Energy Audit, in general, is the process of turning conservation concepts into reality by combining technically possible solutions with cost-effective organization within a set time limit. Auditing has grown in importance in recent decades because of its numerous advantages, including low maintenance and environmental benefits. The main goal is to lower the cost of energy use per unit. It serves as a benchmark for managing energy in an organization as well as a foundation for planning the most efficient use of energy. This proposed project examines the economic viability of replacing legacy equipment with modern technology like python, as well as calculating the return-on-investment period and doing research in Bapatla Engineering College, India.
{"title":"A Case Study of Energy Conservation using Python in Bapatla Engineering College, Andhra Pradesh","authors":"Chittari Surya Nirmal Varma, Guruvindapalli Salmon Raju, Satya Dinesh Madasu, Ravindra Janga","doi":"10.51983/ajes-2021.10.2.3165","DOIUrl":"https://doi.org/10.51983/ajes-2021.10.2.3165","url":null,"abstract":"Energy Audit, in general, is the process of turning conservation concepts into reality by combining technically possible solutions with cost-effective organization within a set time limit. Auditing has grown in importance in recent decades because of its numerous advantages, including low maintenance and environmental benefits. The main goal is to lower the cost of energy use per unit. It serves as a benchmark for managing energy in an organization as well as a foundation for planning the most efficient use of energy. This proposed project examines the economic viability of replacing legacy equipment with modern technology like python, as well as calculating the return-on-investment period and doing research in Bapatla Engineering College, India.","PeriodicalId":365290,"journal":{"name":"Asian Journal of Electrical Sciences","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133143913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-30DOI: 10.51983/ajes-2020.9.2.2553
T. Srikanth, A. Kannan, B. M. Chandra
Micro Grids are going to replace the traditional concept of electrical networks in order to satisfy the increasing needs in terms of flexibility, accessibility, reliability, and quality of the power supply. Economy and energy efficiency are the paradigms followed to exploit the available distributed energy resources (DERs), guaranteeing technical and environment-friendly standards. Obviously, the path to Micro Grids is complicated by the increasing heterogeneity of Micro Grid components, such as renewable, storage systems, fossil- fueled generators, and controllable loads [1]. Fortunately, the synergic interaction between DERs and information and communication technologies (ICT) foster the coordination among different infrastructures, promoting the development of Smart Grids at both theoretical and practical levels. The major highlights of utilizing micro grid are the capacity to self-heal from power quality (PQ) issues, efficient energy management, incorporation of automation based on ICT and smart metering, integration of distributed power generation, renewable energy resources, and storage units [2]. The advantages contribute to maintain good PQ and to maintain the reliability. In this regard, the concept of micro grid is brought to the stage as one of the main building blocks of the future smart grids [3].
{"title":"Power Quality Enhancement with Involvement of RES and Power Converters in Micro Grids using Metaheuristic Algorithms: A Literature Review","authors":"T. Srikanth, A. Kannan, B. M. Chandra","doi":"10.51983/ajes-2020.9.2.2553","DOIUrl":"https://doi.org/10.51983/ajes-2020.9.2.2553","url":null,"abstract":"Micro Grids are going to replace the traditional concept of electrical networks in order to satisfy the increasing needs in terms of flexibility, accessibility, reliability, and quality of the power supply. Economy and energy efficiency are the paradigms followed to exploit the available distributed energy resources (DERs), guaranteeing technical and environment-friendly standards. Obviously, the path to Micro Grids is complicated by the increasing heterogeneity of Micro Grid components, such as renewable, storage systems, fossil- fueled generators, and controllable loads [1]. Fortunately, the synergic interaction between DERs and information and communication technologies (ICT) foster the coordination among different infrastructures, promoting the development of Smart Grids at both theoretical and practical levels. The major highlights of utilizing micro grid are the capacity to self-heal from power quality (PQ) issues, efficient energy management, incorporation of automation based on ICT and smart metering, integration of distributed power generation, renewable energy resources, and storage units [2]. The advantages contribute to maintain good PQ and to maintain the reliability. In this regard, the concept of micro grid is brought to the stage as one of the main building blocks of the future smart grids [3].","PeriodicalId":365290,"journal":{"name":"Asian Journal of Electrical Sciences","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128232957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-30DOI: 10.51983/ajes-2020.9.2.2550
S. Selvam
Due to increasing the act of Applied science College in Tamil Nadu, the level of competition for admission price is also increased. By implementing some dynamic strategies only the academic introduction s can meet their own competition. One survey clearly commonwealth that more than 75% of the Engineering Colleges their forcefulness is less than thirty % of their actual intake. Hence the surveillance is the job for the insane asylum s. One more survey shows that every year 10% of the applied science college’ windup their affiliation and blessing due to lack of admittance, and 5% of the engineering college have decided to sell due to lack of strength. With the strong effort and dynamic strategy framed by the institution, the nominee finds admission in an institution only when their own orientation matches exactly, otherwise the candidate continues to go by the next alternate in the list of preference [1]. This paper clearly emphasis some factors influenced to identify the pattern for getting the potency of the bookman to meet at least the breakeven point. In plus to the above, the Populace Wide Web in cyberspace plays an important role to store, part and distribute data about the academic innovation. A social survey states that more than 65% of the admissions gained by their effective network pages. The exponential ontogeny of the World Wide Web has provided an excessive prospect to study the potency student and their deportment by using www accession logs. If the institution’s web sphere clearly contains the information required for the potential educate, surely they can attract the above by which they can get more number of admissions even beyond our jurisdiction.[2] Some of the attractions from the potential students while accessing the web site for getting the admission are: get the required information by clicking minimum act of hits from the vane Page, no network traffic occurred while accessing and navigating the college World Wide Web website. Search interrogation will be rectified within a short period of answer time by implementing the practice of search railway locomotive optimization, search engine spiders. Always use fastest and latest browsers and operating systems in their WWW and not to display much more web server erroneousness while navigating the college web site. For attracting the counseling class and other state students, this network Thomas Nelson Page swordplay an important part. World Wide Web usage Mine lying is the practical application of data excavation techniques to very large data deposit to selection pattern radiation diagram. In general every World Wide Web server keeps a record book of all Synonyms/Hyponyms (Ordered by Estimated Frequency) of noun transaction needed for the potential students and act as a bridge between the potential students and introduction. The record contains full phase of the moon contingent about every user click to the entanglement documents of the entanglement site. The useful record 5 sen
{"title":"Invention a Paradigm to Discovery the Network Navigation Using Poisson Distribution","authors":"S. Selvam","doi":"10.51983/ajes-2020.9.2.2550","DOIUrl":"https://doi.org/10.51983/ajes-2020.9.2.2550","url":null,"abstract":"Due to increasing the act of Applied science College in Tamil Nadu, the level of competition for admission price is also increased. By implementing some dynamic strategies only the academic introduction s can meet their own competition. One survey clearly commonwealth that more than 75% of the Engineering Colleges their forcefulness is less than thirty % of their actual intake. Hence the surveillance is the job for the insane asylum s. One more survey shows that every year 10% of the applied science college’ windup their affiliation and blessing due to lack of admittance, and 5% of the engineering college have decided to sell due to lack of strength. With the strong effort and dynamic strategy framed by the institution, the nominee finds admission in an institution only when their own orientation matches exactly, otherwise the candidate continues to go by the next alternate in the list of preference [1]. This paper clearly emphasis some factors influenced to identify the pattern for getting the potency of the bookman to meet at least the breakeven point. In plus to the above, the Populace Wide Web in cyberspace plays an important role to store, part and distribute data about the academic innovation. A social survey states that more than 65% of the admissions gained by their effective network pages. The exponential ontogeny of the World Wide Web has provided an excessive prospect to study the potency student and their deportment by using www accession logs. If the institution’s web sphere clearly contains the information required for the potential educate, surely they can attract the above by which they can get more number of admissions even beyond our jurisdiction.[2] Some of the attractions from the potential students while accessing the web site for getting the admission are: get the required information by clicking minimum act of hits from the vane Page, no network traffic occurred while accessing and navigating the college World Wide Web website. Search interrogation will be rectified within a short period of answer time by implementing the practice of search railway locomotive optimization, search engine spiders. Always use fastest and latest browsers and operating systems in their WWW and not to display much more web server erroneousness while navigating the college web site. For attracting the counseling class and other state students, this network Thomas Nelson Page swordplay an important part. World Wide Web usage Mine lying is the practical application of data excavation techniques to very large data deposit to selection pattern radiation diagram. In general every World Wide Web server keeps a record book of all Synonyms/Hyponyms (Ordered by Estimated Frequency) of noun transaction needed for the potential students and act as a bridge between the potential students and introduction. The record contains full phase of the moon contingent about every user click to the entanglement documents of the entanglement site. The useful record 5 sen","PeriodicalId":365290,"journal":{"name":"Asian Journal of Electrical Sciences","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115312812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-30DOI: 10.51983/ajes-2020.9.2.2551
R. Ganesh, S. Thabasu Kannan, S. Selvam
At present most of the larger companies depends heavily on their data science capabilities for taking decisions. On the basis of complexity and diversity of analysis, the big data units are transformed into larger and more technologies. Internet technologies are now playing a vital role in our day to day life. It has the advantages along with the disadvantages also, which in term generates the requirements of image hiding technology for maintaining the secrecy of the secret information. The interpretability of findings plays a major role for the success of delivering data science solutions into business reality. Even if the existing method provides outstanding accuracy, they may be neglected if they do not hide the image or text in an exact manner for various cases. When evaluating ML/DL [1] models there is an excess of possible metrics to assess performance. There are things like accuracy, precision- recall, ROC and so on. All of them can be useful, but they can also be misleading or don't answer the question at hand very well. The ROC AUC score is not informative enough for taking decisions since it is abstract for non-technical managers. Hence two more informative and meaningful metrics that every analyst should take into consideration when illustrating the results of their binary classification models: Cumulative Gains and Lift charts. Both the metrics are extremely useful to validate the predictive model (binary outcome) quality. Gain and Lift charts [2] are used to update the performance of binary classification model. They measure how much better one can expect to do with the predictive model. It also helps to find the best predictive model among multiple challenger models. The main intention behind this paper is to assess the performance of the binary classification model and compares the results with the random pick. It shows the percentage of gains reached when considering a certain percentage of the data set with the highest probability to be target according to the classifier. This paper proposes a broad look at the ideas of cumulative gains chart and lift chart to develop a binary classifier model quality which can be used theoretically to evaluate the quality of a wide range of classifiers in a standardized fashion. This paper proposes a hybrid solution of image hiding binary classifier using vicinity value based image hiding classification model as main complimented by gain calculation to increase image hiding classification accuracy. The study has shown that implementing the image hiding binary classification using Gain and Lift is feasible. Experiment of the study has confirmed that the image hiding binary classification model can be improved.
{"title":"Visualization of Net Effects for Image Hiding Using Gain/Lift","authors":"R. Ganesh, S. Thabasu Kannan, S. Selvam","doi":"10.51983/ajes-2020.9.2.2551","DOIUrl":"https://doi.org/10.51983/ajes-2020.9.2.2551","url":null,"abstract":"At present most of the larger companies depends heavily on their data science capabilities for taking decisions. On the basis of complexity and diversity of analysis, the big data units are transformed into larger and more technologies. Internet technologies are now playing a vital role in our day to day life. It has the advantages along with the disadvantages also, which in term generates the requirements of image hiding technology for maintaining the secrecy of the secret information. The interpretability of findings plays a major role for the success of delivering data science solutions into business reality. Even if the existing method provides outstanding accuracy, they may be neglected if they do not hide the image or text in an exact manner for various cases. When evaluating ML/DL [1] models there is an excess of possible metrics to assess performance. There are things like accuracy, precision- recall, ROC and so on. All of them can be useful, but they can also be misleading or don't answer the question at hand very well. The ROC AUC score is not informative enough for taking decisions since it is abstract for non-technical managers. Hence two more informative and meaningful metrics that every analyst should take into consideration when illustrating the results of their binary classification models: Cumulative Gains and Lift charts. Both the metrics are extremely useful to validate the predictive model (binary outcome) quality. Gain and Lift charts [2] are used to update the performance of binary classification model. They measure how much better one can expect to do with the predictive model. It also helps to find the best predictive model among multiple challenger models. The main intention behind this paper is to assess the performance of the binary classification model and compares the results with the random pick. It shows the percentage of gains reached when considering a certain percentage of the data set with the highest probability to be target according to the classifier. This paper proposes a broad look at the ideas of cumulative gains chart and lift chart to develop a binary classifier model quality which can be used theoretically to evaluate the quality of a wide range of classifiers in a standardized fashion. This paper proposes a hybrid solution of image hiding binary classifier using vicinity value based image hiding classification model as main complimented by gain calculation to increase image hiding classification accuracy. The study has shown that implementing the image hiding binary classification using Gain and Lift is feasible. Experiment of the study has confirmed that the image hiding binary classification model can be improved.","PeriodicalId":365290,"journal":{"name":"Asian Journal of Electrical Sciences","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134513195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-30DOI: 10.51983/ajes-2020.9.2.2552
Salu Khadka, Pragya Shrestha Chaise, Sujin Shrestha
A recommendation system is an application that can identify entities of interest for a person and provide suggestions based on the past record of person’s likes and preferences. The entity of interest can be anything, for example it can be a product, a movie or a news article. Recommender system is an effective way to help users to obtain the personalized and useful information. However, due to complexity and dynamic, the traditional recommender system cannot work well in mobile environment. Keeping such things into consideration, this recommendation system aims to recommend restaurants to users using their past preferences so they do not need to go through a list of choices. The recommender system adopts a user preference model by using the features of user's visited restaurants, and utilizes the location information of user via GPS(Global Positioning System) using LBS(Location Based System) and restaurants to dynamically generate the recommendation results using collaborative filtering technique. The suggestions will be based on the user preferences obtained from the past ratings and reviews given by the user, frequently visited cuisines of the user and the time preference of the user. Moreover, a brief analysis of reviews is also made to provide user a computed synopsis of the restaurant using text mining algorithm.
推荐系统是一种应用程序,它可以识别一个人感兴趣的实体,并根据人们过去的喜欢和偏好记录提供建议。感兴趣的实体可以是任何东西,例如它可以是一个产品,一部电影或一篇新闻文章。推荐系统是帮助用户获取个性化、有用信息的有效途径。然而,传统的推荐系统由于其复杂性和动态性,在移动环境下不能很好地工作。考虑到这些因素,这个推荐系统的目的是根据用户过去的偏好向他们推荐餐馆,这样他们就不需要浏览一个选择列表。推荐系统利用用户去过的餐厅特征,采用用户偏好模型,利用LBS(location Based system)和餐厅的位置信息,利用用户通过GPS(Global Positioning system)获取的位置信息,通过协同过滤技术动态生成推荐结果。这些建议将基于用户从过去的评分和评论中获得的用户偏好、用户经常光顾的菜系以及用户的时间偏好。此外,还对评论进行了简要分析,并使用文本挖掘算法为用户提供了餐厅的计算摘要。
{"title":"Restaurant Recommendation System Using User Based Collaborative Filtering","authors":"Salu Khadka, Pragya Shrestha Chaise, Sujin Shrestha","doi":"10.51983/ajes-2020.9.2.2552","DOIUrl":"https://doi.org/10.51983/ajes-2020.9.2.2552","url":null,"abstract":"A recommendation system is an application that can identify entities of interest for a person and provide suggestions based on the past record of person’s likes and preferences. The entity of interest can be anything, for example it can be a product, a movie or a news article. Recommender system is an effective way to help users to obtain the personalized and useful information. However, due to complexity and dynamic, the traditional recommender system cannot work well in mobile environment. Keeping such things into consideration, this recommendation system aims to recommend restaurants to users using their past preferences so they do not need to go through a list of choices. The recommender system adopts a user preference model by using the features of user's visited restaurants, and utilizes the location information of user via GPS(Global Positioning System) using LBS(Location Based System) and restaurants to dynamically generate the recommendation results using collaborative filtering technique. The suggestions will be based on the user preferences obtained from the past ratings and reviews given by the user, frequently visited cuisines of the user and the time preference of the user. Moreover, a brief analysis of reviews is also made to provide user a computed synopsis of the restaurant using text mining algorithm.","PeriodicalId":365290,"journal":{"name":"Asian Journal of Electrical Sciences","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133561662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-30DOI: 10.51983/ajes-2020.9.2.2554
Kingie G. Micabalo, Jesszon B. Cano, June Ace P. Navarro, Lucilito A. Atillo, Ryan D. Montilla
Educating and learning modalities in virtual and customary classes can be best seen as a marker of proficiency and college adequacy. The examination decides the adequacy of online and traditional classes to the College of Business and Accountancy. The respondents were the 208 understudies from the University of Cebu Lapu and Mandaue utilizing the descriptive - comparative research method on a snowball sampling. Frequency and simple percentage, Mean, Chi- Square Test of Independence and Independent Samples T-test were utilized, to sum up, separate, and unwind the information assembled. The findings revealed that there is statistically significant difference on the level of effectiveness between online and traditional class. The understudies perceived online class as moderately effective while perceiving traditional class as highly effective. Moreover, it revealed that there is a statistically significant correlation on the respondents gender, course and year level on the level of perception either by traditional or online classes. The study concludes that Online and Traditional modalities of educating and learning extraordinarily assume an essential function on an understudy's useful term in school. However, refinement of approaches to these modalities is very important to portray student-teacher resiliency at any given situation.
{"title":"Effectiveness of Online and Traditional Class: A Comparative Analysis","authors":"Kingie G. Micabalo, Jesszon B. Cano, June Ace P. Navarro, Lucilito A. Atillo, Ryan D. Montilla","doi":"10.51983/ajes-2020.9.2.2554","DOIUrl":"https://doi.org/10.51983/ajes-2020.9.2.2554","url":null,"abstract":"Educating and learning modalities in virtual and customary classes can be best seen as a marker of proficiency and college adequacy. The examination decides the adequacy of online and traditional classes to the College of Business and Accountancy. The respondents were the 208 understudies from the University of Cebu Lapu and Mandaue utilizing the descriptive - comparative research method on a snowball sampling. Frequency and simple percentage, Mean, Chi- Square Test of Independence and Independent Samples T-test were utilized, to sum up, separate, and unwind the information assembled. The findings revealed that there is statistically significant difference on the level of effectiveness between online and traditional class. The understudies perceived online class as moderately effective while perceiving traditional class as highly effective. Moreover, it revealed that there is a statistically significant correlation on the respondents gender, course and year level on the level of perception either by traditional or online classes. The study concludes that Online and Traditional modalities of educating and learning extraordinarily assume an essential function on an understudy's useful term in school. However, refinement of approaches to these modalities is very important to portray student-teacher resiliency at any given situation.","PeriodicalId":365290,"journal":{"name":"Asian Journal of Electrical Sciences","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129740449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-30DOI: 10.51983/ajes-2020.9.2.2549
K. Bhavsar
Mobile Ad-hoc Network is a wireless mobile nodes network, which forms a network without any pre existing fixed network infrastructure support. MANET permits versatile communication between hosts that are moving around. MANETs have numerous advantages compared to traditional wireless networks. In MANET, each mobile node needs the cooperation of other nodes in the network for forwarding data packets from source to destination node. Mobile Ad-hoc Network includes different routing protocols for communication and in MANET each mobile node can act as host as well as sender or receiver at the same time. MANET is design to smartly react to network changes and operates without human interference to support nodes mobility. Mobile Ad-hoc Networks are designed to sustain its survivability in unfriendly and hostile conditions such as natural disasters and other emergency conditions. However unique characteristics of MANETs topology such as open peer-to-peer architecture, dynamic network topology, shared wireless medium and limited resource (battery, memory and computation power) pose a number of non-trivial challenges to security design. These challenges and characteristics require MANETs to provide broad protection and desirable network performance. Due to dynamic nature of MANET it is very challenging work to employ a secure route. The routing protocols play important role in transferring data. Mobile Ad Hoc Networks (MANETs) pose challenges in terms of energy control, due to their fixed transmission power, the mobility of nodes and a constantly changing topology. High levels of energy are needed in wireless networks, particularly for routing. In order to address this problem, energy enhancement is analyzed with the proposed dynamic AODV cluster base trust protocol, with the aim of maximizing the lifetime of the network. We have performed simulation of our approach to justify our research work on network simulator-2 (NS-2). Simulation result presents that our proposed approach result is improved the performance of network than the existing Mobile Ad hoc Network protocol.
{"title":"Secure And Energy Efficient Stochastic Optimized Routing Protocol for Mobile Ad Hoc Network","authors":"K. Bhavsar","doi":"10.51983/ajes-2020.9.2.2549","DOIUrl":"https://doi.org/10.51983/ajes-2020.9.2.2549","url":null,"abstract":"Mobile Ad-hoc Network is a wireless mobile nodes network, which forms a network without any pre existing fixed network infrastructure support. MANET permits versatile communication between hosts that are moving around. MANETs have numerous advantages compared to traditional wireless networks. In MANET, each mobile node needs the cooperation of other nodes in the network for forwarding data packets from source to destination node. Mobile Ad-hoc Network includes different routing protocols for communication and in MANET each mobile node can act as host as well as sender or receiver at the same time. MANET is design to smartly react to network changes and operates without human interference to support nodes mobility. Mobile Ad-hoc Networks are designed to sustain its survivability in unfriendly and hostile conditions such as natural disasters and other emergency conditions. However unique characteristics of MANETs topology such as open peer-to-peer architecture, dynamic network topology, shared wireless medium and limited resource (battery, memory and computation power) pose a number of non-trivial challenges to security design. These challenges and characteristics require MANETs to provide broad protection and desirable network performance. Due to dynamic nature of MANET it is very challenging work to employ a secure route. The routing protocols play important role in transferring data. Mobile Ad Hoc Networks (MANETs) pose challenges in terms of energy control, due to their fixed transmission power, the mobility of nodes and a constantly changing topology. High levels of energy are needed in wireless networks, particularly for routing. In order to address this problem, energy enhancement is analyzed with the proposed dynamic AODV cluster base trust protocol, with the aim of maximizing the lifetime of the network. We have performed simulation of our approach to justify our research work on network simulator-2 (NS-2). Simulation result presents that our proposed approach result is improved the performance of network than the existing Mobile Ad hoc Network protocol.","PeriodicalId":365290,"journal":{"name":"Asian Journal of Electrical Sciences","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124152628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-15DOI: 10.51983/ajes-2021.10.1.2834
S. Shargunam, G. Rajakumar
Tomatoes are the most commonly grown crop globally, and they are used in almost every kitchen. India holds second place in the production of tomatoes. Due to the various kinds of diseases, the quantity and quality of tomato crop go down. Identifying the diseases in the earlier stage is very important and will help the farmers save the crop. The first initial step is pre-processing, for the Canny edge detection method is used for detecting the edges in the tomato leaves. The classification of tomato leaves is to be carried out by extracting the features like color, shape, and texture. Extracted features from segmented images are fed into classification. The convolutional neural network algorithm will be used, which will give a better accuracy to classify the diseases in the tomato leaves.
{"title":"Defect Identification and Classification of Tomato Leaf Using Convolutional Neural Network","authors":"S. Shargunam, G. Rajakumar","doi":"10.51983/ajes-2021.10.1.2834","DOIUrl":"https://doi.org/10.51983/ajes-2021.10.1.2834","url":null,"abstract":"Tomatoes are the most commonly grown crop globally, and they are used in almost every kitchen. India holds second place in the production of tomatoes. Due to the various kinds of diseases, the quantity and quality of tomato crop go down. Identifying the diseases in the earlier stage is very important and will help the farmers save the crop. The first initial step is pre-processing, for the Canny edge detection method is used for detecting the edges in the tomato leaves. The classification of tomato leaves is to be carried out by extracting the features like color, shape, and texture. Extracted features from segmented images are fed into classification. The convolutional neural network algorithm will be used, which will give a better accuracy to classify the diseases in the tomato leaves.","PeriodicalId":365290,"journal":{"name":"Asian Journal of Electrical Sciences","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121038612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-15DOI: 10.51983/ajes-2021.10.1.2864
A. Omotunde, Martin Ejenobor, E. Onuiri, Ajayi S. Wumi, Izang Aaron, Adekola Olubukola
Voting is a critical element of any election which involves the processes of electing leaders or representatives into positions of authority in a democratic system of government. In most developing countries of the world, this process is usually marred with challenges of confidentiality, Integrity, availability and auditability such as falsification of results, identity theft, stolen of ballot boxes, multiple voting problems, over voting, and electoral fraud. This paper presents a framework for Automated Teller Machine-based voting system that solves the aforementioned challenges of the current voting system by using the existing Automated Teller Machines and debit cards issued for voting. Going further to implement the solution proposed in this paper will enhance and guarantee the credibility of the electoral processes and show a true reflection of the wishes of the people.
{"title":"ATM-Based Voting System","authors":"A. Omotunde, Martin Ejenobor, E. Onuiri, Ajayi S. Wumi, Izang Aaron, Adekola Olubukola","doi":"10.51983/ajes-2021.10.1.2864","DOIUrl":"https://doi.org/10.51983/ajes-2021.10.1.2864","url":null,"abstract":"Voting is a critical element of any election which involves the processes of electing leaders or representatives into positions of authority in a democratic system of government. In most developing countries of the world, this process is usually marred with challenges of confidentiality, Integrity, availability and auditability such as falsification of results, identity theft, stolen of ballot boxes, multiple voting problems, over voting, and electoral fraud. This paper presents a framework for Automated Teller Machine-based voting system that solves the aforementioned challenges of the current voting system by using the existing Automated Teller Machines and debit cards issued for voting. Going further to implement the solution proposed in this paper will enhance and guarantee the credibility of the electoral processes and show a true reflection of the wishes of the people.","PeriodicalId":365290,"journal":{"name":"Asian Journal of Electrical Sciences","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129860858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chabot are recently being utilized in a variety of online applications such as education, marketing, supporting systems, cultural heritage and industry from e-commerce to travel. It provides several benefits, such as availability, personalization, etc. Chabot is appeared in very large numbers at the start of the present decade. In a present day, the usage of Chabot is increasing day by day in large scale of the application that is providing better intelligence to the user. In fact, to speed up the assistance these systems are equipped with Chatbots which can interpret the user questions and provide the right answers, in a quick and proper manner. Hence, it is not a part of virtual assistants, but it can be utilized for governments as well as organizations on websites, applications and instant messaging platforms to develop the products, ideas or services. This paper presents the realization of a chatbot in the educational system. In addition, the authors present the historical development, types of chatbot, applications and their future in education sector is described.
{"title":"Utilization of Chabot in an Educational System","authors":"Beenu, Harsh Jindal, Rakesh Kumar, Meghul Kumar Kushawaha, Santosh Kumar","doi":"10.51983/ajes-2021.10.1.2833","DOIUrl":"https://doi.org/10.51983/ajes-2021.10.1.2833","url":null,"abstract":"Chabot are recently being utilized in a variety of online applications such as education, marketing, supporting systems, cultural heritage and industry from e-commerce to travel. It provides several benefits, such as availability, personalization, etc. Chabot is appeared in very large numbers at the start of the present decade. In a present day, the usage of Chabot is increasing day by day in large scale of the application that is providing better intelligence to the user. In fact, to speed up the assistance these systems are equipped with Chatbots which can interpret the user questions and provide the right answers, in a quick and proper manner. Hence, it is not a part of virtual assistants, but it can be utilized for governments as well as organizations on websites, applications and instant messaging platforms to develop the products, ideas or services. This paper presents the realization of a chatbot in the educational system. In addition, the authors present the historical development, types of chatbot, applications and their future in education sector is described.","PeriodicalId":365290,"journal":{"name":"Asian Journal of Electrical Sciences","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121012862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}