作者:
Aiswarya BabyAneena Ann AlexanderP.G Scholar
Department of Computer Science and Engineering St Joseph's College of Engineering and TechnologyPalai India Assistant Professor
Department of Computer Science and Engineering St Joseph's College of Engineering and TechnologyPalaiIndia
Pollution is now becoming a biggest problem in today's age. In numerous nations, because of the high number of vehicles that are accessible on the streets, air contamination has progressed toward becoming a diffic...
Pollution is now becoming a biggest problem in today's age. In numerous nations, because of the high number of vehicles that are accessible on the streets, air contamination has progressed toward becoming a difficult issue. This eventually leads to emission of different gases. So there is a need to predict the amount of emission beforehand. There have been various research commitments in the region of anticipating toxins. Artificial intelligence (AI) are often employed where a problem requires estimation or prediction. Most of the methods used are based on neural network, fuzzy logic, hybrid methods and others. This paper discusses findings and limitations of existing contributions in the field of pollution prediction.
Due to the increase in the demand of materials with good surface finish and complex shapes, conventional machining processes became out of date. This directed to the increasing demand of non-conventional machining pro...
Due to the increase in the demand of materials with good surface finish and complex shapes, conventional machining processes became out of date. This directed to the increasing demand of non-conventional machining processes. This research work is focuses on the optimization of Surface Roughness (SR) using Wire Electrical Discharge Machining (WEDM) method on Inconel 625 super alloy material. The diffused wire tool electrode (plain and cryo-treated) is used for experimental work. Taguchi's L18 (21*35) orthogonal array's has been used to design for experimental run. The machining parameters selected for optimization are tool electrode, current (Ip), pulse on time (Ton), pulse off time (Toff), wire feed (Wf) and wire tension (Wt). Rectangular slits has been fabricated, which are useful for many industrial application like increase the heat transfer rate of fluids, micro-channels, micro-fins etc. Design of Experiment (DoE) optimization technique is used to find the most significant factor.
作者:
V AthiraJeena ThomasPG Scholar
Department of Computer Science St.Josephs College of Engineering and Technology Palai Kerala India Assistant Professor
Department of Computer Science St.Josephs College of Engineering and Technology Palai Kerala India
We live in the information age and new information is produced in each and every second. The information can be worlds data which is responsible for major technological changes that can bring new ways in decision maki...
We live in the information age and new information is produced in each and every second. The information can be worlds data which is responsible for major technological changes that can bring new ways in decision making. Keeping this data for further analysis and computation is a difficult task. Several studies are done in this arena, making it effective for future figuring. Processing or analysing such huge amount of data is a challenging task. All the existing technologies contain certain bottlenecks and performance overheads, diverse challenges like scalability. Spark is the commonly used data analysis framework. Map Reduce is a computing paradigm and a popular model for distributed data analysis. This paper gives a survey about some enormous information technologies, how it will deal with huge data, and the difficulties in existing advances, and has additionally learned about a portion of the execution bottlenecks and preventive techniques, and the concentration at that point moves to the Resilient Distributed Dataset (RDD), and how it is optimized.
作者:
Smilty ChackoMr. Deepu JobP.G Scholar
Department of Computer Science and Engineering St. Joseph's College of Engineering and Technology Palai Kerala. Assistant Professor
Department of Computer Science and Engineering St. Joseph's College of Engineering and Technology Palai Kerala.
The count of Internet of things (IoT) devices getting connected to internet are exponentially growing and is proposed to be 75 billion by 2025. IoT devices uses Low Power Wide Area Network (LPWAN) that are precisely b...
The count of Internet of things (IoT) devices getting connected to internet are exponentially growing and is proposed to be 75 billion by 2025. IoT devices uses Low Power Wide Area Network (LPWAN) that are precisely build to operate at a lower cost with greater power efficiency and long range connectivity than traditional wireless networks. LPWAN are inherently prone to security threats since they are also wireless communication network. Secure communication is essential for LPWAN and most LPWAN technologies uses simple cryptography methods. Despite of this security mechanisms, LPWAN is vulnerable to wide range of attacks. In this paper Network architecture and Security mechanisms of LPWAN technologies (LoRa, Sigfox, NB-IoT and DASH7) are discussed and are compered in terms of IoT factors. As a case study, vulnerabilities of LoRa is also being analyzed.
作者:
Ashly Ann JoPrince. V. JosePG Scholar
Department of Computer Science St.Joseph's College of Engineering and Technology Pala India Assistant Professor
Department of Computer Science St.Joseph's College of Engineering and Technology Pala India
Social network analysis has turned into a conspicuous field in link prediction. The precise social network models are additionally address a few downsides. Since the link forecast in Social network analysis confront a...
Social network analysis has turned into a conspicuous field in link prediction. The precise social network models are additionally address a few downsides. Since the link forecast in Social network analysis confront a few threats, for example, the in partially correct rules. An ideal inference mechanism should scale up towards vast scale information. The inference methods uses probabilistic evidence data since it can easily predict the vulnerabilities. There are diverse responses for Social network analysis have suggested over years. In this approach develop a model to predict the nearness of associations among nodes in broad scale casual groups, for example, informal organizations, which are exhibited by Markov Logic Networks (MLNs) and Bayesian Networks. This show gives a successful inference model which can deal with complex conditions and somewhat partially correct rules. The proposed system predicts the accuracy and efficiency of link prediction utilizing MAP Markov Logic induction technique and MPE Bayesian derivation strategy.
作者:
Aswathy ThankachanMr Bino ThomasP G Scholar
Department of Computer Science and Engineering St.Joseph's College of Engineering and Technology Palai Kerala India. Assistant Professor
Department of Computer Science and Engineering St.Joseph's College of Engineering and Technology Palai Kerala India.
DNA sequencing determines the precise order of nucleotides within a DNA molecule. Next generation Sequencing (NGS) is an efficient parallel high throughput DNA Sequencing Technology which revolutionizing the genomic r...
DNA sequencing determines the precise order of nucleotides within a DNA molecule. Next generation Sequencing (NGS) is an efficient parallel high throughput DNA Sequencing Technology which revolutionizing the genomic research. Earlier methods that are quite expensive give rise to different sequence comparison techniques. NGS used for faster detection of variants in human genome and give rise to accelerated response to disease detection like cancer, hepatitis etc. In this paper work flow of data analysis part of NGS are clearly discussed. The different NGS platforms, its applications and different sequencing comparison techniques are also mentioned here.
作者:
Thasni NoushadKishore SebastianP G Scholar
Department of Computer Science and Engineering St.Joseph's College of Engineering and Technology Palai Kerala India. Assistant Professor
Department of Computer Science and Engineering St.Joseph's College of Engineering and Technology Palai Kerala India.
Energy harvesting is important in the case of recharging or repay of battery. Energy harvesting means that energy is derivered from external sources like solar energy, thermal energy, kinetic energy and wind energy. T...
Energy harvesting is important in the case of recharging or repay of battery. Energy harvesting means that energy is derivered from external sources like solar energy, thermal energy, kinetic energy and wind energy. Two or more sensors are attached to a body forms Body Sensor Networks (BSNs). BSN s are mainly focused in healthcare domain. it allows patients, physiciants, caregivers, scientists, etc. It useful for continuous monitoring of patients (Diagnosis patients, treatment of chronic obstructive pulmonary disease patients and other health conditions). Doctors made interaction between the data collected body sensors and personal digital assistant (PDA). Disadvantage of existing system is batteries cannot be easly replaced, met must be near a transmitter, expensive, etc. Energy Harvesting and Data Collection (EHDC) focuses two types of energy harvesting techniques such that solar and thermal energy harvesting and two types of data collections are used :indoor and outdoor data collection. Harvested energy can be predicted by using Kalman Filter. EHDC provide mobile healthcare services and does not need recharging.
作者:
Neetha GeorgeJeena ThomasP G Scholar
Department of Computer Science and Engineering St.Joseph's College of Engineering and Technology Palai Kerala India. Assistant Professor
Department of Computer Science and Engineering St.Joseph's College of Engineering and Technology Palai Kerala India.
Autonomous vehicles in Vehicular Ad-hoc Networks(VANET)-the spontaneous creation of a wireless network for data exchange to the domain of vehicles may pave the way for future systems where computers take over the art ...
Autonomous vehicles in Vehicular Ad-hoc Networks(VANET)-the spontaneous creation of a wireless network for data exchange to the domain of vehicles may pave the way for future systems where computers take over the art of driving. It aids in transferring secure messages for proper communication between the vehicles. Unauthorized access like injecting spoofed messages to VANET can arise as an extreme threat. So remedies should be taken at early degree of architectonic process. Denial-of Service(DoS) attack takes place while validating each message in VANET, so an equity between message authentication and DoS prevention should be maintained. This paper discusses on diverse security demanding situations and distinct techniques to secure message transfer between the vehicles that are connected wirelessly.
Rapid growth of technology and infrastructure has made our lives easier. Whole system allows user's mobility to be tracked using a mobile phone and android Application. A mobile phone application has been develope...
详细信息
ISBN:
(纸本)9781538619605
Rapid growth of technology and infrastructure has made our lives easier. Whole system allows user's mobility to be tracked using a mobile phone and android Application. A mobile phone application has been developed and deployed on an Android Phone whose responsibility is to track the GPS location and update it to a database. Currently most of the public having their own vehicle, threat of theft is always there at parking or sometimes driving at insecure places. The safety of vehicles is extremely essential for public for which Vehicle tracking and locking system installed in the vehicle, to track the place in case of theft. In this system client just login to vehicle mobile and send you the current location of your vehicle in the form of latitude and longitude along with location name.
作者:
S. SarikaA. PravinA. VijayakumarK. SelvamaniAssistant Professor
Department of Computer Science and Engineering Sathyabama UniversityChennai India Assistant Professor
Department of Computer Science and Engineering Sathaybama UniversityChennai India Professor
Department of Information Technology Jerusalem College of Engineering Anna University Chennai India Assistant Professor
Department of Computer Science and Engineering Anna University Chennai India
In wired networks, there are lots of protections while communication occurs. In these networks, the intruders are pass through the firewalls and secured gateways for safe and secured communications. Moreover, the wire...
详细信息
In wired networks, there are lots of protections while communication occurs. In these networks, the intruders are pass through the firewalls and secured gateways for safe and secured communications. Moreover, the wired networks ensure the secured communications. But, in the case of wireless mobile ad hoc networks, the nodes are dynamic and the topology based and also needs more power consumptions. Because of mobility in wireless mobile adhoc networks, also there are lots of vulnerabilities when the attackers wish to collapse the partial or entire networks. Hence, there are lots of requirement for an understanding of the various problems associated with the wireless mobile networks. In this paper, the various vulnerabilities, attacks and security mechanisms are discussed for mobile ad hoc networks (MANETs) in detail.
暂无评论