SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
DOI : 10.5121/ijist.2014.4315 115
SECURED WIRELESS POWER
TRANSMISSION USING RADIO FREQUENCY
SIGNAL
B. Renil Randy1
, M.Hariharan2
, R. Arasa Kumar3
1,2
UG Students, 3
Assistant Professor
Velammal College of Engineering and Technology, Madurai
ABSTRACT:
Anything we transmit without protection is being raid by the intruders. Hence it is necessary to impart
security to the signal transmitted. In this paper we present the concept of giving security to the transmitted
power signal which is to be received by a receiver in a wireless medium. The present techniques of wireless
power transmission consists of a pair of strongly magnetically coupled resonators that allow power
transmission of tens of watts over a few meters, but anything without security becomes unreliable. With the
goal in achieving security to the power signal, we introduce the concept of encryption decryption algorithm
using RF module.
1. INTRODUCTION:
The inspiration for wireless power comes from wires being cumbersome and messy. With the
numerous number of mobile electronics that we use today, there is a huge demand for
convenience in supervision of their power supplies. Wireless communication hasmade a massive
developmentin the way we interact with communication devices. We also observe that while the
techniques of strongly coupled magnetic resonances allowefficient power transfer between a pair
of transmitter and receiver coils, the efficiency greatlydeclines upon adding more receivers to the
strongly coupled system due to theinteraction between multiple coupled resonators. In tightly
coupled resonant wirelesspower transfer, we require a one to one contact between transmitter
andreceiver. In addition, in order to improve efficiency of power transfer, we intend to use a
lower switching frequency to drive the gate of the MOSFET.
2. WIRELESS POWER TRANSMISSION (WPT) SYSTEM:
We cannot imagine the world without electric power. Normally the power is transmitted through
wires. This paper depicts an idea to eradicate the hazardous usage of electrical wires which
involve lot of confusion in particularly organizing them. Wireless Power Transmission system
would completely eliminate the dynamic high-tension power transmission cables, towers and
secondary stations between the generating station and consumers and facilitates the
interconnection of electrical generation plants on global scale. Mobile transmitters and receivers
can be chosen for the Wireless Power Transmission system. The cost for transmission and
distribution will be reduced and the cost of electrical energy for the consumers also would be
diminished. The power could also be transmitted to the places where the wired transmission is not
possible.
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
116
2.1.VARIOUS SCHEMES OF WIRELESS POWER TRANSFER:
There are many techniques which are being used to achieve wireless power transfer. Some of the
methods are being discussed below.
2.1.1. WPT using Microwaves:
In the transmission side, the microwave power source generates microwave power and the output
power is managed by electronic restrain circuits. The purpose of the tuner is to match the
impedance between the transmitting antenna and the microwave source. The attenuated signals
gets divided based on the direction of signal propagation by Directional Coupler. The transmitting
antenna emits the power uniformly through free space to the rectenna. In the receiving section, a
rectenna receives the transmitted power and translates the microwave power to DC power. The
impedance matching circuit and the filter is provided for setting the output impedance of a signal
source equal to the rectifying circuit. The rectifying circuit haveSchottky barrier diodes which
converts the received microwave power into DC power.
2.1.2. WPT using Magnetic Resonance:
In this technique, at first we design an oscillator, which generates the carrier signal to transmit
the power. Oscillators are not usually designed to deliver power, thus a power amplifier is added
to the oscillator to amplify the oscillating signal. The power amplifier would hand over the output
power to the transmission coil. Next, a receiver coil is constructed to receive the transmitted
power. However, the power received in the receiver side have an alternating current. Thus, a
rectifier is needed to rectify the AC voltage. Finally, an electric load is attached to finish the entire
circuit design.
Figure1. WPT using Magnetic Resonance
2.1.3WPT using Space Solar power (SSP)Satellites:
In this method, there are two basic WPT options, one is using radio waves and the other is using
light waves, are considered for both long term and short term Space Solar power applications. In
the long term, power is transferred to Earth from Geostationary earth orbit (GEO), or further
distances in the space. In the near term the power is being transmitted to the moderate distances.
By using SSP and WPT technology in near term space science and exploration missions, larger
systems are being designed and developed to send power from space to Earth.
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
117
3. BLOCK DIAGRAM:
The block diagram for the overall wireless power transceiver is given in the following figure(Fig.
1)
Figure 2. Overall Block Diagram of Wireless power Transceiver
4. TRANSMITTER:
The following diagram gives the entire transmitter section of the Wireless Power Transmission.
The 230V alternating current is fed to the transformer is rectified with bridge rectifier in which
the alternating current is converted to Direct Currentand it is filtered and regulated with the
voltage regulator. The flow of the signal without any interrupt to the transmitter input is denoted
by an LED. It consists of a RESET switch denoted by which is used to reset the programming
codes in the picmicrocontroller. The signal is given to the PIC microcontroller PIC16F877A
which has 40 pins and it has 5 input output pins and fifteen interrupts and its stability is
maintained with a crystal oscillator circuit. This signal will be controlled by the pic
microcontroller and the status of the signal is being informed with a help of an LCD display. This
signal is being transferred to the RF module through MAX 232. Four MOSFET switches are
being connected to each other so that current can pass through, by the switching between the ON
and OFF states and the passcode will be generated in MAX 232 and sent through RFtransmitter.
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
118
Figure 3. Transmitter diagram
5. RECEIVER:
The receiver operation is just the vice versa of the transmitter. The signal is being received to the
receiving antenna from the transmitting antenna. The signalthat transmitted from the RF
transmitter will reachesthe RF module at the receiver. There is no separate power supply for the
receiver section. The current induced in the induction coil is given to the secondary coil of the
transformer. In the receiver section, only one MOSFET switch is used which allows current only
in the ON state ie, when the signal reaches the RF receiver it will send the passcode to the MAX
232 when the passcode matches then it will trigger the circuit and makes MOSFET switch in ON
condition. The current passes to ensure that only the authenticated receiver receives the power
signal.
Figure 4. Receiver diagram
6. RESULTS:
From the plots given, we come to infer that efficiency of the system has been increased using
various parameters when compared to that of the efficiencies of the existing system. Thus the
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
118
Figure 3. Transmitter diagram
5. RECEIVER:
The receiver operation is just the vice versa of the transmitter. The signal is being received to the
receiving antenna from the transmitting antenna. The signalthat transmitted from the RF
transmitter will reachesthe RF module at the receiver. There is no separate power supply for the
receiver section. The current induced in the induction coil is given to the secondary coil of the
transformer. In the receiver section, only one MOSFET switch is used which allows current only
in the ON state ie, when the signal reaches the RF receiver it will send the passcode to the MAX
232 when the passcode matches then it will trigger the circuit and makes MOSFET switch in ON
condition. The current passes to ensure that only the authenticated receiver receives the power
signal.
Figure 4. Receiver diagram
6. RESULTS:
From the plots given, we come to infer that efficiency of the system has been increased using
various parameters when compared to that of the efficiencies of the existing system. Thus the
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
118
Figure 3. Transmitter diagram
5. RECEIVER:
The receiver operation is just the vice versa of the transmitter. The signal is being received to the
receiving antenna from the transmitting antenna. The signalthat transmitted from the RF
transmitter will reachesthe RF module at the receiver. There is no separate power supply for the
receiver section. The current induced in the induction coil is given to the secondary coil of the
transformer. In the receiver section, only one MOSFET switch is used which allows current only
in the ON state ie, when the signal reaches the RF receiver it will send the passcode to the MAX
232 when the passcode matches then it will trigger the circuit and makes MOSFET switch in ON
condition. The current passes to ensure that only the authenticated receiver receives the power
signal.
Figure 4. Receiver diagram
6. RESULTS:
From the plots given, we come to infer that efficiency of the system has been increased using
various parameters when compared to that of the efficiencies of the existing system. Thus the
119
concept of presenting the idea of providing security to the transmitted signal in the wireless
medium and receiving is attained is done for a limited space in small scale. This would also
become base for the further research in transmitting and receiving signals in a large scale through
anyone one of the above listed techniques.
Table 1. Result of current by varying distance of receiver
Distance
(feet)
Voltage
(Volts)
Current
(mA)
3 4 500
2 4.5 550
1 5 600
0.5 5.5 750
Maximum
closest
position
6 1000
From the above observations, the power transferred from the transmitter to the receiver is
maximum at the closest position and when the distance between them is increased, the power
received in the receiver gets reduced.
When the transmitter is switched to the port of the receiver A, we are able to observe that the
LED on the receiver A glows and the LED in the receiver coil B doesn’t glow since receive B is
not the authenticated user to use the power signal. Any metal sheet obstacle when placed between
120
the transmitter and the receiver, it is found that the power is transmitted to the authenticated user
as the metal sheet is a conductor.
Table 2. Result of temperature with varying distance
Distance (feet) Temperature (°C)
3 27
2 27.7
1 28.2
0.5 29.5
Maximum closest position 30
From the above tabulation, we find that the temperature in the receiver coil gets increased when
the when the distance the distance between the transmitter and the receiver is decreased
Table 3. Result on transmitter coil heating
PWM On duty Time Transmitter coil heating
(°C)
100% 45
90% 43
80% 41
70% 40
60% 38
From the above observations, we find that at the temperature of the transmitter coil is high
when the ON duty time of the Pulse width modulation (PWM) is maximum.
121
When the transmitter is neither switched to the receiver of port A nor port B ie, the switch is held
in the middle. Then both the receiver A and B can't receive the power since both the receivers are
not authenticated even though the power is transmitted in the air and the coil induces it. The four
MOSFET which is being connected in series helps in switching the current. The amount of power
received in the receiver varies when the distance between the transmitter and the receiver varies
as discussed.
7. CONCLUSION:
We have placed two receivers with decoders which decodes the passcode given as coding to the
RF module in the transmitter section. The receiver which has the matched passcode decoded has
received the power signal successfully. The receiver with the decoder decoding a passcode
mismatch failed to receive the power signal. Our project can also be implemented in Online
Electric Vehicle (OLEV). OLEV wireless charging system consists of a road-side Power Inverter
to bring electricity from the grid to the road embedded power tracks. A proprietary Roadway
Infrastructure consisting of Road-embedded Power tracks installed at selected locations of the
route.A proprietary Pick-Up and Regulator kit for the wireless power transfer installed in or under
the electric vehicle. Hence in this system the unauthorised users are denied permission to use the
power source using the key idea of the project.
122
REFERENCES:
[1] S. Kopparthi, Pratul K. Ajmera, "Power delivery for remotely located Microsystems,"
[2] Proc. of IEEE Region 5, 2004 Annual Tech. Conference, 2004 April 2, pp. 31-39.
[3] Nikola Tesla, “The Transmission of Electrical Energy Without Wires as a Means for Furthering
Peace,” Electrical World and Engineer. Jan. 7, p. 21, 1985.
[4] T. Deyle and M. Reynolds, “Surface based wireless power transmission and bidirectional
communication for autonomous robot swarms” in Proceedings IEEE Conference on Robotics, 2008.
[5] M. Ghovanloo, et al., “A Wide-band Power-efficient Inductive Wireless Link for Implantable
Microelectronic Devices Using Multiple Carriers,” IEEE Trans. Circuits and Systems, vol. 54, no. 10,
October 2007.
[6] K. M. Silay, et al., “Improvement of Power Efficiency of Inductive Links for Implantable Devices,”
Research in Microelectronics and Electronics, pp. 229-232, June 2008.
AUTHORS:
B. Renil Randy is doing his B.E. degree in Velammal College of Engineering and
Technology, Madurai, India. He is interested in the area of Wireless Communication and
Signal Processing.
M. Hariharanis doing his B.E. degree in Velammal College of Engineering and
Technology, Madurai, India. He is intere sted in the area of Wireless Communication and
specialized in Wireless Power Transmission.
R. Arasa Kumar,M.E.is working as Assistant Professor in Velammal College of
Engineering and Technology, Madurai. He also has teachin g experience at Kalasalingam
Institute of Technology, Krishnakoil. He was graduated at MepcoSchlenk Engineering
College, Sivakasi.

More Related Content

Similar to SECURED WIRELESS POWER TRANSMISSION USING RADIO FREQUENCY SIGNAL

A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...
A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...
A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...TELKOMNIKA JOURNAL
 
Effect of DC voltage source on the voltage and current of transmitter and rec...
Effect of DC voltage source on the voltage and current of transmitter and rec...Effect of DC voltage source on the voltage and current of transmitter and rec...
Effect of DC voltage source on the voltage and current of transmitter and rec...journalBEEI
 
IRJET- Wireless Power Theft Monitoring System using Zigbee
IRJET- Wireless Power Theft Monitoring System using ZigbeeIRJET- Wireless Power Theft Monitoring System using Zigbee
IRJET- Wireless Power Theft Monitoring System using ZigbeeIRJET Journal
 
Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...
Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...
Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...IOSRJECE
 
IRJET- Wireless Charging of Mobile Phones with Microwaves- A Review
IRJET-  	  Wireless Charging of Mobile Phones with Microwaves- A ReviewIRJET-  	  Wireless Charging of Mobile Phones with Microwaves- A Review
IRJET- Wireless Charging of Mobile Phones with Microwaves- A ReviewIRJET Journal
 
“Microcontroller Based Substation Monitoring system with gsm modem”.
“Microcontroller Based Substation Monitoring system with gsm modem”.“Microcontroller Based Substation Monitoring system with gsm modem”.
“Microcontroller Based Substation Monitoring system with gsm modem”.Priya Rachakonda
 
WIRELESS POWER THEFT MONITORING SYSTEM
WIRELESS POWER THEFT MONITORING SYSTEMWIRELESS POWER THEFT MONITORING SYSTEM
WIRELESS POWER THEFT MONITORING SYSTEMvivatechijri
 
Wireless Power Transmission for Mobile Charging
Wireless Power Transmission for Mobile ChargingWireless Power Transmission for Mobile Charging
Wireless Power Transmission for Mobile ChargingIRJET Journal
 
IRJET- Automatic HF Antenna Tuner
IRJET-  	  Automatic HF Antenna TunerIRJET-  	  Automatic HF Antenna Tuner
IRJET- Automatic HF Antenna TunerIRJET Journal
 
Wireless Mobile Charger Design Based on Inductive Coupling
Wireless Mobile Charger Design Based on Inductive CouplingWireless Mobile Charger Design Based on Inductive Coupling
Wireless Mobile Charger Design Based on Inductive Couplingijtsrd
 
DESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICES
DESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICESDESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICES
DESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICESJournal For Research
 
Wireless Power Transmission Using Solar Power System
Wireless Power Transmission Using Solar Power System Wireless Power Transmission Using Solar Power System
Wireless Power Transmission Using Solar Power System elprocus
 
Wireless power transmission using magnetrons
Wireless power transmission using magnetronsWireless power transmission using magnetrons
Wireless power transmission using magnetronsmkanth
 
paper on Wireless power transmission using magnetic resonance
paper on Wireless power transmission using magnetic resonancepaper on Wireless power transmission using magnetic resonance
paper on Wireless power transmission using magnetic resonancemkanth
 
Remote control of electrical equipment(eee499.blogspot.com)
Remote control of electrical equipment(eee499.blogspot.com)Remote control of electrical equipment(eee499.blogspot.com)
Remote control of electrical equipment(eee499.blogspot.com)slmnsvn
 
Seminar Report on Wireless Mobile Charger
Seminar Report on Wireless Mobile ChargerSeminar Report on Wireless Mobile Charger
Seminar Report on Wireless Mobile ChargerEr Amreek Singh Masoun
 
Seminar Report on Wireless Mobile Charger
Seminar Report on Wireless Mobile ChargerSeminar Report on Wireless Mobile Charger
Seminar Report on Wireless Mobile ChargerEr Amreek Singh Masoun
 

Similar to SECURED WIRELESS POWER TRANSMISSION USING RADIO FREQUENCY SIGNAL (20)

A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...
A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...
A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...
 
Effect of DC voltage source on the voltage and current of transmitter and rec...
Effect of DC voltage source on the voltage and current of transmitter and rec...Effect of DC voltage source on the voltage and current of transmitter and rec...
Effect of DC voltage source on the voltage and current of transmitter and rec...
 
IRJET- Wireless Power Theft Monitoring System using Zigbee
IRJET- Wireless Power Theft Monitoring System using ZigbeeIRJET- Wireless Power Theft Monitoring System using Zigbee
IRJET- Wireless Power Theft Monitoring System using Zigbee
 
Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...
Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...
Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...
 
wireless power transfer
wireless power transferwireless power transfer
wireless power transfer
 
IRJET- Wireless Charging of Mobile Phones with Microwaves- A Review
IRJET-  	  Wireless Charging of Mobile Phones with Microwaves- A ReviewIRJET-  	  Wireless Charging of Mobile Phones with Microwaves- A Review
IRJET- Wireless Charging of Mobile Phones with Microwaves- A Review
 
“Microcontroller Based Substation Monitoring system with gsm modem”.
“Microcontroller Based Substation Monitoring system with gsm modem”.“Microcontroller Based Substation Monitoring system with gsm modem”.
“Microcontroller Based Substation Monitoring system with gsm modem”.
 
WIRELESS POWER THEFT MONITORING SYSTEM
WIRELESS POWER THEFT MONITORING SYSTEMWIRELESS POWER THEFT MONITORING SYSTEM
WIRELESS POWER THEFT MONITORING SYSTEM
 
Wireless Power Transmission for Mobile Charging
Wireless Power Transmission for Mobile ChargingWireless Power Transmission for Mobile Charging
Wireless Power Transmission for Mobile Charging
 
A010340112
A010340112A010340112
A010340112
 
IRJET- Automatic HF Antenna Tuner
IRJET-  	  Automatic HF Antenna TunerIRJET-  	  Automatic HF Antenna Tuner
IRJET- Automatic HF Antenna Tuner
 
Wireless Mobile Charger Design Based on Inductive Coupling
Wireless Mobile Charger Design Based on Inductive CouplingWireless Mobile Charger Design Based on Inductive Coupling
Wireless Mobile Charger Design Based on Inductive Coupling
 
DESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICES
DESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICESDESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICES
DESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICES
 
Wireless Power Transmission Using Solar Power System
Wireless Power Transmission Using Solar Power System Wireless Power Transmission Using Solar Power System
Wireless Power Transmission Using Solar Power System
 
Wireless charging scheme for medium power range application systems
Wireless charging scheme for medium power range application systemsWireless charging scheme for medium power range application systems
Wireless charging scheme for medium power range application systems
 
Wireless power transmission using magnetrons
Wireless power transmission using magnetronsWireless power transmission using magnetrons
Wireless power transmission using magnetrons
 
paper on Wireless power transmission using magnetic resonance
paper on Wireless power transmission using magnetic resonancepaper on Wireless power transmission using magnetic resonance
paper on Wireless power transmission using magnetic resonance
 
Remote control of electrical equipment(eee499.blogspot.com)
Remote control of electrical equipment(eee499.blogspot.com)Remote control of electrical equipment(eee499.blogspot.com)
Remote control of electrical equipment(eee499.blogspot.com)
 
Seminar Report on Wireless Mobile Charger
Seminar Report on Wireless Mobile ChargerSeminar Report on Wireless Mobile Charger
Seminar Report on Wireless Mobile Charger
 
Seminar Report on Wireless Mobile Charger
Seminar Report on Wireless Mobile ChargerSeminar Report on Wireless Mobile Charger
Seminar Report on Wireless Mobile Charger
 

More from ijistjournal

A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINijistjournal
 
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDYDECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDYijistjournal
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...ijistjournal
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...ijistjournal
 
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...ijistjournal
 
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSTOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSijistjournal
 
Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...ijistjournal
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...ijistjournal
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
 
Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...ijistjournal
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)ijistjournal
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...ijistjournal
 
Design and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression AlgorithmDesign and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression Algorithmijistjournal
 
Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...ijistjournal
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...ijistjournal
 
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTKPUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTKijistjournal
 
Call for Papers - 13th International Conference on Cloud Computing: Services ...
Call for Papers - 13th International Conference on Cloud Computing: Services ...Call for Papers - 13th International Conference on Cloud Computing: Services ...
Call for Papers - 13th International Conference on Cloud Computing: Services ...ijistjournal
 

More from ijistjournal (20)

A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
 
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDYDECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
 
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
 
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSTOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
 
Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
 
Design and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression AlgorithmDesign and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression Algorithm
 
Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...
 
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTKPUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
 
Call for Papers - 13th International Conference on Cloud Computing: Services ...
Call for Papers - 13th International Conference on Cloud Computing: Services ...Call for Papers - 13th International Conference on Cloud Computing: Services ...
Call for Papers - 13th International Conference on Cloud Computing: Services ...
 

Recently uploaded

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 

Recently uploaded (20)

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 

SECURED WIRELESS POWER TRANSMISSION USING RADIO FREQUENCY SIGNAL

  • 1. International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 DOI : 10.5121/ijist.2014.4315 115 SECURED WIRELESS POWER TRANSMISSION USING RADIO FREQUENCY SIGNAL B. Renil Randy1 , M.Hariharan2 , R. Arasa Kumar3 1,2 UG Students, 3 Assistant Professor Velammal College of Engineering and Technology, Madurai ABSTRACT: Anything we transmit without protection is being raid by the intruders. Hence it is necessary to impart security to the signal transmitted. In this paper we present the concept of giving security to the transmitted power signal which is to be received by a receiver in a wireless medium. The present techniques of wireless power transmission consists of a pair of strongly magnetically coupled resonators that allow power transmission of tens of watts over a few meters, but anything without security becomes unreliable. With the goal in achieving security to the power signal, we introduce the concept of encryption decryption algorithm using RF module. 1. INTRODUCTION: The inspiration for wireless power comes from wires being cumbersome and messy. With the numerous number of mobile electronics that we use today, there is a huge demand for convenience in supervision of their power supplies. Wireless communication hasmade a massive developmentin the way we interact with communication devices. We also observe that while the techniques of strongly coupled magnetic resonances allowefficient power transfer between a pair of transmitter and receiver coils, the efficiency greatlydeclines upon adding more receivers to the strongly coupled system due to theinteraction between multiple coupled resonators. In tightly coupled resonant wirelesspower transfer, we require a one to one contact between transmitter andreceiver. In addition, in order to improve efficiency of power transfer, we intend to use a lower switching frequency to drive the gate of the MOSFET. 2. WIRELESS POWER TRANSMISSION (WPT) SYSTEM: We cannot imagine the world without electric power. Normally the power is transmitted through wires. This paper depicts an idea to eradicate the hazardous usage of electrical wires which involve lot of confusion in particularly organizing them. Wireless Power Transmission system would completely eliminate the dynamic high-tension power transmission cables, towers and secondary stations between the generating station and consumers and facilitates the interconnection of electrical generation plants on global scale. Mobile transmitters and receivers can be chosen for the Wireless Power Transmission system. The cost for transmission and distribution will be reduced and the cost of electrical energy for the consumers also would be diminished. The power could also be transmitted to the places where the wired transmission is not possible.
  • 2. International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 116 2.1.VARIOUS SCHEMES OF WIRELESS POWER TRANSFER: There are many techniques which are being used to achieve wireless power transfer. Some of the methods are being discussed below. 2.1.1. WPT using Microwaves: In the transmission side, the microwave power source generates microwave power and the output power is managed by electronic restrain circuits. The purpose of the tuner is to match the impedance between the transmitting antenna and the microwave source. The attenuated signals gets divided based on the direction of signal propagation by Directional Coupler. The transmitting antenna emits the power uniformly through free space to the rectenna. In the receiving section, a rectenna receives the transmitted power and translates the microwave power to DC power. The impedance matching circuit and the filter is provided for setting the output impedance of a signal source equal to the rectifying circuit. The rectifying circuit haveSchottky barrier diodes which converts the received microwave power into DC power. 2.1.2. WPT using Magnetic Resonance: In this technique, at first we design an oscillator, which generates the carrier signal to transmit the power. Oscillators are not usually designed to deliver power, thus a power amplifier is added to the oscillator to amplify the oscillating signal. The power amplifier would hand over the output power to the transmission coil. Next, a receiver coil is constructed to receive the transmitted power. However, the power received in the receiver side have an alternating current. Thus, a rectifier is needed to rectify the AC voltage. Finally, an electric load is attached to finish the entire circuit design. Figure1. WPT using Magnetic Resonance 2.1.3WPT using Space Solar power (SSP)Satellites: In this method, there are two basic WPT options, one is using radio waves and the other is using light waves, are considered for both long term and short term Space Solar power applications. In the long term, power is transferred to Earth from Geostationary earth orbit (GEO), or further distances in the space. In the near term the power is being transmitted to the moderate distances. By using SSP and WPT technology in near term space science and exploration missions, larger systems are being designed and developed to send power from space to Earth.
  • 3. International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 117 3. BLOCK DIAGRAM: The block diagram for the overall wireless power transceiver is given in the following figure(Fig. 1) Figure 2. Overall Block Diagram of Wireless power Transceiver 4. TRANSMITTER: The following diagram gives the entire transmitter section of the Wireless Power Transmission. The 230V alternating current is fed to the transformer is rectified with bridge rectifier in which the alternating current is converted to Direct Currentand it is filtered and regulated with the voltage regulator. The flow of the signal without any interrupt to the transmitter input is denoted by an LED. It consists of a RESET switch denoted by which is used to reset the programming codes in the picmicrocontroller. The signal is given to the PIC microcontroller PIC16F877A which has 40 pins and it has 5 input output pins and fifteen interrupts and its stability is maintained with a crystal oscillator circuit. This signal will be controlled by the pic microcontroller and the status of the signal is being informed with a help of an LCD display. This signal is being transferred to the RF module through MAX 232. Four MOSFET switches are being connected to each other so that current can pass through, by the switching between the ON and OFF states and the passcode will be generated in MAX 232 and sent through RFtransmitter.
  • 4. International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 118 Figure 3. Transmitter diagram 5. RECEIVER: The receiver operation is just the vice versa of the transmitter. The signal is being received to the receiving antenna from the transmitting antenna. The signalthat transmitted from the RF transmitter will reachesthe RF module at the receiver. There is no separate power supply for the receiver section. The current induced in the induction coil is given to the secondary coil of the transformer. In the receiver section, only one MOSFET switch is used which allows current only in the ON state ie, when the signal reaches the RF receiver it will send the passcode to the MAX 232 when the passcode matches then it will trigger the circuit and makes MOSFET switch in ON condition. The current passes to ensure that only the authenticated receiver receives the power signal. Figure 4. Receiver diagram 6. RESULTS: From the plots given, we come to infer that efficiency of the system has been increased using various parameters when compared to that of the efficiencies of the existing system. Thus the International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 118 Figure 3. Transmitter diagram 5. RECEIVER: The receiver operation is just the vice versa of the transmitter. The signal is being received to the receiving antenna from the transmitting antenna. The signalthat transmitted from the RF transmitter will reachesthe RF module at the receiver. There is no separate power supply for the receiver section. The current induced in the induction coil is given to the secondary coil of the transformer. In the receiver section, only one MOSFET switch is used which allows current only in the ON state ie, when the signal reaches the RF receiver it will send the passcode to the MAX 232 when the passcode matches then it will trigger the circuit and makes MOSFET switch in ON condition. The current passes to ensure that only the authenticated receiver receives the power signal. Figure 4. Receiver diagram 6. RESULTS: From the plots given, we come to infer that efficiency of the system has been increased using various parameters when compared to that of the efficiencies of the existing system. Thus the International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 118 Figure 3. Transmitter diagram 5. RECEIVER: The receiver operation is just the vice versa of the transmitter. The signal is being received to the receiving antenna from the transmitting antenna. The signalthat transmitted from the RF transmitter will reachesthe RF module at the receiver. There is no separate power supply for the receiver section. The current induced in the induction coil is given to the secondary coil of the transformer. In the receiver section, only one MOSFET switch is used which allows current only in the ON state ie, when the signal reaches the RF receiver it will send the passcode to the MAX 232 when the passcode matches then it will trigger the circuit and makes MOSFET switch in ON condition. The current passes to ensure that only the authenticated receiver receives the power signal. Figure 4. Receiver diagram 6. RESULTS: From the plots given, we come to infer that efficiency of the system has been increased using various parameters when compared to that of the efficiencies of the existing system. Thus the
  • 5. 119 concept of presenting the idea of providing security to the transmitted signal in the wireless medium and receiving is attained is done for a limited space in small scale. This would also become base for the further research in transmitting and receiving signals in a large scale through anyone one of the above listed techniques. Table 1. Result of current by varying distance of receiver Distance (feet) Voltage (Volts) Current (mA) 3 4 500 2 4.5 550 1 5 600 0.5 5.5 750 Maximum closest position 6 1000 From the above observations, the power transferred from the transmitter to the receiver is maximum at the closest position and when the distance between them is increased, the power received in the receiver gets reduced. When the transmitter is switched to the port of the receiver A, we are able to observe that the LED on the receiver A glows and the LED in the receiver coil B doesn’t glow since receive B is not the authenticated user to use the power signal. Any metal sheet obstacle when placed between
  • 6. 120 the transmitter and the receiver, it is found that the power is transmitted to the authenticated user as the metal sheet is a conductor. Table 2. Result of temperature with varying distance Distance (feet) Temperature (°C) 3 27 2 27.7 1 28.2 0.5 29.5 Maximum closest position 30 From the above tabulation, we find that the temperature in the receiver coil gets increased when the when the distance the distance between the transmitter and the receiver is decreased Table 3. Result on transmitter coil heating PWM On duty Time Transmitter coil heating (°C) 100% 45 90% 43 80% 41 70% 40 60% 38 From the above observations, we find that at the temperature of the transmitter coil is high when the ON duty time of the Pulse width modulation (PWM) is maximum.
  • 7. 121 When the transmitter is neither switched to the receiver of port A nor port B ie, the switch is held in the middle. Then both the receiver A and B can't receive the power since both the receivers are not authenticated even though the power is transmitted in the air and the coil induces it. The four MOSFET which is being connected in series helps in switching the current. The amount of power received in the receiver varies when the distance between the transmitter and the receiver varies as discussed. 7. CONCLUSION: We have placed two receivers with decoders which decodes the passcode given as coding to the RF module in the transmitter section. The receiver which has the matched passcode decoded has received the power signal successfully. The receiver with the decoder decoding a passcode mismatch failed to receive the power signal. Our project can also be implemented in Online Electric Vehicle (OLEV). OLEV wireless charging system consists of a road-side Power Inverter to bring electricity from the grid to the road embedded power tracks. A proprietary Roadway Infrastructure consisting of Road-embedded Power tracks installed at selected locations of the route.A proprietary Pick-Up and Regulator kit for the wireless power transfer installed in or under the electric vehicle. Hence in this system the unauthorised users are denied permission to use the power source using the key idea of the project.
  • 8. 122 REFERENCES: [1] S. Kopparthi, Pratul K. Ajmera, "Power delivery for remotely located Microsystems," [2] Proc. of IEEE Region 5, 2004 Annual Tech. Conference, 2004 April 2, pp. 31-39. [3] Nikola Tesla, “The Transmission of Electrical Energy Without Wires as a Means for Furthering Peace,” Electrical World and Engineer. Jan. 7, p. 21, 1985. [4] T. Deyle and M. Reynolds, “Surface based wireless power transmission and bidirectional communication for autonomous robot swarms” in Proceedings IEEE Conference on Robotics, 2008. [5] M. Ghovanloo, et al., “A Wide-band Power-efficient Inductive Wireless Link for Implantable Microelectronic Devices Using Multiple Carriers,” IEEE Trans. Circuits and Systems, vol. 54, no. 10, October 2007. [6] K. M. Silay, et al., “Improvement of Power Efficiency of Inductive Links for Implantable Devices,” Research in Microelectronics and Electronics, pp. 229-232, June 2008. AUTHORS: B. Renil Randy is doing his B.E. degree in Velammal College of Engineering and Technology, Madurai, India. He is interested in the area of Wireless Communication and Signal Processing. M. Hariharanis doing his B.E. degree in Velammal College of Engineering and Technology, Madurai, India. He is intere sted in the area of Wireless Communication and specialized in Wireless Power Transmission. R. Arasa Kumar,M.E.is working as Assistant Professor in Velammal College of Engineering and Technology, Madurai. He also has teachin g experience at Kalasalingam Institute of Technology, Krishnakoil. He was graduated at MepcoSchlenk Engineering College, Sivakasi.