Survey on energy saving strategies in industries
A modern area utilizes more energy than some flip side use parts and as of now, this segment is expanding about 37% of the world's complete conveyed energy. Energy is devoured in the mechanical area by a differing gathering of enterprises including fabricating, agriculture, mining, and development and for a wide scope of exercises, for example, preparing and get together, space molding and lighting. This paper presents an exhaustive writing audit about modern energy sparing by the board, advances, and arrangements. Most recent writings as far as proposition (MS and Ph.D.), diary articles, gathering procedures, web materials, reports, books, handbooks on modern energy the executives, arrangements, and energy investment funds systems have been gathered. Energy-sparing by the board including energy review, preparing projects and housekeeping next to some energy the board rehearses on the planet has been investigated. Energy-sparing innovations, for example, utilization of high proficiency engines (HEMs), Variable Speed Drives (VSDs), economizers, spill avoidance and diminishing weight drop has been checked on. In light of energy sparing innovations results, it has been discovered that in the mechanical segments, a sizeable measure of electric energy, emanations and service bill can be spared utilizing these innovations. Recompense periods for distinctive energy funds measures have been distinguished and observed to be monetarily practical in most cases. At long last, different energy sparing strategies for few chose nations were checked on.
Published by: Ashwini Punse
Author: Ashwini Punse
Paper ID: V5I1-1280
Paper Status: published
Published: February 11, 2019
Cloud computing using Artificial Intelligence
In this paper, we present The cloud technology can help AI’s by providing the required information for the learning processes while the AI can help cloud by providing information that can offer more data. AI is capable of streamlining the immense capacities of the cloud. It equips cloud technology with enormous powers. It enables the machines to act, react, think and learn in the manner human beings do. AI assists different machines in learning and analyzing the historical data, making decisions and identifying the patterns. Such a process helps in eradicating the chances of human errors. Therefore, AI enhances the process of decision making of various organizations. Cloud technology is spread among a number of servers in various languages with huge data storage and across various geographies. Organizations can make use of this data to make up intelligent and automated solutions for customers and clients. Cloud computing is getting more powerful with AI as its applications are extended across multiple diversified sectors in the economy. Thus, even organizations can make use of AI cloud computing to attain long-term goals for their businesses.
Published by: Kumar Kishan Chandra, Dr. Anand Kumar Pandey, Supriya Raj
Author: Kumar Kishan Chandra
Paper ID: V5I1-1271
Paper Status: published
Published: February 9, 2019
Survey on clustering attacker activities in IoT data through machine learning techniques
IoT create network and connect "things" and people together by creating relationship between either people-people, people-things or things-things. As the number of device connection is increased, it increases the Security risk. Security is the biggest issue for IoT at any companies across the globe. Privacy and data sharing can again be considered as a security concern for IoT. The IoT has been affected by different botnet activities. As botnets have the cause of serious security risks and financial damage over the years, existing Network forensic techniques cannot identify and track current sophisticated methods of botnets. Machine Learning techniques in order to train and validate a model for defining such attacks, but they still produce high false alarm rates with the challenge of investigating the tracks of botnets. This paper investigates the role of Machine Learning techniques for developing a Network forensic mechanism based on network flow identifiers that can track suspicious activities of botnets. Multivariate Hawkes Process identifies the latent influences between attackers by utilizing the mutually exciting properties. Then cluster the attacker activities based on the inferred weighted influence matrix with resort to the hierarchical, partitioning and graph-based clustering approach.
Published by: Jasmine Joy J., Padmashree A., Karunambika S., Latha R.
Author: Jasmine Joy J.
Paper ID: V5I1-1302
Paper Status: published
Published: February 9, 2019
Wireless Sensor Network supplemented with MATLAB for improved environment condition and energy conservation
A planned infrastructure or a communicative infrastructure revolves around the cellular network which has a pivotal role to play in the field of wireless communication. But despite these advantages which the wireless network possesses, they are not feasible in drastic environments such as earthquake-hit areas, battlefield or any hostile zones simply because infrastructure remains a vague subject of concern. Recent developments have enhanced the technology fabricating ad-hoc wireless system network which can respond to this type of versatile situation.
Published by: Shipra Vaidya, Karamvir Singh Rajpal, Ravi Kant
Author: Shipra Vaidya
Paper ID: V5I1-1248
Paper Status: published
Published: February 9, 2019
Providing data integrity in toll booth management system
The Internet of things (IoT) is considered as a network of devices which allows them to interact, connect and exchange data. Stimulators and sensors are considered as smart devices in our environment. Due to the nature of IoT that depends on low computational power devices equipped with a sensor, the security of these systems differs from the security of the traditional system which is been applied in conventional network devices. Simultaneously IoT security brings out new issues. Therefore safety is a fundamental issue in designing IoT. Hybrid encryption is a mode of encryption that makes use of merging two or more encryption systems hence it is considered as a highly secure type of encryption as long as the public and private keys are fully secure. This encryption type provides long security and low consumption. In this paper we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed. The main purpose of this hybrid algorithm is maintaining data integrity, confidentiality, non-repudiation in data exchange for IoT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety were evaluated in comparison with a conventional encryption algorithm
Published by: Infanta Josephine A., Jenifa, Keerthana, Mounika
Author: Infanta Josephine A.
Paper ID: V5I1-1283
Paper Status: published
Published: February 9, 2019
Detection of online spread of terrorism using web data mining
Terrorist growth has increased in certain parts of the world. Terrorist groups use Facebook, WhatsApp, messages to spread their information on the social network. It is essential to detect terrorism and prevent its spreading before a certain time. The basic idea of this project is to reduce or stop spreading of terrorism and to remove all these accounts. The terrorists are spreading their terrorism activities using the internet by speech, text, videos. Terrorist groups are utilizing the internet as a medium to convince the innocent people to take part in terrorist activities by infuriating people through web pages that inspire disenchanted individuals to take part in a terrorist organization. This needs a lot of human effort to implement this project that will collect the information and find the terrorist groups. To reduce the human effort, we implement the system which detects terrorist groups in social-media
Published by: Naseema Begum A., Hanu Rakavi S., Mohanambal R., Aswathy R. H.
Author: Naseema Begum A.
Paper ID: V5I1-1288
Paper Status: published
Published: February 8, 2019