{"title":"Analysis of unbalanced radial distribution system with SSVR","authors":"Deepmala Wadhwa, Ashwani Kumar","doi":"10.1109/RAECS.2014.6799632","DOIUrl":"https://doi.org/10.1109/RAECS.2014.6799632","url":null,"abstract":"This paper presents modeling of Static Series Voltage Restorer (SSVR) unbalanced radial distribution system (RDS) load flow. To incorporate this approach, an accurate model for SSVR is derived to use in load flow calculations. SSVR reactive power rating as well as direction of required reactive power injection to compensate voltage of a particular node to the desired value (1p.u) is derived, discussed analytically, and mathematically. The validity of the proposed model is examined for distribution systems consisting of 25 nodes.The best location or under voltage problem mitigation in the distribution network is determined. The results show the validity of the proposed model for SSVR in large distribution systems.","PeriodicalId":229600,"journal":{"name":"2014 Recent Advances in Engineering and Computational Sciences (RAECS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115709006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sandeep Kumar, C. Rama Krishna, N. Aggarwal, R. Sehgal, Saurabh Chamotra
{"title":"Malicious data classification using structural information and behavioral specifications in executables","authors":"Sandeep Kumar, C. Rama Krishna, N. Aggarwal, R. Sehgal, Saurabh Chamotra","doi":"10.1109/RAECS.2014.6799525","DOIUrl":"https://doi.org/10.1109/RAECS.2014.6799525","url":null,"abstract":"With the rise in the underground Internet economy, automated malicious programs popularly known as malwares have become a major threat to computers and information systems connected to the internet. Properties such as self healing, self hiding and ability to deceive the security devices make these software hard to detect and mitigate. Therefore, the detection and the mitigation of such malicious software is a major challenge for researchers and security personals. The conventional systems for the detection and mitigation of such threats are mostly signature based systems. Major drawback of such systems are their inability to detect malware samples for which there is no signature available in their signature database. Such malwares are known as zero day malware. Moreover, more and more malware writers uses obfuscation technology such as polymorphic and metamorphic, packing, encryption, to avoid being detected by antivirus. Therefore, the traditional signature based detection system is neither effective nor efficient for the detection of zero-day malware. Hence to improve the effectiveness and efficiency of malware detection system we are using classification method based on structural information and behavioral specifications. In this paper we have used both static and dynamic analysis approaches. In static analysis we are extracting the features of an executable file followed by classification. In dynamic analysis we are taking the traces of executable files using NtTrace within controlled atmosphere. Experimental results obtained from our algorithm indicate that our proposed algorithm is effective in extracting malicious behavior of executables. Further it can also be used to detect malware variants.","PeriodicalId":229600,"journal":{"name":"2014 Recent Advances in Engineering and Computational Sciences (RAECS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129104320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy efficient techniques in Wireless Mesh Network","authors":"Veenu Mor, H. Kumar","doi":"10.1109/RAECS.2014.6799561","DOIUrl":"https://doi.org/10.1109/RAECS.2014.6799561","url":null,"abstract":"Wireless Mesh Network (WMN) is a promising wireless network architecture having potential of last few miles connectivity. There has been considerable research work carried out on various issues like design, performance, security etc. in WMN. Due to increasing interest in WMN and use of smart devices with bandwidth hungry applications, WMN must be designed with objective of energy efficient communication. Goal of this paper is to summarize importance of energy efficiency in WMN. Various techniques to bring energy efficient solutions have also been reviewed.","PeriodicalId":229600,"journal":{"name":"2014 Recent Advances in Engineering and Computational Sciences (RAECS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127551893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Defending MANETs against flooding attacks for military applications under group mobility","authors":"Taranpreet Kaur, A. Toor, K. Saluja","doi":"10.1109/RAECS.2014.6799499","DOIUrl":"https://doi.org/10.1109/RAECS.2014.6799499","url":null,"abstract":"MANET is an assembly of mobile nodes having the capability of configure any momentarily network without the assistance of any established infrastructure or centralized supervision. Due to the self-arrangement and self maintenance abilities, MANETs become highly vulnerable to various kinds of attacks. So, Security challenges have become a key concern to provide secure communication between mobile nodes. Flooding attack is one of the security threat in which the intruder will overload the network with worthless packets to misuse the bandwidth and resources of the network. In this paper a clustering behavior based reputation mechanism is proposed to identify the flooding malicious nodes in military battlefield network. As in battlefield situation, mainly Group Mobility model is followed, so grouping of nodes in clusters have various advantages. Reputation (assessment of its behavior in the network) of a node is calculated at cluster heads. This strategy has double nature, hence it efficiently fix the false detection of genuine nodes as malicious ones. Strategy is simulated in NS2. Performance of new scheme is compared with AODV protocol based on various performance metrics it is noticed that proposed strategy has better performance in terms of various metrics.","PeriodicalId":229600,"journal":{"name":"2014 Recent Advances in Engineering and Computational Sciences (RAECS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115772459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS based evaluation of routing protocols in WSN","authors":"Bhupinder Kaur, S. Kaushal","doi":"10.1109/RAECS.2014.6799501","DOIUrl":"https://doi.org/10.1109/RAECS.2014.6799501","url":null,"abstract":"The demand of electronic gadgets such as electronic tablets, mobile phones, GPS devices, and smart computing devices is gaining a lot of popularity these days. The demand for these devices has also increased as these devices have made it easy to perform everyday needs in a mobile and distributed way. With the rise in the requirement of these devices they have become cheap in cost and there has been increase in the demand for communication and networking among wireless devices. In this scenario, the evolution of the Wireless Sensor Networks (WSNs) is fundamentally towards the universality of computing devices. Nowadays sensor nodes are having the capability of sensing and performing data processing in various types of environmental conditions. These sensor nodes are usually available in small size and are cheap in cost. In WSN, the storage capabilities of sensor nodes, their transmission range and processing capabilities are limited. Also, their energy resources are limited. Routing protocols play the crucial role of maintaining the routes in the network, ensuring reliable multi-hop communication in these conditions. This paper presents the analysis of the existing routing protocols to ensure which routing protocol provides a better Quality of Service guarantee. The Quality of Service guaranteed by a routing protocol is analyzed by using different quality of service metrics namely packet delivery ratio, throughput and end to end delay. Also the energy efficiency of the protocols is taken into consideration.","PeriodicalId":229600,"journal":{"name":"2014 Recent Advances in Engineering and Computational Sciences (RAECS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128138559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design optimization of End Cover of an explosive driven helical flux compression generator through explicit numerical simulations","authors":"Vijay Kumar, Brajesh Soni, H. K. Gupta","doi":"10.1109/RAECS.2014.6799591","DOIUrl":"https://doi.org/10.1109/RAECS.2014.6799591","url":null,"abstract":"Explosive Driven Helical Flux Compression Generator (FCG) is a single shot device used to produce very high current. It finds applications in various advanced technologies like plasma research, EMP weapons, high magnetic field generators etc. Single end initiated helical FCG is most widely used among their several forms. In this paper, design of End Cover, a crucial component of a single end initiated FCG through numerical simulation code AUTODYN® is investigated. In a single end initiated FCG, explosive filled armature is initiated from one end which causes the armature to expand in a conical manner to the other end. The expanding armature results in inductance collapse and hence current amplification. The End Cover forms one terminal for realising current output, is electrically connected with armature and thus should remain in through contact with it throughout the FCG action. Mechanical design of End Cover is crucial as expanding armature interacts with it during FCG action. If the End Cover is not properly designed, a break in the continuity can occur causing the loss of energy. This loss of energy leads to drastic reduction in the output of this device. Interaction of the FCG End Cover with the expanding aluminium armature under explosive action is studied in detail for various geometries. Through these simulations better insight of the problem is evolved which is otherwise very difficult to capture even with sophisticated experimental techniques. An optimum design of the End Cover for a single end initiated FCG is suggested.","PeriodicalId":229600,"journal":{"name":"2014 Recent Advances in Engineering and Computational Sciences (RAECS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128251485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Torque ripples control and speed regulation of Permanent magnet Brushless dc Motor Drive using Artificial Neural Network","authors":"N. Kishore, Surbhi Singh","doi":"10.1109/RAECS.2014.6799498","DOIUrl":"https://doi.org/10.1109/RAECS.2014.6799498","url":null,"abstract":"This paper presents a torque control of Permanent magnet Brushless DC (PMBLDC) Motor Drive using Artificial Neural Network (ANN) for low torque ripples. Conventional BLDC Motor produces high ripples in electromagnetic torque and it is not directly controlled. The motor may lead to component loss as well as bearing failure due to vibrations caused by high torque ripples. The main drawback with the conventional Brushless dc motor drives (BLDCMD) is high torque ripples and the speed of BLDCMD is reduced under transient and dynamic state of operating condition. This drawback is reduced using with the proposed control technique. In this proposed control technique the speed of the BLDCMD is regulated by the PI controller and the torque ripple is reduced by the ANN. Complete simulation of the conventional BLDCMD is done in MATLAB Simulink.","PeriodicalId":229600,"journal":{"name":"2014 Recent Advances in Engineering and Computational Sciences (RAECS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127061096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart traffic lights switching and traffic density calculation using video processing","authors":"Anurag Kanungo, Ayush Sharma, Chetan Singla","doi":"10.1109/RAECS.2014.6799542","DOIUrl":"https://doi.org/10.1109/RAECS.2014.6799542","url":null,"abstract":"Congestion in traffic is a serious problem nowadays. Although it seems to pervade everywhere, mega cities are the ones most affected by it. And it's ever increasing nature makes it imperative to know the road traffic density in real time for better signal control and effective traffic management. There can be different causes of congestion in traffic like insufficient capacity, unrestrained demand, large Red Light delays etc. While insufficient capacity and unrestrained demand are somewhere interrelated, the delay of respective light is hard coded and not dependent on traffic. Therefore the need for simulating and optimizing traffic control to better accommodate this increasing demand arises. In recent years, video monitoring and surveillance systems have been widely used in traffic management for traveler's information, ramp metering and updates in real time. The traffic density estimation and vehicle classification can also be achieved using video monitoring systems. This paper presents the method to use live video feed from the cameras at traffic junctions for real time traffic density calculation using video and image processing. It also focuses on the algorithm for switching the traffic lights according to vehicle density on road, thereby aiming at reducing the traffic congestion on roads which will help lower the number of accidents. In turn it will provide safe transit to people and reduce fuel consumption and waiting time. It will also provide significant data which will help in future road planning and analysis. In further stages multiple traffic lights can be synchronized with each other with an aim of even less traffic congestion and free flow of traffic.","PeriodicalId":229600,"journal":{"name":"2014 Recent Advances in Engineering and Computational Sciences (RAECS)","volume":"37 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130778225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. S. Kundu, O. Mazumder, Ritwik Chattaraj, S. Bhaumik
{"title":"Close loop control of non-holonomic WMR with augmented reality and potential field","authors":"A. S. Kundu, O. Mazumder, Ritwik Chattaraj, S. Bhaumik","doi":"10.1109/RAECS.2014.6799581","DOIUrl":"https://doi.org/10.1109/RAECS.2014.6799581","url":null,"abstract":"Aim of this paper is to develop a non-holonomic differential robotic platform with PID velocity control for both wheels and 3D augmented reality based optical localization system to test standard navigation algorithms like potential field and cell decomposition. A mobile robot is modeled in simulink and the hardware is designed accordingly. The robot is localized in the arena by Unity based 3d localization system, optimal path is generated by Potential field algorithm from which individual wheel velocities are calculated. The velocity command is sent to the robot by xbee modules. Robot is continuously localized and an outer position control loop is utilized to bring back the robot into the correct path if it is deviated from the pre-generated path.","PeriodicalId":229600,"journal":{"name":"2014 Recent Advances in Engineering and Computational Sciences (RAECS)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133428038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methods of automatic alignment of fingerprint in fuzzy vault: A review","authors":"Parul Sood, Manvjeet Kaur","doi":"10.1109/RAECS.2014.6799559","DOIUrl":"https://doi.org/10.1109/RAECS.2014.6799559","url":null,"abstract":"Security of cryptographic keys is an important issue in today's unprotected world. Most reliable solution of this problem is state of art fuzzy vault which is an application of bio-cryptosystems. These systems use biometric trait for locking and unlocking the keys. During unlocking, it is necessary to do alignment of query biometric data with enrolled biometric data because of large variation in two samples of a biometric trait of a user taken over the short span of time. Complexity of alignment is increased due to absence of original fingerprint template during alignment. That's why helper data or additional information is required for alignment. There are number of techniques developed for automatic alignment of fingerprints till now. This paper gives the review of most of those methods.","PeriodicalId":229600,"journal":{"name":"2014 Recent Advances in Engineering and Computational Sciences (RAECS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132815537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}