Security-Constrained Optimal Power Flow in an Electric Distribution Network
This paper evaluates the benefits of operating an electric distribution network in a security-constrained optimal power flow (SCOPF) in order to mitigate against possible blackout in an N-1 contingency. A 16-bus UKGDS network was used for the analysis. An SCOPF was performed on the network by introducing N-1 line contingency to the network and this resulted to constraints violations. The infeasibility in the solution occurred due to the radial nature of the network. The operation of SCOPF is realized in a mesh network system, which was done by connecting branches between bus 5-7 and bus 12-16 to the network. The system was simulated to operate in SCOPF and N-1 line contingency was inserted to the network to test for constraint violation/ feasibility of the system. This resulted in feasible solution in all the line contingencies with no constraint violation.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Security systems operated by RFID technology along with GSM module
In the present era real time security is of prime priority for any organization, corporate institutions, firms and various confederacy agencies. The idea is to design and develop an exhaustive real-time security system that will provide multifarious verification levels for enhanced security.The system uses a series of confirmation phases which includes identification, authentication, access granting and information updating and logging.In this project various components like microcontroller, Radio frequency Identification technology, GSM technology, and access control system will be integrated so as to achieve a real-time security system. This project is more secure than any other security system because the administrator will be provided with the logging information about the access moreover the passwords generated by the microcontroller will be random and hence cannot be tracked thus making the system not possible to hack
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Security and privacy in places networked car
Positioning of nodes in ad hoc networks of vehicles in recent years is an interesting subject for research, helps to build the topologic map for car. It also provides information about places close to the car. For the open wireless communication and mobility with high -speed for a large number of vehicles, in inter- vehicle communication, authentication message, integrity and privacy of the car have been identified as the main security requirements. In this study, methods for vehicle location privacy is proposed, which include: define a switch pair and a number alias for vehicles, vehicle grouping,, select the leader for groups and finally use of several RSUs. At the end of the study, the proposed method is simulated using NS2 software, and some critical parameters of the network, are examined to see the effect of the proposed method on the network.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Secure Communication using Microcontroller ATMEGA 16
The synchronization of the chaotic sequence using open plus closed loop (OPCL) coupling is presented in this paper by realizing 1D logistic map in microcontroller based hardware electronic experiment. The masking of the information signal in driver and demasking in the driven system is done in the chaotic region by using two microcontrollers ATMEGA 16 for secure communication. These two microcontrollers are used for driver and driven systems. In the synchronized condition driver system received the modulating signal from the signal generator and mask it with the chaotic sequence for transmitting to the driven system. In the receiver, section demasking is done to retrieve the information signal. The proposed scheme is simulated in Proteus simulator and the complete hardware circuit has been implemented and the obtained hardware experimental results confirm the validity of the proposed circuit.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Robust Medical Image Watermarking Based on Contour let and Extraction Using ICA
In this paper, a medical image watermarking algorithm based on contourlet is proposed. Medical image watermarking is a special subcategory of image watermarking in the sense that images have special requirements. Watermarked medical images should not differ perceptually from their original counterparts because clinical reading of images must not be affected. Watermarking techniques based on wavelet transform are reported in many literatures but robustness and security using contourlet are better when compared to wavelet transform. The main challenge in exploring geometry in images comes from the discrete nature of the data. In this paper, original image is decomposed to two level using contourlet and the watermark is embedded in the resultant sub-bands. Sub-band selection is based on the value of Peak Signal to Noise Ratio (PSNR) that is calculated between watermarked and original image. To extract the watermark, Kernel ICA is used and it has a novel characteristic is that it does not require the transformation process to extract the watermark. Simulation results show that proposed scheme is robust against attacks such as Salt and Pepper noise, Median filtering and rotation. The performance measures like PSNR and Similarity measure are evaluated and compared with Discrete Wavelet Transform (DWT) to prove the robustness of the scheme. Simulations are carried out using Matlab Software.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Robotics in medicine cryonics in nanotechnology raising from death
Cryonics-raising the dead: The concept goes like this: When a patient’s heart stops beating, but before the structure of his brain starts to degenerate, the patient is attached to a heart –lung machine and progressively infused with ‘antifreeze’ and other cellular stabilizers and then his body temperature is lowered until the patient is at ‘liquid nitrogen temperatures’. At this point, all molecular change stops indefinitely and the patient are put in storage. When the nanotechnology cell repair devices become available, the fatal disease that caused ‘death is reversed, the anti-freeze toxicity is removed, and the patient is warmed back up alive and well. In cryonics- freezing people fore future – scientists take patients who have been labeled as ‘dead’ by current medical criteria, replace their blood and much of their body water with chemicals to inhibit freezing damage, and preserve them in liquid nitrogen at (-196 Celsius). At that temperature all molecules in the body are locked in solids can no longer move around to react. Thus the individual can remain unchanged for thousands of years. It is possible that frozen patients will repairable and relabeled as ‘potentially alive’ by using nannies
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
RF Front End Analysis for the Damage Rate of Low Noise Amplifiers
The first real signal processing element just after the antenna that determine the noise performance and linearity of the overall system in RF receiver is Low Noise Amplifier (LNA) which makes it one of the most important and sensitive block of a RF receiver that can improve the performance of the circuit. The RF front end is the most significant part and any electronic warfare can damage the entire circuit performance. It is not possible to analyze theoretically under conditions such as change in input power, frequency, and design parameters. It is mandatory to propose the relationship between damage rate and the power absorbed in order to reduce the damage rate. This paper analyzes the power absorbed by the non-linear element present in the LNA circuit. The power absorption is verified by varying the input and output impedances. Hence, this paper identified the parameters that increase the damage rate of LNAs and suggested designs to reduce the damage rate.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Review on Computer aided plant species identification based on leaf images
Number of plant species, in present time, is on the verge of extinction. Thus owing to this threat to plant species their identification has become very important. This paper presents a technique that has been implemented for the identification of plant species based on leaf images. The plant species identification involves three steps such as pre-processing, feature extraction and classification.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Reversible Sequential Circuits – A Review
VLSI Industry is moving at high speed towards miniaturization. With miniaturization it faces a problem of power and heat dissipation. Thus we need a superior technology that circumvents this problem. Solution is implementing Reversible logic. A lot of research has been already done in the field of reversible computing. This paper presents a review of such reversible sequential circuits in literature from basic elements to complex circuits.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Remote Microcontroller Based Monitoring of Substation and Control System Through GSM Modem
As complexity of distribution network has grown [7], automation of substation has become a need of every utility company to increase its efficiency and to improve quality of power being delivered [5]. The proposed project which is GSM cellular network based controlling of substation [5][12] will help the utility companies, by ensuring that their local-substation faults [8][9][10] are immediately realized and reported to their concerned departments via GSM, to ensure that duration of power interruption is decreased. The measured parameters will be sending in the form of SMS messages. The microcontroller will interact with the sensors installed at the local substation and perform task as commanded [3]. Electrical parameters like current, voltage will be compared continuously to its rated value [13] will help protect the distribution and power transformer from burning due to overload, short circuit fault, over voltages and surges. Under such conditions, entire unit is shut down via the control section comprising of relays sensing it, and immediately turning the circuit breaker off. SMS alerts can also be generated to indicate this. The use of GSM makes the substation intelligent [4] in the sense that it is able to transmit alerts and information and receive commands. This enables to reduce labor cost at substation and saves time. Thus the monitoring and working efficiency of the sub-station will drastically increase.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]