Sarala A, R. M, Prakash K, V. R, Belsy Veda Evangeline C.R
{"title":"Designing a Farmer Friend Agribot for Agricultural Application","authors":"Sarala A, R. M, Prakash K, V. R, Belsy Veda Evangeline C.R","doi":"10.2139/ssrn.3444941","DOIUrl":"https://doi.org/10.2139/ssrn.3444941","url":null,"abstract":"The population, accidents and pollution level of the agriculture field in India are decreasing. So we have planned to make agriculture easy and it is designed to minimize the labour of farmer in addition to increase the speed and accuracy of the work. To implement this we are using arduino uno as controller and a few sensors that is related to it. It provides employment for 52% of countries workforce. This bot is designed to maintain the water’s pH level properly between 6 -7.5 which is the preferred pH level for cultivation. This proposed system provides a fertilizer, pesticides, it maintains the humidity of the soil and temperature etc. The proposed technique is implemented through this Agribot. For a good yield a farmer needs to monitor the field from time to time and these information of the field are given. The data received are analyzed and discussed. This work invoked to take a preventive measure for loss of crop and also increase the productivity of crop.","PeriodicalId":109374,"journal":{"name":"International Conference on Recent Trends in Computing","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131303626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of Backstepping and Nonlinear Feedback Control with Gyros","authors":"S. Rasappan","doi":"10.2139/ssrn.3439214","DOIUrl":"https://doi.org/10.2139/ssrn.3439214","url":null,"abstract":"The control of gyroscope system is a trivial problem where in the three degree of freedom is coupled to make the system nonlinear. This paper attempt to design of control algorithm without the usage Lyapunov exponent and also effective in handling the nonlinear terms associated in the dynamics of gyros. Numerical simulations are carried out to evaluate the performance of the control algorithm. It is evident from the result that, the proposed control strategy can make the system stable through achieving its equilibrium position.","PeriodicalId":109374,"journal":{"name":"International Conference on Recent Trends in Computing","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115627808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. V, Bhuvanesh A, Joshuva Arputharaj J, Joshua Mani M, Ajay Subbiah K
{"title":"Operating System Design Sensor Networks Using Artificial Intelligence","authors":"K. V, Bhuvanesh A, Joshuva Arputharaj J, Joshua Mani M, Ajay Subbiah K","doi":"10.2139/ssrn.3432214","DOIUrl":"https://doi.org/10.2139/ssrn.3432214","url":null,"abstract":"Lots of technical issues that affect the sensor networks focusing on management, optimization and management. Many applications such as video conferencing, distance education etc., require to send a timely message from one end to the other selected base stations. These applications have stringent Quality-of-Service (QoS) needs including loss rate, insufficient bandwidth and delay. The objective of the work is to provide a reliable data-transmission by applying Artificial Intelligence (AI) mechanism from source to sink. Machine learning algorithm is applied to improve the routing facilities by monitoring the network traffic. Threshold management is difficult to maintain in operating system design sensor networks (OSDSN) since the network configuration changes often. Therefore supervised learning algorithm is applied for finding node fitness rate that involves the route with high link quality.","PeriodicalId":109374,"journal":{"name":"International Conference on Recent Trends in Computing","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131703394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing Smart Meter Data in Smart Grid Transmission using Attribute Based Encryption","authors":"M. M., Sebasthirani K","doi":"10.2139/ssrn.3431174","DOIUrl":"https://doi.org/10.2139/ssrn.3431174","url":null,"abstract":"In recent Electrical era, Smart Grid (SG) is rapidly evolving technology. SG consists of smart meter to provide two way communications from consumer to distributor and from distributor to the consumer. Because of this communication, smart meter need to transmit large amount of information. In order to avoid cyber security issues in smart meter transmission, Attribute Based Encryption Algorithm (ABEA) is proposed. Conventional encryption algorithms cannot prevent cyber security threats like Denial of Service (DOS) attacks which targets the availability of the information to the authenticated user. By introducing additional information to the encryption system, Intrusion Detection (ID) of the smart meter information cannot be done easily. Performance of the proposed system can be evaluated by comparing the performance of the different types of encryption algorithms like synchronous, asynchronous and hybrid algorithms.","PeriodicalId":109374,"journal":{"name":"International Conference on Recent Trends in Computing","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125005649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}