[et_pb_section transparent_background=”off” allow_player_pause=”off” inner_shadow=”off” parallax=”off” parallax_method=”on” custom_padding=”2px|0px|29px|0px” padding_mobile=”off” make_fullwidth=”off” use_custom_width=”off” width_unit=”off” custom_width_px=”1080px” custom_width_percent=”80%” make_equal=”off” use_custom_gutter=”off” fullwidth=”off” specialty=”off” admin_label=”section” disabled=”off”][et_pb_row make_fullwidth=”off” use_custom_width=”off” width_unit=”off” custom_width_px=”1080px” custom_width_percent=”80%” use_custom_gutter=”off” gutter_width=”3″ custom_padding=”27px|0px|30px|0px” padding_mobile=”off” allow_player_pause=”off” parallax=”off” parallax_method=”on” make_equal=”off” column_padding_mobile=”on” parallax_1=”off” parallax_method_1=”on” parallax_2=”off” parallax_method_2=”on” parallax_3=”off” parallax_method_3=”on” parallax_4=”off” parallax_method_4=”on” disabled=”off”][et_pb_column type=”4_4″ disabled=”off” parallax=”off” parallax_method=”on” column_padding_mobile=”on”][et_pb_cta title=”Volume 5 Issue 3: 2017″ url_new_window=”off” use_background_color=”off” background_color=”#7ebec5″ background_layout=”light” text_orientation=”center” header_font=”Droid Sans|on|||” header_font_size=”30px” use_border_color=”off” border_color=”#ffffff” border_width=”1px” border_style=”solid” custom_margin=”||-10px|” custom_button=”off” button_text_size=”20″ button_use_icon=”on” button_icon_placement=”right” button_on_hover=”on” button_letter_spacing_hover=”0″ disabled=”off”]
[/et_pb_cta][et_pb_cta title=”1. Stability Enhancement of Power System using Fuzzy Logic Based Power System Stabilizer” button_url=”http://www.ijset.in/wp-content/uploads/2017/05/10.2348.ijset051707.pdf” url_new_window=”off” button_text=”Full Text” use_background_color=”off” background_color=”#7ebec5″ background_layout=”light” text_orientation=”justified” header_font=”Droid Sans|on|||” header_font_size=”16px” header_text_color=”#000000″ body_font=”Droid Sans||||” body_text_color=”#000000″ use_border_color=”off” border_color=”#ffffff” border_width=”1px” border_style=”solid” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#0c71c3″ button_use_icon=”on” button_icon_placement=”right” button_on_hover=”on” button_letter_spacing_hover=”0″ disabled=”off”]
Authors: Arun Kumar Sahu, Vishwanath Prasad Kurmi
Affiliation:
1M.Tech Scholar, Electrical and Electronics Engineering Department, Dr. C.V. Raman University, Kota – Bilaspur, India, Email: arunkumar.sahu26@gmail.com
2Asst. Professor, Electrical and Electronics Engineering Department, Dr. C.V. Raman University, Kota – Bilaspur, India, Email – v.pkurmi@rediffmail.com
Copy for Cite this Article: Arun Kumar Sahu, Vishwanath Prasad Kurmi, “Stability Enhancement of Power System using Fuzzy Logic Based Power System Stabilizer”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 07- 14.
Abstract:
This Paper includes work on the development of a fuzzy logic power system stabilizer to enhance the damping of generator oscillations In order to accomplish a stability enhancement. Speed deviation (Am) and output power (Pm) of the rotor synchronous generator were taken as the input to the fuzzy logic controller. These variables take significant effects on damping the generator shaft mechanical oscillations. The stabilizing signals were computed using the fuzzy membership function depending on these variables. The performance of the fuzzy logic power system stabilizer was compared with the conventional power system stabilizer and without power system stabilizer [2]. To achieve good damping characteristics over a wide range of operating conditions, speed deviation and acceleration of a synchronous machine are chosen as the input. Signal to the stabilizers. The stabilizing signal is determined from certain rules for rule-based power system stabilizer. For fuzzy logic based power system stabilizer, the supplementary stabilizing signal is determined according to the fuzzy membership function depending on the speed and acceleration states of the generator [6]. The simulation result shows that the proposed fuzzy logic based power system stabilizer is superior to rule-based stabilizer due to its lower computation burden and robust performance.
Keywords: Power System Stabilizer, Fuzzy logic Controller, Automatic Voltage Regulator, Multi machine infinite bus, Excitation System.
DDI- 10.2348/ijset051707
[/et_pb_cta][et_pb_cta title=”2. Simulink of Hybrid low-power Wind Generation and PV grid connected system using MATLAB” button_url=”http://www.ijset.in/wp-content/uploads/2017/05/10.2348.ijset051715.pdf” url_new_window=”off” button_text=”Full Text” use_background_color=”off” background_color=”#7ebec5″ background_layout=”light” text_orientation=”justified” header_font=”Droid Sans|on|||” header_font_size=”16px” header_text_color=”#000000″ body_font=”Droid Sans||||” body_text_color=”#000000″ use_border_color=”off” border_color=”#ffffff” border_width=”1px” border_style=”solid” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#0c71c3″ button_use_icon=”on” button_icon_placement=”right” button_on_hover=”on” button_letter_spacing_hover=”0″ disabled=”off”]
Authors: Anil Kumar Kashyap, Amit Agrawal
Affiliation:
M.Tech Scholar, Dr. C.V. Raman University Kota, Bilaspur (C.G.), India, Email: anil.kashyap0803@gmail.com
Asst. Professor, Department of Electrical Engineering, Dr. C.V. Raman University Kota, Bilaspur (C.G.), India, Email: amitagrawal_bit@rediffmail.com
Copy for Cite this Article: Anil Kumar Kashyap, Amit Agrawal, “Stability Enhancement of Power System using Fuzzy Logic Based Power System Stabilizer”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 15- 20.
Abstract:
The rapid use of distributed energy resources has increased as a supplement and also an alternative to large conventional grid power stations. However, the presence of non-linear loads in the utility grid will ultimately result to generation of the current and voltage harmonics and this in turn will hamper the power quality of the whole power system. Recently, the utility grids are accommodated with mixed energies which results in increase of complexities and various instabilities [1]. The present paper is based on the improvement of power quality with hybrid power generating system comprising of both Wind and PV system. An improved MPPT is implemented for the hybrid system which provides maximum power and helps to attain a stable and reliable power from the generation system both for the loads and the utility grid, thus improving both the steady and dynamic behaviors of the whole generation system. A grid connected control strategy is proposed keeping in view of the problems, which is based on the model of a hybrid system with load parallel in large system. The control strategy can not only make the full use of photovoltaic (PV) power, but can also maintain a synchronous voltage with a fluctuant reactive load.
Keywords: Renewable energy source, Photovoltaic cell, MPPT, an Inverter, a LC filter, a distribution network, Active power, Reactive power, controller, utility grid.
DDI- 10.2348/ijset051715
[/et_pb_cta][et_pb_cta title=”3. A Study on Airflow over a Car” button_url=”http://www.ijset.in/wp-content/uploads/2017/05/10.2348.ijset051721.pdf” url_new_window=”off” button_text=”Full Text” use_background_color=”off” background_color=”#7ebec5″ background_layout=”light” text_orientation=”justified” header_font=”Droid Sans|on|||” header_font_size=”16px” header_text_color=”#000000″ body_font=”Droid Sans||||” body_text_color=”#000000″ use_border_color=”off” border_color=”#ffffff” border_width=”1px” border_style=”solid” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#0c71c3″ button_use_icon=”on” button_icon_placement=”right” button_on_hover=”on” button_letter_spacing_hover=”0″ disabled=”off”]
Authors: Mohd. Rashaduddin, Ahmed Waheedullah
Affiliation:
Department of Mathematics, Dravidian University, Kuppam – 517426 (A.P.), India, Email: rashadtelangana@gmail.com
Lords Institute of Engineering and Technology, Hyderabad – 500008, India
Copy for Cite this Article: Mohd. Rashaduddin, Ahmed Waheedullah, “A Study on Airflow over a Car”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 21- 28.
Abstract:
The model of a car is made without spoiler and with roof box and its testing is done in wind tunnel and the results are verified. ANSYS software is used to get lift and drag forces at different velocities. In this paper an ideal roof box is also discussed. The objective is to simulate a car model to increase its efficiency in terms of speed, balancing and fuel consumption by managing drag and downforce.
Keywords – Car model; Spoiler; Roof Box; ANSYS; Wind tunnel; Aerodynamical parameters.
DDI- 10.2348/ijset0517021
[/et_pb_cta][et_pb_cta title=”4. Siesmic Performance Evaluation of RCC Structures with Optimum Curtailment in Shear Walls” button_url=”http://www.ijset.in/wp-content/uploads/2017/05/10.2348.ijset051729.pdf” url_new_window=”off” button_text=”Full Text” use_background_color=”off” background_color=”#7ebec5″ background_layout=”light” text_orientation=”justified” header_font=”Droid Sans|on|||” header_font_size=”16px” header_text_color=”#000000″ body_font=”Droid Sans||||” body_text_color=”#000000″ use_border_color=”off” border_color=”#ffffff” border_width=”1px” border_style=”solid” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#0c71c3″ button_use_icon=”on” button_icon_placement=”right” button_on_hover=”on” button_letter_spacing_hover=”0″ disabled=”off”]
Authors: Juveria Fatima, Dr. Mohd Humraz, Kiranmayeevuyyuru
Affiliation:
1M.E (Structures) Student at Civil Engineering Department, Muffakham Jah College of Engineering and Technology, Hyderabad, Telangana state, India. Email: juveria.fatima08@gmail.com
2Professor, Civil Engineering Department, Muffakham Jah College of Engineering and Technology, Hyderabad , Telangana state, India. Email: hamraj567@gmail.com
3Research Scholar, KL University,A.P, Email: iamkiranmayee@gmail.com
Copy for Cite this Article: Juveria Fatima, Dr. Mohd Humraz, Kiranmayeevuyyuru, “Siesmic Performance Evaluation of RCC Structures with Optimum Curtailment in Shear Walls”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 29- 33.
Abstract:
Shear walls are generally provided for full height of frames. Lateral forces are carried mostly by frames in the upper portion of the building and shear walls contribute the least in the region. This concept has been extended to twenty one storeyed RCC buildings in which shear walls were reduced in size or terminated entirely at intermediate heights. In the present work, comparative study of dynamic characteristic between the structures with full shear wall and curtailed Shear wall at different heights is carried out. The results obtained where compared with those building having full shear wall. The RCC moment resisting frame considered was loaded with gravity loads, dead loads, live loads, and Bhuj earth quake loading. The analysis engine used for both the analysis is SAP 2000 Version 18. The results show that the decrease and increase in the values of base shear and displacements of buildings with curtailed shear walls are marginal when compared with full height shear wall. As a closing remark it is understood that the curtailment of shear wall up to two third height of building has marginal effect on distribution of base shear and displacements. It is concluded that Non Linear time History Analysis could provide reasonably accurate results when compared with Non Linear Static Analysis.
Keywords: Curtailed shear wall, Non linear time history analysis, Non linear static analysis.
DDI- 10.2348/ijset0517029
[/et_pb_cta][et_pb_cta title=”5. Securing Cloud using Fog Computing with Hadoop Framework” button_url=”http://www.ijset.in/wp-content/uploads/2017/05/10.2348.ijset051734.pdf” url_new_window=”off” button_text=”Full Text” use_background_color=”off” background_color=”#7ebec5″ background_layout=”light” text_orientation=”justified” header_font=”Droid Sans|on|||” header_font_size=”16px” header_text_color=”#000000″ body_font=”Droid Sans||||” body_text_color=”#000000″ use_border_color=”off” border_color=”#ffffff” border_width=”1px” border_style=”solid” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#0c71c3″ button_use_icon=”on” button_icon_placement=”right” button_on_hover=”on” button_letter_spacing_hover=”0″ disabled=”off”]
Authors: Shreya Waghmare, Shruti Ahire, Himali Fegade, Pratiksha Darekar
Affiliation:
1,2,3,4UG Student, Dept. of Information Technology, JSPM’s JSCOE, Pune, Maharashtra, India,
Email: 1waghmare2shreya@gmail.com, 213ahireshruti@gmail.com,, 3himalifegade16@gmail.com, 4pratikshadarekar1@gmail.com
Copy for Cite this Article: Shreya Waghmare, Shruti Ahire, Himali Fegade, Pratiksha Darekar, “Securing Cloud using Fog Computing with Hadoop Framework”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 34- 38.
Abstract:
The need to store data is increasing day by day may be as a record or as a memory. The conventional way of storing was with the hard disks of computers or in the smartphones. With the increase in number of profiles of individuals there was a parallel increase in the data store. This lead to the insufficiency of the storage space thus leading more and more people is today getting accustomed to storing their data onto the cloud. The cloud computing has flexibility, scalability, efficiency and multi-portability. Even though efforts are been taken to secure cloud there are still loopholes in it which is restricting the users from using cloud. Thus instead of securing the data by merely using authentication credentials like user name and password, an approach of using fog computing that is concoction of user profile mapping using various behavior parameters and decoy data technology that is having a fake file of every file format which will be used to launch a disinformation attack in case the user gets detected as an intruder came into being in order to maintain confidentiality of data. This paper proposes an approach of using fog computing for securing the data with efficient algorithms and large data processing framework for accurate results.
Keywords: Fog Computing, Decoy data Technology, User Behavior Mapping, and Hadoop, Cloud Security
DDI- 10.2348/ijset0517034
[/et_pb_cta][et_pb_cta title=”6. Power Quality Enhancement in Power System using STATCOM by Space Vector Modulation Techniques” button_url=”http://www.ijset.in/wp-content/uploads/2017/06/10.2348.ijset051739.pdf” url_new_window=”off” button_text=”Full Text” use_background_color=”off” background_color=”#7ebec5″ background_layout=”light” text_orientation=”justified” header_font=”Droid Sans|on|||” header_font_size=”16px” header_text_color=”#000000″ body_font=”Droid Sans||||” body_text_color=”#000000″ use_border_color=”off” border_color=”#ffffff” border_width=”1px” border_style=”solid” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#0c71c3″ button_use_icon=”on” button_icon_placement=”right” button_on_hover=”on” button_letter_spacing_hover=”0″ disabled=”off”]
Authors: Naveen Kumar Sahu, Nikhil Kumar Sharma
Affiliation:
M. Tech., Electrical and Electronics Engineering Department, Dr. C.V. Raman University, Kota – Bilaspur, India, Email – knaveen.cap1@gmail.com
Ph.D. Scholar, Indian Institute of Technology, Bhubaneshwar, Odisha, India, Email – ns12@iitbbs.ac.in
Copy for Cite this Article: Naveen Kumar Sahu, Nikhil Kumar Sharma, “Power Quality Enhancement in Power System using STATCOM by Space Vector Modulation Techniques”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 39- 44.
Abstract:
Static Synchronous Compensator (STATCOM) is a Shunt active FACTS controller when connected at the mid-point of the transmission line; it can improve voltage regulation, power flow and stability of the transmission systems i.e. power quality of system. This paper demonstrates how the power flow sharing can be achieved in power system using programmable AC sources that is supplying linear and nonlinear loads. Space Vector Pulse Width Modulation (SVPWM) is used as a control algorithm in a three-phase Voltage Source Converter (VSC) which acts as a Static Synchronous Compensator (STATCOM) for providing reactive power compensation. Voltage Source Converter used as a Static Synchronous Compensator provides efficient damping for sub synchronous resonance that improves the power system stability in addition to reactive power correction. The Voltage Source Converter with space vector control algorithm is provided for compensating the reactive power flow to correct the power factor, eliminating harmonics and balancing both linear and non-linear loads. Among different Pulse Width Modulation (PWM) techniques space vector technique is proposed as it is easy to improve digital realization and AC bus utilization. The proposed control algorithm relies on an approximate third-order nonlinear model of the Voltage Source Converter that accounts for uncertainty in three phase system parameters. The control strategy for reliable power sharing between AC power sources in grid and loads is proposed by using Space Vector Pulse Width Modulation controller.
Keywords— Flexible AC Transmissions (FACTS), Static Compensator (STATCOM), Voltage Source Converter (VSC), Space Vector Pulse Width Modulation (SVPWM)
DDI- 10.2348/ijset0517039
[/et_pb_cta][et_pb_cta title=”7. Modeling Node Capture Attacks in WSN: A Survey” button_url=”http://www.ijset.in/wp-content/uploads/2017/06/10.2348.ijset051745.pdf” url_new_window=”off” button_text=”Full Text” use_background_color=”off” background_color=”#7ebec5″ background_layout=”light” text_orientation=”justified” header_font=”Droid Sans|on|||” header_font_size=”16px” header_text_color=”#000000″ body_font=”Droid Sans||||” body_text_color=”#000000″ use_border_color=”off” border_color=”#ffffff” border_width=”1px” border_style=”solid” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#0c71c3″ button_use_icon=”on” button_icon_placement=”right” button_on_hover=”on” button_letter_spacing_hover=”0″ disabled=”off”]
Authors: Sakshee Saxena, Dr. Piyush Kumar Shukla, Dr. Rajeev Pandey
Affiliation:
Department of CSE, RGPV, Bhopal, MP, India, saksheesaxena33@gmail.com
Asst. Professor, Department of CSE, RGPV, Bhopal, MP, India, pphdwss@gmail.com
Asst. Professor, Department of CSE, RGPV, Bhopal, MP, India, rajeev98iet@gmail.com
Copy for Cite this Article: Sakshee Saxena, Dr. Piyush Kumar Shukla, Dr. Rajeev Pandey, “Modeling Node Capture Attacks in WSN: A Survey”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 45- 50.
Abstract:
Wireless Sensor Networks or WSN as they are commonly known in one of the most popularly advancing technology in the field of computer networks. The application of these networks is in sensitive areas like battle fields, military targeting systems etc. Due to hostile nature of environment where these nodes are prone to variety of security attacks. Among the assaults, the most outrageous is the sensor (node) capture attack. This survey provides various that are used to prototype node capture attacks in WSN and includes an exhaustive survey of the various algorithms and models that are devised to combat these kinds of attacks.
Keywords: Wireless Sensor Network, Sensor Capture Attack, Security, Adversary, Attacker
DDI- 10.2348/ijset0517045
[/et_pb_cta][et_pb_cta title=”8. Underwater Communication Systems: A Review” button_url=”http://www.ijset.in/wp-content/uploads/2017/06/10.2348.ijset051751.pdf” url_new_window=”off” button_text=”Full Text” use_background_color=”off” background_color=”#7ebec5″ background_layout=”light” text_orientation=”justified” header_font=”Droid Sans|on|||” header_font_size=”16px” header_text_color=”#000000″ body_font=”Droid Sans||||” body_text_color=”#000000″ use_border_color=”off” border_color=”#ffffff” border_width=”1px” border_style=”solid” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#0c71c3″ button_use_icon=”on” button_icon_placement=”right” button_on_hover=”on” button_letter_spacing_hover=”0″ disabled=”off”]
Authors: Harsh Vardhan Sharma, Neeraj Manglani
Affiliation:
Computer Science Dept. Jagannath University, Jaipur, India, Email: 4uharshvardhan@gmail.com
Computer Science Dept. Jagannath University, Jaipur, India, Email: neeraj.maglani@jagannathuniversity.org
Copy for Cite this Article: Harsh Vardhan Sharma, Neeraj Manglani, “Underwater Communication Systems: A Review”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 51- 56.
Abstract:
There is a high demand for underwater communication systems due to the increase in current human underwater activities. Underwater communication systems employ either sonar or electromagnetic waves as a means of transferring signals. These waves are different physically and electrically, and thus the systems that employ them also differ in their design architecture, wave propagation and devices used for emission and reception. As a result, the two systems have varying advantages and limitations. This paper presents an in-depth review of underwater communication based on sonar and electromagnetic waves, a comparison of the two systems and a discussion of the environmental impacts of using these waves for underwater communication. In the tradeoff between preserving the underwater environment and the need for underwater communication, it appears that underwater electromagnetic wave communication has the most potential to be the environmentally-friendly system of the future.
Keywords—underwater communication system, routers, sonar
DDI- 10.2348/ijset0517051
[/et_pb_cta][et_pb_cta title=”10. Grid Integration of Hybrid Electrical Energy” button_url=”http://www.ijset.in/wp-content/uploads/2017/06/10.2348.ijset051760.pdf” url_new_window=”off” button_text=”Full Text” use_background_color=”off” background_color=”#7ebec5″ background_layout=”light” text_orientation=”justified” header_font=”Droid Sans|on|||” header_font_size=”16px” header_text_color=”#000000″ body_font=”Droid Sans||||” body_text_color=”#000000″ use_border_color=”off” border_color=”#ffffff” border_width=”1px” border_style=”solid” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#0c71c3″ button_use_icon=”on” button_icon_placement=”right” button_on_hover=”on” button_letter_spacing_hover=”0″ disabled=”off”]
Authors: Sameer Tembhekar, Prabodh Khampriya
Affiliation:
Department of Electrical Engineering, Sri Satya Sai Institute of Science and Technology Sehore, Bhopal, Email: sameer.tembhekar80@gmail.com, khampriya5@gmail.com
Copy for Cite this Article: Sameer Tembhekar, Prabodh Khampriya, “Grid Integration of Hybrid Electrical Energy”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 60- 64.
Abstract:
Day by day the electricity demand is increasing exponentially. To fulfill this increasing demand of electricity more and more utilization of non-conventional energy sources are required as conventional sources are reduces. The best way to utilize the different renewable energy sources (RES) together is by using application of Microgrid. This paper illustrates the simple model of DC Microgrid with energy management system (EMS) which schedules the generation and load. The simulation model is developed in MATLAB/Simulink software containing photovoltaic array, wind turbine generator system (PMDC generator), battery storage system, grid and energy management controller. The simulation results are presented with variable load and variable generation conditions.
Keywords— Distributed energy sources, energy storage
DDI- 10.2348/ijset0517060
[/et_pb_cta][et_pb_cta title=”11. Handoff Management in Radio over Indoor Networks” button_url=”http://www.ijset.in/wp-content/uploads/2017/06/10.2348.ijset051767.pdf” url_new_window=”off” button_text=”Full Text” use_background_color=”off” background_color=”#7ebec5″ background_layout=”light” text_orientation=”justified” header_font=”Droid Sans|on|||” header_font_size=”16px” header_text_color=”#000000″ body_font=”Droid Sans||||” body_text_color=”#000000″ use_border_color=”off” border_color=”#ffffff” border_width=”1px” border_style=”solid” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#0c71c3″ button_use_icon=”on” button_icon_placement=”right” button_on_hover=”on” button_letter_spacing_hover=”0″ disabled=”off”]
Authors: Himanshu Kaushik
Copy for Cite this Article: Himanshu Kaushik, “Handoff Management in Radio over Indoor Networks”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 67- 72.
DDI- 10.2348/ijset0517067
[/et_pb_cta][et_pb_cta title=”12. Compensation of Low Performance Steering System and Visual Analysis of Complex simulation” button_url=”http://www.ijset.in/wp-content/uploads/2017/06/10.2348.ijset051773.pdf” url_new_window=”off” button_text=”Full Text” use_background_color=”off” background_color=”#7ebec5″ background_layout=”light” text_orientation=”justified” header_font=”Droid Sans|on|||” header_font_size=”16px” header_text_color=”#000000″ body_font=”Droid Sans||||” body_text_color=”#000000″ use_border_color=”off” border_color=”#ffffff” border_width=”1px” border_style=”solid” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#0c71c3″ button_use_icon=”on” button_icon_placement=”right” button_on_hover=”on” button_letter_spacing_hover=”0″ disabled=”off”]
Authors: Nilanshu Gupta, Mradul Sharma, Nafees Mohammad
Copy for Cite this Article: Nilanshu Gupta, Mradul Sharma, Nafees Mohammad, “Compensation of Low Performance Steering System and Visual Analysis of Complex simulation”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 73- 78.
DDI- 10.2348/ijset0517073
[/et_pb_cta][et_pb_cta title=”13. Interactive Visual Analysis in Automotive Engineering Design” button_url=”http://www.ijset.in/wp-content/uploads/2017/06/10.2348.ijset051779.pdf” url_new_window=”off” button_text=”Full Text” use_background_color=”off” background_color=”#7ebec5″ background_layout=”light” text_orientation=”justified” header_font=”Droid Sans|on|||” header_font_size=”16px” header_text_color=”#000000″ body_font=”Droid Sans||||” body_text_color=”#000000″ use_border_color=”off” border_color=”#ffffff” border_width=”1px” border_style=”solid” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#0c71c3″ button_use_icon=”on” button_icon_placement=”right” button_on_hover=”on” button_letter_spacing_hover=”0″ disabled=”off”]
Authors: Mradul Sharma, Nilanshu Gupta, Nafeesh Mohammad
Copy for Cite this Article: Mradul Sharma, Nilanshu Gupta, Nafeesh Mohammad, “Interactive Visual Analysis in Automotive Engineering Design”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 79- 84.
DDI- 10.2348/ijset0517079
[/et_pb_cta][et_pb_cta title=”14. Comparison between Three Most Prevailing Green Building Rating Systems of India” button_url=”http://www.ijset.in/wp-content/uploads/2017/06/10.2348.ijset051785.pdf” url_new_window=”off” button_text=”Full Text” use_background_color=”off” background_color=”#7ebec5″ background_layout=”light” text_orientation=”justified” header_font=”Droid Sans|on|||” header_font_size=”16px” header_text_color=”#000000″ body_font=”Droid Sans||||” body_text_color=”#000000″ use_border_color=”off” border_color=”#ffffff” border_width=”1px” border_style=”solid” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#0c71c3″ button_use_icon=”on” button_icon_placement=”right” button_on_hover=”on” button_letter_spacing_hover=”0″ disabled=”off”]
Authors: Himanshu Agarwal, Hari Kumar Singh, Sanjay Vashishtha
Affiliation:
Centre of Excellence – Renewable and Sustainable Energy Studies, Suresh Gyan Vihar University, Jaipur
First Green Consulting Private Limited, Gurugram, India
Copy for Cite this Article: Himanshu Agarwal, Hari Kumar Singh, Sanjay Vashishtha, “Comparison between Three Most Prevailing Green Building Rating Systems of India”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 85- 93.
Abstract:
New Construction is developing at a rapid pace. It has led to the emergence of Green Building Rating System worldwide. Various rating system of the world has provided unique guidelines for each category of building viz. Retails, Schools, Core & Shell, etc. Existing Buildings can even be retrofitted and obtain the certificate from Rating Agencies of the World. In this study, three primary rating systems prevailing in India are selected and analysed with the aim of providing insights into the current situations; highlighting the strengths, weaknesses, successes, and failures; and making recommendations for future improvements. The common aspect of all the rating system is to create a sustainable architecture in all respect so as to minimize negative environmental impact upon the environment. Certain analysis and data has been represented in this paper with the help of case study to highlight ambiguities and shortcomings in the weighting, scoring, and rating, which is mentioned in discussions. The three most prevailing rating system in India LEED, IGBC and GRIHA has been studied and compared with Maximum Points, Mandatory Criteria and points obtained in Case Study.
DDI- 10.2348/ijset0517085
[/et_pb_cta][et_pb_cta title=”15. Siphonic Roof Drainage: A dematerializing approach towards Green Construction” button_url=”http://www.ijset.in/wp-content/uploads/2017/06/10.2348.ijset051794.pdf” url_new_window=”off” button_text=”Full Text” use_background_color=”off” background_color=”#7ebec5″ background_layout=”light” text_orientation=”justified” header_font=”Droid Sans|on|||” header_font_size=”16px” header_text_color=”#000000″ body_font=”Droid Sans||||” body_text_color=”#000000″ use_border_color=”off” border_color=”#ffffff” border_width=”1px” border_style=”solid” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#0c71c3″ button_use_icon=”on” button_icon_placement=”right” button_on_hover=”on” button_letter_spacing_hover=”0″ disabled=”off”]
Authors: Bhawana Gautam, Dr. D. Buddhi, Pratulya Sivashankar
Affiliation:
Centre of Excellence – Renewable and Sustainable Energy Studies, Suresh Gyan Vihar University, Jaipur, India
IT Power Private Limited, New Delhi, India
Copy for Cite this Article: Bhawana Gautam, Dr. D. Buddhi, Pratulya Sivashankar, “Siphonic Roof Drainage: A dematerializing approach towards Green Construction”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 94- 98.
Abstract:
To reduce the environmental impact, due to high energy consumption and huge amount of material exploitation in the construction industry, there has been an inception of sustainable development. Sustainable development in the building industry, by providing the optimum comfort condition to the occupants with minimum impact to the environment, is known as green construction. Dematerialization is one of the aspects of green construction which can be defined as the exploitation of minimum amount of material without compromising the functional requirement of the habitat. One of the potential components of the building which can be dematerialized is the conventional roof drainage system. Siphonic Roof Drainage is an efficient roof drainage technology with less material requirement (smaller diameter and less number of downpipes) as compared to the conventional roof drainage system. The primary purpose of this study is to quantify the amount of material reduction by replacing the conventional system with the siphonic roof drainage. The study is also done for the environmental impact comparison and architectural design flexibility between the two systems of roof drainage. The study was done by designing conventional and siphonic system for the same building and comparison of material was done.
DDI- 10.2348/ijset0517094
[/et_pb_cta][et_pb_cta title=”16. Prevention Mechanisms of DDoS Attacks: A Critical Review” button_url=”https://www.ijset.in/wp-content/uploads/10.2348.ijset051799.pdf” url_new_window=”off” button_text=”Full Text” use_background_color=”off” background_color=”#7ebec5″ background_layout=”light” text_orientation=”justified” header_font=”Droid Sans|on|||” header_font_size=”16px” header_text_color=”#000000″ body_font=”Droid Sans||||” body_text_color=”#000000″ use_border_color=”off” border_color=”#ffffff” border_width=”1px” border_style=”solid” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#0c71c3″ button_use_icon=”on” button_icon_placement=”right” button_on_hover=”on” button_letter_spacing_hover=”0″ disabled=”off”]
Authors: Ms. Dalima Parwani, Dr. Pratima Gautam
Affiliation:
1Department of Computer Science, SantHirdaram Girls College, Bhopal, 462030, India; E.Mail: dalimaparwani@gmail.com
Abstract:
In the world of electronics and computer Denial of Service (DoS) occurrences is one of the hardest and the chief threat as per security issues are concern. Distributed Denial of Service (DDoS) is also one of the chief threats which can impact proportionally over internet. Such type of attack enables various computing tasks to be exhaust easily and within a short duration of time it exhausts statement possessions of victim. Hence various systems are executed for the recognition and hindrance of Distributed Denial of Service (DDoS) attacks. Here in this paper described structural of all the Distributed Denial of Service (DDoS) attacks classification and their various defense mechanism are analyzed. In addition with this various important features of each of the Distributed Denial of Service (DDoS) attacks their various benefits and drawbacks used in various techniques are also outlined and analyzed. The major points in this paper are the coverage of all the existing attacks and various benefits and drawbacks as well as their prevention mechanism. By providing and analyzing the various issues in the existing techniques a more improved and efficient algorithm is implemented in future which can prevent from such type of attacks.
Keywords: Denial of Service (DoS) attacks, Distributed Denial of Service (DDoS) Attacks, Network Bandwidth, Internet Control Message Protocol (ICMP), Network Security, Flooding Attack.
DDI- 10.2348/ijset0517099
[/et_pb_cta][et_pb_cta title=”17. Optimal Sensing Threshold Role in Spectrum Sensing in Cognitive Radio” button_url=”http://www.ijset.in/wp-content/uploads/2017/07/10.2348.ijset0517113.pdf” url_new_window=”off” button_text=”Full Text” use_background_color=”off” background_color=”#7ebec5″ background_layout=”light” text_orientation=”justified” header_font=”Droid Sans|on|||” header_font_size=”16px” header_text_color=”#000000″ body_font=”Droid Sans||||” body_text_color=”#000000″ use_border_color=”off” border_color=”#ffffff” border_width=”1px” border_style=”solid” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#0c71c3″ button_use_icon=”on” button_icon_placement=”right” button_on_hover=”on” button_letter_spacing_hover=”0″ disabled=”off”]
Authors: Nilambika Jawalkote, Mahua Bhowmik
Affiliation:
PG student, Department of Electronics and Telecommunication .Dr.D.Y.Patil Institute of Technology. Pimpri PUNE, Email: nilambikajawalkote@gmail.com
Assistant Professor, Department of Electronics and Telecommunication, Dr.D.Y.Patil Institute of Technology, Pimpri PUNE, Email: m_ghorai2001yahoo.com
Copy for Cite this Article: Nilambika Jawalkote, Mahua Bhowmik, “Optimal Sensing Threshold Role in Spectrum Sensing in Cognitive Radio”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 113- 119.
Abstract:
Cognitive Radio is an emerging technology that is an advanced version of the radio network. The ultimate goal of cognitive radio is to efficiently use all empty spaces that are not fully utilized for communication. Use blank spaces that are also known as white holes. It is an intelligent radio that fits intelligently according to their environment. You can also call it a radio that can change its transmitter parameters according to the environment. In this we have optimized the quality of services through the detection threshold. We get-closed form optimum threshold expression for local equilibrium detection probability of failure detection and probability of false alarm Key words—cognitive radio, spectrum sensing, threshold detection, energy detection.
DDI- 10.2348/ijset0517113
[/et_pb_cta][et_pb_cta title=”18. Advance Application of DJANGO Integrated With TASTYPIE API Framework for the Software Development” button_url=”http://www.ijset.in/wp-content/uploads/2017/07/10.2348.ijset0517120.pdf” url_new_window=”off” button_text=”Full Text” use_background_color=”off” background_color=”#7ebec5″ background_layout=”light” text_orientation=”justified” header_font=”Droid Sans|on|||” header_font_size=”16px” header_text_color=”#000000″ body_font=”Droid Sans||||” body_text_color=”#000000″ use_border_color=”off” border_color=”#ffffff” border_width=”1px” border_style=”solid” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#0c71c3″ button_use_icon=”on” button_icon_placement=”right” button_on_hover=”on” button_letter_spacing_hover=”0″ disabled=”off”]
Authors: Prabhanshu Kumar Singh, Vipin Kumar Gupta
Affiliation:
M.Tech scholar, Electronics and communication, VLSI, Suresh Gyan Vihar University, Jaipur, Rajasthan, Email: Singhprabhanshu5@gmail.com
Assistant professor, Electronics and communication, VLSI, Suresh Gyan Vihar University, Jaipur, Rajasthan, Email: vipinsbcet@gmail.com
Copy for Cite this Article: Prabhanshu Kumar Singh, Vipin Kumar Gupta, “Advance Application of DJANGO Integrated With TASTYPIE API Framework for the Software Development”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 120- 125.
Abstract:
Python is the advance language. It is used in the research and science, scripting in Unix and web development. It is flexible and easy language as compare to the other languages. It is the high level language as it is readable and identical to the human language. Django is the web framework used in the web development. Django gives the backend admin site as well as the frontend according to the urls provided..Tastypie is a webservice API framework for Django webframework. It provides the REST style interfaces. The use of django and tastypie for the software and website development is quite easy. Here django is used to create the database and tastypie is used for the generation of the API development. The overriding of the default function is the main funtionality of the report which is used to provide different functionality to the software like email on object creation, checking for field to perform functionality at different events.
Keywords: MVC, ORM, NON-ORM, Model, Resource, Rest framework, API, MVT
DDI- 10.2348/ijset0517120
[/et_pb_cta][et_pb_cta title=”19. Design of Image Encryption Scheme Using Digital Circuit” button_url=”http://www.ijset.in/wp-content/uploads/2017/07/10.2348.ijset0517126.pdf” url_new_window=”off” button_text=”Full Text” use_background_color=”off” background_color=”#7ebec5″ background_layout=”light” text_orientation=”justified” header_font=”Droid Sans|on|||” header_font_size=”16px” header_text_color=”#000000″ body_font=”Droid Sans||||” body_font_size=”14px” body_text_color=”#000000″ use_border_color=”off” border_color=”#ffffff” border_width=”1px” border_style=”solid” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#0c71c3″ button_use_icon=”on” button_icon_placement=”right” button_on_hover=”on” button_letter_spacing_hover=”0″ disabled=”off”]
Authors: Shalini Stalin, Priti Maheshwari, Piyush Kumar Shukla
Affiliation:
AISECT University, Chiklod Road, Near Bangrasia Square, Dist. Raisen 464993, India; shalini.stalin@yahoo.com
AISECT University, Chiklod Road, Near Bangrasia Square, Dist. Raisen 464993, India; pritimaheshwary@gmail.com
3DoCSE University Institute of Technology, RGPV,Bhopal 462023, India, pphdwss@gmail.com
Copy for Cite this Article: Shalini Stalin, Priti Maheshwari, Piyush Kumar Shukla, “Design of Image Encryption Scheme Using Digital Circuit” , International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 126- 129.
Abstract:
In recent times, many chaos-based algorithms are being proposed for image encryption. But the encryption schemes have lacked in one or the other way that is they could not promise the security of the encrypted image or the encryption scheme was so complicated that it became difficulty to regain original image. In this paper we propose an encryption method by initially dividing the image into blocks and applying mathematical expression XOR operation and 2’s compliment to maintain its security and upper triangular matrix is also applied so that position of the blocks can be changed diagonally. The position of the blocks can be changed either row wise or column wise depending upon the security measures. In this method pixel of the image is un- touched thus the quality of the image is being maintained throughout all the stage. All the trial comes about recommend with the aim of putting forward picture encryption method which is efficient as well as highly secure and this method is being compared with previous encryption schemes.
DDI- 10.2348/ijset0517126
[/et_pb_cta][et_pb_cta title=”20. Optimization of Media for Laccase Production Using Pseudomonas Mendocina” button_url=”http://www.ijset.in/wp-content/uploads/2017/07/10.2348.ijset0517130.pdf” url_new_window=”off” button_text=”Full Text” use_background_color=”off” background_color=”#7ebec5″ background_layout=”light” text_orientation=”justified” header_font=”Droid Sans|on|||” header_font_size=”16px” header_text_color=”#000000″ body_font=”Droid Sans||||” body_font_size=”14px” body_text_color=”#000000″ use_border_color=”off” border_color=”#ffffff” border_width=”1px” border_style=”solid” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#0c71c3″ button_use_icon=”on” button_icon_placement=”right” button_on_hover=”on” button_letter_spacing_hover=”0″ disabled=”off”]
Authors: Amit Rastogi, Poonam Singh
Affiliation:
Department of Molecular and Cellular Engineering, Sam Higginbottom University of Agricultural, Technology and Sciences, Allahabad, India
Department of Molecular and Cellular Engineering, Sam Higginbottom University of Agricultural, Technology and Sciences, Allahabad, India
Mail id : amitrastogi1986@gmail.com
Copy for Cite this Article: Amit Rastogi, Poonam Singh, “Optimization of Media for Laccase Production Using Pseudomonas Mendocina”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 130- 133.
DDI- 10.2348/ijset0517130
[/et_pb_cta][et_pb_cta title=”21. Performance of UASB Reactors in Single Stages Under Different Upflow Velocity, HRT and OFR Treating Domestic Wastewater” button_url=”http://www.ijset.in/wp-content/uploads/2017/10/10.2348.ijset0517134.pdf” url_new_window=”off” button_text=”Full Text” use_background_color=”off” background_color=”#7ebec5″ background_layout=”light” text_orientation=”justified” header_font=”Droid Sans|on|||” header_font_size=”16px” header_text_color=”#000000″ body_font=”Droid Sans||||” body_font_size=”14px” body_text_color=”#000000″ use_border_color=”off” border_color=”#ffffff” border_width=”1px” border_style=”solid” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#0c71c3″ button_use_icon=”on” button_icon_placement=”right” button_on_hover=”on” button_letter_spacing_hover=”0″ disabled=”off”]
Authors: Jitender Pal, Mandeep Kaur
Affiliation:
Associate Professor, Department of Environmental Science and Engineering, Guru Jambheshwar University of Science and Technology, Hisar-125001, Haryana, j_pal2k1@yahoo.com
Research Scholar, Department of Environmental Science and Engineering, Guru Jambheshwar University of Science and Technology, Hisar-125001, Haryana, mandeepkaur76@gmail.com
Copy for Cite this Article: Jitender Pal, Mandeep Kaur, ”Performance of UASB Reactors in Single Stages Under Different Upflow Velocity, HRT and OFR Treating Domestic Wastewater”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 134- 141.
Abstract:
The aim of the study is to elucidate the effect of process parameters on the performance of UASB reactors. A single stage laboratory scale UASB reactor was used for the study. After complete acclimatization period of 90 days, reactor was operated at continuous mode to assess the COD reduction and methane gas production. The results of this study establish that upflow, Organic Feeding Rate and Hydraulic Retention Time are the most significant process parameters which are directly concerns with COD removal and methane gas production. A higher upflow velocity reduces the contact time between biomass and wastewater; and at the same time higher washout of active as well as dead biomass from the reactor. The maximum total COD and its fraction removal was observed in phase-I, (CODT=68.9%, CODSS=57.8%, CODC=60.6% and CODD=74.0%) at low flow rate (2 ml/min.), organic feeding rate (0.136 kg COD/m3-d) and F/M ratio (0.29 kgCOD/kgVSS). The average value of methane gas yield (0.668 L CH4/g VSS) and its content (70.4%) in biogas was noticed in phase-I.
Keywords: Hydraulic retention time, Organic Feeding Rate, UASB, Upflow velocity, Food to Microorganism Ratio.
DDI- 10.2348/ijset0517134
[/et_pb_cta][et_pb_cta title=”22. A Study of New Trends in Medical Tourism with Geographical Perspective” button_url=”https://www.ijset.in/wp-content/uploads/10.2348ijset0517142.pdf” url_new_window=”off” button_text=”Full Text” use_background_color=”off” background_color=”#7ebec5″ background_layout=”light” text_orientation=”justified” header_font=”Droid Sans|on|||” header_font_size=”16px” header_text_color=”#000000″ body_font=”Droid Sans||||” body_font_size=”14px” body_text_color=”#000000″ use_border_color=”off” border_color=”#ffffff” border_width=”1px” border_style=”solid” custom_button=”on” button_text_size=”14px” button_text_color=”#ffffff” button_bg_color=”#0c71c3″ button_use_icon=”on” button_icon_placement=”right” button_on_hover=”on” button_letter_spacing_hover=”0″ disabled=”off”]
Authors: Ashish Sharma
Affiliation:
Research Scholar, Babu Shobharam Arts College, Dept of Geography Alwar, Rajasthan
Copy for Cite this Article: Ashish Sharma, ”A Study of New Trends in Medical Tourism with Geographical Perspective”, International Journal of Science, Engineering and Technology, Volume 5 Issue 3: 2017, pp. 142- 148.
Abstract:
Medical tourism means to the process in which people to other countries to obtain treatment. Medical tourism refers to people traveling to a country other than their own to obtain medical treatment. In the past this usually referred to those who traveled from less-developed countries to major medical centers in highly developed countries for treatment unavailable at home. However, in recent years it may equally refer to those from developed countries who travel to developing countries for lower priced medical treatments. The motivation may be also for medical services unavailable or illegal in the home country.
DDI- 10.2348/ijset0517142
[/et_pb_cta][/et_pb_column][/et_pb_row][/et_pb_section]
Inmates’ Readiness for Social Reintegration Inventory: A Test to Measure Preparedness of Inmates in New Bilibid Prison Minimum Security Compound for Reintegration to Society
Authors – Dr. John Mark Distor
Abstract- – Unique structures require more time for analysis and design due to their time-consuming calculations, if we use manual methods it will require more time for their calculations along with more probability of errors. STAAD Pro is a computer aided software which is used for solving complex engineering problems and provides us a quick results. STAAD Pro is a user friendly, easy to use software which gives us results pretty quickly along with fair level of accuracy. It is used for analysis and design of any structure with its wide scope of problem-solving tools. STAAD Pro has wide scope of sections, material properties, different Codal Provisions inbuilt commands along with user defined assignments. In India, STAAD Pro is used as per Indian Standard and Practices while it gives freedom for the consideration of different countries codes which are applicable to different regions around the globe. We can conclude that this software can save much time and very accurate in analyzing and designing of different structures along with being accurate. An ANOVA method is a statistical method used to find out if the results obtained are significant. In this project, a G+12 Building model is prepared and analyzed with the help of STAAD Pro by considering the various loads viz. dead, live, combination. The results are studied and compared by manual calculations. ANOVA Test is then used in order to find if the results are significant with the help of Microsoft excel. In the STAAD Pro the designing is done by better way for creating Geometry, defining the cross sections for column and beams etc, creating specification and supports according to the requirement. Then the Loads are defined with the help of loads envelop which is available in the loads and definition tab of STAAD Pro. After applying all the loads, the model is checked for any error, and the model is analyzed through ‘run analysis’ tab. Then the results are obtained by post possessing of the model. The results obtained are then taken into Microsoft excel for the ANOVA test. The analysis of variance is then applied with the help of data analysis in the excel software and the results are interpreted.