IRJEAS

INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING & APPLIED SCIENCES

ISSN 2322-0821(E), ISSN 2394-9910(P)

An ISO 9001:2015 Certified Publication

Volume 10 Issue 3                          July-September 2022

Original Article

LICENCED UNDER

FIND ON

CROSSMARK

Implementation of Fuzzy Logic Controller Based DSTATCOM for Power Quality Enhancement in Distribution Systems

 https://doi.org/10.55083/irjeas.2022.v10i03001

Country- INDIA

  Jatinder Pal Singh, Arshdeep Singh

PAPER ID: IRJEAS04V10I307220922000001

Published: 10 July 2022

Journal: IRJEAS, Volume 10, Issue 3

Pages: 01-09

Keywords:

Abstract: This research work, presents Fuzzy Logic Controller (FLC) based D-STATCOM for power quality (PQ) enhancement in power distribution network. In the power distribution system, PQ is the major issue that is occurring due to non-linearity and dynamic changes in the connected loads. The proposed work utilizes FLC for generating switching Pulses for IGBT switches in the D-STATCOM to enhance quality of power in distribution systems. This research work also shows superior performance over conventional PI controllers in mitigation of harmonics by using proposed FLC topology. The proposed system is simulated with Matlab/Simulink software to ensure effective realization.

Cite this Article

Jatinder Pal Singh, Arshdeep Singh. Implementation of Fuzzy Logic Controller Based DSTATCOM for Power Quality Enhancement in Distribution Systems. International Research Journal of Engineering & Applied Sciences (IRJEAS).10(3), pp. 01-09, 2022. https://doi.org/10.55083/irjeas.2022.v10i03001.

Review Article

LICENCED UNDER

FIND ON

CROSSMARK

A Taxonomy of Security and Research Challenges in Cloud Computing

 https://doi.org/10.55083/irjeas.2022.v10i03002

Country- INDIA

 Umang Garg , Neha Gupta, Dr. Mahesh Manchanda

PAPER ID: IRJEAS04V10I307220922000002

Published: 10 July 2022

Journal: IRJEAS, Volume 10, Issue 3

Pages: 10-23

Keywords:

Abstract: Cloud computing is delivered as a storage service by third party. It gains wide acceptance from various Business organizations & Information Technology (IT) Industries. Cloud computing provides various services to users through the internet; those services are like Applications, computation, and storage etc. In spite of these advantages, cloud technology faces different types of privacy and security related issues. These issues become major barriers to adopt cloud technology into various organizations. This survey paper addresses the cloud architecture, various security and privacy issues, challenges and threats, attacks, and future research directions to overcome the security and privacy related problems in the cloud environment.

Cite this Article

Umang Garg, Neha Gupta, Dr. Mahesh Manchanda. A Taxonomy of Security and Research Challenges in Cloud Computing. International Research Journal of Engineering & Applied Sciences (IRJEAS). 10(3), pp. 10-23, 2022. https://doi.org/10.55083/irjeas.2022.v10i03002.

Original Article

LICENCED UNDER

FIND ON

CROSSMARK

Optimal Task Scheduling for Cloud Computing Using Rao Algorithm

 https://doi.org/10.55083/irjeas.2022.v10i03003

Country- INDIA

 Amrik Singh, Puneet Jain, Ajay Kumar

PAPER ID: IRJEAS04V10I307220922000003

Published: 10 July 2022

Journal: IRJEAS, Volume 10, Issue 3

Pages: 24-33

Keywords:

Abstract: Internet-based provision of computer resources is known as cloud computing. It is possible to utilise data that is controlled by a third party or some other individual at a distant place through cloud computing. Service Level Agreements (SLAs) are used by the majority of Cloud providers to define the services they provide. As part of the SLA, the service provider promises a certain level of quality of the service. Computing and data clouds are two sorts of clouds in a cloud-based system. In cloud technology, task scheduling is critical to ensuring service quality and SLA. One of the most important aspects of cloud computing is a well-organized work schedule. In this article, we have designed an optimal task scheduling method using RAO approach. The RAO algorithm is simple, required number of parameters, and required no tuning of parameters as compared to the other algorithm. Further, a multi-objective function is designed based on RAO algorithm performs the optimal scheduling. The performance evaluation is done by considering number of tasks such as 50,100,200, 300,400, and 500. Further, number of performance metrics are determined for it. The outcomes represents that the presented technique provides lesser values of AWT, ATT, and make span over the existing method.

Cite this Article

Amrik Singh, Puneet Jain, Ajay Kumar. Optimal Task Scheduling for Cloud Computing using RAO Algorithm. International Research Journal of Engineering & Applied Sciences (IRJEAS). 10(3), pp. 24-33, 2022. https://doi.org/10.55083/irjeas.2022.v10i03003.

Original Article

LICENCED UNDER

FIND ON

CROSSMARK

Analysis and Detection of Fraud in Credit Card Using SILOF

 https://doi.org/10.55083/irjeas.2022.v10i03006

Country- PERU

 Franklin Ore-Areche, Kelyn Nataly Muñoz-Alejo, Cledi Puma-Condori

PAPER ID: IRJEAS04V10I307220922000006

Published: 06August 2022

Journal: IRJEAS, Volume 10, Issue 3

Pages: 34-41

Keywords:

Abstract: Nowadays e-commerce and online transaction is growing rapidly. For online and offline transaction most of the customer uses credit card. Credit card used globally for online transaction, buy goods, product, and payment. The rising use of credit card can increase the chances of fraud in credit card. Credit card system is at risk now. The effect of this fraudulent transaction is on the bank and institute causing a financial loss to them. For the detection of distinguish frauds, several machine learning models are utilized for better prediction. The major objective of this article is to identify the fraudulent transaction and outlier in credit card transaction. The dataset of credit card is unbalanced. There are various techniques by which fraudulent transaction can be detected and we have used these techniques such as isolation forest method, local outlier factor and support vector machine to determine fraud in credit card. We have used different matrices for enhancing the performance and accuracy. At last comparison analysis is done by using isolation forest, support vector machine, and local outlier which give the better result.

Cite this Article

Franklin Ore-Areche, Kelyn Nataly Muñoz-Alejo, Cledi Puma-Condori. Analysis and Detection of Fraud in Credit Card Using SILOF. International Research Journal of Engineering & Applied Sciences (IRJEAS).  10(3), pp. 34-41, 2022. https://doi.org/10.55083/irjeas.2022.v10i03006.

Original Article

LICENCED UNDER

FIND ON

CROSSMARK

Artificial Intelligence Based Zero Trust Network 

 https://doi.org/10.55083/irjeas.2022.v10i03013

Country- USA

  Priya Parameswarappa

PAPER ID: IRJEAS04V10I307220922000013

Published: 04 September 2022

Journal: IRJEAS, Volume 10, Issue 3

Pages: 42-48

Keywords:

Abstract: Model-based security metrics are an emerging topic of cyber security research that focuses on assessing an information system’s risk exposure. We propose an end-to-end solution with the deployment of a zero-trust network utilising Artificial Intelligence in this article to understand the security posture of a system before it is rolled out and as it matures. The major part contains a discussion about the key methods and techniques which was utilized in the development process and simplified operation principles of each developed process. Some developed processes were tested practically to evaluate the problems in the processes. Modules for automatic processing and data analysis were also developed. These modules can be connected in case it is needed. The most important data collection methods were benchmarked to detect problematic situations in the operation in different realistic situations. With the perception from the benchmark test, the problematic parts of the data collection were discovered and proposals for the solution were made which could be developed and tested in the next iterations of the development process. Working Artificial intelligence-based detection and data enrichment methods were created. The results of the article allow multiple continuous research and development projects related to data collection and data analysis with statistical and artificial intelligence-based methods.

Cite this Article

Priya Parameswarappa. Artificial Intelligence Based Zero Trust Network. International Research Journal of Engineering & Applied Sciences (IRJEAS). 10(3), pp. 42-48, 2022. https://doi.org/10.55083/irjeas.2022.v10i03013.

Original Article

LICENCED UNDER

FIND ON

CROSSMARK

Investigating Innovative Benz amide Derivatives as Inhibitors of Acetyl cholinesterase: Synthesis, Docking, and Assessment of Inhibitory Activity

 https://doi.org/10.55083/irjeas.2022.v10i03009

Country- INDIA

  Dr. Shrikrishna H Gurlhosur

PAPER ID: IRJEAS04V10I307220922000009

Published: 11 September 2022

Journal: IRJEAS, Volume 10, Issue 3

Pages: 49-54

Keywords: Benzamide derivatives, acetyl cholinesterase inhibition, neurodegenerative disorders, drug discovery, molecular docking.

Abstract: This research explores the design, synthesis, and evaluation of benzamide derivatives as inhibitors of acetyl cholinesterase (AChE), a key enzyme involved in the hydrolysis of acetylcholine, a neurotransmitter crucial for cognitive function. The study aims to enhance our understanding of the structure-activity relationships governing the inhibitory potential of these compounds, shedding light on the intricate molecular interactions underlying AChE inhibition. The benzamide derivatives were systematically synthesized and characterized, employing a range of analytical techniques such as spectroscopy and chromatography to confirm their chemical structures and purities. Strategic modifications were introduced during synthesis to optimize the compounds’ inhibitory activity against AChE, with a focus on enhancing potency and selectivity. Molecular docking studies, utilizing computational algorithms and molecular modeling software, provided detailed insights into the binding interactions between the synthesized compounds and the active site of AChE, aiding in the rational design of more effective inhibitors. In vitro experiments, conducted using enzymatic assays and cellular models, demonstrated varying degrees of inhibitory activity across the synthesized compounds, allowing for the identification of lead candidates with the most promising potential for further development as therapeutics for neurodegenerative disorders, such as Alzheimer’s disease. This multidisciplinary approach, combining organic synthesis, computational modeling, and enzymology, represents a concerted effort in drug discovery targeting AChE, with profound implications for the development of innovative treatments addressing the unmet medical needs in neurological disorders.