Pub Date : 2014-11-01DOI: 10.1109/ICECCE.2014.7086637
P. R. Rothe, R. Kshirsagar
The classification and identification of cotton leaf diseases is important as it can prove detrimental to the yield. The classifier needs most discriminating features to improve the effectiveness and efficiency of analysis and classification for that reason feature extraction and representation is a decisive step for pattern recognition system. In the proposed work we present a graph cut based approach for the segmentation of images of diseased cotton leaves. The testing samples of the images are captured from the fields at Central Institute of Cotton Research Nagpur, and the cotton fields in Buldhana and Wardha district. The Gaussian filter is applied to remove the noise present in the images before segmentation. The Color layout descriptor which is a very compact and resolution-invariant representation of color and can be used for a variety of similarity-based retrieval, content filtering and visualization are extracted along with shape parameters as features. The diseases that have been selected for experimentation are Bacterial Blight, Myrothecium and Alternaria.
{"title":"Automated extraction of digital images features of three kinds of cotton leaf diseases","authors":"P. R. Rothe, R. Kshirsagar","doi":"10.1109/ICECCE.2014.7086637","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086637","url":null,"abstract":"The classification and identification of cotton leaf diseases is important as it can prove detrimental to the yield. The classifier needs most discriminating features to improve the effectiveness and efficiency of analysis and classification for that reason feature extraction and representation is a decisive step for pattern recognition system. In the proposed work we present a graph cut based approach for the segmentation of images of diseased cotton leaves. The testing samples of the images are captured from the fields at Central Institute of Cotton Research Nagpur, and the cotton fields in Buldhana and Wardha district. The Gaussian filter is applied to remove the noise present in the images before segmentation. The Color layout descriptor which is a very compact and resolution-invariant representation of color and can be used for a variety of similarity-based retrieval, content filtering and visualization are extracted along with shape parameters as features. The diseases that have been selected for experimentation are Bacterial Blight, Myrothecium and Alternaria.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116075589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICECCE.2014.7086626
K. Parasuraman, R. Ramya
Digital retinal imaging uses high-resolution imaging systems to take pictures of the inside of your eye. This helps the doctors to access the retina and helps them to detect and manage health conditions like glaucoma, diabetes and macular degeneration. The risk of cardio vascular diseases can be identified by measuring the retinal blood vessel. The identification of the wrong blood vessel may lead to a wrong diagnosis result. A retinal image provides a good diagnostic approach of what is happening inside the human body. By analyzing the humans retinal image one can able to identify cardio vascular condition of the body. To overcome that we are using the following proposed method. This paper proposes a novel technique that collects information about all blood vessels that present in the retinal image and identifies the true vessel in a retinal image. In the proposed method, first the input image is choose and the blood vessels are segmented. From that the crossover point detection is applied to detect the vessels which are crossing each other by using the window with the neighboring pixels. Then, by applying the graph tracer method the vessels are identified and represented them in the form of subsequent vessel measurements. Then, the venular and the artery are identified and the width is calculated by measuring the arterio-venous crossings. Thus, from this the diseases is identified and the performance is calculated by comparing our proposed method with various retinal images.
{"title":"Automated detection of diseases by nicking quantification in retinal images","authors":"K. Parasuraman, R. Ramya","doi":"10.1109/ICECCE.2014.7086626","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086626","url":null,"abstract":"Digital retinal imaging uses high-resolution imaging systems to take pictures of the inside of your eye. This helps the doctors to access the retina and helps them to detect and manage health conditions like glaucoma, diabetes and macular degeneration. The risk of cardio vascular diseases can be identified by measuring the retinal blood vessel. The identification of the wrong blood vessel may lead to a wrong diagnosis result. A retinal image provides a good diagnostic approach of what is happening inside the human body. By analyzing the humans retinal image one can able to identify cardio vascular condition of the body. To overcome that we are using the following proposed method. This paper proposes a novel technique that collects information about all blood vessels that present in the retinal image and identifies the true vessel in a retinal image. In the proposed method, first the input image is choose and the blood vessels are segmented. From that the crossover point detection is applied to detect the vessels which are crossing each other by using the window with the neighboring pixels. Then, by applying the graph tracer method the vessels are identified and represented them in the form of subsequent vessel measurements. Then, the venular and the artery are identified and the width is calculated by measuring the arterio-venous crossings. Thus, from this the diseases is identified and the performance is calculated by comparing our proposed method with various retinal images.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123419865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICECCE.2014.7086659
K. Deepti, P. Srihari, Manjunadh Achari
Remote areas in India are still not connected to the power grid. But they have mobile network connectivity. The people face problems in charging their cell phones. They are forced to travel a long distances to get access to electrical outlets. The use of new efficient photovoltaic solar cells (PVSCs) has emerged as an alternative measure of renewable green power, energy conservation and demand-side management. The manufacturing of solar cells and photovoltaic arrays has advanced dramatically in recent years. But they have two inherent major problems the first is low conversion efficiency (10to16%for commercially available amorphous silicon solar cells), second is high capital cost [1]. Solar powered systems consist of different parts to be controlled separately. Since the generated power is a function of uncontrollable environmental conditions, it requires extra caution to design controllers that handle unpredictable events and maintain efficient load matching power. In this study, a photovoltaic (PV) solar array model was developed and analyzed using Matlab/Simulink. The model includes converter circuits, a controller using fuzzy logic control (FLC), and a maximum Power point (MPP) tracking control which is used to operate the PVA at its maximum power. The MPP point is tracked using four algorithms perturbation & Observation, Incremental conductance method, Constant Voltage method and Constant current method. Later a comparative performance analysis of the model for MPP algorithms is done.
{"title":"Simulation and analysis of an intelligent fuzzy logic controller model for low power photovoltaic energy utilization system","authors":"K. Deepti, P. Srihari, Manjunadh Achari","doi":"10.1109/ICECCE.2014.7086659","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086659","url":null,"abstract":"Remote areas in India are still not connected to the power grid. But they have mobile network connectivity. The people face problems in charging their cell phones. They are forced to travel a long distances to get access to electrical outlets. The use of new efficient photovoltaic solar cells (PVSCs) has emerged as an alternative measure of renewable green power, energy conservation and demand-side management. The manufacturing of solar cells and photovoltaic arrays has advanced dramatically in recent years. But they have two inherent major problems the first is low conversion efficiency (10to16%for commercially available amorphous silicon solar cells), second is high capital cost [1]. Solar powered systems consist of different parts to be controlled separately. Since the generated power is a function of uncontrollable environmental conditions, it requires extra caution to design controllers that handle unpredictable events and maintain efficient load matching power. In this study, a photovoltaic (PV) solar array model was developed and analyzed using Matlab/Simulink. The model includes converter circuits, a controller using fuzzy logic control (FLC), and a maximum Power point (MPP) tracking control which is used to operate the PVA at its maximum power. The MPP point is tracked using four algorithms perturbation & Observation, Incremental conductance method, Constant Voltage method and Constant current method. Later a comparative performance analysis of the model for MPP algorithms is done.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122234038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICECCE.2014.7086646
B. Mandal, Sourabh Chandra, S. S. Alam, S. S. Patra
Science and Technology are updating rapidly. Data are transferred through various communicative mediums. Hence always there been a major requirement of confidentiality and secure authorization of information to prevent the unauthorised access and attacks. Symmetric key cryptography is an integral part of cryptographic technique which ensures high security and confidentiality of data transmitted through the communication channel using a common key for both encryption and decryption. There are so many traditional symmetric key algorithms as well as some proposed algorithms which can provide high confidentiality along with authorized access of data. In this paper we made a comparison analysis of some of those proposed algorithms as well as the traditional algorithms of symmetric cryptography with the merits and demerits of those different types algorithm.
{"title":"A comparative and analytical study on symmetric key cryptography","authors":"B. Mandal, Sourabh Chandra, S. S. Alam, S. S. Patra","doi":"10.1109/ICECCE.2014.7086646","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086646","url":null,"abstract":"Science and Technology are updating rapidly. Data are transferred through various communicative mediums. Hence always there been a major requirement of confidentiality and secure authorization of information to prevent the unauthorised access and attacks. Symmetric key cryptography is an integral part of cryptographic technique which ensures high security and confidentiality of data transmitted through the communication channel using a common key for both encryption and decryption. There are so many traditional symmetric key algorithms as well as some proposed algorithms which can provide high confidentiality along with authorized access of data. In this paper we made a comparison analysis of some of those proposed algorithms as well as the traditional algorithms of symmetric cryptography with the merits and demerits of those different types algorithm.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130980761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICECCE.2014.7086636
M. Nair, S. Lekshmi
A photovoltaic system is an arrangement of components designed to supply usable electric power using the sun as the power source. PV systems have many advantages like it provide clean energy, it can be made available almost anywhere there is sunlight, the operating and maintenance costs for PV panels are considered to be low. The conventionally used converters in solar systems have many disadvantages such as multiple conversion stages, complex control, less efficient, high cost, bulky, etc. A new converter, for photovoltaic battery applications, called Reconfigurable Solar Converter (RSC), uses only single-stage three phase grid-tie solar PV converter to perform dc/ac and dc/dc operations, overcomes the drawback of conventional converters. The RSC concept is based on energy storage integration for utility-scale solar PV systems and it provides a minimal overlap between the PV energy storage and energy release time. In this paper a RSC which uses minimum number of conversion stages which in turn improves the efficiency and reduces the cost, weight and volume has been realized.
{"title":"Reconfigurable Solar Converter for PV battery application","authors":"M. Nair, S. Lekshmi","doi":"10.1109/ICECCE.2014.7086636","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086636","url":null,"abstract":"A photovoltaic system is an arrangement of components designed to supply usable electric power using the sun as the power source. PV systems have many advantages like it provide clean energy, it can be made available almost anywhere there is sunlight, the operating and maintenance costs for PV panels are considered to be low. The conventionally used converters in solar systems have many disadvantages such as multiple conversion stages, complex control, less efficient, high cost, bulky, etc. A new converter, for photovoltaic battery applications, called Reconfigurable Solar Converter (RSC), uses only single-stage three phase grid-tie solar PV converter to perform dc/ac and dc/dc operations, overcomes the drawback of conventional converters. The RSC concept is based on energy storage integration for utility-scale solar PV systems and it provides a minimal overlap between the PV energy storage and energy release time. In this paper a RSC which uses minimum number of conversion stages which in turn improves the efficiency and reduces the cost, weight and volume has been realized.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114830993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICECCE.2014.7086651
S. Ayswarya, P. Prabhu
Due to the driving worldwide environmental demand for the renewable energy resources the photovoltaic power market in the recent years experiences certain amount of the innovations regarding the construction and the operation of the inverter connected to the grid. One such significant development, is that the abolition of the galvanic isolation due to the absence of the transformer which causes safety threats in the event of ground faults. This results in the development of the transformerless CSI inverter which experiences reduced cost, higher efficiency, smaller size and weight. But the use of the CSI injects high earth leakage current into the grid the leakage current generated between the PV panels and the ground. In order to overcome the aforementioned limitations, this paper deals with the effective solution to anticipate the CM ground leakage current using the transformerless Modified Current Source Inverter (MCSI) for grid connected photovoltaic power system. Bssy the use of Maximum Power Point Tracking(MPPT) control technique and SEPIC converter desired output from PV to the inverter is achieved. This advance topology can be modulated using Space Vector Pulse Width Modulation (SVPWM) to produce the reduced output ripple. The experimental results show the performance of the proposed solution in terms of ground leakage current reduction and the experimental studies are analyzed using MATLAB simulation.
{"title":"Leakage current suppression for transformerless inverter for grid connected PV power systems","authors":"S. Ayswarya, P. Prabhu","doi":"10.1109/ICECCE.2014.7086651","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086651","url":null,"abstract":"Due to the driving worldwide environmental demand for the renewable energy resources the photovoltaic power market in the recent years experiences certain amount of the innovations regarding the construction and the operation of the inverter connected to the grid. One such significant development, is that the abolition of the galvanic isolation due to the absence of the transformer which causes safety threats in the event of ground faults. This results in the development of the transformerless CSI inverter which experiences reduced cost, higher efficiency, smaller size and weight. But the use of the CSI injects high earth leakage current into the grid the leakage current generated between the PV panels and the ground. In order to overcome the aforementioned limitations, this paper deals with the effective solution to anticipate the CM ground leakage current using the transformerless Modified Current Source Inverter (MCSI) for grid connected photovoltaic power system. Bssy the use of Maximum Power Point Tracking(MPPT) control technique and SEPIC converter desired output from PV to the inverter is achieved. This advance topology can be modulated using Space Vector Pulse Width Modulation (SVPWM) to produce the reduced output ripple. The experimental results show the performance of the proposed solution in terms of ground leakage current reduction and the experimental studies are analyzed using MATLAB simulation.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133877402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICECCE.2014.7086649
Meenakshi Yadav, Pankti Brar, P. Kaur
In this paper we have presented a brief review of ZigBee technology, the factors that led to its development and the subsequent versions that evolved. This paper presents and briefs different modes of operation for ZigBee devices and the different layers of ZigBee with emphasis on the operation of MAC layer. The Zigbee devices can operate in either beacon or non-beacon mode. We analysed and compared throughput and energy consumption of these operational modes with respect to varying network size and number of packets transmitted.
{"title":"Comparitive analysis of different modes of operation for Zigbee mac with variation in network size and traffic","authors":"Meenakshi Yadav, Pankti Brar, P. Kaur","doi":"10.1109/ICECCE.2014.7086649","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086649","url":null,"abstract":"In this paper we have presented a brief review of ZigBee technology, the factors that led to its development and the subsequent versions that evolved. This paper presents and briefs different modes of operation for ZigBee devices and the different layers of ZigBee with emphasis on the operation of MAC layer. The Zigbee devices can operate in either beacon or non-beacon mode. We analysed and compared throughput and energy consumption of these operational modes with respect to varying network size and number of packets transmitted.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132579220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICECCE.2014.7086644
K. Sasirekha, K. Thangavel
The robustness of a fingerprint authentication system depends on the quality of the fingerprint image. Denoising of the fingerprint image is indispensable to get a noise free image. In this paper, a novel method is proposed to remove Gaussian noise present in fingerprint image using Stationary Wavelet Transform (SWT), a threshold based on Golden Ratio and weighted median. First decompose the input image using SWT and apply the new modified universal threshold to the wavelet coefficients using hard and soft thresholding. Then apply Inverse Stationary Wavelet Transform (ISWT) to get the noise free image. The different kinds of wavelet filters such as db1, db2, db4, sym2, sym4, coif2 and coif4 for different noise levels are performed, among which db2 outperformed. In this study, experiments have been conducted on the fingerprint database FVC2002. The Peak Signal-to-Noise Ratio (PSNR), Signal-to-Noise Ratio (SNR), Root Mean Square Error (RMSE) and Mean Square Error (MSE) of the new modified universal threshold combined with hard thresholding is improved compared with the existing methods.
{"title":"A novel wavelet based thresholding for denoising fingerprint image","authors":"K. Sasirekha, K. Thangavel","doi":"10.1109/ICECCE.2014.7086644","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086644","url":null,"abstract":"The robustness of a fingerprint authentication system depends on the quality of the fingerprint image. Denoising of the fingerprint image is indispensable to get a noise free image. In this paper, a novel method is proposed to remove Gaussian noise present in fingerprint image using Stationary Wavelet Transform (SWT), a threshold based on Golden Ratio and weighted median. First decompose the input image using SWT and apply the new modified universal threshold to the wavelet coefficients using hard and soft thresholding. Then apply Inverse Stationary Wavelet Transform (ISWT) to get the noise free image. The different kinds of wavelet filters such as db1, db2, db4, sym2, sym4, coif2 and coif4 for different noise levels are performed, among which db2 outperformed. In this study, experiments have been conducted on the fingerprint database FVC2002. The Peak Signal-to-Noise Ratio (PSNR), Signal-to-Noise Ratio (SNR), Root Mean Square Error (RMSE) and Mean Square Error (MSE) of the new modified universal threshold combined with hard thresholding is improved compared with the existing methods.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130276407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICECCE.2014.7086634
S. Vardhan, A. Garg
Information jamming in electronic warfare is a form of electronic attack where jammers radiate interfering signals toward an enemy's system, blocking the receiver with highly concentrated energy signals. The purpose of information jamming is to interfere with the enemy's effective use of the electromagnetic spectrum. This information can take the form of voice or non-voice (e.g., video or digital format) communications, command signals to control remotely located assets, data returned from remotely located equipment or the location and motion of friendly or enemy assets. Information jamming is a “soft kill” because it temporarily makes an enemy asset ineffective but does not destroy it. Information jamming can be applied from air, sea, land, and space by manned and unmanned systems, and can target communication, radar, or other services. Within the information operations construct, information jamming is an element of offensive and defensive counter information in Electronic warfare. This paper provides operational requirements and technique affecting parameters of jamming for optimal adaptation in modern warfare scenario. It also provides necessary guidelines to users particularly from defence sector to allow them to upgrade their exiting capabilities and complement future war situations more effectively with lesser human interventions.
{"title":"Information jamming in Electronic warfare: Operational requirements and techniques","authors":"S. Vardhan, A. Garg","doi":"10.1109/ICECCE.2014.7086634","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086634","url":null,"abstract":"Information jamming in electronic warfare is a form of electronic attack where jammers radiate interfering signals toward an enemy's system, blocking the receiver with highly concentrated energy signals. The purpose of information jamming is to interfere with the enemy's effective use of the electromagnetic spectrum. This information can take the form of voice or non-voice (e.g., video or digital format) communications, command signals to control remotely located assets, data returned from remotely located equipment or the location and motion of friendly or enemy assets. Information jamming is a “soft kill” because it temporarily makes an enemy asset ineffective but does not destroy it. Information jamming can be applied from air, sea, land, and space by manned and unmanned systems, and can target communication, radar, or other services. Within the information operations construct, information jamming is an element of offensive and defensive counter information in Electronic warfare. This paper provides operational requirements and technique affecting parameters of jamming for optimal adaptation in modern warfare scenario. It also provides necessary guidelines to users particularly from defence sector to allow them to upgrade their exiting capabilities and complement future war situations more effectively with lesser human interventions.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122803006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.1109/ICECCE.2014.7086639
K. Kumar, Ilango Karuppasamy
The voltage quality is one of the major concerns for industrial and distribution consumers. In this work, a series active filter for voltage compensation has been verified using vectorial power theory for a three-phase system with non-linear load. The simulation has been designed using MATLAB/Simulink. The control scheme provides better unbalance voltage compensation and voltage regulation for three phase system with non-linear loads which operates in different conditions. The design and simulation of series active filter performance results were presented in this paper to show effectiveness of controller.
{"title":"Design of series active filter for power quality improvement","authors":"K. Kumar, Ilango Karuppasamy","doi":"10.1109/ICECCE.2014.7086639","DOIUrl":"https://doi.org/10.1109/ICECCE.2014.7086639","url":null,"abstract":"The voltage quality is one of the major concerns for industrial and distribution consumers. In this work, a series active filter for voltage compensation has been verified using vectorial power theory for a three-phase system with non-linear load. The simulation has been designed using MATLAB/Simulink. The control scheme provides better unbalance voltage compensation and voltage regulation for three phase system with non-linear loads which operates in different conditions. The design and simulation of series active filter performance results were presented in this paper to show effectiveness of controller.","PeriodicalId":223751,"journal":{"name":"2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128679221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}