Professional Documents
Culture Documents
cfp22cb5-Dvd
cfp22cb5-Dvd
cfp22cb5-Dvd
Greetings!
Greetings!
On the eve of 2023, the IEEE Student Branch of MZCET & the
department of Electronics and Communication Engineering have convened the
1st IEEE International Conference in the MZCET campus. It is a memorable
milestone to cherish and opens the vistas of Automation, Computing and
Renewable Systems. I congratulate the conference team who have burnt their
midnight oil in arranging this great event at MZCET. It is remarkable to note
that resource persons from foreign countries and high-ranking universities are
our chief guests and guest of honour at this memorable conference.
I wish and pray that this conference proceeding would remain imprinted in the
minds of the delegates and let me wish the conference all the best!
Greetings!
Greetings!
Once again, let me wish the conference a grand success and this event will add
one more feather to the crown of MZCET.
Dr. Balamurugan P,
Principal,
Mount Zion College of Engineering and Technology,
Pudukkottai, Tamil Nadu, India.
International Conference on
Automation, Computing and Renewable Systems
ICACRS 2022
Table of Contents
S. No Paper Title/ Author Name Page. No
Optically Controlled Microwave Sensor for Biomedical Applications
1 1
Maryam Sami Majeed, Mesut ÇEVİK
Bandwidth and Power Cost Optimized Over Visible Light Communication
2 5
Karpagam. M, Sowmya. K
Analysis of RLC Network Connected to Steady Stimulating Source via Gupta
3 Transform 9
Rohit Gupta, Rahul Gupta, Loveneesh Talwar, Anamika, Dinesh Verma
Robotic Arm Aided Thermal Screening System
4 13
Usha Rani C M, K Shailaja, Raksha C, Harisha H L, Prashanth P
Recent Advancement and Comparative Turnouts of 1Ø Grid Tied Non-Isolated
5 Inverters Topologies 19
Rushikesh S. Shahakar, Kawita D. Thakur, Nutan S. Thakare
An Automated System for Arrhythmia Detection using ECG Records from
MITDB
6 26
Gilbert Roland, Dhana Sony. J, S. N. Padhi, S. Kayalvili, S Cloudin,
Ashok Kumar
A Multicore ECU-based Automotive Software Domain Combining Runnable
7 Sequencing and Task Scheduling 34
K. Suganyadevi, V. Nandhalal, N. Thiyagarajan, S. Dhanasekaran
Analysis of Coagulation Effect in Veins using MEMS Laminar Flow for Early
8 Heart Stroke Detection 39
T. Vasudeva Reddy, R. Anirudh Reddy, P. Kavitha Reddy, Anisha Reddy
Reviewing the Role of Fiber Bragg Grating Temperature Sensors in Smart
9 Factories: Opportunities and Challenges 45
Paul Stone Macheso, Mohssin Zekriti
IoT-based Intelligent Mobile Application for Shopping
10 M. Balamurugan, G. Prabhakar, G. Amsaveni, M. Karthikumar, J. Jasmin 50
Shifa, E. Sharmila
Noval Approach to Non-Invasive Blood Glucose Monitoring based on Visible
11 Laser Light 54
Joel T, Sakthipriya R, Reena J, A Poojha
A Survey on MQTT Bridges, Challenges and its Solutions
12 58
V. Thirupathi, K. Sagar
Dynamic Pagerank Frequent Subgraph Mining by GraphX in the Distributed
13 System 63
Sadhana Priyadarshini, Sireesha Rodda
Prediction of Solar Energy using Time Series Methods
14 72
Sakshi Shukla, Sarita Sheoran, Sumanta Pasari
A Novel MPPT Approach for a Grid Tied Wind Energy System
15 77
D. Ravi Kishore, B. Kavya Santhoshi, K. Sravani, Kalpaguri Maruthi
Design and Implemetation of Combinational Logic Circuits using Open Source
16 Tool 82
N. Divya, G. Ilakkiya, M. Dheeraj, R. Hinduja, M. Gokul Nathan, M. Harish
Architectural Designs and Performance Analysis of Adiabatic-based 6T, 9T,
17 and 12T SRAM Cells 88
Parvathi M
Design and Development of Neuro-Fuzzy based Multi-Level Inverter using
18 FPGA 93
Ameer Ahamed Z, Anuj Jain, V. K Sharma
Fuzzy Logic Controlled SEPIC with Coupled Inductor-based Converter for
High Voltage Applications
19 101
D. Kirubakaran, S. Gomathi, T. Kavitha, M. Sai Silvya, P. Rajeshwari,
T. D. Subha
Optimal Siting and Sizing of Dispersed Generation in Electrical Distribution
Network with PSO
20 108
Aishwarya M. Holi, Shubham B. Kattikar, Mihir V. Patel, Rudresh B.
Magadum, Santosh M. Nejakar
A Study of Genealogy and Tracking Systems for Automotive Manufacturing
21 Industries 112
Akhil Thomas, Arvind A R, Angelina Geetha
A Generic Algorithm for Controlling an Eyeball-based Cursor System
22 Praveena Narayanan, Sri Harsha. N, Sai Rupesh. G, Sunil Kumar Reddy, 117
Rupesh. S, Yeswanth. M
A Hybrid Optimizer based Nonlinear Model Predictive Control for Rotary
23 Inverted Pendulum 121
Supriya P. Diwan, Shraddha S. Deshpande
Interactive Performance Indicator Dashboard for Modern Enterprise
24 Vidya Dharani L, Manikanta K, Grace Anzel G, Sasi Kiran V, Srithar S, 128
Aravinth S S
Switching and Morphological Studies on Si 15 Te 80 Cu 5 Glass and Thin
25 Film 134
Diptoshi Roy, Chandasree Das
Performance Analysis of Slotted Microstrip Antenna with Variant Substrates
26 139
R Gayathri, T Perarasi, M Leeban Moses, P Ramya
Overview on Battery Management System and Energy Storage System of
27 Electric Vehicle 143
Sanitha Michail C, Chithra M, Nithara P V, Reshma P Eldho
Enhanced Vehicle Plate Identification using YOLO
28 Gayana M N, Alonie Jane Crasta, Shreenath Acharya, Carol Dsouza, Divya 148
Cheryl Moras, Karvender Singh
Exploratory Analysis on Geo-Locational Data
29 S. Ravi Kishan, Krishna Sahithi Kakunuri, Akshitha Raj Parasa, Vamsipriya 153
Patlolla, Prathap Gamini
Distance Estimation for Collision Avoidance of Micro Aerial Vehicles using
LiDAR Sensor
30 157
Hemanth Verma Pinnamaraju, Prashanth Reddy Kapu, Adi Narayana Juturu,
Anbarasu B
Low Power, Highly Stable and Enhanced Read Speed 7T SRAM
31 Deberjeet Usham, Malti Bansal 162
Simulation of Flight Trajectories of Quadrotor using MATLAB and Simulink
32 168
Akash S, B. Anbarasu
Effectual Home Automation using ESP32 NodeMCU
33 173
R. Niranjana, Arvind S, Vignesh M, Vishaal S
Design and Analysis of a Meta Material based Nested Circular Split Ring
34 Resonator for Terahertz Applications 178
Swathi Dasi, Swathi Dasi, G Manmadha Rao
Wheat Head Detection using YOLO: A Comparative Study
35 182
Neeraj S Kumar, Stephi S, Meenakshi R, Greeshma Sarath
Comparison between Symmetrical and Asymmetrical 13 Level MLI with
36 Minimal Switches 187
Sindhuja R, Padma S, Parimalasundar E, Suresh K
Development of Hardware Prototype and Testing of Short Transmission Line
37 V. Johsna, V Harshith Varma, Reddi Vivek Vardhan, Sailaja V, K Deepa, 192
Manitha PV
A Review of Dynamic Wireless Power Transfer System Technology used in
38 Solar Wireless Electric Vehicle Charging Stations 198
Vinoth Kumar K, Maruthi B, Rahul R, Santhosh Melvin D, Sathish S
Hardware Integration of Sensors for Automating Smart Homes
39 C. Lasya, N. Madhav Sai, N. Gunavardhan Reddy, N. Manoj Reddy, Lekshmi 202
S, Syama S
Analyzing the Effects of Electric Mobility Charging Harmonics on Power Grid
40 207
Nishant Sharma, Akshay Dhiman, O. P Rahi
Optimal Placement of Electric Vehicle Charging Station by Considering
41 Dynamic Loads in Radial Distribution Systems 212
Dandu Srinivas, M. Ramasekhara Reddy
Performance Enhancement of Kesterite Cu 2 ZnSn(S,Se) 4 Thin Film Solar
42 Cell 218
Satyendra Kumar, Swati Arora
EEG Signal -based Epileptic Seizure Detection
43 Gokul M, Jagasri L, Sindhuja M, Barkavi R, Pradeep Murugesan, Arun Prasath 223
T
Robustness Trend of Power Transmission and Transformation Monitoring
44 System based on Multidimensional Data Anomaly Detection Algorithm 229
Wei Zhang, Yubo Zhang, Chengwei Huang, Yubin Feng
Miniaturized Semi Hexagonal Aperture Shape Antenna with Elliptical Ground
45 for C – V2X Communication 233
Ramya Vasudevan, Nagaraju V
Smart Water Flow Monitoring and Theft Detection System using IoT
46 Varakumari Samudrala, Ajay Reddy Yeruva, Jayapal N, T. Vijayakumar, 239
M. Rajkumar, Shaik Razia
IoT based Solar Technology Monitoring and Cleaning System
47 246
H. Vidhya, U. Akshaya, M. G. Keerthana, T. Dhivyanandhini
Ensuring Safety for School Children using IoT
48 251
Daniel NareshKumar. M, Aneeshraj P B, Balaji A, Doguparthy Dhanush
IoT and Artificial Intelligence-based Low-Cost Smart Modules for Smart
Irrigation Systems
49 V. Anand Kumar, A. Renaldo Maximus, S. Vishnupriyan, K. Sheikdavood, 254
P. Gomathi
Designing and Implementation of Cellular Network based LPG Monitoring and
50 Alert System 261
S. Ramalingam, B. Sakthi Kumar, K. Prabhu, C P. Prashanth, E. Petersam
A Comparative Study on Machine Learning based Cross Layer Security in
51 Internet of Things (IoT) 267
K. Saranya, A. Valarmathi
Currency and Fake Currency Detection using Machine Learning and Image
52 Processing-An Application for Blind People using Android Studio 274
Vaishak B, Hoysala S, Pavankumar V H, Mohana
Recent Advancements of Internet of Medical Things (IoMT): Challenges and
Future Opportunities with Emerging Technologies
53 278
Divy Tushar Shah, Akash Patel, Aishwariya Budhrani,
Khushi Patel
Solar Tree based Smart City Street Light Control System using IoT BLYNK
Platform
54 284
S. Dhanasekaran, P. Gomathi, A. Renaldo Maximus, Thiyagarajan Krishnan,
B. Kannan
IoT and Image Processing based Smart Door Locking System
55 B Jayaram, D. Abdus Subhahan, Sakthivel B, T. A. Mohanaprakash, Sunita 291
Joshi, M Jogendra Kumar
Smart Blind Stick for Visually Impaired People using IoT
56 Rajanish Kumar Kaushal, K. Tamilarasi, P. Babu, T. A. Mohanaprakash, 296
S. E. Murthy, M Jogendra Kumar
Implementation of a Smart Garbage Monitoring System using GSM
57 301
B. Rubini, S. Pradeep Kumar, M. Suganiya
Android based Integrated Parking System for Real-Time Parking
58 Raji C.G, Adil Bin Aboobacker, Anfas Muhammad, Jamshidha K, Jishana 304
Shemeem
IoT-based Automatic Manhole Observant for Sewage Worker’s Safety
59 Rakesh Dronavalli, Kalpana Seelam, Parthive Maganti, Jasmitha Gowineni, 310
Sai Deepthi Challamalla
Municipality Water Management System using IoT
60 Perumal. B, Nagaraj. P, Esakki Raja. S, Jaya Sunthari. S, Keerthana. S, 317
Muthukumar. M. V
Random Forest , DT and SVM Machine Learning Classifiers for Seed with
61 Advanced WSN Sensor Node 321
Sachin D. Shingade, Rohini Prashant Mudhalwadkar, Komal M. Masal
Misbehaviour Detection based on Least Square Twin Support Vector Machine
62 in VANETs 327
H Summia Parveen, S. V. Evangelin Sonia
Issues and Future Challenges of Sentiment Analysis for Social Networks- A
63 Survey 332
R. Geethanjali, A. Valarmathi
Location based 5G Transmission for LEO Satellite Communication using
64 BPAM Technique 340
Sivasakthi T, Barath Narayanan R, Palani U, Vasanthi D, Preethi R, Pooja M
Detection of Selfish Nodes based on Node Energy in Mobile Adhoc Networks
– MANETs
65 346
R. Sarumathi, V. Jayalakshmi
A Review on Energy Efficient Cooperative Routing Algorithm for Wireless
66 Sensor Networks 351
Immanuvel Arokia James K, Manjula P, Mohana M, Arthi S
Impact of Power, Dıstance and Channel Condıtıons on the Throughput of
Infrastructure and Adhoc Wi-Fi Networks
67 359
ManasaPriya K, Chaitanya G, Mubeena Sk, Jahnavi K, Seetha Ramanjaneyulu
B, Gangaprasad G
Towards Internet of Things: Integration of Wireless Sensor Network to Cloud
Services for Data Collection and Sharing
68 363
Anil Kumar N, S. Vijayalakshmi, D. Baswaraj, Padmanayaki Selvarajan,
S. Chandramohan, Mohit Tiwari
Modified Aquila Optimization based Route Planning Model for Unmanned
Aerial Vehicles Networks
69 370
Sachin Vasant Chaudhari, Shahnawaz Ayoub, M. Siva, M. Dhipa, B Gayathri,
V. Banupriya
Performance Analysis M-PAPM WDM-PON System with ASE-Powered
Stealth Channels for Steganography Applications
70 376
A. Sagaya Selvaraj, Mathibalan. B, Sagadevan K,
Mohanraj S
Detection of Distributed Denial of Service Attack using Random Forest
Algorithm
71 382
Murukesh C, Kishore Kannan B, Thilak kumar A, Venkat B,
Haris kumar V
Digital Data Protection using Barcode & Steganographic Approach
72 387
Ayushi Chaudhary, Ashish Sharma, Neeraj Gupta
Blockchain based Healthcare Data Management
73 392
Karthigha M, Padmavathy C, V. S. Akshaya
Intruder Detection System for Digital Device using Computer Vision
74 Sugantha Mallika S. S, Priyadharsini. M, Venkat Kumar. I. S, Sudharsan. R, 397
Surya. M
Detection of Attacks using Attention-based Conv-LSTM and Bi-LSTM in
75 Industrial Internet of Things 402
Bebin Josey T, D. S. Misbha
Design of Hybrid Authentication Protocol for High Secure Applications in
76 Cloud Environments 408
Sai Srinivas Vellela, R. Balamanigandan
A Randomized Dot Pattern Character Encoding Scheme (R-DPCES) for
77 Steganography 415
Susmita Mahato
Usage of Classifier Ensemble for Security Enrichment in IDS
78 Ch. Phaneendra Varma, G. Ramesh Babu, Pokkuluri Kiran Sree, N. 420
Raghavendra Sai
Optimal Installation for Enhancing Power System Security using Integrated
79 BBO-PSO techniques 426
K. Kavitha
Comparative Stratification of Steganalysis Techniques to Interpret & Target
Anomalies
80 Dhiren Dommeti, Siva Ramakrishna Nallapati, Venkata Vara Prasad Padyala, 433
Venkata Naresh Mandhala
Implementation of Technology to Recognize Segmented and Non-Segmented
Text: A Survey
81 439
Sandhya Sharma, Sheifali Gupta, Avinash Sharma, Lipika Gupta, Shaminder
Kaur
Attribute based Encryption in Healthcare Application
82 443
Suresh Kumar S, Chidambaram G, S. Vijayalakshmi, Dhayanandh AT
Data Privatization and Security using Bit Plane Complexity Segmentation
83 451
Suresh Kumar S, Chidambaram G, S. Vijayalakshmi
Design and Security Analysis of Isoidentity based Isobeta Cryptosystem
84 Nilesh Bhosale, Rupesh Pohane, Siddhant Meshram, Akshaykumar Meshram, 459
Malabika Adak, K. T. V. Reddy
Privacy Preserving Encryption with Optimal Key Generation Technique on
Deduplication for Cloud Computing Environment
85 464
Sanjeeva Polepaka, Shahnawaz Ayoub, Yudhveer Singh Moudgil, B Gayathri,
Himanshu Sharma, S Kannan
A Comprehensive Survey on Cloud Security Mechanisms
86 471
Dhwani Hakani, Palvinder Singh Mann
SEHAT: Cloud-based User Sociable Health Care Assistant System
87 476
Sk. Arshiya Sultana, D. Igna Sree, Ch. Rupa, G. Sowmya Sree
Task Scheduling Algorithms in Fog Computing: A Comparison and Analysis
88 483
Tarun Jagadish, Onkar Apte, K. Pradeep
Identify Fake Data or Misinformation in Near Real-Time using Big Data and
89 Sentiment Analytics 489
Parth M Kansara, Kinjal U Adhvaryu
Effective Intrusion Detection and Classification using Fuzzy Rule based
Classifier in Cloud Environment
90 497
C. Veena, S. Ramalakshmi, V. Bhoopathy, Minakshi Dattatraya Bhosale,
C. G. Magadum, Abirami. S. K
A Comprehensive Review of Cloud based Multi-Authority Revocable CPABE
91 Schemes 503
Shobha Chawla, Neha Gupta
Mantaray Foraging Optimization based Makespan Enhancement in Cloud
based Scheduling Environment
92 508
Aswini. J, K. Johny Elma, P. John Augustine, N. Kopperundevi,
S. M. Chithra, T. Parasuraman
A Novel Deep Learning Mechanism for Workload Balancing in Fog
Computing
93 515
Maganti Venkatesh, S Naveen Kumar Polisetty, Srilakshmi.CH,
PraveenKumar. K, Rabinarayan Satpathy, P. Neelima
Qos-Aware Video Streaming based Admission Control and Scheduling for
94 Video Transcoding in Cloud Computing 520
Venkateswara Reddy B, Khader Basha Sk, Roja D
Soft Computing based Machine Learning Techniques for Optical
95 Communication Networks 526
P. Malini, A. Vasantharaj, S. Preethi, S. Karpakam, U. Sasikala, S. Irfan basha
Spot Fire: An Intelligent Forest Fire Detection System Design with Machine
96 Learning 532
K. Revathi, T. Tamilselvi, R. Arunkumar, T. Divya
PDF Malware Detection System based on Machine Learning Algorithm
97 538
Pruthvi Priya P M, Hemavathi P
A Deep Learning Approach to Analyze Diabetic Retinopathy Lesions using
Scant Data
98 543
Devendra Singh, Dinesh C. Dobhal, Saurabh Pargaien, Amrita Verma
Pargaien, Janmejay Pant, Himanshu Pant
Comparison of Machine Learning Algorithms for Pigment Epithelial
99 Detachment Classification using Shape and Curvature Features 550
T. M. Sheeba, S. Albert Antony Raj, M. Anand
Deep Learning Network for Object Detection Under the Poor Lighting
Condition
100 555
Chethan L S, S. Uma Maheswari, Seeram Srinivasa Rao, Naveen Mukkapati,
C. S. Sundar Ganesh, Ashok Kumar
ML based Parkinson’s Disease Identification using Gait Parameters
101 Lokaiah Pullagura, Nilofer Kittad, G. Diwakar, V. Sathiya, Ashok Kumar, 561
Mrutyunjaya S Yalawar
A Brief Analysis on Machine Learning Classifiers for Intrusion Detection to
Enhance Network Security
102 567
Spandana Mande, Nandhakumar Ramachandran, Chanumolu Kiran Kumar,
Ch Naga Priyanka
A Brief Review on Melanoma Diagnosis Models using Machine Learning
103 Techniques 574
Deepthi Rapeti, D Vivekananda Reddy
Equilibrium Optimizer with Deep Learning Model for Autism Spectral
Disorder Classification
104 582
A. Praveena, T. S. Karthik, Vijayakrishna Rapaka E, N. Senthamilarasi,
Abirami. S. K, Shyamali Das
Automated Intracranial Haemorrhage Detection and Classification using Rider
Optimization with Deep Learning Model
105 588
T. S. Karthik, N K Anushkannan, Vijayakrishna Rapaka E, Naziya Hussain,
Rajasekhar Pinnamaneni, Shyamali Das
Heart Disease Prediction and Classification using Machine Learning and
Transfer Learning Model
106 595
R Sivaprasad, M. Hema, Bharati N Ganar, Sunil D M, Vaishali Mehta,
Mochammad Fahlevi
Convolutional Neural Networks (CNN) based Marine Species Identification
107 Nanthini. N, Arul Siva Kumaran K, Ashiq A, Aakash V S, Bhuvaneshwaran M 602
J
Review of Machine Learning Algorithms for Autism Spectrum Disorder
108 Prediction 608
V. Kavitha, R. Siva
Detection of Traffic on the Network based on a Real Dataset for the IIM
109 Method and ML-TSDS Algorithm 614
Sugin S.V, M. Kanchana
A Machine Learning based Approach for Breast Cancer Prediction
110 623
Mayank Agrawal, Vinod Jain
Covid-19 Infection Segmentation using Deep Learning Techniques
111 627
Arya R, Deepak S
Machine Learning Techniques for Detecting DDoS Attacks in SDN
M. Kavitha, M. Suganthy, Aniket Biswas, R. Srinivsan, R. Kavitha,
112 634
A. Rathesh
Retinal Fundus Image Retrieval and Classification using Optimal Deep
113 Learning Model 639
S Syed Mahamood Shazuli, A. Saravanan
Social Distancing Monitoring and Alerting System using YOLO Deep
114 Learning Algorithm 646
P. Dharani Devi, M. Thirukumaran, B. Balaji
Breast Cancer Segmentation by K-Means and Classification by Machine
Learning
115 651
K. Priya, V. Senthilkumar, Samson Isaac. J, Sreekanth Kottu, V S
Ramakrishna, M Jogendra Kumar
An Examen of Oral Carcinoma using Machine Learning Approaches
116 657
Jenifer Blessy. J, Sornam.M
MiMi: Sinhala Language Speech Assistive Learning Bot to Support Children
with Stuttering
117 662
K. C. D Vithana, D. N. N Weerarathne, H. A. S Krishan, M. R. M Wijesiri,
Samantha Thelijjagoda, J. A. D. T Jayawickrama, Nethmini T. Weerawarna
An Extensive Review of Machine Learning Techniques for EEG Signal
118 Processing 669
Anita. M, A. Meena Kowshalya, B. Maheswari, A. Muthuram
Hybrid Machine Learning based False Data Injection Attack Detection and
Mitigation Model for Waste Water Treatment Plant
119 674
A. Parvathy, G. Leela Kasyap, D. Venkata Abhinav, A. N. V. Surya Sai,
R. Sriranjani, N. Hemavathi
Twitter Sentiment Analysis with Machine Learning
120 M. Jagadeesan, T. M. Saravanan, P. A. Selvaraj, U. Asif Ali, J. Arunsivaraj, S. 681
Balasubramanian
Hybrid Particle Swarm Optimization with Deep Learning Driven Sarcasm
Detection on Social Media
121 687
J. Anitha Josephine, Md. Abul Ala Walid, Mohammad Shabbir Alam, Santosh
Kumar Maharana, Thulasimani T, Mohit Tiwari
Design of Kernel Extreme Learning Machine based Intelligent Crop Yield
122 Prediction Model 694
Srilatha Toomula, Sudha Pelluri
Reliable Densely Connected Network with Machine Learning based Diabetic
Retinopathy Grading Approach
123 702
Srinivasulu Sirisala, Nihar Ranjan Behera, D. Amuthaguka, Sachin Vasant
Chaudhari, Jhakeshwar Prasad, Swetha Reddy A
Land Use Land Cover Classification using Machine Learning
124 708
Harsh Waghela, Saurin Patel, Pooja Sudesan, Soham Raorane, Rohan Borgalli
Deep Learning Aided Emotion Recognition from Music
125 R Raja Subramanian, Kokkirala Aditya Ram, Dola Lokesh Sai, K Venkatesh 712
Reddy, Kondeti Akarsh Chowdary, Kundu Dheeraj Datta Reddy
Estimation of Accuracy Level for Sentiment Analysis using Machine Learning
126 and Deep Learning Models 717
V. Vanthana, K. Kartheeban
Heart Disease Prediction Model using Machine Learning
127 723
Binju saju, V Asha, Arpana Prasad, Harish Kumar P, Rakesh V, A. P. Nirmala
Poaceae Family Leaf Disease Identification and Classification Applying
128 Machine Learning 730
Arpana Prasad, V Asha, Binju Saju, Likhitha S, Mayuri P
An Extensive Study on HAR Systems to Recognize Daily Activities using
129 Deep Learning Approaches 736
Gayathri Tippani, Veerraju Gampala
Deep Network Analysis and Prediction of Ophthalmic Disorders
130 M. Darshini, M. Hemamalini, Jeyasheela Rakkini, G. Bagyalakshmi, V. 743
Gomathi
Artificial Intelligence based System in Protein Folding using Alphafold
131 750
Pragya Srivastava, Shreyansh Suyash, N. Jayapandian
Online Voice based Smart Security and Automation System for Real Time
132 Application using Artificial Intelligence 756
M. Bhavani, R. Brinda, P. S. Manoharan, S. Ramalingam
Diagnosis of Neurodegenerative Diseases by Gait Analysis using Triblock
133 CNN and Deep RQA Techniques 762
Vajiha Begum S. A, Pushpa Rani M
Secured IoT Malware Detection Framework using AI based Fuzzy Logic
Systems
134 771
V. S. Saranya, G. Ramachandran,
S. Chakaravarthi
Corneal Ulcer Feature Extraction and Image Classification using a Deep
135 Convolutional Network and the VGG 16 Model 780
S. Janet Grace Susila, D. Kavitha
Intelligent Deep Residual Network based Brain Tumor Detection and
Classification
136 785
K. Kartheeban, Kapula Kalyani, Sai Krishna Bommavaram, Divya Rohatgi,
Mathur Nadarajan Kathiravan, S. Saravanan
A Systematic and Bibliometric Review on Face Recognition: Convolutional
137 Neural Network 791
Aakanksha, Gurpreet Singh, Jaspreet Singh, Deval Verma
Artificial Intelligence based Smart Cosmetics Suggestion System based on
Skin Condition
138 797
Kavyashree N, Rama Satish K V, Prasanna Rajaram Rasal, Rahul Jalindar
Jadhav, M. Saidireddy, K G Kharade
Indian Agriculture Supply Chain Management using Blockchain Technology
and CNN
139 802
D. N. V. S. L. S.Indira, M. Hema Reddy, G. Sri Jyothi, K. Rohith, K. Sravya,
G. Jahnavi
Real-Time Face Mask Detection from CCTV Video Frames using Deep Neural
Networks
140 809
V Anantha Natarajan, Putta Vishnu Vardhan, Nayakula Murahara Sai Priya,
Nunna Vineeth, Parthu V
An Intelligent Convolutional Neural Network based Potholes Detection using
141 Yolo-V7 813
Madarapu Sathvik, G. Saranya, S. Karpagaselvi
A Review of Generative Adversarial Networks(GANs) for Technology-
142 Assisted Learning : Solving Teaching and Learning Challenges 820
K. Dinesh Kumar, Sarot Srang, Dona Valy
A Survey on Quantization Methods for Optimization of Deep Neural Networks
Uday Kulkarni, Abhishek S Hosamani, Abhishek S Masur, Shashank Hegde,
143 827
Ganesh R Vernekar, K Siri Chandana
Analysis of CNN Model with Traditional Approach and Cloud AI based
144 Approach 835
Utkarsh Kushwaha, Puja Gupta, Sonu Airen, Megha Kuliha
Liver Tumor Grade Detection using CNN based LSTM Model with Correlated
145 Feature Set from CT Images 843
Venkateswarlu Gavini, G. R. Jothi Lakshmi
Image Error Concealment Method by Hiding a Copy of the Same Image in it in
146 Spatial and Wavelet Domain before Transmission 851
Ghouse Ahamed Z, Anuj Jain, V. K Sharma
SaRa: A Novel Activation Function with Application to Melanoma Image
147 Classification 854
Mohammad Naved Qureshi, Mohammad Sarosh Umar
DeepFake Detection Through Key Video Frame Extraction using GAN
148 859
Lalitha S, Kavitha Sooda
Image Inpainting for Fingerprint Analysis
149 864
Milind Bhilavade, K. S. Shivprakasha, Meenakshi R Patil, Lalita S Admuthe
An Interpretation on Brain Gate System Network and Technology- A Study
150 868
Sowmya K, Sushitha S
Air Compression Massage System for Chronic Vein Disorders
151 874
Deekshita R, Priscita K, Shruthi Ram R, Vigneshwari N, M. Anisha, Gokul M
Traffic Sign Detection using Hog and GLCM with Decision Tree and Random
152 Forest 879
Asha J, Giridhran R, Agalya K, Sathya R
Optimal Allocation of Distributed Generation using Modified Grey Wolf
Optimizer
153 884
Ibrahim Alkhaleel Altayara, Essam A. Al-Ammar, Ghazi A.Ghazi, Ahmed A.
AL Katheri
A Comparative Study of Feature Selection Methods for Activity Recognition
154 in the Smart Home Environment 890
John W. Kasubi, Manjaiah D. Huchaiah
Emotion Recognition from Telugu Speech using Probabilistic Support Vector
155 Machines 896
Ratna Kanth Nelapati, Saraswathi Selvarajan
Smart Cervical Band for Detection of Cervical Spondylosis using IOT
156 Technologies 900
M. Arunkumar, K. Pugalendhi, S. Agalya
Improvement of Safety in Road Environment by Designing an Advanced
Driver Assistance System
157 907
V. Gokula Krishnan, Pinagadi Venkateswara Rao, M. Navaneethakrishnan,
V. Prabhu, D. Parkavi, T. Tamilarasan
A Novel Fish Optimization Algorithm for Offshore Disease Detection in
158 Fishes using a Smartphone App 912
K. Sujatha, T. Kalpalatha Reddy, N. P. G. Bhavani
Identifying Patterns in Common Vulnerabilities and Exposures Databases with
159 Exploratory Data Analysis 919
Atul Kumar, Ishu Sharma
Fertilizer Spraying using Active Learning in Precision Agriculture to Improve
the Crop Yield
160 925
N. Rajeswari, D. Kavitha
A Comparative Review: Detection and Classification of Cervical Cancer from
161 Pap-Smear Images 932
Krishna Prasad Battula, Sai Chandana Bolem, Jonnadula Harikiran
Non-Sequential Indexing of Videos using Linguistic Computation
162 939
Sanjana Hukkeri, Ashish H, Ritu V. Malage, Preethi P, Mamatha H. R
Modeling of Chicken Swarm Optimization with Hybrid Networks for Visual
163 Places Recognition 946
S. Senthamizhselvi, A. Saravanan
Eye-Move, An Eye Gaze Typing Application with OpenCV and Dlib Library
164 952
Abhaya V, Akshay S, Chandan C Bagan, Dhanraj K, Shyamala G
A Survey on Application of Metaheuristics Techniques for Ensemble Feature
165 Selection (EFS) 958
S. Vijayalakshmi, V. Prasanna Venkatesan
SADGF: Surveillance based Anxiety Detection using Gender- based Facial
166 Emotion Recognition 966
Beulah Divya Kannan, Nithyakamal Ilamurugu
Data Extraction Approach using Natural Language Processing for Sentiment
Analysis
167 970
Shreyash Mishra, Siddhartha Choubey, Abha Choubey, Yogeesh N, J Durga
Prasad Rao, P. William
Android based Recommender System (ARS) to Detect Breast Abnormalities
168 M Kavitha, Venkata Krishna P, V Rama Krishna, Sreenivasulu Digavinti, 973
M Kalyani, Tiruluka V S Naga Divya
Chronic Kidney Disease Detection using AdaBoosting Ensemble Method and
169 K-Fold Cross Validation 979
N. Mohana Suganthi, Jemin V. M, P. Rama, E. Chandralekha
Experimental Setup of Apache Spark Application Execution in a Standalone
170 Cluster Environment using Default Scheduling Mode 984
M. Jayanthi, K. Ram Mohan Rao
Efficiency Enhancement using Least Significant Bits Method in Image
Steganography
171 989
P. Subhasri, S. Santhoshkumar, A. Sumathi, C. Balakrishnan, F. Kurus Malai
Selvi
Hand Gesture Recognition using DenseNet201-Mediapipe Hybrid Modelling
172 995
Prachetas Padhi, Mousumi Das
Analysis and Detection of Monkeypox using the GoogLeNet Model
173 1000
Upendra Singh, Lokendra Singh Songare
Contrast Enhancement of Lung CT Scan Images using Multi-Level Modified
174 Dualistic Sub-Image Histogram Equalization 1009
K. Ezhilraja, P. Shanmugavadivu
Measuring COVID-19 Opinion in the Online Debate using an Unsupervised
175 Model 1015
Priyadarsini K, Jeba Sonia J, Vijayalakshmi K, Anbazhagu U. V
ClassHotel: Application of Data Analytic Techniques for Online Hotel
Recommendation
176 1021
R Raja Subramanian, M Poojith Reddy, K Kousik, S Rupesh, S Rohith,
B V Sai Kumar
Design of Autonomous Obstacle Avoidance System for Automobiles based on
177 Machine Learning in the Context of Intelligent Transportation 1027
Wu Yangming
Design and Comparison of Collaborative Filtering Technology for Product
Suggestions in E-Commerce
178 1031
P. Rajasekar, B. Mohanraj, S. N. Padhi, N. Sivakumar, Lavanya J, Charles
Prabu. V
Prediction of YouTube View Count using Supervised and Ensemble Machine
179 Learning Techniques 1038
Manikandan P, Sharmila Rajam J, Manimuthu A, Sathya Narayana Sharma K
Production Planning in Process Industries using CEC 2021 Winning
180 Algorithms 1043
Remya Kommadath, Aman Kumar Saini, Prakash Kotecha
Performance Evaluation of Recently Proposed Metaheuristics Algorithms on
Solving Job Shop Scheduling Problem
181 1051
Remya Kommadath, Bibekananda Ramchandani, Makkitaya Swarna Nagraj,
Prakash Kotecha
Pre-Trained Xception Model-based COVID Detection using CXR Images
182 M. Gayathri Lakshmi, Komal Singh, R. Beaulah Jeyavathana, 1059
Venkatasubramanian, V. Satish Goud, A. Deepak
Facial Emotion Recognition using Deep Learning Approach
183 1064
Sowmiya R, Sivakamasundari G, Archana V
A Novel Object Detection Framework using Convolutional Neural Networks
184 (CNN) and RetinaNet 1070
Archana V, Kalaiselvi S, Thamaraiselvi D, Gomathi V, Sowmiya R
Machine Learning based Botnet Detection in Large-Scale Network
185 1075
Alan Shine Manuel, Esther Daniel, S. Durga, Beulah Rani I
A Smart Recommendation System for Medicine using Intelligent NLP
Techniques
186 1081
C. Srinivasa Kumar, Ranga Swamy Sirisati, Viswanath Gudditti, Kanusu
Srinivasa Rao, Ratna Kumari Challa
Design and Development of Automatic Tomato Sorting Intelligent System
using Image Processing
187 1085
Baluprithviraj. K. N, Dhanalakshmi. M, Dharanidharan. D, Gokulkrishnan. K,
Janarthanan. S, Madhan Mohan. M
Evaluation of Feature Selection and Multi-Class Prediction Methods for Metal
188 Stress 1091
Yash Rathod, Dinesh Vaghela
Deep Learning Approaches for Detecting Diabetic Retinopathy using CNN
Models
189 1096
M. Mukesh Krishnan, S. Thanga Ramya, K. Kirubanathavalli, S. Lalitha,
J. Diofrin, M. Vadivel
Construction of Malaria Disease Prediction System using Deep Learning
190 J Sivakumar, Sudhagar D, Vithya V T, Jaichandran R, K. Narasimha Raju and 1103
C. S. Sundar Ganesh
Colour based Object Classification using KNN Algorithm for Industrial
Applications
191 1110
N C Santosh Kumar, S Uma Maheswari, Vigneshwari. M, P V Pramila,
Rashmita Khilar, Ashok Kumar
Splicing Image Forgery Detection by Deploying Deep Learning Model
N Krishnamoorthy, C. Amuthadevi, M. K. Geedtha, Poli Lokeshwara Reddy,
192 1116
Anitha Rani K S, R. Gopinathan
DWT Algorithm for Macro & Micro Block based Multiple Histogram Shifting
for Video Data Hiding
193 1121
K. Venkata Ramana, Sowntharya C, Jithesh K, Poli Lokeshwara Reddy,
Apoorva M C, Ashok Kumar
Bio-Inspired Algorithm for Speed Control of Electric Vehicle
194 K. Rameshkumar, T. J. Catherine, M. Sudhakar, I. Kathir, S. Hemavathi, 1128
K. Balamurugan
Analysis of Crowd Features based on Deep Learning
195 1134
Puja Gupta, Varsha Sharma, Sunita Varma
Improving the Power Consumption of Sensor Networks using Optimization
Technique for Sleep Scheduling Mechanism
196 1140
G. Vinoth Rajkumar, M. Vargheese, A. Anna Lakshmi, K. Ramanan, D. David
Neels Ponkumar, S. P. Ramesh
Penalty based Sentimental Text Generation Framework using Generative
197 Adversarial Networks 1147
K. Chitra, G. Kavitha, P. Latchoumy
Text Localization and Recognition from Natural Scene Images using AI
198 D. Shekar Goud, Vigneshwari. M, Aparna P, Vijayasekaran G, Ajay Singh 1153
Yadav, Ashok Kumar
IDCSNet: Intrusion Detection and Classification System using Unified
199 Gradient-Boosted Decision Tree Classifier 1159
Kondru Mounika, P. Venkateswara Rao
Intelligent Document Finding using Optical Character Recognition and
200 Tagging 1165
A. Mohamed Abbas, M. Syed Shahul Hameed, S. Balakrishnan, K. S. Anandh
Oculus: A New Dimension to Virtual Reality
201 1169
Akshiv Nagta, Bhanu Sharma, Sheena, Avinash Sharma
An Automated Coronary Artery Disease Diagnosis System using Machine
202 Learning 1173
Kanwarpartap Singh Gill, Avinash Sharma, Vatsala Anand, Sheifali Gupta
An Efficient Fashion Recommendation System using a Deep CNN Model
203 1179
B Suvarna, Sivadi Balakrishna
Implementing BeagleBone Black as a Single Board Computer by Transferring
E-mail using SMTP
204 1184
Dharshini S, Haneesh T, Venugopal E, Rama Devi S, Sree Dhviya M, P.
Sivakumar
An Efficient and Robust Breast Cancer Detection in Mammogram Image using
205 Improved Threshold Extraction Method 1188
A. Hema Malini, Yashwanth G, Yellamrajujithendra, Venkataramana Y
Classification of WBC based on Deep Learning using Microscopic Images
206 1194
Rajalakshmi T, Senthilkumar C
Advanced Protection System for SCADA using Fog Computing
207 M. S.Sujatha, P. Shashank, Shahul Ahammad, R. Dharma Teja, Vijji K, A. R. 1202
Hithesh
Computer Vision- Hybrid Learning based on Multi Scale Dilated Convolution
208 Module Mechanism Implemented for Object Detection 1208
D. Kalpanadevi, K. Kartheeban, M. Mayilvaganan, P. Bamaruckmani
A Sentimental Analysis of Legal Documents using Deep Learning Approach
209 Shunmuga Lakshmi Priya. K,Thamarai Selvi. D, Kalaiselvi. S, Gomathi. V 1212
Optimal Trained Deep Maxout Model for Intrusion Detection in Cloud
210 1220
Meble Varghese, M. Victor Jose
Real Time Road Lane Detection using Computer Vision Techniques in Python
211 Salna Joy, Mamta B S, Tejas B Mukesh, Mohammed Muzammil Ahmed, Uday 1228
Kiran
A Review on Digital Farming using Machine Learning Techniques
212 1233
N. Yedukondalu, V. Bhuvana Kumar, A. Narayana Rao
A Unique Model for Detecting the Diseases using Decision Making Approach
213 (DMA) 1239
Shaik Nagul, Y Padma, Siyyadula VR Vara Prasad, Shail Jakeer Hussain
A Robust Framework for Glaucoma Detection and Segmentation of Real Time
Fundus Images using Hybrid ASCL Model
214 1244
G. Charulatha, Maheswaran U, Kalyan Kumar G, N. Sasirekha,
Meenakshisundaram. N
Examination on Fire Detection Methods using Computer Vision
215 1251
Sikhin V C, S Sankara Subramanian, Sreelekshmi R V
Detection and Classification of Breast Cancer from Microscopic Biopsy
216 Images using Modified Neural Network 1259
L. Vanitha, K. Jayamani, N. Sasirekha, Yogalakshmi.V, Sajiv G
Real-Time Sidewalk Crack Identification and Classification based on
Convolutional Neural Network using Thermal Images
217 1266
G. Karthikeyan, Dhaarani T G, R. Anusuya, Kalyan Kumar G, Joel T,
R. Thandaiah Prabu
A Machine Learning based Approach to Early Stage Diabetes Prediction
218 Yudheksha GK, Vijay Murugadoss, P Sanjana Reddy, Harshavardan T, 1275
Shivram Sriramulu
Optical Flow-based Tracking of Vehicles using Adaptive Particle Filter Target
Tracking Algorithm based for Accident Prevention
219 1281
Mohamed Dawood Shamout, R Sivaprasad, N Ramya, Sarang Pande,
Rishikaysh Kaakandikar, Mochammad Fahlevi
Intrusion Detection System for Cyber Attacks in Food and Beverage Industry
220 Beulah Rani I, G. Matthew Palmer, G. Jaspher W.Kathrine, S. E Vinodh 1287
Ewards
Dimensions of Automated ETL Management: A Contemporary Literature
221 Review 1292
G. Sunil Santhosh Kumar, M. Rudra Kumar
Renewable Energy based Security System for Isolator (Air Brake Switch)
using Fingerprint Sensor with Internet of Things
222 1298
Andril Alagusabai, Roossvelt Prabhu K A V, P. Jesu Jayarin, Vishnu Vardhan
Rao G, V Jaiganesh, R. Gopinathan
A Meta-Analysis of Efficient Countermeasures for Data Security
223 1303
Deepa.M, J. Dhiipan
DPMM: Data Privacy and Memory Management in Big Data Server using
224 Hybrid Hashing Method 1309
Manjula GS, T. Meyyappan
Smart Traffic Management System for Priority Vehicle Clearance using IoT
225 1317
A Arul Edwin Raj, Revanoori Bhargavi, S Meghana Anjali, A Teja
IoT based Patients Monitoring System in Healthcare Service
226 Sudheer Hanumanthakari, SVVSR Kumar Pullela, Shankar Nayak Bhukya, 1324
K. Vijayalakshmi, S Rehan Ahmad, Narendra Kumar
A Review of Remote Health Monitoring System for Patients using IoT
227 Vinoth Kumar K, Anil Hegde H, Abhishek, Dhruva S Srinivas, G Krishna 1330
Chaitanya
Knitting Machine Monitoring System using Arduino
228 T. Logeswaran, Bavya S, Jyothiprabha D, Karthika S, Suganeshwaran S. 1334
Ranjith Kumar R
IoT based Automated Coal Mine Detection and Immediate Rescue Robot
229 K. Thivyabrabha, Sharmila A, Dhivya Priya E L, K. R. Priyadharshini, 1338
J. S. Sujin
Smart Driving Assistant for Upclimbing Hill Slope Area
230 Madhan Mohan. M, Baluprithiviraj, Sridhar. S, Varsinishrilaya. P. K, Narendh. 1344
N, Kalavathi Devi T
A Review of Sequential Control & Monitoring of Distribution Lines in
Substations
231 1347
Manochitra G, Vinoth Kumar K, Shiva Shankara M, Yashvantha P, Sindhu P,
Binay Kumar Yadav
Multifunctional Unmanned Ground Vehicle
232 1351
R. Aadithya, M. Harish, P. S. Manoharan
Widened Thresholded Rider Optimization Algorithm for Optimal Switching
233 Loss Reduction in Three-Phase Voltage Source Inverter 1355
Rajeshkumar. G, P. Sujatha Therese
Enhancement of Yarn Quality by Controlling the Humidity and Temperature
234 1363
Baluprithviraj. K. N, Monesh. M. S, PraneshRaj. C, Varuna. S
Exploring the Statistical Properties and Developing a Non-Linear Activation
235 Function 1370
Ochin Sharma
Research on Robust Aircraft’s Trajectory Tracking using Adaptive Controller
236 Sarange Shreepad, S. Deena, Ramakrishnan Raman, Dhiresh S Shastri, Rajesh 1376
A S, S. K. Krishnakumar
Acquisition of CSTR’s Temperature Data in Mobile Phone using Wi-Fi
237 D. Shekar Goud, Parimala Prabhakar, K. Muthulakshmi, Roopa H, Kamal 1383
Alaskar, Amara S A L G Gopala Gupta
DFIG Powered Yaw Function for Wind Energy Network
238 Mallaiah Balaganur, Parimala V, Arunsrinivas T, Muthuraj B, Rutuja Hiware, 1392
Shradha Umathe
The Importance of Medical Robots in Improving Healthcare Services
239 Mohamed Alseddiqi, Budoor AlMannaei, Osama Najam, 1397
Anwar AL-Mofleh
Sensor Assisted Ghat Road Navigation and Accident Prevention
240 1402
G Ravindra, M. Venkateswara Rao, Venkatasivanagaraju. S
Simple Piezoelectric based MEMS Energy Harvester Design and Simulation
241 G Dinesh Ram, T Aravind, S Praveen Kumar, U Hariharan, G Jeyachandran, 1408
G Goutham
Comparative Analysis of Different MPPT Algorithms for Roof-Top Solar PV
242 System 1412
Arun Kumar Maurya, Anil Kumar Rai, Hemant Ahuja
Load Frequency Control by using Different Controllers in Multi-Area Power
System Networks
243 1418
Arun Kumar Maurya, Hera Khan, Anil Kumar Rai,
Hemant Ahuja
Components & Control Scheme used for Line of Sight Stabilization in Defence
Applications
244 1425
Arun Kumar Maurya, Yashdeep Tyagi, Tanu, Hera Khan, Deepak Narang,
Hemant Ahuja
Fuzzy based Pollution Severity Prediction In Polymer Insulator using
245 Harmonic Analyzer 1432
B. Sajeena Ponmani, R. V. Maheswari, B. Vigneshwaran
Indigenous Robot for Advanced Driver Assistance System
246 T. Thivya Tharshini, E. Jeevitha, S. Rayen Subhiksha, H. Jaya Dharshini, 1437
P. S. Manoharan
Performance Improvement of 16 Bus System using Hybrid Power Flow
Controller
247 1441
S. Hemalatha, S. Gomathi, S. Devikala, C. Naresh, M. Gnanaprakash, M.
Senthil Murugan
Evaluation of Quality of Transmission in Disaggregated Optical Network
248 1448
Vidhya J, Ramya G
Microstrip Patch Antenna Simulation for Cranial Implant
249 1454
K. Keerthiga, M. Najira Banu, K. Jayabharathy
Design and Analysis of an Adaptive QoS Aware Approach for supporting
Multiple Services using Meta Heuristic Enhanced Whale Optimization
250 1459
Algorithm over Hybrid Cloud Environment (EWOC)
Premnadh Katkam, P. Anbalagan, V. V. S. S. S. Balaram
Effectual Assessment of Machine Learning-based Heart Failure Prediction
251 Prototype 1467
B Nithya, Asha V, A P Nirmala, Binju Saju, Dobariya Parth, Jain Komal
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
Abstract: In this paper, a design of a microwave that has been used for more than decades [6]. Such
resonator is introduced for noninvasive blood glucose sensing technology is based on measuring changes in
biomedical sensing. The proposed sensor is constructed scattering parameters (S-parameters) in relation to a
from a printed transmission line of 50Ω characteristics
sample under test (SUT) introduction [7]. The
impedance. The transmission line is loaded with a
meander line of a sweep penny elegance chaos. The
sensing evaluation can be transferred via a given
structure is splitted into two symmetric parts that are algorithm to retrieve material characterizations at this
connected to each other through a light dependent step [8]. This can be quantized through field pen
resistor (LDR). The to maximize the field fringing ration as invasive or noninvasive technology.
through the sample under test, an interdigital capacitor Researchers involved metamaterials, closed-loop
is introduced in parallel to the meander line structure. resonators, and other transmission line-based
The proposed sensor is found to provide multiple miniature microwave resonators for biomedical
frequency resonances. However, the authors considered applications. The electromagnetic properties of these
the frequency resonance at 3.46GHz to ensure the
structures are affected by the frequency at which they
effective resonance of the detection with changing the
blood glucose level. Therefore, the proposed sensor is
operate and how the consistency factor varies with
fabricated and tested experimentally with 100 patients different fluid introductions. Consequently, many
to realize the effects of varying the blood glucose level researchers conducted their experimental studies to
up on the proposed sensor transmission loss spectra in design novel microwave sensors with high accuracy
terms is of S 11 magnitude. The proposed sensor for biomedical applications [6]. For example, in [7], a
performance is tested and optimized using circuit model design of a printed interdigital capacitor was
theory. Next, the design performance is validated proposed for water pollution detection at 1.65GHz
numerically using Computer S imulation Technology of based on antenna design. Another design was
Micro Wave S tudio (CS T MWS ) commercial software
proposed in [8] for blood grouse detection using a
package of finite integral technique algorithm. Finally,
the experimental and theoretical results are found in
printed circuit antenna at 0.6GHz. In that design, the
good agreement to each other. sensing technology was proposed based on touching
the antenna terminal directly. Liquid profiles can be
Key words: Light dependent resistor, meander, glucose discussed by calculating S-parameters and complex
sensor, microwave resonator. dielectric properties. Any variation in those
parameters can explain by a biological background.
I. INTRODUCTION Most microwave biosensors operate by installing
Recently, microwave sensors invented the top coupler thin tubes or slotted cylindrical tubes [9].
ranks in the field of delegated sensing technology [1]. However, such technology adds extra losses on the
This is due to the fact, microwave radiations can quality of monuments [10]. Nevertheless, due to the
penetrate through materials under test with excellent problem of penetration into the skin, this technology
accuracy [2]. Nevertheless, most current microwave has been found to be a very limited to many sensing
technologies lean on microstrip and printed processes [11].
circuitries; that can be embedded in highly compact
integrated electronic devices [3]. The microwave
sensors became attractive solutions for many
biomedical issues because they have no ionization II. LITERATURE REVIEW
effects on the human body [4]. Nonetheless, they can Over time, as wireless and mobile communication
operate at low energy conductions [5]. Microwave systems grow more quickly, it becomes increasingly
sensing is a proven tool for liquid characterization necessary to build filters that can use many cutoff
frequencies simultaneously. Stub-loaded resonator sensor is constructed from three main parts: The first
[4], quarter-wave stepped impedance resonator [5], part is based on a traditional transmission line that is
embedded resonator [6], meander split loop resonator loaded to a meander line with an interdigital
[7], and substrate-integrated waveguide resonator [8] capacitor. The meander is considered the second part;
are some of the approaches utilized for multi-band in which, the conductive trace is turned to shape a
filter design. The review that follows includes the sweep penny elegance chaos. The third part is
researchers' procedures and findings: introduced as an interdigital capacitor of five fingers.
• In 2007, Zhang and Xue [9] introduced a unique The main advantage of coupling these structures
dual-mode dual-band filter employing a coplanar- together is to enhance the quality factor by combing
waveguide-fed ring resonator, with independently multiple capacitor inductor branches [3]. Therefore,
regulated center frequencies and bandwidths. The to realize the effects of these parts, the authors
results were validated realistically. Dual-mode dual- proposed the transmission line model based on using
band responses were obtained us ing two microstrip an equivalent circuit model of lumped elements as
ring resonators. To easily manage the coupling seen in Fig. 1(b). The derived circuit model is
strength between the ring resonators and feeding basically describing the main three parts of the
lines, the ring resonators were fed concurrently using proposed sensor. The transmission line is modeled
a unique feeding mechanism. The center frequencies effective LT.L , CT.L , RT.L , and GT.L . In that
were 1.4 GHz and 2.15 GHz, with fractional representation, the transmission line losses are model
bandwidths of 10% and 3.3%, respectively. as conductor and dielectric loess from the conductive
• A dual-band bandpass filter with independent layers and the substrate layer [4]; to be given as RT.L ,
control of the center frequencies and wide stopband and GT.L , respectively. Next, the surface current
suppuration was expected by Xing et al. in 2017 [15]. motion on the conductive traces generates a magnetic
Utilizing a novel quintuple-mode resonator, this filter field that is perpendicular with respect to the current
was created (QMR). Five modes can be obtained, motion [9]; such magnetic field could be stored in the
according to the analysis of the frequencies that was inductive part (LT.L ) of the transmission line [7]. The
performed using the odd and even modes approaches. trapped electrical field between the patch and the
The lower passband was designed using the first two ground plane layer is described by the stored energy
modes, and the upper passband was created using the of the electrical field [8] in the substrate to be given
remaining three modes. The Rogers 4003C substrate, as CT.L .
which has a 0.508mm thickness and a 3.55 dielectric Next, the meander line effects are described by
constant, was used to create the filter. Tunable (CM, LM, RM) parallel branch. In this representation is
passbands and compact size were attained. The given by the effects of resonance energy storing
passband frequencies had fractional bandwidths of bandwidth [10]. Such stored energy is described by
27.7% and 23.4%, respectively, and were centered at maximizing the quality factor in the proposed
2.96 and 5.695 GHz. meander line due to the size reduction effects and
• A tri-wideband bandpass filter was presented by increasing the electrical path length in miniaturized
Xiong et al. in 2018 [17]. (TWB-BPF). The filter area [11]. This realizes the fact of reducing the
stood out for its small size, strong passband isolation, radiation losses which indeed increase the quality
and many transmission zeros (TZs ). The design was factors [12]. The radiation losses can be reduced
developed utilizing odd/even modes analysis and the significantly, when the used measurement process is
multiple-mode resonator (MMR) theory. To improve conducted noninvasively. However, such technique
band-to-band isolation and expand stopband induces inductive and capacitive effects which are
suppression, ten TZs were procured. The Rogers given by LM and CM, respectively. The effects of the
4003 substrate, which has a thickness of 0.508 mm radiation losses from the proposed meander line are
and a dielectric constant of 3.38, was used to create given by RM. The effects of adding the interdigital
the TWB-BPF. The operating frequencies had capacitor is given by (Cidc, Lidc, Ridc) parallel branch.
fractional bandwidths of 37.4%, 43.5%, and 40.4%, This branch is given by coupling the fingers together
respectively, and were centered at 1.07, 3.25, and that stores the electric filed inside and the current
8.32 GHz. The simulated and measured results motion on the conductive trace as Cidc and Lidc,
showed good agreement. respectively. The effects of coupling resistance are
described by Ridc value of the same branch. Such
coupling is due to the effects voltage gradient inside
III. SENSOR DESIGN AND DETAILS the air gap between the fingers [14]. Finally, the
In this section, the design details of the proposed coupling between the meander line and the
sensor are discussed with relative geometrical interdigital capacitor is described with CC to
dimensions. As shown in Fig. 1(a), the proposed maximize the load matching between the [6]. The
TABLE I
LUMPED ELEMENT VALUES OF THE EQUIVALENT
CIRCUIT M ODEL IN FIG. 2
Element Value
Resistance of the left hand (RLH ) 12.2 Ω
Resistance of the right hand (RRH ) 50 Ω
Conductance of the left hand (GLH ) 0.1 S
Conductance of the right hand (GRH ) 4S
Capacetance of the left hand (CLH ) 1.1pF
Capacetance of the right hand (CRH ) 3.1pF
Inductance of the left hand (LLH ) 3nH
Inductance of the right hand (LRH ) 2.2nH
15%. The range of detection is found to be varing circuit branch and compared to the obtained results
from -10dB to -30dB in terms of S12 . from the numerical results. Those results are
compared to the measured results to revel excellent
agreements.
REFERENCES
[1] Al-Behadili AA, Mocanu IA, Petrescu T M, Elwi T A.
Differential Microstrip Sensor for Complex Permittivity
Characterization of Organic Fluid Mixtures. Sensors. 2021;
21(23):7865.
[2] Marwah Haleem and T aha A. Elwi, “Circularly
Polarized Metamaterial Patch Antenna Circuitry for Mo dern
Applications”, International Journal of Emerging T echnology and
Advanced Engineering, Volume 12, Issue 12, December 2022.
[3] Abdulsattar RK, Elwi T A, Abdul Hassain ZA. A New
Microwave Sensor Based on the Moore Fractal Structure to Detect
Water Content in Crude Oil. Sensors. 2021; 21(21):7143.
[4] Elwi, T A. Metamaterial based a printed monopole
antenna for sensing applications. Int J RF Microw Comput Aided
Eng. 2018; 28:e21470.
[5] T aha A. Elwi Wisam J. Khudhayer , "A Passive
Wireless Gas Sensor Based on Microstrip Antenna with Copper
Nanorods," Progress In Electromagnetics Research B, Vol. 55,
347-364, 2013.
[6] Hardinata, S.; Deshours, F.; Alquié, G.; Kokabi, H.;
Koskas, F. Miniaturization of Microwave Biosensor for Non-
invasive Measurements of Materials and Biological T issues.
IPT EK J. Proc. Ser. 2018, 29, 90–93.
[7] Liu, W.; Sun, H.; Xu, L. A Microwave Method for
Dielectric Characterization Measurement of Small Liquids Using a
Fig. 3. Validation part: (a) S11 and (b) S21 spectra. Metamaterial-Based Sensor. Sensors 2018, 18, 1438.
[8] Hao, H.; Wang, D.; Wang, Z.; Yin, B.; Ruan, W.
TABLE II Design of a High Sensitivity Microwave Sensor for Liquid
Dielectric Constant Measurement. Sensors 2020, 20, 5598.
GLUCOSE INFLUENCE ON SENSOR PERFORMANCE [9] Wei, Z.; Huang, J.; Li, J.; Xu, G.; Ju, Z.; Liu, X.; Ni, X.
Glucose level/ mg/dl S 21 / dB A High-Sensitivity Microfluidic Sensor Based on a Substrate
150 -11.8 Integrated Waveguide Re-Entrant Cavity for Complex Permittivity
Measurement of Liquids. Sensors 2018, 18, 4005.
130 -13.2 [10] Liao, S.; Gao, B.; T ong, L.; Yang, X.; Li, Y.; Li, M.
210 -14.9 Measuring Complex Permittivity of Soils by Waveguide
T ransmission/Reflection Method. In Proceedings of the IGARSS
290 -17.5 2019—2019 IEEE International Geoscience and Remote Sensing
390 -20.1 Symposium, Yokohama, Japan, 28 July–2August2019;pp. 7144–
7147.
470 -24.8 [11] Oliveira, J.G.D.; Pinto, E.N.M.G.; Silva Neto, V.P.;
550 -27.7 D’Assunção, A.G. CSRR-Based Microwave Sensor for Dielectric
Materials Characterization Applied to Soil Water Content
Determination. Sensors 2020, 20, 255.
V. CO NCLUSIO N [12] M. G. Mayani, F. J. Herraiz-Martínez, J. M. Domingo
The proposed sensor is fabricated and tested with and R. Giannetti, "Resonator-Based Microwave Metamaterial
introduction of Blood as a material under test from 11 Sensors for Inst rumentation: Survey, Classification, and
patients. The operation method is basically developed Performance Comparison," in IEEE T ransactions on
Instrumentation and Measurement, vol. 70, pp. 1-14, 2021, Art no.
with a novel use of an LDR component that realizes a 9503414.
linear variation in the sensor performance with [13] A. L. Mckenzie and L. E. Armstrong, “Monitoring
glucose variations. Such changes are attributed to the Body Water Balance in Pregnant and Nursing Women: T he
change in the transparency of Blood under test, which Validity of Blood Color,” Annalas of Nutrition and Metabolism,
vol. 70 (suppl 1), no. Suppl. Pp. 18-22, 2017.
causes a change in frequency shift and S21 magnitude. [14] L. E. Armstrong, M. S. Ganio, J. F. Klau, E. C.
The authors discovered that the ration in the S 21 Johnson, D. J. Casa, and C. M. Maresh, “Novel hydration
magnitude is found to be very significant at 3.46GHz assessment techniques employing thirst and a water intake
with linear variation. Such property motived the challenge in healthy men,” Applied physiology, Nutrition, and
Metabolism, vol. 39, no. 2, pp. 138-144, 2013.
authors to consider such novel design is an excellent [15] Sasikala, D., and K. Venkatesh Sharma. "Augmentation
candidate for sensing due to the effects of linear for Blood Doping Discovery in Sports using Random Forest
variation. The proposed sensor circuit model is Ensembles with LightGBM." Journal of Ubiquitous Computing
applied to study the effects of introducing the and Communication T echnologies 4, no. 2 (2022): 115 -124.
proposed sensor parts. Each part is realized through a
(i)TRANSMITTER:
The functionalities of a typical OFDM transmitter are
depicted in the diagram. A serial-to-parallel converter
transforms a serial data stream into a parallel stream,
which is then sent to a plotter for complex number
display [8-13]. There are several various types of
mappers available, including PSK, DPSK, and QAM.
The IFFT produces orthogonal sub-channel signals
when applied to a parallel stream of complex
numbers. To counteract the effects of ISI, a guard
interval is entered at the transmitter and eliminated at
the receiver [11-13]. After that, the orthogonal
signals are streamed, and the signal is up-converted
to the proper carrier frequency before being
delivered.
(ii)RECEIVER:
A photodetector is employed as a receiver. The
receiver is made up of a photodetector and a device
FIGURE 2: SISO 3D PLOT
for demodulating the information. Almost definitely,
it will be utilized to receive data from the led array
[12]. A good photo-detector should be perceptive to
light wavelength intervals while also being reliable
and price effective [13]. A photo-detector shouldn’t
be unaffected by temperature variations. Any
communication device with a camera can connect
with an image detector using visible light. However,
due to its low rate, it will only provide extraordinary
throughput in its current state. The throughput of
stationary photo-detectors, on the other hand, is
projected to be higher .
TABLE 1: Practical Comparison of SISO and MIMO and Challenges," in IEEE Communications Surveys & Tutorials,
vol. 17, no. 4, Fourthquarter 2015, pp. 2047-2077.
SNR SISO MIMO [4] N. Bamiedakis et al., "Micro-LED-based guided-wave optical
BER
links for visible light communications," 2015 17th International
2 0.125 0.040 Conference on Transparent Optical Networks (ICTON), Budapest,
2015.
[5] J. Lian and M. Brandt-Pearce, "Multiuser multidetector indoor
4 0.066 0.0055
visible light communication system," 2015 OptoElectronics and
Communications Conference (OECC), Shanghai, 2015, pp. 1-3.
[6] M. Noshad and M. Brandt-Pearce, "Application of Expurgated
PPM to Indoor Visible Light Communications— Part II: Access
V. CONCLUSION
Networks," in Journal of Lightwave Technology, vol. 32, no. 5,
Various challenges and opportunities for visible light March1, 2014, pp. 883-890.
communication, as well as potential future uses, have [7] I-Cheng Lu, Yen-Liang Liu and Chih-Han Lai, "Highspeed 2×2
MIMO-OFDM visible light communication employing
been discussed. A quick simulation of power
phosphorescent LED," 2016 Eighth International Conference on
distribution was performed to demonstrate the
Ubiquitous and Future Networks (ICUFN), Vienna, 2016, pp. 222-
different illumination patterns that result in a trade- 224.
off between illumination and communication .Wide [8] A. Jovicic, J. Li and T. Richardson, "Visible light
coverage illumination suites have been switched off communication: opportunities, challenges and the path to market,"
when there is a lot of interference. Researchers in IEEE Communications Magazine, vol. 51, no. 12, December
devised a restricted coverage illumination pattern for 2013, pp. 26-32.
a light-emitting diode semi-angle to address the [9] Shakya, Subarna, and Lalitpur Nepal Pulchowk. "A novel bi-
problem, which is ideal for installed point-to-point velocity particle swarm optimization scheme for multicast routing
LOS indoor communications. problem." IRO J. Sustain. Wireless Syst 2 (2020): 50-58.
[10] Sivaganesan, D. "Optimized wireless sensor node
VI. REFERENCES multidimensional routing using fuzzy clustering and chaotic
gravitational search algorithm." IRO Journal on Sustainable
[1] D. C. O'Brien, "Visible Light Communications: Challenges and Wireless Systems 3, no. 1 (2021): 40-48.
potential," IEEE Photonic Society 24th Annual Meeting,
Arlington, VA, 2011, pp. 365-366. [11] M.Karpagam,” Reduction in information loss due to isolated
[2] D. C. O'Brien, L. Zeng, H. Le-Minh, G. Faulkner, J. W. and dumbv nodes using ant colony optimization for WSN”,
Walewski and S. Randel, "Visible light communications: Materials Today Proceedings 2020.
Challenges and possibilities," 2008 IEEE 19th International [12] M.Karpagam, “Advanced Hyperchoatic Image Encryption
Symposium on Personal, Indoor and Mobile Radio Technic with DNA Sequence” Journal of Physics Conference
Communications, Cannes, 2008, pp. Series, IOP Publishing, ICCCEBS 2021.
[3] P. H. Pathak, X. Feng, P. Hu and P. Mohapatra, "Visible Light [13] M.Karpagam, “ACO enhanced RILoD-IN scheme for WSN”,
Communication, Networking, and Sensing: A Survey, Potential 2020 International Conference on Smart Electronics and
Communication(ICOSEC).
Abstract- In the present paper, the Gupta transform (GT) [12]. The present paper submits the GT for the perusal of a
which is a contemporary integral transform has been employed series network of an inductor (L), a resistor (R), and a
for the anatomy of a series network of an inductor (L), a resistor capacitor (C) (i.e. a series LRϹ network) across which
(R), and a capacitor (C) (i.e. a series LRC network) across which coupled a steady stimulating source of voltage, and a parallel
coupled a steady stimulating source of voltage, and a parallel network of an inductor (L), a resistor (R), and a capacitor (C)
network of an inductor (L), a resistor (R), and a capacitor (C)
(i.e. a parallel LRϹ network) across which coupled a steady
(i.e. a parallel LRC network) across which coupled a steady
stimulating source of current. Such anatomy provides the stimulating source of current. The nature of current through a
nature of current through a series LRC network across which series LRC network across which coupled a steady
coupled a steady stimulating source of voltage and the nature of stimulating source of current and the nature of voltage across
voltage across a parallel LRC network across which coupled a a parallel LRC network across which coupled a steady
steady stimulating source of current. The nature of current stimulating source of current, are determined by the GT with
through a series LRC network across which coupled a steady simple computations which corroborate that the GT is a more
stimulating source of voltage and the nature of voltage across a puissant mathematical method than calculus method.
parallel LRC network across which coupled a steady The arrangement of the paper is given below:
stimulating source of current, are determined by the GT with
1. Section I provides a brief introduction to the GT.
simple computations which corroborate that the GT is a
puissant mathematical method for the anatomy of such series or 2. Section II expounds on the application of the GT to
parallel network than the other mathematical method or the network circuits coupled to steady excitation
approach like calculus method. The nature of current through a sources
series LRC network across which coupled a steady stimulating 3. Finally, the reviews and the outcomes are endowed.
source of voltage and the nature of voltage across a parallel LRC
network across which coupled a steady stimulating source of I. Gupta Transform
current, are found to depend on the values of resistance (R)
inductance (L) and Capacitance (C) of the elements: resistor, The process of operating the governing differential equation
inductor, and capacitor of the networks. of series or parallel network of inductor (L), resistor (R), and
capacitor (C) across which coupled a steady stimulating
Keywords: Gupta transform (GT); series or parallel network,
source of voltage or source of current by GT consists of three
inductor (L), resistor (R), and capacitor (C).
main steps:
I. The governing ordinary differential equation of
Introduction
series or parallel network of inductor (L),
A series and parallel networks of an inductor (L), a resistor resistor (R), and capacitor (C) across which
(R), and a capacitor (C) (i.e. series LRC network and parallel coupled a steady stimulating excitation source
LRϹ network) are customarily analyzed by the mathematical is renovated into an algebraic equation.
method or approach such as the calculus method [1]-[4]. II. The algebraic equation is operated totally by
Since the application of the calculus method needs algebraic practices.
complicated computations, therefore, there is a need to seek III. The operation in ‘II’ is transfigured or reversed
the help of integral transforms like Laplace transform [5]-[7], by inverse GT, resulting in the solution of the
Elzaki transform [8], [9], RT [10], etc. for the analysis or given governing ordinary differential equation
perusal of such series and parallel networks. The GT which of series or parallel networks across which
is a contemporary integral transform has been advanced by coupled a steady stimulating excitation source.
Rohit Gupta and Rahul Gupta recently in the year 2020 [11],
The GT changes a function into a contemporary function by A series network of an inductor (L), a resistor (R), and a
the exercise of integration whose detail is as follows. capacitor (C) with a steady stimulating source of voltage
The GT of g(t), a function of variable t, t ≥ 0 is defined as supplying steady voltage 𝑉𝑜 is looked over by the following
1 ∞ equation [13]-[14]
[11 G(s) = 3 ∫0 e−st g(t)dt . Here, integral should be
s R 1
convergent and s is either real or complex. G(s) is the GT of Ï(t) + İ(t) + I(t) = 0 (1)
L LC
g(t). The GT is known to be an integral transform because it Here, I(t) is the current at any time t with I (0) = 0,
changes a function in one space to another space by the 𝑉
and İ(0) = 𝑜 .
L
exercise of integration. Here, k(s, t) = e−st is a kernel which
Taking the GT of (1), we get
is a function of the variables s and t in the two different 1 1 R 1 1
spaces. 𝑠 2 𝐼 (̅ s) – 2 𝐼(0) − 3 İ(0) + {s 𝐼 (̅ s)– 3 𝐼(0)} + 𝐼 (̅ s) =
𝑠 𝑠 L 𝑠 LϹ
The GT of some basic functions [12] is 0 (2)
n!
Ṙ{t n } = n+4 , where n = 0,1,2,3 … Here, 𝐼 (̅ s) is the GT of I(t).
s 𝑉
1 On putting 𝐼(0) = 0 and İ(0) = 𝑜 , (2) becomes
Ṙ{ect } = , s>c l
s3 (s−c) 1 𝑉𝑜 Ɍ 1
Ṙ{sinct} =
c
, s>0 𝑠 2 𝐼 (̅ s) − 3 + 𝑠 𝐼 (̅ s) + 𝐼 (̅ s) = 0
s3 (s2 +c2 ) 𝑠 L L LϹ
1 Or
Ṙ{cosct} = , s>0 Ɍ 1 1 V0
s2 (s2 +c2 )
𝐼 (̅ s) [𝑠 2 + 𝑠 + ] = 3
L LϹ 𝑠 Ł
The GT of the first derivative of 𝑔(𝑡) is given by Or
V 1 1
𝜕𝑔(𝑡) 1 ∞ 𝜕𝑔(𝑡) I(̅ s) = 0 [ 3 2 R 1 ] (3)
Ṙ{ } = 3 ∫ 𝑒 −𝑠𝑡 𝑑𝑡 L 𝑠 𝑠 + 𝑠+
𝜕𝑡 𝑠 0 𝜕𝑡 L LϹ
R 1
Solving the Integration and then applying limits, we get Let 2𝑏 = 𝑎𝑛𝑑 𝜔 = √ , then (3) becomes
𝜕𝑔(𝑡) 1 ∞ L LϹ
Ṙ{ } = 3 {−𝑔(0) − ∫0 −𝑠𝑒 −𝑠𝑡 𝑔(𝑡)𝑑𝑡} V0 1 1
𝜕𝑡 𝑠
𝜕𝑔(𝑡) 1 ∞ I(̅ s) = [ 3 2 ]
L 𝑠 𝑠 + 2 𝑏 𝑠 + 𝜔2
Ṙ{ } = 3 {−𝑔(0) + 𝑠 ∫ 𝑒 −𝑠𝑡 𝑔(𝑡)𝑑𝑡} 𝑂𝑟
𝜕𝑡 𝑠 0
𝜕𝑔(𝑡) 1 V0 1 1
Ṙ{ } = s𝐺(𝑠) − 3 𝑔(0) I(̅ s) = [ ]
𝜕𝑡 𝑠 L 𝑠 3 (𝑠 + 𝑏)2 − (√𝑏 2 − 𝜔 2 ) 2
𝜕𝑔(𝑡) 𝜕𝑔(𝑡) 𝜕2 𝑔(𝑡) 𝑂𝑟
Now, replacing 𝑔(𝑡) by and 𝑏𝑦 , we have
𝜕𝑡 𝜕𝑡 𝜕𝑡 2 V0 1 1
𝜕 2 𝑔(𝑡) 𝜕𝑔(𝑡) 1 ′ I(̅ s) = [ ] (4)
L 𝑠 3 (𝑠+𝑏+√𝑏 2 −𝜔2 ).(𝑠+𝑏−√𝑏 2 −𝜔2 )
Ṙ{ } = 𝑠Ṙ { } − 3 𝑔 (0)
𝜕𝑡 2 𝜕𝑡 𝑠 𝐿𝑒𝑡 𝑏 + √𝑏 2 − 𝜔 2 = 𝑐1 𝑎𝑛𝑑 𝑏 − √𝑏 2 − 𝜔 2 = 𝑐2
𝜕 2 𝑔(𝑡) 1 1 such that 𝑐1 −𝑐2 = 2√𝑏 2 − 𝜔 2 , then equation (4)
Ṙ{ 2
} = s {sṘ{𝑔(𝑡)} − 3 𝑔(0)} − 3 𝑔′ (0)
𝜕𝑡 𝑠 𝑠 becomes
𝜕 2 𝑔(𝑡) 1 1 V0 1 1
Ṙ{ } = 𝑠 2 Ṙ{𝑔(𝑡)} − 2 𝑔(0) − 3 𝑔′ (0) I(̅ s) = [ 3 ]
𝜕𝑡 2 𝑠 𝑠 L 𝑠 (𝑠 + 𝑐1 ). (𝑏 + 𝑐2 )
𝜕 2 𝑔(𝑡) 1 1 This equation can be rewritten as
Ṙ{ } = 𝑠 2 𝐺(𝑠) − 2 𝑔(0) − 3 𝑔′ (0) V
I(̅ s) = 0 [ 3
1 1 1
− 3
1
] (5)
𝜕𝑡 2 𝑠 𝑠 L 𝑠 )
(𝑐2 −𝑐1 ).(𝑠+𝑐1 ) 𝑠 (𝑐2 −𝑐1 ).(𝑠+𝑐2
and so on. Taking the inverse GT of (5), we can write
V0 𝑒 −𝑐1 𝑡 𝑒 −𝑐2𝑡
Hence the GT of some derivatives of the g(t) is given by I(̅ t) = [ − ]
L 𝑐2 − 𝑐1 𝑐2 − 𝑐1
1
Ṙ{g ′ (t)} = sG(s) − 3 g(0), Or
s
1 1
Ṙ{g ′′ (t)} = s 2 G(s) − g(0) − g ′ (0) and so on.
s2 s3
ACKNOWLEDGMENT
The authors are deeply indebted to Prof. Dinesh Verma and
Prof. Mukesh Kumar Rana for their assistance.
REFERENCES
Abstract - With the onset of the Covid-19 pandemic, the health of Covid-19 may symptoms vary, the centres for Disease Control
people has become more of a concern. With this, temperature and Prevention (CDC) states that about 83-99% of the people
measurement has gained even more significance. Non-contact with coronavirus infection will experience a fever. Therefore,
thermometers give the advantage of being used in extreme this makes temperature screening one of the most crucial
infectious environments, lightweight, repeatability, and many
more. Thermal screening helps in identifying people with a high
measures needed to identify people at risk of developing
body temperature who are potentially at risk. This research work Covid-19 or people infected with Covid-19 to slow the spread
focuses on the non-contact human body temperature of the virus.
measurement with the assistance of a robotic arm. The robotic
arm is used to dispense the power of mobility to the system. The Traditionally, body temperature was measured using
robotic arm, interfaced with Raspberry PI, is used to dispense the thermometers which required contact with the target and a
power of mobility to the system. Non-contact infrared health care worker to administer the measurement. The
temperature sensor, MLX90614, is interfaced with Arduino Nano thermometers that were used earlier had to be in contact with
and is used to measure human body temperature. The
mucosal layers or armpits and required a long contact time.
temperature obtained from the thermal gun is fed to the serial
monitor app in the mobile that is connected through the USB They are cheap and reliable yet poses many shortcomings
cable to Arduino Nano. The temperature sensor’s data is which led to the development of non-contact or infrared
displayed on a mobile phone in Celsius unit. The format in which thermometers. The infrared thermometer, non-contact
the sensor data is displayed is programmed using Arduino IDE. thermometer, distinctly offers a clear-cut advantage over
contact measurement of human body temperature due to its
Keywords - Raspberry PI, Arduino Nano, MLX90614- Temperature capability to determine precisely the temperature of the target
Sensor, IR sensor, Robotic arm, Temperature, Degree of freedom object even in the absence of any physical contact. Several
(DOF). industrial practices or applications gain advantage from this
technology owing to their non-contact temperature
I. INTRODUCTION measurement nature. Infrared temperature measurements
present with the potential to keep track of temperature in
People usually overestimate their health and doing so can have situations where the object maybe out of reach or moving,
a negative impact on their immediate environment. The where the object may be contaminated or marred by a contact
introduction of a thermal screening system, to prevent at-risk sensor, where contact is impractical or unfeasible due to
individuals from risking other people, could have a real and exceedingly high temperatures, or maybe where the object is
positive impact on public health. With Covid-19 cases electrically active.
fluctuating across the world and businesses, the education
sector, hospitality industries etcetera striving to reopen, Robots are the new trending facet in the medical sector. They
temperature screening has become predominant for everybody. are possibly the next-generation rescuers or saviors in the
Different industries from healthcare to hospitality, business, healthcare industry. This is because they can perform mind-
and schools have taken added precautions to try to prevent numbing or mundane human tasks precisely, accurately, and
more virus outbreaks. Fever is one of the main and many initial efficiently. Robots are custom built to respond to a specific
symptoms of not only Covid-19 but many other diseases like environment i.e., they are programmed to perform efficiently
influenza, pneumonia, hyperpyrexia etcetera. While initial in monotonous tasks. Robots are not used explicitly in the
[6] S. Sruthi and M. Sasikala, “A Low Cost Thermal Imaging System for
Medical Diagnostic Applications,” 2015 International Conference on Smart
Technologies and Management for Computing, Communication, Controls,
Energy and Materials (ICSTM), ECE Dept Anna University, Chennai, Tamil
Nadu, India, May 06-08, 2015.
[7] Puran Singh, Anil Kumar, and Mahesh Vashisth. (2013). Design of a
Robotic Arm with Gripper & End Effector for Spot Welding: Universal Journal
of Mechanical Engineering, 1(3). DOI 10.13189/ujme.2013.010303.
Figure 7: Temperature data displayed on a mobile. [8] Ranganathan, G. "An Economical Robotic ArmPlaying Chess Using Visual
Servoing " Journal of Innovative Image Processing (JIIP) 2, no. 03 (2020):
VI. CONCLUSION AND FUTURE SCOPE 141-146.
[9] Vijayakumar, T. "Flexible Robotic Electronic Skin with High Sensitivity
Sensor Arrays " Journal of Electronics 1, no. 01 (2019): 43-51.
Temperature measurement has become pivotal everywhere
around the world. With the utilization of the developed
temperature measurement system the burden on health staff, or
anyone who has to monitor people’s temperature, can be
reduced.
With the latest applications and features, healthcare robots are
anticipated to enhance the operational efficiencies, quality,
accuracy, and safety in healthcare service delivery. Robots
work explicitly within the parameters of time and work
delegated to them which is a vital advantage of medical robots.
Additional usefulness of medical robots include flawless
performance, proper monitoring services of patients, does not
waste time, reduced risk of infection, and many more.
The infrared temperature sensor, MLX90614, provides
accurate human body temperature readings. This accurate
measurement becomes crucial in some situations. Robotics
greatly influences the medical industry and along with accurate
temperature measurements, it can greatly simplify human
workload.
REFERENCES
[1] Zhao Gong, Songwen Jiang, Qizhi Meng, Yanlei Ye, Peng Li, Fugui Xie,
Huichan Zhao, Chunzhe Lv, Xiaojie Wang and Xinjun Liu “SHUYU Robot:
An Automatic Rapid Temperature Screening System (springeropen.com),”
2020.
[2] Andrés Moreira, Paul Criollo, Belén Ruales, “Body Temperature Control
Using a Robotic Arm,” March 25, 2021.
II. LITERATURE SURVEY have an impact on the overall system. T type topology
provided a promising approach with bidirectional switches
To enhance competitive advantage and reliability of GPV, a
positioned between the midpoints of DC link capacitors. It has
number of 1Ø transformerless topologies have been
a high conversion efficiency and lowers conduction loss. The
suggested and built. Despite the fact that several topologies DC link voltage required for such topologies, on the other
for transformerless PV grid-connected inverters have been hand, is significantly larger (more than twice the grid voltage
proposed in the literature, only a few topologies were used in peak value). Furthermore, the switches must be capable of
industrial applications thus far. Fig. 2 depicts the division of withstanding the high DC link voltage stress. As a response,
a few fascinating topologies into two primary subgroups single input voltage topologies gained popularity.
depending on the DC link voltage requirement. Half bridge
inverters, for instance the normal half bridge, NP clamped, B. Single Input Voltage Type 1Ø Grid Tied Transformerless
and T type [4,5], which necessitate a substantial high input Inverter Topologies
voltage from the PV panels, are representative The modulation approach used, as well as the CMV across
transformerless inverters with 𝑉𝑃𝑉 = 2𝑉𝐷𝐶 . To achieve the the PV panel’s parasitic capacitance, have a significant
voltage modulation requirement, one 𝑉𝑃𝑉 = 𝑉𝐷𝐶 uses extra influence on performance and applicability of a typical full-
active circuits as well as passive devices, such as common bridge inverter. Constant CMV and removal of Common
ground type and H bridge type. Mode Current ( 𝑖𝑐𝑚 ) are two notable advantages of such
topologies. To suppress 𝑖𝑐𝑚 many different topologies for 1Ø
A. Double Input Voltage Type 1Ø Grid Tied transformerless PV inverters have been designed. These
Transformerless Inverter Topologies schemes, which include DC-decoupling, AC-decoupling, and
This section delves into a few key topologies. The half Neutral point clamped (NPC) type 1Ø transformerless
bridge inverter [4] is the most common conversion topology inverters architecture which minimize 𝑖𝑐𝑚 by isolating the PV
utilized in PV applications. It is comprised of two switches, a array from the grid or by incorporating an auxiliary clamp
filter inductor, and an input side capacitor divider with its circuit to ensure stable CMV.
midway tied directly to the grid's neutral terminal, which 1) Common Ground Type Topology
keeps CMV constant. As a response, the 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 is quite
modest. To avoid a DC link voltage short, the gate directives A Common Ground (CG) configuration [6-9] is one in
used to turn on and off the switching devices must be which the negative polarity of the PV panel is
complementary. To simplify the control system and enhance straightforwardly connected to the grid. Fig. 3 to Fig. 6
efficiency, a new topology known as neutral point clamped [5] shown below are CG type topologies. Table I explores the
was adopted. It saves money and space, but has DC link topology configuration along with their advantages and
balanced and unbalanced conduction losses, which ultimately associated shortcomings.
Half Bridge
H Bridge Type
Common Ground Type
NP Clamped
Decoupling Mid Point Clamping
T Type
Karschny's
Flying Inductor AC
AC DC DC
Flying H6-AC
Capacitor SMA's H5 i/O-H5 iHERIC
2) H-Bridge Type At zero state, these topologies not only decouple PV array and
grid, but also connect short-circuited inverter output terminals
A traditional Full Bridge (FB) inverter topology to the DC bus's midpoint. As a result, CMV is stabilized, and
described in [10] with a unipolar switching pattern and the capacitor voltage follows the grid voltage with no high
with bipolar switching. For ensuring constant CMV and frequency content. These topologies are made up of switch
low 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 , an FB inverter with a bipolar arrangement junction capacitors, which have an unanticipated effect on
was used. Switching losses on the other hand are higher, 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 performance. The CMV is clamped to half of the DC
hence lowering the efficiency. As a result, a unipolar link voltage during the freewheeling phase in this manner, and
modulation method is used to solve the efficiency the inverters are further characterized as AC/DC decoupling
problem [10]. inverters as illustrated in Fig.11 to Fig. 14.
i. Decoupling Type
III. COMMON MODE VOLTAGE (CMV) AND LEAKAGE
All of the other topologies [11-20] discussed in this CURRENT(𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 )
section can be implemented by providing a bypass path
on the DC or AC side. Bypassing helps not only grid and GPV systems require specific attention to suppress CMV and
PV isolation, but also avoids reactive power exchange to eliminate the 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 . This section focuses on the
during freewheeling mode (zero voltage state). As a fundamental common mode resonant circuit. Since a single
result, the inverter's efficiency can be improved. stage conversion system lacks a transformer (galvanic
isolation), 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 gains the closed conduit between PV and
1. DC-Decoupling Type grid. 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 is generated by the average value of voltages
An extra circuit at the DC bus is used for DC-decoupling between the inverter outputs and a common reference. This
transformerless single-phase inverters, which decouples 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 compromises worker safety, creates electromagnetic
the PV panels from the AC side during the freewheeling interference, increases losses and induces current ripples [12].
period as shown in Fig. 7 and Fig. 8. A low THD output voltage is preferred; nevertheless, more
2. AC-Decoupling Type circuitry is required, which complicates the regulating
technique [13].
AC-decoupling transformerless inverters use a decoupling
circuit on the AC side to achieve low Total Harmonic AC bypass topologies have reduced conduction loss
Distortion (THD) based output voltage and current, low when compared to DC bypass topologies. In spite this, using
bypass for galvanic isolation does not completely avoid
𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 , and a balanced system as depicted in Fig. 9 and
𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 due to the consequences of stray capacitances and
Fig. 10.
parasitic components. The inverter architecture and
The dc link is isolated from the grid during decoupling in modulation method must be considered carefully in hopes of
freewheeling mode. Due to decoupling the voltages at two avoiding 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 by creating CMV. Table II enlists
points are floating in relation to the DC connection, the CMV comparison of different topologies on basis of CMV, 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 ,
oscillates and causes 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 . Only galvanic isolation is THD, efficiency and device count which have all already been
insufficient to eliminate the 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 completely. To entirely addressed. CMV and 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 have varying values depending
eliminate 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 , use CMV clamping in conjunction with on topology architecture. 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 is approximately zero when
galvanic isolation via bypass. CMV is constant. As a result, it is suggested that an
ii. Midpoint Clamped Type Topologies architecture be devised that keeps CMV constant.
TABLE I : EXPLORING DIFFERENT TOPOLOGIES CONFIGURATION ALONG WITH ADVANTAGES AND ASSOCIATED SHORTCOMINGS
A
PV Vgrid
Array
B
C2
S2 0
-
Fig. 3. Half bridge inverter
Flying + ✓ Fewer active and passive ✓ Voltage stress across all the
S3 component switches is not uniform
Capacitor L1
✓ Low cost
S1
S4
PV
Array C C0 Vgrid
CF
S2 D
-
0
S4 C1 Vg
N S2 S5
Full Bridge To modulate each phase leg, the unipolar modulation ✓ Ripple reduction ✓ At the switching frequency, the
(Unipolar technique uses two sinusoidal references that are 180̊ out of ✓ No internal reactive-power CMV will oscillate
modulation phase flow ✓ Produces a large amount of 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒
strategy)
SMA’s H5 ✓ During the zero voltage state ✓ During the active state, it induces a
P decouples the PV array from high frequency component in the
S5
the grid 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒
LA ✓ 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 is minimum ✓ High conduction losses
S1 S2
PV
Cdc Vg
Array
LB
N S3 S4
Fig. 7. H5 inverter
H6 DC ✓ Employs two symmetrical ✓ Increase in conduction losses
P blocking switches ✓ Induces 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒
S5 ✓ Switches shares the
S1 S2 L1 switching losses
A
PV
Cdc Vg
Array B
S6 L2
S3 S4
N
Fig. 8. H6 DC
S5 S6
N
Fig. 9. H6 AC inverter
Sunway’s HERIC LA ✓ CMV does not change ✓ In the 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 , there will be a high
✓ The amount of the ground frequency component
P
𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 is insignificant ✓ Due to the usage of a cascaded
✓ Decoupling prevents DC-DC converter, efficiency is
S1 S2 S5
𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 from flowing in the low at low PV voltage
PV
Vg zero state
Array
Cdc
S3 S4 S6
N
LB
Fig. 10. HERIC AC inverter
iH5/oH5 ✓ CMV is stabilized ✓ Ground current is more than H6
+ ✓ The capacitor voltage ✓ CM characteristics is worse than
S5
follows the grid voltage H6
C1 S1 S2 containing no high
S6 L1
frequency content
A
PV
Array
C0 Vgrid
B
C2 L2
S3 S4 0
-
Fig. 11. iH5 topology
H5-D + ✓ Constant CMV ✓ Using the same electrical
✓ Favored CM current characteristics and power
C1 suppression switches, the CM current is only
S1 S2 L1 around one-third of what it is in
A the H5 topology
PV
Array
D1 C0 Vgrid ✓ The THD is quite high
B
L2
C2 0
S3 S4
-
S5
Fig. 12. H5 D topology
Ingeteam’s H6 ✓ Reducing the switching ✓ Higher conduction losses
P losses ✓ Low efficiency at low PV voltage
S5
Cdc1 D1 LA ✓ Higher efficiency due to use of cascaded DC-DC
S1 S2
✓ CMV is stabilized converter
PV Vg
Array
D2 LB
Cdc2
N S3 S4
S6
Fig. 13. Ingeteam's H6 topology
iHERIC + ✓ CMV is stabilized ✓ Sacrificing the supremacy of RMS
✓ The capacitor voltage is and peak 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 value
S1 S2
governed by the grid
L1
A
voltage, which has no high
C1
frequency content
S7 S6
PV
Array
C0 Vgrid
S5
C2
B
L2 0
S3 S4
-
Fig. 14. iHERIC topology
HERIC Active By modifying and increasing the arrangement of ✓ 𝑖𝑐𝑚 is constant and low ✓ Short through issue
1/2/3 semiconductor devices ✓ Dead time requirement
Superjunction P
S4
✓ The high EU and peak ✓ Bulky coupled inductors are used
MOSFET-based D9 efficiencies ✓ Inductor loss per unit volume is
L2
NIIFBC Cpv1 Cdc1
A ✓ At grid voltage zero high
Cf Vg
D8 B crossings, no dead time is ✓ Temperature rise in core is
PV F required concerned
Array S1 D7 S6
S2 ✓ No reverse recovery
L1
C S5
Cpv2 Cdc2 D
E
S3 D10
N Leakage current
measureing point
Topology Semiconductor No No 𝒊𝒄𝒎 CMV Passive Filter o/p Reported Reported Cost Reported
Name Devices of of (mA) (V) Level PF THD Efficiency
No. of No. of C L No.of No. of (%) ƞ (%)
IGBT Diode C L
Half Bridge 4 2 3 0 ≈0 Constant 1 1 3 0.8 2.1 ++ 97.2@0.5kVA
[4]
Karschny’s 5 2 2 1 ≈0 Constant 1 1 3 Unity N/A ++++ N/A
[7]
Flying 4 1 2 0 ≈0 Constant 1 1 3 0.85 <2 ++ 99.25@1kVA
Capacitor[8]
Bipolar Full 4 0 1 0 ≤ 55 199 to 201 1 2 2 Unity NA + 95.2 @ 5kVA
Bridge[9]
Unipolar Full 4 0 1 0 ≤ 1800 200 to 400 1 2 3 Unity NA + 98.0 @ 3 kVA
Bridge[9]
H5 [10] 5 0 1 0 ≤ 200 159 to 235 1 2 3 Unity N/A ++ 98.5@ 0.5 kVA
H5-D [11] 5 1 2 0 ≤ 50 185to 195 1 2 3 Unity 4.888 ++ 95@650 VA
HERIC [12] 6 0 1 0 ≤ 200 165 to 235 1 2 3 Unity N/A ++ 97.1 @ 2 kVA
HERIC AC 6 2 1 0 ≤ 200 165 to 236 1 2 3 Unity N/A +++ N/A
based [12]
HERIC 7 2 2 0 ≤ 25 199.93 to 1 2 3 N/A N/A ++++ N/A
Active 1 [12] 200
HERIC 7 0 2 0 ≤ 25 199.96 to 1 2 3 N/A 1.7 ++++ 97 @ 2 kVA
Active 2 [12] 200
HERIC 6 4 2 0 ≤ 25 199.91 to 1 2 3 Unity N/A ++++ N/A
Active 3 [12] 200
H6 [13] 6 2 1 0 ≤ 25 150-250 1 2 3 0.95 4.6 ++ 97.31@3.68kVA
iH5/oH5 6 0 2 0 ≤ 20 199.89 to 1 2 3 Unity N/A ++ 96.9 @ 1 kVA
[17] 200
Ingeteam’s 6 2 2 0 ≤ 25 150 to 265 1 2 3 Unity <3 ++ 97.6@5kVA
H6 [19]
The higher the cost, the more "+" there is: + low, ++ medium, +++ high, and ++++ extremely high. "C" stands for Capacitor,
"L" for Inductor, "PF" for Power Factor, and "THD" for Total Harmonic Distortion in the table above.
TABLE III : SUMMARY REPRESENTING RECOMMENDED TOPOLOGY AMONG MAJOR CATEGORIES OF 1Ø TRANSFORMERLESS INVERTER TOPOLOGIES
Mid-Point Clamping ▪ Constant CMV ▪ Increased complexity Large Medium HERIC Active 2
▪ Low 𝑖𝑐𝑚 ▪ More semiconductor
devices
AC-Decoupling ▪ Conduction losses are minimal ▪ Extra switches are needed Medium High HERIC
▪ The antiparallel diodes of F-B do not ▪ 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 in the residual line
allow output current to pas frequency
▪ Lower THD
DC-Decoupling ▪ A DC bypass switch is used to isolate ▪ Conduction losses are high Medium Medium H5
PV from the grid ▪ Unbalanced switching
▪ Additional equipment
required
IV. CONCLUSION conclusion to this review, Table III explores the several
major 1Ø transformerless inverter categories with their
A brief overview of 1Ø grid tied PV features and downsides, as well as suggesting the optimum
transformerless inverter system is offered, as well as the topology for each category.
main challenges that transformerless inverters confront. The
benefits and drawbacks of different GPV transformerless Only PV parasitic capacitance is taken into account
topologies are discussed. The properties of topologies are while assessing the leakage current mechanism of grid-
contrasted and described explicitly. Since of its low connected topologies. Further investigation can be
cost/weight and high efficiency when compared to 1Ø conducted by taking into account the effect of parasitic
inverters with galvanic separation, 1Ø transformerless PV capacitance value along with stray capacitance of the PV
inverters have received a lot of attention. The final system. In addition to switching and conduction losses for
optimized strategy must be able to construct an elegant and switching devices, passive component losses can be
cohesive grid tied PV system as per the metrics included.
customization of individual system components. As a
REFERENCES
[1] IEA (2021), Global Energy Review 2021, IEA, Paris
https://www.iea.org/reports/global-energy-review-2021
[2] Dr. Chetansingh Solanki, “Solar Photovoltaic’s Fundamentals
Technologies and Application” 2nd edition, 2011
[3] Karuppusamy, P. "Design of Inverter Voltage Mode Controller by
Backstepping Technique for Nonlinear Power System Model."
Journal of Electrical Engineering and Automation 3, no. 4 (2021):
265-276
[4] S. L. Kuo, "Half-bridge transistor inverter for DC power
conversion," IEEE Trans. Ind. Electron. Control Instrum., no. 4, pp.
249-253, 1974.
[5] A. Nabae, I. Takahashi, and H. Akagi, "A new neutral-point-
clamped PWM inverter," IEEE Trans. Ind. Appl., no. 5, pp. 518-
523, Sept.-Oct.1981.
[6] Y. P. Siwakoti and F. Blaabjerg, "Common-Ground-Type
Transformerless Inverters for Single-Phase Solar Photovoltaic
Systems," IEEE Trans. Ind. Electron., vol. 65, no. 3, pp. 2100-2111,
Mar. 2018.
[7] D. Karschny, “Flying inductor topology,” German Patent DE 19 642
522C1, April, 1998
[8] Y. P. Siwakoti and F. Blaabjerg, "A novel flying capacitor
transformerless inverter for single-phase grid connected solar
photovoltaic system," 7th IEEE Int. Symposium on Power
Electronics for Distributed Generation Systems (PEDG), Aug. 2016
pp. 1-6.
[9] X. Xu, M. Su, Y. Sun, B. Guo, H. Wang and G. Xu, "Four-Switch
Single-Phase Common-Ground PV Inverter with Active Power
Decoupling," in IEEE Transactions on Industrial Electronics, pp. 1-
5, 10 March 2021.
[10] A. Algaddafi, K. Elnaddab, A. Al Ma'mari and A. N. Esgiar,
"Comparing the Performance of Bipolar and Unipolar Switching
Frequency to Drive DC-AC Inverter," International Renewable and
Sustainable Energy Conference (IRSEC), pp. 680-685, 2016
[11] “SMA Sunny Boy 5000TL - Datasheet,” http://www.sma-america-
.com , accessed: Jan 02, 2020.
[12] B. Yang, W. Li, Y. Gu, W. Cui and X. He, "Improved
Transformerless Inverter With Common-Mode Leakage Current
Elimination for a Photovoltaic Grid-Connected Power System," in
IEEE Transactions on Power Electronics, vol. 27, no. 2, pp. 752-
762, Feb. 2012
[13] Kayalvizhi, S., K. Senthil Kumar, M. Sindu, and S. Muminthaj.
"Hybrid Cascaded Inverter-Based Integrated Hybrid Power Supply
Using Nonconventional Energy Sources." Journal of Electrical
Engineering and Automation 4, no. 3 (2022): 129-143
[14] L. Zhang, K. Sun, Y. Xing and M. Xing, "H6 Transformerless Full-
Bridge PV Grid-Tied Inverters," in IEEE Transactions on Power
Electronics, vol. 29, no. 3, pp. 1229-1238, March 2014
[15] Yu, W., Lai, J. J., Qian, H. and Hutchens, ‘High efficiency MOSFET
inverter with H6-type configuration for photovoltaic nonisolated AC
module applications’, IEEE Trans. Power Electron., 2011, 4, (26),
pp. 1253–1260
[16] San, G., Qi, H., Wu, J. and Guo, X.: ‘A new three-level six-switch
topology for transformerless photovoltaic systems’, Proc. IPEM ’
7th onf., pp. 163-166, 2012
[17] B. Gu, J. Dominic, J. Lai, C. Chen, T. LaBella and B. Chen, "High
Reliability and Efficiency Single-Phase Transformerless Inverter for
Grid-Connected Photovoltaic Systems," in IEEE Transactions on
Power Electronics, vol. 28, no. 5, pp. 2235-2245, May 2013
[18] H. Xiao, S. Xie, Y. Chen, and R. Huang, “An Optimized
Transformerless Photovoltaic Grid-Connected Inverter,” IEEE
Trans. on Ind. Electron., vol. 58, no. 5, pp. 1887–1895, May 2011
[19] H. Xiao and S. Xie, “Leakage Current Analytical Model and
Application in Single Phase Transformerless Photovoltaic Grid-
Connected Inverter,” IEEE Trans. on Electromagn. Compat., vol.
52, no. 4, pp. 902–913, Nov 2010
[20] C. Anandababu and B. G. Fernandes, "Neutral Point Clamped
MOSFET Inverter With Full-Bridge Configuration for Nonisolated
Grid-Tied Photovoltaic System," in IEEE Journal of Emerging and
Selected Topics in Power Electronics, vol. 5, no. 1, pp. 445-457,
March 2017
1
Department of Health Studies, Astria Learning Consortium of Universities, 100 S. Ashley Drive Suite 600, Tampa, FL
33602, USA, gilbert@astrialearning.org
2
Department of Biomedical Engineering,Vel Tech RangarajanDr.Sagunthala R&D Institute of Science and Technology
(formerly known as VeltechDr.RR& Dr.SR University), Chennai-62,Tamilnadu,India,Dhanasonyj@veltech.edu.in
3
Department of Mechanical Engineering,KoneruLakshmaiah Education Foundation,Vaddeswaram 522302, Andhra
Pradesh, India,snpadhi333@gmail.com
4
Department of Computer Science and Engineering,Velalar College of Engineering and Technology, Erode – 638012,
Tamil Nadu,India,kayalvilis@gmail.co m
5
Department of Information Technology,KCG College of Technology Karapakkam, Chennai, Tamil Nadu 600097,
India,scloudin@kcgcollege.com
6
Department of Computer Science,BanasthaliVidyapith, Banasthali-304022,Rajasthan, India,kuashok@banasthali.in
3 RBBB 1651
A. Data
For this study, we investigated genuine ECG signals
from the MITDB [9]. The MITB contains roughly 48 hours
of records. Each file consists of the two-channel
ECG recordings of 47 individuals. Data is captured
automatically at a rate of 360 samples per second per
channel. Originally, this dataset was annotated with 16
unique rhythm categories. A total of five types of cardiac
4 PAC 2116
rhythms are chosen for investigation in this paper: Normal,
Left Bundle Branch Block (LBBB), Right Bundle Branch
Block (RBBB), Atrial Premature Beats (AP), and Premature
Ventricular Beats (PVC). The MITDB sample signal count,
signal type, and signal count are all listed in Table 1. In the
proportion of 7:2:1, the complete dataset is separated into
three parts: train, validate, and test.
5 PVC 3418
T able 1.ECG data details
B. Pre-process
The original ECG signal undergoes pre-processing.
2 LBBB 4126 After the Pre-Processing step is completed, the true features
of the ECG signals are computed. The steps followed before
the analysis of this study are detailed in greater detail below.
To compare how well the SVM algorithm does with achieves scores of 84.75% and 94.79% for normal ECG data.
balanced and unbalanced ECG data, see table 3. SVM's SVM can obtain precision values of 89.31% and 90.92%
accuracy is 88.34% on imbalanced ECG data and 90.95% on when applied to imbalanced and balanced ECG data,
balanced data. Accuracy is followed by a focus on specificity respectively. The final step is to determine the F1score,
and sensitivity. Precision and accuracy on imbalanced ECG which in this case yields a figure between 90.59% and
data are 82.75 % and 91.91%, respectively. SVM also 92.82%. Finally, a line graph is used to display the data.
In Table 4, we can see the differences in the NN data, respectively. The F1-score, which can be calculated
algorithm's performance on balanced and unbalanced ECG from steps two and three, is in the range of 92.15–93.81%. A
data. NN achieves 90% accuracy on skewed ECG data and line graph is then used to display the data. The NN
92.01% accuracy on normalized data. Specificity and performance value for the two types of ECG data is shown in
sensitivity are now prioritized over accuracy. Precision and red and cement, respectively, in Figure 5. The cement graph
accuracy on imbalanced ECG data are 84.84% and 93.02%, is superimposed on the red one. Support for the claim that
respectively. NN gets between 87.87% and 94.32% accuracy ML model efficiency is enhanced by employing the SMOTE
with normal ECG data. NN can reach 91.30% and 93.31% methodology.
accuracy when applied to imbalanced and balanced ECG
Then the analysis helps to know the importance of T echniques. J. Clin. Med. 2021, 10, 5450. https://doi.org/10.3390 /
jcm10225450
data balancing in accuracy enhancement. From the result, we
[2]. McNamara, K., Alzubaidi, H., and Jackson, J. K. (2019).
found that the balanced data metrics value will be high for Cardiovascular disease as a leading cause of death: how are
arrhythmia detection. Next, the best model is identified by pharmacists getting involved? Integr. Pharm. Res. Pract. 8:1. doi:
comparing all three algorithms. The NN model with data 10.2147/IPRP.S133088
[3]. Yin, W., Yang, X., Zhang, L., and Oki, E. (2016). ECG monitoring
after SMOTE gives the highest accuracy. system integrated with IR-UWB radar based on CNN. IEEE Access
4, 6344–6351. doi: 10.1109/ACCESS.2016.2608777
[4]. P. Shimpi, S. Shah, M. Shroff and A. Godbole, "A machine learning
IV. CONCLUSION approach for the classification of cardiac arrhythmia," 2017
International Conference on Computing Methodologies and
Major global health concerns include cardiovascular Communication (ICCMC), 2017, pp. 603-607, doi:
disease. The ECG is indispensable in the early detection of 10.1109/ICCMC.2017.8282537.
cardiac arrhythmia. Manually diagnosing arrhythmias, which [5]. H. Dang, Y. Yue, D. Xiong, X. Zhou, X. Xu and X. T ao, "A Deep
Biometric Recognition and Diagnosis Network With Residual
are abnormal changes of the normal heart rhythm, take a lot Learning for Arrhythmia Screening Using Electrocardiogram
of time and relies on the expertise of clinicians. Visually Recordings," in IEEE Access, vol. 8, pp. 153436-153454, 2020, doi:
identifying the ECG signal is difficult and time-consuming 10.1109/ACCESS.2020.3016938.
[6]. E. Essa and X. Xie, "Multi-model Deep Learning Ensemble for ECG
because experts in the medical field are so scarce. Detection Heartbeat Arrhythmia Classification," 2020 28th European Signal
of arrhythmias using ML is performed to address this issue. Processing Conference (EUSIPCO), 2021, pp. 1085 -1089, doi:
We have processed the ECG data we obtained from MITB to 10.23919/Eusipco47968.2020.9287520.
remove noise. First, the signal is balanced using the SMOTE [7]. V. V. Priya, M. Santhiya, P. Subadharshini and S. P. M. Vasini,
"Classification of Arrhythmia Disease using Machine Learning
processing technique, then the signal is normalized and
T echniques," 2022 6th International Conference on Computing
denoised to remove noise, then LBP feature extraction is Methodologies and Communication (ICCMC), 2022, pp. 1042-1046,
applied to retrieve relevant features, then a classification doi: 10.1109/ICCMC53470.2022.9753718.
model is used to detect arrhythmias from an ECG, and [8]. M. Barišić and A. Jović, "Cardiac Arrhythmia Classification from 12-
finally, the model is validated so that the most effective lead Electrocardiogram Using a Combination of Deep Learning
Approaches," 2022 45th Jubilee International Convention on
method can be selected. As can be seen from the results, the Information, Communication and Electronic Technology (MIPRO),
NN model trained on SMOTE data produces superior results, 2022, pp. 1489-1494, doi: 10.23919/MIPRO55190.2022.9803539.
with an accuracy of 92.01%, a specificity of 87.87%, a [9]. Moody, G.B.; Mark, R.G. MIT -BIH Arrhythmia Database. 1992.
Available online: https://physionet.org/content/mitdb/1.0.0/ (accessed
sensitivity of 94.32%, and a precision of 93.32%, and an F1- on 5 February 2020).
score of 93.81%. [10]. Yang, Meixue& Liu, Bin & Zhao, Miaomiao& Li, Fan & Wang,
Guoqing& Zhou, Fengfeng. “ Normalizing Electrocardiograms of
REFERENCES Both Healthy Persons and Cardiovascular Disease Patients for
[1]. Sraitih, M.; Jabrane, Y.; Hajjam El Hassani, A. An Automated Biometric Authentication”. PloS one, vol. 8, pp. e71523, doi:
System for ECG Arrhythmia Detection Using Machine Learning 10.1371/journal.pone.0071523.
Abstract
Research on multicore architecture for automotive The Introduction of multi-core architecture has
safety applications is the aim of the ECU group in order to
given this issue contemporary significance. The most
adhere to strict speed and reliability requirements for real-
time embedded systems. The architectural methodology used common metrics used to compare various scheduling
by the automobile industry to create car electronics systems strategies are the make span, processor utilization, cache
has to be changed. by incorporating more functionalities into a quality, energy usage, load balance, planning constraints,
smaller number of ECUs (Electronic Control Unit). In and transition price. [1]. Some of its primary advantages
Software applications, the design, improvement, and over competing technologies include electrical isolation of
substantiation are more complex due to these new inputs and outputs, multiple Controller Area Network (CAN)
characteristics. As a result, producers in the automotive sector buses, two CAN buses, a serial port, outputs with current
need effective tools and design approaches to meet their feedback, and a cheaper total cost. Validation tests were run
objectives in a variety of areas. With the intention of uniformly
to ensure that all functionality was present. To evaluate the
distribute the CPU burden with respect to time, the challenge
of sequencing an unlimited number of runnables on a finite ECU's performance in a real-world working environment, an
number of different cores are addressed in this work. electric car simulator was also created [9]. The black box
Additionally, for both synchronous and asynchronous technology improves the development of longer-lasting,
workloads, runnables offset will be calculated issued on each safer vehicle transportation, which boosts the care given to
core using the Engine RPM. Furthermore, it effectively collision victims. With the use of a car black box system, the
exploiting Intertask communication between many Multicore fatality rate can be decreased. The system logs the vehicle's
ECUs to speed up the many runnables execution. In order to primary driving information and uses LabView software to
overcome timing constraints on run time, the TIMMO-2- evaluate the incident. This allows for a quick and accurate
USE (TIMing MOdel - TOols, Languages, Algorithms, USE
Cases, and Methodology) project is really putting its actual
analysis of the accident following a collision [2]. Long time
research on time modeling and analysis for embedded shutting down the vehicles creates unsophisticated
automotive systems to use. environment inside the vehicle for drivers [18]. The actual
Index terms: Automotive, Scheduling, software update is included in a delta file, which is used in
Runnables, TIMMO2-USE (TIMing MOdel - TOols, the proposed design. The software modules that require
languages, algorithms, USE cases, and methodology), updating are launched from this delta file, which is stored in
Load matching. the expanded RAM. The module is updated in the current
programme after being successfully executed from the delta
I. INTRODUCTION file. The suggested ECU design enables owners to enjoy
significant car functions while updating their ECUs [6].
In the automotive industry, the usage of Major tasks in the automotive industry include improving
multisource software on a single electronic control unit security features and upgrading the ECU software. The time
(ECU) is becoming more and more common. This required to update the ECUs increases as the number of
circumstance is one of the main reasons why automakers improvements rises. The amount of the data update affects
aim to decrease the scores of ECUs, which augments to how long it takes to update the programme. This document
about 70 for advanced model in automobiles. A significant provides an overview of ECU reprogramming, as well as
area of research in high speed computing is multiprocessor information on various reprogramming techniques, the delta
job scheduling. It is an NP-Complete issue to determine the reprogramming method and its benefits, and ECU
best way to distribute a collection of real-time jobs that may communication [3].The "Each ECU performs single
be given to processors without going over the allotted time. function" representation to more centralized architectural
designs will be made possible by the Architecture II. AUTOMOTIVE PLANNING AND
(AUTOSAR) programme and, in particular, its operating ALLOCATION
system (OS)[5]. Another significant problem facing the
automotive sector is that chip manufacturers are no longer in 2.1 Mechanism for Scheduling
a position to cost-effectively match the rising performance High performance computing main research focus
demands through frequency scaling alone. This circumstance is multiprocessor task scheduling. A set of software
is one of the factors influencing the gradual use of Multicore modules called as runnable should be distributed and
ECUs in the automobile industry. By running on several assigned on each processor at run time in order to steadiness
cores where the software formerly ran on multiple ECUs, the workload on the CPU without exceeding the deadlines.
Multicore architectures' greater degree of performance may To prevent run-time issues, runnables are assigned
contribute to the simplification of in-vehicle systems. explicitly (i.e., by dividing up) on each separate core.
Automobile manufacturers may exploit this potential shift
toward more centralized designs as an opportunity to reduce 2.2 Priority-Based Fixed Scheduling
the scores of network associations and buses. Therefore, A task's priority is specified once and never altered
some of the complexity that was formerly a part of the while utilizing fixed-priority scheduling. For scheduling
electrical/electronic architecture will be incorporated into the systems with recurring workloads on comparable
ECUs [4]. However, a functionally accessible ECU may multiprocessors, a novel fixed-priority method is suggested.
easily add new features thanks to fixed priority preemptive On processors with m units of capacity, this computation
scheduling. In reality, generalist auto manufacturers' markable use is (m+1)/2. Because no fixed-priority
widespread usage of ECUs and accessible sub networks technique for scheduling periodic task systems on
makes it difficult to make necessary architectural changes. In comparable multiprocessors can have an actual utilization
order to accomplish effective product development in greater than (m+1)/2, this approach is the best one that can
software firms, a hybrid ant colony optimization model for be devised in terms of achievable utilization [8].
dependable software automation is needed.[14].
Conventional cars produce greenhouse gas emissions and 2.3 Preemptive scheduling with preset priorities
contribute to environmental pollution in the transportation Resources are distributed among parties making
sector [20]. The renewable energy allocation vector is concurrent and asynchronous requests for them using
obtained via the best time constraint method, which lowers algorithms employed in scheduling fields. Scheduling
energy costs for each BS during each time slot [21]. algorithms are mainly made to avoid resource shortages
The combinatorial issue of selecting offsets has a and to guarantee impartiality among the parties using the
substantially smaller search space according to the sources. Scheduling helps to overcome the challenges of
Audsley's priority assignment [16]. Integer linear calculating the appropriate demand for their resource.
programming (ILP) is used to solve lesser issues of the NP- The automotive industry uses a wide range of scheduling
complete optimum memory mapping problem, while algorithms. In this case, fixed priority preemptive
heuristics are used to practically solve larger ones. Our flash scheduling is used. Every method has a defined priority
memory mapping approaches cut runtime by up to 8.73% rank determined by the operating system, and the
when caches are deactivated and by up to 2.76% when scheduler prioritizes the processes before adding them to
caches are enabled, according to tests on dual-core ECU the ready queue. Lower priority processes that are
hardware. In addition, the advantage of using the ILP arriving are halted after higher priority processes. Both
method for RAM is 50.48% more than using global RAM to overhead and its importance are present. FPPS does not
store all the variables [12]. The real outcomes of the typically outperform FIFO scheduling in terms of
TIMMO-2-USE project, a temporal modeling and analysis throughput. Any runnables waiting and response times
effort for embedded automotive systems. One outcome is are based on the process's priority. Waiting and response
the Timing Augmented Description Language (TADL2), times are acceptable for higher priority operations. The
which has the ability to represent symbolic time preemptive process scheduling algorithm is called Round
expressions, provide probabilistic timing data, and apply Robin. Each process is given a set amount of time to do
timing restrictions to mode definitions [13]. The project's its work, known as a quantum. Once a process has run for
primary objectives, namely the development of novel a predetermined amount of time, it is preempted and
languages, algorithms, tools, and a methodology for the another process runs for the remainder of that time. State-
development of automotive embedded systems that is saving for preempted processes is accomplished by
supported by use cases, are encapsulated in the acronym context switching.
TIMMO-2-USE, which expands TIMing MOdel - TOols, The focus of this study is on fixed priority
languages, algorithms, USE cases, and methodology. By proactive scheduling tasks in real-time systems with strict
offering suitable protective mechanisms, the Automotive constraints. We focus more on offset-free tasks where the
Open System gives better performance. The round robin scheduling protocol can choose the offset. A task
scheduling as part of an integrated task scheduling and SPM assignment with number of occurrences n, equal to T1,
partitioning strategy to speed up the execution of embedded T2,... Tn, defines the system model. Every Ti requests,
programmes [19]. referred to as instances, have relative deadlines Di and Ci
for their execution. Which together make up the quadruple and operating systems. Many people now consider the
(Ci.Ti,Di,Oi) that characterises a periodic task T1. Two OSEK/VDX operating system to be the open standard. This
consecutive instances of Ti are separated by Ti time units standard was created primarily to prevent incompatibility
(hence Ti is the task's duration in time.). At time Oi, Ti issues between the application code and the hardware and
appears for the first time (the task offset in the following). If divorce the application code (algorithm) from network
every instance completes before its deadline, the system is management responsibilities. The use of OSEK/VDX
said to be schedulable. It follows that the system can be should make software more portable, reused, and capable of
planned in all asynchronous circumstances if it can be conventional system performance. It is projected that the
scheduled in synchronous circumstances and decides on a OSEK operating system will soon be used in the automobile
practical offset from the engine's rpm [7]. To properly load sector.
balance a system, this is usually done.
3.2 TIMMO-2-USE
Functionality timing restrictions cannot be
adequately defined by deterministic timing constraints. To
provide the ability to express and test probabilistic temporal
restrictions, this use case aims to enhance the TIMMO-2-
Fig 1. The Runnables' model. USE language, methodology, and tool environment with
An instance of a runnable must be used up after it fixed priority proactive scheduling. It must be feasible, in
has been released in order for the subsequent instance to particular, to characterize the probabilistic temporal
be released (i.e., the timeframe is the deadline.) are characteristics of events and event chains. For instance,
shown in the figure 1. An algorithm for scheduling must 99% of the time, an event chain’s end-to-end latency must
be able to multitask (run many processes at once) and be less than 10 ms [13]. Of course, existing techniques and
multiplex (transmit numerous flows simultaneously) with tools for temporal constraint analysis need to be modified.
a discernible success rate [7]. For instance, the schedulability test can’t only give a result
of true or false. The response should be probability of the
III. ALGORITHM FOR ALLOCATING RUNNABLES schedulability.
3.1 Algorithm Intricacy
The increasing complexity of car electronic
systems has had a considerable influence on the speed
demands and peripheral connectivity of automotive
embedded systems. The outputs of several actuators are
controlled by algorithms, which manage the inputs from
numerous sensors and communications networks. An OS
operation called process scheduling arranges processes in
various stages, such as ready, waiting, and operating are
shown in the figure 2. An OS can assign a period of time for
each process’s CPU execution through process scheduling.
The fact that a process scheduling mechanism keeps the
CPU active at all times is another crucial benefit. You may
do this to get programmes to respond as quickly as possible. Fig 3. The Run Time Behavior
The application layer is separated from the core
programme by the Runtime Environment (RTE). It
implements the data interchange and manages the
application layer’s runtime behavior and prevent runtime
issues. Individual software components are used to
implement the automation framework of the ECU in the
application layer and are shown in the figure 3. The six jobs
that make up the TIMMO-2-USE Generic Method Pattern.
There are “Define Timing Requirements,” “Develop
Solution,” “Transform Timing Requirements,” “Find,”
“Analyze,” “Verify and Validate,” and “Timing Properties”
are all steps in the process. These tasks are generally carried
out at every level of abstraction. EAST- ADL. Each level of
abstraction is handled at the Analysis, Design,
Implementation, and Vehicle Administrative Levels since
Fig 2. The Scheduler Processes.
the TIMMO-ADL and the EAST-ADL. To define every
The majority of operating systems are developed
internally by application experts, however the industry is degree of abstraction by a step in usage. Actually, there are
swiftly moving toward standardized network architecture just two: The vehicle’s first start-up is the first exception.
“Timing Requirements” is a formal, phased-in work product 4.2 Scheduling ECU performances for automobiles
that is inaccessible. The “Specify Timing” work during the Reaching the schedulability bound in both
operating phase Conditions at the completion of the second harmonic and non-harmonic instances is the goal. We
exception “is. No matter what process is presently running, measure the algorithm’s success rate precisely at load levels
the vital processes are permitted to access CPU when they to guarantee that it will work in harmonic circumstances as
enter the ready queue, making preemptive scheduling a well. The performances of algorithms are shown in the table
highly adaptable in TIMMO-2-USE algorithm as well. 1 and 2.
Typically, it maintains the ready queue and changes the
process’s ready status to running state and vice versa. PERFORMANCE OF ALGORITHM:
Preemptive scheduling is preferable to non-preemptive Table.1 Scheduling Performance
scheduling, and its effectiveness depends on how well CPU Hit rate of Processor
usage and average waiting times for processes are managed WCET=600µs
Algorithm Load in %
during scheduling. In order to forecast and assess risk, this
research suggested the DCNN-HAO (Deep Convolutional Hit rate % of LL 89 14
Neural Network-Hybrid Aquila Optimizer) technique [17]. Hit rate % of LP 92 14
Hit rate % of LPσ 93 12
IV. RESULTS Hit rate % of LC 96 11
Hit rate of
4.1 Performance Matching 98 9
TIMMO-2-USE
In this work, we assess how well the TIMMO-2-
USE algorithm for uniformizing CPU load function over
time, consistently providing the simplest answer even under Table.2 Time Modeling Response
extremely demanding load conditions and time response Time TIMMO-
from other algorithms like Least Loaded(LL), Least (µs) LL LP LPσ LC 2-USE
Peak(LP),. Least Peak sigma(LPσ) and Least Crowded(LC) T1 4.5 4.3 4.1 3.7 3.6
are shown in the figure 4 and 5 respectively.
T2 4.6 4.5 4.25 3.4 3.3
T3 5 4.6 4.1 3.2 2.8
Distribution of the load percentage with T4 5 4.4 4 2.8 2
Cores
15 CPU load in V.CONCLUSION
Load Percentage
10 %
Comparatively a single CPU that is constantly
5 Cores being developed faster, multicore CPUs provide higher
advances in computational capability. In order to achieve
0 this, we integrate more functions onto a single processor,
resulting in an effective sharing of Runnables throughout
the CPU during run time. Reducing the digit of ECUs gives
Algorithms us many more technical and financial advantages when
manufacturing new fashionable cars. The mission creates a
multicore ECU with high-performance that is capable of
Fig.4 Load Percentage with Cores carrying out multiple operations simultaneously without
encountering any conflicts between synchronized and non-
6 synchronized processes or offset issues.
Time Modeling Response
References
Response
4 LL
LP [1] ”A Survey on Real Time Task Scheduling” European Journal of
Scientific Research ISSN 1450- 216X Vol.69 No.1 (2012),
LPσ
2 pp.33-41 © EuroJournals Publishing, Inc. 2012 by G. Umarani
LC SrikanthA. P. Shanthi ,V. Uma Maheswari ,Arul Siromoney .
TIMMO-2-USE [2] “Design of Electronic Control Unit with Black Box for Ground
0 Vehicles”, Manojkumar Palanisamy; Dheepanchakkravarthy.
Azhagesan; Balaji Varadharaian; Sathish Kumar, 4th Biennial
T1 T2 T3 T4 International Conference on Nascent Technologies in Engineering
Time in µs (ICNTE),2021.
[3] “Automotive Electronic Control Unit Reprogramming Using
Delta Method-A Review“,Adithi Prasad; P. Shanthi,by Asian
Conference on Innovation in Technology (ASIANCON),2022.
Fig.5 Time Modeling Response [4] “Multisource Software on Multicore Automotive ECUs—
Abstract—In the recent past researchers are working on sensor by the functionality. Performance of the design depends
different designs of biomedical equipment to measure various on the accuracy of the inputs applied to laminar flow. The
health parameters. People are more stressed due to their routine concept of coagulations is measured by MEMS module at the
lives due to their work environments. Therefore, they suffered second stage of heart attack by placing MEMS with stent. As the
with health issue such as heart stroke and so on. This research size of stent is also in millimetres[3-4]. it is feasible to attach the
article designated in the article is to design an electronic model to MEMS sensor with the stent.
measure health parameters. Pressure and velocity across the veins
are treated as inputs and their respective results as outputs. While II. DESIGN OF VEINS BASED MODEL
veins are expanding and contrasting when pressure and velocity of
the blood is varied, this is due to stress and exercise etc. The major a. Laminar flow in veins analysis:
parameters in detecting the laminar flow are pressure and The detailed description of flow analysis is explained for a
velocity. The primary objective is to model a veins in different single vein in laminar flow in fig 1 with the straight veins
shapes. Second objective is to analysis of flow measurements structure. At inlet (position1) pressure is more comparatively
pressure and velocity of blood cross it. The third objective is to than the outlet (position 2). pressure applied at the inlet 1 is 0.09
detect blockages of artery due to fatty and cholesterol containing
Pascal’s and this pressure goes on decreasing to -5.48 x 10-3
deposits build up over time. The final objective of the design is to
Pascal’s at outlet.
describe the working principal of digital stethoscope and wrist
band to measure the health parameter of heart through blood
pressure. Digital Stethoscope principle depends on piezoelectric
effect, generates electrical signal when pressure is applied from
veins of the body. Accuracy, functionality, and Performance of the
design can be analyzed using COMSOL Multiphysics. MEMS is
used in real time applications to alert heart stroke, Bionic eye and
automotive electronics etc.
I. INTRODUCTION
Most of the environments now a days are highly pressurized
to get the most effective throughput. Due to this, many young
working professionals are ill-health in their early stages, which
leads to heart stroke in the long run. Micro electromechanical
system (MEMS) is a miniaturized device with a combination of
electronic features inbuilt on a mechanical structure. The
primary functionality of MEMS can act as a switch and can also
perform as a transducer. The MEMS sensor consists of a mass
suspended between two capacitive plates, where the suspended
mass makes a difference within the electric potential. The size
of MEMS ranges from micro to millimetres [1]. The advantage
of MEMS sensor model is tiny in size and applicable for all types Fig.2 Velocity measurements
of portable and consumable applications. Some of the other
applications that includes flow measurement, heartbeat, blood
pressure etc. The values across the veins operated under different
degrees from the designed model. Simulation and verified under
laminar flow and analysis of the design being done useful alert
in case of heart stroke[2]. Pressure and velocity of veins are
analysed by incorporating valves across the veins. Laminar flow
of blood in veins are captured by MEMS-based piezoelectric
Fig 2 describes the blood pressure across the vein. Under Partially open path:
high pressure, velocity is more at centre than the outer surface a. L-Type veins analysis -Fully open in L-Shape:An L-
of walls of the vein. Fig 3 indicates the velocity measurement shaped Vein is taken for analysis, changes in pressure for 50%
of internal view of blood inside the veins.
open state. The changes that happen when blockages occurs are
shown below.
When a path changes due to change in type, the pressure will At the boundaries the velocity is less, than at the center and it
also get affected [6].The velocity increases when a blockage could change only when any coagulation occurs in middle of
comes in the middle of laminar flow of blood inside the vein. the flow.
The changes that happened when a vein is fifty percent closed is
clearly visible in the Fig 7. Red marked colour indicates in Basic design of U-typed veins with two blockages in the path.
increased velocity. The above design is the view before mesh analysis and it’s the
view after the geometry has got finished. The pressure applied
was 0.09 Pascal’s at the inlet but when a coagulation makes a
disturbance to the flow, the pressure decreases as showed in
Fig.10
The Velocity in the Fig 13 is more at the center of the inlet but
when a division of the path happened the velocity got reduced.
The main reason for the velocity to reduce is breakage of flow
due to division in path.
50%
0%
Free path L U T
-50%
Fig.20 Velocity at open-end veins.
Fig.18 Electric potential (V) Principal stress
TABLE 2. VELOCITY OF BLOOD PRESSURE
Velocity
open Half close
Veins
Model Min Max Min Max
Free Path 0 0.35 0 0.012
L 0 0.004 0 0.009
U 0 0.0025 0 0.003
T 0 0.0012 0 0.001
Fig 20 describes the pressure measurement at open state
Fig.19 Diastole and Systole for checking inflation values of minimum and maximum for different shapes of the
nerve. Each model is evaluated using comsol Multiphysics.
V. Results & Analysis COMSOL is a Multiphysics simulation tool that is used to
TABLE 1. BLOOD PRESSURE AT DIFFERENT SHAPES OF VEINS evaluate the performance of the design. There is a maximum
pressure at the output node and especially in free path and T-
Pressure shaped model, when compared with other type’s paths.
Open Half close Coagulation effect of veins can be easily identified by blood
Veins velocity, when the shape of the veins are straight and T-shaped
Model Min Max Min Max with laminar its flow detection.
Free path 0.36 19.56 -0.022 19.56 CONCLUSION
L 0.00106 0.09609 -0.0067 0.09609
The Variation in the colours indicates that there is change
U 0.00153 0.09577 0.000404 0.09577 in the pressure and velocity values. These parameters
T 0.00098 0.095706 0.000981 0.00846 provide scope to analyse blockages in veins. The results
gained by simulating different models of the veins are very
close to the real time applications. This research work gives
an advantage in making the real-time analysis of heart and
blood pressure using MEMS. MEMS is an
electromechanical system which has a Gel that protects it
from liquid damages. The piezoelectric effect principal that
has been proved using COMSOL Multiphysics will help in
making a digital stethoscope and a wristband, which is
different from the regular reflecting stethoscope.
REFERENCES
[1] Neeraj, Meenakshi Nawal, Mahesh Bundele, “Pressure and Velocity
Measure in the Pipeline for Leak Detection using COMSOL
Multiphysics”, International Journal of Recent Technology and
Engineering,Volume-9 Issue-1, May 2020
[2] M.A. van Iersel,” Analysis of flow patterns and interface behavior
in simulations of immiscible liquid-liquid two phase-flow in micro
Fig.19 pressure at open-end veins
Abstract—In this paper, we review the role of Fiber Bragg alteration in the fiber’s physical characteristics, such as tem-
Grating (FBG) sensors for temperature monitoring and their perature or strain, alters the grating’s pitch or fiber index,
application in the smart factories. In the first instance, we which alters the Bragg wavelength [7]. A more deduction
present the historical context and fundamental principle of FBG
based sensors. Then, we review of recent development in FBG about the sensing parameters by figuring out the grating’s peak
temperature sensors. We explore the use of FBG sensors in reflectivity wavelength. Another Use of fiber bragg gratings
industry 4.0, specifically in smart factories, and offer a few ideas as wavelength reflectors is a significant application for lasers
that might possibly open up a lot of doors for the development made of fiber [8].
of fiber Bragg grating sensors.
A promising measurement method for upcoming sensor
Index Terms—Fiber Bragg Grating, Optical Sensors, Temper-
ature, Wavelength. system applications in industrial 4.0 and smart factories in
particular is the fiber bragg grating (FBG). The FBG sensor
integration in smart factories has received little attention,
I. I NTRODUCTION
although it is crucial that the FBG is integrated into a typical
The discovery of photosensitivity fiber optics [1] has had smart factory due to its inherent advantages of immunity
a significant impact on the development of telecommunica- to electromagnetic and electrostatic interference,being non
tions and sensor systems technologies, with the effect being corrosive and also not requiring electric power.
leveraged to produce devices for a wide range of applications.
The photosensitivity property of silica fiber doped with ger- II. L ITERATURE S URVEY
manium is commonly used to produce a Fiber Bragg grating
(FBG). The term ”photosensitivity” refers to the increase in The migration of traditional factories to smart factories
the refractive index of certain doped glasses after exposure requires physical parameter monitors. Indeed, it requires the
to ultraviolet (UV) light. As a result, when exposed to UV development of novel sensors for physical parameters mon-
radiation, the fiber’s refractive index of the core changes itoring in hard-to- access locations. In this regard, over the
permanently, depending on the pattern and features of the UV last 10 years, numerous optical sensors based on optical
exposure beam [2-3]. fibers or integrated optical waveguides have been developed
FBG’s have gained popularity in recent years due to their and fabricated. As a potent tool for real-time monitoring of
use in a large wavelength-selective range, allowing them to physical parameters like temperature, pressure, strain, and
be employed in a number of applications. Dispersion cor- humidity, Fiber Bragg Grating (FBG) based sensors have
rection and wavelength-selective devices such as filters for attracted a lot of attention. The key reason for using FBG
wavelength-division multiplexing have been the most promis- sensors in smart factories are immunity to electromagnetic
ing uses in telecommunications. FBG’s have also become interference and radio frequency; compact in size and offer
popular as sensing devices for a variety of applications, multiple sensing to different physical parameters; and ability
including monitoring structures and sensing chemicals [4]. The to be installed at difficult location to reach.
refractive index of the core or the grating pitch changes with Because of essential features like as electromagnetic immu-
any variation in fiber properties, such as strain or temperature, nity, FBGs have garnered a lot of interest for strain,pressure
shifting the Bragg wavelength [5]. and temperature physical parameter monitoring. For example,
FBGs are now widely used as sensing tools for almost in [5] a unique and simple temperature FBG based sensor with
everything from chemical to structural monitoring [6]. Any controlled and improved sensitivity is presented.The suggested
method relies on the application of two metal strips with
African Scientific Research and Innovation Council (ASRIC) various thermal expansion coefficients. It was demonstrated
that when diverse sensing channels are required for multi- III. F UNDAMENTAL P RINCIPLES OF F IBER B RAGG
plexed temperature sensors, the bimetallic architecture has the G RATING T EMPERATURE S ENSORS
potential for a variety of applications.
The underlying idea behind FBG sensors is that measuring
Despite the fact that FBGs frequently refer to permanent
factors like strain, temperature, and force affect how much
refractive index modulation in the fiber core, [6] demonstrated
the Bragg signal wavelength shifts. The sensor sensitivity in-
that the refractive index modulation commonly bleaches when
creases as the grating pitch and core’s refractive index become
exposed to high temperatures. This was done by using FBG
more sensitive to minute changes in the measurand[10]. When
to monitor the temperature in harsh situations. As discussed in
a Bragg grating is present in an optical fiber, the transmission
the previous references, it is evident that optical fiber tempera-
spectra of light with the Bragg wavelength at its center may
ture sensors utilizing FBG are a suitable intelligent distributed
reflect a relatively tiny bandwidth of light. The wavelength
temperature sensor for in-the-moment temperature monitoring.
reflected depends on the period of the Bragg grating and the
Further in [6], a report of high- temperature resistance FBGs
guiding characteristics of the fiber.
produced utilizing hydrogen loaded conventional FBGs for
The physical operation of an FBG sensor is depicted in
developing a simple temperature sensor that can stabilize at
Figure 1. It is based on the Fresnel Reflection principle, which
high temperatures. The proposed approach was not deployed
calls for some incident light to be reflected between various
in a smart factory.
refractive indices, as shown in Equation 1.
In [7], it was showed that FBG can play a crucial role in
measurement of physical parameters for future sensor systems.
Moreover in [7] they prototyped an experimental pass-through
type FBG temperature sensor that is incorporated in a standard
thermocouple housing but was not deployed in a smart factory
setting. It’s worth noting that FBG sensor housing has received
little attention in the literature, even its critical importance in
the energy consumption when its integrated in a conventional
electrical sensor housing.
Ref [8]argues the case for a temperature monitoring system
for glass production that is based on Fiber Bragg Grating
(FBG). Opti-System simulation was used to implement this
proposed system. FBG was chosen because it reflects light at
a wavelength that changes in response to temperature changes.
FBG sensors are typically simple to install, have higher preci-
sion, longer stability, are tiny, are immune to electromagnetic
interference (EMI), and can measure extremely fast events. Fig. 1. Structure of Fiber Bragg Grating [7]
Tungsten DiSulfide (WS2) has a higher sensitivity than
Silica, Poly Methyl Methacrylate (PMMA), and Lead Sul- The initial order Bragg condition is represented by Equation
fide, according to the simulation results in [8]. The findings 1.The partial reflection of light caused by the passage of
also demonstrated that wavelength shifting is influenced by electromagnetic waves through the core of the FBG, which
the materials’ thermo-optic coefficient and thermal expansion contains two or more materials with various refractive indices.
coefficient (PbS). A significant flaw in the work was that the The index difference and incidence angle affect this Fresnel
proposed solution was not incorporated into a smart industrial reflection.
environment.
λB = 2nef f Λ (1)
In [9], the research aims to provide a thorough review of the
most recent developments in metric capacity unit techniques As follows from the equation, the effective refractive in-
commonly used to Predictive maintenance for good producing dex mode (nef f ) and grating period (Λ) affect the Bragg
in smart factories by categorizing the analysis in accordance wavelength (λB ) . Changes in ambient temperature, applied
with metric capacity unit algorithms, machine learning (ML) strain, or pressure have a considerable impact on the Bragg
class, machinery and instrumentation used device employed in wavelength [10],[11].Equation 2 uses partial derivatives with
information acquisition, classification of knowledge size and respect to the variable length, temperature, and wavelength to
kind, and highlighting the key contributions of this work. more precisely illustrate this effect.
For the purpose of predicting the breakdown of many man-
ufacturing industry machines, the proposed study constructed δnef f δΛ
∆λB = 2 Λ + nef f ∆L
a Random Forest model. In order to show the Decision Tree δL δL
(DT) method’s advantage in accuracy and precision, it was δnef f δΛ
+2 Λ + nef f ∆T (2)
compared to the prediction outcome. The disadvantages in [9] δT δT
stemmed from the system’s use of FBG-based sensors, which
δnef f δΛ
are superior and have more inherent benefits. +2 Λ + nef f ∆λ
δλ δλ
∆λB = λB (ξ + α) ∆T (3)
R(L, λ) = tanh2 (ΩL) (7) Fig. 3. Configuration of Fiber Bragg Grating Sensor
crucial parameters in industry 4.0, and more especially smart also vulnerable to changes in the transmission characteristics
factories, must be measured and regulated to ensure high of optical fiber cables [17].
performance industrial processes. A temperature sensor is a Also, in some application, the sensor should be sensitive
gadget that can turn temperature-related data from a source to the measurand and less sensitive (or not sensitive) to any
into a quantifiable output[13]. other parameter in such a way the measurement be accurate
FBG based sensors offer a real opportunity to real time and significant. In this regards, further development of the
measurement of temperature variation with high sensitivity and performance of FBG sensors is required. In order to overcome
precision. In order to make manufacturing more intelligent, a this limitation self-referenced FBG sensors can be used where
lot of work has been done to improve the application of FBG two or more reflected peak wavelength at different resonance
temperature sensors in industry 4.0. wavelength can be used. Generally, reference modes are used
FBG temperature sensors in the automobile smart factories in surface plasmon resonance-based sensors and a good result
sector, are often employed to detect the intake and coolant have been obtained.
temperatures [14]. In addition, several studies have been
conducted to demonstrate the efficiency of the application of VII. C ONCLUSION AND F UTURE S COPE
FBG in electrical power systems. Temperature sensors can de- This paper has discussed the review of Fiber Bragg temper-
tect issues including overheating, overloading, and insufficient ature sensors in smart factories embarking from the historical
cooling by detecting motor heat. context of FBG’s to an extensive review of literature of the
Manufacturers can presumably minimize unforeseen down- FBG based temperature sensors. The theory behind fiber Bragg
time and save money by restricting maintenance checks and gratings optical sensors and the optical response of FBG
repairs to when they’re actually needed by detecting problems temperature sensors is also discussed. The use cases of FBG
early. The features of FBGs, such as their high thermal resistiv- temperature sensors in harsh environments and role adoption
ity and the ability to rins or write with 800 nm femtoseconds, is smart factories with its corresponding challenges of being
will open up many prospects in smart industries with severe too costly to implement and having to utilize sophisticated
harsh environments, such as power plants, turbines, combus- equipment like Optical Spectrum analyzers and interrogators.
tion, cold rooms and space for monitoring temperature and The future scope of the work will involve the factoring in
humidity permanently [15]. of strain in the temperature measurement and the design of
Increasing the sensitivity of the sensor by putting forth the FBG temperature sensors in ANSYS FDTD Lumerical
novel designs and strategies has been the main emphasis of software and fabrications using phase mask technology of
researchers in the field of fiber Bragg grating sensing over the FBG temperature sensors and deploying them in smart factory
past few years. However, increasing the dynamic range and environments to collect real-time sensor data and aid in
improved networking aspect are of paramount importance. It decision making.
should be stressed again at this point that the sensor chip is
a generic platform which can be applied to the detection of ACKNOWLEDGMENT
several physical parameters.
The research study was made possible with assistance from
VI. C HALLENGES OF FBG T EMPERATURE S ENSORS the Euro-Mediterranean University of Fes (UEMF) and the
Industrial sensing applications offer a once-in-a-lifetime African Scientific, Research and Innovation Council (ASRIC)
opportunity for the fiber Bragg temperature sensors sector, and the authors are much grateful for this support.
which has previously been confined to niche applications
R EFERENCES
where higher technological costs were justified by Fiber Optic
sensors particular benefits[16]. Smart factory devices that [1] Hill, K.O., Fujii, Y., Johnson, D.C., and Kawasaki, B.S. Photosensitivity
in optical fiber waveguides: Application to reflection filter fabrication.
incorporate FBG based temperature sensors, on the other hand, Appl. Phys. Lett. 1978, 32, 647–649.
could lead to tremendous growth for this technology. It is now [2] Othonos, A., and Kalli, K. Fiber Bragg Gratings-Fundamentals and Ap-
possible to develop cost-effective disposable FBG temperature plications in Telecommunications and Sensing, Artech House, Boston,
MA, 1999.
sensors for industrial environments but the burden lies to the
[3] Kashyap, R. Fiber Bragg Gratings, Academic Press, 2009
cost resulting to the unsuccessful penetration of FBG sensors [4] Rao, Y. J., Webb, D. J., Jackson, D. A., Zhang, L., and Bennion, I.
in the telecommunication industry [16]. (1997). Infiber Bragg-grating temperature sensor system for medical
FBG temperature sensors are made up of fragile optical fiber applications. Journal of Lightwave Technology, 15(5), 779-785.
[5] Jung, J., Nam, H., Lee, B., Byun, J. O., and Kim, N. S. (1999). Fiber
cables that are incompatible with process conditions, making Bragg grating temperature sensor with controllable sensitivity. Applied
them challenging to install in smart factory environments. In optics, 38(13), 2752-2754.
addition to these obstacles, complicated industrial equipment, [6] B. Zhang and M. Kahrizi, ”High-Temperature Resistance Fiber Bragg
Grating Temperature Sensor Fabrication,” in IEEE Sensors Journal, vol.
such as optical spectrum and oscilloscopes, is required, which 7, no. 4, pp. 586-591, April 2007
is costly and requires a high level of skill to deploy [17]. Due [7] Mihailov, Stephen J. ”Fiber Bragg grating sensors for harsh environ-
to changes in detector sensitivity and light source efficiency ments.” Sensors 12.2 (2012): 1898-1918.
[8] Ponmalar, Dr S. ”Tungsten DiSulphide FBG Sensor for Temperature
with temperature, as well as the difficulty of demodulating the Monitoring in Float Glass Manufacturing.” Journal of Information
wavelength shift, the sensitivity of FBG temperature sensors is Technology and Digital World 2.4 (2020): 191-200.
and the shopping automated by using the concept novelty and be generated and the same given to the customer.
IoT. With the generated bill customers can the pay the amount
As all the shops are very crowded, we find it to difficult and they can check out. With this system human error can
to shop and also we have to wait in the queue for long time happen and also it will take long time to check all the
to verify the items we purchased and for bill payment. Here products. The drawbacks of existing system are efficiency and
we propose a system that manages these complexities with long time for billing. If a product is put on the trolley, RFID
ease. The system is connected to user mobile and a centralized reader reads the item’s RFID tag to check the item price. This
computer in the shop through IoT. Trolley is equipped with is repeated again and again whenever an item gets added to
RFID reader which scans the RFID tag attached to the product the cart. Once the customer finished shopping, they have to
when an item is put into it. An LCD displays the price of item press the finish button to indicate the cart the shopping is
and item name. This is done repeatedly many times until the completed.
customers press the finish button in the trolley. Once the After this the cart does two important things. It will send
customer finishes the shopping, they have to press the finish the shopping list which contains price of purchased products
button. and total price for the shopped items to the computer in the
After this the transmitter in the trolley send the list of shop and the same list can be viewed in the android
purchase products with their individual amount to the system application developed for the same shop. The same detail can
available in the shop and the same can be viewed in the also be viewed in the shops website by authorized manager
customer phone application. Once they reach the cash counter which helps them to increase their business beyond
it’s very easy to check the amount with the item purchased. boundaries. So, the proposed system saves time in waiting in
The system also enables the customer to pay the amount billing. It makes shopping easier and smarter using IoT.
through the link provided in the app after successful
verification done by cashier. Cashier has to enable the online Arduino is selected because it offers low power requirement
link for payment then only customer can pay the amount after and also it offers serial communication, USB connection for
shopping. The system also alerts the shopping keeper once an debugging. Compared to other processors the price is cheaper
expiry product is added to the cart. which makes it economical for reducing the system
To make the system implemented all the products in the implementation. The planned structure has the following
shop must be given with RFID tag. So that the reader available important com- ponents. They are RFID reader, buzzer, LCD
in the trolley can read once they are added. If the customer and Arduino processor. All the items are tagged with RFID.
wants to remove the product, he has to show the added product When an item is added to the cart, the item name and its price
RFID tag once again to the reader. The processor available in are automatically read by cart with the help of RFID reader. If
the trolley is programmed to remove the product from the a particular item is not available in the shop it will alert the
list if a particular product is shown more than one time. If shopkeeper to load them. The same detail can also be
a customer wants to add a particular product more than one viewed in the shop’s website by authorized manager. The
time, they have to press time repeat button in the trolley. system will send message to shopkeeper if an expired item is
The developed android application facilitates the user to added to the cart. The item availability and their quantity can
make the payment and also to check the quantities purchased. also be checked in the application of the shop by manager
The system can be implemented with minor changes for all which help the shop people to reload the items quickly and
types of shops with minimum cost. also to interest of customers which will in turn increase the
business. The proposed system can be used for shopping
II. SYSTEM IMPLEMENTATION malls and Departmental store.
A. Description of the proposed system:
B. Transmitter:
Nowadays all items in a supermarket are labeled by a
The function of the transmitter is shown in Fig.2.1. The
barcode. When a customer picks an item before billing that
transmitter sends the list of purchased product list with their
barcode is scanned by cashier to find the price. It’s done for all
individual amount, and also the total amount once the
items to generate the bill. After the generation of the bill,
consumer finished the shopping after they press the finish
payment can be made by customer easily. This becomes
button available in the cart. It also passes the stock information
difficult and also increases manpower and also leads to error
and expiry date of the product which makes the inventory
some times while calculating the bill.
management easier. The same information about shopping can
The drawbacks of the existing system, we propose a system
be viewed in the customer mobile application after successful
in which the bills for all shopped items are generated in the
log in using cart id.
cart. We send the generated bill to computer in the shop for
verification. By this way the time needed for bill generation is
drastically reduced. They also can pay the payment by using
the option in the android application.
Currently all the items in the shop are available with bar
code scanner. Customer can take all the products they want
and get added to the shopping basket. A bar code reader with
system will be available with the cashier. So. once they
reached the counter all the barcode of the products is read.
978-1-6654-6084-2/22/$31.00
With the help of a barcode reader and a computer the bill will ©2022 IEEE Fig. 2.1 Transmitter 51
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
C. Receiver:
The receiver receives the list of items
purchased items and the total price of all purchased
commodities. The cashier/ store keeper can check the list
with the purchased items. After this cashier can approve
the payment option. Once this is done customer can pay
the amount for shopped items. The functional details are
given in Fig.3.2
Fig.2.2 Receiver
when the system meets real time needs. For payment of the bill,
we must need appropriate permission from UPI or from the
commercial bank for successful implementation.
V. REFERENCES
Abstract:- Diabetes is a metabolic pathological circumstance of comfy regarding blood sugar testing. LED non-invasive blood
worry, which impacts crucial organs if no longer recognized and glucose device is employed to display the blood glucose
dealt with punctual. S teady tracking of blood sugar is necessary content , if any irregularity happens the alert is sent to mobile.
to keep away from diabetes. Regularly used glucose measuring This info is unendingly uploaded in mobile via IOT.
techniques are invasive which typically entails finger puncturing.
These techniques are aching and common piercing causes A. SYSTEM DESCRIPTION
calluses at the pores and skin and feature chance of distributing
transferrable diseases. Therefore, there may be a want to
The project is divided into two halves. The two major divisions
broaden a non-invasive tracking device that may detect blood are hardware and software. This project is an efficient
glucose constantly without much problematic. The current effort combination of computer programming and cost-effective
is centered on improvement of benign blood glucose sensor device hardware. This section discusses both these aspects in detail.
that uses of Near-infrared (NIR) method. Initially in-vitro SOFTWARE COMPONENTS
glucose measuring model is evolved from usage of unceasing
wave from NIR LED to test the understanding of the device for 1. KEIL IDE
precise blood sugar concentrations. Afterwards a sensor patch
was calculated for the usage of photodiode and LED to look at 2. EMBEDDED C
diffused reflectivity ranges of blood from the human forearm. HARDWARE REQUIRED
Diffused reflectivity ranges of the topics received with this
method become additionally as associated with commercially 1. PIC16F877A Microcontroller
accessible invasive finger tip glucose-meter. The effects are
promising and display the capability of NIR for blood sugar 2. LCD Display
measurement. In the current work model for non-invasive 3. Blood Glucose sensor
glucose quantities the usage of Near-infrared LED is primarily
sensor is established. In-vitro and In-vivo experiments are 4. ADC
executed using the model and the effects received as output signal 5. UART
of model is similar with commercially obtainable glucose meter.
The end outcome suggests the feasibility of the improvement of 6. IOT
non-invasive blood sugar device which is primarily based on
diffused reflectance via forearm. 7. Buzzer
B.HARDWARE DESCRIPTION
I. INT RODUCT ION
1. PIC16F877A MICROCONTROLLER
Diabetes is an disease that occurs when your blood glucose,
also called blood sugar, is too tall. The main supply of energy PIC16F877A microcontroller is extremely suitable to use, the
ie Blood glucose comes from the food you eat. Insulin, an software design of this controller is simple. one in all the most
internal secretion created by the pancreas, helps glu cose from benefits is that it is write-remove many times ,as a result of it
food get into your cells to be used for energy. Diabetes is a uses flash memory knowledge. It has a complete range of forty
metabolic pathologic condition of worry, which touches pins and there are thirty three pins for input and outpu t.
important structures of body if not identified and treated PIC6F877A has a lot of application in digital physics circuits.
immediately on time. Steady monitoring of blood glucose is
significant to avoid problem of diabetes. Normally used
glucose measuring methods are invasive finger puncturing. 2. LCD DISPLAY
These methods are sore and common pricking cause calluses
The term LCD stands for liquid crystal display. This section
on the skin and have risk of scattering communicable diseases.
describes the operation modes of LCDs, then describes the
II. PROPOSED DESIGN way to program and interface an LCD to PIC Microcontroller.
It is an electronic display module employed in an intensive
In the projected system, the new non invasive methodology is
vary of applications like numerous circuits and devices like
offered. Here sensor is to observe the glucose level of the
mobile phones, calculators, computers, TV sets etc These
subject. The benefit of this method is measurement of sugar
displays are given importance for multi-segment light-emitting
level in blood using non-invasive way . The outcome is
observed within the mobile phone. Tall rise of sugar level diodes and 7 segments. Steps to interface LCD with PIC
might result in coronary failure or any issue situations. Non - Microcontroller.
invasive glucose observance make individuals a lot relaxed and
III. RESULT S
This session provides the achieved goals in this project.
Hardware picture is attached for more information.
Fig 3: Proposed Hardware Implementation for Normal Value
a. HARDWARE IMPLEMENTATION
1) A step down transformer is used to reduce the normal 230v
AC input to 12v AC output. When the value is abnormal
9) The blood glucose value is displayed on LCD display and We have done in embedded C language .
when the value is in out of range, the “abnormal” message is
displayed and the buzzer gives a sound.
10) The value is also sent to IOT module using UART protocol.
11) The mobile phone or a laptop connected with the 107
module gets the data. Via cloud.
12) All the patients data is given to cloud using IOT module
and can be viewed in the device connected wherever and
whenever needed.
Abstract— MQTT is an Internet of Things (IoT) protocol devices. IoT [5] devices have less memory and processing
designed to enable machine-to-machine communication. speed, so they require lightweight protocols like MQTT.
MQTT's publish/subscribe message transport mechanism is MQTT uses a middle where architecture called a broker.
extremely lightweight. This protocol is useful to establish MQTT follows publish/subscribe communication model.
remote communication when data transfer rates are limited. MQTT broker creates topics. The clients who would like to
With these characteristics, it can be used in a variety of receive messages, they need to subscribe to a particular topic.
scenarios, from temporary to permanent contexts, making it These clients are calling as subscribers. The clients who need
ideal for machine-to-machine and IoT communications. This to send the messages, they need to write on to a particular
research study reviews the state-of-the-art MQTT bridges,
topic. These are calling publishers. Fig 1 explains the
message format, and configuration. Finally, the study
architecture of MQTT protocol. MQTT protocol is an
concluded by stating the current challenges, solutions and
future research directions.
asynchronous protocol, so publisher and subscriber need not
be online at the same time.
Keywords—Internet of Things, Message Queue Telemetry Message queue telemetry transport provides reliable
Transport, Broker, Topic, bridge, Software Defined Networking communication because it uses transmission control protocol
I. INTRODUCTION (TCP) as communication protocol. MQTT supports three
levels of quality of service (QoS) to transfer messages. They
MQTT is the abbreviation for Message Queuing are QoS 0, QoS 1 and QoS 2. QoS 0 sends message only
Telemetry Transport [1]. The publish/subscribe mechanism once. There is no guarantee that whether the message is
in which we may send and receive messages as clients. This received by destination or not. No acknowledgement shared
facilitates interaction between a wide range of electronic between sender and receiver. QoS 0 does not allow for
gadgets. It is a basic communications protocol developed for sending messages duplicate. QoS 1 send messages at least
devices with limited memory and bandwidth, making it an once. Sender will wait for acknowledgement from the
ideal choice for IoT based Applications. receiver after sending messages, if no proper
Few other protocols match the MQTT's combination of acknowledgement received form receiver, sends keep on
flexibility and efficiency. The following are some of the sending messages until receives an acknowledgement. Once
characteristics of a MQTT: the acknowledgement received broker notifies the sender.
QoS 2 send messages only once. It forwards the messages
a) Specifically, it is a protocol that allows slowly as compared other QoS levels. QoS 2 receives
machines to communicate with one another. acknowledgement in all the steps.
b) Intended for usage as a lightweight and
straightforward messaging protocol, it relies on
a publish/subscribe model for two-way data
transmission between the client and server.
c) A simultaneous connection between client and
server is not necessary.
d) Much to how WhatsApp and other messaging
services expedite deliveries, so does this one
speed up the transfer of data. It's a protocol for
instantaneous communication.
e) Customers may choose from a curated list of
topics and sign up for updates just on those that Fig 1. MQTT Architecture
interest them.
Fig 2. Shows us the message format. Each command in
Message Queue Telemetry Transport is a lightweight MQTT[1] is accompanied by an acknowledgement in the
message communication protocol being used in the IoT form of a command acknowledgment, as per the protocol's
communicate with each other using predefined data II. RELATED WORK
structures and functions. Mosquitto is the broker software which is being used as a
MQTT broker. Mosquitto support for bridging two or more
North Bound API MQTT brokers. To create a bridge, we must enable bridge
In order to determine what resources are available, property of a MQTT configuration file.
applications using an SDN must depend on the controller to
report the current state of the network infrastructure. The
SDN [6] controller may also make sure that application
traffic is routed according to predefined rules. Through
northbound APIs, applications may communicate with the
control layer and inform it of their resource requirements and
final destinations. To ensure that applications make efficient
use of the network's resources, the control layer coordinates
their deployment. It then employs its shrewdness to choose
the best route, taking into account the application's latency
and security requirements. Typically, RESTful APIs are used
for northbound communication. Orchestrations are now fully
automated and not set by hand.
HTTP GET: used when we want to retrieve information.
HTTP POST/PUT: used when we want to upload or
update information.
Fig. 6 MQTT bridge configuration
It's very much like surfing the web, except that instead of
requesting a website or image, you're asking the SDN Above figure shows MQTT bridge [17] with two
controller for something specific, like a list of all the VLANs different brokers broker0 and broker1. Broker1 has enabled
on the network. as a bridge and broker0 is acting as client for broker1.
The SDN controller will respond to the HTTP GET
request with the desired data in an HTTP GET response. The
data is sent in a standard format. Most often encountered data
formats are:
JSON (JavaScript Object Notation)
XML (eXtensible Markup Language)
However, it pays little attention to the client While it approach solves the availability and scalability issues by
comes to improving data transfers in the Internet of Things making data accessible at every broker in the network. As a
(IoT) when working with limited resources and potentially result, a new technique for controlling data flow is
unstable networks, Chen et al. [12] developed a novel introduced in this work to deal with customers connected to a
publish-subscribe message routing approach. The proposed failed broker.
method utilises a rerouting strategy to adapt to the ever-
A software defined network (SDN) controller manages
evolving network architecture of IoT devices. Furthermore,
we demonstrate how to leverage MQTT's rerouting feature to the brokers in an IoT-based dispersed network. In order to
have a controller take over topic-based session flows in the identify a crashed broker in a network, the controller and the
event of a failed broker. In addition, it has the ability to brokers in the network have been exchanging periodic
messages. After a certain period of time without a
redirect the client under certain essential limits, making it
unfit for a widespread IoT infrastructure.t-broker interaction communication from a broker, the SDN [7] assumes the
in the absence of an online presence. broker has crashed. After determining whether alternative
brokers are functional, the controller may reroute the
Using a lightweight container orchestration framework customers who were previously connected to the failed
and a collection of single-board computers, Thean et al. [13] broker. Aspects of performance include CPU speed, RAM
show how to build a cluster of MQTT brokers at the memory, the number of customers connected to the broker,
network's periphery. The primary goal is to provide an and processing capacity. By rerouting the client's IP address
inexpensive, scalable, and lightweight messaging system for to the communication port of another active broker in the
Internet of Things (IoT) devices in underdeveloped countries network, the SDN distributes customers around the network
with spotty Internet access. Currently, a cluster server in accordance with the performance of those brokers.
intermediate layer is being developed to supplement and aid Therefore, the suggested technique can deal with the clients
the collective processing of dispersed MQTT brokers. associated with the crashed MQTT [1] brokers in a scalable
Message throughput, execution time and end-to-end latency manner and solve the scalability problem in dispersed IoT
performance evaluations of the MQTT broker cluster are also networks [16-19].
provided. There must be a large number of intermediate
cluster nodes, however, between the customer and the When it comes to managing the infrastructure of a
massive dispersed IoT network, an SDN controller is used at
broker.
the network control layer. In an SDN, each switch operates
In [14], Longo, et al. propose MQTT-ST, a protocol for on its own data plane, while the SDN controller manages
constructing a distributed architecture of brokers using packet traffic. For data to reach the MQTT broker after being
spanning trees. Since a centralised approach cannot handle published, packets from the client must travel via the
the anticipated influx of IoT devices, distributed solutions network's switches. When an SDN switch receives data, it
including a number of collaborating brokers are required. notifies the SDN controller of this fact by sending a
Relocating distributed brokers from the cloud to the network PACKET_IN message to the controller. The controller
might significantly reduce latency. The described protocol subsequently sends a PACKET_OUT message to the data
sends its control messages using in-band signalling. But the plane of the switch to acknowledge the input packets. The
whole communication is now there in every broker. PACKET_OUT message from the controller is sent to the
switch, and the switch then delivers it to the MQTT broker.
Literature review reveals that [11] doesn't focus on
dealing with clients with an offline broker; [12] reroutes the
client under specific important limits, which isn't ideal for a
large-scale IoT network; [13] necessitates several extra
cluster nodes between the client and broker; [14], [15] use
broadcasting of messages to all brokers in the network,
which impacts the memory capacity of brokers. For effective
data transport, it is crucial to address these problems in the
MQTT protocol.
III METHODOLOGY
In the publish/subscribe architecture utilised by MQTT,
one of the most popular IoT protocols, several clients
communicate with a central hub, or broker. In the same way,
a dispersed network of brokers is connected by a bridging
mechanism. However, anytime the publisher and subscriber
are linked to separate brokers in the network, it has issues
with availability and scalability, which is why this study
proposes a robust data exchange availability approach to deal
with the issue on the subscriber client side. To do this, each
broker in the network creates a topic set table containing a
collection of topics, the ID of the broker where the subject
was published, and the ID of the publisher client for that
topic. Data published by a customer in a broker is shared
with other brokers in the network. The topic set table is used
to publish information to a subscriber when a client Fig. 7 Block diagram
subscribes to a topic with a different broker. The described
II. BACKGROUND AND RELATED and when the big graph dataset changes. Graph
WORK databases are more flexible than Relational Database
Management Systems (RDBMS) in various criteria
The pattern of frequency calculation is initially done [15-17].
by sampling subgraphs (Kasthan et al. 2004) that A new version of the Ullmann algorithm
have better computational time. In 2010, Silva and developed by Shang et al., called Quick SI, and has
Riberio designed a g-tries algorithm that effective pruning and processing cost. Based on
restructured the associated method and data edge-weighted, a minimum span tree is created in
structure for both directed weighted and unweighted the database [18].WengingLin et al. developed a
graph databases [7]. HitalSlan et al., developed the two-step filter-refined algorithm implemented on
Physarum algorithm to search the smallest path for MapReduce for interesting pattern generation. To
a single graph as a hybrid of Dijkstra’s and BFS gain low estimation cost, they examine the algorithm
methods. It solves many problems that arise in with both top-down and bottom-up methods at
computers, social and road networks, etc. The individual worker nodes [7]. Saif Ur Rehman et.al
method is a two-state combination approach to fast developed, A Ranked Frequent pattern framework
computation in directed weighted and unweighted (A-RAFF), which uses FSR-rank measures to
graphs [8]. minimize the duplicate and enormous recurrent
patterns. The algorithm consists of three layers i.e.
David Robin and Chris Scogings proposed pre-pruning, graph-pattern mining, and analytical
a generic algorithm that can reduce overlapping layer. Each layer has a different objective but works
contested subgraphs by testing at different levels to together in a framework [14].
verify patterns in the context of threshold value [8].
The graph partition uses either the vertex-cut or III. PROBLEM DEFINITION
edge-cut method. Wenfei fan et al. designed
incrementalization in the graph partition with added In today’s era, we are surrounded by big data
features of load-balancing, smallest cut-size, and generation, where data can be of any type and our
lowest theta changes [10]. Jingbo Xu et al. proposed main objective is to extract needful information in a
GRAPE, a parallel Graph query engine that faster way despite computational complexity,
overcomes issues in previous approaches. The networking, and data storage. Hence researchers
programming is very simple, and semi-structured emphasize not only recurrent subgraph generation
which enables the optimization of sequential from big data but also ranking them at the proper
algorithms and graphs by simultaneous computation level on the basis of a given threshold value so that
on vertex-based systems such as GraphLab, and the computation time is less. In this paper, we develop a
Giraph framework [11]. Dynamic PageRank GraphX-based Frequent
Subgraph Mining (DPRGFSM) algorithm that uses
Miguel E Coimbra et.al proposes the dynamic page ranking in MapReduce Geometric
VeiGraph algorithm which is a faster, improved Multi-way Advanced Optimized Frequent Subgraph
computation method for stream-based graph Mining (MGMAOFSM) to generate frequent
datasets. It achieves the result with exactness above subgraphs with less execution time [19].
95 on a scale of a hundred. The algorithm uses
architecture and model to make proper coordination IV. PROPOSED METHODOLOGY
between user-appropriate processing methodologies
Apache Spark, which is based on Scale language, is
and make a correct selection between them [12].
developed for a faster clustering platform in AMP
Deep learning can be used in matching context
features for user messages and photos. The Lab. NameNode and DataNode architecture are used
researcher developed a design space by combining in HDFS to execute the distributed file system to
attention summarization on RNN and text achieve better performance. HDFS allows faster
embedding [13]. transfer of data among nodes. The features of HDFS
are fault tolerances, high availability, scalability,
Frequent subgraph mining can be achieved reliability, distributed storage, replications, etc.
in graph transactions based on a single graph base or High fault tolerance is achieved in HDFS by
a set of small-size graphs. In the case of the first one, dividing data into a number of blocks. If any system
the transaction consists of a set of tiny size or in a cluster is out of the performance, then the client
medium size graphs as input whereas in, the second is able to retrieve required data from another system.
one, a huge graph database is used. The main
The copy of data is distributed to all the clusters. At
objective of FSM is to extract a subgraph whose
any moment, if any failure occurs, a client can be
value is greater than the user-given threshold value
[1]. able to access it from other nodes as a replica of data
To make model functionality more flexible, is present. Data replication improves the availability
it should be capable of handling complex queries as of data in HDFS. Due to a distributed storage
system, each replica of data can be available in
various clusters. It supports both horizontal and If data in memory is disoriented, then with the help
vertical scalability.In the case of Hadoop, data is of a resilient feature it can be regenerated in RDD.
distributed on different sites, and performs all However, fault tolerance is achieved through a
computations there. But it requires a Hadoop signal of lineage. Spark keeps track of all series of
Distributed File System (HDFS) for the whole operations of the corresponding data set. Whenever
output of individual maps and reduces jobs to be a portion of an RDD is disoriented, it has sufficient
materialized into the local file. This leads to information to rebuild it from other RDD [20]. To
decreased system performance due to fault tolerance reduce the communication and memory
mechanisms. In the case of Spark, this issue was requirement, the GraphX Resilient Distributed
resolved by putting the information in distributed Graph (RDG), uses the records with nodes and links
memory format and lessening the expensive shuffles in the graph to generate horizontally division sets.
The process depends on vertex-cut division to
which take place at the time of data processing as
encode the graph as shown in Fig 3.
shown in Fig1.
Data
Spark Task
RDD
Transformation
Vertex Data
A B
A
Partition 1 Partition 2
D
C
▪ Amazon networks: This dataset is downloaded conclusion that our proposed algorithm is 1.6 times
from https://snap.stanford.edu/data. The faster than the Spark-based Single Graph Mining
customers are denoted by vertices and (SSIGRAM) model and 50 times faster than the A
purchasing items are represented by links. In Ranked Frequent pattern Growth Framework (A-
this paper, we collected a portion of the whole RAFF). The scalability of our proposed model is
database consisting of 334863 vertices and empirical analysis with different ranges (i.e. 0,10,
925872 links. In the largest WCC, there are 20,..,100) percentage of dynamic links added and
334863(1.0) vertices, and 925872(1.0) links mean out degree ranging from 1 to 2048. Fig.8
available. Similarly, in the largest SCC reflects that our proposed one is large-scalable graph
334863(1.0) vertices, 92587(1.0) links are network. The accuracy for insertion remain the same
present. o 10 10 % and 60 to 100%, only varying ranges for
of 0.4 to 0.6. The mean modify time is inversely
TABLE II. EXPERIMENTAL DTATSETS DETAILS proportional to the mean out degree.
Datasets Google Neural Twitter Amazon Neural network Twitter graph datasets
database network graph networks Amazon networks
datasets 2
Static 845908 645908 445908 245908 1.8
vertices 1.6
Dynamic 94868990 74868990 54868990 34568720 1.4
vertices
Accuracy
1.2
Static 997989761 907959967 9079525958 879605958 1
edges
0.8
Dynamic 10245631223 9823987458 98237654098 887654098
0.6
edges
0.4
0.2
0
In Fig. 6 (a), Amazon networks have more accuracy 10 20 30 40 50 60 70 80 90 100
than the other three datasets with dynamic insertion Percentage of dynamic edges inserted
Google database
50
45
40
35
Threshold values
30
25
20
15
10
0 20000 40000 60000 80000 100000 120000 140000
subgraph geneartion
Proposed DPRGFSM Model A-RAFF SSIGRAM
Fig.7. Accuracy analysis with existing Spark-based Single Graph
Mining (SSIGRAM) and A Ranked Frequent pattern Growth
Framework (A-RAFF)
800 35
30
Mean outdegre
600 25
20
400 15
10
200
0 20000 40000 60000 80000
0
10 20 30 40 50 60 70 80 90 100
Subgraph generation
Proposed DPRGFSM Model A-RAFF SSIGRAM
Percenatge of dynamic links added
35
networks”, Applied Network Science, Emerging
Sources Citation Index (ESCI) of Web of Science.
30
January 2019.
25
[3] Yangyang, Li, Wang Yajun, and Zhang Miyuan. "POI
20
Recommendation System using Hypergraph
15 Embedding and Logical Matrix Factorization."
10 Journal of Artificial Intelligence and Capsule
0 20000 40000 60000 80000 100000 120000 Networks 4, no. 1 (2022): 37-53.
Subgraph generation [4] Merve Asiler, Adnan Yazıcı & Roy
Proposed DPRGFSM Model A-RAFF SSIGRAM
George,”HyGraph: a subgraph isomorphism
algorithm for efficiently querying big graph
Fig.9. Comparison of the proposed algorithm with SSIGRAM databases”, Journal of Big Data , Science Citation
and A-RAFF methods for frequent subgraph generation in Index Expanded (SCIE).
different datasets. [5] Wenqing Lin, Xiaokui Xiao,” Large-scale frequent
subgraph mining in MapReduce’, Conference: 2014
IEEE 30th International
The number of subgraph generations in recurrent
Conference on Data Engineering (ICDE).
subgraph extraction is inversely proportional to a [6] Wilfried Yves Hamilton Adonil, Tarik Nahhal1, Moez
user-given threshold value. In Fig. 9 we make a Krichen, Abdeltif El byed and Ismail Assayad
“DHPV: a distributed algorithm for large-scale graph
comparative analysis with existing algorithms with partitioning”, Adoni et al. J Big Data (2020) 7:76
four different datasets and get more subgraphs https://doi.org/10.1186/s40537-020-00357-y.
compared with the other two by adding missing [7] Pedro Ribeiro , Fernando Silva ,” G-Tries: a data
structure for storing and finding subgraphs”,
subgraphs due to improper ranking. Springer, Data Mining and Knowledge Discovery,
Published: 12 February 2013,28, pages337–377
VI. CONCLUSION AND FUTURE (2014).
WORK [8] Hilal ARSLAN1, Murat MANGUOĞLU2,” A
hybrid single-source shortest path algorithm”, Turkish
Journal of Electrical Engineering & Computer
In this research work, defined the dynamic Sciences, (2019) 27: 2636 – 2647 © TÜBİTAK
PageRank algorithm in the GraphX system to doi:10.3906/elk-1901-23.
[9] David Robinson, Chris Scogings,” The detection of
generate the frequent subgraph in a distributed criminal groups in real-world fused data: using the
system to cut down communication value and graph-mining algorithm “GraphExtract”, Springer
warehouse overhead. The study performs a vertex- Robinson and Scogings Secur Inform (2018) 7:2
cut method for graph division horizontally which https://doi.org/ 10. 1186/s13388-018-003.
[10] Wenfei Fan, Muyang Liu, Chao Tian, Ruiqi Xu,
leads to less-value fault tolerance. As the use of Jingren Zhou,” Incrementalization of Graph
GraphX with dynamic page ranking, the indices Partitioning Algorithms”, Proceedings of the VLDB
across the graphs and view of collections’ number of Endowment, Online ISSN: 2150-8097.
super steps reduce. Hence, system performance is [11] Wenfei Fan, Jingbo Xu, Yinghui Wu , Wenyuan Yu ,
Jiaxin Jiang,” GRAPE: Parallelizing Sequential Graph
improved. Computations”,Proceedings of the VLDB
Endowment, Vol. 10, No. 12 Copyright 2017 VLDB
The research work also make a Endowment 2150-8097/17/08.
[12] Miguel E. Coimbra, Sérgio Esteves, Alexandre P.
comparative analysis with existing Spark-based Francisco , Luís Veiga ,” VeilGraph: incremental
Single Graph Mining (SSIGRAM) and A Ranked graph stream processing”, Journal of Big
Frequent pattern Growth Framework (A-RAFF) Data,Science Citation Index Expanded (SCIE). June
algorithm by adding and removing edges. The 2022.
[13] MHD Samy Alnaimy , Mohammad Said Desouki ,”
accuracy of the proposed Dynamic PageRank Expanded graph embedding for joint network
GraphX-based Frequent Subgraph Mining alignment and link prediction”, Journal of Big Data,
(DPRGFSM) model is speedy and successful with Science Citation Index Expanded (SCIE). June 2022.
four graph databases. In the future, the proposed [14] Saif Ur Rehman, Kexing Liu, Tariq Ali, Asif
Nawaz & Simon James Fong “A Graph Mining
system will expand this model to other frameworks Approach for Ranking and Discovering the Interesting
and improve the overall performance of frequent Frequent Subgraph Patterns”, International Journal of
subgraph mining in the distributed system. Computational Intelligence Systems. Published: 04
August 2021.
[15] U. Kang, C. E. Tsourakakis, A. P. Appel, C. Faloutsos,
REFERENCES and J. Leskovec. Hadi: Mining radii of large graphs.
TKDD, 5(2):8, 2011.
[16] U. Kang, C. E. Tsourakakis, and C. Faloutsos.
Pegasus: A peta-scale graph mining system. In ICDM,
[1] Fengcai Qiao, Xin Zhang,Pei Li, Zhaoyun Ding, pages 229–238, 2009.
Shanshan Jia, Hui Wang,”A Parallel Approach for [17] H. Kettani. On the conversion between number
Frequent Subgraph Mining in a Single Large Graph systems. In MSV/AMCS, pages 317–320, 2004. [16]
Sumanta Pasari
Department of Mathematics
Birla Institute of Technology and Science
Pilani, India
sumanta.pasari@pilani.bits-pilani.ac.in
Abstract—The utilization of solar energy as a including the greenhouse effect, glacial melting,
source of electricity is increasing day by day, raising and acid rain [1]. As a result, renewable energy
interest in prediction of solar irradiation. A successful has received increasing attention around the
integration of solar energy sources with existing
grid system is the biggest challenge due to volatile world because the resources are abundant and
and unpredictable behaviour of solar energy. To inexhaustible, and it is clean, green and reduces the
date, several approaches are proposed to analyse emission of greenhouse gases. Although renewable
and predict solar irradiation as well as to improve energy is an effective alternative to fossil fuels,
forecast accuracy. The present study concentrates on it brings unpredictability and uncertainty, affecting
hourly to monthly forecasting of solar irradiation
through various statistical methods, namely AR, MA, the energy system’s reliability and stability. The
ARMA, ARIMA, and Holt Winter’s technique. From abundant energy from Sun is renewable and capable
the decomposition of time series data, we found of generating large amounts of power [2]. Apart
that the dataset exhibits seasonality and randomness. from India, many other countries including United
The adequacy of the models is assessed from the States and China have adopted regulatory measures,
Root Mean Square Error (RMSE). We note that
the model performance improves with the increase rewards and subsidies to promote the use of
of time horizon (from hourly to monthly), probably renewable energy [3].
due to enhanced clarity in seasonality. In case of Reliable forecasting of renewable energy helps
ARIMA, the RMSE value turns out to be 124.21 in
hourly forecasting, whereas this value reduces to 15.66
in planning and estimating the energy output on
in monthly forecasting. A similar change has been a short term to a long term basis. Short term
observed for other models as well. (up to hourly) prediction of solar irradiance values
Index Terms—Renewable Energy, Time Series, can be used for rapid and immediate planning.
Solar Irradiance, Forecasting. Medium-term forecasting helps deciding the days
with higher irradiance for high energy production,
I. I NTRODUCTION whereas long-term forecasting is used for long term
As one of the crucial components in the scheduling and energy planning.
industrialization and urbanization processes, energy For accurate solar energy prediction, various
plays a crucial role in economic and technical methods are available in the literature. These
advancement. Moreover, a significant increase in methods can be broadly divided into three
population has led to a large exacerbation of the parts: physical methods, statistical methods, and
energy crisis. So far, the fossil fuels are the main computational approach. Hybrid techniques are also
cause of concern, which continue to be the most used for forecasting of solar irradiation. In 2012,
dominant source of energy production across the Dazhi et al. [4] applied the ARIMA model using
globe. At the same time, fossil fuel combustion three different approaches on variables affecting
has resulted in a number of environmental issues, the solar energy. The model is applied on GHI
value, DHI and DNI values, and cloud cover values,
respectively. The result shows that the performance
of the ARIMA model is better in terms of goodness the MA part is used for modeling the error term
of fit value for cloud cover. In 2019, Alsharif et occurring at various times in the past. The model is
al. [5] have reviewed statistical ARIMA method for usually referred to ARMA (p, q), as defined below
forecasting of daily and monthly solar energy data. [12]
Cheng et al. [6] in 2021 provide daily to weekly p q
solar energy forecasting using convolutional long Xt = ∑ ψi Xt−i + ∑ θj ωt−j
short term memory. In 2020, Belhmandi et al. [7] i=1 j=1
provide one month ahead forecasting using time D. Autoregressive Integrated Moving Average
series model. Lu [8] presents heuristic time series (ARIMA)
method for renewable energy forecasting in Taiwan.
Similarly, Cheng [9] presents hybrid solar irradiance It is a generalization of ARMA model. An
short-term forecasting by fusing Kalman filter and ARIMA model is applied where data shows some
regressor. evidence of non-stationarity in sense of mean (not
The layout of the remaining paper is given below. in variance). Predictions are based on regressing the
Section 2 provides an overview of time series variable on its own lagged, regression error, and
methods whereas Section 3 presents the summary of the differencing values. It is generally denoted by
methodology and dataset description. The outcomes ARIMA (p, d, q) and is formulated as follows [13]
of the implemented models are discussed in Section
p q
4, whereas the concluding summary is presented in
(1 − ∑ ψi Li )(1 − L)d Xt = (1 + ∑ θi Li )ϵt
Section 5. j=1 j=1
II. OVERVIEW OF T IME S ERIES M ETHODS AND Where, ωt denotes white noise;
E RROR M ETRIC ψ = (ψ1 , ψ2 , .., ψp ) and θ = (θ1 , θ2 , .., θq ) are
In this section, a brief overview of time series the model coefficients of AR and MA model
methods and RMSE (error metric) along with their respectively; d refers to the degree of differencing;
mathematical formulations is provided. p and q respectively denote the order of AR and
MA models; Xt represents the predicted value of
A. Autoregressive (AR) time series at time instance t.
An autoregressive is a random process which is E. Root Mean Square Error (RMSE)
used to predict future outcomes of a sequence from
previously observed outcomes of the sequence. It The root mean square error (RMSE) is a fre-
takes into account that the output variable depends quently used measure to quantify the discrepancies
linearly on its own previous value and a random between values predicted by a model or estimator
component (the unpredictable term). An AR (p) and the actually observed values. The RMSE value
model is given by [10] is a square root of average of squared error.
The mathematical formulation of RMSE value is
expressed as follows
¿
p
Xt = ∑ ψi Xt−i + ωt = ψ1 Xt−1 + ... + ψp Xt−p + ωt
Á ∑n (X − X̂ )2
Á
À j=1 i
RM SE =
i=1 i
B. Moving Average (MA) n
It is also known as moving-average process, Where, Xi is the actual and X̂t is the predicted
a common process for modeling univariate time value of time series.
series. The Moving Average (MA) process specifies
that the output variable depends on numerous III. DATA S ET AND M ETHODOLOGY
random terms of present and past values. The MA This section presents the data and methodology of
(q) process is as follows [11] time series model used for solar energy forecasting.
Solar irradiance data used in this study is obtained
q
from the National Solar Radiation Database
Xt = ∑ θj ωt−j +ωt = θ1 ωt−1 +θ2 ωt−2 +...+θq ωt−q +ωt
j=1
(NSRDB; https://maps.nrel.gov/nsrdb-viewer), hav-
ing spatial resolution of 10×10 km and temporal
C. Autoregressive Moving Average (ARMA) resolution of 1 hour. The data set is recorded
An ARMA model provides a concise explanation at a location in Gujarat, India. The dataset
of a stochastic process in terms of two polynomials, contains several atmospheric variables, namely, GHI
one for the autoregression (AR) and other for (Global Horizontal Irradiance), DNI (Direct Normal
the moving average (MA). The AR part involves Irradiance), DHI (Direct Horizontal Irradiance),
regressing the variables on its own past values while Relative Humidity, Pressure, Solar Zenith Angle.
Figure 1: Additive time series decomposition of daily (upper left panel), weekly (upper right panel), and
monthly (lower panel) data
with their associated RMSE values 124.21 and [5] M. H. Alsharif, M. K. Younes, J. Kim, ”Time series
109.61 respectively. ARIMA model for prediction of daily and monthly average
global solar radiation: The case study of Seoul, South
2. For daily forecasting, ARMA(8,3) and Korea”, Symmetry, 11(2), pp. 1-17, 2019.
ARIMA(4,1,6) provide the best performances, [6] H. Y. Cheng, C. C. Yu, C. L. Lin, ”Day-ahead to week-
whereas Holt Winter’s technique provides best ahead solar irradiance prediction using convolutional long
short-term memory networks”, Renewable Energy, 179, pp.
outcomes for weekly forecasting. 2300-2308, 2021.
3. The accuracy of the ARMA and ARIMA [7] B. Belmahdi, M. Louzazni, A. E. Bouardi, ”One month-
ahead forecasting of mean daily global solar radiation using
models are acceptable for monthly forecasting. The time series models”, Optik, 219, pp. 1-9, 2020.
RMSE values fall as the time horizon expands; [8] S-Li. Lu, ”Integrated heuristic time series with modified
model’s complexity reduces as well. grey forecasting for renewable energy in Taiwan”,
Renewable Energy, 133, pp. 1436-1444, 2018.
4. The dataset is stationary with respect to [9] H. Y. Cheng, ”Hybrid solar irradiance now-casting by
standard deviation but not with respect to mean. fusing Kalman filter and regressor”, Renewable Energy, 91,
The mean value changes with time. The ARMA pp. 434-441, 2016.
[10] J. Moon, Md. B. Hossain, Ki. H. Chon, ”AR and
and ARIMA models provide approximately similar ARMA model order selection for time-series modeling with
results for daily, weekly and monthly dataset. ImageNet classification”, Signal Processing, 183, pp. 1-11,
5. Holt’s Winter model does not outperform 2021.
[11] X. Li, Y. Liu, L. Fan, S. Shi,T. Zhang, M. Qi, ”Research
other models because the dataset doesn’t have trend on the prediction of dangerous goods accidents during
component as observed from the decomposition highway transportation based on the ARMA model”,
plot. Journal of Loss Prevention in the Process Industries, 72,
pp. 1-8, 2021.
In summary, the present research provides a [12] T. Chen, G. Chen, W. Chen, S. Houd, Y. Zheng, H.
comprehensive evaluation of time series models for He, ”Application of decoupled ARMA model to modal
identification of linear time-varying system based on
solar energy forecasting over a desired time horizon. the ICA and assumption of short-time linearly varying”,
The proposed methodology and the related results Journal of Sound and Vibration, 499, pp. 1-21, 2021.
are useful to enhance energy sector’s planning and [13] D. Yongganga, W. Huan, W. Mingqiang, T. Linjianga,
Y. Tao, ”Application of ARIMA-RTS optimal smoothing
management. algorithm in gas well production prediction”, Petroleum,
pp. 1-8, 2021.
R EFERENCES [14] S. Shukla, R. Ramaprasad, S. Pasari, S. Sheoran, ”Statisti-
cal Analysis and Forecasting of Wind Speed”, International
Conference on Energy, Power and Environment (ICEPE),
[1] H. Wang, Z. Lei, X. Zhang, B. Zhou, J. Peng, ”A review
pp 1-6, 2022.
of deep learning for renewable energy forecasting”, Energy
Conservation and Management, 198, pp. 1-14, 2019.
[2] P. Kumari, D. Toshniwal, ”Long short term memory-
convolutional neural network based deep hybrid approach
for solar irradiance forecasting”, Applied Energy, 295, pp.
1-20, 2021.
[3] Z. Yongning, Y. lin, L. Zhi, S. Xuri, L. Yansheng, J. Su, ”A
novel bidirectional mechanism based on time series model
for wind power forecasting”, Applied Energy, 177, pp. 793-
803, 2016.
[4] Y. Dazhi, P. Jirutitijaroen, W.M. Walsh, ”Hourly solar
irradiance time series forecasting using cloud cover index”,
Solar Energy, 86, pp. 3531-3543, 2012.
Abstract. As the number of distributed power systems and facilitates the extraction of maximum power from
that use non-linear loads has increased, improving the PV panel. The DFIG-based WECS utilises a
power quality has become a top priority for PWM rectifier, which is in turn controlled by a PI
academics. In this work, we look at how the controller, to complete the AC-DC conversion.
harmonics in a distributed power system may be Reference current generation is essential for
reduced with the use of a device called a Distribution harmonic removal, and this is achieved by the
S tatic S ynchronous Compensator (D-S TATCOM). Hysteresis Current Controller. MATLAB is used to
When compared to other FACTS devices, D- simulate the complete regulated process, and the
S TATCOM has more reliable voltage stability results show that the suggested method provides
because to its built-in voltage regulator. As a result of higher power quality with less distortion than other
its high voltage-gain ratio, LUO converter is methods.
employed. Using an ANFIS -based MPPT (Maximum Keywords: maximum power point tracking, PV
Power Point Tracking) guarantees regulated output system, power quality,Point of Common Coupling
storage batteries, tracking systems, power Because it avoids problems seen by other
conditioning circuits, and other components to compensating devices, the D-STATCOM is used in
deliver electricity into the utility grid in a solar PV this setup to keep power disturbances to a
system. When exposed to sunlight, photovoltaic minimum. Power quality problems, such as voltage
cells that are built of semiconductors create direct sag and voltage swell, impact the source voltage
electric current. The amount of solar radiation that and introduce harmonics into the source current
falls on the photovoltaic panel's surface influence when three-phase AC electricity is delivered to a
the amount of electric power it generates [8-11]. nonlinear load. The voltage sag and swell can be
effectively minimised using STATCOM, but the
II PROPOSED SYSTEMDESCRIPTION
source current harmonics cannot. In Figure 1, we
see a block representation of the suggested system.
When it comes to power quality concerns
like voltage sag, swell, harmonics, etc., FACTS
controllers have shown to be indispensable.
The Luo converter is improved using the the source voltage and source current to
ANFIS-based MPPT approach so that it can follow generate the reference current by using the
the MPP voltage of the PV system. Combining DQ theory. To regulate the inverter's functioning,
features of ANN and FLC, the ANFIS based MPPT the Hysteresis Current Controller (HCC) generates
approach is regarded as a powerful artificial PWM pulses by contrasting the latter with a
intelligence tool. An inverter uses a PWM rectifier reference current. There is an LC filter between the
to convert the alternating current (ac) electricity inverter and the Point of Common Coupling (PCC),
produced by the Wind Energy Conversion System which regulates the current flow. The inverter
(WECS) into direct current (dc). The pulses from current isinjected in to the distribution line with
the PWM generator regulate the PWM rectifier's particular phase angle and magnitude so as to
output. The PI controller compares the reference regulatesource current at the rated sinusoidal
voltage and actual voltage so as to waveform and in phase with the source voltage.
produce an error signal which initiates the PWM
generator to produce PWM pulses. The output of III PROPOSED MPPT
PWM rectifier is stored in the capacitor bank. The
constant DC voltage thus obtained from both the An ANFIS based MPPT controller which
PV system and WECS is fed to the inverter in order has the properties of both fuzzy logic controller and
to make its output constant. To reduce the source neural network gives excellent tracking accuracy
current harmonics, it is necessary to find the and quick convergence speed in comparison with
reference current from the source current. other artificial intelligence MPPT methods . It
RNN based reference current generation compares possesses improved fuzzy membership functions
having identical neural trained data. The back maximum power point without introducing any
propagation approach is used to train the fuzzy oscillation (MPP). When establishing fuzzy rules, it
membership functions so as to obtain tuned is recommended to do so only after a thorough
membership parameters. A fuzzy logic controller is analysis of the system's behaviour. The process
used to convert linguistic variables to numerical flow for the proposed MPPT approach is shown in
values. Unlike conventional MPPT algorithms, Figure 2.
ANFIS-based MPPT reliably pinpoints the
(a) (b)
Figure 3: (a) Voltage input waveform and (b) current input waveform
The voltage and current input of the LUO converter is not stable. The current is at a high value of 550A
is seen in Figure 3. A voltage of 68V is fed to the at 0.08sec and from 0.15sec, current of 420A is
converter, however the current fed to the converter supplied to the LUO converter.
(b)
(a)
Figure 4: Waveforms of converter (a) Output voltage and (b) Output current
The output voltage and current waveform stable voltage 600V and 38A is obtained from the
of the LUO converter is shown in Figure 4. A converter at 0.14sec and 0.15sec respectively.
(a)
(b)
Figure 6: Waveforms representing (a) Grid voltage and (b) Grid current
Voltage and current waveforms in the grid are voltage or grid current. It has been measured that
shown in Figure 7(a) and 7(b), respectively. There 330V and 10A are the maximum voltage and
are no hiccups or fluctuations in either the grid current, respectively.
(b)
(a)
Figure 7: (a) Real Power and (b) Reactive Power Waveforms
The value of real and reactive power, as illustrated DC link voltage is included in Figure 8(a) and 8(b)
in Figure 7 is 5500W and -50VAR respectively. respectively.
The waveforms that represent the power factor and
(a) (b)
Figure 8: Waveforms of (a) Power factor and (b) DC link voltage
The proposed technique of DSTATCOM based
hybrid renewable energy system is highly V CONCLUSION
successful in maintaining a unity power factor. A
steady DC link voltage with a magnitude of 600V The booming integration of many
is maintained from a quick time of 0.14s. renewable energy sources and sensitive loads to the
distribution energy system has sparked concerns
about maintaining the power quality. The ceaseless
supply of power to the dis tribution energy system is
provided from a hybrid energy system, which
REFERENCES
The design part of half adder circuit consists of Truth table, B. FULL ADDER
k-map simplification and logic diagram.
Full adder circuit employs on three inputs A,B,Cin
Table 1. Truth Table for Half Adder and two outputs Sum(S) and Carry (Cout) [1-2]. Fig.6
represents the block diagram of Full adder circuit.
The truth table of full adder is as follows: input AND gate IC – 7408, two input OR gate IC-7432
Table 4. Truth Table for Full Subtractor AND not GATE. The combinations of various inputs are
verified using the Fig.17
Abstract—Many applications use SRAM as the core area, and delay. This over-head disability will become
memory architecture, which necessitates the development of severe in higher-range memory capacities. As an
various SRAM cell architectures. A few design methods of alternative, low-power designs have emerged using wider
SRAM cells use various low-power techniques, but adiabatic technologies, reversible logic is one amongst the best. The
logic, such as reversible gates, proves its performance logic that retains the information without loss of energy is
improvement by providing zero heat dissipation. In this called reversible logic. The literature [9, 10] suggests that
paper, the design of each 6T, 9T, and 12T SRAM cell using the loss of energy in irreversible computations in the form
Feynman and Toffoli gates is presented. While comparing the of heat will be an amount of KT × ln2 Joules for every bit,
results of both Feynman and contemporary CMOS based
where K is Boltzmann's constant and T is temperature in
SRAM designs, it is observed that the critical path delay is
reduced and speed improvement is raised by 62.7%, 82.3%,
kelvins. Due to the tremendous rise in memory usage in
and 69.2%, respectively. It is also observed from the results applications, the need for low-power memory designs has
that the maximum operating current Imax is less in Toffoli become essential in recent years. However, the
based SRAM designs, and the reduction advantage is 99.5% computations that take place in conventional memory are
and 40% in 9T and 12T cells, respectively. Furthermore, the irreversible. In general, heat dissipation occurs in the
area reduction advantage is observed in Feynman-based memory cells during the write operation of data because the
SRAMs at 17%, 63.5%, and 10.8%, respectively, and is much existing data is re-placed with the new data. Sometimes
more comparable to CMOS-based SRAMs. false operations due to presence of errors also leads to
energy distribution [11]. These causes an irreversible
Keywords— Reversible logic, Static RAM cells, low power, operations. The same advantage is brought into SRAM cell
area reduction, adiabatic logic design with reversible circuit design [12]. The main
challenge in reversible logic designs is to reduce the number
I. INTRODUCTION of garbage outputs and unused inputs as well. The
The fundamental problem that is always prone to design competent SRAM cell design for 6T, 9T, and 12T is
upgradation in SRAM is data instability due to its write and showcased in this paper with minimised garbage outputs
read line architectures. The major influencing parameters and with minimised quantum delay and quantum cost. The
for data stability in SRAM cells are identified as supply following sections are arranged as follows: Section II
voltage, threshold voltages, static noise margin, leakage explains the literature review. Section-III focused on the
current sources, etc. In a 6T SRAM cell, the essential proposed reversible SRAM cell. Section-IV illustrates the
parameter static noise margin (SNM) [1, 2, 3] is a measure results and analysis, followed by Section-V conclusions.
of read and write margin violation. This causes an increase
in the delay while performing read and write operations [4]. II. REVIEW ON RELATED LITERATURE:
Another parameter is scaling [5]. As the technology goes A. Existing SRAM Designs and Limitations
down to the marginal level, it will have a significant impact
on SRAM cells, causing random fluctuations in behavioral A contemporary memory cell using a number of six
characteristics. This in turn causes variations in transistor transistors is shown in Fig.1. The basic functionality of
threshold voltage and leakage current levels [6]. As a SRAM relies on write and read operations. In a write
consequence, the reading and writing margins have violated operation, the cell stores the corresponding bit value. For
their parametric ratings. As a result, the SRAM cell this, the value to be written has to be placed on bit lines and
becomes unsteady under low power supply operations. In then the logic line WL has to be asserted. By observing
addition to that, huge static power results due to large nodes Q(QB), one can understand the core cell's stored
leakage current that is caused by the low threshold voltage value. If Q(QB) is held at logic high, it indicates a ‘1’(0) is
and thin gate oxide [7, 8]. This makes it difficult to attain stored, else a ‘0’(1) is stored. While in the read operation,
applications at lower technology nodes. Given the read ‘1’ needs precharge of both bit lines in prior to asserting
instability of SRAM 6T due to decreased SNM and the write logic line. This allows Q(QB) value to be
increased write and read delays, literature has suggested transferred through access transistors towards bit lines
using separate read and write lines to ensure that the SRAM BL(BLB). If BL (BLB) is observed with ‘1’(0) indicates
cell operates without delay. This led to the evolution of the read value is ‘1’(0). whereas reading ‘0’ needs a simple
higher designs for SRAM cells. Hence, in 9T, which uses a assertion of the WL line. The size of the bit line and driver
separate reading line, and in 12T, which uses separate transistors plays an important role in the read operation,
reading as well as writing lines. This results in an upgrade since voltage division influences the read stability. In the
of stability in the core cell. Despite the read/write stability similar way, the write operation causes an instability on an
of SRAM using a larger number of lines, it is prone to unselected column when the word line is activated. Indeed
suffering from performance overhead in terms of power, the essential influencing parameters on read stability are
scaling on supply voltage, cell ratio and temperature [13].
Fig. 3. SRAM 12T Architecture Fig. 4. Reversible gates (a) Feynman (b) Toffoli (c) Peris (d) Fredkin
PARAMETER CMOS FYNMAN Fig. 12. Comparison for maximum current requirement in proposed
6T SRAM Cell reversible SRAMs
0.066- 0.206- 0.47-
POWER
1.43uW 0.41mW 52.7uW
DELAY, ns 1.69ns 0.63ns 0.08ns
CURRENT, mA 0-0.814 0.19-0.36 0-0.48
AREA, um2 81.6 67.7 108
9T SRAM Cell
0.15- 0.20- 0.46uW-
POWER
0.86uW 0.574mW 0.17mW
DELAY,ns 2.66ns 0.47ns 0.97ns
CURRENT, mA 0-0.743 0.19-0.66 0-0.53
AREA, um2 125.9 117.9 149.2
12T SRAM Cell
0.6- 0.51- 1.05uW-
POWER
3.24uW 1.57mW 0.74mW Fig. 13. Critical path delay comparison in proposed reversible SRAMs
DELAY,ns 2.5 0.77 1.04
CURRENT, mA 0-1.6 0.53-1.71 0-1.26
AREA, um2 202.6 180.7 248.3
from 6T to 12T while looking for the improvement of Static [12] M. Morrison and N. Ranganathan: Synthesis of dual-rail adiabatic
Noise Margin (SNM). The Toffoli-based SRAM has a lower logic for low power security applications, Computer-Aided Design
of Integrated Circuits and Systems, IEEE Transactions on,
operating current (Imax) than all other counter 33(7):975–988, July 2014.
configurations. As the design scales from 6T to 12T, the [13] Sreekala K .S, Krishnakumar S., “RNM Calculation of 6T SRAM
area in a Feynman-based SRAM cell approaches that of a Cell in 32nm Process Node based on Current and Voltage
CMOS-based SRAM cell. Primarily, it is observed that the Information”, Indian Journal of Science and Technology, Vol
reversible logic designs are far better in improving the 10(29), DOI: 10.17485/ijst/2017/v10i29/116049, August 2017.
overall performance of the design parameters. It is observed [14] Ajay Gadhe, Ujwal Shirode, “Read stability and Write ability
with Feynman gate SRAM from 6T to 12T that the critical analysis of different SRAM cell structures”, International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622
path delay is reduced and the performance in speed is Vol. 3, Issue 1, January -February 2013, pp.1073-1078.
improved by 62.7%, 82.3%, and 69.2%, respectively. [15] P. N. V. Kiran and N. Saxena, "Design and analysis of different types
Despite the speed improvement, the power dissipation is not SRAM cell topologies," 2015 2nd International Conference on
a major issue and is observed to be a maximum of 1.5mW Electronics and Communication Systems (ICECS), 2015, pp. 1060-
in Feynman gate and 0.7mW in Toffoli gate based 12T 1065, doi: 10.1109/ECS.2015.7124742.
SRAM, respectively. It is observed that Imax in Toffoli [16] Edward Fredkin and Tommaso: Toffoli. Conservative logic,
SRAM is less than the other two designs, and the reduction International Journal of Theoretical Physics, 21(3-4):219–253,
1982.
advantage is approximately 99.5% and 40% in Feynman
and Toffoli gate based 12T SRAMs, respectively. The area [17] S.N. Mahammad and K. Veezhinathan: Constructing online testable
circuits using reversible logic, Instrumentation and Measurement,
reduction advantage in Feynman SRAM from 6T to 12T is IEEE Transactions on, 59(1):101– 109, Jan 2010.
observed to be 17%, 63.5%, and 10.8%, respectively, and is [18] S.D. Kumar and S.K. Noor Mahammad: A novel SRAM cell design
much more comparable with CMOS-based SRAM as the using reversible logic, 2014 3rd International Conference on Eco-
design progresses toward SNM improvement. Hence, it is friendly Computing and Communication Systems, 978-1-4799-
observed that Feynman gates can be used for the SRAM cell 7002-5/14, 2014 IEEE Computer Society, Pp:1-4.
design where the need is for high speed and a reduction in [19] M. Aditya, B. Balaji: Performance Analysis Of SRAM Cell Using
the area consumed. The Toffoli gate is more suitable for the Reversible Logic Gates, International Journal of Pure and Applied
Mathematics, Volume 117 No. 19 2017, 203-207
de-signs of SRAM cells where there is a requirement for a
[20] Chinmay Sharma, Varun Chhabra, Balwinder Singh, Hitesh Pahuja:
reduction in power dissipation and maximum current Design of SRAM array using Reversible logic for an efficient SoC
(Imax). design, Proceedings of the International Conference on Inventive
Computing and Informatics (ICICI 2017), IEEE Xplore Compliant -
REFERENCES Part Number: CFP17L34-ART, ISBN: 978-1-5386-4031-9.
[21] O. Mohana Chandrika, M. Siva kumar: Design and analysis of
[1] Paridhi Athe S. Dasgupta: A Comparative Study of 6T, 8T and 9T SRAM cell using reversible logic gates towards smart computing,
Decanano SRAM cell, 2009 IEEE Symposium on Industrial the Journal of Supercomputing, Springer Nature,
Electronics and Applications (ISIEA 2009), October 4-6, 2009, https://doi.org/10.1007/s11227-021-03851-z, Pp: 1-20
Kuala Lumpur, Malaysia. pp. 8.10-8.11. [22] M. Morrison, M. Lewandowski, R. Meana and N. Ranganathan:
[2] S, Birla, R.K. Singh, and M. Pattnaik: Static Noise Margin Analysis Design of static and dynamic RAM arrays using a novel reversible
of Various SRAM Topologies, IACSIT International Journal of logic gate and decoder, International Conference on
Engineering and Technology, Vol.3, No.3, 2011. Nanotechnology, 2011, pp. 417-420, doi:
10.1109/NANO.2011.6144407.
[3] Tejinder Kaur, Rachna Manchanda, Chanpreet Kaur: Parameters for
Stability of Reconfigurable Memory and 6T SRAM Cell, [23] Thapliyal, H., Ranganathan, N., Kotiyal, S. (2014): Reversible Logic
International Journal of Innovative Technology and Exploring Based Design and Test of Field Coupled Nano computing Circuits.
Engineering (IJITEE), ISSN: 2278-3075, Volume-8, Issue-9S, July In: Anderson, N., Bhanja, S. (eds) Field-Coupled Nano computing.
2019, Pp: 887-892. Lecture Notes in Computer Science, vol 8280. Springer, Berlin,
Heidelberg. https://doi.org/10.1007/978-3-662-43722-3_7.
[4] Neil H.E.Weste, David Harris and Ayan Banerjee: CMOS VLSI
DESIGN – A Circuits and System perspective, Pearson eduction, [24] H. Thapliyal and N. Ranganathan: Design of Reversible Latches
Third edition, ninth impression 2009, pp. 179. Optimized for Quantum Cost, Delay and Garbage Outputs, 2010
23rd International Conference on VLSI Design, 2010, pp. 235-240,
[5] Madhura, S. "A Review on Low Power VLSI Design Models in doi: 10.1109/VLSI.Design.2010.74.
Various Circuits." Journal of Electronics 4, no. 2 (2022): 74-81.
[6] Shigeki Ohbayashi, Makoto Yabuuchi, Koji Niiand, Susumu
Imaoka: A 65-nm SoC Embedded 6T-SRAM Designed for
Manufacturability With Read and Write Operation Stabilizing
Circuits, IEEE journal of solid-state circuits, Vol. 42,April 2007,
pp820 829.
[7] Sanjeev K. Jain and Pankaj Agarwal: A Low Leakage and SNM Free
SRAM Cell Design in Deep Sub micron CMOS Technology,
Proceedings of the 19th International Conference on VLSI
Design,May-2016.
[8] Rajasekhar Keerthi and Chein-in Henry Chen: Stability and Static
Noise Margin Analysis of Low-Power SRAM, I2MTC 2008 - IEEE
International Instrumentation and Measurement Technology
Conference, Victoria, Vancouver Island, Canada, May 12-15, 2008.
[9] Landauer, R.: Dissipation and noise immunity in computation and
communication, NATURE VOL. 335, 779-784, 27 October 1988.
[10] Landauer, R.: Irreversibility and heat generation in the computing
process, IBM J. Res. Dev. 5, 183-191 (1961).
[11] Darney, P. Ebby. "Design of a Customized Intelligent Electronic
Device for Power Circuit Safety." Journal of Electronics and
Informatics 4, no. 3 (2022): 142-151.
Abstract— In the power electronic applications 1. These applications operate at more than 10kHz
the power electronic converters represent its usefulness frequency, this means the switching losses would
with the advance topology to drive the Grid. In this paper not exist had has no role at the operating
the multilevel inverters are designed with intelligent frequencies, here only thing is there will be
control techniques which given a precise output at the forward loss which made three level inverter cost-
Grid. The paper proposes a three phase three-level effective.
inverter with advance Neuro-Fuzzy technique which is
used to generate a constant voltage at the grid, 2. When the power crosses the 10kW, the higher
connected a BLDC motor as a reference grid with the level of activation process is required for the
influence of FPGA PWM pulses to drive switches. The systems with lower powers, for this 12 drivers are
three phase three level inverter is designed with a six needed instead of 6 IGBT drivers, hence these
power switches, the AC output is given to BLDC motor, devices cost will be more. However with larger
the speed is measured and compared with rated speed,
power less number of IGBT drivers reduces the
the error signal is taken into an Neuro-Fuzzy controller,
the output of controller is taken as a reference to
device sizes, anyhow the heat sink elements
generate PWM pulses from FPGA using Verilog prevails and makes the device cost-effective.
programming to drive switches, the proposed modeled is In the section II the basic of three level phase inverter is
simulated with ModelSim tool of MATLAB/Simulink explained in comparison with Two-level inverter and their
environment respective voltage waveforms are shown, in the section III
Keywords— Inverter, FPGA-Field Programmable Gate the proposed system is presented with the block diagram
Array, Neuro-Fuzzy, Neural Networks, Xilinx ISE, Verilog, with the explanation of each block, in the section IV, the
ModelSim. basic of XILINX Verilog programming is formulated with
I. INTRODUC TION respect to the proposed system and also the basic
advantages of using FPGA based system is explained, in
In the power electronic industries the Multi-level the section V a detailed basic information about the Neuro-
inverters designed is a crucial factor to get the precise Fuzzy system, the section VI presents the simulation circuit
output in the high frequency switching applications, and waveforms of different stages of inverter finally in the
hence many methods are proposed for real time power
section VII the whole system is concluded.
electronic applications, the conventional controllers such
as microcontroller and DSP controllers are given a II. THREE PHASE INVERTER
widespread applications in controlling or driving power
electronic switches but they [1] are well suited only for Traditional 2-level and 3-level inverters display
the low and medium frequency applications. The VLSI characteristics that are common to DC-AC converters.
based logic is considered as the solution for high From the available direct current, both methods can
frequency applications. The Verilog programming is a generate alternating voltage with variable frequency. Only
straight forward programming tool with user-friendly
the use of IGBT switches, diodes, and capacitors will be
instruction with less complexity, the FPGA
different between these two inverters. The three-level
programmable device is the device used with the Verilog
programming to execute the model, since the FPGA is single-phase inverter has three output stages as opposed to
having a very wide development period and the feature of the two-level inverter's two, which has four switches with
re-programmability and also it is having a capacity to four free-wheeling diodes and two additional clamping
drive the high frequency power electronic converters. The diodes to link the neutral point.
wide range of power electronic converters application is
based on three level phase inverters, they have a good In contrast to the two-level design, where the IGBT must
response at MW power level. switch the entire link voltage, the three-level configuration
The three level inverter topology is cost effective with the only causes the IGBT to lose half of the DC link voltage.
following applications: Multi-level Inverters has advantage over standard two level
and three level inverter because of less cost, complexity,
• UPS-Uninterruptible power supplies EMI, voltage tension and switching losses [3]. The most
widely used topologies for MLI are flying capacitors,
• Inverters with the high frequency output.
clamped diodes and cascaded H-bridge inverters.
• The higher clock frequencies dynamic Servo- The DC link capacitor needs to be built so that it can cut the
Drives which are designed for rapid regulation. DC link voltage in half. This occurs automatically in almost
all inverters with a link voltage of about 600 V because two
• Inverters with smart grid applications such as-
weakly-charged capacitors are connected in series.[5]
Battery Management, [2] Regenerative industrial
There are numerous intricate commutation methods for
supply.
switching procedures in a three-level phase. In order
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 93
to do
The main Two features for the above applications:
this, the module must have short current channels, an
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
efficientDVD
layout, and a CFP22CB5-DVD:
Part Number: gate control circuit that takes this
ISBN: 978-1-6654-6083-5 and they include very significant restrictions. These
into account. This is necessary to reduce switching surges processors, especially those [3] with higher operating
and increase efficiency using the highest link voltage frequencies, are unable to complete the necessary
possible. calculations in the allotted time. As a result, the gate control
circuit and protective circuit for power semiconductors are
almost usually stored in programmable logic, such as in a
CPLD or FPGA, in at least part. A powerful, simple single-
chip solution is produced when control is solely handled by
an FPGA. A fly back converter and an initial switching
power supply are used to provide a 15 V dc voltage from
the DC connection voltage in order to power the drivers.
This is utilised to provide the gate drivers for the lower
IGBTs directly (IGBT 4). For the remaining voltages,
which are electrically isolated for each gate drives from 3.
III. PROPOSED BLOCK DIAGRAM
The output of the FPGA block has the PWM gate pulses
with duty cycle, here the voltage of these pulses is 3.3V,
hence the gate pulses are amplified using interfacing and
Figure 2: A three-level inverter (b) can reproduce the desired sinusoidal driving circuit, from which the 12V gate pulses is obtained,
voltage curve better than a conventional two-level inverter (a). required to drive the IGBT switches.
V. NEURO-FUZZY LOGIC
Figure 4: If the target value of the voltage vector is not within the 24
sectors.
XILINX:
The below figure 7 shows the three phase inverter with the
load as induction motor drive, the controlling of switches in
the three phase inverter with PWM pulses obtained from
the Neuro-Fuzzy system, In the below figure there is no
implementation of FPGA pulses and also no action taken to
get a constant speed/voltage required to a motor to run in a
rated speed.
Figure 8: Simulation circuit with FPGA pulses
Figure 9: Three phase inverter waveform Figure 11: RTL schematic of proposed DPWM Architecture
VII. CONCLUSION
The Multilevel inverters, here the three level inverter is
designed with three different control techniques, the three
level inverter with system PWM pulses is designed and
simulated, the same inverter is designed and simulated with
Neuro-Fuzzy PWM pulses and the output is connected to
the BLDC motor, The three phase three level inverter is
designed and simulated using MATLAB Simulink with
Neuro-Fuzzy controller to run the BLDC motor with a
constant speed and lastly the same three phase three level
Figure 18: Three Phase Three-Level Inverter inverter is designed with FPGA PWM hardware pulses
which is simulated in Hardware in Loop
MATALB/SIMULINK ModelSIM tool, for mitigation of
harmonics from which the output voltage at the load will be
constant without any error at the grid.
REFERENCES
1. Ameer Ahamed Z, Dr. V K Sharma, Dr. Anuj Jain ,‘Survey on
Neuro-Fuzzy Based Single Phase Multi-Level Inverters Using
FPGA’, International Journal of Engineering & Technology. 7.
1. 10.14419/ijet.v7i3.12.15851.
2. Ameer Ahamed Z, Dr. V K Sharma, Dr. Anuj Jain, ‘Simulation
of Single Phase Five-Level Inverter using Fuzzy Logic and
Neural Networks’, 2020 2nd International Conference on
Innovative Mechanisms for Industry Applications (ICIMIA),
2020, pp. 510-514, doi: 10.1109/ICIMIA48430.2020.9074919.
3. Ameer Ahamed Z, Dr. V K Sharma, Dr. Anuj Jain, ‘Design of
Neural Networks fuzzy logic based three level inverter using
FPGA’, of Journal of the Maharaja Sayajirao University of
Baroda. ISSN: 0025-0422.Volume-54, No.2 (XIIX) 2020.
Ameer Ahamed Z, Dr. V K Sharma, Dr. Anuj 99
4. IEEE
978-1-6654-6084-2/22/$31.00 ©2022 Jain, ‘Speed
Figure 19: FPGA pulses modeled in MATLAB/SIMULINK Control Of BLDC Motor Using Multilevel Inverters And Pwm
Generation Using ANN’, International Journal of Mechanical
Proceedings
EngineeringofKalhari
the International Conference
Journals, ISSN: on Automation,
0974-5823 Computing
Vol. 7 No. 6 and Renewable Systems (ICACRS 2022)
DVD
June,Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
2022.
5. Fatih Korkmaz, smail Topaloglu and Hayati Mamur ”Fuzzy
logic based direct torque control of induction motor with space
vector modulation” , International Journal on Soft Computing,
Artificial Intelligence and Applications (IJSCAI), Vol.2, No.
5/6, December 2013.
6. S. Lisauskas, D. Udris, D. Uznys “Direct torque control of
induction motor drive using fuzzy controller”,
ELEKTRONIKA IR ELEKTROTECHNIKA, ISSN 1392-
1215, VOL. 19, NO. 5, 2013.
7. C.Bharatiraja , R.Latha “A 3 - Dimensional SVPWM
algorithm, its FPGA - implementation for multilevel inverters”
Journal of Electrical Engineering.
8. K.R.Rekha, Shalini Vashishtha “Survey on FPGA Based Space
Vector PWM Motion Control”, IJAREEIE ISSN (Print) : 2320
– 3765 10.15662/ijareeie.2015.
9. Qamar Muhammad Attique, Yongdong Li, and Kui Wang, “A
Survey on Space-Vector Pulse Width Modulation for
Multilevel Inverters”, CPSS TRANSACTIONS ON POWER
ELECTRONICS AND APPLICATIONS, VOL. 2, NO. 3,
SEPTEMBER 2.
10. Aasha Chauhan, Dr. Ravindra Pratap Singh “A STUDY
PAPER BASED ON SPACE VECTOR PULSE WIDTH
MODULATION TECHNIQUE FOR POWER QUALITY
IMPROVEMENT”, International Journal of Science
Technology & Management Volume No.04, Special Issue
No.01, February 2015 ISSN 2394-1529.
11. Qamar Muhammad Attique, Yongdong Li, and Kui Wang, “A
Survey on Space-Vector Pulse Width Modulation for
Multilevel Inverters”, CPSS TRANSACTIONS ON POWER
ELECTRONICS AND APPLICATIONS, VOL. 2, NO. 3,
SEPTEMBER 2017.
12. J. Selvaraj and N. A. Rahim, ‘‘Multilevel inverter for grid
connected PV system employing digital PI controller,’’ IEEE
Trans. Ind. Electron., vol. 56, no. 1, pp. 149–158, May 2019.
13. E.-J. Lee, S.-M. Kim, and K.-B. Lee, ‘‘Modified phase-shifted
PWM scheme for reliability improvement in cascaded H-
Bridge multilevel inverters,’’ IEEE Access, vol. 8, pp. 78130–
78139, 2020, doi: 10.1109/ACCESS. 2020.2989694.
14. D. Lyu, Y. Sun, C. A. Teixeira, Z. Ji, J. Zhao, and Q. Wang,
‘‘A modular multilevel dual buck inverter with adjustable
discontinuous modulation,’’ IEEE Access, vol. 8, pp. 31693–
31709, 2020.
15. TY - JOUR AU - Alateeq, Ayoob AU - Almalaq, Yasser AU
- Alateeq, Abdulaziz PY - 2022/06/09 SP - 1159 T1 -
Optimization of a Multilevel Inverter Design Used for
Photovoltaic Systems under Variable Switching Controllers VL
- 10 DO - 10.3390/pr10061159 JO - Processes.
16. TY - JOUR AU - Kola, Muralikumar AU - Pathipooranam,
Ponnambalam PY - 2021/06/04 SP - 1 EP - 1 T1 -
Comparison of Fuzzy and ANFIS Controllers for Asymmetrical
31-Level Cascaded Inverter with Super Imposed Carrier PWM
Technique VL - PP DO - 10.1109/ACCESS.2021.3086674 JO
- IEEE Access.
17. JOUR, Hossain Lipu, M. S., Miah, Md. Sazal Ansari, Shaheer
AU - Meraj, Sheikh, Hasan, Kamrul, Elavarasan, Rajvikram,
Mamun, Abdullah, Zainuri, Muhammad, Hussain, Aini
2022/02/13 “Power Electronics Converter Technology
Integrated Energy Storage Management in Electric Vehicles:
Emerging Trends, Analytical Assessment and Future Research
Opportunities” VL - 11 10.3390/electronics11040562
Electronics.
18. Vafaeenezhad, H., Sadegh Ghanei, S. H. Seyedein, H. Beygi,
and Mohammad Mazinani. "Process control strategies for dual-
phase steel manufacturing using ANN and ANFIS." Journal of
materials engineering and performance 23, no. 11 (2014):
3975-3983.
Mailid: kirubad@gmail.com,sgomathi411@gmail.com,kavithat.it@veltechmultitech.org,sais20338.ec@rmkec.ac.in,
raje20331.ec @rmkec.ac.in,tdsubha2010@gmail.com
converters include power factor correction (PFC), In CCM, the modified SEPIC equations can be
energy unit (EU) systems, PV arrays, and many written as
more. The modified SEPIC converter was built to
eliminate ripple in the output voltage and data
current. Its etymological origins can be traced back to
……………………………… (1)
a method that has been used to structure basic,
complex, and newly-introduced systems based on The modified SEPIC converter duty ratio is
user input, known as fuzzy logic. [9]. When precise
mathematical plans are unrealistic, fuzzy logic
controllers become a suitable alternative. During the
halfway point of the duty cycle, the inductor expands ………… (2)
and clears out any accumulated debris. Capacitor
yield was the sum of currents through two diodes Where the voltage transfer function is C and the
(I1+I2), which is not the yield DC and lowers the efficiency of the converter is 𝜂, Resistance to
yield capacitor wave current (IOUT) and helps to minimum and maximum loads are
complete the duty cycle. The total DC yield from
both diode streams is monitored at a precise time
when the duty cycle was monitoring for 0%, 50% and …………………………..(3)
100%. Capacitor output should channel the inductor
growth currents under any effect based on ideal and
working centers. High-step-up converters are
implemented with a single yield capacitor and a
coupled inductor connected in series and parallel (10-
………………………..(4)
11). The interleaving strategy manages each switch,
and PWM sign difference remain 1800. Since the
current magnitude through each inductor is reduced
between stages, the size and inductance of the ……………………… (5)
inductor, as well as the information current wave can
be made smaller. II. Research Gap
DC to DC Modified SEPIC high step-up The dynamic response of the modified high step-up
Converter converter-DC-DC RL load system must be improved.
However, the background literature does not cover
The capacity of the modified SEPIC converter is
using a proportional-integral/Fuzzy-logic-controlled
meant to act as a voltage step-up converter from one
two-loop modified SEPIC converter-DC RL load
level to the next level. Figure 1 is an example of the
system to improve the dynamic response. Therefore,
circuit used in DC-DC high step-up converter.
this paper proposes a Fuzzy-logic-controller for the
DC-RL Load System with a modified SEPIC
converter.
FL Controller
If the input is not normalized, a gain is applied to
make it normal, and the output is then scaled by this
gain. An adjustment to the input-to-output scale
factor is necessary if the input's usable range is to be
Figure 1: DCDC-Modified SEPIC-Converter-Circuit expanded or contracted. This controller design
reduces T Rise, T Settle, E steady.
Simulation parameters
Vin 15V
C1 1000µF
L1, L2 5µH
Figure 2: Block Diagram of Proposed System
C2,C3 2000µF
Frequency 20Khz
Mosfet IRF840
Diode IN4007
R 50Ω
V0 165V
Figure 9: Power
Figure 13: Current through RL Load Figure 16: Input Voltage of Modified SEPIC
Converter
A modified SEPIC converter with a closed-loop FL- Figure 17: Voltage across RL-Load
FL controller is shown in Figure 15. According to
Fig. 16, the input voltage is 20V. The RL-load
voltage is 165V, as shown in fig. 17. Fig. 18 displays
the 3.35A current through the RL load. The 550W of
power is displayed in Figure 19.
the original SEPIC converter system to those of the FL-FL controller. The FL-FL controller allowed for a
modified system using PI-PI and FL-FL controllers; 76% improvement in efficiency, with the steady-state
the Rise time was reduced from 0.43 s to 0.05 s error going from 1.60 V to 0.12 V. Results show that
thanks to the FL-FL controller. Reduced from 0.54 s the closed-loop FL-FL controller in the modified
to 0.07 s, the Peak time is a direct result of the FL-FL SEPIC converter system is superior to the PI-PI
controller. The FL-FL controller allows us to reduce controller.
the settling time from 0.93 s to 0.09 s, a significant
improvement. Utilizing the FL-FL controller reduced
the steady-state error from 1.60 V to 0.12 V. As seen
Table -2 Comparison of Output Parameters
in the results, the modified SEPIC converter system's
closed-loop FL-FL controller outperforms the PI-PI Converter Vin(V) Vo(V) Vor(V) Ior(A) Po(W)
controller in terms of overall system performance.
IV. Conclusion
using a closed-loop PI-PI controller. The circuit [10]LiP.IngGuo, Johny.Hung and Nelms RM (2009) Evaluation of
DSP-based PID and fuzzy controller for dc converters. IEEE
layout of a customized SEPIC converter outfitted
Transactions on Industrial Electronics.
with a closed-loop FL-FL controller system is [11] Suganyadevi et al, “Performance Comparison of Different
displayed in this simulation. We assess and contrast Bidirectional DC-DC converters For Solar PV System” Journal of
Electrical Engineering,Vol.1.pp 1-6,2019.
the PI-PI and FL-FL controllers' time-domain [12] A.Deepak et al, “Photovoltaic based Induction motor speed
parameters. Reduce the Rise time by 50% with the control Using SEPIC converter” International Journal of Advanced
FL-FL controller, from 0.43 to 0.05 seconds. Reduce Science and Technology, Vol.29.pp 3932-3945,2020
[13]Gomathi, S et al., “Multiple Input Bidirectional DC-DC
the Peak time from 0.54 s to 0.07s by using the FL- converter” International Journal of Advanced Engineering
FL controller. The settling time is reduced by the FL- Technology, Vol.7.pp 959-963, 2016.
FL controller from 0.93s to 0.09s. When using the
FL-FL controller, the steady-state error decreases
from 1.60V to 0.12V. According to the results, the
modified SEPIC converter system's closed loop FL-
FL controller is superior to the closed loop PI-PI
controller.
V. References
I. INTRODUCTION
Distributed generation is a supple technology that
can be benefited to lower the cost of service [1]. It is a
encouraging solution to the instituted problems in the power
system such as power loss, voltage regulation, etc.
Installation of distributed generators in suitable places can
upshot in more energy losses and voltage instability which
leads to higher operating costs [2-3]. However, the Fig.1 Electrical network
placement of Distributed generators has significant
improvement on the power loss reduction and magnification In this paper, most advantageous allocation and
of voltage profile [4]. sizing of DG is conceded out using backward/forward
method with PSO technique to find the most favorable
location with proper penetration of power to boost the most favorable siting of dispersed generation setback to
overall health of the network with significant enhancement diminish the loss takes the following steps:
of the efficiency and voltage profile.
Step 1. Read the network line parameters, load values and
II. METHODOLOGY node data, and node voltage values.
As the major objective of this work is to find out the Step 2. Compute the loss with distribution LFA supported
optimal node and sizing of the dispersed generation in the on a backward/forward method.
DN to curtail the active power loss, the following objectives Step 3. Arbitrarily generates a preliminary population of
function is chosen as: particles with random positions and velocities on
Min{PTL}=Min{I2R} (1) dimensions in the solution space. Set the iteration
counter k = 0.
Without breaching the voltage and power balance Step 4. For every particle, if the node voltage is contained
equations i.e. by permissible limits, compute the total loss using
Vmin≤V≤Vmax eqn (3). if not, that particle is unrealistic.
Step 5. For every particle, contrast its intended value with
PG=PD+PTLoss (2) the individual best. If the objective value is lower
QG=QD+QTloss (3) than Pbest, set this value as the current Pbest, and
record the corresponding particle position.
Load current can be computed by, Step 6. Select the particle correlated with the smallest
Ij(k)= (( PLj+jQLj )/ Vj (k-1))* for j= 2,3….N (4) individual best as Pbest of all particles, and set the
value of this Pbest as the current generally best
Imn(k)= In(k) + Σ branch current (5) Gbest.
Vn(k) =Vm(k)- Zmn Imn(k) (6) Step 7. Revise the position and velocity of particle using
equations (2) and (1).
Where, n,m= 2,3…………..N and n != m, N Step 8. If the iteration value attains the utmost boundary,
attend the step 9. if not, situate iteration key k = k +
1, and revisit the step 4.
Step 9. Publish the most advantageous elucidation to the
intended predicament. The unsurpassed position
comprises the finest allocation and range of DG,
and the resultant fitness value correspond to the
lowest active power loss.
REFERENCES
[1] Suresh, M.C.V., Belwin, E.J. Optimal DG placement for benefit
maximization in distribution networks by using Dragonfly algorithm.
Renewables 5, 4 (2018).
[2] R. B. Magadum and D. B. Kulkarni, "Efficiency Enrichment of
Electrical Networks with Different types of Dispersed Generation,"
2022 4th International Conference on Smart Systems and Inventive
Technology (ICSSIT), 2022, pp. 620-623.
[3] Prasad, C.H., Subbaramaiah, K. & Sujatha, P. Cost–benefit analysis
for optimal DG placement in distribution systems by using elephant
herding optimization algorithm. Renewables 6, 2 (2019).
[4] K.R.Padiyar, “FACTS controllers in transmission and distribution”,
New age international publishers, Edition 2007.
[5] MiPower user manual Power research Development and Consultants
Bangalore.
[6] R. B. Magadum and D. B. Kulkarni, "Performance Enrichment of
Distribution Network with DG in Presence of STATCOM In IEEE
conference ICACCS-2020, pp. 701-705.
[7] J. S. Savier and D. Das, “Impact of network reconfiguration on loss
allocation of radial distribution systems”, IEEE Trans. Power Del.,
vol.2, no. 4, pp. 2473–2480, Oct. 2007.
Fig.9 Power Loss Comparison [8] Thomas Allen Short, “Electric Power Distribution Equipment and
Systems”, CRC publishers, Nov-2015.
[9] Vinay J. Shetty, SG Ankaliki, “Electrical distribution system power
IV.CONCLUSION loss reduction and voltage profile enhancement by network
The optimal sizing and siting of DG play a extremely reconfiguration using PSO”, IEEE ICEES-.2019.
significant role in the power system to promote the grid [10] Tejaswi Timasani, “Minimization of power loss in distributed
reinforcement, loss minimization with enrichment of voltage networks by different techniques”, IJSER volume 3, issue-5 pp. 521-
profile. The literature reviews shows that there are different 557
methods for the finest site & sizing of DG in usage. In this [11] R. B. Magadum, V. J. Shetty, A. V. Deshpande and S. D. Hirekodi,
"Enhancement of Available Transfer Capability With Integration of
project, we have believed the PSO method for the finest Unified Power Flow Controller," 2022 4th International Conference
sizing and site of DG in Python software. Proposed methods on Smart Systems and Inventive Technology, 2022, pp. 667-670
are tested by considering the IEEE 33 bus; finally, it is [12] R. B. Magadum and D. B. Kulkarni, "Performance Enhancement of
observed that the optimal location & sizing of DG facilitates Distribution Network by Optimal Placement of Multiple Capacitors
using FKBC", Advances in Intelligent Systems and Computing, vol.
to improve the voltage profile, real power loss minimization 1119, pp. 591-602, 2020.
which helps to improve the power system stability. [13] Soliman, A.M., Emara, S.M. & Nashed, M.N.F. Grid Performance
Enhancement Study Under Restricted Placement and Sizing of PV
Distributed Generation. J. Electr. Eng. Technol. (2022).
Abstract—Automotive manufacturing involves aggregation of solve the problems of lack of complete information and
large quantity of parts into a single product. Genealogy, tracking transparency associated with conventional information
and traceability are vital due to the complexity in handling the tracking. In addition, they can also track the quality of steel
quantum of parts which runs into thousands. Understanding
the nuances of Genealogy, tracking and traceability is of vital goods properly [2].
importance. Moreover, vehicle recall policy mandates automotive
industries to have a robust traceability system in place. This Implementation of an e-commerce system based on
paper focuses on the study of various genealogy and tracking sys- blockchain to track spare parts ownership between original
tems in use globally for automotive manufacturing, the standards equipment manufacturers, suppliers, and consumers. In order
governing them and recommends the use of IT based systems as
optimal for cost control and operations friendliness. to execute these functions, trigger events, and modifiers,
smart contracts were developed. They integrated decentralized
Index Terms—Genealogy, Tracking, Traceability, Cost control, storage services (IPFS) to store spare parts details and quotes
Vehicle Assembly from suppliers [3].
for real-time product lifecycle information. Automation symbol, and must display the data Identifier in paren-
of production processes ensure workflow centred on theses rather than start or stop characters when a data
quality, thereby reduces shop floor time while maximizing Identifier is part of the HRI.
efficiency [12]. • Two-dimensional symbols can include multiple data fields
• Holds Suppliers Accountable (Data Matrix and QR Code).
The genealogy of a product keeps vendors accountable • Use ISO/IEC 16022, Symbology Specification - Data
for maintaining quality standards. By identifying points Matrix, or ISO/IEC 18004, Symbology Specification -
of failure, it can be quickly determined where product QR Code, when dealing with two-dimensional symbols.
quality is lacking. At each stage of the product lifecycle, • Due to the large number of characters that 2D symbols
key metrics for suppliers should be available. Continuous can encode, it may not be possible to create a human-
improvement will be encouraged. The suppliers of first- readable interpretation (HRI) of the symbols. Alterna-
tier products can be linked to the suppliers of sub-tier tively, descriptive text or Human Translation (HT) may
products to enable better traceability [12]. accompany the symbol rather than literal text.
• Improved Customer Satisfaction The benefit of adopting standard is as below:
Manufacturing companies can rest assured that their
• Usage of globally unique identifier
products’ quality is closely monitored throughout the
• Inclusion of human-readable information, such as a sup-
lifecycle. Customer satisfaction increases when fewer
plier name, product description, and lot number
defects and recalls occur, and when the overall quality
• Enables employees training (ie by mandating and moni-
of the products is higher than usual [12].
toring training mandays)
F. Standards governing Genealogy and Tracking • Usage of automated data capture processes (for preventive
This second iteration of the Automobile Industry Action and predictive analytics)
• Emphasis on Inventory and resource management
Group (AIAG) B-4 Standard describes the approved identi-
• Serial tracking
fication and tracking symbols for automotive parts that are
• System auditing
required for genealogy and tracking of the finished product.
• Monitoring and storing data
As part of the standard, linear symbols such as Code 39 and
Code 128 are encouraged, as well as two-dimensional symbols G. Vehicle recall policy
such as the Data Matrix and QR Code. Due to the availability
of auto-discriminating equipment, this standard recommends Manufacturers and distributors are exposed to the biggest
the use of multiple symbols. The goal of this standard is risks when it comes to product recalls. Manufacturers in the
to provide a minimum standard for identifying or labelling automotive industry have the highest rate of product recalls
individual components, subpacks, unit packs, assemblies, kits, (refer fig 1)
or subassemblies that has been disseminated outside of their
original site. This specification gives for the most freedom in
terms of symbol size, location, and information. Neither the
dimensions of the labels, marking areas, or marking methods
of the individual parts or unit packs are outlined in this
standard [15].
The following are some of the standards mentioned regard-
ing linear symbols and 2D symbols in this standard:
• A part or label can be marked with any data field that is
agreed upon by trading partners.
• A data field must contain a Data Identifier followed by
data associated with it.
• Linear barcode symbols (Code 39 and Code 128) must
each contain unique data.
• The length of Code 39 or Code 128 symbols should be Fig. 1. Absolute number of recalls in automotive industry (SIAM data)
no longer than 20 characters and should not exceed 30
characters. The risk that companies face when it comes to recalls
• Depending on the linear symbology, ISO/IEC 16388 Bar and regulations that enforce quality and compliance makes
Code Symbology Specification - Code 39 or ISO/IEC it increasingly important for manufacturers and distributors
15417 Bar Code Symbology Specification - Code 128 to have a manufacturing execution system (MES) in place
must be followed. that can provide genealogy and track any changes made to
• A human-readable interpretation (HRI) of the Code 39 the product during the course of its lifespan. These MES
and Code 128 symbol should include all encoded infor- should be able to track and trace vendors and products entering
mation, should be placed consistently above or below the the company, products and processes inside the organization,
R EFERENCES
[1] Zhang, T., Cao, C., Yu, H. and Liu, Y., 2020. Design and Implementation
of Dairy Food Tracking System Based on RFID. 2020 International
Wireless Communications and Mobile Computing (IWCMC),.
[2] Cao, Y., Jia, F. and Manogaran, G., 2020. Efficient Traceability Systems
of Steel Products Using Blockchain-Based Industrial Internet of Things.
IEEE Transactions on Industrial Informatics, 16(9), pp.6004-6012.
[3] Hasan, H., Salah, K., Jayaraman, R., Ahmad, R., Yaqoob, I. and Omar,
M., 2020. Blockchain-Based Solution for the Traceability of Spare Parts
in Manufacturing. IEEE Access, 8, pp.100308-100322.
[4] Miehle, D., Henze, D., Seitz, A., Luckow, A. and Bruegge, B., 2019.
PartChain: A Decentralized Traceability Application for Multi-Tier
Fig. 2. Voluntary recall information of 2021-2022 in India [16] Supply Chain Networks in the Automotive Industry. 2019 IEEE Inter-
national Conference on Decentralized Applications and Infrastructures
Source: Society of Indian Automobile Manufactures, 2022 (DAPPCON),.
[5] Dai, B., Nu, Y., Xie, X. and Li, J., 2021. Interactions of traceability
and reliability optimization in a competitive supply chain with product
and customers delivered goods. In order to reduce the effect recall. European Journal of Operational Research, 290(1), pp.116-131.
[6] Ho, G., Tang, Y., Tsang, K., Tang, V. and Chau, K., 2021. A blockchain-
of product returns and recalls, manufacturers and distribu- based system to enhance aircraft parts traceability and trackability
tors should use accurate genealogy, tracking, and traceability for inventory management. Expert Systems with Applications, 179,
throughout the product lifecycle and supply chain, as well as p.115101.
[7] Dudina, D., Vasiliev, V. and Mandrakov, E., 2020. Digital Technolo-
reviewing current materials, products, and processes to reduce gies for Monitoring Product Quality and Safety. 2020 International
the possibility that such events reoccur. Conference Quality Management, Transport and Information Security,
Information Technologies (IT&QM&IS),.
H. Benchmarking various genealogy, traceability and tracking [8] Kuhn, M., Funk, F. and Franke, J., 2021. Blockchain architecture for
systems in use by automotive manufacturing automotive traceability. Procedia CIRP, 97, pp.390-395.
[9] Intermac., 2020. [online] Available at:
A detailed study was carried-out on the various genealogy, ¡https://www.danbygroup.com/docs/White Paper PartsTraceability
traceability and tracking systems across the globe and the Product Geneology.pdf¿ [Accessed 18 October 2022].
[10] Alfano, M. (2021). Towards a Genealogy of Forward-
findings are presented in the figure 3. Looking Responsibility. The Monist, 104(4), 498–509.
Figure 3 compiles the genealogy and traceability systems https://doi.org/10.1093/monist/onab015
currently available on the market. It is important to note that [11] Gehl, R. W. (2017). (Critical) Reverse Engineering and Genealogy. Le
Foucaldien, 3(1), 4. https://doi.org/10.16995/lefou.26
the above classification was based on the importance attribute [12] Bergstrom, L., 2022. The Importance of Product Genealogy
assigned by the system, even though most of the systems - TIP Technologies. [online] TIP Technologies. Available at:
shown in artifact 2.0 provide both genealogy and traceability. ¡https://www.tiptech.com/blog/the-importance-of-product-genealogy/¿
[Accessed 18 October 2022].
As we look at the artifact, we gain a better knowledge of [13] Buchwald, P., & Anus, A. (2020). Industrial Internet of Things Sys-
the many types of systems in use today to provide product tems for Tracking and Traceability of Production Business Processes.
genealogy and components traceability as we examine the Multidisciplinary Aspects of Production Engineering, 3(1), 464–476.
https://doi.org/10.2478/mape-2020-0039
artefact. In addition, we can conclude from the above artifact [14] Bhutta, M. N. M., & Ahmad, M. (2021). Secure Identification, Trace-
that most automotive companies utilize modernized IT systems ability and Real-Time Tracking of Agricultural Food Supply During
to improve product quality. Transportation Using Internet of Things. IEEE Access, 9, 65660–65675.
https://doi.org/10.1109/access.2021.3076373
IV. C ONCLUSION [15] Webmaster, A., 2022. Parts Identification & Tracking — AIAG.
[online] Aiag.org. Available at: ¡https://www.aiag.org/supply-chain-
In this paper, we explore genealogy, traceability, and track- management/packaging-and-labeling/parts-tracking¿ [Accessed 18 Oc-
ing within the automotive industry. Additionally, this paper tober 2022].
[16] Siam.in. 2022. Society of Indian Automobile Manufactures.
provides the importance, differences, and standards that govern [online] Available at: ¡https://www.siam.in/siam-voluntary-
genealogy and tracking at the time of manufacturing.The recall.aspx?mpgid=31&pgidtrail=84¿ [Accessed 18 October 2022].
manufacturing industry has been using genealogy and tracking
extensively in its supply chain. While defects and risks are
inevitable, genealogy and tracking have made it possible
for manufacturers to reduce these risks and defects in their
manufacturing processes. In the past year, the automotive
industry had the greatest number of recalls, which emphasizes
the need for genealogy and tracking, as outlined in this paper.
Additionally, the paper covers different types of systems that
are used by various automobile manufacturers to track and
trace the genealogy of their products and the usage of part
solutions in lieu of complete MES package. Genealogy and
tracking are essential to a manufacturing company because
they reduce costs by decreasing defect rates in the finished
product.
Fig. 3. Broad classification and benchmarking study of genealogy, traceability and tracking systems across the globe
Abstract— This paper introduces a specific human- Therefore, in this work, OpenCV is used to call a web
computer interaction system. To get input from the user, a camera that is set to continuously take images from the
system solely depends on various input devices. But the people eye's focusing pupil. Eye recognition and tracking are
who are afflicted by specific ailments or disorders, are unable to accomplished using various image processing techniques.
use computers. Allowing persons with disabilities and vision
impairments to operate computers with their eyes will be very
Because the pixel position in the image does not
beneficial to them. Additionally, this form of control will reduce correspond with screen resolution, various scaling
the need for other parties to assist in operating the computer. techniques are used depending on the size of the image
The individual who is handless and can just utilize their eye taken by the camera.
motions to work will find this measure to be most useful. The
center of the pupil is intimately related to how the cursor moves. The proposed method for using a non-
The electronic device controls the movement of the computer invasive human-computer interface consists of face
cursor. In this proposed system, OpenCV libraries and the Haar detection, face tracking, eye detection and real-time
cascade algorithm are used for detecting eye movements. interpretation of eye blink sequences. Traditional mouse-
based computer interaction is replaced with eye motions.
Keywords— Eyeball Movement, OpenCV, Haar cascade, This method will make it easier and more efficient for
Computer. persons with paralysis, those who are physically
challenged, and especially those without hands to compute
I. INTRODUCTION [10]. First, the camera captures the image and uses
OpenCV code for pupil detection to focus on the eye in the
In today’s era, computers have become a significant part
image. As a result, the human eye is in the center position
of human lives. Human-computer interaction is becoming
(pupil). The human or user then controls the cursor's left
increasingly important as computer technologies advance.
and right movement based on the pupil's center position as
Currently, there are around 21 million people in India who are
a reference.
suffering from one or more physical disabilities, and it
constitutes around 2 percent of India’s population. Such The purpose of this work is to develop a system that
people cannot readily use the computer system [9]. There is a can help people who are physically disabled but visually
need to find appropriate technology that allows for effective intact to use the computer system, so that their physical
communication between humans and computers. Eyeball disability won’t hinder their abilities to use a computer.
movement control is primarily used by the disabled. By
integrating this eye control system with a computer, one can
operate a computer without assistance from others. II. RELATED WORKS
If the person’s body is completely paralyzed, then the way A. Sivasangari et al., [1] proposed a generic
the person can communicate with the computer was algorithm for face detection along with some hardware
uncertain. Later, a solution that was proposed is that a requirements, which resulted in poor performance and
universally recognized nonverbal expression still carries functional limitations. Need for advancement in the field
significant weight in the eyes of humans. Most people agree of Human Computer Interaction (HCI), which focuses on
that the human eyes can express hundreds of words' worth of creating an interface between people and computers and
immense emotions and feelings. Despite this, there are become very crucial. It claimed that a different method of
instances where people suffer from a sickness that prevents computer communication for those who have physical
them from moving anything but their eyes. Eye movement is limitations needs to be developed. In order to save money
now essential for the patient to communicate with the and time, pictures were taken using the laptop's built-in
environment and the outside world. camera and utilized the very precise and sophisticated
Haar cascade classifier technique to identify facial vectors III. PROPOSED WORK
for detecting facial expressions. The computer cursor movement in this proposed
system is controlled by eye movement using OpenCV. The
Vadana et al., [2] proposed a hybrid algorithm and eyeball movement is detected by a camera and can be
implemented them in Java. The image was scanned around processed in OpenCV. Open CV is an important
a rectangle, which then divided the rectangle into six component of the working module that keeps the eye
pieces and stored them. The face was detected using SSR moving. The mouse cursor was controlled using the
and SVM. However, the method had low accuracy and PyAutoGUI library.
efficiency, making the USB camera more expensive and
burdensome for the user. The model serves two important purposes. A
detector for detecting faces and a predictor for predicting
It is quite easy to graph eyeball movement to mouse landmarks are used. The face detector is built using
movement using a raspberry pi and OpenCV mobile IP conventional Histogram of Oriented Gradient (HOG),
based system, but it is also rather expensive because it linear classification, image pyramid and sliding window
requires additional hardware. Naveed et al., [3] used this detection functions.
method to recognize face features.
HOG is widely used as feature descriptors for object
For face detection, Brooks,R.E et al., [4] used and human face detection in computer vision and image
MATLAB and a webcam. The monitoring of the eyes and processing. Object search is based on a detection
calculation of the iris shift were done by using the technique applied to a small image defined by a sliding
MATLAB package, which was used for face and iris detection window that probes region by region of the
recognition. Once the shift was mapped using a graphical original input image and its scaled version. HOG detection
user interface, the mouse pointer travelled in accordance consists of dividing the source image into blocks (e.g.,
with the calculated iris shift. Only a monochromatic image 16x16 pixels). Each block is divided into smaller regions
may be searched for in MATLAB; binary conversion is (e.g., 8x8 pixels) called cells. Blocks typically overlap, so
necessary. By converting the grey colours, it can only multiple blocks of the same cell can occur. The vertical
detect the white and black hues. and horizontal gradients for each pixel are present in the
A real-time webcam-based eye ball tracking system cell. HOGs are commonly used in conjunction with
utilizing MATLAB was suggested by Chih Wu et al. [5] Support Vector Machine (SVM) classifiers. HOG
MATLAB libraries and the hardware mouse control computes each descriptor and passes it to the SVM
mechanism were employed in this system. Although it is classifier to determine if the object is found.
not user-friendly, it is cost-effective. It was connected to A. Face Detection
the USB port to allow for user-computer interaction.
Face detection is an application-specific computer
The "Eyeball Movement Based Cursor Using Deep technique that recognizes human faces in digital
Learning" approach was proposed by Ehrlich,K et al. [6]. photographs. The suggested technique recognizes facial
It considered picture and eye ratio as a factor for running features [11]. A simple facial tracking system can be
a program. It delivered high accuracy but it increased the developed using frontal face detector function which
overhead problem by using large datasets. returns the pre-trained HOG + Linear SVM face detector
Eye Tracking System with Blink Detection by Eric included in the dlib library, and combine with Shape
Sung et al. [7] in 2012. MATLAB was used to analyse the predictors, also called landmark predictors, which are used
data in the following steps: image capture, smoothing, to predict key (x, y)-coordinates of a given “shape”.
edge detection, pupil segmentation, and blink detection, Without any user or person contact, face photos can
but only with recorded films, not live ones. be analyzed. The tracking of attendance and time
Murphy.L et al. [8] designed a low-cost eye tracking information can be done using facial recognition
system for total rehabilitation of incarcerated patients. technology. Human-computer interface and emotion
The method involved the use of MATLAB and Java recognition are two examples of the applications that can
programming, some hardware, and while processing the benefit from the facial data that the human face offers.
data may take longer, it was somewhat cost-efficient. Feature extraction can be done using the OpenCV
algorithm. 33-pixel images can be captured via the web
Sangeetha. S. K. B. made a survey on Deep Learning camera. Pixel values can be transformed to binary values
based Eye Gaze estimation methods. The paper discussed of 0 or 1 using encoding processes. N blocks make up the
about how gaze estimation methods work with HCI to use image of the face.
for the digital devices in daily lives to avoid the human
interaction but in these, there was no method for clicking The following is a description of the threshold function:
mouses in PC. When compared to the proposed algorithm
in this paper, it is not efficient.
Sathesh. A. proposed Typing Eyes: A Human To calculate the LBP value, weight values are
Computer Interface Technology. MATLAB was used to calculated for each neighbor.
analyse the data using the following steps: photo capture,
smoothing, aspect detection, pupil segmentation, and blink B. Eye Region Detection
detection, however handiest with recorded To pinpoint the precise location of the pupil,
films, not live ones. horizontal and vertical integral projection are employed.
These projections separate the entire image into
REFERENCES
Abstract— A popular nonlinear system in several fields, real-time applications [10], [11]. However, due to the
including as robotics, aircraft, and shipping, is the rotating difficulty in developing a model and the prevalence of
inverted pendulum. In this work, an optimized Non-linear Model uncertainty, its industrial applicability is still limited [15].
Predictive Controller (NMPC) is designed to keep the pendulum Moreover, NMPC is a popular control strategy for controlling
in an upright posture and to deal with disruptions by obtaining a
fast dynamic response and reducing computational time. Here, a
the behavior of complex systems with high dynamic
new concept-based hybrid algorithm named Seagull Insisted performance in both industrial and theoretical applications
Particle Swarm Optimization (SI-PSO) is proposed to enhance [16]. As a result, its application to nonlinear control is
faster dynamic system response and reduce the overall challenging because of the optimization strategy used in these
computational time. Simulation results are presented to reveal controllers. In order to solve non-convex constrained
the optimized NMPC’s robustness to the non-linear systems with optimization problems, the NMPC approach is required [6].
the conventional optimization algorithms. The presented The majority of the existing work is based on nonlinear
approach has the potential to be used to regulate a variety of programming approaches that only produce local optimal
nonlinear systems. values, but the latter is dependent on the starting point selected.
Keywords— Non-linear Model Predictive Controller, Seagull Therefore, a numerical linearization technique has been
Insisted Particle Swarm Optimization, Rotary Inverted Pendulum. developed for this opportunity to gain a convex constrained
optimization problem [7]. To solve the non-convex
Nomenclature optimization problems, there proposes a Genetic Algorithm
Abbreviation Description (GA) however; it faces several challenges including large
MPC Model Predictive Control computational costs due to its natural physical activities [8].
NMPC Non-liner Model Predictive Control The availability of embedded optimization algorithms that can
SI-PSO Sea gull Insisted Particle Swarm Optimization
GA Genetic Algorithm
resolve more quickly, generate a solution within the sample
PSO Particle Swarm Optimization interval available, and are simple and easy to programme
SOA Seagull Optimization Algorithm within the constraints of onboard chip architectures as well as
RIP Rotary Inverted Pendulum being parallel in nature to fit into the FPGA architecture is
SRIP Single Rotary Pendulum Inverter
FLC Fuzzy Logic Control
also mentioned as another barrier to NMPC implementation
on an FPGA chip [9]. Therefore, a number of effective
optimization techniques were considered for solving the
A. INTRODUCTION NMPC problems. In 2021, Farshid Asadi [1] established an
A RIP is similar to a man balancing a stick in his palm approach that focused on Learning-based model predictive
while moving his palm horizontally to keep it from falling control (MPC) to reduce the computational cost of MPC.
[12]. Yet, the study of RIP drives the development of Constraints on the MPC are successfully enforced through
controllers for rockets that help them stay erect and conduct constrained training of neural networks. For the learning-
automatic landings. In the downward position, a regular based MPC technique, recursive feasibility and robust stability
pendulum is stable, but in the upright position, it’s unstable. requirements are also derived.
During the past decades, NMPC has received a lot of attention In 2021, Fnadi and Julien [2] used the NMPC in
[13]. Beyond traditional chemical engineering applications, conjunction with interval analysis methods. Filtering and
advancements in hardware, algorithms, and specialized branching processes are used in the proposed controller to
implementations have enabled demonstrative NMPC discover input intervals that satisfy state restrictions and
applications in a variety of domains, including mechanical ensure convergence with the reference level. Also, opt for the
systems and power electronics[14]. MPC has been used as a optimization techniques que then calculates the best and most
general process control in process industries, oil plants, and timely control input for the system's actuator to the stabilize
pendulum. In 2019, Deebak et al. [3] have presented a new
A new delay has been added to the state model by considering, In this work, a new hybrid algorithm named "Seagull
Insisted PSO" is proposed to overcome the disadvantages of
ak aekT xvkT T
, vk vek , the PSO algorithm [18] to optimize the angle position of RIP.
The PSO algorithm has the disadvantages of being easy to fall
f (ak , vk ) [ fl (aek , vek )T vekT ]T it takes the form is given into a local optimum in high-dimensional space and having a
in Eq.(40). poor iterative convergence rate. So we hybridized the position
update of the seagull algorithm into PSO to overcome the
aK 1 f (ak , vk ) (8) deficiencies of the PSO algorithm. The SOA algorithm was
primarily inspired by the natural seagulls' migratory and
c. Optimization Problem with Constraints fighting behaviour [19]. To show how broadly applicable it is,
it is used to resolve seven constrained real-world industrial
The optimization problem is defined by using dynamic applications. It is a fairly competitive algorithm that is on par
model is shown in Fig. (1). with other optimization methods and is able to resolve difficult
large-scale constrained problems.
minv Y (b(t),v(t))
The optimal moves can be defined by the difference a. The SI-PSO Algorithm
among the expected and reference output signal. The cost
function is given by Eq. (9). In the search space, the PSO algorithm keeps track of a set
of possible solutions and analyses the solution's fitness
iteratively based on the objective function being optimized. A
Where,
Ds Cs M s
E. RESULTS AND DISCUSSION Likewise, the simulation has been carried out while the
starting position is nearly identical to the intended position π
a. Simulation Setup as shown in Fig. 3d, 4b and 5d. The pendulum angle response
The presented model was coded and executed in shows a faster response with the SI-PSO algorithm and is able
MATLAB software. Performance analysis was carried out to reject the disturbance more efficiently than SOA and PSO
based on the accuracy, precision, specificity and so on. In algorithms which in terms of switching between swing-up to
general, two control methods are used to balance an inverted the balance position of the Pendulum arm. As if we go through
pendulum’s position: swing up control and balancing control. the results SI-PSO based NMPC shows the fast rise time as
The suggested algorithm can balance the pendulum from its compared to others. Also the control input requirement for the
rest position, as illustrated in the simulation results. algorithm is reduced as we move towards the SOA and PSO,
to SI-PSO optimization methods. The input generated through
b. Response of Rotary Inverted Pendulam
SOA has large variations in between +5 to -5 volts. However
As illustrated in Fig.3, the desired point is used as a the SI-PSO and PSO reduced it to approximately within +2 to
reference to assess the rotary arm's robustness against -2 Volts for balance control of Pendulum.
disturbance in the Fig.3c for SOA and 4c for PSO and 5c for
SI-PSO based NMPC.
-
C.Rotary arm position d. Pendulum Vs Arm Position angle
Fig.3 Rotary inverted pendulum's response from its rest position to its inverted position by using SOA NMPC
-
a. Control Input b. Pendulum Position
-
c. Rotary arm position d. Pendulum Vs Arm Position angle
Fig.4 Rotary inverted pendulum's response from its rest position to its inverted position by using PSO NMPC
-
a.Control Input b. Pendulum Position
-
c.Rotary arm position d. Pendulum Vs Arm Position angle
Fig.5 Rotary inverted pendulum's response from its rest position to its inverted position by using SI-PSO NMPC
Abstract—Dashboards help stakeholders to improvise the • Visibility into the Business system.
level of decision-making by visualizing the things which need to
be monitored on a daily/weekly/bi-weekly/monthly basis. With • Time Saving.
the ease in the understanding of dashboards, the use and • Improvised Results.
demand for these increased a lot nowadays. The dashboard
system also helps to provide solutions for many different • Ease in understanding.
problems in the current industry. Another problem with these
dashboards is many open open-source applications help users • Productivity increment.
to get their visualization done within no time. It is better to • Increment in Profits.
have an individual application for each company to have their
visualization done for the things they need to compare. In this As mentioned, the dashboard shows us exactly which
paper, the implementation and a comprehensive literature areas of our business are performing poorly. In our project
review intending to have a Common System for all also, the main aim is to create a dashboard that helps
stakeholders which will help them to refer to the Defects status stakeholders to have an overall view of the metrics given.
at any point in time without any dependency on SQA emails. Some many ways or frameworks that will create the
The main aim is to refer to the status of defects at any point in dashboard for the given data or metrics. Our task is to create
time without depending on any other SQA emails or such a framework without using the existing frameworks that
something. To achieve that, the data to be available in the are available in the current market. Any programming
database at any point in time so that the status whenever it language or framework is used to complete this task but
needs to be checked. The data which is available in the using a framework that gives the optimized output is the
database is under one hierarchy to be followed. That hierarchy better choice to use. There is no Single System to have a
helps us to get the defects by getting the values in days and the
consolidated dashboard view of all PLM KPI/Metrics for
total time taken. Different columns were needed to get a
Dashboard. For our project group name, team name, project
Project/Part/Group/Team[3][4]. Stakeholders are required to
name, and part name are required to get the values in the days, refer to different excel based reports for KPI/Metrics Status
the number of defects, and the total time taken. The Dashboard on weekly/Bi-weekly reports. Every time the SQA is
which will be getting from the given data helps stakeholders to required to use the Master Reports deriving the
have a complete picture of the project details. In this regard, a Project/Part/Group/Team based status reports which are
project which helps stakeholders to refer for the status of time-consuming.
defects. As the metrics are confidential for particular companies
Keywords: Enterprise, Performance Indicator, Visualization,
or stakeholders, the information which are using for the
Metrics, Analysis, Dashboard. visualization in the dashboard needs to be authenticated by
respective stakeholders. The authentication module performs
this task by allowing only particular and allowed admins.
I. INTRODUCTION Dividing our application into different modules helps us to
A Dashboard system is also considered to be a tool under work efficiently and also gives us the knowledge of exactly
information management that is used to get track of the given what our application will do in a specific manner. It starts
KPIs, metrics, and some other key data points which are with the authentication module and ends when the session
relevant for the specific business domain or department or ends after a particular user or stakeholder logs out. It is a
any kind of specific process [1][2]. The visualization can be better option to give download access to a particular user or
done for the data from various sources like databases, web stakeholder for the dashboard that was generated for the
services, and some other locally hosted files. Specifically, the given data or uploaded data [6] [7]. Along with the
right dashboard will give you some key benefits as follows: dashboard, required specifications are calculated using
formulas and display them on the front end. The better
option for choosing a programming language for systems in the market. We got to know the working of those
visualizations is python and the framework that is well dashboard systems and worked on it for some time on, we
recommended for the same is React JS. To get the data from started working on our proposal i.e, to build a website that
the user or from the database, it is recommended to use gives a dashboard for the given data [9] [11]. To get started
spring boot. Hopefully, using these specifications, we can with our solution, we required example metrics to work on
build the desired and effective dashboard. and asked our mentors for them. With the provided dummy
data which is in the form of excel, we started working with
II. LITERATURE REVIEW that data. To get the dashboard, we need to get the data from
the database as the data need to be stored for analysis. At the
Catherine E [5] et al, Investigated that Dashboards also initial stage of our project, we started it off using python in
help in the improvement of necessary fields in various the Streamlit framework as it is easy to build graphs using a
departments. One of those departments is health care in python programming language. At this stage, our phase of
which the performance of physicians will visualize Based on difficulties had started. We are expected to change our
that visualization the growth of those physicians will be framework as well as our way of approach because it is not
improved. Most importantly, patient care and quality of secure to host our prepared solution. The new requirements
treatment would get better. of our project to be secured are using react as frontend,
Francesco Schiavone [8] et al, Investigated monitoring spring boot as backend, and PostgreSQL as a database.
the KPIs in the digitalized health networks, they developed a These requirements keep our project to be secure when it
dashboard system using a conceptual approach that is gets hosted. To meet the given requirements, we started
supported by direct observation of cancer networks in working on these frameworks(react, spring boot). Finally,
Southern Italy. As a result, they were able to outline an we created a website that visualizes different graphs like Bar
inductive process model through which healthcare network charts, Pie charts, Donut Charts, and line charts. We can
managers can develop an MCGDM using the conceptual able to add or delete a record based on our requirements. We
model. also added an option to download the visualized chart. Fig. 1
shows the flow of the project. Table 1, 2, and 3 shows the
Katharine,H [10] et al, Invested to make visualizations sample key metrics.
easy they developed individualized cytopathologist and
cytotechnologist dashboards with unique features. These
dashboards are confidential and based on the previous 10-
year calendar years. The CP and CT dashboards visualize
different metrics and the laboratory director can access all
the results whereas the CP and CT dashboards are updated
on weekly basics [12][13]. This dashboard is developed
based on Tableau and visualizes the color-coded displays. As
a result, it successfully implemented personalized dashboards
which help individuals to focus on their performance and
reach professional benchmarks.
SomnathArjun [14] et al, Investigated they developed a
smart sensor dashboard for a manufacturing workshop. With
the existing visualization, we cannot able to visualize both
temporal and spatial information simultaneously. By using
the three parts IoT units with a single-board computer, an
interactive visualization module, and an early warning
system they visualized the data in 2D, and to get results more
effectively they developed 3D visualizations which allow
users to interact naturally. They went through several user
stories and inferred the results.
Tat’Yana, A [15] et al. Investigated the Vaccine Safety
Datalink(VSD) investigators developed a dashboard system
that visualizes the rapid reviews of vaccine surveillance data
every weekly. They developed using tableau software to get
the visualization done for the required metrics. Throughout Fig. 1. Proposed Flow Diagram
the pandemic, these dashboards which were created by this
team were helpful to track COVID-19 cases, deaths, and also
testing including the aid management of patient flow in
clinical settings.
given data. And for security reasons, we added an getting the analysis of the data in the front end which is used
authentication action module in this framework. to get a complete and clear idea of the summary of the data.
Even after working with 2 different frameworks, we were
given some specific requirements at the final stage of our
project. To meet those requirements we again changed our
framework. For the Implementation, we used react as our
front end for the visualization and getting input from the
user. The data which was given will be stored in the
PostgreSQL database using API calling in spring to connect
with React. Using this API calling we stored the data from
the front end to database and fetched the data from the back
end to front end. We used the spring tool suite (STS) for
implementing spring boot and visual studio code for the Fig. 4. Summary of data in Python
react part and implemented our project in localhost. Fig.2
shows the pie chart visualization between the total time In react framework, we integrated an option to download
taken and groups from the sample data. We can customize the necessary graph from the dashboard in the form of PNG
the input based on our requirements. which we didn’t get on various platforms. In Fig.5 you can
see the option “download as PNG” at the bottom of the chart.
Through this feature, you can able to download and save the
PNG and can see it at any time.
Fig. 7. Dashboard overview in React Fig.11 shows the visualization of a sample Pie chart
between the Project Code and the Number of defects. Here,
Fig. 8 shows all the records from the database. We can we can customize the number of inputs also we can able to
see the value whenever we hover over it.
verify the individual record from this and can make
necessary changes if required.
REFERENCES
[1] AkramVahedi et al. "Applications, features and key indicators for the
development of Covid-19 dashboards: A systematic review study",
Informatics in Medicine Unlocked, Volume 30, No.100910, 2022.
[2] AndreasHinderks et al.” Developing a UX KPI based on the user
experience questionnaire”, Computer Standards & Interfaces Volume
65, Pages 38-44,July 2019.
[3] AndrewZamecnik et al."Team interactions with learning analytics
dashboards", Computers & Education Volume 185, No.104514,
August 2022.
[4] Athena K.Petrides et al. "Pandemic Response in the Clinical
Laboratory: The Utility of Interactive Dashboards", Journal of
Pathology Informatics Volume 13, No.100010, 2022.
[5] Catherine E et al.” Development, Implementation, and Use of an
Emergency Physician Performance Dashboard”, Clinical Pediatric
Emergency Medicine Volume 18, Issue 2, Pages 115-123, June 2017.
[6] Choong-HeeHan "Blockade-detection-response based security
operations dashboard design", Computers in Human Behavior Reports
Volume 4, No.100143, August-December 2021.
[7] FabioGrandi et al. "Design of ergonomic dashboards for tractors and
trucks: innovative method and tools", Journal of Industrial
Information Integration Volume 25, No.100304, January 2022.
[8] Francesco Schiavone et al.“Revealing the role of intellectual capital in
digitalized health networks. A meso‑level analysis for building and
monitoring a KPI dashboard”, Technological Forecasting and Social
Change Volume 175, No.121325, February 2022.
[9] JaehyeongLee et al."Estimating vehicle speed by analyzing the
acoustic frequency of dashboard camera sound", Forensic Science
International Volume 338, No.111384, September 2022.
[10] Katharine,H et al. “Developing dashboards for performance
improvement in cytopathology”, Journal of the American Society of
Cytopathology Volume 10, Issue 6, Pages 535-542, November–
December 2021.
[11] Marco AntonioEsquer Rochin et al. "Design and evaluation of a
dashboard to support the comprehension of the progression of patients
with dementia in day centers", International Journal of Medical
Informatics Volume 156, No.104617, December 2021.
[12] Peter J.Neumann "Toward Better Data Dashboards for US Drug
Value Assessments",Value in Health Volume 24, Issue 10,Pages
1484-1489, October 2021.
[13] Shannon S.Wu et al."Utility of the finance-electronic medical record
digital dashboard in pediatric otolaryngology", American Journal of
Otolaryngology Volume 43, Issue 5,No. 103598, September–October
2022.
[14] SomnathArjun et al. “Interactive Sensor Dashboard for Smart
Manufacturing”, Procedia Computer Science Volume 200,Pages 49-
61, 2022.
[15] Tat’Yana A et al.” Dashboard development for near real-time
visualization of COVID-19 vaccine safety surveillance data in the
Vaccine Safety Datalink”, Volume 40, Issue 22, Pages 3064-3071, 11
May 2022.
[16] Raj, Jennifer S., and S. Smys. "Virtual structure for sustainable
wireless networks in cloud services and enterprise information
system." Journal of ISMAC 1, no. 03 188-205, 2019.
Abstract— I-V characterization of the bulk and amorphous addressing wireless system, embedded application, solid state
thin film of the as-prepared Si15Te80Cu5 sample is carried out to subsystem and computing platform [4]. An alteration in phase
better perceive the electrical switching behavior. Memory and is experienced by the amorphous semiconductors due to the
threshold switching have been discerned in bulk glass, but only implementation of electric field and this process is coined as
memory switching has been shown by amorphous thin films. The electrical switching. This process transforms the glasses from
thin film device exhibits a substantially lower threshold voltage low conducting “OFF” state (which is amorphous in nature) to
than its bulk version, suggesting that it could be used for phase high conducting “ON” state (known to be crystalline in nature),
change memory (PCM). The glass is subjected to Set –Reset
this transformation is termed as SET process. The reversal of
using a triangle pulse of 6 mA for set operation and a rectangle
the SET process is known as RESET process which involves
pulse of 12 mA for reset operation to determine the suitability of
the provided glass for PCM use. A constant recurrence of a few
transforming the glass from ON to OFF state. The glass is
Set-Resets is evident in this study. Morphological study has also maintained by the switching process (which is a constructive
been carried out on the bulk sample. process) in a particular conductive state when changed to ON
state. Switching occurs at threshold voltage and the latter is an
Keywords— Chalcogenide glasses, electrical switching, Set- element of the composition of the active material, its thickness
Reset [5], prompt history of applied voltage and surrounding
temperature [6].
I. INTRODUCTION
The attributes of chalcogenides manifests a variation when
Alloys of chalcogenides have a wide range of application metallic dopants like copper or silver is added. The network
like in the field of semiconductors, electronic, photonic devices connectedness, electrical conductance and crystallizing ability
[1]. The capability of chalcogenides to reverse its phase stands of a network containing chalcogenides is seen to increase when
as a basis for PCM materials which has evolved to a propitious metallic dopants bonds with them [7]. Optical as well as
candidate against its parallel crystals and is the reason for electrical attributes of chalcogenides containing metallic
vigorous research [2]. The problems encountered by the PCM dopants are dissimilar in comparison to the ordinary glasses.
get skillfully decrypted with the help of engineered solutions, This highlights the reason of wide application of chalcogenide
developing models which are of low cost and this is the main containing transition metal in optical memory and laser
reason behind its success. The PCM has two phases namely materials.
amorphous and crystalline which has subsequent variation in
resistance and in turn causes apotheosis of PCM [3]. Ge- Te glasses doped with elements from fourth to sixth
Amorphous phase has around three to four orders resistivity group of the periodic table have found salient recognition
higher as compared to the crystalline phase. Progress has been because of its broad scope of application in technology [8]. In
the part of PCM in the last few years of which some are contrast literature shows less documentation on amorphous Si-
amelioration in density, vigorous rate of device scaling, Te although it can be used as switching diode [9] because of
reduction in programming power. Device scaling stands as being effectual optic and acoustic material. Study of various
important reason towards decrease in power required for characteristics of Si- Te glasses with metal or semiconductor as
switching and hence in the development of PCM technology. dopant enjoys significant interest.
PCM technology has the following positive features: II. LITERATURE SURVEY
capabilities of fast read and write; large number of writing and
erasing cycles; ability which helps in writing in the memory Glassy chalcogens which display the gradation of phase from
without prior erasing step known as bit alterability [4]. Another non- crystalline to crystalline has been employed in electronic
important feature of PCM is to preserve and sustain more memory technology from ages [10, 11, 12]. Whilst the basic
number of bits for a long duration. For the promising features principles of PCM has been a part of discussing during the
as listed above, the PCM has a wide range of application like initial work, advancement in material and device technology
ACKNOWLEDGEMENT
The authors would like to acknowledge SERB (file no
SPG/2021/000359) under which the research was carried out.
REFERENCES
Abstract—In this paper, a simple double-side slot [17]. The patch antenna displays similar radiation
rectangular microstrip patch (DS S -RP) antenna is characteristics and acts like a dipole. The antenna is
presented. The antenna is used for multi-band purposes
supported mechanically by the substrate, which also
and the operating frequency ranges from 2 to 4GHz. In
aids in resonance [4]. For the antenna to maintain its
this design, five different substrates (BAKELITE, RT
overall integrity and endurance, the substrate is
DUROID, FR-4, TACONIC, and RO4003) have been
analysed for the proposed antenna design. The crucial. Permittivity and loss tangent are two of a
comparison performance is analysed based on the substrate's most crucial properties that must be taken
Reflection coefficient, VS WR, Axial ratio and into Selecting the right substrate material will
appropriate gain characteristics within the frequency improve antenna performance, lower surface wave
range. This slotted antenna design structure improves losses, and enable beam re configurability[11-13]. To
the dual-band responses for wireless communication. select the substrate, the properties to be considered
The slot insertion on the radiating element will provide
are dielectric constant or a measure of
the appropriate gain characteristics (>1.5dBi) and
electromagnetic wave and loss tangent.
promote the enlargement of the bandwidth.
In this article thicker substrate and increased strip
width to maintain impedance [8]. This will result in
Keywords—Patch antenna, different substrates-
more power through it due to a greater Q, but at a
Bakelite, Rogers RT/duroid, Flame Retardant epoxy
cost be heavier and emanate more power from the
resin and glass fabric composite of type 4(FR-4).,
transmission line. At a resonant frequency of 3 GHz,
Taconic, and Rogers RO4003, Wireless
the antennas were simulated with a strip line feed. To
Communication, CadFEKO antenna software
broaden the bandwidth, the dielectric constant must
simulation tool.
be low for a thick substrate [1-3]. The choice of
substrate is a crucial part of the antenna design
I. INTRODUCTION
process. In microstrip antennas, the substrate is
mostly needed to provide the metallization of the
In the modern world, microstrip antennas are
antenna. A dielectric must be present on the substrate
extensively recognized and utilized in
to offer this support. It could have an impact on the
communication systems due to their durability, small
electrical performance of the antenna [2].
size, ease of manufacture, lightweight, and other
The majority of small microstrip antenna designs
benefits. Due to their many applications, microstrip
exhibit declining antenna gain as a result of the
patch antennas are quickly gaining favour in personal
smaller antenna. To prevail to overcome this
wireless communication systems [9-10].
drawback and increase antenna gain, fabricating a
Reconfigurable bandwidth requirements for practical
substrate with a permittivity dielectric constant
applications shall be met while maintaining a small
microstrip patch antenna that is s mall [5], [6].
and compact size. The three main parts of a
Coaxial feed, microstrip feed and quarter wavelength
microstrip patch antenna are ground, substrate, and
feed are the common feeding methods which could
patch. The metal patch is positioned on one side of
be used for the antenna design. Compared with one
the slab, while the dielectric substrate is on the other
another, microstrip feed is used as it is a
RT DUROID RO4003
Fig. 2. 3D Radiation pattern of five different dielectric
materials Fig. 4. VSWR Vs Frequency
As already mentioned, the substrate will be chosen The reflection coefficient versus frequency analysis
based on the analysis of different parameters such as is based on S11 (< -10 dB) parameter. Compared to
Reflection coefficient, VSWR, Gain and Axial ratio. all materials RT-DUROID and FR-4 have a good
The simulated results are given for five different reflection coefficient.
substrates and depicted in fig 3. The simulated results are compared for five different
dielectric substrates and given in table 2. For any
system, the VSWR ratio must be less than 1.5 dB and
in this design, the VSWR has been achieved for
different substrate materials.
Table I. Parametric analysis of an antenna
Reflection
Frequency VSWR
Substrate Coefficient
(GHz) (<1.5 dB)
(<-10dB)
BAKELIT
2.16 -12.5298 4.1845
E
TACONI 3.42 -13.6709 3.65287
FR-4 2.96 -30.6709 0.50311
RT-
2.26 -34.8886 0.312994
DUROID
RO4003 2.5 -16.7336 1.34097
Fig. 3. Reflection coefficient Vs Frequency
Compared with one another RO4003 and FR-4 has
very good VSWR value. The gain characteristics of
Bakelite, FR-4, RO4003, Taconic TLC and RT-
Duroid are plotted in fig 5. The gain of an antenna is
the proportion of a particular direction's maximum
radiation intensity to that direction's maximum
radiation intensity from a reference antenna.
Abstract— World is moving towards the path of reducing Additionally, EV batteries frequently have to meet sudden
pollution by reducing the carbon foot prints and eliminating the power demands, they frequently charge and discharge their
emission of greenhouse gases. Electric vehicle (EV) technology is batteries which reduces their lifespan. This is one of the key
a boon that has been developed by mankind towards this goal. factors that deter people from utilizing EVs, thus finding ways
But EVs are still facing a lot of challenges in Energy Storage to increase battery lifespan is critical. Therefore, energy
System (ESS) and Battery Management System (BMS). Energy storage systems are crucial for EVs. Mostly rechargeable
storage techniques used in different types of ESSs used in EVs, energy storage devices (ESD) such Zink batteries, lead-acid
comparison between different ESSs and its challenges are batteries, Li-ion batteries, nickel batteries, and SC are used in
discussed in this paper. Different functions of battery
EVs. The need for portable electric components, particularly
management systems (BMS), importance of monitoring the
battery health and various algorithms used for monitoring the
those used in EVs, has grown quickly with the improvement
status of battery are also reviewed in this paper. of ESD technology.
I. INTRODUCTION
Electric vehicle is a technology has been established to cut
the carbon emission. Nowadays environmental pollution is
more due to highly increased carbon emission. So
electrification of automobiles is one of the solutions for clean
and green energy utilization. Block diagram of Electric
Vehicle (EV) is shown in figure 1. Here the typical IC's engine
and fuel tank of normal car are swapped out with an electronic Fig. 2. Summary of the Study.
motor and battery pack, respectively. Other two main parts of
EVs are Energy storage system (ESS) and energy management The battery management system (BMS) is crucial in
system. The electric vehicle's energy storage system is crucial. electric vehicles (EV). BMS is a comprehensive system that
There are different kind of the energy storage system such as includes configurations and techniques for assessing overall
battery, fuel cells, and super capacitors. ESS is used for performance for different types of ESD, overall health,
driving motor, lightning system and other operating charging and discharging processes, battery tracking, data
mechanism. It has mentioned in the figure 2. collection, thermal control, device management, duration, and
thermal management for cell protection. In ESD, an
unbalanced cell voltage during the charge or discharge period
as a result of an electrochemical process. One of the primary
areas of development in the BMS is to enhance the voltage
balancing systems. Researchers are creating cell balancing
systems to increase the longevity of the cell, safeguard it
against explosion, and enhance the voltage balance systems.
Various research studies examined energy management
techniques linked to different energy storage system. The
BMS for plug-in hybrid electric vehicles (HEVs) and hybrid
electric vehicles (HEVs) is explored in [1] by summarizing
offline, real-time, and learning-based algorithms. But in [2]
another evaluation of the BMS for HEVs through 2012 is
provided and contrasted. [3] While looking at the typical BMS
Fig. 1. Block Diagram of EV
of hybrid electric and fuel cell vehicles, a general overview of
ESSs, power converters, and charging systems is provided. enhance ESS performance and develop a storage device that is
Authors in [4] identify the control tactics used in fuel cell affordable, many researchers and manufacturing companies
hybrid vehicles, and compare the benefits and drawbacks of work diligently.
each. A more thorough segmentation of optimization-based
tactics in HEVs is established has mentioned in [5].
Energy Storage System
This paper explains the many types of energy storage
technologies that are now available and different ways of
energy management system.
Electro-Chemical Battery
· Lead-Acid Battery
II. ENERGY STORAGE SYSTEMS (ESS)
· Nickel-Based
Electric vehicles (EVs) are becoming more prevalent on · Air-Based
the road and in the grid of power plants. In the design of EVs, · Zinc Based
the energy system and management are crucial components. · Sodium-Based
Fully battery electric vehicles (FBEVs) and hybrid electric
· ZEBRA
vehicles are the two main forms of EVs (HEV). Operating
energy for HEVs is provided by Internal Combustion Engine · Lithium Based
(ICE) and Stored Energy (SE). HEVs are valuable in and of · Vanadium Redox
themselves, and their fuel economy can be increased. There
are two forms of HEVs: fuel cell electric vehicles (FCEV) and
plug-in electric hybrids (PHEVs). BEVs are entirely powered Electro-Magnetic
by electricity, which is stored in the battery pack. The process · Super capacitor
of regeneration braking, which the automobile must perform · Super-conducting Magnetic
in order to regain SE, involves charging the battery pack from Energy (SMES)
the charging station. The battery's power determines the
BEV's operating range. Classification of electric vehicle is
shown in figure 3. Chemical
· Fuel cell
· Hydrogen Storage
ELECTRIC
VEHICLE(EV)
· Synthetic Natural Gas
· Biofuel
1)Electro-chemical Storage:
A. Types of Energy Storage Systems (ESS) A battery can store energy by electrochemical storage,
The ESS (batteries) in EVs should be able to accept high which uses a chemical process. Primary and secondary
power repetitive charges from regenerative braking operation, electrochemical batteries are the two different types. The
have a large number of life cycles, operate in a wide range of market has changed significantly as a result of advancements
temperatures, and have a high energy density to increase the in battery technology. The most common type of battery in
driving range of EVs and a high-power density to enable quick conventional EV systems is the lead-acid battery. Following
acceleration of EVs. that, researchers continued to work developing the EV system
and recommended storage with higher specific energy and
Figure 4 depicts the split of ESS into electrochemical power density.
storage, electromagnetic storage, chemical storage, and hybrid
storage systems that is pertinent to electric vehicles. Each ESS The literature mentions batteries made of nickel and lead,
has several different characteristics. The responsibility for such as nickel-metal hydride (NiMH), nickel-cadmium
various implementations should be based on these properties. batteries (NiCD), and lithium-ion batteries (LI-ION). NiMH
An adequate ESS helps the consumer save money in addition batteries require extensive maintenance and perform poorly at
to reserving the electricity for a longer period of time. To higher temperatures. NiCD batteries have a poor energy
density but are suitable for high temperature operation of energy storage system needed for an EV relies on a number
conditions. Because LI-ION batteries have a higher energy of variables, including the type of electric vehicle, consumer
density, they are lighter and require less maintenance in demand, cost, and environmental friendliness, among others.
comparison.
Lithium-ion batteries are the dominant electro chemical III. BATTERY MANAGEMENT SYSTEM
energy storage system. Electric mobility is moving towards global penetration day
by day and it is the responsibility of the manufacturers to
2) Electro-magnetic Storage:
provide a safe and comfortable driving experience to the
Electrodes and electrolytes are used in electro-magnetic
customers. It is inevitable to ensure safety and security of the
storage systems, sometimes known as super- or ultra-
passenger and the vehicle. BMS plays a crucial role to monitor
capacitors, to store static energy. Super capacitors are used as
the battery. BMS is the essential part in almost every high-end
secondary ESS due to their high power density, long life and
electronic device including smart phones, laptops, electric
fast charging capability. The power density range of super
vehicle and so on. The purpose of Battery Management
capacitor is 300- 5000 W/kg. The combination of electrode
system includes (i) Data acquisition (ii) Cell Equalization (iii)
and electrolyte materials, as well as the breakdown voltage
Provide Over/Under charge control (iv) Thermal management
level, affect an ultracapacitor's (UC) ability to store energy.
(v) Battery Stage Determination (vi) Safety and security.
Activated carbon is the most common electrode due to its
Figure 5 shows the main functions of BMS. Even though the
higher energy density and surface area. There are three
battery breakaways and damages cannot be eliminated,
different types of ultracapacitors:
however, the safety functions in the BMS provides a better
i. Double layer electro-chemical UC and safer environment for the batteries to reduce the likelihood
of undergoing unstable situations.
ii. Pseudo-SC
iii. Hybrid SC
3) Chemical Storage System:
3.1. Fuel Cell :
The environmentally friendly hydrogen fuel cells are
another alternative energy storage system that is already
available. Although it has a lesser energy density than
batteries and super capacitors, it is nonetheless favored
because of its minimal environmental impact. Fuel cells only
produce heat and water as waste. The most often used fuel
cells for electric vehicle energy storage systems include
proton-exchange membrane fuel cells (PEMFCs), phosphoric
acid fuel cells (PAFC), direct methanol fuel cells (DMFCs),
solid oxide fuel cells (SOFCs), alkaline fuel cells, and molten
carbonate fuel cells.
3.2. Bio-Fuel :
The type of bio-mass used determines the classification of
bio fuel. Algae, non-edible feedstock, and edible feedstock are
the three main categories of biofuels. In addition to being
economical, these fuels cut GHG emissions by lowering CO2, Fig. 5. Basic Components of BMS
PM, hydrocarbon (HC), and SOx emissions. Although liquid
biofuels can be utilized as a substitute to gasoline, their high
cost and ineffective conversion processes provide significant A. FUNCTIONS OF BMS
practical difficulties.
Energy storage systems used in EVs includes Electro-
Synthetic fuels can be created by mixing carbon monoxide chemical, Electro mechanical and Electrical Batteries. Most
and hydrogen, which eliminates the need to use fossil fuels electrochemical batteries are prone to overheat. Moreover,
altogether. Production of synthetic fuel is primarily based on Lithium based batteries tend to explode while thermally
biomass or recovered CO2. Synthetic methane, methanol, and unstable. To maintain the battery temperature, BMS plays as
diesel/gasoline are a few examples of liquid synthetic fuels. essential role. On any event of fault, the temperature of the
battery pack or the system can tremendously rise which leads
4) Hybrid Storage System: to abnormal heat generation, external heat transfer and poor
The integration of two or more energy storage systems is heat dissipation. Major reasons of thermal shoot up include
known as a hybrid storage system. So, battery and super external short circuit, current sensor fault, overcharging,
capacitor, battery and fuel cell, super capacitor and fuel cell, battery connection fault, cooling system failure, mechanical
or battery fuel cell and super capacitor are all viable options shocks such as collision and many more. The thermal runaway
for hybrid storage systems. Every storage system has can cause battery swelling, battery permanent damage, fire,
advantages and di sadvantages of its own. As a result, the kind
explosion and smoke. During thermal runaway, it checks for IV. CONCLUSION
options to turn on cooling system and helps to provide a better As we are moving towards the world of green energy,
the cell environment. Moreover, it can shut down other cells to electric vehicles play a crucial role in it. Energy storage
protect from severe damages during emergencies. BMS system and battery management system are two important
monitors the battery health and acquire the information functions which need to be discussed in EVs. Researchers are
regarding SOH, SOL, State of Power (SOP) and SOC and finding a lot of challenges in these areas. This paper discusses
ensure the life and safety of the batteries well in advance. about the different types and challenges of ESS in EVs. It also
SOH utilizes and captures the age of battery as capacity fade gives a detailed explanation about the battery management
and internal resistance [17]. A capacity decay of 20% and / or system in EVs. A lot of research is still need in these areas to
an internal resistance rise of 100% are generally considered as improve the performance of EV.
the End-of-Life (EOL) of a battery in automotive application.
There are various techniques available to estimate the battery
properties such as state-of-charge, state-of-health, state-of- REFERENCES
power as mentioned in [18]. Moreover, the status of the [1] A.A. Malikopoulos, Supervisory power management control algorithms
battery can be obtained using various algorithms. Many for hybrid electric vehicles: a survey, IEEE Trans. Intell. Transp. Syst.
15 (5) (2014) 1869–1885.
researches are progressing towards obtaining the said battery
parameters with ultimate accuracy. Main challenges and [2] A. Panday, H.O. Bansal, A review of optimal energy management
strategies for hybrid electric vehicle, Int. J. Veh. Technol. 2014 (2014).
advancements in the field of state estimation is showcased in
[3] S.F. Tie, C.W. Tan, A review of energy sources and energy management
[19]. system in electric vehicles, Renew. Sust. Energ. Rev. 20 (2013) 82–102.
Cell equalization is a very vital feature of the Battery [4] N. Sulaiman, et al., A review on energy management system for fuel cell
Management System. The vehicle battery is made of hybrid electric vehicle: issues and challenges, Renew. Sust. Energ. Rev.
52 (2015) 802–814.
combination of many cells in series/parallel. It is extremely
[5] S.G. Wirasingha, A. Emadi, Classification and review of control
common to have unequal charging rates between each cell in strategies for plug-in hybrid electric vehicles, IEEE Trans. Veh.
the battery pack. To ensure that each cell reaches full charge at Technol. 60 (1) (2011) 111–122.
the same time, there are various cell equalization [6] Somnatha, Kadlag Sunildatta, and Mukesh Kumar Gupata. "Review
methodologies existing. Cell equalization techniques include Paper on Electric Vehicle Charging and Battery Management System."
(i) Active cell balancing and (ii) Passive cell balancing Proceedings of International Conference on Communication and
methods.[20]-[21]. In passive cell balancing, which is also Information Processing (ICCIP). 2019.
called as resistor bleed method dissipated the charge as heat [7] Ranawat, Daisy, and M. P. R. Prasad. "A review on electric vehicles
with perspective of battery management system." 2018 International
across the resistor. In active balancing, it utilizes an inductor Conference on Electrical, Electronics, Communication, Computer, and
or capacitor to transfer the charge effectively from high Optimization Techniques (ICEECCOT). IEEE, 2018.
charged cell to low charged cell thus supporting balancing in a [8] Hasan, Mohammad Kamrul, et al. "Review of electric vehicle energy
much effective manner. An active balancing technique for storage and management system: Standards, issues, and challenges."
Lithium-ion battery is presented in [22] based on inductor Journal of energy storage 41 (2021): 102940.
balancing method. The paper presents equalization of eight [9] Sharma, Snigdha, Amrish K. Panwar, and M. M. Tripathi. "Storage
series connected cells in reduced time. Conventional issues in technologies for electric vehicles." Journal of traffic and transportation
inductor-based methods such as longer time and lesser engineering (english edition) 7.3 (2020): 340-361.
accuracy is eliminated here. Intense communication is [10] Rezaei, Hossein, et al. "Energy managment strategies of battery-
ultracapacitor hybrid storage systems for electric vehicles: Review,
inevitable which helps in proper decision making. Interaction challenges, and future trends." Journal of Energy Storage 53 (2022):
with the motor controller as well as upper vehicle controller 105045.
must be carried out correctly for the vehicles to operate as [11] Nikam, Vivek, and Vaiju Kalkhambkar. "A review on control strategies
intended. A data link is utilized by a BMS's communication for microgrids with distributed energy resources, energy storage
function to monitor performance, log data, issue diagnostics, systems, and electric vehicles." International Transactions on Electrical
or set control variables. The two most widely used protocols Energy Systems 31.1 (2021): e12607.
by BMS to interact inside the vehicle are CAN (standard [12] Sankarkumar, Rayavarapu Srinivasa, and Rajasekar Natarajan. "Energy
management techniques and topologies suitable for hybrid energy
communication) and RS232 and RS485 communications storage system powered electric vehicles: An overview." International
through the data bus. In [23], a new battery fault diagnosis Transactions on Electrical Energy Systems 31.4 (2021): e12819.
algorithm is proposed with better battery safety by utilizing [13] Habib, AKM Ahasan, et al. "A review: Energy storage system and
charge duration, charging current and capacity of the storage balancing circuits for electric vehicle application." IET Power
element. SOC, SOH calculations are implemented and initial Electronics 14.1 (2021): 1-13.
error is reduced using Coulomb counting method (CCM). A [14] Hasan, Mohammad Kamrul, et al. "Review of electric vehicle energy
further subject area that necessitates BMS monitoring is storage and management system: Standards, issues, and challenges."
charging control. Two stages are involved in charging. Journal of energy storage 41 (2021): 102940.
Constant Current (CC), during which the charger provides [15] Eldho, Reshma P., and K. Deepa. "A comprehensive overview on the
current trends and technological challenges in energy storages and
constant current. The secondary stage, known as Constant charging mechanism in electric vehicle." Journal of Green
Voltage (CV), is where the battery receives a fixed voltage Engineering 10.9 (2020): 4679-6713.
level while only receiving little current. The BMS makes sure [16] Kang, Taewoo, et al. "Thermal analysis of a parallel-configured battery
that all these processes go smoothly. pack (1S18P) using 21700 cells for a battery-powered train." Electronics
9.3 (2020): 447.
[17] Hu, Xiaosong, et al. "State estimation for advanced battery management:
Key challenges and future trends." Renewable and Sustainable Energy
Reviews 114 (2019): 109334.
[18] Hu, X., Feng, F., Liu, K., Zhang, L., Xie, J., & Liu, B. (2019). State
estimation for advanced battery management: Key challenges and future
trends. Renewable and Sustainable Energy Reviews, 114, 109334.
[19] Lipu, MS Hossain, et al. "Intelligent algorithms and control strategies
for battery management system in electric vehicles: Progress, challenges
and future outlook." Journal of Cleaner Production 292 (2021): 126044.
[20] Kelkar, Apoorva, YashwanthDasari, and Sheldon S. Williamson. "A
comprehensive review of power electronics enabled active battery cell
balancing forsmart energy management." 2020 IEEE International
Conference on Power Electronics, Smart Grid and Renewable Energy
(PESGRE2020). IEEE, 2020.
[21] Uzair, Muhammad, Ghulam Abbas, and Saleh Hosain. "Characteristics
of Battery Management Systems of Electric Vehicles with Consideration
of the Active and Passive Cell Balancing Process." World Electric
Vehicle Journal 12.3 (2021): 120.
[22] A. F. Moghaddam and A. Van Den Bossche, "An Active Cell
Equalization Technique for Lithium Ion Batteries Based on Inductor
Balancing," 2018 9th International Conference on Mechanical and
Aerospace Engineering (ICMAE), 2018, pp. 274-278, doi:
10.1109/ICMAE.2018.8467685.
[23] Lee, Jeong, et al. "Battery management system algorithm for energy
storage systems considering battery efficiency." Electronics 10.15
(2021): 1859.
Abstract— In the urban areas, there is an increased demand technology of CCTV cameras as Vehicle Number Plate
for ownership of the vehicles which has led to a civic problem of Recognition system. The ultimate goal is to identify a plate
traffic control and vehicle identification. For an number from pictures taken from vehicles (vehicle images).
organization/institution or any restricted areas, security is Several problems can arise from environmental conditions
important and to enhance this security it is advisable to keep like illumination, deteriorated plates, etc., which motivate the
track of the vehicles entering. Hence vehicle number plate development of robust and reliable systems for Automatic
recognition plays an important role in solving these problems. It Number Plate recognition.
is an image processing technique that uses a number plate to
identify the vehicle. In this approach, the image of the vehicle II. RELATED WORK
has been enhanced and threshold technique was applied for a
better resolution. Our approach to license plate recognition is In India, The number plate usually contains the first two
based on a Convolution Neural Network YOLO, holistically letters as the state code followed by district code and then a 4
processes the whole image, avoiding segmentation of the license digit code that is specific to a particular vehicle file. Example,
plate characters. This work aims to recognize license plate KA 19 M 5990 where KA stands for Karnataka, 19 for
images automatically to fulfill the requirement for automation Dakshina Kannada, M 5990 corresponds to vehicle specific
in surveillance of any highly restricted areas. The result shows number. Some techniques have been proposed to detect Indian
the success rate of number plate recognition is 98.6% and 84.7% vehicle number plates. One of the method adopted to detect
in vehicle number detection. This accuracy can be improved the number plate is bounding box [1]. As a first step, the image
greatly by positioning the camera suitably to capture the best is obtained. This obtained image is then converted into
frame and using better image enhancing techniques grayscale and noise is removed using a median filter. The
boundaries of the image were detected using Sobel edge
Keywords—vehicle identification, restricted areas, threshold, detector. After extracting the desired region, bounding box
You Look Only Once method is used to map each character. Each letter will be
I. INTRODUCTION mapped a box and displayed each character into a single
image. This was then followed by segmentation. After
India is a developing country with the second-highest segmentation, comparison has been made for each character
population in the world. Most of the population depends on with and correlation is used for recognition of each character
conventional public transport like buses for commutation, in the number plate.
while the others prefer private vehicles. Vehicles are an
integral part of transportation systems today, and their use has One more method for number plate detection was
increased exponentially due to population growth. As there proposed which is based on Hough lines using Hough
was a rapid development of economy around the world, along transformation and template matching [2]. After the image
with the increase in the usage of the car, the problems such as capturing, a pre-processing technique was used. It was then
car theft case, traffic accident, road congestion have also followed by using the Canny detector to detect the edge of the
increased. In order to solve these problems, each country is license plate. After that, the Hough transformation was used
actively studying how to manage and monitor vehicles more to determine the horizontal and vertical edges. The characters
effectively with low cost and high efficiency. were divided with the use of a dilatation procedure. For
template matching, blocks measuring 38 x 20 were created.
License/Number plates were introduced to uniquely After cross-correlating, the ASCII values were then acquired
identify the vehicle. Our work is inclined to license plate using OCR. The proposed method [13] uses a combination of
recognition for vehicles entering restricted areas like military Feature Extraction Model and Back Propagation Neural
camps, research centers, college campuses and so on. When Networks for license plate detection. Here, the first step
we consider a venue where political conferences are held, it is involves boosting the Automobile image’s contrast ratio. The
important to make sure no one trespassers are allowed in. For second step is to use integral projection method in order to
this purpose, security guards are assigned to each entry point. identify the correspond number plate. The three sets of
However, the process of manual vehicle verification is long features are then combined to create a new feature extraction
and tiresome and inefficient in the long run. To overcome this model, which is then trained using Back Propagation Neural
problem, we add a verification system to the existing Networks to accurately recognize the characters on license
plates. The approach suggested in [11] use K-means Thus, the proposed method of detecting number plates can
clustering and Convolution Neural networks to identify be divided into sub-parts which contain: 1. capturing the
automobile license plates. The CCA and IBA models are used image of the vehicle, 2. Locating the number plate of the
in the first step to locate and detect the License Plate. This is image, 3. Pre-processing the image i.e. image enhancement,
then followed by segmentation step, using clustering reducing noise, adjusting brightness and contrast of the image,
technique. The last step involves usage of CNN model to 4. Recognizing the characters on the number plate, 5.
identify the characteristics. The work [14] has been carried out Verifying if the obtained number plate is a registered one or
using YOLOv4 along with thresholding, Morphological not. Hence a database has to be maintained for the verification
transformations. The characters were recognized using OCR of the registered number with that of the obtained number
technique. As an another approach, a neural network based plate.
Deep Learning Model is proposed [4], wherein, A
comparative study of detecting the mechanical parts of car III. METHODOLOGY
engine using different versions of YOLO is conducted. YOLO The proposed system is to identify vehicle number of a
is a real-time object detection framework and stands for You vehicle in St Joseph Engineering College and to allow only
Only Look Once. The experiment involved identifying eight registered vehicles. The high level architecture diagram is
different mechanical parts of a car engine using different shown in Figure 1. The model for Vehicle Number
versions of YOLO. Experimentation revealed that YOLOv5 Identification has four main steps: image extraction, vehicle
could adequately handle the detection problem. Along with plate detection, Image enhancement techniques and OCR
the detection, YOLOv5 was able to detect object parts from API. The image enhancement is an essential step since the
real time video streams, with high accuracy. A review on resolution of the image is low. Figure 2 depicts the main steps
Indian Number Plate recognition system [10] demonstrates involved.
that the basic steps would involve preprocessing, detection,
segmentation and recognition. A comparative study has been
made and observed that mathematical morphology technique
results in higher accuracy.
A few issues may arise while detecting the appropriate
images. One issue is character recognition in number plate
images. The work [12] is carried out on License plate Fig.1. High Level Architecture
detection in unconstrained scenarios. The approach involves
initially to identify the vehicles. It is then followed by
identifying the license plates. This step is supported using
Warped Planar Object Detection Network. It looks for License
plates and does one affine transformation regression for each
detection. This results in License plate area identification.
This obtained rectified detections are then passed onto the
final step which involves using Optical Character Recognition
network. The study [9] focuses on various plate segmentation
methods and discovered that edge-detection based methods
are the most efficient of all techniques. The work also
addresses the issue of unwanted boundary plates which can
lead to character recognition errors. The problem is addressed
here using thresholding technique. Reference [3] concerned
with dealing with difficult situations such as varying
illumination, blurred, skewed, noisy images, non-standard and
partially worn out number plates. For image pre-processing,
various techniques have been used. Border following contours
are used for number plate segmentation and these contours are
filtered based on character dimensions and spatial
localization. The K Nearest Neighbor algorithm was used for
character recognition with the query point labelled with a class
that has the most neighborhood support; considered as the
nearest neighbor’s simple majority vote. It was implemented
using scikit-learn.
Image resolution is still another issue to be solved. It was
suggested to use unique CNN model [5] for single image super
resolution. This technique uses a sub-pixel convolution layer
in the CNN architecture to upscale the low resolution input Fig. 2. Steps involved in Vehicle number identification
image to a high resolution image. The study [8] shows how to
construct applications using two distinct algorithms—number A. Dataset and Image extraction
plate detection and recognition—along with learned models The dataset for this system is the CCTV camera
rather than random initialization. The task was carried out video footages taken between the timings 8:30am to
using the TAO toolbox. 9:00am and 4:45pm to 5:15pm. This video footage will be
converted into suitable form for further processing. In
order to reproduce the images from the CCTV video, the
video is split into frames. The following algorithm is used D. Image Enhancement and Thresholding
to accomplish this task The number plate image that has been thusly discovered
Algorithm: Extraction of frames from the video has a low resolution. The image has a resolution that varies
BEGIN from 57 x 26 pixels to 91 x 68 pixels. We applied a model
Video is taken from user known as "Super-Resolution for Single Images and
getFrame(seconds) Videos in Real-Time Utilizing a Powerful Convolutional
Video is set to position to get the frame Sub-Pixel Neural Network "model in order to improve the
It gets the frame model's resolution[5]. It doesn't use perceptual loss or
Frame is Saved generic loss, but because it upscales with sub-pixel
If Success convolutions, it is a very quick model. The model triples
Increase Count the image's enhancement. After enhancement, the image
Increase seconds (Add FrameRate) resolution is 672 × 672 pixels.
The seconds is rounded off To reduce background noise and improve the image,
Get the rest of the frames various different approaches like grey scaling and
till the video is ended Gaussian blur were applied. Thereafter, a thresholding
Seconds is initialized to 0 (start) process will follow, in which pixels below 100 will be
Frame Rate is defined made darker while those above 255 will be made lighter.
Get the first Frame
END E. OCR API
B. Annotation of number plates and dividing the dataset Usually, applications use segmentation of characters and
use models like CNN to train the characters to recognize
The extracted images then, shall be further processed for them. Although such methods have been tried, the low
annotation. This step would result in two different types of quality of the images and the angle at which the CCTV is
files, text file and image file. The task is achieved using placed make them ineffective. This can be accomplished
Computer Vision Annotation Tool (CVAT)[15]. The by making use of OCR API.
dataset is exported in YOLO format for further processing.
IV. EXPERIMENTAL RESULTS AND DISCUSSION
C. Vehicle Plate Detection Using YOLOv5
YOLOv5 model [6] is applied for training the data to In our experiment, we have used CCTV video footages
detect the number plate. It is implemented as a captured at the front gate between the timings, 8:30AM to
convolutional neural network. It consists of 24 9:00AM and 4:45PM to 5:15PM. These videos were in .avi
convolutional layers followed by two fully connected format which was then converted to .mp4 format. Image
layers. The current implementation utilizes the YOLOv5s frames were extracted from the videos at the rate of 2 frames
model, which is a pre- trained model. The model needs to per second.480 images were used for training the algorithm
be trained using trained data, obtained in the previous step. and 105 images were used to test the algorithm. The
A simple algorithm [7] is applied to get the region of annotation of the number plate is done by CVAT tool. We
interest on test images annotated all the training data using CVAT and export it as the
YOLO 1.1 dataset. We now have an image and a text file,
Algorithm: Retrieve the Region of interest which includes the bounding box coordinates in the YOLO
BEGIN format. The current implementation of the application utilizes
Img<-original image the YOLOv5s model, which is a pre-trained model. We
dh,dw<- height and the width of original image trained the model using 16 batches and 100 epoch. The
open text file containing the coordinates of the image training of the model took 15 minutes and 30 seconds. Figure
in yolo format 3 shows the detected number plate using the model YOLOv5.
data<-Read the text file
Initialize ROInumber to 1
#convert yolo format coordinates to box coordinates
For each line in data
Read values in x,y,w,h , convert into float
L<-int((x-w/2)*dw)
R<- int((x+w/2)*dw)
T<- int((y-h/2)*dh)
B<-int((y+h/2)*dh)
If L<0 then L<-0
If R>dw-1 then R<-dw-1
If T<0 then T<-0
If B>dh-1 B<-dh-1
Create a Bounding Box using L,T,R and B Values
Get the ROI Image
Save the Image
Increase the ROI Number Fig. 3. YOLOv5 model recognizing the number plate
END We have used Google CoLab for training our model.
Using the Region Retrieval algorithm, the region of interest
will be obtained on the test image. A sample output after this
step is shown in Figure 4.
The image resolution we get after enhancing is 672 X 672 YOLOv5m 29mins 22s 143 100
pixels. The enhanced image is shown in Figure 5. It was then YOLOv5l 46mins 51 s 143 100
followed by thresholding. The corresponding image is shown
in Figure 6.
We have used YOLOv5s model, which is the smallest version
of YOLOv5 models. Additionally, there are models YOLOv5l
and YOLOv5x, the latter of which is the largest. The
performance of the network may also increase as its size
increases, at the expense of longer processing times. As a
result, the larger models may only be useful for complex
problems with a large dataset. We have also analyzed the
training set using different models of YOLOv5, using a
constant epoch and batch size. The results are shown in
Fig. 5. Enhanced image TABLE 1 and TABLE 2.
With OpenCV, thresholding is a technique that assigns pixel
values based on threshold values. Thresholding consists of
comparing each pixel value with a threshold. If the pixel value
falls below the threshold value, it is set to 0. Otherwise it is set
to the maximum value (generally 255). The thresholding
technique is used in computer vision on grayscale images. As
a result, the image has to first be converted into grayscale.
There are different types of thresholding methods like
BINARY, BINARY_INV, TOZERO, and TOZERO_INV.
We have used different methods, the analysis of this is shown
Fig. 6. Image after thresholding in TABLE 3. From the table, we can deduce that TOZERO
produces the best result. Hence, we have used the TOZERO
This image is then given to OCR API to identify the value for thresholding.
vehicle number. TABLE 3 TABLE FOR DIFFERENT THRESHOLD VALUES
A simple user interface is developed to retrieve vehicle Threshold value Total images Detected images
number of vehicles and either to give the result as allow or TOZERO 144 122
deny. The user opens the file explorer to query a picture
obtained by the videos of CCTV footage and uploads it to the BINARY 144 98
application for prediction. The API gives the result which is Without Thresholding 144 95
compared to the database to either allow or deny the vehicle.
In the above example, the image takes 14.27 seconds to be
processed after the user uploads the image in the application. A model's accuracy is determined by the percentage of
Additionally, it has correctly identified the number plate as correctly identifiable images among all images in a dataset.
"KA51AF6349" with an accuracy of 0.879. In some cases, Testing has been conducted using 146 images. The number
poor image quality results in incorrect identification. In the plate could be discerned in 144 images out of 146, which is
following step, the result is compared with the records on the 98.6% accuracy. Among the 144 images analyzed by the OCR
database that contain the user's personal information along software, 121 number plates were correctly identified,
with the vehicle number If the result is matched the vehicle is corresponding to an accuracy of 84.7%.
allowed or else the vehicle is denied. V. CONCLUSION
The work carried out adheres to St Joseph Engineering
College and the problem is approached using Convolution
Neural Network and Yolov5. Although there are several other
methods like Bounding box and Segmentation, a problem
TABLE 1 TABLE FOR DIFFERENT MODELS WITH EPOCH 50 would arise here due to the variant forms and font of license
Model Time Taken Number plate Epoch plates. The proposed system was designed to identify vehicle
detected plate numbers and to see if that vehicle is allowed to enter or
not. This system which was designed works satisfactory for
Abstract—Analyzing Geo-locational data provides a powerful The most typical hierarchical clustering method used to put
source of information about places and regional human objects in clusters based on their similarity is called
behavior. In the fast-moving, effort-intense environment that agglomerative clustering. Each object is first treated as a
the average person inhabits, an amenity rich place which ease singleton cluster by the algorithm. Pairs of cluster centers are
their uses. Most of the time in order to know about a location, progressively combined after all groupings have been
different amenities are explored and calculates whether it is in consolidated into one large cluster that contains all items.
our budget or not. So with data visualization and clustering In The outcome is a dendrogram, which is a tree-based
this article,amenity rich places near to the given location are depiction of the objects as seen in Fig 1.
figure out and within the given radius by considering different
parameters which are near to the location like restaurants,
cafes and parks as a whole .This project involves the use of
Agglomerative Hierarchical Clustering to group population,
and to group geo-locational data ,that are applied on the geo-
locational data obtained from Foursquare API (Application
programming Interface)URL(Uniform Resource Locator)to find
the best accommodation for a person in a location of latitude
and longitude by classifying accommodation for the people on
the basis of their preferences on amenities, budget and
proximity to the location. Our aim is to find the places which
are rich, average and poor in amenities and representing them
on map.
Keywords—Agglomerative Hierarchical Clustering, Foursquare
API, Geo-locational Data Fig. 1. A Dendrogram (right) Representing Nested Clusters
I. INTRODUCTION (left)
Geolocational data analysis aids in learning about locations
and local human behavior. Finding the ideal place to live II. LITERATURE SURVEY
might be challenging for those who travel frequently. India
contributed 1.57% of all foreign visitor visits in 2020. Yang et al.[1] used interactive steering a technique for visually
10.67% of all foreign visitors to the Asia Pacific region in monitoring limited hierarchical clustering that makes use of
2020 were from India. In comparison to 2018, India both user public and user private knowledge. This entails
embraced over 17.9 million foreign tourists, an increase of integrating knowledge (knowledge-driven) and inherent data
3.5%. India currently ranks 22nd globally and is the eighth distribution (data-driven) to automatically create constraints
most visited nation in the Asia-Pacific region. With so many for hierarchical clustering and enables interactive clustering
tourists paying close attention to India, it will be difficult for steering through a visual interface (user-driven). Each data
them to locate a place to stay and enjoy their trip. item is initially mapped using this technique to the most
pertinent knowledge base elements. The ant colony
So, depending on the location they selected as well as their optimization approach is then utilized to extract an initial
preferences for the location, we decide where would be best
constraint tree. The technique evenly distributes the width and
for them. People that relocate to a new location would
already have certain likes and tastes, hence exploratory depth of the tree and provides high confidence coverage of the
analysis on geo-location is utilized in the domain of data points. Dos Santos et al.[2] discussed hierarchical density
determining the ideal location. If the customers lived close to based clustering that is based on a precise, yet very
the favorite outlets, it would save them a lot of trouble. computationally intensive, random blocks parallelization
method. For effective application of hierarchical density-
The population or data points are divided into a number of based clustering to large datasets using MapReduce, we
groups only with the aim of making each group's data points proposed a novel parallelization rough clustering hierarchy
more similar to one another than those of the other groups. In based on a noticeably faster, recursive sampling approach.
other words, the objective is to put people in groups based on
the qualities they have in common.
Chen et al[3] used Foursquare API (Application programming directions, places to visit, and models. The program can be
interface) to gain knowledge about location-based social used to plan a trip within a predetermined window of time.
networks (LBSNs). It is impossible to offer a comprehensive Additionally, it will be useful for users who wish to quickly
picture of the user community because the majority of visit Mumbai and are unfamiliar with the city.
existing research focuses on a biased sampling of users.
Instead of solely relying on social connectedness data, It In the findings we came to know that K-Means clustering
provided a machine learning method to assess a user's does provide an efficient solution when the number of
influence by reviewing their profile and user-generated clusters are mentioned, but does not help in areas where the
content (UGC).The detailed LBSN data, which also offers number of groups are unknown. So, we used the
information on the movement of a large number of users, can agglomerative hierarchical clustering which provides an
be used to anticipate .Wunsch et al.[4] used a technique efficient and effective solution of forming clusters. Based on
which is based on performance assessment, aggregative the readings we know that FOUR Square API is well-known
hierarchical clustering (HC-PE), an improved clustering social network based on location that has widespread use to
technique, is proposed in this study for the reduction of high- fetch data, So, we’ve used the Foursquare API that helps in
order dynamical system models. Either a genetic algorithm identifying the preferred locations for the given latitude and
(GA) or the Pade approximation is used. Two groups of longitude and also Agglomerative hierarchical clustering
results are shown in this paper. Simple models can be found requires no apriori information and it gives appropriate
in the initial sets. A model having a number of inputs and results in most of the cases.
outputs is used in the second round of trials. We show that,
when compared to other strategies, HC-PE has the best III. METHODOLOGY
performance with the fewest MSEs (mean squared error). In This paper proposed a system to understand Geolocational
order to maintain as many of the qualities of dynamic system data for targeting customers. The geolocational data fetched
models while reducing their complexity, it analyses their from Foursquare API (Application programming interface)
characteristics and features. helps to analyze the customers proximity to location. This
information assists organizations in locating potential
Cheng et al[5] used Silhouette and Davies-Bouldin indexes customers and even provides a thorough study of customer
which are two examples of the cluster validity indices that preferences and tastes. The proposed system is for analyzing
have been presented. These validity indices, however, are and applying hierarchical clustering on geolocational data
unable to comprehend clusters of any shape. Some which helps to analyze the customers proximity to location
academics employ graph-based distances to cluster non- based on different amenities. The Fig.2 represents the
spherical data sets, despite the fact that computing them process flow of the proposed model.
between each pair of points in a data collection takes time.
The selection of a few representative points is a potential • Fetch the data
remedy. Hence proposed the creation of a new Local Cores • Data Exploration and Visualization
index to improve the usefulness of the Silhouette index. As
• Extracting important parameters from migrant data
typical points, local cores with regional maximum densities
are chosen. The LCCV index uses graph-based distance to through Agglomerative Hierarchal Clustering
assess how differently local cores differ from one another. • Get Geolocational Data from Foursquare API
Steiner et al[6] provided thorough analysis of Four Square • Run Clustering techniques on Geolocational data
is a well-known social network based on location that has • Plot the clustered locations on a map
widespread use. After gathering 2.4 million venues from 14
various geographical regions around the world, we establish
the following conclusions about the characteristics that well-
liked venues have in common. First, popular locations are
more likely to have complete profile information. The most
check-ins per venue are in the Travel category which is the
most popular one., with each location receiving an average
of 376 check-ins. Secondly, the vast majority (43%) of
public tips (comments) from users are given to places in the
food category. Additionally, compared to other categories,
the residential, office, and school categories had higher
stickiness of people checking in locations. Last but not least,
older people in general. Psyllidis et al[7] introduced a
framework to find homogeneous areas of social engagement
in cities and determine the best locations for new POIs. This
framework combines Geo-Self-Organizing Map with
contiguity-constrained hierarchical clustering, taking into Fig. 2 Process Flow Diagram
account multiple dimensions of information from social
media data. We create a Factorization Machine-based The model has 6 stages: Dataset Collection, Exploring and
model based on the regions found to find the ideal sites for visualizing the data, Run Clustering techniques on the data,
new POIs in diverse urban settings. Json Nemani et al [8] fetching geolocational data from Foursquare, run clustering
suggested the "City Tour Traveler" (CTT) system, which is techniques on Geolocational data and Representing Clusters
an application for Mumbai URL (uniform resource locator) on map.
and is based on GPS (Global Positioning System) and the A. Dataset Collection
Internet, can simply deliver travel information to mobile Collect the data from the customers, which must be
users. The finest experience to tour the city will be provided represented as CSV files (Comma Separated Values)
154because
by the successful design of the Travel App978-1-6654-6084-2/22/$31.00
with accurate ©2022 IEEE
this data will be used to create clusters using clustering
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
algorithms (groups),[10] To identify the best E. Run Clustering techniques on Geolocational data
accommodations, information based on the customer's Based on the amenities close by, sites are grouped using
preferred location must be retrieved from Four Square. The agglomerative hierarchical methods. When a place's latitude
dataset contains the attributes of migrant preferences like and longitude are inputted and a high number of amenities
income, weight, comfort-food, sports and so on. are present nearby, the location is categorized as amenity
rich, whereas a location with less facilities is categorized
B. Clean and Visualize Data
amenity poor. We can get the count of each amenity such as
Now we have our data, we need to understand it. A good restaurants, cafes, and parks.[14]
way to do this is by visualizing the data via graphs. Graphs This will categories accommodation for individuals
help us quickly get a sense of the data, and are a much more according to their choices for amenities, affordability, and
user-friendly way of understanding data as compared to closeness to the site in order to locate the best lodging for a
reading thousands of rows of data.[11] A graph to look at person in a given location of latitude and longitude. The sites
distributed groups is a Boxplot and it is shown in Fig 3. that share a characteristic will be aggregated or clustered.
Similar locations will be grouped(clustered) together. Graph
of clustered Geolocationsis shown in Fig 6.
C. Extracting important parameters from migrant data
through Agglomerative Hierarchal Clustering
F. Plot the clustered locations on a map
We apply agglomerative hierarchical clustering [9] on the
data. which will help us organize the population into groups A The final phase is to plot the clustered Geolocational data on
way for performing cluster analysis is the wards method. map. Folium is a library which is a great way in mapping
geolocational data.
Instead of employing distance metrics or measures of
association, it essentially views cluster analysis as an
analysis of variance problem.[12] An agglomerative
clustering algorithm is used in this process. Here
extracting important parameters is done by getting the best
value of number of clusters that is where the clusters are
clearly demarcated on particular attributes (e.g., income) Note
the difference in the clusters as you step through different
value of number of clusters. Must not forget to plot boxplots
again to see if there's any visible demarcation based on
different parameters thus, only important parameters are
extracted which are used are used in later process (in grouping
Geolocational data) and it is represented in Fig 4. The distance
between two clusters is the difference between two locations
in each cluster. Here r is the radius bounded by cluster 1 and s Fig. 3 Boxplot of Dataset
is the radius bounded by cluster 2 and the function D is for the
distance calculation between two clusters.
REFERENCES
[1] Yang, W., Wang, X., Lu, J., Dou, W. and Liu, S., 2020. Interactive
steering of hierarchical clustering. IEEE Transactions on
Fig. 6 Graph of Clustered Geolocational data Visualization and Computer Graphics, 27(10), pp.3953-3967
[2] Dos Santos, J.A., Syed, T.I., Naldi, M.C., Campello, R.J. and Sander,
J., 2019. Hierarchical density-based clustering using
MapReduce. IEEE Transactions on Big Data, 7(1), pp.102-114.
IV. RESULTS [3] Chen, Y., Hu, J., Xiao, Y., Li, X. and Hui, P., 2020. Understanding
the user behavior of foursquare: A data-driven study on a global
scale. IEEE Transactions on Computational Social Systems, 7(4),
Clusters are formed based on the similarities. We took Benz pp.1019-1032
circle in Vijayawada as the location and applied [4] Al-Dabooni, S. and Wunsch, D., 2018. Model order reduction based
agglomerative hierarchical clustering on it so the final on agglomerative hierarchical clustering. IEEE transactions on neural
networks and learning systems, 30(6), pp.1881-1895.
results are shown in the below figures.
[5] Cheng, D., Zhu, Q., Huang, J., Wu, Q. and Yang, L., 2018. A novel
cluster validity index based on local cores. IEEE transactions on
neural networks and learning systems, 30(4), pp.985-999..
[6] Li, Y., Steiner, M., Wang, L., Zhang, Z.L. and Bao, J., 2013, April.
Exploring venue popularity in foursquare. In 2013 Proceedings IEEE
INFOCOM (pp. 3357-3362). IEEE.
[7] Psyllidis, A., Yang, J. and Bozzon, A., 2018. Regionalization of
social interactions and points-of-interest location prediction with
geosocial data. IEEE Access, 6, pp.34334-34353.
[8] Nemani, Y.M., Yadav, R., Patki, M., Padave, O. and Bhelande, M.M.,
2018. City Tour Traveller: Based on FourSquare API. City, 5(04).
[9] Patel, P., Sivaiah, B. and Patel, R., 2022, July. Approaches for finding
Optimal Number of Clusters using K-Means and Agglomerative
Hierarchical Clustering Techniques. In 2022 International
Fig. 7 Clustered locations on map Conference on Intelligent Controller and Computing for Smart Power
(ICICCSP) (pp. 1-6). IEEE.
[10] Wang, P., Ding, C., Tan, W., Gong, M., Jia, K. and Tao, D., 2022.
Uncertainty-aware clustering for unsupervised domain adaptive object
The locations are divided into clusters based on similarities re-identification. IEEE Transactions on Multimedia.
and in the Fig 7 we can see that there are 3 group of clusters [11] Daraio, E., Cagliero, L., Chiusano, S. and Garza, P., 2022.
are formed. Complementing Location-Based Social Network Data With Mobility
Data: A Pattern-Based Approach. IEEE Transactions on Intelligent
Transportation Systems.
[12] Sharma, S. and Batra, N., 2019, February. Comparative study of
single linkage, complete linkage, and ward method of agglomerative
clustering. In 2019 International Conference on Machine Learning,
Big Data, Cloud and Parallel Computing (COMITCon) (pp. 568-
573). IEEE.
[13] Gong, W., Zhang, W., Bilal, M., Chen, Y., Xu, X. and Wang, W.,
2021. Efficient web APIs recommendation with privacy-preservation
for mobile app development in industry 4.0. IEEE Transactions on
Industrial Informatics, 18(9), pp.6379-6387.
[14] Lee, J.H., Moon, I.C. and Oh, R., 2021. Similarity Search on Wafer
Bin Map Through Nonparametric and Hierarchical Clustering. IEEE
Transactions on Semiconductor Manufacturing, 34(4), pp.464-474.
[15] Chen, Joy Iong Zong. "Optimal Multipath Conveyance with
Improved Survivability for WSN’s In Challenging Location."
Fig. 8 Representing Clusters on map Journal of ISMAC 2, no. 02 (2020): 73-82.
Abstract- This research work proposes a novel method Micro aerial vehicles are one of the most widely
to prevent collision in the micro aerial vehicles by researched topic around the world that caught
calculating the distance of the obstacle prior to the attention in recent years around the globe because of
collision. For distance measurement we have used the its less weight and the compact size. They are being
LiDAR sensor which uses the time of flight principle used extensively in the field of Aerial surveillance
and, identified its operating ranges that works for various field sites like power plants, Inspection of
perfectly for the micro aerial vehicles and analyzed power lines in some cases [5] and its applications are
the errors in various operating ranges. Determining of great importance including Aerial Mapping,
accuracy using the Root Mean Square Error and Computer Vision, etc. LiDAR finds it application in
Absolute Mean Error as two parameters for three obstacle avoidance and collision avoidance using the
types of data classified as All calculated data, very time on flight principle [6]
close values and deviating range of the Result plotting
graphs and calculating errors for the same. This
proposed research helps in understanding the LiDAR II. CONCEPT
Sensor in better way for the exploration of the range A. Time of flight principle
of operation of the LiDAR sensor and its applications
in collision avoidance. Though the algorithm that we There are various concepts to measure distance
have done is in the Arduino UNO the same can be using the LIDAR sensor. The widely used technique
implemented in Pixhawk module and the control is to use ‘time of flight principle’[6,7]. TOF emits a
signal can be used to change the direction of the pulse of laser on timely basis. The calculator
micro aerial vehicle where ever necessary. measures the time between the laser pulse and target
and sends the signal to the receiver so the distance is
Keywords: Distance, LiDAR, Collision, Avoidance, obtained. In Time-of-flight LIDAR the target that
Arduino, MAV has to be detected is illuminated and the receiver
collects the backscattered photons to analyze the
I. INTRODUCTION
distance of the object.
One of the most accurate techniques to measure distance
of an obstacle that are in space is the LiDAR. LIDAR
stands for Light detection and ranging which is similar to
the RADAR. LIDAR differs from RADAR, as LIDAR
uses UV light in the visible spectrum whereas RADAR
uses Radio waves [1-2].
Collision Avoidance is the concept of using a stimulus The Black cable connects with the GND pin in the Arduino
generated by a sensor which in return tells the Micro Aerial UNO in the same way the Red wire is specified with the
Vehicles to change its direction to the direction other than positionof 5V pin for the right voltage supply to the
where the obstacle is present [9,10]. Arduino and finally the white and green to the PIN 2 and
PIN 3 respectively
After the stimulus is received the MAV has to change
direction or needs to stop near the obstacle
C. Arduino UNO
III. METHODOLOGY
LIDAR
DISTANCE COLLISION
MEASUREMENT AVOIDANCE
IV. EXPERIMENT
For the experiment we are using the Benewake’s Tf-
mini-s micro LiDAR sensor which is popular for distance
measurement in UAV’s and is widely because of its Fig.4. Describes the wires which we have to connect to
specified operating range being 10-1200 cm and its
LiDAR
compatibility with the micro controller boards like
Arduino UNO. Arduino NANO or python development
board like Raspberry PI. For the experiment we are using
Arduino UNO which uses Arduino CC compiler for V. CODING
deploying our code.` For coding we have used Arduino CC compiler which uses
C++ programming which has the two bodies in the coding
The LiDAR has the following wires[14] to connect of setup and loop.
In the setup part we have specified the code to take output TABLE I. Actual Distance vs Distance Measured
from the Rx and Tx pins that is PIN 2 and PIN 3 of the by LiDAR
Digital Section. We have imported the “Software Serial”
Library and used to setup the PIN 2 and PIN 3 with the S.no Y in cm Y’ in cm
serials as 9600 and 115200 serials in the void setup. 1 50 51
2 100 101
3 150 154
4 200 200
5 250 254
6 300 301
7 350 353
8 400 408
9 450 452
10 500 501
11 550 555
12 600 603
13 650 652
14 700 709
15 750 755
16 800 803
17 850 852
18 900 905
Fig. 5. Pin connections from LiDAR to Arduino UNO. 19 950 959
20 1000 1008
21 1050 1058
22 1100 1113
23 1150 1166
In the looping module we use it get distance measure from 24 1200 1185
the LiDAR as continuous output of result. During the
looping procedure we take readings from the previously
stated serial of the PINS 1 and 2 and perform operation to
get the distance of the obstacle from LiDAR as a part of the
process we gave a continuous print statements comprising
DATA ABSTRACTION
of the Distance measured and Strength of Signal as two 1200
outputs. For a slow portrayal of result we kept a delay of 1150
5ms. 1100
1050
1000
After completing the coding and reverifying for error in the 950
inbuilt interpreter we have deployed the code to the 900
Arduino in the above specified manner and the code was 850
800
working without any error and was giving the output of 750
DISTANCE
parametric errors are Root mean Square Error(RMSE) and 4 1100 1113
Mean Absolute Error(MAE). 5 1150 1166
6 1200 1185
RMSE and MAE are key statistical parameters use in
various studies like Geo Sciences, Atmospheric Sciences
VIII. RESULTS
[15] we are going to use the same to understand our
After calculating the errors we have deduced the following
purpose
from the 24 samples we have calculated
∑𝑛 ′
1 (𝑦 −𝑦)
2
𝑅𝑀𝑆𝐸 = √ (2) RMSE OF TABLE 1= 6.934
𝑁
1
MAR OF TABLE 1 = 5.333
𝑀𝐴𝐸 = |𝑦 − 𝑦′| (3)
𝑛
After creating the Table we have calculated the root mean
square error and mean absolute error of the data from
Where, TABLE 2 and the results are as follows:
From the data we can understand that the first 18 iterations The RMSE of 0 is quite impressive result which matches
that is from 50-900 we have very accurate reading to the the expectation and is the most suited for wide range
actual values which implies that the LiDAR Sensor application including UAV’s within the specific range for
performs accurately within that range. collision avoidance.
If we take most accurate results from the TABLE 1 from the When analyzed the tabular data present in the TABLE 3
data of 50-1200 cm and make another Table for the data and calculated the RMSE and MAE and the result is :
which helps us understand the result in that range of 50-
900 and make it as TABLE 2. RMSE OF TABLE 3 =11.965
X. CONCLUSION
After performing this experiment using the LiDAR and Unmanned Aircraft Systems (ICUAS)June 7-10,2016.
collecting its distance measurements after clear analysis of Arlington, VA USA
the results including the calculation of errors like RMSE [8] C. Ye and J. Borenstein, "Characterization of a 2- D
and MAE we have clearly found the ranges where the laser scanner for mobile robot obstacle negotiation," in
LiDAR Sensor performed really well and the range where ICRA, 2002, pp. 2512-2518
it performed satisfactorily for the use case. From the results [9] Jawad N. Yasin, Sherif A. S. Mohamed, Mohammad
that we have performed it can be clearly understood that Hashem Haghbayan, Jukka Heikkonen, Hannu
the LiDAR can be applied for collision avoidance in the Tenhunen and Juha Plosila, Unmanned Aerial
range of 50-900cm from the obstacle and in the range of Vehicles (UAVs): Collision Avoidance Systems and
950-1200 it is less preferred because of the sensitivity of Approaches”, IEEE Access, vol. 8, pp. 105139–
the the application that we are performing for. 105155, June 2020.
[10] Sivaganesan, D. "Efficient routing protocol with
Collision avoidance algorithm will be implemented in the collision avoidance in vehicular networks." Journal of
Arduino UNO board. Suitable control signal will be Ubiquitous Computing and Communication
transmitted to the Flight controller based on the LiDAR Technologies (UCCT) 1, no. 02 (2019): 76-86.
range estimation and threshold distance between the MAV [11] Leo Louis, Working Principle of Arduino and Using It
and the obstacle to avoid collision with the obstacles. From As a Tool for Study and Research, International
the experimental results, it is inferred that long distance Journal of Control, Automation, Communication and
from 50 cm to 900 cm accurate obstacle distance can be Systems (IJCACS), Vol.1, No.2, April 2016.
estimated for collision avoidance. [12] Sensor Fusion for Accurate Object Detection
Underneath Stationary Vehicles, Fady A.
XI. ACKNOWLEDGEMENT
I want to pay tribute to my teachers who have been a Abouelghit; Waleed Y. Alarid; Mostafa S.
continuous support in every aspect and the global Elmanfalouty; Hagar S. ElSakka Ibrahim E. Elamry
researchers deserve huge respect because their research’s in Ramez M. Daoud. Hassanein H. Amer,Mustafa H.
various forms like publications and journals and helped in Arafa,26th IEEE International Conference on
various aspects of learning and helped us complete this Emerging Technologies and Factory Automation
project and motivated us to perform in future. (ETFA),2021
[13] S. S. Bolbhat, A. S. Bhosale, G. Sakthivel, D.
XII. REFERENCES Saravanakumar, R. Sivakumar and J Lakshmipathi,
Intelligent Obstacle Avoiding AGV Using Vector
[1] Comparison of Lidar-Based and Radar-Based Field Histogram and Supervisory Control, Journal
Adaptive Cruise Control Systems Glenn R. Widmann, of Physics: Conference Series, Volume 1716, National
Michele K. Daniels, Lisa Hamilton, Lawrence Humm, Science, Engineering and Technology Conference
Bryan Riley, Jan K. Schiffmann, David E. Schnelker and (NCSET)2020,11-12 May 2020, Vellore Institute of
William H. Wishon,Vol. 109, SECTION 7: JOURNAL Technology,Chennai, India
OF PASSENGER CARS: ELECTRONIC AND [14] Benewake Tf-mini-s Data Sheet by Benewake,
ELECTRICAL SYSTEMS (2000), Beijing, China
[2] Heinrich Gotzig, and Georg Geduld, “Automotive [15] Dulakshi Santhusitha Kumari Karunasingha Root
LiDAR,” 2016 Springer International Publishing 2016 mean square error or mean absolute error? Use their
H. Winner et al. (eds.), Handbook of Driver Assistance ratio as well, Information Sciences volume 585, march
systems 2022
[3] Fardiansyah Nur Aziz1 , Masduki Zakarijah2,”Tf- mini
LiDAR sensor Performance Analysis for Distance
Measurement,” Jurnal Nasional Teknik Elektro dan
Teknologi Informasi | Vol. 11, No. 3,August 2022
[4] J. Liu, Q. Sun, Z. Fan, and Y. Jia, “TOF LiDAR
Development in Autonomous Vehicle,” 2018 IEEE
3rd Optoelectron. Glob. Conf. (OGC), 2018, pp.
185−190.
[5] P. Marker, The 2010-2015 World Outlook for
Unmanned Aerial Vehicles (UAV) and Systems,
ICON Group International Inc., 2009.
[6] Sakthivel P,and Anbarasu B, “Integration of Vision
and LiDAR for Navigation of Micro Aerial
Vehciles,”2020 IEEE 3rd International
Conference,2020
[7] Roberto Opromolla ,Giancarmine Fasano, Giancarlo
Rufino, Michele Grassi. “LIDAR- Inertial Integration
for UAV Localization and Mapping in Complex
Environments,”2016 International Conference on
There are two constraints that are to be followed to circuit schematic of the proposed 7T SRAM is as shown in
ensure correct reading and writing of data onto the cell. First Fig. 2.
is the read stability constraint [2]. This constraint states that
“the driver transistors N1 and N2 should be stronger than the
access transistors N3 and N4” so that during the read
operation when one among the 𝐵𝐿 and ̅̅̅̅ 𝐵𝐿 is to be discharged
to ground by one of the nodes via the access transistors, the
particular node which is 0 is not raised high enough by the
current flowing through the access transistor. So, the driver
transistors N1 and N2 should be sized bigger than that of the
access transistors, N3 and N4. Second is the writability
constraint [2]. This constraint states that “the access
transistors N3 and N4 should be stronger than the pull up
transistors P1 and P2”. To explain this, suppose Q = 0 and
Q_b =1 in the cell. Now a 1 is to be written, i.e, Q has to be
forced to 1 by the bitline 𝐵𝐿. But due to the read stability
constraint as explained above, N1 is stronger than N3 and Fig. 2. Proposed 7T SRAM schematic
thus Q can’t be forced 1 by the weaker access transistor. As
an alternative to accomplish the write operation, Q_b has to First noticeable change is the MOS transistors illustrated
̅̅̅̅ , this will only be possible if the pull up
be forced to 0 by 𝐵𝐿 in thick lines, they are the MOSFETs with high VT (Threshold
transistor P2 is weaker than the access transistor N4. To Voltage). The main motive behind using high-VT transistors
summarize, according to the writability constraint, the pull up for 3 of the 4 transistors of the cross-coupled inverter is to
transistors P1 and P2 must be sized smaller than the access reduce static( mainly leakage) power consumption. This can
transistors N3 and N4. be explain using the mathematical equation that governs the
The evaluation of resilience to noise in various operation current in off state.
modes is done through the use of a quantity called Static 𝑞(𝑉𝐺𝑆 − 𝑉𝑇 −𝑉𝑜𝑓𝑓𝑠𝑒𝑡 ) −𝑞𝑉𝐷𝑆
Noise Margins (SNMs), measured in various operation 𝐼𝑂𝐹𝐹 = 𝐼𝑆 . 𝑒 𝑛𝐾𝑇 (1 − 𝑒 𝐾𝑇 ) (1)
modes, namely read, write and hold [8-10]. Static Noise
Margin is defined as the amount of noise that can be applied Where, 𝑉𝑇 = Threshold Voltage, and
to the two nodes of the back-to-back inverter before a data 𝑃𝑠𝑡𝑎𝑡𝑖𝑐 = 𝐼𝑂𝐹𝐹 . 𝑉𝐷𝐷 (2)
stored in the node is flipped.
As it can be seen from the above equation, as 𝑉𝑇 increase,
B. Complications in 6T SRAM the off state current (subthreshold current) decreases
As compact and simple a conventional 6T SRAM is, it exponentially. So, this in turn decreases the static power
has its own shortcomings. First, comes the robustness. The consumption.
term “robustness” in an SRAM cell quantifies how well a data The next thing noticeable is the use of separate read and
held (stored) in the nodes is not disturbed during any of the write lines (indicated by R and W in the Fig. 2) and also
access operations. Configuration of transistors in 6T SRAM separate write bitline (WBL) and read bitline bar (RBL_b) for
is in such a way that the nodes Q and Q_b are directly writing to and reading the stored data respectively. This is
accessed by the bitlines 𝐵𝐿 and 𝐵𝐿̅̅̅̅ via the access transistors, done so as to isolate the read and write operations completely.
N3 and N4. Careful observation reveals that a voltage The write bitline (WBL) alone is used to write a new data
division happens in the storage nodes. This voltage division onto node Q via the access transistor N3 controlled by the
occurs between the transistors in the back-to-back inverters write signal. When node Q is forced with a new data, Q_b is
and the access transistor. So, the storage nodes are already at also automatically changed because of the cross coupling of
a raised voltage level and thus are vulnerable and can be the inverters. The read bitline bar (RBL_bar) alone is used to
easily disturbed during a read operation. This is termed as read the complement of the data from the storage node via the
destructive read in paper [3]. Second matter of concern is the stacked transistors N4 and N5, where the transistor stack is
leakage or static power consumption. As staying static is an controlled both by the read signal R and also Q_b of the
inevitable act required in all memories, an SRAM cell suffers storage node. The purpose of such an architecture can be
from power dissipation during the static state. And since better understood after understanding the read and write
SRAMs mainly make up the cache memories, it is highly operation.
desirable that the power consumption is reduced through B. Read and Write operation
innovations [11-13].
To perform a read operation, first the read bitline bar
III. PROPOSED 7T SRAM CELL (RBL_b) is precharged to 𝑉𝐷𝐷 , then the read (R) signal is set
high, while write (W) signal is set low so that N4 is ON. Now
A. Architecture of the proposed model since N5 is directly connected to Q, if a ‘1’ was stored on Q
In an attempt to solve the complications in 6T SRAM (which means the cell), N5 would become ON and the
cells as discussed above, a novel 7T SRAM cell is proposed, RBL_b will be discharged to GND via the series stacked
which makes use of two types of MOS (Metal Oxide transistors N5 and N4. On the other hand, if a ‘0’ was stored
Semiconductor) transistors, one type with low threshold on Q, the RBL_b will stay charged (high). So the RBL_b
voltage and the other type with high threshold voltage. The reads a complement of the bit stored on the cell, and hence
write bitline (WBL) ( 𝐵𝐿 and 𝐵𝐿 ̅̅̅̅ in case of 6T SRAM). remain unchanged always. But this is not the case in node Q
Similar precharge circuits, sense amplifiers and write drivers and Q_b in 6T SRAM cell. Suppose node Q stores a’1’ (VDD),
were used for both the models so that the performance node Q_b will not be proper 0 but a slightly higher value
comparison results remain reliable. The simulation outputs because of voltage division happening during the read
are illustrated in Fig. 4. operation because of the structure formed by the driver
transistor (N2) and the access transistor (N4). As a result of
the already elevated voltage level at Q_b, the bit stored is
most prone to noise while a read operation is taking place.
(a)
(b)
Fig. 4. (a)Transient analysis of proposed 7T SRAM, (b)Transient analysis
of 6T SRAM.
Hold stability was not a problem for the conventional 6T D. Read and write delay.
SRAM, but still it is improved by a small margin in the In addition to the improvements mentioned above, the
proposed model. proposed model also has reduced read and write access delay,
C. Power consumption meaning they can be read or written to faster than the
conventional model. The comparison chart is shown in Fig.
Comparison between the two models in terms of power
9.
consumed is illustrated graphically in figure 8.
and write access speed is also observed to be fairly improved [7] Z. Liu and V. Kursun, "High Read Stability and Low Leakage Cache
Memory Cell," 2007 IEEE International Symposium on Circuits and
in the proposed 7T SRAM. This is mainly attributed to two Systems, 2007, pp. 2774-2777, doi: 10.1109/ISCAS.2007.378628.
things: I) reduction of critical read delay path, and II) the [8] Kiran, P & Saxena, Nikhil. (2015). Design and analysis of different
precharge mechanism of the write bit line. Last but not the types SRAM cell topologiesDesign and analysis of different types
least, although a comparison of area occupied is not SRAM cell topologies. 167-173. 10.1109/ECS.2015.7124870.
simulated, a fair deduction can be made that the proposed [9] Rath, Subhashree & Panda, Siba. (2017). Analysis of 6T SRAM Cell
model is more compact despite the use of one extra transistor. in Different Technologies. Circulation in Computer Science.
MCSP2017. 7-10. 10.22632/ccs-2017-mcsp026.
This is because of the use of minimum sized transistors as
[10] Shikha Saun and Hemant Kumar,” Design and performance analysis of
illustrated in Table I and Table II, which is carefully achieved 6T SRAM cell on different CMOS technologies with stability
by the use of dual threshold voltage transistors and the characterization”, 2019 IOP Conf. Ser.: Mater. Sci. Eng. 561 012093,
configuration of transistors in the cell. As a part of future DOI 10.1088/1757-899X/561/1/012093
scope, some more innovations can be added on the proposed [11] M. Bansal and J. Singh, "Qualitative Analysis of 2-bit CMOS
Magnitude Comparator and GDI Magnitude Comparator using FinFET
7T SRAM such as using two bit lines to enhance the writing Technology (18nm)," 2020 International Conference on Smart
performance. Electronics and Communication (ICOSEC), 2020, pp. 1323-1327, doi:
10.1109/ICOSEC49089.2020.9215251.
[12] A. Bhaskar, "Design and analysis of low power SRAM cells," 2017
REFERENCES Innovations in Power and Advanced Computing Technologies (i-
[1] P. N. V. Kiran and N. Saxena, "Design and analysis of different types PACT), 2017, pp. 1-5, doi: 10.1109/IPACT.2017.8244888.
SRAM cell topologies," 2015 2nd International Conference on [13] R. M. Gangadari and D. S. Yadav, "Extraction and Comparative
Electronics and Communication Systems (ICECS), 2015, pp. 1060- Inspection of several parameters of 6T, 8T, 10T SRAM," 2021 First
1065, doi: 10.1109/ECS.2015.7124742. International Conference on Advances in Computing and Future
[2] Neil Weste and David Harris. 2010. CMOS VLSI Design: A Circuits Communication Technologies (ICACFCT), 2021, pp. 119-124, doi:
and Systems Perspective (4th. ed.). Addison-Wesley Publishing 10.1109/ICACFCT53978.2021.9837366.
Company, USA. [14] Bansal, M., Maiya, R.R. (2023). A Taxonomical Review of MOS
[3] Jose, A.A., Balan, N.C. (2016). Static Noise Margin Analysis of 6T Power Transistor for Electronic Circuits and Devices. In: Namrata, K.,
SRAM Cell. In: Dash, S., Bhaskar, M., Panigrahi, B., Das, S. (eds) Priyadarshi, N., Bansal, R.C., Kumar, J. (eds) Smart Energy and
Artificial Intelligence and Evolutionary Computations in Engineering Advancement in Power Technologies. Lecture Notes in Electrical
Systems. Advances in Intelligent Systems and Computing, vol 394. Engineering, vol 927. Springer, Singapore.
Springer, New Delhi. https://doi.org/10.1007/978-81-322-2656-7_22 https://doi.org/10.1007/978-981-19-4975-3_49
[4] V. Kursun and E. G. Friedman, Multi-Voltage CMOS Circuit Design, [15] M. Bansal, R. Arora and R. Bharti, "VLSI Layout: Concept to
242 pp., John Wiley & Sons Ltd., 2006, ISBN # 0-470-01023-1. Realization," 2022 International Conference on Applied Artificial
Intelligence and Computing (ICAAIC), 2022, pp. 1590-1596, doi:
[5] N. Raghav and M. Bansal, "Analysis of Power Efficient 6-T SRAM 10.1109/ICAAIC53929.2022.9792835.
Cell with Performance Measurements," 2017 International Conference
on Innovations in Control, Communication and Information Systems
(ICICCI), 2017, pp. 1-4, doi: 10.1109/ICICCIS.2017.8660819.
[6] Malti Bansal, Vishal Bharti and Vibhor Chander, “Comparison
between Conventional Fast Multipliers and Improved Fast Multipliers
using PTL Logic”, 2021 IOP Conf. Ser.: Mater. Sci. Eng. 1126 012041
Abstract— The flight trajectories of quadcopter have been Software in the loop is to have different softwares in
simulated in a three dimensional environment using MATLAB controlling copter and plane. Mission planner ArduPilot was
and Simulink. PID and PD controller is used for the pitch, roll used for formation flying simulation in [2]. The ground
and yaw controls of the quadcopter respectively. In the input control station is stable, reliable, flexible and simple while
stage, pitch, roll, yaw, North-East-Down coordinates have been monitoring areas of interest. The operation can take place for
applied to the quadcopter in the simulation environment. both single vehicle and multi vehicle.
Different navigational waypoints have been used to generate
flight trajectories, namely, triangular, quadrilateral and linear Relation between coordinates, position vector and
trajectories. No-fly zones are also included in the simulation attitude vector is derived for quadrotor. MATLAB
environment. optimization toolbox is used. Swarm based multi drone
platform is proposed by integrating aggregation term and
Keywords—Software in the loop simulation, Quadrotors, motion term [3].
Trajectories, Simulink
Rotary wing aerial vehicles are usually of small
I. INTRODUCTION TO UNMANNED AERIAL VEHICLES dimension, and can hover with high maneuverability. They
Unmanned Aerial Vehicles (UAVs) are flying robots that can survey hard to reach spaces like pipelines and bridges, or
can remotely fly and carry no human operators. A Micro can reconnaissance in buildings [4]. Best known types are
Aerial Vehicle (MAV) is an Unmanned Aerial Vehicle of quadcopters and hexacopters. Lithium batteries are a good
length between 15 to 100 cm and weigh between 50g to power source due to their low weight.
2kgs. With a flight range of 25 km to 40 km. Classification Comparison of controllers is done on the basis of speed
of UAVs are based on operational purpose, fabrication and response. PID has more stability by bringing loops closer
materials, and complexity. A UAV can be a fixed wing, to negative side of s-plane. LQR are more robust, produce
flapping wing, or rotary wing UAV. Their applications low steady state error, and higher response speed. PID has
include military-based scouting as well as surveillance and delayed response, and is a bad choice when system needs a
mapping for meteorology and disaster response. fast parameter update [5].
Fixed wing MAVs is made of rigid wings, a fuselage and Gazebo is an open source software [6]. Simulated
a tail to cover a wide range of operational environments. A hardware is accurate to real ones. Simulation is limited to a
motor and propeller is the propulsion system. Flapping wing few robots. Gazebo sensory realism is time-saving. It has a
MAVs are made up of flexible flapping wings while using an simple interface and realistic environment.
actuation mechanism for the flapping motion. Rotary wing
MAVs have an advantage of flying in confined spaces, and Actual drone tests require expensive hardware. The tests
they can also hover at a place. They are made up of rotating consume time and need a trained safety-pilot. Simulations
propeller-based wings. reduce testing time, make debug easier, and reduce crashes
of real UAVs [7].
Different waypoint navigations, namely, triangular,
quadrilateral and linear have been introduced in this work to
navigate in the outdoor environment without colliding with
obstacles.
II. LITERATURE REVIEW
MAVs have small mass and moment of inertia, and
complex non- linear dynamics, while operating in low
Reynold’s number aerodynamic regimes. Integral LQR
(Linear Quadratic Regulator) has the best possible
performance with respect to some given measure of
performance, while PID (Proportional Integral Derivative) is
a widely applied feedback control of simple structure. LQR
also has better dynamic performance in transition time and Fig. 1. Quadrotor drone in simulation environment
speed [1].
Command
Command
Visualization
Actuator
Flight
Control
Sensor System
Sensors
Data Airframe
State
Environment
Environment
The simulation of Parrot Bebop 2 quadrotor is done in formation in GCS [2]. A GCS can be wirelessly
MATLAB and Simulink. Parameters of drone are noted. communicating instructions to a UAV.
Equations of dynamic motion of drones were done. System is
a PID controlled system. The quadrotor experienced crashes The GCS system consists of the ground control station,
and unwanted movements in the vertical direction of the with data terminals for wireless command of the UAV. The
simulated system [8]. work of mission planning, platform monitoring, mission
monitoring, and data recording are done. Existing man-
PX4 open source libraries are helpful to develop UAVs machine interaction control system of UAV ground control
with the basic controller code for flight control. PX4 can be station is mainly through a dual-level operating system,
built and uploaded to an open hardware Pixhawk, which is a touch screen, mouse and keyboard [9].
very popular hardware for UAV applications [10].
Source waypoint and destination waypoint for the
The most popular type of UAV is multirotor UAVs [11]. navigation of the vehicle have been included in the graphical
The application of quadrotor includes agriculture, surveying, user interface of the ground control station. Based on the
military surveillance, and mapping [12]. A UAV can also waypoint input specified in the GCS, the vehicle can be able
help in maritime patrols as they are relatively inexpensive to navigate in the simulated environment.
with more degrees of autonomy and stealth [15].
B. Simulink Model
Recently, a quadrotor movement control method has been The simulink model is shown in Fig. 2. The command
implemented for people with disabilities by detecting eye block selects aircraft command from a signal editor, a
movements [13]. A human movement observation can be joystick or a data file. The sensor block involves
done using a camera sensor and a Kinect SDK sensor [14]. measurement of altitude and position from the sensors
This can help in area surveillances. present in the UAV. For altitude measurement, a sonar
sensor is used. For position measurement, an inertial
III. SOFTWARE IN THE LOOP SIMULATION
measurement unit is used. The flight control system involves
Software in the loop simulation is to evaluate input and transfer of commands signal to the actuators of quadrotor
output conditions for software systems. The simulation can motors. The airframe refers to the equation of the degrees of
be mathematical or practical. It uses machine language freedom in a quadrotor. Using Aerospace Blockset
derived from both high level and low level programs. environment blocks, the environment block is created. The
A. Ground Control Station (GCS) purpose of the visualization block is to visualize data. The
inner loop of the model must be functioning at an higher
It is a human control and command station for UAVs. It frequency than the outer loop. A PD controller is used for
can be used for defining the formation flying control of position control.
multirotor UAVs. With the commands of “Navigation” and
“Do”, it can simulate copter vehicles, fix navigation C. Trajectory Generation
waypoints and can plan a home position. GCS can also act as The trajectory generation can be used to generate drone
a virtual cockpit, or as a working principle through trajectories in the simulation environment. Trajectories are
simulation in the loop. Military crafts can maintain flight generated using Dubin’s model. A robot’s pathway is made
direction and altitude in GCS. Swarms can be set in flying of combinations of left turns, right turns and straight paths.
3. (a) 3. (b)
3. (c) 3. (d)
3 (e) 3. (f)
Fig. 3. Generated trajectories (a) Triangular, (b) Triangular with no-fly zone,(c) Quadrilateral, (d) Quadrilateral with no-fly zone, (e)Linear, (f)
Linear with no-fly zone
Definition of the required parameters of waypoints and deviations in trajectories. An IMU sensor measures the
no-fly zones is done. In the two dimensional map, with East simulated quadcopter’s angular rates and translational
on the x axis and North on the y axis (where the units are in accelerations, while a sonar sensor measures its altitude. The
meters), the mapping of trajectory is done. quadcopter poses can be defined in the simulation
environment, using the north and east positioning in
IV. EQUATIONS OF QUADROTOR DYNAMICS meters(m), heading of quadcopter in degrees(°) from north
A. Translational Dynamics and the turning curvature in meter inverse(m-1) and the turn
direction in clockwise or anti clockwise directions.
m = −mgEz + uT R( , , ) Ez The no-fly zones are considered to be a circular region in
this experiment. For the no-fly zones, the position of the
Where m is quadrotor mass, uT is total motor thrust, center of the zone and the radius of the zone is taken as input
is (x y z ) ie. the position of the quadrotor and E z
T parameters, along with the margin of safety. These
parameters are taken in meters(m), except for the curvature,
is (0 0 1) ie. the drone position at (0, 0, 1). The
T
which is in meters inverse(m-1).
rotation matrix R( , , ) is dependent on the Euler The trajectory represented by a sequence of red lines,
angles of roll( ), pitch( ) and yaw( ), as well as the blue lines, black markers and green circles. The red lines
show the trajectories, the blue lines show the headings, the
attitude matrix = ( )T . black markers show the changes in pose or trajectory of the
drone, and the green circles represent no-fly zones.
B. Rotational Dynamics
I B = −B IB + The development of trajectories is done considering
various waypoint combinations. The triangular trajectory is
Where is the cross product and achieved by the use of four waypoints, where the fourth
waypoint refers back to the first waypoint, as shown in Fig. 3
I = diag( I x , I y , I z ) is the inertial matrix with respect to (a) and Fig.3 (b) respectively. Similarly, the development of
principal axes for I x being the moment of inertia along x a quadrilateral trajectory is achieved by the use of five
waypoints, where the fifth waypoint coincides with the first
axis, I y being the moment of inertia along y axis and I z waypoint, thus closing the loop. It is shown in Fig. 3 (c) and
being the moment of inertia along z axis. Fig.3 (d) respectively. A straight line trajectory is attempted,
both in the presence of a no-fly zone and in the absence of a
B = (x y z )T is the angular velocity, where no-fly zone. They are shown in Fig. 3 (e) and Fig.3 (f)
respectively.
x is the angular velocity along x axis, y is the angular
The changes in trajectory or pose are then noted based on
velocity along y axis, and z is the angular velocity along z the number of black markers on the map. Use of higher level
= (u u u )T
languages like C++ can be used for the real-time waypoint
axis. is the critical torque vector. navigation of the quadrotor. Factors like wind, shear, and
turbulence can be taken into account for real-time operations
Where u , u , u are the inputs for roll, pitch and yaw of the proposed model.
respectively.
VI. CONCLUSION
V. RESULTS
In a three dimensional environment using various
Trajectories are generated for the quadrotor drone using navigational waypoints, different flight trajectories, namely,
the navigational waypoints. In the waypoint property, the triangular, quadrilateral and linear, have been developed for
coordinates of the waypoint, along with the heading of the the quadrotor simulation in a virtual environment using
drone, and the curvature of the drone path are the input MATLAB and Simulink. Different controllers are used for
parameters. The PD controller aligns the quadrotor from the control of the vehicle in different flight path trajectories.
Navigation in the outdoor environment without collision is
TABLE I. TRAJECTORY TABLE done in the simulation. The conclusion reached is that the
number of changes in the pose of the quadrotor is increased
Trajectory details
for the inclusion of no-fly zones. This is due to the quadrotor
Changes
Trajectory Number of
in having to avoid the no-fly zones in the flight path.
Number of waypoints no-fly
trajectory
zones REFERENCES
or pose
Triangular 4 0 9 [1] B.S. Anjali, A. Vivek, J.L. Nandagopal,Simulation and Analysis of
Integral LQR Controller for Inner Control Loop Design of a Fixed
Triangular with no-
4 1 12 Wing Micro Aerial Vehicle (MAV),Procedia Technology,Volume
fly zone
25,2016, Pages 76-83, ISSN 2212-0173,
Quadrilateral 5 0 10 https://doi.org/10.1016/j.protcy.2016.08.083.
Quadrilateral with [2] A. Kaviyarasu, A. Saravanakumar and K. Elumalai, "Software in the
5 2 18 Loop Simulation of Formation Flying of Multi Rotor UAV," 2019
no-fly zone
International Conference on Intelligent Sustainable Systems (ICISS),
Linear 2 0 4 2019, pp. 336-340, doi: 10.1109/ISS1.2019.8908015.
Linear with no-fly [3] H. Kim and H. Ahn, "Realization of swarm formation flying and
2 1 7
zone optimal trajectory generation for multi-drone performance
show," 2016 IEEE/SICE International Symposium on System [10] K. Dang Nguyen and T. -T. Nguyen, "Vision-Based Software-in-the-
Integration (SII), 2016, pp. 850-855, doi: 10.1109/SII.2016.7844106. Loop-Simulation for Unmanned Aerial Vehicles Using Gazebo and
[4] M. Hassanalian, A. Abdelkefi,Classifications, applications, and PX4 Open Source," 2019 International Conference on System Science
design challenges of drones: A review,Progress in Aerospace and Engineering (ICSSE), 2019, pp. 429-432, doi:
Sciences,Volume 91,2017,Pages 99-131,ISSN 0376-0421, 10.1109/ICSSE.2019.8823322.
https://doi.org/10.1016/j.paerosci.2017.04.003. [11] S. N. Yaşar and E. Karaköse, "Trajectory Control of Quadcopter in
[5] S. Khatoon, D. Gupta and L. K. Das, "PID & LQR control for a Matlab Simulation Environment," 2022 International Conference on
quadrotor: Modeling and simulation," 2014 International Conference Decision Aid Sciences and Applications (DASA), 2022, pp. 1127-
on Advances in Computing, Communications and Informatics 1131, doi: 10.1109/DASA54658.2022.9765119.
(ICACCI), 2014, pp. 796-802, doi: 10.1109/ICACCI.2014.6968232. [12] S. N, T. Indiran and S. Chokkadi, "Simulation Studies of Nonlinear
[6] N. Koenig and A. Howard, "Design and use paradigms for Gazebo, an Model Predictive Controller for Hexsoon EDU 450 Quadrotor
open-source multi-robot simulator," 2004 IEEE/RSJ International Trajectory Tracking," 2022 International Conference on Sustainable
Conference on Intelligent Robots and Systems (IROS) (IEEE Cat. Computing and Data Communication Systems (ICSCDS), 2022, pp.
No.04CH37566), 2004, pp. 2149-2154 vol.3, doi: 909-913, doi: 10.1109/ICSCDS53736.2022.9760984.
10.1109/IROS.2004.1389727. [13] E. Kavichai, R. Huang and S. -W. Woo, "Quadcopter Movement
[7] Furrer, Fadri & Burri, Michael & Achtelik, Markus & Siegwart, Control Using Image Processing Techniques," 2019 16th International
Roland. (2016). “RotorS – A Modular Gazebo MAV Simulator Conference on Electrical Engineering/Electronics, Computer,
Framework.” doi: 10.1007/978-3-319-26054-9_23. Telecommunications and Information Technology (ECTI-CON),
2019, pp. 939-942, doi: 10.1109/ECTI-CON47248.2019.8955346.
[8] G. Silano, P. Oppido and L. Iannelli, "Software-in-the-loop
simulation for improving flight control system design: a quadrotor [14] Ranganathan, G. "Real Life Human Movement Realization in
case study," 2019 IEEE International Conference on Systems, Man Multimodal Group Communication Using Depth Map Information
and Cybernetics (SMC), 2019, pp. 466-471, doi: and Machine Learning." Journal of Innovative Image Processing
10.1109/SMC.2019.8914154. (JIIP) 2, no. 02 (2020): 93-101.
[9] Y. Zhou, J. Hou and Y. Gong, "Research and Application of Human- [15] G. M. De Lima Filho, A. Passaro, G. M. Delfino, L. De Santana and
computer Interaction Technology based on Voice Control in Ground H. Monsuur, "Time-Critical Maritime UAV Mission Planning Using a
Control Station of UAV," 2020 IEEE 6th International Conference on Neural Network: An Operational View," in IEEE Access, vol. 10, pp.
Computer and Communications (ICCC), 2020, pp. 1257-1262, doi: 111749-111758, 2022, doi: 10.1109/ACCESS.2022.3215646.
10.1109/ICCC51575.2020.9344892.
Vignesh M Vishaal S
Department of ECE Department of ECE
Sri Krishna College of Engineering and Technology, Sri Krishna College of Engineering and Technology,
Coimbatore, India. Coimbatore, India.
20euec165@skcet.ac.in 20euec170@skcet.ac.in
Abstract - The fourth technology revolution is the one we're in II. LITERATURE SURVEY
right now. As we live in a time where the internet and its use are
constantly expanding. The idea of a smart device is growing in A. Automation
acceptance. The availability of web and software system A low-cost home automation system with autonomous control
technologies is making our lives easier. A smart house could be one features was developed by Eleyan and J. Fallon et al. [3] using an
of the major features of IoT. In this paper, we offer an inexpensive, Android application and MQTT-broken communication. The
useful, and Internet of Things-based home automation system. The suggested solution will allow customers to remotely manage
Blynk ASCII text file IoT server supports this technique. In our household appliances using an Android smartphone. Relays and
project, the Esp32 module may link a server to the internet,
a NodeMCU (ESP8266) microcontroller were suggested as a
way to remotely control electrical switches from a Node server
allowing us to operate any linked home appliances. Between the
by H. K. Singh, S. Verma, S. Pal, et al. [7].
esp32 and the electrical appliances, there will be a relay that
controls the 230-volt appliances by switching a certain low voltage
from the esp32. B. Energy efficient Home Automation
Keywords: Blynk app, Internet of Things, Smart home, Internet, The primary focus should be on remotely activating and
Wi-Fi Module(Esp32) managing various smart home devices, according to a proposal
made by B. R. K. Kodali and S. Yerroju et al. [4]. Utilizing
energy more wisely is possible thanks to home automation
I. INTRODUCTION technology. The ESP8266 board is very desirable and
advantageous since it provides the IoT system with the requisite
We need to conserve energy for present and future
ultra-low power consumption capability at an inexpensive price.
generations because the demand for it in our everyday lives is It also transforms a house into a residence.
increasing significantly. This initiative's main objectives are to
lower electricity bills and power consumption. The best approach
to conserve energy in a home is through home automation. We C. View and performance of home automation
can use IOT to access and manage home equipment in a smart A technique for IoT-based wirelessly programmable smart
home [1]. Through the internet, it has the capacity to turn non- home automation was proposed by K. Agarwal, A. Agarwal,
smartgadgets into smart ones. It transforms a house into a smart and colleagues. Home automation solutions leverage the IoT to
houseand offers more powerful means of controlling household remotely monitor and control household appliances [5]. This
approach makes use of a specifically designed website
appliances [2]. This enables the user to operate home
connected to the internet or a local area network to manage
automation equipment like lights, fans, and other items without standard home appliances from smartphones or desktop
using their hands [8]. The smart home market is anticipated to computers (LAN).
grow by 17%from 2019 to $ 141.2 billion by 2023 [10]. We can
access our household appliances from anywhere in the world D. Home automation with cloud organizing
thanks to thistechnology. Most of the earlier systems were built
using these DTMF or Bluetooth-based methodologies [11]. Y.Wenbo, W.Quanyu, and colleagues concluded that,
Users are connected to the connectivity of things through the because there are likely many undiscovered IoT apps and
Internet of Things (IoT), which makes life easier [12]. The services, object resolution methodologies can also be defined
by an IoT reference model [6]. From a public policy aspect, it is
focus of IoT is now on "Thing to Thing"[13].
vital to confirm that IoT applications, such as those for aid,
energy management, transportation, or other cutting-edge
purposes, can have reasonable access to current infrastructure.
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 173
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
V. SOFTWARE DESCRIPTION
III. LIMITATIONS OF EXISTING WORK
A. Arduino IDE
When compared to prior projects, ours makes extensive 1. The main purpose of the open-source Arduino IDE software is
use of the ESP32, which connects to the internet and enables us
to construct a compiler that turns code into Arduino modules.
to control the connected appliances from a distance. Comparable
to other Wi-Fi modules, it is inexpensive. Through the BLYNK 2. Given that it is the official Arduino software, the code is far
app, ESP32 gives us the convenience of remotely managing too simple to compile.
home appliances, such as lights, fans, and TVs. As more people
utilise smart home gadgets, security will, like it does with other 3. It is easily available on operating systems such as MAC,
computing equipment, become a bigger problem. There will Windows, and Linux and operates on the Java platform. It comes
undoubtedly be a variety of security issues, which will lead to with built-in features and instructions that are necessary for
the emergence of smart home security software and hardware. debugging, altering, and compiling programme, inside the
However, because of the use of the Blynk app in our project, the environment.
security concerns are reduced. One system can be used to
operate all the smart home gadgets thanks to integrated smart 4. The Arduino Uno, Arduino Mega and Arduino Micro are justa
home systems offered by previous exiting works. The risk here few of the various Arduino module varieties.
is obvious: If hackers get into the system, they may take over
your smart home and control everything. 5. Each contains an integrated microprocessor that can really be
programmed and accepts data in the form of code.
6. The main code, commonly referred to as a sketch, imported
IV. METHODOLOGY
into the IDE platform will eventually generate a HEX file,
STEP 1- Control Relays with Internet Using Blynk which will be shipped and downloaded to the board controller.
STEP 2- Control Relays Without Internet Using Push- buttons 7. There are two key components to the IDE environment.
Compiler and editor. The first component is used to write the
STEP 3- Configure the Blynk App for the ESP32 required code, which is then combined and uploaded to the
STEP 4- Add the button contrivances in Blynk app appropriate Arduino module.
C. 2-Channel Relay
VIII. NOVELTY
REFERENCES
results by increasing split rings in a structure no of resonances are the result the absorptivity of the structure is 68.6 % which is
increasing ,which is useful terhertz applications increased compared to one split ring structure.
The reflectivity is represented by R(ω) Figure 11: Absorptivity of a circular one split ring resonator
The transmissivity is represented by T(ω)
In terms of S-parameters absorptivity is expressed as
V. CONCLUSION
Finally, utilizing metamaterial we designed a nested split ring
Because of zero transmission transmissivity is zero, and the resonator, with a three layer metamaterial structure that can
absorptivity can be expressed as resonates at frequencies 1.2,1.4 2.1 and 2.49 THz. From the
results it is observed that by increasing the no of split rings, no
of resonances are increasing which can be used for designing the
multiband antenna at terahertz frequency range .Additionally, we
can use the structures as absorbers. A single split ring resonator's
Figures9 shows the absorptivity of the three circular split absorbance is 70%. An absorber in the terahertz range can be
resonator structure. From the result the absorptivity of the easily generated by altering the absorber structure's size. We
structure is 62 %. believe that the developed THz split ring resonator structure
would make a good option for communication, radar, and stealth
technology based on the aforementioned results.
VI. REFERENCES
[1] J.B. Pendry, A.J. Holden, D.J. Ribbins, and W.J.
Stewart,Magnetism from conductors and enhanced
nonlinearphenomenon, IEEE Trans. Microwave Theory
Tech., 47(1999), 2075-2084.
[2] R.Marquez, F. Medina and R. Rafii-El-Idrissi, Role
ofbianisotropy in negative permeability and left-
handedmetamaterials, Phys. Rev. B, 65 (2002), 144 440(1) –
144440 (6).
[3] R. W. Ziolkowski, Design, fabrication, and testing ofdouble
negative metamaterials, IEEE Trans. AntennasPropagat.,
Figure 9: Absorptivity of a circular three split ring resonator 51(2003), 2572-2581
[4] R.Marquez, F. Mesa, J. Martel, F. Medina,
Figures 10 shows the absorptivity of the two circular split resonator Comparativeanalysis of edge- and broadside- coupled split
structure was obtained by using CST software madelling . From ringresonators for metamaterial design-theory
andexperiments, IEEE Trans. Antennas Propagat.,
51(2003),2572-2581.
[5] C.Saha and J.Y.Siddiqui, Versatile CAD Formulation
forEstimation of the Resonant Frequency and
MagnetiPolarizability of Circular Split Ring
Resonators,International Journal of RF and Microwave
ComputerAided Engineering, 21(2011), No.4.
[6] S. Lim, C. Caloz, and T. Itoh, Electronically
scannedcomposite right/left handed microstrip leaky-
waveantenna, IEEE Microwave Wireless Comp.
Lett.,14(2004), 277–279.
[7] C. Saha and J.Y. Siddiqui “Simplified CAD model
foraccurate estimation of the Resonant Frequency of
EdgeCoupled Hexagonal Split Ring Resonators”
Proc.APSYM 10, Cochin,
December 14-16, 2010
[8] I. Arnedo, et.al, Forward and backward leaky waveradiation
in split ring resonator based metamaterials,IET Microwaves,
Antennas Propag., 1 (2007), 65-68
[9] M. A. Antoniades and G. V. Eleftheriades, Abroadband
series power divider using zero degreemetamaterial phase
shifting lines, IEEE Microwave
[10] J.B. Pendry, A.J. Holden, D.J. Ribbins, and
W.J. StewartMagnetism from conductors and enhanced
nonlinear phenomenon, IEEE Trans. Microwave Theory
Tech.
[11] F. Martin, et. al, Split ring resonator-based left-
handedcoplanar waveguide, Applied Phys. Lett., 83
(2003),4652 – 4654.
[12] F. Falcone, et. al, Coplanar waveguide Structures loadedwith
split ring resonators, Microwave Opt. Tech. Lett.,40 (2004),
3– 6.
[13] P.Gay-Balmaz and O.J.F. Martin,
Electromagneticresonances in individual and coupled split-
ringresonators, J. Appl. Phys., 92
(2002), 2929–2936.
[14] Sirtori C. Bridge for the terahertz gap. Nature, 2002,
417(6885): 132–133.
[15] double negative metamaterials, IEEE Trans.
AntennasPropagat.,51(2003), 2572-2581
[16] R.Marquez, F. Mesa, J. Martel, F. Medina,
Comparativeanalysis of edge- and broadside- coupled split
ringresonators formetamaterial design-theory and
[17] Tonouchi M. Cutting-edge terahertz technology. Nature
Photonics,2007, 1(2): 97–105
[18] Jepsen P U, Cooke D G, Koch M. Terahertz spectroscopy and
imaging–modern techniques and applications. Laser &
PhotonicsReviews, 2011, 5(1): 124–166
[19] Federici J F, Schulkin B, Huang F, Gary D, Barat R,
Oliveira F,Zimdars D. THz imaging and sensing for
security applications—explosives, weapons and drugs.
Semiconductor Scienceand Technology, 2005, 20(7):
S266–S280
[20] S Smitha, T. V., and Sahana Udupa. "Optical Waveguides
and Terahertz Signal by Finite Element Method: A
Survey." IRO Journal on Sustainable Wireless Systems 3,
no. 2 (2021): 68-86.
D. YOLOv6
A single-stage object detection framework with great perfor-
mance and a hardware-friendly design, YOLOv6 is intended
for industrial applications. It is the best OS version of the
YOLO architecture for production applications since it per-
forms better than YOLOv5 in terms of detection accuracy
and inference speed. In comparison to all previous YOLOv5
versions, YOLOv6s (red) offers a better mean Average Pre-
cision (mAP) and an approximately 2-times faster inference
Fig. 2. YOLO Bounding box format [17] time. Additionally, we can observe a significant performance
difference between EfficientDet, which uses two-stage object
detection, and YOLO-based design. The primary distinction
because it uses 53 convolutional layers as opposed to the is that although YOLOv5 makes use of YAML, YOLOv6 de-
preceding 19 layers. clares the model parameters directly in Python. A preliminary
When it comes to intersection over union (IOU) values look also suggests that YOLOv5 might be somewhat more
and mean average precision (mAP), YOLOv3 is quick and customisable.
accurate. Compared to other object detection models this
model shows much higher performance and better accuracy E. YOLOv7
in short time.
Disadvantages of YOLO V3 is that given that RetinaNet The upgraded official YOLOv7 [16] comes with huge
requires more training time than YOLOv3, YOLOv3 AP does upgrades. YOLOv4 was upgraded with numerous features to
show a trade-off between speed and accuracy when employing yield YOLOv7. This includes the introduction of Extended
YOLO. YOLOv3 is a great alternative for models that can Efficient Layer Aggregation Network (E-ELAN) and Model
be trained with large datasets because it can be used to Scaling for Concatenation based models. It also introduced
detect objects with an accuracy that is comparable to that of the concept of Trainable BoF (Bag of Freebies) which is a
RetinaNet when utilising a larger dataset. reparameterization algorithm to improve the model. It is a
kind of ensemble modelling technique wherein the model is
generated using averaged weights of multiple models trained
B. YOLOv4 with different training sets.
YOLOv4 [13] greatly outperforms the current approaches in
terms of both “detection performance” and “better speed”. It is III. M ETHODOLOGY
a “efficiently trainable” object detector that may be utilised in
production systems. After carefully examining the effects on A. Dataset
the performance of numerous detectors, features suggested in A fairly large dataset with 3432 images of Wheat Planta-
the previous YOLO models, the team also introduces various tions across the globe, the major being from Europe (France,
different architectures and architectural selections with the UK, Switzerland) and North America (Canada). The dataset
primary goal of “optimising neural networks detector for par- is publicly available as part of a Kaggle Competition - Global
allel computations.” When comparing performance, YOLOv4 Wheat Detection; however, it is maintained by nine research
is twice as quick as EfficientDet (a competitive recognition institutes from seven countries: the University of Tokyo, Insti-
model) [14]. Additionally, AP (Average Precision) and FPS tut national de recherche pour l’agriculture, l’alimentation et
(Frames Per Second) improved by 10 l’environnement, Arvalis, ETHZ, University of Saskatchewan,
University of Queensland, Nanjing Agricultural University,
C. YOLOv5 and Rothamsted Research. These institutions are joined by
many in their pursuit of accurate wheat head detection, includ-
YOLOv5 [15] was released by a company called Ultralytics ing the Global Institute for Food Security, DigitAg, Kubota,
in 2020. The overall public has acknowledged YOLOv4 as and Hiphen.
a genuine advancement over YOLOv3, and the moniker is
not particularly contentious. On the other hand, YOLOv5 has
B. Data Pre-processing
unvalidated data to support its advancement above YOLOv4.
The YOLOv5 network architecture have three components The bounding box values are retrieved from the supporting
to it: CSPDarknet for the backbone, PANet for the neck, csv document from the competition files which lists bounding
and YOLO Layer for the head. Before being sent to PANet box values for each occurrence of the wheat head. This
for feature fusion, the data are first fed to CSPDarknet for document is converted into YOLO annotation format, wherein
feature extraction. YOLO Layer then outputs the results of each image will have its own annotation file with the entire
the detection (class, score, location, size). localization of the box values in them.
IV. O UTPUTS
All the official YOLO models were cloned from the
respective publishers from GitHub and results are tried
out on the same with minimal specifications to understand
the efficiency of the models. Hence the metrics are
calculated for the smallest model of the individual version.
Fig. 6. YOLOv5 mAP score for 20 epochs
Sample output from the best performing models:
V. R ESULTS
The models were trained in Google Colab provisioned with
Nvidia Tesla T4. The hyperparameters were:
• Epochs : 20
• Batch-size : 4
Fig. 7. YOLOv6 mAP score for 20 epochs
• Worker threads : 8
• Image Size : 1024x1024
TABLE I
R ESULTS
VI. C ONCLUSION [4] X. Zhu, S. Lyu, X. Wang, and Q. Zhao, TPH-YOLOv5: Improved
YOLOv5 based on transformer prediction head for object detection on
The models were trained to find Wheat heads on a con- drone-captured scenarios. ArXiv [Cs.CV], 2021.
siderably large dataset. The model’s performance ultimately [5] C.-Y. Wang, A. Bochkovskiy, and H.-Y. M. Liao, YOLOv7: Trainable
bag-of-freebies sets new state-of-the-art for real-time object detectors.
increased when the number of epochs, optimization parame- ArXiv [Cs.CV], 2022.
ters, batch size, and learning rate were adjusted. The average [6] R. Ramachandran, D. C. Rajeev, S. G. Krishnan, and P. Subathra, “Deep
mAP @ 0.5 was greater than 89% for all the models, owing learning – An overview,” International Journal of Applied Engineering
Research, vol. 10, pp. 25433–25448, 2015.
which, the results are quite accurate. When taking into account [7] R. K. Megalingam, Dasari Hema Teja Anirudh Babu. Venkata Sai
individual models, YOLOv3—the baseline model with the YashwanthAvvari ”Concurrent Detection and Identification of Multiple
greatest number of changes—performs better with fewer itera- Objects using YOLO Algorithm ”: Ghali Sriram, 2021.
[8] R. Ippalapally, S. H. Mudumba, M. Adkay, and H. R. Nandi Vardhan,
tions, but at the expense of longer training times. Darknet-53 is Object Detection Using Thermal Imaging. New Delhi, India: in 2020 IEEE
more powerful than Darknet-19 and more effective than rival 17th India Council International Conference (INDICON), 2020.
backbones since it uses 53 convolutional layers rather than the [9] U. Subbiah, D. K. Kumar, T. Dr. Senthil Kumar, and L. Parameswaran,
“An Extensive Study and Comparison of the Various Approaches to Object
previous 19 layers.Thus in terms of mean average precision Detection using Deep Learning,” in 2020 Third International Conference
(mAP) and intersection over union (IOU) values, YOLOv3 is on Smart Systems and Inventive Technology (ICSSIT, 2020.
rapid and accurate. With a mAP@0.5 of 0.905, the 20 epochs [10] A. Alexander and M. M. Dharmana, “Object detection algorithm for
segregating similar coloured objects and database formation,” in 2017
of YOLOv3 required 2.3 hours for training. Comparing this International Conference on Circuit, 2017.
to the succeeding iterations, YOLOv5 achieved a score close [11] B. N. K. Sai and T. Sasikala, “Object Detection and Count of Objects
to 95% at the expense of an additional 60 minutes of training in Image using Tensor Flow Object Detection API,” in 2019 International
Conference on Smart Systems and Inventive Technology (ICSSIT, 2019.
time. [12] A. Premkumar et al., “Sign language recognition: A comparative anal-
The precision and recall trade-offs in the standard YOLO ysis of deep learning models,” I. Computation and I. T. S. N. Singapore,
versions 3 and 5 were satisfactory. Although the findings from Eds. 2022, pp. 1–13.
[13] K. B. Kumar and D. Dr. Venkataraman, “Object Detection Using
the intermediate models YOLOv4 and v6 were encouraging, Robust Image Features,” in Springer International conference on artificial
their precision and recall values do not allow them to be con- Intelligence and Evolutionary Algorithms in engineering systems, 2015,
sidered all-arounders. Here, YOLOv7 triumphs, its Precision- pp. 285–295.
[14] S. Hameed and I. Amin, Detection of Weed and Wheat Using Image
Recall curve, which mimics the strong baseline models while Processing, vol. 10, no. 1109, pp. 1–5, 2018.
requiring only 35% less training time (compared to YOLOv5). [15] E. David et al., Global Wheat Head Detection (GWHD) dataset: a large
With a higher epoch, the mAP@0.5 score of 0.899 for and diverse dataset of high resolution RGB labelled images to develop and
benchmark wheat head detection methods. In arXiv [cs.CV], 2020.
YOLOv7 appears to be something that can be improved. The [16] M. Tan, R. Pang, and Q. V. Le, EfficientDet: Scalable and Efficient
model needs five minutes every epoch on average. Object Detection. ArXiv [Cs.CV], 2019.
Therefore, to yield higher accuracy with a reduced training [17] S. K. S. Ishita Jain, Ed., Convolutional Siamese RPN++ and Yolo v3
based Visual Tracking Regression, vol. 66, no. 1. Journal of Scientific
time one can employ YOLOv7 with a higher number of Research of The Banaras Hindu University, 2022.
epochs as the iterative improvement in the mAP score in the [18] Sairamkumar, S. ”Design of ANN Based Machine Learning Method for
incremental iterations tends to improve, thus able to produce Crop Prediction.” Journal of Innovative Image Processing 3, no. 3 (2021):
223-239.
better results and faster performance.
R EFERENCES
[1] J. Redmon, S. Divvala, R. Girshick, and A. Farhadi, You only look once:
Unified, real-time object detection. ArXiv [Cs.CV], 2015.
[2] J. Redmon and A. Farhadi, YOLOv3: An Incremental Improvement.
ArXiv [Cs.CV], 2018.
[3] A. Bochkovskiy, C.-Y. Wang, and H.-Y. M. Liao, YOLOv4: Optimal
speed and accuracy of object detection. ArXiv [Cs.CV], 2020.
Parimalasundar E Suresh K
Department of Electrical and Electronics Engineering Department of Electrical and Electronics Engineering
Sree Vidyanikethan Engineering College Christ University
Tirupati, 517102, Andhra Pradesh Bangalore, Karnataka
parimalasundar.e@vidyanikethan.edu sureshk340@gmail.com
Abstract - Voltage source converters that are dependable and applications like massive induction motor drives, UPS systems
of the highest quality are offered by Multilevel Inverter to and versatile AC Transmission Systems.
convert DC power systems to the AC power grid. One of the
intriguing technologies in the field of power electronics are Desired output is obtained from many levels of DC links
multilevel inverters (MLIs) in various configurations. It is also
that are created within the circuit. The DC to AC power
possible to integrate a few DC sources in MLIs to create a
converters are called inverters. The ability conversion is
singular output, reducing the number of isolated inverters, the
overall component count, and losses. MLIs are the top converters
achieved either by controlled input and turn-off switches or by
in many applications because to their capacity for medium and forced commutated thyristors, betting on applications. These
high-power applications. In order to produce the levels for the inverters is also of voltage controlled or current controlled.
stair case wave shape, this research work introduces a new Inverters with levels either zero or ±Vdc called 2 level
configuration module for asymmetrical multilevel in which inverters [7]-[9]. In dynamic and application of high voltages,
capacitors are employed as DC linkages. With two unequal DC these conventional inverters with 2-level output have restriction
sources, the suggested Box -type modular structure will produce in operative at high frequency in the main thanks to changing
more voltage levels. It is useful for a variety of renewable losses and constraints imposed on the device ratings. So as to
applications since it has two back-to-back T-type inverters and beat these limitations, the thought of multi-level inverters is
minimal parts. This module contains this structured method to used. The DC power input to the electrical converter is
lessen the Total Harmonic Distortion (THD) rating and raise the batteries, fuel cells or alternative DC sources. However, in
quality of the sinusoidal output voltage. most of the commercial applications, for feeding the input
power, rectifiers are used. Within the rising trends, multi-level
Index Terms - Cascaded H-bridge, Multilevel Converter, electrical converter (MLI) thought plays a very major role in
Symmetrical Inverter, Asymmetrical Inverter. shaping the AC output waveform with no distortion. Compared
to the traditional electrical converter
I. INTRODUCTION
The MLI has several blessings like minimal harmonics,
In past few years, the generation of power from the energy reduced switch stress, higher quality of power and having
sources which are renewable have become a lot of widespread capability to reach high voltage. The typical two-level inverters
as there's an addendum in power demand and insufficiency of are largely used nowadays to get Associate in Nursing AC
typical energy sources which are not easily replaced by natural voltage from a DC voltage. The two- level electrical converter
means. An alternative energy is that the most propitious and will solely produce two completely different output voltages
copiously on the market renewable energy that may well be for the load. To create up AC output voltage these 2 voltages
absorbed simply with PV systems. Therefore, there is an are sometimes switched with Pulse dimension Modulation
increasing need to find an alternative energy with high (PWM) [10]-[13]. Through this methodology is effective, it
potency, reduced price and improved energy capture. Thus, to creates harmonic distortions within the output voltage in
get the higher than mentioned options, a box type comparison to two-level inverters. The thought of multi-level
unsymmetrical electrical converter with reduced parts is inverters is introduced to beat the issues related to these typical
enforced to get a sleek wave [1]-[6]. This unsymmetrical inverters by adding many voltage levels to make a power tool
stepped wave with lower harmonic distortions. once the
structured electrical converter is wide employed in high power
quantity of voltage levels gets increase the waveforms becomes
power tool, however several levels the planning becomes a lot
of difficult, with a lot of parts and a lot of difficult controller extremely low distortion, which can help with magnetic force
for the electrical converter is required. In construction inverters, compatibility (EMC) concerns. Common-mode voltage (CM):
because the change involves many little voltages, the speedy A motor coupled to a structural motor drive may have less
amendment in voltage is smaller. stress on its bearings since multilevel converters provide lower
In recent years, greater power equipment has become more CM voltage. Additionally, CM voltage may be removed by
in demand for a variety of industrial applications. Utility using sophisticated modulation techniques like those described
applications that require medium voltage motor drives and in. Multilevel converters will have little distortion when
power unit power level. Directly connecting just one power drawing input current.
semiconductor switch to a medium voltage grid is difficult.
This prompted the development of a structural power device TABLE I
structure as a replacement in high- and medium-voltage COMPARISON OF MLI AND ITS PARAMETERS
products [14]-[15]. Multilevel Inverters
Parameters Diode Flying capacitor Cascaded
The electrical converter is a component that transforms Clamped MLI MLI MLI
direct current (DC) into alternative current (AC). The electrical Power
converter is used in homes as a source of emergency backup semiconductor 2(m-1) 2(m-1) 2(m-1)
power. [16] In some craft systems, the electrical converter is switches
used to convert portion of the craft's DC power to AC. The Clamping
majority of electrical gadgets, including lights, radar, radio, Diodes per (m-1) (m-2) 0 0
motors, and other devices, are powered by AC power. Further, Phase
change at the basic frequency will lead to decreasing voltage DC bus
worth by range of times. This voltage amendment happens as (m-1) (m-1) (m-1)/2
Capacitors
per basic cycle. Consequently, the primary problem for Balancing
building inverters is harmonic removal. So, many Pulse capacitor per 0 (m-1) (m-2)/2 0
dimension Modulation (PWM) techniques are custom-made to phase
beat the harmonics constraints like curving pulse dimension
Voltage
modulation, third & second harmonic injection PWM etc. once Average High Very Small
such multi-level inverters are integrated with circuit style Unbalance
harmonic currents can occur, that causes the severe
disturbances. To simulate the results, MATLAB/SIMULINK
tool has been used [17].
modulation methods have been used in recent study. converter stands out among various topologies thanks to its
Additionally, three completely distinct primary structure versatility and strong power contribution.
device structures are reportable in the literature: flying The mode of operation is as given in Table II for all
capacitors, diode clamped (neutral clamped), and cascaded H- output voltage levels. According to these switching states, all
bridges with separate dc sources (capacitor clamped). of the output voltage values were obtained by activating the
switches. To avoid a short circuit between two DC sources,
B. Types of MLI Topology the switches (S1, S7, S3, S8, and S5, S9) shouldn't be turned
on at the same time. The switches in this switching table
Case1: Symmetrical H bridge inverter should always be appropriately switched to generate similarly
Three full bridge inverters that are fed with various sources negative voltages.
of similar magnitude make up the symmetrical H-bridge Some features of the configuration comprise relatively
multilevel inverter, which has all of its input sources of same low number of Dc supplies, high speed abilities, reduced
magnitude. A single-phase full-bridge inverter is coupled with switching cost, and good conversion performance in terms of
an equal-magnitude cascaded H-bridge multilevel inverter.
efficiency.
Different level inverters' ac terminal voltages are linked
together in series. by a variety of arrangements of the four IV. SIMULATION RESULTS
switches.
Here two different topologies were simulated and results
Case2: Asymmetrical H bridge inverter were compared. Figure 2 shows the simulation of conventional
The topology of an asymmetrical inverter is one in which symmetrical 13 level multilevel inverter. Figure 3 depicts the
the inverter is equipped with two independent DC sources of output waveform of the symmetrical 13 level converter.
differing magnitude. The below figure 1 shows the
Asymmetrical topology of 13 level multilevel inverter where it
having two unequal DC sources Vdc, 2Vdc.
Likewise, superabundant modulation techniques and
management paradigms are being developed for structural
converters including curved pulse dimension modulation
(SPWM), selective harmonic elimination (SHE-PWM), home
vector modulation (SVM), and others. Furthermore, traction
motor drives, utility link for photovoltaic systems, and
commercial intermediate motor drives are the target of a
multitude of structure device applications.
TABLE II
11 SWITCHES SWITCHING STATES
State of Switches
Levels Vout S
S2 S3 S4 S5 S6 S7 S8 S9 S10 S11
1
6 Vdc 1 0 0 1 1 0 0 0 0 1 1
5 Vdc 0 0 0 1 1 0 1 0 0 1 1
Positive
Level
4 Vdc 1 0 0 1 0 0 0 0 1 1 1
3 Vdc 1 0 0 0 1 0 0 1 0 0 0 Fig. 2 Symmetrical topology of 13 level MLI
2 Vdc 0 0 0 0 1 0 1 1 0 0 0
1 Vdc 1 0 0 0 0 0 0 1 1 1 0
0 Vdc 1 1 0 0 0 0 0 1 0 0 1
-1 Vdc 0 0 1 0 1 0 1 0 0 0 0
-2 Vdc 1 0 1 0 0 0 0 0 1 1 0
Negative
Level
-3 Vdc 0 0 1 0 0 0 1 0 1 1 0
-4 Vdc 0 0 1 0 0 1 1 0 0 0 1
-5 Vdc 0 1 1 0 0 0 0 0 1 1 0
-6 Vdc 0 1 1 0 0 1 0 0 0 0 1
13 Level MLI
Parameters 13 level Symmetrical
Proposed Topology
MLI
Total Harmonic
11.8 % 3.18 %
Distortion
Total Number of switches
24 switches 14 switches
used
2 unequal DC
Number of DC sources 6 DC sources
sources
TABLE IV
THD, POWER LOSS AND CONDUCTION LOSS PARAMETERS OF 13L SYMMETRIC
MLI
Parameters Values
Fig. 4 Symmetrical topology of 13 level MLI
Number of power switches 24
Load type R (100 Ω) and RL (100 Ω and
50 mH)
Modulating frequency fm (Hz) 50
Carrier frequency fc (Hz) 5000
Output voltage (Peak value in volts) 315 V
Output current (Amps) 4.52 A (R Load)
3.51 A (RL Load)
Switching loss 0.112
Conduction loss 51.32
Power loss 51.43
Efficiency 84.61
% THD (Voltage) 22.15
% THD (Current) 10.57
TABLE V
THD, POWER LOSS AND CONDUCTION LOSS PARAMETERS OF 13L
ASYMMETRIC MLI Fig. 5 Output Waveform for 13 level Symmetrical MLI
Parameters Values
Number of power switches 11 When the load varies from resistive load of 80Ω to the RL
Load type R (100 Ω) and RL (100 Ω and load of 100+j40Ω the wave shaping occurs and the harmonics
50 mH) present in the waveform gets reduced as shown in fig.6. Fig. 7
Modulating frequency fm (Hz) 50 represents the various comparative analysis being carried out
Carrier frequency fc (Hz) 5000 between symmetric and unsymmetrical 13 Level MLI.
Output voltage (Peak value in volts) 328V
Output current (Amps) 4.20 A (R Load)
2.17 A (RL Load)
Switching loss 0.106
Conduction loss 40.52
Power loss 40.72
Efficiency 92.47
% THD (Voltage) 14.32
% THD (Current) 4.02
sense that one of the essential topics that should be given Vs = sending end voltage
clear cut attention is the accurate modelling of such lines in
various power analysis studies.[5][8] Such modelling Ir = receiving end current
method will be the primary method for predicting the Is = sending end current
performance of the line. There is a great desire for the
power flow control in the transmission lines with fast Vr = receiving end voltage
operation, efficiency and reliability [6][9]. Ps = sending end power
III. METHODOLOGY Cos ∅r =load power factor
A. Transmission Line model Cos ∅s = sending end power factor
A short transmission line circuit with ac supply and load
linked [5] is as shown in Fig1. The transmission line The series impedance of the lines is given as,
parameters resistance R, and reactance X are distributed Z=R+jX
throughout the length of the transmission line and the
The shunt conductance and shunt capacity of short
transmission line parameters are considered for this work are
transmission lines are ignored. Therefore, at all the points
lumped. Every conductor has a resistance R [7] as well asan thecurrent remains the same in line.
inductive resistance X. [7] For ease, the conductor parameters
are grouped in one conductor and the return conductor is Practically, it is,
accepted as having neither resistance nor inductive reactance. Is = Ir = I
-phase values and the all currents are phase currents.
Therefore, in the case of three-phase line calculation,
Power per phase = (1/3) × (total
power) Reactive volt − amperes per
phase
= (1/3) × (total reactive volt − amperes)
For a balanced 3-phase, star connected line,
Phase voltage = 1/√3 × (line voltage)
B. Phasor diagram
Figure 3 shows a phasor diagram of the lag load [9]. The
Fig. 1. Single-phase circuit of short transmission line receiving termination current Ir is considered a reference
phasor and is indicated as OT in the phasor diagram. If there
Figure 2 shows the same circuit for a single-phase line is lag load, Ir lags Vr by the angle ∅r shown in Fig 3.Where
and ashort transmission line. The loop resistance and loop OQ = Vr. IrR is the voltage drop over the line's resistance.
inductance of the short transmission line [6] is represented Phasor QR is in charge of IrR. It is drawn in parallel with the
by resistance R and inductive reactance X respectively. OT because it is in phase with the current. IrX is the voltage
drop in the line's reactance. Total impedance voltage drop is
defined as IrZ. The phasor sum of the resistive and reactive
voltage drops, and it is given by SQ inside the graph. The
sending conclusion voltage Vs is represented by OS, and the
control calculate point between the sending conclusion
voltage and the current is representedby S.
Fig.5 shows the performance characteristics of inductive will takes reactive power remaining power can be
short transmission line when pure resistive load transferred to the receiving end [15]. Receiving end current
[14] is connected. Resistive load corresponds to lags the receiving end voltage but it is less than 900. Due to
unity power factor at the receiving end due to the presence of resistive load phase angle has reduced.
which receiving end voltage and the receiving
For resistive and inductive load : 90 < 𝜑𝑟 < 0
end current can be maintained in same phase.
(0 < 𝑐𝑜𝑠𝜑𝑟 < 1, −1 < 𝑠𝑖𝑛𝜑𝑟 < 0)
For unity power factor, 𝜑𝑟 = 0 Z=R + jXL (no capacitive reactance so, XC = 0)
X = XL - XC = XL
I I0 I j0 𝐼 ≈ 𝐼∠𝜑𝑟 ≈ 𝐼(𝑐𝑜𝑠𝜑𝑟) + 𝑗(𝑠𝑖𝑛𝜑𝑟)
𝑉𝑉 ≈ 𝑉𝑉 + 𝑉𝑉 𝑉𝑠 ≈ 𝑉𝑟 + (𝑅 + X)
Here the drop is more when compared to the pervious
Vr is the amount of voltage transferred from sending side to purely R and L loads.
receiving side and the remaining voltage IR is dropped at the
resistor Sl.No Instruments Type (Ratings) Quantity
1) DPSTS 10A One
B. For L-load 2) Autotransformer 1-Phase, 230V One
3) Inductor 8mH One
4) Resistor 14 ohm One
5) Voltmeter M.I (0-300V) Two
6) Ammeter M.I (0-10A) Two
7) Wattmeter 300V, 10A, UPF Two
Table:I simulation values when R load connected
V. OBSERVATIONS
VI. REGULATION
The regulation plot for R load is plotted Vs receiving end
power as shown in Fig. 14. The figure clearly depicts that the
regulation increases with increase in receiving end power
drawn and Efficiency decreases [16]. This increase and
decrease in regulation and power is because of increase in [4] Shailendra Shrivastava, Vishal Sharma, Annapurna Bhargava,
“Modelling and Performance Analysis of Distributed Power Flow
receiving end current with increase in load, which in turn Controller on Multi Machine System,” European journal of Advances in
increases thepower losses (I2R ) and voltage drop IR Engineering and Technology,5(2):99-105,ISSN:2394-658X,2018.
[5] Manoharsingh, B.K.Panigrahi, R.P.Maheshwari “Transmission line fault
detection and Classification” International conference on Engineering and
Computer Technology in power systems, Nagercoil, IEEE 2011.
[6] Maamar Table, Mohamed Jassim Dittlo, Tahar Bouthiba, “Performance
of short transmission lines models” GCC Conference ,Manama, IEEE 2006.
[7] Mohamed.M, Ismail, M.A.Moustafa Hassan, “Distance Relay Protection
for Short and Long Transmission line”, International conference on
Modelling ,Identification and control(ICMIC), Cario, 2013.
[8] S. Balamurugan, J. Sunil and J. Kashreya, "Real Power Flow Control in
a Transmission Line by Varying the Turns Ratio of the Injection
Transformer," 2019 Innovations in Power and Advanced Computing
Fig.14 %Efficiency and Regulation Vs Receiving end Power Technologies (i-PACT), 2019, pp. 1-5, doi: 10.1109/i-
PACT44901.2019.8960069
Due to the voltage drop in the transmission [9]S. Balamurugan, T. N. P. Nambiar, N. Janarthanan and K. R. M. V.
Chandrakala, "Laboratory model to teach power system stability," 2014
resistance; the receiving end voltage will be less IEEE International Conference on MOOC, Innovation and Technology in
than sending end voltage and receiving end Education (MITE), 2014, pp. 53-55, doi: 10.1109/MITE.2014.7020240.
current is also less when compared with sending [10] Balamurugan, S. & Natarajan, Janarthanan & Vijayachandrakala,
K.R.M. & Rr, Lekshmi. (2014). Laboratory Model for Teaching Real Power
end current, hence the overall power transferred Flow Control in Transmission Line. 144-145. 10.1109/T4E.2014.47.
also reduces. As the resistive load decreases, [11] Basavaraju, Jayanth & Sailaja, V. & Kaliyaperumal, Deepa &
losses will increases due to high current, thus Manickavasagam, K.. (2022). Intermediate Administrative System for Load
Side Management in Different Kinds of Load Present in a Cluster of Micro
regulation will increase and also efficiency will Grid. 1-5. 10.1109/DELCON54057.2022.9752829.
decreases.
[12] Rahul, G. & Teja, O. & Shivani, P. & Kaliyaperumal, Deepa &
Manitha, P. & Sailaja, V.. (2020). Long Distance Power Transmission
System with ZVS Ultra-Lift Luo Converter from Large Photovoltaic
Generation. 400-405. 10.1109/ICSSIT48917.2020.9214162.
VII. ANALYSIS
[13] Sailakshmi, & Navyasri, Goteti & Kaliyaperumal, Deepa & Sailaja, V.
From the above, it can be analysed that: & Manitha, P.. (2022). Fault Analysis in Three Phase Transmission Lines
To obtain maximum power and power factor the using Wavelet Method. 248
254.10.1109/ICOEI53556.2022.9776716
load must be resistive and for least power factor
[14] Bindhu, V., and G. Ranganathan. "Effective Automatic Fault
the load must be inductive. Detection in Transmission Lines by Hybrid Model of Authorization and
For short transmission line the transmission Distance Calculation through Impedance Variation." Journal of Electronics
length is small and operating voltage is 3, no 01 (2021): 36-48.
additionally low thus the charging current is [15] S. Kumar A and K. Manickavasagam, "Transmission Line Dynamic
small. So, the impact of capacitance in small Circuit Model for Effective Length of Ground Electrode Under Lightning
Transients," in IEEE Transactions on Electromagnetic, no. 2, pp. 543-550,
transmission lines is less thus can be ignored. April 2022, doi: 10.1109/TEMC.2021.3124679.
VIII. CONCLUSION [16] P. G. Shivani, S. Harshit, C. V. Varma and R. Mahalakshmi,
"Detection of Broken Strands on Transmission Linesthrough Image
This paper presents the performance analysis Processing," 2020 4th International Conference on Electronics,
of the short transmission line using the hardware Communication and Aerospace Technology (ICECA), 2020, pp. 1016-
prototype model. Experimental results are used 1020, doi: 10.1109/ICECA49313.2020.9297639.
to find the regulation efficiency of the line for the
pure resistive load, pure inductive and resistive
and inductive load. Experimental results for
efficiency vs receiving end power, variation of
the input, output voltages, currents, power are
presented. This model can be used to analyze the
different faults on transmission lines.
REFERENCES:
Sathish S
Santhosh Melvin D
Department of Electrical and
Department of Electrical and
Electronics Engineering
Electronics Engineering
New Horizon College of Engineering
New Horizon College of Engineering
Bengaluru, India
Bengaluru, India
sathishs06052002@gmail.com
santhoshmelvind939@gmail.com
I. INTRODUCTION
Battery requirements and recharge times are issues
specific to electric vehicles. The battery's capacity needs to
be raised in order to increase the cruising range. The required
engine power rises as the battery capacity does. While
driving, wireless charging degrades memory. [1] The benefits
of wireless charging include automation, simplicity, security,
and toughness. Installing the dynamic loading mechanism on Fig. 1. Structure of the wireless charging [28]
our route was simple. Battery replacement, conductive In-vehicle and in-vehicle are the two different types of EV
charging, and inductive charging are a few charging chargers. When a converter is built inside a vehicle, the
techniques [2]. charger is referred to as an on-board charger, while a
Battery replacement technology allows you to swap out a converter built into a charging station is referred to as an off-
dead battery for one that has been partially or fully charged. board charger. Inductive power charging is the process of
Side, bottom, and back modifications each have a different recharging a vehicle via electromagnetic induction. Vehicle
method. Dislocation and deterioration problems are charging is one application where inductive energy
complications needs a sophisticated infrastructure. For the transmission is used. [5] While increasing range and lowering
purpose of charging electric vehicles, conductive technology storage capacity, dynamic and semi-dynamic wireless
is employed. a reasonable and useful approach. Safety and charging are both used. As a result, the cost of electric
charge time are problems with conductive charging. vehicles is decreased by the charging system & distance. [2]
Charging is dependent on the range and type of current. There The four technologies are mechanical, acoustic, far field,
are two charging options: rapid charging and standard and near field. For inductive and resonant inductive devices,
charging. [3-4] the frequency ranges are kHz to MHz; for capacitive devices,
it is Hz to MHz; and for microwave devices, it is GHz. Figure
1 depicts the article's overall structure. The magnetic and
electric fields of the short-range wireless power transfer
system (WPT) can be separated. When two panels in an
electric field WPT system are aligned, a process called as
capacitive power load occurs that transfers power from one
panel to the other. An inductive load is created when two
magnetic resonators are aligned and power is transferred from
one to the other ended a predetermined reserve in the airborne
average increase. [6-8]
The transmit coil is supplied with electricity by a power coil is positioned over the transmitting coil. There is no
converter. The power converter's operational pulses are stimulation in the other segmented pads. [19]
controlled by the position of the vehicle. A compensation
network controls the spreader side control missioner's output. Non-polarized coils are single coil structures that solely
The components of the return network are passive. In generate vertical magnetic flux, whereas polarized coils are
compensation networks, different assemblages of inductive multiple coil structures that generate horizontal magnetic
and capacitive components are utilized. Automated flux. Segmented and extended busbars are two types.
distributed charging by QDWC is taking the role of laborious Elongated designs employ lengthy track coils. In terms of
physical charging along roads and business districts (Feng et magnetism, the long and narrow has a smaller ratio of
al., 2020). High installation costs, misalignment tolerances, interlinkage magnetic flux to leakage flux. Non-shrinkage
and constrained speed ranges are problems with DWC points produce a lot of electromagnetic pollution and
systems. A rectifier converts the interacting available flux to interference as a result.
DC in order to charge the battery bank. Primary and The power loss is substantial as a result of the non-
secondary power are converted using power electronics reacting component. Multiple coils are contained in segment
converters. coils, which are driven by a group of transducers or by a
single transducer. In order to minimize power loss and
A long transmitter can generate an unlimited amount of
magnetic flux relatively low. There is a lot of electromagnetic prevent energizing non-interactive coils, transmit coils are
interference and exposure in the tracking coil's non- only activated when the receive coil is aligned with a certain
interacting area. Due to the non-retroactive portion of the transmit coil. The requirement for small transmitter spacing
transmitter coil, power losses are also larger. System and high converter and compensator ratings is a drawback of
reliability is influenced by transmit coil size. Additionally, these segmented transmitters. Systems for inductive power
the entire coil may malfunction if any one component of it transfer are susceptible to misalignment and loosely
fails. Multiple transmit coil shapes are sporadically connected coil designs. The coil has a large leakage
positioned in a track in a segmented DWC. Individual or inductance because it operates dynamically.
more inverters can control transmitters. When the receive coil High leakage inductance reduces a coil's ability to handle
passes over the transmit coil, it becomes activated. The power, and efficiency rapidly decreases as misalignment
second coil is not powered up. rises. Reactive power correction can be used to offset this
large leakage inductance. A passive resonant network
therefore balances reactive power. The coil can now transfer
more power at its maximum capacity. The objectives of
different compensation topologies include compensating
VAR, achieving smooth switching, maintaining bifurcating.
Minimizing soft switching behavior and perceived power
rating. Additionally, these networks keep the network's
output voltage and current constant. Monoresonant and
multiresonant compensation networks are two different
subtypes based on passive elements. The expansion of EV
market penetration was not kept up with by the construction
of charging infrastructures. The expansion of EV charging
stations will have an impact on the grid for public utilities.
Fossil fuel consumption had to rise dramatically to keep up
Fig. 2. Basic representation system with the energy demand created by charging stations.
Different traditional energy sources are becoming less
II. EXISTING METHODOLOGIES
plentiful every day. Additionally, the world's temperature
Two coils are used in the IPT system to transfer energy. will rise as a result of greenhouse gases. Many nations are
Vehicle mounted coils are regarded as secondary coils or enforcing regulations and striving for net-zero emissions by
vehicle assemblies, whilst floor mounted coils are regarded 2050. In 2020, the generation of electricity based on
as primary coils or floor assemblies. Within the air core, the renewable energy will increase by 3% while demand for all
coils are magnetically connected to one another. Choice of other fuels will decline. To increase the penetration of the EV
coil construction depends on the application. Determinants of market, it is crucial to install the charging infrastructure
coil construction design, or coil size and coil shape, include properly.
transmission distance, system power rating, coupling
characteristics and the performance of ferrite cores is An electric vehicle's total cost of ownership comprises
increased. infrastructure development expenses, energy consumption
costs, and vehicle costs. Therefore, for a cost analysis to be
The DWPT load's most reliable factor is vehicle speed. effective, the charging infrastructure must be taken into
The link flux of the coil also varies with the lateral or account. By using CNG, his OLEV's economic energy
longitudinal movement of the receiving coil. The amount of consumption variables were examined by KAIST. According
power transfer decreases laterally as the electric vehicle to analysis, OLEV reduces energy costs by 73%. Driving the
moves. The transmitter is experiencing open circuit voltage car 250 km per day was used to analyze energy expenses. The
when there is no car around. The vehicle's bottom has a cost savings for electric automobiles rises as the mileage
mounting for the receiving coil. Power level and standards does. An online electric vehicle was created by KAIST in
are used to determine the distance between coils on the 2009. The vehicle uses 60 kW of electricity. Dynamic
ground. The vehicle's battery is charged when the receiving induction power transmission technology, which is used for
[14] N. Batra and M. Chawla, "Design And implementation of Smart Power Electronics Smart Grid and Renewable Energy (PESGRE2020),
Energy Meter Using Internet of Things (IoT)", International Journal pp. 1-5, 2020.
of Advanced Research in Computer and Communication Engineering, [22] Meenal, R., Binu, D., Ramya, K.C., Rajasekaran, E., Sangeetha, B.
vol. 9, no. 5, May 2020.
“Weather Forecasting for Renewable Energy System: A Review”,
[15] M. M. Haque, Z. H. Choudhury and F. M. Alamgir, "IoT Based Smart Archives of Computational Methods in Engineering, 2022, 29(5), pp.
Energy Metering System for Power Consumers", 2019 2nd 2875–2891
International Conference on Innovation in Engineering and
Technology (ICIET), pp. 1-6, 2019. [23] Mahesh, M., Kumar, K.V., Prabhakar, M. “Enabling Technologies for
Smart Buildings: High Power Density Power Electronic Converters”
[16] Q. Malik, A. Zia, R. Ahmad, M. A. Butt and Z. A. Javed, "Design and
Smart Buildings Digitalization: IoT and Energy Efficient Smart
Operation of Smart Energy Meter for Effective Energy Utilization in
Buildings Architecture and Applications, 2022, pp. 217–228
Smart Cities", IEEE Conference on Sustainable Utilization and
Development in Engineering and Technologies (CSUDET), pp. 219- [24] G. Mehta, G. Mittra and V. K. Yadav, "Application of IoT to optimize
223, 2019. Data Center operations", proceedings of International Conference on
Computing Power and Communication Technologies 2018 GUCON,
[17] B. K. Barman, S. N. Yadav, S. Kumar and S. Gope, "IOT Based Smart
pp. 738-742, 28-29 Sept 2018.
Energy Meter for Efficient Energy Utilization in Smart
Grid", International Conference on Power Energy and Environment: [25] G. Mehta and V. K. Yadav, "Impact of Renewable Distributed
Towards Smart Technology (ICEPE), pp. 1-5, 2018. Generators in Competitive Electricity Markets Considering Economic
[18] Joseph, J.J., Meenal, R., Josh, F.T., Chandran, G., Veerabathran, S. Factors", proceedings of IEEE Power Electronics Drives and Energy
“Weather observation and forecasting using radiosonde” Telkomnika Systems PEDES, 18-21 December 2018.
(Telecommunication Computing Electronics and Control), 2022, [26] G. Mehta, Y. Mishra, S. Dubey Uzair, M. Singh and R. Khanam,
20(6), pp. 1376–1383. "Accident Prevention using Auto Braking System and Accident
[19] W. W. V. Souza et al., "Development of an Energy Meter based on Detection using Internet of Things", proceedings of International
IoT", 2020 IEEE International Workshop on Metrology for Industry Conference on Smart Machine Intelligence and Real Time Computing
4.0 & IoT, pp. 241-244, 2020. GBPIET, June 26-27, 2020.
[20] N. Shivaraman, S. Saki, Z. Liu, S. Ramanathan, A. Easwaran and S. [27] Kamali, A. R., and V. Prasanna Moorthy. "Design of Solar and Battery
Steinhorst, "Real-Time Energy Monitoring in IoT-enabled Mobile Hybrid Electric Vehicle Charging Station." Journal of Trends in
Devices", 2020 Design Automation & Test in Europe Conference & Computer Science and Smart Technology 4, no. 1 (2022): 30-37.
Exhibition (DATE), pp. 991-994, 2020. [28] Mohamed, Naoui, Flah Aymen, Ben Hamed Mouna, and Sbita
[21] S. V. Sreedevi, P. Prasannan, K. Jiju and I. J. Indu Lekshmi, Alassaad. "Review on autonomous charger for EV and HEV." In 2017
"Development of Indigenous Smart Energy Meter adhering Indian International Conference on Green Energy Conversion Systems
Standards for Smart Grid", 2020 IEEE International Conference on (GECS), pp. 1-6. IEEE, 2017.
Smart Homes
C.Lasya N.Madhav Sai N.Gunavardhan Reddy
Department of Electrical and Department of Electrical and Department of Electrical and
Electronics Engineering Electronics Engineering Electronics Engineering
Amrita School of Engineering Amrita School of Engineering Amrita School of Engineering
Bengaluru,India Bengaluru,India Bengaluru,India
Amrita Vishwa Vidyapeetham,India Amrita Vishwa Vidyapeetham,India Amrita Vishwa Vidyapeetham,India
bl.en.u4eee19006@bl.students.amrita.e bl.en.u4eee19013@bl.students.amrita.e bl.en.u4eee19014@bl.students.amrita.e
du du du
Abstract—Human existence is getting more advanced and control systems that can make sense of erroneous data
better in all aspects due to the tremendous advancements in the regardless of the environment in which they operate.
field of automation. An automation system is a combination of
sensors, controllers, and actuators that work together to A. Advantages of Smart Home Automation:
accomplish a task with little or no manual intervention. Non- • Smart home automation systems make homes more
automated techniques are being replaced by automated convenient and comfortable.
systems. A home automation system will monitor and/or
regulate appliances, entertainment systems, lighting, • Maximizes home security: Home security can surge
temperature, and other factors. Additionally, home security when security and surveillance capabilities are included into
systems like alarm systems and authentication mechanisms smart home network. To increase home security, house
may be used. The aim of this project is to create a home automation systems, for instance, can link motion detectors,
automation system where different sensors and devices are set video surveillance, automated door locks, and other useful
up to trigger one another, like having a smart siren turn on security measures across the house.
whenever the laser detects motion. This system was created by
integrating a range of sensory data and human knowledge in • Convenience and Cost Efficiency: Automation enables
order to complete jobs effectively and efficiently without the users to keep an eye on the control of electrical devices,
need for human intervention. preventing time and energy waste while the devices are not
in use. This lo[rs utility costs, enabling users to save money.
Keywords—Ultrasonic Sensor, Light Dependent Resistors (LDR)
Sensor, Arduino UNO, passive infrared sensor (PIR sensor), Gas • Appliance Safety and Lighting Control: The lighting
Sensor. can be controlled based on the user’s requirements. This
makes it possible for the user to make sure that the lights are
I. INTRODUCTION off and the appliances are switched off while they are not
home to conserve energy.
A smart home system is a home-like setting with ambient
intelligence and autonomous control, enabling it to respond II. LITERATURE REVIEW
to occupants' behaviour and provide them with a range of
Smart home automation or Computerization is the most
amenities. Home automation can include centralised control
popular way of creating smart houses. A system of sensors
of appliances, lighting, HVAC, heating, cooling, and other
captures numerous sets of data about the occupants and the
systems to improve ease, comfort, energy consumption, and
home's energy utilization. Turning on the lights when a
security. A system of sensors gathers various forms of
person walks into the room is a simple example of smart
information about the residents and the home's utility
home automation system. However, more complex
consumption. These data can be analysed by computers and
challenges, such as identifying that whether elderly person is
other devices with computational capability (e.g.,
alone and ill, seem to be more difficult. Machines play a vital
microcontrollers) to identify resident activities or events.
role in people's lives, Home robotization allows control over
They then react to the events by controlling specific built-in
household items. Significant improvements can be made in
devices in the house. In reality, incorporating sensors into
the field of consumer electronics. The concept of a home
intelligent devices and systems has expanded the ability to
automation system can improve a traditional home life. The
monitor, analyse, and aggregate data at a local level. Many
aim is to provide a luxurious life for the elderly and the
physical parameters can be sampled and measured
physically challenged. By using this framework, home
selectively by autonomous and networked sensors. Sensor
appliances work professionally to provide extended personal
integration is expanding rapidly as the foundation for reliable
satisfaction, and comfort to customers.
VII. CONCLUSION
This research work has proposed a home automated system
in which a smart house with high levels of safety and
automation is constructed using multiple integrated sensors.
Numerous sensors are employed in this project for various
functions of the appliances, such as an ultrasonic sensor for
motion detecting. A servo motor is coupled to the sensor
and is used to operate the door. Similarly, a PIR sensor is
used to detect motion (for example, if a human enters the
room), and the sensor will engage. Based on this, Fan or
other associated apps can be activated. LDR sensors are
used to regulate the brightness of lights by turning them on
and off. Laser control is used to secure the residence, and
when the laser is tripped, an alarm sound is buzzed to
Fig.4.Implementation of laser security system
provide an alert. Similarly, gas sensors with a buzzer are [8]R.Piyare, M.Tazi “ Bluetooth Based Home Automation System Using
Cell Phone”, 2011 IEEE 15th International Symposium on Consumer
fitted for any fire breaks out . Electronic.
[9]Bulusu, Sowjanya; Krosuri, Madhuri; Koripella, Rishitha; Sampath,
The difficulty of connecting systems from various Nalini,"Smart and Secure Home Automation Using Internet of Things
vendors is one of the drawbacks of the current smart home Enabling Technologies",Journal of Computational and Theoretical
automation systems. It is challenging to combine new Nanoscience, Volume 17, January 2020
devices with already existing ones created by a different [10]R. Thomas Mathew, Sreeram Thattat, K. V. Anirudh,Adithya Varma P.
brand because so many manufacturers create unique systems. K., and Geena Prasad, “Intelligent Energy Meter with Home
Automation”, 2018 3rd International Conference for Convergence in
Limited functionality and unstable service may occur from Technology (I2CT). 2018.
integrating devices from several vendors. [11]Jalpa Shah, Pathrabe, L., and Patel, B., “Wireless smart power saving
The ideal energy usage for smart homes is still, and will system for home automation”, in 2012 1st International Conference on
Emerging Technology Trends in Electronics, Communication
continue to be, a major concern Networing, 2012.
[12] Ganesh Kumar C, Januja Josephine S, and Premanand V
Chandramani, “Mining Based Device Control for Home
VIII. FUTURE SCOPE Automation”, Joint International Conference on Communication,
Computing and Power Technologies ICCCPT-2015 and Artificial
The proposed model integrates numerous sensors and Intelligence and Evolutionary Computations in Engineering Systems
actuators to allow individuals to live comfortably in their ICAIECES-2015, 2015.
residences. An ESP8266 WIFI module may be added to this [13]V. S. Babu, Kumar, U. A., Priyadharshini, R., Premkumar, K., and
Nithin S, “An intelligent controller for smart home”, in 2016
prototype to permit for remote access and control of International Conference on Advances in Computing,
appliances through a smartphone or tablet. For increased Communications and Informatics (ICACCI), 2016.
protection, a camera may be added, with data transmitted to [14]S. K. Sooraj, Sundaravel, E., Shreesh, B., and K. Sireesha, “IoT Smart
the cloud using modules such as Raspberry pi and picture Home Assistant for Physically Challenged and Elderly People”, 2020
International Conference on Smart Electronics and Communication
categorization accomplished using machine learning (ICOSEC). IEEE, Trichy, India, 2020.
techniques. An application may be designed and interfaced [15]Oberoi, Aaryan; Basavaraju, Sagar;Lekshmi, S“Effective
with IOT to enable a broad range of control over appliances. Implementation of Automated Fertilization Unit Using Analog pH
Sensor and Arduino”, 2017 IEEE International Conference on
REFERENCES Computational Intelligence and Computing Research, ICCIC 2017,
8524170
[1]N. Sriskanthan and Tan Karand. “Bluetooth Based Home Automation [16]Abraham, G., R., R., Nithya, M., “Smart Agriculture Based on IoT and
System”. Journal of Microprocessors and Microsystems, Vol. 26, Machine Learning” ,Proceedings - 5th International Conference on
pp.281-289, 2002. Computing Methodologies and Communication, ICCMC
2021,9418392, pp. 414-419
[2]Rana, Jitendra Rajendra and Pawar, Sunil N., Zigbee Based Home
Automation (April 10, 2010). Available at SSRN: [17]Joshna, V., Kashyap, M., Ananya, V., Manitha, P.V.,“Fully
http://ssrn.com/abstract=1587245. Autonomous Robot to Detect and Degasify Hazardous Gas after
Flood Disaster”, Proceedings of the 2019 2nd International
[3]Lalit Mohan S., et al., "Arduino based home automation using Internet Conference on Power and Embedded Drive Control, ICPEDC
of things (IoT)", International Journal of Pure and Applied 2019,9036703, pp. 134-139
Mathematics Volume 118 No. 17, 769-778, 2018.
[18]Hamdan, Yasir Babiker. "Smart Home Environment Future Challenges
[4]E. Yavuz, B. Hasan, I. Serkan and K. Duygu. “Safe and Secure PIC and Issues-A Survey." Journal of Electronics 3, no. 01 (2021): 239-
Based Remote Control Application for Intelligent Home”. 246
International Journal of Computer Science and Network Security,
Vol. 7, No. 5, May 2017.
[5]S. Lakshmi Ojaswini, et al.,"IoT based Smart Home Security System
and Door Alert using Smart Phone", IRE Journals, Volume 1, Issue 8,
Feb. 2018.
[6]Hamdan, Yasir Babiker. "Smart home environment future challenges
and issues-a survey." Journal of Electronics 3.01 (2021): 239-246.
[7]Amul Jadhav, S. Anand, Nilesh Dhangare, K.S. Wagh “Universal
Mobile Application Development (UMAD) On Home Automation”
Marathwada Mitra Mandal’s Institute of Technology, University of
Pune, India Network and Complex Systems ISSN 2224-610X (Paper)
ISSN 2225-0603 (Online) Vol 2, No.2, 2012.
Abstract— EVs are restricted in quantity compared to fuel- caused by the congestion of EV charging stations, voltage
based cars, but that will change soon. EVs provide imbalance, and effects on the windings of distribution
environmental and social advantages. The electricity demand transformers, are studied in this paper.
to charge these cars will skyrocket, straining the power system.
Thus, several EV charging stations will be connected to the
grid. Harmonics will be created, affecting voltage stability and II. CHARGING STATION OF ELECTRIC VEHICLE
power quality. In this Paper, harmonic analysis and THD are
assessed with an increase in charging stations. This study Fast charging converters demand a lot of power, which the
considers transformer loads, harmonics, and voltage local power source cannot provide. As a result, suitable
instability. Using an LCL filter at the rectifier end reduces infrastructure for electric vehicle charging stations (EVCS)
harmonics for a same number of charging cars. is necessary [4]. These rapid charging stations have a high
charging rate and need a high-power consumption. The
Keywords—Electric Vehicle (EV), Quality of Power,
fundamental block diagram of the EV charging approach,
Harmonics, Total Harmonic Distortion (THD), Charging Station
for Electric Vehicles which comprises of a transformer, a converter, and a
rectifier, is depicted in Fig.1. An EVCS is created by
combining two bi-directional AC-DC rectifiers and a bi-
I. INTRODUCTION directional DC-DC converter.
The concept of electric vehicles is growing rapidly in
the sector of transportation as compared to conventional Control Control
Grid
fossil-fuel vehicles. There are several benefits of using an
EV, such as less pollution to the environment, a cheaper
transportation mode, and a reduction in the use of fossil
fuels. EVs have become highly prominent and people are Filters
EVs can be considered not only as a random load that Transformer Bi-directional Bi-directional Electric
consumes energy but can also be used for power AC-DC converter DC-DC converter Vehicle
generation and back to the grid [1]. For the establishment
of this connection between vehicles and the grid, electric Fig.1 Brief Model of EV charging methodology
vehicle chargers are required. There are various types of PROBLEM FORMULATION
chargers used, such as Type 1 chargers, Type 2 chargers,
and Type 3 chargers. The low-power chargers are Type The EV charging stations include a variety of non-linear
One and Type Two chargers, which have a high charging loads, resulting in harmonics, voltage disturbances, and
time. The Type three charger is the fastest of all, which power quality concerns in the system.
increases the percentage of the battery from 25% to 80%
within a few minutes [2]. Since in the charger, various As a power loss takes place in the distribution transformer
non-linear elements are present as a result of which [5]. An EV charging station of type 2, which is mostly used
harmonics are produced. Due to the presence of these in India, has a maximum current rating of 16A and a
harmonics, the windings present in the transformer get maximum power rating of 3.4 KW. Type 3 chargers are fast
affected, and power output deteriorates. So, when more chargers that charge the vehicle within minutes. The power
EVs are charged, the power quality in the system gets rating of type 3 fast chargers is near about 60KW and
worse [3]. Battery performance can be improved by using charges at a constant current, which is in the range of 60A.
various control techniques like fuzzy logic In this section, the mathematical analysis of various factors
implementation [13]. Use of renewable energy sources like power quality, harmonics mitigation, distorted voltage
like wind energy with proper enhancement can be used to waveform, and transformer overloading is discussed.
improve the efficiency of the circuit. In this article,
MATLAB Simulink software is used to study the impact
of EV charging stations on the distribution grid. Certain
factors, such as degradation of power quality, which is
A. Power Demand cos1 is Phase coefficient. From the above equation THD
The battery of the electric vehicle takes power from the
electric distribution network. With the presence of non- can be calculated as
linear elements in the system, as the demand for power
increases, the system may lose stability. The expression of I2 I I
the power demand can be expressed as in equation 1. THD = ( )2 + ( 3 )2 + +( n )2
PEV Cbattery*(SOCmaximum − SOCminimum)/ TD I1 I1 I1
=
Here, battery is the capability of the battery, and TD is the D. Performance Of Transformer
time taken by the battery for charging. SOC is a factor that
determines whether high power or low power is taken by an The increased stress on the distribution network caused by
EV. The total power required by all the EVs is the addition the mass deployment of EVs has a multiplier effect on the
of the individual powers of all the EVs combined together. life cycle. There should be a limited charging rate of EVs
per day, and the charging stations must be kept far away
B. Voltage Profile from the distribution transformer to further reduce the power
Fast charging results in the waveform of voltage being loss and improve power quality. The prominent reason for
distorted and somewhat unbalanced. Since high power power loss in the transformer is harmonic current, and the
transfer takes place in the case of a fast charger, it has an harmonic voltage results in no load losses. [9]. Due to these
impact on overall system stability and leads to grid instability losses caused by harmonics, there is an increase in the heat
[6, 7]. This can be made better if the charging stations use with respect to purely sinusoidal waves. The capability to
renewable energy sources like solar and wind power. These combat harmonics can be measured by a factor known as the
renewable sources can act as the backbone of the grid during K-factor.
the time of peak demand and reduce instability in the system
during charging. The low voltage produced could be SOLUTION METHODOLOGY
threatening sometimes. It results in grid instability and a
degradation in voltage profile.. When batteries of Electric Vehicles are charged from the
charging station connected to utility grid ,the power
C. Harmonics quality would be hampered. Here in this paper, the
EVCS impact on the local grid is studied and analyzed
As compared to fundamental frequency, harmonics are the using a simulation model shown in Fig.2.
high frequency component of voltage and current [8].
Harmonics affect the power quality of the system by Control
distorting the voltage and current waveform. Measurement
of harmonics can be done with the help of a factor known as
Total Harmonic Distortion (THD). THD basically tells you
the distortion in the signal. Power factor is defined in a
harmonic power system as the ratio of actual power (P1) to
apparent power (S). The product of the effectual value of Control
Grid
voltage and current results in apparent power. The rms value 132 kV
Control
of the harmonic current for the current which is non- A
I12 + I22 +
\
+In2 section
20 km
Filters
Feeder
C
P1 U I1 cos 1 I1
cos = = = cos = cos1 120kV/25kV
47MVA
25 kV/440V
200 kVA
Bi-directional
AC-DC converter
Control
1
S UI I
[6] S. Weckx and J. Driesen, "Load Balancing With EV Chargers and [11] Yusuf, Sk Suzauddin, and Nirendra Nath Mustafi. “Design and
PV Inverters in Unbalanced Distribution Grids," in IEEE Transactions simulation of an Optimal Mini-Grid Solar-Diesel Hybrid Power
on Sustainable Energy, vol. 6, no. 2, pp. 635-643, April 2015, doi: Generation system in a remote Bangladesh.” International
10.1109/TSTE.2015.2402834. Journal of Smart Grids, ijSmartGrid 2, no. 1, March (2018): 27-33.
[12] Ilieva, Liliya Mihaylova, and Simeon Penchev Iliev.
[7] A. Khan, S. Memon and T. P. Sattar, "Analyzing Integrated “Feasibility assessment of a solar-powered charging station for
Renewable Energy and Smart-Grid Systems to Improve Voltage electric vehicles in the North Central region of Bulgaria.”
Quality and Harmonic Distortion Losses at Electric-Vehicle Charging Renewable Energy and Environmental Sustainability 1 (2016): 12.’
Stations," in IEEE Access, vol. 6, pp. 26404-26415, 2018, doi: [13]Atul Nayan and O.P.Rahi. “Charging and Discharging of
10.1109/ACCESS.2018.2830187. Battery in a PV system using Fuzzy Logic Controller” 2022 First
[8] A. Verma and B. Singh, "Multimode Operation of Solar PV Array, International Conference on Electrical, Electronics, Information and
Grid, Battery and Diesel Generator Set Based EV Charging Station," Communication Technologies (ICEEICT)
in IEEE Transactions on Industry Applications, vol. 56, no. 5, pp. [14]B.K.Biswal and O.P. Rahi “An enhanced control
5330-5339, Sept.-Oct. 2020, doi: 10.1109/TIA.2020.3001268. methodology for LVRT Improvement of DFIG under fault
[9] D. B. Wickramasinghe Abeywardana, P. Acuna, B. Hredzak, R. P. condition. 2022 IEEE Delhi Section Conference (DELCON)
Aguilera and V. G. Agelidis, "Single-Phase Boost Inverter-Based
Electric Vehicle Charger With Integrated Vehicle to Grid Reactive [15]Nirbhay Tiwari and O. P. Rahi, “Application Oriented SEPIC
Power Compensation," in IEEE Transactions on Power Electronics, Converter with Improved Voltage Gain for Electric Vehicle Battery
vol. 33, no. 4, pp. 3462-3471, April 2018, doi: Charger”, IEEE- International Conference on Distributed
10.1109/TPEL.2017.2700944. Computing and Electrical Circuits and Electronics (ICDCECE-
[10] A. Das., M. A. M. Bhuiyan, and A. Nasir. “Prospects of solar 2022),23-24thApril2022,pp..
energy in Bangladesh.” IOSR J. Electr. Electron. Eng 4.5 (2013): 46-5.
Abstract— Electric vehicles with unique characteristics In the existing radial distribution systems, the current
like lower noise, energy saving and pollution free due to problems that are facing by EV’s and the obstacles for
reduction of carbon dioxide are consider to be the best development of EV’s are the optimum placement of electric
choice for future automobile industry. The battery of vehicle charging stations [1] and the charging time for a
electric vehicle (EV) must get recharged at charging battery to get charged. It is fact that the power system
stations when they are used for driving in urban area. operation and control has been already faced wide variety of
Since electric charging stations will be used problems due to rapid growth and integration of distributed
simultaneously by many EV. The existing distribution generation but now if the integration of these large numbers
system might not be highly affected by the installation of of electric vehicle charging stations may become further
charging stations if the numbers of electric vehicles are burden for the power grid if not planned properly. As the
small. However, with the increase in the number of charging of maximum number of EV’s at same time will
electric vehicles the characteristics of the electric vehicle have the significant impact on electrical power grid because
charging patterns may have considerable impact on charging a greater number of EV’s at a time may lead to
distribution systems which depends particularly on the peak demand of electricity which can have significant
electric vehicle charging location. There may be impact on the electrical grid system. Therefore, necessary
significant impacts like overloading and power losses in precautionary actions to be taken to avoid failure of
the system. These impacts could be mitigated by proper electrical power grid system due to the peak demand. The
system planning and through strategic placement of placement of charging stations (CS’s) in this existing system
Electric Vehicle Charging Station (EVCS) in the existing with high energy demand can results in more power
radial distribution network. In this research the optimal demand, this may cause disturbance in the distribution
location EVCS are identified in radial distribution system. So, the analysis is required for optimal placement of
network and also the active power losses and system CS’s by considering either by static size or dynamic size in
voltage profile are examined. This research proposes a the radial distribution system. The charging points in the
heuristic algorithm called Particle Swarm Optimization charging station will charge the specified battery size of
(PSO) to optimize the IEEE 33 bus radial distribution electric vehicle. The location of EVCS is the focus of
system with electric vehicle charging stations. The prime current researchers. However, for the best EVCS placement
objective is to place the EVCS at optimal location in the power losses and system voltage profile must be
existing radial distribution network by considering the assessed. For lower bus systems, such as the 69 radial bus
real (active) power losses and also the voltage at the systems and the 119 radial bus system, etc., the method of
buses of the system. trial and error for EVCS placement and sizing is very
Keywords—Electric vehicle, Charging station, Radial simple. The location of the charging station may be best
distribution systems, Optimal placement, Particle swarm served by looking for low sensitivity voltage buses.
optimization However, this way of searching is unable to deliver the best
EVCS on greater bus radial systems.
I. INTRODUCTION
Heuristic algorithms were created as a result for the best
Environmental issues have become one of the most
placement of EVCS for EV as well as for reduced power
serious concerns for the environmental researchers. Now
losses [2] and subsequently to improve the system voltage
one of the primary issues of big cities is growth in emission
profile. For the best position of the charging station, the
of greenhouse gas which is linked to use of internal
researchers take into consideration restrictions like voltage
combustion engines of fossil fuel cars. Greenhouse gases are
and current limits. Since the EV's charging current is always
being reduced through the use of various technologies. As
real, the batteries power rating is expressed in kW.
an ecologically friendly transportation technology, Electric
Therefore, in addition to the current load at the buses, extra
Vehicles (EVs) are giving tremendous potentials for
real power loads must be provided in order to represent the
increasing the power system dependability and flexibility.
EVCS connected in the radial bus system. A heuristic
Among the many advantages of electric vehicles is a
approach called Particle Swarm Optimization (PSO) is
reduction in reliance on fossil fuels of 40-60 percent. Other
proposed in this work for the best positioning of EVCS. The
advantages include convenience, safe charging, high
concept is used with the IEEE 33 bus radial distribution
performance, and flexibility in fuel choice.
standard system while taking into account dynamic loads.
The most encouraging finding of the study was that 59% Therefore an updated voltage given in the equation (4)
of the grid's generating capacity could be supplied by wind is used for the calculation of bus current.
energy when EVs were used for main frequency This procedure will be continued upto the error between
management. The EV, however, may be charged using a vbus and v u → 0 as t→∞. As the cdth branch which is in
limited amount of solar power.
between bus c and bus d as shown in Fig.2 and the losses in
III. PROBLEM FORMULATION this branch is determined by equation (5) which is given
With the rapid expansion of the electric vehicle industry below.
wants an urgent need for charging stations, particularly in (v(c.) − v(d .))2
light of the relatively low energy storage capacity of EV Losses (m) = (5)
batteries. Sixty-two percent of fleet cars will be replaced by z cd .
EVs by 2050 if the current pace of adoption is maintained.
B. Electric Vehicle Charging Station Modeling:
Due to the rapidly expanding demand for electric vehicles
(EVs), charging stations (CS) [12] are now a need. Electric car batteries are charged at stations known as
However, the research has not yet examined the need of electric vehicle charging stations (EVCS) [14]. Typically,
studying how the introduction of EVCS would affect the the energy rating of EV batteries is indicated in kWh and
already-in-place radial distribution system. With this study, Ah. Therefore, the main presumption for modeling the
we examine how the radial distribution system will change EVCS is that it only provides the EV battery with the
when EVCS is implemented. necessary real current. Any bus's actual power is enhanced
if EVCS is linked to it. As a result, these EVCS are
A. Distribution System Load Flow
strategically placed in regions where branch currents are at
Due to several unique topological characteristics, load their lowest. Assume that bus d from Fig. 2 is the best bus
flow algorithms for power distribution systems are very for EVCS placement. The active power in addition to the
different from those for transmission systems. Due to the power required for already existed load is drawn by EVCS
radial nature and more R/X index of the branches a from this bus d.
traditional load flow technique Newton-Raphson method not
possible to apply. So for distribution systems a forward and
backward sweep method is used. In this method with loads
at each bus, the current from the last branch to the first
branch may be determined. So, forward/backward load flow
is the name given to this load flow [13].
The fundamental power equation can be used to compute
the bus currents [9].
i = s
*
v
bus
bus *
(1)
bus
W = Wmax -
(Wmax. − Wmin. ) (iteration-1) (8)
ng − 1
Step-6: The maximum and minimum constraints are
adjusted by updating the positions.
Abstract –Work presented in this paper is based on 0.2% absolute increment in efficiency is possible with
findings of SCAPS simulation of Kesterite CZTSSe thin optimization of thickness of TCO layer. Therefore, wide gap
film solar cell. The main objective of this work is to in SQ limit ≈ 30% and observed efficiency motivated to
investigate and improve overall performance of study effect of variation in other parameters contributing to
nanostructured Cu2ZnSn(S1-x ,Sex)4/CdS/ZnO solar cell the overall performance. To model the cell Cu2ZnSn(S1-x,
through optimization of thickness, band gap and doping Sex)4 is used as p-type active layer as shown in figure 1.
concentration in absorption layer. These are major Aluminium doped ZnO of thickness 0.050μm is used as
parameters which determine performance of the cell on trans-conducting oxide for front contact. It behaves as
large extent. The highest efficiency (simulation) reported transparent medium for solar irradiance with transmittance
greater than 90% for photons of wavelength 𝜆 greater than
for CZTSSe/CdS/ZnO before is 13%. Materials with
350nm [2]. An n-type buffer layer of Cadmium Sulphide of
large absorption coefficient in visible spectrum of solar
thickness 0.050μm with band gap 2.4eV [3] is modelled.
irradiance, regular crystal structure and optimum band Series resistance 𝑅𝑠 = 0.36Ω. 𝑐𝑚2 and parallel resistance
gap are being searched by researchers and industrialists 𝑅𝑠ℎ = 1000 Ω. 𝑐𝑚2 are used. Optical and electrical
for solar applications. There are less number of material properties of CdS as well as ZnO are directly used from the
compositions used for solar cell thin film application 1D- SCAPS [4, 5] library files.
with concerns of cell-efficiency, device flexibility,
manufacturing cost and availability of source materials
in nature. Because extracting elements from its ores and
then making a compound for the required applications
raised manufacturing cost significantly. Adequacy of
Kesterites in nature, less toxic, easy extraction of CZTS
as compared to chalcogenide CIGS make it competent
for the application. Removal of toxic elements
introduced additional challenges which can be future
objective of this work. The proposed optimizations have
increased the cell-efficiency by 22.76% w.r.t. the
reference work.
Keywords– Solar Cell Capacitance Simulator, Fig. 1 Structure of Thin Film Solar Cell
Kesterite, Cell-Efficiency, Solar Irradiance,
2. LITERATURE REVIEW
Optimisation
There are number of research work and publications
1. INTRODUCTION referenced to propose this work. A few of them, works on
kesterite thin film solar cell are introduced here in brief.
The reference work on CZTSSe thin film single junction
solar cell was based on optimization of thickness of Meriem Chadel et al. – improved the cell simulation
transparent conducting oxide layer. It reported that cell efficiency upto 13% at band gap of active layer 1.13eV
efficiency of optimized thickness TCO Kesterite thin film through optimised trans-conducting oxide layer. [1]
solar cell can be improved up to 13% [1]. However the
percentage enhancement in efficiency published with J. Kim et al. - achieve efficiency upto 12.4% by using
similar treatment of TCO layer does not hold the same double emitter structure with deficit of 593 mV in open
result. After simulating multiple iterations with different circuited voltage at band gap of active layer 1.13 eV [6].
possible configurations it has been found that maximum
of curve intersecting horizontal hν-axis at (𝛼ℎ𝜈)2 = 0 open circuited voltage and short circuited current density
gives the band gap of the material. which widely depend on material properties, crystal
structure, physical dimensions of layers and fabrication
0 = 𝐵(ℎ𝜈 − 𝐸𝑔 ) techniques used [18-20].
𝐸𝑔 = ℎ𝜈𝑔 = 1.18𝑒𝑉 1
It is found correlated with the synthesis results of
0.8
𝐶𝑢2 ZnSn(S1−𝑥 Se𝑥 )4 reported by Y Jhao et al. The optical
Voc------->
characterizations of Kesterite reported band gap 1.16 eV for 0.6
Cu2ZnSn(S1-x Sex)4 [14] at 𝑥 = 0.76 and similar conclusion
made by J. Krustok et al. that band gap is found close to 1.2 0.4
eV [15] at AM 1.5G. It has also been observed that band
gap varies linearly in agreement with reflectance and 0.2
(eV)-------->
transmittance measured by Gao et al. [16] and He et al. [17]. 0
The linear relation can be established as
1.13 1.16 1.18 1.21 1.24 1.27
𝐸𝑔 = −𝑚 × 𝑥 + 𝑐 Fig. 3(b) Band Gap V/s Voc of Cu 2 ZnSn(S,Se) 4 /CdS
(5) 25
Jsc (mA/cm2)----->
By placing Eg =1.16 eV at x = 0.76 in the material 20
composition of S1-x:Sex, slop m = 0.447 is determined.
Therefore, the value of x = 0.72 is computed corresponding 15
the band gap Eg = 1.18 eV. Thus absorption model
presented in figure 2 is used for simulation of reference 10
models (1, 6, 7, and 8) for their respective estimated band 5
gaps along with optimised band gap of 1.18eV. The (eV)-------->
simulation results obtained are approximately same with 0
considerable error of 0.4% to 0.7% as compared to 1.13 1.16 1.18 1.21 1.24 1.27
simulation results reported and 1% to 2% with respect to
experimental cell measurement done in laboratory. This Fig. 3(c) Band Gap V/s Jsc of Cu 2 ZnSn(S,Se) 4 /CdS
verified the proposed model is précised and so optimization
of band gap for Kesterites solar cell can be performed. The
performances are given in figures from 3(a) to 3(d). 82
80
%FF-------->
13 78
12.5 76
%Efficiency
74
12
72 (eV) ---------->
11.5 70
1.13 1.16 1.18 1.21 1.24 1.27
11
(eV) Fig. 3(d) Band Gap V/s %FF of Cu 2 ZnSn(S,Se) 4 /CdS
10.5
1.13 1.16 1.18 1.21 1.24 1.27 The performance parameters of CZTS Se thin film solar
cell are investigated by varying energy gap in its widely
Fig. 3 (a) Band Gap V/s Efficiency of Cu2ZnSn(S,Se) 4 reported range of 1.0 eV to 1.5eV, Thickness from 1μm to
3μm and donor concentration from
Figure 3(a) represents characteristic curve of efficiency 1013 𝑐𝑚−3 to 1017 𝑐𝑚−3 in 1D-SCAPS simulator.
verses band gap in which a maxima is observed at 𝐸𝑔 = Characteristic %ƞ, Voc, Jsc %FF curves are obtained
1.18 𝑒𝑉. The four performance parameters used for corresponding to different energy band gaps of
characterization of a solar cell are Voc, Jsc, %FF and %ƞ. Cu2ZnSn(Sx,Se1-x)4 as plotted in fig. 3(a), 3(b), 3(c), and
Where, ƞ denotes efficiency and defines maximum possible 3(d). Here, experimentally obtained absorption coefficients
(theoretical) power that can be generated whereas %FF i.e. for the reference model is also studied. The simulation
percentage fill factor specify the maximum usable results all together agree with the optimum band
percentage of electrical power by a load. Voc and 𝐽𝑠𝑐 are gap 𝐸𝑔= 1.18 𝑒𝑉determined as shown in figure 3(a).
Table 1Comparative performance of reference and optimized band gap model of cztse thin film solar cell with cds buffer layer
S.N. Band Gap Eg(eV) Thickness (d) Voc (V) Jsc (mA/cm2) %FF %ƞ
1 1.13 (reference cell) 2 μm (reference cell) 0.67 25.0 74.69 12.95
2 1.18 (optimized) 2 μm
0.69 24.5 74.86 13.07
3 1.18 (optimized) 1.6 μm (optimized) 0.69 24.7 75.22 13.30
REFERENCES
[1] Meriem Chadel, Mohammed Moustafa Bouzaki, Asma Chadel, [11] Sonam Tripathi, Brijesh Kumar, D. K. Dwivedi, “Study on formation
Michel Aillerie, Boumediene Benyoucef, “Thickness optimization of and characterization of kesterite CZTSSe thin films deposited by
the ZnO based TCO layer in a CZTSSe solar cell. Evolution of its thermal evaporation technique for solar cell applications” Journal of
performance with thickness when external temperature changes” Materials Science: Materials in Electronics, Springer Nature 2020
Journal of Physics: Conf. Series 879 (2017) 012006 [12] J. Krustok, R. Josepson., M. Danilson, D. Meissner, “Temperature
doi:10.1088/1742-6596/879/1/012006 dependence of Cu2ZnSn(SexS1−x)4 monograin solar cells” Solar
[2] Chan Kim, Hyun-Jun Jo, Dae-Hwan Kim, Dae-Ho-Son, Dong-Ha Energy, Volume 84, Issue 3, March 2010 DOI:
Lee, IIsu Rhee, “Effect of ZnO Layer Thickness on Efficiency of 10.1016/j.solener.2009.09.011
Cu(In,Ga)Se 2 Thin-film Solar Cells” Molecular Crystals and Liquid [13] Satyendra Kumar, Swati Arora, “Effect of Buffer Layer on Cu(In,
Crystals 565(1):52-18,2012 Taylor & Francis Ga)Se2 Solar Cell Performance” SKIT Research Journal,
DOI:10.1080/15421406.2012.692227 DOI:10.47904/IJSKIT.11.3.2021.20-24
[3] Sadao Adachi, Springer Newyork, NY, “Optical Constants of [14] A Bernal-Condia, J AS´anchez-Cely, J D Bastidas-Rodriguez, M A
Crystalline and Amorphous Semiconductors”, Optical Materials, Botero-London and M A Mantilla-Villalobos, “Simulation of a thin-
Characterization and cal Technique, 1999 ISBN: 978-0-7923-8567-7 film solar cell based in kesterite using Matlab” Journal of Physics:
[4] Huiling Duan, Yimin Xuan, “Enhancement of light absorption of Conf. Series 1159 (2019) 012020 doi:10.1088/1742-
cadmium sulfide nanoparticle at specific wave band by plasmon 6596/1159/1/012020
resonance shifts” Physica E: Low-dimensional Systems and [15] Yun Zhao, Xiuxun Han, Wen Li, Liang Liubc and Tooru Tanaka,”
Nanostructures, Vol-43, issue-8, June 2011, pages 1475-1480 Synthesis of the Cu2ZnSn(S,Se)4 alloys with tunable phase structure
[5] H. Yoshikawa, S. Adachi, “Optical Constants of ZnO” Japanese and composition via a novel non-toxic solution method” journal of
Journal of Applied Physics, 1997, 36, 6237 Royal Society of Chemistry, RSC Adv., 2013, DOI:
[6] Kim J H, Hiroi H, Todorov T K, Gunawan O, Kuwahara M, 10.1039/c3ra45094e
Gokmen T, Nair D, Hopstaken D, Shin B, Lee Y S, Wang W, [16] Gao, F., Yamazoe, S., Maeda, T., Nakanishi, K. & Wada, T. (2012)
Sugimoto H, Mitzi D B “Device Characteristics of CZTSSe Thin- Structural and optical proper- ties of In-free Cu2ZnSn(S,Se)4 solar
Film Solar Cells with 12.6% Efficiency” Adv. Mater. (2014) 26 7427 cell materials. Japanese Journal of Applied Physics, 51, 10NC29-1-5.
[7] Y.S Lee, T. Gershon, O. Gunawan, T. Gokmen, Y. Virgus, and S. [17] Haight, R., Barkhouse, A., Gunawan, O., Shin, B., Copel, M.,
Guha, “Cu2ZnSnSe4 Thin-Film Solar Cells by Thermal Co- Hopstaken, M. & Mitzi, D. B. (2011) Band alignment at the
evaporation with 11.6% Efficiency and Improved Minority Carrier Cu2ZnSn(SxSe1–x)4/CdS interface. Applied Physics Letters, 98,
Diffusion Length” Adv, Energy Mater. 26(44), 7427-7431 (2014) 253502-1-3
[8] Kang Yin, Xiao xu, Muyu Wang, Jiazchengzhou, BiwenDuan, [18] Swati Arora, and Y. K. Vijay, “Electrical, structural and optical
Jiangjiyan Shi, Dongemei Li, Huijui Wu, YanhongLuo, QingboMeng properties of tellurium thin films on silicon substrate,” vol. 1953, pp.
“A high-efficiency (12.5%) kesterite solar cell realized by crystallization 03008
growth kinetics control over aqueous solution based Cu2ZnSn(S,Se)4” Journal [19] Swati Arora, Vivek Jaimini, Subodh Srivastava, and Y. K. Vijay,
of Materials chemistry A, issue 2, 2022 “Properties of Nanostructure Bismuth Telluride Thin Films Using
[9] Kentaro ITO, Copper Zinc Tin Sulfide-Based Thin-Film Solar Cells, Thermal Evaporation,” Journal of Nanotechnology, vol.
John Wiley & Sons, Ltd 2015 ArticleID4276506
[10] A. Benmir, M.S. Aida, “Simulation of a thin film solar cell based on [20] Karuppusamy, P. "An Overview of the Solar Cell Technology and its
copper zinc tin sulfo-selenide Cu2ZnSn(S,Se)4” Elsevier, Future Challenges." Journal of Electrical Engineering 4, no. 2 (2022):
Superlattices and Microstructures 91 (2016) 70e77 doi: 10.1016/ 77-85.
j.spmi.2015.12.027
Abstract— Epilepsy is a neurological condition marked by Only patients with epilepsy are monitored using the high
abnormal brain activity, which includes seizures. EEG data, which standards practices used in the medical industry. A test called
are recordings of brain activity, are frequently employed in a wide electroencephalography (EEG) is carried out in hospitals
range of medical applications, including the identification of over a few days. It comprises recording audio using an
epileptic seizures. Neurologists used to draw conclusions by visual electro-acoustic transducer, taking pictures of the patient
assessment. The findings, however, depended on the reader's level with a camera, using an EEG to record brain activity, and
of skill and were frequently quite time-consuming. Thus, using a cardiograph to record electrical activity in the gut
automatic epileptic seizure detection methods that can deliver
(ECG). Long-term patient monitoring is not practical due to
accurate outcomes quickly are needed. Hence, this paper
the very intrusive nature of these approaches and the
differentiates the normal and epileptic EEG waveforms with
frequency estimation technique. Consequently, the frequency
unpredictable nature of seizures. Real-time epileptic seizure
information of the non-epileptic and epileptic EEG is discovered, monitoring is now possible because to wearable technology
and the waveforms between them are easily distinguished. and embedded computing. For long-term patient monitoring,
these innovative ultra- low energy transportable devices get
Keywords: Electroencephalogram signal database, around the constraints of medical technology [3].
Electroencephalogram (EEG), epileptic seizures, time-frequency Particularly with regard to the gadgets' portability, everyday
domain. remote patient monitoring is possible. By using ambulatory
I. INTRODUCTION real-time patient observation, hospital doctors can access
patient data from a distance and, as a result, stop any patient
Epilepsy, one of the most important issues with brain state deterioration through the early identification of
health, affects more than 65 million people worldwide. It is epileptic seizures [4].
the fourth most common chronic illness after migraine,
stroke, and Alzheimer's disease. Despite notable The most popular wearable device for spotting epileptic
improvements in antiepileptic drug tolerance and seizures is an EEG headband with integrated electrodes to
effectiveness, one-third of epileptic patients still experience measure brain activity. The worldwide 10-20 system
seizures. Intermittent seizures, which are caused by provides the foundation for the electrode placement.
abnormalities in the electrical activity of the brain, are the Approximate entropy and discrete wavelet rebuild analysis
defining feature of epilepsy. The duration of these seizures were utilized to create a replacement theme for epileptic
can vary from a few seconds to several minutes, and they seizure identification on 100 EEG channels. The literature
might range from minor impairments of consciousness to has also published a number of techniques for convulsion
severe whole-body convulsions. Consciousness impairment identification supported by EEG signals that use artificial
can cause drowning and other severe injuries, such as those neural networks. All of these techniques necessitate the use
that occur in auto accidents. This significantly has a negative of EEG head caps, which are heavy and inconvenient to wear
effect on one's quality of life and psychological health. These because they require connecting 23 to 256 wired electrodes
people have a mortality risk that is 2-3 times higher than the to the patient's scalp [3, 4].
general population due to the unpredictable nature of Due to the detrimental effects of societal stigma on their
seizures. The most severe seizures, particularly those that daily lives, the majority of epileptic patients refuse to wear
occur at night, may also result in sudden, unexpected death these caps. Numerous studies have been done on patients'
due to a brain condition [1]. daily lives to lessen the number of EEG electrodes needed
Epilepsy-related causes of death account for only one for epileptic seizure detection in order to avoid the harmful
hundredth of all deaths in populations of patients with brain effects of social stigma. For instance, the authors of employ
diseases. Periodic patient observation is crucial for alerting eight electrodes in the front head montage and seven
family members and caregivers to provide quick emergency electrodes in the back head montage as two distinct montages
medication and assistance during a seizure, helping to lower with fewer electrodes for automatic multimodal detection of
morbidity and mortality from brain disease [1, 2]. epileptic seizures. The suggested remedy is still obtrusive,
therefore the social stigma issue still exists [4].
The intention of this examine is to check out an automated convulsion activity using background
approach of detecting epileptic seizures so that you can electroencephalogram (EEG) data collected from both
enhance the remedy and prognosis of people with medically epileptic and control patients. The planned theme is based
resistant epilepsy. on individual rippling remodels (DWT) and energy
estimation at each node of the deconstruction tree, followed
An encephalogram, or the electrical life of the brain, is by the use of probabilistic neural networks (PNN) for
used to encode synchronized vegetative cell firing in the classification. Up until the sixth level using DWT, ordinary
cerebral mantle. For the localization and identification of as well as epileptic graph epochs were transformed into
convulsions, the identification of recorded convulsion approximation and details parameters [9].
activity in an encephalogram segment is essential. Under this
study, we aim to show that time-frequency analysis is a good To describe the certainty of the epileptic activity at
method for classifying encephalogram signals for intervals between the records of graph data, estimated
convulsions with fewer electrodes than other previous approximate energy (EDA) values of the ripple factors at
techniques. The unpredicted occurrence of synchronous the least-bit nodes of the down-sampled tree were employed
vegetative cell firing within the cerebral mantle causes as a feature vector. Denary cross-validation was imposed
epileptic seizures, which can be recorded using an within the trained model to show the classification accuracy
encephalogram, the live recording of brain electrical activity. of the intended probabilistic neural network. Clinical graph
The identification of recorded convulsion activity in the data from both conventional and epileptic participants was
encephalogram section is essential for the localization and used to evaluate the effectiveness of the new theme. It was
classification of convulsion. In this project, we want to show discovered that, while using the intended theme, the
that time-frequency analysis is more effective at classifying detection is 90.93% accurate, with sensitivity and
encephalogram signals for convulsions with fewer electrodes specificity coming in at 90.96% and 99%, respectively. In
than other existing methods [7]. We use time series analysis underdeveloped nations where there is a severe lack of
using frequency estimation with the FFT approach to educated medical specialists, the projected approach will be
examine EEG signals. EEG uses electrodes attached to the widely used [9, 10].
scalp to record the electrical activity of the brain; as a result,
the results reflect variations in brain activity that are used to REAL-TIME METHODOLOGY FOR EPILEPTIC SEIZURE
assess patients with known seizure conditions and to DETECTION:
categorize different seizure types. In order to diagnose epilepsy, automatic analysis of
encephalogram recordings began in the early '70s.
The listed details are downloaded from PHYSIOBANK Computer-based analysis today focuses on two main
ATM INPUT DATABASE:CH-MIT scalp EEG database issues: 1) interracial event detection 2. analysis of
• RECORD: chb01/chb01_edf convulsions. Numerous algorithms for spike detection are
• SIGNALS: all anticipated, along with rule-based and mimetic-based
• ANNOTATIONS: seizure start and methods, frequency-domain techniques, ripple transforms,
end annotations (seizures) artificial neural networks (ANNs), freelance element
• OUTPUTLENGTH:10sec analysis, support vector machines, data mining, example
matching, and topographical classification. Convulsion
• TIME FORMAT: time/date
analysis, on the other hand, refers to methods for:
• DATAFROMAT: Standard
• TOOLBOX: export signals csv 1) Convulsion detection;
The signals are loaded in MATLAB and code is 2) Convulsion prediction;
written for normal and abnormal EEG signals and 3) Automatic focus channel identification.
extracted the frequency values for detecting
• Alpha Machine learning is actively putting forward ideas for
• Beta improved seizure detection. Machine learning has been
• Gamma extensively used to extract sensible and important patterns
• theta from a variety of domain datasets. on brain datasets,
The same way is done for abnormal EEG signal machine learning applications for seizure detection,
and extracted and plotted. epilepsy lateralization, discriminating seizure sates, and
localization can be observed.
Several cutting-edge feature extraction algorithms
utilized in offline epileptic seizure detection are compared to Epileptic seizures in encephalogram recordings have
the effectiveness of the suggested method. The comparative been identified using traditional temporal and frequency
evaluations' findings demonstrate that the proposed method analysis techniques. Numerous studies focus on the
performs better in terms of classification accuracy than rival quantitative characterization of the underlying nonlinear
methods. There are the wide variants of these approaches systems backed by evidence of the dynamics of the
based on the taxonomy of statistical features and machine encephalogram's established value. It has been suggested
learning during the last few years. The learning environment to use entropy and correlation dimension exponents as
as it is now. The cutting-edge techniques and concepts complexness indicators of the underlying encephalogram
discussed will provide a thorough understanding of seizure dynamics. The prevalence of seizures will subsequently be
detection, categorization, and future research prospects [8]. determined by combining these measurements with a
classifier [11, 12]. A, B, C, D, and E are the data sets that
For the past 20 years, signal process approaches have are obtained for the length of twenty three and are included
been a crucial area of investigation. A special technique was in the publicly available graph datasets. In order to detect
used in the gift research to quickly and accurately detect
epilepsy, a single channel is used out of one hundred. The Alpha (8–12 Hz): In occipital head area of awake normal
recorded graph data sets A and B are from traditional EEG recordings, posterior dominant alpha rhythms typically
people who are in the state of having their eyes open, while found. It is what distinguishes the typical adult EEG
the recorded graph data set C comes from hemisphere pre- background beat from other rhythms. When a healthy person
processing [13, 14]. is three years old, their posterior timing reaches the alpha
range of 8Hz and does not start to slow down until they are
ninety years old. Normal populations exhibit fast variations
III. RESULTS AND DISCUSSION in the background alpha rhythm.
It is discovered that, in contrast to seizure detection,
seizure localization has not seen widespread use of machine
learning classifiers. When compared to seizure location, AI
classifiers have not been widely used to restrict seizures.
However, there is some writing on this subject. These
meticulous works' authors failed to identify the precise region
at the flaps, such as the occipital, front-facing, parietal left
and parietal right, or to determine the level of the region of
the brain affected by a seizure [15, 16]. While reviewing the
related published research, which isn't our primary objective
in this survey paper, we discovered some intriguing clues for
seizure confinement. This abundance of seizure location
discoveries raises hardly any captivating exploratory research Fig.1: Non-Epileptic waveforms.
issues, for example, choosing sensible demonstrable
elements and AI classifiers to take minimal computation time
as set of data has a high volume with high dimension, and so
the most important missing information from machine
learning algorithms.
A. Normal EEG Waveforms:
The electroencephalogram (EEG), which displays the
electrical activity taking place at the surface of the brain, was
developed. Waveforms of varied frequency and amplitude
recorded in voltage represent this activity on the EEG
machine's screen (specifically micro voltages). The
frequency, amplitude, and duration of EEG waves are Fig.2: Non-Epileptic Frequency Differentiated waveforms.
typically in shape waveforms as well as the places on the
Beta(13–30Hz): The most common beat in standard
scalp where the waveforms are recorded. Frequency of the
adults and children is the beta rhythm. It is most noticeable
EEG wave form is used for the most popular classification
in the frontal and central head zones and gradually fades
(eg, alpha, beta, theta, and delta). It is crucial to use a
posteriorly. The peak value of beta activity is typically 10
methodical process while deciphering Before starting the
to 20 microvolts, rarely exceeding 30 microvolts.
analysis, it is crucial to be aware of a number of confounding
factors, including the patient's age, degree of awareness, state Theta (4–7Hz): It is the rhythm caused by drowsiness as
of physical and psychological activity, and the presence of well as early stages of sleep such as N1 and N2. Because of
numerous biological, environmental, and pharmaceutical early drowsiness, it is most dominant in the fronto-central
chemicals that could impact the waveforms [17]. head zones and gradually migrates backward, replacing the
Among the most often studied waveforms are the alpha rhythm. In children and young adults, elevated
waveforms delta (0.5 to 4 Hz), theta ( 4 to 7 Hz), alpha ( 8 to emotional states can also improve frontal rhythmic theta
12 Hz), sigma (12 to 16 Hz), and beta (13 to 30Hz). There rhythm. Focal theta activity during awake states is suggestive
are additional waveforms that are beyond the usual clinical of Cal cerebral dysfunction.
EEG bandwidth, like ultra-slow oscillations (ISO) (less than
0.5Hz) and high-frequency oscillations (HFOs) (higher than B. Epileptic EEG waveforms:
30Hz), but have lately gained clinical significance with the
introduction of digital signal processing. The usual In an EEG recording abnormal waveforms include
bandwidth for clinical EEG focuses on the analysis of waves epileptic form and non-epileptic form disorders. To do so,
between 0.5Hz and 70Hz [18]. The EEG recordings are band Understanding the regular EEG waveform in various
pass filtered as part of this analysis. Clinical physiological conditions in both children adults will help
neurophysiologists and researchers have examined a wider readers recognize abnormal waveforms in EEG. Depending
EEG bandwidth, and they have discovered that it can be on a number of variables, even normal EEG waveforms may
clinically meaningful in some circumstances. Several be regarded possibly abnormal. For instance, alpha waves,
significant physiological and pathologically significant which are thought of as the posterior back ground rhythm,
characteristics of brain activity are lost when the lower (ultra- are discernible over the back of the head in a usual person.
slow) and upper (infra-slow) frequency spectrum ranges of However, diffuse alpha activity (also known as an alpha
the EEG are deleted from normal EEG. comma) in some forms of comato seness may be
pathognomonic. Although very young toddlers and people
who are sleepy can both exhibit delta waves, the
emergence of focused delta activity can be aberrant(see epilepsy diagnose is the stimulation of IEDs, which can be
below).The brain's frontal areas have beta activity, which either localized or widespread in distribution. Patients with
might expand posteriorly during the first stages of sleep epilepsy may display generalized or focal slowing of the
Focal beta activity (generalized fast activity/GFA) is background. It is important to carefully distinguish IEDs
occasionally observed in structural lesions as well as in a from benign versions or regular brainwaves.
number of epilepsies. Benzodiazepines and phenobarbital,
which are sedative drugs, frequently generate diffuse beta Furthermore, On rare occasions, people without
activity. epilepsy or clinical seizures show epileptic form behavior
on interictal recordings. This could prompt the clinician to
start antiepileptic drug therapy, which could expose
patients without epilepsy to unjustified and hazardous side
effects. However, nobody's seizure count shouldn't be used
to judge the worth of monitoring in people with refractory
epilepsy. Clinical epilepsy care aims to assist a patient in
becoming seizure-free without suffering from adverse
treatment effects. The objective is to reduce patient
morbidity and improve quality of life by lessening the
frequency of medically and socially debilitating seizure
events. Inaccurate epilepsy diagnosis or incorrect seizure
type diagnosis are two factors that contribute to inadequate
seizure control. A precise identification of the patient's kind
Fig.3:Epilepticwaveforms of seizure is made possible by seizure recording, allowing
for the most effective pharmacological therapy and
estimating the likelihood of upcoming vagal nerve
stimulator (VNS) therapy or surgery for epilepsy. Video-
EEG recording is frequently used to establish a different
diagnosis, such as psychogenic episodes, for which
Automated External Defibrillator (AED) medication is
useless. The distinction between epileptic seizures and
psychogenic nonepileptic seizures is the most challenging
and crucial differential diagnosis for which VEM is
utilized. By conducting a clinical examination during the
habitual episode, reviewing video records, or doing both, it
is simple to identify many additional nonepileptic illnesses.
Fig.4:EpilepticFrequencyDifferentiatedwaveforms. However, in the majority of these cases, the VEM results
just support the clinical impression drawn from historical
On an EEG, various waveforms or activity may be and other data and are not diagnostic in and of themselves.
considered normal for some persons while not being
considered normal for others. Sharp waves and spikes are The EEG backdrop may be sluggish during the postictal
phrases that regularly appear in EEG data. These might not interval, which follows a seizure. But interictal background
be noteworthy if they only happen infrequently or at EEG frequencies that are slower than expected for age
specific periods of the day. They may signal the presence generally point to epilepsy that is symptomatic (ie, epilepsy
of a seizure activity adjacent area if they happen frequently secondary to brain insult) The electroencephalography (EEG)
or in particular areas of the brain. EEG findings might be is a crucial part of the assessment of epilepsy. The EEG is
misleading when phrases allude to the possible origin or necessary for the diagnosis of particular electro clinical
spread of seizure activity. Brain signals that affects both disorders because it gives crucial information about the
regions of the brain is referred to as "generalized activity." background EEG and epileptic form discharges. A diagnosis
It may or may not be capable of reporting the starting point of this nature offers crucial prognosis information, directs the
of an action. Specific parts of the brain are regions that choice of antiepileptic medicine, and indicates when to stop
indicate a specific location are referred as (such as taking medication. Essential idiopathic e pilepsies, which are
temporal, frontal, parietal, or occipital). Once more, just frequently hereditary in origin, normally have normal
because a certain brain location is described, it does not neurologic examination and imaging results.
mean that seizures start there. It might signal that this C. Discussion
region is somehow implicated and that more testing is
necessary to establish for sure. The superior performance of this method when compared
to other detection techniques indicates its potential for
The primary purpose of an EEG is to evaluate patients accurately identifying seizure events.
with known seizures in order to accurately identify the
seizure type and epilepsy syndrome such that appropriate Table 1: EEG Frequency range of a normal person
therapy can be directed, in addition to evaluating focal or
generalized cerebral function, or to diagnose unidentified Waves Normal Range Epileptic Range
(Hz) (Hz)
paroxysmal spells that may be seizures. Although the Theta 8.00 18.00
baseline EEG is typically normal in people with epilepsy,
abnormal interictal EEG manifestations may include non- Alpha 16.00 24.00
epileptic form irregularities and interictal epileptic form
discharges. The most helpful diagnostic finding backing an
IV. CONCLUSION [16] Ling Guo; Daniel Rivero; Julián Dorado; Juan R.; Rabuñal; Alejandro
Pazos, "Automatic epileptic seizure detection in EEGs based online
In this overview, we provide an overview of epilepsy length feature and artificial neural networks", Journal of Neuroscience
detection by highlighting the first detection-limiting problem, Methods, ELSEVIER, Vol:191, Issue 1,15August2010.
techniques that allow us to observe epilepsy data from [17] Vivekanandam, B. "Automated Multimodal Fusion Technique for the
different states of EEG knowledge. A brief background on Classification of Human Brain on Alzheimer’s Disorder." Journal of
pattern recognition in epilepsy recognition is provided in Electrical Engineering and Automation 3, no. 3 (2021): 214-229.
order to establish the meaning of the numerous pattern [18] Rohit Bose; Sawon Pratiher; Soumya Chatterjee, "Detection of epileptic
recognition scheme components. This review describes and seizure employing a novel set of features extracted from multifractal
spectrum of electroencephalogram signals", Vol: 13,Issue2,April2019.
evaluates more research in the area of epilepsy detection done
by another author. Impact on increasing epileptic seizure
detection accuracy was studied in this literature review in a
completely different pattern recognition subject. Based on the
preceding discussion, it is discovered that the number of leads
can be reduced and optimized, which is also portable and user
friendly. It can be further designed based on the low cost by
reducing the number of leads used.
V. REFERENCES
Abstract—A data anomaly detection method based on fuzzy equipment fault diagnosis technology can detect faults at an
isolated forest algorithm is proposed. By selecting some valuable early stage, so as to reduce or avoid the occurrence of safety
attributes and building them into isolated forests, starting from accidents. 2006 [5], the US National Funding Committee first
multiple dimensions, the membership degree of the detection proposed the concept of information physical system
results of each dimension attribute is judged. The influence of (Cyber.Physical.System, CPS) [6].
several key factors on CPPS was investigated. The proposed weak
interdependence model considers protection mechanisms such as Subsequently, related research on CPS has attracted
realistic redundancy backup, which makes the model more close extensive attention from industry and academia, and its purpose
to the actual system operation. Great trend of change. is to build a more intelligent modern infrastructure network.
Subsequently, the strategy of edge-break protection is further Data flow anomaly detection technology can be divided into
proposed to improve the robustness of the power grid, and the data flow anomaly detection methods based on supervised
simulation results are shown by computer graphics, which show learning and data flow anomaly detection methods based on
that it has practical value for the analysis of optimal control unsupervised learning according to whether the label data is
systems with accurate mathematical models. used [7]. The supervised anomaly detection method refers to the
need for labeled data in the training process, and the objective
Keywords—Robustness Trend, Power Transmission,
function is approximately solved by optimizing the model,
Transformation Monitoring System, Multidimensional Data, Data
which is difficult to meet the information requirements of
Anomaly Detection Algorithm
intelligent manufacturing [8]. The traditional information
I. THEORETICAL BASIS system overemphasizes the importance of a certain enterprise
or link in the information system, and it is mandatory for the
The so-called anomaly is a data pattern with different data upstream and downstream nodes to share information, resulting
characteristics, which is different from the normal situation. in the lack of a virtuous circle of interaction between
The research and analysis based on this abnormal situation is stakeholders. For IoT, this means that an important aspect to
called anomaly detection technology [since the 1960s, in the develop and consider is high-level information processing [9],
world [1] several electrical accidents have aroused widespread
concern in the power industry of various countries, but the Anomaly detection and one-way communication to
physical and mechanical impact of natural disasters on the designated locations. The semantic meaning of "Internet of
power grid has not received due attention. 2 The GPS Things" is represented as a global network of uniquely
navigation system is the only source of positioning information addressable interconnected objects [10]. That is, it refers to
for the airborne ADS-B device [2]. predictive methods that employ dynamic models or process
characteristics of the objects under study, such as methods
Reference [3] stated that aircraft and avionics specific errors based on physics principles, Kalman filtering, particle Filtering,
were found in airborne GPS data. These errors include GPS etc. can be classified into this category [11]. Such diagnostic
clocks, location update intervals, and location jumps. The methods are based on a full understanding of the failure mode
infinite-time state regulator problem in optimal control theory process of physical models, device components or operating
occupies an important position in the LQR problem, and has a systems. Ding Jie et al. [12] proposed a correlation coefficient-
wide range of practical application value [4]. It can also be based abnormal behavior detection method. An automatic
extended to the analysis and design of infinite-time output detection system of abnormal behavior based on autocorrelation
regulators to avoid safety events. Under the promotion, the model is realized, which has strong expansibility [13].
technology and system for on-line monitoring and fault
diagnosis of equipment operation have attracted the attention of Huge social impact and economic losses warn us that
major industrial countries. On the one hand, the development of although the probability of natural disasters, especially large-
scale severe weather [14], is relatively small, the mechanical The end of the program loop process is realized by judging
damage caused by it has a more serious impact on the power whether the system is stable under the current parameters, and
grid than electrical accidents. When availability is low, large- the loop is terminated when the system is closed-loop unstable
scale flight loss or generation is prone to occur. The ghost flight for the first time. Feature selection can be expressed as the
injection attack is to inject a non-existent flight with a specific process of selecting k best features from a feature set containing
flight trajectory or state. This attack mode is more flexible and m dimensions , because the m-dimensional features are not
practical [15]. independent, but there are complex associations. Therefore,
This paper introduces a software implementation method selecting the k best features can be regarded as a search problem.
that uses Matlab to design the optimal state feedback for the Traditional information systems mainly rely on manual input
controlled system, and provides a software implementation data to passively perceive the internal and external environment
method for dynamically calculating the phase angle margin and of the enterprise. The data has defects such as small amount,
amplitude margin of the system under the condition of various delay, difficult access, and incompleteness, which cannot
parameter perturbations [16], in order to improve the operation effectively support individuality. Emerging formats of
efficiency and economy of the power grid. Benefit, CPPS is intelligent manufacturing such as customized customization,
bound to be one of the main trends in the development of the remote active operation and maintenance, and industrial cloud.
power grid in the future [17]. The wireless node is in the perception layer of the gateway
The deep coupling between the information network and the system, and mainly completes the collection of sensor
power network not only improves the efficiency of the entire information and communicates with the gateway node.
CPPS operation, but also increases additional risks. Compared The wireless node platform mainly includes the main
with the power grid itself. In the single-dimensional sequence control chip STM32, wireless nodes (CC2530, WIFI and
S, since there is only one feature information [18], the research Bluetooth) and sensor nodes. Fuzzy comprehensive evaluation
focuses on how to effectively mine the salient patterns and the [13~14] is a comprehensive evaluation method based on fuzzy
main order relationships in the single-dimensional sequence. mathematics. Specifically, the fuzzy comprehensive evaluation
However, in the multidimensional sequence scenario, we not is Using fuzzy mathematics and the principle of fuzzy
only need to mine the transition relationship between the states relationship synthesis, some difficult to quantify expressions. In
in the multidimensional sequence. order to automatically learn the feature expression of ADS-B
data from the data, an ADS-B based on Long Short-Term
II. THE PROPOSED METHODOLOGY
Memory Variational Autoencoder (LSTM-VAE) is proposed.
A. Multidimensional Data Anomaly Detection Algorithm Data anomaly detection methods, using a large number of
Finally, according to the longest common subsequence normal data samples for training, using variational inference to
matching method, the similarity between the frequent pattern learn the underlying distribution of feature vectors,
and the current newly added time series data is measured, and B. Power Transmission and Transformation Monitoring
the abnormal pattern of the newly added data is found out, System
which solves the efficiency of the traditional abnormal segment
The Spring Framework consists of seven layered modules,
detection method in processing incremental time series. low which are well defined and can be used alone or in combination
problem. Under normal circumstances, the flight trajectories of with one or more other modules. As an open source architecture,
a certain route are similar, but some emergencies, such as the Spring framework adopts a layered architecture. Reference
avoiding objects or losing detection data, may cause abnormal [34] proposes a modification to the dependency network: this
trajectory data, causing the flight trajectory to deviate from the model considers that not all nodes have coupling edges in the
normal trajectory. It may lead to a large difference in the actual coupled model. Therefore, a "partially dependent
trajectory similarity. coupling model" is proposed.
Abstract—This paper presents a compact semi-hexagonal design to enhance gain and it was reported as 3 - 4dB. In [8],
aperture shape antenna (SHASA) with the modified elliptical a Coplanar antenna for V2X communication was proposed.
ground for a cellular vehicle to everything (C – V2X) Radiating elements are placed on a transparent glass substrate
application. The proposed antenna is designed using an FR4 with a dielectric constant of 5.5. The optimized design covers
substrate with a dielectric constant of 4.4 and a loss tangent of a maximum size of 50 x 17 x 1.1 mm3.
0.02. The performance of the antenna was measured in terms of
return loss, VSWR, Gain, Directivity, Radiation pattern, and The negative gain was observed in its desired frequency
Radiation efficiency. Based on the simulation results, the and the radiation efficiency was found below 15%. Dual-band
antenna achieves the resonating frequency of 5.8GHz with a rectangular slot with a 45° circular polarized antenna was
return loss of -63.6dB. The maximum gain and radiation proposed in [9]. Measured input reflection coefficients are
efficiencies are 2.31dB and 94.3%. The proposed antenna 26% (3.38GHz - 4.39GHz) and 56% (5.06GHz – 9.02GHz).
novelties utility in Intelligent Transportation Systems (ITS) for The optimal size was 39 x 46 mm2 and achieved a peak gain
vehicular communication using Cellular – V2X technology of 2dBi. The second band (5.06GHz – 9.02GHz) is used for C
comes under the IEEE 802.11p band. – V2X applications. In [10], a compact wideband microstrip
patch antenna for circular polarization was proposed. The
Keywords— Semi Hexagonal, Aperture shape, Cellular
overall size of the antenna meeting C-V2X requirements was
Vehicle-to-Everything, Elliptical ground, IEEE 802.11p.
30 x 30 x 0.8 mm3 and the simulated gain was larger than 3dBi
I. INTRODUCTION throughout the operating frequency. In all the above-reported
references [7]–[10]the use of high-profile substrates and
Road traffic accidents - the leading cause of death by injury antenna sizes are quite bulky which will not be suitable to
and the tenth-leading cause of all deaths globally - now make mount on a compact device. The main intent of this article is
up a surprisingly significant portion of the worldwide burden to design a low-profile, compact radiating patch that is suitable
of ill health. An estimated 1.2 million people are killed in road to place on any wireless device with improved radiation
crashes each year. A Blind connection is a condition where characteristics.
vehicles are incapable of seeing conflicting traffic [1].
Intelligent Transport Systems (ITS) embrace a wide variety of Compared with the aforementioned various antenna design
communications-related applications intended to increase methods, the proposed antenna is compact, and simple which
travel safety. Dedicated Short Range Communication (DSRC) consists of a microstrip line fed semi hexagonal aperture shape
and Cellular vehicle to everything (C-V2X) are two key radio antenna. In this design, an elliptical ground with a ring was
access technologies [2],[3]. V2X has the potential for introduced to improve the gain and radiation efficiency. In this
vehicular care and to reduce road smashes. For future smart article, a literature survey was done in the first session. In the
cities, communication technology, smart information, and second session, four stage analysis was made to obtain the
intelligent transportation solutions will be the core [4]. optimal parametric dimensions of the proposed antenna. In the
Microstrip patch antennas with the existing methods find third session, a parametric analysis was made to improve the
significant utility on account of their simple geometry, low- return loss, gain, and radiation efficiency. In the fourth session,
profile material, and compactness [5],[6]. the simulation results were explained. The fifth session
concludes that the proposed antenna is well used for C - V2X
Placing a compact and low-profile antenna inside a shark communication. Due to its compact size, the antenna can be
fin module, the results seem to be degraded. Various antenna mounted on a car window, on drones, on wireless
structures (single radiator, array radiator) are developed to communication sensors, and on wearable devices.
meet cellular vehicle standards which fall under IEEE
802.11p. In [7], an Electronically Switched Parasitic Array
Radiator (ESPAR) which operates at 5.9GHz was proposed.
Conducting elements are printed on Rogers R0-4725JKR
substrate. The maximum area occupied by the antenna was 37
x 32 x 0.78 mm3. Three monopole radiators are used in the
(a)
(a)
(b)
Different techniques are used to enhance gain. One of the S11 VSWR Gain
antenna
ng vity efficie
(dB) (dB) (dB)
techniques is by adding a conductor at the back side of the frequenc (dB) ncy
substrate, gain can be improved [15]. In the third stage, gain y (GHz) (%)
and directivity obtained at 5.9GHz are 1.8dB, and 2.05dB 5.8 -63.6 1 2.31 2.45 94.3%
respectively. In order to improve gain, a circle of radius R3 is
placed on the backside of the substrate which is shown in TABLE IV. COMPARISON OF THE PROPOSED ANTENNA WITH THE
figure 4(a). From the simulation results, for R3 is 0.7mm, the REFERENCE ANTENNA
1
Department of Electronics and Communication Engineering, NRI Institute of Technology (A),
Agiripalli 521212, Andhra Pradesh, India, varakumari3@gmail.com
2
Department ofIP Engineering, Senior Software Engineer, Ritchie Bros. Auctioneers, 5667 Gibraltar
Dr Ste 200, Pleasanton, CA, 94588, USA.ayeruva@ritchiebros.com
3
Department of Electronics and Communication Engineering,Kongunadu College of Engineering and
Technology,Trichy 621215, Tamil Nadu, India, jayapal385@gmail.com
4
Department of Computer Science and Business Systems,Sri Eshwar College of
Engineering,Coimbatore, Tamil Nadu 641202,India,tvijay787@gmail.com
5Assistantprofessor Senior Grade 2,School of Information Technology & Engineering
VIT University, Vellore Campus,mrajkumarselvee@gmail.com
6
Department of Computer Science and Engineering,KoneruLakshmaiah Education
Foundation,Vaddeswaram – 522302,Andhra Pradesh, India, razia28sk@gmail.com
Abstract—Water is an essential and crucial resource in I. INTRODUCTION
the world. Without water, there will not be any
organisms, flora, and fauna on the planet. Water is most Water is a valuable resource for all organisms so
important for living organisms like humans, plants, and proper use of water is important for domestic, social, and
animals. Earth is covered by 71% of water bodies and economic development. Water is the main source for some
29% is covered by land. The human body is made up of sectors such as industry, agriculture, transport, and energy.
nearly 70% of water. There is no life when there is no Domestic usage like washing clothes, and utensils, cooking,
water. So, people should not waste water and use it bathing, and drinking. Recycle water will be used for
accordingly. For domestic use, people store the water in washing vehicles and gardening. When the water tank in the
their home tank which flows from the corporate tank or home and apartments are filled, there will be a flow of water
in a bore well. Either of the two there will be a water and leakage of water when there is a breakageof the pipe.
flow when the home tank is filled which leads to water These problems will lead to the wastage of water. To
wastage and there will also be a wastage of water when overcome this problem, the smart flow monitoring system is
there is a leakage of water or theft of water during the implemented. The flow sensor will measure the water flow
flow of water to the home tank. To control and avoid the to the tank. The data will transfer to the cloud through
overflow of water, a smart water flow monitoring system NodeMCU. When the sensor’s value is greater than the
and theft detection are implemented by using the threshold value, the cloud will send the alert message to the
Internet of Things (IoT). Sensors, NodeMCU, Solenoid user as there is a leakage in the flow. To prevent water
valve, and Global System for Mobile communication wastage, there is a need for a regular monitoring system of
(GSM) are used to implement this system. When there is water to reduce water wastage. The main reason for this
a flow above the threshold value and leakage or theft, the problem is the unawareness of administration and the
cloud will send the alert message to the user. society. Monitoring and controlling the water discharge by
using Arduino. This will control the discharge of water from
Keywords— Water, Sensor, IoT, Valve, Arduino IoT cloud, the pipe. Discharge time and water volume are inputted by
NodeMCU, GSM. the keypad, and the results are shown on a liquid-crystal
display (LCD). The values are transferred to the Arduino
from the keypad, the transmitter, and the water flow sensor,
then the value is correlated to the programming code which
is in the Arduino [1].
liters of water. So, the transfer of water fromthe main station valve that is commonly used to control the flow of fluids.
and the substations should be a maximum of 21,500 liters. There is a movable core in the valve, which is called an
This is calculated by using the microcontroller. The armature. An electromagnetic field is produced around the
calculation of the difference between the main station and armature that helps to work the solenoid valve. This valve is
the substations is done by using the microcontroller. The connected to the NodeMCU microcontroller to control the
threshold value of the flow of water is 21,500 liters. When fluctuation of the valves.
the difference is greater than the thresholdvalue, it is
detected as the water is theft or leaked. When there is the C. NodeMCU
difference is less than or equal to the threshold, no theft is
detected, and the water flow is in good condition. The code NodeMCU microcontroller is an open-source IoT
for calculating the water flow from the sensors, and platform. This microcontroller boardcontains the Espressif
calculating the difference between the main station and the system’s Wi-Fi module [11]. The integrated Wi-Fi module
substations are done by the NodeMCU microcontroller is ESP8266. As this microcontroller contains the ESP8266
using the Arduino IDE platform. After calculating the module, it will act as wireless communication. The
difference and the threshold value, the values are transferred operating voltage of the NodeMCU is from 3.3V to 5V. The
to the cloud of Arduino IoT. If the leakage or theft is microcontroller is interfaced with the sensors and connected
detected, the cloud will analyze and send the alert message to the cloud as wireless. The data from the sensors are
to the user’s mobile phone via GSM. Then the user can calculated and sent to the cloud using the Wi-Fi module in
proceed with the solution according to the leakage problem. the microcontroller.
The required hardware components are a water GSM is a device that connects the mobile phone
flow sensor, solenoid valve, NodeMCU microcontroller, and network to the other network. GSM module links the device
the GSM module. The water flow sensors are connected to wirelessly to the networks. It helps to send, receive, and to
the microcontroller and near the main tank and the communicate the data to mobile networks [12]. From the
substation tank of the houses. The readings are collected microcontroller, the data is processed and sent to the GSM
from the sensor and transferred to the microcontroller. The module then this GSM module will send the data to the
GSM module will send the message to the user according to owner’s or user’s mobile phone. GSM will send the message
the information sends by the microcontroller to the cloud. as Short Message Service (SMS) [13].
The amount of water flow [8] through the pipe is Arduino IoT Cloud is an online source platform
monitored by using the water flow sensor. To calculate and that is developed by the Arduino community in an IoT
measure the water flow rate and the amount of water platform.To make the projects simple and easy, this Arduino
flowing through the pipe, the water flow sensor is used. The IoT cloud platform gives an end-to-end solution to the users.
rate of water flow is measured in liters per hour. The flow This cloud can support more interaction platforms like
sensor contains a plastic valve to flow the water through the Representational State Transfer Application Programming
sensor to measure the flow rate. The rotor is also present Language (REST API), Hypertext Transfer Protocol
inside the sensor. The rotor will start to rotate when the (HTTP), JavaScript, WebSocket, command line tools, and
water is flowing through the valve. The principle of working Message Queuing Telemetry Transport (MQTT). In real-
of the water flow sensor is the Hall effect [9]. Water flow time, the cloud can be linked to multiple devices together.
sensors are connected to the NodeMCU microcontroller. The statistics and details can be sent, receive, and exchanged
The data from the sensors are transferred to the to the cloud and the networks [14]. The user can execute,
microcontroller. monitor, and control the data when the user interface allows
these actions. This cloud platform, it works on the Arduino
B. Solenoid Valve microcontrollers and it allows the compatible platforms to
work on it. The compatible platforms are ESP8266 and
A solenoid valve is an actuator that works ESP32 microcontrollers. This cloud can communicate toall
electrically. A solenoid valve converts electrical energy into the Arduino-based boards. To secure the data in the cloud,
mechanical energy. Solenoid valves act as a controlling unit the Arduino IoT cloud for encryption uses the Secure
that allows the fluid to flow or will decline the flow of fluid Sockets Layer (SSL) protocol. The user can log in to the
through the pipe or tube. A solenoid valve is also called a Arduino IoT cloud in the web browser or the user can
proportional valve [10]. The microcontroller controls the download the mobile application of the Arduino IoT cloud
function of the valve in this paper. A solenoid valve is a and login into the mobile application to monitor the data
quickly and easily. In this paper, the cloud is interfaced with sensor measures the rate of water flow and provides an
the NodeMCU microcontroller with the help of the Wi-Fi accurate reading of the volume of water being moved. The
module. The microcontroller will transfer the data to the flow sensor monitors the volume of water entering and
cloud. Arduino IoT cloud will analyze the data from the leaving the main tank and the home tank. Using the
microcontroller and sends the alert message as Short microcontroller, the data from the sensors is uploaded to the
Message Service (SMS) to the user’s mobile. cloud.The cloud will analyze the data received by the
microcontroller. If the data is not equivalent to the threshold
V. RESULTS AND DISCUSSIONS value of the main tank and the house tank, then the leakage
is detected. When the leakage is detected, the cloud will
The primary goals of this journal are to check water send the alert message as SMSquickly to the user’s phone
flow and identify any water stealing or leakage. The flow via the GSM module.
Fig 3:Water limit by substation 1 and before buying the extra tank of water
Above given figure 3, shows the flow of water graph increases and decreases corresponding to the rate of
limits to the tank of substation 1 from the main station and flow of water to the substations. In substation 1, the amount
also displays before buying the extra water for the tank. In of water level in substation 1 is 21542.225 liters. The
the cloud, the user can monitor the system for the past 15 amount of water is reached near the threshold value of
days, past 7 days, past 1 day, for an hour and the user can substation 1, so the valve of substation 1 is closed when the
view the graph also in live. This figure shows the amount of water reaches the threshold value. In substation 2,
monitoring of the water flows from the main station to the the water reaches only 19202 liters so the valve is opened
substations. In this paper, the given figure is taken in live until the amount of water reaches its threshold value of
mode. The main station water flow graph shows the 21500 liters. In figure 4, substation 2’s tank is yet not
monitoring of the water flow to the substations.The graph reached the threshold value. So, valve 2 is opened for
shows the flow of water is increasing and decreasing substation 2. The example data is the buying of water to fill
according to the rate of water flow measured by the sensor. the tank, if the user needs extra water, then the user can buy
Similarly, the substation 1 and substation 2 water flow water by paying a certain amount for certain liters of water.
graphs are displayed in figure 3. This graph demonstrates The cloud displays buy the water as 1000L, 2000L, and
the rate of flow of water received from the main tank. The 5000L of water.
Figure 4, displays the flow of water of the main In substation 2, the amount of water is not reached the
station and the substation and shows the graph after buying threshold value so the valve of substation 2’s valve 2 is
the extra water. The main station water flow graph shows opened until the water reaches its threshold value. The user
the rate of water flow to the substations. Corresponding to of substation one needs an extra amount of water so the user
the water flow the graph will increase and decrease. In the can choose the amount of water by using the button. If the
substation 1 water flow graph after the flow of water for the users are not using the buttons, then the extra amount of
past 15 days, there is no flow of water the graph is stable at water buttons is in OFF condition. If the user needs extra
one point so there is no water flow. The user of substation 1 water, then they turn the button to ON condition. Substation
needs the extra water to flow through the tank so the user 1’s user wants 2000L of extra water so the user can buy the
can buy the amount of water by paying the amount for water by paying the amount for 2000L of water and turning
certain extra water. After buying the extra amount of water, ON the 2000L button to flow the water. As substation 1’s
the flow rate increase that shown in the substation 1 graph. user chose the extra water the valve of substation 1’s valve 1
After the rate of extra flow of water, substation 1’s amount is opened.
of water is 22072.810. Substation 2’s water flow is 19202.
REFERENCES
T.Dhivyanandhini
UG Scholar
Electrical and Electronics Engineering
Sri Ramakrishna Engineering College,
Coimbatore, India
dhivyanandhini.1803023@srec.ac.in
III.EXISTING SYSTEM
An assortment of advances and tests are right now
accessible to extricate vitality from sun and change over
it into deliberate work. At first, there is a steady sun
powered framework which extricates sun-based energy
and change over into electrical energy which paves way
for future utilization. Node microcontroller unit is
utilized with the sun-oriented board. And day by day, as
the innovation develops up, in addition to
microcontroller, LDR is also utilized for implementing
the project.
IV.PROPOSED SYSTEM
In accordance with the above system, the project is planned
with cleaning mechanism and monitoring system using IOT
technology. The equipment model is composed of distinctive
electronic devices, and basic materials utilized for the
mechanical part and in expansion, program are additionally
utilized for the effective usage of the prototype model. This Fig. 2 Flowchart of Solar
paper has proposed a suitable method for monitoring the Power Monitoring
cleanliness of the solar panel and removes the dirt or dust
present in the solar panel for effective absorption of sun light. The components like Node MCU, LCD, a motor driver for
According to the direction of the sun, the solar panel is turned positioning solar panel, a servo motor for cleaning solar panel,
for its operation. When the sun sets down, the sun powered are required for the implementation of hardware prototype.
board will come to the reset position. Automatic cleaning Node MCU is type of microcontroller with Wi-Fi built in it.
system using brushes is empowered in the proposed work. With the help of Node MCU, all the data will be sent to the
The brushes are turned using servo motor. The voltage and cloud. It is used to integrate data and transfers the same with
current values are also shown using LCD. Additionally, this some Wi-Fi protocols. Arduino Integrated Development
information is exchanged to the cloud using IoT. Here, Node Environment is used as a software platform and Embedded C
MCU plays major role in monitoring the data and sharing the (supported by Arduino IDE) is used for coding. The coding
data to the cloud. All the parameters are observed employing helps in fetching the data from sensors. The block diagram of
a computer program application and all the information are the project is depicted in Fig1. The working of the project
put away in cloud. involves tracking, monitoring and also cleaning the panel.
Node MCU plays an important role and also performs multiple
V.HARDWARE IMPLEMENTATION functions, like controlling, monitoring and storing data in
cloud. Here 6V solar panel is used. LDR is used detect the
Solar panel consists of number of arrays for absorbing
light intensity level. When the light falls on the solar panel,
solar power to generate electricity. The aim of the
Node MCU sends data as signals to motor driver to turn solar
proposed work is to continuously monitor the array output.
panel accordingly. Voltage sensors sense the level of the
If the efficiency seems to be less, an alert is generated
voltage. BMS module is used to obtain the constant voltage in
from the Node MCU, according to which DC Motor is
the battery. Based on the dust and dirt on the panel, the servo
used to turn the solar panel according to the sun’s
motor is utilized such that brushes are used to clean the panel.
direction.
Solar panel is associated to battery in order to 247
978-1-6654-6084-2/22/$31.00 ©2022 IEEE
supply to the
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
load. Ubidots is used as IoT platform. Ubidots turns the
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
6.3 Microcontroller
output of the sensor into information to increase the
economy. It is user friendly environment that is used to set Node MCU is used as microcontroller. It is an open source
some type of alarms to the user in the form of e-mails, software and hardware development environment. The Wi-Fi
buzzer, messages etc. The ultimate aim of the proposed module used here is ESP-8266. The programming is done using
work is to monitor the efficiency of the solar panel. Also, very simple language.
the work aims at optimizing the efficiency by having
suitable cleaning mechanism.
The flowchart model for the proposed work is shown in
Fig 2. It is evident from the flowchart that continuous
monitoring of power obtained solar system is done. If the
power during peak hours seems to be less, then it can be
concluded that it is due to the dust or any dirt content
present on the panel. Hence, using servo motor system Fig. 6 Mode MCU
available, the dust present on the panel is cleaned using
6.4 DC Motors
brush.
VI. HARDWARE COMPONENTS USED Two small capacity DC motors are used for having mechanical
movement of panel and the cleaning brush. When the solar panel
6.1 Solar Panel is not in accordance with the sun’s direction, one motor is used to
turn the panel according to sun’s direction and when there is any
A 6V solar panel is used which is shown in Fig 3. This panel dirt or dust is present on the panel, a servomotor is used to move
is used to absorb light energy from the sun and convert into the brush for cleaning.
electrical energy. The proposed work involves the monitoring
and cleaning of this panel. VII.PROTOTYPEMODEL
Cleaning brush
Fig. 3 Solar Panel
Solar Panel
6.2 Sensors
Driving Circuit
Control
Module
Fig. 4 Voltage sensor
IX.RESULTS
The solar panel is tilted according to the direction of sun
and after 10secs, the panel is directed to be turned
according to sun’s direction. The dust present in the panel is
cleaned using servo motor. The Node MCU sends the pulse
signals to motor drive and the voltage is received by
connecting mobile hotspot through Ubidots explorer app.
The message received in the mobile is shown in the Fig 12.
VIII.SOFTWARE DESCRIPTION
The algorithm is designed using Arduino IDE. The upload
speed of the setup is set to 9600 and the setup id is
connected to COM5, ESP8266 board.
XI. CONCLUSION
REFERENCES
Abstract— As crime and accidents have increased, parents are associated with the hub MCU by means of Wi-Fi through
increasingly concerned about their children's safety at school. Arduino Uno. The area is refreshed by the geographic
Many children end up trapped inside a school bus in the bus directions of the school transport outfitted with SKG13 GPS.
parking lot after falling asleep on the way to school, missing the The fingerprint scanner gets the student's ID as soon as the
bus, or leaving at the incorrect station. The proposed student gets on the bus. The transport unit utilizes the hub
model detects and supervises children on school buses as they MCU to push the information to the data set. School unit. The
travel to and from school using radio frequency identification school unit adds a set of student information to the created web
(RFID) technology. Individual RFID tags are effective for
application. By doing whatever it may take, kid wellbeing will
tracking and monitoring children. The bus, the parent, and the
be accomplished all through the armada [1].
school are the three components of the system. Using an RFID
card, the bus unit detects when a child enters or exits the bus. IOT based school bus monitoring and security system, Dr
This information is shared with the parent and school entities in M.V.Vyawahare, Shriya Lambat , Mayuri Belsare, Kritika
charge of detecting the presence of children. Here, Internet of Latwe , Richa Vairagade(2019 march) [2]. An automobile
Things (IoT) technology is used to track the school bus. tracking device is applied for monitoring the motion of a bus
from any vicinity at a selected time. The proposed device
Keywords— RFID, Internet of Things (IoT), Safety, MQTT
employs a generation that mixes clever smartphone software
with a microcontroller. A tool is located in the automobile
I. INTRODUCTION which determines the placement of the bus and the usage of
School buses transport a huge number of young people to Global Positioning System (GPS) generation. Users could be
nations all over the planet every day. Although there are many capable of constantly revealing the transferring automobile on
problems parents may be concerned about when it comes to the call for the usage of the software. This scheme makes use of an
safety of their children's travels, this paper audits school bus alcohol sensor and a panic transfer for the protection of the
access security through a bus tracking system that helps school children. In case of emergency, the repute of the bus is
children move more safely and securely. understood to the faculty employer in addition to parents.
Monitoring the regularity of students getting on and off the RFID based embedded system for vehicle tracking and
bus is difficult for the driver to control and puts the safety of prevention of road accidents, J.P. Frederik, Diederichs, Betina
the child at risk. One of the challenges faced by young people weber (2018) [3]. RFID plays an important role in automated
is oblivion on the bus. This has become more and more ID applications such as contactless RFID smart cards used in
common in recent years. bus drivers, supermarkets, textiles and logistics chain
management. GSM Circuit Switched Data is one of the most
As a result of the derivers' lack of attention, many students important evolutionary steps to solve ongoing pace information
have died as a result of asphyxia. This initiative strives to administrations.
provide a suitable environment for students and their families
by using boarding and alighting records to comply with a set of Adhoc network-based tracking, Yuichiro mori, Hideharu
school bus safety guidelines. Also In this project, fire sensor, a Kojima, Eitaro Kohno (2015) [4]. The proposed system
MEMS sensor, an IR sensor, and an alcohol sensor is used. consists of a remote LAN gadget and an Android device
equipped with a Bluetooth gadget with specially appointed
correspondence work. Our framework uses autonomous
II. LITERATURE SURVEY clustering technology to manage groups of Android devices.
IOT based smart school bus monitoring and notification
system, A Sai Aishwarya, Keerthana MS, Samyama S,
Sukrutha S, Ragavendra M (2020). In this research work, the
GPS unit and finger impression sensor component are
REFERENCES
[1] Shriya Lambat , Mayuri Belsare , Kritika Latwe , Richa Vairagade.,"IOT
Based School Bus Monitoring and Security System", International
Journal of Innovative Science and Research Technology, volume-4,
issue-3, march-2019.
[2] RFID based embedded system for vehicle tracking and prevention of road
accidents,J.P. Frederik, Diederichs, Betina weber(2018).
[3] Adhoc network based tracking, Yuichiro mori, Hideharu Kojima, Eitaro
Kohno(2015).
[4] Saranya, J.; Selvakumar, J., "Implementation of children tracking system
on android mobile terminals," Communications and Signal Processing
(ICCSP), 2013 International Conference on, vol., no., pp.961, 965, 3-5
April 2014.
Fig 4: Mobile Application Screenshot [5] H.BEN & Abdullah.k, “Smart tracking system for school buses using
passive rfid technology to enhance child safety”.traffic and logistics
engineering-,vol.1, No.6,pp3-5,2012.
[6] Kumar, “RFID based embedded system for vehicle tracking and
prevention of road accident”.International Journal of Engineering
Research-, Vol.1, No. 6, pp3-5, 2012.
V. CONCLUSION
The finished framework meets every one of the details and
gives every one of the functionalities recognized in the plan
stage. Utilizing this framework guardians can without much of
a stretch track the school transport and guarantee it is moving
at safe rates, consider the school specialists responsible for
postponements or deviations, be refreshed on the progressions
in timetable and contact drivers or specialists if fundamental.
Working guardians can relax knowing when their children
arrive at securely despite the fact that children aren't permitted
telephones.
In the future, we plan to add live video streaming
capabilities to the system to allow parents and relevant
authorities to watch real-time video of the vehicle's condition.
We will also work on the awareness and nature of tension
cushion gadgets. Since we mainly use our own materials to
manufacture pressure cushion gadgets, they are prone to
malfunction after long-term use. To address this issue, try a
variety of long-lived materials and see vehicle sensors and
other data in real time, while keeping material expenses as low
Abstract— Most people in India depend on agriculture as and instructions are given to farmers via software. W ireless
their main source of income. Using the latest technology is a sensor networks, also known as wireless sensor and
must to protect valuable water resources. Besides being the participant networks, are distributed spatially autonomous
cornerstone of Industry 4.0, IoT also enhances its capabilities sensors that monitor and report environmental or physical
in smart agriculture. The research aims to create a low-cost conditions, such as temperature, pressure, noise, humidity
cutting-edge technology for smart irrigation. IoT can be used and share this information to key location networks [6-8].
to enable self-talk and connectivity between system devices.
User-involved management modes, one-time settings for Each node in a WSN is connected to a sensor,
calculating irrigation schedules, timers for remote data and each sensor network node typically includes several
monitoring using the BLYNK server and event-based pump components, including a radio transceiver with internal and
control are some of the features. The proposed project aims to external antennas, a microcontroller, a power source (e.g.,
enable real-time pollination of modern agricultural systems circuits), and a battery. Hu mid ity is responsible for plant
using IoT protocols. IoT has been developed for the water loss and temperature management. For high-humidity
environmental monitoring of agriculture and farmland. The environment, the spread will be less and less, while the water
system is designed to monitor temperature, humidity and soil in the leaf area will be saturated. As a result, the leaf's porous
moisture using an Android phone. S olar panels from area will undergo a growth and formation of only bacteria [9-
renewable energy. Different nodes in different places are 11].
connected through the Internet of Things, the Internet of
Things transmits and receives data in the nodes, and the Advances in technology have made it possible to
condition of the agricultural land is sent to the user (blynk implement the latest technology at significantly lower costs.
server) through the Internet of Things to control the pumping Wireless sensor networks (IOT) can be used for such
system. The system uses MQTT and HTTP to allow users to systems to enhance their monitoring capabilities by
understand current crops even from a distance. Smart, cheap, deploying sensors throughout the site and monitoring
portable and other advantages, suitable for greenhouses,
environmental parameters remotely [12]. The Internet of
farms, etc. Things consists of small nodes that operate independently
Keywords— Internet of Things (IoT), Sensors, Prediction
and are embedded with sensors. They gather data and send it
Algorithm, Irrigation Management, Precision agriculture. wirelessly to a centralized system that gathers and processes
information fro m all nodes. In this project, an IoT -based
I. INT RODUCT ION agricultural monitoring system is developed for automation.
Temperature, humidity and moisture measurements were
Agriculture has been a significant occupation from the
considered for the study.
dawn of human civilization, and technology has advanced
over time. Good farming practices are still an art [1]. These Temperature and humidity are measured by
environmental changes are too great for traditional farming integrated sensors, while hu mid ity is measured and
practices to handle. Controlling environmental factors such calibrated by a conductivity-based sensor. The Zigbee
as temperature, humidity and moisture is essential for plant protocol is used for field data collection at the central node,
growth. Many plant processes, including pollination, while the user interface uses the Global System for Mobile
germination and others, are affected by temperature. Higher Co mmunications (GSM) service as it is reliable and easily
temperatures have been shown to speed up respiration and accessible to most people[13]. The collected data is stored in
reduce the sugar content of fruits and vegetables [2-4]. Lo w local memory for future analysis. Consumer electronics,
temperatures slow down photosynthesis. Many strategies computer accessories, smart agriculture, building
have so far been developed to reduce water usage. A state- automation, security systems, personal care, and industrial
based approach to monitoring water status, based on plant monitoring and control are just a few examp les [14]. Much
canopy temperature, captures high or low irrigation water of the development and experimental imp lementation of IoT
volume through thermal imaging. Another approach is to use tends to be imp lemented in cit ies. However, there are some
dielectric mo isture sensors to regulate actuators and conserve studies reporting results deployed in vineyards, sharing the
water by using information about soil volumetric water technology with people in rural areas. Belo w is a list of
content rather than scheduling irrigation to run at specific various contributions to our article.
times of the day [5]. The above mechanism only opens the
The system is demonstrated and evaluated in a real
valve and supplies water to the plants when the soil volu me
reaches a certain level. The study uses a second technique, environment, starting with the hardware at the
sensor/actuator nodes at the bottom and going up to the
where sensors are placed based on the water supply in fields
management subsystem at the top. The goal of the research is used to receive high-quality, noise-free data through a
work is to improve the design so that all nodes can interact Kalman filter (KF) with predictive analysis [15].
with each other, while improving the communicatio n
This approach reduces data transfer costs while
stability of wireless sensors through better hardware and
software design. In particular, an intelligent irrigation control improving data quality for analysis of WSN applications.
Agriculture is the most populous economic sector and plays
system based on wireless sensor network is constructed,
which uses real-time humidity data and expert data to make an important role in India's overall socio-economic structure.
Agriculture is primarily dependent on soil properties and
irrigation decisions.
water for irrigation. Traditional farming systems based on
Different alternatives have varying levels of old ideas have failed to produce better results due to
efficiency. In certain circumstances, specialized forms must changing weather and climate conditions. Proper irrigation is
be utilized for specific crops. The specific watering method necessary for better results. Recent developments in this
there are many different sorts of them, but we may categorize technology have had a major impact on agriculture. This
them as follows: Water distribution options include: (i)flood article focuses on work done in M L and IoT. In this article,
irrigation, (ii) sprinkler irrigation, and (iii) drip irrigation,(iv) we discuss the use of IoT for remote monitoring of soil
Irrigation with a sprayer. We can have the following in the properties, which has the potential to change agricultural
presence of a sensor system: (i)Irrigation When the amount practices. There is also a machine learning model that
of water is not determined or predicted, (ii) plan without predicts crops based on soil characteristics, leading to high
concern. Irrigation, in which water is delivered based on yield productivity [16]
predicted demand over a given time, (iii) Ad the amount of
To maximize the use of water for crops, an automatic
water is co mputed based on sensor measurements for
temporary irrigation. irrigation system was created. In the plant root zone, the
system has a wireless network of soil mo isture and
Target temperature sensors. Gateway devices also process sensor
data, activate actuators, and pass information to web
The project provides a crop monitoring and automatic
applications. To regulate water flow, a microcontroller-based
irrigation system that:
gateway was designed with algorithms for temperature and
•Interact with users and collect comprehensive soil moisture limits. The system is powered by solar panels,
information on crop cultivation. and it features a duplex co mmunication link based on a
mobile internet interface that allows for programming of
• Estimate irrigation schedules throughout the season in irrigation scheduling and web-based data control. In a 136-
advance. day test in a sage field, the automated technology saved up to
• Obtain environmental and ground statistics. 90 percent more water than traditional methods compared to
conventional agricultural irrigation techniques. The
• Evapotranspiration and irrigation decision-making automated method has been successfully utilized elsewhere
based on neural networks. for 18 months in three copies. The system has the ability to
• Inform irrigation equipment to activate zonal irrigation. work in remote locations due to its low cost and energy
isolation. The automated process has been used successfully
Transfer sensor data to a MQTT broker to enable remote for 18 months, in trip licate, in other places. The system is
data monitoring. cheap and energy independent, which allo ws it to work in
It can correctly detect and display the temperature and remote areas where water is scarce with limited water
humidity of the greenhouse and accurately reflect the resources [17].
temperature and humidity values in real-time, according to An automatic irrigation system was created in order to
the temperature and humid ity management and water-saving maximize the water availability of the crops. A wireless
watering system. Temperature and mo isture time data may distributed network of temperature, hu mid ity and soil
be presented on the system display screen; for water saving, mo isture sensors is part of the system. Wireless Sensor
the system can automatically decide whether to irrigate or Networks (WSNs) help to develop technology, with the rapid
spray water based on the temperature and humidity value and development and change of technology, automation plays an
stop when the target value is reached. As a result, important role in hu man life. Thanks to automation, we can
temperature and humid ity control and water-saving irrigation control gadgets automatically. In addition to providing
systems, water, or spray plants stimulate growth while comfort, it uses less energy, works more efficiently and saves
conserving water. time. This article aims to build an Android app that monitors
plant growth using various factors, sprays fertilizer when
II. RELAT ED W ORK needed and automatically manages water motors. The main
The use of Internet of Things (IoT) devices enables goal is to understand data transmission over wireless media
efficient communication between different things. The use of using wireless sensor networks and monitoring systems [18].
IoT in agriculture is critical to simplify ing the process.
Around the world, smart farming systems have been The system uses an automated irrigation system to
maintain crop health and yield, and is designed to promote
developed using the concepts of the Internet of Things and
Wireless Sensor Networks (WSN). Within this approach, a effective water management techniques to maximize water
use. Each sensor node will have soil mo isture, temperature
branch called precision agriculture emerged. For various
agricultural tasks, many researchers have created monitoring and humidity sensors installed in the field. Batteries are used
to power these WSNs. To collect sens or data, base stations
and automation systems. Data collection and transmission
between IoT devices installed in the farm can be easily done will use radio frequency transceivers. To regulate the amount
of water applied based on pre-determined thresholds; an
through WSN. In the proposed method, a cluster-based WSN
algorithm was designed to monitor soil moisture and
temperature. For various applications, Ramalingam et al. analyze the data they collect. Here, an agricultural
proposed the Blynk IoT server-based efficient data intelligence platform has been established to address this
transmission method [19]. A wireless sensor network and issue. Through the development of a smart agriculture
Blynk were used to create an intelligent Internet of Things platform, commun ication and multifunctional sensor
(IoT) device by Ven katramanan et al. Th is intelligent components are integrated. System performance can be
Internet of Things device has been used to gather and send affected by packet loss in communication between nodes and
data into the cloud [20] [23]. Using this IoT hardware design actuators. Actuators and node units have high power
as a foundation, we create a low-cost smart device for requirements.
missing person detectors.
The DC pu mp is activated if the humidity level is low. As
V. Su ma et al. [21] presented an overview of Predictive indicated in Fig. 2, the sensor is placed outside the sensor
Analytics, Internet of Things (IoT) devices with cloud platform, with the sensor probe in direct contact with the
management; mu lticultural security unit farmers' previous environment. In the deep location of the agricultural
experience is taken into account in the agriculture sector. It platform. This section details the design and implementation
also demonstrates the difficult ies and issues that might be of controlled environment agriculture (CEA). The CEA
expected when incorporating contemporary technologies into system provides a program for automatic control and
traditional farming practices. better based on statistics and monitoring. This proposed work aims to provide ease of use.
quantitative methodologies revolutionary changes to the Efficient and reliable control system. It helps reduce the
current agriculture system. Abul Bashar et al. [22] proposed amount of water and energy required. The system will
the solution provided in this document emp loys an Android increase farmers' yields at moderate and affordable costs.
application to automate agricultural machines via IoT. The
machine's automation ensures that the work is comp leted
automatically and without the need for human intervention.
This procedure is repeated until the crops are harvested.
Problem Statement:
System performance can be affected by packet loss in
communication between nodes and actuators. Actuators and
node units have high power requirements. Different crops
require different amounts of water depending on other
factors such as soil type, temperature and other factors.
While making irrigation selections, the system only measures
soil moisture measurements.
In general, packet loss reduces the speed or throughput of Fig. 8 and 9 show temperature, humidity, and soil
a particular connection. This can often result in a loss or mo isture data for the selected dates. Similar values can be
degradation in quality for latency-sensitive protocols or found for any date during the plant's growing season.
applications, such as streaming video or voice-over IP, when
accuracy is less critical. Packet loss will still have modest
consequences since it may increase the CPU burden to
process the extra network overhead.
Computer and Communication Engineering (IJARCCE), Vol.5, Issue [23] K. Suganyadevi, “Internet of Things (IoT) Based Smart Kitchen
6, June 2016. Pantry”, Irish Interdisciplinary Journal of Science &
[3] M.K. Gayatri, J. Jayasakthi, Dr. G.S. Anandhamala,“Providing Smart Research,vol.4, issue. 3,2020.
Agriculture Solutions to Farmers for Better Yielding Using IOT”, [24] https://github.com/Akilageeth/multiplesensors_thingspeak
IEEE International Conference on Technological Innovations in ICT
for Agriculture and Rural Development
[4] A.Anusha , A.Guptha , G.Sivanageswar Rao ,Ravi Kumar Tenali,”A
Model for Smart Agriculture using IOT”, International Journal of
Innovative T echnology and Exploring Engineering ISSN:2278 -
3075,April-2019
[5] Prathibha S R ,Anupama Hongal , Jhothi M ,” IOT Based Monitoring
System in Smart Agriculture” ,International Conference on Recent
Advances in Electronics and Communication Technology,2017
[6] Dr.Sanjay N Patil, Madhuri B Jadhav,”Smart Agriculture Monitoring
System using IOT” ,International Journal of Advances Research in
Computer and Communication Engineering,April-4,2019
[7] Prof. K A Patil,N R Kale,A Model for Smart Agriculture using IOT”
,International Conference on Global Trends n signal processing
,Information Computing and Communication,2016
[8] P Lashitha Vishnu Priya,N Sai Harshith,Dr.N V K Ramesh ,”Smart
Agriculture Monitoring System using IOT”, International Journal of
Engineering and Technology,2018
[9] Rajalakshmi.P and S. Devi Mahalakshmi, “IOT Based Crop Field
Monitoring and Irrigation Automation”, 10th International conference
on Intelligent systems and control (ISCO), 2016
[10] K.Lokesh Krishna, Wasswa Fahad Malende “Internet of Things
Application for implementation of Smart Agriculture System”
International conference on I-SMAC (IoT in Social, Mobile,
Analytics and Cloud) I-SMAC 2017.
[11] G. Merlin Suba, Y M Jagadeesh, S Karthik and E Raj Sampath,
“ Smart Irrigation System Through Wireless Sensor Networks”,
ARPN Journal of Engineering and Applied Sciences, vol. 10, pp.
1,no. 17, september 2015.
[12] Vangala, A.; Das, A.K.; Kumar, N.; Alazab, M. Smart Secure Sensing
for IoT-Based Agriculture: Blockchain Perspective. IEEE Sens. J.
2020, 21, 17591–17607
[13] Ayaz, M.; Ammad-Uddin, M.; Sharif, Z.; Mansour, A.; Aggoune, E.-
H.M. Internet -of-Things (IoT )-Based Smart Agriculture: Toward
Making the Fields T alk. IEEE Access 2019, 7, 129551–129583
[14] S. Darshna, T.Sangavi, Sheena Mohan, A.Soundharya,
SukanyaDesikan, “Smart Irrigation System”, IOSR Journal of
Electronics and Communication Engineering (IOSR-JECE), Volume
10, Issue 3, Ver. II (May - Jun.2015), pp 32-36.
[15] Udutalapally, V.; Mohanty, S.P.; Pallagani, V.; Khandelwal, V.
sCrop: A Novel Device for Sustainable Automatic Disease Prediction,
Crop Selection, and Irrigation in Internet -of-Agro-Things for Smart
Agriculture. IEEE Sens. J. 2020, 21, 17525–17538.
[16] Soeparno, H.; Perbangsa, A.S.; Pardamean, B. Best Practices of
Agricultural Information System in the Context of Knowledge and
Innovation. In Proceedings of the 2018 International Conference on
Information Management and Technology (ICIMT ech), Jakarta,
Indonesia, 3–5 September 2018; pp. 489–494.
[17] Subahi, A.F.; Bouazza, K.E. An Intelligent IoT-Based System Design
for Controlling and Monitoring Greenhouse T emperature. IEEE
Access 2020, 8, 125488–125500.
[18] S. Murugesan, S. Ramalingam, P. Kanimozhi, Theoretical Modelling
And Fabrication Of Smart Waste Management System For Clean
Environment Using WSN And Iot, Materials Today: Proceedings,
Volume 45, Part 2, 2021, Pages 1908-1913,
[19] S. Ramalingam, K. Baskaran and D. Kalaiarasan, "IoT Enabled Smart
Industrial Pollution Monitoring and Control System Using Raspberry
Pi with BLYNK Server," 2019 International Conference on
Communication and Electronics Systems (ICCES), 2019, pp. 2030 -
2034,
[20] Venkataramanan, C., Ramalingam, S., and Manikandan, A. ‘LWBA:
Lévy-walk Bat Algorithm Based Data Prediction for Precision
Agriculture in Wireless Sensor Networks’. 1 Jan. 2021 : 2891 – 2904.
[21] Suma, V. "Internet -of-Things (IoT) based Smart Agriculture in India-
An Overview." Journal of ISMAC 3, no. 01 (2021): 1-15.
[22] Bashar, Abul. "Agricultural machine automation using iot through
android." Journal of Electrical Engineering and Automation 1, no. 2
(2019): 83-92.
C P.Prashanth E.Petersam
UG Student, Department of ECE UG Student, Department of ECE
Sri Eshwar College of Engineering Sri Eshwar College of Engineering
Coimbatore, India Coimbatore, India
prashanthcp03@gmail.com sam2676882@gmail.com
Abstract— Continuously monitoring and tracking of LPG automatically send SMS alerts to users when a minimum
consumption can be a daunting task at home and industries. threshold is reached [9]. This proposed project will trigger
However, some people require a regular monitoring so that the sound alarm. Throughout its life cycle, Arduino has
they can refill it when it is necessary, in order to maintain the powered thousands of projects, from everyday bodies to
continuous supply of LPG. Now the world is evolving with complex scientific mechanisms. A global community of
technology, so it is necessary to use technology, if possible, in academics, performers, programmers, and professionals has
every case. As we now founded out the problems faced by LPG come together around this opensource project. Their
gas users so we come up with the solution that can meet some
knowledge of the above issues has contributed significantly
requirements of them, If the LPG gas is consumed to certain
to helping society in this field. The amount of gas can be
level, we made our system to notify the user by SMS and by
alarm. This approach uses sensor that will detect the gas level
determined by weighing the gas cylinder [8].
and transmit the information to the microcontroller. On the
basis of that information, the Arduino makes a decision and Load cells: weight sensors are used to measure weight.
then displays the message on the display and the message will Continuous cylinder weight measurement. The system uses a
be sent to the user via GSM and the buzzer will be activated. weight sensor to measure the cylinder's weight, and the LCD
On this approach Arduino is used as microcontroller, provide display shows the corresponding weight. The system is
a suitable platform for implementing an embedded control
completely controlled by a "powerful" Arduino Uno board.
system and it is possible to modify it to meet our future
The Arduino Uno board continuously monitors all sensors.
requirements easily and quickly. Incorporating these functions
enables remote monitoring and makes life more comfortable. LPG is used all over the world. It is widely used in
As a result, the LPG monitoring is done effectively and households for such things as cooking and heating. We are
effortlessly. thrown into a lot of difficulties when the cylinder runs out of
gas. So, in a busy world, we need to detect a reduction in
Keywords: Arduino UNO, Load cell, Global System for Mobile cylinder weight [6].
module, Inter-Integrated Circuit, Liquid Crystal Display, Buzzer
and HX711 module. II. RELATED WORK
On an industrial level, several LPG detectors have been
developed. In 2008, Liu Zhenya and Wang published the
I. INTRODUCTION article "Smart Home Based on a single chip microcomputer,
LPG cylinders play an important role in our daily lives. a security alarm and remote-control system. This white
Liquefied petroleum gas is an odourless propane and butane paper's goal is to create a burglary, hazardous gas leak, and
gas mixture. Both saturated and unsaturated hydrocarbons fire alarm system for homes. Based on the 89c51
are present. Ethanethiol adds scent to odourless LPG. microcontroller, this system was made. The system can
Liquefied petroleum gas Moderate pressure replaces any automatically alert you to unwanted activity in your
traditional fuel sources used in homes and businesses. It is environment. The power of the house can also be controlled
explosive, nonetheless, and one of the most often utilised from the telephone system [11]. Then, in 2013, a small
fuels [1]. The range is between 1.8% and 9.5% of the air's group of individuals created the suggested home security
gas volume. LPG is applied in that it is used to replace design. The device locates LPG leaks and sounds a buzzer
chlorofluorocarbons, which seriously harm the ozone layer. to notify the LPG leaks. An ARM version 7 microcontroller
processor was used to create the project, and Keil software
According to the law, LPG is divided into three groups: was used to simulate it. It is usually liquefied petroleum gas
Weight of LPG for home, commercial, and industrial use in and consists of liquefied petroleum hydrocarbons and
a bottle. household cylinders for liquefied petroleum gas. commercial alkanes. It is a composition of gas, it is a
14.2 kilogramme of LPG were included in the cylinder. The chemical, like adding an odorant to facilitate leak detection.
commercial and industrial LPG cylinder categories are LPG often used for home heating and cooking [4].
similar. They contain 19kg and 35kg of LPG, respectively. A new kitchen security system was created a year later.
In the cylinder above, LPG was only filled to 85%. The The MQ-5 gas sensor is used by the system to continuously
country is home to 40% of the population and has check for gas leaks in the kitchen. The system's built-in
approximately 300 million LPG users. The purpose of the GSM module will send the user an SMS as soon as an LPG
proposed system is to continuously weigh gas cylinders and
leak is discovered.[2] To help individuals take the apart from sound alarm and SMS alert will also be send to
appropriate action as soon as gas is detected, the system also the user. The system has the following units as shown in the
includes LEDs, a buzzer, and an LCD display. Mr. below block diagram. It comprises of Arduino UNO, load
Shivalingesh and B.M. Puja first proposed the concept of cell, GSM module, HX711 Dual-Channel 24-bit A/D
weighing gas. The device automatically reserves cylinders Conversion Module, buzzer and I2C 16x2 LCD display unit
and identifies gas leakage. The Arduino Uno R3 is the and power supply board [4]. The proposed system is also
microcontroller utilized in this project. The Arduino Uno, an easy to install. Arduino UNO is an open-source electronics
ATmega328-based platform, has three versions, the most platform based on the easy-to-use software and Hardware.
recent being the R3.A 32Kbyte microcontroller controller is
Arduino UNO can able to read input - weight on a sensor
the ATmega328 (0.5K bytes is occupied by the
and turn that into an output – activating the buzzer and to
bootloader).[5] In addition, there are I/O pins, an AVR
microcontroller chip, a power connector, USB connectivity, send message through the GSM module. Initially gas
an in-system programming (ICSP) header, and a reset cylinder is placed on the system that we have created, on
button. SRAM and EEPROM that can be read and written as turning on the power supply, the Arduino continuously
an EEPROM library are also present. That is, connect it to monitor the gas for every three seconds with help load cell.
your computer via a USB cable. The Arduino has a clock At first the calibration factor of the load cell is calculated.
speed of 16 MHz, so it performs certain tasks faster than Then the weight is calculated with the help of data from
other processors and controllers.[3] HX711 module and calibration factor calculated earlier.
The AVR chip will continuously run at 16 MHz no
matter what your code does. Therefore, the current
The advantages of the proposed system are
consumption is essentially unrelated to the code being run.
(2016) (Dr. Bayan M. Sabbar, AI Ali) Activate an SMS- • Real-time monitoring of LPG consumed
based alarm system and send 3 SMS (3 alert messages) to 2 • Buzzer alert
distinct cellphone numbers (entered inside the Arduino • SMS alert
program). Using the (162) LCD module, show the status on
the LCD. Liquefied petroleum gas (LPG) is highly
flammable chemistry. A mixture of hydrocarbon gases
(LPG). It is used as a combustion fuel in households and
industry. LPG is used as domestic fuel, industrial fuel and
for heating soon. Heaters and gas sensitive resistors are part
of it. To avoid internal components of the sensor used errors
that lead to false alarm indications. Alarm triggered when a
certain gas concentration is reached over steam. This device
is for display only early warning of problems to ensure
public safety. Liquid gas and gas sensors are used in the
field of safety, health and material.
This embedded system is used to detect dangerous gases
and send warnings to users SMS. (A. Shiyana, R. Deepa,
October 2017).[12] The microcontroller used for the project
is Arduino Uno R3. Arduino Uno is a microcontroller Board
based on ATmega328. ATMega328 A single 32K byte
microchip controller (uses 0.5 Kbytes occupied by the boot
process) loader). Also, SRAM and Read/write EEPROM
Libraries, I/O Pins, AVR Microcontrollers Chip, power
jack, USB connection, ICSP (In Circuit System
Programming Header), and reset button. Simply connect to
your computer via USB cable. The Arduino clock speed is
16MHz. So, it does certain tasks faster than others processor
or controller. AVR chip is continuous clocked at 16MHz Fig 1. Block Diagram
regardless of code performance, it never stops. So, the
current consumption is essentially code independent it will A. Hardware Requirements
run. (Dr. Bayan M. Sabha, AI.
However, June 2016). Microcontroller based LPG gas • Arduino Uno R3
leak detector was used in this system using the GSM • Sim 900A GSM Module
module Sensors, GSM modules, microcontrollers. • Load Cell
Concentration rises, gas sensor detects gas leak, then send to • HX711 Load Cell Amplifier
the microcontroller. Then connect the GSM module to the • Power Supply Board
microcontroller giving commands Stop the main supply. • Buzzer
System is very reliable Tamper-proof and secure. In the long
• I2C 16x12 LCD display unit
run efficient maintenance cost. Very accurate. (A.sood,
B.Sonkar, A.Ranjan, Herr A.Faisal, Juni 2015).[16]
B. Software Requirements
III. PROPOSED METHOD
In our paper we propose a system which is able to • Embedded C
monitor gas in real time and help the customer to lessen the • Arduino IDE
burden of doing that job [1]. On the detection of low LPG,
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 262
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
G. Software Explanation
The developed system consists of three main modules:
The below flow chart will explain the step-to-step
functionality of this proposed system [3]. At first the load
C. Control Section: cell is calibrated and calibration factor is noted. The
Control section consist of a sensor. It will control program at first initializes the system and check the weight
all the functionality of the system [13]. A load cell is an and display the weight. If the cylinder is not placed, it
electronic sensor that is used for measuring the weight and displays “Kindly place the cylinder” message. Once the
force. The load cell is also known as transducer which cylinder is detected and if the weight of the cylinder is less
converts the force into measurable electrical output quantity. than the minimum value then the Arduino will turn on the
The output produced by load cell will be in the range of buzzer for 5 seconds and then sends SMS through GSM
millivolts, so we require an amplifier to convert the low module.
output signal into a level that can be later transform into a
digital signal to process it. Therefore, we use HX711
amplifier sensor. That includes a HX711 chip with the
analog-to-digital conversion capability in 24-bit accuracy.
The HX711 amplifies the low-voltage output from the load
cell and sends it to Arduino, so that the Arduino can
calculate the weight from this data. On detection of low
LPG, microcontroller gets commands from the weight
sensor, and it will give the alert message by turning on the
buzzer and sending SMS to the user.
D. Weighing Section :
This section is mainly designed to measure weight
of the gas cylinder. The 40Kg is the maximum capacity of
load cell used in this project [13-16]. Between the upper
base and lower base of the proposed work the Load cell is
placed.
E. Display Section:
Display is used to provide the real time information
to the user [13-16]. I2C 16x2 LCD is used in this proposed
work. It is placed in the front side of the stand. It will show
all the data like real time weight and “Kindly place the
cylinder” message if the gas cylinder not placed.
F. Hardware Environment
In this proposed system the Arduino and GSM
module is powered through power supply unit. The
Arduino powers the I2C 16x2 LCD display and the HX711
Conversion Module. The HX711 module’s DT and SCK
pins are connected to the pin6 and 5 of the Arduino
respectively [9]. Buzzer is connected to pin 4 in the
Arduino board. The Tx pin of GSM module is connected to
Fig 2. The Main Loop Flowchart
Rx pin of the Arduino and the Rx pin of the GSM module
is connected to Tx pin of the Arduino. I2C 16x2 LCD H. Working Principle:
display’s SDA and SCL pin is connected to analog pin 4 Initially the proposed system checks whether the
and 5. The connection between load cell and HX711 unit cylinder is placed or not by measuring the weight. The
done as below. weight is measured for once every 3 seconds. When the
Cylinder is placed on the stand the weight of the cylinder
will be measured with the help of load cell and the output
of the load cell will be amplified with the help of HX711
module and it is given to Arduino. If the cylinder weight is
lesser than the minimum value, then the Arduino turn on
buzzer for 5 seconds and sends the “low weight” message
SMS through the GSM module to the user’s cell phone.
And this process is repeated till the power supply is turned
on. The total working of the proposed system requires only
12 volts for its operation. Since the overall working
principle is very simple the entire cost for building this
system is also very low. The entire working principle is
very user friendly. Due to this working principle, we can
able to monitoring the gas in real time and help the
Table I: Connection between HX711 module and load cell customer’s burden to be reduced.
Fig.3 Arduino
are connected to E+, A-, E-, and A+. The amplified output
is taken from the series data from HX711 and delivered to
the microcontroller.
V. RESULT ANALYSIS
In this application the monitoring is done continuously
and the alerting is done when it is necessary. The
monitoring is done by the Arduino and the user can also
monitor the real time gas level through the display. The
alerting is done by the buzzer and the GSM module for this Fig.9 SMS Output
application. The load sensor is used along with Arduino to
The above figure shows SMS notification on user mobile
continuously measure the weight in order to have an
phone. The picture above is the picture taken by the user's
effortless monitoring and controlling of system for this
mobile phone when the GSM module integrated in the
application. A prototype of the system has been built and all
system sends a short message to the registered mobile phone
modules of the system are working as expected. If the
when the weight is low. Any mobile phone that supports the
cylinder is not placed in the system, it displays the “Kindly
SMS service can be used for this implementation.
place the cylinder” message. The proposed system also
continuously measures the gas level in the cylinder, if the VI. CONCLUSION
weight of the cylinder falls under the minimum level, it
sends an alert text message to the user and turns on the Security as a core and integral part of human
buzzer, which turns off after 5 seconds. Some experiments existence is crucial in promoting a healthy and sustainable
are carried out to examine the capability and efficiency of environment. Achieve a peaceful and harmonious existence
the proposed system. Below is an example of such an between the individual and his society while ensuring
experiment. seamless interactions in specific habitats, especially when it
concerns life and property. Problems encountered by the
conventional type of old-fashioned security methods (such
as using dogs) have been modified or improved by alarm
systems. As we shorten the problems faced by LPG
consumers, we have come up with solutions to meet the few
requirements they have on them, as we made our system to
notify the user by SMS and by an alarm. The main goal of
our project is to measure the gas present in the cylinder,
when the weight of the cylinder is below a fixed load, this
can be done using a weight sensor. The homeowner
(consumer) receives a message about the status of the LPG
in the cylinder. After the execution of this project, it can be
concluded that the detection of LPG gas is incredible in the
Fig.7 Gas Level Monitoring System project system. The simple procedures and Arduino UNO
Microcontroller are used to build the system. Therefore, the
system we have developed will help LPG consumers to a
certain extent to live a comfortable life.
REFERENCES
[1] Ms.A.Preethi Vinnarasi M.E 1 , Elumalai R M2 , Jerry
Jenish3 Karthik Raj.T , “LPG Gas Monitoring System Using
Arduino”, April 2021| IJIRT | Volume 7 Issue 11.
Abstract - The Internet of Things is a developing technology that are vitally important to the network and the devices
that converts physical objects into virtual objects connected to come up. As the internet is used, the IoT network design
the internet using wired and wireless network architecture. Use inherits a centralised and hierarchical architecture [4].
of cross-layer techniques in the internet of things is primarily However, the proliferation of IoT devices is also bringing up
driven by the high heterogeneity of hardware and software
capabilities. Although traditional layered architecture has been
a number of new difficulties. First, there are not enough
effective for a while, cross-layer protocols have the potential to universal standards for IoT platforms. Second, the
greatly improve a number of wireless network characteristics, expansion of IoT devices may outpace the capacity of the
including bandwidth and energy usage. Also, one of the main current network infrastructures. Last but not least,
concerns with the internet of things is security, and machine consumers of IoT continue to have serious concerns about
learning (ML) techniques are thought to be the most cutting- security and privacy [6].
edge and viable approach. This has led to a plethora of new
research directions for tackling IoT's growing security issues.
In the proposed study, a number of cross-layer approaches
A. The Motivation of this Paper
based on machine learning techniques that have been offered
in the past to address issues and challenges brought on by the The constant progress and ever-increasing demands of
variety of IoT are in-depth examined. Additionally, the main the present developments frequently push scientists and
issues are mentioned and analyzed, including those related to researchers to create new standards. We'll see more big data,
scalability, interoperability, security, privacy, mobility, and cloud computing, WSN, and IoT in the future. Therefore, in
energy utilization. light of the current situation of ongoing advancements in the
field, research into the actual capabilities and functions of
Keywords - Internet of things, Cross layer design, Security,
contemporary IoT concepts was essential. This study
Privacy, Energy efficiency, Interoperability, Machine Learning.
emphasizes the core IoT principle and the need for cross-
I. INTRODUCTION layer IoT architecture.
IoT is seen as a network of real-time, embedded The structure of this paper as follows.
systems in nature as well as a dispersed system that is The Internet of Things was briefly discussed in Section 2
connected to the internet. There are wireless and wired along with its evolution, architecture, numerous
means of communication. The network is made up of communication protocols, and IoT applications. IoT
tangible, inanimate objects from the real world that have Security and Machine Learning were extensively explored
been given network connectivity, electronics, and software in Section 3. Cross-layer architecture for Internet of Things
implants. These devices can collect, infrequently process, challenges based on machine learning approaches was
and exchange data because of its constrained computation, explored in Sections 4 and 5, along with the conclusion and
storage, and networking capabilities [1]. By enabling one future research.
layer to access data from a different layer, the cross-layer
approach removes strong boundaries between the levels to II. IOT AN OVERVIEW
permit an innovative integration technique is used to
construct a cross-layer authentication protocol under the In the context of modern cellular telephony, the
distributed authentication architecture [2]. IoT devices pose Internet of Things is a revolutionary technology that is
serious security concerns for the overall network rapidly growing. The Internet of Things (IoT) can be
environment, including information leakage and a lack of thought of as a network of interconnected things, but smart
security protection. In the meantime, the IoT apps' lack of sensors enable wireless connection. Without human
security management makes it more likely that devices will assistance, IoT can communicate. The term Internet of
be attacked. Because privacy leaking is such a major issue, Things (IoT) refers to a group of items that may interact and
several security researchers have inferred their own communicate with one another thanks to RFID chips and
approaches and viewpoints [3]. other comparable technologies [8]. It is also feasible to link
a number of real things. Security and privacy of physical
When wireless sensor technology and the Internet of devices, which serve as the IoT's cornerstones, are crucial
Things are combined under a cross-layered design, issues for both the technology and its applications. Six unique
properties of physical IoT devices make security and This layer securely transmits data to the perception
privacy challenges more difficult [9]. These traits include layer from the middleware layer. The transmission layer is
resource limitations, high heterogeneity, multi-identity the name of the layer. It aids in managing network service
cohabitation, spatial-temporal irregularity, dynamics, and centres, information services, and network administration.
social awareness. The most popular network, IoT, draws in Application Layer
all users and enables intelligent user communication. In both The top tier of the three-layer architecture is really
human-to-human and human-to-machine engagements, it responsible for serving customers [5]. From the middleware
transfers data without the assistance of a human [10]. layer to the perception layer, this layer safely transports
data. It is in charge of offering services to users.
A. IoT's evolution
At the Massachusetts Institute of Technology (MIT)
Auto-ID Laboratories in the early 1990s, Kevin Ashton
coined the phrase "Internet of Things". The tracking and
detection systems that support RFID are where the phrase
"Internet of Things" initially appeared. IoT integrates RFID
and sensors, allowing for the growth of industrial services as
well as the expansion of service deployment in new
applications. A greater variety of "things" can now be
connected to the Internet of Things because to
advancements in sensor networks, low-energy wireless
networking, and smart sensors since 2010. Sensing and the
internet are combined in the Internet of Things (IoT)
movement, and all networked objects must be flexible,
intelligent, and sufficiently self-sufficient to offer the
required services.
B. IoT Architecture
Over the past few years, a lot of Internet of Things
(IoT) projects have emerged, and numerous versions of
architectures have been developed based on the individual
requirements and project scope. Limited interoperability
across the systems was caused by a variety of architectures
that used a variety of components and protocols as a result
of the substantial heterogeneity in the application areas and
approaches to an architectural requirement that varied
between projects [4].
• Three-Layered Architecture
The fundamental architecture, which is also the most Fig. 1. IoT Architecture
popular IoT model, is made up of the application layer, the
network layer, and the perception layer [11]. The Internet of • Five-Layer Structure
Things' architecture assists to define the idea. The next
subsections discuss the three and five layered architecture Stunning Layer
seen in Figure 1. In the three-layered design, the third layer functions
The following Figure.1 illustrates the layered identically to the first two levels [12]. The data from the
architecture of IoT [4]. sensors is implemented using the perception layer.
Sensational Layer System Layer
The Physical Layer and Sensing Layer are other names The Transmission layer is another name for the
for the Perception Layer. With the help of sensors and Network layer. The Middleware layer transmits data to the
actuators, it gathers data from the physical environment Perception layer through this layer [12].
around it [11]. It converts analogue impulses into digital The Middle Layer
signals and records data that is universally useful. The The processing layer in IoT architecture is a common
subsequent layers receive these digital data for further name for the intermediate layer. Analysis, archiving, and
processing. ZigBee, RFID, and other technologies are used processing is done on the large amounts of data that are
to connect IoT devices to the internet [4]. transmitted from the Network Layer.
Network Layer Application Layer
The layer's primary duty is to communicate and route This layer manages a large application based on the
data to various IoT devices over the Internet that has been data processing at the Middleware layer [12].
collected from various IoT sensors [5]. Specific Business Layer
communication protocols, like HTTP/HTTPS, are required The system as a whole is managed by the business
for this tier. layer. This tier's primary duty is business, financial, and
application model governance and regulation [12]. analyzing from transmission lines, distribution substations,
C. Wireless Communication Technologies for IoT and applications.
Many wireless communication methods have been
developed in the recent past for use in Internet of Things
applications. There are benefits and drawbacks to every kind
of communication [17].
• RFID
Radio Frequency Identification, or RFID, is a key
component of the Internet of Things (IoT), which uses it to
effectively identify a variety of things in our surroundings.
RFID technology was used in the development of the
Internet of Things (IoT) concept for automatic
identification, authentication, and tracking.
• Near Filed Communication (NFC)
NFC, a sort of 13.23 MHz short-range wireless
technology, typically requires a distance of 4 cm. By
making it easier to complete transactions, trade digital
content, and link electronic gadgets with a touch, this
technology improves people's quality of life. It becomes
possible to initialise wireless networks quickly. The setup
for RFID and near-field technology is very similar.
• Bluetooth
The Special Interest Group (SIG) for Bluetooth is Fig.2. IoT Applications
in charge of developing Bluetooth. It is inexpensive and
typically used for data transmission across short distances • Smart City
between devices. To prevent cohabitation, it empale "Smart cities" are a complex IoT paradigm that
frequency hopping spread spectrum (FHSS). tries to handle public affairs by incorporating ICT
• Z-wave technologies. It can employ public resources in a more
Z wave is widely used in business and smart home effective manner, improving the standard of services offered
applications. It consists of two types: slave and device to citizens and significantly lowering operational expenses
control. Slave node attributes are low-cost devices that are for public administration [5].
unable to send messages on their own. • Smart Agriculture
• ZigBee Smart farming is another name for IoT.
IEEE 802.15.4 is the foundation of the well-known Modernizing farming practices, harvesting, weather
wireless communication technology ZigBee. ZigBee forecasting, water conservation, wildlife control, and other
supports communication ranges of 10 to 100 meters for IoT processes require farmers to use technology.
devices. It is a type of technology that uses less energy and
is very effective. III. IOT SECURITY AND MACHINE LEARNING
• LoRaWAN
The LoRaTM Alliance just created LoRaWAN. In Several machine learning methods will be
particular, it outlines the LPWAN standard for IoT discussed in this part, along with examples of how they
applications. processing data at speeds ranging from 0.3 might be used in Internet of Things applications. Machine
kbps to 50 kbps. learning categories has shown in Figure. 3 [1].
D. IOT Applications
These IoT applications can improve our lives in a wide A. Algorithms for Machine Learning
range of situations and domains.The different IoT Reinforcement learning, unsupervised learning,
applications in the aforementioned fields are depicted in semi-supervised learning, and supervised learning are the
Figure 2. The following application areas can be used to four subcategories of machine learning algorithms.
categorize IoT applications. • Supervised learning
When specific goals are defined with the intention
In Figure.2 various applications of IoT are showcased [5], of receiving a specific set of inputs, supervised learning is
utilized. In this sort of learning, after the data has been first
• Healthcare labeled, training is conducted using labeled data that has the
Utilizing wearable sensors to measure things like necessary inputs and outputs.
body temperature, calories, and heart rate, IoT is utilized to • Unsupervised learning
provide medical services. The medical sensors could be The environment just provides inputs; there are no
body-implanted, wearable, or portable. desired goals. Without requiring labeled data, it can divide
• Smart Grid the data into several groups and take into account
A "Smart Grid" of electrical infrastructure was similarities between unlabeled data.
developed with the primary objective of gathering and
mention a few, viruses, trojans, adware, spyware, bots, In this kind of attack, the hole that is being attacked
ransomware, and spyware are examples of prevalent serves as a effective node, attracting everything to it and
malware types. being chosen as a communication or data-routing
forwarding node by other nearby nodes and devices.
C. IoT Security Challenges
Although the number of IoT-connected devices is • Security challenges in the Application Layer
growing daily and the IoT layers are experiencing a number The application layer establishes the parameters for
of security concerns, some of which will be covered in the all IoT-related apps and environments. The primary threats
sections that follow. this layer confronts include attacks based on software. These
Application Layer assaults include a number of others.
• Security challenges in the Physical Layer Phishing attack
Hardware attacks are the most common hazards. In such assaults, the attacker forges the data of
The majority of attacks are directed at sensors like RFID legitimate users in order to get their usernames, email
[13] and wireless sensor networks like ZigBee because they addresses, and passwords. A phony email or website is
can be physically targeted if they are left stationary for an created by the attacker, and when the real person logs in
extended period of time. IoT devices that collect data through it, their data is stolen [16].
include security systems, smart TVs, smart appliances, and Cross-site scripting
wearable health metres. Some hackers might access or share This type of attack, known as an injection, allows
these data for illegal purposes. The following are typical an attacker to put a client-side script, such as JavaScript,
physical layer security risks: into a reliable website that other users may access. By doing
Eavesdropping this, a hacker can use the original data to his detriment and
An intrusion in which someone attempts to steal completely alter the application's contents to suit his
information that devices broadcast is known as an requirements.
eavesdropping attack often referred to as a sniffing or Malicious virus/worm
snooping attack. It accesses the sent and received data by The self-propagating attack known as a virus or
taking advantage of insecure transmission [14]. worm that tampers with user data is a major challenge for
Replay Attack the Internet of Things devices. Malicious viruses that forge
When a hacker listens in on a communication personal information include worms, horses, and Trojans.
between a sender and a recipient and takes critical Firewalls and virus detection methods must be utilized to
information from the sender, it is a specific kind of attack. provide to these viruses [16].
Such an assault frequently takes place during the
authentication process in order to invalidate legitimate IV. CROSS-LAYER DESIGN (CLD)
certificates. [15].
Timing Attack Cross-layer design is thought to be the most
It is frequently applied to technology with limited effective and imminently promising design that requires a
computational power. By estimating the duration, it takes to quicker data transfer rate to attain the highest probable
execute the cryptographic methods, the hacker could throughput. Cross-layer design has been shown in Figure. 4
discover the encryption key [7]. [4] to considerably boost network performance. Cross-layer
design aims to increase the layered design's security as well
• Security challenges in the Network Layer as the framework's flexibility and, above all else, the quality
The networking layer's ultimate objective is to of service.
provide data to the channel that has been gathered from
physical objects via sensors. It serves as a link between the Without going against the tiered architecture, CLD allows
Application Layer and Physical Layer. Accessibility, each layer to share data with any other layer in the network
confidentiality, and privacy of the data are thus the main model. Additionally, depending on the data obtained or
security issues with this layer. Among the security concerns received by the other levels, it can allow each layer to
with the network layer are: decide how to perform its role and exchange its data.
Denial of service (DoS) attack
Customers may notice service delays as a result of A. Cross-Layer Design in IoT
this specific type of attack, in which the attacker bombards The Internet of Things (IoT) is an ICT concept that
an IoT device with service requests until it is unable to is constantly expanding and having more uses. The strongest
handle the volume of data. In order to prevent some or all information masking function is offered by cross-layer
real users from using the targeted devices or network architecture, which makes it more appropriate for IoT. As a
resources, it is typically carried out by flooding them with result, cross-layer communication has numerous advantages
redundant requests [16]. for the IoT sector. The three-level cross-layer technology is
RFID spoofing crucial for enhancing the functionality of IoT platforms. The
The purpose of RFID spoofing attacks is to send Sensing layer, Network layer, and Application layer are the
harmful data into the IoT system after gaining access to it. layers of CLD [13].
RFID spoofing, IP spoofing, and other spoofing attacks are
examples of spoofing in IoT systems. In network layer architectures, a growing trend is
Sinkhole attack the CLD (cross-layer design). Additionally, it frequently
entails deep relationships between several layers. To achieve
good performance, this study maintains CLD as opposed to proliferation of linked devices across a variety of industries,
a single layer. The primary problem that directly affects the including smart home and building automation, smart
performance and lifespan of distributed WSNs is collision energy and retail, healthcare, and transportation [4].
during packet transmission [20]. Thanks to an architectural Network providers can switch between various wireless
idea known as the cross-layer design method, a network can access networks because to interoperability.
operate more effectively, use less energy, survive longer, • Energy Efficiency Issues
and provide Quality of Service (QoS) in real-time The main challenge for IoT technologies was to
communications. develop components and sensors that were energy-efficient
because IoT networks are made up of low-power
B. Cross-Layer Design Issues in IoT components. The performance of Internet of Things devices
There are several key problems with cross-layer is impacted by power consumption. Reduced power usage is
architecture in IoT that are still being studied. IoT said to indicate greater efficiency [5]. IoT devices are
applications must scale to a high number of devices, which thought of as emerging technology and offer several
is challenging to deploy owing to schedule, memory, benefits.
processing, and energy constraints. Regarding delay, energy
use, and dependability, distinct Quality of Service criteria • Mobility
may apply to various things. In ad-hoc networks, node moves are frequent;
therefore, the node movement-related events, such as
channel switching and route changes, must be identified and
resolved to ensure that communication is not disrupted.
[2] Yonggu Lee 1 , Jiseok Yoon 2 , (Graduate Student Member, IEEE), [12] J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A
Jinho Choi 3 , (Senior Member, IEEE), And Euiseok Hwang 4 , Survey on Internet of Things: Architecture, Enabling Technologies,
(Member, IEEE) “A Novel Cross-Layer Authentication Protocol for Security and Privacy, and Applications,” IEEE Internet Things J., vol.
the Internet of Things” ,IEEE October 2020 ,Volume 8. 4, no. 5, pp. 1125–1142, 2017.
[3] Dan Yu , Haoguang Xin, Yongle Chen , (Member, Ieee), Yao Ma, [13] H. Suo, J. Wan, et al., “Security in the internet of things: a review,” In
And Junjie Chen , “Cross-Layer Protocol Fingerprint for Large-Scale 2012 international conference on computer science and electronics
Fine-Grain Devices Identification “ IEEE October 7,2020 Volume 8 . engineering IEEE, pp. 648–651, IEEE, 2012
[4] Sowmya Chintalapudi “Cross-Layer Design in Internet of Things [14] B. Ibrahim Hameed “An overview of internet of things (IoT):
(IOT)-Issues and Possible Solutions “ April 2021, Research Gate . Definitions, architecture, security, applications and future directions,”
[5] Sultana Parween, Syed Zeeshan Hussain, Md Asdaque Hussain “A International Journal of Engineering in Computer Science, vol. 1, no.
Survey on Issues and Possible Solutions of Cross Layer Design in 2, pp. 16–26, 2019.
IOT”, IJCNA, 28 August 2021,Volume 8,Issuse 4. [15] S. Prabhakar, “Network security in digitalization: Attacks and
[6] An Wang ,Aziz Mohaisen ,Songqing Chen “XLF: A Cross-layer defence,” Int. J. Res. Comput. Appl. Robot, vol.5 no. 5, pp. 46–52.
Framework to Secure the Internet of Things (IoT)” July 2021 [16] I. Andrea, C. Chrysostomou, G. Hadjichristofi, “Internet of Things:
[7] Mohamed Litoussia,∗ , Nabil Kannoufb, Khalid El Makkaouic,a, Security vulnerabilities and challenges,” In 2015 IEEE Symposium
Abdellah Ezzatia , Mohamed Fartitchouc “IoT security: challenges on Computers and Communication (ISCC), IEEE, pp. 180–187, 2015.
and countermeasures” EICN 2020 ,Pg No: 503–508. [17] J. W. Branch, C. Giannella, B. Szymanski, R. Wolff, and H.
[8] B. TORGUL, L. Sagbanşua, and F. B. Balo, “Internet of Things: A Kargupta, “In-network outlier detection in wireless sensor networks,”
Survey” Int. J. Appl. Math. Electron. Comput., no. March, pp. 104– Knowledgeand Information Systems, vol. 34, pp. 23–54, Jan 2013.
104, 2016. [18] M. A. Alsheikh, S. Lin, D. Niyato, and H. Tan, “Machine
[9] H. Ning, H. Liu, L.T. Yang, Cyberentity security in the internet of learning in wireless sensor networks: Algorithms, strategies, and
things, Computer 46 (4) (2013) 46–53 applications,” IEEE Communications Surveys Tutorials, vol. 16, pp.
1996–2018, Fourthquarter 2014.
[10] Shakya, Subarna. "A Perspective Review of Security Issues in IoT
with Cloud Environment." Journal of IoT in Social, Mobile, [19] Mashal, Ibrahim, Osama Alsaryrah, Tein-Yaw Chung, Cheng-Zen
Analytics, and Cloud 4, no. 2 (2022): 84-93. Yang, Wen-Hsing Kuo, and Dharma P. Agrawal. "Choices for
interaction with things on Internet and underlying issues." Ad Hoc
[11] O. Said and M. Masud, “Towards internet of things: survey and future Networks 28 (2015): 68-90.
vision,” International Journal of Computer Networks, vol. 5, no. 1,
pp. 1–17, 2013. [20] Faleela Farzana, M., Valarmathi, A.,”Secure architecture to
circumvent collision using RSSI measurement in WSN: a cross layer
design approach” 2020, 79(13-14), pp. 8969–8984.
Mohana
Computer Science & Engineering
(Cyber Security)
RV College of Engineeringg®
Bangalore, India
Abstract— Any development in technology is made with the power and camera availability of current smartphones make
intention of solving the difficulties in that field. One such them a suitable candidate for currency recognition. But We
identified problem is blind people were unable to make out the can't say all these methods are 100% perfect. While testing
type of currency. The proposed model efficiently identifies the
type of currency. The converse of this leads to the printing and
of currency many factors influence the image quality and
scanning of currencies and releasing them into the market, this may lead to wrong interpretation. Hence an android can
which not only affects the economy but also reduces the value be used in this context that can help the identification of
for money. This further causes some conflicts and a great threat currencies. Proposed model can recognize the Indian
to the country. Thus, a need for efficient currency and fake currencies of types (10, 20, 50, 100, 500). Figure 1 shows
currency detection methods is required. Finding fake currencies the currency with identification marks. Another major point
is done by any ways. The proposed work identifies the is the result of the currency detected is connected to a voice
currency’s originality by examining its images. The code
simulated using MATLAB extracts the features of currencies.
system that speaks out the actual result. Here mobile
Machine learning models are used for mapping the extracted speakers are used so that they need not depend on other
feature to its standard value, it is able to identify the fake people. For this, the user had to install this application in
currencies efficiently. his/her mobile phone.
I. INTRODUCTION
In the modern world require a methodology or a solution
that works on automation system which we can be used for
currency recognition. It has different applications in real
world including banknote counting machines, money
exchange machines, electronic banking, currency
monitoring systems, assisting blind persons etc. This type
Fig.1. Currency with identification marks
of automation applications can be used to help physically
challenged people like blind and visually impaired people, II. LITERATURE SURVEY AND RELATED WORK
as they can't see anything it is difficult for them to recognize
any currency. This might be used as an advantage by other Karthik K et al. [1] have proposed a paper “Recognition
people. In order to avoid this type of problems and their of Fake Currency Detection using Machine Learning” the
dependency on others, there is a requirement of a system method described detection of counterfeit currency using a
that can help them to identify currency in any possible deep convolution Neural Network based fake currency
orientation. According to census of WHO, 28.5 crore people detection. Ketaki Bhoyar et al. [2] have proposed an idea of
around the world are visually impaired. Among these, 3.9 currency detection and verification by using image
crore of them were blind and others have low vision. Many processing. M. Laavanya et al. [3] gives an idea of all
thoughts/ideas have come across to avoid this, but in vain. possible methods to identify fake Indian currency for fraud
Many technological systems have been adopted which are detection. Santhiya Irulappasamy et al [4] proposed SSIM
designed by analysing various features of notes currency as a method to find the currency is real/fake. Surendra Singh
paper. Few currencies are sensitive to light and the rest do Chouhan et al [5] has proposed a paper on “A study on
not. While for others we need to have a stable environment Indian fake currency detection”. used image processing,
and a proper background to take capture the image and the edge detection techniques for the fake currency
same had to check for its originality. The computational identification process.
Priyanka Dhapare et al [6] has proposed a paper on “The those methods which are speed and accurate in currency’s
detection of Counterfeit Currency using Image Processing originality are adopted.
Techniques”. This paper has proposed a way to get rid of
such scams by using image processing and SVM feature
extraction. Niketa Gandhi et al [7] has proposed a paper on
“Recognition and verification of Indian currency notes
using digital image processing”. The designed system
implemented using image processing techniques focuses
Fig.3. Implementation Methods
more on extracting denomination values. Pandian, A.
Figure 3 shows the different implementation methodologies
Pasumpon et al [18] proposed convolutional neural
adopted to identify the currency type and its
technique in currency identification for visually impaired
originality[11][12][13].
people. Ranganathan G et al [19] proposed article outlines
A. Traditional Method-The very first proposed method is the
the design of an economical robotic arm which is used to
traditional method where a common man employs the below
visualize the chess board and play with the opponent using mentioned features like Security thread, Serial Image, Latent
visual serving system. Although many systems have been Image, Watermark, Identification mark, Fluorescence,
implemented, but for blind people android based technique optically variable ink, Micro lettering, Intaglio printing etc. in
guides them in a way to identify the currency and make them identifying fake currencies. All of these features can be clearly
not to depend on others[15]. identified by an ordinary person. This method would not
III. DESIGN AND IMPLEMENTATION assure 100% accuracy. Hence, we move on to scientific and
mathematical based technique. In our current model, we had
The following software’s are used in proposed used MATLAB for simulation purpose.
implementation. B.Digital Image Processing Method- The proposed system
MATLAB: It is a programming and numeric computational works on the image of currency notes captured by a digital
platform used to analyze data, develop algorithms, and create camera. The very first step involved is inputting an image
models. done either by scanning or by capturing through a camera with
Teachable-Machine: It is an AI based tool that is quick good resolution. The captures / scanned image is a R-G-B
enough to train or expertise a model to solve real-life (color) image which will be converted to a grayscale image
problems / to manage real-life situation. for ease in feature extraction[8][9][14]. Now only those
Android Studio: It is an IDE where one can create an android regions of the currency which we are interested to analyze
application based on the knowledge of some programming (ROI – Region of Interest) will be cropped and segmented.
language, based on IntelliJ IDEA. From each segmented slice features like intensity are
calculated. If the standard conditions are satisfied, then the
currency note is considered as original otherwise fake[10].
Figure 8 shows the different media-player source files efficiently. Obtained results shows that with an efficiency of
accessing which are downloaded from online voice recorder 95% and above. Also, the currencies are classified into
are used enabling the audio output once the currency is different denominations with more than 90% efficiency.
detected among the selected denominations. Based on the intensities of the sliced section of ROI extracted
image which when compared to the standard intensities of the
IV. SIMULATION RESULTS AND ANALYSIS currency notes, identified the currency’s originality. The
proposed model has low processing time and is cost effective.
Hence it is very reliable for real-time applications.
REFERENCES
[1] Karthik K, et al. “Fake Currency Detection Using Machine Learning”,
Research gate.
[2] Ketaki Bhoyar et al. “Detection of Fake Currency using Image
Processing”, International Journal of Engineering Research &
Technology, Vol. 9 Issue 09, 2020.
[3] M. Laavanya et al. “Real Time Fake Currency Note Detection using
Deep Learning”, International Journal of Engineering and Advanced
Technology (IJEAT), Vol. 9, 2019.
Fig.9. Teachable machine output [4] Santhiya Irulappasamy et al. “Research on Fake Indian Currency Note
Detection using Image Processing”, IJSDR Vol. 6, Issue 3,2021.
Figure 9 shows the Intermediate output on Teachable
[5] Devid Kumar et al. “A Study on Indian Fake Currency detection”,
Machine – Currency Type Detection Here for a real-time IJCRT Vol. 8, Issue 3, 2020.
currency of Rupees 10, the model gives an accuracy of 99%. [6] Priyanka Dhapare et al. “Detection of Counterfeit Currency using
Image Processing Techniques”, International Conference for
Convergence in Technology (I2CT), 2019.
[7] Sahana Murthy et al. “Design and Implementation of Paper Currency
Recognition with Counterfeit Detection”, IEEE Online International
Conference on Green Engineering and Technologies, 2016.
[8] Sandhya R. Shinde et al. “Experiments on Content Based Image
Classification using Color Feature Extraction”, International
Conference on Communication, Information & Computing Technology
(ICCICT), 2015.
[9] Mahendra Kanojia et al. “Recognition and verification of Indian
currency notes using digital image processing”, Journal of Information
Assurance and Security, Vol. 13, 2018.
Fig.10. Currency detection App [10] Megha Thakur et al. “Various fake currency detection techniques”,
International Journal for Technological Research in Engineering, Vol.
Figure 10 shows the currency detection application. 1, Issue 11, 2014.
Application taking 10 rupees as an input image and output [11] Ratna Jyothi et al. “Paper Currency recognition for color images based
results with voice as well as percentage of output 81.57%. on Artificial Neural Network”, International Conference on Electrical,
Electronics, and Optimization Techniques (ICEEOT), 2016.
[12] Suman Pahade et al. “A Study of Different Counterfeit Note Detection
Algorithm”, International Journal of Advanced Research in Electrical,
Electronics and Instrumentation Engineering, Vol. 7, Issue 5, 2018
[13] Vidhika D. et al. “Recognition of the Old and Soiled Indian Paper
Currency using Image Processing”, European Journal of Molecular &
Clinical Medicine, Vol. 7, Issue 2, 2020.
[14] M. R. Nehashree et al. “Simulation and Performance Analysis of
Feature Extraction and Matching Algorithms for Image Processing
Fig.11. Currency’s originality detection Applications,” International Conference on Intelligent Sustainable
Figure 11. shows the currency’s originality detection with Systems (ICISS), 2019, pp. 594-598.
edge detection and feature extraction output floating window. [15] C. V. Krishna et al. “A Review of Artificial Intelligence Methods for
Let the result of the experiment be considered at two different Data Science and Data Analytics: Applications and Research
Challenges,” 2nd International Conference on I-SMAC (IoT in Social,
stages, one yields in detecting currency type and the other in Mobile, Analytics and Cloud), 2018, pp. 591-594.
determining its originality. The image acquisition is a [16] https://developer.android.com/studio
common step for both above mentioned stages, then it has [17] https://online-voice-recorder.com/
two diversions’ i.e., android based currency type detection & [18] Pandian, A. Pasumpon. “Recognition Aid for Visually Challenged to
other the MATLAB based currency originality detection. Fig Make Out Indoor Environment.” Journal of Artificial Intelligence and
9 and 10 corresponds to the currency type detection. Fig 11 Capsule Networks(2020), no. 1: 11-19.
gives the output of currency’s originality detection. If the [19] Ranganathan, G. et al. “An Economical Robotic ArmPlaying Chess
accuracy level is less than 95%, then it indicates that we Using Visual Servoing." Journal of Innovative Image Processing (JIIP)
2, no. 03 (2020): 141-146.
collect and had to feed it to the teachable machine. By doing
this able to get a higher accurate design model.
V. CONCLUSION
Currency and fake currency detection is proposed for Indian
paper currency system. Using this model, blind people can
use this application to identify the currency effectively &
Abstract— Internet of Medical Things (IoMT) is one of the technology have made our lives easy in each and every way
thriving areas of current era which focuses on the digitization of by utilizing the creations made using science and technology.
healthcare services by connecting hospitals, medical resources, One of the best inventions of science and technology till now
healthcare professionals and patients over Internet. Internet of is the Internet. We all know that nowadays the internet is a
Things (IoT) plays important role in IoMT to connect medical
devices with each other for the communication of data between
necessity for daily routine work of human beings for a better
doctors, medical staffs, hospitals and patient for offering efficient and comfortable lifestyle. One of the most rapidly expanding
and reliable medical services. Currently, IoMT offers various areas of IT is IoT which links various sensors, actuators,
services like patient data management, diagnosis of diseases, commuting devices, and other technologies together over the
remote healthcare monitoring, tele-surgery, etc. In this paper, the Internet to make human life easier and relaxed. Nowadays,
IoMT is covered with respect to its applications, use cases and case many IoT based applications and devices are available using
studies. The analysis shows that the IoMT is one of the most which humans can carried out their work without moving
growing fields of Information Technology (IT) which uses the from their place. Various thriving areas of IoT are smart city,
various sensors, equipment, and devices to sense the health-related smart grid, smart agriculture, smart healthcare, smart homes,
data of humans and share the data with hospitals, doctors and
healthcare professionals for remote diagnosis and treatments.
etc.
However, IoMT is being adopted widely to offer tele-surgeries,
real-time health monitoring and diagnosis of various diseases by Smart healthcare is the most growing area of IoT which
integration of various technologies, still many challenges such as connects various devices using communication technologies
Interoperability, privacy and security, Energy Consumption, to offer remote healthcare services. The devices
network latency, etc. need focus of researchers for better and (objects/things) used in medical field like pulse checking
accurate outcome. Here, the major challenges of IoMT are sensor, biometric cybersecurity scanners, temperature sensor,
covered which will be helpful to the researcher and medical blood oxygen saturation sensor, air checking sensor, So2
professional for improvement in healthcare domain.
level checking sensor, ECG/EEG/EMG, blood pressure
Keywords—Internet of Medical Things (IoMT), Smart sensor etc. are connected over internet to offer medical
healthcare, Tele-surgeries, Remote Health Monitoring (RHM), diagnosis, treatment and services can be identified as Internet
Challenges, Future trends of Medical Things. Overall, the medical professionals,
hospitals, and patients are connected over a network along
I. INTRODUCTION with medical devices, machines and software applications to
support various healthcare services known as IoMT. IoMT
The fundamental requirement of human’s health is being allows wireless and remote devices to work securely over the
physically, mentally and socially fit. For humans their health Internet to do analysis of medical data very quickly. In the
is very vital to lead their lives smoothly and peacefully. The survey taken by Deloitte, the IoMT market is estimated to
process of ameliorating health by preventing and diagnosing grow ₹13 trillion from ₹3 trillion by the end of 2022 from
diseases on time called Healthcare [1]. Science and 2017.
In this article, the next section covers basic details regarding the work. Some day-to-day examples of IoT are Alexa,
IoT which uses various sensors in real-time to sense the data Chromecast, Siri, Google Assistant etc.
and process the data for the required outcome and
technologies in IoMT which uses IoT devices to automate the Technologies used in IoT are Edge Computing, Cloud
healthcare services. The next section covers emerging, Computing, Mobile Computing and Machine Learning.
applications and use cases of IoMT, and challenges with
IoMT to facilitate the researchers. B. Internet of Medical Things (IoMT)
gateway layer using the internet the data stored in the using the AI for precision medicine advanced diagnostics
database layer is sent to the hospitals and doctors where they with real time and historical data analyzing [9].
can monitor the condition of the patients. The Application
layer consists of doctors, hospitals, nurses, healthcare experts B. Blockchain in IoMT
etc. where the data from the database is continuously
monitored. The technologies used in application layer are Blockchain technology offers the security of the data by
Artificial Intelligence, Blockchain, Machine Learning etc. using distributed ledger technology by offering transparency,
integrity and immutability of data [11]. Blockchain uses
C. Smart E-healthcare decentralized and peer to peer connection which offer
reliability in terms of data as data is replicated among the
United Nations Sustainable Development Goal No. 3 (SDG – nodes. It is a system of collecting the information in a very
Goal 3) has suggested that continuous and efficient healthcare secure way that makes it impossible to change the data by
monitoring is required for sustainable development as it integrity breach. Healthcare patient information is the most
guarantees the health and welfare of humans across all ages. critical information which requires a higher level of privacy
Smart healthcare connects patients, medical professionals and security. The main purpose of using blockchain
and hospitals on the single platform through which the technology in the IoMT is the security and transparency of
doctors can monitor the daily human activities to diagnose the data among patients and healthcare professionals.
and get updates regarding health of the patient from remote Blockchain provides high level security to the database layer
locations using IoMT [7]. so that no one can mutate the data of the patients.
Smart healthcare was discovered by IBM from the concept of C. Machine Learning in IoMT
“Smart Planet” which was put forward in 2009. Smart Planet
provides a platform to process the data coming from sensors Machine learning is an important part in the prediction
using IoT, cloud computing and devices with high of treatment procedures suitable to specific disease and its
configurations [8]. success rate on the basis of medical history and current
reports of the patient which is known as precision medicine.
The technologies used in smart healthcare are IoT, cloud Supervised learning, Neural networks and Deep Learning are
computing, artificial intelligence, machine learning, mobile the main pillars of machine learning which works very well
internet, big data etc. These technologies are extensively used in the field of healthcare for automation in healthcare record
in making the whole smart e-healthcare system efficient and management, decision making, medicine suggestions,
reliable. Wearable devices are used to monitor patients' health telesurgery, etc. [8].
throughout the day [8]. Many AI based solutions like robots
and support systems are available to use in diseases diagnosis, D. Cloud Computing in IoMT
tele-surgeries, patient health records management and,
appointment booking. They promote collaboration and Currently cloud computing is booming technology used
networking across boundaries, and promote the growth of in healthcare by offering services for data management
remote medicine and self-service healthcare, and ultimately anywhere-anytime over the internet. Cloud computing is
make individualized healthcare services omnipresent. intended to offer and utilize the enormous number of
Moreover, it also decreases the charge and risk of procedures computing services on the web for healthcare. The main
through the use of these technologies in the medical sector. purpose of using this technology is to manage and store the
huge amount of patient’s data among hospitals, patient and
III. EMERGING TECHNOLOGIES IN IOMT healthcare professionals.
Artificial Intelligence, Blockchain, Physically Unclonable IV. APPLICATIONS OF IOMT
Function (PUF), Software Defined Networking (SDN),
Machine Learning, 5G Internet, Cloud Computing, Edge The main and important role of IoMT is in the Remote
Computing, Mobile Cloud Computing (MCC), Fog
Healthcare Monitoring (RHM) system. Nowadays, RHM is
Computing are some emerging technologies which plays
being used widely for the monitoring of patient’s health in
important role in IoMT to offer security, privacy,
non-clinical environments such as homes or remote locations
performance to improve the services offered by current e-
by the medical professionals which is also referred as Remote
healthcare systems [9]. Patient Monitoring. The role of IoMT in RHM is to sense the
patient’s health related data such as blood pressure, heart rate,
A. AI in IoMT sugar level through wearable sensors/devices, store them in
the cloud databases and used for real-time analysis for
AI performs significant role in the adoption of IoMT in the medical professionals [12][13]
world of healthcare and medical sector by offering various
benefits which has increased the adoption of IoMT in the field
of medical science. The integration of AI with IoMT offers a
number of benefits like automated patient health record
management, managing and scheduling appointments,
managing lab tests, treatment plans, medications, surgical
treatment [10, 20]. The critical conditions can be handled by
A. Application of AI in IoMT
Moreover, Fog computing plays an important role with IoT large amount of data is passed from one device to the other
devices for real time data processing. Fog Computing for the real time analysis and due to which data traffic occurs
generates various distributed nodes which reduce the traffic which sometimes slows down the particular medical device
and latency issues to provide computing and storing services resulting in waiting for the diagnosis of the patient by the
along with secure communication and higher Quality of medical personnel. In the case of RHM if the network latency
service. occurs there will be delay in the data sending of the patient to
the hospital and which leads to the delay in the treatment of
Edge computing and Mobile Cloud Computing (MCC) are the patient.
also important parts of IoMT. Using the edge computing
doctor can access the stored data of patients in real time. CONCLUSION
Medical staff do not need to send patients data to remote With the increasing awareness and consciousness
servers, by establishing an edge data center they can easily about the health of human beings, IoMT is also getting focus
process and store the patient’s data [18]. of human in their daily life for health monitoring. The
integration of various technologies with IoMT to improve the
The mobile cloud based IoMT system helps for quick quality of services to the patients, professionals and hospitals.
response to the change in physical signs of patients by giving With the increasing demand of IoMT, it also opens challenges
access to the clinical services over the Internet. The MCC like interoperability of various devices and communication
provides the tracks of medication and progression of medical technologies. Moreover, increased usage of sensors also
treatment [19] [22]. increases the power consumption for constant monitoring of
data. The data sensed by the sensors are analyzed by cloud
VI. CHALLENGES IN IOMT service providers where security and privacy of the patient
records need to be maintained. The security of patient data is
A. Interoperability the most critical area which demands focus. Many
Interoperability in medical means the ability to securely, researchers are working on the challenges of IoMT but doors
more cautiously and more efficiently transfer data and use the are still open for the researcher for wide adoption of IoMT.
information and instructions among all other connected
devices to work effectively. Lack of interoperability can REFERENCES
cause the increase in the cost as the devices, machines, [1] Vishnu, S., SR Jino Ramson, and R. Jegan. "Internet of medical things
software, applications etc. won't be able to communicate or (IoMT)-An overview." In 2020 5th international conference on
devices, circuits and systems (ICDCS), pp. 101-104. IEEE, 2020.
exchange the data properly among them.
[2] K. Patel, S. Vyas, V. Pandya and A. saiyed, "IoT: Leading Challenges,
B. Privacy and Security Issues and Explication Using Latest Technologies," 2019 3rd
International conference on Electronics, Communication and
One of the major challenges for IoMT is the data security Aerospace Technology (ICECA), 2019, pp. 757-762, doi:
and data privacy [17] [21] as in medical sector hospitals have 10.1109/ICECA.2019.8821970.
enormous amounts of health data and private information [3] Yeo, Kiat Seng, Mojy Curtis Chian, and Tony Chon Wee Ng. "Internet
regarding the patients in their databases. Due to the evolution of Things: Trends, challenges and applications." In 2014 International
Symposium on Integrated Circuits (ISIC), pp. 568-571. IEEE, 2014.
of the computer science and technology field, cyber-attacks
[4] Bohara, M.H., Patel, K., Saiyed, A., Ganatra, A. (2021). Adversarial
on IoMT such as flooding, replay attack, SQL injection, Artificial Intelligence Assistance for Secure 5G-Enabled IoT. In:
Ransomware, side-channel attack, man-in-the-middle attack, Tanwar, S. (eds) Blockchain for 5G-Enabled IoT. Springer, Cham.
eavesdropper, false data injection, etc. have increased and https://doi.org/10.1007/978-3-030-67490-8_13
due to which the privacy and security of the patient’s data are [5] Shehabat, Issa M., and Noor Al-Hussein. "Deploying Internet of
Things in Healthcare: Benefits, Requirements, Challenges and
at risk as hackers might hack the hospital’s server and misuse Applications." J. Commun. 13, no. 10 (2018): 574-580.
the patient’s data. IoMT sensors are very tiny in terms of [6] Dwivedi, Ruby, Divya Mehrotra, and Shaleen Chandra. "Potential of
computation power and memory due to which the existing Internet of Medical Things (IoMT) applications in building a smart
security protocols or encryption algorithms can not be used healthcare system: A systematic review." Journal of oral biology and
directly with the sensors. Many researchers have proposed craniofacial research (2021).
the security solutions based on machine learning using which [7] Lee, Yong Kyu. "Review of the Role of the Internet of Things (IoT) on
the Consumer Market: Focusing on Smart Tourism, Healthcare, and
the attack can be detected on the basis of their behavior. IoMT Retailing." In Examining the Socio-Technical Impact of Smart Cities.
uses the combination of cryptography, machine learning, and edited by Annansingh, Fenio, 180-198. Hershey, PA: IGI Global, 2021.
lightweight techniques for authentication and authorization. https://doi.org/10.4018/978-1-7998-5326-8.ch009
[8] Tian, Shuo, Wenbo Yang, Jehane Michael Le Grange, Peng Wang, Wei
C. Energy consumption Huang, and Zhewei Ye. "Smart healthcare: making medical care more
intelligent." Global Health Journal 3, no. 3 (2019): 62-65.
Energy consumption is the biggest challenge for IoMT as
[9] Razdan, Sahshanu, and Sachin Sharma. "Internet of Medical Things
almost all the medical devices, applications, machines work (IoMT): overview, emerging technologies, and case studies." IETE
with the help of either electrical energy or solar energy. For Technical Review (2021): 1-14.
the continuous monitoring of the patient, sensors are used and [10] Al-Dhaen, Fatema, Jiachen Hou, Nripendra P. Rana, and Vishanth
for the efficiency of the data, sensors containing devices are Weerakkody. "Advancing the Understanding of the Role of
connected to the energy sources all the time Responsible AI in the Continued Use of IoMT in Healthcare."
Information Systems Frontiers (2021): 1-20.
D. Network Latency [11] Patel, K., Ramoliya, D., Sorathia, K., Bhut, F. (2022). Comparative
Study of Blockchain-Based Voting Solutions. In: Raj, J.S., Shi, Y.,
Network Latency means the time taken by one data packet Pelusi, D., Balas, V.E. (eds) Intelligent Sustainable Systems. Lecture
to travel from the source place to the designated place. The Notes in Networks and Systems, vol 458. Springer, Singapore.
https://doi.org/10.1007/978-981-19-2894-9_51
[12] S. Sudevan and M. Joseph, ―Internet of Things: Incorporation into Electrical Engineering, vol 875. Springer, Singapore.
Healthcare Monitoring, ‖ in 2019 4th MEC International Conference on https://doi.org/10.1007/978-981-19-0284-0_45.
Big Data and Smart City (ICBDSC), pp. 1-4, 2019. [18] Sun, Lanfang, Xin Jiang, Huixia Ren, and Yi Guo. "Edge-cloud
[13] M. Cornacchia, et al., ―A survey on activity detection and computing and artificial intelligence in internet of medical things:
classification using wearable sensors, ‖ IEEE Sensors Journal, vol. 17, architecture, technology and application." IEEE Access 8 (2020):
no. 2, pp. 386-403, 2017. 101079-101092.
[14] Nimra Dilawar, Muhammad Rizwan, Fahad Ahmad and Saima Akram, [19] Nguyen, Dinh C., Khoa D. Nguyen, and Pubudu N. Pathirana. "A
“Blockchain: Securing Internet of Medical Things (IoMT)” mobile cloud based iomt framework for automated health assessment
International Journal of Advanced Computer Science and Applications and management." In 2019 41st Annual International Conference of
(IJACSA), 10(1), 2019. the IEEE Engineering in Medicine and Biology Society (EMBC), pp.
http://dx.doi.org/10.14569/IJACSA.2019.0100110 6517-6520. IEEE, 2019.
[15] Kamruzzaman, Muhammad. “Architecture of Smart Health Care [20] S. Vasoya, N. Patel, D. Ramoliya and K. Patel, "Potentials of Machine
System Using Artificial Intelligence.” 2020 IEEE International Learning for Data analysis in IoT: A Detailed Survey," 2020 3rd
Conference on Multimedia & Expo Workshops (ICMEW) (2020): 1-6. International Conference on Intelligent Sustainable Systems (ICISS),
[16] Naresh, Vankamamidi Srinivasa, Suryateja S. Pericherla, Pilla Sita 2020, pp. 291-296, doi: 10.1109/ICISS49785.2020.9316074.
Rama Murty, and Reddi Sivaranjani. "Internet of Things in Healthcare: [21] Joby, P. P. "A Review on Data Securing Techniques using Internet of
Architecture, Applications, Challenges, and Solutions." Comput. Syst. Medical Things." Journal of Ubiquitous Computing and
Sci. Eng. 35, no. 6 (2020): 411-421. Communication Technologies 3, no. 3 (2021): 150-163.
[17] Pandya, V., Saiyed, A., Patel, K. (2022). Recent Advancement in Fine- [22] Raj, Jennifer S. "Optimized Mobile Edge Computing Framework for
Grained Access Control and Secure Data Sharing Scheme for IoT based Medical Sensor Network Nodes." Journal of Ubiquitous
Distributed Environment. In: Singh, P.K., Kolekar, M.H., Tanwar, S., Computing and Communication Technologies (UCCT) 3, no. 01
Wierzchoń, S.T., Bhatnagar, R.K. (eds) Emerging Technologies for (2021): 33-42.
Computing, Communication and Smart Cities. Lecture Notes in
Abstract— Street lighting uses a lot of electricity around the lights from a distance while also taking the necessary
world. Street lights in most cities are only managed regularly measures to lower energy consumption through power
and the quality of service is very low. The worst levels will be conditioning and control. It is necessary to attach the street
caused by constraints on available resources, very limited light controller to the light pole. It consists of a
equipment instrumentation, inappropriate system operation,
microprocessor, a few sensors, and a wireless module. The
and poor network maintenance. The goal of the current
street light controller installed on the street light pole will
research is to build and develop a highly IoT-dependent smart
city based on ESP8266. Its main goal is to create a subway IoT pass the information between each street light and manage
system that contributes to the development of smart cities and the LED Street light according to the traffic flow. To
uses online cloud computing to solve real-time problems. monitor the system, data from street lighting controls can be
Thanks to the Internet of Things, street lighting and water wirelessly transmitted to the base station. The system can be
management are now two factors that are automatically controlled automatically or manually [2]. The control
managed in smart cities and rural areas. In our current work, system regulates the lighting's on and off times as well as its
we tend to focus more on using Internet of Things (IoT) devices brightness to suit the situation. The studied light sources on
to remotely control street lighting. IoT will allow access to real-
the side of a road or path that are lit or illuminated at
time street lighting data (on/off status) anytime, anywhere. IoT
specific times each night have several different names,
is nothing more than a network that uses software, sensors,
and connectivity to control and monitor data anytime, including street light, lamp post, street light, light standard,
anywhere. The central office can conduct observations from or light standard. Increased safety and accident prevention
anywhere. Data that is continuously stored in the cloud via are two important benefits of street. For the purpose of
BLYNK local servers and efficient client-server connections is increasing the business' efficiency and accuracy, an
visible to us in real time. Such automated systems will work automated system known as "Street Light Monitoring and
more efficiently than manual systems, saving manpower and Control" was developed. This paper outlines a novel,
increasing the accuracy of the system. Electricity prices workable method for designing street lighting control
continue to rise as more and more energy is wasted. Saving
systems. Additionally, the system has a client-server
energy is now absolutely necessary. To improve efficiency, a
architecture that enables users to connect directly with the
technology called street lighting monitoring to automatically
control street lighting was created. The main reason for the web-based application to control street lights from any area
work is to save energy. from a single location.
I. INTRODUCTION
One of the biggest energy costs in the city is street
lighting. Municipal street lighting costs can be reduced by as
much as 50% to 70% using smart street lighting systems.
Smart street lighting systems automatically classify
pedestrians, cyclists and vehicles and adjust light output
based on usage and occupancy [1]. The Smart Street
Lighting Program suggests setting up wireless devices to
monitor and regulate the real energy consumption of street Figure: 1 Diagram for Street Light Control System
Numerous street lighting management systems can also be controlled automatically. Throughout this piece,
have been developed to monitor and manage the energy LEDs are employed (LEDs). The fundamental flaw of this
consumption of metropolitan Public Street lighting systems technology is the inability to alter the street lighting array.
[3]. It has a street light monitoring system as well as a single Only drive on Single Street.
light with a network operating protocol. Most types of lights In paper [7], A server, a graphical user interface
require hardware compatible with a specific protocol. The (GUI), and nodes, which are micro-control processing units
street light systems used today are not suitable. Most with built-in sensors that detect various parameters, make up
controls are manual, although some are automated the system. Each network node uses a protocol to establish a
depending on environmental factors. Location management connection to the master server. The sensor converts the
in remote areas is a big problem. Electricity is wasted due to received analog data into digital form, which is then
human error [4]. analyzed by the microcontroller and transmitted to the
server. The master is in command of each slave. The master
A. GOALS AND OBJECTIVES
node receives and collects data from other nodes and sends
Every city must have street lights to be considered
it to concentrators and servers, where it can be monitored
a smart city. The time when our street lights were on all day,
and processed to switch nodes on and off devices based on
though, was when we actually felt it. We can use this
fundamental changes. The system can also detect many
method to manage some street lights. We will try to use this
characteristics, such as outdoor temperature, fog, carbon
method to control street lights from a remote server.
dioxide emissions and noise levels, and recommend
Creating an efficient street lighting system was the main
remedial measures. Every street light requires a GSM
goal are, it requires a server that can be used to track all
modem to function, which automatically adds to the cost. It
street lights in the city and remote access is possible using
also includes some network issues.
low cost internet technology.
Each street light can be fitted with an infrared
B. PROJECT MOTIVATING FACTORS sensor for vehicle motion detection. There is a car passing
Build a smart lighting system that is cost-effective by and the lights are on. This can reduce power usage and
and self-regulating on the street while saving energy. help save some energy. It has a solar panel that allows
Develop a smart lighting system that saves energy by sunlight to charge it. However, this is problematic because
combining controls and sensors. By using a modular this sensor only turns on when a car passes by, but street
approach, you can create scalable and scalable smart lighting is useful for pedestrians crossing the road. It's also
lighting systems. Build intelligent lighting systems that are expensive since every street light requires an expensive
scalable and compatible with other commercial applications infrared sensor [8].The management and efficiency of the
and automation systems, going beyond simple lighting proposed street lamp remote control system can be
systems. improved [9]. This system uses Zigbee network. It has a
smaller range than a wireless network. Zigbee's range is
II. RELATED WORK extremely limited. Due to the small range of the ZigBee
Their goal is to track the monitoring back to the network, it is very expensive to use and has range issues as
control station and check the health of the streetlights. The it requires a lot of hardware in this article to control and
transmission module, microcontroller module and light monitor street lights.
dependent resistor (LDR) module are all inside the lamp The proposed system relies on solar energy. Street
module. The light modules will use Zigbee to wirelessly lighting is powered by solar energy during the day and runs
interact with the control station. Two LDRs are provided in out at night. The sensor automatically turns on throughout
the LDR module. To check the day/night status mode, the the night and turns off during the day. The street lighting
LDR is mounted on top of the street light. To monitor and switches to the RTC controller when the battery is low.
assess the health of the lights, another LDR is placed under There is not enough sun energy to charge the solar cells if
the street lights. After the microcontroller receives the signal the weather changes. Therefore, it will cause the street light
from the LDR, it processes the data and sends it to the to glow uncomfortably [10]. The goal of the study was to
transmission module. Wireless ZigBee in the develop innovative built-in technologies to save energy in
communication module transmits data wirelessly to the street lighting. The street lights currently operate on a
control center. The control center will track the condition of manual manner, turning on the night before sunset and
each street light and manage how the lights are used [5]. turning off the next morning once it is sufficiently light
In paper [6] is to build an innovative embedded system for outside [11]. The best moment to activate these lights,
energy efficient street lamps. Many people are so busy these though, is when it is completely dark. As a result, part of the
days that they don't even have time to turn off the lights power is wasted. The work provides a remedy for wasted
when they don't need it. The best ways to address electrical electricity [12]. Additionally, there is no longer any manual
waste can be found in this document. The lighting system lighting system control at all. The suggested system offers a
means of lowering energy usage. In order to do this, them from remote locations. The suggested work includes a
vehicles are detected and approached using a combination of reset switch to allow for a manual reset of the entire unit. A.
IR transmitters and receivers. The sensor sends data to the Sathesh et al .[19] presented an ideal evaluation technique
microcontroller after detecting motion, which also causes that takes environmental criteria into account and can be
the light to turn on [13]. Likewise, the status (on/off) of utilised in future energy policy A decision tool is used to
street lighting can be accessed anytime and anywhere via evaluate lighting tenders and lighting designs while
the Internet. Once the vehicle or obstacle is moved aside, the analysing the significance of these criteria. The optimal
light will go out. The idea uses built-in smart technology to option reduces CO2 emissions and saves 75% of energy,
manage streetlights in response to detection of vehicles or according to simulation data.
other roadblocks. When an obstruction is detected on the
III. PROPOSED METHOD
street within the specified period, the light will
automatically switch on or off depending on the obstacle The system is designed to implement an efficient
detection, and the same information may be accessed online. street lighting control system. Connected together using
Users can access the real-time status (ON/OFF) of the street esp8266 sensors. As shown in Figure 1, the information and
light through the internet at any time and from any place. data collected by the sensors are passed to the nodemcu,
Today, road safety is significantly affected by which can pass the information to the Blynk application.
street lights. Street lighting uses a lot of electricity. The IOT system also has a BLYNK mechanism that allows
Therefore, it is important that we save as much energy as users to view street lights in all locations from a single
possible. Electricity prices continue to rise as more and location by directly interacting with the IOT Android app.
more energy is wasted. Saving energy is now absolutely When we need to turn the light on or off, the server can
necessary. A technology called streetlight monitoring that notify the IoT controller that the necessary action is
automatically controls streetlight switches was created to required. The IoT controller can receive the data, decode it
improve efficiency. In this work, a new street lighting and identify the specific light that will be set using the relay
control system is presented. The base server manages street circuit. After receiving the message, it overwrites the data
lighting only by sending messages using the wireless and uses the relay circuit to identify the corresponding light
network. Client-server applications make up the system. that needs to be turned on or off. The entire street lighting
Saving energy is the main reason for executing this work system is connected to the relay driver circuit. Figure 2
[14]. An elevated source of light on the edge of a road or contains a schematic diagram of the design system.
path that is turned on or illuminated at a certain time each
night is known as a street light, lamppost, street lamp, light
standard, or lamp standard. Two of the main advantages of
street lighting are the decrease in accidents and the
improvement in safety. Many street light management
systems have been developed to manage and reduce the
energy consumption of a town's public lighting system. To
manage a circuit of street lights or specific lights, for
example, these contain specific ballasts and network
operating protocols. These might involve high-frequency
transmission over the low voltage supply, wireless
communication, and sending and receiving instructions via Figure .2 Proposed block diagram
separate data networks. A wide range of protocols and
appropriate hardware have been developed for the majority A. Working Principle
of lighting kinds [15]. The Arduino receives the control signal from the
In order to transmit data efficiently for a variety of ESP8266 and uses it to turn the solenoid valve on and off.
applications, Ramalingam et al. proposed the Blynk IoT As shown in Figure 3, the ADC unit transfers the digital
server [16]. Using Blynk and a wireless sensor network, data it converts from the analog data to the "Nodemcu". The
Venkatramanan and Ramalingam created a smart Internet of NodeMCU (Node microcontroller unit) is an open-source
Things device for real-time applications. Data has been software and hardware development environment built
collected and sent to the cloud using this intelligent IoT around an inexpensive System-on-a-Chip (SoC) called the
device [17]. Based on this IoT hardware design, we create a ESP8266. The NodeMCU is available in various package
low-cost smart device for identifying missing people. P. K styles. Common to all the designs is the base ESP8266 core.
aruppusamy et al. [18] proposed IoT-based monitoring Designs based on the architecture have maintained the
systems allow users to examine the status of connected standard 30-pin layout and operates in 3.3v. The relay
electrical equipment from anywhere globally and control circuit is connected to street lighting. The microcontroller is
connected to the relay circuit. This relay's primary function The device's purpose is to enable effective
is to change the state of the street light from off to on and operations while allowing human control of the machine and
vice versa. The street light has been controlled and sensor information feedback. The database stores and organizes
data sent to cloud via IoT using MQTT protocol. The data using specialized software. Information created during
microcontroller is connected to the IoT nodemcu device. It operation is also stored. The job of the communication
works in the BLYNK cloud environment. Android manager is to facilitate internal and external web server and
smartphones are equipped with the Blynk app. With Blynk embedded system communication. It is Wi-Fi compatible.
Cloud, the surroundings of the street lights are also An electric working switch is a relay circuit. The primary
monitored. The Blynk Cloud platform controls the on/off server, which manages the junction's whole record of street
status of street lights. lights, runs Java Web Applications. A server notifies a
controller to turn on or off a certain street light. After
receiving such data, the street light controller will decode it
and use a relay circuit to turn on or off a specific street light.
The relay driver circuit is connected to each individual street
light bulb.
B. Module Description
There are many more microcontrollers than the few that run
on any "version" of the "Arduino board family," but the
Arduino board family.
• offers a standard IDE that is incredibly easy to use;
• has comprehensive peripheral support, including third-
party support; and
• includes a huge number of sample applications to get you
started.
An automated system called "Street Light
Monitoring and Control" was created to increase the
company's efficiency and accuracy through automatically
timed, controlled street lighting. This idea provides a new,
economical approach to street lighting control systems.
Control circuits, internet and electrical equipment make up
the control system. The system also features a client-server
architecture that enables users to communicate directly with
web-based applications to monitor street lights remotely Figure.4. IoT communication flow diagram
from anywhere. A Java web application that manages all
street lights in a country, state or city will run on the Using sensing technology to make farms more
underlying server. When a street light needs to be turned on "smarter" and more closely connected through the practice
or off, the server will notify the street controller, which will of so-called "precision agriculture", often referred to as
then take the appropriate action. The street light controller "smart agriculture," is a way to solve agriculture-related
receives the information, decodes it, and then uses a relay problems and improve the quality and quantity of
circuit to identify the specific street light that will turn on or agriculture. We are developing a module for measuring soil
off. Once the message is received, the process will be moisture, temperature, humidity, rainfall frequency and light
repeated again. A relay driver circuit is connected to each intensity. It advises farmers on the best seeds through one
individual street light. An IoT that tracks all the street lights interface. The system's design includes a Wi-Fi module and
in the city will run on the base server. temperature, humidity, and humidity sensors. The software
is an Internet of Things (IoT) platform that allows setting
IV. SYSTEM ARCHITCTURE The table 1 shows the utilization of power for street light.
The components with specification used in proposed system
A. Network and Cloud storage are listed in Table 2 below
The network is responsible of transferring the data Table.2 shows the hardware specification
to cloud storage, which uses the received sensor information
S.NO COMPONENTS TECHNICAL
is in the form of raw data—to analyse and execute SPECIFICATION
computations before displaying it on the IoT interface. 1 SOLAR PV 5KW, 12V DC
2 Wind model 12V
3 BATTERIES 12V-700Ah
4 Communication IoT module-ESP 8266
5 Proposed system WIFI network and IOT
mobile app
6 Converter DC-DC 12v
7 Controller Raspberry pi4,
8 Sensor DHT11voltage sensor
9 DHT 11 sensor 3 to 5V power and I/O,
2.5mA max current use
during conversion, no more
than 1 Hz sampling rate
Figure 5: AC712 circuit diagram
Abstract— The existing assistive device used by the visually autonomy is essential for realizing one's potential and
impaired, a stick, is insufficient for allowing them to live achieving one's life goals. Those who are visually impaired,
independently. Getting from one place to another, whether on the other hand, need the assistance of others to complete
indoors or outside, is a huge issue for persons who are visually daily duties. When going out alone, people who are blind or
impaired. And the traffic conditions make their everyday
journeys more onerous. Consequences such as falling over
have considerable vision loss frequently insist on taking
stationary objects, relocating barriers, or missing a traffic light dangerous routes. Millions of people worldwide are blind or
can only be avoided if they maintain a constant state of visually impaired and will always require the aid of others.
vigilance. For the visually challenged, technology can solve The standard walking stick has been a well-known
these problems. The proposed method employs the Internet of component of blind people's navigation for many years, and
Things (IoT) paradigm to serve as a link between the visually it has been recovered with the addition of remote sensors
handicapped and their surroundings. An ultrasonic sensor may after much effort. Blind people have a tough time navigating
be used to scan the surroundings for possible obstacles, while an metropolitan surroundings using a traditional cane while
ESP32 camera collects the traffic signal image. An Artificial having high liver sensitivity. In many ways, an electronic
Neural Network (ANN) model is particularly tailored for the
task to detects the traffic signal. The speaker is permanently
device will make life easier for a blind person. The capacity
attached to the controller's output and can alert the user about to move around in an unknown environment poses
obstacles and traffic signals. The next step is to confirm considerable difficulties for the visually impaired and blind.
whether the person is roaming within the nearer area or not. If When walking outside the house, users of the white stick
the person is navigating a long distance away from the house, tend to stick to well-trodden trails. Furthermore, many
the system will send a text message to the registered mobile individuals are concerned that they will be powerless against
number. The suggested smart blind stick is both simple to use the constant flow of cars and other road users. As a result, it
and cost-effective due to the incorporation of several types of is suggested that alternative solutions to existing
sensors and modules with IoT. technological problems be provided. In this research, we
suggest designing and developing a smart stick for
Keywords— Blind stick, Cloud, Sensors, ESP32 Camera,
the visually handicapped to use for navigating in both public
ThingSpeak, Message.
and private environments. Several cutting-edge technological
solutions are used in this study to help blind individuals
I. INTRODUCTION navigate freely. The past research works done on designing
the smart blind stick are detailed below.
Even with normal eyesight, those who are visually
impaired are unable to detect even the smallest features. The author of article [1] suggests a solution that
Blind people cannot discriminate between things from 6 feet uses the IoT concept to act as a bridge between visually
distant and have a horizontal visual field of less than or equal impaired persons and their surroundings. A variety of
to 20 degrees with both eyes open. Those who are blind or sensors can detect abnormalities such as stairs, damp ground,
have other visual problems require assistive technology. 10% and other obstructions. This article discusses a functioning
of the visually impaired have no functional vision at all, prototype of a low-cost and simple-to-use smart blind stick.
according to. Walking in the street can be especially Furthermore, this technology allows concerned parties to be
dangerous for those with visual impairments since they have alerted of the user's current location. A software tool is also
difficulty detecting obstacles in their path. A sense of being created to assist the blind's friends and family with
I. INTRODUCTION
Overflowing garbage cans and spilled garbage spread Fig. 1. Blog diagram of garbage system
disease throughout the community. Solid waste management
is a significant issue in urban areas, and garbage collection and IoT platforms can connect the most innovative processes
segregation must take up as much space as possible. It is more to the web for device-to-device interaction and user-to-user
difficult in urban areas to deposit such a large number of interaction. [6]Sensors convert physical and digital signals
segregation plants and works. Polluting the public and transmit them to the management center. In the garbage
environment is a significant concern for waste materials and bin cap, install an ultrasonic sensor for level detection; signals
food products. In today's world, some countries are are sent to Adriuno's controller circuit if garbage reaches that
implementing a zero-waste management system in all sectors level.[7] Adriuno set up a GSM connection to send signals to
to address this issue. This action should consider reducing the municipal office whenever the dustbin reached the margin
water scarcity in industries and managing soil and air pollution level. Buzzer to show the level indication alarm, website to
issues. To avoid the complications of garbage collection, this show the area of the dustbin which one has filled shows in
paper developed an intelligent garbage monitoring system. In updating position using IoT platform. System requirements
this proposed paper, garbage dustbin overflow sends signals are considered to be 3 ways.
to garbage collection trucks, the municipality office, and
office heads. The dustbin was overloaded as soon as the call A. Ultrasonic sensor
arrived, and clearing the overloaded dustbin was time- Sonar is used to compute the distance of objects. Sonar
consuming. also provides excellent non-contact range detection with
stable reading and high accuracy in a user-friendly package
II. LITERATURE REVIEW ranging from 2cm to 400cm.[8] This sensor classifies into two
Garbage problems breed more viruses, bacteria, insects, types: piezoelectric transducer or crystal, stimulated by a
and mosquitoes, among other things. [1]. These elements signal to produce a pulse, and electrostatic transducer, used in
contribute to a polluted environment. In[2], degradable and this chapter to produce a sonic impulse. It has two pins, one
bio-degradable waste is separated with PH sensors. To avoid for sending and one for receiving signals. The speed of sound
fire accidents inside the garbage bins, they use PH sensors to waves in the air is approximately 341 meters per second.
measure the PH value of garbage. This work emphasizes the Technical specifications are Power supply 5v DC supply,
importance of separating waste using a conveyer belt. [3]The current 15mA, and quiescent current <2mA, effective angle
dustbin's waste level must be detectable so an intelligent waste <15°, Ranging distance 2cm-400cm, resolution 0.3cm,
collection system in the IoT Platform can perform. This work measuring angle 30°. Estimation details are worked out using
uses Zigbee and GSM module communication. In the present codes c.
management, and method of dumpsites covering an only [7] A. Agarwal, K. Ray, B. K. Pradhan, and V. Kumari, “GSM Based
solution based on requirements is a challenging one in the Smart Digital Wireless Electronic Notice Board,” J. Inf. Technol. Digit.
World, vol. 4, no. 3, pp. 144–152, 2022.
environment[14][15].
[8] A. Nikam, N. Thakur, and S. Patil, “Intelligent Waste Collection
System,” vol. 4, no. 11, pp. 4–6, 2016.
V. DISCUSSION
[9] I. Hong, S. Park, B. Lee, J. Lee, D. Jeong, and S. Park, “IoT-Based
The Automatic Garbage Fill Alerting System aids in Smart Garbage System for Efficient Food Waste Management.
pollution reduction. The garbage bin is often overflowing, Scientific World Journal. http://doi.org/10.1155/2014/646953sed,”
and animals, dogs or cows, roam around or enter inside the Sci. World J., vol. 2014, no. 1, pp. 1–13, 2014.
dustbin. Some birds are also attempting to remove garbage [10] M. Saeed, M. Ahsan, M. H. Saeed, A. Mehmood, and S. El-Morsy,
“Assessment of Solid Waste Management Strategies Using an Efficient
from the trash can and this situation can be avoided Complex Fuzzy Hypersoft Set Algorithm Based on Entropy and
furthermore, the message can be delivered to the cleaning Similarity Measures,” IEEE Access, vol. 9, pp. 150700–150714, 2021.
vehicle rather than the contractor's office directly. Aside from [11] L. K. Sibanda, N. Obange, and F. O. Awuor, “Challenges of Solid
that, there is a distinction between dry and wet trash bins, Waste Management in Kisumu, Kenya,” Urban Forum, vol. 28, no. 4,
which collect plastic dry waste and biodegradable waste, pp. 387–402, 2017.
respectively. Methane and odor sensors have been [12] S. Shakya, “A Self Monitoring and Analyzing System for Solar Power
implemented to accomplish this and aid in separating waste Station using IoT and Data Mining Algorithms,” J. Soft Comput.
at the source, reducing the need for a workforce. Our Paradig., vol. 3, no. 2, pp. 96–109, 2021.
automated system is used to pick up waste in and also around [13] E. Kombiok, K. A. Nyamekye, R. Adjei, and L. Danquah,
“Determinants of Unsafe Plastic Waste Disposal among Households in
the bin, segregate it, and deposit it in appropriate bins. the Tamale Metropolitan Area, Ghana,” J. Environ. Public Health, vol.
2021, 2021.
VI. CONCLUSION
[14] G. Salvia et al., "The wicked problem of waste management: An
Real-time implementation of this garbage monitoring attention-based analysis of stakeholder behaviors," J. Clean. Prod., vol.
system is highly beneficial to maintaining a clean 326, no. December 2020, p. 129200, 2021.
environment. Manufacturing costs are low. Including a [15] R. Khan et al., “Machine Learning and IoT-Based Waste Management
Model,” Comput. Intell. Neurosci., vol. 2021, 2021.
weight, the sensor will increase the cost. When the dustbin
was filled, an SMS alert was sent to the area workers and [16] Pardini, Kellow, Joel JPC Rodrigues, Ousmane Diallo, Ashok Kumar
Das, Victor Hugo C. de Albuquerque, and Sergei A. Kozlov. "A smart
higher officials. An SMS was sent to area sweepers and waste management solution geared towards citizens." Sensors 20, no.
higher-ranking officials. This system also helps monitor and 8 (2020): 2380.
maintain fake reports, reducing corruption in the overall
management system. This record should keep track of the
total number of garbage collection vehicle trips, allowing for
a reduction in overall garbage collection costs. The need for
more concentration in separating waste-management systems
is a significant issue in resolving the separation.
REFERENCES
[1] M. K. A, N. Rao, and P. S. B, “Smart Dustbin-An Efficient Garbage
Monitoring System,” Rev. Int. J. Eng. Sci. Comput., vol. 6, no. 6, pp.
7113–7116, 2016.
[2] D. C. Wilson and C. A. Velis, “Waste management - Still a global
challenge in the 21st century: An evidence-based call for action,”
Waste Manag. Res., vol. 33, no. 12, pp. 1049–1051, 2015.
[3] M. S, D. G, C. B, and D. D, “IoT Based Monitoring and Control System
using Sensors,” J. ISMAC, vol. 2, no. 2, pp. 111–120, 2021.
[4] M. S. Singh, K. M. Singh, R. K. Ranjeet, and K. K. Shukla, “Smart Bin
Implementation for Smart City,” Ijarcce, vol. 6, no. 4, pp. 765–769,
2017.
[5] M. J. Zapata Campos and P. Zapata, “Switching Managua on!
Connecting informal settlements to the formal city through household
waste collection,” Environ. Urban., vol. 25, no. 1, pp. 225–242, 2013.
[6] C. Engineering et al., “Gsm Based Garbage and Waste Collection Bin
Overflow,” Ijariie, vol. 3, no. 2, pp. 2235–2240, 2017.
JISHANA SHEMEEM
Computer Science & Engineering,
MEA Engineering College,
Perinthalmanna, Kerala
jishanashemeem@gmail.com
Abstract— The lack of parking spaces is getting worse as the Parking is quickly becoming one of the most serious
number of vehicles on the road rises daily. Finding a
issues currently facing cities, and it is becoming cost-
parking spot can be difficult, especially in big cities or places
where athletic or cultural events are planned. An integrated prohibitive. As a result, Parking is scarce in major cities
parking system is suggested as a solution to this problem. worldwide, including universities and tourist attractions.
Despite the fact that there has been a tonne of research on Finding a parking space during big events, for example, can
the creation of smart parking systems, much of it does not be difficult. Commuters waste time and fuel having a look
deal with the problem of in-the-moment detection of for open parking areas. For drivers, finding a parking place
incorrect parking and automatic collection of parking fees. in a parking area can be extremely frustrating. This
The proposed system combined a real-time parking frustration can occur when parking places are difficult to
reservation system with a smart payment method for the locate or when another driver takes the parking place before
beneficial to the society.
they would reach it. The ability for customers to schedule
Keywords— Slot reservation, QR scanning, online convenient spots and prepay fees was the integrated parking
payment, automatic barricade. system's primary design goal. Through the same app, also
provide space booking at the parking zone.
I. INTRODUCTION
II. REVIEW OF EXISTING SYSTEMS
As the population and economy grow, so does the
number of vehicles on the road. Vehicles cruising for
parking are estimated to account for more than 40% of Students from Siddaganga Institute of Technology in
total traffic density in metropolitan regions. Tumakuru, India, Abhijeet Anand, Abhinav Kumar, A N
Continuously cruising in a specific area, causes traffic Mukunda Rao, Anupam Ankesh, and Ankur Raj suggested a
congestion and air pollution. An integrated parking Smart Parking System (S-Park) in 2020 [1]. Under this
system, in this case, resolves these issues by approach, the driver must first register at the building's
intelligently utilizing the parking station. The majority entrance gate. The driver receives a one-time registration
of smart parking systems proposed in recent years in the card, and the registration data is stored in the Raspberry Pi
literature provide solutions for the layout of parking database (RFID Card). To check the availability of parking
space data systems, car park booking services, spots in various parking zones, use the website or the
accommodation management and prevention of parking Android app. Using the admin login for the website, the
spaces, real-time transportation within the parking operator makes a parking space reservation.
space, and so on. Even so, very few efforts have focused
on real-time and automatic detection of parking
illegally.
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 304
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
D. Payment Gateway
The technology known as a payment gateway is After approval the QR will generate at the user
what collects and sends payment information from the interface which will define the details of booking. At
customer to the acquirer before sending the payment exit/entry point there will be an automatic barricade system
acceptance or decline back to the customer. A payment with respect to Quick Response scanner. By showing the
gateway securely verifies the card information of the QR to the scanner the barricade will open automatically.
customer, confirms that the funds are available, and Location manager can supervise the reservation manually.
eventually permits businesses to receive payment. At exit point with the help of same QR scanner by scanning
Between a merchant's website and its acquirer, it serves user will come to know whether time period exceeds. If it
as an interface. It secures the transmission of sensitive exceeds then the user is supposed to pay the remaining to
credit card information from the customer to the open the barricade or if we exit before the reserved time, the
acquiring bank via the merchant. balance amount will get refund to our account.
E. Automatic Barricade
In order to provide smooth entrance and leave, an
automated gate system normally comprises of a
combination of automatic barriers and bollards
connected to a vehicle access control system.
IV. IMPLEMENTATION
Through web app, the admin can add the managers for
particular zones and also can view the details of managers
and the registered users. The administrator can then approve
the registered locations and see the locations that were
declined or banned. Both managers and admins have access
to the complaints made by users and can respond to them.
E. Bootstrap
Bootstrap is a free and open-source front-end
programming framework for creating websites and online
apps. The Bootstrap framework simplifies the creation of
responsive, mobile-first websites and apps by utilizing
HTML, CSS, and JavaScript (JS) [14].
F. Java
Java is an object-oriented programming language and
software platform that is used on billions of devices,
including notebook computers, mobile devices, game
consoles, medical devices, and more. Java's ideas and
Fig 5. Manager Interface
grammar are based on the C and C++ computer languages.
C. PyCharm
An excellent environment for Python, web, and data
science development is provided by PyCharm, a Python
Integrated Development Environment (IDE), which
offers a variety of crucial tools for Python developers
that are closely integrated [13].
D. Quick Response
A Quick Response (QR) code is a type of barcode
that can be swiftly scanned by a digital device that
encodes information as a sequence of pixels in a square- Fig. 6. Slots view
shaped grid. The user interface will produce the QR
code after the reservation.
Then the payment request will be sent. Once A. Comparison with Existing Systems
payment is succeeded, the booking will be approved by
the manager. And we can check the booking status on Table 1. Comparison Table
the view Booking option. If our booking is completed, Paym
Rese Space
Methodol ent
the status will be "approved". For check-in, we can click Paper rvati manag
ogy Gatew
the blue arrow mark and can scan the QR code on ement
ay
displayed on the barricade. So the status will be Yan et al.
changed to "check-in" which is shown in Fig. 7. Finally RFID tag No Yes No
[1]
when we checkout, the above same process should be Abhinay Micro
No No No
repeated. We should scan the same QR code and the Kumar [2] RTU
status will be changed to "checkout". ARM
Lee et al.
Microcont No No No
[3]
roller
Wireless
Abu et al.
sensor No Yes No
[4]
network
ARM
Proposed
microcont Yes Yes Yes
System
roller, QR
CONCLUSION
Abstract—With the rise in population growth in cities solve these problems we are going to fix system that can
IoT devices are being used in this automated world. update the condition of manhole which measure the
With increased population destruction, the temperature, humidity, harmful gases through sensors
probability of accidents increases due to improper inside the manhole and trace out position of the manhole
infrastructure of roads, drainage systems, and and send messages to manhole authorities. This project
manhole blocks. The proper manhole system should will implement using IoT applications.
use in cities. Proper manual monitoring of
maintenance holes by scavengers is a dangerous job II. LITERATURE REVIEW
in today’s polluted cities it may impact their health
and may lead to death. Without being well in, formed There have been many proposed systems so far,
the situation manholes may take a way to death. To but "Manhole Cover Intelligence and Detecting system
keep safe this proposed model, aim to provide an [1]" is one that can be used to keep an eye on the lid
automated manhole system that measures position of a manhole cover, provide real-time updates
temperature, humidity, and harmful gases using on any changes, and sound an alarm if anything seems
sensors and updates this information using IoT amiss automatically. Additionally, there is a system
applications. If there is any abnormal change in the called "Drainage Monitoring System Using IOT" [2] that
manhole here this change is measured by the sensors is used to gather and receive data from various sensors in
and transferred to the managing station in form of sewage pipes and to update them in real-time
messages to take further action. applications. Water level, temperature, and poisonous
gases are only some of the characteristics that can be
Keywords—Manhole Observant, MQ O2 sensor, MQ monitored with this kind of setup, and the data is relayed
135 sensor, Internet of Things, Global Positioning to a control room in another paper titled "Underground
System, Sewage workers safety. drainage and manhole monitoring system for smart
cities" [3]. IoT (Internet of Things)-based "Smart
I. INTRODUCTION Drainage Monitoring and Controlling System" [4] will
reveal data on water level, air temperature, poisonous gas
Maintaining cleanness in cities is necessary in levels, and other environmental factors. The technology
the current world. An important section for any city is appears to employ a machine that begins moving and
cleanliness in maintaining drain systems and manhole clearing stocking parts if it goes above a predetermined
blocks are most important when it comes to access threshold. Using IoT, the authors of "Development of
points. Monitoring regularity check is prominent. But Alerting and monitoring system for manhole
because of faulty function of manhole covers shows up management" [5] were able to create a system that
to suffer people from accidents, poor environmental monitored manholes and sent real-time updates on gas
issues, and dangerous gas leakage issues. Finally, to levels, temperature, water flow, and lid position to the
control team. The system described in [6] is an Internet- from work station will be sent to managing stations
of-Things (IoT)-based early warning system for simultaneously some physical parameter values are
detecting blockages in sewage pipeline systems by updated in LCD display which is placed to pole
means of the transmission of signals via ultrasonic imminent to work station.
sensors. Another system designed based on MCU
MSP430G2553 processor is used to monitor the manhole IV. BLOCK DIAGRAM OF PROPOSED SYSTEM
cover separately [7]. Paper with title Underground
Drainage Monitoring System for Metropolitan Cities Fig. 1 shows the block diagram of the proposed
describes how to monitor the drainage system using work. The gas sensors, temperature sensor, IR sensor and
IoT[16]. Although information is provided on the state humidity sensor continuously monitors the manhole
of the lid, the sewage line, and the temperature of the parameters and the sensors are interfaced with the
gases within, little effort was made to show the state of Arduino UNO controller. The threshold values for
the manhole and whether it was open or closed. sewage workers to work in the manhole like temperature,
Therefore, both the open and closed states of the lid and humidity and hazardous gases are feed in the controller.
the manhole are governed by this work. When the sensor senses the parameters which crosses the
threshold value then it sends alert message to managing
III. PROPOSED SYSTEM—AUTOMATED MANHOLE station through GPS and GSM. The location of the
OBSERVANT problematic manhole is identified by the GPS and
The Automated Manhole Observant system necessary action is taken to control the parameters,
secured with a network is made up of various sensors, which create the problems to workers through coolants,
which put forward actual values of the environment that removing hazardous gases from manhole. All the data of
is concentration of gases and temperature up to point that the sensors are also stored in drive by using IoT.
does not harm human body and let you know the
workable conditions. In addition to providing safety V. WORKING PRINCIPLE
precautions to sewages our proposed system will have
record of sudden water level changes, humidity, In the proposed work total system is affixed to
temperature, hazardous gases in mobile app. If any manhole lid. As everyone knows that manhole lid
parameters crossing its threshold value the updated value leakage is the main concern, to rectify this IR sensor is
attached to the inner shoulder of manhole. IR sensor may input/output pins (of which 6 can be used as PWM
use for two purposes one for lid state and water level outputs), 6 analog inputs, a 16 MHz ceramic resonator
detection. The main purposes of gas (MQ 02, MQ 135) (CSTCE16M0V53-R0), a USB connection, a power
sensors [9] to detect the gas rate value and save sewage jack, an ICSP header and a reset button. It contains
worker life from breathing issues. Due to climate everything needed to support the microcontroller; simply
changes temperature check is the main task for manhole, connect it to a computer with a USB cable or power it
it would helpful for worker to enter inside. Therefore, with an AC-to-DC adapter or battery. "Uno" means one
here we are going to monitor this data using DHT-11 in Italian and chosen to mark the release of Arduino
temperature sensor [10]. When system detects any Software (IDE) 1.0.
threshold values apparently microprocessor process data
and it will update it to mobile app and messages send to LCD Display:
managing station. This process will be done for every 15 In this work display, system is mainly useful to
seconds. To avoid confusions host can easily find display the situation of the manhole to pedestrians,
manhole location using GPS. This system reduces the travellers which is affixed to pole nearer to system
labour time required to check manhole condition. location. Digital pins from 2 to 7 are connected to the
Finally, this monitoring system is easily organized. main input to the LCD. The LCD receive the information
from the main controller and it updates the data on the
VI. HARDWARE DESCRIPTION LCD this makes people wide-awake.
GPS:
To trace system location, we are going to fix
this GPS locator, here the digital pins Rx, 13th pins are
connected to the Global Positioning System. This block
updates the position of the system.
Therefore, this sensor can read the temperature and gases. This system consists of in-built Wi-Fi module will
report it [13-14]. This sensor is used in the proposed process information sent by the sensors will displayed on
system to monitor the temperature in the manhole. LCD display and updates graphically in Thing free app.
Manhole chamber
Fig. 11 shows the app result of latitude and Further, we will contrivance this system in solid
longitude range of system location. To trace the system covers with vented types remains as a solution to prevent
location, we used to trace these longitude and latitude pressure build-up underground and reduce the damages
addresses in route maps to resolve the problem. caused by any overflow inside the manhole.
Abstract- Over the decades, associate degree bumper and approaches evolved by the researchers [5]. In our
variety of articles and approaches was taking to boost the country, each urban and metropolitan areas do haven't
water management system. This Water Management property water for drinking and different functions. thanks
System (WAS) is employed to cut back water loss, work to poor water management techniques, vast pipeline run and
high running of water area unit in sure areas solely [6]. the
force usage, and waste matter utilization. It halts the barriers web of things [7] could be a device that communicates data
behind the municipality's water management. This water abstract thought from physical devices like sensors. It sends
management drawback was facing major problems in the whole knowledge exploitation the web, therefore it's
additional over the countries within the world. Some referred to as web of things. This planned system enquires
machine learning and self-learning algorithms facilitate to concerning the information concerning the flow of water and
resolve such issues quickly. Some ancient approaches assist RFID authorizations. This IoT-based Municipality's water
infrastructural pressure management, leak management, management system has associate degree economical thanks
to allot the water level of each corporation client. It avoids
and sensible water distribution system. This proposed work
collision between the corporation water users [8]. This
introduces some sensors to acknowledge leak identification planned IoT-based water management system acts
and water supply required identification. A sensible water proficiently and it types everyone with water property [9].
flow detector helps to spot the distributed water level at this The huge literature survey concerning IoT and municipality
time, exploitation the web of things transfers messages to water treatment are discovered within the following session.
alert the sufficiency and deficiency of the actual space. 2.Literature Review
Using RFID, the municipality workplace identifies the
distribution of water regional-wise. This IoT-based water The authors of [1] counsel Associate in Nursing
improved water management system for enhancing different
management system makes the water management system fuel management like hydrocarbon or chemical science. This
more adept and fewer wastage. methodology or approach is merely used for the varied
Keywords— Water management system, web of things, cooling lubrication applied, however it's a weaker show of
Water flow detector, RFID wastage of water management and outpouring management
[10].
1.Introduction
In [2] the scientist unconcealed the problems of water
Every year, the expansion of the population rate has earned management in chemical industries. Here, the author
immense in over. it should cause water deficiency and introduced the sensible Water Management System
increase pollution because of each industrial and agricultural (SWME) for the purification of water. This research work
usage. Earth has some water resources like groundwater, helps to cut back two hundredth of water wastage. it'll
river, lakes, and water wetlands. All on top of the water increase the economical setting in eco-manner [11].
resources depends upon the monsoon season rainfalls solely
[4]. So, water harvest management is a lot of necessitating Authors [3] exposed water management for industrial usage
treatment for the WAS. Municipal firms embrace their data and energy conservation functions. The model is integrated
to diminish the water deficiency downside. when the with interval two-stage random programming for reflective
inclusion of firms, they have some helpful techniques to system uncertainties. These uncertainties area unit related to
handle water abundance for his or her customers. In recent the commercial production feature and therefore the
decades varied numbers of water management techniques decision-making method. For the water-energy nexus, the
energy proposed is principally targeted on the consumption As shown in fig.1, the water flow detector evaluates the
intensity of water purification and transportation from number of waters flowing at a specific time or amount. Fig.
completely different water sources [12]. It also use the two describes the regulation of the research work. This RFID
variety of real time applications in different discipline [16- module is employed to authorize the individuals by their
35] name, door no, and address. that is employed to tag the actual
one that consumed water per day or week. This 4x4 input
3.Proposed System device is employed to approve the person by a word. It
A typical power offer is given to the Arduino UNO guarantees avoiding collision between the peoples and water
microcontroller. The empire-embedded sensors like water satisfies all the peoples in an equal manner. once the users
flow and RFID module area unit synchronal with the end their authorization, the motive force units offer the water
Arduino UNO microcontroller. This 4x4 input device is for the actual client. This paper conjointly interfaces with the
employed to position the corresponding security key by the LCD, that is employed to take in the number of waters
user [13]. liquid crystal display demonstrates the present distributed to a specific client. victimization the web of
water consumption and its knowledge concerning the things, this proposed module sends the message regarding
consumption level. Driver and therefore the DC pump act as the client detail to Municipal Corporation [15].
associate degree output terminal and area unit primarily
5.Results and Discussion
based upon the line of the RFID module. This RFID decoded
each shopper and its shows the licensed user and their Arduino UNO microcontroller is performance as a pivot with
address [14]. This effective diagram is shown in Fig.1 the detector and output units. approved water distribution
infixed C program embed with the Arduino microcontroller.
The water flow detector and RFID module square measure
biased by the microcontroller and it senses the quantity of
water content and approved person as a designed program
dependency. The time of the water flow are controlled by the
users and it monitors the extent victimization the web of
things. every one encompasses a distinctive water-smart card.
that helps to authorization of individual folks. This 4x4 input
device is employed to write and rewrite the user id and secret.
At the time of water flow, users place that RFID card into the
device and that is activate the actual motor. the quantity of
water distribution is displayed on the mounted alphanumeric
display. Fig. three indicates the authorization of the client that
displays the IoT model.
Abstract— Random Forest- RF, Support Vector Machine - temperature, atmospheric temperature, humidity, rain
SVM and Decision Tree - DT Machine learning classifiers conditions, soil pH, and plant water status, etc. The sink node
proposed and implemented to develop seed prediction model in will retrieve the data from farm sensor nodes from the local
Visual Studio code environment using python along with
advanced Wireless Sensor Network’s raino-meter sensor node. network. After that data will be transferred to web-based
Wireless sensor network's infrastructure consists of sensors and application or cloud via a wireless network. Based on this
nodes. Use of a wireless system has the potential for significant information, one can predict the crop.
savings of workforce, resources and time. By adding Soil pH, A data analytics approach with machine learning
Temperature, Humidity and Rainfall sensor in the network one technology significantly improves the prediction efficiency
can predict the crop seed to be cultivated in the current time by
analyzing the environmental conditions in the farm. Aim of this and can predict the best suitable crop seed accurately.
work is to develop model using data analytics and machine
learning techniques. Prediction model is trained on historic
II. RELATED WORK
environmental data of crops. Based on the history and current Agricultural crop recommendation systems which are
environmental data crop recommendation is proposed. Basic available on the marketplace considering variety of factors
data collection nodes with the sensor network provides the such as the weather conditions during plantation time, type of
required information about environmental parameters. soil, location (geological), atmospheric temperature of the
Random Forest- RF , Support Vector Machine - SVM and
location and so on. In this field variety of research work have
Decision Tree - DT Machine learning classifiers implemented
and results shows Random Forest is the best with 95.12 % been already completed and presented the subsidiary literature
accuracy, 94.94 % precision, 94.85 % recall and 95.12 % F1 and results of their end objectives even though the methods,
score. This system helps to provide the correct advice at the parameters taken into consideration are different but the
correct time. objectives are same.
Keywords—Smart farming, machine intelligence, sensor network, This connects GPS-coordinated sensors to the Internet that
seed prediction. can also be used to continuously analyze the crop [2-5]. The
work done in [6] confers the benchmarks and why they are
I. INTRODUCTION affecting into smart agriculture as a result of globalization.
Agriculture with advance techniques for smart farming Smart agriculture is farming that would help in water
used to improve the crop production as well as empowering conservation, soil nutrients maintenance, real time monitoring
farmers for facing critical environmental conditions. Smart and controlling despite the fact that precision agriculture has
farming, smart City, smart clinics uses internet of things – improved during the course of time some of the difficulties are
IOT.[1] In smart farming so many things have to consider like still exists. As previously said monitoring site-specific
water required for irrigation, workforce required and operations of such systems are necessary to get a better
resources [3]. Agriculture in India contributes major part in outcome. [7].
GDP. Agriculture help farmers for food security, nutritional Among the crops considered in the model for prediction in
security and for earning money. the study [10] were coriander, legumes, cotton, paddy,
sorghum, peanuts, sugarcane, bananas, and vegetables. When
The proposed model will consist of Wireless sensors projecting the crop characteristics like pH, depth, erosion,
network for data collection from farm field and arrangement permeability, texture, rain, water holding and soil color were
for collecting the data value information for further all taken into account. The technique employed was ensemble
processing , we will take ready database of different learning which combines the strength of two or more
parameters ( such as pH, Temperature, humidity, moisture independent models for improved prediction.
etc.) As an input for predictive algorithm. For current data In order to provide an accurate estimate of agricultural
collection, WSN based system will work to collect useful data yields the crops were evaluated and ranked according to the
for crop prediction. WSN collects data of soil moisture,
findings of the evaluation. This categorization was found Presently there are number of models available for
through the application of a variety of data mining techniques. recommendation of crops. But some of the ML models needs
This article provides a summary of numerous different datasets with more number of sample readings to give
classification methods, such as the K-Nearest Neighbor and accurate output label. Few models shows poor performance
the Naive Bayes models [11]. for larger number of data samples, few shows over fitting
errors. Random forest model shows good results with all
In this work [12] exploratory data analysis is proposed and
performance metrics also it reduces over fitting problems for
numerous different types of prediction models are explored by
larger datasets so preferred for model building.
their implementation. In order to recognize and evaluate each
property a sample data set is utilized and various different
System presented in figure 1 is composed of several
regression algorithms are applied. Several types of regression
phases where the first phase is hardware part of wireless
analysis including multiple linear, linear, and non-linear
sensor network which is used for obtaining the values of
regression as well as polynomial, ridge and logistic regression
temp, humidity, rainfall and moisture from the farm field. The
are explained in this paper. This article provides a comparative
collected parameters from each sensor node are then sent over
analysis of various data analytics algorithms.
cloud for further processing. Collected parameters from
In this study [13], the researchers separated the soil type, sensor nodes are sent over cloud through internet connection
groundwater level, rainfall, water availability and temperature using Wi-Fi module which is inbuilt on Node MCU along
into two separate datasets. One of the dataset consist features
such as rainfall and temperature, while the other dataset
consist features such as potassium, phosphorus and nitrogen
values as well as fertilizers, soil pH and organic carbon value
etc. In order to get the dataset ready, some fundamental
preprocessing steps were performed. The Naive Bayes and
J48 classifiers were utilized in the process of crop
recommendation. The ultimate recommendation achieved by
applying association rules to the classifiers' output in order to
get the best results. In order to train the model ten different
cross validations were employed. During the course of testing
number of metrics including Precision, ROC Area, Recall,
Accuracy and F-Measure were utilized. [14] Decision trees
are capable of classifying both numerical and categorical data
sets.
III. PROPOSED SYSTEM
. In this piece of work a model is proposed that has the
ability to predict the crop seed by using parameters such as the
present temperature, Soil pH, humidity and the rainfall. The
representation of the full system is shown in figure 1 is a
Fig. 2. Sensor Node
systematic depiction of the system.
REFERENCES
The confusion matrix for the SVM classifier for crop [1] Nurzaman Ahmed, Debashis De , “Internet of Things (IoT) for Smart
recommendation is presented in Fig 7. It is seen that there are Precision Agriculture and Farming in Rural Areas ” IEEE Internet Of
more number of misclassifications among different crops. Things Journal, Vol. 5, December 2018.
This is because the SVM classifier is unable to differentiate [2] Sebastian Gutierrez , Israel Martinez , Jorge Varona , “Smart Mobile
LoRa Agriculture System based on Internet of Things ” IEEE, Dec.
the input attribute values for the crops. The overall accuracy 2019.
in prediction of suitable crop by the SVM classifier is only [3] Sachin D. S. , Rohini R.P. , “Hybrid deep Q elman neural network for
74%. When the number of samples are increased the accuracy crop prediction and recommendation based on environmental changes
in prediction is further reduced. Compared to the DT and RF ” Concurrency and computation:Practice and experience, April. 2022 .
classifiers the SVM provided lower accuracy in prediction. [4] Omer Gulec, Elif Haytaoglu , Sezai Tokat, “A Novel Distributed CDS
Moreover the SVM included computational complexities in Algorithm for Extending Lifetime of WSNs With Solar Energy
Harvester Nodes for Smart Agriculture Applications ” IEEE Access,
the training time.
April 2020.
Though the running time of the RF is high the accuracy in [5] Jobish John, Vinay Palaparthy and Shahbaz Sarik, , “Design and
classification is better than the other considered ML models. Implementation of a Soil Moisture Wireless Sensor Network ” IEEE ,
April 2017.
Performance values in percentage are summarized in table I.
[6] Lakshmi.N, Priya.M, Sahana Shetty, and Manjunath C. R, Crop
Among the crops the jute, pomegranate and grapes crops Recommendation System for Precision Agriculture, vol. 6 Reading,
achieved the maximum classification rate compared to the IND: International Journal for Research in Applied Science &
other crops. The experiments suggests that when the input data Engineering Technology, 2018. [Online] Available:
are discriminative, the results in prediction are high and when www.ijraset.com.Ding, W. and Marchionini, G. 1997 A Study on
Video Browsing Strategies. Technical Report. University of Maryland
more than 2 attributes are similar there are some at College Park.
misclassifications. There are still more experimental studies [7] Remi Schmaltz, “What is Precision Agriculture”, April 2017. [Online].
needed to be carried out with huge datasets or with big data to Available:https://agfundernews.com/what-is-precisionagriculture.html
identify the most effective classifier. [Accessed Feb.23, 2020]
[8] S.Pudumalar*, E.Ramanujam*, R.HarineRajashreeń, C.Kavyań,
T.Kiruthikań, J.Nishań. “Crop Recommendation System for Precision
TABLE II. COMPARATIVE STUDY OF SV, DT AND RF CLASSIFIERS Agriculture”, ,2016 IEEE Eighth International Conference on
Advanced Computing (ICoAC),2016
Accuracy Precision Recall F1 Score [9] Yogesh Gandge, Sandhya “A Study on Various Data Mining
Classifier Name % % % % Techniques for Crop Yield Prediction” International Conference on
SVM Classifier 74 .00 74.67 74.32 74.25 Electrical, Electronics, Communication, Computer and Optimization
Techniques (ICEECCOT), 20017
DT Classifier 91.00 91.45 91.16 90.96
[10] S. Pudumalar, E. Ramanujam, R. H. Rajashree, C. Kavya, T. Kiruthika
RF Classifier 95.12 94.94 94.85 95.12
and J. Nisha, "Crop recommendation system for precision agriculture,"
2016 Eighth International Conference on Advanced Computing
(ICoAC), Chennai, 2017, pp. 32-36. doi:
In table II, RF model shows best results and also RF model 10.1109/ICoAC.2017.7951740.
reduced over fitting problem for larger datasets. Hence, it is [11] R. Kumar, M. P. Singh, P. Kumar and J. P. Singh, "Crop Selection
preferred for model building. Method to maximize crop yield rate using machine learning
technique," 2015 International Conference on Smart Technologies and
V. CONCLUSION Management for Computing, Communication, Controls, Energy and
Materials (ICSTM), Chennai, 2015, pp. 138-145. doi:
10.1109/ICSTM.2015.7225403
The proposed system in this research would Predict the [12] T.R. Lekhaa, “Efficient Crop Yield and Pesticide Prediction for
most acceptable crop seed. This work focus on the use of Data Improving Agricultural Economy using Data Mining Techniques”,
analytics and Machine learning techniques. The overall International Journal of Modern Trends in Engineering and Science
(IJMTES), 2016, Volume 03, Issue 10.
experimentations suggest that the ML models are able to
[13] Viviliya, B. and Vaidhehi, V., “The Design of Hybrid Crop
handle the huge number of data samples more efficiently than Recommendation System using Machine Learning Algorithms”.
the other algorithms. Among the implemented ML models the International Journal of Innovative Technology and Exploring
RF classifier is more effective in recommendation. As Engineering, 2019, 9(2), pp.4305-4311.
Random Forest classifier able to differentiate input attributes, [14] “How Decision Tree Algorithms work” available at
it has less computational Complexity in training time so faster, dataaspirant.com/2017/01/30/how-decision- tree-algorithm-work
RF classifier shows 95.12 % accuracy, 94.94 % precision, [15] Chen, Joy Iong Zong, and Kong-Long Lai. "Machine Learning based
Energy Management at Internet of Things Network Nodes." Journal:
94.85 % recall and F1 score 95.12 % ; So Random Forest is Journal of Trends in Computer Science and Smart Technology
the best for recommending best suitable seed In future we September 2020, no. 3 (2020): 127-133
aim to develop a model integrating ML and data mining that [16] Haoxiang, Wang, and S. Smys. "WSN based Improved Bayesian
can suggest suitable crop for cultivation based on different Algorithm Combined with Enhanced Least-Squares Algorithm for
Target Localizing and Tracking." IRO Journal on Sustainable Wireless
parameters. Also we aim to evaluate the model in all the Systems 2, no. 2 (2020): 59-67
aspects to provide detailed interpretations. [17] Atharva Ingle, “https://www. kaggle.com/ datasets/ atharvaingle/crop-
recom mendation -dataset”2020. 4I.
Abstract— A great deal of study has not been done on adaptive and self-learn ing intrusion detection model might be
machine learning techniques to identify inappropriate created by merging BPNN with SVM , wh ich would cut
activities in Vehicular Adhoc Networks (VANETs). down on the dependency on duplicate data and characterize a
Unauthorized vehicles have the likely to send erroneous
wide variety of traffic occurrences. On the other hand, they
messages across VANET, which can lead to a difficult situation
that cannot be avoided. This article describes a machine did not go to great length on the input feature.
learning technique to classify misbehaviours in VANET. The The researchers [6] have utilized machine learning
proposed strategy is based on the Least S quare Twin S upport methods to detect a wormhole attack, which is a type of
Vector Machine (LS TS VM), which the authors developed. Two routing attack in which packets are tunnelled to another node
of the mechanisms developed are called data based trust and then replayed in the network afterwards. The kernel
models (DTM) and vehicle based trust models (VTM). The neural networks (KNN) with Support vector machines
data based trust model is responsible for identifying fraudulent (SVM) were utilized in the development of the models, and
messages by employing a LS TS VM-based classifier that the results of their application to a data set that the authors
evaluates message content in conjunction with vehicle
had constructed were favourable. In [7], the authors
characteristics. The message propagation behaviour of the
vehicle is evaluated by the LS TS VM-based classifier utilized by
developed a hybrid EHCA-M DS (context-aware
the local VTM, which evaluation determines whether or not misbehaviour detection system), which integrated a
the vehicle may be trusted. Then, using the Dempster–S hafer supervised classifier model with unsupervised-based online
theory, the trust authority (TA) VTM will compile several statistical classifiers, multip le non-parametric, which allowed
different trust assessment reports that pertain to the same the system to detect inappropriate behaviour in a hybrid
vehicle and provide a comprehensive trust value. Compared to environment.
base classifiers utilized for classification, the LS TS VM Khot et al. [8] made a machine learn ing (ML) basis
approach is more effective in classifying a wide variety of to predict where a vehicle will be in the network in the
inappropriate behaviours that can be discovered in VANET. future. They compared the predicted values to the locations
given by the BSMs. Then used SVM with Modified Fading
Keywords—Vehicular Ad Hoc Networks, Least Square Twin
Support Vector Machine, data trust model, vehicle trust model, Memory, abbreviated as SVM-MFM [9], to identify
trust authority and Dempster–Shafer theory inappropriate behaviour in VANET co mmunications.
Technology offers a feasible solution for RSUs that require a
large amount of computational labour. The authors of [10]
projected a hybrid intrusion detection system (IDS) that uses
I. INT RODUCT ION
ANN (Art ificial Neural Networks) to imp rove the system's
The great mobility, large scale, and frequent accuracy and performance. In [11], the authors employed
topological changes that describe vehicular networks make SVM and Nave Bayes feature inserting as intrusion detection
them unique. Increased levels of cross -communication can techniques.
contribute to increased levels of passenger safety. They produced fresh, high-quality data to the
Connectivity to the VANET can be used in various original features. In addition, they applied the framework to
scenarios, such as when a collision occurs and additional several different datasets. A vehicle-RSU duo approach with
vehicles are approaching the area. VANETs are susceptible a merged feature set from successive BSMs is utilized in the
to a wide variety of security threats [1], each of which can proposed methodology for position falsification detection,
potentially put VANET performance and maybe even users' which is distinct fro m other methodologies already in use.
lives at risk. An attacker node may, for instance, simulate Several distinct ML techniques are used to differentiate
traffic congestion by claiming to represent several vehicles between genuine vehicles and those that are harmful. The
simultaneously, allowing the attacker node to conduct a following are the most important contributions made by the
Denial of Serv ice (DoS) attack by interfering with the usual work:
data dissemination. • First, based on the fact that the LSTSVM algorith m
However, the distance between the sending and can successfully manage binary nonlinear
receiving vehicles, speed, and reputation of the sending
vehicle were all ignored in Zhang et al. [4]'s message filter classification and possesses the features of high
based on BPNN, which did not consider message accuracy and greater routine, recommend a data
forwarding. It was hypothesized by Liu et al. [5] that an based trust model that is based on an LSTSVM -
(3)
(13)
The equation will tell you which hyperplane
corresponds to the ith class (15). Obtain the hyperplane for
each class by doing it in this fashion, which classifier can
predict the class k=n for a test feature 'x' by using the
distance D fro m each hyper-plane. It is assigned the class Fig.3.TPR results between proposed and existing
related to the hyper-plane situated at the position closest to methods
the value 'x.' The following is an examp le of the decision
function for the LSTSVM classifier:
(14)
IEEE.
92 [4]. J. Zhang, L. Huang, H. Xu, M. Xiao, and W. Guo, "An
incremental bp neural network based spurious message filter for
90 VANET ," in Proc. IEEE CyberC, Sanya, China, Oct. 2012, pp.
360–367.
88 [5]. Y. Liu, Y. Shi, H. Feng, and L. Wang, "Intrusion detection
scheme based on neural network in vehicle network," J.
86 Commun., vol. 35, no. 2, pp. 232–239, Nov. 2014.
1500 3000
number4500 6000
of messages 7500 [6]. P. K. Singh, R. R. Gupta, S. K. Nandi, and S. Nandi, "Machine
learning based approach to detect wormhole attack in
VANET s," in Proc. Workshops Int. Conf. Adv. Inf. Netw. Appl.
Fig.5.Accuracy results between proposed and existing Cham: Springer, 2019, pp. 651–661
method [7]. Haldorai and U. Kandaswamy, “Intelligent Spectrum Handovers
in Cognitive Radio Networks,” EAI/Springer Innovations in
Figure 3 shows that the TPR of LSTS VM begins to Communication and Computing, 2019.
rise significantly as the quantity of messages grows. As [8]. S. Murugan and Anandakumar H., “Study of Efficient Hybrid
Wireless Networks Using QoS-Oriented Distributed Routing
shown in Figure 4, the FPR of LSTSVM starts to go down
Protocol,” Cognitive Social Mining Applications in Data
when the percentage of malicious cars goes above 40%, and
Analytics and Forensics, pp. 213–235, 2019. doi:10.4018/978-1-
the number o f messages goes down. In Figure 6, the TPR o f 5225-7522- 1.ch011
BPNN and SVM -MFM goes down more gradually, [9]. F. A. Ghaleb, M. A. Maarof, A. Zainal, B. A. S. Al-rimy, A.
whereas, in Figure 4, it goes down more sharply with the Alsaeedi, and W. Boulila, "Ensemble-based hybrid context-
probability derivation (PD), reputation is regarded as the aware misbehavior detection model for vehicular ad hoc
conditional probability (CP), and it is the main influence of network," Remote Sens., vol. 11, no. 23, 2019, Art. no. 2852.
BPNN, which is the case even though BPNN is also [10]. Khot and M. Dave, "Position falsification misbehavior detection
pretentious by the reputation or the proportion of malevolent in VANETs," in Mobile Radio Communications and 5G
vehicles. As shown in figure 5, the influence of malevolent Networks. Singapore: Springer, 2020, pp. 487–499.
cars with an average reputation on LSTSVM is significantly [11]. Arulkumar, V., et al. "T ariff rate prediction for truckload based
on predictive analysis using machine learning." Int. J. Adv. Sci.
amp lified. LSTSVM has a pretty high level of accuracy, as
Technol 29 (2020): 5477-5482.
shown in Fig. 3–5. Th is level of accuracy is essentially
[12]. S. Sharanya and S. Karthikeyan, "Classifying malicious nodes
unaffected by the model's reputation or the fraction of in VANET s using support vector machines with modified
malicious vehicles. fading memory," ARPN J. Eng. Appl. Sci., vol. 12, no. 1, pp.
171–176, 2017.
IV. CONCLUSION AND FUTURE WORK
[13]. M. J. S. Aneja, T. Bhatia, G. Sharma, and G. Shrivastava,
An attack detection method for VANETs to guard "Artificial intelligence based intrusion detection system to
against fraudulent messages and message suppression is detect flooding attack in VANETs," in Handbook of Research
described in this work. First, a DTM based on LSTSVM is on Network Forensics and Analysis Techniques. Pennsylvania,
constructed to detect fake messages. The primary focus of PA, USA: IGI Global, 2018, pp. 87–100.
this model is the message itself and also the feature vector of [14]. Arulkumar, V., et al. "Super Resolution and Demosaicing based
self learning Adaptive Dictionary Image Denoising
the representation message provides data like event
framework." 2021 5th International Conference on Intelligent
descriptions and vehicle status. The results of the simulation
Computing and Control Systems (ICICCS). IEEE, 2021.
indicate that the message classifier that is based on LSTSVM
is quite successful. The proposed DTM is examined with the
assistance of several different decision logics, such as BPNN
contrasting remarks in Chinese and English individually. and categorized using text analytics and natural
Tweets are treated as a continuous stream of text using language processing.
both Chinese and English terms using a bilingual method. 2. Text Preparation: The extracted data needs to be
This bilingual approach analyzes the word stems in movie cleaned before analysis. Both non-textual content and
reviews posted on Twitter in order to generate feature analysis-relevant content are identified and removed.
vectors. Use SVM and N-Gram, two interchangeable
natural language models, to categorize tweets. 3. Sentiment detection: involves looking over the
extracted comments and concepts. Sentences
By examining attitudes in tweets regarding stocks, providing objective ideas (facts, factual information)
Smailovic et al. (2014) described a stream-based efficient
are eliminated, whereas sentences communicating
learning technique to forecast changes in stock price. This
subjective notions (opinions, views, and attitudes) are
approach, which is based on the Granger causality test,
asserts which is possible to predict changes in stock kept.
values many days in advance based on feelings stated in
tweets about stocks. This method divides the posted 4. Classification of Sentences: At this point, subjective
Tweets into three categories based on their sentiment: sentences are broken down into categories like
positive, negative, and neutral. Lau et al. describe a semi- favorites and haters, good and bad, positive and
supervised fuzzy product ontology mining method based negative, and others.
on social analytics (2014Conduct a fine-grained market
knowledge extraction to enhance product design and 5. Output Presentation: At its core, sentiment analysis
marketing strategies. The development of a general aims to turn unstructured text into information that
framework for stock price prediction by Li et al. (2014) may be used. Pie charts, bar charts, and line graphs are
provides a lexicon-based method for examining the effect used to present the text results after the analysis is
of news on sentiment dimensions. The general approach complete. Additionally, by creating a sentiment time
generates the sentiment dimensions using the Loughran- line with the chosen value, the remaining time can be
McDonald financial sentiment language and the Harvard calculated and graphically shown. (frequency,
psychology lexicon. percentages, and averages) as it changes over time.
Ortigosa et al. (2014) describes a Hybrid Method for IV.WHAT SENTIMENT ANALYSIS METHOD IS
emotional state-based adaptive e-learning system for
BEST? DOCUMENT, SUBJECT OR ASPECT
users. Obtain information from course participants that
teachers can use., particularly when adaptive systems are
being employed for online learning. The difficulty of It might be challenging to read people's written
anticipating the fundamentally concealed relationship emotions, especially when doing so in a large group. To
among the news posted and the exchange of stocks as a address this issue, a variety of sentiment analysis
main topic of Nassirtoussi etal(2015) .'s research. techniques are employed. Identification, evaluation, and
classification of people's feelings as positive (1), neutral
Recently, a variety of machine learning techniques, (0), or negative (-1) constitute sentiment analysis
such as SVM and probabilistic models, have been
proposed for text polarity identification. The curse of It helps businesses understand their brand
dimension, or the high dimension character of text, has perception, where parts of their product or business
produced a research gap despite stimulating require improvement, and how they may manage their
dimensionality reduction and feature extraction. Instead resources. To gather human reviews, a variety of polling
of dividing the massage into two phases, it makes more techniques are employed, including platforms for Voice of
sense to take the key ideas from each book. The feature Customer Analytics, Voice of Patient Analytics, and
set must be selected initially before feature values can be Voice of Employee Analytics. Even without such
extracted. Some methods to select representative word specialized tools, a corporation can nevertheless benefit
sets include chi square (Liang et al. 2014), local/global from social media sentiment analysis to learn important
document frequency, bag-of-words (Rong et al. 2014; information.
Balahur and Perea-Ortega 2015; Yan et al. 2014), feature
hashing (de Silva et al. 2014a; Rill et al. 2014), and
We will use specific examples to illustrate the
information gain (Habernal et al. 2014)
various approaches to sentiment analysis in this post. You
III.THE SENTIMENT ANALYSIS PROCESS can use this to decide which sentiment analysis technique
is ideal for you. Additionally, we'll examine the features
The time-consuming sentiment analysis procedure, that make Repustate's sentiment analysis API the fastest
which is used to examine sentiment data, consists of five and most precise in the sector and how it handles
different steps. They are as follows: See Fig. 1 ambiguous responses.
1. Data Collection: User-generated content from blogs, (A). Which Methods Are Used In Sentiment Analysis?
forums, and social media platforms is the first source
of information used in sentiment analysis. These facts Document-level, topic-level, and aspect-level are the
are transmitted in an erroneous manner and with the three different types of sentiment analysis techniques [1].
use of several words, slang phrases, writing styles, etc. Depending on the volume and complexity of the text data,
Practically speaking, manual analysis is impossible. these methods can be used. Let's take a closer look at
As a result, the data used in social media is extracted them.
human brain. A neural network has three stages: input, preferences based on their past decisions. As a result, it
hidden, and output, with a weight assigned to each node in a can assist them in customizing their products and services to
meet their specific needs. The following are the several SA evaluate their situation by considering popular support or
application domains depicted in Fig 3: opposition and adjust as necessary. This can be done by
monitoring how popular they become online throughout the
course of their careers. One approach to do this is through the
1. Health Care
use of social media platforms [15]. Finding the conclusion
The most popular area in this field is healthcare. It is
holder, linking the hypothesis to the issues, separating the
used to analyze the opinions made by users of various social
public folks, and implementation are some of the challenges
media platforms, including Twitter, Facebook, etc.,
in this discipline.
concerning their health. Health care professionals can use this
sentiment dataset to understand the emotions and issues of
their patients and to take appropriate action. This data can be 5. Analysis of Sports Sentiment
used by hospitals to evaluate their performance in perspective Nowadays, sentimental analysis can be used in many other
of patient expectations. It is easy to identify whether a sports. Sports fans want to communicate their feelings and
sentiment is favorable or negative by assigning each one a opinions on social media about how their team and players are
score. Furthermore, it can help medical facilities to determine performing. It can be used with the right statistics to evaluate
if patients are satisfied with their care or if there is space for the opinions of fans and their level of involvement with a
improvement. [17]. particular athlete or event. Examining US sports fans' tweets
on the FIFA World Cup 2014 has been used in research [19]
to measure their emotional responses to the game's holder,
who has the power to express his ideas implicitly. Irony is
most frequently found in online
networks and support vector machines. 6th Int. Conf. Audio, Lang. Image Process., 2018, pp. 109–
112, https://doi.org/10.1109/ICALIP.2018.8455328.
We put a lot of effort into creating new models that are [9] H. Parveen, S. Pandey, Sentiment analysis on Twitter Data-
better at evaluating emotional responses in people. In order to set using Naive Bayes algorithm, in: Proc. 2016 2nd Int.
Conf. Appl. Theor. Comput. Commun. Technol. iCATccT
summarize to any language while performing prediction 2016, 2017, pp. 416–419, https://doi.org/10.1109/
tasks, we also put a lot of effort into making these models ICATCCT.2016.7912034.
language independent. In order to do topic recognition and
[10] R. Feldman, Techniques and applications for sentiment
sentiment classification simultaneously using a single model, analysis, Commun. ACM 56 (4) (2013) 82–89,
the model can be created to operate in parallel mode. Expand https://doi.org/10.1145/2436256.2436274.
the strategy to include other OSNs, discover new methods and [11] R. Rodrigues, C.G. Camilo-Junior, T. Rosa, A taxonomy for
techniques for analyzing non-text signals, and attempt to sentiment analysis field, Int. J. Web Inf. Syst. 14 (2) (2018)
understand their underlying contents in order to protect the 193–211, https://doi.org/10.1108/ IJWIS-07-2017-0048.
organization's reputation. [12] B.A. Rachid, H. Azza, B.G. Henda, Sentiment analysis
approaches based on granularity levels in: WEBIST 2018 -
Proc. 14th Int. Conf. Web Inf. Syst. Technol., 2018, pp.
X. CONCLUSION 324–331, doi: 10.5220/0007187603240331.
[13] Z. Hailong, G. Wenyan, J. Bo, Machine learning and lexicon
The analysis of sentiments, thoughts, and opinions in
based methods for sentiment classification: A survey, in:
relation to particular topics, things, people, groups, and Proc. - 11th Web Inf. Syst. Appl. Conf. WISA 2014, 2014,
services is known as sentiment analysis. This paper gives a pp. 262–265, doi: 10.1109/WISA.2014.55.
detailed survey on supervised, unsupervised, and hybrid [14] J. Ramteke, S. Shah, D. Godhia, A. Shaikh, Election result
Sentimental Analysis approaches along with a recent research prediction using Twitter sentiment analysis, in: 2016
review. Various feature evaluation and classification International Conference on InventiveComputation
algorithms for SA are also reviewed in this research. The Technologies (ICICT), https://doi.org/10.1109/
inventive.2016.7823280.
evaluation of features is contrasted to establish the minimal
and optimal feature vector set. This paper also includes the [15] A. Kumar, A. Joshi, Ontology driven sentiment analysis on
social web for government intelligence, in: ACM Int. Conf.
issues identified during classification is that the simplistic
Proceeding Ser., vol. Part F1276, 2017, pp. 134–139, doi:
usage of only positive, negative and neutral groups. A 10.1145/3055219.3055229.
complete opinion's overall rating cannot be generated by
[16] S. Gohil, S. Vuik, A. Darzi, Sentiment analysis of health care
combining ratings from different lines or paragraphs. Dealing tweets: Review of the methods used, J. Med. Internet Res. 20
with snarky remarks, symbols, misspell phrases, and idioms (4) (2018), https://doi.org/10.2196/ publichealth.5789.
is still challenging. The existence of many languages and
[17] M.F. Tsai, C.J. Wang, On the risk prediction and analysis of
geographical contexts in social media posts makes it more soft information in finance reports, Eur. J. Oper. Res. 257 (1)
challenging to perform sentiment analysis with adequate (2017) 243–250, https://doi.org/ 10.1016/j.ejor.2016.06.069.
levels of consistency and accuracy. [18] A. Joshi, P. Bhattacharyya, M.J. Carman, Automatic sarcasm
detection: A survey, ACM Comput. Surv. 50 (5) (2017),
REFERENCES https://doi.org/10.1145/3124420.
[1] Kanika Jindal,Rajni Aron., A systematic study of sentiment [19] N. C. Dang, M. N. Moreno-García, and F. De la Prieta, “Sentiment
analysis for social media data, 2214-7853/© 2021 Elsevier Ltd, analysis based on deep learning: a comparative study,” Electronics, vol.
https://doi.org/10.1016/j.matpr.2021.01.048 9, no. 3, p. 483, 2020.View at: Publisher Site | Google Scholar
[2] Priyadharshini, V.M., Valarmathi, A. A novel spam detection [20] M. J. S. Keenan, Advanced Positioning, Flow, and Sentiment Analysis
technique for detecting and classifying malicious profiles in online in Commodity Markets: Bridging Fundamental and Technical
social networks Journal of Intelligent and Fuzzy Systems 2021, 41(1), Analysis, Wiley, Hoboken, NJ, USA, 2nd edition, 2018.
pp. 993–100
[3] S. Shayaa et al., Sentiment analysis of big data: Methods,
applications, and open challenges, IEEE Access 6 (2018)
37807–37827, https://doi.org/10.1109/
ACCESS.2018.2851311.
[4] Q.T. Ain et al., Radiotherapy is the gold standard in treating
bone malignancy. Effective in 50-90 % expectancy months,
8 (6) (2017).
[5] L. Yue, W. Chen, X. Li, W. Zuo, M. Yin, A survey of
sentiment analysis in social media, Knowl. Inf. Syst. 60 (2)
(2019) 617–663, https://doi.org/10.1007/ s10115-018-1236-4.
\
[6] X. Fang, J. Zhan, Sentiment analysis using product review
data, J. Big Data 2 (1) (2015),
https://doi.org/10.1186/s40537-015-0015-2.
[7] S. Naz, A. Sharan, N. Malik, sentiment classification on
twitter data using support vector machine, in: Proc. - 2018
IEEE/WIC/ACM Int. Conf. Web Intell. WI 2018, 2019, pp.
676–679, https://doi.org/10.1109/WI.2018.00-13.
[8] B. Sun, F. Tian, L. Liang, Tibetan micro-blog sentiment
analysis based on mixed deep learning, in: ICALIP 2018 -
Abstract—One of the most important technologies for also reducing signal attenuation, both of which are
future communications is the satellite network. Traditional important factors in cutting transmission costs.
geostationary orbit (GEO) satellite systems, on the other
hand, suffer from severe latency and high launch costs. As Although LEO satellite communication has some
a result, low-earth orbit (LEO) satellites have arisen as an advantages over other wireless communication
alternate approach to GEO satellites' inherent issues. The technologies, LEO satellites were constantly getting up
inter-satellite link (ISL) has been intended to deliver because of the distance coverage is low and about the
greater system performance and more reliable service in globe range at huge rates. Each LEO has a set amount of
tandem with the advancement of LEO satellite technology. time to provide services to users, which is frequently less
In addition, because of its high data rate and compact
than the length of the call. To ensure that the user's ability
terminal size, the optical ISL has been highlighted. In the
proposed system LEO satellite communication using
of calls, facsimiles, or the conveying message to
BPAM technique was employed for 5G transmission is communicate is not hampered, several or more satellites
based on the Orthogonal frequency division multiplexing is may be necessary during the user call procedure. When
a method of modulating a several different channels in a the present service satellite is no longer capable of
digital signal to reduce interference. providing proper service to the customers, it can be
replaced with a satellite of visible. Users are generally
Keywords-component: Low Earth Orbit satellite network, covered by many satellites at the same time due to the
Mobile phone, Packet data ratio, Average delay, Energy
peculiarities of LEO satellite constellations. The user must
consumption.
choose the satellites available at the current time while
I. INTRODUCTION starting a handover or a new call. Unlike the terrestrial
Satellite communications can enhance and increase wireless network, when using ground base station services,
the range of terrestrial communications by providing a user needs to be examined the signal strength by
continuous wireless signal coverage. Future wireless checking the range of the signal is capable of making a
networks are expected to use it. LEO communications, decision to connect the satellite communication.
which operate at altitudes ranging from 500 to 1500 km, Satellite network users were unable to choose a
have sparked widespread interest in recent years due to switching object depending on the signal strength obtained.
their potential to provide worldwide wireless connectivity Because in networks of satellites, different elements such
with increased data rates. On the other hand, its as the access satellite's ability to serve the user and
transmission signal is sent by medium- and high-earth orbit system's load balance must be considered. They
latency satellites is lower, allowing LEO satellites to reach correspond to a variety of strategies for handover,
greater bandwidth and real communication. Furthermore, including remaining service time. There are as many
the lower orbital inclination reduces the transmission alternative handover mechanisms as possible, such as the
power requirement by having the earth station antennas time left in service and maximum number of channels, as
and satellite must be in a highly directional way and while well as maximum received data and signal strength.
A. Bottcher and R. Wemer suggested an approach lines represent a possible relation (The satellite is capable
for selecting the handover satellite based on the highest of providing services to customers, but the quality of those
elevation angle for the satellite handover strategy. The services is currently poor). The connection at a time t, for
strategy's handover performance isn't flawless, however, example, can be expressed as G, where the characters X
because the satellite's maximum elevation angle may not and Y signify for user and satellite sets, correspondingly,
always match the real link quality. M. Gkizeli devised for with E standing for the user- satellite relationship of
satellites, there is a hard changeover technique and a connection The element is 1 if the user is linked to the
mixed channel adaptable handover method of which rely satellite; otherwise, it is 0. Information on the differences
on signal strength as a satellite handover standard. The in Various satellites and users have different service levels
highest maximum idle channels, longest visible duration, can be gathered.
and elevation angle were used to select satellites for new
A. CHANNEL QUALITY
call and handover services, with the impact of the various In this study, it is examined that the satellite can
influences of the combinations performance of the system simultaneously accommodate several single antenna users.
analysed. Wuen at proposed a theory-based on satellite A uniform array with antenna M is placed on the satellite,
handover that uses the lowest route approach to discover with the number of antennas indicated on x and y axis.
the user's optimum handover technique based on distinct Assuming a half-wavelength separation between the
satellite selection criteria assigning variable weights to the antennas. Because several wavelengths divide different
links in the satellite linked graph. In LEO users in space, it's fair to assume that the channels that
communications, selecting handover satellites is difficult. connect satellites and users are unconnected. A ray tracing
Considering a single aspect is obviously insufficient. To based channel model method was used to calculate the at
get the best satellite selection, some researchers advocated instant t and frequency, the downlink channel response
weighing many parameters. However, there is no between the LEO satellite j and user i. The number of
consensus on how to calculate the weight, when to initiate propagation pathways of user channels is determined by
the handover, or which indications to use. doppler shift, channel gain latency, where speed of light is
The weight of a particular the quality of the c, orbit's height is h, elevating angle is t, and A is
channel between the satellite and the user the moment, the atmospheric fading.
satellite's total amount of users is currently servicing, and B. REMAINING SERVICE TIME
the amount of power that the satellite can give to the user Satellites move around the earth at a faster rate,
determine the benefits of the user and the satellite. significantly faster than most users on the planet, satellite
According to existing LEO satellite handover strategies, movement is the primary cause of handover in LEO
the entropy method is employed to reduce this typical satellite communications. The quantity of service time a
multi-objective problem to a single objective problem, service that a satellite can give to consumers is a crucial
which serves as the foundation for users to access measure that is tied to the number of service handovers.
satellites. When compared to alternative strategies, the The earth station is in charge for determining each
simulation results reveal that this strategy has certain satellite's range of coverage to each site in its
benefits in terms of handover times, and has received administration to the study depends on the satellite
SNR, and system load balancing. constellation's predictability.
II. SYSTEM MODEL When a user requires communication system access
Satellite communication will predominantly consist in they can send data to the earth station about their location,
the future of LEO satellites, as communication which will return a 2uN the initial row of a dimensional
technologies progress. As the orbital altitude decreases, matrix elements representing the second line element, as
satellite’s speed increases while their service range well as the satellite j's coverage start time in the area
decreases. The number of satellites must increase in order representing the coverage end time of arrival of satellite j
to achieve worldwide coverage requirements. From the in the area i, N being the constellation's number of
standpoint of the user, there are frequently many satellites satellites. As a result, at instant t, the satellite j's
accessible for users to access at any given moment. In this remaining service period to user I.
study, we measure the user's satisfaction with the satellite
C. NUMBER OF USERS
service.
Communication pervades many various facets of
The interactions between satellites and their users are people's lives. As the number of different communication
fluid from the standpoint of the system. We divided the terminals develops at an exponential rate, the pressure on
period into n time frames to make research easier. The link satellites becomes increasingly heavy. One of the
can be deemed fixed and expressed by a graph structure in reference variables when consumers evaluate satellite
each time slot. User’s access and handovers are handled access should be the number of users serviced by
consistently by the earth station. The solid lines reflect the satellites, to avoid an inequitable situation in which
real users and satellites are connected, while the dotted
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 341
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
certain spacecraft is congested while others are call, as well as the related sub cell ID, for each day of the
underutilized, wasting satellite resources. The total week.
amount of users of the satellite service at any given time. C. At the conclusion of each day, it will calculate the
E denotes the matrix of connections between two points, total number of calls and total call time.
the user and the satellite and N max has the maximum D. The database remembers the cell ID and the
capacity of the satellite. associated time whenever a MN changes cell. As
D. SATELLITE POWER DISTRIBUTION
previously stated, an appropriate timing table must be
Satellite power is frequently limited, therefore maintained to manage these data.
satellite power is very precious. To make the most of B. TIME AREA CONSTRUCTION
satellite power, we plan to assign power adaptively based
In order to create the temporal space, the BPAM
on channel circumstances. In order to maximise the
approach divides the Earth's surface into numerous cells,
transmission rate, If more power to the channel will be
each of which is divided into several sub-cells. Every
allocated, and Less power if the transmission is bad will
sub-primary cell's cell is at the centre. A geographical
be allocated. This work uses the system's total channel
zone ID is assigned to each parent cell. A TAI is also
capacity at the moment t, N is the channel strength
present in each sub-cell. Though the TAI of different sub
between user I and satellite j, and is the noise spectral
cells of different cells is the same since every TAI sub
energy density. Apply the Lagrange multiplier approach
cell is made up of its corresponding TAI cell, the TAI of
to obtain the global optimum solution.
different sub cells of different cells isn't. This is
frequently done to avoid a large TAI variance. The two
types of time zones that will be discussed right now are
III. PROPOSED MODEL
fixed and dynamic time zones.
In this research paper 5gbpam, we present Bipolar A. Fixed-time region: Once the earth's surface has been
Pulse Amplitude Modulation (BPAM), a new mobility partitioned, all MNs are similar in a constant-time
management technique for IP satellite networks that region- based fully contraction. Each MN is assigned to a
combines the notions of precise and flexible position Home Cell, which is where they will spend the
control at different times of the day. The following facts majority of their time during the week. It's also linked
back up the study's core argument. Based on previous to your personal sub-mobile, where you spend the most
investigations, the MN has a signal movement pattern of your time. Overseas sub cells are additional sub cells
like that it follows after. The maximum MN spends the in the host mobile. Alien cells are cells that are in a state
most time if an IP addressing system is employed based of relaxation. An MN's neighborhood and primary sub-
on a ground station's real-time coverage region. Most cells may or may not be the same.
time in each cell in a day. During sleeping hours, for B. Dynamic time area: Each cell in a dynamic time area
example, people spend the majority of their time at home. is formed using the database of each MN, guaranteeing
The majority of mobile users spend the most of that the main sub-cell and local sub-cell of each MN are
their time idling. However, if we look at the call lists of equal. Because each MN has a new cell and a relative
any MN over the course of a week, we can observe that sub cell, this form of the temporal area building is
each MN has a distinct busy and idle time of day. The difficult. Only the BPAM fixed time zone construction
quantity of calls received during sleeping hours, for type will be used in this situation.
example, is smaller than during working hours.
Depending on MN movement and the quantity of calls C. MOVEMENT DETECTION
received in MN from these two areas, the entire 24 hour Minnesotans are likely to have a GPS receiver to
period is divided into two halves. help them locate their cell phone. Motion detection can
be done in two ways for two different texts.
A. BPAM METHOD DESIGN
Database creation, movement detection, Because the active phrase applies correct position
registration, and connection setup, as well as timing area management, every time an MN travels, that is, to a
construction, are all part of the BPAM method's design. different cell or sub-cell, it registers itself via a binding
In this PAM not used for this communication application update. The MN's location is determined by its IP
because It only uses the non-negative amplitude levels. address, which includes information about its primary
For each MN, a database with the following attributes and secondary home cells.
must be created. To put it another way, we build a pager-like system
A. It will be a weekly database, which means that it will using free location management. Because when the
be updated every week. parent sub-cell of a parent cell changes, an MN is not
B. It will provide the starting and finishing times of each required to register. You must, however, register when
changing the source cell. The number of connection
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 342
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
updates is reduced in idle mode because to the rarity of Step 6: Whenever the MN gets a handover demand, it
MN movement. According to the GPS, this comment advances it to the accompanying Local Forwarding is an
contains a Minnesotan. GPS is utilised to determine your energy efficient scheme.
location when you get a message. The database also
F. LOCAL FORWARDINGS SYSTEM
contains the cell ID and sub cell ID. As a result, MN is
the communication's intended recipient.
At the point when a handover happens, a lively MN
D. REGISTRATION advises its new AR of the old AR's area at the hour of the
There are two types of registration procedures to move. In the wake of getting this message, the new AR
choose from. It detects when an MN changes its home illuminates the old AR that the MN has effectively
sub cell or home cell for the active phrase. The idle finished a handover. Therefore, the old AR sends parcels
phrase is registered when an MN switches its home cell. bound for the hub to the new AR. Since the MN, the new
MN's location is managed via the suggested BPAM AR, and accordingly the old AR are only trading control
approach based on time. The connection with care must messages during this sending approach.
be treated whenever a handover occurs in an ongoing ADVANTAGES
call, as well as anytime it changes its sub cells or cells, 1. The foremost advantage of this strategy is that it
because it is employed that both precise and loose combines the advantages of both precise and
location management at the same time. Another thing to unintentional location management. As previously noted
keep in mind is that whenever a new connection is ready in the preceding work, the constraints of employing one
to be established, it is needed to track down the MN and mobility management technique are overcome by
create a line of communication with her. The following combining both mobility management systems at the
BPAM method must be used to lay out an association identical time.
and play out a flawless handover. 2. Divide the entire amount into active and idle periods
E. ALGORITHM OF BPAM supported the activity. At anybody time, not all MN is
active. The number of binding updates is decreases as a
The BPAM algorithm can be explained with the step
consequence.
by step procedure as stated below:
3. Many MNs now work at night because the quantity of
Step 1: When a communication request is disturbing night employees in workplaces expands as a result of
to an MN, the algorithm looks within the database for the the fast- growing IT sectors. As a consequence, the
MN's phrase, which indicates whether it's active or idle. entire binding update management procedure could
even be completed in as little as 24 hours. The number
Step 2: Assuming the MN is in the dynamic expression
of binding updates generated. As a result, the duration
mode, it'll examine exact area the board; on the off
of a single burst is reduced.
chance that not, it'll talk about free area the executives.
Step 3: Because the MN is now in precise location IV. SIMULATION RESULT
control, its location is additionally immediately To assess the BPAM approach's performance, it
ascertained by looking up its IP address. As a result, is compared to MIP and Handover Independent Mobile
putting in place a different relation to the MN is IP. To evaluate each option, the value of handover is
straightforward. used. The results of the simulation were run employing a
network stimulator. The satellite coverage zone is taken
Step 4: The channel between the two communication
under consideration to be square, with surfaces that
MNs alters when it gets a handover request, potentially
cherish those of a 650-kilometer- radius circle. Node
causing the nodes to disconnect. To require care of the
density is calculated by dividing the absolute number of
connection working well, several adjustments are
hubs separated from the all-out region covered. The
necessary kind of handover techniques are developed to
effect of cell shapes on administration costs is
beat this issue. The identical basic routing strategy can be
overlooked with the end goal of effortlessness, and cells
used that was previously taught for Mobile IP because the
are viewed as square. A paging region is made in Mobile
locations of MNs are precisely monitored here. MIP is
IP by joining the inclusion areas of four satellites: one
that the identical thing.
satellite and its four neighbours.
Step 5: MN's position may now be discovered using
Each satellite is within the identical orbit because of
GPS because it is not meticulously maintained. The
the one preceding it, and their orbits are contiguous.
programme then analyses the database to establish the
Within the recommended strategy, however, is reliant on
MN's true location, i.e., which cell and sub cell it lives in.
the cell size. The results of the simulation are in shown
Communication is now straightforward, as previously
Fig.1. In terms of cost, the suggested approach beats,
said.
what's more, an MIP that is autonomous of the
handover. More modest square-formed cell lengths have
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 343
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
a higher administrative cost. Because of the quick health risk. To estimate the amount of bandwidth saved by
restricting updates that happen when an exorbitant adopting FMC, the Mobile Bandwidth Saving Estimate
number of portable hubs, cross the cell limit, this is a model was designed. An estimate of bandwidth saved is
typical event. formed supported the number of mobile users and their usage
habits. it has been proven that by employing this strategy,
Table 1: Parameters of the Satellite
70% of the spectrum is also conserved.
Satellite coverage area 800[km] REFERENCE
Radius
[1] U. Siddique, H. Tabassum, E. Hossain, and D. I. Kim,
Satellite ground Speed 8[km/sec]
“Wireless backhauling of 5G small cells: challenges and
8[km/sec] 18[km/sec](60km/hr) solution approaches,” IEEE Wireless Commun., vol. 22, no.
Active Phrase duration 12hr 5, pp. 22-31, Oct. 2015.
[2] T. Wang, S. Wang, and Z. Zhou, “Machine learning for
Α 16% 5G and beyond from model-based to data-driven mobile
Λ 0.0009 wireless networks,” China Commun., vol. 16, no. 1, pp. 165-
Number of nodes reside in 106 175, Jan. 2019.
the coverage area
[3] X. Ge, H. Cheng, M. Guizani, and T. Han, “5G wireless
∆t 1sec backhaul networks: Challenges and research advances,”
HMN,LD 2 IEEE Netw., vol. 28, no. 6, pp. 6-11, Nov./Dec. 2014.
HAR,AR 1 [4] Y. Ruan, Y. Li, C. Wang, R. Zhang, and H. Zhang
S 5 “Performance evaluation for underlay cognitive satellite-
terrestrial cooperative networks,” Sci. China Inf. Sci., vol.
61, no. 10, pp. 1-11, Oct. 2018.
[5] Z. Zhang, Y. Li, C. Huang, Q. Guo, L. Liu, C. Yuen and
Y. Guan, “User activity detection and channel estimation for
grant-free random access in LEO satellite-enabled Internet-
of-Things,” IEEE Internet Things J., vol. 7, no. 9, pp. 8811-
8825, Sep. 2020.
[6] N. UL Hassan, C. Huang, C. Yuen, A. Ahmad, and Y.
Zhang, “Dense small satellite networks for modern terrestrial
communication systems: benefits, infrastructure, and
technologies,” Wireless Commun. Mag., vol. 27, no. 5, pp.
96-103, Oct. 2020.
[7] C. Huang, A. Zappone, G. C. Alexandropoulos, M.
Fig:1 Management cost Vs Square-shaped cell length
Debbah and C. Yuen, “Reconfigurable intelligent surfaces
V. CONCLUSION for energy efficiency in wireless communication,” IEEE
The BPAM, which minimises the value of handover, is Trans. Wireless Commun., vol. 18, no. 8, pp. 4157-4170,
shown during this study. After that, the phrase handover is Aug. 2019.
presented, likewise because the challenges that include it in [8] B. Di, L. Song, Y. Li, and H. V. Poor, “Ultra-dense LEO:
satellite communication. Then it is tested that MIP, P-MIP, Integration of satellite access networks into 5G and beyond,”
Handover independent MIP, and other IP protocol IEEE Wireless Commun., vol. 26, no. 2, pp. 62-69, Apr.
management solutions. After that, it is necessary to went 2019.
over the suggested task and its advantages of the worth
analysis of diverse mobility management systems, [9] M. Werner, A. Jahn, E. Lutz, and A. Bottcher, “Analysis
furthermore as a comparison to the following component of of system parameters for LEO/ICO-satellite communication
the research provides access to the planned work. A networks,” IEEE J. Sel. Areas Commun., vol. 13, no. 2, pp.
simulation result of several mobility management approaches 371-381, Feb. 1995.
with the planned works is also presented to facilitate the [10] Madhavendra Richharia, “Satellite constellations,”
value analysis. It demonstrates that the BPAM technique Mobile Satellite Communications: Principles and Trends,
outperforms alternative IP protocols. As a result, it will be Wiley, 2013, pp.37-87
able to use it in the IP networks as a future satellite
communication channel. As a bonus, this method reduces [11] D. C. Beste, “Design of satellite constellations for
optimal continuous coverage,” IEEE Trans. Aerosp.
human exposure to radiation, which has been identified as a
Electron. Syst., vol. AES-14, no. 3, pp. 466-473, May 1978.
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 344
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
Abstract—One of the most essential self-configuring and data loss. A high end-to-end delay is caused by node failure in a
independent wireless networks is the MANET. MANET employs MANET network. To study the selfish node attack, a malicious
a large number of intermediate nodes to exchange information selfish node is put into the network, and a trust-based algorithm
without the need for any centralized infrastructure. However, for the selfish node attack is also suggested.In order to discover a
some nodes act in a selfish manner, utilizing the network's solution to this issue, we have developed an algorithm called
resources solely for their own benefit and refusing to share with S NRM for the detection of selfish nodes. The routing protocol
the surrounding nodes. Mobile ad hoc network se curity is a used in this paper for analysis is AODV. Using a simulation tool,
critical factor that is widely accepted. S elfish nodes are the PDR and end-to-end delay are evaluated and compared.
primary problem of MANET. In a MANET, nodes that are only
interested in themselves do not involve in the process of packet Keywords—Adhoc, MANET, Routing protocol, selfish
forwarding. A node can be identified as selfish or malicious due node,Trust, Trust-based algorithm,W ireless networks.
to some misbehavior reasons. S elfishness on the part of network
nodes may be a factor in the low delivery ratio of packets and
I. INTRODUCTION trust model is essential for planning secure connection
pathways in order to carry out the packet forwarding strategy.
Wireless communication is currently being adopted by
mobile users who work independently.The mobile nodes are In a MANET, each node has a certain amount of energy
able to communication directly with other nodes as long as and bandwidth. It is necessary for it to transmit the packets to
they all have the same radio. If they don't, they need to the other nodes, which causes it to consume both power and
communicate with one another through the intermediate bandwidth. Because of energy limits, every node in a network
nodes. The term "mobile ad hoc network" (MANET) refers to can become a selfish node[3]. There are three categories of
a group of interconnected mobile nodes that make up the nodes in a MANET network, including selfish, normal, and
network without a central controller[1, 2]. The topology of the malicious nodes. Nodes that are considered to be normal are
network is in a constant state of flux due to the fact that the those that do not cause any disruptions to the network's usual
nodes are constantly switching places and re-organising activity and correctly transmit all of the data packets.
themselves in order to keep communication going despite the Malicious nodes may remove data packets, obscuring their
physical distance between them. Accordingly, packets are identity, wasting the energy of other nodes, and interfering
routed from one node to another using a node as a router. with the operation of the network. Alternatively, they may
send data packets in the wrong direction instead of sending
Cooperative event of packet forwarding is currently them along the right route. The selfish node doesn't help with
utilized way for ensuring the reliability of time dependent the sending of packets. Selfish nodes only try to keep in touch
actions. Due to the dynamic nature of a MANET, however, with other nodes when they need to. The features of selfish
packet forwarding is a critical operation. If the intermediate nodes are as follows: a) they do not engage in the routing
relaying nodes that are picked during the setting up of the process; b) they do not respond to or transmit hello messages;
route between the starting node and the target node are not c) they delay the RREQ packet on purpose; and d) they drop
selected appropriately, then there is a high probability that the data packets. To improve the performance of the network, the
link will fail. Also, link failures cause more packets to be lost, Selfish node should be found and taken out of the network.
which increases the number of retransmissions. This has a big The selfish node is one that does not share its resource with
impact on the throughput and energy efficiency of the packet other nodes in the network because it wants to use those
forwarding strategy. The MANET's nodes are autonomous, resources for itself.
and its energy and memory resources are typically
constrained. This causes a node to become self-centered, and it II. RELATED WORK
will only participate in communication if it provides the node The proposed method states that a selfish node must not
more benefits than expense. The potential for the development allow other nodes to use its memory for copy storage [4]. To
of self-centered nodes positioned in the middle of other figure out how selfish a node is, each node adds up the credit
significant networking constituents leads to a distraction of the risk information of other nodes. Selfish allocation systems cut
generally sent information as well as the performance of the down on communication costs and use a safe hill cypher
network in terms of both energy and safety. As a result, the algorithm to ensure that replica data is kept secure.
Utilizing community-based and context-based information conditions of the algorithm, adaptive perturbation strategy,
about the node, the SENSE method provides detection of neighbour selection strategy, and wireless sensor network are
selfish nodes[5]. Through the application of intensive used to generate the globally optimal solution.
mechanisms, the value of the node will increase so that it can
take part in the network[6]. You may determine the selfishness III. Selfish Node Behaviour
of a node by using its unselfishness value. The mobility model Selfish nodes avoid sending hello packets to other nodes.
is based on the concept of a "home-cell community." The selfish nodes do not forward RREP messages. The selfish
A method is presentedin which a trust table containing the nodes don't send data messages to other nodes. RREQ
global trust state of all nodes is maintained by each node. The messages have a delay when being forwarded by selfish nodes.
selfish nodes are identified based on their trust value and their Selfish nodes ignore RREQ messages.
threshold for selfishness[7]. Their neighbours can utilize this
knowledge to avoid doing any kind of activity with the selfish
nodes, whether forwarding or any other type of supportive
function.
Three detection methods are proposed to enhance the
selfishness avoidance protocol's capacity to identify selfish
nodes and hence increase the number of legitimate rou tes[8].
These three methods are called reset activity mode, warming
mode, and reset failure mode. The investigation of the
suggested procedures is carried out using the protocol
developed by TEAM and Marti.
Token based umpiring technique was used to suggest a
method for detect and reduce selfish nodes in MANETs [9]. It
is a technique called token-based umpiring, in which each
node in the network needs a token in order to take part in the
network, and the nodes that are adjacent to each other operate
as umpires. Umpire nodes will keep an eye on node activity Figure 1 Selfish Node Attack
and notice if any node is acting inappropriately. It works very
well because it takes less time to find problems and has less Fig. 1shows the selfish node attack, in that the source nodeA,
overhead. destinationnode F and the node E is the selfish nodewhich
drops the packet between the intermediate node D
A rapid model is provided to analyse the selfish node &destination node F.
discovery in MANET utilising a watchdog strategy. They
calculated the detection time and cost of the collaborative
IV. PROPOSED MODEL
watchdog method for detecting a selfish node[10].
[11] The method that is being proposed, which makes use In this paper, In the proposed SNRM architecture, each
of reinforcement learning.The approach chooses the node node maintains a neighbour table that comprises RREQ packet
depending on transmission delay and success.The selects the forwarding information, as shown in table I.In the neighbour
best group with the biggest reward on its activities for table, you'll find data like the battery's remaining charge.This
transmitting the information and favours with the node is responsible for recovering the individual's remaining
neighbouring node of very small distance to the destination as battery from the previous node.
the next hop to set up as shortest path.Further, each node's
Neighbour Number of Battery S elfishness Total
mobility is predicted by setting up a structure with multiple
Address RREQ Life packet
states and assuming that mobile nodes could be in any one of Packet forward
those states, even when they're moving, and acting according forwarded ed by
to how things are done in that state.This makes it possible for node
mobile ad hoc networks to set up stable short paths based on
reinforcement learning.
Tables 1. Neighbour Table
[12]When the routing protocols are utilised, certain routing
algorithms can cause an uneven consumption of energy at the the Selfish Node Removal using Model (SNRM) algorithm.
nodes of the network.This can be solved by employing The node's reputation is determined to prevent selfish nodes
intelligent optimization algorithms such as ACO and dynamic from participating in routing. The current energy level of a
optimization.Using a smart ant colony optimization and node and the communication ratio of that node are both taken
planning protocol for routing, the network's energy into consideration when determining that node's reputation.
consumption is optimised and a global optimal solution is The source node 'O' and destination node 'S' are set, and the
discovered by partitioning the network's areas based on sender node initiates communication. Assuming that both 'O'
latency and energy.Utilizing machine learning to analyse and 'S' are within communication range, the node will look at
energy patterns and further reduce energy use in these the 'O' and ‘S’ reputation value, and if there is a match, the
networks.The jump probability is calculated by taking into transmission will occur and the system will be updated. In the
account both the location of the node and the node event that both 'O' and 'S' do not fall within the
transmission area. communication range, then 'O' will send control packets to its
neighbours and wait for reply messages to arrive. In this case,
This area is then divided in order to search for potential the checks on reputation are a little bit difficult due to the fact
nodes while taking into account both the delay and the energy that selfish nodes do not easily reply to the messages that are
of the divided area.In conjunction with the smart ant colony sent. As a result, the communication ratio between nodes is
optimization algorithm, the characteristics of the termination calculated by combining the sent request message and the
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 347
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
received reply message. 2. Examine the communication range for 'O' and 'S.'
3. If O and S are part of single-hop communication, it is easy
to send data.
A. Communication Range
4 If 'O' and 'S' do not lie inside the communication range then
Request and response routing messages sent between
"O" communicates with its neighbours by sending "RQ"
nodes in a communication network are used to determine the
communication ratio between them. The difference in the 5. Reputable nodes are those that reply to O's 'RQ' message.
number of Route reQuest (RQ ) messages that were sent to a 6. Now examine CR and the energy values of reputable
specific node and the number of Route Reply (RR) messages nodes.
that were not sent in response to a received 'RQ ' message is
what is used to calculate the CR for that particular node. 7. IF CR>80% and energy higher than threshold values
choose a higher residual energy node for Data
Therefore, CR is calculated using equation Transmission.
8. otherwise, that node is Selfish node.
[ ] ------------- Eqn(1)
9. Repeat the steps until you reach "S" Destination node.
10. End
where RQ indicates the total number of request messages O as originenode,S as sink node,RQ is route request.
that were transmitted from the node O and RR indicates the
total number of reply messages that were received by the node
O.
B. Detecting Selfish Node
The 25% of the initial battery capacity is used to determine the
battery threshold, which results in the introduction of the
residual battery threshold.
C. Energy Factor
After identifying the neighbour nodes, the energy levels for
each node are checked, together with the 'RR' message. When
choosing the next relay node, one of the criteria that is taken
into consideration is the energy with the highest value. Within
the framework of the routing process, the procedure of
selecting the node that has the maximum energy and the
highest communication ratio is chosen. The nodes given in the
route are chosen to transfer the detected information from 'O'
to the destination node 'S'. The nodes' energy levels are
compared to the threshold values after the threshold energy
has been set. Fig.2: Detailed communication
Simulation is an essential part of the process of developing AODV:Since selfish nodes are not recognised and
MANET protocols, and SNRMis superior to both AODV in separated in AODV, their existence in the network will
terms of both performance and security Then evaluate how result in higher retransmission, and packets will arrive at
AODV and E-AODV fare under similar conditions. their destination significantly more slowly.
1. Packet Delivery Ratio (PDR): is the ratio of the total SNRM: Because selfish nodes are identified and isolated
number of packets sent by the source to the total in SNRM, packets will be sent quickly and readily to other
number of packets received at the destination. It nodes, and it will take significantly less time to route the
characterizes the correctness and effectiveness of ad packets to their final destination.
hoc routing protocols by measuring the loss rate as
observed by transport protocols. Figure 1 illustrates a
comparison between the existing method and the
2.9 AODV
suggested proposed method. The number of nodes is
represented on the x-axis in this graph, while the 2.85 SNRM
packet delivery ratio as a percentage is shown on the 2.8
E2E Delay (sec)
10
network are successfully delivered. This information may
9.99 travel over a logical or physical link or go through a specific
9.98 network node. Bits per second (bps) is the standard unit of
9.97 measurement for throughput, however bytes per second (bps)
AODV
and data packets per time slot (bps) are also common. When
9.96 SNRM illustrated in Figure3, as the number of nodes in a network
9.95 increases, the throughput decreases. When nodes behave
selfishly and discard the routing packets of other nodes, the
9.94
network's average throughput drops. In figure3 The diagram
0 20 40 60 80 100 demonstrates that the proposed approach improves the
No. of Nodes network throughput when there is a s elfish node in the
network.
AODV:Selfish nodes in AODV won't share their data with
Figure 1. .PDR(%) vs selfish node percentage others, hence the protocol's throughput suffers. This is because
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 349
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
the selfish nodes won't transfer the packets to other nodes and by the inappropriate actions of selfish nodes. The selfis h nodes
will instead keep discarding the packets, requiring more don't take part in the routing process, so the packet is held up
retransmissions. and dropped on purpose. These selfish node mis -behaviors
will have an impact on efficiency, dependability, and fairness.
SNRM:In SNRM, the following is true:-Because selfish
The selfish node uses the resources for its own benefit, but it
nodes are cut off from the rest of the network, more data can
does not make any effort to distribute those resources to the
be transferred from one node to another in the same amount of other nodes. Therefore, it is essential to identify the selfish
time.
nodes in the MANET. In order to efficiently identify the
selfish nodes, this research s uggests a new approach. The
SNRM method that was recommended is an efficient method
160 that helps to improve the functionality of MANET. It
T 140 considerably enhances performance parameters including PDR
h and detection ratio. In addition to this, it reduces the overall
120 overhead, as well as the latency and the percentage of dropped
r packets. In MANET, the suggested method is able to detect
o 100 selfish nodes with greater accuracy than the AODV method
u 80 that is currently in use. The potential improvement can be
AODV achieved in the future by giving security to the neighb our
g 60
SNRM node. By doing this, the neighbour node is protected from the
h 40 selfish node's compromise.
u 20
REFERENCES
t 0 [1] K.Vanitha, A.M.J.Md.ZubairRahman and K.Anitha,”An Analysis of
10 15 20 30 40 50 55 60 Issues in Security and Routing Protocol in MANET,” International Journal of
Engineering Research & Technology (IJERT), Vol. 3 Issue 1, Page No: .1594-
No of Nodes 1599, 2014.
[2] K.Vanitha& A. M. J. ZubairRahaman ,”Preventing malicious packet
Figure 3. Throughput vs. No of Selfish Nodes dropping nodes in MANET using IFHM based SAODV routing protocol”,
Cluster Computing, Page No: 1-9,2018.
Residual Energy [3] Y. Yoo, S. Ahn, and D. Agrawal, “A credit payment scheme for packet
The value of energy that is left in the node after the forwarding fairness in mobile ad hoc networks”, In Proceedings of IEEEICC,
volume 5, pages 3005 – 3009,May 2005.
transmission of a given level of data packets for the next set of
routing processes is referred to as residual energy. This value [4] Muthumalathi, N., and M. Mohamed Raseen. "Fully selfish node
is needed for future transmission of the data packets. detection, deletion and secure replica allocation over MANET ." In Current
Trends in Engineering and Technology (ICCTET), 2013 International
Commonly, the process of sensing and conveying the Conference on, pp. 413-415.IEEE, 2013.
information uses up the node's energy level. Since the data is
[6] Ciobanu, Radu-Ioan, CiprianDobre, MihaiDascălu, ŞtefanTrăuşan-Matu,
handled by high-energy-level nodes, the proposed protocol and ValentinCrist ea. "SENSE: A collaborative selfish node detection and
uses less power than traditional. incentive mechanism for opportunistic networks." Journal of Network and
Computer Applications 41 (2014): 240-249.
.
[7]Subramaniyan, Senthilkumar, William Johnson, and
KarthikeyanSubramaniyan."A distributed framework for detecting selfish
nodes in MANET using Record-and T rust-Based Detection (RT BD)
technique."EURASIP Journal on Wireless Communications and Networking
2014, no. 1 (2014): 1-10.
[8] Rodriguez-Mayol, Alberto, and Javier Gozalvez. "Reputation based
selfishness prevention techniques for mobile ad-hoc networks."
Telecommunication Systems 57, no. 2 (2014): 181-195.
[9] Kumar, Jebakumar MSP Josh, AyyaswamyKathirvel,
NamaskaramKirubakaran, PerumalSivaraman, and MuthusamySubramaniam.
"A unified approach for detecting and eliminating selfish nodes in MANET s
using T BUT ."EURASIP Journal on Wireless Communications and
Networking 2015, no. 1 (2015): 143
[10] E Hernández-Orallo, MS Olmos, J-C Cano, C Calafate, P Manzoni, A
fast model for evaluating the detection of selfish nodes using a collaborative
approach in MANETs. Wirel. Pers. Commun. 74, 1099–1116 (2014).02/01
2014.
Figure 4 Analysis of residual energy [11] Duraipandian, M. "Performance evaluation of routing algorithm for
Manet based on the machine learning techniques." Journal of trends in
Figure 4 depicts the amount of residual energy that can be Computer Science and Smart technology (TCSST ) 1, no. 01 (2019): 25 -38.
obtained using either the suggested proposed method and the [12]. Chen, Joy Iong Zong, and Kong-Long Lai. "Machine Learning based
conventional method. Energy Management at Internet of Things Network Nodes." Journal: Journal
of T rends in Computer Science and Smart Technology September 2020, no. 3
V. CONCLUSION (2020): 127-133
Arthi S
Department of Computer Science and Engineering,
VEL TECH MULTI TECH Dr.Rangarajan Dr.Sakunthala Engineering College, Chennai, India
Arthisankar794@gmail.com
Abstract - Wireless communications have experienced speedy and technical development in this modern era. Significant improvements
are required in terms of communication speed link, energy level, size of the device, network lifetime and applications for different
generations of wireless devices. Due to the advancement in technical development, the researchers have started to build WNArchitectures
the conventional method of data communication using peer-to-peer basis with a centralized (BS) controller. In Wireless Sensor Networks
(WSNs), the conventional method of data communication in the network is instituted and this allows the nodes to forward data through
other nodes in the communication network and create new communication paths that involve several wireless hops in the communication
network. Recently, there has been an upraise in cooperative communication. This promising methodology plays an important role in
relieving wireless channel fading, as well as, recuperating steadfastness in networks which permit nodes that allow cooperation among
them. The nodes share data in cooperative communication by exploiting the communication in their broadcasting nature. Simulations
were run for various adjustments in order to approve the Cooperative Power and Energy-efficient routing protocol (COPE) [14]
convention's implementation alongside the proposed Minimum Power Least Cost Routing (MPLCR) Algorithm conventions.
Abstract— Since Wi-Fi technology is widely used nowadays, these standards, some of them operate in 2.4 GHz ISM band
it is important to understand how different levels of transmitted and some in 5 GHz range of ISM band. The higher frequency
powers and channel conditions affect the throughputs at various band of 5 GHz has the advantage of offering more
communication distances. This inter-related study is carried out bandwidths and hence higher data rates compared to 2.4 GHz
in this work with focus on both infrastructure and ad-hoc type
Wi-Fi networks. This study would help in designing a better Wi-
band [2], [3]. However, it suffers from the issue of lesser
Fi network in infrastructure mode and decide on the number of coverage distances when compared with 2.4 GHz band
access points that are required at different distances in the systems.
coverage area, to offer required throughput. In ad-hoc mode of
Wi-Fi, this analysis would be useful in deciding the power levels In this work, a study is carried out to know how the
required at the transmitters to enable the signal to reach the varying power levels of transmitter can affect the throughput
destination through the intermediate relay nodes that are values at receiver, for the different versions of IEEE 802.11
located at various distances from each other. Simulation study
is carried out for different versions of IEEE 802.11 standard like Wi-Fi standards, under different channel condition
the 11a, 11b, 11g, 11n and 11ac. The study also helps in deciding environments. The study can help in deciding the locations of
on the version of the standard that offers the optimum coverage access points in infrastructure mode of Wi-Fi network. In
distance and throughput, for the given network. mobile ad-hoc networks, it aids in knowing the power levels
required to reach the next available nodes, through which
Keywords— IEEE 802.11, Transmitter Power, Path loss, destination would be reached [2], [6].
Throughput, Coverage Distance, Channel conditions, Fading,
Data rate. Introduction
Rest of the paper is organized as follows. Section-II
I. INTRODUCTION describes related work of the theoretical aspects of path loss,
In addition to the conventional wired local area networks channel conditions, signal-to-noise ratios, bit error rates and
that employ Ethernet technology, wireless local area includes some literature survey that dealt with the study of
networks (WLANs) also became common these days, for the these aspects.Section-III describes the proposed network
main reasons of quick deployment and affordability. While system and its parameters that are chosen to carry out the
IEEE802.3 became the popular standard for wired LAN, desired study of throughput result analysis. Section IV
IEEE 802.11 became the de-facto standard for WLANs. It is concludes the paper.
also known with its trade name Wi-Fi. In addition to the
original 802.11 version, the other main versions of it are II. TRANSMISSION POWER AND COVERAGE AREA
IEEE11b, 11a, 11g, 11n and 11ac [1]. The initial IEEE802.11 It is known that in wireless communications, power of the
version was supporting 1 Mbps and 2 Mbps of data rates only.
received signal decreases drastically, with increasing
The next version of it with the name IEEE802.11b was
distances from the transmitter. While ‘path loss’ is the main
supporting upto 11Mbps data rate, with fall back rates of 5.5
cause of this decrease, other mechanisms like reflection,
Mbps, 2 Mbps and 1 Mbps that the system would roll back if
unacceptable percentage of bit error rates (BER) are refraction and multipath fading of the signal also contribute
experienced. The next version of it was 802.11a that offers 6- to it. In its simplest form, received power can be considered
54 Mbps of data rates [1], [2]. The later version 802.11g also as transmitted power minus path loss [5], [7]. ‘Free Space
offered 6-54 Mbps of data rates. Later on, many versions are Path loss’ (FSPL) can be mathematically expressed as,
introduced with increased data rates, namely the 802.11n
with 72-600 Mbps, 802.11ac with 433-6933 Mbps, 802.11ax
with 600-9608 Mbps and 802.11be with 40000 Mbps [3]. Of
C. Channel Characteristics
In addition to path loss, channel impairments like
shadowing and multipath fading also influence the
throughput performance. These effects are studied here. The
effect of ‘path loss alone’, ‘path loss plus shadowing’ and
‘path loss plus shadowing plus fading’ are considered. Fig 6: 802.11n - 2.4 GHz performance under different channel
conditions
Throughput changes for these different channel conditions
for varying distances are found. The results are shown in Fig-
4 through 9 for different versions of IEEE 802.11. The results
of versions that use 2.4GHz band are shown in Fig 4 through
Fig 6. The results of versions that use 5 GHz band are shown
in Fig 7 through Fig 9 The results are obtained for a
transmitter power of 10mW. For the versions of 2.4 GHz
band, when the Pathloss alone is applied, as the distance
increases throughput gets slowly decreased and at 1500m of
distance it becomes zero. For pathloss (Friis Free Space) plus
shadowing (lognormal) case the throughput becomes zero at
1200m itself. For the case of pathloss plus fading (Rayleigh)
plus shadowing, the throughput becomes zero at 700m
distance. Transmitter power is considered as 10mW in all the Fig 7: 802.11a performance under different channel conditions
above cases. These are depicted in Fig 4 for 802.11b, in Fig
5 for 802.11g and in Fig 6 for 802.11n.
For the versions of 5 GHz band, when the Pathloss
alone is applied, throughput gets slowly decreased to zero at
550m of distance. For the cases of pathloss (Friis Free Space)
plus shadowing (lognormal) and pathloss plus fading
(Rayleigh) plus shadowing, the throughput becomes zero at
400m distance itself. Here also, transmitter power is
considered as 10mW in all the cases. These are depicted in
Fig 7 for 802.11a, in Fig 8 for 802.11n and in Fig 9 for
802.11ac. Fig 8: 802.11n - 5 GHz performance under different channel conditions
[3] Khorov, Evgeny, et al. "A tutorial on IEEE 802.11 ax high efficiency
WLANs." IEEE Communications Surveys & Tutorials 21.1 (2018):
197-216.
[4] Wu, Xinzhou, et al. "Vehicular communications using DSRC:
challenges, enhancements, and evolution." IEEE Journal on Selected
Areas in Communications 31.9 (2013): 399-408.
[5] Stallings, William. Wireless communications & networks. Pearson
Education India, 2009.
[6] O. O. Erunkulu, A. M. Zungeru, C. K. Lebekwe and J. M. Chuma,
"Cellular Communications Coverage Prediction Techniques: A Survey
and Comparison," in IEEE Access, vol. 8, pp. 113052-113077, 2020,
doi: 10.1109/ACCESS.2020.3003247.
[7] Haider Kadhim Hoomod, Intisar Al-Mejibli and Abbas Issa Jabboory,
Fig 9: 802.11ac performance under different channel conditions “ Analyzing Study of Path loss Propagation Models in Wireless
Communications at 0.8 GHz ” J. Phys.: Conf. Ser. 1003 012028, doi
:10.1088/1742-6596/1003/1/012028
IV. CONCLUSION [8] S. W. Choi, Y. S. Shim and S. K. Park, "A study on throughput
In this article, throughput analysis of Wi-Fi is carried out difference of station according to separation distance among WLAN
Aps," 2012 International Conference on ICT Convergence (ICTC),
for varying values of transmitter power and distance between 2012, pp. 631-634, doi: 10.1109/ICTC.2012.6386866
the communicating devices under different channel [9] Tianlin Wang and H. H. Refai, "Network performance analysis on
conditions. The simulation study is carried out for different IEEE 802.11g with different protocols and signal to noise ratio values,"
versions of IEEE standard. As higher distances lead to lesser Second IFIP International Conference on Wireless and Optical
powers received at the receivers, the SNR values will be Communications Networks, 2005. WOCN 2005., 2005, pp. 29-33, doi:
10.1109/WOCN.2005.1435983.
decreased and BER values will increase at those higher
[10] R. Amritha, B. Divya and V. Ramaiyan, "Wi-Fi Coverage in Indian
distances, which in turn results in lesser throughputs. This Homes," 2021 International Conference on COMmunication Systems
effect can be compensated by increasing the transmitter & NETworkS (COMSNETS), 2021, pp. 334-341, doi:
powers, as depicted in the results. It is known that channel 10.1109/COMSNETS51098.2021.9352832.
conditions that depend on reflection, refraction, multipath [11] R. Amritha, B. Divya and V. Ramaiyan, "Wi-Fi Coverage in Indian
Homes," 2021 International Conference on COMmunication Systems
fading and shadowing also play their role in this. Impact of & NETworkS (COMSNETS), 2021, pp. 334-341, doi:
them for three common channel types is also discussed. The 10.1109/COMSNETS51098.2021.9352832.
study helps in network planning and appropriate placement [12] S. Kouhbor, J. Ugon, A. Rubinov, A. Kruger and M. Mammadov,
of access points in infrastructure network. In the case of ad- "Coverage in WLAN with Minimum Number of Access Points," 2006
hoc network it helps in deciding the location of relay nodes IEEE 63rd Vehicular Technology Conference, 2006, pp. 1166-1170,
doi: 10.1109/VETECS.2006.1683018.
in stationary networks and identifying the required power
[13] Q. Hou and L. Gao, "The Simulation of WLAN Outdoor Coverage in
levels needed to reach the neighbour nodes in mobile ad-hoc Hot Spot Area for Wireless Digital City," 2011 7th International
network. Conference on Wireless Communications, Networking and Mobile
Computing, 2011, pp. 1-4, doi: 10.1109/wicom.2011.6036676.
REFERENCES [14] K. Nishat, R. Anwar, A. Mehfooz, B. Zaidi, H. Choudhary and I. A.
[1] Fan, Shiru, Yutong Ge, and Xiang Yu. "Comparison Analysis and Qazi, "On the effectiveness of high-speed WLAN standards for long
Prediction of Modern Wi-Fi Standards." 2022 International Conference distance communication," 2014 IEEE Conference on Computer
on Big Data, Information and Computer Network (BDICN). IEEE, Communications Workshops (INFOCOM WKSHPS), 2014, pp. 145-
2022. 146, doi: 10.1109/INFCOMW.2014.6849197.
[2] Davri, Eleni-Constantina, et al. "An accurate model for energy [15] M. Botella-Campos, L. Parra, S. Sendra and J. Lloret, "WLAN IEEE
efficiency in IEEE 802.11 WLANs." 2014 IEEE 19th International 802.11b/g/n Coverage Study for Rural Areas," 2020 International
Workshop on Computer Aided Modeling and Design of Conference on Control, Automation and Diagnosis (ICCAD), 2020,
Communication Links and Networks (CAMAD). IEEE, 2014. pp. 1-6, doi: 10.1109/ICCAD49821.2020.9260568.
Abstract - Web applications with special computation and of the Internet of Things (WSN) idea is wireless sensor
storage requirements benefit greatly from the cloud computing networks, specifically. With inbuilt CPUs and low-power
model. With an extensible and flexible architecture, Wireless radios, WSNs are made up of intelligent sensor nodes that
Sensor Networks are integrated with the Cloud. It is possible to
keep track of environmental variables including temperature,
directly integrate REST-based Web services into other
pressure, humidity, vibration, and power usage [2]. The
application domains, such as e-health care, smart homes, and
even vehicular area networks (VANs). An IP-based WSN testbed primary objective of WSN is to offer users discovery services.
has been used to implement a proof of concept REST API web It makes sense to offer her WSN service to an expanding
service for accessing data from anywhere using a REST API. customer base given the rise in Internet users.
When monitoring data exceeds values or events of interest, users
will receive notifications by email or tweet. Users can transmit real-time data to your consumers at any
time with high bandwidth and excellent quality thanks to our
Keywords: Vehicular area network, Wireless Sensor network, adaptable, efficient, and economical cloud computing
testbed, Web service infrastructure. The cloud, which enables the provision of
computing as a service, is made up of hardware, networks,
I. INTRODUCTION
services, storage, and interfaces. [3]. Additionally, data
The term "Internet of Things" (IoT) refers to the
acquired from wireless sensor nodes can be shared via email,
interconnection of commonplace items with the Internet,
SMS, messaging services like social networks and blogs, and
including smartphones, Internet-enabled TVs, sensors, and
REST-based web services like Simple Object Access Protocol
actuators. These technologies can be intelligently connected to
(SOAP) and Representational State Transfer (REST). [4].
open up new channels of interaction between things and
These sensor networks can be connected, connected, and
people. The introduction of new dimensions to the world of
reviewed to forecast trends, analyze data in real time, and
information and communication technology has helped the
avert hazardous situations. For the Open.Sen.se sensor data
development of IoT advance significantly in recent years. The
platform, this study presents the design, development, and
number of linked gadgets surpassed the number of connected
integration of a scalable WSN architecture [5].Data from
persons in 2008, claims [1]. By 2020, 50 billion connected
sensor nodes is processed, stored, and examined by the
gadgets will exist, predicts Cisco. seven times the size of the
Open.Sen.se server via application programming interfaces
world's population now.
(APIs) (APIs). Use REST-based web services as an adaptable
application layer that can be readily incorporated into a variety
These connections are anticipated to develop into the fully
of application domains, such as e-health services, smart
developed and dynamic IoT network now that anyone can
homes, and even vehicle area networks (VANs).
connect to anything from anyplace. The Internet of Things
In order to demonstrate the concept of an intelligent
will be significantly impacted by developments in
environment, we integrated a REST-based web service into an
nanotechnology and wireless sensors. One of the key elements
IP-based low-power WSN testbed. This allowed the intelligent
environment to access data from any location. Wireless Sensor tiny sensors is a difficult task. It can be used to gather
Networks (WSNs) have long been an obvious innovation. information. It is a technique that dispenses with the necessity
Sensor data must be stored and made available for use in real- to categorize information based on application requirements
world applications at all times and in all places. WSNs lack and produce copy packages, allowing for the orderly
the ability to store a lot of data and perform subsequent data management of information. Information-gathering techniques
processing because they are constructed using proprietary increase system longevity and cut power usage. In addition,
components. The quantity of WSNs may rise in a cloud obstructions between them can cause information loss. This is
environment that offers these controls. In order to synchronize a really challenging test to pass.
cloud conditions and distant sensor linkages, this notion
therefore presupposes a sensor cloud structure. b. Cloud computing
For Internet of Things (IoT) applications that demand International companies and scientists are interested in the
adaptable and unavoidable compute, the tuned system is suited continuous advancement of distributed computing. The cloud
and pragmatistically constructed. Developing nations require offers a domain of execution to which a client or company can
appropriate social security systems to manage their large connect and exchange resources like superior PCs, databases,
populations. An integrated system can address problems with etc., situated in geographically distant sites, often controlled
the provision of health services that are included in the plan. by other affiliates. The construction of routine, system-based
Using this to make it possible for people, networks, and functions and services allows for the delivery of coordinated
businesses who offer health care services to gather and send and carefully curated functionality to end users. This is made
health information when necessary to enhance social security possible by a key idea known as distributed computing. It
services for residents of both urban and rural locations. A delivers a management-centric design with little end-user data
framework with IoT capabilities does not have many technology overhead, lots of customizability, and low TCO. It
challenges to investigate. This theory focuses on issues with is possible to use distributed computing with three different
remote sensors and provides original solutions to these issues. management models and four different organizational types.
When connected to the Internet, WSNs often follow the IEEE The following are the three major types of control that the
802.15.4 standard and employ their own set of regulations, cloud can offer:
such as unpredictable board and construction. This proposition
offers a method for synchronizing sensor vision with a cloud ● Software as a Service (SaaS): It is a product delivery
environment that depends on the Internet. Operating a paradigm that enables users to access programmes from a
6LoWPAN-based hub offers dependable system-to-system range of client devices without having to hire professionals to
communication, including Internet connectivity. operate the underlying cloud infrastructure.
● Platform as a Service (PaaS): Provides customers with
a. Challenges in WSN access to a hidden cloud infrastructure for rapid application
development, management, and oversight.
The sensor system is facility-dependent and differs slightly ● Infrastructure as a Service (IaaS): Instead of using actual
from a conventional PC organization. In comparison to
hardware, this service offers virtualized computer resources.
conventional PC systems, there are some testing difficulties.
Based on cloud framework leaders, usage, and ownership,
The memory, battery life, and reserve power of small sensor
there are four different contract models.
hubs are all constrained. The following are some viewpoints
that WSN need to be able to include: availability of IP The
majority of Internet of Things applications need a small hub to II. WIRELESS SENSOR NETWORK
connect to the internet. The fact that CEOs have a range of IoT devices with embedded sensors are connected through
personalities and that packaging varies depending on communication protocols. Owing to LPWAN wireless
convention requirements make it difficult. This experiment networks, these Internet of Things devices can interact across
has to be run using IP-based remote sensing. In WSN, the use great distances (Low-Power Wide Area Network). Based on
of steering force is a crucial element. his Lora, many people use wireless sensor networks. Cellular
The control system should be created to enhance energy networks like NBIoT, LTE-M, WLAN, and technologies like
efficiency because the energy supply at the sensor hub is quite sub-1 GHz, Zigbee, and Thread can be used to transfer the
constrained. Your Vitality might increase if you change how data gathered by this sensor network to the cloud.
you use it. Information Gathering Data collection from several
a. Components of Wireless Sensor Network Remote interior monitoring systems support monitoring vast
● Sensor Nodes: Sensors are necessary for recording areas and ensuring the gas concentration level.
environmental parameters. The recorded data is used to create
an electrical signal that is then transferred. Outside Monitoring: To ensure broad flexibility for
● Radio Nodes: A wireless node, also known as a master machinery that is prone to having extreme access, external
node, gathers data from sensors and transmits it to the gateway monitoring of air quality requires the use of precise remote
in a wireless sensor network. These are made up of a sensors, rain and wind safe preparations, as well as energy
transceiver, a battery, and a microcontroller. procurement procedures.
● Access Point or Gateway: Receiving wireless data from
Air Pollution Monitoring: In a few urban locations, wireless
radio nodes and transmitting it over a cloud, often over the
sensor systems have been installed to alert residents to the
Internet or other cellular networks, is done by access points or
presence of a set of harmful gasses. These can benefit from the
gateways.
advantages of the particularly designed remote connections
● Edge Computing and Data Analysis: Information received
rather than wired establishments, which also increases their
from the gateway is further processed, examined, and stored
adaptability for testing readings in various locations[13-16].
using data analytics and edge computing. This information can
be shown on an IoT dashboard or mobile application[8-12].
Woodland Fire Detection:A system of sensor nodes can be
installed in woods to identify the beginning of fires. Sensors
b. Wireless Sensor Network Architecture
that measure temperature, humidity, and gases released by
burning trees and other vegetation can be installed on the hub.
Fault Tolerance: Fault tolerance refers to the network's
Avalanche Detection: The Avalanche Detection Framework
capacity to continue running even in the event that a sensor
employs distant sensor systems to identify minute variations in
node malfunctions.
soil composition and other traits that could happen before or
Mobility of Nodes:To enhance network performance, nodes
during an avalanche. Avalanches can be predicted using
can be moved anywhere they are within the sensor's range
information gathered prior to the event.
thanks to their mobility.
Scalability: WSN networks can include thousands of nodes
Water Quality Monitoring: Monitoring water quality entails
due to the network architecture.
looking into the purity of subsurface reservoirs, streams, lakes,
Feedback in case of Communication Failure: Notifies the base
and oceans[17-21].
station instantly and without delay if a specific participant is
unable to communicate data over the network.
Catastrophic event Prevention: Rapid response from wireless
sensor systems helps prevent the effects of calamities like
c. Sensor network
floods. Canals with expected moderate fluctuations in water
level are good locations for remote hubs.
Many WSN applications for earth science research have
emerged as a result of the evolution of environmental and
Mechanical Monitoring Machine Health Monitoring: For
earth observation technologies. This covers the exploration of
hardware condition-based maintenance, a wireless sensor
the outback, the oceans, the ice sheets, and volcanoes. This list
system was developed. This is due to the fact that it provides a
includes some of the most well-known locations.
large financial investment and allows for more capabilities
(CBM). In wired systems, wiring work typically prohibits the
Air Quality Monitoring: Counts of persons who can be seen
installation of enough sensors. Resources, rotating hardware,
must be taken across the board on a frequent basis in order to
dangerous or restricted areas, and previously unreachable
safeguard both people and the environment from the harm
places are now available to remote sensors.
caused by air pollution. Hazardous situations require the use
of technology that continuously monitors dangerous gasses.
Information Logging: Data collection for ecological
since both major quality metrics and the climate are subject to
monitoring is also done via wireless sensor systems. This can
fast change.
be done in a number of ways, from as basic as checking the
temperature in an ice chest to as difficult as figuring out how
Inside Monitoring: The employment of top-of-the-line,
much water is in a nuclear power plant's flood pond. In this
complex equipment that can adhere to mechanical regulations
manner, it will be simple to show through quantifiable data
is required to monitor the gas levels in unprotected areas.
entire process for any number of reasons, and a node UNO implements these two features. Both the XBee interface
with an excessive amount of events or and the functionality of the web server require libraries. The
communication will use up too much power. mini-server acts as a mobile application server between a
wireless sensor and a dedicated network, allowing it to process
● Limited Resources: The energy in sensor nodes is more sophisticated data than the sensor end devices. To gather
finite. To maximize energy consumption, alternate data from wireless sensors and transmit it to a platform for
between active and sleeping modes frequently. Sleep sensor data in the cloud, base station sink nodes use the
mode has a direct impact on sensor node architecture ZigBee protocol. The monitoring layer also gives the base
since it effectively disconnects the node from the station access to its web server so that it can connect and
network. upload sensor data.
It is obvious that WSN and IoT are approached completely Figure 4 denotes the flowchart of sensor communication with
differently. Niche aspects govern how well WSN and IoT its end nodes. This layer includes a web interface for
integration works. WSN topology changes need to be closely manipulating sensor data, producing statistics, and database
monitored [6, 7, 8]. storage. The monitoring layer uses Open.sense.se. HTTP
. Service because it offers a REST-based API for exposing and
IV. PROPOSED METHODOLOGY accessing sensor data.This enables the connection of new
4.1 Wireless Sensor Node Design applications to existing networks with little adjustments. In
order to access sensor readings by device type and timestamp,
The processes of developing the testbed and designing the Open.Sen.se offers a graphical user interface for infographic
hardware are highlighted in this section along with the data streams used in real-time system monitoring. The base
suggested architecture. The base station is essential to the station domain rule may also automatically give an alert to the
suggested strategy. While retaining all communication, user each time it detects the needed occurrence.
retrieval, and computing capability, the size of this node is
kept to a minimum. XBee-ZB module, Ethernet shield, and
Arduino UNO board form the base station hardware. Through
a USB connection, the ATMEGA 328, an Atmel AVR
processor found in open source Arduino microcontrollers, may
be programmed in C.Figure 3 indicates the interrelation of IoT
in wireless sensor networks.
for sensor nodes is made to use less energy and to awaken in [2] V. Katiyar, P. Kumar, and N. Chand, ‘‘An intelligent
response to an incident. IoT, on the other hand, is not transportation systems architecture using wireless sensor networks,’’
constrained by the capabilities of hardware or processing. For Int. J. Comput. Appl., vol. 14, no. 2, pp. 22–26, Jan. 2011.
interoperability during integration, WSN and IoT layered
[3] L. Mainetti, L. Patrono, and A. Vilei, ‘‘Evolution of wireless
functions must be synchronized. WSN nodes should be sensor networks towards the Internet of Things: A survey,’’ in Proc.
updated as well to fend off cyberattacks. The capacity of a 19th Int. Conf. Softw., Telecommun. Comput. Netw. (SoftCOM),
WSN to faithfully integrate must be improved, and the layered 2011, pp. 1–6.
operations of IoT must be modified to function with a WSN.
In figure 5, the wireless sensor network nodes are depicted [4] X. Feng, F. Yan, and X. Liu, ‘‘Study of wireless communication
over their lifetime. technologies on Internet of Things for precision agriculture,’’
Wireless Pers. Commun., vol. 108, no. 3, pp. 1785–1802, 2019.
Abstract—Unmanned aerial vehicles (UAVs) are deliberated as safety duties such as border watching, controlling protected parts
a potential example of automated emergency tasks in dynamic namely energy broadcast appearances are other bags where
marine environments. But the maritime transmission drones are working frequently [3]. Administrations have
performances among UAVs and offshore platform becomes a previously spent millions of dollars on this skill, and seemingly
crucial problem. The task planning problems of numerous UAVs this spending will endure increasing with the cumulative
are classified into two parts, route planning and task allocation requirement in both civil and governmental governments [4].
problems, are different and interrelated from one another. With progress in aerospace abilities such as altitude, range,
Because of the complicated marine environments, both efficiencies endurance, and observation, UAVs are an indispensable aspect
of UAVs in an intelligent ocean are not acceptable. This study
to increase military power. In armed forces, drones are
presents a Modified Aquila Optimization Algorithm based Route
Planning Scheme (MAOA-RPS) for UAV networks. The presented
employed in execution of several assignments like electric
MAOA-RPS technique is majorly concentrated on the detection of conflict and signal intelligence, transportation, battle damage
optimal routes for UAV data transmission. To attain this, the valuation, investigation search and rescue, and reconnaissance
MAOA-RPS technique involves the incorporation of Levy flight and aggressive rival targets [5]. Fig. 1 defines the components
(LF) with the traditional AOA. In addition, the optimal routes are of UAV system.
chosen by the MAOA-RPS technique via a fitness value, which can
be determined by many input parameters. For assessing the
enhanced outcomes of the MAOA-RPS technique, we have
performed a series of experiments. The comparison study revealed
the improved performance of the MAOA-RPS technique under
distinct metrics.
Process of many drones in shadowing task chiefs the decision making christened MANFIS-DM procedure on
investigators to the steering problematic which is an influential independent drone schemes. The MANFIS-DM method means
arena of processes research identified as the Vehicle Routing to efficiently establish the drone system into bunches and then
Problems (VRPs), presented by Dantzig and Ramser. VRP was categorize the imageries into fitting class tags.
usually castoff in the terms of transport processes with a delivery
system of goods among a granary and patrons. Every route III. THE PROPOSED MODEL
employed by vehicles remains strongminded to curtail the In this study, we have developed a new MAOA-RPS
transport price or total travel coldness topic to some restraints. technique for route planning in the UAV network. The presented
VRP was an NP-hard issue, then, since it is presumed that P is MAOA-RPS technique is majorly concentrated on the detection
unequal to NP [9], the computing power essential for solution of optimal routes for UAV data transmission. To attain this, the
surges at a better rate than multinomial as the delinquent size MAOA-RPS technique involves the incorporation of the LF
rises. For large illustrations of the VRP, meta-heuristic methods concept with the traditional AOA [16]. In addition, the optimal
were employed in a shot to overwhelmed the problems related routes are chosen by the MAOA-RPS technique via a fitness
with exact methods [10]. The review of meta-heuristics value, which can be determined by many input parameters.
expresses that the projected techniques could bargain and Initially, in AOA, the swarm catches the prey via four predation
occasionally optimal resolutions to bulky examples having an methodologies.
insufficient one hundred customers. The initial approach: Fly high in the sky search prey. Now,
This study presents a Modified Aquila Optimization they are above the hunt space at highest height and initial
Algorithm based Route Planning Scheme (MAOA-RPS) for searching and flippers the target. When the prey is identified,
UAV networks. The presented MAOA-RPS technique is they dive vertically towards the prey and the behavior is
majorly concentrated on the detection of optimal routes for UAV formulated as follows:
data transmission. To attain this, the MAOA-RPS technique 𝑡
𝑋(𝑡 + 1) = 𝑋𝑏𝑒𝑠𝑡 (𝑡) × (1 − ) + (𝑋𝑀 (𝑡) − 𝑋𝑏𝑒𝑠𝑡 (𝑡) × 𝑟𝑎𝑛𝑑) (1)
involves the incorporation of Levy flight (LF) with the 𝑇
traditional AOA. In addition, the optimal routes are chosen by From the expression, 𝑋(𝑡 + 1) represents the individual
the MAOA-RPS technique via a fitness value, which can be location at 𝑡 + 1 iterations, 𝑋𝑏𝑒𝑠𝑡 (𝑡) denotes the existing global
determined by many input parameters. For assessing the optimal location at 𝑡 𝑡ℎ iterations. 𝑡 and 𝑇 signify the present 𝑡-
enhanced outcomes of the MAOA-RPS technique, we have 𝑡ℎ iterations and the maximal count of iteration. 𝑋𝑀 (𝑡)
performed a series of experiments. represents the current mean position of individual at extant
iteration. rand refers to the arbitrary number in Gauss
II. RELATED WORKS distribution ranges from [0, 1].
Santin et al. [11] grant metaheuristics for routing a varied The second approach: contour flight with shortest glide
group of unmanned air vehicles (UAVs) for comprehensive attack. Now, it switched from flying at highest altitude towards
exposure of pulverized parts, seeing concurrent reduction of the hovering on prey's head, getting ready for predation behavior
attention time and placement the negligeable amount of and the position can be upgraded as follows:
refuelling stations. As this problematic was not solved, the 𝑋(𝑡 + 1) = 𝑋𝑏𝑒𝑠𝑡 (𝑡) × 𝐿𝐹(𝐷) + 𝑋𝑅 (𝑡) + (𝑦 − 𝑥) × 𝑟𝑎𝑛𝑑 (2)
author intended high-level path preparation that syndicates the From the expression, 𝑋𝑅 (𝑡) indicates the arbitrary position,
multi variable neighborhood search (MOVNS) meta-heuristic and 𝐷 shows the dimension size. 𝐿𝐹 represents Levy flight
and the careful preparation to travel the usual non-dominated function. 𝑦 and 𝑥 characterize the shape of search that is given
answers. In [12], a drone steering and orientation problem below:
drones UAV-ROP) that reduces the 3D flight detachments of the 3×𝜋
drone under directional, navigation and indeterminate 𝑥 = (𝑟1 + 0.00565 × 𝐷1 ) × 𝑠𝑖𝑛 (−𝜔 × 𝐷1 + )
{ 2 (3)
restrictions are presented and established NP-hard in this study. 3×𝜋
To enhance the covered direction-finding and locations in the 𝑦 = (𝑟1 + 0.00565 × 𝐷1 ) × 𝑐𝑜𝑠 (−𝜔 × 𝐷1 + )
2
UAV-ROP concurrently, a real memetic process is projected in 1
this study. In the system, the GA achieves the outer loop for 𝜋𝛽 𝛽
𝜇×𝜎 Γ(1 + 𝛽) × sin ( )
enhancing the route and the local search meta-heuristic does the 2
𝐿𝐹(𝑥) = 0.01 × 1 ,𝜎 = 𝛽−1
(4)
inner loop for enhancing the locations. 1+𝛽 ( )
Ozkan [13] suggests an algorithm to use and drones for |𝑣|𝛽 Γ( )×𝛽×2 2
( 2 )
mitigating forest fire risks. The advanced metaheuristic Consider, 𝑟1 as the searching cycle number within [0, 1], 𝐷1
technique crossbreeds fake annealing and resident signifies a random number from one to 𝐷-dimension, along with
hunt metaheuristics with an integer lined software 𝜔 specifies a constant of 0.005. Fig. 2 demonstrates the
design method. The precise perfect was industrialized to resolve flowchart of AOA.
the distance-constrained multi-based multi-drone routing
problem, and since the difficulty of the issue, the generated
meta-heuristics aid the method treasure better answers. In [14],
an exact route planning technique for weeding machines related
to drone imageries was devised. A GA was rummage-sale to
enhance the process route. For GA, a novel route indoctrination
method and fitness function remained. In [15], projects an
innovative metaheuristic by a neuro-fuzzy inference scheme for
TABLE II
SDIS ANALYSIS OF MAOA-RP SYSTEM WITH DISTINCT
ITERATIONS UNDER SCENARIO-1
TABLE III
SDIS ANALYSIS OF MAOA-RP SYSTEM WITH DISTINCT
ITERATIONS UNDER SCENARIO-2
TABLE IV
SDIS ANALYSIS OF MAOA-RP SYSTEM WITH DISTINCT
ITERATIONS UNDER SCENARIO-3
Shortest Distance / km
No. of GA- MAOA-
SA GA ACO
Iterations PSO RP
0 294.65 259.82 251.65 257.33 221.79
25 279.01 237.07 223.92 237.07 201.53
50 255.91 214.33 206.51 219.30 175.94
75 214.68 203.31 200.11 201.53 166.70
100 185.89 190.52 199.05 183.76 166.35
Fig. 5. SDIS analysis of MAOA-RP system under scenario-2 125 178.43 180.21 195.14 180.92 166.35
150 178.43 179.85 189.80 176.30 166.35
An average SDIS assessment of the MAOA-RP model on
scenario-2 is exemplified in Fig. 6. The results assured that the 175 178.43 179.85 189.80 175.94 166.35
MAOA-RP approach has gained superior results with minimal 200 178.43 179.85 189.80 175.94 166.35
SDIS of 109.51 while the SA, GA, ACO, and GA-PSO models
have obtained maximum average SDIS values of 128.88, 225 178.43 179.85 189.80 175.94 166.35
126.54, 129.89 and 118.94 correspondingly. 250 178.43 179.85 189.80 175.94 166.35
Table 4 and Fig. 7 implies the SDIS of the MAOA-RP model
with recent models. The results depicted that the MAOA-RP 275 178.43 179.85 189.80 175.94 166.35
model has gained least SDIS values. For instance, with 25 300 178.43 179.85 189.80 175.94 166.35
iterations, the MAOA-RP approach has resulted to lower SDIS Average 201.67 194.02 198.77 191.79 172.79
of 201.53 whereas the SA, GA, ACO, and GA-PSO models have
attained higher SDIS of 279.01, 237.07, 223.92, and 237.07
correspondingly. Also, with 100 iterations, the MAOA-RP
technique has resulted to lower SDIS of 166.35 whereas the SA,
GA, ACO, and GA-PSO models have attained higher SDIS of
185.89, 190.52, 199.05, and 183.76 respectively. Also, with 150
iterations, the MAOA-RP model has resulted to lower SDIS of
166.35 whereas the SA, GA, ACO, and GA-PSO models have
achieved higher SDIS of 178.43, 179.85, 189.80, and 176.30
correspondingly.
REFERENCES
[1] B. Abhishek, S. Ranjit, T. Shankar, G. Eappen, P. Sivasankar, A. Rajesh,
Hybrid PSO-HSA and PSO-GA algorithm for 3D path planning in
autonomous UAVs. SN Appl. Sci. 2(11), 1–16 (2020)
[2] H. Sang, Y. You, X. Sun, Y. Zhou, F. Liu, The hybrid path planning
algorithm based on improved A* and artifcial potential feld for unmanned
surface vehicle formations. Ocean Eng. 223, 108–709 (2021)
[3] C. Liang, X. Zhang, Y. Watanabe, Y. Deng, Autonomous collision
avoidance of unmanned surface vehicles based on improved A star and
minimum course alteration algorithms. Appl. Ocean Res. 113, 102755
(2021)
[4] X. Liu, X.B. Zhai, W. Lu, C. Wu, QoS-guarantee resource allocation for
multibeam satellite industrial Internet of things with NOMA. IEEE Trans.
Ind. Inf. 17(3), 2052–2061 (2019)
[5] S. Xu, J. Zhang, S. Meng, J. Xu, Task allocation for unmanned aerial
vehicles in mobile crowdsensing. Wirel. Netw. 1–13 (2021)
[6] K. Srivastava, P.C. Pandey, J.K. Sharma, An approach for route
optimization in applications of precision agriculture using UAVs. Drones
Fig. 7. SDIS analysis of MAOA-RP system under scenario-3 4(3), 58 (2020)
[7] M. Yan, H. Yuan, Z. Li, Q. Lin, J. Li, Energy savings of wireless
An average SDIS assessment of the MAOA-RP model on communication networks based on mobile user environmental prediction.
scenario-3 is demonstrated in Fig. 8. The results assured that the J. Environ. Prot. Ecol. 22(1), 206–217 (2021)
MAOA-RP model has obtained superior results with minimal [8] S. Ma, W. Guo, R. Song, Y. Liu, Unsupervised learning based coordinated
multi-task allocation for unmanned surface vehicles. Neurocomputing
SDIS of 172.79 while the SA, GA, ACO, and GA-PSO 420, 227–245 (2021)
techniques have obtained maximum average SDIS values of
[9] G. Xia, X. Sun, X. Xia, Multiple task assignment and path planning of a
201.67, 194.02, 198.77 and 191.79 correspondingly. multiple unmanned surface vehicles system based on improved self-
organizing mapping and improved genetic algorithm. J. Mar. Sci. Eng.
9(6), 556 (2021)
[10] L. Li, Q. Gu, L. Liu, Research on path planning algorithm for multi-UAV
maritime targets search based on genetic algorithm. In: 2020 IEEE
International Conference on Information Technology, Big Data and
Artifcial Intelligence (ICIBA), vol. 1, pp. 840–843 (2020)
[11] Santin, R., Assis, L., Vivas, A. and Pimenta, L.C., 2021. Matheuristics for
multi-uav routing and recharge station location for complete area
coverage. Sensors, 21(5), p.1705.
[12] Xiang, S., Wang, L., Xing, L. and Du, Y., 2021. An effective memetic
algorithm for UAV routing and orientation under uncertain navigation
environments. Memetic Computing, 13(2), pp.169-183.
[13] Ozkan, O., 2021. Optimization of the distance-constrained multi-based
multi-UAV routing problem with simulated annealing and local search-
based matheuristic to detect forest fires: The case of Turkey. Applied Soft
Computing, 113, p.108015.
[14] Zou, K., Wang, H., Zhang, F., Zhang, C. and Kai, D., 2022. Precision
route planning method based on UAV remote sensing and genetic
algorithm for weeding machine. Applied Intelligence, pp.1-11.
Fig. 8. Average SDIS analysis of MAOA-RP system under [15] Ragab, M., Ashary, E.B., Aljedaibi, W.H., Alzahrani, I.R., Kumar, A.,
scenario-3 Gupta, D. and Mansour, R.F., 2022. A novel metaheuristics with adaptive
neuro-fuzzy inference system for decision making on autonomous
unmanned aerial vehicle systems. ISA transactions.
V. CONCLUSION
[16] Aribowo, W., Supari, B.S. and Suprianto, B., 2022. Optimization of PID
In this study, we have developed a new MAOA-RPS parameters for controlling DC motor based on the aquila optimizer
technique for route planning in the UAV network. The presented algorithm. International Journal of Power Electronics and Drive Systems
MAOA-RPS technique is majorly concentrated on the detection (IJPEDS), 13(1), pp.808-2814.
of optimal routes for UAV data transmission. To attain this, the [17] Lakshmanna, K., Subramani, N., Alotaibi, Y., Alghamdi, S., Khalafand,
MAOA-RPS technique involves the incorporation of the LF O.I. and Nanda, A.K., 2022. Improved metaheuristic-driven energy-aware
cluster-based routing scheme for IoT-assisted wireless sensor
concept with the traditional AOA. In addition, the optimal routes networks. Sustainability, 14(13), p.7712.
are chosen by the MAOA-RPS technique via a fitness value,
which can be determined by many input parameters. For
assessing the enhanced outcomes of the MAOA-RPS technique,
we have performed a series of experiments. The comparison
study revealed the improved performance of the MAOA-RPS
technique under distinct metrics. In future, data collection
scheme can be introduced to improve the overall network
performance.
MOHANRAJ S
UG Scholar,
Department of Electronics and
Communication Engineering,
IFET College of Engineering,
Villupuram, TamilNadu, India.
admohanraj17@gmail.com
focus of the fifth-generation of optical technologies [3]. signals propagating through the cables. The added
These systems concentrated on expanding the advantage of optical fiber is its small size and weight
wavelength range in WDM. Solitons are employed in as the fiber is made up of g lass or plastic and the
optical co mmunications systems as well. So litons are diameter of fiber is as small as a single strand of hair.
pulses of a specified form that maintain their shape
while co mpensating for fibre dispersion and 1.2. DENS E WAVEL ENGTH DIVIS ION
nonlinearity. The goal of this generation of systems MULTIPLEXING
was to efficiently use the bandwidth of fibre using DWDM is variant technology of WDM. In
DWDM methods. The WDM variant technology is
mid of 1990, dense WDM systems started emerg ing,
DWDM.
those systems used 16-24 channels spaced at 100-200
1.1. OPTICAL FIBER COMMUNICATIONS:
GHz. In late 1990, DW DM systems were capable of
The data carrying capacity of communication carrying up to 80 channels, those were densely spaced
networks rises as the carrier frequency increases. at 25-50 GHz. In DWDM, d ifferent wavelengths at
Optical waves in the THz band are used in optical narrow spacing are co mbined and sent at a t ime over a
fibre co mmunication systems, which greatly boosts the single optical fiber. The application of DWDM is in
optical co mmunicat ion systems' informat ion carrying submarine and long-haul terrestrial systems which
capability. The fundamental b lock diagram of an carry enormous data [5]. The difference between the
optical fibre co mmun ications system is shown in WDM and DWDM is the spacing between the
Figure 1.1. The data is transferred in either digital or wavelengths. In DWDM , wavelengths are closer than
analogue format. At the source, the data is in electrical WDM hence DW DM provides mo re channel capacity.
form. At the optical source, the electrical signal is first In networks based on Synchronous Optical Netwo rk
converted into the optical signal. The optical source at (SONET) or Synchronous Digital Hierarchy (SDH)
the transmitter side can be a laser diode or an LED. protocols, DWDM and WDM methods are employed.
The optical signal is then transmitted through the glass Depending upon the applications, different network
fiber. At the receiver end, the optical signal is topologies like point-to-point, tree and ring topology
converted back into the electrical form using an optical are used. But ring topology is preferred for DWDM
detector [4]. The optical detector can be a p-n diode, p- because of the advantages of better management
i-n or an avalanche diode. Optical detection provides experience and protection. Optical Add Drop
the optical-electrical conversion. Multiplexer (PA PM) is one of the main co mponents
used for imp lementation of DWDM. An PAPM takes
a multi-wavelength signal, removes one or more
wavelengths, and replaces them with one or more pre-
selected wavelengths. Amplification and equalization
of optical signals are possible at PAPM as each optical
signal is controlled indiv idually. In DWDM, Crosstalk
is the main issue like in W DM. Crosstalk arises due to
imperfections of network co mponents and hence limits
the performance of networks based on DWDM.
exploitation of high-capacity optical networks. The degradation, numerous modulation techniques were
modulation formats used to imprint data on optical developed, each having major advantages for
carrier waves have an impact on the capacity of transmission. Differential Quadrature was shown to
DWDM networks. For real world applications, be superior than Suppressed Return to Zero (PAPM )
selection of the modulation format also depends upon and Duobinary Phase Shift Key (DB-PSK) modulation.
the other factors like interference and inter-modulation A. Sangeetha et al proposed a set of simu lations to
fro m adjacent channels, nonlinear properties and noise connect non-Return to Zero (NRZ), RZ, and CRZ
tolerance. The simp lest modulation formats used in systems in terms of signal degradation caused by Kerr
optical fiber co mmunication systems is non-return-to- non-linearities in 320 km of DW DM signal trans mission
zero (NRZ). In NRZ, pulse is ON for the entire bit simu lations. The author explored the dynamics of CRZ
period. The NRZ modulation format has the advantage systems. The CRZ modulation format was determined
of ease of generation and less bandwidth requirement. to have substantial advantages over the NRZ modulation
But NRZ is not a suitable modulation format in standard. WDM systems did not perform well across
DWDM systems as this modulation format is h ighly distances of 5000 km o r more at 10 Gb/s. The author
susceptible to linear effects. One of the most common used the CRZ modulation format across more than 5000
optical modulation formats is a return-to-zero (RZ). In kilo meters with acceptable power marg ins, and he also
RZ, pulse remains ON for a portion of the b it period. examined the generation of individual CRZ pulses. The
RZ has better performance as compared to NRZ in creation of pulses at ideal power levels was dominated
high-speed networks like DW DM, because of self- by chromatic dispersion, with non-linearity having little
synchronizing data format and resistant to Kerr non- impact. In decreasing the influence of non-linearity,
linearity. Because the RZ pulse has a greater optical symmetric dispersion compensation was shown to be
bandwidth than the NRZ pulse, it is more susceptible more important than asymmetric compensation [9, 10,
to dispersion. Chirped Return-to-Zero (CRZ) 11].
modulation format is a subset of RZ modulation A. Sheetal et al created a model of a 40 Gb/s
format. This modulation fo rmat is obtained by pre- long-distance DWDM system with a capacity of 1.28
chirp on conventional RZ pulses at the transmitter Tb/s. The modulation types Carrier Suppressed Return -
side. For long haul transmission systems at channel to-Zero (PAPM), Duobinary Return-to-Zero (DRZ), and
data rates up to 10 Gbps, CRZ modulation format is Modified Duobinary Return-to-Zero (M DDRZ) were
used. Phase modulation of RZ data format generates simu lated (MDRZ). In the research, MDRZ, a modified
CRZ. CRZ format is tolerant to the fiber non-linearity modulation format, was given. A maximu m
but wide optical spectrum is its disadvantage as it transmission distance of 1450 kilo metres was reached
reduces the dispersion tolerance and spectral using a 32-channel DWDM system employing the
efficiency [6]. MDRZ modulat ion standard with symmetric correction
[12, 13].
2. RELATED WORK Bobrovs et al.demonstrated nonlinear optical
It is crit ical to use available bandwidth as effects on NRZ and RZ modulated signals. Nonlinear
efficiently as possible in very h igh-capacity optical effects were emp loyed by the authors to demonstrate the
networks such as DWDM. Choosing modulation utilisation of Non-Return-to-Zero (NRZ) and Return-to-
methods that utilize less bandwidth is one technique to Zero (RZ) modulat ion formats in WDM systems. The
optimize available bandwidth. The modulation format outcomes of the simulation demonstrated that nonlinear
adopted must be interference-resistant and resistant to effects (NOE) were affected by dispersion and input
nonlinearity and noise in the fibre. The speedy power levels. The NRZ format is faster to generate and
implementation effort must also comp ly to budgetary has less signal bandwidth than the RZ format, which has
constraints. M. Jaworski et al discussed several less inter-symbol interference. The d ispersion value of
modulation formats. The author provided an overview NRZ systems is nearly nil. The newly produced
of the modulation types used in terabit DWDM system harmonic peak power in RZ format systems is two times
testing. Kerr In DWDM systems [7, 8], nonlinearity and lower than in NRZ format systems [14].
chromatic d ispersion of fibre are major degradation 3. PROPOSED OBJECTIVES
problems. The author ran simulat ions of a 4 x 40 Gb/s Because of its low loss, fast speed, extended
DWDM system across a 4 x 80 km single -mode fibre bandwidth, and great capacity, DWDM Stealth Optical
distance, then modified the dispersion. The simu lations networks have transformed data delivery. As a result,
of various modulation formats were then conducted. In much study has been conducted in this sector in recent
simu lations, fibre parameters like as attenuation, years. According to a review of the literature, much of
dispersion, dispersion slope, and non-linear co-efficient the study has focused on a small nu mber of nodes, a
were employed. In order to prevent fiber-induced small nu mber o f channels, and point-to-point networks,
with mu ltip le gigabits per second. The proposed [11] R. Goyal and R. Kaler, (2012), “A novel architecture of hybrid
(WDM/TDM) passive optical networks with suitable
DWDM PAPM ring network has six nodes and works
modulation format”, Optical Fiber Technology, Vol. 18, No. 6,
on 45 channels separated at 0.4 n m. Different amounts pp. 518-522.
of crosstalk were used to monitor the BER in order to [12] Wiley India Edition, New York, Third Edition, pp. 332.
analyze the influence of crosstalk on the proposed [13] X. Liu, (2005), “Can 40-Gb/s Duobinary Signals be Carried
network. Crosstalk BER was found to be the lowest at Over Transparent DWDM Systems With 50-GHz Channel
Spacing?”, IEEE Photonics Technology Letter, Vol.16, No.6,
-40 db. To find the optimu m channel spacing for the
pp. 1328-1330.
proposed DWDM ring network, channel spacing was [14] Q. Liu, N. Ghani and T. Frangieh, (2007), “Topology
varied fro m 0.2 n m to 1 n m. It was observed that at Abstraction Schemes in MultiDomain Full Wavelength
0.4 n m, the performance of the proposed ring was best Conversion DWDM Networks”, IEEE International
in term of BER, as BER was least at 0.4 n m. The Symposium on High capacity Optical Networks and enabling
performance of proposed DWDM PAPM ring is also technology, Dubai, pp. 1-6.
affected by the type of modulation format used. To
optimize the performance of the designed DWDM
PAPM ring, the optimu m data format was selected.
Various modulation formats, including NRZ, RZ,
CRZ, DPSK, Manchester, and PAPM, are emp loyed
for analysis. The three wavelengths λ1, λ25 and λ45
i.e., 1550 n m, 1555.6 n m and 1567.6 n m respectively
are taken. The selected wavelengths are modulated
and transmitted at 10 Gbps rate. Performance
parameters like eye d iagrams and BER are used to
analyze the designed ring. The eye d iagrams of PAPM
modulation format were best at all the three
wavelengths. BER was least in case of the PAPM
format. Hence, it is concluded that the PAPM
modulation fo rmat is best for the designed DWDM
PAPM ring and the performance of the designed ring
was best using PAPM modulation format in terms of
BER.
REFERENCE
[1] Senkans, Ugis, et al. "Research of hybrid WDM-PON data
transmission system with embedded ASE-powered stealth
channels for steganography applications." Optical Fiber
T echnology 58 (2020): 102300.
[2] Jingjing, Bao, and Zhan Honglin. "The Study of Generalized
Spatial Modulation Based on MPAPM Signals in Indoor
Visible Light Communication System." 2020 IEEE Eurasia
Conference on IOT, Communication and Engineering (ECICE).
IEEE, 2020.
[3] Wang, Xu, et al. "40 Gb/s Secure Optical Communication
System Based on Optical Code Technology." 2018 20th
International Conference on Transparent Optical Networks
(ICT ON). IEEE, 2018.
[4] A short history of Fiber optics;
http:/www.sff.net/people/jeff.hechts/history.html.
[5] G. Kesier, (2011), “Optical Fiber Communications”, T ata
MacGraw-Hill, New Delhi, Fourth edition, pp. 35.
[6] J. Senior, (2002), “Optical Fiber Communications”, Prentice
Hall of India, New Delhi, Second edition, pp. 105-107.
[7] H. Bulow, F. Buchali and A. Klekamp, (2008), “Electronic
Dispersion Compensation”, Journal of light Wave Technology,
Vol. 26, No. 1, pp. 158-167.
[8] M. Syuhaimi, A. Rahman and M. Moghaddasi, (2012), “A
Comparison between Electrical and Optical Chromatic
Dispersion Compensation in Wavelength Division Multiplexing
Network Regarding to Electrical Pulse Shapes”, Journal of
Computer Science, Vol. 8, No. 1, pp. 76-83.
[9] G. Agrawal, (2008), “Fiber-Optic Communications Systems”,
Wiley India Edition, New York, Third edition, pp. 427-428.
[10] A.Borsali, H. Badaoudi, M. Aichi and W. Aichi, (2012), “Effect
of Wavelength Spacing For WDM system on the Quality of
Transmission”, International Journal of Computer Science, Vol.
9, No. 2, pp. 441-443.
Abstract— The Distributed Denial of Service (DDoS) attack to access. This paper examines the protection of the commonly
entails flooding an online service with traffic from multiple used Internet of Things disassembly components and might
sources such that it is rendered unavailable. These attacks have function in the event of recent solutions. A security study is
been identified by many researchers using machine learning additionally a challenging endeavor because the kinds of
algorithms. In this paper, Ping of death attack is executed and attacks that are possible can affect many sorts of services or
their detection was performed using random forest algorithms. A perhaps damage equipment for various kinds of applications in
DDoS attack is detected by Splunk software, which collects attack a way. The researchers can make use of this study to
details about the data packets. Data from Kaggles’s dataset is
investigate various attacks on the devices. The Splunk software
used to train the machine learning algorithm. An algorithm
is employed to view the variations in the Wi-Fi and CPU
based on the random forest is used to visually differentiate
between the normal and attacked samples whose accuracy is
performance before and during the attack. This software is also
equal to 99.8%. During the attack on the network, the Central used to feed the real-time data during the attack. Classification
Processing Unit and Wi-Fi performances are also analyzed. is then performed using the Random Forest algorithm.
A classification algorithm is used to predict the results by It exploits the TCP/IP structure of the Internet to send
using the given dataset. The disadvantage of the existing unwanted or deficient data packets in the system using the ping
method is that a non-real-time dataset is used for a prediction instructions. Generally, a data packet may have a payload of up
that is taken from one or more websites that have been to 84 bytes. It is illegal to send data packets greater than 84
collected and combined as a dataset. bytes. Therefore, the attacker will break down a large packet
into many small bits and send them to the target node. When
This proposed method uses real-time data and Kaggle data that node finally reconstructs all the small pieces of the data
as a dataset to predict the results with high accuracy. The packets, the final size is larger than 84 bytes, resulting in a
training set and test set were used to visualize using the server or machine crash. In the field of computer security, Kali
matplotlib module between normal and DDoS. Linux is a commonly used term. It is recognized as the most
The remainder of this paper is arranged in the following advanced tool for advanced security assessments, ethical
format. Section III presents the proposed method for DDoS hacking, and penetration testing. Kali Linux is used to perform
attack and light automation system and Splunk software. The Ping of Death DDOS attacks by using the command mentioned
machine learning algorithms are elaborated in detail. In Section below. The code is used to perform Basic commands used to
III, the details of the experimental setup are provided. The perform
results and discussions from experimentation are detailed in
Ping of Death attack:
Section IV and conclusions are provided in Section V.
root@kali:~ ls
III. PROPOSED METHOD root@kali:~ cd DDOS
In this model, the IoT device is attacked using Kali Linux root@kali:~ ls
which sends a huge amount of packets into the network and
disrupts the normal functioning of the device, this type of root@kali:~ python2 ddos.py
attack is known as Ping of Death. Here the IoT device is the
root@kali:~ ping 118.35.108.43
voice-controlled LED which uses Adafruit and the IFTTT
platform along with the google assistant for the switching of Click Enter to start the attack
the LEDs. The Ping of Death attack is performed in an IoT
device that is controlled by the mobile phone. The real-time root@kali:~/DDOS
data from the network before and after the attack is collected IP:118.35.108.43
using the Splunk software after which the difference can be
noted. Data is fed into a machine learning model as a test set to PORT SCANNING:80
determine if an attack has occurred or not. Click enter to start the attack. After maximum packets are
sent, hit Ctrl+C to break the attack. Ping of Death attack was
successfully launched in the target system.
after attack
Table .1 Comparison of Machine Learning Algorithm
REFERENCES
[1] Banitalebi Dehkordi, Afsaneh, MohammadReza Soltanaghaei, and
Farsad Zamani Boroujeni. "The DDoS attacks detection through
machine learning and statistical methods in SDN." The Journal of
Supercomputing 77.3 (2021): 2383-2415.
[2] Rohan Doshi, Noah Apthorpe, Nick Feamster, "Machine Learning
DDoS Detection for Consumer Internet of Things Devices", 2018 IEEE
Symposium on Security and Privacy Workshops, DOI
10.1109/SPW.2018.00013.
[3] Zekri, Marwane, et al. "DDoS attack detection using machine learning
techniques in cloud computing environments." 2017 3rd international
conference of cloud computing technologies and applications
(CloudTech). IEEE, 2017.
[4] Hoyos Ll, Manuel S., et al. "Distributed denial of service (DDoS) attacks
detection using machine learning prototype." Distributed Computing and
Artificial Intelligence, 13th International Conference. Springer, Cham,
2016.
[5] Khamparia, Aditya, et al. "Multi-level framework for anomaly detection
in social networking." Library Hi Tech (2020).
[6] Mirkovic, Jelena, and Peter Reiher. "A taxonomy of DDoS attack and
DDoS defense mechanisms." ACM SIGCOMM Computer
Communication Review 34.2 (2004): 39-53.
[7] Alam, Tanweer. "A reliable communication framework and its use in the
internet of things (IoT)." CSEIT1835111| Received 10 (2018): 450-456.
[8] Bhattacharyya, D. K., & Kalita, J. K. (2016). "DDoS attacks: evolution,
detection, prevention, reaction, and tolerance". CRC Press.
[9] Sonar, K. and H. Upadhyay, "A survey: DDOS attack on Internet of
Things. International Journal of Engineering Research and
Development," 2014.10(11)
[10] Behal, Sunny, Krishan Kumar, and Monika Sachdeva. "D-FACE: An
anomaly-based distributed approach for early detection of DDoS attacks
and flash events." Journal of Network and Computer Applications 111
(2018): 49-63.
style and the utilization of outstanding activities to cover frequency circle grounded styles. Holding capacity and
a report. Concealing information through a method of shortcomings in tape steganography are the basic
denoting the photograph, this style is like a paper outcomes. The results have gained steganography ability
watermark, this style gives information in a likewise with the utilization of spatial set of rules and promptly
broad photograph place than essentially stowing away embed the information into the given photograph and not
inside the commotion position [11]. utilize the apparent adjustments and exact quality.
Change circle set of rules is embedding the information
C. Sound Steganography inside the change region and the addition of this
arrangement of rules is based on the dependability but
The Human Auditory System (HAS) is more interesting with little capacity [18].
than the Human Visual System (HVS); this is one of the
points of view that makes implanting a message in sound
III. LSB SUBSTITUTION BASED STEGANOGRAPHIC
recording in any remarkable procedure more noteworthy
TECHNIQUES
than various existing formats [12, 13].
A. LSB SUBSTITUTION IN GRAYSCALE
These methods are utilized for installing a novel strategy IMAGE
in sound recording: A record-scale virtual portrayal is a review wherein
the figure of each pixel incorporates the most
a. LSB Coding productive information. The Steganographic execution
b. Equality Coding selects the devoted LSBs (K=1,2) of each pixel to
c. Reverberation Data Hiding smooth out with the signification of the match promotion
patches [19]. The dispatch is unscrambled inside the
In audio steganography, there might be a format, which most un-extensive fix of each pixel and the wrap print
can be used as a cowl media for installing the [20]. This creates no saw to expel the real depiction. The
comprehensive record of MP3, WAV and MIDI and so procedure of LSB convenience in grayscale preview is
forth [14]. offered below. An image is examined. If there should
arise an occurrence of a dim scale picture, a 2-layered
a. LSB Coding:
framework of unsigned whole numbers with values
The un-broad byte of the supplier record is changed with somewhere in the range of 0 and 255 is achieved.
the bytes of the situation dispatch. • The pixels are pulled so and follow parallel.
• The private dispatch can remain alive and reworded
b. Equality Coding applying symmetric crucial or RSA cryptography
designs.
The equality tag of the blanket record is checked for
• The manual is broken at all significant pieces of the
closeness, in the event that similarity exists moreover no
pixels. Dim scale gets a 2-layered grid of unsigned
movement can be done and assuming the assortment
numerals (1) or (- 1).
exists furthermore any piece LSB can be scarcely
• The pixels are-reinserted into the image [21].
changed (cowl instruction or secret report) to make
equity equivalent.
B. LSB SUBSTITUTION IN COLOR IMAGE
c. Reverberation Data Hiding
The information is outfitted for including a reverberation Each pixel in RGB image is suggested by three
sound to the blanket record [15]. elements, red, blue and green assortments. The RGB
image is depicted by the line, segment, 3 array of home
a) The legitimate expansiveness is utilized to conclude unit8 / unit16 or twofold. In this quarter, LSB
the genuine measurements sound. steganography is offered, wherein the RGB conceal
b) Decay charge is useful to self-control reverberation image is applied. The plaintext is unevenly allowed
component. among the three elements, red, green and blue. The
c) The offset includes the space among the genuine movement of LSB concession in tone picture is given
discourse alarms with the executed reverberation [16]. under [22].
• A RGB image of the 3D lattice is investigated and the
D. Video Steganography pixel staying in contact with the farthest segment and
pitch nuts and bolts of each assessment is laid out and
changed into twofold.
Stowing away the tape resembles a craftsmanship of
• A private dispatch gets to and is rewarded with
concealing information due to the reality that the shipper
working symmetric legend or RSA cryptography [23].
isn't best at stowing away anyway how that report is
• The pulled patches are changed by manual fixes.
open through method of method for one and all other
Subsequently, each piece is changed with a value of
than recipients. Concealing Communication inside the
1[24].
tape is a piece of the fine art concealing information
[17].
Tape grounded steganography approaches are equivalent
to original photograph; it's named into spatial circle and
IV. STEGANALYSIS
a)
Steganalysis [25] is the method of unscrambling the
encrypted information from the stego image. The pixels
of the image are then emptied. Further, 8 portions are
removed. The removed string can be deciphered by
using a key. The square diagram of steganography is
also addressed [26]. The Steganalysis method is used
while deciphering available keys, and eventually unique
correspondence is completed.
[35]. Figure 6 depicts the proposed flowchart. In future, the deep learning techniques can be
b) incorporated to encrypt and decrypt the image and also
to analyze the different types of scanner tags.
REFERENCES
Abstract -- Block Chain is an emerging technology which Ethereum based blockchain data management for healthcare
includes a number of features by default such as, distributed application, to store and review the patient record by web
ledger, decentralised storage, authentication, security, and application allowing only identity verified users like patient,
traceability. In health sector, patient data are sensitive and it is doctors, family members and hospital staff to have the secure
very essential to be secured, which can be done using access to health information. Ethereum currently uses a proof-
blockchain technology. Exchange of healthcare data between of-work consensus mechanism. S olidity is the popular
hospitals is limited by privacy and dependency on centralized language for writing Ethereum smart contracts. The data on
data management systems. Such a centralised storage can be a Ethereum blockchain is stored using tire data structures to
concern since it can lead to data leakage, data manipulation, manage temporary and permanent data. To protect data
mistrust, and single point of failure. Blockchain offers a integrity, ownership, and permissions, smart contracts are
decentralised computing and storage solution that can help created. S ince the business can be handled by smart contracts,
with these issues. It includes smart contracts, identity there won't be a need for centralised authority to oversee and
verification and more. Integrating block chain technology with authorise it, which will cut costs.
identity management will be the solution for some issues, such
as centralized governing of identities. This system proposes Keywords— Block chain, distributed ledger, Authentication,
Smart contract, Ethereum, Identity management, decentralized.
Blockchain is a digital ledger used for recording the Patient health data includes sensitive information
transactions and it is immutable. The main issue in health care such as the patient's past health record, investigation report,
is securing patient data from data theft, modification, data therapy, test reports, and other specifics . Both manual and
breach and identity issues. A significant difficulty is how to computerized management of these health data is possible.
authenticate information regarding identity and access control The manual approach, which uses papers and ledgers, is the
[18, 19]. Blockchain technology relies on private keys to sign long-standing procedure used in the majority of hospitals to
each transaction and authenticate a user's identity . Open- retain records [14,15]. The drawbacks of this approach are
source operating system Ethereum creates a peer-to-peer the necessity for enormous storage spaces and the
network and provides smart contract capability. It is a challenging nature of data retrieval. Currently,
platform for distributed computing that facilitates the creation computerization of clinical data is common due to the ease
of decentralised Digital applications (DApps) with the use of of data storage and retrieval. However, there is a risk that
block chain technology. data manipulation will become a significant issue.
Currently, healthcare organizations save patient data,
The decentralised virtual computer known as the diagnostic results, and prescriptions in a centralized manner
Ethereum Virtual Machine (EVM), provided by Ethereum, [16,17]. There is a potential of data leakage because it is a
may run programmes via a worldwide network of public centralized system. Since patients have limited control over
nodes. Ethereum's native programming language is called their data and sharing the acquired data is a laborious &
Solidity. A smart contract is a piece of software code designed challenging process, hackers can easily steal or exploit
to execute, manage the pertinent events, and uphold the patient data for a variety of reasons.
conditions of a contract or agreement automatically. It is
powered by the open-source Ethereum technology. Smart
contracts make it possible to conduct legal transactions alone.
These transactions can be tracked and are permanent.
REGISTER
DOCTOR - A
Hospital - X 2
REGISTER
DOCTOR - B
2
REGISTER THE
PATIENT
Hospital - Y
ACCESS TO PATIENT
DATA
Create 3
blockchain
DOCTOR - A
V. References
[1] Vazirani A, O'Donoghue O, Brindley D, Meinert E,”Implementing
Blockchains for Efficient Health Care: Systematic Review”J Med
Internet Res 2019
[2] Vardhini B, Shreaya N Dass, Sahana R. “A Blockchain based
Electronic Medical Records Frameworks using Smart Contracts”
International Conference on Computer Communications and
Informatics (ICCCI) 2021
[3] Kavinga Yapa Abeywardena, Budhima Attanayaka, Kabilashan
Perisamy, “ Blockchain based Patient’s detail management System”.
In 2020 2nd International Conference on Advancement in
Computing/ DOI: 10.1109/ICA51239.2020.9357163.
[4] Kumar, R.; T ripathi, R. A Secure and Distributed Framework for
sharing COVID-19 patient Reports using Consortium Blockchain and
IPFS. In Proceedings of the 2020 Sixth International Conference on
Parallel, Distributed and Grid Computing (PDGC), Waknaghat, India,
6–8 November 2020
[5] Kevin Peterson, Rammohan Deeduvanu, Pradip kanjamala, Kelly
Boles. “ A Blockchain-based Approach to HIE Networks”.
ONC/NIST ,2016.
[6] Peng Zhang, Jules White, Dougias C, Schmit, Gunther
Lenz,S.T rentRosenbloom.”FHIRchain:ApplyingBlockchain to
Securely and Scalably Share Clinical Data”. Elsevier,22018.
[7] Ichikawa, D.; Kashiyama, M.; Ueno, T . T amper-resistant mobile
health using blockchain technology. JMIR mHealth uHealth 2017
[8] Catalini C, Gordon, W.J. "Blockchain technology for healthcare-
Facilitating the transition to patient-driven interoperability". Comput.
Struct. Biotechnol. 2018, 16, 224–230
[9] Shen, B, Guo, J, Yang, Y. "MedChain: Efficient Healthcare Data
Sharing via Blockchain". Appl. Sci. 2019
[10] Hsin-Te Wu, Chun-Wei T sai. "Toward blockchains for health-care
systems: Applying the bilinear pairing technology to ensure privacy
protection and accuracy in data sharing", IEEE Consum. Electron.
Mag. 2018
[11] Rouhani, S., Butterworth, L., Simmons, A.D., Humphery, D.G.,
Deters, R. "MediChainT M: A Secure Decentralized Medical Data
Abstract — Probably, the most valuable asset of a digital and the camera captures continuous video. Face recognition is
device is its data and their security. An intruder detection system carried out using Open Computer Vision library. The image of
is a modern concept that is absolutely necessary for a computer the user had already been saved in the database. The image
system to have a secured data and its features. This intruder will be compared to the datasets in the database by the system.
detection system detects intruders and sends an alarm to the If the captured image does not match the dataset image, the
appropriate party. As a result, the incident responder can system will save the image by clicking it. After that, Simple
quickly evaluate the problem and take appropriate action. Here Mail Transfer Protocol library generates a mail and sends it to
in the system the image of the person is captured through a web
the specified mail address. The email contains a picture of
camera. The extracted face is recognized and then stored in a
intruder and the screen recorded video as attachment.
separate folder. The captured image is compared to the
authorized person’s saved image in the database. By comparing,
the system can distinguish between authorized and illegitimate II. IMAGE PROCESSING
users. If an unauthorized person is discovered, the system sends
The process of transforming an image into a usable format is
the owner the recognized image through email. Along with that
this model also sends the recorded screen video of the intruder,
known as image processing and converting an image to a
which will give information about what the intruder tried to do digital format and executing operations on it to extract
with the device. Then to alert the authorized person a normal important information from it. When implementing specific
message is also sent to the authorized person mobile number signal processing algorithms, the image processing system
because one may not check the mail frequently so sending an normally treats all images as 2D signals.
SMS will alert the authorized person even if their phone is out of
internet. Then at last the device will make an alarm to alert the A. Types of Image Processing
people around the device and then it will be locked, so the • Visualization - Locating objects that aren't visible in
intruder can no long access the device. the image
Keywords—intruder detection; face recognition; Open
• Object Recognition – Identifying and detecting things
Computer Vision; twilio; Simple Mail Transfer Protocol
in an image
I. INTRODUCTION • Sharpening and Restoration – From the original
Human intrusion on a personal device states that a security image, an upgraded image is created.
event in which the intruder gains access to the system or it’s
resource without having authorization. The purpose of a • Pattern recognition - Calculating numerous patterns
human intrusion detection system is to detect illegal access to around the image's items
a digital system, gadgets, PC, Laptop or a protected systems
and deny such unauthorized access to protect personnel and
secured data from damage or theft. This technology detects • Retrieval - Browse and search through a big library
intruders correctly and provides security. By identifying the of digital photos that are similar to the original.
intruder, this technology can help to decrease data and
information theft. The model has the ability to respond fast, B. Steps In Image Processing
ensuring that no theft occurs in our systems or devices. The • The initial stage in image processing is image
camera is accessed through the webcam in this arrangement, acquisition. In image processing, this step is also
known as pre-processing. It entails getting the image Sivakumar et al.[3] have worked on home security
from a source, which is usually hardware. enhancement by sending verification letters to the house
owner or using face recognition to detect intrusion are
• Image enhancement is the technique of bringing out common examples. This research combines the two
and highlighting certain interesting characteristics in a techniques and provides a two-layered solution that is simple
previously concealed image. This can include and cost effective.
adjusting the brightness, contrast, and other settings.
The system is intended for the property's main entrance and
• Image restoration is the process of enhancing an has already been designed and demonstrated. An Arduino
image's look. Picture restoration, unlike image controller interfaces with sensors and image processing tools
augmentation, is done using mathematical or in MATLAB to authorise entrance using a GSM module in
probabilistic models. this system, Limitations – The movements of the intruder are
• In the digital domain, colour image processing detected but face is not detected in this paper, they have
encompasses a variety of colour modelling techniques. mentioned it will be done as future work.
Because of the widespread usage of digital photos on Bhanse et al.[4] have worked on an Face revelation is used
the internet, this step has acquired popularity. in this application to boost the auto applications. It
• Wavelets are a type of visual representation that demonstrates how the camera's confidence affects the edge
comes in a variety of resolutions. For data every second and, consequently, the ideal open door for
compression and pyramidal representation, the images standing up to acknowledgement. The image processing for
are separated into wavelets or smaller sections. face identification, face tracking, and recognition for
automotive applications is done here using Open Computer
• Compression is a technique for reducing the amount Vision. Wang et al.[5] have worked on intrusion detection
of storage or bandwidth needed to save or transmit an system for video surveillance, Target detection, automatic
image. This is especially true when the photograph identification, and automatic alert are the system's core
will be used on the Internet. function modules. The system will call the camera and launch
• Morphological processing is a collection of processes the video surveillance and automatic alarm system when the
used to morph images based on their forms. user starts the software. Intrusion behaviour is detected using
the three frame difference method and the background
• One of the most difficult phases in image processing subtraction method. The system is practical, easy to run, and
is segmentation. It entails breaking down an image has a greater working efficiency, allowing it to achieve the
into its component bits or objects. user's intended purpose.
• Each region of an image is represented and described Menage et al.[6] have on the system It is used to identify
in a form appropriate for further computer processing intruders and send an alert to a designated person. As a result,
once it is divided into regions in the segmentation the incident responder can quickly evaluate the problem and
process. The qualities and regional properties of a take appropriate action. The PIR sensor detects human
picture are dealt with in representation. The task of movement in the system, which is captured using the Pi
description is to extract quantitative information that camera. The extracted face is detected and then delivered via
can be used to distinguish one class of things from HDMI connection to the Raspberry Pi. In Open CV- Python,
another. this system works great. The taken image is compared to the
authorised person's saved image in the database, Limitations –
• Recognition is the process of assigning a label to an The picture of the intruder is sent only through mail. It may
object based on its description. not be sure if the user has internet connectivity all the time to
check the intruder’s activity. Ron Bitton et al.[7] Securing
III. LITERATURE REVIEW Remote Desktop Connections to Electronic Flight Bag Servers
with a Machine Learning-Based Intrusion Detection System it
functions by far off work area conventions (RDP) are
Various researches have been done on Detecting an regularly utilized for associating and interfacing with PCs
Intruder. This study is done prior to beginning the project by from a distance. For this situation, a server part runs on the far
which one can comprehend the many methods that have been off PC and offers its work area (i.e., screen) with the client
employed in the past. This research assisted in determining the part which runs on an end client gadget. As of late, various
advantages and disadvantages of the current system. weaknesses have been distinguished in two generally utilized
Jan Lansky et al. [1] have worked on deep learning-based far off work area executions, Microsoft Remote Desktop and
intrusion detection systems, and present a comprehensive RealVNC. These weaknesses might uncover the distant server
study and classification of these schemes. It explains how to another assault vector.
deep learning networks are used in the intrusion detection Chunjie Zhous et al.[8] have worked on numerous models
process to accurately detect intrusions, Limitations – Used old are built by exhaustively breaking down the multidomain
datasets which cannot represent the current threats and information on field control layers in modern interaction
security attacks. Nelson et al.[2] have worked on to figure out computerization, with thought of two perspectives: physical
the quickest way for homeowners to be notified if an intruder science and data. Wei Zhong et al.[9] have worked on an AI
or thief breaks into their home utilising a proactive based Intrusion Detection System (Intruder Detection System),
surveillance system The outcome demonstrates that the system has turned into an imperative part to safeguard our financial
can identify and recognise intruders and provide a proactive and public safety. Past shallow learning and profound learning
notification to homeowners via a mobile application, techniques embrace the single learning model methodology
Limitation – The resolution of the image is reduced to increase for interruption identification. The single learning model
the Frames per second to capture the intruder. methodology might encounter issues to see progressively
B. Proposed System
The system consists of a web camera which is used to V. METHODOLOGY OF SYSTEM
acquire the video continuously and with that the picture of the
person is taken. So it requires no additional cost for Using the Open Computer Vision and face recognition
installation. Then the camera continuously monitors and library the intruder is detected, then using Simple Mail
obtains the video, Images are taken for each period of time Transfer Protocol and Twilio API the intruder will be
from the captured video. The Images will be in RGB format. reported. This approach uses the below processes to detect and
These images are examined once again to see if the invader is report the intruder.
still present. If there is no invader, the processing will come to
a halt. If there is an intruder on the premises, then the model A. Detecting an Intruder
takes a snap of the intruder image and sends an e-mail and a
message by this system This includes a notification of the Initially the images of the authorized person is stored and
intruder's existence as well as the intruder's photograph. Then will be given as input to check the intruder. Then using the
an alarm will be raised to alert the people around the device Face recognition Python library the picture of authorized
and finally the system will be locked. person is compared with the unknown person. The image will
be converted into numerical encoding, so that it will be easy
C. Modules Used for the model to do the comparison. When the authorized
person is unavailable, then the system recognize the intruder
When a new person tries to access the device the new
by comparing with loaded image in authorized folder. Once
person’s face will be compared with the authorized person. If
there is no match then the new person will be labelled as the person if found as intruder, the camera will stop recording
intruder. at a fixed time and next process will get started.
NO
YES
VI. RESULT
The program will be executed and then the camera will be
turned on to check if any other person other than the
authorized person using this PC. It will compare the face
detected from the camera with the authorized person image
and display the result below the image.
Fig 6. Received SMS
VII. RESULT ANALYSIS [3] Chen, Joy Iong Zong. “Smart Security System for Suspicious Activity
Detection in Volatile Areas”, Journal of Information Technology 2, no.
01 (2020): 64-72.
A. About Pycharm
[4] Chunjie Zhou, Shuang Huang, Naixue Xiong, “Design and Analysis of
PyCharm is a Python Integrated Development Multimodel-Based Anomaly Intrusion Detection Systems in Industrial
Environment (IDE) that includes a variety of key tools for Process Automation”, 2020, IEEE Transactions on Systems, Man, and
Cybernetics: Systems, ISSN Information: 2168-2232
Python developers that are tightly integrated to create a
[5] Jan lansky, Saqib ali, Mokhtar Mohammadi, “Deep Learning-Based
pleasant environment for effective Python, web, and data Intrusion Detection Systems: A Systematic Review”, 2021, IEEE access,
science development. It offers with a robust set of capabilities Electronic ISSN: 2169-3536
that support the most up-to-date development methods right [6] Manish Kumar, Ashish Kumar Singh, “Distributed Intrusion Detection
out of the box. Smart code completion, code inspections, System using Blockchain and Cloud Computing Infrastructure”, 2020,
automated code restructuring, an integrated debugger, and a 2020 4th International Conference on Trends in Electronics and
Informatics (ICOEI) (48184), Electronic ISBN:978-1-7281-5518-0
test runner are all included in PyCharm Community Edition. It
[7] Nelson C. Rodelas1, Melvin A. Ballera2, “Intruder detection and
simplifies the management of large projects. recognition using different image processing techniques for a proactive
surveillance”, 2021, Indonesian Journal of Electrical Engineering and
B. Accuracy Calculation Computer Science, pp. 843~852
According to this project, initially all the images will be [8] Nitesh Singh Bhati, Manju Khari, “Comparative Analysis of
considered as the input data and processing data. But as per Classification Based Intrusion Detection Techniques”, 2021, 5th
International Conference on Information Systems and Computer
proposed method, we need to pre-process the image for Networks (ISCON)
obtaining result. [9] Ron Bitton, Asaf Shabtai, “A Machine Learning-Based Intrusion
Accuracy = (TP+TN)/(Total). Detection System for Securing Remote Desktop Connections to
Where TP = True Positive, TN = True Negative Electronic Flight Bag Servers”, 2021, IEEE Transactions on Dependable
The world's simplest face recognition library recognizes and and Secure Computing, ISSN Information: 1941-0018
manipulates faces from Python or the command line using the [10] Sivakumar, Swetha, and R. GomathiBhavani, “Image Processing Based
System for Intrusion Detection and Home Security Enhancement”, 2018
face recognition module. The library is based on dlib's deep 3rd IEEE International Conference on Recent Trends in Electronics,
learning-based state-of-the-art facial recognition. On the Information & Communication Technology (RTEICT), pp. 1676-1680.
Labelled Faces in the Wild benchmark, the model has a 99.38 IEEE, 2018
percent accurate rate [11] S. Menaga, A. Priyadharshini, V. Subalakshmi, “A Smart Intruder
Detection System”, 2021, International Journal of Engineering Research
& Technology (IJERT), ISSN: 2278-018
[12] Vaishali Bhatia, Shabnam Choudhary, K.R Ramkumar, “A Comparative
Accuracy Study on Various Intrusion Detection Techniques Using Machine
Learning and Neural Network”, 2020, 8 th International Conference on
Reliability, Infocom Technologies and Optimization (Trends and Future
Directions) (ICRITO).
[13] Wang, Jin-xiang, “Research and implementation of intrusion detection
Face Recognition algorithm in video surveillance”, 2016, International Conference on
Audio, Language and Image Processing (ICALIP), pp. 345-348, IEEE,
2016
[14] Wei Zhong, Ning Yu, Chunyu Ai, “Applying big data based deep
0 50 100 150 learning system to intrusion detection”, 2020, Big Data Mining and
Analytics, Electronic ISSN: 2096-0654
Accuracy
[15] Xue Ying Li, Rui Tang; Wei Song, “Intrusion Detection System Using
Fig 7. Accuracy of Face Recognition Module Improved Convolution Neural Network”, 2022, 11th International
Conference of Information and Communication Technology (ICTech))
VIII. CONCLUSION AND FUTURE SCOPE
Science and technological innovation is a never-ending
process. New products and technology are always being
developed. Hence this intrusion detection system helps to
avoid data theft and to provide a secured computer
application. So that one can keep their personal device turned
on without worrying about any intruders.
Abstract- This research work proposes an attack by the attack stage. In the preparation phase, the
detection algorithm for the industrial internet of information about the target is collected by the
things (IIoT) which uses an attention-based Conv- attackers.In the attack phase, the target
LSTM and Bidirectional Long short-term memory infrastructure/equipment is under the control of
(Bi-LSTM) network. The approach consists of two attackers and the attackers will launch attacks on
feature extraction modules namely attention-based thetarget. This first phase is performed in three stages
Bi-LSTM feature extraction and Convolutional namely (a) Intrusion penetration, (b) Lurking, and (c)
LSTM (Conv-LSTM) feature extraction algorithm Lateral intrusion. In the intrusion penetration stage,
that extracts the features on the same data. The Bi- the attackers identify the device that has less security
LSTM further extracts two types of features where in the IoT system and takes central of the weak secure
one type is extracted in the forward pass while the device. In the lurking stage, the controlled device will
other is extracted in the backward pass. The Bi- collect essential information by hiding in the IIoT
LSTM and Conv-LSTM extracted features are target as normal authenticated devices. This lurking
fused and are trained/tested using the fully process may occur for several months. In the intrusion
connected layer of the neural network to detect stage, move weak devices will be under the control of
normal or abnormal data. The evaluation of the attackers for collecting more sensitive information as
algorithm was performed using the metrics namely illustrated in Fig. 1. There are two types of attacks
false negative rate, false alarm, detection rate, and namely low frequency and multistage. In the low-
accuracy with the IIoT dataset namely AWID, and frequency type, the attacker gets undetected for
CTU-13. The proposed approach provides an several years or months and collects the data. In this
accuracy of 98.02% and 95.98% for the AWID, type, only a few abnormal data are produced. In a
and CTU-13 datasets respectively which shows multi-stage attack, the intensity of the attack will
that the algorithm outperforms other recent IIoT increase. The attackers will get control of USB
attack detection algorithms. devices, wireless devices, local area network (LAN)
servers, etc. Finally, the target industrial infrastructure
Index Terms-Convolutional-Long Short Term or equipment will be attacked by a virus.
Memory (Conv-LSTM), Bidirectional Long Short
Term Memory (Bi-LSTM), Industrial Internet of An intrusion detection system (IDS) is used to detect
Things (IIOT) attack, Feature Extraction, such attacks that perform three major functions
Attention namely (a) It monitors the firewall, routers, and
servers (b) It identifies the patterns of malicious
1. INTRODUCTION
content and supports the network administrator for
Recently, due to the development of cloud effective control (c). It sends a notification on
computing and the internet of things (IoT), industrial detecting malicious content. Two approaches namely
systems have established the industrial internet of signature-based schemes and behavior-based schemes
things [1] (IIoT). This IIoT has become the attack are used in the Intrusion detection system.Signature-
target of attackers. There are two phases in IIoT based schemes provide better performance for the
attacks which include the preparation phase followed detection of unknown malware attacks since these
schemes compare the incoming data traffic with the the system that was linked to the attack which also
signature of attacks that was stored in the database. uses statistical information.
The behavior-based IDS alsomonitors the behavior of
Several researchers are working on developing IIoT from each interval to detect the abnormality. The
attack detection algorithms where the traditional author Smadi et al. [8] used a feature extraction
schemes can be categorized as time series detection algorithm on the input data in an adaptive approach,
and online learning detection. In the time series where the implementation was done to detect phishing
approach, the data is initially divided into different e-mails. A principal component analysis (PCA) based
intervals from which the interval score is estimated. approach was proposed by Wang et al. [9] where the
The author Ren et al. [2] used a dynamic Markov abnormal feature variation is detected from
model, where the memory attribute length is balanced theextracted features. The author Roshan et al. [10]
using a high-order Markovmodel. The real-time state used an extreme learning approach using the new
prediction approach was combined with the dynamic detection data and the historical data. The model is
duration approach [3] by Ortega et al., where varying updated by estimating the mean square error (MSE).
time window is used for anomaly detection. The Deep learning algorithms [11] are also used in
authors Melnyk et al. [4] used a semi-Markov-based anomaly detection, where the LSTM model [12]
auto-regressive approach where the data suggested shows a better performance. The data at current or
phase distribution is compared with the model- past instances may be used to predict the abnormal
predicted phase distribution. The online learning data that was arriving in the future. Therefore a short-
schemes proposed by Ozkan et al. [5] used temporal term prediction of normal/abnormal at any time
data for anomaly detection. In this approach,Neyman- instance is performed using the hybrid conv-LSTM
Pearson's approach is used in detecting the anomaly and Bi-LSTM model.The contribution of the paper is
from the received dynamic and static data. This as follows,
approach shows better performance when there is a (i) The paper proposes an attack detection algorithm
high/large sequence data rate. by detecting the features extracted from the IIoT data
which classifies the data as normal/abnormal.
The authors Sasikala et al [6] used a (ii) The feature extraction algorithm uses two modules
classifier namely XGBoost for the detection of namely Bi-LSTM and attention-based Conv-LSTM.
attacks. The attack detection on the cloud was TheBi-LSTM generates two different features namely
proposed using a Flower Pollination Algorithm by the forward and backward pass features. The extracted
authors Ananthi et al. [7], where the scheme can features are trained using the fully connected layer to
detect different attacks on wireless sensor detect the abnormality.
networks.Since the time series approach uses the (iii) The evaluation of the algorithm was done using
model for attack detection on a selected time interval, the dataset namely AWID, and CTU-13 using the
the performance of attack detection reduces if there is metrics false negative rate, false alarm, detection rate,
a mismatch between the actual attack interval and and accuracy.
chosen attack interval. In the online learning The remaining section of the paper is constructed as
approach, a few features are extracted from the data follows. Section II shows the proposed IIoT attack
network Result
Data dataat a time instance having size is convolved with
layer
Normal/ the kernel equal to the size of the arrived data that is
Conv-LSTM
Abnormal received on that time instance. The convolved data is
network
then applied to the function followed by a
normalization, where the function also uses the
Fig. 2:Block diagram representation of proposed LSTM output estimated from the two-layer
attack detection in IIoT convolution. The normalized feature and the LSTM
features are multiplied to obtain the Conv LSTM
Therefore the data on a time frame be represented as output.
{ } (1)
Data
LSTM
The Conv-LSTM performs, the convolution operation
network LSTM
in two layers (layer-1, and layer-2) the convolution
output is applied to the LSTM network and an network
LSTM
attention process. Let and be the kernels of network LSTM
CNN in layer-1 and layer-2 respectively. The
.....
network
convolution operation in layer-1 can be expressed as,
LSTM
( )( ) ∫ ( ) ( ) (2) network LSTM
network
The convolution operation in layer-2 can be expressed LSTM
as, network LSTM
network
( )( ) ∫ ( ) ( ) (3)
The feature value obtained from the LSTM and Fig. 4: Representation of Bi-LSTM
attention process are multiplied to obtain the Conv-
LSTM feature . The Conv-LSTM generates the The Bidirectional LSTM (Bi-LSTM) consists of two
output from the IIoT data input as. processes namely forward pass and backward pass.
This Bi-LSTM consists of two sections of cascaded
LSTM network where one network performs the
forward pass while the other section performs the
backward pass. The forward pass section generates
the output , similarly, the backward pass section
generates the output . The representation of
forward pass and backward pass in bi-LSTNM is
represented in Fig. 4. The LSTM layer estimates the The features are trained using the fully
hidden state of each time step represented as connected layer of the neural network. The features
that are extracted by the Conv-LSTM and Bi-LSTM
[ ] (5) are trained in the fully connected layer that has layers
such as the input layer, hidden layers, and output
The output of the attention can be estimated as layers. The number of neurons in the input layer is
equal to the number of features extracted by the
∑
(6) hybrid algorithms. Two neurons are used in the
outputlayer where one neuron represents the
Where the score estimated as classification result that corresponds to normal data
while the other neuron represents the classification
( ) (7) result that corresponds toabnormal data.The attack can
be detected periodicallyon the IIoT network using the
Where represent the hidden output of Conv-
trained model. For handling the attack detection in the
LSTM. , and are the learnable parameters.
cloud data, the algorithm can be implemented in the
The attention output depends on the hidden cloud server, where the IIoT network is also
variable and input . The output gate, cell state, connected. Thus the algorithm can detect the
forget gate, and input gate in the LSTM network is attackfrom the data that was received on the network
given by that was sent by the attacker.
(12)
and Security (NT MS), 2016 8th IFIP International Conference on.
IEEE, 2016, pp. 1–5.
[4] I. Melnyk, A. Banerjee, B. Matthews, and N. Oza,
“Semimarkov switching vector autoregressive model-based
anomaly detection in aviation systems,” in Proceedings of the 22nd
ACM SIGKDD International Conference on Knowledge Discovery
and Data Mining. ACM, 2016, pp. 1065–1074.
[5] H. Ozkan, F. Ozkan, and S. S. Kozat, “Online anomaly
detection under markov statistics with controllable type-i error.”
IEEE T rans. Signal Processing, vol. 64, no. 6, p p. 1435–1445,
2016.
[6]. Sasikala, D., Chandrakanth, D., Reddy, C., & Teja, J. J. (2022).
Inhibiting Webshell Attacks by Random Forest Ensembles with
XGBoost. Journal of Information Technology and Digital
World, 4(3), 153-166.
[7]. Ananthi, J. Vijitha, and S. Shobana. "C-FPA: A Cloud-Based
FPA Novel Approach to Defend Hotspot Issues and Attacks in
WSN." Journal of Information Technology 4.2 (2022): 95-104.
Fig. 7: Variation of accuracy for different epochs
[8] S. Smadi, N. Aslam, and L. Zhang, “Detection of online
during training in AWID and CTU-13 datasets. phishing email using dynamic evolving neural network basedon
reinforcement learning,” Decision Support Systems, vol. 107, pp.
The variation of accuracy during the training epoch is 88–102, 2018.
illustrated in Fig 7. Since the conv-LSTM and Bi- [9] T . Wang, J. Xu, W. Zhang, Z. Gu, and H. Zhong, “Selfadaptive
cloud monitoring with online anomaly detection,” Future
LSTM are trained with 50 epochs, the model attains a
Generation Computer Systems, vol. 80, pp. 89–101, 2018.
training accuracy of around 95%. The accuracy [10] S. Roshan, Y. Miche, A. Akusok, and A. Lendasse, “Adaptive
almost stabilizes as the number of epochs reaches 50 and online network intrusion detection system using clustering and
when evaluated using both the AWID and CTU-13 extreme learning machines,” Journal of the Franklin Institute, vol.
355, no. 4, pp. 1752–1779, 2018.
datasets. From Fig. 7 it is clear that the model attains
[11]. Suchetha, M., et al. "Region of interest -based predictive
a maximu m training accuracy infewer epochs. algorithm for subretinal hemorrhage detection using faster R-
CNN." Soft Computing 25.24 (2021): 15255-15268.
IV. CONCLUSION [12]. Li, X., Xu, M., Vijayakumar, P., Kumar, N., & Liu, X. (2020).
Detection of low-frequency and multi-stage attacks in industrial
The model proposed an IIoT attack detection internet of things. IEEE Transactions on Vehicular
algorithm that uses an attention-based Bi-LSTM. The Technology, 69(8), 8820-8831.
[13]. Zheng, Haifeng, et al. "A hybrid deep learning model with
algorithm initially extracts two different features from attention-based conv-LSTM networks for short -term traffic flow
the IIoT data using attention-based Conv-LSTM and prediction." IEEE Transactions on Intelligent Transportation
Bi-LSTM networks. The extracted features are fused Systems 22.11 (2020): 6910-6920.
and trained using the fully connected layer of the [14] M. T avallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “ A
detailed analysis of the kdd cup 99 data set,” pp. 1–6, 2009.
neural network. Evaluation metrics namely false [15] P. Berezi´nski, B. Jasiul, and M. Szpyrka, “An entropy based
negative rate, false alarm, detection rate, and accuracy network anomaly detection method,” Entropy, vol. 17, no. 4, pp.
are used to evaluate the proposed attack detection 2367–2408, 2015.
algorithm with the datasets namely AWID, and CTU- [16] J. Jeong, T . S. Yoon, and J. B. Park, “Mean shifttracker
combined with online learning-based detector and kalman filtering
13. The detection accuracy of the AWID, CTU-13 for real-time tracking,” Expert Systems with Applications, vol. 79,
dataset was estimated as 98.02% and 95.98% pp. 194–206, 2017.
respectively. The performance of the algorithm was [17] Y.-L. Kong, Q. Huang, C. Wang, J. Chen, J. Chen, and D. He,
found to be better when compared to similar attack “Long short-term memory neural networks for online disturbance
detection in satellite image time series,” Remote Sensing, vol. 10,
detection schemes. no. 3, p. 452, 2018.
References
Abstract: S ince a large amount of data gets transferred, Internet-based IT services are represented, and
the security and privacy are important in cloud current consumption is supplemented by the new
computing which increases the risk of data attack. Cloud computing method. As a service, dynamic
Cryptography is a method of transmitting and storing
scaling and regular virtualization are given [2].
data so only the intended receiver or recipient can read
and process it. The original message, known as plain Internet service providers provide a number of
text, can be converted to an unintelligible version internet services that benefit users when utilized. As a
known as cipher text in cryptography. The ability to result, resources must be saved in management and
securely delete sensitive data from storage is becoming computation, as well as data storage. Specific
more important. In this method some important services, such as lower-cost client hardware and
security services including authentication Protocol is software are provided by service providers. Large
provided in cloud computing.The entire architecture is volumes of data are also kept on remote servers as
divided into four modules they are security server, computing resources and storage increase.
cloud database, hybrid authentication protocol and
communication. To provide efficient security hybrid
authentication protocol is utilized. In hybrid Remote locations also have access to computing
authentication protocol initially data will be registered resources (software and hardware) and cloud
and to this data privacy is provided using privacy computing takes use of these to access the entire
module. Now to the obtained data security key is network. Expanding techniques for using cloud
provided. After that data base functions are performed. computing to transform information technology
Security server will provide security for the transmitter processes will be created in the future. Due to its
and received data. Cloud data base will store the data. many advantages, including flexibility, cost-
From results it can observe that hybrid authentication effectiveness ,scalability and most businesses use
protocol will improve the performance, security,
cloud computing technology to transfer cloud data. In
scalability and reduces the errors, Delay and attacks
which are obtaining from unauthorized users. order to share informat ion or documents other
among staff members in the cloud and an
Key Words:Cloud data base, Security server, hybrid organization subscribes to cloud services using a
authentication protocol, Cloud computing, Cryptography, cloud service application. Every file is characterized
Delay. by a set of keywords, and members of staff or other
I.INTRODUCTION authorized users have the ability to download a file
Internet computing resources are provided by cloud fro m the cloud by querying the cloud using specific
computing. The Cloud computing network has keywords.
absorbed the majority of applications, resulting in a
system that is more persistent [1]. The exponential The Vectorspacemodel is co mmonly used in
growth of modern data centres, social network data informat ion retrieval because of its simplification and
and a sudden increase in computing data power and adaptability. An information retrieval system based
storage are the primary reasons for adopting cloud on boolean models has issues with addressing and
computing. So me of them have low utilisation and order ranking. The vector space model is emp loyed
high costs, which could be reduced by developing for informat ion retrieval, but as a result, the search
cost-effective and reliable cloud-based solutions. precision for informat ion is inadequate since long
documents with poor representation exhibit poor complete analysis of Physical Unclonable
similarity values; in these situations, spontaneous Functions (PUF) features of rad ios for improved
weightings are acceptable, but not in the vector space security of physical layers[3]. The theoretical
model. The term-based order of the documents is lost enhancement of RF-PUF is represented for an
in the vector space approach. asymmetric IoT network.Any additional hardware
The design of the newly introduced N-level vector at the constrained resource of IoT node is not
design system ranking scheme, wh ich explores a required for RF-PUF operation.PUF
novel idea for term weighting and takes into account implementation at Tx node does not require on-chip
the feature term location in the document, effect ively oroff-chip circuitry fo r RF-PUF.Process variability
removes this difficu lty. Then, using the newly and component to lerance factors are inherent
introduced system, the ranking process of encrypted variations developed in proposed schemeateach
documents is evaluated once the document content transistor.A framework basing on machine learning
has been properly described. This newly p resented techniques is designed in this study which reduces
formula, which is supplied for information ext raction, the nonidealities such as data variability accounts
produces a better retrieving outcome. With this and variability in channel at receiver end.
approach, a new termweighting formu la is Atthe time o f data transmission, the data packets
introduced, and the featureterm location and a brief are highly prone to attacks.To overcome these
summary of its contents are also included in the drawbacks a powerfu l method is required that not
document. only provides security but it should improve the
efficiency of currently wo rking network
A group of sensor nodes are connected to each other system.This study presents a new technique based
in anetwork through wireless Co mmunicat ion is on mach ine learning which generates fake data for
called Wireless Sensor Network(WSN).Sensornodes providing secured path for commun ication among
are distributed spatially in WSN that are controlled sensor nodes by misleading the attacker. In
mutually in so meconditions. Sensornodes are present proposed technique generation of faked at a packets
in adversarial environment such that the attackers can is not supported in order to reduce consumption of
easily enter into the network fo r capturing data fro m power and it avoids end to end delay by promoting
physical nodes. In most ofthe cases, the sensors may through put rate.
devices in any of the present node where every single
sensor represents mult iple sensor identities within the
II.LITERATURE SURVEY
network.Syb il attacks may remarkab ly decrease the
Ambika Gupta, Anjan i Mehta, LakshyaDaver,Priya
rig idness off aulty systems like maintenance of
Banga.et.al [4], In th is co mputerized period, the
topology and distributed storage. Geographic routing
development of many various applications makes the
protocols mayhave be open for threats such that an
liv ing souls in a manner more brilliant and yet it
adversary using theSybil attack is appeared in
likewise expands how much informat ion to an
mu ltip le sensor nodes at a time to manipulate the
exceptional rate.
location data information with neighbour nodes.
Fabio Bracci, Antonio Corradi, Luca Foschini.et.al
Authentication of identity for sensor node has to be [5], Soft ware as a Service (SaaS) applications
performed in turn to prevent attacks.Such activities completely taking advantage of the capability of
are practiced for public key cryptography in versatile Cloud figuring foundations normally is
conventional internet. The ability of resource empowering new universal access situations for
constrained with this storagecost sensor node is not itinerant clients, like market sales users and home
efficient fo r generation of d igitalsignatures. Present med ical care clinical data. SaaS applications
working models sort out the issue by forming commonly expect to move in formation and assets to
secured pair wise keys through pre-distribution the Cloud framewo rk site; that raises a few testing
methods of random key and. Ho wever, th is issues spreading over from access control to assets to
simp lification is not totally secured and energy protection insurance, proprietorship, and security of
efficient. the information of the last SaaS clients [14][15].
as one of the significant components of data results were essentially reliant upon the particular
innovation. The success of Cloud Co mputing requires examples tried and the pursuit terms utilized by the
the moving fro m server-appended capacity to specialist [9][10][11].
disseminated capacity [12][13].
III. HYBRID AUTHENTICATION PROTOCOL
Yun Zhang, FarhanPatwa, Rav i Sandhu.et.al[7] a The below figure (1) shows the architecture of hybrid
public cloud gives undertakings and associations a authentication protocol. The entire architecture is
safe and effective climate to convey their divided into four modules they are security server,
frameworks. While associations and organizations cloud database, hybrid authentication protocol and
benefit fro m mov ing to cloud stage, almost certainly, communicat ion. To provide efficient security hybrid
comparative d igital assaults will happen to authentication protocol is utilized. In hybrid
associations what share a similar cloud stage. One authentication protocol initially data will be
method for allev iating this chance is to d ivide registered and to this data privacy is provided using
network protection data between these associations. privacy module. Now to the obtained data security
key is provided. After that data base functions are
Brad ley Lee Snyder, James H. Jones.et.al [8]Past performed. Security server will provide security fo r
endeavors to recognize cross -occurrence cloud the transmitter and received data. Cloud data base
permanence have comprised of looking through will store the data. The below figure (1) shows the
mo mentu m occasion unallocated space for pieces explanation of entire architecture.
effectively owing to an earlier client or case, and
Security Server
Security servers
Cloud Data Base
These Servers are utilized to store and to share. It
A cloud data set is one that is created and retrieved additionally used to large informat ion handling in
using a cloud stage. It serves the majority of the same framework. These are kept up with by distributed
functions as a traditional data base, but with the computing suppliers, those are not in one space like
added flexib ility of distributed computing. To end-clients. In this way, these servers are not
execute the data set, clients use programming on a dependable subsequently the end client's can't be trust
cloud platform [16][17]. cloud servers. To make and authorize the security
strategy access choices. Here taking into account the
In registering, aresident module or inhabitant servers in cloud are not conniving with Data shoppers
program stays in memo ry a ll through the lifetime of a and End-clients[18][19].
figuring meeting. One such program may be an attack
on program. This has brought about the term This deal with each characteristic and distribute out
inhabitant security. Visitor’s module records different users chose from space trait to end customers or end-
informat ion about guests and shows this information clients. This is the super key age place, here age of
in the configuration of either Reports (with graphs) or public boundaries are finished. The characteristic
Blocks. Archive Module Creates a packed chronicle power awards different access honors for the end-
of at least one record or trees [20]. clients by giving mystery keys in view of the
properties and it is co mpletely private in organization
Hybrid Authentication Protocol of a framework.
The gathering, storing, transferring, and sharing of These End-clients are called as information
data over the cloud without compro mising the makers/proprietors; their information is rethought in
security of independent information is referred to as the cloud. Utilizing these clients scramb le their
informat ion security in distributed computing. The informat ion to control and access their own
cloud security engineering model is typically informat ion. These are considered as rules in the
communicated as far as: Security controls which can organization. Informat ion is mentioned by buyers
incorporate innovations and cycles. Controls ought to fro m distributed computing servers. The information
consider the area of each help organizat ion, cloud is decoded by the shoppers just when the entrance
supplier, or outsider. approaches are fulfilled by users. However, the
customer attempts to get to the unavailable
APIs (Application Programming Interfaces) are information from the users.
comprehensively acknowledged and utilized in web
applications. There are four chief kinds of API The Data Owner (DO) and Data User (DU) are the
ordinarily utilized in online applications: public, two sorts of elements used for this framework. The
accomplice, p rivate and composite. In th is specific DO can be either an association or an individual
circu mstance, the API "type" shows the expected which was the proprietor for a progression of records
extent of purpose. An API details can have a nu mber to share. While DUs are the approved information
of formats, but most commonly includes,data clients of DOs who were permitted to get to a portion
structures schedules,remote calls, object classes or of those records.
factors. So, a module is a product part, and an API is
directions, and conceivably a few devices, fo r IV.RESULTS AND DISCUSSION
utilizing and speaking with a product part. The below table (1) showscomparison of
authentication protocol, Multifactor authentication
Communication Module protocol andhybrid authentication protocol. In this
performance, errors, security, delay, scalability and
By the use of servers, data sets, informat ion storage, attacks are utilized. In this hybrid authentication
system ad min istration, and programming, many protocol performance, security and scalability will be
administrations can be provided through the Internet increased compared with authentication protocol &
in a distributed manner. People who need ext ra Multifactor authentication protocol. In the same way
capacity and companies looking for a dependable off - errors, delay and attacks are reduced compared with
site data backup option both have become mo re and authentication protocol.
more used to distributed storage.
The below figure (2) shows the comparison of authentication protocol and Multifactor
performance and errors for authentication protocol, authentication protocol, hybrid authentication
Multifactor authentication protocol andhybrid protocol increases the performance and reduces the
authentication protocol. Co mpared with errors in effective way.
Email: sus_ps@rediffmail.com
In a steganography scheme, a message in bit form [1] [2] A. Mapping using R-DPCES
is embedded in the cover file. The stego cover is transmitted
to the receiver. In DPCES, a secret message is transformed
The proposed algorithm consists of two parts, i.e., the
into a binary string by a flexible case-specific dot-pattern
hiding process and extracting process.
mapping technique. The binary code is embedded in a
steganography system to improve its security [3]. A Algorithm for converting the message into a binary
randomized encryption scheme encodes a message by string: -
selecting a cipher text from a sheet of cipher texts randomly
corresponding to the message under the current encryption Step 1: Take a message M.
key [2]. Goyal et al. first defined and constructed functional Step2: Transform the alphabet in a dotted form using
encryption using randomized functionalities [4]. randomly selected dotted character pattern set Cs (following
Randomizing an encoding scheme makes the system more the steps given in [9]).
secure and robust to attacks. The present work discusses the
benefits of the randomization of the dot pattern character Step 3: Represent M for Cs, Merge dotted pattern of Cs
encoding scheme. and M.
This paper proposes to randomize the dot pattern Step 4: The row set is created by checking the connection
character encoding scheme to achieve better security in a between dots (following the steps given in [9]).
steganography system. In randomized encoding, the system Step 5: Merge the Bit strings received from Step 5.
randomly selects an encoding pattern from a set of dot
pattern character sets. Step 6: Embed this bit string in a cover using any image
steganography method.
1) First phase
(a)
2) Second phase
In this phase image steganography [10] is performed. the bit
string is implanted in a cover image. Here, MATLAB code
3) Third phase
It is the third and last phase. Finally, the message is
converted from the binary string using RDPCES.
(a)
(b)
2) Second phase
3) Third phase
Thus, randomizing the dot pattern character encoding
scheme using nine dots also gives a very large number of
character sets combinations to choose from which would
defeat the risk of revealing the secret message by simple
statistical or forward search attacks.
B. Second way
The dot patterns can be merged with the secret message and
embedded in a cover. An image cover consists of a lot of
scopes to embed a lengthy bit string without raising much
noise. In addition, there will not be any need to share the
key, which would make the system more secure.
1) First phase
(a)
= 4096
(b)
Figure 6(a-b) Decoding window for R-DPCES with randomly generated
template using 6 dots and 9 dots respectively Total number of alphabets in English script = 52 (26 capital
letters + 26 small letters)
Number of edges column wise = 4 number of various dotted pattern representation character set
combinations. The benefit is analyzed in two parts: -
Total number of edges = 7 1) Security is improved: -
Maximum unique combination of bits can be made = 27 = o An increase in the number of dot pattern character
128 sets combinations defeats the risk of failure by
statistical or forward search attacks [6].
Total number of alphabets in English script = 52 (26 capital
letters + 26 small letters) o Adding random bits in RDPCES increases entropy.
Considering some special symbols = 3 2) Revealing of Secret message becomes challenging for
the attacker: -
Total characters considered for our experiment = 55 o The randomized encoding scheme selects encoding
pattern randomly, not limiting to any fixed standard
Total 55 characters can be represented using 128 dotted code for representing any script.
patterns in
o Accurate fetching of the typescript and
combinations of typescript would be nearly
= = = 8.626634*10109 impossible task without knowing the dotted
pattern, so the revealing of the secret message.
ACKNOWLEDGMENT
The author would like to thank the anonymous reviewers
for the valuable comments and Dr. Biplab K. Dutta, Ph.D.
(Pittsburgh), IIMC and IIT alumnus, for his continuous
guidance from constructing the first draft to the publication
of this article.
REFERENCES
[1] Desoky, A., Younis, M, Chestega: chess steganography methodology,
SecurCommun Netw, 2(6):555–66 (2009)
[2] Rivest, R.L., Sherman, A.T. (1983). Randomized Encryption
Techniques. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds)
Advances in Cryptology. Springer, Boston, MA.
https://doi.org/10.1007/978-1-4757-0602-4_14
[3] Mahato, S., Yadav, D. K., and Khan, D. A.,. A novel approach to text
steganography using font size of invisible space characters in
Microsoft word document, Intelligent Computing, Networking, and
Informatics, Springer India, pp. 1047-1054 (2014)
[4] Goyal, V., Jain, A., Koppula, V., Sahai, A., Functional encryption for
randomized functionalities, Cryptology ePrint Archive, Report
2013/729 (2013)
[5] Taylor, I. The Applications of Probability to Cryptography, Alan M.
Turing, Available from: arXiv:1505.04714v2 [math.HO] ) (accessed
on 14/10/2017 2015)
[6] Simmons, Gustavus J., and Holdridge, D. Forward search as a
cryptanalysitic tool against a public key privacy channel. Presented at
the Symposium on Computer Security and Privacy (1982)
[7] Shannon, Claude E. Communication theory of secrecy systems, Bell
System Technical Journal, 28, 659-715 (1949)
[8] A. Wyner, "Review of 'Information Theory and Reliable
Communication' (Gallager, R. G.; 1968)," in IEEE Transactions on
Information Theory, vol. 16, no. 1, pp. 103-104, January 1970, doi:
10.1109/TIT.1970.1054414.
[9] Mahato, S., Yadav, D. K., Khan, D. A., Personal characters to bits
mapping using Dot Pattern Character Encoding Scheme (DPCES),
Journal of King Saud University – Computer and Information
Sciences (2017)
[10] Vinothkanna, Mr R. "A secure steganography creation algorithm for
multiple file formats." Journal of Innovative Image Processing (JIIP)
1, no. 01 (2019): 20-30
Abstract: The success of the web and the consequent rise in data sharing have made network security a challenge. Attackers
from all around the world target PC installations. When an attack is successful, an electronic device's security is jeopardised. The
intrusion implicitly includes any sort of behaviours that purport to think twice about the respectability, secrecy, or accessibility of
an asset. Information is shielded from unauthorised clients' scrutiny by the integrity of a certain foundation. Accessibility refers to
the framework that gives users of the framework true access to information. The word "classification" implies that data within a
given frame is shielded from unauthorised access and public display. Consequently, a PC network is considered to be fully
completed if the primary objectives of these three standards have been satisfactorily met. To assist in achieving these objectives,
Intrusion Detection Systems have been developed with the fundamental purpose of scanning incoming traffic on computer networks
for malicious intrusions.
the information base’s capacity to remember indicators of an processes, and factual methodologies were all defined by
assault in progress, limits the viability of intrusion detection. Mishra and Yadav [8] as complementing strategies. Others
These frameworks have successfully defended against have combined the computations to expand the capabilities of
recognised attackers. the IDS, although some scholars have only used one
calculation in these tactics [8].
(2) IDS in the Light of Particulars: IDSs with signature-based
detection are beneficial for differentiating between known but In order to find rarities in view of profile markers,
ineffective traces and unexplained ones. To get beyond this Atefi et al., [9] developed a framework by combining Genetic
restriction, peculiarity-based IDS investigations act Algorithms (GA) and Support Vector Machine (SVM)
realistically when measured against the benchmark that algorithms. SVM had higher accuracy than GA. The two
represents the typical condition of the architecture, which approaches were merged by specialists to produce a purebred
includes elements like conventions, traffic volume, and IDS. Half of the IDSs failed to consider individual execution
standard packet size. tactics when performing the evaluation.
A departure from the expected example signals odd The fluid ranking method for IDS that Khor et al. [5]
behaviour and issues a warning. Occasionally, thorough implemented, supports identification rates for assaults that fall
explanations of acceptable behaviour can cause acceptable into the odd ranking. The tactic lessens the unfavourable
behaviour to be mistaken for aggressive [3]. The IDS crossover effects of widespread intrusion classification, which has shown
consolidates the usage of strangeness-based and signature- higher rates of single intrusion detection. The suggested
based ones in order to benefit from both [4]. This is hoped to technique first separates exceptional attacks from the rare
be done by raising detection rates for ongoing assaults while intrusion categorization, allowing each teacher to concentrate
lowering the likelihood that fresh plastic attacks may benefit on fewer courses. The technique's processing cost is further
from misleading advantages. decreased and identification rates are raised by the double
separation of network traffic.
II. RELATED WORKS
An intrusion detection model was suggested by [11]
Researchers have been working to encourage programming in light of SVM and Random Forest tactics. The pooling was
that can inherently recognise intrusions in network frames ever carried out using two approaches. NSL-KDD was used to
since Denning originally suggested to distinguish the intrusion evaluate the models. A recognition accuracy of more than 95%
[6]. IDS are defined as frameworks that make use of AI, was attained using the models. SVM was not used in the
machine consciousness, and dataset frameworks to identify irregular timbers procedure's traffic management of the two
potentially harmful tendencies in huge datasets [2]. IDS in the models' exhibitions.
context of peculiarities and IDS in the context of misuse can
be roughly divided into two kinds. Recent convergences of Using Naive Bayes, ID3, MLP, and group learning
abnormality and IDS abuse have given rise to a number of new approaches, [12] advocated a unique intrusion detection
delivery methods for new courses. methodology. Using the CICIDS2017 dataset, the models were
assessed. The NB, ID3, and MLP were combined to produce
Framework that can spot intrusions in the light of the crew model. The F1 score, accuracy, revision, and
anomalies is reviewed. The identification of inconsistency precision were utilised as metrics to assess the models. In
attacks, outlines the typical behaviour of a framework, which comparison to other models, the ID3 decision tree model
makes fun of the framework's routine duties, and whenever performed better.
anything unexpected is detected, a banner is raised. Quirk-
aware frameworks define the "ordinary" actions of a Buczak and Guven [4] assessed AI calculations for
framework and clients prepared for anything that deviates from intrusion detection while taking into account a variety of
the design [2], as opposed to containing all the examples of the elements, such as the calculations' complexity, the problem
extraordinary and dreadful data collection and updating them with security designs, and others. The authors suggested a
as new examples appear. number of characteristics, such as accuracy, computational
complexity, and humdrum complexity, to determine the most
According to [7], an IDS feature has three stages: effective technique for finding the intrusion.
definition, preparation, and recognition. The data is prepared
to record the device's typical behaviour during the define In order to increase accuracy, Aburomman and Ibne
phase. Following definition, the model is ready to adjust to Reaz [6] proposed a creative method of giving the classifier
customary behaviour. In light of the specified information, the access to intrusion detection frameworks. When building the
model detects and accounts for any deviation from expected builder kit according to the recommended PSO delivered load
behaviour during the identification phase [7]. The Irregularity table, the results were different from those attained by using
IDS was developed using a variety of intrusion detection the Weighted Moving Average (WMA) method. The load
techniques. Information extraction techniques, AI-based
VII. CONCLUSION
REFERENCES
[1] O. Y. Al-Jarrah, O. Alhussein, P. D. Yoo, S. Muhaidat, K. Taha, and K.
Kim, “Data randomization and cluster-based partitioning for botnet intrusion
detection,” IEEE Transactions on Cybernetics, vol. 46, no. 8, pp. 1796–1806,
2016.
[2] K. Kumar and S. Singh, “Intrusion Detection Using Soft Computing
Techniques,” 2016.
[3] S. Rajasegarar, C. Leckie, J. C. Bezdek, and M. Palaniswami,“Centered
hyperspherical and hyperellipsoidal one-class support vector machines for
anomaly detection in sensor networks,” IEEE Transactions on Information
Forensics and Security, vol. 5, no. 3, pp. 518–533, 2010.
[4] A. L. Buczak and E. Guven, “A survey of data mining and machine learning
methods for cyber security intrusion detection,” IEEE Communications
Surveys and Tutorials, vol. 18, no.2, pp. 1153–1176, 2016.
[5] K.-C. Khor, C.-Y. Ting, and S. Phon-Amnuaisuk, “A cascaded classifier
approach for improving detection rates on rare attack categories in network
intrusion detection,” Applied Intelligence,vol. 36, no. 2, pp. 320–329, 2012.
[6] A. A. Aburomman and M. B. Ibne Reaz, “A novel SVM-kNNPSO
ensemble method for intrusion detection system,” Applied Soft Computing
Journal, vol. 38, pp. 360–372, 2016.
[7] Q. S. Qassim, A. M. Zin, and M. J. Ab Aziz, “Anomalies classification
approach for network—based intrusion detection system,” International
Journal of Network Security, pp. 1159–1171, 2016.
[8] M. Govindarajan, “Evaluation of ensemble classifiers for intrusion
detection,” World Academy of Science, Engineering and Technology,
International Journal of Computer, Electrical, Automation, Control and
Information Engineering, vol. 10, no.6, pp. 876–884, 2016.
[9] Z. Liu, R. Wang, and M. Tao, “SmoteAdaNL: a learning method for
network traffic classification,” Journal of Ambient Intelligence and
Humanized Computing, vol. 7, no. 1, pp. 121–130, 2016.
[10] W. Hu, J. Gao, Y. Wang, O. Wu, and S. Maybank, “Online AdaBoost-
based parameterized methods for dynamic distributed network intrusion
detection,” IEEE Transactions on Cybernetics, vol. 44, no. 1, pp. 66–82, 2014.
[11] Shakya, Subarna. "Modified Gray Wolf Feature Selection and Machine
Learning Classification for Wireless Sensor Network Intrusion Detection."
IRO Journal on Sustainable Wireless Systems 3, no. 2 (2021): 118-127.
[12] Amrish, R., K. Bavapriyan, V. Gopinaath, A. Jawahar, and C. Vinoth
Kumar."DDoS Detection using Machine Learning Techniques." Journal of IoT
in Social,Mobile, Analytics, and Cloud 4, no. 1 (2022): 24-32.
Steps to find the optimum location of FACTS devices capability of the FACTS for defend voltage steadiness of the
Step 1: Begin the BBO input variables namely bus date, line transmission system. The variance in the normal voltage ( Vn
data, bus voltage (Vi ) , real and reactive power ) and the fault duration was well estimated. An ample account
of the process of the PSO approach is deliver below and the
( Pi and Qi ) etc. Disperse the habitat modification flowchart is shown in figure 2.
probability like mutation rate ( ) and emigration
rate ( ).
Steps to find the optimum sizing of FACTS devices
1. In PSO method, prepare the velocity and positions vector
Step3: Start SIV, every SIV of a system was initialized of all controlling parameters haphazardly. Here, all
arbitrarily by fulfilling the restraints. Apiece habitat parameters are painstaking as particles, which positions
embody an effective solution to the presented issue. ( )
vector is Pi k = pik1 , pik2 ,.....pink at iteration k, and
Step 4: Prepare the migration procedure and apply mutation velocity vector represents as (
vik = vik1, vik2 ,.....vin
k )
function to all migrated values.
correspondingly.
Step 5: Run the load flow of the system for normal condition.
2. The optimum solution was acquired by ith particle in
Step 6: Find the normal condition API by means of the iteration k can be defined as
equation (1) for all the buses. k = pk
Pbesti ( k k
bset,i1, pbest,i 2 ,..... pbest,in . )
Step 7: Employing the objective function, the BBO make out
the optimum location and of FACTS devices. 3. Assess the fitness function of the particles.
Step 8: By conducting the mutation function the species fitness function = minC F ,Vd (29)
count probability of every habitat was upgraded via
the novel migration formulae which is expressed At this juncture, the minimum value of cost of FACTS
below, gadgets and voltage deviation was regarded as a fitness
function.
(i ) (t + t ) = Ainj (i ) (t )1 − t ( + ) − t Ainj ( i −1) i −1 + Ainj (i +1) i +1
1
Ainj (28)
4. k
Contrast the personal best Pbesti of each particle with its
Step 9: Make sure every constraint with regard to every existing fitness values. If the current fitness value was
migration and emigration rate dissimilarity. The migration k
well again, after allocate the current fitness value to Pbesti
function can be conducted probabilistically. when the
migration function achieves the optimal values then the value coordinates.
was preferred as the optimal value. Depend on the output of 5. Institute the current best fitness value in the complete
BO algorithm, the optimal location is branded for fixing the population and its coordinates.
FACTS gadgets, like SVC, TCSC and UPFC
correspondingly. 6. Modernize velocity and position of the d th dimension of
the ith particle by means of the subsequent equations,
The capacity of FACTS device was computed by employing
the PSO algorithm. The complete working process of PSO Vi (u+1) = w *Vi (u ) + C1 * rand() * (Pbesti − Pi (u ) ) + C2 * rand() * ( gbesti − Pi (u) ) (30)
algorithm was illustrated below.
Pi (u+1) = Pi (u ) + Vi (u+1) ) (31)
Stage 2:
7. Reiterate the process until the annihilation is
In this fragment, the second stage of the anticipated
accomplishing otherwise cease the algorithm.
method is embodying. Now, the prophecy of handpicked
capacity of the FACTS device is taken into account. By
means of the ideal capability of the FACTS device the
dynamic stability of the system is superior.
PSO algorithm
The Particle Swarm Optimization algorithm (PSO) has
developed as a population-depend search algorithm and also
as a replacement solution to the ever-intricate non-linear
optimization problem. It depends primarily on the instinctive
procedure of group communication to deal out personage
knowledge when a group of birds or insects are on the
sentinel for food or drift along in an incisive space, despite
the fact that they are not conscious of the finest position. On
the other hand, from the fashion of the animal social
demeanor, if any member thrives in trace a preferable path,
all the other members’ just follows it without loss of time. In
the case of PSO, every member of population was tenure as
‘particle’ and the population termed as ‘swarm’. At the outset,
a random population can be generated which travelled
intermittently in the chosen directions. In the manuscript, the
PSO method is gracefully employed to stop in mid-sentence
the voltage variance and in this manner augment the
standard 30 BSs. The bus data, line data and the limits of
control variables were anticipated from [32, 33]
Initialize the bus data, line correspondingly. The Newton Raphson power flow algorithm
data, and facts device was successfully utilized to compute the power flow solution
parameter earlier than and later than setting FACTS device. In the N-R
method, the voltage, real and reactive powers are found out.
Subsequently, the line contingency is generated and
investigate the system characteristics. It constitutes the
Initialize the particles maximum API value, which is acknowledged as the
randomly with position and preeminent location for fixing the SVC, TCSC and UPFC
velocity correspondingly. The voltages are examined under the normal
and fault condition which is put into a table in table 2.The
IEEE 30 BS is demonstrated in the figure 3.
Evaluate the minimum
fitness function
Y
Update gbest If fitness is less than pbest
=fitness N
Y
Update pbest If fitness is less than gbest
=fitness
N
Update the velocity and
position N
Y
If gbest is less than the Figure 3: Structure of IEEE-30 test system [34]
desired goal
Table 1: Implementation parameters
S.No Description Algorithm Values
Terminate 1 Population Size 10
BBO
2 Generation Limit 50
algorithm
3 M.R 0.1
Figure 2: Flowchart of PSO algorithm
4 Population Size 10
4.Results and discussion 5 Generation Limit 50
6 PSO
In the manuscript, a competent method is introduced for C1,C2 1.5
algorithm
improvizing the dynamic security of the system with FACTS 7 wmin 0.4
devices. Currently, the BBO and PSO are engaged to 8 wmax 0.9
establish the optimal location and sizing of SVC, TCSC and Table 2: Voltage analysis in normal and fault time
UPFC gadgets. The ground-breaking algorithm can be
enforced in the MATLAB/Simulink platform and their Voltages during fault time
Bus Normal
Line numbers
performances were appraised. The performance of presented numbers voltage
4 6 12 22 33
technique was review by line contingency problem. For the 1 1.06 1.06 0.989 1.06 1.06 1.06
duration of this condition, the optimal placement of FACTS 2 1.033 1.023 0.995 1.043 1.043 1.043
device is time-honored depend on their utmost API value. 3 1.0228 1.0201 0.98997 1.0386 1.0307 1.0386
The line contingency is abridged after insertion SVC, TCSC 4 1.0136 1.0109 0.99003 1.021 1.0239 1.021
5 1.0044 0.9764 0.98047 1.0091 1.0092 1.0091
and UPFC on the accurate place. The line flow limit was
6 1.01 1.01 1.002 1.01 1.01 1.01
leveraged to substantiate the contravention of line limits after 7 0.99993 0.9879 0.98524 1.0018 1.0018 1.0018
tenacity problem that shows the security limits. Auxiliary, the 8 1.0103 1.0103 1.0021 1.0103 1.0103 1.0103
voltage deviation of the mechanism can be assessed. 9 1.0458 1.0456 1.0272 1.0461 1.0463 1.0461
10 1.0367 1.0362 1.0122 1.037 1.0373 1.037
4.1. Performance analysis 11 1.0771 1.0769 1.059 1.0774 1.0775 1.0774
12 1.0572 1.0567 1.0241 1.0596 1.0604 1.0596
The execution parameters are put into table 1. At this 13 1.071 1.071 1.028 1.071 1.071 1.071
time, the proposed approach is employed to the IEEE 14 1.0414 1.041 1.0094 1.0435 1.0441 1.0435
Case 1
The anticipated algorithm was executed on IEEE 30-BS
depicted in Figure 4. The test BS comprises of 1 slack bus, 5
generator buses, 41 lines and 24 load buses. During the
emergency period, the maximum API line is acknowledged.
To settle on the optimal location and size of SVC gadgets in
the network, the anticipated BBO and PSO algorithm has
been executed. Table.3 presents that the SVC placement by
means of the projected method show the way to lower SVC
cost and vaguely less voltage deviation. The calculated value
of voltage deviation was 0.546 and average cost of SVC was (d)
74.53296 $/KVAR at the optimal location 3, 4, 10, 26 and 19.
Moreover, the optimal susceptanceand capacity are analyzed
in the corresponding buses that are0.0084, 0.0095, 0.017,
0.0408 and 0.0428 and 102.7569, 105.587, 102.2995, 89.3582
and 98.8955 respectively. The other optimal locations are
revealed and concerning the SVC. Subsequently, investigate
their power, voltage deviation and cost etc. The voltage
profile scrutiny of projected method depend SVC is
established in the figure 4.
(e)
Figure 4:Analysis of voltage profile using SVC in a line (a)3
(b)4 (c)10 (d) 26 and (e)19
The above depictions shows that the voltage profile
examination of SVC which is associated in the assortment of
buses such as 3, 4, 10, 26 and 19 during the contingency
period. And their equivalent voltages, power and costs are
explore.
(a)
The capacity and costs of the combined SVC and TCSC are
determined. The average cost of the SVC with TCSC is
Table 3: SVC capacity and cost
64.66196 and 71.91688 $/KVAR respectively. Also analyzed
Optimal Susceptance Capacity Total cost their susceptance and reactance values are analyzed.
Device
location in p.u. (MVAR) ($/KVAR) 5. Conclusion
3 0.0084 77.3839 102.7569
4 0.0095 70.9543 105.587 The presented method has been executed in MATLAB
10 SVC 0.017 69.0306 102.2995 platform. The anticipated method can be employed for
recognizing the optimal place and power rating of the FACTS
26 0.0408 77.6483 89.3582
gadgets depends on the voltage, maximum API and least cost.
19 0.0428 77.6477 98.8955
Here, BBO and PSO method was examined to improvize the
security of power system depend on the voltage. The
Case 2 projected method was experimented with the IEEE 30 bus
benchmark mechanism. When linking SVC, TCSC and UPFC
This section portrays the power flow, optimal location; in the lines, the voltage values were appraised over and above
voltages, competence and cost of the TCSC devices are their competence and cost. As a result, the anticipated method
investigated. The TCSC is associated with the IEEE 30 BS obtains superior results for improving the voltage stability
depend on their circumstances in Table 4. The optimal and minimizing FACTS installation cost. Then the optimal
location of the TCSC in line is achieved by the BBO location of FACTS device and their ratings were examined.
algorithm lines 4, 6, 12, 22 and 33 correspondingly. Also, the
optimal sizing of the TCSC in line can be gained by the PSO References
algorithm. The results of the total produced power and cost [1] Siva Sankar Akumalla, Sujatha Peddakotla and Seetha Rama
are tabularizing in the subsequent tables. Here, the optimal Anjaneyulu Kuppa, "A Modified Cuckoo Search Algorithm for
Improving Voltage Profile and to Diminish Power Losses by Locating
reactances are analyzed that are 0.0379, 0.1763, 0.116, 0.256 Multi-type FACTS Devices", International Journal of Control,
and 0.3292 respectively. From the outcomes, it is clear that Automation and Electrical Systems, Vol.27, No.1, pp.93-104, 2016.
the anticipated method has protected power flow with less [2] Somasundaram Alamelu, S.Baskar, C.K.Babulal and S.Jeyadevi,
API, voltage instability and cost values. At this juncture, the "Optimal siting and sizing of UPFC using evolutionary algorithms",
International Journal of Electrical Power and Energy Systems, Vol.69,
proposed method successfully preserves voltage profile pp.222–231, 2015.
within the revealed limit (1.0–0.98 pu), which is [3] Nagendra Palukuru, Sunita Halder nee Dey, Tanaya Datta and Subrata
demonstrated in the next segment, Paul, "Voltage stability assessment of a power system incorporating
FACTS controllers using unique network equivalent", Ain Shams
Table 4: TCSC capacity and cost Engineering Journal, Vol.5, pp.103–111, 2014.
[4] Kerur, Prakash, and R. L. Chakrasali. "Power Transfer Capability
Optimal From To Optimal Cost Recognition in Deregulated System under Line Outage Condition
Device Capacity Using Power World Simulator." Journal of Electrical Engineering 3,
location bus bus Reactance ($/KVAR)
no. 4 (2021): 277.
4 1 4 0.0379 1.0164 106.6392 [5] Esmaeil Ghahremani and Innocent Kamwa, "Maximizing
6 2 6 0.1763 1.9361 97.2915 Transmission Capacity through a Minimum Set of Distributed Multi-
12 6 10 TCSC 0.116 0.76157 94.9714 Type FACTS", IEEE Power and Energy Society General Meeting,
22 15 18 0.256 1.2129 102.576 pp.1-8, 2012.
33 24 25 0.3292 1.3847 89.5759 [6] Sajad Rahimzadeh and Mohammad Tavakoli Bina, "Looking for
optimal number and placement of FACTS devices to manage the
transmission congestion", International Journal of Energy Conversion
Case 3: and Management, Vol.52, pp.437–446, 2011.
[7] Yang Huaqing and Yang Wenwen, "The Optimization on FACTS
In the sub section, the combined (SVC and Devices for Network Security", Proceedings of the 2nd International
TCSC)devices are linked in the IEEE 30 BS. Here, the Conference on Computer Science and Electronics Engineering, 2013.
optimal voltage and minimum cost is scrutinized. The [8] K.Ravi and M.Rajaram, "Optimal location of FACTS devices using
Improved Particle Swarm Optimization", International Journal of
magnitude of the 30 bus voltages are evaluated and depicted Electrical Power and Energy Systems, Vol.49, pp.333–338, 2013.
in the following figures. During normal and fault period, [9] A.Rezaee Jordehi, "Particle swarm optimisation (PSO) for allocation
voltage of the BS is calculated. When connecting the of FACTS devices in electric transmission systems: A review",
combined devices in the system, the capacity and cost is International Journal of Renewable and Sustainable Energy Reviews,
Vol.52, pp.1260–1267, 2015.
evaluated. [10] Esmaeil Ghahremani and Innocent Kamwa, "Optimal Placement of
Multiple-Type FACTS Devices to Maximize Power System
Table 5: Combined devices (SVC and TCSC) capacity and Loadability Using a Generic Graphical User Interface", IEEE
cost Transactions on Power Systems, Vol.28, No.2, pp.764-778, 2013.
[11] A.Rezaee Jordehi, "Particle swarm optimisation (PSO) for allocation
Optimal
Devices Susceptance Reactance Capacity Total cost of FACTS devices in electric transmission systems: A review",
location
International Journal of Renewable and Sustainable Energy Reviews,
3 SVC 0.0374 -103.1229 77.3839 Vol.52, pp.1260–1267, 2015.
4 TCSC 0.256 1.4211 77.6482 [12] B.Vijay Kumar and N.V.Srikanth, "Optimal location and sizing of
4 SVC 0.0106 -87.5265 54.5605 Unified Power Flow Controller (UPFC) to improve dynamic stability:
6 TCSC 0.1923 0.73967 69.0234 A hybrid technique", International Journal of Electrical Power and
10 SVC 0.0428 -86.9155 54.9334 Energy Systems, Vol.64, pp.429–438, 2015.
12 TCSC 0.396 0.96148 69.0219 [13] B.Venkateswara Rao and G.V.Nagesh Kumar, "Optimal power flow
26 SVC 0.037 -102.6221 66.4079 by BAT search algorithm for generation reallocation with unified
22 TCSC 0.11 -1.1287 71.1676 power flow controller", International Journal of Electrical Power and
19 SVC 0.0085 -137.0403 70.0241 Energy Systems, Vol.68, pp.81–88, 2015.
33 TCSC 1.082 0.65392 72.7233 [14] ThanhLong Duong, Yao JianGang and VietAnh Truong, "Application
The optimal locations for combined SVC and TCSC are of min cut algorithm for optimal location of FACTS devices
considering system loadability and cost of installation", International
specified in the table 5. Here, the SVC was linked to the Journal of Electrical Power and Energy Systems, Vol.63, pp.979–987,
optimal bus and the TCSC was linked to the optimal lines. 2014.
Abstract— The art of detecting hidden messages in media is steganography, Audio Steganography, and Video
known as steganalysis. Statistically and visually data is hidden Steganography. The process of detection of this covert
in the media. Using deep learning techniques is evidently communication technique is called steganalysis. There are two
favorable as they are efficient in learning hierarchical data. approaches for steganalysis based on its field of application.
Through this research, we tend to investigate and compare The targeted approach is used when the steganography
various steganalysis techniques and implement classifiers to technique used to encrypt is known and the universal approach
compare the results achieved. Neural networks, Clustering is used when the technique is unknown. Which then leads to
Algorithms, and other Tools are used to design a model for the two sub-approaches. Approaches being blind and semi-blind,
investigation of Experimental Findings. Classifiers like the SVM
the semi-blind approach uses both the cover and stego
classifier, K-NN classifier, Random Forests classifier, MLP NN
classifier, and Naive Bayes classifier are trained and tested to
mediums to determine decision boundaries, whereas the blind
detect images undergoing steganography. The results acquired approach only uses the cover medium. The targeted approach
are compared and analyzed. analyses a medium's statistical characteristics or "features"
before and after embedding them using a specific
Keywords— Steganalysis, Classifiers, Cryptography, steganography technique Although this method produces
Confidentiality, Steganography. mostly accurate results, it is very limited to specific
embedding algorithms and medium formats. The applications
I. INTRODUCTION of Steganalysis include Usage in Law Enforcement, National
In this era, thanks to technology people are utilizing the Security, to evaluate known and unknown steganography
internet for every online service one such service offered to techniques, to secure digital and cipher information, Usage in
everyone is communication, but not all the time Digital Forensics and to detect illegitimate usage and theft of
communication happens under secure channels, sometimes data. Right now, the internet is home to trillions of photos.
the data transfer happens over unprotected networks. or the People use these pictures to communicate their emotions,
data in transit is intercepted and precious info is lost. Various document their life, and pursue other hobbies. Unfortunately,
well-organized tools are available which are capable of criminal organizations may effectively send messages through
compromising the security, and integrity of the data in transit. normal picture transfers thanks to the introduction of image
One of the most effective solutions to tackle these kinds of steganography software. It is impossible to identify illegal
situations is the encryption of data. various cryptographic pictures using the human eye alone because these software
techniques are developed for this purpose. But in programmers aim to make the payload appear to be random
cryptography, the cipher can be visible to the human eye in a noise of the image generated by the sensor of camera and
scrambled form which raises the suspicion of important data electronics. This technology poses a genuine risk to the safety
being transferred. New Techniques which can be referred to of the public. Consequently, scholars have looked into and has
as steganography techniques are under huge exploration to created cutting-edge picture steganalysis methods for
make the data hidden from the perception of the human eye. identifying and fending off this threat. One of the most popular
The Importance of this area is increasing day by day. Though methods of covert communication is image steganography,
Cryptography and steganography might seem similar. Yet, which involves concealing data within an image. In order to
there is a difference. Cryptography is the encryption of the avoid creating observable artefacts and altering the statistical
data by converting plain text to cipher text whereas features of the image, effective image steganography
Steganography is the Hiding of the Info in Plain Sight. Hiding algorithms typically incorporate hidden messages into the
of the data can be achieved using Embedding the data in complex regions of the image. Fig. 1 depicts one instance of
Multimedia like images, audio, video, etc. Another this type: The original image is presented in Fig 1, and the
application is Digital Watermarking. It is a method to claim steganographic image generated by LSB-Steganography.
ownership in which confidential data is embedded. Which is a technique in which we hide messages within
Steganography can be classified as the Process of Implanting images by replacing the image's least significant bit with the
certain data within a multimedia file like audio, image, and message bits to be hidden. Secret messages can be inserted,
even video. For instance, a smaller image can be embedded and the picture can be made unnoticeable by modifying only
inside another Big Multimedia. There are Certain the first most right bit of an image, but if our message is too
Classifications of Steganography which can be listed as image large, it will start modifying the second most right bit and so
on, and an attacker will notice the changes in the picture is Peak signal to noise ratio and mean-square error as the
shown in Fig 2. Firstly, a bit plane of an image is a collection metrics. The advantages include less computational period,
of bits that correspond to a specific bit position in each of the Image is the confidential message and capricious image
binary numbers that represent the signal. Fig 3 displays the 2nd structure is accepted. Yet, the defense strategy is relatively
bit plane of Fig 2 and the hidden text can be seen. But to the low relative to deep learning images. Similar to the method of
human sight, Fig 1 and 2 will look the same. (To make the N. Patel and S. Meena [5]. Though the metrics for this are only
discussion that simpler, we'll refer to the original image and Peak signal-to-noise ratio the advantages and disadvantages
the associated steganographic image as "cover" and "stego," are similar. Secret information in videos is hidden using the
respectively.) LSB method. Sequences of images as video frames sum up to
become a video. The basic LSB substitution method [7] and
an embedded method of LSB substitution and Huffman
encoding methods are used in videos [8]. Dissected videos are
classified into Image frames. In the image frames of the LSB,
these binary bits of secret information are hidden. Mankin et
al investigate LSB matchings as a sequence of image
deprivation to retrieve cover image estimation by wavelet
mitigation with an additional noise proportional to embedding
rate[9]. To train and test the features of the 1-D statistical gray
scale histograms of estimated and test images are utilized with
Fig. 1. Cover Image
SVM as a classifier. The Fisher linear discriminant, k nearest
neighbor, multilayer perceptron, and Gaussian naïve Bayesare
were compared by Ramezani et al [10]. For extracting
features, statistics of histogram and wavelet, adjacency of the
1-D and 2-D histogram’s amplitude of local extrema and
characteristic function of the center of the mass of histogram
are utilized in the approach. To exploit the detection of the
hidden message using multivariate regression and image
quality metrics a Steganalysis methodology is offered by
Avcibas et al [11], which uses the analysis of variance
technique for the identification of appropriate quality metrics
Fig. 2. Stego Image of the image. Which, along with steganography images and
the training set, is fed into multivariate regression. The
objective of picture steganography methodologies is to make
a change that is imperceptible in order to hide a concealed
message in a cover image. The stego has the look of a typical
image, therefore suspicions regarding the data it contains are
unlikely to arise even if a third party finds it. Three general
categories can be used to group the most popular image
steganography techniques: naïve steganography [15], adaptive
steganography [18], and deep learning–based embedding.
Simple steganography techniques like naive steganography
are routinely used on the Internet for amusement. These
Fig. 3. 2nd Bit Plane of Stego Image techniques also produce artefacts that are the easiest to
identify. For instance, by changing the amounts of pixels
II. RELATED WORKS devoid of taking into account the bias, the Least Significant
Statistical steganalysis on a universal scale needs low or Bit approach [15], embeds a covert message into cover image.
even none of the foregoing info of the steganographic Because of this, they are simple to attack just by applying
techniques for the recognition of concealed messages. It historical statistical information of cover images. Right now,
requires a studying-based technique that concerns learning the most useful technique is the adaptive steganography
based on Steganography images despite the algorithms and method. It increases protection by inserting hidden messages
domains. Liu et al suggested a method utilizing back into the cover images' more textured layers, it also employs
propagation neural networking system as classifiers to acquire effective steganographic techniques, such as Syndrome Trellis
subband coefficients incorporating wavelet packet transform- Codes, to lessen the impact of the embedded alterations.
based universal steganalysis method to obtain Histogram Fridrich and Holub [17] built a Wavelet model of the costs of
moments of multi-order absolute characteristic function [1]. each each pixel. Weights (WOW) were obtained by
Chen et al offered a technique to estimate messages hidden in examining changes in the directional high-pass filters' output
images in spatial and JPEG domains. It utilizes alpha- obtained by modifying single pixel. The following year, they
trimmed-mean to distinguish images and stegno-images [2]. improved the additive distortion based on directional residuals
K. A. Al-Afandy et al suggested an approach using 1 RGB acquired from a Universal Wavelet Relative Distortion filter
image dataset and Peak signal to noise ratio and the time as bank Tool (S-UNIWARD) [18]. A developing area of
metrics. The advantages include less computation time. It is research is deep learning-based embedding. In terms of deep
robust in extracting, and embedding and works without learning based implanting techniques, there are four main
dependencies on steganalysis and steganography[3]. Yet it is families: Firstly, Through synthesis: This technique either
less secure and secret information is text. A. Arya and S. Soni takes the produced image as a stego directly or generates
proposed a method[4] using Lena and Baboon dataset [6]. images and subsequently conceals the message. Secondly,
creating a possibility map of alterations: In the instances the Naive Bayes classifier. The highest accuracy in the test set
described by Tang et al. and Yang et al., a modification map has been found in random forest learning. The parameter
from the cover picture is created by the generator network, values are set accordingly to decline memory consumption.
making it possible to trick the network that is generally The hike might be caused because of fully grown and
discriminant. Thirdly, by deceiving sophisticated unpruned trees. At each split, the features are randomly
Convolutional Neural Networks based steganalyzers: Tang et permuted. While fitting Random_state is fixed to acquire a
al. [16], for instance, created the ADV-EMB approach, stable deterministic behavior. Secondly, All the classifiers are
capable of modifying the cost of alterations in accordance with loaded. Each of the five classifiers was trained using 56,000
backpropagated gradients from the target networks. Although monochromatic images. Machine learning algorithms are
deep learning based implanting approaches are in the early known to be influenced by parameters. These variables have
stages of development, there are promising indicators. Higher a significant impact on the learning process's outcome.
image steganography accuracy is now feasible because to Parameter tuning is used to achieve high accuracy. The goal
recent developments in neural network and deep learning of parameter tuning is to find the best value for each parameter
algorithms. The usage of hand-crafted features is not in order to improve the model's accuracy. The random forest
necessary with CNN-based steganalysis approaches because compared in Table 2 has several parameters such as max
backpropagation automatically extracts more detailed depth, n estimators, max features, and min samples split.
characteristics from the data. Experts like, Qian et al. [18] Improved and more accurate models will result from intuitive
suggested a customized Convolutional Neural Network optimization of these parameter values.
model, titled GNCNN an effective paradigm made up of three
parts: features were extracted using convolutional blocks, A. Algorithm
classification using fully connected layers, and for high pass Input: Image and Classifier
filtering a preprocessing layers with non-random kernels. The Output: stratify image as stegnographed or clean using the
first CNN-based method that employs advanced, hand-crafted chosen classifier
features to achieve performance on par with conventional
image statistical analysis techniques. Later, they discussed a Begin
variety of ensemble techniques for utilising a set of similarly image = load_image
trained CNNs. Using a method termed maxCNN, Yang et al. vals =array_in_1D(mean_of_numbers_list(image)
showed how information can be included into a CNN for with(axis=2))
steganalysis from the selection channel. Their method gives data = from_image(Kurtosis, Skewness, Std, Range,
features learnt from smooth regions small weights while Median, Geometric_Mean, Mobility, Complexity)
giving features retrieved from complicated texture regions testing_data → Features_test_Dataset
significant weights. A better technique known as Yedroudj- x_test, y_test → testing_data[]
Net, which optimizes the neural network's structure, was x_test = x_test.append(data)
introduced by Yedroudj et al. [19]. Li et al [20] .'s parallel- scaler = scale_each_Feature(feature_range=(0, 1))
subnet CNN, dubbed ReSTNet, considerably improved the x_test = scaler→fit_transform(x_test)
detection effect by combining linear and nonlinear filters. A Evaluation → train-test-datasets
new paradigm called SRNet was proposed by Boroumand that if classifier_prediction((x_test[13999])[0] == 1)
uses several, unpooled convolutional blocks to extract Return ‘Stegnographed image’
sufficient noise residual after initializing all filters at random. else
One of the most effective methods for high detection accuracy Return ‘Clean image’
currently available is SRNet. Although these techniques End
perform noticeably better than conventional detectors, they
are still unable to train on huge images due to hardware
constraints. The accuracy of the detector will be hampered by TABLE I. CONTRAST OF STATE-OF-THE-ART STEGANOGRAPHY
TECHNIQUE
shrinking or cropping the photos before categorization since
weak stegano graphic signals are unique in this regard. An A comparison of cutting-edge steganography techniques
S. No
architecture to detect the JPEG steganalysis signal in low Technique Merit Demerit
signal-to-noise (SNR) situations was proposed by Congcong Content is encrypted
Stego Risk increases as
Sun et al [12]. By concatenating all of the previous layers with 1
Encryption
as it is embedded into
the key exchanges.
the same featuremap size, the proposed 32-layer CNN carrier.
architecture can increase the efficiency of preprocessing and It has a high capacity Digital processing
and is robust against techniques can
reuse the features, improve the flow of information, and 2 SSIS
attacks that are give away the
significantly reduce the training parameters. However, they statistical. data.
still need to improve feature propagation for steganalysis in More the volume
Only a part of the
the spatial domain. 3
Substitution
carrier is
of the stego
techniques content more the
manipulated.
III. WORK DONE risk.
Easier to implement, Can get corrupt
Firstly, the training with data of 56,000 images from the Payload capacity is and is also
4 LSB
still images with LSB steganography features dataset [13] is high and has low vulnerable for
done. Features are scaled in the interval [0:1]. Secondly, the complexity. detection.
train data have been fit classifiers and saved as the .joblib file. Embedding carrier
5 LSB++ Low distortion does not support
Classifiers like the SVM classifier, K-NN classifier, Random compression.
Forests classifier, MLP NN classifier, and Naive Bayes
classifier are trained and tested. As observed in table 1 the
least train and test accuracy comparatively can be observed in
Comparison Table
S. No Accuracy
Accuracy
Classifier on train
on test set
set
1 SVM classifier 0.9048 0.9029
B. Graphical Representations
CONCLUSION
Comparative investigation has been done between
classifiers for the implementation of steganalysis. While the
Fig. 5. This plot describes the Comparison between train set and test set test results of classifiers have had minuscule differences
accuracies. between them, the random forest classifier has the highest
accuracy of all. Histograms have been represented based on
features extracted from the chosen image's Kurtosis,
Skewness, Std, Range, Geometric Mean, Median,
Complexity, and Mobility. Training classifiers with a complex
cover model and a humongous dataset is the current trend to
obtain more accurate results is the current trend in
steganalysis. Yet, support vector machines do not scale
favorably when it comes to feature dimensionality and the
range of the training set. The results can be mis-stratified in
cases of high-resolution and non-monochromatic images. This
can be rectified in future works by training the classifier with
a wider range of datasets.
Fig. 6. Clean Image
REFERENCES
[1] X. Luo, F. Liu, J. Chen and Y. Zhang, Image universal analysis based
on wavelet packet transform, 10th IEEE Workshop on Multimedia
Signal Processing, pp. 780-784, 2008.
[2] M-C. Chen, S.S. Agaian, C.I.P. Chen and B.M. Rodriguez, Alpha-
trimmed image estimation for JPEG steganography, Proc. of IEEE
International Conference Systems, Man and Cybernetics, pp. 4581-
4585, 2009.
[3] K. A. Al-Afandy, O. S. Faragallah, A. Elmhalawy, E.-S.-M. El-Rabaie,
and G. M. El-Banby, ‘‘High security data hiding using image cropping
and LSB least significant bit steganography,’’ in Proc. 4th IEEE Int.
Colloq. Inf. Sci. Technol. (CiSt), Oct. 2016, pp. 400–404.
[4] A. Arya and S. Soni, ‘‘Performance evaluation of secrete image
steganography techniques using least significant bit (LSB) method,’’
Int. J. Comput. Sci. Trends Technol., vol. 6, no. 2, pp. 160–165, 2018.
[5] N. Patel and S. Meena, ‘‘LSB based image steganography using [14] http://agents.fel.cvut.cz/boss/index.php?mode=VIEW&tmpl=material
dynamic key cryptography,’’ in Proc. Int. Conf. Emerg. Trends s
Commun. Technol. (ETCT), Nov. 2016, pp. 1–5. [15] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital water
[6] http://www.eecs.northwestern.edu/~faisal/d20/d20.html mark,” in Proc. 1st Int. Conf. Image Process., Nov. 1994, pp. 86–90.
[7] M. V. S. Tarun, K. V. Rao, M. N. Mahesh, N. Srikanth, and M. Reddy, [16] W. Tang, B. Li, S. Tan, M. Barni, and J. Huang, “CNN-based adver
‘‘Digital video steganography using LSB technique,’’ Red, vol. sarial embedding for image steganography,” IEEE Trans. Inf. Forensics
100111, Apr. 2020, Art. no. 11001001. Security, vol. 14, no. 8, pp. 2074–2087, Aug. 2019.
[8] S. S. M. Than, ‘‘Secure data transmission in video format based on [17] V. Holub and J. Fridrich, “Designing steganographic distortion using
LSB and Huffman coding,’’ Int. J. Image, Graph. Signal Process., vol. directional filters,” in Proc. IEEE Int. Workshop Inf. Forensics Secur.
12, no. 1, p. 10, 2020. (WIFS), Dec. 2012, pp. 234–239.
[9] X. Mankun, L. Tianyun and P. Xijian, Steganalysis of LSB matching [18] Y. Qian, J. Dong, W. Wang, and T. Tan, “Learning and transferring rep
based on histogram features in grayscale image, IEEE ICCT, pp. 669- resentations for image steganalysis using convolutional neural
672, 10-12 November 2008. network,” in Proc. IEEE Int. Conf. Image Process. (ICIP), Sep. 2016,
[10] m. Ramezani and S. Ghaemmaghami, towards genetic feature selection pp. 25–28
in image steganalysis, Proc. on 7th IEEE CCNC, pp. 1-4, 2010. [19] M. Yedroudj, F. Comby, and M. Chaumont, “Yedroudj-net: An
[11] I. Avcibas, N. Memon and B. Sankur, Steganalysis using image quality efficient CNN for spatial steganalysis,” in Proc. IEEE Int. Conf.
metrics, In Security and Multimedia Contents, SPIE, 2001. Acoust., Speech Signal Process. (ICASSP), Apr. 2018, pp. 2092–2096.
[12] Congcong Sun, Hui Tian, Wojciech Mazurczyk, Chin‐Chen [20] B. Li, W. Wei, A. Ferreira, and S. Tan, “ReST-Net: Diverse activation
Chang, Yiqiao Cai, Yonghong Chen, Towards blind detection of modules and parallel subnets-based CNN for spatial image
steganography in low‐bit‐rate speech streams, International Journal of steganalysis,” IEEE Signal Process. Lett., vol. 25, no. 5, pp. 650–654,
Intelligent Systems, 10.1002/int.23077, 2022. May 2018.
[13] Julian Miranda, November 21, 2019, "Steganalysis for still images with
LSB Steganography - Features dataset", IEEE Dataport, doi:
https://dx.doi.org/10.21227/gs67-yn65.
Abstract— There is a need to preserve the historical approaches using Machine Learning techniques and also
handwritten documents for the generations to come. Therefore, Deep Learning techniques. In Machine learning, the features
handwritten text which is available in various scripts needs to using which the network is trained are manually extracted
be digitized and later recognized. Various techniques are while in Deep Learning, instead of manually extracting the
available for the digitization of handwritten text. Digitization features; they are automatically extracted and the model is
of handwritten text helps to access, manipulate and store the trained on those characteristics. Figure 1 is showing the
data for the longer time. Various Machine Learning and Deep basic process of image recognition using Machine Learning
Learning techniques are being implemented for the recognition
technique. First the input images which are to be recognized
of handwritten text. In this paper, a survey has been presented
are given to the model. Once the various features are
for the recognition of handwritten text using various
techniques. This survey will be helpful for the researchers to
manually extracted then they are fed to the Machine
find the various techniques that can be applied for the Learning Algorithms which will predict the output class.
recognition of different handwritten scripts to obtain the Figure 2 is representing the process of image recognition
desired Accuracy. using Deep Learning technique. It can be observed that
images are given directly to the Deep Learning Algorithm
Keywords— Text Recognition, Machine Learning, Deep which will automatically extract as well as recognize the
learning, Accuracy, Segmented and Non-Segmented image and later output will be predicted. By using the
different metrics of the confusion matrix, which are true
I. INTRODUCTION positive (TP), false positive (FP), true negative (TN), and
Digitization of text is helpful in bridging the gap between false negative (FN): Recognition Accuracy can be calculated
computers and humans. Handwritten text which is available as given in expression (1)
in various scripts needs to be converted into its digital form
so that it can be processed and preserved for the longer time.
Handwritten documents are available in various Accuracy = (TP + TN)/ (TP + TN + FP + FN) (1)
organizations like in academic institutes, Government
offices, small vendors, historical places which requires
digitization of those documents. Most of the data in various
government offices is available in physical form which takes
a lot of space and even searching and indexing is also very
difficult. A lot of Ancient data which is handwritten in nature
is also available. Those documents contain the various
methods to treat medically ill patients. So, there is a need of Fig. 1. Image Recognition process with the help of Machine Learning
technology that can convert the physically available Technique
document into soft document for their recognition. But the
recognition of handwritten text with the required accuracy is
still a challenge. Sometimes, the document which is to be
digitized and later recognized is already in the degraded
form, sometimes the documents contain the broken
handwritten characters or the characters in the words are so
closely written which makes them very difficult to recognize. Fig. 2. Image Recognition process with the help of Deep Learning
This survey contains the techniques for the recognition of TechniqueEase of Use
handwritten text which can be used for the recognition of
individual character or complete word. In some papers, II. SURVEY ON HANDWRITTEN TEXT
authors have opted for the recognition of complete word Survey to recognize the various scripts is represented.
without dividing them into individual characters. This Handwritten text is recognized for various scripts like
technique is known as Holistic approach. While in other Devanagri, Gurmukhi, English, Tamil and Bengali etc.
papers, authors have opted for character recognition by Survey has been categorized into two categories for
dividing the word into individual characters. This technique handwritten text. In one section, survey is given using Deep
is known as Analytical approach. Survey consists of the Learning techniques while in the other section; survey is
recognition of the handwritten text for Analytical and holistic
given for the recognition of handwritten text by employing implemented CNN recognition network for the handwritten
Machine Learning techniques. Arabic characters. 97% recognition accuracy is obtained.
Similarly a CNN based model has also been implemented for
A. Survey on the Recognition Accuracy obtained employing the recognition of Swedish handwritten digits. Kusetogullari
Deep Learning Techniques et al[7] has obtained a recognition accuracy of 97.12% for
Text Recognition accuracy obtained for the various 100000 Swedish digits.. Kashif et al[8] has implemented
handwritten text is shown. Pande et al[1] has achieved a ResNet 18 model on Urdu & Manipuri words after their
recognition accuracy of 99.13%. The author has used segmentation while Inunganbi et al[9] has employed CNN
Devanagri handwritten dataset of 92000 handwritten based model for Manipuri script only and obtained an higher
characters. Khan et al[2] used a CNN(Convolutional Neural accuracy as compared to ResNet 18 model. They have
Network) recognition model for the 5298 Urdu hand-written employed Analytical approach for the recognition. Similarly
words. For the recognition, the Urdu word is not segmented [10-15] have also employed Analytical approach using Deep
while complete word is recognized employing Holistic Learning techniques for the recognition of Tamil, Bengali,
approach. Segmentation of Urdu word is a difficult task as Gurmukhi, Devanagari and English Scripts. This section has
the Urdu characters are usually written very close. Hemanth presented a survey for the recognition of text employing
et al[3] has implemented CNN and RNN(Recurrent Neural Deep Learning based models. Table I is representing the
Network) models for the recognition of 115320 English recognition accuracy obtained for different scripts based on
handwritten words. Here also, Holistic technique is Deep Learning techniques. Size of the dataset used for the
employed. Obtained Accuracy is 98%. Similarly Sharma et purpose of recognition along with the approach of
al[4-5] has recognized Gurmukhi handwritten words recognition whether Analytical or Holistic is also mentioned
employing Holistic technique and obtained accuracy is 98% for each script. By employing deep learning techniques,
for 22000 Gurmukhi words and 99.13% for the recognition manual feature extraction is not required. All the features are
of 4000 Gurmukhi words. Recognition of the text written in automatically extracted which are required to train the
Arabic Script is also carried out. Altwaijry et al[6] has also model.
TABLE I. RECOGNITION ACCURACY OBTAINED FOR HANDWRITTEN TEXT EMPLOYING DEEP LEARNING TECHNIQUES
TABLE II. RECOGNITION ACCURACY OBTAINED FOR HANDWRITTEN TEXT EMPLOYING MACHINE LEARNING TECHNIQUES
classifier for the recognition of Bangla handwritten text. & Applied Science Research, 11(3), pp.7140-7145.
Author has recognized `1800 Bangla words without dividing [3] Hemanth, G.R., Jayasree, M., Venii, S.K., Akshaya, P. and Saranya,
R., 2021. CNN-RNN Based Handwritten Text Recognition. ICTACT
them into single units i.e. holistic approach is used instead of Journal on Soft Computing, 12(1), pp.2457-2463.
Analytical. Huang et al[17] has worked on the recognition of [4] Sharma, S., Gupta, S., Kumar, N. and Arora, T., 2021. Postal
pasto characters. Size of the dataset used is 11352 pasto Automation System in Gurmukhi Script using Deep
characters. Obtained Accuracy is 80.34% by using KNN Learning. International Journal of Image and Graphics, p.2350005.
classifier. It can be observed that Huang et al [18] has [5] Sharma, S., Gupta, S., Gupta, D., Juneja, S., Singal, G., Dhiman, G.
and Kautish, S., 2022. Recognition of Gurmukhi Handwritten City
obtained an accuracy of 96.03% for recognizing Gurumukhi
Names Using Deep Learning and Cloud Computing. Scientific
handwritten characters. Author has implemented various Programming, 2022.
machine learning classifiers for the recognition of [6] N. Altwaijry and I. Al-Turaiki, “Arabic handwriting recognition
handwritten text. Sahoo et al [19] has employed ANN based system using convolutional neural network,” Neural Computing and
Multilayer perceptron(MLP) as well as Sequential minimal Applications, vol. 33, no. 7, pp. 2249–2261, 2021, doi:
optimization(SMO) algorithm for the recognition of Bangla 10.1007/s00521-020-05070-8.
[7] H. Kusetogullari, A. Yavariabdi, J. Hall, and N. Lavesson,
words. Highest accuracy obtained is 87%. Accuracy obtained “DIGITNET: A Deep Handwritten Digit Detection and Recognition
for different scripts using various machine learning Method Using a New Historical Handwritten Digit Dataset,” Big
classifiers can be observed in Table II. Gurmukhi text is Data Research, vol. 23, p. 100182, 2021, doi:
recognized [20-21] by using Hidden Markov Model[HMM] 10.1016/j.bdr.2020.100182.
and Multilayer perceptron(MLP), highest accuracy of [8] M. Kashif, “Urdu Handwritten Text Recognition Using ResNet18,”
2021, [Online]. Available: http://arxiv.org/abs/2103.05105.
97.01% is obtained using HMM instead of MLP. Shaw et [9] S. Inunganbi, P. Choudhary, and K. Manglem, “Handwritten Meitei
al[22] has implemented a Machine Learning based model Mayek recognition using three-channel convolution neural network
using SVM algorithm to recognize Devanagari text. of gradients and gray,” Computational Intelligence, vol. 37, no. 1,
Accuracy obtained is 82.81%. Gurmukhi text using pp. 70–86, 2021, doi: 10.1111/coin.12392.
Analytical approach implementing Machine Learning [10] R. K. S, A. Sivamurugan, S. V. M, and K. Shanmugam,
“Digitalization of Tamil Handwritten Characters Recognition Using
algorithms[23-25] has been recognized while highest Convolutional Neural Networks ( CNN ),” no. 2, pp. 262–268, 2020.
obtained accuracy is 95.04%. From the table II, it can be [11] A. Roy, “AKHCRNet: Bengali handwritten character recognition
concluded that highest accuracy of 97.01% is obtained using using deep learning,” arXiv, 2020.
Machine Learning based HMM algorithm [26]. [12] Jindal, U., Gupta, S., Jain, V. and Paprzycki, M., 2020. Offline
Handwritten Gurumukhi Character Recognition System Using Deep
III. CONCLUSION Learning. In Advances in Bioinformatics, Multimedia, and
Electronics Circuits and Signals (pp. 121-133). Springer, Singapore.
Due to the availability of huge amount of handwritten [13] N. Aneja and S. Aneja, “Transfer Learning using CNN for
text, there is a need to digitize the text. Various techniques Handwritten Devanagari Character Recognition,” 1st IEEE
are available to convert the handwritten text into digital International Conference on Advances in Information Technology,
form. This paper represents the Accuracy obtained on the ICAIT 2019 - Proceedings, pp. 293–296, 2019, doi:
10.1109/ICAIT47043.2019.8987286.
recognition of handwritten text employing machine learning [14] S. Hamida, B. Cherradi, H. Ouajji, and A. Raihani, “Convolutional
and deep learning techniques. Accuracy obtained for various Neural Network Architecture for Offline Handwritten Characters
scripts like Gurmukhi, Devanagri, Bangla, Tamil, Manipuri, Recognition,” no. November, pp. 368–377, 2020, doi: 10.1007/978-
Urdu etc. For the recognition of handwritten text, first the 3-030-36778-7_41.
handwritten text is to be converted into digital image using a [15] N. Kumar and S. Gupta, “Offline Handwritten Gurmukhi Word
Recognition Using Deep Neural Networks Gurmukhi text into
scanner. Once the digital image is obtained then some
Devanagari text using suitable unicodes,” International Journal of
preprocessing techniques are to be applied so that a quality Pure and Applied Mathematics, vol. 119, no. 12, pp. 14749–14767,
digital image can be obtained which can be fed to the model 2018.
for its recognition. From the Table I, it can be found that [16] S. Bhowmik, S. Malakar, R. Sarkar, S. Basu, M. Kundu, and M.
highest recognition accuracy obtained is 99.74% to recognize Nasipuri, “Off-line Bangla handwritten word recognition: a holistic
and classify English digits; and letters. The Author has approach,” Neural Computing and Applications, vol. 31, no. 10, pp.
5783–5798, 2019, doi: 10.1007/s00521-018-3389-1.
implemented CNN based Deep Learning model for the [17] J. Huang, I. U. Haq, C. Dai, S. Khan, S. Nazir, and M. Imtiaz,
recognition. From the Table II, it can be concluded that the “Isolated Handwritten Pashto Character Recognition Using a K-NN
highest recognition accuracy obtained is 97.01% is for the Classification Tool based on Zoning and HOG Feature Extraction
Gurmukhi Characters. For this, the Author has implemented Techniques,” Complexity, vol. 2021, pp. 1–8, 2021, doi:
Hidden Markov Model for the purpose of recognition. It can 10.1155/2021/5558373.
[18] A. Garg, M. K. Jindal, and A. Singh, “Degraded offline handwritten
be concluded from the Table I and II that maximum Gurmukhi character recognition: study of various features and
recognition accuracy is obtained by using Deep learning classifiers,” International Journal of Information Technology
based CNN model as compared to the accuracy obtained (Singapore), 2019, doi: 10.1007/s41870-019-00399-3.
using machine learning based model. It has also observed [19] S. Sahoo, S. K. Nandi, S. Barua, Pallavi, S. Malakar, and R. Sarkar,
that the text recognition is limited to few scripts, this can be Handwritten Bangla city name recognition using shape-context
feature, vol. 695. Springer Singapore, 2018.
extended for the recognition of other scripts also that can be
[20] J. Dasgupta, K. Bhattacharya, and B. Chanda, “A holistic approach
utilised in various applications for the automation of various for Off-line handwritten cursive word recognition using directional
systems. feature based on Arnold transform,” Pattern Recognition Letters, vol.
79, pp. 73–79, 2016, doi: 10.1016/j.patrec.2016.05.017.
REFERENCES [21] G. Singh and M. Sachan, “Offline Gurmukhi script recognition using
[1] Pande, S.D., Jadhav, P.P., Joshi, R., Sawant, A.D., Muddebihalkar, knowledge based approach & Multi-Layered Perceptron neural
V., Rathod, S., Gurav, M.N. and Das, S., 2022. Digitization of network,” Proceedings of 2015 International Conference on Signal
handwritten Devanagari text using CNN transfer learning–A better Processing, Computing and Control, ISPCC 2015, pp. 266–271,
customer service support. Neuroscience Informatics, 2(3), p.100016. 2016, doi: 10.1109/ISPCC.2015.7375038.
[2] Khan, H.R., Hasan, M.A., Kazmi, M., Fayyaz, N., Khalid, H. and [22] B. Shaw, U. Bhattacharya, and S. K. Parui, “Offline handwritten
Qazi, S.A., 2021. A Holistic Approach to Urdu Language Word Devanagari word recognition: Information fusion at feature and
Recognition using Deep Neural Networks. Engineering, Technology classifier levels,” Proceedings - 3rd IAPR Asian Conference on
Pattern Recognition, ACPR 2015, pp. 720–724, 2016, doi: [25] K. S. Siddharth, M. Jangid, R. Dhir, and R. Rani, “Handwritten
10.1109/ACPR.2015.7486597. Gurmukhi Character Recognition Using Statistical and Background
[23] S. Bansal, M. Kumar, and M. Garg, “A New Approach for Directional Distribution Features,” International Journal on
Handwritten City Name Recognition,” pp. 106–109, 2014. Computer Science and Engineering, vol. 3, no. 6, pp. 2332–2345,
[24] M. Kumar, M. K. Jindal, and R. K. Sharma, “K-nearest neighbor 2011.
based offline handwritten Gurmukhi character recognition,” ICIIP [26] Jacob, I. Jeena. "Performance evaluation of caps-net based multitask
2011 - Proceedings: 2011 International Conference on Image learning architecture for text classification." Journal of Artificial
Information Processing, no. Iciip, 2011, doi: Intelligence 2, no. 01 (2020): 1-10.
10.1109/ICIIP.2011.6108863.
Dhayanandh AT
Computer Science and Engineering
PSG College of Technology
Coimbatore, India
dhayanandhat@gmail.com
Abstract— Data volumes are increasing due to the growth data is stored for medication purposes. Scalable and fine-
of technologies such as IoT, Cloud Computing, and mobile grained access control can be accomplished by giving the
internet. Data encryption is the solution, which protects access privileges to the user (doctor in case of PHRs), to only
data privacy by giving specific access to encrypted data view the medical history of the patient and will have
can be better understood using Attribute-based (ABE) restriction to view other details of the patient.
encryption. When patients use web-based commercial As fascinating as it is, there are still several issues that
systems to store their personal health data, the privacy of need to be addressed before it can be fully accepted. The use
personal health records (PHRs) can be a major problem. of third-party platforms for data storage poses security and
When it comes to establishing policies to control access privacy problems, which are increasingly important in e-
and protect data confidentiality, common access control healthcare systems. Standard access control strategies can be
systems, such as Work-Based Access Control, have major used to solve data security and privacy problems in e-
limitations. In this research work a novel healthcare healthcare. On the other hand, these systems only allow for
application has been developed based on the ABE scheme coarse-grained access controls, which are inadequate in
approach. Advanced Encryption Standard (AES) scaling situations.
algorithm and Secure Hash Algorithm (SHA) are used for Attribute-Based Encryption (ABE), the encryption and
the encryption and decryption processes in the ABE decryption processes of the data is based on the set of
scheme. This allows only designated authorized personnel, attributes. The two types of ABE are Key-policy based
such as a patient or their respective doctors, to access encryption (KP-ABE) [12] and the ciphertext policy-based
personal data recorded in medical records, with a vision to encryption (CP-ABE) [13]. Since its launch, CP-ABE has
improve the privacy and security of user details. been particularly interested in cloud-based access control
systems. For better control of data access in cloud
Keywords —Cryptography, Attribute-Based Encryption, Access environments, several CP-ABE methods have been
Control, Encryption, Decryption, Advanced Encryption Standard formulated. ABE establishes data access rules depending on
many aspects of stored or user data[14]. Allows patients to
share their PHRs by choosing between many users,
encoding records behind a set of symbols without
I. INTRODUCTION registering all users in the system. ABE creates data access
rules depending on a variety of factors such as stored data or
Collaborative e-healthcare is a paradigm that allows user. It allows patients to share their personal health records
healthcare stakeholders to share electronic health to the respective doctors they are consulting and doctors also
information for efficient coordination and high-quality share their specific field, appointment timings so that
patient treatment. In today's healthcare systems, the patient can fix and consult them, etc. to the patients.
paradigm is critical when patients are being treated by
multiple healthcare facilities at the same time [15].
Wearable and embeddable health sensors, as well as II. RELATED WORK
medical records from the healthcare system, can be
utilized to gather electronic health information in Holden et al., [1] performed twenty study interviews with
collaborative e-healthcare systems facilities and other doctors who used electronic health records (EHRs). One of the
places, and is stored in the database. Consider a patient challenges to using an electronic health record, according to
who is being treated at both Hospital-A and Hospital-B at physicians, is system response time. In this context, data
the same time. Consider a patient who is being treated by encryption demands have increased as EHRs move to a cloud-
two hospitals, Hospital A and Hospital B, for a cardiac based storage environment, and the usability issue has arisen
issue and diabetes at the same time. As part of her due to a lack of effective data management solutions for
treatment plan, Hospital-A gives the patient with a encrypted data, including searchability.
wearable health tracker to track her everyday heart rate.
The data from the health trackers is transferred to the
database, where it can be accessed by both Hospital-A and
Hospital-B. In this way, Hospital-demand Bs for frequent
978-1-6654-6084-2/22/$31.00
and duplicated medical examinations is reduced. Patient ©2022 IEEE 443
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
• Setup Phase
• Key Generation Phase
• Encryption Phase
• Decryption Phase.
Decrypt Phase (PK, SK, CT): This phase takes public key,
ciphertext CT, result of access policy A, and private key SK
as inputs and if the set of access policy satisfies then it
decrypts the encrypted message and returns the original
message M.
For each repetition, the last block output acts as the next
MIX COLUMNS: block input. The whole cycle is repeated until you reach the
ultimate 512-bit block, and then consider the resultant output of
Each of the four bytes of a single column in the matrix is the hash digest which is 256-bit long.
converted by using a special mathematical function. This
function generates new bytes which will replace the original
IV. PROPOSED WORK
bytes in the single and will repeat the same process for all the
columns. The resultant matrix is a 4x4 new matrix consists of In the existing works, one cannot revoke the attribute
16 bytes. This process is not performed in the final round. policy but in our proposed work, one can revoke or delete
the attribute policy structure and it performs encryption and
ADD ROUND KEY: decryption accordingly. We have developed a online
healthcare application that will store one’s personal health
The new 4x4 matrix will now be considered as 128 information (PHRs). We will implement an ABE scheme
bits and performs XOR operation by 128 bits round key. It where we can setup the access policies and revoke them if
will generate ciphertext in the last cycle and else, it starts necessary. The admin can fully control which details of
another similar cycle by translating 128 bits as 16 bytes. doctor/patient to be revealed to the respective users and
manager have the authority to change the secret key
DECRYPTION: (Decentralized network). Both centralized and decentralized
schemes are executed and compared for effectiveness on
The decryption process is the reverse process of the specific cases.
encryption. Each cycle consists of four consecutive processes In KP-ABE, ciphertexts are associated with sets of
– descriptive attributes, and users’ keys are associated with
• Add a round key policies (the reverse of CP-ABE). We stress that in KP-
• Mix columns ABE, the encryptor exerts no control over who has access to
• Shift rows the data that he/she encrypts, except by his/her choice of
descriptive attributes for the data. Rather, he/she must trust
• Byte substitution
that the key-issuer issues the appropriate keys to grant or
As the processes below each round go back, unlike Feistel deny access to the appropriate users. In CP-ABE, the
Cipher, encryption and decoding algorithms must be used encryptor must be able to intelligently decide who should or
separately, albeit closely related. should not have access to the data that she encrypts. So, CP-
ABE Algorithm is used
b. SECURE HASH ALGORITHM:
Padding Bits:
Padding Length:
Compression Functions:
Fig 4.1 Workflow (Centralized)
The multiple 512 bits blocks is formed. Each block goes
through 64 rounds, the output of each block will act as the
input for the next block.
Output:
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 446
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
B. Project Model
Setup: The authority(admin) will generate a public Multiple Authority Attribute Based Encryption (MA- ABE)
key which consists of random numbers. The above-mentioned stages are for single attribute authority
Key Generation: Secret key for specific user is (Eg.: k1 - Admin). There are ‘n’ attribute authorities in a Multi-
given by admin in centralized scheme and manager in Authority ABE scheme, (Eg.: k1, k2, k3…., kn). Each attribute
case of decentralized scheme. authority will play a role in system (E.g.: k1 – Admin, k2 -
Encryption: The ciphertext will be generated using Manager). Multiple authority is having more than only authority
public key and access policy structure. Example set of who can control the system. For ex. If we have two authorities
attributes present in the structure: (admin and manager). Authorities can split and manage the tasks
Decryption: The ciphertext will be decrypted faster. manager can generate/change secret key and admin can be
using secret key. able to add and revoke the attribute policy. If we add few more
authorities, there exists a high security vulnerability by giving
The list of attributes are separated into two sections: the access control to individual authorities.
in first section, it contains the authorities present in
the system and the next section contains the attributes/ ATTRIBUTE REVOCATION
information about the respective authorities.
In CPABE schemes, there may be a chance of dynamically
changing the user's attributes because of expiring of attributes,
revoke of attributes or need of adding new attributes. This
mechanism is called attribute revocation. For example, In the
current covid pandemic situation in which patients flooded
hospitals which out-numbered the number of available doctors
where, details of the patients were shared with other hospital
personnel like nurses to help contain the situation in the hospital.
At times like this we could add, modify, or revoke already
existing policies with new ones that suits the needs of the current
situation. Since by using two encryption algorithms, both internal
and external attacks can be prevented of its strong encryption and
decryption on the PHRs.
professionals, and consumers may have sensitive data • Embed messages from secret files (text files)
that they want to protect from others. Steganography into cover image files using the BPCS
isvery useful for repelling enemy attacks caused by embedding algorithm.
unauthorized access and malware attacks. Asa result,
the proposed system developed a system that hides • Retrieve Steganographic image file (.png).
data in the image processing process using a bit-plane
complexity segmentation algorithm. Data hiding • Next, we must extract the secret message from
capacity is measured by how much data can be the steganographic image. There are threesteps
embedded in the image. It is evaluated by Mean to extract the original secret message.
Square Error which shows the pixel intensity between • Select the Steganographic image file (.png).
the original and the embedded image. By embedding
the data in an image, the data is prevented from • Using BPCS technology to extract secret
malware attacks and thus ensures that the data stored messages from steganographic imagefiles and get
is secure. original text messages.
V. BPCS TECHNIQUE
• If the border is long, then the image is complex, Kawaguchi and Eason first introduced the BPCS
and the image is simple, if the border is short. technique as a solution to the low payload problem of
• The total length of the black and white border in already existing traditional steganographic methods.
the image is equal to the sum of the both the In this technique, the bits are first converted from pure
number of black and white changes along the binary code (PBC) to Canonical Gray coding (CGC).
rows and columns in the vessel image. Embedding the secret user’s data using the CGC bits
pattern improves the imperceptibility(hiding)
• Design a map with noisy blocks and replace them performance by reducing distortions of the noise in the
by information block through Additive white original image bitmap. The images (both color and
Gaussian noise (AWGN) Channel. grayscale) is then divided into multiple bit planes,
• The performance parameters like data hiding classified as "information" or "noise". Noisy bit-planes
capacity and distortion method are evaluated of the vessel image are complex regions. The threshold
based on Peak Signal to Noise Ratio (PSNR), value which is (α is 0.45) is used to determine the bit
and Steganographic analysis. plane complexity of the image by measuring how
often a bit changes from 0 to 1 and from 1 to 0 in
the image’s bit plane.Often α is defined as a criterion
to judge whether the block is complex or not.
α = k/2*m*(m-1)
particular block, user’s secret data into noisy bit plane blocks to
effectively secure it. Because this method uses both
the most significant bit (MSB) and the least significant
• m-is the row or column in a block,
bit (LSB) of the vessel's noise block, it offers a much
faster embedding rate than the traditional LSB method,
• α ranges between 0 and 1. which uses only the vessel's LSB.
If a given bit plane’s complexity exceeds a The BPCS embedding procedure is summarized
threshold, it will skip the corresponding embedding below.
process for that block. The complexity of the included
secret is also calculated and, if found below a
threshold, adjusted to make it complex before
• First, Input the vessel image (m * n)
including it in the vessel file. Fora 2n x 2m grayscale • Convert the vessel images from PBC to CGC
black and white image with black as the foreground
area and white as the background area, the blend • Segment each vessel image's bit plane into
would look like this: informative and noise-like regions using a
threshold value of 0.45.
• Two checkerboard schemes Wc and Bc have been • Secret data bytes are grouped into a series of
initialized. where Wc has a whitepixel (e.g. 1) in blocks.
the upper left of the image and a black pixel is Bc
(e.g. 0) in the upper left. • If a block is having less complexity value than the
threshold, it is conjugated again tocreate a more
• The image P is inputted with black pixels(B) in the complex block to embed the data.
foreground area and pixels in thebackground area
are white pixels (W).
• P* is defined as the conjugate of P that satisfies the
below following conditions:
o The shape of the foreground area should be the
same as that of P.
o The foreground area’s pattern is Bc.
o The background area’s pattern is Wc .
• Embed each secret block in a noise bit- planes PSNR is used for comparing the value of the
region of the image. required image signal against the value of a corrupting
noise which is in unit decibels. The low PSNR value
• Convert back the original vessel image from CGC indicates the background noise will be more
to PBC. perceptible. So, PSNR should be higher for getting
better image quality.
• Steganographic image is produced as the final
output
255
High payload capacity is the main advantage of the 𝑃𝑆𝑁𝑅 = 20 log10
BPCS technique. Since due to problem of data hiding √(𝟏/𝑵) ∑𝑵−𝟏 ′
𝒊=𝟎 (𝑰𝒊 − 𝑰𝒊 )
𝟐
space, increasing a vessel's payload capacity has a
negative effect on data hiding capacity. In addition, the
vessel's robustness to image processing tasks such as Where, 𝐼𝑖 is the value of a pixel in the original
compression is important to ensure the security of the image and 𝐼𝑖′ is the value of the same pixel after
information it contains. The BPCS cannot allow even embedding, respectively. N is the number of pixels.
the small changes in the image unless the secret data is 255 is the maximum signal value that exists in the
embedded in a higher order of the bit-planes, which original “known to be good” image.
further degrades the vessel's data hiding capacity and
impenetrable capacity. BPCS technique takes around B. STEGANOGRAPHIC ANALYSIS
65 seconds to extract the secret data from the
embedded image if the secret data size is 5MB. If the
data size is less, extracting the secret data will be very The Steganographic noise analysis is performed by
fast and if data size is more, it might take more time. using the tool (29a.ch) to analyze the embedded image.
The BPCS technique embedding framework is shown If the steganographic image is analyzed, just only the
in Fig 5. noisy regions are visible but can't retrieve the data in
it. So, the security is high.
VIII. TESTING
VII. PERFORMANCE EVALUATION
A. Test Case 1
Bit Plane Complexity Steganography (BPCS)
technique on both gray scale and color image methods The original vessel image is color image which is
implemented. Then, performance parameters like data of size 2.62 MB. The data which to be embedded is a
hiding capacity and distortion method based on Peak pdf file which is of size 872 KB. After implementing
Signal to Noise Ratio (PSNR), and Steganographic the BPCS technique, the data will be embedded in the
analysis are evaluated. vessel image. The PSNR value by comparing both
vessel and Steganographic image is 61.5 dB. The
higher the PSNR value, the better will be embedding
A. MSE AND PSNR capacity and the image quality. Even if noise analysis
is performed on the Steganographic image only the
The Mean Square Error (MSE) and the Peak Signal data which is embedded in the noise regions is visible,
to Noise Ratio (PSNR) are the corresponding metrics but the data can’t be retrieved.
which were used to compare the quality of the
steganographic image by comparing both vessel and
steganographic images.
𝑵−𝟏
√(𝟏/𝑵) ∑(𝑰′𝒊 − 𝑰𝒊 )𝟐
𝒊=𝟎
B. Test Case 2
D. Test Case 4
Fig 8 TC2 MSE and PSNR Analysis
Here, the original vessel image is also a grayscale
image which is of size 223 KB. The data which to be
embedded is a image file which is of size 130 KB.
After implementing the BPCS technique, the data will
be embedded in the vessel image. The PSNR value by
comparing both vessel and Steganographic image is 53
dB. Noise analysis is also performed as shown in fig.
13 and the security is high.
technique can’t be implemented. The data which is to the Performance evaluation and test cases performed it
be embedded should be always less than the is inferred that the color vessel image with size of 5
steganographic vessel image. If the vessel image is MB or above has better embedding capacity.
less than the data to be embedded, then “embedding is Impenetrable capacity cannot be compromised and a
not possible” message will be displayed. good steganographic method should ensure that the
embedding procedure introduces minimal noise to the
IX. TESTING EVALUATION vessel image. The time taken for embedding and
extracting secret data can be reduced by implementing
In the first two cases, the vessel is color with a combination of two steganographic techniques.
image and in the last two test cases, the vessel image XI. REFERENCES
is grayscale. In test case 1, the MSE value is low. And
PSNR is high. So, embedding capacity should be high [1] X. Liao, Y. Yu, B. Li, Z. Li and Z. Qin, "A New Payload
and distortion measure should be low. Distortion Partition Strategy in Color Image Steganography," in
IEEE Transactions on Circuits and Systems for Video
measure is how the noise modifies in the image. In test Technology, vol. 30, no. 3, pp. 685-696, doi:
case 2 and 3, PSNR value is medium. So, embedding 10.1109/TCSVT.2019.2896270, 2020.
capacity is medium and the distortion measure is little
[2] Cho Do Xuan, “A Proposal to Improve the Bit Plane
high. In test case 4, the PSNR value is high.
Steganography based on the Complexity Calculation
Embedding capacity is high. From all the test cases as Technique” International Journal of Advanced Computer
shown in Table 2 , the color vessel image which is of Science and Applications(IJACSA), 12(6), 2021.
higher size(5MB) performs better. The security by
[3] Jain, Shivani, Shivani Dubey, and Vikas Singhal. "Review
performing noise analysis is high. The graph is also of Steganography Techniques for securing Patient
illustrated in Fig 24 to demonstrate the MSE and Information embedded in Medical Image." International
PSNR for the different test cases. Journal of Scientific Research in Computer Science
Applications and Management Studies, 2020.
TABLE 1 TESTING EVALUATION [4] Htun, Zin Mar, and Zar Ni Zin. "Image Steganography
using Bit Plane Complexity Segmentation." International
Journal of All Research Writings 2.12, 2020.
Test Vessel MSE PSNR Inference
Cases Image (dB) [5] Audhi, Sakshi, and Maruska Mascarenhas. "A
Comparative Study on Different Techniques of
Type Cryptography and Steganography." International Journal
of Information and Computing Science, 2019.
Case Color 0.04650 61.45535 Higher
1 [6] Chandra Sekhar, M, S K. Chandini, V Sai Rohith, V Jhansi
Lakshmi, & M Pavan Kumar. "Data hiding using bit plane
Case Color 25.77889 34.01857 Medium complexity segmentation steganography”, Science
2 Publishing Corporation, International Journal of
Engineering and Technology, 2022.
Case Grayscale 16.74889 35.89095 Medium [7] Gabriel Kamau, Waweru Mwangi , Wilson Cheruiyot. “A
3 Modified Bit Plane Complexity Segmentation
Steganographic Method: Increasing Payload
Case Grayscale 0.29057 53.49629 Higher Imperceptibility and Robustness”, Journal of Theoretical
4 and Applied Information Technology 2019.
[8] Siahaan, Andysah Putera, Utama. "Text Hiding in Digital
Image using BPCS Method" International Journal for
X. CONCLUSION Innovative Research in Multidisciplinary Field , 2017.
[9] Gurumurthy, Sasikumar & A.Valarmozhi, & Priya
Impenetrable capacity of the embedded data is the Mahaboba. "Design and Implementation of Bit plane
important aspect of any steganographic method. While complexity segmentation using steganography in
embedding the data in a digital image the cover image Internet". International Journal of Computer, Electronic
will be modulated in some way. So, the important and Electrical Engineering. 2. 21-25, 2012.
thing is to ensure that the introduced noise does not [10] Saha, S., et al. "Extended exploiting modification
perceptibly degrade the vessel image to guarantee or direction based steganography using hashed-weightage
increase the security of the embedded data. In this Array", Multimed Tools Appl, vol. 79, pp. 20973–20993,
2020.
project, BPCS embedding technique is used to
securely store the information within the CGC
(Canonical Gray Coding) bits of the vessel’s bit
planes. MSE and PSNR results demonstrated the
improvements on the quality of steganographic images
produced by the proposed BPCS technique. Based on
Abstract— Digital data protection frameworks inclusive of requires individual “identity” of his/her connection client and
cryptographic mechanisms and signature crypto mechanisms are the openkey of the 𝒦𝒜𝒞, at one time with his/her closekey,
essential for stable data communication in open network systems. to interconnect with other clients. Hence no open folder
An extensive open-key folder is not necessary for 𝓘𝓓-based crypto compulsory in this mechanism. After all, Shamir did not
mechanisms like 𝓘𝓓 -based crypto mechanisms, the 𝓘𝓓 - succeed to build an identity-based cryptosystem, however
basedsignature mechanisms, else 𝓘𝓓 -basedkey circulation succeed just to build an identity-based signature mechanism.
mechanisms are between the enhanced an opposing for create Thereafter many scholar suggested several classes of ℐ𝒟 -
stable and protected digital data communication for enormous- based cryptographic mechanism. An identity-based key
scale open network systems recommended by Shamir. This article
transmission mechanism is presented by Okamoto [3] in 1988
suggests an isoidentity based isobeta crypto mechanism build on
the generalized isodiscrete isologarithm isoproblem and isointeger
and extensive their mechanism for client recognition
isofactorization isoproblem that is one of the initial presented by Ohta [4]. The above-mentioned mechanism
implementations of Shamir's for security norms. Also, we examine utilized the RSA openkey crypto mechanism having security
the security adverse a conjuration of certain clients in the is built on the computational difficulty of factoring product of
suggested mechanism, and demonstrate the probability of two huge primes. An ℐ𝒟- based crypto mechanism build on
establishing a higher secure mechanism. the discrete logarithm problem presented by Tsujii and Itoh
[5] along with discrete exponent which utilized the ElGamal
Keywords— Cryptography, Isomathematics of first-kind openkey crypto mechanism.
(𝓘𝓕𝓚) , Isobeta cryptographic mechanism, Isodiscrete
isologarithm isoproblem (𝑰𝓓𝓛𝓟) , Generalized Isodiscrete A non-interactive ℐ𝒟 -Based open-key circulation
isologarithm isoproblem (𝓖𝑰𝓓𝓛𝓟) , and Isointeger mechanism presented by Maurer and Yacobi [6] in 1991 in
isofactorization isoproblem (𝓘𝓘𝓕𝓟). which no additional authentication by certificates as the open
keys are oneself authenticated. The amended variant of this
I. INTRODUCTION mechanism presented in [7]. With multi purposes like an
For stable and protected data transmission, essentials to be identification mechanism, ℐ𝒟 -Based signature mechanism,
collective close session key among two clients. Close session and a conference key circulation mechanism required strong
key circulation will be a significant issue as the number of computational efficiency as the computational difficulty of the
clients is expanding in the open network system. The model mechanism is heavy. Factoring and discrete logarithm based
for the open key circulation system (𝒪𝒦𝒞𝒮) presented by open key crypto mechanism presented by L. Harn [8]. A
modified ℐ𝒟 -Based encryption mechanism of integer
Diffie and Hellman in 1976 [1]. In the 𝒪𝒦𝒞𝒮, every client
factorization problem, which is incapable as plaintext is
require to choose a close key and numerate an analogous
converted bit-by-bit and henceforth the output of converted
openkey and save in open directory. The collective closes
plaintext turns into protracted. A mechanism that can transfer
sessionkey will be mutual among binary clients; can be
the entire crypto mechanism build on discrete logarithm the
numerate by some one client, created on his/her individual
ℐ𝒟-based mechanism presented by Wei Bin lee and Kuan
close key and the other client’s open key. The 𝒪𝒦𝒞𝒮 runs an
Chieh Liao [9] in 2004. An ℐ𝒟-based crypto mechanism and
aesthetic approach to simplify the key circulation issue, the
primary thinking is the validation of the open keys utilized in modified ℐ𝒟 -based crypto mechanism build on double
the cryptographic mechanisms. The framework of an identity generalized discrete logarithm problem presented by C.
is presented by Shamir [2] in 1984. In an identity mechanism, Meshram [10-12]. Lightweight crypto mechanisms for end-to-
every client requires to identify himself/herself from key end encryption process in IoT field presented by Chatterjee,
authentication isocenter (𝒦𝒜𝒞) prior to connecting the open Chakraborty and Mandal [13] in 2019.
network system. The 𝒦𝒜𝒞 will approve and give his/her In 2020, crypto mechanisms build on quadratic-
close key if client’s identity is recognized. Thus, a client exponentiation-randomized and partial discrete logarithm
problem presented in [14]. Key exchange protocol build on ˆ ; ξ̂−𝓇ˆ is named as isoinverse of ξ̂ 𝓇 ; (ξ̂𝓇ˆ ,×
𝔗 ˆ ).
isoring isopolynomials coefficient presented in [15]. Lately,
Key exchange protocol and isocrypto mechanism build on B. Mathematical definition of 𝒢𝐼𝒟ℒ𝒫
Santilli’s isomathematics presented in [16-18]. Improvements Let 𝒢̂ be cyclic isogroup of order ℯ̂ such that isonumber
in the cloud safety with crypto mechanisms, deep learning 𝓈̂ ≡ ℊ̂ 𝓉̂ for isonumber 𝓉̂ ∈ [0, ℯ̂ − 1] then ℊ ̂
and block-chain presented by Hari Krishnan Andi [19] in
primitiveisoroot of the isogroup is knowing 𝒢I𝒟ℒ𝒫.
2021.
C. Mathematical definition of ℐℐℱ𝒫
In 2022, isokey interchange protocol, beta and IsoQER
cryptosystem build on isonumber presented in [20-22]. To numerate isoprime isonumbers ℕ ̂ =𝓏 ̂1 ∗ 𝓏
̂2 ∗
In light of the perception that new crypto mechanism 𝓏
̂3 ⋯ 𝓏
̂ℯ , an decomposition for positive isointeger ℕ̂ is
generally encounter security difficulties and privacy concerns knowing ℐℐℱ𝒫.
and numerous crypto frameworks build on integer
factorization & discrete logarithm have been implemented. III. INTRODUCTION OF THE ℐℐℬ𝒞
Isokey creation segment with low computational complexity Establishment for the isocenter and every customer:
for transformation procedure is main role in our crypto
mechanism such as no correction in initial Shamir mechanism. Step 1: Every customer creates a 𝓃̂ −dimensional isobinary
Thus propose crypto mechanism have identical protection as isovector for his/her ℐ𝒟 and records with the isocenter. The
the initial one and preserves entire advantages of the ℐ𝒟-based isocenter stocks it in open/public folder. We indicate
mechanism. customer 𝒿̂′ s ℐ𝒟 by ℐ𝒟𝒿̂ =
In this study, we suggested unique ℐ𝒟 -beta (𝓎̂𝒿̂1 , 𝓎̂𝒿̂2 , 𝓎̂𝒿̂3 , 𝓎̂𝒿̂4 , … … … , 𝓎̂𝒿̂𝓃̂ ), 𝓎̂𝒿̂𝒾̂ ∈ {0,1} , (1 ≤ 𝒾̂ ≤
cryptosystem called isoidentity based isobeta cryptosystem 𝓃̂). (1)
(ℐℐℬ𝒞) . The safety of suggested isobeta cryptosystem on Step 2: The isocenter creates binary isoprime isonumbers 𝒫̂
isomathematics, generalized isodiscrete isologarithm problem and 𝒬̂ , numerate ℕ ̂ = 𝒫̂ ∗ 𝒬̂ . (2)
with individual discrete exponent and isointeger Thus, the isocenter elect an irrational isonumber 𝒹̂, 1 ≤ 𝒹̂ ≤
isofactorization. Our system does not need any shared initial 𝜑(ℕ ̂ ) satisfy gcd (𝒹̂ , 𝜑(ℕ ̂ )) = 1 for iso-Euler function
communications in all data transmission and every ̂ ̂ ̂ ̂ . Then isocenter circulates
𝜑(ℕ) = (𝒫 − 1)(𝒬 − 1) of ℕ
assumption excepting the complexity of the generalized ̂ ̂
(𝒹 , ℕ) as the openkey.
isodiscrete isologarithm problem. Therefore the suggested
system is a tangible model of an ℐ𝒟-based cryptosystem that Every customer can numerate the customer 𝒿̂′𝑠 extended ℐ𝒟
fulfills Shamir’s primal idea [2]. as ℰℐ𝒟𝒿̂ ;
̂
𝒹
ℰℐ𝒟𝒿̂ = (ℐ𝒟𝒿̂ ) (modℕ ̂ ) = (ξ̂𝒿̂1 , ξ̂𝒿̂2 , ξ̂𝒿̂3 , ξ̂𝒿̂4 , … … … , ξ̂𝒿̂𝓀̂ ),
II. RELEVANT MATHEMATICAL DEFINITIONS
̂ξ𝒿̂𝒾̂ ∈ {0,1}, (1 ≤ 𝒾̂ ≤ 𝓀̂) (3)
In this section, we resolve rapidly relevant mathematical
definitions utilizes to design ℐℐℬ𝒞 over isofields. Where 𝓀̂ = |ℕ ̂ | is a bits of ℕ ̂
Step 3: isocenter's conceal data: The isocenter elects an
A. Mathematical definition of ℐℱ𝒦
irrationa huge isoprime 𝒫̂ and 𝒬̂ , numerates ℕ ̂ = 𝒫̂ 𝒬̂ and
Isonumbers ξ̂ = ξ𝔗 ˆ is an element in the rings ℱ̂ = ⃗
createss 𝓃̂ −dimensional isovector 𝓍̂ over 𝒵𝜑(ℕ̂) such that ̂ ∗
̂ , 𝒹̂ , ℏ
The isocenter notifies all entity (ℕ ̂) as open data. Theorem-1: A 𝓃̂ − dimensional isovector 𝓍̂ ′ over 𝒵̂ℕ̂∗ can
Step 7: Every customer closedkey: customers 𝒿̂′s closedkey determine by (𝓃̂ + 1) customers'
𝒮̂𝒿̂ is numerate by inner isoproduct of 𝓍̂ and ℰℐ𝒟𝒿̂ as 𝒿̂, (1 ≤ 𝒿̂ ≤ 𝓃̂ + 1) which is identical to the genuine
𝒮̂𝒿̂ = 𝓍̂ ℰℐ𝒟𝒿̂ (mod𝜑(ℕ̂ )) = ∑1≤𝒾̂≤𝑛 𝓍̂ 𝒾̂ ξ̂𝒿̂𝒾̂ mod(𝜑(ℕ
̂ )) (12) isocenter's safe data.
Proof: The under-mentioned system of isolinear
IV. SCHEME INITIALIZATION FACTORS congruence's for (𝓃̂ + 1) customers'
𝒿̂, (1 ≤ 𝒿̂ ≤ 𝓃̂ + 1) conspire;
A. Isocenter conceal data:
ℰℐ𝒟1 𝓍̂1 𝒮̂1
For 𝓃̂ −dimensional isovector 𝓍̂ and isointeger 𝒸̂, the ℰℐ𝒟2 𝓍̂ 2 𝒮̂2
isocenter stock (𝓍̂ , 𝒸̂) as secrete data. ℰℐ𝒟3 𝓍̂ 3 = 𝒮̂3 (mod𝜑(ℕ ̂ )) (17)
B. Isocenter Public data: ⋮ ⋮ ⋮
For 𝓃̂ −dimensional isovector ℏ ̂ , huge isoprime isonumber [ℰℐ𝒟𝓃̂+1 ] [𝓍̂ 𝓃̂ ] [𝒮̂ ]
𝓃̂+1
̂ ̂
ℕ and arbitrary isointeger 𝒹, the isocenter stock (ℏ ̂ , 𝒹̂ ) as
̂, ℕ There exists an (𝓃̂ + 1) -dimensional isovector 𝓅̂ on the
a public data. isointeger isoring for every ℰℐ𝒟𝒿̂ is an 𝓃̂-dimensional binary
C. Customer i's secretes keys: (𝒮̂𝒿̂ ) isovector satisfy ∑1≤𝒿̂≤𝓃̂+1 𝓅̂𝒿̂ ℰℐ𝒟𝒿̂ = 0
D.Customer i's public data: ℐ𝒟𝑖 is a 𝓃̂ -dimensional We have, ∑1≤𝒿̂≤𝓃̂+1 𝓅̂𝒿̂ 𝒮̂𝒿̂ = 0(mod𝜑(ℕ ̂ )) (18)
isovector ∑1≤𝒿̂≤𝓃̂+1 𝓅̂𝒿̂ 𝒮̂𝒿̂ = ℋ ̂ 𝜑(ℕ ̂) (19)
V. PROCEDURE OF THE ISOBETA CRYPTOSYSTEM and consequently ∑1≤𝒿̂≤𝓃̂+1 𝓅̂𝒿̂ 𝒮𝒿̂ = ℋ 𝜑(ℕ) ̂ ̂ ̂ (20)
Thus (𝓃̂ + 1) customers ensure an isointeger isomultiple
To sends data 𝒟 to customer-1 then customer-2 follows ̂ ≠ 0.
of 𝜑(ℕ ̂ ), and compute the isofactorization of ℕ ̂ is ℋ
following procedure;
Therefore, the isocenter's safe data can be determine by (𝓃̂ +
A. Encryption process: 1) customers conspiracy.
̂
Customer-2, numerates 𝜁̂1 from corresponding public data ℏ Theorem-2: the isocenter's secret data 𝓍̂ determine by (𝓃̂ +
and by creates ℰℐ𝒟1 from ℐ𝒟1 ; 2) customers' 𝒿̂, (1 ≤ 𝒿̂ ≤ 𝓃̂ + 2) with exalted probability.
̂ Proof: The under-mentioned system of isolinear
𝜁̂1 = ∏ ℏ ̂ξ1𝒿̂ (modℕ
̂)
𝒿̂ congruence's for (𝓃̂ + 1) customers 𝒿̂, (1 ≤ 𝒿̂ ≤ 𝓃̂ + 1)
1≤𝒿̂≤𝑛 conspire;
ξ̂1𝒿̂ (modℕ
̂)
= ∏ (𝛼̂ 𝓍̂ 𝒿̂ ) ℰℐ𝒟1 𝓍̂1 𝒮̂1
1≤𝒿̂≤𝑛 ℰℐ𝒟2 𝓍̂ 2 𝒮̂2
̂ ̂ ℰℐ𝒟3 𝓍̂ 3 = 𝒮̂3 (mod𝜑(ℕ ̂ )) (21)
= 𝛼̂ Σ1≤𝒿̂≤𝑛 𝓍̂ 𝒿̂ ξ1𝒿̂ mod(𝜑(ℕ)) (modℕ
̂)
̂ ⋮ ⋮ ⋮
= 𝛼̂ 𝒮1 (modℕ ̂)
[ℰℐ𝒟𝓃̂+1 ] [𝓍̂ 𝓃̂ ] [𝒮̂ ]
(13) 𝓃̂+1
Suppose 𝒟(1 ≤ 𝒟 ≤ ℕ ̂ − 1) be a data = ℒ̂ 𝓍̂ (mod𝜑(ℕ ̂ )) (22)
To communicated data 𝒟(1 ≤ 𝒟 ≤ ℕ ̂ − 1) , Customer-2 There exist positive isointegers 𝓅̂𝒿̂ (1 ≤ 𝒿̂ ≤ 𝓃̂ + 1) satisfy
utilized 𝜁1 and elect an arbitrary isointeger 𝒹̂ satisfy gcd
̂ ℰℐ𝒟1 𝓍̂1 𝒮̂1 𝓅̂1
(𝒹̂ , 𝜑(ℕ
̂ )) = 1 to numerate ciphertext ℰℐ𝒟2 𝓍̂ 2 𝒮̂2 𝓅̂2
̂ 𝒹̂ ℰℐ𝒟3 𝓍̂ 3 = 𝒮̂3 − 𝓅̂3 𝜑(ℕ ̂) (23)
𝒞̂ = (𝒟𝛼̂ 𝒮1 ) (modℕ
̂ ).
⋮ ⋮ ⋮
⋮
(14) [ℰℐ𝒟𝓃̂+1 ] [𝓍̂ 𝓃̂+1 ] [𝒮̂ ] [𝓅̂𝓃̂+1 ]
𝓃̂+1
B. Decryption process: for the isomatrix ℒ̂ consist of 𝓃̂ linearly independent column
Customer-1 does the following procedure to retrieve the data isovectors over the isointeger isoring.
𝒟 from the ciphertext 𝒞̂ ; Thus equation (23) implies:
𝓍̂1
Customer-1 refers the ciphertext 𝒞̂ to customer-2 through an ℰℐ𝒟1 𝓅̂1
unsecured channel. After receiving ciphertext from ℰℐ𝒟2 𝓍̂ 2 𝓅̂2
Customer-1, He/She numerate ℰℐ𝒟3 𝓍̂ 3 = − ̂)
𝓅̂3 𝜑(ℕ (24)
̂ ̂ ⋮
ξ̂2 = 𝛼̂ φ(ℕ)−𝒮1 (modℕ) = 𝛼̂ −𝒮1 (modℕ) (15) ⋮ ⋮
̂
𝒹 ̂ 𝒹̂ [ℰℐ𝒟𝓃̂+1 ] 𝓍̂ 𝓃̂ [𝓅̂𝓃̂+1 ]
(ξ̂2 ) (modℕ) = (𝛼̂ −𝒮1 ) modℕ (16) [−1]
Utilizing his/her closedkey 𝒮̂1 retrieved customer-2's the data ̂
= ℒ 𝓍̂ ′ ′
(25)
𝒟 by eqn.(15) and (16) to numerate We get 𝓍̂ ′ ≠ (mod𝜑(ℕ ̂ )) for nonsingular isomatrix ℒ̂ ′
𝒹 ̂ 𝒸̂ 𝒸̂ over the isointeger isoring along with Indefeasible probability
̂ ) = (𝛼̂ −𝒮̂1𝒹̂ 𝒟 𝒹̂ 𝛼̂ 𝒮̂1𝒹̂ ) (modℕ
((ξ̂2 ) ∗ 𝒞̂ ) (modℕ ̂) if the isomatrix ℒ̂ in eqn. (22) consist of 𝓃̂ isolinearly
̂
̂ ) = 𝒟(modℕ
= 𝒟 𝒹 𝒸̂ (modℕ ̂) independent isocolumn isovectors over the isointeger isoring.
On the contrary, we get under-mentioned eqn. of isoinear
VI. SECURITY ANALYSIS congruence's:
The safety of suggested ℐℐℬ𝒞 design on the index problem in ℒ̂ ′ 𝓍̂ ′ = 0(mod𝜑(ℕ ̂ )) (26)
the isomultiplicative isocyclic isogroup 𝒵̂ℕ̂∗ , for isounber ℕ
̂= Above outcome invalidate for nonsingular isomatrix ℒ̂ ′
(𝓍̂ ′ = (mod𝜑(ℕ ̂ ))) over 𝒵̂ℕ̂∗ . Det (ℒ̂ ′ ) is isodivisible by
𝒫̂ ∗ 𝒬̂ and 𝜑(ℕ
̂ ) isoEuler function of ℕ
̂.
𝜑(ℕ ̂ ) for singular isomatrix ℒ̂ ′ (det ℒ̂ ′ = 0(mod𝜑(ℕ ̂ ))) by 512 customers conspiracy, whereas in our crypto
̂ ∗
over 𝒵ℕ̂ with exalted probability. If isomatrix ℒ represent̂ ′′ mechanisms it is compute by 1024 customers conspiracy.
as above by the other (𝓃̂ + 1) customers among (𝓃̂ + 2) Also, the running cost for encryption isokey creation in our
conspire and det (ℒ̂ ′′ ) is isodivisible by 𝜑(ℕ ̂ ) with exalted crypto mechanisms is half of the prime crypto mechanisms.
The isocenter's open data in the crypto mechanisms is about
probability satisfy 𝐺𝐶𝐷(𝑑𝑒𝑡 ℒ , 𝑑𝑒𝑡 ℒ ) = 𝒹̂ 𝜑(ℕ
̂ ′ ̂ ′′ ̂ ) for a
twice than the prime crypto mechanisms. Additionally
small positive isointeger 𝒹̂ . Thus we can numerate 𝜑(ℕ ̂) generalizations, every ℰℐ𝒟𝒿 is segmentation into 128-
capably and determine the isocenter's safe data is exactly the segments each four bits are feasible.
equal as Attack (Theorem1). Now, we explore the presentation of proposed mechanism
To improvement of security of the crypto mechanisms, the insofar as isonumber of isokeys, computational complexity
isocenter segmentation a 512-dimensional binary isovector and communication costs. The interval run to execute
𝒜̂ into 256 segments, each two bits, satisfy isomodular computation require per bit size of ̂𝔩 = |𝔩̂| as
𝒜̂ = (𝒶̂1 , 𝒶̂2 , 𝒶̂3 , … … 𝒶̂511 , 𝒶̂512 ) below;
= (seg1 , seg 2 , seg 3 , … … seg 511 , seg 512 )
Numerates ℏ ̂(𝒿̂; 𝒾̂𝓃̂) = 𝛼̂ a(𝒿̂;𝒾̂𝓃̂) (modℕ ̂) 1. isoexponentiation= 𝒯_𝑒𝑥𝑝
for every seg 𝒿̂ (1 ≤ 𝒿̂ ≤ 256; 𝒾̂, 𝓃̂ ∈ {0,1}) and circulates to 2. isomultiplication= 𝒯_𝑚𝑢𝑙
all customers. Also, the isocenter numerates every customer's
closed isokey as follows; 3. isosquare computation= 𝒯_𝑠𝑞𝑢
𝒮̂𝓃̂ = ∑1≤𝒿̂≤256 𝓍̂ (𝒿̂; seg 𝓃̂𝒿̂ )(mod𝜑(ℕ ̂ )) and circulates to all 4. isoinverse computation= 𝒯_𝑖𝑛𝑣
customers over an extremely protected channel. This is
precisely the identical as in the prime crypto mechanisms. In 5. isohash function= 𝒯_ℎ𝑎𝑠ℎ
the prime crypto mechanisms, isocenter's safe data is compute
REFERENCES
VII. CONCLUSION
[1] W. Diffie and M.E. Hellman, “New direction in Cryptography”, IEEE
In this study, the suggested crypto mechanism fulfills Trans.Inform.Theory, vol. 22, pp 644-654,1976.
Shamir's prime theories in a rigorous sense. This variant of
[2] Shamir, “Identity-based cryptosystem and signature scheme,”
crypto mechanisms absolutely delivers novel crypto Advances in Cryptology: Proceedings of Crypto’(Lecture Notes in
mechanisms with a more and advanced level of security Computer Science 196). Berlin, West Germany: Springer-Verlag,
created on formulation of ℐℱ𝒦 𝒢𝐼𝒟ℒ𝒫 , and ℐℐℱ𝒫.The vol. 84, pp. 47-53, 1985.
offered crypto mechanisms also involves minimal [3] E. Okamoto, “Key Distribution Systems Based on Identification
processes in encryption and decryption algorithms and Information,” In Advances in Cryptology, Crypto 1987, pp. 194-202.
consequently makes it is much effective. The present LNCS Vol. 293/1988.
crypto mechanism delivers the extraordinary outcome from
[4] K. Koyama, and O. Kazuo, “Identity-based Conference Key
the safety point of view, as we aspect the issue of Distribution Systems” CRYPTO (1987).
simplifying 𝒢𝐼𝒟ℒ𝒫 and ℐℐℱ𝒫 together in the
isomultiplicative isogroup of finite isofields as matched to [5] S. Tsujii, and T. Itoh, “An ID-based cryptosystem based on the
discrete logarithm problem” IEEE Jounral on selected areas in
the other crypto mechanism. One should break 𝒢𝐼𝒟ℒ𝒫 communications, vol. 7, pp. 467-473, 1989.
and ℐℐℱ𝒫 together to break our crypto mechanisms as we
aspect the trouble of simplifying the classical 𝒢𝐼𝒟ℒ𝒫 in [6] U. M. Maurer, Y. Yacobi, “Non-interactive public key cryptography”
the shared isogroups. Cryptology—Eurocrypt’91, New York: Springer, pp. 498–507.1991.
[10] C. Meshram, “Modified ID-Based Public key Cryptosystem using [17] M. S. Dani, A. Meshram and C. Meshram., “Santilli’sisofields
Double Discrete Logarithm Problem” International Journal of firstkind based key exchange protocol,” Journal of Physics:
Advanced Computer Science and Applications,Vol. 1, No.6, pp.30- Conference Series, 1913 (1), 012095, 2021. doi:10.1088/1742-
34, 2010 6596/1913/1/012095
[11] C. Meshram, “A Cryptosystem based on Double Generalized [18] A. B. Thatere, A. Meshram, C. Meshram, N. M. Wazalwar, "SIFK
Discrete Logarithm Problem” Int. J. Contemp. Math. Sciences, Vol. based Isobeta Cryptosystem," International Journal of Engineering
6, no. 6, 285 -297,2011. Trends and Technology, Vol. 69.7, pp. 76-79, 2021. doi:
10.14445/22315381/IJETT-V69I7P211
[12] C. Meshram and S. A. Meshram, "An identity based beta
cryptosystem," 2011 7th International Conference on Information [19] H. K. Andi, "Estimating the Role of Blockchain, Deep Learning and
Assurance and Security (IAS), pp. 298-303, 2011. doi: Cryptography algorithms in Cloud Security." Journal of Trends in
10.1109/ISIAS.2011.6122836. Computer Science and Smart Technology, vol. 3, no. 4, pp. 305-313,
2021. doi:10.36548/jtcsst.2021.4.006.
[13] R. Chatterjee, R. Chakraborty, and J. K. Mondal. "Design of
Lightweight Cryptographic Model for End-to-End Encryption in IoT [20] M. S. Dani, A. Meshram, R. Pohane, and R. R. Meshram, “Isonumber
Domain." IRO Journal on Sustainable Wireless Systems, Vol. 1, no. based Iso-Key Interchange Protocol for Network Communication,”
4, pp. 215-224, 2019. doi: 10.36548/jsws.2019.4.002. International Journal of Computer Science and Network Security,
Vol. 22 No. 2 pp. 209-213, 2022.
[14] C. Meshram, M. S. Obaidat and A. Meshram, "New efficient http://paper.ijcsns.org/07_book/202202/20220227.pdf
QERPKC based on partial discrete logarithm problem," 2020
International Conference on Computer, Information and [21] A. Meshram, R. Pohane and R. Thakre, "Developing a framework of
Telecommunication Systems (CITS), Hangzhou, China, 2020, pp. 1- beta cryptosystem based on Santilli's isofields second-kind," 2022
5, doi: 10.1109/CITS49457.2020.9232533. International Conference for Advancement in Technology
(ICONAT), 2022, pp. 1-4, doi:
[15] A. Meshram, C. Meshram, S. D. Bagde and R. R. Meshram., “RIPIC 10.1109/ICONAT53423.2022.9726000.
based key exchange protocol,” Advances in Mathematics: Scientific
Journal, 9(12) (2020) 11169–11177. doi:10.37418/amsj.9.12.97 [22] N. Bhosale, A. Meshram, R. Pohane, M. Adak, D. Bawane and K. T.
V. Reddy, “Design of IsoQER Cryptosystem using IPDLP,” IEEE
[16] M. S. Dani, A. Meshram, C. Meshram, and N. M. Wazalwar., “An International Conference on Emerging Trends in Engineering and
efficient key exchange scheme using santilli’sisofields second-kind Medical Sciences (ICETEMS), 18-19 November 2022 (accepted).
for secure communication,” Advances in Mathematics: Scientific
Journal, Vol. 10, No. 2, pp. 1131–1139, 2021. doi:
10.37418/amsj.10.2.39
Abstract—Cloud computing performs a significant part in sources (like software) with on-demand, omnipresent, fast, and
sharing resources and data with other devices via data system access [2]. The aids of CC comprises affordability,
outsourcing. The data collaboration services, as a potential service manageability, and scalability. Furthermore, cloud stowage has
given by the cloud service provider (CSP), is to assist the structure features on demand, leasing pluralism, economy, ease,
consistency and availability of the shared data amongst users. At reliability, versatility, and universality. CC security difficulties
the time of sharing resources, it is a complicated process for would hold up its extensive acceptance [3]. Fig. 1 illustrates the
providing secure writing and access control operations. This study structure of key generation system for CC platform.
develops a Privacy Preserving Encryption with Optimal Key
Generation Technique (PPE-OKGT) for CC environment. The
presented PPE-OKGT technique secures the data prior to storing
in the cloud sever via encryption process. For accomplishing this,
the presented PPE-OKGT technique employs data encryption
technology to secure the input data into a hidden format. Besides,
in order to improve secrecy, the presented PPE-OKGT technique
designs a chaotic search and rescue optimization (CSRO)
algorithm for optimal generation of keys. The promising
performance of the PPE-OKGT technique can be verified using a
set of experimentations. A comprehensive comparison study
reported the enhancements of the PPE-OKGT technique over
other models.
I. INTRODUCTION
The utility of dispersed computing systems and technologies
has progressed intensely in current years. A large amount of Fig. 1. Key generation system for cloud computing
dispersed network techniques, infrastructures, and architectures,
like network, Pervasive, Autonomic, cloud, and so on, were The sharing of CC services stances the trouble of
created by this rise [1]. Cloud computing (CC) is a computing maintaining such facilities safe and protected in illogicality of
network, stereotypically connected through the Internet, which unauthorised admission or usage [4, 5]. Typically, the statistics
cut a dispersed quantity of facilities obtainable to access the subcontracted to the cloud look this test. Network security is ace
operator wants. The secluded book NIST's idea of CC was an of CC key security subjects, which relate to internal and external
outline to provide a shared set of configurable computing occurrences [6]. Cryptographic methods were indispensable to
endure safe message of data. Recently, data security was II. PROPOSED MODEL
increasingly concluded a considerable one in the cumulative This study developed a PPE-OKGT technique to assure
quantity of intimate imagery that is interconnected over the security in the CC environment. The presented PPE-OKGT
Cyberspace of community or ended 3rd gathering transmission technique secures the data prior to storing in the cloud sever via
[7]. In this view, varied systems are optional as encoding was encryption process.
hypothetical is the straight and greatest fruitful development to
safeguarding private data. Data decryption and encryption A. Encryption Process
convert the best method for receiving data confidentiality and In this work, the presented PPE-OKGT technique employs
propriety [8, 9]. Finally, there is a leading test as susceptibilities elliptic curve cryptography (ECC) based ElGamal encryption
and hazards are rising by the improvement of loans. Presently, technique to secure the input data into a hidden format. The
typical procedures were enormously raised for provided that ECC-related ElGamal encryption with distinct variables and
safety but in cruel times its principals to high cost and greater steps used are as follows [16]. The preservative homomorphic
use of computing sources [10]. Homomorphic systems were the method grasps by following Eq. (1),
astonishing sorts of systems on the excellent of varied data. 𝐸(𝑚1 ) + 𝐸(𝑚2 ) = 𝐸(𝑚1 + 𝑚2 ) (1)
Song et al. [11] projected a Cloud Secure Storage Where +symbol was envisioned for the preservative
Mechanism called CSSM. To evade data breaches at the storage homomorphic and public key was E. On ECC it is expected that
coat, CSSM united data distributed and dispersion storage for preservative homomorphic encoding. In accordance with the
realizing distributed, encoded, and chucked storage. Moreover, elliptic curve (EC) algebraic structure on limited areas, ECC
CSSM accepted a hierarchical organization method and related ElGamal has been explained. The finite arenas remained
compiled user keywords with secret sharing to avert into two kinds like binary and prime domains 2𝑛 . Throughout
cryptanalytic resources leak. The authors in [12] generate a this present examination, ECs ended major domains stayed
Cloud related Software Defined Network (SDN), it has 100 - scrutinized. The superior class of EC established in Eq. (2) used
mobile Nodes (IOT gadgets), open flow switch and BC related in EC real numbers as,
controllers, investigator, cloud server, and Verification Server. 𝑦 2 = 𝑥 3 + 𝑎𝑥 + 𝑏 (2)
Originally every user can be listed with AS and gain their secret 𝐸𝑟 (𝑎, 𝑏) mentions to the ensuing curve where modulus was
key from AS related to the Harmony Search Optimization 𝑟, the changed co-efficient of formulation expected that a and 𝑏.
(HSO). In the nodes, the packages were encoded through Elliptic The cost of 𝑥 varieties from 0 to 𝑟 and on the curve generally
Curve Integrated Encryption Scheme (ECIES) procedure and not every point. Even with lesser bit size also the ECC
allocated to cloud server. predictable a similar security level by processing overhead
The authors in [13] advanced a chain-related BDNA for decrease if capable of homomorphic and RSA methods.
enhancing security further also with impingement handling. It is
chaining-based BDNA and BDNA method to manage the issue B. Key Generation Process
of impingement with keys. The limits measured are In order to improve secrecy, the presented PPE-OKGT
implementation period in key creation, dependability, number of technique designed the CSRO algorithm for optimal generation
impingements. BDNA depends on binary encoding and to of keys. The location of the lost human is the key stimulation of
improve the safety further, excess 3 codes will be compounded the search and rescue optimization technique for optimized
within the projected machine. The authors in [14] offer well- problems, and the consequence of clues originate in these
organized Identity-based cryptography (IBC) structure for positions determines the solution cost. Here, the better approach
secure cloud storage, called Secure Cloud Storage reveals the best location with further hints [17]. Individual
System (SCSS), which chains dispersed key administration and search for better decisions finished the searching technique
encryption systems and provisions for many PKGs. Throughout while leaving few clues. Nevertheless, the search location for the
forensic soundings, the legal formations use the multiple PKG individual is reserved in a situation matrixes (matrix 𝑋) with the
system for data access, while a clarification locking mechanism corresponding size of memory matrixes, and the left clues are
stops a single authority to access user data owing to trust stored in a memory matrix (matrix 𝑀), 𝑛 × 𝑑, demonstrating the
distribution. The authors in [15] suggest an enhanced identity- problem variable and 𝑛 defines the individual quantity in the
related encryption method where a secure key is made by means group.
of part of an individuality bit string in to evade leakage of users' 𝑋1,1 … 𝑋1,𝑑
identity even if an opponent or assailant deciphers the key or ⋮ ⋱ ⋮
encoded data. 𝑋𝑛,𝑙 … 𝑋𝑛,𝑑
This study develops a Privacy Preserving Encryption with 𝑋
𝐶=[ ]= (3)
Optimal Key Generation Technique (PPE-OKGT) for CC 𝑀 𝑀1,1 ⋯ 𝑀1,𝑑
environment. The presented PPE-OKGT technique secures the ⋮ ⋱ ⋮
data prior to storing in the cloud sever via encryption process. [ 𝑀𝑛,𝑙 ⋯ 𝑀𝑛,𝑑 ]
For accomplishing this, the presented PPE-OKGT technique In Eq. (3), considering arbitrary clues among the attained
employs data encryption technology to secure the input data into clues, the search path is acquired as:
a hidden format. Besides, in order to improve secrecy, the 𝑠𝑑𝑖 = (𝑋𝑗 − 𝐶𝑘 ), 𝑘 ≠ 𝑖 (4)
presented PPE-OKGT technique designs a chaotic search and In Eq. (4), 𝑘 represents a random number amongst 1 and
rescue optimization (CSRO) algorithm for optimal generation of 2𝑁, 𝑋𝑖 and 𝐶𝑘 correspondingly determines the location of 𝑖 𝑡ℎ
keys. The promising performance of the PPE-OKGT technique human and 𝑘 𝑡ℎ clue. It is noted that 𝑖 = 𝑘, 𝐶𝑖 equals 𝑋𝑖 , 𝑘 ≠
can be verified using a set of experimentations. 𝑖. To prevent repeated location, the variable of 𝑋𝑖 cannot be
TABLE II
TABLE I DCT ANALYSIS OF PPE-OKGT SYSTEM WITH OTHER
ECT ANALYSIS OF PPE-OKGT SYSTEM WITH OTHER APPROACHES UNDER DISTINCT FILE SIZES
APPROACHES UNDER DISTINCT FILE SIZES
Decryption - Computation Time (sec)
Encryption - Computation Time (sec)
File Size (GB) PPE-OKGT BH-WABE HABE
File Size (GB) PPE-OKGT BH-WABE HABE
1 84 118 127
1 88 119 132
2 179 228 252 2 158 221 269
3 289 339 363 3 487 603 629
Fig. 3. ECT analysis of PPE-OKGT system under distinct file Fig. 4. DCT analysis of PPE-OKGT system under distinct file
sizes sizes
Table 1 and Fig. 3 report a comparative encryption- Table 3 and Fig. 5 report a comparative user key generation
computation time (ECT) assessment of the PPE-OKGT model. time (UKGT) assessment of the PPE-OKGT model. The
The experimental outcomes represented that the PPE-OKGT experimental outcomes represented that the PPE-OKGT model
model has reached minimal ECT values under all file sizes. For has reached minimal UKGT values under all file sizes. For
instance, with file size of 1GB, the PPE-OKGT model has example, with weighted attributes count (WAC) of 10, the PPE-
attained reduced ECT of 88s while the BH-WABE and HABE OKGT model has gained reduced UKGT of 0.54s while the BH-
models have obtained increased ECT values of 119s and 132s WABE and HABE models have obtained increased UKGT
respectively. Similarly, with file size of 2GB, the PPE-OKGT values of 0.95s and 1.52s correspondingly. Similarly, with WAC
approach has reached reduced ECT of 179s while the BH- of 30, the PPE-OKGT model has attained reduced UKGT of
WABE and HABE models have obtained increased ECT values 1.55s while the BH-WABE and HABE models have obtained
of 228s and 252s correspondingly. Furthermore, with file size of increased UKGT values of 2.33s and 3.29s correspondingly.
3GB, the PPE-OKGT approach has attained reduced ECT of Moreover, with WAC of 50, the PPE-OKGT model has attained
289s while the BH-WABE and HABE methods have gained reduced UKGT of 2.05s while the BH-WABE and HABE
increased ECT values of 339s and 363s correspondingly. models have attained increased UKGT values of 3.46s and 5.02s
Table 2 and Fig. 4 report a comparative decryption- correspondingly.
computation time (DCT) assessment of the PPE-OKGT model.
The experimental outcomes represented that the PPE-OKGT TABLE III
model has reached minimal DCT values under all file sizes. For UKGT ANALYSIS OF PPE-OKGT SYSTEM WITH OTHER
example, with file size of 1GB, the PPE-OKGT model has APPROACHES UNDER WEIGHTED ATTRIBUTES COUNT
reached reduced DCT of 84s while the BH-WABE and HABE User Key Generation Time (sec)
methods have obtained increased DCT values of 118s and 127s
Weighted Attributes PPE- BH-
correspondingly. Likewise, with file size of 2GB, the PPE- HABE
Count OKGT WABE
OKGT model has attained reduced DCT of 158s while the BH-
WABE and HABE models have attained increased DCT values 10 0.54 0.95 1.52
of 221s and 269s correspondingly. In addition, with file size of 20 0.90 1.55 2.55
3GB, the PPE-OKGT model has reached reduced DCT of 487s 30 1.55 2.33 3.29
while the BH-WABE and HABE models have obtained 40 1.71 2.91 3.98
increased DCT values of 603s and 629s correspondingly. 50 2.05 3.46 5.02
[13] Attri, J. and Kaur, P., 2021. Enhancing Cloud Security Using Secured
Binary-DNA Approach with Impingement Resolution and Complex Key
Generation. In Sustainable Communication Networks and
Application (pp. 159-171). Springer, Singapore.
[14] Unal, D., Al-Ali, A., Catak, F.O. and Hammoudeh, M., 2021. A secure
and efficient Internet of Things cloud encryption scheme with forensics
investigation compatibility based on identity-based encryption. Future
Generation Computer Systems, 125, pp.433-445.
[15] Gupta, R.K., Almuzaini, K.K., Pateriya, R.K., Shah, K., Shukla, P.K. and
Akwafo, R., 2022. An improved secure key generation using enhanced
identity-based encryption for cloud computing in large-scale 5G. Wireless
Communications and Mobile Computing, 2022.
[16] Chowdhary, C.L., Patel, P.V., Kathrotia, K.J., Attique, M., Perumal, K.
and Ijaz, M.F., 2020. Analytical study of hybrid techniques for image
encryption and decryption. Sensors, 20(18), p.5162.
[17] Anuradha, D., Subramani, N., Khalaf, O.I., Alotaibi, Y., Alghamdi, S. and
Rajagopal, M., 2022. Chaotic search-and-rescue-optimization-based
multi-hop data transmission protocol for underwater wireless sensor
networks. Sensors, 22(8), p.2867.
I. INTRODUCTION
Cloud computing (CC) is extensively used in numerous
areas of analytics, notably document sharing, real-time
applications, etc messaging. Cloud computing is a way of
providing services and it is based on the resources which are
being allocated on demand. Innovation that is provided by
the cloud is in various areas like technical as well as financial
opportunities which now have changed the look and feel of
technology and how these businesses can be operated. It Fig. 1 Cloud Computing Model
provides us the computing resources as services through the SaaS stands for "software as a service," and then it refers
Internet. In recent generations, significant CC developments to programs which are housed on such a remote server &
have developed, particularly considerable advancements. provided well over the Internet, such as digital productivity
Because of the usefulness of its operations, which might software and email clients. Rather than buying additional
eventually give efficiency on multiple levels, CC is technology, users can subscribe to web-based software
becoming ubiquitous within both business and government. services to meet their business's demands for a nominal fee.
Safety of the service performance, on either hand, is indeed a Consumers are reliant on suppliers for security. Users do not
main consideration both for the virtual servers and software need particular hardware or software to use SaaS, but they do
solution [1]. Cloud computing protection is an essential need a constant Internet connection.
subcategory of information security that provides a
significant barrier to mainstream advent of cloud technology The PaaS layer, which sits on top of SaaS, enables
[2]. Even though CC supplement on either an Online designers to quickly build & construct Software solutions
connection, participants are prone to a range of attack vectors before deploying those to the PaaS surface. It fully endorses
as well as other security concerns, that can consequences in the software development process and is a cost-effective
potentially devastating consequences like as security alternative for programmers because it focuses attention on
designing and executing programs rather than managing the will be regarded as having been disclosed if an attacker can
core infrastructure. deduce the material's genuine meaning at a high level.
Infrastructure-as-a-service (IaaS), the bottom level, IaaS, One of the most dangerous hazards is a pollution assault,
supplies the underlying technology for something like the which puts data integrity at risk. When a bad individual has
levels just above. Network elements, computers, software access to one or more storage resources, they can
platforms, plus memory were included in IaaS. It enables contaminate the data or a section of it to make it
users to view all information without having to buy any unavailable.
equipment. IaaS is also a cost-effective and speedier way to A storm assault using the User Datagram Protocol, which
run workloads without having to buy or manage underlying leads to two individuals simultaneously, now let us assume
infrastructure; nevertheless, because it relies on Internet A and B. An assailant would send packets to A using a
access, availability is a great concern [5]. fictitious network Address which correlates to B.
Subsequently, assuming B become the genuine originator, A
This next paragraph depicts the fundamental CC
properties. will reply to B, who then reply to A, till the communication
is severed. [8]
II. CLOUD COMPUTING CHARACTERISTICS SYN flooding attack: The above exploit takes advantage of
Cloud technology seems to have the essential the Transmission Control Protocol's (TCP) connection-
distinguishing features. oriented feature, which employs a three-way preamble to
create a relationship for transmitting information across
a) Self-service on request: Each customer could get telecommunication sites.
computing capability like data centers, application The incursion and the Slowloris strategy are similar in in
consumption, including system time [6] through it on self- which both cause diminished, busy traffic. By sending
service. Such solutions are adaptable, and customers imperfect requests without even a revocation systematic
shouldn't need to request aid from telecom operators because fashion which indicates the proposed plan is finished, the
they can simply obtain the essential facilities to customers attacker consumes the all-customer’s opportunity possible
and then do the appropriate actions independently and at any
and forces the network adapter to just queue for such
time.
revocation systematic fashion that accomplishes every
b) Accessibility to a large network Broad network access implementation, that could never be published [9].
(BNA) alludes to the different types of cloud features and Assault on the host by a guest once the attacker discovered a
functionality that seem to be readily available across the vulnerability of virtualization layer, as well as inappropriate
internet via multiplatform (e.g., computers, smartphones host and guest setups.
[7]).These digital competences were typically housed in a
company's cloud infrastructure and run behind the same IV. CLOUD DATA SECURITY MECHANISMS
firewall to give workers more alternatives for accessing the The Generative Data Preservation Rule (GDPR), the e-
cloud - based Services from numerous devices.
Privacy Act, and the impending Cyberspace Legislation all
c) Pooling of resources: Computing information is raise the level for reliable production as well as tracking of
shared utilizing a multi-tenant paradigm in resource pooling, essential information within. The core of privacy act is the
supporting a large number of customers. This technology requirement of disclosure of any current data related to an
enables consumers to change their levels of service at any entity as well as the right to have those records deleted upon
moment, without being constrained by either physical or request.
virtual resources. Rivest-Shamir-Adleman (RSA)-based schemes have an
d) Elasticity that is quick is a crucial principle of CC excessive amount of processing complexity in [10]. The
wherein the functionality are proficiently supplied in just batches signing effectiveness in the huge data context is
about any amount and at any time supporting accelerated poor, as well as the Boneh-Lynn-Shacham (BLS) biometrics
amplification in response to consumer requests such as those technique requires the adoption of a particular hashing
for additional cloud space; in rapid elasticity, many types of algorithm.
services can be provided to users at various scales without The general purpose remedies, which combine four
interruption. technological advancements: (1) careful when dealing
e) Service that is measured Cloud systems continuously package techniques of data adaptability as well as
monitor and control resources in measured service, and the manoeuvrability, (2) personal information responsive
results (Eg: billing, resource utilization) which are given to assistance as well as users to access resources, (3) extensive
users in a transparent manner. data safeguard policy enforcement, and (4) vibrant
information security risk assessment methodology, make it
III. SECURITY THREATS IN CLOUD COMPUTING easier to provide and use apps and systems across the
Furthermore, one of the biggest difficulties with cloud computer science path.
computing is data storage and security. In [11] for the purpose of producing the best privacy-
An inference attack is a data mining strategy that uses data preserving coefficients, a suggested Conditional
analysis to covertly learn information about a database or Autoregressive Value at Risk (CAViaR)-based Bird Swarm
any other topic without having access to it directly. The Algorithm (CAViaR-based BSA) pairing of BSA and
integrity of an entire database may be jeopardized by an CAViaR is used. The objective function was recently created
inferences attacker. Additionally, this sensitive information with privacy and utility in mind.
Prior improving information transportation, replication, & [12]. The CTA's early version contains the identification
evaluation, presents an effective approach that categorise as service, which enables users to sign across many cloud
well as safeguard mass data. Categorizing the sample into vendors, and the conformance assessment provider, which
two subgroups, public—according to the danger intensity enables users to compare the safety credentials of various
scale of its elements helps evaluate the requirement of cloud vendors.
safeguarding big data migration.
V. CLOUD FIREWALL BASED SECURITY
In the 2018 Generative Data Preservation Rule (GDPR), of
the European Union is created to discourage the practise of Wherein customized kernels and the Debian Macos are
being used to create virtualization technology. A firewalls is
revealing personal information for just a reason which data
indeed a mechanism created to stop network threats. Data
controllers are unaware of. The essential GDPR provisions transmission is filtered by firewall, which might be piece of
pertaining to the delivery, utilisation, and upkeep of internet software. Using Proxmox VE Firewall, infrastructure may be
services and technology are summarised. secured. It enables establishing policies for virtual servers or
For the purpose of safeguarding Big Data in a cloud for certain guests inside a community. You can set up your
computing system, author suggested the Meta Cloud Data firewall rules for all the hosts inside a cluster, and also define
Storage System. That architecture assures that large data is rules for containers and virtual machines. Features like
collected effectively in a virtualized environment and also security groups, firewall macros, IP sets, and aliases help to
that stronger economic discoveries are obtained. make the task easier.
In [13] there are two different types of intrusion detection
TABLE I. COMPARATIVE ANALYSIS OF DATA SECURITY
MECHANISMS systems: network intrusion detection systems (NIDS) and
host-based intrusion detection systems (HIDS)
Author/yea Algorithm Advantage Disadvantage (NIDS).Additionally, the IDS secondary and primary data is
r used
evaluated and software application to the firewall's protection
Knode et CloudTrust More Less accuracy plan to emphasise the significance of the stringent barrier.
al., [2011] Protocol efficiency
(CTP) Through creating a machine code as well as a phase
Ghosh et Cloud Trust More speed More database, authors present a stateful firewall founded on the
al., [2011] Authority computational
customizable data package. When compared to conventional
(CTA) time
Hababeh et Integrated Balance energy High complexity firewalls, this approach will capable of extracting, analyse,
al., [2018] methodology distribution of of proposed then preserve the complete routing of data frames in the data
all nodes solution layer.
Mitrou et European Prolongs Memory
al., [2018] Union General network requirement is The [14] describes the development of a Remote Protocol
Data lifetime and more Investigation firewall (RLPM) to thwart targeted activity by
Protection improves verifying the content pattern of data packet. It uses a
Regulation throughput combination of parallel fast pattern matching (PFMM) and
(GDPR)
reinforcement learning (RL) around the same time, so it
Khattak et General Data Able to Extremely
al., [2019] Protection understand the inefficient for quickly accumulates to something like an ideal outcome. The
Regulation region surface large volume data, surroundings are quickly learned that use the RL technique,
(GDPR) current no confidentiality as well as the identity of the payload is processed
Zhu et al., RSA Enable Complexity is concurrently. RL which is based on the interaction model
[2019] shortening the more between the environment and the agent, instructs the agent
procedure of
the information
for learning the optimal action strategy through feedback
process from the environment corresponding to the agent’s action.
Ayed et al., FogProtect Able to handle Prone to
[2020] the outliers and eavesdropping
Researchers construct a concurrent firewall program
computational called CPFirewall as well as concentrate on FWaaS (Firewall
process as a Service) throughout. These firewall capabilities in
Gajmal et Conditional The design is Integrity is CPFirewall were abstracted, allowing many customers to
al., [2021] Autoregressiv flexible compromised lease fake firewalls to create its individual concurrent
e Value at risk firewalls. Some problems should be addressed for this. For
(CAViaR)-
based Bird
create a regulation abnormality collection enabling
swarm identifying rule anomalies, researchers use a regulation
algorithm technique.
A fresh M/Geo/1 empirical equation is built to give
Public-Key and Private-Key make up RSA. Public-Key performance measurement assessment of such cloud firewall.
is accessible to all users in the public cloud, while the Cloud attackers can use the approach to retrieve relevant
Private-Key is only accessible to individual that initially system metrics, including demand latency, and estimate how
possesses the information. As a result, the CSP (Cloud several assets were required to ensure quality of service
Service Provider) process to reach, and the consumer or (QoS). Many reports have got to the exploitation of QoS
buyer of the cloud performs decryption. metrics, and relatively not much equipment supports the
investigation and remark of QoS metrics of Cloud programs.
To include a central location for establishing and maintaining
the confidentiality solutions from various suppliers, RSA The connection split Xelin Internet Backbone Switch
introduced the Trust Authority (CTA) for Cloud just like a (XIPSwitch), which would be autonomous of different cloud
storage service in cloud, named Trust as a Service (TaaS) computing concepts, is just the implementation framework of
such a technique that we present last. The approach also as well as the cloud administrators even though the fog
could address the issue of decentralized cloud system distant service is established beyond registration process.
terminals' firewall penetration in wlans. Establish a basic strategy in [18] that each user has their
The AMRES (Academic Network of Serbia) system own key code that is used to secure the convergence keys
utilizes [15] tools in order to evenly send a significant and send it towards the internet. Unfortunately, a basic
volume of internet traffic to the centralized cloud network access control system like this produces a huge key space as
device. Since some of the techniques can only be used with the number of consumers rises and necessitates that users
Cisco hardware, additional techniques which rely on gateway guard the secret key zealously. In order to achieve this, they
capabilities to route website traffic can be used on the suggest Dekey, a novel structure wherein customers
hardware from any company or even with mainstream effectively divide the convergence information shares across
applications. various servers rather than managing any credentials on
their own.
The following table briefs out an analysis of Cloud
firewall. Here metrics energy consumption defines power Blom's key technique using altered proactive secret sharing
used, throughput defines output, latency is the delay caused is found on [19]. Regarding power systems, particularly the
between source and destination packet arrival time, and computationally intensive secrecy material update can
packet delivery ratio means the ratio of packets delivered to delegated to such a remote server, as well as the unmodified
the total number of generated packets. paired credentials following key physical renewal process
significantly reduce the resources needed.
TABLE II. COMPARATIVE ANALYSIS ON FIREWALL METHODS Memory deduplication will differentiate by decreasing page
Author/ye Method Ene Thr Pack Latency
duplication to supply the demands for memory components;
ar rgy ough et memory fragment allotments memory Resources between
cons put Deliv every string/VMs to minimize impedance for improving
um ery execution [20].
ptio Rati
n o(PD TABLE III. COMPARATIVE ANALYSIS ON KEY MANAGEMENT
R) METHODS
Long et al., Xelin Internet Low High Mo Low
[2013] Protocol Switch Author/y Method Energy Through Encrypt Decrypt
dera ear consump put ion time ion time
(XIPSwitch)
te tion
Ivanovic et AMRES Mod high Lo Modera Graf et Flexible high high low moderat
al., [2013] (Academic erat al., key e
w te [2012]
Network of Serbia) e manageme
network nt
Liu et al., Clusterized Hig Low high High Jang- Portable low moderate moderat low
[2014] framework of h Jaccard key e
cloud firewall et al., manageme
Wang et CPFirewall (Cloud Mod High [2012] nt
low High
al., [2015] Parallel Firewall erat Kao et uCloud, a moderate low high moderat
System). e al., user- e
Dezhabad Dynamic auto- Low Mod [2013] centric key
high High
et al., scalability firewall erate manageme
[2018] nt scheme
Toumi et Hybrid intrusion Mod Low Hig Low Li, et al., Dekey moderate high moderat high
al., [2019] detection system erat [2013] e
h
(Hy-IDS) e Zhou et Blom’s high moderate low high
Li et al., Stateful firewall Mod Mod Hig Low al., symmetric
[2020] erat erate [2015] key
h mechanis
e
Praise et Deep Packet Low High Hig Low m
al.,[2020] Inspection based Adee et Four-step low high low high
h al.,
firewall (RLPM) data
[2022] security
VI. KEY MANAGEMENT MECHANISMS IN CLOUD model
Chatterje Secure and high low moderat high
Secure as well as lightweight multi-factor authentication e et al., lightweigh e
technique for the various cross-platform devices [2022] t multi-
(SELAMAT) was proven to be vulnerable to replication, factor
signal interception, and internal assault upon fog servers in authenticat
[16]. The result is an enhanced, inexpensive, highly security ion
systems strategy for IoT connectivity focused towards scheme for
cross-
cloud. platform
In [17], a lightweight and anonymous mutual authentication IoT
(LAMAS) scheme on basis of cryptography is suggested for systems
protecting fog computing. Without a need for re-registration (SELAMA
or additional calculation, this suggested technique is T)
sufficient to facilitate verification amongst cloud customers Hamada Lightweig low low high low
et al., ht [6] Rashid, A., & Chaturvedi, A,”Cloud computing characteristics and
[2022] Anonymo services: a brief review”, International Journal of Computer
us Mutual Sciences and Engineering, 7(2), 421-426, 2019.
Authentica [7] Samy, G. N., Maarop, N., Abdullah, M. S., Perumal, S., Albakri, S.
tion H., Shanmugam, B., & Jeremiah, P., “Digital forensic investigation
Scheme challenges based on cloud computing characteristics”, International
(LAMAS) Journal of Engineering and Technology (UAE), 2018.
[8] B. B. Gupta And O. P. Badve, "Taxonomy Of DOS And DDOS
VII. RESEARCH PROBLEM Attacks And Desirable Defense Mechanism In A Cloud Computing
Environment," Security And Communication Networks, Vol. 28, No.
Whilst using cloud technology, both customers and 12, 2017
providers face several security concerns and issues. Such [9] O. Yevsieieva And S. M. Helalat, "Analysis Of The Impact Of The
issues may make it harder for customers as well as suppliers Slow Http Dos And Ddos Attacks On The Cloud Environment”,4th
International Scientific-Practical Conference Problems Of
to believe one another. Additionally, when security events Infocommunications. Science And Technology (Pic S&T), Kharkov,
increase, legitimate problems about using online grow. On Ukraine, 2017.
the one hand, service providers must have the capacity to [10] Zhu, H., Yuan, Y., Chen, Y., Zha, Y., Xi, W., Jia, B., & Xin, Y. “A
comprehend and mitigate security risks and issues secure and efficient data integrity verification scheme for cloud-IoT
based on short signature”. IEEE Access, 7, 90036-90044, 2019.
beforehand, throughout, and then after things arise. As a
[11] Gajmal, Y. M., & Udayakumar, R.,”Privacy and Utility-Assisted Data
result, a risk management plan was suggested from the Protection Strategy for Secure Data Sharing and Retrieval in Cloud
standpoint of the cloud service providers to handle a few System”, Information Security Journal: A Global Perspective, 1-15,
vulnerabilities. The primary objectives had to boost the 2021.
adoption of cloud computing across the board and to foster [12] Ghosh A, Arce I,”RSA establishes cloud trust authority to accelerate
more trust amongst customers and cloud providers. cloud adoption”,RSA.
http://www.rsa.com/press_release.aspx?id=11320,2011.
VIII. CONCLUSION [13] Ma, X., Fu, X., Luo, B., Du, X., & Guizani, M., “A design of firewall
based on feedback of intrusion detection system in cloud
The emerging concept of cloud computing provides on- environment”,In 2019 IEEE Global Communications Conference
demand virtual machines. A corporation lose control of the (GLOBECOM) (pp. 1-6). IEEE, 2019, December.
data whenever it opts for cloud computing. The main issue [14] Praise, J. J., Raj, R., & Benifa, J. V. ,”Development of Reinforcement
Learning and Pattern Matching (RLPM) Based Firewall for Secured
is therefore maintaining protection of data including during Cloud Infrastructure'', Wireless Personal Communications, 115(2),
transit and while being kept in the cloud. Any application 993-1018,2020
relying on a developing technology should take into account [15] Ivanovic, I.,”Distribution of web traffic toward the centralized cloud
all potential dangers. The different security concerns firewall system”, In 2013 RoEduNet International Conference 12th
discussed in this paper will undoubtedly help cloud Edition: Networking in Education and Research (pp. 1-4). IEEE,
2013.
customers make smart decisions and cloud service
[16] Chatterjee, U., Ray, S., Khan, M. K., Dasgupta, M., & Chen, C.
provider’s deal with attacks effectively. M.,”An ECC-based lightweight remote user authentication and key
management scheme for IoT communication in context of fog
REFERENCES computing” Computing, 1-37, 2022.
[1] Khalil, I., Khreishah, A. and Azeem, M., “Cloud Computing Security: [17] Hamada, M., Salem, S. A., & Salem, F. M,”LAMAS: Lightweight
A Survey”. Computers, 3(1), pp.1-35, 2014 anonymous mutual authentication scheme for securing fog computing
[2] Gupta, B. and Badve, O., “Taxonomy of DoS and DDoS attacks and environments”, Ain Shams Engineering Journal, 13(6), 101752, 2022.
desirable defense mechanism in a Cloud computing environment.” [18] Li, J., Chen, X., Li, M., Li, J., Lee, P. P., & Lou, W.,”Secure
Neural Computing and Applications, 28(12), pp.3655-3682, 2016 deduplication with efficient and reliable convergent key
[3] Bhamare D, Samaka M, Erbad A, Jain R, Gupta L, Chan HA management”, IEEE transactions on parallel and distributed systems,
“Optimal virtual network function placement in multi-cloud service 25(6), 1615-1625, 2013.
function chaining architecture”,Computer Communications, 2017 [19] Zhou, J., Cao, Z., Dong, X., Xiong, N., & Vasilakos, A. V.,”4S: A
[4] Deka GC, Das PK,”Application of virtualization technology in IaaS secure and privacy-preserving key management scheme for cloud-
cloud deployment model”, Design and Use of Virtualization assisted wireless body area network in m-healthcare social
Technology in Cloud Computing: IGI Global, pp 29–99, 2018. networks”,Information Sciences, 314, 255-276,2015.
[5] Kulkarni and Y. Hu, “Cloud security with virtualized defense and [20] Adithya, M., P. G. Scholar, and B. Shanthini. "Security Analysis and
Reputation-based Trust management”, Proceedings of 2009 Eighth Preserving Block- Level Data DE-duplication in Cloud Storage
IEEE International Conference on Dependable, Autonomic and Services." Journal of trends in Computer Science and Smart
Secure Computing (security in cloud computing), pp. 621- 628, technology (TCSST) 2, 2020.
Chengdu, China, December, 2009
Abstract— Nowadays, people are consulting the doctor depend on others if they want to visit a hospital for their daily
frequently a month for their check-ups, especially senior check-ups. Those people need an assistant who can take them
citizens. Moreover, the majority of individuals have busy to the hospital for their check-ups. There are
schedules and won't have time to accompany the patient. some families who get income on daily wages, and such
If they can, they need to take the time or leave, and for people may or may not go along with the patient. To deal with
that, they have to lose money from their salary. This is this issue, there should be a non-Emergency mobile
going to happen many times in a month. So, to address application that facilitates people to enter their details and
this issue, a proposal is made to build a Health Mobile make them able to select hospitals for their check-ups. From
Application, that provides a list of non-Emergency then a physical assistant from the hospital will come to the
services for the respective hospital appointments and then patient’s doorstep and the assistant will take care of the patient
book an appointment. A physical assistant will come to until they visit the doctor, take medicines and return to their
their doorstep and will take care of them until their whole home.
check-up. At last, they will drop the patient at their home, Based on the Statistical Global Consumer Survey, which
for which very affordable charges will be applied. is conducted in 2022 in several countries of health apps. With
Therefore, with this system one can manage their time a share of 70%, India is by far the most popular country when
effectively and efficiently, who is going along with the it comes to using health apps. According to research from the
patient, allowing them to work on other tasks and saving journal Expert Review of Pharmacoeconomics and Outcomes
money. Research, the number of mobile health applications
Index Terms: Physical assistant, Cloud, Mobile downloaded will increase by 65% by 2020. In addition, data
Application, Non-Emergency Services security and privacy issues with mobile healthcare apps are
the main things that are anticipated to restrain the market's
I. INTRODUCTION expansion. The market for mHealth was dominated by
Most people use mobile application technology for medical applications in 2021, accounting for 97.1% of total
health-related difficulties, where they can get online medical revenue.
reports, online treatment, and online medicine providers [1]. Application Effective for planning years starts from
Most health Apps are developed only from the perspective of January 1, 2022, and the percentage that is to be used in
online treatment for people, medical suggestions in virtual affordable calculations is 9.61%. It is accurate to evaluate
mode, and medicine home delivery, some healthcare apps affordability using either the household income or one of the
belong to a single organization that provides advance three affordability measures. Increasing awareness among the
appointment booking and gives complete details about the people to boost the segment share. However, the majority of
organization and other health care apps provides about food individuals attend a hospital for routine checkups for their
diet and fitness suggestions [1]. The number of visits to own reasons, but they are overlooked simply because they
medical offices rose to 3.2 times annually in 2018. must rely on a companion to accompany them. This can be
In the year 2020, according to a survey, 83.4% of adults, solved by providing a physical assistant by the respective
and 94% of children had a visit to the doctor. The results in hospital, who can take care of them until their whole check-
the Google play store have shown 250 health applications and up.
out of them 22 apps were found to be providing online doctor So, our application is providing physical assistant where
consultation services when the search tag is given as “Health the patients can select their service and can book their
Apps in India”. These mobile apps enable people to contact appointment. After that, they need to fill in their details so that
doctors by sitting at their homes, and also people get their the hospital can have the details related to the patient. Finally,
medicines to their doorstep. These mobile health apps are the physical assistant will come to the patient’s doorstep and
providing services to the public in many ways. takes along with them to consult the doctor
In metropolitan cities, people are busy with their work, and for their daily check-ups.
jobs. Senior citizens and physically challenged people need to The rest of the paper was organized in the following way:
Section 2 described the related work. The proposed mobile S. S. Bhat, et al. [5] proposed the Methodology of a mobile
application system is elaborated on in section 3. The results application that is the medical assistant for the expiry tracking
and analysis are illustrated in section 4. Section 5 has a of medicines. It assists people with their medicines by storing
conclusion. information about medicines, tracking the expiration date of
medicines, and alerting people. This application is very useful
II. LITERATURE SURVEY to people because expiry medicines are more dangerous than
D. Liu, et al. [1] proposed a health monitoring, counseling, poison, people should not use expired medicines. It is saving
information gathering, medical assistants, nutrition people's health by alerting them about the expiration of
management, and sports management-based mobile medicines. The main drawback of this app is it does not
application. They must put on wearable technology (such as provide any physical assistance for people.
smart watches, smart bracelets, etc.). The qualified doctor S. Allen, et al. [6] proposed system is an artificial
will next respond to your health-related queries within the intelligence (AI), image processing program that checks
allotted period. They continuously track heart rate images of teeth for dental issues including tooth decay and
fluctuations and issue alerts when abnormal circumstances gingivitis. First, the user has to provide pictures of their teeth.
start to develop. The health management center at your health They have developed an algorithm that was taught by six
center or hospital will be informed in real time of each different dentists, and it will scan those in four seconds. It is
patient's physiological assessment. Consumers may monitor a quick and free dental exam. The software becomes
their blood pressure, blood sugar, and other vital signs daily increasingly tailored as the user provides more data. This
by wearing wearable technology. This app's drawback is that app's drawback is that it only works on iOS due to its platform
busy users with demanding schedules can't effectively utilize need.
it. B. Maryem, et al. [7] developed a mobile-based
S. Oniani, et al. [2] developed an app for the ongoing application that helps in the management of type 2 diabetic
monitoring and management of patients' medical issues based patients, this is especially important for people who live in
on Smart Mobile Medical Computing Systems. They rural regions since they have restricted access to medical
assessed cardiac arrhythmia using Android cellphones and facilities. There are some outputs and four inputs in the
pre-recorded software called LRMA (Long-Run Moving proposed app. This proposal is not applicable to type 1
Average). Diagnoses, information, prevention, treatment, and diabetes. In this app, there are two important components that
communication are all included in these applications for are to be done remotely for the patient’s test results and
healthcare. Their major objective is to develop better-suited glycemic control. This app's disadvantage is that rural
and adaptable medical mobile apps for Georgian residents, residents cannot use it due to poor internet access, and low-
which is an important field of study. It ought to be free to income individuals cannot purchase such smartphones and
download the software. The healthcare application interface tablets.
of this app is restricted to the Georgian language only. L. He, Y. He et al. [8] proposed an app for reducing the
K. M. Ben Hamed, et al. [3] proposed software tracks the chronic pain of old people in nursing homes. As most old
spread of the coronavirus among users when they congregate people are suffering from knee pains, back and neck pains, and
in public areas. Since no one is certain who is infected with many others. In order to cure these pains, they are supposed to
the coronavirus, many individuals are afraid to leave the use this app which records everyday pain, aching detection,
house. The software initially considers the impact of wearing and long-term pain. Mostly the app works on the basis of how
a mask. In addition, users will be able to determine how likely old people are able to manage their behavior and health for
they are to contract the coronavirus. Many existing relieving pain. It would be better if the application provides a
technologies have been used some of them are cloud, doctor’s consultation every 15 days. So, that the old people
Bluetooth, and mobile devices. So, with this app, they can be can ask about their doubts regarding chronic pains.
able to know who is affected with the covid-19 and can G. Samhitha, et al. [9] designed an application for a
maintain some distance, and take appropriate precautions workout tracking system based on Artificial Intelligence.
prior to it. From the user's point of view, the new design This model works by taking users’ videos, and guides based
considers how wearing masks might reduce the rate and alert on the video. This model is useful for every person without
the user of the Covid-19 pandemic in their immediate limitation of age and weight. The limitation of this
neighborhoods. Without worrying about the platform application only guides workouts.
specifics of app deployment, the new design was specified F. Alloatti, et al. [10] proposed methodology of a mobile
from the standpoint of development. This app's flaw is that it application is for patients by voice and multimedia interface.
doesn't give any further information about its functions. This allows patients to take treatment by sitting at their homes
Z. Liang, et al. [4] created the NokoriMe smartphone with the help of a clinical team and caregivers. Patients can
application, which was designed with students' stress from ask a question with the help of a speaker and the answer will
academic expectations in mind. It is used to measure stress come in the format of images or video, which anyone can
levels when it is increasing over time and show them when the understand. The limitation of this app is as it is a virtual
stress is increasing and decreasing. This software is also used assistant it can be used in severe situations.
to track the results of stress such as how it affects things like S. Souiki, et al. [11] proposed mobile application on
sleep quality, etc. Using devices such as track devices. This health for storing health records of patients with the help of
app is only used for students or others who are under stress. the cloud. By giving each patient their own place and giving
The limitations are this application is useful for students, but them access to it through their Google accounts, this program
it does not provide any health assistance. is used to securely store medical records and patient
information. M-health is mostly used when the patient
switches to another doctor in the middle of treatment, that B. App Name: Health Checkup
patient has to explain the problem and treatment will start This app facilitates the users to calculate BMI, BMR,
from the beginning again. So, in this scenario patient use, this Body fat, etc., but sometimes they can’t get appropriate
record stored in the cloud and the doctor can understand results. By seeing the result, they will prefer to take medicines
easily the problem. The limitation of this app is not providing or changes their diet which may lead to other health problems.
any assistance to a patient with health or medically. So, consulting a doctor physically will make everyone’s lives
B. Wen et al. [12] proposed methodology on Health healthy and happy.
Guardian Platform, which prevents disease by detecting early
with provided patient data. This methodology will implement III. PROPOSED METHODOLOGY
in mobile apps, and wearable devices. This platform uses In the proposed system, we have developed a mobile
artificial intelligence, and the cloud to process data and application that helps people especially old people and
envision the disease. It foretells disease with the help of disabled people to consult the doctor without depending on
clinical people. Using this methodology, can detect disease in others, i.e., through physical assistance they can consult the
the early stage and cure it. This will save people’s health. The doctor for their daily checkups. To implement the proposed
limitations of this methodology are just forecasting the system, we have used the following software: Kodular,
disease with the help of provided data, and not providing any Python- Programming language, and Firebase Cloud. The
health assistance to deal with the patient's disease. application was developed by the following system
R. Das, et al. [13] developed a mobile app in which they requirements: 11th Gen Intel(R) Core (TM) i3-1115G4 @
have developed a health center ANM, ASHA workers in the 3.00GHz 2.19 GHz, 8GB RAM, 64-bit operating system,
village are not sufficiently trained and the patients in the x64-based processor. In this app, the system consists of three
village are not properly knowing about their disease and what modules as shown in Fig 1. The three modules are the Patient
they are suffering too. Nowadays each and every person are module, the Doctor module, and the Cloud module.
having a smart device that is used to communicate with each
other. So, they decided to develop an app that has a A. Patient Module
preliminary treatment plan or is advised to visit the doctor. At first, the patient registers into the app if the patient was
The major drawback of this is if the patient is struggling with already a user then he/she login into their account, otherwise
a kidney problem that continuously gives the back pain effect, again he/she will register. During login, if the patient enters
then the app only suggests that the patient is struggling with incorrect credentials, then it will prompt the patient that they
the back pain then the doctor only sees the patient and had given an invalid username/password. After successful
suggests someone, take a back pain medicine even if they are login, the patient is allowed to select one of the services based
unaware that the patient has a renal condition. on their health problem. The services are general checkups,
Raj, Jennifer S, et al. [14] proposed a methodology for pregnant women’s checkups, Asthma checkups, Allergy
handling data such as big data on the basis of the Internet of checkups, Tuberculosis checkups, Pneumonia checkups, etc.
Things. It states that the internet is the main thing that handles If a patient wants a general check-up, he/she will choose that
data that has been generated by the health domain, business service. If the patient is a pregnant woman, he/she will select
domain, etc. But the internet has a limitation of cannot a pregnant women’s check-up. If the patient is suffering from
processing more data. So, this methodology of processing asthma, he/she will select an asthma check-up service. If the
data using the Internet of Things. This proposed methodology patient is suffering from an allergy, he/she will select an
is helpful in health care where IOT health devices are allergy check-up service. If the patient is suffering from
efficient to process data. Pneumonia, he/she will select that service. If a patient wants
Mishra, et al. [15] developed the application of storing to check up on Tuberculosis, he/she will select tuberculosis
information about patients by providing security. This web check-up service. Upon choosing the service the patient will
application with UX/UI interface provides both a patient view book an appointment.
of their data and a doctor view to upload patient data, and the If the appointment was confirmed, then he/she will fill in
patient can book an appointment. and submit the patient’s details. Else the patient needs to book
V. Bhatt, et al. [16] proposed a methodology for the voice because the doctor might be not available. Finally, physical
assistant application DocPal which provides Electronic assistance will come to their home and takes the patient to the
Health Records (EHR) to patients. The patient can operate corresponding hospital for consulting the doctor about their
based on their voice to see and update EHR. It is used to save health checkups. The physical assistant will take care of the
doctors and physicians time in updating patients’ records. patient until their whole checkup and after that, they will drop
Limitations of DocPal are only providing a voice interface for the patient at their home. The steps involved in the Patient
HER not assistance for patient health. module are described in the Algorithm 1.
C. Cloud Module
Algorithm 2: Doctor Module Cloud technology can be useful to access the information of
Step 1: Doctor takes registration(Dr) the user such as login credentials so that they can log in and
Step 2: Log in to the mobile app use it from anywhere to access the information easily. A
If ( entered Details (Doctor) == details(Dr) ) number of applications are being designed and developed
go to step 3 using this application [11-12]. Therefore, this module is used
Else go to step 4 to maintain the details of the patient or doctor. Whenever the
Step 3: The Doctor then offers the services i.e., user signs up for the mobile application then the user will be
General Checkup(Gc), Pregnant Checkup(Pc), added to this cloud. Additionally, this information will be
Asthma Checkup(Ac) utilized to login into their account. The steps involved in the
cloud module are as shown in algorithm 3.
Step 4: Enter valid credentials
Step 5: The Doctor confirms the appointment(Ap) Algorithm 3: Cloud Module
If (Ap == Confirm) Step 1: When the patient or doctor registers into the app then
Go to step 7 it will be updated in the cloud.
Else go to step 6 Step 2: The cloud will keep track of how many members
Step 6: The doctor is not available. So, the appointment was have used this app.
rejected. Step 3: It will also show how many middle-aged, old-aged
Step 7: Physical Assistance will be sent to the people are using this app for consulting doctors.
corresponding patient’s home to pick them up for a Step 4: With this Cloud, we can see the analysis of the app
health checkup. i.e., through graph representation.
Fig 8 Shows a graph that how many users signed into the
app daily. The peak value recorded was 7 daily users. It was
recorded during the month of September. If suppose 4 new
users signed into the app in a day then it will go up to 4 along
the y-axis and if no user signed in then, there will be a
deviation as shown between Sept 14 – Sept 16.
I. I NTRODUCTION
The transition from antiquated to contemporary technolog- Fig. 1. Fog Computing Model
ical computing has recently occurred in the computing world.
Computers and intelligent portable devices are heavily used
by people and enterprises to complete daily tasks [1]. The our comparison and analysis of the different task scheduling
organisation stores the vast volume of data that these gadgets algorithms implemented in the fog computing environment.
generate for further examination. The amount of data created
by sensors and applications has greatly expanded as a result II. R ELATED W ORK
of the IoT sector’s explosive growth. These are the cloud’s Cloud resources, network edge resources, and core network
primary restrictions. Researchers other than Cisco presented a resources can all be used by fog computing. In [4], Fatma
novel prototype in 2012 that they called ”fog computing” [2]. Talaat proposed a fresh, healthcare-relevant Effective Resource
Described as ”a massively virtualized platform that supplies Allocation Methodology (ERAM) for fog environments. The
storage, data, computation, and networking service between IoT Layer, the Fog Layer, and the Cloud Layer are the three
the typical cloud server and edge devices,” fog computing levels that make up the proposed IoT-Fog system. The IoT
is a more advanced type of cloud computing [3]. The pro- layer’s objective is to monitor the patient’s symptoms. The
cess of achieving the task of storing and altering without incoming requests are thought to be handled by the fog layer,
the involvement of a third party using a sizable number of which then routes them to the appropriate server. Data transit
wireless, autonomous, ubiquitous, and decentralised devices to and from the fog layer is controlled by the cloud layer.By
to communicate with the network is known as ”fog comput- using a real-time resource allocation and prediction system,
ing.” Fog computing’s primary objectives are to decrease the ERAM was able to manage resources effectively in a foggy
volume of data processed, analysed, and stored while also environment. In [5], Junaid Akram offers a system model of
increasing effectiveness. Fig. 1 above depicts the fundamental SG paired with a cloud- and fog-based environment. It un-
fog computing model.The fundamental computing components veiled a cutting-edge strategy based on binary particle swarm
of a fog computing model are the edge device, fog node, optimization with inertia weight adjustment via simulated an-
and cloud. A fog node can be any device with storage, nealing. In [6] Omed Ahmed introduced a discrete, opposition-
measurement, and networking capabilities. The cloud server based MFO method that makes use of crossover and mutation
oversees fog nodes, which are in charge of translating services operators. Then, using a hybrid discrete optimization technique
between edge devices and the cloud [4]. This study presents we developed dubbed DMFO-DE that executes one of the
A. First Come First Serve (FCFS) global personal values, the equations to update particle veloc-
ity and position are [12].
The most basic and straightforward methods for scheduling
tasks in a cloud environment involve task arrival time. The vit+1 = ωνid
t
+ c1r1(pti − xti ) + c2r2(ptg − xti ) (1)
work will be scheduled and carried out based on whatever task
entered the queue first. It is solely based on arrival time and xt+1
i = xti + νit+1 (2)
takes all other factors into account. The tasks will be arranged th
Where the i particle’s position and velocity in dimension
by choosing the right jobs to do first. The data center will d are denoted by xi t and vi t , respectively. The careful consid-
give the VM that received the job or user request initially the eration of the PSO parameter ω, c1, and c2 is necessary to
responsibility for execution. The virtual machine is given a improve algorithm efficiency. Our ability to quickly compute
job by the data center controller, which then removes it from the best solution is aided by this.
the task queue [12].
After all the jobs have been queued in a cloud environment,
B. Shortest Job First (SJF) the optimization technique is then used to determine the least
This scheduling method uses a strategy in which tasks with waiting periods for each work. These minimal values are used
the shortest execution times are chosen for all tasks. When a to ensure that tasks are completed in the proper order, hence
set of all jobs is not assigned, this procedure starts running reducing waiting times overall. A task is dispatched to this
and keeps going until the set of jobs is empty. In Shortest queue after the queue created algorithm has determined the
Job First, occupations that take up more time or are longer in threshold and determined the task’s most optimal order. After
duration may not be given priority, and tasks that take up more that, the scheduler assigns a task to an appropriate resource.
time always come after small jobs. This algorithm calculates
the completion times of all jobs, then schedules the work on PSO’s primary objective is to assign a user request to a
the resource with the shortest completion times [12]. relevant resource [12]. To plan a work effectively in a cloud
environment, the task scheduling process requires an optimal
C. Round Robin (RR) algorithm that considers the task and resources. The PSO
algorithm takes into account both the resource and the job,
The round robin is a simple illustration of a load balancing helping to maximise resource use and decrease task processing
strategy. For the purpose of equally allocating scheduling time times [12].
across all planned jobs, a round robin system was developed.
In this method, all tasks are placed in a queue list and each E. Ant Colony Optimization (ACO)
work is given a modest amount of time. The primary goal of Ant colony optimization (ACO) takes its cues from the
RR is to evenly distribute the workload among all resources foraging techniques of several ant species. As seen in Fig.
[12]. Round robin uses a cyclical approach. As soon as the 2, these ants leave pheromone trails on the ground to direct
time allotted for the first work has passed, the scheduler will the other ants in the colony in the right direction. Ant colony
move on to the second task [12]. This is a cyclical strategy optimization approaches optimization problems in a similar
in which the controller is given each task at least once before way [14].
the scheduler picks up the first task once more.
Algorithm 1 Ant Colony Optimization VI. R ESOURCE U TILIZATION AND M EMORY A LLOCATION
Establish parameters and declare pheromone trails Resource usage is the ratio of data center resources, CPU,
while Termination requirement not satisfied do memory, bandwidth, and total capacity as mentioned in [17].
Build Ant Solutions
Search Locally Understanding resource utilization is essential for cloud
Update Pheromones provider reputation. In the majority of data centers, the average
end while resource usage can be as low as 20%. The efficient use of
cloud resources is referred to as ”cloud resource utilization.”
Low resource waste, low costs, and large energy savings are
Build Ant Solutions: A group of m artificial ants constructs
the results of optimal resource utilization. Cloud resource use
solutions using pieces from a finite set of components [14]. A
is already being aided by virtualization, load balancing meth-
usable part of the set N (sp ) is added to the partial solution at
ods, virtual machine consolidation, virtual machine placement,
each step of the construction. N (sp ) is the group of usable
reconfiguration algorithms, and auto scaling cloud computing
elements that can be added to the partial solution without
methods [18]. As long as resources are few compared to
disregarding any of the necessities in Ω.
the rising demand for computers and computing, there is a
The probability with which the ant moves from one vertex
constant need for resource utilization. Using a multi-tenant ap-
a to vertex b is given by the equation [15]:
proach, resources are pooled to service numerous consumers,
α β
(τx,y )(ηx,y ) with various physical and virtual resources being dynamically
pi , j = P β
(3)
α )(η
(τx,y x,y )
assigned and reassigned in response to consumer demand [19].
Here, τ x,y represents the amount of pheromones on edge VII. C OMPARISON OF TASK S CHEDULING A LGORITHMS
x,y and η x,y is the attractiveness of the edge x,y. α and β are For our research we have selected First Come First Serve
parameters that affect the amount of influence that τ and η (FCFS), Shortest Job First (SJF), Round Robin (RR), Particle
respectively have on the final probability of edge selection. Swarm Optimization (PSO) and Ant Colony Optimization
(ACO). FCFS, SJF and RR were chosen as they are tradi-
Search Locally: Before updating the pheromone once solu- tional scheduling algorithms and PSO and ACO are enhanced
tions have been established, it is typical for ants to refine the algorithms for task scheduling in cloud-fog environment which
answers found through local searching [14]. makes the scheduling process more efficient. In Table 1, we
have compared the aforementioned task scheduling algorithms
Update Pheromones: The objective of the pheromone up-
[20]:
date is to enhance pheromone values linked to successful or
prospective solutions and lower the ones with unsuccessful
TABLE I
solutions. Usually, to do this, all pheromone values are (i) C OMPARISON OF TASK S CHEDULING A LGORITHMS
decreased by pheromone evaporation, which removes the trails
that are linked to unsuccessful solutions and (ii) the pheromone Scheduling Scheduling Parameters Merits
Algorithm
levels associated with a particular group of constructive solu- FCFS Arrival time Reduce time complexity
tions are elevated [14]. SJF Task size Reduce the turnaround and ex-
The pheromones trails are updated after all the ants have ecution times.
obtained their solution and either increasing or decreasing the Round Arrival time, time slice Shorten the migration process
Robin and make better use of the re-
pheromone values based on their success based on a rule [16] sources
depicted in the below equation: PSO Inertia, c1 and c2 con- Decrease makespan time and
m stants boost processing speed
X
k ACO Cost, time and phe- Reduces costs and improves re-
τxy ← (1 − ρ)τxy + ∆τxy (4) nomenon updating rule source efficiency
k
ρ is known as the pheromone evaporation coefficient which
VIII. S IMULATION AND C OMPARATIVE A NALYSIS
denotes the rate of pheromone evaporation. ∆τ k xy represents
the total amount of pheromones that are deposited on the A. Methodology
selected edge (x,y) by the kth ant and m is the number of In order to conduct our simulation testing, we used a simu-
ants. In the case of Travelling Salesman Problem, ∆τ k xy is lation tool, CloudSim. CloudSim is an open-source framework
given by which is used for modelling and simulating cloud computing
( infrastructures. It is developed by the CLOUDS Lab organiza-
k Q/Lk if kth uses edge xy in its tour
∆τxy = (5) tion and is completely written in Java. The major classes used
0 otherwise in CloudSim simulation are:
In the above equation Q is a constant that represents the inten- • Cloudlet
sity of pheromones that can affect the rate of the algorithm, • VM
Lk is the total length of the path that the kth ant has travelled. • Host
• Datacenter
• DatacenterBroker
The main components of CloudSim are depicted in Fig. 3
[21].
such as FCFS (First Come First Serve), SJF (Shortest Job [16] Yu, H. (2014). Optimized ant colony algorithm by local pheromone
First), Round Robin, PSO (Particle Swarm Optimization) and Update. TELKOMNIKA Indonesian Journal of Electrical Engineering,
12(2), 984-990.
ACO (Ant Colony Optimization). The algorithms were com- [17] Bal, P. K., Mohapatra, S. K., Das, T. K., Srinivasan, K., Hu, Y.
pared based on their scheduling parameters and merits. A brief C. (2022). A Joint Resource Allocation, Security with Efficient Task
description of the aforementioned task scheduling algorithms Scheduling in Cloud Computing Using Hybrid Machine Learning Tech-
niques. Sensors, 22(3), 1242.
has been presented. The task scheduling algorithms were also [18] Mehmood, T., Latif, S., Malik, S. (2018, October). Prediction of cloud
compared based on their makespan in an analysis that we computing resource utilization. In 2018 15th International Conference
conducted using the CloudSim simulation tool in Java. From on Smart Cities: Improving Quality of Life Using ICT IoT (HONET-
ICT) (pp. 38-42). IEEE.
this comparative analysis we can conclude that PSO (Particle [19] Ala’a Al-Shaikh, H. K., Sharieh, A., Sleit, A. (2016). Resource
Swarm Optimization) is the best performing task scheduling utilization in cloud computing as an optimization problem. Resource,
algorithm amongst the algorithms we analysed. There is 7(6).
[20] Pradhan, Arabinda Bisoy, Sukant Das, Amardeep. (2021). A Survey
significant scope for improving the scheduling approaches in on PSO Based Meta-Heuristic Scheduling Mechanism in Cloud Com-
the cloud-fog environment. Prospective algorithms can group puting Environment. Journal of King Saud University - Computer and
different algorithms like PSO and ACO in a sequential or Information Sciences. 10.1016/j.jksuci.2021.01.003.
[21] Keshk, Arabi El-Sisi, Ashraf Tawfeek, Medhat. (2014). Cloud Task
parallel way in order to get a lower makespan and better Scheduling for Load Balancing based on Intelligent Strategy. Inter-
performance. national Journal of Intelligent Systems and Applications. 6. 25-36.
10.5815/ijisa.2014.05.02.
R EFERENCES [22] Annamalai, L., M. Mohammed Siddiq, S. Ravi Shankar, and S. Vignesh-
war. ”A Study on Various Task-Work Allocation Algorithms in Swarm
[1] Xu, Baomin Zhao, Chunyan Hu, Enzhao Hu, Bin. (2011). Job schedul- Robotics.” Journal of Information Technology 2, no. 02 (2020): 123-134.
ing algorithm based on Berger model in cloud environment. Advances in [23] Kumar, Dinesh. ”Review on task scheduling in ubiquitous clouds.”
Engineering Software. 42. 419-425. 10.1016/j.advengsoft.2011.03.007. Journal of ISMAC 1, no. 01 (2019): 72-80.
[2] Ozturk, Celal Hancer, Emrah Karaboga, Dervis. (2015). Dynamic
clustering with improved binary artificial bee colony algorithm. Applied
Soft Computing. 28. 10.1016/j.asoc.2014.11.040.
[3] Capannini, Gabriele Baraglia, Ranieri Puppin, Diego Ricci, Laura
Pasquali, Marco. (2007). A job scheduling framework for large com-
puting farms. Proceedings of the 2007 ACM/IEEE Conference on
Supercomputing, SC’07. 54. 10.1145/1362622.1362695.
[4] M. Talaat, Fatma. (2022). Effective prediction and resource allocation
method (EPRAM) in fog computing environment for smart healthcare
system. Multimedia Tools and Applications. 81. 1-24. 10.1007/s11042-
022-12223-5.
[5] Akram, Junaid Tahir, Arsalan Munawar, Hafiz Suliman Akram, Awais
Kouzani, Abbas MAHMUD, M. A.. (2021). Cloud- and Fog-Integrated
Smart Grid Model for Efficient Resource Utilisation. Sensors. 21. 7846.
10.3390/s21237846.
[6] Ahmed, Omed Lu, Joan Xu, Qiang Ahmed, Aram Rah-
mani, Amir Hosseinzadeh, Mehdi. (2021). Using differential evolu-
tion and Moth–Flame optimization for scientific workflow schedul-
ing in fog computing. Applied Soft Computing. 112. 107744.
10.1016/j.asoc.2021.107744.
[7] Nguyen, Binh Minh Binh, Huynh Anh, Tran Do, Son. (2019).
Evolutionary Algorithms to Optimize Task Scheduling Problem for
the IoT Based Bag-of-Tasks Application in Cloud–Fog Computing
Environment. Applied Sciences. 9. 1730. 10.3390/app9091730.
[8] Ijaz, Samia Munir, Ehsan Ahmad, Saima Rafique, M. Mustafa Rana,
Omer. (2021). Energy-makespan optimization of workflow scheduling in
fog–cloud computing. Computing. 103. 10.1007/s00607-021-00930-0.
[9] Ahmed, Asaad Noaman, Amin. (2019). Fuzzy clustering-based task
allocation approach using bipartite graph in cloud-fog environment. 454-
463. 10.1145/3360774.3360833.
[10] Yi, Shanhe Li, Cheng Li, Qun. (2015). A Survey of Fog Computing:
Concepts, Applications, and Issues. 37-42. 10.1145/2757384.2757397.
[11] Shenai, S. (2012). Survey on scheduling issues in cloud computing.
Procedia Engineering, 38, 2881-2888.
[12] Malik, Babur Amir, Mehwashma Mazhar, Bilal Ali, Shehzad Jalil,
Rabiya Khalid, Javaria. (2018). Comparison of Task Scheduling Al-
gorithms in Cloud Environment. International Journal of Advanced
Computer Science and Applications. 9. 10.14569/IJACSA.2018.090550.
[13] Hidayat, T., Azzery, Y., Mahardiko, R. (2020). Load balancing network
by using round Robin algorithm: a systematic literature review. Jurnal
Online Informatika, 4(2), 85-89.
[14] Dorigo, Marco Birattari, Mauro Stützle, Thomas. (2006). Ant Colony
Optimization. Computational Intelligence Magazine, IEEE. 1. 28-39.
10.1109/MCI.2006.329691.
[15] Runka, A. (2009, July). Evolving an edge selection formula for ant
colony optimization. In Proceedings of the 11th Annual conference on
Genetic and evolutionary computation (pp. 1075-1082).
• This section contains an overall analysis and debate, as volume unsolicited has an impact on both real users and
well as a summary of the study and some recommendations resource use. Likelihood transmitting customers
for future research. dissemination dangerous material [17]. Recently, spammer
detection and false user recognition on Near Real Time has
Misinformation's growing popularity draws an increasing big data and sentimental analytics became a major.
number of spammers. Spammers send spammy
misinformations to Near Real Time users in order that Offered methodologies several characteristics, graph
damaging regular [7]. Use of machine learning approaches characteristics, structural characteristics, temporal
to Near Real Time spam detection has been the subject of characteristics [18]. Possibility of consumers disseminating
current research [8]. hazardous information. Spammer detection and false user
recognition in Near Real Time has recently become a key
Furthermore, the possibility of extending erroneous info to focus of big data and emotional analytics. Study's author
customers via fake characters has increased the number of believed it would beneficial scholars breakthroughs on
negative consequences in the distribution of dangerous single platform for Social Media. [19].
substances [9]. The location of spammers and the detection
of bogus clients on social media of discussion informal. The abundance of spam, rumours, and bogus material on
Currently, conduct a study on strategies [10]. Near Real Time diminishes the value of information
included in its messages (or "fake data") during quick onset
Furthermore, fake data methodologies presented, which crisis occurrences. One proposed answer utilise assess a fake
divides processes into four categories data's credibility, or whether a person would find it credible
or trustworthy. In an off-line (post-hoc) situation, analysed
Demonstrated examined characteristics, client issue. We provide a semi-supervised ranking strategy for
characteristics, , diagram characteristics, as well as fake assessing fake data based on their credibility in this research.
data. [11]. Near Real Time, a browser plugin, was installed and utilised
by 1,127 social media users during the first 24 hours [20].
A. Drawbacks:
People are increasingly using Online Social Networks
• Spam detection effective in searches, although spammer (OSNs) to engage and exchange information. While OSNs
detection is more connected with the failure to discover have established themselves as a new medium for
existing spam accounts. information distribution, they are also quickly becoming a
playground for the propagation of disinformation [21].
• If a spammer is found in nature, her account will be
suspended or her IP address will be temporarily blocked, As a result, an OSN (Online Social Network) platform users:
preventing to post. Why recognising the actual work, thus
focusing lives spam message more difficult way [12]. • Spammers
• Non-spammers.
IV. SPAMMERS TO WELL-KNOWN SOCIAL
NETWORKING Usefulness of several approaches for problem fake data.
According to the findings, using restricted qualities available
Information quality on media is becoming increasingly
false data can produce promising results that are competitive
crucial, but examine rectify most erroneous information,
with existing spammer detection algorithms that depend on
"fake news," on is hampered by web-scale data. All three
more expensive user information[22]. Our study is the first
datasets are also publically available, having been aligned
to attempt to generalise results from different datasets about
into a common format [13], yet makes it difficult most
the best classifiers and feature sets for detecting social spam
erroneous information, or "fake news." have been single and
[23].
now [14].
Spammers upload undesired (or irrelevant) information or
A feature analysis identifies qualities with high ratings,
disseminate falsehoods on OSN platforms with harmful
which is consistent with earlier research. We conclude by
intent. We used three learning algorithms in our research:
discussing the distinctions between accuracy and
Naive Bayes, Clustering, and Decision Trees [24].
believability, as well as why non-expert models outperform
journalist models in spotting fakes on social media [15]. The This allows the system to be applied to a huge number of
results of a feature analysis, which are consistent with fake data in a rapid manner, perhaps in real-time or near
previous work, identify traits highly ratings. We wrap off real-time [25]. We investigate the applicability of methods
with a discussion of the differences between accuracy and distinct for problem fake data [26]. Findings suggest
credibility, as well as why non-expert models outperform utilising restricted characteristics accessible fake data, may
journalist models for detecting fakes on social media. get promising results that are competitive when compared to
Donnay [16]Spammers have turned to well-known social existing spammer identification algorithms that rely on more
networking sites to transmit a massive volume of incorrect expensive user features [27], [28], [29], [30].
and harmful information. For example, Twitter has grown to
be one of the most widely utilised websites ever, resulting in
We investigate the utility of numerous ways for dealing with for accuracy and F1 scores, however all of them fell short of
bogus data. According to the findings, employing low- 90%.
quality accessible fake data can provide promising results
that are comparable to existing spammer detection Sharma [38] advocate constructing a wholly fake to identify
algorithms that rely on more expensive user data [31]. Our take news using one-class classification. The case study uses
research is the first to attempt to synthesise findings from information like WhatsApp to focus environment start.
several datasets to determine the optimal classifiers and Spammers are a well-known social media tactic since they
feature sets for identifying social spam. may use their accounts for a multitude of reasons [39]. One
of these purposes is to spread rumours, which may have a
Our research is the first to attempt to generalise results about big influence on a certain firm or perhaps the entire society
the best classifiers and feature sets for detecting social spam [40].
across different datasets. This allows the spam detection
system to be applied to a huge number of fake datas in a The discretization technique is crucial to solve this problem
rapid manner [32]. since most real-world categorization learning applications
employ continuous-valued features [41]. It's useful for
V. FEATURE EXTRACTION converting nominal values from non-normally distributed
numeric numbers [42], [43].
Some have looked into the topic of machine learning, while
others have looked into deep learning. Despite this, no study Manzoor [44] conducted a study that looked at several
subject of sentiment analysis has ever been published. linguistic properties that can distinguish between false and
real content. Experimental assessment demonstrates that the
To extract false materials, [33] used, for both simulated and recommended ensemble learner technique performs better
real-world news, outperform linear models. Study has a than individual learners [45]. In this investigation, the KNN
disadvantage in that it had less accuracy when greater n- model did not perform well. The study's ramifications,
grams were used. however, are limited to textual data. Other forms of data
aren't included.
Shaikh [34] discussed two major types of techniques for
detecting fake/false news. The first lesson discussed was Segal [46] created false that surpassed existing algorithms in
linguistic methods, in which the content of deceiving terms of accuracy. The suggested technique captures
communications is removed and deconstructed in order to essential features from fake news datasets before
link language designs to double-dealing. categorising integrates different algorithms.
Ahmad [35] is the author of 41 publications on sentiment Safavian [47] developed algorithm for detecting bogus
analysis (SA). Instead of dealing with false/false/fake news. news. A multimodal approach was utilised in the study to
Furthermore, the lower the average accuracy rate is in a detect bogus news.
sensation problem, the more exploration there is. The work
that will be performed in the future is described in this Lyu [48] created technique detecting false in a research.
document. Study used a fictitious dataset collected from the general
population to figure out how the LSTM and BI-LSTM deep
Hakak [36] The study's restriction of the goals was to learning models function. The models have substantial loss
publish and evaluate the many interpretations of false news rates, with LSTM and BI-LSTM having just a 91.51 percent
and incorrectly worded gossip/rumors. Second, the study's performance rate.
selection of crucial information to signify bogus news was
inaccurate, and the machine learning models' performance Awan [49] developed deep learning-based automatic
was worse. detection algorithms, and machine learning was studied to
counteract the spread of fake news. Research presented
The work of Abdullah [37] on false data identification unique approach for categorising bogus news. The model
approached perspective. According to study's findings. successfully validated two false news datasets, resulting in
Seven different machine learning algorithms were evaluated better than techniques.
TABLE1: PERIODICITY OF EACH SUBJECT
S. No Subject Periodicity Reference
1. News from the government 1356 (Ahmed, et.al2021)[50], (Khalil, et.al)[52], (Mujahid, et.al2021)[56],
(Raza, et.al2021)[57].
2. Middle East 887 (Garcia-Zapirain, et.al2021)[58], (Aftab, et.al2021)[59]
3. News 1565 (Shearer, et.al2021)[60], (Hernon1995)[61], (Zubiaga, et.al2018)[62],
(Vishwakarma, et.al2020)[63]
4. Left News 887 (Zannettou, et.al2019)[64], (Qian, et.al2019)[65], (Qian, et.al2020)[83]
(Guerini, et.al2015)[66]
5. Economics 4765 (Kagan, et.al2014)[67], (Chen, et.al2015)[68]
6. History News 7123 (Adali,et.al2017)[70], (Liu, et.al2019)[69], (Hussein2018)[73]
7. World News 10877 (Flekova, et.al2015)[74]
The purpose of the quality of the findings, we make sure Antonakaki [86] Spam categorization based on machine
that the quantity of data in each class is balanced. The learning, which will be utilised in the experiment to assess
information from the Near Real Time API yielded some spam detection. The JSON format is processed to extract
features. A dataset has been created for our experiments. the user-based features that have been recognised.
We ensure that the quantity of data in each class is
balanced in order to ensure the quality of the findings. The
data from the Near Real Time API generated some
Fig.2. Fake URL spam detection • Spam detection use a classification approach to receive
tweets as input and categorise them as spam or not.
• The categorization approach is used in spam detection.
• Hashtag proportion
• URL proportion
[33]. Faustini P., Covões T. "Fake news detection using one-class Media Platforms", Interational J. Comput. Appl. Technol., in press,
classification", In Proceedings of the 2019 8th Brazilian 2021.
Conference on Intelligent Systems (BRACIS), Salvador, Brazil, [55]. Awan M.J. "Acceleration of Knee MRI Cancellous bone
15–18; 592–597, October 2019. Classification on Google Colaboratory using Convolutional Neural
[34]. Shaikh J., Patil R. "Fake News Detection using Machine Learning", Network", Int. J. Adv. Trends Comput. Sci. Eng., 8, 83–88, 2019.
In Proceedings of the 2020 IEEE International Symposium on [56]. Mujahid A., Awan M., Yasin A., Mohammed M., Damaševiˇcius R.,
Sustainable Energy, Signal Processing and Cyber Security Maskeliunas R., Abdulkareem K. "Real-Time Hand Gesture
(iSSSC), San Francisco, CA, USA, 16–17; 1–5, December 2020. Recognition Based on Deep Learning YOLOv3 Model", Appl.
[35]. Ahmad I., Yousaf M., Yousaf S., Ahmad, M.O. "Fake News Sci., 11, 4164, 2021.
Detection Using Machine Learning Ensemble Methods", [57]. Awan M.J., Raza A., Yasin A., Shehzad H.M.F., Butt, I. "The
Complexity 2020, 1–11, 2020. Customized Convolutional Neural Network of Face Emotion
[36]. Hakak S., Alazab M., Khan S., Gadekallu T.R., Maddikunta P.K.R., Expression Classification". Ann. Rom. Soc. Cell Biol., 25, 5296–
Khan W.Z. "An ensemble machine learning approach through 5304, 2021.
effective feature extraction to classify fake news", Futur. Gener. [58]. Awan M.J., Rahim M.M., Salim N., Mohammed M., Garcia-Zapirain
Comput. Syst., 117, 47–58, 2020. B., Abdulkareem K. "Efficient Detection of Knee Anterior
[37]. Abdullah A., Awan M., Shehzad M., Ashraf M. "Fake news Cruciate Ligament from Magnetic Resonance Imaging Using Deep
classification bimodal using convolutional neural network and long Learning Approach", Diagnostics, 11, 105, 2021.
short-term memory", Int. J. Emerg. Technol., 11, 209–212, 2020. [59]. Aftab M.O., Awa M.J., Khalid S., Javed R., Shabir H. "Executing
[38]. Sharma D.K., Garg S., Shrivastava P. "Evaluation of Tools and Spark BigDL for Leukemia Detection from Microscopic Images
Extension for Fake News Detection", In Proceedings of the 2021 using Transfer Learning", In Proceedings of the 2021 1st
International Conference on Innovative Practices in Technology International Conference on Artificial Intelligence and Data
and Management (ICIPTM), Gautam Buddh Nagar, India, 17–19; Analytics (CAIDA), Riyadh, Saudi Arabia, 6–7; pp. 216–220,
pp. 227–232, February 2021. April 2021.
[39]. Nasir J.A., Khan O.S., Varlamis I. "Fake news detection: A hybrid [60]. Shearer E., Mitchell A. "News Use Across Social Media Platforms in
CNN-RNN based deep learning approach", Int. J. Inf. Manag. Data 2020", 2021. Available online: https://www.journalism.org/2
Insights, 1, 100007: 90–95, 2021. 021/01/12/news-use-across-social-media-platforms-in-2020/
[40]. Waskom M.L., "Statistical data visualization", J. Open Source (accessed on 3 June 2021).
Softw., 6, 3021, 2021. [61]. Hernon P. "Disinformation and misinformation through the internet:
[41]. Pedregosa F., Varoquaux G., Gramfort A., Michel V., Thirion B., Findings of an exploratory study", Gov. Inf. Q., 12, 133–139,
Grisel O., Blondel M., Prettenhofer P., Weiss R., Dubourg V. 1995.
Scikit: "Machine learning in Python", J. Mach. Learn. Res., 12, [62]. Zubiaga A., Aker A., Bontcheva K., Liakata M., Procter R.
2825–2830, 2011. "Detection and Resolution of Rumours in Social Media: A
[42]. Singh A.K., Shashi M. "Vectorization of Text Documents for Survey", ACM Comput. Surv., 51, 32:1–32:36, 2018.
Identifying Unifiable News Articles", Int. J. Adv. Comput. Sci. [63]. Meel P., Vishwakarma D.K. "Fake news, rumor, information
Appl., 10, 2019. pollution in social media and web: A contemporary survey of state-
[43]. Dey A., Jenamani M., Thakkar J.J., Lexical TF-IDF: "An n-gram of-the-arts, challenges and opportunities", Expert Syst. Appl., 153,
feature space for cross-domain classification of sentiment 112986, 2020.
reviews", In Proceedings of the International Conference on [64]. Zannettou S., Sirivianos M., Blackburn J.; Kourtellis, N. "The Web
Pattern Recognition and Machine Intelligence, Kolkata, India, 5–8; of False Information: Rumors, Fake News, Hoaxes, Clickbait, and
380–386, December 2017. Various Other Shenanigans", ACM J. Data Inf. Qual., 11, 10:1–
[44]. Menard S. "Applied Logistic Regression Analysis", Sage: London, 10:37, 2019.
UK; Volume 106, 2002. [65]. Sharma K., Qian F., Jiang H., Ruchansky N., Zhang M., Liu Y.
[45]. Manzoor S.I., Singla J., Nikita. "Fake News Detection Using "Combating Fake News: A Survey on Identification and Mitigation
Machine Learning approaches: A systematic Review", In Techniques, ACM Trans. Intell. Syst. Technol., 10, 21:1–21:42,
Proceedings of the 2019 3rd International Conference on Trends in 2019.
Electronics and Informatics (ICOEI), Tirunelveli, India, 23–25; pp. [66]. Guerini M., Staiano J. "Deep Feelings: A Massive Cross-Lingual
230–234, April 2019. Study on the Relation between Emotions and Virality", In
[46]. Segal M.R. "Machine Learning Benchmarks and Random Forest Proceedings of the 24th International Conference on World Wide
Regression", Kluwer Academic Publisher: Amsterdam, The Web Companion, ACM: New York, NY, USA,; pp. 299–305,
Netherlands, 2004. 2015.
[47]. Safavian S.R., Landgrebe D. "A survey of decision tree classifier [67]. Dickerson J.P., Kagan V., Subrahmanian V.S. "Using sentiment to
methodology", IEEE Trans. Syst. Man, Cybern., 21, 660–674, detect bots on Twitter: Are humans more opinionated than bots?",
1991. In Proceedings of the 2014 IEEE/ACM International Conference
[48]. Lyu S., Lo D.C.T. "Fake News Detection by Decision Tree", In on Advances in Social Networks Analysis and Mining, IEEE
Proceedings of the 2020 SoutheastCon, Raleigh, NC, USA, 28–29; Computer Society: Washington, DC, USA; pp. 620–627, 2014.
pp. 1–2, March 2020. [68]. Chen Y., Conroy N.J., Rubin V.L. "Misleading Online Content:
[49]. Awan M.J., Rahim M.S.M., Nobanee H., Yasin A., Khalaf O.I., Recognizing Clickbait as “False News”", In Proceedings of the
Ishfaq U. "A Big Data Approach to Black Friday Sales", Intell. 2015 ACM Workshop on Multimodal Deception Detection,
Autom. Soft Comput., 27, 785–797, 2021. WMDD@ICMI 2015, Seattle, WA, USA,; pp. 15–19, November
[50]. Ahmed H.M., Awan M.J., Khan N.S., Yasin A., Faisal Shehzad 2015.
H.M. "Sentiment Analysis of Online Food Reviews using Big Data [69]. Horne B.D., Adali S. "This Just In: Fake News Packs a Lot in Title,
Analytics", Elem. Educ. Online, 20, 827–836, 2021. Uses Simpler, Repetitive Content in Text Body, More Similar to
[51]. Awan, M.J., Rahim M.S.M., Nobanee H., Munawar A., Yasin A., Satire than Real News", In Proceedings of the Workshops of the
Azlanmz A.M.Z. "Social Media and Stock Market Prediction: A Eleventh International AAAI Conference on Web and Social
Big Data Approach", Comput. Mater. Contin., 67, 2569–2583, Media (ICWSM 2017), Montreal, QC, Canada; 759–766, May
2021. 2017.
[52]. Awan M., Khan R., Nobanee H., Yasin A., Anwar S., Naseem U., [70]. Conroy N.J., Rubin V.L., Chen Y. "Automatic deception detection:
Singh V. "A Recommendation Engine for Predicting Movie Methods for finding fake news. In Information Science with
Ratings Using a Big Data Approach", Electronics, 10, 1215, 2021. Impact: Research in and for the Community", Proceedings of the
[53]. Khalil A., Awan M.J., Yasin A., Singh V.P., Shehzad H.M.F. "Flight 78th ASIS&T Annual Meeting, ASIST 2015, St. Louis, MO, USA,
Web Searches Analytics through Big Data", Int. J. Comput. Appl. 6–10; Wiley: Hoboken, NJ, USA, 2015; Volume 52, pp. 1–4,
Technol.. in press. October 2015.
[54]. Awan M.J., Khan M.A., Ansari Z.K., Yasin A., Shehzad H.M.F. [71]. Shu K., Sliva A., Wang S., Tang J., Liu H. "Fake News Detection on
"Fake Profile Recognition using Big Data Analytics in Social Social Media: A Data Mining Perspective", SIGKDD Explor., 19,
22–36, 2017.
[72]. Shu K., Wang S., Lee D., Liu H. "Mining Disinformation and Fake [92]. Field-Fote E.E. "Fake News in Science", J. Neurol. Phys. Ther., 43,
News: Concepts, Methods, and Recent Advancements. In 139–140, 2019.
Disinformation, Misinformation, and Fake News in Social Media: [93]. Taddicken M., Wolff, L. "‘Fake News’ in Science Communication:
Emerging Research Challenges and Opportunities", Springer Emotions and Strategies of Coping with Dissonance Online",
International Publishing: Cham, Switzerland,; 1–19, 2020. Media Commun., 8, 206–217, 2020.
[73]. Shu K., Liu H. "Detecting Fake News on Social Media. In Synthesis [94]. Kedar H.E. "Fake News in Media Art: Fake News as a Media Art
Lectures on Data Mining and Knowledge Discovery", Morgan & Practice vs. Fake News in Politics", Postdigit. Sci. Educ., 2, 132–
Claypool Publishers: San Rafael, CA, USA, Volume 18, 2019. 146, 2020.
[74]. Hussein D.M.E.D.M. "A survey on sentiment analysis challenges", J. [95]. Ruzicka V., Kang E., Gordon D., Patel A., Fashimpaur J., Zaheer M.
King Saud Univ. Eng. Sci., 30, 330–338, 2018. "The Myths of Our Time: Fake News", arXiv, arXiv:1908.01760,
[75]. Flekova L., Preotiuc-Pietro D., Ruppert E. "Analysing domain 2019.
suitability of a sentiment lexicon by identifying distributionally [96]. Rapoza K. "Can ‘Fake News’ Impact The Stock Market? Forbes
bipolar words", In Proceedings of the 6th Workshop on 2017", Available online:
Computational Approaches to Subjectivity, The Association for https://www.forbes.com/sites/kenrapoza/2017/02/26/can-fake-
Computer Linguistics: Stroudsburg, PA, USA,; 77–84, 2015. news-impact-the-stock-market/ (accessed on 3 June 2021).
[76]. Thorne J., Vlachos A. "Automated Fact Checking: Task [97]. Clarke J., Chen H., Du D., Hu Y.J. "Fake News, Investor Attention,
Formulations, Methods and Future Directions", In Proceedings of and Market Reaction", Inf. Syst. Res., Forthcoming, 2020.
the 27th International Conference on Computational Linguistics, [98]. Kogan S., Moskowitz T.J., Niessner M. "Fake News in Financial
COLING 2018, Association for Computational Linguistics: Markets; Social Science Research Network (SSRN)", Rochester,
Stroudsburg, PA, USA,; 3346–3359, 2018. NY, USA, 2020.
[77]. Elhadad M.K., Li K.F., Gebali F. "Fake News Detection on Social [99]. Domenico G.D., Sit J., Ishizaka A., Nunan D. "Fake news, social
Media: A Systematic Survey. In Proceedings of the IEEE Pacific media and marketing: A systematic review", J. Bus. Res., 124,
Rim Conference on Communications, Computers and Signal 329–341, 2021.
Processing", PACRIM 2019, Victoria, BC, Canada, 21–23 August [100]. Visentin M., Pizzi G., Pichierri M. "Fake News, Real Problems for
2019; IEEE: Piscataway, NJ, USA; 1–8, 2019. Brands: The Impact of Content Truthfulness and Source Credibility
[78]. Bondielli A., Marcelloni, F. "A survey on fake news and rumour on consumers Behavioral Intentions toward the Advertised
detection techniques", Inf. Sci., 497, 38–55, 2019. Brands", J. Interact. Mark., 45, 99–112, 2019.
[79]. da Silva F.C.D., Vieira R., Garcia A.C. "Can Machines Learn to [101]. Di Domenico G., Visentin M. "Fake news or true lies? Reflections
Detect Fake News? A Survey Focused on Social Media", In about problematic contents in marketing", Int. J. Mark. Res.,
Proceedings of the 52nd Hawaii International Conference on Forthcoming, 2020.
System Sciences, Scholar Space: Honolulu, HI, USA; 1–8, 2019. [102]. Bakir V., McStay A. "Fake News and The Economy of Emotions",
[80]. Klyuev V. "Fake News Filtering: Semantic Approaches", In Digit. J., 6, 154–175, 2018.
Proceedings of the 2018 7th International Conference on [103]. Sindermann C., Cooper A., Montag C. "A short review on
Reliability, Infocom Technologies and Optimization (Trends and susceptibility to falling for fake political news", Curr. Opin.
Future Directions) (ICRITO), Noida, India, 29–31; 9–15, August Psychol., Cyberpsychology. 36, 44–48, 2020.
2018. [104]. Scardigno R., Mininni G. "The Rhetoric Side of Fake News: A
[81]. Collins B., Hoang D.T., Nguyen N.T., Hwang D. "Fake News Types New Weapon for Anti-Politics?", World Future, 76, 81–101, 2020.
and Detection Models on Social Media A State-of-the-Art Survey", [105]. Brun I. "National Security in the Era of Post-Truth and Fake News;
In Proceedings of the Intelligent Information and Database Institute for National Security Studies", Tel Aviv, Israel, 2020.
Systems-12th Asian Conference, ACIIDS 2020, Phuket, Thailand; [106]. Belova G., Georgieva G. "Fake News as a Threat to National
Volume 1178, 562–573, March 2020. Security", Int. Conf. Knowl. Based Organ., 24, 19–22, 2018.
[82]. Zhou X., Zafarani R. "A Survey of Fake News: Fundamental [107]. Vasu N., Ang B., Teo T.A., Jayakumar S., Faizal M., Ahuja J.
Theories, Detection Methods, and Opportunities". ACM Comput. "Fake News: National Security in the Post-Truth Era; Technical
Surv., 53, 109:1–109:40, 2020. Report", S. Rajaratnam School of International Studies, Nanyang
[83]. Oshikawa R., Qian J., Wang W.Y. "A Survey on Natural Language Technological University: Singapore, 2018.
Processing for Fake News Detection". In Proceedings of the 12th [108]. Verrall N., Mason D. "The Taming of the Shrewd. How Can the
Language Resources and Evaluation Conference, LREC 2020, Military Tackle Sophistry, ‘Fake’ News and Post-Truth in the
Marseille, France, 11–16 May 2020; European Language Digital Age?", RUSI J., 163, 20–28, 2018.
Resources Association: Paris, France; 6086–6093, 2020. [109]. Gallacher J.D., Barash V., Howard P.N., Kelly J. "Junk News on
[84]. Zhang X., Ghorbani A.A. "An overview of online fake news: Military Affairs and National Security", Social Media
Characterization, detection, and discussion", Inf. Process. Manag., Disinformation Campaigns Against US Military Personnel and
57, 102025, 2020. Veterans; Data Memo 2017.9; Project on Computational
[85]. de Souza J.V., Gomes J. Jr., de Souza Filho F.M., de Oliveira Julio Propaganda; Oxford Internet Institute, University of Oxford:
A.M., de Souza J.F. "A systematic mapping on automatic Oxford, UK, 2017.
classification of fake news in social media", Soc. Netw. Anal.
Min., 10, 48, 2020.
[86]. Antonakaki D., Fragopoulou P., Ioannidis S. "A survey of Twitter
research: Data model, graph structure, sentiment analysis and
attacks", Expert Syst. Appl., 164, 114006, 2021.
[87]. Allcott H., Gentzkow M. "Social Media and Fake News in the 2016
Election", J. Econ. Perspect., 31, 211–36, 2017.
[88]. Wardle C. "Fake News. It’s Complicated. 2017", Available online:
https://firstdraftnews.org/articles/fake-news-complicated/ (accessed
on 3 June 2021).
[89]. Tandoc E.C., Lim Z.W., Ling R. "Defining “Fake News”", Digit. J.,
6, 137–153, 2018.
[90]. Golbeck J., Mauriello M.L., Auxier B., Bhanushali K.H., Bonk C.,
Bouzaghrane M.A., Buntain C., Chanduka R., Cheakalos P.,
Everett J.B. et al., "Fake News vs Satire: A Dataset and Analysis",
In Proceedings of the 10th ACM Conference on Web Science,
WebSci 2018, Amsterdam, The Netherlands,; 17–21, May 2018.
[91]. Scheufele D.A., Krause N.M. "Science audiences, misinformation,
and fake news", Proc. Natl. Acad. Sci. USA, 116, 7662–7669,
2019.
Abstract—Cloud computing (CC) is the demonstration of the shopping. The uprightness and accessibility of this multitude of
technology that makes use of the substructure for computing in a frameworks should be safeguarded against various dangers [4].
proficient fashion. This sort of computing offers great quantity of Novice programmers, rival partnerships, fear mongers, and,
consequences in augmenting the productivity that verifies the risk surprisingly, unfamiliar states have the rationale and capacity to
handling management and decreases the cost. Intrusion detection do modern assaults against PC frameworks [5]. For that reason,
system (IDS) is widely applied for detecting malicious actions in its the information security field has become imperatively critical
host and the communication network. IDS is a procedure of to the monetary prosperity and well-being of society [6]. The
discovering activities that take place in a network and attempts to
quick expansion and broad application of electronic statistics
fulfill the confidentiality, network, or security accessibility to
handling and electronic business directed over the massive
smear the trust procedure. This article introduces an Effective
Intrusion Detection and Classification using Fuzzy Rule based
operation of the remote and wired correspondence
Classifier (EIDC-FRC) model in Cloud Environment. The goal of organizations, Web application, Internet, and CC combined with
the presented EIDC-FRC model is to determine the occurrence of numerous events of global psychological warfare, raises the
intrusions and normal data traffic in the cloud environment. In necessity for providing safe and secured data framework using
order to achieve this, the presented EIDC-FRC model applies FRC intrusion location, firewalls, and avoidance frameworks,
for data classification process. The parameter tuning of the FRC verification, encryption, programming arrangements and other
model is performed using enhanced bird swarm algorithm equipment [7]. In this battle to get our put-away information and
(EBSA). The FRC is an effective model in pattern recognition that the frameworks, IDPS can end up being a significant device,
offers effective outcomes by the use of linguistic labels in the where it will likely perform early recognition of malevolent
antecedents of the rules. The simulation analysis of the EIDC-FRC movement and perhaps forestall more genuine harm to the
model ensured the enhancements of the presented approach safeguarded frameworks [8]. By utilizing IDPS, one might
compared to recent state of art approaches. distinguish an assault and inform suitable faculty right away or
keep it from succeeding, with the goal that the danger can be
Keywords— Pattern recognition; Machine learning; Cloud contained. IDPS can likewise be an exceptionally valuable
computing; Fuzzy logic; Intrusion; Security apparatus for recording measurable proof that might be utilized
in legal procedures assuming the culprit of a lawbreaker break is
I. INTRODUCTION arraigned [9]. Be that as it may, IDPS execution is thwarted by
Cloud Computing (CC) is an arising advancement on the the high phony problem rate it produces. This is a significant
planet [1]. It is an Internet-based computing modernization, worry in data security because any misleading problems will
through which shared assets like stage, programming, data, and begin a serious effect on the framework, for example, the
stockpiling are provided to clients upon request [2]. CC is a interruption of data accessibility due to IDPS blockage in
modernization through which virtualized and progressive thinking the data to be an assault endeavor [10].
adaptable assets are provided to the client over the Internet. CC This article introduces an Effective Intrusion Detection and
clients don't claim the actual framework, consequently keeping Classification using Fuzzy Rule based Classifier (EIDC-FRC)
away from capital consumption [3]. Individuals depend on PC model in Cloud Environment. The goal of the presented EIDC-
organizations to get news, stock costs, email, and web based FRC model is to determine the occurrence of intrusions and
normal data traffic in the cloud environment. In order to achieve performed by the ABC technique by optimizing the values of
this, the presented EIDC-FRC model applies FRC for data biases and linkage weights.
classification process. The parameter tuning of the FRC model Wang et al. [15] intend to use DL for extracting
is performed using enhanced bird swarm algorithm (EBSA). The indispensable feature representations mechanically and realizing
FRC is an effective model in pattern recognition that offers high detection performance proficiently. An effectual stacked
effective outcomes by the use of linguistic labels in the contractive AE (SCAE) approach was modelled for
antecedents of the rules. The simulation analysis of the EIDC- unsupervised feature extraction. Robust and better low-
FRC model ensured the enhancements of the presented approach dimensional features are automatically studied from raw
compared to recent state of art approaches. network traffic by using the SCAE approach, a new cloud IDS
was devised depending upon the basis of the SVM and SCAE
II. RELATED WORKS classifier algorithm. In [16], an innovative hybridization
In [11], a host-related intrusion detection system (H-IDS) is technique for IDS was presented for enhancing the overall
modelled to protect virtual machines in the cloud atmosphere. security of cloud-oriented computing atmosphere. This
Due to the fact, primarily, significant features of all classes were technique employs fuzzy oriented ANN for effectual clustering
through LR, and then, such values were enhanced by utilizing of anomaly while the fuzzy oriented clustering can be
the regularization method. After that, several attacks were maximized through spider-monkey optimized method. This
categorized with an integration of 3 classifiers they are linear hybrid method overcomes the selection process and iterative
discriminate analysis, neural network, and decision tree with the classification of fuzzy clustering method by updating the fitness
bagging method for all classes. In [12], IDS was presented on value automatically.
the basis of an innovative optimized custom Recurrent CNN
which can be modelled for ID with the ALO method. By this III. THE PROPOSED MODEL
method, CNNs are hybridized with LSTM. Therefore, every This article has devised a novel EIDC-FRC model to
assault recognized with the network layer of cloud was recognize the appearance of intrusions and attacks in the Cloud
efficiently classified. Environment. The goal of the presented EIDC-FRC model is to
Krishnaveni and Prabakaran [13] modelled the Ensemble determine the occurrence of intrusions and normal data traffic in
methods for Classification and Network ID in Cloud. Ensemble the cloud environment. Fuzzy classification belonging to rule
Learning majorly aids to enhance the result of all ML constructed models has substantial compensations according to
approaches and to receive robust Classifiers. By utilizing the performance, along with the following and enterprise
Honeynet, Real Time Malicious Network Streams Samples have evaluations [17]. A limited compensation of fuzzy classification
been accumulated, which can be deployed over cloud is the interpretability of classifier rules. Consider that x =
environment. Researchers exploit Unsupervised learning and (𝑥1 , 𝑥2 , … , 𝑥𝐷 ) ∈ R𝐷 is a 𝐷 dimension feature as well as 𝐶 =
supervised learning techniques to classify unknown malicious {𝑐1 , 𝑐2 , … , 𝑐𝑚 } denotes a collection of class labels. Fig. 1 depicts
streams and recognized malicious network streams. Hajimirzaei the structure of FRC.
and Navimipour [14] devise an innovative IDS related to 𝑅𝑖 : 𝐼𝐹 𝑠1 ∧ 𝑥1 = 𝐴1𝑖 𝐴𝑁𝐷 𝑠2 ∧ 𝑥2 = 𝐴2𝑖 𝐴𝑁𝐷 … 𝐴𝑁𝐷
integration of ABC and fuzzy clustering algorithms and MLP 𝑠𝐷 ∧ 𝑥𝐷 = 𝐴𝐷𝑖 𝑇𝐻𝐸𝑁 𝑐𝑙𝑎𝑠𝑠 = 𝑐𝑖 , 𝑖 = 1, … , 𝑅,
network. Abnormal and Normal network traffic packets will be
recognized by the MLP, whereas the MLP training was
In which 𝐴𝑘𝑖 represent the fuzzy term that defines the 𝑘-th 𝑐𝑙𝑎𝑠𝑠 = 𝑐𝑡 , 𝑡 = arg max β𝑗 ,
𝑗=1,2,…,𝑚
features in 𝑖-th fuzzy rules (𝑘 = 1, . . . , 𝐷), 𝑅 indicates the 𝐷
quantity of fuzzy rules and 𝑆 = (𝑠1 , 𝑠2 , … , 𝑠𝐷 ) denotes the
binary feature vector, while 𝑠𝑘 ∧ 𝑥𝑘 denotes the existence 𝛽𝑗 (𝑥𝑝 ) = ∑ ∏ µ𝐴𝑘𝑖 (𝑥𝑝𝑘 ),
𝑅𝑖 𝑘=1
(𝑠𝑘 = 1) or nonexistence (𝑠𝑘 = 0) of classifier features. In a 𝑐𝑙𝑎𝑠𝑠𝑖 =𝑐𝑗
data set {(x𝑝 ; 𝑐𝑝 ), 𝑝 = 1, 2, … , 𝑍} the class labels are shown µ𝐴𝑘𝑖 (𝑥𝑝𝑘 ) indicates the symmetrical association operation
below: for the 𝐴𝑘𝑖 fuzzy at point 𝑥𝑝𝑘 . The quantity of classifier rate is
GA-Fuzzy 97.32 97.29 implied that the GB, BB-IDS, and CS-PSO models have
Fuzzy C-Means 92.60 92.82 portrayed worse results with 𝐹𝑚𝑒𝑎𝑠𝑢𝑟𝑒 of 87.44%, 89.37%, and
GB Algorithm 87.47 87.44 89.73% respectively. Simultaneously, the Gaussian Process and
FCM models have shown slightly better 𝐹𝑚𝑒𝑎𝑠𝑢𝑟𝑒 values of
In order to report the better performance of the proposed 91.84, and 92.82% correspondingly. In line with this, the
EIDC-FRC model, a detailed comparative examination is made Cuckoo Opt., PSO-SVM, and GA-Fuzzy models have
in Table 1 and Fig. 4. The results implied that the GB, BB-IDS, demonstrated reasonable 𝐹𝑚𝑒𝑎𝑠𝑢𝑟𝑒 values of 96.23%, 96.26%,
and CS-PSO models have depicted worse results with 𝑎𝑐𝑐𝑢𝑦 of and 97.29% correspondingly. Subsequently, the DNN-SVM, C-
HMT-BPNN, HMT-BPNN, and IPSO-NN techniques have
87.47%, 89.62%, and 89.7% respectively. At the same time, the
demonstrated considerable 𝐹𝑚𝑒𝑎𝑠𝑢𝑟𝑒 values of 97.92%, 99.65%,
Guassian Process and FCM models have shown slightly better
99.71% and 99.65% correspondingly. But the presented EIDC-
𝑎𝑐𝑐𝑢𝑦 values of 92.18% and 92.6% respectively. In line with
FRC method has increased maximum performance with
this, the Cuckoo Opt., PSO-SVM, and GA-Fuzzy models have 𝐹𝑚𝑒𝑎𝑠𝑢𝑟𝑒 of 99.76%.
demonstrated reasonable 𝑎𝑐𝑐𝑢𝑦 values of 96.43%, 96.56%, and To demonstrate the better performance of the proposed
97.32% respectively. Next, the DNN-SVM, IPSO-NN, HMT- EIDC-FRC method, a detailed comparative inspection is made
BPNN, and C-HMT-BPNN models have demonstrated in Table 2 and Fig. 6. The results implied that the GB Algorithm,
considerable 𝑎𝑐𝑐𝑢𝑦 values of 98.17%, 99.45%, 99.68%, and FCM, and GA-Fuzzy models have depicted worse results with
99.81% respectively. But the presented EIDC-FRC model has TRT of 66.71s, 66.48s, and 65.12s respectively. Simultaneously,
obtained maximum performance with 𝑎𝑐𝑐𝑢𝑦 of 99.85%. the DNN-SVM, and Gaussian Process models have shown
slightly better TRT values of 63.22, and 60.74s respectively. In
line with this, the BB-IDS, PSO-SVM, and CS-PSO models
have established reasonable TRT values of 53.83s, 51.42s, and
46.5s respectively. Next, the Cuckoo Opt., IPSO-NN, HMT-
BPNN, and C-HMT-BPNN techniques have demonstrated
considerable TRT values of 45.21s, 41.14s, 40.1s, and 41.14s
correspondingly. But the presented EIDC-FRC method has
gained maximum performance with TRT of 34.35.
TABLE II
TRT AND TST ANALYSIS OF EIDC-FRC TECHNIQUE WITH
EXISTING APPROACHES
Abstract— Security concerns related to the cloud service the access policy associated with the file allows only
model cannot be efficiently addressed using conventional ―administrative staff‖, ―principal‖ or ―HOD‖ of the session
cryptographic techniques. Therefore, Ciphertext Policy ―2022-2023‖ to decrypt the file. Thus, any user who may be
Attribute Based Encryption (CPABE) became the suitable holding any number of attributes must have ―2022-2023‖ as
choice for the data owners to enforce fine-grained access
the value of the ―session‖ attribute and must be playing the
control. Even though the sensitive data resides with Cloud
Service Provider (CSP), however, the data owner has complete role of either ―administrative staff‖ or ―principal‖ or ―HOD‖
control to determine who can access the data. CPABE schemes to retrieve the secret key. This secret key helps the data user
in existing work have been implemented either using single- to successfully decrypt the sensitive file. Given that the data
authority or multi-authority systems. In this work, multi- owner has the authority to determine the access policy,
authority pairing-based revocable CPABE schemes CPABE gained extreme popularity amongst the researchers.
methodology has been thoroughly studied. The methodology However, CPABE has multiple challenges that may lead to
adopted by the existing schemes to revoke malicious users has data breaches.
been analytically compared using various parameters. In Conventional CPABE scheme implemented a single to
addition, the approaches addressing change in users’ roles,
manage system parameters and the key generation of users.
privileges, or attributes have also been critically reviewed.
Subsequently, the challenges and research gaps identified in Although a single attribute authority entity is trustworthy,
the existing schemes have been outlined. Conclusively, in this however, if it gets compromised by the adversary, the
study, the properties required in an efficient multi-authority security of the complete system could be breached. A
pairing-based revocable CPABE framework have been single-authority system becomes impractical if the data
presented as a possible solution to subdue the identified owner includes attributes issued from different authorities to
research gaps. frame the access policy. For example, the data owner
defines the authorized set for access policy as the data user
Keywords— ciphertext policy attribute-based encryption, user should be (―Doctor having specialization in Neurology‖ and
revocation, attribute-level revocation, collusion-resistance, ―Researcher having h-Index >= 20‖). Then, the data user
multi-authority
needs to acquire these attributes from two different
I. INTRODUCTION authorities. Such implementation was not possible to
accomplish using a single-authority system. Consequently,
The conventional management of storage computing by
to address the above-specified issues many authors proposed
businesses or industries underwent a significant paradigm
multi-authority systems [2], [3]. Multi-authority system in
shift as a result of the service model of cloud storage. Cloud
CPABE suggested that multiple authorities may administer
computing boosts computing power and offers service on-
multiple attributes of a user. Thus, it became harder for the
demand with the pay-as-per-usage phenomenon and is
adversary to breach security. Multiple authors have
managed by a third party. Consequently, security concerns
proposed several extensions of multi-authority systems in
are the major challenge and threat for the users of the cloud.
CPABE addressing the key-escrow problems and the
For the past few years, CPABE has received the greatest
drawback of the single-authority system.
attention from researchers. CPABE facilitates data
The multi-authority CPABE systems are mainly of two
confidentiality and eliminates the data owner‘s concern of
types namely: Centralized and Decentralized. The major
losing the sensitive data residing on the cloud. CPABE
difference between both systems is who distributes the
scheme came up with the concept of one-to-many
secret key to the data user. In the centralized multi-authority
encryptions and attained fine-grained access control. The
system central authority distributes the secret key [2].
scheme allows only authorized users to decrypt the data
Whilst in the decentralized multi-authority system attribute
stored on the cloud. CPABE suggested that a data user must
authorities are responsible to distribute the secret key to the
possess certain attributes to acquire a secret key. In addition,
data user [3].
the scheme stated that the data owner determines the access
This paper has critically reviewed the dynamic
policy for the encrypted file. This way, the CPABE scheme
revocation of users‘ access rights in the multi-authority
managed to achieve one-to-many encryptions. Moreover,
CPABE scheme. An efficient revocation mechanism allows
only the data user whose secret key satisfies the access
CPABE to enforce fine-grained access control. Access
policy could get access to the encrypted sensitive file [1].
rights of the user should be instantly revoked whenever the
For instance, in University ―XYZ‖, the administrative
user leaves the system or is traced as malicious. In an
department restricted access to sensitive data only to the
organization, the roles of users change and consequently,
―administrative staff‖, ―principal‖, or ―HOD‖, who are
their access rights. Such changes should be immediately
working as employees in the session ―2022-2023‖. It means
incorporated to deny unauthorized access. Additionally,
besides securing data confidentiality, an efficient revocable servers and had been proved secure against brute-force
CPABE scheme should also have a mechanism to avoid attacks.
collusion attacks caused by the revoked users or by revoked A collusion-resistant proxy assisted approach had been
users and the cloud service provider. By and large, the employed by Al-Dahhan et al. [9] to address user
existing state-of-the-art revocation schemes updated the revocation. The presented scheme enforced access control
ciphertext or updated key of non-revoked users or both, to by updating the non-revoked user‘s key; however, the
deny access to revoked users and to provide continual scheme was not scalable.
access to non-revoked users. Such approaches are The construction of a decentralized multi-authority
computationally inefficient. Numerous schemes also CPABE scheme addressing access control through revoking
suggested ciphertext re-encryption; however, the re- users‘ access privileges had been employed by Zhong et al.
encryption increases the size of the ciphertext. [10]. The proposed revocation mechanism addressed the
The structure of the paper has been outlined as follows: issue through expensive computations including secret key
In the second section, existing state-of-the-art is studied. The updating of non-revoked users and re-encryption of
third section analytically compares the studied schemes ciphertext with every revocation request. After re-
based on various parameters. The fourth section discusses the encryption, the data owner outsourced the updated
research challenges to build an efficient revocable ciphertext to the cloud server. The possibility of cloud
framework for the multi-authority CPABE scheme. The fifth servers colluding with the revoked users was not discussed
section presents a possible solution. The paper is concluded in the study.
in the sixth section. Attribute-based access control had been implemented
through the update of the associated attribute group key,
II. RELATED WORK whenever any user loses an attribute [11], [12]. Later, the
This section summarizes the study of existing work approach required an update of the non-revoked users‘ keys
related to the revocation issues in multi-authority CPABE and ciphertext updates to control the revoked users‘ access
systems implemented using bilinear pairing cryptography. privileges. Both the schemes allowed forward and backward
Multiple approaches advocated key updates of non-revoked secrecy, however, the schemes were vulnerable to collusion
users to realize user revocation and ciphertext re-encryption attacks caused by revoked users and CSP. On the other
to enforce attributes level revocation. In the studied hand, L. Li, Wang, and Li [13] updated the group key of a
literature, the least discussion has been observed on the user group and the non-revoked users‘ identity keys when a
possibility of CSP colluding with the revoked users. Almost user gets revoked. Additionally, the ciphertext update was
all the reviewed schemes are dynamic and maintain forward required to achieve attribute-level revocation. The scheme
and backward secrecy. outsourced the computational burden of encryption and
Yang et al. 2012 [4] addressed the attribute-level decryption to fog nodes.
revocation through temporal-based access control by Constant – size ciphertext along with the user revocation
allowing multiple authorities to broadcast an update key for was achieved by Xiao Zhang et al. [14] through ciphertext
the non-revoked users. The keys were broadcasted at each update and non-revoked users‘ key update. The scheme used
time slot after examining the revocation list. The revocation a threshold access policy for access structure. The direct
depended on the selection of the right time slot size; approach used with every revocation increased
consequently, the scheme lacked dynamicity. Furthermore, computational cost. On the other hand, Ciphertext re-
users did not lose their access privileges but rather were encryption had been implemented by Wu et al. in the
disabled for a certain time slot. CPABE scheme designed for Named Data Network to
H., Goyal, and Singla proposed attribute-level revoke the user‘s access rights [15].
revocation by updating the attribute group key with every The scheme proposed by Vaanchig et al. [16] addressed
change in the attributes of the user. Additionally, ciphertext the key-escrow problem and proposed a scheme for
had also been re-encrypted. Such solutions increase revoking malicious users through non-revoked users‘ key
computation overhead if implemented in a dynamic updates. The scheme introduced a dummy attribute and a
environment, therefore, were impractical to implement [5]. user central key. The dummy attribute helped to achieve key
The scheme proposed by Yang et al. 2013 [6] escrow and user- revocation and the user central key helped
implemented attribute-level revocation along with to prevent collusion attacks.
backward/forward secrecy, however, the CSP‘s potential of A multi-authority CPABE scheme for enforcing fine-
colluding with the revoked users was not given enough grained access control in the cloud storage environment was
consideration. The proposed approach for revocation by proposed by Xinyue Zhang et al. [17]. The scheme
Yang et al. 2013 required a key update and ciphertext supported a large universe and CSP re-encrypted the
update, thus, increasing computational overhead. ciphertext to achieve user revocation. As the scheme
Attribute-level user revocation in the proposed CPABE outsourced decryption, the CSP performed partial
by R. Li et al. [7] had been achieved by ciphertext re- decryption and thus, reduced the computational cost of the
encryption, however, the scheme did not address the client.
likelihood of collusion between revoked users and CSP. A dynamic attribute-level revocation had been proposed
The multi-authority CPABE scheme proposed by Xu et by Z. Zhang [18]. Each attribute authority in this scheme
al. [8] employed user revocation through re-encryption of governed certain attributes and computed attribute-based
ciphertext and key by the proxy server. The scheme keys for the data user. During this process, if any attribute of
improved the efficiency of the resource-constrained IoT the user ‗u‘ gets revoked, the tag value of the corresponding
devices by shifting client-side computation to the cloud attribute of the respective user gets updated. Later, on the
request of ciphertext by the user, the cloud server re- revoked the access rights of users dynamically and
encrypted the ciphertext, using the assigned tag value. The maintained forward and backward secrecy.
scheme proposed by Z. Zhang modified the tag value to
control the access of the revoked user. This approach IV. RESEARCH CHALLENGES
increased the likelihood of the cloud server colluding with The analytical study of existing work in the previous
the revoked user. section has observed the following challenges amongst the
Dynamic and frequent changes in attributes of users had various multi-authority revocable CPABE schemes:
been addressed by Tu et al. [19]. The scheme updated the Instantly addressing both the user as well as
attributes group key whenever any user attribute was
revoked. Subsequently, ciphertext had been updated to attribute-level revocation – [4] and [20] are
control users‘ access. temporal-based, thus do not provide dynamic
Multi-attribute CPABE scheme proposed by Sethi, revocation. [7], [8], [9], [10], [14], [15], [16], [17],
Pradhan, and Bera [20] imposed user-level access control and [20] addressed only user-level revocation.
on revoked users by periodically updating the keys of non- Whilst [4], [5], [6], [11], and [19] addressed only
revoked users. The execution of the key update process in attribute-level revocation. Both the revocations are
the scheme was time and demand dependent. The attribute
addressed only by [12], [13], and [18].
authority that holds the revocation list runs this process
when a non-revoked data user holding certain attributes Revoke users, both at the system and attribute-level
requests for update key at time-period t. The cloud server in without any pre-requisite to update the key of non-
the design proposed by Sethi et al. was semi-trusted server. revoked users or attribute group key – Except [18]
As the scheme was temporal-based and each ciphertext was all the studied schemes updated the key of non-
linked with a time period, hence the cloud server updated revoked users or attribute group key.
the ciphertext after the lapse of every time interval to deny
Revoke users, both at the system and attribute-level
access to the revoked users. Consequently, instant
revocation was not possible with this approach and periodic without any pre-requisite to update ciphertext or its
ciphertext updates increased computation overhead. re-encryption – Except [4] and [20] all the studied
schemes updated or re-encrypted ciphertext.
III. ANALYTICAL COMPARISON
Resist collusion – Except [4], [9], and [16] all the
In this section, the revocation approaches of the existing studied schemes are partially collusion-resistant.
schemes studied and reviewed in the previous section have Table I exhibit that the existing studies do not provide a
been analytically compared. The Table I depicts the solution to all the above-mentioned challenges together in
comparison based on the following parameters: one single scheme. The possibility of collusion between
Type of revocation addressed – User or Attribute- revoked users and cloud service providers has been ignored
Level Revocation in the existing multi-authority CPABE schemes. Exploration
Resistant to collusion – partial or full (partial of these issues and further research is needed to build a
means only collusion attack by revoked users had framework addressing above-mentioned all the challenges in
been studied; whilst, full means the potentiality of one single scheme.
CSP colluding with the revoked users had also been V. PROPOSED SOLUTION
considered.) In this section, the solution for an efficient framework to
Pre-requisite of key update of non-revoked users or realize revocation, both at the use-level and attributes level
update of the attribute group key in a bilinear pairing-based CPABE system has been
Pre-requisite of ciphertext update or re-encryption. proposed. The proposed framework shall have the following
Fulfillment of forward and backward secrecy. properties:
A dynamic solution to user revocation without
Attainment of dynamicity.
updating or affecting non-revoked users‘ secret keys
Table I compares the contribution of existing studies
and the ciphertext.
and the methodology implemented to realize revocation.
A dynamic solution to attribute-level revocation
The comparison infers various research gaps identified in
without updating the attributes group‘s secret key
the adopted methodology by the existing schemes. The
and the ciphertext re-encryption.
comparison shown in Table I have been displayed in
pictorial form using graphs. As discussed above Fig 1 Provide the least privileges to CSP (For example,
exhibits the type of revocation contributed by the studied CSP should not be authorized to re-encrypt or update
literature. Fig 2 depicts the level of collusion resistance the ciphertext to control access of revoked users) to
achieved by the studied work. Fig 3 expresses the studied make it harder for CSP to collude with the revoked
literature majorly updated secret key of non-revoked users users.
or updated the attribute group key or updated ciphertext or Use identity and time components to protect against
re-encrypted ciphertext to address the revocation issues. Fig collusion attacks. Incorporation of an identity
3 has also shown that most of the studied literature has component within a secret key allows instant
traceability and refrains revoked users to collude.
The time component causes the expiration of the key Storage Systems,‖ vol. 8, no. 11, pp. 1790–1801, 2013.
[7] R. Li et al., ―Secure , efficient and revocable multi-authority access
and invalidates it after a time-period. control system in cloud storage,‖ 2016, doi:
10.1016/j.cose.2016.02.002.
VI. CONCLUSION [8] X. Xu, J. Zhou, X. Wang, and Y. Zhang, ―Multi-authority proxy re-
encryption based on CPABE for cloud storage systems,‖ vol. 27, no.
CPABE using single authority and multi-authority 1, pp. 211–223, 2016, doi: 10.1109/JSEE.
systems has been widely studied by researchers. This study [9] R. R. Al-Dahhan, Q. Shi, G. M. Lee, and K. Kifayat, ―Revocable,
has critically reviewed the existing state-of-the-art pairing- decentralized multi-Authority access control system,‖ Proc. - 11th
based revocable CPABE schemes using a multi-authority IEEE/ACM Int. Conf. Util. Cloud Comput. Companion, UCC
Companion 2018, pp. 220–225, 2019, doi: 10.1109/UCC-
system. The study observed that majorly the existing Companion.2018.00088.
schemes have incorporated an indirect approach. Thus, to [10] H. Zhong, W. Zhu, Y. Xu, and J. Cui, ―Multi-authority attribute-
deny access to revoked users, either key of non-revoked based encryption access control scheme with policy hidden for cloud
users was updated or the ciphertext update was storage Multi-authority attribute-based encryption access control
scheme with policy hidden for cloud storage,‖ Soft Comput., vol. 22,
incorporated. Few schemes have employed both the above- no. 1, pp. 243–251, 2018, doi: 10.1007/s00500-016-2330-8.
stated updates to revoke malicious users. Attribute-level [11] Z. Liu, Z. L. Jiang, X. Wang, and S. M. Yiu, ―Practical attribute-
revocation has been addressed by updating the attribute based encryption: Outsourcing decryption, attribute revocation and
group key or ciphertext re-encryption. Such mechanisms policy updating,‖ J. Netw. Comput. Appl., vol. 108, no. January, pp.
112–123, 2018, doi: 10.1016/j.jnca.2018.01.016.
increase computational or storage costs and are impractical [12] G. Ramu, B. E. Reddy, A. Jayanthi, and L. V. N. Prasad, ―Fine-
to implement. The potentiality of CSP to collude with the grained access control of EHRs in cloud using CP-ABE with user
revoked users has received very little attention from the revocation,‖ Health Technol. (Berl)., vol. 9, no. 4, pp. 487–496,
researchers. Eventually, the survey has been concluded with 2019, doi: 10.1007/s12553-019-00304-9.
[13] L. Li, Z. Wang, and N. A. Li, ―Efficient Attribute-Based Encryption
a possible solution. The proposed solution presented the Outsourcing Scheme With User and Attribute Revocation for Fog-
essential properties required in an efficient multi-authority Enabled IoT,‖ vol. 8, 2020, doi: 10.1109/ACCESS.2020.3025140.
bilinear pairing-based revocable CPABE framework to [14] X. Zhang, F. Wu, W. Yao, Z. Wang, and W. Wang, ―Multi-authority
realize revocation, both at the use-level and attributes level. attribute-based encryption scheme with constant-size ciphertexts and
user revocation,‖ no. March, pp. 1–9, 2018, doi: 10.1002/cpe.4678.
In future work, the proposed solution can be implemented [15] Z. Wu, Y. Zhang, and E. Xu, ―Multi-Authority Revocable Access
using pairing-based cryptography. Additionally, the Control Method Based on CP-ABE in NDN,‖ 2020.
experimental results can be compared with the existing [16] N. Vaanchig, H. Xiong, W. Chen, and Z. Qin, ―Achieving
schemes to prove the practicability of the proposal. Collaborative Cloud Data Storage by Scheme with Dual-
Revocation,‖ vol. 20, no. 1, pp. 95–109, 2018, doi:
10.6633/IJNS.201801.20(1).11.
REFERENCES [17] X. Zhang, Y. Chen, X. Yan, and H. Jia, ―Multi-authority Attribute-
[1] J. Bethencourt et al., ―Ciphertext-Policy Attribute-Based Encryption Based Encryption with User Revocation and Outsourcing
To cite this version : HAL Id : hal-01788815 Ciphertext-Policy Decryption,‖ J. Phys. Conf. Ser., vol. 1302, no. 2, 2019, doi:
Attribute-Based Encryption,‖ no. May 2007, 2018. 10.1088/1742-6596/1302/2/022026.
[2] M. Chase, ―Multi-authority attribute based encryption,‖ Lect. Notes [18] Z. Zhang, ―Multi-Authority CP-ABE with Dynamical Revocation in
Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Space-Air-Ground Integrated Network,‖ pp. 76–81, 2020, doi:
Bioinformatics), vol. 4392 LNCS, pp. 515–534, 2007, doi: 10.1109/SAGC50777.2020.00026.
10.1007/978-3-540-70936-7_28. [19] S. Tu, M. Waqas, F. Huang, G. Abbas, and Z. Haq, ―A revocable and
[3] A. Lewko and B. Waters, ―Decentralizing Attribute-Based outsourced multi-authority attribute-based encryption scheme in fog
Encryption,‖ vol. 02, no. subaward 641, pp. 568–588, 2011. computing,‖ Comput. Networks, vol. 195, no. May, p. 108196, 2021,
[4] K. Yang, Z. Liu, Z. Cao, X. Jia, D. S. Wong, and K. Ren, ―TAAC : doi: 10.1016/j.comnet.2021.108196.
Temporal Attribute-based Access Control for Multi-Authority Cloud [20] K. Sethi, A. Pradhan, and P. Bera, ―PMTER-ABE: a practical multi-
Storage Systems‖. authority CP-ABE with traceability, revocation and outsourcing
[5] V. H., D. Goyal, and S. Singla, ―An Efficient and Secure Solution decryption for secure access control in cloud systems,‖ Cluster
for Attribute Revocation Problem Utilizing CP-ABE Scheme in Comput., vol. 24, no. 2, pp. 1525–1550, 2021, doi: 10.1007/s10586-
Mobile Cloud Computing,‖ Int. J. Comput. Appl., vol. 129, no. 1, pp. 020-03202-2.
16–21, 2015, doi: 10.5120/ijca2015906807.
[6] K. Yang, A. Member, X. Jia, K. Ren, and S. Member, ―DAC-
MACS : Effective Data Access Control for Multiauthority Cloud
Key Update of
Non-Revoked Forward and
Collusion- Ciphertext Update
S.No. Scheme Type of Revocation Users or Backward Dynamic
resistant or Re-encryption
Attribute Secrecy
Group Key
Attribute-Level
1 [4] Full Yes No Yes No
Revocation
Attribute-Level
2 [5] Partial Yes Yes Yes Yes
Revocation
Attribute-Level
3 [6] Partial Yes Yes Yes Yes
Revocation
4 [7] User Revocation Partial Yes Yes Yes Yes
5 [8] User Revocation Partial Yes Yes Yes Yes
6 [9] User Revocation Full Yes No Yes Yes
7 [10] User Revocation Partial Yes Yes Yes Yes
Attribute-Level
8 [11] Partial Yes Yes Yes Yes
Revocation
9 [14] User Revocation Partial Yes Yes Yes Yes
10 [15] User Revocation Partial Yes Yes Yes Yes
11 [16] User Revocation Full Yes Yes Yes Yes
12 [17] User Revocation Partial Yes Yes Yes Yes
User and Attribute-
13 [12] Partial Yes Yes Yes Yes
Level Revocation
User and Attribute-
14 [13] Partial Yes Yes Yes Yes
Level Revocation
User and Attribute-
15 [18] Partial No Yes Yes Yes
Level Revocation
Attribute-Level
16 [19] Partial Yes Yes Yes Yes
Revocation
17 [20] User Revocation Partial Yes No Yes No
Revocation Properties
Number of Research Papers
18
16
14
12
10
8
6
4
2
0
Key Update of Non- Ciphertext Update or Re- Forward and Backward Dynamicity
Revoked Users or encryption Secrecy
Attribute Group Key
Abstract—Cloud computing (CC) delivers on-demand and organization strategy by decreasing the effort and time needs the
powerful business environments. It can be constructed on top of application of a current trend termed Cloud computing (CC) [2].
virtualized data hubs. Virtualization renders a flexible CC is all over the place, in simple terms it is determined by
infrastructure for cloud. However, scheduling the tasks and accessing and storing programs and data over the Internet rather
managing the resources in virtualized data hubs will be difficult. than computer’s hard-drive. Cloud is a representation of the
Maximizing the virtual machine utilization and minimizing the Internet. Each application in CC is presented as services
total makespan is imperative in the cloud environment. The task consistently and it is necessitated. Therefore, the services
scheduling issue can be indicated as multi-objective optimization
containing servers, application networks, storage, etc., are
problem, which is solved by utilizing optimization methods. This
efficiently and effectively exploited [3]. This leads to massive
study develops a Mantaray Foraging Optimization based
Makespan Enhancement in Cloud based Scheduling Environment
savings concerning time and cost. CC represents a well-known
(MROME-CSE) technique. The presented MROME-CSE shared-computing technique that vigorously transports
technique aims to allocate the resources proficiently in the cloud quantifiable on-demand services through global network. CC
environment. In the presented MROME-CSE technique, the provided users with diverse and limitless virtual resources that
behavior of manta rays is mainly involved. Furthermore, the are attained on-demand and have dissimilar billing standards
MROME-CSE method derived an objective function to allocate 𝒏 (static-oriented and subscription) [4]. Also, the CS (task
individual tasks to 𝒎 heterogeneous accessible resources, thereby scheduling (TS)) delineated independent task mapping
task conclusion period was minimalized and resource was fully procedures on a set of available resources within cloud contexts
exploited. The experimental evaluation of the MROME-CSE (for workflow application) for implementation within user
technique is examined briefly. The experimental outcomes stated specified QoS restriction (cost and makespan). Workflow
the superior performance of the MROME-CSE technique over (communal application related to experimental research
other recent models. including biology, astronomy, and earthquake) was shifted or
migrated toward the cloud for implementation [5]. Fig. 1
Keywords— Cloud computing; Makespan; Resource represents the overview of scheduling-based cloud environment.
scheduling; Optimization algorithm; Mantaray Foraging
Optimization (MRFO) algorithm
I. INTRODUCTION
In the fast-rising global business environments, retaining
quick application expansion in the information technology area
has been cumbersome [1]. Accelerating the software
Makespan Time
Number of Tasks MROME-CSE eDSOS DSOS
Normal Distribution
100 87 107 144
200 167 207 251
300 257 301 378
400 351 434 521
500 388 541 645
Left-Half Distribution
100 128 175 232
200 252 329 459
300 309 456 570
400 369 560 680
Fig. 2. MST analysis of MROME-CSE system under normal
500 479 570 727 distribution
Right-Half Distribution
100 89 119 209 Fig. 3 shows the MST assessment of the MROME-CSE
200 236 336 449 model under left-hand distribution. The results represented that
the MROME-CSE model has obtained effectual outcomes with
300 283 433 566
minimal MST values in all tasks. For example, with 100 tasks,
400 383 539 659 the MROME-CSE model has provided reduced MST of 128
500 403 489 666 while the eDSOS and DSOS models have obtained increased
MST of 175 and 232 correspondingly. In the meantime, with 200
In Table 1, the comparative study of the MROME-CSE tasks, the MROME-CSE method has provided reduced MST of
model in terms of makespan time (MST) is provided. The results 252 while the eDSOS and DSOS techniques have obtained
implied that the MROME-CSE model has reported reduced increased MST of 329 and 459 correspondingly. Eventually,
MST values under all tasks. with 300 tasks, the MROME-CSE model has provided reduced
Fig. 2 displays the MST assessment of the MROME-CSE MST of 309, while eDSOS and DSOS approaches have gained
model under normal distribution. The results represented that the increased MST of 456 and 570 correspondingly. Then, with 400
MROME-CSE model has gained effectual outcomes with tasks, the MROME-CSE model has rendered reduced MST of
minimal MST values in all tasks. For example, with 100 tasks, 369 while the eDSOS and DSOS models have gained increased
the MROME-CSE model has provided reduced MST of 87 MST of 560 and 680 correspondingly. Finally, for 500 tasks, the
while the eDSOS and DSOS models have obtained increased MROME-CSE approach has provided reduced MST of 479
MST of 107 and 144 correspondingly. In the meantime, with 200 while the eDSOS and DSOS methods have attained increased
tasks, the MROME-CSE technique has provided reduced MST MST of 570 and 727 correspondingly.
of 167 while the eDSOS and DSOS techniques have gained
increased MST of 207 and 251 correspondingly. Eventually, Fig. 4 shows the MST assessment of the MROME-CSE
with 300 tasks, the MROME-CSE method has provided reduced approach under right-hand distribution. The outcomes
MST of 257, while eDSOS and DSOS models have gained represented that the MROME-CSE method has gained effectual
increased MST of 301 and 378 correspondingly. Then, with 400 outcomes with minimal MST values in all tasks. For cases, with
tasks, the MROME-CSE method has rendered reduced MST of 100 tasks, the MROME-CSE approach has rendered reduced
351 while the eDSOS and DSOS approaches have gained MST of 89 while the eDSOS and DSOS models have obtained
increased MST of 434 and 521 correspondingly. Finally, for 500 increased MST of 119 and 209 correspondingly. Meanwhile,
tasks, the MROME-CSE technique has presented reduced MST with 200 tasks, the MROME-CSE model has provided reduced
of 388 while the eDSOS and DSOS approaches have gained MST of 236 while the eDSOS and DSOS methods have attained
increased MST of 541 and 645 correspondingly. increased MST of 336 and 449 correspondingly. Eventually,
with 300 tasks, the MROME-CSE model has provided reduced
MST of 283, while eDSOS and DSOS models have attained
increased MST of 433 and 566 respectively. Then, with 400
tasks, the MROME-CSE model provided a reduced MST of 383
while the eDSOS and DSOS methods obtained increased MST
of 539 and 659 respectively. Finally, for 500 tasks, the
MROME-CSE model has presented reduced MST of 403 while
the eDSOS and DSOS methods have gained increased MST of
489 and 666 correspondingly.
100 4 6 18
200 17 19 31
300 28 35 50
400 41 50 62
500 52 66 80
Right-Half Distribution
100 5 7 12
200 11 16 23
300 18 27 35
400 30 37 46
500 34 44 50
Abstract— In addition to cloud computing, fog computing has composed, aggregated & transmitted for storage and
recently been developed in order to provide services as a treatment starting IoT networks to cloud server. In reality,
modern distributed paradigm. Using the fog network, storage Cloud Computing presents a result that is transferred to
and computation can be extended to the edge of the system, centralized data centers for the storage and management
which besides providing local awareness and support for
function [4].
mobility, can resolve the problem of delay-sensitive
Internet of Things (IoT) applications frequently
applications’ service calculation. Fog networks must maintain
a proper load balance in order to avoid the problem with require an increasing number of sensors and a longer latency
certain fog nodes which are under-loaded or overloaded. As a between them and a control center. [1,2] These critical
result of load balancing, Quality of Service (QoS) applications typically necessitate strict Task Examination
characteristics such as consumption of resources and Disruption (TED), which is the total amount of time
bandwidth can be improved. This paper investigates a working between the time the task enters the system and the end of
charge distribution list in an IoT–fog–cloud collaboration the process.
system to reduce job latency and meet the QoS requirements of For the existing cloud computing infrastructure,
as many late sensitive IoT applications as possible. Besides, the
developing delay-sensitive IoT applications has created
problem of allocating workloads in such an IoT-based
more and more challenges. TSD contains not only the time
cooperation scheme is first considered, which suggests
optimum workload allotment between nearby fog nodes and required for calculation, but also the time required for
the cloud in order to reduce work provision delays. The queuing & network interruption. Even though cloud
stability is then examined using Lyapunov's drift and penalty computing offers a high-performance computer service [3–
theory, which analyzes the steadiness of IoT-fog-cloud queue 5] which is cheap, easily expandable and on-demand, it uses
scheme. large amount of information transmitted from IoT devices to
distant cloud centers which consume a vast amount of
Keywords— Workload, Fog Computing, Deep Learning, Cloud bandwidth resources and cause a considerable network
Computing delay. The development of delay-sensitive IoT applications
has become the bottleneck of cloud computing [6,7].
I. INTRODUCTION Because fog nodes are widely distributed, fog
The IoT (Internet of Things) permits to gather and exchange computing originates in the cloud and is a geographically
data for delivery services with trillions of physical objects. distributed paradigm, delivers networking power and
These services include environmental surveillance, compute closer to end-users and IoT devices. [1]. In cloud-
management of the infrastructure &house computerization only designs, the majority of the information that requires
[1]. In addition, IoT can provide people and computers with preparation, investigation, and capacity is transferred to
millions of objects for learning and interacting. Specifically, cloud workers, which may have an adverse impact on
sensors, tools and services are part of these objects [2]. The inertness, security, flexibility, and unwavering quality. The
IoT combine the cyber world and the objective planet; cloud, on its own, faces challenges in meeting the incredibly
hence, the interaction between man and the world is low latency requirements of location-aware and delay-
changed [2]. sensitive applications; however, the proximity of the mist
IoT, in particular sensors, are usually confronted layer to IoT gadgets may dramatically reduce dormancy and
with difficulties due to limited resources which often impact address the issues of incredibly low latency [11][12]. Mist
service quality & client knowledge [3]. Information is now
processing consistently associates with and upholds the algorithm [16]. More importantly, this work considered that
cloud, making a novel age of uses and administrations. fog node middleware is computationally more compatible
than end devices but is less computational than cloud. A fog
II. RELATED WORKS computing IoT based model was proposed by Ma et al. A
genetic algorithm for dropping the nodule of failure &
In 2016, Ruilong Deng et al., [5] explored the transfer power use was proposed based on the model. In order to
between cloud and fog computing's energy usage and evaluate its performance, Yousefpour et al. proposed a
transmitting delays. Cloud & fog nodes would be used to three-stage fog system mathematical model. A threshold
distribute workload, according to the researchers' findings. method was employed to download the result to decrease
The method saved energy and reduced response [18][19]. the work time. Nan et al. also utilized the Cloud of Things
The method provided an approximation of workload (CoT) scheme, which included end policy, fog nodes & a
assignment format and divided the workload into three cloud center, to evaluate its performance.
subproblems: total fog node delays, total cloud delays, and III. SYSTEM ARCHITECTURE
network transmission delays. The drawback of this system,
however, is that certain nodes consume high energy,
sometimes affecting the efficiency of the network computer
loads [13].
The workload distribution using genetic algorithms
and BIP was implemented by AdilaMebrek et al. In the
work, energy consumption & service class are two
fundamental criteria for the performance of fog processing
[17]. The 3 types of energy consumption are total usage,
usage per unit area, and usage per unit time of energy in the
processing and storage of user requests. Two problems
include the sum of transmission delays for the user request
between the target unit of the data center and cloud delays in
data processing and storage. The time frame is separated
into two subproblems. In this work, the fog design was
created as a unidirectional chart that utilized diverse
inherent BIP optimization methods. The downside of the
method is that the energy consumption is unchanged and the
IoT is delayed at low and medium scales [14].
A general IoT-based applications framework and Fig. 1. General framework for IoT-fog-cloud architecture
latency minimization policies for fog-processing devices
were proposed by Ashkan Yousefpour et al. The policy was Figure 1 depicts a framework for an IoT-fog cloud
designed to reduce IoT service delay. The objective of their architecture. Each layer of the three-layer architecture has a
study was to determine the response time for a task [15]. different computational capability. IoT includes "things"
The proposed models make decisions based on light or and home consumers, fog would include nodes, and cloud
heavy processing, so that the application is accepted by the includes dispersed cloud servers, among many other
fog node as long as the policy response falls below a components. There are various processing units available to
predetermined level. A neighboring node or the cloud will the cloud server. The network's fog layer prevents
handle the request if it does not. Fog machines are called in unnecessary transmission and performs certain cloud-based
when there are a lot of requests for light treatment. The functions [7]. Due to the capabilities of each layer, it is
incapability to start investigating multiple possibilities in a essential to determine the appropriate allocation of workload
distributed is one of the method's drawbacks. Another to each layer [10]. Decision-making is depended on criterion
drawback is that it is not able to ascertain to either assign the for improving the allocation of workload. The following
application to fog or cloud platforms on the processing criterion are:
delay.
Furthermore, researchers determined on job A. Delay: IoT submissions like virtuality, real-time
discharge depending on a model of a 3-tier fog scheme. Like applications and sensors may demand below several
Li et al., the three-level mathematical model, Wu et al. milliseconds of latencies [4]. To reduce latency, it's best to
proposed a scheme, which included end devices, fog-node process information at the IoT-fog-cloud architecture layer
middleware, and a cloud centre. The template was based on which is the nearest.
the suggested energy consumption, a task offloading
B. Bandwidth: IoT is exponentially generating information. to the dimensions used in this investigation, the findings can
Data pre-processing prior sending to the network decrease be used as the basis for a comparison of other studies.
the duration of the information, thus reducing bandwidth
utilization [4].
V. RESULTS
VI. CONCLUSION
An issue related to fog-cloud workload allocation has been
addressed in this study. Fog energy usage and cloud
postponement in computation fog and cloud workloads are
traded off in an issue process model that has been proposed.
The suggested methodology for assigning workload in an
IoT-fog cloud architecture meets energy consumption and
Fig. 5. The proportion of load balancing methods in fog delay criteria, as shown by the simulation solution of
computing replicating three directing and coordinating the activities
situations, including solitary, just, and fog-cloud.
REFERENCES
[1] [1] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog computing
and its role in the internet of things," in Proceedings of the first
edition of the MCC workshop on Mobile cloud computing, 2012:
ACM, pp. 13-16.
[2] [2] A. Yousefpour et al., "All one needs to know about fog computing
and related edge computing paradigms: A complete survey," Journal
of Systems Architecture, vol. 98, pp. 289-330, 2019/09/01/ 2019.
[3] [3] N. Auluck, A. Azim, and K. Fizza, "Improving the Schedulability
of Real-Time Tasks using Fog Computing," IEEE Transactions on
Services Computing, pp. 1-1, 2019.
[4] [4] S. Aslam and M. A. Shah, "Load balancing algorithms in cloud
computing: A survey of modern techniques," in 2015 National
Software Engineering Conference (NSEC), 2015: IEEE, pp. 30-35.
[5] [5] P. Brereton, B. A. Kitchenham, D. Budgen, M. Turner, and M.
Khalil, "Lessons from applying the systematic literature review
process within the software engineering domain," Journal of Systems
and Software, vol. 80, no. 4, pp. 571-583, 2007/04/01/ 2007.
[6] [6]. Dastjerdi, A.V.; Buyya, R. Fog computing: Helping the internet
of things realize its potential. Computer 2016, 49, 112–116.
[CrossRef]
[7] [7.] Ning, Z.; Kong, X.; Xia, F.; Hou, W.; Wang, X. Green and
sustainable cloud of things: Enabling collaborative edge computing.
IEEE Commun. Mag. 2019, 57, 72–78. [CrossRef]
[8] [8]. Masip-Bruin, X.; Tashakor, G.; Jukan, A.; Ren, G.J. Foggy
clouds and cloudy fogs: A real need for coordinated management of
fog-to-cloud computing systems. IEEE Wireless Commun. 2016, 23,
120–128. [CrossRef]
[9] [9]. Bonomi, F.; Milito, R.; Zhu, J.; Addepalli, S. Fog computing and
its role in the Internet of Things. In Proceedings of the 1st Edition of
the MCC Workshop on Mobile Cloud Computing, Helsinki, Finland,
17 August 2012; pp. 13–16. Sensors 2019, 19, 3830 23 of 24
[10] [10]. Chen, X.; Jiao, L.; Li, W.; Fu, X. Efficient multi-user
computation offloading for mobile-edge cloud computing.
IEEE/ACM Trans. Netw. 2016, 24, 2795–2808.
[11] [11] Kumar, M.S. and Prakash, K.J., 2019. Internet of things: IETF
protocols, algorithms and applications. Int. J. Innov. Technol. Explor.
Eng, Volume-8 Issue-11, pp.2853-2857.
[12] [12] Kumar, M.S. and Harshitha, D., 2019. Process innovation
methods on business process Reengineering.International Journal of
Innovative Technology and Exploring Engineering (IJITEE)Volume-
8 Issue-11, PP.2766- 2768.
[13] [13] Ganesh D, Kumar TP, Kumar MS. A Dynamic and adaptive
learning mechanism to reduce cross layer attacks in cogntive
networks. Materials Today: Proceedings. 2020 Dec 31.
[14] [14] Natarajan, V. Anantha, Ms Macha Babitha, and M. Sunil Kumar.
"Detection of disease in tomato plant using Deep Learning
Techniques." International Journal of Modern Agriculture 9, no. 4
(2020): 525-540.
[15] [15] Gampala, Veerraju, M. S Kumar, C. Sushama, and E. Fantin
Irudaya Raj. "Deep learning based image processing approaches for
image deblurring." Materials Today: Proceedings (2020).
[16] [16] Natarajan, V. Anantha, M. Sunil Kumar, Rizwan Patan, Suresh
Kallam, and Mohamed Yasin Noor Mohamed. "Segmentation of
Nuclei in Histopathology images using Fully Convolutional Deep
Neural Architecture." In 2020 International Conference on
Computing and Information Technology (ICCIT-1441), pp. 1-7.
IEEE, 2020.
[17] [17] Peneti, S., Kumar, M. S., Kallam, S., Patan, R., Bhaskar, V., &
Ramachandran, M. (2021). BDN-GWMNN: Internet of Things (IoT)
Enabled Secure Smart City Applications. Wireless Personal
Communications, 1-17.
[18] [18] Balaji, K. "Load balancing in Cloud Computing: Issues and
Challenges." Turkish Journal of Computer and Mathematics
Education (TURCOMAT) 12, no. 2 (2021): 3077-3084.
[19] [19] Balaji, K., P. Sai Kiran, and M. S Kumar. "Resource Aware
Virtual Machine Placement in IaaS Cloud using Bio-Inspired Firefly
Algorithm." Journal of Green Engineering 10 (2020): 9315-9327.
Video transcoding necessitates the use of a large units for video encoding and decoding are called
cluster-based distributed system due to its MacroBlocks (MB), and each frame in a GOP has
computationally demanding nature. IaaS clouds, such as several segments made up of numerous
Amazon Elastic Compute Cloud (EC2), provide all of MacroBlocks(MB).
the resources required to create a dynamically scaled
tier of transcoding servers. They presented a prediction- Video footage is initially recorded using a specific
based dynamic resource allocation technique to scale format, frame rate, bit rate, and spatial resolution. Once
video transcoding service on a particular IaaS cloud in on the streaming servers, the video is then uploaded.
the prior analysis. Although, server overload cannot be Typically, streaming servers must take into account
prevented by resource allocation alone. As a result, an client network capacity, gadget resolution, screen
admission control mechanism should be added to resolution, and video codec when converting the video
improve resource allocation in order to limit the source. The "Video transcoding" is the common name
incoming load on servers and prevent overload. for each of these modifications and changes.
Clients of video streams have certain QoS The remaining of the analysis is organised in the
requirements. In general, video streams must be manner listed below. The literature review is discussed
received immediately. A transcoding process that was in Section II, QoS-aware video streaming based
left unfinished at the time of presentation may create admission control and scheduling for cloud computing
this delay, or it could happen at the start of the video video transcoding in cloud computing Section III
stream. It must be encoded with a high bit rate in order discusses, Section IV discusses the findings analysis,
to produce video information of a good quality. and Section V conclusion.
Although, the transmission of video content
necessitates a significant amount of network bandwidth II. LITERATURE SURVEY
due to the high bit rate. In order to maintain a smooth
stream, streaming service providers frequently need to X. Li, M. A. Salehi, and M. Bayoumi et. al. [3]
re-encode the bitrate of their video broadcast due to the Transcoding videos on customers devices is impractical
varied network circumstances of their customers. due to restrictions in processing power and power
sources. The storage of multiple transcoded versions of
In this analysis, they provide a scheduling and the same video for use by various client devices is one
admission control method based on video streaming approach to the problem of video transcoding.
that is QoS-aware for a layer of video transcoding Although, this method calls for a significant amount of
servers that is dynamically scalable. In order to make processing power and a lot of storage space. However,
decisions regarding admission control, this strategy this method necessitates massive storage resources and
makes use of the transcoding servers queue waiting powerful processors.
time. They refer to the first delay in this study as the
missed presentation deadline and the second delay as F. Jokhio, S. Lafond, A. Ashraf, and J. Lilius et. al. [4]
the video stream initiation delay. Previous research has a method for allocating cloud resources that strikes a
shown that most streaming users do not finish watching balance between cost, efficiency, and storage is offered
videos. However, they evaluate a stream provider's by video transcoding. In this analysis, the case of video-
quality depending on how quickly the video starts on-demand is taken into consideration, where each
playing. Accordingly, to expand the fulfillment of the video contains previous execution time data (e.g.,
clients, the video web based QoS request is considered historical transcoding time). Utilizing this historical
as well as limiting the beginning postponement without data, the described scheduling and resource allocation
missing the presentation deadline time. methods schedule GOPs and ascertain the cloud's VM
count.
A video stream is made up of many sequences. Multiple
Group Of Pictures (GOP) are created for each F. Lao, X. Zhang, and Z. Guo et. al. [5] A video stream
sequence, each GOP beginning with the sequencing can be divided into different levels such as sequence
transport protocol. A GOP is basically a grouping of level, GOP level, frame level, segment level and
edges starting with an intraframe and going on with a macroblock level for the transcoding process. Multiple
few P-or B-directional expectation outlines. GOP can GOPs at the sequence level can each be separately
be divided into two groups: both open and closed GOP transcoded. At the other extreme, the transmission and
Since there are no relationships between the GOPs in a transcoding times are determined by the size of each
closed-GOP, each GOP can be transcoded sequence. In contrasted to that, frames, pieces, and
independently. In open-GOP, however, there is a macroblocks are linked geographically and temporally.
dependent on other GOPs. The fundamental processing
As a result, their processing becomes complex and make purchases that include financial transactions. At
slow. suitable intervals, a recurrent pattern of workload is
assumed.
S. Muppala and X. Zhou et. al. [6] Reporting the
CoSAC (Coordinated Session-Based Access Control) III. QOS-AWARE VIDEO STREAMING BASED
approach to providing access control for multi-tier web ADMISSION CONTROL AND SCHEDULING
applications through single-session access control. FOR VIDEO TRANSCODING
CoSAC uses Bayesian networks as a Machine Learning Figure 1 shows the block diagram of QoS-aware video
technique and furthermore offers inter-level streaming based admission control and scheduling for
coordination. By connecting each session admission video transcoding. The architecture displays the order
control with a load deferral method, it reduces the of events that occur when customers ask streaming
number of sessions rejected. service providers for videos.
F. Jokhio, S. Lafond, T. Deneke, and J. Lilius et. al. [8] Streaming Server
Transcoding time for spatial resolution reduction is
shown to be impacted by video segmentation. The
video streams are separated into Groups of Pictures for
this study (GOP). Each transcoding task in this situation
Master Controller And Resource Allocator
has to deal with many GOPs. The transcoding section is
constructed by taking into account a number of GOPs.
Each transcoding task in this situation has to deal with
many GOPs. The video stream is typically split into
GOPs, each of which is transcoded separately, to Video Splitter Video
prevent unnecessary communication lag across multiple
Manager
cloud servers (i.e., virtual machines). But initial
research indicates that transcoding segments with a
GOP is easier to arrange.
Batch Startup Transcodin
J. Almeida, C. Francalanci, I. Cunha, D. Ardagna, and Queue Queue g VM
V. Almeida, M. Trubian et. al.
[10] a single strategy for allocating resources and
controlling access to a virtualized platform that houses VM Provision
multiple web applications, with each Virtual Machine Update ing
(VM) running a distinct web service application. As VM Pro
well as addressing customers Quality of Service (QoS) vision Elasticity
needs and reducing resource use costs, optimization
Manager (EM)
intends to boost the provider's income. By only
processing the subset of requests that maximises
profitability and dynamically modifying the percentage
of capacity allocated to each Virtual Machine (VM),
this approach limits the amount of incoming workload.
Fig. 1. T he Block Diagram of QOS-Aware Videp Streaming
Based Admission Control and Ssheducling for Video T ranscoding
Y. A. Shaaban and J. Hillston et. al. [11] the use of a
congestion control strategy is provided in a Cost-Based
Admission Control (CBAC). However, there will be an streaming server, which then determines whether the
extra fee if the user decides to submit the request again requested video is offered by the video store. It begins
within the busy time. The concept is only appropriate streaming a video once it locates one in the required
for e-commerce websites if the majority of customers format. However, it will split the requested video and
send it for re-encoding if it discovers that it was only strategies. The EM generates VMs and connects them
saved in a different format or resolution than the one to the VM cluster when a video stream's or table
that was requested. A copy of each transcoded video is queue's QoS degradation rates increase. Similar to this,
kept for a certain amount of time (usually several days) EM's resource provisioning policies remove virtual
in the video store to prevent the transcoding process machines (VMs) from the VM cluster when they are
from being repeated too often.The resource allocator underutilized to save the streaming service provider
and master controller are the primary creators of money.
transcoding server cluster Virtual Machines.
To determine whether the assigned VMs are adequate
The targeted playback speed of the video stream and to satisfy the QoS requirements, EM is conducted
the anticipated transcoding server speed are the main periodically and depending on events. The scheduler is
factors that determine how resources are allocated and informed about the most recent configuration of the
distributed. VM cluster and the set of allocated virtual machines is
updated by EM. It is the responsibility of EM in the
Video Splitter: They analyze each GOP as a separate CVSS architecture to implement cloud resource
work with a separate deadline. The first frame's purchase depending on client demand rate. With VMs
presentation time determines a GOP's deadline. from the cloud provider being dynamically allocated or
Customers think about video on-demand streaming, deallocated, EM supports resource provisioning
where the GOP has to finish its transcoding but ignores capabilities for this purpose. The transcoding scheduler
its deadline (like Netflix and YouTube). In this is then instructed by the procedures to account for the
approach, close-GOP types where each GOP can be modifications in its task mapping decisions. While
processed independently are considered. Allocating conforming to QoS requirements for video streaming,
GOPs to the encoding server is the responsibility of the provisioning strategies attempt to keep costs to the
transcoding job scheduler, also known as the stream provider to a minimum. Scale up quickly and
transcoding scheduler. The goal of the scheduler is to scale down gradually is the guiding philosophy of EM's
meet the minimum start delay and minimum timeout resource provisioning practises.
error rate requirements for customers for video streams.
Cloud distributor provides VMs to process the GOP
In the scheduling queue, several GOPs from various tasks. The homogeneity of the allocated VMs is
video streams are mixed together. Additionally, the assumed for the purposes of this analysis. Future
scheduler has no information of or doesn't make any analysis will be done in the scenario of heterogeneous
assumptions about the GOP's pattern of arrival. A VMs. Data needed for GOPs is preloaded before
different queue, the startup queue, is monitored to execution in each VM's local queue. Even after the
shorten the time it takes for video streams to start up. local queue is entirely full, the scheduler still assigns
Initial GOPs are delivered to the startup queue, which GOPs to VMs. Due to the homogeneous of all allocated
has a higher priority than the batch queue, for each new VMs, the local queue sizes for all transcoding processes
video stream. GOP-specific data is placed into each are the same.
VM's local queue before GOP transcoding is carried out
to prevent performance delays. Variability in a virtual GOP processes in local queues are assumed to be
machine's performance can also be attributed to other scheduled along FCFS paths and the scheduler is
virtual machines that share a physical host with the notified whenever space becomes available in the VM's
virtual machine in the cloud datacenter. For example, local queue to allocate a VM GOP. To produce the final
the performance of a neighboring Virtual Machine (i.e. transcoded) video stream, organizing all of the
(VM) will differ if there is no such neighboring VM transcoded GOPs in the desired order is an important
because the VM will suffer from memory access if it part of video compression. The stream that has been
has a lot of memory accesses. transcoded is returned to the video repository for client
access through the video integration.
To meet customer QoS requirements and save
expenditures its spending on streaming providers, EM IV. RESULT ANALYSIS
regulates the transcoding performance of virtual The suggested QoS-aware video streaming admission
machines in video transcoding and QoS-aware video control and scheduling for cloud computing video
streaming-based access control scheduling and resizes transcoding is examined in this section. The suggested
virtual machine clusters accordingly. For this reason, model's performance is evaluated using the following
EM dynamics (such as) Virtual Machines are allocated definitions for True Positive (TP), True Negative (TN),
and released from cloud providers according to False Negative (FN), and False Positive (FP):
customer needs by flexible resource provisioning
True Positive (TP): TP is the total number of correctly Table 1. Performance Analysis
classified actually positive predictive instances that are
all positive predictions. Video
streaming Video
True Negative (TN): The total number of actually Performance based on streaming
negative, correctly classified negative predictive Metrics scheduling for
instances is known as the TN. VT
QoS 99.1 76
False Positive (FP): FP is the total number of positive (%)
prediction instances that are not actually positive and
are labelled as having error. Accuracy (%) 98 82
False Negative (FN): The amount of completely
incorrectly classified, actually neutral, negative
predictive instances, or FN, is given. Recall 93 85
(%)
In a network, a collection of techniques known as
Quality of Service (QoS) is utilized to make sure that The above table shows that the Video streaming based
high-priority traffic and applications can operate on scheduling for VT gives the higher QoS, accuracy
effectively within a constrained network capacity. By and recall.
providing differentiated management and capacity
allocation to specific network traffic flows, QoS
solutions achieve this.
VI. REFERENCES
Abstract: Massive amounts of extremely far-off data their own. ML makes it possible for machines to perform jobs
are now being sourced from the telecommunications networks. that have historically been handled by people. [4,5,6] With the
Additionally, this information may be acquired via network expectation that more design-related procedures would soon
business traces, network logs, warnings, signal quality indicators,
be automated and that machine control of the communication
drug addicts' behavioral data, and other sources. Advanced tools
are required to collect useful data.. Machine learning is one of network will become the norm, the notion of automating such
these fantastic technologies (ML), which is considered as one of professions has attracted a lot of interest in the networking
the most promising tactical answers for analyzing network data community. Applications of machine learning in many
and automation. The recent increase in network difficulty networking settings.
contributes to the abandoning of ML techniques in the context of
optical communication networks. In this study high-level Machine learning for optical networking is one of the
overview of networking and ML to optic dispatches are networking [7, 8, 9] applications on which this study focuses.
analyzed. This article, outlines the problem, review the relevant Due to its high capacity, cheap cost, and a multitude of other
literature, and provide experimenters and analysts interested in
this field an introduction to machine learning. By providing new enticing features, optical networks constitute the main physical
possible exploration guidelines to encourage more advancement infrastructure of all large-provider networks worldwide.
in this field, we infer the research. Even if recently reasonable
investigation documents have appeared, machine learning's In reality, cross-layer situations, where data analysis
application to optical networks is still in its infancy. at the physical subcaste, such as covering Bit Error Rate
(BER), [10, 11, 12] can prompt modifications at the network
subcaste, including routing, diapason, and assignments of
Keywords: BER, OSNR, Neural Networks, Optical modulation formats, are very beneficial, ML operations are
Communications and Networking, Data Analytics, Machine particularly helpful. [13, 14, 15] From a networking
Learning, and Network Monitoring. standpoint, several changes in the knowledge aero plane and
I. INT RODUCT ION later the control aero plane show the escalating complexity of
the underlying transmission systems. [16,17,18] In response to
The branch of data science known as machine the increased need for flexibility in allocating optic network
learning (ML) [1,2,3] provides machines with appropriate resources on the knowledge aeroplanes, a new optical network
data enables them to learn how to solve a specific issue on structure known as the Elastic Optical Network (EON)
saved. A nonlinear optimization trouble with a convex goal (C)methods of semi-supervised learning
feature must be solved to make your mind up the parameters
of SVMs, that environment friendly algorithms exist.SVMs
have the good thing about being during a position to embed
statistics into a greater dimensional house during which
records factors will be linearly distributed.
(B)Unsupervised learning:
mastering techniques, the discussion is still important. Being of this section provide a high-level overview of the primary
too big or too little has a flip side, which is model selection. applications of ML in optical networks, which are shown in
When the model is simply too complicated for the sho rt Figure 6 and emphasize the potential benefits of ML. A
dataset, overfitting happens (for example, a excessive comprehensive assessment of the preliminary results may
quadratic order within the instance of regression with potentially be the next step. The network and physical layers
quadratic foundation features or a big kind of concealed are both covered by Divisions IV and V.
neurons within the case of a neural network). In this case, the
model will match the educational data too closely, including Relevant computer mastering techniques: ML regression
noisy samples and outliers, but it will also result in poor algorithms are often skilled to exactly expect post-amplifier
generalization, or incorrect predictions for brand-new data energy tour in response to the addition/deletion o f positive
points. On the other hand, choosing models that are no longer wavelengths to/from the machine thanks to the availability of
sophisticated enough to capture important informative previous records obtained via monitoring community status.
features results in underfitting (for example, once we use a
linear mannequin to healthy polynomial data). Recognizing formats for modulation (MFR).
to make improvements in optical communication by enabling 19. J. Shanmugasundaram, G. Raichal, G. Dency Flora, P. Rajasekaran, and
V. Jeevanantham, “Classification of epileptic seizure using rotation
more intelligent and adaptive techniques. forest ensemble method with 1D-LBP feature extraction,” Materials
T oday: Proceedings, 2021.
REFERENCE
Abstract— Wildfires do irreparable damage to forest and by common public. This makes every individual being
ecosystems and increase global warming by releasing carbon accountable for their actions towards the environment. In
dioxide and other pollutants into the atmosphere. As order to build the application, an effective sensing unit is
individuals breathe in excessive levels of pollution, the developed which monitors the environmental condition of
accompanying smoke and haze can travel great distances and the location and alert in case of fire. This is an example of
cause public health emergencies. Uncontrolled wildfires reactive mode of the application which serves upon
destroy property and natural tourist attractions, contaminate occurrence of the fire. In order to predict the futuristic trends
water supplies, and cripple economies every year, resulting in of fire pattern, machine learning algorithms are applied to
billions of dollars in economic harm. The predominant aim of
enable the application to act proactively.
this work is to preserve the environment and prevent forest
fire through monitoring the ambient conditions, mapping fire The beneficiaries of the application are classified into
prone zones. In order to do so, a sensory unit which is capable three groups:
of performing regular assessment of location is discussed.
Further appropriate machine learning model to ascertain the i) Government and Forest Officials
wildfire condition as early is investigated with great interest. ii) Fire Fighters who used to work on controlling the
spread of forest fire and
Keywords—Forest fire, Linear regression, Machine learning,
Principal component analysis, Wireless sensor networks iii) Common Public
In recent days, all are looking for mobile based
I. INTRODUCTION applications for its effective usage. On their mobile devices,
Globally, circumstances are now more prone to fire due the respective officials as subscribers get email and SMS
to climate change, forest degradation, and fragmentation. alerts. Additionally, the authorized user of the interactive
Fires, whether started by humans or by lightning, are more mapping on web portal design, one can pick and see fires
likely to spread over wider regions and burn at higher that happened during a certain time period using a time
temperatures in hotter and drier conditions. Forests that have slider, or they can overlay the data with other data, including
been damaged by logging, illness, and deforestation are also land-cover data, to determine the extent of the forest fire's
more prone to fire. devastation.
The statistical report on wildfire over the year 2021
published on January 13, 2022, states that India observed a II. RELATED WORK
count of 345,989 wildfires in the duration of November 2020 Zouiten Mohammed et al. [2] conducted a deep
to June 2021 [1]. This would be the highest reading so far for investigation on suitability of machine learning algorithms in
this time period in the nation. According to data presented in detecting wildfires. Researchers can use this algorithm to
the Rajya Sabha on December 16, 2021 by the minister of forecast forest fires and locate risk zones. By giving alerts
state for the union environment named Ashwini Kumar and presenting on maps based on geographical treatments for
Choubey, minimum of 258,480 wildfires were recorded in better effectiveness and scenario analysis, a system utilizing
2018–19, making them the second-highest thus far. Madhya machine learning algorithm on geo-data would be able to
Pradesh saw an increase in forest fires of 87.6% from 2017 signify the relevant parties and representatives in real time.
to 2021, whereas Maharashtra saw an increase of 13.4%. Rony Teguh [3] presented an application to use community
Forest fire risk can be decreased via prescribed burning, reporting via smartphones in order to identify the risk and
better infrastructure upkeep, awareness-raising and fire spread of fire in peat lands as early as feasible.
prevention education, and regulatory interventions like fire Smys et al. [4] investigated long range technology in
bans. Forest resilience to fire is increased through preventing detecting forest fire risky area through deployment of
deforestation and forest degradation. wireless sensor network to assess environmental changes and
The preliminary objective of the proposed system is to demonstrated its efficacy using simulator tool. Ali Khan et
bring real time applications on forest fire detection and al. [5] conducted a deep survey to reveal the significance of
control activities that easily accessible to respective officials machine learning in the process of assessing forest fire in
advance. They proposed a transfer learning solution over aerial vehicles. For a variety of aerial photos, the method
VGG19 to achieve improved prediction accuracy as 95%. attained good accuracy.
The proposed model was evaluated against the machine
learning approaches like linear regression, k-nearest Peter Peinl et al. [13] detailed a Web application that the
neighbor, random forest, naïve bayes and SVM. Fulda University of Applied Sciences created and put into
use for the ASPires project. The programme increases the
Raghad K. Mohammed [6] applied deep neural network capabilities offered to Crisis Management Centers (CMC).
in order to predict forest fire patterns. Artificial Neural The CMC staff has access to real readings from sensors
Network (ANN) is widely exploited in the majority of placed in test locations, such as national parks, as well as
human endeavours in the current world. The authors images captured by cameras positioned on Unmanned Aerial
recommend using deep learning technology with transfer Vehicles (UAVs) or stationary observation towers in the
learning to extract aspects of wildfire, smoke pattern of fire vicinity of a real or simulated wildfire. Data are sent to the
and smoke quality. From the dataset, which consists a Aspires cloud and quickly delivered via an open interface to
number of 1,102 photos for each fire and smoke class, they the Web application.
employed an Inception-ResNet-v2 network that has already
been trained on the ImageNet dataset. The performance The following list provides the top most mobile
applications built in evaluating forest fire with ambient
metrics like classification accuracy, specificity, precision,
recall and F1-Score were all 99.09%, 100%, 98.08%, conditions over the smart phone.
99.09%, and 98.30%, respectively. • Fire Map
Seyd Teymoor Seydi et al. [7] introduced a deep learning • Wildfire Map
framework for detecting active fires from the burning
biomass, called Fire-Net, based on Landsat-8 images. For a • AFIS Wildfire Map
more accurate portrayal, the authors specifically combine the • Alert Cops
optical (Red, Green, and Blue) hues with thermal modalities
from the photos. Additionally, the network makes use of the • First Aid
residual based convolution network, allowing for the • Foc Control: Forest Fire Prevention
extraction of more detailed features from the sparse datasets.
Experimental results demonstrate robust detection of small • Fireguard Wildfire Tracker – Google Play Store
active flames and overall accuracy of 97.35 percent. For this • FireFringe – Google Play Store
study, images from forests in Amazon Rainforest, Australia,
Central Africa, Chernobyl (Ukraine), North America, and Each works for the specific purpose like locating fire in
where forest fires are frequently reported, were used. map, alerting respective personnel’s for corrective actions.
Here the proposed application will provide all the significant
Anupam Mittal et al. [8] in their article narrated the operations (education, monitoring, mapping, and alerting) as
impact on machine learning algorithms in detecting forest single application.
fire. They summarized the wireless sensor network for forest
fire detection also evaluated various machine learning
algorithms like ANN, decision trees and support vector III. PROPOSED MODEL FOR WILDFIRE DETECTION
machine (SVM). The SVM exhibited better performance in Researchers of interest in this domain strongly believed
predicting forest fire. Pragati et al. [9] developed an IoT that the continuous assessment of atmospheric changes helps
based sensory circuit to read environmental state and in diagnosing forest fire risk zones. In aligned with the
continuously assessed the same with the help of machine proposed system is to develop an effective model for regular
learning algorithm in detecting fire. To reduce false monitoring of the environmental condition and predicting the
prediction, decision tree is employed in this work. Sonal Sigh fire in advance with the help of a handy design of sensory
[10] developed a way for incorporating machine learning circuit which is cost effective and low energy model. It is
algorithm over color detection techniques to find wildfires planned to be implemented through various phases listed and
and notify authorities of their location. In addition to this, explained below.
knowledge of wildfire incidence and risks associated with it
is practiced. Soundarya Goski et al. [11] conveyed that due A. Sensing Hardware Design
to forest fires, carbon dioxide emissions are at an all-time
The Sensing Unit (SU) is constructed as a nearly
high. By increasing tree planting and making climate change
spherical form to withstand outside forces and with
a global priority, we may decrease wildfires. The
characteristics to guard against damage from the hard
accomplishment of this task will benefit from a dependable
circumstances present in tropical forests. The SU is used to
fire control system. Also executed an artificial intelligence
measure the following parameters: CO level, light intensity,
based framework to extract information on forest fire and act
temperature and humidity [14]. The SU is organized as three
accordingly.
layers. The lithium-ion battery is intended to be placed in the
Wonjae Lee et al. [12] developed an unmanned vehicle to uppermost layer, while the connection board,
control forest fire through detecting the wildfire of interest microcontroller, and voltage regulator are intended to be
with satellite images. Low temporal and spatial resolution of placed in the middle layer. The sensors mounted at bottom
satellite pictures prevents its utility for early wildfire layer as looking downward, also viable to observe the
identification. Unmanned aerial vehicles can deliver high aforementioned environmental variables. Thus SU is
definition photos for wildfire identification at a reasonable designed in a way to track atmospheric values in
cost. Deep convolutional neural networks were used to create coordination with a micro-controller, transceiver module,
a wildfire detection system that makes use of unmanned and power components. Batteries are utilized as the primary
power source and solar panels are used as the backup power take the transceiver's antenna outdoors. The rear side of the
source to deliver power to the sensor node as in Figure 1. SU is attached to the mounting brackets and supporters for
the node on the tree trunk.
In the proposed model, to compute forest fire index
(FRI), the land elevation, its cover, surface temperature, and
slope are accounted as the natural parameters, whereas the
proximity to settlements and roads are treated as the
anthropogenic factors. The FRI is expressed as shown in
Equation (1) as follows:
(a) (b) FRI Wi Ci (1)
Fig. 1 Design of sensing unit presenting a) Spherical Outlook and b)
Inertial Components of it (Source: Dampage et al.) Where Ci stands for various classes within each variable
and Wi is the relative weight of the variable. The process
To guard against the damaging impacts of weather flow of machine learning model for the proposed model is
elements including rain, strong gusts, and foreign items like illustrated in Figure 2 and elaborated in the following section
leaves, all of the sensors are permanently mounted looking B & C. The section B discusses the preprocessing and C
downward. A hole from the outside of the SU is intended to focuses classification algorithm.
7 5 Mar Fri 86.2 26.2 94.3 5.1 8.2 51 6.7 0.0 212.88
7 4 Oct Tue 90.6 35.4 669.1 6.7 18.0 33 0.9 0.0 278.53
7 4 Oct Sat 90.6 43.7 686.9 6.7 14.6 33 1.3 0.0 0.0
8 6 Mar Fri 91.7 33.3 77.5 9.0 8.3 97 4.0 0.2 746.28
8 6 Mar Sun 89.3 51.3 102.2 9.6 11.4 99 1.8 0.0 1090.84
E. Evaluation Results
To pinpoint the complete efficiency, the proposed
classifier is exercised on the above mentioned dataset. The
cross validation strategy used is 80:20. The proposed
machine learning model is implemented using R Fig. 3. Prediction of damage per month
programming. From the attributes, one can measure the And from the above graphic damages can be predicted
damages caused by the wildfire, attributed into five over months with the help of R programming in about 10 ms
classification labels namely low, moderate, high, very high and the following things are deduced:
and no damage and it is captured in Figure 3.
August saw a majority of small (less than 1 hectare)
fires
In just 3 months—august, July, and September—the the region of fire. The dataset chosen is prepared for
extremely substantial damages (>100 hectares) classification after completing the necessary pre-processing
occurred. tasks such as cleaning, noise removal and feature extraction.
Then deep learning algorithm which is combination of linear
The root mean squared error, or RMSE, is the statistic regression and random forest is exercised over the data in
used most frequently to assess the performance of linear order to predict fire patterns in advance. It gives the accuracy
regression models and the mathematical formula to compute as 98.76%. The error rate estimated by the model is found to
the same is given in Equation (6). be >0.5, which is accounted as ―good‖ model.
n In order to improve the proactive measure regarding the
(y i yˆ i ) 2 fire region, the geographical dataset will be the best choice.
RMSE i 1
(6) Further deep learning model can be implemented as a mobile
n application for its realization over the beneficiaries.
―End-User Application for Early Forest Fire Detection and system using wireless sensor networks and machine learning‖,
Prevention‖, In Proc. of 14 Annual International Conference on Scientific Reports, vol. 12, Article no. 46, pp.1-11, 2022.
Computer Science and Education in Computer Science, pp. 1-19, [15] P. Cortez and A. Morais, ―A Data Mining Approach to Predict Forest
2018. Fires using Meteorological Data‖ In J. Neves, M. F. Santos and J.
[14] Udaya Dampage, Lumini Bandaranayake, Ridma Wanasinghe, Machado Eds., New Trends in Artificial Intelligence, Proceedings of
Kishanga Kottahachchi and Bathiya Jayasanka, ―Forest fire detection the 13th EPIA 2007 - Portuguese Conference on Artificial
Intelligence, December,Guimaraes, Portugal, pp. 512-523, 2007.
Learning Algorithm
Pruthvi Priya P M Dr. Hemavathi P
Computer Science and Engineering, Assistant Professor, Computer Science
(M.Tech Student) and Engineering,
Bangalore Institute of Technology Bangalore Institute Technology
Bangalore, India Bangalore, India
pruthvipriya.pm@gmail.com hemavathip@bit-bangalore.edu.in
Abstract—In this digital system, the data is transferred you may find business logic, links, buttons, form fields, audio,
through online in the several form. Safety measures are and video. The free Acrobat Reader tool makes it simple to
employed in critical places like healthcare, banks, etc. view PDF files on Windows or Mac OS, and they may be
Nowadays the application of machine learning for solving electronically signed. Many detection techniques, including
problems has increased. Adversarial examples are the learning-based, keyword-based, tree-based, and code-based
term used to describe such variations. Early research ones, have been developed to overcome the challenges posed
mostly concentrated on machine learning models for by PDF malware assaults. The primary method used by
image process after moved to other applications, such as malware authors to distribute malicious PDF documents is
JavaScript. JavaScript can be used to take advantage of
those for malware detection. Finding adversarial
vulnerabilities in PDF readers and web browsers.
examples for ML-based PDF malware detectors is the
part of work. Machine learning has apparently delivered A method known as generative adversarial networks is an
extraordinary and, in some cases, human-competitive intriguing new advancement in machine learning (GANs).
performance in classification tasks. Hackers can attack GANs, or generative models, create new data instances that
and extract the data easily. This proposed work has resemble your training data. GANs, for instance, are capable
considered generative adversarial networks (GANs) to build of producing visuals that resemble photos of human features
variant PDF malware without any problem that may be although when such pictures don't actually belong to any other
identified as benign by using several existing classifiers while living being. It has been demonstrated that even a small
preserving the original harmful behavior to address the amount of noise added to the initial input may easily fool the
challenge. Features extraction method, which includes special majority of frequently used neural networks into classifying
features derived from malicious PDF files, to quickly produce objects incorrectly. Surprisingly, the model has greater
an evasive variant PDF. The PDF GAN is used for the malware confidence in the incorrect forecast than it does in the true one
detection in PDF files. after introducing noise. This opponent occurs because most
machine learning methods only train from a tiny quantity of
Keywords— malware analysis, Portable Document Format data, a significant drawback that leaves them open to
(PDF), Generative Adversarial Network (GAN) overfitting. The translation between the source and the load is
I. INTRODUCTION also almost linear. Because the boundaries separating the
different classes are really constructed of linearity, even a
A number of safety-critical industries, such as healthcare, small alteration in a feature's position might result in incorrect
transportation, and aerospace, may currently utilize cyber data categorization.
physical systems (CPS) as a combination of the rapid
development of computer, networking, and sensor The three components of generative adversarial
technologies. Machine learning approaches have become networks (GANs) are as follows:
more widely used in recent years to address control and • Generative: To understand how data is produced using a
decision-making issues in a range of cyber-physical systems. probabilistic model, or generative model.
A cyber-physical system may classify items in a typical
application and then carry out operations depending on the • Adversarial: A model is trained in an adversarial
determined classification. It appears that machine learning has environment.
produced exceptional results for categorization tasks,
• Networks: For training purposes, deep neural networks
sometimes even matching human ability. Attackers can
are used as artificial intelligence (AI) systems.
quickly overcome these learning-based systems by
purposefully generating hostile situations or making small In GANs, both a generator and a discriminator are
modifications to the input data that result in incorrect present. The Generator creates samples of data in an effort
categorization during testing. to trick the Discriminator (such as an image, audio, etc.).
The Discriminator, on either hand, aims to distinguish
Our world is a PDF world. We are aware that utilizing
between authentic and fake samples. Since both the
PDFs allows you to do your most important tasks. We
Generators and the Discriminator are genetic algorithms,
developed the Portable Document Format, generally called as
they interact with one another throughout the training stage.
a PDF, to present and interchange documents uniformly
Each time the operations are performed, the Generator and
independent of software, hardware, or operating system. The
Discriminator get better at what they're doing.
PDF is now maintained by the International Standards
organization as an open platform (ISO). In PDF documents,
II. RELATED WORK A new deep learning-based malicious PDF file detector
Using a visualisation tool created by Soon Heng Tan called MMPD may now be installed on mobile robots [14].
Mavric and Chai Kiat Yeo [1], the infection in PDF may be The system's hardware resources are being used judiciously in
viewed. Shellcode can be executed at any time once it has the interim, and performance has not significantly changed as
been saved in the computer's memory. Bytes in a file are a whole. Utilizing the fvGAN, Yuanzhang Li et al.[15] created
translated into pixels of various colours that resemble a two- adverse relevant features in the subspace that were later turned
dimensional heat map in the suggested online binary into instances of adversarial malware.
visualisation application. A human analyst can discern They [Velayati and Fard] [16] presented a novel MVL
between the existence of Js and – security in a PDF document technique that makes use of a number of feature sets and
by mapping several colour schemes. Using data mining supplementary data to identify files. M. Mimura [17] proposed
techniques, Samir G. Sayed and Mohamed Shawkey [2] a novel approach for detecting macro malware in a dataset
demonstrated a novel strategy for identifying phoney PDF with an asymmetric distribution. The models employed
files. The feature selection stage is used to choose the right include Doc2vec and Latent Semantic Indexing (LSI).
number of characteristics to extract from Pdf document in
order to obtain a high detection performance and a reduced Tajuddin Manhar Mohammed et al. [18] created a
false alarm with the least amount of computing cost. straightforward yet effective holistic technique based on
signal and statistical analysis of malware binaries to recognize
To determine whether vulnerabilities are exploited in the PDF malware [19].
pdf malware, Xin Zhou et al. [3] merged bioinformatics,
genetics, and the exploitable malware gene for pdf. Malware We looked into potential malware detection classifiers and
detection and classification are done using the PDF SR Gopaldinne et al. studied the file structure and operation
exploitable malware gene [4]. According to [5], Yun Feng and of PDF files [20][21]. Yuntao Wang [22] provided an
others, a method has been devised to automatically extract and explanation of how PDF files function. They devised a method
detect any potentially compromised personal data from a PDF to recognize malicious JavaScript-based documents. We were
document. able to identify more targets than with just the prior static
detection method thanks to the addition of de-obfuscation to
To help with comprehension of the variations in how these the static analysis.
two forms of JavaScript distribute keywords, Antoine Lemay
and Sylvain P. Leblanc [6] looked at the JavaScript code of III. METHODOLOGY
malicious and benign PDF files retrieved from VirusTotal
A. Overview
Intelligence. Through image processing, Andrew Corum et al.
[7] have suggested learning-based methods for detecting PDF In the existing models uses a binary display of PDFs to
infections. The PDF files are transformed utilizing image detect malware. The existing technique trains robust
visualization techniques into grayscale images. Then, utilizing classifiers for PDF malware that have robustness qualities that
the photos, a variety of visual traits of both dangerous as well can be verified. And illustrate a malware classifier's worst-
as non-malicious Pdf documents are retrieved. Finally, case behavior. Verified robustness properties are satisfied by
classification models for fresh PDF files are developed using the training classifiers.
learning techniques. Limitations of the existing system are: It is challenging to
Sushmetha, N. et al. [8] proposed a novice method that distinguish dangerous data from original data that looks
focuses on sanitising PDF files rather than identifying and similar. The PDF file's complex file structure makes it easier
removing dangerous PDFs. Based on a collection of malware for the harmful information to escape detection. Increase the
samples called Contagio Dump, sanitizes all potentially unlimited attackers' evasion cost. The current evasion tactics
harmful PDF samples without any false positives or negatives take a long time to collect each sample.
being found. N. Nissim and co-authors [9] have studied With the help of the GAN approach, the model can detect
vulnerabilities and malware delivery techniques with a similar malware by learning from a collection of train data and
scope. Sec-Lib assists large digital libraries in spotting phone producing data that has the same features.
PDF documents. A machine learning-based layer is used to
detect newly discovered malware, while a deterministic layer 1) Structure of PDF file
is used to identify known malware. A PDF document structure consists of four components,
as illustrated in Figure 1: the head, the content, cross-reference
H.-M. Sun et al. [10] proposed a methodology based on table and footer. A PDF file consists of seven-bit ASCII
the detection of malicious Open XML documents. This characters throughout, with the probable exception of some
framework's architecture is focused on the ideas of spots that could include binary data. The file's header contains
automation, adaptability, and customization. A brand-new the format version, such as % PDF-1.7. The body portion of
descriptive structure for the chosen documents. [11] Then, as the document contains the document's objects and data.
a unified system, we presented a two-tiered concept for
identifying bogus documents. The eight various types of items that a PDF can support. A
dictionary object has value pairs, as related to a names object,
S. C. Vitel et al. [12] explored and provided a method that which only has unique values. The given numbers used to
seeks to maximize detection rate while minimizing the amount identify things show whether they are the primary objects that
of false positives. In this cutting-edge area of research, make up dictionaries or the indirect objects. The mapping data
Hossain and Ayub [13] employed cutting-edge approaches to for arbitrary and direct access is maintained in a cross-
experimentally determine the best parameter selections for reference table, so an item can be located without needing to
such highly flexible algorithms. search the file. Remember that while rendering a PDF, readers
begin showing the information from the footer at the bottom file, contained material may cause memory spraying, allowing
of a file. malicious payloads to be executed. The PDF is a complex file
format, it is easy to embed any kind of file in a PDF document,
PDF file contains the contents which is no in display and attacker can include the malware code to PDF file.
format. A PDF file must first be transformed into an image Malware in PDF file can steal the data that present in the file.
(view) format before its contents can be displayed. To help
users discover a certain object more quickly, the trailer B. PDF-GAN
provides the offset number needed for the PDF reader to Two neural networks compete with one another in a
recognize the cross-reference table. Consider an example i.e., machine learning (ML) model known as a generative model
trailer << /Size 7 /Root 3 0 R >> startref 2006 %EOF. In this, (GAN) to produce predictions that are more accurate. GANs
the offset is 2006 bytes, ‘/Size’ indicates the number of items often work independently and gain knowledge via playing
in cross-reference table. The cross reference table contains all cooperative zero-sum games.
the objects which is in the file.
The discriminator and generator are the two genetic
algorithms that comprise a GAN. The discriminator is de-
convolutional neural network, whereas the generator is
convolutional neural network. The generator's goal is to
provide results that consumers could mistake for real data.
Finding out if the outputs it obtains were created purposefully
is the discriminator's goal.
Training a GAN has two parts:
• Part 1: When the Generators are not in use, the
discriminator is still being trained. The network only
experiences forward propagation during this period;
there isn't any back propagation. The Discriminator is
Fig. 1. PDF structure placed to the test to determine if it can accurately
recognize them as real after being trained on real data
The cross-reference flows object, an offsets to the cross- for n epochs. At this point, the Generator also trains the
reference table's starting (starting with the xref keyword), and Discriminator with fictitious data to see how well it can
the % EOF end-of-file marker are all found in the footer of a identify them as such.
PDF file.
• Part 2: The Generator is being instructed, but the
In the absence of a cross-reference stream, the footer is Discriminator isn't. We may use the expectations to
followed by the trailer term and a dictionary that contains the training the Generator and advance from the
information that would typically be in the dictionaries of the Discriminator's previous state once the Discriminator
cross-reference flow object: has been taught using the Generator's faked data.
• References to the catalogue, also referred to as the tree After a few iterations of the aforementioned process, the
structure's root object (/Root). bogus data is manually checked to see if it still seems
authentic. If the training seems appropriate, it is over; if not,
• The cross-reference table's size (/Size) indirect object it is allowed to continue for an a few epochs.
count.
C. Proposed system
• Additional optional details
For training the GAN model the dataset consists of
2) Types of malware in PDF file samples of 15000 files data. Which consists of the details of
PDF malware consists of three types of attacks, JavaScript PDF files such as object, end object, trailer, xref, pages,
attack, ActionScript attack and File-embedding attack. Each JavaScript, OpenAction, embedded files and etc.
of the three forms of PDF attack is explained.
By classification of malware would preclude PDF would
(1) JavaScript script that can be injected in one or more have a negative effect on PDF performance by preventing
objects is used in JavaScript-based attacks to exploit a GAN from accurately recognizing the structural distinctions
vulnerability. JavaScript is a source-compiled, interpreted from benign and malicious PDFs. GAN's The tree
language. This implies that the attacker must always provide representation may be used to generate a feature set. Every
the attack's source code. Attackers use intricate obfuscation of link between a base and a node is treated as a feature, together
the data to make it as tough to read as they can to offset this with its value. By converting features into dictionaries, the
disadvantage. feature abstraction is carried out (i.e., keys and values). Any
value of a text type was finally converted into the numerical
(2) ActionScript-based attacks leverage PDF files'
value 1, and any value submitted as a set of values is converted
capacity to read Flash content. To accomplish this,
into the array's average.
ActionScript code, including such storage damage or
corrupted file code, is generally incorporated in ShockWave The architecture of proposed PDF GAN model is shown
Flash. in the Fig. 2. A generator, discriminator, adversarial classifier,
and surrogate classifier compose the model. The generator and
(3) The ability of Adobe Reader to read and scan PDF file
discriminator receives the input data. The generator generates
which includes the information of other file types, such as
the data which is similar to original input data. The generated
pictures (such as bitmap or tiff) and fonts, makes file-
data is given as input to the classifier and discriminator. The
embedding assaults profitable (e.g., ttf). When viewing a PDF
discriminator compare the input data and generated data. The PDF file. The admin can login and view the details. The user
discriminator calculates a standard error on whether the has to select PDF file for malware detection in file. The Fig.3
manufactured data are comparable to the structure of the shows the home page for malware detection. Fig. 4 shows the
original input data after generator produces a PDF that closely user upload pdf file page. Fig. 5 and Fig. 6 are the results of
resembles the raw data. malware detection in pdf file.
The surrogate classifier converts the produced data into a The PDF GAN model is trained with dataset and it takes
prediction score, and the results are then utilized to train a the training time approximately 3 to 5 minutes. Finishes
classifier. Through the use of machine learning, the training surrogate PDF classifier in: 0:00:18. The evaluation/
classification collects additional learning and hardens against performance metrics of surrogate classifier are Accuracy:
unidentified characteristics. To produce a modified form of 0.9360 - Precision: 0.9376 - Recall: 0.9474 - F1Score: 0.9425.
the standard PDF with predicted outcomes that are the reverse
of the original PDF, the generator learn using original PDF.
[10] H. -M. Sun, C. -E. Shen and C. -Y. Weng, "A Flexible Framework for
Malicious Open XML Document Detection based on APT Attacks,"
IEEE INFOCOM 2019 - IEEE Conference on Computer
Communications Workshops (INFOCOM WKSHPS), 2019, pp. 2005-
2006, doi: 10.1109/INFCOMW.2019.8845281.
[11] M. Yu et al., "A Unified Malicious Documents Detection Model Based
on Two Layers of Abstraction," 2019 IEEE 21st International
Conference on High Performance Computing and Communications;
IEEE 17th International Conference on Smart City; IEEE 5th
International Conference on Data Science and Systems
(HPCC/SmartCity/DSS), 2019, pp. 2317-2323, doi:
10.1109/HPCC/SmartCity/DSS.2019.00322.
[12] S. C. Vitel, G. Balan and D. B. Prelipcean, "Improving Detection of
Malicious Office Documents Using One-Side Classifiers," 2019 21st
International Symposium on Symbolic and Numeric Algorithms for
Scientific Computing (SYNASC), 2019, pp. 243-247, doi:
10.1109/SYNASC49474.2019.00041.
Fig. 6. User results for malware file [13] S. M. Hossain and M. A. Ayub, "Parameter Optimization of
Classification Techniques for PDF based Malware Detection," 2020
23rd International Conference on Computer and Information
V. CONCLUSION Technology (ICCIT), 2020, pp. 1-6, doi:
10.1109/ICCIT51783.2020.9392685.
In the proposed system, an approach to identifying
malware in PDF files has been developed using machine [14] Y. Cui, Y. Sun, J. Luo, Y. Huang, Y. Zhou and X. Li, "MMPD: A
Novel Malicious PDF File Detector for Mobile Robots," in IEEE
learning techniques. Following a strong feature selection step, Sensors Journal, doi: 10.1109/JSEN.2020.3029083.
the algorithm is created using a generative adversarial network [15] Yuanzhang Li, Yaxiao Wang, Ye Wang, Lishan Ke, Yu-an Tan, “A
methods. By using generative adversarial network method the feature-vector generative adversarial network for evading PDF
malware in PDF is classified. The classification step makes malware classifiers”, Information Sciences, Volume 523, 2020, Pages
use of the best characteristics picked during the feature 38-48, ISSN 0020-0255, https://doi.org/10.1016/j.ins.2020.02.075.
selection stage to determine whether or not the provided PDF [16] E. Velayati and S. M. Hazrati Fard, "PEDM: Pre-Ensemble Decision
file is harmful. In future, the implementation is applied to Making for Malware Identification and Web Files," 2020 6th
International Conference on Web Research (ICWR), 2020, pp. 33-37,
other format files such as documents, ppts, and others. doi: 10.1109/ICWR49608.2020.9122322.
REFERENCES [17] M. Mimura, "An Improved Method of Detecting Macro Malware on an
Imbalanced Dataset," in IEEE Access, vol. 8, pp. 204709-204717,
[1] S. H. T. Mavric and C. K. Yeo, "Online binary visualization for Pdf 2020, doi: 10.1109/ACCESS.2020.3037330.
documents," 2018 International Symposium on Consumer [18] T. M. Mohammed, L. Nataraj, S. Chikkagoudar, S. Chandrasekaran
Technologies (ISCT), 2018, pp. 18-21, doi: and B. S. Manjunath, "HAPSSA: Holistic Approach to PDF malware
10.1109/ISCE.2018.8408906. detection using Signal and Statistical Analysis," MILCOM 2021 - 2021
[2] S. G. Sayed and M. Shawkey, "Data Mining Based Strategy for IEEE Military Communications Conference (MILCOM), 2021, pp.
Detecting Malicious PDF Files," 2018 17th IEEE International 709-714, doi: 10.1109/MILCOM52596.2021.9653097.
Conference On Trust, Security And Privacy In Computing And [19] Chao Liu, Chenzhe Lou, Min Yu, S.M. Yiu, K.P. Chow, Gang Li,
Communications/ 12th IEEE International Conference On Big Data Jianguo Jiang, Weiqing Huang, A novel adversarial example detection
Science And Engineering (TrustCom/BigDataSE), 2018, pp. 661-667, method for malicious PDFs using multiple mutated classifiers,
doi: 10.1109/TrustCom/BigDataSE.2018.00097. Forensic Science International: Digital Investigation, Volume 38,
[3] X. Zhou, J. Pang, F. Liu, J. Wang, F. Yue and X. Liu, "Pdf Exploitable Supplement,2021, 301124, ISSN
Malware Analysis Based on Exploit Genes," 2018 12th IEEE 26662817,https://doi.org/10.1016/j.fsidi.2021.301124.
International Conference on Anti-counterfeiting, Security, and [20] S. R. Gopaldinne, H. Kaur, P. Kaur, G. Kaur and Madhuri, "Overview
Identification (ASID), 2018, pp. 16-20, doi: of PDF Malware Classifiers," 2021 2nd International Conference on
10.1109/ICASID.2018.8693126. Intelligent Engineering and Management (ICIEM), 2021, pp. 337-341,
[4] Vivekanandam, B. "Design an Adaptive Hybrid Approach for Genetic doi: 10.1109/ICIEM51511.2021.9445341.
Algorithm to Detect Effective Malware Detection in Android [21] Vinothkanna, Mr R. "A secure steganography creation algorithm for
Division." Journal of Ubiquitous Computing and Communication multiple file formats." Journal of Innovative Image Processing (JIIP)
Technologies 3, no. 2 (2021): 135-149. 1, no. 01 (2019): 20-30.
[5] Y. Feng, B. Liu, X. Cui, C. Liu, X. Kang and J. Su, "A Systematic [22] Y. Wang, "The De-Obfuscation Method in the Static Detection of
Method on PDF Privacy Leakage Issues," 2018 17th IEEE Malicious PDF Documents," 2021 7th Annual International
International Conference On Trust, Security And Privacy In Conference on Network and Information Systems for Computers
Computing And Communications/ 12th IEEE International Conference (ICNISC), 2021, pp. 44-47, doi: 10.1109/ICNISC54316.2021.00016.
On Big Data Science And Engineering (TrustCom/BigDataSE), 2018,
pp. 1020-1029, doi: 10.1109/TrustCom/BigDataSE.2018.00144.
[6] A. Lemay and S. P. Leblanc, "Is eval () Evil : A study of JavaScript in
PDF malware," 2018 13th International Conference on Malicious and
Unwanted Software (MALWARE), 2018, pp. 1-10, doi:
10.1109/MALWARE.2018.8659374.
[7] A. Corum, D. Jenkins and J. Zheng, "Robust PDF Malware Detection
with Image Visualization and Processing Techniques," 2019 2nd
International Conference on Data Intelligence and Security (ICDIS),
2019, pp. 108-114, doi: 10.1109/ICDIS.2019.00024.
[8] N. Sushmetha, N. Rai and M. Mehra, "PDF Sanitizer," 2019
Innovations in Power and Advanced Computing Technologies (i-
PACT), 2019, pp. 1-5, doi: 10.1109/i-PACT44901.2019.8959957.
[9] N. Nissim et al., "Sec-Lib: Protecting Scholarly Digital Libraries From
Infected Papers Using Active Machine Learning Framework," in IEEE
Access, vol. 7, pp. 110050-110073, 2019, doi:
10.1109/ACCESS.2019.2933197.
Abstract—One of the most dangerous effects of diabetes is methods divide data into two categories, DR and no DR.
diabetic retinopathy, which, if ignored, results in lifelong Convolutional neural networks (CNNs), a subtype of deep
blindness. Early detection, which is crucial for successful learning, have a long history of use in image processing and
treatment outcomes, is one of the key obstacles. Unfortunately, interpretation, especially in the field of medical imaging.
it takes a skilled human to accurately evaluate fundus images
to determine the exact diabetic retinopathy stage. Millions of
Network architectures created specifically for managing
people can benefit from the detecting step's simplification. The picture data were often established with practical
identification of diabetic retinopathy is one area where applications and outperformed other methods for difficult
convolutional neural networks (CNN) have been successfully tasks like handwritten character recognition in the 1970s [2-
utilized. Early detection may prevent the possibility of 3]. However, until many developments, including the
permanent and complete blindness. Therefore, an efficient creation of dropout and rectified linear units, as well as the
screening system is needed. We proposed a system that can concomitant increase in computing power via graphics
classify various stages of diabetic retinopathy to facilitate the processor units, neural networks weren't practicable for
screening process. more difficult image identification applications (GPUs) [4].
Keywords— Diabetic Retinopathy (DR), Confusion metrics,
Large CNNs are already being used to an astounding degree
Machine learning (ML), Deep Convolutional Networks, Transfer to solve extremely challenging picture identification jobs
Learning, Visual Geometry Group 16(VGG16), Visual Geometry involving numerous object classes. The annual ImageNet
Group 19(VGG19). and COCO competitions are only two examples of the many
cutting-edge image classification projects that use CNNs
nowadays [5-6].
I. INTRODUCTION
Diabetes-related retinal degeneration, or diabetic II. LITERATURE SURVEY
retinopathy, is also referred to as diabetic eye disease. When The test picture dataset is categorized using the training data
diabetes has been present for 20 years or longer, it can and labeled classes as the basis for supervised classification.
impact up to 80% of diabetics. Despite these alarming A training dataset with labeled classes is used to identify the
numbers, research suggests that at least 90% of these new categorized classes after extracting the features from the
instances might be avoided with good care and diligent pictures. The retrieved parameters for classification listed
monitoring of the eyes. The likelihood of developing the severity of the disorders associated with diabetic
diabetic retinopathy increases with the duration of a person's retinopathy.
diabetes. According to the International Diabetes Federation, Blood vessels in fundus images are automatically segmented
552 million people will have diabetes worldwide by 2030, by M. Melinscak et al. [7]. Blood vascular segmentation is
up from an estimated 366 million in 2011. accomplished using a deep max-pooling convolutional
Numerous features must be weighted and their locations neural network. For optimal precision, a 10-layer
determined to classify DR. Clinicians must spend a lot of architecture was used, however, small image patches were
time on this. Once taught, computers can classify data used in the process. For shrinking and reshaping the fundus
considerably more quickly, allowing them to assist images, preprocessing is included. It featured two extra fully
physicians in real-time classification. There has been an connected layers and two further fully convolutional and 4-
ongoing study in computer imaging on the effectiveness of max pooling layers for vascular segmentation. Additionally,
automated grading for DR, and the results are positive. the accuracy of this approach was around 0.94. Artificial
Support vector machines and k-NN classifiers, among other neural networks combined with preprocessing techniques
automated methods, have drawn a lot of interest in the were first used by Gardner et al [8]. as a screening tool for
detection of DR features [1]. Most of these categorization
The main goal is to segment the vessels, exudates, and other Severity Level Training Testing Total
methods [13] [14] [15] to identify the microaneurysm while
maximizing the accuracy rate. Additionally, adding Microaneurysms (MA) 54 27 81
additional preparation steps like a deblurring technique Soft Exudates (SE) 26 14 40
before detection, segmenting blood vessels, rotating cross
Hard Exudates (EX) 54 27 81
sections, mathematically simulating boosting light intensity,
Hemorrhages (HE) 53 27 80
and morphological restoration adds to the complexity.
3.2 Pre-processing
III. RESEARCH METHODOLOGY
The spatial data of the fundus photos was worked for the
deep convolutional neural network. Instead of working
directly with color images, grayscale representations are
frequently employed for extracting descriptors because
doing so simplifies the process and requires less
computational power. We have used the OpenCV python
library to convert color images to grayscale. Resizing the
photos is one of the main preparation stages. VGG16 and
VGG 19 pre-trained Deep Neural Networks use a default
input image size of 224x224 so we have to provide the
image to its default size for training.
3.5 Inception v3
4 (a) Logistic Regression Classifier Confusion matrix 4 (d) SVM Classifier Confusion matrix
4 (b) Random Forest Classifier Confusion matrix 4 (e) Gradient Boosting Classifier Confusion matrix
I. INTRODUCTION
In machine learning, feature selection can result in good
learning outperformans, improved learning precision,
improved model interpretability and reduced computing
expense. The feature selection process is the main highlighting Fig. 1. Feature selection techniques
of this work, which offers a comprehensive and organised
outline of feature selection kinds, approaches, and techniques B. Wrapper Method
from both the data and algorithm viewpoints. The Wrapper methodology treats choosing feature sets as
To effectively reduce data, feature selection techniques a search issue in which several combinations are created,
can be employed in data pre-processing. This is helpful in assessed, and contrasted with one another. To assess a set of
locate precise data models. Many searching methods have features and provide model performance scores, a predictive
been suggested in the literature. Feature selection is mostly model is utilised. The classifier determines how well the
used for grouping, regression and classification problems. Wrapper technique performs. Based on the classification
findings, the best subset of features is chosen.
The machine learning processes are built upon the
beginning parts of current machine learning pipelines: feature
selection and feature extraction. The Fig. 1 shows various
feature selection techniques.
A. Filter Method
This approach filters features based on the dataset's
general properties , such as correlation with the dependent
variable. There is no predictive model used while using the
filter approach. When there are a lot of characteristics, this
strategy is usually quicker and more effective. prevents
overfitting, but occasionally may not choose the optimal
features.
Fig. 2. Filter method
Energy:
The energy of the grey image will be determined by adding
the squared elements of the GLCM matrix. Any image's
energy value will always fall between 0 and 1. A constant
picture will result in an energy value of 1. Another word that
replaces energy is uniformity.
𝐸𝑛𝑒𝑟𝑔𝑦 = ,
(P )2 (4)
Homogeneity:
There will be a specific link between the diagonal and
other GLCM elements. The concept of homogeneity denotes
this connection. The homogeneity value will never be more
than or equal to 1.
Entropy:
It denotes unpredictability and it is an example of a
statistical measure that can describe the texture of a picture.
𝐸𝑛𝑡𝑟𝑜𝑝𝑦 = ,
−ln(P )P (6)
Fig. 5. Proposed system
Mean:
When we look at an image, the mean tells us how intense
B. Feature Extraction each pixel is.
The feature extraction is the major step in image
𝑀𝑒𝑎𝑛 = ∑ , mP (7)
processing to apply it in machine learning. The shape features
are extracted from images using canny edge detection and Standard deviation:
other features are retrieved from the GLCM matrix produced
from the grey scale picture. These characteristics include It is a measurement that shows how an image's mean or
energy, contrast, eccentricity, major axis length, minor axis average has changed.
length, homogeneity, correlation, and energy. The best group
of features are taken into consideration rather than these entire SD = ∑ , P (m − μ) (8)
features in order to provide a good result.
C. Classifiers
SVM
A machine learning algorithm called the support vector
machine employs hyper planes to distinguish between each
class. The hyper planes are located precisely using the support
vectors.
LDA
Fig. 6. Image samples
Linear Discriminant Analysis (LDA): This technique finds
Contrast: a new feature space to assignment the data into while still
The contrast determine the intensity variance between each using a linear classification model [20]. The study has
pixel and each of its neighbours over the entire image. If we employed the default Scikit-learn working model with the svd
take a look at a stable image, its contrast value will be 0. This solver and 0.0001 tolerance rate.
disparity is also sometimes referred to as variance. KNN
𝐶𝑜𝑛𝑡𝑟𝑎𝑠𝑡 = ∑ , 𝑃 (𝑚 − 𝑛) (2) The k-nearest neighbor algorithm, or KNN, bases its
operation on the closest neighbours. Since the training data set
also has labels, ‘supervised KNN’ is taken into consideration.
Correlation: As a result, when the test image is applied, the label will be
determined base on the image's neighbours.
It is a measurement that determines how each pixel in a
complete image is connected to its neighbours. The Random Forest
correlation lies in the range of -1 to 1.
Random Forest is one of the supervised machine learning
( )( ) approach. Random forest is used for machine learning
𝐶𝑜𝑟𝑟𝑒𝑙𝑎𝑡𝑖𝑜𝑛 = (3) problems involving both classification and regression. This
,
approach is based on the ‘ensemble learning’ concept.
IV. FEATURE EXTRACTION Classifiers like KNN, SVM, LDA, and RF will identify the
labels for the sample images in accordance with the learned
A. Shape Feature: labels, and in response, a message box will be presented
Shape features are crucial because they offer a different indicating the image and the result is shown in Tables 1 and 2.
way to describe an object than by defining it in terms of its
most crucial properties and they minimise the quantity of When the features were pooled and tested, the Random
information that must be saved. The algorithm consists of Forest model outperformed the other three classifiers. Based
crest point categorization, crest lines tracing, and a curvature on a review of the literature, we discovered that past research
approximation technique. did not evaluate the RF model for the classification of PED
diseases. So, in addition to KNN, LDA, and SVM models, RF
B. Curvature Feature: was incorporated as one of the classifiers. In three separate
Curvature is any of a number of closely related geometric scenarios, the effectiveness of these classifier models was
notions in mathematics. The curvature, as the name implies, is assessed using the Shape and Curvature features. The results
the deviation of a curve or a surface from a straight line or a of our RF model were as follows: for binary classification, we
plane. were able to attain accuracy rates for shape and curvature
feature combinations of 84.67% and 82.78%, respectively.
V. RESULTS AND DISCUSSIONS Multi-class categorization also revealed 82.57% and 83.68%.
The Fig. 7 illustrates how the photographs have been In all binary and multi-class classifications, RF performed
appropriately resized to meet the requirements without losing better for shape features than any other examined
any information. These pictures are employed in additional classification model, and combining features improved
Processing. classification accuracy. According on our observations, this
classifier's major benefits are dimensionality reduction and
quicker execution. One of the most complex classification
techniques was the RF classifier. The fig. 10 shows the binary
class classification and fig. 11 shows the multi class
classification.
REFERENCES
[1] Kdnuggets.com /2021/06/ feature selection-overview.html
[2] https://towardsdatascience.com/feature-selection-using-random-
forest-26d7b747597f
[3] R. V. A. G. T. Sathwik, R. Yasaswini, “Classification of selected
medicinal plant leaves using texture analysis,”4th ICCCNT - IEEE -
31661 ,Tiruchengode, India, July 4 -6, 2013.
[4] M. N. D Venkataraman, “Computer vision based feature extraction of
leaves for identification of medicinal values of plants,”ICCIC 2016.
[5] Vijayakumar, Dr T. "Selective Image Enhancement and Restoration for
Skin Cancer Identification", Journal of Innovative Image Processing 1,
no. 1 (2019): 1-10.
[6] Pandian, A. Pasumpon. "Identification and classification of cancer cells
using capsule network with pathological images." Journal of Artificial
Intelligence 1, no. 01 (2019): 37-44.
[7] C.-M. E. A. V. Ionel-Bujorel P av aloiu, Robert Ancuceanu, “Important
shape feature for romanian medicinal herb identification based on leaf
images”,E-Health and Bioengineering Conference (EHB), 2017.
[8] V. T. E. Sandeep Kumar, “Leaf feature based approach for automated
identification of medicinal plants,”ICCSP April 3-5, 2014.
[9] M. Anand and Dr. C. Jayakumari, “Study of retina image segmentation
algorithms from optical coherence tomography(OCT) images”, Jour of
Adv Research in Dynamical & Control Systems, Vol. 9, No. 4, pp. 125-
134, 2017.
[10] Lei Yunqi, Li Qingmin, Song Xiaobing, Shi Zhenxiang, Chen Dongjie,
“3D Face Hierarchical Recognition Based on Geometric and Curvature
Features”, 978-1-4244-5273-6/09/$26.00 ©2009 IEEE.
that this model can provide great accuracy in the prediction object even in poor lighting. The models are then put to
of spinal injuries and diseases. Another study [2] by the test to determine which approach can be utilized to
researchers in China used image processing in the analysis identify objects in photographs with poor lighting and
of positron-emission tomography (PET) scan images. The brightness.
usage of non-linear descriptors increased the accuracy and
the efficiency of the model. In the end, the model provided IV. DAT A COLLECT ION AND PREPROCESSING
an accuracy value of 98%.
This chapter discusses the data collected and the
Object Detection is a part of image processing that preprocessing techniques used on the data.
is used in various applications. A study [3] uses object
detection in the detection of a vanishing point of a moving A. Data collection
object. This model was developed to help the analysis which
is done in the railway sector. This model is developed using The images used in this study are collected from a
the convolutional neural network algorithm. The researchers single database [9]. This dataset consists of various images
found that the usage of auxiliary data can visibly increase of everyday objects like tables, people, dogs, etc. These
the accuracy of the model. Another study[4] by a group of photographs have low or weak lighting making it tougher
researchers from the USA uses object detection in 3D for the image processing algorithms to detect objects. The
images. This analysis was done on panoramic LIDAR sample format of the data is shown in figure 1.
images and is used to predict pedestrians. This model uses
various technologies like gamma-ray analysis, analysis of
radiological data, etc. This model proved to predict the
presence with great accuracy.
Though different objects have different percentage, the distribution of the images based on the
percentages, all the percentages are more or less the same. lighting also plays a major role in this study. Thus, the
The object that is present the most is the dog and it has a images were categorized based on the lighting. The results
percentage of 11 and the least percentage is 7 which is the of this analysis are shown in figure 4.
amount of five different objects. Just like the object
D. Data split up Two distinct algorithms were used to create two deep
learning models. The two algorithms are the YOLO
The entire dataset has to be split into three parts – algorithm and the faster RCNN algorithm. The preprocessed
training, validation, and testing. The training and the dataset is then used to train and evaluate the models.The
validation together have 5890 images and the 1473 images performance of the models during training and validation is
are used for testing. analyzed based on a parameter called the AP score. The AP
score of both algorithms is shown in table 1.
V. CONST RUCT ION OF DEEP LEARNING M ODEL Table 1. AP score of both algorithm
B. YOLO
From figure 6, it can be seen that the YOLO lighting. This deep learning model can be integrated with
algorithm can accurately predict the presence of objects the surveillance cameras and it’ll be easier for it to predict
even in low lighting. It should also be noted that the some unknown or unusual presence without any human
algorithm can predict two different objects from a single interaction. This model can be upgraded and used in various
image. This figure acts as proof of the statement that the applications like security systems, image analysis in
YOLO algorithm is good in predicting the object from the industries, etc.
images with low lighting.
REFERENCE
VII. CONCLUSION [1] S. Pang et al., "SpineParseNet: Spine Parsing for Vo lumetric MR
Image by a T wo-Stage Segmentation Framework With Semantic
Image Representation," in IEEE Transactions on Medical Imaging, vol.
A dataset of pictures of diverse items, including 40, no. 1, pp. 262-273, Jan. 2021, doi: 10.1109/T MI.2020.3025087.
tables, cats, and dogs, is gathered from GitHub. Followin g [2] W. Yang et al., "Predicting CT Image From MRI Data T hrough
classification, two factors are used to examine the acquired Feature Matching With Learned Nonlinear Local Descriptors," in IEEE
T ransactions on Medical Imaging, vol. 37, no. 4, pp. 977 -987, April
dataset. The photos are then preprocessed using histogram 2018, doi: 10.1109/T MI.2018.2790962.
equalization and image format conversion. Two distinct [3] L. Xingxin, Z. Liqiang, Y. Zujun and W. Yanqin, "Adaptive auxiliary
algorithms were used to create two deep learning models. input extraction based on vanishing point detection for distant object
The two algorithms are the YOLO algorithm and the detection in high-resolution railway scene," 2019 14th IEEE
International Conference on Electronic Measurement & Instruments
quicker RCNN algorithm. The preprocessed dataset is then
(ICEMI), 2019, pp. 522-527, doi:
used to train and evaluate the models. Based on a measure 10.1109/ICEMI46757.2019.9101454.
known as the AP score, the performance of the models [4] M. R. Marshall et al., "3-D Object Tracking in Panoramic Video and
during training and validation is evaluated. After the LiDAR for Radiological Source–Object Attribution and Improved
Source Detection," in IEEE Transactions on Nuclear Science, vol. 68,
analysis of the AP score, it is found that the YOLO no. 2, pp. 189-202, Feb. 2021, doi: 10.1109/T NS.2020.304764 6.
algorithm has the better AP score in all aspects. For clearer [5] Y. H. Yeu, M. I. Shapiai, Z. H. Ismail and H. Fauzi, "Investigation on
understanding, the results are also plotted into a bar graph Different Color Spaces on Faster RCNN for Night -T ime Human
and again the YOLO is found to be better. The prediction Occupancy Modelling," 2019 IEEE 7th Conference on Systems,
Process and Control (ICSPC), 2019, pp. 118 -121, doi:
results of the YOLO algorithm are also analyzed and, in the 10.1109/ICSPC47137.2019.9068000.
end, it is found that the algorithm can accurately predict the [6] A. Yang, X. Jin and L. Li, "CT Images Recognition of Pulmonary
presence of one or more objects even with very poor T uberculosis Based on Improved Faster RCNN and U-Net," 2019 10th
International Conference on Information T echnology in Medicine and International Conference on Communication Systems and Network
Education (ITME), 2019, pp. 93-97, doi: 10.1109/ITME.2019.00032. T echnologies, 2011, pp. 597-600, doi: 10.1109/CSNT .2011.128.
[7] Y. Ma, J. Yang, Z. Li and Z. Ma, "YOLO-Cigarette: An effective [12] F. Yang, H. Yu, K. Silamut , R. J. Maude, S. Jaeger and S. Antani,
YOLO Network for outdoor smoking Real-time Object Detection," "Parasite Detection in T hick Blood Smears Based on Customized
2021 Ninth International Conference on Advanced Cloud and Big Data Faster-RCNN on Smartphones," 2019 IEEE Applied Imagery Pattern
(CBD), 2022, pp. 121-126, doi: 10.1109/CBD54617.2021.00029. Recognition Workshop (AIPR), 2019, pp. 1-4, doi:
[8] T . Zhou, L. Zheng, Y. Peng and R. Jiang, "A Survey of Research on 10.1109/AIPR47015.2019.9174565.
Crowd Abnormal Behavior Detection Algorithm Based on YOLO [13] X. Xiao and X. T ian, "Research on Reference T arget Detection of
Network," 2022 2nd International Conference on Consumer Deep Learning Framework Faster-RCNN," 2021 5th Annual
Electronics and Computer Engineering (ICCECE), 2022, pp. 783-786, International Conference on Data Science and Business Analytics
doi: 10.1109/ICCECE54139.2022.9712684. (ICDSBA), 2021, pp. 41-44, doi: 10.1109/ICDSBA53075.2021.00017.
[9] https://github.com/cs-chan/Exclusively-Dark-Image-Dataset [14] M. Mahendru and S. K. Dubey, "Real T ime Object Detection with
[10] T hang Minh Le, K. Akie, T. Hori, H. Hatae and H. Watanabe, "T hree Audio Feedback using Yolo vs. Yolo_v3," 2021 11th International
images blending engine supporting multicolor formats, various color Conference on Cloud Computing, Data Science & Engineering
depths with small-gate size and high-quality image for SOC design," (Confluence), 2021, pp. 734-740, doi:
2009 IEEE 8th International Conference on ASIC, 2009, pp. 187 -190, 10.1109/Confluence51648.2021.9377064.
doi: 10.1109/ASICON.2009.5351577. [15] Z. Li and J. Wang, "An improved algorithm for deep learning YOLO
[11] R. Chauhan and S. S. Bhadoria, "An Improved Image Contrast network based on Xilinx ZYNQ FPGA," 2020 International
Enhancement Based on Histogram Equalization and Brightness Conference on Culture-oriented Science & T echnology (ICCST), 2020,
Preserving Weight Clustering Histogram Equalization," 2011 pp. 447-451, doi: 10.1109/ICCST 50977.2020.00092.
1
Department of Computer Science & Engineering, Jain University, Ramanagara 562 112, Karnataka, India,
lokaiah75@gmail.com
2
Department of Computer Engineering, Cummins College of Engineering for women, Pune 411052,
Maharashtra, India, kittadnilofer@gmail.com
3
Department of Mechanical Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Andhra
Pradesh 522302, India, diwakar4236@kluniversity.in
4
Department of Computer Science & Engineering, Panimalar Engineering College, Chennai, Tamil Nadu
600123, India, deviviji2000@yahoo.co.in
5
Department of Computer Science, Banasthali Vidyapith, Banasthali-304022, Rajasthan, India,
kuashok@banasthali.in
6
Department of Computer Science and Engineering, CMR Engineering College, Hyderabad 501401,
Telangana, India, muttusy@gmail.com
Abstract— Parkinson's disease (PD) is characterized by chronic healthcare expenses. Using the currently recognized criteria,
central nervous system deterioration. Tremor, stiffness, the diagnostic error rate [1] is close to 20%. Furthermore,
difficulty in movement and difficulty of walking are the most because PD symptoms fluctuate throughout the disease's
prominent symptoms in the initial stages. There is presently no
course, medication must be regularly changed. The
treatment for PD. Doctors often describe a variety of motor
symptoms to establish a diagnosis of PD. Traditional techniques worldwide PD burden has almost doubled in the previous 25
of diagnosis, on the other hand, may be susceptible to years [2], largely due to increased life expectancy and longer
inaccuracy since they rely on subjective assessment of illness duration. Roughly 10 million people across the world
movements that human eyes might find difficult to recognize. have PD. To make a clinical diagnosis of PD, both motor and
However, early non-motor indications of Parkinson's disease non-motor symptoms must be pres ent. The clinical diagnosis
can be subtle and caused by a wide range of health conditions of PD has lower accuracy of 74% if handled by non -
other than Parkinson's disease. As a result, early detection of specialists and 80% if handled by specialists; this is
Parkinson's disease is difficult because these symptoms are especially problematic in the earlier phase of the disease.
frequently ignored. In addition, there are no completely
Non-motor symptoms have recently been included in the
trustworthy diagnostic techniques available. To overcome the
problem, - Machine Learning (ML) approaches to gait data is
medical diagnostic criteria for PD proposed by the
proposed in this study. The process of solution contains five Movement Disorder Society. More diagnostic resources are
sections: 1) Genuine gait data is collected from standard needed, nevertheless, to ensure accuracy. Predicting fatality,
websites, 2) The collected data is processed to clean it, which sickness, injuries, and neurodegenerative illnesses makes gait
contains smoothing and outliers removal techniques, 3) The efficiency a universal health metric[3]. Gait impairments are
processed data is further given to the feature extraction common in PD and might appear early or develop over time.
technique to get important attributes, 4) The extracted features They may aid in the early detection of symptoms.
are applied on the ML models namely Naïve Bayes (NB), K- Furthermore, there is evidence that they are present in the
Nearest Neighbour (KNN) and Decision Tree (DT), 5) Finally,
prodromal phase and may be able to identify disease risk in
the model is validated using metrics to identify best ML model.
addition to the potential for unique PD phenotypes. Overall,
Keywords— Parkinson, Statistics, Smoothing, Outlier, this could pave the door for more customized therapies and
Machine Learning Model, Accuracy. scientific research. Mean gait characteristics include step
length, step velocity, step width, step duration, swing time,
and stance time, whereas dynamic gait characteristics include
I. INT RODUCT ION variability and asymmetry in these variables [4]. Based on
factor analysis, researchers established a complete
The clinical evaluation of a Parkinson's disease
conceptual gait model that organized these spatiotemporal
(PD) patient is the gold standard for both diagnosis and
tracking of disease progression.The lack of objective and gaits features into five domains (pace, rhythm, variability,
asymmetry, and postural control) in PD.
quantifiable biomarkers for diagnosis and symptom
monitoring results in significant direct and indirect
V. CLASSIFICAT ION
This chapter deals with the classification model
employed in this research for PD detection.
Fig. 2. Demographics of Physionet data
A. NB
B. Data Process The NB Classifier [15] is among the most effective
The gait of PD patients and healthy participants is and straightforward classification methods. Depending on
measured experimentally over time using vertical force Bayesian Networks, whichisa pictorial representation of a
sensor readings. Random fluctuations affect the obtained collection of random variables and their dependent
time series signal. Two examples of preparatory processing relationships, this method is used.Bayesian Networks contain
used to gait data are area smoothing and outlier detection. As several effective inferences and learning mechanisms. The
REFERENCES
[1]. Rizzo G, Copetti M, Arcuti S, Martino D, Fontana A, Logroscino G.
“ Accuracy of clinical diagnosis of Parkinson disease: A systematic
review and meta-analysis”. Neurology. 2016, vol. 86, issue. 6, pp.
566-76. doi: 10.1212/WNL.0000000000002350.
[2]. Dorsey, E. R. et al. “ Global, regional, and national burden of
Parkinson’s disease 1990–2016: a systematic analysis for the Global
Burden of Disease Study”,T e Lancet Neurology, 2016, vol. 17, pp.
939–953, doi: 10.1016/S1474-4422(18)30295-3 (2018).
[3]. Lord S, Galna B, Rochester L. “ Moving forward on gait
measurement: toward a more refined approach”, Mov Disord. 2013,
vol. 28, no. 11, pp. 1534-43. doi: 10.1002/mds.25545. PMID:
24132841.
[4]. Lim, L. et al. “ Measuring gait and gait -related activities in
Parkinson’s patients own home environment: a reliability,
responsiveness and feasibility study”. Parkinsonism & related
disorders, vol. 11, pp. 19–24, 2005.
[5]. S. Krutaraniyom, K. Sengchuai, A. Booranawong and J.
Jaruenpunyasak, "Pilot Study on Gait Classification Using Machine
Learning," 2022 International Electrical Engineering Congress
(iEECON), 2022, pp. 1-4, doi:
10.1109/iEECON53204.2022.9741586.
[6]. I. Nissar, W. A. Mir, Izharuddin and T . A. Shaikh, "Machine
Learning Approaches for Detection and Diagnosis of Parkinson’s
Disease - A Review," 2021 7th International Conference on
Advanced Computing and Communication Systems (ICACCS), 2021,
pp. 898-905, doi: 10.1109/ICACCS51430.2021.9441885.
[7]. J. C. Pérez-Ibarra, A. A. G. Siqueira and H. I. Krebs, "Identification
of Gait Events in Healthy and Parkinson’s Disease Subjects Using
Inertial Sensors: A Supervised Learning Approach," in IEEE Sensors
Journal, vol. 20, no. 24, pp. 14984-14993, 15 Dec.15, 2020, doi:
10.1109/JSEN.2020.3011627.
[8]. I. Papavasileiou, W. Zhang, X. Wang, J. Bi, L. Zhang and S. Han,
"Classification of Neurological Gait Disorders Using Multi-task
Feature Learning," 2017 IEEE/ACM International Conference on
Connected Health: Applications, Systems and Engineering
T echnologies (CHASE), 2017, pp. 195-204, doi:
10.1109/CHASE.2017.78.
[9]. C. Ricciardi et al., "Classifying patients affected by Parkinson’s
disease into freezers or non-freezers through machine learning," 2020
IEEE International Symposium on Medical Measurements and
Applications (MeMeA), 2020, pp. 1-6, doi:
10.1109/MeMeA49120.2020.9137317.
There is a wide range of attacks on the network's content when working with the MalGenome dataset. The author has
because of the large volume of data; new invasions are proposed employing specific characteristics to improve the
occurring on a daily basis. Detecting intrusions is a necessary outcomes in the future. Network Intrusion Detection System
first step in preventing network data from being breached or (NIDS) was built by Khan et al. [4] using multiple machine
misused [8]. Numerous solutions have been devised in order learning classifiers. Tests on the various classifiers'
to protect the network from numerous invasions and performance were conducted using the NSL-KDD dataset.
malicious actions. There are several ways to safeguard a The Random Forest (RF) classifier surpasses all the others in
network from dynamic intrusions, but network intrusion this study. An accuracy rate of 97% is achieved as a result of
detection is one of the most promising solutions [9]. To this method. Although multiclass classifiers are needed, there
distinguish between intrusive and typical network activity, is still a need in the market.
the Intrusion Detection System classifies data into multiple
categories. Several ML approaches have been developed to Even though numerous taxonomies for IDSs have been
achieve effective and intelligent intrusion detection models. proposed, none has gained widespread acceptance. At now,
Only a handful of studies have looked at machine learning the two most popular models for detection are signature-
algorithms for detecting intrusions [10]. Over-fitting the based and anomaly-based models. A signature-based method,
model for a certain dataset can lead to inaccurate results also known as abuse detection, can be used to spot an
being provided by Machine Learning (ML) classifiers. Thus, intrusion. While signature-based intrusion detection systems
the findings are not easily generalizable and difficult to can spot most or all previously observed attacks [5], they fall
duplicate [11]. short when it comes to spotting novel or modified attacks.
Another method that works well for finding intrusions is
In this paper, we focus on providing a thorough analysis of anomaly detection. Many studies have focused on the
several machine learning techniques for intrusion detection application of anomaly detection to the fields of intrusion
[12]. It is our goal to analyse popular machine learning detection and computer security. Anomaly-based IDS
approaches in order to better understand how they perform in systems model typical system or network traffic behaviour,
real-world intrusion detection scenarios. Features, hyper and any divergence from this pattern that exceeds a threshold
parameter tuning sensitivity, and overall effect are all out of is flagged as suspicious. IDSs that rely on anomalies to detect
balance. It is important to consider all three of these aspects threats produce more false positives than signature-based
when employing ML techniques for intrusion detection. IDSs. Anomaly-based IDSs face serious challenges when it
Features are selected in such a way that a complex classifier comes to defining normal behaviour and figuring out how to
is avoided [13], which may over-fit the data [14]. A high represent it computationally in a system or network context
hyper parameter sensitivity suggests that it may be difficult to [6].
tune the detection system appropriately for other datasets, and
methods that manage the class imbalance problem better are Statistics-based anomaly-based IDS monitor regular network
more practical in practise for intrusion detection [15]. activity, such as bandwidth usage, protocol configurations
[7], and ports and devices connected to the network, and alert
IDS is designed to be constantly monitoring and analysing the administrator or end user when abnormal traffic is
network traffic and events so that the organization's security discovered. Time series and multivariate models are also
can be safeguarded and computers in the network may be subdivided into single and multivariate models, respectively.
discovered [16]. In order to keep the system safe from Univariate models, for example, use independent Gaussian
unwanted access, an IDS gathers data about the network random variables to describe each variable's permissible
environment, filters out unnecessary data, and then makes a range [8]. The correlation between two or more variables is
determination about whether or not the behaviour is normal taken into account in the multivariate model.
[17]. Despite the fact that a study of cloud-based network
intrusion detection [18] analysis can be obtained online, An intrusion detection model combining SVM and Extreme
machine learning-based intrusion detection research for Learning Machine (ELM) was presented by Nugroho et al.
multimedia platforms is scarce [19]. [11]. KDD 99 was used for the analysis. Using this proposed
model, the accuracy was 93 percent and the training time was
2. LITERATURE SURVEY significantly reduced. Only known assaults benefit from this
method, and novel attacks necessitate the use of more
Intrusion detection research is the focus of this section, which accurate classifiers. Sharma et al. [12] described an Artificial
aims to provide an overview. Many researchers have worked Neural Network-based trained system for detecting DDoS
on machine learning classifiers, and the following are only a attacks. With older datasets, the ANN achieved 92 percent
few of their accomplishments: In order to detect mobile accuracy; with updated datasets, the ANN achieved 94
malware Private, Otter et al. [2] used ML classifiers such as percent accuracy; Based on the dataset, the ANN model's
RF, J-48, Multilayer Perceptron (MLP), Naïve Bayes (NB) accuracy can be improved. As a result, there is a pressing
and K Nearest Neighbour (KNN). The evaluation was need for an accurate and comprehensive dataset.
conducted with the aid of Weka Tool. ML classifiers were
tested for accuracy using a variety of performance metrics, An IDS adaptive design based on Extreme Learning
including the True Positive Rate (TPR) and False Positive Machines was discussed by Meneghello et al. [14]. The
Rate (FPR), precision, recall, and the f-measure. RF evaluation used the NSL-KDD dataset. A satisfactory
Classifier was able to achieve an accuracy of 99.99 percent percentage of detection and false positives were discovered
for innovative and well-known assaults. Suragala et al. [17] models, cannot be applied to train deep networks. Thus,
proposed an intrusion detection PSO-FLN classifier. To ANNs are classified as shallow models, as opposed to the
ensure the accuracy of the findings, they were cross-validated deep models.
against the KDD99 benchmark dataset. In terms of accuracy,
PSO-FLN outperforms ELM and FLN classifiers. There are a
few classes that don't work with this method, such as R2L. 3.1 Support Vector Machine
According to the review of the literature, the majority of
studies have relied on older datasets for validation. A lack of In Support Vector Machine (SVM), the goal is to locate a
fresh threats and an imbalance in network audit data are the hyperplane with a maximum margin of separation in the n-
main drawbacks of these datasets. ML classifiers may be dimensional feature space. Because the separation hyperplane
trained incorrectly if they are trained on data that is not is only influenced by a limited number of support vectors,
evenly distributed. It is possible to detect new assaults using SVMs can produce satisfying results even with short training
the newly created dataset. When compared to other sets. SVMs, on the other hand, are susceptible to noise in the
classifiers, the RF classifier produces superior results. Multi- vicinity of the hyperplane. It is possible to use SVMs to
classification still needs more attention, despite the fact that tackle linear problems. Kernel functions are commonly
binary classification has received a lot of attention. utilised when dealing with nonlinear data. It is possible to
split the original nonlinear data using a kernel function,
3. MACHINE LEARNING CLASSIFIERS FOR which transforms the original space into a different space.
INTRUSION DETECTION SVMs and other machine learning algorithms are full with
Supervised and unsupervised learning are the two most kernel trickery.
common methods of machine learning. Labelled data is 3.2 K-Nearest Neighbour
essential for supervised learning. Even though data labelling
by hand is time consuming and expensive in supervised The manifold theory is at the heart of K-Nearest Neighbour
learning, it is the most used method in IDS. Unsupervised (KNN). It is more likely that a sample will belong to a class if
learning approaches, on the other hand, tend to perform most of its neighbours do as well. This means that the
worse at detection than supervised learning methods. Figure 2 classification result is only influenced by the top-k nearest
depicts the most prevalent machine learning techniques used neighbours. The KNN model's performance is highly
in IDSs. NSK-KDD dataset is considered for analysis. NSL- influenced by the parameter k. Overfitting is more likely
KDD is an alternative data set proposed to address when k is small, because the model becomes more complex
shortcomings in the original KDD'99 dataset. Due to the ask gets smaller. To the contrary, the more complex the
scarcity of publicly available data sets for network-based model is, and thus the worse its fitting ability. First, all of the
IDSs, we believe the updated KDD data set can serve as a training data is stored in this lazy learning method. This data
useful benchmark for comparing the performance of various is used during categorization to look for correlations between
IDSs. However, the data set still has some of the issues raised the incoming data and the existing data. Data is sorted into
by McHugh and may not be an accurate representation of categories based on how similar they are to previously
actual networks. collected data. Euclidean distance is used to calculate it.
Using K-nearest neighbours, the test data is assigned to a
class. Accuracy may improve if K is raised higher. However,
it is more commonly used for classifying data rather than
regression.
3.3 Naïve Bayes
Naïve Bayes is based on the notion of attribute independence
and conditional probability. Conditional probabilities for
different classes are calculated for each sample by the Naive
Bayes classifier. It is determined that the sample falls into
class MOP (maximum probability). For both two-class and
multi-class classification issues, this algorithm can be
Fig: 2 Various Machine Learning Methods employed. Probabilities of every characteristic relating to a
class are employed for prediction. Furthermore, it assumes
An Artificial Neural Network (ANN) is designed to replicate that each feature's chance of belonging to a specific class
the way the human brain functions. Many hidden and output value is unaffected by the probability of other features.
layers are found in the architecture of neural networks. The Probability is referred to as conditional probabilities, when
units in neighbouring strata are completely interconnected. the feature's value is already known. Each class's probability
Since an ANN may potentially approximate any function of an instance can be calculated, and then the best class value
with a large number of units, it has a high capacity for fitting, can be chosen. The formula for calculating the conditional
especially for nonlinear functions. Training ANNs takes a probability is
long time because of their intricate model structure. In
addition, backpropagation, the algorithm used to train ANN
𝑛
cluster. Distance is used as a similarity criterion in the K-
𝑃(𝑋 = 𝑥|𝑌 = 𝑐𝑘) = ∏ 𝑃(𝑋 (𝑖) = 𝑥 (𝑖) |𝑌 = 𝑐𝑘) means algorithm. If the distance between two data elements
𝑖=1 is low enough, they are more likely than not to be clustered
together in the same location. When dealing with nonconvex
The Nave Bayes method reaches its optimal result when the
data, the K-means algorithm performs poorly. The
attribute independent hypothesis is met. Nave Bayes does not
initialization condition and parameter K are also important to
function well on attribute-related information with Logistic
the K-means algorithm. It is therefore necessary to conduct a
Regression because it cannot satisfy that hypothesis in reality.
large number of experiments before determining an
A logarithm linear model, such as the LR, uses a parametric
appropriate parameter value.
logistic distribution to calculate the probability of various
classes, as 3.7 Logistic Regression
𝑤𝑘 ∗𝑥
𝑒 Predictive models produced utilising this method have the
𝑃(𝑌 = 𝑘|𝑥) =
1 + ∑𝑘−1
𝑘 𝑠 𝑤𝑘 ∗𝑥 potential to positively impact on network analysis. In order to
improve decision-making, you can utilise these models to
In this case, k is equal to 1, 2,.., K The sample x is placed in better comprehend relationships and make predictions about
the class with the highest probability. The construction of an what will happen next. Manufacturers' analytics teams can
LR model is straightforward, and the training of such a model employ logistic regression analysis as component of a
is quick. LR, on the other hand, is unable to handle nonlinear statistics software suite to uncover a correlation between
data, which limits its use. It can be used to sort data into machine part failures and how long parts are kept in stock,
binary or many classes. Fitting data to a Logistic function for instance.The sigmoid function, which is used in the
predicts an event's probability of occurrence. Zero and one logistic function, is a cost function.
are possible values for this function's output. Class 1 and
class 0 are separated by the median value of 0.5. Class 1 1
𝐹(𝑥) =
output is defined as greater than or equal to 0.5, while class 0 1 + 𝑒 −(𝑥)
output is defined as less than or equal to 0.5.
4. RESULTS
3.4 Decision Tree
Classifiers were evaluated in their default options and
The decision tree (DT) algorithm organises information by without any processing of the dataset in the first part of the
applying a set of predefined rules. The model's tree-like form experiment. We employed Stratified Cross-Validation of 10-
makes it accessible to everybody. The decision tree technique folds to train the classifiers on the NSL-KDD training dataset
allows for automated feature exclusion. In the course of and then applied the trained models to the testing dataset.
education, students construct and prune their own mental NSL-KDD also offered the testing datasets for comparison. A
trees. A decision tree model is constructed by an algorithm pre-processing step used to pick out only the most relevant
that iteratively selects the most relevant features, which are features from the NSL-KDD dataset was performed in the
then used to expand the branches off the root node. The second stage. NSL-KDD recommended 41 features, 14 of
decision tree is a basic method of classification. The random which we selected using the InfoGainAttributeEval method
forest and excessive gradient boosting (XGBoost) are two combined with Ranker's ranking system.
examples of sophisticated algorithms that are made up of
multiple decision trees. It is widely used because of how well Sensitivity and specificity measurements are commonly used
it predicts and organises data. In DT, a branch represents a to evaluate the performance of an ML model. Specificity is
sometimes known as the true negative rate (TNR), whereas
test on an attribute, and a leaf node interprets the result of the
sensitivity is referred to as the true positive rate (TPR). The
test by displaying a class label. For classification tasks, DT
false positive rate of the classifiers on the considered dataset
uses few computational resources and works well with both
categorical and continuous inputs. Training this tree topology is shown in Figure 3.
is computationally intensive in multi-classification scenarios.
3.5 Random Forest
In 2001, Breiman came up with the idea of random forest.
This method is based on the proximity search and can be used
both for regression and classification. The classifier is based
on a decision tree. It is possible to use random samples to
form decision trees, and then predictions are made from each
tree and the best answer is determined by voting. Image
categorization, feature selection, and recommendation
engines are just some of the uses of random forests.
3.6 K-Means
K-means is a common clustering approach, where K is the set
of nodes and the means is the average of the attributes in each
(2 ∗ 𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 ∗ 𝑅𝑒𝑐𝑎𝑙𝑙)
𝐹 − 𝑀𝑒𝑎𝑠𝑢𝑟𝑒 =
(𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 + 𝑅𝑒𝑐𝑎𝑙𝑙)
Table 1: Parameters Evaluation on KDD99 Dataset
REFERENCES
[1]. Z. Yan and Y. Xu, "A multi-agent deep
reinforcement learning method for cooperative load
frequency control of a multi-area power
system", IEEE Trans. Power Syst., vol. 35, no. 6, pp.
4599-4608, Nov. 2020.
[2]. D. W. Otter, J. R. Medina and J. K. Kalita, "A
survey of the usages of deep learning for natural
language processing", IEEE Trans. Neural Netw.
Learn. Syst., Apr. 2020.
[3]. C. Li, J. Wang, H. Wang, M. Zhao, W. Li and X.
Deng, "Visual-texual emotion analysis with deep
coupled video and danmu neural networks", IEEE
Fig 5: Comparison of Performance Levels Trans. Multimedia, vol. 22, no. 6, pp. 1634-1646,
Jun. 2020.
[4]. F. A. Khan, A. Gumaei, A. Derhab and A. Hussain,
The training and testing levels of the ML classifiers are "A novel two-stage deep learning model for efficient
represented in Figure 6. The NB classifier observes less network intrusion detection", IEEE Access, vol. 7,
pp. 30373-30385, 2019.
training and testing time levels.
[5]. T. Su, H. Sun, J. Zhu, S. Wang and Y. Li, "BAT:
Deep learning methods on network intrusion
detection using NSL-KDD dataset", IEEE Access,
vol. 8, pp. 29575-29585, 2020.
[6]. K. Zhu, Z. Chen, Y. Peng and L. Zhang, "Mobile
edge assisted literal multi-dimensional anomaly
detection of in-vehicle network using LSTM", IEEE
Trans. Veh. Technol., vol. 68, no. 5, pp. 4275-4284,
May 2019.
[7]. Q. M. Alzubi, M. Anbar, Z. N. M. Alqattan, M. A.
Al-Betar and R. Abdullah, "Intrusion detection
system based on a modified binary grey wolf
optimisation", Neural Comput. Appl., vol. 32, no.
Fig 6: Training and Testing Levels
10, pp. 6125-6137, May 2020.
[8]. B. Riyaz and S. Ganapathy, "A deep learning
approach for effective intrusion detection in wireless
networks using CNN", Soft Comput., vol. 24, no.
22, pp. 17265-17278, Nov. 2020.
5. CONCLUSION [9]. P. Mishra, V. Varadharajan, U. Tupakula and E. S.
Internet-based risks are multiplying at an exponential rate as Pilli, "A detailed investigation and analysis of using
technology improves. As a result, experts have come up with machine learning techniques for intrusion
a slew of ways to combat these risks. Various machine detection", IEEE Commun. Surveys Tuts., vol. 21,
learning classifiers for intrusion detection have been trained no. 1, pp. 686-728, 1st Quart. 2019.
on older datasets in the literature, limiting the accuracy of [10]. T. Treebupachatsakul and S. Poomrittigul, "Bacteria
their detection. As a result, the most recent dataset must be classification using image processing and deep
used to train machine learning classifiers. Based on a given learning", Proc. 34th Int. Tech. Conf. Circuits/Syst.
taxonomy, a number of ML classifiers have been tested for Comput. Commun. (ITC-CSCC), pp. 1-3, Jun. 2019.
their ability to detect intrusions. The results of these tests [11]. K. Nugroho, E. Noersasongko, Purwanto, Muljono
have been used to evaluate the effectiveness of these and H. A. Santoso, "Javanese gender speech
classifiers. The NSL-KDD data set is used to evaluate these recognition using deep learning and singular value
classifiers. TPR and FPR have been used to compare the decomposition", Proc. Int. Seminar Appl. Technol.
classifiers in order to determine which one is the most Inf. Commun. (iSemantic), pp. 251-254, Sep. 2019.
accurate and precise. Machine learning technologies are [12]. A. R. Sharma and P. Kaushik, "Literature survey of
being used to detect assaults in IDS and to create a successful statistical deep and reinforcement learning in natural
IDS in this work. Researchers are concerned about the language processing", Proc. Int. Conf. Comput.
security of data in computer-based systems. Based on the Commun. Autom. (ICCCA), pp. 350-354, May
limitations of existing classifiers, there is a strong necessity 2017.
to design an efficient and effective classifier for accurate [13]. Y. Xin, L. Kong, Z. Liu, Y. Chen, Y. Li, H. Zhu, et
intrusion detection. al., "Machine learning and deep learning methods
dermoscopy, which provides high resolution, uniformity, found in an already existing mole, the mole's texture may
and consistency. Since dermoscopic images contain so many change as well. It's possible that different skin lesions will
datasets, investigation on skin lesion evaluation has focused have a different sensation [11]. Although the lesions on the
mostly on dermoscopic images in the past. Skin-imaging skin of people with melanoma are typically painless,
devices such as dermoscopes, on the other side, are detecting them will help to avoid for future problems. The
prohibitively complex and expensive extensive training and ABCDE melanoma is shown in Figure 2.
expertise in order to be properly utilize [6].
On the other hand, non-dermoscopic photos can be acquired
with low-cost mobile phones that are commonly accessible
in both developed and developing countries. Non-
dermoscopic image processing CAD systems are more
widely applicable and available, these systems must be able
to withstand considerable picture fluctuations that occur
without dermoscopy [7]. The system's ability to recognise
lesion boundaries despite noise, hair, and other poor contrast
or non-existent impediments is based on new segmentation
algorithms. Skin lesions are identified using these
techniques when the lesion is segmented from the rest of the
skin. In addition to its asymmetrical growth pattern,
irregular border patterns, and a wide range of pigmentation, Fig 2: A is for Asymmetry
melanoma tumours show evidence of evolution in the form
of the ABCDE symbol. Photos taken from unknown ranges
and angles create asymmetrical images, wavy borders, and
color irregularities [8].
Melanoma is a type of cancer that develops when pigment-
producing cells in the skin become malignant. If it starts in
the body's pigmented tissues, melanoma can travel to other
parts like the eye or gut as well as to the skin [9]. Melanoma,
which accounts for less than one percent of all skin
malignancies, is responsible for the majority of skin cancer
mortality. Females under the age of 30 account for the bulk
of those diagnosed with this cancer, which has a very high
incidence. Melanoma's incidence has risen significantly
during the past 30 years. Melanoma cases have increased
Fig 3: B is for Border
significantly over the past few decades, and this is mainly
ascribed to an increase in UV exposure [10].
The ABCDE rule
Unbalance: On one part of the mole, the shape is off. There
are noticeable imperfections in the image edges.
Color. All shades of black, brown, and tan are available.
Several colors may be seen in the image: white, grey, red,
and blue.
The diameter: On the whole, it has a diameter of at least 6
millimetres (mm). An inch and a quarter is the approximate
diameter of this object. Smaller tumours are more common
in the early stages of the disease.
Fig 4: C is for Color
Adapting to the changing world around us.
Previously unaffected by mole growth, previously normal
skin is now sprouting new moles, or existing moles are
spreading to previously unaffected skin. When melanoma is
Fig 5: D is for Diameter or Dark Skin cancer is one of the most common forms of cancer, and
it is one of the most deadly disease. Automated diagnosis of
metastatic melanoma and other pigmented skin conditions
has been much improved using image analysis, compared to
unaided eye assessment. The pathologist receives
information about the patient's age, gender, tumour location,
and size from the clinical module. The ResNet-50 network,
repurposed for predicting the likelihood of melanoma
categorization, is used in the deep learning arm to transfer
knowledge. To estimate the overall likelihood of developing
melanoma, the categorization scores from both processing
arms are combined using logistic regression. The analyzed
models and limitations are shown in Table 1.
Table 1: Considered Models and Limitations
Fig 6: E is for Evolving
Name of
ABCD rule uses a total dermoscopic score, where A
the year Methodology Limitations
represents asymmetry, B represents border abnormalities, C
author
represents colour variations, and D represents diameter.
For the classification
Individual weight is allocated for every particular feature The filtering
of Melanoma and
based on their importance. In general, researchers focus on model applied
Seborrheic
computer-aided diagnostic systems for automatically performance is
Keratosis, the author
classifying and identifying cancer. Graphics in the form of better.
proposed a multi-
geometric, colour and combination aspects have been used However, the
view filtering
for this purpose. complexity of
transfer learning
the model
Although it is still difficult to diagnose the early stages of strategy, as proved
causes
melanoma using distinguishing signs, it is possible [12]. J. Bian by comprehensive
2021 overload that
Using handmade characteristics for melanoma identification et al. [1] skin lesion
degrades the
requires an expert's knowledge of skin cancer type, colour, classification trials,
performance.
shape, and texture. Skin cancer CAD solutions with deep is superior to other
The complexity
learning-based automation are becoming increasingly approaches, and the
levels can be
popular as a means of resolving this problem [13]. These analysis of the
reduced to
deep learning-based solutions, however, still have a primary elements
improve the
requirement because of the limited labelled data available. confirms this
performance
finding.
ML technologies that potentially aid in early diagnosis of levels.
skin cancer were analyzed in this Systematic Review. The author proposed The
Primary and community care [14], where skin cancer a new technique segmentation
incidence is lower than in specialty clinics, is the subject of B. A.
called Predict- model does not
this review. Because most worrisome skin lesions are first Albert et 2020
Evaluate-Correct K- considers the
assessed in this scenario, ML may be most useful in this al. [2]
fold (PECK) that edge regions of
context [15]. To determine whether ML technologies could teaches ensembles the object. The
that can send and receive electrical impulses. Thus, artificial characteristics. The numerous machine learning algorithms
neural networks are now equipped to tackle multi-layered for skin cancer detection and classification have been
issues of unprecedented complexity. It can be difficult to analyzed in this systematic review research. There are no
train and fine-tune ANNs due to their complexity, and risks involved with any of these methods but there are
enormous volumes of training data are generally required. various limitations that need to be overcome. Preprocessing
However, a well-trained ANN can accomplish what would and picture segmentation, followed by feature extraction and
be impossible for a set of algorithms to do alone. classification, are necessary steps in skin cancer detection.
There are pros and downsides to each algorithm. There is
Artificial neural networks come in a wide variety, some of currently no way to answer a patient's question about
which are: whether or not a certain skin cancer symptom is present on
1. Feedforward neural network any portion of their body. The concept of self-organization
2. Feedback neural network in machine learning has just arisen. This research presents a
3. Recurrent neural network brief survey on numerous machine learning models for
4. Classification-prediction network detection of melanoma. The suggestions to overcome the
5. Radial basis function network limitations are also provided to design an effective model for
6. Dynamic neural network melanoma classification and detection In the future, its study
7. Modular neural network could improves the precision of image processing systems,
notably for medical imaging, nevertheless, In order to
4. PROPOSED METHODOLOGIES control these variables, dermatoscopes can be used, although
they are more complex and need more expertise than other
Malignant melanomas most commonly grow in the lower methods. The suggested approaches used images of the
limbs, face, neck, and trunk, but many of these tumours region of interest, which helped to focus on the most
begin as preexisting moles. The colour and texture of the important aspects of the data for better accuracy rates.
lesion's border and surface are important in defining the
clinical diagnosis of the lesion. As a result, the first step in Future Scope of Research
identifying whether or not the suspicious growth is In healthcare, AI can be used for a variety of tasks, including
cancerous is to have it thoroughly checked in brilliant light diagnosis and treatment. In order to train the machine
by a specialist. It is critical for the doctor to know when the learning approach, AI systems need constant input of new
patient first noticed the development or realised it had grown data that is clean. Better results from AI applications will be
larger. The emergence of the dermatoscope, a new achieved if clinicians and patients can work together to give
magnification device used by some clinicians, has made it images on an ongoing basis. The data fed into AI systems
easier to examine bothersome moles. This research presents should be handled with care to protect individuals'
a brief survey on existing models and their limitations and to anonymity and privacy. More information on
overcome those limitations, developing a new model is dermatologists' attitudes about and comfort with using ML
strongly required. The following objectives are suggested to to diagnose skin malignancies is needed, and this can only
overcome the limitations of the existing models that includes be gained from larger-scale studies. The noise removal
creating an Enhanced Morphological Operative Model techniques can be further enhanced to get a denoised image
employing dermoscopy pictures for edge identification and for accurate prediction levels. The features considered in
image quality improvement. To create a Multi Level Feature existing models can be reduced further to reduce the time
Extraction and Selection model that takes into account complexity levels.
valuable features with high correlation for accurate model
training and then implement an efficient clustering model REFERENCES
for grouping similar types of values into a single group for
each feature set and then to create a constructive classifier [1]. J. Bian, S. Zhang, S. Wang, J. Zhang and J. Guo,
for training the model with the feature vector set and then "Skin Lesion Classification by Multi-View Filtered
predicting the type of skin cancer using a test image and Transfer Learning," in IEEE Access, vol. 9, pp.
finally to compare the suggested model's performance to that 66052-66061, 2021, doi:
of traditional models, and to demonstrate that the proposed 10.1109/ACCESS.2021.3076533.
model's performance is superior. [2]. B. A. Albert, "Deep Learning From Limited Training
Data: Novel Segmentation and Ensemble Algorithms
5. CONCLUSION Applied to Automatic Melanoma Diagnosis,"
in IEEE Access, vol. 8, pp. 31254-31269, 2020, doi:
Existing skin lesion diagnostic tools lack scalability, and 10.1109/ACCESS.2020.2973188.
many supervised learning experiments overlook the negative [3]. R. Ashraf et al., "Region-of-Interest Based Transfer
impact of source samples on their findings. Melanomas and Learning Assisted Framework for Skin Cancer
nevi are difficult to categorize because of their various
Detection," in IEEE Access, vol. 8, pp. 147858- [14]. W. Zhou, Z. Chen, Q. Zhou and D. Xing, "Optical
147871, 2020, doi: 10.1109/ACCESS.2020.3014701. Biopsy of Melanoma and Basal Cell Carcinoma
[4]. A. Naeem, M. S. Farooq, A. Khelifi and A. Abid, Progression by Noncontact Photoacoustic and Optical
"Malignant Melanoma Classification Using Deep Coherence Tomography: In Vivo Multi-Parametric
Learning: Datasets, Performance Measurements, Characterizing Tumor Microenvironment," in IEEE
Challenges and Opportunities," in IEEE Access, vol. Transactions on Medical Imaging, vol. 39, no. 6, pp.
8, pp. 110575-110597, 2020, doi: 1967-1974, June 2020, doi:
10.1109/ACCESS.2020.3001507. 10.1109/TMI.2019.2962614.
[5]. J. R. Hagerty et al., "Deep Learning and Handcrafted [15]. Agrahari, P., Agrawal, A., Subhashini, N. (2022).
Method Fusion: Higher Diagnostic Accuracy for Skin Cancer Detection Using Deep Learning. In:
Melanoma Dermoscopy Images," in IEEE Journal of Sivasubramanian, A., Shastry, P.N., Hong, P.C. (eds)
Biomedical and Health Informatics, vol. 23, no. 4, Futuristic Communication and Network
pp. 1385-1391, July 2019, doi: Technologies. Lecture Notes in Electrical
10.1109/JBHI.2019.2891049. Engineering, vol 792. Springer, Singapore.
[6]. Z. Yu et al., "Early Melanoma Diagnosis With https://doi.org/10.1007/978-981-16-4625-6_18.
Sequential Dermoscopic Images," in IEEE [16]. W. Wu et al., "Scale-Aware Transformers for
Transactions on Medical Imaging, vol. 41, no. 3, pp. Diagnosing Melanocytic Lesions," in IEEE Access,
633-646, March 2022, doi: vol. 9, pp. 163526-163541, 2021, doi:
10.1109/TMI.2021.3120091. 10.1109/ACCESS.2021.3132958.
[7]. S. Albahli, N. Nida, A. Irtaza, M. H. Yousaf and M. [17]. L. Song, J. Lin, Z. J. Wang and H. Wang, "An End-
T. Mahmood, "Melanoma Lesion Detection and to-End Multi-Task Deep Learning Framework for
Segmentation Using YOLOv4-DarkNet and Active Skin Lesion Analysis," in IEEE Journal of
Contour," in IEEE Access, vol. 8, pp. 198403- Biomedical and Health Informatics, vol. 24, no. 10,
198414, 2020, doi: 10.1109/ACCESS.2020.3035345. pp. 2912-2921, Oct. 2020, doi:
[8]. L. D. Biasi, A. A. Citarella, M. Risi and G. Tortora, 10.1109/JBHI.2020.2973614.
"A Cloud Approach for Melanoma Detection Based [18]. S. Sabbaghi Mahmouei, M. Aldeen, W. V. Stoecker
on Deep Learning Networks," in IEEE Journal of and R. Garnavi, "Biologically Inspired QuadTree
Biomedical and Health Informatics, vol. 26, no. 3, Color Detection in Dermoscopy Images of
pp. 962-972, March 2022, doi: Melanoma," in IEEE Journal of Biomedical and
10.1109/JBHI.2021.3113609. Health Informatics, vol. 23, no. 2, pp. 570-577,
[9]. R. Rastghalam, H. Danyali, M. S. Helfroush, M. E. March 2019, doi: 10.1109/JBHI.2018.2841428.
Celebi and M. Mokhtari, "Skin Melanoma Detection [19]. Vijayakumar, Dr T. "SELECTIVE IMAGE
in Microscopic Images Using HMM-Based ENHANCEMENT AND RESTORATION FOR
Asymmetric Analysis and Expectation SKIN CANCER IDENTIFICATION." Journal of
Maximization," in IEEE Journal of Biomedical and Innovative Image Processing 1, no. 1 (2019): 1-10.
Health Informatics, vol. 25, no. 9, pp. 3486-3497, [20]. Pandian, A. Pasumpon. "Identification and
Sept. 2021, doi: 10.1109/JBHI.2021.3081185. classification of cancer cells using capsule network
[10]. A. A. Adegun and S. Viriri, "Deep Learning-Based with pathological images." Journal of Artificial
System for Automatic Melanoma Detection," in Intelligence 1, no. 01 (2019): 37-44.
IEEE Access, vol. 8, pp. 7160-7172, 2020, doi:
10.1109/ACCESS.2019.2962812.
[11]. M. Q. Khan et al., "Classification of Melanoma and
Nevus in Digital Images for Diagnosis of Skin
Cancer," in IEEE Access, vol. 7, pp. 90132-90144,
2019, doi: 10.1109/ACCESS.2019.2926837.
[12]. Q. Wang et al., "Identification of Melanoma From
Hyperspectral Pathology Image Using 3D
Convolutional Networks," in IEEE Transactions on
Medical Imaging, vol. 40, no. 1, pp. 218-227, Jan.
2021, doi: 10.1109/TMI.2020.3024923.
[13]. H. Arab, L. Chioukh, M. Dashti Ardakani, S. Dufour
and S. O. Tatu, "Early-Stage Detection of Melanoma
Skin Cancer Using Contactless Millimeter-Wave
Sensors," in IEEE Sensors Journal, vol. 20, no. 13,
pp. 7310-7317, 1 July1, 2020, doi:
10.1109/JSEN.2020.2969414.
I. INTRODUCTION
Fig. 1. Overview of smart healthcare diagnosis
Autism Spectrum disorder is a condition that is relevant to
human brain development. An individual who has agonized
The human genes touch the expansion by swaying the execute, thus supporting the rehabilitations achieved by health
atmosphere. There is approximately risk factor which effects specialists in progenies with ASD.
ASD like as low birth weight, a sibling with ASD and Mekbib et al. [15] offer a VR gaming scheme that uses
consuming old parents, etc. Early discovery and treatment are stressor games to notice diverse emotional reactivity patterns,
greatest significant stages that should be taken to diminish the psychological sensor signals, in-game presentation and answers,
signs of autism spectrum disorder issues and to recover the and energetically changes the game scene rendering to the
excellence of life of ASD suffering people [5]. Though, there is present expressive state. This is an outline of a lasting training,
no process of medical test for discovery of autism. Fig. 1 anywhere the eventual box was to progress a VR scheme by
represents the overview of smart healthcare analysis. actual response for assisting early diagnosis and screening of
A noteworthy share of paediatric people suffers from ASD ASD. Chen et al. [16] study use VR technology, joint by
[6]. In many cases, it can generally be recognized in its opening wearable multi-model detection technology, with EEG, eye
stages, however, the main blockage lies in the personal and dull tracking, and heart rate variability (HRV). Physical signs and
nature of prevailing judgement measures [7, 8]. Consequently, game presentation data have been composed while operators
there will be a waiting period of at least 13 months in the exercising, and participating in many appraisal scales such as
preliminary doubt to the real analysis. The analysis takings ADOS, SRS, and CBCL. Arithmetical analysis of such data is
several hours, and the unceasingly rising request for action is made to categorize those finished ML techniques for
more than the top volume of the nation’s paediatric clinics [9]. formulating a VR assistance mechanism that is employed for
Though, due to the gaps among preliminary concerns and evaluating the social behavior, analysis, harshness, and
analysis, a lot of valuable time was lost as this illness leftovers treatment of ASD.
unnoticed. Machine Learning (ML) approaches not only aid to
measure the danger for ASD accurately, nonetheless were even III. THE PROPOSED MODEL
indispensable to rationalizing the whole analysis procedure and In this article, a new EODL-SDC system was developed
aid people access the demanded treatments faster [10]. ASD classification process. The presented EODL-SDC
This article designs an Equilibrium Optimizer with Deep technique operates in two major phases. In the initial phase, the
Learning Model for Autism Spectral Disorder Classification presented EODL-SDC technique applied the DBN model for
(EODL-ASDC) technique. The presented EODL-ASDC ASD classification process. Next, in the second phase, the
technique mainly focuses on the identification and classification EODL-SDC technique utilized the EO algorithm as a
of ASD. To attain this, the presented EODL-ASDC technique hyperparameter optimizer.
exploits the deep belief network (DBN) approach to act the
classification procedure. In addition, the EO algorithm is A. ASD Classification using DBN
employed for the optimal hyperparameter tuning of the DBN Primarily, the presented EODL-SDC technique applied the
system. For demonstrating the improved ASD classification DBN model for ASD classification process. A DBN is a variant
outcomes of the EODL-ASDC system, an extensive range of of DNN that encompasses stacked RBM and 𝑠 BPNN which
experimental analyses is performed. applies a supervised learning methodology for enhancing the
network variable and an unsupervised greedy learning
II. LITERATURE REVIEW mechanism to adjust the weight connected RBM [17]. The RBM
Tawhid et al. [11] formulates an effectual autism diagnostic encompasses 𝐻𝑘 = (ℎ1 , ℎ2 , ⋯ , ℎ𝑚 ) hidden layer and 𝑉𝑘 =
structure that could automatically find autism related to time– (𝑣1 , 𝑣2 , ⋯ , 𝑣𝑛 )visible layer. The hidden layer 𝐻1 and the visible
frequency spectrogram image in EEG signals. Initially, the raw layer 𝑉1 forms 𝑅𝐵𝑀1 , the hidden layer 𝐻2 form 𝑅𝐵𝑀2 , and the
EEG data was pre-processed through numerous methods like hidden layer 𝐻1 as the visible layer of 𝑅𝐵𝑀2 and so on. The
normalization, re-referencing, and filtering. Then, the pre- weight among the interconnected neuron, 𝐴𝑘 = {𝑎𝑖 } = 𝑅𝑛 and
processed EEG signals can be transformed into 2D images 𝐵𝑘 = {𝑏𝑗 } = 𝑅𝑚 indicates the visible and hidden biases of 𝑘-𝑡ℎ
through a short-time FT. After that, textural features were RBM and, 𝑊𝑘 = {𝑤𝑖,𝑗 } ∈ 𝑅𝑛×𝑚 denotes the connection weight
derived, and significant features were chosen through PCA, and amongst the visible and hidden layers of 𝑘-𝑡ℎ RBM. Thus, three
fed to SVM technique for classification. Negin et al. [12] devise parameters are required to determine the RBM. For DBN with
a non-intrusive vision-based technique related to human action voltage charging, the energy function of interior RBM is defined
detection for facilitating the diagnosis of autism spectrum as follows:
disorder (ASD). Several local descriptors, which will be 𝐸(𝑉𝑘 , 𝐻𝑘 |𝜃𝑘 ) = −𝐴𝑇𝑘 𝑉𝑘 − 𝐵𝑘𝑇 𝐻𝑘 − 𝑉𝑘𝑇 𝑊𝑘 𝐻𝑘 (1)
generally utilized in the BoVW technique, have been tested with Now, 𝑉𝑘 and 𝐻𝑘 denotes the binary state of all the units in 𝑘-
SVM, MLP, and Gaussian Naive Bayes (GNB) techniques to 𝑡ℎ visible and hidden units. The lowest energy function
recognize ASD associated behaviors. demonstrates the ideal state of the networks, i.e., the lowest
In [13], a new multimodal picture book recommendation prediction error for EV charging voltage. The joint likelihood
structure that integrates textual data and image data for distribution of the RBM is attained by regularizing and
computing the similarity among the picture records and the exponentializing the energy function as follows:
discussion topics was modelled and assessed through a testing exp(−𝐸(𝑉𝑘 , 𝐻𝑘 |𝜃𝑘 ))
database. In [14], the authors offer the structure of an intellectual 𝑃(𝑉𝑘 , 𝐻𝑘 |𝜃𝑘 ) = (2)
mirror for recognizing 5 fundamental emotions they are angry, 𝑍(𝜃𝑘 )
sad, neutral, happy, and scared. This mirror will use CNNs for 𝑍(𝜃𝑘 ) = ∑ exp (−𝐸(𝑉𝑘 ′ 𝐻𝑘 |𝜃𝑘 )) (3)
analysing the images that can be seized by a photographic 𝑣𝑘 ,𝐻𝑘
camera and compare them with ones that the patient must
Now, 𝑍(𝜃𝑘 ) denotes the partition function which describes chased the equilibrium state. During exploitation and
the sum of every probable state energy function of the set of 𝑉𝑘 exploration stages, the 5 equilibrium candidate supports 𝐸𝑂. The
and 𝐻𝑘 node in the charging voltage DBN, as it is employed as first four candidates seeks particle exploration, while 5th
the objective function of optimization technique. According to candidate with average values seeks change in exploitation and
the structure feature of RBM, the probability that 𝑗-𝑡ℎ unit ℎ𝑗 of that candidate poses a vector termed the equilibrium pool.
hidden layer 𝐻𝑘 and the 𝑖-𝑡ℎ unit 𝑣𝑖 of visible layer 𝑉𝑘 are 𝐶⃗eq,pool = {𝐶⃗𝑒𝑞(1) , 𝐶⃗𝑒𝑞(2) , 𝐶⃗𝑒𝑞(3) , 𝐶⃗𝑒𝑞(4) , 𝐶⃗𝑒𝑞(𝑎𝑣𝑒) } (7)
activated in the following: The updating of concentration allows EO to balance
𝑚
exploration and exploitation equally
𝑃(𝑣𝑖 = 1|𝐻𝑘 ) = 𝜎 (𝑎𝑖 + ∑ ℎ𝑗 𝑤𝑖𝑗 ) (4) ⃗⃗
𝐹⃗ = 𝑒 −𝜆(𝑡−𝑡0) (8)
𝑖=1
𝑛 Now, 𝜆⃗ shows a random number supposed to differ amongst
𝑃(ℎ𝑗 = 1|𝑉𝑘 ) = 𝜎 (𝑏𝑗 + ∑ 𝑣𝑗 𝑤𝑖𝑗 ) (5) [0, 1], allowing turnover rate fluctuation for the specific time,
and 𝑡 is reduced as the iteration count rises based on the
𝑖=1
−𝑥
Whereas 𝜎(𝑥) = 1/(1 + 𝑒 ) denotes the sigmoid following expression.
𝐼𝑡 𝐼𝑡
activation function. (𝑎 )
𝑡 = (1 − ) 2 Max− 𝑖𝑡 (9)
The DBN training technique to charge voltage encompasses Max− 𝑖𝑡
two stages of pretraining and finetuning. In the finetuning, 𝐼𝑡 and Max− 𝑖𝑡 represents the current and maximal iteration
BPNN takes the estimated charging voltage as the output and the count, and 𝑎2 signifies a constant to control the ability for
predicted charging voltage as an input as well as adjusts and exploitation. Additional parameter 𝑎1 , is exploited to improve
optimizes the network variable from top to bottom in supervised exploitation and exploration [19].
learning. In the pre-training process, 𝑅𝐵𝑀1 receive dataset on 1 ⃗⃗⃗⃗⃗⃗⃗⃗⃗
the EV voltage, mandatory current, current, and charging 𝑡⃗ = 𝑙𝑛 (‐ 𝑎1 𝑠𝑖𝑔𝑛 (𝑟⃗ − 𝑂. 5) [1 − 𝑒 −𝜆⃗⃗𝑡 ]) + 𝑡 (10)
⃗
𝜆
temperature, and train RBM in the bottom‐up series with layer- The generation rate can be represented as 𝐺 that improves
wise greedy learning approach for accomplishing the extraction exploitation.
of highest‐level feature of the input dataset and the upgrade of ⃗
𝐺⃗ = 𝐺⃗0 𝑒 −𝑙(𝑡−𝑡0) (11)
the weight connected training network. Fig. 2 demonstrates the ⃗
framework of DBN technique. From the expression, 𝑙 represents an arbitrary number within
[0, 1] is shown below.
𝐺⃗0 = 𝐺𝐶⃗𝑃(𝐶⃗eq − 𝜆⃗𝐶⃗) (12)
0.5𝑟 1 , 𝑟2 ≥ 𝐺𝑃
𝐺𝐶⃗𝑃 = { (13)
0, 𝑟2 < 𝐺𝑃
Now, the arbitrary value can be denoted by 𝑟1 and 𝑟2 and
differs between zero and one. The vector ⃗⃗⃗⃗⃗⃗ 𝐺𝐶 𝑃 denoted the
parameter which controls the generation rate is employed to the
update time.
𝐺⃗
𝐶⃗ = 𝐶⃗ + (𝐶⃗ − 𝐶⃗𝑒𝑞 ). 𝐹⃗ + (1 − 𝐹⃗ ) (14)
𝜆⃗𝑉
The value of 𝑉 is corresponding to one.
IV. EXPERIMENTAL VALIDATION
The proposed model is simulated using Python tool. The
experimental validation of the EODL-ASDC model is tested
under 70% of TR data and 30% of TS data. The confusion matrix
Fig. 2. Architecture of DBN produced by the EODL-ASDC model on 70% of TR database is
given in Fig. 3. The figure reported that the EODL-ASDC model
B. Parameter Tuning using EO Algorithm has recognized 46.43% of samples into Yes class and 48.57% of
Next, the EODL-SDC technique utilized the EO algorithm samples into No class.
as a hyperparameter optimizer. The conception of single‐
objective EO was developed in 2020 [18]. Generally, it applies
a mass balance equation, the EO was based on dynamic mass
balance. The equation of mass balance search for the system
equilibrium state. Initially, EO applies a particle group, whereby
each particle describes the concentration vector which includes
the problem solution and it is given below:
𝑌𝑗𝑖𝑛𝑖𝑡𝑖𝑎𝑙 = 𝑙𝑏 + 𝑟𝑎𝑛𝑑𝑗 (𝑢𝑏 − 𝑙𝑏) , 𝑗 = 0,1,2,3, … , 𝑛 (6)
Here, 𝑌𝑗𝑖𝑛𝑖𝑡𝑖𝑎𝑙 indicates the concentration vector of 𝑗𝑡ℎ
particles, 𝑢𝑏, and 𝑙𝑏 show upper and lower limits of each
parameter, 𝑛 denotes the particle count, 𝑟𝑎𝑛𝑑𝑗 indicates an
arbitrary number lies in zero and one. The EO methodology
Fig. 3. Confusion matrix of EODL-ASDC system under 70% Fig. 4. Confusion matrix of EODL-ASDC system under 70%
of TR database of TR database
TABLE I The confusion matrix produced by the EODL-ASDC
RESULT ANALYSIS OF EODL-ASDC SYSTEM UNDER 70% OF TR approach on 30% of TS database is provided in Fig. 3. The figure
DATABASE stated that the EODL-ASDC technique has recognized 453% of
Training Phase (70%) samples into Yes class and 53.33% of samples into No class.
Table 2 provides a brief classification outcome of the EODL-
F-
Class Accuracy Precision Recall MCC ASDC system on 30% of TS database. The presented EODL-
Score
ASDC approach has identified samples into ‘Yes’ class with
Yes 95.00 100.00 90.28 94.89 90.47 𝑎𝑐𝑐𝑢𝑦 of 98.33%, 𝑝𝑟𝑒𝑐𝑛 of 100%, 𝑟𝑒𝑐𝑎𝑙 of 96.43%, 𝐹𝑠𝑐𝑜𝑟𝑒 of
No 95.00 90.67 100.00 95.10 90.47 98.18%, and MCC of 96.70%. Followed by, the presented
Average 95.00 95.33 95.14 95.00 90.47 EODL-ASDC method has identified samples into ‘No’ class
with 𝑎𝑐𝑐𝑢𝑦 of 98.33%, 𝑝𝑟𝑒𝑐𝑛 of 96.97%, 𝑟𝑒𝑐𝑎𝑙 of 100%, 𝐹𝑠𝑐𝑜𝑟𝑒
of 98.46%, and MCC of 96.70%.
Table 1 offers a brief classification outcome of the EODL-
ASDC model on 70% of TR database. The presented EODL- TABLE II
ASDC model has identified samples into ‘Yes’ class with 𝑎𝑐𝑐𝑢𝑦 RESULT ANALYSIS OF EODL-ASDC SYSTEM UNDER 70% OF TR
of 95%, 𝑝𝑟𝑒𝑐𝑛 of 100%, 𝑟𝑒𝑐𝑎𝑙 of 90.28%, 𝐹𝑠𝑐𝑜𝑟𝑒 of 94.89%, and DATABASE
MCC of 90.47%. On the other hand, the projected EODL-ASDC
Testing Phase (30%)
approach has identified samples into ‘No’ class with 𝑎𝑐𝑐𝑢𝑦 of
F-
95%, 𝑝𝑟𝑒𝑐𝑛 of 90.67%, 𝑟𝑒𝑐𝑎𝑙 of 100%, 𝐹𝑠𝑐𝑜𝑟𝑒 of 95.10%, and Class Accuracy Precision Recall
Score
MCC
MCC of 90.47%.
Yes 98.33 100.00 96.43 98.18 96.70
No 98.33 96.97 100.00 98.46 96.70
Average 98.33 98.48 98.21 98.32 96.70
of DCNN model for the automated classification or detection of related to the TL method. Alfaer et al. [14] modelled an
ICH [10]. automated ICH analysis through fuse -related DL with SI
This article develops an automated ICH detection and (AICH-FDLSI) technique. The AICH-FDLSI technique
classification using Rider Optimization with Deep Learning functions in 4 major stages like classification, preprocessing,
(ICHDC-RODL) method. The presented ICHDC-RODL feature extraction, and image segmentation. Moreover, the
technique mainly determines the presence of ICH using DL fusion-related feature extracting technique utilizing the
concepts. In the presented ICHDC-RODL technique, the EfficientNet and CapsNet has been enforced for deriving a
features are generated by the use of Xtended Central Symmetric valuable attribute set. Furthermore, DHO technique was
Local Binary Pattern (XCS-LBP) model. Moreover, the employed for the parameter optimized of the DenseNet and
bidirectional long short term memory (BiLSTM) method is CapsNet methods. Lastly, an FSVM was enforced as a classifier
employed for ICH diagnosis. At last, the rider optimization approach for recognizing the diverse classes of ICH.
algorithm (ROA) is exploited for the hyperparameter tuning In [15], the DL techniques, hybrid methods CNN with
procedure of the BiLSTM method. To demonstrate the enhanced LSTM and CNN with GRU were modelled for Brain
outcomes of the ICHDC-RODL method, a series of simulations Hemorrhage categorization. The main aim of this work was to
will be performed and the fallouts were scrutinized in numerous employ the concept influence of DL on a set of less images since
features. in most critical cases wide datasets are non-accessible on the
spot. The image growth and unbalancing the data approaches
II. RELATED WORKS were implemented with CNN technique for designing a unique
Anupama et al. [11] advance DL–related ICH diagnosis structure called Brain Hemorrhage Classification related to NN
utilizing GrabCut-oriented segmentation including synergic (BHCNet). Hilal et al. [16] grant a brainy ICH diagnosis
deep learning (SDL), termed GC-SDL method. The modelled utilizing biosignals (IICHD-BS) in IoT setting. Besides, IICHD-
technique uses Gabor filter for noise removal so that the BS method pays optimal area growing based division method
duplicate excellence is elevated. Moreover, GrabCut-related for detection the diseased intelligence areas in the CT images.
segmentation method was enforced to recognize the Also, EfficientNet related feature removal and functional link
contaminated portions efficiently in the image. For performing NN (FLNN) related arrangement method are castoff for noticing
the feature extracting procedure, SDL technique was used and to and categorizing the presence of ICH.
end, softmax layer was utilized as a technique. Rahman et al.
[12] offer a DL technique named CNN on neuroimaging with III. THE PROPOSED MODEL
TL methods for supporting the analysis of intra hemorrhage on In this article, a new ICHDC-RODL method was devised for
CT scans. The author employed six pre-trained CNN techniques the ICH detection and classification process. The presented
(VGG16, EfficientNet_B6, ResNet50, DenseNet_121, ICHDC-RODL technique mainly determines the presence of
InceptionResNet_V2, InceptionV3,) and even provide a ICH using DL concepts. In the presented ICHDC-RODL
conventional CNN method of 11-layer structure for detecting technique, the features are generated by the use of the XCS-LBP
binary organization of intracranial brain loss on CT scans. model. Moreover, the ROA with BiLSTM model is employed
Kumar [13] scrutinizes the intracranial hemorrhage for ICH diagnosis. Fig. 1 represents the block diagram of
detection issue and advances a DL technique and TL approaches ICHDC-RODL system.
for diminishing the time mandated for recognizing hemorrhages.
For classifying ICH sub types, the author formulated a CNN
90.61%. Then, the CNN and ResNexT approaches have reported REFERENCES
slightly enhanced 𝐹𝑠𝑐𝑜𝑟𝑒 of 95.23% and 92.81% [1] Mansour, R.F., Escorcia-Gutierrez, J., Gamarra, M., Díaz, V.G., Gupta,
correspondingly. Although the SVM and WED-DCNN D. and Kumar, S., 2021. Artificial intelligence with big data analytics-
techniques have shown reasonable 𝐹𝑠𝑐𝑜𝑟𝑒 of 95.78% and based brain intracranial hemorrhage e-diagnosis using CT images. Neural
Computing and Applications, pp.1-13.
95.92%, the ICHDC-RODL model has reached maximum 𝐹𝑠𝑐𝑜𝑟𝑒
of 98.56%. Thus, the presented ICHDC-RODL model can be [2] Altuve, M. and Pérez, A., 2022. Intracerebral hemorrhage detection on
computed tomography images using a residual neural network. Physica
employed for effectual classification process. Medica, 99, pp.113-119.
[3] Chen, H., Khan, S., Kou, B., Nazir, S., Liu, W. and Hussain, A., 2020. A
smart machine learning model for the detection of brain hemorrhage
diagnosis based internet of things in smart cities. Complexity, 2020.
[4] Woźniak, M., Siłka, J. and Wieczorek, M., 2021. Deep neural network
correlation learning mechanism for CT brain tumor detection. Neural
Computing and Applications, pp.1-16.
[5] Phan, A.C., Cao, H.P., Trieu, T.N. and Phan, T.C., 2020, November.
Detection and classification of brain hemorrhage using Hounsfield unit
and deep learning techniques. In International Conference on Future
Data and Security Engineering (pp. 281-293). Springer, Singapore.
[6] Muthumanjula, M., and Ramasubramanian Bhoopalan. "Detection of
White Blood Cell Cancer using Deep Learning using Cmyk-Moment
Localisation for Information Retrieval." Journal of IoT in Social, Mobile,
Analytics, and Cloud 4, no. 1 (2022): 54-72.
[7] Bindhu, V., and Villankurichi Saravanampatti PO. "Semi-Automated
Segmentation Scheme for Computerized Axial Tomography Images of
Esophageal Tumors." Journal of Innovative Image Processing (JIIP) 2,
no. 02 (2020): 110-120.
Fig. 9. 𝐴𝑐𝑐𝑢𝑦 analysis of ICHDC-RODL system with other [8] Malik, P. and Vidyarthi, A., 2022. A deep learning assisted image-guided
existing approaches framework for differentiation among tumors and hemorrhages in head
imaging. Computers and Electrical Engineering, 103, p.108330.
[9] Rane, H. and Warhade, K., 2021, March. A Survey on Deep Learning for
Intracranial Hemorrhage Detection. In 2021 International Conference on
Emerging Smart Computing and Informatics (ESCI) (pp. 38-42). IEEE.
[10] Sharrock, M.F., Mould, W.A., Ali, H., Hildreth, M., Awad, I.A., Hanley,
D.F. and Muschelli, J., 2021. 3D deep neural network segmentation of
intracerebral hemorrhage: development and validation for clinical
trials. Neuroinformatics, 19(3), pp.403-415.
[11] Anupama, C.S.S., Sivaram, M., Lydia, E.L., Gupta, D. and Shankar, K.,
2020. Synergic deep learning model–based automated detection and
classification of brain intracranial hemorrhage images in wearable
networks. Personal and Ubiquitous Computing, pp.1-10.
[12] Rahman, A.I., Bhuiyan, S., Reza, Z.H., Zaheen, J., Khan, T.A.N. and
Karim, D.Z., 2022, March. Intracranial Hemorrhage Detection on CT
Scan Images using Transfer Learning Approach of Convolutional Neural
Network. In Proceedings of the 2nd International Conference on
Computing Advancements (pp. 171-177).
[13] Kumar, R., 2021. Intracranial Hemorrhage Detection Using Deep
Learning and Transfer Learning (Doctoral dissertation, Dublin, National
College of Ireland).
Fig. 10. 𝐹𝑠𝑐𝑜𝑟𝑒 analysis of ICHDC-RODL system with other [14] Alfaer, N.M., Aljohani, H.M., Abdel-Khalek, S., Alghamdi, A.S. and
existing approaches Mansour, R.F., 2022. Fusion-based deep learning with nature-inspired
algorithm for intracerebral haemorrhage diagnosis. Journal of Healthcare
V. CONCLUSION Engineering, 2022.
[15] Mushtaq, M.F., Shahroz, M., Aseere, A.M., Shah, H., Majeed, R.,
In this article, a new ICHDC-RODL system was projected Shehzad, D. and Samad, A., 2021. BHCNet: neural network-based brain
for the ICH detection and classification process. The presented hemorrhage classification using head CT Scan. IEEE Access, 9,
ICHDC-RODL technique mainly determines the presence of pp.113901-113916.
ICH using DL concepts. In the presented ICHDC-RODL [16] Hilal, A.M., Alabdan, R., Othman, M.T.B., Hassine, S.B.H., Al‐Wesabi,
technique, the features are generated by the use of the XCS-LBP F.N., Rizwanullah, M., Yaseen, I. and Motwakel, A., 2022. Modelling of
model. Moreover, the BiLSTM model is employed for ICH biosignal based decision making model for intracranial haemorrhage
diagnosis in IoT environment. Expert Systems, p.e12964.
diagnosis. At last, the ROA is exploited for the hyperparameter
[17] Lakshmi, M.D., Murugan, S.S., Padmapriya, N. and Somasekar, M.,
tuning procedure of the BiLSTM method. To establish the 2019, December. Texture analysis on side scan sonar images using EMD,
boosted outcomes of the ICHDC-RODL system, a series of XCS-LBP and statistical co-occurrence. In 2019 International
simulations were performed and the outcomes are studied in Symposium on Ocean Technology (SYMPOL) (pp. 91-97). IEEE.
several aspects. The simulation results indicate the [18] Hanson, J., Paliwal, K., Litfin, T., Yang, Y. and Zhou, Y., 2018. Accurate
enhancements of the ICHDC-RODL method over recent prediction of protein contact maps by coupling residual two-dimensional
techniques. bidirectional long short-term memory with convolutional neural
networks. Bioinformatics, 34(23), pp.4039-4045.
[19] Binu, D. and Kariyappa, B.S., 2018. RideNN: A new rider optimization
algorithm-based neural network for fault diagnosis in analog
circuits. IEEE Transactions on Instrumentation and Measurement, 68(1),
pp.2-26.
[20] Rahul, K., 2021. Rider Optimization Algorithm (ROA): An optimization
solution for engineering problem. Turkish Journal of Computer and
Mathematics Education (TURCOMAT), 12(12), pp.3197-3201.
Abstract— Heart disease is a dangerous condition that can the IT solutions makes it possible to access the data from
lead to a fatal condition due to cardiac arrest. Recent studies different locations to produce the intelligence [2]. The
have revealed various facts for analyzing cardiac data by sensing, dimension of data also gets changed to another form named big
monitoring, and learning data in IoT to predict early diagnosis data, which represent the huge in size but also in schema [3].
and treatment. Through machine learning based feature analysis, The organizations maintain big data in various network
accurate disease detection has been implemented. However, the locations, which can be accessed to produce intelligence
dominant methods do not accurately predict the result since the towards decision making or anything. To provide access to the
incorrect features contain non-related support values to select the big data there are number of protocols has been discussed
features to perform training validation and produce prediction
inaccuracy. To overcome this limitation, a Machine Learning and earlier by various researchers
Transfer Learning Model (TLM) is proposed to perform heart The heart plays an important role in life. Diagnosis and
disease prediction. Initially, pre-processing has been carried prediction of heart related diseases should be very accurate [4],
out to reduce dimension, and the scaling factor was also used to complete and accurate because even the slightest mistake can
calculate the margin rate. To increasing the prediction accuracy lead to fatigue and human death. There are many deaths related
Disease Prone Impact Rate (DPIR) intends to find the support to heart and the number is increasing day by day. To solve this
values. To select the labeled features, Relative Feature Margin problem, a prognosis system for disease awareness is needed.
S election (RFMS ) is used to select and train the model by
Multilayer perception neural network (MLPNN). This classifier Machine learning is a field of artificial intelligence (AI) that
selects the margin weights to predict the heart disease risk level provides first-class support in predicting all types of events
based on the class. This predicts higher impact of cardiac trained from natural phenomena [5]. In this paper, we calculate
deficiency rate by attaining the relevant features based deep the accuracy of machine learning methods for predicting heart
feature data learning model, which produce higher precision rate disease. This algorithm uses the UCI repository database for
to increase the prediction accuracy than other methods. training and testing k-near neighbors, end tree, linear
regression, support vector machine (SVM) [6]. Anaconda
Keywords— heart disease prediction, feature selection and
(jupytor) notebook is the perfect tool for executing Python
classification, machine learning and transfer learning, neural
programming. This tool has a variety of libraries and title files
network.
that make your work more accurate and precise.
I. INT RODUCT ION Hygiene is an integral part of human life. Because of the
large amount of mental health data available in the healthcare
The growth of information technology has been adapted for industry, machine learning models are used to make effective
several problems. The medical industries use the growth of IT decisions in predicting heart disease [7]. By us ing machine
in several ways. The health care data has been maintained in learning techniques, you can reliably classify healthy and
different locations of any organizational units and it has been unhealthy individuals. In this study, a framework is developed
accessed through modern Internet. Through the Heart data for understanding the principles of predicting a patient's risk
collected information [1], data analysis is the important part in profile using clinical data parameters [8].
the disease prediction and recommendation has been performed
by several units which use the data present in different data The proposed model was developed using the machine
servers located geographically in different locations. However, learning and transfer learning statistic model. Excess fit and fit
related issues are resolved. This model shows excellent results systems to predict the cardiac disease for early diagnose
in both experimental and training data [9]. ANN were used to treatment. There exists several techniques in supporting such
analyze the performance of models that accurately predict the analytics and decisive support systems; still they suffer to
presence or absence of heart disease. achieve higher performance in disease prediction and
generating the analysis. Towards supporting the health care
II. RELAT ED WORK solutions various decision models are presented earlier but to
produce higher support to the decision-making process, it is
The heart disease prediction using Sequential Backward necessary to utilize huge amount of data in terms of big data.
Selection Detection of Heart Disease (HD) models using For a hospital unit, maintaining such huge data becomes a
Machine Learning (ML) will be very useful in the early stages tedious but still the big data can be accessed towards analyzing
[10]. If it is detected at an early stage of the disease [11], HD the bio signals obtained from human body towards detection
models will be useful for treatment and recovery. HD symbolic and prediction of various diseas es.
machine learning technique has been developed to help
doctors.
RF Conjugant feature Multil
In [12] presented a reinforcement learning technique Inpu MS
towards routing in WSN which finds the path to the destination scale factor (CFSF) ayer
t - percep
and selects a route according to hop count, energy and distance. logs ML
[13] Presented a CHD detection approach over machine tion
PN neural
learning which uses ensembles towards disease prediction [14].
Similarly, a hybrid approach is presented to predict cardiac N Disease prone netwo
diseases with machine learning. The method combines several rk
impact rate (DPIR)
techniques towards disease prediction [15]. \
The effective heart disease prediction using hybrid model \
Heart disease is one of the most important causes of death in
the world today. Cardiovascular disease is a major challenge in Relative feature
the field of prediction and analysis of clinical data [16]. The Data
Novel Feature Reduction using machine learning and data logs margin selection
mining algorithms help in risk prediction. Error rate (RFMS)
mechanism of feature selection algorithm and analysis methods
for recommending new feature will reduce the rating process
which combines subgroups [17]. A metric profound influence Optimized prediction
on the choice of different feature selection algorithm that Patient
Monitoring class
evaluates algorithms vary in the middle.
The Monitoring and Heart Disease Prediction System
Using Deep Learning Modified Neural Network (DL-MNN) Figure 1 Proposed architecture diagram RFMS- MLPNN
[16] with the increasing popularity of smart wearable gadgets
offers internet (population) has been shown to present a The heart disease factors are labeled as features in dataset
number of solutions Internet of Things. Unfortunately, the to process the data. The transfer leaning base on artificial
chance of survival is lower for people suffering from sudd en neural network is optimized with multilayer perception be used
cardiac attacks. to analyze the data. When they collect data from medical
dataset which contains heart disease features of the patients’
The use of intelligent Machine learning system based tested values which is directly observed. The preprocessing
random forest algorithm helps in improving heart disease was carried to verify the presence of all the features, filling,
diagnosis. The main cause of Heart Failure (HF) is due to removing, indexing was carried out. This research is about the
narrowing or narrowing of the coronary arteries [17]. The development of heart disease prediction towards accessing big
coronary artery distributes blood to the heat. The stacking and data and how they can be analyzed towards health care.
Non-invasive detection of coronary artery disease, Coronary
Heart Disease (CHD), layering model and invasive technique
3.1 Conjugant feature scale factor (CFSF)
for diagnosis are accurate [18]. However, the invasive
procedure is not suitable for detecting coronary artery disease This stage choose the feature limits from the preprocessed
during an annual physical investigation [19]. Predict dataset. These creates marginal scaling values between higher
cardiovascular events in hypertensive patients to explain the and lower class based on defect ranges from medical domain.
prognosis of patients with hypertension, and is considered to be Based on the margins the features get demilitarized to group
critical to the development of cardiovascular disease the importance of feature labels. This selects the relatively high
prevention. margins based on average mean rate estimation to attain the
clusters as upper and lower boundary values. This reduces
feature dimension to conjugate the disease weightage values to
III. 3. PROPOSED SYST EM
predict.
This research importance is to heart disease prediction
based on machine and transfer learning and health care support
Algorithm steps
Begin For this type of support value consensus values is ,
and
End for Step1: Initialize the process Mx-f successive feature impact
rate.
Step 4: Return risk margins of the heart disease scaling
factor. Step 2: Computing all margins from Mx-f;
The above algorithm selects the conjugant scaling factors, Step 4 Select the consecutive class Labels from
to reduce dimension of non-related feature margins, this Mx-f;
support for choosing relational features actively for disease Set max support Lm {s,p, d, ltr, humidity,
affection state. This much support for importance disease rainfall, temperature }
defect level.
End For
3.2 Disease prone impact rate (DPIR) If Lm Mx-f (class)
This stage the features get decisional into disease affection
Select feature to relative margin (Rm)
rate. The prone to find the risk level relatively taken from
cardiac principle. This selects the prone attain levels cardiac End If
deficiency rate weight is centralized to make comparison and
decision to attain the weight, such as finding the exact Step 5 Construct relative Subset radial function (Srf Mx-
f (RM))
characteristics of a particular transformation ( ) or
developing an evaluative observing importance dense level For each Process the Low margin Successive mean rate
from ‘N’ levels. (Lms)
Create subset for each class Lms<= Mx-f (Rm)
Attain Lmin class (Lmin-c) and (Lmax-c)
Create the subset class L(Max-Min)
Subject prone factors, they a, b are relative margins with ‘y’
variants at constant levels. Split the partition Pi(L) cluster centroid (C)
3.4 Multilayer perception neural network (MLPNN) IV. 4. RESULT AND DISCUSSION
This classifier identifies the risk of heart disease based on The proposed approach is implemented under python
the selected features trained into neural network. They testing framework using various parameters and performance is
construct transfer leering based neural network using multi- evaluated. This method measures efficiency in the prognosis of
kernel perceptron neural network with soft max decision a disease based on various features and their values. The testing
logical activation function. This sets the condition for each and training were carried through confusion matrix. The results
feature pattern disease influence rate depending on successive of the evaluation are analyzed in conjunction with the
patterns. performance of other approaches. The results will be displayed
in this section.
Step 1: Construct a set feature T to contain the T able 1 values and parameter processed
selected features. Initially T0 = ∅ (n features).
Parameter Value
Step 2: Initialize neural network with number of
neurons and features. Language, Tool Used Python,
Estimate feature support level
Dataset used CVD-cardiac dataset
Step 3: Analyze the disease as first selected feature
T1=max M threshold margin Number of patients 2000
Step 4: for i=2,.., m: Choose feature that maximizes
M Number of features 30/3000
/records
Add features to T then
Compute the number of feature occurrence attribute
pattern Pi. Table 1 shows the details used to evaluate the performance
generated in different ways. Accordingly, the method measures
//transfer terms, k times subset at feed forward performance by various limits. The consequences got are given
layers selection in detail in this section.
Step5: Compute combination of possible feature T able 2: Analysis on Mean precision and recall rate
patterns
Mean precision and recall rate in %
K- Specific features values.
Number of 500 1000 2000
Step6: for each pattern Pi from subset cluster nodes/Methods
factorScf
RF 65 70 77
Estimate the compound relation Crl = ø(Pi Scf))/m. SVM 70 74 83
Ø- Number of repeated pi contained in scf. HDPM 74 80 86
Train the Relation pattern (Rpn) = Crl/total count.
RFMS- 83 85 93
IfMaxTh support >Rpn then. MLPNN
Add Pi to extracted feature Crl.
SsAverage mean The performance of the routes generated by the
various methods was measured and shown in Table 2. Here, the
Return class by Patternpi(Rpn)Risk by class proposed RFMS- MLPNN algorithm produces higher routing
End if efficiency than other approaches.
End For.
Classification accuracy
RFMS- MLPNN
Methods
HDPM
200 records
SVM
100 records
RF 50 records
70 80 90 100
Accuracy
RF 75 80 86 RF 64 70 76
SVM 81 85 90
HDPM 84 88 92 SVM 65 72 75
RFMS- 87 91 96
MLPNN HDPM 66 75 80
RFMS- 70 78 82
Table 3 shows the accuracy of clustering large data MLPNN
for disease prognosis. Here, the proposed RFMS- MLPNN
approach provides greater clustering accuracy than other
methods. The prognostic performance of the disease and its accuracy
are measured considering different disease classes. The results
obtained are shown in Table 4.4. The proposed RFMS-
MLPNN approach resulted in higher disease prognosis
accuracy than other methods.
False Ratio
50 records
50 100 records
45
False Ratio %
40 200 records
35
30
25
20
15
10
5
0
50 records
The accuracy of the prognosis generated by the Figure 5: Analysis on False Classification Ratio+
various methods was measured and is shown in Figure 4. The
proposed Hybrid approach resulted in a higher disease The accuracy of disease prognosis made by different
prognosis than other approaches in each class. methods is measured and shown in Figure 5. The proposed
RFMS- MLPNN approach resulted in a higher disease
T able 5: Analysis on False Ratio
prognosis than other approaches in each class.
False Classification Ratio
V. CONCLUSION
Number of 500 1000 2000
Records To perform heart disease diagnosis, intelligent large data
analysis models reduce the dimension of data analysis. A smart
/methods
IoT sensor for heart patient data analysis in healthcare is based
RF 30 25 20 on hyper-spectral deep neural network. Efficient heart disease
prognosis helps to improve the effectiveness of data analysis
and prediction using ambiguous rules. It provides predictive
results to users, giving them the ability to generate predictive
SVM 34 27 22
attack rates for early detection methods. Feature evaluation-
based prediction is also very sophisticated based on the
Multilayer perception neural classification in the functional
HDPM 30 23 18 achieves high classification and predication rate. The proposed
RFMS- MLPNN produce higher performance by evaluating the
RFMS- 28 20 16 cardiac features than other methods. This recommends the risk
MLPNN level based on classes by predicting the feature class and
recommend risk-based disease diagnosis.
[5] S. Huang, P. Hung, C. Hong and H. Wang, "A New Image Blood Conference on Computing for Sustainable Global Development
Pressure Sensor Based on PPG, RRT , BPT T , and Harmonic (INDIACom), 2015, pp. 704-706.
Balancing," in IEEE Sensors Journal, vol. 14, no. 10, pp. 3685 -
3692, Oct. 2014, doi: 10.1109/JSEN.2014.2329676.
[6] S. S. Sarmah, "An Efficient IoT -Based Patient Monitoring and
Heart Disease Prediction System Using Deep Learning Modified
Neural Network," in IEEE Access, vol. 8, pp. 135784 -135797,
2020, doi: 10.1109/ACCESS.2020.3007561.
[7] N. T . Nguyen, N. V. Nguyen, M. H. T. Tran and B. T. Nguyen, "A
potential approach for emotion prediction using heart rate signals,"
2017 9th International Conference on Knowledge and Systems
Engineering (KSE), 2017, pp. 221-226, doi:
10.1109/KSE.2017.8119462.
[8] S. S. Sarmah, "An Efficient IoT -Based Patient Monitoring and
Heart Disease Prediction System Using Deep Learning Modified
Neural Network," in IEEE Access, vol. 8, pp. 135784-135797,
2020, doi: 10.1109/ACCESS.2020.3007561.
[9] V. Chacko and V. Bharati, "Data Validation and Sensor Life
Prediction Layer on Cloud for IoT ," 2017 IEEE International
Conference on Internet of T hings (iT hings) and IEEE Green
Computing and Communications (GreenCom) and IEEE Cyber,
Physical and Social Computing (CPSCom) and IEEE Smart Data
(SmartData), 2017, pp. 906-909, doi: 10.1109/iThings-GreenCom-
CPSCom-SmartData.2017.139.
[10] Ed-Daoudy and K. Maalmi, "Real-time machine learning for early
detection of heart disease using big data approach," 2019
International Conference on Wireless Technologies, Embedded and
Intelligent Systems (WIT S), 2019, pp. 1-5, doi:
10.1109/WIT S.2019.8723839.
[11] Q. He, A. Maag and A. Elchouemi, "Heart disease monit oring and
predicting by using machine learning based on IoT technology,"
2020 5th International Conference on Innovative T echnologies in
Intelligent Systems and Industrial Applications (CIT ISIA), 2020,
pp. 1-10, doi: 10.1109/CIT ISIA50690.2020.9371772.
[12] M. A. Khan and F. Algarni, "A Healthcare Monitoring System for
the Diagnosis of Heart Disease in the IoMT Cloud Environment
Using MSSO-ANFIS," in IEEE Access, vol. 8, pp. 122259-122269,
2020, doi: 10.1109/ACCESS.2020.3006424.
[13] J. P. Li, A. U. Haq, S. U. Din, J. Khan, A. Khan and A. Saboor,
"Heart Disease Identification Method Using Machine Learning
Classification in E-Healthcare," in IEEE Access, vol. 8, pp. 107562-
107582, 2020, doi: 10.1109/ACCESS.2020.3001149.
[14] S. A. Ali et al., "An Optimally Configured and Imp roved Deep
Belief Network (OCI-DBN) Approach for Heart Disease Prediction
Based on Ruzzo–Tompa and Stacked Genetic Algorithm," in IEEE
Access, vol. 8, pp. 65947-65958, 2020, doi:
10.1109/ACCESS.2020.2985646.
[15] Y. Pan, M. Fu, B. Cheng, X. T ao and J. Guo, "Enh anced Deep
Learning Assisted Convolutional Neural Network for Heart Disease
Prediction on the Internet of Medical T hings Platform," in IEEE
Access, vol. 8, pp. 189503-189512, 2020, doi:
10.1109/ACCESS.2020.3026214.
[16] N. L. Fitriyani, M. Syafrudin, G. Alfian and J. Rhee, "HDPM: An
Effective Heart Disease Prediction Model for a Clinical Decision
Support System," in IEEE Access, vol. 8, pp. 133034-133050, 2020,
doi: 10.1109/ACCESS.2020.3010511.
[17] S. Mohan, C. T hirumalai and G. Srivastava, "Effective Heart
Disease Prediction Using Hybrid Machine Learning Techniques," in
IEEE Access, vol. 7, pp. 81542-81554, 2019, doi:
10.1109/ACCESS.2019.2923707.
[18] X. Yuan, J. Chen, K. Zhang, Y. Wu and T . Yang, "A Stable AI-
Based Binary and Multiple Class Heart Disease Prediction Model
for IoMT," in IEEE Transactions on Industrial Informatics, vol. 18,
no. 3, pp. 2032-2040, March 2022, doi: 10.1109/TII.2021.3098306.
[19] Dewan and M. Sharma, "Prediction of heart disease using a hybrid
technique in data mining classification," 2015 2nd International
Aakash V S Bhuvaneshwaran M J
Electronics and Electronics and
Communication Communication
Engineering Engineering
Sri Krishna College of Sri Krishna College of
Engineering and Technology Engineering and Technology
Coimbatore, India Coimbatore, India
20euec001@skcet.ac.in 20euec030@skcet.ac.in
end is created using the dart programming language and the have developed an android application using flutter platform
back end is created using the Java Script [6]. The future which is small and portable ,such that the users can able to see
advancements in the project are that it can be used to find the their results.
rarity in the fish species such as Devils Hole, Pulp fish, Red IV.PROPOSED WORK
hand fish, Small tool fish, Adriatic sturgeon fish, European sea The proposed system is trained with 20,000+ images
sturgeon, Gilt darter Sakhalin Sturgeon are some of the rare fish all together using CNN. When an image is uploaded by the user,
species these fish species can be prevent from extinct by this the image data is traversed through particular sequence of
project since we can detect it and can safeguard it from trained data sets with the “divide and conquer” based algorithm
extinction [7]. [15].This machine learning based approach is useful in handling
large number of datasets with reduced time and space
The Harmful fish species can also be detected which complexity [16]. This project can be run using the app created
includes Puffers, Stone fishes, Lion Fishes, Cat fish, Shark, using the google colab, this can also be used by developing a
Piranha, Moray eel, Electric eel, Candiru Fish, Barracudas, website and this can be used to create an app. The extensions of
Great white Sharks, Alligator Gar ,Red lion fish, Scorpion fish, the project in future are this can be used to find the harmful
Common Carp, squid fish, Goliath tiger fish Muskie fish, species , this can be used to find the rare species, the medicinal
Atlantic Manta fish Blue spotted ribbon tail ray fish, Spotted benefits such as omega 3 (Nutrient which is taken from the fish),
trunk fish, Northern Snakehead fish [8].We can protect vitamin D, Vitamin B2. The developed app is flexible to use and
ourselves from those species by this project since we can detect it is available offline. So, it is not likely to get any network
those species and we can stay away from it [9]. The project is issues. New datasets can be added to the cloud using google
briefly explained by the below topics. colab and the app can be updated accordingly.
Two extensions are included in the proposed solution.
II. NEED FOR THE PROJECT One is picture recognition, while the other is a mobile
The proposed system is used to identify the fish species and application. Convolutional neural networks are used to identify
also its characteristics are identified using deep learning. the correct fish species based on their fish imagery. The CNN
Identification of fishes helps in the export of processed edible performs convolution in each layer. The fish and random photos
fishes as the buyers are very conscious about the correct fish are included in the pre-trained classification dataset. If the
identification along with their scientific and popular names species is accurately detected by comparing the given image
[10]. The designed algorithm is based on Convolution Neural with our trained model, the output is true, indicating that the
Network (CNN) approach. This approach effectively classifies given species was effectively discovered [17], as well as the
the fish species and runs in less time complexity. The front end characteristics and its benefits to the users. The result is revealed
or the user interface is an app created using flutter and Dart in this second extension. It comprises the fish image, an android
programming [11]. Tensor flow is the tool used for mobile application created with the flutter framework and code
implementing the CNN and to input large number of datasets written in the dart programming language. On that app, a trained
and n-dimensional data. CNN classification model was installed, which was made up of
photos of different fish species. The user can give an image in
III. RELATED WORK both capture and upload format by installing our application on
Many researchers presented different methodologies their mobile phones. The CNN [18] will classify the image as a
to identify fish species using images captured by classifying tested image and compare it to our trained image based on the
them using their shape, venation, colour and texture qualities image uploaded. The results will be displayed with
based on the research paper's analysis [12]. The amount of characteristics, benefits, and more links for the specified
precision varies depending on the procedure. Despite the fact elucidation based on the comparative result.
that the reference papers provided several classification
methods with a less amount of accuracy and no proposal for V. SOFTWARE DESCRIPTION
real-time detection. In our suggested innovation, we solve the
accuracy and real-time detection problems while also providing 1.1. ALGORITHM
an application [13][14]. 1.1.1. CONVOLUATIONAL NEURAL NETWORK
[CNN]
IV.LIMITATIONS OF EXISTING WORK Convolution Neural Network is a type of Artificial
Neural Network and it is used for image processing and Data
In the previous development of the project there is no analyzing applications. It is mainly used for pattern detection. It
platform, like a website or an mobile phone application, we gets the input by convolution and it forms many layers which is
1.8.3 NUMPY
In Python programming, NumPy is a library that has a
large collection of mathematical modules that can process the
functions of linear algebra, Fourier transform, arithmetic,
matrices etc. Using this library we can deal with multi
Figure :3 Image data sample dimensional arrays and analyze statistical data. NumPy library
Here we have a sample dataset of the species Red was first released in 2006 by developing its predecessor
Mullet, and the trained dataset images are about the size of Numeric. The modules in the library is written using Python and
200KB-400KB, by keeping less size image we can train the C. Furthermore, NumPy library is the foundation of the
large amount the samples, and the training speed will also be Artificial Intelligence and Machine learning applications where
reduced.
more and more Matrix mathematical operations are required.
1.6. PROGRAMMING LANGUAGE
The programming language used in our project is 1.8.4 KERAS
Python, an object-oriented programming language. Python is Keras plays a major-level role in machine learning and
a high-end general-purpose programming language most Application Programming Interface (API) and it was developed
commonly used to build deep learning algorithms and data by google. It was written in python and it also handles multiple
science. Python is a programming language that helps to create backend neural network calculations.
a variety of applications. Developers believe it is suitable for 1.8.5 PANDAS
building models using Python and libraries such as NumPy, Pandas is an open-source package, mainly used for
Pandas and Matplotlib. It is possible to use frameworks such data analysis and machine learning functions. It is a two-
as Tensor Flow and Keras for this App Development. dimensional data structure with rows and columns, it provides
a flexible way to merge and reshape data. It builds on top of
1.7 CLASSIFICATION OF DATASET another package called NumPy, which provides help for
multidimensional arrays and easily handles missing data.
The dataset used for the fish image classification
Pandas has series and data frames, where series is for shallow
consists of fish images of ten different marine species and it’s
data structures and data frames are for complex data structures.
listed in
Pandas can be implemented in three ways which include the
Table 1.
Series, Data Frame and Panel.
1.8 LIBRARIES USED
The Python library can be found in the site- packages
1.8.6 GRADIO
folder within the Python.
Gradio is an open-source python library that permits
you to rapidly make simple to utilize, adjustable UI parts for
1.8.1 PYTHON
Python is a programming language created by Guido your ML model, any API, or any subjective capacity in only a
Van Rossum from CWI which stands for Centrum Wiskunde & couple of lines of code.
Informatica which is a National Research Institute for
Mathematics and Computer Science in Netherlands. It is an 1.9 Methods to Create a GRADIO GUI for your Model
object-oriented programming language. It is a general-purpose
programming language which can be used for both scientific ⮚ Create a GRADIO application file for your model upload the
and non-scientific programming. It is a platform independent model.
programming language. The programs written in Python can be ⮚ Define the predictive functionality using the model.
easily readable and understandable. ⮚ Launch the GRADIO interface with predictive functionality
and appropriate UI elements.
1.8.2 TENSOR FLOW
TensorFlow is an important library used in machine
1.10 DART PROGRAMMING LANGUAGE
learning. TensorFlow was declared as open source in 2015.
DART is an object-oriented programming language
Tensor is a variable that can handle n-dimensional data.
which has a syntax similar to structural C language. It was first
TensorFlow can be used in all of the programming languages
developed and launched by Google Inc. in 2011. It is a general-
1.11 FLUTTER
Flutter is a Google-developed framework for
generating attractive, natively built, multi-platform applications
from a single codebase. It's a toolset that's both free and
portable. It may be used to create apps for IOS, macOS,
Windows, Android, and the web. To construct our medicinal
plant recognition application utilizing Deep learning, we used
the Android cross platform of Flutter and the code was
developed in DART.
graph (Figure 5) for the accuracy increases exponentially with making it easier for users to identify the species and its
increase in epochs so it is a growing exponential graph here characteristics. The software is straightforward, easy to use,
which means that itis the project’s result is very accurate. and takes minimal time. The app does not require access to
the internet to function. As a result, the user can use this
software when offline.
The app could be improved in the future by providing a greater
number of images as input. The software will provide more
information about the species than is currently available. Any
other developer or researcher can develop this app by
changing the front end of the app and by providing better
information regarding the species. By providing a greater
number of images as a data set and it is possible to examine,
whether the fish is edible or a poisonous one.
Figure 6. Overall Accuracy
We have achieved about 93 % of accuracy and the REFERENCES
losses are very minimal, comparing to other algorithms the [1] Y. Yong, L. Quek, E. Lim, and A. Ngo, "A case report of puffer fish
convolutional neural network shows good accuracy. poisoning in Singapore," Case reports in medicine, vol. 2013, 2013.
[2] J. K. Sims and D. C. Ostman, "Puffer fish poisoning: emergency diagnosis
and management of mild human tetrodotoxication," Annals of emergency
3.2 LOSS OF THE DATASET medicine, vol. 15, pp. 1094-1098, 1986.
[3] L. Chen, Z. Li, and Z. Zhao, "Forensic medical identification of death due
The loss of the project is very minimal in level, and the to poisoning of tetrodotoxin in puffer fish," Fa yixue za zhi, vol. 15, pp. 131-
loss is about 5-6 %. even this loss can also be decreased by 2, 189, 1999.
[4] W. J. Matthews, Patterns in freshwater fish ecology: Springer Science
increasing the epochs if the number of the epochs increases the &Business Media, 2012.
accuracy of the result will also be increased (Figure 6). [5] W. A. Wurts, "Why can some fish live in freshwater, some in salt water,
and some in both," World Aquaculture, vol. 29, p. 65, 1998.
[6] D. A. Konovalov, A. Saleh, M. Bradley, M. Sankupellay, S. Marini, and
M. Sheaves, "Underwater fish detection with weak multi-domain
supervision," 2019 International Joint Conference on Neural Networks
(IJCNN), 2019, pp. 1-8.
[7] K. M. Knausgård, A. Wiklund, T. K. Sørdalen, K. Halvorsen, A. R.
Kleiven, L. Jiao, et al., "Temperate Fish Detection and Classification: a Deep
Learning based Approach," arXiv preprint arXiv:2005.07518, 2020.
[8] N. E. M. Khalifa, M. H. N. Taha, and A. E. Hassanien, "Aquarium family
fish species identification system using deep neural networks," International
Conference on Advanced Intelligent Systems and Informatics, 2018, pp. 347-
356.
[9] X. Bai, X. Yang, and L. J. Latecki, "Detection and recognition of contour
parts based on shape similarity," Pattern Recognition, vol. 41, pp. 2189-2199,
2008. 28
Figure 7. Loss of Dataset [10] J.-S. Kim and K.-S. Hong, "Color–texture segmentation using
unsupervised graph cuts," Pattern Recognition, vol. 42, pp. 735-750, 2009.
[11] A. Joly, H. Goeau, H. Glotin, C. Spampinato, P. Bonnet, W.-P. Vel- ¨
linga, R. Planque, A. Rauber, R. Fisher, and H. Muller, “Lifeclef ¨ 2014:
Multimedia life species identification challenges,” in Information Access
Evaluation. Multilinguality, Multimodality, and Interaction, ser. Lecture
Notes in Computer Science, E. Kanoulas, M. Lupu, P. Clough, M. Sanderson,
M. Hall, A. Hanbury, and E. Toms, Eds., vol. 8685. Cham: Springer
Figure 8. Training and Validation of Data International Publishing, 2014, pp. 229–249.
[12] B. J. Boom, J. He, S. Palazzo, P. X. Huang, C. Beyan, H.-M. Chou, F.-
P. Lin, C. Spampinato, and R. B. Fisher, “A research tool for long-term and
We have trained about 15 epochs and it shows the validation continuous analysis of fish assemblage in coral-reefs using underwater
accuracy of about 93.67 %. camera footage,” Ecological Informatics, vol. 23, pp. 83 – 97, 2014, special
Issue on Multimedia in Ecology and Environment.
[15] S. Marini, E. Fanelli, V. Sbragaglia, E. Azzurro, J. Del Rio Fernandez,
VII CONCLUSION AND FUTURE SCOPE and J. Aguzzi, “Tracking fish abundance by underwater image recognition,”
Scientific Reports, vol. 8, p. 13748, 2018.
By comparing the input of Fish sample to the trained [16] L. Corgnati, S. Marini, L. Mazzei, E. Ottaviani, S. Aliani, A. Conversi,
dataset samples, the image detection was done using the ML and A. Griffa, “Looking inside the ocean: Toward an autonomous imaging
approach and it has high accuracy in detecting the species. system for monitoring gelatinous zooplankton,” Sensors, vol. 16, 2016.
[17]Kottursamy, Kottilingam. "Multi-scale CNN Approach for Accurate
This will allow users to learn more about the characteristics of Detection of Underwater Static Fish Image." Journal of Artificial Intelligence
the fish by looking at a picture of their fish. It also includes 3, no. 03 (2021): 230-242.
[18] Kumar, A. Dinesh. "Underwater Gripper using Distributed Network and
information about the species. As a part of the output, more Adaptive Control." Journal of Electrical Engineering and Automation 2, no.
reference links for the web resources are also provided, 1 (2020): 43-49.
Abstract - Autism is a disorder of the brain caused by language by the new CDC (Centers for Disease Control and
and severe social difficulties in people. It is the most common of Prevention). In 1993, six cases of ASD were diagnosed in
the many pervasive developmental disorders (PDD), which begin 160 patients (3.8 percent). In 1997, six cases of ASD were
in childhood and continue throughout life, affecting almost all diagnosed in 143 patients (4.2 percent). ASD was
aspects of life. Autistic people (cognitive and linguistic) and diagnosed in 2002 in 94 of 309 patients (30.4 percent).
social skills are delayed compared to their classmates, but their Since 2015, the number of people with autism in India has
motor skills are higher than usual. The nature of ASD varies from increased by 10-17 % per year. Autism rates are based on
person to person and is a condition for the development of the research from the National Institute of Mental Health and
brain or nervous system. In the first 12 months, most children with Neuro Sciences (NIMHANS) reported by the new CDC
autism seem to develop normally. Symptoms of autism appear (Centers for Disease Control and Prevention). The occurrence
between eighteen and thirty-six months. Up to 3 years, 40% of of an autism spectrum disorder (ASD) has been identified, as
cases were detected. The aim of the study was to detect ASD at shown in Figure 1.
an early stage to improve brain development and increase the
awareness of parents and caregivers about ASD. Machine
learning methods are now used to predict the spectrum of autism.
This study provides a comprehensive assessment of documents
that use machine learning to predict ASD, as well as data analysis
and classification algorithms. This work aims to classify and
study the different methods of Machine Learning, as well as to
explain the nature of ASD and to evaluate performance and
demonstrate research potential using different criteria. This Figure 1. Identified Occurrence of Autism Spectrum Disorder
publication serves as a roadmap for imminent researchers who
want to work on the topic of ASD prediction using machine The Autism Spectrum Disorder (ASD) is a neurological
learning. disorder that is accompanied by a variety of symptoms.
Keywords: Autism Spectrum Disorder, Machine Learning, There are some issues with social media and
Support Vector Machine, Random Forest, Artificial Neural communication such as
Network • Improper play with toys
• Unable to connect with others
1. INTRODUCTION • Inactive or inactive
Early diagnosis of autism spectrum disorder is • Wrong laughing and crying
challenging because people without ASD exhibit • Sensitive to sound or poor
comparable behaviors to those with ASD, which is why • Changes in habits are difficult to deal with
cognitive tests are appropriate for diagnosing ASD. • Cannot express their emotions through gestures.
According to the World Health Organization, autism can • Strange attachments to objects
cause social, communication, and behavioral difficulties. • Poor speech or lack of speech
The AIIMS in New Delhi reports that, in India one in 100
• Want to live alone
children under the age of 10 has autism, and about one in
• Do not feel dangerous
eight has at least one neurological disorder.
There are many ways in which autism affects people. Limited interests and repetitive activities are often a
There are some people with autism who can live problem for people with ASD. The following list includes
independently, others face significant challenges that specific cases of different types of behavior [12].
require lifelong support and care. People with autism face • Repeat specific actions, such as repeating the
stigma, discrimination and human rights abuses. same words or phrases over and over again
Based on research from the National Institute of Mental • The person gets upset when a habits change
and Mental Health (NIMHANS), Autism rates are reported
[8] Victoria It tested a hypothesis that changes This is not acceptable for very young VIPS i) Accuracy -74%
Yaneva et al in visual function in adults with children and the number of
(2020) and without high function, such as participants is small.
eye observation measurements,
could be used to automatically
detect autism.
[9] Abdul The classification process using • Classification accuracy 72.96% - EEG, LSVM DEAP-72.96%
Rahman the emotions used was 72.96 % of DEAP data set SEED -70.71%
Aslam et al the time and 73.14 % of the time.• 70.71% Classification accuracy -
SEED data set
(2020)
[10] Tania Akter , For the toddler dataset, SVM These issues cannot be addressed FDA, LDA, MDA Accuracy - 97.10%
Md et al showed the best performance, fully due to the lack of ASD data
(2019) while Adaboost showed the best available.
results for the children dataset,
Glmboost for the adolescent • Increase the amount of data to be
dataset, and Adaboost for the adult analyzed to improve the detection of
dataset. A feature transformation ASD.
method that includes sine functions
will produce the best classification
for toddlers using SVM.
[12] Zeinab et al Using the ABIDE I and CC400 • Use only a few pictures in each SVM, KNN and ABIDEI-70.22%
(2020) data sets, the proposed atlas class. RF classifiers
•
parcellation function of the future Additional data is needed to create a
model brain was able to accurately robust model
predict ASD with 70.22 •% Gender and average age are not
taken into account.
accuracy.
• Difficulties in improving
performance with unbalanced data
[13] Chalin A special method of analyzing the It is difficult to describe FE RF classifier -
Grossard et al dynamics of facial expressions production disorders in children
(2020) (FD) in children with autism can be with autism spectrum disorders.
developed using computerized
visual acuity and human narration
(ASD).
[14] Maria Laya et •
In order to develop a classification The sample size is small ARIA method Accuracy - 95.7%
al(2020) model for ASD, a machine- • No other clinical information
learning methodology was used •to Family history and information are
difficult to access
analyze retinal images using
ARIA.
•
[16] Kaushik We developed automated ASD • Identify open source and large ASD SVM, RFC, NB, Kaggle
Vakadkar et prediction models using a minimal data sets. LR, KNN
al(2021) set of behaviors in each diagnostic• Accurate modeling based on large Accuracy -92.15%
data sets.
data set. Of the five models we
• There are not enough cases in the
used for the data set, maximum data set.
accuracy was observed using
logistic regression.
[18] Zhong Zhao By combining visual information • Used only small sample SVM, LDA, DT, Figshare
et al(2021) and session duration, the SVM RF
classifier achieves a maximum Accuracy - 90%
estimate accuracy of 92.31 %. The
accuracy of the classification of the
combined marks is higher only
than the visual capabilities
(maximum rating accuracy 84.62
percent) or the time of the study
(maximum rating accuracy 84.62
percent).
[17] Ping-I Lin et Classification accuracy can be• Due to the lack of other individual RF, SVM Figshare
al(2021) improved up to 90% by using RF templates to test, it may be difficult Accuracy - 90%
algorithm and SVM algorithms. to find additional features from the
limited templates within the SVM.
[19] Munirul et al Assuring that parents and Three controllable machine research DT, LR, KNN, UCI storage
(2021) guardians provide their children models with KNN and ANN logistic ANN
with a comprehensive method of regression reach only 85% accuracy. -95% accuracy
informing them about important
events.
[20] Chaitra et al With a combined feature set of Larger datasets were not used. Recursive- ABIDE
(2020) 70.1 percent accuracy, a diagnosis Psychiatric and neurologic disorders Cluster-
may be made. features were not examined Elimination SVM. Accuracy - 67.3%
3. METHODS
This literature review was done to examine how machine
learning methods are used in autism spectrum disorder
prediction. Some of the most commonly used algorithms
were DT, NB, LR, SVM, RF, K-NN, RFC. Among this by
combining features, the SVM classifier was capable of
achieving an accuracy of 92.31% [18].
Figure 2 shows the basic block diagram of ASD Prediction.
The workflow for Autism Spectrum Disorder (ASD)
consists of 2 basic steps which involves Data
Preprocessing, ASD classification. Preprocessing is the
process of preparing raw data for further processing by
performing any type of processing on it. The data includes
both individuals with and without ASD. Features are
typically collected from an ASD and TD person. After
selecting the features, the resulting features are sent to the
classification section. The
Circuits and Systems, vol. 14, no. 4, pp. 838-851, Aug. 2020, doi:
10.1109/TBCAS.2020.3008766..
[10] T. Akter et al., "Machine Learning-Based Models for Early-Stage
Detection of Autism Spectrum Disorders," in IEEE Access, vol. 7,
pp. 166509-166527, 2019, doi: 10.1109/ACCESS.2019.2952609.
[11] Thabtah F, Peebles D. A new machine learning model based on
induction of rules for autism detection. Health Informatics Journal.
March 2020:264-286. doi:10.1177/1460458218824711
[12] Zeinab Sherkatghanad, Mohammadsadegh Akhondzadeh, Soorena
Salari , Mariam Zomorodi-Moghadam, Moloud Abdar , U.
Rajendra Acharya , Reza Khosrowabadi and Vahid Salari ,
“Automated Detection of Autism Spectrum Disorder Using a
Convolutional Neural Network” , Frontiers in
Neuroscience,January 2020.
[13] Grossard C, Dapogny A, Cohen D, Bernheim S, Juillet E, Hamel F,
Hun S, Bourgeois J, Pellerin H, Serret S, Bailly K, Chaby L.
Children with autism spectrum disorder produce more ambiguous
and less socially meaningful facial expressions: an experimental
study using random forest classifiers. Mol Autism. 2020 Jan
13;11(1):5. doi: 10.1186/s13229-020-0312-2. PMID: 31956394;
PMCID: PMC6958757.
[14] Maria Laia, Jack Leea , Sally Chiuc , Jessie Charmd , Wing Yee
Soe , Fung Ping Yuenf , Chloe Kwoka , Jasmine Tsoia , Yuqi Lina
, Benny Zeea,b, “A machine learning approach for retinal images
analysis as an objective screening method for children with autism
spectrum disorder”, EClinicalMedicine,2020
[15] R. Haweel et al., "A Machine Learning Approach for Grading
Autism Severity Levels Using Task-based Functional MRI," 2019
IEEE International Conference on Imaging Systems and
Techniques (IST), 2019, pp. 1-5, doi:
10.1109/IST48021.2019.9010335.
[16] Kaushik Vakadkar,Diya Purkayastha, Deepa Krishnan, ”
Detection of Autism Spectrum Disorder in Children Using
Machine Learning Techniques” , SN Computer Science ,July 2021.
https://doi.org/10.1007/s42979-021-00776-5
[17] Ping-I Lin, Mohammad Ali Moni , Susan Shur-Fen Gau and
Valsamma Eapen, ” Identifying Subgroups of Patients With Autism
by Gene Expression Profiles Using Machine Learning
Algorithms”, Frontiers in Psychiatry,May 2021.
[18] Zhao Z, Tang H, Zhang X, Qu X, Hu X, Lu J. Classification of
Children with Autism and Typical Development Using Eye-
Tracking Data From Face-to-Face Conversations: Machine
Learning Model Development and Performance Evaluation. J Med
Internet Res. 2021 Aug 26;23(8):e29328. doi: 10.2196/29328.
PMID: 34435957; PMCID: PMC8440949.
[19] Munirul M Haque,Masud Rabbani,Dipranjan Das Dipal,Md Ishrak
Islam Zarif , Anik Iqbal,Amy Schwichtenberg,Naveen
Bansal,Tanjir Rashid Soron, Syed Ishtiaque Ahmed, Sheikh Iqbal
Ahamed, “Informing Developmental Milestone Achievement for
Children With Autism: Machine Learning Approach “, Jmir
Medical Informatics,2021.
[20] N. Chaitra P.A. Vijaya, Gopikrishna Deshpande, “Diagnostic
prediction of autism spectrum disorder using complex network
measures in a machine learning framework”, Biomedical Signal
Processing and Control ,2020.
https://doi.org/10.1016/j.bspc.2020.102099.
ABS TRACT: Anomaly identification is a technique commonly and other tasks using ML. The aspects of the observed issue
used for monitoring the network traffic with the main goal to that may be measured or quantified are referred to as the input
distinguish the normal and anomalous network activity using parameters and are known as features [9] [10]. The reasons for
Intrusion Identification Methods (IIM) on an actual network the outcome characteristics are given a class assigned using
dataset. This study has used the TS DS (Technique for S ampling
Difficult S ets) method, which yield good results. ML techniques the technique, which is an observation about the outcome rate.
that can accurately recognize abnormalities based on known data The classification challenge, which tries to predict, accurately
flows can benefit from the input data packets acquired from label, and tell the difference between normal traffic and
network devices. The nine different forms of network attacks unusual traffic, includes how hard it is to find mistakes in
(traffic issues) defined in the UNS W-NB15 dataset were network data.
identified using different ML methods in this article, including
KNN, NB, RF, and S VC. The effectiveness of identifying security 2. RELATED WORKS:
issues was tested using simulated network attacks and acquired
the packet information on actual connected devices. As UNS W- A review of the research makes reference to many
NB15 is a strongly uneven training set of data, Area under the
ROC curve (AUC) values were employed to evaluate the flaws in the study, including algorithm optimization with
effective-ness of segmentation systems. The technique for limited samples because more collected data can lead to
sampling difficult sets produced the best results in the detection increased efficiency, making use of algorithms without
of the sample dataset and the dataset of actual congestion with processing or only encoding one technique to identify
AUC scores of 91% and 96%, respectively. features, an unbalanced dataset and insufficient (basic)
algorithm performance monitoring and classification of
Keywords: Intrusion Identification Methods, Machine Learning, algorithm efficiency using created data without comparing to
Packet Transmission, Technique for S ampling Difficult S ets. performance utilizing huge datasets [12].
The KNN, NB, RF and SVC algorithms are some of
1. INTRODUCTION: the machine learning categories that the authors analyze for
anomaly identification. The UNSW-NB15 dataset's speed and
Attacks on cyber security have become more
accuracy, recall, Mean Squared Error(MSE),TPR and FPR of
frequent and sophisticated throughout time, involving more
sophisticated and ongoing defensive strategy innovation various classifiers are evaluated. The results of the
experiments show that the TSDS classifier is a good
today. Machine learning is being explored as a different
representation of some other classifiers with a 96.29%
approach or extra protection against cyber security assaults as
computer power increases, hardware and software prices fall. accuracy rate.
The capacity to identify abnormalities in the
The capacity of Machine Learning to identify dangerous
classification of binary and multiple classes is compared by
network activity using packet data on network activity is
examined in this research as a potential security measure. the authors [15] [16] of across 12 different machine learning
techniques. The CSE-CIC-IDS2018, NSL-KDD and UNSW-
It is available to test machine learning algorithms and
NB15 datasets were utilized for the experiments, which were
improve the variables in order to more detect or classify
imbalances in the real network traffic. Either Python run on three publicly accessible datasets based on the
evaluation's findings, it can be shown TSDS algorithm is more
programming or the Scikit-Learn platform are used to analyze
effective in terms of detection, accuracy, and precision. The
normal network traffic, which solves the evaluation issue for
ML. Machine learning algorithms in Scikit learn may be literature study reveals potential ways to combine cyber
security with machine learning. The efficiency of different
quickly developed and deployed for identification, linearity,
ML techniques may be assessed and compared using open 4.1 Evaluati on Indicators:
datasets.
Using KNN, NB, RF, and SVC, the authors of [11] In this research, we employ unusual appearance to
offer a network anomaly detection method. When making modify the large elements and do 10-fold cross validation to
comparisons, the follo- wing criteria were used: Performance get the predicted value. As evaluation indicators, we employ
metrics for binary classification include accuracy, TPR, FPR, F1 score, Time, Precision, Recall, Accuracy, and ROC curve.
recall, and precision. The above ML technique was more The following is a collection of pertinent formulas, where TP
accurate (81.69%) and worked better than all other classifiers indicates the level of optimistic packets that are correctly
on the UNSW-NB15 dataset. categ-orized. FP for the level of incorrectly classified
optimistic packets; TN for the variety of TN packets; FN for
3. ML ALGORITHMS: the variety of FN packets.
Machine learning techniques, according to may be The accuracy metric counts how many predicted
divided into the following learning methods: reinforcement, optimistic packets are really present in the samples.
supervised, unsuper- vised and semi supervised based on the
level of human responsibility and oversight of the process of Precision=TP/(TP + FP) ------------------------- (1)
training. The objective of classifier is to build a modeling
from identified documentation that can forecast potential data. Recall is the percentage of correctly detected training
Classification and regression are the two most typical examples:
supervised ML tasks. The system must forecast discrete
values for fresh examples, such as category [13], class, or Recall=TP / (TP + FN) --------------------------- (2)
label, in classification issues. The continuous response
variable's value is anticipated in regression issues. The number of samples that were correctly categorized is
The ML algorithms use a variety of methods and accuracy:
training datasets that have already been sorted to classify new
datasets. The most significant examples of supervised learning Accuracy=(TP + TN) / (TP + FP + TN + FN) -(3)
were executed in this investigative process and accor- ding to,
supervised ML algorithms fall into the following categories: The F1score denotes the periodic median of recall and
KNN, NB, RF and SVC. precision.
since the samples in the nearest neighbor set are more similar simple set, the minority in the challenging set, and the
than dissimilar [3][4].The minority results are in the reinforcement samples. The MNN approach uses the K nearest
challenging set are then focused in and out. We scale the neighbors as a global measuring aspect. For larger values of
entire process using KNN, NB, RF, and SVC algorithms. The K, we see an increase in the number of challenging sets, the
issue needs to be solved of class imbalance in network traffic pace of compression for the vast most of the samples, and the
when presented with mismatched data. We provide a unique score of synthesis for the minority of classes. Notation-ally,
Technique for Sampling Difficult Sets (TSDS) [1].This the TSDS algorithm is represented as Table1.
technique successfully when balance is reduced and improves
the effectiveness of the identification model when learning 4.3 The UNSW-NB15 Network dataset:
challenging samples. On two benchmark datasets, we verified
using both conventional ML and DL algorithms [5][6]. The dataset UNSW-NB15 and machine learning are
the foundations of the identification model used to confirm
Faced with this imbalanced traffic on the internet, we real network traffic data. Figure1 shows the model
suggested the Technique for Sampling Difficult Sets (TSDS) architecture. The origin- nal traffic in the UNSW-NB15
algorithm[8][9], which compresses the majority class samples dataset was made in the Cyber Range Lab at UNSW Canberra.
while in tough situations, enhancing the quantity of minority They used the IXIA Perfect Storm tool to mix real world
samples is a must to decrease the training set's imbalance and actions with made-up attacks. [20] Four separate CSV files
allow the intrusion identification method to improve category include a total of 2540044 records. This data collection covers
performance [10]. The identification model we proposed is 9 different categories of assault including Worms, Shellcode,
represented in Figure1.[17] For classification models, as Fuzzers, Analysis, Backdoors, DoS, Generic, Exploits and
classifiers; employ RF, SVM, KNN and NB. Reconnaissance. It is required to narrow down the
characteristics compared to those that are same and choose
The imbalanced training set is initially split into two only the methods that will be used because the original
groups: neighbors and outliers, using the Modified Nearest UNSW-NB15 dataset and the dataset received from the packet
Neighbor (MNN) technique. Because it is quite difficult for a specific network method are not identical. By comparing the
the classification to comprehend the differences between the features of the packet filtering and UNSW-NB15 datasets [18]
segments from the highly compare- able examples in the near- [19], the packet dataset's format was developed in accordance
neighbor set, we refer to the extracts in the near-neighbor set with the suggestions of the producer of network equipment.
as "challenging sets" and the extracts in the far-neighbor set as
"simple sets". After that, we transfer our attention to the
underrepresented subset inside the challenging set, and we
enlarge and shrink it to investigate it in greater depth. Finally,
a new training set is built by mixing the samples from the
In Table 2, we calculated the classifiers for each and forecast efficiency. The average accuracy and F1-Score of
sample method. The average precision, accuracy, recall and the proposed TSDS method have increased by 90.56%,
F1score are shown in Figure 2. On the CSE-CIC-IDS2018 and 89.67%, and 89.16%, 85.17%, respectively, making it signi-
NSL-KDD data sets, the sampling methods using KNN, NB, ficantly better. After applying the KNN, NB, RF, and SVC
RF, and SVC all perform better than the original approach. In sampling algorithms to the UNSW-NB15 source data,
Table 2 it mentioned recall, F1score accuracy, and precision. improvements are negligibly increased. When the training set
The graph was made using these parameters as a source. and TSDS method sampling suggested in this study are used,
the median F1-score goes up by 91.17% and the average
The improvement is quite minor in terms of F1-Score accuracy goes up by 96.29%.
Table 2: The comparison of the reference and real datasets for precision, recall, accuracy and F1-score
Sl F1-
Dataset Algorithm Attack Precision Recall Accuracy
No Score
scores
According to experimental findings for the CSE-
CIC-IDS2018, NSL-KDD datasets the dissimilar ML The exact similar methods with similar parameters
algorithms to classify the accuracy level are decreasing, but if examined actual traffic performance gathered from equipment
we use the UNSW-NB15 dataset for the classifier TSDS on the network. Table 3 displays the results.
algorithm, the level of accuracy is 96.29% increasing. Real network traffic that was gathered from network
devices was classified using a proposed model that was
The best outcome was obtained by the TSDS learned from the UNSW-NB15 dataset. According to Table 4,
algorithm, which had values of 90.56% for AUC and 89.67% the TSDS algorithm produced the greatest results, which were
for F1 score. A larger score indicates a preferred but also a 96.29% AUC score and a 91.17% F1-score.
more precise identification. The graphs in Figure 3 of the Figure 4 displays the AUC score outcomes for the
ROC curve and AUC also support the purple line optimal dataset gathered from network devices after categorization
outcome of the TSDS method. A line that takes up more using machine learning methods. The purple line, which
space on the x axis indicates that the model is more successful stands for the TSDS method and takes up more space with the
at classifying the data into positive and negative categories. best classification algorithm along the x axis, is represented.
Table 4: AUC scores with UNSW-NB15 dataset
Table 3: AUC scores with NSL-KDD dataset
ML Algorithm F1 AUC
ML Algorithm F1 AUC KNN 0.5900 0.7779
KNN 0.5921 0.7594 NB 0.6567 0.8069
NB 0.6747 0.7710
RF 0.7750 0.7934
RF 0.6750 0.7694 SVC 0.6702 0.8169
SVC 0.4746 0.7609
TSDS 0.9117 0.9629
TSDS 0.8967 0.9056
[6] A. Kavousi-Fard, W. Su and T . Jin, "A Machine-Learning-Based Cyber Mil. Commun. Inf. Syst. Conf. MilCIS 2015 - Proc., 2015.
Attack Detection Model for Wireless Sensor Networks Industrial Informatics, https://doi.org/10.1109/ Mil CIS.2015.7348942.
vol. 17, no. 1, pp. 650-658, Jan. 2021,doi:10.1109/T II.2020.2964704.
[8] M. A. Siddiqi and W. Pak, "An Agile Appro ach to Identify Single and
Hybrid Normali zation for Enhancing Machine Learning-Based Network
Intrusion Detection," in IEEE Access, vol. 9, pp. 137494-137513, 2021, doi:
10. 1109/ ACCESS. 2021.3118361.
[16] D. Li, C. Yu, Q. Zhou, and J. Yu, “Using SVM to Detect DDoS Attack
in SDN Network,” IOP Conf. Ser.Mater. Sci.Eng.,vol.466,no.1,20 18
.https://DOI:10.1088/1757-899X/466/1/ 012 003.
Abstract— Breast cancer is currently a rather frequent kind of may be treated. Given its ability to spread to all other organs,
cancer. Recently, it has been observed in many women, and it has invasive carcinoma is regarded as the most serious kind of
been responsible for several fatalities. In order to prevent this breast cancer. Breast temperature monitoring, ultrasound, PET,
terrible disease, it is important to forecast the likelihood of cancer and MRI are just a few of the techniques that may be used to
in its earliest stages. Machine learning is a novel AI approach
whose potential for cancer prediction has not yet been fully
identify breast cancer, according to the authors in [7]. The
understood. In this work, the ability of machine learning classifiers staining procedure often involves the use of haematoxylin and
is employed to forecast breast cancer. Machine learning eosin (H&E). One of two methods—genomics or histological
algorithms applied in this work to predict the breast cancer are image analysis—can be used to identify breast cancer.
Support Vector Classifier, Random Forest Classifier, KNN Histopathological images, which are microscopic pictures of
Classifier, and Logistic Regression Classifier. The experiment's breast tissue, are very helpful in the early stages of cancer
findings show that Logistic Regression outperforms the other therapy.
three prediction methods. Regarding genomics, the authors of [8] noted that radio-
genomics is a developing area of study that focuses on multi-
Keywords— Artificial Intelligence, Machine Learning, Breast
Cancer Prediction
scale connections between gene expression data and medical
imaging. Both radiological and genetic characteristics are
I. INTRODUCTION provided by radio-genomics, which may improve diagnosis. It
In order to calculate a girl's chance of obtaining the illness, can perform molecular analyses on tissues to aid in cancer
breast most cancers chance is evaluated the use of prognosis and early diagnosis. Imaging may result in over- or
acknowledged chance factors [2-4]. A chance of girl is under-treatment since it is less accurate. Although
calculated with the assist of facts she gives, along with her age, histopathological imaging is significantly less effective than
reproductive records, non-public records of benign breast radio-genomics, the latter is far less often utilised since it entails
illness, and family records of breast most cancers [2]. This data costly datasets and heavy processing demands. As a
is utilised with the aid of using numerous breast most cancers consequence, only a few laboratories investigate with radio-
chance models, along with the broadly used Breast Cancer Risk genomics [8].
Assessment Tool. To calculate a girl's germline chance of II. LITERATURE SURVEY
growing breast most cancers, genetic models, or polygenic
chance scores (PRS), hire corporations of SNPs connected to Experts describe how health promotion, early disease
the illness [4]. Both questionnaire-primarily based totally and identification (screening), and improved management of
genetic breast most cancers chance assessment methodologies women at higher risk of illness may all contribute to the goal of
appear to have healing benefits, despite the fact that the addition individualised healthcare for breast cancer in this article. On the
of blood epigenome facts might also additionally offer a unique levels of communication, evidence, assessment, regulation, and
approach for enhancing breast most cancers prediction [5,6]. acceptability, authors have discussed how addressing specific
One of the leading causes of mortality for women worldwid implementation and uptake challenges may be helpful.
e is breast cancer. The American Cancer Society reports that o
ver 500 men and 41,760 women have lately passed away from Many researchers work on identification of breast cancer
breast cancer. Normal, benign, insitu carcinoma, and invasive using ML models. Some of the important contributions are
carcinoma are the four primary subtypes of breast cancer [7]. discussed here. A. Mangal et al. [1] proposed a model for
A little modification in the breast's structure characterises a prediction of breast cancer using machine learning algorithms.
benign tumour. It is not dangerous and is not a dangerous The k-NN, LR, DT, RF, and SVM with RB Function kernel are
malignancy. When in-situ carcinoma occurs, no other organs six supervised machine learning techniques presented in this
are affected and the disease solely affects the mammary duct study [10]. Adam Gradient Descent Learning, which includes
lobule system. If detected early, this variety is not harmful and the advantages of the adaptable gradient method with root mean
square propagation, was also used for deep learning.
On the BC Wisconsin Diagnostic dataset, authors in this identify this disease. BC treatment and recovery will be more
study [11] applied 5 method of ML: SVM, RF, LR, DT, and effective if this approach is used. Future research may find it
KNN. After getting the solutions, a PE and comparison between beneficially challenging to apply this approach to larger
these various classifiers is conducted. The major goal of this datasets and, if feasible, to evaluate it on a broader scale.
study is to identify the machine-learning algorithms that are Additionally, The MHS may interact with several optimization
most efficient in terms of confusion matrices, accuracy, and methods, like PSO, ACO, and GA (Genetic Algorithm) (ACO
precision when used to predict and diagnose breast cancer. method). These methods may be used to accurately choose the
Support vector machines were shown to perform better than all optimum ensemble algorithm settings. The important
other classifiers and to have the greatest accuracy (97.2%). All contributions to predict breast cancer are as discussed here. The
activities are performed using the Scikit-learn module and authors of this research [15] suggest a fine-tuning strategy for
Python programming language-based Anaconda environment. neural networks that uses AlexNet for training of network.
This work may be expanded in the future by combining other Therefore, to identify the normal and abnormal areas of breast
DS and employing the FML approach to the data to retrieve cancer, scientists modified the first and final three layers of
more precise and encouraging findings. In this study [16], the AlexNet in the suggested model. The suggested model is more
SVM, KNN, RF, ANNs, and LR are 5 supervised ML effective and significant since it performs better during training
algorithms that the authors compare. The UCI ML data-set, a and testing, with accuracy rates of 98.44% and 98.1%,
well-known ML database, is where the WBC data-set was respectively. Therefore, this research demonstrates that fine-
found. With regard to accuracy, sensitivity, specificity, tuning in neural networks may identify breast cancer using MRI
precision, NP value, FN rate, FP rate, F1 score. Authors in this images, and that utilising the suggested approach to train a
paper [18] suggest a decision tree and adaptive boosting breast neural network classifier is quicker and more effective. This
cancer prediction model (Adaboost). The study makes use of study's [17] comparative analysis of seven Deep Learning
breast cancer data that was collected from of the Kaggle data techniques used the WBC data-set. The most effective
repository. 212 (or 37.25%) of the 569 observations in the algorithms were determined to be LSTM and GRU, both of
dataset are benign whereas 62.74% are malignant. The dataset which generated favourable results for most of the performance
is severely unbalanced, as shown by the class distribution, and metrics used in this study, including an accuracy of over 98%.
a learning method like a DT is biased toward the benign Future iterations of this research will broaden its reach to
observations, which has poor predictive accuracy for the incorporate those novel, promising algorithms.
malignant observations.
D. P. Yadav et al. [21][22] proposed machine learning
The authors of this study [19] recommend utilizing device models for bone fracture, heart disease and Leukemia. Pandian
learning (ML) to classify sufferers with triple bad and non-triple in [23] identify and classify cancer using image processing and
bad breast most cancers the usage of gene expression records. capsule network. T. Vijayakumar in [24] perform cancer
Methods: By analysing RNA-Sequence records from a hundred prediction using neural network. Lot of research has been done
and ten triple bad and 992 non-triple bad breast most cancers and many researchers [12] [20] contributed to stop breast
tumour samples and the authors decided on the traits (genes) cancer. But there is need to do more research in this area to stop
used within side the layout and validation of the class models. this disease.
The scientists looked at four distinct classification models,
including SVM, KNN, NB, and DT. On various gene III. PROPOSED WORK
expression datasets, the recommended approaches were utilised This work serves as an example of how ML models may be
to assess and verify their effectiveness. In order to validate the used to forecast the likelihood of breast cancer. Some machine
outcomes acquired using the WBCD database, it is crucial to learning models are selected for the implementation which are
think about how to apply the same algorithms and techniques to best selected methods for this problem in the literature [12] [13]
other datasets [9]. In their next research, the authors want to use [15]. Python language is selected for the experiments as it
their machine learning techniques as well as others, applying provides a rich set of libraries for this kind of work.
additional parameters to bigger data sets with more illness
types. It should be emphasised that the WBCD database is the A. Classification Task
only one for which the findings were acquired, which might be Breast cancer prediction was one of the categorization issues
seen as a restriction of their work. This study [14] suggests a that the recommended technique took into account. Depending
modern ensemble-based architecture called MHS to better on the problem, the patient will either be benign or malignant.
accurately forecast breast cancer. In this model, the Extra Trees The single attribute is thought of as output, whilst the other
classifier integrates the properties from VIF, Correlation of qualities are thought of as inputs. Figure 1 depicts the suggested
Pearson, and IG to extract the most relevant features and find approach for machine learning-based breast cancer prediction.
the tumours' hidden patterns. Based on the results, the authors
concluded that the performance of the recommended In this work, initial cleaning of the data set is done. Then the
framework is flawless because the Extra Trees method chooses instances are divided into training and testing data set according
more suitable characteristics. Furthermore, since it is to 80-20 ratio. The accuracy is measured as a comparative
successful, experts advise using this suggested framework to parameter for all the four ML models which are KNN, RF,
SVM and LR. These models are used by many researchers to identify the dependent variable to belong with any of the two
predict diseases [12] [21] [22]. So these ML models are selected classes which are either 0 or 1. These four ML models are used
for prediction of breast cancer in this work. in this research.
In this study, machine learning methods are used to examine
B. Data Set and Attributes this data collection. The proposed ML models are first trained
The Wisconsin Hospitals dataset, which is accessible at on the selected data set. Then the prediction accuracy is
Kaggle.com, provided the data set for the study's breast cancer measured by using testing data.
prediction model [11]. 32 patient characteristics from the data
set are utilised to forecast cancer. The data collection has 569
occurrences altogether. The data set is available in csv format IV. RESULTS AND ANALYSIS
can be downloaded freely from Kaggle repository. Each
occurrence can therefore have: Benin or Malignant. In the data Machine learning approaches for classification are
set 357 are benign instances and 212 are malignant instances. employed in the prediction of cancer. We contrast four ML
methods. Table 1 displays the support vector classifier, random
Malignant or benign tumours can both occur in the body
forest classifier, k-nearest neighbours, and logistic regression
(cancerous). It is typical for benign tumours to develop slowly
prediction accuracy. The prediction accuracy is measured on
and not spread. Malignant tumours have the ability to spread the percentage of instances it predicts correctly from the testing
throughout the body, develop quickly, infiltrate neighbouring data set.
normal tissues, and do great damage. The working of the
proposed models is discussed here. Table 1 demonstrates that in terms of prediction accuracy,
the Logistic Regression Classifier performs better than the
KNN, RF and SVM classifier.
The accuracy of the Logistic Regression Classifier, which is
98.18 percent, is the greatest of the four. The accuracy of the
proposed ML models is shown in figure 2 using a bar graph.
The bar graph is generated in MS-Excel using the data of table
1. From the bar graph, it is easily concluded that the LR is the
best performer for the proposed problem.
TABLE I : Comparison of Prediction
Sr. No. Machine Learning Prediction
Model Accuracy
1 KNN Model 96.23
2 Random Forest
96.28
Model
3 SVM Model 98.11
4 Logistic
98.18
Regression Model
98
97.5
97 96.28
96.5 96.23
96
95.5
95
V. CONCLUSION AND FUTURE SCOPE of comprehensive breast cancer risk prediction tools in health care for
personalised prevention. Preventive Medicine, 159, 107075.
In this work, four machine learning classifiers are applied to [10] Gupta, P., & Garg, S. (2020). Breast cancer prediction using varying
the well-known WBCD breast cancer database. With a score of parameters of machine learning models. Procedia Computer
98.18 percent, it has been shown that the "Logistic Regression" Science, 171, 593-601.
surpasses the other three KNN, RF and SVM classifiers. In the [11] Naji, M. A., El Filali, S., Aarika, K., Benlahmar, E. H., Abdelouhahid, R.
future, breast cancer may be predicted using different ML A., & Debauche, O. (2021). Machine learning algorithms for breast cancer
algorithms. Future study may be conducted to see whether the prediction and diagnosis. Procedia Computer Science, 191, 487-492.
LR classifier is producing the best results for cancer prediction [12] Uttam, A.K., Mangal, A., "Application of extreme gradient boosting
ensemble model for sleep quality prediction on personalized wearable
and to assess its accuracy in predicting tumours of various sorts. device data", International Journal of Advanced Science and Technology,
This work is a novel approach as it works on achieving the best 2020, 29(5), pp. 3755–3762
prediction accuracy for breast cancer prediction. Some future [13] Mangal, A., Uttam, A.K., "Sleep prediction by various supervised
directions of this work are discussed here. The other types of machine learning model", International Journal of Advanced Science and
the errors will be calculated in future. The time taken by Technology, 2020, 29(5), pp. 3786–3792
different algorithm in training and testing will also be discussed [14] Samieinasab, M., Torabzadeh, S. A., Behnam, A., Aghsami, A., & Jolai,
in future. F. (2022). Meta-health stack: a new approach for breast cancer
prediction. Healthcare Analytics, 2, 100010.
REFERENCES [15] Nasir, M. U., Ghazal, T. M., Khan, M. A., Zubair, M., Rahman, A. U.,
Ahmed, R., ... & Yeun, C. Y. (2022). Breast Cancer Prediction
[1] A. Mangal and V. Jain, "Prediction of Breast Cancer using Machine Empowered with Fine-Tuning. Computational Intelligence and
Learning Algorithms," 2021 Fifth International Conference on I-SMAC Neuroscience, 2022.
(IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India,
2021, pp. 464-466. doi: 10.1109/I-SMAC52330.2021.9640813 [16] Islam, M., Haque, M., Iqbal, H., Hasan, M., Hasan, M., & Kabir, M. N.
(2020). Breast cancer prediction: a comparative study using machine
[2] Gail, M. H., Brinton, L. A., Byar, D. P., Corle, D. K., Green, S. B., learning techniques. SN Computer Science, 1(5), 1-14.
Schairer, C., & Mulvihill, J. J. (1989). Projecting individualized
probabilities of developing breast cancer for white females who are being [17] Ghosh, P., Azam, S., Hasib, K. M., Karim, A., Jonkman, M., & Anwar,
examined annually. JNCI: Journal of the National Cancer Institute, A. (2021, July). A performance based study on deep learning algorithms
81(24), 1879-1886. in the effective prediction of breast cancer. In 2021 International Joint
Conference on Neural Networks (IJCNN) (pp. 1-8). IEEE.
[3] Louro, J., Posso, M., Hilton Boon, M., Román, M., Domingo, L., Castells,
X., & Sala, M. (2019). A systematic review and quality assessment of [18] Assegie, T. A., Tulasi, R. L., & Kumar, N. K. (2021). Breast cancer
individualised breast cancer risk prediction models. British journal of prediction model with decision tree and adaptive boosting. IAES
cancer, 121(1), 76-85. International Journal of Artificial Intelligence, 10(1), 184.
[4] Mavaddat, N., Michailidou, K., Dennis, J., Lush, M., Fachal, L., Lee, A., [19] Wu, J., & Hicks, C. (2021). Breast cancer type classification using
& MacInnis, R. J. (2019). Polygenic risk scores for prediction of breast machine learning. Journal of personalized medicine, 11(2), 61.
cancer and breast cancer subtypes. The American Journal of Human [20] Manoharan, Samuel. “Early diagnosis of Lung Cancer with Probability of
Genetics, 104(1), 21-34. Malignancy Calculation and Automatic Segmentation of Lung CT scan
[5] Terry, M. B., Liao, Y., Whittemore, A. S., Leoce, N., Buchsbaum, R., Images.” Journal of Innovative Image Processing (JIIP) 2, no. 04 (2020):
Zeinomar, N., ... & MacInnis, R. J. (2019). 10-year performance of four 175-186.
models of breast cancer risk: a validation study. The Lancet Oncology, [21] D. P. Yadav, P. Saini and P. Mittal, "Feature Optimization Based Heart
20(4), 504-517. Disease Prediction using Machine Learning," 2021 5th International
[6] Yanes T, Young MA, Meiser B & James PA (2020) Clinical applications Conference on Information Systems and Computer Networks (ISCON),
of polygenic breast cancer risk: a critical review and perspectives of an Mathura, India, 2021, pp. 1-5. doi: 10.1109/ISCON52037.2021.9702410
emerging field. Breast Cancer Res 22, 21. [22] D. P. Yadav, "Feature Fusion based Deep Learning method for Leukemia
[7] Zhou, X., Li, C., Rahaman, M. M., Yao, Y., Ai, S., Sun, C., ... & Teng, Y. cell classification," 2021 5th International Conference on Information
(2020). A comprehensive review for breast histopathology image analysis Systems and Computer Networks (ISCON), Mathura, India, 2021, pp. 1-
using classical and deep neural networks. IEEE Access, 8, 90931-90956. 4. doi: 10.1109/ISCON52037.2021.9702440
[8] Sutanto, D. H., & Ghani, M. K. A. (2015). A benchmark of classification [23] Pandian, A. Pasumpon. "Identification and classification of cancer cells
framework for non-communicable disease prediction: a review. ARPN J using capsule network with pathological images." Journal of Artificial
Eng Appl Sci, 10, 9941-9955. Intelligence 1, no. 01 (2019): 37-44.
[9] Moorthie, S., de Villiers, C. B., Burton, H., Kroese, M., Antoniou, A. C., [24] Vijayakumar, T. "Neural network analysis for tumor investigation and
Bhattacharjee, P., ... & Schmidt, M. K. (2022). Towards implementation cancer prediction." Journal of Electronics 1, no. 02 (2019): 89-98
Arya R Deepak S
Electronics and Communication Engineering Electronics and Communication Engineering
College of Engineering Trivandrum College of Engineering Trivandrum
Thiruvananthapuram, India Thiruvananthapuram, India
aryarajitha123@gmail.com deepaks@cet.ac.in
Abstract—The rapid spread of the disease after COVID-19’s the market to test individuals for COVID-19 infection[1]. RT-
emergence in 2019 has presented enormous problems to medical PCR, which is only used to determine whether the user is
institutions. The diagnosis process will go more rapidly if the infected, currently lacks sufficient precision. By using medical
infected region in the COVID-19 CT image can be automatically
segmented, which will aid clinicians in promptly identifying images it is possible find the infection region more accurate, as
the patient’s illness. Automated lung infection identification a result, in order to draw a conclusion, additional information
using computed tomography scans is a more general approach. must be considered in addition to RT-PCR. The lung’s bilateral
However, segmenting sick areas from CT slices is quite difficult. patchiness or ground-glass opacity (GGO) can be seen on a
In this work, a diagnosis system based on deep learning methods CT scan, providing more accurate pathological data. However,
is being created to identify and quantify COVID-19 infection and
screen for pneumonia using CT imaging. a diagnosis and course of therapy are decided by the expert
Here, Unet++ approaches, U-net architecture based on CNN judgement of medical personnel. Because there are few quali-
encoder and CNN decoder, and Attention Unet segmentation fied doctors in these locations and the workload in the infected
techniques are used. These methods are applied for quick and area is high when observed with the naked eye, it is possible
accurate picture segmentation to produce segmentation models for imaging diagnosis and therapy to be employed in areas
for lung and infection. Fourfold cross-validation has been used as
a re-sampling method to improve skill estimate on unseen data. with severe epidemics and a lack of medical resources. So we
To enable volume ratio calculating and determine infection rate, require a technology to swiftly and automatically segment the
the lung and infection volumes have been reconfigured. 20 CT contaminated area of the COVID-19 patients’ lungs in order
scan cases were used in this study, and the data were split into to better manage the issues brought on by the virus [1,2].
two, training dataset 70% and a validation dataset 30%. In this Convolutional neural networks (CNNs) have been exten-
study with three architectures it shows that basic Unet performs
well compared to other two architectures. sively utilised in the processing of medical images as a result
Index Terms—SARS-CoV-2, CT scans, deep learning, lung of the recent rapid growth of artificial intelligence, partic-
segmentation, infection segmentation, attention Unet, Unet++, ularly deep learning technologies, and their potent feature
Unet. representation and extraction capabilities. In order to locate
and recognise anomalous qualities and areas of interest, deep
I. I NTRODUCTION learning algorithms can be used to segment problems in
Corona virus disease 2019 is a pandemic ailment that is now biological picture analysis (ROIs). NET-based designs and
affecting the entire world (COVID-19). The Corona Virus Dis- popular deep learning architectures now on the market are
ease 2019 (COVID-19) is a pandemic epidemic that impacts the most promising ones. In this study, a deep learning-based
every country in the world, according to the World Health Or- diagnosis approach was created using clinical CT images
ganization. People who carry COVID-19 have reported a wide collected from a dataset of publically available chest CT scans
range of symptoms, from mild discomfort to serious disease. to automatically detect and assess areas thought to be infected
2 to 14 days after the virus was initially exposed, symptoms with the COVID-19 virus.
could start to show. Some possible symptoms include a fever or II. L ITERATURE R EVIEW
chills, coughing, shortness of breath or breathing difficulties,
tiredness, headache, loss of taste or smell, sore throat, stuffy A well-researched area with several ecological protection
or runny nose, nausea or vomiting, and diarrhoea. In order applications is deep learning-based COVID-19 detection. Re-
to prevent the pandemic from spreading, reverse transcription cently, methods for tracking the prevalence of illnesses have
polymerase chain reaction (RT-PCR) is commonly picked from been routinely used to analyse medical imaging. The devel-
opment of this subject has been hastened by the introduction
of artificial intelligence technologies and their extensive appli-
cation for feature representation, the detection, and segmen- III. M ETHODOLOGY
tation of different medical conditions [3]. Ramzi Mahmoud The proposed approach in this study is composed of three
and others[4], It has been claimed to use CNN architecture architectures for training and segment the lung CT images
for image classification and the standard Unet architecture of covid-19 patients. The process of segmentation involves
for segmentation in a deep learning-based diagnosis system assigning a class to each pixel in the image. There are many
for COVID-19 detection and pneumonia screening using CT applications for image segmentation, including satellite imag-
imaging. The segmentation system of this suggested model ing, self-driving cars, and medical imaging, to name a few.
gets dice scores of 0.98 and 0.91, respectively, and an accuracy There are other image segmentation techniques accessible,
of 0.98 for the segmentation tasks involving the segmentation however in this case, we’re employing semantic segmentation
of the lung and infection. Qin Zhang [5] They suggested a to separate Covid-19 CT pictures into their component parts.
new network structure and gave it the name QC-HC U-Net in Semantic segmentation is a deep learning technique that gives
order to be able to automatically partition the contaminated each pixel in an image a label or category. Architecture used
region. First, they create a new connection method by fusing for segmentation are Unet, Unet++ and attention Unet. Be-
dense and residual connections, then they apply it to the cause U-net’s segmentation algorithms, which were developed
encoder and decoder. Second, in the decoder part, they decided especially for medical image analysis, can precisely segment
to include Hypercolumns. The enhanced network effectively images with only a little amount of training data. These
avoids vanishing gradient while extracting more information features, which offer U-net designs a very high utility within
when compared to the benchmark 3D U-Net. Deng-Ping Fan the medical imaging community, have led to its widespread
[6] The automatic identification of infected regions from chest adoption as the primary tool for segmentation tasks in medical
CT slices is proposed using a novel COVID-19 Lung Infection imaging. The widespread use of U-net algorithms in all
Segmentation Deep Network (Inf-Net). In their Inf-Net, the significant imaging modalities, including X-rays, MRI, CT
high-level characteristics are combined to create a world map scans, and microscopes, illustrates the effectiveness of the
using a parallel partial decoder. Jue Jiang [7] They created the technology. Here, the covid-19 CT images were segmented
incremental-MRRN and dense-MRRN variants of the multiple using three different designs, and the outcomes were com-
resolution residually connected network (MRRN). To detect pared.
and segment the lung tumours, their networks simultaneously
incorporate information from different image resolutions and A. Unet
feature levels using residual connections. Tongxue Zhou [8] Four encoder blocks and four decoder blocks that are joined
They suggest an attention-based segmentation network built by a bridge make up the U-shaped encoder-decoder network
on the U-Net, Its obtained Hausdorff Distance and Dice design known as UNET. At each encoder block, the filter count
Score are 18.8 and 83.1%, respectively. Jun Ma [9] In this (feature channels) is doubled and the spatial dimensions are
work, they generated three benchmarks for lung and infection cut in half by the encoder network (contracting path). The
segmentation based on 70 annotated COVID-19 instances, decoder network also reduces the number of feature channels
which contain active research areas like few-shot learning, by half and doubles the spatial dimensions. The encoder
domain generalisation, and knowledge transfer. Cheng Chen network doubles the filter count (feature channels) and reduces
[10] Automatic segmentation of lung lesions from COVID-19 the spatial dimensions for each encoder block (contracting
computed tomography (CT) scans can help build a quantitative path). Additionally, the decoder network reduces by half the
model for diagnosis and treatment. In order to meet the number of feature channels and increases by two the spatial
processing criteria for CT scans under the COVID-19 standard, dimensions. A succession of encoder blocks are used by the
this work presents a novel segmentation technique. Laith encoder network, which also functions as a feature extractor,
Abualigah [11] The Evolutionary Arithmetic Optimization Al- to develop an abstract representation of the input image. Each
gorithm is the foundation for the new multilevel thresholding encoder block is made up of two 3x3 convolutions, followed
method proposed in this paper (AOA). Guotai Wang [12] They by a ReLU (Rectified Linear Unit) activation function. The
first provide a novel COVID-19 Pneumonia Lesion segmenta- ReLU activation function increases the network’s nonlinearity,
tion network (COPLE-Net) to better handle the lesions with resulting in better generalisation of the training data. The
different scales and appearances, which is a generalisation output of the ReLU acts as a skip connection to the relevant
of the Dice loss for segmentation and Mean Absolute Error decoder block. In Fig. 1, the Unet architecture is displayed.
(MAE) loss for robustness against noise. Xiaocong Chen [13]
For the automatic segmentation of several COVID-19 infection B. Attention Unet
locations, they suggested an unique deep learning approach. Here, a novel attention gate (AG) paradigm for medical
Specifically, they employ the soft attention mechanism to en- imaging is developed, which automatically learns to concen-
hance the model’s capacity to differentiate a range of COVID- trate on targets with a range of sizes and shapes. Models
19 symptoms and the Aggregated Residual Transformations to developed using AGs automatically identify and suppress the
acquire a robust and expressive feature representation. portions of the input image that are not relevant to a specific
job. Because of this, it is unnecessary to use explicit external
tissue/organ localization modules in cascaded convolutional
neural networks (CNNs). To increase model sensitivity and available to the general public. This is why our team
prediction accuracy, AGs can be readily added to popular CNN decided to use the CTS dataset from Ma Jun et al. [17].
architectures, such the U-Net model, without any additional The dataset used by Ma Jun et al. was made available by
computing work. Experimental results show that AGs consis- the Corona-cases Initiative [17] and Radiopaedia [15].
tently improve U-prediction Net performance while retaining manually marked [16]. 20 validated COVID-19 individu-
processing economy using a variety of datasets and training als’ axial volumetric CT scans, 3138 lung CT images that
sizes. The attention Unet’s architecture is shown in Figure 2. have been tagged, segmented, and verified by experienced
radiologists, as well as the associated lung CT images,
infection masks, and a superposition of the two masks,
are all included. Fig. 4 gives a summary of the database
that was used. This dataset is a publically available CT
image for Covid-19 in kaggle named as COVID-19 CT
scans. This dataset includes expertly segmented lung and
infection images along with 20 CT scans of individuals
with COVID-19 diagnoses. Here we are used this dataset
in the form of metadata. Starting with the 20 CT scan
C. UNet++
UNet++ differs from the original U-Net in three ways:
1) Convolution layers on skip pathways are used, which
closes the semantic gap between encoder and decoder feature
mappings. 2) Multiple connections on skip pathways between
skips, which improves gradient flow. 3. Deep supervision Fig. 4. Sample images from dataset.
permits model pruning and, in the worst case, produces perfor-
mance that is superior to using only one loss layer. In UNet++, instances used in this study, we divided the data into
an initial or backbone encoder sub-network is followed by a two portions: 70% for the training dataset and 30% for
decoder sub-network. Deep supervision and freshly built skip the validation dataset. The lung segmentation step was
routes (green and blue in Fig. 3) link the two sub-networks the first procedure we carried out. The development of
(red in Fig 3). In Fig. 3, the UNet++ architecture is shown. the lung segmentation model follows the introduction of
IV. E XPERIMENT an Unet architecture based on CNN encoder and CNN
decoder techniques, attention Unet, and UNet++. The
A. Data Set infection segmentation model was created using the same
Despite the surge in patients with COVID-19 infections method in the second phase. The last step is to restore
and the volumetric CT scans they undergo, labelled CT the volume of the 20 examples. For each illustration,
scans are still only readily available in a small number of we reconstructed the infection volumes after the lungs’
settings. As a result, there are not as many CTS datasets volumes. As described in Ramzi Mahmoudi et al.[8]. Fig
Fig. 5. A chest CT scan and its corresponding lung mask after prepossessing 49 0.8768 0.0851 0.7708 0.1784
cropping.
50 0.8828 0.0811 0.7787 0.1716
B. Segmentation Models
This network’s suggested segments cover the lung and As seen below, both of these evaluation metrics are
COVID-19 infection areas. The training for every model connected and both have a restricted range of [0,1] and
was done independently. The U-Net, Attention Unet, and are frequently close to the value of 1.
UNet++ architectures were implemented in Google Colab DICE
using the Adam Optimizer and the Keras library with IoU = (3)
2 − DICE
TensorFlow backend. Each design generates sigmoid acti-
vation by using a Relu operation as its activation function. V. R ESULTS
For the Unet++ and Attention Unet architectures, the After training each model ie using Unet, attention Unet
filter widths are 16, 32, 64, 128 and 256, while for the and UNet++ with the same dataset we inferred that the
Unet architecture, they are 16, 32, 64, 128, 256 and 512. loss function is less in the case of attention unet and the
50 epochs are used to train each model. All subsequent validation dice score is more in Unet when compared to
procedures are the same for each model till training. other architectures. Fig 6 shows the infection mask of the
original image after preprocessing stage. Expect training
C. Evaluation metrics models, all other steps are the same for each model. Each
Dice Score (DS) coefficient and Intersection over Union model obtained certain advantages and disadvantages in
(IoU) metric are used to assess this model. The efficiency the case of loss function, validation dice coefficient,
of automated segmentation of Covid-19 CT images was validation loss and dice coefficient. Table 1, Table 2 and
evaluated using the DS as a statistical validation measure. Table 3 shows the different values for dice coefficient,
The ratio of the total number of pixels to twice the overlap loss, validation dice coefficient and validation loss for
area of the expected output and the ground truth can be different epochs. By comparing the values in table 1, 2,
used to determine DS. The DS value ranges from 0 to 1, 3 dice coefficient is more compared to others in attention
where 0 denotes complete spatial overlap and 1 denotes Unet model, loss is also less in attention Unet model
no overlap at all [18]. This is how the DS is determined compared to other two models. In case of validation
[19]: coefficient it is more in Unet model compared to other
2T P two models, also validation loss is less in Unet rather
DS = (1) than other two. Fig 7 and Fig 8 shows the Validation and
F N + F P + 2T P
dice coefficient graph for 50 epochs, while the data is
In this context, TP stands for true positive, FP for false trained for Unet model. Fig 10 and 11 shows the plot of
positive, and FN for false negative prediction. IoU is validation, dice coefficient vs epoch and loss vs epoch
defined as the ratio of the area of union between the graph for Unet++ model. Fig 13 and 15 shows the vari-
anticipated segmentation’s overlap area and the ground ation of dice, validation loss vs epoch and loss vs epoch
truth. The Jaccard index is another name for the IoU. for attention Unet model. Fig 9 shows the predicted and
This is how the IoU is determined [18]: actual mask after training with unet architecture. Fig
TP 12 shows the actual and predicted masks after training
IoU = (2) with unet++ architecture. Fig 14 shows the predicted and
TP + FP + FN
TABLE II
ATTENTION U NET
Fig. 10. Dice coefficient vs epoch while training with Unet++. Fig. 13. Dice coefficient vs epoch while training with attention Unet.
Fig. 12. Actual image vs predicted image using Unet++. Fig. 15. Dice loss vs epoch while training with attention Unet.
coefficient as 0.77 and validation loss 0.17 for Unet++ [10] Cheng Chen et al. An Effective Deep Neural Network for Lung Lesions
architecture and for attention Unet architecture it obtained Segmentation From COVID-19 CT Images. [CrossRef] [Google Scholar]
[11] Laith Abualigah et al. A Novel Evolutionary Arithmetic Optimization
a validation dice score 0.802 and loss 0.15. For Unet Algorithm for Multilevel Thresholding Segmentation of COVID-19 CT
architecture it obtained validation dice coefficient 0.85 Images. [CrossRef] [Google Scholar]
and loss 0.11 for 50 epochs. So the results shows that [12] Guotai Wang etbal. A Noise-Robust Framework for Automatic Segmen-
tation of COVID-19 Pneumonia Lesions From CT Images. [CrossRef]
Unet architecture produces a good dice score compared [Google Scholar]
to others. And by comparing the training and validation [13] Xiaocong Chen et al. Residual Attention U-Net for Automated Multi-
dice coefficient graphs of these three architectures it Class Segmentation of COVID-19 Chest CT Images. [CrossRef] [Google
Scholar]
is also showing that unet architecture performs good [14] Vishal Rajput explanation on Attention U-Net, ResUnet, many more.
compared to others. From figures it shows the difference [15] Ma, J.; Wang, Y.; An, X.; Ge, C.; Yu, Z.; Chen, J.; Zhu, Q.; Dong, G.;
between actual mask and predicted mask, in these figures He, J.; He, Z.; et al. Towards Data-Efficient Learning: A Benchmark
for COVID-19 CT Lung and Infection Segmentation. arXiv 2020,
it is showing that expect from unet++ model other two arXiv:2004.12537.
are extracting small features. Unet produces good dice [16] Pizer, S.M.; Amburn, E.P.; Austin, J.D.; Cromartie, R.; Geselowitz,
score because of it has multi-stage cascaded convolu- A.; Greer, T.; ter Haar Romeny, B.; Zimmerman, J.B.; Zuiderveld, K.
Adaptive histogram equalization and its variations. Comput. Vis. Graph.
tional neural networks, they are necessary for U-Net Image Process. 1987, 39, 355–368.
to function despite its great representational capabilities. [17] Zimmerman, J.; Pizer, S.; Staab, E.; Perry, J.; McCartney, W.; Brenton,
These cascaded frameworks create dense predictions and B. An evaluation of the effectiveness of adaptive histogram equalization
for contrast enhancement. IEEE Trans. Med. Imaging 1988, 7, 304–312.
extract the region of interest. As it constantly extracts [18] Zou, Kelly H et al. “Statistical validation of image segmentation quality
low-level information, this method uses computational re- based on a spatial overlap index.”Academic radiology vol. 11,2 (2004):
sources excessively and redundantly. There are numerous 178-89. doi:10.1016/s1076-6332(03)00671-8.
[19] Taha, Abdel Aziz, and Allan Hanbury. “Metrics for evaluating 3D med-
techniques for segmenting CT scan images for COVID- ical image segmentation: analysis, selection, and tool.” BMC medical
19 early detection. To tackle the issue, this experiment imaging vol. 15 29. 12 Aug. 2015, doi:10.1186/s12880-015-0068-x.
makes advantage of PyTorch segmentation models. And
from the three models employed in this experiment, as
shown in tables 1, 2, and 3, Unet outperforms the others
for validation and vaqlidation loss as well as for dice
coefficient and lost attention. The network architectures
of Unet, Attention Unet, and U-Net++ are strong, and
they were initially developed for the segmentation of
medical images. Because there are more parameters to
play with, this network might also conclude that it is more
adaptable. Even though this experiment is far from ideal,
segmentation in medical image processing, in particular,
should still benefit greatly.
R EFERENCES
[1] Xie XZ, et al. Chest CT for typical coronavirus disease 2019 (COVID-
19) pneumonia: Relationship to negative RT-PCR testing. Radiology.
2021;292:41–45. [PMC free article] [PubMed] [Google Scholar]
[2] Wang D, et al. Clinical characteristics of 138 hospitalized patients with
2019 novel coronavirus-infected pneumonia in Wuhan, China. JAMA, J.
Am. Med. Assoc. 2020;323:1061–1069. doi: 10.1001/jama.2020.1585.
[PMC free article] [PubMed] [CrossRef] [Google Scholar]
[3] Huang, G. et al. Densely connected convolutional networks. In 2017
IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
2261–2269 (2017).
[4] Ramzi Mahmoudi et al. A Deep Learning-Based Diagnosis System for
COVID-19 Detection and Pneumonia Screening Using CT Imaging.
[CrossRef] [Google Scholar]
[5] Qin Zhang et al. Segmentation of infected region in CT images
of COVID-19 patients based on QC-HC U-net. [CrossRef] [Google
Scholar]
[6] Deng-Ping Fan et al. Inf-Net: Automatic COVID-19 Lung Infection
Segmentation From CT Images. [CrossRef] [Google Scholar]
[7] Jiang et al., Multiple resolution residually connected feature streams
for automatic lung tumor segmentation from CT images. [CrossRef]
[Google Scholar]
[8] Tongxue Zhou et al. Automatic COVID-19 CT segmentation using U-
Net integrated spatial and channel attention mechanism. [CrossRef]
[Google Scholar]
[9] Jun Ma et al. Toward data-efficient learning: A benchmark for COVID-
19 CT lung and infection segmentation. [CrossRef] [Google Scholar]
Abstract— Future internet is increasingly reliant on largely decentralized and autonomous. These components
Software Defined Networking (SDN). With SDN, networks are usually developed by manufacturers for networks.
can be dynamically controlled, providing a global network. Manufacturers have to develop their own designs, firmware,
Compared to traditional networks, SDN offers the advantage and software in order to operate their own hardware. In light
of better security provisioning due to centralized of the changing nature of applications and the endlessly
management. However, SDN architecture manifests several changing demands for data, the existing Internet architecture
new network security problems that need to be handled to is unsuitable for adapting to them. SDN [1] has been
improve the security of SDN networks. Information security introduced for configuring and deploying networks that
and data analysis systems for Big Data have become more offers unparalleled flexibility. Managing traffic more
essential due to the increasing volume of data and its effectively can be improved by separating the control plane
incremental growth. Monitoring and analyzing data is and data plane. SDN architectures, however, pose a whole
needed to detect any intrusion into a system or network via host of security challenges. Recent concerns regarding SDN
an intrusion detection system (IDS). By using traditional security have gained considerable attention, as shown in [2]
methods, traditional data analysis techniques are unable to and [3]. A network intrusion detection system (IDS) is a key
detect attacks caused by high volumes, a wide variety and security tool. IDSs based on signatures identify new attacks
high speeds of network data. For an accurate and efficient using a database of signatures from previous attacks.
data analysis process, IDS employs Big Data Patterns in an anomaly database are used to identify attacks
techniques. The paper uses machine learning models to in an anomaly-based IDS. Zero-day attacks will not be
detect Distributed Denial of Service (DDoS) attacks. The detected by the system, but false alarms are rare. A
machine learning model is trained using data from KDD signature-based IDS is highly effective if it has a current
Cup 99.K Nearest Neighbor Classifier, Logistic Regression, signature database with accurate data. Maintaining
and Decision Tree have been used to train and test the databases of this type in real time is difficult and incurs high
datasets. It can be concluded that machine learning methods operational expenses. Analyzing observations that differ
can be more effective at detecting DDoS attacks than from the baseline allows one to identify anomalies using
traditional methods, that can be applied to software defined anomaly-based IDS. An IDS based on signatures is less
networks. Several experiments demonstrate the potential of likely to detect zero-day attacks. In order to find anomalies
our proposal to detect intrusion in SDN environments after on the network, the process monitors real-time traffic on the
extensive evaluation. network. Networks are growing in size, big data is reaching
an unprecedented volume, and powerful computation
facilities are making all processes more complex and real-
Keywords—Software Defined Networks, Decision Tree, time. In order to manage network-based intrusions
Machine Learning, Distributed Denial of Service, Intrusion
effectively, these systems must be analyzed carefully,
Detection System
precisely, and accurately, which has not been possible in the
I. INTRODUCTION past. On the other hand, machines have improved their
accuracy tremendously with AI algorithms. A growing need
Over the past three decades, the Internet architecture has for better performance is leading to its introduction among
evolved from a simple network to a complex system. the network types. In the modern era of modern cyber
Decentralized, autonomous, and consisting of a variety of security risks, network-based intrusion detection systems
network devices (with complex protocols, the system is
(NIDS) have become a more realistic possibility due to their sampling and other preprocessing techniques applied to
implementation via software defined networks (SDNs). various datasets. 89.134% of UNSW-NB15 samples were
Rapid growth of network data and devices pose a high risk correctly identified. There have been several neural network
of security threats. By deploying machine learning models proposed for NIDS and various datasets were used
algorithms over SDN, the paper implements an Intrusion to implement the proposed approach to distinguish between
Detection System. KNN Classifier, Decision Tree Classifier, normal and attack packets in the network. In general, factors
and Logistic Regression algorithms are used to analyse the like those are intended to provide neural networks with the
data. capability of learning complex patterns with multiple scopes
of information within the same packet, but not always to do
that. This model is based on four hidden layers and used to
II. RELATED WORKS monitor intrusion attacks on KDD cup99[8]. Data
Algorithms for machine learning that integrate SDN have preprocessing was performed by using feature scaling and
attracted considerable interest. An experimental study was encoding. Various datasets were analyzed using more than
undertaken in [26] to find a solution that fixed problems in 50 features. Due to the large number of features, complex
KDD Cup 99 using the NSL-KDD dataset for intrusion GPUs were required to reduce training time. It was proposed
detection. The five Machine Learning algorithms were that NIDS use a supervised adversarial auto-encoder neural
studied. NSL-KDD dataset contained only 13 features due network [9][10]. The generator and discriminator in GANS
to correlation feature selection algorithm, resulting in a are different neural networks in contention with each other.
reduced complexity. The NSL-KDD dataset is used to detect With the Jensen-Shannon minimization algorithm, the
network anomalies in real-world networks. The average objective function will be minimized as much as possible.
accuracy is achieved for all 41 features using these classic By generating fake data packets, the generator attempts to
machine learning models. After reducing the number of generate an attack, but the discriminator determines whether
features to 13, the same models were trained again and these packets are valid or not; in other words, it determines
scored an average accuracy of 98%, 85%, 95%, 86%, and whether these packets are real or fake [11]. A regularization
73%. Based on deep neural networks, a system for intrusion penalty is also applied to the model structure for overfitting
detection and finding was proposed in [4]. In the proposed control behavior. U2RL and R2L detected reasonably well,
method, six basic and traffic characteristics are derived from but other tests revealed lower detection rates. The paper
the NSL-KDD dataset, which is easily derived from the [12][13] presented multichannel deep learning of features
SDN infrastructure. Accuracy, precision, and recall are for NIDS based on CNNs, two fully connected layers and a
combined to yield a F1-score of 0.75. For the second SoftMax classifier. With an average accuracy of 94%, the
evaluation, [5] implemented seven classic machine learning evaluation is conducted over different datasets. However,
models. A neural network has been applied to detect SDN the attack structure and characteristics were not clearly
anomalies with up to 89% accuracy [6]. Feature scaling is outlined in the proposed model. The attribute-based
also improved and accelerated via the Min-Max encryption is discussed in [14][15].
normalization technique. An intrusion detection application
used SVM classifiers coupled with principal component
analysis (PCA). A model for detecting abnormal patterns is III. METHODOLOGY
trained and optimized in this approach. It was proposed to To train the model, data is analyzed, best features are
use Min-Max normalization to reduce the error rates [7]. extracted, and preprocessing techniques are performed using
Radial basis function kernels were used for optimization. In only best five features, based on the best hyperparameters.
total, an average accuracy of 95% was achieved using the 31 The dataset consists of 2827876 rows and 80 columns,
features of the dataset, as well as the metrics used to which is collected from KDD Cup99 database. The
evaluate the proposed model. In [8], XGBoost was used to normalization helps to process the raw data and classifies
differentiate between DoS attacks and non-DoS attacks. A datasets which can be used in analysis using machine
prototype and development technique based on SDN using learning algorithms. It helps in identifying the attacks and
POX SDN was evaluated and analyzed using Future Internet allows to classify the raw data into different categories. To
2021, 13, 111 5 of 18. The network topology was simulated classify attacks, in which machine learning algorithms are
with Mininet to simulate cloud detection based on SDN in used. It is then analyzed to determine which type of attack is
real-time. A logarithmic-based and a Min-Max-based involved and what action is required. As a result, the
normalization was applied. In comparison to RF and SVM, processed data are placed in the algorithm and classified as
XGBoost had an overall accuracy of 98%, 96%, and 97% normal or an attack. Fig 1 illustrates the methodology used;
[9]. Based on the packet network, a six-tuple classification data is processed with KNN, Logistic Regression and
of characteristics is proposed. Speeds of flow packets Decision Tree Classifier, with Fig 3 showing that Decision
(SSIP), speeds of source ports, deviations of flows bytes Tree Classifier classifies better with a higher accuracy rate.
(SDFB), speeds of flow entries, and ratios of flow entries
and pairs should be investigated. SVM based on the six
characteristics calculates the current state of the network to
be either normal or attack. For an average accuracy of 95%,
attack flow, defense flow, and defense array were selected
[9]. In order to detect attacks in a multi-class classification,
TSDL was developed and implemented. The detection rate
and monitoring efficiency were improved using down-
we analyze the advantages and disadvantages of Learning Techniques." Journal of IoT in Social, Mobile,
implementing any one or more of them. The Decision Tree Analytics, and Cloud 4, no. 1 (2022): 24-32.
model outperformed the other algorithms based on the
evaluation metrics. Using the proposed method, real-time [11] Mugunthan, S. R. "Novel Cluster Rotating and Routing
attacks can be detected and protected against on the SDN Strategy for software defined Wireless Sensor Networks."
platform. Moreover, future research will examine more Journal of ISMAC 2, no. 02 (2020): 140-146.
metrics of evaluation. The approach is expected to be
implemented using Deep Learning algorithms.
[12] Li, Y., & Lu, Y. (2019, September). LSTM-BA: DDoS
detection approach combining LSTM and Bayes. In 2019
REFERENCES Seventh International Conference on Advanced Cloud and
Big Data (CBD) (pp. 180-185). IEEE.
[1] Dey, S. K., & Rahman, M. M. (2019). Effects of
machine learning approach in flow-based anomaly detection [13] Ring, W. (2019). Hotho, 2019 Ring M., Wunderlich S.,
on software-defined networking. Symmetry, 12(1), 7. Scheuring D., Landes D., Hotho A. A survey of network-
based intrusion detection data sets, Comput. Secur, 86, 147-
[2] Gao, M., Ma, L., Liu, H., Zhang, Z., Ning, Z., & Xu, J. 167.
(2020). Malicious network traffic detection based on deep
neural networks and association analysis. Sensors, 20(5), [14] Ahmad, R., & Alsmadi, I. (2021). Machine learning
1452. approaches to IoT security: A systematic literature
review. Internet of Things, 14, 100365.
[3] Nobakht, M., Sivaraman, V., & Boreli, R. (2016). A
host-based intrusion detection and mitigation framework for [15] Aleesa, A. M., Zaidan, B. B., Zaidan, A. A., & Sahar,
smart home IoT using OpenFlow. In 2016 11th International N. M. (2020). Review of intrusion detection systems based
conference on availability, reliability and security on deep learning techniques: coherent taxonomy,
(ARES) (pp. 147-156). IEEE. challenges, motivations, recommendations, substantial
analysis and future directions. Neural Computing and
[4] Sebbar, A., Zkik, K., Baddi, Y., Boulmalf, M., & Applications, 32(14), 9827-9858.
Kettani, M. D. E. C. E. (2020). MitM detection and defense
mechanism CBNA-RF based on machine learning for large-
scale SDN context. Journal of Ambient Intelligence and
Humanized Computing, 11(12), 5875-5894.
[6] Bag, S., Gupta, S., & Wood, L. (2020). Big data
analytics in sustainable humanitarian supply chain: Barriers
and their interactions. Annals of Operations Research, 1-40.
Abstract—An increasing number of initiatives for screening measure vessels in retinal images. The structural features of
people for retinal disorders with widespread obtainability of blood vessels like branching pattern, length, tortuosity, and
digital fundus (retina) cameras results in huge collection of color width not just offer data regarding pathological changes but
fundus images. The capability to retrieve images relevant to helps in diagnosing the disease and its severity [3]. Retinal
pathological conditions was a powerful functionality that images should be precisely segregated for extracting delicate
contains extensive applications in automated computer aided substances present in the retinal image. Content Based Image
diagnosis (CAD), evidence-related medicine, and training Retrieval (CBIR) refers to a system for searching, retrieving
ophthalmologists. The automatic extraction of significant
similar images, and browsing the query image from large
attributes namely exudates will be helpful for physicians to
database [4]. CBIR enables users to query and related to the
effectively overcome several diseases affecting the patient.
Though there exist numerous techniques for extracting such image extracted features, matching can be taken place on the
features, they lack in retrieval aspect of the data or the precision basis of automatically derived primitive characteristics like
of the feature extraction. This study designs a Retinal Fundus texture, color, shapes, and spatial relation between objects [5].
Image Retrieval and Classification utilizing Optimal Deep CBIR related solutions were explored to develop diagnosis
Learning (RFIRC-ODL) model. The presented RFIRC-ODL help in medical imaging solutions. CBIR has been attempted
model encompasses two major modules namely retrieval and for diagnosing retinal diseases utilizing large database.
classification. For image retrieval process, the presented RFIRC- Retrieval related to statistical attributes of DR lesions can be
ODL model employs Residual Network (ResNet) based feature mapped on a semantic space respective to disease condition
extraction and Manhattan distance based similarity measure. utilizing Fischer discriminant analysis.
Next, in the second stage, the salp swarm optimization (S S O) Dayana and Emmanuel [6] examine an effectual,
algorithm with long short term memory (LS TM) approach can optimizing DNN with Chronological Tunicate Swarm
be exploited for fundus image classification. The use of S S O Algorithm (CTSA) to classify the DR severity. Primarily,
based hyperparameter optimization process helps in attaining retinal images acquired with low-quality fundus photography
maximum fundus image classification outcomes. For were pre-processing and next affected by the segmenting
investigating the improved efficacy of the projected RFIRC-ODL procedure. Primarily, the blood vasculatures and optic disc
model, a wide ranging experimental analysis was made on were segmentation employing a U-Net and sparse FCM related
benchmark database. The simulation outcomes demonstrate the
to hybrid entropy method. The lesion region is then detection
betterment of the RFIRC-ODL algorithm over other techniques.
employing Gabor filtering (GF) bank, and next the feature was
Keywords— Diabetic retinopathy; Retinal fundus images; extracting. The last classifier procedure occurs by utilizing a
Image retrieval; Image classification; Deep learning deep SAE together optimizing with bio-simulated TSA
dependent upon the chronological method. Ragab et al. [7]
proposal a new meta-heuristic with DL assisted CAD method
I. INT RODUCT ION for DR (MDL-CADDR) recognition and classifying. The
Diabetic Retinopathy (DR) refers to a retinal complication presented MDL-CADDR approach contains pre-processed
that occurs because of diabetes and can be a leading cause of steps for boosting the fundus image (FI) quality. In addition,
impaired vision among urban people [1]. Initial diagnosis by Chimp Optimizer Algorithm with DenseNet (COA-DN) related
regular treatment and screening will be suggested for Extraction Feature and Spiking Neural Network (SNN)
preventing blindness and visual loss. Digital color fundus dependent upon classifier methods were carried out for
photography will allow procurement of fundus (retina) images classifying various phases of DR. Also, Archimedes Optimizer
noninvasively which makes large scale screening simpler. In Algorithm (AOA) including Kapur's Entropy (AOA -KE)
recent times, there was substantial effort in constructing related to image segmentation approach was executed.
screening solutions for DR utilizing color fundus images (CFI) Qomariah et al. [8] introduce a DL technique for feature
mostly because of the value they provide like wider reach and extraction and classifier employing an SVM. The authors
less cost [2]. Rise in DR awareness followed by initiatives like utilize higher-level feature of final fully connected (FC) layer
large scale public programs results in collection of large dependent upon transfer learning (TL) in CNN as the input
number of CFI even within a day. The vessels in a retinal feature to classifier utilizing the SVM. This process decreases
image have low contrast and were complicated [3]. This the computation time needed by classifier procedure utilizing
necessitates a reliable automatic technique to extract and CNN with fine-tuned. Dayana and Emmanuel [9] examine a
DL-allowed optimizing FS approach for classifying the step of TL technique is to train a process utilizing smaller data. There
DR severity in FIs. Primarily, a pre-processed stage removes is no require to train the objective methods in scratch from TL
noise and improves the contrast from the retinal FIs. Then, the system.
candidate lesion regions were identified utilizing an Attention -
based Fusion Network (AFU-Net). Next, texture and shape
features were removed, also an optimum subset of features are
chosen utilizing the Improved Harris Hawk Optimization
technique.
In [10], Autoregressive-Henry Gas Sailfish Optimization
(Ar-HGSO) related DL approach was presented for DR
detection and severity level classifier of Macular Edema (ME)
and DR dependent upon color FIs. The segmented procedure
was further important to suitable classification and detection
procedures that segment the image as to several subgroups. The
DL technique was employed to effectual detection of DR and
severity classifier of ME and DR. In [11], the authors enhanced
our preceding work for detecting DR utilizing Faster RCNN
and attention layer. During the recognition stage, initially, non-
utilized regions of DR images are extraction utilizing
calculated unified device structure with gradient-related edge
detection approach. Afterward, the Mask R-CNN is utilized
rather than Faster-RCNN for detecting lesion regions more
effective. With the presented technique, more effective
Fig. 1. Overall process of RFIRC-ODL approach
outcomes are achieved than our preceding work in Mo bileNet,
ResNet, and DenseNet. In recent times, DNN is develop substantial progress from
This study designs a Retinal Fundus Image Retrieval and the domains of image classifier. Usually, a deep method has
Classification using Optimal Deep Learning (RFIRC-ODL) been combination of middle, higher, and lower level features,
approach. The presented RFIRC-ODL model encompasses two
and classifier. During this case, the ResNet101 was utilized to
major modules namely retrieval and classification. For image extract deep feature. The VGG19 pre-training network which is
retrieval process, the presented RFIRC-ODL model employs
DCNN [12]. As already noted, CNN technique was collected
Residual Network (ResNet) based feature extraction and of several layers which are interrelated with each other. While
Manhattan distance based similarity measure. Next, in the the layers can be employed to various tasks such as medicinal
second stage, the salp swarm optimization (SSO) algorithm image classifier and NLP. The convolutional filter size from
with long short-term memory (LSTM) algorithm can be ResNet101 is 33, and stride value is 2. Down-sampling was
exploited for fundus image classifier. The use of SSO based
carried out in the convolutional layer based on the stride value.
hyperparameter optimization process helps in attaining These networks contains 347 layers and 379 connections. The
maximum fundus image classification outcomes. For
network input takes dimensional of 224 x 224 x 3. A primary
investigating the improved efficiency of the projected RFIRC- convolution layer, the filtering count is 64, the filtering size is
ODL algorithm, a wide ranging experimental analysis can be
[7, 7], and the count of channels is 3. The filtering size in the
made on benchmark dataset. max-pooling layers has 3 x 3, and the stride value is 2. Next
II. THE PROPOSED M ODEL convolutional layer, the count of filters and channels is 64.
Final convolution layer, the count of filters is 2048, with 512
In this article, a novel RFIRC-ODL methodology was channels. Then, gain a resultant vector of
formulated for the retrieval and classification of retinal images. dimensional N x 2048, but N signifies the count of features
The projected RFIRC-ODL model includes two major modules using feature extraction in pool5 layer.
namely retrieval and classification. Fig. 1 represents the overall
procedure of RFIRC-ODL system.
2) Similarity Measurement
A. Image Retrieval Module At this stage, Manhattan distance metric is used to
For image retrieval process, the presented RFIRC-ODL determine the relevancy of the images for image retrieval
model applied ResNet based feature extraction and Manhattan process. For every Manhattan distance and feature vector, the
distance based similarity measure. adjacent candidate image will be included in a histogram of
place [13]. Where all the query vectors are considered, the
resulting histogram has been used to extract a list of top-
1) ResNet Feature Extraction
Data reliance is an important issue from DL technique. ranked candidate images. The Manhattan distance was the
Related to ML approach, a massive data count was needed to quantity of total differences between 2 vectors. In 2-D space,
train deep approaches. The major cause for this huge count of the Manhattan distance will be expressed by Eq. (1):
trained databases is that it develops vital for learning hidden
| | | |
pattern. However, a huge data count could not frequently
neighboring for trained a DL technique in any research For n-dimensional space, the Manhattan distance for and
domains, particularly in medicinal imagery. The objective of data points are characterized by the above equation:
∑| |
Let, be the current iteration; ‐ predefine iteration count;
arbitrary integer lies within [ ]. The mathematical
B. Image Classification
formula is applied for followers to upgrade the position based
For image classification, the SSO algorithm with LSTM on Newton’s law of motion:
model is exploited for fundus image classification. LSTM is a
kind of RNN able to keep sequence of complete data. RNN
outperforms ANN for sequence of information and suffers If ‐ location of - salp in - variable, ‐ time,
from gradient vanishing problems [14]. This hampers the ‐ initial speed.
capability of the network to recollect data over a longer period
since any two significant events in the time sequence might
occur with larger gaps. LSTM is intended to resolve the Note that ‐ iteration in optimization problem,
problems of vanishing gradient with the relative in‐ sensitivity aforementioned equation is changed into subsequent formula:
to these gap lengths. LSTM network is better suitable for ( )
classifier problems for time sequence data because of the Now, . Illustrates that follower salp describes the
capability of the cells to remember values over arbitrary time location based on the prior salp and own location. If some salps
intervals. escape from the constrained searching space, they are carried
LSTM has a gated structure and utilizes ANN unit. They back within the constraint:
could store data across time steps without fundamental change,
thereby forming long‐ term memory. The short‐ term working
memory is frequently upgraded. LSTM unit consists of cell and
the data flow and out of cell is controlled by sigmoid activated {
neural network named gates and they are given in the follo wing The aforementioned formula is repetitively implemented till
equation: the termination condition is satisfied. Sometimes, food source
1. Save gate: It controls the data from the existing input is upgraded by exploiting and exploring search space around
viz., added to the cell state. current solution may define the optimum solution. Salp chains
[ ] during optimization can able to move towards global optimal
2. Forget gate: It regulates what data the cell forgets. solution.
( [ ] )
3. Output gate: It regulates what data is provided as output. Algorithm 1: Pseudo code of SSO
[ ]
Input: maximal iterations , population size
The memory state is upgraded by the following equation: Initialization of salp location
̃ [ ]
While (end condition is not satisfied)
Describe fitness of each salp
Arrange salp location depending on fitness value
Where, + and are component‐ wise addition and
Describe as optimum place for existing population
multiplication correspondingly, and represents the activation
function. Upgrade Cl
To adjust the hyperparameter values of the LSTM method, For all the salp location (ui)
the SSO approach was employed here. The motion behavior of If upgrades the location of leader salp
SSO is mathematically modelled to overcome the problems of else upgrade the position of follower salp
optimization [15]. Salps are marine animal that has barrel- end
shaped jelly like body and moves around by driving water via end
its bodies. They exist as colonies and travel together like Change the salp that crosses higher and lower bounds
chains. Leaders and followers are the two primary classes of end
salps. Leader leads the chain in forward direction, whereas Display optimal output
followers follow the leader synchronously and in harmony.
Like swarm intelligent technique, SSO initiates by an arbitrary The SSO model identifies a fitness function (FF) for
initialization of swarm of N salps. parameter is evaluated, x realizing maximal classification performances. Here, the
signifies the location of salp, and y will describe food source reduction of classifier error rate is mainly utilized to compute
which specifies objective of swarm in the problem, and it is the FF, as given below.
expressed in the following equation:
{
Now, in - variable, ‐ location of primary salp; ‐
location of food. and ‐ upper and lower limits, and
‐ arbitrary values.
Amongst three arbitrary values, inhabits leader location
since it balances exploitation and exploration in the problem.
T ABLE I Table 2 and Fig. 7. On class -1, the RFIRC-ODL approach has
RESULT ANALYSIS OF RFIRC-ODL APPROACH WIT H VARIOUS recognized of 99.30%, of 99.92%, of
CLASS LABELS UNDER 80% OF T R DAT ASET 99.14%, of 99.53%, and of 99.46%.
Training Phase (80% ) Concurrently, on class -3, the RFIRC-ODL method has
Labels recognized of 99.57%, of 98.36%, of
C-1 99.16 99.89 98.96 99.42 99.33 98.74%, of 98.55%, and of 99.23%. In
C-2 99.65 96.98 98.12 97.55 98.94 Parallel, on class-5, the RFIRC-ODL approach has recognized
of 99.80%, of 92.21%, of 98.61%,
C-3 99.49 97.88 98.80 98.34 99.21
C-4 99.69 90.84 97.44 94.02 98.59 of 95.30%, and of 99.22%.
C-5 99.61 85.38 97.34 90.97 98.50
Average 99.52 94.20 98.13 96.06 98.92
Abstract— The Covid-19 disease is caused by the severe between them. After economic activity resumes, social
acute respiratory (SAR) syndrome coronavirus-2 and becomes distance and self-isolation will be the most effective means of
the reason for the Global Pandemic since 2019. Until July 2022, breaking the chain of infection and reducing the impacts of
the total reported cases were 572 million and reported deaths this corona-virus pandemic.
were 6.38 million around the world. In many countries the
infections caused severe damages. It not only took the precious In initial stages of the pandemic people did not took the
lives but also caused few other national damages like economic guideline of the world health organization very seriously.
crisis. The only solution to stop this pandemic is to increase the They did not maintain social distancing properly. This causes
vaccination and reducing the spreads. The covid 19 virus is an the pandemic to spread all around the globe. So, all the nations
airborne disease and spread when people breathe virus declared lockdowns to maintain the social distance between
contaminated air. The WHO and all the nations were insisting people. Citizens all across the world are substantially
to maintain social distance to control the virus spreading. But separating themselves from the Covid-19 outbreak in order to
maintaining the social distance in public places is very hard. In flatten the curve. Every public place like parks, gatherings,
this project we developed a method for detecting social distance. workshops, and prayer were all prohibited during the
The system uses Raspberry Pi processor to detect the distance quarantine period to achieve social separation. People are
between two people from the live video stream. The YOLOv3 urged to organize and conduct activities as much as possible
technique is used to detect the object from single frame of the
by phone and email, in order to reduce the amount of face-to-
video.
face interaction. Individuals are also being advised to practise
Keywords—Raspberry Pi, Deep Learning, Image Processing, good hygiene, such as washing hand frequently, wearing a
distance measurement, computer vision. mask, eating healthy food and avoiding close contact with
affected people, in order to help stop the virus from spreading
I. INTRODUCTION further.
COVID-19 is a life threating respiratory disease caused by The globe is still recovering from the pandemic, and a
a new corona virus which is first encountered at Wuhan, China medicine that adequately cure Covid-19 has yet to be
in December 2019. The major symptom of the disease developed. The lockdowns were slowly removed, and people
includes loss of taste & smell, body aches, high fever, cough, started to get back to their normal lives. Although the
and shortness of breath. For some people the infection gives lockdowns had been removed, people were still expected to
normal flu conditions, and they can recover with two to three maintain all the safety guidelines to prevent further spread.
weeks but for some people the infection can be severe and But maintaining social distancing between people in every
caused death [1]. This pandemic has spread to over 188 place is a huge problem for the government as well as the
countries around the world. World Health Organization health workers. It is not possible to put people in every corner
acknowledged that there have been 571,182,327 confirmed of the country to monitor social distancing.
COVID-19 cases and 6,386,234 deaths around the world until
22nd July, 2022 [2]. The ambiguity and complications of the Hence, we propose a method to monitor the social distance
corona virus have made it difficult to foresee the spread of between two people in public places. The proposed approach
this pandemic. Since there is no medicine has been invented, might be used as a real-time detecting tool to reduce the social
prevention is the only way to control the spread of this deadly distance violations. The CCTV camaras can be utilized for this
disease. Self-hygiene should be maintained other than wearing purpose or an exclusive camera can be fixed. The live video
masks and washing hands frequently to reduce the spread. The stream of strolling people was fed to the system and from the
infected person should be isolated from other to avoid video frame the people will be identified and highlighted by
spreading. The self-quarantine helps to stop the chain of bounding boxes. The YOLO V3 is used to detect the video
spread. To avoid spreading of this virus many nations stream and people identification can be done by the deep
restricted and even completely stopped the international travel convolutional neural network. The YOLOv3 approach divides
and business. The public places like offices, educational the input image into tiny grid cells (S*S small grid cells). Each
institutes, theaters, malls, swimming pools, parks, and even grid cell forecasts the location information of bounding boxes
religious places were closed to minimize the gathering of and calculates the object ratings for these boxes. From these
people. From the analysis it is shown that the lockdowns data the actual distance between two people can be calculated.
reduce the spread rate and number of infected cases. If the distance between two people is less than the expected
value, then the system will store the data in the database. If
From these analysis World Health Organization decided more violations occur in a specific place, the information will
that social distancing reduces the spread and insisted the be shared to the concern authority through alert message.
countries to implement the social distancing strictly. This will Firebase is used to store the information, and the database will
reduce the physical contact with possible COVID19 carriers. be available on a website built using React.JS. These
To limit the risk of infection, people should avoid physical databases can be sent to a corresponding authority to take
contact with one another and to maintain six meter distance necessary actions.
II. RELATED WORKS techniques. The object identification methods and object
Professor Emre Dandil and Kerim Kürşat Cevik proposed classification techniques are used to identify pedestrians from
Computer Vision Based Distance Measurement System using the image which is explained in next section. The YOLO V3
Stereo Camera View [3] to distance between two objects will is used to detect object from every frame. To locate the item
be measured. In this system the disparity maps are extracted to assign the border-box, its identifier must be provided.
from the stereo camera images and object was detected from Then, correct the border-many box's boundaries [7][8].
the image. Distance between two objects were obtained by
calculating the shifts between the video frames. This system
measures the distance of one object in the frame. It is not
possible to measure distance between two persons by using
this system.
Professor Abdalla Gad, Gasm ElBary, Mohammad
Alkhedher and Mohammed Ghazal proposed Vision-based
Approach for Automated Social Distance Violators Detection
[4]. They used Gaussian Mixture Model to remove the
background, Kalman filter to track the object and Euclidian to
calculate the distance between objects. The proposed idea
required many computations. In the real time people will be
moving randomly. They will cross each other very fast.
Professor F.A.Ahmad Naqiyuddin, W.Mansor,
N.M.Sallehuddin, M.N.S.Mohd Johari, M.A.S.Shazlan,
A.N.Bakar proposed Wearable Social Distancing Detection
System [3]. This system could be fast and suitable for real time
applications. But it required hardware parts. It is necessary
that every individual should wear the wearable system inorder
to measure the distance. Practically it is not possible for public
places. This system can be applicable to locations such as
prison, hospital, or a conference where the entry is restricted.
Nguyen et al. presented a comprehensive analysis on recent
development and challenges of face detection [5].
The proposed method is suitable for real time applications.
It doesn’t need any wearable hardware, thus the cost if very
low. It uses simple computational and deep learning methods;
thus, the computation speed is high. Fig.1 Flow Diagram for Social Distance Detection
one ground truth bounding box and one centre cell to be every pedestrian will be viewed from top angle. This
accountable for this item if we train it. After training and a conversion helps in converting the boundary boxes into
fast forward pass, the network output coordinates tx, ty, tw points. Representing pedestrians in points makes the distance
and th. The coordinates of the cell on the grid of the suitable calculation process very easy. An object's spatial and
anchor are then cx and cy as given in figure 2 [10]. Finally, temporal changes over a video sequence will be followed by
the anchor's boxes, as well as their width and height, are object tracking methods. The size, form, position, and
denoted by pw and ph. The centre coordinates tx, ty are sent existence of the object will be tracked. This is achieved by
through the sigmoid function, which returns a value between addressing the temporal issue. The target region is matched
0 and 1. In which bounded box have more accuracy they only with sub-sequent frames from the video feed. Tracking is
consider to fixed boundary boxes. achieved by continuously enabling the object identification
The path for the YOLO weights, CLG file, and COCO and verify tracking using OpenCV.
names file is configured using the setup function. For ordinary By watching the detection person class and it will
path-name manipulation, the OS.path module is utilized. One generate a new id to each individual discovered person and
of the submodule [OS.path.join()] of os.path allows to draw a box over them, setting the centroid each person will
intelligently connect one or more path components. identify. One centroid is purple, whereas the other is yellow.
cv2.dnn.read The weights are loaded into the network using If a person is identified in all directions, we're certain that
the NetFromDarknet() function. After loading the weights, we'll apply the Euclidean distance calculation from each
utilize a net to retrieve a list of all the layers of a network. To centroid to a new centroid from the close person detector over
estimate the social distance between everyone in the crowd, here, and then ids will be allocated independently. If we
we utilize the image processing function to analyse a single cannot identify a result, the centroid will be removed from the
frame of video. The video frame's width and height. To load frame, and 50 pixels will be unregistered. The perspective
frames in bulk and deliver them over the network, the transformation in Open CV can be done by camera alignment.
cv2.dnn.blobFromImage() method was employed. On a It assigns 4 points in the frame and allocate it as the corner of
single frame, the blob function conducts mean subtraction, an image view [11]. As a result, it is assumed that everyone
scaling, and channel shifting. is standing on a flat, level surface.
From the probability of border box will be notified in
F. Distance Measurement
each frame to analyse and identified the border box having
more accuracy from the frame will be fixed in object Once the pedestrians were located and converted into a
detection in our project. If the previous tool has less accuracy point of the frame the proposed model uses the Euclidean
and processing time and in yolov3 have import different class formula in a frame to measure the distance between two
model in a tool. The width, height, and centre bounding box people [12]. If pedestrian-1 location is (x1, y1) and
coordinates of the expected bounding box were calculated pedestrian-2 location is (x2, y2) then the distance between
using this equation. Each frame contains one ground truth these two pedestrians can be calculated by the Euclidean
bounding box and one centre cell to be accountable for this formula as given below,
item if we train it. Distance = ( x2 − x1 )2 + ( y2 − y1 )2
The acceptable distance between two pedestrians is assigned
as threshold distance ‘t’. If the calculated distance between
two pedestrians were exceeding the threshold level, then the
distance vector is displayed as red and if the calculated
distance between the pedestrian is less than threshold level
the distance vector is displayed as green. We can utilize the
distance measurement formula which is shown in figure 3.
P D
F=
W
W F
D' =
P
Where, F → Focal length
W → Object wide
D → Distance
E. Object Tracking
The target image, that is the pedestrians walking on the
street was first converted into the top angle view by camera
view calibration. This can be done by the OpenCV by
selecting four perspective viewpoints and marking them as
the corners of a two-dimensional image view. By this process Fig. 3 Distance Measurement
Distancing Detection System”, IEEE International RF and Microwave [13] A. Krizhevsky, I. Sutskever, G.E. Hinton, “Imagenet classification
Conference (RFM), 2020. with deep convolutional neural networks”, In Advances in neural
[6] D.T. Nguyen, W. Li, P.O. Ogunbona, “Human detection from images information processing systems.
and videos: A survey”, Pattern Recognition. [14] R. Girshick, J. Donahue, T. Darrell, J. Malik. "Rich feature hierarchies
[7] P. Dharani Devi, R. Thanuja, “Convolutional Neural Network based for accurate object detection and semantic segmentation." In Present of
Deep Feature Extraction in Remote Sensing Images”, International the IEEE conference on computer vision and pattern recognition.
Conference on Smart Electronics and Communication (ICOSEC), [15] Felix Järemo Lawin, Per-Erik Forssén, “Registration Loss Learning for
2020. Deep Probabilistic Point Set Registration”, International Conference
[8] P. Dharani Devi, V. Sathiyapriya, “Brahmi Script Recognition System on 3D Vision (3DV), 2020.
using Deep Learning Techniques”, Third International Conference on [16] Punn, N., et al.: “Monitoring COVID-19 social distancing with person
Inventive Research in Computing Applications (ICIRCA), 2021. detection and tracking via fine-tuned YOLO v3 and Deepsort
[9] Haiyan Yu, Yu Li, Dexian Zhang, “An Improved YOLO v3 Small- techniques”.
Scale Ship Target Detection Algorithm”, 6th International Conference [17] Redmon.J, “You only look once: Unifed, real-time object detection”.
on Smart Grid and Electrical Automation (ICSGEA), 2021. [18] Pouw, Schadewijk.F, Toschi, F., Corbetta, “Monitoring physical
[10] Yew Cheong Hou, Mohd Zafri Baharuddin, Salman Yussof, Sumayyah distancing for crowd management: real-time trajectory and group
Dzulkifly, “Social Distancing Detection with Deep Learning Model”, analysis”.
8th International Conference on Information Technology and [19] Rahman, Rukia. "Automatic Temperature Detection and Sanitization
Multimedia (ICIMU), 2020. with Authorized Entry using Face Mask Detection." Journal of
[11] A S Mohammed Shariff, Raghav Bhatia, Raghwendra Kuma, Sarthak Electronics 4, no. 3 (2022): 168-181.
Jha, “Vehicle Number Plate Detection Using Python and Open CV”, [20] Agnes, A., and T. Anto Theepak. "Animal Movement Detection along
International Conference on Advance Computing and Innovative with Differentiation and Alert Processing in Farm Lands." Journal of
Technologies in Engineering (ICACITE), 2021. Innovative Image Processing 4, no. 2 (2022): 79-92.
[12] Dharani Devi P., D. Iyanar, “CNN based Nutrient Extraction from
Food Images”, Fourth International Conference on I-SMAC (IoT in
Social, Mobile, Analytics and Cloud) (I-SMAC), 2020.
Abstract—Breast Cancer (BC) progression is currently a sensitivity is diminished in denser breast tissues. Nowadays,
common health problem among modern women. It is the cause having denser breasts are considered a separate risk factor
of death for a significant number of women. BC is the growth of for getting BC [3]. There was an elevated likelihood of BC in
malignant cells in the breast tissue. Adipose or connective tissue
women with extremely thick breast tissue, anything between
can also develop BC. Because of developments in medical
technology, ultrasonography is one of many procedures utilised 1.2 to 2.1 times higher [4]. There are numerous imaging
for the early identification of cancer. Ultrasound is a technique methods available now for the early identification and
that uses high-frequency sound wave technology to create handling of BC. Ultrasonography of the breast is widely used
images of inside body structures such as organs and soft tissues. in clinical practice to make a diagnosis. Because it is non-
Because of the poor quality of the information, there is a lot of invasive, generally women can be well-tolerated and do not
possibility for interpretational mistakes when diagnosing cancer expose the patient to radiation, ultrasound is commonly used
based on ultrasound images. As a result of these concerns, this in the diagnosis of BC [5]. Ultrasound is the most efficient
paper uses the idea of Machine Learning (ML) is employed for diagnostic method, particularly for discovering BC in thick
the classification and segmentation of BC. The K-means
breast tissue, which mammography frequently misses. By
clustering approach is used as part of the segmentation
procedure to detect where the cancer is present. A recent study
comparing other medical imaging techniques, ultrasound
has demonstrated that machine learning produces reliable imaging has advantages in portability and cost [6]. To aid
findings, allowing specialists to make better decisions. Using radiologists in the analysis of breast ultrasounds, CAD
standard BC datasets, the performance of three different systems have been created. Because early CAD systems
Machine Learning algorithms—Logistic Regression (LR), depended so much on human-supplied visual information, it
Random Forest (RF), and K-Nearest Neighbors (KNN)—is was challenging to share data between ultrasound images
tested in this work. In terms of accuracy, RF outperformed the acquired by multiple techniques [7]. Recent improvements in
other algorithms, according to the finding. Future BC artificial intelligence (AI) technology have proved critical in
researchers will be able to utilise the findings of this study to
automating the process of diagnosing BC using ultrasound
guide their investigations and influence their efforts to improve
the efficiency of specific algorithms. images. In a computerised procedure, pre-processing
ultrasound images, segmenting the tumour, obtaining
Keywords— Breast cancer, Data, Segmentation, properties from the segmented tumour, and finally
Classification, Machine Learning, Metrics. categorising the tumour are all critical procedures.
( )
The table is converted into a bar graph and it is of negative metrics will be vice versa, the values are
shown in figure 4. The comparison graph shows that the RF maximum for KNN and minimum for RF. In both metrics ,
model will provide a higher rate of positive metrics and the LR provides the score moderately. In the below figure
KNN provides a lower score of positive metrics. The score the RF, LR and KNN are differentiated using various colour
bar like blue, green and yellow. The RF model was found to
be the best one for identifying BC from ultrasonic images.
VII. CONCLUSION
REFERENCES
Expert doctors may now successfully diagnose [1]. Spaeth, E.; Starlard-Davenport, A.; Allman, R, “ Bridging the Data
malignant tumours by analysing patient records and imaging. Gap in Breast Cancer Risk Assessment to Enable Widespread
However, various specialists may arrive at different Clinical Implementation across the Multiethnic Landscape of the
conclusions regarding the type of cancer. The high death rate US”, J. Cancer T reat. Diagn, vol. 2, pp. 1–6, 2018, doi:
10.29245/2578-2967/2018/4.1137
associated with BC has made it a hot topic as of late. Thanks [2]. Ganggayah, M.D., Taib, N.A., Har, Y.C. et al. “Predicting factors for
to advances in computer-assisted technologies, doctors may survival of breast cancer patients using machine learning
now detect cancer at an earlier stage and begin treatment as techniques”, BMC Med Inform Decis Mak, vol. 19, no. 48, 2019, doi:
soon as possible. Given the progress made in the ML field, 10.1186/s12911-019-0801-4
[3]. Houssami, N.; Abraham, L.A.; Kerlikowske, K.; Buist, D.S.; Irwig,
we employ the K-means method to isolate the tumorous L.; Lee, J.; Miglioretti, D.L. Risk Factors for Second ScreenDetected
areas in ultrasound imaging, and we apply LR, RF, and KNN or Interval Breast Cancers in Women with a Personal History of
to classify the ultrasound images into several cancer types. Breast Cancer Participating in Mammography Screening. Cancer
The metrics are used to assess all three models. Accuracy Epidemiol. Biomark. Prev, vol. 22, pp. 946–961, 2013, doi:
10.1158/1055-9965.EPI-12-1208-T
(97.14%), TPR (96.15%), TNR (97.83%), precision [4]. Sickles, E.A. “ T he Use of Breast Imaging to Screen Women at High
(96.89%), and F1-score (96.52%) were the metrics with the Risk for Cancer”, Radiol. Clin. N. Am., vol. 48, no. 5, pp. 859–878,
greatest scores for the RF, while FPR (2.16%) and FNR 2010, doi: 10.1016/j.rcl.2010.06.012
(3.84%) were the lowest. Findings have shown that the RF [5]. Sun, Q.; Lin, X.; Zhao, Y.; Li, L.; Yan, K.; Liang, D.; Sun, D.; Li, Z.-
C. “ Deep learning vs. radiomics for predicting axillary lymph node
model can provide accurate findings that aid experts in metastasis of breast cancer using ultrasound images: Don’t forget the
making more reliable predictions than humans can. peritumoral region”, Front. Oncol, vol. 10, pp. 53, 2020, doi:
10.3389/fonc.2020.00053
Abstract—Oral squamous cell carcinoma is the 8th most fast- TABLE I. TUMOR STAGES AND SIZES
spreading cancer, globally. Detection and treatment of Oral
cancer are the most important aspects that are needed nowadays Stages Tumor size
in this fast-moving world. Nanotechnology and machine Stage 0 Abnormal / no damage cell present
learning are two predominant and upcoming technologies for
detecting and classifying cancer. Machine learning algorithms Stage 1 Tumor size less than 2cm
are widely used in the early-stage detection and classification of Stage 2 Tumor size larger than 2cm lesser than 4cm
cancer. These detections can be even performed using smart
devices like cell phone cameras. Nanotechnology sets a new Stage 3 Tumor size larger than 4cm
trend and makes a new revolution in the world of information Stage 4a Between 3-6 cm in the lymph nodes
with the help of nanoparticles like gold nanoparticles, nano-
virus, nanohydroxyapatite, and so on. Nanoparticles are, being Stage 4b Tumor cell in the lymph node is larger than 6 cm
smaller in size, effectively used to stop the further spread of
Stage 4c The tumor is increased in different organs
cancer to other body parts. Accurate detection of Oral
squamous cell carcinoma is a very important phase of OSCC
treatment. Feature extraction of OSCC classification which is
attained using various machine learning algorithms such as II. LITERATURE SURVEY
SVM, Naïve Bayes, and CNN. Deep learning has attained Lavanya L and Chandra J [1] have performed an analysis
outstanding performance in early-stage cancer detection with a on oral cancer using machine learning techniques. Various
large dataset and the results are obtained with high accuracy in methodologies such as Decision trees, Random Forest,
OSCC early-stage detection. It seeks to diagnose oral cancer Support Vector Machines, KNN, Logistic regression, and
with more precision and in less time. Future oral cancer deaths Multi-Layer perceptron use artificial neural networks for
might be reduced by performing early detection. Of these early-stage oral cancer detection. The prediction model of oral
algorithms, CNN has been improved in every research and
cancer was performed using the dataset collected from the
attained an accuracy of ran up to 96.6%.
National Library of Medicine in the U.S.
Keywords— Oral Squamous Cell Carcinoma, Machine Sunil et al [2] described oral cancer staging as pathological
learning, Nanotechnology, Detection, Classification, Deep and clinical. Many tools have been created and used to stage
learning. Tumour-Node-Metasis (TNM). This classification is further
compared with Linear Layer Neural Networks. The accuracy
I. INTRODUCTION
for the T1 stage was 100%, T2 was 84.21%, and T3 was
Oral cancer is a multifaceted disease that may be caused 94.12%.
due to tobacco, drugs, alcohol, and some viruses. Oral cancer
may occur in the tongue, top & bottom of the mouth, buccal R. Prabhakaran et al [3] have performed the detection of
mucosa, gum, area behind the wisdom teeth, neck, and the Oral cancer using machine learning classification methods.
oesophagus. One of India’s main causes of mouth cancer is Various methodologies and algorithms were used to get good
the intake of beetle nuts. Human Papillomavirus and Herpes precision. The tumor images are segmented and features are
group viruses generally cause oral cancer, in both men and extracted to get better precision. Segmentation and
women. Amongst oral cancer, squamous cell carcinoma is classification are performed using SVM, Naïve Bayes, and
predominantly found in humans. Other less common oral CNN algorithms. A comparative study is done using these
cancer types are Verrucous carcinoma, Minor salivary gland algorithms.
carcinoma, and Lymphoma. Cancer can be found using a Marc et al [4] perform an automatic technique for an
variety of methods, including X-rays, computed tomography accurate precision OSCC diagnosis with the aid of deep
(CT), magnetic resonance imaging (MRI), and manual learning technologies. It is compared against textural feature-
diagnosis by a doctor. based machine learning techniques. Also, it performs a series
Depending on the size of the cancer, it is divided into of diagnoses using CLE image series from patients. Patch
various phases. The stages are tabulated in Table I. Along with extraction of images and data augmentation for training is
machine learning and deep learning technologies, done. Various classification methodologies were performed.
nanotechnology plays an important role in the field of Kevin et al [5] concentrated on the Convolutional Neural
dentistry. Being nanosized, the particles or the drugs are network (CNN) to automatically classify different cancer
capable to move to any part of the body, surrounding the lesions. It involves the combination approach of GAIN
tumor, and can stop the further spread of cancer to the other architecture along with CNN. The GAIN architecture has 3
body parts. streams of network for training such as classification stream,
attention mining stream, and bounding box stream. Through
this, the correct lesion area in the image is found using the IV. NANOTECHNOLOGY
decision-making methods. Nanotechnology includes various disciplines such as
Monika et al [6] have done a vast study on the application physics, engineering, biomedicine, chemistry, computer
of nanotechnology in the field of oral cancer. The study throws science, material science, and biology. It is one of the
an idea about how nanomaterials are used in oral cancer emerging technologies as the need for cancer diagnosis and
diagnosis. Liposomes, hydrogels, and liquid crystals are used treatment is high in demand. Many nanoparticles are
in the release of drugs in the human body to treat cancer. implemented in the diagnosis and treatment of oral cancer.
Nanoparticles are single-dimensional and less than 100nm in
Section III of this paper includes an introduction to oral range.
cancer, and Section IV provides an outline of nanotechnology.
Section V and section VI describe the methods and strategies The nanoparticles are hierarchical in structure. They are
employed thus far in the research on the early diagnosis of the same as natural biological materials. Nanoparticles are
cancer. used in the uniform radiation therapy of cancer with
radiosensitizers. Applications of nanotechnology are shown in
III. ORAL CANCER Figure 2. Nano-based cancer diagnosis and treatment have
Oral cancer is also known as mouth cancer. Oral cancer is radically changed the field of medicine and nanotechnology.
the abnormal cells or tumor that grows around the mouth, With the help of nanotechnology, scientists can detect even a
neck, and cheeks. Squamous cell carcinoma is the most minute change in molecule and surface area that occurs in the
common oral cancer which causes in 9 out of 10 people. The cells. Tumor growth is uninvolved using nanomedicine
most common type of oral cancer is listed in Table II. Mouth effectiveness.
pain, loose teeth, difficulty swallowing, and uncertain or
abnormal growth of tissues throughout the inner part of the
mouth are all markers of oral cancer. Numerous different signs
include sore lips or mouth that might not heal for a prolonged
period [7].
TABLE II. CANCER TYPES AND AREAS OF OCCURRENCE
Virus-based nanocarriers for drug delivery are used in area's shape and size. This feature extraction could be obtained
packing the drugs and delivering them to the target. It has through Principal Components Analysis, Independent
several properties such as being biocompatible, water-soluble, Components Analysis, and Linear Components Analysis.
and reduced toxicity. Furthermore, functionalization is Classification is done as binary classification, multiclass
simple. The tobacco mosaic virus (TMV), turnip yellow classification, and multimodal classification. Many
mosaic virus (TYMV), and Insect Noda virus flock house classification algorithms include K-Nearest Neighbor,
virus (FHV) are used effectively [10]. Figure 4 explains how Random Forest, Naïve Bayes, and Support Vector Machine.
virus-based nanocarriers are used in treating oral cancer. Finally, the image is said to whether Benign or malignant.
[7] https://www.mayoclinic.org/diseases-conditions/mouth [14] Alkuhlani, A., Nassef, M. & Farag, I. Multistage feature selection
cancer/symptoms-causes/syc-20350997 approach for high-dimensional cancer data. Soft Comput 21, 6895–
[8] Zhang M, Liang J, Yang Y, Liang H, Jia H, Li D. Current Trends of 6906 (2017). https://doi.org/10.1007/s00500-016-2439-9
Targeted Drug Delivery for Oral Cancer Therapy. Front Bioeng [15] Tolentino Ede S, Centurion BS, Ferreira LH, Souza AP, Damante JH,
Biotechnol. 2020 Dec 8;8:618931. DOI: 10.3389/fbioe.2020.618931. Rubira-Bullen IR. Oral adverse effects of head and neck radiotherapy:
PMID: 33425881; PMCID: PMC7793972. literature review and suggestion of a clinical oral care guideline for
[9] Sztandera K, Gorzkiewicz M, Klajnert-Maculewicz B. Gold irradiated patients. J Appl Oral Sci. 2011 Oct;19(5):448-54. DOI:
Nanoparticles in Cancer Treatment. Mol Pharm. 2019 Jan 7;16(1):1- 10.1590/s1678-77572011000500003. PMID: 21986648; PMCID:
23. doi: 10.1021/acs.molpharmaceut.8b00810. Epub 2018 Nov 30. PMC3984189.
PMID: 30452861. [16] Li, H., Weng, J., Shi, Y. et al. An improved deep learning approach for
[10] Ma Y, Nolte RJ, Cornelissen JJ. Virus-based nanocarriers for drug detection of thyroid papillary cancer in ultrasound images. Sci Rep 8,
delivery. Adv Drug Deliv Rev. 2012 Jun 15;64(9):811-25. DOI: 6600 (2018). https://doi.org/10.1038/s41598-018-25005-7
10.1016/j.addr.2012.01.005. Epub 2012 Jan 20. PMID: 22285585. [17] Poedjiastoeti W, Suebnukarn S (2018) Application of convolutional
[11] Al-Ma’aitah, M., AlZubi, A.A. Enhanced Computational Model for neural network in the diagnosis of jaw tumors. HealthCare Informat
Gravitational Search Optimized Echo State Neural Networks Based Res 24(3):236–241
Oral Cancer Detection. J Med Syst 42, 205 (2018). [18] Bhandari, B., Alsadoon, A., Prasad, P.W.C., et al. Deep learning neural
https://doi.org/10.1007/s10916-018-1052-0 network for texture feature extraction in oral cancer: enhanced loss
[12] B R, Nanditha & Annegowda, Geetha. (2022). Oral Cancer Detection function. Multimed Tools Appl 79, 27867–27890 (2020).
using Machine Learning and Deep Learning Techniques. International https://doi.org/10.1007/s11042-020-09384-6.
Journal of Current Research and Review. 14. 64-70. [19] Dharani, R., & Revathy, S. (2021, May). DEEPORCD: Detection of
10.31782/IJCRR.2021.14104. Oral Cancer using Deep Learning. In Journal of Physics: Conference
[13] R. K. Singh, S. K. Naik, L. Gupta, S. Balakrishnan, C. Santhosh, and Series (Vol. 1911, No. 1, p. 012006). IOP Publishing.
K. M. Pai, "Hybrid SVM - Random Forest classification system for oral
cancer screening using LIF spectra," 2008 19th International
Conference on Pattern Recognition, 2008, pp. 1-4, DOI:
10.1109/ICPR.2008.4761357.
Abstract— This research paper presents "MiMi", a Sinhala social and intellectual pursuits. Stuttering affects one in every
Language voice assistive gamified solution that is designed to hundred people, resulting in more than seventy million cases
address stuttering in children aged between three and fourteen. experiencing stuttering globally [2]. Around 2% of children
Speech disorders occur when the regular flow of communication experience speech disfluencies in Sri Lanka [3].
is disrupted. Stuttering, Lisps, Dysarthria, and Apraxia are some
variations of speech impairments. Stuttering can be caused by a
B. Causes of Stuttering
variety of factors including physical weaknesses, inherited
diseases, Autism, and accidents. The risk of continuing to stutter
into adulthood is highest in children between the ages of three to The findings of numerous research on stuttering indicate
fourteen. It is recognized that stuttering therapy activities were less that stuttering may be caused by a variety of factors,
effective in managing stuttering after this age. Stuttering including abnormalities in speech and motor control,
treatments comprise speech therapy with speech-language hereditary conditions, intellectual disabilities such as autism,
therapists, which requires in-person sessions that can be hearing loss, attention deficit hyperactivity disorder
challenging and expensive in some circumstances. A parent's (ADHD), brain injuries, mental and emotional health issues,
financial ability, their busy schedules, the state of the economy in and post-traumatic experiences such as accidents and falls
the nation, and the feasibility of physically seeing therapists and [4].
enduring treatments are all factors that might encourage or
demotivate participation in therapy sessions. The development in Stuttering may increase when a person is anxious, tired,
technology and technical approaches have revolutionized the
medical field and several studies have been conducted regarding
agitated, self-conscious, pressed for time, or under pressure.
communication disorders in recent years. The application can be Speaking in front of a crowd or talking on the phone can be
used to practice a child’s needed speech therapy virtually and can particularly difficult for people who stutter. Stuttering is more
also be used to aid speech therapy sessions done by speech prevalent in males than in women. Hence, gender might be
therapists. The main aim of the system is to provide a customized, considered one of the main predisposing factors for
engaging, and innovative therapeutic strategy for children to stuttering. Adults and children have a high male-to-female
manage stuttering. ratio of four to one or even more when it comes to
experiencing stuttering [5]. As a result, stuttering symptoms
Keywords—Gamified virtual assistance, Speech therapy,
might vary from person to person.
Childhood stuttering, Sinhala language, Voice assistive
C. Types of Stuttering
I. INTRODUCTION
The three main forms of stuttering are repetitions, blocks,
Stuttering is a developmental speech disfluency that is
and prolongations. Repeated words, sounds, or syllables and
one of the most prevalent forms of speech disfluency.
interruptions in the regular flow of speech are some
Incorporating technology to manage communication
characteristics of different forms of stuttering. A child may
impairments in individuals has transformed the approach to
experience more than one form of stuttering.
treatment delivery in the healthcare industry in recent years.
TABLE 1: TYPES OF STUTTERING
A. Overview of Stuttering
D. Stages of Stuttering flow of speech, and it has been shown to be more effective
than no treatment over the same 6-month period" [11].
The four major stuttering phases were characterized as
borderline stuttering, beginner stuttering, intermediate In 2001, "SpeechEasy" [12], a stuttering-reduction
stuttering, and advanced. Different approaches are used to electronic gadget that may be worn in the ear like a hearing
characterize each type's stuttering stage, but the most aid, was introduced. Joseph Kalinowski, Andrew Stuart, and
prevalent approach is by getting the frequency of the stuttered Michael Rastatter's research at the Communication Sciences
word count. Normal speech disfluency in children is and Disorders Department at East Carolina University served
characterized by a rate of stuttering that is less than 10%. as the basis for "SpeechEasy" [13]. Several users of this
Delayed Auditory Feedback (DAF) device reported
i. Borderline stuttering - Many children go through this improved speech, but it was recommended that it must be
phase which usually lasts around 6 months and used under the guidance of a licensed speech-language
gradually recedes. therapist. DAF has been proven to improve fluency in many
ii. Beginning Stuttering (2-8 years) - Frequency of stutterers, despite not benefiting all of them [14]. Later,
disfluency increases to more than 10%. Tense, abrupt similar devices to "SpeechEasy," such as "Speak for Less"
multiple part-word repetitions. [15], an in-ear fluency aid, and "VoiceAmp" [16], a device
made for stutterers and others who lack social confidence,
iii. Intermediate Stuttering (6-13 years) - Blocks, were made accessible. To minimize stuttering, devices with a
Repetitions, and prolongations continue. single component like a hearing aid, or several components
like a box worn in the pocket with headphones were both
iv. Advanced Stuttering (14+ years) - Severe condition of developed.
stuttering. Requires a general adult-oriented treatment
approach. [6] Along with the development of a technology-based
approach to treat stuttering, a variety of mobile applications
II. LITERATURE REVIEW were founded, which include "DAF Pro", "Fluency Coach",
"Speech for Good" and "Stamurai" which make use of DAF
Speech and Language Therapy is a field that focuses on
or Altered Auditory Feedback (AAF) technologies and are
the rehabilitation of people who have a variety of language
intended to be used by speech therapists or children who
and communication problems. Most countries lack the
experience stuttering. The mobile applications developed for
necessary infrastructure to offer these individuals healthcare
the treatment of stuttering have been proven to be helpful and
and rehabilitation treatments [7].
aid in speech treatment. Speech therapists observe that many
The percentage of those who stutter is observed to be children prefer using applications, which support learning
reduced with the intervention [8]. Speech therapists use a [17].
variety of techniques to help people with the condition
By recording the Electroencephalogram (EEG) feed of
manage their stutter, such as creating a relaxed environment,
the speech motor (Broca's region) using brain neuron
giving them multiple chances to speak, speaking at different
electrodes and processing it to identify speech impairments,
speeds so they do not feel rushed, and listening instead of
a study named "SpeechGen" was carried out in 2020 by
concentrating on the message they are conveying [9]. The
J.A.D.T Jayawickrama to develop a desktop application for
main treatment approaches used by speech therapists to
speech disfluencies. EEG neurofeedback was used to
manage stuttering are known as "fluency shaping therapy"
determine the impact on the left hemisphere of the brain. This
and "stuttering modification therapy". Fluency enhancement
system communicates the results to the speech therapist
strategies like deep breathing and reduced speech pace are
instantly, and they can provide self-learning therapy-based
used in fluency shaping therapy to help talk more fluently
tasks that help with fluency improvement [18].
[10].
In 2020, a study was done for stutter diagnosis and
Technological development and technical approaches
therapy recommendation based on deep learning by Gresha
have revolutionized the medical field in the recent past.
Bhatia and Binoy Saha. Some key findings of the conducted
Numerous studies have been conducted on the utilization of
study were, Mel-Frequency Cepstrum Coefficient (MFCC)
technology in treating stuttering. AI (Artificial Intelligence),
features give the best results with deep learning models, a
ML (Machine Learning), and several other approaches have
single model could not be used to identify all types of
been used in several studies to increase the speech fluency of
stuttering, MFCC coefficient from 1 to 13 clearly showed a
individuals who stutter by offering guidance and different
pattern for prolongation [19].
techniques to enhance speech fluency.
In recent years, a significant number of studies on speech A study was done on the topic of ‘Deep Learning based
therapy and stuttering have been conducted. The use of NLP Techniques in Text to Speech Synthesis for
technology, parent-child interactions, cognitive behavioural Communication Recognition’ by Dr. Edriss Eisa Babikir
therapy, and speech therapy are some of the most effective Adam to use deep learning approaches for speech synthesis,
stuttering therapies. In a study done in 1999 by Jan and performance in terms of aperiodic distortion is compared
Broomfield and Barbara Dodd, it was discovered that for to earlier models of natural language processing techniques
children with primary speech and/or language impairments, [20]. The system was implemented to convert natural
"an average of 6 hours of speech and language therapy in a 6- language text into speech to aid people with visual
month period can produce significant improvement in the impairments and reading disabilities. This model was found
to be more suitable as a speech recognition model due to its The USERS block depicts the users of the system, who are
low aperiodic distortion. The text-to-speech model was the child experiencing stuttering or a caretaker if needed.
implemented in a manner the words are mapped to vectors of Next, the user input is taken as voice commands and then
real numbers which are then used in the CNN model. forwarded to the block named VOICE ASSISTIVE BOT,
TABLE 2: COMPARISON OF EXISTING SIMILAR where the voice assistive bot is integrated with the models,
SOLUTIONS algorithms, scripts, and data sources for audio recognition
and bot outputs. The PATIENT IDENTIFICATION block
illustrates the patient identification and profile creation
process, the block named INTERNAL PROCESS is divided
into three sub-categories as stuttering type recognition, stage
recognition, and therapy recommendation. According to the
stuttering type and stage identified after each speech activity,
the profile is updated. The stuttering type and severity are
identified by the progress activities given to the child.
2) Data Collection
III. METHODOLOGY
Ten children who experience stuttering between the ages
This research effort is primarily aimed at a target audience
of three to fourteen are used for the data collection process.
that includes a child with stuttering disfluency, as well as
Their speech patterns are recorded by giving them a brief task
caregivers or parents of the children experiencing stuttering
according to their age category like expressing a simple
if the child is not able to handle the application on his/her
image, and their voices are captured during the conversations.
own. "MiMi" is a voice assistive bot designed and developed
The recorded voice clips are maintained as confidential, and
as a gamified mobile application for the age range of three to
no metadata is used for research purposes.
fourteen.
1) System Overview
The development of the final prototype
of "MiMi" involves various phases. Fig. 1 depicts the system
architecture of "MiMi".
is then divided into several chunks based on the time offsets. Category 1: The children aged between three to ten years
The words included in the sentence are recognized using the
word corpus defined that contains fluent utterances of words Category 2: The children aged between eleven to fourteen
in text format. The recognized transcriptions are then passed years
to the script used by the bot for its functionalities.
The children are given an initial activity according to the
age category and audio clips captured during this activity are
used to decide the type and severity of the stutter. The entire
internal process may be separated into four phases, according
to the implementation structure of "MiMi".
Fig. 5. Word corpus comprising individual audio clips to create the output
commands of the voice bot
5) Profile Initiation
7) Profile Maintenace
\\\\\\\
Additionally, by assessing the progress, the system will The developed avatar provides an appealing user interface
anticipate the amount of time taken to reduce stuttering to a to involve children in an interactive conversation. The user
particular level. The predictions are done using an will be rewarded based on the completion of a set of therapy
Autoregressive Integrated Moving Average (ARIMA) model sessions and more features will be added to make the avatar
which has p, d, and q values of 0,1 and 2 respectively. customizable. This makes the child become much more
engaged in their therapies and exerts more effort to complete
the speech therapy exercises.
REFERENCES
[1] Reeder, F; Baxa, J;, "The Importance of Oral Language for Literacy
Fig. 13. Accuracy scores of the integrated stuttering type recognition Success," [Online]. Available: https://grapeseed.com/us/blog/the-
model importance-of-oral-language-for-literacy-success/.
[2] Büchel, C; Sommer, M;, "What causes stuttering?," [Online].
Fig. 14 depicts the results of the stuttering type and stuttering Available:
stage recognized with the aid of the initial activity. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC340949/.
[3] "DemographicAndHealthSurveyReport-2016-Chapter10," 2016.
[Online]. Available:
http://www.statistics.gov.lk/Health/StaticalInformation/Demograph
icAndHealthSurveyReport-2016-Chapter10. [Accessed 28 01
2022].
[4] Bloodstein, O;, "A handbook on stuttering.," in Singular, San Diego,
1995.
V. CONCLUSION AND FUTURE WORKS [5] The Stuttering Foundation and Frank Wolf, "Stuttering Gets
Congress' Attention.," [Online]. Available:
http://www.stutteringhelp.org/content/stuttering-gets-
congress%E2%80%99-attention. [Accessed 27 01 2022].
Fig. 14. Stuttering type, severity index, and severity results for a given
[6] "Developmental Levels of Disfluency," [Online]. Available:
audio
https://www.coloradostutteringtherapy.com/developmental-levels-
of-disfluency/.
VI.
[7] "Rehabilitation," [Online]. Available: https://www.who.int/news-
The research problem that is addressed in this context is room/fact-sheets/detail/rehabilitation.
one of the significant issues when it comes to stuttering [8] Rice, Alex, "What is Stuttering?," [Online]. Available:
speech disfluency. One of the common aspects of speech https://familydoctor.org/condition/stuttering/. [Accessed 27 01
2022].
disfluency is stuttering which is discussed in this context.
Stuttering can start between the ages of two and five and can [9] Leonard, J;, "How to stop or reduce a stutter," [Online]. Available:
https://www.medicalnewstoday.com/articles/321995.
[10] "Stamurai," 1 March 2021. [Online]. Available: [16] "Voice Amp," [Online]. Available: http://voiceamp.net/.
https://stamurai.com/blog/stuttering-fluency-shaping-techniques/. [17] "Amazing Apps for Speech therapy," [Online]. Available:
[11] J. Broomfield and B. Dodd, "Is speech and language therapy https://1specialplace.com/2018/10/01/amazing-apps-for-speech-
effective for children with primary speech and language therapy/ .
impairment? Report of a randomized control trial.," International [18] Jayawickrama, J.T; Thelijjagoda, Samantha;, "A solution to
Journal of Language & Communication Disorders, pp. 628-640, overcome speech disorder of patients using Brain Neuron EEG
2011. Signals," in International Research Conference on Smart
[12] "SpeechEasy," [Online]. Available: https://speecheasy.com/. Computing and Systems Engineering, 2020.
[13] Sidavi, A; Fabus, R;, "A Review of Stuttering Intervention [19] Bhatia, Gresha; Saha, Binoy; Khamkar, Mansi; Chandwani, Ashish;
Approaches for Preschool-Age and Elementary School-Age Khot, Reshma;, "Stutter diagnosis and therapy system based on deep
Children," 2010. [Online]. Available: learning," 2020.
https://pubs.asha.org/doi/pdf/10.1044/cicsd_37_S_14. [20] Adam, Edriss Eisa Babikir;, "Deep learning based NLP techniques
[14] Hardy, CJD; Bond, RL; Jaisin, K; Marshall, CR; Russell, LL; Dick, in text to speech synthesis for communication recognition," Journal
K; Crutch, SJ; Rohrer, JD; Warren, JD;, "Sensitivity of Speech of Soft Computing Paradigm, vol. 02, no. 04, pp. 209-215, 2020.
Output to Delayed Auditory Feedback in Primary Progressive
Aphasias," 2018.
[15] "Speak for Less," [Online]. Available:
https://www.speakforless.com/.
B.Maheswari3, A.Muthuram4,
Department of Computer Science and Engineering, Department of Aeronautical Engineering,
Rajalakshmi Institute of Technology, Hindustan Institute of Technology and Science,
Chennai, India. Chennai, India.
maheswari.b@ritchennai.edu.in masrimuthu@gmail.com
Abstract - Electrical brain activity is detected by signals a tool can be used to detect epilepsy, seizure, and other
in an Electroencephalogram (EEG). Based on their neurological disorder. This facilitates diagnosis and lessens
frequencies, EEG signals are usually put into one of five time spent waiting for results. The signal-to-noise ratio is the
groups: delta, theta, alpha, beta, and gamma. These main obstacle when analysing EEG data (SNR). Section II
signals help find a pattern that can be used to predict examines preprocessing strategies that have been developed
when a person will have a seizure. Classifying a seizure is to address these difficulties. In Section III, discuss how to
a very important job for a doctor, as it helps them figure use algorithms and machine learning to extract features from
out what kind of seizure it is and if there will be any EEG signals for further analysis. Figure 1 provides a high-
other problems. The goal of seizure classification is to level overview of how EEG signals can be categorised.
learn as much as possible about the EEG signals.
Literature shows that there are a lot of EEG signal pre-
processing techniques, selection methods, feature
extraction from EEG signals, and classification
algorithms that can be used to find out if someone is
having a seizure. The most important thing about pre-
processing EEG signals is that it improves the quality of
raw experimental data, which leads to better datasets,
better classifications, and better accuracy. This study
gives an overview of recent EEG pre-processing
methods, datasets that can be used for experiments, and
EEG classification techniques that will help a beginner
researcher build on and use the right techniques.
Electrical potential fluctuations brought on by neural of time. STFT uses a 30 second window that doesn't overlap
networks in communication can be detected by means of to find small changes. By mapping the EEG signal's
EEG signals. amplitude and phase onto a two-dimensional matrix,
Mingyang Li et al. [5] made an image of the brain's
Electroencephalograms (EEGs) are often used to electrical activity using STFT. The most common brain state
find out what's going on with the brain's electrical activity. frequencies are Delta (0-4Hz), Theta (4-8Hz), Alpha (8-
Electrodes are put on the head of the patient to record the 15Hz), Beta (15-30Hz), and Gamma (30-60Hz).
electrical activity of the brain [15]. This is what scalp
signals from an electroencephalogram (EEG) look like. One STFT was used by S. Raghu et al. [6] to turn a
way to describe neurological disorders is to look at the EEG time series of EEG signals into an image. They did this by
signals that have been recorded [2]. Visually analysing the using a band pass filter with an intensity range of 0.1 to 44
EEG data takes a lot of time and can take a few hours. Hz. The final single image features of a spectrogram are the
spectra of all the individual channels stacked on top of each
The preprocessing technique [3] transforms the raw other.
signals into time frequency pictures. Smaller and medium-
sized hospitals often lack the trained and experienced B. DISCRETE WAVELET TRANSFORM:
neurologists necessary for EEG analysis [4]. Multiple
spectral thresholds are used to create permutations of Using the DWT method, Hafeez Ullah Amin et al.
frequency sub-bands. From the EEG signal's characteristics, [2] were able to separate the signal into its component
we can determine the synchronisation pattern that correlates wavelet coefficient rhythms. This paper approximates the
with seizure activity. The signals in the time domain are original signal using 4 level wavelet decomposition
used to create the 2-dimensional images. The techniques. The final result is a reorganised signal free of
electroencephalogram (EEG) is the best way to diagnose quality loss and with the insignificant coefficients removed.
epileptic syndromes and a cheap way to keep track of people
For their time-frequency series, Mahendra Yadava
over time.
et al. [7] employed discrete wavelet transform. In doing so,
Seizure classification is accomplished using the it separated the original signals into narrower bands whose
extracted ranges as inputs to various ML algorithms like coefficients varied. In this case, high & low filters were
SVM, CNN, and other data mining techniques. While each used. The signal was cleaned high and low frequency noise
technique has its place, hybrid methods have been shown to by two separate filters. By iteratively applying the process
improve accuracy . This proposed review and analysis lays across four distinct levels, the signal was decomposed into
the groundwork for furthering the study of EEG signal approximation and wavelet coefficients. Alpha (8–13 Hz),
classification. Theta (4–8 Hz), Delta (1–4 Hz),and Gamma (13–30 Hz)
represent the subsets of frequency spectrum at each of the
II. APPROACHES OF EEG SIGNAL PREPROCESSING four echelons (8-100 Hz).
METHODOLOGIES
C. EMPIRICAL MODE DECOMPOSITION (EMD):
This section goes into detail about the different
ways to analyse EEG data before they are processed. Wonsik The EMD procedure was used by Wonsik
Yang et al. [4] to generate the IMFs. Raw EEG signals are
A. SHORT TIME FOURIER TRANSFORM: dynamic and non-linear. For starters, we identified the
signal's local maximum and minimum at each time
To transform original signal into time-frequency segment. The second step was to find the midpoint. This
images, Gaowei Xu et al. [3] proposed an STFT method. model met the following two requirements for determining
Time-frequency signal analysis employing the Fourier
the IMF: I one maxima between two zero crossings; and
transform. Here, we figure out the amplitude of a signal that (ii) mean value become 0. Following this procedure, the
doesn't stay the same over time and frequency. By range of audible frequencies was narrowed down to the
processing the raw EEG data, we were able to get features in following five categories: Beta, alpha, delta, theta and
both the time domain and the frequency domain. The mu gamma.
band consists of frequencies from about 4 to 14 hertz, while
the beta band features those from about 16 to 32 hertz. An ensemble EMD decomposition strategy was
proposed by Ahnaf Rashik Hassan et al. [8]. It generated a
STFT gives better results because it can find signal in the form of time frequencies. To do this, it used a
transient changes in EEG signals, which have a short length technique called intrinsic mode functions (IMF) to split the
input signal up into discrete frequency bands. As an from the TD, the FD, and the TFD. Overfitting is a problem
extension of Hilbert transform, Hesam Shokouh Alaei et al. with the highly unbalanced data, but this is mitigated by the
[9] proposed the Hilbert Huamg Transform (HHT), an removal of non-seizure data that was previously used.
approach that combines the two methods. Beta, alpha,
delta, theta and gamma were the designated frequency The CNN model was proposed by Hengjin Ke et al.
bands after EMD decomposition of the IMF [12] due to its ability to automatically extract features and
share their weights, allowing for the capture of correlated
III. APPROACHES OF MACHINE LEARNING EEG signals within an image. The feature patterns were
METHODOLOGIES USED IN EEG SIGNAL DATASET processed using this technique after each iteration. However,
a 10-fold CV approach was applied during training to
This section describes machine learning methods such eliminate the overfitting issue.
as CNN, SVM, and the K-NN Algorithms, as well as an in-
depth assessment of the EEG data. In classification of seizure analysis, Wonsik Yang et al.
[4] used an SVM model for the feature selection process.
Using an image-based classification, S. Raghu et al. [6] The pattern recognition problem was solved effectively by
proposed using CNN for seizure prediction. An initial step SVM, which located the boundary that correctly categorised
involved transforming the EEG signal over time into a the most closely related training samples. SVM's recursive
spectrogram image stack. The SVM classifier was feature elimination (RFE) process mitigated the overfitting
determined with the aid of an image feature extractor. issue.
However, the overlap method was able to solve the issue of
uneven datasets. To better predict seizures, Wenbin Hu et al. SVM and k-NN algorithms were used by
[10] implemented a CNN-based method. Downsampling MarziehSavadkoohi et al. [13] to categorise the
was used to eliminate extraneous data and background preprocessed signal. In this case, the SVM algorithms used
noise. The classifier for epilepsy is constructed by SVM the resulting features. The programme used the Euclidean
based on the extracted features of CNN. Dropout was used distance to determine how far apart each sample was. Using
to discard some of the randomly chosen feature to stop the a nearest-to-greatest distance measure between each data
overfitting issue. point, an SVM classifier determined the optimal hyper plane
line. Cross validation helped get rid of the issue of
Automatically identifying useful features of an EEG overfitting. For the purpose of seizure classification,
signal was achieved by Zuyi Yu et al., [11] using the CNN Mingyang Li et al. [5] proposed a SVM with a RBF
method. Extracted features provided crucial data for seizure algorithm. SVM classification was used to determine to
event prediction. However, (BLDA) Bayesian linear which state the EEG Signal belonged by incorporating the
discriminant analysis by regularisation fixed the overfitting features in a sequential order. When it comes to EEG
issue. Successful feature extraction from invariant video recognition, the SVM algorithm excels.
patterns in VGGNet was achieved by Hengjin Ke et al. [12]
using CNN (Visual Geometry Group). Images with IV. COMPARISON OF EEG SIGNAL
dissimilar features were chosen in an adaptive fashion. Early CLASSIIFICATION METHODOLOGIES
stopping, in which units are dropped from training at
random, however, eliminates the overfitting issue. In this section, the examined methods are
summarised, and their advantages and disadvantages are
The CNN algorithm with optimization technique was contrasted. Table 1 shows that various preprocessing
proposed by Mohammad-Parsa Hossein et al. [14] and used techniques for EEG signals, including the Fourier Transform
for the extraction of unsupervised feature patterns. (which is further subdivided into the FFT, STFT, DWT, and
Overfitting, which causes deep learning methods to stall out Empirical Mode Decomposition, etc., offer improved
at unhelpful "local maxima," was eliminated via accuracy, sensitivity, and specificity while requiring less
optimization using PCA, ICA, and a DSA to locate optimal computational effort. In Table 2 we see a comparison of
solutions. To extract and classify features from EEG signal EEG-based machine learning techniques. The reader can use
time series data and images. this table to better comprehend the various machine learning
methods and the purpose of the study.
A CNN model for seizure prediction was proposed by
Xiaobin Tian et al. [1], which leveraged multi-view TABLE 1
characteristics to extract deep view features. The COMPARISON OF PREPROCESSING METHOD AND
dimensionality of this feature is reduced, making it more THE FREQUENCY RANGES
discriminatory. The different perspectives combine elements
gamma(30 Marzieh
-60Hz) University of
Savadkoohi et al. SVM, k-NN
beta(15- Bonn,
2020
Departmen 30Hz)
Mingyang t of alpha(8- Department of
Li et al. STFT Epileptolog Mingyang Li et Epileptology,
15Hz)
2019 y, Bonn SVM
theta(4- al. 2019 Bonn University 5
University Dataset
8Hz)
delta(0-
4Hz) Mayo clinic,
University of
Mohammad-Parsa
Hafeez --- Pennsylvania and
Hossein et al. CNN
Ullah Bonn sponsored by the
DWT 2017
Amin et University American
al. 2020 Epilepsy Society
The CHB_MITs BECTS and TLE patients using EEG brain signals,” IEEE Access,
Vol.8, pp. 218924218325,2020.DOI:10.1109/ACCESS.2020.3038948
Xiaobin Tian et dataset Boston [5] Mingyang Li, Xiaoying Sun, Wanzhong Chen, Yun Jiang and Tao
CNN
al. 2019 Children's Zhang, “Classification epileptic seizures in EEG using time-frequency
Hospital image and block texture features,” IEEE Access, Vol. 8, pp. 9770-
9781, 2019.DOI:10.1109/ACCESS.2019.2960848
[6] S. Raghu, Natarajan Sriraam, YasinTemel, ShyamVasudeva Rao and
Pieter L. Kubben, “EEG based multi-class seizure type classification
using convolutional neural network and transfer learning,” Neural
V. CONCLUSION Networks, Elsevier, Vol. 124, pp.202-
212,2020.https://doi.org/10.1016/j.neunet.2020.01.017
[7] Mahendra Yadava, Pradeep Kumar, Rajkumar Saini, Partha Pratim
The objective of this survey is to point out the Roy and Debi Prosad Dogra, “Analysis of EEG signals and its
difficulty of pre-processing EEG signals and the advantages application to neuromarketing,” Multimed Tools Applications,
Springer, Vol. 76, pp. 19087–19111, 2018. DOI 10.1007/s11042-017-
of extracting frequency bands for identifying and classifying 4580-6
neural abnormalities like epilepsy and seizures. The [8] Ahnaf Rashik Hassan and Abdulhamit Subasi, Yanchun Zhang,
information from the dataset was used to analyse and “Epilepsy seizure detection using complete ensemble empirical mode
decomposition with adaptive noise,” Knowledge-Based Systems,
summarise a number of the best existing approaches to Springer, Vol. 191, pp. 1-12, 2019.
classification. The analysis stands out from the literature in https://doi.org/10.1016/j.knosys.2019.105333
several key respects. First, we give special attention to the [9] Hesam Shokouh Alaei, Mohammad Ali Khalilzadeh and Ali Gorji,
“Optimal selection of SOP and SPH using fuzzy inference system
pre-processing techniques and the rationale behind the for on-line epileptic seizure prediction based on EEG phase
transformation of the frequency bands into ranges. Some of synchronization,” Australasian Physical & Engineering Sciences in
Medicine, Springer, Vol.42, no. 4, pp. 1049-1068, 2019.
these approaches directly apply the EEG signals to machine https://doi.org/10.1007/s13246-019-00806-w
learning algorithms, while others pre-process the EEG [10] Wenbin Hu,Jiuwen Cao, ·Xiaoping Lai and Junbiao Liu, “Mean
amplitude spectrum based epileptic state classification for seizure
signals before feeding them into the machine learning prediction using convolutional neural networks,” Journal of Ambient
algorithms for feature selection methods, all of which are Intelligence and Humanized Computing, Springer, 2019.
summarised here. From these results, the proposed study can https://doi.org/10.1007/s12652-019-01220-6
[11] Zuyi Yu, Weiwei Nie, · Weidong Zhou, Fangzhou Xu, Shasha
infer that the most precise prediction can be achieved by Yuan,Yan Leng and· Qi Yuan, “Epileptic seizure prediction based on
employing pre-processed methods rather than raw signals. local mean decomposition and deep convolutional neural network,”
The Journal of Supercomputing, Springer, Vol. 76, no. 5, pp. 3462-
Multiple pre-processing techniques for EEG signals (like 3476,2018.https://doi.org/10.1007/s11227-018-2600-6
STFT, FFT, and WT) can be used to create frequency bands. [12] Hengjin Ke, Dan Chen, Xiaoli Li, Yunbo Tang, Tejal Shah and Rajiv
From the granular bands, the bare minimum of features is Ranjan, “Towards brain big data classification: Epileptic EEG
identification with a lightweight VGGNet on global MIC,” IEEE
chosen to produce meaningful outcomes. The key is to avoid ACCESS, Special section on cyber-physical-social computing and
choosing superfluous details that will increase processing networking, Vol. 6, pp. 14723-
14733,2017.DOI:10.1109/ACCESS.2018.2810882
time and produce meaningless patterns. If fewer features are
[13] Marzieh Savadkoohi, Timothy Oladunni and LaraThompson, “A
used than necessary, a low-dimensional dataset is produced, machine learning approach to epileptic seizure prediction using
which hinders effective process discovery. The need to Electroencephalogram (EEG) signal,” Biocybernetics and Biomedical
Engineering, Elsevier, Vol. 40, no. 3, pp. 1328-1341, 2020.
develop one's own hybrid model of epilepsy prediction https://doi.org/10.1016/j.bbe.2020.07.004
grows as more is discovered about how to categorise and [14] Mohammad-Parsa Hosseini, Dario Pompili, Kost Elisevich, and
forecast seizures. Hamid Soltanian-Zadeh, “Optimized deep learning for EEG big data
and seizure prediction BCI via internet of things,” IEEE Transactions
on Big Data, Vol. 3, no. 4, pp. 392-404, 2017. DOI:
REFERENCES 10.1109/TBDATA.2017.2769670
[15] Simon, Judy, and A. Naveen Kumar. "A Novel Signal Processing
[1] XiaobinTian, Zhaohong Deng, Wenhao Ying, Kup-Sze Choi, Dongrui Based Driver Drowsiness Detection System." Journal of IoT in Social,
Wu, Bin Qin, Jun Wan, Hongbin Shen and Shitong Wang, “Deep Mobile, Analytics, and Cloud 3, no. 3 (2021): 176-190. DOI:
multi-view feature learning for EEG-based epileptic seizure 10.1109/TBDATA.2017.2769670
detection,” IEEE Transactions on Neural Systems and Rehabilitation
Engineering, pp. 1-11, 2019. DOI: 10.1109/TNSRE.2019.2940485
[2] Hafeez Ullah Amin, Mohd Zuki Yusoff and Rana Fayyaz Ahmad, “A
novel approach based on wavelet analysis and arithmetic coding for
automated detection and diagnosis of epileptic seizure in EEG signals
using machine learning techniques,” Biomedical signal processing
and control, Elsevier, Vol. 56, pp. 1-10, 2020.
https://doi.org/10.1016/j.bspc.2019.101707
[3] Gaowei Xu, Xiaoang Shen, Sirui Chen, Yongshuo Zong, Canyang
Zhang, Hongyang Yue, Min Liu, Fei Chen and Wenliang Che, “A
deep transfer convolutional neural network framework for EEG signal
classification,” Special Section on Data-Enabled Intelligence for
Digital Health, IEEE Access, Vol. 4, pp. 1-
10,2016.DOI:10.1109/ACCESS.2019.2930958
[4] Wonsik Yang, Minsoo Joo, Yujaung Kim, Se Hee Kim and Jong-
Moon Chung, “Hybrid machine learning scheme for classification of
Abstract: The industries are deploying Internet of Things Things, many research works employed Intelligent
(IoT) for complex applications in their respective Control strategies through machine learning [5].
domains which employ different sensors to collect data Accurate water management in water pump and pump
from different plants and pass it over signal conditioning station is achieved with the help of more flexible and
units to obtain desired results. Now-a-days, these plants
are vulnerable to cyber-attacks and one of prominent
robust multi intelligent control system by the Internet
attacks is False Data Injection Attack (FDIA) which of Things technology [6], and it is widely employed in
means injecting false data into the sensor readings, which agricultural and industrial sectors such that it saves
has considerable losses that may include loss of human cost and water. Intelligent system such as multilayer
lives, equipment, etc. Hence, the proposal aims to develop perceptron (MLP) neural network is also used in the
a Machine Learning Algorithm which can protect the predictive analysis of chemical oxygen demand in
clean data from corrupted data and are useful for bioreactor for the optimal water treatment system [7-9].
Anomaly Detection and Data Cleaning. False data A detailed survey on the recent trends in security
injection is detected through three machine learning issues in the cyber physical systems are discussed [10]
algorithms namely, Linear Regression with Least
squares method (OLS) and Gradient descent and
for cyber threats such as Denial of service and
K-Means clustering and the suitable detection model is deception attack. The literature deals with false data
obtained through comparison of performance indices. injection attack for different industry applications are
Further, Auto Encoder neural network is applied to elaborated below:
reconstruct the true data from the false data. False data injection is an important type of
cyber-attacks growing on the industrial control system
Keywords - False Data Injection Attack, K-Means, (ICS) in recent years. A tool is developed for attack
Linear Regression, Auto Encoder, Cyber-attacks, injection for simulating the attacks on the industrial
Ordinary Least Square, Gradient Descent, Anomaly control system. A Networked control system with
Detection neural network technique is proposed to mitigate false
data injection attacks (FDIA), and to compensate for
INTRODUCTION measurement and process noise, the technique is
robust to unknown inputs also. In order to improve the
Water scarcity refers to the availability of quality FDI detection accuracy, extended Kalman filter is used
water and India ranked 13 among the world in water to update the weights of the neural network [11]. The
crisis. The solution to water management involves FDIA research is carried out in smart grids of power
optimal water usage, metering to monitor usage, water systems [10]. FDIA against the nonlinear state
conservation techniques etc. Of all these methods, one estimation analysis (uses AC), graph theory-based
of the promising techniques is waste water treatment outlier detection approach in smart grids is carried out
plant [1]. With the advent of sensors, [21]. Static security assessment of power system is an
communication and automated technologies, internet emerging area
of things based smart waste water treatment plants Many researches were carried out on the
evolved. Supervisory system is developed in Waste cyber-attacks which may hazard the power system
Water Treatment Plant (WWTP) by integrating [13]. Fake secure signal attack and fake insecure
classical automatic controller with the knowledge signal attack study were carried out for the same and
based systems especially, expert systems and case the analysis was tested with IEEE-39 benchmark
based systems for controlling dissolved oxygen in system [14]. FDIA analysis is also carried out in
aeration tank of WWTP [2-3]. Different methods such aviation CPS with the negative selection algorithm for
as centralized and decentralized for waste water detecting the malicious network packets and drop out
treatment plant is discussed with various automatic and NARX for predicting the dropout packets [15].
controllers like ON/OFF, Proportional Integral Margin Setting Algorithm (MSA), data analytical
Derivative (PID), feed forward, cascade and Model methods is proposed to mitigate false data injection
Predictive Control study were carried out in detail for cyber-physical threat in modern smart grids [16].
the same plant [4]. With the advent of Internet of
Two-stage FDIA model is to generate training instances that includes Q-E, ZN-E, PH-E , DBO-E ,
dataset and an extreme gradient boosting (XGBoost) DQO-E , SS-E t, SSV-E, SED-E, COND-E, PH-P,
classifier combined with active learning and Bayesian DBO-P,SS-P, SSV-P, SED-P, COND-P, PH-D,
optimization with improved training efficiency is DBO-D, DQO-D, SS-D, SSV-D, SED-D, COND-D,
proposed [17]. A neural network model to depict PH-S, DBO-S, DQO-S, SS-S, SSV-S, SED-S,
spatio-temporal relationship of bus measurements in COND-S, RD-DBO-P, RD-SS-P,
sub-grids is presented [18]. In addition, data-driven RD-SED-P ,RD-DBO-S, RD-DQO-S ,RD-DBO-G,
intrusion detection scheme based on both time and RD-DQO-G, RD-SS-G, RD-SED-G. After collection
frequency domain analysis is proposed [19]. A of data set, missing values or non numeric values are
robust statistical feature to detect the FDIs based cyber replaced during data pre- processing. Hence, the mean
threats at the distribution level is discussed. Artificial for every attribute is obtained and the missing value in
Neural Network (ANN) is also developed for the column is replaced with respective mean of the
analyzing the performance of the FDIA on ICS [20]. attribute. Correlation Matrix is used to compare the
Energy controller is designed that stabilizes the relation between various attributes in the dataset so as
attacked CPSs and ensures the dynamic performance to attain feature selection to reduce the computational
of the system by adjusting the amount of damping complexity. However, the data available is true data
injection. Vulnerability analysis for false data injection and hence, false data ought to be generated. To
(FDI) attacks is carried out to verify resiliency of accomplish this task, 0.25 quantile point and 0.75
proposed structure to these types of attacks. quantile point of each attribute is obtained and it is
Regression-based FDIA signal predictions, including declared that the data falls with this range is identified
sequence-to-point prediction and the long short-term as true data whereas the data out of this boundary are
memory (LSTM) network-based prediction is considered as false data. Thus, the false data which is
proposed [21-24]. False data injection (FDI) attacks not in the quintile ranges of every attribute is generated
against state estimation in power grids by proactively using random function. Thus, the new data set
perturbing branch susceptances are presented through comprise true data and false data are obtained and
Moving Target Defense (MTD) mechanism. Malicious labeled as class 1 and 2 respectively. Further, to
data injection in the state vectors can be detected implement intrusion detection, Linear regression using
through temporal and spatial data correlations and the least square, linear regression using gradient descent,
malicious data can be adjusted through singular value clustering with K-means algorithms are chosen. Using
matrices and wavelet transforms. these algorithms, binary classification is accomplished.
Though many research works deal with false data Further, the false data ought to be replaced with
injection attacks, the solutions may not be suitable as reconstructed true data to eradicate the impact of false
majority of works are simulation based. Further, many data in operation and performance of Waste Water
of the works dealt with smart grid i.e. operational Treatment Plant. Hence, Auto Encoder (AE) is used to
technology, the solution may not be suitable for Waste reconstruct the entire false data and bring the false data
Water Treatment Plant. Hence, the proposal addresses as close as possible to true data thereby making the
the detection of false data injection attack and data free from anomalies.
reconstruction of original data of the waste water
II. IMPLEMENTATION
treatment plant.
I. PROPOSED SYSTEM
The collected data is organized using pandas and
then it is cleaned or modified by replacing the missing
The following diagram Fig.1 shows us the process or non-numeric values by the mean of the respective
work flow of our system which takes the data as input attribute.
and passes through machine learning algorithms which At first, the distplot and boxplot are plotted as
detect whether the given data is True or False. shown in Fig. 2 and Fig. 3 respectively through which
The detected False data is passes through auto the quartile ranges and the mean values of a particular
encoder which reconstructs it and gives an output attributes are known.
which is the rectified True data. From these graphs, the mean value of a particular
attribute can be used to replace the non-numeric values
in the dataset and the dataset after preprocessing is
depicted in Figure 4 with 527 rows and 38 columns.
Ordinary least square approach is one among
various techniques used along with linear regression to
reduce the error or loss function.
Fig. 2 Disport of data Fig. 3. Box Plot of data Fig..7 Intermediate Data Set Fig. 8 .Final Data Set
Further, correlation matrix depicted in Figure 5 is . Linear regression, a prediction tool define a
obtained to reduce the features so as to reduce relationship between an independent and a dependent
computational complexity. This is achieved through variable and if it’s just one independent variable it’s
heat map which is presented in Figure 6. Based on the called simple linear regression and if there are more
correlation, 38 attributes are reduced to 7 which are than one independent variable then it’s called multiple
fed as input to the collection of machine learning linear regression. Ordinary least square approach is
algorithms to identify suitable model for intrusion one among various techniques used along with linear
detection. regression to reduce the error or loss function. It can
also be used to estimate coefficients of linear
regression which is used to understand relation
between one or more independent variables versus a
dependent variable. The main idea behind using
ordinary least square approach is to get a line which is
as close as possible to the data points. Hence, there
would be minimal error and predicted data can be as
close as possible to our actual data. The expression
correspond to OLS is shown using equations (1) , (2)
Fig.4. Initial Dataset Fig. 5. Correlation Matrix and (3) respectively.
𝑦 = 𝑚𝑥 + 𝑐 (1)
̅)
∑(x−x̅)(y−y
m = ∑(x−x)2 (2)
̅
𝑐 = (𝑦̅ − (𝑚 ∗ 𝑥̅ )) (3)
Fig. 16.General Auto Encoder Model Fig. 18 .Accuracy of Auto Encoder model
In this model, two encoder levels in which each From Figure 18, it is inferred that the auto
level contains a dense layer, a batch normalization encoder model has an accuracy of around 95% in
layer and a LeakyReLU layer having the input size to reconstruction the True data and it even reconstructs
each layer in decreasing order and is portrayed in the false data with an accuracy of around 77%.
Appendix
Data Set Description
1. SSV-D Input volatile suspended solids to secondary settler Attribute Attribute Description
2. SED-D Input sediments to secondary settler No.
3. COND-D Input conductivity to secondary settler 18. Q-E Input flow to plant
4. PH-S Output pH 19. ZN-E Input Zinc to plant
20. PH-E Input pH to plant
5. DBO-S Output Biological demand of oxygen
21. DBO-E Input Biological demand of oxygen to plant
6. DQO-S Output chemical demand of oxygen
22. DQO-E Input chemical demand of oxygen to plant
7. SS-S Output suspended solids
23. SS-E t Input suspended solids to plan
8. SSV-S Output volatile suspended solids
24. SSV-E Input volatile suspended solids to plant
9. SED-S Output sediments
25. SED-E Input sediments to plant
10. COND-S Output conductivity
26. COND-E Input conductivity to plant
11. RD-DBO- Performance input Biological demand of oxygen in
27. PH-P Input pH to primary settler
P primary settler
28. DBO-P Input Biological demand of oxygen to primary settler
12. RD-SS-P Performance input suspended solids to primary settler
29. SS-P Input suspended solids to primary settler
13. RD-SED- Performance input sediments to primary settler
P 30. SSV-P Input volatile suspended solids to primary settler
14. RD-DBO- Performance input Biological demand of oxygen to 31. SED-P
S secondary settler Input sediments to primary settler
15. RD-DQO Performance input chemical demand of oxygen to 32. COND-P Input conductivity to primary settler
-S secondary settler
16. RD-SS-G Global performance input suspended solids 33. PH-D Input pH to secondary settler
34. DBO-D Input Biological demand of oxygen to secondary
17. RD-SED- Global performance input sediments settler
G 35. DQO-D Input chemical demand of oxygen to secondary
settler
Learning
Dr.M.Jagadeesan1 Dr.T.M.Saravanan2, Dr.P.A.Selvaraj3 U.Asif Ali4, J.Arunsivaraj5,
Associate Professor Associate Professor(s) S.Balasubramanian6
Department of Computer Applications Department of Computer Applications PG Scholar
Kongu Engineering College Kongu Engineering College Department of Computer Applications
Perundurai-638060, Erode, Tamil Perundurai-638060, Erode, Tamil Kongu Engineering
Nadu, India Nadu, India saravanan@kongu.ac.in, College,Perundurai-638060, Erode,
jagadeesan3176@gmail.com kps.raj2001@gmail.com Tamil Nadu, India
Abstract— Sentiment analysis plays an important role in interpreted in simple words, charts, tables, and so on. The
assessing the human emotions and feelings by using Natural next phase is data visualisation, which involves visualising
Language Processing (NLP) technique. Researchers have the results in the form of charts, graphs and other graphics.
recently developed different models to accurately detect and
analyze the human emotions. Sentiment analysis overcomes The two most common method used to perform Twitter
the Natural Language Processing (NLP) challenge by using sentiment analysis are machine learning and lexicon-based
Machine Learning (ML) models to perform classification, text approaches. The machine learning methods are applied here
mining, text analysis, data analysis, and data visualization to to perform Twitter sentiment analysis.
identify positive and negative tweets. Initially, the plain text
present in the tweets will be cleaned and pre-processed. The Machine learning has been used to categorize and
tweets are then analyzed from the pre-processed identify racial, sexist, misogynistic, religious, refugee, and
text. Followed by this, the proposed model extracts the immigrant objectionable and hate speech on Twitter.
numerical features from the data and combine them with tweet According to certain studies, machine learning
sentiments to train and detect different human sentiments. The approaches can be used to address regression challenges and
main purpose of the proposed model is to find the offensive
enhance the sentiment analysis performance by using Twitter
content in tweets. For the sake of simplicity, the proposed
data and anticipate new outcomes. As a result, the proposed
model considers a tweet to be vulgar content if it incorporates
offensive or hateful sentiments.
research work contributes to gaining a better understanding
on machine learning algorithms in order to perform well in
Keywords— Twitter data, Sentiment Analysis, Machine terms of tweet classification. However, previous research
Learning. works are only focused on the sentiment analysis.
Data requirements is data collecting, data collection, data
I. INTRODUCTION cleaning, data analysis, data manipulation, and data
visualization are all steps in the process. The requirement for
The method of determining the sentiment behind a tweet data analysis should be discovered first.
is known as sentiment analysis. A written piece of text
(tweet) can either be good, impartial or hateful. It is also This research study attempts to classify a tweet's polarity
considered as the task of determining user sentiment or and offer a novel framework by including preprocessing
thoughts about a particular entity. Twitter is a well-known tweets, feature extraction, and the establishment of a scored
popular and social media platform that creates a lot of and well-balanced system, followed by the use of several
information. machine learning algorithms to categorize tweets into distinct
categories.
Twitter sentiment analysis is a state-of-the-art research
domain in both academia and industries. This type of study is
highly beneficial as it gathers and categorizes the public
opinion by evaluating huge amounts of data. However, there II. RELATED WORK
are some aspects of Twitter data that make sentiment
analysis more challenging than it is with other types of data. A large number of efforts are taken in the past few
Tweets have a character restriction of 140 characters, which years to improve the opinion mining method, and a lot more
are written in colloquial English and contain a range of is being done currently. Deep Learning (DL) and Machine
acronyms, slang phrases, and irregular idioms. To overcome Learning (ML) algorithms are being increasingly used to
these challenges, researchers have investigated different perform prediction, modelling, training, and emulate
experiments concentrating on sentiment analysis of tweets. human-like behavior.
The internal information can be extracted from a text and it
can be categorized in terms of polarity, as useful, impartial, Various methodologies, such as Naive Bayes method,
or negative by using ML algorithms and NLP. It is a really linear regression, and other deep learning algorithms are
important analysis to figure out how people feel about a being used to study and analyze human sentiments.
product or predict stock market movements of a specific Moreover, the human reactions can be further classified to
firm. the particular incident by using the results of this analysis,
Data cleansing is considered as the next critical step. All which can be categorized as useful, impartial, offensive or
undesired elements such as replication records, unwanted bad.
spaces, and typos will be deleted based on the collected data
to ensure that it is error-free. The cleaned and processed data
will be subjected to critical analysis in the analysis step.
After the data or results have been analyzed, they will be
A. Twitter
We use NLP in our daily lives in the following ways:
Twitter is a data center, where users contribute huge
amounts of information. Twitter users are said to create 12 • check your spelling
GB data per day. It is broadly used by the public, who use it • Autocomplete
to show their thoughts on a wide range of public issues as
• Spam filter
well as to lodge grievances with corporations and
government authorities. Twitter, as a social networking site, • Voice texting on the phone
creates data that can be used for a variety of purposes, • Siri
including subject and person analysis. Maintaining the
Integrity of the Specifications.
Twitter is a most popular and social media website that
was founded in 2006 that allows users to post and
communicate via tweets. With almost 500 million users and
millions of messages sent every day, Twitter has quickly
become a crucial resource for businesses to monitor their
reputation and brands by eliminating and analysing public
perception of their items, services, and even competitors.
B. Opinion Mining
Opinion mining is a vast topic of natural language
processing (NLP), content analysis, and computational
reasoning about emotions represented in text. It's used in
online debates and criticism to identify customer
perceptions of products, businesses, and services.
C. Sentiment Analysis
Sentiment analysis is a Natural Language Processing (NLP)
method that assists in determining a tweet's sentiment.
Sentiment analysis is a generic technique for determining
polarity and subjectivity from the influence of words and
phrases as well as the polarity of text. It is possible to
automatically extract sentiments using the following Figure 1: Steps involved in Sentiment Analysis Process
techniques.
• Lexicon based Approach
• Machine learning based Approach III. METHODOLOGY
We analyse distinct tweets and label them as good, negative, A. Data Collections
or impartial in sentiment analysis using Twitter. This research work uses a kaggle data collection, which
was crawled and categorized as good and bad. The data
includes emoticons, usernames, and hashtags, all of which
D. Natural Language Processing must be analysed and transformed into standard formats. We
NLP is a branch of software engineering that entails must also extract relevant properties from the text, such as
teaching computers to understand human speech and using it unigrams and bigrams, which are two types of tweet
as a means of interacting with the real world. Sentiment representation.
analysis, text categorization, machine translation, and
B. Data Pre-Processing
speech recognition are all examples of NLP.
Data pre-processing is the next step following data
These are the steps in Machine Learning that are used to collection. It's a significant step forward in machine
analyse sentiment. learning. It is the process through which data is transformed
or encoded into a machine-understandable state. In simple
• Stemming terms, the algorithms can easily interpret the dataset's
features.
• Tokenization
• Part of speech tagging A twitter stream extracts all linked tweets from Twitter
• Parsing in an unstructured format. Before applying any classifier to
these unstructured tweets, they must be pre-handled. The
tweets will be tokenized and cleaned ahead of time. Initially,
all HTML content in the tweets is removed by creating a
URL structure.
The following are the phases in our preprocessing method: 1.5 Emoticons
• All special characters have been Emoticons, often known as Emojis, were invented to
eliminated from the equation. depict emotions symbolically. Users utilise a variety of
• The URL links have been deleted. various emoticons in their tweets to show their feelings. All
• Stopping words, unnecessary punctuation emoticons are divided into three types: negative, useful, and
marks, and digits, among other things, are impartial. As a result, all emoticons are replaced with words
eliminated. that are related.
• All capital characters have been converted Example: used to express happy mood – replaced by
to lowercase letters. specific word.
•
1. Tokenization 2 Lemmatization
Tokenization is the procedure for dividing vast Lemmatization is a natural language processing
volumes of text into mini chunks tokens. approach that identifies the basic words from a vocabulary
Tokenization is a crucial step in text data in order to categorize all alternative forms of a term into a
modelling. By evaluating the word sequence, It assists in single category. The basic word "End," for example, has
deciphering the text's meaning. To lessen the inflection various forms, including "Ended," "Ending," and "Ends."
towards their root forms, we used the porter stemmer. The "End" base class is shared by all of these variants. We
This was accomplished by removing the suffixes create used lemmatization to improve the ML's efficiency.
stems. Finally, the final initialized tweets were put in a
new pandas file called "Cleaned Tweets" in our present 3 Stemming
data frame of tweets collections.
It is a technique for condensing a word to its word stem,
1.1 Uniform Resource Locator which joins with suffixes, affixes, or the lemma, the base of
all words. Natural Language Processing (NLP) and Natural
URLs and hyperlinks do not add to the analysis of the Language Understanding (NLU) both gain from it (NLP).
tweet, they are eliminated. All of the URLs mentioned in the More results are returned as more forms of words are
messages or tweets are blanked out. We utilise regular recognised, searched for, and retrieved. When a word's form
expressions to match the URLs. Because we wish to is identified, it may be it's possible to get search results that
compare the tweet to the English word list, we eliminated aren't would otherwise be missing. Stemming is essential to
the punctuation marks and numbers / numerals as well. identify queries and data retrieval because of the additional
information retrieved.
Example: ['https', ':', '/', 'dataset', 'sentiment’] - [' ', ' ', ' ',
'dataset', 'sentiment']. Figure : Data Pre-Processing Pipeline
1.3 Hashtags
C. Feature Extraction
Feature extraction lowers raw data to processing groups. 4. Support Vector Machine
Feature extraction is a technique for choosing and
integrating data into features, as a result, the amount of data The Support Vector Machine (SVM) is a binary
that has to be processed accurately is reduced, and the real non-probabilistic classifier for classification, regression,
and other applications. It creates a hyperplane or
data set is properly represented.
collection of hyperplanes in a high or infinite dimensions
space. SVM for sentiment classify is based on the
The procedure of extracting features from the study's data is principle of generating a hyper plane that divides papers
crucial because features support the investigation, into groups with the least practical distance between
evaluation, and processing of people's attitudes from the them.
data. Sentiment analysis may be considered of as a pre-
programmed technique that uses Natural Language 5. XGB Classifier
Processing to extract assumptions, perspectives, mentalities, The eXtreme Gradient Boosting (XGBoost)
and sentiments from text, dialogue, and tweets (NLP) approach is a gradient-enhanced decision tree-based
D. Sentiment Classification boosting algorithm. One way that XGBoost differs from
gradient boosting is by using a more aggressive
The goal of this study was to explore if using sentiment regularization technique to reduce overfitting. Gradient
classification as a subset of topic-based categorization (with boosting-based machine learning methods are offered via
useful and negative sentiment as the two "themes") would the open-source package "xgboost." Scikit-learn API is
sufficient, or if more advanced sentiment-categorization compatible with XGBoost Classifier.
methods would be required.
We experimented with five standard algorithms: V. EXPERIMENTAL RESULTS
Random Forest Classifier, Logistic Regression, Decision
Tree Classifier, Support Vector Machine, XGBoost Confusion Matrix
Classifier. A table that displays how well a model performs on
a set of test data is called a confusion matrix. It is also known
as an error matrix. The examples in a predicted class were
IV. PROPOSED MODELS represented in the matrix's row, whereas the instances in an
We must compare the performance of above classifiers with actual class were represented in the matrix column.
Twitter data in this comparison study. The classifiers that • True Positive (TP): The model predicts that the value
have been selected are the most widely used machine will also be positive and the actual value is positive.
learning classifiers.
• False Negative (FN): The model predicts a negative
1. Random Forest Classifier result even if the actual value is positive.
Random Forest (RF) is a categorization and • True Negative (TN): The actual value and the
regression method that uses the ensemble technique with predicted result of the model are both negative.
bootstrap bagging. The Random Forest is a collection of
trees that are utilized forecast a data point's related to the False Positive (FP): The model predicts a positive result even
type dependent variable, assigns class label. A variety of when the actual value is negative.
voice and language processing programmers use this
approach.
TABLE 1: Confusion Matrix and Accuracy Results
2. Logistic Regression RF LR DT SVM XGB
The cost function should be restricted to a value
between 0 and 1 according to the logistic regression TP 7317 7185 7130 7419 7414
hypothesis. It also demonstrates the model's precision and FN 255 219 244 369 435
recall. Precision is the model's useful predictive value,
whereas recall is its sensitivity. TN 304 340 315 190 124
FP 115 247 302 13 18
3. Decision Tree Classifier Accuracy 95% 94% 93% 95% 94%
For task categorization and regression, decision
trees (DTs), a non-parametric supervised learning
technique, are often used. It supports the usage of typical
and continuous variables. The objective is to create a
model that uses decision orders from data to forecast the
outcome of a target variable. A hierarchically represented
attribute value condition in the training data space divides
the outcome into its component parts.
REFERENCES
[21] Haoxiang, Wang. "Emotional Analysis of Bogus Statistics in Proceedings, Volume 58, Part 1, 2022, Pages 150-156, ISSN 2214-
Social Media." Journal of Ubiquitous Computing and 7853, https://doi.org/10.1016/j.matpr.2022.01.165.
Communication Technologies (UCCT) 2, no. 03 (2020): 178- [25] P. A. Selvaraj, M. Jagadeesan, J. B, K. M and A. K, "Critical Factors
186. Influencing the Adoption of Cloud Computing in Indian Private
[22] Valanarasu, Mr R. "Comparative Analysis for Personality Sector Organizations," 2021 6th International Conference on
Prediction by Digital Footprints in Social Media." Journal of Inventive Computation Technologies (ICICT), 2021, pp. 884-891,
Information Technology 3, no. 02 (2021): 77-91. doi: 10.1109/ICICT50816.2021.9358558.
[23] T.M. Saravanan, M. Mohammed Ajmal, M. Manoranjith, B.G. [26] Selvaraj, P.A., Jagadeesan, M.” A survey paper on different software
Sanjaay, Jay Prakash Mishra,”Rumour influence minimization and testing automated methods with its techniques”, International Journal
topic modelling for twitter dataset using machine learning schemes”, of Scientific and Technology Research, 2019, 8(12), pp. 2159–2160
Materials Today: Proceedings, Volume 58, Part 1, 2022, Pages 535-
539, ISSN 2214-7853, https://doi.org/10.1016/j.matpr.2022.03.059.
[24] T.M. Saravanan, K. Karthiha, R. Kavinkumar, S. Gokul, Jay Prakash
Mishra, “A novel machine learning scheme for face mask detection
using pretrained convolutional neural network”, Materials Today:
Abstract—Sarcasm is a language phrase that transports the castoff knowledge to routinely spot the valuable features.
polar opposite of what is being said, usually something extremely Sarcasm is labelled as a cutting, ironic remark envisioned to
disagreeable to mock or offend someone. Sarcasm was commonly take ridicule or disdain [3]. SA otherwise called opinion
employed on social networking sites daily. Since sarcasm might mining will be the main task in NLP where judgments or
alter the significance of statement, the opinion analysis process is opinions, feelings, perceptions, observations were extracted a
error-prone. Concerns regarding the integrity of analytics have definite topic [4]. For separate decision makers, governments,
developed as the utilization of automatic social media analytics and business organizations, sentiment appreciation was
apparatuses has extended. Based on the earlier study, sarcastic indispensable. It is very beneficial to management, decisive
statements alone have considerably decreased the performance of
support mechnaisms, and persons to identify public opinions
automated sentiment analysis. This article develops a Hybrid
Particle Swarm Optimization with Deep Learning Driven
on organizations, strategies, and products [5].
Sarcasm Detection (HPSO-DLSD) technique. The presented Sarcastic expressions may change the orientation of textual
HPSO-DLSD technique mainly concentrates on the recognition files [6]. For textual files with sarcasm, text words carried and
of sarcasm on social media. In the presented HPSO-DLSD the harshness of the discrete by means of sarcasm is undeniably
technique, the initial stage of data preprocessing is carried out. the opposite. Thus, the prognostic efficacy of sentiment
To detect and classify sarcasm, sparse stacked autoencoder classification structures is reduced if cynicism cannot be
(SAE) model is exploited and the detection performance can be appropriately managed [7]. Sarcasm detection on text files is a
boosted via the HPSO algorithm. The experimental result challenging task in NLP, is becoming a significant research
analysis of the HPSO-DLSD technique can be tested on direction because of its occurrence on social media and
benchmark dataset and the outcomes emphasized the microblogging sites. A huge capacity of data has substantial
enhancements of the HPSO-DLSD method over other current latent for corporations for study more around sentiments,
approaches. individual opinions, and other aspects. But there was a slew of
problems [8]. For sample, irony has optimistic words, however,
Keywords— Sarcasm detection; Natural language processing; the background is dissimilar, creating negative sentiments.
Social media; Deep learning; Metaheuristics Such subtle problems have resulted in wrong valuation of the
evaluations of products or services in the assessment study or
I. INTRODUCTION incorrect sorting in false news recognition [9]. These problems
The vast amount of data generated on social networking have irritated many governments and academics absorbed in
sites today was good for data analysis as they are very private. dragging precise data from the text with irony. Numerous
Administrations were utilizing such data to aid them methods in NLP were projected, as the background part while
comprehend their viewers better. This arena can be known as drilling the sarcasm detection [10].
sentiment analysis (SA). Instead, sarcasm was well-defined as This article develops a Hybrid Particle Swarm Optimization
a positive sentence with negative meaning [1]. It was with Deep Learning Driven Sarcasm Detection (HPSO-DLSD)
considered to be a challenging problem in the Natural technique. The presented HPSO-DLSD technique mainly
Language Processing (NLP) domain. Managing sarcasm concentrates on the recognition of sarcasm on social media. In
properly was decisive as it could alter the divergence of a the presented HPSO-DLSD technique, the initial stage of data
sentence and risk a SA [2]. Conventional lessons cast-off rule- preprocessing is carried out. To detect and classify sarcasm,
based methods for solving this and additional new education sparse stacked autoencoder (SSAE) model is exploited and the
Sarcastic
Average 98.10 98.06 98.12 98.09 96.19
Testing Phase (30%)
Sarcastic 98.98 98.48 99.23 98.85 97.93
Non-
98.98 99.38 98.77 99.08 97.93
Sarcastic
Average 98.98 98.93 99.00 98.97 97.93
Twitter Dataset
Class F- Fig. 5. 𝑇𝑅𝑙𝑜𝑠𝑠 and 𝑉𝐿𝑙𝑜𝑠𝑠 analysis of HPSO-DLSD system
Accuracy Precision Recall MCC
Labels Score under Twitter database
Entire Dataset
Sarcastic 98.36 97.79 98.66 98.22 96.71
Non-
98.36 98.86 98.11 98.49 96.71
Sarcastic
Average 98.36 98.32 98.39 98.35 96.71
Training Phase (70%)
Sarcastic 98.10 97.50 98.42 97.96 96.19
Non- 98.10 98.63 97.82 98.22 96.19
Sarcastic
Average 93.92 93.69 94.40 93.87 88.08
Encoder
AlexNet 91.43 90.04
KNN Algorithm 90.12 88.74
LOR Algorithm 90.60 89.15
SVC Algorithm 89.95 87.58
Abstract— Agriculture is the major occupation in India and Because of the labor required to handle vast amounts of plots,
around half of the population depends on agriculture for their permanent and management environment impacts have
survival. Crop yield prediction (CYP) is a hot research topic primarily been explored at smaller scales [2]. Furthermore, for
since it depends upon several parameters such as environment, each new layer of environment characterization, less
rainfall, soil, water, seasonal crop, etc. Machine learning (ML) difference must be attributed to generic "environmental"
models are commonly employed for the extraction of important
crop features to predict yield. The ML models act as a decision
components and may be explored independently alongside
support tool for CYP, which enables to decide on what type of plant genetics. Regardless of crop type, the connection of non-
crops can grow and at what season. With this motivation, this genetic and genetic variables is the cornerstone of plant
paper focuses on the design of kernel extreme learning machine- breeding techniques to eventually address agricultural
based crop yield prediction (KELM-CYP) model. The goal of the production problems [3]. Climatic robustness in cultivars is a
KELM-CYP technique is to predict the crop yield based on significant challenge for farmers and plant breeders seeking to
different parameters such as state name, season crop, area, and increase seed production in a variety of conditions. Climate
rainfall. The proposed KELM-CYP model initially performs changeability may be linked to differences in rainfall events
data preprocessing in two levels namely data merging and data (both magnitude and pattern), temperature, and other climate
normalization. Besides, KELM is a kind of machine learning
(ML) based model commonly used for regression and
factors. Aside from temporal variability, geographical
classification processes. KELM is an extended version of extreme variability of climate factors is significant but often
learning machine (ELM) by the use of kernel transformation overlooked in crop forecast studies. It is vital to understand
process that allows having improved generalization performance how the changeability of weather parameters influences
owing to the kernel conversion from the input to kernel space. In agricultural productivity in the presence of global climate
order to showcase the enhanced predictive outcome of the change, particularly in the presence of extreme climatic
KELM-CYP model, a wide range of simulations takes place on conditions [4]. Forecasting the consequences of environmental
benchmark datasets from Kaggle repository. The experimental changes, for example, could help with marketing decisions,
results pointed out the better performance of the KELM-CYP optimising production informed plant breeding decisions, and
model in terms of different measures.
comparing results over time.
Keywords- Machine learning, Agriculture, Crop yield, Prediction
model, Regression process, Rainfall, Kernel extreme learning Crop growth methods have traditionally been developed to
machine estimate and simulate crop yields in a variety of conditions
involving genotype, environment, management factors, and
I. INTRODUCTION soil parameters [5]. This provides a clear description of
Crop yield prediction is crucial for global food production. To biophysical reactions and mechanisms, but it has limitations in
increase national food security, policymakers rely on precise terms of predicting and estimating input parameters in
forecasting to make appropriate import and export decisions. unexpected and complex circumstances [6]. Earlier crop
To produce higher crop yields, seed companies must measure prediction research across environments focused on crop
the effectiveness of original hybrids in varied conditions [1]. approaches created by quantifying responses in a small
Growers and farmers utilise yield prediction to make more number of lines while limiting the scope of inference by
informed financial decisions and operate their businesses more changing a single environmental variable. To address the
efficiently. Crop production forecasting, on the other hand, is limits of crop growth methodologies, a linear model has been
a tough task due to a number of complex components. Higher- employed to predict crops with a specific degree of progress
dimension marker data, for example, is widely used to [7]. Because it is focused on smaller groups of constituents,
describe genotype data, with hundreds to millions of this model fails to address the challenges of site-specific
producers for each individual plant. The impact of genetic climatic conditions and biological interaction. Crop yields are
markers, which may be affected by field management currently estimated using machine learning (ML) technologies
practices and a variety of environmental variables, must be such as multivariate artificial neural networks, association rule
assessed. mining, decision trees, and regression. The ML technique is
distinguished by the fact that it treats the outcome (crop yield)
as an implicit function of the input variable (environment technique with high performance and accuracy, the supplied
components and genes), which can be a complicated and model focuses on selecting an optimal subcategory of features
highly nonlinear relationship. KELM often offers better from a soil features, groundwater, and set of climate. The
classification results with less optimization constraints. efficiency of the ANN imperialist competitive algorithm
Because of its faster training speed and excellent (ANN-ICA) and ANN-GWO methods for crop yield
generalisation capabilities, the suggested KELM-CYP model prediction is estimated by Nosratabadi et al. [13]. The given
initially performs data preparation in two steps, namely data strategy, according to Agarwal and Tarar [14], is enhanced by
merging and data normalisation. KELM has evolved as a utilizing DL techniques and crop forecasting to generate
result of the numerous modifications that have been unambiguous data based on the amount of soil components
implemented to improve its generalizability and stability for required by their expenditures. In terms of accuracy, it
specific applications. outperforms the current method. It analyses the data supplied
and assists producers in estimating yield and reaping benefits
The KELM model is an analytically derived single-layer feed- as a result. When predicting appropriate yields, the soil and
forward neural network (SLFN) with randomly assigned input climatic factors of the land are taken into account.
weights. The KELM is computationally more efficient than
traditional neural network models since it does not require The goal of this study is to construct a kernel extreme learning
tuning factors such as learning rates, learning epochs, halting machine-based crop yield prediction (KELM-CYP) model.
criteria, or local optima. Furthermore, because to its superior The KELM-CYP technique utilizes different input parameters
generalisation skills and fast processing of massive volumes of for prediction namely state name, season crop, area, and
data, KELM is better suited to crop output projections for a rainfall. The proposed KELM-CYP model involves two
diverse range of crops. The kernel transformation was used to major processes namely data preprocessing and KELM based
display ELM's KELM model. It achieves better generality prediction. Primarily, data preprocessing take place in two
than ELM due to input-to-kernel translation. ELM evolved levels namely data merging and data normalization. Besides,
into KELM. Minimizing output weights and errors at the same KELM is a kind of machine learning (ML) based model
time. commonly used for regression and classification processes.
For examining the supremacy of the KELM-CYP model, a
series of experiments are carried out on benchmark datasets
II. LITERATURE REVIEW from Kaggle repository.
Abbas et al. [8] use four ML algorithms to forecast potato
(Solanum tuberosum) tuber yields based on crop and soil H. James Deva Koresh [15] proposed an innovative approach
parameters acquired from proximate sensing. Suresh et al. [9] for increasing soil productivity while also recognising the
use data mining to assist farmers in determining soil quality by environmental influence on soil functionality, productivity
inspecting its unique boundaries and recommending crops function, and resource information. The Soil classification
depending on the results. To improve the efficiency of the refers to a multiplicity of internationally approved methods for
Harvest Suggestion Framework, the framework leverages the projected soil production. The major goal is to identify
Arrangement calculation of Help Vector Machine. The methods for evaluating the benefits of a balanced nutrition
architecture maps yield and dirt data to predict the rundown of system based on maize and chickpeas. The treatment and
moderate yield for the dirt and also provides information management can be established and evaluated annually for
about supplements that are lacking in soil for the specific crop yield.
yield. S. Sairamkumar [16] proposed that it is crucial for farmers to
predict crop output. Remote sensing is used in agricultural
Shetty et al. [10] train RF, MLP, and NN regression systems as a decision-support tool to increase crop efficiency
techniques on data from four major yields grown in and save operating costs. Machine learning techniques for
Karnataka. Previous harvest and meteorological conditions estimating agricultural production have become more popular
from thirty districts in Karnataka were collected. Weather data since remote sensing-based processes demand a lot of
includes humidity readings, minimum, average, and maximum processing. However, for agricultural planning, yield
pressure, and temperature. Both data sets are pre-processed estimation accuracy is essential. The use of machine learning
before being combined to train the models. Pant et al. [11] use is a tactic for identifying workable solutions to this problem.
the ML approach to predict four widely grown crops grown Various machine learning algorithms have been used recently
primarily in India. When crop yields are projected, inputs such to anticipate yields.
as fertilisers may be used differently depending on soil
III. THE PROPOSED MODEL
conditions and predicted crops. In this work, they use ML
approaches to construct training models to recognise patterns A novel KELM-CYP technique was developed in this work to
in data, and it is used to predict agricultural productivity. accurately estimate crop productivity. The suggested KELM-
CYP method is divided into two stages: preprocessing and
Elavarasan et al. [12] present a novel hybrid feature extraction prediction. Data preparation occurs at the beginning to turn the
method that incorporates the CFS and RFRFE wrapper data into a compatible format. Second, the suggested KELM
structures. In order to develop a crop-yields prediction ML model uses input such as state name, crop season, area, and
𝐻𝛽 = 𝑡 (3)
Fig. 1. The overall procedure of the KELM-CYP model
where 𝐻 = [ℎ(𝑥1 ) ⋯ ℎ(𝑥𝑛 )]𝑇 is referred to as the hidden
A. Data Preprocessing resultant matrix The effort of resultant weights 𝛽 is merely a
simple linear formula, and the effort is equal to, say,
In this study, the preprocessing of data is carried out in two
minimising trained error. min‖𝐻𝛽 − 𝑡‖ MoorePenrose
stages namely data merging and normalization. Initially, the
merging of data takes place between two datasets comprising generalised inverse 𝐻 † is used to demonstrate a superior
various attributes. The merged dataset includes 74975 evaluation of resultant weights.
instances under different attributes such as state, season crop,
area, rainfall, and production. Data normalization is performed 𝛽̂ = 𝐻 † 𝑡 (4)
for the provided crops district wise and the crop with
Usually, the orthogonal projection was utilized for resolving
maximum yield can be recommended to the farmers to get
the generalization inverse 𝐻 † . If 𝐻𝑇 𝐻 has non-singular, 𝐻 † =
more proficient in the future.
(𝐻𝑇 𝐻)−1 𝐻𝑇 , or if 𝐻𝐻𝑇 has non-singular, 𝐻 † = 𝐻𝑇 (𝐻𝐻𝑇 )−1 .
Data preparation cleans up raw data. Analyses are impossible
KELM model was proposed from ELM with the kernel
due to the large amount of raw data from many sources. We
transformation technique that allows it to possess good
can change the data by swapping missing and null values.
generalization performances when compared to ELM because
Finally, the testing and training data are separated. Because
of the kernel conversion under the input to kernel space.
model training requires as many data points as feasible, the
Minimalizing the output weights the training and errors
data is often distributed unevenly. 80% of the dataset is used
simultaneously, KELM could be derived as follows
as training data to train machine learning algorithms to make
credible predictions. to standardise the value of the crop 𝑛
production by making use of preprocessing. 1 𝐶
min ‖𝛽‖22 + ∑ 𝜀𝑖2 (5)
𝛽 2 2
𝑖=1
The normalising process eliminates discrepancies in the data
that result from the data's inherent characteristics. It can be 𝑠. 𝑡. 𝜑 𝑇 (𝑥𝑖 )𝛽 = 𝑡𝑖 − 𝜀𝑖′ 𝑖 = 1,2, ⋯ 𝑛
reversed without affecting the result in any way. The
submitted crop data is normalised by district, and the crop whereas 𝜑(∙) symbolises the training 𝑖𝑡ℎ error under the input
with the best yield may be recommended to farmers in the of 𝜀𝑖 kernel space [17], the indicated variable 𝐶 is used to
future as a strategy to boost productivity. The data reflect the trade-offs between 𝛽 & 𝜀.
normalization is done to normalize the crop yield values using
Eq. (1): As per the Karush‐Kuhn‐Tucker (KKT) concept and afterward
presenting the Lagrange multipliers 𝛼𝑖 , the succeeding two
optimization problems could be employed for solving the KELM employs a straightforward risk reduction strategy that
output weight 𝛽 enables it to ensure improved generalisation results. It does
this by utilising empirical risk and confidence intervals that
𝑛 𝑛
1 𝐶 are approved by the scientific community. The inversion of
min{𝐿 = ‖𝛽‖22 + ∑ 𝜀𝑖2 − ∑ 𝛼𝑖 (𝜑 𝑇 (𝑥𝑖 )𝛽 − 𝑡𝑖 the n-by-n matrix computation is crucial to the solution of the
𝛽,𝛼,𝜀 2 2
𝑖=1 𝑖=1 weight equation. When there are plenty of training examples
+ 𝜀𝑖 )} (6) in the dataset, the network framework redundancy may
jeopardise the generalisation performance and computing
The KKT condition is expressed by taking the partial efficiency, which finally results in the inverse process failing.
derivative and converting it to zero.
1
𝑛 2
The proposed prediction models are suitable to the West
1 African region and accommodate large-scale datasets. In the
𝑅𝑀𝑆𝐸𝑗 = [ ∑ 𝐷𝑖𝑗2 ] (11)
𝑛 future, we hope to incorporate additional elements such as soil
𝑖=1
data, wind data, humidity, agricultural water data, wind data,
The RMSE is an optimum condition for classifying the pollution data, climatic fluctuations data, animal species data,
accuracy of method and minimal index refers to superior and agricultural economic data from those nations, which may
accuracy. improve the model's quality. To the best of our knowledge, we
are among the first to employ machine learning to address the
MAE: The MAE is the average of magnitudes of difference African agriculture problem. It will be fascinating to consider
(𝐷𝑖𝑗 occupied as positive) and is also famous index to evaluate Big Graphs techniques with data collected by smartphone
bias from atmospheric analysis. To this technique, 𝑗, the MAE sensors. Figure 3 depicts a few data samples.
was expressed as:
Table 1 gives a thorough prediction results analysis of the
𝑛 KELM-CYP model on the applied dataset in terms of MSE,
1
𝑀𝐴𝐸𝑗 = ∑ | 𝐷𝑖𝑗 | (12) RMSE, and MAE. According to the experimental results, the
𝑛 KELM-CYP model achieved minimal values of MSE, RMSE,
𝑖=1
and MAE under various situations. For example, on the
and, similar to RMSE, minimal index refers the superior Andaman and Nicobar Islands, the KELM-CYP model
accuracy. achieved an MSE of 0.9369, an RMSE of 0.9679, and an
MAE of 0.510. At the same time, the KELM-CYP approach
has achieved MSE of 9.8828, RMSE of 3.1437, and MAE of
1.6275 in Arunachal Pradesh. Finally, in Bihar, the KELM-
CYP strategy achieved an MSE of 42.5878, an RMSE of
6.5259, and an MAE of 2.8686. Meanwhile, in Chhattisgarh,
the MSE of the KELM-CYP system is 10.6343, the RMSE is
3.261, and the MAE is 1.4924. According to Kerala, the
KELM-CYP method has an MSE of 427693.6, an RMSE of
653.9829, and an MAE of 204.045. Finally, in Tamil Nadu,
the MSE of the KELM-CYP approach was 669947.1, the
RMSE was 818.5029, and the MAE was 199.8459.
TABLE I. RESULTS ANALYSIS OF PROPOSED KELM-CYP
MODEL
Fig. 5. Actual and Probable Yield Outcomes of the KELM-CYP Model in Fig. 7. Actual and Probable Yield Outcomes of the KELM-CYP Model in
Himachal Pradesh Jharkhand
Fig. 5 illustrates the predictive results analysis of the KELM- The prediction results analysis of the KELM-CYP method on
CYP method on Himachal Pradesh. The figure outperformed Jharkhand are depicted in Fig. 7. The figure outperformed
the actual and predicted crop production values. both the actual and forecasted crop yield numbers.
It is observed that the KELM-CYP manner has accomplished It may be stated that the KELM-CYP technique has achieved
higher production outcomes with a lower variance between the improved production outcomes with the least amount of
actual and predicted production values on Himachal Pradesh. disparity between actual and forecasted production values in
Jharkhand.
TABLE II.
IN TERMS OF RMSE, THE KELM-CYP STRATEGY WAS COMPARED benchmark datasets from the Kaggle library to test the
TO EXISTING APPROACHES
superiority of the KELM-CYP model. A detailed comparative
.
results analysis of the KELM-CYP with contemporary
Methods RMSE
techniques revealed that the KELM-CYP model performed
Proposed KELM-CYP Model 0.968 better in terms of MSE, RMSE, and MAE. As a result, the
suggested KELM-CYP model can be used to accurately
MLR Model 9.252
predict crop yield. In the future, the KELM model's
Fuzzy Logic Model 6.425 parameters can be tuned using metaheuristic algorithms to
improve the forecast outcome.
ANFIS Model 3.328
Kalasalingam Academy of Research and Education, Krishnankoil, Engineering, R.M.K. College of Engineering and Technology,
Tamilnadu, India-626126, d.amuthaguka@klu.ac.in Puduvoyal, Thiruvallur District, Tamilnadu, India – 601206,
anthayswethareddy2398@gmail.com
Dr. Sachin Vasant Chaudhari,4
Abstract—Lately, diabetic retinopathy (DR) is deliberated to be indications of blindness, which results in the disease
the major cause of blindness in today’s world. There are various development without medication [2]. Subsequently, consistent
reasons for loss of eyesight but DR has greatly contributed to check-ups through screening programs were necessary for
blindness. The main challenge of DR is that it is incurable at an early achieving initial diagnosis of DR. Several DR patients are found
stage, therefore basic analysis is of great significance. Consequently, to be in a late-stage and will be suffering serious visual
it is mentioned as a classic difficulty in medical schemes due to impairment [3]. Therefore, initial recognition and prompt
minimum number of medicinal experts and facilities and massive medication were very significant thereby preventing vision
patients. Accordingly, it resulted in deploying automated diagnosing
impairment. Though advanced telehealth services and fundus
methodology that is very beneficial for the analysis of DR. With this
cameras are prevalent in China, the work pressure of DR
aspect, this article develops a reliable Densely Connected Network
with Machine Learning based Diabetic Retinopathy Grading
screening was very devastating, as the lacks of skilled eye
Approach, called RDCN-MLDR. The presented RDCN-MLDR specialist. In the meantime, numerous works revealed that
model follows two major stages namely feature extraction and DR certified eye specialists screening DR by indirect
classification. Initially, the DenseNet model processes the input ophthalmoscopy can just reach sensitivity of 33, 34, or 73%
fundus images. In addition, squirrel search algorithm (SSA) is approximately [4]. The main impediments to prior identification
applied for the hyperparameter tuning of the DenseNet model. As and timely interference for DR are the greater number of people
soon as the features are created, they are fed to the LR module for affected by diabetes, the imbalance of medical resources, and
proper identification of DR. The performance assessment of the lack of ophthalmologists. Thus, there comes a crucial want to
RDCN-MLDR model is tested using open access dataset from Kaggle accomplish sound monitoring and method for patients suffering
dataset and it produces the 97.8% accuracy. The attained outcomes from diabetes [5].
highlighted that the RDCN-MLDR model can accomplish enhanced
DR classification performance. II. LITERATURE SURVEY
Deep learning (DL) is a subdivision of artificial intelligence
Keywords— Deep learning; Medical images; Diabetic (AI) and has revealed a promising outcome in the DR
Retinopathy; Convolutional Neural Network (CNN); Machine
identification by peripheral neuropathy and fundus images in
learning
diabetes mellitus using corneal confocal microscopy (CCM) [6].
DL-related technologies were implemented for DR and diabetic
I. INTRODUCTION neuropathy recognition, retinal vascular segmentation,
Diabetic retinopathy (DR) is a diabetic complication and one classification, and recognition of DR lesions [7]. In recent times,
such leading factor of blindness across the globe and the count Preston et al. advanced an AI-related method for classifying
of diabetic patients is expected to grow from 346-552 million peripheral neuropathy using CCM with no image segmentation,
persons by 2030 [1]. The blindness is prevented by detecting which did not need automated or manual explanation and
them at the initial stage and by rendering accurate medication. permitted the use of big datasets [8]. Many methods employ the
But there are even patients that suffered from DR by not having convolutional neural network (CNN) structure, which has
superior efficacy compared to other network structures [9]. in fundus imageries. Two channels of fundus imageries are
Simultaneously, DL involves the benefits of incessant work, contrast-enhanced canny edge detection (CECED) fundus
reproducibility, and no need to rest, thus it does not devote more images and the CLAHE fundus imageries were processed by
work force for training physicians [10]. Additionally, the WFDLN. Bhardwaj et al. [16] emphases on automated DR
application of DL in DR referral has the potential to minimize disease detection and its grading with the help of TL method
workload of ophthalmologists and scale up the efficacy of DR utilizing dynamic investigation. This presented technique
screening programs. leverages DNN for feature extraction from fundus imageries and
Gayathri et al. [11] modelled an automated DR grading such features were further ensembled with supervised ML
technique where features will be derived from fundus images approach for DR grading.
and classified on the basis of severity utilizing ML and DL This article develops a reliable Densely Connected Network
techniques. A Multipath CNN (M-CNN) was employed for local with Machine Learning based Diabetic Retinopathy Grading
and global feature extraction from images. Afterward, an ML Approach, called RDCN-MLDR. The presented RDCN-MLDR
technique was employed for classifying the input as per the model follows two major stages namely DR classification and
severity. Nancy and Celine Kavida [12] modelled an AdaBoost feature extraction. At the initial stage, the DenseNet model
method-related ensemble classifier method for classifying DR processes the input fundus images. In addition, squirrel search
grades. The main goal of the modelled approach was an algorithm (SSA) is applied for the hyperparameter tuning of the
enhancement of DR classification performance by utilizing DenseNet model. As soon as the features are created, they are
ensemble ML techniques and optimized features. By utilizing fed to the LR module for proper identification of DR. The
the Meyer wavelet and retinal vessel-related features derived performance assessment of the RDCN-MLDR model is tested
from multiple RoI of the retina, the devised technique using open access dataset from Kaggle dataset. The attained
categorizes various grades of DR. The author employed a outcomes highlighted that the RDCN-MLDR model can
Bayesian technique for optimizing the hyper-parameters of the accomplish enhanced DR classification performance.
presented ensemble technique to scale up the prediction
accuracy. III. THE PROPOSED MODEL
In [13], a solution to this issue was tried for classification In this study, a new RDCN-MLDR method has been
utilizing CNN by making classification tasks and feature formulated for effectual recognition in categorization of DR on
learning separated. Feature learning was a significant part of any fundus images. The presented RDCN-MLDR model follows
classifier method. Classifier techniques rely on error gradients two major stages namely DR classification and feature
that have limits such as vanishing gradient issues. In this regard, extraction. Initially, the SSA with the DenseNet model processes
an autonomous non-hand-crafted unsupervised feature learning the input fundus images. As soon as the features are created, they
technique was selected depending on unsupervised clustering. are fed to the LR module for proper identification of DR.
Depending on this idea this study devises feature extraction
approach that upgrades its variables related to Normalized A. Feature Extraction
Mutual Information performance of k-means clustering. The CNN is the more commonly known DL architecture used
variables of feature extractors were upgraded by nature-inspired mainly for classification tasks. The mathematical operations of
GWO method. In [14], an optimized DL structure can be convolution have been employed on input dataset. The multi-
modelled in this article for grading and extracting DR severities. dimensional discrete convolution is a linear function that can be
This includes several steps such as CNN severity grade represented as follows [17]:
classification, background segmentation, feature optimization 𝑦(𝑛1 , 𝑛2 ) = (𝑛1 , 𝑛2 ) ∗ 𝑤(𝑛1 , 𝑛2 )
∞ ∞
using Cuckoo search, and feature extraction set.
Nneji et al. [15] presented a weighted fusion DL network = ∑ ∑ 𝑥 (𝑛1 , 𝑛2 )𝑤(𝑛1 − 𝑘1 , 𝑛2
(WFDLN) for automatic extraction of features and classification 𝑘1 =−∞ 𝑘2 =−∞
of DR phases from fundus scans. The devised structure intends − 𝑘2 ) (1)
to treat problems of low quality and find retinopathy indications
In Eq. (2), 𝑥(𝑛1 , 𝑛2 ) signifies the input image, 𝑤(𝑛1 , 𝑛2 ) the others beforehand and fed into the layer. Consequently, the 𝑙-th
impulse response of filter and 𝑦(𝑛1 , 𝑛2 ) the output image. A layer has 𝑙 input, which comprises the feature mapping of earlier
standard CNN architecture can be made of several hidden layers convolutional blocks. Next, the feature map is fed to all the 𝐿 −
that can able adaptively learn the spatial sequence of data by 𝐿(𝐿+1)
𝑙 following layers. It creates relations in an 𝐿-layer, an
deriving higher and lower level patterns. The most widely used 2
hidden layers were pooling, convolutional, dropout, and FC (or alternate of L, as in traditional structural model. Because of the
dense) BN layers. The convolution layer constitutes the building dense connection patterns, it is mentioned as DenseNet. Fig. 1
components of CNN and extracts features from input dataset. depicts the layered in DenseNet.
Also, they apply set of filters, termed kernels (impulse response It encompasses a dense block, convolution layer, classifier,
of filter), whose value was learned during training. This filter is and transition layer afterward the global average pooling.
2𝐷, meanwhile, 1𝐷 lung sound time waveform has been B. Hyperparameter Tuning
converted into 2𝐷 images with the application of STFT. The SSA is applied as a hyperparameter optimizer of the
outcome of this convolution of the input layer with the kernel DenseNet model. It was simulated in the performance of
generates activation (or feature) map of high abstraction as we southern flying squirrels if it can be observed for food, the effort
move towards deeper layers, which identify most discriminatory of such squirrels is named as gliding, this process is also
feature for the task at hand (regression or classification). recognized for small mammals particularly if the distances can
At the same time, the pooling layer is additional part of CNN be long [19]. The SSA mathematically methods this
and is commonly positioned after every convolution layer. They performance for realizing the procedure of optimization. SSA
decrease the computation difficulty of the network by begins with arbitrary primary place of 𝑁 flying squirrels. The
accompanying nonlinear downsampling on the extracted feature place of 𝑖 𝑡ℎ flying squirrel 𝐹𝑆 is stated by a vector in 𝑑
map. Furthermore, the BN layer uses batches to rescale and dimension searching space:
recenter the input dataset such that training model can be 𝐹𝑆𝑖 = [𝐹𝑆𝑖,1 𝐹𝑆𝑖,2 … 𝐹𝑆𝑖,𝑑 ]. The 𝐹𝑆 vectors can be
speeded up, whereas the dropout layer is accountable to prevent
established utilizing Eq. (2).
overfitting by disabling few neurons. Lastly, FC layer is simple
F𝑆𝑖 = F𝑆𝐿 + 𝑈(0,1) × (𝐹𝑆𝑈 − F𝑆𝐿 ) (2)
FFNN that is usually placed at the network end for mapping the
whereas 𝐹𝑆𝐿 and 𝐹𝑆𝑈 signifies the lower as well as upper
aggregated activation of each prior layer into class probability
distribution by generating weight connections amongst them. bounds correspondingly and 𝑈(0,1) refers uniformly distributed
DenseNet is a network framework from which the layer is arbitrary number from the range of zero and one.
linked straightaway toward one another in the dense block in a Next, the fitness value of all the flying squirrels can be
feedforward manner [18]. The layer is determined that the computed and one with lesser fitness value was expressed on
activation map of each previous layer is preserved as separate “hickory nut tree (ht)”. The next optimum flying squirrels can
input while the activation map is given as input to all the be assumed that the acorn nuts trees (at)” and it is supposed to
succeeding layers. In DenseNet, the feature is concatenated with move nearby hickory nut tree. The residual flying squirrels can
be assumed that normal trees (nt)”. During all the stages of this TABLE I
technique, the squirrels can be continued for acorn nut trees COMPARATIVE ANALYSIS OF RDCN-MLDR SYSTEM WITH
while it can be affected by the occurrence of predators. This EXISTING ALGORITHMS
performance was modelled by utilizing the place upgrading
Methods Sensitivity Specificity Accuracy
progress with predator presence probability (𝑃𝑑𝑝 ). Afterward,
RDCN-MLDR 98.58 99.16 97.97
the dynamic foraging performance was modelled as follows:
Case1: The flying squirrels that were on acorn nut trees ResNet 95.57 97.08 95.73
(𝐹𝑆𝑎𝑇 ) move nearby hickory nut tree. During this work, a novel GoogleNet 98.20 98.06 97.80
place was attained: VggNet-19 95.13 98.08 95.43
𝑡
𝑡+1 𝐹𝑆 𝜏 + 𝑑𝑔 𝐶𝑔 (F𝑆ℎ𝑡 − F𝑆𝑎𝑇𝑡
) 𝑅1 ≥ 𝑃𝑑𝑝 VggNet-16 98.43 95.69 96.17
𝑃𝑆𝑎𝑇 = { 𝑎𝑇 (3)
𝑅𝑎𝑛𝑑𝑜𝑚 𝑙𝑜𝑐𝑎𝑡𝑖𝑜𝑛 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 VggNet-s 96.36 95.59 97.03
Case2: The flying squirrels on normal trees (FSnt) can move AlexNet 96.47 98.24 96.44
nearby acorn nut trees to fulfill their regular energy needs.
During this work, a novel place for squirrels is gained: M-AlexNet 97.96 96.96 96.50
𝐹𝑆 𝑡 + 𝑑𝑔 𝐶𝑔 (𝑃𝑆𝑎𝑡𝑡
− 𝐹𝑆𝑛𝑡𝑡
) 𝑅2 ≥ 𝑃𝑑𝑝 KFCM-CNNR 96.86 98.33 97.02
𝑡+1
F𝑆𝑛𝑡 = { 𝑛𝑡 (4)
𝑅𝑎𝑛𝑑𝑜𝑚 𝑙𝑜𝑐𝑎𝑡𝑖𝑜𝑛 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
Case3: once the squirrels on normal trees use the whole of In Fig. 2, a detailed 𝑠𝑒𝑛𝑠𝑦 assessment of the RDCN-MLDR
acorn nuts, they can alter their place nearby hickory nuts for model with other classification models is given. The results
storing hickory nuts, the purpose is to utilize these hickory nuts indicated that the ResNet and VGGNet-19 models have
later. A novel place of squirrels is then written as: demonstrated least 𝑠𝑒𝑛𝑠𝑦 values of 95.57% and 95.13%
𝑡
𝑡+1 𝑆 𝑡 + 𝑑𝑔 𝐶𝑔 (𝐹 𝑣 𝑆ℎ𝑡 𝑡
− 𝐹 𝑣 𝑆𝑛𝑡 ) 𝑅3 ≥ 𝑃𝑑𝑝 respectively. Then, the VGGNet-s, AlexNet, and KFCM-CNNR
F𝑆𝑛𝑡 = { 𝑛𝑡 (5)
𝑅𝑎𝑛𝑑𝑜𝑚 𝑙𝑜𝑐𝑎𝑡𝑖𝑜𝑛 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 models have reported slightly enhanced 𝑠𝑒𝑛𝑠𝑦 of 96.36%,
In which 𝑑𝑔 implies the arbitrary distance, whereas 𝑅1 , 𝑅2 , 96.47%, and 96.86% respectively. Though the M-AlexNet and
and 𝑅3 denotes random numbers from the range of zero and one, GoogleNet model has gained moderately better 𝑠𝑒𝑛𝑠𝑦 of
𝐹𝑆ℎ𝑇 signifies the place of flying squirrel which obtained 97.96% and 98.20%, the vggNet-16 models have reached
hickory nut tree and 𝜏 defines the present iteration. The considerable 𝑠𝑒𝑛𝑠𝑦 of 98.43%. However, the RDCN-MLDR
balancing betwixt exploration as well as exploitation is attained model exhibits its capability on DR classification with
with use of gliding constants 𝐺𝑐 . In this case, the value of 𝐺𝑐 was maximum 𝑠𝑒𝑛𝑠𝑦 of 98.58%.
assumed as 1.9.
C. DR Classification
Here, LR method depends on the linear regression method
as follows [20]:
𝑃 = 𝛼 + 𝛽1 𝑥1 + 𝛽2 𝑥2 +. . +𝛽𝑚 𝑥𝑚 (6)
A classification problem is nearly analogous to the linear
regression problem that forecasts the constant value. It
accomplishes even sensitivity throughout the actual number.
The prediction value of classification is 0 or 1. The outcome is
1 once the value is greater when compared to the thresholding
values; otherwise, the outcome is 0. The output variable of LR
ranges from zero to one.
Pr(𝑌 = +1|𝑋) ~𝛽. 𝑋 𝑎𝑛𝑑 Pr(𝑌 = −1|𝑋)
= 1 − Pr(𝑌 = +1|𝑍) (7)
1
↓ 𝜎(𝑥) ≔ ∈ [0,1] (8)
1 + 𝑒 −𝑥
Pr(𝑌 = +1|𝑋) ~𝜎(𝛽. 𝑋)𝑎𝑛𝑑 Pr(𝑌 = −1|𝑋)
= 1 − Pr(𝑌 = +1|𝑋) (9)
Now, a classification is utilized in negative and positive Fig. 2. 𝑆𝑒𝑛𝑠𝑦 analysis of RDCN-MLDR system with existing
groups. algorithms
IV. RESULTS AND DISCUSSION In Fig. 3, a comprehensive 𝑠𝑝𝑒𝑐𝑦 assessment of the RDCN-
The result analysis of the RDCN-MLDR model is tested on MLDR method with other classification models is given. The
the benchmark Kaggle DR dataset which holds images under outcomes specified that the VggNet-s and VggNet-16 methods
five classes. A comparative study of the RDCN-MLDR method have demonstrated least 𝑠𝑝𝑒𝑐𝑦 values of 95.59% and 95.69%
with recent methods is made in Table 1. By looking at the correspondingly. Then, the M-AlexNet, ResNet, and GoogleNet
figures, it is apparent that the RDCN-MLDR model has models have stated slightly enhanced 𝑠𝑝𝑒𝑐𝑦 of 96.96%, 97.08%,
surpassed all other models. and 98.06% correspondingly. Though the VggNet-19 and
AlexNet techniques have gained moderately better 𝑠𝑝𝑒𝑐𝑦 of
98.08% and 98.24%, the KFCM-CNNR model has reached
considerable 𝑠𝑝𝑒𝑐𝑦 of 98.33%. But, the RDCN-MLDR
CONTRIBUTION STATEMENT [17] Petmezas, G., Cheimariotis, G.A., Stefanopoulos, L., Rocha, B., Paiva,
R.P., Katsaggelos, A.K. and Maglaveras, N., 2022. Automated Lung
Srinivasulu Sirisala; data Curation, Nihar Ranjan Behera; Sound Classification Using a Hybrid CNN-LSTM Network and Focal
formal analysis, Dr. D. Amuthaguka; Methodology, Loss Function. Sensors, 22(3), p.1232.
Investigation, Dr. Sachin Vasant Chaudhari; project [18] Tan, Y.S., Lim, K.M. and Lee, C.P., 2021. Hand gesture recognition via
enhanced densely connected convolutional neural network. Expert
administration, Jhakeshwar Prasad; software data analysis, Systems with Applications, 175, p.114797.
Swetha Reddy; Data Analysis, Original draft with Formatting,
[19] Le-Ngoc, K.K., Tho, Q.T., Bui, T.H., Rahmani, A.M. and Hosseinzadeh,
All authors have read and agreed to the published version of the M., 2022. Optimized fuzzy clustering in wireless sensor networks using
manuscript. improved squirrel search algorithm. Fuzzy Sets and Systems, 438, pp.121-
147.
REFERENCES [20] Parthasharathi, G. U., R. Premnivas, and K. Jasmine. "Diabetic
[1] Kandel, I. and Castelli, M., 2020. Transfer learning with convolutional Retinopathy Detection Using Machine Learning." Journal of Innovative
neural networks for diabetic retinopathy image classification. A Image Processing 4, no. 1 (2022): 26-33.
review. Applied Sciences, 10(6), p.2021.
[2] Zhang, C., Lei, T. and Chen, P., 2022. Diabetic retinopathy grading by a
source-free transfer learning approach. Biomedical Signal Processing and
Control, 73, p.103423.
[3] Gangwar, A.K. and Ravi, V., 2021. Diabetic retinopathy detection using
transfer learning and deep learning. In Evolution in Computational
Intelligence (pp. 679-689). Springer, Singapore.
[4] Le, D., Alam, M., Yao, C.K., Lim, J.I., Hsieh, Y.T., Chan, R.V., Toslak,
D. and Yao, X., 2020. Transfer learning for automated OCTA detection
of diabetic retinopathy. Translational Vision Science & Technology, 9(2),
pp.35-35.
[5] Jabbar, M.K., Yan, J., Xu, H., Ur Rehman, Z. and Jabbar, A., 2022.
Transfer Learning-Based Model for Diabetic Retinopathy Diagnosis
Using Retinal Images. Brain Sciences, 12(5), p.535.
[6] Khalifa, N.E.M., Loey, M., Taha, M.H.N. and Mohamed, H.N.E.T., 2019.
Deep transfer learning models for medical diabetic retinopathy
detection. Acta Informatica Medica, 27(5), p.327.
[7] Thota, N.B. and Reddy, D.U., 2020, August. Improving the accuracy of
diabetic retinopathy severity classification with transfer learning. In 2020
IEEE 63rd International Midwest Symposium on Circuits and Systems
(MWSCAS) (pp. 1003-1006). IEEE.
[8] Hagos, M.T. and Kant, S., 2019. Transfer learning based detection of
diabetic retinopathy from small dataset. arXiv preprint
arXiv:1905.07203.
[9] Al-Smadi, M., Hammad, M., Baker, Q.B. and Sa’ad, A., 2021. A transfer
learning with deep neural network approach for diabetic retinopathy
classification. International Journal of Electrical and Computer
Engineering, 11(4), p.3492.
[10] Panwar, A., Semwal, G., Goel, S. and Gupta, S., 2022. Stratification of
the lesions in color fundus images of diabetic retinopathy patients using
deep learning models and machine learning classifiers. In Edge
Analytics (pp. 653-666). Springer, Singapore.
[11] Gayathri, S., Gopi, V.P. and Palanisamy, P., 2021. Diabetic retinopathy
classification based on multipath CNN and machine learning
classifiers. Physical and engineering sciences in medicine, 44(3), pp.639-
653.
[12] Nancy, W. and Celine Kavida, A., 2022. Optimized Ensemble Machine
Learning-Based Diabetic Retinopathy Grading Using Multiple Region of
Interest Analysis and Bayesian Approach. Journal of Medical Imaging
and Health Informatics, 12(1), pp.35-44.
[13] Jena, M., Mishra, D., Mishra, S.P. and Mallick, P.K., 2022. A Tailored
Complex Medical Decision Analysis Model for Diabetic Retinopathy
Classification Based on Optimized Un-Supervised Feature Learning
Approach. Arabian Journal for Science and Engineering, pp.1-13.
[14] Zhang, Q.M., Luo, J. and Cengiz, K., 2021. An Optimized Deep Learning
based Technique for Grading and Extraction of Diabetic Retinopathy
Severities. Informatica, 45(5).
[15] Nneji, G.U., Cai, J., Deng, J., Monday, H.N., Hossin, M.A. and Nahar, S.,
2022. Identification of Diabetic Retinopathy Using Weighted Fusion
Deep Learning Based on Dual-Channel Fundus
Scans. Diagnostics, 12(2), p.540.
[16] Bhardwaj, C., Jain, S. and Sood, M., 2021. Transfer learning based robust
automatic detection system for diabetic retinopathy grading. Neural
Computing and Applications, 33(20), pp.13999-14019.
Learning
Harsh Waghela Saurin Patel Pooja Sudesan
Information Technology Information Technology Information Technology
Mumbai University Mumbai University Mumbai University
Shah & Anchor Kutchhi Engineering Shah & Anchor Kutchhi Engineering Shah & Anchor Kutchhi Engineering
College College College
Mumbai, India. Mumbai, India. Mumbai, India
harsh.waghela_19@sakec.ac.in saurin.patel_19@sakec.ac.in pooja15996@sakec.ac.in
Abstract—Due to rapid urbanization processes and population classification, different types of land cover can be
exploitation, urban sprawl becomes a challenging task for urban distinguished with ease to take appropriate action. Most
planners. For planning authorities and their decision-making importantly, it is wanted for LULC type future projection for
process, particularly in developing nations throughout the late sustainable habitation and development.
20th and early 21st centuries, Land Cover Land Use (LULC) is
one of the most crucial pieces of information. Instead of doing it The Google Earth Engine (GEE), with its huge reusable
manually, the paper's goal is to estimate the LULC Classification library, abundance of geo spatial datasets, and user-friendly
using artificial intelligence approaches. The Google Earth Engine interface, is the ideal cloud-based platform for in-depth
(GEE) cloud computing is utilized to easily retrieve satellite photos monitoring and modelling of the features of the earth [5].
for this purpose [1]. The suggested approach will make the process GEE has evolved into a strong and efficient platform for
of image classification easier so that different land use types may
picture categorization utilizing satellite photos that can be
be identified and watched for urbanization. Classification and
Regression Trees (CART), a supervised machine learning (ML) used for a number of purposes thanks to the availability of
technique, is used to perform the classification [2]. Additionally, free images, tools, and methods for spatial data analysis. One
metrics like classification accuracy, precision and Kappa of the various language programming libraries that GEE
coefficient are assessed to support the conclusions. The results of offers is the JavaScript/Python client library. These libraries
the classification revealed a high accuracy of 92.9%. The LULC can be used to create GEE applications and tool-kits, which
classification results can be used as a starting point for additional can make using GEE easier. GEE also support the use of
research on a variety of topics, such as river morphology change different machine learning methods.
analysis, ecosystem services analysis, land use policy formulation,
management of water resources, management of other natural II. RELATED STUDY
resources, urbanization, etc. [3].
Keywords—Land use land cover (LULC); Classification;
Machine Learning; Artificial Intelligence; Regression; Urban It is easy to combine machine learning algorithms with
Development; Remote Sensing; Classification and Regression other open-source network apps and they are a powerful
Tree (CART); GEE; collection of data-driven techniques that employ an
automated way for pattern detection in large-scale data [6]. A
I. INTRODUCTION few of the effective machine learning techniques that have
The amount of woods, wetlands, farmland, other land and been developed for the detection and modelling of many
water types that cover an area is referred to as its land cover. characteristics are the support vector machine (SVM),
Land use refers to the way people use the land shows, whether random forest (RF), artificial neural network, classification
it is for development, conservation, or a combination of the and regression tree (CART), and decision tree [7]. Important
two. When the terms "Land Use" and "Land Cover" are algorithms like bagged decision trees, random forests, and
combined, they often refer to the grouping or classification of boosted decision trees all have their roots in the CART
human activities and natural elements on the landscape algorithm. A randomly chosen remote sensing sample is used
throughout a certain time period based on accepted scientific by the CART algorithm to build a binary tree, and the tested
and statistical methods of analysis of relevant source sample is then used to prune the tree. The classification
materials [4]. For the study and prediction of many accuracy and fast performance of CART make it one of the
applications, such as weather forecast, agricultural yield, widely used LULC classifiers. In the research paper released
disaster prediction, climate change, urbanization, and so on, in 2016, A. Sungheetha et al. [8], to maximize efficiency and
the satellite geographical data are of great value. LULC classification accuracy, the fewer data required the better.
Classification is one such essential use. One of the key tasks Their proposed CNN model is a more filter contained model
in this area is automatically classifying the land based on its is that it outperformed the deep model in terms of fine-tuning.
physical characteristics and relevant uses. Through LULC
III. OBJECTIVES according to the same logic. This continues until the tree has
its final pure sub-set or has all of its potential leaves.
The main objective of this study is to create highly accurate
LULC categorization maps of Mumbai City [3].
• To look at the extension and layout of the urban area
in the research area [9].
• To assess how land use and cover have changed over
time in the study area.
• For LULC classification, cloud computing
platforms like GEE can work quickly and
effectively.
IV. METHODOLOGY
In this study, the LULC classification is implemented by
employing GEE in conjunction with the machine learning
algorithm CART, and the sample points of the study region Fig. 2. Binary Decision Tree with CART Algorithm
are divided into two parts: the training samples (Fig. 4) and
the validation/testing samples (Fig. 5) [6]. The predictive V. EXPERIMENTAL RESULT
model was created using training data, and the testing In this section, the Classification And Regression Tree
samples were used to assess the model's effectiveness [6]. Fig. (CART) technique is used to conduct experiments for the
1 represents the full methodology [10]. classification of LULC on the GEE cloud computing platform
[6]. The CART machine learning algorithm was used to
process these training and test datasets in Fig. 6, and the
results showed a maximum accuracy of 92.9% and precision
of 0.92999. The produced LULC map Fig. 3., shows
classification of water body, built-up areas, non-built areas,
trees, bare land, mangroves using LULC mapping for satellite
observations of Mumbai.
A. Study Area
The study area focuses on Mumbai city of India with a total
area of about 603.4 sq. Km. Firstly, Mumbai is the financial
capital of India and an urban landscape of the western part of
the country on coordinate of latitude and longitude between
19.0760° N, 72.8777° E [9]. Its central location in terms of
connection by land, sea, and air making it a significant
industrial and commercial hub. It is the hub of manufacturing, Fig. 3. LULC Classification
financial services, and capital markets, and it is essential to
the expansion and advancement of the Indian economy.
Secondly, Mumbai is both one of the world's most populous
urban areas and the fourth-most populous city in the world.
B. Machine learning algorithm
One of the supervised machine learning techniques used for
classification and regression predictive modelling issues is
the classification and regression tree (CART) algorithm [11].
A foundation for crucial algorithms like bagged decision trees,
random forests, and boosted decision trees is provided by
CART, which runs on the binary decision tree as its basis as
shown in Fig. 2. The training set for the decision tree is split
in half using the best attribute and threshold value, using the
root node as the training set. Identification and tree
construction are carried out using training samples.
According to a threshold value for an attribute, the nodes are
divided into sub-nodes. Additionally, the subsets are divided Fig. 4. LULC map for training
is the Random Accuracy. The correctly categorised areas are 10, no. August, pp. 1–27, 2022, doi:
represented by the diagonal elements in the error matrix 10.3389/feart.2022.959108.
Table I. The overall accuracy is determined by adding the [5] M. Amani et al., “Google Earth Engine Cloud
number of sites that were correctly categorised and dividing Computing Platform for Remote Sensing Big Data
it by the total number of reference sites. Random Accuracy is Applications: A Comprehensive Review,” IEEE J.
calculated by summation of ratio of each reference site to Sel. Top. Appl. Earth Obs. Remote Sens., vol. 13, no.
total reference cites multiplied by the total of ratio of September, pp. 5326–5350, 2020, doi:
classification sites to the total reference sites. The Kappa 10.1109/JSTARS.2020.3021052.
Coefficient may range between -1 and 1 [13]. A value closer [6] B. Feizizadeh, D. Omarzadeh, M. Kazemi Garajeh,
to 0 means that the classification is no more accurate than a T. Lakes, and T. Blaschke, “Machine learning data-
random one. A negative value means the classification is driven approaches for land use/cover mapping and
considerably less accurate than random. The categorization is trend analysis using Google Earth Engine,” J.
clearly superior to random when the value is near to 1. Environ. Plan. Manag., pp. 1–33, Nov. 2021, doi:
Overall Classification Accuracy 𝑝(𝑎) : 0.92 10.1080/09640568.2021.2001317.
Random Accuracy 𝑝(𝑟) : 0.315 [7] X. Liu et al., “Classifying urban land use by
Kappa Coefficient(KC): = 0.88 integrating remote sensing and social media data,”
Int. J. Geogr. Inf. Sci., vol. 31, Apr. 2017, doi:
VI. CONCLUSION 10.1080/13658816.2017.1324976.
It is commonly accepted that LULC maps and the changes [8] A. Sungheetha and R. Sharma R, “Classification of
they represent can be taken into account for a variety of Remote Sensing Image Scenes Using Double Feature
applications, including land use planning and allocation, Extraction Hybrid Deep Learning Approach,” J. Inf.
analyses of environmental effect, and assessments of Technol. Digit. World, vol. 3, no. 2, pp. 133–149,
sustainable development [14]. From an environmental 2021, doi: 10.36548/jitdw.2021.2.006.
perspective, the conclusions are essential for decision-makers [9] S. Mangkhaseum and A. Hanazawa, “Comparison of
and authorities to analyze LULC changes and develop the Machine Learning Classifiers for Land Cover
proper environmental protection strategies [6]. Mumbai's Changes using Google Earth Engine,” in 2021 IEEE
LULC classification findings revealed an overall accuracy of International Conference on Aerospace Electronics
92.9% (Fig. 7). Because there were many variables taken into and Remote Sensing Technology (ICARES), 2021,
account in this study we were faced with a high-dimensional pp. 1–7. doi: 10.1109/ICARES53960.2021.9665186.
feature space, and hence feature selection approaches are [10] T. K. Das, D. K. Barik, and K. V. G. R. Kumar,
advised for the future studies. Future work in LULC research “Land-Use Land-Cover Prediction from Satellite
should address how best to leverage satellite-based land cover Images using Machine Learning Techniques,” 2022
databases through LULC change modeling techniques. This Int. Conf. Mach. Learn. Big Data, Cloud Parallel
will make important contributions to the emerging fields of Comput. COM-IT-CON 2022, no. May, pp. 338–343,
research in environmental monitoring, global warming, and 2022, doi: 10.1109/COM-IT-
climate change [15]. CON54601.2022.9850602.
[11] S. Pathak, I. Mishra, and A. Swetapadma, “An
VII. REFERENCES Assessment of Decision Tree based Classification
[1] S. M. Mirmazloumi et al., “ELULC-10, a 10 m and Regression Algorithms,” Proc. 3rd Int. Conf.
European Land Use and Land Cover Map Using Inven. Comput. Technol. ICICT 2018, pp. 92–95,
Sentinel and Landsat Data in Google Earth Engine,” 2018, doi: 10.1109/ICICT43934.2018.9034296.
Remote Sensing, vol. 14, no. 13. 2022. doi: [12] S. M. Vieira, U. Kaymak, and J. M. C. Sousa,
10.3390/rs14133041. “Cohen’s kappa coefficient as a performance
[2] M. Kiadi and Q. Tan, “Machine Learning: A measure for feature selection,” 2010 IEEE World
Convergence of Emerging Technologies in Congr. Comput. Intell. WCCI 2010, 2010, doi:
Computing BT - The International Conference on 10.1109/FUZZY.2010.5584447.
Advanced Machine Learning Technologies and [13] B. S. Sasikala, V. G. Biju, and C. M. Prashanth,
Applications (AMLTA2018),” 2018, pp. 181–192. “Kappa and accuracy evaluations of machine
[3] C. S. Kang, K. Devi Kanniah, and N. E. Mohd Najib, learning classifiers,” RTEICT 2017 - 2nd IEEE Int.
“Google Earth Engine for Landsat Image Processing Conf. Recent Trends Electron. Inf. Commun.
and Monitoring Land Use/Land Cover Changes in Technol. Proc., vol. 2018-January, pp. 20–23, 2017,
the Johor River Basin, Malaysia,” in 2021 IEEE doi: 10.1109/RTEICT.2017.8256551.
International Geoscience and Remote Sensing [14] Y. Zhang, K. Qin, Q. Bi, W. Cui, and G. Li,
Symposium IGARSS, 2021, pp. 4236–4239. doi: “Landscape Patterns and Building Functions for
10.1109/IGARSS47720.2021.9554768. Urban Land-Use Classification from Remote Sensing
[4] S. K. Nath, A. Biswas, A. Srivastava, A. Sengupta, Images at the Block Level: A Case Study of Wuchang
C. Ghatak, and J. Madan, “Site-specific seismic District, Wuhan, China,” Remote Sens., vol. 12, p.
hazard and risk potential of Bengal Basin with 1831, Jun. 2020, doi: 10.3390/rs12111831.
emphasis on holistic seismic hazard microzonation [15] S. Sudhakar and K. S. Rao, “Land Use and Land
and its structural impact assessment in the cities of Cover Analysis,” Remote Sens. Appl., pp. 21–48,
Dhanbad and Mymensingh,” Front. Earth Sci., vol. 2010.
Music
R Raja Subramanian Kokkirala Aditya Ram Dola Lokesh Sai
Department of computer Science and Department of computer Science and Department of computer Science and
Engineering Engineering Engineering
Kalasalingam Academy of Reasearch Kalasalingam Academy of Reasearch Kalasalingam Academy of Reasearch
and Education and Education and Education
Virudhunagar,Tamil Nadu,India . Virudhunagar,Tamil Nadu,India . Virudhnagagr,Tamil Nadu.India line 5:
rajasubramanian.r@klu.ac.in adityaramkokkirala@gmail.com lokesh091403@gmail.com
Abstract— Emotion identification by audio signal is a Emotion categorization follows genre classification. For
contemporary study area in Human Computer Interaction music recovery, they are endeavouring to involve feeling
domain. The desire for improving the communication interface notwithstanding conventional meta information like type and title.
between people and digital media has increased. The emotion of Numerous music sites have likewise settled melody idea frameworks
the song is detected through music. Music is a great medium for to fulfil comparative requirements. In light of client demands and
conveying emotion. The practice of determining emotions from tracks that clients ordinarily pay attention to and the system will
music snippets is known as music emotion recognition. Audio likewise suggest similar melodies from music library. As of late,
dataset is collected from the Kaggle. Researchers are now different listening destinations have started to give music idea
increasingly concerned towards increasing the precision of administrations with shifting states of mind to give a superior client
experience. There are only a couple of music feeling characterization
emotion recognition techniques. However, a complete system
and feeling based web indexes. [22] Therefore, feeling based music
that can discern emotions from speech is not yet developed. This recovery is a significant piece of meeting individuals' individualized
research work has suggested a novel emotion recognition music recovery requirements, as well as an essential development
technique, where the neural networks are trained to identify course for current music recovery. A few music specialists
emotions based on the retrieved information. The performance contributed manual explanation on the connection between highlight
of neural networks is then compared to the performance of amount and melody feeling. [18] Music creations should be named
baseline machine learning classification algorithms. The with feelings to accomplish feeling based music ID and recovery.
obtained results show that MFCC characteristics combined with Numerous music experts gave understanding into the connection
deep RNN perform better for instrument emotion identification. between include number and music feeling. explanation by hand
The results also reveal that MFCC features paired with a deep Close to home comment of immense music creations utilizing fake
neural network outperform other emotion recognition methods. techniques isn't just time requesting, yet in addition unsure with
It also shows that the class has a major influence on the mood regards to quality. Subsequently, investigating music feeling
evoked by music. To make human-computer interaction more programmed recognizable proof innovation and executing
natural, the computer should be able to perceive different mechanized feeling marking of music works is a fundamental need.
emotional states. The voice of a person is very essential in [20] To improve the system's reliability and resilience, A
assessing individuals. The emotion of the individual is detected classification method simulates a feature classifier and is used to
through the person's speech. These audio types are further analyse each feature, resulting in a musical sentiment. The underlying
classified as joyful, sad, neutral, or fearful. recognition model in this study is a neural network.
the code. The result information for the program is name. The
informational index's groupings and the quantity of tests in each class
are listed.[16] The worth counts () strategy returns a Series that
contains counts of exceptional qualities. The resultant item will be
organized in diminishing request, with the primary component being
the most frequently happening. Presently we characterize both wave
plot and spectrogram capabilities. The highlights are separated
utilizing the Python discourse highlights module. The MFCC include
was made by joining four different instrument cuts and depicts the
comparing feeling. [4] A wave plot is a visual portrayal of a sound Fig 5.1 Audio Signals of disgust Emotion
record's waveform. A sound record's recurrence levels are displayed
on a spectrogram. The spectrogram highlights are utilized for include Returns features taken from all audio files. Visualization of the
extraction and element choice in the brain network by means of the retrieved data characteristics.[14] The greater the number of samples
convolution layer and pooling layer, though the sound elements act in the dataset, the longer the processing time. The list is converted
as the organization input for the combination characterization model into a single-dimensional array. In a single dimension array, the
in view of LSTM. [3] A progression of serialized include vectors are shape indicates the number of samples in the dataset.[9] The shape
created by the model and took care of into the LSTM network as new denotes the number of samples and output classes. Hidden units in a
highlights prior to being yield through an express meager single dimension linear layer is called Dense. Dropout is used to
consideration network. We can get the feeling of the sound apply regularization to data in order to avoid overfitting and dropping
subsequent to posting it.as shown in the Fig 4 and Fig 4.1 out a portion of the data.
Fig 4.1 Audio Signals of the Fear Emotion Fig 6.1 Audio Signal of Angry Emotion
Each class's audio file's wave plot and spectrogram are plotted. The outcomes of each training epoch are displayed. batch
Each class has a sample audio of an emotion speech. Darker colors size=64 indicates the amount of data to be processed each step.
are associated with lower pitched voices. Colours are brighter in epochs=50 - the number of iterations used to train the model.
higher pitched voices. Audio length is limited to 3 seconds for files Validation split=0.2 - % of train and test split. Each cycle improves
of identical size. [6] The Mel-frequency cepstral coefficients the training and validation accuracy. The highest validation accuracy
(MFCC) features will be extracted with a limit of 40 and the mean is 72.32%. Save the best validation accuracy model using a
will be used as the final feature. Audio file feature values are being checkpoint. Slow convergence requires adjusting the learning
displayed in Table-1. The frequencies and audio Signals of different rate.[12]
emotions (Happy, Sad, disgust etc.) as shown in the below figures.
moods to get music. This organization uses 288 mood categories for
emotional classification provided by music professionals.
V. Result
Deep learning models outperform machine learning techniques
in terms of accuracy. The voice emotion recognition model is trained
using the retrieved audio features. Your accuracy will increase with
more training data. This model can be used in a variety of ways,
including speech recognition or other audio-related tracks, depending
on the settings and data collection. We reviewed the Speech Emotion
Recognition dataset as a deep learning classification project during
this project conference. Various voice-emotional sounds were
identified and classified using explanatory data analysis. The phase
spectrum feature combined achieves an accuracy score of 83%.
72.32% short-term energy, short-term average amplitude, short-term
Fig 7.1 Audio Signals Happy Emotion autocorrelation function, frequency, amplitude, phase and complex
characteristics of the drum face are correct. The voice emotion
Create a categorization task for the MER job. In the VA recognition model is trained using the retrieved audio features. Your
emotional space, there are four unique sorts of continuous emotions: accuracy will increase with more training data.
joyous, sad, anxious, and calm. Since the music video labels in the
dataset correspond to specified points in the VA space, the emotional This model can be used in a variety of ways, including speech
value must be separated to map to the emotional category. [5] Before recognition or other audio related tracks, depending on settings and
the sample data were processed using the classification tasks in this data collection. We reviewed the Speech Emotion Recognition
study, the VA space was separated into four parts, and the four dataset as a deep learning classification project during this project
emotions were associated with the VA space. The combination of conference. Various voice-emotional sounds were identified and
short-term energy functions, short-term mean amplitude and short- classified using explanatory data analysis. The phase spectrum
term autocorrelation function in the BP-based MER experiment had feature combined achieves an accuracy score of 83%. 72.32% short-
the best recorded effect. The outcomes of each training epoch are term energy, short-term average amplitude, short-term
displayed. The training accuracy and validation accuracy grow with autocorrelation function, frequency, amplitude, phase and complex
each iteration; the best validation accuracy is 72.32 use checkpoint to characteristics of the drum face are correct. In this study, the VA
save the best validation accuracy model Slow convergence requires space was divided into four parts, and the four emotions were linked
adjusting the learning rate.[13] to the VA space, before the sample data was processed by
classification tasks.
Table-1 Compare With the Layer and param.
Layer( type) Output Shape Param#
Dropout_9(Dropout) (None,256) 0
Dropout_10(Dropout) (None,128) 0
small because they are not materially different from the experimental
results that the recognition models produce. for graphical comparison [7] Singhal, Rahul, Shruti Srivatsan, and Priyabrata Panda. "Classification
of test results. of Music Genresusing Feature Selection and Hyperparameter Tuning."
Journal of Artificial Intelligence 4, no. 3 (2022): 167-178.
VI. Conclusion
[8] Cheng Z Y, Shen J L, Nie L Q, Chua T S, Kankanhalli M. Exploring
Music contains a plethora of human emotional information. user-specific information in music retrieval. In:Proceedings of the 40th
Research on music emotional categorization is useful for International ACM SIGIR.
incorporating vast amounts of musical data. This study enhances the
feature information gathering capabilities of the emotion [9] Kim Y E, Schmidt E M, Migneco R, Morton B G, Richardson P, Scott
identification model by including the deep network model into the J, Speck J A, Turnbull D. Music emotion recognition:a state of the art
review. In: Proceedings of the 11th International Society for Music
explicit sparse attention mechanism for optimization. It encourages Information Retrieval Conference. 2010, 255–266
the preparation of related data and enhances the input level of the
model, which increases the recognition accuracy of the model. [10] Yang Y H, Chen H H. Machine recognition of music emotion: a review.
Compared with other strategies, the proposed method includes an ACM Transactions on Intelligent Systems and Technology. 2011, 3(3):
obvious sparse attention mechanism to deliberately filter out small 1–30 Bartoszewski
amounts of information, concentrate the distribution of attention, and
enable the collection and analysis of information. information about [11] M, Kwasnicka H, Kaczmar M U, Myszkowski P B. Extraction of
geographic objects. The test results show that the proposed method emotional content from music data. In: Proceedings of the 7th
can effectively analyze and classify the data. International Conference on Computer Information Systems and
Industrial Management Applications. 2008, 293–299.
Research on audio digitization has advanced as a result of the
continual development of modern information technology. It is now [12] Hevner K. Experimental studies of the elements of expression in music.
possible to do research on using computer-related technologies to The American Journal of Psychology, 1936, 48(2): 246–268
MER. To improve musical emotion recognition, this study uses an
improved BP network to recognize music data. Before analyzing the [13] Posner J, Russell J A, Peterson B S. The circumplex model of
optimal feature data for emotion detection, this study first identifies affect:anintegrative approach to affective neuroscience, cognitive
the acoustic features of music in associative form for emotion development, and psychology. Development and Psychopathology,
classification. Second, using the ABC modified BP network, a 2005, 17(3): 715–734
musical sentiment classifier was developed and its performance [14] Thammasan N, Fukui K I, Numao M. Multimodal fusion of EEG and
evaluated compared with other classifiers. The results of the test musical features in music-emotion recognition. In: Proceedings of the
show that the network used has a greater impact on the recognition. 31st AAAI Conference on Artificial Intelligence. 2017, 4991–4992
References [15] R. R. Subramanian, M. Yaswanth, B. V. Rajkumar T S, K. Rama Sai
[1] R. R. Subramanian, Y. Sireesha, Y. S. P. K. Reddy, T. Bindamrutha, M. Vamsi, D. Mahidhar and R. R. Sudharsan, "Musical Instrument
Harika and R. R. Sudharsan, "Audio Emotion Recognition by Deep Identification using Supervised Learning," 2022 6th International
Neural Networks and Machine Learning Algorithms," 2021 Conference on Intelligent Computing and Control Systems (ICICCS),
International Conference on Advancements in Electrical, Electronics, 2022, pp. 1550-1555, doi: 10.1109/ICICCS53718.2022.9788116.
Communication, Computing and Automation (ICAECA), 2021, pp. 1-
6, doi: 10.1109/ICAECA52838.2021.9675492. [16] Turnbull D, Barrington L, Torres D, Lanckriet G. Towards musical
query-by-semantic-description using the CAL500 data set. In:
[2] J. Sönmez-Cañón et al., "Music Emotion Recognition: Toward new, Proceedings of the 30th Annual International ACM SIGIR Conference
robust standards in personalized and context-sensitive applications," in on Research and Development in Information Retrieval. 2007, 439–
IEEE Signal Processing Magazine, vol. 38, no. 6, pp. 106-114, Nov. 446
2021, doi: 10.1109/MSP.2021.3106232.
[17] Aljanaki A, Yang Y H, Soleymani M. Developing a benchmark for
[3] Serhat Hizlisoy, Serdar Yildirim, Zekeriya Türeci, Music emotion
emotional analysis of music. PLoS ONE, 2017, 12(3): e0173392
recognition using convolutional long short term memory deep neural
networks, Engineering Science and Technology, an International
[18] Chen P L, Zhao L, Xin Z Y, Qiang Y M, Zhang M, Li T M. A scheme
Journal,Volume24,Issue3,2021,ISSN22150986,https://doi.org/10.1016
of MIDI music emotion classification based on fuzzy theme extraction
/j.jestch.20210.009.
and neural network. In: Proceedings of the 12th International
[4] R. R. Subramanian, B. R. Babu, K. Mamta and K. Manogna, "Design Conference on Computational Intelligence and Security. 2016, 323–
and Evaluation of a Hybrid Feature Descriptor based Handwritten 326
Character Inference Technique,"2019IEEE International Conference
on Intelligent Techniques in Control, Optimization and Signal [19] Juslin P N, Laukka P. Expression, perception, and induction of musical
Processing (INCOS), Tamil Nādu, India, 2019, pp. 1-5. emotions: a review and a questionnaire study of everyday listening.
Journal of New Music Research, 2004, 33(3): 217–238
[5] R. Raja Subramanian, H. Mohan, A. Mounika Jenny, D. Sreshta, M. [20] R. Raja Subramanian, V. Vasudevan, “A deep genetic algorithm for
Lakshmi Prasanna and P. Mohan, "PSO Based Fuzzy-Genetic human activity recognition leveraging fog computing frameworks”,
Optimization Technique for Face Recognition," 2021 11th Journal of Visual Communication and Image Representation, Volume
International Conference on Cloud Computing, Data Science & 77, 2021,103132,ISSN1047-320
Engineering(Confluence),2021,pp.374379,doi:10.1109/Confluence51
648.2021.9377028. [21] Kim, Jaebok, Ibrahim H. Shareef, Peter Regier, Khiet P. Truong, Vicky
[6] Yang X Y, Dong Y Z, Li J. Review of data features-based music Charisi, Cristina Zaga, Maren Bennewitz, Gwenn Englebienne, and
emotion recognition methods. Multimedia System, 2018, 24(4): 365– Vanessa Evers. "Automatic ranking of engagement of a group of
389 children “in the wild” using emotional states and deep pose machines."
V. Vanthana K. Kartheeban
Research Scholar, Department of Computer Applications, Department of Computer Science and Engineering, Kalasalingam
Kalasalingam Academy of Research and Education, Krishnankovil, Academy of Research and Education, Krishnankovil, Tamil Nadu
Tamil Nadu k.kartheeban@klu.ac.in
vanthana.310@gmail.com
Abstract—Due to the digitization of everything, the effect of divided by total words count. If the obtained one is a positive
the growth of social media in nook and corner of the world number, then it is a positive emotion, if not, it is a negative
creates the requisite of gathering and analysing the millions of emotion.
reviews that people shared about their emotions so as to improve Count of [ (Positive Words – Negative Words) / (Total
the quality of the corresponding concern. Such thing is defined Words) ] (1)
as sentiment analysis which accommodates online product
reviews, movie reviews, personal posts in social media, etc. to The exactness of lexicon models is usually high as it
categorize them as good and bad. The proposed research uses the polarity of the text. The algorithms used are Text
contains the performance examination of machine learning and Blot, VADAR, etc.
deep learning models for the hotel reviews and IMDB Movie
Reviews. The result reveals that the deep learning has higher
accuracy. The performance of machine learning models varies B. Machine Learning Model
depending on the size of the dataset.
Here supervised learning approach is used for
Keywords—Sentiment Analysis, Opinion Mining, Support Vector sentiment analysis. In the machine learning models, the
Machine, Logistic Regression, Convolutional Neural Network, dataset with classes for positive, negative and neutral is used
Bidirectional Encoder Representations from Transformers. for training the model. Then the polarity of the text is
determined. The testing and validation can be done to
measure the efficiency of the developed model. The model
I. INTRODUCTION can be developed using several machine learning algorithms
like Naïve Bayes, Logistic Regression, SVM, etc. The
Sentiment Analysis evaluates customer’s attitudes,
accuracy is calculated using the confusion matrix measures
reviews, evaluations, thoughts opinions, judgements,
like precision, recall, F1 – score, etc.
emotions, etc. of entities like companies, products,
individuals, problems. [1]. It is more valuable as it behaves C. Deep Learning model
like feedback that assists them in making effective
advertisements, prediction of the impact of advertisement, as Generally deep learning model provides the accurate
well as finding consumer opinions about their brand, and precise result than the machine learning model. The
products, services, etc [2]. Such analysis algorithm decides working of deep learning simulates the working of human
which method can be suitable for classifying a user comment brain. Like the brain that contains neurons, there exists the
mechanically as a positive and negative one. Document level, artificial neural network with neurons and perceptron’s. It is
Sentence level and Feature level are the classification levels also a supervised one that can be trained and validated using
of Sentiment analysis respectively [3]. The algorithmic bias functions. Many applications exist based in this, mainly
models used are lexicon, machine learning, deep learning and the automation of human tasks. The familiar algorithms are
advanced Deep Learning. CNN, LSTM
In the lexicon-based models, the categorization of Categorizing the reviews as positive, negative and
the customer opinions can be made using a calculation using neutral is a significant one in the modern digital marketing.
dictionary. In the course of this, the good meaning words can These can be done using the various algorithmic models. One
be “positive” and the contradictory one is “negative”. among them is the lexicon-based approach.
Afterwards, the difference between the quantity of affirmative For the novices, Textblob is one of the finest
and negative words will be calculated and algorithm with the moderate learning process and massive
functionality. Here there exists an interface so-called NLTK
used for the natural language processing tasks. There is a new
arrival in the market with the alike options like NLTK. It is a
great boon to the field of NLP as it can be used for building
an application from the scratch or existing ones. . It was
developed on 76 IITM Journal of Management and IT The authors specified in [13] used the fine grained
Cython. But comparatively performance wise TextBlob BERT model for the sentiment classification of SST data.
places the prior role that Spacy. Though good working one, it They reveals that their model with the simple architecture
can support only English language. [4] provides the outstanding result. This stimulates to implement
the BERT in this paper.
In [5], lexicon based approach is applied on the
product review dataset for the sentiment analysis. The paper In [14], the author proposes an innovative method
was proposed to have a summarized view on the positive and for recognizing the emotions which can assists the police to
negative opinions of the customer reviews that assists the recognize whether the criminals are lying. The deep CNN
business individuals to make decisions. model is used for classification which is trained using the 443
YouTube thumbnail videos. This kindle ourself to apply the
The author in the journal enumerated at [6], merged current research work to the emoticons in future.
an effective deep learning architecture well-tuned using the
universal linguistic model and the SVM algorithm. The III. EVALUATION MEASURES FOR THE CLASSIFIERS
analysis is executed on three real world datasets called
Twitter US Airlines, IMDB and GOP debate. Also, it is For the classifiers, the accuracy is a highly
constrained to document level Appl. Syst. Innov. 2022, 5, 13, desirable assessment measure. Such measure depends on the
four possible results like TP, TN, FP and FN. TP and TN
pp: 1 – 16. The result reveals that the accuracy level rises due
to the introduction of novelty. The performance level the indicates how much data correctly forecasted positive /
author obtained for the above mentioned three datasets are negative, whereas FP and FN indicate how much wrongly
99.78%, 99.71% and 95.78% respectively. The combination forecasted as positive / negative. These counts are positioned
of the deep learning and machine learning approaches indeed in a matrix clarified below.
provides an incredible result. A. Confusion Matrix
In [7], the author applied the Recurrent Neural The confusion matrix is a two-dimensional structure
Network (RNN) and Support Vector Machine (SVM) to the that is used to signify the count of the total true and false
Twitter data that encompasses the hash tags like COVID-19, positives, and the total true and false negatives. The template
corona virus, demises, new case, and recovered. The objective is as follows.
of the investigation is to have a familiarity on the
psychological strength of the people during the peak period
of COVID-19. During the lock down era, the social media Predicted Vs Observed Positive Negative
plays a vital role in communicating the awareness, Positive TP FN
precautions and the spread of the disease as we all are in the
stay at home and be quarantine condition. That’s why the Negative FP TN
author preferred the dataset from social media. The sentiment
score for the analysis is measured and segregated as positive
mindset, negative mindset and neutral mindset. Here T- True, F – False, P – Positive, N – Negative.
The author in [8] proposed a work for the sentiment In the above matrix, for the positive sentiments, the counts are
analysis by means of the deep learning methods Mostly, the positioned by calculating the number of tuples that are
methods provide the acceptable result for the SA tasks. correctly identified as positive (TP) and wrongly identified as
Therefore, the author concludes that due to the rapid and negative (FP).
increasing advancement of DL techniques, the focus on the For the negative sentiments, the count of the correct
research may be encouraged on the analysis of opinions via prediction is True Negative (TN) and the contradictory as
deep learning in the future era. positive instead of negative is False Negative (FN).
In [9], the author concludes that there exists more B. Accuracy from the confusion Matrix
training accuracy and an elongated running time when the
analysis is done using the neural network based methods than Accuracy which reveals the performance level is
the machine learning methods. calculated by dividing the the number of all correct
predictions by the total number of records in the dataset. The
In [10], according to the view of author, SVM, KNN highest value of accuracy is 100%, whereas the reverse is 0%.
and NB models when used to categorize twitter data into Normally the results lies between 0 and 100.
Humorous, Joyful, Miserable, Annoyed and none using
lexicon dataset AFFIN over 8K tweets. SVM attained Accuracy = CP / N (2)
maximum accuracy followed by KNN and NB, but KNN was where CP – Number of tuples Correctly Predicted,
the most constant among the three classifiers. That’s why the
SVM is implemented in this paper. N – Total number of records in dataset
In [11], the author performed sentiment analysis
using embedding of Indonesian language as the features of IV. DATASET FOR ANALYSIS AND PREPROCESSING
CNN and LSTM. It means that the CNN is applicable for any
country languages. In this paper too CNN is implemented. The data needed for the analysis is taken from the
available online machine learning repository.kaggle.com.
Similarly, in [12], the author applied deep CNN for Two datasets of different sizes namely
the twitter data and the sigmoid function is used. tripadvisor_hotel_reviews taken from [16] containing 20K
reviews and the IMDB movie_reviews dataset taken from
[17] with 50K reviews are used to estimate the performance The estimated accuracy of SVM when implemented
of different machine learning and deep learning models. The for hotel reviews dataset is 71.79% and for movie reviews it
data objects are available in the form of .csv file that contains is 89.22%
attributes like Review, Rating. As both of these are pre-
processed by splitting the sentences as tokens using the 2) Logistic Regression
tokenization functions of the sklearn python packages by Logistic Regression which is a supervised machine
referring the author in [15]. learning algorithm is used to predict the categorical variable
given the independent variables. The probable values for the
independent variable lies between 0 and 1. In sentiment
V. MODEL IMPLEMENTATIONS FOR ESTIMATING ACCURACY analysis, logistic regression can predict whether it is a positive
LEVELS or negative sentiment using the percentage of positive and
negative words.
A. Methodology
There are differences between logistic and linear
regression. The former is for classification tasks and the later
is for the prediction tasks.
Here the CountVectorizer is used for the creation of
feature vectors with the document frequencies minimum as
10 and the maximum as 0.95. The solver attribute of the of
the LogisticRegression is set as liblinear and the highest
number of iterations is set as 1000.
The estimated accuracy of logistic regression when
implemented for hotel reviews and the movie reviews datasets
are 75% and 78% respectively.
C. Implementation of Deep Learning Methods
Deep learning is an approach which follows the
neural networks models. The model depicts the working
Fig 1. Process Flow Diagram of the proposed model process of the human brain. Here the model can be trained
using the activation functions and the error can be propagated
The user reviews are analysed using two algorithmic back and corrected using bias functions. Though the concepts
models named machine learning and deep learning and the are tough to understand and implement, the accuracy of the
accuracy has been calculated. Both the models are applied to deep learning will be better than the machine learning. The
the Tripadvisor , the IMDB dataset reviews and the familiar deep learning algorithms for sentiment analysis are
sentiments were categorized as positive and negative CNN and BERT.
comments (class outcomes). Totally 20K and 50K reviews
respectively had been taken into consideration for producing 1) Convolutional Neural Networks
the result. The accuracy computation is done using Python Convolutional network also termed as
libraries. ConvNet/CNN is a deep learning algorithm, which contains
B. Implementation of machine learning models input layer, one or more hidden layers and an output layer.
The learnable weights and biases can be assigned to the nodes
Machine learning is an approach used to categorize in the layers.
the unknown data objects using supervised or unsupervised
methods. For the sentiment analysis, the supervised approach The architecture is similar to that of the connectivity
is used. The categorization here is done using the polarity of pattern of Neurons in the Human Brain and was inspired by
the text. Two popular methods in machine learning are SVM the organization of the Visual Cortex.
and Logistic Regression. The proposed CNN model contains embedding
1) Support Vector Machine layer, three convolutional layers, one flatten layer and two
dense layers. The size for the embedding is set as 300. For the
Support Vector Machine which in brief called as three convolutional layers, the filters are set as 128, 64 and 32
SVM is a supervised machine learning algorithm mostly used respectively with the kernel 4 and the function relu. The
for performing classifications. The algorithms works by resulting data from the convolutional layers is then converted
finding the hyperplane that best split the n-dimensional space into a single vector using flatten layer. For the first dense
into the different target classes. The plane is found by layer, the units was set as 256 and the activation function relu
choosing the optimal one out of the best boundary lines is used. Then for the second one sigmoid with unit parameter
drawn. The optimal one chosen is called as the hyperplane. 1 is used. For the compilation, Adam optimizer was used with
Here for the analysis, 60% of reviews is used for the loss as binary cross entropy. Two iterations were done for
training, 20% is used for testing and 20% is used for analysis.
validation. The feature vectors are formed using the
TfidVectorizer function with the least document frequency as
5 and the maximum as 0.8. For the classification linear kernel
is used.
VIII. CONCLUSION AND FUTURE WORK [12] A. Severyn and A. Moschitti, "UNITN: training deep
convolutional neural Network for twitter snetiment
The obtained accuracies of machine learning and classification," in Proceedings of the 9th International
deep learning models reveal that the performance of deep Workshop on Semantic Evaluation (SemEval 2015), Denver,
learning models is approximately same though the size of the 2015.
input datasets increases. In the machine learning models for
logistic regression, there remains no much difference but for
SVM, the variations were abrupt. It indicates that SVM is
suitable for the sentiment analysis of datasets having large [13] Manish Munikar; Sushil Shakya; Aakash Shrestha,
number of reviews. It provides the accuracy level equivalent “Fine-grained Sentiment Classification using BERT”,
to deep learning models. The accuracy of SVM can be further https://ieeexplore.ieee.org/xpl/conhome/8933012/proceeding
improved in future by applying ensemble techniques and it ,2019
may be possible to make it to work more efficient than the [14] Mishmala Sushith, “Semantic Feature Extraction and
deep learning models. Deep Convolutional Neural Network-based Face Sentimental
Analysis”, Journal of innovative image processing 4, no. 3
(2022) : 157-164.
REFERENCES
[15] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B.
[1] B. Pang and L. Lee, "Opinion mining and sentiment Thirion, O.Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V.
analysis", Found. Trends Inf. Retr., vol. 2, no. 1, pp. 1-135, Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M.
2008. Brucher, M. Perrot and E. Duchesnay,"Scikit-learn: Machine
Learning in Python,"Journal of Machine Learning Research,
[2] S. Pedro, T. Yeh and N. Oliver, "Leveraging user vol. 12, pp. 2825-2830, 2011.
comments for aesthetic aware image search reranking", Proc.
21st Annu. Conf. World Wide Web (WWW), pp. 439-448, [16]https://www.kaggle.com/datasets/andrewmvd/trip-
2012. advisor-hotel-reviews
[3] Vohra, S. M., and J. B. Teraiya. "A comparative study of [17]https://www.kaggle.com/datasets/lakshmi25npathi/imdb
sentiment analysis techniques." Journal JIKRCE 2, no. 2 -dataset-of-50k-movie-reviews
(2013): 313-317.
[4] Munna Pandey, Rebecca Williams, Nikita Jindal, Anurag
Batra, Sentiment Analysis using Lexicon based Approach,
IITM Journal of Management and IT pp. 68 – 76
[5] M. a. L. B. Hu, “Mining and summarizing customer
reviews,Proceedings of the tenth ACM SIGKDD
international conference on Knowledge discovery and data
mining,” ACM, pp. 168–177, 2004.
[6] Barakat AlBadani , Ronghua Shi and Jian Dong, A Novel
Machine Learning Approach for Sentiment Analysis on
Twitter Incorporating the Universal Language Model Fine-
Tuning and SVM, Applied System Innovation. 2022, 5, 13,
pp: 1 – 16
[7] Harleen Kaur, Shafqat Ul Ahsaan, Bhavya Alankar &
Victor Chang, A Proposed Sentiment Analysis Deep Learning
Algorithm for Analyzing COVID-19 Tweets, Springer Link,
20 April 2021
[8] Lei Zhang, LinkedIn, Shuai Wang, Deep Learning for
Sentiment Analysis: A Survey
[9] V. Umarania, A. Juliana, J. Deepab, Sentiment Analysis
using various Machine Learning and Deep Learning
Techniques, Journal of theNigerian Societyof
PhysicalSciences 2021
[10] Govin Gaikwad, Prof. Deepali J. Joshi, Multiclass Mood
Classification on Twitter Using Lexicon Dictionary and
Machine Learning Algorithms, International Conference on
Inventive Computation Technologies (ICICT)2016
[11] A. N. Farhan and M. L. Khodra, "Sentiment-specific
word embedding for Indonesian sentiment analysis," in
ICAICTA, 2017.
Abstract— heart disease is considered as one of the common high-risk individuals and in making decisions about
health problem, and machine learning can be a powerful tool preventive measures and treatment [16]. The machine
for reducing the burden of disease. Heart Disease Prediction learning approach described in this paper can be used to
Model using Machine Learning is a process of using predict heart disease [6]. This approach can be helpful in
algorithms to learn based on the data and produce some identifying high-risk individuals and in making decisions
predictions about future events. The data used to train the
about preventive measures and treatment.
several different sources of machine learning algorithms,
including medical records, health insurance claims, and
Many machine learning algorithms are available that have
patient surveys. The predictions made by the machine
learning algorithm can be used to help prevent heart disease
applicability to heart disease prediction. A few of the more
by identifying risk factors and providing personalised prominent methods encompass logistic regression, decision
recommendations for treatment and lifestyle changes. The trees, and support vector machines [9]. Every single one of
heart disease prediction system correctly predicted heart these algorithms has its own perks and drawbacks.
disease in 96.7% of the test cases when using Random Forest
model The best algorithm for a particular application depends on
Keywords— Heart Disease, Machine Learning, the data and the specific prediction task. Logistic regression
Categorization, Regression, Random Forest is a popular method for heart disease prediction. This
method is used to build a prototype that reflects the
I. INTRODUCTION likelihood of a person developing heart ailment. The
prototype is based on a series of predictor variables.
Heart disease can be anticipated and detected early,
potentially saving lives. Models that can predict Common predictor variables used in logistic regression
cardiovascular dysfunction can be developed using models include youth, sexuality, lifestyle factors, and
machine learning techniques [4]. These models can be used cardiovascular disease in the genetic history. Decision trees
to determine who is at high risk and offer suggestions for are another well-known machine learning approach for
preventative therapy. In this study, we suggest a machine predicting coronary heart disease.
learning method for anticipating cardiac disease. Our
strategy is based on a classifier called a Support Vector Frameworks that forecast the likelihood that a person will
Machine (SVM). get heart disease are created using decision trees based on a
set of predictor variables [10]. Decision trees can be used to
We use a dataset of heart disease patients and healthy identify high-risk individuals and to provide
individuals, and we extract a number of features from each recommendations for preventative care. A potent machine
patient. We then train our SVM classifier on this dataset, learning algorithm called the support vector machines can
and evaluate its performance on a held-out test set. Our be used for heart disease prediction.
observations demonstrate that our technique may
accurately predict cardiac disease. In this study, a machine This algorithm is used to build a prototype that anticipates
learning technique for predicting coronary heart disease is the likelihood of a person developing heart ailment. The
presented. prototype is founded on several predictor variables.
Common predictor variables used in support vector
The strategy is based on a classifier called a Support Vector machine models include youth, sexuality, lifestyle factors,
Machine (SVM). A dataset of individuals having heart and cardiovascular disease in genetic history. The deep
disease and not having heart disease is used to train the learning algorithm for predicting coronary heart disease
classifier. The classifier is then tested on a held-out test set depends on the facts and the specific prediction task[11].
[5]. The results show that the approach can achieve good Different algorithms have different strengths and
accuracy in predicting heart disease. The proposed machine weaknesses. The best algorithm for a particular application
learning approach can be utilized as a tool for heart disease must be carefully selected.
prediction. This approach can be helpful in identifying
II. RELATED WORK measurements, and laboratory test results [1]. The study
An exponentially growing body of progress in the found that the machine learning algorithm could predict
development of machine learning for heart disease with accuracy which patients would develop heart disease
prediction. A number of Studies have demonstrated that within five years, with a specificity of 87%. Enhanced
data mining algorithms effectively predict the development examination used deep learning to anticipate cardiac
of heart disease, as well as to identify individuals at risk of disease based on a combination of demographic data,
developing the condition [7].The life - threatening disease clinical measurements, and electrocardiogram (ECG)
caused of mortality in the United States is heart disease, results [2].
and machine learning could potentially be used to predict The study found that the prediction of cardiovascular
which individuals are at risk for developing the condition. disease performance of the machine learning techniques,
There is a growing body of research that has to forecast with an accuracy of 92%. A third study used deep learning
cardiovascular problems, machine learning techniques were to anticipate cardiac disease based on demographic
used. and this literature review will summarise some of the information, clinical measurements, and ECG results [3].
key findings. The study proved that cardiovascular disease prediction
A recent comparative study [11] proposed a method capability of the machine learning algorithm has an
concerned with temporal data modelling by using accuracy of 95%.
convolutional neural network for predicting heart failures at These papers show how machine learning can be used to
an early stage and achieved 97% of accuracy. detect cardiac disease. Machine using supervised learning
A recent review by Domingos and colleagues (2015) found accurately foretells the development of heart disorder, and
that machine learning techniques can outperform traditional could indeed identify individuals at high risk of developing
statistical methods for predicting heart disease. Machine the condition [12].
learning approaches have also been found to be effective These models have the potential to improve the clinical
for identifying risk factors for heart disease [8]. management of heart disease, by identifying individuals at
For example, a study by Chen and colleagues (2016) used a risk of developing the condition and providing information
machine learning approach to identify novel risk factors for on the likely course of the disease[18]. However, more
heart disease. Overall, the literature suggests that the use of research is needed to determine how machine learning can
supervised learning as a technique for predicting heart be used to improve the accuracy of predictions and to
ailment. However, additional study is required to further identify individuals at risk for heart disease.
assess the precision of these forecasts. Some possible causes of heart disease include genetics,
One study used machine learning to generate a forecasting lifestyle choices, and certain medical conditions. For
technique for the development of cardiac diseases in a large example, someone might be more susceptible to
population-based cohort [17]. The study found that the cardiovascular disease if they have a family history of the
machine learning model was able to accurately foretell the condition. Additionally, the lifestyle chance of having
development of cardiac diseases, with integrity of over cardiovascular diseases can be increased by behaviours like
80%. The prototype was also able to identify individuals at smoking and eating poorly. Finally, certain medical
high risk of developing heart disease, with a positive conditions such as Hyperglycemia can also raise the danger
predictive value of over 90%. of heart disease [13].
Another study applied ML algorithms to build a risk model Some possible symptoms of heart related disease are pain
for cardiovascular disease prediction in a large cohort of in chest, difficulty in breathing, and an irregularity in
patients with diabetes. The study found that the machine heartbeat. Additionally, heart disease can lead to other
learning model was able to accurately foretell the conditions such as heart failure, which can cause fatigue
development of cardiac diseases, with integrity of over and swelling in the legs and feet. Some possible treatments
80%. The prototype was also able to identify individuals at for heart disease are the changes in lifestyle, taking proper
high risk of developing heart disease, with a positive medicines and surgery if needed.
predictive value of over 90%. Lifestyle changes such as eating a healthy diet and
A third study applied ML algorithms to build a risk model exercising regularly can help to improve heart health [19].
for cardiovascular disease prediction in a large cohort of Additionally, there are several medications that can be used
patients with hypertension. The study found that the to treat heart disease, such as beta blockers and ACE
machine learning model was able to accurately foretell the inhibitors. In some cases, surgery may also be necessary to
development of cardiac diseases, with integrity of over treat heart disease. Some possible complications of heart
80%. The prototype was also able to identify individuals at disease include heart failure, arrhythmias, and stroke[14].
high risk of developing heart disease, with a positive Additionally, heart disease can lead to other conditions
predictive value of over 90%. such as kidney disease. There are several things that can be
done to prevent heart disease. These include maintaining a
One of the studies used machine learning to anticipate healthy lifestyle, managing medical conditions, and taking
cardiac disease based on demographic data, clinical
medications as prescribed. Additionally, it is important to The dataset contains 303 occurrences with coronary artery
get regular checkups and screenings for heart disease. disease diagnoses and 14 characteristics. The data includes
information about each individual's demographics, medical
There are many different machine learning approaches that history, and heart health. The objective of this study is to
could be made use for predicting heart disease. Some evaluate whether or not an individual has heart disease.
common approaches include decision trees, support vector
machines, and artificial neural networks. All approaches
has their own merits and demerits, so it is advised to TABLE I. DATASET ATTRIBUTES [21]
A. Data set
The data set is a real-world dataset which is taken from
Kaggle. The dataset contains details of 303 patients. This
machine learning algorithm will be trained on a dataset of
patient information that includes various demographic
features (age, gender, race, etc.), lifestyle choices
(smoking, diet, physical activity level, etc.), and medical
history (family history of heart disease, previous heart
attacks, etc.).
This model will then be used to estimate the likelihood of
cardiovascular disease in new patients. The forecasts will
be due to the new patients' demographic features, lifestyle
choices, and medical history. The predictions will be made
on a scale of 0-100, with 0 indicating no chance of
developing cardiovascular disease and 100 indicating a
very deep chance of developing cardiovascular disease. Fig. 1. Proposed Method
• Then that data is spitted into 80:20 ratio for doing 4) Naive Bays: Naive Bayes is a kind of algorithm
the training of system and later for testing the for supervised learning that may be applied to both
model. regression and classification applications. Naive Bayes is a
• Then, a model for deep learning is trained on the popular choice for heart disease prognosis because it is
metrics. This model can be a linear model, a easy to interpret and explain.
decision tree, a random forest, or any other type of
P (Disease Symptoms) = P (Disease) * P (Symptoms Disease) /
model. P (Symptoms) (3)
• Finally, the model is used to predict the
likelihood; Figure 1 depicts cardiac illness in new where, P(Disease Symptoms) = the Given symptoms, the
patients. likelihood that a person has the disorder, P(Disease) is the
C. Algorithms probability that a person has the disease, P(Symptoms
Disease) is the probability that a person has the
There are many methods that can be utilized in machine
characteristics indicating the presence of the illness and
learning to anticipate cardiac problems. Some of the most
P(Symptoms) is the probability that a person has the
common methods are:
symptoms.
1) Support Vector Machines: The supervised
So, using the formula above, we can calculate the
learning approach known as supporting vector machines
probability that a person has heart disease given their
(SVMs) can be applied to both regression and classification
symptoms.
applications. SVMs are a popular choice for heart disease
prediction because they can model non-linear decision 5) Logistic Regression: Logistic regression is a kind
boundaries. of algorithm for supervised learning that may be applied to
both statistical classification applications. Logistic
The Support Vector Machine (SVM) formula for heart
regression is a popular choice for heart disease prediction
disease prediction is:
because it can model non-linear decision boundaries.
P (heart disease) = 1/ (1 + e^-(SVM (age, sex, cholesterol, systolic blood
pressure, smoking status, diabetes) +b)) (1) P (heart disease) = 1 / (1 + e^-(β0 + β1*age + β2*sex + β3*chest pain +
β4*resting blood pressure + β5*cholesterol + β6*fasting blood sugar +
where, SVM is the support vector machine model, age is β7*resting electrocardiographic results + β8*maximum heart rate
achieved + β9*exercise induced angina + β10*old peak + β11*slope +
the Patient's time of life, cohabitation is patient's sex (male β12*number of major vessels + β13*thal)) (4)
= 1, female = 0)., cholesterol is the cholesterol level of the
patient, systolic blood pressure is the systolic blood Where, β0 = the intercept β1-β13 = the coefficients for
pressure of the patient, smoking status is the smoking status each of the predictor variables e = the natural logarithm
of the patient (current smoker=1, never smoked=0, former
6) Neural Networks: Neural networks are a group of
smoker=0.5), diabetes is the diabetes status of the patient
machine learning strategies that may be applied to
(diabetic=1, not diabetic=0), and b is the bias term.
applications requiring classification and regression. Neural
2) Decision Trees: The supervised learning credible networks are a popular choice for heart disease prediction
source of information as decision trees can be applied to because they can model complex non-linear relationships.
both supervised and unsupervised situations. A decision The neural network mathematical expression for prediction
tree is a popular choice for heart disease prediction because of heart disease using ml algorithms provides an output
they are easy to interpret and explain. variable that is the risk of cardiovascular disease from a
variety of input elements. The input variables can be any of
If (age is less than 45) AND (cholesterol is less than 240) the following: Time of life, sexuality, the kind of chest
THEN predict heart disease as not present. pain, ambient hypertension, total cholesterol, fasting
If (age is superior to or equivalent to 45) AND (cholesterol glucose levels, the accelerated heart rate attained, strength
is superior to or equivalent to 240) THEN predict heart training angina, the amount of blood vessels that supply
disease as present. (0–3) colored by aerobic activity ST depression, the slope
of the peak exercise ST segment, and fluoroscopy, and
3) K-Nearest Neighbours: K-Nearest Neighbours (K- thalassemia.
NN) is a kind of algorithm for supervised learning that may
be applied to both detection and recognition problems. Due 7) Random forest: This is a method which is suitable
to its simplicity in interpretation and explanation, k-NN is a for determining health complications by creating a random
well-liked option for heart disease prediction. forest from the data. Random Forest is a good choice for
heart disease prediction as it can handle both continuous
P (Disease|x1, x2, x3) = P (Disease) * P (x1|Disease) * P (x2|Disease) * and categorical variables. It is also resistant to over-fitting
P (x3|Disease) (2)
and can model non-linear relationships.
Where, P (Disease|x1, x2, x3) is the probability of disease P (heart disease) = 1 - P (no heart disease) (5)
given the three predictors x1, x2, and x3. P (Disease) is the
prior probability of disease. P (x1|Disease), P (x2|Disease), P (no heart disease) = (1 - P (forest)) ^N (6)
and P (x3|Disease) are the conditional probabilities of the Where, N stands for the forest's total number of trees.
predictors given disease.
Fig 2. Correlation Matrix of data. Cardiovascular disease can be detected using a variety of
The heart disease prediction system correctly predicted heart approaches to machine learning. Some of the more popular
disease in 96.7% of the test cases. ones encompass support vector machines (SVM), decision
trees, and logistic regression... When choosing a computer
learning algorithm for this problem, it is important to
consider the nature of the data.
For example, if the data is very imbalanced (i.e., there are REFERENCES
much more healthy patients than patients with heart
disease), then a technique like decision trees may not be the [1] Chen, M., et al. "Prediction of future coronary heart disease using a
best choice. This is because decision trees tend to over fit risk score based on a machine learning algorithm." PLoS One 9.2
(2014): e88758.
on the minority class (in this case, the patients with heart
[2] Mani, K., et al. "Machine learning for automated detection of
disease), and they may not generalise well to unseen data. coronary artery disease." IEEE transactions on Information
Technology in Biomedicine 11.3 (2007): pp. 317-325.
The magnitude of the data set is another vital factor. If the
data set is very small, then it may be better to use a simpler [3] Ghasemi, A., et al. "Heart disease prediction using machine
algorithm like logistic regression. This is because more learning algorithms." International journal of computer science
and engineering 6.2 (2015): pp. 91-99.
complex algorithms like support vector machines can be
very sensitive to over fitting on small data sets. Once a [4] Predicting Heart Disease with Machine Learning.
machine learning algorithm has been selected, the next step
[5] Heart Disease Prediction Using Machine Learning Approaches:A
is to train it on the data. This is typically done using a Review. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5822181/
training set, which is a subset of the data which is used for
[6] Machine learning in cardiovascular disease prediction and
training the model. The remaining data is then used to test
prognosis.
the performance of the model. There are many ways to Https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6478972/
evaluate the accuracy of a machine learning algorithm. One
popular metric is accuracy, which simply measures the [7] Sun, J., et al. (2017). Prediction of Incident Heart Disease Using
Machine Learning in a Population-Based Cohort. JAMA
percentage of correctly classified instances. Cardiology, 2(7), 775-783.
Another metric is precision, which measures the percentage [8] de Lemos, J. A., et al. (2017). Development and Validation of a
of positive predictions that are actually correct. Precision is Machine Learning Risk Score for Heart Disease in Patients With
often more important than accuracy in medical Diabetes. Diabetes Care, 40(8), 1147-1154.
applications, because it is more important to avoid false [9] Flavio A. Almeida, et. al. "Heart Disease Prediction Using
positives (i.e. the diagnosis of heart disease in an individual Machine Learning Techniques." IEEE-CIS Data Mining Cup 2017.
who does not have it) than it is to prevent systematic error Available: https://ieee-cis.org/competition/2017/cis-dm-cup.
(i.e. predicting that a patient does not have heart disease [10] J.M. Gonzalez, et. al. "Heart Disease Prediction Using Machine
when they do). Learning Techniques." International Conference on Advances in
Computing, Communications and Informatics, 2016. Available:
Once the machine learning algorithm has expertise in the https://ieeexplore.ieee.org/abstract/document/7839190
field and evaluated, it could be used to produce forecasts [11] Sharean, TM Angelin Monisha, and G. Johncy. "Deep learning
based on fresh data. This is typically done by providing the models on Heart Disease Estimation-A review." Journal of
algorithm with a new set of data (such as a patient's Artificial Intelligence 4, no. 2 (2022): 122-130.
medical history) and having it predict whether or not the [12] Chambless, L. E., et al. (2017). Development and Validation of a
patient has cardiac affliction. Machine Learning Risk Score for Heart Disease in Patients With
Hypertension. American Journal of Hypertension, 30(5), 473-480.
V. CONCLUSION [13] Dangare Chaitrali S and Sulabha S Apte. "Improved study of the
heart disease prediction system using data mining classification
The machine learning-based technique for accurately techniques." International Journal of Computer Applications 47.10
detecting disease is an effective tool that can aid specialists (2012): 44-8
in assessing a physician's probability of developing heart
[14] Shanmugasundaram, G., Selvam, V.M., Saravanan, R., Balaji, S.:
disease. After observing the results of the models, An investigation of heart disease prediction techniques. In: 2018
exploring and analysing the data, we can conclude that IEEE International Conference on System, Computation,
there are a number of risk factors for cardiovascular Automation and Networking (ICSCA). pp. 1–6. IEEE(2018)
disease. Youth, sexual identity, and genetic factors are a [15] Venkatalakshmi, B., Shivsankar, M.: Heart disease diagnosis using
few of these risk variables that cannot be altered. Smoking, predictive data mining. International Journal of Innovative
nutrition, and exercise are a few more independent Research in Science, Engineering and Technology 3(3), 1873–7
predictors that can be modified. (2014)
disease, we have employed several machine learning [17] Ramalingam VV, Dandapath A, Raja MK. Heart disease prediction
techniques. We have found that the heart disease prediction using machine learning techniques: a survey. Int J Eng
Technol.2018;7(2.8):684–7.
system correctly predicted heart disease in 96.7% of the test
cases while using random forest Classification model.
This accuracy is not too perfect, and there is room for
improvement. But for estimating the likelihood of
developing heart disease, the random forest approach is a
solid place to start.
[18] Soni Jyoti. "Predictive data mining for medical diagnosis: An [20] Jee S H, Jang Y, Oh D J, Oh B H, Lee S H, Park S W & Yun Y
overview of heart disease prediction." International Journal of D (2014). A coronary heart disease prediction model: the
Computer Applications 17.8 (2011): 43-8. Korean Heart Study. BMJ open, 4(5), e005025.
[19] Ganna A, Magnusson P K, Pedersen N L, de Faire U, Reilly M, [21] Khateeb, Nida, and Muhammad Usman. "Efficient heart disease
Ärnlöv J & Ingelsson E (2013). Multilocus genetic risk scores prediction system using K-nearest neighbor classification
for coronary heart disease prediction. Arteriosclerosis, technique." In proceedings of the International Conference on
thrombosis, and vascular biology, 33(9), 2267-72. Big Data and Internet of Thing, pp. 21-26. 2017.
Likhitha S Mayuri P
Master of Computer Application Master of Computer Application
New Horizon College of Engineering New Horizon College of Engineering
Bengaluru, India Bengaluru, India
likhithas1111@gmail.com mayuri21prakash@gmail.com
Abstract— Agriculture efficiency is something on which the spots in leaves, blight, rusty brown, and rich health. The
economy profoundly depends on. Thus, there is always a need to proposed model will use these input data to generate
enhance the yield of crops. In agriculture, identification of the patterns by which disease can be predicted in early stage
plant disease is important for ensuring yield. Use of machine using these patterns. The quality of the dataset used for
learning algorithms from the field of Artificial Intelligence is
being majorly used by the researchers. In ongoing research,
training is very important in supervised learning.
efforts are being undertaken to analyze and derive the best Numerous studies and research have been
classification technique from the discipline of computer science conducted in this field by making use of learning algorithms
for plant disease identification. This paper comprises an overview Traditional machine learning approach used are
of the Convolutional Neural Network using machine learning Convolutional Neural networks, Random Forest classifier
approach for disease identification and classification. The (RFC), K-Nearest Neighbor classifier (KNN), and Support
dataset used in current research is explicitly described and result Vector Machine (SVM) classifier. Selection of features from
are presented in this paper. the dataset and the size of data used for training form key to
the performance of any machine learning classifier. Features
Keywords— Diseased Leaf, Machine Learning Classification,
EfficientNet, Convolutional Neural Network, Image preprocessing.
mainly considered by the plant disease classifiers are the
color of the leaves, amount of damage, texture parameters
I. INTRODUCTION like smooth, shiny, and leathery. Image processing
techniques are used majorly in image classifications of the
In provincial regions of the country, it is quite hard to detect dataset.
any disease which may be present in their harvest. Plant Introduction and presentation of the related studies is
diseases are one of the major issues which will cause the presented in Section I and II respectively. Experimental
shortage of food productions as plant disease will affect the outline and proposals are given in Section III. Results with
quality and growth rate of the plant and also it will cause discussions thereof are given in Section IV. Section V
threat to the overall agriculture production and thereby highlights the conclusion drawn from the current study with
decline the economy of country. This research is to detect the future scope of work.
the diseased plants or the affected plants belonging to
poaceae family and thus enable it to reach its maximum II. LITERATURE REVIEW
potential of production. The current research is conducted so
as to outline the destruction of plant disease on productions. Systematic review of literature is carried out in the present
The research shows that disease caused to several types of work. To start with the areas where the machine learning
plant has caused tremendous loss to yield of crops such as techniques are gaining the attention of the researchers are
wheat, rice, potato, corn and soybean, in this rice yield has reviewed to arrive a t the area to be explored in the current
been affected by 40%, wheat is affected by 30% loss of work. Machine learning is a subject of study in Computer
yield, potato is affected with 21% loss of yield, corn has Science which is discovering applications in a variety of
affected by 41% loss of yield and soyabean is affected by computer applications like disease identification[1], [2],
30% loss of yield [1]. Knowledge about management of annotation [3], and business intelligence/ training chat
disease control is less in most of the regions in India, drastic bots[4]. On systematic review of literature a problem related
climate changes, poor disease control are one of the main to plant disease identification was narrowed. To understand
key factors that arise in reduced productions. the role of machine learning in various disease identification
Various inventions and technologies has been tasks some related work was identified and studied.
introduced to reduce post-harvest crop processing and to Analytical highlight of use of machine learning in health
increase the sustainability of crops and also to upscale the care domain is well illustrated by a researcher. Various
production. Modern methods like Machine Learning have algorithms and testing techniques are highlighted[5]
been introduced. It is well-liked due to its straightforward
design and wide applicability. Supervised anomaly detection Research close to the area of the current research uses
is used as the base where trained datasets are created and convolutional Neural network classifier using two stages to
items in the dataset are labeled into four categories: grey classify herbal Tulsi leaves. Color, measurement and shape
based features are used for training the classification model methods. The suggested model consists of transform of
[6]. wavelets in its discrete form, principal analysis of
components, grey level cooccurrence in two dimensions
Feature subset selection is an important component in vector and convulsionary neural network are used along
machine learning algorithms. The researchers have with other ML techniques. It is evaluated using 600 samples
illustrated in detail the process of feature selection for from the tomato village dataset and has a 99.5% accuracy
diagnosis of cervical cancer[7]. rate [12]
Machine learning is typically utilized by a variety of The Research was conducted to identify the pattern
businesses to improve performance. Additionally, machine and detect the disease caused in cotton plant by using the
learning methods are employed to tackle some challenging snake segmentation along with HU moments acting as
issues in systems that could hold extremely important data. identification character. The BPNN classifier will address
It is important to assess a machine learning algorithm's various problems of classes and in mean time the active
performance and tolerance to attacks. In research, using four couture model is used to restrict the active components
distinguished datasets and three metrics, the resilience and inside infected area. The categorization rate is
performances of six machine learning algorithms is studied approximately 85.52% [13].
and analyzed against two forms of adversarial attacks. An Convolutional Neural Network is chosen to conduct the
analysis of the performance of each algorithm for a specific study and it shows an accuracy of 94.6% accuracy in early
dataset is done through the modifying of the amount of disease detection of plants in a research [14].
poisoned data and behavior analysis for the rate of accuracy
with AUC score and f1 score. Machine learning algorithms A Le-Net architecture using convolutional neural networks
provide a range of performance results and robustness for object recognition and image classification using 12673
against various adversarial approaches, according to samples of plants implements a model with 99.32%
analysis results. Additionally, each level of an adversarial accuracy [15].
attack has a varied impact on machine learning algorithms.
Furthermore, the kind of the dataset has a significant impact For the evaluation of the performance of the proposed
on how a machine learning system behaves [8]. model
III. PROPOSED SYSTEM
In research conducted on potatoes plant to detect the disease
uses the feature of potato disease identification using Fig. 1 and Fig. 2 gives a brief layout of the preprocessing and
principles of image segmentation after preprocessing. Here subsequent steps involved in the proposed system. The steps
help to develop an experimental setup for the model to identify
seven classification algorithms of machine learning are used
and classify disease in poaceae family of leaves. This section
in the research to check the effectiveness of each algorithm.
gives explanation of pre-processing of the dataset, extraction of
Among these Random Forest classification shows the better the features, and Poaceae Family Leaf disease prediction with
accuracy of potato leaf detection with 97% accuracy [9]. classification.
B. Feature Extraction
Extracting various characteristics of image or a leaf which
include color, texture and shape features is called as feature
extraction. Global Feature Descriptor is used in the current
research. Feature of image is extracted as a whole with
global feature descriptor. Instead of taking a part of the
image, global feature descriptor takes the entire image for
processing and extracting features. The major feature
descriptors used for feature extraction are:
Fig. 3. Sample images of the specimen collected for the dataset
a) Hu Momemts: Hu Moments are used to quantify an
2) Plant Image Processing: Image normalization and object's form in an image. The object's outline is typically
denoted by it. Iteratively computing the image's moments
color conversion are the two main processes in the process.
after converting a color image to a grayscale version. Once
During picture normalization, an image is resized to
it is done, the shape feature's vector is returned.
260x260 pixels and any extraneous noise is also eliminated.
For the purpose of using the procedure, the BRG color b) Haralick Texture: Haralick texture features
descriptor extracts texture features. The images that are
format is transformed into RGB and HSV.
coloured are converted into the gray scale images to extract
the feature of the leaf through the obtained gray images. The
obtain the feature of the Haralick feature and texture grey
level co-occurrence matrix is used as key element.
These diseases are classified and predicted in early stage by [13] P. R. Rothe and R. V. Kshirsagar, “Cotton leaf disease identification
using pattern recognition techniques,” in 2015 International
using convolutional neural network model EfficientNet.
Conference on Pervasive Computing (ICPC), Pune, India, Jan. 2015,
EfficientNet is an efficient convolutional neural network pp. 1–6. doi: 10.1109/PERVASIVE.2015.7086983.
method which outperforms in providing accuracy and exact [14] S. Kumar, V. Chaudhary, and S. K. Chandra, “Plant Disease
scaling in predicting disease. Healthy leaves are also Detection Using CNN,” p. 7, 2021.
[15] S. Wallelign, M. Polceanu, and C. Buche, “Soybean Plant Disease
considered in the input data set as a comparative element in
Identification Using Convolutional Neural Network,” p. 7.
the model. The proposed model in this paper distinguishes [16] “corn-or-maize-leaf-disease-dataset.”
healthy leaves also. Convolutional neural network is mainly https://www.kaggle.com/datasets/smaranjitghose/corn-or-maize-leaf-
used as of now and results thereof are presented in the disease-dataset
research. The same is chosen due to the findings of the
author of this paper from review of literature. Convolutional
neural network algorithm is chosen for present study as it
has automatic and adaptive hierarchies of feature and also it
is most efficient algorithm according to several research in
field of plant disease detection when compared to other
machine leaning algorithm.
Future experiments may be conducted using other machine
learning algorithms. Input dataset may be further distributed
more rationally on other disease types. More pre-existing
datasets may be considered for future experimentation.
REFERENCES
[1] J. Azmi, M. Arif, M. T. Nafis, M. A. Alam, S. Tanweer, and G.
Wang, “A systematic review on machine learning approaches for
cardiovascular disease prediction using medical big data,” Medical
Engineering & Physics, vol. 105, p. 103825, Jul. 2022, doi:
10.1016/j.medengphy.2022.103825.
[2] E. Dritsas and M. Trigka, “Machine Learning Techniques for Chronic
Kidney Disease Risk Prediction,” BDCC, vol. 6, no. 3, p. 98, Sep.
2022, doi: 10.3390/bdcc6030098.
[3] J. B. Fernandez, G. M. Venkatesh, D. Zhang, S. Little, and N. E.
O’Connor, “Semi-Automatic Multi-Object Video Annotation Based
on Tracking, Prediction and Semantic Segmentation,” in 2019
International Conference on Content-Based Multimedia Indexing
(CBMI), 2019, pp. 1–4. doi: 10.1109/CBMI.2019.8877450.
[4] E. Tebenkov and I. Prokhorov, “Machine learning algorithms for
teaching AI chat bots,” Procedia Computer Science, vol. 190, pp.
735–744, 2021, doi: 10.1016/j.procs.2021.06.086.
[5] B. Nithya and V. Ilango, “Predictive analytics in health care using
machine learning tools and techniques,” in 2017 International
Conference on Intelligent Computing and Control Systems (ICICCS),
2017, pp. 492–499. doi: 10.1109/ICCONS.2017.8250771.
[6] S. Manoharan J, “Flawless Detection of Herbal Plant Leaf by
Machine Learning Classifier Through Two Stage Authentication
Procedure,” JAICN, vol. 3, no. 2, pp. 125–139, Jun. 2021, doi:
10.36548/jaicn.2021.2.005.
[7] B. Nithya and V. Ilango, “Enhanced machine learning based feature
subset through FFS enabled classification for cervical cancer
diagnosis,” Int. J. Knowl. Based Intell. Eng. Syst., vol. 26, no. 1, pp.
79–89, 2022, doi: 10.3233/KES-220009.
[8] M. Govindaraj, P. Murugeswari, N. Bharathiraja, R. Thiagarajan, I.
S. B. Ahamed, and T. Manikandan, “Evolution of IOT in health care
by protecting and safeguarding private security in healthcare,” ijhs,
pp. 5912–5920, Jul. 2022, doi: 10.53730/ijhs.v6nS6.11133.
[9] Md. A. Iqbal and K. H. Talukder, “Detection of Potato Disease Using
Image Segmentation and Machine Learning,” in 2020 International
Conference on Wireless Communications Signal Processing and
Networking (WiSPNET), Chennai, India, Aug. 2020, pp. 43–47. doi:
10.1109/WiSPNET48689.2020.9198563.
[10] P. Panchal, V. C. Raman, and S. Mantri, “Plant Diseases Detection
and Classification using Machine Learning Models,” in 2019 4th
International Conference on Computational Systems and Information
Technology for Sustainable Solution (CSITSS), Bengaluru, India,
Dec. 2019, pp. 1–6. doi: 10.1109/CSITSS47250.2019.9031029.
[11] G. Owomugisha, J. A. Quinn, E. Mwebaze, and J. Lwasa,
“Automated Vision-Based Diagnosis of Banana Bacterial Wilt
Disease and Black Sigatoka Disease,” p. 6.
[12] S. S. Harakannanavar, J. M. Rudagi, V. I. Puranikmath, A. Siddiqua,
and R. Pramodhini, “Plant leaf disease detection using computer
vision and machine learning algorithms,” Global Transitions
Proceedings, vol. 3, no. 1, pp. 305–310, Jun. 2022, doi:
10.1016/j.gltp.2022.03.016.
ABSTRACT: "Human Activity Recognition" (HAR) refers The Logistic Regression can also be implemented as a
to the ability to recognise human physical movements using multi-classification problem by dividing the data into subsets of
wearable devices or IoT sensors. In this epidemic, the majority binary class. The reason for choosing the Logistic Regression for
of patients, particularly the elderly and those who are comparison with M LP is it handles the categorical class labels
extremely ill, are placed in isolation units. Because of the quick efficiently[24]. The given dataset contains class labels in
development of COVID, it's tough for caregivers or others to categorical form. The models to solve the multi-classification
keep an eye on them when they're in the same room. People are problem, the Logistic Regression uses one versus rest mechanism
fitted with wearable gadgets to monitor them and take i.e., for finding the activities related to sitting it considers sitting as
required precautions, and IoT-based video capturing 1 and all the remaining 5 labels are considered as 0 [19]. Let us
equipment is installed in the isolation ward. The existing illustrate the one versus rest mechanism using some sample records
systems are designed to record and categorise six common as shown in table x.
actions, including walking, jogging, going upstairs, downstairs,
Table 1: S ample Dataset to illustrate one versus rest
sitting, and standing, using multi-class classification
algorithms. This paper discussed the advantages and mechanism
limitations associated with developing the model using deep
Us X X X2 … ZS TAND RES ULCLAS
learning approaches on the live streaming data through sensors
er 0 1 … DEV TANT S
using different publicly available datasets. … LABE
…. L
Keywords: WEKA, Convolution Neural Networks, Human 33 0. 0. 0.1 4.05 11.96 Joggin
Activity Recognition, Sensor Signals, Bi-Long Short Term 04 09 4 g
Memory, Semi-Supervised learning, SUB Interactions 34 0. 0. 0.0 5.43 12.05 Joggin
12 12 6 g
INTRODUCTION: 35 0. 0. 0.1 3.13 8.63 Walki
To capture the human activities and to classify those using CNN 09 09 ng
36 0. 0. 0.1 2.09 9.87 Upstai
algorithms many researchers have worked on open-access datasets
12 12 2 rs
by measuring their Inertial M easuring Units (IM U) [17]. The 37 0. 0. 0.1 1.98 9.62 Downs
proposed system has attached IoT sensors to the user and 1 1 4 tairs
maintained an Actitracker[16] Dataset in the local server to capture The above sample database is converted into one versus rest matrix
and predict the class labels of the human activities. To develop as shown in table 1.
algorithms for these types of problems is the best domain to utilize
is “Image Processing integrated with Artificial Intelligence”. Table 2: One versus Rest Matrix for Actitracker Dataset
Image processing [18] is a technique for performing operations on S ample
an object to maintain it or obtain helpful information. It's a type of
modulation processing where the input is an image and the output Walki Joggin Upstai Downstai S ittin S tandi
can be either an image or its features. The goal of artificial ng g rs rs g ng
intelligence is to boost computer functions that are close to real 3 0 1 0 0 0 0
3
knowledge, along with reasoning, learning, and problem-solving.
3 0 1 0 0 0 0
One of the main aims of Artificial Intelligence is to replicate the 4
human recognition process. 3 1 0 0 0 0 0
For handling continuous numerical data, regression 5
algorithm implementation is popular. To handle the categorical 3 0 0 1 0 0 0
data class labels requires some additional conversion mechanism 6
like one versus one or one versus rest mechanisms. Different 3 0 0 0 1 0 0
regression mechanisms like linear, lasso, polynomial, ridge, and 7
other regression algorithms are popular and many of the real-world
problems use linear regression, Support Vector M achine The existing system obtains the binary value to construct the one
regression, Decision Trees Regression for getting accurate results.
versus rest matrix by using the linear parameter known as
The proposed paper considered Logistic Regression for performing “sigmoid”. If the predicted value is greater than or equal to 0.5 it
the comparative study with the deep learning technique [20].
outputs the value as 1 otherwise it outputs the value as 0. A similarity matching loss for convolution layer and prediction loss
hypothesis function is defined to optimize the objective, which is for linear classifier layer. The similarity matching loss is defined as
used to update the function value so that a clear relationship process of minimizing the difference between output of CNN layer
maintains between the class labels and features. The model also and target variable for each layer by adjusting the weights. The
computes the cost function using the gradient descent method to computation is shown in equation (1)
find the distance between the predicted label and the actual label.
LITERATURE SURVEY:
[1] Federico Cruciani et al designed a feature learning algorithm - (1)
using CNN with a pre-trained model. The model considered IM U
and Audio datasets and automatically extracted the features. Using The model assumes two matrices as input; one matrix containing
hyper parameterization concept, the model analyzed the quality of output direction of each layer, second contains target values in the
the extracted features. This model greatly focused on training the form of one-hot encoding. It needs number of layers and the value
system by neither considering neither less nor huge amount of data. of certainty layer as input. The computation of local losses design
The model considered the hyper parameters values as represented is represented in figure 1.
in table 3. The hyper parameters are chosen by performing Random
Forest search with 5 folded validations.
The temporal CNN filters identify the hidden patterns associated reducing the width of the image using pooling layers. Since these
with the previous layers and a feature map is constructed by features are non linear in nature it summarizes that the application
of ReLu activation function improvises the extraction process[23]. dimensions using bayesian optimization. The major goal of this
The Spatial Group Lasso (SGL) technique analyzes the each technique is to maximize the convergence of data point by
parameter of each signal captured and computes their relevant computing the conditional independence probability at each sample
scores. At this junction, the dimensionality of the matrix gets point.
reduced and most of the values becomes scalar. These filtered
parameters are grouped based on the threshold value, which is [7] Nidhi Dua et al, GRU based CNN by creating the data
hyper parameter initialized by the model. From these normalized segments using sliding window protocol. The model integrated
vectors and importance measure, the model classifies the activity RNN along with CNN by considering CNN to store the acquired
performed by the human. features in multiple arrays. These reduced features are obtained by
performing multiplication between the local variables with filter
[4] Negar Golestani et al, implemented a framework to recognize variables. The summation of these outputs is passed as a non-linear
the signals using magnetic induction. The model initially function to RNN to find the interesting features by attaching a local
established communication between signals and humans through patch to each region. The time series data is stored in the form of
magnetic induction, which is a wireless mechanism. A matching 1D by analyzing the time series pattern and the context between the
network improves the efficiency of the communication through L- series of activities. M any human beings do a lot of continuous
reversed process. The network generates voltage gain to analyze activities, so this model implements GRU units to store that
the patterns associated with time based signals continuously. Eight sequence of activities. The model efficiently handles the local
different parts of the human are attached with M I coils and based dependencies problem by varying the filter sizes dynamically
on their movements; geometric operations are applied to create a changing the size of filter depending on the reduced number of
synthetic dataset. The model applies cross coupling techniques on features and time span for the required for the living stream.
time and frequency related parameters to eliminate the inferences
during the recognition process. R-square mechanism identifies the [8] Zhongzheng et al, utilized transfer learning model which adapts
similarities between the actions and ignores the one with least the joint probability and it also assumed pseudo labels. These
weighted average. The RNN with 5 layers classifies the activities labels are generated using JPDA to minimize the cumulative errors.
by extracting the necessary features. The main focus of the algorithm lies in the process of domain
transfer by mapping unknown samples to known samples based on
[5] Emilio Sansano et al analyzed different neural network the knowledge base. The data is reconstructed using PCA, which
algorithms to recognize the human activity. In the pre-processing has low feature space. A sub space is created by analyzing the
step, the class labels are segmented based on the measurements learning parameters associated with each domain using SLPP and
obtained from different sensors. For every measurement, the time promotion of class alignment is achieved. Sub samples belonging
is recorded to evaluate the load performance of the model. All the to the same class are projected on the domain space and their
studied deep learning models contain one convolution layer and closeness is estimated through laplacian regularization matrix. An
two pooling layers with a softmax classifier to store the Eigen decomposition technique is applied to classify the data by
dependencies between the values obtained from different sensors. using the pseudo and ground truth class labels.
These models can handle the problem of overfitting by performing
the 5-folded cross-validation and adding dropouts for all the layers [9] M d M ofijul Islam et al, proposed a learning approach using
of CNN. Among the different deep learning models, the gradient GAT network to deal with the noisy captured by the sensors. It also
recurrent unit (GRU) performs better on all the available datasets allows the complicated system to learn the patterns hierarchically
with optimal loss value and maximal accuracy rate. by finding the complement of the multi modal features. The model
has the following sequential models as presented in figure 3.
[6] Sakorn et al proposed sensor based LSTM with 4 layers
associated with time series domain for recognition. The model uses
smart phone to capture the movements of human being instead of
sensors. Instead of single split of dataset, the model once again
divides the training dataset into validation and train. On this
validation data, the model applies five types of LSTM models by
hyper turning the estimators of the CNN. The model gets the data
segments through gyroscope and accelerometer to evaluate all the
Initially from the sensor signals, the features are batches. The model employs pre-trained encoder model
processed in the form of segments, with different to fuse the different interactions to create inter and intra
modularity. The RGB colors are extracted using the to end training. The temporal information from the live
ResNet model using integrated LSTM , because it has to stream videos are captured through Bi-LSTM . The model
capture long sequences. The salient features are extracted extracts all the essential features using Inspection-V3
based on the context and it adapts to the training model pre-trained model and divides them into two input blocks
by designing attention model. and one output block. Since, the model contains
interaction activities, it implements RM SProp optimizer
[10] Kemilly et al, designed autonomous auto encoder by to reduce overfitting problem. All the symmetric
analyzing the hand crafted features. In this model, interactions are filtered through block A and asymmetric
complex features are taken care by the multi are filtered through block B. The length of the captured
classification algorithm. Ensemble KVN which is a video frame is not known in advance, so the module
combination of kNN, very fast DT and NB are applied to implements Bi-LSTM , which can handle varying amount
recognize the human activities. The noise data is of input data. The advantage of Bi-LSTM lies in storing
segmented through filters of auto encoders which are both past and future features extracted from the video
integrated with window sliding and overlapping factors. analyzed sentiment. The model implements fusion
The major goal of this auto encoder is to co-train and re- techniques to create dynamic activities and finally CNN
train the model to extract the M eta heuristic features so classifies the activities.
that it needs very simple and useful classifiers to achieve
the task. The model applies offline training to collect the [13] Vasundhara Ghate et al discussed hybrid approaches
data from multiple users but performs online validation of deep learning to recognize the daily activities of the
to recognize the activity. human being. The data is pre-processed using the
traditional filter approaches and segmented using sliding
[11] TANG et al, designed a self training HAR system window. Instead of gathering the essential data from
based on the unlabeled data, which is a semi-supervised single parameter, it extracted important features from
process. In this model, the process starts with training the multiple parameters and constructed its one input vector.
labelled data segments using teacher model later these Finally, it applied neural networks with different
are formed to larger group of unlabelled data. The fine activation functions.
tuning process is performed by the student model which
gets one more input data from pre-trained classifiers. [14] Sravan Kumar Challa et al, proposed multi branch
During the teacher training phase, the loss function of the system by invoking nominal filters to pre-process the
multi classification is computed using the following data. Based on the captured sensor data, it is converted
equation (2) into fixed size windows. The major task of this division
is to avoid overlapping by defining the correct size of
filter. The strongly correlated features are stored as 1-D
vector and then the frames are converted into multi
dimensions based on the relation between local variables
and time series data. The model to classify the activities,
- (2)
it constructs a multi branch decision node and based on
the input along with time distribution a flatten pool is
created. These flatten layers are concatenated to act as
The data available in the public datasets are not input to the Bi-LSTM and classification is done using the
sufficient, so the model trains the samples to compute the softmax layer.
highest softmax probability. The obtained values are used
[15] Khan M D et al, developed attention based NN by
to generate the synthetic data, which improves the size of dilating the layers to perform semantic segmentation of
the dataset. The validation of the data is performed using the video frames captured. The model down samples the
the student model, where loss is computed for every residual layers and constructs its own learning block by
single iteration. The iterations with minimum error rate enhancing the quality of the extracted features. It
are frozen and the remaining layers are designed to implements skip connection technique which is famous
predict the class labels. for learning the features globally. The main advantage of
this technique lies in avoiding the loss of structure during
[12] Tej Singh et al, implemented coupled network by the transformation process. Instead of local loss, the
utilizing RGB frames at the last layer of network. The model computes the central loss and adjusts the weights
first layers of CNN act as fine tune of color by giving end accordingly
CONCLUSION:
In computer vision and pattern recognition, human [3] E. Kim, "Interpretable and Accurate Convolutional Neural
activity recognition in videos is a hot topic. Artificial Networks for Human Activity Recognition," in
intelligence (AI)-based solutions are now required for IEEE T ransactions on Industrial Informatics, vol. 16, no. 11, pp.
7190-7198, Nov. 2020, doi: 10.1109/T II.2020.2972628.
human behaviour analysis and security. Pre- trained [4] Golestani, N., Moghaddam, M. Human activity recognition
weights of different AI architectures for the visual using magnetic induction-based motion signals and deep
representation of video frames in the training stage are recurrent neural networks. Nat Commun 11, 1551 (2020).
https://doi.org/10.1038/s41467-020-15086-2
used in most extant action recognition systems, which
affect feature discrepancy determination, such as the [5] Sansano, E., Montoliu, R., & Belmonte Fernández, Ó.
(2020). A study of deep neural networks for human
separation between visual and temporal indications. All activity recognition. Computational Intelligence, 36(3),
the existing systems have proposed either traditional 1113–1139. https://doi.org/10.1111/coin.12318
machine learning algorithms or compared deep learning [6] Mekruksavanich, S., & Jitpattanakul, A. (2021). LST M
Networks Using Smartphone Data for Sensor-Based
algorithms using public datasets. Deep learning (DL)- Human Activity Recognition in Smart Homes. Sensors,
based approaches have recently been effectively applied 21(5), 1636. doi:10.3390/s21051636
to time series data collected by smart phones and [7] Dua, N., Singh, S. N., & Semwal, V. B. (2021). Multi-input
wearable sensors in order to anticipate various human CNN-GRU based human activity recognition using
wearable sensors. Computing. doi:10.1007/s00607-021-
behaviours. Even while DL-based techniques fared well 00928-8
in activity recognition, managing time series data is still a [8] Fu, Z., He, X., Wang, E., Huo, J., Huang, J., & Wu, D.
hurdle. With time-series data, a number of challenges (2021). Personalized Human Activity Recognition Based
persist, including difficulty extracting features, on Integrated Wearable Sensor and T ransfer Learning.
Sensors, 21(3), 885. doi:10.3390/s21030885
excessively biased data, and so on. Furthermore, the
[9] Islam, M. M., & Iqbal, T. (2021). Multi-GAT : A Graphical
majority of HAR methods rely on manual feature Attention-Based Hierarchical Multimodal Representation
engineering. A mix of convolutional neural networks Learning Approach for Human Activity Recognition. IEEE
with transfer learning using the re-trained models can Robotics and Automation Letters, 6(2), 1729 –1736.
doi:10.1109/lra.2021.3059624
improve the efficiency of reorganization system.
[10] Garcia, K. D., de Sá, C. R., Poel, M., Carvalho, T .,
Mendes-Moreira, J., Cardoso, J. M. P., … Kok, J. N.
REFERENCES: (2021). An ensemble of autonomous auto-encoders for
[1] Cruciani, F., Vafeiadis, A., Nugent, C. et al. Feature learning human activity recognition. Neurocomputing, 439, 271–
for Human Activity Recognition using Convolutional 280. doi:10.1016/j.neucom.2020.01.125
Neural Networks. CCF T rans. Pervasive Comp. Interact. 2, [11] T ang, Chi Ian, et al. “SelfHAR.” Proceedings of the ACM
18–32 (2020). https://doi.org/10.1007/s42486-020-00026-2 on Interactive, Mobile, Wearable and Ubiquitous
[2] Q. T eng, K. Wang, L. Zhang and J. He, "T he Layer-Wise T echnologies, vol. 5, no. 1, Mar. 2021, pp. 1 –30,
T raining Convolutional Neural Networks Using Local https://doi.org/10.1145/3448112.
Loss for Sensor-Based Human Activity Recognition," in [12] Singh, T ., & Vishwakarma, D. K. (2020). A deeply coupled
IEEE Sensors Journal, vol. 20, no. 13, pp. 7265-7274, 1 ConvNet for human act ivity recognition using dynamic
July1, 2020, doi: 10.1109/JSEN.2020.2978772. and RGB images. Neural Computing and Applications,
33(1), 469–485. doi:10.1007/s00521-020-05018-y
[13] Ghate, V., & C, S. H. (2021). Hybrid deep learning
approaches for smartphone sensor-based human activity
V.Gomathi
Assistant Professor
School of Electrical &
Electronics Enigneering,
SASTRA Uniiversity, Thanjavur,
Tamilnadu
gomathi@eie.sastra.edu
Abstract— Everybody, around the globe, is aware that their kids, causative agents of mucormycosis are various species of
relatives, and family are suffering from the pandemic COVID-19. fungi of the family MUCORACEA. Like other molds,
S everal people are still facing post-COVID-19 issues. During mucor fungi are widely distributed in nature and are
COVID-19's second wave, mucormycosis, sometimes known as found in the soil, manure, fusty hay, on bread and
"black fungus," plagued people, especially those who had vegetables, etc [3]. [1] Sushma K Sattigeri1 et. al.
previously been infected with the virus. The clinical
developed the model to detect the four types of eye
manifestations of mucormycosis are quite varied, the disease
affects the skin, subcutaneous fatty tissue, and visceral organs
disorders. Today, in the field of Ophthalmology, a lot of
such as the eyes and brain. This paper surveys the procedures are involved to find eye diseases. To decrease
Mucormycosis-affected eye diseases due to post-COVID-19 these impacts, visual inspection and validation have been
complications and leverages the Machine learning model to used. Digital Retinal Imaging is used to inspect
differentiate it from other eye diseases. COVID-19-associated abnormalities in the eyes and is widely used across the
Mucormycosis carries a very high mortality rate and timely world for its detailed diagnosis and benefits. Despite this,
detection that can assist people in starting therapy at an early they introduce delays in predicting eye problems. Because
stage of the disease, increasing their chances of recovery. Though the Ophthalmologists normally use mydriatic (dilation of
it was evaluated for a specific disease (COVID-19-associated
the eye) for the eyes and they wait for some time, if it
mucormycosis) we ended up developing a framework that can
detect other eye diseases. Thus, the goal of this research is to
doesn’t work again, it requests more installations of
distinguish Mucormycosis from other eye diseases such as mydriatic and scans your eyes. It involves multiple
Bulging Eyes, Cataracts, Crossed Eyes, Glaucoma, and Uveitis. doctors for the final diagnosis and takes more time [3].
This study implies Deep learning techniques with a Current developments in several countries show that this
Convolutional Neural Network based on the TensorFlow and measure can be technologically accompanied by mobile
Keras model to detect and make use of computer vision to apps and on-the-go COVID-19 detection technologies. By
accurately classify eye diseases. We achieved a precision of 70% removing the manual method, automated detection of eye
in this study by developing a webpage using the trained model damages and subsequent quantification (severity) of such
for an eye diseases evaluation.
damages would aid Ophthalmic surgeons and technicians
Keywords— Eye Diseases Detection; Deep learning; Convolutional in precisely and quickly predicting eye disorders.
Neural Network; Tensor flow; Keras.
1) The latest development in Artificial intelligence,
I. INTRODUCTION particularly in deep learning can automatically
diagnose eye diseases and provide promising results.
In the year 2019, an incredible spread of COVID-19 has The Convolutional Neural Network (CNN), like the
destroyed human lives and disrupted economic growth Artificial Neural Network, is a feed-forward neural
worldwide. Moreover, India faces more COVID-19 cases network (ANN). With images, the problem with
than other countries. In the second wave of COVID-19, artificial neural networks is that they require more
mucormycosis is an invasive fungal infection that has nodes in the first layer to process each pixel, which is
seen a rapid rise among patients with coronavirus [2]. The
insufficient, difficult to train, and does not produce data in deep learning MobileNetV2. The grades predicted on a
satisfactory results. So, because CNN is good with dataset with 250 fundus eye descriptions and finally trained in
image classification and is inspired by the animal the deep learning method, in MobileNetV2 and the final
cortex, it overcomes this problem. [5]. Convolutional accuracy of 96.2% [10]. In 2019 globally spread disease
Neural networks are mostly used algorithms for known as COVID-19, caused a severe negative impact on
object recognition and image segmentation. But the human health as well as Economically. During second -wave
growth of deep learning methods is mainly focused COVID-19, black fungus disease stepped into the world, the
on binary classification with the aim to classify patients affected by COVID-19 are used steroid -orient drugs
normal and disease eye images. The majority of to reduce the consequence of COVID-19 infection. The main
current models are intended to treat specific eye advantage of Hybrid learning-based Neural Network Classifier
ailments such as cataracts, or diabetic retinopathy [6]. is predicting accurately, timely and easily [8]. Alex Net and
The concept is greater satisfaction for patients, in InceptionV3 classify tiny medical image data in a deep
terms of faster results. learning method in terms of accuracy and efficiency [9]. CNN
for eye tracking algorithm, this paper studied the development
2) In this paper, we used one of the Deep Learning and tracking of a neural network-based eye tracking model
technique the Convolutional Neural Network (CNN) used to implement eye track in virtual reality (VR) and
to distinguish between the Mucormycosis -affected augmented reality (AR) and also used an Infrared eye-tracking
eye and other eye disorders such as Bulging eyes, algorithm (it keeps track of the pupil move), Electro-
Cataracts, and Crossed eyes, Glaucoma, and Uveitis, oculography (electric potential between the front and back
as well as the normal eye. Due to features such as eye) [10]. The CNN and SVM are popular machine learning
considerable inter-class similarity and hardly methods used in this paper [10][8]. Glaucoma was detected by
detectable diseases, the classification process is using deep learning models[17] In this paper, deep learning
difficult. This project introduces the concept of was used to contract detection and wavelet feature was extract
detecting eye diseases with CNN and a TensorFlow from the retinal vascula. SVM and softmax were used for
backend. TensorFlow is an open-source library that is cataract classification.
used to develop and train a model. We were able to
minimize the overall project size and compilation III. METHODOLOGY
time by using TensorFlow.
and taking one maximum value from the pooling window size, IV. DATASET DESCRIPTION
the MaxPooling2D layer minimizes the dimensions. The
feature map is flattened after pooling, and it turns all matrices The implementation starts with data collection. We
collected the images from a dataset on Kaggle
into a single vector, which is then sent back to the neural
(https://www.kaggle.com/datasets/kondwani/eye-disease-
network for processing. The completely connected layer is
dataset) and Google open source. The dataset contains 800
coupled to the neural network through the dense layer. Our images from seven classes which are 124 bulging eye images,
CNN model comprises 10 layers . Hence, the model has 1 fully 147 cataract images, 149 crossed eye images, 122 glaucoma
connected layer with 32 filters and the input layer size is 224 images, 146 uveitis images, and 80 normal eye images. No
224 3. A ReLU activation is used for each convolution sufficient dataset of images with Black fungus eyes has been
layer. Digital images are 3D arrays in which each pixel values found, so we created our own custom dataset. We manually
are integers that range from 0 to 255. Table 3 shows that CNN analyzed all collected data and deleted the unrelated ones. We
model with augmentation refines the concepts and provides divided the data into two groups: 80% for training and 20%
greater execution. for testing. In order to model the affected eye and type of
normal eye as well, we manually assigned labels (0 to 6) to the
T ABLE III. TEST EXACTNESS WITH CNN resulting dataset, which is summarized in Table 1. We
assigned only one label of every category to each of the
images. Figure 1 shows the portrayal of the dataset.
0 Bulging eyes
Data pre-processing is the first and most important stage,
1 Cataracts
which allows us to resize and process images by transforming
our raw data into a usable format. In data pre-processing 2 Crossed eyes
dimensionality reduction is a crucial stage because the number 3 Glaucoma
of characteristics keeps growing, requiring us to downsize the
4 Mucormycosis
photos in order to train the model. All pre-processing steps
should apply to the training as well as the testing set. 5 Normal
Following the testing phase, the model can predict eye 6 Uveitis
diseases. Figure 3 shows the methodology of this study.
A.Data augmentation
the data augmentation techniques. Data augmentation reduces accuracy and loss do not change much. The training accuracy
overfitting in the images because we will get more differences is increasing linearly and overall precision is low. [2] & [11]
in the images and greater variance. Table 2 indicates the size So this model is over fitting because of limited dataset. So we
of the train and test set. use data augmentation technique to reduce this overfitting.
T ABLE II. CLASSIFICAT ION OF OUR DATASET
A.Data visualization
(a) (b) (c)
activation of the Grad-CAM classes is one of the initial steps
toward interpretability. Grad-CAM (gradient weighted
activation mapping) is an acronym for gradient weighted
activation mapping. By using data visualization, we can see
which individual region in the image has the highest-class
activation since we can extract a layer from the CNN and
analyze the neural network as it is trained on an image like
Fig.4. The core idea behind grad-CAM is to use the gradient
to understand each parameter affecting the final convolutional (d) (e) (f)
layer, then use that information to create a localization map
showing the image's key regions. The feature map activation
shows the original final convolution output and gradients of
this prediction in Fig.4. Mucormycosis eye. The weights from
the feature map are used to create a heatmap.
(g)
Fig. 5. (a) Mucormycosis (b) Bulging eye (c) Cataracts (d) Crossed eye
(e) Glaucoma (f) Uveitis (g) Normal eye
V. RESULTS
A. Web Evaluation
(c)
(a)
(d)
b. Performance Metrics
Precision=
Accuracy =
Recall =
Normal 0 0.94 0
VI. CONCLUSION [13] J. Wu and M.M. Trivedi, “ A binary tree for probability learning in eye
detection”, IEEE 2005 Computer Vision and Pattern Recognition Conference, pp.
164–171, 2005.
we presented an intellectual knowledge based
[14] M. N. Islam, N. I. Khan, and T. Mahmud, “ COVID-19 and black fungus:
feedback for eye diseases prediction. Even though it was only
analysis of the public perceptions through machine learning,” Health Science,
trained on 800 pictures, the Convolutional Neural Networks 2021.
system is accurate in evaluating eye diseases in this study.
With a higher quality dataset, we could go one step further and [15] A Anitha, P Padmapriya, P Preethi, T Swetha, K Banumathi , “ Fundus Image
predict eye diseases based on the image. We were able to Classification of Eye Disease Using CNN Method (Convolution Neural Network)”,
International Research Journal of Engineering and Technology (IRJET), Vol.8,
reduce the overall project size from 3 GB to 2.19 MB using no.4, 2021.
TensorFlow. This would help us to deploy the project in an
easy and convenient way. Based on the accuracy, we've seen [16] Chai Y, Liu H, Xu J, “ Glaucoma Diagnosis Based on Both Hidden Features
that our eye detection technology can permit modernization and Domain Knowledge through Deep Learning Models”, Knowledge-Based
for future applications. This technology speeds up the Systems, 1- 29,2018.
procedures, reducing the amount of time spent detecting eye [17] Dong Y., Zhang Q., Qiao Z., Yang J. Classification of cataract fundus image
diseases to a higher level. This study paves the way for future based on deep learning; Proceedings of the 2017 IEEE International Conference on
partnerships on these initiatives in general, and on the Imaging Systems and Techniques (IST); Beijing, China. 18–20 October 2017; pp.
prediction of eye disease in particular. 1–5.
VII. REFERENCES
[1] Sushma K Sattiger, Harshith N, Dhanush Gowda N, K A Ullas, Aditya M S
“ Eye disease identification using Deep learning”, International Research Journal of
Engineering and Technology (IRJET), Volume: 09 Issue: 07 , July 2022.
[2] Jesil Mathew Aranjani, Atulya Manuel, Habeeb Ibrahim Abdul Razack, Sam T.
Mathew, “ COVID-19–associated mucormycosis: Evidence-based critical review of
an emerging infection burden during the pandemic’s second wave in India”, PLOS
Neglected Tropical Diseases, vol.15, no.11, 2021.
[4] Michael D.Abramoff, Mona K.Garvin, Milan Sonka, ” Retinal Imaging and
Image Analysis”, Proceedings of IEEE, vol.3, no.12, 2010.
[5] Rikiya Yamashita, Mizuho Nishio, Richard Kinh Gian Do, Kaori Togashi,
“ Convolutional neural networks: an overview and application in
radiology”, Insights Imaging 9, pp.611–629, 2018.
[6] Shruthi Bhat, Som Mosalagi, Tejal Bhalerao, Pushpak Katkar, Rahul Pitale,
“ Cataract Eye Prediction using Machine Learning”, International Journal of
Computer Applications, vol.176, no.35, 2020.
[9] Chen Guo, Minzhong Yu, Jing Li,” Prediction of Different Eye Diseases Based
on Fundus Photography via Deep Transfer Learning”, Multidisciplinary Digital
Publishing Institute (MDPI), vol.10, no.11,2021.
[10] Jonathan Griffin, Andrea Ramirez,” Convolutional Neural Network for Eye
Tracking Algorithm”, 2018.
[11] Jerry, Chi Ling Lam and Moshe Eizenman,” Convolutional Neural Networks
for Eye Detection in Remote Gaze Estimation Systems”, vol.1, pp, 2008.
Abstract— Artificial Intelligence has a high potential to solve explicit, three-dimensional shapes for their proper functioning.
many real-world problems. In the recent years researchers are Unfolded or misfolded proteins are either fixed or destroyed by
dealing with one of the biggest complications in biology, which is enzymatic action. These proteins if not fixed can cause serious
protein folding. With the assistance of technology, we can foresee disorders. Alzheimer's, Parkinson's, and Huntington's diseases
how proteins fold from a chain of amino acids into 3D shapes are some examples of neurodegenerative diseases which occur
that do life's errands. There are mainly three big problems due to accumulation of misfolded protein molecules [5].
associated with folding of proteins. The first problem is there any
particular folding code. The second one there is a folding system. Protein folds in four stages that are primary protein folding,
Then the final problem is we able to determine the 3D structure secondary protein folding, tertiary protein folding and
of proteins. Proteins are the microscopic machines and structural quaternary protein folding. The primary protein folding
building blocks of our cells. They carry out important functions structure is the unfolded polypeptide chain in which amino
like breaking down foods, storing oxygen and forming scaffolds acids are bonded by peptide bonds forming a structure like a
to help cells keep their shape. Each one is built up of one amino chain [6]. The secondary structure is the protein starting to fold
acid chain that folds in on itself into a mostly defined structure. with the help of non-covalent interactions like hydrogen bonds.
Each part of our body and in any other organism is made either Different secondary structures are formed in this stage, like the
from or by proteins and this is true for every living creature, alpha helix and beta sheets. In the case of alpha helix, a
even for viruses. The structure of very small proteins can be
particular portion of the polypeptide chain (depending on the
foreseen using the computer method. This article is all about the
protein folding problem with more spotlights on the role of AI- sequence) forms a helical structure held by hydrogen bonds.
based systems in protein structure forecasts. The motivation Beta sheets are more like a two dimensional sheets formed by
behind this article is to convey an overall understanding of AI- adjacent amino acid chains held together by hydrogen bonds.
based answers for protein folding problems. The tertiary structure is a protein folded into a more condensed
form where different secondary structures are held together by
Keywords— Artificial Intelligence; AlphaFold; Biomolecules; different non-covalent interactions like hydrogen bonds,
Protein folds; 3D structure; Molecule Vander Waal interactions, and hydrophobic interactions and in
some cases ionic interactions and disulfide bridges are also
involved. Most of the proteins are found in their tertiary
I. INT RODUCT ION structure only which determines their functions [7]. The
quaternary structure is the association of different protein
How exactly does a protein fold? This unsolvable mystery subunits. These subunits interact with one another forming a
of molecular biology has hampered almost 50 years of more closely packed structure. The most relevant example is
advances in medication and biotechnology [1]. Presently, on hemoglobin which is present in our blood. Machine learning
account of astounding advances utilizing AI this stupendous plays a major role in this protein folding [8].
test is viewed as tackled, opening the way to an altogether new
time of AI helped by computational science [2]. Proteins play The change in the shape of a protein results in a
various parts in our body; they contract our muscles, digest our conformational change in the binding pocket of the protein and
food, fire our neurons and power our safe framework. All that this alteration may cause inactivation of the protein molecule,
occurs in science nearly occurs with the contribution of so, if we are able to understand the folded shape of protein
proteins. Proteins are an important component in an organism targets it will help in designing the drugs as inactivation or
often termed as ‘structural blocks of life’. These biomolecules activation of a particular protein involving in a disease can be
have different shapes and functions [3]. Also, these functions done. Experimental analysis of a protein's structure requires
are dependent on the shape of the protein molecule, yet proteins in crystallized form, but some proteins like
understanding the folding of a protein molecule in that special hydrophobic membrane proteins are very difficult to crystallize
shape is an undeniably challenging undertaking. Inside our as they aggregate in aqueous solutions [9]. This difficulty in
body protein folding occurs in a special compartment of a cell sample preparation makes the experimental methods a time-
called the endoplasmic reticulum [4]. This is an essential cell consuming process, also, the result analysis and structure
process, since proteins should be accurately folded into determination part is lengthy as it is based on trial and error
using data from different methods .Unlike this, computational of researchers in computational biology has been related to the
methods accurately predict and visualize a protein's structures structure of protein prediction and figuring out relations
and that too in a shorter span of time. With the introduction of between 3D structures of proteins and its sequence of amino
AI in the field of protein structure prediction it is being acid [12]. This could assist with speeding up the drug
speculated that it in future it will play very important role in discovery process as the fast and comparatively less expensive
increasing the current databases of protein structures and also computational method replaces slow and expensive
in improving our understanding of relation between a protein experimental methods. In this event different research groups
sequence and its 3D structures [10]. In structure prediction, can participate and try to figure out the shapes of unknown
numerous accessible data sets and bioinformatics strategies can proteins using their own structure prediction technique. The
assist with finding the variables responsible like folding and event organizers identify proteins which are to be solved, and
stability of proteins and to anticipate the most favorable and the participating groups have roughly 1 to 1.5 months to
stable 3D structure from the sequence of amino acid. Mostly In predict their structures. In CASP1 in 1994 there were only 35
recently developed tools utilize an AI strategy named deep predictor groups and 24 target sequences but eventually this
learning which can foresee the s hape of proteins to the closest number increased and in CASP7 in 2006 there were over 200
atom. groups and 100 plus targets. If there is a mutation in a protein
of an individual, this may cause failure in protein folding due
to change in the sequence of amino acid of that particular
protein. However, mutation is not the only reason behind the
failure of protein to fold, not every time protein folds in its
destined conformation, that is success rate of protein is high but
not 100%. As protein function is dependent on its 3D structure,
the correct folding of protein is necessary. Techniques which
are used to analyze 3D structure of proteins require protein
molecules in crystallized form. Use of experimental methods to
find the shape of protein in the form 3D structure is still a
costly and complicated process. The exact 3D structure is
recognized for just a minute fraction of the proteins which are
present in the nature and are known to science. This gap in
known protein and known structure needs to be filled at the
Fig. 1. Different Stages of Protein Folds earliest as it can be very helpful in tackling different diseases,
also, our understanding of how the living system will enhance.
The figure 1 is deliberate the different stages of protein At present 100 million proteins are already known to us and
folds [11]. According to Christian Anfinson’s theory, a protein this number is increasing every year. The most important point
3D structure can be completely determined by sequen ce of its is each protein molecule has a unique 3D structure that
amino acid. This hypothesis led researchers to invest their determines its function.
resources in computationally predicting the protein shapes on
the basis of on its sequence of amino acid. The major challenge III. PROBLEM ST AT EMENT
faced by the scientists working in this field was that a pro tein
The process by which protein get its mature, stable and
can theoretically fold in numerous ways and this number can
functional tertiary shapes is called protein folding, and it
be astronomical. An American molecular biologist Cyrus
generally starts along with the translation process of mRNA. In
Leventhal mentioned that if we try to calculate the number of
molecular biology many problems are unsolved [13], but the
all possible configurations for a protein molecule. It would
most important problem is protein folding that is getting the
consume a lot of time to complete that calculation, it is a very
accurate shapes of protein in the form of 3D shapes from the
time consuming process. However, this is not what happens in
sequence of its amino acids [14]. There are a huge number of
nature, in a living system the proteins fold independently, few
collaborations between the different atoms of single protein
can even fold in a less than milliseconds. This paradox then led
molecules and this is the main difficulty which arises while
to a new approach of predicting folding pathways to get the
modeling [15]. The total number of interactions is so large that
most stable conformation or native state of a protein molecule
it is difficult even for modern computers to handle. Protein
and ever since then, scientists from all over the world have
folding is a highly sensitive process and it is affected by
been trying to predict these folding pathways and get the
various external factors which includes temperature, pH, and
modeled structure using advanced computational techniques
chemicals present in the system and number of molecules.
involving computer simulations in which physical interactions
These factors may alter the ability of protein molecules to fold
between the atoms of the molecules is approximated, this helps
and attain their correct native structure or functional form.
in understanding the folding process.
There could be some complications in this folding process due
II. ST AT E OF A RT to genetic mutation in an individual human which changes an
amino acid sequence in the protein molecule. Generally, these
The issues of protein folding has glimpse of tremendous kinds of mutations are found in inherited genes, where it affects
progress in recent days. New computational and theoretical only a particular protein molecule and its function. The three
methodologies have been introduced which includes multiple- experimental techniques are available. The experimental
sequence alignments, three dimensional structure databases or techniques are highly accurate but at the same time they are
web servers, highly accurate force fields. The major objective
very laborious and time taking. The shortcoming of these At the time of launch the database was not this huge but
techniques is that being a time taking process it restricts us to contained 3D models predicted by Alpha Fold of almost the
minimize the difference between available sequence of protein full UniProt proteome of humans and also of 20 different
and the 3D shapes of the protein. Figure 2 is movement of model organisms, making the total structure, over 365,000.
amino acid sequence to 3D structure. With more people working in this field the number of predicted
structures is increasing every day. Alpha Fold showed us a
newer approach for structure prediction and changed the
traditional dependence on experimental techniques .
DeepMind claims to have instructed the Alpha Fold
program more than 170,000 proteins for which sequence and
structure were already known. Alpha Fold uses a deep learning
technique, the attention network which enables it to break
down the problem in small parts. The AI algorithm then
focuses on these small parts which are later put together to
obtain the overall solution. In the case of Alpha Fold a total of
100-200 GPUs power was used for the overall training. Even
with this hardware system the overall training took a few
weeks to complete after which additional few days would be
required for each protein structure. Alpha Fold 1 is not mu ch
Fig. 2. Amino Acid Sequence Structure complicated architecture; an intricate feature extraction process
initiates the complete program. Also, Multiple sequence
IV. PROPOSED M ET HODOLOGY alignment is performed for the query sequence using an
external database. Multiple sequence alignment is performed in
Alpha Fold is a Computational science approach which
utilizes machine learning aimed at the prediction of highly order to compare the query sequences or the sequence of the
accurate three-dimensional protein structure. The combination desired protein to similar protein from different species which
are descendants of a common ancestor. The basic idea of
of bioinformatics and physical approaches is known as Alpha
Fold. Alpha Fold is newly developed program based on AlphaFold1 is to take the query sequence or the desired protein
sequence and then search some external databases to obtain
Artificial intelligence. This was designed by Google's
DeepMind and helps in predictions of 3D structure or shapes of some evolutionary matches in the protein sequences from
closely related species. The obtained information along with
biomolecules (especially proteins). This program is dependent
on a deep learning system that utilizes protein’s amino acid some additional input features is then processed into a 2-
sequence to predict it’s in the 3D structure. It mostly achieves dimensional array. This convolutional network is quite similar
high accuracy competitive with experiments. In CASP14, to the one generally used in image classification. The output
Alpha Fold was the top-ranked protein structure prediction from the complete program is obtained in the form of a
distogram which contains information about the protein
technique by an outsized margin, predicting with high
accuracy. Alpha Fold had the foremost correct predictions of molecule, the sequence of which was fed in the program for
structure prediction. Distogram contains a fixed number of
any CASP participant in its 25-year history by a good margin.
Alpha Fold uses convolutional neural networks and has an rows and columns forming a two-dimensional array which has
data of distances between amino acid residues of the protein.
incredible architecture which can not only predict but also
refine the predicted structure to get the best model. An iteration This helps in determining the three-dimensional distance
process is adopted by Alpha Fold to increase accuracy of its between amino acid residues. A distogram can be considered as
a representation or projection of the 3D structure of the protein
predictions; it also has an internal measure. This assessment we
can check the reliability of its predictions. It is derived from an in two-dimensional form. Since the distogram is dependent on
the distance between amino acid residues it does not change
already available metrics in protein structure prediction. The
regions with high accuracy get a high score and likewise with rotation or translation of the whole protein molecule. Also
as the distance between amino acids measured from A amino
regions with lower accuracy are given low scores, this scoring
system does not depend on the accuracy of the whole predicted acid to B will be the same as measured from B to A, the
protein model. This helps Alpha Fold to continuously improve distogram formed is symmetrical across its principal diagonal.
To convert this distogram data into 3D prediction AlphaFold1
its predictions which results in a more accurately predicted
structure of protein molecules. DeepMind collaborate with the uses Gradient Descent approach. This 3D prediction can be
observed in the form of a physical model of protein molecule
European Molecular Biology Laboratory has published a
database with over 200 millions protein shapes from 21 model and parameterized by psi and phi angles between carbon-
carbon atom and carbon-nitrogen atom respectively. This
organisms. This database is open source so can be accessed by
anyone and all the structures in this database have been obtained backbone structure is refined iteratively by scoring
predicted using Alpha Fold. This database consists the very function which depends on both the prediction obtained by
high accuracy. Previously the number was as low as 17%, neural network and set of physical forces. This iterative
which were obtained through experimental techniques. On refinement helps in obtaining the most favorable and accurate
conformation of protein molecules.
July 22,2021 the database was launched, and in such short
span of one year it has already reached the 200 million mark.
Alpha Fold 2 follows a similar pattern but uses a slightly time span, but it falls behinds conventional / Experimental
different approach. There are three main building blocks. First Method in prediction of complex protein structure and
one is pre-processing stage - In this stage additional detection of active sites . In addition to this, AlphaFold2 will
information about the sequence to be fed is extracted from also search for structural templates. These structural templates
different external databases. All the information is used to are known protein structures, the sequence of which is similar
perform the multiple sequence alignment. Second one is to the query sequence. The information’s from the MSA of the
mapped MSA and a pair representation are then refined by an input sequence and from the template structures are then
unique system, Evo former. Evo former is a transformer-like integrated into MSA representation and pair representation.
network which is 48-layer deep and uses attention mechanisms These information’s are further refined multiple times before
to refine and update the MSA and pair representations. Final passing on to the structure module. Before being forwarded to
component of Alpha Fold is generally called the structure the structure module, the MSA and pair representations are
module. It is fed with the outputs obtained from Evo former passed to the Evo former. Evo former has 48 layers and helps
and transforms that into three-dimensional coordinates of the with the refinement of information; each block has an MSA
protein molecule. Like AlphaFold1, AlphaFold2 also initiates and a pair representation as input as well as its output and it
with creating multiple sequence alignment of the fed protein processes them with several layers. The Alpha Fold not only
sequence. predicts the positions of each residue in the protein, but it also
shows how certain the program is about the predicted structure
Table I: Conventional Method Vs Alpha Fold
and this is represented through different color gradients. Alpha
Fold was first trained using all the available protein structures
Conventional
Parameters Alpha Fold in the Protein Data Bank but then it predicted the structures of
Method
roughly 300,000 additional proteins with unknown structures
and recently this number is increased to 200 million; the
Tools XRD, NM R and AI/M L
predicted structures in training stage were added back to the
CryoEM
training dataset for further training and refinement out of these
Duration Takes relatively more M uch less time is added predicted structures only the ones that Alpha Fold is
time required more certain of correct prediction with high precision were
used for further processing. To increase the depth and to refine
M anual input For sample No manual input is each model the prediction outputs were fed back into the same
preparation manual required module multiple times. Alpha Fold is able to predict protein
input is required structure accurately even with some odd cases like intertwined
homomers or complex protein structure which is dependent on
Accuracy Highly accurate Recent study suggests non-protein molecules for folding. Alpha Fold has made it is
it to be relatively more possible to design many more life-saving drug therapies by
accurate targeting proteins. Alpha Fold has some limitations like it is
difficult to interact with protein and multimer that are not
Prediction of Comparatively more Accurate prediction of present in the protein database bank. Alpha Fold is designed by
protein complex reliable protein complex using the Convolutional Neural Network. The architecture of
structure is a bit Convolutional Neural network is Alex Net. Alex Net
difficult architecture are used for image detection task. Alex Net has 8
layers in which there are 5 connected layer and 3 fully
Based on Chemical Database of known connected layer. Pooling layers are reducing the size of images.
composition of the structures and For images detection we can use the ANN i.e., Artificial
protein molecule evolutionary relation Neural Network but Artificial Neural Network has some
disadvantages like it required too much computation. In Alpha
Post translational NM R can identify Alpha Fold does not
Fold we need a less computation time for image detection or
modifications effects of PTM s consider impact of shape detection for numbers of proteins. In Convolutional
(PTM s) PTM s on protein
Neural Network connections sparsity reduce overfitting. With
structure
the help of convolutional neural Network and pooling gives the
Database size Number of protein Increasing at an location invariants features detection. Convolutional Neural
structure increasing enormous rate Network helps in Parameter sharing which means parameter of
but slowly A filter can be apply in the entire images. With the help of
information or data Alpha Fold able to design or construct a
Active site Detects and Not much effective in graph of similar related to amino acid. Alpha Fold is a kind of
characterize protein detection of active sit deep residual neural network. AlphaFold is an example that
ligand binding technologies like AI (Artificial Intelligence) are often very
useful in bioscience. Alpha fold software has two version that
is Alpha Fold 1 that launched in 2018 and Alpha Fold 2 that
The table I is the comparison of conventional method and launched in 2020. Alpha Fold after making the database public
Alpha Fold method. This table indicates that Alpha Fold is and providing the colab version gained immense attention not
better at providing highly accurate protein structure in shorter only from researchers but also from entrepreneurs and it is
highly expected that there will be a rise in both biotech structure determination using different tools and techniques. It
research and startup ecosystem utilizing this incredible AI was established in 1994. This community conducts a
system. Two major fields where AlphaFold is very useful are competition for protein structure prediction every 2 years. In
drug discovery and protein designing. recent years integration of AI in protein structure prediction
tools has increased. Deep Mind's AlphaFold and AlphaFold 2
are prime examples of this. Both these versions of AlphaFold
won the last two CASP events in 2018 and 2020 indicating this
AI integration in protein structure prediction to be successful.
Table II is provide the comparison AlphaFold and AlphaFold2.
Table II: Comparison of AlphaFold Vs AlphaFold2
is 52, at the same time AlphaFold2 finest prediction level is 61. mainly in increasing the accuracy of the prediction. This AI
So nearly 10% of improvement is there in AlphaFold2. system is expected to update and improve in future for better
prediction with high accuracy. Also, AlphaFold was trained
using a dataset of naturally occurring proteins for which
structures were already available, so, it's difficult to assume
that AlphaFold can also predict de novo protein structures with
high accuracy. But with constant growth and improvement of
AI technologies in recent years it is very much possible for
researchers to reduce the limitations associated with Alpha
Fold. Beside the mentioned shortcomings it is also a fact that
this is doubtless one of the most impactful Machine Learning
models of this decade.
REFERENCES
[1] Giwa, S., Lewis, J. K., Alvarez, L., Langer, R., Roth, A. E., Church, G.
M., ... & T oner, M. T he promise of organ and tissue preservation to
transform medicine. Nature biotechnology, 35(6), 530-542. (2017)
Fig. 4. Accuracy level of Finest Prediction
[2] Nikitha, M. A., Swetha, S., Mantripragada, K. H., & Jayapandian, N.
T he Future Warfare with Multidomain Applications of Artificial
Table IV: Comparison of Median Score Intelligence: Research Perspective. In Proceedings of Second
International Conference on Sustainable Expert Systems (pp. 329-341).
Data Set Springer. (2022)
AlphaFol d AlphaFol d2
Name [3] Roden, C., & Gladfelter, A. S. RNA contributions to the form and
Data Set 1 58.9 87 function of biomolecular condensates. Nature Reviews Molecular Cell
Biology, 22(3), 183-195. (2021)
Data Set 2 62 89 [4] Ma, W., & Mayr, C. A membraneless organelle associated with the
Data Set 3 69 91 endoplasmic reticulum enables 3′ UT R-mediated protein-protein
Data Set 4 73 93 interactions. Cell, 175(6), 1492-1506. (2018)
[5] Johnston, H. E., & Samant, R. S. Alternative systems for misfolded
Data Set 5 65 92 protein clearance: Life beyond the proteasome. T he FEBS Journal,
288(15), 4464-4487. (2021)
[6] Biswas, G., Ghosh, S., Basu, S., Bhattacharyya, D., Datta, A. K., &
Banerjee, R. Can the jigsaw puzzle model of protein folding re‐
assemble a hydrophobic core?. Proteins: Structure, Function, and
Bioinformatics. (2022)
[7] Skolnick, J., & Gao, M. T he role of local versus nonlocal
physicochemical restraints in determining protein native structure.
Current Opinion in Structural Biology, 68, 1-8.(2021)
[8] Sree, S. R., Vyshnavi, S. B., & Jayapandian, N. Real-world application
of machine learning and deep learning. In 2019 International Conference
on Smart Systems and Inventive Technology (ICSSIT ) (pp. 1069-1073).
IEEE.(2019)
[9] O’Keefe, S., Zong, G., Duah, K. B., Andrews, L. E., Shi, W. Q., & High,
S. An alternative pathway for membrane protein biogenesis at the
endoplasmic reticulum. Communications Biology, 4(1), 1-15. (2021)
[10] Jumper, J., Evans, R., Pritzel, A., Green, T., Figurnov, M., Ronneberger,
Fig. 5. Median Score Levels O., & Hassabis, D. Highly accurate protein structure prediction with
AlphaFold. Nature, 596(7873), 583-589. (2021)
The table IV and figure 5 is discussed about median score. [11] Maguire, J. B., Haddox, H. K., Strickland, D., Halabiya, S. F., Coventry,
The median score indicates the performance of both models. B., Griffin, J. R., & Kuhlman, B. Perturbing the energy landscape for
The average median score of AlphaFold is 65.8, similar to that improved packing during computational protein design. Proteins:
average median score of AlphaFold2 is 90.4. More than 30% is Structure, Function, and Bioinformatics, 89(4), 436-449. (2021)
getting the better performance in AlphaFold2. [12] Marx, V. Method of the year: Protein structure prediction. Nature
methods, 19(1), 5-10. (2022)
VI. CONCLUSION [13] Das, S., Vera, M., Gandin, V., Singer, R. H., & T utucci, E. Intracellular
mRNA transport and localized translation. Nature Reviews Molecular
Alpha Fold is an engineering masterpiece developed by one Cell Biology, 22(7), 483-504. (2021)
of the most exceptional minds working at Deep Minds. This [14] Smys, S., and Jennifer S. Raj. "Future Challenges of the Internet of
integration of AI in biological studies is going to improve the T hings in the Health Care Domain-An Overview." Journal of T rends in
existing computational biology approach and will become an Computer Science and Smart T echnology 3, no. 4, 274-286 (2022)
integral part of different fields in biological sciences including [15] Hariharakrishnan, Jayaram, and N. Bhalaji. "Adaptability Analysis of
drug discovery, antiviral therapies and determination of disease 6LoWPAN and RPL for Healthcare applications of Internet-of-T hings."
pathways. However, there is still some scope of improvement Journal of ISMAC 3, no. 02, 69-81, (2021).
S.Ramalingam
Department of ECE,
Sri Eshwar college of
Engineering, Coimbatore
ramece74@gmail.com
Abstract— Nowadays, security is a major issue everywhere, systems have been shown to be inefficient for alternatives,
and as a result, there are numerous assets available to resolve low-cost replication, and necessary interruptions [2]. The
this controversy. Most security systems have several bank's rooms, houses, shops, and vital stores are seen to
vulnerabilities that can be resolved to access the desired have security penetrates that lead to disastrous impacts that
location, home and environment. Furthermore, theft and cause a huge monetary calamity. Furthermore, it likewise
unauthorized access to places have become severe problems.
prompts the loss of delicate and private data. Conventional
To this end, the design and prototype of an online digital
password lock and automation system were awarded in this locking instruments are sufficiently alarming to analyze
work. This research work will propose the design and physics traded-off access, and security penetrates and does not give
of a basic online security and digital surveillance system. The a solid verification strategy. Electronic locking frameworks
system employs an integrated nodeMCU wireless protocol for are intended to improve security and verification. The
remote security testing via an Android smartphone running scrambled and secure shrewd locking framework can be
the IoT app. This framework is applied with the standard local associated with GSM and Bluetooth [3]. The cell phone is
voice command transmitted to the Google Assistant through currently best in class for a few applications contrasted with
IFTTT and BLYNK platforms. The Voice secret word orders calls and messages. The bank's voice lock frame and various
are then sent to the NodeMCU and control the transfers to kill
applications can be remotely screened in real time using a
on or the gadget associated with the individual hand-off in line
with the client to the Google Assistant. Wi-Fi is used for portable work frame and an internal application.Fig.1 shows
communication between the ESP32 and the cloud and that IFTTT architecture for intelligent homes is given
applications. The digitally intelligent safety system is a special below.
amalgamation that offers an unquestionable remedy to the
safety issues of the various safety functions mentioned above
from that point on. The device was efficiently implemented and
the purpose was performed except for deviations. This study
has much future space because of its security capabilities.
defined and executed. In the current scenario, the rigor of numerous disadvantages, such as forgetting the password,
electrical energy is one of the primary issues we face in our being able to crack the password, or being unable to open
everyday lives [4]. This can be serious in the future if we do the door when the power is turned off. A biometric system is
not focus on it as it is. Since we understand that assets are a technological system that uses personal information to
not available in massive quantities, we must use them as identify a person. Biometric authentication systems such as
needed and keep them for future use because if we lose face authentication, fingerprint authentication, and iris/retina
them, they will expire soon and everything will be useless. authentication are used for security [10-14]. Ramalingam et
Therefore, to overcome this situation, a system is proposed al. proposed smart WSN and IoT based data collection and
that will only work when it is to be used. In any other case, monitoring system for waste management, agriculture and
it will go into energy-saving mode. Controlling or switching WSN application [15, 16]. Karupasamy and krishnaraj
units away from the person can be difficult, so we have presents the IoT based smart human health monitoring
developed our proposed system until it can be used remotely system using Blynk Server [18, 19].
by voice [5]. With this functionality, our gadget thus
becomes applicable and environment friendly with an A. Fingerprint Verification
economical budget. This could be a pleasant way to keep The biometric fingerprint lock system allows you to
energy. Many strategies have been introduced to achieve the accumulate ID points. Despite its high security, this system
above objectives can be cloned.
an intelligent home. The suggested system was utilized for 3.2.2 Relay
automation and security purposes applications. The
proposed block diagram is given in figure.2. Relay act as an electrically operated switch. It can
be interfaced with an esp32 device. All smart home devices
A. Block diagram and lock mechanism is controlled by relay using IFTTT.
The voice code word is sent through Google Assistant. It
automatically sent the binary signal 1 or 0 to Esp32 devices
via the internet. Fig.4 shows the proposed circuit diagram.
Fig.8 and 9 show the result of the IFTTT password setting Android App. The proposed enlistment method encourages
process and Google Assistant voice command. Suppose the clients to arrange smart homes, mainly in-house
password sends through Google assistant via the internet. proprietorship trading safely. The validation convention
The ESP 32 device receives the password and turns on the joins various components: client's memory (secret key), past
locker, any load fan light, etc. The AI algorithm has been meeting key, sequential number and equipment address of
done through IFFFT efficiently. It has no time delay and the home portal, to commonly check the actual
efficient recognize the command using Google assistant and correspondence substances. The proposed framework shows
webhook. that our plan accomplishes preferable security and
protection over existing plans. The execution examination
result uncovers that the proposed scheme is reasonable for
A. Software description
usage. In future work, highly secured communication
Arduino IDE 1.8.10 protocol will be designed to improve the security using
Blynk IoT platform artificial intelligence and security mechanism.
IFTTT -Google Assistant and Web hook
Embedded C Programming
REFERENCES
Embedded C Programming
[1]. M. A. Khan and K. Salah, ”IoT Security: Review, Block chain
Solutions, and Open Challenges”, Future Generation Computer
B. Advantage
Systems, vol. 82, pp. 395-411, 2018.
Simple to implement [2]. Michael Shanler, "Predicts 2015: The Rise of Digital R&D
Innovation for Manufacturers",
Anywhere to observe and manage Available:https://www.gartner.com/doc/2941518?ref=SiteSearc
Helped speed h\&sthkw=a\%20typical\%20family\%20home\%20could\%20c
Maximum security ontain\%20more\%20than\%20500\%20smart\%20devices\%20
by\%202022\%2C\&fnl=search\&srcId=1-3478922254.
[3]. Katherine Albrecht, Liz Mcintyre "Privacy Nightmare: When
C. Application Baby Monitors Go Bad" IEEE Technology and Society
Magazine, vol. 34, no. 3, pp.14-19, 2015.
Home security applications [4]. Brian Barret, "Hack Brief: Hacker Strikes Kids’ Gadget Maker
In banks, industries, and so on VTech-childrens gadget-maker-hack-5-million-accounts/.
[5]. B. Baruah and S. Dhal, "A Two-factor Authentication Scheme
In laptops to keep information private. against FDM Attack in IFTTT Based Smart Home System,"
Smart home COMPUTERS & SECURITY, vol. 77, pp. 21-35, 2018.
Smart street lighting system [6]. "Smart Home Market by Product (Lighting Control, Security &
Access Control, HVAC, Entertainment, Smart Speaker, Home
Industrial Healthcare, Smart Kitchen, Home Appliances, and Smart
Shopping mall Furniture), Software & Services, and Region - Global Forecast
to 2024".
Library [7]. B. Ali and A. Awad, "Cyber and Physical Security Vulnerability
Office automation Assessment for IoT-Based Smart Homes", Sensors, vol. 18, pp.
1-17, 2018.
College auditorium [8]. Q. Do, B. Martini, K.-K. R. Choo, "Cyber-physical Systems
Information Gathering: A Smart Home Case Study," Computer
Table.1 Result performance using AI Voice Command Networks, vol. 138, pp. 1-12, 2018.
[9]. B.-C. Chifor, I. Bica, V.-V. Patriciu, F. Pop, "A Security
S. Voice Nodemcu Relay output Output Authorization Scheme for Smart Home Internet of Things
No Command Output Response devices," Future Generation Computer Systems, vol. 82, pp.
1 Light ON D1=1 Relay1= ON Lamp1=ON 740-749, 2018.
[10] J. Shen, C.Wang, T. Li et al., "Secure Data Uploading Scheme for
2 Light OFF D1=0 Relay1= OFF Lamp2=OFF
A Smart Home System," Information Sciences, vol. 453, pp.
3 Hall Light D2=1 Relay2= ON Lamp3= ON 186-197, 2018.
ON [11]. G. - J. Ra and I. - Y. Lee, "A Study on KSI-based Authentication
Management and Communication for Secure Smart Home
4 Hall Light D2=0 Relay2= OFF Lamp3 = OFF
Environments," KSII TRANSACTIONS ON INTERNET
OFF AND INFORMATION SYSTEMS, vol. 12, no. 2, pp. 892-
5 Locker D3=1 Relay3= ON Locker= Open 905, Feb. 2018.
Open [12]. Y. Ashibani, Q. H. Mahmoud, "An Efficient and Secure Scheme
for Smart Home Communication using Identity-Based Sign
6 Locker D3=0 Relay3= OFF Locker-= encryption," in Proc. IEEE 36TH international performance
Close Close computing and communications conference (ipccc), 2017.
[13] V. Sivaraman, H. Habibi, Gharakheili et al., "Smart IoT Devices
IX. CONCLUSION in the Home Security and Privacy Implications" IEEE
technology and society magazine, pp. 71-79, Jun. 2018.
This work implemented an online password-based [14]. M. Wazid, A. k. Das, V. Odelu et al., "Secure Remote User
intelligent home automation and security system using Authenticated Key Establishment Protocol for Smart Home
Environment," IEEE Transactions on Dependable and Secure
IFTTT and Google Assistant. The door, fan, light and all Computing, pp. 1-15, 2017.
devices are controlled by Voice Command using IFTTT. [15]. S. Murugesan, S. Ramalingam, P. Kanimozhi, Theoretical
These methods provide high security for intelligent home modeling and fabrication of smart waste management system
and online password-based security and automation system. for clean environment using WSN and IoT, Materials Today:
Proceedings, Volume 45, Part 2, 2021, Pages 1908-1913.
It also gives the status of output devices locker or any [16]. S. Ramalingam, K. Baskaran and D. Kalaiarasan, "IoT Enabled
device by artificial Intelligence using Google assistance Smart Industrial Pollution Monitoring and Control System
Vasquez-Correa et al., [15] presented the multimodal III. M AT ERIALS AND M ET HODS
evaluation of parkinson's disease based on Deep learning
algorithm. The gait, handwriting and speech data were A. Gait Dataset
recorded for parkinson's and healthy subjects. The 2D-CNN
and 1D-CNN were applied for feature extraction from these The Physionet public database is hereby deployed to
three types of data and fused into one feature vector. Finally, accumulate the dataset of Gait neurodegenerative disease
the SVM classifier achieves 97.3% accuracy in classification [10,17], which enumerates the severity of NDD in individual
of PD subjects. Lin et al, [17] proposed a deep learning and subjects. The delicate force resistors were used to record the
recurrence plot feature extraction method in identification of step dynamics by noticing the force beneath each subject's
NDD which achieves accuracy of 98.91%. Fraiwan et al. [5] foot. The eight sensors were attached to the foot of every
presented various ensemble decision trees classifiers in individual and assessed the vertical ground response force.
identification of NDD with gait signals by measuring The gait dynamics recorded were within real efforts
with subjects like Parkinson's Disease (PD=15), Huntington's with a sequence of filters automatically [13]. In this work,
Disease (HD=19), Amyotrophic Lateral sclerosis (ALS=13) two-dimensional convolution neural network (2DCNN) is
and healthy controls (CO)=16) persons. Gait boundaries such applied to extract most influential features for accurate
as stance interval, swing interval, stride interval and double classification. The Triblock CNN architecture is mounted
support intervals of left and right foot are specified for with three separate CNN structures and input is fed through
every subject which are 1D signal data. The format of dataset each CNN block. Each block of CNN is framed with a
is timeseries (.ts) file and size is 17.9 MB [9]. different kernel size. The raw input gait signals considered in
this study consists of stride, stance and swing time series
B. The Proposed Work (TBCNN_DRQA) signal parameters of both feet. Instead of using raw gait
signals as input, Absolute Differences (AD) of left and right
In this work, the Triblock CNN Architecture (TBCNN) foot are calculated for each gait signal parameters (stride,
stance, swing) for every subject, defined by the matrix shown
and the compact representation of Deep signals with
in Eq. (1).
Recurrence Quantification Analysis (DRQA) are framed to
gather prominent gait features from the input gait signals.
The classification of Neurodegenerative disease group (ALS, 𝐴𝐷𝑖,𝑗 (𝜀) = (1 − 𝑀𝑖 −𝑁𝑗 ), 𝑖, 𝑗 = 1, … , 𝑛 (1)
HD, PD) and healthy control is done by machine learning
classifiers using TBCNN_DRQA trained features. Fig.1, Where M i is the left leg gait signal and Nj is the right leg
exhibits the flow chart of the proposed architecture. The gait signal. Correspondingly, the absolute difference is
techniques of the proposed architecture are explained in the calculated for individual subjects with stride, swing and
following sections. stance intervals. Fig.2 shows the (i) actual and (ii) absolute
difference of gait intervals for one of the Parkinson patients
1) Triblock CNN (TBCNN) Architecture: for (a) Stride, (b) Swing and (c) Stance. This absolute
difference of stride, swing and stance such as 1860 gait signal
A Convolution Neural Network (CNN) is a form of data is fed as input to each 2D CNN block separately in the
feedforward neural network with multiple hidden layers, Triblock Convolution Neural Network (TBCNN)
usually called Deep CNN. The CNN algorithm is architecture. Three blocks of CNN is structured with different
predominantly applied in present-day studies. Deep CNN kernel sizes to derive multifarious informative feature maps
helps automatically extract the most informative features on the input gait signals.
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 764
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
Triblock CNN Layers: Each CNN block consists of two CNN1, CNN2 and CNN3 are first, second and third CNN
convolutional layers, one Rectifier Linear Unit (ReLU) blocks respectively, AD is the absolute difference of input
activation function layer, one cross channel normalization signal and A is the added result of each CNN block. After the
layer and one pooling layer. The input of 1D gait signals is addition of three CNN blocks, one ReLU, cross
converted to two-dimension in each CNN convolution layer normalization, max pooling and fully connected layer
which performs 2D convolution with the input. In follows. The output of max-pooling layer is reduced to
convolution layer, the number of kernels, size of the kernels 1x465x32 feature map, which will be subsequently provided
and stride are the parameters to be determined. The input size as input to the Fully connected layer. Also, output features
of 1×1860×1 gait data is given to three CNN blocks from the max-pooling layers which are non linear compact
separately, which performs 2D convolution, where the deep signals are processed using the Recurrence
number of convolution kernels is set as 64 and 32 for two Quantification Analysis (RQA) technique for further feature
convolution layers in each block. Size of convolution kernels extraction. The fully connected layer flattens 1x465x32
in first block is set as 1x64, 1x32, second block positioned to feature map to a single vector of 1024 features. Finally, 1024
1x32 and 1x16, and the third block as 1x128 and 1x64. The prominent compact deep CNN features are automatically
convolution layer uses the local connection, weight and bias extracted from TBCNN architecture, which will be utilized as
as its output is computed as shown in Eq. (2). input for classification process.
Zi,j = ∑ wi . xi,j + b (2) Selecting the CNN Parameters and Training Process:
The hyperparameters have to be chosen carefully to extract
Where xi,j =ADi,j (absolute difference), w is weight, b is the best features for improving the convolutional neural
bias and Zi,j is output of convolution layer. The feature map network's performance. The two types of hyperparameters
of 1×1860×64 is the output from the first convolutional layer chosen for CNN are (i) hyperparameter for network and (ii)
where each block is applied with the non-linear activation hyperparameter for training. The hyperparameter for the
function. Some of the common nonlinear activation functions network such as kernel size, number of kernels and the input
used in most studies are rectified linear units (ReLU), size. The hyperparameters for training the system such as
exponential linear units and leakage rectified linear units. The momentum, minibatch size, maximum epochs, number of
CNN is linear in nature, thus maintaining non-linearity and iterations per epochs and learning rate, is determined. In this
improving network accuracy requires assigning weights and work, we focus on the number of CNN layers and
kernel size, hence ReLU activation function is used in this hyperparameters for the Triblock CNN (TBCNN)
CNN block. The ReLU layer does not change the input size architecture to improve its performance. In our several
and performs a threshold operation to each input element by experiments through the trial-and-error process, we run the
changing the less than zero value to zero. ReLU function that system by varying values of hyperparameters to get accurate
applies max(0, Zi,j ) to each of the inputs which are results using the proposed network.
represented by Zi,j as in eq. (3)
2) Deep Recurrence Quantification Analysis (DRQA): Gait
signals are habitually noisy, non-linear and nonstationary.
ReLU = max (0, Zi,j ) (3) The non-linear nature is because of the way gait dynamics
are facilitated by coordinated activities of the brain. Henry
The transformation of output from ReLU layer is given as Poincare [6] presented the idea of recurrence, this can be
input into the Cross-Channel Normalization layer. The understood that any chaotic framework displaying
purpose of normalization is to efficiently organize gait data inconclusive movement of directions can repeat. In view of
by ensuring data dependency while eliminating redundant this reality, one can induce that the chaotic behaviour of gait
data. This layer helps create a local response normalization dynamics is recurring in nature. Recurrence Quantification
layer for each element based on the number of channels and Analysis (RQA) can investigate this recurring character of
window size. In first two CNN blocks, a window of 4 gait.
channels normalizes each input element and 5 channel
normalizes in third CNN block. Thereafter, the pooling layer To improve the performance of the proposed system in
is applied following normalization layer with 1×1860×64 classification phase, we implemented Deep RQA method
feature maps to reduce the number of parameters and using the input which is the compact representation of deep
computation. Pooling layer helps in reduction of dimensions CNN gait signals which are nonlinear. The RQA technique
of each feature map done as Z=max{z}. Here max pooling maintains non linearity in the input data and afford useful
layer with a kernel size 1×2 and stride value of 2 is applied in information concerning the pattern even for short interval
each block, which calculates the maximum value in each data [18]. Deep RQA technique is used in this work as an
feature map channel. additional feature extractor to make precise diagnosis of
NDD. The gait signals are transformed into deep compact
The feature map of 1×930×64 with optimal features is the representation of signals by implementing the triblock CNN
output of max-pooling layer. The output of max-pooling (TBCNN) architecture. The output from the seventh max
layer is given to the second convolutional layer in each block. pooling layer of TBCNN is the compact deep signals of
Thereby the output feature maps of three CNN blocks are length 1x465x32, which is averaged and acquired 465 deep
added element-wise and gathered 1×930×32 feature maps, compact signals. These deep signals are computed with the
which is shown in Eq. (4). RQA technique to compute deep RQA (DRQA) features.
Fig. 2. Time series plot represents the (i) actual Interval and (ii) absolute interval difference of (a) stride, (b) swing and (c) stance
data of Parkinson patient.
In this work, RP with a fixed number of nearest neighbours Recurrence Rate signposts the ND disease whereas lower RR
(FAN) is implemented. For each state 𝑎𝑖 (i=1,…, N) the confirms the controls subjects [8]. The recurrence rate is
threshold value εi alters to certify the same recurrence density defined in Eq.(5).
in all columns of the RP (i.e., RR= Nn /N). In this work,
visualizing the RP with FAN parameters are constructed with 𝑅𝑅 = 1 𝑁 2 𝑁
𝑖,𝑗=1 𝑅𝑃𝑖 ,𝑗
(𝜀) (5)
utmost care by observing RP's result. The parameters of RP
applied are as follows, the input for x is 465 deep compact The Determinism (DET) [8] measures the correlation of
signals from Triblock CNN architecture (N=465), the RP that forms the smallest diagonal lines of length𝐿𝑀𝑖𝑛 . The
embedding dimension m=40, delay time τ=5, nearest DET is measured as shown in Eq. (6).
neighbours Nn =40 and the index as one depicts the maximum 𝑁
𝐿 =𝐿𝑀𝑖𝑛 𝐿𝑝 ( 𝐿)
distance. The DRQA features are calculated from the RP The 𝐷𝐸𝑇 = 𝑁 𝐿𝑝 ( 𝐿) (6)
𝐿=1
features observed from DRQA are Recurrence Rate, Entropy, Where L is the length of slanting line and the histogram is
Determinism and Average Diagonal Line [8,] which are denoted by 𝑝 (𝐿 ). The extended diagonal lines formed due to
calculated below: The recurrence rate (RR) [8] quantifies the periodic signals will indicate the diseases while short lines
density of each points in a recurrence plot (RP). Increase in
TABLE I. P ERFORMANCE OF ML CLASSIFIERS WITH T BCNN_DRQA METHOD FOR THE CLASSIFICATION OF NDD VS CONTROL GROUP S
TABLE II. P ERFORMANCE OF ML CLASSIFIERS WITH T BCNN_DRQA METHOD FOR THE CLASSIFICATION OF TWO - GROUP S
RF 100% 100% 100% 100% 100% 100% 100% 100% 100% 100% 100% 100%
KNN 100% 100% 100% 100% 100% 100% 100% 100% 100% 100% 100% 100%
De cision 85.71% 83.33% 83.33% 90% 100% 100% 100% 100% 100% 100% 100% 100%
Tre e
Multi SVM 100% 100% 100% 100% 100% 100% 100% 100% 100% 100% 100% 100%
NDD dataset for classification of NDD vs control. The
Table I summarizes the performance of ML classifiers in the proposed Triblock CNN and Deep RQA technique with
classification of NDD and control group. The proposed Random forest classifiers (TBCNN_DRQA_RF) classifies
TBCNN_DRQA technique with Random Forest classifier neurodegenerative diseases with 99.96% improved accuracy.
achieves maximum accuracy than other classifiers in Table III represents the assessment of proposed work with
categorization of NDD. the previous works based on accuracy, sensitivity and
specificity. The result of Qiang Ye et.al [3] present the
2) Classification of Two Groups: The classification of two
accuracy of 90.63%, Fraiwan et al. [5] work gives 99.17%
groups such as ALS vs healthy controls, Parkinson’s vs
accuracy, Beyrami et.al. [19] work shows 99.57% accuracy,
healthy controls, and Huntington’s vs healthy control subject
is performed separately using the proposed technique. The Che-Wei Lin [17] gives 98.9% accuracy, while our proposed
performance of machine learning algorithms with work gives an improved accuracy rate of 99.96% compared
TBCNN_DRQA features is analyzed on metrics of accuracy, to others in the classification of NDD.
sensitivity, specificity and precision. The optimal features
obtained using the proposed TBCNN_DRQA technique helps The results of two group classification are also compared
the Machine learning classifiers achieve 100% accuracy in with other related works which is tabulated in Table IV and
classifying each disease group separately. represented in Fig.3. The work of Qiang Ye et al. [3] showed
an accuracy of 93.10%, 90.32%, and 94.44% for the
The performance of two group classification with ML
classification of ALS, PD and HD against healthy control
classifiers is summarized in Table II Random forest, KNN
and multi SVM works well with TBCNN_DRQA features (CO) subjects. P. Ghaderyan et al. [11] work shows 98%,
and classifies all two group with 100% absolute accuracy. 97%, and 95% accuracy in classification of ALS, PD and HD
Decision tree classifies ALS and healthy controls with against control subjects. Saljuqi et al. [2] work gives
85.71% accuracy and achieves 100% accuracy in other two accuracy of 94%, 97% and 93% for ALS, PD and HD
group classification. classification against control group.
IoT datasets, better results are achieved which are topology size of network and it attained 5.88 Root
99.05% accuracy, 1.31% TPR and 0.66% TNR. Mean Square Error (RMSE).
Blockchain and ML techniques are combined to RGB images based feature representation
detect android IoT malwares. Malware information is technique is applied for proposing enhanced malware
extracted using clustering and classification methods of visualization scheme for detecting IoT malwares by
ML and blockchain is used for information storing [10]. making use of CNN [15]. Created image includes
Clustering algorithm enhance feature selection by information of binary, assembly and string. CNN model
computing weights for every feature set, developing is utilized for combining self attention mechanism with
optimized parametric study and reducing unwanted spatial pyramid pooling. Spatial pyramid pooling helps
features repeatedly. Multi-purpose Naïve Bayes in avoiding information loss though IoT files are
classifier is used for classification purpose with more received in various sizes and it increases detection
accuracy. Accuracy of 98% is achieved with 0.98 F accuracy and efficiency. For experimental purpose,
measure according to the results. above 10K malware samples of 25 families are utilized
and 98.57% accuracy achieved.
In information centric IoT environment, advanced
persistent threats detection scheme is proposed by Large scale IoT malware and family classification
making use of domain graphs [11]. Relations between is performed on the basis of characteristics and
malicious domains and their corresponding IP addresses relationships among malwares [16]. More than 70K
are discovered. Subgraphs with more links are recent malware executable files including Covid related
incorporated for acquiring domain graph. Dataset of malware samples are utilized for analysis purpose.
257535071 DNS requests and 73136 domain names is Multi level strings based similarity analysis technique is
processed to analyze the performance. applied for classification by considering difficulties in
binary obfuscation of malwares. Features such as rival
Intelligent and dynamic analysis based IoT
IP addresses and malware specific strings are
malware detection scheme is proposed in order to detect
considered for performing reverse engineering.
familiar as well as novel IoT malwares [12].
Convolution Neural Network (CNN) model is utilized Industrial Internet of Things (IIoT) malware
for performing dynamic analysis in the IoT detection architecture Fed-IIoT is presented which is
environment. Feature extraction involves with the based on federated learning [17]. Fed-IIoT concentrated
features like network, memory, process, system call and in the detection of malicious android applications of
Virtual File System (VFS). Behavioral images of IoT IIoT. It is included with 2 parts which are participant
malwares are generated after converting extracted and server. In participant part, data triggering is
behavior data. CNN model is trained with the performed with 2 dynamic poisoning attacks on the
behavioral images of malwares. Based on the basis of Generative Adversarial Network (GAN) and
experimental results, 99.28% accuracy is attained. Federated Generative Adversarial Network (FedGAN).
In server part, global model monitoring and robust
ML methods are utilized for effective malware
training model modeling are aimed for avoiding
detection and classification. Byte sequences of
Anomaly in Aggregation by GAN Network (A3GAN).
executable program files are discovered for detection as
Fed-IIoT ensures secure communication without
well as classification [13]. With the 7 CPU
privacy related issues. Proposed method is validated
architectures, large sized dataset is utilized which is
with 3 IoT datasets. It is observed that Fed-IIoT
comprised with 111K benign samples and 111K
provides 8% better accuracy than earlier methods.
malware samples. Experimental results are depicted
with 99.96% accuracy and 98.47% accuracy for DL based multi-dimensional classification
malware detection and malware family classification approach is proposed to secure future networks like 5G
respectively. Further, Support Vector Machine (SVM) by considering the issues of IoT malware obfuscation
is combined for enhancing performance. [18]. For feature extraction, executable binary files are
represented in strings and image formats. More than 70
Two levels IoT malware detection mechanism is
thousand samples of IoT malware are analyzed and
proposed by considering node level and network level
99.78% accuracy is achieved for familiar malware
[14]. Light weighted runtime malware detector is
families. Further for unknown malware samples, IoT
deployed at node level to detect malwares which
tailored method is used.
utilizes Hardware Performance Counter (HPC) values.
Information of node level malware and malware TABLE 1
propagation are combined together without obstructing Summary of Recent Works
the performance of network. In addition, multi-attribute Proposed Performanc
Paper Features
graph translation is proposed to range and predict the Model/Algorith e results
several techniques to design and altering fuzzy the important components of framework are explained
controllers. This updated system decrease number of as follows.
rule sets.
Debugging
Fuzzification: Inputs are converted in UNSW-NB15 and Bot-IoT datasets are used in
fuzzification stage. Crisp numbers are transferred into which 80% of records of both datasets are applied for
fuzzy sets. After that computed crisp inputs of sensors training and remaining 20% records of both datasets are
are conceded towards control system. utilized for validating the proposed framework. It will
Inference Engine: It facilitates the selection of help to analyze and train the behavioral features of IoT
appropriate match amid rules and fuzzy input. Match is malwares. IoT malware detection is performed by
measured in terms of % and based on that rules to be executing all the executable files in real time
implemented are decided for the input given. Then environment which includes both benign and malware
related rules are integrated for developing control samples. After that, debugging is performed over the
actions. accomplished files.
Debugging
Feature
processing
Fuzzy partition Fi is described by descretizing the
value of Xi which is defined as Fi={F(I,1),….F(I,di)}
Classification
Malware
and fuzzy subset Fi,j is defined as Fi,j=Xi→[0,1]
(j=1,….di) and ∑𝑑𝑖 𝑗=1 𝐹𝑖, 𝑗(𝑥𝑖 ) for all x 𝟄 Xi. Fi,j
Benign
describes the unary fuzzy predicator as attribute which
are defined with the labels ‘large’ or ‘small’.
Fig. 3 Proposed Framework
On other side, every instance is also related with
label benign or malware for output space Y {benign,
malware}. Fuzzy partition Fi,j links each and every leaf
Fuzzy Pattern Tree nodes.
Fuzzy pattern tree is also employed for fastening
Fuzzy pattern classifier is defined as a set of
IoT malware detection effectively. It is included with a
Fuzzy Pattern Trees (FPT). FPT is defined as FPT =
tree like structure where fuzzy logic arithmetic
{FPTi|i =1,..,k} and every FPTi is related with class yi
operators are considered as inner nodes and input
attribute based fuzzy predicates are considered as leaf 𝟄 Y. To classify fresh instance x, prediction is done on
nodes [19]. Fuzzy pattern tree is depicted in Fig. 4. the basis of class of the tree with maximum score which
Bottom up induction is applied for fuzzy pattern tree in is defined as follows
which values of leaf nodes are combined by making use y^ = argmax(PTi(x)) for yi𝟄 Y
of fuzzy operators. At the end, output is presented to its
ancestor. Various pattern trees are created in every
Prediction Error of a pattern tree at every iteration malware execution. Fig. 5 and Fig. 6 show the
is computed for selecting best pattern tree. It is performance analysis plot of the proposed framework.
computed as follows
Percentage of
metrics
IoT
malware
precision Time
precision f1-score
Fuzzy AND
Feature 1
percentage of
metrics
Fuzzy OR
Time
precision recall f1-score
Feature 2 Feature 3
Fig. 6 Performance Metrics of the Proposed Model (Iteration2)
Fig. 4 Fuzzy Pattern Tree
C. Security Validation
Proposed framework is validated with the
B. Datasets Utilized following performance metrics TPR, TNR, FPR, FNR
UNSW-NB15 and Bot-IoT datasets are utilized and classification rate.
for the proposed IoT malware detection framework. True Positive Rate (TPR):
UNSW-NB15 dataset contains 257673 data records
which are based on network intrusions [20]. Further, it It is computed with the ratio amid appropriately
describes about 9 different attacks including trojans, forecasted IoT malware count and completely predicted
DDoS, DoS, worms, backdoors and fuzzers. IoT malware count. TPR value will be 1 while all the
malwares are detected and it is very rare. TPR is called
Bot-IoT dataset is related to real time dynamic in other words as the Sensitivity or Detection Rate
network environment [21-24]. It is included with (DR). It is formulated as follows.
72000000 records and size of Bot-IoT dataset is 69.3
GB of pcap files. It is available in csv format too for 𝑇𝑃
𝑇𝑃𝑅 =
downloading in 16.7 GB size. DDoS, DoS, OS and 𝑇𝑃 + 𝐹𝑁
service scan, data exfiltration and keylogging are the
different types of included attacks of the dataset. True Negative Rate (TNR):
Experimental Setup and Results A true negative is an outcome where the model
The proposed framework is experimentally tested correctly predicts the negative class. It is formulated as
in a secured lab setup. The server runs in Ubuntu server TN/TN+FP.
automated using kubernetes for deployment. The False Positive Rate (FPR):
kubernetes is configured to automate the data
It is computed with the ratio amid the number of
processing and deployment. The experimental
benign samples wrongly classified like an attack and
validation is performed in the basis of two situations 1)
the total number of benign samples. It is formulated as
with malware executed environment and 2) without
follows.
of our technique. Then we go over the basics of The pictures have been kept there JPG format with a
methodology, such as our model design, evaluation data, resolution of 2592*1728 pixels and a 32-bit RGB colour
and preprocessing. The reregulation of our CU palette.
categorization mode is then presented. Following that, we
discuss the findings before establishing boundaries and Corneal ulcers are divided into three categories based
on their appearance and location.:
making recommendations for future work.
II. RESEARCH BACKGROUND TABLE 1.CLASSIFICATION SPECIFICATIONS FOR
DATASETS
A. Corneal Ulcer Manifestations. ________________________________________
Identifier category number Proportion
CU is the most prevalent symptom of corneal disease
0 point-likecornealulcers 358 50.28%
(also known as keratitis).CUs are induced by a variety of
reasons and often result in mild to severe ocular discharge 1 point-flakymixedcorneal ulcers 263 36.95%
as well as decreased vision[1,2,]. In humans, late 2. flaky corneal ulcers 97 12.78%
diagnosis or insufficient treatment can result in
irreversible vision loss or even blindness [1, 2, 7]. To ______________________________________________
diagnose corneal illnesses and avert visual impairment,
medical diagnostics are critical[1].
B. Preset Examination of Corneal Ulcer IV. DATAPREPROCESSING
A variety of semi-automated and fully-automated
developments in CU examination have been expected. The following pre-processing techniques were used to
Rodriquezetal.[24] employed digital image analysis to improve the classification performance of the network.
extract the CU region of interest, whereas Chantal.[25] These strategies were used throughout the network's
and Petersonetal.[25] built a colour extraction technique. training period. Figure 1 may display the three various
Based on manual CU area segmentation, Deng et al[23] types of corneal images that were processed.
also anticipated automatic progress. Sun et al.[22] and
Loo et al. [17] created innovations based on deep Place a mask over the images to do information
learning with a view to market segmentation. CU region filtering and identify the primary site of the corneal ulcer.
in the setting of completely automated advances.
To boost contrast and allow for additional information
Furthermore, DCNNs were employed by Akram and
on cornea images, adaptive histogram equalisation (AHE)
Debnath [19] to locate the ulcer region and define a
[24] should be utilised.
perimeter around it.
To speed up the network's convergence time, all of the
However, although all of these research point to
cornea pictures are scaled to the same size and averaged.
advances in CU segmentation, Specifically, they do not
allow for the classification of several distinct CU pattern In 2017, Google and CMU [25] partnered on a work
types, as we propose and which is feasible without the that showed that deep learning efficiency in visual
need of a detection breakthrough. problems requires a lot of marker data. In this study, we
use a range of techniques to enhance the data operations
Kuo et al. [21] The development of a deep learning-
including miscue transformation, scaling, angle rotation,
based corneal image model for the aim of differentiating
and random roll off, among others. When more data are
between the various forms of microbial keratitis is one
made accessible for the model's training, the model's ability
of the most recent developments in the area, as well as
to generalise is enhanced.
the one that is most equivalent to the work that we have
done. The average level of diagnostic accuracy is 69.5
percent, which is good but falls short of the high level of
precision anticipated in the healthcare industry [16].
All of the technologies that were discussed have had
positive effects in terms of identifying sickness and
preventing it. Automated CU assessment, which use
images of the cornea and fluoresce in staining, is used to
get these findings. On the other hand, the projected
models prove to be inaccurate and ineffective at
achieving the desired results.
III. DATASET
A total of 512 Patients with various degrees of corneal
ulcers were given fluorescein-staining pictures of the
Figure-1 Three types of corneal images
eyeball's surface at the SunYat-sen Eye Center at SunYat-
sen University. These photos were taken by patients. [10].
V. FEATURE EXTRACTION USING DCNN fluorescein staining images and a range of datasets (e.g.,
An artificial neural network called a deep SUSTech-SYSU), all of which add to our model's routine
convolutional neural network (DCNN) collects features and strength.
from input and classifies high-dimensional data. The
DCNN algorithm is a two-dimensional form rearranging
technique that is very resistant to changes, scaling,
skewing, and other imperfections. Feature extraction,
feature mapping, and sub sampling layers are among the
layers in the structure.
A DCNN is made up The third level, which is an
entirely connected output layer, comes after the first two
levels, which are made up of several convolution and
subsampling processes. Multilayer Neural Networks are
physically relocated variations of Deep Convolution
Neural Networks [6]. [3] based on the experiments. Each
cell has a receptive field, which is a small part of the
diagram fields. According to [4] separates cells into two
categories: both simple and complex cells. Complex cells
are able to acquire a large portion of these geographically
specific properties, while simple cells can only extract
local attributes. from a geographic perspective
surrounding. DCNN aims to apply this structure by
aggregating information from the input space in a similar
way, then staging the classification. Figure 2 Active corneal ulcer scar of VGG16 model
Abstract—Brain tumor has an impact on people in every age physiological designs can be handled and controlled to assist
group and considerably raise the global mortality rate. A tumor with envisioning stowed away indicative elements that are
is comprised of tissue from collected abnormal cells. The benign generally troublesome or difficult to recognize utilizing planar
brain tumor is non-destructive and is not cancerous. S everal imaging techniques [3]. A brain tumor (BT) is a dangerous or
brain MRI scans are widely required for classifier technique of non-carcinogenic development of strange cells in the brain,
machine learning (ML) for the segmentation of brain tumors. In which prompts harmless or threatening BTs [4]. The majority
optimal classification model, the factors that are to be deliberated of the analysts are participating in the essential kind of tumors
include computational resources, classification accuracy, and
like Gliomas. Gliomas is treated through chemotherapy,
algorithm performance. This study emphasizes the design of
Intelligent Deep Residual Network based Brain Tumor Detection radiotherapy, and medical procedure. Robotization by PC
and Classification (IDRN-BTCC) approach. The presented
helped gadgets can be utilized to get vital clinical information
IDRN-BTCC method majorly aims to recognize and classify the like tumor presence, area, and type [5]. Be that as it may, it is
presence of BT or not in the medical images. To do so, the as yet an extremely difficult errand in surveying their shape,
projected IDRN-BTCC model follows two subprocesses namely volume, limits, tumor recognition, size, division, and
feature extraction and classification. Primarily, residual network arrangement. Likewise, BT force shifts from one person to
(ResNet) model is exploited as a feature extractor which helps to another. MRI is liked over other treatment and finding
generate feature vectors. In addition, multilayer perceptron strategies since it gives unrivaled picture contrast in delicate
(MLP) module is exploited to categorize the medical images into tissues and has painless properties [6].
distinct classes. The hyperparameter tuning of the ResNet model The moving errand in BT is because of high changeability
takes place using chicken swarm optimization (CS O) algorithm. and innate MRI information qualities [7], e.g., fluctuation in
For examining the enhanced performance of the suggested tumor sizes or shapes, tumor location, region estimation,
IDRN-BTCC module, an experimental validation process is division, grouping, and tracking down vulnerability in
tested using benchmark data set and the result highlights the sectioned districts. The main assignment in picture
enhancements of the IDRN-BTCC approach over recent understanding is picture division since it helps highlight
methodologies. extraction, region computation, and importance in some
genuine applications [8]. It tends to be utilized, for instance,
Keywords— Brain tumor, Deep learning, Intelligent models, assessment of tumor volume, tissue grouping, platelet outline,
Medical imaging, ResNet model
restriction of tumors, matching of a map book, careful
preparation, and picture enlistment [9]. For checking oncologic
I. INT RODUCT ION treatment, the exact and morphology evaluation of tumors is a
Clinical centers offer numerous choices to help patients in basic undertaking. Be that as it may, broad scale work has been
discovery of medical conditions. Late advances in PC research acted out in this field; yet at the same time; clinicians rely upon
acquired numerous novel thoughts in the field of robotized manual assurance of tumors, because of absence of connection
clinical and emotionally supportive networks [1]. New among scientists and clinicians [10].
magnifying lenses are utilized to notice tissues and organs. This study emphasizes the design of Intelligent Deep
Sight and sound frameworks help in assessments [2]. Residual Network based Brain Tumor Detection and
Consequences of screenings and sweeps are assessed on Classification (IDRN-BTCC) method. The presented IDRN-
screens which gives great show support in point by point BTCC approach majorly aims to recognize and classify the
assessments. With PC strategies, complex advanced pictures of presence of BT or not in the medical images . To do so, the
projected IDRN-BTCC model follows two subprocesses
namely feature extraction and classification. Primarily, residual images. To do so, the projected IDRN-BTCC model follows
network (ResNet) module is exploited as a feature extractor two subprocesses namely feature extraction and classification.
which helps to generate feature vectors. The hyperparameter
A. Feature Extraction and Classification
tuning of the ResNet model takes place using chicken swarm
optimization (CSO) algorithm. In addition, multilayer ResNet applies residual block (RB) to resolve the
perceptron (MLP) module is exploited to classify the medical degradation and GD problem existing in common CNN [17].
images into distinct classes. For examining the enhanced The RB isn’t depending on network depth and improves the
performance of the suggested IDRN-BTCC module, an process of the system. It is noted that ResNet networks have
experimental validation process is tested by utilizing given effective outcomes in ImageNet classification method:
benchmark dataset. ( ) ( )
In Eq. (1), indicates the input of RB; denotes the
II. RELAT ED W ORKS weight of remaining block; indicates the consequence of RB.
In [11], the author modelled a method that employs deep ResNet network has various RB in which convolutional kernel
TL to automatically categorize abnormal and normal brain MR sizes of convolutional layers is different. The conventional
images. CNNs related ResNet34 method was employed as a structure of ResNet encompasses ResNet101, RetNet18, and
DL method. The author has employed current DL methods like RestNe50. Here, ResNet50 is applied as a feature extractor.
fine-tuning, optimal learning rate finder, and data augmentation Fig. 1 illustrates the framework of ResNet technique.
for training the method. Gull et al. [12] presented a unique
classification and segmentation structure related to effective
TL. In this structure, threshold and fast bounded box
approaches were employed for segmenting purposes. The two
pre-trained CNNs VGG-19 and AlexNet were employed for
categorization utilizing TL. In pre-trained techniques, 2 TL
methods fine-tuning and stochastic gradient descent with
restarts (SGDR) can be enforced via MRI through Figshare and
Kaggle data.
In [13], the Grab cut technique was implemented for
precise segmentation of actual lesion symptoms whereas TL
method visual geometry group (VGG-19) can be finely tuned
for obtaining attributes which can be concatenated with hand
crafted (texture and shape) features with the use of serial-
oriented technique. Such features will be optimized by using
entropy for fast and accurate classification and the fused vector
was dispersed to classifiers. In [14], the author leverages brain
contrast-enhanced MRI (CE-MRI) benchmark datasets for
categorizing 3 kinds of brain tumors (pituitary, glioma, and
meningioma). Owing to the small number of trained data, this (A)
classifier systems assess deep TL for extracting feature through
9 deep pre-trained CNNs structures. The work, mainly intends
to rise the classifier precision, speed the training period and
evade overfitting.
Asif et al. modelled a robust and efficient technique related
to TL approach to classifying brain tumors through MRI. To
boost brain tumor diagnostic system, the popular DL structures
were used in this study [15]. The pre-trained techniques like
InceptionResNetV2, Xception, DenseNet121 and NasNet
Large were leveraged for the abstraction of the deep features
from brain MRI. The experiments were executed with the help
of 2 benchmark data that are openly available on the web.
Images from the datasets are initially augmented, cropped, and
preprocessed for fast and accurate training. Arbane et al. [16]
devise a DL approach for classifying brain tumors from MRI
images with the use of CNNs depending upon TL. The
enforced system would explore a number of CNN structures, (B)
such as MobilNet-V2, ResNet, and Xception.
Fig. 1. (A & B) Basic Block diagram and Structure of ResNet
III. THE PROPOSED M ODEL
In this study, a new IDRN-BTCC method majorly aims to Features attained as ResNet architecture are set in MLP
recognize and classify the presence of BT or not in medical layer for the classification of images. MLP method
encompasses three mechanisms such as output, input, and
hidden layers [18]. The MLP module comprises different
hidden layer that allows the system to have processing and demonstrates the place of mothers of the chicks.
computation abilities to produce the output: implies the arbitrary variables which represent that the
chick is followed by its mother to search for food. Assume
∑ ( ) separate differences, the of all chicks will be in interval of
zero and two.
In Eq. (2), indicates the input variable, indicates the
weight amongst the input variable and neuron , and IV. RESULT S AND DISCUSSION
indicates the input parameter bias term. The result analysis of the RDCN-MLDR model is tested on
( ) ( ) the benchmark Kaggle dataset which holds images under five
classes.
In Eq. (3) indicates the sigmoid function for neuron and
denotes the sum of weights. Finally, the output neuron is
defined as:
∑ ( )
{ [ ]
( )
( )
( ) implies the Gaussian distribution with mean
of and standard deviation (SD) of represents the lesser
constant in computation. For preventing failures in separating
by 0, implies the label of roosters arbitrarily selected in
rooster populations. stands for fitness respective to . The
place of hens is upgrading as:
( )
Fig. 3. TLS and VLS analysis of IDRN-BTCC system
( ) ( )
(( ) ( ( ) )) ( ) The TLS and VLS of the IDRN-BTCC method are tested
( ) ( ) on BT performance in Fig. 3. The figure inferred that the
In which signifies the arbitrary value in zero and one. IDRN-BTCC P model has revealed better performance with
indicates the label of roosters arbitrarily selected in the least values of TLS and VLS. It is evident that the IDRN-
populations as spouse of hen. defines label of chicks BTCC approach has resulted in reduced VLS outcomes.
arbitrarily selected, and and , thus Table 1 reports the comparative analysis of RDCN-MLDR
If , it determines that hen is merely methodology with current algorithms.
taking food from another chick [20]. The place of chicks is
upgrading as:
( ) ( )
T ABLE I
COMPARAT IVE ANALYSIS OF RDCN-MLDR MET HOD WIT H
RECENT T ECHNIQUES
Fig. 4 exhibits an overall assessment of the IDRN- Fig. 6. analysis of RDCN-MLDR method with current approaches
BTCC model with other classification models. The figure
represented that the SGT-CNN model has exhibited worst Fig. 5 shows an overall assessment of the IDRN-
performance with of 91.20%. Next, the multi-modal BTCC model with other classification models. The figure
BTS model has depicted slightly improved of 92.60%. represented that the Multi-Modal BTS model has exhibited
In contrast, the multifractal TE-DSBT model has exhibited worst performance with of 93.00%. Subsequently, the
considerable outcomes. Although the D-CNN and FBGBTDS- SGT-CNN approach has depicted slightly improved of
ANFIS models have demonstrated reasonable performance 93.40%. In contrast, the FBGBTDS-ANFIS model has
with values of 96.58% and 96.20% respectively. But the exhibited considerable outcomes. Although the Multifractal
IDRN-BTCC model has shown enhanced results with supreme TE-DSBT and D-CNN techniques have established reasonable
of 97.17%. performance with values of 95.1% and 96.14%
correspondingly. But the IDRN-BTCC method has shown
enhanced results with supreme of 98.77%.
Fig. 6 exhibits an overall assessment of the IDRN-
BTCC model with other classification models. The figure
represented that the SGT-CNN model has exhibited worst
performance with of 93.30%. Followed by, the Multi-
Modal BTS model has shown slightly improved of
93.30%. Conversely, the Multifractal TE-DSBT approach has
exhibited considerable outcomes. Although the Multifractal
FBGBTDS-ANFIS and D-CNN methods have established
reasonable performance with values of 96.4% and
97.31%% correspondingly. However, the IDRN-BTCC
approach has revealed improved results with supreme of
98.07%.
At last, a detailed study of the IDRN-BTCC method is [2] Amin, J., Anjum, M.A., Sharif, M., Jabeen, S., Kadry, S. and Moreno
made with respect to CT in Fig. 7 and Table 2. With respect to Ger, P., 2022. A New Model for Brain T umor Detection Using
Ensemble T ransfer Learning and Quantum Variational
CT, the IDRN-BTCC system has gained least CT of 19.99s Classifier. Computational Intelligence and Neuroscience, 2022.
whereas the D-CNN, FBGBTDS-ANFIS, SGT-CNN, BTS- [3] Rehman, A., Naz, S., Razzak, M.I., Akram, F. and Imran, M., 2020. A
MRI-CNN, Multi-Modal BTS, and Multifractal TE-DSBT deep learning-based framework for automatic brain tumors classification
techniques have reached increased CT of 51.61s, 56.60s, using transfer learning. Circuits, Systems, and Signal Processing, 39(2),
57.10s, 40.72s, 31.22s, and 23.33s correspondingly. pp.757-775.
[4] Polat, Ö. and Güngen, C., 2021. Classification of brain tumors from MR
T ABLE II images using deep transfer learning. The Journal of
Supercomputing, 77(7), pp.7236-7252.
CT ANALYSIS OF IDRN-BT CC APPROACH WIT H RECENT
ALGORIT HMS [5] Amin, J., Sharif, M., Yasmin, M., Saba, T ., Anjum, M.A. and Fernandes,
S.L., 2019. A new approach for brain tumor segmentation and
Me thods Computational Time (sec) classification based on score level fusion using transfer learning. Journal
of medical systems, 43(11), pp.1-16.
IDRN-BT CC 19.99
D-CNN Model 51.61 [6] Kaur, T . and Gandhi, T .K., 2020. Deep convolutional neural networks
with transfer learning for automated brain image classification. Machine
FBGBT DS-ANFIS 56.60 Vision and Applications, 31(3), pp.1-16.
[7] Mehrotra, R., Ansari, M.A., Agrawal, R. and Anand, R.S., 2020. A
SGT -CNN 57.10
transfer learning approach for AI-based classification of brain
BT S-MRI-CNN 40.72 tumors. Machine Learning with Applications, 2, p.100003.
[8] Kumar, K.A., Prasad, A.Y. and Metan, J., 2022. A hybrid deep CNN-
Multi-Modal BT S 31.22 Cov-19-Res-Net T ransfer learning architype for an enhanced Brain
tumor Detection and Classification scheme in medical image
Multifractal TE-DSBT 23.33 processing. Biomedical Signal Processing and Control, 76, p.103631.
[9] Khan, H.A., Jue, W., Mushtaq, M. and Mushtaq, M.U., 2020. Brain
tumor classification in MRI image using convolutional neural
network. Math. Biosci. Eng, 17(5), pp.6203-6216.
[10] Ahmad, S. and Choudhury, P.K., 2022. On the Performance of Deep
T ransfer Learning Networks for Brain T umor Detection using MR
Images. IEEE Access.
[11] T alo, M., Baloglu, U.B., Yıldırım, Ö. and Acharya, U.R., 2019.
Application of deep transfer learning for automated brain abnormality
classification using MR images. Cognitive Systems Research, 54,
pp.176-188.
[12] Gull, S., Akbar, S. and Shoukat, I.A., 2021, November. A Deep Transfer
Learning Approach for Automated Detection of Brain T umor T hrough
Magnetic Resonance Imaging. In 2021 International Conference on
Innovative Computing (ICIC) (pp. 1-6). IEEE.
[13] Saba, T ., Mohamed, A.S., El-Affendi, M., Amin, J. and Sharif, M.,
2020. Brain tumor detection using fusion of hand crafted and deep
learning features. Cognitive Systems Research, 59, pp.221-230.
[14] Chelghoum, R., Ikhlef, A., Hameurlaine, A. and Jacquir, S., 2020, June.
T ransfer learning using convolutional neural network architectures for
Fig. 7. CT analysis of IDRN-BT CC approach with recent algorithms brain tumor classification from MRI images. In IFIP International
Conference on Artificial Intelligence Applications and Innovations (pp.
189-200). Springer, Cham.
V. CONCLUSION
[15] Asif, S., Yi, W., Ain, Q.U., Hou, J., Yi, T . and Si, J., 2022. Improving
In this study, a new IDRN-BTCC method majorly aims to Effectiveness of Different Deep T ransfer Learning-Based Models for
recognize and classify the presence of BT or not in medical Detecting Brain Tumors From MR Images. IEEE Access, 10, pp.34716-
images. To do so, the projected IDRN-BTCC model follows 34730.
two subprocesses namely feature extraction and classification. [16] Arbane, M., Benlamri, R., Brik, Y. and Djerioui, M., 2021, February.
Primarily, ResNet module is applied as a feature extractor T ransfer learning for automatic brain tumor classification using MRI
images. In 2020 2nd International Workshop on Human-Centric Smart
which helps to generate feature vectors. In addition, MLP Environments for Health and Well-being (IHSH) (pp. 210-214). IEEE.
approach was exploited to classify the medical images into [17] Pustokhin, D.A., Pustokhina, I.V., Dinh, P.N., Phan, S.V., Nguyen, G.N.
distinct classes. For examining the enhanced performance of and Joshi, G.P., 2020. An effective deep residual network based class
the suggested IDRN-BTCC module, an experimental validation attention layer with bidirectional LSTM for diagnosis and classification
process was tested ny utilizing benchmark dataset and the of COVID-19. Journal of Applied Statistics, pp.1-18.
result highlights the developments of the IDRN-BTCC model [18] Mahmoudi, J., Arjomand, M.A., Rezaei, M. and Mohammadi, M.H.,
over recent methodologies. 2016. Predicting the earthquake magnitude using the multilayer
perceptron neural network with two hidden layers. Civil engineering
REFERENCES journal, 2(1), pp.1-12.
[19] Meng, X., Liu, Y., Gao, X. and Zhang, H., 2014, October. A new bio -
[1] Deepak, S. and Ameer, P.M., 2019. Brain tumor classification using inspired algorithm: chicken swarm optimization. In International
deep CNN features via transfer learning. Computers in biology and conference in swarm intelligence (pp. 86-94). Springer, Cham.
medicine, 111, p.103345.
[20] Ci, Y., Wu, H., Sun, Y. and Wu, L., 2022. A prediction model with
wavelet neural network optimized by the chicken swarm optimization
for on-ramps metering of the urban expressway. Journal of Intelligent
Transportation Systems, 26(3), pp.356-365.
[21] Vijayakumar, T . "Classification of brain cancer type using machine
learning." Journal of Artificial Intelligence 1, no. 02 (2019): 105-113.
[22] Karuppusamy, Dr P. "Hybrid Manta Ray Foraging Optimization for
Novel Brain T umor Detection." Journal of Soft Computing Paradigm
(JSCP) 2, no. 03 (2020): 175-185.
of the activation maps and the amount of the framework • Sigmoid output are not zero-centered leading gradients to
in the network, hence lowering the extensive figuring swing between positive and negative values.
intricacy. This resolves the issue of Overfitting. The 1
f (x) = (2)
requirement for various ConvNet section is questioned in 1 + e−x
the study of Alexey Dosovitskiy et al. [3], who discov- Tanh: Equation (2) makes it evident that Tanh, which produce
ered that conv layers swap max pooling layers. And this values between -1 and 1, can be viewed as an advanced
primarily applies to basic nets with outperformed various adaption of the sigmoid. Although this function also has the
complicated current architectures depicts in figure 3. saturating gradients issue, the second issue mentioned above
4) Fully Connected Layer: As in a typical neural network, is resolved because the outputs are zero-centered. Tanh is
all of the neurons in the preceding layer are completely therefore practically favored to sigmoid.
linked to the neurons in this layer. This involves using
tanh = 2f (2x) − 1 (3)
complex logic. A conv layer unable to come after a
fully linked layer since the neurons are not entirely ReLU: According to Equation, it is a linear activation
ordered. The latest developments have seen some function with a threshold at zero (3). By using ReLU,
TABLE I
L ITERATURE S URVEY RELATED TO CNN T ECHNOLOGY
R EFERENCES
[1] N. Aloysius and M. Geetha, ”A review on deep convolutional
neural networks,” 2017 International Conference on Communica-
Abstract— Today, cosmetics have a big impact on how practices and supplies. As a result, it could be challenging
people look. Customers can access a range of products and for the general public to keep up a healthy routine and select
conduct e-commerce on the website. Choosing the best product the appropriate products for their skin type.
for our skin might be challenging. It offers a prediction
approach so that individuals can select the goods that are
suitable for their skin type. Configuration concepts perform II. RELATED WORK
better than conventional methods. It uses deep learning
technology to streamline the complex procedures in the IT Numerous applications of deep learning exist, including
industry for cosmetics and beauty care. Along with its clients speech recognition, computer vision, and natural language
and product offerings, the beauty sector has grown over time. processing (NLP). I incorporate it into my recommendations
With the expansion of products and consumers, selecting the as well. Recent applications for session-based suggestions,
right cosmetics becomes more and more important. Due to the music recommendations, and news recommendations are
substantial influence that cosmetics have on a person's noteworthy [1]. Tingting Li, Ruihe Qian, and colleagues
appearance, the client should choose the best cosmetics for
suggested a Deep Generative Adversarial Network to
themselves based on personal factors (skin type). Given that
every person has a distinct type of skin, choosing cosmetics that
transfer cosmetics from one image to another.
suit the person may be difficult. The composition depends on
whether the client has oily, dry, or neutral skin. Even the Rio Iwabuchi, Yoko Nakajima, and others suggested a
product the user is looking for can have an extremely difficult system for making recommendations that is based on user
skin condition; AI algorithms are perfectly suited to address feedback and cosmetic ingredients. Her research focuses on
this problem since they can evaluate massive amounts of identifying cosmetics that include lots of ingredients that
unstructured data and generate insightful results. make people look beautiful using user feedback. In essence,
they created a group of individuals with equivalent skin-
Keywords— Deep learning Technology, Consumers,
extracted user characteristics (such as age and skin quality)
Artificial Intelligence, Skin Type
selected by the individuals during registration. For every
cosmetic product, we create lotions with a high percentage
I. INTRODUCTION of beauty effect tags. To determine this threshold, they
A skin care regimen is a method for taking care of your employed natural classification techniques. For component
skin. To make sure that the skin is healthy and in good extraction, they applied the TF-IDF concept, which is
condition, this process is crucial. It should take different intended to pinpoint the words that best capture the meaning
routines into consideration depending on the skin type. It of a text. Values from the IF-IPF calculation were sorted.
must comprehend your skin's health and symptoms in order The recommendations are based on the IF-IPF values' top
to establish the skin type. As a result, determining one's own components after sorting [5].
skin type might be challenging for those who are unfamiliar
with their own skin. Skin type can be established using a Yuki Matsunami et al. created a tag-recommendation
variety of factors, such as gender, age, amount of sleep, and approach for evaluating cosmetics in a recommendation
skin condition. Four categories of skin exist: mixture skin, system. This study aims to draw attention to the review text.
normal skin, oily skin, and dry skin. Dryness has an eerie An automatic scoring system was used to assign scores to
resemblance to rough, scaly, or scaly skin. the review text. To determine the review's score, the
algorithm reads the text, rates the sentences, extracts k units
Shiny, oily, or potentially big pores are signs of the oily from the review text, rates the sentences, and adds up all of
condition. It possesses qualities that are in the middle. the components. After that, the machine recommends high-
Combination skin, as opposed to normal skin, is skin that is scoring tags to assess the expression [6]. Asami Okuda et al.
oily in some places and dry in others. There are no resources suggested a technique to discover comparable users based
available to assist non-experts in identifying their skin type. on preferences across cosmetic clusters
Visit a beauty salon to receive guidance on skincare
III. SKIN CARE ROUTINE the Kaggle website. There are 120000 records in the data
Skin care routine is a set of processes to take care of collection overall (80% training records and 20% testing
individual skin. Different types of skin have a different records). The epoch in this situation denotes how many
routine and procedure to be followed. In this section will times the loop has finished. An entire data collection cannot
discuss skin type determination, skin routine and chemicals be given to a neural network at once. The training data set is
that need to be avoided by the user. then used to build a stack.
IV. METHODOLOGY
initially preprocessed with a second-stage processing patch initially be trained on a lot of data in order for it to extract
since the input data is required to assess the effectiveness of input features.After receiving input, an algorithm first does
deep learning (a cropped portion of each image). In order to image preprocessing, then features are extracted using the
verify that the patches had adequate segmentation for saved dataset, followed by data classification, and lastly
analysis, patches were obtained using bounding boxes. output.
Then, using mirror images that had been rotated 30, 10, 10,
and 30 degrees and had been turned from right to left, data Only inputs for which a CNN has been trained and data
augmentation was carried out exclusively on the training stored can be processed by a CNN. They are employed in
dataset is illustrated in Fig.2 image recognition, classification of images, medical image
analysis, and recommendation systems.
4.4. Image Labeling and Dataset Distribution
Each subject was ranked separately using four sets of
photos. In the Image Archive and Communication System
(PACS), the annotations were first scored on the original
images and then again on the shrunk-down images utilized
for the actual training data. Internal and temporary data sets
were used to score the tests. The internal dataset was
separated into subgroups for training (70%), testing (15%),
and validation (15%) as shown in Fig.4
Fig. 2 Data Preprocessing
VI. CONCLUSION
Making decisions in the modern world is more difficult than
Fig. 8 Recommended Eye cream it was in the past, particularly for customers who are now
faced with a wide range of options for numerous brands and
The graph of training & validation of accuracy and training product categories. Based on different skin types, this
& validation of accuracy is shown below Figure 9. method provides the composition (i.e. dry, oily or natural).
The improvement of cosmetic product composition is our
REFERENCES
[1] Jason Brownlee. “What is Deep Learning?” accessed on 29
November 2019, https://machinelearningmastery.com/what-is-
deeplearning/.
[2] Jan Goodfellow, Yoshua Bengio, and Aaron
Courville.2016.DeepLearning.MITPress.http://www.deeplea
rningbook.org, pp-800.
[3] Wikipedia. “Deep Neural Network”, accessed on
30November,2019.https://en.wikipedia.org/wiki/Deep_lear
ning#Deep_neural_networks.
[4] Wikipedia. “Deep Belief network”, accessed on
30November,2019.julyhttps://en.wikipedia.org/wiki/Deep_
belief_network.
[5] Rio Iwabuchi et al, “Proposal of Recommender System Based on
User Evaluation and Cosmetic Ingredients”, IEEE 2017.
[6] Yuki Matsunami et al, “Tag Recommendation Method for a
Cosmetics Review Recommender System”, iiWAS’17, ACM 2017
[7] Asami Okuda et al, “Finding Similar Users Based on Their
Preferences against Cosmetic Item Clusters”, iiWAS’17, ACM 2017.
[8] Christopher J. Holder et al, “Visual Siamese Clustering for Cosmetic
Product Recommendation”, ACCV 2018, Springer, 2017, 510-522.
[9] Yuncheng Li et al, “Mining Fashion Outfit composition using an End-
to-End deep learning approach for set data”, IEEE transaction on
multimedia 2017, IEEE, 2017.
[10] Jiwon Jiong, “For Your Skin Beauty: Mapping Cosmetic Items with
Bokeh”, accessed on 23 June 2019.
[11] Yun Fu, Shuyang Wang. “System for the beauty, cosmetics and
fashion”. United States Patents US 20170076474A1, 2017.
[12] Sid Salvi, Meghan Maupin, Nava Haghighi. System and methods for
formulizing personalized skin care product. United States Patents US
20190237194A1, 2019.
[13] Alexandros Karatzoglou and Balázs Hidasi. “Deep Learning for
Recommender Systems”, RecSys’17, August 27– 31, 2017.
[14] Weiwei Guo, Huiji Gao, et al, “Deep Natural Language Processing
for Search and Recommender Systems”. KDD ’19, ACM, 2019.
[15] Taleb Alashkar, Songyao Jiang et al, “Examples-Rules Guided Deep
Neural Network for Makeup Recommendation” Association for the
Advancement of Artificial Intelligence, AAAI, 2017.
[16] Tingting Li, Ruihe Qian et al, “BeautyGAN: Instance-level Facial
Makeup Transfer with Deep Generative Adversarial Network”,
Multimedia (MM, 2018), ACM, 2018.
[17] Songsri Tangsripairoj, Kwanchanok Khongson et al, “SkinProf: An
Android Application for Smart Cosmetic and Skincare Users”,
International Joint Conference on Computer Science and Software
Engineering, JCCSE, 2018.
[18] Florian Strub, Romaric Gaudel et al, “Hybrid Recommender System
based on Autoencoders”, DLRS ’16, September 15 2016, Boston,
MA, USA, ACM, 2016.
[19] Valeriy Gavrishchaka, Zhenyi Yang, Rebecca Miao, and Olga
Senyukova. “Advantages of Hybrid Deep Learning Frameworks in
Applications with Limited Data”, International Journal of Machine
Learning and Computing IJMLC, 2018.
[20] Najm, Hayder, Hayder Ansaf, and Oday A. Hassen. "An Effective
Implementation of Face Recognition Using Deep Convolutional
Network." Journal of Southwest Jiaotong University 54, no. 5 (2019).
farmers may be duped by agents into paying less than they and selling of agricultural products can all benefit from
are worth. blockchain technology. Smallholder farmer financial
To address these problems, the blockchain-based transaction tracking and the application of blockchain
agricultural supply chain management venture FARmer was technology in the food and agricultural industries are two
created (Farmer And Rely). Farmers are increasingly further research foci [10,14].
adopting Blockchain Technology (BCT) to manage supply
chains in the agriculture sector due to its rising popularity in
recent years. Information from a supply chain can be safely
stored using Distributed Ledger Technology (DLT), which
is used in conjunction with Blockchain. A hash and a pre-
hash Signature Value link one block to the next. As part of a
decentralized network, servers all over the world process
transactions. Once the information has been input or
committed, no modifications can be made. No piece of
information is ever compromised. Agriculture has a lot to
gain from using blockchain technology, and so do
customers. Thanks to cryptography and peer-to-peer
architecture, all participants may rest certain that their data Fig 1: Model representation of Blockchain
will be secure and unchangeable in the event of a breach,
and that all transactions will be open for scrutiny by all
parties involved. Its allure cannot be denied. The blockchain B. Smart Agriculture
improves distributed networks' efficiency, openness, and The backbone of Agri-food systems is the collection of
trustworthiness [7,11,15]. vital data and information on the natural resources necessary
for the continuation of all types of farming. The flow of
II. LITERATURE SURVEY money is from outputs to inputs, but the flow of information
A. Blockchain and data is the other way around, via intermediary value-
The use of blockchain technology for the storing and adding phases. Many different people and organizations,
movement of data has enormous potential to improve each with their own unique set of resources and expertise,
agricultural operations. This innovation can benefit both contribute to the development and upkeep of databases and
industrial farming and home gardens. Using cryptography to bodies of knowledge. These days, "smart agriculture" also
secure data integrity and permanence, a peer-to-peer design uses ICT and the IoT in the form of unmanned aerial
that eliminates the need for middlemen, and collective vehicles (UAVs), sensors, and machine learning to collect
governance principles that allow any participant to witness and analyze data [5].
transactions and verify their legality give Bitcoin an obvious The development of a comprehensive security system
attractiveness[17,18]. Therefore, blockchain promotes that allows for the use of data and provides support for its
openness, transparency, and efficiency in multi-party administration is a vital step toward the realization of smart
systems. In this piece, we'll discuss how supply chain agriculture. Due to their centralized nature, conventional
management, insurance, smart farming, and the purchasing approaches to data management are vulnerable to issues
such as inaccurate information, distortion, improper use, and depriving them of their due portion of earnings [4].
even cyber attacks. For instance, government agencies with
a vested interest in environmental monitoring data are more
likely to archive that data for posterity. They can affect data-
based decision-making [11,16].
4x4 grayscale image and a 2x2 kernel with random weights quality and condition. Assuring that only the correct items
(see Fig: 5). Convolution involves sliding the 2x2 kernels are transported requires this level of scrutiny. The smart
across the full 4x4 image horizontally and vertically, contract in the blockchain is in charge of checking
everything out. A computer application will include the
multiplying the corresponding values of the kernel and input
smart contract's stipulations. A new transaction is generated
picture to get the dot product, and then summing those dot once the smart contract verifies the user interface parameters
products to produce the scalar value in the output feature as accurate. Following a predetermined amount of time, the
map. The process should be repeated until the kernel is generated transaction is mined into a block. Thus, the
immobile. A feature map will be produced when the full product records are now stored in a decentralized,
convolution method has been executed. immutable ledger known as Blockchain [12,13].
We used the Deep Learning Method and the cotton and
plant-village datasets to train and verify the CNN model. To
create this model, we used a 70%-30% split between
training and validation, yielding 4200 training shots and
1800 validation photos from the Plant Village and Cotton
Dataset. Sometimes abbreviated to "CNN," Convolutional
Fig 5: 4x4 Grey Scale Image and Kernal of size 2x2 Neural Networks are a sort of deep learning model that takes
in data and assigns weights to the different features of that
With no padding and a stride (the size of the steps along the input. As a type of neural network, the Convolutional
horizontal and vertical axes) of 1, a convolution operation is Neural Network (CNN) sees widespread application in
performed on the input image. However, in a convolution image-centric datasets [6].
process, the stride value need not equal 1. As the step size of Our convolutional neural network (CNN) architecture
consists of a dropout layer, an activation function called
the convolution process grows larger, the shrinking of the
ReLU, a maximum pooling layer, and four basic
feature map becomes more noticeable. Specifically, without convolutional layers with filter sizes of 32, 64, 128, and 128.
the padding, the input image's border-side details are lost The softmax activation function shows which class has the
too quickly, thus it's crucial to employ it to give the border highest probability and comes after the convolutional layers,
size information greater weight. Padding increases the size the flattening layer, and the dense layer. This step is
of the input image and thus the size of the resultant feature performed after the convolutional layers have been applied.
map [8].
C. Role of Activation Function
A neuron's input value is computed by summing the values
of its 10 inputs and then biasing this sum by some amount;
the primary role of an activation function in a model based
on neural networks is to map the input to the output (if there
is a bias). Simply expressed, the activation function
determines whether or not a neuron fires in response to a
specific input. CNN’s utilize non-linear activation layers
after each educible layer (weighted layers such as
convolutional and FC layers). Due to the non-linear nature
of these layers, the CNN model has the potential to learn
more nuanced data and map inputs to outputs on the fly.
When training a model, error backpropagation relies on the
activation function's capacity to discriminate between
different inputs. These are the most popular activation
functions for usage in DNNs (including CNN) [2,8].
V. PROPOSED SYSTEM
REFERENCES
[7] Chod, J., Trichakis, N., Tsoukalas, G., Aspegren, H., and Weber, M.
(2019). “On the financing benefits of supply chain transparency and
blockchain adoption”. doi: 10.2139/ssrn.3078945
[8] M. Pavlova, "Comparison of Activation Functions in Convolution
Neural Network," 2020 28th National Conference with International
Participation (TELECOM), 2020, pp. 65-67, doi:
10.1109/TELECOM50385.2020.9299559.
[9] Elizabeth J.Woods,“supply chain management: understanding the
concept and its implications in developing countries”. ‘Agriproduct
supply chain management in developing countries edited by G I
Johnson and P J Hofrean, ACIAR Proceedings No.119e pp. 18-26.
[10] Birthal, P.S., and V.K. Taneja. 2006. The livestock sector in India:
Opportunities and challenges for smallholders. Paper presented in the
international workshop on Smallholder livestock production in India:
Opportunities and challenges. Indian Council of Agricultural
Research, New Delhi; and the International Livestock Research
Institute, Nairobi. New Delhi: January 31-February 1, 2006.
[11] Quoted from King, Robert P., Michael Boehlje, Michael Cook, and
Steven+T. Sonka(2010) “Agribusiness Economics and
Management”, American Journal of Agricultural Economics,
Special Issue Commemorating the Centennial of the AAEA, Vol.92,
No.2, April.
[12] V. Sudha, R. Kalaiselvi and P. Shanmughasundaram, "Blockchain-
based solution to improve the Supply Chain Management in Indian
agriculture," 2021 International Conference on Artificial Intelligence
and Smart Systems (ICAIS), 2021, pp. 1289-1292, doi:
10.1109/ICAIS50930.2021.9395867.
[13] V. Sudha, R. Akiladevi, S. Nithya Roopa, P. Nancy, "A Study of
Blockchain Technology in Agriculture Supply Chain", 2021
International Conference on Advancements in Electrical, Electronics,
Communication, Computing and Automation (ICAECA), pp.1-4,
2021.
[14] Udit Agarwal, Vinay Rishiwal, Sudeep Tanwar, Rashmi Chaudhary,
Gulshan Sharma, Pitshou N. Bokoro, Ravi Sharma, "Blockchain
Technology for Secure Supply Chain Management: A Comprehensive
Review", IEEE Access, vol.10, pp.85493-85517, 2022.
[15] S. Bhalerao, S. Agarwal, S. Borkar, S. Anekar, N. Kulkarni and S.
Bhagwat, "Supply Chain Management using Blockchain," 2019
International Conference on Intelligent Sustainable Systems (ICISS),
2019, pp. 456-459, doi: 10.1109/ISS1.2019.8908031.
[16] Brock, A. (2016). Beyond Blockchain: Simple Scalable Crypto
currencies. Retrieved from https://medium.com/holochain/beyond-
blockchain-simple-scalablecryptocurrencies-1eb7aebac6a .
[17] Madhura, S. "A Secure Protocol for Smart Meters using IoT Enabled
Distribution Networks and Blockchain Security Mechanism." Journal
of Ubiquitous Computing and Communication Technologies (UCCT)
2, no. 01 (2020): 48-58.
[18] Kamel, D. K. "Wireless IoT with blockchain-enabled technology
amidst attacks." IRO Journal on Sustainable Wireless Systems 2, no.
3 (2021): 133-137.
[19] Benhammou, Yassir, Siham Tabik, Boujemâa Achchab, and Francisco
Herrera. "A first study exploring the performance of the state-of-the
art CNN model in the problem of breast cancer." In proceedings of
the international conference on learning and optimization algorithms:
theory and applications, pp. 1-6. 2018.
Abstract—The coronavirus, commonly known as SARS concepts followed by developing a face mask detection
COVID-19, is causing a pandemic that is affecting individuals system.
all over the world. The spread of the virus compelled the
authorities to impose a rigorous lockdown on its citizens. Every By identifying persons who aren't covering their faces with
person in society may experience a variety of issues as a result a mask and emphasising their faces, the suggested model may
of this. According to WHO (World Health Organization) be merged with video frames to thwart the coronavirus
regulations, the sole method to halt the virus's spread is to wear transmission. The lightweight neural network MobileNetV2
a face mask. Therefore, the suggested approach makes sure that and Single Shot Detector (SSD) employing transfer learning
everyone appropriately wears a face mask in public locations. technique are integrated in this approach to achieve a
The objective of this approach is to detect people without face compromise between resource restrictions and identification
masks and people who wear facemasks incorrectly in social accuracy. This makes it possible to use real-time video
environments. This system consists of multiple face detection surveillance to keep an eye on public areas and identify
modules to find the area of interest within the video frames. In persons wearing face masks while maintaining a secure social
the next level, using the trained Deep Learning model, the distance. Our method analyses Real-time Streaming Protocol
presence of a mask is detected and faces without mask and faces (RTSP) video streams using neural networking models
wearing masks incorrectly are highlighted. The dataset for face utilising OpenCV and MobileNet V2.
mask identification comprises of 8190 photos with unique facial
annotations from the Kaggle and RMFD datasets that come into II. RELATED WORK
two categories: “with mask” and “without mask”.
A. Face Detection
Keywords—COVID-19, Face Detection, Convolutional It is a process with several applications, including position
Neural Networks, Transfer Learning. estimation, compression, and face tracking. Face detection is
I. INTRODUCTION a two-class issue that requires us to determine whether or not
a face is present in a photograph. Identifying whether or not
The coronavirus, commonly known as SARS COVID-19, there are human faces in the input image is the main objective
is causing a pandemic that is affecting individuals all over the of face detection. Correct face detection may be hampered by
world. The spread of the virus compelled the authorities to changes in lighting and facial expression. Pre-processing
impose a rigorous lockdown on its citizens. Every person in activities are carried out to make it easier to create a more
society may experience a variety of issues as a result of this. powerful face detection system. The human face picture may
According to WHO (World Health Organization) regulations, be found and located using a variety of methods, like the
the sole method to halt the virus's spread is to wear a face mask “Viola-Jones detector” [2, 3], “Principal Component Analysis
[1]. However in crowded areas like bus stations, railway (PCA)” [4], and the “Histogram of Oriented Gradient (HOG)”
stations it is very hard to monitor each and every person [5]. It may also be used to classify videos and images, find
whether they are wearing the face masks correctly or not. In objects, find regions of interest, and more [6].
order to address this issue, technology comes into the picture.
The solution is to develop a system that can identify faces in B. Face Mask Detection
live video frames and assess whether or not their faces are Although WIDERFace, MAFA, and SSD were used by D.
covered. There are presently no reliable face mask detection Chiang [7, 8] to construct a face mask dataset for detection,
applications available, which are highly sought after by large- the dataset's accuracy was only 89.6% owing to the number of
scale manufacturing, transportation systems, densely parameters being compressed for real-time efficiency. Jiang et
populated places, residential neighbourhoods, and other al.'s RetinaMask [9] proposal integrated a content attention
organisations to assure safety, owing to Covid-19. mechanism with a Feature Pyramid Network (FPN) and used
Additionally, the lack of substantial datasets of "with mask" ResNet or MobileNet [10] as the backbone network to operate
photographs has made this process more complicated and on both high and low-computation hardware. Rahman, R. [11]
difficult. Therefore, the need of the hour is to generate an built a CNN model and OpenCV for authorized entry using
artificial dataset of “with mask” images using computer vision face mask detection. For improved feature extraction and
classification, Loey et al. [12] employed the hybrid transfer C. Convolutional Neural Networks (CNN)
learning model and machine learning techniques. However, “Convolutional neural networks” (“CNNs”, or
there was no discussion of the detecting speed. The accuracy “ConvNets”) are often employed in deep learning to analyse
of mask detection was the primary focus of the research works visual data. Since the arrangement of the visual cortex is
mentioned above, and speed of detection was not well similar to the connection pattern between neurons in CNNs,
addressed. These techniques also could not determine if the these networks were motivated by biological processes. CNNs
masks were properly worn. They could only detect the need less pre-processing than other image classification
presence of masks. methods in comparison. Each layer incorporates patches from
III. METHODOLOGY earlier levels. These ConvNets are “multistage architectures”
that can be trained. Each step's input and output are sets of
A. Dataset arrays called “feature maps”. A specific feature retrieved from
A custom dataset was created utilizing the Kaggle each position on the input will be reflected in each feature map
datasets, RMFD dataset, and Bing Search API. A Python in the output. A “filter bank layer”, a “non-linearity layer”, and
script was used for Bing Search API to find images with a “feature pooling layer” make up each stage. A classification
multiple queries related to “covid” and “face mask” which module follows one, two, or three of these phases of three
aids us in data collection. A total of more than 10,000 layers to make up a ConvNet [13, 14]. Basic CNN architecture
photographs were gathered, but only a small number of them is shown in Fig. 2.
were accepted since they were distorted, blurry, or
unproductive. They were eliminated, and as a result, data
pruning was carried out. This enables our model to improve
its accuracy. After the data pruning, around 4000 photographs
are selected. The data augmentation involves rotating and
flipping of images in our dataset to create more data using
Keras’ ImageDataGenerator class.
Real photographs of faces wearing and not wearing
protective face masks make up this custom dataset. 8190
photos from two classes make up this dataset.
• “with_mask”: 4330 images Fig. 2. The fundamental components of CNN are the convolution layers
Conv1, Conv3 and the pooled/sampled layers Pool2, Pool4.
• “without_mask”: 3860 images
D. Face Detector based on SSD Framework combined with
With the aid of the Scikit-learn (Sklearn) library, the
MobileNetV2 Architecture
dataset was split into two sets. The training set has 7371
images (90%), whereas the testing set contains 819 images A compromise between "YOLO" and "R-CNN" based
(10%). object detection approaches is achieved by SSDs, which were
first developed by Google. Comparatively speaking, the
B. Architecture algorithm is simpler than faster R-CNNs. MobileNets are
In Fig. 1, the architecture is displayed. designed for low-resource devices [10]. So, a rapid and
efficient deep learning-based item recognition method may be
obtained by combining the "Single Shot Detector (SSD)"
framework and the MobileNet architecture. The OpenCV’s
Face Detector based on the SSD Framework combined with
MobileNetV2 architecture was used to achieve detection of
face.
E. Transfer Learning
The machine learning method known as transfer learning
uses a model developed for one job as the foundation for
another. The concept is to get past the isolated learning
paradigm and use the information you gain to address one
problem to others that are related. The flow of tasks in transfer
learning is shown in Fig. 3.
models that have already been trained, even if the new task the model, we see the summary of our model. The output of
has less data. Learning is a difficult process for both people model.summary() gives us the total parameters including the
and robots. It was crucial to develop a strategy that would total number of trainable and non-trainable parameters.
avoid a model from forgetting the learning curve it obtained
from a given dataset and also allow it to learn more from fresh • Total params: 2,422,210
and varied datasets because it is a laborious, resource- • Trainable params: 164,226
intensive, and time-consuming operation. Transfer learning
basically involves utilising a model that has previously been • Non-trainable params: 2,257,984
trained on one dataset to train and make predictions on a Since we are solely training the top layers of our network,
different dataset [15]. the total number of non-trainable parameters are greater than
We can have two ways to apply transfer learning on a pre- the total number of trainable parameters. This approach helps
trained model: us to save time when training the model as we are not training
the model from scratch and hence the model will take lesser
• Feature Extraction - Take advantage of a prior time to train.
network's representations learnt to identify
significant aspects in fresh data. The pre-trained Now, we train our model. The training time taken by our
model is simply added on top of a fresh classifier that model is 78 minutes. The total training time taken would have
will be trained from start in order to reuse the feature been a lot more than the actual time if we trained all the layers
maps that have already been created for the dataset. of our model and hence the transfer learning approach helped
The complete model does not need to be (re)trained. here. The parameters we used to train our model are given in
There are existing elements in the underlying TABLE Ⅰ.
convolutional network that are generally helpful for
categorising images. The final classification TABLE I. LEARNING PARAMETERS
component of the pre-trained model, however, is
specific to the first classified job. As a result, it is
unique to the collection of classes that were used to
train the model [16].
• Fine-Tuning - Unfreeze some of the top-most layers
of the “base model” which is frozen and train the
base model's final levels as well as the newly added
classifier layers simultaneously, which enables us to IV. EXPERIMENTS
"fine-tune" the basic model's “higher-order feature Learning rate decay approach was adopted for training the
representations” which makes them more pertinent network, wherein the initial learning rate will higher and
to the particular job. reduced iteratively. It is inferred from experiments and results
The MobileNetV2 model created by Google will serve as given in various literature that the learning rate decay aids in
the foundation for our basic model. The ImageNet dataset optimization and generalization. The initial high learning rate
with 1.4 million pictures and 1,000 classes, served as the pre- helps to accelerates training avoids the model from falling into
training data for this. ImageNet is a training dataset for local minima. Further during the model training reducing the
researchers with many different categories [10]. We can learning rate helps the model to converge to the optimal
categorize "Mask" and "No Mask" from our unique dataset minimal value and avoid oscillation. At the same time an
with the use of this knowledge base. Before we build and train initial high learning rate may prevent model from overfitting
the model, the convolutional base must be frozen. We can do by memorizing data and improve the learning ability as the
this by freezing the layer to prevent the weights from learning rate is reduced iteratively.
changing. A. Training Loss and Accuracy
F. Model Training It is observed from the Fig. 4 that the model training with
The MobileNetV2 architecture will first be ready for fine- learning rate decay prevented model from overfitting and
tuning through the following three steps: prevented oscillation in the training process.
• Remove the head of the network from MobileNet
and load it with pre-trained ImageNet weights.
• Add new FC layers in place of the previous, fully
connected layers, which is where the real predictions
for the class label are formed.
• Freeze the base layers to prevent their updating
throughout the backpropagation process and just
adjusting the weights of the classification layers.
Now, compile the face mask detector network. Images of
size 224×224 are supplied to our model. These images are
achieved by OpenCV’s blobFromImage and blobFromImages
functions that facilitate image pre-processing. These functions
will perform mean subtraction and scaling. After compiling
Fig. 4. Number of epochs plotted against accuracy or loss.
B. Confusion Matrix feeds and properly identified their existence. The trained
As shown in Fig. 5, only 7 out of 819 samples are binary classification model with pictures of persons wearing
incorrectly classified using the established architecture. While and not wearing masks in order to develop our face mask
they are in the without mask class, it classifies 05 samples as detector. The proposed model will then be refined using
having a mask, and while they were in the with mask class, it MobileNetV2 on the mask/no mask dataset to create an image
classifies 02 samples as having no mask. The system's primary classifier that has 99% accuracy. Considering that the
goal is to identify samples inside the class of samples without MobileNetV2 architecture is being used, the model can be
masks, and this design only incorrectly categorized 05 more easily deployed to embedded systems because it is
samples in this class, demonstrating the system's computationally efficient. Due to the coronavirus outbreak,
dependability. this technology can thus be employed in real-time applications
that demand face-mask detection for security reasons. To
guarantee that public safety regulations are obeyed, this
research work may be connected with embedded technologies
for use at airports, train stations, schools, offices, malls and
other public spaces.
REFERENCES
[1] World Health Organization, 2. (2020). “Coronavirus disease 2019
(COVID-19): situation report, 99”.
[2] Viola, P., & Jones, M. (2001, December). “Rapid object detection using
a boosted cascade of simple features.” In Proceedings of the 2001 IEEE
computer society conference on computer vision and pattern
recognition. CVPR 2001 (Vol. 1, pp. I-I). Ieee.
[3] Yang, H., & Wang, X. A. (2016).“Cascade classifier for face
detection.” Journal of Algorithms& Computational Technology, 10(3),
187-197.
Fig. 5. Confusion Matrix. [4] Shah, J. H., Sharif, M., Raza, M., & Azeem, A. (2013). “A Survey:
Linear and Nonlinear PCA Based Face Recognition Techniques.” Int.
C. Performance Evaluation Arab J. Inf. Technol., 10(6), 536-545.
After testing with 819 images, the observations from the [5] Rettkowski, J., Boutros, A., & Göhringer, D. (2017). “HW/SW Co-
Design of the HOG algorithm on a Xilinx Zynq SoC.” Journal of
confusion matrix are tabulated as shown in TABLE Ⅱ. Parallel and Distributed Computing, 109, 50-62.
Various metrics like “Precision”, “Recall”, “F1 Score” and
[6] Kortli, Y., Jridi, M., Al Falou, A., & Atri, M. (2020). “Face recognition
“Accuracy” are calculated from the four observations. The systems: A survey.” Sensors, 20(2), 342.
values of these metrics are shown in TABLE Ⅲ. [7] Yang, S., Luo, P., Loy, C. C., & Tang, X. (2016). “Wider face: A face
detection benchmark.” In Proceedings of the IEEE conference on
TABLE II. TP, TN, FP AND FN VALUES computer vision and pattern recognition (pp. 5525-5533).
[8] Chiang, D. (2020). “Detect faces and determine whether people are
wearing mask.” Face Mask Detection.
[9] Jiang, M., Fan, X., & Yan, H. (2020). “Retinamask: A face mask
detector.” arXiv preprint arXiv:2005.03950.
[10] Howard, A. G., Zhu, M., Chen, B., Kalenichenko, D., Wang, W.,
Weyand, T., & Adam, H. (2017). “Mobilenets: Efficient convolutional
neural networks for mobile vision applications.” arXiv preprint
TABLE III. CONFUSION METRICS arXiv:1704.04861.
[11] Rahman, R. (2022). Automatic Temperature Detection and
Sanitization with Authorized Entry using Face Mask Detection. Journal
of Electronics, 4(3), 168-181.
[12] Loey, M., Manogaran, G., Taha, M. H. N., & Khalifa, N. E. M. (2021).
“A hybrid deep transfer learning model with machine learning methods
for face mask detection in the era of the COVID-19
pandemic.” Measurement, 167, 108288.
[13] O'Shea, K., & Nash, R. (2015). “An introduction to convolutional
V. CONCLUSION neural networks.” arXiv preprint arXiv:1511.08458.
A detection system for face masks has been developed that [14] Koushik, J. (2016). “Understanding convolutional neural
networks.” arXiv preprint arXiv:1605.09081.
meets standards comparable to those of the most recent
[15] Weiss, K., Khoshgoftaar, T. M., & Wang, D. (2016). “A survey of
cutting-edge technology. Recent advances in deep learning transfer learning.” Journal of Big data, 3(1), 1-40.
and computer vision are used in this research. The assessment [16] Liu, Y. H. (2018, September). “Feature extraction and image
of the model on the test dataset was found to be consistent. A recognition with convolutional neural networks.” Journal of Physics:
custom dataset was created utilizing the Kaggle datasets, Conference Series (Vol. 1087, No. 6, p. 062032). IOP Publishing.
RMFD dataset, and Bing Search API. The algorithm
recognized face masks on human faces in real-time video
Abstract - Road travel is one of the most common modes of must therefore address this issue. According to a survey, potholes
transportation in the world, where more than 60% of the population are causing many accidents for about 3.5k persons every year.
commutes by personal or shared automobiles. According to a poll, More than 4k people were hurt because of road accidents
potholes are a major contributing factor in several incidents. broughtby the potholes.
Pothole detection techniques have been created to address these
issues, including the use of sensors and many others, but they are According to recent data provided by the government,
actually expensive to produce and difficult to put into practice. As a around 2k people died last year due to traffic accidents caused
result, solid strategy that utilizes CNN is developed. According to by potholes, and more than 4k people were injured in more
the evidence presented, potholes are the principal factor responsible than 4,800 of these accidents. This is actually a serious problem
for the degradation of roadways. It is essential to give some thought which must be addressed. Therefore, a long-term solution to
to the question of how to locate potholes in the most efficient and
address this issue by creating a user-friendly app that allows
economical way. Convolutional neural networks, often known as
CNNs, have the ability to filter through vast volumes of data and people to know the condition of the road's surface. Our
extract the aspects that are most relevant to their purpose. YOLOv7 approach makes use of the camera and location capabilities of
was used to annotate and train a pothole image dataset for this a smartphone and is quick, precise, and affordable to use. The
research, and the findings were analyzed in terms of recall, suggested method effectively recognizes many potholes in the
accuracy. The model was validated by examining a wide range of image by using the YOLO algorithm and defines the road
photographs relating to potholes. Our model had given a F1 score surfaceconditions in response.
of 0.51 and this increases proportionally (more the value of F1
score more efficient is the training model) with the number of As a consequence of improvements in technology, there
epochs increased. are now a greater variety of solutions accessible to assist in
Keywords - Convolution neural network, Object detection, locating potholes and maintaining one's independence. These
Pothole detection, YOLOV7 object detection model, Google API, days, the majority of detection is handled automatically by the
dataset, pothole count, Accelerometer. system by means of artificial intelligence models such as deep
neural networks. The effectiveness of every deep learning
I. INTRODUCTION model is directly proportional to the amount of data that is
Most well-known nations in the world have a rapidly utilized for training. The identification of holes in roads has been
growing economy. Every country is currently concentrating made easier by a diverse collection of sensors. Data obtained
primarily on the transportation sector. According to a survey it from GPS and accelerometers included into cellphones are
is proved that there is lot of increase in the number of currently being utilized in the training of deep learning
automobiles in India, and it has resulted in a higher likelihood models.
of accidents and also the majority of the streets are small, As the fields of science and technology continue to
crowded, and have poor surface quality; additionally, the advance, more and more solutions for identifying potholes and
needs for street maintenance are not fully satisfied. Driving in allowing individuals to live independently will become
India is always a breath-holding exercise. accessible. AI models, such as deep neural networks, are now
The state of the roads will actually affect how safely and commonly employed in the vast majority of systems to
comfortably you can drive. The user should be informed of the automatically perform detection. Data used for training plays
state of the road for safety's sake.. No automated system for an important part in the overall success of any deep learning
detecting potholes exists as of yet. Citizens and city authorities model. The location of potholes on roadways has been greatly
facilitated by the deployment of a large number of sensors. At In their study, the authors [8] used deep learning methods
this time, models of deep learning are being trained using data to examine road photo archives in order to pinpoint any
obtained from the inertial measurement units and global damage. Damages to roads have been categorized using
positioning systems included inside mobile devices. RetinaNet. During the course of their research, the authors of
[9] gathered a dataset that consists of around 1.5k
II. LITERATURE REVIEW photographs depicting road and highway damage. The
An increase in precipitation, a lack of routine road YOLO algorithm has been used as the primary descriptor for
maintenance, or the occurrence of a natural disaster are just a the dataset's classification and training. YOLOv3, YOLOv2,
few of the events that might set in motion the process of and YOLOv3-tiny have all been trained on the collected
discovering potholes, also known as the detection of road data, and their performance is compared to that of the
anomalies. Deterioration of roads is a big problem in many original versions. The mAP has been used to analyze each
of the world's developing countries today. This is attributable and every data point, with accuracy and recall being the
to many factors, including poor road maintenance, heavy primary metrics. The accuracy of the model was determined
rains and traffic, an uneven landscape, natural disasters, and by comparing it to numerous pothole images, and the
the use of substandard materials in road construction. The findings were quite promising.
following is a summary of the work done by various By using thermal imaging and thermal sensors, the
researchers to detect road issues such as potholes, cracks, authors of this [10] paper were able to create their own CNN
signboards, traffic signals, pavement damages, and lines models without resorting to the more expensive and
becoming blurry (crosswalks, white/yellow lines). resource-intensive resnet50 or latest models, making better
Our country has long been dependent on the vehicle as a use of the data collected about the surrounding environment
primary mode of transportation. Over 295 million and its features (such as air, road, pothole detection time,
automobiles have been registered worldwide to far, pothole severity, location, shade, and so on). The problem is
according to a recent survey [1], and that figure is steadily that they might not be able to adjust to extreme weather.
growing. India is ranked as the fourth most likely place to be Some examples of spectral clustering that appear in the paper
engaged in a traffic collision, according to data conducted by [11] are SC, CNN, and AlexNet. Data augmentation is the
Zutobi [2,] a worldwide supplier of driving instruction. Due process of extending the scope of a dataset by modifying its
to their deteriorated state, the roads themselves are a constituent pieces (pictures) in a variety of ways (rotation,
significant contributing element. According to information translation, flipping, cropping, etc.). Data augmentation was
that was made public by the Ministry of Road Transport and used in place of the new image dataset; however, Alexnet
Highways [3], it is anticipated that the total number of was used as the training method, which is a less accurate
individuals died in road accidents that may be attributable to technique. The authors [12] created a prototype by
potholes would increase to 2,015, 2,140, and 1,471 in 2018, combining components such as a Pi-Camera, GPS, and the
2019, and 2020, respectively. Google Maps API with a low-cost ultrasonic sensor. Due to
The authors of the study proposed [4] have utilized an the fact that an older version of YOLO v2 was utilized, it is
image processing-based system that can identify potholes in probable that there will be problems with the accuracy of the
photographs. Although effective on still images, this method pothole classification. The author of this [13] paper has
is impractical for use with moving pictures due to the lengthy implemented a Support Vector Machine which is used for
identification time required. Using a deep learning model image acquisition and segmentation, sample dataset
that analyses photos and videos, the researchers in [5] found preparation, and feature selection. As well, it employs
a way to limit the number of accidents caused by potholes. A ANNs. From all of the references that were mentioned, the
F RCNN, inception-V2 model is used in this model to detect most common issues were using a lesser version of the
these hazards. YOLO algorithm, which would have an effect on the
accuracy, and constructing hardware prototypes, which are
One researcher entered a system for detecting and particularly tough to install in the places where you will be
categorizing road damage in the 2018 IEEE Bigdata Cup working with them. A few of the authors have utilized
Challenge [6]. Utilizing deep learning techniques for object expensive sensors, which can result in an increase in the total
recognition, this method trains an object detection algorithm cost of the project. The authors of [15] Transfer Learning
to identify varied degrees of road damage by exposing it to a with TensorFlow Object-detection API and F-RCNN (Faster
dataset of photos labelled with the damage type provided by Region-based Convolutional Neural Network) develop the
the Japan Road Association. The Intelligence Transport model by using CNN, pooling, ReLU activation function,
System uses Deep Learning to collect and analyze data for Adam Optimizer, and Sigmoid function. Finally, the author
identifying road damage. Although state-of-the-art methods in [16] has developed a real-time machine to find the
were employed in the work proposed by [7], such as a 3D potholes and this same can be implemented in my research
scene architecture that relied on vibration-based sensors and by using updated yolo versions (yolov7).
a 2D vision-based model, the usage of yolov2 was
problematic due to its poor accuracy level and the time it
would take to identify potholes.
III. YOLOV7 Microsoft's COCO dataset without the use of any pre-learned
The accuracy of real-time object detection is significantly weights in the process.
enhanced by YOLOv7, without any accompanying increase in
the expenses of inference. When compared to other known
object detectors, YOLOv7 is capable of effectively reducing
approximately 40% of the parameters and 50% of the
computation of state-of-the-art real-time object detections.
Additionally, it is able to achieve faster inference speed and
higher detection accuracy. This was demonstrated previously
in the benchmarks. In summary, YOLOv7 offers a quicker and
more robust network architecture, which in turn offers a more
effective approach for feature integration, more accurate
object recognition performance, a more robust loss function,
as well as an enhanced label assignment and model training
efficiency. As a consequence of this, the computer hardware
requirements for YOLOv7 are much lower than those for other
deep learning models. It is possible to train it far more quickly
on smaller datasets without using any pre-trained weights.
Fig.1. Proposed Pothole Detection using YOLOv7
IV. METHODOLOGY
The proposed flow of Pothole Detection using YOLOv7
is shown in Fig 1. The information that has been gathered
should be separated into three distinct categories: training,
testing, and validation. In order to set up an object detection
network, you need make use of YOLOv7. In the third stage of
the procedure, the model will be trained by having an epoch
value and weights added to it. This will be done in order to
make the model more accurate. Examine the model to see how
accurate it is as well ashow reliable it is.
A. Dataset
The Roboflow [16] pothole detection dataset is an open-
source dataset includes a total of 289 photographs which can
be accessed through the url
[https://universe.roboflow.com/srm-institute-of-science-and-
technology-yk2zw/pothole-de] published in the journal
RoboFlow Universe that are put to use in the process of
developing and training models. Providing the model with an
epoch value and weights is the focus of the third and final step
of the training process. The fourth step is to assess how well
the model corresponds to the data. Sample Pothole images are
shown in Fig 2. Fig. 3. E-ELAN Computational block (used by yolov7)
TruePositives
Precision= − (2)
TruePositives + FalsePositives
Fig. 5. P-curve
3) F1 curve
The F1 score curve illustrates the compromise that must
bemade between precision and recall as shown in fig 6.
𝑝𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛. 𝑟𝑒𝑐𝑎𝑙𝑙 (3)
F1=2.
Fig 7. Few predicted potholes by YOLOv7
𝑝𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛+𝑟𝑒𝑐𝑎𝑙𝑙 TABLE 2: MODEL PERFORMANCE METRICS
MODEL YOLOV7
Precision Recall
(416*416)
Confidence
1.0 0.95
ThresholdmAP@0.5
Fig 6. F1 score
Abstract— During the COVID-19 outbreak, all the physical physical therapy. The suspension of physical classes has a
classes suspended, and switched to online learning. The new disproportional impact, especially for learners with
era of learning presented several challenges for the teachers disabilities. Learners are looking for distance learning
and students. The students did not have the opportunity to (online learning) opportunities with innovative teaching
participate in the classroom activities successfully as a physical methods to continue their education.
class due to a lack of educational creativity, a lack of digital
tools, and a dependency on the internet. Strengthening self- The purpose of distance learning is to minimize class
directed learning and improving the technical infrastructure absences and continue educational services to students. In
are required, to advance innovation-centric education from physical classes, all teachers lecture directly to students and
"teaching" to "learning" and to develop digital literacy. By all teachers are aware of each student's learning style,
incorporating technology into classroom instruction everyone strengths and weaknesses. With the onboarding of freshmen
can understand the concepts and realize their right to and more online learning, the faculty-student relationship
education. The recent technological advances in deep learning becomes very difficult, and internships (Lab Practices) are
are referred to as Generative Adversarial Networks (GANs). no longer result-oriented due to online learning.
The GANs used as an Assistive Technology (AT) to generate
the sequence of images of the descriptive input text. The goal of II. DIGITAL TRANSFORMATION
this review is the Visual Storytelling by utilizing the Text-to-
Image GAN which strengthens self-directed learning through A. Challenges in digital transformation during covid - 19
visualization and improve the critical thinking, and logical spread
reasoning.
Online sessions conducted by educational institutions
Keywords— COVID 19, Assistive Technology (AT), Generative during the pandemic have not achieved maximum results
Adversarial Network (GAN), The Natural Language Processing
due to traditional methodologies that are less relevant to
online teaching. It has also been shown to cause stress,
(NLP), Teaching and Learning challenges, Digital Transformation.
anxiety, and depression in students, with significant
psychological side effects due to prolonged online presence.
I. INTRODUCTION
Too much freedom will not produce the intended results of
The COVID-19 outbreak left 810 million children out of the course and will slow down the pace of student learning.
school and 1 billion people with disabilities severely This can also lead to skill deficiencies in students. Finding
impacted by the pandemic, devastating the learners with and the right balance between managing stress levels and taking
without disabilities. 65 million children with disabilities in advantage of student freedom can be tricky. “Instruction
developing countries were out of school before the outbreak Paradigm / Teaching Paradigm” dominates the education
of COVID-19, according to an analysis of the Global Action sector. The motivation of students to study on their own has
on Disability report[1]. increased. A learning personality is unique to each person.
Additionally, some students could not afford devices Therefore, various innovative teaching methods should be
such as laptops, cell phones, internet and cable services. applied in the educational process to achieve efficient
Despite the efforts of educational institutions to offer learning outcomes.
classes, getting enough distance learning for students is a B. Investment
major challenge. It can therefore be argued that online
learning offerings are not inclusive for all students, Developing and developed countries face challenges in
especially those facing financial difficulties or living in rural e-learning due to the lack of support and investment from
areas far from cities. Teachers face the challenges of educational institutions. Most of the Higher Educational
evaluating student performance and exam integrity as well. Institutions (HEIs) the facing challenge of investing in
digital skills training for teachers and students during this
In addition to that, the students with disabilities need a pandemic, in which the lecturers are unprepared for e-
more organized learning environment, peer interaction, and learning because they are unfamiliar with this teaching
personal attention from their teachers. Online learning method.
environments are troublesome for disabled students since
they need support services like speech, occupational, and
The investment is in of providing lecturers and students In this review article, we discussed solutions to
with digital learning training and providing lecturers with students' learning challenges by visualizing textual
the appropriate hardware and software technology to deliver descriptions with pictures. Due to the dependence of
effective online content to students. For example, lecturers students with disabilities, lack of social support, and
are not equipped with sufficient knowledge to select and use difficulty accessing the internet and digital devices, special
suitable digital tools for their lectures and design lecture education schools need to focus on providing non-digital
contents that fit with e-learning. In assessing and evaluating alternative learning for their students. In order to meet the
learning outcomes, lecturers do not have the confidence in course outcome, special education schools should ensure
preparing online assessment due to the lack of certainty in that students are getting the virtual or alternative learning
its effectiveness. environment using the curriculum based instructional videos
and activities. [5] said “visualization is being read by
C. Students’ Motivation drawing and speculating what may happen in our mind, to
Students perceive e-learning to be less effective than help students develop their ability”. Visualization of text or
traditional learning methods due to the lack of effective word is a strategy to teach to all age students, especially
integration and use of technology. In some instances, those who are having reading disabilities and it makes
students do not place importance towards e-learning and reading comprehension possible and also creates an
assume it to be a 'holiday'. Because students are scattered emotional bonding between the readers and text. If the
around the world and countries, a lack of physical reader can visualize where and who they are reading, it
interaction with fellow students and lecturers affects their creates a great reading experience, motivates them to read
motivation and leads to mental health problems. Moreover, more, and infers what is happening to the people in the text,
students are concerned over their ability to 'catch up' in class which helps them to read the text.
as online lectures can sometimes be disrupted by internet
connection and interrupt the session's flow. Although e- Moreover, 20 percent of the school population have
learning has proven to be a good model of education, it is reading difficulty including 5 to 8 percent of the world
crucial to address each challenge to minimize the flaws to population has the deficit of word recognition [6]. Learning
deliver effective e-learning that is conducive for lecturers Disability will affect the self-esteem and motivation of the
and students [3]. Technology-enhanced learning offers students so first we should recognize their challenges in
solutions to the challenges of digital transformation. learning and to support them to overcome the problem using
assistive technology. Because relatively high levels of
III. INCLUSIVE EDUCATION reading and writing are required for all of us to compete in
society. Intensive training alone is not enough for these
In the COVID-19 pandemic, many societies have learners to acquire the appropriate level of reading and
marginalized people with disabilities due to the safety writing [6]. The most common strategy for getting your
measures and prevented from accessing the services reading and writing to the right level is continuous practice
provided by the private and public sectors especially in the and training. The second is trying to overcome difficulties
education sector. People with disabilities face the challenge with the help of assistive technology (AT).
of adapting to digital transformation during the pandemic.
Due to prejudice and ignorance in society, the majority of A. Generative Adversarial Network (GAN) as an AT
disable people are unable to freely express themselves. In The aims of AT are to visualize texts, improve the
order to achieve an inclusive society, it is necessary to comprehension of readers of all ages from passive to active
conduct assistive technology research projects to gain learners, assist people with learning disabilities, examine the
interdisciplinary experiences and to support the above problems in education, It is to provide solutions to
independence of person with disabilities and without these challenges in learning through transformation of text.
disabilities in learning. Society should encourage students Reading articles has become a passive activity for all groups
with disabilities and ensure equal opportunities in education, of digital natives and learning disabilities. Visualization of
employment and other activities. the text in education is useful for grasping the article. It can
A survey found that approximately 86% of students improve comprehension and encourage those who suffer
with disabilities had Internet access problems, and 64% of from reading disabilities. With regard to image synthesis and
students has no access to the digital devices they needed to natural language representation, deep learning has achieved
participate in online learning [4]. Although the styles of substantial advancements. The fact that the distribution of
providing instruction to students in physical and online images that rely on text descriptions is extremely
classes are different, providing instruction to students with multimodal, however, is a significant issue that deep learning
disabilities in online learning is difficult for special cannot address. This indicates that there are numerous logical
education teachers due to lack of internet access, lack of arrangements of pixels that render the description accurately
digital access and lack of students & parents engagement in [2].
online learning. Most special education teachers struggle to The main goal of this review paper is to investigate
provide special education services to students with multiple several techniques for visualizing specific texts utilizing
disabilities such as physical, visual, hearing, mental and well-known image synthesis models like Generative
intellectual disabilities. Students with disabilities are not Adversarial Networks (GANs).As an interactive tool for
independent and they need help to participate in online supervised and unsupervised learning tasks, GANs can help
classes. It should be easy for them if the school should have the education sector improve learning methods to compete
an organized learning environment and they are expecting to with Industry 4.0, especially from teaching to learning
have an interaction with the teachers during the online through visualization of text.
learning environment.
B. Generating Images from Text information generated and available to be consumed is huge.
The process of creating an image based on restrictions is Using traditional reading, it may not be possible. However,
known as synthetic image generation. The best and most we can boost and introduce equity in education by
successful deep learning models for producing textual introducing the images of the text description. The
explanatory images are generative adversarial networks conceptual understanding of complex topics can be
(GANs). improved if the texts are visualized into 2D images. Here,
we discussed the generation of "text-to-image" using GANs
This review is very focused on image synthesis, in and their applications in various fields, followed by the
addition to several other applications of Generative preprocessing of descriptive text inputs using natural
Adversarial Networks (GANs) such as: Image Captions, language processing techniques.
semantic segmentation, object detection, image in-painting.
The primary objective is to create artificial images using the
text input's patterns. There are mainly two operations such
as Generator (G) and Discriminator (D) to generate images
of text given by GAN. Generators (G) are called fakers
because they create fakes for the purpose of creating
realistic images. Discriminator (D) takes two inputs. One is
from the generator and the other is the real image. The goal
is to distinguish them so that they can be called experts.
Both are well trained to compete with each other.
prefixes, suffixes, and bag of words, and also perform form. They did not find compelling enough performance
common tasks such as tokenization of text description and benefits using a large BERT model. During micro tuning,
lemmatization processes. Next approach is syntax level. It here, they choose periodic masking strategy where the
analyzes the grammatical structure of sentences, including masking repeats at every mth token. Consider the masking
part-of-speech tagging, dependency analysis, chunking, and blue print (k,m). To get the input from the text, we keep the
named entity recognition. Final approach is the semantic first k tokens of the text and mask the next m tokens. Repeat
level, which focuses on making sense of the textual this to the end of the text and generate the 2 nd input by
description. The core process of the semantic approach is to shifting the pattern by 1 token, followed by shifting 2 tokens
map natural language sentences to formal representations of and so on up to k+m-1 tokens. They did not create the inputs
their meaning. There are various types of semantic from one but from various blueprints. All these inputs are
representations, including ontology-based representations, randomly shuffled and constitute datasets for the micro
topic modeling-based representations, vector space models tuning. If they do not mask the token but require the
and advanced embedding techniques. This review article has prediction for all the tokens but still, we get the acceptable
focused on techniques for embedding vector representations embeddings with low quality. The loss is defined by cross
of textual descriptions. Embedding is the one of the best entropy. While the performance of neural embedding is
methods for high-quality representation of words from vast comparable to other embedding techniques, the error differs
number of unstructured textual description. Word in more than half of the cases depending on the various
embeddings capture the words context in the corpus, datasets [9].
allowing words with similar meanings to have same vector
representations. We have various word embedding B. Generative Adversarial Networks(GANs) Review
techniques such as Word2Vec, GloVe, BERT [7]. StackGAN is for generating the photorealistic images
from textual descriptions. Breaking down the challenging
Large Language Models [LMs] have grammatical
task of generating high resolution into more tractable sub-
knowledge ranging from the local subject-verb agreement to
problems. The StackGAN generates photorealistic images
long distance filler-gap dependencies. It is not only
from text descriptions [10]. New conditioning augmentation
checking with the predicted words to infer the Language
techniques are needed to stabilitates the GAN training and
Models [LMs], LMs model called BERT captures linguistic
enhance the diversification of generated samples. The
hierarchical structures of a linear transformation of word
Qualitative and quantitative experiments demonstrate the
embeddings and increase the LM’s abilities to represent
effectivity the model design and effects of components,
meanings. The Language Model (LMs) provides
providing useful insights for the design of conditional GAN
contextualized word embeddings which naturally encode the
models.
distance between word to token in a vector space. It can be
used to test whether the trained distance in word embedding Conditional Generative Adversarial Networks and
reflects the natural way of grouping words together Stacked Conditional Variational Autoencoders aim to design
according to the lexical semantic knowledge. The BERT generative neural network architectures that generate images
model can place the words which appear in different based on textual descriptions. Feeding text-image pairs into a
contexts into distinct regions of the shared vector space and generative model causes the network to face sparsity of text
the word sense distance correlated with human judgments conditioning manifold, creating challenges in training GANs.
[8]. To provide a solution, they introduced a conditioning
augmentation method that provides smoothness to latent
First, we perform reduction of dimension using Principal
conditioning manifold. To improve the diversity of synthetic
Component Analysis (PCA). The PCA is a useful tool to
images, model allows random perturbation of the
visualizing the architecture of multidimensional word
conditioning manifold. The model is divided into two stages.
embeddings. They got correlation between each principal
It first uses a convolutional VAE to generate a 64x64 low-
component analysis from the embedding and human rating
resolution image with respect to the data set and the provided
of the Virtual Attribute Decoupling (VAD) dimension. High
text description. The low-resolution images are the input of
correlation indicates the high-dimensional information in
the encoder and decoder output, with rough sketches
that word embedding [8].
matching the basic shape of the object, distorted colors, and
The challenge in natural language processing is to text descriptions. A neural network learned to synthesize
capture the deeper meaning of a given text as a vector. Text images accurately. A second-stage of stacked conditional
embeddings are created by bundling the output of a model's GAN produces a high-resolution (256x256) images from the
layers when the model processes the text. The neural output of the first stage. Text embeddings are also used to
embedding techniques are inspired by micro-tuning. The allow models to adjust text inputs. High-resolution inputs are
neural embedding techniques of each text sample, they start sharper, brighter images accurately reflect text with
with the original language model and fine-tune only a few photorealistic images[11].
selected layers while other layers are frozen. Once the fine-
The biggest challenge in images from the text and image-
tuning process is done, they can measure the difference
to-text generation is annotated data. Most of available data
between new weights and original weights of each layer and
are unlabeled and require expensive manual annotation. The
normalize it. By concatenating the normalized vectors, they
goal [12] is to explore the cross-modal embedding space
can get the neural embedding. It’s about fine tuning the
between textual description and visual data in a self-
pretrained BERT base model, they choose three layers from
controlled environment to avoid challenges. The model they
the BERT model and each layer has 768 weights, so the
proposed for autoencoders is based on StackGAN.
resulting embedding will have the size 768x3 = 2304. So,
StackGAN-v2 receives text embedding vectors as input ,
before concatenating the normalized vectors, the weights of
generates high-resolution images at various branches of
each layer are flattened from their multidimensional tensor
network. After modification, they have an encoder-decoder
based network, the encoder takes the image as input and text description that corresponds to comic, next they used the
extracts various features at different levels of the deep neural AttnGAN to generate the comics from text and to apply the
network to get the image embeddings, the image embeddings pipeline to comics in the style of Dilbert. AttnGAN used the
are input of the StackGAN conditional decoder model to multiple generators and discriminators, with encoded input
Reconstruct the image of conditional StackGAN output. The text and images. It’s generating the images from the text;
ResNet-50 was used in the encoder part of the autoencoder, images have multiple corresponding text captions as training
and the updated final layer of ResNet-50 to get 1024- data. It’s used as a baseline for experimentation of generation
dimensional image embeddings. The generated images are of comics and the model was fine-tuned and augmented to
adjusted at the decoder side by image embedding vectors improve the result [15].
[12].
The “Deep Fusion Generative Adversarial Network (DF-
First, the ResNet-50 encoder encodes the generated GAN)” used a single-layer text-to-image backbone that
images into image embeddings. Conditional generate images with high-resolution. Composed of
expansion(augmentation) techniques are used in image Matching-Aware Gradient Penalty (MA-GP) and One-Way
embedding to generate a continuous latent space and Issuance, Target-Aware Discriminator significantly improves
preserve conditional variables. Kullback-Leibler (KL) the semantic consistency of text and images without
divergence loss acts as a regularizer during training to create introducing additional networks. The Deep Text Image
an even distribution of the conditioning variable. The Fusion Block (DFBlock) is used for more effective, deep and
generator produces low to high resolution images in various complete fusion of text and visual features [16].
stages by adding details. Training the discriminator
optimizes the conditional and unconditional loss. Conditional Generating a text-to-image is similar to generating the
loss measures whether the input image to the discriminator is high-resolution image representing a text descriptor.
fake or real, and also checks if the input image matches the Variational Auto Encoders (VAE) producing a wide range of
conditional variables. They used max-pooling for all hidden outputs, but the resulting images are blurry. GANs have great
vectors to preserve sentence embeddings. To regenerate the ability to generate sharper images, but lack various outputs.
textual description at the output, we initialized the decoder They proposed a stacked conditional VAE and conditional
LSTM network with latent vectors. A cross-modal GAN (CGAN) to generate images based on text descriptions.
embedding space mesh is used to map the embedding space In stage 1, the conditional UAE acts as the first generator,
of one modality to another modality embedding space. creating a rough sketch of the text descriptor. High-level
Because they didn't pair images and text, the network sketches and text descriptors are the inputs to conditional
minimizes the distance of two semantic distributions. They GAN networks. A level-2 GAN produced the high-resolution
have different architectures: Maximum Mean Discrepancy (256x256) images [17].
(MMD), GAN-based cross-modal embedding space-mapping CatGAN is used to overcome the challenges of GANs.
networks. GAN-based cross-modal embedding spatial Complex structure of model and learning processes limit the
mapping networks use generators to transform one modality performance of GANs and also increase the instability of the
into another modality embedding. A discriminator training process. Therefore, CatGAN introduced a hierarchic
determines whether two modality embeddings match. evolutionary algorithm used for model training [18]. The
Maximum Mean Discrepancy (MMD) is a distance measure CatGAN model finds the difference between real and
in the probability space when regenerating the kernel Hilbert generated examples for each category. The goal is to tell the
space (RKHS) [12]. model to produce text in a specific category with minimal
CookGAN generates photorealistic images of food based differences. They used the Gumbel Softmax function to
on a list of ingredients. The Cook GAN contribution transfer the gradient from the classifier to the generator. You
combines StackGAN with an attention-based recipe can train your model to improve its performance by using
attribution model to generate meal images from ingredient hierarchic evolutionary algorithms. When training a model,
lists. The next process was to improve the image quality by CatGAN seeks to maintain the training process and balance
changing the components and adding cycle-consistent its quality and diversity.
constraints to control the appearance of the image [13]. The Multilevel T2I requires dynamic reconstruction of text
Cycle Consistency Regularizer is used to minimize semantic features at each level in order to provide diverse and accurate
discrepancies between fake and real images and increase semantic guidance for text features according to their
image quality qualitatively and quantitatively. The process of history-level status. Multi-level T2I can gradually increase
synthesizing the image is to convert a textual description into the resolution of the image and gradually add detail through
a photorealistic image by generating a set of mask maps of a coarse-to-fine generation process. In this process, text
textual input using a mask map generator (MG). features evolved synchronously, providing semantic
In Next stage, they compute the rank and aesthetics score guidance from the coarse-grained to the fine-grained. By
of generated synthetic image through Pre-Image Aesthetic suppressing previously used semantic information and
Ranking Generator. In order to get the final photo realistic dynamically reconstructing text features at different stages,
synthetic image, the calculated aesthetics score in the new consistent information takes effect as soon as they are
previous stage can be categorized into lowest, average and activated in the generation process, and the same semantics
highest score followed by feeding it to the Image generator can be prevented from being generated repeatedly, reducing
(IG). The generated images aesthetics score calculated again repeated rendering problems. In this way, text features
to prove their model can generate the high-quality image gradually evolve with new consistent semantics, resulting in
then the state-of-art techniques [14]. more detailed and vivid generations [19]. “Dynamic
Semantic Evolution Generative Adversarial Networks”
The ComicGAN main goal was to produce a model for (DSE_GAN), reconstructed text features, are dynamically
text-to-comic generation. At first, its extract and create the based on the historical stage states within a single adversarial
multistage architecture. The DSE module just not synthesize high-resolution images without tangling
dynamically selects the words that need to be reconstructed visual features. This improves the consistency of
semantic text images without introducing
at each stage, but also dynamically reconstructs them by additional networks [16].
improving the semantics of various granularity subspaces. To CatGAN A category Aware model directly measures the gap
facilitate DSE modules, a single adversarial multi-stage between the actual and generated samples in each
architecture (SAMA) enables more stages of text-image category, and reducing this gap guides the model to
interaction by eliminating complex multiple adversarial produce high-quality category samples [18].
training requirements. , simplifies the process [19].
C. Evaluation Metrics Each GAN has a specific architecture and
hyperparameters to achieve expected results.
Evaluation of generating the images from the text using
generative models should focus on image-to-text
consistency and image quality. There are several techniques
to generate high-resolution photorealistic images using TABLE II. LIST OF TECHNIQUES AND TECHNOLOGIES
GANs. The performance of GAN evaluated using the Items Descriptions
following metrics, such as Inception Score (IS) and Frechet MS-COCO 328000 Samples
Inception Distance (FID). IS and FID are used to assess Dataset(s) CUB-Bird 11788 Samples
image quality, and R accuracy is used to assess image-text Oxford-102 8189 Samples
consistency [20]. The Inception score calculates the Machine Learning Library TensorFlow
Kullback-Leibler (KL) divergence between the conditional Neural Network Library Keras
Embedding GloVe, BERT
and marginal distributions. A higher IS score means that the
GANs Discussed StackGAN, AttnGAN , CVAES,
image produced is of higher quality and belongs to a CookGAN, ComicGAN, DF-GAN,
particular class. Frechet Inception Distance (FID) calculates CGAN, CatGAN, DSE-GAN
the distance between the actual image and generated images. Image Diversity Inception Score (IS)
The more realistic the image produced, the lower the FID. It Distribution Consistency Frechet Inception ´ Distance (FID)
also has a Cross-Model Distance (CMD) method to assess Semantic Consistency R-precision & Human Perceptual Score
quality of images and image-text coherence by mapping Dimension Reduction Principal Component Analysis (PCA)
image and text description to a multimodal semantic
distribution [20]. Understanding the meaning of the text description is a
challenge for GANs. GANs can generate photorealistic
V. DISCUSSION images with consistent semantic meaning of text. Each
The result of this review states that the suspension of the image in the dataset has multiple captions annotated by the
classes during the pandemic makes the significance human, which are subjective and worded differently. The
challenge for the students and teachers who are not ready for text description(captions) does not contain enough
the online learning. Due to the various reasons such as information to guide image generation. An image has a
technology requirement, Students motivations and background, various visual information, and non-essential
investment, the educational institutions, students, and visual information as well. Image distributions are more
teachers face challenges in adapting to the new era of complex and cannot be learned directly and explicitly from
learning. Children with learning disabilities may have textual descriptions. Inadequacies between captions and
difficulty in learning at some point during the pandemic, so language discrepancies produce synthetic images that
we hope these findings will stimulate additional research to deviate from the ground truth. The resulting images are
provide adequate support for dyslexics. semantically inconsistent because incorrect semantics lead
to ineffective image generation. Therefore, there is a need to
Encouraging students to study online as a physical class improve the quality and semantic consistency of the
requires the innovation-centric education that enhances generated images.
visualization and critical thinking skills. According to
findings from [21], the COVID-19 relies heavily on VI. CONCLUSION
artificial intelligence (AI). Generative Adversarial Networks
(GANs) are the latest advances in deep learning. GANs help Visualizing the text can be helpful for readers of all
us to visualize text description so that students do not face ages. By addressing the challenges in teaching and learning,
the challenge of understanding complex concepts. The main we reviewed the most recent methods for generating images
purpose of the GANs is to generate the sequence of high- from the text using Generative Adversarial Networks
resolution images of the input text description. Here are the (GANs). The results shows that we can create a potent GAN
objectives of the recent GANS. to assist students in visualizing textual descriptions of
complex concepts. This research will bridge the educational
TABLE I. GAN TYPES AND OBJECTIVES gap between children with and without disabilities. The
future work will focus on generating image sequences for
GANs Objective(s)
visual storytelling activities with semantic consistency
CVAES A low resolution (64x64) image generated by
extracting the shape and color of an object [11]. between generated images.
CGANs It takes input from CVAES and produces high REFERENCES
resolution images (n 256×256) [11].
AttnGAN It is fine-grained text-to-image synthesis that [1]. Disability and Health, “Disability and health (who.int)”, Nov 24, 2021.
allows the generative network to draw different [2]. Reed, S., Akata, Z., Yan, X., Logeswaran, L., Schiele, B., & Lee, H.
sub-regions of the image depending on the words “Generative Adversarial Text to Image Synthesis” ,33rd International
most relevant to those sub-regions [15]. Conference on Machine Learning, 1681– 1690, ICML 2016.
DF-GAN A text-to-image backbone that can directly
[3]. Nur Salina Ismail, Nor Mazlina Abu Bakar, Sharifah Wajihah Wafa [13]. Han, Fangda, Guerrero, Ricardo, Pavlovic, Vladimir, “CookGAN:
Syed Saadun Tarek Wafa , "Online Learning Challenges During Meal Image Synthesis from Ingredients”, [2002.11493] CookGAN:
Pandemic COVID-19 in Malaysian Higher Learning Institution", Meal Image Synthesis from Ingredients (arxiv.org)-2020.
Universal Journal of Educational Research, Vol. 8, No. 12, pp. 7151 -
7159, 2020. [14]. Baraheem, Samah Saeed, Nguyen, Tam V, “Aesthetic-Aware Text to
Image Synthesis”, 2020 54th Annual Conference on Information
[4]. Smith, C. “Brief Peer Reviewed Essay Multidisciplinary Perspectives Sciences and Systems, CISS 2020(2020).
in Higher Education”, 2020, ISSN : 2474-2546 Print / ISSN : 2474-
2554. [15]. Proven-Bessel, Ben, Zhao, Zilong, Chen, Lydia, “ComicGAN: Text-
to-Comic Generative Adversarial Network”, https://bit.ly/3R1kZ3i.
[5]. Musdizal, M. “The Influence of Visualization Strategy on Reading
Comprehension Ability”. Jurnal Dimensi, 2019, 8(2), 317–328. [16]. Tao Ming, Tang Hao, Wu Fei, Jing Xiao-Yuan, Bao Bing-Kun, Xu
Changsheng, “DF-GAN: A Simple and Effective Baseline for Text-
[6]. Svensson, I., Nordström, T., Lindeblad, E., Gustafson, S., Björn, M., to-Image Synthesis”, http://arxiv.org/abs/2008.05865, 2022.
Sand, C., Almgren, G., Bäck, /, Nilsson, S., Nordstr€, T., Bj€ Orn C,
M., & Ack, B. “Disability and Rehabilitation: Assistive Technology [17]. Haileleol Tibebu, Aadil Malik, Varuna De Silva, “Text to Image
Effects of assistive technology for students with reading and writing Synthesis using Stacked Conditional Variational Autoencoders and
disabilities Effects of assistive technology for students with reading Conditional Generative Adversarial Networks”, INTELLIGENT
and writing disabilities”, 2019. COMPUTING: PROCEEDINGS OF THE 2022 COMPUTING
CONFERENCE, 2022.
[7]. R. Sonbol, G. Rebdawi and N. Ghneim, "The Use of NLP-Based Text
Representation Techniques to Support Requirement Engineering [18]. Liu, Zhiyue, Wang, Jiahai, Liang, Zhiwei, “CatGAN: Category-aware
Tasks: A Systematic Mapping Review," in IEEE Access, vol. 10, pp. Generative Adversarial Networks with Hierarchical Evolutionary
62811-62830, 2022. Learning for Category Text Generation”, , Association for the
Advancement of Artificial Intelligence (www.aaai.org) 2020,
[8]. Yuhan Zhang, Wenqi Chen, RuihanZhang, Xiajie Zhang,“Representing [https://bit.ly/3QMwFaI.
Affect Information in Word Embeddings”, [2209.10583]
Representing Affect Information in Word Embeddings (arxiv.org), [19]. Mengqi Huang, Zhendong Mao, Penghui Wang,”DSE_GAN:
September 2022. Dynamic Semantic Evolution Generative Adversarial Network for
Text-to-Image Generation”, 2022, *DSE-GAN: Dynamic Semantic
[9]. Vasilyev Oleg, Bohannon John, “Neural Embeddings for Text”, Evolution Generative Adversarial Network for Text-to-Image
http://arxiv.org/abs/2208.08386, 2022. Generation (arxiv.org).
[10]. Han Zhang , Tao Xu , Hongsheng Li , Shaoting Zhang , Xiaolei [20]. Bo Yang, Fangxiang Feng, Xiaojie Wang, “GR-GAN: Gradual
Huang , Xiaogang Wang , Dimitris Metaxas, “StackGAN: Text to Refinement Text-to-image Generation”, ICME 2022, Jun 2022 ,
Photo-realistic Image Synthesis with Stacked Generative Adversarial [2205.11273] GR-GAN: Gradual Refinement Text-to-image
Networks”, Dec 2016. 1612.03242v1.pdf (arxiv.org). Generation (arxiv.org).
[11]. Tibebu, H., Malik, A., De Silva, V, ”Text to Image Synthesis Using [21]. Saravanan, B., Kalaiyarasi Shanmugam, and N. Jeevarathinam. "Role
Stacked Conditional Variational Autoencoders and Conditional of Artificial Intelligence in Remote Learning during COVID-19
Generative Adversarial Networks”, In: Arai, K. (eds) Intelligent Pandemic." Journal of Information Technology 3, no. 4 (2021): 307-
Computing. SAI 2022. Lecture Notes in Networks and Systems, vol 319.
506. Springer, Cham.
[12]. Das, A.S., Saha, S, “Self-supervised Image-to-Text and Text-to-Image
Synthesis”, ICONIP 2021,Springer, 05-Dec-2021.
Abstract—The Deep Neural Network (DNN) model has been should be optimized which can be accomplished using four
used in a number of commercial applications and we benefit from methods discussed below:
its accuracy in numerous applications like virtual assistants and Low-rank factorization technique aids in model size re-
chatbots. Due to the high computational demands and significant
memory requirements of those models, quantization approaches duction when it is necessary by breaking up a huge matrix
have been employed to minimise accuracy loss while reducing into smaller matrices. In knowledge distillation, a sizable,
model size to address those problems. DNN’s has a number intricate model is trained on a sizable dataset. This model’s
of problems, including a large model size and a high accuracy capabilities are transferred to a smaller network when it can
model, which have come at the cost of substantially increased generalize and function effectively on untested data. Pruning
computation and model storage resources, which consume more
power. The study addresses these issues and focuses on enhancing is the method of removal of features which contribute least to
model speed, reducing computational cost, compressing the size the decision-making of the model. The main types are filter
of the model, and making the model energy efficient by using pruning (least contributing filters are removed) and weight
some of the methods outlined below. We can use quantization pruning (weights which do not contribute much to the output
techniques to accomplish our desired goals. These techniques are are removed). Quantization is an optimization technique [9]
broadly categorised as quantification-aware training and post-
training quantification. The former technique discusses full quan- where the weights and activations of a floating point (32-bit)
tization and batch normalization, whereas the latter technique model are quantized to lower n-bit precision with negligible
also discusses the weights, activations, weights and activations loss in accuracy. In this paper, quantization is the topic of
together for quantization. discussion. One of the most successful methods for decreasing
Index Terms—Deep Neural Network, Optimization, Quantiza- the memory and computational costs and enabling the use
tion, Pre Training, Post Training, Analytical Clipping, Activation,
weight tuning. of the DNN model on a fixed-point pipeline is known as
quantization.
Paper discusses various Quantizer designs which are gen-
I. I NTRODUCTION
erally categorized as Uniform and Non-Uniform implying
A deep neural network is a network made up of numerous constant and variable step size. Various quantization methods
layers that can be thought of as stacked neural networks. The which can be done in one of two ways. Quantization-aware
core role of a neural network is to accept a set of inputs, training in which weights and activations are quantized during
analyse them using increasingly complicated computations training and Post training quantization is to quantize the
and output results to handle real-world problems such as activations and weights of a trained model.
classification, annotation and detection. Deep learning models
outperform traditional Machine learning networks in terms of II. O BJECTIVES
results. This neural network is trained on a large number of The neural network is trained on a large number of im-
images with labels while adjusting the parameters to improve ages with labels while adjusting the parameters to improve
performance which results in the usage of high computational performance. The usage of more parameters in conventional
power, large model size and memory. The problem arises when algorithms is a disadvantage. However, the power, memory,
we want to deploy these DNN models on edge devices which and computational capabilities of edge devices are constrained.
have constrained resources and memory. Thus the model This implies that a DNN model needs to be prepared for
Train DNN
model
Quantizer design Quantization techniques
Objective
Goal
selection
Parameterized clipping
Full Quantization
activation
Symmetric Quantization
Different objective
aware training
Uniform Batch Training with
Normalization simulated quantization
Computational
Model Speed
Model size
Asymmetric
Efficient
Power
cost
scheduling
Point wise
Rounding
quantization
Process
scheme
deployment in embedded systems. This can be done by Rounding scheme [2] is effective way to greatly minimize the
quantizing DNN models which significantly lowers the amount size of the model.
of memory and processing cost needed to use neural net- 1) Rounding scheme [2]: This technique reduces 32-bit
works. There are several key objectives that are achieved with floating point values to lower precision quantization bins. 32
quantization techniques. The user selects the algorithms in bit floating point weights are divided into W = w1, w2,..., wn.
accordance with his needs in order to concentrate more on The within-cluster sum of squares is minimized for k clusters
a specific objective. [2] C = c1, c2,..., ck. This is combined with pruning and Huffman
coding to achieve model compression, which reduces the size
Rounding of model with negligible loss in accuracy.
Model size
scheme
Different objectives
B. Computation Cost
Power Training Numerous activation nodes and number of connection be-
Efficient scheduling
tween those nodes with weight parameters associated with it
Point wise comprises a neural network. These parameters are quantized
Model Speed
Convolution
to lower bit. In order to put things into perspective, operating
Computational Depth Wise a neural network on hardware can easily lead to huge number
cost Convolution of arithemetic operations, mainly addition and multiplication.
Large computational gains and improved performance are
Fig. 2. Methods to achieve the given objective are represented.
obtained when a neural network’s intermediate calculations are
quantized and lower-bit mathematical procedures with quan-
tized parameters are used. The use of Depthwise Convolution
A. Model Size [2] can significantly reduce the cost of computing.
Quantization technique reduces 32-bit floating point model 1) Depth Wise Convolution [2]: In group convolutions,
to lower n-bit integer model. For instance, reducing the 32-bit G is a programmable tuning parameter. Less calculation is
to an 8-bit model would reduce the model size by a factor required and there are fewer parameters with a higher G. G
of 4, so one obvious benefit of quantization is a significant equaling the number of input channels is an extreme example.
reduction in memory. Quantization significantly reduces model In that situation, the group convolution layer is referred to as
size which makes it more feasible to run DNN models on a a depthwise convolution. Compared to a standard convolution,
memory-constrained device like a micro-controllers, mobile a depthwise convolution is less expensive to compute but has
phones, smart watches. less modelling potential.
C. Power Efficiency between uniform and non-uniform quantization using this step
Reduced memory access costs and improved compute effi- size.
ciency are two ways that quantized neural networks improve A. Uniform Quantization
power efficiency. Due to this quantized data, less power is
In uniform quantization [5] the step size(the amount of
required to move the data from one chip to another as data
space between layers of quantization) is constant. A function
size is less which reduces the memory bandwidth. Arithmetic
must be built in order to reduce the activations and weights
operations with lower precision, use less power and improve
of neural networks to a narrow range of values.
hardware efficiency which lowers power consumption. The
model can be made more power efficient by training schedul-
ing which lowers the power consumption of the ML model. Symmetric
1) Training Scheduling [2]: It can be done by using an
API that handles scheduling. The API framework will strive
Uniform
to batch and delay jobs as much as it can and will be intelligent
about when it executes them. If a job doesn’t have deadline,
it will typically run whenever it is ready, depending on the Asymmetric
internal queue of API Scheduler. You can enqueue work for
a new or existing job using the API enqueue command. Any Fig. 3. The figure depicts two methods of uniform quantization, Symmetric
previously enqueued work will remain and be dispatched the and Asymmetric, along with the algorithms that use those methods.
next time the task runs, even if a job with the same ID is
already planned. If there is currently a job running with the
same ID, the new work will be queued for it without stopping Q = Int(x/s) − Z (1)
it. This allows us to schedule the training of the model and
use the API for that purpose. The above mentioned in eq 1 converts real values (x) in
floating point (32 bits) to a lower bit range, Q is the quantized
D. Model Speed value , S is a scaling factor and Zero-point(Z) which ensures
It is evident that float arithmetic requires a little bit more that zero is quantized accurately. Additionally, this Int function
work than integer arithmetic when you add and multiply two uses a rounding procedure to convert a real number to the
values together in scientific notation. The real hardware has a nearest integer value. Real values(x) are mapped to certain
significant impact on how quickly calculations are performed integer values via same function.
in practice. For instance, a contemporary desktop computer’s 1) Symmetric Quantization: The primary consideration in
CPU can perform integer calculations more quickly than float uniform quantization is determining the optimal scaling fac-
calculations. On the other hand, single precision float calcu- tor(S) in eq 1 The real values(x) are segregated into bins on
lations are well suited to GPU optimization (Since computer the basis of scaling factor which is calculated using
graphics tend to use this type the most). Without being exact, β−α
it may be argued that int8 is frequently quicker than float32. s= (2)
2b − 1
The model can be significantly sped up using point wise From the equation 2 , [ α , β ] denotes the clipping range,
convolution [2] and effective hybrid convolution [8]. which is used to clip real values within a bounded range
1) Point Wise Convolution [2]: Unlike other types of con- and b is the quantization bit width. The α, β range must be
volution layers, point wise convolution uses a kernel size K calibrated in order to determine the scaling factor this can
of 1. Params and MacS are decreased by K2 times when a be done symmetrically where α = −β and more precisely
KxK conventional convolution layer is swapped out for a 1x1 by utilizing the minimum and maximum values of the signal.
convolution layer. In reality, since the 1x1 convolution by itself where x is the real value. This symmetric method of selecting
cannot aggregate spatial information, CNN designs are created alpha and beta to quantize the model is known as symmetric
by combining it with additional convolution layers. No matter quantization [17]. This method replaces zero point(z) with 0
how many channels the input image has, the kernel has a depth in equation which simplifies the equation
of that many. It can be used with depthwise convolutions to
create depth wise-separable convolutions, an effective class of Q(r) = Int(x/s) (3)
convolutions.
As a result, the computational cost is reduced, resources are
III. Q UANTIZER D ESIGN used more efficiently, and the implementation is simplified.
Design templates known as Quantizer designs are used to 2) Asymmetric Quantization: In asymmetric quantization
quantize the model by choosing a particular design template [5] the real values are mapped in an asymmetric range of
based on an objective decision. Two of the most popular quantized values as shown in figure 4.
quantizer designs are Uniform and Non uniform quantization. The real values are mapped in this case to a range of
By altering the step size, the distribution of quantization levels [0,255] for 8 bit quantization, which is not mirrored along
can be changed. It is further investigated how to distinguish the origin. This type of quantization is known as asymmetric
Min(x) 0 Max(x)
2) Logarithmic Distribution: In a logarithmic distribution
[13], real values are quantized using the log scale within a
specific range, which causes the quantization levels to change
exponentially.
0 255
IV. Q UANTIZATION TECHNIQUES
Fig. 4. Asymmetric Quantization. Some quantization techniques are chosen for certain appli-
cations, and this is necessary if there is a need to run or train
the model on low precision hardware that does not support
quantizationṪhis can be done by selecting the clipping [α,β] floating point due to a variety of restrictions, such as those
range asymmetrical,which is used to determine the scaling imposed by mobile or IOT devices. The capability of training
factor(s) in eq 2. The tighter clipping range produced by this the model with lower bit precision weights and activation
asymmetric quantization is difficult to obtain with symmetric values which allows to have potential advantages.
quantization. When the weights or activations are not balanced, In practice, there are two main ways to go about quantiza-
this tight clipping is more useful [11]. tion, Quantization aware training (also known as Pre training)
B. Non-Uniform Quantization and Post training quantization.
In non-uniform quantization [5], the space between quanti-
zation levels (step size) can vary and is not constant. Because Full Parameterized clipping
Quantization activation
of the varying step size, the quantization error (difference
between input value and quantized value) is reduced which Quantization aware
is more in case of uniform quantization. This can be done training
using eq 4.
Batch Training with simulated
Normalization quantization
Q(r) = Xt , if r ∈ [∆t , ∆t+1 ] (4)
Where ∆t i denotes steps and Xt denotes various quan- Fig. 6. Classification of Quantization aware training.
tization levels. The real value(r) is projected to the equiv-
alent Xt value when it lies between the quantization step Quantization aware training(QAT) also called pre training
∆t and ∆t+1 . The bell-shaped (symmetric) distributions quantization imitates inference-time quantization, generating
of the parameters, which frequently have lengthy tails, are the model in such a way that the conveniently quantized mod-
the main target audience for these non-uniform quantization els may be provided by the downstream tools. The quantized
techniques. When using a logarithmic distribution and power models will use lower-bit representation (e.g. 4-bit instead
of two scales for non-uniform quantization, the quantization of full precision), eventually leading to an advantage while
levels and steps rise exponentially rather than linearly. Fig 5 deployment. During the QAT the quantization happens while
represents the different ways that non-uniform quantization training the model itself. There are several methods regarding
can be accomplished. at what stage of training to perform weights and activation
quantization. The goal of this technique is to achieve the
desired objective without sacrificing accuracy. To this end,
Power of 2
parameterized clipping activation (PACT), which consistently
degrades accuracy less than other techniques and another sim-
Non
ilar technique is training with simulated quantization, which
Uniform
only quantizes weights during forward passes and suffers
minimal accuracy loss.
Logarithmic
A. PACT: Parameterized clipping activation function
Fig. 5. The figure depicts two methods of non-uniform quantization, Power of Employing ReLU (the activation function most frequently
2 scales and Logarthmic Distribution, along with its method and Asymmetric, employed in CNNs) as the activation function for each layer
along with the algorithms that use those methods, which will be discussed
further. would make activation quantization more difficult. ReLU
delivers greater accuracy compared to previous activation
1) Power of 2 scales: This is an systematic non uniform functions by allowing gradient of activations to flow down
quantization method for the bell-shaped distribution of param- deep into layers. Although the ReLu funciton provides output
eters(weights, activations) in neural networks. Here all quan- which is boundless, a high dynamic range is needed for
tization levels are constrained to the summation of Powers-of- quantization after ReLU (i.e., more bit-precision) with primary
Two [14](2x ) values. This requires less computational powers goal to keep down the accuracy degradation which is product
and has good match with distribution of weights. of quantization, PACT [4] is new approach for quantizing the
activations by generating a parameterized clipping level which
is adjusted dynamically by gradient descent based training. graph rather than being present as a different block of
The standard ReLU activation function in CNNs is changed operations in the training graph and the method is as follows:
in PACT [3] to the following.
γω
y = P ACT (x) = 0.5(|x|−|x − α|+α) wf old = p 2)+ϵ
(9)
EM A(σB
0, x ∈ (−∞, 0) (5)
= x, x ∈ (0, α) From equation 9 γ is the batch normalization’s scale param-
α, x ∈ (α, +α) 2
eter, EMA(σB ) is the moving average estimate of the variance
of convolution results across the batch, and is just a small
where α bounds the activation range to [0, α] and for dot constant for numerical stability.
product computations the generated activation output is then As we’ve seen, the Quantization aware training strategy
linearly quantized to lower bit representation say b bits, where offers results that are nearly as accurate as those of the original
model, with a few losses. These massive models are being
b
2 −1 α
q = round y. . b (6) trained, and with training comes quantization. We will now
α 2 −1
talk about the quantization technique for quantizing model
Certainly this new activation function bears a variable α in parameters which is already trained.
the loss function, which can be fine tuned during training.
V. P OST Q UANTIZATION
Gradient ∂yq /∂α can be calculated for back-propagation using
the method called Straight-Through Estimator (STE), which Post-training quantization is an approach that quantizes pre-
will estimate ∂yq / ∂y as 1. trained model while also imporving CPU latency and reduction
in model size with little deterioration in accuracy of model.
∂yq ∂yq ∂y 0, x ∈ (−∞, α) For faster inference without having to retrain the model, it
= = (7)
∂α ∂y ∂α 1, x ∈ (α, ∞) is preferable to compress weights or quantize both weights
and activations. Applying post-training quantization typically
results in little accuracy loss. In terms of weight quantization
B. Training with simulated quantization
ACIQ (Analytical Clipping for Int Quantization) limit value
It is usual practice to train quantized networks in floating of weights in such a way not to interfere in accuracy, Adap-
point first and then to quantize the weights that follow (can tive Rounding and Qdrop method provides better results by
be fine-tuned with post training quantization) [6]. This method rounding of important activation and dropping activation with
produces acceptable results for large models with high data minimal influence, Per Channel bit allocation and Adaptive
representational capacity, but it significantly reduces accuracy Floating Point Quantization provides almost same accuracy
for tiny models. Prior to convolving the weights with the input, as full precision model by limiting bit representation of
they are quantized. Before quantization of weights the batch parameters.
normalization parameters are folded into the weights if the
layer uses batch normalization. Analytical clipping for
Weight Only
Application of the quantization function q described as INT quantization
follows is used to execute quantization for each layer, which
is parameterized by the various numbers of quantization levels Adaptive rounding
and clamping range. border
Post training
Activation only
quantization
val = S(q − Z) QDrop activation
quantization
clamp(val; m, n) := min(max(x, m), n)
n−m Per channel bit
s(m, n, N ) := Activation and
allocation
N −1
$ ' weights
clamp(val; m; n) − m Adaptive floating
q(val; m, n, N ) := s(m, n, N ) + m point quantization
s(m, n, N )
(8) Fig. 7. Classification of Post training Quantization.
a) Analytical clipping for INT quantization: The method both the simulation and analytical results converges. Uniform
limits the activation values inside a tensor with an optimised density function f(x) = 1/2α is substituted into equation 13.
limiting value. The original tensor will be distorted if this
clipping is applied, hence it is important to minimise rounding M −1
2X Z −α+(i+1)·∆
errors in parts of distribution that contain the most important 2
f (x) · (x − qi ) dx
information [1]. Statistics of varied tensors derive expres- i=0 −α+i·∆
sions for the mean-square-error degradation. This quantization M
(14)
2X −1
method has shown noticable improvements over benchmark 2 · α3 1 α2
≈ 3M
· =
quantization schemes that normally avoid clipping. 3·2 i=0
2α 3 · 22M
A suboptimal approach has been opted to get tensor max
and min values to quantize the Integer tensors, clipping of the with method called symmetrical argument, equation 14 can
tensor values is done in range of [-α,α] in order to minimize be made more comprehensible for any symmetrical distribu-
the quantization noise aiming to reduces the quantization tions as follows:
Z ∞
noise. For any r ∈ R, clipping function is defined as α2
E (X − Q(X))2 = f (x)·(x−α)2 dx (15)
+2·
3 · 22M
(
x if |x| ≤ α α
clip(x, α) = sign(x, ) = (10)
sign(x)α if |x| > α The objective is to quantize as many activation layers to 4-bit
precision as possible without noticeably degrading accuracy.
With clipping value α, once the range is determined it is Performed tests to determine the maximum number of acti-
split into 2M regions called quantization regions. With this del vation layers that could be quantized from 8 bit paramaters
(quantization step) is found between two quantization levels to 4 bit parameter with negligible accuracy loss. These tests
which are beside each other. used VGG-16 with batch normalisation, ResNet-101, ResNet-
2α 50, ResNet-18, and Inception-v3 on the ImageNet dataset and
del = (11) paper have surveyed the results further in the paper.
2M
the mean squared error is derived from quantized version Q(x)
B. Activation Only Post Training Quantization:
and X as shown in equation 12.
In this case only only activation is quantized using certain
Z −∞
methods:
E (X − Q(X))2 = f (x) · (x + α)2 dx
1) QDrop activation quantization: In this scheme, author
−∞ has discussed about the impact of activation quantization
nx
2xX −1 Z −α+(i+1)∆
2 on post training and stated that the limited implication of
+ f (x) · (x − qi ) dx activation quantization provides better results than the schemes
−α+i∆
Z i=0
∞ using whole implication [16].
+ f (x) · (x − α)2 dx A framework is proposed to understand the incorporation
α of activation in tuning of weights and achieve the flatness of
(12)
quantized model on train and test data in order to achieve good
The density function f is estimated by a construction of accuracy. It is easy to implement on various neural networks
a piecewise linear function considering the segment break- and achieve normality (flatness) in all directions in distribution
points which are points in f (density function). Considering of model.
smooth probability density functions, for any given sufficient The Qdrop algorithm drops activation quantization ran-
resolution it would lead to an small approximation error. domly during each forward pass. It switches between disability
Quantization noise can be found using f (density function) and enability of quantization function during passes. Survey
as shown in equation 13. results are summarized in Table 1.
M
(
2X −1 Z −α+i·△
0 if with probability p
f (x) · (x − qi )2 QDrop = q = â (16)
i=0 α+i·△ a − 1 with probability 1-p
M
(13)
2X−1
2 · α3
≈ · f (qi ) For ImageNet dataset the default probability p is set as 0.5
3 · 23M i=0 and 1024 images are sampled as calibration set which is used
The equation 13 represents the rounding error (as opposed for data aggression and model learning.
to clipping error) which is a product of rounding value strategy 2) Adaptive Rounding for Post training Quantization: This
from bin i to qi . For sufficient resolution and a smooth technique is mainly used to reduce the loss in performance
density function, it is found that with the range [−α, α] being due to the quantization of models, and it is applied to pre-
distributed uniformly making path for simple analysis showing trained neural networks. Here [12], the weights of models are
little impact on the accuracy, with the assumption of the same, quantized as follows
∆Wil = W l - Wil refers to the agita due to the quantization. Analysing the equatin 21 and equation 22, there is a distinct
Here i denote the fluctuations due to the quantization, here S l equation for every i that lies ∈ [0, n 1] and an supplementary
is kept constant to attain the optimized rounding operation. To equation for the multiplier λ.
find optimized rounding operation following equation is used. This solution results in bit allocation for every channel i
Second order Taylor degree approximation is used in this
2
case to reduce the excess computations due to repeated for- α3
ward passes. However, the interaction between the weights of Bi⋆ =2 Mi
= Pi 2· (23)
i αi
3
distinct layer are ignored, which inferred a non-zero block
which assumes to be H (w) refers to the particular layer. the equation 23 is transalated by using log on both the sides
into allocation bit-width Mi for every channel i. As Mi is
(l) 1 (l) integer it includes a rounding scheme.
arg min E[g w T
△w(l) + △w(l)T · H w △w(l) ] (18)
∆w 2 $ 2 !'
As seen above, the second order term is used to leverage αi3
Mi = log2 P 2 · B (24)
the simultaneous interactions of the weights. This is known α
i i
3
(l)
as QUBO problem and ∆Wi refers to binary variables. 2) Adaptive floating-point precision: A data format, variant
The gradient term’s contribution to optimization can be safely of standard float value representation called as AFP [15] is
neglected for a converged pretrained model.