Surender Kumar Grewal

Work place: Department of ECE, DCRUST, Murthal, Sonepat, India



Research Interests: Computational Engineering, Engineering


Surender Kumar Grewal received his B.Tech (Electronic & Communication) degree from REC Kurukshetra (Now NIT, M.E. degree from CR State College of Engineering, Murthal (Sonepat) and PhD from MRIU Faridabad.

He has been with Deenbandhu Chhotu Ram University of science & Technology, Murthal, Sonepat, India since 1994, as faculty in ECE Department. Presently he is working as Associate Professor in ECE Department at DCRUST, Murthal. He has total 22 years of rich experience into academics. His main research interests are intelligent system for power quality monitoring, intelligent instrumentation system.

Mr. Kumar is a member of ISTE & IEI, India.

Author Articles
Aesthetic QR: Approaches for Beautified, Fast Decoding, and Secured QR Codes

By Jyoti Rathi Surender Kumar Grewal

DOI:, Pub. Date: 8 Jun. 2022

A QR code is a two-dimensional code that encodes data but it is unattractive and not ideal. QR codes have been applied in item identifications, publicity campaigns, advertisements, product promotions, etc. so they need to be visually good in appearance. Visually good and decorated QR codes degrade the decoding rate as compared to the standard QR code decoding rate. As they are used for mobile payments and logins some security must be there. For this many researchers have contributed using various approaches to beautify QR codes with high decoding accuracy and to make them secure. This paper aims towards the study of works carried out in the direction of beautification of QR codes using blended type techniques and artificial intelligence based techniques by different authors. The present state of prior strategies, methods, and major features used are described in this survey.

[...] Read more.
Hashing Key Based Analysis of Polynomial Encryption Standard

By Pic Sonia Surender Kumar Grewal

DOI:, Pub. Date: 8 Nov. 2016

In present scenario, where data is transmitted from transmitter end to receiver end, security and authenticity of the data are the major issues. Hence, the need of an efficient technique which can assure secure transmission of data comes into the picture. There are several techniques which have been developed for this purpose over the time. Cryptography is one such technique. In this paper a new model is presented that is based on the implementation of Hash techniques with the Polynomial Message Authenticating scheme to increase the security level of transmission. The comparative analysis of Secure Hash Algorithms i.e. SHA-1 and SHA-256, implemented using Polynomial Message Authenticating scheme, is presented on the basis of different parameters like processing gain, delivery ratio, energy consumed, duty cycle, Hashing length and degree of polynomial.

[...] Read more.
Monitoring of Wide Area Power System Network with Phasor Data Concentrator (PDC)

By Surender Kumar Grewal M.K Soni D. K. Jain

DOI:, Pub. Date: 8 Sep. 2015

This paper presents the fault detection technique in wide area power system network using Phasor Data Concentrator (PDC). Single line to ground (SLG) fault data of transmission line is processed using the WAMS technology. Phasor Data Concentrator (PDC) is primarily data collecting centres located at the control centre processing unit and is responsible for collecting all the PMUs data that is transmitted over the communication link, which will detect fault in transmission line. This will help the operators in control centre to monitor the health of wide area power system network, and can initiate corrective actions when time is the critical issue. In this paper, the voltage and current phasor information, and other transmission line parameters from 14 IEEE bus system is processed and detects the fault in transmission lines. The proposed fault detection technique in transmission line of wide area power system network is very useful for improving power system reliability and power quality.

[...] Read more.
Other Articles