Browse Items (2150 total)
Sort by:
-
Optimal locations for PMUs maintaining observability in power systems
Population of Phasor Measurement Units (PMUs) in power systems are increasing day by day as PMUs measure the electrical quantities more accurately with time-stamping. The measurements done by PMU can be used for monitoring, controlling and for state estimation of the power system. Since the installation of PMUs demand high capital cost, their number and location to be chosen optimally is by minimizing investment without losing observability of the system. In this paper Integer Programming techniques used to solve Optimal Placement of PMU (OPP) problem. The OPP problem is solved for normal power system as well as for a few contingency conditions like one PMU outage, considering zero injection bus, outage of single line on various standard IEEE Bus Systems. The work is also trying to place PMUs under planned islanding in certain standard networks. 2016 IEEE. -
Performance analysis of optimized corporate-fed microstrip array for ISM band applications
This paper presents a low cost high gain corporate feed rectangular microstrip patch antenna array of two elements having cuttings at the corners, with detailed steps of design process, operates in Industrial Scientific Medical (ISM) band (2.4 GHz). The proposed antenna structures are designed using FR4 dielectric substrate having permittivity ?r= 44 and substrate thickness of 1.6 mm. The gain of these simulated antennas are obtained as 2.4819 dB with return loss of -17.779 dB for a single element patch and 6.3128 dB with return loss of -15.8320 dB for an array of two elements. The simulations have been carried out by using Antenna simulator HFSS version 15.0.0 to obtain the VSWR, return loss and radiation pattern. 2017 IEEE. -
Android security issues and solutions
Android operating system uses the permission-based model which allows Android applications to access user information, system information, device information and external resources of Smartphone. The developer needs to declare the permissions for the Android application. The user needs to accept these permissions for successful installation of an Android application. These permissions are declarations. At the time of installation, if the permissions are allowed by the user, the app can access resources and information anytime. It need not re-request for permissions again. Android OS is susceptible to various security attacks due to its weakness in security. This paper tells about the misuse of app permissions using Shared User ID, how two-factor authentications fail due to inappropriate and improper usage of app permissions using spyware, data theft in Android applications, security breaches or attacks in Android and analysis of Android, iOS and Windows operating system regarding its security. 2017 IEEE. -
The Influence of Alloying Constituent Fe on Mechanical Properties of NiTi Based Shape Memory Alloys
The influences of Fe-addition on phase transformation behavior, mechanical properties and microstructure of Ti50Ni50-xFex alloys were investigated by means of optical microscopy, scanning electron microscopy (SEM) and X-ray diffraction (XRD). Results indicate that, as a substitute for Ni, Fe added to TiNi alloys can dramatically decrease the martensite transformation temperature and R phase transformation and martensite transformation are accordingly separated. The results show that TiNiFe alloys exhibit two-step martensitic transformation. The start temperature of martensitic transformation increases sharply from 212 K to 267 K when 2% Fe is added in, and then decreases gradually if Fe content further increases. The hardness of TiNiFe ternary alloys before heat treatment is constant for up to 6% of the composition and suddenly increases for 9% composition and also it behaves same for heat treated specimens because of formation of equilibrium precipitates Ni3Ti formation. 2017 Elsevier Ltd. -
Primary mirror active control system simulation of Prototype Segmented Mirror Telescope
The upcoming large astronomical telescopes are trending towards the Segmented Mirror Telescope (SMT) technology, initially developed at the W M Keck Observatory in Hawaii, where two largest SMTs in the world are in use. SMT uses large number of smaller hexagonal mirror segments aligned and positioned by the use of three position/force actuators and six intersegment edge sensors. This positioning needs to be done within nanometer range to make them act like a monolithic primary mirror in the presence of different disturbances like wind, vibration & thermal effects. The primary mirror active control system of SMT does this important task at two levels. First at a global scale, by measuring edge sensor information continuously and commanding actuators to correct for any departure from the reference surface. And second at local actuator level, where all the actuators maintain their position to the reference control inputs. The paper describes our novel approach of primary mirror active control simulation of Prototype Segmented Mirror Telescope (PSMT) under design and development at Indian Institute of Astrophysics (IIA), Bangalore. The PSMT is a 1.5m segmented mirror telescope with seven hexagonal segments, 24 inductive edge sensors, and 21 soft actuators. The state space model of the soft actuator with Multiple-Input Multiple-Output (MIMO) capability is developed to incorporate dynamic wind disturbances. Further, a segment model was developed using three such actuators which accept actuator position commands from the global controller and telescope control system and yields tip-tilt-piston (TTP) of a single segment. A dynamic wind disturbance model is developed and used to disturb the mirror in a more realistic way. A feed forward PID controller is implemented, and gains are appropriately tuned to get the good wind rejection. In the last phase, a global controller is implemented based on SVD algorithm to command all the actuators of seven segments combined to act as a single monolithic mirror telescope. In this paper, we present the progress of PSMT active control system simulation along with the simulation results. 2017 IEEE. -
An efficient cloud based architecture for integrating content management systems
The use of digital content is increasing day after day and now it is an essential element of our day today life. The amount of stored information is so huge that it is highly difficult to manage the content especially in a distributed cloud environment. There are many open source software solutions available in cloud to handle huge amount of digital data. However none of these solutions addresses all the requirements needed to manage the content spread out in multiple systems effectively. The user has to relay on multiple content management systems to do the work. This turns into ever more unwieldy, time consuming and leads to loss of data. Using robust and integrated content management systems, these issues could be solved effectively. In this paper we have identified various challenges of using the content management system in the cloud after surveying many Content Management System related article and proposed an integrated solution named Cloud based Architecture integrating Content Management System which is capable of interfacing with various unique features available at different content management system installations in the cloud. This maximizes the functionality and performance of any Content management systems. The Representational State Transfer (REST) protocol is used to integrate the best features of various open source content management systems. REST provides higher level of security compared to existing systems as it does not store the user sessions. The users can interact with the system with the help of an interface which abstracts the complexities of multiple content management systems running in the cloud. 2017 IEEE. -
Induction of radio frequency transmission in indian railway for smooth running of traffic during fog
Our railway system drives whole sole based on its electrical signaling but due to poor visibility it becomes impossible to run the traffic smoothly We are suggesting to use radio wave communication technology for running of train when conventional signaling cant be followed due to poor visibility. During winter season, due to heavy fog especially in North India and East India it becomes almost impossible to drive the train on time. Our idea can remove this problem permanently. A dedicated radio frequency band will be used by railway service and a specific frequency will be assigned to all tracks running to a specific direction. All trains will be equipped with a transmitter and a receiver. Train drivers will get notification of received radio frequency within a certain circumference (5 km). So if it receives the same frequency which it is transmitting then the driver will understand another train is there on the same track so signaling room and the driver will also be aware of the fact. Then the control room or the driver can take action considering speed and distance between this two accordingly. If another train will be running on the next track then also it will receive signal but in that case it will run at as usual speed. 2017 Taylor & Francis Group, London. -
Evalutionary compting model for QoS provisioning in WiMAX
In recent time wireless technology is adopted widely for connecting remote user over network. WiMAX is an attractive technology for provisioning high data rate connectivity and coverage. QoS is a required parameter for analyzing the system performance. Before allocation of the bandwidth in the network, physical layer information is required for improving QoS performance. Many modulation techniques are used in WiMAX network. An adaptive approach is required for selection of modulation scheme to maximize network performance. Physical layer information is used for selection of modulation scheme. An adaptive genetic based scheduling is proposed in this paper for improved QoS. Experiments are conducted to evaluate performance of proposed approach in term of throughput, successful transmission and packet collision over existing approach. The outcome shows significant performance over existing approach. 2017 IEEE. -
Scalability of software defined network on floodlight controller using OFNet
Software Defined Network is the thriving area of research in the realm of networking. With growing number of devices connecting to the global village of internet, it becomes inevitable to adapt to any new technology before testing its scalability in presence of dynamic circumstances. While a lot of research is going on to provide solution to overcome the limitations of the traditional network, it gives a call to research community to test the competence and applicability to hold up the fault tolerance of the solution offered in the form of SDN Controllers. Out of the accessible multiple controllers with enabled the SDN functionalities to the network infrastructure, one of the best choice in controllers is Floodlight Controller. This research article is a contribution towards performance evaluation of scalability of the Floodlight Controller by implementing dual scenarios implemented, experimented and analyzed on the emulation tool of OFNet. Floodlight Controller is tested in the emulation environment by observing eight different parameters of the controller and checked its performance in scalable networking conditions over linear topology by gradually increasing the number of nodes. 2017 IEEE. -
Information extraction and text mining of Ancient Vattezhuthu characters in historical documents using image zoning
The aim of this paper is to develop a system that involves character recognition of Brahmi, Grantha and Vattezuthu characters from palm manuscripts of historical Tamil ancient documents, analyzed the text and machine translated the present Tamil digital text format. Though many researchers have implemented various algorithms and techniques for character recognition in different languages, ancient characters conversion still poses a big challenge. Because image recognition technology has reached near-perfection when it comes to scanning English and other language text. But optical character recognition (OCR) software capable of digitizing printed Tamil text with high levels of accuracy is still elusive. Only a few people are familiar with the ancient characters and make attempts to convert them into written documents manually. The proposed system overcomes such a situation by converting all the ancient historical documents from inscriptions and palm manuscripts into Tamil digital text format. It converts the digital text format using Tamil unicode. Our algorithm comprises different stages: i) image preprocessing, ii) feature extraction, iii) character recognition and iv) digital text conversion. The first phase conversion accuracy of the Brahmi script rate of our algorithm is 91.57% using the neural network and image zoning method. The second phase of the Vattezhuthu character set is to be implemented. Conversion accuracy of Vattezhuthu is 89.75%. 2016 IEEE. -
An online signature method using DNA based bio-hash for positive identification and non-repudiation
This work focuses on using biological data as a unique feature to generate e-Signature. DNA, the blue print of life is of unique nature. The signature created using biological data will be difficult to repudiate in the scenario of a legal dispute. Applications of human DNA are not limited to molecular biology, with the advents of fast growing technologies it is possible to inject DNA into e-Signature for positive identification. The proposed methodology uses Signature DNA as a unique biological feature for the registrant. This work has various phases, the first phase includes creating the Signature DNA using hybridized unique DNA segments of the individual (Registrant) which is the unique identification of the user and difficult to duplicate and repudiate. It generates a Bio-Hash of the Signature DNA. The DNA-Hash generated serves for positive identification of the user which computed with the hash of the e-Document and a random value serve as a Bio-Sign (e-Signature) for the e-Document in the second phase. Bio-Sign converted into QR code with a link to the e-Sign service providers website will ensure usability for verification. In the verification phase the verifier scans the QR code which connects to the e-Service provider's web link. The service provider computes and verifies the document and ensures the e-Signature is valid or not to the verifier. If the signer repudiates the signature, positive identification using DNA helps to achieve Non-Repudiation, the last phase. In the scenario of a legal dispute, the registrant cannot repudiate as the authorities can provide positive identification using the DNA Signature for greater assurance. The proposed technique ensures authentication, integrity and Non-Repudiation with Zero knowledge scenario to the verifier. 2017 IEEE. -
Experimenting with scalability of floodlight controller in software defined networks
Software Defined Network is the booming area of research in the domain of networking. With growing number of devices connecting to the global village of internet, it becomes inevitable to adapt to any new technology before testing its scalability in presence of dynamic circumstances. While a lot of research is going on to provide solution to overcome the limitations of the traditional network, it gives a call to research community to test the applicability and caliber to withstand the fault tolerance of the provided solution in the form of SDN Controllers. Out of existing multiple controllers providing the SDN functionalities to the network, one of the stellar controllers is Floodlight Controller. This paper is a contribution towards performance evaluation of scalability of the Floodlight Controller by implementing multiple scenarios experimented on the simulation tool of Mininet, Floodlight Controller and iPerf. Floodlight Controller is tested in the simulation environment by observing throughput and latency parameters of the controller and checked its performance in dynamic networking conditions over Mesh topology by exponentially increasing the number of nodes. 2017 IEEE. -
Optimized gateway oriented unicast and multicast routing for multi hop communication network
Networking and communication in an infrastructure less environment had brought interest in the development of mobile ad hoc networks (MANET). Growth of technologies in years has increased the size of the network and its applications. In larger MANET, it becomes important to maintain the quality of performance for increased overhead scenarios. Grouping of network optimizes the workload with reduced overhead for routing and maintenance in larger MANET. Mobile nodes are grouped by the use of clustering algorithms. Once the MANET environment is formed, the network needs appropriate architecture and methods to have efficient and effective transactions. Mobility, energy, selection of cluster head and gateway are parallel related with efficiency metrics of the network optimizing these parameter helps to increase performance of network in terms of higher packet delivery ratio, less energy consumption and jitter. This work proposes a routing architectural algorithm especially for very large network to get high-quality performance. The proposed method uses unicasting and multicasting approaches in an optimized way for routing and maintenance of the network. Analysis results prove that the proposed model has performed with higher packet delivery ration of 1.17% with a reduced jitter of 0.0014 s. Springer Nature Singapore Pte Ltd 2017. -
1-Normal DRA for insertion languages
Restarting automaton is a type of regulated rewriting system, introduced as a model for analysis by reduction. It is a linguistically motivated method for checking the correctness of a sentence. In this paper, we introduce a new definition of normal restarting automaton in which only one substring is removed using the DEL operation in a cycle. This DEL operation is applied to reverse the insertion operation in an insertion grammar. We use this 1-normal restarting automaton to solve the membership problem of insertion languages. Further, we introduce some interesting closure properties of 1-normal restarting automata. 2017, Springer International Publishing AG. -
Diagnosis of compromised accounts for online social performance profile network
Proliferation of internet technologies has changed the way content is created and exchanged through the Internet, prompting expansion of online networking applications and administrations. Online networking empower creation and exchanged the clients produced content and design of a scope of Internet-based applications. This development is fueled by more administrations as well as by the rate of their adoption by the users. While determined spammers misuse the built up trust connections between account proprietors and their companions to proficiently spread malignant spam, auspicious discovery of traded off records is quite challenge, because of the fixed trust association among the administration suppliers, account proprietors, and their companions. The proposed paper depicts a novel method to notice the cooperated user account in systems like Facebook and twitter. Our novel scheme consists of statistical method of modelling and detected to identity accounts that behaves a sudden change along with detected the compromised accounts. This paper gives validation of these behavioral elements by gathering and dissecting genuine client clickstreams to an OSN site. Taking into account our estimation study, further devise every client's social behavioral profile (SBP) by joining its separate behavioral element measurements. We assess the capacity of social behavioral profiles in recognizing distinctive OSN clients, and the simulation results demonstrate the social behavioral profiles precisely separate every OSN clients and distinguish traded off records. 2016 IEEE. -
Survey study on the methods of bird vocalization classification
The technologies holds the ability to change the world. Current digital era is a product of the evolutionary technologies. It created the necessity to increase the Human Computer Interaction (HCI) and it became one of the most emerging research areas of the decade. HCI is an interface between the users and the system to improve the interaction. HCI concept came into existence in early 1980's. One of the emerging new research area in HCI is Context Aware System (CAS). The technological advancements in HCI created a new outlook in the research of CAS. CAS is a system which understand the user, their surroundings, and location. CAS make this possible by processing the environmental and bio-acoustic. Sound is one of the important media for both humans and animals to communicate and understand information. Bird sound, vehicle sound, wind sound etc. are some of the environmental and bio acoustics. Processing these sounds or signals will help us to create a better performing CAS. This paper profiles a survey study on bird sound classification and identification. Automatic identification of bird sound is one among the difficult task in signal processing. Also, the paper will profile the previous research works on various phases in bird vocalization processing; such as preprocessing, feature selection and classification. 2016 IEEE. -
Overall system performance analysis with distributed generation
Transmission system loadability enhancement using modern techniques are one of the interesting research areas under power system planning studies. This paper address the location of Distributed Generation (DG) in the network not only loadability enhancement but also for transmission loss minimization and voltage stability enhancement. We have proposed a novel strategic approach for DG location and size by considering (N-1) line contingency criterion. The approach is analyzed with IEEE 14-bus and IEEE 30-bus test systems. The results are validating the proposed approach for real-time applications. 2016 IEEE. -
Dielectric performance of solid dielectric immersed in vegetable oil with antioxidant
Transformers are the most vital part of the power transmission and distribution system. Protecting them from all possible abnormalities is of very high priority. The insulation levels in the transformers need to be of very high grade as the power and voltage levels of a transformer are very high. Transformers are generally filled with petroleum based mineral oil as an insulator and also as a coolant inside them. These oils are highly inflammable and also highly toxic. They are also non-biodegradable, causing major harm to the environment. Vegetable oils which are abundant in nature unlike the mineral oil is being studied as a suitable substitute for mineral oils as transformer oil. The availability of vegetable oils differ from place to place. The work here focusses on the commercially available vegetable oils in India. Seven different samples of oil are tested for their dielectric properties and viscosity and the best one among them is tested with a solid dielectric (epoxy) immersed within it in order to simulate more appropriate conditions of a practical transformer. The tests are conducted based on Indian Standards (IS6792). 2016 IEEE. -
Performance analysis of Flyash with Bentonite in grounding pit
In modern era of power systems, generation, transmission and distribution is well operated and maintained to satisfy the demand and supply management. Various problems are faced every day in all the power system areas. One among the problems faced in all the high voltage electrical equipment's is grounding. Natural grounding is done using charcoal and salt to maintain the less resistance in the grounding pit but the less resistance grounding pit becomes high resistive area due to various reasons like improper maintenance, charcoal and salt getting dissolved in soil after some period of time. In this paper a new method of grounding which uses Flyash and Bentonite is proposed and the performance is been analyzed by various standard methods. 2016 IEEE. -
Person re-identification using part based hybrid descriptor
Real time person re-identification systems require robust descriptors for useful feature extraction. This paper focuses on a novel descriptor which can efficiently re-identify persons in varied views and change in illumination. The descriptors detect the features by dividing the person image into multiple parts. We use a combination of local and global feature descriptors to form a reliable descriptor. Performance evaluation is done on a benchmarking dataset. 2016 IEEE.