High Priority based Secure Transmission in Spectrum Sharing Relaying Networks with Multiple Antennas

Authors: Akkurada Roja, M S R N Naidu

Abstract: To implement spectrum sharing networks in practice, a number of challenging issues, including security, need to be addressed. On account of the open and dynamic features, spectrum sharing CR networks are vulnerable to various malicious attacks, making secure communications to be a difficult task. In the traditional networks, multiple antenna techniques, which can provide extra spatial degrees of freedom, have been exploited to enhance the security of data transmission. we investigate the secrecy performance of a multi-antenna spectrum sharing relaying network in the presence of an eavesdropper. To exploit the inherent benefits of multiple antenna techniques, MRC/ZFB scheme at the relay is used to improve the security of the considered system. Spectrum Sensing algorithm is introduced after ML equalizer. So it will identified the high priority channel quickly. By this processing we can increase the spectral efficiency is proposed. In doing so, we derive exact and simple asymptotic closed-form expressions for the secrecy outage probability of spectrum sharing relaying wiretap channels with the consideration of both the maximum transmit power constraint and the interference temperature constraint.

Keywords: Barcode, data transfer, differential phase shift keying, orthogonal frequency-division multiplexing (OFDM) modulation.

Design and Analysis of a Novel Amorphous Core transformer in Distribution Networks

Authors: K V Gopalachary

Abstract: This paper defines about alloyed (Amorphous) core of a distribution transformer. Traditionally transformer cores have been constructed of grain orientated steel alloys, but a new material which has an amorphous structure is being used increasingly in distribution transformers. The material offers advantages over traditional materials and transformers using the core material are being used in a wide range of applications. According to the measured results, the lowest core loss occurs with an annealing temperature 360℃ under a dc magnetic field density 800A/m. Besides, no load test, sudden short circuit test, and lightning impulse test are performed to ensure the transformer performance. Finally, at the same specifications and rated power, experimental results are presented for the amorphous alloy SA1 core transformer and traditional silicon steel core transformer.

Keywords: Amorphous materials; Transformer design; Core loss; Exciting power; Annealing.

DC-DC Converter fed BLDC Pumping system with MPPT based Solar PV System

Authors: K V Gopalachary

Abstract: This paper describes about design and integration of solar photovoltaic (SPV) array. The power generated from PV system is fed to brushless DC (BLDC) motor driven water pump through a DC-DC boost converter to enhance efficiency of solar system. Voltage regulator is used in inverter control system to get soft switching and to regulate the voltage given to BLDC motor to get desired speed. The speed control of BLDC motor is performed by PWM (Pulse Width Modulation) control of the voltage source inverter (VSI) using DC link voltage regulator. The test system performance is analyzed in MATLAB/Simulink software environment.

Keywords: MPPT, solar PV array, BLDC motor, Water pump, Voltage source inverter (VSI)

An Advanced Sales Forecasting System using XGBoost Algorithm

Authors: Rashmi Priyanka Saradhi V S, Naresh Nelaturi

Abstract: In this paper we have performed deals gauging for stores utilizing diverse data mining methods. The paper included anticipating the deals on some random day at any store. Keeping in mind the end goal to acclimate ourselves with the paper we have examined past work in the space including Time Series Algorithm and also a spatial methodology. A great deal of investigation was performed on the data to recognize examples and anomalies which would supporter obstruct the forecast calculation. The highlights utilized ran from store data to client data also relate land data. Data mining techniques like Linear Regression, Random Forest Regression and XGBoost were executed and the outcomes analyzed. XGBoost which is an enhanced angle boosting calculation was seen to play out the best at expectation. With effectiveness being the route forward in many enterprises today, we mean to extend our answer for help stores enhance efficiency and increment income by exploiting Data Analysis.Applied just three calculations i.e Time Series algo, irregular backwoods and XGBoost. So there is degree for applying more calculations like time arrangement straight models, KNN Regression, Unobserved Component Model, and Principle Component Regression. By taking the relapse of the considerable number of models for every one of the business data may anticipate the business better. For our situation weighted normal of Random Forest yield and XGBoost gives preferable outcome over individual calculations.

Keywords: Sales Prediction, Linear Regression, XGBoost, Time Series, Gradient Boosting.

Comparison and Analysis of DVR with Different Controlling Methods under Sag Condition in Distribution Network

Authors: Shehnaaz Chandini, G.Vanitha

Abstract: In industries due to power fluctuations and other factors the power quality gets effects in the distribution system. Hence Power Quality is the major concern in case of sensitive loads that are present in Distribution System. One of the most frequently occurring power quality problems in distribution network is voltage sag/swell. The main objective is to compensate voltage sag by using Dynamic Voltage Restorer (DVR), here DVR performance is simulated using four control methods. Those methods are Pre sag compensation method, In phase compensation method, Energy Optimization method, In phase advanced method which are used whenever voltage sag occurs. All the four methods are compared and In phase advanced method has found to be better in compensating magnitude of voltage sag and it is also consuming less power observed from simulation results. The performance of DVR is evaluated using simulation in MATLAB/SIMULINK Software.

Keywords: Power Quality, Distribution System, DVR, compensation methods, MATLAB.

A Optimized Analysis for detection of Malicious Mobile App

Authors: B V V Durga, V Sita Rama Prasad, Dr. C P V N J MohanRao

Abstract: Positioning misrepresentation in the portable Application business shows to false or dubious activities, which are motivated behind, thumping up the Applications in the popularity list. To be sure, it ends up being more endless for Application architects to adventure shady means, for instance, developing their Applications' business or posting fraud Application assessments, to ponder situating deception. While the ramification of abstaining from positioning misrepresentation has been largely maintained, there is constrained comprehension and examination here. This paper gives an all-inclusive viewpoint of situating deception and proposes a Positioning misrepresentation distinguishing proof structure for versatile Applications. In particular, it is proposed to precisely discover the mining in order to posture blackmail the dynamic periods, to be particular driving sessions, of compact Applications. Such driving sessions can be used for recognizing the area irregularity as opposed to an overall anomaly of Application rankings. In addition, three sorts of verification s are investigated, i.e., situating based affirmations, displaying to rate based confirmations and study based evidences, Applications' situating, rating and review rehearses through genuine speculations tests. In the request, this paper gets the skill of the proposed system, and shows the distinguishing proof's flexibility estimation furthermore some consistency of situating deception works out.

Keywords: Mobile Apps, ranking fraud detection, historical ranking records, evidence aggregation, review, ranking and rating

Secure Relay Data communication in untrusted cooperative Networks

Authors: M Vikas, N V Ashok kumar

Abstract: This project studies the problem of secure transmission in dual-hop cooperative networks with untrusted relays, where each relay acts as both a potential helper and an eavesdropper. A security-aware relaying scheme is proposed, which employs the alternate jamming and secrecy-enhanced relay selection to prevent the confidential message from being eavesdropped by the untrusted relays. To evaluate the performance of the proposed strategies, we derive the lower bound of the achievable ergodic secrecy rate (ESR), and conduct the asymptotic analysis to examine how the ESR scales as the number of relays increases.

Keywords: Secure routing; Manets; Graph; QoS; Attacks.

A Secure and Efficient Lifetime Routing Optimization for End-to-End Communication in WSN

Authors: MD Raziya, Dr G Satyanarayana

Abstract: Lifetime optimization and security are two conflicting design issues for multi-hop wireless sensor networks (WSNs) with non-replenish able energy resources. In this paper, we first propose a novel secure and efficient end-to-end routing protocol to address these two conflicting issues through two adjustable parameters: energy balance control (EBC) and probabilistic based random walking. We then discover that the energy consumption is severely disproportional to the uniform energy deployment for the given network topology, which greatly reduces the lifetime of the sensor networks. To solve this problem, we propose an efficient non-uniform energy deployment strategy to optimize the lifetime and message delivery ratio under the same energy resource and security requirement. We also provide a quantitative security analysis on the proposed routing protocol. Our theoretical analysis demonstrate that the proposed end to end routing protocol can provide an excellent tradeoff between routing efficiency and energy balance, and can significantly extend the lifetime of the sensor networks in all scenarios. For the non-uniform energy deployment, we also demonstrate that the proposed end-to-end routing protocol can achieve a high message delivery ratio while preventing routing attacks. We adopt a novel approach of group key communication scheme in our design, such that there is a unique group key, called as path key, to protect data transmitted in the entire routing path. Rather than using multiple shared keys to repeat to perform encryption and decryption over every link, we implement end-to-end path keys to reduce the overheads of key generation. Therefore, we can see that by implementing these concepts we can improve efficiency of network and provide more security of transferred message.

Keywords: Security, Wireless Sensor Networks, Frequency hopping, Dijkstra's Algorithm, Encryption and Decryption

PV system integration with grid using fuzzy based H-Bridge multilevel inverter

Authors: Hasen Ali, Dr.T Srinivasa Rao, R Ganesh

Abstract: This paper characterizes another fuzzy based controller based measured fell H-bridge multilevel photovoltaic (PV) inverter for single-or three-phase grid-associated applications. The particular fell multilevel topology enhances the proficiency and adaptability of PV systems. To acknowledge better use of PV modules and maximize the sun based vitality extraction, a disseminated most extreme power point tracking control plan is connected to both single-and three-phase multilevel inverters, which permits free control of each dc-connection voltage. For three-stage network associated applications, PV mismatches may present uneven provided control, leading to lopsided framework current. To unravel this issue, a control scheme with tweak remuneration is likewise proposed. An experimental three-stage seven-level fell H-connect inverter has been built utilizing nine H-connect modules (three modules for every stage). Each H-connect module is associated with a 185-W sun oriented board. Simulation and test results are exhibited to check the possibility of the proposed approach.

Keywords: Fuzzy, Cascaded multilevel inverter, distributed maximum power point (MPP) tracking (MPPT), modular, modulation compensation, photovoltaic (PV).

Cooperative OFDM Communication with DQPSK

Authors: Javvadi Satya Naga Manikanta, Balakrishna Batta

Abstract: The idea of 2-D standardized tags is of extraordinary significance for use in remote information transmission between handheld electronic gadgets. In a regular setup, any document on a PDA, for instance, can be exchanged to a moment mobile phone through a progression of pictures on the LCD which are then caught and decoded through the camera of the second wireless. In this examination, another approach for information adjustment in 2-D standardized tags is presented, and its execution is assessed in contrast with other standard strategies for scanner tag regulation. In this new approach, orthogonal recurrence division multiplexing (OFDM) tweak is utilized together with differential stage move keying (DPSK) over contiguous recurrence space components. A particular point of this investigation is to build up a framework that is demonstrated tolerant to camera developments, picture obscure, and light spillage inside neighbouring pixels of a LCD. In this paper Differential Phase Shift Keying was joined on account of Orthogonal Frequency Division Multiplexing keeping the ultimate objective to control data stream into visual two dimensional institutionalized labels. It was exhibited that QPSK-OFDM direction has certifiable insufficiencies in the balance of camera LCD improvements where the time of each part changes tenaciously. On the other hand, development of a differential stage modulator before OFDM to manage the data stream into organize differences of close-by parts (DPSK-OFDM) causes the development effect to logically incapacitate in light of its unfaltering change from segment to segment, adding to a little deviation from the ideal stage in the got hail. It was watched that under relative LCD-camera developments that create screw up rates in plenitude of 30% in PAM and QPSK-OFDM, the proposed course of action of DPSK-OFDM will keep up an error rate under 8% which is basically correctable using goof revision coding.

Keywords: Barcode, data transfer, differential phase shift keying, orthogonal frequency-division multiplexing (OFDM) modulation
If You feel any difficulty in paper submission, Please mail us ijeecm@gmail.com

Copyright © 2015 International Journal of Electrical, Electronics,Computers & Mechanical Engineering. All Rights Reserved.