0000000000213432
AUTHOR
Vikash Kumar Singh
Minimizing uncertainties with improved power system stability using wide area fuzzy-2 logic based damping controller
In this paper, a centralized Wide Area Damping Controller (WADC) is synthesized based on Interval Type-2 Fuzzy Logic controller. The disturbance is symbolized as distributed in the network with application of momentarily disturbance to the generator in area 1 for few cycles. The response of tie-line active power flow from area-1 to area-2, rotor speed change, rotor mechanical angle deviation, positive sequence voltage are examined by considering the test system with conventional PSS (CPSS), fuzzy type-1 based controller and fuzzy type-2 based controller. The proposed controller performance is analyzed and compared with fuzzy type-1 based controller and CPSS. The simulation results are used …
Human energy interacting interface: Interface to transform environmental energy into human acquired energy
The human body acquires energy in many form to manage their activities. This energy enters into human body in the form of food, beverages or any other external source. Few of the vital nutrients are injected into human body via supplementary medicines, etc. Some of the required energy of human body is absorbed naturally from the environment (e.g. vitamin D through sunlight). Human body absorbs limited energy / nutrients from the environment due to lack of proper transformation of energy aspects of human body. Due to this there is requirement of an interface which can help in transforming the environmental energy for fulfilling some aspects of the human body energy requirements. To understan…
Analysis and Optimization Technique of Secure Smart Grid Communication Network for Sustainable Development
The smart network includes many sub-frameworks, for example, the Home Area Network (HAN), which are at risk and prone to be attacked remotely. A smart grid communication is meant to design a mutual authentication scheme and a key management protocol. This study is aimed with an efficient arrangement for HAN that analyzes a framework set-up for HAN. In this paper, we have analyzed three cases: First, we show the normal execution then execution along with attackers. Using mutual authentication, we overcome attacks. It has introduced a number of routing schemes for grid networks in recent years, and they provide different level of privacy protection at different cost. First, an unspecified key…
Leveraging Education Sector Using Cognitive Big Data for the Recruitment Process and Sustainable Development
Nowadays, we are not confined to traditional education. We are on the verge to make our education system more job oriented by providing various vocational trainings to our students. The various universities and higher education are facing the problem of inadequate placement. Even the job providers have to quell ample amount of time to judge the potential candidates. The right placement is a challenge for both the recruiters and the candidates. The cognitive science and big data can untangle the conundrum. The main goal of this paper proposal can be stated as: To display the appropriate job offer from the job provider, select the perfect profile for the job at the right place at the right ti…
Patch-Based Image Denoising Model for Mixed Gaussian Impulse Noise Using L1 Norm
Image denoising is the classes of technique used to free the image form the noise. The noise in the image may be added during the observation process due to the improper setting of the camera lance, low-resolution camera, cheap, and low-quality sensors, etc. Noise in the image may also be added during the image restoration, image transmission through the transmission media. To obtain required information from image, image must be noise free, i.e., high-frequency details must be present in the image. There are number of applications where image denoising is needed such as remote location detection, computer vision, computer graphics, video surveillance, etc. In last two decades, numbers of m…
Voltage Security Assessment by Using PFDT and CBR Methods in Emerging Power System
Abstract This paper exhibits varied methods for voltage security assessment in a restructured power system. This paper primarily lays emphasis on two methods that are Probabilistic Fuzzy Decision Tree (PFDT) and Case Based Reasoning (CBR). In PFDT, Decision Tree plays an integral role for classification of system. For further classification of power system security, an algorithm is developed to categorise the buses which trouble the security most. After classification of system, by using minimum amount of load curtailment of voltages on buses which made insecure to secure load. Optimization of load is done by curtailing reactive power from insecure buses. In CBR, old cases from database are…
Review of information and communication technologies for smart micro-grid automation
The growing challenges of Smart Micro-Grid can only be met if secure and fast information and communication technology (ICT) solutions are developed. In this paper, some of the ICT techniques are reviewed for smart micro-grid automation. Firstly, an overview of the role of ICT in grid distribution is explained with respect to electricity value chain in power distribution. Further, each domain in the value chain is analyzed with respect to ICT applications in power generation, transmission, distribution and consumption. ICT stands as a prominent driving force to enhance trustworthiness, security, and productivity of the power distribution through information exchange, regulated generation, d…
Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme
Imposing security in MANET is very challenging and hot topic of research science last two decades because of its wide applicability in applications like defense. Number of efforts has been made in this direction. But available security algorithms, methods, models and framework may not completely solve this problem. Motivated from various existing security methods and outlier detection, in this paper novel simple but efficient outlier detection scheme based security algorithm is proposed to protect the Ad hoc on demand distance vector (AODV) reactive routing protocol from Black hole attack in mobile ad hoc environment. Simulation results obtained from network simulator tool evident the simpl…
Human computer interactive future framework: automation of human interaction and interfaces
Contemporary era technological improvements and social living urges the advancement of technological implementations and to create an environment for automation of interaction platform. The sole aim being the reduction of labour work or human effort and optimising the throughput gained. The future generation is expecting such developments in current systems, but none can elucidate the particular area of improvements to be done for future models. In order to cater such requirements, a HCI future framework for automating the interaction and interfaces is proposed. The framework is divided into ten co-frames of interfaces with further classifications for facilitating the understanding of indiv…