Pub Date : 2016-03-03DOI: 10.1109/ICEEOT.2016.7755630
R. Dinesh Kumar, M. Aldo, J. Joseph
The application can be widely used by people in the border to find the appropriate path to reach the destination. The notification will be sent to the border security forces which act as the server to all other devices that are operated by people in ships. The application will notify the information of where the devices are being located and intimate them about the issues that occur due to opponent forces in ships to server. This can act as an incident management application to avoid conflicts at varying situations. This is processed mainly for Tamil fishermen's who are employed in the borders. The automatic alarming system is going to be provided along with this device which alerts in case any sort of issues. This is devised in such a way that the application can be easily been utilized by all the people in the surroundings. The application operates based on device tracking. This provides ease to operate even for illiterate people.
{"title":"Alert system for fishermen crossing border using Android","authors":"R. Dinesh Kumar, M. Aldo, J. Joseph","doi":"10.1109/ICEEOT.2016.7755630","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755630","url":null,"abstract":"The application can be widely used by people in the border to find the appropriate path to reach the destination. The notification will be sent to the border security forces which act as the server to all other devices that are operated by people in ships. The application will notify the information of where the devices are being located and intimate them about the issues that occur due to opponent forces in ships to server. This can act as an incident management application to avoid conflicts at varying situations. This is processed mainly for Tamil fishermen's who are employed in the borders. The automatic alarming system is going to be provided along with this device which alerts in case any sort of issues. This is devised in such a way that the application can be easily been utilized by all the people in the surroundings. The application operates based on device tracking. This provides ease to operate even for illiterate people.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130877279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICEEOT.2016.7754783
M. Alauddin
This is a new optimization algorithm which mimic the behavior of mosquito to find a hole in mosquito net, if any. Both the flying and sliding motion of the mosquito have been modelled and incorporated in the algorithm. The algorithm was tested for global minima on different type of benchmark functions of various dimension and modality. Namely Gramacy & Lee, Ackley, Rastrigin, Rosenbrock, Griewank and Schwefel functions of one, two, five, ten and thirty dimensions. The experiment was done with thirty different seeds generated randomly for each function and dimension. The algorithm was found to be efficient, convergent and accurate.
{"title":"Mosquito flying optimization (MFO)","authors":"M. Alauddin","doi":"10.1109/ICEEOT.2016.7754783","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7754783","url":null,"abstract":"This is a new optimization algorithm which mimic the behavior of mosquito to find a hole in mosquito net, if any. Both the flying and sliding motion of the mosquito have been modelled and incorporated in the algorithm. The algorithm was tested for global minima on different type of benchmark functions of various dimension and modality. Namely Gramacy & Lee, Ackley, Rastrigin, Rosenbrock, Griewank and Schwefel functions of one, two, five, ten and thirty dimensions. The experiment was done with thirty different seeds generated randomly for each function and dimension. The algorithm was found to be efficient, convergent and accurate.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130947690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICEEOT.2016.7755402
V. Garud, L. V. Awadhani, N. Vivekanandan, Amit A. Panchawadkar, S. Lakade, H. Tiwari
A CVT has a continuous range of transmission ratios that can up to device-dependent physical limits, be selected independently of the transmitted torque so it is an object of considerable research interest within the mechanical design community, driven primarily by the automotive industry's demands for more energy efficient and environmentally friendlier vehicles as the request for better energy efficiency and for CO2 and NOx reduction, imposed by environmental considerations, pushes many researchers to find new technical solution to improve the emission performance of nowadays IC engine vehicles. Also In case of machine tools applications optimum tool life only be obtained at particular speed ratio and the same cannot be achieved due fixed gear ratios and stepped pulley transmission. Moreover, unlike conventional stepped transmissions the CVT does not suffer from “shifting shock” and also we can achieve optimum speed range at which tool life will be maximum. In this paper investigation of slip and speed ratio of axially displaceable cone variator has been studied with the help of developed test rig and the results are relate with the IC Engine and machine tool application.
{"title":"Investigation of slip and speed ratio in axially displaceable cone variator CVT drive","authors":"V. Garud, L. V. Awadhani, N. Vivekanandan, Amit A. Panchawadkar, S. Lakade, H. Tiwari","doi":"10.1109/ICEEOT.2016.7755402","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755402","url":null,"abstract":"A CVT has a continuous range of transmission ratios that can up to device-dependent physical limits, be selected independently of the transmitted torque so it is an object of considerable research interest within the mechanical design community, driven primarily by the automotive industry's demands for more energy efficient and environmentally friendlier vehicles as the request for better energy efficiency and for CO2 and NOx reduction, imposed by environmental considerations, pushes many researchers to find new technical solution to improve the emission performance of nowadays IC engine vehicles. Also In case of machine tools applications optimum tool life only be obtained at particular speed ratio and the same cannot be achieved due fixed gear ratios and stepped pulley transmission. Moreover, unlike conventional stepped transmissions the CVT does not suffer from “shifting shock” and also we can achieve optimum speed range at which tool life will be maximum. In this paper investigation of slip and speed ratio of axially displaceable cone variator has been studied with the help of developed test rig and the results are relate with the IC Engine and machine tool application.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133327087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICEEOT.2016.7755363
Jovis Joseph Aloor, P. Sahana, S. Seethal, S. Thomas, M. T. Rajappan Pillai
Our intention is to develop an android application that gives the users a virtual environment with the help of VR headset. With this application, it allows users to generate an object which doesn't exist in real environment. In Augmented Reality (AR), the interfaces comprises of merging both real and virtual objects. In this project we examine existing gaming styles that are played in the real world or on computers. With the help of advanced AR technology the information about the real world that surrounds the user becomes interactive and digitally manipulable. Artificial information about the environment and its objects can thus be overlaid on the real world. A key distinction to VR purists is the fact that the user is completely immersed in the computer simulation. All our senses are focused on visiting this new place. It provides the following features i.e. Full field of vision display, usually produced by the wearing of a Head Mounted Display, tracking of the location and attitude of the contributor's body, computer tracking of the participant's movements and actions along with some negligible delay in updating the display with feedback from the body's movements and actions. This enables users to visualize what if an object an object actually exists there without its actual existence.
{"title":"Design of VR headset using augmented reality","authors":"Jovis Joseph Aloor, P. Sahana, S. Seethal, S. Thomas, M. T. Rajappan Pillai","doi":"10.1109/ICEEOT.2016.7755363","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755363","url":null,"abstract":"Our intention is to develop an android application that gives the users a virtual environment with the help of VR headset. With this application, it allows users to generate an object which doesn't exist in real environment. In Augmented Reality (AR), the interfaces comprises of merging both real and virtual objects. In this project we examine existing gaming styles that are played in the real world or on computers. With the help of advanced AR technology the information about the real world that surrounds the user becomes interactive and digitally manipulable. Artificial information about the environment and its objects can thus be overlaid on the real world. A key distinction to VR purists is the fact that the user is completely immersed in the computer simulation. All our senses are focused on visiting this new place. It provides the following features i.e. Full field of vision display, usually produced by the wearing of a Head Mounted Display, tracking of the location and attitude of the contributor's body, computer tracking of the participant's movements and actions along with some negligible delay in updating the display with feedback from the body's movements and actions. This enables users to visualize what if an object an object actually exists there without its actual existence.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133483103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICEEOT.2016.7755097
Ravindra Kumar, Deepasikha Mishra
In this paper, super-resolution image is obtained from a single low-resolution image using dictionary learning approach. The original image is blurred and downsampled to the low-resolution image, and has to find the value which is lost during downsampling and trained with patches. Each patches of low-resolution image use that value of their respective high-resolution image during training of dictionary. The Hilbert phase congruency which provides more features and good edges and applied to each patches. Then, LR and HR patches of the dictionary are used to generate the high-resolution image patch. In our approach, which results in good quality HR image and having better PSNR values than the other similar SR methods.
{"title":"Improved sparse representation based super-resolution","authors":"Ravindra Kumar, Deepasikha Mishra","doi":"10.1109/ICEEOT.2016.7755097","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755097","url":null,"abstract":"In this paper, super-resolution image is obtained from a single low-resolution image using dictionary learning approach. The original image is blurred and downsampled to the low-resolution image, and has to find the value which is lost during downsampling and trained with patches. Each patches of low-resolution image use that value of their respective high-resolution image during training of dictionary. The Hilbert phase congruency which provides more features and good edges and applied to each patches. Then, LR and HR patches of the dictionary are used to generate the high-resolution image patch. In our approach, which results in good quality HR image and having better PSNR values than the other similar SR methods.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133524171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICEEOT.2016.7755286
Uma Sahu, Srushti Upadhyay, N. Singh, Pritam Patil
Due to constraints on power and cost, robots operating in unstructured environments have limits on onboard computation and limited data on the objects they encounter. Arduino and MATLAB image processing proposes a thin-client model where robot is connected to computing infrastructure for access to computing resources and datasets. The work presents system architecture and a prototype on Robotics system for recognizing and grasping objects. The prototype system incorporates a robot which is basically a 4-degree freedom robotic arm with a movable platform with a web cam mounted on the top, MATLAB for recognizing the correct barcode by image processing and generating the signal on the arduino microcontroller for `PICK' and `PLACE' action along with the use of WI-FI for wireless communication.
{"title":"LIBO: The grasping robot using object recognition","authors":"Uma Sahu, Srushti Upadhyay, N. Singh, Pritam Patil","doi":"10.1109/ICEEOT.2016.7755286","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755286","url":null,"abstract":"Due to constraints on power and cost, robots operating in unstructured environments have limits on onboard computation and limited data on the objects they encounter. Arduino and MATLAB image processing proposes a thin-client model where robot is connected to computing infrastructure for access to computing resources and datasets. The work presents system architecture and a prototype on Robotics system for recognizing and grasping objects. The prototype system incorporates a robot which is basically a 4-degree freedom robotic arm with a movable platform with a web cam mounted on the top, MATLAB for recognizing the correct barcode by image processing and generating the signal on the arduino microcontroller for `PICK' and `PLACE' action along with the use of WI-FI for wireless communication.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132166672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICEEOT.2016.7755404
Divyatmika, Manasa Sreekesh
Intrusion detection systems are systems that can detect any kind of malicious attacks, corrupted data or any kind of intrusion that can pose threat to our systems. In our paper, we would like to present a novel approach to build a network based intrusion detection system using machine learning approach. We have proposed a two-tier architecture to detect intrusions on network level. Network behaviour can be classified as misuse detection and anomaly detection. As our analysis depends on the network behaviour, we have considered data packets of TCP/IP as our input data. After, pre-processing the data by parameter filtering, we build a autonomous model on training set using hierarchical agglomerative clustering. Further, data gets classified as regular traffic pattern or intrusions using KNN classification. This reduces cost-overheads. Misuse detection is conducted using MLP algorithm. Anomaly detection is conducted using Reinforcement algorithm where network agents learn from the environment and take decisions accordingly. The TP rate of our architecture is 0.99 and false positive rate is 0.01. Thus, our architecture provides a high level of security by providing high TP and low false positive rate. And, it also analyzes the usual network patterns and learns incrementally (to build autonomous system) to separate normal data and threats.
{"title":"A two-tier network based intrusion detection system architecture using machine learning approach","authors":"Divyatmika, Manasa Sreekesh","doi":"10.1109/ICEEOT.2016.7755404","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755404","url":null,"abstract":"Intrusion detection systems are systems that can detect any kind of malicious attacks, corrupted data or any kind of intrusion that can pose threat to our systems. In our paper, we would like to present a novel approach to build a network based intrusion detection system using machine learning approach. We have proposed a two-tier architecture to detect intrusions on network level. Network behaviour can be classified as misuse detection and anomaly detection. As our analysis depends on the network behaviour, we have considered data packets of TCP/IP as our input data. After, pre-processing the data by parameter filtering, we build a autonomous model on training set using hierarchical agglomerative clustering. Further, data gets classified as regular traffic pattern or intrusions using KNN classification. This reduces cost-overheads. Misuse detection is conducted using MLP algorithm. Anomaly detection is conducted using Reinforcement algorithm where network agents learn from the environment and take decisions accordingly. The TP rate of our architecture is 0.99 and false positive rate is 0.01. Thus, our architecture provides a high level of security by providing high TP and low false positive rate. And, it also analyzes the usual network patterns and learns incrementally (to build autonomous system) to separate normal data and threats.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132282546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICEEOT.2016.7755385
Rashmi Singh, R. Mehra
The demand of transistors is rising in today's communication system having high data rate. Transistors are used in many applications where high gain is needed by using very low frequency. In today's communication system amplifier is used in many applications such as low noise amplifier, broadband mixer, distributed amplifier, power amplifier etc. The pair amplifier satisfy all parameters which is required by today's technology such as-high speed transmission efficiency, less power consumption and less circuitrary to be used pair is used in advanced version of small signal amplifier with additional biasing resistance which improves voltage gain and widening of bandwidth. It also removes poor frequency response of pair amplifier at higher frequency. In this paper, cadence software is used to study the circuit of two-stage amplifier. In this paper after adding biasing resistance in emitter terminal of first transistor we can increase the voltage gain, current gain, output current and output voltage of pair amplifier. GPDK 90nm technology is used in this paper.
{"title":"Analysis of darlington pair amplifier at 90nm technology","authors":"Rashmi Singh, R. Mehra","doi":"10.1109/ICEEOT.2016.7755385","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755385","url":null,"abstract":"The demand of transistors is rising in today's communication system having high data rate. Transistors are used in many applications where high gain is needed by using very low frequency. In today's communication system amplifier is used in many applications such as low noise amplifier, broadband mixer, distributed amplifier, power amplifier etc. The pair amplifier satisfy all parameters which is required by today's technology such as-high speed transmission efficiency, less power consumption and less circuitrary to be used pair is used in advanced version of small signal amplifier with additional biasing resistance which improves voltage gain and widening of bandwidth. It also removes poor frequency response of pair amplifier at higher frequency. In this paper, cadence software is used to study the circuit of two-stage amplifier. In this paper after adding biasing resistance in emitter terminal of first transistor we can increase the voltage gain, current gain, output current and output voltage of pair amplifier. GPDK 90nm technology is used in this paper.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133408931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICEEOT.2016.7755165
Mohamed Hassan Mohamed, Ashraf Mohamed Ali Hassan, N. M. Hussein Hassan
This paper aimed at introducing a completely automated Arabic phone recognition system based on Enhanced Wavelet Packets Best Tree Encoding (EWPBTE) 15-point speech feature. The process of enhancing of WPBTE is provided by adding energy component to WPBTE, which is implemented in Matlab software and makes an enhancement of 65 % to recognizer accuracy which is the most contribution in this paper. EWPBTE is used to find phoneme boundaries along speech utterance. Hidden Markov Model (HMM) and Gaussian Mixtures are used for building the statistical models through this research. HMM Tool Kit (HTK) software is utilized for implementation of the model. The System can identify spoken phone at 57.01% recognition rate based on Mel Frequency Cepstral Coefficients (MFCC), 21.07% recognition rate based on WPBTE and 86.23% recognition rate based on EWPBTE. The proposed EWPBTE vector is 15 components compared to 39 components of MFCC. This makes it very promising features vector to be under research and in development phase.
{"title":"Automatic speech annotation based on enhanced wavelet Packets Best Tree Encoding (EWPBTE) feature","authors":"Mohamed Hassan Mohamed, Ashraf Mohamed Ali Hassan, N. M. Hussein Hassan","doi":"10.1109/ICEEOT.2016.7755165","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755165","url":null,"abstract":"This paper aimed at introducing a completely automated Arabic phone recognition system based on Enhanced Wavelet Packets Best Tree Encoding (EWPBTE) 15-point speech feature. The process of enhancing of WPBTE is provided by adding energy component to WPBTE, which is implemented in Matlab software and makes an enhancement of 65 % to recognizer accuracy which is the most contribution in this paper. EWPBTE is used to find phoneme boundaries along speech utterance. Hidden Markov Model (HMM) and Gaussian Mixtures are used for building the statistical models through this research. HMM Tool Kit (HTK) software is utilized for implementation of the model. The System can identify spoken phone at 57.01% recognition rate based on Mel Frequency Cepstral Coefficients (MFCC), 21.07% recognition rate based on WPBTE and 86.23% recognition rate based on EWPBTE. The proposed EWPBTE vector is 15 components compared to 39 components of MFCC. This makes it very promising features vector to be under research and in development phase.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114524700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-03-03DOI: 10.1109/ICEEOT.2016.7755497
J. Sreeranganayakulu, G. Marutheswar, K. Anjaneyulu
Subsynchronous Resonance (SSR) is a serious problem in power system networks which causes uncontrolled oscillations in the mechanical system of a multi mass model [1]. Many models have been developed to mitigate these oscillations which generally occur during a symmetrical closed circuit fault on the power system. In this paper the developed model has been tested using IEEE second benchmark system [2] in MATLAB Simulink. Here, this model is simulated without FACTS controllers and then the Static VAr Compensator (SVC) is included in the model and the results are compared for their effectiveness in damping the SSR oscillations.
{"title":"Mitigation of sub synchronous resonance oscillations using static var compensator","authors":"J. Sreeranganayakulu, G. Marutheswar, K. Anjaneyulu","doi":"10.1109/ICEEOT.2016.7755497","DOIUrl":"https://doi.org/10.1109/ICEEOT.2016.7755497","url":null,"abstract":"Subsynchronous Resonance (SSR) is a serious problem in power system networks which causes uncontrolled oscillations in the mechanical system of a multi mass model [1]. Many models have been developed to mitigate these oscillations which generally occur during a symmetrical closed circuit fault on the power system. In this paper the developed model has been tested using IEEE second benchmark system [2] in MATLAB Simulink. Here, this model is simulated without FACTS controllers and then the Static VAr Compensator (SVC) is included in the model and the results are compared for their effectiveness in damping the SSR oscillations.","PeriodicalId":383674,"journal":{"name":"2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115018774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}