Pub Date : 2020-05-30DOI: 10.35940/ijrte.f9536.059120
The multi-function phased array radar (MPAR) is used for weather monitoring, air-traffic control requirements and non-cooperative elements monitoring in a parallel manner. The amplitude of the radio frequency signal is varied depending on the location of the target from the radar. The proposed work generates a signal which is used as a input for RF transmitter of Multifunction Phased Array Radar. To achieve this MPAR requirement, the in-phase and quadrature-phase samples are generated for a high data rate using MATLAB and then VHDL output was obtained from Xilinx for QPSK and QAM modulation techniques.
{"title":"Baseband Signal Generation for Multi-Function Phased Array Radar","authors":"","doi":"10.35940/ijrte.f9536.059120","DOIUrl":"https://doi.org/10.35940/ijrte.f9536.059120","url":null,"abstract":"The multi-function phased array radar (MPAR) is used for weather monitoring, air-traffic control requirements and non-cooperative elements monitoring in a parallel manner. The amplitude of the radio frequency signal is varied depending on the location of the target from the radar. The proposed work generates a signal which is used as a input for RF transmitter of Multifunction Phased Array Radar. To achieve this MPAR requirement, the in-phase and quadrature-phase samples are generated for a high data rate using MATLAB and then VHDL output was obtained from Xilinx for QPSK and QAM modulation techniques.","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125572423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-30DOI: 10.35940/ijrte.a2657.059120
Damage caused due to phishing attacks is that which targets the user's personal information. Phishing includes sending a user an email, or causing a phishing page to steal personal information from a user. Blacklist-based detection techniques can detect this form of attack; however, these approaches have certain limitations, and the number of people affecting have continued to grow. The aim of a technique for phishing detection using machine learning to identify each URL into either a legitimate URL or a phished URL. Data availability here in this proposed solution is the key to executing the solution and if there is any issue with data availability it can cost the project accuracy. Data used for model testing must be reliable and appropriate to almost identify all the websites that the user wants to check. Model consistency is another factor that may trigger project failure so the model has to be accurate in determining a true identity of URLs. This technique employs features of a standardized resource locator (URL). The features have been defined which contain URLs for the phishing site. The suggested approach employs certain characteristics to detect phishing. The strategy was tested with a data collection of 3,000 URLs for the phishing site and 3,000 valid URLs for the site. The findings show that more than 90 percent of phishing sites can be identified by the proposed technique
{"title":"URL Based Phishing Detection","authors":"","doi":"10.35940/ijrte.a2657.059120","DOIUrl":"https://doi.org/10.35940/ijrte.a2657.059120","url":null,"abstract":"Damage caused due to phishing attacks is that which targets the user's personal information. Phishing includes sending a user an email, or causing a phishing page to steal personal information from a user. Blacklist-based detection techniques can detect this form of attack; however, these approaches have certain limitations, and the number of people affecting have continued to grow. The aim of a technique for phishing detection using machine learning to identify each URL into either a legitimate URL or a phished URL. Data availability here in this proposed solution is the key to executing the solution and if there is any issue with data availability it can cost the project accuracy. Data used for model testing must be reliable and appropriate to almost identify all the websites that the user wants to check. Model consistency is another factor that may trigger project failure so the model has to be accurate in determining a true identity of URLs. This technique employs features of a standardized resource locator (URL). The features have been defined which contain URLs for the phishing site. The suggested approach employs certain characteristics to detect phishing. The strategy was tested with a data collection of 3,000 URLs for the phishing site and 3,000 valid URLs for the site. The findings show that more than 90 percent of phishing sites can be identified by the proposed technique","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126823166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-30DOI: 10.35940/ijrte.a2186.059120
M. Moudgil, A. Lamba, Priya Gupta
Cloud Computing has a several advantages, but it also carries additional issues like security, application security, virtualization security, authentication, access control and identity management. This paper is focusing on the current research relating on the cloud computing. This paper visualizes and deals on the various areas of security parameters in the cloud computing which includes Risk Management, Framework, Compliance, Interoperability, Lifecycle Management, Internet access Security, Data Centre Operations, Business Continuity, Incident Response, Key Management and Encryption, Access Management and identity, Dynamic access Security and Static Access Security and a lot more. In this paper we use various assessments and classification results to clear the similarities, also to exploring the various differences in the architectural methods of the cloud computing and further to determine the arears demanding with research. This paper provides findings and the assessments which can help the researcher to analysing the finest scenario for designing a well secured environment of cloud computing
{"title":"Assessment of Different Security Mechanisms and Methods to Protect Data in the Cloud Computing Enviornment","authors":"M. Moudgil, A. Lamba, Priya Gupta","doi":"10.35940/ijrte.a2186.059120","DOIUrl":"https://doi.org/10.35940/ijrte.a2186.059120","url":null,"abstract":"Cloud Computing has a several advantages, but it also carries additional issues like security, application security, virtualization security, authentication, access control and identity management. This paper is focusing on the current research relating on the cloud computing. This paper visualizes and deals on the various areas of security parameters in the cloud computing which includes Risk Management, Framework, Compliance, Interoperability, Lifecycle Management, Internet access Security, Data Centre Operations, Business Continuity, Incident Response, Key Management and Encryption, Access Management and identity, Dynamic access Security and Static Access Security and a lot more. In this paper we use various assessments and classification results to clear the similarities, also to exploring the various differences in the architectural methods of the cloud computing and further to determine the arears demanding with research. This paper provides findings and the assessments which can help the researcher to analysing the finest scenario for designing a well secured environment of cloud computing","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123304746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-30DOI: 10.35940/ijrte.a3074.059120
This paper principally combines ideas of laptop vision, machine learning and deep learning for correct detection of traffic lights and their classifications. It checks for each circular and arrow stoplight cases. Color filtering and blob discover ion area unit principally to detect the candidates (traffic lights) [6]. Then, a PCA network is employed as a multiclass classifier which provides the result sporadically. MOT will used for more trailing method and prediction filters out false positives. Sometimes, vote theme can even be used rather than MOT. This method will be simply fitted into ADAS vehicles once hardware thinks about. Recognition is as vital as detective work the traffic lights. While not recognition, no full data will be transmitted [2]. Many complicated TLR’s will give advance functions like observing the most the most for a specific route (when there's quite one) and the way removed from the driving force [3]. Deep learning is additionally one among the rising techniques for analysis areas [7]. Object detection comes as associate integral a part of laptop vision. Object detection will be best utilized in create estimation, vehicle detection, police work etc. In detection algorithms, we tend to incline to draw a bounding box round the object of interest to find it among the image. Also, the drawing of the bounding box isn't distinctive and might hyperbolically looking on the need [9].
{"title":"An Insight into Traffic Light Discernment and Cognizance using Support Vector Machine, Multi Class Learning and Deep Learning Concepts","authors":"","doi":"10.35940/ijrte.a3074.059120","DOIUrl":"https://doi.org/10.35940/ijrte.a3074.059120","url":null,"abstract":"This paper principally combines ideas of laptop vision, machine learning and deep learning for correct detection of traffic lights and their classifications. It checks for each circular and arrow stoplight cases. Color filtering and blob discover ion area unit principally to detect the candidates (traffic lights) [6]. Then, a PCA network is employed as a multiclass classifier which provides the result sporadically. MOT will used for more trailing method and prediction filters out false positives. Sometimes, vote theme can even be used rather than MOT. This method will be simply fitted into ADAS vehicles once hardware thinks about. Recognition is as vital as detective work the traffic lights. While not recognition, no full data will be transmitted [2]. Many complicated TLR’s will give advance functions like observing the most the most for a specific route (when there's quite one) and the way removed from the driving force [3]. Deep learning is additionally one among the rising techniques for analysis areas [7]. Object detection comes as associate integral a part of laptop vision. Object detection will be best utilized in create estimation, vehicle detection, police work etc. In detection algorithms, we tend to incline to draw a bounding box round the object of interest to find it among the image. Also, the drawing of the bounding box isn't distinctive and might hyperbolically looking on the need [9].","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123392016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-30DOI: 10.35940/ijrte.a2722.059120
The effect of the parameters of isothermal treatment at low temperatures, also called Austempering, on the impact toughness, hardness and microstructure of AISI 4340 steel was investigated. For this purpose, specimens for impact toughness tests were machined according to ASTM E 23-93a. For hardness tests, prismatic bars of 10mmx10mmx30 mm were manufactured. Austempering was performed in a salt bath furnace using 55% sodium nitrate and 45% potassium nitrate. Three temperatures: 300, 325 and 350 °C, and four soaking times: 1 min, 10 min, 1 hour and 10 hours, were used. Hardness tests were performed on Rockwell durometer and three indentations per sample on HRc scale were made. The impact toughness test was done with the Charpy method. The specimens, previously machined, were subjected to austempering, and then subjected to the respective tests. The maximum hardness value 56.75 HRC was found at 300 °C with 10 min of soaking time, and the maximum impact toughness value was 27.67 J, found under the same conditions. It was observed that the hardness and impact resistance are not always inversely related during Austempering. In all microstructure tests, a biphasic structure composed of lower bainite with lath martensite in different proportions was observed, showing that the bainitic reaction is never complete. it is concluded that when alloyed steels are subjected to the Austempering treatment, a decrease in hardness with the soaking time or variation in temperatura, is not always accompanied by an increase in impact toughness, since undissolved alloyed carbides can produce embrittlement at any time and temperature interval.
{"title":"Isothermal Treatment at Low Temperatures Applied to AISI 4340 Steel: Effects on Hardness, Toughness and Microstructure","authors":"","doi":"10.35940/ijrte.a2722.059120","DOIUrl":"https://doi.org/10.35940/ijrte.a2722.059120","url":null,"abstract":"The effect of the parameters of isothermal treatment at low temperatures, also called Austempering, on the impact toughness, hardness and microstructure of AISI 4340 steel was investigated. For this purpose, specimens for impact toughness tests were machined according to ASTM E 23-93a. For hardness tests, prismatic bars of 10mmx10mmx30 mm were manufactured. Austempering was performed in a salt bath furnace using 55% sodium nitrate and 45% potassium nitrate. Three temperatures: 300, 325 and 350 °C, and four soaking times: 1 min, 10 min, 1 hour and 10 hours, were used. Hardness tests were performed on Rockwell durometer and three indentations per sample on HRc scale were made. The impact toughness test was done with the Charpy method. The specimens, previously machined, were subjected to austempering, and then subjected to the respective tests. The maximum hardness value 56.75 HRC was found at 300 °C with 10 min of soaking time, and the maximum impact toughness value was 27.67 J, found under the same conditions. It was observed that the hardness and impact resistance are not always inversely related during Austempering. In all microstructure tests, a biphasic structure composed of lower bainite with lath martensite in different proportions was observed, showing that the bainitic reaction is never complete. it is concluded that when alloyed steels are subjected to the Austempering treatment, a decrease in hardness with the soaking time or variation in temperatura, is not always accompanied by an increase in impact toughness, since undissolved alloyed carbides can produce embrittlement at any time and temperature interval.","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121447220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-30DOI: 10.35940/ijrte.a2873.059120
In recent decade’s severe natural or artificial disaster and further geologic processes have occurred with catastrophic consequences. Timely it should be detected and make it recovery. So, in this paper, we had proposed a multiterrain robot and other software systems to ease the detection. As the demand for multi-terrain robot applications are increasing significantly. This robot can be deployed for the use of assured future surveillance and extricate purposes in the isolated areas. In isolated areas robot stability will be challenging task due to varied terrain. A new design is propounded for the mobile robot which aims to execute monitoring performances while travelling on terrain types in balanced way. A chain-wheeled multi-terrain robot has been evolved which has ability to run in rough and unmanned surfaces.
{"title":"IoT Based Post Disaster Recovery System using Smartphone","authors":"","doi":"10.35940/ijrte.a2873.059120","DOIUrl":"https://doi.org/10.35940/ijrte.a2873.059120","url":null,"abstract":"In recent decade’s severe natural or artificial disaster and further geologic processes have occurred with catastrophic consequences. Timely it should be detected and make it recovery. So, in this paper, we had proposed a multiterrain robot and other software systems to ease the detection. As the demand for multi-terrain robot applications are increasing significantly. This robot can be deployed for the use of assured future surveillance and extricate purposes in the isolated areas. In isolated areas robot stability will be challenging task due to varied terrain. A new design is propounded for the mobile robot which aims to execute monitoring performances while travelling on terrain types in balanced way. A chain-wheeled multi-terrain robot has been evolved which has ability to run in rough and unmanned surfaces.","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"2018 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122276364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-30DOI: 10.35940/ijrte.f9596.059120
Wireless sensor nodes are tiny and have limited battery and memory. These sensor nodes are distributed and self organizing networks. Mobile Ad Hoc network (MANETs) has wide range of applications areas. Growing usage of MANETs in various applications makes a paramount issue in providing QoS. MANETs are vulnerable to different kinds of malicious attacks due to its dynamic nature, which affects nodes connectivity, increase in energy consumption and functionality. Centralized and cryptographic security approaches requires more computational functions which increases overhead. Traditional approaches have more overhead. Most existing trust-based security schemes for mobile ad-hoc networks (MANETs) consider packet loss an indicator of possible attacks by malicious nodes. Thus to achieve secure and reliable data transfer a trust aware scheme is required to evaluate trust level among honest and malicious nodes. In this paper we propose Trust Aware Scheme for Moving nodes (TASM) which discovers efficient node by computing each node’s trust value. In this scheme moving nodes exchange their trust information and analyses the received trust value and makes judgement. This scheme modifies the existing AODV routing protocol and determines malicious nodes based on trust value and log information. Received Signal Strength Indicator (RSSI) determines efficient and trusted neighbour node selection while routing. Proposed scheme is compared with the existing trust based scheme and network parameters like throughput, packet delivery ratio and end to end delay is evaluated. Trusted routing can efficiently deliver data for different routing applications used in military, Fanets and mobile IoT.
无线传感器节点很小,电池和内存有限。这些传感器节点是分布式自组织网络。移动自组网(manet)具有广泛的应用领域。在各种应用中不断增长的manet使用使得提供QoS成为一个至关重要的问题。由于其动态特性,manet容易受到各种恶意攻击,这会影响节点的连接,增加能耗和功能。集中式和加密安全方法需要更多的计算功能,这增加了开销。传统方法的开销更大。大多数现有的基于信任的移动自组织网络(manet)安全方案都将数据包丢失作为恶意节点可能攻击的指标。因此,为了实现安全可靠的数据传输,需要一种信任感知方案来评估诚实节点和恶意节点之间的信任程度。本文提出了移动节点信任感知方案(TASM),该方案通过计算每个节点的信任值来发现有效节点。在该方案中,移动节点相互交换信任信息,并对接收到的信任值进行分析和判断。该方案修改了现有的AODV路由协议,根据信任值和日志信息判断恶意节点。RSSI (Received Signal Strength Indicator,接收信号强度指示器)在路由过程中决定有效和可信的邻居节点选择。将提出的方案与现有的基于信任的方案进行了比较,并对吞吐量、分组投递率和端到端延迟等网络参数进行了评估。可信路由可以有效地为军事、fanet和移动物联网中使用的不同路由应用提供数据。
{"title":"TASM: Trust Aware Scheme for Secure and Reliable Data Transmission in MANETS","authors":"","doi":"10.35940/ijrte.f9596.059120","DOIUrl":"https://doi.org/10.35940/ijrte.f9596.059120","url":null,"abstract":"Wireless sensor nodes are tiny and have limited battery and memory. These sensor nodes are distributed and self organizing networks. Mobile Ad Hoc network (MANETs) has wide range of applications areas. Growing usage of MANETs in various applications makes a paramount issue in providing QoS. MANETs are vulnerable to different kinds of malicious attacks due to its dynamic nature, which affects nodes connectivity, increase in energy consumption and functionality. Centralized and cryptographic security approaches requires more computational functions which increases overhead. Traditional approaches have more overhead. Most existing trust-based security schemes for mobile ad-hoc networks (MANETs) consider packet loss an indicator of possible attacks by malicious nodes. Thus to achieve secure and reliable data transfer a trust aware scheme is required to evaluate trust level among honest and malicious nodes. In this paper we propose Trust Aware Scheme for Moving nodes (TASM) which discovers efficient node by computing each node’s trust value. In this scheme moving nodes exchange their trust information and analyses the received trust value and makes judgement. This scheme modifies the existing AODV routing protocol and determines malicious nodes based on trust value and log information. Received Signal Strength Indicator (RSSI) determines efficient and trusted neighbour node selection while routing. Proposed scheme is compared with the existing trust based scheme and network parameters like throughput, packet delivery ratio and end to end delay is evaluated. Trusted routing can efficiently deliver data for different routing applications used in military, Fanets and mobile IoT.","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"60 20","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114086153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-30DOI: 10.35940/ijeat.a2401.069520
RachanaDoshi, AmritaSutar, SonaliAher, Sanvida Dalvi, Prof. B R Chandani
The modern technology has increased the standard of living for the humans and the large crowds are seen at shopping malls. To save time for the customers,it is important to reduce the process of the billing time. This is done using smart shopping system based on RFID. Items that are put in a smart shopping cart are read one by one and the bill is generated and displayed. After the final bill is generated, the customer pays the bill by using their Pre-charged cards provided by the shopping mall. The aim is to reduce the time consumption needed for the billing system.
{"title":"Rfid Based Smart Trolley for Automatic Billing System","authors":"RachanaDoshi, AmritaSutar, SonaliAher, Sanvida Dalvi, Prof. B R Chandani","doi":"10.35940/ijeat.a2401.069520","DOIUrl":"https://doi.org/10.35940/ijeat.a2401.069520","url":null,"abstract":"The modern technology has increased the standard of living for the humans and the large crowds are seen at shopping malls. To save time for the customers,it is important to reduce the process of the billing time. This is done using smart shopping system based on RFID. Items that are put in a smart shopping cart are read one by one and the bill is generated and displayed. After the final bill is generated, the customer pays the bill by using their Pre-charged cards provided by the shopping mall. The aim is to reduce the time consumption needed for the billing system.","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"35 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114127914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-30DOI: 10.35940/ijrte.a2235.059120
Text summarization generates an abstract version of information on a particular topic from various sources without modifying its originality. It is essential to dig information from the large repository of data, thereby eliminating the irrelevant information. The manual summarization consumes a large amount of time and hence an automated text summarization model is required. The summarization can be performed from a single source or multiple sources. The Natural Language Processing (NLP) based text summarization can be generally categorized as abstractive and extractive methods. The extractive methods mine the essential text from the document whereas the abstractive methods summarize the document by rewriting. The extractive summarization methods rely on topics and centrality of the document. The abstractive techniques transform the sentences based on the language resources available. This paper deals with the study of extractive as well as abstractive strategies in text summarization. Overall objective of this paper is to provide a significant direction to the researchers to learn about different strategies applied in text summarization.
{"title":"Extractive and Abstractive Text Summarization Techniques","authors":"","doi":"10.35940/ijrte.a2235.059120","DOIUrl":"https://doi.org/10.35940/ijrte.a2235.059120","url":null,"abstract":"Text summarization generates an abstract version of information on a particular topic from various sources without modifying its originality. It is essential to dig information from the large repository of data, thereby eliminating the irrelevant information. The manual summarization consumes a large amount of time and hence an automated text summarization model is required. The summarization can be performed from a single source or multiple sources. The Natural Language Processing (NLP) based text summarization can be generally categorized as abstractive and extractive methods. The extractive methods mine the essential text from the document whereas the abstractive methods summarize the document by rewriting. The extractive summarization methods rely on topics and centrality of the document. The abstractive techniques transform the sentences based on the language resources available. This paper deals with the study of extractive as well as abstractive strategies in text summarization. Overall objective of this paper is to provide a significant direction to the researchers to learn about different strategies applied in text summarization.","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"422 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113998455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-30DOI: 10.35940/ijrte.a1302.059120
Fathy Ghonima, M. Ezzat, T. Abdel-salam
This paper deals with economic and technical evaluation of the hybrid power system which is fed six-megawatt load located in a city in Egypt called Hurghada. There is two types of economical evaluation. The first type is Economical evaluation which has two parts, the first part is cost estimation to know the price of generating power of the hybrid system in every season to reveal the lowest and the highest cost of the power unit in every season and The second part is an economic load dispatch for the six-megawatt load to know which hybrid system topology gives the required power at low cost and which topology gives the required power at a higher cost, economic load dispatch made for eight possible hybrid system topologies for four hybrid system units. The technical evaluation made by studying generating reliability indices Loss of Load Probability (LOLP), Loss of Load Expectation, (LOLE) Expected Energy Not Supplied (EENS) in every season of the year to know which season is more reliable to supply power to the load area. Studying generating reliability at the probabilities for generating units to achieve reliability index calculation according to the load duration curve of the load area in one year. The evaluation made by simulation of the hybrid system in MATLAB Simulink in every season and optimize power by using the Genetic Algorithm and Partial Swarm Optimization to ensure economical and technical optimal performance of the hybrid system
{"title":"Economical and Technical Assessment of Hybrid Renewable Energy Systems for Optimal Performance Applied in Hurghada, Egypt.","authors":"Fathy Ghonima, M. Ezzat, T. Abdel-salam","doi":"10.35940/ijrte.a1302.059120","DOIUrl":"https://doi.org/10.35940/ijrte.a1302.059120","url":null,"abstract":"This paper deals with economic and technical evaluation of the hybrid power system which is fed six-megawatt load located in a city in Egypt called Hurghada. There is two types of economical evaluation. The first type is Economical evaluation which has two parts, the first part is cost estimation to know the price of generating power of the hybrid system in every season to reveal the lowest and the highest cost of the power unit in every season and The second part is an economic load dispatch for the six-megawatt load to know which hybrid system topology gives the required power at low cost and which topology gives the required power at a higher cost, economic load dispatch made for eight possible hybrid system topologies for four hybrid system units. The technical evaluation made by studying generating reliability indices Loss of Load Probability (LOLP), Loss of Load Expectation, (LOLE) Expected Energy Not Supplied (EENS) in every season of the year to know which season is more reliable to supply power to the load area. Studying generating reliability at the probabilities for generating units to achieve reliability index calculation according to the load duration curve of the load area in one year. The evaluation made by simulation of the hybrid system in MATLAB Simulink in every season and optimize power by using the Genetic Algorithm and Partial Swarm Optimization to ensure economical and technical optimal performance of the hybrid system","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131593353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}