Safety analysis for Building Automation and Control System in Metro railway station
Every Metro Station Master room is fitted with the local workstation which supervises and controls the station’s Mechanical, Electrical & Plumbing (MEP) systems are controlled by Building Automation & Control System (BACS). BACS is a system that controls and monitors Electromechanical Systems like Heating Ventilation and Air Conditioning (HVAC), lifts, escalators, fire fighting, lighting, etc. BACS will work either in remote control mode through Supervisory Control and Data Acquisition (SCADA) controls or in stand-alone mode from the station master room. BACS are accountable for the functions influencing public safety, security and health. Thus BACS, should work reliably, safely, securely and competently. The level of quality and safety management required to avoid random and systematic failures in the design and engineering of the BACS is determined by the Safety Integrity Level (SIL). In this paper, the SIL is determined with the help of the Fault Tree Analysis (FTA) for the Safety Analysis of BACS in Metro Railway Station based on IEC 61508 and CENELEC EN 50129 standards.
Published by: Shaik Shashavali, Anil Kumar Ammina, V. Sankar
Author: Shaik Shashavali
Paper ID: V5I3-1285
Paper Status: published
Published: May 10, 2019
Partial replacement of cement by fly-ash in concrete
The paper deals with the strength of cement concrete by using flyash with cement in concrete. Partial replacement of cement by the use of flyash is being famous and gaining importance today, mainly on account of the improvement in the long term durability of concrete and ecological benefits. Technological improvements in thermal power plant operations and flyash collection systems have resulted in improving the consistency of flyash. To study the effect of partial replacement of cement by fly-ash, studies have been conducted on concrete mixes with 10%, 20%, 30% replacement of total cement 53grade percentage. In this paper, the effect of fly-ash on compressive strength is studied.
Published by: Shankh Agrawal, Honey Gaur
Author: Shankh Agrawal
Paper ID: V5I3-1318
Paper Status: published
Published: May 10, 2019
Real time security surveillance using machine learning
As we know security has become a major concern in modern society. It is achieved by surveillance which is capable of taking brisk actions. This paper presents a new system architecture which provides real-time surveillance where unauthenticated people are differentiated and provides the data flow and storage path. Recognition errors are narrowed as much as possible to make the system work efficiently. The proposed approach exploits the Viola-Jones method for face detection, the LBPH (Local Binary Pattern Histogram) algorithm as feature tracker. This combination of algorithms gives more accuracy and less processing time in the proposed design. User data is stored separately from the trained file to make the system more reliable. The proposed design can be integrated into any place which is concerned about security and prevents the security breaches before they occur.
Published by: G. Sumith Reddy, Devasani Aravind, Vanama Mohith, A. Sivajayaprakash
Author: G. Sumith Reddy
Paper ID: V5I3-1322
Paper Status: published
Published: May 10, 2019
Literature Review: Semantic Web tools and technologies for creating and effective searching method based on the data available in social networking sites
This paper is a literature review on Semantic Web tools and technologies for creating and effective searching method based on the data available in Social Networking sites. We discuss the requirements of ontologies in the context of the Semantic Web. We survey tools for managing and applying ontologies. Advantages of using ontologies in both knowledge-base-style and database-style applications are compared. We explore the current state of the Semantic Web with a major focus on search based on Social Networking profiles. The paper includes a review of several papers on semantics and ontology based search, sections on query languages and knowledge base systems that enable Semantic Web search. Finally, we discuss the growth of Social Networking.
Published by: Aamir Junaid Ahmad, Sabina Priyadarshini
Author: Aamir Junaid Ahmad
Paper ID: V5I3-1182
Paper Status: published
Published: May 10, 2019
Hyperledger based electronic voting system
In many countries, the elections are carried out by a single administration and have complete control over the database and system. The administration has to manage the entire election process which occurs for a long period of time. Generic elections still use a centralized system; some of the problems that can occur in conventional electoral systems are that it is possible to tamper with the database of considerable opportunities. The aspect of security and transparency is a threat from a still widespread election with the conventional system (offline). Unlike the electoral system, there are many conventional uses of paper in its implementation. The best way to overcome the difficulty faced is by decentralizing the system used for elections. This can be achieved by making use of Blockchain technology, the entire database is owned by many users in a blockchain. Blockchain itself has been used in the Bitcoin system known as the decentralized Bank system. By adopting blockchain in the distribution of databases on e-voting systems can reduce one of the cheating sources of database manipulation. Unlike Bitcoin with its Proof of Work, this paper proposes a method based on a hyperledger to enable voting.
Published by: K. H. Sudershan, P. Eshwar Reddy, Kishore Nadiger, Sharat Kumar S.
Author: K. H. Sudershan
Paper ID: V5I3-1247
Paper Status: published
Published: May 10, 2019
Division and replication of data for cloud security
Re-appropriating data to a pariah legitimate control performed in conveyed figuring offers ascend to security concerns. The information bargain can happen because of cloud-based assaults by malignant clients. Raised security frameworks are in this way required to ensure the information in the cloud. It's the commitment of a focal information distributor to gather delicate information from numerous gatherings and after that before distributing for information mining, make it mysterious. In such occasions, information clients may have a solid interest to quantify the utility of distributed information as most awry encryption systems effectively affect the estimation of data. This assignment is nontrivial, be that as it may, as estimating the utility, as a rule, requires amassed crude information, which isn't uncovered to information clients because of concerns with respect to secrecy. Or then again more terrible, information distributors may even undermine the crude information since no one, including the individual providers, knows the full data-set. This venture proposes a security protecting utility confirmation instrument dependent on different parts of cryptographic methodology, a differentially private procedure intended for set-assessed information. This proposition can gauge the information utility dependent on the collected crude information's encoded frequencies rather than the plain qualities, denying rupture of secrecy. Related, the accuracy of the encoded frequencies given by the distributor could be subtly confirmed, which recognizes noxious distributors. This method is additionally stretched out to DiffGen, another system made for social information which is differentially private revealing. The security and productivity of the proposed framework is exhibited by our hypothetical and exploratory appraisals.
Published by: G. Raghunathan, Mohideen Yazir
Author: G. Raghunathan
Paper ID: V5I3-1296
Paper Status: published
Published: May 10, 2019