2018 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)最新文献

筛选
英文 中文
Detection of Power System Faults in Distribution System Using Stockwell Transform 基于斯托克韦尔变换的配电系统故障检测
Rashmi Sharma, Om Prakash Mahela, S. Agarwal
{"title":"Detection of Power System Faults in Distribution System Using Stockwell Transform","authors":"Rashmi Sharma, Om Prakash Mahela, S. Agarwal","doi":"10.1109/SCEECS.2018.8546879","DOIUrl":"https://doi.org/10.1109/SCEECS.2018.8546879","url":null,"abstract":"Distribution lines are the lifeblood of the power delivery. When a fault is detected on the distribution line, the protective relay must respond quickly to isolate the faulted line to preserve the stability of the rest of the system. Accurate estimation of these fault location are desirable for inspection, maintenance, and repair of the actual fault. An algorithm based on the Stockwell Transform has been proposed in this paper for the detection and classification of the power system faults such as line to ground (LG), double line (LL), double line to ground (LLG) and three phase fault involving ground (LLLG). The faults have been detected and discriminated from each other based on the proposed fault index. The proposed study has been carried out in the MATLAB/Simulink environment using the IEEE-13 bus test system.","PeriodicalId":446667,"journal":{"name":"2018 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127834286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Systematic integration of Security Policies for a Secured SIP Architecture 安全SIP架构中安全策略的系统集成
Toshima Singh Rajput, Maheshwar Kamini, Taruna Jain
{"title":"Systematic integration of Security Policies for a Secured SIP Architecture","authors":"Toshima Singh Rajput, Maheshwar Kamini, Taruna Jain","doi":"10.1109/SCEECS.2018.8546849","DOIUrl":"https://doi.org/10.1109/SCEECS.2018.8546849","url":null,"abstract":"VoIP services has revolutionized the traditional approach of communication in the electronics industry. The services offer an integrated approach to real time communication using the components of voice, video and chat transmission in a secured environment. The research paper integrates the algorithmic approach in outlining the Transmission of voice, video in a secured architecture using Python. As Python programming language provides a platform for the attackers to implement techniques of extracting information, thus it can also provide an environment of secured architecture because of its implementation of libraries to interact with the kernel. This paper also outlines the security policies for a firewall implementation to allow or deny traffic and to prevent security threats through a python script.","PeriodicalId":446667,"journal":{"name":"2018 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130984153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review on Improving Lifetime of Network Using Energy And Density Control Cluster Algorithm 利用能量和密度控制聚类算法提高网络寿命的研究进展
S. Zade, N. Sambhe, S. Kamble, V. Palekar
{"title":"Review on Improving Lifetime of Network Using Energy And Density Control Cluster Algorithm","authors":"S. Zade, N. Sambhe, S. Kamble, V. Palekar","doi":"10.1109/SCEECS.2018.8546991","DOIUrl":"https://doi.org/10.1109/SCEECS.2018.8546991","url":null,"abstract":"Wireless sensor networks comprise of an expansive number of distributed sensor gadgets, which are associated and composed through multi-hop steering. Because of the presence of related data and excess in measuring data, data messages can be joined and converged by performing data aggregation work in the steering procedure. To diminish energy utilization is a noteworthy enhancement target of data aggregation approaches, which can be accomplished by diminishing the mandatory correspondence load of steering. To improvise the network lifetime as much as possible in Wireless Sensor Networks (WSNs) the ways for data move are picked in a way that the aggregate energy used along the way is limited. To help high adaptability and better data aggregation, sensor nodes are routinely collected into disjoint, non-covering subsets called clusters. Clusters make various leveled WSNs which consolidate proficient use of constrained assets of sensor nodes and in this manner broadens network lifetime. The objective of this paper is to demonstrate a forefront survey on clustering calculations announced in the writing of WSNs. This paper presents different energy effective clustering calculations in WSNs. From the hypothetical level, an energy show is proposed to approve the advantages of data aggregation on energy utilization. The key parameters which may affect the aggregation execution are additionally examined.","PeriodicalId":446667,"journal":{"name":"2018 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132640399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey of Attacks on the Bitcoin System 针对比特币系统的攻击调查
Aakanksha Soni, S. Maheshwari
{"title":"A Survey of Attacks on the Bitcoin System","authors":"Aakanksha Soni, S. Maheshwari","doi":"10.1109/SCEECS.2018.8546925","DOIUrl":"https://doi.org/10.1109/SCEECS.2018.8546925","url":null,"abstract":"In the era of digitalization, crypto-currency has become the talk of the town and Bitcoin is one of it. Bitcoin System is not controlled by any central authority or governed by any management division. Bitcoin is the first digital decentralized currency and its economic growth has encompassed to billions of dollars within a few years. In this paper we present detailed Introduction to the digital currency including the crypto-currency, then we present Bitcoin system in depth with the process of transactions, mining, miners’ pooling.As we know that the popularity of Bitcoin is increasing day by day so are the attacks. We present an analysis of major attacks in the Bitcoin system such as eclipse attack, Sybil attack, >51% attack, selfish mining. More importantly, we present how these attacks play an important role for the attackers in order to receive unfair incentives or fraud the honest users. The current researchers are focusing on creating new protocols as defensive measures for the attacks; we also analyze the security of these protocols.","PeriodicalId":446667,"journal":{"name":"2018 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124065152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Review on Powerline Carrier Channels for both Overhead Lines and Underground Cables 架空电缆和地下电缆电力线载波通道综述
Asari Nagendra, L. Saini
{"title":"A Review on Powerline Carrier Channels for both Overhead Lines and Underground Cables","authors":"Asari Nagendra, L. Saini","doi":"10.1109/SCEECS.2018.8546994","DOIUrl":"https://doi.org/10.1109/SCEECS.2018.8546994","url":null,"abstract":"In growing technology, powerline communication (PLC) plays a major role in communication for smart grid. The PLC channel characteristics plays a key role in signal propagation. Hence, it is necessary to analyse PLC channel characteristics. This paper presents an analysis of PLC channels for both overhead lines and underground cables. Various type of PLC conductors are used for the both overhead transmission lines and underground cables to study PLC channel characteristics. Further, a detailed modelling of PLC channels is described in this paper.","PeriodicalId":446667,"journal":{"name":"2018 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122450168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of Solar Powered Battery Charger: An Experimental Verification 太阳能电池充电器的设计:实验验证
Debashish Mohapatra, Subhransu Padhee, J. Jena
{"title":"Design of Solar Powered Battery Charger: An Experimental Verification","authors":"Debashish Mohapatra, Subhransu Padhee, J. Jena","doi":"10.1109/SCEECS.2018.8546929","DOIUrl":"https://doi.org/10.1109/SCEECS.2018.8546929","url":null,"abstract":"This paper presents the design and implementation details of the embedded system to design a photovoltaic based battery charger for lead-acid battery. The battery is charged in float charging mode as well as in bulk charging mode. In bulk charging mode perturb and observe maximum power point tracking algorithm is used to charge the battery. Hardware realization of the PV based battery charger has been carried out and is tested in real time scenario.","PeriodicalId":446667,"journal":{"name":"2018 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131722124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design of 802.11 Based Mobile Adhoc Network With Transmission Control Protocol 基于802.11传输控制协议的移动自组网设计
Krutika G. Mohod, P. Dorge
{"title":"Design of 802.11 Based Mobile Adhoc Network With Transmission Control Protocol","authors":"Krutika G. Mohod, P. Dorge","doi":"10.1109/SCEECS.2018.8546995","DOIUrl":"https://doi.org/10.1109/SCEECS.2018.8546995","url":null,"abstract":"Mobile ad hoc network (MANET) is a self-governing arrangement of portable nodes which are associated remotely with no outside gadget, router or switch. Each versatile node is allowed to move, self-designing and foundation less. Now days, The association amongst MANET and Internet of Things opens new courses for arrangement of administrations in challenging situations and testing issues in its networking aspects allow the creation of new MANET-IOT system. Guarantee of Quality of service in Mobile adhoc network is quite difficult than any other network because of network topology changes as the nodes moves from one state to another is generally imprecise. The availability of resource, feasible security features making Quality of service provisioning difficult well as the traditional all MANET routing protocol does not employ power aware routing. In this paper we evaluate the parameters of network like throughput, delay and PDR by using AOMDV protocol in 802.11 based mobile adhoc network with transmission control protocol.","PeriodicalId":446667,"journal":{"name":"2018 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131817344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Circular Polarized Coplanar Waveguide Fed Slot Antenna For ISM Band Application 用于ISM波段的圆极化共面波导馈电槽天线
Vikash Kumar, Mohammad Imroz Khan, A. Chandra, Sushrut Das
{"title":"Circular Polarized Coplanar Waveguide Fed Slot Antenna For ISM Band Application","authors":"Vikash Kumar, Mohammad Imroz Khan, A. Chandra, Sushrut Das","doi":"10.1109/SCEECS.2018.8546845","DOIUrl":"https://doi.org/10.1109/SCEECS.2018.8546845","url":null,"abstract":"A planar circular polarized slot antenna with multiple stubs using coplanar waveguide feed (CPW) technique is introduced in this letter. A rectangular slot is introduced in the ground plane and a feeding stub is inserted in the rectangular slot with stub ending into a quadrature feed excitation as the primary stub modifies into a configuration which works as quadrature feed. Two rectangular grounded rings are also incorporated in the structure along with a rectangular conducting stub embedded in the ground with both placed on either side of primary stub. This results in generation of circular polarized radiations for a frequency range of 3 GHz to 4.25 GHz for which S11< ‒ 10 dB and Axial ratio < 3dB and the excited resonating band lies in the ISM band.","PeriodicalId":446667,"journal":{"name":"2018 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132600452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring linear prediction residual signal for developing countermeasures to playback attacks 探索线性预测剩余信号的发展对策,重放攻击
Jagabandhu Mishra, Madhusudan Singh, D. Pati
{"title":"Exploring linear prediction residual signal for developing countermeasures to playback attacks","authors":"Jagabandhu Mishra, Madhusudan Singh, D. Pati","doi":"10.1109/SCEECS.2018.8546964","DOIUrl":"https://doi.org/10.1109/SCEECS.2018.8546964","url":null,"abstract":"Playback attack is an approach for acquiring the unauthorized access to the automatic speaker verification (SV) system by using targets’ pre-recorded speech samples. It is now a widely acknowledged fact that state-of-the-art SV systems are quite vulnerable to playback attacks, and developing countermeasures are in progress. In that direction most of the attempts try to capture the trace of the playback device characteristics by using spectral related information, that remain almost intact in playback signals, resulting less improvements in false acceptance rate. In this work we explore the use of linear prediction (LP) residual signal to counter the playback attacks. We observed that, as compared to spectral related vocal-tract features, the parametric representation of the LP residual signal shows relatively more robustness against playback attacks. In future, we aim to model the LP residual signal explicitly and develop countermeasures to playback attacks.","PeriodicalId":446667,"journal":{"name":"2018 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126304450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced Anti-Terrorism Unmanned Ground Vehicle 先进反恐无人地面车
Varun Gupta, Amul Kumbhare, Rita Jain
{"title":"Advanced Anti-Terrorism Unmanned Ground Vehicle","authors":"Varun Gupta, Amul Kumbhare, Rita Jain","doi":"10.1109/SCEECS.2018.8546978","DOIUrl":"https://doi.org/10.1109/SCEECS.2018.8546978","url":null,"abstract":"The world peace is disrupting day by day in today’s scenario, increase in terrorism has risen the need of advanced armed technologies in today’s world, there’s no single country in world without dispute, and with disputes comes the riots, uncontrollable mobs, mass fire, bombings etc. This paper is aimed to research into military vehicle, which is capable enough to control a large mob of protesters using microwave beam named as \"Heat Ray\", which would produce heating sensation on target bodies when incident, and high frequency sound wave named as \"Acoustic Gun\", which will induce highly vibrating sound beam on the target body, creating a vibrating atmosphere around the target, resulting in nausea and intense headache. The vehicle is also able to diffuse and dispose bomb using a robotic limb with Electromagnetic Pulse (EMP) emitter, which would diffuse the circuit of the live bomb when incidented on it. By converting the constraint conditions of delivery and functions, the model proposed in the paper is not an actual human carrier, but is a manually controlled Unmanned Ground Vehicle (UGV) which is theoretically able to flea the uncontrollable mobs and dispose and diffuse bomb, which is shown in further study.","PeriodicalId":446667,"journal":{"name":"2018 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125503438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信