Voltage THD Reduction for Cascaded Multi-level Converter using Sliding Mode Control
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1504-1507, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.15041507
Abstract
This paper presents a detailed harmonic analysis in terms of Total Harmonic Distortion (THD) for different power circuit topologies of multi-level inverter fed induction motor drives. The most common multilevel inverter topologies are the neutral-point-clamped inverter (NPC), flying capacitor inverter (FC), and cascaded H-bridge inverter (CHB). This work is to analyze the performance of all the power circuit topologies of multilevel inverter with various multi carrier PWM control techniques. Simulation and results shows that the superiority of these inverters over two-level pulse width modulation based inverter fed drives.
Key-Words / Index Term
Multi-level Converter, Pulse Width Modulation, Total Harmonic Distortion
References
[1] D. Kiadehi, K. E. K. Drissi and C. Pasquier, "Voltage THD Reduction for Dual-Inverter Fed Open-End Load With Isolated DC Sources," in IEEE Transactions on Industrial Electronics, vol. 64, no. 3, pp. 2102-2111, March 2017.
[2] P.Palanivel Subhransu Sekher, (2010) “Phase Shifted Carrier Pulse Width Modulation for Three Phase Multilevel Inverter to Minimize THD and Enhance Output Voltage Performance” J. Electrical Systems.
[3] Brendan Peter McGrath, Donald Grahame Holmes, (2002) “Multicarrier PWM Strategies for Multilevel Inverters” IEEE Transactions on Industrial Electronics, Vol. 49, No. 4.
[4] Leon M. Tolbert, T.G. Habetler, (1998) "Novel Multilevel inverter Carrier-Based PWM Methods", IEEE IAS Annual meeting, Oct. 10-15, 1424-1431.
[5] Bambang Sujanarko (2010),”Advanced Carrier Based Pulse Width Modulation in Asymmetric Cascaded Multilevel Inverter” International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 10 No: 06.
[6] M. Ghasem Hosseini Aghdam, S. Hamid Fathi, Gevorg B. Gharehpetian, (2008) “Harmonic Optimization Techniques in Multi-Level Voltage-Source Inverter with Unequal DC Sources” Journal of Power Electronics, Vol. 8, No. 2.
[7] Hussein A. Konber and Osama I. EL-Hamrawy, (2010) “Implementing a Three Phase Nine-Level Cascaded Multilevel Inverter with low Harmonics Values” MEPCON’10, Cairo University, Egypt, December 19-21.
[8] Dehghani kiadehi, K. El Khamlichi Drissi and C. Pasquier, "Angular Modulation of Dual-Inverter Fed Open-End Motor for Electrical Vehicle Applications," in IEEE Transactions on Power Electronics, vol. 31, no. 4, pp. 2980-2990, April 2016.
[9] M. Darijevic, M. Jones and E. Levi, "An Open-End Winding Four-Level Five-Phase Drive," in IEEE Transactions on Industrial Electronics, vol. 63, no. 1, pp. 538-549, Jan. 2016.
[10] Y. Lee and J. I. Ha, "Hybrid Modulation of Dual Inverter for Open-End Permanent Magnet Synchronous Motor," in IEEE Transactions on Power Electronics, vol. 30, no. 6, pp. 3286-3299, June 2015.
[11] Zhong Du, Burak Ozpineci, and Leon M. Tolbert, (2007) “Modulation Extension Control of Hybrid Cascaded H-bridge Multilevel Converters with 7-level Fundamental Frequency Switching Scheme” IEEE 2007.
[12] Zhong Du, LeonM.Tolbert, Burak Ozpineci, John N. Chiasson, (2009) “Fundamental Frequency Switching Strategies of a Seven-Level Hybrid Cascaded H-Bridge Multilevel Inverter” IEEE transactions on power electronics, vol. 24, no. 1.
[13] Dietmar Krug, Steffen Bernet, Seyed Saeed Fazel, (2007) “Comparison of 2.3-kV Medium-Voltage Multilevel Converters for Industrial Medium-Voltage Drives” IEEE transactions on industrial electronics, vol. 54, no. 6.
Citation
Rupendra Saini, K. T. Chaturvedi, "Voltage THD Reduction for Cascaded Multi-level Converter using Sliding Mode Control," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1504-1507, 2019.
Electrical Distribution Network for Loss Reduction and Voltage Enhancement
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1508-1512, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.15081512
Abstract
Flexible AC Transmission Systems (FACTS) Controllers are used to increase transmission capacity by damping the power system oscillations and regulating the bus voltage at which the Static Compensator is connected. The focus in this paper is to describe the use of Fuzzy Logic Controller with STATCOM Controllers and compare them in static voltage stability improvements for the damping of the IEEE 14 Bus power system oscillations. A Single line diagram of the IEEE 14 Bus standard system is used in this paper with load assumed to be represented by constant impedance. The size and installation location for load margin improvement and price discussions are addressed. The IEEE 14 Bus is modeled using the elements of Simulink. The effectiveness of the proposed controllers, the improvements in power quality and in voltage profile is demonstrated. In the simulation, the results of the proposed model for the Fuzzy Logic Controller based STATCOM are determined.
Key-Words / Index Term
IEEE 14 bus System, Fuzzy Logic Controller, STATCOM Technology, MATLAB Simulink
References
[1] M. Venkateswara Reddy, Sishnu Prasad Muni and A. V. R. S. Sarma, “Enhancement of Voltage Profile for IEEE 14 Bus System with Inter line Power Flow Controller”, 2016 Biennial International Conference on Power and Energy Systems: Towards Sustainable Energy (PESTS E).
[2] A. Wiszniewski, "New criteria of voltage stability margin for the purpose of load shedding", IEEE Transactions on Power Delivery, Vol. 22, No.3, ,July 2007 pp. 1376-1370.
[3] Gyugyi, L, Fuerte-Esquivel, C. R., Acha, E., Tan, S.G., Rico, 1.1., `Efficient object oriented power system software for the analysis of large-scale networks containing facts controlled branches`, IEEE Trans. Power System 3(2) 1998, pp- 464-472.
[4] Hingorani, N.G., Gyugyi, “Understanding facts concepts and technology of flexible ac transmission systems”, Institute of Electrical and Electronic Engineers, New York, 2000.
[5] K. A. Corzine, M. W. Wielebski, F. Z. Peng, and 1. Wang, "Control of cascaded multilevel inverters," IEEE Trans. power electron, vol. 19, no.3, May 2004,pp. 732-738.
[6] L. A. Zarate, C. A. Castro, 1. L. Ramos, and E. R. Ramos, "Fast computation of voltage stability security margins using nonlinear 158 programming techniques", IEEE Transactions on Power Systems, Vol. 21, No.1" February 2006,pp. 19-22.
[7] J. Zhang, 1. Y. Wen, S. 1. Cheng, and 1. Ma, "A Novel svc allocation method for power system voltage stability enhancement by normal forms of diffeomorphism", IEEE Transactions on Power Systems, Vol. 22, No.4, pp. 1819-1822,
[8] S. Gerbex, R. Cherkaoui, and A. 1. Germond, "Optimal location of facts devices to enhance power system security", IEEE Power Tech Conference, Bologna, June 2003, pp.l -7.
[9] A. E. Hammad, “Analysis of Power System Stability Enhancement by Static VAR Compensators”, IEEE Trans. PWRS, 1986.
[10] K. R. Padiyar and R. K. Varma, “Damping Torque Analysis of Static VAR System Oscillations”, IEEE Tran. PWRS, 1991.
[11] A. R. Messina, O. Begovich, and M. Nayebzadeh, “Analytical Investigation of the Use of Static VAR Compensators to Aid Damping of Interarea Oscillations”, Electric Power Systems Research, 1999.
[12] M. Parniani and M. R. Iravani, “Optimal Robust Control Design of Static VAR Compensators”, IEE Proc. Genet. Transm. Distrib., 1998.
[13] M. A. Abido, “Analysis and Assessment of STATCOM-Based Damping Stabilizers for Power System Stability Enhancement”, Electric Power Systems Research, 2005.
[14] N. C. Sahoo, B. K. Panigrahi, P.K. Dash, and G. Panda, “Multivariable Nonlinear Control of STATCOM for Synchronous Generator Stabilization”, Int. J. of Electrical Power and Energy Systems. 2004.
[15] L. Cong and Y. Wang, “Coordinated Control of Generator Excitation and STATCOM for Rotor Angle Stability and Voltage Regulation Enhancement of Power Systems”, IEE Proc. Gener. Transm. Distrib., 2002.
Citation
Rajat Kumar Patel, K. T. Chaturvedi, "Electrical Distribution Network for Loss Reduction and Voltage Enhancement," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1508-1512, 2019.
Average Spectrum Efficiency of Non-Orthogonal Multiple Access (NOMA) for 5G Wireless Systems
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1513-1517, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.15131517
Abstract
Investigating NOMA for conventional downlink and uplink systems, the application of NOMA is investigated in downlink multiuser multiple-input multiple output (MIMO) systems, by proposing a novel MIMO-NOMA model with linear beamforming technique. In this MIMO-NOMA system, users` receive antennas are dynamically grouped into a number of disjoint clusters, and within each cluster a single beam is shared by all the receive antennas those adopt NOMA. The superiority of the proposed model is illustrated through extensive performance evaluations. Finally, the application of coordinated multi-point (CoMP) transmission technique is investigated in downlink multi-cell NOMA systems, considering distributed power allocation at each cell. In the proposed CoMP-NOMA model, CoMP transmission is used for users experiencing strong receive-signals from multiple cells while each cell independently adopts NOMA for resource allocation. The applicability and necessary conditions to use different CoMP schemes are identified under various network scenarios, and the corresponding throughput formulas are derived. The spectral efficiency gains of the proposed CoMP-NOMA model are also quantified.
Key-Words / Index Term
Non Orthogonal Multiple Access (NOMA), Fifth Generation, Spectral Efficiency, 5G Wireless System
References
[1] Linglong Dai, Bichai Wang, Zhiguo Ding, Zhaocheng Wang and Sheng Chen, “A Survey of Non-Orthogonal Multiple Access for 5G”, IEEE Communications Surveys & Tutorials, Vol. 20, Issue 3, PP. No. 2294 – 2323, IEEE 2018.
[2] Y. Cai Z. Qin F. Cui G. Y. Li J. A. Mc Cann "Modulation and multiple access for 5G networks" IEEE Communication Surveys, Vol. 20, No. 1, PP. No. 629-646, IEEE 2018.
[3] S. M. R. Islam N. Avazov O. A. Dobre K.S. Kwak "Power-domain non-orthogonal multiple access (NOMA) in 5G systems: Potentials and challenges" IEEE Communication Surveys, Vol. 19, No. 2 PP. No. 721-742, IEEE 2017.
[4] S. M. R. Islam M. Zeng O. A. Dobre "NOMA in 5G systems: Exciting possibilities for enhancing spectral efficiency" IEEE 5G Tech Focus, Vol. 1 No. 2 pp. 1-6, Jun. 2017.
[5] Z. Ding et al. "A survey on non-orthogonal multiple access for 5G networks: Research challenges and future trends" IEEE J. Sel. Areas Communication Vol. 35, No. 10, PP. No. 2181-2195, Oct. 2017.
[6] Z. Wei J. Yuan D. W. K. Ng M. Elkashlan Z. Ding "A survey of downlink non-orthogonal multiple access for 5G wireless communication networks" ZTE Communication, Vol. 14, No. 4, PP. No. 17-23, IEEE 2016.
[7] M. S. Ali H. Tabassum E. Hossain "Dynamic user clustering and power allocation for uplink and downlink non-orthogonal multiple access (NOMA) systems" IEEE Access, Vol. 4, PP. No. 6325-6343 2016.
[8] M. S. Ali E. Hossain D. I. Kim "Non-orthogonal multiple access (NOMA) for downlink multiuser MIMO systems: User clustering beamforming and power allocation" IEEE Access vol. 5 pp. 565-577 2016.
[9] Linglong Dai, Bichai Wang, Yifei Yuan, Shuangfeng Han, Chih-Lin I, and Zhaocheng Wang, “Non-Orthogonal Multiple Access for 5G: Solutions, Challenges, Opportunities, and Future Research Trends”, IEEE Communications Magazine, 2015.
[10] A. Benjebbour, K. Saito, A. Li, Y. Kishiyama, and T. Nakamura, Non-orthogonal multiple access (noma): Concept, performance evaluation and experimental trials," in Wireless Networks and Mobile Communications (WINCOM), 2015 International Conference on. IEEE, 2015.
[11] K. Higuchi and A. Benjebbour, “Non-orthogonal multiple access (noma) with successive interference cancellation for future radio access", IEICE Transactions on Communications, vol. 98, no. 3, pp. 403{414, 2015.
Citation
Arpita Gupta, Anubhuti Khare, "Average Spectrum Efficiency of Non-Orthogonal Multiple Access (NOMA) for 5G Wireless Systems," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1513-1517, 2019.
Spectrum Efficiency and BER Analysis of Cell Free Massive MIMO Systems with QR-RLS Technique
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1518-1522, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.15181522
Abstract
The fifth generation of mobile communication systems (5G) promises unprecedented levels of connectivity and quality of service (QoS) to satisfy the incessant growth in the number of mobile smart devices and the huge increase in data demand. One of the primary ways 5G network technology will be accomplished is through network densification, namely increasing the number of antennas per site and deploying smaller and smaller cells. Massive MIMO, where MIMO stands for multiple-input multiple-output, is widely expected to be a key enabler of 5G. This technology leverages an aggressive spatial multiplexing, from using a large number of transmitting/receiving antennas, to multiply the capacity of a wireless channel. Cell-free massive MIMO refers to a massive MIMO system where the BS antennas, herein referred to as access points (APs), are geographically spread out. The APs are connected, through a fronthaul network, to a central processing unit (CPU) which is responsible for coordinating the coherent joint transmission. Such a distributed architecture provides additional macro-diversity, and the co-processing at multiple APs entirely suppresses the inter-cell interference. In order to overcome the above effects, the work focuses on the QR-RLS based channel estimation method for cell free Massive MIMO systems.
Key-Words / Index Term
Massive MIMO, Channel State Information, Square Root-Recursive Least Square (QR-RLS)
References
[1] H. Q. Ngo A. Ashikhmin H. Yang E. G. Larsson T. L. Marzetta "Cell-free massive MIMO versus small cells" IEEE Trans. Wireless Commun. vol. 16 no. 3 pp. 1834-1850 Mar. 2017.
[2] Huang A. Burr "Compute-and-forward in cell-free massive MIMO: Great performance with low backhaul load" Proc. IEEE Int. Conf. Commun. (ICC) pp. 601-606 May 2017.
[3] Q. Huang A. Burr "Compute-and-forward in cell-free massive MIMO: Great performance with low backhaul load" Proc. IEEE Int. Conf. Commun. (ICC) pp. 601-606 May 2017.
[4] H. Q. Ngo A. Ashikhmin H. Yang E. G. Larsson T. L. Marzetta "Cell-free massive MIMO: Uniformly great service for everyone" Proc. IEEE Int. Workshop Signal Process. Adv. Wireless Commun. (SPAWC) pp. 201-205 Jun. 2015
[5] E. Nayebi A. Ashikhmin T. L. Marzetta H. Yang "Cell-free massive MIMO systems" Proc. 49th Asilomar Conf. Signals Syst. Comput. pp. 695-699 Nov. 2015.
[6] F. Rusek, D. Persson, B. K. Lau, E. G. Larsson, T. L. Marzetta, O. Edfors, and F. Tufvesson, “Scaling up mimo: Opportunities and challenges with very large arrays,” IEEE Signal Process. Mag., vol. 30, no. 1, pp. 40–60, Jan 2013.
[7] L. Lu, G. Y. Li, A. L. Swindlehurst, A. Ashikhmin, and R. Zhang, “An overview of massive MIMO: Benefits and challenges,” EEE J. Sel. Topics Signal Process., vol. 8, no. 5, pp. 742–758, Oct 2014.
[8] S. Payami and F. Tufvesson, “Channel measurements and analysis for very large array systems at 2.6 ghz,” Proc. 6th Eur. Conf. on Antennas and Propag. (EUCAP), pp. 433–437, March 2012.
[9] A. F. Molisch, V. V. Ratnam, S. Han, Z. Li, S. L. H. Nguyen, L. Li, and K. Haneda, “Hybrid beamforming for massive MIMO: A survey,” IEEE Comm. Mag., vol. 55, no. 9, pp. 134–141, 2017.
[10] F. Sohrabi and W. Yu, “Hybrid digital and analog beamforming design for large-scale antenna arrays,” IEEE Journal of Selected Topics in Signal Processing, vol. 10, no. 3, pp. 501–513, April 2016.
[11] O. E. Ayach, S. Rajagopal, S. Abu-Surra, Z. Pi, and R. W. Heath, “Spatially sparse precoding in millimeter wave MIMO systems,” IEEE Transactions on Wireless Communications, vol. 13, no. 3, pp. 1499–1513, March 2014.
[12] I. Ahmed, H. Khammari, A. Shahid, A. Musa, K. S. Kim, E. D. Poorter, and I. Moerman, “A survey on hybrid beamforming techniques in 5G: Architecture and system model perspectives,” IEEE Communications Surveys and Tutorials, vol. 20, no. 4, pp. 3060–3097, Fourthquarter 2018.
[13] S. Payami, N. Mysore Balasubramanya, C. Masouros, and M. Sellathurai, “Phase shifters versus switches: An energy efficiency perspective on hybrid beamforming,” IEEE Wireless Communications Letters, vol. 8, no. 1, pp. 13–16, Feb
[14] Akhilesh Venkatasubramanian, Krithika.V and Partibane. B, “Channel Estimation For A Multi-User MIMOOFDM- IDMA System”, International Conference on Communication and Signal Processing, April 6-8, 2017, India.
Citation
Surabhi Mishra, Neeraj Shrivastava, "Spectrum Efficiency and BER Analysis of Cell Free Massive MIMO Systems with QR-RLS Technique," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1518-1522, 2019.
Mitigating Voltage Sags/Swells using Converter based Dynamic Voltage Restorer for Distribution Transformer
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1523-1527, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.15231527
Abstract
Power quality has become a major concern of the modern industries in the present era. Voltage sags/swells are considered as the most significant power quality problems because of increasing complexity in the power system. To overcome these problems, Custom Power Devices (CPD) is connected closer to the load end. One of those devices is Dynamic Voltage Restorer (DVR) which is a series connected most efficient and effective modern CPD used in power distribution network. The main function of the DVR is to monitor the load voltage constantly and if any sag or swell occurs, it can quickly mitigate by injecting the balance (or excess) voltage to the load voltage. The primary advantage of the DVR is keeping the users always on-line with high quality constant voltage to maintain the continuity of production.
Key-Words / Index Term
Dynamic Voltage Restorer, Custom Power Device, Voltage Sag, Swell, Distribution Transform
References
[1] Taeyong Kang, Sewan Choi, Ahmed S. Morsy and Prasad N. Enjeti, “Series Voltage Regulator for a Distribution Transformer to Compensate Voltage Sag/Swell”, IEEE 2016.
[2] T. Strasser et al., “A review of architectures and concepts for intelligence in future electric energy systems,” IEEE Trans. Ind. Electron., vol. 62, no. 4, pp. 2424–2438, Apr. 2015.
[3] Moreno-Muñoz, A.; Flores-Arias, J.M.; Pallarés, V.; De la Rosa, and J.J.G. "Power quality immunity in factory automation," Compatibility and Power Electronics, CPE `09, pp 12 – 17, 2009.
[4] S. Bhattacharyya, J. M. A. Myrzik, and W. L. Kling, “Consequences of poor power quality: An overview,” in Proc. 42nd Int. Univ. Power Eng. Conf., pp. 651–656, 2007.
[5] Shih-An Yin, Chan-Nan Lu, Edwin Liu, et al. “A survey on high- tech industry power quality requirements,” IEEE/PES Transmission and Distribution Conference and Exposition. Vol. 1, pp 548–553, 2001.
[6] Brumsickle, W.E.; Schneider, R.S.; Luckjiff, G.A.; Divan, D.M.; Mc Granaghan, M.F.; “Dynamic sag correctors: cost-effective industrial power line conditioning,” IEEE Transactions on Industry Applications, vol: 37, No. 1, pp: 212 –217, Feb. 2001.
[7] J. Kyei, R. Ayyanar, G. T. Heydt, R. Thallam, J. Blevins, “The design of power acceptability curves,” IEEE Trans Power Deliv., vol.17 pp. 828–833, Nov. 2002.
[8] D. Gao, Q. Lu, and J. Luo, “A new scheme for on-load tap-changer of transformers,” in Proc. Int. Conf. Power System Technology, pp. 1016– 1020, 2002.
[9] A. Prasai and D. M. Divan, “Zero-energy sag correctors—Optimizing dynamic voltage restorers for industrial applications,” IEEE Trans. Ind. Appl., vol. 44, no. 6, pp. 1777–1784, Nov./Dec. 2008.
[10] O.C. Montero-Hernandez and P.N. Enjeti, “Ride-Through for Critical Load. Exploring a Low-Cost Approach to Maintaining Continuous Connections Between Buildings and/or Industrial Systems,” IEEE Ind. Appl. Mag., vol.8, pp.45-53, Nov-Dec 2002.
[11] E. C. Aeloíza, P. N. Enjeti, L. A. Morán, O. C. Montero Hernandez, and S. Kim, “Analysis and design of a new voltage sag compensator for critical loads in electrical power distribution systems,” IEEE Trans. Ind. Appl.,vol. 39, no. 4, pp. 1143–1150, Jul./Aug. 2003.
[12] A. K. Sadigh and K. M. Smedley, “Review of voltage compensation methods in dynamic voltage restorer (DVR),” in Proc. IEEE Power Energy Soc. Gen. Meet., pp. 1–8, Jul. 2012.
[13] S. S. Choi, J. D. Li, and D. M. Vilathgamuwa, “A generalized voltage compensation strategy for mitigating the impacts of voltage sags/swells,” IEEE Trans. Power Delivery, vol. 20, no. 4, pp. 2289–2297, Jul. 2005.
[14] A. Rauf and V. Khadkikar, “An enhanced voltage sag compensation scheme for dynamic voltage restorer,” Industrial Electronics, IEEE Transactions on, vol. 62, pp. 2683–2692, May 2015.
Citation
Yuvraj Kakodiya, K. T. Chaturvedi, "Mitigating Voltage Sags/Swells using Converter based Dynamic Voltage Restorer for Distribution Transformer," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1523-1527, 2019.
High Speed Multi-level Discrete Wavelet Transform using Canonic Signed Digit Technique
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1528-1531, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.15281531
Abstract
Several architectures have been suggested for efficient VLSI implementation of 2-D DWT for real-time applications. It is found that multipliers consume more chip area and increases complexity of the DWT architecture. Multiplier-less hardware implementation approach provides a solution to reduce chip area, lower hardware-complexity and higher throughput of computation of the DWT architecture. The proposed design outline is (i) priority must be given for memory complexity optimization over the arithmetic complexity optimization or reduction of cycle period and (ii) memory utilization efficiency to be considered ahead of memory reduction due to design complexity of memory optimization method. Based on the proposed design outline four separate design approaches and concurrent architectures are presented in this thesis for area-delay and power efficient realization of multilevel 2-D DWT. In this paper a multiplier-less VLSI architecture is proposed using new distributed arithmetic algorithm named CSD. We demonstrate that CSD is a very efficient architecture with adders as the main component and free of ROM, multiplication, and subtraction. The proposed architecture using CSD provides less delay and minimum number of slice compared the existing architecture.
Key-Words / Index Term
Discrete Wavelet Transform, Canonic Signed Digit, Read Only Memory, Multiplier-less Technique
References
[1] Rakesh Biswas, Siddarth Reddy Malreddy and Swapna Banerjee, “A High Precision-Low Area Unified Architecture for Lossy and Lossless 3D Multi-Level Discrete Wavelet Transform”, Transactions on Circuits and Systems for Video Technology, Vol. 45, No. 5, May 2017.
[2] Satish S Bhairannawar, Rajath Kumar, “FPGA Implementation of Face Recognition System using Efficient 5/3 2D-Lifting Scheme”, 2016 International Conference on VLSI Systems, Architectures, Technology and Applications (VLSI-SATA).
[3] Maurizio Martina, Guido Masera, Massimo Ruo Roch, and Gianluca Piccinini, “Result-Biased Distributed-Arithmetic-Based Filter Architectures for Approximately Computing the DWT”, IEEE Transactions on Circuits and Systems—I: Regular Papers, Vol .62, No.8, and August 2015.
[4] S.G. Mallat, “A Theory for Multiresolution Signal Decomposition: The Wavelet Representation”, IEEE Trans. on Pattern Analysis on Machine Intelligence, 110. July1989, pp. 674-693.
[5] M. Alam, C. A. Rahman, and G. Jullian, ”Efficient distributed arithmetic based DWT architectures for multimedia applications,” in Proc. IEEE Workshop on SoC for real-time applications, pp. 333 336, 2003.
[6] X. Cao, Q. Xie, C. Peng, Q. Wang and D. Yu, ”An efficient VLSI implementation of distributed architecture for DWT,” in Proc. IEEE Workshop on Multimedia and Signal Process., pp. 364-367, 2006.
[7] Senthil singh C and Manikandan. M, “Design and Implementation of an FPGA-Based Real-Time Very Low Resolution Face Recognition System”, International Journal of Advanced Information Science and Technology, Vol. 7, No. 7, pp. 59-65, November 2012.
[8] Archana Chidanandan and Magdy Bayoumi, “Area-Efficient MDA Architecture for the 1-D DCT/IDCT,” ICASSP 2006.
[9] M. Martina, and G. Masera, ”Low-complexity, efficient 9/7 wavelet filters VLSI implementation,” IEEE Trans. on Circuits and Syst. II, Express Brief vol. 53, no. 11, pp. 1289-1293, Nov. 2006.
[10] M. Martina, and G. Masera, ”Multiplierless, folded 9/7-5/3 wavelet VLSI architecture,” IEEE Trans. on Circuits and syst. II, Express Brief vol. 54, no. 9, pp. 770-774, Sep. 2007.
[11] Gaurav Tewari, Santu Sardar, K. A. Babu, ” High-Speed & Memory Efficient 2-D DWT on Xilinx Spartan3A DSP using scalable Polyphase Structure with DA for JPEG2000 Standard,” 978-1-4244-8679-3/11/$26.00 ©2011 IEEE.
[12] B. K. Mohanty and P. K. Meher, “Memory Efficient Modular VLSI Architecture for Highthroughput and Low-Latency Implementation of Multilevel Lifting 2-D DWT”, IEEE Transactions On Signal Processing, VOL. 59, NO. 5, MAY 2011.
[13] B. K. Mohanty and P. K. Meher, “Efficient Multiplierless Designs for 1-D DWT using 9/7 Filters Based on Distributed Arithmetic”, ISIC 2009.
[14] R. Praisline Jasmi and Mr. B. Perumal, “Comparison of Image Compression Techniques using Huffman Coding, DWT and Fractal Algorithm”, 2015 International Conference on Computer Communication and Informatics (ICCCI -2015), Jan. 08 – 10, 2015, Coimbatore, INDIA.
Citation
Kapil Sharma, Ompal Singh, Abhishek Bhatt, "High Speed Multi-level Discrete Wavelet Transform using Canonic Signed Digit Technique," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1528-1531, 2019.
Wireless Sensor Network Performance with Energy-Efficient Approaches: A Review
Review Paper | Journal Paper
Vol.7 , Issue.5 , pp.1532-1537, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.15321537
Abstract
The widespread use of wireless sensor devices and their advancements in terms of size, deployment cost, measurement of environmental events and user friendly interface have given rise to many applications of wireless sensor networks (WSNs). WSNs are usually characterized as self-organizing networks which can be deployed without requiring any specific infrastructure in harsh and/or hostile area. In this paper are studied of different types of clustering protocol favors higher period in lieu of overall network lifetime. In cluster, a predetermined number of CHs are selected in deterministic fashion on the basis of residual energy of nodes. The focus is to balance the load among nodes and provide full network coverage.
Key-Words / Index Term
Wireless Sensor Network, Cluster Head, Routing Protocol
References
[1] Nashreen Nesa and Indrajit Banerjee, “Sensor Rank: An Energy Efficient Sensor Activation Algorithm for Sensor Data Fusion in Wireless Networks”, IEEE Internet of Things Journal, IEEE 2019.
[2] Xiuwen Fu, Giancarlo Fortino and Wenfeng Li, “Environment-Cognitive Multipath Routing Protocol in Wireless Sensor Networks”, IEEE International Conference on Systems, Man, and Cybernetics (SMC), IEEE 2018.
[3] Da-Ren Chen, Ming-Yang Hsu, Hao-Yen Chang, “Context-Aware and Energy Efficient Protocol for the Distributed Wireless Sensor Network”, 28th International Telecommunication Network and Applications Conference (ITNAC), IEEE 2018.
[4] Wael Ali Hussein, Borhanuddin M Ali, M F A Rasid and Fazirulhisyam Hashim, “Design and performance analysis of high reliability-optimal routing protocol for mobile wireless multimedia sensor networks”, 13th Malaysia International Conference on Communications (MICC), IEEE 2017.
[5] Hsiang-Hung Liu, Jia-Jang Su and Cheng-Fu Chou, “On Energy-Efficient Straight-Line Routing Protocol for Wireless Sensor Networks”, IEEE Systems Journal, Volume: 11 , Issue: 4 , Dec. 2017.
[6] Akshay Verma, Mamta Khosla, Tarique Rashid and Arvind Kumar, “Grid and Fuzzy based Stable Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Network”, 14th IEEE India Council International Conference (INDICON), IEEE 2017.
[7] Uday Kumar Rai and Kanika Sharma, “Maximum Likelihood Estimation based Clustering Algorithm on Wireless Sensor Network-A Review”, International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), IEEE 2017.
[8] Zhangbing Zhou, Beibei Yao, Riliang Xing, Lei Shu and Shengrong Bu, “E-CARP: An Energy Efficient Routing Protocol for UWSNs in the Internet of Underwater Things”, IEEE Sensors Journal, Volume: 16 , Issue: 11 , June1, 2016.
[9] Mohammed Abo-Zahhad, Sabah M. Ahmed, Nabil Sabor and Shigenobu Sasaki, “Mobile Sink-Based Adaptive Immune Energy-Efficient Clustering Protocol for Improving the Lifetime and Stability Period of Wireless Sensor Networks”, IEEE Sensors Journal, Volume: 15 , Issue: 8 , Aug. 2015.
[10] Marwan Al-Jemeli, Fawnizu A. Hussin, “An Energy Efficient Cross-Layer Network Operation Model for IEEE 802.15.4-Based Mobile Wireless Sensor Networks”, IEEE Sensors Journal, Volume: 15, Issue: 2 , Feb. 2015.
[11] Anjali Bharti, Chandni Devi and Dr. Vinay Bhatia, “Enhanced Energy Efficient LEACH (EEE- LEACH) Algorithm using MIMO for Wireless Sensor Network”, International Conference on Computational Intelligence and Computing Research, IEEE 2015.
[12] Yong Wang ; Changle Li ; Yulong Duan ; Jin Yang ; Xiang Cheng, “An Energy-Efficient and Swarm Intelligence-Based Routing Protocol for Next-Generation Sensor Networks”, IEEE Intelligent Systems, Volume: 29 , Issue: 5 , Sept.-Oct. 2014.
[13] Abdul Razaque, Musbah Abdulgader and Chaitrali Joshi, “P-LEACH: Energy Efficient Routing Protocol for Wireless Sensor Networks”, International Conference on Computational Intelligence and Computing Research, IEEE 2014.
[14] N. Javaid, M. Waseem, Z. A. Khan$, U. Qasim£, K. Latif, A. Javaid, “ ACH: Away Cluster Heads Scheme for Energy Efficient Clustering Protocols in WSNs”, IEEE,2013
[15] K. Padmanabhan and P. Kamalakkannan,”Energy Enhanced Base Station Controlled Dynamic Clustering Protocol for Wireless Sensor Networks”, Journal of Advances in Computer Networks, Vol. 1, No. 1, March 2013.
[16] Asaduzzaman and Hyung Yun Kong, “Energy Efficient Cooperative LEACH Protocol for Wireless Sensor Networks”, Journal of Communications and Networks, Vol. 12, No. 4, August 2010.
[17] Dilip Kumar, Trilok C. Aseri, R.B. Patel, “EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks”, journal homepage: www.elsevier.com/locate/comcom, 2009.
[18] Sameera Poduri and Gaurav S. Sukhatme,”Constrained Coverage for Mobile Sensor Networks”, IEEE International Conference on Robotics and Automation, 2004.
Citation
Monika Soni, Dhanpratap Singh, Sushil Kumar, "Wireless Sensor Network Performance with Energy-Efficient Approaches: A Review," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1532-1537, 2019.
Design and Implementation of Transition Table for Token Recognizer with a Given Suffix
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1538-1542, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.15381542
Abstract
Token description and recognition are two important functions of a lexical analyser in compiler design. A token can be described using mathematical expression like notation called regular expression. The process of token recognition is carried out with the help of finite automata. A finite state automaton is a type of machine in which for each state and input symbol, a transition takes place. A finite automaton can be deterministic or non-deterministic depending on number of possible transitions for each state and input symbol. The design of automata for recognition of tokens is an important and challenging task. From the available transitions, a token recognizer can be designed using JFLAP tool which further help in token recognition. However, there is no standard algorithm or procedure for construction of transition table for token recognizer. Present paper proposes an algorithm for construction of a language recognizer using deterministic finite automata for all tokens having a given suffix. The algorithm is implemented and tested for various token strings and results are used and compared with JFLAP results.
Key-Words / Index Term
Lexical Analysis, Token, Language Recognizer, Deterministic Finite Automata, Suffix
References
[1] Aho A. V., Ullman J. D., “Principles of Compiler Design”, Narosa Publishing House, 2002
[2] John E. Hopcroft, Rajeev Motwani and Jeffrey D. Ullman, “Automata Theory, Language, and Computation”, Delhi: Pearson, 2008.
[3] Aparna, Goyal G., “Application Review of Automata Theory” International Journal of Scientific Research in Computer Science, Engineering and Information Technology, Vol. 3, Issue 1, pp. 947-955, 2018.
[4] Parekh, R. G., Honavar, V. G., "Learning DFA from Simple Examples” Journal of Machine Learning, Vol. 44, Issue 1-2, pp. 9-35, 2001.
[5] Webber A. B., “Formal Language: A Practical Introduction”, Franklin, Beedle & Associates Inc., Wilsonville, pp. 35-43, 2008.
[6] Ullman, J. D. (1972), "Applications of language Theory to Compiler Design", Proceedings of the May 16-18, 1972, spring joint computer conference, pp. 235-242, 1972.
[7] BabuKaruppiah A., Rajaram S., “Deterministic Finite Automata for pattern matching in FPGA for intrusion detection” International Conference on Computer, Communication and Electrical Technology, pp. 167-170, 2011
[8] Ejendibia P., Baridam B. B., “String Searching with DFA-based Algorithm”, International Journal of Applied Information Systems, Vol. 9, No. 8, pp. 1-6, 2015
[9] Gribko E. “Applications of Deterministic Finite Automata” ECS 120 UC Davis, Spring 2013, pp. 1-9, 2013.
[10] Raj N., Dubey R., “Snakes and Stairs Game Design using Automata Theory”, International Journal of Computer Sciences and Engineering, Vol. 5, Issue 5, pp.58-62, 2017
[11] Shenoy V., Aparanji U., Sripradha K., Kumar V., “Generating DFA Construction Problems Automatically” International Journal of Computer Trends and Technology, Vol. 4, Issue 4, pp.32-37 ,2013
[12] Pant Y., “A Novel Approach to Minimize DFA State Machines Using Linked List”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 6, Issue 4, pp. 41-45, 2018
Citation
Rajanshu Goyal, Gulshan Goyal, "Design and Implementation of Transition Table for Token Recognizer with a Given Suffix," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1538-1542, 2019.
Energy Management Using IoT
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1543-1546, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.15431546
Abstract
Energy is a very important aspect for any household, industries, agriculture and so. Managing the energy efficiently and conserving it intelligently for appliances is very much important. The energy usage is directly affected with Coal, oil and so towards power generation. Towards this, there has been lot of research work carried out in developing some smart lighting system pertaining to classroom for conserving the energy. So with the upcoming of machine to machine communication where devices can be connected wirelessly leading to IoT, we here have developed an IoT based Smart Energy Management system where appliances like Fan and Bulb to start with are controlled wirelessly based on user input. These inputs are used towards controlling the appliances intelligently rather than just switching on or off. In addition, the system also keeps computing throughput the day power consumption of the appliances which gives the user knowledge on power being consumed over a period of time. These details are updated in Cloud server. This prototype system developed have achieved energy conservation at every household.
Key-Words / Index Term
IoT, KVA HT, LDR, RFID
References
[1] “ Nagender Kumar Suryadevara, Subhas Chandra Mukhopadhyay, Sean Di- eter Tebje Kelly, and Satinder Pal Singh Gill WSNBased Smart Sensors and Actuator for Power Management in Intelligent Buildings” 1083-4435, 2014 IEEE.
[2] Ardam H. and Coskun I., ”A remote controller for home and office appliances by telephone”, IEEE Transactions on Consumer Electronics, vol. 44, no. 4,pp. 1291-1297, 1998.
[3] Baudel T. and Beaudouin-Lafon M., ”Charade: remote control of objects using free-hand gestures”, Communications of the ACM, voI. 36, no. 7,pp. 28-35, 1993.
[4] Bromley K., Perry M., and Webb G. ”Trends in Smart Home Systems, Con- nectivity and Services”, www.nextwave.org.uk,2003.
[5] Kushiro N. , Suzuki S., Nakata M., Takahara H. and Inoue M., ”Integrated home gateway controller for home energy management system”, IEEE Inter- national Conference on Consumer Electronics, pp. 386-387,2003
[6] Raspberry Pi Official Website http://www.raspberrypi.org/
[7] Saito T., Tomoda I., Takabatake Y., Ami J. and Teramoto K., ”Home Gate- way Architecture And Its Implementation”, IEEE International Conference on Consumer Electronics, pp. 194- 195, 2000.
[8] Implementation of IoT in Home Automation using android application, Vidhi Tiwari1 , Pratibha Adkar2 Section:Technical Paper, Product Type: Isroset-Journal Vol.7 , Issue.2 , pp.11-16, Apr-2019
[9] The Road Map of Cloud Computing to Internet of Things Bhanudas Suresh Panchabhai1 , Anand Jayantilal Maheshwari2 , Sunil DhonduMone3
Section:Review Paper, Product Type: Journal Paper Vol.06 , Special Issue.01 , pp.37-42, Jan-2018
[10] Online Garbage Monitoring System Using Arduino and LabVIEW R. Zade1 , N. Khadgi2 , M. Kasbe3 , T. Mujawar4* IJSRNSC Volume-6, Issue-6, December 2018 E-ISSN:2321-3256
Citation
P.S. Jadhav, S.K. Konde, T.A. Pawar, S.S. Sawant, A.N. Kemkar, "Energy Management Using IoT," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1543-1546, 2019.
Defence Scheme against Selfish Node Attack in Manet
Research Paper | Journal Paper
Vol.7 , Issue.5 , pp.1547-1550, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i5.15471550
Abstract
Mobile Ad hoc network (MANET) suffers from different security issues. Ideally, not all nodes in MANET cooperate in forwarding packets because of non-malicious intention. This node is called selfish node and it behaves so due to its internal state such as limited energy concerns. Selfish nodes drop packets and that harms the process of routes establishment and relaying packets. They usually have a dynamic topology such that nodes can easily join or leave the network at any time and they move around freely which gives them the name Mobile Ad hoc Networks or MANETs. They have many potential applications, especially in military and rescue operations such as connecting soldiers in the battle field or establishing a temporary network in place of one which collapsed after a disaster like an earthquake. In these networks, besides acting as a host, each node also acts as a router and forwards packets to the correct node in the network once a route is established. To support this connectivity nodes use routing protocols such as AODV (Ad hoc On-Demand Distance Vector) or DSR (Dynamic Source Routing). Mobile ad-hoc networks are usually susceptible to different security threats and selfish attack is one of these. In Selfish attack, a malicious node which absorbs and drops all data packets and routing packets makes use of the vulnerabilities of the on demand route discovery protocols, such as AODV
Key-Words / Index Term
IDS, MANET, Security, Selfish node attack, DSR (Dynamic Source Routing), AODV (Ad hoc On-Demand Distance Vector)
References
[1]. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000), “Mitigating routing misbehavior in mobile ad-hoc networks”, Proceedings of the 6th International Conference on Mobile Computing and Networking (MobiCom), ISBN 1-58113- 197-6, pp. 255-265.
[2]. S. Buchegger, C. Tissieres, and J. Y. Le Boudec. “A test bed for misbehavior detection in mobile adhoc networks”. Technical Report IC/2003/72, EPFL-DI-ICA, November 2003. Available on:citeseer.ist.psu.edu/645200.html.
[3]. P. Michiardi and R. Molva. Core: “A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks”,
[4]. A. Patcha and A. Mishra, “Collaborative Security Architecture for Black Hole Attack Prevention in Mobile Ad hoc Networks”, Radio and Wireless Conference, 2003.
[5]. S. Bansal and M. Baker. “Observation-Based Cooperation Enforcement in Ad hoc Networks”, July
[6]. K. Balakrishnan, D. Jing and V. K. Varshney, "TWOACK:Preventing Selfishness in Mobile Ad hoc Networks,"
[7]. K.Vijaya “Secure 2Ack Routing Protocol In Mobile Ad Hoc Networks,”
[8]. B. Awerbuch et al., “An On-Demand Secure Routing Protocol Resilient to Byzantine Failures,”
[9]. S. Marti et al., “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,”
[10]. H. Yang, X. Meng, and S. Lu, “Self-Organized Network Layer Security in Mobile Ad Hoc Networks,”
[11]. Moy, J. Security Architecture for the Internet Protocol. RFC 2401, November 1998, Internet Society.
[12]. Mäki, S. Security Fundamentals in Ad Hoc Networking. Proceedings of the Helsinki University of Technology, Seminar on Internetworking - Ad Hoc Networks,
[13]. Perkins, C. Mobile Ad Hoc Networking Terminology Internet draft (expired).
[14]. Gaurav Soni, “a novel defence scheme against selfish node attack in manet”
[15]. Kamlesh Chandrawansh, “a novel defence scheme against selfish node attack in manet”
Citation
Khushbu, R.K. bathla, "Defence Scheme against Selfish Node Attack in Manet," International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1547-1550, 2019.