Manuscripts

Recent Papers

Thesis

Safety analysis for Building Automation and Control System in Metro railway station

Every Metro Station Master room is fitted with the local workstation which supervises and controls the station’s Mechanical, Electrical & Plumbing (MEP) systems are controlled by Building Automation & Control System (BACS). BACS is a system that controls and monitors Electromechanical Systems like Heating Ventilation and Air Conditioning (HVAC), lifts, escalators, fire fighting, lighting, etc. BACS will work either in remote control mode through Supervisory Control and Data Acquisition (SCADA) controls or in stand-alone mode from the station master room. BACS are accountable for the functions influencing public safety, security and health. Thus BACS, should work reliably, safely, securely and competently. The level of quality and safety management required to avoid random and systematic failures in the design and engineering of the BACS is determined by the Safety Integrity Level (SIL). In this paper, the SIL is determined with the help of the Fault Tree Analysis (FTA) for the Safety Analysis of BACS in Metro Railway Station based on IEC 61508 and CENELEC EN 50129 standards.

Published by: Shaik Shashavali, Anil Kumar Ammina, V. Sankar

Author: Shaik Shashavali

Paper ID: V5I3-1285

Paper Status: published

Published: May 10, 2019

Full Details
Research Paper

Partial replacement of cement by fly-ash in concrete

The paper deals with the strength of cement concrete by using flyash with cement in concrete. Partial replacement of cement by the use of flyash is being famous and gaining importance today, mainly on account of the improvement in the long term durability of concrete and ecological benefits. Technological improvements in thermal power plant operations and flyash collection systems have resulted in improving the consistency of flyash. To study the effect of partial replacement of cement by fly-ash, studies have been conducted on concrete mixes with 10%, 20%, 30% replacement of total cement 53grade percentage. In this paper, the effect of fly-ash on compressive strength is studied.

Published by: Shankh Agrawal, Honey Gaur

Author: Shankh Agrawal

Paper ID: V5I3-1318

Paper Status: published

Published: May 10, 2019

Full Details
Research Paper

Real time security surveillance using machine learning

As we know security has become a major concern in modern society. It is achieved by surveillance which is capable of taking brisk actions. This paper presents a new system architecture which provides real-time surveillance where unauthenticated people are differentiated and provides the data flow and storage path. Recognition errors are narrowed as much as possible to make the system work efficiently. The proposed approach exploits the Viola-Jones method for face detection, the LBPH (Local Binary Pattern Histogram) algorithm as feature tracker. This combination of algorithms gives more accuracy and less processing time in the proposed design. User data is stored separately from the trained file to make the system more reliable. The proposed design can be integrated into any place which is concerned about security and prevents the security breaches before they occur.

Published by: G. Sumith Reddy, Devasani Aravind, Vanama Mohith, A. Sivajayaprakash

Author: G. Sumith Reddy

Paper ID: V5I3-1322

Paper Status: published

Published: May 10, 2019

Full Details
Dissertations

Literature Review: Semantic Web tools and technologies for creating and effective searching method based on the data available in social networking sites

This paper is a literature review on Semantic Web tools and technologies for creating and effective searching method based on the data available in Social Networking sites. We discuss the requirements of ontologies in the context of the Semantic Web. We survey tools for managing and applying ontologies. Advantages of using ontologies in both knowledge-base-style and database-style applications are compared. We explore the current state of the Semantic Web with a major focus on search based on Social Networking profiles. The paper includes a review of several papers on semantics and ontology based search, sections on query languages and knowledge base systems that enable Semantic Web search. Finally, we discuss the growth of Social Networking.

Published by: Aamir Junaid Ahmad, Sabina Priyadarshini

Author: Aamir Junaid Ahmad

Paper ID: V5I3-1182

Paper Status: published

Published: May 10, 2019

Full Details
Review Paper

Hyperledger based electronic voting system

In many countries, the elections are carried out by a single administration and have complete control over the database and system. The administration has to manage the entire election process which occurs for a long period of time. Generic elections still use a centralized system; some of the problems that can occur in conventional electoral systems are that it is possible to tamper with the database of considerable opportunities. The aspect of security and transparency is a threat from a still widespread election with the conventional system (offline). Unlike the electoral system, there are many conventional uses of paper in its implementation. The best way to overcome the difficulty faced is by decentralizing the system used for elections. This can be achieved by making use of Blockchain technology, the entire database is owned by many users in a blockchain. Blockchain itself has been used in the Bitcoin system known as the decentralized Bank system. By adopting blockchain in the distribution of databases on e-voting systems can reduce one of the cheating sources of database manipulation. Unlike Bitcoin with its Proof of Work, this paper proposes a method based on a hyperledger to enable voting.

Published by: K. H. Sudershan, P. Eshwar Reddy, Kishore Nadiger, Sharat Kumar S.

Author: K. H. Sudershan

Paper ID: V5I3-1247

Paper Status: published

Published: May 10, 2019

Full Details
Research Paper

Division and replication of data for cloud security

Re-appropriating data to a pariah legitimate control performed in conveyed figuring offers ascend to security concerns. The information bargain can happen because of cloud-based assaults by malignant clients. Raised security frameworks are in this way required to ensure the information in the cloud. It's the commitment of a focal information distributor to gather delicate information from numerous gatherings and after that before distributing for information mining, make it mysterious. In such occasions, information clients may have a solid interest to quantify the utility of distributed information as most awry encryption systems effectively affect the estimation of data. This assignment is nontrivial, be that as it may, as estimating the utility, as a rule, requires amassed crude information, which isn't uncovered to information clients because of concerns with respect to secrecy. Or then again more terrible, information distributors may even undermine the crude information since no one, including the individual providers, knows the full data-set. This venture proposes a security protecting utility confirmation instrument dependent on different parts of cryptographic methodology, a differentially private procedure intended for set-assessed information. This proposition can gauge the information utility dependent on the collected crude information's encoded frequencies rather than the plain qualities, denying rupture of secrecy. Related, the accuracy of the encoded frequencies given by the distributor could be subtly confirmed, which recognizes noxious distributors. This method is additionally stretched out to DiffGen, another system made for social information which is differentially private revealing. The security and productivity of the proposed framework is exhibited by our hypothetical and exploratory appraisals.

Published by: G. Raghunathan, Mohideen Yazir

Author: G. Raghunathan

Paper ID: V5I3-1296

Paper Status: published

Published: May 10, 2019

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X