Pub Date : 2017-09-01DOI: 10.1109/ICPCSI.2017.8392315
Kaushik Das, Rajkishur Mudoi
This paper presents a method for the detection of epileptic seizure from electroencephalogram (EEG) signals in the empirical mode decomposition (EMD) domain. Here we have used statistical moments like variance, skewness and kurtosis and non linear measures like sample entropy and approximate entropy on the intrinsic mode functions (IMFs), which are obtained by doing empirical mode decomposition on normal, interictal and ictal EEG signals. The intrinsic mode functions which are generated by the EMD method can be considered as a set of amplitude and frequency modulated signals. For classification the calculated features are feed to a support vector machine and the effectiveness of the proposed method is studied using a dataset which is available online. In the dataset we have considered three states namely normal, interictal and ictal. The proposed method gives an accuracy of 100% for the classification of normal and ictal as well as interictal and ictal EEG signals.
{"title":"Analysis of EEG signals using empirical mode decomposition and support vector machine","authors":"Kaushik Das, Rajkishur Mudoi","doi":"10.1109/ICPCSI.2017.8392315","DOIUrl":"https://doi.org/10.1109/ICPCSI.2017.8392315","url":null,"abstract":"This paper presents a method for the detection of epileptic seizure from electroencephalogram (EEG) signals in the empirical mode decomposition (EMD) domain. Here we have used statistical moments like variance, skewness and kurtosis and non linear measures like sample entropy and approximate entropy on the intrinsic mode functions (IMFs), which are obtained by doing empirical mode decomposition on normal, interictal and ictal EEG signals. The intrinsic mode functions which are generated by the EMD method can be considered as a set of amplitude and frequency modulated signals. For classification the calculated features are feed to a support vector machine and the effectiveness of the proposed method is studied using a dataset which is available online. In the dataset we have considered three states namely normal, interictal and ictal. The proposed method gives an accuracy of 100% for the classification of normal and ictal as well as interictal and ictal EEG signals.","PeriodicalId":6589,"journal":{"name":"2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI)","volume":"114 1","pages":"358-362"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87993879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICPCSI.2017.8391790
S. S. Singh, Ksh. Tompok Singh, Bharathikoppaka
In this paper, a new classical controller called as Integral Double Derivative Controller (IDD) in coordination with Static Synchronous Series Compensator (SSSC) and Thyristor controlled phase shifter (TCPS) is applied for the first time in automatic generation control (AGC) system. Comparative studies on the performance of IDD controller — SSSC and IDD controller — TCPS is carried out for load-frequency control (LFC) of two-area interconnected thermal reheat power system. The study is carried out considering appropriate generation rate constraints (GRC). A new meta-heuristic search algorithm called as Cuckoo Search (CS) is utilized for finding optimal designing parameters using Integral squared error technique (I.S.E). Critical examination of the dynamic responses of area frequency, tie power and generated power reveals that dynamic responses have improved further with the use of SSSC as compared to those with TCPS. It can be observed that the oscillations in area frequency, tie-power and generated power deviations have decreased to a considerable extent as compared to that of the system with TCPS. Further it is evident that IDD controller with SSSC gives far better performance than IDD with TCPS even in higher degree of perturbation in terms of oscillations and settling time.
{"title":"Performance comparison of IDD controller with SSSC to that with TCPS for damping oscillations in AGC","authors":"S. S. Singh, Ksh. Tompok Singh, Bharathikoppaka","doi":"10.1109/ICPCSI.2017.8391790","DOIUrl":"https://doi.org/10.1109/ICPCSI.2017.8391790","url":null,"abstract":"In this paper, a new classical controller called as Integral Double Derivative Controller (IDD) in coordination with Static Synchronous Series Compensator (SSSC) and Thyristor controlled phase shifter (TCPS) is applied for the first time in automatic generation control (AGC) system. Comparative studies on the performance of IDD controller — SSSC and IDD controller — TCPS is carried out for load-frequency control (LFC) of two-area interconnected thermal reheat power system. The study is carried out considering appropriate generation rate constraints (GRC). A new meta-heuristic search algorithm called as Cuckoo Search (CS) is utilized for finding optimal designing parameters using Integral squared error technique (I.S.E). Critical examination of the dynamic responses of area frequency, tie power and generated power reveals that dynamic responses have improved further with the use of SSSC as compared to those with TCPS. It can be observed that the oscillations in area frequency, tie-power and generated power deviations have decreased to a considerable extent as compared to that of the system with TCPS. Further it is evident that IDD controller with SSSC gives far better performance than IDD with TCPS even in higher degree of perturbation in terms of oscillations and settling time.","PeriodicalId":6589,"journal":{"name":"2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI)","volume":"13 1","pages":"638-643"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86390854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICPCSI.2017.8392303
M. Khosravi, S. Samadi, O. Akbarzadeh
In this paper, we determine an optimal range for angle tracking radars (ATRs) based on evaluating the standard deviation of all kinds of errors in a tracking system. In the past, this optimal range has often been computed by the simulation of the total error components; however, we are going to introduce a closed form for this computation which allows us to obtain the optimal range directly. Thus for this purpose, we firstly solve an optimization problem to achieve the closed form of the optimal range (Ropt.) and then, we compute it by doing a simple simulation. The results show that both theoretical and simulation-based computations are similar to each other.
{"title":"Determining the optimal range of angle tracking radars","authors":"M. Khosravi, S. Samadi, O. Akbarzadeh","doi":"10.1109/ICPCSI.2017.8392303","DOIUrl":"https://doi.org/10.1109/ICPCSI.2017.8392303","url":null,"abstract":"In this paper, we determine an optimal range for angle tracking radars (ATRs) based on evaluating the standard deviation of all kinds of errors in a tracking system. In the past, this optimal range has often been computed by the simulation of the total error components; however, we are going to introduce a closed form for this computation which allows us to obtain the optimal range directly. Thus for this purpose, we firstly solve an optimization problem to achieve the closed form of the optimal range (Ropt.) and then, we compute it by doing a simple simulation. The results show that both theoretical and simulation-based computations are similar to each other.","PeriodicalId":6589,"journal":{"name":"2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI)","volume":"72 1","pages":"3132-3135"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86335580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICPCSI.2017.8391823
Rasika V. Gode, R. Dalvi
Data deduplication is the technique of reduction in the data which keeps only one physical copy and generates pointers to that copy for referencing other redundant data. To secure the confidentiality of private data throughout deduplication, the convergent cryptography technique is used to encode the information before uploading it onto the general public cloud. In our paper, we've got an inclination to present the deduplication-aware resemblance detection and elimination (DARE) scheme that supports authorization in twin cloud surroundings. This scheme uses a duplicate-adjacency info for likeness detection wherever we've got to consider any 2 information blocks to be similar provided that their respective adjacent information blocks are duplicate. Our proposed system achieves deduplication on encrypted data with minimum overhead and also enhances the security by providing authorization in hybrid cloud environment.
{"title":"An effective storage management in a twin cloud architecture using an authorized deduplication technique","authors":"Rasika V. Gode, R. Dalvi","doi":"10.1109/ICPCSI.2017.8391823","DOIUrl":"https://doi.org/10.1109/ICPCSI.2017.8391823","url":null,"abstract":"Data deduplication is the technique of reduction in the data which keeps only one physical copy and generates pointers to that copy for referencing other redundant data. To secure the confidentiality of private data throughout deduplication, the convergent cryptography technique is used to encode the information before uploading it onto the general public cloud. In our paper, we've got an inclination to present the deduplication-aware resemblance detection and elimination (DARE) scheme that supports authorization in twin cloud surroundings. This scheme uses a duplicate-adjacency info for likeness detection wherever we've got to consider any 2 information blocks to be similar provided that their respective adjacent information blocks are duplicate. Our proposed system achieves deduplication on encrypted data with minimum overhead and also enhances the security by providing authorization in hybrid cloud environment.","PeriodicalId":6589,"journal":{"name":"2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI)","volume":"20 1","pages":"796-801"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90044571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICPCSI.2017.8392331
Anshul, Kavita Rathi
There are many digital signal processing applications in which digital filters are used. Signals are used for transmitting the data from source to destination. Then there is high possibility of signal deformation due to external noise. So to get the original signal at destination we used filters. Filters are used to remove the undesired frequencies from applied signal. In the paper, the definition, types and various methods of FIR digital filter are studied. This paper presented the different techniques of designing of filters and then compared.
{"title":"Comparison of various window techniques for design FIR digital filter","authors":"Anshul, Kavita Rathi","doi":"10.1109/ICPCSI.2017.8392331","DOIUrl":"https://doi.org/10.1109/ICPCSI.2017.8392331","url":null,"abstract":"There are many digital signal processing applications in which digital filters are used. Signals are used for transmitting the data from source to destination. Then there is high possibility of signal deformation due to external noise. So to get the original signal at destination we used filters. Filters are used to remove the undesired frequencies from applied signal. In the paper, the definition, types and various methods of FIR digital filter are studied. This paper presented the different techniques of designing of filters and then compared.","PeriodicalId":6589,"journal":{"name":"2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI)","volume":"8 1","pages":"428-432"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88914578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICPCSI.2017.8392160
P. Suresh, T. Manohar
With worldwide increasing demand for electric energy, there has been a great interest in exploring photovoltaic (PV) sources. In recent years, there have been quite a few new transformerless PV inverters topologies, which eliminate the traditional line frequency transformers to achieve lower cost and higher efficiency, and maintain reduced leakage current as well. However, one of the technical difficulties of the transformerless inverter is the safety issue of leakage current. The leakage current through the stray capacitors between the PV array and the ground is harmful because of unstable common mode voltage and absence of galvanic isolation. This leakage current that flows between the parasitic capacitance of PV array and the grid has to be eliminated, may otherwise leads to major safety problems. In addition, according to the international regulations, transformerless inverter should be capable of handling a certain amount of reactive power. Here, a newly proposed transformerless inverter for grid tied PV system can eliminate the threat of leakage current. The proposed topology also has the ability to inject reactive power into the utility grid. Fuzzy logic controller and PR controller is used to ensure high quality injected current to the grid. Detailed analysis of proposed transformerless inverter with operation modes of common mode, leakage current analysis and reactive power control capability in MATLAB simulation model are presented.
{"title":"A novel fuzzy based transformer less PV inverter for reactive power control in grid connected PV system","authors":"P. Suresh, T. Manohar","doi":"10.1109/ICPCSI.2017.8392160","DOIUrl":"https://doi.org/10.1109/ICPCSI.2017.8392160","url":null,"abstract":"With worldwide increasing demand for electric energy, there has been a great interest in exploring photovoltaic (PV) sources. In recent years, there have been quite a few new transformerless PV inverters topologies, which eliminate the traditional line frequency transformers to achieve lower cost and higher efficiency, and maintain reduced leakage current as well. However, one of the technical difficulties of the transformerless inverter is the safety issue of leakage current. The leakage current through the stray capacitors between the PV array and the ground is harmful because of unstable common mode voltage and absence of galvanic isolation. This leakage current that flows between the parasitic capacitance of PV array and the grid has to be eliminated, may otherwise leads to major safety problems. In addition, according to the international regulations, transformerless inverter should be capable of handling a certain amount of reactive power. Here, a newly proposed transformerless inverter for grid tied PV system can eliminate the threat of leakage current. The proposed topology also has the ability to inject reactive power into the utility grid. Fuzzy logic controller and PR controller is used to ensure high quality injected current to the grid. Detailed analysis of proposed transformerless inverter with operation modes of common mode, leakage current analysis and reactive power control capability in MATLAB simulation model are presented.","PeriodicalId":6589,"journal":{"name":"2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI)","volume":"19 13","pages":"2463-2472"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91439348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICPCSI.2017.8391787
Ujwal Gajula, R. Reddy
In photovoltaic applications, it is possible to remove the transformer in the inverter to reduce losses, costs, and size. Galvanic connection of the grid and the dc sources in transformer less systems can introduce additional ground currents due to the ground parasitic capacitance. The leakage current has to be tackled carefully for such type of inverter topologies. Neutral point clamped (NPC) topology is an effective way to eliminate the leakage current. A universal prototype for these three NPC-type topologies is built to evaluate the topologies at conversion efficiency and the leakage current characteristic. The PN-NPC topology exhibits similar leakage current with the FB-DCBP, which is lower than that of the oH5 topology, and features higher efficiency than both the oH5 and the FB-DCBP topologies. Total harmonic distortion of NPC topologies will get better with Hybrid filters.
{"title":"Transformerless grid tied inverter using neutral point clamped full bridge topologies and hybrid filter for THD reduction","authors":"Ujwal Gajula, R. Reddy","doi":"10.1109/ICPCSI.2017.8391787","DOIUrl":"https://doi.org/10.1109/ICPCSI.2017.8391787","url":null,"abstract":"In photovoltaic applications, it is possible to remove the transformer in the inverter to reduce losses, costs, and size. Galvanic connection of the grid and the dc sources in transformer less systems can introduce additional ground currents due to the ground parasitic capacitance. The leakage current has to be tackled carefully for such type of inverter topologies. Neutral point clamped (NPC) topology is an effective way to eliminate the leakage current. A universal prototype for these three NPC-type topologies is built to evaluate the topologies at conversion efficiency and the leakage current characteristic. The PN-NPC topology exhibits similar leakage current with the FB-DCBP, which is lower than that of the oH5 topology, and features higher efficiency than both the oH5 and the FB-DCBP topologies. Total harmonic distortion of NPC topologies will get better with Hybrid filters.","PeriodicalId":6589,"journal":{"name":"2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI)","volume":"1 1","pages":"620-626"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83022695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICPCSI.2017.8392297
Garima Singh
The advanced development in the field of web technology has enabled to use medical images and Electronics Patient Record (EPR) in the healthcare sector for the purpose of sharing patient information between networked hospitals and healthcare centers. As an EPR may carry important information which requires the guarantee of security, authenticity and management of medical images and information through storage and distribution. Digital watermark can be considered as an efficient technology to address the difficulties of unauthorized access of medical content which is to be distributed on the internet. The watermarking techniques are growing to protect the medical healthcare information. This is a technique for embedding the EPR information in the medical image to save storage space and transmission overheads and to guarantee security of the medical content which is to be shared over the network. In this paper, we have given the review of several approaches which has been proposed by various authors.
{"title":"A review of secure medical image watermarking","authors":"Garima Singh","doi":"10.1109/ICPCSI.2017.8392297","DOIUrl":"https://doi.org/10.1109/ICPCSI.2017.8392297","url":null,"abstract":"The advanced development in the field of web technology has enabled to use medical images and Electronics Patient Record (EPR) in the healthcare sector for the purpose of sharing patient information between networked hospitals and healthcare centers. As an EPR may carry important information which requires the guarantee of security, authenticity and management of medical images and information through storage and distribution. Digital watermark can be considered as an efficient technology to address the difficulties of unauthorized access of medical content which is to be distributed on the internet. The watermarking techniques are growing to protect the medical healthcare information. This is a technique for embedding the EPR information in the medical image to save storage space and transmission overheads and to guarantee security of the medical content which is to be shared over the network. In this paper, we have given the review of several approaches which has been proposed by various authors.","PeriodicalId":6589,"journal":{"name":"2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI)","volume":"45 1","pages":"3105-3109"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79465841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICPCSI.2017.8392108
A. Bhowmik, A. Chakraborty
This paper presents the solution of different optimal power flow (OPF) problems using non dominated sorting based multi objective gravitational search algorithm (NSMOGSA). OPF problem is formulated as a non-linear constrained optimization problem where different objectives and various constraints have been considered into the formulation. To show the effectiveness of the proposed algorithm, it has been tested on a standard IEEE 30-bus system with two different individual objectives that reflect active power loss minimization and fuel cost minimization with valve point loading effect. The performance of NSMOGSA is compared with the results found by other meta-heuristic techniques reported in the recent literature. Numerical results demonstrate the tangible superiority of the proposed method in achieving the optimum OPF solution.
{"title":"Non dominated sorting based multi objective GSA for solving optimal power flow problems","authors":"A. Bhowmik, A. Chakraborty","doi":"10.1109/ICPCSI.2017.8392108","DOIUrl":"https://doi.org/10.1109/ICPCSI.2017.8392108","url":null,"abstract":"This paper presents the solution of different optimal power flow (OPF) problems using non dominated sorting based multi objective gravitational search algorithm (NSMOGSA). OPF problem is formulated as a non-linear constrained optimization problem where different objectives and various constraints have been considered into the formulation. To show the effectiveness of the proposed algorithm, it has been tested on a standard IEEE 30-bus system with two different individual objectives that reflect active power loss minimization and fuel cost minimization with valve point loading effect. The performance of NSMOGSA is compared with the results found by other meta-heuristic techniques reported in the recent literature. Numerical results demonstrate the tangible superiority of the proposed method in achieving the optimum OPF solution.","PeriodicalId":6589,"journal":{"name":"2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI)","volume":"14 1","pages":"2195-2200"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79599691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-09-01DOI: 10.1109/ICPCSI.2017.8392018
B. Geetha, V. Perumal
The consumption and reduction in manual work are the main motive of automation. Accessing a book depending upon the availability by an user is a tedious task. If there is a system which notify the availability of the book then there prevails time consumption and the user opts for an alternate. For the above process to be achieved, the system must comprise of RFID system installed in each rack. The books present at the rack comprises of unique information such as title, author, ISBN code, etc. These RFID antennas readily send information regarding the books to the OPAC(Open Public Access Catalogue). When the book has been taken from the smart rack, then a notification regarding the availability of the book. Each and every book placed in the book rack comprises of unique information regarding the book such as title, ISBN code, etc. The RFID system is connected along with the OPAC (Online Public Access Catalog). When a book has been accessed by an user, the RFID sensor senses it and immediately notify the information to the OPAC. The decrease in the number of book and the missing of the particular book is identified by the RFID system. Thus there will be a change in the status in the OPAC system regarding the availability of the book from “Available” to “Engaged”.
{"title":"Survey of different techniques involved in library management services","authors":"B. Geetha, V. Perumal","doi":"10.1109/ICPCSI.2017.8392018","DOIUrl":"https://doi.org/10.1109/ICPCSI.2017.8392018","url":null,"abstract":"The consumption and reduction in manual work are the main motive of automation. Accessing a book depending upon the availability by an user is a tedious task. If there is a system which notify the availability of the book then there prevails time consumption and the user opts for an alternate. For the above process to be achieved, the system must comprise of RFID system installed in each rack. The books present at the rack comprises of unique information such as title, author, ISBN code, etc. These RFID antennas readily send information regarding the books to the OPAC(Open Public Access Catalogue). When the book has been taken from the smart rack, then a notification regarding the availability of the book. Each and every book placed in the book rack comprises of unique information regarding the book such as title, ISBN code, etc. The RFID system is connected along with the OPAC (Online Public Access Catalog). When a book has been accessed by an user, the RFID sensor senses it and immediately notify the information to the OPAC. The decrease in the number of book and the missing of the particular book is identified by the RFID system. Thus there will be a change in the status in the OPAC system regarding the availability of the book from “Available” to “Engaged”.","PeriodicalId":6589,"journal":{"name":"2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI)","volume":"78 4 1","pages":"1768-1773"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83415359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}