SlideShare a Scribd company logo
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
DOI : 10.5121/ijist.2014.4315 115
SECURED WIRELESS POWER
TRANSMISSION USING RADIO FREQUENCY
SIGNAL
B. Renil Randy1
, M.Hariharan2
, R. Arasa Kumar3
1,2
UG Students, 3
Assistant Professor
Velammal College of Engineering and Technology, Madurai
ABSTRACT:
Anything we transmit without protection is being raid by the intruders. Hence it is necessary to impart
security to the signal transmitted. In this paper we present the concept of giving security to the transmitted
power signal which is to be received by a receiver in a wireless medium. The present techniques of wireless
power transmission consists of a pair of strongly magnetically coupled resonators that allow power
transmission of tens of watts over a few meters, but anything without security becomes unreliable. With the
goal in achieving security to the power signal, we introduce the concept of encryption decryption algorithm
using RF module.
1. INTRODUCTION:
The inspiration for wireless power comes from wires being cumbersome and messy. With the
numerous number of mobile electronics that we use today, there is a huge demand for
convenience in supervision of their power supplies. Wireless communication hasmade a massive
developmentin the way we interact with communication devices. We also observe that while the
techniques of strongly coupled magnetic resonances allowefficient power transfer between a pair
of transmitter and receiver coils, the efficiency greatlydeclines upon adding more receivers to the
strongly coupled system due to theinteraction between multiple coupled resonators. In tightly
coupled resonant wirelesspower transfer, we require a one to one contact between transmitter
andreceiver. In addition, in order to improve efficiency of power transfer, we intend to use a
lower switching frequency to drive the gate of the MOSFET.
2. WIRELESS POWER TRANSMISSION (WPT) SYSTEM:
We cannot imagine the world without electric power. Normally the power is transmitted through
wires. This paper depicts an idea to eradicate the hazardous usage of electrical wires which
involve lot of confusion in particularly organizing them. Wireless Power Transmission system
would completely eliminate the dynamic high-tension power transmission cables, towers and
secondary stations between the generating station and consumers and facilitates the
interconnection of electrical generation plants on global scale. Mobile transmitters and receivers
can be chosen for the Wireless Power Transmission system. The cost for transmission and
distribution will be reduced and the cost of electrical energy for the consumers also would be
diminished. The power could also be transmitted to the places where the wired transmission is not
possible.
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
116
2.1.VARIOUS SCHEMES OF WIRELESS POWER TRANSFER:
There are many techniques which are being used to achieve wireless power transfer. Some of the
methods are being discussed below.
2.1.1. WPT using Microwaves:
In the transmission side, the microwave power source generates microwave power and the output
power is managed by electronic restrain circuits. The purpose of the tuner is to match the
impedance between the transmitting antenna and the microwave source. The attenuated signals
gets divided based on the direction of signal propagation by Directional Coupler. The transmitting
antenna emits the power uniformly through free space to the rectenna. In the receiving section, a
rectenna receives the transmitted power and translates the microwave power to DC power. The
impedance matching circuit and the filter is provided for setting the output impedance of a signal
source equal to the rectifying circuit. The rectifying circuit haveSchottky barrier diodes which
converts the received microwave power into DC power.
2.1.2. WPT using Magnetic Resonance:
In this technique, at first we design an oscillator, which generates the carrier signal to transmit
the power. Oscillators are not usually designed to deliver power, thus a power amplifier is added
to the oscillator to amplify the oscillating signal. The power amplifier would hand over the output
power to the transmission coil. Next, a receiver coil is constructed to receive the transmitted
power. However, the power received in the receiver side have an alternating current. Thus, a
rectifier is needed to rectify the AC voltage. Finally, an electric load is attached to finish the entire
circuit design.
Figure1. WPT using Magnetic Resonance
2.1.3WPT using Space Solar power (SSP)Satellites:
In this method, there are two basic WPT options, one is using radio waves and the other is using
light waves, are considered for both long term and short term Space Solar power applications. In
the long term, power is transferred to Earth from Geostationary earth orbit (GEO), or further
distances in the space. In the near term the power is being transmitted to the moderate distances.
By using SSP and WPT technology in near term space science and exploration missions, larger
systems are being designed and developed to send power from space to Earth.
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
117
3. BLOCK DIAGRAM:
The block diagram for the overall wireless power transceiver is given in the following figure(Fig.
1)
Figure 2. Overall Block Diagram of Wireless power Transceiver
4. TRANSMITTER:
The following diagram gives the entire transmitter section of the Wireless Power Transmission.
The 230V alternating current is fed to the transformer is rectified with bridge rectifier in which
the alternating current is converted to Direct Currentand it is filtered and regulated with the
voltage regulator. The flow of the signal without any interrupt to the transmitter input is denoted
by an LED. It consists of a RESET switch denoted by which is used to reset the programming
codes in the picmicrocontroller. The signal is given to the PIC microcontroller PIC16F877A
which has 40 pins and it has 5 input output pins and fifteen interrupts and its stability is
maintained with a crystal oscillator circuit. This signal will be controlled by the pic
microcontroller and the status of the signal is being informed with a help of an LCD display. This
signal is being transferred to the RF module through MAX 232. Four MOSFET switches are
being connected to each other so that current can pass through, by the switching between the ON
and OFF states and the passcode will be generated in MAX 232 and sent through RFtransmitter.
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
118
Figure 3. Transmitter diagram
5. RECEIVER:
The receiver operation is just the vice versa of the transmitter. The signal is being received to the
receiving antenna from the transmitting antenna. The signalthat transmitted from the RF
transmitter will reachesthe RF module at the receiver. There is no separate power supply for the
receiver section. The current induced in the induction coil is given to the secondary coil of the
transformer. In the receiver section, only one MOSFET switch is used which allows current only
in the ON state ie, when the signal reaches the RF receiver it will send the passcode to the MAX
232 when the passcode matches then it will trigger the circuit and makes MOSFET switch in ON
condition. The current passes to ensure that only the authenticated receiver receives the power
signal.
Figure 4. Receiver diagram
6. RESULTS:
From the plots given, we come to infer that efficiency of the system has been increased using
various parameters when compared to that of the efficiencies of the existing system. Thus the
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
118
Figure 3. Transmitter diagram
5. RECEIVER:
The receiver operation is just the vice versa of the transmitter. The signal is being received to the
receiving antenna from the transmitting antenna. The signalthat transmitted from the RF
transmitter will reachesthe RF module at the receiver. There is no separate power supply for the
receiver section. The current induced in the induction coil is given to the secondary coil of the
transformer. In the receiver section, only one MOSFET switch is used which allows current only
in the ON state ie, when the signal reaches the RF receiver it will send the passcode to the MAX
232 when the passcode matches then it will trigger the circuit and makes MOSFET switch in ON
condition. The current passes to ensure that only the authenticated receiver receives the power
signal.
Figure 4. Receiver diagram
6. RESULTS:
From the plots given, we come to infer that efficiency of the system has been increased using
various parameters when compared to that of the efficiencies of the existing system. Thus the
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
118
Figure 3. Transmitter diagram
5. RECEIVER:
The receiver operation is just the vice versa of the transmitter. The signal is being received to the
receiving antenna from the transmitting antenna. The signalthat transmitted from the RF
transmitter will reachesthe RF module at the receiver. There is no separate power supply for the
receiver section. The current induced in the induction coil is given to the secondary coil of the
transformer. In the receiver section, only one MOSFET switch is used which allows current only
in the ON state ie, when the signal reaches the RF receiver it will send the passcode to the MAX
232 when the passcode matches then it will trigger the circuit and makes MOSFET switch in ON
condition. The current passes to ensure that only the authenticated receiver receives the power
signal.
Figure 4. Receiver diagram
6. RESULTS:
From the plots given, we come to infer that efficiency of the system has been increased using
various parameters when compared to that of the efficiencies of the existing system. Thus the
119
concept of presenting the idea of providing security to the transmitted signal in the wireless
medium and receiving is attained is done for a limited space in small scale. This would also
become base for the further research in transmitting and receiving signals in a large scale through
anyone one of the above listed techniques.
Table 1. Result of current by varying distance of receiver
Distance
(feet)
Voltage
(Volts)
Current
(mA)
3 4 500
2 4.5 550
1 5 600
0.5 5.5 750
Maximum
closest
position
6 1000
From the above observations, the power transferred from the transmitter to the receiver is
maximum at the closest position and when the distance between them is increased, the power
received in the receiver gets reduced.
When the transmitter is switched to the port of the receiver A, we are able to observe that the
LED on the receiver A glows and the LED in the receiver coil B doesn’t glow since receive B is
not the authenticated user to use the power signal. Any metal sheet obstacle when placed between
120
the transmitter and the receiver, it is found that the power is transmitted to the authenticated user
as the metal sheet is a conductor.
Table 2. Result of temperature with varying distance
Distance (feet) Temperature (°C)
3 27
2 27.7
1 28.2
0.5 29.5
Maximum closest position 30
From the above tabulation, we find that the temperature in the receiver coil gets increased when
the when the distance the distance between the transmitter and the receiver is decreased
Table 3. Result on transmitter coil heating
PWM On duty Time Transmitter coil heating
(°C)
100% 45
90% 43
80% 41
70% 40
60% 38
From the above observations, we find that at the temperature of the transmitter coil is high
when the ON duty time of the Pulse width modulation (PWM) is maximum.
121
When the transmitter is neither switched to the receiver of port A nor port B ie, the switch is held
in the middle. Then both the receiver A and B can't receive the power since both the receivers are
not authenticated even though the power is transmitted in the air and the coil induces it. The four
MOSFET which is being connected in series helps in switching the current. The amount of power
received in the receiver varies when the distance between the transmitter and the receiver varies
as discussed.
7. CONCLUSION:
We have placed two receivers with decoders which decodes the passcode given as coding to the
RF module in the transmitter section. The receiver which has the matched passcode decoded has
received the power signal successfully. The receiver with the decoder decoding a passcode
mismatch failed to receive the power signal. Our project can also be implemented in Online
Electric Vehicle (OLEV). OLEV wireless charging system consists of a road-side Power Inverter
to bring electricity from the grid to the road embedded power tracks. A proprietary Roadway
Infrastructure consisting of Road-embedded Power tracks installed at selected locations of the
route.A proprietary Pick-Up and Regulator kit for the wireless power transfer installed in or under
the electric vehicle. Hence in this system the unauthorised users are denied permission to use the
power source using the key idea of the project.
122
REFERENCES:
[1] S. Kopparthi, Pratul K. Ajmera, "Power delivery for remotely located Microsystems,"
[2] Proc. of IEEE Region 5, 2004 Annual Tech. Conference, 2004 April 2, pp. 31-39.
[3] Nikola Tesla, “The Transmission of Electrical Energy Without Wires as a Means for Furthering
Peace,” Electrical World and Engineer. Jan. 7, p. 21, 1985.
[4] T. Deyle and M. Reynolds, “Surface based wireless power transmission and bidirectional
communication for autonomous robot swarms” in Proceedings IEEE Conference on Robotics, 2008.
[5] M. Ghovanloo, et al., “A Wide-band Power-efficient Inductive Wireless Link for Implantable
Microelectronic Devices Using Multiple Carriers,” IEEE Trans. Circuits and Systems, vol. 54, no. 10,
October 2007.
[6] K. M. Silay, et al., “Improvement of Power Efficiency of Inductive Links for Implantable Devices,”
Research in Microelectronics and Electronics, pp. 229-232, June 2008.
AUTHORS:
B. Renil Randy is doing his B.E. degree in Velammal College of Engineering and
Technology, Madurai, India. He is interested in the area of Wireless Communication and
Signal Processing.
M. Hariharanis doing his B.E. degree in Velammal College of Engineering and
Technology, Madurai, India. He is intere sted in the area of Wireless Communication and
specialized in Wireless Power Transmission.
R. Arasa Kumar,M.E.is working as Assistant Professor in Velammal College of
Engineering and Technology, Madurai. He also has teachin g experience at Kalasalingam
Institute of Technology, Krishnakoil. He was graduated at MepcoSchlenk Engineering
College, Sivakasi.

More Related Content

What's hot

FIND TRANSMISSION LINE FAULT AND LOCATION DETECTION
FIND  TRANSMISSION  LINE  FAULT  AND  LOCATION  DETECTIONFIND  TRANSMISSION  LINE  FAULT  AND  LOCATION  DETECTION
FIND TRANSMISSION LINE FAULT AND LOCATION DETECTION
MdSaifuddinQuader
 
Wireless Power Transmission for Mobile Charging
Wireless Power Transmission for Mobile ChargingWireless Power Transmission for Mobile Charging
Wireless Power Transmission for Mobile Charging
IRJET Journal
 
eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)
IISRT
 
Mini Project 1 - Amplitude Shift Keying (ASK) Modulator
Mini Project 1  -  Amplitude Shift Keying (ASK) ModulatorMini Project 1  -  Amplitude Shift Keying (ASK) Modulator
Mini Project 1 - Amplitude Shift Keying (ASK) Modulator
AIMST University
 
To control the pwm dc motor using ic555 timer
To control the pwm dc motor using ic555 timerTo control the pwm dc motor using ic555 timer
To control the pwm dc motor using ic555 timer
VINAY KUMAR GUDELA
 
During Damping of Low Frequency Oscillations in Power Systems with Fuzzy UPFC...
During Damping of Low Frequency Oscillations in Power Systems with Fuzzy UPFC...During Damping of Low Frequency Oscillations in Power Systems with Fuzzy UPFC...
During Damping of Low Frequency Oscillations in Power Systems with Fuzzy UPFC...
IJMER
 
Wireless charging scheme for medium power range application systems
Wireless charging scheme for medium power range application systemsWireless charging scheme for medium power range application systems
Wireless charging scheme for medium power range application systems
International Journal of Power Electronics and Drive Systems
 
28 GHz balanced pHEMT VCO with low phase noise and high output power performa...
28 GHz balanced pHEMT VCO with low phase noise and high output power performa...28 GHz balanced pHEMT VCO with low phase noise and high output power performa...
28 GHz balanced pHEMT VCO with low phase noise and high output power performa...
IJECEIAES
 
ISLANDING DETECTION TECHNIQUE FOR DISTRIBUTED GENERATION SYSTEM
ISLANDING DETECTION TECHNIQUE FOR DISTRIBUTED GENERATION SYSTEMISLANDING DETECTION TECHNIQUE FOR DISTRIBUTED GENERATION SYSTEM
ISLANDING DETECTION TECHNIQUE FOR DISTRIBUTED GENERATION SYSTEM
Siksha 'O' Anusandhan (Deemed to be University )
 
Communication system 1 chapter 1 ppt
Communication system 1 chapter  1 pptCommunication system 1 chapter  1 ppt
Communication system 1 chapter 1 ppt
BetelihemMesfin1
 
Wcdma p&o-c-en-wireless technology-2-201006-24
Wcdma p&o-c-en-wireless technology-2-201006-24Wcdma p&o-c-en-wireless technology-2-201006-24
Wcdma p&o-c-en-wireless technology-2-201006-24
Jose Asuncion Silva Vasquez
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
IJERD Editor
 
DESIGN OF HIGH EFFICIENCY TWO STAGE POWER AMPLIFIER IN 0.13UM RF CMOS TECHNOL...
DESIGN OF HIGH EFFICIENCY TWO STAGE POWER AMPLIFIER IN 0.13UM RF CMOS TECHNOL...DESIGN OF HIGH EFFICIENCY TWO STAGE POWER AMPLIFIER IN 0.13UM RF CMOS TECHNOL...
DESIGN OF HIGH EFFICIENCY TWO STAGE POWER AMPLIFIER IN 0.13UM RF CMOS TECHNOL...
VLSICS Design
 
Negative resistance amplifier circuit using GaAsFET modelled single MESFET
Negative resistance amplifier circuit using GaAsFET modelled single MESFETNegative resistance amplifier circuit using GaAsFET modelled single MESFET
Negative resistance amplifier circuit using GaAsFET modelled single MESFET
TELKOMNIKA JOURNAL
 
Frequency Controlled Protection Scheme to Protect the Theft of Electric Power...
Frequency Controlled Protection Scheme to Protect the Theft of Electric Power...Frequency Controlled Protection Scheme to Protect the Theft of Electric Power...
Frequency Controlled Protection Scheme to Protect the Theft of Electric Power...
IOSR Journals
 

What's hot (17)

FIND TRANSMISSION LINE FAULT AND LOCATION DETECTION
FIND  TRANSMISSION  LINE  FAULT  AND  LOCATION  DETECTIONFIND  TRANSMISSION  LINE  FAULT  AND  LOCATION  DETECTION
FIND TRANSMISSION LINE FAULT AND LOCATION DETECTION
 
Wireless Power Transmission for Mobile Charging
Wireless Power Transmission for Mobile ChargingWireless Power Transmission for Mobile Charging
Wireless Power Transmission for Mobile Charging
 
eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)eIisrt arutselvi (electrical)
eIisrt arutselvi (electrical)
 
Mini Project 1 - Amplitude Shift Keying (ASK) Modulator
Mini Project 1  -  Amplitude Shift Keying (ASK) ModulatorMini Project 1  -  Amplitude Shift Keying (ASK) Modulator
Mini Project 1 - Amplitude Shift Keying (ASK) Modulator
 
To control the pwm dc motor using ic555 timer
To control the pwm dc motor using ic555 timerTo control the pwm dc motor using ic555 timer
To control the pwm dc motor using ic555 timer
 
FM Transmitter
FM TransmitterFM Transmitter
FM Transmitter
 
During Damping of Low Frequency Oscillations in Power Systems with Fuzzy UPFC...
During Damping of Low Frequency Oscillations in Power Systems with Fuzzy UPFC...During Damping of Low Frequency Oscillations in Power Systems with Fuzzy UPFC...
During Damping of Low Frequency Oscillations in Power Systems with Fuzzy UPFC...
 
Wireless charging scheme for medium power range application systems
Wireless charging scheme for medium power range application systemsWireless charging scheme for medium power range application systems
Wireless charging scheme for medium power range application systems
 
28 GHz balanced pHEMT VCO with low phase noise and high output power performa...
28 GHz balanced pHEMT VCO with low phase noise and high output power performa...28 GHz balanced pHEMT VCO with low phase noise and high output power performa...
28 GHz balanced pHEMT VCO with low phase noise and high output power performa...
 
ISLANDING DETECTION TECHNIQUE FOR DISTRIBUTED GENERATION SYSTEM
ISLANDING DETECTION TECHNIQUE FOR DISTRIBUTED GENERATION SYSTEMISLANDING DETECTION TECHNIQUE FOR DISTRIBUTED GENERATION SYSTEM
ISLANDING DETECTION TECHNIQUE FOR DISTRIBUTED GENERATION SYSTEM
 
Communication system 1 chapter 1 ppt
Communication system 1 chapter  1 pptCommunication system 1 chapter  1 ppt
Communication system 1 chapter 1 ppt
 
Wcdma p&o-c-en-wireless technology-2-201006-24
Wcdma p&o-c-en-wireless technology-2-201006-24Wcdma p&o-c-en-wireless technology-2-201006-24
Wcdma p&o-c-en-wireless technology-2-201006-24
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
main
mainmain
main
 
DESIGN OF HIGH EFFICIENCY TWO STAGE POWER AMPLIFIER IN 0.13UM RF CMOS TECHNOL...
DESIGN OF HIGH EFFICIENCY TWO STAGE POWER AMPLIFIER IN 0.13UM RF CMOS TECHNOL...DESIGN OF HIGH EFFICIENCY TWO STAGE POWER AMPLIFIER IN 0.13UM RF CMOS TECHNOL...
DESIGN OF HIGH EFFICIENCY TWO STAGE POWER AMPLIFIER IN 0.13UM RF CMOS TECHNOL...
 
Negative resistance amplifier circuit using GaAsFET modelled single MESFET
Negative resistance amplifier circuit using GaAsFET modelled single MESFETNegative resistance amplifier circuit using GaAsFET modelled single MESFET
Negative resistance amplifier circuit using GaAsFET modelled single MESFET
 
Frequency Controlled Protection Scheme to Protect the Theft of Electric Power...
Frequency Controlled Protection Scheme to Protect the Theft of Electric Power...Frequency Controlled Protection Scheme to Protect the Theft of Electric Power...
Frequency Controlled Protection Scheme to Protect the Theft of Electric Power...
 

Viewers also liked

Performance analysis of gate misaligned triple
Performance analysis of gate misaligned triplePerformance analysis of gate misaligned triple
Performance analysis of gate misaligned triple
ijistjournal
 
Reducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive thresholdReducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive threshold
ijistjournal
 
A zigbee and embedded based security
A zigbee and embedded based securityA zigbee and embedded based security
A zigbee and embedded based security
ijistjournal
 
Investigational insight on gaussian
Investigational insight on gaussianInvestigational insight on gaussian
Investigational insight on gaussian
ijistjournal
 
Force sensitive resistance based heart beat
Force sensitive resistance based heart beatForce sensitive resistance based heart beat
Force sensitive resistance based heart beat
ijistjournal
 
Identifying the semantic relations on
Identifying the semantic relations onIdentifying the semantic relations on
Identifying the semantic relations on
ijistjournal
 
An embedded module as “virtual tongue”
An embedded module as “virtual tongue”An embedded module as “virtual tongue”
An embedded module as “virtual tongue”
ijistjournal
 
Fuzzy based hyperspectral image
Fuzzy based hyperspectral imageFuzzy based hyperspectral image
Fuzzy based hyperspectral imageijistjournal
 
Uwb localization of nodes for
Uwb localization of nodes forUwb localization of nodes for
Uwb localization of nodes for
ijistjournal
 
Sidelobe suppression and papr
Sidelobe suppression and paprSidelobe suppression and papr
Sidelobe suppression and papr
ijistjournal
 

Viewers also liked (10)

Performance analysis of gate misaligned triple
Performance analysis of gate misaligned triplePerformance analysis of gate misaligned triple
Performance analysis of gate misaligned triple
 
Reducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive thresholdReducing handoff delay by adaptive threshold
Reducing handoff delay by adaptive threshold
 
A zigbee and embedded based security
A zigbee and embedded based securityA zigbee and embedded based security
A zigbee and embedded based security
 
Investigational insight on gaussian
Investigational insight on gaussianInvestigational insight on gaussian
Investigational insight on gaussian
 
Force sensitive resistance based heart beat
Force sensitive resistance based heart beatForce sensitive resistance based heart beat
Force sensitive resistance based heart beat
 
Identifying the semantic relations on
Identifying the semantic relations onIdentifying the semantic relations on
Identifying the semantic relations on
 
An embedded module as “virtual tongue”
An embedded module as “virtual tongue”An embedded module as “virtual tongue”
An embedded module as “virtual tongue”
 
Fuzzy based hyperspectral image
Fuzzy based hyperspectral imageFuzzy based hyperspectral image
Fuzzy based hyperspectral image
 
Uwb localization of nodes for
Uwb localization of nodes forUwb localization of nodes for
Uwb localization of nodes for
 
Sidelobe suppression and papr
Sidelobe suppression and paprSidelobe suppression and papr
Sidelobe suppression and papr
 

Similar to Secured wireless power

speed control of three phase induction motor using IOT
speed control of three phase induction motor using IOTspeed control of three phase induction motor using IOT
speed control of three phase induction motor using IOT
swaroop009
 
Seminar report
Seminar reportSeminar report
Seminar report
Ankit Gupta
 
Microwave wireless power transmission
Microwave wireless power transmissionMicrowave wireless power transmission
Microwave wireless power transmission
Uday Wankar
 
Optical Fiber Communication ECE Practical File.pdf
Optical Fiber Communication ECE Practical File.pdfOptical Fiber Communication ECE Practical File.pdf
Optical Fiber Communication ECE Practical File.pdf
Yash Shrivastava
 
A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...
eSAT Publishing House
 
A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...
eSAT Publishing House
 
A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...
A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...
A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...
TELKOMNIKA JOURNAL
 
Effect of DC voltage source on the voltage and current of transmitter and rec...
Effect of DC voltage source on the voltage and current of transmitter and rec...Effect of DC voltage source on the voltage and current of transmitter and rec...
Effect of DC voltage source on the voltage and current of transmitter and rec...
journalBEEI
 
Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...
Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...
Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...
IOSRJECE
 
IRJET- Wireless Charging of Mobile Phones with Microwaves- A Review
IRJET-  	  Wireless Charging of Mobile Phones with Microwaves- A ReviewIRJET-  	  Wireless Charging of Mobile Phones with Microwaves- A Review
IRJET- Wireless Charging of Mobile Phones with Microwaves- A Review
IRJET Journal
 
“Microcontroller Based Substation Monitoring system with gsm modem”.
“Microcontroller Based Substation Monitoring system with gsm modem”.“Microcontroller Based Substation Monitoring system with gsm modem”.
“Microcontroller Based Substation Monitoring system with gsm modem”.
Priya Rachakonda
 
WIRELESS POWER THEFT MONITORING SYSTEM
WIRELESS POWER THEFT MONITORING SYSTEMWIRELESS POWER THEFT MONITORING SYSTEM
WIRELESS POWER THEFT MONITORING SYSTEM
vivatechijri
 
A010340112
A010340112A010340112
A010340112
IOSR Journals
 
IRJET- Automatic HF Antenna Tuner
IRJET-  	  Automatic HF Antenna TunerIRJET-  	  Automatic HF Antenna Tuner
IRJET- Automatic HF Antenna Tuner
IRJET Journal
 
Wireless Mobile Charger Design Based on Inductive Coupling
Wireless Mobile Charger Design Based on Inductive CouplingWireless Mobile Charger Design Based on Inductive Coupling
Wireless Mobile Charger Design Based on Inductive Coupling
ijtsrd
 
DESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICES
DESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICESDESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICES
DESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICES
Journal For Research
 
Wireless Power Transmission Using Solar Power System
Wireless Power Transmission Using Solar Power System Wireless Power Transmission Using Solar Power System
Wireless Power Transmission Using Solar Power System
elprocus
 
paper on Wireless power transmission using magnetic resonance
paper on Wireless power transmission using magnetic resonancepaper on Wireless power transmission using magnetic resonance
paper on Wireless power transmission using magnetic resonance
mkanth
 
Wireless power transmission using magnetrons
Wireless power transmission using magnetronsWireless power transmission using magnetrons
Wireless power transmission using magnetrons
mkanth
 

Similar to Secured wireless power (20)

speed control of three phase induction motor using IOT
speed control of three phase induction motor using IOTspeed control of three phase induction motor using IOT
speed control of three phase induction motor using IOT
 
Seminar report
Seminar reportSeminar report
Seminar report
 
Microwave wireless power transmission
Microwave wireless power transmissionMicrowave wireless power transmission
Microwave wireless power transmission
 
Optical Fiber Communication ECE Practical File.pdf
Optical Fiber Communication ECE Practical File.pdfOptical Fiber Communication ECE Practical File.pdf
Optical Fiber Communication ECE Practical File.pdf
 
A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...
 
A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...
 
A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...
A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...
A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for ...
 
Effect of DC voltage source on the voltage and current of transmitter and rec...
Effect of DC voltage source on the voltage and current of transmitter and rec...Effect of DC voltage source on the voltage and current of transmitter and rec...
Effect of DC voltage source on the voltage and current of transmitter and rec...
 
Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...
Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...
Designing an Antenna System That Can Perform Conditional RF to DC Harnessing ...
 
wireless power transfer
wireless power transferwireless power transfer
wireless power transfer
 
IRJET- Wireless Charging of Mobile Phones with Microwaves- A Review
IRJET-  	  Wireless Charging of Mobile Phones with Microwaves- A ReviewIRJET-  	  Wireless Charging of Mobile Phones with Microwaves- A Review
IRJET- Wireless Charging of Mobile Phones with Microwaves- A Review
 
“Microcontroller Based Substation Monitoring system with gsm modem”.
“Microcontroller Based Substation Monitoring system with gsm modem”.“Microcontroller Based Substation Monitoring system with gsm modem”.
“Microcontroller Based Substation Monitoring system with gsm modem”.
 
WIRELESS POWER THEFT MONITORING SYSTEM
WIRELESS POWER THEFT MONITORING SYSTEMWIRELESS POWER THEFT MONITORING SYSTEM
WIRELESS POWER THEFT MONITORING SYSTEM
 
A010340112
A010340112A010340112
A010340112
 
IRJET- Automatic HF Antenna Tuner
IRJET-  	  Automatic HF Antenna TunerIRJET-  	  Automatic HF Antenna Tuner
IRJET- Automatic HF Antenna Tuner
 
Wireless Mobile Charger Design Based on Inductive Coupling
Wireless Mobile Charger Design Based on Inductive CouplingWireless Mobile Charger Design Based on Inductive Coupling
Wireless Mobile Charger Design Based on Inductive Coupling
 
DESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICES
DESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICESDESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICES
DESIGN & ANALYSIS OF RF ENERGY HARVESTING SYSTEM FOR CHARGING LOW POWER DEVICES
 
Wireless Power Transmission Using Solar Power System
Wireless Power Transmission Using Solar Power System Wireless Power Transmission Using Solar Power System
Wireless Power Transmission Using Solar Power System
 
paper on Wireless power transmission using magnetic resonance
paper on Wireless power transmission using magnetic resonancepaper on Wireless power transmission using magnetic resonance
paper on Wireless power transmission using magnetic resonance
 
Wireless power transmission using magnetrons
Wireless power transmission using magnetronsWireless power transmission using magnetrons
Wireless power transmission using magnetrons
 

More from ijistjournal

Call for Research Articles - 5th International Conference on Artificial Intel...
Call for Research Articles - 5th International Conference on Artificial Intel...Call for Research Articles - 5th International Conference on Artificial Intel...
Call for Research Articles - 5th International Conference on Artificial Intel...
ijistjournal
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
ijistjournal
 
SYSTEM IDENTIFICATION AND MODELING FOR INTERACTING AND NON-INTERACTING TANK S...
SYSTEM IDENTIFICATION AND MODELING FOR INTERACTING AND NON-INTERACTING TANK S...SYSTEM IDENTIFICATION AND MODELING FOR INTERACTING AND NON-INTERACTING TANK S...
SYSTEM IDENTIFICATION AND MODELING FOR INTERACTING AND NON-INTERACTING TANK S...
ijistjournal
 
Call for Research Articles - 4th International Conference on NLP & Data Minin...
Call for Research Articles - 4th International Conference on NLP & Data Minin...Call for Research Articles - 4th International Conference on NLP & Data Minin...
Call for Research Articles - 4th International Conference on NLP & Data Minin...
ijistjournal
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
ijistjournal
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
ijistjournal
 
Implementation of Radon Transformation for Electrical Impedance Tomography (EIT)
Implementation of Radon Transformation for Electrical Impedance Tomography (EIT)Implementation of Radon Transformation for Electrical Impedance Tomography (EIT)
Implementation of Radon Transformation for Electrical Impedance Tomography (EIT)
ijistjournal
 
Online Paper Submission - 6th International Conference on Machine Learning & ...
Online Paper Submission - 6th International Conference on Machine Learning & ...Online Paper Submission - 6th International Conference on Machine Learning & ...
Online Paper Submission - 6th International Conference on Machine Learning & ...
ijistjournal
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...
ijistjournal
 
BER Performance of MPSK and MQAM in 2x2 Almouti MIMO Systems
BER Performance of MPSK and MQAM in 2x2 Almouti MIMO SystemsBER Performance of MPSK and MQAM in 2x2 Almouti MIMO Systems
BER Performance of MPSK and MQAM in 2x2 Almouti MIMO Systems
ijistjournal
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
ijistjournal
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
ijistjournal
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)
ijistjournal
 
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
ijistjournal
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
ijistjournal
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
ijistjournal
 
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDYDECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
ijistjournal
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
ijistjournal
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
ijistjournal
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
ijistjournal
 

More from ijistjournal (20)

Call for Research Articles - 5th International Conference on Artificial Intel...
Call for Research Articles - 5th International Conference on Artificial Intel...Call for Research Articles - 5th International Conference on Artificial Intel...
Call for Research Articles - 5th International Conference on Artificial Intel...
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
SYSTEM IDENTIFICATION AND MODELING FOR INTERACTING AND NON-INTERACTING TANK S...
SYSTEM IDENTIFICATION AND MODELING FOR INTERACTING AND NON-INTERACTING TANK S...SYSTEM IDENTIFICATION AND MODELING FOR INTERACTING AND NON-INTERACTING TANK S...
SYSTEM IDENTIFICATION AND MODELING FOR INTERACTING AND NON-INTERACTING TANK S...
 
Call for Research Articles - 4th International Conference on NLP & Data Minin...
Call for Research Articles - 4th International Conference on NLP & Data Minin...Call for Research Articles - 4th International Conference on NLP & Data Minin...
Call for Research Articles - 4th International Conference on NLP & Data Minin...
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
 
Implementation of Radon Transformation for Electrical Impedance Tomography (EIT)
Implementation of Radon Transformation for Electrical Impedance Tomography (EIT)Implementation of Radon Transformation for Electrical Impedance Tomography (EIT)
Implementation of Radon Transformation for Electrical Impedance Tomography (EIT)
 
Online Paper Submission - 6th International Conference on Machine Learning & ...
Online Paper Submission - 6th International Conference on Machine Learning & ...Online Paper Submission - 6th International Conference on Machine Learning & ...
Online Paper Submission - 6th International Conference on Machine Learning & ...
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...
 
BER Performance of MPSK and MQAM in 2x2 Almouti MIMO Systems
BER Performance of MPSK and MQAM in 2x2 Almouti MIMO SystemsBER Performance of MPSK and MQAM in 2x2 Almouti MIMO Systems
BER Performance of MPSK and MQAM in 2x2 Almouti MIMO Systems
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)
 
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
BRAIN TUMOR MRIIMAGE CLASSIFICATION WITH FEATURE SELECTION AND EXTRACTION USI...
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
 
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDYDECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

Secured wireless power

  • 1. International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 DOI : 10.5121/ijist.2014.4315 115 SECURED WIRELESS POWER TRANSMISSION USING RADIO FREQUENCY SIGNAL B. Renil Randy1 , M.Hariharan2 , R. Arasa Kumar3 1,2 UG Students, 3 Assistant Professor Velammal College of Engineering and Technology, Madurai ABSTRACT: Anything we transmit without protection is being raid by the intruders. Hence it is necessary to impart security to the signal transmitted. In this paper we present the concept of giving security to the transmitted power signal which is to be received by a receiver in a wireless medium. The present techniques of wireless power transmission consists of a pair of strongly magnetically coupled resonators that allow power transmission of tens of watts over a few meters, but anything without security becomes unreliable. With the goal in achieving security to the power signal, we introduce the concept of encryption decryption algorithm using RF module. 1. INTRODUCTION: The inspiration for wireless power comes from wires being cumbersome and messy. With the numerous number of mobile electronics that we use today, there is a huge demand for convenience in supervision of their power supplies. Wireless communication hasmade a massive developmentin the way we interact with communication devices. We also observe that while the techniques of strongly coupled magnetic resonances allowefficient power transfer between a pair of transmitter and receiver coils, the efficiency greatlydeclines upon adding more receivers to the strongly coupled system due to theinteraction between multiple coupled resonators. In tightly coupled resonant wirelesspower transfer, we require a one to one contact between transmitter andreceiver. In addition, in order to improve efficiency of power transfer, we intend to use a lower switching frequency to drive the gate of the MOSFET. 2. WIRELESS POWER TRANSMISSION (WPT) SYSTEM: We cannot imagine the world without electric power. Normally the power is transmitted through wires. This paper depicts an idea to eradicate the hazardous usage of electrical wires which involve lot of confusion in particularly organizing them. Wireless Power Transmission system would completely eliminate the dynamic high-tension power transmission cables, towers and secondary stations between the generating station and consumers and facilitates the interconnection of electrical generation plants on global scale. Mobile transmitters and receivers can be chosen for the Wireless Power Transmission system. The cost for transmission and distribution will be reduced and the cost of electrical energy for the consumers also would be diminished. The power could also be transmitted to the places where the wired transmission is not possible.
  • 2. International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 116 2.1.VARIOUS SCHEMES OF WIRELESS POWER TRANSFER: There are many techniques which are being used to achieve wireless power transfer. Some of the methods are being discussed below. 2.1.1. WPT using Microwaves: In the transmission side, the microwave power source generates microwave power and the output power is managed by electronic restrain circuits. The purpose of the tuner is to match the impedance between the transmitting antenna and the microwave source. The attenuated signals gets divided based on the direction of signal propagation by Directional Coupler. The transmitting antenna emits the power uniformly through free space to the rectenna. In the receiving section, a rectenna receives the transmitted power and translates the microwave power to DC power. The impedance matching circuit and the filter is provided for setting the output impedance of a signal source equal to the rectifying circuit. The rectifying circuit haveSchottky barrier diodes which converts the received microwave power into DC power. 2.1.2. WPT using Magnetic Resonance: In this technique, at first we design an oscillator, which generates the carrier signal to transmit the power. Oscillators are not usually designed to deliver power, thus a power amplifier is added to the oscillator to amplify the oscillating signal. The power amplifier would hand over the output power to the transmission coil. Next, a receiver coil is constructed to receive the transmitted power. However, the power received in the receiver side have an alternating current. Thus, a rectifier is needed to rectify the AC voltage. Finally, an electric load is attached to finish the entire circuit design. Figure1. WPT using Magnetic Resonance 2.1.3WPT using Space Solar power (SSP)Satellites: In this method, there are two basic WPT options, one is using radio waves and the other is using light waves, are considered for both long term and short term Space Solar power applications. In the long term, power is transferred to Earth from Geostationary earth orbit (GEO), or further distances in the space. In the near term the power is being transmitted to the moderate distances. By using SSP and WPT technology in near term space science and exploration missions, larger systems are being designed and developed to send power from space to Earth.
  • 3. International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 117 3. BLOCK DIAGRAM: The block diagram for the overall wireless power transceiver is given in the following figure(Fig. 1) Figure 2. Overall Block Diagram of Wireless power Transceiver 4. TRANSMITTER: The following diagram gives the entire transmitter section of the Wireless Power Transmission. The 230V alternating current is fed to the transformer is rectified with bridge rectifier in which the alternating current is converted to Direct Currentand it is filtered and regulated with the voltage regulator. The flow of the signal without any interrupt to the transmitter input is denoted by an LED. It consists of a RESET switch denoted by which is used to reset the programming codes in the picmicrocontroller. The signal is given to the PIC microcontroller PIC16F877A which has 40 pins and it has 5 input output pins and fifteen interrupts and its stability is maintained with a crystal oscillator circuit. This signal will be controlled by the pic microcontroller and the status of the signal is being informed with a help of an LCD display. This signal is being transferred to the RF module through MAX 232. Four MOSFET switches are being connected to each other so that current can pass through, by the switching between the ON and OFF states and the passcode will be generated in MAX 232 and sent through RFtransmitter.
  • 4. International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 118 Figure 3. Transmitter diagram 5. RECEIVER: The receiver operation is just the vice versa of the transmitter. The signal is being received to the receiving antenna from the transmitting antenna. The signalthat transmitted from the RF transmitter will reachesthe RF module at the receiver. There is no separate power supply for the receiver section. The current induced in the induction coil is given to the secondary coil of the transformer. In the receiver section, only one MOSFET switch is used which allows current only in the ON state ie, when the signal reaches the RF receiver it will send the passcode to the MAX 232 when the passcode matches then it will trigger the circuit and makes MOSFET switch in ON condition. The current passes to ensure that only the authenticated receiver receives the power signal. Figure 4. Receiver diagram 6. RESULTS: From the plots given, we come to infer that efficiency of the system has been increased using various parameters when compared to that of the efficiencies of the existing system. Thus the International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 118 Figure 3. Transmitter diagram 5. RECEIVER: The receiver operation is just the vice versa of the transmitter. The signal is being received to the receiving antenna from the transmitting antenna. The signalthat transmitted from the RF transmitter will reachesthe RF module at the receiver. There is no separate power supply for the receiver section. The current induced in the induction coil is given to the secondary coil of the transformer. In the receiver section, only one MOSFET switch is used which allows current only in the ON state ie, when the signal reaches the RF receiver it will send the passcode to the MAX 232 when the passcode matches then it will trigger the circuit and makes MOSFET switch in ON condition. The current passes to ensure that only the authenticated receiver receives the power signal. Figure 4. Receiver diagram 6. RESULTS: From the plots given, we come to infer that efficiency of the system has been increased using various parameters when compared to that of the efficiencies of the existing system. Thus the International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 118 Figure 3. Transmitter diagram 5. RECEIVER: The receiver operation is just the vice versa of the transmitter. The signal is being received to the receiving antenna from the transmitting antenna. The signalthat transmitted from the RF transmitter will reachesthe RF module at the receiver. There is no separate power supply for the receiver section. The current induced in the induction coil is given to the secondary coil of the transformer. In the receiver section, only one MOSFET switch is used which allows current only in the ON state ie, when the signal reaches the RF receiver it will send the passcode to the MAX 232 when the passcode matches then it will trigger the circuit and makes MOSFET switch in ON condition. The current passes to ensure that only the authenticated receiver receives the power signal. Figure 4. Receiver diagram 6. RESULTS: From the plots given, we come to infer that efficiency of the system has been increased using various parameters when compared to that of the efficiencies of the existing system. Thus the
  • 5. 119 concept of presenting the idea of providing security to the transmitted signal in the wireless medium and receiving is attained is done for a limited space in small scale. This would also become base for the further research in transmitting and receiving signals in a large scale through anyone one of the above listed techniques. Table 1. Result of current by varying distance of receiver Distance (feet) Voltage (Volts) Current (mA) 3 4 500 2 4.5 550 1 5 600 0.5 5.5 750 Maximum closest position 6 1000 From the above observations, the power transferred from the transmitter to the receiver is maximum at the closest position and when the distance between them is increased, the power received in the receiver gets reduced. When the transmitter is switched to the port of the receiver A, we are able to observe that the LED on the receiver A glows and the LED in the receiver coil B doesn’t glow since receive B is not the authenticated user to use the power signal. Any metal sheet obstacle when placed between
  • 6. 120 the transmitter and the receiver, it is found that the power is transmitted to the authenticated user as the metal sheet is a conductor. Table 2. Result of temperature with varying distance Distance (feet) Temperature (°C) 3 27 2 27.7 1 28.2 0.5 29.5 Maximum closest position 30 From the above tabulation, we find that the temperature in the receiver coil gets increased when the when the distance the distance between the transmitter and the receiver is decreased Table 3. Result on transmitter coil heating PWM On duty Time Transmitter coil heating (°C) 100% 45 90% 43 80% 41 70% 40 60% 38 From the above observations, we find that at the temperature of the transmitter coil is high when the ON duty time of the Pulse width modulation (PWM) is maximum.
  • 7. 121 When the transmitter is neither switched to the receiver of port A nor port B ie, the switch is held in the middle. Then both the receiver A and B can't receive the power since both the receivers are not authenticated even though the power is transmitted in the air and the coil induces it. The four MOSFET which is being connected in series helps in switching the current. The amount of power received in the receiver varies when the distance between the transmitter and the receiver varies as discussed. 7. CONCLUSION: We have placed two receivers with decoders which decodes the passcode given as coding to the RF module in the transmitter section. The receiver which has the matched passcode decoded has received the power signal successfully. The receiver with the decoder decoding a passcode mismatch failed to receive the power signal. Our project can also be implemented in Online Electric Vehicle (OLEV). OLEV wireless charging system consists of a road-side Power Inverter to bring electricity from the grid to the road embedded power tracks. A proprietary Roadway Infrastructure consisting of Road-embedded Power tracks installed at selected locations of the route.A proprietary Pick-Up and Regulator kit for the wireless power transfer installed in or under the electric vehicle. Hence in this system the unauthorised users are denied permission to use the power source using the key idea of the project.
  • 8. 122 REFERENCES: [1] S. Kopparthi, Pratul K. Ajmera, "Power delivery for remotely located Microsystems," [2] Proc. of IEEE Region 5, 2004 Annual Tech. Conference, 2004 April 2, pp. 31-39. [3] Nikola Tesla, “The Transmission of Electrical Energy Without Wires as a Means for Furthering Peace,” Electrical World and Engineer. Jan. 7, p. 21, 1985. [4] T. Deyle and M. Reynolds, “Surface based wireless power transmission and bidirectional communication for autonomous robot swarms” in Proceedings IEEE Conference on Robotics, 2008. [5] M. Ghovanloo, et al., “A Wide-band Power-efficient Inductive Wireless Link for Implantable Microelectronic Devices Using Multiple Carriers,” IEEE Trans. Circuits and Systems, vol. 54, no. 10, October 2007. [6] K. M. Silay, et al., “Improvement of Power Efficiency of Inductive Links for Implantable Devices,” Research in Microelectronics and Electronics, pp. 229-232, June 2008. AUTHORS: B. Renil Randy is doing his B.E. degree in Velammal College of Engineering and Technology, Madurai, India. He is interested in the area of Wireless Communication and Signal Processing. M. Hariharanis doing his B.E. degree in Velammal College of Engineering and Technology, Madurai, India. He is intere sted in the area of Wireless Communication and specialized in Wireless Power Transmission. R. Arasa Kumar,M.E.is working as Assistant Professor in Velammal College of Engineering and Technology, Madurai. He also has teachin g experience at Kalasalingam Institute of Technology, Krishnakoil. He was graduated at MepcoSchlenk Engineering College, Sivakasi.