Acropolis Technical Campus

Indore, India

Acropolis Technical Campus

Indore, India
SEARCH FILTERS
Time filter
Source Type

In this case study, combined effect of various operating parameters on the performance of thermal power plant is analyzed. For the analysis following operating parameters are selected: different operating loads, different number of feed water heaters and different mass flow rates of makeup water. To analyze the performance of the power plant: flow function, mass flow rates of steam at each stage, power output, heat rate, correction factors for power and heat rate are evaluated. And then performance characteristic curves are prepared. Finally those operating conditions are found at which power output is as high as possible but heat rate is as low as possible. This case study can be concluded as maximum power (121.21 MW) and minimum heat rate (2,393.05 kJ/MW s) both can be achieved at full operating load condition, with five feed water heaters and no makeup water addition in deaerator. But minimum power (71.43 MW) and maximum heat rate (2,430.94 kJ/MW s) are found at low load, with large number of feed water heaters and more amount of makeup water addition. © 2016 The Author(s).


Saxena A.,Medi Caps Institute of Science and Technology | Satsangi C.S.,Medi Caps Institute of Science and Technology | Saxena A.,Acropolis Technical Campus
Proceedings of the 5th International Conference on Confluence 2014: The Next Generation Information Technology Summit | Year: 2014

This paper proposes a strategy to find optimal path to an object through multi agent system called swarm robots, inspired by biological swarm. The system is based on Master Slave concept where master robot guides the slave robots to choose most prominent optimal path to the object. Wireless Communication is the principal concept for collaboration among swarm robots. In this paper, Atmega8 microcontroller is used for intelligence among robots. LED-LDR and Ultrasonic sensors are used for environment sensing. Wireless module WIR-1186 provides wireless communication. The system works on the phenomena of light that always travels in a straight line, it helps to find out the optimal shortest path for goal hunting. © 2014 IEEE.


Arya L.D.,SGSITS | Choube S.C.,UIT | Arya R.,Acropolis Technical Campus | Tiwary A.,SGSITS
International Journal of Electrical Power and Energy Systems | Year: 2012

This paper describes a methodology for reliability assessment of electrical distribution system accounting random repair time omission for each section. A distributor segment in a distribution system has failure rate and repair time which decide mean up time (MUT) and mean down time (MDT) at load points. Usually the reliability analysis is based on exponential failure and repair laws. The repair time is a random variable. Certain values of repair times are smaller which may be neglected based on the tolerance time of consumers at each load point. Complete reliability analysis with repair time omission has been presented. Modified mean up time, mean down time and unavailability (h/year) have been obtained at each load point using state transition sampling technique. These have been obtained accounting outage due to random repair time omission. The methodology has been implemented on two distribution systems. © 2012 Elsevier Ltd. All rights reserved.


Mishra B.K.,Acropolis Technical Campus | Nikam M.C.,Acropolis Technical Campus | Lakkadwala P.,Acropolis Technical Campus
Proceedings - 2014 4th International Conference on Communication Systems and Network Technologies, CSNT 2014 | Year: 2014

A wireless sensor network consists of geologically distributed autonomous sensors to monitor and control over physical or environmental conditions, like temperature, sound, pressure etc. And this information is passed through sensors in the network to a next location. Military applications was required the development of security in wireless sensor networks. Today such networks are used in many areas like industrial, health, and commercial applications. Black hole attack is occurs, when an intermediary captures and re-programs a set of nodes in the network to block/drop the packets and generates false messages instead of forwarding correct/true information towards the base station in wireless sensor network. Nearby many techniques have been proposed in the literature for detection and prevention of black hole attack in sensor network. There are various solutions proposed in the literature which identifies black hole attack and provides successful delivery of data to the base station. The literature survey showing techniques suffers from very little false positives. Here our paper focuses on review on black hole attack and also elaborates security against black hole attack. We are suggesting some feasible security model to further enhancement to tackling of black hole attack in the wireless sensor network. © 2014 IEEE.


Jain S.,Acropolis Technical Campus
2013 Annual International Conference on Emerging Research Areas, AICERA 2013 and 2013 International Conference on Microelectronics, Communications and Renewable Energy, ICMiCR 2013 - Proceedings | Year: 2013

In order to suppress the Multiple-Access Interference (MAI) in the DS CDMA system, a new RAKE receiver based on parallel interference elimination is proposed in this paper. The multiple-access interference is evaluated by known user information and tentative decision. Then the performance over Rayleigh fading channel are analyzed and compared to convention PIC receiver and PIC RAKE receiver. It is shown that RAKE receiver performance can be improved greatly by using Parallel Interference Cancellation (PIC) method with simple structure and easy implementation [1]. © 2013 IEEE.


Arya R.,Acropolis Technical Campus | Tiwary A.,Shri G S Institute Of Technology And Science | Choube S.C.,Rajiv Gandhi Technical University | Arya L.D.,Shri G S Institute Of Technology And Science
International Journal of Electrical Power and Energy Systems | Year: 2013

Average interruption duration, interruption duration per year and failure rate at a load point are the basic reliability indices required to be evaluated. These indices depend on failure rate and average repair time of each feeder. Usually in reliability assessment of distribution system failure and repair rates are assumed constant. Further it has been observed that random outage time may be neglected at load point. This has been an important issue in determining the modified reliability indices accounting random outage time. Hence this paper presents a methodology to determine basic reliability indices subject to neglecting of certain repair time which is truly a random variable. The methodology is based on smooth boot strapping technique along with Monte Carlo simulation (MCS). The developed algorithm has been implemented on two sample test systems. The results obtained has been compared those with MCS and obtained with general boot strapping. © 2013 Elsevier Ltd. All rights reserved.


Arya R.,Acropolis Technical Campus
International Journal of Electrical Power and Energy Systems | Year: 2014

Usually the reliability performance of distribution systems is assessed based on basic reliability indices at load points i.e. failure rate, average interruption duration and unavailability expressed as interruption duration in hours/year. Now a days the distribution systems contain distribution generations (DG) which affects these reliability indices. Further a certain interruption duration which in fact is a random variable can be neglected. Hence this paper describes a simulation approach for evaluating the basic reliability indices incorporating DG and omitting a random interruption duration. The algorithm has been implemented on a sample test system. © 2014 Elsevier Ltd. All rights reserved.


Soni A.,Acropolis Technical Campus | Jain J.,Jaypee University of Engineering & Technology | Roshan R.,Rishiraj Institute of Technology
2013 International Conference on Intelligent Systems and Signal Processing, ISSP 2013 | Year: 2013

The Fractional Fourier transform (FrFT), as a generalization of the classical Fourier transform, was introduced many years ago in mathematics literature. For the enhanced computation of fractional Fourier transform, discrete version of FrFT came into existence i.e. DFrFT. This paper illustrates the advantage of discrete fractional Fourier transform (DFrFT) as compared to other transforms for steganography in image processing. The simulation result shows same PSNR in both domain (time and frequency) but DFrFT gives an advantage of additional stego key i.e. order parameter of this transform. © 2013 IEEE.


Sharma A.,Acropolis Technical Campus | Lakkadwala P.,Acropolis Technical Campus
Proceedings - 2014 3rd International Conference on Reliability, Infocom Technologies and Optimization: Trends and Future Directions, ICRITO 2014 | Year: 2015

Wireless Sensor Network (WSN) is a group of spatially distributed sensor nodes and is self organized and autonomous in nature. They are connected by wireless links. Routing in wireless sensor network is quite different from traditional wireless network, due to limitations of wireless sensor network. To overcome some of the limitations, UDP is being used for connection establishment, compromising the reliability of communication. In this research work, we have analyzed the performance of three routing protocols from different categories. We have analyzed the performance of AODV, Directed Diffusion and SPIN routing protocols in different wireless sensor network scenarios (varying number of nodes and network type), by using TCP, instead of UDP for connection establishment. © 2014 IEEE.


Upadhyay A.,Acropolis Technical Campus | Lakkadwala P.,Acropolis Technical Campus
Proceedings - 2014 3rd International Conference on Reliability, Infocom Technologies and Optimization: Trends and Future Directions, ICRITO 2014 | Year: 2015

Cloud Computing is a computing model which provide IT services, that could be found at everywhere at any time with Internet access. IT users can access these services dynamically over Internet by application software's like web browser and mobile app. Virtualization is the main key concept that is used in cloud computing to manage data centers and IT infrastructure. The necessary requirements to implement data centers which are based on cloud environments are remarkable deal of flexibility, availability and reliability. Virtualization technology can provide these kinds of services by live migration. Live migration allows flexibly transfer of virtual machine from one physical server to another physical server without obstructing the services running in virtual machine. In this survey, we studied the requirements of virtualization in cloud computing, live migration of virtual machine and security risks in live migration when transferring a virtual machine from one system server to another server. We discuss the security risks in virtual machine migration and solution approaches which are isolating the migration traffic, network security engine-hypervisor, and role based migration. © 2014 IEEE.

Loading Acropolis Technical Campus collaborators
Loading Acropolis Technical Campus collaborators