Manuscripts

Recent Papers

Research Paper

Survey on energy saving strategies in industries

A modern area utilizes more energy than some flip side use parts and as of now, this segment is expanding about 37% of the world's complete conveyed energy. Energy is devoured in the mechanical area by a differing gathering of enterprises including fabricating, agriculture, mining, and development and for a wide scope of exercises, for example, preparing and get together, space molding and lighting. This paper presents an exhaustive writing audit about modern energy sparing by the board, advances, and arrangements. Most recent writings as far as proposition (MS and Ph.D.), diary articles, gathering procedures, web materials, reports, books, handbooks on modern energy the executives, arrangements, and energy investment funds systems have been gathered. Energy-sparing by the board including energy review, preparing projects and housekeeping next to some energy the board rehearses on the planet has been investigated. Energy-sparing innovations, for example, utilization of high proficiency engines (HEMs), Variable Speed Drives (VSDs), economizers, spill avoidance and diminishing weight drop has been checked on. In light of energy sparing innovations results, it has been discovered that in the mechanical segments, a sizeable measure of electric energy, emanations and service bill can be spared utilizing these innovations. Recompense periods for distinctive energy funds measures have been distinguished and observed to be monetarily practical in most cases. At long last, different energy sparing strategies for few chose nations were checked on.

Published by: Ashwini Punse

Author: Ashwini Punse

Paper ID: V5I1-1280

Paper Status: published

Published: February 11, 2019

Full Details
Research Paper

Cloud computing using Artificial Intelligence

In this paper, we present The cloud technology can help AI’s by providing the required information for the learning processes while the AI can help cloud by providing information that can offer more data. AI is capable of streamlining the immense capacities of the cloud. It equips cloud technology with enormous powers. It enables the machines to act, react, think and learn in the manner human beings do. AI assists different machines in learning and analyzing the historical data, making decisions and identifying the patterns. Such a process helps in eradicating the chances of human errors. Therefore, AI enhances the process of decision making of various organizations. Cloud technology is spread among a number of servers in various languages with huge data storage and across various geographies. Organizations can make use of this data to make up intelligent and automated solutions for customers and clients. Cloud computing is getting more powerful with AI as its applications are extended across multiple diversified sectors in the economy. Thus, even organizations can make use of AI cloud computing to attain long-term goals for their businesses.

Published by: Kumar Kishan Chandra, Dr. Anand Kumar Pandey, Supriya Raj

Author: Kumar Kishan Chandra

Paper ID: V5I1-1271

Paper Status: published

Published: February 9, 2019

Full Details
Review Paper

Survey on clustering attacker activities in IoT data through machine learning techniques

IoT create network and connect "things" and people together by creating relationship between either people-people, people-things or things-things. As the number of device connection is increased, it increases the Security risk. Security is the biggest issue for IoT at any companies across the globe. Privacy and data sharing can again be considered as a security concern for IoT. The IoT has been affected by different botnet activities. As botnets have the cause of serious security risks and financial damage over the years, existing Network forensic techniques cannot identify and track current sophisticated methods of botnets. Machine Learning techniques in order to train and validate a model for defining such attacks, but they still produce high false alarm rates with the challenge of investigating the tracks of botnets. This paper investigates the role of Machine Learning techniques for developing a Network forensic mechanism based on network flow identifiers that can track suspicious activities of botnets. Multivariate Hawkes Process identifies the latent influences between attackers by utilizing the mutually exciting properties. Then cluster the attacker activities based on the inferred weighted influence matrix with resort to the hierarchical, partitioning and graph-based clustering approach.

Published by: Jasmine Joy J., Padmashree A., Karunambika S., Latha R.

Author: Jasmine Joy J.

Paper ID: V5I1-1302

Paper Status: published

Published: February 9, 2019

Full Details
Research Paper

Wireless Sensor Network supplemented with MATLAB for improved environment condition and energy conservation

A planned infrastructure or a communicative infrastructure revolves around the cellular network which has a pivotal role to play in the field of wireless communication. But despite these advantages which the wireless network possesses, they are not feasible in drastic environments such as earthquake-hit areas, battlefield or any hostile zones simply because infrastructure remains a vague subject of concern. Recent developments have enhanced the technology fabricating ad-hoc wireless system network which can respond to this type of versatile situation.

Published by: Shipra Vaidya, Karamvir Singh Rajpal, Ravi Kant

Author: Shipra Vaidya

Paper ID: V5I1-1248

Paper Status: published

Published: February 9, 2019

Full Details
Survey Report

Providing data integrity in toll booth management system

The Internet of things (IoT) is considered as a network of devices which allows them to interact, connect and exchange data. Stimulators and sensors are considered as smart devices in our environment. Due to the nature of IoT that depends on low computational power devices equipped with a sensor, the security of these systems differs from the security of the traditional system which is been applied in conventional network devices. Simultaneously IoT security brings out new issues. Therefore safety is a fundamental issue in designing IoT. Hybrid encryption is a mode of encryption that makes use of merging two or more encryption systems hence it is considered as a highly secure type of encryption as long as the public and private keys are fully secure. This encryption type provides long security and low consumption. In this paper we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed. The main purpose of this hybrid algorithm is maintaining data integrity, confidentiality, non-repudiation in data exchange for IoT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety were evaluated in comparison with a conventional encryption algorithm

Published by: Infanta Josephine A., Jenifa, Keerthana, Mounika

Author: Infanta Josephine A.

Paper ID: V5I1-1283

Paper Status: published

Published: February 9, 2019

Full Details
Survey Report

Detection of online spread of terrorism using web data mining

Terrorist growth has increased in certain parts of the world. Terrorist groups use Facebook, WhatsApp, messages to spread their information on the social network. It is essential to detect terrorism and prevent its spreading before a certain time. The basic idea of this project is to reduce or stop spreading of terrorism and to remove all these accounts. The terrorists are spreading their terrorism activities using the internet by speech, text, videos. Terrorist groups are utilizing the internet as a medium to convince the innocent people to take part in terrorist activities by infuriating people through web pages that inspire disenchanted individuals to take part in a terrorist organization. This needs a lot of human effort to implement this project that will collect the information and find the terrorist groups. To reduce the human effort, we implement the system which detects terrorist groups in social-media

Published by: Naseema Begum A., Hanu Rakavi S., Mohanambal R., Aswathy R. H.

Author: Naseema Begum A.

Paper ID: V5I1-1288

Paper Status: published

Published: February 8, 2019

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X