Pune, India


Pune, India
Time filter
Source Type

Kulkarni A.,PVGS COET | Lakhani K.,PVGS COET | Lokhande S.,PVGS COET
2016 5th International Conference on Reliability, Infocom Technologies and Optimization, ICRITO 2016: Trends and Future Directions | Year: 2016

In this paper, we present an approach which addresses the problem of drowning. Drowning is one of the leading causes of accidental deaths which needs to be given attention. The objective is to address the question-how can we engineer a system that saves the life of a drowning person? The devised system has the capability to automatically detect drowning by making use of three sensors, namely, a non-invasive oxygen saturation level sensor, respiration monitoring sensor and water sensor that are used for detecting parameters like blood oxygen saturation levels, respiratory movements and submersion of a person's body underwater respectively and a controller for monitoring, processing and controlling purposes. If any two of the above mentioned parameters detect drowning, the system detects it as a case of drowning. Results obtained by performing tests on individual sensors and entire system illustrate the effectiveness of the approach. Thus the approach is a viable solution to devise an innovative, portable, low cost and wearable system. © 2016 IEEE.

Dey T.,Indian Institute of Technology Bombay | Singdeo D.,Indian Institute of Technology Bombay | Deshpande J.,PVGs COET | Ghosh P.C.,Indian Institute of Technology Bombay
Energy Procedia | Year: 2014

Solid Oxide Fuel Cells is considered as the power source having potential to satiate electrical as well as thermal energy demands for domestic and commercial applications. Assembly of the SOFC structure is subjected to a wide range of pressures on the surface, resulting in normal force on the plates. The application of pressure causes deformation of composite sealant which exhibits plastic behavior at high operating temperature. The present study shows the effect of externally applied pressures on the contact pressure between cell components. The natures of stresses in the flow channels, gaskets and both electrodes have also been evaluated. This holds importance as a measure of safety for the electrodes. It is noted that significant stress generation occurs near to the edge where the channel makes contact with the electrode. The study highlights a safe pressure range (0.05 - 0.1 MPa) for operation of the SOFC under consideration. © 2014 The Authors.

Deshpande J.,PVGs COET | Dey T.,Indian Institute of Technology Bombay | Ghosh P.C.,Indian Institute of Technology Bombay
Energy Procedia | Year: 2014

Fuel cells find a wide range of applications ranging from table top power sources to auxiliary power units for cars and aircraft. For mobile applications, vibration becomes a crucial parameter. The study analyzes a cell of active area 150 X 200, for modal analysis. The frequencies determined from the study are ~500 Hz which are practically of greater importance. At these frequencies resonance near the gasket edges is detected from the mode shapes, which shows possible sites of hydrogen leakage. The reduction in torque at the bolt positions near the resonance sites is observed to be around 25% of the initial torque for 1 hours of study and 10g of acceleration. Contact pressure profile changes significantly after operation of the cell under vibrations. Using harmonic analysis for the obtained natural frequencies, estimation of hydrogen leakage can be performed. The study gives important insights into performance predictions of fuel cell over its operational lifetime in mobile units. © 2014 The Authors.

Nirgudkar S.S.,PVGs COET | Sarode U.B.,PVGs COET
International Conference on Energy Systems and Applications, ICESA 2015 | Year: 2015

This paper presents a simulation process for an alternator showing its performance characteristics with and without an automatic voltage regulator (AVR) connected to it as a part of work done for Project Stage I. Simulations were carried in MATLAB environment. The objective of this work was to get to know the effect of AVR on the system. The restoring capability of an AVR by changing the various load conditions and the level of excitation input to the system is seen. The simulation worked in two ways viz (a) With a constant mechanical input to the alternator, (b) With the mechanical input of the alternator controlled by AVR. The details of the results of the systems performance of the whole system are given in the following paper. Parallel to these simulations, hardware experimentation was also carried out. Experimental results were also obtained with laboratory set-up which will help to design the AVR. © 2015 IEEE.

Joshi M.,PVGs COET | Vaidya G.A.,PVGs COET
11th IEEE India Conference: Emerging Trends and Innovation in Technology, INDICON 2014 | Year: 2015

Photovoltaic (PV) systems are solar energy supply systems, which either supply power directly to an electrical equipment or feed energy into the public electricity grid. In the photovoltaic system, power electronic conversion is necessary to improve the efficiency of PV panels and system stability. In these systems, the backstage power circuit consists of a high step-up DC to DC converter and a full-bridge inverter to convert DC to AC, as the grid voltage is AC in nature. A low pass filter minimizes the Total Harmonic Distortion caused by inverter so that the system is within its acceptable limits. A feedback Control circuit is used in boost converter, so as to regulate the converter output voltage. Control circuit is required to get constant output voltage at load side as PV systems output voltage is continuously varying in nature. This paper highlights the analysis of single phase 1.8 kW Grid connected solar photovoltaic system. System model is formulated and simulation is carried out. © 2014 IEEE.

Shinde P.U.,JSPMs BSIOTR | Deshmukh S.R.,PVGs COET
11th IEEE India Conference: Emerging Trends and Innovation in Technology, INDICON 2014 | Year: 2015

Though electricity is getting traded as a commodity, the price of power is more volatile than any other commodity. The price of power is controlled by many unseen and random market driven factors, such as load-demand variation, attitude of market players, fuel price variation, availability of resources etc. Due to this, market participants get exposed to price-risk and their profitability gets affected. Hence since more than a decade, risk management has become an essential task for electrify market participants. In case of conventional generation, oil, coals are the major fuels. The variability of fuel price affects the price of power. In this paper, the effect of variability of fuel price on risk is analyzed. The objective of this paper is to minimize the risk associated with fuel - price variation using portfolio optimization method. This paper explains the concept of efficient frontier, a key feature of portfolio theory and its application in fuel - price risk minimization. The results are analyzed for different combinations of fuels such as coal and oil considering two approaches: Monthly Efficient Frontier and Daily Efficient Frontier. The work suggests the approach of using daily price variation to obtain optimum portfolio. © 2014 IEEE.

Mulay S.A.,Bharati Vidyapiths COE | Devale P.R.,Bharati Vidyapiths COE | Garje G.V.,PVGs COET
ICNIT 2010 - 2010 International Conference on Networking and Information Technology | Year: 2010

Support Vector Machines (SVM) are the classifiers which were originally designed for binary classification. The classification applications can solve multi-class problems. Decision-tree-based support vector machine which combines support vector machines and decision tree can be an effective way for solving multi-class problems in Intrusion Detection Systems (IDS). This method can decrease the training and testing time of the IDS, increasing the efficiency of the system. The different ways to construct the binary trees divides the data set into two subsets from root to the leaf until every subset consists of only one class. The construction order of binary tree has great influence on the classification performance. In this paper we are studying two decision tree approaches: Hierarchical multiclass SVM and Tree structured multiclass SVM, to construct multiclass intrusion detection system. © 2010 IEEE.

Walambe R.A.,PVGs COET | Apte A.A.,College of Engineering, Pune | Joshi V.A.,PVGs COET
2016 IEEE 7th International Symposium on Sensorless Control for Electrical Drives, SLED 2016 | Year: 2016

In the recent years many researchers have focused on the sensor-less PMSM drive technology, wherein, estimators are used to estimate rotor position and speed using line current measurement. EKF is a powerful tool for such an application. However, implementation of EKF based sensor-less control needs measurement of torque for faithful mathematical model [1], which hinders practical application of the scheme. In this paper, a scheme with load torque estimation using Non Linear Disturbance Observer (NLDO) [2] in cascade with EKF to eliminate load torque sensor is proposed. With this, the proposed sensor-less scheme eliminates position sensor as well as a torque sensor. © 2016 IEEE.

Kulkarni Y.A.,PVGs COET | Kaduskar R.G.,PVGs COET
Proceedings - 3rd International Conference on Emerging Trends in Engineering and Technology, ICETET 2010 | Year: 2010

Malicious code is any code added, changed, or removed from a software system in order to intentionally cause harm or subvert the intended function of the system. Though the problem of malicious code has a long history, a number of recent, widely publicized attacks and certain economic trends suggest that malicious code is rapidly becoming a critical problem for industry, government, and individuals. Once inside your network or workstation malicious code can enter network drives and propagate. However, just like pickpockets, online scammers follow the crowds. Given the ever-increasing number of people who use Facebook, MySpace, LinkedIn, Twitter and other social networking sites, it's no surprise that cyber criminals are increasingly targeting these services. They may use hacked Facebook accounts to send out messages containing links to malicious programs. Or send out 'tweets' containing links, but concealing the real destination by using a URL shortening service. Or they may simply masquerade as a friend stranded in a far-off country that is in desperate need of funds to get home. In this paper the authentic web transaction issues are discussed in connection with web sites. In these URL transactions: alphabets, logos, legitimate followers, flash applications and PDF are considered so as to detect malicious code and to provide the security against it. This paper further deals with two levels of security one for address translation and second for the data formats. © 2010 IEEE.

Kulkarni P.G.,PVG's COET | Sahasrabudhe A.D.,University of Pune
Journal of Mechanical Science and Technology | Year: 2014

In this paper a dynamic model is presented for predicting the vibration behavior of a ball bearing under the influence of localized defects on the outer race. The calculation of contact force is based on Hertzian contact deformation theory. The pulse generated by the ball striking the defect on outer race is modeled by using the blending functions of the cubic hermite spline. The effect of change in the angular position of the defect, size of the defect on outer race, multiple defects on outer race and the variation of load on the vibration amplitude is predicted by this model. A computer program in MATLAB is developed and the governing equation of motion is solved by Euler’s method. The numerical results are presented as a function of variation of the geometry of the outer race due to the impact at the defect and normal race contact w.r.t. time and the conclusion about the health of the bearing is determined by the spectral analysis. To validate the results, experimentation has also been performed. © 2014, The Korean Society of Mechanical Engineers and Springer-Verlag Berlin Heidelberg.

Loading PVGs COET collaborators
Loading PVGs COET collaborators