Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877531
Ganesh Akula, Vinod Naik, B. Umadevi
Feedback with carry shift registers (FCSRs) have been proposed as a promising alternate to the Linear feedback shift registers (LFSRs) in recent years. An approach based on traditional matrix representation has been proposed to design a Word oriented FCSR (WFCSR) automaton in [2], [3]. This automaton always generates a fixed ℓ-sequence, which is not desired for some cryptographic applications. In this paper, we present a new WFCSR automaton which enhances the traditional matrix representation by incorporating α-mask and/or β-mask operations on certain blocks (or words) of WFCSR automaton. By applying different α-mask and/or β-mask on certain blocks (or words) of WFCSR automaton, we can generate multiple ℓ-sequences without changing its structure. We can use the proposed approach to design WFCSR automaton in Fibonacci, Galois and Ring representations. The proposed WFCSR automaton can be adopted as a basic primitive to design any pseudo random number generator or stream cipher for cryptographic applications.
{"title":"On the generation of multiple ℓ-sequences from single WFCSR automaton for cryptographic applications","authors":"Ganesh Akula, Vinod Naik, B. Umadevi","doi":"10.1109/NGCT.2016.7877531","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877531","url":null,"abstract":"Feedback with carry shift registers (FCSRs) have been proposed as a promising alternate to the Linear feedback shift registers (LFSRs) in recent years. An approach based on traditional matrix representation has been proposed to design a Word oriented FCSR (WFCSR) automaton in [2], [3]. This automaton always generates a fixed ℓ-sequence, which is not desired for some cryptographic applications. In this paper, we present a new WFCSR automaton which enhances the traditional matrix representation by incorporating α-mask and/or β-mask operations on certain blocks (or words) of WFCSR automaton. By applying different α-mask and/or β-mask on certain blocks (or words) of WFCSR automaton, we can generate multiple ℓ-sequences without changing its structure. We can use the proposed approach to design WFCSR automaton in Fibonacci, Galois and Ring representations. The proposed WFCSR automaton can be adopted as a basic primitive to design any pseudo random number generator or stream cipher for cryptographic applications.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114566871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877438
B. Kalra, Kingshuk Srivastava, M. Prateek
With fashion industry included e-commerce (worldwide) is expected to hit the $35 billion mark by 2020. There's a need for applications which help the user in making intelligent decisions on their day to day online purchases. In this paper, our aim is to build a system that would be able to understand fashion and the user to provide personalized clothing recommendations to the user. Our approach includes Caffe, a deep learning framework for computer vision tasks such as Clothing type classification and Clothing attribute classification. Furthermore we use Conditional Random Fields (CRF) to learn the intricacies of fashion. CRFs also learn the correlations between attributes of the user such as ethnicity, body type etc., expert opinion and the type of outfit. We expect the proposed system would be able to provide personalized recommendations.
{"title":"Computer vision based personalized clothing assistance system: A proposed model","authors":"B. Kalra, Kingshuk Srivastava, M. Prateek","doi":"10.1109/NGCT.2016.7877438","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877438","url":null,"abstract":"With fashion industry included e-commerce (worldwide) is expected to hit the $35 billion mark by 2020. There's a need for applications which help the user in making intelligent decisions on their day to day online purchases. In this paper, our aim is to build a system that would be able to understand fashion and the user to provide personalized clothing recommendations to the user. Our approach includes Caffe, a deep learning framework for computer vision tasks such as Clothing type classification and Clothing attribute classification. Furthermore we use Conditional Random Fields (CRF) to learn the intricacies of fashion. CRFs also learn the correlations between attributes of the user such as ethnicity, body type etc., expert opinion and the type of outfit. We expect the proposed system would be able to provide personalized recommendations.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"243 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121457922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877488
K. Babu, P. Kiran
Now a day, Cloud computing is one of the most stimulating on demand service oriented technology. Virtualization is an emerging approach utilizing resources effectively in cloud computing environment. Virtualization has an intellectual abstraction layer which hides the complexity of essential hardware or software. Virtualization technology is not a novel technology possessing security issues that can be inherited in cloud environment. It is required now to devise a strong security system for safe and secure cloud architecture. To give a remedy for secure cloud, we have proposed a secure paradigm called pseudo-hypervisor IP based virtualization technology. The proposed architecture will monitor encrypted IP address eventually and restrict unauthorized entries. The key point to maintain secure cloud environment is a pseudo number, which is generated randomly by the pseudo-hypervisor auditor (PHA) and monitor by the pseudo-hypervisor monitor (PHM).
{"title":"A secure virtualized cloud environment with pseudo-hypervisor IP based technology","authors":"K. Babu, P. Kiran","doi":"10.1109/NGCT.2016.7877488","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877488","url":null,"abstract":"Now a day, Cloud computing is one of the most stimulating on demand service oriented technology. Virtualization is an emerging approach utilizing resources effectively in cloud computing environment. Virtualization has an intellectual abstraction layer which hides the complexity of essential hardware or software. Virtualization technology is not a novel technology possessing security issues that can be inherited in cloud environment. It is required now to devise a strong security system for safe and secure cloud architecture. To give a remedy for secure cloud, we have proposed a secure paradigm called pseudo-hypervisor IP based virtualization technology. The proposed architecture will monitor encrypted IP address eventually and restrict unauthorized entries. The key point to maintain secure cloud environment is a pseudo number, which is generated randomly by the pseudo-hypervisor auditor (PHA) and monitor by the pseudo-hypervisor monitor (PHM).","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116586771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877452
Tamasdeep Kaur, Mamta Arora
In this paper, a modified successive interference cancellation (SIC) scheme is designed for multiuser detection in multicarrier code division multiple access (MC-CDMA) communication systems. Successive interference cancellation (SIC) is used to mitigate the multiple access interference (MAI) which occurs in MC-CDMA systems. SIC uses the decision feedback concept where the signal from a user is regenerated and then subtracted from the received signal to cancel the interference. SIC is a near far resistant system. On the contrary, the problem of latency occurs in the system at each stage of regeneration due to which its practical implementation is not useful. Thus, a modified scheme called dynamic SIC (dSIC) is designed to reduce the latency of the system by half which also gives a lower bit error rate (BER).
{"title":"A dynamic successive interference cancellation (Dsic) scheme for latency reduction in Mc-Cdma multiuser detection","authors":"Tamasdeep Kaur, Mamta Arora","doi":"10.1109/NGCT.2016.7877452","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877452","url":null,"abstract":"In this paper, a modified successive interference cancellation (SIC) scheme is designed for multiuser detection in multicarrier code division multiple access (MC-CDMA) communication systems. Successive interference cancellation (SIC) is used to mitigate the multiple access interference (MAI) which occurs in MC-CDMA systems. SIC uses the decision feedback concept where the signal from a user is regenerated and then subtracted from the received signal to cancel the interference. SIC is a near far resistant system. On the contrary, the problem of latency occurs in the system at each stage of regeneration due to which its practical implementation is not useful. Thus, a modified scheme called dynamic SIC (dSIC) is designed to reduce the latency of the system by half which also gives a lower bit error rate (BER).","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116658637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877482
Akshay Sharma, A. R. Ahmad, Divyashish Singh, J. Patni
The project aims to develop a professional Virtual Machine Manager for the KVM hypervisor. It will be a libvirt-based Web Interface for managing virtual machines. It allows creating and configuring new domains, and adjusting a domain's allocation of the underlying hardware resources. A VNC viewer will present a full graphical console to the end-users in the guest domain. To work with this service you will need the OS Linux and Web browser with installed VNC client plugin. An intuitive web interface, any system administrator can handle it with basic qualifications. The service will work with a data encrypted network connection. The Service has access only to the KVM hypervisor via the libvirt library and not to the entire OS, which improves the security of the server. End-user will have the full control of the virtualization and the virtualised hardware resource. Creating, installation, shutdown, snapshots — all this and more features are incorporated with in the virtual machines. All actions are logged. Also security features based on IAM and secure data transmission between users and the server will be incorporated in the VM manager.
{"title":"CloudBox — A virtual machine manager for KVM based virtual machines","authors":"Akshay Sharma, A. R. Ahmad, Divyashish Singh, J. Patni","doi":"10.1109/NGCT.2016.7877482","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877482","url":null,"abstract":"The project aims to develop a professional Virtual Machine Manager for the KVM hypervisor. It will be a libvirt-based Web Interface for managing virtual machines. It allows creating and configuring new domains, and adjusting a domain's allocation of the underlying hardware resources. A VNC viewer will present a full graphical console to the end-users in the guest domain. To work with this service you will need the OS Linux and Web browser with installed VNC client plugin. An intuitive web interface, any system administrator can handle it with basic qualifications. The service will work with a data encrypted network connection. The Service has access only to the KVM hypervisor via the libvirt library and not to the entire OS, which improves the security of the server. End-user will have the full control of the virtualization and the virtualised hardware resource. Creating, installation, shutdown, snapshots — all this and more features are incorporated with in the virtual machines. All actions are logged. Also security features based on IAM and secure data transmission between users and the server will be incorporated in the VM manager.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123115510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877470
H. Kaur, Ajay Sharma
E-mails have become the best way to communicate formal documents over internet among users. But many people have started sending the unwanted mails to others, also called email spam. It is found that many techniques have been proposed so far to efficient mine the emails as spam or non-spammed. In existing techniques, the use of unsupervised filtering to filter the input data set is ignored by the most of the existing researchers. The use of hybridization of data mining techniques is ignored in instruct to improve the accuracy rate further for Detection of fraudulent emails. The majority of the existing techniques are limited to various significant features of emails therefore utilising more features may provide more significant results. To handle above stated limitations a new technique is proposed in this paper. The proposed technique has integrated particle swarm optimization based on Decision Tree algorithm with unsupervised filtering to enhance the accuracy rate further. The comparative analyses have clearly pointed to better results than the available techniques.
{"title":"Improved email spam classification method using integrated particle swarm optimization and decision tree","authors":"H. Kaur, Ajay Sharma","doi":"10.1109/NGCT.2016.7877470","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877470","url":null,"abstract":"E-mails have become the best way to communicate formal documents over internet among users. But many people have started sending the unwanted mails to others, also called email spam. It is found that many techniques have been proposed so far to efficient mine the emails as spam or non-spammed. In existing techniques, the use of unsupervised filtering to filter the input data set is ignored by the most of the existing researchers. The use of hybridization of data mining techniques is ignored in instruct to improve the accuracy rate further for Detection of fraudulent emails. The majority of the existing techniques are limited to various significant features of emails therefore utilising more features may provide more significant results. To handle above stated limitations a new technique is proposed in this paper. The proposed technique has integrated particle swarm optimization based on Decision Tree algorithm with unsupervised filtering to enhance the accuracy rate further. The comparative analyses have clearly pointed to better results than the available techniques.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"64 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128662827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877388
Nikhil Baby, S. Mathew, Sarah Abraham, S. Ravindranath, V. Sanju
The introduction of billions of transisters onto a single chip has resulted in the increase in complexity of the common System-on-Chip(SoC) architecture. The bus based architecture of SoC is limiting, mainly due to scalability issues. The solution for this communication problem is the use of embedded switching network, called Network On Chip(NoC). NoC has inherent redundancy which helps to tolerate faults and deal with communication bottleneck. In this paper we discuss about the design and implementation of different Network On Chip (NOC) based topologies. The topologies that we consider here are 2D Mesh, Torus and RiCoBiT. This paper compares the performance parameters of the above three topologies and thus it would help the network designers to design a high performance system.
{"title":"Network on chip simulator: Design, implementation and comparison of Mesh, Torus and RiCoBiT topologies","authors":"Nikhil Baby, S. Mathew, Sarah Abraham, S. Ravindranath, V. Sanju","doi":"10.1109/NGCT.2016.7877388","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877388","url":null,"abstract":"The introduction of billions of transisters onto a single chip has resulted in the increase in complexity of the common System-on-Chip(SoC) architecture. The bus based architecture of SoC is limiting, mainly due to scalability issues. The solution for this communication problem is the use of embedded switching network, called Network On Chip(NoC). NoC has inherent redundancy which helps to tolerate faults and deal with communication bottleneck. In this paper we discuss about the design and implementation of different Network On Chip (NOC) based topologies. The topologies that we consider here are 2D Mesh, Torus and RiCoBiT. This paper compares the performance parameters of the above three topologies and thus it would help the network designers to design a high performance system.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130221757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877424
Ankur Goel, J. Gautam, Sitesh Kumar
Twitter1 is a micro-blogging website which provides platform for people to share and express their views about topics, happenings, products and other services. Tweets can be classified into different classes based on their relevance with the topic searched. Various Machine Learning algorithms are currently employed in classification of tweets into positive and negative classes based on their sentiments, such as Baseline, Naive Bayes Classifier, Support Vector Machine etc. This paper contains implementation of Naive Bayes using sentiment140 training data using Twitter database and propose a method to improve classification. Use of SentiWordNet along with Naive Bayes can improve accuracy of classification of tweets, by providing positivity, negativity and objectivity score of words present in tweets. For actual implementation of this system python with NLTK and python-Twitter APIs are used.
{"title":"Real time sentiment analysis of tweets using Naive Bayes","authors":"Ankur Goel, J. Gautam, Sitesh Kumar","doi":"10.1109/NGCT.2016.7877424","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877424","url":null,"abstract":"Twitter1 is a micro-blogging website which provides platform for people to share and express their views about topics, happenings, products and other services. Tweets can be classified into different classes based on their relevance with the topic searched. Various Machine Learning algorithms are currently employed in classification of tweets into positive and negative classes based on their sentiments, such as Baseline, Naive Bayes Classifier, Support Vector Machine etc. This paper contains implementation of Naive Bayes using sentiment140 training data using Twitter database and propose a method to improve classification. Use of SentiWordNet along with Naive Bayes can improve accuracy of classification of tweets, by providing positivity, negativity and objectivity score of words present in tweets. For actual implementation of this system python with NLTK and python-Twitter APIs are used.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128487089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877533
Upinderjit Kaur, Harjeevan Singh
In this work, a super secure OCDMA system is presented which consists of data randomiser XOR gate and cipher key text generator. A new technique is demonstrated for designing of data randomiser in optical domain by using cheap components. In this a secure transmitter is designed to prevent signal loss by eavesdropper. Randomiser is placed to scramble bits after cipher text and remove sequence of consecutive three 0's and 1's to enhance performance security. The basic model of randomiser is based on XOR operation and shifting of data. Randomiser remove the long sequences, it change one bit into another bit. Advantage of randomiser is that it can be used with continuous and digital data. However encryption can only be done for digital data. For eavesdropper, it become different to tap the right data, he steal shuffle data. So security of OCDMA is enhanced.
{"title":"Security enhancement in OCDMA system using multicode keying and data randomisers","authors":"Upinderjit Kaur, Harjeevan Singh","doi":"10.1109/NGCT.2016.7877533","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877533","url":null,"abstract":"In this work, a super secure OCDMA system is presented which consists of data randomiser XOR gate and cipher key text generator. A new technique is demonstrated for designing of data randomiser in optical domain by using cheap components. In this a secure transmitter is designed to prevent signal loss by eavesdropper. Randomiser is placed to scramble bits after cipher text and remove sequence of consecutive three 0's and 1's to enhance performance security. The basic model of randomiser is based on XOR operation and shifting of data. Randomiser remove the long sequences, it change one bit into another bit. Advantage of randomiser is that it can be used with continuous and digital data. However encryption can only be done for digital data. For eavesdropper, it become different to tap the right data, he steal shuffle data. So security of OCDMA is enhanced.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128188261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/NGCT.2016.7877472
A. Raj, Manoj Gupta, Sampurna Panda
Yield and loss forecasting plays a significant role in efficient planning and operation of solar photovoltaic system. Performance of solar photovoltaic system depends on geographical location, system design, horizon, and orientation of solar panels in the given system. Several forecasting tools are available which are used by professionals for efficient planning and forecasting of grid connected as well as standalone solar photovoltaic system. In this paper we have developed equivalent mathematical model for 100 KWp grid connected solar photovoltaic system has been developed which is installed at Poornima University, Jaipur. Performance parameters, Yield and losses has been forecasted for equivalent model by help of PV Syst design tool. Monthly yield and losses as well as yearly yield and losses have been synthesized. For performance assessment of the forecasted data, we have compared forecasted yield for the month of April with the real data recorded from Sunny Web Box. Forecasted data can serve as important tool for analyzing location and seasonal specific losses. Comparative analysis of simulated data with real experimental data is important for predicting tolerance and error related with forecasting tool.
产损预测对太阳能光伏发电系统的高效规划和运行具有重要意义。太阳能光伏系统的性能取决于给定系统中的地理位置、系统设计、水平和太阳能电池板的朝向。有几种预测工具可供专业人员使用,用于有效地规划和预测并网和独立的太阳能光伏系统。本文建立了安装在斋浦尔普尔尼玛大学的100kwp并网太阳能光伏发电系统的等效数学模型。利用光伏系统设计工具对等效模型的性能参数、产量和损耗进行了预测。合成了月产量和损失以及年产量和损失。为了对预测数据进行性能评估,我们将4月份的预测产量与Sunny Web Box记录的实际数据进行了比较。预测数据可以作为分析地点和季节特定损失的重要工具。仿真数据与实际实验数据的对比分析对于预测与预测工具相关的公差和误差具有重要意义。
{"title":"Design simulation and performance assessment of yield and loss forecasting for 100 KWp grid connected solar PV system","authors":"A. Raj, Manoj Gupta, Sampurna Panda","doi":"10.1109/NGCT.2016.7877472","DOIUrl":"https://doi.org/10.1109/NGCT.2016.7877472","url":null,"abstract":"Yield and loss forecasting plays a significant role in efficient planning and operation of solar photovoltaic system. Performance of solar photovoltaic system depends on geographical location, system design, horizon, and orientation of solar panels in the given system. Several forecasting tools are available which are used by professionals for efficient planning and forecasting of grid connected as well as standalone solar photovoltaic system. In this paper we have developed equivalent mathematical model for 100 KWp grid connected solar photovoltaic system has been developed which is installed at Poornima University, Jaipur. Performance parameters, Yield and losses has been forecasted for equivalent model by help of PV Syst design tool. Monthly yield and losses as well as yearly yield and losses have been synthesized. For performance assessment of the forecasted data, we have compared forecasted yield for the month of April with the real data recorded from Sunny Web Box. Forecasted data can serve as important tool for analyzing location and seasonal specific losses. Comparative analysis of simulated data with real experimental data is important for predicting tolerance and error related with forecasting tool.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133768807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}