0000000000213432

AUTHOR

Vikash Kumar Singh

showing 9 related works from this author

Minimizing uncertainties with improved power system stability using wide area fuzzy-2 logic based damping controller

2017

In this paper, a centralized Wide Area Damping Controller (WADC) is synthesized based on Interval Type-2 Fuzzy Logic controller. The disturbance is symbolized as distributed in the network with application of momentarily disturbance to the generator in area 1 for few cycles. The response of tie-line active power flow from area-1 to area-2, rotor speed change, rotor mechanical angle deviation, positive sequence voltage are examined by considering the test system with conventional PSS (CPSS), fuzzy type-1 based controller and fuzzy type-2 based controller. The proposed controller performance is analyzed and compared with fuzzy type-1 based controller and CPSS. The simulation results are used …

Computer scienceRotor (electric)020209 energyOpen-loop controller02 engineering and technologyInterval (mathematics)Fuzzy logiclaw.inventionGenerator (circuit theory)Electric power systemControl theorylaw0202 electrical engineering electronic engineering information engineeringVoltage2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)
researchProduct

Human energy interacting interface: Interface to transform environmental energy into human acquired energy

2016

The human body acquires energy in many form to manage their activities. This energy enters into human body in the form of food, beverages or any other external source. Few of the vital nutrients are injected into human body via supplementary medicines, etc. Some of the required energy of human body is absorbed naturally from the environment (e.g. vitamin D through sunlight). Human body absorbs limited energy / nutrients from the environment due to lack of proper transformation of energy aspects of human body. Due to this there is requirement of an interface which can help in transforming the environmental energy for fulfilling some aspects of the human body energy requirements. To understan…

Engineeringbusiness.industryInterface (Java)02 engineering and technologyHuman bodyExternal sourceEnergy requirement030207 dermatology & venereal diseases03 medical and health sciences0302 clinical medicine0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingBiochemical engineeringSome EnergyEnvironmental energybusinessSimulationEnergy (signal processing)2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)
researchProduct

Analysis and Optimization Technique of Secure Smart Grid Communication Network for Sustainable Development

2019

The smart network includes many sub-frameworks, for example, the Home Area Network (HAN), which are at risk and prone to be attacked remotely. A smart grid communication is meant to design a mutual authentication scheme and a key management protocol. This study is aimed with an efficient arrangement for HAN that analyzes a framework set-up for HAN. In this paper, we have analyzed three cases: First, we show the normal execution then execution along with attackers. Using mutual authentication, we overcome attacks. It has introduced a number of routing schemes for grid networks in recent years, and they provide different level of privacy protection at different cost. First, an unspecified key…

AuthenticationSmart gridComputer sciencebusiness.industryMutual authenticationSession (computer science)Routing (electronic design automation)GridKey managementbusinessProtocol (object-oriented programming)Computer network
researchProduct

Leveraging Education Sector Using Cognitive Big Data for the Recruitment Process and Sustainable Development

2019

Nowadays, we are not confined to traditional education. We are on the verge to make our education system more job oriented by providing various vocational trainings to our students. The various universities and higher education are facing the problem of inadequate placement. Even the job providers have to quell ample amount of time to judge the potential candidates. The right placement is a challenge for both the recruiters and the candidates. The cognitive science and big data can untangle the conundrum. The main goal of this paper proposal can be stated as: To display the appropriate job offer from the job provider, select the perfect profile for the job at the right place at the right ti…

Sustainable developmentComputingMilieux_THECOMPUTINGPROFESSIONHigher educationProcess (engineering)business.industryVocational educationBig dataCognitionBusinessMarketingTraditional education
researchProduct

Patch-Based Image Denoising Model for Mixed Gaussian Impulse Noise Using L1 Norm

2017

Image denoising is the classes of technique used to free the image form the noise. The noise in the image may be added during the observation process due to the improper setting of the camera lance, low-resolution camera, cheap, and low-quality sensors, etc. Noise in the image may also be added during the image restoration, image transmission through the transmission media. To obtain required information from image, image must be noise free, i.e., high-frequency details must be present in the image. There are number of applications where image denoising is needed such as remote location detection, computer vision, computer graphics, video surveillance, etc. In last two decades, numbers of m…

Mathematical optimizationbusiness.industryComputer scienceGaussianComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONTransmission mediumImpulse (physics)Non-local meansImpulse noiseComputer graphicssymbols.namesakeGaussian noiseComputer Science::Computer Vision and Pattern RecognitionsymbolsComputer visionArtificial intelligencebusinessImage restoration
researchProduct

Voltage Security Assessment by Using PFDT and CBR Methods in Emerging Power System

2018

Abstract This paper exhibits varied methods for voltage security assessment in a restructured power system. This paper primarily lays emphasis on two methods that are Probabilistic Fuzzy Decision Tree (PFDT) and Case Based Reasoning (CBR). In PFDT, Decision Tree plays an integral role for classification of system. For further classification of power system security, an algorithm is developed to categorise the buses which trouble the security most. After classification of system, by using minimum amount of load curtailment of voltages on buses which made insecure to secure load. Optimization of load is done by curtailing reactive power from insecure buses. In CBR, old cases from database are…

Structure (mathematical logic)Computer science020209 energyEmphasis (telecommunications)Decision treeProbabilistic logicProcess (computing)02 engineering and technologyAC powerReliability engineeringElectric power system0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingCase-based reasoningEnergy Procedia
researchProduct

Review of information and communication technologies for smart micro-grid automation

2017

The growing challenges of Smart Micro-Grid can only be met if secure and fast information and communication technology (ICT) solutions are developed. In this paper, some of the ICT techniques are reviewed for smart micro-grid automation. Firstly, an overview of the role of ICT in grid distribution is explained with respect to electricity value chain in power distribution. Further, each domain in the value chain is analyzed with respect to ICT applications in power generation, transmission, distribution and consumption. ICT stands as a prominent driving force to enhance trustworthiness, security, and productivity of the power distribution through information exchange, regulated generation, d…

Demand managementFlexibility (engineering)Smart gridInformation and Communications TechnologyComputer sciencebusiness.industryValue chainbusinessEnergy sourceTelecommunicationsAutomationInformation exchange2017 7th International Conference on Power Systems (ICPS)
researchProduct

Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme

2017

Imposing security in MANET is very challenging and hot topic of research science last two decades because of its wide applicability in applications like defense. Number of efforts has been made in this direction. But available security algorithms, methods, models and framework may not completely solve this problem. Motivated from various existing security methods and outlier detection, in this paper novel simple but efficient outlier detection scheme based security algorithm is proposed to protect the Ad hoc on demand distance vector (AODV) reactive routing protocol from Black hole attack in mobile ad hoc environment. Simulation results obtained from network simulator tool evident the simpl…

Routing protocolDistance-vector routing protocolRobustness (computer science)business.industryPacket drop attackAd hoc On-Demand Distance Vector RoutingComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSAnomaly detectionMobile ad hoc networkbusinessComputer networkNetwork simulation2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)
researchProduct

Human computer interactive future framework: automation of human interaction and interfaces

2020

Contemporary era technological improvements and social living urges the advancement of technological implementations and to create an environment for automation of interaction platform. The sole aim being the reduction of labour work or human effort and optimising the throughput gained. The future generation is expecting such developments in current systems, but none can elucidate the particular area of improvements to be done for future models. In order to cater such requirements, a HCI future framework for automating the interaction and interfaces is proposed. The framework is divided into ten co-frames of interfaces with further classifications for facilitating the understanding of indiv…

Interface (Java)business.industryComputer scienceAutomationComputer Science ApplicationsEngineering managementWork (electrical)Order (exchange)Human interactionComputer Vision and Pattern RecognitionbusinessThroughput (business)ImplementationTheme (computing)International Journal of Computational Vision and Robotics
researchProduct