+91-9929435130 editor@ijset.in

Volume 5 Issue 3: 2017

1. Stability Enhancement of Power System using Fuzzy Logic Based Power System Stabilizer

Authors: Arun Kumar Sahu, Vishwanath Prasad Kurmi

Affiliation:

1M.Tech Scholar, Electrical and Electronics Engineering Department, Dr. C.V. Raman University, Kota – Bilaspur, India, Email:  arunkumar.sahu26@gmail.com

2Asst. Professor, Electrical and Electronics Engineering Department, Dr. C.V. Raman University, Kota – Bilaspur, India, Email – v.pkurmi@rediffmail.com

Copy for Cite this Article: Arun Kumar Sahu, Vishwanath Prasad Kurmi, “Stability Enhancement of Power System using Fuzzy Logic Based Power System Stabilizer”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 07- 14.

Abstract:

This Paper includes work on the development of a fuzzy logic power system stabilizer to enhance the damping of generator oscillations In order to accomplish a stability enhancement. Speed deviation (Am) and output power (Pm) of the rotor synchronous generator were taken as the input to the fuzzy logic controller. These variables take significant effects on damping the generator shaft mechanical oscillations. The stabilizing signals were computed using the fuzzy membership function depending on these variables. The performance of the fuzzy logic power system stabilizer was compared with the conventional power system stabilizer and without power system stabilizer [2]. To achieve good damping characteristics over a wide range of operating conditions, speed deviation and acceleration of a synchronous machine are chosen as the input. Signal to the stabilizers. The stabilizing signal is determined from certain rules for rule-based power system stabilizer. For fuzzy logic based power system stabilizer, the supplementary stabilizing signal is determined according to the fuzzy membership function depending on the speed and acceleration states of the generator [6]. The simulation result shows that the proposed fuzzy logic based power system stabilizer is superior to rule-based stabilizer due to its lower computation burden and robust performance.

Keywords: Power System Stabilizer, Fuzzy logic Controller, Automatic Voltage Regulator, Multi machine infinite bus, Excitation System.

DDI- 10.2348/ijset051707

Full Text

2. Simulink of Hybrid low-power Wind Generation and PV grid connected system using MATLAB

Authors: Anil Kumar Kashyap, Amit Agrawal

Affiliation:

M.Tech Scholar, Dr. C.V. Raman University Kota, Bilaspur (C.G.), India, Email: anil.kashyap0803@gmail.com

Asst. Professor, Department of Electrical Engineering, Dr. C.V. Raman University Kota, Bilaspur (C.G.), India, Email: amitagrawal_bit@rediffmail.com

Copy for Cite this Article: Anil Kumar Kashyap, Amit Agrawal, “Stability Enhancement of Power System using Fuzzy Logic Based Power System Stabilizer”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 15- 20.

Abstract:

The rapid use of distributed energy resources has increased as a supplement and also an alternative to large conventional grid power stations. However, the presence of non-linear loads in the utility grid will ultimately result to generation of the current and voltage harmonics and this in turn will hamper the power quality of the whole power system. Recently, the utility grids are accommodated with mixed energies which results in increase of complexities and various instabilities [1]. The present paper is based on the improvement of power quality with hybrid power generating system comprising of both Wind and PV system. An improved MPPT is implemented for the hybrid system which provides maximum power and helps to attain a stable and reliable power from the generation system both for the loads and the utility grid, thus improving both the steady and dynamic behaviors of the whole generation system. A grid connected control strategy is proposed keeping in view of the problems, which is based on the model of a hybrid system with load parallel in large system. The control strategy can not only make the full use of photovoltaic (PV) power, but can also maintain a synchronous voltage with a fluctuant reactive load.

Keywords: Renewable energy source, Photovoltaic cell, MPPT, an Inverter, a LC filter, a distribution network, Active power, Reactive power, controller, utility grid.

DDI- 10.2348/ijset051715

Full Text

3. A Study on Airflow over a Car

Authors: Mohd. Rashaduddin, Ahmed Waheedullah

Affiliation:

Department of Mathematics, Dravidian University, Kuppam – 517426 (A.P.), India, Email: rashadtelangana@gmail.com

Lords Institute of Engineering and Technology, Hyderabad – 500008, India

Copy for Cite this Article: Mohd. Rashaduddin, Ahmed Waheedullah, “A Study on Airflow over a Car”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 21- 28.

Abstract:

The model of a car is made without spoiler and with roof box and its testing is done in wind tunnel and the results are verified. ANSYS software is used to get lift and drag forces at different velocities. In this paper an ideal roof box is also discussed. The objective is to simulate a car model to increase its efficiency in terms of speed, balancing and fuel consumption by managing drag and downforce.

Keywords – Car model; Spoiler; Roof Box; ANSYS; Wind tunnel; Aerodynamical parameters.

DDI- 10.2348/ijset0517021

Full Text

4. Siesmic Performance Evaluation of RCC Structures with Optimum Curtailment in Shear Walls

Authors: Juveria Fatima, Dr. Mohd Humraz, Kiranmayeevuyyuru

Affiliation:

1M.E (Structures) Student at Civil Engineering Department, Muffakham Jah College of Engineering and Technology, Hyderabad, Telangana state, India. Email: juveria.fatima08@gmail.com

2Professor, Civil Engineering Department, Muffakham Jah College of Engineering and Technology, Hyderabad , Telangana state, India. Email: hamraj567@gmail.com

3Research Scholar, KL University,A.P, Email: iamkiranmayee@gmail.com

Copy for Cite this Article: Juveria Fatima, Dr. Mohd Humraz, Kiranmayeevuyyuru, “Siesmic Performance Evaluation of RCC Structures with Optimum Curtailment in Shear Walls”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 29- 33.

Abstract:

Shear walls are generally provided for full height of frames. Lateral forces are carried mostly by frames in the upper portion of the building and shear walls contribute the least in the region. This concept has been extended to twenty one storeyed RCC buildings in which shear walls were reduced in size or terminated entirely at intermediate heights. In the present work, comparative study of dynamic characteristic between the structures with full shear wall and curtailed Shear wall at different heights is carried out. The results obtained where compared with those building having full shear wall. The RCC moment resisting frame considered was loaded with gravity loads, dead loads, live loads, and Bhuj earth quake loading. The analysis engine used for both the analysis is SAP 2000 Version 18. The results show that the decrease and increase in the values of base shear and displacements of buildings with curtailed shear walls are marginal when compared with full height shear wall. As a closing remark it is understood that the curtailment of shear wall up to two third height of building has marginal effect on distribution of base shear and displacements. It is concluded that Non Linear time History Analysis could provide reasonably accurate results when compared with Non Linear Static Analysis.

Keywords: Curtailed shear wall, Non linear time history analysis, Non linear static analysis.

DDI- 10.2348/ijset0517029

Full Text

5. Securing Cloud using Fog Computing with Hadoop Framework

Authors: Shreya Waghmare, Shruti Ahire, Himali Fegade, Pratiksha Darekar

Affiliation:

1,2,3,4UG Student, Dept. of Information Technology, JSPM’s JSCOE, Pune, Maharashtra, India,

Email: 1waghmare2shreya@gmail.com, 213ahireshruti@gmail.com,, 3himalifegade16@gmail.com, 4pratikshadarekar1@gmail.com

Copy for Cite this Article: Shreya Waghmare, Shruti Ahire, Himali Fegade, Pratiksha Darekar, “Securing Cloud using Fog Computing with Hadoop Framework”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 34- 38.

Abstract:

The need to store data is increasing day by day may be as a record or as a memory. The conventional way of storing was with the hard disks of computers or in the smartphones. With the increase in number of profiles of individuals there was a parallel increase in the data store. This lead to the insufficiency of the storage space thus leading more and more people is today getting accustomed to storing their data onto the cloud. The cloud computing has flexibility, scalability, efficiency and multi-portability. Even though efforts are been taken to secure cloud there are still loopholes in it which is restricting the users from using cloud. Thus instead of securing the data by merely using authentication credentials like user name and password, an approach of using fog computing that is concoction of user profile mapping using various behavior parameters and decoy data technology that is having a fake file of every file format which will be used to launch a disinformation attack in case the user gets detected as an intruder came into being in order to maintain confidentiality of data. This paper proposes an approach of using fog computing for securing the data with efficient algorithms and large data processing framework for accurate results.

Keywords: Fog Computing, Decoy data Technology, User Behavior Mapping, and Hadoop, Cloud Security

DDI- 10.2348/ijset0517034

Full Text

6. Power Quality Enhancement in Power System using STATCOM by Space Vector Modulation Techniques

Authors: Naveen Kumar Sahu, Nikhil Kumar Sharma

Affiliation:

M. Tech., Electrical and Electronics Engineering Department, Dr. C.V. Raman University, Kota – Bilaspur, India, Email – knaveen.cap1@gmail.com

Ph.D. Scholar, Indian Institute of Technology, Bhubaneshwar, Odisha, India, Email – ns12@iitbbs.ac.in

Copy for Cite this Article: Naveen Kumar Sahu, Nikhil Kumar Sharma, “Power Quality Enhancement in Power System using STATCOM by Space Vector Modulation Techniques”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 39- 44.

Abstract:

Static Synchronous Compensator (STATCOM) is a Shunt active FACTS controller when connected at the mid-point of the transmission line; it can improve voltage regulation, power flow and stability of the transmission systems i.e. power quality of system. This paper demonstrates how the power flow sharing can be achieved in power system using programmable AC sources that is supplying linear and nonlinear loads. Space Vector Pulse Width Modulation (SVPWM) is used as a control algorithm in a three-phase Voltage Source Converter (VSC) which acts as a Static Synchronous Compensator (STATCOM) for providing reactive power compensation. Voltage Source Converter used as a Static Synchronous Compensator provides efficient damping for sub synchronous resonance that improves the power system stability in addition to reactive power correction. The Voltage Source Converter with space vector control algorithm is provided for compensating the reactive power flow to correct the power factor, eliminating harmonics and balancing both linear and non-linear loads. Among different Pulse Width Modulation (PWM) techniques space vector technique is proposed as it is easy to improve digital realization and AC bus utilization. The proposed control algorithm relies on an approximate third-order nonlinear model of the Voltage Source Converter that accounts for uncertainty in three phase system parameters. The control strategy for reliable power sharing between AC power sources in grid and loads is proposed by using Space Vector Pulse Width Modulation controller.

Keywords— Flexible AC Transmissions (FACTS), Static Compensator (STATCOM), Voltage Source Converter (VSC), Space Vector Pulse Width Modulation (SVPWM)

DDI- 10.2348/ijset0517039

Full Text

7. Modeling Node Capture Attacks in WSN: A Survey

Authors: Sakshee Saxena, Dr. Piyush Kumar Shukla, Dr. Rajeev Pandey

Affiliation:

Department of CSE, RGPV, Bhopal, MP, India, saksheesaxena33@gmail.com

Asst. Professor, Department of CSE, RGPV, Bhopal, MP, India, pphdwss@gmail.com

Asst. Professor, Department of CSE, RGPV, Bhopal, MP, India, rajeev98iet@gmail.com

Copy for Cite this Article: Sakshee Saxena, Dr. Piyush Kumar Shukla, Dr. Rajeev Pandey, “Modeling Node Capture Attacks in WSN: A Survey”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 45- 50.

Abstract:

Wireless Sensor Networks or WSN as they are commonly known in one of the most popularly advancing technology in the field of computer networks. The application of these networks is in sensitive areas like battle fields, military targeting systems etc. Due to hostile nature of environment where these nodes are prone to variety of security attacks. Among the assaults, the most outrageous is the sensor (node) capture attack. This survey provides various that are used to prototype node capture attacks in WSN and includes an exhaustive survey of the various algorithms and models that are devised to combat these kinds of attacks.

Keywords: Wireless Sensor Network, Sensor Capture Attack, Security, Adversary, Attacker

DDI- 10.2348/ijset0517045

Full Text

8. Underwater Communication Systems: A Review

Authors: Harsh Vardhan Sharma, Neeraj Manglani

Affiliation:

Computer Science Dept. Jagannath University, Jaipur, India, Email: 4uharshvardhan@gmail.com
Computer Science Dept. Jagannath University, Jaipur, India, Email: neeraj.maglani@jagannathuniversity.org

Copy for Cite this Article: Harsh Vardhan Sharma, Neeraj Manglani, “Underwater Communication Systems: A Review”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 51- 56.

Abstract:

There is a high demand for underwater communication systems due to the increase in current human underwater activities. Underwater communication systems employ either sonar or electromagnetic waves as a means of transferring signals. These waves are different physically and electrically, and thus the systems that employ them also differ in their design architecture, wave propagation and devices used for emission and reception. As a result, the two systems have varying advantages and limitations. This paper presents an in-depth review of underwater communication based on sonar and electromagnetic waves, a comparison of the two systems and a discussion of the environmental impacts of using these waves for underwater communication. In the tradeoff between preserving the underwater environment and the need for underwater communication, it appears that underwater electromagnetic wave communication has the most potential to be the environmentally-friendly system of the future.

Keywords—underwater communication system, routers, sonar

DDI- 10.2348/ijset0517051

Full Text

9. Text Cryptography Using Two Stage Passkey & Random Text

Authors: Shikha Sharma, Dr. Meenu Dave

Affiliation:

Department of Computer Science & Engineering, Jagannath University, Jaipur, Email: Shikhasharma.jnu@gmail.com,Meenudave.jnu@gmail.com

Copy for Cite this Article: Shikha Sharma, Dr. Meenu Dave, “Text Cryptography Using Two Stage Passkey & Random Text”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 57- 59.

Abstract:

This work is designed to optimize the password used to securely transfer text data. This article reviews the previous techniques and presents an advanced approach to transforming data from isolated common data into encrypted complex data, but enhances the complexity of the transmitted data and preserves it from third-party conversions, and make it possible to type and language irrelevant. In the process, the data is converted from one form to the encrypted form, so even if the third party obtains the key, the system will not completely cancel the text data decryption, thus avoiding the small error and show that the attacker does not Necessary reversal.

DDI- 10.2348/ijset0517057

Full Text

10. Grid Integration of Hybrid Electrical Energy

Authors: Sameer Tembhekar, Prabodh Khampriya

Affiliation:

Department of Electrical Engineering, Sri Satya Sai Institute of Science and Technology Sehore, Bhopal, Email: sameer.tembhekar80@gmail.com, khampriya5@gmail.com

Copy for Cite this Article: Sameer Tembhekar, Prabodh Khampriya, “Grid Integration of Hybrid Electrical Energy”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 60- 64.

Abstract:

Day by day the electricity demand is increasing exponentially. To fulfill this increasing demand of electricity more and more utilization of non-conventional energy sources are required as conventional sources are reduces. The best way to utilize the different renewable energy sources (RES) together is by using application of Microgrid. This paper illustrates the simple model of DC Microgrid with energy management system (EMS) which schedules the generation and load. The simulation model is developed in MATLAB/Simulink software containing photovoltaic array, wind turbine generator system (PMDC generator), battery storage system, grid and energy management controller. The simulation results are presented with variable load and variable generation conditions.

Keywords— Distributed energy sources, energy storage

DDI- 10.2348/ijset0517060

Full Text

11. Handoff Management in Radio over Indoor Networks

Authors: Himanshu Kaushik

Copy for Cite this Article: Himanshu Kaushik, “Handoff Management in Radio over Indoor Networks”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 67- 72.

DDI- 10.2348/ijset0517067

Full Text

12. Compensation of Low Performance Steering System and Visual Analysis of Complex simulation

Authors: Nilanshu Gupta, Mradul Sharma, Nafees Mohammad

Copy for Cite this Article: Nilanshu Gupta, Mradul Sharma, Nafees Mohammad, “Compensation of Low Performance Steering System and Visual Analysis of Complex simulation”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 73- 78.

DDI- 10.2348/ijset0517073

Full Text

13. Interactive Visual Analysis in Automotive Engineering Design

Authors: Mradul Sharma, Nilanshu Gupta, Nafeesh Mohammad

Copy for Cite this Article: Mradul Sharma, Nilanshu Gupta, Nafeesh Mohammad, “Interactive Visual Analysis in Automotive Engineering Design”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 79- 84.

DDI- 10.2348/ijset0517079

Full Text

14. Comparison between Three Most Prevailing Green Building Rating Systems of India

Authors: Himanshu Agarwal, Hari Kumar Singh, Sanjay Vashishtha

Affiliation:

Centre of Excellence – Renewable and Sustainable Energy Studies, Suresh Gyan Vihar University, Jaipur

First Green Consulting Private Limited, Gurugram, India

Copy for Cite this Article: Himanshu Agarwal, Hari Kumar Singh, Sanjay Vashishtha, “Comparison between Three Most Prevailing Green Building Rating Systems of India”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 85- 93.

Abstract:

New Construction is developing at a rapid pace. It has led to the emergence of Green Building Rating System worldwide. Various rating system of the world has provided unique guidelines for each category of building viz. Retails, Schools, Core & Shell, etc. Existing Buildings can even be retrofitted and obtain the certificate from Rating Agencies of the World. In this study, three primary rating systems prevailing in India are selected and analysed with the aim of providing insights into the current situations; highlighting the strengths, weaknesses, successes, and failures; and making recommendations for future improvements. The common aspect of all the rating system is to create a sustainable architecture in all respect so as to minimize negative environmental impact upon the environment. Certain analysis and data has been represented in this paper with the help of case study to highlight ambiguities and shortcomings in the weighting, scoring, and rating, which is mentioned in discussions. The three most prevailing rating system in India LEED, IGBC and GRIHA has been studied and compared with Maximum Points, Mandatory Criteria and points obtained in Case Study.

DDI- 10.2348/ijset0517085

Full Text

15. Siphonic Roof Drainage: A dematerializing approach towards Green Construction

Authors: Bhawana Gautam, Dr. D. Buddhi, Pratulya Sivashankar

Affiliation:

Centre of Excellence – Renewable and Sustainable Energy Studies, Suresh Gyan Vihar University, Jaipur, India

IT Power Private Limited, New Delhi, India

Copy for Cite this Article: Bhawana Gautam, Dr. D. Buddhi, Pratulya Sivashankar, Siphonic Roof Drainage: A dematerializing approach towards Green Construction”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 94- 98.

Abstract:

To reduce the environmental impact, due to high energy consumption and huge amount of material exploitation in the construction industry, there has been an inception of sustainable development. Sustainable development in the building industry, by providing the optimum comfort condition to the occupants with minimum impact to the environment, is known as green construction. Dematerialization is one of the aspects of green construction which can be defined as the exploitation of minimum amount of material without compromising the functional requirement of the habitat. One of the potential components of the building which can be dematerialized is the conventional roof drainage system. Siphonic Roof Drainage is an efficient roof drainage technology with less material requirement (smaller diameter and less number of downpipes) as compared to the conventional roof drainage system. The primary purpose of this study is to quantify the amount of material reduction by replacing the conventional system with the siphonic roof drainage. The study is also done for the environmental impact comparison and architectural design flexibility between the two systems of roof drainage. The study was done by designing conventional and siphonic system for the same building and comparison of material was done.

DDI- 10.2348/ijset0517094

Full Text

16. Prevention Mechanisms of DDoS Attacks: A Critical Review

Authors: Ms. Dalima Parwani, Dr. Amit Dutta, Dr. Piyush Kumar Shukla

Affiliation:

1Department of Computer Science, SantHirdaram Girls College, Bhopal, 462030, India; E.Mail: dalimaparwani@gmail.com

Computer Science & Application, Barkatullah University, Bhopal, 462001, India; E-Mail: amitdutta07@gmail.com

Computer Science & Engineering, University Institute of Technology, RGPV, Bhopal, Airport Bypass Road, Gandhi Nagar, Bhopal 462033, India; E-Mail: pphdwss@gmail.com

Copy for Cite this Article: Dalima Parwani, Dr. Amit Dutta, Dr. Piyush Kumar Shukla, “Prevention Mechanisms of DDoS Attacks: A Critical Review”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 99- 112.

Abstract:

In the world of electronics and computer Denial of Service (DoS) occurrences is one of the hardest and the chief threat as per security issues are concern. Distributed Denial of Service (DDoS) is also one of the chief threats which can impact proportionally over internet. Such type of attack enables various computing tasks to be exhaust easily and within a short duration of time it exhausts statement possessions of victim. Hence various systems are executed for the recognition and hindrance of Distributed Denial of Service (DDoS) attacks. Here in this paper described structural of all the Distributed Denial of Service (DDoS) attacks classification and their various defense mechanism are analyzed. In addition with this various important features of each of the Distributed Denial of Service (DDoS) attacks their various benefits and drawbacks used in various techniques are also outlined and analyzed. The major points in this paper are the coverage of all the existing attacks and various benefits and drawbacks as well as their prevention mechanism. By providing and analyzing the various issues in the existing techniques a more improved and efficient algorithm is implemented in future which can prevent from such type of attacks.

Keywords: Denial of Service (DoS) attacks, Distributed Denial of Service (DDoS) Attacks, Network Bandwidth, Internet Control Message Protocol (ICMP), Network Security, Flooding Attack.

DDI- 10.2348/ijset0517099

Full Text

17. Optimal Sensing Threshold Role in Spectrum Sensing in Cognitive Radio

Authors: Nilambika Jawalkote, Mahua Bhowmik

Affiliation:

PG student, Department of Electronics and Telecommunication .Dr.D.Y.Patil Institute of Technology. Pimpri PUNE, Email: nilambikajawalkote@gmail.com

Assistant Professor, Department of Electronics and Telecommunication, Dr.D.Y.Patil Institute of Technology, Pimpri PUNE, Email: m_ghorai2001yahoo.com

Copy for Cite this Article: Nilambika Jawalkote, Mahua Bhowmik, “Optimal Sensing Threshold Role in Spectrum Sensing in Cognitive Radio”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 113- 119.

Abstract:

Cognitive Radio is an emerging technology that is an advanced version of the radio network. The ultimate goal of cognitive radio is to efficiently use all empty spaces that are not fully utilized for communication. Use blank spaces that are also known as white holes. It is an intelligent radio that fits intelligently according to their environment. You can also call it a radio that can change its transmitter parameters according to the environment. In this we have optimized the quality of services through the detection threshold. We get-closed form optimum threshold expression for local equilibrium detection probability of failure detection and probability of false alarm Key words—cognitive radio, spectrum sensing, threshold detection, energy detection.

DDI- 10.2348/ijset0517113

Full Text

18. Advance Application of DJANGO Integrated With TASTYPIE API Framework for the Software Development

Authors: Prabhanshu Kumar Singh, Vipin Kumar Gupta

Affiliation:

M.Tech scholar, Electronics and communication, VLSI, Suresh Gyan Vihar University, Jaipur, Rajasthan, Email: Singhprabhanshu5@gmail.com

Assistant professor, Electronics and communication, VLSI, Suresh Gyan Vihar University, Jaipur, Rajasthan, Email: vipinsbcet@gmail.com

Copy for Cite this Article: Prabhanshu Kumar Singh, Vipin Kumar Gupta, “Advance Application of DJANGO Integrated With TASTYPIE API Framework for the Software Development”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 120- 125.

Abstract:

Python is the advance language. It is used in the research and science, scripting in Unix and web development. It is flexible and easy language as compare to the other languages. It is the high level language as it is readable and identical to the human language. Django is the web framework used in the web development. Django gives the backend admin site as well as the frontend according to the urls provided..Tastypie is a webservice API framework for Django webframework. It provides the REST style interfaces. The use of django and tastypie for the software and website development is quite easy. Here django is used to create the database and tastypie is used for the generation of the API development. The overriding of the default function is the main funtionality of the report which is used to provide different functionality to the software like email on object creation, checking for field to perform functionality at different events.

Keywords: MVC, ORM, NON-ORM, Model, Resource, Rest framework, API, MVT

DDI- 10.2348/ijset0517120

Full Text