Special Issue No. – 3, September, 2019

2nd International Conference on Advances in Engineering, Management and Sciences , Santhiram Engineering College

Modeling and Comparative Analysis of the Conventional and Hybrid Energy Storage Systems used in Electric Vehicular Technology

Authors:

Mondru. Chiranjeevi,D.V.Ashok Kumar,R. Kiranmayi,

DOI:

https://doi.org/10.26782/jmcms.spl.3/2019.09.00001

Abstract:

The most concentrating area is energy sustainability across the globe due to need of energy system for different applications. An energy system in Electrical Vehicular Technology (EVT) requires high power and energy densities for achieving the long drive and acceleration respectively. Now a day’s most preferable rechargeable battery is Lithium Ion (Li-Ion) battery, to achieving the long drive of EVT, it is use for conventional vehicles (battery electric vehicles) and hybrid electric vehicles. In this paper, KIA company EV+ car specifications such as Permanent Magnet Synchronous Machine (PMSM), vehicle design parameters, drive train, and Li-Ion battery is considering. In addition to the Li-Ion battery and an ultra-capacitor bank is connected in the proposed system. Hence, the combination of energy sources is proposing a Hybrid Energy Storage System (HESS) for EVT. In this system, the conventional and proposing energy system mathematical model is developing based on Depth of Discharge (DOD) of the vehicle by using MATLAB/Simulink. Compare the both energy systems results are such as State of Charge (SOC), Life Loss, and Power for United States Simplified Federal (SFUDC) and European Union (EUDC) urban drive cycles are observing and tabulate.

Keywords:

SOC,DOD,drive cycles,energy system,Li-Ion battery,power,batteries,ultra-capacitors,SFUDC,EUDC,life loss,

Refference:

I. A.Dhand, K. Pullen “Review of battery electric vehicle propulsion
systems incorporating flywheel energy storage” International Journal of
Automotive Technology, Vol.: 16, Issue 3, pp. 487-500, June 2015.
II. H.He, R.Xiong, K.Zhao, Z.Liu, “Energy management strategy research on
a hybrid power system by hardware-in-loop experiments”. Appl. Energy,
Vol.: 112, pp. 1311–1317, 2013.
III. H.Li, J.Peng, J.He, R.Zhou, Z.Huang, J.Pan, “A cooperative charging
protocol for on-board supercapacitors of catenary-free trams”. IEEE
Trans. Control Syst. Technol, Vol.: 26, pp. 1219–1232, 2018.
IV. H.Liu, Z.Wang, J.Cheng, D.Maly, “Improvement on the cold cranking
capacity of commercial vehicle by using supercapacitor and lead-acid
battery hybrid”. IEEE Trans. Veh. Technol, Vol.: 58, pp. 1097–1105,
2009.
V. H.Morais, T.Sousa, Z.Vale, P.Faria, “Evaluation of the electric vehicle
impact in the power demand curve in a smart grid environment”. Energy
Convers. Manag, Vol.: 82, pp. 268–282, 2014.
VI. J.Hu, X.Jiang, M.Jia, Y.Zheng., “Energy Management Strategy for the
Hybrid Energy Storage System of Pure Electric Vehicle Considering
Traffic Information”. Applied Sciences, 2018.
VII. J. Larminie, J.Lowry, “Electric Vehicle Technology Explained”, Second
Edition, Wiley, 2012.
VIII. J.Peng, R.Wang, H.Liao, Y.Zhou, H.Li, Y.Wu, Z.Huang “A Real-Time
Layer-Adaptive Wavelet Transform Energy Distribution Strategy in a
Hybrid Energy Storage System of EVs” Energies, Vol.:12, pp. 440, 2019.
IX. J.P Trovão, P.G. Pereirinha, H.M. Jorge, C.H. Antunes, “A multi-level
energy management system for multi-source electric vehicles-an
integrated rule-based meta-heuristic approach”. Appl. Energy, Vol.: 105,
pp. 304–318, 2013.
X. “KIA Company EV+ car specifications”,
www.kiamedia.com/us/en/models/soul-ev/2018/specifications.
XI. Larminie,”Batteries, Flywheels and Supercapacitors”, Electric Vehicle
Technology Explained Lowry/Electric Vehicle Technology Explained,
2012.
XII. L.Kumar, S.Jain., “Electric propulsion system for electric vehicular
technology: A review”. Renewable and Sustainable Energy Reviews,
2014.
XIII. L.Li, Z.Huang, H.Li, J.Peng, “A rapid cell voltage balancing scheme for
supercapacitor based energy storage systems for urban rail vehicles”.
Electr. Power Syst. Res., Vol.: 142, pp. 329–340, 2017.

XIV. M. Chiranjeevi, D.V. Ashok Kumar, R. Kiranmayi, “Batteries
Comparative Analysis and their Dynamic Model for Electric Vehicular
Technology” International journal of pure and applied mathematics, Vol.:
114, Issue: 7, pp. 629-637, 2017.
XV. M.Chiranjeevi, D.V.Ashok Kumar, R.Kiranmayi,“Mathematical Analysis
& Modeling of Li-Ion Battery with PMSM Based Plug-in Electric
Vehicles”. IEEE International Conference on Power, Control, Signals and
Instrumentation Engineering (ICPCSI), pp. 1445 – 1449, 2017.
XVI. N.S. Caetano, T.M. Mata, A.A. Martins, M.C. Felgueiras, “New trends in
energy production and utilization”. Energy Procedia, Vol.: 107, pp. 7–14, 2007.
XVII. S.A.Khateeb,., “Design and simulation of a lithium-ion battery with a
phase change material thermal management system for an electric
scooter”. Journal of Power Sources, Vol.: 128, Issue: 2, pp. 292-307.
XVIII. T. Sousa, H.Morais, T.Pinto, Z.Vale, “Energy resource management under
the influence of the weekend transition considering an intensive use of
electric vehicles”. In Proceedings of the 2015 Clemson University Power
Systems Conference (PSC), Clemson, SC, USA, 10–13 March pp. 1–16, 2015.
XIX. V.I.Herrera, A.S.Ibarra, A.Milo, H.Gaztañaga, H.Camblong, “Optimal
energy management of a hybrid electric bus with a battery-supercapacitor
storage system using genetic algorithm”. In Proceedings of the Electrical
Systems for Aircraft, Railway, Ship Propulsion and Road Vehicles
(ESARS), Aachen, Germany, 3–5; pp. 1–6, March 2015.
XX. V.I.Herrera, H.Gaztanaga, A.Milo, A.S.Ibarra, I.E.Otadui, T.Nieva.
“Optimal energy management of a battery-supercapacitor based light rail
vehicle using genetic algorithms”, IEEE Energy Conversion Congress and
Exposition (ECCE), 2015.
XXI. V.Shagar, S.G.Jayasinghe, H.Enshaei, “Effect of Load Changes on Hybrid
Shipboard Power Systems and Energy Storage as a Potential Solution: A
Review”. Inventions, Vol.: 2, Issue: 3, pp.1-22, 2017.
XXII. Y.Zhou, Z.Huang, H.Liao, H.Li, Y.Jiao, P.Jun, “An efficient reference
modulation based control strategy for active hybrid energy management of
EVs”. In Proceedings of the IEEE 2018 Energy Conversion Congress and
Exposition (ECCE) Portland, Oregon, USA, Portland, OR, USA, 23–27,
September 2018.
XXIII. Y.Zhou, Z.Huang, H.Li, J.Peng, W.Liu, H.Liao, “A Generalized Extended
State Observer for Supercapacitor State of Energy Estimation with Online
Identified Model”. IEEE Access, Vol.: 6, pp. 27706–27716, 2018.
XXIV. Z.Song, J.Li, X.Han, L.Xu, L.Lu, M.Ouyang, H.Hofmann, “Multiobjective
optimization of a semi-active battery/supercapacitor energy
storage system for electric vehicles”. Appl. Energy, Vol.: 135, pp. 212–
224, 2014.

View | Download

A SECURE APPROACH FOR DATA TRANSMISSION IN COMPUTER NETWORKS USING MODIFIED ADVANCED ENCRYPTION STANDARD ALGORITHM

Authors:

M. Indrasena Reddy,A.P Siva Kumar,

DOI:

https://doi.org/10.26782/jmcms.spl.3/2019.09.00002

Abstract:

In the internet along with other network applications, the requirement for security is increasing each day due to its wide usage. There are loads of algorithms which were established for the safe transmission of data. This paper offers a fresh approach for the generation of the key using the ‘Advanced Encryption Standard' (AES) algorithm along with the Flower Pollination Algorithm (FPA). This combination is termed as Modified AES (MAES). Initially, a plain text of 128 bits is the input to this algorithm. This text is transmuted to a cipher text. The key generation is important for the generation of the ‘S-Box’ (substitution box). The key generation on the proposed work is done utilizing the FPA. This step is done to make the keys in such a manner that the complexities of the S-Box enhance. This ameliorates the security of the proposed work for data transmission on a network. Then encryption is done. This is followed by decryption. Finally, the 128bit plain text is retrieved at the receiver's side. The MAES algorithm was compared with other traditional cryptographic algorithms. The proposed MAES algorithm yielded exceptional results.

Keywords:

Modified Advanced Encryption Standard Algorithm,Flower Pollination Algorithm,Security,Encryption,Decryption,Key,

Refference:

I. A.A.Yavuz, F.Alagöz, E.Anarim. “A new multi-tier adaptive military
MANET security protocol using hybrid cryptography and
signcryption.” Turkish Journal of Electrical Engineering & Computer
Sciences, Vol.:18, Issue: 1, pp. 1-22, 2010.
II. A.Kushwaha, H.R.Sharma, A.Ambhaikar. “Selective Encryption Using
Natural Language Processing for Text Data in Mobile Ad Hoc Network.”
In Modeling, Simulation, and Optimization, pp. 15-26, 2018
III. B.Bala, L.Kamboj, P.Luthra. “Secure File Storage in Cloud Computing using
Hybrid Cryptography, International Journal of Advanced Research in
Computer Science, Vol.:9, Issue: 2, pp. 773-776, 2018.
IV. B.Pradhan, S.Sengupta. “Chaotic-cipher based memory efficient symmetric
key cryptosystem.” In 2018 Emerging Trends in Electronic Devices and
Computational Techniques, 2018.
V. Ç.Ünal, S.Kaçar, A.Zengin, I.Pehlivan. “A novel hybrid encryption algorithm
based on chaos and S-AES algorithm.” Nonlinear Dynamics, Vol.:92, Issue:
4, pp. 1745-1759, 2018.

VI. D.Parashar, S.Roy, N.Dey, V.Jain, U.S.Rawat. “Symmetric Key Encryption
Technique: A Cellular Automata Based Approach.” In Proceedings of
CSI Cyber Security, pp. 59-67, 2018.
VII. E.B.Kavun, H.Mihajloska, T.Yalçin. “A Survey on Authenticated
Encryption–ASIC Designer’s Perspective.” ACM Computing Surveys ,
Vol.:50, Issue: 6, pp. 1-21, 2017.
VIII. G.J.Krishna, R.Vadlamani, S.N.Bhattu, “Key Generation for Plain Text in
Stream Cipher via Bi-Objective Evolutionary Computing.” Applied Soft
Computing, 2018.
IX. G.Kalpana, P.V.Kumar, S.Aljawarneh, R.V.Krishnaiah. “Shifted Adaption
Homomorphism Encryption for Mobile and Cloud Learning.” Computers &
Electrical Engineering , Vol.: 65, pp.178-195, 2018.
X. J.Liu, C.Fan, X.Tian, Q.Ding. “Optimization of AES and RSA Algorithm
and Its Mixed Encryption System.” In International Conference on Intelligent
Information Hiding and Multimedia Signal Processing, pp. 393-403, 2017.
XI. K.V.N.Rao, Padmanabhuni, K.Budda, K.Sruthi. “Authentication and
Encryption Using Modified Elliptic Curve Cryptography with Particle Swarm
Optimization and Cuckoo Search Algorithm.” Journal of The Institution of
Engineers (India): Series B, pp.1-9, 2018.
XII. M.E.Hameed, M.M.Ibrahim, N.AbdManap. “Review on Improvement of
Advanced Encryption Standard (AES) Algorithm based on Time Execution,
Differential Cryptanalysis and Level of Security.” Journal of
Telecommunication, Electronic and Computer Engineering , Vol.: 10, Issue:
1, pp.139-145, 2018.
XIII. M.Elhoseny, G.R.González, O.M.A.Elnasr, S.A.Shawkat, N.Arunkumar,
A.Farouk. “Secure medical data transmission model for IoT-based healthcare
systems.” IEEE Access , Vol.: 6, pp. 20596-20608, 2018.
XIV. M.Sookhak, A.Gani, M.K.Khan, R.Buyya. “Dynamic remote data auditing
for securing big data storage in cloud computing.” Information Sciences ,
Vol.:380 , pp.101-116, 2017.
XV. M.U.Bokhari, Q.M.Shallal, Y.K.Tamandani. “Reducing the Required Time
and Power for Data Encryption and Decryption Using K-NN Machine
Learning.” IETE Journal of Research , pp.1-9, 2018.
XVI. P.Dixit, A.K.Gupta, M.C.Trivedi, V.K.Yadav, “Traditional and Hybrid
Encryption Techniques: A Survey.” In Networking Communication and Data
Knowledge Engineering, pp. 239-248, 2018.
XVII. P.Li, K.T.Lo. “A Content-Adaptive Joint Image Compression and Encryption
Scheme.” IEEE Transactions on Multimedia , Vol.:20, Issue: 8, pp. 1960-
1972, 2018.

XVIII. R.D.Gill, N.Kapur, H.S.Gill. “Increase Security of Data With Respect to Both
Confidentiality and Integrity over Cloud.” International Journal of Applied
Engineering Research, Vol.:13, Issue: 10, pp. 7388-7391, 2018.
XIX. T.Hanqi, Q.T.Sun, X.Yang, K.Long. “A Network Coding and DES Based
Dynamic Encryption Scheme for Moving Target Defense.” IEEE Access ,
Vol.:6, pp.26059-26068, 2018.
XX. Ü.Çavuşoğlu, A.Zengin, I.Pehlivan, S.Kaçar. “A novel approach for strong SBox
generation algorithm design based on chaotic scaled Zhongtang
system.” Nonlinear Dynamics , Vol.:87, Issue: 2, pp.1081-1094, 2017.
XXI. V.Lozupone. “Analyze encryption and public key infrastructure
(PKI).” International Journal of Information Management , Vol.:38, Issue: 1,
pp.42-44, 2018.
XXII. Y.Ye, N.Wu, X.Zhang, L.Dong, F.Zhou. “An Optimized Design for Compact
Masked AES S-Box Based on Composite Field and Common Subexpression
Elimination Algorithm.” Journal of Circuits, Systems and Computers ,
Vol.:27, Issue: 11, pp.1-11, 2018.

View | Download

Fuzzy logic determining multi-paths in Gray hole attack for improving the energy efficiency of sensor Networks

Authors:

Sybi Cynthia J,Sheryl Radley,L Mary Gladence,

DOI:

https://doi.org/10.26782/jmcms.spl.3/2019.09.00003

Abstract:

A Gray Hole Attack (GHA) in dynamic wireless sensor networks (Dynamic WSN) is an attack that specifically drops or conveys occasion packets as the traded off hub moves. In such an attack, it is hard to recognize the traded off hub contrasted and the sending attack happening in the remote sensor arrange on the grounds that all sensor hubs move. To distinguish sending attacks in Dynamic WSN, a haze figuring based framework for a Gray hole recognition plot known as Fuzzy logic determining multi-paths in Gray hole attack (FL-MP-GHA) has been proposed. In any case, since the proposed recognition conspire utilizes a solitary way, the vitality utilization of the sensor hub for course revelation when the sensor hub moves is substantial. To take care of this issue, the manuscript utilizes fluffy rationale to decide the quantity of multi-ways expected to improve the vitality effectiveness of sensor systems. Trial results demonstrate that the vitality productivity of the sensor organize is improved.

Keywords:

Gray hole attack (GHA),dynamic wireless sensor networks (Dynamic WSN),Fuzzy logic determining multi-paths in Gray hole attack (FL-MP-GHA),

Refference:

I. A.Abduvaliyev, A.S.K.Pathan, J.Zhou, R.Roman, W.C.Wong, “On the vital
areas of intrusion detection systems in wireless sensor networks”, IEEE
Communications Surveys & Tutorials, Vol.: 15, Issue: 3, pp. 1223-1237,
2013.
II. C.Zhu, H.Wang, X.Liu, L.Shu, L.T.Yang, V.C.Leung, “A novel sensory data
processing framework to integrate sensor networks with mobile cloud”, IEEE
Systems Journal, Vol.: 10, Issue: 3, pp. 1125-1136, 2016.
III. D.Li, Z.Aung, J.R.Williams, A.Sanchez, “Efficient authentication scheme for
data aggregation in smart grid with fault tolerance and fault diagnosis”, In
2012 IEEE PES Innovative Smart Grid Technologies, pp. 1-8, January 2012.
IV. I.Amundson, X.D.Koutsoukos, “A survey on localization for mobile wireless
sensor networks.” Mobile entity localization and tracking in GPS-less
environnments”, Springer, Berlin, Heidelberg, pp. 235-254, 2009.
V. Q.Yaseen, F.AlBalas, Y.Jararweh, M.Al-Ayyoub, “A fog computing based
system for selective forwarding detection in mobile wireless sensor
networks”, In 2016 IEEE 1st International Workshops on Foundations and
Applications of Self* Systems (FAS* W) (pp. 256-262). IEEE., pp. 1223-
1237, September 2016.
VI. W.J.Chung, T.H.Cho, T. H, “A Multi-Path Routing Determination Method
for Improving the Energy Efficiency in Selective Forwarding Attack
Detection Based MWSNs”, International Journal of Wireless & Mobile
Networks, Vol.: 10, 2018.
VII. Y.Liu, M.Dong, K.Ota, A.Liu, “ActiveTrust: Secure and trustable routing in
wireless sensor networks”, IEEE Transactions on Information Forensics and
Security, 11(9), 2013-2027. Vol.: 15, Issue: 3, pp. 1223-1237, 2016.
VIII. Z.Zhang, K.Long, J.Wang, F.Dressler, “On swarm intelligence inspired selforganized
networking: its bionic mechanisms, designing principles and
optimization approaches”, IEEE Communications Surveys & Tutorials, Vol.:
16, Issue: 1, pp. 513-537, 2014.

View | Download

Impact of feature selection techniques in Text Classification: An Experimental study

Authors:

S. Rahamat Basha,J.Keziya Rani,JJC Prasad Yadav,G.Ravi Kumar,

DOI:

https://doi.org/10.26782/jmcms.spl.3/2019.09.00004

Abstract:

This work is a study of comparing different feature selection techniques on the accuracy of text classification. Text Mining or Document Categorization is a supervised learning (an Information Retrieval task which learns from labeled train data) technique where it uses labeled (set of instances with predefine labels) train instances or data to learn the categorization job and then it categorize the test text instances automatically using the system that is learnt. In the field of IR and management tasks, classification plays an important lead. The text categorization procedure includes the steps text pre-processing (cleaning, stop word removal and stemming), feature extraction or feature reduction or feature selection and then categorization. In this work, two machine learning algorithm/classifiers (Naïve Bayes and K-Nearest Neighbor) are used for classification. The analyzed experimental results show that Naïve Bayes algorithm gives more accuracy in many cases i.e. with many feature selection techniques and K-Nearest Neighbor classifier works well only in the cases, when the feature selection techniques either Information Gain (IG) or Mutual Information (MI). The results of experiments reported here were generated while Self-made corpus used for training and Reuters-21578 corpus used for testing.

Keywords:

Stop word removal,stemming,feature weighting and selection,K-NN,Naïve Bayesian,

Refference:

I. “A Fuzzy Self-Constructing Feature Clustering Algorithm for Text
Classification”, IEEE transactions on knowledge and data engineering, Vol.:
23, Issue: 3, March 2011.
II. A.M. Martinez and A.C. Kak, “PCA versus LDA”, IEEE Trans. Pattern
Analysis and Machine Intelligence, Vol.: 23, Issue: 2, pp. 228-233, Feb.
2001.
III. An algorithm for suffix stripping by M. F. Porter,
http://maya.cs.depaul.edu/~classes/ds575/papers/porter-algorithm.html, 1980.
IV. Eghbal G. Mansoori and Khadijeh S. Shafiee, “On fuzzy feature selection in
designing fuzzy classifiers for high-dimensional data”, Evolving Systems,
Vol.:7, Issue:4, pp 255–265, December 2016.

V. F.Sebastani, “Machine Learning in Automated Text Categorization”, ACM
Computing Surveys, Vol.: 34, Issue: 1, pp.1-47, 2002.
VI. H.kim, p. Howland, and H. park, “Dimension Reduction in Text
Classification with Support Vector Machines”, J.Machine Learning Research,
Vol.: 6, pp. 37-53, 2005.
VII. H. Park, M. Jeon, and J. Rosen, “Lower Dimensional Representation of Text
Data Based on Centroids and Least Squares”, BIT Numerical Math, Vol.: 43,
pp. 427-448, 2003.
VIII. https://archive.ics.uci.edu/ml/datasets/Reuters-
21578+Text+Categorization+Collection.
IX. https://voyant-tools.org/?corpus=1621ff41879200779eb5bf827f2e3881
X. I.T. Jolliffe, Principal Component Analysis. Springer-Verlag, 1986.
XI. N. Slonim and N. Tishby, “The Power of Word Clusters for Text
Classification”, Proc. 23rd European Colloquium on Information Retrieval
Research (ECIR), 2001.
XII. Oystern Lohre Garnes, Kjetil Norvag, Robert Neumayer, “Feature Selection
for Text Categorization”, Norwegian University of Science and Technology,
June 2009.

View | Download

Novel Scalar PWM Techniques for Vector Control based Induction Motor Drives to Reduce Common Mode Voltage

Authors:

P. Rama Mohan,K. Niteesh Kumar,G. Bala Subbarayudu,A. Suresh Kumar,D Lenine,

DOI:

https://doi.org/10.26782/jmcms.spl.3/2019.09.00005

Abstract:

This paper presents novel and simple scalar Pulse Width Modulation (PWM) techniques for vector control based Induction Motor (IM) drives to reduce the common mode voltage (CMV). These PWM techniques don’t require information of angle and sector. So, there is less complexity. In the proposed approach, a generalized offset time expression is derived. The modulating signals of various PWM techniques were derived by varying a constant. With these PWM techniques, 33.33% of CMV is reduced. Also, these techniques are simple to implement because, reference vector calculation and sector identification is not required. The experimental set up of v/f control based IM drive is developed. The vector control based IM drive is simulated and the proposed scalar PWM techniques are evaluated.

Keywords:

Common Mode Voltage,Vector Control,Induction Motor Drive,Active Zero State,Near State,

Refference:

I. A.M. Hava, N.O.Cetin, “A Generalized Scalar PWM Approach With Easy Implementation Features for Three-Phase,Three-Wire Voltage-Source Inverters”, IEEE Transactions on Power Electronics, Vol.: 26, Issue: 5, pp.1385-1395, 2011.
II. C.C.Hou, C.C.Shih, P.T.Cheng, A.M.Hava “Common-Mode Voltage Reduction Pulse width Modulation Techniques for Three-Phase Grid-Connected Converters”, IEEE Transactions on Power Electronics, Vol.: 28, Issue: 4, pp. 1971-1979, 2013.
III. D.Casadei, F.Profumo, G.S.A.Tani, “FOC and DTC: Two Viable Schemes for Induction Motors Torque Control”, IEEE Transactions on Power Electronics, Vol.: 17, Issue: 5, pp. 779-787, 2002.
IV. D.W.Chung, J.S.Kim and S.K.Sul, “Unified voltage modulation technique for real-time three-phase power conversion”, IEEE Transactions on Industry Appications, Vol.: 34, Issue: 2, pp. 374-380, 1998.
V. I.Takahashi, T.Noguchi, “A new quick-response and high-efficiency control strategy of an induction motor”, IEEE Transactions on Industry Appications, Vol.: 22, Issue: 5, pp. 820-827, 1986.
VI. M. Cacciato, A. Consoli, G. Scarcella, A. Testa, “Reduction of common-mode currents in PWM inverter motor drives”, IEEE Transactions on Industry Appications, Vol.: 35, Issue: 2, pp. 469 – 476, 1999.
VII. P. R.Mohan, T.B.Reddy, M.V.Kumar, “A Simple Generalized PWM Algorithm for Three Phase Voltage Source Inverter fed AC Drives”, International Review of Electrical Engineering, Vol.: 10, Issue: 2, pp. 180-188, 2015.
VIII. P.R.Mohan, T.B.Reddy, M.V.Kumar, “Simple and Efficient High Performance PWM Algorithm for Induction Motor Drives”, Journal of Electrical Engineering, Vol.: 11, Issue: 4, pp. 23-30, 2011.
IX. S. Ogasawara, H. Ayano, H. Akagi, “An active circuit for cancellation of common-mode voltage generated by a PWM inverter”, IEEE Transactions on Power Electronics, Vol.: 13, Issue:5, pp. 835–841, 1998.
X. Y. S. Lai, F. S. Shyu, “Optimal common-mode voltage reduction PWM technique for inverter control with consideration of the dead-time effects – Part I: Basic development”, IEEE Transactions on Industry Appications, Vol.: 40, Issue: 6, pp. 1605–1612, 2004.

View | Download

Optimization of chemical plant layout and pilot study on implementation of Industry 4.0

Authors:

S. Aravind Raj,H.Abdul Zubar,Abdulrahman M Basahel,

DOI:

https://doi.org/10.26782/jmcms.spl.3/2019.09.00006

Abstract:

In the current era, the manufacturing sector plays a vital role in the industrial growth and economy. The limited availability of resources such as land make efficient resource allocation and utilization highly necessary. Optimization of the new as well as existing facility layouts is carried out to reduce connection costs and thereby increase profits. The optimization algorithm must consider the equipment dimensions, orientation and the connection costs between each equipment. The outcome of such an algorithm would be a set of coordinates of each equipment and the floor on which the base of the equipment is to be placed. Mapping this data into a 2D layout will provide a visual understanding of the optimized plant design. In addition to this, with the development of innovative concepts such as the Industry 4.0 in the markets, companies upgrading their levels of technology. In developing countries such as India, not all plants have a huge capital. So, they need to devise a systematic plan to implement the new Industry 4.0 model and its supporting technologies. A successful conjunction between Industry 4.0 and lean concepts is the most viable option. This study aims to achieve both these targets – to devise an algorithm that optimizes the location of each equipment and a method that determines the possible upgrades in technology that are feasible for a firm.

Keywords:

Layout,Optimization,Industry 4.0,Plant design,

Refference:

I. A. Brooke, D. Kendrick, A. Meeraus, GAMS: A User’s Guide; The Scientific
Press: San Francisco, 2015.
II. A. Szalavetz, Industry 4.0 and capability development in manufacturing
subsidiaries, Technological Forecasting & Social Change.
III. A. Telukdariea, E. Buhulaigaa, S. Baga, S. Gupta, Z. Luo, Industry 4.0
implementation for multinational, Process Safety and Environmental
Protection.
IV. B.J.C. Fortenberry and J.F. Cox, 1985, Multiple criteria approach to the
facility layout problem. Int. J. Prod. Res., 23: 773–782.
V. B.K. Kaku, G.L. Thompson and T.E. Morton, 1991, A hybrid heuristic for
the facilities layout problem. Comput. Oper. Res., 18: 241–253
VI. CPLEX Optimization Inc. Using the CPLEX Callable Library; CPLEX:
Incline Village, NV, 2016.
VII. H.D. Pou and M. Nosraty, 2006, Solving the facility and layout and location
problem by ant-colony optimization-meta heuristic. Int. J. Prod. Res., 44:
5187–5196.
VIII. K.D.W. Thoben, S. A.;Wuest, T., “Industrie 4.0” and smart manufacturing-a
review of research issues and application examples. International Journal of
Automation Technology. 11(1) (2017) 4-16

IX. O. Kettani and O. Muhittin, 1993, Reformulation quadratic assignment for
efficient optimisation. IIE Trans., 25: 97-107.
X. S.S. Heraguand A, Kusiak, 1990, Machine layout: an optimisation and
knowledge-based approach. Int. J. Prod. Res., 28: 615–635.
XI. S.Vaidya, P. Ambad, S.Bhosle Industry 4.0 – A Glimpse, Procedia
Manufacturing (2017) 232-238.
XII. T.C. Koopmans and M. Beckman, 1957, Assignment problems and the
location of economic activities. Econometrica, 25: 53-76
XIII. T.K. Sung, Industry 4.0: A Korea perspective, Technological Forecasting &
Social Change.

View | Download

A Novel PWM Technique for Multilevel VSI fed Vector Controlled Drives based on Universal Offset Time Expression

Authors:

P. Rama Mohan,Neeli Mallikarjuna,Puli Obulesu,A. Suresh Kumar,D Lenine,

DOI:

https://doi.org/10.26782/jmcms.spl.3/2019.09.00007

Abstract:

This paper presents a novel generalized scalar Pulse Width Modulation (PWM) technique based on universal offset time expression for Multilevel Voltage Source Inverter (VSI) fed Vector Controlled Drives In this technique, by varying a constant between 0 and 1, various PWM techniques have been derived. These PWM techniques don’t require information of angle and sector. Also, these techniques are simple to implement because, reference vector calculation and sector identification is not required. So, there is less complexity. The Multilevel inverter uses level shifting carrier signals. The proposed concept is simulated and evaluated.

Keywords:

PWM Algorithm,Vector Control,Induction Motor Drive,Multilevel Inverter,Voltage Source Inverter,

Refference:

I. A.R.Beig, “Application of three-level voltage-source-inverters to voltagefed
& current-fed high-power inductionmotor drives”, Ph.D. dissertation,
Indian Institute of Science, Bengaluru,India,2004
II. D.Casadei, F.Profumo, G.Serraand A.Tani, “FOC and DTC: Two Viable
Schemes for Induction Motors Torque Control”, IEEE Transactions on
Power Electronics, Vol.:17, Issue:5, pp.779-787, 2002.
III. D.W.Kang, “Improved carrier-wave based SVPWM method for
generalised cascaded multi-level-inverter topology”, Proceedings of
IEEE-APEC, pp.542-548, 2000.
IV. J.A.Santisteban and R.M.Stephan, “Vectorcontrol methods for
inductionmachines: an overview”, IEEE Transactions on Education,
Vol.:44, Issue:2, pp.170-175, 2001.
V. M.A.Pérez, J.Rodriguez, K.Gopakumar and M.Malinowski, A Survey on
Cascaded Multi-level-Inverters”, IEEE Transactions on Industrial
Electronics, Vol.:57, Issue:7, pp.2197-2206, 2010.
VI. P. Rama Mohan, T. Bramhananda Reddy and M. Vijaya Kumar, “Simple
and Efficient High Performance PWM Algorithm for Induction Motor
Drives”, Journal of Electrical Engineering, Vol.: 11, Issue: 4, pp. 23-30,
2011.
VII. P. Rama Mohan, T. Bramhananda Reddy and M. Vijaya Kumar, “A
Simple Generalized PWM Algorithm for Three Phase Voltage Source
Inverter fed AC Drives”, International Review of Electrical Engineering,
Vol.: 10, Issue: 2,pp. 180-188, 2015.

VIII. S.Das and G.Narayanan, “Novel Switching Sequences for a Space-
Vector-Modulated Three-Level-Inverter”, IEEE Transactions on
Industrial Electronics, Vol.:59, Issue:3, pp.1477-1487, 2012.
IX. T.G.Habetler, F.Z.Peng and L.M.Tolbert, “Multi-level converters
forlarge electricdrives”, IEEE Transactions on Industry
Appications,Vol.:35, Issue:1, pp.36-44, 1999.
X. Z.Pan and F.Z.Peng, “A Sinusoidal PWM Method With Voltage-
Balancing Capability for Diode-Clamped-Five-Level Converters”, IEEE
Transactions on Industry Applications,Vol.:45, Issue:3, pp.1028-1034,
2009.

View | Download

Analysis of Medium Scale Solar PV System Performance on Grid tied single-stage Conversion System

Authors:

G. Sreenivasa Reddy,T. Bramhananda Reddy,M. Vijaya Kumar,

DOI:

https://doi.org/10.26782/jmcms.spl.3/2019.09.00008

Abstract:

Grid-connected PV systems (GPV) with one stage of conversion method, high performance and effectiveness can be caused by some control objectives. Objectives like current control, output current harmonics, maximum power tracking algorithm with synchronized grid connections. These objectives are merely controlled in one stage GPV systems with two-level inverter topology. The proposed paper, a medium scale variable PV single stage 3-ɸ power is associated with the grid is presented. The basic Perturb and Obseve type of MPPT tracking technique is used to abstract tremendous energy of PV system. This can be done by using a novel technique called Voltage Oriented Control (VOC). To validate the proposed method, solar irradiation and temperature of a solar PV cell are considered as input for the simulation process. The VOC based GPV system performance can be evaluated with the simulation results, the percentage THD estimations of electrical parameters like voltage and currents are verified at the point of common coupling. The presented results will identify that the VOC based GPV gives the better and high dynamic performance of the system at various irradiation conditions.

Keywords:

Perturb and observe MPPT,VOC,Grid-Connected PV system,VSI,

Refference:

I. A.Yazdani, “Modeling guidelines and a benchmark for power system
simulation studies of three-phase, single-stage photovoltaic systems”,
IEEE Trans. Power Del., Vol.: 26, Issue: 2, pp. 1247–1264, April
2011.
II. B.Tamimi, C.Canizares, K.Bhattacharya, “Modeling and performance
analysis of large solar photo-voltaic generation on voltage stability and
inter-area oscillations”, in Proc. IEEE Power Energy Soc. Gener. Meet,
pp. 1–6, July 2011.
III. F.Blaabjerg, Z.Chen, S.Kjaer, “Power electronics as an efficient
interface in dispersed power generation systems”, IEEE Trans. Power
Electron., Vol.: 19, Issue: 5, pp. 1184–1194, Sep. 2004.
IV. F.Delfino, G.Denegri, M.Invernizzi, R.Procopio, “A control algorithm
for the maximum power point tracking and the reactive power injection
from grid-connected PV systems”, in Proc. IEEE Power Energy Soc.
Gener.Meet, pp.1–7, Jul. 2010
V. G.S.Reddy, T.B.Reddy, M.V.Kumar, “Investigations on grid connected
PV system under Variable irradiation conditions”, International Journal
of Engineering & Technology, Vol.: 7 Issue:3.29, pp:253-258, 2018.
VI. G.Petrone, G.Spagnuolo, R.Teodorescu, M.Veerachary, M.Vitelli,
“Reliability issues in photovoltaic power processing systems”, IEEE
Trans. Ind. Electron., Vol.: 55, Issue: 7, pp. 2569–2580, Jul. 2008.
VII. J.Carrasco, “Power-electronic systems for the grid integration of
renewable energy sources: A survey”, IEEE Trans. Ind. Electron.,
Vol.: 53, no. 4, pp. 1002–1016, Jun. 2006.
VIII. L. Wang and Y.H Lin, “Dynamic stability analyses of a photovoltaic
array connected to a large utility grid”, in Proc.IEEE Power Eng. Soc.
Winter Meet, Vol.: 1, pp. 476–480, Jan. 2000

IX. R.Mastromauro, M.Liserre, A.Dell’Aquila, “Control issues in singlestage
photovoltaic systems: MPPT, current and voltage control”, IEEE
Trans. Ind. Informat., Vol.: 8, Issue: 2, pp. 241– 254, May 2012.
X. R.Varma, B.Das, I.Axente, T.Vanderheide, “Optimal 24-hr utilization
of a PV solar system as STATCOM (PV-STATCOM) in a distribution
network”, in Proc. IEEE Power Energy Soc.Gener.Meet., pp. 1–8, Jul.
2011.
XI. S.Jain, V.Agarwal, “A single-stage grid connected inverter topology
for solar PV systems with maximum power point tracking”, IEEE
Trans.Power Electron., Vol.: 22, Issue: 5, pp. 1928–1940, Jul.2007.
XII. S.H.Ko, S.Lee, H.Dehbonei, C.Nayar, “Application of voltage and
current-controlled voltage source inverters for distributed generation
systems”, IEEE Trans. Energy Convers., Vol.: 21, Issue: 3, pp. 782–
792, Sep. 2006.
XIII. S.Jain, V.Agarwal, “Comparison of the performance of maximum
power point tracking schemes applied to single-stage grid-connected
photovoltaic systems,” IET Electr. Power Appl., Vol.:1, Issue: 5, pp.
753–762, Sep. 2007.
XIV. T.Esram, P.Chapman, “Comparison of photovoltaic array maximum
power point tracking techniques”, IEEE Trans. Energy Convers, Vol.:
22, Issue: 2, pp. 439–449, Jun. 2007.
XV. W.Du, H.Wang, R.Dunn, “Power system small-signal oscillation
stability as affected by large-scale PV penetration”, in Proc. IEEE
Int.Conf. SUPERGEN, pp. 1–6, Apr. 2009.

View | Download

Mechanical Properties of Teak Fiber Reinforced Epoxy Composites

Authors:

Vatti Chandra Sekhar,Ravipati Bapaiah Choudary,GajulaNarender,MallavarapuUmamahesh,

DOI:

https://doi.org/10.26782/jmcms.spl.3/2019.09.00009

Abstract:

The use of composite materials is increasing day by day due to their less weight and high strength. Some of the natural fiber reinforced composites are competing with the artificial fiber reinforced composites. The most significant parameters that affect properties of composites are fiber loading, fiber length, fiber orientation, method of fabrication, etc. In the present research work, an attempt has been made to produce composite materials reinforced with teak fiber in epoxy resin (Araldite LY556). In this investigation, fiber lengths of10mm, 30mm and 50 mm and fiber loading of 2%, 3% and 4% w/w were used. The composite specimens were fabricated by hand layup technique. Experiments were scheduled as per L9 orthogonal array using Taguchi’s design of experiments. The effect of fiber loading and fiber length on tensile and flexural strengths has been analyzed.

Keywords:

Teak fiber,Epoxy composites,Tensile strength,Flexural strength,

Refference:

I. https://en.wikipedia.org/wiki/Teak
II. J. Holbery and D. Houston, “Natural fiber reinforced polymer composites
in automotive applications”,‖ J Miner Meta Mater Soc., Vol. 58, 2006,
pp. 80-86.
III. J. K. Pandey, S. H. Ahn, C. S. Lee, A. K. Mohanty and M. Misra “Recent
advances in the application of natural fiber based composites”,
Micromolecular Materials and Engineering, 295(11), 2010, pp.975-89.
IV. M. Ganesan, and T.N. Valarmathi, “Tensile strength of teak wood saw
dust-cashew nut shell liquid resin composites”. IJEDR, Vol.2, (1), 2014,
pp.196-199.
V. M. J. John and R. D. Anandjiwala, “Recent developments in chemical
modification and characterization of natural fiber-reinforced composites”,
J Polym Compos., Vol. 29, 2008, pp.187-207.
VI. M. J. John and S. Thomas, “Biofibres and biocomposites”, J
CarbohydPolym., Vol. 71, 2008 pp. 343-364.
VII. M. N.Belgacem, P. Bataille and S. Sapieha, “Effect of corona
modification on the mechanical properties of polypropylene/cellulose
composites”, J ApplPolym Sci., Vol. 53, 1994, pp. 379-385.
VIII. MohiniSaxena, Asokanpappu, Anushasharm, RuhiHaque and
SonalWankhede, CSIR- Advanced Materials and Processes research
Institute, Counsil of Scientific & Industrial Research, Habibganj Naka,
Bhopal.
IX. S.V. Joshi, L.T. Drzal, A.K. Mohanty and S. Arora, “Are natural fiber
composites environmentally superior to glass fiber reinforced
composites”,‖ Compos Part A., Vol. 35, 2004, pp. 371-376.
X. V.Anandarao, Aloksatapathy, S.Mishra, Proceedings of international and
INCCOM-6 Conference Future Trends in Composite materials and
processing Dec12-14,2007, Indian Institute of Technology Kanpur.

View | Download

Chaotic Algorithm for Standard Image Encryption

Authors:

Surya Bhupal Rao,S.Rahamat Basha,

DOI:

https://doi.org/10.26782/jmcms.spl.3/2019.09.00010

Abstract:

In this paper, proposes Image Encryption using chaotic crypto algorithm for improving the cyber security levels of Images and videos, the inherent characteristics and Properties of digital images, enormously using all properties of chaos being the natural superiorities of chaotic systems in secret transmissions and information encryption, able to provide the way to solve major issues of cyber security.

Keywords:

Image Encryption,Chaotic crypto,Cyber Security,Image Decryption,

Refference:

I. A.Akhshani, A., Behnia, S., Akhavan, A., Hassan, H.A. and Hassan, Z, “A
novel scheme for image encryption based on 2D piecewise chaotic maps”,
Optics Communications, Vol.: 283, pp.3259-3266, 2010.
II. A.Awad, “A New Chaos-Based Cryptosystem for Secure Transmitted
Images”, IEEE Trans. on Computers, 2011.
III. Ahmad, Musheer, and M. ShamsherAlam. “A new algorithm of encryption
and decryption of images using chaotic mapping.” International Journal on
computer science and engineering, Vol.: 2, Issue: 1, pp. 46-50, 2009.
IV. A.Z. Tirkel, R.G. Van Schyndel, C.F. Osborne, A digital watermark,
Proceedings of ICIP 1994, Austin Convention Center, Austin, Texas, Vol.: II,
pp. 86–90, 1994.
V. Banik, B.Gupta, S.K.Bandyopadhyay. “Secret Sharing Using 3 Level DWT
Method of Image Steganography Based on Lorenz Chaotic Encryption and
Visual Cryptography.” Computational Intelligence and Communication
Networks (CICN), 2015 International Conference on. IEEE, 2015.
VI. Bauer, Lujo, “Device-enabled authorization in the Grey
system.”InternationalConference on Information Security. Springer Berlin
Heidelberg, 2005.
VII. Francois, Michael “A new pseudo-random number generator based on two
chaotic maps”, Informatica, Vol.: 24, Issue: 2, pp.181-197, 2013.

VIII. Liu, Ye, “Image encryption algorithm based on chaotic system and dynamic
S-boxes composed of DNA sequences”, Multimedia Tools and
Applications, Vol.: 75, Issue: 8, pp. 4363-4382, 2016.
IX. Liu, Hongjun, A.Kadir, Pijuan, Gong “A Fast Color Image Encryption
Scheme using one-time S-Boxes based on complex chaotic system and
Random noise”, Optics Communications , Vol.: 338, pp.340-347, 2015.
X. M.Brindha, N.A.Gounden. “A chaos based image encryption and lossless
compression algorithm using hash table and Chinese Remainder
Theorem.” Applied Soft Computing, Vol.: 40 (2016): 379-390.
XI. N.Bourbakis, and Christos Alexopoulos. “Picture data encryption using scan
patterns.” Pattern Recognition, Vol.: 25, Issue: 6, pp. 567-581, 1992.
XII. Norouzi, Benyamin, “A novel image encryption based on row-column,
masking and main diffusion processes with hyper chaos”, Multimedia Tools
and Applications, Vol.: 74, Issue: 3, pp.781-811, 2015.
XIII. R. Guesmi, “A novel chaos-based image encryption uses DNA sequence
operation and Secure Hash Algorithm SHA-2 and Nonlinear Dynamguesmi,
Ramzi, et al., Hash key-based image encryption using crossover operator and
chaos”, Multimedia tools and applications, Vol.: 75, Issue: 8, pp.1123-1136,
2016.
XIV. Uhl, Andreas, A.Pommer, “Image and video encryption: from digital rights
management to secured personal communication” , Vol.: 15. Springer
Science and Business Media, 2004.
XV. X.H.Q.Zhang “Image Encryption Based on Chaotic Modulation of Wavelet
Coefficients”, Congress on IEEE Image and Signal Processing (CISP’08),
Sanya, Hainan, Vol.: 1, pp.622-626, 27- 30, May 2008.
XVI. Ying, Wang, “The spatial-domain encryption of digital images based on
high-dimension chaotic system”, Cybernetics and Intelligent Systems, IEEE
Conference on, Vol.: 2. IEEE, 2004.
XVII. Y.Wang, X.Liao, T.Xiang, K.W.Wong, D.Yang, “Cryptanalysis and
Improvement on a Block Cryptosystem based on Iteration a Chaoticmap”,
Physics Letters A, Vol.: 363, pp. 277-281, 2007.

View | Download