Vol 3 Issue 4-2



 

INTERNATIONAL JOURNAL OF ELECTRONICS & COMMUNICATION TECHNOLOGY (IJECT)-VOL III ISSUE IV, VER. 2 OCT. TO DEC. 2012


International Journal of Electronics & Communication Technology Vol. 3 Issue 4, Ver. 2
S.No. Research Topic Paper ID
   39 Performance Evaluation of Routing Protocols in MANETs Under FTP Traffic Applications
Mohammad Amin Roshanasan, Jia Uddin, Md. Monirul Islam

Abstract

Mobile Ad-hoc Networks (MANETs) have already opened a new point of view in the field of wireless networks, which includes hundreds and thousands of nodes. The wireless nodes are communicating without the need of any kind of neither infrastructure like the base stations or routers, nor centralized administration. Wireless nodes are free of moving anytime, anywhere. Therefore, MANETs need to have dynamic routing protocols. The MANET routing protocols are divided into several different categories such as Proactive, Reactive, and Hybrid. There arenumerous performance metrics are used to compare the routing protocols. Each of them has its own attributes and well for specific area such as throughput, jitter, packet delivery ratio, average number of hops, route discovery time, and end-toend delay, etc. In this paper, two well known routing protocols including OLSR and AODV were evaluated using the OPNET 17.1 simulator under the medium load traffic size in FTP protocol. The Random Waypoint mobility model is used as pattern of mobility. As performance metrics the average throughput and average network load are examined in different number of nodes, file sizes, and node speeds.
Full Paper

IJECT/34/2/
A-514
   40 Improved Design of Filter Bank and Performance Comparison of Filter Banks with OFDM in
Multicarrier Communications


Dr. Anjaneyulu Pattem

Abstract

Filter banks have been found wider applications in digital and wireless communications. High speed digital data transmission is highly demanding requirement in modern wired and/or wireless communications such as WiMax, Wireless LANs, DAB, T-DVB, 3G/4G (Long Term Evolution-LTE) wireless mobile communications etc. to cope up with the exponential increase in the demand of mobile users. Orthogonal Frequency Division Multiplexing (OFDM) has been used as the basic technique in all these systems. One of the drawbacks of OFDM is reduced (spectral efficiency) transmission bit rate because of the Cyclic Prefix (CP) used in this system. An emerging technique proposed to be as an alternative to OFDM is applicability of digital filter banks. Filter banks, designed for reduced stopband attenuation, and less distortions in frequency response, are required in these applications. In the present work an improved design of cosine modulated filter banks has been proposed. Filter banks designed in the proposed method is compared with the filters using already available methods in terms of stop band attenuation, magnitude and aliasing distortions. Applicability of filter banks in multicarrier communications has been attempted by comparing the performance of transmultiplexer and OFDM systems in the transmission of data and an image through AWGN channel. It is found that improved performance of the filter banks designed in the proposed method. Also Matlab simulations of multicarrier techniques are demonstrating that performance of transmultiplexer communication is better than that of OFDM at lower SNR scenarios.
Full Paper

IJECT/34/2/
A-515
   41 Performance Analysis of Wi-MAX: Modulation Scheme Versus Bit Error Rate

N. H. Maruf Bhuyan, Jia Uddin, Monirul Hoque, Md. Ahasan Habib

Abstract

The emergence of Wi-MAX has engrossed important interest from all fields of wireless communications. The Wi-MAX can also be considered as a core technology in the implementation of other networks such as Wireless Sensor Network. Developing an understanding of the Wi-MAX system can be best achieved by looking at a model of the Wi-MAX system. This paper presents model building of the Wi-MAX Physical layer using computer Matlab R2011a version. This model is a useful tool for BER performance evaluation for the real data communication by the Wi-MAX Physical layer under different channel encoding rates, digital modulation schemes and channel conditions. With the performance investigation of the system, the modulation schemes BPSK, QPSK and 16QAM are introduced beside ½ rated convolutional encoder under AWGN. The model presented in this paper built with the Physical Layer using convolutional encoding rate of ½ and transmitted with 256 carrier OFDM symbols. Computer simulation results on BER over an Additive White Gaussian Noise (AWGN) channel demonstrate that the proposed system outperforms with BPSK modulation technique as compared to other digital modulation schemes and the system is highly effective to combat inherent interferences under. It has been anticipated from the simulation study with real data that the performance of the communication system degrades with the increasing of noise power.
Full Paper

IJECT/34/2/
A-516
   42 The SURUS Channel Allocation Model for Decrease Four-Wave Mixing in DWDM System

Ashira Jumpates, Suthichai Noppanakeepong

Abstract

This paper presents a new model of optical channel allocation named “SURUS” for improving the operation of a DWDM light source multiplexer by not have to use an optical filter in the DWDM de-multiplexer device. By our method can reduce transmission loss in case of the number of channels are plentiful and each of the channels is nearby that be found in Dense Wavelength Division Multiplexing (DWDM) systems. The transmission loss is called “Four-Wave Mixing (FWM)” caused by the nonlinearity of the optical fiber signal. The results of numerical computation shown that the SURUS model can decrease average FWM efficiency from -12.03dBm to -35.16dBm indicated that the remains FWM value are less than other methods and can also reduce the BER probabilities from -5dBm to -14.7dBm.
Full Paper

IJECT/34/2/
A-517
   43 Performance Analysis of AODV and DSDV Routing Protocols using NS-2 Simulator

Gurjeevan Singh, Rohit Kumar, Karamjeet Singh

Abstract

In this research paper, an attempt has been made to evaluate the performance of two well-known routing protocols in Mobile Adhoc Networks i.e. AODV and DSDV by using four performance metrics like Packet Delivery Ratio, Average End to End Delay, Jitter sent and received on the basis of TCP and UDP traffic patterns. The comparison has been done by using simulation tool NS2 which is used as the main simulator, NAM (Network Animator) and excel graph which are used for preparing the charts from the trace files.
Full Paper

IJECT/34/2/
A-518
   44 Investigation of Optical Solitons And Dispersion Managed Optical Solitons

Kadam Bhambrl, Dr. Neena Gupta

Abstract

The advent of fiber optics has improved telecommunication systems all over the world, enabling massive amount of information exchange, at the speed of light. One of the emerging technologies in optical networks is solitons which warranties to benefit the commercial ultra-long haul all optical networks spanning distances up to many millions of kilometers. Optical solitons have been considered as potential information carriers in high bandwidth optical fibre communication systems. This article reviews the various mathematical theories used to analyze dispersion managed soliton. The characteristics of the dispersion-managed soliton are compared with those of traditional optical solitons.
Full Paper

IJECT/34/2/
A-519
   45 Implementation of 256-bit High Speed and Area Efficient Carry Select Adder

C. Sudarshan Babu, Dr. P. Ramana Reddy

Abstract

Implementation of high speed, power-efficient and less area designs plays a vital role in many applications ad are research areas of design interest in VLSI. Technology is shrinking from nanometer to micrometer technology in order to meet these design issues. Adder is one of the designs which are used in many applications like DSP’s, ALU’s, subtractions and high speed multiplications. In the traditional adder designs, the main design area is concentrated on the power factor and not on the speed performance. But the performance of any design can be increased to a great extent by improving the speed of operation of the design. So this paper mainly focuses on the high speed adder design which is nothing but Carry Select Adder (CSLA). CSLA is one of the adder designs which improve the speed of addition operation to a great extent when compared to traditional adder designs. This increased speed and less area application design can be implemented by modifying the Regular adder design by replacing some of the gates with the implemented complex BEC logic which leads to Modified Carry Select Adder design. Based on this design idea 16, 32, 64, 128 and 256-bit Modified CSLA design have been developed and compared with Regular adder design. Based on this design approach the delay reduces to 50.83 ns and area to 836 when compared to delay of the Regular design of 64.43 ns and area of 890 LUT’s of 256-bits.
Full Paper

IJECT/34/2/
A-520
   46 Fuzzy-Genetic Algorithm Based Association Rules for Wireless Sensor Data

T. Abirami, Dr. P. Thangaraj

Abstract

Wireless Sensor Networks (WSN) generates a huge amount of data for efficient application of discovering essential knowledge from it is important. Usually, WSN data is generated in streams and forwarded to a sink. Raw data leads to higher communication overhead adversely affecting WSN performance. Association mining processes data to locate frequent patterns. Thus, when association mining is applied to WSN network data only frequent raw data patterns are sent to the sink, thereby reducing communication overhead. This paper proposes mining of WSN data through an association rule to extricate patterns. A Fuzzy based genetic algorithm is used with the rule for efficient extraction of rules from data.
Full Paper

IJECT/34/2/
A-521
   47 Design and Implementation of Online Parking System Using Peripheral Interface Controller

M. L. V. Krishna, K. Rajasekar, Dr. N. S. Murthi Sarma, J. Uma

Abstract

As parking becomes a very essential requirement in our day to day life, we look forward to planning and acquiring a secured parking spot before heading out towards our destination in order to reduce the hassle of driving around looking for a parking spot during park hours. The present existing system consists of parking space monitoring nodes, routing nodes, sink node, parking guidance display and an information and management center. The nodes transmit the information through wireless sensor network by tree-like topological structure with non-standard protocol. After analyzing and processing the data, the information and management center would distribute the information by LED screen and displays for the drivers. Existing systems don’t have online reservation mechanism concept. This paper proposes the concept of online reservations in parking lots which gives customers the privilege of reserving parking spots before their arrival at the lot just like reserving a table at a restaurant or booking a hotel room. The system consists of monitoring node, routing node, ZCU, CCU and advanced features like remote parking monitoring, automated guidance, and online parking reservation mechanism.
Full Paper

IJECT/34/2/
A-522
   48 Public Auditability and Data Storage Security in Cloud Computing

Bhupesh Dewangan, Sanjay Kumar Baghel

Abstract

Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. The unique paradigm brings about many new security challenges, which have not been well understood. The work studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction of TPA eliminates the involvement of the client through the auditing of whether his data stored in the cloud is indeed intact, which can be important in achieving economies of scale for Cloud Computing. The support for data dynamics via the most general forms of data operation, such as block modification, insertion and deletion, is also a significant step toward practicality, since services in Cloud Computing are not limited to archive or backup data only. While prior works on ensuring remote data integrity often lacks the support of either public auditability or dynamic data operations, it achieves both. It first identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from prior works and then show how to construct an elegant verification scheme for the seamless integration of these two salient features in the protocol design. In particular, to achieve efficient data dynamics, to improve the existing proof of storage models by manipulating the classic Merkle Hash Tree construction for block tag authentication. To support efficient handling of multiple auditing tasks, and further explore the technique of bilinear aggregate signature to extend the main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis show that the proposed schemes are highly efficient and provably secure.
Full Paper

IJECT/34/2/
A-523
   48 Public Auditability and Data Storage Security in Cloud Computing

Bhupesh Dewangan, Sanjay Kumar Baghel

Abstract

Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. The unique paradigm brings about many new security challenges, which have not been well understood. The work studies the problem of ensuring the integrity of data storage in Cloud Computing. In particular, consider the task of allowing a third party auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction of TPA eliminates the involvement of the client through the auditing of whether his data stored in the cloud is indeed intact, which can be important in achieving economies of scale for Cloud Computing. The support for data dynamics via the most general forms of data operation, such as block modification, insertion and deletion, is also a significant step toward practicality, since services in Cloud Computing are not limited to archive or backup data only. While prior works on ensuring remote data integrity often lacks the support of either public auditability or dynamic data operations, it achieves both. It first identify the difficulties and potential security problems of direct extensions with fully dynamic data updates from prior works and then show how to construct an elegant verification scheme for the seamless integration of these two salient features in the protocol design. In particular, to achieve efficient data dynamics, to improve the existing proof of storage models by manipulating the classic Merkle Hash Tree construction for block tag authentication. To support efficient handling of multiple auditing tasks, and further explore the technique of bilinear aggregate signature to extend the main result into a multi-user setting, where TPA can perform multiple auditing tasks simultaneously. Extensive security and performance analysis show that the proposed schemes are highly efficient and provably secure.
Full Paper

IJECT/34/2/
A-523
   49 Sine Wave Generation Using CORDIC Algorithm

Ashrita. T, Chidambara Rao. K

Abstract

In this paper we describe an efficient CORDIC algorithm that completely eliminates the scaling factor. Besides we have proposed an algorithm to redefine the elementary angles for reducing the number of CORDIC iterations. The Coordinate Rotational Digital Computer (CORDIC) algorithm is another classic approach for sine wave generation. The particular architecture hereby presented generates the phase of the sine by self on enable and performs the CORDIC vector rotation in order to produce sine wave values at the rate of 4096 samples per cycle. The implementation was partitioned into two main blocks: a Sine magnitude generator (SMG) block and a CORDIC Logic Processor (CLP) block. The SMG produces the phase increments which drives the CLP, while performing replication in order to obtain the complete cycle of sine wave. Meanwhile, the CLP block performs the vector rotation and generates the sine magnitude This is implemented using Spartan 3 FPGA XC3S200FT256 and XILINX IST AND ISIM design and verification tools. MODELSIM is used to view Sine wave.
Full Paper

IJECT/34/2/
A-524
   50 Biometrics System & Analysis

Simranjeet Kaur Hanspal

Abstract

This paper basically gives the meaning and origin of the biometrics. It also deals with the identification, operation and the types of biometrics and the fields in which they are used in. It also discusses about the threats and the problems that may be encountered in the due course. Biometric fingerprints are specially discussed here.
Full Paper

IJECT/34/2/
A-525
   51 Security in Mobile Ad-Hoc Networks using Time-Space Cryptography

P Sree Sai Lakshmi, G Jacob Jayaraj

Abstract

This paper describes the design and performance of a secure routing protocol with time-space cryptography for mobile adhoc networks. The proposed time-space scheme works in the time domain for key distribution between source and destination as well as in the space domain for intrusion detection along the route between them. For data authentication, it relies on the symmetric key cryptography due to high efficiency and a secret key is distributed using a time difference from the source to the destination. Also, a one-way hash chain is formed on a hop-byhop basis to prevent a compromised node or an intruder from manipulating the routing information. In order to evaluate the performance of our routing protocol, we compare it with the existing AODV protocol under the same conditions using the ns-2 network simulator. The simulation results show that the proposed protocol provides similar performance in terms of delay and throughput even with the security function.
Full Paper

IJECT/34/2/
A-526
   52 Comparative Study of Single Phase PLL Algorithms for Grid Synchronization Applications

Atul Gupta, Anurag Porippireddi, Venu Uppuluri Srinivasa, Akash Sharma, Mangesh Kadam

Abstract

Phase Locked Loop is a control system technique that is used extensively for synchronization purposes in diverse fields, most importantly in communication systems and in power electronics. Owing to its significance, the PLL has been a subject of great interest and various schemes and their improvements have been proposed for its implementation. This paper serves to elaborate on and compare the performance of four prevalent PLL schemes, the Zero Crossing Detector based PLL, Inverse Park based PLL, Second Order Generalized Integrator based PLL and the Enhanced Phase Locked Loop. The Zero Crossing Detector based PLL detects the phase error between its output and the reference at every zero crossing and corrects for it. The Inverse Park PLL and the SOGI PLL differ only in the way they generate the orthogonal signals that are fed to the phase detector. The Enhanced PLL is based on the Adaptive Filter theory.
Full Paper

IJECT/34/2/
A-527
   53 Triple Band Mendar Shape Patch Multi L-Slot Ground Plan Substrate Microstrip Antenna for C-X-Ku Band Applications

Asmita Shukla, Sunil Kumar Singh

Abstract

In this paper Triple Band Meander Shape Patch Multi L-Slot Ground Plan Fr-4 – HTCC Substrate Microstrip antennas for C-X-Ku Band applications is presented. Low profile coaxial fed Rectangular patch antenna with Meander Shape Patch and Multi L-Slot on the Ground Plan is studied, with the FR-4 and HTCC substrate with a dielectric constant of 4.3 and 9 a loss tangent of 0.0019 and 0 .001. The In this paper high dielectric constant material (HTCC) high temperature cofired ceramic, meander patch and six L-Slot is used for enhancement of bandwidth. Different parameters like impedance bandwidth S11 = -10dB slot of antenna is 5.6GHz for C- X band and 1GHz for Ku Band, S11= -10dBi impedance bandwidth proposed antenna is 25% of C-Band, 37% of X-Band and 7.5 % of Ku-Band , axial ratio bandwidth = 3dBi is 6GHz. We have improved antenna and radiating efficiency. Directivity of antenna varies from 4.8dBi to 8dBi. The proposed antenna has studied with multi L-Slot and without multi L-Slot. The measured parameters satisfy required limits hence making the proposed antenna suitable for C-X-Ku Band radar applications.
Full Paper

IJECT/34/2/
A-528
   54 A Web Based ECO-Friendly Fax Machine Using ARM 9

Surya Phani Kumar Duvvuri, V. Dhanaraj, K. Raja Sekhar, CH. Sridevi

Abstract

To conserve the paper and also to improve the efficiency of conventional fax machine we are introducing a new web based eco-friendly fax machine to shorten the fax responding process. In this proposed fax machine, it is equipped with a digital single touch panel having signatory option, replacing the scanning and the printing units by costly and vulnerable parts. In this, all actions are done on the web interface so that this service is available from any computer connected to Internet, anywhere in the world. In this fax machine, as a fax document is processed in the form of a digital image, the digital ignature signed can be pasted onto the document, as it is signed on the physical fax print-out. Then the composite document from digital touch panel fax machine can be sent back immediately, printed or if necessary, stored in the memory for future references .To make the proposed fax machine feasible, a pressure sensitive stylus is adopted to measure the pressure data while signing. To make the appearance of the digital signature close to real handwriting, a real handwriting reconstruction algorithm is also proposed in this fax machine
Full Paper

IJECT/34/2/
A-529
   55 Design and Implement of Wireless Tire Pressure Monitoring System

V. L. Jogdand, S. A. Naveed, A. M. Maske

Abstract

Tire-break-avoiding is very important for safe driving in a super highway. Therefore the tire pressure monitoring system (TPMS) is attracting a great deal of interest from researchers and engineers. This paper presents a new kind of TPMS scheme, introduces the selection of main chips and the principle of the system. Three key issues of the system are discussed: the design of antenna, realization of low power and wireless signal transmission. Finally, the performance of the system is tested and analyzed. The test results show that it can meet the needs of the practical application.
Full Paper

IJECT/34/2/
A-530
   56 ZigBee and GSM based Health Condition Monitoring of a Patient in Hospitals

Gogineni Lakshminarayana, Thota Sreenivas

Abstract

This research includes monitoring of patient condition in hospitals to overcome the disadvatages of traditional monitoring .while monitoring the patient wireless communication between transmitter section and receiver section is used rather than wired measurement in traditional method. For sisters receive section zigbee acts as wireless communicating device and for doctor receive section GSM modem acts as wireless communicating device .This paper also concentrate on movements and environment surrounded by patient is also monitored. This paper will also concentrate on security and movements of the patient on bed.
Full Paper

IJECT/34/2/
A-531
   57 Quasi EBG Structure Dual Band Multilayer Microstrip Antenna Using Low Temperature Ceramic Co-Efficient Substrate for C-X- Band Applications

Deepti Gajbhiye, Sunil Kumar Singh

Abstract

In this paper a Quasi EBG Structure Dual Band Multilayer Microstrip antenna using Low Temperature Ceramic co-efficient substrate for C-X- Band Applications is presented. The Proposed antenna consists by Two C- Slot Patch on the top patch, five vertical slots on middle patch and Quasi EBG Ground Plan with the FR-4 and LTCC substrate with a dielectric constant of 4.3 and 7.83 with loss tangent of 0.0019 and 0.005. The proposed antenna is used for enhancement in impedance bandwidth and return loss. Different parameters like impedance bandwidth S11 = -10dB is 32% of C-band and 11% of X-band. Axial ratio is improved for linear polarization from 4 to 6GHz. the proposed antenna is directional antenna. This proposed design improved return losses up to -51.12dB at 5GHz. Gain along ?, Ø directions, radiation pattern in 2D & 3D E & H field distributions, current distributions are simulated using IE3DTM simulator. The proposed antenna suitable for C-X Band radar and satellite applications.
Full Paper

IJECT/34/2/
A-532
   58 Using LSB Keys on Embedding of Text in Audio: A Case of Steganography

N. Amareswara Rao, M. Koteswara Rao, Dr. I. Santhi Prabha

Abstract

A steganographic method of embedding textual information in an audio file is presented in this paper. In the proposed technique, first the audio file is sampled and then an appropriate bit of each alternate sample is altered to embed the textual information. As a steganographic approach the perceptual quality of the host audio signal was not to be degraded.
Full Paper

IJECT/34/2/
A-533
   59 Implementation of a Low Complex Pattern Matching Algorithm

K. Nivea, M. L. Nadiu

Abstract

The main objective of this project is developing an adaptively dividable dual-port BiTCAM (unifying binary and ternary CAMs) is proposed to achieve a high-throughput, low-power, and low-cost virus-detection processor for mobile devices. The proposed dualport BiTCAM is realized with the dual-port AND-type match-line scheme which is composed of dual-port dynamic AND gates. The dual-port designs reduce power consumption and increase storage efficiency due to shared storage spaces. Network security for mobile devices is in high demand because of the increasing virus count. Since mobile devices have limited CPU power, dedicated hardware is required, which will be yield by our BitCAM technique is essential to provide sufficient virus detection performance.
Full Paper

IJECT/34/2/
A-534
   60 The Application of Stolen Radioactive Source Tracking System Based on GSM/GPS Technology

V. M. Gandhi, D. Rajesh Setty

Abstract

This paper deals with securing the dangerous items like radioactive substances and valueble things by continuously monitoring the items using monitoring probe and if lost they are tracked using tracking system. Both monitoring and tracking probes are made of RFID reader and tags respectively. The monitoring probe monitors the item to be secured continuously by sending a message. If this item is moved from its location or stolen then the door will be automatically closed, monitor probe sends an alarm to the PC, and the tracking system tracks the position of the item using GPS and a message is sent to the respective mobile using GSM with the location information.
Full Paper

IJECT/34/2/
A-535
   61 Monitor-and-control System Design for Supermarket Fresh Area Based on ZigBee

Nagarjuna Badigunchala, R. Giri Prasad

Abstract

This paper describes system for monitoring and controlling super market fresh area based on ZigBee. By observing different supermarkets, Supermarkets can’t monitor the temperature and humidity around food of fresh area in our country effectively. This thesis designs a hierarchical topology central monitoring system based on ZigBee wireless sensor network (WSN). In this system surveyed area temperature and humidity can be automatically monitored and controlled. The monitoring nodes, with the Xbee pro, can collect and upload temperature and humidity data to the Management Centre, management Centre displays and processes the data, through the central node and the RS-232 interface. Monitoring nodes automatically starts the alarm system and the regulating system, If the collected data exceeds the threshold. Regulating system could be automatically shut down, while the data is lower than the standard value. Nodes work in the regular query power saving mode. Power is obtained from button cells conversion through MAX 232. The results reveal that due to its low cost, low power and flexible networking construction WSN system has the potential for field applications and flexible networking construction WSN system has the potential for field applications. Also the store room data also we can get by RFID mechanism, the item added to store or item deducted from store is done by maintaining RFID data in system. Each and every product here is attached with RFID details so adding item and removing can done easily by RFID technology in this project.
Full Paper

IJECT/34/2/
A-536
   62 Control Technique of Grid-Interfacing Inverters with IVUC

K. Raja Gopal, B.Gavaskar Reddy, L. Maheswari, P. Chandini, M.Deepthi, K. Meera Kumar, D. Sri Krishna

Abstract

This paper presents the control of a grid- interfacing inverter with integrated voltage unbalance cor- rection. It is proposed to add an additional function to the inverter to decrease the negativesequence voltage at the point of connection with the utility grid. Based on a symmetric sequence voltage decomposition and using an improved multi-variable filter, the grid-interfacing inverter intentionally absorbs a small amount of negative-sequence current from the grid, thereby helping to correct the negative-sequence voltage. Although the amplitude reduction contributed by each individual inverter system is small compared to the total negativesequence component, grid- interfacing inverter modules can collectively achieve sub- stantial results in the grid. The integrated function and proposed control has been verified in simulations and by experiments on a laboratory prototype.
Full Paper

IJECT/34/2/
A-537
   63 Fuel Cells on Power System and Micro-Grids

K.Raja Gopal, B.Gavaskar Reddy, L. Maheswari, K.M.S.G.Phaneendra Kumar, K.Anvesh, A. Bala Prudhvi Raj, G.Durga Prasad

Abstract

The integration of stationary fuel cells for dispersed power generation is a challenge for utilities and service provider in the next few years. Local distribution companies have to assess the impact of distributed generation on power system planning, operation, protection and tariff. Service providers have the opportunity to power micro-grids by fuel cells. Rating of fuel cells and limitations of connectable power are discussed. The impact on protection scheme of power systems and micro-grids are described. Remedial measures are proposed to ensure safety and selectivity.
Full Paper

IJECT/34/2/
A-538
   64 A LCI for Domestic FC Applications

K. Raja Gopal, B.Gavaskar Reddy, L. Maheswari, B. Syamson, G. Naga Sravanthi, N. Karunakar Rao, V. Vani

Abstract

The utilization of fuel cells for distributed power generation requires the development of an inexpensive inverter that converts a fuel cell’s variable dc output into useful ac. To encourage this develop- ment the US Department of Energy and the IEEE setup and sponsored a national US student competition with a substantial first prize going to the lowest cost working fuel cell inverter: the 2001 Future Energy Chal- lenge (FEC). This paper describes the work of the University of Wis- consin FEC Team. It discusses the topology used to achieve the said ob- jective, the rationale used in choosing this topology, detailed component selection optimized to minimize cost, and the dc/dc and dc/ac converter control. Finally some conclusions are made and a new total-system- approach design using a high voltage fuel cell is proposed to further reduce the cost of the inverter.
Full Paper

IJECT/34/2/
A-539
   65 F. L Based Control of Variable Speed Induction Machine

K. Raja Gopal, B. Gavaskar Reddy, L. Maheswari, B. Yashaswini, SK. Gousya Sultana, K. Krishna Murthy, K. Naveen Kumar

Abstract

The main objective of this paper is to analyze the performance of a variable speed wind eneration system by using fuzzy logic principles for efficiency optimization and performance enhancement control. A squirrel cage induction generator feeds the power to a double-sided pulse width converter system, which feeds power to either an utility grid, or to an autonomous system. The generation system uses three numbers of fuzzy logic controllers. The first fuzzy controller tracks the generator speed with the wind velocity to extract maximum power. The second fuzzy logic controller programs machine flux for light load efficiency improvement. The third fuzzy logic controller provides robust speed control against wind vortex and turbine oscillatory torque.
Full Paper

IJECT/34/2/
A-540
   66 AC Voltage–Voltage Converter With Automatic Voltage Regulator

K. Raja Gopal, B. Gavaskar Reddy, L. Maheswari, A. Srinivasa Rao, T. Leele Ram Prasad,
D. Pranay Deep, A. Kalyan Kumar

Abstract

Voltage sags and extended under voltages are one of the main concerns of industry today. These voltage sags could cause high negative impact on productivity, which is certainly an un desirable aspect in industrial and commercial applications. Current tap-changing transformers used in distribution systems have proven to be inadequate in solving these problems related to line regulation. A solution to these problems is to install an ac voltage–voltage converter that has been developed primarily for voltage-sag correction. This system incorporates high-speed insulated gate bipolar transistor switching technology and was designed to provide the speed and efficiency required by industrial customers. Further-more, the system will provide the flexibility of installation with or without the incorporation of tap-changing transformers. Simulation results show the operations involved in voltage-sag correction of the ac voltage–voltage converter. A single-phase system can be readily developed into a three-phase converter system based on the exact principle of operation.
Full Paper

IJECT/34/2/
A-541
   67 Hybrid Cascaded H-Bridge Multilevel-Inverter Induction-Motor-Drive Direct Torque Control
for Automotive Applications


K. Raja Gopal, B. Gavaskar Reddy, L. Maheswari, B. Bhagyasri, Ch. Avinash, M. Ashok, S. Suresh Reddy

Abstract

This paper presents a hybrid cascaded H-bridge multilevel motor drive Direct Torque Control (DTC) scheme for electric vehicles (EVs) or hybrid EVs. The control method is based
on DTC operating principles. The stator voltage vector reference is computed from the stator flux and torque errors imposed by the flux and torque controllers. This voltage reference is then generated using a hybrid cascaded H-bridge multilevel inverter, where each phase of the inverter can be implemented using a dc source, which would be available from fuel cells, batteries, or ultracapacitors. This inverter provides nearly sinusoidal voltages with very low distortion, even without filtering, using fewer switching
devices. In addition, the multilevel inverter can generate a high and fixed switching frequency output voltage with fewer switching losses, since only the small power cells of the inverter operate at a high switching rate. Therefore, a high performance and also
efficient torque and flux controllers are obtained, enabling a DTC solution for multilevel-inverter-powered motor drives.
Full Paper

IJECT/34/2/
A-542
   68 Switching Losses and Harmonic Investigations in Multilevel Inverters

K. Raja Gopal, B. Gavaskar Reddy, L. Maheswari, Md. Firdoseuddin, L. Suresh, M. Sreekar Reddy, R. Ravindra, P. Sowjanya

Abstract

Use of conventional two-level Pulse Width Modulation (PWM) inverters provide less distorted current and voltage but at the cost of higher switching losses due to high switching frequencies. Multilevel inverters are emerging as a viable alternative for highare emerging as a viable alternative for high power, medium voltage applications. This paper compares total harmonic distortion and switching losses in conventional two-level inverters with multilevel inverters (three-level and five-level) at different switching frequencies. An optimized switching frequency has been obtained for a lower level of total harmonic distortion and switching losses. Diode-clamped, three-phase topology is considered for study. A sinusoidal PWM technique is used to control the switches of the inverter. Simulation study confirms the reduction in harmonic distortion and switching losses as the number of the levels increases.
Full Paper

IJECT/34/2/
A-543
   69 A Control Method for a DVR for PQI

K. Raja Gopal, B. Gavaskar Reddy, L. Maheswari, S. Kavya, K.Pranathi, B. Sampath Kumar, P. Mohan Gowtham

Abstract

This paper presents a control system based on a repetitive controller to compensate for key power-quality disturbances, namely voltage sags, harmonic voltages, and voltage imbalances, using a dynamic voltage restorer (DVR). The control scheme deals with all three disturbances simultaneously within a bandwidth. The control structure is quite simple and yet very robust; it contains a feedforward term to improve the transient response and a feedback term to enable zero error in steady state. The well-developed
graphical facilities available in PSCAD/EMTDC are used to carry out all modeling aspects of the repetitive controller and test system. Simulation results show that the control approach performs very effectively and yields excellent voltage regulation.
Full Paper

IJECT/34/2/
A-544