Pub Date : 2014-11-01DOI: 10.1109/ICECCE.2014.7086638
Sandip K. Chaurasiya, Joydeep Mondal, S. Dutta
Evolution of very low-cost hardware, viz. low-resolution CMOS cameras and microphones, facilitating the retrieval of multimedia content from the environment, has prompted the conception of wireless multimedia sensor networks (WMSNs). Sensor nodes' energy consumption is still one of the main concerns while improving the network lifetime of the network and clustering has been proved an important tool in this regard. However, the directionally constrained sensing nature of nodes in one type of WMSN turned the routing solutions of wireless sensor networks (WSNs) inapplicable for WMSN. This paper proposes an energy-saving hierarchical clustering based on overlapping field-of-views (FoVs) of nodes in WMSN in presence of arbitrarily located obstacles within the network area. Performance of the proposed scheme is evaluated through simulation primarily to analyze the effect of obstacle in network area over clustering. Finally the efficacy of the scheme is measured in terms of network lifetime where results clearly show the present scheme's supremacy compared to one FoV based clustering with no hierarchy and the other with no clustering at all.
{"title":"Field-of-view based hierarchical clustering to prolong network lifetime of WMSN with obstacles","authors":"Sandip K. Chaurasiya, Joydeep Mondal, S. Dutta","doi":"10.1109/ICECCE.2014.7086638","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086638","url":null,"abstract":"Evolution of very low-cost hardware, viz. low-resolution CMOS cameras and microphones, facilitating the retrieval of multimedia content from the environment, has prompted the conception of wireless multimedia sensor networks (WMSNs). Sensor nodes' energy consumption is still one of the main concerns while improving the network lifetime of the network and clustering has been proved an important tool in this regard. However, the directionally constrained sensing nature of nodes in one type of WMSN turned the routing solutions of wireless sensor networks (WSNs) inapplicable for WMSN. This paper proposes an energy-saving hierarchical clustering based on overlapping field-of-views (FoVs) of nodes in WMSN in presence of arbitrarily located obstacles within the network area. Performance of the proposed scheme is evaluated through simulation primarily to analyze the effect of obstacle in network area over clustering. Finally the efficacy of the scheme is measured in terms of network lifetime where results clearly show the present scheme's supremacy compared to one FoV based clustering with no hierarchy and the other with no clustering at all.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125595195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICECCE.2014.7086616
Akash Devgun
A Bigdata is the vast information storage collected from various locations and sources. Bigdata is defined as centralized repository with a standard structural specification. But the information driven from various sources are not always appropriate for this structure. This kind of information suffers from number of associated impurities. These impurities include incompleteness, duplicate information, lack of association between dataset attributes etc. To represent this information in organized and structured form, there is the requirement of some algorithmic approach that can identify these impurities and accept the validated data. In this present work, a two stage mode is defined under machine learning approach to transformed unstructured data to structured form. In first stage of this model, a fuzzy based model is defined to analyze this user data. The analysis is performed here under the impurity type analysis and the association analysis. The fuzzy rule is implied here to identify the degree of impurity and the associativity. Once the analysis is performed, the final stage of work is the transformation approach. During this stage, the transformation of this unstructured data to structured data is performed. An ontology driven work is defined to define such mapping. The mapping is here performed under the domain constructs and the data constructs. The work is implemented in java environment. The obtained results from system shows the reliable and robust information mapping so that the effective information tracking over the dataset is obtained.
{"title":"A machine learning adaptive approach to remove impurities over Bigdata","authors":"Akash Devgun","doi":"10.1109/ICECCE.2014.7086616","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086616","url":null,"abstract":"A Bigdata is the vast information storage collected from various locations and sources. Bigdata is defined as centralized repository with a standard structural specification. But the information driven from various sources are not always appropriate for this structure. This kind of information suffers from number of associated impurities. These impurities include incompleteness, duplicate information, lack of association between dataset attributes etc. To represent this information in organized and structured form, there is the requirement of some algorithmic approach that can identify these impurities and accept the validated data. In this present work, a two stage mode is defined under machine learning approach to transformed unstructured data to structured form. In first stage of this model, a fuzzy based model is defined to analyze this user data. The analysis is performed here under the impurity type analysis and the association analysis. The fuzzy rule is implied here to identify the degree of impurity and the associativity. Once the analysis is performed, the final stage of work is the transformation approach. During this stage, the transformation of this unstructured data to structured data is performed. An ontology driven work is defined to define such mapping. The mapping is here performed under the domain constructs and the data constructs. The work is implemented in java environment. The obtained results from system shows the reliable and robust information mapping so that the effective information tracking over the dataset is obtained.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129805629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICECCE.2014.7086630
R. Mini, R. Sreenivasan, M. Dinesh
Direct Torque controlled (DTC) induction motor drive gives direct control of stator flux and electromagnetic torque. Conventional speed sensors are replaced in sensor less DTC to improve the reliability, noise immunity and to reduce the complexity of the system. In sensor less DTC the rotor speed estimation at low speeds is degraded by the stator resistance parameter variations due to temperature, dead time effects and voltage drop in power electronics devices. The open loop speed estimation used in sensor less DTC depends on various machine parameters. The stator resistance variation at low speeds degrades the speed estimation. In this paper investigation of sensor less DTC controlled induction motor at low speed range is carried out and to improve the speed estimation at low speed closed loop Model Reference Adaptive Scheme (MRAS) is used for speed estimation. Simulation is carried out in Matlab/Simulink platform and results are compared and presented.
{"title":"Low speed estimation of DTC controlled induction motor drive using MRAS","authors":"R. Mini, R. Sreenivasan, M. Dinesh","doi":"10.1109/ICECCE.2014.7086630","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086630","url":null,"abstract":"Direct Torque controlled (DTC) induction motor drive gives direct control of stator flux and electromagnetic torque. Conventional speed sensors are replaced in sensor less DTC to improve the reliability, noise immunity and to reduce the complexity of the system. In sensor less DTC the rotor speed estimation at low speeds is degraded by the stator resistance parameter variations due to temperature, dead time effects and voltage drop in power electronics devices. The open loop speed estimation used in sensor less DTC depends on various machine parameters. The stator resistance variation at low speeds degrades the speed estimation. In this paper investigation of sensor less DTC controlled induction motor at low speed range is carried out and to improve the speed estimation at low speed closed loop Model Reference Adaptive Scheme (MRAS) is used for speed estimation. Simulation is carried out in Matlab/Simulink platform and results are compared and presented.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129003337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICECCE.2014.7086652
Greety Jose, Nisha S. Raj
Today, digital mediated interactions and communications being an important constituent. The expeditious growth of electronic communications such as Emails, micro blogs, SMS and chats etc has fabricated extensively noisy forms of text. It predominantly in young urbanites. The tremendous growth of noises in text are due to a variety of factors, such as the small number of characters allowed per text messages (160 characters is allowed per SMS and 140 characters allowed per tweets), inventing new abbreviations, using non standard orthographic forms, phonetic substitution etc. In this paper we introduce a lexico-syntactic normalization model for cleaning the noisy texts. The normalization is based on the channelized database and a user feedback system. The syntactic analysis of sentences is based on a bottom up parser. The model will capture the user interaction for improving the model accuracy. Precursory evaluation shows that the channel model will normalize the noisy word to their standard peer with better accuracy. The sentence validation achieved 95.7% accuracy.
{"title":"Lexico-syntactic normalization model for noisy SMS text","authors":"Greety Jose, Nisha S. Raj","doi":"10.1109/ICECCE.2014.7086652","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086652","url":null,"abstract":"Today, digital mediated interactions and communications being an important constituent. The expeditious growth of electronic communications such as Emails, micro blogs, SMS and chats etc has fabricated extensively noisy forms of text. It predominantly in young urbanites. The tremendous growth of noises in text are due to a variety of factors, such as the small number of characters allowed per text messages (160 characters is allowed per SMS and 140 characters allowed per tweets), inventing new abbreviations, using non standard orthographic forms, phonetic substitution etc. In this paper we introduce a lexico-syntactic normalization model for cleaning the noisy texts. The normalization is based on the channelized database and a user feedback system. The syntactic analysis of sentences is based on a bottom up parser. The model will capture the user interaction for improving the model accuracy. Precursory evaluation shows that the channel model will normalize the noisy word to their standard peer with better accuracy. The sentence validation achieved 95.7% accuracy.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124085038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICECCE.2014.7086623
Gopalaiah, K. Suresh
Acoustic Echo Cancelation is a typical event in today's telecommunication fields. The input speech signal interference caused by acoustic echo is disturbing for both users side and causes a reduction in the quality of the original signal. The adaptive filtering techniques are used to reduce the unwanted echo, and increasing quality of the speech signal. This Paper focus on different Adaptive filters algorithms and characterized by the Normalized Least Mean Square (NLMS) and Variable Step Size Least Mean Square (VSSLMS) and also This Paper actualizes Real Time Acoustic Echo Cancellation on Tms320c6713dsk. The primary modules of this reverberation canceller are a versatile channel framework utilizing Normalized Least Mean Square (NLMS) calculation, a Double-Talk Detector (DTD) and a Non-Linear Processor (NLP). The Setup of NLMS based versatile framework, Modified NLMS with Variable Step Size calculations and Frequency Domain based Fast LMS algorithms are to be actualized on the DSP equipment. This implementation shows fast response, speed, convergence of time and good tracking capability. The calculation of different adaptive algorithms must be analysed utilizing MATLAB.
{"title":"Acoustic Echo Cancellation using time and frequency domain adaptive filter methods on Tms320c6713dsk","authors":"Gopalaiah, K. Suresh","doi":"10.1109/ICECCE.2014.7086623","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086623","url":null,"abstract":"Acoustic Echo Cancelation is a typical event in today's telecommunication fields. The input speech signal interference caused by acoustic echo is disturbing for both users side and causes a reduction in the quality of the original signal. The adaptive filtering techniques are used to reduce the unwanted echo, and increasing quality of the speech signal. This Paper focus on different Adaptive filters algorithms and characterized by the Normalized Least Mean Square (NLMS) and Variable Step Size Least Mean Square (VSSLMS) and also This Paper actualizes Real Time Acoustic Echo Cancellation on Tms320c6713dsk. The primary modules of this reverberation canceller are a versatile channel framework utilizing Normalized Least Mean Square (NLMS) calculation, a Double-Talk Detector (DTD) and a Non-Linear Processor (NLP). The Setup of NLMS based versatile framework, Modified NLMS with Variable Step Size calculations and Frequency Domain based Fast LMS algorithms are to be actualized on the DSP equipment. This implementation shows fast response, speed, convergence of time and good tracking capability. The calculation of different adaptive algorithms must be analysed utilizing MATLAB.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115843616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICECCE.2014.7086625
J. Shenbagam, P. Salini
Web application security is the major security concern for e-business and information sharing communities. Research showed that more than 75% attacks are being deployed at application layer and almost 90% applications are vulnerable to attacks. Conventional methods of vulnerability and attack prevention and detection are ineffective to provide complete security solution at application level. In this paper, we propose an ontology based approach for effective defenses against the application level vulnerabilities and attacks. The proposed system is an ontology based attack prediction system which infers from the query of the user and classifies the web application attacks. It suggests methods for prevention and countermeasures for the inferred attacks. It also provides ranking and the priority in which the attacks can be encountered with a better defense.
{"title":"Vulnerability Ontology for web applications to predict and classify attacks","authors":"J. Shenbagam, P. Salini","doi":"10.1109/ICECCE.2014.7086625","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086625","url":null,"abstract":"Web application security is the major security concern for e-business and information sharing communities. Research showed that more than 75% attacks are being deployed at application layer and almost 90% applications are vulnerable to attacks. Conventional methods of vulnerability and attack prevention and detection are ineffective to provide complete security solution at application level. In this paper, we propose an ontology based approach for effective defenses against the application level vulnerabilities and attacks. The proposed system is an ontology based attack prediction system which infers from the query of the user and classifies the web application attacks. It suggests methods for prevention and countermeasures for the inferred attacks. It also provides ranking and the priority in which the attacks can be encountered with a better defense.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133288113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICECCE.2014.7086650
N. Prathviraj, A. Prashanth Kumar
The energy of mobile nodes is one of the important factors to be considered in MANET. Balanced energy consumption over all nodes in the MANET is difficult and important task to all nodes stay connected in MANET. Lifetime of a mobile node is considered for selecting particular node for routing purposes; here lifetime is calculated based on remaining energy and draining rate of that particular node. Multi Point Relay (MPR) selection provides an efficient routing scheme, Optimized Link State Routing making use of this and implements best proactive protocol in MANET. Considering energy factor in MPR selection yields better results in terms of node lifetime, packet delivery fraction and packet drops.
{"title":"Lifetime aware MPR selection in OLSR for MANET","authors":"N. Prathviraj, A. Prashanth Kumar","doi":"10.1109/ICECCE.2014.7086650","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086650","url":null,"abstract":"The energy of mobile nodes is one of the important factors to be considered in MANET. Balanced energy consumption over all nodes in the MANET is difficult and important task to all nodes stay connected in MANET. Lifetime of a mobile node is considered for selecting particular node for routing purposes; here lifetime is calculated based on remaining energy and draining rate of that particular node. Multi Point Relay (MPR) selection provides an efficient routing scheme, Optimized Link State Routing making use of this and implements best proactive protocol in MANET. Considering energy factor in MPR selection yields better results in terms of node lifetime, packet delivery fraction and packet drops.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133804321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICECCE.2014.7086653
N. Tamilarasan, L. Nithyanandan
This paper analyzes the bit error rate (BER) performance of cooperative communication using relays which is capable of efficiently combating wireless impairments and hence will extend the coverage. With the requirement of higher data rate, the distortion of the received signal caused by multipath fading channel becomes a major problem. The relay assisted multiple input and multiple output (MIMO) Multi carrier code division multiple access (MC-CDMA) system can tackle the problem and provide higher data rate for future wireless communication system. But inter symbol interference (ISI) caused by the frequency selectivity of the channel affect the overall performance. To improve the performance of the system further, it is proposed to incorporate channel estimation based equalization and relaying in MIMO MC-CDMA system. The simulation results show performance can be still with higher number of sub carriers (SCs) and antenna configuration.
{"title":"Performance of MIMO MC-CDMA system with channel estimation equalization and relay","authors":"N. Tamilarasan, L. Nithyanandan","doi":"10.1109/ICECCE.2014.7086653","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086653","url":null,"abstract":"This paper analyzes the bit error rate (BER) performance of cooperative communication using relays which is capable of efficiently combating wireless impairments and hence will extend the coverage. With the requirement of higher data rate, the distortion of the received signal caused by multipath fading channel becomes a major problem. The relay assisted multiple input and multiple output (MIMO) Multi carrier code division multiple access (MC-CDMA) system can tackle the problem and provide higher data rate for future wireless communication system. But inter symbol interference (ISI) caused by the frequency selectivity of the channel affect the overall performance. To improve the performance of the system further, it is proposed to incorporate channel estimation based equalization and relaying in MIMO MC-CDMA system. The simulation results show performance can be still with higher number of sub carriers (SCs) and antenna configuration.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123204381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICECCE.2014.7086642
Ankit Kalbande, Divyesh Dixit
Addressing the complexity of mobile wireless sensor networks for defining dynamic network architecture and routing table, the Guardian protocol had been extended for wireless sensor network. It has extended protocols for mobility channel for managing the mobility of sensor nodes, control channel for establishing the session and the traffic channels. This modified version has a multiple routing mode unlike previous guardian protocol which had only one routing mode which was default routing through guardian node and linking nodes. Coupled with the multiple traffic channels the protocol has incorporated the flexibility in routing and high speed data transfer. De facto algorithms for handling such a complex scenario have been developed with major enhancements to the stationary Guardian Protocol. Additional hardware for Self Position Tracking had been implemented on each node. The self-tracking system and the mutual tracking system coordinate together for determining the position of each node. In this paper we describe the solutions of adaptive ad-hoc network architecture and dynamic routing for mobile wireless sensor networks. Minimum constrains were imposed on node mobility of wireless sensor nodes. We evaluate presented method using simulations. Implementation of the protocol has shown that by employing mutual and self tracking approach to the mobile nodes the nodes can be tracked within 5-10 relative percent error range even in cases of high mobility. Also the protocol when implemented in the case of mobile nodes with dynamic routing table supported by nick node ID tables has gives the flexibility of providing multiple routing paths.
{"title":"“Guardian” protocol for mobile wireless sensor networks","authors":"Ankit Kalbande, Divyesh Dixit","doi":"10.1109/ICECCE.2014.7086642","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086642","url":null,"abstract":"Addressing the complexity of mobile wireless sensor networks for defining dynamic network architecture and routing table, the Guardian protocol had been extended for wireless sensor network. It has extended protocols for mobility channel for managing the mobility of sensor nodes, control channel for establishing the session and the traffic channels. This modified version has a multiple routing mode unlike previous guardian protocol which had only one routing mode which was default routing through guardian node and linking nodes. Coupled with the multiple traffic channels the protocol has incorporated the flexibility in routing and high speed data transfer. De facto algorithms for handling such a complex scenario have been developed with major enhancements to the stationary Guardian Protocol. Additional hardware for Self Position Tracking had been implemented on each node. The self-tracking system and the mutual tracking system coordinate together for determining the position of each node. In this paper we describe the solutions of adaptive ad-hoc network architecture and dynamic routing for mobile wireless sensor networks. Minimum constrains were imposed on node mobility of wireless sensor nodes. We evaluate presented method using simulations. Implementation of the protocol has shown that by employing mutual and self tracking approach to the mobile nodes the nodes can be tracked within 5-10 relative percent error range even in cases of high mobility. Also the protocol when implemented in the case of mobile nodes with dynamic routing table supported by nick node ID tables has gives the flexibility of providing multiple routing paths.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127146030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICECCE.2014.7086635
K. Nayana, V. Sailaja, K. Deepa, H. Manjunath
Non conventional sources of energy are those which are depleting day by day. Solar energy which is abundant in India has gained more importance hence. The energy produced by the sun, is harnessed with the help of PV panels and injected to converters and rectifiers. It is subsequently fed to an inverter that produces an AC power. In this paper, a PV panel fed modified dual output SEPIC converter is proposed. Dual outputs obtained from the modified multi output SEPIC converter is used to charge two batteries which in turn are fed to the cascaded multilevel DC/AC inverter. The simulation analysis of the system proves that it is well suited for both resistive and inductive loads; hence it is proposed for driving a motor load in rural areas agricultural applications. This system can be deployed in areas where grid connection is not possible such as in isolated or rural areas.
{"title":"A DC-DC multi-output SEPIC converter for suburban power application","authors":"K. Nayana, V. Sailaja, K. Deepa, H. Manjunath","doi":"10.1109/ICECCE.2014.7086635","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086635","url":null,"abstract":"Non conventional sources of energy are those which are depleting day by day. Solar energy which is abundant in India has gained more importance hence. The energy produced by the sun, is harnessed with the help of PV panels and injected to converters and rectifiers. It is subsequently fed to an inverter that produces an AC power. In this paper, a PV panel fed modified dual output SEPIC converter is proposed. Dual outputs obtained from the modified multi output SEPIC converter is used to charge two batteries which in turn are fed to the cascaded multilevel DC/AC inverter. The simulation analysis of the system proves that it is well suited for both resistive and inductive loads; hence it is proposed for driving a motor load in rural areas agricultural applications. This system can be deployed in areas where grid connection is not possible such as in isolated or rural areas.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126928765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}