Wednesday, October 30, 2019

Martin Luther King, Jr. Malcolm X Assignment Essay

Martin Luther King, Jr. Malcolm X Assignment - Essay Example Is the introduction successful in convincing you of this? Why or why not? The introduction was successful in making me believe the two leaders were polar opposites in their ideas of a revolution. They both, however, had the same agenda, to fight for the rights of the black man. King believes it is dangerous to organize a movement against self-defense. He says there is no need to kill the principal if you want to go to school or burn a factory that you intend to go work. Pitney brings out King’s ideas in his book in the form of the speech. â€Å"I am convinced that for practical as well as moral reasons, nonviolence offers the only road to freedom for my people.†1 Kings tell his people about the record of changes in the South of America with a nonviolence approach to redeeming his people.2 The people of the South had made progress regarding integration between blacks and whites. Malcolm X believes the only way to redeem his people and get their land was through violence. Malcolm X preached violence for the black people to be able to achieve a revolution. He compares the black peoples revolution to that in Africa, where the people had to be violent to receive their land. He believed in African Americans owning land to be equal to the white peopl e. â€Å"So I cite these various revolutions, brothers and sisters, to show you that you dont have a peaceful revolution. You dont have a turn-the-other-cheek revolution. Theres no such thing as a nonviolent revolution. The only kind of revolution that is nonviolent is the Negro revolution. The only revolution in which the goal is loving your enemy is the Negro revolution†.3 The quote is part of Malcolm X thoughts regarding nonviolence of the African Americans towards the revolution. Martin Luther King was looking forward to a time when the black and white people would be sitting at a table together as brothers. Malcolm X first interest on the other hand was African Americans to

Sunday, October 27, 2019

Nucleic Acids Are The Organic Compounds

Nucleic Acids Are The Organic Compounds Nucleic acids were discovered by Friedrich Miescher, a Swiss biochemist, in 1869. He called them nucleic because he believed that they occurred only in the nucleus of the cell [1]. Nucleic Acids are the organic compounds found in the chromosomes of living cells and in viruses. The structure of the nucleic acids in a cell determines the structure of the proteins produced in that cell. Since proteins are the building blocks of life, nucleic acids can be considered the blueprints of life. But chemically we can define nucleic acids as molecules that are comprised of monomers known as nucleotides.[2,3] The two main types of nucleic acids are:- Deoxyribonucleic acid ( DNA) :-It ordinarily occurs only in the cell nucleus. Ribonucleic acid ( RNA):-It is found both in the nucleus and in the cytoplasm (the main part of the cell exclusive of the nucleus). Both DNA and RNA combine with protein materials to carry out cell division and cell repair processes. [4] Deoxyribonucleic acid ( DNA) A type of nucleic acid that constitutes the molecular basis of heredity. It is found principally in the nucleus of all cells where it forms part of the chromosome, or in the cytoplasm of cells lacking a nucleus, such as bacteria. It acts as the carrier of genetic information containing the instructions (code) to make proteins. It consists of two single chains of nucleotides, which are twisted round each other to form a double helix or spiral. The nucleotides contain sugar (deoxyribose), phosphate and the bases (adenine, cytosine, guanine and thymine). The two strands of DNA are held together by hydrogen bonds located between specific pairs of bases (adenine to thymine and cytosine to guanine). The sequence of bases and consequently gene sequence is sometimes altered, causing mutation. DNA includes the sugar deoxyribose, which has one less oxygen atom than ribose the sugar found in RNA, hence the name is deoxy-ribose nucleic acid.[6,7] Each DNA molecule is a long two-stranded chain. The strands are made up of subunits called nucleotides, each containing a sugar (deoxyribose), a phosphate group, and one of four nitrogenous bases, adenine, guanine, thymine, and cytosine, denoted A, G, T, and C, respectively. A given strand contains nucleotides bearing each of these four. The information carried by a given gene is coded in the sequence in which the nucleotides bearing different bases a soccur along the strand. The chemical and physical properties of DNA suit it for both replication and transfer of information . Fig 1.A 3D rendered computer model of the DNA double helix. [16] Structure Of DNA Its structure, with two strands wound around each other in a double helix to resemble a twisted ladder, was first described (1953) by Francis Crick and James D. Watson and they named it as Watson and Crick model of DNA which states that: Fig 2. Double helix structure of DNA[ It is a double helix with two right handed helical polydeoxy ribonucleotide strands twisted around the same central axis. The two strands are anti parallel. The phosphodiester linkages of one of these strands run in 5 to 3 direction while the other strand runs in 3 to 5 direction. The bases are stacked inside the helix in planes perpendicular to the helical axis. These two strands are held together by hydrogen bonds. In addition to hydrogen bonds, other forces e.g., hydrophobic interactions between stacked bases are also responsible for stability and maintenance of double helix. Adenine always pairs with thymine while guanine always pairs with cytosine. A-T pair has 2 hydrogen bonds while G-C pair has 3 hydrogen bonds. Hence, G C is more stronger than A=T. The content of adenine is equal to the content of thymine and the content of guanine is equal to the content of cytosine. This is Chargaffs rule, which is proved by the complementary base pairing in DNA structure. The genetic information is present only on one strand known as template strand. The double helix structure contains major and minor grooves in which proteins interact with DNA. The diameter of double helix is 2nm. The double helical structure repeats at intervals of 3.4 nm (one completer turn) which corresponds to 10 base pairs.[7,8,9] Different forms of DNA Double helical structure exists in six different forms. They are A-DNA, B-DNA, C-DNA, D-DNA, E-DNA and Z-DNA. Among these only 3 forms of DNA are important. They are B-DNA, A-DNA and Z-DNA. 5.1 B-DNA:-This is nothing but the double helical structure described by Watson and Crick. It has 10 base pairs in each turn. 5.2 A-DNA:-This is also a right handed helix. It has 11 base pairs per turn. 5.3 Z-DNA:-This is a left handed helix. It has 12 base pairs per turn. The strands in this form move in a zig-zag manner and hence it is called as Z-DNA.[12,13] Properties of DNA The properties shown by DNA that allows for transmission of genetic information to new cells are as follows:- Replication Transcription Translation 6.1 Replication An important property of DNA is that it can replicate, or make copies of itself. Each strand of DNA in the double helix can serve as a pattern for duplicating the sequence of bases. This is critical when cells divide because each new cell needs to have an exact copy of the DNA present in the old cell. Fig3. Replication Process in DNA [30] 6.2 Transcription Transcription is the process in which DNA nucleic acids transfer the cells genetic information into RNA materials. In essence, each DNA strand manufactures a corresponding RNA strand. Three types of RNA are manufactured within this process. [13]Messenger RNAs (mRNA) are designed to carry the genetic information received from the DNA strands. Ribosomal RNAs (rRNA) reside in the cells cytoplasm, and are responsible for decoding, or translating the genetic instructions into cell processes. Transfer RNAs (tRNA) are responsible for gathering whatever amino acids are needed for protein synthesis.[14] Fig4. Transcription In DNA [20] 6.3 Translation Translation is the process in which RNA molecules create the proteins needed to sustain necessary cell functions. This is accomplished by converting the genetic code contained in the messenger RNAs into amino acid strings, which is what make protein molecules. This conversion process takes place within the ribosomes, which are located in the cells cytoplasm. [14] Functions of DNA (deoxyribonucleic acid): DNA is a permanent storage place for genetic information. DNA controls the synthesis of RNA (ribonucleic acid). The sequence of nitrogenous bases in DNA determines the protein development in new cells. The function of the double helix formation of DNA is to ensure that no disorders occur. This is because the second identical strand of DNA that runs anti-parallel to the first is a backup in case of lost or destroyed genetic information. Ex. Downs Syndrome or Sickle Cell Anemia.[16,17] RNA( ribonucleic acid) It is another type of nucleic acid which functions in cellular protein synthesis in all living cells. They play an essential role in the synthesis of proteins. On hydrolysis they yield the pentose sugar ribose, the purine bases adenine and guanine, the pyrimidine bases cytosine and uracil, and phosphoric acid.RNA occurs mostly in the cytoplasm in the eukaryotic cells. A small amount occurs in the nucleus of the cell, as a constituent of nucleolus. RNA is a single polynucleotide chain composed of nucleotides of adenine, guanine, cytosine and uracil. Thymine nucleotides are absent. Structure of RNA RiboNucleic Acids consist of: Ribose (a pentose = sugar with 5 carbons) Phosphoric Acid Organic (nitrogenous) bases: Purines (Adenine and Guanine) and Pyrimidines (Cytosine and Uracil) An RNA molecule is a linear polymer in which the monomers (nucleotides) are linked together by means of phosphodiester bridges, or bonds. These bonds link the 3 carbon in the ribose of one nucleotide to the 5 carbon in the ribose of the adjacent nucleotide. Fig 5. Chemical Structure of RNA [19] Purines: Adenine A Guanine G Pyrimidines: Uracil U Cytosine C Fig 6. Organic Bases Structure of RNA [21] Structural Difference between RNA and DNA RNA differs, however, from DNA because it does not form an analogous double helical structure. The pyrimidine base thymine is modified in that it lacks a methyl group and the resulting uracil takes its place in base pairing. Together, the presence of uracil in place of thymine, and the 2-OH in the ribose constitute the two chemical differences between RNA and DNA which is shown in Fig 7. Fig7. Structural difference between RNA and DNA [19] Types Of RNA 11.1 Messenger RNA (mRNA) It represents about 5 to 10% of the total RNA. It is synthesised from DNA as and when necessary. It carries the genetic information in the form of a specific sequence of nitrogen bases arranged in triplet codons, which are copies from the code in DNA. 11.2 Transfer RNA (tRNA) It represents about 10 to 15% of the total RNA in the cell. It has the shortest molecule having only about 80 to 100 nucleotides. The polynucleotide chain is folded on itself to have the shape of a cloverleaf. The molecule has three lateral loops, a DHU loop, a t loop and an anticodon loop. The anticodon loop bears a triplet combination of nitrogen bases, called anticodon. It is complementary to a codon of mRNA. The tRNA molecule is meant for recognising and carrying particular types of amino acids to the sites of protein synthesis. 11.3 Ribosomal RNA (rRNA) It represents nearly 80% of the total RNA in the cell. It always occurs bound to basic proteins in ribosomes. It takes part in assembling the amino acids brought by tRNA, into a polypeptide chain, based on the sequence of codons in mRNA. [19,20] Functions of RNA RNA serves the following functions: mRNA has a significant role in genetic code. tRNA is responsible for transferring amino acids to the site of protein synthesis (ribosomes). rRNA assembles the amino acids into a polypeptide chain. It also serves as a primer for replication of DNA. RNA serves as the genetic material in some plant viruses. [21] Applications of Nucleic Acid Nucleic acids find a number of exciting applications in various fields. . 13.1 Microarrays and biosensors PNA(peptide nucleic acid) can be used on microarrays and other biosensors. PNA microarray combined with PCR could detect genetically modified organisms (GMOs) in food 13.2 Imaging probes and FISH PNA is especially good for FISH because it can bind to DNA or RNA quickly even under low salt or other unfavorable conditions for DNA.PNA s specificity was utilized to discriminate 16S rRNA of bacteria species in drinking water. PNA probes also have been used for in vivo imaging of mRNA for cancer research. [23] 13.3 Catalysts and receptors Nucleic acids can also be employed as enzymes (for catalysis) and receptors (for ligand binding). Increasingly, researchers are making interesting use of these molecules, now collectively called functional nucleic acids. 13.4 Body functions Essential bodily functions such as growth, repair and reproduction all rely on nucleic acid for direction and support. Nucleic acid is in nearly every cell of the body. [24] 13.5 Medicinal Uses Gen-Probe Inc. (San Diego, California) introduced nucleic acid probe-based diagnostic products for gonorrhea and chlamydia. It is a direct test based on DNA ribosomal RNA hybridization, with demonstrated sensitivity of 89.9% to 97.1%, and specificity of 93% to 98%. [23, 26] FUTURE PROSPECTS OF NUCLEIC ACID Nucleic-acid-amplification test (NAAT) is used for the diagnosis of TB(tuberculosis) by the new method instead of conventional smear/culture method. So NAAT will simply take us to a new era of advanced, effective, and rapid TB diagnosis. Attempts are done to employ nucleic acids in effective gene therapy which is believe to become commonplace in recent years. At the same time, however, the study of nucleic acids has revealed remarkable properties of DNA and RNA molecules that could make them attractive therapeutic agents, independent of their well-known ability to encode biologically active proteins. In future we will find alternative uses of nucleic acids that do not rely on virus-based vectors or even on gene transfer. Tuberculosis (TB) is an important target for clinical testing due to the increase in incidence of the disease in this decade. Both Roche and Gen-Probe,great are developing kits for rapid TB testing. The Roche kit is based on PCR technology, while Gen-Probes kit uses transcription mediated amplification. [27, 28, 29]

Friday, October 25, 2019

OLD BLOOD AND GUTS Essay -- essays papers

OLD BLOOD AND GUTS General Patton was a devoted student of history, a poet, a humble man who was very unsure of his own abilities, a man who could bust into tears at any given moment, and could be charming or quite insulting all in the same hour. His reckless, outspoken manner gained him friends and enemies of equal determination. General Patton was not only extrovert of public perception but he also had an intensely private side. He was a man who trained himself for greatness with a determination matched by no other Allied General of World War Two. During the war, Patton led U.S. troops in Morocco, Tunisia, and Sicily, then took command of the Third Army, leading the troops through the German lines at Normandy to traverse France and eventually into the heart of Germany. His toughness on enemies as well as his own forces earned him the name â€Å"Old Blood and Guts.† General George Smith Patton’s leadership and tactics were the best of any Allied general of World War Two. Old Blood and Guts was born in 1885 in San Gabriel, California. He was a man who from a very early age knew he was destine for a life in the military as one can read in his journal â€Å" When I was a little boy at home I used to wear a wooden sword and say to myself: ‘George S. Patton, Jr., Lieutenant General’.†1 He followed his dreams and gained an educated at Virginia Military Institute and the U.S. Military Academy. On his graduation in 1909 Patton was commissioned a second lieutenant; he advanced in rank to full General by 1945. George Patton served as aide-de-camp to the American General John Joseph Pershing on Pershing’s expedition to Mexico in 1917. As a young lieutenant Patton was asked by General Pershing why he should be chosen to go on a dangerous mission The young, cocky Patton replied, â€Å"I want to go more than anyone else.†2 After making a name for himself early in his career, Patton earned a promotion; beginning the practice of many promotions to come. His experiences in Mexico prepared him for the soon to come war in Europe. In France during World War One Patton was offered a position as a tank core commander. In his journals, he wrote, â€Å"I will have to grow and grow a lot. But I will. Here is my chance.†3 soldier’s testimonies added to his reputation of being a tough commander. After a battle, he was quoted by some soldiers as saying â€Å"You are not bea... ... of solace, and the basis of practically every thing he did. Patton’s nephew wrote â€Å"The Bible was his companion and the church his refuge.†11 It was not uncommon to see General Patton weeping at the side of a dead or dying solider during his Army career. General George Smith Patton was a great American leader. His victories for America in Mexico, in World War One, and in World War Two proved his amazing leadership skills to the world. His bold, new tactics in France during World War Two are the basis of the modern military. Throughout his career, General Patton earned the respect of his men, his superiors, and the enemy. General George Smith Patton's leadership and tactics were the best of any Allied general of World War Two. WORKS CITED Blumenson Martin. Patton the man behind the legend. New York.:Berkly Publishing Company, 1984. Desto Carlo. Patton a genius for war. New York.: Harper Collins Company, 1995. Ladisias Fargo. Patton: Ordeal and Triumph. Chicago.: Ivan Obolengres company, 1981. Wallace Brenton. Patton and his Third Army. New York.: Battery Press, 1981. Blumenson Martin. The Patton Papers 1940-1945. Boston.: Houghton Muffin Company, 1974.

Thursday, October 24, 2019

Power Theft Detection

1. INTRODUCTION The automatic meter reading(AMR) system as become a necessity for most suppliers as deregulation, free customer choice and open market competition occur in the energy supply sector. Power line communication has many new service possibilities on the data transferring via power lines without use extra cables. AMR is a very important application in these possibilities due to every user connected each other via modems using power lines. AMR is a technique to facilitate remote readings energy consumption.Improving the electrical power supply to households as a big issue. The government has set a specific goal to raise the distribution rate of electrical power supply, which is now around 70% to 80% to 100%. Power companies are plagued by power theft. PLC will play an important role in placing anti-theft power system. Illegal electricity may be a serious problem in many countries . This problem has been attempted to be resolved by special skills of humans, such as the police special security etc. These method could not give optimum solution due to their impracticalities. Similar essay: Essay About Snatch TheftMeter reading has been applied by humans and some electronics solutions such as optical reading methods, creditable utilization of electrical energy etc. Many chips which can be used for digital energy metering and PLC modems. The problem of illegal usage of electricity must be solved electronically, without any human control. 2. POWER THEFT Electrical power by altering, slowing, resetting, swapping, or disconnecting an electric meter. Theft also may occur by rewiring circuits to avoid an electric meter, or by tapping into another customer’s electrical lines.The fraudster might use devices to program the theft of power only during certain periods of theday or week. A fraudster may rewire their property to illegally use power from cheaper sources of power, or from meters that are billed at lower rates. The fraudster risks electrocution and detection. Field employees of the power company are trained to spot problems that result in persons n ot being billed for all the electricity they use. Computerized billing systems are designed to detect erratic electricity use Fig No 2. 1 3. PLC installATION.Power meters with PLC  modules will be installed near the top of the power polls. Previously, it was enough to install power meters in high places, not in low places such as the house wall, to prevent users from using power illegally by connecting cables, or by using tampered meters. However, by doing so, the homeowners themselves cannot check how much electricity was used. Therefore, PLC  technology was chosen. Meters installed in high places will send data of the used amount to each household through power lines. Homeowners can then check the amount used on the displays installed in each house.This means that the measurement function and the display function of the meters will be separated. [pic] Fig No3. 1 †¢Ã‚  Power theft is prevented by installing  HD-PLC-mounted power meters on a high position on power polls, while the amount of power used in each household can still be checked Each power meter is connected to an optical fiber network, and information of the amount used by each household is sent to the power companies. If the power companies find that a payment is delinquent, they can remotely stop the power supply by controlling the meters through the optical fiber network.In this way,  HD-PLC  and optical fiber networks enable power companies to prevent power theft, and to grasp the actual amount of power consumed by district or by each household in real time, and also to control the amount of power supply. The waste of power can also be reduced, another big advantage. Furthermore, wide spread use of the power meters with  HD-PLC  modules is expected to reduce regional disparities in information, or the ‘digital divide’. 4 . DETECTION OF ILLEGAL ELECTRICITY USAGE 4. 1 Methods Of Illegal Electricity Usage:In illegal usage, a subscriber illegally use electricity in f ollowing ways: 4. 1. 1 Using the mechanical objects: A subscriber can use some mechanical objects to prevent the revolution of a meter, so that disk speed is reduced and the recorded energy is also reduced. 4. 1. 2 Using a fixed magnet: A subscriber can use a fixed magnet to change the electromagnetic field of the current coils. As is well known , the recorded energy proportional to electromagnetic field. 4. 1. 3. Using the external phase before meter terminals: This method gives subscribers free energy without any record. . 1. 4. Switching the energy cables at the meter connector box: In this way ,the current does not pass through the current coil of the meter, so the meter does not record the energy consumption. Although all of the methods explained above may be valid for electromechanical meters, only the last two methods are valid for digital meters. 5. DESCRIPTION ON PLC Most economically viable technology for transferring Meter data to DCU. Uses the technique of communicating the data over existing Electrical Lines which carry LT power to the site.PLC is a kind of communication technology, which uses Medium Voltage(MV) and Low Voltage(LV) distribution network as the communication media to implement transmission of data, voice and real time image. The components involved in PLC are the; 1. Power Line Carrier Unit which provides signal transmission and reception. 2. There is a Coupler used for â€Å"clamping† around a live wire thus injecting the communication signals into the power line. 3. PLC modem 5. 1 The monitoring system mainly has the following functions: 1. Remote meter-reading 2. Data acquisition 3. Thread PLC transmissions are synchronized to the zero crossing point of the AC power line. It should be transmitted as close to the zero crossing point i. e. within 200 ? s. Square wave with a max Delay of 100 ? s from the zero crossing point The maximum delay between signal envelope input and 120KHz output bursts is 50 ? s. Therefore, it shoul d be arranged that outputs to the within 50 ? s. 5. 2 CODE TRANSMISSION: A Binary 1 is represented by a 1 ms burst of 120 KHz the zero crossing point and a Binary 0 by the absence of 120 KHz. Therefore only the 1 ms â€Å"envelope† need be applied to their inputs.These 1 millisecond bursts should actually be transmitted three times to coincide with the zero crossing points of all three phases in a three phase distribution system. 6. DIFFERENT COUPLING UNITS. [pic] 7. DEFINITION ON AMR AMR(AUTOMATIC REMOTE READING) automates the process of measurement through digital communication techniques. Bring â€Å"intelligence† into the revenue cycle and manage it: The revenue cycle includes metering, billing operating, customer and the services. 7. 1 ADVANTAGES: 1. Smart automated process instead of manual work. 2. Accurate information from the network load to optimise maintenance and investments . Customized rates and billing dates. 4. Streamlined high bill investigations. 5. D etection of tampering of Meters. 6. Accurate measurement of transmission losses. 7. Better network performance and cost efficiency. 8. Demand and distribution management. 9. More intelligence to business planning 10. Better company credibility. 8. DETECTION AND CONTROL SYSTEM The proposed control system for the detection of illegal electricity usage is: [pic] FIG. 8. 1 PLC signaling is only valid over the low voltage -220VAC power lines. The system should be applied to every low-voltage distribution network.The system given in fig 7. 1 belongs only one distribution transformer network and should be repeated for every distribution network. Although the proposed system can be used uniquely, it is better to use it with automatic meter reading system. If the AMR system will be used in any network, the host PLC unit and a PLC modem for every subscriber should be contained in this system. In fig7. 1 the host PLC unit and other PLC modems are named PLC1A,†¦. ,PLCNA and are used for AM R. These units provide communication with each other and send the recorded data in kilowatthour meters to the PLC unit.In order to detect illegal usage of electrical energy, a PLC modem and an energy meter chip for every subscriber are added to an existing AMR system. As given in fig1, PLC1B,†¦Ã¢â‚¬ ¦,PLCNB and energy meter chips belong to the detector. The detector PLC’s and energy meters must be placed at the connection point between distribution main lines and subscriber’s line. 8. 1 ADVANTAGE OF THIS SYSTEM : Most economically viable technology for transferring Meter data to DCU. Uses the technique of communicating the data over existing Electrical Lines which carry LT power to the site.Since the connection point is usually in the air or at underground, it is not suitable for anyone to access, such that its control is easy. It is very economical and is reliable solution when it is compared with the economical loss caused by illegal usage. 8. 2 CONDITIONS FOR T HIS DETECTION AND CONTROL: PLC signaling must be in CENELAC standards. CENELAC has formed the standard in which the frequency bands, signaling levels, and procedure are specified. 3-9 khz are restricted for use by electricity suppliers, and 95-148. 5khz are restricted to consumer use. The signal level for the band 95-148. khz is limited as follows. For general use ,the signaling level is limited to 116db µV. 9. DETECTION The recorded data in kilowatt hour meters for every subscriber are sent to host PLC modem via PLC modems which are placed in subscribers locations. On the other hand energy meter chips are located in connection point and read the enrgy in kilowatthours and also send the data to host PLC unit. This proposed detector system as two recorded energy data in host PLC unit, one which comes from the AMR-PLC, and the other which comes from the PLC at the connection points.These two recorded energy data are compared in the host PLC; if there is any difference between two re adings an error signal is generated. This means that there is an illegal electricity usage in the network. After that, the subscriber address and error signal are combined and sent to the central control unit. If it is, requested, a contacter may be included to the system at location to turn off the energy automatically, as in the case of illegal usage 10.. ILLEGAL DETECTOR SYSTEM FOR ONE SUBSCRIBER [pic] Fig No 10. 1 11.SYSTEM SIMULATION AND MODELLING OF THE DETECTION SYSTEM OF ILLEGAL ELECTRICITY USAGE FOR ELECTROMECHANICAL KILOWATTHOUR METERS [pic] Figure 11. 1 A host PLC modem, an energy meter chip and its PLC modem, an electromechanical kilowatthour meter and its PLC modem, and an optical reflector sensor system are loaded at the same phase of the power grid. The energy value at the electromechanical kilowatthour meter is converted to digital data using optical reflector sensor. Disk speed of the kilowatthour meter is couted and obtained data is sent to PLC modem as energy valu e of the kilowatthour meter.At the system model, an illegal load may be connected to the power line before the kilowatthour meter via an S switch. While only a legal load is in the system, two meters are accorded each other to compensate for any error readings. The host PLC unit reads two recorded data coming from metering PLC units. If the S switch is closed ,illegal load is connected to the system. , and therefore two recorded energy values are different from each other. The host PLC unit is generated when it received two different records from the same subscriber. This is the detection of the illegal usage for interested users.In these, the tests, the carrier frequency is selected at 132khz, which is permitted in the CENELAC frequency band. In real application, the AMR system may be designed in all CENELAC bands. The data rate between the host and the other PLC modem is 2400b/s. Data signaling between PLC modems has a protocol which includes a header, address, energy value data, error correction bits, and other serial communication bits such as parity and stop bits. The protocol may also be changed according to the properties of the required system and national power grid architecture.In the digital energy meter system, the recorded energy may be received in the digital form directly using the port of the meter. Therefore, there is no need for an optical reflector system in digital meters. 12. AN OVERVIEW OF THE PROPOSED DETECTOR SYSTEM The proposed detector system is the equipment and procedure for controlling more remote stations from a master control station. It includes PLC modems, energy meters, control logics, and the system software . 12. 1 PLC MODEMS: These used for two way communication to and from the host station and the remotely controlled targets. 12. 2 ENERGY METER AND CONTROL LOGIC:Energy meter includes metering chip, and some circuit element. control and logic units compare and generate the error signal in the illegal usage. 12. 3 SYTEM SOFT WARE: Assembler program for the microcontroller and the operating software for the management of the overall system. Operator software may be downloaded from a PC and should be placed in the main center of the system. 13. AN AMR SYSTEM FOR AN ILLEGAL DETECTOR PERFORMS THE FOLLOWING FUNCTONS: 1) 1Every user has two PLC modems; one is for AMR and the other is used to send the data from second energy meter chip to host PLC modem. ) An energy meter must be connected in the connection box between a home line and main power lines. 3) The host PLC unit must be placed in the distribution transformer and the configuration of the addressing format of PLC signaling must be designed carefully. 4. The host PLC modem and its controller must include two addresses per every user: one is the AMR and the other for the energy meter. These two addresses must be selected sequentially. 5. Operating software must designed for the information of every subscriber in every sub power network: subscriber ident ification number, billing address etc. . The system has two values of energy consumption for every user, so if there is a difference between them an error signal is generated for the illegal user. 7. The proposed equipment is the only one distributed in the power network. So this system should be repeated for all distribution power networks. All host units in each distribution transformer maybe connected only one main center station via phone lines, fibre optic cable or RF links. 14. CONCLUSION A detector system to determine illegal electricity usage via power line communication is designed and proposed.The proposed system is examined in laboratory conditions. Obtained results from this study show that if the AMR and detector system are used together, illegal usage of electricity may detected. The system functions with real-time monitoring users and burden forecast, which uses MV&LV PLC as its transmission media. The system is integrated with power management and burden control. Und er power theft, the relay is switched off isolating the area of power theft from the EB side . LCD display also indicates power theft. Energy regulation does not epresent an obstacle, since PLC service does not affect the power supply and maintains separate accounts from the core utility business. Once this proposed system is tried in real power lines, the distribution losses can be reduced effectively. 15. REFERENCE [1]Hakki Cavdar, †A solution to remote detection of illegal electricity usage via power line communication†, IEEE Trans. Power Delivery,vol. 19,no. 4,Oct 2004. [2] T. Y. Lim and T. W. Chan, â€Å"Experimenting remote kilowatt hour meter through low voltage power lines at dense housing areas†, IEEE Trans. Power Delivery, vol. 17, pp708-711,july 2002. [3] J.Newbury and W. Miller,† Multiprotocol routing for automatic remote using power line carrier systems†, IEEE Trans. Power delivery,vol. 16 pp 1-5,Jan 2001. ABSTARCT Power Line Communication (PLC) presents an interesting and economical solution for automatic meter reading (AMR). If an AMR system via PLC is set in a power delivery system, a detection system for illegal electricity usage may be easily added in the existing PLC network. In the detection system, the second digitally energy meter chip is used and the value of energy is stored. The recorded energy is compared with the value at the main kilowatt-hour meter.In the case of difference between two recorded energy data, in error signal is generated and transmitted via PLC network. The detector and control system is proposed. The architecture of the system and their critical components are given. This report describes a prototype of the detector system for illegal electricity usage using the power lines. ACKNOWLEDGEMENT I am thankful to Prof. Sukumaran P R ,Head of the Department for providing me with the facilities for the seminar. I would also express my sincere gratitude to Mrs. Rajashree Raghavan ,for her guida nce and mere cooperation for preparing and presenting the seminar.Above all I thank all the faculties of the EEE Department and my friends for their moral support and encouragement. CONTENTS 1. INTRODUCTION01 2. WHAT IS POWER THEFT? 02 3. How is PLC installed ? 03 4. DETECTION OF ILLEGAL ELECTRICITY USAGE04 5. DESCRIPTION ON PLC:05 6. DETECTION AND CONTROL SYSTEM07 7. ILLEGAL DETECTOR SYSTEM FOR ONE SUBSCRIBER:10 8. SYSTEM SIMULATION AND MODELLING OF THE DETECTION SYSTEM OF ILLEGAL ELECTRICITY USAGE FOR ELECTROMECHANICAL KILOWATTHOUR METERS11 9. AN OVERVIEW OF THE PROPOSED DETECTOR SYSTEM:13 10. CONCLUSION:15 11. REFERENCE16

Wednesday, October 23, 2019

Exim Policy India Analysis Essay

EXIM policy should be more transparent which should favour export environment The EXIM policy (Foreign trade policy) was announced on 27th August 2009 for the period 2009-2014. It was announced at a juncture when the world was recuperating from the economic downturn. The downturn had caused a sharp contraction in international trade and adversely impacted global investments. The world trade suffered a drastic reduction of 12%. In this context, the EXIM policy focussed on arresting declining exports. Market diversification strategy was adopted in order to reach out to non traditional destinations in Africa ,Latin America and Asia since there was a sharp decline in demand in the traditional market. Technological up gradation of exports was encouraged and transaction procedures were simplified to reduce costs. Other steps planned wee to concentrate on Labour intensive sectors and the draft policy parameters to enhance the competitiveness of our exports by promoting technology upgrades. A Committee of Experts was constituted to revamp the procedures of transactions and administer the value chain of exports. Amidst the current global economic turmoil, the Indian government should take prudent steps to avoid the recurrence of another recession. In light of the recent developments, the EXIM policy should encourage exports and stimulate international trade. While, the current EXIM policy mentions a considerable emphasis on exports, a detailed check is required if the trade is actually adhering to the policies framed and if the transparency is being maintained in the transactions. a) Currency printing should be done by private top 3 financial institutions in the country. The Reserve Bank of India manages the currency in the country with the help of the advice from the government of India. RBI distributes notes and rupee coins to other bank branches through certain selected currency chest branches. Printing additional currency should be done in a controlled manner since it can have a great impact on the economy. India can’t merely print additional currency to meet public expenditure unless it is a time of extreme financial crisis. This method of increasing liquidity in the market is called Quantitative Easing and happens when the Central bank fails to inject liquidity in the system by lowering interest rates. This is mainly done to prevent deflation. However, uncontrolled printing of money causes inflation and can lead to hyper inflation in extreme cases. RBI uses three main factors are used to estimate the demand for bank notes – current growth rate of economy, replacement demand and reserve requirements. During the time of recession, it is all the more important to be prudent on printing money since the economy is on a decline and it becomes imperative to control inflation. Hence, monitoring the currency printing is of utmost importance and this can be achieved by allowing only the top 3 private financial institutions in the country. a) FDI should be allowed in multi brand so as to eliminate intermediaries and benefit farmers and industries directly. It will help in curbing inflation. FDI in multi brand retail should be encouraged since it would contribute extensively in the growth of the economy. It would improve the availability of high quality goods and create an environment of competitiveness in Indian entrepreneurs by giving exposure to global management practices. It would also encourage better technology and enhance efficiencies. However, the policy should be implemented within the purview of the state laws and regulations. This would ensure that there is no anti- competitive practices including predatory pricing. Investments in terms of FDI in retail would in turn help in developing the infrastructure of the country in terms of supply chain and logistics. This would also eliminate intermediaries and benefit farmers and industries directly. This strategy would greatly help in controlling recession since this help in generating demand at the low income level and eventually would eliminate the income divide. It would also curb inflation in an efficient manner. a) More emphasis should be given on R& D of capital goods which are prima facie being produced by developed economies. The profits of the capital goods sector is directly linked with the profits of the entire Indian industry. This is further corroborated by the high elasticity behavior of Capital goods industry to the fluctuations in the industry growth. One of the key stimulators for demand in the capital goods sector is the manufacturing sector which forms the end user of these goods. Another stimulator for the demand is the gross investment made in this sector by the country. It is important to have a good demand for the Capital goods since its consumption constitutes 17-21 percent of the GDP of the country. However, the investments in this sector have declined when compared to other sectors. Hence, more emphasis on the investment and R&D of capital goods will provide considerable boost to the GDP of the country and in turn help in curbing recession. This is one of the most effective ways to control recession. a) Government should spend in agro based economies like Africa to have favourable terms for import of agriculture products. Although imports of agricultural products form a very small percentage of the total imports, the import duties and countries of trade pose significant hurdles. The current import statistics of various agricultural products are as follows. The total agri imports are in the range of 4-7 percent of the total imports. Edible oil accounts for more than 50% of the agri imports. Raw cashew nut accounts for about 10 percent of the agri imports. Other agricultural products imported are – cereals,pulses,spices,sugar chicken meat etc .However, these form a very low percentage of the agri imports and are imported in climatically abnormal years. Government should put extensive effort to build ties with agro based economies like Africa which would help reducing the expenditure on agricultural imports. This in-turn would help in maintaining the balance even in adverse years when domestic production fails to fulfill the demand. This gap between demand and supply in a bad year is one of the root causes of creating a recession. Hence, this is a cost effective alternative to fulfill this supply and curb the occurrence of a recession.