International Journal of Emerging Technology and Advanced Engineering Paper Template Format
نویسندگان
چکیده
This research mainly focuses on the use of Geographical Information System in management of power distribution system. Traditional management system is not only manual but also has flaws such as difficulties in searching previous records and updating them, which is very time consuming task. Using GIS, Roads and buildings of UET Lahore have been mapped. Another layer of HT/LT network of UET Lahore overlaid on it. Databases have been created for poles, HT/LT lines and transformers, which stores the required information for decision making, future planning and analysis such as locations of dangerous/deteriorated poles, load on a particular transformer or location of loose jumpers of HT/LT lines. Mapping the electricity network in GIS can help us plan for preventive maintenance, easy retrieval of records, avoiding site surveys for new connections and improved material management. The integration of spatial database with analytical tools will be allowing the system to be planned more economically resulting in more efficient power distribution systems. Keywords— Databases, GIS, Mapping Electrical Network, Power Distribution Management System, Transformers, Poles, UET Lahore
منابع مشابه
International Journal of Emerging Technology and Advanced Engineering Paper Template Format
The paper deals with analysis of loading conditions on damping torque coefficient and synchronizing coefficient in SMIB system and design of Delta-Omega type of damping controller for damping of power oscillations in the system. Effect of variation of loading on synchronizing torque and damping torque coefficients has been investigated in detail. A new design approach for optimizing the paramet...
متن کاملInternational Journal of Emerging Technology and Advanced Engineering Paper Template Format
Node clustering has become an efficient way to organize a MANET into a hierarchy with a view to improve the efficiency of routing and system performance. So many clustering algorithms have been proposed assuming homogeneous nodes. Some algorithms has worked for MANETS with heterogeneous nodes. But these algorithms work for two types of nodes[1].But nodes in MANETs can be heterogeneous in nature...
متن کاملAcetone sensing properties of hierarchical WO3 core-shell microspheres in comparison with commercial nanoparticles
In this work, hierarchical WO3 core-shell microspheres were synthesized via a facile template-free precipitation method. Gas sensing properties of the synthesized powder to acetone and some other volatile organic compounds were comparatively investigated with commercial WO3 nanoparticles. The synthesized and commercial powders were characterized by X-ray diffraction, scanning electron microscop...
متن کاملAcetone sensing properties of hierarchical WO3 core-shell microspheres in comparison with commercial nanoparticles
In this work, hierarchical WO3 core-shell microspheres were synthesized via a facile template-free precipitation method. Gas sensing properties of the synthesized powder to acetone and some other volatile organic compounds were comparatively investigated with commercial WO3 nanoparticles. The synthesized and commercial powders were characterized by X-ray diffraction, scanning electron microscop...
متن کاملInternational Journal of Emerging Technology and Advanced Engineering Paper Template Format
With the objective of presenting qualitative software system most of the software producers have endeavoured and infact this is their main purpose. Software quality is having multi-dimensional content which may be distinguished and measured easily. To be specific, with the idea of determining the multidimensional content in a more exact pattern various qualitative models have been presented by ...
متن کاملInternational Journal of Emerging Technology and Advanced Engineering Paper Template Format
Data encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it is easily understood. In literature, different techniques are used for encryption and decryption of text, image, audio and video. RSA (Rivest, Shamir, Aldeman) encryption tec...
متن کامل