Design and Analysis of a Novel Amorphous Core transformer in Distribution Networks

Authors: K V Gopalachary

Abstract: This paper defines about alloyed (Amorphous) core of a distribution transformer. Traditionally transformer cores have been constructed of grain orientated steel alloys, but a new material which has an amorphous structure is being used increasingly in distribution transformers. The material offers advantages over traditional materials and transformers using the core material are being used in a wide range of applications. According to the measured results, the lowest core loss occurs with an annealing temperature 360℃ under a dc magnetic field density 800A/m. Besides, no load test, sudden short circuit test, and lightning impulse test are performed to ensure the transformer performance. Finally, at the same specifications and rated power, experimental results are presented for the amorphous alloy SA1 core transformer and traditional silicon steel core transformer.

Keywords: Amorphous materials; Transformer design; Core loss; Exciting power; Annealing.

DC-DC Converter fed BLDC Pumping system with MPPT based Solar PV System

Authors: K V Gopalachary

Abstract: This paper describes about design and integration of solar photovoltaic (SPV) array. The power generated from PV system is fed to brushless DC (BLDC) motor driven water pump through a DC-DC boost converter to enhance efficiency of solar system. Voltage regulator is used in inverter control system to get soft switching and to regulate the voltage given to BLDC motor to get desired speed. The speed control of BLDC motor is performed by PWM (Pulse Width Modulation) control of the voltage source inverter (VSI) using DC link voltage regulator. The test system performance is analyzed in MATLAB/Simulink software environment.

Keywords: MPPT, solar PV array, BLDC motor, Water pump, Voltage source inverter (VSI)

An Advanced Sales Forecasting System using XGBoost Algorithm

Authors: Rashmi Priyanka Saradhi V S, Naresh Nelaturi

Abstract: In this paper we have performed deals gauging for stores utilizing diverse data mining methods. The paper included anticipating the deals on some random day at any store. Keeping in mind the end goal to acclimate ourselves with the paper we have examined past work in the space including Time Series Algorithm and also a spatial methodology. A great deal of investigation was performed on the data to recognize examples and anomalies which would supporter obstruct the forecast calculation. The highlights utilized ran from store data to client data also relate land data. Data mining techniques like Linear Regression, Random Forest Regression and XGBoost were executed and the outcomes analyzed. XGBoost which is an enhanced angle boosting calculation was seen to play out the best at expectation. With effectiveness being the route forward in many enterprises today, we mean to extend our answer for help stores enhance efficiency and increment income by exploiting Data Analysis.Applied just three calculations i.e Time Series algo, irregular backwoods and XGBoost. So there is degree for applying more calculations like time arrangement straight models, KNN Regression, Unobserved Component Model, and Principle Component Regression. By taking the relapse of the considerable number of models for every one of the business data may anticipate the business better. For our situation weighted normal of Random Forest yield and XGBoost gives preferable outcome over individual calculations.

Keywords: Sales Prediction, Linear Regression, XGBoost, Time Series, Gradient Boosting.

Comparison and Analysis of DVR with Different Controlling Methods under Sag Condition in Distribution Network

Authors: Shehnaaz Chandini, G.Vanitha

Abstract: In industries due to power fluctuations and other factors the power quality gets effects in the distribution system. Hence Power Quality is the major concern in case of sensitive loads that are present in Distribution System. One of the most frequently occurring power quality problems in distribution network is voltage sag/swell. The main objective is to compensate voltage sag by using Dynamic Voltage Restorer (DVR), here DVR performance is simulated using four control methods. Those methods are Pre sag compensation method, In phase compensation method, Energy Optimization method, In phase advanced method which are used whenever voltage sag occurs. All the four methods are compared and In phase advanced method has found to be better in compensating magnitude of voltage sag and it is also consuming less power observed from simulation results. The performance of DVR is evaluated using simulation in MATLAB/SIMULINK Software.

Keywords: Power Quality, Distribution System, DVR, compensation methods, MATLAB.

A Optimized Analysis for detection of Malicious Mobile App

Authors: B V V Durga, V Sita Rama Prasad, Dr. C P V N J MohanRao

Abstract: Positioning misrepresentation in the portable Application business shows to false or dubious activities, which are motivated behind, thumping up the Applications in the popularity list. To be sure, it ends up being more endless for Application architects to adventure shady means, for instance, developing their Applications' business or posting fraud Application assessments, to ponder situating deception. While the ramification of abstaining from positioning misrepresentation has been largely maintained, there is constrained comprehension and examination here. This paper gives an all-inclusive viewpoint of situating deception and proposes a Positioning misrepresentation distinguishing proof structure for versatile Applications. In particular, it is proposed to precisely discover the mining in order to posture blackmail the dynamic periods, to be particular driving sessions, of compact Applications. Such driving sessions can be used for recognizing the area irregularity as opposed to an overall anomaly of Application rankings. In addition, three sorts of verification s are investigated, i.e., situating based affirmations, displaying to rate based confirmations and study based evidences, Applications' situating, rating and review rehearses through genuine speculations tests. In the request, this paper gets the skill of the proposed system, and shows the distinguishing proof's flexibility estimation furthermore some consistency of situating deception works out.

Keywords: Mobile Apps, ranking fraud detection, historical ranking records, evidence aggregation, review, ranking and rating

Secure Relay Data communication in untrusted cooperative Networks

Authors: M Vikas, N V Ashok kumar

Abstract: This project studies the problem of secure transmission in dual-hop cooperative networks with untrusted relays, where each relay acts as both a potential helper and an eavesdropper. A security-aware relaying scheme is proposed, which employs the alternate jamming and secrecy-enhanced relay selection to prevent the confidential message from being eavesdropped by the untrusted relays. To evaluate the performance of the proposed strategies, we derive the lower bound of the achievable ergodic secrecy rate (ESR), and conduct the asymptotic analysis to examine how the ESR scales as the number of relays increases.

Keywords: Secure routing; Manets; Graph; QoS; Attacks.

A Secure and Efficient Lifetime Routing Optimization for End-to-End Communication in WSN

Authors: MD Raziya, Dr G Satyanarayana

Abstract: Lifetime optimization and security are two conflicting design issues for multi-hop wireless sensor networks (WSNs) with non-replenish able energy resources. In this paper, we first propose a novel secure and efficient end-to-end routing protocol to address these two conflicting issues through two adjustable parameters: energy balance control (EBC) and probabilistic based random walking. We then discover that the energy consumption is severely disproportional to the uniform energy deployment for the given network topology, which greatly reduces the lifetime of the sensor networks. To solve this problem, we propose an efficient non-uniform energy deployment strategy to optimize the lifetime and message delivery ratio under the same energy resource and security requirement. We also provide a quantitative security analysis on the proposed routing protocol. Our theoretical analysis demonstrate that the proposed end to end routing protocol can provide an excellent tradeoff between routing efficiency and energy balance, and can significantly extend the lifetime of the sensor networks in all scenarios. For the non-uniform energy deployment, we also demonstrate that the proposed end-to-end routing protocol can achieve a high message delivery ratio while preventing routing attacks. We adopt a novel approach of group key communication scheme in our design, such that there is a unique group key, called as path key, to protect data transmitted in the entire routing path. Rather than using multiple shared keys to repeat to perform encryption and decryption over every link, we implement end-to-end path keys to reduce the overheads of key generation. Therefore, we can see that by implementing these concepts we can improve efficiency of network and provide more security of transferred message.

Keywords: Security, Wireless Sensor Networks, Frequency hopping, Dijkstra's Algorithm, Encryption and Decryption

PV system integration with grid using fuzzy based H-Bridge multilevel inverter

Authors: Hasen Ali, Dr.T Srinivasa Rao, R Ganesh

Abstract: This paper characterizes another fuzzy based controller based measured fell H-bridge multilevel photovoltaic (PV) inverter for single-or three-phase grid-associated applications. The particular fell multilevel topology enhances the proficiency and adaptability of PV systems. To acknowledge better use of PV modules and maximize the sun based vitality extraction, a disseminated most extreme power point tracking control plan is connected to both single-and three-phase multilevel inverters, which permits free control of each dc-connection voltage. For three-stage network associated applications, PV mismatches may present uneven provided control, leading to lopsided framework current. To unravel this issue, a control scheme with tweak remuneration is likewise proposed. An experimental three-stage seven-level fell H-connect inverter has been built utilizing nine H-connect modules (three modules for every stage). Each H-connect module is associated with a 185-W sun oriented board. Simulation and test results are exhibited to check the possibility of the proposed approach.

Keywords: Fuzzy, Cascaded multilevel inverter, distributed maximum power point (MPP) tracking (MPPT), modular, modulation compensation, photovoltaic (PV).

Cooperative OFDM Communication with DQPSK

Authors: Javvadi Satya Naga Manikanta, Balakrishna Batta

Abstract: The idea of 2-D standardized tags is of extraordinary significance for use in remote information transmission between handheld electronic gadgets. In a regular setup, any document on a PDA, for instance, can be exchanged to a moment mobile phone through a progression of pictures on the LCD which are then caught and decoded through the camera of the second wireless. In this examination, another approach for information adjustment in 2-D standardized tags is presented, and its execution is assessed in contrast with other standard strategies for scanner tag regulation. In this new approach, orthogonal recurrence division multiplexing (OFDM) tweak is utilized together with differential stage move keying (DPSK) over contiguous recurrence space components. A particular point of this investigation is to build up a framework that is demonstrated tolerant to camera developments, picture obscure, and light spillage inside neighbouring pixels of a LCD. In this paper Differential Phase Shift Keying was joined on account of Orthogonal Frequency Division Multiplexing keeping the ultimate objective to control data stream into visual two dimensional institutionalized labels. It was exhibited that QPSK-OFDM direction has certifiable insufficiencies in the balance of camera LCD improvements where the time of each part changes tenaciously. On the other hand, development of a differential stage modulator before OFDM to manage the data stream into organize differences of close-by parts (DPSK-OFDM) causes the development effect to logically incapacitate in light of its unfaltering change from segment to segment, adding to a little deviation from the ideal stage in the got hail. It was watched that under relative LCD-camera developments that create screw up rates in plenitude of 30% in PAM and QPSK-OFDM, the proposed course of action of DPSK-OFDM will keep up an error rate under 8% which is basically correctable using goof revision coding.

Keywords: Barcode, data transfer, differential phase shift keying, orthogonal frequency-division multiplexing (OFDM) modulation

Study and Analysis of different types of PLLs used in DVR’s for sag swell compensation under grid fault condition

Authors: M Santhosh Kumar, Dr.T Srinivasa Rao, M V Ramana Murty

Abstract: The real system code necessities for the system relationship of appropriated time structures, generally wind and photovoltaic (PV) systems, are ending up being incredibly asking. The transmission system heads (TSOs) are especially worried about the low-voltage-ride-through necessities. Courses of action in view of the foundation of STATCOMs and component voltage controllers (DVRs), and furthermore on front line control functionalities for the current drive converters of scattered time plants, have added to redesign their response under blemished and distorted circumstances and, in this manner, to fulfill these requirements. With a particular true objective to achieve pleasing results with such systems, it is critical to rely on upon exact and speedy system voltage synchronization estimations, which can work under uneven and turned conditions. This paper separates the synchronization capacity of three moved synchronization systems: the decoupled twofold synchronous reference diagram arrange darted circle (PLL), the twofold second demand summed up integrator PLL, and the three-organize enhanced PLL, planned to work under such conditions. Despite the way that distinctive systems in light of repeat darted circles have also been made, PLLs have been picked due to their association with dq0 controllers. In the going with, the unmistakable estimations will be shown additionally, discretized, and their execution will be attempted in an exploratory setup controlled in order to evaluate their precision likewise, execution highlights.

Keywords: Electric variable estimations, electrical designing, recurrence estimation, recurrence bolted circles, consonant examination, observing, synchronization.
If You feel any difficulty in paper submission, Please mail us

Copyright © 2015 International Journal of Electrical, Electronics,Computers & Mechanical Engineering. All Rights Reserved.