Qualification: 
Ph.D, M.E
v_ananthanarayanan@cb.amrita.edu
Phone: 
+91 9443251227 | +91 422 268500 (Extn: 5793)

Dr. Anantha Narayanan V. currently serves as Assistant Professor at the Department of Computer Science and Engineering, Amrita School of Engineering, Coimbatore Campus. He received his B. E. degree in Electronics and Communication from National Engineering College, Kovilpatti under Madurai Kamaraj University, Madurai in the year 1989. He received his M. E., degree in Computer Science and Engineering from College of Engineering, Guindy, Anna University, Chennai in the year 2006. He did his Ph. D. research work under the guidance of Dr. A. Rajeswari, Professor and Head, Dept. of ECE, Coimbatore Institute of Technology, Coimbatore, in the domain of Wireless Heterogeneous Networks and awarded Ph. D. in the year 2017 by Anna University, Chennai. Apart from his academic qualifications, he is a certified professional in MCP and CCNA. His areas of research include Mobile Computing, Embedded Systems, Wireless Heterogeneous Networks – QoS and Security, Internet of Things (IoT) - Node Design, Energy Optimisation, Communication Protocols. Dr. Anantha Narayanan V. is currently serving as advisor for three full-time PhD Research Scholar and as co-advisor for four part-time PhD Research Scholar under Amrita Vishwa Vidyapeetham, Coimbatore.

He is member of Indian Society for Technical Education (ISTE), The Institution of Engineers (India), The Institution of Electronics and Tele-Communication Engineers (IETE), Association for  Computing Machinery (ACM), Computer Science Teachers Association (CSTA) and a Charted Engineer certified by IE(I).

He is also serving as the Honorary Secretary of IETE Coimbatore Center.

Teaching

  • Computational Thinking and Problem Solving
  • Computer Organization and Architecture
  • Embedded Systems
  • Operating Systems
  • Computer Networks
  • Mobile Networks
  • Wireless Sensor Networks
  • Internet of Things
  • IoT Protocols and Architectures
  • Design Automation with IoT

Technical Skill Sets

  • OS Platforms: Windows , Linux, Embedded Linux, RT Linux
  • Programming Languages: C, Embedded C, C++, Python
  • Embedded Tools: Arduino, Mbed, MPLAB XC Compiler, Hi-Tech C Compiler, KEIL, IAR Embedded Work bench, CCS Compiler, STM32 Cube Programmer
  • Network Tools: NS2, Cisco Packet Tracer, Wireshark
  • MCU Hardware Platforms: Microchip, TI, NXP, ST Micro Electronics ( 8 bit and 32 bit MCUs) ARM 7 (LPC 2148), ARM 9 (AT91RM9200), ARM Cortex M3 (LPC1768) (STM32F103RB), ARM Cortex M4 (STM32F401RE), SBCs: Beagle Bone Black, Raspberry Pi and Intel UP Squared IoT Kit
  • Protocols: I2C, SPI, UART, RS 485, MODBUS, LIN, CAN, USB, Ethernet, Wi-Fi, RFID, NFC, ZigBee, BLE, GSM / GPRS, LTE-Advanced, NB-IoT and LoRa.

Publications

Publication Type: Conference Paper

Year of Publication Title

2020

S. Kumar Soundararaj, P. Sivakumar, B., and Anantha Narayanan V., “Slow Speed Alert for Speed Breakers and Potholes Using IoT and Analytics in the Context of Smart Cities”, in Smart Systems and IoT: Innovations in Computing, Singapore, 2020.[Abstract]


An Android mobile application is developed as a prototype to detect speed breakers/potholes and voice alert the driver prior to reaching the speed breaker/pothole using IoT and analytics. Through mobile application, accelerometer sensor and GPS sensor data are collected. The collected sensor data is further processed in order to detect speed breakers/potholes. Further processing is done based on the GPS coordinates collected to voice alert the user a few seconds prior to reaching the speed breaker or the pothole which in turn helps the driver in avoiding the accidents. The information collected from the registered user is shared and then stored, processed, and analyzed in a Cloud. The alert message from the system warns the users of the smart city. This also helps as a tool for authorities to immediately to attend to any repairs.

More »»

2020

B. Nagarajan, Shanmugam, V., Anantha Narayanan V., and P. Sivakumar, B., “Localization and Indoor Navigation for Visually Impaired Using Bluetooth Low Energy”, in Smart Systems and IoT: Innovations in Computing, Singapore, 2020.[Abstract]


Wireless personal networks such as infrared, Bluetooth, or wireless local area networks such as Wi-Fi or a combination of both are widely used for navigation. Real-world deployment of these systems offers various challenges. In this work, we propose a localization and indoor navigation solution using short range, low-energy Bluetooth-emitting devices, called ``Beacons'', which are used for identifying the location of different structures based on its position. An experimental analysis for effective placement of beacons, the data structures used, and the algorithm that would assist in navigation are discussed in detail. The algorithm is realized as a self-sufficient navigation solution for visually impaired using an Android application

More »»

2020

D. P. Bharathi, Anantha Narayanan V., and P. Sivakumar, B., “Fog Computing-Based Environmental Monitoring Using Nordic Thingy: 52 and Raspberry Pi”, in Smart Systems and IoT: Innovations in Computing, Singapore, 2020.[Abstract]


Environmental quality monitoring has become a major concern due to its severe impact on the well-being of living things. A continuous monitoring of environmental status related to air and water quality is essential for real-time analysis and efficient decision-making that could ensure safety and for healthy living standards. For real-time decision-making, we require the processing of streaming data intelligently to avoid latency. The real-time requirements are met by introducing an intermediary fog layer that plays a vital role between the end devices and cloud. This layer collects processes and stores the data at the edge of the network. In the proposed work, use of fog computing is exploited to monitor the environmental remotely monitoring and respond in real time based on the context for decision-making with the available streaming data that allows deriving valuable insights for prediction. The fog computing-based system offers support to provide low latency, real-time insights, decision-making, reliability, reduce the amount of data sent to the cloud, and address some of the weakness of cloud computing. It helps to alert the concerned authorities instantly to take necessary actions. This paper proposes a model on fog-based environmental monitoring and a simple testbed setup using Nordic Thingy: 52 and Raspberry Pi. The Raspberry Pi acts as a fog node and the fog services could be further exploited to realize its benefits

More »»

Publication Type: Conference Proceedings

Year of Publication Title

2019

G. S Pallavi and Anantha Narayanan V., “An Overview of Practical Attacks on BLE Based IOT Devices and Their Security”, 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS). pp. 694-698 , 2019.[Abstract]


BLE is used to transmit and receive data between sensors and devices. Most of the IOT devices employ BLE for wireless communication because it suits their requirements such as less energy constraints. The major security vulnerabilities in BLE protocol can be used by attacker to perform MITM attacks and hence violating confidentiality and integrity of data. Although BLE 4.2 prevents most of the attacks by employing elliptic-curve diffie-Hellman to generate LTK and encrypt the data, still there are many devices in the market that are using BLE 4.0, 4.1 which are vulnerable to attacks. This paper shows the simple demonstration of possible attacks on BLE devices that use various existing tools to perform spoofing, MITM and firmware attacks. We also discussed the security, privacy and its importance in BLE devices.

More »»

2019

S. Arvind and Anantha Narayanan V., “An Overview of Security in CoAP: Attack and Analysis”, 2019 5th International Conference on Advanced Computing and Communication Systems, ICACCS 2019. Institute of Electrical and Electronics Engineers Inc., pp. 655-660, 2019.[Abstract]


Over the last decade, a technology called Internet of Things (IoT) has been evolving at a rapid pace. It enables the development of endless applications in view of availability of affordable components which provide smart ecosystems. The IoT devices are constrained devices which are connected to the internet and perform sensing tasks. Each device is identified by their unique address and also makes use of the Constrained Application Protocol (CoAP) as one of the main web transfer protocols. It is an application layer protocol which does not maintain secure channels to transfer information. For authentication and end-to-end security, Datagram Transport Layer Security (DTLS) is one of the possible approaches to boost the security aspect of CoAP, in addition to which there are many suggested ways to protect the transmission of sensitive information. CoAP uses DTLS as a secure protocol and UDP as a transfer protocol. Therefore, the attacks on UDP or DTLS could be assigned as a CoAP attack. An attack on DTLS could possibly be launched in a single session and a strong authentication mechanism is needed. Man-In-The-Middle attack is one the peak security issues in CoAP as cited by Request For Comments(RFC) 7252, which encompasses attacks like Sniffing, Spoofing, Denial of Service (DoS), Hijacking, Cross-Protocol attacks and other attacks including Replay attacks and Relay attacks.In this work, a client-server architecture is setup, whose end devices communicate using CoAP. Also, a proxy system was installed across the client side to launch an active interception between the client and the server. The work will further be enhanced to provide solutions to mitigate these attacks.

More »»

2019

Anantha Narayanan V., Shyamala, C. K., and Velayutham, C. S., “Thinker for Engaging Learning Experience in Computational Thinking and Programming”, IEEE Global Engineering Education Conference, EDUCON, vol. April-2019. IEEE Computer Society, pp. 863-866, 2019.[Abstract]


This paper aims to study the potential of Thinker, a custom designed physical computing toolkit, to engage and enable students from diverse background to focus on the design, problem solving and programming aspects in a fun and creative way. 877 first year undergraduate students from 7 engineering disciplines took a 2 hour laboratory session with Thinker and at the end participated in a 5-point Likert scale survey. The survey results showed that Thinker provides an engaging way to learn computational thinking and programming; has the potential to offer a variety of project opportunities; is easier to tinker with and (upon little practice) can provide appropriate difficulty level for entry-level undergraduate students while implementing the project ideas. This engaging potential of Thinker can be attributed primarily to the exploratory design and problem solving style it promoted in the laboratory against few predefined ways of problem solving expected in typical programming laboratory sessions.

More »»

2019

V. S., Dr. Bhagavathi Sivakumar P., and Anantha Narayanan V., “Efficient Real-Time Decision Making Using Streaming Data Analytics in IoT Environment”, International Conference on Advanced Computing Networking and Informatics. Advances in Intelligent Systems and Computing, vol. 870. Singapore, pp. 165-173, 2019.

2018

Anantha Narayanan V., Dr. Shyamala C. K., and Dr. Shunmuga Velayutham C., “Thinker: A Physical Computing Tool Kit for Computational Thinking”, 2018 IEEE 18th International Conference on Advanced Learning Technologies (ICALT). pp. 298-300, 2018.[Abstract]


Identifying engaging programming tasks to teach computational thinking and programming skills, especially to students of post-secondary education, is a challenging problem for lecturers. Physical computing is a potential solution that provides ample opportunities for creative development of such skills. The availability of pre-assembled physical computing tool kits often do not offer the right level of abstraction and flexibility to suit educator's needs. Consequently, this paper presents the design of a custom physical computing tool kit, Thinker, primarily for learning and teaching computational thinking and programming skills. Prior to design discussions, the context and motivation behind designing Thinker has been presented. Preliminary pilot deployment sessions of Thinker for both teachers and students confirm its potential as an effective tool for both teaching and learning of thinking skills

More »»

2017

S. Sharad, Dr. Bhagavathi Sivakumar P., and Anantha Narayanan V., “The smart bus for a smart city - A real-time implementation”, 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2016. Institute of Electrical and Electronics Engineers Inc., 2017.[Abstract]


The need for a real-time public transport information system is growing steadily. People want to plan their city commutes and do not like waiting for long hours, nor take a long route to reach their destination. The proposed hardware solution in this paper computes the shortest path to reach the destination in real time and gives that information to the bus driver. Artificial Neural Networks (ANN) is used to give an accurate estimate of the arrival time (ETA) to the commuter by means of an application. ETA to the next stop is communicated to the commuter using the MQTT (Message Queuing Telemetry Transport) protocol, by the hardware mounted on the bus. The proposed solution also adds a fleet management console to the administrators, making them manage and monitor the fleet of buses in real time. The prototype thus developed makes sure the commuting in cities is pleasant, and hassle free. © 2016 IEEE.

More »»

2015

Anantha Narayanan V., Sureshkumar, V., and Rajeswari, A., “Automatic Traffic Classification Using Machine Learning Algorithm for Policy-Based Routing in UMTS–WLAN Interworking”, Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Springer India, New Delhi, pp. 305-312, 2015.[Abstract]


The future mobile terminal will be dependent on the multiple wireless access technology simultaneously for accessing Internet to offer best Internet connectivity to the user. But providing such interworking among wireless heterogeneous networks and routing the selected traffic to particular wireless interface is a key challenge. Currently, existing algorithms are simple and proprietary, and there is no support to route the specific application traffic automatically. The proposed decision algorithm finds the optimal network by combining fuzzy logic system with multiple-attribute decision-making and uses naïve Bayes classifier to classify the application traffic to route into appropriate interface to reduce the service cost. The performance analysis shows that the proposed algorithm efficiently uses the network resources by maintaining active connection simultaneously with 3G and Wi-Fi. It routes 71.99 % of application traffic using Wi-Fi network and 28.008 % of application traffic using UMTS network to reduce the service cost and to reduce network load on the cellular operator.

More »»

2015

Anantha Narayanan V., Rajeswari, A., and Sureshkumar, V., “Service-Adaptive Fuzzy Multi Criteria based Intelligent Vertical Handover Decision Algorithm for Heterogeneous Wireless Networks”, Advances in Intelligent Systems and Computing, vol. 324. Springer Verlag, pp. 297-304, 2015.[Abstract]


The next-generation wireless networks should be interoperable with other communication technologies to offer the best connectivity to the users. But providing such interworking is a key challenge. Currently, existing decision engines are simple, proprietary, and have no support for profile-based service, and handover is only based on the received signal strength which is not intelligible enough to make handoff decision. The proposed decision algorithm gains intelligence by combining fuzzy logic system, multiple attribute decision making, and context-aware strategies. It synchronizes the user schedule and usage pattern through software agent for making handover at appropriate time. The performance analysis shows that the proposed algorithm efficiently uses the network resources by switching between 3G and Wi-Fi based on the user schedule. It is observed that average handover delay for the experiment is 25–35 ms under good RF conditions, running time of algorithm is around 1 ms, and it reduces the call dropping rate (<0.006), blocking probability (<0.00607), as well as unnecessary handover in heterogeneous networks. © Springer India 2015.

More »»

2015

S. Sharad, Dr. Bhagavathi Sivakumar P., and Anantha Narayanan V., “A novel IoT-Based energy management system for large scale data centers”, e-Energy 2015 - Proceedings of the 2015 ACM 6th International Conference on Future Energy Systems. Association for Computing Machinery, Inc (ACM New York NY USA), pp. 313-318, 2015.[Abstract]


The high energy consumption in data centers is becoming a major concern because it leads to increased operating costs and also, pollution, as fuel is burnt to produce the required energy. While many techniques and methods have been proposed by various organizations and researchers to minimize the energy consumption, there has been considerably less work done in making a smart-energy management system that is capable of collecting the data available and make decisions based on the energy consumption patterns. In this work, a smart system is proposed that uses Internet of Things to gather data and a machine learning algorithm for decision making. © 2015 ACM.

More »»

2014

S. Kumar, Rajeswari, A., and Anantha Narayanan V., “Enhanced fast iterative localized re-authentication protocol for UMTS-WLAN interworking”, International Conference on Electronics and Communication Systems (ICECS'14) . IEEE Xplore Digital Library, pp. 1-5, 2014.[Abstract]


The next generation wireless access networks (NGWN) should be capable of interoperable with other communication technologies and should coordinate with them to offer best connectivity to the users. It is being a challenging task in heterogeneous wireless access networks for supporting seamless handover from one technology to another with minimal packet loss and low latency. The 3G/UMTS-WLAN interworking allows the mobile station to choose between 3G or WLAN radio access technologies for satisfying requirements of mobile users. Since mobile users moving between 3G/UMTS and WLAN, it has to be authenticated every time it moves to another access technology. The existing authentication protocol like full authentication protocol and fast re-authentication protocol has high computation load on HLR/HSS and RADIUS server and unacceptable packet loss due to high authentication delay. Fast iterative localized re-authentication with minor changes to EAP-AKA protocol reduces the authentication delay, but it fails to satisfy the security on authentication vectors in the access point. The proposed work enhances the security on fast iterative localized re-authentication protocol with minimal authentication delay and minimum signaling cost. The security significance of the proposed protocol is verified with AVISPA (Automated Validation of Internet Security Protocols and Applications) security analyzer.

More »»

Publication Type: Journal Article

Year of Publication Title

2019

S. Manuel J, Anantha Narayanan V., and M, S., “LoPT : LoRa Penetration Testing Tool”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol. 8, no. 9S2, pp. 374-379, 2019.[Abstract]


The advent of Wireless technologies and IOT are currently ruling the modern world. Everything is going to become Things in future. As the technology progresses , the security of those technologies must also progress with an steady rate. Security tools which will help us to analyze these advanced security enhancements and protocols implemented. In this study , we are going to implement new security tool which concentrates on penetration testing of one such IOT protocol. This tool
concentrates on the protocol named LoRa used for wireless long range communication in IOT. The proposed tool will explore all the possible attacks on LoRa protocol which we will see about in detail in the upcoming sections. LoPT is a new penetration testing tool which will work on LoRa (Long Range),a wireless standard used for long range low power communication on IOT devices primarily. This newly bloomed flower performs an effective domination on the field of IOT. Currently there is no existing penetration testing tool for LoRa. Though LoRa has its inbuilt security , there are major vulnerabilities which can be explored . This tool is built primarily on the concept of There’s no such thing as 100

More »»

2016

S. Sharad, Dr. Bhagavathi Sivakumar P., and Anantha Narayanan V., “An Automated System to Mitigate Loss of Life at Unmanned Level Crossings”, Procedia Computer Science, vol. 92, pp. 404 - 409, 2016.[Abstract]


Every life is precious and is worth saving. This paper proposes the design and implementation of a system to mitigate the loss of life at unmanned railway level crossings. This system uses the advancements in Communication, Embedded Systems and Internet of Things to develop a real-time, early warning system for unmanned level crossings across India. The outcome of this work is to provide an audio-visual indication to the commuter warning about an approaching train. The need for such systems and its design implementation and feasibility is discussed in this paper

More »»

2016

Ra Sasikumar, Anantha Narayanan V., and Rajeswari, Ab, “An intelligent pico Cell Range Expansion technique for Heterogeneous Wireless Networks”, Indian Journal of Science and Technology, vol. 9, no. 9, 2016.[Abstract]


Background/Objectives: Due to high transmission power emitted by macro cell, very few users will be offloaded to nearby pico cell which leads to underutilization of pico cells in Heterogeneous Networks (HetNet). Method/Statistical Analysis: Cell Range Expansion (CRE) is a technique to virtually expand the coverage range of pico cell. With the help of CRE, user equipment will add a bias value to actual signal strength received from pico cell and thereby offload their traffic from macro cell to pico cell. But, at the same time adding bias value will lead to additional downlink interference which becomes severe for choosing higher bias value. Findings: Optimal bias value reduces the number of outage mobile stations but it depends on several factors which are hard to find such as the distribution of mobile stations over the cells, resource shared between pico and macro cells, mobility pattern and so on. In this paper, we are proposing a solution of Intelligent Pico Cell Range Expansion (IP-CRE) which calculates the effective bias value for each mobile station independently, by using a fuzzy logic inference system. Our proposed solution takes multiple attributes like signal strength of pico and macro cells, speed and direction of mobile stations, battery level and traffic requirements as input parameters and the output will be an effective bias value for each mobile station. We analyzed the effectiveness of the bias value by varying the number of connected Pico cell User Equipment (PUE) in the expansion region. Application/Improvements: Our observations from the simulation experiments demonstrate that the proposed scheme reduces the number of outage UE and increases the number of offloaded UE in Het Net.

More »»

2015

Anantha Narayanan V., Rajeswari, Ab, Gouthamkashyap, Pc, and Sharad, Sa, “An attack perceptive approach for reliable and secure wireless connectivity between medical devices in public environment”, International Journal of Applied Engineering Research, vol. 10, no. 3, pp. 6581-6600, 2015.[Abstract]


Implementation of wireless sensors in Personal Medical Devices (PMDs) results in wire-free communication between the medical devices on the patients' body and provides mobility to the patients. In such health applications more importance has to be given to data reliability and security of PMDs. In this research work, wireless co-existence of a wireless insulin pump was experimentally investigated. An empirical study was carried out to prove that RSSI and LQI parameters are not sufficient to validate the wireless co-existence of the insulin pump. As a solution, an Attack Perceptive Algorithm (APA) was proposed and in the wireless insulin pump, operating in 2.4 GHz ISM band. It was tested along with a Wireless Local Area Network (WLAN) in an indoor environment. Results prove that implementation of APA assures invulnerability to the insulin pump from the Electromagnetic Interference (EMI) caused by the co-existing WLAN and ensures data reliability and security. This fact is supported by attacks carried out by an intruder with various key operational parameters. Thus, an expression for the total attacks to be done by the intruder to become a receiver is calculated. © Research India Publications.

More »»

2014

Anantha Narayanan V., Rajeswari, A., and Sureshkumar, V., “An intelligent vertical handover decision algorithm for wireless heterogeneous networks”, American Journal of Applied Sciences, vol. 11, no. 5, pp. 732-739, 2014.[Abstract]


The Next Generation Wireless Networks (NGWN) should be compatible with other communication technologies to offer the best connectivity to the mobile terminal which can access any IP based services at any time from any network without the knowledge of its user. It requires an intelligent vertical handover decision making algorithm to migrate between technologies that enable seamless mobility, always best connection and minimal terminal power consumption. Currently existing decision engines are simple, proprietary and its handover is only based on the received signal strength which has been proven unintelligent. The proposed decision algorithm gains intelligence by combining fuzzy logic system to handle imprecise data, multiple attribute decision making to handle multiple attributes for decision making and context aware strategies to reduce unnecessary handover. The proposed intelligent decision algorithm detects new network which offers best connectivity than current network and does authentication and mobile IP registration before making the handover; thereby reducing the packet loss to ensure high quality of service. This algorithm is capable of forwarding data packets to appropriate attachment point to maximize battery lifetime and also to maintain load balancing. The performance analysis shows that the proposed algorithm efficiently uses the network resources by switching between 3G and Wi-Fi under the different RF environmental conditions to offer best connectivity with minimal service cost to the users. It is observed that average handover delay for the experiment is 30-40ms and the integration of cellular network with WLAN using the proposed intelligent decision algorithm reduces the call dropping rate (<0.006) and call blocking probability (<0.00607) as well as unnecessary handover in heterogeneous networks.

More »»

2014

V. Sureshkumar, Anantha Narayanan V., and Sasikumar, R., “A brief study on technical challenges in migrating from 3G to 4G”, International Journal of Applied Engineering Research, vol. 9, no. 17, pp. 4041-4050, 2014.[Abstract]


Mobile communication is the fastest growing field to provide mobile Internet to the users. The increased usage of social networking sites and multimedia applications on the Internet requires tremendous bandwidth. There are various techniques evolving in mobile and wireless communications for offering high data rate, reliability, long coverage, and high mobility to satisfy the need of high quality of service to the users. To provide Internet anytime from any network, global roaming, and high quality of service to the users, 4G is being deployed in most of the places by some operators. While other operators are also planning to start the deployment of 4G. Since the some operators are deploying fourth generation networks, the other operators are also in the need to move 4G networks. But there are many operator has been invested a huge amount on third generation networks as well as migrating from 3G to 4G technology is not easier. This paper reviews the technical challenges in moving from 3G to 4G and also suggests complementary services for the network operators for quick deployment to offer high data rate and highly reliable services. It concludes with the performance analysis of 3G and 4G network in terms of quality of service that can deliver. © Research India Publications.

More »»

Publication Type: Book Chapter

Year of Publication Title

2018

S. Birindha, Anantha Narayanan V., and Dr. Bhagavathi Sivakumar P., “Smart Energy Management System Based on Image Analytics and Device Level Analysis”, in Computational Vision and Bio Inspired Computing. Lecture Notes in Computational Vision and Biomechanics, vol. 28, Springer, Cham, 2018, pp. 705-721.[Abstract]


Large educational institutes, organization, and industries face large challenges on energy utilities, consumption and its management strategies. But smart energy management technology solutions help the high energy consumption complexities during while putting the best and greenest foot forward. Smart Energy Management technology solutions, improve and respond quickly to power spikes at times of demand, expedite data gathering, reporting and regulatory compliance, automate services to control operating costs and enable to save energy. Connecting smart meters to data stores requires a reliable, intelligent network. The Smart Energy Management System introduced here deals with a device level analysis that gives information of the device that has caused the peak rise in the total power consumption of the organization. Predictive analysis technique is used on the database to predict the future maximum demand and load balancing technique is applied to reduce the consumption of power from generator source. Therefore the total power consumption from exceeding the maximum demand can be avoided and the maximum demand of the power supply for the organization can be maintained. Further, on application of AI techniques this system control becomes fully automated.

More »»