logo
ijtrseditor@gmail.com   ISSN No.:-2454-2024(Online)

Volume 6 Issue XII

IJTRS-V6-I11-006 :- DEVELOPMENT OF CONTROL STRATEGY FOR POWER MANAGEMENT IN HYBRID RENEWABLE ENERGY SYSTEM
Author: Lalita Jhala, Raunak Jangid, Kapil Parikh
Organisation: Department of Electrical Engineering, SITE Nathdwara, Rajasthan, India
Email: raunak.ee85@gmail.com
DOI Number: https://doi.org/10.30780/IJTRS.V06.I12.001
Abstract:

This paper presents the power management and control strategy of a hybrid wind- solar PV system. The developed control strategy is implemented of the proposed hybrid system entails two main buses i.e., an AC and a DC. Wind and solar PV array systems rated capacity are 8.5kW and 10kW respectively. Both are connected to DC bus via their associated converters and MPPT controller derived optimal torque (OT). The hybrid system also has incorporated battery with DC bus via DC-DC converter. The inverter provides the interfacing between both the buses which is based fuzzy system& multilevel inverter. The load connected receives three phase AC supply from AC bus. The battery does the role of Energy storage system (ESS) in the event of excess power. While the rise in demand it also acts as a standby unit. The system elaborated here always tends to keep battery's state of charge (SOC) above 80%. Hence, manages power. Performance of the ESS has been shown via the results obtained from MATALAB/Simulink under several operation modes.

Keywords: PV Array, Wind Turbine, Battery, Power management unit (PMU).
IJTRS-V6-I12-003 :- ARTIFICIAL INTELLIGENCE TECHNIQUE BASED MPPT CONTROLLER FOR STANDALONE SOLAR ENERGY CONVERSION SYSTEM
Author: Nirma Gameti, Bheru Das Vairagi
Organisation: Department of Electrical Engineering, AITS, Udaipur, Rajasthan, India
Email: nirma.gameti1992@gmail.com
DOI Number: https://doi.org/10.30780/IJTRS.V06.I12.002
Abstract:

This paper presents the development and performance analysis of Artificial Intelligence Technique based MPPT controller for a standalone solar energy conversion system. The proposed system consists of 2.5 kW PV array, DC to DC boost converter, inverter and different load. The DC to DC Converter connected to Inverter through DC link capacitor. The inverter power fed to the load through step down transformer. The standalone solar energy conversion system consists of MPPT controller. In this research Artificial Intelligence Technique based MPPT controller on Levenberg algorithm developed. For the proposed Artificial Intelligence Technique based MPPT takes two variables as PV voltage and PV current as an input and output the duty ratio for DC to DC boost converter. The Artificial Intelligence Technique based MPPT controller for standalone solar energy conversion system with various load is modeled and simulated in MATLAB/ Simulink environment. Performance of both the Artificial Intelligence Technique based MPPT controller compared with conventional incremental conductance MPPT. Simulation results show that for a wide range of input irradiance, Artificial Intelligence Technique based MPPT controller shows improved performance than the conventional incremental conductance MPPT with at various operating conditions.

Keywords:
IJTRS-V6-I12-005 :- CYBER SECURITY AND THE INTERNET OF THINGS: VULNERABILITY, THREATS AND ATTACKS
Author: Akram Ali, Dr. Arti Vaish
Organisation: Sushant University Gurugram Haryana, India
Email: akramali.mhs20@sushantuniversity.edu.in
DOI Number: https://doi.org/10.30780/IJTRS.V06.I12.003
Abstract:

Cyber Security is a protecting cyber space which includes our critical information or data from getting hacked or attached, damaged by some unwanted person or user [1]. It is very much important for all of us to know about cyber security because everyone of using smart phone, laptop and other digital devices in which more or less our personal data or some of the personal information is saved. So, how we can manage our private data or make it secure by the same unwanted bugs so that they can’t misuse of that cyber security comprises of different software program that deals with the protection of our privacy and to protection of our privacy and to protect our personal data getting misused by some of the others programmers or the undefined theft of data. Cyber security comprises of different types of attacks such as malware, phishing and other types of cyber-attacks.

Keywords: Cyber security, Cyber space, Cyber-attacks, Programmers.
IJTRS-V6-I12-006 :- EMERGING THREATS IN CYBER SECURITY
Author: Anukriti Raj, Arti vaish
Organisation: Sushant University Gurugram Haryana, India
Email: anukriti.mhs20@sushantuniversity.edu.in
DOI Number: https://doi.org/10.30780/IJTRS.V06.I12.004
Abstract:

The growth of the Internet in the connections has led to a significant growth of cyber attack cases often with heavy outcome towards the globe. Malware is the primary choice of weapon to carry out malicious intent in the cyberspace, either by exploitation in to existing vulnerabilities or utilization of unique characteristics of emerging techniques. The development of more innovative and effective malware defense mechanisms has been regarded as an urgent requirement in the cyber security community. To assist in achieving this goal, we first present an over view of the most exploited vulnerabilities in existing hardware, software, and network layers.

Keywords: Cyber security Emerging technology trends, Emerging cyber threats, Cyber attacks and counter measure.
IJTRS-V6-I12-007 :- CYBER SECURITY FOR DIGITAL MANUFACTURING
Author: Abeera Jan, Arti Vaish
Organisation: Sushant University Gurugram Haryana, India
Email: abeerajan.mhs20@sushantuniversity.edu.in
DOI Number: https://doi.org/10.30780/IJTRS.V06.I12.005
Abstract:

Digital production objectives to create rather customizable merchandise with higher nice and decrease costs with the aid of integrating Industrial Internet of Things, massive statistics analytics, cloud computing, and advanced robots into manufacturing vegetation. As manufacturing machines are more and more retrofitted with sensors as well as related through WIFI networks or stressed out Ethernet, digital manufacturing systems are getting more accessible than ever. While advancement in sensing, synthetic intelligence, and wireless technology permits a paradigm shift in production, cyber-assaults pose sizeable threats to the producing region. This paper provides a assessment of cybersecurity in digital production systems from system characterization, threat and vulnerability identification, manipulate, and hazard dedication components in addition to identifies demanding situations and future paintings.

Keywords: Digital manufacturing, cyber physical systems, security indicators, system sustainability, homeostasis, information security, self-similarity.