Special Issue No. – 6, January, 2020

5th International Conference on Recent Trends in Computer Sciences and
Electronics (RTCSE)
Organized by University of Hawaii, USA and Gyancity Research Lab, Haryana, India

GENETIC ALGORITHM BASED LIGHTNING ESTIMATION MODEL

Authors:

Musse Mohamud Ahmed,Aohammad Kamrul Hasan,Jong F. Chen,Denis Lee,

DOI:

https://doi.org/10.26782/jmcms.spl.6/2020.01.00001

Abstract:

When lightning strikes to the transmission line, orifices in the insulation can be created. As a result, the insulation co-ordination between phases is breakdown and overvoltage will propagate across the transmission line in the form of electrical fields. Hence, the system will encounter under-frequency and prolonged type of destruction. In a worst-case situation, it may lead blackout. One of the effective ways to reduce lightning impact is to identify the lightning activity. This researchhas been carried out to familiarize the lightning activity in Sarawakarea;hence, the Genetic Algorithm (GA) is utilized to optimize the crucial constants of the lightning empirical equation. As the constant values are successful to be optimized, estimation of Ground Flash Density (GFD) can be performed. The performance is evaluated using Matlab. Using the GA optimized parameter the estimations areprecise. To achieve estimation that is more accurate many trials are required to be carried out in order to determine the best fitness value. In this article, three casesare carried out in determining the optimal solution in term of constant “a” and “b” for each sub-region in Sarawak.

Keywords:

GA,Optimization,Ground Flash Density (GFD),Lightening,

Refference:

I. Houck, C. R., Joines, J., & Kay, M. G. (1995). A genetic algorithm for function optimization: a Matlab implementation. Ncsu-ie tr, 95(09), 1-10.

II. Rakov, V. A., &Uman, M. A. (2003). Lightning: physics and effects. Cambridge University Press.
III. Leung, F. H. F., Lam, H. K., Ling, S. H., & Tam, P. K. S. (2003). Tuning of the structure and parameters of a neural network using an improved genetic algorithm. IEEE Transactions on Neural networks, 14(1), 79-88.
IV. Stolzenburg, M., Marshall, T. C., Karunarathne, S., Karunarathna, N., & Orville, R. E. (2014). Leader observations during the initial breakdown stage of a lightning flash. Journal of Geophysical Research: Atmospheres, 119(21).
V. Sidik, M. A. B., Shahroom, H. B., Salam, Z., Buntat, Z., Nawawi, Z., Ahmad, H., &Arief, Y. Z. (2015). Lightning monitoring system for sustainable energy supply: A review. Renewable and Sustainable Energy
Reviews, 48, 710-725.
VI. Coquillat, S., Boussaton, M. P., Buguet, M., Lambert, D., Ribaud, J. F., &Berthelot, A. (2013). Lightning ground flash patterns over Paris area between 1992 and 2003: Influence of pollution?. Atmospheric research, 122, 77-92.
VII. Dwyer, J. R., &Uman, M. A. (2014). The physics of lightning. Physics Reports, 534(4), 147-241.
VIII. Sovacool, B. K., &Bulan, L. C. (2012). Energy security and hydropower development in Malaysia: The drivers and challenges facing the Sarawak Corridor of Renewable Energy (SCORE). Renewable Energy, 40(1), 113- 129.
IX. Kundur, P., Balu, N. J., &Lauby, M. G. (1994). Power system stability and control (Vol. 7). New York: McGraw-hill.
X. Brand, K. P. (2003). Substation Automation Handbook Utility Automation Consulting Lohmann. Bremgarten, Switzerland.
XI. Maaji, S. S., Khan, D. F. S., Tabassum, M., Haldar, M. K., & Karunakaran P. (2013). Preliminary Studies of a Proposed Borneo-Wide Smart Grid. In World Hybrid Technologies and Energy Conference in Sarawak, Malaysia.
XII. Sugimoto, S., et al. “Principle and characteristics of a fault current limiter with series compensation.” IEEE Transactions on Power delivery 11.2 (1996): 842-847.
XIII. Rizk, F. A. (2010). Modeling of substation shielding against direct lightning strikes. IEEE Transactions on Electromagnetic Compatibility, 52(3), 664- 675.
XIV. De Castro Assis, S., do Couto Boaventura, W., &Paulino, J. O. S. (2017). Lightning Performance of Transmission Line: Comparison IEEE Flash and Monte Carlo Method. IEEE. Latin America Transactions, 15(2), 269-274.
XV. He, J., Wang, X., Yu, Z., & Zeng, R. (2015). Statistical analysis on lightning performance of transmission lines in several regions of china. IEEE Transactions on Power Delivery, 30(3), 1543-1551.

View | Download

HYBRID OPTIMIZATION OF PIEZOELECTRIC WIND TURBINE AND PHOTOVOLTAIC SYSTEM

Authors:

Ali Asghar Memon,Syed Asif Ali Shah,MuhamamdTalha,Mutiba khan,Ahmad Ali Mustafa Irshaid,PoojaKumari,Mahaveer Mathrani,

DOI:

https://doi.org/10.26782/jmcms.spl.6/2020.01.00002

Abstract:

The demand for electricity is increasing day by day and the natural reserves of non-renewable fuels are rapidly diminishing. To avoid these energy crises, alternate energy source market is unavoidable which includes the wind energy, solar energy as well as the energy from vibrations (Piezoelectricity). There are numerous ways to provide the required pressure/vibration to the piezoelectric material. This paper proposes a hybrid simulation model that uses two energy sources which are wind and solar energy. The output from the piezoelectric system is converted to DC by a DC-DC converter. The solar panel is employed with a Maximum Power Point Tracking (MPPT) technique which ensures the maximum output from solar energy at all times. The output from both the solar panel and the piezoelectric system is stored in a battery

Keywords:

MPPT,DC-DC converter,PEWT,PV Energy,

Refference:

I. Singh, B.R. and Dubey, B.K., 2018, January. Solar-wind hybrid power
generation system. In solar-wind(Vol. 5, No. 01).
II. Reddy, K.P. and Rao, M.V.G., 2015. Modeling and simulation of hybrid
wind solar energy system using MPPT. Indian journal of science and
technology, 8(23).
III. Rajalakshmy, S.(2017), “Hybrid Charger,” National Conference on
“Emerging Research Trends in Electrical, Electronics & Instrumentation,
pp.74-81.
URL: http://www.iosrjournals.org/iosrjeee/Papers/Conf.17017/Volume
3/12.%2074-81.pdf:
IV. Ravisagar, M., Swapnil, M.,Reema, N., Mrutyunjay, P.,(2017), “Hybrid
Power Generation Utilizing Solar Panel and Piezoelectric
Tangle,”International Research Journal of Engineering and Technology,4(3),
2017, pp.1668-1670.
V. Yatin, S., Somi, C., Neha, C., Nagade, A.S.,(2017), “Hybrid power
generation using solar panel and piezo sensor, ”International Research
Journal of Engineering and Technology,4(5),pp.1617-1621.
VI. Dr. B.Omprakash, T. J. Kumar, Dr. R.Ganapathi, (2017), “Hybrid power
generation using solar, wind, andpiezo,” International Journal of Advanced
Engineering Research and Technology, 5(11), pp.750-752.

VII Chowdary (2017). “Design and Development of Miniature Model of Micro-
Grid for Generation of Small Power using Distributed Generation,”
International Journal of Engineering Science and Computing, 7(6),
pp.12947-12951.
VIII. AneelKumar (2017), “Design of multi electricity generator using solar and
piezoelectric transducer,”International Research Journal of Engineering and
Technology,4(7), pp.2114-2119.
IX. Jamal, G.A., Rahman, S.L., Rana, M.M., Nafis, S.A.S., Huda, M.M. and
Rahman, S.N., 2015. An Alternative Approach to Wind Power Generation
Using Piezoelectric Material. American Journal of Renewable and
Sustainable Energy, 1(2), pp.45-50.
X. Kishore, R.A. and Priya, S., 2013, March. Piezoelectric wind turbine.
In Industrial and Commercial Applications of Smart Structures Technologies
2013 (Vol. 8690, p. 869009). International Society for Optics and Photonics.
XI. Abrol, S.A.N.C.H.I.T.A. and Chhabra, D.E.E.P.A.K., 2018. Experimental
investigations of piezoelectric energy harvesting with turbulent
flow. International Journal of Mechanical and Production Engineering
Research and Development, 8(1), pp.703-710.
XII. Benjamin, J., Kanade, M., Jhala, M., Panchal, P. and Solanki, M.V., 2018. A
Review-Power Generation by Piezoelectric Effect Using Wind Energy.
XIII. Li, R., Yu, Y., Zhou, B., Guo, Q., Li, M. and Pei, J., 2018. Harvesting energy
from pavement based on piezoelectric effects: Fabrication and electric
properties of the piezoelectric vibrator. Journal of Renewable and
Sustainable Energy, 10(5), p.054701.
XIV. Wang, Y., Zhu, X., Zhang, T., Bano, S., Pan, H., Qi, L., Zhang, Z. and Yuan,
Y., 2018. A renewable low-frequency acoustic energy harvesting noise
barrier for high-speed railways using a Helmholtz resonator and a PVDF
film. Applied energy, 230, pp.52-61.
XV. Wang, H., Jasim, A. and Chen, X., 2018. Energy harvesting technologies in
roadway and bridge for different applications–A comprehensive
review. Applied energy, 212, pp.1083-1094.
XVI. Tao, J.X., Viet, N.V., Carpinteri, A., and Wang, Q., 2017. Energy harvesting
from wind by a piezoelectric harvester. Engineering Structures, 133, pp.74-
80.

XVII. Zhao, L., Tang, L. and Yang, Y., 2013. Comparison of modeling methods
and parametric study for a piezoelectric wind energy harvester. Smart
Materials and Structures, 22(12), p.125003.
XVIII. Ahmed, R., Kim, Y. and Chun, W., 2019. Development of a Tree-Shaped
Hybrid Nano generator Using Flexible Sheets of Photovoltaic and
Piezoelectric Films. Energies, 12(2), pp.1-10.
XIX. Burton T, Sharpe D, Jenkins N, Bossanyi E. Wind energy handbook. John
Wiley and Sons; 2001.

View | Download

INSTRUCTION SET EXTENSION OF NIOS II FOR FLOATING -POINT HOG DESCRIPTION AND IMPLEMENTATION ON AN FPGA

Authors:

Anil Seker,BernaOrsYalcin,

DOI:

https://doi.org/10.26782/jmcms.spl.6/2020.01.00003

Abstract:

Human detection is one of the hot topic in the field of computer vision. HOG descriptor is a widely accepted local feature extractor with high accuracy and it has heavy computation blocks in processing. Therefore, its application takes a long processing time. To improve execution time of algorithm, one of the methods is hardware acceleration. In this paper, we propose an application-specific HOG descriptor architecture on FPGA with a soft processor called as Nios II. It has the ability of instruction set extension to its base micro-architecture without any modification on the core. We select HOG specific custom instruction sets to extend. To obtain custom instruction set, we used DAG representation which is generated by LLVM compiler. The algorithm is applied on the only-processor architecture and on the proposed architecture with instruction set extension. The total execution time is measured using hardware clock counter to approximate real time consumption. The results of both architecture are compared in terms of clock count. Obviously, proposed architecture which has fully floating-point calculation is accelerated 17.68 times in comparison with pure software implementation of HOG descriptor. The implementation of the architecture is applied for 640x480x8bit test frame on lowcost Cyclone V FPGA platform.

Keywords:

Custom instruction,FPGA,HOG,hardware accelerator,

Refference:

I. A. Shashua, Y. Gdalyahu and G. Hayun, Pedestrian detection for
driving assistance systems: single-frame classification and system
level performance, IEEE Intelligent Vehicles Symposium,
(2004)June 14-17 ;Parma, Italy.
II. Paul, Manoranjan and Haque, Shah and Chakraborty, Subrata,
Human detection in surveillance videos and its applications – A
review, EURASIP Journal on Advances in Signal Processing, 25,
(2013) .
III. Joshi, Rajeev, Pratap Chandra Poudel and Pankaj Bhandari, An
Embedded Autonomous Robotic System for Alive Human Body
Detection and Rescue Operation, International Journal of Scientific
and Research Publications, 4, 5,(2014).
IV. H. Ninomiya, H. Ohki, K. Gyohten and N. Sueda, An evaluation on
robustness and brittleness of HOG features of human detection,
Korea-Japan Joint Workshop on Frontiers of Computer
Vision(FCV), (2011) February 9-11, Ulsan, South Korea.
V. N. Dalal and B. Triggs, Histograms of Oriented Gradients for
Human Detection, IEEE Computer Society Conference on
Computer Vision and Pattern Recognition(CVPR), (2005) June 20-
25, San Diego, CA, USA.
VI. R. Kadota, H. Sugano, M. Hiromoto, H. Ochi, R. Miyamoto and Y.
Nakamura, Hardware Architecture for HOG Feature Extraction,
International Conference on Intelligent Information Hiding and
Multimedia Signal Processing, (2009) September 12-14, Kyoto,
Japan.
VII. S. Bauer, S. Kohler, K. Doll and U. Brunsmann, FPGA-GPU
architecture ¨ for kernel SVM pedestrian detection, IEEE Computer
Society Conference on Computer Vision and Pattern Recognition,
(2010) June 13-18San Francisco, CA, USA.
VIII. M. Komorkiewicz, M. Kluczewski and M. Gorgon, Floating point
HOG implementation for real-time multiple object detection,
International Conference on Field Programmable Logic and
Applications (FPL), (2012) August 29-31, Oslo, Norway.
IX. Kelly, Colm and Siddiqui, Fahad and Bardak, Burak and Woods,
Roger, Histogram of Oriented Gradients front end processing: an
FPGA Based Processor Approach, IEEE Workshop on Signal
Processing Systems (SiPS), (2014) October 20-22, Belfast, UK.

X. J. Cerezuela-Mora, E. Calvo-Gallego and S. Sanchez-Solano,
Hardware/software co-design of video processing applications on a
reconfigurable platform, IEEE International Conference on
Industrial Technology (ICIT), (2015) March 17-19, Seville, Spain.
XI. J. A. M. de Holanda, J. M. P. Cardoso and E. Marques, A pipelined
multi-softcoreapproach for the HOG algorithm, Conference on
Design and Architectures for Signal and Image Processing (DASIP),
(2016) October 12-14, Rennes, France.
XII. J. Wang et al., Simplifying HOG arithmetic for speedy hardware
realization, IEEE Asia Pacific Conference on Circuits and Systems
(APCCAS), (2014) November 17-20,Ishigaki, Japan.
XIII. Altera (2017). Cyclone V GT FPGA Development Board Reference
Manual
XIV. Intel (2018). Avalon R Interface Specifications, September 26
XV. R. Lysecky and F. Vahid, A study of the speedups and
competitiveness of FPGA soft processor cores using dynamic
hardware/software partitioning, Design, Automation and Test in
Europe, (2005) March 7-11 Munich, Germany.
XVI. The XPres Compiler, Retrieved from: http://www.tensilica.com,
Last accessed on: 13th November 2019
XVII. The CORXpert, Retrieved from: http://www.coware.com,Last
accessed on: 13th November 2019
XVIII. The LLVM Compiler Infrastructure, Retrieved From:
http://llvm.org, Last accessed on: 13th November 2019
XIX. The LLVM Compiler Architectures, Retrieved
From:https://llvm.org/docs/CompilerWriterInfo.html, Last accessed
on: 13th November 2019
XX. C. Chung-Shu, Tutorial: Creating an LLVM Backend for the Cpu0
Architecture, http://jonathan2251.github.io/web/index.html, 2018
XXI. Intel (2018).Floating-Point Megafunctions User Guide, November
13

 

View | Download

GPGPU-BASED COLLISION ATTACK ON QURANIC VERSES HASH TABLES

Authors:

Mishal Almazrooie,Azman Samsudin,MohdAdib Omar,Muhammad SyukriSalleh,Shahir Akram Hassan,

DOI:

https://doi.org/10.26782/jmcms.spl.6/2020.01.00004

Abstract:

The Digital Holy Quran is getting more popular among Muslims nowadays. Therefore, proper precaution has to be taken to preserve the authenticity of the Digital Holy Quran. Hence, the following study shows as how the attacks on the authenticity of the Digital Quran can be mounted. In this work, we present an approach of collision attack on Quranic hash tables in which the output is a readable Arabic statement. The approach exploits some of the Unicode special characters in the UTF-8 Arabic set. Moreover, a second preimage attack is adopted as a case study to test the proposed collision attack. Then, a GPGPU parallel approach for the second preimage attack on the Quranic verses is presented. The results of the experiments on a 32-bit hash function show 395-fold speedups on 448- core processor for the parallel approach compared with the sequential one.

Keywords:

Holy Quran,Hash function,Graphic Processing Units (GPUs),CUDA,

Refference:

I. Alsmadi and M. Zarour. Online integrity and authentication checking for
Quran electronic versions. Appl. Comput. Informatics, vol. 13, no. 1, pp. 38–
46, 2017.
II. A. Alshareef and A. El Saddik. A Quranic quote verification algorithm for
verses authentication. in Innovations in Information Technology (IIT), 2012
International Conference on, 2012, pp. 339–343.
III. S. Talib, M. Mahmud, E. S. A. Rahman, A. Suraya, and A. A. Songib. Mobile
Quran app security vulnerabilities. (ICOCI 2015), Istanbul, Turkey, 2015.
IV. M. A. AlAhmad, I. Alshaikhli, and B. Jumaah. Protection of the Digital Holy
Quran hash digest by using cryptography algorithms. in Advanced Computer
Science Applications and Technologies (ACSAT), 2013 International
Conference on, 2013, pp. 244–249.

V. M. K. Khan and Y. M. Alginahi. The holy quran digitization: Challenges and
concerns. Life Sci. J., vol. 10, no. 2, pp. 156–164, 2013.
VI. M. F. Hilmi, M. F. Haron, O. Majid, and Y. Mustapha. Authentication of
electronic version of the Holy Quran: an information security perspective. in
Advances in Information Technology for the Holy Quran and Its Sciences
(32519), 2013 Taibah University International Conference on, 2013, pp. 61–
65.
VII. S. Hakak, A. Kamsin, O. Tayan, M. Y. I. Idris, A. Gani, and S. Zerdoumi.
Preserving Content Integrity of Digital Holy Quran: Survey and Open
Challenges. IEEE Access, 2017.
VIII. M. Bellare and T. Kohno. Hash function balance and its impact on birthday
attacks. in International Conference on the Theory and Applications of
Cryptographic Techniques, 2004, pp. 401–418.
IX. NIST. Specification for SECURE HASH STANDARD. Federal Information
Processing Standards Publication 180-4 (NIST FIPS PUB 180-4), 2012.
X. CRYPTREC: Cryptography Research and Evaluation Committees,
http://www.cryptrec.go.jp/english/, Retrieved 24 August 2017.
XI. NESSIE: New European Schemes for Signatures, Integrity, and Encryption,
https://www.cosic.esat.kuleuven.be/nessie/, Retrieved 24 August 2017.
XII. F. Rob. CUDA Application Design and Development. Morgan Kaufmann
Publishers Inc. ISPN 9780123884268, San Francisco, CA, USA, 1st edition,
2012.
XIII. B. David Kirk and Wen-mei W. Hwu. Programming Massively Parallel
Processors: A Hands-on Approach. Morgan Kaufmann Publishers Inc., San
Francisco, CA, USA, 1st edition, 2010.
XIV. J. Sanders and E. Kandrot. CUDA by Example: An Introduction to General-
Purpose GPU Programming, Portable Documents. Addison-Wesley
Professional, 2017.
XV. M. Harris. How to access global memory efficiently in cuda c/c++ kernels.
http//devblogs. nvidia. com/parallelforall/how-access-global-memoryefficientlycuda-
c-kernels. Retrieved 24 August 2017.
XVI. UTF-8. http://utf8-chartable.de/unicode-utf8-
table.pl?start=1536&utf8=string-literal, Retrieved 24 August 2017.

View | Download

REAL TIME DOOR SECURITY SYSTEM WITH THREE POINT AUTHENTICATION

Authors:

Umm-e-Laila,Faheem Ali,Syed Siraj Uddin,Muhammad Shariq Sadiq,Muhammad Shahroz Siddiqui,Muhammad Ibrar ul Haque,

DOI:

https://doi.org/10.26782/jmcms.spl.6/2020.01.00005

Abstract:

Security plays an important role in everyday life example in offices, institutions, libraries, laboratories and others. Providing security is necessary in order to keep important data confidential so that unauthorized person could not have an access on them. RFID cards were used to provide security. These cards however were not much useful for the user due to chances of getting lost, stolen and forgotten. The purpose of this study is to provide a Real time door security system with three-point authentication by designing a smart door access system using fingerprint module, face reorganization authorization and voice message passing. Use of this system is intended to provide access only to authorized persons. The term 'home.' Security 'is becoming increasingly prevalent as a major issue in today's life challenger. Developing a home-protection device is to make it user-friendly that can reduce human effort, ensure the safety and security of people and their homes. In case, the person categorizes as known guest, the device sounds a tune but don’t open the door automatically rather people inside home can open the entrance door from anywhere of the home. As guest is known people don’t need to walk towards door to open it. And when device detects the person as unknown person, it generates a notification at that an unknown person wish to enter your home.

Keywords:

Biometrics,Face Recognition,Fingerprint Sensor,Voice Message Transfer,Security system authorization,

Refference:

I. H. Hassan, R. Bakar, and A. Thaqib Fawwaz Mokhtar, “Face recognition
based on auto-switching magnetic door lock system using
microcontroller,” (2012)
II. K. P. Bhattarai, B. P. Gautam, and K. Sato, “Authentic Gate Entry
System (AuthGES) by Using LBPH for Smart Home Security,” in 2018
International Conference on Networking and Network Applications
(NaNA), (2018)
III. R. S. Divya and M. Mathew, “Survey on various door lock access control
mechanisms,” in 2017 International Conference on Circuit ,Power and
Computing Technologies (ICCPCT), (2017)
IV. “Super secure door lock system for critical zones – IEEE Conference
Publication.” [Online]. Available:
https://ieeexplore.ieee.org/document/8076773. [Accessed: 15-Jun] (2019)
IV. P. R. Nehete, J. P. Chaudhari, S. R. Pachpande, and K. P. Rane,
“Literature Survey on Door Lock Security Systems,” Int. J. Comput.
Appl., vol. 153, no. 2, pp. 13–18, Nov. (2016)
VI. U. Laila, M. Ahmad Khan, M. Kashif Shaikh, S. Annas bin Mazhar, and
K. Mahboob, “Comparative analysis for a real time face recognition
system using raspberry Pi,” (2017)
VII. Y. Tae Park, P. Sthapit, and J.-Y. Pyun, “Smart digital door lock for the
home automation,” (2009)
VIII. A. Anitha, “Home security system using internet of things,” IOP Conf.
Ser. Mater. Sci. Eng., vol. 263, p. 042026, Nov. (2017)
IX. M. Lal, K. Kumar, R. H. Arain, A. Maitlo, S. A. Ruk, and H. Shaikh,
“Study of Face Recognition Techniques: A Survey,” Int. J. Adv. Comput.
Sci. Appl. IJACSA, vol. 9, no. 6, (2018)

View | Download

DCM BOOST CONVERTER WITH HIGH EFFICIENCY

Authors:

A. Hakeem Memon,Sheeraz A. Shaikh,Zubair A. Memon,Anwar A. Memon,Ali A. Memon,

DOI:

https://doi.org/10.26782/jmcms.spl.6/2020.01.00006

Abstract:

The discontinuous conduction mode (DCM)boost converter is widely used topology because of numerous advantages like no reverse recovery loss in freewheeling diode, no loss during turning on of the switch, small size of output capacitor, high power factor (PF) for universal input voltage range, and easy design of electromagnetic interference (EMI) filter because of constant switching frequency operation. However, its efficiency is low when operated in constant duty-cycle control (CDCC) scheme. For enhancing the efficiency of the DCM boost converter, a variableduty-cycle control (VDCC) method has been introduced. Fitting duty-cycle method is also discussed to make circuit implementation easier. Comparative analysis is given in terms of loss analysis for both types of control schemes and for verifying the validity of proposed technique, the simulation results are carried out.

Keywords:

Boost converter,discontinuous conduction mode (DCM),power factor correction (PFC),variable duty-cycle control (VDCC),constant duty-cycle control (CDCC),electromagnetic interference (EMI),duty-cycle,

Refference:

I. Compatibility, E. (2014). Part 3-2: Limits–Limits for harmonic current
emissions (equipment input current≤ 16 A per phase). International
Standard IEC, 61000-3-2.
II. Gandhi, B., &Ezhilmaran, M. (2013, April).Achieving high input
power factor for DCM boost PFC converters by controlling variable
duty cycle.In 2013 International Conference on Computation of Power,
Energy, Information and Communication (ICCPEIC) (pp. 18-20).IEEE.
III. García, O., Cobos, J. A., Prieto, R., Alou, P., &Uceda, J. (2003). Single
phase power factor correction: A survey. IEEE Transactions on Power
Electronics, 18(3), 749-755.
IV. Granza, M. H., Font, C. H. I., & Gules, R. (2015, August). Single-phase
non-isolated high power factor rectifier based on an interleaved DCM
boost converter in a three-level configuration. In 2015 IEEE 13th
Brazilian Power Electronics Conference and 1st Southern Power
Electronics Conference (COBEP/SPEC) (pp. 1-6). IEEE.
V. Ham, S. H., Choe, H. J., Lee, H. S., & Kang, B. (2017).Improvement of
Power-Conversion Efficiency of AC–DC Boost Converter Using 1: 1
Transformer.IEEE Transactions on Power Electronics, 33(8), 6646-
6655.

VI. Han, J. K., Baek, J. I., Jeong, Y., Yeon, C. O., & Moon, G. W. (2017,
June). A simple THD improving method for CCM boost PFC converter
under mixed conduction mode operation. In 2017 IEEE 3rd
International Future Energy Electronics Conference and ECCE Asia
(IFEEC 2017-ECCE Asia) (pp. 466-470). IEEE.
VI. Langella, R., Testa, A., &Alii, E. (2014). IEEE recommended practice
and requirements for harmonic control in electric power systems.
VIII. Kim, J., Choi, H., & Won, C. Y. (2017). New modulated carrier
controlled PFC boost converter. IEEE Transactions on Power
Electronics, 33(6), 4772-4782.
IX. Lazar, J., & Cuk, S. (1995, October). Open loop control of a unity
power factor, discontinuous conduction mode boost rectifier.In
Proceedings of INTELEC 95. 17th International Telecommunications
Energy Conference (pp. 671-677). IEEE.
X. Lazar, J., & Cuk, S. (1996, March). Feedback loop analysis for AC/DC
rectifiers operating in discontinuous conduction mode. In Proceedings
of Applied Power Electronics Conference.APEC’96 (Vol. 2, pp. 797-
806).IEEE.
XI. Memon, A. H., Yao, K., Chen, Q., Guo, J., & Hu, W. (2017).Variableon-
time control to achieve high input power factor for a CRMintegrated
buck–flyback PFC converter.IEEE Transactions on Power
Electronics, 32(7), 5312-5322.
XII. Memon, A. H., & Yao, K. (2018).UPC strategy and implementation for
buck–buck/boost PF correction converter. IET Power Electronics, 11(5),
884-894.
XIII. Memon, A. H., Baloach, M. H., Sahito, A. A., Soomro, A. M., &
Memon, Z. A. (2018). Achieving High Input PF for CRM Buck-
Buck/Boost PFC Converter. IEEE Access, 6, 79082-79093.
XIV. Memon, A. H., Pathan, A. A., Kumar, M., Sahito, A. A J., & Memon, Z.
A (2019).Integrated buck-flyback converter with simple structure and
unity power factor.Indian Journal of Science and Technology, 12(17),
1-5
XV. Memon, A. H., Memon, Z. A., Shaikh, N. N., Sahito, A.A &Hashmani,
A.A (2019). Boundary conduction mode modified buck converter with
low input current total harmonic distortion. Indian Journal of Science
and Technology, 12(17), 1-5

XVI. Memon, A. H., Memon, Z. A., Shaikh, N. N., Sahito, A.A &Hashmani,
A.A (2019).buck-buck/boost converter with high input power factor and
non-floating output voltage. International Journal of Computer Science
and Network Security, 19(4), 1-5
XVII. Meng, T., Yu, S., Ben, H., Wei, G., & Sun, S. (2014, May). Three-phase
isolated full-bridge boost PFC with flyback passive auxiliary converter.
In 2014 International Power Electronics Conference (IPEC-Hiroshima
2014-ECCE ASIA) (pp. 2318-2322). IEEE.
XVIII. Rodriguez, L. A. G., Jones, V., Oliva, A. R., Escobar-Mejía, A., &Balda,
J. C. (2017). A new SST topology comprising boost three-level AC/DC
converters for applications in electric power distribution systems. IEEE
Journal of Emerging and Selected Topics in Power Electronics, 5(2),
735-746.
XIX. Sahoo, S. K., &Jariwala, H. R. (2012, May).A new power factor
correction technique using PFC boost converter.In 2012 11th
International Conference on Environment and Electrical Engineering
(pp. 819-823).IEEE.
XX. Singh, B., Singh, S., Chandra, A., & Al-Haddad, K. (2011).
Comprehensive study of single-phase AC-DC power factor corrected
converters with high-frequency isolation. IEEE transactions on
Industrial Informatics, 7(4), 540-556.
XXI. Taniguchi, K., &Nakaya, Y. (1997, August). Analysis and improvement
of input current waveforms for discontinuous-mode boost converter
with unity power factor. In Proceedings of Power Conversion
Conference-PCC’97 (Vol. 1, pp. 399-404).IEEE.
XXII. Wang, L., Wu, Q. H., Tang, W. H., Yu, Z. Y., & Ma, W. (2017,
October).CCM-DCM average current control for both continuous and
discontinuous conduction modes boost PFC converters. In 2017 IEEE
Electrical Power and Energy Conference (EPEC) (pp. 1-6). IEEE.
XIII. Wu, W., Wang, H., Liu, Y., Huang, M., &Blaabjerg, F. (2016).A dualbuck–
boost ac/dc converter for dc nanogrid with three terminal outputs.
IEEE Transactions on Industrial Electronics, 64(1), 295-299.
XXIV. Yao, K., Ruan, X., Mao, X., & Ye, Z. (2010).Variable-duty-cycle control
to achieve high input power factor for DCM boost PFC converter. IEEE
Transactions on Industrial Electronics, 58(5), 1856-1865.

View | Download

A NAÏVE BAYES REPUTATION GENERATING MODEL BASED ON SENTIMENT ANALYSIS AND OPINION FUSION

Authors:

Arpita Gupta,Saloni Priyani,Ramadoss Balakrishnan,

DOI:

https://doi.org/10.26782/jmcms.spl.6/2020.01.00007

Abstract:

In recent times, reviewing the product on the seller website is very convenient and helpful for other users. The seller websites have provided a userfriendly platform to express their opinion or review of a product without any biases. These reviews help other users make better decisions, so the process of reputation generation is of great relevance at the current time. Reputation is the score of credibility and reliability, which plays a vital role as having a poor reputation could affect the product market value. So, generating an accurate reputation is critical. We have proposed a Naïve Bayes unigram and bigram-based model which performs opinion mining and sentiment analysis and generates reputation using Weighted Arithmetic Mean value on the movie dataset. The results have shown improvement with respect to the existing models.

Keywords:

Reputation Generation,Naïve Bayes,Sentiment Analysis,Opinion Mining,Weighted Arithmetic Mean,

Refference:

I. Yan, Zheng, Xuyang Jing, and opinions for reputation generation.” 184.
II. II. Benlahbib, Abdessamad, and El Habib Nfaoui. “A hybrid approach for
generating reputation based on opinions fusion and sentiment analysis.
” Journal of Organizational Computing and Electronic Commerce (2019): 1-19.
III. III. Rahimi, Hasnae, and Hanan El Bakkali. “A new reputation Algorithm for
Evaluating Trustworthiness in E-commerce Context.” In 2013 National Security Days (JNS3),
pp. 1-6. IEEE, 2013.
IV. Abdel-Hafez, Ahmad, and Yue Xu. “An accurate rating aggregation
method for generating item reputation.” In 2015 IEEE International
Conference on Data Science and Advanced Analytics (DSAA), pp. 1-8.
IEEE, 2015.
V. Weng, Yu, and Liyong Zhao. “A blogger reputation evaluation model
based on opinion analysis.” In 2010 IEEE Asia-Pacific Services
Computing Conference, pp. 27-34. IEEE, 2010.
VI. Zhang, Xiuzhen, Lishan Cui, and Yan Wang. “Commtrust: Computing
multi-dimensional trust by mining e-commerce feedback
comments.” IEEE transactions on knowledge and data engineering 26,
no. 7 (2013): 1631-1643.
VII. Resnick, Paul, and Richard Zeckhauser. “Trust among strangers in
Internet transactions: Empirical analysis of eBay’s reputation system.”
In The Economics of the Internet and E-commerce, pp. 127-157. Emerald
Group Publishing Limited, 2002.
VIII. Schneider, Jay, Gerd Kortuem, Joe Jager, Steve Fickas, and Zary Segall.
“Disseminating trust information in wearable communities.” Personal
Technologies 4, no. 4 (2000): 245-248.
IX. Poria, Soujanya, Erik Cambria, and Alexander Gelbukh. “Aspect
extraction for opinion mining with a deep convolutional neural
network.” Knowledge-Based Systems 108 (2016): 42-49.
X. Liu, Bing. “Sentiment analysis and opinion mining.” Synthesis lectures on
human language technologies 5, no. 1 (2012): 1-167.
XI. Boström, Henrik, Sten F. Andler, Marcus Brohede, Ronnie Johansson,
Alexander Karlsson, Joeri Van Laere, Lars Niklasson, Marie Nilsson,
Anne Persson, and Tom Ziemke. “On the definition of information fusion
as a field of research.” (2007).
XII. Dave, Kushal, Steve Lawrence, and David M. Pennock. “Mining the
peanut gallery: Opinion extraction and semantic classification of product
reviews.” In Proceedings of the 12th international conference on World
Wide Web, pp. 519-528. ACM, 2003.
XIII. Hu, Minqing, and Bing Liu. “Mining and summarizing customer
reviews.” In Proceedings of the tenth ACM SIGKDD international
conference on Knowledge discovery and data mining, pp. 168-177. ACM,
2004.
XIV. Tang, Huifeng, Songbo Tan, and Xueqi Cheng. “A survey on sentiment
detection of reviews.” Expert Systems with Applications 36, no. 7 (2009):
10760-10773.
XV. Cui, Hang, Vibhu Mittal, and Mayur Datar. “Comparative experiments on
sentiment classification for online product reviews.” In AAAI, vol. 6, no.
1265-1270, p. 30. 2006.
XVI. Turney, Peter D. “Thumbs up or thumbs down?: semantic orientation
applied to unsupervised classification of reviews.” In Proceedings of the
40th annual meeting on association for computational linguistics, pp.
417-424. Association for Computational Linguistics, 2002.
XVII. Pang, Bo, Lillian Lee, and Shivakumar Vaithyanathan. “Thumbs up?:
sentiment classification using machine learning techniques.”
In Proceedings of the ACL-02 conference on Empirical methods in
natural language processing-Volume 10, pp. 79-86. Association for
Computational Linguistics, 2002.
XVIII Lu, Yue, ChengXiang Zhai, and Neel Sundaresan. “Rated aspect
summarization of short comments.” In Proceedings of the 18th
international conference on World wide web, pp. 131-140. ACM, 2009.
XIX Wang, Hongning, Yue Lu, and Chengxiang Zhai. “Latent aspect rating
analysis on review text data: a rating regression approach.”
In Proceedings of the 16th ACM SIGKDD international conference on
Knowledge discovery and data mining, pp. 783-792. ACM, 2010.
XX. Choi, Yejin, Claire Cardie, Ellen Riloff, and Siddharth Patwardhan.
“Identifying sources of opinions with conditional random fields and
extraction patterns.” In Proceedings of the conference on Human
Language Technology and Empirical Methods in Natural Language
Processing, pp. 355-362. Association for Computational Linguistics,
2005.
XXI. Choi, Yejin, Eric Breck, and Claire Cardie. “Joint extraction of entities
and relations for opinion recognition.” In Proceedings of the 2006
Conference on Empirical Methods in Natural Language Processing, pp.
431-439. Association for Computational Linguistics, 2006.
XXII. Mao, Yi, and Guy Lebanon. “Isotonic conditional random fields and local
sentiment flow.” In Advances in neural information processing systems,
pp. 961-968. 2007.
XXIII. Wei, Wei, and Jon Atle Gulla. “Sentiment learning on product reviews via
sentiment ontology tree.” In Proceedings of the 48th Annual Meeting of the
Association for Computational Linguistics, pp. 404-413. Association for
Computational Linguistics, 2010.

View | Download

PAPER CURRENCY BACTERIA REMOVAL AND PROCESSING MACHINE

Authors:

Atif Saeed,Rusel Bhaleshah,Behroz Noorani,Marium Feeroze Alvi,

DOI:

https://doi.org/10.26782/jmcms.spl.6/2020.01.00008

Abstract:

This document concerned with the recycling or refreshing of the paper currency the circulation of the paper currency make it to loses its stiffness and due to the contaminated environment and humidity different kind of bacteria will grow on the surface of the currency which may cause different kind of diseases such as skin allergies, rashes , tuberculosis etc. As we know that Pakistan is among the underdeveloped countries with low GDP and every year printing of new currency notes always increase the burden on the economy of the country which s already suffering from economic crisis. PCBRPM is one of the solution to increase the stiffness of the paper currency by using hot press as well as for the removal of germs and stains it will clean it with water and antibacterial agent which will remove dirt stain and bacteria from the currency to complete the refreshing affect with the economical factor which will decrease the cost and expenditure to print new currency notes

Keywords:

Bacteria,Currency,Recycling,Refreshing,Economy,Hot Press,Cleaning agent,Stains,Contaminated environment,Commercial,Market Analysis,

Refference:

I. Singla, R., B.A. Haseena. 2013. “Currency Cleaning related to dirt and stain
in contaminated environment machines.” International Journal of Soft
Computing and Engineering (IJSCE), Volume 3, Issue 3, July 2013
II. M.I. Arzak, U. Sunarya, S. Hadiyoso. 2016. “Design and Implementation of
Roller mechanism embedded with the electrical system and Microcontroller”
International Journal of Electrical and Computer Engineering (IJECE) Vol. 6,
No. 6, December 2016
III. Sung-Ja Choi, Byeong-Gwon Kang. 2014. “Prototype Designing and its
Implementation to an Automatic Control System related to portability.”
Wireless Pers Commun, Published online: June 12, 2014
IV. Chin-Teng Lin, Li-Wei Ko, Meng-Hsiu Chang, Jeng-Ren Duann, Jing-Ying
Chen, Tung-Ping Su, Tzyy-Ping Jung. 2009. “Review of Aries system its
advantages and disadvantages.” Published online: July 25, 2009
V. Kazi Sadman Kabir, Chowdhury M. Abid Rahman, Araf Farayez, Mahbuba
Ferdous. 2017. “Paper recycling society and its impact to communicate.”
American Institute of Physics.
VI. Rytis Maskeliunas, Robertas Damasevicius, Ignas Martisius, Mindaugas
Vasiljevas. 2015. “Diseases caused by the circulation of paper currency”
Published: March 22, 2016
VII. Keerthana. B., Aravind. B., Karmel.A. 2010. “Germs on paper currency and
its harmful impact to society.” VIT University, Chennai, India.
VIII. Chih-Ming Chen, Jung-Ying Wang, Chih-Ming Yu. 2017. “Assessing the
mechanical system based on roller and material strength” British Journal of
Educational Technology, Vol 48, No. 2, 2017
IX. Rebsamen, Brice et.al. 2008. Interacting with autonomy “Controlling of a
roller mechanism.” IEEE Intelligent Systems. IEEE Computer Society.
X. Khare, V., Santhosh, J., Anand, S., Bhatia, M. 2011. “use of chemicals in bio
sciences and its impact specially Ethanol as an antiseptic.” International
Journal of Soft Computing and Engineering (IJSCE), Volume 1, Issue 5,
November 2011

View | Download

THE ALGORITHM OF THE METHOD OF CALCULATING THE QUALITY OF SERVICE ASYNCHRONOUS NETWORK

Authors:

Sembiyev Ordabay,Kemelbekova Zhanar,

DOI:

https://doi.org/10.26782/jmcms.spl.6/2020.01.00009

Abstract:

In this paper was considered a model for computing the statistical parameters of the quality of service of an asynchronous network. In many respects, the achievable level of the quality of the services provided is determined at the design stage of the network, when decisions are made regarding the subscriber capacity of stations, the capacity of the bundles of trunk channels, the composition and volume of telecommunications services provided. The current economic and political conditions created the creation of territorially distributed enterprises and structures, which necessitated the construction of corporate communication networks that provide high-quality and reliable communications to large departments, corporations and industries, for example, the central apparatus with regional enterprises or the connection of enterprises among themselves. The process of information exchange is actively stimulated by the expansion of the commercial activities of large companies. Thus, for today the problem of creation of corporate communication networks, having their principal differences from public networks is at the forefront.

Keywords:

Broadband digital network with integration of services,multiservice traffic,asynchronous data transmission network,switching nodes,switches,asynchronous transfer mode,

Refference:

I . Ananev A.N. Proektirovanie multiservisnyx korporativnyx setej
regionalnyx operatorov svyazi. M.: Radio I svyaz, 2002. 92p.
II . Baklanov I.G. Texnologii izmerenij pervichnoj seti. Part 2. Sistemy
sinxronizacii, b-isdn,atm. M.: Eko-trendz.2000. 150p.
III. Kox R., Yanovskij G. Evolyuciya i kovergenciya v elektrosvyazi. M.:
Radio i svyaz. 2001. 279p.
IV. Shvarcman V.O., Etruxin N.N., Karpinskij M.A., Osipov V.G., Safonov
I.K. Sinxronnye seti peredachi dannyx. –M.:Radio i svyaz, 1988. 256p.
V. Kulgin Maksim. Texnologii korporativnyx setej. SPb:piter,2000. 704p.
VI . Olifer V., Olifer N. Novye texnologii i oborudovanie ip-setej. M.: 2000.
512p.
VII . Gordienko V.N. Opticheskie telekommunikacionnye sistemy: Uchebnik
dlya vuzov. – M.: GLT, 2011. – 368 p.
VIII . Kruk B.I. Telekommunikacionnye sistemy i seti. Tom 2. – M.: GLT,
2005. – 647 p.
IX. Markov N.G. Intellektual’nye navigacionno-telekommu-nikacionnye
sistemy upravleniya podvizhnymi ob”ektami s primeneniem tekhnologii
oblachnyh vychislenij. – M.: RiS, 2014. – 158 p.
X . Teplyakov I.M. Telekommunikacionnye sistemy: sbornik zadach. – M.:
Radio i svyaz’, 2011. – 240 p.
XI. Sembiyev О.Z., Kemelbekova Zh.S./ Calculate load distribution on the
nodes of the asynchronous network // International journal of applied
and fundamental research, 2019. – № 4 – С. 49-53.

View | Download

ANALYSIS THE EFFICIENCY OF SOLAR WATER DESALINATION SYSTEM: AN EXPERIMENTAL STUDY

Authors:

Atif Saeed,Mukarram Hussain Shah,ShayanShahid,

DOI:

https://doi.org/10.26782/jmcms.spl.6/2020.01.00010

Abstract:

Concentrated Solar Power can be the solution of today. Solar power being available in plenty can be harnessed using many of the concentrated solar power technologies. Climate changes are observed throughout the world and according to research reports, fresh water resources are drying up at a very high rate. In order to tackle the need of fresh water, Concentrated Solar desalination is prosed. Parabolic trough collector technology is to be employed with simple distillation phenomenon. Construction, calculations, implementation and results would be discussed in this report.

Keywords:

Desalination,Solar Energy Harvesting,Efficient system,Mechanical Experimentation,

Refference:

I. P. Breeze, Power Generation Technologies. 2005.
II. J. E. Nielsen and P. A. Sørensen, Renewable Heating and Cooling. 2016.
III. Muhammad Atif Saeed ; Imran Amin ; Farhan Mumtaz, “Energy
management using wireless technologies: A comprehensive study,” in 9th
International Renewable Energy Congress (IREC), 2018.
IV. A. Saeed, M. Shan, S. Bakhtawar, and H. Tariq, “Merry-go-round as a
Self-Energy Sustainable Ride,” in 2018 9th International Renewable
Energy Congress (IREC), 2018, pp. 1–4.
V. W. Weiss and F. Mauthner, “Solar Heat Worldwide: Markets and
Contribution to the Energy Supply 2010,” Iea, pp. 1–64, 2012.
VI. National Renewable Energy Laboratory, “Renewable Electricity Futures
Study,” 2012.
VII. M. A. Sheikh, “Energy and renewable energy scenario of Pakistan,”
Renewable and Sustainable Energy Reviews. 2010.
VIII. M. Elimelech and W. A. Phillip, “The future of seawater desalination:
Energy, technology, and the environment,” Science. 2011.
IX. A. Ifelebuegu, S. M. Charlesworth, and C. A. Booth, “Desalination,” in
Water Resources in the Built Environment: Management Issues and
Solutions, 2014.
X. B. Dawoud, E. H. Amer, and D. M. Gross, “Experimental investigation of
an adsorptive thermal energy storage,” Int. J. Energy Res., 2007.
XI. A. D. Khawaji, I. K. Kutubkhanah, and J. M. Wie, “Advances in seawater
desalination technologies,” Desalination, 2008.
XII. S. Lattemann and T. Höpner, “Environmental impact and impact
assessment of seawater desalination,” Desalination, 2008.
XIII. L. F. Greenlee, D. F. Lawler, B. D. Freeman, B. Marrot, and P. Moulin,
“Reverse osmosis desalination: Water sources, technology, and today’s
challenges,” Water Research. 2009.
XIV. C. Li, Y. Goswami, and E. Stefanakos, “Solar assisted sea water
desalination: A review,” Renewable and Sustainable Energy Reviews.
2013.
XV. D. Cohen-Tanugi and J. C. Grossman, “Water desalination across
nanoporous graphene,” Nano Lett., 2012.

View | Download