Thursday, 29 April 2021

ANALYSIS OF LIGHTNING STRIKE WITH CORONA ON OHTL NEAR THE SUBSTATION BY EMTP

 



ANALYSIS OF LIGHTNING STRIKE WITH CORONA ON OHTL NEAR THE SUBSTATION BY EMTP

Zahira ANANE1 , AbdElhafid BAYADI1 and Alen Bernadić 2

1Department of Electrical engineering Automatic Laboratory (LAS) of Setif 1 Faculty of technology, UFAS, Setif, Algeria

2Associate on Faculty of Electrical Engineering Mechanical Engineering and Naval Architecture University of Split,

ABSTRACT

 Lightning protection and insulation coordination of transmission lines and substations require an accurate knowledge of the magnitudes and waveforms of lightning overvoltage. To simulate the lightning overvoltage precisely near the substation, this study has shown how to consider the lightning impulse corona for distortion effect of this overvoltage. Attenuation and deformation effects of lightning impulse corona along transmission lines are evaluated by the simulation results. This paper describes the substation equipment modeling in the software Electromagnetic Transients Program–Alternative Transients Program EMTP. Corona effect is incorporate in order to estimate the attenuation and deformation of overvoltage’s travelling waves on transmission lines near substations. Variations of lightning stroke current magnitudes, protection distances, and the impact points are obvious due to the applied dynamic corona model. Several elements of substation equipment are modeled in ATP/EMTP using MODELS language. The Simulation results show that the amplitude and voltage travelling wave-fronts attenuated remarkably. Deformation of the wave shapes mainly occurs when the impulse voltage exceeds the corona inception voltage.

KEYWORDS:

Lightning Stroke, Corona Impulse, EMTP, Transmission Lines, Modeling Of Substation, Attenuation, Deformation; Overvoltage Protection, MODELS Language

Full Text: https://airccse.com/adeij/papers/1116adeij06.pdf

Volume Link: https://airccse.com/adeij/vol1.html

Tuesday, 27 April 2021

Advances in Engineering: an International Journal (ADEIJ)

 


Call for papers...


Advances in Engineering: an International Journal (ADEIJ)


https://airccse.com/adeij/index.html


Paper Submission

Authors are invited to submit papers for this journal through E-mail : adeij.journal@airccse.com


Important Date: May 08, 2021


Contact Us: adeij.journal@airccse.com

Monday, 26 April 2021

Advances in Engineering: an International Journal (ADEIJ)

 


Call for papers...


Advances in Engineering: an International Journal (ADEIJ)


https://airccse.com/adeij/index.html


Paper Submission

Authors are invited to submit papers for this journal through E-mail : adeij.journal@airccse.com


Important Date: May 08, 2021


Contact Us: adeij.journal@airccse.com

Friday, 16 April 2021

Advances in Engineering: an International Journal (ADEIJ)


 Call for papers...


Advances in Engineering: an International Journal (ADEIJ)


https://airccse.com/adeij/index.html


Paper Submission

Authors are invited to submit papers for this journal through E-mail : adeij.journal@airccse.com


Contact Us: adeij.journal@airccse.com

Tuesday, 13 April 2021

Advances in Engineering: an International Journal (ADEIJ)

 


Call for papers...


Advances in Engineering: an International Journal (ADEIJ)


https://airccse.com/adeij/index.html


Paper Submission

Authors are invited to submit papers for this journal through E-mail : adeij.journal@airccse.com


Submission Deadline :April 24, 2021


Contact Us: adeij.journal@airccse.com

Monday, 12 April 2021

SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION

 



SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION

S. Muthuselvi and P.Jeyadurga

Assistant Professor, Computer Science and Engineering, Dr. SivanthiAditanar College of Engineering, Tiruchendur, India

ABSTRACT

Cloud storage services are a lot of well-liked today . To secure information from those that don't have access, several encoding schemes are projected. Most of the projected schemes assume cloud storage service suppliers or trustworthy third parties handling key management are trustworthy and can't be hacked; but, in follow, some entities could intercept communications between users and cloud storage suppliers and so compel storage suppliers to unleash user secrets by victimisation government power or alternative means that. During this case, encrypted information are assumed to be identified and storage suppliers are requested to unleash user secrets. Since it's tough to fight against outside coercion, we tend to aimed to create Associate in Nursing encoding theme that might facilitate cloud storage suppliers avoid this plight. We provide cloud storage suppliers means that to make pretend user secrets. Given such pretend user secrets, outside coercers will solely obtained solid information from a user’s keep cipher text. Once coercers suppose the received secrets are real, they'll be happy and a lot of significantly cloud storage suppliers won't have discovered any real secrets. Therefore, user privacy continues to be protected.

KEYWORDS

Deniable Encryption, Composite Order Bilinear Group, Attribute Based Encryption, Cloud Storage.

Full Text: https://airccse.com/adeij/papers/3221adeij02.pdf

Volume Link: https://airccse.com/adeij/vol3.html

Wednesday, 7 April 2021

DETECTION OF LESION USING SVM

 



DETECTION OF LESION USING SVM

Nivetha. S Assistant professor, Department of CSE Dr. Sivanthi Aditanar College of Engineering, Tiruchendur, India

ABSTRACT

 

In recent days, skin cancer is seen as one of the most Hazardous form of the cancer found in Humans. Skin Cancer is a malignant tumor that grows in the skin cells. It can be affected mostly by the reason of skin burn caused by sunlight. Early detection and treatment of Skin cancer can significantly improve patient outcome. Automatic detection is one of the most challenging research areas that can be used for early detection of such vital cancer. A person’s in which they have inadequate amount of melanoma will be exposed to the risk of sun burns and the ultra violet rays from the sun will be affected that body. Malignant melanomas is a type of melanoma that has irregular borders, color variations so analyze the shape, color and texture of the skin lesion is important for the early detection. It can have the components of an automated image analysis module, which contains image acquisition, hair detection and exclusion, lesion segmentation, feature extraction and finally classification. Finally the result show that the system is efficient achieving classification of the lesion as either melanoma or Non melanoma causes.

KEYWORDS

Image processing, classification, feature selection, support vector machine.

Full Text: https://airccse.com/adeij/papers/3221adeij01.pdf

Volume Link: https://airccse.com/adeij/vol3.html

Tuesday, 6 April 2021

Advances in Engineering: an International Journal (ADEIJ)


 Call for papers...


Advances in Engineering: an International Journal (ADEIJ)


https://airccse.com/adeij/index.html


Paper Submission

Authors are invited to submit papers for this journal through E-mail : adeij.journal@airccse.com


Submission Deadline :April 10, 2021


Contact Us: adeij.journal@airccse.com

Thursday, 1 April 2021

Current Issue: Volume 3, Number 2 - Advances in Engineering: an International Journal (ADEIJ)

 


Table of content


Current Issue: Volume 3, Number 2


Advances in Engineering: an International Journal (ADEIJ)


https://airccse.com/adeij/index.html


Paper Submission

Authors are invited to submit papers for this journal through E-mail : adeij.journal@airccse.com


Volume Link: https://airccse.com/adeij/vol3.html


1.DETECTION OF LESION USING SVM Nivetha. S

Assistant professor, Department of CSE Dr. Sivanthi Aditanar, College of Engineering, Tiruchendur, India


2.SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION

S. Muthuselvi and P.Jeyadurga, Assistant Professor, Computer Science and Engineering, Dr. SivanthiAditanar College of Engineering, Tiruchendur, India


3.SVM VS KNN FOR CLASSIFICATION OF HISTOPATHOLOGICAL IMAGES OF VARICOSE ULCER

Ajitha K, Department of Computer Science and Engineering, Dr.Sivanthi AditanarCollege of Engineering, Tiruchendur, India

The User-Centered Iterative Design of an LLM-Powered Educational Scenario Simulator for Clinical Reasoning

#ai #medicaleducation #llm #naturallanguageprocessing #linguistics The User-Centered Iterative Design of an LLM-Powered Educational Scenario...