Volume 06 Issue 05, September 2018

Minimization of Harmonics Distortion Active Filter Controlled by PI

Sushil Kumar Singh, Priyavand Bundela

Page no:01-04

Abstract

Supply of power may also be distorted as a result of irregular operation of the approach of as a result of range of load asymmetrically. When power deliver disturbed an unwanted flicking in voltage and caused of harmonics within the line. These disorders have an effect on the effectively as well as lifetime of the purchaser’s devices, for the minimization of the outcome of whole harmonic distortion needs some powerful instruments that are ready to nullify the result of harmonics beneath various load condition. Here proposed managed lively filters for the controlling of complete harmonic distortion. Switching of this active filter may also be managed with the aid of PI controller. Comparative outcome with PI controller and without PI controller are got and outcome shows that PI controller enhance the results.

Efficient Range-based Localization Algorithm for Fault Minimization in Mobile Wireless Sensor Networks: A Review

Rupika Samuel, Dr. Vibha Tiwari

Page no:05-08

Abstract

A study in the field of mobile wireless sensor networks, The evolution of mobile wireless sensor networks, with advancements in hardware design, communication protocols, resource efficiency, and other aspects. Recently, there has been much focus on mobile sensor networks, and they have even seen the development of small-profile sensing devices that are able to control their own movement. Although it has been shown that mobility alleviates several issues relating to mobile sensor network coverage and connectivity, many challenges remain. Among these, the need for position estimation main problem and the most important feature. Not only is localization required to understand sensor node data in a spatial context, but also for navigation, a key feature of mobile sensors. In this paper, they present a survey on localization methods for mobile wireless sensor networks. Mobile wireless sensors and localization, including common architectures, measurement techniques, and localization algorithms. Proposed method is find best solution and fault minimization in mobile wireless sensor networks. Mobile wireless sensor network Algorithm using many mobile sensor applications that require position estimations.

A STUDY ON SECURITY ENHANCING MEASURES IN APPLICATION ENVIRONMENT WITH IOT TECHNOLOGY

Eun Young Choi

Page no:09-15

Abstract

The Internet of Things (IoT) has been increasing in recent years. Under the IoT technology, all things are connected based on the internet and the exchange of information is possible with the Fourth Industrial Revolution. This technology can be applied to various service fields including smart home, healthcare and the transportation system. Standardization is necessary to widen its application to industry fields and many companies such as QUALCOMM and Samsung have participated in developing an open platform such as oneM2M, AllJoyn, and IoTivity. Given that IoT is in a wireless environment, security can be threatened in the form of privacy invasion from cyber-attack and information leakage from an unauthorized access to major facilities. So, we investigate the development status of an IoT open platform and the IoT applications technology status in this paper. We also analyze security under the open platform and suggests considerations to strengthen safety service by application environments where IoT technologies can be applied.

A Location based Scheme for Improving Routing Performance in Decentralized Network: A survey

Shehroz Bee, Ratan Singh

Page no:16-21

Abstract

In (MANET) Mobile Ad hoc Network nodes are continuously change their location. Routing protocol are uses to established connection in between sender and receiver. Nodes are freely moves in a surrounding area because of those routing protocols are flooding larger number of packets for connection establishment. Now it is needless to say that control overhead enhancement are affecting the actual performance routing but their reduction are extremely important for efficient reactive routing protocols. New route discovery is needed only when the primary paths is fail. In Multipath protocol AOMDV if the link failures in the primary path, through which major data transmission takes place, cause the source to switch to an alternate path instead of initiating another route discovery process. A new route discovery process becomes necessary only when all pre-computed paths break. This reduces both route discovery latency and routing overheads. Using location awareness through location based DREAM (Distance Routing Effect Algorithm for Mobility) protocol the nodes in network are aware about the location information of nodes. In this paper we survey some recent research based on location and multipath in decentralized network. This survey is provides the intrusion about new research in field MANET.

An IDS Security Against Energy Consumption Vampire Attack In WSN

Amit Patle, Neetesh Gupta

Page no:22-26

Abstract

The sensor nodes in network play an important role of communication in restricted battery provide called node energy or power. The proposed Intrusion Detection System (IDS) is a reliable protection scheme to provide the entire security from Vampire attacks that flooded the unwanted packets and consuming bandwidth and node energy. Therefore the proposed IDS secure routing provides higher and trustful network performance. The aggressor is also affected the limited energy resource. In this paper the center of consideration is on the safety issues relating to WSN routing protocols. The IDS is first watch the attacker flooding quantity and identified the vampire attacker and also measures the energy consumption with respect to data receiving and found that the energy consumed by attacker with available bandwidth capacity. The flooding of attacker is increases according to time but the messages are not provides any useful information. The proposed IDS is secure and provides the better performance than previous trust based security scheme in ESN.

Image Surface Defect Detection Techniques Based on Image Processing

Chetan Vasant Chaudhari, Sapana A Fegade

Page no:27-29

Abstract

Image processing using surface defect detection techniques in image detection, form of signal processing for which the input is an image, such as a photograph or video frame. Examination of ceramic tile is finished in conditions like noise, high temperature, and wetness. There are many stages through that we are able to maintain quality of a tile. These stages include examination of color variation during a tile, chip offs during a tile, surface defects during a tile. This paper provides analysis of techniques that are helpful to search out surface defects like crack, blob, hole, variation in color, defect in corners, and pattern pair in tile that has pattern thereon. Glass defects are a significant reason for poor quality and of embarrassment for makers. It’s a tedious method to manually examine terribly giant size glasses. The manual examination method is slow, long and vulnerable to human error. Automatic examination systems victimization image process will overcome several of those disadvantages and provide makers a chance to considerably improve quality and reduce prices. During this paper we tend to review varied glass defects and also the potential automatic solutions victimization image process techniques for defect detection. Literature presents totally different techniques to mechanically determine the crack and its depth victimization image process techniques. During this analysis, an in depth survey is conducted to spot the analysis challenges and also the achievements until during this field. Consequently, fifty analysis papers are taken associated with crack detection, and people analysis papers are reviewed. Supported the review, analysis is provided supported the image process techniques, objectives, accuracy level, error level, and also the image information sets. Finally, we tend to gift the varied analysis problems which might be helpful for the analyzers to accomplish additional research on the crack detection.

Performance Analysis of Big Data Using K-Means Clustering Algorithm

Pankaj S Deshmukh, Harishchadra Vasantrao Parmar

Page no:30-33

Abstract

Data clustering is a classification technique. Clustering aims at making groups of objects, or clusters, in such a way that objects within the same cluster are very similar and several objects are separate several clusters though k-means clustering . It is very popular clustering, clustering algorithm primarily based on the K-means clustering and clustering algorithm improvement center in the cluster. Initial cluster centers and the local optimum each are base clustering’s. Modifications that improve clustering algorithms, the focus is on finding better solutions for a number of clusters, it gets the more clustering centers. The algorithm is applied to the various dataset for clustering analysis. Proposed algorithm achievement information in the dataset its additional analysis of the most effective centroids, in clustering information as correctness. In clustering best information and minimize cluster fault through proposed algorithm. Clustering algorithm primarily based on K-means Clustering improves information as correctness.