Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 9 )

2018 ( 12 )

2017 ( 13 )

2016 ( 25 )

Custom range...

Search Results: 1 - 10 of 2677 matches for " Krishna Chaitanya Diggavi "
All listed articles are free for downloading (OA Articles)
Page 1 /2677
Display every page Item
Fuzzy Logic Based Wind Connected UPFC to Mitigate Voltage Sag and Reactive Power Compensation in a Transmission System
Krishna Chaitanya Diggavi,M. Ramu
International Journal of Electrical and Power Engineering , 2012, DOI: 10.3923/ijepe.2012.94.99
Abstract: Power flow is one of the major problems in a transmission system. When a fault occurs in a transmission system there is said to be a drop in the voltage. Voltage sag is one of the most severe problems to be dealt with as it causes severe process disruptions and results in substantial economic loss. Decrease/increase of reactive power is also one of the main problem. FACTS devices are used to control the power flow to increase the transmission capacity and to optimize the stability of the power system. One of the most widely used FACTS devices is Unified Power Flow Controller (UPFC). Here, the sending end voltage is generated by the wind generation system. In this study, researchers are comparing two different controller s performance. The two controllers are PI and Fuzzy. On comparing, researchers can say that Fuzzy Logic Controller (FLC) based UPFC shown better voltage sag compensation than PI controller based UPFC. Matlab/Simulink is used to create the PI and FLC and to simulate UPFC Model.
Discussion of various models related to cloud performance
Chaitanya Krishna Kande
Computer Science , 2015,
Abstract: This paper discusses the various models related to cloud computing. Knowing the metrics related to infrastructure is very critical to enhance the performance of cloud services. Various metrics related to clouds such as pageview response time, admission control and enforcing elasticity to cloud infrastructure are very crucial in analyzing the characteristics of the cloud to enhance the cloud performance.
Secure File Multi Transfer Protocol Design  [PDF]
Murali Krishna, Pradeep Jamwal, K. S. R. Chaitanya, B. Vinod Kumar
Journal of Software Engineering and Applications (JSEA) , 2011, DOI: 10.4236/jsea.2011.45034
Abstract: As the internet grows in popularity and therefore also in size more and more transmission takes place mainly because the technology is more readily available and applications have become more user friendly allowing entry to less sophisticated user over a broad spectrum. Most data transfer are mainly text based not secure and vulnerable to various forms of security risks. So the model that uses SSH for securing channel like intranet/internet which provides client authentication encryption and decryption with high degree of security by transferring the data in an encrypted format, up on this model enhances the efficiency of data transmission by encrypting or decrypting the data with AES in Counter Mode. AES is a symmetric key encryption standard. Moreover the permutation controlled by data can be performed at high speed in generic cpu. This scheme also expands the key space without costing more to run. And also finally through the combination of secure shell (ssh) and AES (Counter Mode) not only enhances the security of communication channel. It also provides various applications like remote user creation, remote user deletion, remote command execution, remote system shutdown, remote file transfer applications in a highly secure manner.
On Power Balancing and Stabilization for a Class of infinite-dimensional systems
Ramkrishna Pasumarthy,Krishna Chaitanya Kosaraju,Addarsh Chandrasekar
Mathematics , 2014,
Abstract: In this paper we present control of infinite-dimensional systems by power shaping methods, which have been used extensively for control of finite dimensional systems. Towards achieving the results we work within the Brayton Moser framework, by using the system of transmission line as an example and derive passivity of the system with respect to the boundary voltages and derivatives of current at the boundary. We then solve the stabilization problem by interconnecting the system through a finite-dimensional controller and generating Casimirs for the closed-loop system. Finally we explore possibility of generating other alternate passive maps.
Power Allocation Games on Interference Channels with Complete and Partial Information
Krishna Chaitanya A,Utpal Muherji,Vinod Sharma
Mathematics , 2015,
Abstract: We consider a wireless channel shared by multiple transmitter-receiver pairs. Their transmissions interfere with each other. Each transmitter-receiver pair aims to maximize its long-term average transmission rate subject to an average power constraint. This scenario is modeled as a stochastic game under different assumptions. We first assume that each transmitter and receiver has knowledge of all direct and cross link channel gains. We later relax the assumption to the knowledge of incident channel gains and then further relax to the knowledge of the direct link channel gains only. In all the cases, we formulate the problem of finding the Nash equilibrium as a variational inequality (VI) problem and present an algorithm to solve the VI.
Learning Equilibrium of a Stochastic Game on Gaussian Interference Channels with Incomplete Information
Krishna Chaitanya A,Vinod Sharma,Utpal Mukherji
Mathematics , 2015,
Abstract: We consider a wireless communication system in which $N$ transmitter-receiver pairs want to communicate with each other. Each transmitter transmits data at a certain rate using a power that depends on the channel gain to its receiver. If a receiver can successfully receive the message, it sends an acknowledgement (ACK), else it sends a negative ACK (NACK). Each user aims to maximize its probability of successful transmission. We formulate this problem as a stochastic game and propose a fully distributed learning algorithm to find a correlated equilibrium (CE). We also propose a fully distributed learning algorithm to find a Pareto optimal solution, and we compare the utilities of each user at the CE and the Pareto point and also with some other well known recent algorithms.
Algorithms for Stochastic Games on Interference Channels
Krishna Chaitanya A,Utpal Mukherji,Vinod Sharma
Computer Science , 2014,
Abstract: We consider a wireless channel shared by multiple transmitter-receiver pairs. Their transmissions interfere with each other. Each transmitter-receiver pair aims to maximize its long-term average transmission rate subject to an average power constraint. This scenario is modeled as a stochastic game. We provide sufficient conditions for existence and uniqueness of a Nash equilibrium (NE). We then formulate the problem of finding NE as a variational inequality (VI) problem and present an algorithm to solve the VI using regularization. We also provide distributed algorithms to compute Pareto optimal solutions for the proposed game.
International Journal of Engineering Science and Technology , 2012,
Abstract: With the increasing rate of threats in the global environments; Information security engineers are continuously starving to develop a new secure algorithm to provide secure storage of information and at the same time, enabling the information to available to the authentic user easily. For this purpose, many efficient algorithms are being developed to protect the information from several threats. Cryptography is one of the ways to provide this service. In this paper we have proposed one such algorithm to allow users to share data on a global server within an organization at the same time, allow access to genuine users. The main focus of the proposed algorithm is on the storage of data and authentication of the user
A 3-Level Secure Histogram Based Image Steganography Technique
G V Chaitanya,D Vamsee Krishna,L Anjaneyulu
International Journal of Image, Graphics and Signal Processing , 2013,
Abstract: Steganography is an art that involves communication of secret data in an appropriate carrier, eg. images, audio, video, etc. with a goal to hide the very existence of embedded data so as not to arouse an eavesdropper’s suspicion. In this paper, a steganographic technique with high level of security and having a data hiding capacity close to 20% of cover image data has been developed. An adaptive and matched bit replacement method is used based on the sensitivity of Human Visual System (HVS) at different intensities. The proposed algorithm ensures that the generated stego image has a PSNR greater than 38.5 and is also resistant to visual attack. A three level security is infused into the algorithm which makes data retrieval from the stego image possible only in case of having all the right keys.
Amajala Krishna Chaitanya,DSVGK. Kaladhar,S. Suresh,Bhaskar Reddy
International Journal of Biomedical Research , 2013, DOI: 10.7439/ijbr.v3i9.715
Abstract: Water molecules are very important for stabilizing the protein structures. The influence of hydration (or) dehydration on protein structures leads to the changes in the activity of proteins as well their conformation. In our present study, we madde an attempt to understand the various RecA protein sequence similarity with respect to E. coli RecA Protein and comparative structure and functional conformation studies between MsRecA protein (dehydrated state) and EcRecA + DNA bound structures (active state) as well ATP-complexed DrRecA protein structure. From the sequence similarity studies, it was identified that the E.coli RecA protein exhibits the highest sequence similarity (100%) with the Shigella dysenteriae serotype 1 (strain Sd197), Shigella flexneri and the lowest sequence similarity (46%) with the Mycoplasma genitalium. From the structural alignment & superposition studies, it can be inferred that the low hydrated MsRecA protein conformation is very closely similar to the active conformation of the EcRecA protein. This confers that the lower less water molecules favors the active conformational state of the RecA protein in both M. smegmatis & E. coli whereas the ATP-bound complex of RecA protein of D. radiodurans is exhibiting different conformation from the active state conformation.
Page 1 /2677
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.