Friday, January 31, 2020

MLTDD : USE OF MACHINE LEARNING TECHNIQUES FOR DIAGNOSIS OF THYROID GLAND DISORDER



Author :  Izdihar Al-muwaffaq

Affiliation :  Department of Computer Engineering, Kadir Has University

Country :  Turkey

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 5, November, 2016

ABSTRACT

Machine learning algorithms are used to diagnosis for many diseases after very important improvements of classification algorithms as well as having large data sets and high performing computational units. All of these increased the accuracy of these methods. The diagnosis of thyroid gland disorders is one of the application for important classification problem. This study majorly focuses on thyroid gland medical diseases caused by underactive or overactive thyroid glands. The dataset used for the study was taken from UCI repository. Classification of this thyroid disease dataset was a considerable task using decision tree algorithm. The overall prediction accuracy is 100% for training and in range between 98.7% and 99.8% for testing. In this study, we developed the Machine Learning tool for Thyroid Disease Diagnosis (MLTDD), an Intelligent thyroid gland disease prediction tool in Python, which can effectively help to make the right decision, has been designed using PyDev, which is python IDE for Eclipse.

Keyword :  Machine Learning, Thyroid diseases, CRT decision tree algorithm, PyDev, Python IDE.

For More Details :  https://airccj.org/CSCP/vol6/csit65207.pdf


Thursday, January 30, 2020

APPROACHES IN USING EXPECTATIONMAXIMIZATION ALGORITHM FOR MAXIMUM LIKELIHOOD ESTIMATION OF THE PARAMETERS OF A CONSTRAINED STATE SPACE MODEL WITH AN EXTERNAL INPUT SERIES



Author :  Chengliang Huang

Affiliation :  1Department of Electrical and Computer Engineering, Ryerson University Toronto

Country :  Canada

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 5, November, 2016

Abstract 
EM algorithm is popular in maximum likelihood estimation of parameters for state-space models. However, extant approaches for the realization of EM algorithm are still not able to fulfill the task of identification systems, which have external inputs and constrained parameters. In this paper, we propose new approaches for both initial guessing and MLE of the parameters of a constrained state-space model with an external input. Using weighted least square for the initial guess and the partial differentiation of the joint log-likelihood function for the EM algorithm, we estimate the parameters and compare the estimated values with the “actual” values, which are set to generate simulation data. Moreover, asymptotic variances of the estimated parameters are calculated when the sample size is large, while statistics of the estimated parameters are obtained through bootstrapping when the sample size issmall. The results demonstrate that the estimated values are close to the “actual” values.Consequently, our approaches are promising and can applied in future research.

Keyword :  State-Space Model, Maximum Likelihood Estimation, Expectation Maximization Algorithm, Kalman filtering and smoothing, Asymptotic variances, Bootstrapping

For More Details :  https://airccj.org/CSCP/vol6/csit65206.pdf


Wednesday, January 29, 2020

DETECTION OF AUTOMATIC THE VOT VALUE FOR VOICED STOP SOUNDS IN MODERN STANDARD ARABIC (MSA)



Author :  Sulaiman S. AlDahri

Affiliation :  King Abdulaziz City for Science and Technology, Riyadh

Country :  Saudi Arabia

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 5, November, 2016

ABSTRACT
Signal processing in current days is under studying. One of these studies focuses on speech processing. Speech signal have many important features. One of them is Voice Onset Time (VOT). This feature only appears in stop sounds. The human auditory system can utilize the VOT to differentiate between voiced and unvoiced stops like /p/ and /b/ in the English language. By VOT feature we can classify and detect languages and dialects. The main reason behind choosing this subject is that the researches in analyzing Arabic language in this field are not enough and automatic detection of VOT value in Modern Standard Arabic (MSA) is a new idea. In this paper, we will focus on designing an algorithm that will be used to detect the VOT value in MSA language automatically depending on the power signal. We apply this algorithm only on the voiced stop sounds /b/, /d/ and /d? /, and compare that VOT values automatically generated by the algorithm with the manual values calculated by reading the spectrogram. We created the corpus, and used CV-CV-CV format for each word, the target stop consonant is in the middle of word. The algorithm resulted in a high accuracy, and the error rate was 0.80%, 26.62% and 11.71% for the three stop voiced sounds /d/, /d? / and /b/ respectively . The standard deviation was low in /d/ sound because it is easy to pronounce, and high in /d? / sound because it is unique and difficult to pronounce.

Keyword :  Arabic, VOT, MSA, POA, TEO

For More Details :  https://airccj.org/CSCP/vol6/csit65205.pdf


Tuesday, January 28, 2020

A NEW APPROACH TO DTC METHOD FOR BLDC MOTOR ADJUSTABLE SPEED DRIVES


Author :  Fatih Korkmaz

Affiliation :  Department of Electric-Electronic Engineering, Çankırı Karatekin University, Uluyazı Kampüsü, Çankırı

Country :  Turkey

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 5, November, 2016

ABSTRACT

This paper proposes a new approach to direct torque control (DTC) method for brushless direct current (BLDC) motor drives. In conventional DTC method, two main reference parameters are used as: flux and torque. In this paper, the new approach has been proposed to improve the BLDC motor dynamic performance. A main difference from the conventional method of it was that only one reference parameter (speed) was used to control the BLDC motor and the second control parameter (flux) was obtained from speed error through the proposed control algorithm. Thus, the DTC performance has been especially improved on systems which need variable speed and torque during operation, like electric vehicles. The dynamic models of the BLDC and the DTC method have been created on Matlab/Simulink. The proposed method has been confirmed and verified by the dynamic simulations on different working conditions.

Keyword :  Brushless machines, Direct torque control, Vector control, Torque control

For More Details :  https://airccj.org/CSCP/vol6/csit65204.pdf



Monday, January 27, 2020

Analysis and Design of Microstrip Patch Antenna for Radar Communication



Author :  S. Palanivel Rajan & C. Vivek

Affiliation :  Department of Electronics and Communication Engineering, M.Kumarasamy College of Engineering, Karur, TN

Country :  Turkey

Category :  Electrical Engineering

Volume, Issue, Month, Year :  14, 2, March, 2019

ABSTRACT

This paper proposes a new approach to direct torque control (DTC) method for brushless direct current (BLDC) motor drives. In conventional DTC method, two main reference parameters are used as: flux and torque. In this paper, the new approach has been proposed to improve the BLDC motor dynamic performance. A main difference from the conventional method of it was that only one reference parameter (speed) was used to control the BLDC motor and the second control parameter (flux) was obtained from speed error through the proposed control algorithm. Thus, the DTC performance has been especially improved on systems which need variable speed and torque during operation, like electric vehicles. The dynamic models of the BLDC and the DTC method have been created on Matlab/Simulink. The proposed method has been confirmed and verified by the dynamic simulations on different working conditions.

Keyword :  Antenna Electromagnetic propagation Microstrip antenna Patch antenna

For More Details :  https://link.springer.com/article/10.1007/s42835-018-00072-y



Sunday, January 26, 2020

A COMPARATIVE OVERVIEW TO DTC FOR PMSM DRIVEN PURE ELECTRIC VEHICLES



Author :  Fatih Korkmaz

Affiliation :  Department of Electric-Electronic Engineering, Çankırı Karatekin University

Country :  Turkey

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 5, November, 2016

ABSTRACT

For many industrial applications that including electric motor, selecting of the appropriate motor type is keypoint for the application success and efficiency. This paper presents a comparative performance evaluation between direct torque controlled Brushless AC and Brushless DC motors which have been considered as traction motor on electric vehicles. Moreover, a short review to brushless AC and brushless DC motor technology and vector driver systems are also included. The main structure of the direct torque control method is presented and small-scale pure electric vehicle model is integrated to the motor control model. To make a fair comparison, the brushless AC and brushless DC motors modeled as having the same electrical parameters and simulated with same control model parameters. The simulation studies have shown that direct torque controlled brushless AC and brushless DC motors have similar performance as vehicle traction motor, and both motor types can be considered as a good candidate for electric vehicles applications.

Keyword :  PMSM motors, BLAC motor control, BLDC motor control, Electric vehicles, Direct Torque Control

For More Details :  https://airccj.org/CSCP/vol6/csit65203.pdf



Friday, January 24, 2020

PREDICTIVE ANALYTICS IN HEALTHCARE SYSTEM USING DATA MINING TECHNIQUES


Author :  Basma Boukenze

Affiliation :  Computer, Networks, Mobility and Modeling laboratory FST, Hassan 1st University, Settat

Country :  Morocco

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 5, November, 2016

Abstract

The health sector has witnessed a great evolution following the development of new computer technologies, and that pushed this area to produce more medical data, which gave birth to multiple fields of research. Many efforts are done to cope with the explosion of medical data on one hand, and to obtain useful knowledge from it on the other hand. This prompted researchers to apply all the technical innovations like big data analytics, predictive analytics, machine learning and learning algorithms in order to extract useful knowledge and help in making decisions. With the promises of predictive analytics in big data, and the use of machine learning algorithms, predicting future is no longer a difficult task, especially for medicine because predicting diseases and anticipating the cure became possible. In this paper we will present an overview on the evolution of big data in healthcare system, and we will apply a learning algorithm on a set of medical data. The objective is to predict chronic kidney diseases by using Decision Tree (C4.5) algorithm.

Keyword :  big data, big data analytics, machine learning, Healthcare, learning algorithm, C4.5

For More Details  :  https://airccj.org/CSCP/vol6/csit65201.pdf

Thursday, January 23, 2020

EMPLOYEES CHARACTERISTICS IN KNOWLEDGE TRANSFER AND PERFORMANCE


Author :  Saide

Affiliation :  Department of Information Management, National Taiwan University of Science and Technology (NTUST), Taiwan. Department of Information System, Institute Technology of Sepuluh Nopember (ITS), Surabaya

Country :  Indonesia

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 7, November, 2016

ABSTRACT

While most studies are concerned with the industry, but for non-profit organizations has not received much attention. Various have highlighted knowledge transfer (KT) for creates value, however an obstacle from the perspective among employees still exists. The main problem is still difficult because employees will not share their knowledge. This study investigated factors and develop that influence KT among employees of non-profit organizations in Indonesia. The survey 364 respondents were used, 325 were returned, and 39 were not returned. Likert and smart PLS to confirm construct. This paper conclude factors that helping others, trust, soft reward, and personality of employees motivation are factors which influencing the KT behaviour. Finally, the findings were discussed.

Keyword :  Knowledge Management (KM), Knowledge Transfer (KT), Knowledge Performance, Smart PLS, Employees Characteristics, Indonesia

For More Details :  https://airccj.org/CSCP/vol6/csit65407.pdf

MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING THE ADOPTION INTENTIONS OF PUBLIC CLOUD COMPUTING USING A PROPOSED INTEGRATED MODEL


Author :  Dr. Minimol Anil Job

Affiliation :  Assistant Professor, ITC Department, Faculty of Computer Studies, Arab Open University

Country :  Kingdom of Bahrain

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 7, November, 2016

ABSTRACT

The main objective of this research is to identify the factors influencing the intentions to adopt the public computing by the private sector firms. In this research the researcher examined the ten factors influencing the cloud computing adoption using a proposed integrated model which incorporates aspects of the Technology, Organization and Environment factors such as Complexity, Compatibility, Security Concerns, Trialability, Cost Saving, Top Management Support, Prior IT Experience, Organizational Readiness, Competitive Pressure and External Support. In order to test influencing factors a survey was conducted and one hundred and twenty two valid responses were received from IT decision makers from forty firms in different industries. The results revealed that the Compatibility, Cost Saving, Trialability and External Support are the main influential factors in the adoption intentions of public cloud computing. Future research could be built on this study by developing different model for each industry because each industry has unique characteristics that can influence the adoption of the technological innovations.

Keyword :  cloud computing, virtualization, security, Compatibility, Complexity, Trialability

For More Details :  https://airccj.org/CSCP/vol6/csit65406.pdf


Tuesday, January 21, 2020

IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS



Author :  Timotheos Aslanidis

Affiliation :  National Technical University of Athens, Athens

Country :  Greece

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 7, November, 2016

ABSTRACT

In an era where communication has a most important role in modern societies, designing efficient algorithms for data transmission is of the outmost importance. TDMA is a technology used in many communication systems such as satellites and cell phones. In order to transmit data in such systems we need to cluster them in packages. To achieve a faster transmission we are allowed to preempt the transmission of any packet in order to resume at a later time. Such preemptions though come with a delay in order to setup for the next transmission. In this paper we propose an algorithm which yields improved transmission scheduling. This algorithm we call MGA. We have proven an approximation ratio for MGA and ran experiments to establish that it works even better in practice. In order to conclude that MGA will be a very helpful tool in constructing an improved schedule for packet routing using preemtion with a setup cost, we compare its results to two other efficient algorithms designed by researchers in the past.

Keyword :  Communication networks, setup delay, preemption, packet routing

For More Details  :  https://airccj.org/CSCP/vol6/csit65405.pdf

A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED RSA SYSTEM



Author :  H. Elkamchouchi

Affiliation :  Dept. of Electrical engineering, Faculty of Engineering, Alexandria University

Country :  Egypt

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 7, November, 2016

ABSTRACT

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keyword :  Digital Signature, Fault tolerance, RSA Cryptosystem, Security Analysis

For More Details :  https://airccj.org/CSCP/vol6/csit65404.pdf

Sunday, January 19, 2020

A PROXY SIGNATURE SCHEME BASED ON NEW SECURE AUTHENTICATED KEY AGREEMENT PROTOCOL



Author :  H. Elkamchouchi

Affiliation :  Dept. of Electrical engineering, Faculty of Engineering, Alexandria University

Country :  Egypt

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 7, November, 2016

Abstract

Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy signer and then the proxy signer generates a signing message on behalf of the original signer. So far, the proxy signature scheme is only applied in a special duration, when the original signer is not in his office or when he travels outside. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties. In this paper, we propose a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on RSA cryptosystem.

Keyword :  Digital Signature, Proxy Signature, RSA, Key Agreement

For More Details :   https://airccj.org/CSCP/vol6/csit65403.pdf

Friday, January 17, 2020

AVOIDING DUPLICATED COMPUTATION TO IMPROVE THE PERFORMANCE OF PFSP ON CUDA GPUSAVOIDING DUPLICATED COMPUTATION TO IMPROVE THE PERFORMANCE OF PFSP ON CUDA GPUS

Author : Chao-Chin Wu

Affiliation : Department of Computer Science and Information Engineering, National Changhua University of Education

Country : Taiwan

Category : Computer Science & Information Technology

Volume, Issue, Month, Year : 6, 7, November, 2016


ABSTRACT 
Graphics Processing Units (GPUs) have been emerged as powerful parallel compute platforms for various application domains. A GPU consists of hundreds or even thousands processor cores and adopts Single Instruction Multiple Threading (SIMT) architecture. Previously, we have proposed an approach that optimizes the Tabu Search algorithm for solving the Permutation Flowshop Scheduling Problem (PFSP) on a GPU by using a math function to generate all different permutations, avoiding the need of placing all the permutations in the global memory. Based on the research result, this paper proposes another approach that further improves the performance by avoiding duplicated computation among threads, which is incurred when any two permutations have the same prefix. Experimental results show that the GPU implementation of our proposed Tabu Search for PFSP runs up to 1.5 times faster than another GPU implementation proposed by Czapiński and Barnes.  

KEYWORDS 
GPU, CUDA, Parallel algorithm, Tabu Search, Permutation Flowshop Scheduling Problem  

For More Details : https://airccj.org/CSCP/vol6/csit65402.pdf

Monday, January 13, 2020

“USABILITY TESTING IN MOBILE APPLICATIONS INVOLVING PEOPLE WITH DOWN SYNDROME: A LITERATURE REVIEW”


Author :  Doris Cáliz

Affiliation :  Department ETSIINF, DLSIIS, Madrid Polytechnic University

Country :  Spain

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 7, November, 2016

ABSTRACT

We present a review of research related to the usability testing of mobile applications including participants with Down syndrome. The purpose is to identify good usability testing practices and possible guidelines for this process when participants are people with this cognitive disability. These practices and guidelines should account for their specific impairments. We applied document analysis techniques to searches of scientific databases. The results were filtered considering how well they matched the research topic. We processed and reported the classified and summarized results. The main findings of this literature review is that mobile applications usability testing including people with Down syndrome is an issue that has not be comprehensively investigated. While there is some related research, this is incomplete, and there is no single proposal that takes on board all the issues that could be taken into account. Consequently, we propose to develop guidelines on the usability testing process involving participants with Down syndrome.

Keyword :  Usability Testing, Mobile Applications, Cognitive Disability, Down Syndrome, Human Computer Interaction (HCI), Mobile Devices.

For More Details :  https://airccj.org/CSCP/vol6/csit65401.pdf

Sunday, January 12, 2020

BIG GRAPH: TOOLS, TECHNIQUES, ISSUES, CHALLENGES AND FUTURE DIRECTIONS


Author :  Dhananjay Kumar Singh

Affiliation :  Department of Computer Science & Engineering National Institute of Technology Silchar Assam

Country :  India

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 9, November, 2016

ABSTRACT

Analyzing interconnection structures among the data through the use of graph algorithms and graph analytics has been shown to provide tremendous value in many application domains (like social networks, protein networks, transportation networks, bibliographical networks, knowledge bases and many more). Nowadays, graphs with billions of nodes and trillions of edges have become very common. In principle, graph analytics is an important big data discovery technique. Therefore, with the increasing abundance of large scale graphs, designing scalable systems for processing and analyzing large scale graphs has become one of the timeliest problems facing the big data research community. In general, distributed processing of big graphs is a challenging task due to their size and the inherent irregular structure of graph computations. In this paper, we present a comprehensive overview of the state-of-the-art to better understand the challenges of developing very high-scalable graph processing systems. In addition, we identify a set of the current open research challenges and discuss some promising

directions for future research.


Keyword :  Big Data, Big Graph, Graph Processing, Graph Analytics, Graph Parallel Computing, Distributed Processing, Graph Algorithms

For More Details : https://airccj.org/CSCP/vol6/csit65611.pdf

Friday, January 10, 2020

DESIGN OF IEEE 1149.1 TAP CONTROLLER IP CORE


Author :  Shelja A S

Affiliation :  Department of Electronics and Communication Engineering, NCERC

Country :  India

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 9, November, 2016

Abstract
An implementation of IEEE 1149.1 TAP controller is presented in this paper. JTAG is an established technology and industry standard for on-chip boundary scan testing of SoCs. JTAG TAP controllers are becoming a delivery and control mechanism for Design For Test. The objective of this work is to design and implement a TAP controller IP core compatible with IEEE 1149.1-2013 revision of the standard. The test logic architecture also includes the Test Mode Persistence controller and its associated logic. This work is expected to serve as a ready to use module that can be directly inserted in to a new digital IC designs with little modifications.

Keyword :  IP core; IEEE 1149.1, TAP; TMP controller; JTAG; boundary scan; DFT

For More Details :  https://airccj.org/CSCP/vol6/csit65610.pdf

Thursday, January 9, 2020

IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION


Author :  Sruthi.N

Affiliation :  Student, VLSI DESIGN, Department of Electronics and Communication Engineering, NCERC, University of Calicut

Country :  Calicut

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 9, November, 2016

ABSTRACT

In the present era of e-world where security has got a larger weightage, cryptography has its role to play. Nowadays, the devices available in the market are of resource constrained type. Hence we need lightweight ciphers for the efficient encryption of data thereby increasing the performance. In this project a detailed study of HIGHT cryptographic algorithm is done which outperforms standard algorithms. HIGHT is an ISO Standard block cipher which has 64-bit block length and 128-bit key length. HIGHT was designed to be proper for the implementation in the low resource environment such as WSN, WBN, RFID tag or tiny ubiquitous devices. It is implemented on Spartan 6 FPGA evaluation kit and performance metrics are found out. A HIGHT cryptocore is being designed, characterized and implemented which will be a reference platform for hardware design engineers to model devices which require lightweight characteristics.

Keyword :  HIGHT, Lightweight cryptography, low resource devices, FPGA


Wednesday, January 8, 2020

CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE VULNERABILITIES IN WIRELESS SENSOR NETWORKS


Author :  Bharat Bhushan

Affiliation :  Department of Computer Engineering, BIT Mesra, Ranchi

Country :  India

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  6, 9, November, 2016

Abstract :

Data Aggregation is a vital aspect in WSNs (Wireless Sensor Networks) and this is because it reduces the quantity of data to be transmitted over the complex network. In earlier studies authors used homomorphic encryption properties for concealing statement during aggregation such that encrypted data can be aggregated algebraically without decrypting them. These schemes are not applicable for multi applications which lead to proposal of Concealed Data Aggregation for Multi Applications (CDAMA). It is designed for multi applications, as it provides secure counting ability. In wireless sensor networks SN are unarmed and are susceptible to attacks. Considering the defence aspect of wireless environment we have used DYDOG (Dynamic Intrusion Detection Protocol Model) and a customized key generation procedure that uses Digital Signatures and also Two Fish Algorithms along with CDAMA for augmentation of security and throughput. To prove our proposed scheme’s robustness and effectiveness, we conducted the simulations, inclusive analysis and comparisons at the ending

Keyword :  Concealed Data Aggregation, Digital Signatures, DYDOG, Wireless Sensor Networks.



Tuesday, January 7, 2020

Combination of Novel Converter Topology and Improved MPPT Algorithm for Harnessing Maximum Power from Grid Connected Solar PV Systems

Author : B. Praveen Kumar

Affiliation :  Department of Electrical and Electronic EngineeringKamaraj College of Engineering and TechnologyMaduraiCountry :  India

Category :  Electrical Engineering

Volume, Issue, Month, Year :  14, 2, March, 2019

Abstract :

It is a difficult task to utilize the power from the solar PV connected to utility grid effectively due to its lower efficiency. Hence, a new power electronic topology with maximum power point tracking (MPPT) algorithm is needed to reduce the losses thereby obtaining the maximum power from solar PV system. Direct energy transfer is implemented to transfer the rated solar power to the utility grid, the rest is fed to the converter and used for DC loads. In this work, a reversed buck-boost converter topology with parallel power processing concept is used efficiently and a multiple perturbation and observation (MP&O) based MPPT algorithm is proposed to achieve the global maximum power point (GMPP). And also boost inverter topology is employed by which the power from PV is supplied to the utility grid. The proposed method is simulated using MATLAB/SIMULINK and implemented in hardware. The simulation and experimental results of the proposed MP&O technique provide maximum AC power as well as DC power even in low irradiance and partial shading conditions of the solar PV array compared to the existing techniques.

Keyword 

Photovoltaic Maximum power point tracking Buck-boost converter Utility grid

x