Volume 13 ~ Issue 4

Cover Page Index Page

Fake News Detection Using Machine Learning Methods: A Review
Rajan Kumar Tiwari
Download Full Paper     Download Certificate
ABSTRACT
In the present age, where the Internet is also omnipresent, everyone uses various online information resources. Along with the increase using social networks such as Facebook, Twitter, etc. news items spread like wildfire among millions of people. Spread Fake news has far-reaching effects, such as generating biased opinions that can influence the outcome of elections in favour of certain individuals or groups or parties or a particular section of the society. Moreover, spammers use enticing news headlines and clickbait ads to generate revenue which is unlawful. Because fake news is so common on social media, the widespread usage of these platforms has had a detrimental effect on our society. Similar to the internet, publishers promoted their interests by disseminating inaccurate and misleading information..........
Keywords:- NLP techniques, machine learning algorithms, fake news, e-news, Social Media, classification.

End-To-End Slice Security Management in AI-Driven Network Slicing
Dr. Alex Mathew
Download Full Paper     Download Certificate
ABSTRACT
The dawn of software-based networks has enhanced the capacity of network slicing to effectively allocate end-to-end logical networks that facilitate the dynamic requirements of emerging applications in the backdrop of the fifth generation (5G) networks. Integrating Artificial intelligence (AI) was vital in easing and automating the management of slices. For instance, by automating the network slices across slice commissioning, activation, operation, and decommissioning. Besides enabling automated and efficient resource relocation within individual network slices and across the entire network, it has also enabled proactive end-to-end slice security management approaches such as comprehensive threat detection, lifecycle management, dynamic policy enforcement, ensuring secure communication channels, Identity and Access Management (IAM) and automated response to threats, among others. It has also enabled real-time analysis, reporting, and integration of security threats before actualizing automated incident response.
Keywords:- End-to-End Slice Security Management, Network Slicing, Artificial intelligence (AI), Identity and Access Management (IAM), dynamic policy enforcement and automated response to threats.

An Enhanced Load Balancing Methodology in Distributed System Environment
Dr. K.KUNGUMARAJ
Download Full Paper     Download Certificate
ABSTRACT
At present, there is a massive usage of internet sources with the implication of distributed system architectures. Information exchange with several web applications requires security methods. In particular, sensitive data faces the risk of security threats. Cryptography combined with a biometric feature is an enhanced security mechanism developed to resolve it. When much loads of data are in a communication network causes the overhead of adaptability, accessibility, and imbalance in load distribution. Traditional load balancing in clustered web servers are limited in faster response times, and greater performance.
Keywords:- Load Balancing, Cluster server, Information exchange.

Resilient Manufacturing Systems: Embracing Modern Manufacturing Technology
Harsh.P.Rana, Ajay Kumar.M.Solanki
Download Full Paper     Download Certificate
ABSTRACT
Flexibility in manufacturing systems is a key issue in today's industry, driven by the need to meet customer demands while ensuring low costs and high product quality. This has led many contemporary manufacturing firms to implement Flexible Manufacturing Systems (FMS). The essence of FMS is to optimize and enhance the efficiency of the manufacturing process, resulting in greater productivity and superior product quality. An FMS typically includes an integrated network of computerized numerical control (CNC) machine tools, automated material handling systems, and other elements, all managed by a central computer. This paper discusses the advantages and disadvantages of FMS, explores its various applications, and provides an overview of its different facets.
Keywords:- Computer Numerical Control, FMS Layout, Flexibility, Flexible Manufacturing System.

BLDC Motor Driven by Solar Power Using CUK Convert for Water Pump
K.Gomathi, Dr.A.Venkatesh, Dr.J.Chandramohan, R.Babyshalini
Download Full Paper     Download Certificate
ABSTRACT
A solar photovoltaic (SPV) powered brushless DC (BLDC) motor drive for water pumping is presented in this study. The current sensors of BLDC motor and the voltage sensor at the DC bus of voltage-source inverter (VSI) are eliminated completely. Instead, the speed is controlled by adjusting the DC bus voltage of VSI. The fundamental frequency switching pulses are generated to operate the VSI in order to minimise the switching losses and to enhance the efficiency of proposed system. A DC–DC Cuk converter is utilised to operate the SPV array at its maximum power. The starting current of BLDC motor is bounded by an optimal initialisation and selection of the control parameters, perturbation size and frequency while tracking the peak power of SPV array.............
Keywords:- Harmonic Reduction (HR), Varying Load (VL), Transient Response (TR),Adaptive Control (AC), Predictive Control (PC), Fuzzy Logic Control (FLC).

IRJES Authors

Scroll to Top