Version-6 (Nov-Dec 2015)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Novel Malware Clustering System Based on Kernel Data Structure |
Country | : | India |
Authors | : | Bhandare Trupti Vasantrao || Pramod B. Mali |
Abstract: An operating system kernel is the prime of system software, responsible for the integrity and conventional computer system's operations. Traditional malware detection approaches have based on the codecentric aspects of malicious programs, e.g. injection of unauthorized code or the control flow patterns of malware programs.
[1] Junghwan R, R Riley, Z Lin, X Jiang, and D Xu, "Data-Centric OS Kernel Malware Characterization" IEEE Transactions on
Information Forensics And Security, Vol. 9, No. 1, January 2014.
[2] Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide Balzarotti, and Engin Kirda. G-Free: Defeating Return-oriented Programming
through Gadget-less Binaries. In Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC'10), 2010.
[3] H. Etoh, "GCC Extension for Protecting Applications From Stack-smashing Attacks".
http://www.trl.ibm.com/projects/security/ssp/. Accessed May 2011.
[4] Jinku Li, Zhi Wang, Xuxian Jiang, Michael Grace, and Sina Bahram. Defeating Return-oriented Rootkits with"Return-Less"
Kernels. In Proceedings of the 5th European Conference on Computer Systems (EUROSYS'10), 2010.
[5] Phrack Magazine. Linux On-the-fly Kernel Patching without LKM. http:// www.phrack.com/issues.html?issue=58&id=7. Accessed
May 2011.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Privacy Issues In Cloud Computing |
Country | : | Malaysia |
Authors | : | Leela Krishna Ganapavarapu || Sireesha Prathigadapa || Kiranmayi Bodapati |
Abstract: Cloud computing is the delivery of computing as a service rather than a product. It provides shared
resources, software, and information to computers and other devices over a network. The increasing network
bandwidth and reliable yet flexible network connections make it even possible that users can now subscribe high
quality services from data and software that reside solely on remote data centres. We can store and retrieve the
data as we like using cloud computing. The cloud computing paradigm changes the way in which information is
managed, especially where personal data processing is concerned. End-users can access cloud services without
the need for any expert knowledge of the underlying technology. This is a key characteristic of cloud computing,
which offers the advantage of reducing cost through the sharing of computing and storage resources, combined
with an on-demand provisioning mechanism based on a pay-per-use business model.
[1] Grilo A, Jardim-Goncalves R (2011) Challenging electronic procurement inthe AEC sector: A BIM-based integrated perspective.
Automation in Construction 20: 107–114
[2] Vorakulpipat C, Rezgui Y, Hopfe CJ (2010) Value creating construction virtual teams: A Case study in the construction sector.
Automation in Construction 19: 142–147
[3] International Standard (ISO) 16739:2005 - Industry Foundation Classes
[4] Succar B (2009) Automation in Construction 18: 357–375
[5] Royal Institute of British Architects (RIBA) Plan of Work. Available at: http://www.ribaplanofwork.com/. [Last accessed: Jan 17,
2012]
[6] Serror M (2007) Shared computer-aided structural design model for construction industry (infrastructure). Comput Aided Des 40:
778–788
[7] Singh V (2010) A theoretical framework of a BIM-based multi-disciplinary platform. Automation in Construction 20: 131–144
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | The Gap of Hospital Service Performance By Using Service Quality Analysis |
Country | : | Indonesia |
Authors | : | Mustafa Hermanto |
Abstract: Patient is a customer of the Hospital whose satisfaction must be noticed. The satisfaction of patient is
depended on the service performance which has been performed by the hospital. Service quality analysis is used
to measure the expectations and the perceptions of respondents about service quality which has been provided
by the hospital, so the occurred score gap can be known. The samples are 96 inpatients who have been selected
by using accidental sampling method. The data collection has been carried out by using questionnaires. This
research recommends that the hospital should find strategies in order to improve their service quality and to
maintain consumer (consumer retention).
Keywords: service performance, servqual analysis
1]. Assael, H. 1998. Costumer Behavior And Marketing Action. Keat Publishing Company, Boston
[2]. Dutka, A. 1994. AMA Hand Book for Customer Satisfaction. NTC Business Book, Lincolnwood, Illnois
[3]. Gibson, J.L., Ivancevich, J.M., Donnelly, J.H & Konopaske, R. 2011. Organizational Behavior, Structure, Process. New York, NY:
Mc.Graw Hill
[4]. Gronroos, C. 2007. Service Management and Marketing "Customer Management in Service Competition" 3th edition. John Wiley
& Sons.Ltd, England
[5]. Kotler, P. & Armstrong, G. 2008. Principles of Marketing. 12thed. New Jersey: Prentice Hall
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Subacute sclerosing panencephalitis (SSPE) In Iraq |
Country | : | Iraq |
Authors | : | Dr. Akram M. Al-Mahdawi || Dr. Anmar O. Hatem || Dr. Eman Sh. Mahmood |
Abstract: Subacute sclerosing panencephalitis (SSPE) is a progressive inflammatory disease of the central
nervous system with poor prognosis and high mortality, caused by the persistent infection with measles virus
(MV). Despite much research into SSPE, its pathology remains obscure. Only 5% of individuals with SSPE
undergo spontaneous remission, with the remaining 95% dying within 5 years of diagnosis. The prevalence of
the disease varies depending on the measles vaccine immunization status. The clinical manifestations occur, on
an average 6 years after measles virus infection and may initially present with a varied clinical picture ranging
from psychiatric to ophthalmological to neurological symptoms and signs. The diagnosis is based upon
characteristic clinical manifestations of myoclonus, the presence of characteristic periodic EEG discharges,
and demonstration of raised antibody titer. We are reporting 8 cases of Iraqi patients with SSPE and we
describe the test methodology used for detection of MV in those patients
[1]. Tomoda A, Nomura K, Shiraishi S, et al. Trial of intraven-tricular ribavirin therapy for subacute sclerosing panencepha-litis in
Japan.Brain Dev2003;25:514–7.
[2]. Dawson JR. Cellular inclusions in cerebral lesions of epi-demic encephalitis.Arch Neurol Psychiatry1934;31:685–700.
[3]. van Bogaert L. Une leuco-encephalite sclerosante subaigue.J Neurol Neurosurg Psychiatry1945;8:101–20.
[4]. Dyken PR. Subacute sclerosing panencephalitis. Current sta-tus.Neurol Clin1985;3:179–96.
[5]. Tomoda A, Miike T, Miyagawa S, Negi A, Takeshima H.Subacute sclerosing panencephalitis and
chorioretinitis.BrainDev1997;19:55–7.
[6]. Tuncay R, Akman-Demir G, Gokyigit A, et al. MRI in sub-acute sclerosing panencephalitis. Neuroradiology1996; 38:636–40.
[7]. Singer C, Lang AE, Suchowersky O. Adult-onset subacute sclerosing panencephalitis: case reports and review of the literature.
Mov Disord1997;12:342–53
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Hierarchical Dirichlet Process for Dual Sentiment Analysis with Two Sides of One Review |
Country | : | India |
Authors | : | Daniel Nesa Kumar C || Suganya G || Anita Lily J S |
Abstract: Sentiment categorization is a fundamental process in sentiment examination, by means of it's intended to categorize the sentiment into either positive or negative for given text. The wide-ranging perform in sentiment categorization follow the procedure in conventional topic-based text categorization, where the Bagof- Words (BOW) is one of the most widely used methods in the recent work for the classification of text data in sentiment analysis. In the BOW method, an examination text is characterized by means of a vector of selfdetermining words. On the other hand, the performance of BOW occasionally leftovers restricted because of handling the polarity shift difficulty.
[1] Whitelaw C., N. Garg, S. Argamon, ―Using appraisal groups for sentiment analysis,‖ in Proc. ACM Conf. Inf. Knowl. Manag.,
2005, pp. 625–631.
[2] Wilson T., J. Wiebe, and P. Hoffmann, ―Recognizing contextual polarity: An exploration of features for phrase-level sentiment
analysis,‖ Comput. Linguistics, vol. 35, no. 3, pp. 399–433, 2009.
[3] Choi Y.and C. Cardie, ―Learning with compositional semantics as structural inference for subsentential sentiment analysis,‖ in Proc.
Conf. EmpiricalMethodsNatural Language Process., 2008, pp. 793–801.
[4] Councill I., R. MaDonald, and L. Velikovich, ―What's great and what's not: Learning to classify the scope of negation for improved
sentiment analysis,‖ in Proc. Workshop Negation Speculation Natural Lang. Process., 2010, pp. 51–59.
[5] Li S. and C. Huang, ―Sentiment classification considering negation and contrast transition,‖ in Proc. Pacific Asia Conf. Lang., Inf.
Comput.,2009, pp. 307–316.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Hough Transform Implementation for Line Detection for a Mobile Robot Self-Navigation System |
Country | : | Nigeria |
Authors | : | Gideon Kanji Damaryam |
Abstract: This paper presents an implementation of the Hough transform for detecting straight lines within
rectilinear environments for further processing towards automatic recognition of a path by a mobile robot for
the purpose of self-navigation. The results of the processes described in this paper are linesalong
whichnavigationally important features from the original image would lie, but whose end-points and lengths
have not been determined yet. The input to the processes in this paper is a pre-processed binary image with
pixels showing the outline of important edges determined by a scheme discussed in [1]. The processes described
in this paper that translate the pre-processed image to detected lines include choice or resolution of parameters
for the Hough transform, a discussion of the range of values of the parameters leading to discussion of setting
up of the accumulator array, the actual transformation and accumulation.
[1]. G. K. Damaryam, Visions systems for a mobile robot based on line detection using the Hough transform and artificial neural
networks, doctoral diss., Robert Gordon University, Aberdeen, United Kingdom, 2008.
[2]. G. K. Damaryam, A method to determine end-points of straight lines detected using the Hough transform, In Press, International
Journal of Engineering Research and Applications, 6(1), 2016
[3]. P. Hough, Method and Means for Recognising Complex Patterns, United State of America Patent 3069654, 1962.
[4]. A. Low,Introductory Computer Vision and Image Processing,(London, United Kingdom: McGraw-Hill Book Company, 1991).
[5]. A. O. Djekouneand K. Achour, Visual Guidance Control based on the Hough Transform,IEEE Intelligent Vehicles Symposium,
2000.
[6]. J. F. Boyce, G. A. Jonesand V. F. Leavers, An implementation of the Hough transform for line and circle location. Proc, SPIE
Inverse Problems in Optics,The Hague, Netherlands, 1987.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Filter-Wrapper Approach to Feature Selection Using PSO-GA for Arabic Document Classification with Naive Bayes Multinomial |
Country | : | Indonesia |
Authors | : | Indriyani || Wawan Gunawan || Ardhon Rakhmadi |
Abstract: Text categorization and feature selection are two of the many text data mining problems. In text categorization, the document that contains a collection of text will be changed to the dataset format, the dataset that consists of features and class, words become features and categories of documents become class on this dataset. The number of features that too many can cause a decrease in performance of classifier because many of the features that are redundant and not optimal so that feature selection is required to select the optimal features. This paper proposed a feature selection strategy based on Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) methods for Arabic Document Classification with Naive Bayes Multinomial (NBM).
[1]. Chakrabarti, S., 2000. Data mining for hypertext: A tutorial survey. SIGKDD explorations 1(2), ACM SIGKDD.
[2]. Salton, G., 1989. Automatic Text Procession: The Transformation, Analysis, and Retrieval of Information by Computer. Addison
Wesley, Reading, PA.
[3]. Rifkin, R.M., 2002. Everything Old is New Again: A Fresh Look at Historical Approaches in Machine Learning, Ph.D.
Dissertation, Sloan School of Management Science, September, MIT.
[4]. Salton, G., 1989. Automatic Text Procession: The Transformation, Analysis, and Retrieval of Information by Computer. Addison
Wesley, Reading, PA.
[5]. Yang, Y., Pedersen, J., 1997. A comparative study on feature selection in text categorization. In: Proceedings of ICML-97,
Fourteenth International Conference on Machine Learning.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Privacy - Preserving Reputation with Content Protecting Location Based Queries |
Country | : | India |
Authors | : | Dr.S.Sujatha (HOD) || N.Premalatha (M.Phil scholar) |
Abstract: Privacy based Context-aware systems based on location open up new possibilities to users and data servers in terms of acquiring custom services by gathering context information, especially in systems where the high mobility of users increases their usability. Location-based applications utilize the positioning capabilities of a mobile device to determine the current location of a user, and customize query results to include neighbouring points of interests. However, location knowledge is often perceived as personal information.
[1] C. Bettini, X. Wang, and S. Jajodia, "Protecting privacy against location-based personal identification," in Proc. 2nd VDLB Int.
Conf. SDM, W. Jonker and M. Petkovic, Eds., Trondheim, Norway, 2005, pp. 185–199, LNCS 3674.
[2]. M. Damiani, E. Bertino, and C. Silvestri, "The PROBE framework for the personalized cloaking of private locations," Trans. Data
Privacy, vol. 3, no. 2, pp. 123–148, 2010
[3]. G. Ghinita, P. Kalnis, M. Kantarcioglu, and E. Bertino, "A hybrid technique for private location-based queries with database
protection," in Proc. Adv. Spatial Temporal Databases, N. Mamoulis, T. Seidl, T. Pedersen, K. Torp, and I. Assent, Eds., Aalborg,
Denmark, 2009, pp. 98–116, LNCS 5644
[4]. G. Ghinita, P. Kalnis, M. Kantarcioglu, and E. Bertino, "Approximate and exact hybrid algorithms for private nearestneighbor
queries with database protection," GeoInformatica, vol. 15, no. 14, pp. 1–28, 2010
[5]. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, "Private queries in location based services: Anonymizers are
not necessary," in Proc. ACM SIGMOD, Vancouver, BC, Canada, 2008, pp. 121–132.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Positional Prediction of Individuals Present In a Crime Scene |
Country | : | India |
Authors | : | Prof.(Dr.)Samir Kumar Bandyopadhyay || NabanitaBasu |
Abstract: The scientific study/interpretation of bloodstain patterns at a crime scene, provide invaluable
evidence for sequencing, reconstruction of events that might have occurred at the crime scene. the authors have
tried to amalgamate the works that have particularly contributed towards scientific advancement in the
documentation, interpretation of bloodstain patterns, thereby putting forth the research initiative that they (i.e.
the authors) intend to undertake within the multidisciplinary domain of bloodstain pattern analysis. Authors try
to overview the entire crime scene process.
Keywords: Transfer stain, Cast-off pattern, Impact spatter, Saturation stain, Bloodstain patternanalysis, Fluid
mechanics.
[1]. National Crime Records Bureau,Ministry of Home Affairs, Government of India. (2014, June 16). Crime in India - 2013. Retrieved
March 12, 2015, from http://ncrb.gov.in/CD-CII2013/home.asp
[2]. U.S. Department of Justice—Federal Bureau of Investigation. (2010, September). Violent Crime - Crime in the United States 2009.
Retrieved March 3, 2015, from https://www2.fbi.gov/ucr/cius2009/offenses/violent_crime/index.html
[3]. Ebiary, H. (2008). Crime Scene Investigation [Powerpoint slides]. Retrieved from
http://www.centralia.edu/academics/forensicscience/FORS%20101/PowerPointPres/BCSI.ppt
[4]. Swindlehurst, J., &Hadzi-Vidanovic, V. (n.d.). Evidence: Types of Evidence Admissible in a Law Court. Retrieved March 30, 2015,
from http://www.inbrief.co.uk/court-proceedings/evidence.htm
[5]. Oxford University Press. (n.d.). crime - definition of crime in English from the Oxford dictionary. Retrieved February 8, 2015, from
http://www.oxforddictionaries.com/definition/english/crime
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Prevention of Cheating Message based on Block Cipher using Digital Envelope |
Country | : | India |
Authors | : | Sanyasamma || Koduganti Venkata Rao |
Abstract: Quick assessment of advanced information trade happens as of late. Because of that security of data is much critical in information stockpiling and transmission process. That implies there is a need to shield the information or some message from an assailant that is miscreant. An advanced envelope (encryption) is what might as well be called putting our message into a fixed envelope to give security and imperviousness to altering. Also, is the most guaranteeing procedure which gives key security highlight like uprightness, validation, non-renouncement, protection.
[1] P.Karthigaikumar, Soumiya Rasheed, ―Simulation of Image Encryption using AES Algorithm‖, IJCA Special Issue on
―Computational Science - New Dimensions & Perspectives‖ NCCSE, 2011, pp 166-172.
[2] Shraddha Soni, Himani Agrawal, Dr. (Mrs.) Monisha Sharma, ― Analysis and Comparison between AES and DES Cryptographic
Algorithm‖, International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 6, December 2012, pp 362-
365
[3] Irfan AbdulGaniLandge, ―Implementation of AES Encryption and Decryption using VHDL‖, International J. of Engg. Research
&Indu. Appls. (IJERIA). ISSN 0974-1518, Vol. 4, No. III (August 2011), pp 395-406.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Claytronics: The Building Block of New Virtual World |
Country | : | India |
Authors | : | Himanshu Bhusan Mohapatra || Ananta Sethi |
Abstract: This paper introduces a new branch of technology, the programmable matter. Claytronics is an
abstract future concept that combines nanoscale robotics and computer science to create individual nanometrescale
computers called claytronic atoms, or catoms, which can interact with each other to form tangible 3-D
objects that a user can interact with. This idea is more broadly referred to as programmable matter. Claytronics
has the potential to greatly affect many areas of daily life, such as telecommunication, human-computer
interfaces, andentertainment.
Keywords-Claytronics,Catoms,Macro,Nano,MELD,LDP
[1]. C. Mirkin. Programming the Assembly of Two- and Three-Dimensional Architectures with DNA and Nanoscale Inorganic Building
Blocks. Inorg. Chem., 39:2258–72,2000.
[2]. S. Murata, H. Kurokawa, and S. Kokaji. Self-assembling machine. In International Conference on Robotics and Automation, pages
441–448, San Diego, CA., May1994.
[3]. S. Murata, H. Kurokawa, E. Yoshida, K. Tomita, and S. Kokaji. A 3d self- reconfigurable structure. In Proc. of the IEEE
International Conf. on Robotics and Automation,pages432–439,Leuven,Belgium,May1998.
[4]. Radhika Nagpal. Programmable Self-Assembly: Constructing Global Shape using Biologically-inspired Local Inter- actions and
Origami Mathematics. PhD thesis, MIT Department of Electrical Engineering and Computer Science, June2001.
[5]. A. Pamecha, C. Chiang, D. Stein, and G. Chirikjian. Design and implementation of metamorphic robots. In Pro- ceedings of the
1996 ASME Design Engineering Technical Conference and Computers in EngineeringConference,1996.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Cloud Brokerage Services & Cloud Integration: A Brief Review |
Country | : | India |
Authors | : | Archana Senapati || Archana Panda |
Abstract: Cloud computing is one of the emerging area which offer large potential for various business service.
Cloud Broker acts as a mediator between cloud users and cloud service providers. The main functionality of the
cloud broker is to select best Cloud Service Providers (CSP) from requirement set defined by cloud user.
Request from cloud users are processed by the cloud broker and suited providers are allocated to them. This
paper focuses a detailed review of cloud brokerage services and their negotiation methodology with the service
providers. This negotiation can be modeled as a middleware, and its services can be provided as application
programming interface
Keywords— Cloud computing, broker, mediator, service provider, middleware
[1]. Foued Jrad, Jie Tao, Achim Streit, SLA Based Service Brokering in Intercloud Environments.
Proceedings of the 2nd International Conference on Cloud Computing and Services Science, pp. 76-81,[2]. Tao Yu and Kwei-Jay Lin, The Design of QoS Broker Algorithms for QoS-Capable Web Services,
Proceedings of IEEE International Conference on e-Technology, e- Commerce and e-Service, pp. 17-24,
2004.
[3]. Josef Spillner, Andrey Brito, Francisco Brasileiro, Alexander Schill, A Highly- Virtualising Cloud
Resource Broker, IEEE Fifth International Conference on Utility and Cloud Computing, pp.233-234,
2012.
[4]. Linlin Wu, Saurabh Kumar Garg, Rajkumar Buyya, Chao Chen, Steve Versteeg, Automated SLA
Negotiation Framework for Cloud Computing, 13th IEEE/ACM International Symposium on Cluster,
Cloud, and Grid Computing, pp.235-244, 2013.
[5]. Wei Wang, Di Niu, Baochun Li, Ben Liang, Dynamic Cloud Resource Reservation via Cloud Brokerage,
Proceedings of the 33rd International Conference on Distributed Computing Systems (ICDCS),
Philadelphia, Pennsylvania, July 2013.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Two-Way Continuous Plate Based On Beam Analysis |
Country | : | India |
Authors | : | Harish Chand Giri || Biswajit Nayak |
Abstract: The use of trigonometric shape functions in analysis of continuous plates in two directions by earlier
researchers have been with a lot of difficulties of complex and cumbersome equations. In this study, polynomial
displacement functions are used analysed a two-way continuous plate. A continuous plate spanning in both x
and y-directionsis divided into twelve (12) panels, four(4) panels each along the x-direction and three(3) panels
each along the y-direction. The external edges are assumed simply supported while the internal edges of each
panel are assumed clamped. Edge......
Key Words: Two-wayContinuous Plate, Polynomial Displacement Functions, Fixed Edge Moment, Support Moment, Span Moment, Beam Analogy, Element Stiffness Method
[1]. Timoshenko,S.P&Woinowsky-Krieger.Theoryofplatesandshells.2nded.,NewYork; McGrawHills,1959
[2]. Szilard, R.. Theories and application of plate analysis. New Jersey, John Wiley & sons,2004.
[3]. Ventsel, E. &KrauthamerT.. Thin plates and shells: Theory, analysis and applications, NewYork, Marcel
Dekker, 2001.
[4]. Enem, J. I.. Geometrically nonlinear analysis of isotropic rectangular thin plates using Ritz method, PhD
Thesis: department of civil engineering Federal University of Technology, Owerri Nigeria,2018.
[5]. Njoku, C. F. Dynamic Analysis of rectangular thin isotropic plates using beam analogy method, PhD
Thesis: department of civil engineering Federal University of Technology, Owerri Nigeria,2018..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Comparative Study of Numerous Superconductive and Non- Superconductive Fault Current Restricting Systems Equipped For Service in a Power Network Of110 Kv/100 MW |
Country | : | India |
Authors | : | Vikas Ranjan || Deepak Kumar Barik |
Abstract: As it is known one of the most promising fault current limiting (FCL) devices for high-power electric
networks can be the so-called transformer type superconducting fault current limiter (SFCL) with the primary
winding connected to the load in series and the secondary one shortened by a fast-acting circuit - breaker.
These devices when made of conventional materials can be very large and expensive – e.g., for a 100 MW
circuit under protection the total mass of copper winding conductors can exceed 15 tons and the heat losses in a
normal operating mode can be more than 200 kW. Therefore, using of high-temperature superconductors
(HTSC) can be a solution which can sufficiently improve the mass, geometrical and operational characteristics
of an FCL. Unlike other superconducting AC.......
Key Word: fault current limiter; superconductor; transformer, short-circuit, AC losses; impedance
[1]. Shakaryan Yu.G., Novikov N.L. Platform Smart Grid, Energoexpert, 2009. No. 4, pp. 42-49 (in Russian).
[2]. Neklepayev B.N. Coordination and optimization of short-circuit currents levels in electric power systems. Moscow, Energiya, 1978,
152 p. (in Russian).
[3]. Enhancement of the reliability and durability of the United Power System of Russia. Edited by A.F. Dyakov, Publishing house of
the Moscow Power Engineering Institute, 1996, 112 p. (in Russian).
[4]. http://www.superpower-inc.com
[5]. Kopylov S.I., Balashov N.N., Ivanov S.S., Veselovsky A.S., Vysotsky V.S., Zhemerikin V.D. The effect of sectioning on the the
superconducting fault current limiter operation, IEEE Trans. Appl. Supercond., 2007, v. 17, No. 2, pp. 1799 – 1802.