One of the greatest issues facing the nation today is the energy crisis. The energy crisis can be mitigated to some extent if people keep track of our energy consumption and avoid wasting it. People nowadays confront ...
One of the greatest issues facing the nation today is the energy crisis. The energy crisis can be mitigated to some extent if people keep track of our energy consumption and avoid wasting it. People nowadays confront a variety of issues, including electricity theft. One’s own country’s economy has a major significant influence on electric power theft and is a type of crime. In this research, an IoT-based power utilizedis proposed andit is measured utilizing current and voltage sensor reading. The proposed IoT technology will readily detect energy theft. This Internet of Things is connected with an Arduino UNO IDE with a Wi-Fi module for IoT connectivity andcustomers will receive information viathe Blynk app. A current sensor is also included in this smart electricity meter, which relays the current information to the microcontroller. Users must connect cell phones to Blynk app so that the electricity theft can be tracked and monitored,which can help you to set up your system. The reading appears on the IoT screen as soon as it activates the system. The reading will be altered following the passage of time. If energy theft occurs, the theft will be detected and displayed on the IoT screen. To prevent theft, the user can use the IoT Blynk app to monitor the tracking of power utilized by the system anywhere and at any time, even after receiving the theft indication signal.
Rapid growth in technological development, the use of the internet has grown many folds. Along with it, the sharing of privacy information in networks creates ownership issues. In order to create a high level of secur...
Rapid growth in technological development, the use of the internet has grown many folds. Along with it, the sharing of privacy information in networks creates ownership issues. In order to create a high level of security for sharing private information, the concept of steganography is introduced along with encryption based invisible watermarking techniques. The proposed system hides the encrypted private messages by using onetime pad which follows the concept LSB algorithm in spatial domain. The system combines steganography and encryption for enhancing the confidentiality of the intended messages. At first, the private information of the user is encrypted by using the onetime pad algorithm. Then the encrypted text is hidden the Least Significant Bit (LSB) of the different components of the color image in such a way that as to minimize the perceived loss of quality of the cover image. The beneficiary of the message is able to retrieve the hidden back and from the stego-image and extract the cipher text and find the plaintext from using the onetime pad algorithm. The proposed algorithm will be tested and analysed against three different hiding positions of color image components.
Irrigation in agricultural lands is critical and time-consuming and its automation possess huge challenges. A smart irri- gation system needs real-time values of moisture, humidity, temperature etc. Capturing the real...
Irrigation in agricultural lands is critical and time-consuming and its automation possess huge challenges. A smart irri- gation system needs real-time values of moisture, humidity, temperature etc. Capturing the real-time values of moisture, humidity, temperature etc. requires the deployment of multiple sensors at multiple locations. The occurrence of localized phenomena can affect the proper functioning of the irrigation system. Determining the parameters and deciding how much irrigation is to be done, is a daunting task. Moreover, these values can be altered or falsely measured due to highly localized situations or interference, like the proximity of a generator when it switches on can alter the temperature measured by the nearest sensor, or that of a water container or bucket placed near the sensor can alter humidity values. All these factors can affect the judgement of how irrigation is done by the automation system and hence affect the crops, as these readings would cause either over-irrigation or dehydration of certain areas of the crop, and can result in damaged or reduced productivity. Our approach consists of deploying a large number of sensors throughout a large agricultural land and aggregating the data. The localized errors can be weeded out through proper analysis of sensor data. We used a fuzzy logic-based system to make decisions on irrigation. Certain instances may require human intervention to resolve, such as intentional tampering of sensors or destruction of sensors due to pests or natural phenomenon. The system detects and alerts the farmer or worker to check in at that particular site.
Research in mobile grid computing is inspired by the broad benefits of intensive scientific and enterprise applications by the scientific community in grid and mobile computing. The primary aim of grid computing is to...
Research in mobile grid computing is inspired by the broad benefits of intensive scientific and enterprise applications by the scientific community in grid and mobile computing. The primary aim of grid computing is to combine the power of wide-ranging resources that are very diverse in nature and provide users with essential services to users in the future. Resources are complex and varying in a mobile grid system and the availability is limited for a period of time. With resource mobility in mind, classification is the most challenging and primitive challenge in the mobile grid environment. The previous paradigm outlined the Quantum based approach on Gravitational search Algorithm (QBGSA) for scheduling the task (job) on a mobile computing grid. In any case, it has problem with computational difficulty and execution time. To solve this problem, the proposed system designed an Intuitionistic Fuzzy C-Means (IFCM) clustering and Natural Exponential Inertia Weight with Artificial Bee Colony (NEIWABC) based scheduling approaches. In this proposed research work, grid server has all the information about mobile grid networks. Once it receiving the task request from user, it verifies the available resource providers. The nodes are clustered by using Intuitionistic Fuzzy C-Means (IFCM) clustering algorithm and Cluster Head (CH) selection is done using mobile capacity such as storage capacity, computational power. Then the task request is promoting to the selected CH in the cluster. Then the CH schedules the jobs to the appropriate mobiles to respond user. The task scheduling is performed by using Natural Exponential Inertia Weight with Artificial Bee Colony (NEIWABC) algorithm. The results of this experiment depicts that the proposed system attains good efficiency on comparison with previous system.
The self-standing computers embodies a distributed system, intertwined by a concatenated web associate degreed endowing the software of districuted system. The hardware fragment of distributed system with remodelling ...
The self-standing computers embodies a distributed system, intertwined by a concatenated web associate degreed endowing the software of districuted system. The hardware fragment of distributed system with remodelling the size of some workstations integrated by one native space network with bazillions of computers twinned with multifold wide area networks. The potential of distributed system is unveiled which supports the trade-off of reliability and cost buttoned up with comprehensive search mechanisms. The diversified attributes like the reliability of execution and reliability, price of execution and communication are the principal components and portrayed in matrices, explicitely the CRM(,), ERM(,), CCM(,), electronic welfare(,). Reorientation and conversion of these matrices is consistant with the conjucted tasks. Every task fusion evaluates the reliability of the distributed computer contiguous with the execution cost as well as the communication cost. The optimum indisputable response of distributed computing system is bagged when the reliability aspect is modulated for all the blends of tasks. A live of elongated performance is achieved finally beyond shadow of doubt.
The ability to drive a car is a significant step toward independence for individuals with impairments, however, the standard driving system placed in a car does not provide the functionality for the challenged driver ...
The ability to drive a car is a significant step toward independence for individuals with impairments, however, the standard driving system placed in a car does not provide the functionality for the challenged driver to operate the vehicle. Hence, in this project, we focused on designing a prototype of a car that works with the help of renewable energy like solar for people who have disabilities related to their legs or arms. It will be very helpful for those people who have physical disabilities to drive from one place to another without counting on anybody. The research shows that the issues about sustainable mobility are gaining increasing attention both in public opinion and specialists because of the major impact of automotive systems on carbon Dioxide production, climate change (global warming), and fuel exhaustion. So, by using renewable energy such as solar energy as source power it helps pollution-free, sustainable, and causes no greenhouse gases which will save the environment in the future. Probably the best development in the clinical field that helped both the old and the impeded is the portability vehicle. The expense of the vehicle may not be reasonable for an average person. In this case, an endeavor is made to manufacture a Solar Electric vehicle for disabled people at an ideal cost that can be used easily. It ensures the physically challenged people to be comfortable in travel and life. As solar energy is the main source on which we are focusing nowadays, because of many reasons like pollution, cost of fuel and also due to unavailability of the fuels. In the future solar energy will be the major source. The features have made in this solar electric vehicle are intelligent ones and are very useful for physically disabled people who want to be independent. In addition to that, the GSM is attached to the vehicle for monitoring disabled people. If the vehicle got any damage or the people is in out of control or any other irregular activities are found
Underwater robots have the ability to go down the sea up to several meters of height without any fear of loss of human lives. These robots need autonomous control systems and guidance to carry out their tasks. One of ...
Underwater robots have the ability to go down the sea up to several meters of height without any fear of loss of human lives. These robots need autonomous control systems and guidance to carry out their tasks. One of the main objectives of any underwater robot is to reach a given depth under the water and also be able to maintain that depth throughout the operation period. In this paper a simple full state feedback controller was designed to control the underwater robot's depth, despite all the external forces and disturbances during a given mission.
Heart disease or Coronary illness, leads to many kinds of disease and deaths beyond a couple of many years. Dataset cleaning is simply an incorporated method for tackling gigantic data in the health care space. This e...
Heart disease or Coronary illness, leads to many kinds of disease and deaths beyond a couple of many years. Dataset cleaning is simply an incorporated method for tackling gigantic data in the health care space. This examination paper presents different traits identified with coronary illness and the model on-premise of administered learning calculations as K-closest neighbour (KNN) and Support Vector Machine. The results depict that the most elevated exactness score is accomplished with SVM. Utilizing a profound learning approach, 96.07 % exactness was gotten. computerized reasoning strategies have been generally utilized in clinical choice emotionally supportive networks for expectation and finding of different infections with great exactness. These characterizing strategies are extremely successful in planning clinical emotionally supportive networks because of their capacity to get covered up examples and connections in clinical information given by clinical experts. Perhaps the main utilization of such a system is in the analysis of heart sicknesses since it is one of the main sources of passings from one side of the planet to the other. A framework dependent on such danger variables would assist clinical experts with welling it would give patients an admonition about the plausible presence of coronary illness even before the patient visits an emergency clinic or goes for exorbitant clinical check-ups. Thus, this paper presents a procedure for the expectation of coronary illness utilizing significant danger factors with the assistance of various Classifying Algorithms. In this paper, the accuracy of ML Algorithms like SVM and K-Nearest Neighbour is been compared and the results are depicted.
Digital libraries are platforms that allow users to access structured information in a knowledge-based repository of data and access. In the end, the availability of good content and easy accessibility and use will dr...
Digital libraries are platforms that allow users to access structured information in a knowledge-based repository of data and access. In the end, the availability of good content and easy accessibility and use will drive the production and growth of digital libraries. Significant advancements in IT and the rapid development of online data have generated an intense interest in tools to help users find desired data. This paper describes how, particularly in college libraries, a digital library can be built and enforced in an academic library. The specifications for hardware, software, processing and recovery technologies are addressed. An elegant user interface, combined with better browsing, insertion and reporting capabilities, functionality that anyone can access from anywhere. The library’s automatic update facility helps to get a clear idea of which books are accessed by the members, allows users to create a ’hard copy’ report. The Digital library system stores information such as name, address, ID number, date of birth of library members. The information of books such as book name, book number, topic to which it refers, author, edition, edition, year of publication, total number of publications, total number of books in the library can also be stored and accessed digitally.
In the present situation COVID-19 global pandemic, an overall world got embrace with covid-19 virus. Moreover every country went under quarantine and firm mitigation measures by temporary shutdown in people crowded pl...
In the present situation COVID-19 global pandemic, an overall world got embrace with covid-19 virus. Moreover every country went under quarantine and firm mitigation measures by temporary shutdown in people crowded place like schools, restaurants, theatres and domestic and international transport facilities[1]. So government made these measures to be effective to support and compliance of public[2]. Advanced medical technology put up with new vaccines to control infection of virus. Vaccination is one of the most effective step to control the virus from affecting the entire population. This paper aims to explore the optimal effectiveness of Vaccination for novel COVID-19 non clinical approach. We need smart solutions and decisions to mitigate the coronavirus`s impact. We formulate the mathematical model to Analyse the vaccination effectiveness[3]. The objective function is designed to reduce both awareness of vaccination and effectiveness of vaccination using WHO data/ Indian dashboard data[4]. The degree of protection As a part we can analyse the risk factors of immunization using multivariate models using statistical analysis.
暂无评论