and the role of various parameters on the system performance, the simulation model of WiMax physical layer using MatLab 7.5 version has been developed. Efforts have been taken to study the Bit Error Rate (BER) performance of this model under different channel conditions. Efforts are also taken to understand the effect of various Modulation techniques, Coding rates, cyclic prefix factors and FFT size on the system performance. The idea is to help the beginner to understand the system and to make the best possible system selection under different propogation conditions.
{"title":"Performance evaluation of IEEE 802.16e WiMax physical layer","authors":"J. Kene, K. Kulat","doi":"10.1109/NUICONE.2011.6153262","DOIUrl":"https://doi.org/10.1109/NUICONE.2011.6153262","url":null,"abstract":"The recent trends in broadband wireless communication systems are demand for high data rates, large transmission range and minimum end to end delay. This is necessary to access the services such as Internet, Video conferences, and Multimedia applications. WiMax (Worldwide Interoprability for Microwave Access) technology provides Broadband Wireless Access (BWA) in metropolitan areas with a simpler installation and lower cost compare to wired networks. To understand the working of WiMax system and the role of various parameters on the system performance, the simulation model of WiMax physical layer using MatLab 7.5 version has been developed. Efforts have been taken to study the Bit Error Rate (BER) performance of this model under different channel conditions. Efforts are also taken to understand the effect of various Modulation techniques, Coding rates, cyclic prefix factors and FFT size on the system performance. The idea is to help the beginner to understand the system and to make the best possible system selection under different propogation conditions.","PeriodicalId":206392,"journal":{"name":"2011 Nirma University International Conference on Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114200661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/NUICONE.2011.6153277
Ravinder Kumar, V. Srivastava
This paper presents a 2 GHz to 3 GHz Low Noise Amplifier (LNA) design based on a cascode topology. The proposed method is addressed to optimize noise performance and power efficiency while maintaining good input and output matching. This LNA has a measured power gain of 13.5dB and noise figure of 1.5 dB. The output insertion loss S22 is •9dB. input return loss (s11) is •22dB. The design simulation process is using Advance Design System (ADS) software and implemented in TSMC 0.18 µm CMOS technology with very low power dissipation.
{"title":"A 2.0 to 3.0 GHz CMOS low noise amplifier and its applications","authors":"Ravinder Kumar, V. Srivastava","doi":"10.1109/NUICONE.2011.6153277","DOIUrl":"https://doi.org/10.1109/NUICONE.2011.6153277","url":null,"abstract":"This paper presents a 2 GHz to 3 GHz Low Noise Amplifier (LNA) design based on a cascode topology. The proposed method is addressed to optimize noise performance and power efficiency while maintaining good input and output matching. This LNA has a measured power gain of 13.5dB and noise figure of 1.5 dB. The output insertion loss S22 is •9dB. input return loss (s11) is •22dB. The design simulation process is using Advance Design System (ADS) software and implemented in TSMC 0.18 µm CMOS technology with very low power dissipation.","PeriodicalId":206392,"journal":{"name":"2011 Nirma University International Conference on Engineering","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127893588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1007/978-81-322-0491-6_39
M. A. Wajeed, T. Adilakshmi
{"title":"Incorporating fuzzy clusters in semi-supervised text categorization","authors":"M. A. Wajeed, T. Adilakshmi","doi":"10.1007/978-81-322-0491-6_39","DOIUrl":"https://doi.org/10.1007/978-81-322-0491-6_39","url":null,"abstract":"","PeriodicalId":206392,"journal":{"name":"2011 Nirma University International Conference on Engineering","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126204471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/NUICONE.2011.6153258
D. Kothari, D. Patel
In most of the contention resolution methods for Optical Burst Switched (OBS) networks proposed in literature, the resolution algorithm is applied at the core node of the network. However, if it is applied at the ingress node rather than core node, the complexity in terms of cost of extra delay lines and overhead processing can be reduced considerably. This paper presents a comparative overview of contention resolution methods. A model is proposed based on varying the burst size at the burst generation stage. The results show that there is reduction in time delay and hence the contention is minimized. The comparison of proposed scheme with segment and drop policy of burst segmentation scheme shows that our scheme perform better under low load and extremely better under high load for contention resolution in the OBS network.
{"title":"The efficient contention resolution method for Optical Burst Switched network","authors":"D. Kothari, D. Patel","doi":"10.1109/NUICONE.2011.6153258","DOIUrl":"https://doi.org/10.1109/NUICONE.2011.6153258","url":null,"abstract":"In most of the contention resolution methods for Optical Burst Switched (OBS) networks proposed in literature, the resolution algorithm is applied at the core node of the network. However, if it is applied at the ingress node rather than core node, the complexity in terms of cost of extra delay lines and overhead processing can be reduced considerably. This paper presents a comparative overview of contention resolution methods. A model is proposed based on varying the burst size at the burst generation stage. The results show that there is reduction in time delay and hence the contention is minimized. The comparison of proposed scheme with segment and drop policy of burst segmentation scheme shows that our scheme perform better under low load and extremely better under high load for contention resolution in the OBS network.","PeriodicalId":206392,"journal":{"name":"2011 Nirma University International Conference on Engineering","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115979229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-12-01DOI: 10.1109/NUICONE.2011.6153237
K. Shah, Harsh K. Kapadia, V. Shah, Maurya Shah
This paper discusses about localization of license plate from vehicle images using different methods. And main focus is on Mean Shift Algorithm which is a non parametric feature space analysis technique. It defines a window around each data points and shifts the center of the window to the mean of the data point though a Mean-Shift Vector till it converges and window shifts to the denser region. The other methods used are Crop Object, Morphological operations, Localize the object by thresholding and area of object. We also discuss how Mean-Shift algorithm is accurate enough and robust to be used in the same area. This includes the basic definition of the algorithm and mathematical equations.
{"title":"Application of Mean-Shift algorithm for license plate localization","authors":"K. Shah, Harsh K. Kapadia, V. Shah, Maurya Shah","doi":"10.1109/NUICONE.2011.6153237","DOIUrl":"https://doi.org/10.1109/NUICONE.2011.6153237","url":null,"abstract":"This paper discusses about localization of license plate from vehicle images using different methods. And main focus is on Mean Shift Algorithm which is a non parametric feature space analysis technique. It defines a window around each data points and shifts the center of the window to the mean of the data point though a Mean-Shift Vector till it converges and window shifts to the denser region. The other methods used are Crop Object, Morphological operations, Localize the object by thresholding and area of object. We also discuss how Mean-Shift algorithm is accurate enough and robust to be used in the same area. This includes the basic definition of the algorithm and mathematical equations.","PeriodicalId":206392,"journal":{"name":"2011 Nirma University International Conference on Engineering","volume":"6 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129964009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}