Loading...
  • Home
  • Search Results
771-772 of 4327 Papers

SHORT CIRCUIT ANALYSIS OF AN INDUSTRIAL DISTRIBUTION SYSTEM

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER, ELECTRONICS AND ELECTRICAL ENGINEERING
Author(s): MANOJ KUMAR , GANGA AGNIHOTRI , MUKESH KUMAR KIRAR , RENUKA KAMDAR

Abstract: The power system studies are required to evaluate the performance of the system at planning stage as well as running conditions. This paper presents short circuit analysis of an industrial electrical power distribution system in compliance to IEC 60909. Short-circuit studies can be performed at the planning and design stage in order to help finalize the system layout, determine voltage levels, protection equipments, switchgears, and cables size, transformers, grounding and earthing. The industrial distribution system is simulated on ETAP software and different fault study is performed.

  • Publication Date: 28-Apr-2013
  • DOI: 10.15224/978-981-07-6260-5-41
  • Views: 0
  • Downloads: 0

CAMPUS SECURITY USING HONEYPOT

Published In: INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER, ELECTRONICS AND ELECTRICAL ENGINEERING
Author(s): AHER NISHA N

Abstract: Now a day the number of computer and network security incidents has been increasing remarkably in the past few years the importance of networks security and services at higher education institutions has never been higher than it is now. Users and institutions are demanding more and more network services and the exchange of more potentially sensitive information within these services. This has various impacts on the campus, ranging from the so-called Denial-Of-Service (DOS) to virus infection on end-users\' desktop / notebook computers. Therefore, the issue of network security has become a priority to campus network management, While using network services in campus network it can be more easily attacked. This paper presents a new technology called honeypot whose purpose is to detect and learn from attacks and use that information to improve security. A network administrator obtains first-hand information about the current threats on his network. Undiscovered security holes can be prote

  • Publication Date: 28-Apr-2013
  • DOI: 10.15224/978-981-07-6260-5-32
  • Views: 0
  • Downloads: 0