Pub Date : 2023-02-18DOI: 10.52783/cienceng.v11i1.279
Kiranmai P., P. V. Ravi Kumar
Discourse analysis in terms of both spoken and written language is believed to be helpful for both linguists and language teachers. Written discourse is considered an imperative aspect that needs to be analyzed. Cohesion, coherence, clause relations and text patterns are all parts of written discourse. This study attempts to provide a vehicle for understanding student perceptions about writing and writing instruction through a case study supported by discourse analysis of student talk. The undergraduate students in this study participated in interviews and focus groups about their experiences with writing. The findings reveal deep seeded notions about writing enculturated through their under-graduation. Students were not likely to take ownership of their writing, rather considering it a teacher construct, and could not typically describe the application of writing skills.
{"title":"Written Discourse Investigation a Study Based on Undergraduate Students","authors":"Kiranmai P., P. V. Ravi Kumar","doi":"10.52783/cienceng.v11i1.279","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.279","url":null,"abstract":"Discourse analysis in terms of both spoken and written language is believed to be helpful for both linguists and language teachers. Written discourse is considered an imperative aspect that needs to be analyzed. Cohesion, coherence, clause relations and text patterns are all parts of written discourse. This study attempts to provide a vehicle for understanding student perceptions about writing and writing instruction through a case study supported by discourse analysis of student talk. The undergraduate students in this study participated in interviews and focus groups about their experiences with writing. The findings reveal deep seeded notions about writing enculturated through their under-graduation. Students were not likely to take ownership of their writing, rather considering it a teacher construct, and could not typically describe the application of writing skills.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114245923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-18DOI: 10.52783/cienceng.v11i1.262
D. Vishnu Priya et al.
A simple and easy task such as parking is thought as a tedious and time-consuming process due to mismanagement of parking system. Current parking systems involve huge manpower for management and requires user to search for parking space floor by floor. Such conventional systems utilize more power, along with user’s valuable time. This paper presents a Smart Parking & Energy Management solution for a structured environment such as a multi-storied office parking area. The system proposes implementation of state-of-the-art Internet of Things (IoT) technology to mold with advanced Honeywell sensors and controllers to obtain a systematic parking system for users. Unoccupied vehicle parking spaces are indicated using lamps and users are guided to an empty parking space, thus eliminating need for searching for a parking space. The occupied parking spaces are virtually stored to the cloud to be accessed by central system and direct the upcoming cars to empty spaces. The automatically controlled light illuminance helps reduce energy usage, along with lighting up the parking space to the user whilst in the parking space. The entire system being fully automatic leads to reduced manpower involved and improves illuminance aesthetics of the parking area. This paper aims at improving user’s time value and convenience in a parking system.
{"title":"Smart Car Parking System Using IoT","authors":"D. Vishnu Priya et al.","doi":"10.52783/cienceng.v11i1.262","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.262","url":null,"abstract":"A simple and easy task such as parking is thought as a tedious and time-consuming process due to mismanagement of parking system. Current parking systems involve huge manpower for management and requires user to search for parking space floor by floor. Such conventional systems utilize more power, along with user’s valuable time. This paper presents a Smart Parking & Energy Management solution for a structured environment such as a multi-storied office parking area. The system proposes implementation of state-of-the-art Internet of Things (IoT) technology to mold with advanced Honeywell sensors and controllers to obtain a systematic parking system for users. Unoccupied vehicle parking spaces are indicated using lamps and users are guided to an empty parking space, thus eliminating need for searching for a parking space. The occupied parking spaces are virtually stored to the cloud to be accessed by central system and direct the upcoming cars to empty spaces. The automatically controlled light illuminance helps reduce energy usage, along with lighting up the parking space to the user whilst in the parking space. The entire system being fully automatic leads to reduced manpower involved and improves illuminance aesthetics of the parking area. This paper aims at improving user’s time value and convenience in a parking system.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121636524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-18DOI: 10.52783/cienceng.v11i1.295
B. Krishnan, Dr. Bhargavi D Hemmige
People who listen to community radio are better able to take part in civic discourse, government, economic development, poverty alleviation, and anti-corruption campaigns. There is no natural audience for community radio. What is needed is to connect Community Radio to people's most pressing concerns and to ensure that people see their issues in the context of their right to development." It's a study on the effectiveness of Community Radio (CR) in India, as well as on the level of community involvement in the programme. By examining the efficacy of selected indicators, this study aims to bridge the knowledge gap that exists between the broadcaster and the beneficiaries. Community radio stations in India have been singled out for examination, with an eye toward documenting and analysing their own internal structures as well as their finances. An important factor in supporting a community radio station's long-term viability is the number of populations it serves, which in turn attracts more revenue in the form of advertising, which in turn improves the station's sustainability. Lacking policy, Nepali radio stations self-identify as "Community" or "Commercial" stations based on their stated mission statements and goals and the way they programme.
{"title":"The role of Community Radio in Gender based Development.","authors":"B. Krishnan, Dr. Bhargavi D Hemmige","doi":"10.52783/cienceng.v11i1.295","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.295","url":null,"abstract":"People who listen to community radio are better able to take part in civic discourse, government, economic development, poverty alleviation, and anti-corruption campaigns. There is no natural audience for community radio. What is needed is to connect Community Radio to people's most pressing concerns and to ensure that people see their issues in the context of their right to development.\" It's a study on the effectiveness of Community Radio (CR) in India, as well as on the level of community involvement in the programme. By examining the efficacy of selected indicators, this study aims to bridge the knowledge gap that exists between the broadcaster and the beneficiaries. Community radio stations in India have been singled out for examination, with an eye toward documenting and analysing their own internal structures as well as their finances. An important factor in supporting a community radio station's long-term viability is the number of populations it serves, which in turn attracts more revenue in the form of advertising, which in turn improves the station's sustainability. Lacking policy, Nepali radio stations self-identify as \"Community\" or \"Commercial\" stations based on their stated mission statements and goals and the way they programme.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127033108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-18DOI: 10.52783/cienceng.v11i1.185
S. M. M. Naidu et al.
Speech is used by humans to communicate with one another. Speech not only carries the content but also context of the information. There have been advancements in the field of identification and classification of speech. Also, the emergence of consumer applications that are speech-centric has also added to the rigor for perfecting human-machine interaction. This study aims to review the research in this field focusing on the papers from 2010 onwards.
{"title":"Speech-based Emotion Recognition Methodologies","authors":"S. M. M. Naidu et al.","doi":"10.52783/cienceng.v11i1.185","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.185","url":null,"abstract":"Speech is used by humans to communicate with one another. Speech not only carries the content but also context of the information. There have been advancements in the field of identification and classification of speech. Also, the emergence of consumer applications that are speech-centric has also added to the rigor for perfecting human-machine interaction. This study aims to review the research in this field focusing on the papers from 2010 onwards.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"28 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114008166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-18DOI: 10.52783/cienceng.v11i1.267
Neda Fatma, Prof. M. R. Hassan, Dilshad Akhtar, J. U. Zaman
This manuscript deals with the theorem on diminution of the Extended Euclidean Algorithm for finding the multiplicative inverse of non-zero elemental polynomials of Galois field with respect to a monic irreducible polynomial over , where is a prime and is any positive integer. This method became successful in finding the multiplicative inverse of all those non-zero polynomials for which the Extended Euclidean Algorithm fails. We find the inverse of all 342 non-zero elemental polynomials of using an irreducible polynomial We also used Cayley Hamilton’s theorem for finding the multiplicative inverse of the non-zero elemental polynomials of a finite field.
{"title":"Diminution of Extended Euclidean Algorithm for Finding Multiplicative Inverse in Galois Field","authors":"Neda Fatma, Prof. M. R. Hassan, Dilshad Akhtar, J. U. Zaman","doi":"10.52783/cienceng.v11i1.267","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.267","url":null,"abstract":"This manuscript deals with the theorem on diminution of the Extended Euclidean Algorithm for finding the multiplicative inverse of non-zero elemental polynomials of Galois field with respect to a monic irreducible polynomial over , where is a prime and is any positive integer. This method became successful in finding the multiplicative inverse of all those non-zero polynomials for which the Extended Euclidean Algorithm fails. We find the inverse of all 342 non-zero elemental polynomials of using an irreducible polynomial We also used Cayley Hamilton’s theorem for finding the multiplicative inverse of the non-zero elemental polynomials of a finite field.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114012179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-18DOI: 10.52783/cienceng.v11i1.356
Dr. P. Ramya, G. Raj, Kerish Jacob Raj, Dhanyaa Shree
The paper presents a smart approach for a real time painting of walls in continuous flow. Image processing in today’s world grabs massive attention as it leads to possibilities of broaden application in many fields of high technology. The camera senses the color of the wall. This information is processed for robot to paint different places. The painting process is based on a 2-phase operative methodology defined as, 1) A self-learning step where the apparatus learns to identify the color of the wall 2) An operative selection process where the painting location is detected and painted using a decisional algorithm. It aims in classifying the walls and its objects based on its color. The robot is programmed to carry the paint gun to the location and paint it. This eliminates the monotonous work done by existing system. It achieves high accuracy and speed. The project involves camera that senses the object and sends the signal to the microcontroller. The microcontroller sends signal to the circuit which drives various motors of the robot. Based on the detection the climber moves to the specified location and starts painting. By using Design Thinking approach Empathy was done to identify the difficulties in painting. Following the steps of Design Thinking the proposed method gives the automated paint sprayer using image processing.
{"title":"Computer Vision Controlled Automated Paint Sprayer Using Image Processing and Embedded System","authors":"Dr. P. Ramya, G. Raj, Kerish Jacob Raj, Dhanyaa Shree","doi":"10.52783/cienceng.v11i1.356","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.356","url":null,"abstract":"The paper presents a smart approach for a real time painting of walls in continuous flow. Image processing in today’s world grabs massive attention as it leads to possibilities of broaden application in many fields of high technology. The camera senses the color of the wall. This information is processed for robot to paint different places. The painting process is based on a 2-phase operative methodology defined as, 1) A self-learning step where the apparatus learns to identify the color of the wall 2) An operative selection process where the painting location is detected and painted using a decisional algorithm. It aims in classifying the walls and its objects based on its color. The robot is programmed to carry the paint gun to the location and paint it. This eliminates the monotonous work done by existing system. It achieves high accuracy and speed. The project involves camera that senses the object and sends the signal to the microcontroller. The microcontroller sends signal to the circuit which drives various motors of the robot. Based on the detection the climber moves to the specified location and starts painting. By using Design Thinking approach Empathy was done to identify the difficulties in painting. Following the steps of Design Thinking the proposed method gives the automated paint sprayer using image processing.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123981376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-18DOI: 10.52783/cienceng.v11i1.344
Neda Fatma, M. R. Hassan, Dilshad Akhtar
This manuscript explores the fusion of two well-known encryption algorithms, the Advanced Encryption Standard (AES) and the Rivest Cipher (RC4), resulting in a novel encryption algorithm called AES-RC4. AES-RC4 is a block cipher that combines the strengths of AES with a variant of RC4 called RC4-GF, developed by ourselves. RC4-GF incorporates additional steps compared to AES, resulting in a more intricate ciphertext generation process. The introduction of AES-RC4 brings forth a highly secure encryption technique with increased complexity in the ciphertext compared to traditional AES. By leveraging the combined capabilities of AES and the modified RC4-GF, AES-RC4 offers enhanced encryption strength and improved resistance against cryptographic attacks.
{"title":"Incorporating the New PRNG in Advance Encryption Standard","authors":"Neda Fatma, M. R. Hassan, Dilshad Akhtar","doi":"10.52783/cienceng.v11i1.344","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.344","url":null,"abstract":"This manuscript explores the fusion of two well-known encryption algorithms, the Advanced Encryption Standard (AES) and the Rivest Cipher (RC4), resulting in a novel encryption algorithm called AES-RC4. AES-RC4 is a block cipher that combines the strengths of AES with a variant of RC4 called RC4-GF, developed by ourselves. RC4-GF incorporates additional steps compared to AES, resulting in a more intricate ciphertext generation process. \u0000The introduction of AES-RC4 brings forth a highly secure encryption technique with increased complexity in the ciphertext compared to traditional AES. By leveraging the combined capabilities of AES and the modified RC4-GF, AES-RC4 offers enhanced encryption strength and improved resistance against cryptographic attacks.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124039038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-18DOI: 10.52783/cienceng.v11i1.268
E. Divya et al.
Automated Teller Machines are widely used nowadays by people. But it’s hard to carry their ATM card everywhere, people may forget to have their ATM card or forget their PIN. The ATM card may get damaged and users can have a situation where they can’t get access to their money. The main aim of the project is to design a Face Recognition Based New Generation ATM Machine using MATLAB. This application is processed in the ATM security framework to improve the verification strategies to improve innovation.
{"title":"Face Recognition Based New Generation ATM Machine","authors":"E. Divya et al.","doi":"10.52783/cienceng.v11i1.268","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.268","url":null,"abstract":"Automated Teller Machines are widely used nowadays by people. But it’s hard to carry their ATM card everywhere, people may forget to have their ATM card or forget their PIN. The ATM card may get damaged and users can have a situation where they can’t get access to their money. The main aim of the project is to design a Face Recognition Based New Generation ATM Machine using MATLAB. This application is processed in the ATM security framework to improve the verification strategies to improve innovation.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"150B 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121240648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-18DOI: 10.52783/cienceng.v11i1.122
Smita S. Wagh et al.
Botnets pose a significant threat to global Internet security. A new pattern is evolving to shift botnets from conventional desktop to mobile platforms with continued sophistication and durability surroundings that move. To lessen the harm that mobile botnets pose, just like in the desktop environment, detection is crucial. Recognizing patterns of unusual behaviour is one of the many methods used to find these botnets, and it produces the best and most often findings. Analysing the running characteristics of this kind of application is one technique to spot similar tendencies in the mobile botnet area. This article examines host-based and anomaly-based methods for detecting mobile botnets. The suggested method extracts statistical characteristics of aberrant behaviour from system calls and utilises machine learning methods to identify them. In realistic settings, the effectiveness of the employed strategy can be tested. Excellent outcomes were attained by the suggested strategy, which included a low false positive rate and a high actual detection rate.
{"title":"SVM-Based Machine Learning Approach for Mobile Botnet Detection","authors":"Smita S. Wagh et al.","doi":"10.52783/cienceng.v11i1.122","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.122","url":null,"abstract":"Botnets pose a significant threat to global Internet security. A new pattern is evolving to shift botnets from conventional desktop to mobile platforms with continued sophistication and durability surroundings that move. To lessen the harm that mobile botnets pose, just like in the desktop environment, detection is crucial. Recognizing patterns of unusual behaviour is one of the many methods used to find these botnets, and it produces the best and most often findings. Analysing the running characteristics of this kind of application is one technique to spot similar tendencies in the mobile botnet area. This article examines host-based and anomaly-based methods for detecting mobile botnets. The suggested method extracts statistical characteristics of aberrant behaviour from system calls and utilises machine learning methods to identify them. In realistic settings, the effectiveness of the employed strategy can be tested. Excellent outcomes were attained by the suggested strategy, which included a low false positive rate and a high actual detection rate.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128909865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-18DOI: 10.52783/cienceng.v11i1.142
Manishkumar Sharma, Deepak Mane
CNNs attempt to capture this pattern using a conceptual network, which represents the knowledge as nodes connected in automatic tag generation. The main advantage of using CNN over other traditional methods is its ability to learn from examples rather than being given a predefined set of rules. The introduction of automatic tag generation using CNN algorithms is described here. The materials that have been used for image detection and tag generation is proceeding with the multiple processes of image detection. YOLO algorithms is used for the experiment, which is critically analyzed. Result describe the experiment outcome of the tagged image, which helps to describe the conclusion.
{"title":"Machine Learning-Based Automatic Tag Generation Using CNN Algorithm","authors":"Manishkumar Sharma, Deepak Mane","doi":"10.52783/cienceng.v11i1.142","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.142","url":null,"abstract":"CNNs attempt to capture this pattern using a conceptual network, which represents the knowledge as nodes connected in automatic tag generation. The main advantage of using CNN over other traditional methods is its ability to learn from examples rather than being given a predefined set of rules. The introduction of automatic tag generation using CNN algorithms is described here. The materials that have been used for image detection and tag generation is proceeding with the multiple processes of image detection. YOLO algorithms is used for the experiment, which is critically analyzed. Result describe the experiment outcome of the tagged image, which helps to describe the conclusion.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129077339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}