Performance Enhancement of Distribution Network with PV Electric Spring using ANFIS Controller under Grid Fluctuations

Authors: B Lakshminarayana, U Anjaiah, Dr. T Srinivasa Rao

Abstract: This paper presents the electric springs (ES) has introduced in interconnected power system for enhancing the system stability and power qualitywith high penetration level of renewable energy sources. The main task of the ES is to stabilize the grid voltage and natural frequency at various disturbances. In this work, the huge amount of power gathered from PV system, which is directly connected to the grid through ES mechanism. Furthermore, it can achieve the balance the power demand and generation in the presence of losses. In this paper, does not need any supplementary energy storage system because of ES mechanism to mitigate the flaws in PV generation. The system has designed on MATLAB/SIMULINK environment. The simulation results reveal the proposed system performs supremacy role as compared to the other techniques.

Keywords: Electric springs, PV system, Grid, Stability, Renewable energy, ANIS.

Mitigation of Microgrid Frequency Droop Control with Fuzzy based WECS with EV

Authors: L Ramesh, K Durga Rao, Dr. T Srinivasa Rao

Abstract: This paper presents an innovative technique in modern power grids that is to operate the combination of wind generators and plug-in hybrid electric vehicles (PHEVs) for alleviating the difficulties. In spite of all their benefits, these two kinds of sources are restricted by some physical constraints thus, both of these sources are incapable to work efficiently for regulating the primary frequency in grids with alleviated inertia. Nevertheless, the combination of wind generator and PHEVs are protecting the frequency during various circumstance over individual source. In this work, small signal system with fuzzy has suggested to examine the frequency regulation approach. Furthermore, the centralized and distributed control schemes are investigated in the presence of cooperation sources and does not occur any violation. The proposed system is investigated on MATLAB/SIMULINK environment. The suggested approach shown the better performance over other conventional control techniques.

Keywords: wind generator, plug-in hybrid electric vehicles, Fuzzy, Small signal, Sources, Centralized control.

High Priority based Secure Transmission in Spectrum Sharing Relaying Networks with Multiple Antennas

Authors: Akkurada Roja, M S R N Naidu

Abstract: To implement spectrum sharing networks in practice, a number of challenging issues, including security, need to be addressed. On account of the open and dynamic features, spectrum sharing CR networks are vulnerable to various malicious attacks, making secure communications to be a difficult task. In the traditional networks, multiple antenna techniques, which can provide extra spatial degrees of freedom, have been exploited to enhance the security of data transmission. we investigate the secrecy performance of a multi-antenna spectrum sharing relaying network in the presence of an eavesdropper. To exploit the inherent benefits of multiple antenna techniques, MRC/ZFB scheme at the relay is used to improve the security of the considered system. Spectrum Sensing algorithm is introduced after ML equalizer. So it will identified the high priority channel quickly. By this processing we can increase the spectral efficiency is proposed. In doing so, we derive exact and simple asymptotic closed-form expressions for the secrecy outage probability of spectrum sharing relaying wiretap channels with the consideration of both the maximum transmit power constraint and the interference temperature constraint.

Keywords: Barcode, data transfer, differential phase shift keying, orthogonal frequency-division multiplexing (OFDM) modulation.

Design and Analysis of a Novel Amorphous Core transformer in Distribution Networks

Authors: K V Gopalachary

Abstract: This paper defines about alloyed (Amorphous) core of a distribution transformer. Traditionally transformer cores have been constructed of grain orientated steel alloys, but a new material which has an amorphous structure is being used increasingly in distribution transformers. The material offers advantages over traditional materials and transformers using the core material are being used in a wide range of applications. According to the measured results, the lowest core loss occurs with an annealing temperature 360℃ under a dc magnetic field density 800A/m. Besides, no load test, sudden short circuit test, and lightning impulse test are performed to ensure the transformer performance. Finally, at the same specifications and rated power, experimental results are presented for the amorphous alloy SA1 core transformer and traditional silicon steel core transformer.

Keywords: Amorphous materials; Transformer design; Core loss; Exciting power; Annealing.

DC-DC Converter fed BLDC Pumping system with MPPT based Solar PV System

Authors: K V Gopalachary

Abstract: This paper describes about design and integration of solar photovoltaic (SPV) array. The power generated from PV system is fed to brushless DC (BLDC) motor driven water pump through a DC-DC boost converter to enhance efficiency of solar system. Voltage regulator is used in inverter control system to get soft switching and to regulate the voltage given to BLDC motor to get desired speed. The speed control of BLDC motor is performed by PWM (Pulse Width Modulation) control of the voltage source inverter (VSI) using DC link voltage regulator. The test system performance is analyzed in MATLAB/Simulink software environment.

Keywords: MPPT, solar PV array, BLDC motor, Water pump, Voltage source inverter (VSI)

An Advanced Sales Forecasting System using XGBoost Algorithm

Authors: Rashmi Priyanka Saradhi V S, Naresh Nelaturi

Abstract: In this paper we have performed deals gauging for stores utilizing diverse data mining methods. The paper included anticipating the deals on some random day at any store. Keeping in mind the end goal to acclimate ourselves with the paper we have examined past work in the space including Time Series Algorithm and also a spatial methodology. A great deal of investigation was performed on the data to recognize examples and anomalies which would supporter obstruct the forecast calculation. The highlights utilized ran from store data to client data also relate land data. Data mining techniques like Linear Regression, Random Forest Regression and XGBoost were executed and the outcomes analyzed. XGBoost which is an enhanced angle boosting calculation was seen to play out the best at expectation. With effectiveness being the route forward in many enterprises today, we mean to extend our answer for help stores enhance efficiency and increment income by exploiting Data Analysis.Applied just three calculations i.e Time Series algo, irregular backwoods and XGBoost. So there is degree for applying more calculations like time arrangement straight models, KNN Regression, Unobserved Component Model, and Principle Component Regression. By taking the relapse of the considerable number of models for every one of the business data may anticipate the business better. For our situation weighted normal of Random Forest yield and XGBoost gives preferable outcome over individual calculations.

Keywords: Sales Prediction, Linear Regression, XGBoost, Time Series, Gradient Boosting.

Comparison and Analysis of DVR with Different Controlling Methods under Sag Condition in Distribution Network

Authors: Shehnaaz Chandini, G.Vanitha

Abstract: In industries due to power fluctuations and other factors the power quality gets effects in the distribution system. Hence Power Quality is the major concern in case of sensitive loads that are present in Distribution System. One of the most frequently occurring power quality problems in distribution network is voltage sag/swell. The main objective is to compensate voltage sag by using Dynamic Voltage Restorer (DVR), here DVR performance is simulated using four control methods. Those methods are Pre sag compensation method, In phase compensation method, Energy Optimization method, In phase advanced method which are used whenever voltage sag occurs. All the four methods are compared and In phase advanced method has found to be better in compensating magnitude of voltage sag and it is also consuming less power observed from simulation results. The performance of DVR is evaluated using simulation in MATLAB/SIMULINK Software.

Keywords: Power Quality, Distribution System, DVR, compensation methods, MATLAB.

A Optimized Analysis for detection of Malicious Mobile App

Authors: B V V Durga, V Sita Rama Prasad, Dr. C P V N J MohanRao

Abstract: Positioning misrepresentation in the portable Application business shows to false or dubious activities, which are motivated behind, thumping up the Applications in the popularity list. To be sure, it ends up being more endless for Application architects to adventure shady means, for instance, developing their Applications' business or posting fraud Application assessments, to ponder situating deception. While the ramification of abstaining from positioning misrepresentation has been largely maintained, there is constrained comprehension and examination here. This paper gives an all-inclusive viewpoint of situating deception and proposes a Positioning misrepresentation distinguishing proof structure for versatile Applications. In particular, it is proposed to precisely discover the mining in order to posture blackmail the dynamic periods, to be particular driving sessions, of compact Applications. Such driving sessions can be used for recognizing the area irregularity as opposed to an overall anomaly of Application rankings. In addition, three sorts of verification s are investigated, i.e., situating based affirmations, displaying to rate based confirmations and study based evidences, Applications' situating, rating and review rehearses through genuine speculations tests. In the request, this paper gets the skill of the proposed system, and shows the distinguishing proof's flexibility estimation furthermore some consistency of situating deception works out.

Keywords: Mobile Apps, ranking fraud detection, historical ranking records, evidence aggregation, review, ranking and rating

Secure Relay Data communication in untrusted cooperative Networks

Authors: M Vikas, N V Ashok kumar

Abstract: This project studies the problem of secure transmission in dual-hop cooperative networks with untrusted relays, where each relay acts as both a potential helper and an eavesdropper. A security-aware relaying scheme is proposed, which employs the alternate jamming and secrecy-enhanced relay selection to prevent the confidential message from being eavesdropped by the untrusted relays. To evaluate the performance of the proposed strategies, we derive the lower bound of the achievable ergodic secrecy rate (ESR), and conduct the asymptotic analysis to examine how the ESR scales as the number of relays increases.

Keywords: Secure routing; Manets; Graph; QoS; Attacks.

A Secure and Efficient Lifetime Routing Optimization for End-to-End Communication in WSN

Authors: MD Raziya, Dr G Satyanarayana

Abstract: Lifetime optimization and security are two conflicting design issues for multi-hop wireless sensor networks (WSNs) with non-replenish able energy resources. In this paper, we first propose a novel secure and efficient end-to-end routing protocol to address these two conflicting issues through two adjustable parameters: energy balance control (EBC) and probabilistic based random walking. We then discover that the energy consumption is severely disproportional to the uniform energy deployment for the given network topology, which greatly reduces the lifetime of the sensor networks. To solve this problem, we propose an efficient non-uniform energy deployment strategy to optimize the lifetime and message delivery ratio under the same energy resource and security requirement. We also provide a quantitative security analysis on the proposed routing protocol. Our theoretical analysis demonstrate that the proposed end to end routing protocol can provide an excellent tradeoff between routing efficiency and energy balance, and can significantly extend the lifetime of the sensor networks in all scenarios. For the non-uniform energy deployment, we also demonstrate that the proposed end-to-end routing protocol can achieve a high message delivery ratio while preventing routing attacks. We adopt a novel approach of group key communication scheme in our design, such that there is a unique group key, called as path key, to protect data transmitted in the entire routing path. Rather than using multiple shared keys to repeat to perform encryption and decryption over every link, we implement end-to-end path keys to reduce the overheads of key generation. Therefore, we can see that by implementing these concepts we can improve efficiency of network and provide more security of transferred message.

Keywords: Security, Wireless Sensor Networks, Frequency hopping, Dijkstra's Algorithm, Encryption and Decryption
If You feel any difficulty in paper submission, Please mail us ijeecm@gmail.com


Copyright © 2015 International Journal of Electrical, Electronics,Computers & Mechanical Engineering. All Rights Reserved.