2,021 research outputs found

    Erratum to: An optimizing pipeline stall reduction algorithm for power and performance on multi-core CPUs

    Get PDF

    New approximate fixed point results for rational contraction mappings

    Get PDF
    In this paper, we investigate approximate fixed point results for ratio[1]nal contraction mappings in a metric space. This manuscript’s inten[1]tion is to demonstrate approximate fixed point results and the diam[1]eter of the approximate fixed point results on metric spaces. Particu[1]larly, we use some rational contraction mappings, which were mainly discussed in Dass and Gupta [1975] and Jaggi [1977]. A few ex[1]amples are included to illustrate our results. Also, we discuss some applications of approximate fixed point results in the field of mathe[1]matics rigorously

    Semantically Secured Non-Deterministic Blum–Goldwasser Time-Based One-Time Password Cryptography for Cloud Data Storage Security

    Get PDF
    The security level of outsourced data is significant in cloud storage. Few research works have been designed for secured cloud data storage. However, the data security level was lower because the authentication performance was not effective. In order to overcome such drawbacks, a Semantically Secured Non-Deterministic Blum–Goldwasser Time-Based One-Time Password Cryptography (SSNBTOPC) Technique is proposed. The SSNBTOPC Technique comprises three steps, namely key generation, data encryption and data decryption for improving cloud data storage security with lower cost. Initially, in SSNBTOPC Technique, the client registers his/her detail to the cloud server. After registering, the cloud server generates the public key and secret key for each client. Then, clients in cloud encrypt their data with the public key and send the encrypted data to the cloud server for storing it in the database. Whenever the client needs to store or access the data on cloud storage, the client sends the request message to the cloud server. After getting the requests, cloud server authenticates the clients using their secret key and Time-based One-Time Password (TOTP). After the verification process, SSNBTOPC Technique allows only authorized clients to get data on cloud storage. During data accessing process, the client data is decrypted with their private key. This helps for SSNBTOPC Technique to improve the cloud storage security with a minimal amount of time. The SSNBTOPC Technique carried outs the experimental evaluation using factors such as authentication accuracy, computational cost and data security level with respect to a number of client and data. The experimental result shows that the SSNBTOPC Technique is able to increases the data security level and also reduces the computational cost of cloud storage when compared to state-of-the-art works

    Certain Investigation of Real power flow control of Artificial Neural Network based Matrix converter-Unified Power Flow Controller in IEEE 14 Bus system

    Get PDF
    The power consumption is rapid increased due to ASD (Adjustable Speed Drives) and automation in industries and large consumption of electricity in domestic regions increased the concern of the power quality. The quality of the power received in the Distribution system is altered because of the losses in the transmission system. The losses in the transmission system is mitigated using the FACTS (Flexible AC Transmission System)controller among these controllers UPFC (Unified Power Flow Controller) plays a vital role in controlling the shunt and series reactive powers in the bus of the power system. The conventional topology of the UPFC consists of AC-DC converter and energy stored in the DC link and DC-AC converter injected a voltage in series to the bus which as to be controlled. Whereas a new topology based on matrix converter can replace the dual converters and perform the required task. The construction of 2-bus, 7-bus and IEEE-14-bus power system is designed and modeled. MC-UPFC (Matrix Converter Based Unified Power Flow Controller) is designed and constructed. The MC-UPFC is the rich topology in the FACTS which is capable of controlling both the transmission parameters simultaneously with the switching technique of Direct power control by the smooth sliding control which gives less ripple in the injecting control parameters such as control voltage [Vc] and voltage angle [α]. By implementing MC-UPFC the real and reactive power can be controlled simultaneously and independently. The control techniques were designed based on the Proportional Integral derivative(PID) with sliding surface power control, FLC (Fuzzy Logic Controller) and ANN (Artificial Neural Network)  and  the performance of  Vc and α of the controllers are investigated. Hence the sliding surface and relevant control switching state of the MC can be controlled by the FLC which gives the robust and autonomous decision making in the selection of the appropriate switching state for the effective real power control in the power system. The work has been carried out in the MATLAB Simulink simulator which gives the finest controlling features and simple design procedures and monitoring of the output

    Water Pollution and Human Health - Transdisciplinary Research on Risk Governance in a Complex Society

    Get PDF

    Statistics and Probability of Detection in Wind Turbine Radar Clutter

    Get PDF
    A wind develops inside the perceptible pathway of a radar not simply makes undesirable radar returns as false targets furthermore truly impacts the radar's ability to distinguish centres of excitement for the area of the farm. In this work, accurate RCS models of wind turbines are delivered in perspective of honest to goodness wind turbine mess estimations, and acknowledgement probabilities of Swerling-1 centres and moreover undesirable wind turbines are registered. Results appear differently about those gained by expecting that wind turbine chaos is Rayleigh (or exponentially) circled

    Vehicle-2-Vehicle Communication Based on Wireless Sensor Network

    Get PDF
    Truck Platooning is a car innovation that permits gathering various trucks into a single element where one truck intently takes after the other that outcomes in an expanded street limit. This kind of detachment allows to a significant degree tight separations and synchronous driving between the vehicles.  Our point is to plan and exhibit a self-ruling truck platooning framework given vehicle-to-vehicle (V2V) correspondence innovation. The structure utilises IEEE 802.15.4 remote convention joined with separation going sensors to enable vehicles inside the company to safely trade data progressively and naturally break and quicken in light of the lead truck. The rapid of remote correspondence permits to a significant degree tight separations and synchronous driving between the platooning vehicles

    Web Service Deployment for Selecting a Right Steganography Scheme for Optimizing Both the Capacity and the Detectable Distortion

    Get PDF
    The principal objective of this effort is to organize a network facility to hide the secret information in an image folder without disturbing its originality. In the literature lot of algorithms are there to hide the information in an image file but most of it consumes high resource for completing the task which is not suitable for light weight mobile devices. Few basic algorithms like 1LSB, 2LSB and 3LSB methods in the literature are suitable for mobile devices since the computational complexity is very low. But, these methods either lack in maintaining the originality of the source image or in increasing the number of bits to be fixed. Furthermore, every algorithm in the literature has its own merits and demerits and we cannot predict which algorithm is best or worst since, based on the parameters such as size of the safety duplicate and encryption algorithm used to generate the cipher text the steganography schemes may produce best or worst result with respect to computational complexity, capacity, and detectable distortion. In our proposed work, we have developed a web service that takes cover image and plain text as the input from the clients and returns the steganoimage to the clients. The steganoimage will be generated by our proposed work by analyzing the above said parameters and by applying the right steganography scheme. The proposed work helps in reducing the detectable distortion, computational complexity of the client device, and in increasing the capacity. The experimental result says that, the proposed system performs better than the legacy schemes with respect to capacity, computational complexity, and detectable distortion. This proposed work is more useful to the client devices with very low computational resource since all the computational tasks are deployed in the server side

    Z Source Inverter Topologies-A Survey

    Get PDF
    Need for alternative energy sources to satisfy the rising demand in energy consumption elicited the research in the area of power converters/inverters. An increasing interest of using Z source inverter/converter in power generation involving renewable energy sources like wind and solar energy for both off grid and grid tied schemes were originated from 2003. This paper surveys the literature of Z source inverters/converter topologies that were developed over the years

    Clustering Process for Mixed Dataset Using Shortest Path Non Parameterised Technique

    Get PDF
    Clustering in mixed dataset is a dynamic research focus in data mining concepts. The predictable clustering algorithm related to be more supportive to only one kind of attribute not for the mixed data type. Hence, the traditional clustering techniques processed with mixed attributes either by converting the numerical data type to categorical type or categorical type to numerical data type. But, utmost of the clustering processes are improved by converting numerical attributes. This progression of grouping ends up with two boundaries, the earlier limitation is that conveying numerical values to all types of categorical data is simply difficult. On the other hand the later drawback lies in the parameterized clustering which needs number of clusters as response for grouping the datasets. To succeed over the limitations the clustering technique is organised by incorporating shortest path and non-parameterized clustering. The proposed work of Shortest path non parameterised Clustering technique, the input parameter (number of clusters) is discovered spontaneously and the data objects of the cluster are grouped that are at the shortest distance
    • …
    corecore