Archive Browsing VOLUME 7 ISSUE 02 SEPTEMBER 2018

Area Efficient Design of Five Stage Pipelined RISC Processor
Abstract: This paper proposes the design of a 32 bit RISC (Reduced Instruction Set Computer) processor. The design helps to improve the speed of the processor and to give the higher performance of the processor. It has 5 stages of pipeline viz. instruction fetch, instruction decode, instruction execute, memory access and write back all in one clock cycle. The control unit controls the operations performed in these stages. All the modules in the design are coded in VHDL.

Authors: Shahnawaz Khan, Prabhat Pandey

File Name: Shahnawaz_70200-18-101.pdf
 Download Abstract | Download Full Paper

Improvement on Power Transformer Protection using MATLAB Simulink and Fuzzy Logic
Abstract: Harmonics are a topic of growing interest due to the many and varied effects they cause in electrical distribution networks especially in power transformer. Harmonics also cause an imbalance between power generation and load to be served, interference with measurement, protection, control and which further generate magnetizing transient current (sometimes known as inrush current) in power transfer equipment like a power transformer. Since there are many protection methods used for the transformer against inrush current nowadays. But In this paper, a brand new algorithmic rule supported fuzzy set is proposed. This algorithmic rule consists of considering the magnitude relation and therefore the distinction phase angle of the second harmonic to the basic element of differential currents beneath varied conditions. These 2 protection functions are computed and therefore the protecting system operates in less than one cycle subjected to the prevalence of disturbance. A brand new relaying algorithmic rule is employed to reinforce the fault detection sensitivities of typical techniques by employing a formal logic approach.

Authors: Lakhvinder Singh, Preeti Khurana

File Name: Lakhvinder_70100-18-104.pdf
 Download Abstract | Download Full Paper

Comparative Analysis of Maximum Power Point Controlling Techniques for Stand Alone PV System

Authors: Gursimranjit Singh, Lakhvinder Singh

File Name: Gursimranjit_70100-18-105.pdf
 Download Abstract | Download Full Paper

AF-DF and MRC based Hybrid Relay Selection for Cooperative Communication
Abstract: Cooperative communications can be extremely proficient in combating fading multipath channels and enhance scope with complexity and cost. Furthermore, there is also a possibility of improving the performance of cooperative communication by optimal relay selection strategies. In a basic cooperative communication network, there are three types of devices, a source, a destination and a set of relay devices. These relay devices are responsible for forwarding the overheard information from the source node to the destination node, thereby providing diversity gain at the destination node. But practically not all available relays are efficient. Application of relay selection scheme with cooperative communication techniques not only removes communication overhead from the destination node but also will enhance system performance. In this regard, this paper is focused on a hybrid relay selection scheme of a cooperative network with cooperative non-regenerative (AF) and regenerative (DF) relaying technique. Bit Error Rate (BER) performance is compared using Rayleigh, Rician and Nakagami fading environment.

Authors: Nitesh Tyagi, Shivangini Morya

File Name: Nitesh_70200-18-104.pdf
 Download Abstract | Download Full Paper

Phishing URL Detection using Cuckoo Search Optimized Neural Network Classifier
Abstract: This paper aims to collect, map and model elements that will lead to the finding of phishing URL automatically, for this purpose data mining is used as basic tools, in this sense, it is considered that the existing patterns in a URL make it possible to distinguish the legitimate link for pages, the identification of these patterns will serve to model a successful classification method, for this purpose, the attributes found in the database "phishing web" that correspond to patterns of phishing pages will be validated, at the same time will be evaluated algorithms extracted from the literature that allow a better classification of records, finally, a model with the highest precision results is delivered which consists of cuckoo search optimized neural network classifier.

Authors: Varsha Patel, Ashish Tiwari

File Name: Varsha_70200-18-103.pdf
 Download Abstract | Download Full Paper

© 2016 IJDACR Journal. All rights reserved.