SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
DOI : 10.5121/ijist.2014.4315 115
SECURED WIRELESS POWER
TRANSMISSION USING RADIO FREQUENCY
SIGNAL
B. Renil Randy1
, M.Hariharan2
, R. Arasa Kumar3
1,2
UG Students, 3
Assistant Professor
Velammal College of Engineering and Technology, Madurai
ABSTRACT:
Anything we transmit without protection is being raid by the intruders. Hence it is necessary to impart
security to the signal transmitted. In this paper we present the concept of giving security to the transmitted
power signal which is to be received by a receiver in a wireless medium. The present techniques of wireless
power transmission consists of a pair of strongly magnetically coupled resonators that allow power
transmission of tens of watts over a few meters, but anything without security becomes unreliable. With the
goal in achieving security to the power signal, we introduce the concept of encryption decryption algorithm
using RF module.
1. INTRODUCTION:
The inspiration for wireless power comes from wires being cumbersome and messy. With the
numerous number of mobile electronics that we use today, there is a huge demand for
convenience in supervision of their power supplies. Wireless communication hasmade a massive
developmentin the way we interact with communication devices. We also observe that while the
techniques of strongly coupled magnetic resonances allowefficient power transfer between a pair
of transmitter and receiver coils, the efficiency greatlydeclines upon adding more receivers to the
strongly coupled system due to theinteraction between multiple coupled resonators. In tightly
coupled resonant wirelesspower transfer, we require a one to one contact between transmitter
andreceiver. In addition, in order to improve efficiency of power transfer, we intend to use a
lower switching frequency to drive the gate of the MOSFET.
2. WIRELESS POWER TRANSMISSION (WPT) SYSTEM:
We cannot imagine the world without electric power. Normally the power is transmitted through
wires. This paper depicts an idea to eradicate the hazardous usage of electrical wires which
involve lot of confusion in particularly organizing them. Wireless Power Transmission system
would completely eliminate the dynamic high-tension power transmission cables, towers and
secondary stations between the generating station and consumers and facilitates the
interconnection of electrical generation plants on global scale. Mobile transmitters and receivers
can be chosen for the Wireless Power Transmission system. The cost for transmission and
distribution will be reduced and the cost of electrical energy for the consumers also would be
diminished. The power could also be transmitted to the places where the wired transmission is not
possible.
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
116
2.1.VARIOUS SCHEMES OF WIRELESS POWER TRANSFER:
There are many techniques which are being used to achieve wireless power transfer. Some of the
methods are being discussed below.
2.1.1. WPT using Microwaves:
In the transmission side, the microwave power source generates microwave power and the output
power is managed by electronic restrain circuits. The purpose of the tuner is to match the
impedance between the transmitting antenna and the microwave source. The attenuated signals
gets divided based on the direction of signal propagation by Directional Coupler. The transmitting
antenna emits the power uniformly through free space to the rectenna. In the receiving section, a
rectenna receives the transmitted power and translates the microwave power to DC power. The
impedance matching circuit and the filter is provided for setting the output impedance of a signal
source equal to the rectifying circuit. The rectifying circuit haveSchottky barrier diodes which
converts the received microwave power into DC power.
2.1.2. WPT using Magnetic Resonance:
In this technique, at first we design an oscillator, which generates the carrier signal to transmit
the power. Oscillators are not usually designed to deliver power, thus a power amplifier is added
to the oscillator to amplify the oscillating signal. The power amplifier would hand over the output
power to the transmission coil. Next, a receiver coil is constructed to receive the transmitted
power. However, the power received in the receiver side have an alternating current. Thus, a
rectifier is needed to rectify the AC voltage. Finally, an electric load is attached to finish the entire
circuit design.
Figure1. WPT using Magnetic Resonance
2.1.3WPT using Space Solar power (SSP)Satellites:
In this method, there are two basic WPT options, one is using radio waves and the other is using
light waves, are considered for both long term and short term Space Solar power applications. In
the long term, power is transferred to Earth from Geostationary earth orbit (GEO), or further
distances in the space. In the near term the power is being transmitted to the moderate distances.
By using SSP and WPT technology in near term space science and exploration missions, larger
systems are being designed and developed to send power from space to Earth.
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
117
3. BLOCK DIAGRAM:
The block diagram for the overall wireless power transceiver is given in the following figure(Fig.
1)
Figure 2. Overall Block Diagram of Wireless power Transceiver
4. TRANSMITTER:
The following diagram gives the entire transmitter section of the Wireless Power Transmission.
The 230V alternating current is fed to the transformer is rectified with bridge rectifier in which
the alternating current is converted to Direct Currentand it is filtered and regulated with the
voltage regulator. The flow of the signal without any interrupt to the transmitter input is denoted
by an LED. It consists of a RESET switch denoted by which is used to reset the programming
codes in the picmicrocontroller. The signal is given to the PIC microcontroller PIC16F877A
which has 40 pins and it has 5 input output pins and fifteen interrupts and its stability is
maintained with a crystal oscillator circuit. This signal will be controlled by the pic
microcontroller and the status of the signal is being informed with a help of an LCD display. This
signal is being transferred to the RF module through MAX 232. Four MOSFET switches are
being connected to each other so that current can pass through, by the switching between the ON
and OFF states and the passcode will be generated in MAX 232 and sent through RFtransmitter.
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
118
Figure 3. Transmitter diagram
5. RECEIVER:
The receiver operation is just the vice versa of the transmitter. The signal is being received to the
receiving antenna from the transmitting antenna. The signalthat transmitted from the RF
transmitter will reachesthe RF module at the receiver. There is no separate power supply for the
receiver section. The current induced in the induction coil is given to the secondary coil of the
transformer. In the receiver section, only one MOSFET switch is used which allows current only
in the ON state ie, when the signal reaches the RF receiver it will send the passcode to the MAX
232 when the passcode matches then it will trigger the circuit and makes MOSFET switch in ON
condition. The current passes to ensure that only the authenticated receiver receives the power
signal.
Figure 4. Receiver diagram
6. RESULTS:
From the plots given, we come to infer that efficiency of the system has been increased using
various parameters when compared to that of the efficiencies of the existing system. Thus the
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
118
Figure 3. Transmitter diagram
5. RECEIVER:
The receiver operation is just the vice versa of the transmitter. The signal is being received to the
receiving antenna from the transmitting antenna. The signalthat transmitted from the RF
transmitter will reachesthe RF module at the receiver. There is no separate power supply for the
receiver section. The current induced in the induction coil is given to the secondary coil of the
transformer. In the receiver section, only one MOSFET switch is used which allows current only
in the ON state ie, when the signal reaches the RF receiver it will send the passcode to the MAX
232 when the passcode matches then it will trigger the circuit and makes MOSFET switch in ON
condition. The current passes to ensure that only the authenticated receiver receives the power
signal.
Figure 4. Receiver diagram
6. RESULTS:
From the plots given, we come to infer that efficiency of the system has been increased using
various parameters when compared to that of the efficiencies of the existing system. Thus the
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
118
Figure 3. Transmitter diagram
5. RECEIVER:
The receiver operation is just the vice versa of the transmitter. The signal is being received to the
receiving antenna from the transmitting antenna. The signalthat transmitted from the RF
transmitter will reachesthe RF module at the receiver. There is no separate power supply for the
receiver section. The current induced in the induction coil is given to the secondary coil of the
transformer. In the receiver section, only one MOSFET switch is used which allows current only
in the ON state ie, when the signal reaches the RF receiver it will send the passcode to the MAX
232 when the passcode matches then it will trigger the circuit and makes MOSFET switch in ON
condition. The current passes to ensure that only the authenticated receiver receives the power
signal.
Figure 4. Receiver diagram
6. RESULTS:
From the plots given, we come to infer that efficiency of the system has been increased using
various parameters when compared to that of the efficiencies of the existing system. Thus the
119
concept of presenting the idea of providing security to the transmitted signal in the wireless
medium and receiving is attained is done for a limited space in small scale. This would also
become base for the further research in transmitting and receiving signals in a large scale through
anyone one of the above listed techniques.
Table 1. Result of current by varying distance of receiver
Distance
(feet)
Voltage
(Volts)
Current
(mA)
3 4 500
2 4.5 550
1 5 600
0.5 5.5 750
Maximum
closest
position
6 1000
From the above observations, the power transferred from the transmitter to the receiver is
maximum at the closest position and when the distance between them is increased, the power
received in the receiver gets reduced.
When the transmitter is switched to the port of the receiver A, we are able to observe that the
LED on the receiver A glows and the LED in the receiver coil B doesn’t glow since receive B is
not the authenticated user to use the power signal. Any metal sheet obstacle when placed between
120
the transmitter and the receiver, it is found that the power is transmitted to the authenticated user
as the metal sheet is a conductor.
Table 2. Result of temperature with varying distance
Distance (feet) Temperature (°C)
3 27
2 27.7
1 28.2
0.5 29.5
Maximum closest position 30
From the above tabulation, we find that the temperature in the receiver coil gets increased when
the when the distance the distance between the transmitter and the receiver is decreased
Table 3. Result on transmitter coil heating
PWM On duty Time Transmitter coil heating
(°C)
100% 45
90% 43
80% 41
70% 40
60% 38
From the above observations, we find that at the temperature of the transmitter coil is high
when the ON duty time of the Pulse width modulation (PWM) is maximum.
121
When the transmitter is neither switched to the receiver of port A nor port B ie, the switch is held
in the middle. Then both the receiver A and B can't receive the power since both the receivers are
not authenticated even though the power is transmitted in the air and the coil induces it. The four
MOSFET which is being connected in series helps in switching the current. The amount of power
received in the receiver varies when the distance between the transmitter and the receiver varies
as discussed.
7. CONCLUSION:
We have placed two receivers with decoders which decodes the passcode given as coding to the
RF module in the transmitter section. The receiver which has the matched passcode decoded has
received the power signal successfully. The receiver with the decoder decoding a passcode
mismatch failed to receive the power signal. Our project can also be implemented in Online
Electric Vehicle (OLEV). OLEV wireless charging system consists of a road-side Power Inverter
to bring electricity from the grid to the road embedded power tracks. A proprietary Roadway
Infrastructure consisting of Road-embedded Power tracks installed at selected locations of the
route.A proprietary Pick-Up and Regulator kit for the wireless power transfer installed in or under
the electric vehicle. Hence in this system the unauthorised users are denied permission to use the
power source using the key idea of the project.
122
REFERENCES:
[1] S. Kopparthi, Pratul K. Ajmera, "Power delivery for remotely located Microsystems,"
[2] Proc. of IEEE Region 5, 2004 Annual Tech. Conference, 2004 April 2, pp. 31-39.
[3] Nikola Tesla, “The Transmission of Electrical Energy Without Wires as a Means for Furthering
Peace,” Electrical World and Engineer. Jan. 7, p. 21, 1985.
[4] T. Deyle and M. Reynolds, “Surface based wireless power transmission and bidirectional
communication for autonomous robot swarms” in Proceedings IEEE Conference on Robotics, 2008.
[5] M. Ghovanloo, et al., “A Wide-band Power-efficient Inductive Wireless Link for Implantable
Microelectronic Devices Using Multiple Carriers,” IEEE Trans. Circuits and Systems, vol. 54, no. 10,
October 2007.
[6] K. M. Silay, et al., “Improvement of Power Efficiency of Inductive Links for Implantable Devices,”
Research in Microelectronics and Electronics, pp. 229-232, June 2008.
AUTHORS:
B. Renil Randy is doing his B.E. degree in Velammal College of Engineering and
Technology, Madurai, India. He is interested in the area of Wireless Communication and
Signal Processing.
M. Hariharanis doing his B.E. degree in Velammal College of Engineering and
Technology, Madurai, India. He is intere sted in the area of Wireless Communication and
specialized in Wireless Power Transmission.
R. Arasa Kumar,M.E.is working as Assistant Professor in Velammal College of
Engineering and Technology, Madurai. He also has teachin g experience at Kalasalingam
Institute of Technology, Krishnakoil. He was graduated at MepcoSchlenk Engineering
College, Sivakasi.

Weitere ähnliche Inhalte

Was ist angesagt?

FIND TRANSMISSION LINE FAULT AND LOCATION DETECTION
FIND  TRANSMISSION  LINE  FAULT  AND  LOCATION  DETECTIONFIND  TRANSMISSION  LINE  FAULT  AND  LOCATION  DETECTION
FIND TRANSMISSION LINE FAULT AND LOCATION DETECTIONMdSaifuddinQuader
 
Wireless Power Transmission for Mobile Charging
Wireless Power Transmission for Mobile ChargingWireless Power Transmission for Mobile Charging
Wireless Power Transmission for Mobile ChargingIRJET Journal
 
eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)IISRT
 
Mini Project 1 - Amplitude Shift Keying (ASK) Modulator
Mini Project 1  -  Amplitude Shift Keying (ASK) ModulatorMini Project 1  -  Amplitude Shift Keying (ASK) Modulator
Mini Project 1 - Amplitude Shift Keying (ASK) ModulatorAIMST University
 
To control the pwm dc motor using ic555 timer
To control the pwm dc motor using ic555 timerTo control the pwm dc motor using ic555 timer
To control the pwm dc motor using ic555 timerVINAY KUMAR GUDELA
 
During Damping of Low Frequency Oscillations in Power Systems with Fuzzy UPFC...
During Damping of Low Frequency Oscillations in Power Systems with Fuzzy UPFC...During Damping of Low Frequency Oscillations in Power Systems with Fuzzy UPFC...
During Damping of Low Frequency Oscillations in Power Systems with Fuzzy UPFC...IJMER
 
28 GHz balanced pHEMT VCO with low phase noise and high output power performa...
28 GHz balanced pHEMT VCO with low phase noise and high output power performa...28 GHz balanced pHEMT VCO with low phase noise and high output power performa...
28 GHz balanced pHEMT VCO with low phase noise and high output power performa...IJECEIAES
 
Communication system 1 chapter 1 ppt
Communication system 1 chapter  1 pptCommunication system 1 chapter  1 ppt
Communication system 1 chapter 1 pptBetelihemMesfin1
 
Wcdma p&o-c-en-wireless technology-2-201006-24
Wcdma p&o-c-en-wireless technology-2-201006-24Wcdma p&o-c-en-wireless technology-2-201006-24
Wcdma p&o-c-en-wireless technology-2-201006-24Jose Asuncion Silva Vasquez
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
DESIGN OF HIGH EFFICIENCY TWO STAGE POWER AMPLIFIER IN 0.13UM RF CMOS TECHNOL...
DESIGN OF HIGH EFFICIENCY TWO STAGE POWER AMPLIFIER IN 0.13UM RF CMOS TECHNOL...DESIGN OF HIGH EFFICIENCY TWO STAGE POWER AMPLIFIER IN 0.13UM RF CMOS TECHNOL...
DESIGN OF HIGH EFFICIENCY TWO STAGE POWER AMPLIFIER IN 0.13UM RF CMOS TECHNOL...VLSICS Design
 
Negative resistance amplifier circuit using GaAsFET modelled single MESFET
Negative resistance amplifier circuit using GaAsFET modelled single MESFETNegative resistance amplifier circuit using GaAsFET modelled single MESFET
Negative resistance amplifier circuit using GaAsFET modelled single MESFETTELKOMNIKA JOURNAL
 
Frequency Controlled Protection Scheme to Protect the Theft of Electric Power...
Frequency Controlled Protection Scheme to Protect the Theft of Electric Power...Frequency Controlled Protection Scheme to Protect the Theft of Electric Power...
Frequency Controlled Protection Scheme to Protect the Theft of Electric Power...IOSR Journals
 

Was ist angesagt? (17)

FIND TRANSMISSION LINE FAULT AND LOCATION DETECTION
FIND  TRANSMISSION  LINE  FAULT  AND  LOCATION  DETECTIONFIND  TRANSMISSION  LINE  FAULT  AND  LOCATION  DETECTION
FIND TRANSMISSION LINE FAULT AND LOCATION DETECTION
 
Wireless Power Transmission for Mobile Charging
Wireless Power Transmission for Mobile ChargingWireless Power Transmission for Mobile Charging
Wireless Power Transmission for Mobile Charging
 
eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)
 
Mini Project 1 - Amplitude Shift Keying (ASK) Modulator
Mini Project 1  -  Amplitude Shift Keying (ASK) ModulatorMini Project 1  -  Amplitude Shift Keying (ASK) Modulator
Mini Project 1 - Amplitude Shift Keying (ASK) Modulator
 
To control the pwm dc motor using ic555 timer
To control the pwm dc motor using ic555 timerTo control the pwm dc motor using ic555 timer
To control the pwm dc motor using ic555 timer
 
FM Transmitter
FM TransmitterFM Transmitter
FM Transmitter
 
During Damping of Low Frequency Oscillations in Power Systems with Fuzzy UPFC...
During Damping of Low Frequency Oscillations in Power Systems with Fuzzy UPFC...During Damping of Low Frequency Oscillations in Power Systems with Fuzzy UPFC...
During Damping of Low Frequency Oscillations in Power Systems with Fuzzy UPFC...
 
Wireless charging scheme for medium power range application systems
Wireless charging scheme for medium power range application systemsWireless charging scheme for medium power range application systems
Wireless charging scheme for medium power range application systems
 
28 GHz balanced pHEMT VCO with low phase noise and high output power performa...
28 GHz balanced pHEMT VCO with low phase noise and high output power performa...28 GHz balanced pHEMT VCO with low phase noise and high output power performa...
28 GHz balanced pHEMT VCO with low phase noise and high output power performa...
 
ISLANDING DETECTION TECHNIQUE FOR DISTRIBUTED GENERATION SYSTEM
ISLANDING DETECTION TECHNIQUE FOR DISTRIBUTED GENERATION SYSTEMISLANDING DETECTION TECHNIQUE FOR DISTRIBUTED GENERATION SYSTEM
ISLANDING DETECTION TECHNIQUE FOR DISTRIBUTED GENERATION SYSTEM
 
Communication system 1 chapter 1 ppt
Communication system 1 chapter  1 pptCommunication system 1 chapter  1 ppt
Communication system 1 chapter 1 ppt
 
Wcdma p&o-c-en-wireless technology-2-201006-24
Wcdma p&o-c-en-wireless technology-2-201006-24Wcdma p&o-c-en-wireless technology-2-201006-24
Wcdma p&o-c-en-wireless technology-2-201006-24
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
main
mainmain
main
 
DESIGN OF HIGH EFFICIENCY TWO STAGE POWER AMPLIFIER IN 0.13UM RF CMOS TECHNOL...
DESIGN OF HIGH EFFICIENCY TWO STAGE POWER AMPLIFIER IN 0.13UM RF CMOS TECHNOL...DESIGN OF HIGH EFFICIENCY TWO STAGE POWER AMPLIFIER IN 0.13UM RF CMOS TECHNOL...
DESIGN OF HIGH EFFICIENCY TWO STAGE POWER AMPLIFIER IN 0.13UM RF CMOS TECHNOL...
 
Negative resistance amplifier circuit using GaAsFET modelled single MESFET
Negative resistance amplifier circuit using GaAsFET modelled single MESFETNegative resistance amplifier circuit using GaAsFET modelled single MESFET
Negative resistance amplifier circuit using GaAsFET modelled single MESFET
 
Frequency Controlled Protection Scheme to Protect the Theft of Electric Power...
Frequency Controlled Protection Scheme to Protect the Theft of Electric Power...Frequency Controlled Protection Scheme to Protect the Theft of Electric Power...
Frequency Controlled Protection Scheme to Protect the Theft of Electric Power...
 

Andere mochten auch

Performance analysis of gate misaligned triple
Performance analysis of gate misaligned triplePerformance analysis of gate misaligned triple
Performance analysis of gate misaligned tripleijistjournal
 
Reducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive thresholdReducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive thresholdijistjournal
 
A zigbee and embedded based security
A zigbee and embedded based securityA zigbee and embedded based security
A zigbee and embedded based securityijistjournal
 
Investigational insight on gaussian
Investigational insight on gaussianInvestigational insight on gaussian
Investigational insight on gaussianijistjournal
 
Force sensitive resistance based heart beat
Force sensitive resistance based heart beatForce sensitive resistance based heart beat
Force sensitive resistance based heart beatijistjournal
 
Identifying the semantic relations on
Identifying the semantic relations onIdentifying the semantic relations on
Identifying the semantic relations onijistjournal
 
An embedded module as “virtual tongue”
An embedded module as “virtual tongue”An embedded module as “virtual tongue”
An embedded module as “virtual tongue”ijistjournal
 
Fuzzy based hyperspectral image
Fuzzy based hyperspectral imageFuzzy based hyperspectral image
Fuzzy based hyperspectral imageijistjournal
 
Uwb localization of nodes for
Uwb localization of nodes forUwb localization of nodes for
Uwb localization of nodes forijistjournal
 
Sidelobe suppression and papr
Sidelobe suppression and paprSidelobe suppression and papr
Sidelobe suppression and paprijistjournal
 

Andere mochten auch (10)

Performance analysis of gate misaligned triple
Performance analysis of gate misaligned triplePerformance analysis of gate misaligned triple
Performance analysis of gate misaligned triple
 
Reducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive thresholdReducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive threshold
 
A zigbee and embedded based security
A zigbee and embedded based securityA zigbee and embedded based security
A zigbee and embedded based security
 
Investigational insight on gaussian
Investigational insight on gaussianInvestigational insight on gaussian
Investigational insight on gaussian
 
Force sensitive resistance based heart beat
Force sensitive resistance based heart beatForce sensitive resistance based heart beat
Force sensitive resistance based heart beat
 
Identifying the semantic relations on
Identifying the semantic relations onIdentifying the semantic relations on
Identifying the semantic relations on
 
An embedded module as “virtual tongue”
An embedded module as “virtual tongue”An embedded module as “virtual tongue”
An embedded module as “virtual tongue”
 
Fuzzy based hyperspectral image
Fuzzy based hyperspectral imageFuzzy based hyperspectral image
Fuzzy based hyperspectral image
 
Uwb localization of nodes for
Uwb localization of nodes forUwb localization of nodes for
Uwb localization of nodes for
 
Sidelobe suppression and papr
Sidelobe suppression and paprSidelobe suppression and papr
Sidelobe suppression and papr
 

Ähnlich wie Secured wireless power

speed control of three phase induction motor using IOT
speed control of three phase induction motor using IOTspeed control of three phase induction motor using IOT
speed control of three phase induction motor using IOTswaroop009
 
Microwave wireless power transmission
Microwave wireless power transmissionMicrowave wireless power transmission
Microwave wireless power transmissionUday Wankar
 
Optical Fiber Communication ECE Practical File.pdf
Optical Fiber Communication ECE Practical File.pdfOptical Fiber Communication ECE Practical File.pdf
Optical Fiber Communication ECE Practical File.pdfYash Shrivastava
 
A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...eSAT Publishing House
 
A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...eSAT Publishing House
 
A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...
A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...
A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...TELKOMNIKA JOURNAL
 
Effect of DC voltage source on the voltage and current of transmitter and rec...
Effect of DC voltage source on the voltage and current of transmitter and rec...Effect of DC voltage source on the voltage and current of transmitter and rec...
Effect of DC voltage source on the voltage and current of transmitter and rec...journalBEEI
 
Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...
Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...
Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...IOSRJECE
 
IRJET- Wireless Charging of Mobile Phones with Microwaves- A Review
IRJET-  	  Wireless Charging of Mobile Phones with Microwaves- A ReviewIRJET-  	  Wireless Charging of Mobile Phones with Microwaves- A Review
IRJET- Wireless Charging of Mobile Phones with Microwaves- A ReviewIRJET Journal
 
“Microcontroller Based Substation Monitoring system with gsm modem”.
“Microcontroller Based Substation Monitoring system with gsm modem”.“Microcontroller Based Substation Monitoring system with gsm modem”.
“Microcontroller Based Substation Monitoring system with gsm modem”.Priya Rachakonda
 
WIRELESS POWER THEFT MONITORING SYSTEM
WIRELESS POWER THEFT MONITORING SYSTEMWIRELESS POWER THEFT MONITORING SYSTEM
WIRELESS POWER THEFT MONITORING SYSTEMvivatechijri
 
IRJET- Automatic HF Antenna Tuner
IRJET-  	  Automatic HF Antenna TunerIRJET-  	  Automatic HF Antenna Tuner
IRJET- Automatic HF Antenna TunerIRJET Journal
 
Wireless Mobile Charger Design Based on Inductive Coupling
Wireless Mobile Charger Design Based on Inductive CouplingWireless Mobile Charger Design Based on Inductive Coupling
Wireless Mobile Charger Design Based on Inductive Couplingijtsrd
 
DESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICES
DESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICESDESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICES
DESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICESJournal For Research
 
Wireless Power Transmission Using Solar Power System
Wireless Power Transmission Using Solar Power System Wireless Power Transmission Using Solar Power System
Wireless Power Transmission Using Solar Power System elprocus
 
Wireless power transmission using magnetrons
Wireless power transmission using magnetronsWireless power transmission using magnetrons
Wireless power transmission using magnetronsmkanth
 
paper on Wireless power transmission using magnetic resonance
paper on Wireless power transmission using magnetic resonancepaper on Wireless power transmission using magnetic resonance
paper on Wireless power transmission using magnetic resonancemkanth
 

Ähnlich wie Secured wireless power (20)

speed control of three phase induction motor using IOT
speed control of three phase induction motor using IOTspeed control of three phase induction motor using IOT
speed control of three phase induction motor using IOT
 
Seminar report
Seminar reportSeminar report
Seminar report
 
Microwave wireless power transmission
Microwave wireless power transmissionMicrowave wireless power transmission
Microwave wireless power transmission
 
Optical Fiber Communication ECE Practical File.pdf
Optical Fiber Communication ECE Practical File.pdfOptical Fiber Communication ECE Practical File.pdf
Optical Fiber Communication ECE Practical File.pdf
 
A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...
 
A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...
 
A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...
A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...
A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...
 
Effect of DC voltage source on the voltage and current of transmitter and rec...
Effect of DC voltage source on the voltage and current of transmitter and rec...Effect of DC voltage source on the voltage and current of transmitter and rec...
Effect of DC voltage source on the voltage and current of transmitter and rec...
 
Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...
Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...
Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...
 
wireless power transfer
wireless power transferwireless power transfer
wireless power transfer
 
IRJET- Wireless Charging of Mobile Phones with Microwaves- A Review
IRJET-  	  Wireless Charging of Mobile Phones with Microwaves- A ReviewIRJET-  	  Wireless Charging of Mobile Phones with Microwaves- A Review
IRJET- Wireless Charging of Mobile Phones with Microwaves- A Review
 
“Microcontroller Based Substation Monitoring system with gsm modem”.
“Microcontroller Based Substation Monitoring system with gsm modem”.“Microcontroller Based Substation Monitoring system with gsm modem”.
“Microcontroller Based Substation Monitoring system with gsm modem”.
 
WIRELESS POWER THEFT MONITORING SYSTEM
WIRELESS POWER THEFT MONITORING SYSTEMWIRELESS POWER THEFT MONITORING SYSTEM
WIRELESS POWER THEFT MONITORING SYSTEM
 
A010340112
A010340112A010340112
A010340112
 
IRJET- Automatic HF Antenna Tuner
IRJET-  	  Automatic HF Antenna TunerIRJET-  	  Automatic HF Antenna Tuner
IRJET- Automatic HF Antenna Tuner
 
Wireless Mobile Charger Design Based on Inductive Coupling
Wireless Mobile Charger Design Based on Inductive CouplingWireless Mobile Charger Design Based on Inductive Coupling
Wireless Mobile Charger Design Based on Inductive Coupling
 
DESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICES
DESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICESDESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICES
DESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICES
 
Wireless Power Transmission Using Solar Power System
Wireless Power Transmission Using Solar Power System Wireless Power Transmission Using Solar Power System
Wireless Power Transmission Using Solar Power System
 
Wireless power transmission using magnetrons
Wireless power transmission using magnetronsWireless power transmission using magnetrons
Wireless power transmission using magnetrons
 
paper on Wireless power transmission using magnetic resonance
paper on Wireless power transmission using magnetic resonancepaper on Wireless power transmission using magnetic resonance
paper on Wireless power transmission using magnetic resonance
 

Mehr von ijistjournal

BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...ijistjournal
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...ijistjournal
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINijistjournal
 
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDYDECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDYijistjournal
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...ijistjournal
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...ijistjournal
 
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...ijistjournal
 
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSTOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSijistjournal
 
Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...ijistjournal
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...ijistjournal
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
 
Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...ijistjournal
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)ijistjournal
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...ijistjournal
 
Design and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression AlgorithmDesign and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression Algorithmijistjournal
 
Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...ijistjournal
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...ijistjournal
 

Mehr von ijistjournal (20)

BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
 
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDYDECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
 
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
 
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSTOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
 
Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
 
Design and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression AlgorithmDesign and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression Algorithm
 
Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...
 

Kürzlich hochgeladen

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Kürzlich hochgeladen (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Secured wireless power

  • 1. International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 DOI : 10.5121/ijist.2014.4315 115 SECURED WIRELESS POWER TRANSMISSION USING RADIO FREQUENCY SIGNAL B. Renil Randy1 , M.Hariharan2 , R. Arasa Kumar3 1,2 UG Students, 3 Assistant Professor Velammal College of Engineering and Technology, Madurai ABSTRACT: Anything we transmit without protection is being raid by the intruders. Hence it is necessary to impart security to the signal transmitted. In this paper we present the concept of giving security to the transmitted power signal which is to be received by a receiver in a wireless medium. The present techniques of wireless power transmission consists of a pair of strongly magnetically coupled resonators that allow power transmission of tens of watts over a few meters, but anything without security becomes unreliable. With the goal in achieving security to the power signal, we introduce the concept of encryption decryption algorithm using RF module. 1. INTRODUCTION: The inspiration for wireless power comes from wires being cumbersome and messy. With the numerous number of mobile electronics that we use today, there is a huge demand for convenience in supervision of their power supplies. Wireless communication hasmade a massive developmentin the way we interact with communication devices. We also observe that while the techniques of strongly coupled magnetic resonances allowefficient power transfer between a pair of transmitter and receiver coils, the efficiency greatlydeclines upon adding more receivers to the strongly coupled system due to theinteraction between multiple coupled resonators. In tightly coupled resonant wirelesspower transfer, we require a one to one contact between transmitter andreceiver. In addition, in order to improve efficiency of power transfer, we intend to use a lower switching frequency to drive the gate of the MOSFET. 2. WIRELESS POWER TRANSMISSION (WPT) SYSTEM: We cannot imagine the world without electric power. Normally the power is transmitted through wires. This paper depicts an idea to eradicate the hazardous usage of electrical wires which involve lot of confusion in particularly organizing them. Wireless Power Transmission system would completely eliminate the dynamic high-tension power transmission cables, towers and secondary stations between the generating station and consumers and facilitates the interconnection of electrical generation plants on global scale. Mobile transmitters and receivers can be chosen for the Wireless Power Transmission system. The cost for transmission and distribution will be reduced and the cost of electrical energy for the consumers also would be diminished. The power could also be transmitted to the places where the wired transmission is not possible.
  • 2. International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 116 2.1.VARIOUS SCHEMES OF WIRELESS POWER TRANSFER: There are many techniques which are being used to achieve wireless power transfer. Some of the methods are being discussed below. 2.1.1. WPT using Microwaves: In the transmission side, the microwave power source generates microwave power and the output power is managed by electronic restrain circuits. The purpose of the tuner is to match the impedance between the transmitting antenna and the microwave source. The attenuated signals gets divided based on the direction of signal propagation by Directional Coupler. The transmitting antenna emits the power uniformly through free space to the rectenna. In the receiving section, a rectenna receives the transmitted power and translates the microwave power to DC power. The impedance matching circuit and the filter is provided for setting the output impedance of a signal source equal to the rectifying circuit. The rectifying circuit haveSchottky barrier diodes which converts the received microwave power into DC power. 2.1.2. WPT using Magnetic Resonance: In this technique, at first we design an oscillator, which generates the carrier signal to transmit the power. Oscillators are not usually designed to deliver power, thus a power amplifier is added to the oscillator to amplify the oscillating signal. The power amplifier would hand over the output power to the transmission coil. Next, a receiver coil is constructed to receive the transmitted power. However, the power received in the receiver side have an alternating current. Thus, a rectifier is needed to rectify the AC voltage. Finally, an electric load is attached to finish the entire circuit design. Figure1. WPT using Magnetic Resonance 2.1.3WPT using Space Solar power (SSP)Satellites: In this method, there are two basic WPT options, one is using radio waves and the other is using light waves, are considered for both long term and short term Space Solar power applications. In the long term, power is transferred to Earth from Geostationary earth orbit (GEO), or further distances in the space. In the near term the power is being transmitted to the moderate distances. By using SSP and WPT technology in near term space science and exploration missions, larger systems are being designed and developed to send power from space to Earth.
  • 3. International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 117 3. BLOCK DIAGRAM: The block diagram for the overall wireless power transceiver is given in the following figure(Fig. 1) Figure 2. Overall Block Diagram of Wireless power Transceiver 4. TRANSMITTER: The following diagram gives the entire transmitter section of the Wireless Power Transmission. The 230V alternating current is fed to the transformer is rectified with bridge rectifier in which the alternating current is converted to Direct Currentand it is filtered and regulated with the voltage regulator. The flow of the signal without any interrupt to the transmitter input is denoted by an LED. It consists of a RESET switch denoted by which is used to reset the programming codes in the picmicrocontroller. The signal is given to the PIC microcontroller PIC16F877A which has 40 pins and it has 5 input output pins and fifteen interrupts and its stability is maintained with a crystal oscillator circuit. This signal will be controlled by the pic microcontroller and the status of the signal is being informed with a help of an LCD display. This signal is being transferred to the RF module through MAX 232. Four MOSFET switches are being connected to each other so that current can pass through, by the switching between the ON and OFF states and the passcode will be generated in MAX 232 and sent through RFtransmitter.
  • 4. International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 118 Figure 3. Transmitter diagram 5. RECEIVER: The receiver operation is just the vice versa of the transmitter. The signal is being received to the receiving antenna from the transmitting antenna. The signalthat transmitted from the RF transmitter will reachesthe RF module at the receiver. There is no separate power supply for the receiver section. The current induced in the induction coil is given to the secondary coil of the transformer. In the receiver section, only one MOSFET switch is used which allows current only in the ON state ie, when the signal reaches the RF receiver it will send the passcode to the MAX 232 when the passcode matches then it will trigger the circuit and makes MOSFET switch in ON condition. The current passes to ensure that only the authenticated receiver receives the power signal. Figure 4. Receiver diagram 6. RESULTS: From the plots given, we come to infer that efficiency of the system has been increased using various parameters when compared to that of the efficiencies of the existing system. Thus the International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 118 Figure 3. Transmitter diagram 5. RECEIVER: The receiver operation is just the vice versa of the transmitter. The signal is being received to the receiving antenna from the transmitting antenna. The signalthat transmitted from the RF transmitter will reachesthe RF module at the receiver. There is no separate power supply for the receiver section. The current induced in the induction coil is given to the secondary coil of the transformer. In the receiver section, only one MOSFET switch is used which allows current only in the ON state ie, when the signal reaches the RF receiver it will send the passcode to the MAX 232 when the passcode matches then it will trigger the circuit and makes MOSFET switch in ON condition. The current passes to ensure that only the authenticated receiver receives the power signal. Figure 4. Receiver diagram 6. RESULTS: From the plots given, we come to infer that efficiency of the system has been increased using various parameters when compared to that of the efficiencies of the existing system. Thus the International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 118 Figure 3. Transmitter diagram 5. RECEIVER: The receiver operation is just the vice versa of the transmitter. The signal is being received to the receiving antenna from the transmitting antenna. The signalthat transmitted from the RF transmitter will reachesthe RF module at the receiver. There is no separate power supply for the receiver section. The current induced in the induction coil is given to the secondary coil of the transformer. In the receiver section, only one MOSFET switch is used which allows current only in the ON state ie, when the signal reaches the RF receiver it will send the passcode to the MAX 232 when the passcode matches then it will trigger the circuit and makes MOSFET switch in ON condition. The current passes to ensure that only the authenticated receiver receives the power signal. Figure 4. Receiver diagram 6. RESULTS: From the plots given, we come to infer that efficiency of the system has been increased using various parameters when compared to that of the efficiencies of the existing system. Thus the
  • 5. 119 concept of presenting the idea of providing security to the transmitted signal in the wireless medium and receiving is attained is done for a limited space in small scale. This would also become base for the further research in transmitting and receiving signals in a large scale through anyone one of the above listed techniques. Table 1. Result of current by varying distance of receiver Distance (feet) Voltage (Volts) Current (mA) 3 4 500 2 4.5 550 1 5 600 0.5 5.5 750 Maximum closest position 6 1000 From the above observations, the power transferred from the transmitter to the receiver is maximum at the closest position and when the distance between them is increased, the power received in the receiver gets reduced. When the transmitter is switched to the port of the receiver A, we are able to observe that the LED on the receiver A glows and the LED in the receiver coil B doesn’t glow since receive B is not the authenticated user to use the power signal. Any metal sheet obstacle when placed between
  • 6. 120 the transmitter and the receiver, it is found that the power is transmitted to the authenticated user as the metal sheet is a conductor. Table 2. Result of temperature with varying distance Distance (feet) Temperature (°C) 3 27 2 27.7 1 28.2 0.5 29.5 Maximum closest position 30 From the above tabulation, we find that the temperature in the receiver coil gets increased when the when the distance the distance between the transmitter and the receiver is decreased Table 3. Result on transmitter coil heating PWM On duty Time Transmitter coil heating (°C) 100% 45 90% 43 80% 41 70% 40 60% 38 From the above observations, we find that at the temperature of the transmitter coil is high when the ON duty time of the Pulse width modulation (PWM) is maximum.
  • 7. 121 When the transmitter is neither switched to the receiver of port A nor port B ie, the switch is held in the middle. Then both the receiver A and B can't receive the power since both the receivers are not authenticated even though the power is transmitted in the air and the coil induces it. The four MOSFET which is being connected in series helps in switching the current. The amount of power received in the receiver varies when the distance between the transmitter and the receiver varies as discussed. 7. CONCLUSION: We have placed two receivers with decoders which decodes the passcode given as coding to the RF module in the transmitter section. The receiver which has the matched passcode decoded has received the power signal successfully. The receiver with the decoder decoding a passcode mismatch failed to receive the power signal. Our project can also be implemented in Online Electric Vehicle (OLEV). OLEV wireless charging system consists of a road-side Power Inverter to bring electricity from the grid to the road embedded power tracks. A proprietary Roadway Infrastructure consisting of Road-embedded Power tracks installed at selected locations of the route.A proprietary Pick-Up and Regulator kit for the wireless power transfer installed in or under the electric vehicle. Hence in this system the unauthorised users are denied permission to use the power source using the key idea of the project.
  • 8. 122 REFERENCES: [1] S. Kopparthi, Pratul K. Ajmera, "Power delivery for remotely located Microsystems," [2] Proc. of IEEE Region 5, 2004 Annual Tech. Conference, 2004 April 2, pp. 31-39. [3] Nikola Tesla, “The Transmission of Electrical Energy Without Wires as a Means for Furthering Peace,” Electrical World and Engineer. Jan. 7, p. 21, 1985. [4] T. Deyle and M. Reynolds, “Surface based wireless power transmission and bidirectional communication for autonomous robot swarms” in Proceedings IEEE Conference on Robotics, 2008. [5] M. Ghovanloo, et al., “A Wide-band Power-efficient Inductive Wireless Link for Implantable Microelectronic Devices Using Multiple Carriers,” IEEE Trans. Circuits and Systems, vol. 54, no. 10, October 2007. [6] K. M. Silay, et al., “Improvement of Power Efficiency of Inductive Links for Implantable Devices,” Research in Microelectronics and Electronics, pp. 229-232, June 2008. AUTHORS: B. Renil Randy is doing his B.E. degree in Velammal College of Engineering and Technology, Madurai, India. He is interested in the area of Wireless Communication and Signal Processing. M. Hariharanis doing his B.E. degree in Velammal College of Engineering and Technology, Madurai, India. He is intere sted in the area of Wireless Communication and specialized in Wireless Power Transmission. R. Arasa Kumar,M.E.is working as Assistant Professor in Velammal College of Engineering and Technology, Madurai. He also has teachin g experience at Kalasalingam Institute of Technology, Krishnakoil. He was graduated at MepcoSchlenk Engineering College, Sivakasi.