This document discusses using game theory techniques to safeguard the automatic generation control (AGC) in smart grids from false data injection attacks. It first provides background on AGC and how false data can affect its performance and potentially cause blackouts. It then discusses using a game theory model to represent the interactions between attackers injecting false data and defenders protecting the system. The risks of different attack events are calculated and fed into the game model. Dynamic programming is used to determine optimal defense strategies based on resource constraints. Simulation results show the approach can minimize risks to the AGC under different attack scenarios.
This document discusses wide-area protection research in the context of the smart grid. It describes how technologies enabled by the smart grid like synchronized phasor measurement, improved communication networks, and standard protocols allow for the development of wide-area protection systems. These systems provide monitoring, control, and backup protection across large geographical areas. The document outlines some key technologies that wide-area protection relies on like wide-area measurement systems and communication networks. It also discusses trends like adaptive protection schemes that utilize system-wide information in real-time and agent-based control architectures.
A REVIEW OF SELF HEALING SMART GRIDS USING THE MULTIAGENT SYSTEM
This document reviews techniques for self-healing smart grids using multi-agent systems. It summarizes three papers that propose different multi-agent based approaches: 1) A distribution automation solution using substation, load, and restoration agents; 2) A cooperative agent architecture with bus, distributed generator, zone, and global agents; 3) An overload relief strategy using wide area measurements and a unified power flow controller. The techniques aim to automate fault detection, location, and restoration to improve grid reliability through self-healing capabilities.
This document discusses analytics for assessing cybersecurity risks in smart grids. It identifies several risk management practices for smart grids including the NIST supply chain risk management practice, Department of Energy risk management practice, and compliance with technical standards. It also maps the relationships between smart grid domains, actors, interfaces, and vulnerabilities based on NIST guidelines to identify high-risk areas and inform priority actions. Finally, it shows how risk identification and assessment can be conducted based on analyzing security objectives, impact levels, and relationships between smart grid components defined in NIST guidelines.
International Journal of Engineering (IJE) Volume (3) Issue (1)CSCJournals
This document discusses the implementation of artificial intelligence techniques for steady state security assessment in deregulated power system markets. It proposes using neural networks, decision trees, and adaptive neuro-fuzzy inference systems to analyze power transactions between generators and customers in deregulated systems. Data from load flow analysis is used to train and test the AI models. The techniques are tested on various standard power system test cases. The results show that neural networks provide more accurate and faster assessments compared to decision trees and neuro-fuzzy systems, but the latter two may be easier to implement for practical applications. The new methods could help improve security in planning and operating deregulated power system markets.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksIJERA Editor
In many sensor applications, the data collected from individual nodes is aggregated at a base station or host computer. To reduce energy consumption, many systems also perform in-network aggregation of sensor data at intermediate nodes enrooted to the base station. Most existing aggregation algorithms and systems do not include any provisions for security, and consequently these systems are vulnerable to a wide variety of attacks. In particular, compromised nodes can be used to inject false data that leads to incorrect aggregates being computed at the base station. We discuss the security vulnerabilities of data aggregation systems, and present a survey of robust and secure aggregation protocols that are resilient to false data injection attacks. The Proposed SHIA Algorithm builds on the Secure Hierarchical In-Network Aggregation, in order to achieve not only secure but also efficient WSN data collection over a series of aggregations.
Wide area protection-research_in_the_smart_gridAlaa Eladl
This document discusses wide-area protection research in the context of the smart grid. It describes how technologies enabled by the smart grid like synchronized phasor measurement, improved communication networks, and standard protocols allow for the development of wide-area protection systems. These systems provide monitoring, control, and backup protection across large geographical areas. The document outlines some key technologies that wide-area protection relies on like wide-area measurement systems and communication networks. It also discusses trends like adaptive protection schemes that utilize system-wide information in real-time and agent-based control architectures.
A REVIEW OF SELF HEALING SMART GRIDS USING THE MULTIAGENT SYSTEMijiert bestjournal
This document reviews techniques for self-healing smart grids using multi-agent systems. It summarizes three papers that propose different multi-agent based approaches: 1) A distribution automation solution using substation, load, and restoration agents; 2) A cooperative agent architecture with bus, distributed generator, zone, and global agents; 3) An overload relief strategy using wide area measurements and a unified power flow controller. The techniques aim to automate fault detection, location, and restoration to improve grid reliability through self-healing capabilities.
This document discusses analytics for assessing cybersecurity risks in smart grids. It identifies several risk management practices for smart grids including the NIST supply chain risk management practice, Department of Energy risk management practice, and compliance with technical standards. It also maps the relationships between smart grid domains, actors, interfaces, and vulnerabilities based on NIST guidelines to identify high-risk areas and inform priority actions. Finally, it shows how risk identification and assessment can be conducted based on analyzing security objectives, impact levels, and relationships between smart grid components defined in NIST guidelines.
Wide area protection-and_emergency_control (1)Alaa Eladl
This document discusses wide-area protection and emergency control in power systems. It describes how major disturbances can stress power systems beyond their planned operating limits due to unpredictable events. It explores using advanced wide-area monitoring and control systems based on communication and synchronization technologies to automatically detect and respond to disturbances across large regions in order to minimize their impacts. Such systems have potential to provide faster, more coordinated responses than traditional local protection schemes or human operators. The document outlines different types of power system disturbances and remedial measures needed to maintain stability.
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsIRJET Journal
This document discusses cyber threats and security approaches for cyber-physical systems (CPS). It first reviews studies on CPS security modeling and data management. It then discusses three main approaches for modeling and optimizing secure CPS: model-based design, platform-based design, and contract-based design. Next, it covers four methods for CPS risk assessment: expert elicitation models, attack graphs, game theory, and Petri nets. It concludes by discussing reachability analysis, controller synthesis, and vulnerability analysis techniques for verifying CPS models and properties.
An intrusion detection algorithm for amiIJCI JOURNAL
Nowadays, using the smart metering devices for energy users to manage a wide variety of subscribers,
reading devices for measuring, billing, disconnection and connection of subscribers’ connection
management is an important issue. The performance of these intelligent systems is based on information
transfer in the context of information technology, so reported data from network should be managed to
avoid the malicious activities that including the issues that could affect the quality of service the system. In
this paper for control of the reported data and to ensure the veracity of the obtained information, using
intrusion detection system is proposed based on the support vector machine and principle component
analysis (PCA) to recognize and identify the intrusions and attacks in the smart grid. Here, the operation of
intrusion detection systems for different kernel of SVM when using support vector machine (SVM) and PCA
simultaneously is studied. To evaluate the algorithm, based on data KDD99, numerical simulation is done
on five different kernels for an intrusion detection system using support vector machine with PCA
simultaneously. Also comparison analysis is investigated for presented intrusion detection algorithm in
terms of time - response, rate of increase network efficiency and increase system error and differences in
the use or lack of use PCA. The results indicate that correct detection rate and the rate of attack error
detection have best value when PCA is used, and when the core of algorithm is radial type, in SVM
algorithm reduces the time for data analysis and enhances performance of intrusion detection.
This document presents a preliminary study on developing a Wide Area Protection Monitoring System (WAPMS) that would automatically collect and analyze data from protection devices. The proposed system would gather information through various communication protocols, analyze the data to determine fault types and locations, and generate reports with diagnoses for operators. This would provide operators a comprehensive overview of the power system's behavior during faults to help make better decisions. The system is currently being tested in Colombia and future work involves predictive analytics to identify potential protection device failures.
Fuzzy Logic Method in SCADA to Optimize Network Electric Power Smart GridIJRESJOURNAL
Abstract: Smart grid is one of the solutions in terms of distribution of electricity to make it more effective and reliable. One of the main functions of the smart grid is to provide an important role in maintaining the reliability of electricity supply. Some sections in the smart grid include existing equipment at the site and the central computer. In order to convey the data from the site plant to the central computer, it needs a smart grid instrument controllers like SCADA. SCADA has a role to monitor, control, and communicate in two-ways between equipment on the site plant and the central computer. In SCADA systems, we often experience difficulty in obtaining data such as uncertainty of data and non-precision data. Then a method to overcome it is needed. In this study, Fuzzy Logic is used to detect network conditions toward the aspects of loading and the interference of overcurrent. Using four input variables with three and four linguistic value and four output variable with two linguistic value has resulted in eighty one rule base. Identification of faults was conducted by how big the DC voltage and the current. Once validated by SCADA systems and the use of Fuzzy Logic, we obtained 97.53% of the perfection of the system.
In this paper prepared a systems to that amount the units of the fitness about structural elements within Reinforced Concrete (RC), at total times, partially atop the perfect coverage concerning sensors is provided. As a result, the records about the distances within the sensor’s near nodes and its sensing areas are the only want because concerning every sensor into the recent algorithms. Furthermore, based totally completely regarding the simulations, great improvement performs stay seen along the lifespan regarding a variety concerning existing lifespan maximization algorithms, anybody is a cease end result related to the newly proposed algorithm. The promoted sensor mark hard-ware trigger the PZT sensor and collect the responses acquires beyond the structural element. It moreover send collected information to an information middle because of similarly science yet analysis within an energy efficient manner using low power wireless verbal exchange technology. The brought ingress in conformity with and the evaluation atop the accrued information operate lie remotely executed by means of using a net interface. Performance effects showcase therefore a good deal the fractures great enough within consequence including purpose structural problems be able continue to be efficiently detected together with the promoter rule
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION Editor IJCATR
The key idea of our Energy Efficiency management is to use the exchange between energy consumption vs the gain in responsibility, timeliness, and security to maximize the system helpful time period. we tend to formulate the exchange as Associate in Nursing optimization downside for dynamically crucial the most effective redundancy level to use to multipath routing for intrusion tolerance so the question response success likelihood is maximized whereas prolonging the helpful time period. Moreover, we think about this optimization downside for the case during which a voting-based distributed intrusion detection formula is applied to sight and evict malicious nodes during a HWSN. we over see to develop a novel likelihood model to investigate the most effective redundancy level in terms of path redundancy and supply redundancy, further because the best intrusion detection settings in terms of the amount of voters and the intrusion invocation interval below that the time period of a HWSN is maximized. we over see to then apply the analysis results obtained to the planning of a dynamic redundancy management formula to identify and apply the most effective style parameter settings at runtime in response to environmental changes, to maximize the HWSN lifetime.
This article is divided into three parts: the first presents a simulation study of the effect of occupancy level on energy usage pattern of Engineering building of Applied Science Private university, Amman, Jordan. The simulation was created on simulation mechanism by means of EnergyPlus software and improved by using the building’s data such as building’s as built plan, occupant’s density level based on data about who utilize the building throughout operational hours, energy usage level, Heating Ventilating and air conditioning (HVAC) system, lighting and its control systems and etc. Data regarding occupancy density level estimation is used to provide the proposed controller with random number of users grounded on report were arranged by the university’s facilities operational team. The other division of this paper shows the estimated saved energy by the means of suggested advanced add-on, FUZZY-PID controlling system. The energy savings were divided into summer savings and winter savings. The third division presents economic and environmental analysis of the proposed advanced fuzzy logic controllers of smart buildings in Subtropical Jordan. The economic parameters that were used to evaluate the system economy performance are life-cycle analysis, present worth factor and system payback period. The system economic analysis was done using MATLAB software.
Cybersecurity for Smart Grids: Vulnerabilities and Strategies to Provide Cybe...Leonardo ENERGY
This Cybersecurity webinar addresses issues of importance to executive, technical, and academic professionals involved with managing and protecting Electric Utilities and Smart Grids. Cyber threats and vulnerabilities, including cyber attacks, will be addressed; as well as Smart Grid trends, and privacy and data integrity issues. United States, European, and International organizations and initiatives to address cybersecurity for utilities will be discussed. The webinar will conclude with strategies to improve cybersecurity. A second cybersecurity webinar (programmed in September 2017) will address best practices, case studies, and legal and regulatory constraints for architecting smart grids in a secure way.
INTERVAL TYPE-2 FUZZY NEURAL NETWORKS FOR SHORT-TERM ELECTRIC LOAD FORECASTIN...ijsc
This paper focuses on the study of short term load forecasting (STELF) using interval Type-2 Fuzzy Logic (IT2FL) and feed-forward Neural Network with back-propagation (NN-BP) tuning algorithm to improve their approximation capability, flexibility and adaptiveness. IT2FL for STELF is presented which provides
additional degrees of freedom for handling more uncertainties for improving prediction accuracy and reducing cost. The IT2FL comprises five components which include; the fuzzification unit, the knowledge base, the inference engine, the type reducer and the defuzzification unit. Gaussian membership function is
used to show the degree of membership of the input variables. The lower and upper membership functions (fired rules) as well as their consequent coefficients of IT2FL are fed into a (NN) which produces a crisp value coresponding to the optimal defuzzified output of IT2FLSs. The NN type reducer is trained to
optimize parameters of membership function (MF) so as to produce an output with minimum error function with the purpose of improving forecasting performance of IT2FLS models. The IT2FNN system has the ability to overcome the limitations of individual technique and enhances their strengths to handle electric load forecasting. The IT2FNN is applied for STELF in Akwa Ibom State-Nigeria. The result of performance
of IT2FNN is compared with IT2FLS and T1FLS methods for short term load forecasting with MSE of 0.00123, 0.00185 and 0.00247 respectively. Also, the results of forecasting are compared using RMSE of 0.035, 0.043 and 0.035 respectively, indicating a best accurate forecasting with IT2FNN. In addition, the result of performance of IT2FNN is compared with IT2FLS and T1FLS methods for short term load forecasting with MAPE of 1.5%, 3% and 4.5% respectively. Simulation results show that the IT2FNN approach takes advantages of accuracy and efficiency and performs better in prediction than IT2FL and
T1FL methods in power load forecasting task. .
AC drives are employed in process industries for varying applications resulting in a wide range of ratings. The entire process industry has seen a paradigm shift from manual to automated systems. The major factor contributing to this is the advanced power electronics technology enabling power electronic drives for smooth control of electric motors. Induction motors are most commonly used in industries. Faults in the power electronic circuits may occur periodically. These faults often go unnoticed as they rarely cause a complete shutdown and the fault levels may not be large enough to lead to a breakdown of the drive. An early detection of these faults is required to prevent their escalation into major faults. The diagnostic tool for detection of faults requires real time monitoring of the entire drive. In this work, detailed investigation of different faults that can occur in the power electronic circuit of an industrial drive is carried out. Analysis and impact of faults on the performance of the induction motor is presented. A real time monitoring platform is proposed to detect and classify the fault accurately using machine learning. A diagnostic tool also is developed to display the severity and location of the fault to the operator to take corrective measures.
Mobile Coordinated Wireless Sensor Networks with Fault-Tolerance for Structur...rahulmonikasharma
This document discusses a mobile coordinated wireless sensor network (MC-WSN) approach for structural health monitoring applications with fault tolerance. The key points are:
1) The MC-WSN uses mobile access points to coordinate the sensor network and collect data directly from sensors to improve energy efficiency. Backup sensors are placed at critical points to ensure fault tolerance if primary sensors fail.
2) A backup sensor placement algorithm is proposed to search for and place backup sensors at locations that are likely future failure points.
3) Simulations show the MC-WSN approach improves network lifetime and maintains data throughput independently of the mobile access point's physical speed. The fault tolerance mechanism is evaluated using real sensor data and is shown to
IRJET - Detection of False Data Injection Attacks using K-Means Clusterin...IRJET Journal
This document discusses detecting false data injection attacks in networks using k-means clustering. It proposes a system that uses a camera to detect inside attacks on a sub-network. When an outside person pauses the camera for a certain period of time, the server will detect this as an inside attack and inform the administrator. The system aims to improve network security by identifying these inside attacks using k-means clustering algorithm to classify sensor measurements and detect false data injected by attackers.
This document discusses detecting false data injection attacks using k-means clustering. It begins with an abstract that describes implementing detection of inside attacks in a sub-network using cameras. When an outside person pauses the camera for a specific amount of time, the server can detect this as an inside attack and notify the administrator. The document then reviews related work on cyber attacks against power grids and state estimation. It proposes a system using cameras to monitor for inside attackers pausing cameras. When this occurs, the server will detect an inside attack and inform the administrator. The key algorithm discussed is k-means clustering to classify sensor data and detect attacks.
This document discusses issues related to smart grid resilience and proposed enhancements. It begins with an introduction to smart grids and the concept of resilience. Major issues discussed include cyber threats like false data injection attacks and denial-of-service attacks, as well as natural disasters. Several enhancement techniques are then proposed, such as using energy storage systems, distributed energy resources, microgrids, and blockchain technology. The document focuses on cybersecurity issues in more depth, outlining various false data injection attacks and their potential impacts. It also discusses denial-of-service attacks and proposes detection and mitigation methods. Overall, the document analyzes resilience challenges in smart grids and presents technical solutions aimed at improving system reliability and recovery capabilities.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Smart Grid Systems Based Survey on Cyber Security IssuesjournalBEEI
The future power system will be an innovative administration of existing power grids, which is called smart grid. Above all, the application of advanced communication and computing tools is going to significantly improve the productivity and consistency of smart grid systems with renewable energy resources. Together with the topographies of the smart grid, cyber security appears as a serious concern since a huge number of automatic devices are linked through communication networks. Cyber attacks on those devices had a direct influence on the reliability of extensive infrastructure of the power system. In this survey, several published works related to smart grid system vulnerabilities, potential intentional attacks, and suggested countermeasures for these threats have been investigated.
Fault Prediction and Interdependencies Identification in Smart Grids Using De...IRJET Journal
This document proposes using an artificial neural network model to predict faults and identify interdependencies in smart grids. It discusses smart grids as cyber-physical systems and how failures can cascade across networks. It describes collecting data by simulating faults on an IEEE 57-bus system and identifying interdependencies using a weighted directed graph. The proposed approach uses an artificial neural network trained on the collected data to predict fault sequences with over 99% accuracy on both simple and complex test data, helping grid operators mitigate failures.
IRJET- False Data Injection Attacks in Insider AttackIRJET Journal
This document discusses false data injection attacks and insider threats in computer networks. It proposes a system that uses cameras to detect when an unauthorized external person enters a restricted area of a network for an extended period of time. When this suspicious activity is detected, the system will notify administrators about a potential insider attack. The system aims to increase network security by monitoring for insider threats and detecting unauthorized access. It analyzes existing research on false data injection attacks and vulnerabilities in state estimation systems. The proposed architecture and algorithms, such as Bloom filters and AES encryption, are designed to securely detect and report insider threats in computer networks.
On-line Power System Static Security Assessment in a Distributed Computing Fr...idescitation
The computation overhead is of major concern when
going for increased accuracy in online power system security
assessment (OPSSA). This paper proposes a scalable solution
technique based on distributed computing architecture to
mitigate the problem. A variant of the master/slave pattern is
used for deploying the cluster of workstations (COW), which
act as the computational engine for the OPSSA. Owing to the
inherent parallel structure in security analysis algorithm, to
exploit the potential of distributed computing, domain
decomposition is adopted instead of functional decomposition.
The security assessment is performed utilizing the developed
composite security index that can accurately differentiate the
secure and non-secure cases and has been defined as a function
of bus voltage and line flow limit violations. Validity of
proposed architecture is demonstrated by the results obtained
from an intensive experimentation using the benchmark IEEE
57 bus test system. The proposed framework, which is scalable,
can be further extended to intelligent monitoring and control
of power system
A Defense-in-depth Cybersecurity for Smart SubstationsIJECEIAES
The increase of cyber-attacks on industrial and power systems in the recent years make the cybersecurity of supervisory control and data acquisition and substation automation systemsa high important engineering issue. This paper proposes a defense in depth cybersecurity solution for smart substations in different layers of the substation automation system. In fact, it presents possible vulnerabilities in the substation automation system and propose a multiple layer solution based on best practice in cyber security such as the hardening ofdevices, whitelisting, network configuration, network segmentation, role-based account management and cyber security management and deployement.
Recent changes to the existing power grid are expected to influence the way energy is provided and consumed by customers. Advanced Metering Infrastructure (AMI) is a tool to incorporate these changes for modernizing the electricity grid. Growing energy needs are forcing government agencies and utility companies to move towards AMI systems as part of larger smart grid initiatives. The smart grid promises to enable a more reliable, sustainable, and efficient power grid by taking advantage of information and communication technologies. However, this information-based power grid can reveal sensitive private information from the user’s perspective due to its ability to gather highly granular power consumption data. This has resulted in limited consumer acceptance and proliferation of the smart grid. Hence, it is crucial to design a mechanism to prevent the leakage of such sensitive consumer usage information in
smart grid. Among different solutions for preserving consumer privacy in Smart Grid Network(SGN), private data aggregation techniques have received a tremendous focus from security researchers. Existing privacy-preserving aggregation mechanisms in SGNs utilize cryptographic techniques, specifically homomorphic properties of public-key cryptosystems. Such homomorphic approaches are bandwidthintensive (due to large output blocks they generate), and in most cases, are computationally complex. In this paper, we present a novel and efficient CDMA-based approach to achieve privacy-preserving aggregation in SGNs by utilizing random perturbation of power consumption data and with limited use of traditional cryptography. We evaluate and validate the efficiency and performance of our proposed privacy preserving data aggregation scheme through extensive statistical analyses and simulations.
Anomalies detection for smart-home energy forecasting using moving averageIJECEIAES
In the past few years, the increase in the relation between the physical and digital world over the internet was witnessed. Even though the applications can enhance smart home systems, it is still early stages and challenges in the field of internet of things (IoT). An extreme level of data quality (DQ) system management is essential to produce a meaningful vision. However, in most home energy management system has no straightforward process of removing abnormal data. Hence, the research aims to propose and validate the model of anomaly detection for power consumption in real-time. The moving average (MA) approach identifies and removes abnormal energy consumption data. The results obtained from the forecasting time series auto regressive integrated moving average (ARIMA) model demonstrated that the proposed heuristics effectively enhanced energy usage forecasting. The selection of optimum parameter values for the MA was comprehended for time-series forecasting error minimization by comparing mean squared error (MSE). These outcomes proved the effectiveness of the existing technique and precision of choice of the appropriate. Therefore, the method can effectively route the cleaned sequence data streams in a real-time environment, which is valuable for spotting the anomalies and eliminating for enhancing energy usage time series.
JPJ1439 On False Data-Injection Attacks against Power System State Estimation...chennaijp
We are good IEEE java projects development center in Chennai and Pondicherry. We guided advanced java technologies projects of cloud computing, data mining, Secure Computing, Networking, Parallel & Distributed Systems, Mobile Computing and Service Computing (Web Service).
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/java-projects/
This document summarizes a research paper that proposes a design for a secure and sophisticated electricity meter called an Impregnable Device for Secured Metering (IDSM). The IDSM uses a microcontroller integrated with a smart meter to securely transmit power consumption data via a legacy Wi-Fi system. Random number addressing cryptography (RAC) is used for encryption due to its high speed, low power usage, and security. The IDSM system connects individual household meters to a centralized server that calculates billing amounts and sends updates back to the meters for display. The goal is to provide secure metering and billing that reduces human error and electricity theft while lowering costs.
This document summarizes a research paper that proposes a design for a secure, Wi-Fi integrated electricity meter called an Impregnable Device for Secured Metering (IDSM). The IDSM consists of a sophisticated meter with additional security features compared to traditional meters. It uses Wi-Fi communication, a microcontroller, and a centralized monitoring and control unit. Random number addressing cryptography (RAC) is chosen as the most secure encryption technique. The meter in each home connects via a wireless network to a server that calculates billing amounts and sends updates to be displayed on the home meter, reducing labor while increasing transparency. The design aims to provide secure communication at high speeds with an advanced metering system and unique database backend.
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET Journal
This document discusses securing the Ad-Hoc On-Demand Distance Vector (AODV) routing protocol from wormhole attacks in mobile ad-hoc networks. It proposes using clustering to mitigate the effects of wormhole attacks. Wormhole attacks are powerful attacks in ad-hoc networks that involve tunneling network traffic between two colluding attackers. The document reviews related work on clustering algorithms, TCP and SYN cookies, security-enhanced RFID systems, wormhole detection algorithms, analyzing the impact of wormhole attacks, and new clustering protocols for mobile ad-hoc networks. It aims to simulate the effect of wormhole attacks on AODV and analyze network performance with and without such attacks using the NS2 network simulator.
SECURE TRANSMISSION OF DATA IN SMART GRID WITH THE AID OF ELLIPTIC CURVE CRYP...IAEME Publication
A smart grid represents a straightforward improvement of a power grid, which effectively hands over electricity from suppliers to clients. It generally uses a two-way digital communication with an eye on managing the devices at client households. They are also competent to conserve energy, scale down overhead costs and to enhance consistency and lucidity. It is home to smart meters, which pave the way for communication with the main central system. As against home energy monitors, smart meters are capable of collecting data for distant reporting. The distribution or receipt of the data is very safely carried out to safeguard the confidentiality of the client power utilization and also to ensure continuous power distribution. Therefore, the cryptography technique is effectively used for increasing the safety and for furnishing the consistent power supply for the uninterrupted power distribution.
Intrusion Detection for HealthCare Network using Machine LearningIRJET Journal
1) The document discusses using machine learning techniques for intrusion detection in healthcare networks. It aims to build an effective intrusion detection system that can efficiently detect intrusions and provide safety for sensitive patient health information and medical data.
2) The methodology involves pre-processing the NSL-KDD dataset, training a decision tree classifier model, and using the trained model to predict intrusions. Accuracy of 90.3% was achieved using cross-validation.
3) Future work could include using all dataset features, immediately alerting administrators of attacks, and making the system multi-lingual. The system aims to provide secure access of healthcare data for authorized users and detect unauthorized access attempts.
Modeling and Simulation of the Communication Networks in.docxannandleola
Modeling and Simulation of the Communication
Networks in Smart grid
Yizhou Dong, Ziyuan Cai, Ming Yu, and Mischa Sturer
Dept. of Electrical & Computer Engineering
FAMU-FSU College of Engineering, FL 32310, USA.
[email protected], [email protected], [email protected], [email protected]
Abstract—A reliable and secure communication network plays
a significant role in Smart grid systems, which aims at
coordinating generation, transmission, distribution, and
consumption parts in power system. The scope of our work
ranges from utility level to end consumption level. The major
difficulties in this work can be summarized as follows: 1)
Performance requirements from the viewpoint of network have
not been clearly defined; 2) Model mapping from power system
to communication networks is not straightforward. 3) Network
performance has not been well-investigated. This paper
proposes a communication network model for a typical
program of smart gird. Moreover, application requirements,
link capacity and traffic settings have been investigated.
Simulation results validate the feasibility of this model and
provide useful network performances which can satisfy both
the non-real-time and real-time application requirements.
Keywords-Smart Grid; Communication Network; Simulation;
Performance; FREEDM; IFM
I. INTRODUCTION
Smart grid becomes to an attractive dominating topic
nowadays in both research universities and industrial
organization. The traditional power communication
infrastructure cannot meet the requirements for our future
power system which the energy will not only generated by
traditional generation facilities but also produced by
distributed facilities and new energy devices. The delivery of
both energy and information must also be end-to-end and
bidirectional. Communication network should interconnect
every device of power system from electricity generation to
end-user consumption, and even more. One view need to be
point out is that, in physical layer, geographic location for
power electricity device and communication network device
can be dissimilar.
NIST published the first definition of Smart Grid in 2009
which represent smart grid standardization in North
American. The networking parts proposed by NIST
emphasize the transformation from traditional power
communication networks to Information and Communication
Technology (ICT), which indicates that both energy and
information transmission must be bidirectional for all levels.
[1] In Europe, European Technology Platform also issued
standards to define smart grid as the target architecture which
enable all users’ connection, including generators,
transmission, and consumers. Other national organizations
and industrial companies also boost the development of
smart grid by provides the recommend standards and
proposals like The German Smart Grid Standardization
Roadmap concentrate their attentions ...
Secure authentication and data aggregation scheme for routing packets in wire...IJECEIAES
Wireless sensor networks (WSNs) comprise a huge number of sensors that sense real-time data; in general, WSNs are designed for monitoring in various application mainly internet of things based (IoT) application. Moreover, these sensors possess a certain amount of energy i.e., they are battery based; thus, the network model must be efficient. Furthermore, data aggregation is a mechanism that minimizes the energy; however, in addition, these aggregated data and networks can be subject to different types of attacks due to the vulnerable characteristics of the network. Hence it is important to provide end-to-end security in the data aggregation mechanism in this we design and develop dual layer integrated (DLI)-security architecture for secure data aggregation; DLI-security architecture is an integration of two distinctive layers. The first layer of architecture deals with developing an authentication for reputation-based communication; the second layer of architecture focuses on securing the aggregated data through a consensus-based approach. The experiment outcome shows that DLI identifies the correct data packets and discards the unsecured data packets in energy efficient way with minimal computation overhead and higher throughput in comparison with the existing model.
Similar to Safeguard the Automatic Generation Control using Game Theory Technique (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...YanKing2
Pre-trained Large Language Models (LLM) have achieved remarkable successes in several domains. However, code-oriented LLMs are often heavy in computational complexity, and quadratically with the length of the input code sequence. Toward simplifying the input program of an LLM, the state-of-the-art approach has the strategies to filter the input code tokens based on the attention scores given by the LLM. The decision to simplify the input program should not rely on the attention patterns of an LLM, as these patterns are influenced by both the model architecture and the pre-training dataset. Since the model and dataset are part of the solution domain, not the problem domain where the input program belongs, the outcome may differ when the model is trained on a different dataset. We propose SlimCode, a model-agnostic code simplification solution for LLMs that depends on the nature of input code tokens. As an empirical study on the LLMs including CodeBERT, CodeT5, and GPT-4 for two main tasks: code search and summarization. We reported that 1) the reduction ratio of code has a linear-like relation with the saving ratio on training time, 2) the impact of categorized tokens on code simplification can vary significantly, 3) the impact of categorized tokens on code simplification is task-specific but model-agnostic, and 4) the above findings hold for the paradigm–prompt engineering and interactive in-context learning and this study can save reduce the cost of invoking GPT-4 by 24%per API query. Importantly, SlimCode simplifies the input code with its greedy strategy and can obtain at most 133 times faster than the state-of-the-art technique with a significant improvement. This paper calls for a new direction on code-based, model-agnostic code simplification solutions to further empower LLMs.
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...IJAEMSJORNAL
This study primarily aimed to determine the best practices of clothing businesses to use it as a foundation of strategic business advancements. Moreover, the frequency with which the business's best practices are tracked, which best practices are the most targeted of the apparel firms to be retained, and how does best practices can be used as strategic business advancement. The respondents of the study is the owners of clothing businesses in Talavera, Nueva Ecija. Data were collected and analyzed using a quantitative approach and utilizing a descriptive research design. Unveiling best practices of clothing businesses as a foundation for strategic business advancement through statistical analysis: frequency and percentage, and weighted means analyzing the data in terms of identifying the most to the least important performance indicators of the businesses among all of the variables. Based on the survey conducted on clothing businesses in Talavera, Nueva Ecija, several best practices emerge across different areas of business operations. These practices are categorized into three main sections, section one being the Business Profile and Legal Requirements, followed by the tracking of indicators in terms of Product, Place, Promotion, and Price, and Key Performance Indicators (KPIs) covering finance, marketing, production, technical, and distribution aspects. The research study delved into identifying the core best practices of clothing businesses, serving as a strategic guide for their advancement. Through meticulous analysis, several key findings emerged. Firstly, prioritizing product factors, such as maintaining optimal stock levels and maximizing customer satisfaction, was deemed essential for driving sales and fostering loyalty. Additionally, selecting the right store location was crucial for visibility and accessibility, directly impacting footfall and sales. Vigilance towards competitors and demographic shifts was highlighted as essential for maintaining relevance. Understanding the relationship between marketing spend and customer acquisition proved pivotal for optimizing budgets and achieving a higher ROI. Strategic analysis of profit margins across clothing items emerged as crucial for maximizing profitability and revenue. Creating a positive customer experience, investing in employee training, and implementing effective inventory management practices were also identified as critical success factors. In essence, these findings underscored the holistic approach needed for sustainable growth in the clothing business, emphasizing the importance of product management, marketing strategies, customer experience, and operational efficiency.
Conservation of Taksar through Economic RegenerationPriyankaKarn3
This was our 9th Sem Design Studio Project, introduced as Conservation of Taksar Bazar, Bhojpur, an ancient city famous for Taksar- Making Coins. Taksar Bazaar has a civilization of Newars shifted from Patan, with huge socio-economic and cultural significance having a settlement of about 300 years. But in the present scenario, Taksar Bazar has lost its charm and importance, due to various reasons like, migration, unemployment, shift of economic activities to Bhojpur and many more. The scenario was so pityful that when we went to make inventories, take survey and study the site, the people and the context, we barely found any youth of our age! Many houses were vacant, the earthquake devasted and ruined heritages.
Conservation of those heritages, ancient marvels,a nd history was in dire need, so we proposed the Conservation of Taksar through economic regeneration because the lack of economy was the main reason for the people to leave the settlement and the reason for the overall declination.
Development of Chatbot Using AI/ML Technologiesmaisnampibarel
The rapid advancements in artificial intelligence and natural language processing have significantly transformed human-computer interactions. This thesis presents the design, development, and evaluation of an intelligent chatbot capable of engaging in natural and meaningful conversations with users. The chatbot leverages state-of-the-art deep learning techniques, including transformer-based architectures, to understand and generate human-like responses.
Key contributions of this research include the implementation of a context- aware conversational model that can maintain coherent dialogue over extended interactions. The chatbot's performance is evaluated through both automated metrics and user studies, demonstrating its effectiveness in various applications such as customer service, mental health support, and educational assistance. Additionally, ethical considerations and potential biases in chatbot responses are examined to ensure the responsible deployment of this technology.
The findings of this thesis highlight the potential of intelligent chatbots to enhance user experience and provide valuable insights for future developments in conversational AI.
An Internet Protocol address (IP address) is a logical numeric address that is assigned to every single computer, printer, switch, router, tablets, smartphones or any other device that is part of a TCP/IP-based network.
Types of IP address-
Dynamic means "constantly changing “ .dynamic IP addresses aren't more powerful, but they can change.
Static means staying the same. Static. Stand. Stable. Yes, static IP addresses don't change.
Most IP addresses assigned today by Internet Service Providers are dynamic IP addresses. It's more cost effective for the ISP and you.
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...IJAEMSJORNAL
This study aimed to profile the coffee shops in Talavera, Nueva Ecija, to develop a standardized checklist for aspiring entrepreneurs. The researchers surveyed 10 coffee shop owners in the municipality of Talavera. Through surveys, the researchers delved into the Owner's Demographic, Business details, Financial Requirements, and other requirements needed to consider starting up a coffee shop. Furthermore, through accurate analysis, the data obtained from the coffee shop owners are arranged to derive key insights. By analyzing this data, the study identifies best practices associated with start-up coffee shops’ profitability in Talavera. These findings were translated into a standardized checklist outlining essential procedures including the lists of equipment needed, financial requirements, and the Traditional and Social Media Marketing techniques. This standardized checklist served as a valuable tool for aspiring and existing coffee shop owners in Talavera, streamlining operations, ensuring consistency, and contributing to business success.
Encontro anual da comunidade Splunk, onde discutimos todas as novidades apresentadas na conferência anual da Spunk, a .conf24 realizada em junho deste ano em Las Vegas.
Neste vídeo, trago os pontos chave do encontro, como:
- AI Assistant para uso junto com a SPL
- SPL2 para uso em Data Pipelines
- Ingest Processor
- Enterprise Security 8.0 (Maior atualização deste seu release)
- Federated Analytics
- Integração com Cisco XDR e Cisto Talos
- E muito mais.
Deixo ainda, alguns links com relatórios e conteúdo interessantes que podem ajudar no esclarecimento dos produtos e funções.
https://www.splunk.com/en_us/campaigns/the-hidden-costs-of-downtime.html
https://www.splunk.com/en_us/pdfs/gated/ebooks/building-a-leading-observability-practice.pdf
https://www.splunk.com/en_us/pdfs/gated/ebooks/building-a-modern-security-program.pdf
Nosso grupo oficial da Splunk:
https://usergroups.splunk.com/sao-paulo-splunk-user-group/
In May 2024, globally renowned natural diamond crafting company Shree Ramkrishna Exports Pvt. Ltd. (SRK) became the first company in the world to achieve GNFZ’s final net zero certification for existing buildings, for its two two flagship crafting facilities SRK House and SRK Empire. Initially targeting 2030 to reach net zero, SRK joined forces with the Global Network for Zero (GNFZ) to accelerate its target to 2024 — a trailblazing achievement toward emissions elimination.
Online music portal management system project report.pdfKamal Acharya
The iMMS is a unique application that is synchronizing both user
experience and copyrights while providing services like online music
management, legal downloads, artists’ management. There are several
other applications available in the market that either provides some
specific services or large scale integrated solutions. Our product differs
from the rest in a way that we give more power to the users remaining
within the copyrights circle.
A vernier caliper is a precision instrument used to measure dimensions with high accuracy. It can measure internal and external dimensions, as well as depths.
Here is a detailed description of its parts and how to use it.
A brief introduction to quadcopter (drone) working. It provides an overview of flight stability, dynamics, general control system block diagram, and the electronic hardware.
A brand new catalog for the 2024 edition of IWISS. We have enriched our product range and have more innovations in electrician tools, plumbing tools, wire rope tools and banding tools. Let's explore together!
How to Manage Internal Notes in Odoo 17 POSCeline George
In this slide, we'll explore how to leverage internal notes within Odoo 17 POS to enhance communication and streamline operations. Internal notes provide a platform for staff to exchange crucial information regarding orders, customers, or specific tasks, all while remaining invisible to the customer. This fosters improved collaboration and ensures everyone on the team is on the same page.