0824 4233176


PROJECT4U

List Of ME/MTech Projects
Web Template

    DIGITAL/VLSI

  1. Microcontroller managed module for automatic ventilation of vehicle interior
  2. X

    Microcontroller managed module for automatic ventilation of vehicle interior

    In order to mitigate overheated interior of a vehicle parked in the hot summer sun and thereby to make the entering into the vehicle more comfortable, microcontroller managed module for automatic ventilation of vehicle interior is made. The module is implemented using a microcontroller as a central logical unit and a series of sensors which provide sufficient data to ensure functional, but also efficient, reliable and safe ventilation. The ventilation process is performed by opening vehicle windows slightly, which enables air to circulate. Microcontroller controls the position of the windows autonomously and independently of the driver's presence, following predefined algorithm that uses sensors data obtained from the vehicle's surroundings. Besides temperature, the most important factors to ensure quality implementation of ventilation are detected movements around the vehicle, the presence of precipitation and other. This paper shows the components, their purpose and capabilities, advantages and disadvantages, as well as potential implementations and upgrades. The test results give insight into utilization options of this module and its usefulness.

    more info

  3. Microcontroller-based multiple-platform PWM signal generation procedures for industrial use
  4. X

    Microcontroller-based multiple-platform PWM signal generation procedures for industrial use

    This contribution describes three procedures and the related software operations which are used to obtain the pulse-width modulation (PWM) signal for industrial use. The hardware platforms used to generate the signals are embedded systems, manufactured in recent years. Three types of microcontrollers based on their register architecture were used: 8-bit ATMEGA 328P, 16bit SAB80C167 and 32-bit PIC32MX320F128H. PWM is a preferred way for control in modern semiconductor devices. The very short rising and falling time ensure the minimum of switching transition time respectively of the switching losses. In this context, the paper will analyze comparatively a new structure, related on a classical reference structure, both the hardware and the software. At the end of the paper some conclusions might be drawn on the code length, system latency and the technical limitations of their usual or rated performance.

    more info

  5. Freighter Fuel Level detection and Overload Alarming System with Safety Notification via GSM
  6. X

    Freighter Fuel Level detection and Overload Alarming System with Safety Notification via GSM m

    A PIC microcontroller based digital electronic system has been designed to monitor the fuel level and total amount of load on the freighter and generate scan report for the captain of the freighter. The system is designed for three different freighter load levels; no load, optimal load and over load. At initial level it remains in no load status, when load increases and still remain in optimal level then the system notify crews to initiate voyage. If the load increases to over load level then the system gives alarm and sends alert message to the main control tower for necessary initiative. The communication between the vessel and main control tower is done by GSM module to ensure long distance reliable communication. For amenity, freighter fuel level is monitored in both analogue and digital scale. The system is implemented by PIC midrange microcontroller based hardware and low cost GSM module which makes it more economic, reliable and efficient

    more info

  7. Design and Implementation of Heart Rate Measurement Device Using Wireless System
  8. X

    Design and Implementation of Heart Rate Measurement Device Using Wireless System

    Nowadays, the biomedical instrumentation holds a prominent position within medicine. Following this trend, the BPM (beat per minute) has become an important tool to elucidate about the functioning of the organism and wakeup for anomalies by monitoring the heartbeat in the human body. These devices are mostly used in hospitals and clinics but are gradually finding their way into domestic use. This paper demonstrates on an approach to design a cheap, accurate and reliable device which can easily measure the heart rate of a human body.

    more info

  9. GSM Wireless Technology Implementation in Haze Monitoring
  10. X

    GSM Wireless Technology Implementation in Haze Monitoring

    Malaysia has periodic problems with air quality reaching hazardous levels because of smoke haze. The heavy haze, described as a pall of smoke caused widespread health problems especially among the elderlies, the young and kids. Haze is an atmospheric phenomenon where dust, smoke and other dry particles obscure the clarity of the sky. This haze pollution has serious implications to health as well as for the whole environment. This paper described a mobile monitoring system developed to detect the level of haze particulates. Data collection was achieved with the use of gas sensor, and mobile alert implementation was developed with Global System Mobile (GSM) connection and Short Messaging System (SMS).

    more info

  11. A Dynamically Reconfigurable Multi-ASIP Architecture for Multi standard and Multimode Turbo Decoding
  12. X

    A Dynamically Reconfigurable Multi-ASIP Architecture for Multi standard and Multimode Turbo Decoding

    The multiplication of wireless communication standards is introducing the need of flexible and reconfigurable multi-standard baseband receivers. In this context, multiprocessor turbo decoders have been recently developed in order to support the increasing flexibility and throughput requirements of emerging applications. However, these solutions do not sufficiently address reconfiguration performance issues, which can be a limiting factor in the future. This brief presents the design of a reconfigurable multiprocessor architecture for turbo decoding achieving very fast reconfiguration without compromising the decoding performances.

    more info

  13. Median Filter Architecture by Accumulative Parallel Counters
  14. X

    Median Filter Architecture by Accumulative Parallel Counters

    The time to process each of W/B processing blocks of a median calculation method on a set of N W-bit integers is improved here by a factor of three compared to the literature. Parallelism uncovered in blocks containing B-bit slices are exploited by independent accumulative parallel counters so that the median is calculated faster than any known previous method for any N, W values. The improvements to the method are discussed in the context of calculating the median for a moving set of N integers for which a pipelined architecture is developed. An extra benefit of smaller area for the architecture is also reported.

    more info

  15. High-Performance Deadlock-Free ID Assignment for Advanced Interconnect Protocols - 2015
  16. X

    High-Performance Deadlock-Free ID Assignment for Advanced Interconnect Protocols - 2015

    In a modern system-on-chip design, hundreds of cores and intellectual properties can be integrated into a single chip. To be suitable for high-performance interconnects, designers increasingly adopt advanced interconnect protocols that support novel mechanisms of parallel accessing, including outstanding transactions and out-of-order completion of transactions. To implement those novel mechanisms, a master tags an ID to each transaction to decide in-order or out-of-order properties. However, these advanced protocols may lead to transaction deadlocks that do not occur in traditional protocols. To prevent the deadlock problem, current solutions stall suspicious transactions and in certain cases, many such stalls can incur serious performance penalty. In this brief, we propose a novel ID assignment mechanism that guarantees the issued transactions to be deadlock-free and results in significant reduction in the number of transaction stalls issued by masters. Our experimental results show encouraging performance improvements compared with previous works with little hardware and power overheads..

    more info

  17. A Low-Power Robust Easily Cascaded PentaMTJ-Based Combinational and Sequential Circuits
  18. X

    A Low-Power Robust Easily Cascaded PentaMTJ-Based Combinational and Sequential Circuits

    Advanced computing systems embed spintronic devices to improve the leakage performance of conventional CMOS systems. High speed, low power, and infinite endurance are important properties of magnetic tunnel junction (MTJ), a spintronic device, which assures its use in memories and logic circuits. This paper presents a PentaMTJ-based logic gate, which provides easy cascading, self-referencing, less voltage headroom problem in precharge sense amplifier and low area overhead contrary to existing MTJ-based gates. PentaMTJ is used here because it provides guaranteed disturbance free reading and increased tolerance to process variations along with compatibility with CMOS process. The logic gate is validated by simulation at the 45-nm technology node using a VerilogA model of the PentaMTJ.

    more info

  19. Reducing Switching Latency and Energy in STT-MRAM Caches With Field-Assisted Writing
  20. X

    Reducing Switching Latency and Energy in STT-MRAM Caches With Field-Assisted Writing

    A field-assisted spin-torque transfer magnetoresistive RAM (STT-MRAM) cache is presented for the use in high-performance energy-efficient microprocessors. Adding field assistance reduces the switching latency by a factor of 4. An array model is developed to evaluate the switching energy for different field currents and array sizes. Several STT-MRAM-based cells demonstrate a 55% energy reduction as compared with an SRAM cache subsystem. As compared with STT-MRAM caches with subbank buffering and differential writes, a field-assisted STT-MRAM cache improves the system performance by 28%, with a 6.7% increase in energy.

    more info

  21. All Optical Reversible Multiplexer Design using Mach-Zehnder interferometer
  22. X

    All Optical Reversible Multiplexer Design using Mach-Zehnder interferometer

    With the advancements in semiconductor technology, there has been an increased emphasis in low-power design techniques over the last few decades. Reversible computing has been proposed by several researchers as a possible alternative to address the energy dissipation problem. Several implementation alternatives for reversible logic circuits have also been explored in recent years, like adiabatic logic, nuclear magnetic resonance, optical computing, etc. Recently researchers have proposed implementations of various reversible logic circuits in the all-optical computing domain. Most of these works are based on semiconductor optical amplifier (SOA) based Mach-Zehnder interferometer (MZI), which provides desirable features like low power, fast switching and ease of fabrication. In this paper we present an all-optical implementation of a digital multiplexer using MZI switches. Both non-reversible and reversible versions of multiplexer design are proposed, along with analytical evaluation of the design complexities both in terms of delay and resource requirements. The final optical net lists obtained have been compared against traditional reversible synthesis approaches, by using an available synthesis tool and then mapping the reversible gates to MZI switch based implementations. Some techniques for optimizing the final optical net lists have also been proposed. Synthesis results for some reversible benchmark circuits and the standard functions of three variables are also shown.

    more info

  23. Area-Delay Efficient Binary Adders in QCA
  24. X

    Area-Delay Efficient Binary Adders in QCA

    As transistors decrease in size more and more of them can be accommodated in a single die, thus increasing chip computational capabilities. However, transistors cannot get much smaller than their current size. The quantum-dot cellular automata (QCA) approach represents one of the possible solutions in overcoming this physical limit, even though the design of logic modules in QCA is not always straightforward. In this brief, we propose a new adder that outperforms all state-of-the-art competitors and achieves the best area-delay tradeoff. The above advantages are obtained by using an overall area similar to the cheaper designs known in literature. The 64-bit version of the novel adder spans over 18.72 μ2 of active area and shows a delay of only nine clock cycles, that is just 36 clock phases.

    more info

  25. Restoration-Based Procedures With Set Covering Heuristics for Static Test Compaction of Functional Test Sequences
  26. X

    Restoration-Based Procedures With Set Covering Heuristics for Static Test Compaction of Functional Test Sequences

    The goal of static test compaction is to reduce the number or tests, or the lengths of test sequences, without reducing the fault coverage. Static test compaction that reduces the number of tests was formulated as a set covering problem in order to benefit from the heuristics that exist for solving this problem. This paper applies set covering concepts and heuristics to static test compaction that reduces the length of a functional test sequence. Although set covering is not applicable directly to a single test sequence, it provides a theoretical framework and justification for a particular set of heuristics. The procedure uses a parameter denoted by n to determine the computational effort for computing the sets that are used for making compaction decisions. With n=1, the procedure is equivalent to a static test compaction procedure that does not use set covering. Experimental results demonstrate that shorter test sequences are obtained for n>1 than for n=1. A variation of the static test compaction procedure that produces a monotonic decrease in test sequence length with n is also described.

    more info

  27. Design and Estimation of delay, power and area for Parallel prefix adders
  28. X

    Design and Estimation of delay, power and area for Parallel prefix adders

    In Very Large Scale Integration (VLSI) designs, Parallel prefix adders (PPA) have the better delay performance. This paper investigates four types of PPA's (Kogge Stone Adder (KSA), Spanning Tree Adder (STA), Brent Kung Adder (BKA) and Sparse Kogge Stone Adder (SKA)). Additionally Ripple Carry Adder (RCA), Carry Lookahead Adder (CLA) and Carry Skip Adder (CSA) are also investigated. These adders are implemented in verilog Hardware Description Language (HDL) using Xilinx Integrated Software Environment (ISE) 13.2 Design Suite. These designs are implemented in Xilinx Virtex 5 Field Programmable Gate Arrays (FPGA) and delays are measured using Agilent 1692A logic analyzer and all these adder's delay, power and area are investigated and compared finally.

    more info

  29. Design of Efficient Binary Comparators in Quantum-Dot Cellular Automata
  30. X

    Design of Efficient Binary Comparators in Quantum-Dot Cellular Automata

    Quantum-dot cellular automata (QCA) are an attractive emerging technology suitable for the development of ultra-dense low-power high-performance digital circuits. Efficient solutions have recently been proposed for several arithmetic circuits, such as adders, multipliers, and comparators. Nevertheless, since the design of digital circuits in QCA still poses several challenges, novel implementation strategies and methodologies are highly desirable. This paper proposes a new design approach oriented to the implementation of binary comparators in QCA. New formulations of basic logic equations required to perform the comparison function are proposed. The new strategy has been exploited in the design of two different comparator architectures and for several operands word lengths. With respect to existing counterparts, the comparators proposed here exhibit significantly higher speed and reduced overall area.

    more info

    Computer Science

  31. Cross-Layer Approach for Minimizing Routing Disruption in IP Networks
  32. X

    Cross-Layer Approach for Minimizing Routing Disruption in IP Networks

    Backup paths are widely used in IP networks to protect IP links from failures. However, existing solutions such as the commonly used independent model and Shared Risk Link Group (SRLG) model do not accurately reflect the correlation between IP link failures, and thus may not choose reliable backup paths. We propose a cross-layer approach for minimizing routing disruption caused by IP link failures. We develop a probabilistically correlated failure (PCF) model to quantify the impact of IP link failure on the reliability of backup paths. With the PCF model, we propose an algorithm to choose multiple reliable backup paths to protect each IP link. When an IP link fails, its traffic is split onto multiple backup paths to ensure that the rerouted traffic load on each IP link does not exceed the usable bandwidth. We evaluate our approach using real ISP networks with both optical and IP layer topologies. Experimental results show that two backup paths are adequate for protecting a logical link. Compared with existing works, the backup paths selected by our approach are at least 18 percent more reliable and the routing disruption is reduced by at least 22 percent. Unlike prior works, the proposed approach prevents the rerouted traffic from interfering with normal traffic.

    more info

  33. Joint Interference Coordination and Load Balancing for OFDMA Multihop Cellular Networks
  34. X

    Joint Interference Coordination and Load Balancing for OFDMA Multihop Cellular Networks

    Multihop cellular networks (MCNs) have drawn tremendous attention due to its high throughput and extensive coverage. However, there are still three issues not well addressed. With the existence of relay stations (RSs), how to efficiently allocate frequency resource to relay links becomes a challenging design issue. For mobile stations (MSs) near the cell edge, cochannel interference (CCI) become severe, which significantly affects the network performance. Furthermore, the unbalanced user distribution will result in traffic congestion and inability to guarantee quality of service (QoS). To address these problems, we propose a quantitative study on adaptive resource allocation schemes by jointly considering interference coordination (IC) and load balancing (LB) in MCNs. In this paper, we focus on the downlink of OFDMA-based MCNs with time division duplex (TDD) mode, and analyze the characteristics of resource allocation according to IEEE 802.16j/m specification. We also design a novel frequency reuse scheme to mitigate interference and maintain high spectral efficiency, and provide practical LB-based handover mechanisms which can evenly distribute the traffic and guarantee users' QoS. Our study shows that our scheme not only meets the requirement on coverage, but also improves the throughput while accommodating more users in MCNs.

    more info

  35. Network Resource Allocation for Users With Multiple Connections Fairness and Stability
  36. X

    Network Resource Allocation for Users With Multiple Connections Fairness and Stability

    This paper studies network resource allocation between users that manage multiple connections, possibly through different routes, where each connection is subject to congestion control. We formulate a user-centric Network Utility Maximization problem that takes into account the aggregate rate a user obtains from all connections, and we propose decentralized means to achieve this fairness objective. In a first proposal, cooperative users control their number of active connections based on congestion prices from the transport layer to emulate suitable primal-dual dynamics in the aggregate rate; we show this control achieves asymptotic convergence to the optimal user-centric allocation. For the case of noncooperative users, we show that network stability and user-centric fairness can be enforced by a utility-based admission control implemented at the network edge. We also study stability and fairness issues when routing of incoming connections is enabled at the edge router. We obtain in this case a characterization of the stability region of loads that can be served with routing alone and a generalization of our admission control policy to ensure user-centric fairness when the stability condition is not met. The proposed algorithms are implemented at the packet level in ns2 and demonstrated through simulation.

    more info

  37. On the Delay Advantage of Coding in Packet Erasure Networks
  38. X

    On the Delay Advantage of Coding in Packet Erasure Networks

    We consider the delay of network coding compared to routing with retransmissions in packet erasure networks with probabilistic erasures. We investigate the sublinear term in the block delay required for unicasting n packets and show that there is an unbounded gap between network coding and routing. In particular, we show that delay benefit of network coding scales at least as √n. Our analysis of the delay function for the routing strategy involves a major technical challenge of computing the expectation of the maximum of two negative binomial random variables. Previous characterizations of this expectation are approximate; we derive an exact characterization and analyze its scaling behavior, which may be of independent interest. We also use a martingale bounded differences argument to show that the actual coding delay is concentrated around its expectation.

    more info

  39. A Cocktail Approach for Travel Package Recommendation
  40. X

    A Cocktail Approach for Travel Package Recommendation

    Recent years have witnessed an increased interest in recommender systems. Despite significant progress in this field, there still remain numerous avenues to explore. Indeed, this paper provides a study of exploiting online travel information for personalized travel package recommendation. A critical challenge along this line is to address the unique characteristics of travel data, which distinguish travel packages from traditional items for recommendation. To that end, in this paper, we first analyze the characteristics of the existing travel packages and develop a tourist-area-season topic (TAST) model. This TAST model can represent travel packages and tourists by different topic distributions, where the topic extraction is conditioned on both the tourists and the intrinsic features (i.e., locations, travel seasons) of the landscapes. Then, based on this topic model representation, we propose a cocktail approach to generate the lists for personalized travel package recommendation.

    more info

  41. Behavioral Malware Detection in Delay Tolerant Network
  42. X

    Behavioral Malware Detection in Delay Tolerant Network

    The delay-tolerant-network (DTN) model is becoming a viable communication alternative to the traditional infrastructural model for modern mobile consumer electronics equipped with short-range communication technologies such as Bluetooth, NFC, and Wi-Fi Direct. Proximity malware is a class of malware that exploits the opportunistic contacts and distributed nature of DTNs for propagation. Behavioral characterization of malware is an effective alternative to pattern matching in detecting malware, especially when dealing with polymorphic or obfuscated malware. In this paper, we first propose a general behavioral characterization of proximity malware which based on naive Bayesian model, which has been successfully applied in non-DTN settings such as filtering email spams and detecting botnets. We identify two unique challenges for extending Bayesian malware detection to DTNs ("insufficient evidence versus evidence collection risk" and "filtering false evidence sequentially and distributedly"), and propose a simple yet effective method, look ahead, to address the challenges.

    more info

  43. Distributed Mobile Sink Routing for Wireless Sensor Networks A Survey
  44. X

    Distributed Mobile Sink Routing for Wireless Sensor Networks A Survey

    The concentration of data traffic towards the sink in a wireless sensor network causes the nearby nodes to deplete their batteries quicker than other nodes, which leaves the sink stranded and disrupts the sensor data reporting. To mitigate this problem the usage of mobile sinks is proposed. Mobile sinks implicitly provide load-balancing and help achieving uniform energy-consumption across the network. However, the mechanisms to support the sink mobility (e.g., advertising the location of the mobile sink to the network) introduce an overhead in terms of energy consumption and packet delays. With these properties mobile sink routing constitutes an interesting research field with unique requirements. In this paper, we present a survey of the existing distributed mobile sink routing protocols.

    more info

  45. Fairness Analysis of Routing in Opportunistic Mobile Networks
  46. X

    Fairness Analysis of Routing in Opportunistic Mobile Networks

    Multicopy utility-based forwarding algorithms are popular in opportunistic mobile networks. They aim to gain high system throughput while keeping the cost low. However, most of them ignore the fairness issue on the successful delivery rate among users. In this paper, we analyze the fairness evaluation of the success rate distribution, and we propose a new fair packet-forwarding strategy based on packet priority. We formulate the opportunistic packet-forwarding process as a discrete-time Markov chain and deduce a stationary probability distribution vector. Instead of taking the hill-climbing heuristic on utility comparison, we introduce a lower utility tolerance mechanism for the decision-making process of each node, and we theoretically demonstrate that the proposed mechanism may be used to control the success rate of packet delivery by changing a simple parameter. In addition, we adopt a message-duplication restricting mechanism to adjust the number of replications based on packet priority.

    more info

  47. Multicast Capacity in MANET with Infrastructure Support
  48. X

    Multicast Capacity in MANET with Infrastructure Support

    We study the multicast capacity under a network model featuring both node's mobility and infrastructure support. Combinations between mobility and infrastructure, as well as multicast transmission and infrastructure, have already showed effective ways to increase multicast capacity. In this work, we jointly consider the impact of the above three factors on network capacity. We assume that m static base stations and n mobile users are placed in an ad hoc network. A general mobility model is adopted, such that each user moves within a bounded distance from its home-point with an arbitrary pattern. In addition, each mobile node serves as a source of multicast transmission, which results in a total number of n multicast transmissions.

    more info

  49. Locating Equivalent Servants over P2P Networks
  50. X

    Locating Equivalent Servants over P2P Networks

    While peer-to-peer networks are mainly used to locate distinctive resources across the Internet, new interesting deployment eventualities are rising. Particularly, some applications (e.g., VoIP) are proposing the creation of overlays for the localization of services based on equivalent servants (e.g., voice relays). This paper explores the doable overlay architectures which will be adopted to provide such services, showing how an unstructured resolution based on a scale-free overlay topology is a good choice to deploy in this context. Consequently, we tend to propose EQUATOR (EQUivalent servAnt locaTOR), an unstructured overlay implementing the higher than mentioned operating principles, based on an overlay construction algorithm that well approximates an ideal scale-free construction model. We have a tendency to present both analytical and simulation results that support our overlay topology selection and validate the proposed design.

    more info

  51. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
  52. X

    Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds

    Infrastructure as a Service (IaaS) cloud computing has revolutionized the method one thinks of acquiring resources by introducing a straightforward change: permitting users to lease computational resources from the cloud provider's datacenter for a brief time by deploying Virtual Machines (VMs) on these resources. This new model raises new challenges in the design and development of IaaS middleware. One of these challenges is the need to deploy a massive number (tons or maybe thousands) of VM instances simultaneously. Once the VM instances are deployed, another challenge is to simultaneously take a snapshot of the many images and transfer them to persistent storage to support management tasks, like suspend-resume and migration.

    more info

  53. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
  54. X

    Secure and Practical Outsourcing of Linear Programming in Cloud Computing

    Cloud computing permits customers with limited computational resources to outsource massive-scale computational tasks to the cloud, where huge computational power can be easily utilised in an exceedingly pay-per-use manner. However, security is the most important concern that forestalls the wide adoption of computation outsourcing in the cloud, particularly when finish-user's confidential knowledge are processed and produced throughout the computation. Thus, secure outsourcing mechanisms are in great want to not only protect sensitive information by enabling computations with encrypted information, however conjointly defend customers from malicious behaviors by validating the computation result. Such a mechanism of general secure computation outsourcing was recently shown to be possible in theory, however to style mechanisms that are practically economical remains a terribly difficult drawback. Focusing on engineering computing and optimization tasks, this paper investigates secure outsourcing of widely applicable linear programming (LP) computations. In order to realize sensible potency, our mechanism design explicitly decomposes the LP computation outsourcing into public LP solvers running on the cloud and private LP parameters owned by the customer.

    more info

  55. Monitoring Service Systems from a Language-Action Perspective
  56. X

    Monitoring Service Systems from a Language-Action Perspective

    Business processes are increasingly distributed and open, creating them susceptible to failure. Monitoring is, therefore, an vital concern not only for the processes themselves however also for the services that comprise these processes. We tend to present a framework for multilevel monitoring of those service systems. It formalizes interaction protocols, policies, and commitments that account for normal and extended effects following the language-action perspective, and permits specification of goals and monitors at varied abstraction levels. We have a tendency to demonstrate how the framework can be implemented and evaluate it with multiple situations that include specifying and monitoring open-service policy commitments.

    more info

    Power Electronics

  57. The Transformerless Single-Phase Universal Active Power Filter for Harmonic and Reactive Power Compensation t
  58. X

    This paper presents a universal active filter for harmonic and reactive power compensation for single-phase systems applications. The proposed system is a combination of parallel and series active filters without transformer. It is suitable for applications where size and weight are critical factors. The model of the system is derived and it is shown that the circulating current observed in the proposed active filter is an important quantity that must be controlled. A complete control system, including pulse-width modulation (PWM) techniques, is developed. Comparisons between the structures are made from weighted total harmonic distortion (WTHD). The steady-state analysis is also presented in order to demonstrate the possibility to obtain an optimum voltage angle reducing the current amplitude of both series and parallel converters and, consequently, the total losses of the system. Simulated and experimental results validate the theoretical considerations.

    more info

  59. New Three-Phase Multilevel Inverter With Reduced Number of Power Electronic Components
  60. X

    New Three-Phase Multilevel Inverter With Reduced Number of Power Electronic Components

    TIn this paper, a new configuration of a three-phase five-level multilevel voltage-source inverter is introduced. The proposed topology constitutes the conventional three-phase two-level bridge with three bidirectional switches. A multilevel dc link using fixed dc voltage supply and cascaded half-bridge is connected in such a way that the proposed inverter outputs the required output voltage levels. The fundamental frequency staircase modulation technique is easily used to generate the appropriate switching gate signals. For the purpose of increasing the number of voltage levels with fewer number of power electronic components, the structure of the proposed inverter is extended and different methods to determine the magnitudes of utilized dc voltage supplies are suggested. Moreover, the prototype of the suggested configuration is manufactured as the obtained simulation and hardware results ensured the feasibility of the configuration and the compatibility of the modulation technique is accurately noted.

    more info

  61. Solar PV and Battery Storage Integration using a New Configuration of a Three-Level NPC Inverter With Advanced Control Strategy
  62. X

    Solar PV and Battery Storage Integration using a New Configuration of a Three-Level NPC Inverter With Advanced Control Strategy

    In this paper, a novel configuration of a three-level neutral-point-clamped (NPC) inverter that can integrate solar photovoltaic (PV) with battery storage in a grid-connected system is proposed. The strength of the proposed topology lies in a novel, extended unbalance three-level vector modulation technique that can generate the correct ac voltage under unbalanced dc voltage conditions. This paper presents the design philosophy of the proposed configuration and the theoretical framework of the proposed modulation technique. A new control algorithm for the proposed system is also presented in order to control the power delivery between the solar PV, battery, and grid, which simultaneously provides maximum power point tracking (MPPT) operation for the solar PV. The effectiveness of the proposed methodology is investigated by the simulation of several scenarios, including battery charging and discharging with different levels of solar irradiation. The proposed methodology and topology is further validated using an experimental setup in the laboratory.

    more info

  63. The Transformerless Single-Phase Universal Active Power Filter for Harmonic and Reactive Power Compensation
  64. X

    The Transformerless Single-Phase Universal Active Power Filter for Harmonic and Reactive Power Compensation

    This paper presents a universal active filter for harmonic and reactive power compensation for single-phase systems applications. The proposed system is a combination of parallel and series active filters without transformer. It is suitable for applications where size and weight are critical factors. The model of the system is derived and it is shown that the circulating current observed in the proposed active filter is an important quantity that must be controlled. A complete control system, including pulse-width modulation (PWM) techniques, is developed. Comparisons between the structures are made from weighted total harmonic distortion (WTHD). The steady-state analysis is also presented in order to demonstrate the possibility to obtain an optimum voltage angle reducing the current amplitude of both series and parallel converters and, consequently, the total losses of the system. Simulated and experimental results validate the theoretical considerations.

    more info

  65. Modeling and Design of Islanding Detection Using Phase-Locked Loops in ThreePhase Grid-Interface Power Converters
  66. X

    Modeling and Design of Islanding Detection Using Phase-Locked Loops in ThreePhase Grid-Interface Power Converters

    Islanding detection is critical to safety and power quality as well as the control mode of grid-interface power converters. This paper addresses the islanding-detection methods on the basis of the grid synchronization instability mechanism. Although many modified phase-locked loop (PLL) methods have been proposed to achieve islanding detection, the PLL modeling and design are not clear in the existing literature and a cut-and-trail process is usually required during the design phase. This paper proposes a systematic PLL modeling and design approach to evaluate different frequency-based islanding-detection methods. Two different types of PLL-based islanding-detection solution are discussed, accounting for a majority of the existing methods. The first method is to modify the PLL to constantly move the stable equilibrium point.

    more info

  67. Improved Active Power Filter Performance for Renewable Power Generation Systems
  68. X

    Improved Active Power Filter Performance for Renewable Power Generation Systems

    An active power filter implemented with a four-leg voltage-source inverter using a predictive control scheme is presented. The use of a four-leg voltage-source inverter allows the compensation of current harmonic components, as well as unbalanced current generated by single-phase nonlinear loads. A detailed yet simple mathematical model of the active power filter, including the effect of the equivalent power system impedance, is derived and used to design the predictive control algorithm. The compensation performance of the proposed active power filter and the associated control scheme under steady state and transient operating conditions is demonstrated through simulations and experimental results.

    more info

  69. Flicker Mitigation by Individual Pitch Control of Variable Speed Wind Turbines With DFIG
  70. X

    Flicker Mitigation by Individual Pitch Control of Variable Speed Wind Turbines With DFIG

    Due to the wind speed variation, wind shear and tower shadow effects, grid connected wind turbines are the sources of power fluctuations which may produce flicker during continuous operation. This paper presents a model of an MW-level variable-speed wind turbine with a doubly fed induction generatorto investigate the flicker emission and mitigation issues. An individual pitch control (IPC) strategy is proposed to reduce the flicker emission at different wind speed conditions. The IPC scheme is proposed and the individual pitch controller is designed according to the generator active power and the azimuth angle of the wind turbine.

    more info

  71. High-Frequency Operation of a DC/AC/DC System for HVDC Applications
  72. X

    High-Frequency Operation of a DC/AC/DC System for HVDC Applications

    Voltage ratings for HVdc point-to-point connections are not standardized and tend to depend on the latest available cable technology. DC/DC conversion at HV is required for interconnection of such HVdc schemes as well as to interface dc wind farms. Modular multilevel voltage source converters (VSCs), such as the modular multilevel converter (MMC) or the alternate arm converter (AAC), have been shown to incur significantly lower switching losses than previous two- or three-level VSCs. This paper presents a dc/ac/dc system using a transformer coupling two modular multilevel VSCs. In such a system, the capacitors occupy a large fraction of the volume of the cells but a significant reduction in volume can be achieved by raising the ac frequency.

    more info

We Offer Project For

B. E (Computer Science)

B. E (Electronics and Communication)

B. E (Electrical and Electronics Eng.)

B. E (Information Technology)

B. E (Instrumentation Control and Eng.)

M. E (Computer Science)

M. E (Power Electronics)

M. E (Control System)

M. E (Software Engg)

M. E (Applied Electronics)

M. SC (IT , IT&M , CS&M, CS)

MCA

BCA

B.Sc. (IT , CS)