RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Analytical Approach for Optimal Allocation of Distributed Generators to Minimize Losses

        Navdeep Kaur,Sanjay Kumar Jain 대한전기학회 2016 Journal of Electrical Engineering & Technology Vol.11 No.6

        In this paper the integration of Distributed Generation (DG) in radial distribution system is investigated by computing the optimal site and size of DG to be placed. An analytical expression based on equivalent current injection has been derived by utilizing topological structure of radial distribution system to find optimal size of DG to minimize losses. In the presented formulation, the optimal DG placement is obtained without repeatedly computing the load flow. The proposed formulation can be used to find the optimal size of all types of DGs namely Type-I, Type-II, Type-III and Type-IV DGs. The investigations are carried out on IEEE 33-bus and 69-bus radial distribution systems. The optimal DG placement results into reduction in active and reactive power losses and improvement in voltage profile of the buses.

      • Layer and RFID Based Security Issues of Internet of Things

        Navdeep Singh,Abhinav Hans,Sukhdeep Kaur 보안공학연구지원센터 2016 International Journal of Grid and Distributed Comp Vol.9 No.10

        In spite of the fact that it has been with us in some structure and under various names for a long time, the Internet of Things (IoT) is all of a sudden a thing. The capacity to associate, speak with, what's more, remotely deal with an endless number of arranged, mechanized gadgets through the Web is getting to be pervasive, from the manufacturing plant floor to the doctor's facility working space to the private storm cellar. The move from shut systems to big business IT systems to people in general Internet is quickening at a disturbing pace—and legitimately raising alerts about security. As we get to be progressively dependent on clever, interconnected gadgets in each part of our lives, how do we shield possibly billions of them from interruptions and obstruction that could trade off individual protection or undermine open security? There are numerous issues in security of Internet of Things (IOT) shouting out for arrangements, for example, RFID label security, remote security, system transmission security, protection assurance, data handling security. So in this paper we are covering the various security concerns that are cursing the IoT in different ways.

      • Comprehensive Study of Various Techniques for Detecting DDoS Attacks in Cloud Environment

        Navdeep Singh,Abhinav Hans,Kapil Kumar,Mohit Pal Singh Birdi 보안공학연구지원센터 2015 International Journal of Grid and Distributed Comp Vol.8 No.3

        Cloud computing is the most dynamic field of IT industry. It is becoming very famous due to its less resource consuming and higher output. Though Cloud computing is very vast and useful technology but it is not remained untouched from attackers or hackers. The most common attack notified on the cloud environment is DDoS attack. DDoS attacks i.e. Distributed Denial of service attacks happens on a cloud environment in such a way that, two or more than two attackers sends the multiple SOAP requests at the same cloud server and consume all the legitimate resources. From the study it has been concluded that, none a system is developed so far to prevent the DDoS attacks completely because even the detection of DDoS attacks is a major issue and prevention is a very big thing to achieve after detection and mitigation. This paper is focused on underlying the introduction about DDoS attacks and the next part of the paper is followed by the comparative analysis of the different techniques and algorithms used in detecting the DDoS attacks in cloud environment.

      • KCI등재

        A New Random SPWM Technique for AC-AC Converter-Based WECS

        Navdeep Singh,Vineeta Agarwal 전력전자학회 2015 JOURNAL OF POWER ELECTRONICS Vol.15 No.4

        A single-stage AC-AC converter has been designed for a wind energy conversion system (WECS) that eliminates multistage operation and DC-link filter elements, thus resolving size, weight, and reliability issues. A simple switching strategy is used to control the switches that changes the variable-frequency AC output of an electrical generator to a constant-frequency supply to feed into a distributed electrical load/grid. In addition, a modified random sinusoidal pulse width modulation (RSPWM) technique has been developed for the designed converter to make the overall system more efficient by increasing generating power capacity and reducing the effects of inter-harmonics and sub-harmonics generated in the WECS. The technique uses carrier and reference waves of variable switching frequency to calculate the firing angles of the switches of the converter so that the three-phase output voltage of the converter is very close to a sine wave with reduced THD. A comparison of the performance of the proposed RSPWM technique with the conventional SPWM demonstrated that the power generated by a turbine in the proposed approximately increased by 5% to 10% and THD reduces by 40% both in voltage and current with respect to conventional SPWM.

      • A Hybrid Approach for Encrypting Data on Cloud to prevent DoS Attacks

        Navdeep Singh,Pankaj Deep Kaur 보안공학연구지원센터 2015 International Journal of Database Theory and Appli Vol.8 No.3

        Any technology cannot be said perfect until it is free from any vulnerability. So whenever a new technology is introduced the security is the first feature that is countable. There are many famous technologies that are used for online data storage, accessing the data from any location and provide the online use of any software. Cloud computing is the same technology that provides the online data storage and the most important feature that it provides software on lease facility. If large data storage feature took into consideration then it must be said that if a user wants to store the data on cloud then the security of that data must be the first requirement of the user. In this paper an integrated approach is introduced to encrypt and decrypt the data before sending on cloud by using the two different techniques. And the performance analysis is done on the basis of different parameters to achieve the better performance and security.

      • KCI등재

        ExerAdventure: A Mobile 2D Platformer Game to Encourage Fitness

        Navdeep Singh,Sabah Mohammed 한국컴퓨터게임학회 2021 한국컴퓨터게임학회논문지 Vol.34 No.2

        Physical activity and exercise is an important step in the journey of a healthy lifestyle. It reduces the risk of developing many diseases like diabetes, cardiovascular diseases, and even cancer. In today’s world, we spend most of our time sitting in front of a computer or mobile phones for work and entertainment. This is one of the leading factors in a lack of physical activities and thus a decrease in the fitness level of many individuals. In this paper, we design a mobile 2D platformer game where progress inside the game world is dependent on physical activity in the real world. The game has two modes namely adventure and story mode. This design can motivate people to lead an active and healthy lifestyle. The physical activity monitoring is done solely through the pedometer of a smartphone held by the user while playing the game. The number of steps walked by the user determines the number of revives inside the adventure mode of the game. There are three levels in the story mode which are unlocked by walking more than a certain number of steps in the real world.

      • Development of Cobalt coated MWCNTs/Polyurethane composite for microwave absorption

        Singh, Navdeep,Aul, Gagan D. Techno-Press 2021 Advances in materials research Vol.10 No.3

        This research work describes the design and method of development of microwave absorber and was conducted for analysis of reflection loss performance with the magnetic modifications of Multi-Walled Carbon Nanotubes (MWCNTs). Cobalt coated Multi-Walled Carbon Nanotubes composites were prepared by three step methods. Composites were developed with varying weight percentage of Cobalt (II) Chloride Hexahydrate and Multi-Walled Carbon Nanotubes. The morphology, elementary analysis and absorbing properties of Cobalt coated Multi-Walled Carbon Nanotubes composites were studied by FESEM, EDX and Vector Network Analyzer. The obtained Co coated MWCNTs/PU composite demonstrated the maximum reflection loss of -21.06 dB at 12.63 GHz and the maximum absorption bandwidth of 3.7 GHz, in the frequency range of 8-13 GHz with 3 mm thickness. These microwave absorption parameters can be credited to synergistic effect of improved matched impedance and greater microwave attenuation properties of the absorber. The combined usage of dielectric loss and magnetic loss absorber design shows great diversity and can be a promising candidate for designing high performance microwave absorbing materials.

      • SCIESCOPUSKCI등재

        A New Random SPWM Technique for AC-AC Converter-Based WECS

        Singh, Navdeep,Agarwal, Vineeta The Korean Institute of Power Electronics 2015 JOURNAL OF POWER ELECTRONICS Vol.15 No.4

        A single-stage AC-AC converter has been designed for a wind energy conversion system (WECS) that eliminates multistage operation and DC-link filter elements, thus resolving size, weight, and reliability issues. A simple switching strategy is used to control the switches that changes the variable-frequency AC output of an electrical generator to a constant-frequency supply to feed into a distributed electrical load/grid. In addition, a modified random sinusoidal pulse width modulation (RSPWM) technique has been developed for the designed converter to make the overall system more efficient by increasing generating power capacity and reducing the effects of inter-harmonics and sub-harmonics generated in the WECS. The technique uses carrier and reference waves of variable switching frequency to calculate the firing angles of the switches of the converter so that the three-phase output voltage of the converter is very close to a sine wave with reduced THD. A comparison of the performance of the proposed RSPWM technique with the conventional SPWM demonstrated that the power generated by a turbine in the proposed approximately increased by 5% to 10% and THD reduces by 40% both in voltage and current with respect to conventional SPWM.

      • SCIESCOPUSKCI등재

        Analytical Approach for Optimal Allocation of Distributed Generators to Minimize Losses

        Kaur, Navdeep,Jain, Sanjay Kumar The Korean Institute of Electrical Engineers 2016 Journal of Electrical Engineering & Technology Vol.11 No.6

        In this paper the integration of Distributed Generation (DG) in radial distribution system is investigated by computing the optimal site and size of DG to be placed. An analytical expression based on equivalent current injection has been derived by utilizing topological structure of radial distribution system to find optimal size of DG to minimize losses. In the presented formulation, the optimal DG placement is obtained without repeatedly computing the load flow. The proposed formulation can be used to find the optimal size of all types of DGs namely Type-I, Type-II, Type-III and Type-IV DGs. The investigations are carried out on IEEE 33-bus and 69-bus radial distribution systems. The optimal DG placement results into reduction in active and reactive power losses and improvement in voltage profile of the buses.

      • KCI등재

        Biomineralization of Calcium Carbonate Polymorphs by the Bacterial Strains Isolated from Calcareous Sites

        ( Dhami Navdeep Kaur ),( M Sudhakara Reddy ),( Abhijit Mukherjee ) 한국미생물 · 생명공학회 2013 Journal of microbiology and biotechnology Vol.23 No.5

        Microbially induced calcium carbonate precipitation (MICCP) is a naturally occurring biological process that has various applications in remediation and restoration of a range of building materials. In the present investigation, five ureolytic bacterial isolates capable of inducing calcium carbonate precipitation were isolated from calcareous soils on the basis of production of urease, carbonic anhydrase, extrapolymeric substances, and biofilm. Bacterial isolates were identified as Bacillus megaterium, B. cereus, B. thuringiensis, B. subtilis, and Lysinibacillus fusiformis based on 16S rRNA analysis. The calcium carbonate polymorphs produced by various bacterial isolates were analyzed by scanning electron microscopy, confocal laser scanning microscopy, X ray diffraction, and Fourier transmission infra red spectroscopy. A strainspecific precipitation of calcium carbonate forms was observed from different bacterial isolates. Based on the type of polymorph precipitated, the technology of MICCP can be applied for remediation of various building materials.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼