Refine your search
Collections
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Venkateswara Rao, B.
- Sensitivity Analysis Based Optimal Location and Tuning of Static Var Compensator Using Firefly Algorithm
Abstract Views :237 |
PDF Views:0
Authors
Affiliations
1 GITAM University, Visakhapatnam, Andhra Pradesh, IN
1 GITAM University, Visakhapatnam, Andhra Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 7, No 8 (2014), Pagination: 1201-1210Abstract
This paper presents a new Meta heuristic optimization algorithm called firefly algorithm (FA) used to solve the multi objective optimal power flow to identify the optimal setting of Static VAR Compensator (SVC) and optimal location is identified by using sensitivity analysis when the system is operating under normal and overloaded conditions. Sensitivity analysis based Voltage collapse proximity Index is proposed for placing the SVC at appropriate location under normal and over loaded conditions. Once the location to install SVC is identified, the optimal allocation of SVC is determined through firefly algorithm based A multi-criterion objective function comprising of four objectives minimize total power loss, minimize total voltage magnitude deviations, minimize the fuel cost of total generation and minimize the branch loading to obtain the optimal power flow. Simulations have been implemented in MATLAB and the IEEE 14-bus, IEEE 30-bus and IEEE 57-bus systems have been used as a case study. The results we have obtained indicate that installing SVC can significantly enhance the voltage stability of power system. Also for the purpose of comparison the proposed technique was compared with another optimization technique namely Genetic Algorithm (GA). The results we have obtained indicate that FA is an easy to use, robust, and powerful optimization technique compared with GA.Keywords
Firefly Algorithm, Optimization, Static VAR Compensator, VCPI- An Optimization Procedure for Dropping Information Deduplication in Crossbreed Cloud Technique
Abstract Views :220 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Institute of Aeronautical Engineering, Dundigal − 500043, Hyderabad, Telangana, IN
1 Department of Computer Science and Engineering, Institute of Aeronautical Engineering, Dundigal − 500043, Hyderabad, Telangana, IN
Source
Indian Journal of Science and Technology, Vol 11, No 44 (2018), Pagination: 1-8Abstract
Objectives: In computing, facts/data deduplication is a particular statistics firmness method for removing reproduction copy of repeating records. Intelligent compression or single-instance storage technique make sure that merely single sole request of information is retained on storage space media, such as disk, flash or tape. Unneeded data blocks are replaced with a pointer to the sole data copy. Methods: This study introduces focus on comparing the clouds via authorization steps, which incorporates file token technology and proportion token generation, in competition. To the convergent encryption and document add steps. We compare the overhead through using quite a lot of distinctive reasons. Findings: In cloud computing reproduction copies of repeat facts within the cloud referred to as Data Deduplication, and broadly used in cloud garage to decrease the amount of garage space and stay bandwidth. Data deduplication removes reproduction copies of equal documents can be existed in Cloud, if so best one reproduction is maintained and replacing the alternative copies with the original reproduction. To defend the privateness of sensitive Information on similar instance as maintaining deduplication, security algorithm is proposed for statistics safety. Application: We enforce a prototype of our proposed legal replica test scheme and behavior tested experiments the usage of our prototype. It shows planned legal duplicate test scheme incurs minimum overhead in comparison to ordinary operations.References
- Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou. A hybrid cloud approach for secure authorized de duplication, IEEE Transactions on Parallel and Distributed System. 2015; 26(5):1−12. https://doi.org/10.1109/TPDS.2014.2318320.
- Kakariya G, Rangdale S. A hybrid cloud approach for secure authorized de duplication, International Journal of Computer Engineering and Applications. 2014; 8(1): 1−7.
- Leavitt N. Hybrid clouds move to the forefront, Computer. 2013; 46(5):15−18. https://www.researchgate.net/publication/ 260584421_Hybrid_Clouds_Move_to_the_Forefront.
- Zhang H, Jiang G, Yoshihira K, Chen H, Saxena A. Intelligent Workload Factoring for a Hybrid Cloud Computing Model. Proceedings of the 2009 Congress on Services, Washington, DC.; 2009. p. 701−08. https://doi.org/10.1109/SERVICES-I.2009.26. PMCid: PMC2630577.
- Sotomayor B, Montero RS, Llorente IM, Foster I. Virtual infrastructure management in private and hybrid clouds, IEEE Internet Computing. 2009; 13(5):14−22. https://doi.org/10.1109/MIC.2009.119.
- Bugiel S, Nurnberger S, Sadeghi A, Schneider T. Twin clouds: An architecture for secure cloud computing. In: Workshop on Cryptography and Security in Clouds; 2011.p. 32−44.
- Douceur JR, Adya A, Bolosky WJ, Simon D, Theimer M. Reclaiming space from duplicate files in a server less distributed file system. In: ICDCS; 2002. p. 617–24.