IJCER Online Submission
IJCER Paper Submission Format
Publication Charges - IJCER

Frequency: 12 issues per year
ISSN: 2250–3005 (online version)
Published by: IJCER
Call for paper...

International Journal of ComputationalEngineeringResearch

(IJCER)

Volume 4, Issue 2,February, 2014

      
 
Version I
S.No. Article Title Page No. Paper Index PDF
1.

Crahid: A New Technique for Web Crawling In Multimedia Web Sites

Dr. Ammar Falih Mahdi , Rana Khudhair Abbas Ahmed

Abstract

With the quick growth and the huge amount of data that propagate in the web, we spend a lot of our time in finding the exact required information from the huge information retrieved from the web crawlers of search engines. Therefore, a special software is required to collect and find the exact required information and save our time and effort in finding what is good from the huge amount of retrieved data from the web. In our research, we proposed a software called "CRAHID" which uses a new technique to crawl (image, sound, text and video) depending on an information hiding technique for describing media. We supposed a new media format which describes media using hidden information to maintain time and effort for finding the exact information retrieved from the crawler.

Keywords:Computer, Crawling, Information hiding, Multimedia, Search , Technique, Web.
01-06  
03.3005/04210106
PDF
2.

Analysis Of Wavelet And Curvelet Image Denoising For Different Kinds Of Additive Noises

Miss Monika Shukla , Dr.Soni Changlani , Mr.Tejinder Singh Marwah

Abstract

This paper describes approximate digital implementations of two new mathematical transforms,namely;the wavelet transform and curvelet transform.our implementation offer exact reconstruction,stability against perturbation,ease of implementation,low computational complexity and our main implementation is that,at a time we can use a different types of additive noises like additive Gaussian noise,speckle noise,poisson noise and salt & pepper noise etc.to get a different PSNR and MSE values.we can easily analysed our result or we can easily compare between wavelet and curvelet image denoising.A central tool is fourier domain computation of an approximate digital Radon transform.The Radon transform in two dimentions is the integral transform consisting of the integral of a function over straight lines.In the experiments we reported her,simple thresholding of the curvelet coefficient is very competitive with "state of art" techniques based on wavelets,including threshold estimators for wavelet and curvelet transform also,Different threshold estimators are used for filtering the noisy images.Morover,the curvelet reconstruction,offering visually sharper images and in particular,higher quality recovery of edges and of faint linear and curvilinear features.The empirical results reported here are in encouraging agreement

Keywords:Wavelet transform, Curvelet transform, Face recognition, Sparse representation, Feature extraction,,Thresholding rules.
07-12  
03.3005/042107012
PDF
3.

A More Effective Realization Of BCD Adder By Using A New Reversible Logic BBCDC

Shefali Mamataj,Biswajit Das,Anurima Rahaman

Abstract

Reversible logic is one of the emerging technologies having promising applications in quantum computing nanotechnology, and low power CMOS design. The main purposes of designing reversible logic are to decrease quantum cost, depth of the circuits and the number of garbage outputs. With the advent of quantum computer and reversible logic, design and implementation of all devices has received more attention. BCD digit adder is the basic unit of the more precise decimal computer arithmetic. This paper represents a new reversible logic BBCDC and also a more effective realization of BCD adder by using the proposed reversible logic. A comparative result is presented which shows that the proposed design is more effective in terms of number of gates and number of garbage outputs than the existing designs

Keywords:Reversible logic, Basic Reversible Gates, BCD adder , Reversible full adder, Constant input, Garbage ,Quantum cost.
13-19  
03.3005/0421013019
PDF
4.

Effect of Chemical Reaction on Mass Transfer over a Stretching Surface Embedded In a Porous Medium

E. M. A. Elbashbeshy , A. M. Sedki

Abstract

An analysis is made to investigate the mass transfer over a stretching surface embedded in a porous medium in the presence of first order chemical reaction. Using similarity transformation, the governing partial differential equations are transformed into a set of ordinary differential equations which solved by shooting method. Comparisons with previously published work on special cases of the problem are performed and the results are found to be in excellent agreement. It is observed that the local mass transfer and concentration profile are very sensitive to change in the values of reaction rate parameter, permeability parameter and Schmidt number.

Keywords:Mass transfer – Stretching surface – Porous medium- Chemical reaction.
20-28  
03.3005/0421020028
PDF
5.

Development and Performance Evalution of a Recirculatory System Fish Incubator

Diabana P.D, Fakunmoju F.A ,Adesina B.S

Abstract

Hatching of fish eggs during the raining season is more or less difficult and time consuming in terms of heat provision for the eggs which results in a high cost of production. Consequently there is need to design and construct an effective recirculatory system fish incubator which operates under a controlled environment. An incubator with an hatching unit of (306mm x 303mm x 207mm) dimension was designed and constructed using locally available materials to reduce cost. The recirculatory system incubator has three units: the Incubating unit, the Sedimentation unit and Bio-tower system unit, The incubating unit was constructed using angular bars of dimension 3mm x 50mm which were joined together to form a rectangular shape and lined up at the back with pipe to supply water from the bio-tower system. Inside are four metal trays made from metal plate to form the hatching units. Four bulbs (60watt) each generating heat for each tray were used as heat source. The sedimentation tank was constructed using angular bar of 840mm x 307mm x 900mm dimension and covered up with metal plates and then connected to an overhead tank (Bio-tower).

Keywords:Re-circulatory, Bio-tower, Sedimentation tank, Incubator, Hatchability
29-34  
03.3005/0421029034
PDF
6.

Fractional Derivative Associated With the Generalized M-Series and
Multivariable Polynomials

Ashok Singh Shekhawat ,Jyoti Shaktawat 

Abstract

The aim of present paper is to derive a fractional derivative of the multivariable H-function of Srivastava and Panda [9], associated with a general class of multivariable polynomials of Srivastava [6] and the generalized Lauricella functions of Srivastava and Daoust [11] the generalized M-series. Certain special cases have also been discussed. The results derived here are of a very general nature and hence encompass several cases of interest hitherto scattered in the literature.

35-39  
03.3005/0421035039
PDF
7.

DMZ: A trusted honeypot for secure transmission

M.Buvaneswari , M.P. Loganathan

Abstract

In general, denial of service is nothing but flooding of unrelated information over the network. This causes, overload of network and higher bandwidth consumption. Therefore particular service requested by authorized user cannot receive at particular time. Thus causes larger security threat in network. When these system get distributed (distributed network), the mitigation becomes very complex. In existing technique the DoS has been mitigated using many filtering technique. In order to reduce the effect of DDoS attack we had introduced the concept of ihoneycol[1], which includes the collaboration of firecol(intrusion prevention system) these forms a virtual mitigation shield around the destination and safe guard from the source and honey pot(intrusion detection system). To improve these security, we are going to introduce "trusted honey pot". These can be done using honey token and honey sign.

Keywords:Denial of service, ihoneycol, honey pot, honey token, honey sign
 
40-42  
03.3005/0421040042
PDF
8.

Efficient Cluster Head Selection Method For Wireless Sensor Network

 Manjusha M S, K E Kannammal

Abstract

A WSN (Wireless Sensor Network) consists of over hundreds of sensor nodes which have limited energy, process capability and memory. The applications of WSN in some extreme environment make sensor nodes difficult to replace once they use up the battery resource. Since the wireless transmission is the most energy consuming operation, how to design an energy efficient routing protocol becomes the main goal for the wireless sensor network. LEACH is considered as the most popular routing protocol which has better performance in saving the energy consumption. However, the selecting formula neglecting the change of nodes' energy will make the nodes acting as cluster heads too many times which leads to the death of the cluster head early by consuming excessive amount of energy. Also, the frequent reclustering wastes certain amount of energy. This paper presents a new version of LEACH protocol referred to as VLEACH which aims to reduce energy consumption within the wireless network.

Keywords:Clustering, Cluster Head, LEACH protocol, Routing, V-LEACH, Vice Cluster Head, Wireless sensor networks
43-49  
03.3005/0421043049
PDF
9.

Optimal Synthesis of a Single-Dwell 6-Bar Planar Linkage

 Galal A. Hassaan

Abstract

Six-bar linkage of single or double dwell linkage are used to overcome the problems of cam-follower mechanisms. Optimal synthesis of dwell mechanisms provides accurate synthesis fulfilling most of the functional constraints imposed to satisfy the mechanism specifications for proper operation.In the present work, the synthesis problem is formulated in the form of an objective function and three functional constraints. The synthesis problem incorporates seven parameters to be optimally evaluated covering all the links of the mechanism. The transmission angle of the 4-bar linkage and at the output slider are both considered to control the performance quality of the synthesized mechanism.In an application on the methodology presented, it was possible to synthesize 6-bar planar linkage for a single dwell across 60 degrees of crank rotation with a maximum error of 0.229 %.

Keywords:optimal mechanism design – 6-bar planar linkage – single-dwell mechanism
50-56  
03.3005/0421050056
PDF
10.

Vehicles Weight Ratio V. Initial Velocity of Vehicle in Chain Accidents on Highways

 Robert M Brooks, Mehmet Cetin

Abstract

The objective of this study is to determine the influence of vehicles weight ratio on the initial velocity of the first vehicle in a chain accident on highways involving three vehicles. Regression analysis on the results of these variables was conducted. Excellent correlation coefficient was found for the relationship at α = 0.05 significance level. The influence of Vehicles Weight Ratio on the Initial Velocity is shown by a quadratic equation (Initial velocity = 9.4313 Vehicles Weight Ratio 2 – 45.94 Vehicles Weight Ratio +143.52) with R = 0.91.

Keywords:Accident Reconstruction, Chain Accidents, Highways, Initial Velocity, Regression Analysis, Reconstruction engineering, Vehicles Weight Ratio.
57-63  
03.3005/0421057063
PDF
11.

To Study and Analyze To Foresee Market Using Data Mining Technique

 Amit Khedkar, Prof. Rajendra Argiddi

Abstract

In every field there is huge growth and demand in knowledge and information over the internet. The automation using data mining and predictive technologies are doing an advance amount of deals in the markets. Data mining is all based on the theory that the historic data holds the essential memory for predicting the future direction. This technology is designed to help shareholders to discover hidden patterns from the historic data that have probable predictive capability in their investment decisions. The prediction of stock markets is regarded as a challenging task of financial time series prediction. Data analysis is one way of predicting if future stocks prices will increase or decrease. There are some methods of analyzing stocks which were combined to predict if the day's closing price would increase or decrease. These methods include study of Price, Index, and Average. (For e.g.Typical Price (TP), Bands, Relative Strength Index (RSI), CMI and Moving Average (MA)).

Keywords:Data mining,Stock prediction, Historical data
64-67  
03.3005/0421064067
PDF
12.

Multiple Single Input Change Vectors for Built-In Self Test (MSIC-BIST)

 Praveenkumar.J,Danesh.K

Abstract

Digital circuit's complexity and density are increasing while, at the same time, more quality and reliability are required. These trends, together with high test costs, make the validation of VLSI circuits more and more difficult. In this project we introduce the automatic test pattern generator with multiple single input change (SIC) vectors for post silicon validation schemes. Choosing a best device leads to challenges in various factors, In this paper performs a novel test pattern generator (TPG) for built-in self-test. Our method generates multiple single input change (MSIC) vectors in a pattern, i.e., each vector applied to a scan chain is an SIC vector. A reconfigurable Johnson counter and a scalable SIC counter are developed to generate a class of minimum transition sequences. The designed TPG is flexible to both the test-per-clock and the test-per-scan schemes.A theory is also developed to represent and analyze the sequences and to extract a class of MSIC sequences. Analysis results show that the produced MSIC sequences have the favorable features of uniform distribution and low input transition density. The performances of the designed TPGs and the circuits under test with 45 nm are evaluated. Simulation results with ISCAS benchmarks demonstrate that MSIC can save test power and impose no more than 7.5% overhead for a scan design. It also achieves the target fault coverage without increasing the test length.

Keywords:Built in self test,single input change vectors,test pattern generator,Johnson counter
68-72  
03.3005/0421068072
PDF
Version II
S.No. Article Title Page No. Paper Index PDF
1.

Design and Implementation of Testable Reversible Sequential Circuits Optimized Power

  Manikandan.B, Vijayaprabhu.A

Abstract

The conservative reversible gates are used to designed reversible sequential circuits. The sequential circuits are flip flops and latches. The conservative logic gates are Feynman, Toffoli, and Fredkin. The design of two vectors testable sequential circuits based on conservative logic gates. All sequential circuit based on conservative logic gates can be tested for classical unidirectional stuck-at faults using only two test vectors. The two test vectors are all 1s, and all 0s. The designs of two vectors testable latches, master-slave flip-flops and double edge triggered (DET) flip-flops are presented. We also showed the application of the proposed approach toward 100% fault coverage for single missing/additional cell defect in the quantum- dot cellular automata (QCA) layout of the Fredkin gate. The conservative logic gates are in terms of complexity, speed and area.

01-06  
03.3005/04220106
PDF
2.

Mathematical Methods in Medical Image Processing and Magnetic Resonance Imaging

 Joyjit patra, Himadri Nath Moulick, Arun Kanti Manna, Rajarshi Roy

Abstract

In this paper,we describe some central mathematical problems in medical imaging.The subject has been undergoing rapid changes driven by better hardware and software.Much of the software is based on novel methods utilizing geometric partial differential equations in conjunction with standard signal/image processing techniques as well as computer graphics facilitating man/machine interactions.As part of this enterprise,researchers have been trying to base biomedical engineering principles on rigorous mathematical foundations for the development of software methods to be integrated into complete therapy delivery systems.These systems support the more effective delivery of many image-guided procedures such as radiation therapy,biopsy,and minimally invasive surgery.We will show how mathematics may impact some of the main problems in this area including image enhancement,registration,and segmentation.This paper[1] describes image processing techniques for Diffusion Tensor Magnetic Resonance.In Diffusion Tensor MRI,a tensor describing local water diffusion is acquired for each voxel. The geometric nature of the diffusion tensors can quantitatively characterize the local structure in tissues such as bone,muscles,and white matter of the brain.The close relationship between local image structure and apparent diffusion makes this image modality very interesting for medical image analysis.We present a decomposition of the diffusion tensor based on its symmetry properties resulting in useful measures describing the geometry of the diffusion ellipsoid. A simple anisotropy measure follows naturally from this analysis.We describe how the geometry,or shape,of the tensor can be visualized using a coloring scheme based on the derived shape measures.We show how filtering of the tensor data of a human brain can provide a description of macrostructural diffusion which can be used for measures of fiber-tract organization.We also describe how tracking of white matter tracts can be implemented using the introduced methods

Keywords:Medical imaging, artificial vision, smoothing, registration, segmentation, image-guided therapy (IGT) and image guided surgery (IGS).
07-18  
03.3005/B042207018
PDF
3.

Erbil Guide Application

  Roojwan Scddeek.Esmael, Shahab WahabKareem, Rami S. Youael

Abstract

In this paper prepare using mobile application for navigator via GSM , while used application for searching for hotel ,restaurant and tourism in Kurdistan-Iraq. this application help a user to find any information about tourist attractions and archaeological and their geographical locations and how to go to them as well as information on hotels from their and services, as well as their geographical location and how to go to them as well as information about restaurants of quality restaurants and its geographical and how to go to them in the past did not easy to get this information, and even now, without the use of such applications will be difficult for tourists to get such information this information helps users of the application to develop a plan and budget for any trip tourism or visit for treatment or work before traveling to the place to be second benefit back to the owners hotels as well as restaurants understand spend a lot of money in their campaign propaganda in order to advertise themselves in television stations and newspapers and radio stations, but may not reach these ads to all people and in a timely manner, but by this application not only can advertise themselves and at low prices throughout the year, but they can put all the information of interest to users and showcase the latest services and many other important information so that the application enables the user to find them at any time.

Keywords:mobile technology, Global system for mobile (GSM), geographical location, smart
19-24  
03.3005/0422019024
PDF
4.

Algorithm on conditional probability on random graph using Markov Chain

 Habiba El-Zohny , Hend El- Morsy 

Abstract

In this paper we will illustrate the conditional probability on random graph. We will compute steady state which can defined as limits of stationary matrix S . The steady state will be computed for some examples. After that we will illustrate algorithm of random walk in weighted and un weighted graph.

25-33  
03.3005/0422025033
PDF
5.

Analysis of Activity Patterns and Design Features Relationships in Urban Public Spaces: A Case Study of the Old City Of As-Salt

  Dr. Rana Almatarneh

Abstract

Urban public spaces have been considered an essential part of cities throughout history. Over the span of urban life, public spaces have continuously reflected the complexities of their cities' cultural, social, and economic contexts; whether as memorable, accessible, or meaningful places. However, recent researches on public spaces reveal that some are currently experiencing a decline in their physical design and in their use. Thus, in this period of change in using public spaces, it becomes important to investigate and evaluate the actual use of public spaces, how and why they are used, particularly in terms of their physical deterioration and improvement. Therefore, an opportunity exists to reveal and understand the interrelationship between physical patterns of public spaces and people's activity patterns within such spaces. As such, this research considers the design features of urban public space, focusing on people's activities and various forms of use. It employs a methodology that combines three major components; case study selection, data collection and management, data analysis to explore in depth the activity pattern related to the physical pattern of public spaces, within the case study. Finally, this research is expected to add insights into the application of urban design theories and practice which could lead to further studies to improve the public spaces design and planning process.

Keywords:The Old City of As-Salt, Public Space, Public Square, Activity Patterns, Design Factors, Case Study
34-51  
03.3005/0422034051
PDF
6.

Modified Approach for Solving Maximum Clique Problem

Jaspreet Singh

Abstract

Maximum Clique problem is an NP Complete Problem which finds its applications in various fields ranging from networking to determination of structure of a protein molecule. The work suggests the solution of above problem with the help of Genetic Algorithms. Clique problem requires finding out all fully connected sub-graphs of a particular graph. This paper investigates the power of genetic algorithms at solving the maximum clique problem. Another feature of algorithm is based on population-driven search where the statistical properties of the initial population are controlled to produce efficient search. The technique can be extended to many unsolvable problems and can be used in many applications from loop determination to circuit solving

Keywords:MAXCLIQUE, Roulette Wheel Selection, Genetic Algorithm, Maximum Clique Problem (MCP).
52-58  
03.3005/0422052058
PDF
Version III
S.No. Article Title Page No. Paper Index PDF
1.

Optimizing Design Cost of System by using Dynamic Programming

KIndira Priyadarsini, Amanulla Mohammad 

Abstract

Search based software engineering is an emerging discipline that optimizing the cost of system design by using algorithmic search techniques. For example in the design article intelligence system that help to crime investigation designs. Use the minimal amount of computing between to reduce weight and lost while supporting training and reorganization task running on board. Hard ware and software (system) design is a process which indentify software and hardware knapsack. Dynamic programming is a problem solving technique which solves the optimization design cost. This paper provide how cost. Constrained problem can be modeled as set of two dimensional knapsack problems and provides a frame work and algorithm to optimize design cost of system. An experimental result showing that results reaches the maximum of optimization solution value

01-05  
03.3005/04230105
PDF
2.

Criteria for Choosing An Effective Cloud Storage Provider

Audu Jonathan Adoga, Garba M. Rabiu,Anyesha Amos Audu 

Abstract

Cloud storage, a revolutionary invention and a Cloud Computing model is changing the way computer users and organizations save their data. This review creates awareness on the benefits of cloud storage to the clients. The report also discusses Cloud's top ten risks, as presented by a professional body (OWASP). These risks serve as eye opener to those who want to employ cloud storage. Advantages of cloud storage have also been elaborated, but one may be left in confusion because the paper sheds light on both the advantages and the risks of Cloud Storage. It is in line with these that this review tries to create a crystal clear explanation by going further to expatiate on the functions that are required from a cloud storage provider. Clients can now make decisions that are devoid of mistakes during choices of cloud storage providers. The report also advices users and organizations to always check latest reviews about cloud storage providers based on the fact that, good or bad cloud storage providers of a particular year could change for better or worst

Keywords:Cloud Storage, advantages, computing model, risks, vulnerabilities, security holes, patched, Review, on-premises computing, Cloud Computing, identity federation, invisibility, resiliency. OVERVIEW: This review is made up of seven sections. They are Introduction, Aims and Objectives of the Paper, Literature Review, Advantages of Cloud Storage, Bad Models Offered by Some Cloud Storage Providers, Conclusion, Bibliography and Appendix
06-13  
03.3005/042306013
PDF
3.

Design and Implementation of Area and Power Efficient Embedded Transition Inversion Coding For Serial Links

C.Jacob Ebbipeni,N.Bamakumari 

Abstract

Advanced silicon technology offers possibility of integrating hundreds of millions of transistor into a single chip, which makes system on chip (SoC) design possible. With the continuous scaling of silicon technology, area and power dissipation of interconnects are one of the main bottlenecks for both on chip and off chip buses. Multiplexing parallel buses into a serial link enables an improvement in terms of reducing interconnect area, coupling capacitance and crosstalk, but it may increase the overall switching activity and energy dissipation. Therefore, and efficient coding method that reduce the switching activity is an important in serial interconnect design. Embedded Transition Inversion (ETI) is the coding method that reduces the switching activity and energy dissipation. Area is one of the important objective in integrated circuits. The main of this paper is reduce the area in ETI coding architecture. In this proposed method Alexander Phase Detector is replaced by Hogge Phase Detector. The proposed system done by using Xilinx 13.2 and ModelSim software to get efficient output. The proposed system result analysis shows better than the existing method.

Keywords:Serial Interconnection, Embedded Transition Inversion (ETI), Phase Encoder, Phase Decoder, Bit two inverter.
14-21  
03.3005/0423014021
PDF
5.

Electronic Waste Status in Jharkhand Cities

Umesh Kumar, Dr D N Singh

Abstract

The use of Electrical Electronic Equipments (EEE) in day to day life is increasing and changing with rapid and frequent changes in technology. Like any product these EEE have also their life and at end of life when they lose their credibility and usability turn to waste and are popularly known as Electronic Waste (e waste). These e wastes contain many toxic and hazardous constituents in it which are dangerous and harmful to health and environment. The e wastes are day by day increasing and are posing threats to the mankind by increasing the pollution. India being developing country with extreme poverty and has vast unskilled manpower ready for doing any work without knowing the hazards is more liable to risks of the e wastes. In India also we notice the various states representing the various levels of economic strata and affordability. The developed states are moving towards managing e wastes through regulations but the less developed states lacks on this front also....

Keywords:EEE, e waste, Environment, Technology, End-of-life, Disposal, Household, Discard, Pollution.
 
29-37  
03.3005/0423029037
PDF
6.

Introducing Parallelism in Privacy Preserving Data Mining Algorithms

Mrs.P.Cynthia Selvi, Dr.A.R.Mohamed Shanavas

Abstract

The development of parallel and distributed data mining algorithms in various functionalities have been motivated by the huge size and wide distribution of the databases and also by the computational complexity of the data mining methods. Such algorithms make partitions of the huge database that is being used into segments that are processed in parallel. The results obtained from the processed segments of database are then merged; This reduces the computational complexity and improves the speed. This article aims at introducing parallelism in data sanitization technique in order to improve the performance and throughput.

Keywords:Cover, Parallelism, Privacy Preserving Data Mining, Restrictive Patterns, Sanitization, Sensitive Transactions, Transaction-based Maxcover Algorithm
38-41  
03.3005/0423038041
PDF
7.

Comparative Aspects of Single & Multiple PV Arrays Connected
With UPQC

Payal Deshpande, Amit Shrivastava

Abstract

This paper deals with the comparative aspect if single and multiple PV Arrays connected with UPQC. Dynamic model of the UPQC is developed in the MATLAB/SIMULINK environment and the simulation results demonstrating the power quality improvement in the system are presented.

Keywords:Photovoltaic Arrays (PV Arrays), UPQC, Energy Storage Devices
 
42-49  
03.3005/0423042049
PDF
8.

Analytical Solution Of Unsteady Flow Past An Accelerated Vertical Plate With Constant Temperature and Variable Mass Transfer

I. J. Uwanta ,I. D. Yale 

Abstract

Analytical solution of unsteady flow past an accelerated vertical plate has been carried out in the presence of variable temperature and mass transfer. The dimensionless governing equations are solved using Laplace transform technique. The results are obtained for velocity, temperature, and concentration were obtained for different physical parameters like thermal Grashof number, mass Grashof number, Schmidt number and time. It is observed that the velocity increases with increase in Sc, t, Gr, and Gc.

Keywords:Mass transfer,unsteady, accelerated vertical plate, variabletemperature
50-55  
03.3005/0423050055
PDF
9.

Identification of Fault Location in Multiple Transmission Lines by Wavelet Transform

Subba Reddy.B, D.Sreenuvasulu Reddy,Dr.G.V.Marutheswar 

Abstract

Distance protection is one of the most common methods used to protect transmission lines. Many techniques have been proposed to achieve accurate results. The main target of these techniques is to calculate impedance at the fundamental frequency between the relay and the fault point. This impedance is calculated from the measured voltage and current signals at the relay location. In addition to the fundamental frequency, the signals usually contain some harmonics and dc component, which affect the accuracy of the phasor estimation. Distance relays have experienced much improvement due to the adoption of digital relaying. Signal processing is one of the most important parts of the operation of the digital distance protection. Wavelets are recently developed mathematical tool for signal processing and the basic concept in wavelet transform (WT) is to select an appropriate wavelet function "mother wavelet" and then perform analysis using shifted and dilated versions of this wavelet. The WT uses short windows at high frequencies and long windows at low frequencies. Wavelet transform (WT) has the ability to decompose signals into different frequency bands using multi resolution analysis (MRA). It can be utilized in detecting faults and to estimate voltage and current of the fault signals without any DC offset in these signals, which are essential for transmission line distance protection. This paper presents a distance protection scheme for transmission lines based on analyzing the measured voltage and current signals using WT with MRA

Keywords:Distance-protection relaying, multi-resolution analysis, power systems, wavelet transform (WT).
56-65  
03.3005/0423056065
PDF
10.

Data Storage in Secured Multi-Cloud Storage in Cloud Computing

 Archana Waghmare, Rahul Patil, Pramod Mane, Shruti Bhosale

Abstract

Now a day even though Cloud services offer flexibility, scalability, there have been proportionate concerns about security. As more data moves from centrally located server storage to the cloud storage. Security is the most important factor related to the cloud computing. As the users can stores his private data on cloud with the help of cloud service providers. Data stored on single cloud is risk of service availability failure due to attacker enters in single cloud.Our approach is to movement towards multi-clouds that is data stored on multi-cloud service providers. In this system we propose a secured cost-effective multi-cloud storage (SCMCS) model in cloud computing in which holds an economical distribution of data among the available cloud service provider (SP) in the market, instead of single cloud to provide the customers with advanced data availability as well as security. This work aims to encourage the use of multi-clouds due to its ability to reduce security risks that affect the cloud computing user. Our proposed model provides a better security for customer's data according to their available budgets from that they can choose cloud service provider

Keywords:Cloud Networks , Service provider ,Multi- Cloud Storage ,Security, Cloud Services, Cloud Computing.
66-69  
03.3005/0423066069
PDF