Area Efficient Design of Five Stage Pipelined RISC ProcessorAbstract: This paper proposes the design of a 32 bit RISC (Reduced Instruction Set Computer) processor. The design helps to improve the speed of the processor and to give the higher performance of the processor. It has 5 stages of pipeline viz. instruction fetch, instruction decode, instruction execute, memory access and write back all in one clock cycle. The control unit controls the operations performed in these stages. All the modules in the design are coded in VHDL.
Authors: Shahnawaz Khan, Prabhat Pandey

File Name: Shahnawaz_70200-18-101.pdf
Download Abstract |
Download Full Paper Improvement on Power Transformer Protection using MATLAB Simulink and Fuzzy LogicAbstract: Harmonics are a topic of growing interest due to the many and varied effects they cause in electrical distribution networks especially in power transformer. Harmonics also cause an imbalance between power generation and load to be served, interference with measurement, protection, control and which further generate magnetizing transient current (sometimes known as inrush current) in power transfer equipment like a power transformer. Since there are many protection methods used for the transformer against inrush current nowadays. But In this paper, a brand new algorithmic rule supported fuzzy set is proposed. This algorithmic rule consists of considering the magnitude relation and therefore the distinction phase angle of the second harmonic to the basic element of differential currents beneath varied conditions. These 2 protection functions are computed and therefore the protecting system operates in less than one cycle subjected to the prevalence of disturbance. A brand new relaying algorithmic rule is employed to reinforce the fault detection sensitivities of typical techniques by employing a formal logic approach.
Authors: Lakhvinder Singh, Preeti Khurana

File Name: Lakhvinder_70100-18-104.pdf
Download Abstract |
Download Full Paper Comparative Analysis of Maximum Power Point Controlling Techniques for Stand Alone PV SystemAbstract: Authors: Gursimranjit Singh, Lakhvinder Singh

File Name: Gursimranjit_70100-18-105.pdf
Download Abstract |
Download Full Paper AF-DF and MRC based Hybrid Relay Selection for Cooperative CommunicationAbstract: Cooperative communications can be extremely proficient in combating fading multipath channels and enhance scope with complexity and cost.
Furthermore, there is also a possibility of improving the performance of cooperative communication by optimal relay selection strategies. In a basic cooperative communication network, there are three types of devices, a source, a destination and a set of relay devices. These relay devices are responsible for forwarding the overheard information from the source node to the destination node, thereby providing diversity gain at the destination node. But practically not all available relays are efficient. Application of relay selection scheme with cooperative communication techniques not only removes communication overhead from the destination node but also will enhance system performance.
In this regard, this paper is focused on a hybrid relay selection scheme of a cooperative network with cooperative non-regenerative (AF) and regenerative (DF) relaying technique. Bit Error Rate (BER) performance is compared using Rayleigh, Rician and Nakagami fading environment.
Authors: Nitesh Tyagi, Shivangini Morya

File Name: Nitesh_70200-18-104.pdf
Download Abstract |
Download Full Paper Phishing URL Detection using Cuckoo Search Optimized Neural Network ClassifierAbstract: This paper aims to collect, map and model elements that will lead to the finding of phishing URL automatically, for this purpose data mining is used as basic tools, in this sense, it is considered that the existing patterns in a URL make it possible to distinguish the legitimate link for pages, the identification of these patterns will serve to model a successful classification method, for this purpose, the attributes found in the database "phishing web" that correspond to patterns of phishing pages will be validated, at the same time will be evaluated algorithms extracted from the literature that allow a better classification of records, finally, a model with the highest precision results is delivered which consists of cuckoo search optimized neural network classifier.
Authors: Varsha Patel, Ashish Tiwari

File Name: Varsha_70200-18-103.pdf
Download Abstract |
Download Full Paper