Loading...
  • Home
  • Search Results
319-320 of 4327 Papers

SUPER CONDUCTING MAGNETIC ENERGY STORAGE UNIT FOR POWER CONDITIONING

Published In: 1ST INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER, ELECTRONICS AND ELECTRICAL ENGINEERING
Author(s): K.VADIRAJACHARYA , PRASHANT SAMBHAJI KADAM

Abstract: Superconducting magnetic energy storage (SMES) technology has been progressed actively in recent years. SMES technology has the potential to bring real power storage characteristic to protect consumers from the grid voltage fluctuations. This paper analyses the operation principle of the SMES based DVR for power conditioning in the event of voltage sag, and its design is based on simple PI control method to compensate voltage sags. Using MATLAB SIMULINK, the models of the SMES based DVR is established, and the simulation tests are performed to evaluate the system performance.

  • Publication Date: 12-Mar-2012
  • DOI: 10.15224/978-981-07-1847-3-1018
  • Views: 0
  • Downloads: 0

A NOVEL APPROCH TO DEFEAT SPLIT PERSONALITY MALWARE

Published In: 1ST INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER, ELECTRONICS AND ELECTRICAL ENGINEERING
Author(s): M.B. CHANDAK , NISHA LALWANI

Abstract: Malware, also known as malicious code and malicious software, refers to a program that is inserted into a system, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system or otherwise annoying or disrupting the victim. Security analysts extensively use virtual machines to analyze sample programs and study them to determine if they contain any malware. Malware detection is again a crucial aspect of software security. This paper is intended to help organizations understand the threats posed by malware and mitigate the risks associated with malware incidents. In addition to providing background information on the major categories of malware, this paper majorly focuses on Analysis Aware Malware also called as Split Personality Malware which checks for the presence of Malware Analysis tools and behaves in a benign manner thus escaping detection

  • Publication Date: 12-Mar-2012
  • DOI: 10.15224/978-981-07-1847-3-1027
  • Views: 0
  • Downloads: 0