Mining Based Design and Analysis of Social Spam Detection in Micro-blogging
Research Paper | Journal Paper
Vol.5 , Issue.7 , pp.101-109, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.101109
Abstract
The web-based social networking becomes a valuable part of over life. Young clients can pay a significant amount of time on this social platform. The primary reason behind the time expense on the social media is to check the updates on the different area of interest i.e. politics, movies, and others. The updates on these domains are obtained on the basis of the trending topics. But sometimes the similar or duplicate topics are flooded on social media due to this un-necessary traffic, redundancy, and storage overheads increases. Keeping in mind the end goal need to identify the duplicate post on the social network applications and remove them is a better solution. By this inspiration a new data model using the big data mining is introduced in this work. The proposed data model contributes by accepting the online and offline data both. After that the three phase of pre-processing is performed on the data first the removal of stop words, removal of punctuations, and completion of abbreviations. The pre-processed data is further ranked on the basis of Jaccard similarity index. This ranked data is further used with the fuzzy c-means algorithm. The fuzzy c-means algorithm computes the different groups of the similar tweets. Thus in further for finding the similar tweets the synonyms based re-tweets are generated with the mutation methodology. Finally the hashes of all the data are computed and the similar hash value based tweets are removed. The implementation of the proposed method is finished on the idea of JAVA era and hadoop storage. Additionally after implementation of the proposed technique, the technique is compared with the similar technique on the basis of their precision and recall values. The computed results demonstrate the high degree of accurate duplicate data identification and their removal for the micro-blog data analysis.
Key-Words / Index Term
Big Data, Hadoop, FCM(fuzzy c-means), Social Spam, Clustering, Twitter
References
[1] Jiang, Meng, P. Cui, and C. Faloutsos, "Suspicious behavior detection: Current trends and future directions," IEEE Intelligent Systems, Vol.31,issue.1, pp. 31-39, 2016
[2] J.S. Rohankar, “A Study on Advanced Security Techniques to Provide Security for Social Networking as Data Mining”, International Journal of Advance Foundation and Research in Computer (IJAFRC) Vol.2, Special Issue (NCRTIT 2015), January 2015.
[3] L. Cipriani, “Goal! Detecting the most important World Cup moments”, Technical report, Twitter, 2014.
[4] Chu, Zi, I. Widjaja, and H. Wang, "Detecting social spam campaigns on twitter", International Conference on Applied Cryptography and Network Security, Springer Berlin Heidelberg, 2012.
[5] Ghosh, Saptarshi, "Understanding and combating link farming in the twitter social network", ACM, Proceedings of the 21st international conference on World Wide Web, 2012.
[6] Zhu, Yin, et al. "Discovering Spammers in Social Networks", AAAI, 2012.
[7] Ratkiewicz, Jacob, et al, "Truthy: mapping the spread of Astroturf in micro blog streams", ACM, Proceedings of the 20th international conference companion on World Wide Web, pp.249-252, 2011.
[8] Wang, De, D. Irani, and C. Pu, "A social-spam detection framework”, ACM, Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, 2011.
[9] Theobald, Martin, J. Siddharth, and A. Paepcke, "Spotsigs: robust and efficient near duplicate detection in large web collections", ACM, Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval, ACM, 2008.
[10] Chowdhury, Abdur, et al. "Collection statistics for fast duplicate document detection", ACM, Transactions on Information Systems (TOIS), Vol.20, issue.2, pp.171-191, 2002.
[11] G. Jain, Manisha, B. Agarwal, “Spam Detection on Social Media Text”, International Journal of Computer Sciences and Engineering, Vol.5, issue.5, May 2017
Citation
R. Chugga, P. Dashore , "Mining Based Design and Analysis of Social Spam Detection in Micro-blogging," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.101-109, 2017.
Noise Reduction in DECT Images using spatial neighboring density method using bilateral filter
Research Paper | Journal Paper
Vol.5 , Issue.7 , pp.110-114, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.110114
Abstract
The Dual-energy computed tomography (DECT) has got high popularity in the field of medical. By using DECT we can easily check or capture the body organs. Noise reduction is the premier process in the x-ray field or the medical imaging field. In this analysis we present the study of DECT images. The images which have the high material density they have more noise as well. To make image appearance better the noise reduction should be done. The use of filter is a primary tool in image noise correction. The non-linear filter removes the noise problem in the image. We are using bilateral filter to remove the noise in DECT images. This paper enlights different method of noise reduction in DECT images and the result will compare with the help of MATLAB software. ImaSim Software provides ability to present and manipulate CT data.
Key-Words / Index Term
DECT, SNR, CNR , Bilatral filter ,Non-linear filter
References
[1] Joseph R. Grajo, MD; Manuel Patino, MD; Andrea Prochowski, MD; dushyant V. Sahani,MD, “ Dual energy CT in practice: Basic principles and applications” applied Radiology, www.appliedradiology.com,july 2016.
[2] Thorsten R. C. Johnson, “Dual-Energy CT: General Principles”, AJR: 199, November 2012.
[3] Anja Borsdorf, Rainer Raupach, Thomas Flohr, and Joachim Hornegger, “Wavelet Based Noise Reduction in CT-Images Using Correlation Analysis”, IEEE Transactions On Medical Imaging, Vol. 27, No. 12, December 2008.
[4] Harini Veeraraghavan1, Duc Fehr1, Ross Schmidtlein1, Sinchun Hwang2,and Joseph O. Deasy1, “Automatic Bone and Marrow Extraction from Dual Energy CT through SVM Margin-Based Multi-Material Decomposition Model Selection”, Springer International Publishing Switzerland 2014
[5] Rafael Simon Maia ,Christian Jacob ,Amy K. Hara , Alvin C. Silva , William Pavlicek ,Mitchell J. Ross, “An algorithm for noise correction of dual-energy computed tomography material density images” Int J CARS, 7 April 2014
[6] Ravi K. Kaza, MD, Joel F. Platt, MD, Richard H. Cohan, MD, Elaine M. Caoili, MD, Mahmoud M. Al-Hawary, MD, Ashish Wasnik, MD, “Dual-Energy CT with Single- and Dual-Source Scanners: Current Applications in Evaluating the Genitourinary Tract1”, RadioGraphics 2012; 32:353–369 .
Citation
Pallavi Sharma, Vibha Tiwari , "Noise Reduction in DECT Images using spatial neighboring density method using bilateral filter," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.110-114, 2017.
Enhanced Online Payment Security using Steganography, Quantum and Visual Cryptography
Research Paper | Journal Paper
Vol.5 , Issue.7 , pp.115-119, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.115119
Abstract
Visual Cryptography is Secret Sharing Scheme where it is an encryption methodology to hide the data under image in a fashion that it can only be decrypted by the combination of two shares. Quantum mechanics is the bsis of Quantum Cryptography Techniques. Use of Quantum key is the basis as Quantum mechanics concept has been utilized to have encrypted key in place between users and not used for data transmission. Steganography involves techniques of hiding information under other information so that extraction of data become difficult .In the existing work, it used these three techniques to improve the transaction security. But this is not enough to secure so to overcome this problem we apply image sequence and send OTP in the email id which makes them more secure to achieve more security.
Key-Words / Index Term
Payment System, Buisness, Internet, Keys, Visual Cryptography, Quantum Cryptography, Stagenography
References
[1] Wayner, P. “Digital cash: Commerce on the net”, 2nd ed. London: AP Professional, 1997.
[2] Dennis Abrazhevich “A Survey of User Attitudes towards Electronic Payment Systems”2012.
[3] P. Sharma, D. Mishra, V.K. Sarthi, P. Bhatpahri, R. Shrivastava, "Visual Encryption Using Bit Shift Technique", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.57-61, 2017.
[4] Vinod. L. B and Nithyanada. C. R, "Visual Cryptographic Authentication for Online Payment System", International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.109-114, 2015.
[5] Ajay L “Survey of Most Prominent Quantum Key Distribution Protocols” International Research Journal of Engineering and Technology (IRJET), Volume: 03 Issue: 05, 2016.
[6] SO. OKOLIE, BT. ADETOBA, "Comparative Analysis of Performance Characteristics of well-known Symmetric Key Encryption Algorithms", International Journal of Scientific Research in Network Security and Communication, Vol.4, Issue.3, pp.1-6, 2016.
[7] Gaurav Jain and Vikas sejwar,“Improving the Security by using Various Cryptographic Techniques in cloud computing``, ICICCS-International Conference On Intelligent Computing and Control Systems ICICCS 2017,
[8] Rajesh Shah and Yashwant Singh Chouhan, "Encoding of Hindi Text Using Steganography Technique", International Journal of Scientific Research in Computer Science and Engineering, Vol.2, Issue.1, pp.22-28, 2014.
[9] Noor Ul Ain “A Novel approach for secure multi-party secret sharing scheme via quantum cryptography” 2017 International Conference on Communication, Computing and Digital Systems (C-CODE), 2017.
[10] Yuriy Gorbenko, Igor Svatovskiy, Oleksiy Shevtsov “Post-Quantum Message Authentication Cryptography Based on Error-Correcting Codes” Third International Scientific-Practical Conference Problems of Infocommunications. Science and Technology PIC S&T-16, Kharkiv,pp. 51-54, 2016.
[11] Kaur, R. Singh, S. Gagneja , "Network Security and Methods of Encoding and Decoding", International Journal of Computer Sciences and Engineering, Vol.2, Issue.2, pp.11-15, 2014.
[12] Trupti Patel, Rohit Srivastava “Hierarchical Visual Cryptography for Grayscale Image” 2016 Online International Conference on Green Engineering and Technologies (IC-GET), 978-1-5090-4556-3/16/$31.00 ©2016 IEEE.
[13] Vandana Purushothaman, Sreela Sreedhar “An Improved Secret Sharing Using Xor-Based Visual Cryptography” 2016 Online International Conference on Green Engineering and Technologies (IC-GET), 978-1-5090-4556-3/16/$31.00 ©2016 IEEE.
[14] Mamta Jain, Rishabh Charan Choudhary Anil Kumar “Secure Medical Image Steganography with RSA Cryptography using Decision Tree” 2016 .
[15] Sudipta Sahana and Abhipsa Kundu, "A Novel Approach on Adaptive Block Steganography Based Crypting Technique for Secure Message Passing", International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.42-46, 2014.
[16] Nour Elhouda Tabet, Media Anugerah Ayu “Analysing the Security of NFC Based Payment Systems” 2016 International Conference on Informatics and Computing (ICIC), 2016.
[17] Deepali Kayande, Elsa Rebello, Shweta Sharma and Monica Tandel “Overview of a Payment Solution for NFC- Enabled Mobile Phones” InICT in Business Industry and Government (ICTBIG), International Conference on Nov 18 (pp. 1-4), 2016.
Citation
Anshu Arele, Vikas Sejwar, "Enhanced Online Payment Security using Steganography, Quantum and Visual Cryptography," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.115-119, 2017.
A Novel Approach for TCP for Regression Testing In Web Application
Research Paper | Journal Paper
Vol.5 , Issue.7 , pp.120-124, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.120124
Abstract
For increase rate of fault detection test case prioritization is needed, which shows how fast bugs are identified during the testing phase. In test case prioritization follow way to use the information of previously executed test cases, such as coverage information, resulting in an iterative prioritization algorithm. Real fact of using coverage information can improve the rate of fault detection in prioritization algorithms. But performance of such iterative prioritization schemes degrade as the number of ties occurred in prioritization steps increases. In test case prioritization using lexicographical ordering and extended diagraph, we propose a new heuristic for breaking ties in coverage based techniques. Performance of the proposed technique in terms of the rate of fault detection is comparatively evaluated using a wide range of programs. Results indicate that the proposed technique can resolve ties and in turn noticeably increases the rate of fault detection.
Key-Words / Index Term
Additional statement coverage, Fault-based test case prioritization, GUI testing, HMM, model-based testing (MBT), random prioritization, reinforcement learning
References
[1]. Gupta S, Raperia H, Kapur E, Singh H, Kumar A. “A Novel Approach for Test Case Prioritization”, International Journal of Computer Science, Engineering and Applications. Vol.2, Issue.3, pp.48-53, 2012.
[2]. Kumar A, Gupta S, Reparia H, Singh H., “An approach for test case prioritization based upon varying requirements”, International Journal of Computer Science, Engineering and Applications. Vol.2, Issue.3, pp.87-99, 2012.
[3]. P. R. Srivastava, “Test case prioritization”, Journal of Theoretical and Applied Information Technology, vol.4, Issue.3, pp.178-181, 2008.
[4]. Chandraprakash Patidar, "A Report on Latest Software Testing Techniques and Tools", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.4, pp.50-52, 2013.
[5]. Suresh Jat, Pradeep Sharma, "Analysis of Different Software Testing Techniques", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.77-80, 2017.
[6]. A. G. Malishevsky, J. R.Ruthruff, G. Rothermel, and S. Elbaum, “Cost-cognizant test case prioritization”, Department of Computer Science and Engineering, University of Nebraska-Lincoln, Techical Report, 2006
[7]. I. Sharma, J. Kaur, M. Sahni, “A Test Case Prioritization Approach in Regression Testing”, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.7, pp.607-614, 2014.
[8]. A. Shrivastava, S. Rajawat, "An Implementation of Hybrid Genetic Algorithm for Clustering based Data for Web Recommendation System", International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.6-11, 2014.
[9]. C. Kaner, “What is a good test case”. Star East, 16, 2003
[10]. G. Rothermel, R. H. Untch, , C. Chu, M. J. Harrold, “Test case prioritization: An empirical study”, IEEE International Conference on Software Maintenance, pp.179-188, 1999.
[11]. J. M. Kim, A. Porter, G. Rothermel, ”An empirical study of regression test application frequency”, Software Testing, Verification and Reliability, vol.15, Issue.4, pp.257-279, 2005.
[12]. G. Rothermel, S. Elbaum, , A. G. Malishevsky, P. Kallakuri, X.Qiu, “On test suite composition and cost-effective regression testing”, ACM Transactions on Software Engineering and Methodology (TOSEM), vol.13, Issue.3, pp.277-331, 2004.
[13]. A. Srivastava & J. Thiagarajan, “Effectively prioritizing tests in development environment”, ACM SIGSOFT Software Engineering Notes , vol. 27, No. 4, pp: 97-106, 2002 .
[14]. H. K. Leung and L. White, “Insights into regression testing [software testing]”, Software, Maintenance, 1989., Proceedings., Conference on, IEEE, pp. 60-69, 1989.
[15]. G. Rothermel & M. J. Harrold, “Analyzing regression test selection techniques” , Software Engineering, IEEE Transactions on, vol: 22(8), pp: 529-551, 1996.
[16]. S. Elbaum, D. Gable & G. Rothermel, “Understanding and measuring the sources of variation in the prioritization of regression test suites”, METRICS 2001-Proceedings of Seventh IEEE International on Software Metrics Symposium, pp.169-179, 2001.
[17]. G. Rothermel, R. H. Untch, C. Chu & M. J. Harrold, “Prioritizing test cases for regression testing”, Software Engineering, IEEE Transactions on, vol.27, Issue.10, pp.929-948, 2001.
Citation
Priyanka P.Deshmukh, Vina M.Lomte, "A Novel Approach for TCP for Regression Testing In Web Application," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.120-124, 2017.
Selfheal Stable Routing Protocol for Ad-hoc Network
Research Paper | Journal Paper
Vol.5 , Issue.7 , pp.125-130, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.125130
Abstract
Wireless networking is a new emerging era. It has potential applications in extremely unpredictable and dynamic environments. Individuals and industries choose wireless because it allows flex¬ibility of location, whether that means mobility, portability, or just ease of installation at a fixed point. In mobile ad-hoc network, mobile nodes are continuously moving from one location to another. Thus, MANET topology can change often and unpredictably. Mobility of nodes is one of the major issue of concern in mobile Ad- hoc network because it causes a link failure. In this paper, a new scheme has been suggested which would help mobile nodes to maintain routes to destination with more stable route selection. This makes route maintenance and recovery phase more efficient and fast. The performance of the proposed routing protocol named as Selfheal Stable Routing protocol (SSRP) is evaluated some major performance metrics which include Packet Delivery Ratio, throughput and End to End Delay. The study is based on simulation runs adopting CBR traffic pattern taking care of node failure scenarios.
Key-Words / Index Term
Ad-hoc network,self Healing Network(SHN) ,Selfheal Stable Routing Protocol(SSRP) ,AODV
References
[1]. Glab, M., Lukasiewicz, M., Streichert, T., Haubelt, C., Teich, J.: Reliability-Aware System Synthesis. In: Proceedings of DATE 2007, pp. 409–414, 2007.
[2]. Robert Poor, Cliff Bowman, Charlotte Burgess Auburn, “Self-healing networks”, ACM Queue, pp.52-59, 2003
[3]. Hiroyuki Fujii and Noriaki Yoshikai. ‘Restoration message transfer mechanism and restoration chracteristics of double-search self-healing atm network’. IEEE Journal on Selected Areas in Communications, Vol.12, Issue.1, pp.149-158, Jan 2004.
[4]. Ryutaro Kawamura, Kenichi Sato, and Ikuo Tokizawa, “Self-healing atm networks based on virtual path concept”, IEEE Trans. Communications, Vol.12, Issue.1, pp.120-127, Jan 2004.
[5]. K. Murakami and H. Kim. “Optimal capacity and flow-assignment for self-healing ATM networks based on line and end-to-end restoration”, IEEE/ACM Transactions on Networking, Vol.6, Issue.2, pp.207- 221, Apr 2008
[6]. Amit Gupta and Dhananjay Bisen, "Review of Different Routing Protocols in Mobile Ad-Hoc Networks", International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.105-112, 2015.
[7]. Cankay, H.C., Nair, V.S.S.: “Accelerated reliability analysis for self-healing sonet networks”, SIGCOMM Computer Communications. Rev, Vol.28, Issue.4, pp 268–277, 1998.
[8]. Vishal Paranjape and Vimmi Pandey, "An Improved Authentication Technique with OTP in Cloud Computing", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.3, pp.22-26, 2013.
[9]. Sanjeev K.prasad and Karamjit Bhatia “RSAODV: A route Stability based Ad Hoc on Demand Distance Vector Routing Protocol for Mobile Ad hoc Network”, International Journal of Wireless & Mobile Networks(IJWMN) vol.6, no- 6, December 2014.
[10]. Umesh Kumar Singh, Jalaj Patidar and Kailash Chandra Phuleriya, "On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks", International Journal of Scientific Research in Computer Science and Engineering, Vol.3, Issue.1, pp.11-15, 2015.
[11]. Virali Girdhar and Gaurav Banga, "A Comparative Analysis of Different Movement Models in MANET", International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.9-13, 2015.
[12]. Aditya Singh Mandloi and Vineeta Choudhary, "Study of Various Techniques for Data Gathering in WSN", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.3, pp.12-15, 2013.
[13]. B.Karthikeyan, S. Hari Ganesh, J.G.R. Sathiaseelan,and N.Kanimozhi, "High Level Security with Optimal Time Bound Ad-Hoc On-demand Distance Vector Routing Protocol (HiLeSec-OptiB AODV)", International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.156-164, 2016.
Citation
Rosy Pawar, Ashwani Kush, "Selfheal Stable Routing Protocol for Ad-hoc Network," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.125-130, 2017.
A Review on Cloud Framework for Healthcare Analytics
Review Paper | Journal Paper
Vol.5 , Issue.7 , pp.131-134, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.131134
Abstract
With the wide spread use of the internet in almost all of the fields in our day to day life, has created many new opportunities and challenges in the Data Analytics. Data Analytics deals with the methods to processes, analyze and to draw the knowledge based conclusion from the data sets obtained from various sources applied to take proper decisions for any Artificial Intelligence based systems. Big Data Analytics deals with the larger sized data analytics in terabytes or peta bytes. Presently cloud computing along with Big Data Analytics has wide spread applications in many expert systems design. In this paper we are focused on the basic conceptual model used more specifically in Health Care Analytics using cloud framework based Big Data Analytics. Based on proper data sets available, this framework will be able to make proper healthcare analysis for preventive and remedial decisions.
Key-Words / Index Term
Big Data Analytics, Artificial Intelligence, Expert System, Cloud Framework
References
[1] Literature by Swami Vivekananda.
[2] M. Ojha, Dr. K. Mathur, “Proposed Application of Big Data Analytics in Healthcare at Maharaja Yashwantrao Hospital”, 3rd MEC International Conference on Big Data and Smart City, Muscat, Oman, pp 1-7, 2016.
[3] Mohd.A. Salam, A.C. Pandey, "Mobile Cloud Computing: Taking Web-Based Mobile Applications to the Cloud", International Journal of Computer Sciences and Engineering, Vol.2, Issue.1, pp.35-42, 2014.
[4] N. Godbole, J. Lamb, “Using Data Science and Big Data Analytics to Make Healthcare Green”, IEEE 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT), Melville USA, pp 1-6, 2015.
[5] R. Jangade, R. Chauhan, “Big Data with Integrated Cloud Computing for Healthcare Analytics”, IEEE 3rd International Conference on Computing for Sustainable Global Development, New Delhi India, pp 4068-4071, 2016.
[6] LO’AI A. Tawalbeh, R. Mehmood, E. Benkhlifa,H Song, “Mobile Cloud Computing Model and Big Data Analysis for Health Applications”, IEEE Access, vol 4, pp 6171-6180, 2016.
[7] U. Dhanaliya, A. Devyani, “Implementation of E-Healthcare System using Web Services and Cloud Computing”, IEEE International Conference on Communication and Signal Processing, Melmaruvathur India, pp 1034-1036, 2016
[8] S.Jayasri, D.Karthika, "Microcontroller Based Traffic and Road Condition Monitoring Alert System Using Internet of Things", International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.272-279, 2016.
[9] P Mell, T Grance, “The nist definition of cloud computing”, Nist special publication 800-145(final), Technical report, Tech Rep.,2011.Available:http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.
[10] R. Kaur, R. Garg, H. Aggarwal, “Big Data Analytics Framework to identify Crop Diseases and Recommendation a Solution”, IEEE International conference on Inventive Computation Technologies (ICICT), Coimbatore, India. pp 1-5, 2016.
[11] P. Mathew, A. Pillai, “Big Data Solutions in Healthcare: Problems and Perspectives”, IEEE 2nd International conference on Innovations in Information Embedded and communication Systems, ICIIECS, Coimbatore, India pp 1-6, 2015.
Citation
D.L. Joshi, M. A. Joshi, A.A. Dande, P. Wararkar, "A Review on Cloud Framework for Healthcare Analytics," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.131-134, 2017.
A Review Paper on: Power Grid Associated with Web using Non-Conventional Energy Source
Review Paper | Journal Paper
Vol.5 , Issue.7 , pp.135-140, Jul-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i7.135140
Abstract
This paper proposes a household power unit which is able to automatic switching and will communicate through Ethernet/Wi-Fi so utilization of the Non-conventional energy sources like solar energy will become more reliable. Further it will have made ready to end-user through electrical setup. The ARDUINO MEGA processor is preferred to work as an Embedded Device. The program loaded on this device will be work as Real time operating system. It is necessary to process, control and communication. Other services are provided on the top of embedded device. It includes communication with server about the real-time information on energy meters at customer`s location. Energy source selection, power-up the connection and disconnection are some of the services that are provided through the online web portal. The web browser available at subscriber`s end, can act as an interface to these services provided. Greater integration of renewable energy generation may be achieved by facilitating battery energy storage systems like integrating remote access to manage the set up like Ethernet, Web communication etc. The smart energy management of the resources is very important aspect. It allows collection of energy from multiple sources. In case of commercial and large scale implementation, the generated power at distribution level can be directly fed to the utility distribution network. In this paper, the smart energy management system is used where the battery monitoring system works alternately. ARDUINO MEGA 7 microcontroller is used to regulate the actual operating function as a core part of the setup. It is ideally appropriate for residential premises along with commercial applications.
Key-Words / Index Term
Embedded system with WLAN, Embedded device as a server, Non-conventional Energy source
References
[1]. S. Mohanty, B. N. Panda, and B. S. Pattnaik, “Implementation of a Web of Things based Smart Grid to remotely monitor and control Renewable Energy Sources,” 2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science, Mar. 2014.
[2]. N. Bui, A. Castellani, P. Casari, and M. Zorzi, “The internet of energy: a web-enabled smart grid system,” IEEE Network, vol. 26, no. 4, pp. 39–45, 2012.
[3]. C.-L. Nguyen and H.-H. Lee, “A Novel Dual-Battery Energy Storage System for Wind Power Applications,” IEEE Transactions on Industrial Electronics, vol. 63, no. 10, pp. 6136–6147, Oct. 2016.
[4]. O. Mansour, “Determining the Power and Energy Capacity of a Battery Energy Storage System Utilizing a Smoothing Feeder Profile to Accommodate High Photovoltaic Penetration on a Distribution Feeder,” Jan. 2000.
[5]. J. Li-Jun, Y. Guang-Yao, J. Miao-Miao, C. Yi-Fan, Z. Hai-Peng, and Z. Ke, “Study of bi-directional DC-DC converter of micro-grid hybrid energy storage system,” 2015 IEEE 10th Conference on Industrial Electronics and Applications (ICIEA), Jun. 2015.
[6]. S. Riahi, Y. Riahi, "Renewable Energies in MOROCCO: Situation of the Sector, Development Potential of the Sector", International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.107-114, 2017.
Citation
Kalpesh Rasane, Prakash Baviskar, "A Review Paper on: Power Grid Associated with Web using Non-Conventional Energy Source," International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.135-140, 2017.