The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper explores the use of On-chip cryptographic units for implementing security in low cost wireless sensor networks. The objective of this research is to reduce the deployment time and computational complexity of security protocols in WSNs, whilst keeping security related performance parameters at par with the current state-of-the-art. A method is proposed to continue using simple radio transreceiver...
Advanced protection and operation of power systems, especially microgrids, requires rapid detection and estimation of system states. Microgrids, however, are a challenge due to the high variability of distributed generation and modern load profiles. Setting of relays and establishing Remedial Action Schemes on these systems requires rapid detection and state estimation and modeling of complex loads...
Securing digital data is a current need of the hour. Increasing computational power makes brute force attacks on cryptographic systems a feasible attack, requiring higher key length to protect data. On the other hand, concealing data using steganographic techniques always leaves a trace. Hence embedding of data directly in steganography is not secure as the system is only secure until the concealment...
The use of chaos for image encryption over traditional text based encryption methods has gained momentum due to its superior performance. In this paper, a fast encryption method is presented which utilizes a substitution-permutation network using two chaotic maps. Logistic maps are used to create substitution box while key dependent rectangular chaotic maps is used for permutation of pixels. The algorithm...
This paper proposes an architecture that uses the ultra-low power Bluetooth Low Energy (BLE) wireless standard and a hybrid topology to reduce power consumption in IOT based wireless sensor networks (IOTWSN). A lot of work has been done in the field of Wireless Sensor Networks (WSN) in recent years. Efforts to make efficient, low cost, scalable and easily deployable WSN have been on going. In order...
This research investigates the usage of data clustering and similarity matching techniques as a means for real-time electricity grid state estimation. Real-time grid estimation using real-time Phasor Measurement Unit (PMU) data can enable next-generation grid monitoring, control, and protection schemes. However, PMUs are typically installed at only a few of the hundreds of buses of any substantial...
In this model, we attack the common problem of varying comprehending and perception capacities which differ with every individual. For understanding any concept, different individuals might require different levels of difficulty. Thus, we propose a model that performs clustering of text based on difficulty. Initially, with different feature extraction techniques, the scores of various textual characteristics...
With the ever-increasing demand for energy resources it has become essential for the development and integration of renewable energy resources to the existing grid. Among the various forms of renewable energy resources that have been utilized to meet load requirements, wind power and hydropower have been the most developed thus far. Wind power is non-dispatchable, making its integration with the grid...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.