首页 > 最新文献

Proceeding International Conference on Science and Engineering最新文献

英文 中文
IoT Based Solar E-Uniform for Soldiers 基于物联网的士兵太阳能电子制服
Pub Date : 2023-02-18 DOI: 10.52783/cienceng.v11i1.321
Shaik Mohammad Rasool et al.
The soldiers working in harsh weather conditions are better protected by solar-powered E-Uniforms. The E-internal uniform's electronics is powered by solar panels. 12 V DC lead acid battery, Energy is stored using a rechargeable battery. Additionally, we use a typical battery charging machine to deliver power to the circuits. The ESP32 microcontroller, which manages every function, is the brains of the circuit. In order to display the voltage generated by the battery on a 16X2 LCD, a voltage sampler is interfaced with the system using an ADC inbuilt in the ESP32.Both a summer and a winter operating mode is used for the project. Control operations through advance ICs so that it can drive the body heater/cooler by choosing the mode of operation. To enable the soldier adapt to any type of external climate, we will use the heater or cooler to deliver a warming or cooling effect within the uniform.The metal sensor will alert the soldier with a buzzer indication if it finds a metal-like explosive. The microcontroller and IOT are interfaced, and the GPS is also interfaced, allowing for the tracking of the entire soldier. Additionally, the location is messaged to the department or person of interest. The soldier will be able to work in any area thanks to this uniform.
在恶劣天气条件下工作的士兵们可以通过太阳能电子制服得到更好的保护。E-internal制服的电子设备由太阳能电池板供电。12v直流铅酸电池,使用可充电电池存储能量。此外,我们使用典型的电池充电机为电路供电。控制所有功能的ESP32微控制器是电路的大脑。为了在16X2 LCD上显示电池产生的电压,使用ESP32内置的ADC与系统连接电压采样器。该项目采用夏季和冬季两种运行模式。通过先进的集成电路控制操作,使其可以通过选择操作模式驱动车身加热器/冷却器。为了使士兵能够适应任何类型的外部气候,我们将使用加热器或冷却器在制服内提供加热或冷却效果。如果发现类似金属的爆炸物,金属传感器会用蜂鸣器提示士兵。微控制器和物联网接口,GPS也接口,允许跟踪整个士兵。此外,将位置信息发送给相关部门或人员。由于这身制服,士兵将能在任何地方工作。
{"title":"IoT Based Solar E-Uniform for Soldiers","authors":"Shaik Mohammad Rasool et al.","doi":"10.52783/cienceng.v11i1.321","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.321","url":null,"abstract":"The soldiers working in harsh weather conditions are better protected by solar-powered E-Uniforms. The E-internal uniform's electronics is powered by solar panels. 12 V DC lead acid battery, Energy is stored using a rechargeable battery. Additionally, we use a typical battery charging machine to deliver power to the circuits. The ESP32 microcontroller, which manages every function, is the brains of the circuit. In order to display the voltage generated by the battery on a 16X2 LCD, a voltage sampler is interfaced with the system using an ADC inbuilt in the ESP32.Both a summer and a winter operating mode is used for the project. Control operations through advance ICs so that it can drive the body heater/cooler by choosing the mode of operation. To enable the soldier adapt to any type of external climate, we will use the heater or cooler to deliver a warming or cooling effect within the uniform.The metal sensor will alert the soldier with a buzzer indication if it finds a metal-like explosive. The microcontroller and IOT are interfaced, and the GPS is also interfaced, allowing for the tracking of the entire soldier. Additionally, the location is messaged to the department or person of interest. The soldier will be able to work in any area thanks to this uniform.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128985484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dangerous Driving Detection Based on IoT 基于物联网的危险驾驶检测
Pub Date : 2023-02-18 DOI: 10.52783/cienceng.v11i1.297
Nagendran, Sugan Raj, Mohamed Anaz
Today, finding drowsy drivers is perhaps the most important step in stopping any traffic accident, everywhere in the globe. The objective of this study was to develop a smart alert approach for intelligent vehicles that can prevent drowsy driving impairment automatically. But being sleepy is a natural bodily occurrence that might occur for a variety of reasons. Therefore, it is necessary to create a reliable alert system to prevent the accident's cause. In this proposed research, we discuss a method for developing a drowsy driver alert system that analyses video stream processing (VSP) utilizing the eye blink concept employing the eye aspect ratio (EAR) and Euclidean distance of the eye. The face landmark algorithm is also employed as a reliable method for detecting eyes. The IoT module sends a warning message together with collision impact and location information when the driver's weariness is recognized, alerting with the help of a voice speaking over the Raspberry Pi monitoring system.
今天,发现昏昏欲睡的司机可能是阻止任何交通事故最重要的一步,在世界各地。本研究的目的是为智能车辆开发一种智能警报方法,可以自动防止疲劳驾驶损伤。但困倦是一种自然的身体现象,可能有多种原因。因此,有必要建立一个可靠的警报系统,以防止事故的原因。在本研究中,我们讨论了一种开发困倦驾驶员警报系统的方法,该系统利用眼睛宽高比(EAR)和眼睛的欧几里得距离,利用眨眼概念分析视频流处理(VSP)。人脸地标算法也是一种可靠的眼睛检测方法。当识别到驾驶员的疲劳状态时,物联网模块会发送警告信息,以及碰撞影响和位置信息,并通过树莓派监控系统发出语音警报。
{"title":"Dangerous Driving Detection Based on IoT","authors":"Nagendran, Sugan Raj, Mohamed Anaz","doi":"10.52783/cienceng.v11i1.297","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.297","url":null,"abstract":"Today, finding drowsy drivers is perhaps the most important step in stopping any traffic accident, everywhere in the globe. The objective of this study was to develop a smart alert approach for intelligent vehicles that can prevent drowsy driving impairment automatically. But being sleepy is a natural bodily occurrence that might occur for a variety of reasons. Therefore, it is necessary to create a reliable alert system to prevent the accident's cause. In this proposed research, we discuss a method for developing a drowsy driver alert system that analyses video stream processing (VSP) utilizing the eye blink concept employing the eye aspect ratio (EAR) and Euclidean distance of the eye. The face landmark algorithm is also employed as a reliable method for detecting eyes. The IoT module sends a warning message together with collision impact and location information when the driver's weariness is recognized, alerting with the help of a voice speaking over the Raspberry Pi monitoring system.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123632747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Mean Duration of COVID-19 Found Closely Associated with the Ayurvedic Pathognomic Model Shatkriyakala (SKK): Inference of an Observational Cross-Sectional Exploratory Study 新冠肺炎的平均持续时间与阿育吠陀病理学模型Shatkriyakala (SKK)密切相关:一项观察性横断面探索性研究的推断
Pub Date : 2023-02-18 DOI: 10.52783/cienceng.v11i1.248
Charu Sharma et al.
A valid measurement for Corona virus disease is needed for case definition and adopting appropriate therapeutic measures. Identification of epidemiology and etio-pathogenesis is must for case definitions. The incubation period The incubation period is the time elapsed between pathogen exposure and appearance of symptoms. It can be utilized to trace the contact history of population at high risk.  Incubation, latent and generation periods may help both in understanding transmission and developing therapeutic measures. The evidenced incubation period of covid-19 infection is found to be 5.6-6.7 days. Ayurveda advocates Shatkriyakala pathognomic model i.e. six stage model of disease progression. Aims and Objective: The present study focused to trace –pathological model in context of covid-19. Material and method: This study was conducted in Government ayurvedic institute, COVID testing centre, New Delhi. The tool of data collection was Questionnaire 1 &2. Result:We report a temporal pattern of COVID-19 pathology which corresponds to six-stages of disease progression.(shadvidh kriyakala). Discussion: Assessment of relationship between the variables (Hetu-dosha and Dushya) responsible for pathogenesis temporal dynamics of covid-19 may serve as an instrument for mapping the pathogenesis. Conclusion: Clinical staging of covid-19 can be potentially mapped by six stage classical pathological model.
需要对冠状病毒病进行有效的测量,以确定病例并采取适当的治疗措施。病例定义必须确定流行病学和病因发病机制。潜伏期潜伏期是指从接触病原体到出现症状之间所经过的时间。可用于追踪高危人群的接触史。潜伏期、潜伏期和发生期可能有助于了解传播和制定治疗措施。新冠肺炎确诊潜伏期为5.6 ~ 6.7天。阿育吠陀提倡Shatkriyakala病理模型,即疾病进展的六阶段模型。目的和目的:本研究的重点是在covid-19背景下追踪病理模型。材料和方法:本研究在新德里政府阿育吠陀医学研究所、COVID检测中心进行。数据收集工具为问卷1和问卷2。结果:我们报告了COVID-19病理的时间模式,对应于疾病进展的六个阶段。(shadvidh kriyakala)。讨论:评估与covid-19发病机制时间动态相关的变量(Hetu-dosha和Dushya)之间的关系可作为绘制发病机制的工具。结论:新型冠状病毒肺炎的六期经典病理模型具有潜在的临床分期特征。
{"title":"The Mean Duration of COVID-19 Found Closely Associated with the Ayurvedic Pathognomic Model Shatkriyakala (SKK): Inference of an Observational Cross-Sectional Exploratory Study","authors":"Charu Sharma et al.","doi":"10.52783/cienceng.v11i1.248","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.248","url":null,"abstract":"A valid measurement for Corona virus disease is needed for case definition and adopting appropriate therapeutic measures. Identification of epidemiology and etio-pathogenesis is must for case definitions. The incubation period The incubation period is the time elapsed between pathogen exposure and appearance of symptoms. It can be utilized to trace the contact history of population at high risk.  Incubation, latent and generation periods may help both in understanding transmission and developing therapeutic measures. The evidenced incubation period of covid-19 infection is found to be 5.6-6.7 days. Ayurveda advocates Shatkriyakala pathognomic model i.e. six stage model of disease progression. Aims and Objective: The present study focused to trace –pathological model in context of covid-19. Material and method: This study was conducted in Government ayurvedic institute, COVID testing centre, New Delhi. The tool of data collection was Questionnaire 1 &2. Result:We report a temporal pattern of COVID-19 pathology which corresponds to six-stages of disease progression.(shadvidh kriyakala). \u0000Discussion: Assessment of relationship between the variables (Hetu-dosha and Dushya) responsible for pathogenesis temporal dynamics of covid-19 may serve as an instrument for mapping the pathogenesis. \u0000Conclusion: Clinical staging of covid-19 can be potentially mapped by six stage classical pathological model.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114116695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Critical Investigation in Assessing the Main Metrics of Using Machine Learning Approaches for Bank Risk Management in the Current Era 评估当前时代使用机器学习方法进行银行风险管理的主要指标的关键调查
Pub Date : 2023-02-18 DOI: 10.52783/cienceng.v11i1.210
Preety Tak
In a variety of application fields, including image classification, recognition of speech, and machine interpretation, machine learning (ML) and artificial intelligence (AI) have attained human-level performance. Nonetheless, master based credit risk models keep on administering in the monetary business. To continuously present new strategies, it is important to lay out significant benchmarks and correlations on AI approaches and human master based models. The progressions in banking and chance administration, as well as the present and future issues, have been the subject of much exploration in both scholarly community and business. Through an examination of the current writing, this paper expects to distinguish regions or issues in risk the board that poor person been adequately investigated and might be great contender for additional exploration. It additionally examinations and assesses AI methods that have been explored with regards to banking risk the executives. The comparison's main results showed that machine-learning models outperformed traditional methods. The neural networks also demonstrated excellent results when compared to other methods of machine-learning (ML) in relations of AUC and precission/ accuracy.
在各种应用领域,包括图像分类、语音识别和机器解释,机器学习(ML)和人工智能(AI)已经达到了人类的水平。尽管如此,基于大师的信用风险模型仍在货币业务中发挥着作用。为了不断提出新的策略,重要的是要在人工智能方法和基于人类大师的模型上制定重要的基准和相关性。银行和机会管理的发展,以及当前和未来的问题,一直是学术界和商界探索的主题。通过对当前写作的审查,本文希望区分风险中的地区或问题,即穷人得到充分调查的董事会,并可能成为进一步探索的有力竞争者。它还检查和评估了人工智能方法,这些方法已经在银行风险管理方面进行了探索。比较的主要结果表明,机器学习模型优于传统方法。与其他机器学习(ML)方法相比,神经网络在AUC和精度/准确度的关系上也表现出了出色的结果。
{"title":"A Critical Investigation in Assessing the Main Metrics of Using Machine Learning Approaches for Bank Risk Management in the Current Era","authors":"Preety Tak","doi":"10.52783/cienceng.v11i1.210","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.210","url":null,"abstract":"In a variety of application fields, including image classification, recognition of speech, and machine interpretation, machine learning (ML) and artificial intelligence (AI) have attained human-level performance. Nonetheless, master based credit risk models keep on administering in the monetary business. To continuously present new strategies, it is important to lay out significant benchmarks and correlations on AI approaches and human master based models. The progressions in banking and chance administration, as well as the present and future issues, have been the subject of much exploration in both scholarly community and business. Through an examination of the current writing, this paper expects to distinguish regions or issues in risk the board that poor person been adequately investigated and might be great contender for additional exploration. It additionally examinations and assesses AI methods that have been explored with regards to banking risk the executives. The comparison's main results showed that machine-learning models outperformed traditional methods. The neural networks also demonstrated excellent results when compared to other methods of machine-learning (ML) in relations of AUC and precission/ accuracy.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116334910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chronic Kidney Diseases Detection Using machine Learning 使用机器学习检测慢性肾脏疾病
Pub Date : 2023-02-18 DOI: 10.52783/cienceng.v11i1.124
Swati Salunkhe, D. Gaikwad, Poonam Humbe, Shubham Kale, Sakshi, Lokhande
Chronic kidney disease (CKD) and chronic renal disease (CRD) (CKD). Chronic renal disease refers to illnesses that affect your kidneys and reduce their ability to keep you healthy. Consequences include nerve damage, high blood pressure, anaemia, weak bones, and a lack of nourishment. Early detection and treatment can frequently stop chronic renal disease from getting worse. Data mining is the technique of obtaining knowledge from huge datasets. Utilizing previous data to find trends and guide decisions going forward is the aim of data mining. This task is the result of the convergence of a number of recent trends, including the declining cost of large data storage devices, the increasing simplicity of data collection over networks, the expansion of dependable and efficient machine learning algorithms, and the declining cost of computational power, which enables the use of computationally intensive techniques for decision-making. Machine learning has already produced useful applications in fields like assessing results from medical research, spotting fraud, spotting bogus users, etc.For the purpose of predicting chronic diseases, various data mining categorization methodologies and machine learning algorithms are used. The goal of this study is to develop a new decision-support system for forecasting chronic renal disease. This study compares the accuracy, precision, and execution time of Support Vector Machine (SVM) and K-Nearest Neighbor (KNN) classifiers for the prediction of CKD.
慢性肾脏疾病(CKD)和慢性肾脏疾病(CRD) (CKD)。慢性肾脏疾病是指影响肾脏并降低其保持健康能力的疾病。后果包括神经损伤、高血压、贫血、骨质疏松和缺乏营养。早期发现和治疗往往可以阻止慢性肾脏疾病恶化。数据挖掘是从海量数据集中获取知识的技术。利用以前的数据来发现趋势并指导未来的决策是数据挖掘的目的。这一任务是许多近期趋势融合的结果,包括大型数据存储设备的成本下降,通过网络收集数据的日益简单,可靠和高效的机器学习算法的扩展,以及计算能力成本的下降,这使得使用计算密集型技术进行决策成为可能。机器学习已经在评估医学研究结果、发现欺诈、发现虚假用户等领域产生了有用的应用。为了预测慢性疾病,使用了各种数据挖掘分类方法和机器学习算法。本研究的目的是开发一种新的预测慢性肾脏疾病的决策支持系统。本研究比较了支持向量机(SVM)和k -最近邻(KNN)分类器预测CKD的准确度、精密度和执行时间。
{"title":"Chronic Kidney Diseases Detection Using machine Learning","authors":"Swati Salunkhe, D. Gaikwad, Poonam Humbe, Shubham Kale, Sakshi, Lokhande","doi":"10.52783/cienceng.v11i1.124","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.124","url":null,"abstract":"Chronic kidney disease (CKD) and chronic renal disease (CRD) (CKD). Chronic renal disease refers to illnesses that affect your kidneys and reduce their ability to keep you healthy. Consequences include nerve damage, high blood pressure, anaemia, weak bones, and a lack of nourishment. Early detection and treatment can frequently stop chronic renal disease from getting worse. Data mining is the technique of obtaining knowledge from huge datasets. Utilizing previous data to find trends and guide decisions going forward is the aim of data mining. This task is the result of the convergence of a number of recent trends, including the declining cost of large data storage devices, the increasing simplicity of data collection over networks, the expansion of dependable and efficient machine learning algorithms, and the declining cost of computational power, which enables the use of computationally intensive techniques for decision-making. Machine learning has already produced useful applications in fields like assessing results from medical research, spotting fraud, spotting bogus users, etc.For the purpose of predicting chronic diseases, various data mining categorization methodologies and machine learning algorithms are used. The goal of this study is to develop a new decision-support system for forecasting chronic renal disease. This study compares the accuracy, precision, and execution time of Support Vector Machine (SVM) and K-Nearest Neighbor (KNN) classifiers for the prediction of CKD.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126531521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Wi-Fi Doorbell Using Esp32cam with IoT 智能Wi-Fi门铃使用esp32摄像头与物联网
Pub Date : 2023-02-18 DOI: 10.52783/cienceng.v11i1.283
Jagadeesh, S. Dhanush, Vinethra, Siva Kumar
Regardless of whether they are present at the moment, people need to know who is visiting their organizations regularly. For those who experience a disability that prohibits them from meeting the visitor, this need is much more pressing. This paper suggests a smart doorbell that performs the function of a doorbell to address this issue. It should identify the visitor and notify the user. This proposal includes technology for visitor facial recognition, user alerting, and reaction management to do. The entire procedure, including visitor recognition, user notification, related management challenges, interconnected stages, and standardization concerns, is covered later. Finally, three scenarios were combined to test the model's efficacy. Each scenario was made up of several organizations, and an analysis of the recognition of known and unknown individuals was conducted across each scenario.
不管他们现在是否在场,人们都需要知道谁会定期访问他们的组织。对于那些因残疾而无法与来访者见面的人来说,这种需求更为迫切。为了解决这一问题,本文提出了一种具有门铃功能的智能门铃。它应该识别访问者并通知用户。该方案包括对访问者面部识别、用户报警和反应管理等技术来做。整个过程,包括访问者识别、用户通知、相关的管理挑战、相互连接的阶段和标准化问题,将在后面介绍。最后,结合三种情景来检验模型的有效性。每个场景由几个组织组成,并且在每个场景中对已知和未知个体的识别进行分析。
{"title":"Smart Wi-Fi Doorbell Using Esp32cam with IoT","authors":"Jagadeesh, S. Dhanush, Vinethra, Siva Kumar","doi":"10.52783/cienceng.v11i1.283","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.283","url":null,"abstract":"Regardless of whether they are present at the moment, people need to know who is visiting their organizations regularly. For those who experience a disability that prohibits them from meeting the visitor, this need is much more pressing. This paper suggests a smart doorbell that performs the function of a doorbell to address this issue. It should identify the visitor and notify the user. This proposal includes technology for visitor facial recognition, user alerting, and reaction management to do. The entire procedure, including visitor recognition, user notification, related management challenges, interconnected stages, and standardization concerns, is covered later. Finally, three scenarios were combined to test the model's efficacy. Each scenario was made up of several organizations, and an analysis of the recognition of known and unknown individuals was conducted across each scenario.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128093459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some More Properties of Micro SP-Continuous using Micro SP-open Sets. 利用微sp开集的微sp连续的更多性质。
Pub Date : 2023-02-18 DOI: 10.52783/cienceng.v11i1.209
M. Maheswari, S. Dhanalakshmi, N. Durgadevi
The objective of this paper is to study some more properties of Micro SP-continuous in Micro SP-topological spaces. Also we define and analyze Micro SP-homeomorphism in terms of Strongly Micro-continuous and Strongly Micro SP-open map.
本文的目的是研究微sp -拓扑空间中微sp -连续的一些性质。并从强微连续和强微sp -开映射两个方面对微sp -同胚进行了定义和分析。
{"title":"Some More Properties of Micro SP-Continuous using Micro SP-open Sets.","authors":"M. Maheswari, S. Dhanalakshmi, N. Durgadevi","doi":"10.52783/cienceng.v11i1.209","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.209","url":null,"abstract":"The objective of this paper is to study some more properties of Micro SP-continuous in Micro SP-topological spaces. Also we define and analyze Micro SP-homeomorphism in terms of Strongly Micro-continuous and Strongly Micro SP-open map.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121966299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incorporating a New Pseudorandom Number Generator in AES Algorithm to Improve Its Security Level 在AES算法中加入新的伪随机数生成器以提高其安全级别
Pub Date : 2023-02-18 DOI: 10.52783/cienceng.v11i1.343
Dilshad Akhtar, M. R. Hassan, Neda Fatma
The implementation of the multiplicative inverses of elemental polynomials under an irreducible polynomial over GF(pn) played an important role in cryptography. In the AES algorithm, the multiplicative inverses under the first irreducible polynomial over GF(28) have been used for the first time in 1999 to design its substitution box. The new PRNG RC4-MI in which the multiplicative inverses under the two irreducible polynomials over GF(73) are being used accepts the AES key as its own key and generates random bytes. Undertaking exclusive OR operation of RC4-MI bytes with AES cipher bytes, one gets a new sequence of cipher bytes thatexhibits randomness quantitatively better than that of the original sequence of AES cipher bytes.
在GF(pn)上不可约多项式下元素多项式的乘法逆的实现在密码学中起着重要的作用。在AES算法中,GF(28)的第一个不可约多项式下的乘法逆在1999年首次被用于设计其代换盒。使用GF(73)上两个不可约多项式下的乘法逆的新PRNG RC4-MI接受AES密钥作为其自己的密钥并生成随机字节。将RC4-MI字节与AES密码字节进行异或运算,得到一个新的密码字节序列,其随机性在数量上优于原始AES密码字节序列。
{"title":"Incorporating a New Pseudorandom Number Generator in AES Algorithm to Improve Its Security Level","authors":"Dilshad Akhtar, M. R. Hassan, Neda Fatma","doi":"10.52783/cienceng.v11i1.343","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.343","url":null,"abstract":"The implementation of the multiplicative inverses of elemental polynomials under an irreducible polynomial over GF(pn) played an important role in cryptography. In the AES algorithm, the multiplicative inverses under the first irreducible polynomial over GF(28) have been used for the first time in 1999 to design its substitution box. The new PRNG RC4-MI in which the multiplicative inverses under the two irreducible polynomials over GF(73) are being used accepts the AES key as its own key and generates random bytes. Undertaking exclusive OR operation of RC4-MI bytes with AES cipher bytes, one gets a new sequence of cipher bytes thatexhibits randomness quantitatively better than that of the original sequence of AES cipher bytes.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132500615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Design of Two Junction Four Reservoir Water Transmission System 二结四水库输水系统优化设计
Pub Date : 2023-02-18 DOI: 10.52783/cienceng.v11i1.228
A. R. Bansod, R. S. Tatwawadi
Applying mathematical models to obtain optimal solution for water transmission system has been of major concern during the last few decades for optimal utilization of public fund which is limited. Optimization problem for water transmission system is considered as a non-linear problem during the search process to identify the decision variables.In this paper, flow path algorithm coupled with dynamic programming has been adopted to obtain the optimal design of the multi reservoirwater transmission system.
利用数学模型求解输水系统的最优解是近几十年来公共资金优化利用的主要问题。在寻找决策变量的过程中,将输水系统优化问题视为一个非线性问题。本文采用流路算法与动态规划相结合的方法对多水库输水系统进行优化设计。
{"title":"Optimal Design of Two Junction Four Reservoir Water Transmission System","authors":"A. R. Bansod, R. S. Tatwawadi","doi":"10.52783/cienceng.v11i1.228","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.228","url":null,"abstract":"Applying mathematical models to obtain optimal solution for water transmission system has been of major concern during the last few decades for optimal utilization of public fund which is limited. Optimization problem for water transmission system is considered as a non-linear problem during the search process to identify the decision variables.In this paper, flow path algorithm coupled with dynamic programming has been adopted to obtain the optimal design of the multi reservoirwater transmission system.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134542035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Counter-Based Digester ACK's Effectiveness in MANET Packet Loss Prevention 基于计数器的消化器ACK在MANET防丢包中的有效性综述
Pub Date : 2023-02-18 DOI: 10.52783/cienceng.v11i1.355
Afsha Nishat, Mohd. Abdul Bari, Guddi Singh
a wireless peer-to-peer network with a mobile component adaptability and self-formation characteristics that lacks infrastructure. The network is ideal for use in emergency and disaster assistance applications that need reliable communication.. Finding the channel between communicative entities and sending information across it enables communication. There are several routing protocols in the literature that are developed to achieve reliable communication. Routing protocols are susceptible to packet losses because they consider network nodes to be receptive to communication. Due to malicious behavior or a shortage of resources, nodes trash packets. To address the problem, a number of intrusion detection systems have been suggested in the literature. In order to prevent packet losses in MANET, the newly created counter-based digested Acknowledgement (CDACK) was developed. This study's objective is to assess the CDACK protocol's performance in relation to current MANET intrusion detection systems. The findings demonstrate that, in terms of avoiding packet dropping nodes from the routing path, the CDACK protocol is a good fit for MANET..  
一种无线点对点网络,具有移动组件适应性和自形成特性,但缺乏基础设施。该网络非常适合用于需要可靠通信的紧急和灾害援助应用。查找通信实体之间的通道并通过它发送信息,从而实现通信。文献中有几种路由协议是为了实现可靠的通信而开发的。路由协议容易受到包丢失的影响,因为它们认为网络节点是接受通信的。由于恶意行为或资源不足,节点会将数据包丢弃。为了解决这个问题,文献中提出了许多入侵检测系统。为了防止在MANET中丢包,提出了一种新的基于计数器的摘要确认(CDACK)。本研究的目的是评估CDACK协议在当前MANET入侵检测系统中的性能。研究结果表明,在避免路由路径上的丢包节点方面,CDACK协议非常适合于MANET。
{"title":"Review of Counter-Based Digester ACK's Effectiveness in MANET Packet Loss Prevention","authors":"Afsha Nishat, Mohd. Abdul Bari, Guddi Singh","doi":"10.52783/cienceng.v11i1.355","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.355","url":null,"abstract":"a wireless peer-to-peer network with a mobile component adaptability and self-formation characteristics that lacks infrastructure. The network is ideal for use in emergency and disaster assistance applications that need reliable communication.. Finding the channel between communicative entities and sending information across it enables communication. There are several routing protocols in the literature that are developed to achieve reliable communication. Routing protocols are susceptible to packet losses because they consider network nodes to be receptive to communication. Due to malicious behavior or a shortage of resources, nodes trash packets. To address the problem, a number of intrusion detection systems have been suggested in the literature. In order to prevent packet losses in MANET, the newly created counter-based digested Acknowledgement (CDACK) was developed. This study's objective is to assess the CDACK protocol's performance in relation to current MANET intrusion detection systems. The findings demonstrate that, in terms of avoiding packet dropping nodes from the routing path, the CDACK protocol is a good fit for MANET.. \u0000 ","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"87 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131844676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceeding International Conference on Science and Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1