Journal Vol – 14 No -6, December 2019

INTEGRATION OF RENEWABLE ENERGY STORAGE USING HYBRID WIND AND SOLAR TECHNOLOGY

Authors:

M. Yousaf Ali Khan, Waqas Ali Khan, Abdul Basit, Asif Nawaz, Sadeeq Jan, Hamayun Khan, Sheeraz Ahmed

DOI NO:

https://doi.org/10.26782/jmcms.2019.12.00076

Abstract:

The use of energy storage devices and its technology has been the main focus to capture energy from sun and wind. This energy can be used during peak hours or when sun and wind resources are not available. Intermittent sources of energy play a significant part for this solution. Different storage technologies have been discussed in detail in this work. Hybrid Optimization Model for Electric Renewable (HOMER) PC demonstrating programming is being utilized to display the power framework, its physical conduct and its life cycle cost. Eight units of 850 kW wind turbines and 1 MW sunlight based PV modules were recognized as most practical to supply for 3MW load where the payback time of the framework is 3.4 years. Solar Simulink model has been made for graphical representation for its current and voltage relationship.

Keywords:

Solar Energy,Wind Energy,Hybrid System,Renewable Energy,

Refference:

I. Benedek, József, Tihamér-Tibor Sebestyén, and BlankaBartók.
“Evaluation of renewable energy sources in peripheral areas and
renewable energy-based rural development.” Renewable and
Sustainable Energy Reviews 90 (2018): 516-535.
II. Bertolotti, Fabio Paolo. “Wind power system for energy production.”
U.S. Patent 7,719,127, issued May 18, 2010.

III. Díaz-González, Francisco, Andreas Sumper, Oriol Gomis-Bellmunt,
and Roberto Villafáfila-Robles. “A review of energy storage
technologies for wind power applications.” Renewable and sustainable
energy reviews 16, no. 4 (2012): 2154-2171.
IV. European Wind Energy Association. The economics of wind energy.
EWEA, 2009.
V. Gwon, H, Hong J, Kim H, Seo D H, Jeon S, Kang, K., Recent progress
on flexible lithium rechargeable batteries. Energy & Environmental
Science 2014, 7 (2), pp. 538-551.
VI. International Renewable Energy Agency (IRENA), Renewable Energy
Technologies Cost Analysis Series, Volume 1: Power Sector, issue
55, wind Power, June 2012
VII. Kabir, Ehsanul, Pawan Kumar, Sandeep Kumar, Adedeji A. Adelodun,
and Ki-Hyun Kim. “Solar energy: Potential and future prospects.”
Renewable and Sustainable Energy Reviews 82 (2018): 894-900.
VIII. Koutroulis, Eftichios, George Petrakis, DionissiosHristopulos, Achilles
Tripolitsiotis, Nabila Halouani, Arij Ben Naceur, and Panagiotis
Partsinevelos. “Geo-Informatics for Optimal Design of Desalination
Plants Using Renewable Energy Sources: The DESiRES Platform
Paradigm.” In Advances in Remote Sensing and Geo Informatics
Applications, pp. 53-55. Springer, Cham, 2019.
IX. L.A. McFadden, P. Weissman, T. Johnson, Encyclopaedia of the Solar
System (Second Edition), New York: Academic Press, 2007.
X. National Energy Policy and Strategies of Pakistan, Ministry of Power
and Energy Government of Pakistan, October 2006, page 15.
XI. Non-Conventional Renewable Energy Tariff Announcement (Purchase
of electricity to the national grid under standard power purchase
agreements (SPPA) PUCSL for 2012 -2013.
XII. Ogawa, K. Toyota to Start Local Production of NiMH Battery Cells in
CHINA by end of 2016. Available online:
http://techon.nikkeibp.co.jp/atclen/news_en/15mk/030900433/
(accessed on 8 December 2017)
XIII. Solar Resource Assessment for Pakistan and the Maldives, Dave
Renne, Ray George, Bill Marion, Donna Heimiller. National
Renewable Energy Laboratory, August 2003, page 16.

XIV. Tareen, WajahatUllah Khan, ZuhaAnjum, Nabila Yasin, Leenah
Siddiqui, IfzanaFarhat, Suheel Abdullah Malik, SaadMekhilef et al.
“The prospective non-conventional alternate and renewable energy
sources in Pakistan—a focus on biomass energy for power generation,
transportation, and industrial fuel.” Energies 11, no. 9 (2018): 2431.
XV. Wind Energy Resource Atlas of Pakistan and the Maldives, D. Elliott,
M.Schwartz, G. Scott, S. Haymes, D. Heimiller, R. George. National
Renewable Energy Laboratory, August 2003, page 49.

View Download

INFORMATION DETERMINATION OF THE CONSTITUENTS OF WHITE BLOOD CELLS USING OPTICAL BIOSENSOR

Authors:

Sowmya Padukone.G, Uma Devi. H

DOI NO:

https://doi.org/10.26782/jmcms.2019.12.00077

Abstract:

Human body should resist against infections and also against infection causing organisms that enter our human body. In a human body for every microliter of blood, white blood cells has to range from 4,000 to 11,000 approximately. The main category of white blood cells are Neutrophils, Eosinophils, Basophils, Lymphocytes & Monocytes. In this paper, we are studying the characteristics of these different types of white blood cells & determining their Quality factors as well as transmission power analysis in a suitable Waveguide using Simulation results. The main immunity for the human body is provided by Neutrophils. It becomes very much necessary to know the properties , Information of these wbc’s which is a very important factor. This is determined by using an optical Biosensor.

Keywords:

Poweranalysis,Optical Biosensor,Waveguide,White Blood cells,Quality Factors,

Refference:

I. C.-F. So, Kup.-Sze. Choi, Tura. K. S. Wong, J. W. Y. Chung,
‘Recent advances in noninvasive glucose monitoring’, Medial.
Devices Evidence Res., vol. 5, pp. 45-52, 2012.
II. G Ongun, U Halici, K Atalay V Leblebicioglu, M Beksac, S. Beksac,
“Feature extraction and classificationof blood cells for an automated
differential blood count system”, Proc. IJCNN, vol. 4, pp. 2461-
2466, 2001.
III. Handin Robert I. Samuel E. Lux, Thomas P. Stossel, Blood:
‘Principles and Practice of Hematology, Philadelphia’:Lippincott
Williams and Wilkins, pp. 471, ISBN 9780781719933

IV. H. Michael. Heise, R. Winzen, Heinz. W. Siesler, Yukihiro. Ozaki,
S. Kawata, H. M. Heise, “Fundamental chemometric methods” in
Near Infrared Spectroscopy: Principles Instruments Applications,
Weinheim, Germany:Wiley, pp. 125-162, 2002.
V. Omid. Sarrafzadeh, H. Rabbani, A. M. Dehnavi, A. Talebi,
“Detecting different sub-types of acute myelogenous leukemia using
dictionary learning and sparse representation”, Image Processing
(ICIP) 2015 IEEE International Conference on, pp. 3339-3343,
2015.
VI. O. Olguin, Peter A. Gloor, Pentland, “Wearable sensors for
pervasive healthcare management”, Proc. 3rd International. Conf.
Pervasive Comput. Technol. Healthcare, pp. 1-4, 2009.
VII. M. Caldara, Claudio Colleoni, E. Guido, GluseppeRosace, Valerio.
Re, A. Vitali, “A wearable sensor platform to monitor sweat pH and
skin temperature”, Proc. IEEE Intl. Conf. Body Sensor Netw., pp. 1-
6, 2013.
VIII. S.S. Savkare, S.P. Narote, “Blood Cell Segmentation from
Microscopic Blood Images”, IEEE 2015 ICIP, pp. 502-505, 2015
IX. T. Anan et al., “High-speed 1.1-μm-range InGaAs VCSELs”, Proc.
Opt. Fiber Commun./Nat. Fiber Opt. Engineers Conf., pp. 1-3, 2008.
X. Z. J. V. Cohen, Shyqri. Haxha, A. Aggoun, “Pulse oximetry optical
sensor using oxygen-bound Haemoglobin”, Opt. Exp., volume. 24,
pp. 10115-10131, 2016.

View Download

CHALLENGES AND SOLUTIONS OF REAL-TIME CLUSTERING FOR NETWORK ANOMALY DETECTION

Authors:

Jagatheesan Kunasaikaran, Roslan Ismail, Abdul Rahim Ahmad

DOI NO:

https://doi.org/10.26782/jmcms.2019.12.00078

Abstract:

The escalating number of novel network attacks warrants an approach where network data is processed in real-time for anomaly detection. Clustering is one of the foremost unsupervised learning algorithms in this domain that can detect outliers without prior knowledge of the data. However, cluster analysis precludes with it many challenges that need to be overcome for it to be adapted for real-time computation. This research paper outlines these challenges and the possible solutions to mitigate these challenges. We have also explored on a brief overview of clustering algorithms to give a high-level idea of cluster analysis.

Keywords:

Clustering methods,Intrusion detection,Network security,

Refference:

I. T. Report, “2015 INFORMATION SECURITY,” (2015).
II. B. S. Everitt, S. Landau, M. Leese, and D. Stahl, Cluster Analysis. Wiley,
(2011).
III. A. Fahad, N. Alshatri, Z. Tari, A. Alamri, I. Khalil, A. Y. Zomaya, S.
Foufou, and A. Bouras, “IEEE TRANSACTIONS ON A Survey of
Clustering Algorithms for Big Data : Taxonomy and Empirical Analysis,”
vol. 2, no. 3, (2014).
IV. J. Leskovec, A. Rajaraman, and J. D. Ullman, Mining of Massive Datasets,
2nd ed. New York, NY, USA: Cambridge University Press, (2014).
V. M. Daszykowski and B. Walczak, “Density-Based Clustering Methods,”
Compr. Chemom., vol. 2, pp. 635–654, (2010).
VI. Z. Ruijuan, C. Jing, Z. Mingchuan, Z. Junlong, and W. Qingtao, “User
abnormal behavior analysis based on neural network clustering,” J. China
Univ. Posts Telecommun., vol. 23, no. 3, pp. 29–44, (2016).
VII. P. K. R. Oger and A. Zimek, “Clustering High-Dimensional Data : A
Survey on Subspace Clustering , Pattern-Based Clustering , and
Correlation Clustering,” vol. 3, no. 1, (2009).
VIII. G. Chandrashekar and F. Sahin, “A survey on feature selection methods,”
Comput. Electr. Eng., vol. 40, no. 1, pp. 16–28, (2014).

IX. P. Chaovalit, A. Gangopadhyay, G. Karabatis, and Z. Chen, “Discrete
wavelet transform-based time series analysis and mining,” ACM Comput.
Surv., vol. 43, no. 2, pp. 1–37, (2011).
X. G. E. Hinton and R. R. Salakhutdinov, “Reducing the Dimensionality of
Data with Neural Networks,” vol. 504, (2006).
XI. C. Visual, N. Index, C. Vni, and C. Vni, “The Zettabyte Era : Trends and
Analysis,” no. June, pp. 2016–2021, (2017).
XII. M. M. Gaber, A. Zaslavsky, and S. Krishnaswamy, “Mining Data
Streams : A Review,” vol. 34, no. 2, pp. 18–26, (2005).
XIII. R. Perdisci, D. Ariu, and G. Giacinto, “Scalable fine-grained behavioral
clustering of HTTP-based malware,” Comput. Networks, vol. 57, no. 2, pp.
487–500, (2013).
XIV. L. Khan, M. Awad, and B. Thuraisingham, “A new intrusion detection
system using support vector machines and hierarchical clustering,” VLDB
J., vol. 16, no. 4, pp. 507–521, (2007).
XV. Y. Dang, B. Wang, R. Brant, Z. Zhang, M. Alqallaf, and Z. Wu, “Anomaly
Detection for Data Streams in Large-Scale Distributed Heterogeneous
Computing Environments,” in ICMLG2017 5th International Conference
on Management Leadership and Governance, (2017), p. 121.
XVI. J. Song, H. Takakura, Y. Okabe, and K. Nakao, “Toward a more practical
unsupervised anomaly detection system,” Inf. Sci. (Ny)., vol. 231, pp. 4–
14, (2013).
XVII. J. Dromard, G. Roudière, and P. Owezarski, “Online and Scalable
Unsupervised Network Anomaly Detection Method,” IEEE Trans. Netw.
Serv. Manag., vol. 14, no. 1, pp. 34–47, (2017).
XVIII. Ã. C. Ning, C. An, and Z. Long-Xiang, “An Incremental Grid Density-Based
Clustering Algorithm,” vol.1313, no. 101, pp. 1–7, (2002).

View Download