Volume 06 Issue 05, September 2018

Minimization of Harmonics Distortion Active Filter Controlled by PI

Sushil Kumar Singh, Priyavand Bundela

Page no:01-04

Abstract

Supply of power may also be distorted as a result of irregular operation of the approach of as a result of range of load asymmetrically. When power deliver disturbed an unwanted flicking in voltage and caused of harmonics within the line. These disorders have an effect on the effectively as well as lifetime of the purchaser’s devices, for the minimization of the outcome of whole harmonic distortion needs some powerful instruments that are ready to nullify the result of harmonics beneath various load condition. Here proposed managed lively filters for the controlling of complete harmonic distortion. Switching of this active filter may also be managed with the aid of PI controller. Comparative outcome with PI controller and without PI controller are got and outcome shows that PI controller enhance the results.

Efficient Range-based Localization Algorithm for Fault Minimization in Mobile Wireless Sensor Networks: A Review

Rupika Samuel, Dr. Vibha Tiwari

Page no:05-08

Abstract

A study in the field of mobile wireless sensor networks, The evolution of mobile wireless sensor networks, with advancements in hardware design, communication protocols, resource efficiency, and other aspects. Recently, there has been much focus on mobile sensor networks, and they have even seen the development of small-profile sensing devices that are able to control their own movement. Although it has been shown that mobility alleviates several issues relating to mobile sensor network coverage and connectivity, many challenges remain. Among these, the need for position estimation main problem and the most important feature. Not only is localization required to understand sensor node data in a spatial context, but also for navigation, a key feature of mobile sensors. In this paper, they present a survey on localization methods for mobile wireless sensor networks. Mobile wireless sensors and localization, including common architectures, measurement techniques, and localization algorithms. Proposed method is find best solution and fault minimization in mobile wireless sensor networks. Mobile wireless sensor network Algorithm using many mobile sensor applications that require position estimations.

A STUDY ON SECURITY ENHANCING MEASURES IN APPLICATION ENVIRONMENT WITH IOT TECHNOLOGY

Eun Young Choi

Page no:09-15

Abstract

The Internet of Things (IoT) has been increasing in recent years. Under the IoT technology, all things are connected based on the internet and the exchange of information is possible with the Fourth Industrial Revolution. This technology can be applied to various service fields including smart home, healthcare and the transportation system. Standardization is necessary to widen its application to industry fields and many companies such as QUALCOMM and Samsung have participated in developing an open platform such as oneM2M, AllJoyn, and IoTivity. Given that IoT is in a wireless environment, security can be threatened in the form of privacy invasion from cyber-attack and information leakage from an unauthorized access to major facilities. So, we investigate the development status of an IoT open platform and the IoT applications technology status in this paper. We also analyze security under the open platform and suggests considerations to strengthen safety service by application environments where IoT technologies can be applied.

A Location based Scheme for Improving Routing Performance in Decentralized Network: A survey

Shehroz Bee, Ratan Singh

Page no:16-21

Abstract

In (MANET) Mobile Ad hoc Network nodes are continuously change their location. Routing protocol are uses to established connection in between sender and receiver. Nodes are freely moves in a surrounding area because of those routing protocols are flooding larger number of packets for connection establishment. Now it is needless to say that control overhead enhancement are affecting the actual performance routing but their reduction are extremely important for efficient reactive routing protocols. New route discovery is needed only when the primary paths is fail. In Multipath protocol AOMDV if the link failures in the primary path, through which major data transmission takes place, cause the source to switch to an alternate path instead of initiating another route discovery process. A new route discovery process becomes necessary only when all pre-computed paths break. This reduces both route discovery latency and routing overheads. Using location awareness through location based DREAM (Distance Routing Effect Algorithm for Mobility) protocol the nodes in network are aware about the location information of nodes. In this paper we survey some recent research based on location and multipath in decentralized network. This survey is provides the intrusion about new research in field MANET.

An IDS Security Against Energy Consumption Vampire Attack In WSN

Amit Patle, Neetesh Gupta

Page no:22-26

Abstract

The sensor nodes in network play an important role of communication in restricted battery provide called node energy or power. The proposed Intrusion Detection System (IDS) is a reliable protection scheme to provide the entire security from Vampire attacks that flooded the unwanted packets and consuming bandwidth and node energy. Therefore the proposed IDS secure routing provides higher and trustful network performance. The aggressor is also affected the limited energy resource. In this paper the center of consideration is on the safety issues relating to WSN routing protocols. The IDS is first watch the attacker flooding quantity and identified the vampire attacker and also measures the energy consumption with respect to data receiving and found that the energy consumed by attacker with available bandwidth capacity. The flooding of attacker is increases according to time but the messages are not provides any useful information. The proposed IDS is secure and provides the better performance than previous trust based security scheme in ESN.