Academic literature on the topic 'Power tampering'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Power tampering.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Power tampering"

1

Agarwal, Shubham, and Mayur Agarwal. "Wireless Power Theft Monitoring System." International Journal of Advance Research and Innovation 1, no. 2 (2013): 36–39. http://dx.doi.org/10.51976/ijari.121309.

Full text
Abstract:
The scope of this paper is to identify the most commonly adapted techniques of power tampering. We detect the tampering methods by means of respective embedded circuit and intimate it to the electricity board via sound buzzer alert, our microcontroller circuit controlling one relay which is transmitting power supply from main meter to sub meter if somebody tempered meter m/c switch of current supply. M/c display all the consumption unit of both meters on LCD. This tampering information is transmitted to electricity board via transmitter and receiver module which with further advancement can ta
APA, Harvard, Vancouver, ISO, and other styles
2

Tan, Huijuan, Wenxin Guo, Shiming Li, Wenjie Zheng, and Qian Li. "Power system topological node tamper detection method based on fuzzy graph theory." Journal of Physics: Conference Series 2728, no. 1 (2024): 012077. http://dx.doi.org/10.1088/1742-6596/2728/1/012077.

Full text
Abstract:
Abstract Power system involves a large number of nodes and lines, and the topology is very complex. In such a complex network, node tamper detection needs to consider a variety of combinations and connection modes, which increases the complexity of the problem. Therefore, a new method of topological node tamper detection based on fuzzy graph theory is proposed. The feature difference values of topological nodes are extracted according to the node tampering feature vector. Detection of topological node similarity based on fuzzy graph-neural network. Based on this, the cost function of topologic
APA, Harvard, Vancouver, ISO, and other styles
3

Khan, Shagufta, and Manoj Saini. "A comprehensive study on energy meters and power tampering attempts." International Journal of Applied Power Engineering (IJAPE) 10, no. 4 (2021): 315. http://dx.doi.org/10.11591/ijape.v10.i4.pp315-325.

Full text
Abstract:
Electricity is the basic need of today’s scenario. In the 21st generation, growth and development is totally dependent on electricity. Thus, measurement of consumption of electricity becomes much more important. Energy meter used to measure consumed electricity by building or electrical equipment of various end users. This paper focuses on review of energy meters and power tampering attempts. It will highlight the development of meters from electromechanical meters to smart meters. The need of an era is to develop a more reliable and intelligent smart energy meters. This paper also discussed t
APA, Harvard, Vancouver, ISO, and other styles
4

Manoj, Saini, and Khan Shagufta. "A comprehensive study on energy meters and power tampering attempts." International Journal of Applied Power Engineering 10, no. 4 (2021): 315~325. https://doi.org/10.5281/zenodo.7344563.

Full text
Abstract:
Electricity is the basic need of today’s scenario. In the 21st generation, growth and development is totally dependent on electricity. Thus, measurement of consumption of electricity becomes much more important. Energy meter used to measure consumed electricity by building or electrical equipment of various end users. This paper focuses on review of energy meters and power tampering attempts. It will highlight the development of meters from electromechanical meters to smart meters. The need of an era is to develop a more reliable and intelligent smart energy meters. This paper also discu
APA, Harvard, Vancouver, ISO, and other styles
5

Vijayaraghavan, P., M. Joe Nelson, R. Prasanna, and M. K. Raghavendran. "Surveillance Footage Video Tampering Detection." Informatica : Journal of Applied Machines Electrical Electronics Computer Science and Communication Systems 01, no. 01 (2020): 10–16. http://dx.doi.org/10.47812/ijamecs2010102.

Full text
Abstract:
The quality of the captured images was enhanced by some of the first digital video and image processing applications, but as the power of computers expanded, so did the number of applications where video and image processing could make a difference. Video and image processing are used in many different applications nowadays. To provide authenticity to a video several video processing software’s are used. Video tampering detection is the one of the important Security applications. Video processing software is also used to eliminate specific moving foreground from a video. But algorithms which w
APA, Harvard, Vancouver, ISO, and other styles
6

Sinharay, Sandip, and Matthew S. Johnson. "Three New Methods for Analysis of Answer Changes." Educational and Psychological Measurement 77, no. 1 (2016): 54–81. http://dx.doi.org/10.1177/0013164416632287.

Full text
Abstract:
In a pioneering research article, Wollack and colleagues suggested the “erasure detection index” (EDI) to detect test tampering. The EDI can be used with or without a continuity correction and is assumed to follow the standard normal distribution under the null hypothesis of no test tampering. When used without a continuity correction, the EDI often has inflated Type I error rates. When used with a continuity correction, the EDI has satisfactory Type I error rates, but smaller power compared with the EDI without a continuity correction. This article suggests three methods for detecting test ta
APA, Harvard, Vancouver, ISO, and other styles
7

Shabat, Hafedh Ali, Khamael Raqim Raheem, and Wafaa Mohammed Ridha Shakir. "Blind Steganalysis Method Using Image Spectral Density and Differential Histogram Correlative Power Spectral Density." Journal of Image and Graphics 12, no. 1 (2024): 10–15. http://dx.doi.org/10.18178/joig.12.1.10-15.

Full text
Abstract:
Recent research has demonstrated the success of employing neural networks for the purpose of detecting image tampering. Nevertheless, the utilization of reference-free steganalysis has become increasingly popular as a result of the challenges associated with obtaining an annotated dataset. This dataset is crucial for the classification process using neural networks, which aims to detect and identify instances of tampering. This paper introduces a robust approach to blind steganalysis, utilizing image spectral density and differential histogram correlative power spectral density. The proposed m
APA, Harvard, Vancouver, ISO, and other styles
8

Singh, Uday Vikram, Suyash Rastogi, and Asim Ahmed. "Document Tampering Detection: A Comprehensive Review." International Journal for Research in Applied Science and Engineering Technology 12, no. 1 (2024): 475–78. http://dx.doi.org/10.22214/ijraset.2024.57867.

Full text
Abstract:
Abstract: Document forgery techniques have evolved to create counterfeit documents nearly identical to genuine ones, evading visual detection due to advancements in printing technologies. In response, this study proposes an innovative method to uncover intrinsic device-specific characteristics concealed within counterfeit documents, focusing on original and tampered images alongside their Error Level Analysis (ELA). By leveraging seventeen diverse image quality metrics, a discriminative analysis is established to differentiate between authentic and fraudulent documents. These metrics serve as
APA, Harvard, Vancouver, ISO, and other styles
9

Dekate, Sahil, Palkhi Wankhede, Megha Ghosh, Mansi Gotephode, and Bhoomi Gajimwar. "Iot Based Electric Meter Tampering Detector." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 3590–92. http://dx.doi.org/10.22214/ijraset.2024.60558.

Full text
Abstract:
Abstract: IoT based smart and multifunctional energy meter reading of automatic meter using ATmegha kit. It has the ability to connect to the public database maintained by the energy supplier through computing and energy meter tamper detection. It can prevent theft detection for unregistered users and save losses as a result. A unique feature of this meter is its Internet of Things based functionality. Metmegha. In this case, the system will use the wireless system communication protocol. Wireless is used because the application requires high data rate, low power consumption and low cost. This
APA, Harvard, Vancouver, ISO, and other styles
10

Ganji, Fatemeh, Domenic Forte, Navid Asadizanjani, Mark Tehranipoor, and Damon Woodward. "The Power of IC Reverse Engineering for Hardware Trust and Assurance." EDFA Technical Articles 21, no. 2 (2019): 30–36. http://dx.doi.org/10.31399/asm.edfa.2019-2.p030.

Full text
Abstract:
Abstract Integrated circuits embedded in everyday devices face an increased risk of tampering and intrusion. In this article, the authors explain how reverse engineering techniques, including automated image analysis, can be employed to provide trust and assurance when dealing with commercial off-the-shelf chips.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Power tampering"

1

Sun, He-Nan, and 孫赫男. "A new reliable Thevenin parameter esitmation method of power grids to resist phasor measurement data tampering and measure the error stochastically." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/xx844c.

Full text
Abstract:
碩士<br>元智大學<br>電機工程學系甲組<br>107<br>As the scale of modern power grids becomes larger and the structure becomes more and more complex, it is imperative to monitor the power grid from the perspective of the system as a whole.As one of the most important indicators of the system, voltage stability has been given high attention, and the emergence of WAMS based on PMU provides a very effective means for global voltage stability monitoring. As one of the most important indicators of the system, voltage stability has been given high attention, and the emergence of WAMS based on PMU provides a very effe
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Power tampering"

1

Gaibotti, Adriano, Claudio Marchisio, Alexandro Sentinelli, and Giacomo Boracchi. "Tampering Detection in Low-Power Smart Cameras." In Engineering Applications of Neural Networks. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23983-5_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Balasubramanian, Kannan, and M. Rajakani. "Attacks on Implementation of Cryptographic Algorithms." In Algorithmic Strategies for Solving Complex Problems in Cryptography. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2915-6.ch007.

Full text
Abstract:
This chapter investigates the implementation attacks on cryptographic algorithms. The implementation attacks can be defined as invasive or non-invasive. The major attack types are Probing attacks, Fault Induction attacks, timing attacks, Power analysis attacks and Electromagnetic analysis attacks. The attacks target either the physical leakage of a device in which case they are considered physical attacks or try to observe some parameters of the algorithm which constitute logical attacks. The Various countermeasures for the attacks include physical protection against tampering of the device or
APA, Harvard, Vancouver, ISO, and other styles
3

Smuts, R. Malcolm. "King James’s Peace, the Laws of the Realms, and the Forging of a United Kingdom?" In Political Culture, the State, and the Problem of Religious War in Britain and Ireland, 1578-1625. Oxford University PressOxford, 2023. http://dx.doi.org/10.1093/oso/9780192863133.003.0010.

Full text
Abstract:
Abstract The chapter re-examines James’s self-presentation after 1603 as a Rex Pacificus intent on promoting internal and external peace, in part through the integration of his two British kingdoms by a union of their laws and institutions. He saw this project as a providentially ordained goal that flowed naturally from the union of the two British crowns in his person and bloodline. But his attempt to achieve it through legislation famously provoked fierce opposition from English who feared that any tampering with their laws would lead to absolutism. It is argued that this controversy stemmed
APA, Harvard, Vancouver, ISO, and other styles
4

Rutherford, Helen, Birju Kotecha, and Angela MacFarlane. "13. The jury." In English Legal System. Oxford University Press, 2022. http://dx.doi.org/10.1093/he/9780192858856.003.0013.

Full text
Abstract:
A jury consists of twelve, randomly-selected members of the public, who decide guilt or innocence in the most serious criminal trials in the Crown Court. This chapter explains the rules on eligibility for, and disqualification or excusal from jury service. It considers the power of the jury to acquit in defiance of the evidence (‘jury equity’), the confidentiality of jury deliberations and the implications of that for appeals, the ethnic composition of a jury, whether juries should be excluded from certain trials such as those involving serious fraud or where there is evidence of jury ‘tamperi
APA, Harvard, Vancouver, ISO, and other styles
5

Rutherford, Helen, Birju Kotecha, and Angela Macfarlane. "13. The jury." In English Legal System. Oxford University Press, 2024. http://dx.doi.org/10.1093/he/9780198898504.003.0013.

Full text
Abstract:
A jury consists of twelve randomly-selected members of the public, who decide guilt or innocence in the most serious criminal trials in the Crown Court. This chapter explains the rules on eligibility for, and disqualification or excusal from jury service. It considers the power of the jury to acquit in defiance of the evidence (‘jury equity’), the confidentiality of jury deliberations and the implications of that for appeals, the ethnic composition of a jury, whether juries should be excluded from certain trials such as those involving serious fraud or where there is evidence of jury ‘tamperin
APA, Harvard, Vancouver, ISO, and other styles
6

Wilson, Steve, Helen Rutherford, Tony Storey, and Natalie Wortley. "10. The jury." In English Legal System. Oxford University Press, 2018. http://dx.doi.org/10.1093/he/9780198808152.003.0010.

Full text
Abstract:
The jury consists of twelve, randomly-selected members of the public, who decide guilt or innocence in the most serious criminal trials in the Crown Court. This ensures that the general public are represented in the criminal justice system. This chapter explains the rules on eligibility for, and disqualification or excusal from, jury service. It considers issues such as the power of the jury to acquit in defiance of the evidence (‘jury equity’); the confidentiality of jury deliberations and the implications of that for appeals; the ethnic composition of a jury; whether juries should be exclude
APA, Harvard, Vancouver, ISO, and other styles
7

Wilson, Steve, Helen Rutherford, Tony Storey, Natalie Wortley, and Birju Kotecha. "10. The jury." In English Legal System. Oxford University Press, 2020. http://dx.doi.org/10.1093/he/9780198853800.003.0010.

Full text
Abstract:
The jury consists of twelve randomly selected members of the public, who decide guilt or innocence in the most serious criminal trials in the Crown Court. This ensures that the general public are represented in the criminal justice system. This chapter explains the rules on eligibility for, and disqualification or excusal from, jury service. It considers issues such as the power of the jury to acquit in defiance of the evidence (‘jury equity’); the confidentiality of jury deliberations and the implications of that for appeals; the ethnic composition of a jury; the rights of both prosecution an
APA, Harvard, Vancouver, ISO, and other styles
8

Ramachandran, M., and G. Prabhakar. "IOT EMPOWERMENT IN SMART GRID TO ENHANCE EFFICIENCY, RELIABILITY, AND SECURITY THROUGH INNOVATIVE APPLICATIONS." In Futuristic Trends in IOT Volume 3 Book 9. Iterative International Publishers, Selfypage Developers Pvt Ltd, 2024. http://dx.doi.org/10.58532/v3bbio9p9ch2.

Full text
Abstract:
The evolution of the Smart Grid, coupled with the Internet of Things (IoT) technologies, has opened new avenues for enhancing power system efficiency, reliability, and sustainability. This abstract explores three critical applications of IoT in the Smart Grid: Automatic Power Factor Correction (APFC) using Arduino, IoT-based Underground Cable Fault Detector, and Power Theft Detection and Billing utilizing IoT capabilities. Automatic Power Factor Correction (APFC) using Arduino is a dynamic solution to optimize power quality in the grid. By employing IoT-enabled sensors and controllers, the APF
APA, Harvard, Vancouver, ISO, and other styles
9

Sumathi G., Srivani L., Thirugnana Murthy D., Kumar Anish, and Madhusoodanan K. "Hardware Obfuscation Using Different Obfuscation Cell Structures for PLDs." In Cryptology and Information Security Series. IOS Press, 2017. https://doi.org/10.3233/978-1-61499-744-3-143.

Full text
Abstract:
In recent years, hardware obfuscation is one of the prominent anti-tamper solutions that are highly used against various hardware security threats such as piracy, cloning, reverse engineering, chip overbuilding, and hardware Trojans. Logic obfuscation is implemented either in the design description (for soft/firm/hard codes) or structure (for the chip) of electronic hardware to intentionally conceal its functionality. Most of the obfuscation schemes enable the circuit operation in two distinct modes such as obfuscated and normal modes. The mode control, mostly implemented by finite state machi
APA, Harvard, Vancouver, ISO, and other styles
10

Patil, Harsha Kundan. "Blockchain Technology-Security Booster." In Blockchain Applications in IoT Security. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-2414-5.ch008.

Full text
Abstract:
“Blockchain” as the name suggests is the chain of blocks. It is the chunk of digital information (blocks) that are connected through the public databases (Chain). It is nothing but the newer version of file organisation. Blocks store digital information like actual record of any transaction, details of involve entities in the transaction, time stamps, and other metadata of the transactions. Blocks also have unique ids, which are known as hash. Blockchain technology is built using peer-to-peer networking. Anyone who is on network can access the blocks. There is no centralised community to contr
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Power tampering"

1

Ankilla, Mayank Reddy, Suraj Tirumani, and R. Siva. "Forgery and Tampering Detection for Images Using Deep Learning." In 2024 IEEE International Conference on Smart Power Control and Renewable Energy (ICSPCRE). IEEE, 2024. http://dx.doi.org/10.1109/icspcre62303.2024.10675216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Qilin, Hui He, Qiyue Zhou, and Taiting Yu. "Research on Anti-Tampering Method of Convolutional Coding for Power Internet of Things Sensing." In 2024 China International Conference on Electricity Distribution (CICED). IEEE, 2024. http://dx.doi.org/10.1109/ciced63421.2024.10754036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Geethanjali, T. M., T. S. Darshan, K. Surya, H. U. Rahul, and Ipshika N. Sheety. "Detectify : Image Tampering Detection using Error Level Analysis (ELA) and Convolutional Neural Network (CNN)." In 2024 International Conference on Signal Processing, Computation, Electronics, Power and Telecommunication (IConSCEPT). IEEE, 2024. http://dx.doi.org/10.1109/iconscept61884.2024.10627878.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Islam, Rifatul, Nafisa Tabassum, Tohidul Islam, Mehedi Hassan, Niloy Goswami, and Abu Hena Shatil. "Design and Development of a Smart Billing Meter for Load Management and Tampering Alerts." In 2024 IEEE International Conference on Power, Electrical, Electronics and Industrial Applications (PEEIACON). IEEE, 2024. https://doi.org/10.1109/peeiacon63629.2024.10800486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Araujo, Sabryna, Ramille Santana, Joana Silva, et al. "Applying Prototyping and Exploratory Testing to Ensure Software Quality in an Information System for Power Tampering Detection: An Experience Report." In 27th International Conference on Enterprise Information Systems. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013483000003929.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rashid, Anum, Muhammad Naveed Aman, Mukhtar Ullah, and Biplab Sikdar. "Detecting Data Tampering In Synchrophasors Using Power Flow Entropy." In 2018 IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia). IEEE, 2018. http://dx.doi.org/10.1109/isgt-asia.2018.8467959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Calderon, Felix, Juan J. Flores, and Sergio Bravo-Solorio. "Watermarks based on Pyramidal Images for Tampering Image Self-Restoration." In 2022 IEEE International Autumn Meeting on Power, Electronics and Computing (ROPEC). IEEE, 2022. http://dx.doi.org/10.1109/ropec55836.2022.10018582.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Qi, Chengfei, Chaoran Bi, Yan Liu, Tongjia Wei, and Xiaobo Yang. "A Tampering Detection Method for Power Monitoring Data Based on Kalman Filter." In 2023 IEEE International Conference on Image Processing and Computer Applications (ICIPCA). IEEE, 2023. http://dx.doi.org/10.1109/icipca59209.2023.10257846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chandel, Priyamvada, Tripta Thakur, and B. A. Sawale. "Energy Meter tampering: Major cause of non-technical losses in Indian distribution sector." In 2016 International Conference on Electrical Power and Energy Systems (ICEPES). IEEE, 2016. http://dx.doi.org/10.1109/icepes.2016.7915959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Korak, Thomas, and Michael Hoefler. "On the Effects of Clock and Power Supply Tampering on Two Microcontroller Platforms." In 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). IEEE, 2014. http://dx.doi.org/10.1109/fdtc.2014.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!