The growth of the internet has led to the development of today’s data-centric world where information can be exchanged from one part of the world to another with the click of a button. The most commonly used communication device is the mobile phone, with the ability of a portable computer. A large number of chatting applications have been developed that help people to communicate. The information typed inside these chatting applications must pass through the public infrastructure to reach the destination which is its most vulnerable phase of data transfer. A malicious hacker can gain access to messages or alter the messages thus compromising the data security. To maintain data integrity and confidentiality data encryption is used. Data encryption is used which convert our messages into encrypted form so that only people with the secret key can read them. Many systems now claim to guarantee safe and secret messages, bolstered by recent allegations of pervasive state surveillance of personal conversations. This covers a huge number of new projects as well as numerous well-known security-enhancing tools.We investigate and arrange current secure message solutions, as well as present a test framework for their security, usability, and ease of use. We sketch out each design area for three important challenges: trust establishment, conversation security, and transit privacy. Trusted methods of providing secure security and privacy features do not work well in use and detection, while other mixed methods that have not been properly processed in academic textbooks may provide better trade performance.
{"title":"Design and Implementation of Encryption Tool using Advanced Encryption Standard (AES)","authors":"Sanket Anil Dambhare, Rutvik Rajesh Walde, Sahil Ramrao Bhogekar, Sai Ranajit, Ritik Shriniwas Kotgiriwar, Sakshi Sudhakar Langde","doi":"10.1109/ICEARS53579.2022.9751822","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9751822","url":null,"abstract":"The growth of the internet has led to the development of today’s data-centric world where information can be exchanged from one part of the world to another with the click of a button. The most commonly used communication device is the mobile phone, with the ability of a portable computer. A large number of chatting applications have been developed that help people to communicate. The information typed inside these chatting applications must pass through the public infrastructure to reach the destination which is its most vulnerable phase of data transfer. A malicious hacker can gain access to messages or alter the messages thus compromising the data security. To maintain data integrity and confidentiality data encryption is used. Data encryption is used which convert our messages into encrypted form so that only people with the secret key can read them. Many systems now claim to guarantee safe and secret messages, bolstered by recent allegations of pervasive state surveillance of personal conversations. This covers a huge number of new projects as well as numerous well-known security-enhancing tools.We investigate and arrange current secure message solutions, as well as present a test framework for their security, usability, and ease of use. We sketch out each design area for three important challenges: trust establishment, conversation security, and transit privacy. Trusted methods of providing secure security and privacy features do not work well in use and detection, while other mixed methods that have not been properly processed in academic textbooks may provide better trade performance.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126316621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9752323
M. Selvaganesh, P. Naveen Karthi, V. A. Nitish Kumar, S. R. Prashanna Moorthy
A brute force is a Hacking methodology used to decrypt login passwords, keys and credentials. Hacks that exploit vulnerabilities in packages are rare, whereas Brute Force attacks aim to be the simplest, cheapest, and most straightforward approach to access a website. Using Splunk to analyse massive amounts of data could be very beneficial. The application enables to capture, search, and analyse log information in real-time. By analysing logs as well as many different sources of system information, security events can be uncovered. A log file, which details the events that have occurred in the environment of the application and the server on which they run, is a valuable piece of information. Identifying the attacks against these systems is possible by analysing and correlating this information. Massive amounts of ambiguous and amorphous information can be analysed with its superior resolution. The paper includes instructions on setting up a Splunk server and routing information there from multiple sources. Practical search examples and pre-built add-on applications are provided. Splunk is a powerful tool that allows users to explore big data with greater ease. Seizure can be tracked in near real-time and can be searched through logs. A short amount of time can be spent on analysing big data using map-reduce technology. Briefly, it helps to analyse unstructured log data to better understand how the applications operate. With Splunk, client can detect patterns in the data through a powerful query language. It is easy to set up alerts and warnings based on the queries, which will help alert client about an ongoing (suspected) activity and generate a notification in real-time.
{"title":"Efficient Brute-force handling methodology using Indexed-Cluster Architecture of Splunk","authors":"M. Selvaganesh, P. Naveen Karthi, V. A. Nitish Kumar, S. R. Prashanna Moorthy","doi":"10.1109/ICEARS53579.2022.9752323","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752323","url":null,"abstract":"A brute force is a Hacking methodology used to decrypt login passwords, keys and credentials. Hacks that exploit vulnerabilities in packages are rare, whereas Brute Force attacks aim to be the simplest, cheapest, and most straightforward approach to access a website. Using Splunk to analyse massive amounts of data could be very beneficial. The application enables to capture, search, and analyse log information in real-time. By analysing logs as well as many different sources of system information, security events can be uncovered. A log file, which details the events that have occurred in the environment of the application and the server on which they run, is a valuable piece of information. Identifying the attacks against these systems is possible by analysing and correlating this information. Massive amounts of ambiguous and amorphous information can be analysed with its superior resolution. The paper includes instructions on setting up a Splunk server and routing information there from multiple sources. Practical search examples and pre-built add-on applications are provided. Splunk is a powerful tool that allows users to explore big data with greater ease. Seizure can be tracked in near real-time and can be searched through logs. A short amount of time can be spent on analysing big data using map-reduce technology. Briefly, it helps to analyse unstructured log data to better understand how the applications operate. With Splunk, client can detect patterns in the data through a powerful query language. It is easy to set up alerts and warnings based on the queries, which will help alert client about an ongoing (suspected) activity and generate a notification in real-time.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120956132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9752350
Sujata Tukaram Bhairnallykar, Dr. Vaibhav Eknath Narawade
Magnetic resonance imaging has emerged as one of the maxima broadly used and flexible scientific imaging modalities today. While at the beginning of this technique the research was fundamentally qualitative and relied exclusively on observation of images, currently several technological developments have driven it possible to derive quantitative measurements from these data. However, MR images are normally affected by several types of artifacts which must be minimized before a quantitative biomarker assessment pipeline is applied. This paper proposes preprocessing to the magnetic resonance (MR) images to enhance the standard of the image and to ease the next processing and analysis. The proposed method uses Non-Local Means (NLM) for noise removal and Histogram Equalization (HE) for enhancing the contrast of Magnetic resonance images for the preprocessing.
{"title":"Pre-processing of Multimodal MR Images using NLM and Histogram Equalization","authors":"Sujata Tukaram Bhairnallykar, Dr. Vaibhav Eknath Narawade","doi":"10.1109/ICEARS53579.2022.9752350","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752350","url":null,"abstract":"Magnetic resonance imaging has emerged as one of the maxima broadly used and flexible scientific imaging modalities today. While at the beginning of this technique the research was fundamentally qualitative and relied exclusively on observation of images, currently several technological developments have driven it possible to derive quantitative measurements from these data. However, MR images are normally affected by several types of artifacts which must be minimized before a quantitative biomarker assessment pipeline is applied. This paper proposes preprocessing to the magnetic resonance (MR) images to enhance the standard of the image and to ease the next processing and analysis. The proposed method uses Non-Local Means (NLM) for noise removal and Histogram Equalization (HE) for enhancing the contrast of Magnetic resonance images for the preprocessing.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115849779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, automatic load frequency controllers (ALFC) are considered for an interconnected micro-grid system to enhance the transient performance of frequency deviation. The widespread use of renewable energy in an interconnected micro-grid would cause frequency instability. Frequency stability is a significant concern for the operation of interconnected micro-grids. The modeling of interconnected micro-grids comprising of a wind power generation, a diesel engine generator and Energy Storage system. A conventional Proportional Integral Derivative (PID) controller tuned by Ziegler-Nichols method (ZN) is designed for the sample interconnected micro-grid system for improving the frequency stability. The efficacy of ALFC for interconnected micro-grids is demonstrated using MATLAB/Simulink under abrupt change in load demand and uncertainties in system parameters. The results obtained through simulation are validated in HIL simulation environment using Real Time Simulator.
本文考虑在互联微电网系统中引入自动负荷频率控制器(ALFC),以提高系统的暂态频率偏差性能。在相互连接的微电网中广泛使用可再生能源将导致频率不稳定。频率稳定性是互联微电网运行的一个重要问题。由风力发电机、柴油发电机和储能系统组成的互联微电网的建模。为提高采样互联微电网系统的频率稳定性,设计了一种采用齐格勒-尼克尔斯方法整定的传统比例积分导数(PID)控制器。在负荷需求突变和系统参数不确定的情况下,利用MATLAB/Simulink验证了ALFC在互联微电网中的有效性。利用Real Time Simulator在HIL仿真环境中对仿真结果进行了验证。
{"title":"Automatic Load Frequency Control for Interconnected Micro-Grid System","authors":"Jeevitha Kandasamy, Rajeswari Ramachandran, Veerapandiyan Veerasamy","doi":"10.1109/ICEARS53579.2022.9752042","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752042","url":null,"abstract":"In this paper, automatic load frequency controllers (ALFC) are considered for an interconnected micro-grid system to enhance the transient performance of frequency deviation. The widespread use of renewable energy in an interconnected micro-grid would cause frequency instability. Frequency stability is a significant concern for the operation of interconnected micro-grids. The modeling of interconnected micro-grids comprising of a wind power generation, a diesel engine generator and Energy Storage system. A conventional Proportional Integral Derivative (PID) controller tuned by Ziegler-Nichols method (ZN) is designed for the sample interconnected micro-grid system for improving the frequency stability. The efficacy of ALFC for interconnected micro-grids is demonstrated using MATLAB/Simulink under abrupt change in load demand and uncertainties in system parameters. The results obtained through simulation are validated in HIL simulation environment using Real Time Simulator.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116645487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9751882
Sandhya Kumari, Arjun Rathi, Ayush Chauhan, Nigarish Umer Khan, S. Sreekumar, Sonika Singh
Across the globe, renewable generation integration has been increasing in the last decades to meet ever-increasing power demand and emission targets. Wind power has dominated among various renewable sources due to the widespread availability and advanced low-cost technologies. However, the stochastic nature of wind power results in power system reliability and security issues. This is because the uncertain variability of wind power results in challenges to various system operations such as unit commitment and economic dispatch. Such problems can be addressed by accurate wind power forecasts to great extent. This attracted wider investigations for obtaining accurate power forecasts using various forecasting models such as time series, machine learning, probabilistic, and hybrid. These models use different types of inputs and obtain forecasts in different time horizons, and have different applications. Also, different investigations represent forecasting performance using different performance metrics. Limited classification reviews are available for these areas and detailed classification on these areas will help researchers and system operators to develop new accurate forecasting models. Therefore, this paper proposes a detailed review of those areas. It concludes that even though quantum investigations are available, wind power forecasting accuracy improvement is an ever-existing research problem. Also, forecasting performance indication in financial term such as deviation charges can be used to represent the economic impact of forecasting accuracy improvement.
{"title":"Wind Power Forecasting Models: Classification based on Type of Model, Time Horizon and Inputs, Error Metrics and Applications","authors":"Sandhya Kumari, Arjun Rathi, Ayush Chauhan, Nigarish Umer Khan, S. Sreekumar, Sonika Singh","doi":"10.1109/ICEARS53579.2022.9751882","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9751882","url":null,"abstract":"Across the globe, renewable generation integration has been increasing in the last decades to meet ever-increasing power demand and emission targets. Wind power has dominated among various renewable sources due to the widespread availability and advanced low-cost technologies. However, the stochastic nature of wind power results in power system reliability and security issues. This is because the uncertain variability of wind power results in challenges to various system operations such as unit commitment and economic dispatch. Such problems can be addressed by accurate wind power forecasts to great extent. This attracted wider investigations for obtaining accurate power forecasts using various forecasting models such as time series, machine learning, probabilistic, and hybrid. These models use different types of inputs and obtain forecasts in different time horizons, and have different applications. Also, different investigations represent forecasting performance using different performance metrics. Limited classification reviews are available for these areas and detailed classification on these areas will help researchers and system operators to develop new accurate forecasting models. Therefore, this paper proposes a detailed review of those areas. It concludes that even though quantum investigations are available, wind power forecasting accuracy improvement is an ever-existing research problem. Also, forecasting performance indication in financial term such as deviation charges can be used to represent the economic impact of forecasting accuracy improvement.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121385125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9752146
S. A. Bhande, V. Chandrakar
In the electricity market competition, there is more power exchange with reverse power sharing. The key challenge is to make electrical energy available in the majority of areas at the lowest possible cost and with the best level of dependability. As a result, the transmission network must run at or over one or more transfer limitations, causing transmission line congestion. Proper usage of reactive power compensation based on FACTS devices can alleviate these transmission line issues. The major goal of this research is to improve the performance of the power system using a static synchronous series compensator (SSSC). The suggested controller's performance is assessed under various conditions. According to the simulation findings, the PI-based SSSC successfully manages the power flow in a disturbed state. As a consequence, the suggested SSSC-based controller provides efficient damping control, improves system profile voltage under various load conditions, and increases power system security.
{"title":"Static Synchronous Series Compensator (SSSC) to Improve Power System Security","authors":"S. A. Bhande, V. Chandrakar","doi":"10.1109/ICEARS53579.2022.9752146","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752146","url":null,"abstract":"In the electricity market competition, there is more power exchange with reverse power sharing. The key challenge is to make electrical energy available in the majority of areas at the lowest possible cost and with the best level of dependability. As a result, the transmission network must run at or over one or more transfer limitations, causing transmission line congestion. Proper usage of reactive power compensation based on FACTS devices can alleviate these transmission line issues. The major goal of this research is to improve the performance of the power system using a static synchronous series compensator (SSSC). The suggested controller's performance is assessed under various conditions. According to the simulation findings, the PI-based SSSC successfully manages the power flow in a disturbed state. As a consequence, the suggested SSSC-based controller provides efficient damping control, improves system profile voltage under various load conditions, and increases power system security.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121463939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9752208
Md. Minhaz Khan, S.M. Zahid Hasan Sakil, Muhammad Ahad Rahman Miah, M. Rana, Shaikh Rashedur Rahman
Electricity is an essential part of modern life and per capita electricity consumption is an important indicator of economic development of a country. As generation of electrical energy mostly comes from fossil fuel-based energy sources which turns to the significant environmental impacts. Therefore, to achieve sustainable development a country must concentrate on efficient management and conservation of energy. To focus on this issue the uses and demand of different Energy Management System (EMS) is rising. Energy management system helps to reduce power consumption, cost, suffering and increase reliability, resilience and the comfort level. In this paper, an Internet of Things (IOT) based EMS is designed and implemented in a residential building by combining smart meter, smart switch board, smart mobile apps and database server. The designed system introduces some unique feature considering the local perspective. This system will connect both the consumer and the utility company for efficient and reliable operation and supply of electrical energy. The consumer will be able to control and mange electrical loads and therefore can achieve energy conservation through EMS. The designed system is user friendly which can be operated from anywhere and economically viable.
{"title":"Sustainable Building Energy Conservation and Efficiency Management using IoT","authors":"Md. Minhaz Khan, S.M. Zahid Hasan Sakil, Muhammad Ahad Rahman Miah, M. Rana, Shaikh Rashedur Rahman","doi":"10.1109/ICEARS53579.2022.9752208","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752208","url":null,"abstract":"Electricity is an essential part of modern life and per capita electricity consumption is an important indicator of economic development of a country. As generation of electrical energy mostly comes from fossil fuel-based energy sources which turns to the significant environmental impacts. Therefore, to achieve sustainable development a country must concentrate on efficient management and conservation of energy. To focus on this issue the uses and demand of different Energy Management System (EMS) is rising. Energy management system helps to reduce power consumption, cost, suffering and increase reliability, resilience and the comfort level. In this paper, an Internet of Things (IOT) based EMS is designed and implemented in a residential building by combining smart meter, smart switch board, smart mobile apps and database server. The designed system introduces some unique feature considering the local perspective. This system will connect both the consumer and the utility company for efficient and reliable operation and supply of electrical energy. The consumer will be able to control and mange electrical loads and therefore can achieve energy conservation through EMS. The designed system is user friendly which can be operated from anywhere and economically viable.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116577638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9752328
Guanqi Tao
In order to better understand the research hotspots and status quo of my country’s education big data, the article uses bibliometrics and scientific knowledge mapping methods, taking the domestic education big data papers from 2013 to 2017 included in the CNKI (China Knowledge Network) journal database. Object, through the visualization software CiteSpace to analyze the journal distribution, time distribution and keywords of the paper, and explore the development status of domestic education big data. This article is based on CiteSpace’s educational big data mining algorithm, which increases the discovery rate of research hotspots by 10.2%; CiteSpace-based heat map modeling method increases the hotspot research to 98.2%.
{"title":"Research on Heat Map Modeling of Guiding Big Data Research Hotspots Based on CiteSpace","authors":"Guanqi Tao","doi":"10.1109/ICEARS53579.2022.9752328","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752328","url":null,"abstract":"In order to better understand the research hotspots and status quo of my country’s education big data, the article uses bibliometrics and scientific knowledge mapping methods, taking the domestic education big data papers from 2013 to 2017 included in the CNKI (China Knowledge Network) journal database. Object, through the visualization software CiteSpace to analyze the journal distribution, time distribution and keywords of the paper, and explore the development status of domestic education big data. This article is based on CiteSpace’s educational big data mining algorithm, which increases the discovery rate of research hotspots by 10.2%; CiteSpace-based heat map modeling method increases the hotspot research to 98.2%.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125236902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9751796
Mehrunnisa, J. Priyanka, B. S. Chandra
During the next half-century, generating energy for reduction of petroleum products is an endless task. When compared to other sustainable resources, Idea of converting sun-light oriented energy into energy using solar boards is on the leading edge. Regardless, the regular substitution in the related mentality of the sunlight based toward the earth reduces the watts delivered through the sun powered charger. As per the present circumstance the sunlight based following device is the top -notch way to build the effectiveness of a solar board. The sun board which screens the sun incorporates two LDRs, a sun-light based charger and a servo engine and an ATmega328 Micro regulator. Gentle principally put together resistors are mounted with respect to the edges of the sun powered charger. While delicate falls on them, light-based wounds cause no obstacle. A servo engine connected to the board rotates the board in the direction of the light. Boards are coordinated at the sorted way so delicate within the LDRs interestingly, with boards are pivoted near the LDR which has a prevalent limit with regards to bring down check conversely, with the backwards. The Servo engine turns the board at an uplifting perspective. At the point when slight pressure drops to the right side of the higher LDR, the board focuses on the right side to some extent and accepts pressure on the left side of 50% of the higher LDR, the board developments slower to the left. The light moves toward the front over the time, and the depth of gentle on the two boards is indistinguishable. In such circumstances, Board may or may not be recoverable, and there may or may not be a pivot.
{"title":"The Solar Tracker Using Micro-controller","authors":"Mehrunnisa, J. Priyanka, B. S. Chandra","doi":"10.1109/ICEARS53579.2022.9751796","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9751796","url":null,"abstract":"During the next half-century, generating energy for reduction of petroleum products is an endless task. When compared to other sustainable resources, Idea of converting sun-light oriented energy into energy using solar boards is on the leading edge. Regardless, the regular substitution in the related mentality of the sunlight based toward the earth reduces the watts delivered through the sun powered charger. As per the present circumstance the sunlight based following device is the top -notch way to build the effectiveness of a solar board. The sun board which screens the sun incorporates two LDRs, a sun-light based charger and a servo engine and an ATmega328 Micro regulator. Gentle principally put together resistors are mounted with respect to the edges of the sun powered charger. While delicate falls on them, light-based wounds cause no obstacle. A servo engine connected to the board rotates the board in the direction of the light. Boards are coordinated at the sorted way so delicate within the LDRs interestingly, with boards are pivoted near the LDR which has a prevalent limit with regards to bring down check conversely, with the backwards. The Servo engine turns the board at an uplifting perspective. At the point when slight pressure drops to the right side of the higher LDR, the board focuses on the right side to some extent and accepts pressure on the left side of 50% of the higher LDR, the board developments slower to the left. The light moves toward the front over the time, and the depth of gentle on the two boards is indistinguishable. In such circumstances, Board may or may not be recoverable, and there may or may not be a pivot.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113959813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the education industry answering questions is used as a common parameter to judge one’s understanding of a topic. Taking quizzes on a regular basis helps an individual feel confident and it also helps the professor assess the student’s understanding on a particular topic. Generating question and answer pairs is a time-consuming task. To solve this problem, this paper discusses methods to generate automatic Natural Language Processing models which creates diverse types of question-answer pairs. The model takes an input in the form of text in the English language and produces output as Complex Questions, Multiple Choice Questions with relevant distractors, and Fill in the Blanks type of questions. To generate Complex Questions a Rule-Based Algorithm is used. To generate Multiple Choice Questions and Fill in the Blanks type questions, a Vector Algorithm from the GLoVe Model is used along with Rule-Based Algorithms. This paper also includes a detailed explanation of the analysis of the pattern and rules that are observed in the question-making process. SQuAD dataset is used for this analysis and used the same dataset to train the model. The implementation process of this model focused on generating diverse questions with higher syntactic correctness than the existing models. The approach mentioned in this paper can be used in the fields of education, entertainment, generation of quizzes, virtual learning assistance and to get a deeper insight into any topic.
{"title":"Generating QA from Rule-based Algorithms","authors":"Pratiksha Rajesh Rao, Tanay Navneet Jhawar, Yash Avinash Kachave, V. Hirlekar","doi":"10.1109/ICEARS53579.2022.9751723","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9751723","url":null,"abstract":"In the education industry answering questions is used as a common parameter to judge one’s understanding of a topic. Taking quizzes on a regular basis helps an individual feel confident and it also helps the professor assess the student’s understanding on a particular topic. Generating question and answer pairs is a time-consuming task. To solve this problem, this paper discusses methods to generate automatic Natural Language Processing models which creates diverse types of question-answer pairs. The model takes an input in the form of text in the English language and produces output as Complex Questions, Multiple Choice Questions with relevant distractors, and Fill in the Blanks type of questions. To generate Complex Questions a Rule-Based Algorithm is used. To generate Multiple Choice Questions and Fill in the Blanks type questions, a Vector Algorithm from the GLoVe Model is used along with Rule-Based Algorithms. This paper also includes a detailed explanation of the analysis of the pattern and rules that are observed in the question-making process. SQuAD dataset is used for this analysis and used the same dataset to train the model. The implementation process of this model focused on generating diverse questions with higher syntactic correctness than the existing models. The approach mentioned in this paper can be used in the fields of education, entertainment, generation of quizzes, virtual learning assistance and to get a deeper insight into any topic.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122897125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}