Nowadays, the Permanent Magnet DC (PMDC) motors are intended to achieve the maneuver with elevated exactness and accurateness. To elevate the exactness and accurateness of the Permanent Magnet DC motors, the two-loop Interleaved Boost Converter (ILBC) is intended to control methods. The projected Converter is located between DC load and Permanent Magnet DC motor loads. The united construction of Permanent Magnet DC motors and Interleaved Boost Converter may be miscarried owing to steady state error, speed disparity, and slow response. To condense the difficulties, the Fuzzy Logic Controller is intended in the recommended Converter and Permanent Magnet DC motor. This exertion enlightened the modelling, simulation, and relevance of the Interleaved Boost Converter with Permanent Magnet DC motor (ILBC-PMDCM). The recommended technique chief objective aims at upholding the mandatory DC voltage from the input supply voltage with the assistance of Fuzzy Logic Controller. Current mode Fuzzy Logic Controller is proposed in the present work. The objective is to improve small-scale stability of ILBC-PMDCM system. The recommended controller is functioning based on closed-loop alignment. The projected FL controller is simulated and equated with the Proportional Integral (PI) controller in Permanent Magnet DC motor. From the investigation, the projected controller presents the finest outcomes than the Proportional Integral controller. The projected controller has altered benefits such as declined steady state error and enriched time domain response. The hardware outcomes of the projected controller are also presented, which are evaluated against the simulation outcomes.
This paper displays a Fly Back Converter idea to straightforwardly incorporate cascaded flyback converter. The flyback-converter finds a way between DC-source and DC Motor-load. This work covenants with the modeling, simulation, and application of a Fuzzy Logic controlled (FLC) - Cascaded Fly back Converter (CFLB) system. This work recommends FLC to control Parallel cascaded fly-back converter to fabricate essential DC voltage from the input supply voltage. The yield of CFLB is controlled utilizing closed loop configuration. Closed loop PI & Fuzzy logic controlled CFLB systems are simulated and their results are related. The outcomes signify that the FLC based system gave a superior response than the P.I. controlled CFLB system. The FLC controlled CFLB system has benefits like decreased steady state error and enhanced time domain-response.
The widespread operation of modified algorithm (National Institution of Standard Technology Fingerprint image Quality (NIFQ)) in government applications allow some persons with illegal environment by neglecting the detection of altered fingerprints. By using the fingerprint quality assessment software, it is difficult to find the altered fingerprints, since the quality of image does not degrade. This paper focuses on optimizing the modified NFIQ algorithm by implementing particle swarm optimization (PSO) based on a fingerprint identification system. It can also be helpful in improving the performance by accuracy and robustness for detecting the fingerprint which is altered.
Energy meter reading is a tedious and an exclusive affair. The meter reader has to go and take the reading manually in the customer premises to issue the bill, which will later be uploaded in the software to automate the billing and payment system. If the proposed method is achieved, it would have reduced the laborious task and financial wastage by automate the manual meter reading process and bill data entry process. This paper proposes a new network communication system for energy meter reading by internet communication technology and software system along with the existing meters. A IOT modem will be integrated with electronic energy meter to read the usage of electricity and uploaded on server or website. Energy meter deliver the reading details and it is uploaded on the website instantly. This communication system is further useful for electricity regional/sub-regional office, which can monitor the value and power consumption of individual load. And they cut the power supply for any specific load, which are not in use. Moreover, this power cut control system is done by using same website which is used for monitoring. In this design we are going to provide energy by the recharging system, the consumer can view the load consumption power and can recharge through website. If the power consumption reaches maximum limit then automatically an alert message is send to consumer through IOT MODEM. Index terms: Arduino controller, IoT MODEM, Relay, Current sensor and LCD display I. INTRODUCTIONElectricity generation is the method of generating electric power from the of renewable or nonrenewable energy sources. For electric utilities in the electric power industry, it is the primary stage considers the delivery of electricity to end users, the other stages are considered to be the transmission, distribution, energy storage equipped devices and also recovery using pumped storage devices of the transmission network in customer premises. A property of electricity is that it is not a primary energy freely present in nature in remarkable amounts and it must be produced. Production is conveyed out in power plants. Electricity is usually generated at a generating station through electrical generators. In which heat energy produced by combustion or nuclear fission is converted into electrical energy. Sometimes kinetic energy of water and wind flow is also used to generate electric energy. Nowadays solar panels are mostly used to generate the power.
The evolution of the IoT and pervasive computing creates a significant impact in the information and commination. The growth rate of the devices seems to be hiked in exponential manner. The overall objective seems to be providing better services for the end user with the emergence of the new age gadgets. Steganography exist the complete of conceal a file, message, image, or video within another file, message, image, or video. The benefit of steganography in overload of cryptography alone be to the planned secret communication doing not attract attention to itself as an object of scrutiny. Plainly able to be alive see encrypted messages, no matter how unbreakable they are, arouse interest and may in themselves be there incriminating in countries in which encryption is illegal. IoT is one such technology, which holds many promising aspects in networking and communication. In another perspective the nature of the data handled in the IoT is more open and vulnerable for hacking. Since the data handled through the IoT technology is sensitive and almost deals with personal privacy, industry needs to cater the security concerns in IoT.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.