Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
4 results
Search Results
Item Energy efficient computing- Green cloud computing(2013) Jain, A.; MÃshra, M.; Peddoju, S.K.; Jain, N.Moving towards Cloud Computing, high performance computing usage of huge data center (DC) and huge cluster is increasing day by day and energy consumption by these DC and energy dissipation in environment by these DC is also rising day by day. The large amount of CO2 dissipation in environment has generated the necessity of Green computing (saving energy by recycling it and reusing it over a period of time and minimizing the wastage in terms of usage of resources). More processor chips generates more heat, more heat requires more cooling and cooling again generates heats and thus we come to a stage where we want to balance the system by getting the same computing speed at decreased energy consumption. In this paper we proposed different ideas towards green cloud computing approach. © 2013 IEEE.Item Implementation of structurally pre-stressed piezo actuator based active vibration isolation system for micro milling(Elsevier Ltd, 2023) Divijesh, P.P.; Rao, M.; Rao, R.; Jain, N.; Prabhu, P.This paper presents the implementation of a structurally pre-stressed piezo actuator based active vibration isolation system incorporated with tool based micromachining setup for analyzing and comparing the milled pocket depth surface before and after isolation. A carbide micro end mill tool with 1 mm diameter and 4 flutes has been used for carrying out pocket milling experiments with and without vibrations on copper work pieces having 3 mm thickness. The machining parameters selected were spindle speed of 16,000 rev/min with 64 mm/min feed rate and 50 lm depth of cut. Two sets of pocket milling experiments were carried out using the proposed vibration isolation setup one with vibration and the other without vibration. In the first set of experiment, the source actuator was actuated for generating vibrations during pocket milling whereas in the second set of experiment, both source and isolator actuators were actuated for nullifying the vibrations generated during pocket milling. The macroscopic lens output images of the pocket depth surfaces before and after isolation were then compared corresponding to various actuation voltages at different frequencies using the proposed vibration isolation setup. Based on the macroscopic lens output images it was observed that the milled pocket depth surface obtained by actuating only source actuator showed distinct rings wherein the ring count matched with frequency and feed rate that has been provided during machining. However, the milled pocket obtained by actuating both source and isolator actuators resulted in surface characteristics with less pronounced rings similar to that of regular machining. Also the rings that has been formed showed more defined edges with the increase in actuator voltage indicating that these distinct patterns were caused due to the vibrations generated by the source actuator alone and not other factors. © © 2023 Elsevier Ltd. All rights reserved.Item Intrusion Detection System in Networks Employing a Double-Layer Architecture Using Machine Learning Algorithms(Institute of Electrical and Electronics Engineers Inc., 2023) Mohapatra, A.; Jain, N.; Rudra, B.Monitoring both the activities of the system itself and the traffic on the network is the job of an intrusion detection system, which is more commonly referred to by its acronym, IDS. The IDS works by analyzing the network traffic or system logs, looking for patterns and signatures of known threats, or deviations from normal behavior that may indicate an attack. This may be done in response to the activity or traffic being deemed suspicious or destructive. IDS can take many different shapes, but regardless of its appearance, their primary purpose is to identify potentially harmful traffic in a number of different ways. There are primarily two types of intrusion detection systems: those that monitor networks and those that monitor individual computers. The anti - virus program and the firewall are two examples of defensive mechanisms used by the systems that detects intrusion. IDS plays a major role in providing protection to systems and computer networks out of various types of attacks, such as malware infections, hacking attempts, and unauthorized access. It alerts security administrators to potential threats, provide detailed information about the attack, and help to prevent or mitigate the damage caused by the attack. © 2023 IEEE.Item AI based Solar Power Forecasting(Institute of Electrical and Electronics Engineers Inc., 2024) Jain, N.; Naik, D.Maintaining equilibrium between generation and load is crucial for maximizing economic scheduling in smart grids. As solar energy forecasting gains importance due to its sporadic nature and climatic dependencies, this study leverages advanced machine learning and deep learning models for accurate prediction. Specifically, we use XGBoost and Long Short-Term Memory (LSTM) models to analyze data from two solar installations in India over a 34-day period. Our approach enhances the efficiency and reliability of solar energy utilization in smart grids. Evaluated over a 3-day test period, the LSTM model achieved an RMSE of approximately 2870 kW, a 22% improvement over a baseline model with an RMSE of 3699 kW. These results highlight the potential of machine learning and deep learning to improve solar power forecasting accuracy, thereby facilitating more effective energy management in smart grids. © 2024 IEEE.
