Search results for: A. Veeraiah
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2

Search results for: A. Veeraiah

2 Effect of Copper Particle on the PD Characteristics in a Coaxial Duct with Mixture of SF6 (10%) and N2 (90%) Gases

Authors: B. Rajesh Kamath, J. Sundara Rajan, M. K. Veeraiah, M. Z. Kurian

Abstract:

Insulation performance of a gas insulated system is severely affected by particle contaminants. These metallic particles adversely affect the characteristics of insulating system. These particles can produce surface charges due to partial discharge activities. These particles which are free to move enhance the local electric fields. This paper deals with the influence of conducting particle placed in a co-axial duct on the discharge characteristics of gas mixtures. Co-axial duct placed in a high pressure chamber is used for the purpose. A gas pressure of 0.1, 0.2 and 0.3 MPa have been considered with a 10:90 SF6 and N2 gas mixtures. The 2D and 3D histograms of clean duct and duct with copper particle are discussed in this paper.

Keywords: B. Rajesh Kamath, J. Sundara Rajan, M. K. Veeraiah, M. Z. Kurian

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1732
1 Wireless Transmission of Big Data Using Novel Secure Algorithm

Authors: K. Thiagarajan, K. Saranya, A. Veeraiah, B. Sudha

Abstract:

This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmission of big data in more secure manner by protecting it from eavesdroppers and malicious nodes of unknown location. The novel algorithm that ensures secure and energy balance transmission of big data, includes selection of data transmitting region, segmenting the selected region, determining probability ratio for each node (capture node, non-capture and eavesdropper node) in every segment, evaluating the probability using binary based evaluation. If it is secure transmission resume with the two- hop transmission of big data, otherwise prevent the attackers by cooperative jamming scheme and transmit the data in two-hop transmission.

Keywords: Big data, cooperative jamming, energy balance, physical layer, two-hop transmission, wireless security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2179