scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Study the influence of using guide vanes blades on the performance of cross-flow wind turbine

14 Jun 2021-Applied Nanoscience (Springer International Publishing)-pp 1-10
TL;DR: In this article, the best configuration between guide vanes and cross-flow vertical axis wind turbine was investigated to determine the turbine with the highest power coefficient, which increased around 59% of the turbine's performance using GV.
Abstract: A cross-flow wind turbine has a high torque coefficient at a low tip speed ratio; therefore, it is a good candidate for a self-starting turbine. This study aims to investigate the best configuration between guide vanes and cross-flow vertical axis wind turbine. The experiment test was carried out to determine the turbine with the highest power coefficient. The cross-flow turbine has 14, 18, and 22 blades with using 6,10 and 14 blades of guide vane (GV) was developed in this study, employing 15°, 25°, 35°, 45°, 55°, 65°, and 75° of tilt angles in fifth different wind speed conditions 4 m/s, 6 m/s, 7.5 m/s, 9.20 m/s, and 11 m/s. The turbine has 22 blades with 14 GV blades at 55° of tilt angle blades producing more remarkable turbine performance improvement than other blades. The highest power coefficient (CP) of cross-flow using 14 GV blades at 55° was 0.0162 at 0.289 TSR, which increased around 59% of the turbine's performance using GV.
Citations
More filters
Journal ArticleDOI
TL;DR: In this paper , the authors present a systematic study of modern blockchain-based solutions for securing medical data with or without cloud computing, and implement and evaluate the different methods using blockchain in this paper.
Abstract: Since the last decade, cloud-based electronic health records (EHRs) have gained significant attention to enable remote patient monitoring. The recent development of Healthcare 4.0 using the Internet of Things (IoT) components and cloud computing to access medical operations remotely has gained the researcher's attention from a smart city perspective. Healthcare 4.0 mainly consisted of periodic medical data sensing, aggregation, data transmission, data sharing, and data storage. The sensitive and personal data of patients lead to several challenges while protecting it from hackers. Therefore storing, accessing, and sharing the patient medical information on the cloud needs security attention that data should not be compromised by the authorized user's components of E-healthcare systems. To achieve secure medical data storage, sharing, and accessing in cloud service provider, several cryptography algorithms are designed so far. However, such conventional solutions failed to achieve the trade-off between the requirements of EHR security solutions such as computational efficiency, service side verification, user side verifications, without the trusted third party, and strong security. Blockchain-based security solutions gained significant attention in the recent past due to the ability to provide strong security for data storage and sharing with the minimum computation efforts. The blockchain made focused on bitcoin technology among the researchers. Utilizing the blockchain which secure healthcare records management has been of recent interest. This paper presents the systematic study of modern blockchain-based solutions for securing medical data with or without cloud computing. We implement and evaluate the different methods using blockchain in this paper. According to the research studies, the research gaps, challenges, and future roadmap are the outcomes of this paper that boost emerging Healthcare 4.0 technology.

86 citations

Journal ArticleDOI
TL;DR: In this paper, rational augmented CNN state-of-the-art technology was utilized for deepfake facial reconstruction via hardware such as webcams and security cameras in real time.
Abstract: Deepfake network is a prominent topic of research as an application to various systems about security measures. Although there have been many recent advancements in facial reconstruction, the greatest challenge to overcome has been the means of finding an efficient and quick way to compute facial similarities or matches. This work is created utilizing the rationale-augmented convolutional neural network (CNN) on MATLAB R2019a platform using the Kaggle DeepFake Video dataset with an accuracy of 95.77%. Hence, real-time deepfake facial reconstruction for security purposes is difficult to complete concerning limited hardware and efficiency. This research paper looks into rational augmented CNN state-of-the-art technology utilized for deepfake facial reconstruction via hardware such as webcams and security cameras in real time. Additionally, discuss a history of face reconstruction and provide an overview of how it is accomplished.

72 citations

Journal ArticleDOI
TL;DR: In this paper , the authors explore the current research problems using the 5G technology, and propose the novel architecture for smart healthcare systems using 5G and Industry 4.0 standards using the Network Simulator (NS2) to investigate the current 5G methods.
Abstract: The emergence of the Industry 4.0 revolution to upgrade the Internet of Things (IoT) standards provides the prominence outcomes for the future wireless communication systems called 5G. The development of 5G green communication systems suffers from the various challenges to fulfill the requirement of higher user capacity, network speed, minimum cost, and reduced resource consumption. The use of 5G standards for Industry 4.0 applications will increase data rate performance and connected device's reliability. Since the arrival of novel Covid-19 disease, there is a higher demand for smart healthcare systems worldwide. However, designing the 5G communication systems has the research challenges like optimum resource utilization, mobility management, cost-efficiency, interference management, spectral efficiency, etc. The rapid development of Artificial Intelligence (AI) across the different formats brings performance enhancement compared to conventional techniques. Therefore, introducing the AI into 5G standards will optimize the performances further considering the various end-user applications. We first present the survey of the terms like 5G standard, Industry 4.0, and some recent works for future wireless communications. The purpose is to explore the current research problems using the 5G technology. We further propose the novel architecture for smart healthcare systems using the 5G and Industry 4.0 standards. We design and implement that proposed model using the Network Simulator (NS2) to investigate the current 5G methods. The simulation results show that current 5G methods for resource management and interference management suffer from the challenges like performance trade-offs.

58 citations

Dissertation
24 Aug 2013
TL;DR: A new power augmented shroud integrated with vertical axis wind turbine (VAWT) is introduced that is able to improve the performance of the VAWT significantly by increasing the wind speed and channels the flow to better angle of attack for the V AWT and reduces the negative torque of the wind turbine.
Abstract: The depletion of fossil fuel and the increase of energy demand in the world make renewable energy become an alternative energy source. Among these green energies, the wind energy is one of the popular energy sources since decades ago. Recently, there are small wind turbine developments which are suitable for urban and suburban application. However, the efficiency of the wind turbine is the main concern for all researchers due to the uncertainty of wind speed and direction in urban area. In this paper, a new power augmented shroud integrated with vertical axis wind turbine (VAWT) is introduced. This power augmented shroud is able to improve the performance of the VAWT significantly by increasing the wind speed, channel the flow to better angle of attack for the VAWT and reduce the negative torque of the wind turbine. Hence, it improves the self-starting of the VAWT, and increase the coefficient of power. The numerical method is used to simulate the wind flow for the power augmented shroud with a single bladed NACA 0015 airfoil VAWT by commercial computational fluid dynamic (CFD) software ANSYS FLUENT 14.0. In this 2D simulation, the shear stress transport (SST) k- turbulence model with the sliding mesh method was used with the tip speed ratio of 5.1 for the wind turbine. The result is verified by re-simulate the experiment published by Sandia National Laboratories. The simulation result shows that the new design of power augmented shroud is able the increase the coefficient of power significant for the VAWT which is about 115.56% compare to the bare VAWT. Therefore, for urban area application, this power augmented shroud can solve the low efficiency problem for the VAWT.

19 citations

Journal ArticleDOI
TL;DR: This paper aims to briefly address the psychological biometric authentication techniques and a brief summary to the advantages, disadvantages of each method.

17 citations

References
More filters
Book
01 Jan 2006
TL;DR: In this article, the authors discuss the performance of wind energy conversion systems and the economic and environmental impact of wind power conversion systems in terms of energy efficiency and renewable energy sources, as well as wind energy and environment.
Abstract: Basics of wind energy conversion.- Analysis of wind regimes.- Wind energy conversion systems.- Performance of wind energy conversion systems.- Wind energy and environment.- Economics of wind energy.

718 citations


"Study the influence of using guide ..." refers methods in this paper

  • ...Wind power is the transformation of wind energy into electricity using a wind turbine (Sathyajith 2006)....

    [...]

Journal ArticleDOI
01 Nov 2012-Energy
TL;DR: In this article, the performance of the straight Darrieus turbine (H-rotor) was investigated for 20 different airfoils (Symmetric and Non-symmetric) by two-dimensional Computational Fluid Dynamics in order to maximize output torque coefficient and output power coefficient (efficiency).

286 citations


"Study the influence of using guide ..." refers background in this paper

  • ...Many turbines are designed with low wind speeds and with a low value of tip speed ratio (Mohamed 2012)....

    [...]

Journal ArticleDOI
TL;DR: Experimental results outwards show that the intelligent module provides energy-efficient, secured transmission with low computational time as well as a reduced bit error rate, which is a key requirement considering the intelligent manufacturing of VSNs.
Abstract: Due to technology advancement, smart visual sensing required in terms of data transfer capacity, energy-efficiency, security, and computational-efficiency. The high-quality image transmission in visual sensor networks (VSNs) consumes more space, energy, transmission delay which may experience the various security threats. Image compression is a key phase of visual sensing systems that needs to be effective. This motivates us to propose a fast and efficient intelligent image transmission module to achieve the energy-efficiency, minimum delay, and bandwidth utilization. Compressive sensing (CS) introduced to speedily compressed the image to reduces the consumption of energy, time minimization, and efficient bandwidth utilization. However, CS cannot achieve security against the different kinds of threats. Several methods introduced since the last decade to address the security challenges in the CS domain, but efficiency is a key requirement considering the intelligent manufacturing of VSNs. Furthermore, the random variables selected for the CS having the problem of recovering the image quality due to the accumulation of noise. Thus concerning the above challenges, this paper introduced a novel one-way image transmission module in multiple input multiple output that provides secure and energy-efficient with the CS model. The secured transmission in the CS domain proposed using the security matrix which is called a compressed secured matrix and perfect reconstruction with the random matrix measurement in the CS. Experimental results outwards that the intelligent module provides energy-efficient, secured transmission with low computational time as well as a reduced bit error rate.

262 citations

Journal ArticleDOI
TL;DR: The Corvus corone module two-way image transmission is proposed that provides energy efficiency along CS model, secured transmission through a matrix of security under CS such as inbuilt method, which was named as compressed secured matrix and faultless reconstruction along that of eminent random matrix counting under CS.
Abstract: The manufacturing of intelligent and secure visual data transmission over the wireless sensor network is key requirement nowadays to many applications. The two-way transmission of image under a wireless channel needed image must compatible along channel characteristics such as band width, energy-efficient, time consumption and security because the image adopts big space under the device of storage and need a long time that easily undergoes cipher attacks. Moreover, Quizzical the problem for the additional time under compression results that, the secondary process of the compression followed through the acquisition consumes more time.,Hence, for resolving these issues, compressive sensing (CS) has emerged, which compressed the image at the time of sensing emerges as a speedy manner that reduces the time consumption and saves bandwidth utilization but fails under secured transmission. Several kinds of research paved path to resolve the security problems under CS through providing security such as the secondary process.,Thus, concerning the above issues, this paper proposed the Corvus corone module two-way image transmission that provides energy efficiency along CS model, secured transmission through a matrix of security under CS such as inbuilt method, which was named as compressed secured matrix and faultless reconstruction along that of eminent random matrix counting under CS.,Experimental outputs shows intelligent module gives energy efficient, secured transmission along lower computational timing also decreased bit error rate.

252 citations

Journal ArticleDOI
TL;DR: A novel method of cooperative image transformation from the transmitter to the receiver for wireless sensor networks and the performance efficiency against the state-of-art methods based on mean square error, peak signal-to-noise ratio, and bit error rate is claimed.
Abstract: The challenging task while transmitting the high-quality images over the wireless sensor networks is to achieve the higher throughput, minimum bit error rate without compromising the image quality....

239 citations

Trending Questions (1)
What is the best number of blades for cross flow vertical axis wind turbines?

The study suggests that a cross-flow turbine with 22 blades and 14 guide vanes at a 55° tilt angle showed the highest performance improvement, indicating this configuration as optimal.